Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update .NET SDK to 10.0.100-alpha.1.24609.2 #59389

Merged
merged 12 commits into from
Dec 13, 2024

Conversation

github-actions[bot]
Copy link
Contributor

@github-actions github-actions bot commented Dec 9, 2024

Updates the .NET SDK to version 10.0.100-alpha.1.24609.2, which includes version 10.0.0-alpha.1.24570.9 of the .NET runtime.

This pull request was auto-generated by GitHub Actions.

Update .NET SDK to version 10.0.100-alpha.1.24609.2.

---
updated-dependencies:
- dependency-name: Microsoft.NET.Sdk
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
@github-actions github-actions bot requested review from wtgodbe and a team as code owners December 9, 2024 12:13
@dotnet-issue-labeler dotnet-issue-labeler bot added the area-infrastructure Includes: MSBuild projects/targets, build scripts, CI, Installers and shared framework label Dec 9, 2024
Copy link
Contributor

@dotnet-policy-service dotnet-policy-service bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Auto-approving SDK update.

@MackinnonBuck
Copy link
Member

These failures seem related to #58721. Looking into it.

@MackinnonBuck
Copy link
Member

New build errors:

src/Servers/Connections.Abstractions/src/Features/ITlsHandshakeFeature.cs(38,5): error SYSLIB0058: (NETCORE_ENGINEERING_TELEMETRY=Build) 'CipherAlgorithmType' is obsolete: 'KeyExchangeAlgorithm, KeyExchangeStrength, CipherAlgorithm, CipherAlgorithmStrength, HashAlgorithm and HashStrength properties of SslStream are obsolete. Use NegotiatedCipherSuite instead.' (https://aka.ms/dotnet-warnings/SYSLIB0058)

@adityamandaleeka, could someone from your team decide how to handle this?

@JamesNK
Copy link
Member

JamesNK commented Dec 11, 2024

Issue for the networking team to look into this more and double check the changes made here to unstuck the build are good:

#59426

@JamesNK JamesNK requested a review from a team as a code owner December 11, 2024 06:21
@@ -118,11 +118,17 @@ internal unsafe IISHttpContext(
public SslProtocols Protocol { get; private set; }
public TlsCipherSuite? NegotiatedCipherSuite { get; private set; }
public string SniHostName { get; private set; } = default!;
[Obsolete("Obsolete on SslStream.")]
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do we want to use the same DiagId on these obsoletions as the ones used on SslStream? That way we (and users) don't need to suppress both 618 and SYSLIB0058.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We don't use DiagId with obsolete attributes in ASP.NET Core: https://github.com/search?q=repo%3Adotnet%2Faspnetcore+%22%5BObsolete%22&type=code&p=1

I don't think so.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Has there ever been a case where we need to Obsolete our API because of an underlying Obsoletion in the runtime libraries?

It feels like this is just an extension of obsoleting the underlying SslStream enums, so it feels like we should use the same DiagId.

cc'ing some devs who might have opinions - @terrajobst @bartonjs @rzikm @wfurt @halter73

Copy link
Member

@terrajobst terrajobst Dec 12, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I agree with @eerhardt. There are two options to deal with obsoletions in underlying APIs:

  1. Suppression. If the obsoletion is in the implementation and we intend to shield the consumer by eventually moving off of the obsolete API, then suppression on our end is fine.
  2. Mark as obsolete. If the obsoletion is part of the API or conceptually tied to its semantics, then we should obsolete the higher level API.

For (2) it makes little sense to me to use a different diagnostic ID, because they are logically tied to the same obsoletion. If a customer suppresses one, I think they have reasonable expectation to suppress the other.

And generally speaking I believe we should virtually never obsolete without a diagnostic ID. The standard diagnostic for obsoletion applies way too broadly so we generally want to avoid cases where customers feel like should suppress all obsoletions.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ok, I added the diagnostic ID.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks, appreciate it!

@JamesNK
Copy link
Member

JamesNK commented Dec 12, 2024

/azp run

Copy link

Azure Pipelines successfully started running 3 pipeline(s).

Copy link
Member

@wfurt wfurt left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The SslStream change looks good to me.

@JamesNK JamesNK merged commit 3d6364b into main Dec 13, 2024
27 checks passed
@JamesNK JamesNK deleted the update-dotnet-sdk-10.0.100-alpha.1.24609.2 branch December 13, 2024 00:56
@dotnet-policy-service dotnet-policy-service bot added this to the 10.0-preview1 milestone Dec 13, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area-infrastructure Includes: MSBuild projects/targets, build scripts, CI, Installers and shared framework Type: Dependency Update 🔼
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants