Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[release/6.0] Making user secrets optional by default #62917

Merged
merged 3 commits into from
Jan 6, 2022

Conversation

github-actions[bot]
Copy link
Contributor

@github-actions github-actions bot commented Dec 16, 2021

Backport of #62821 to release/6.0

/cc @maryamariyan

Customer Impact

Customer reported break from 5.0. Prior to 6.0, while using IConfigurationBuilder.AddUserSecrets the API was not flowing the optional flag. (assumed it was always optional even if it was set to false).
This bugfix has caused a regression for when the user relies on the default value of optional flag (currently false).

In this regression fix, we are making sure when the default value for optional flag is used, that the behavior stays the same as it did before prior 6.0. We do that by flipping optional flag from false to true as default.

Please not there would be a breaking change from 6.0 to 6.0.2, but behavior remains the same as what it was in 5.0 and earlier.

Link to original pr fix.
Link to new pr fix.

Testing

Available in pr #62821

Risk

Low risk, because it would start matching behavior from 5.0 and before.
But there would be a breaking change from 6.0 to 6.0.2, but behavior remains the same as what it was in 5.0 and earlier.

@ghost
Copy link

ghost commented Dec 16, 2021

Tagging subscribers to this area: @dotnet/area-extensions-configuration
See info in area-owners.md if you want to be subscribed.

Issue Details

Backport of #62821 to release/6.0

/cc @maryamariyan

Customer Impact

Testing

Risk

Author: github-actions[bot]
Assignees: -
Labels:

area-Extensions-Configuration

Milestone: -

@maryamariyan maryamariyan added the Servicing-consider Issue for next servicing release review label Dec 16, 2021
@eerhardt
Copy link
Member

eerhardt commented Jan 3, 2022

@maryamariyan - I think we need to add servicing changes here as well, so the Configuration.UserSecrets package gets built in the release branch.

See the docs and here is an example.

@ericstj ericstj added Servicing-approved Approved for servicing release and removed Servicing-consider Issue for next servicing release review labels Jan 4, 2022
@ericstj
Copy link
Member

ericstj commented Jan 4, 2022

This was previously approved over email on 12/20

@ericstj ericstj added this to the 6.0.x milestone Jan 4, 2022
@leecow leecow modified the milestones: 6.0.x, 6.0.2 Jan 4, 2022
@eerhardt
Copy link
Member

eerhardt commented Jan 5, 2022

runtime (Libraries Test Run release coreclr windows x64 Debug) failure is unrelated. #62068 and #58898

@ericstj @safern @carlossanlop - can someone merge this?

@ericstj
Copy link
Member

ericstj commented Jan 6, 2022

I do not have permission to merge release changes with failing CI. @danmoseley?

@eerhardt
Copy link
Member

eerhardt commented Jan 6, 2022

with failing CI

Is anyone actively looking into either fixing or disabling System.IO.Ports.Tests.OpenDevices.OpenDevices01? It has failed on every recent release/6.0 PR I've looked at.

@danmoseley danmoseley merged commit 25d2a1f into release/6.0 Jan 6, 2022
@danmoseley danmoseley deleted the backport/pr-62821-to-release/6.0 branch January 6, 2022 23:55
@danmoseley
Copy link
Member

I'll put up a PR to port my fix for OpenDevices01
0e4909a

@ghost ghost locked as resolved and limited conversation to collaborators Feb 6, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants