Skip to content

Conversation

@github-actions
Copy link
Contributor

@github-actions github-actions bot commented Jan 9, 2026

Backport of #13814 to release/13.1

/cc @danegsta

Customer Impact

A path string in a log message for Vite HTTPS support wasn’t being properly escaped leading to errors if a path segment starts with certain characters.

Testing

Manually verified the string is escaped correctly with the change.

Risk

Low

Regression?

No

@github-actions
Copy link
Contributor Author

github-actions bot commented Jan 9, 2026

🚀 Dogfood this PR with:

⚠️ WARNING: Do not do this without first carefully reviewing the code of this PR to satisfy yourself it is safe.

curl -fsSL https://raw.githubusercontent.com/dotnet/aspire/main/eng/scripts/get-aspire-cli-pr.sh | bash -s -- 13822

Or

  • Run remotely in PowerShell:
iex "& { $(irm https://raw.githubusercontent.com/dotnet/aspire/main/eng/scripts/get-aspire-cli-pr.ps1) } 13822"

Copy link
Member

@davidfowl davidfowl left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM - simple backslash escape fix for Vite config paths.

@joperezr joperezr added the Servicing-approved Approved for servicing release label Jan 13, 2026
@joperezr joperezr merged commit cc4876b into release/13.1 Jan 13, 2026
286 checks passed
@joperezr joperezr deleted the backport/pr-13814-to-release/13.1 branch January 13, 2026 23:11
@dotnet-policy-service dotnet-policy-service bot added this to the 13.1.1 milestone Jan 13, 2026
This was referenced Feb 11, 2026
This was referenced Feb 12, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants