Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

First Round of Trimming Analysis #2042

Merged
merged 1 commit into from Apr 14, 2023
Merged

Conversation

eerhardt
Copy link
Contributor

This enables trimming analysis on a subset of core assemblies:

  • Microsoft.IdentityModel.Abstractions
  • Microsoft.IdentityModel.Logging

It also enables trimming analysis for the JsonWebToken constructor. More scenarios will be analyzed in the future, as we enable more scenarios for trimming.

Contributes to #2035

See https://learn.microsoft.com/dotnet/core/deploying/trimming/prepare-libraries-for-trimming for more information on how to prepare libraries for trimming. Being "trim compatible" is the first step to being "NativeAOT compatible".

This addresses the first bullet in #2035.

cc @vitek-karas

@eerhardt
Copy link
Contributor Author

Ok, I have fixed all the test hangs now. The CI runs reliably. This is ready for review.

This enables trimming analysis on a subset of core assemblies:

* Microsoft.IdentityModel.Abstractions
* Microsoft.IdentityModel.Logging

It also enables trimming analysis for the JsonWebToken constructor. More scenarios will be analyzed in the future, as we enable more scenarios for trimming.

Contributes to #2035
@eerhardt eerhardt force-pushed the eerhardt/FirstRoundOfTrimming branch from fad1b0a to 0aac923 Compare April 14, 2023 00:39
@eerhardt
Copy link
Contributor Author

@brentschmaltz - I have squashed and rebased on the latest dev branch. Please take a look.

@brentschmaltz brentschmaltz merged commit e65930f into dev Apr 14, 2023
3 checks passed
@eerhardt eerhardt deleted the eerhardt/FirstRoundOfTrimming branch April 14, 2023 20:50
renovate bot added a commit to orso-co/Orso.Arpa.Api that referenced this pull request May 3, 2023
[![Mend
Renovate](https://app.renovatebot.com/images/banner.svg)](https://renovatebot.com)

This PR contains the following updates:

| Package | Type | Update | Change |
|---|---|---|---|
|
[System.IdentityModel.Tokens.Jwt](https://togithub.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet)
| nuget | minor | `6.29.0` -> `6.30.0` |

---

### Release Notes

<details>

<summary>AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet</summary>

###
[`v6.30.0`](https://togithub.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/releases/tag/6.30.0):
April release with new API and bug fixes (6.30.0)

[Compare
Source](https://togithub.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/compare/6.29.0...6.30.0)

Beginning in release
[6.28.0](https://togithub.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/releases/tag/6.28.0)
the library stopped throwing SecurityTokenUnableToValidateException.
This version (6.30.0) marks the exception type as obsolete to make this
change more discoverable. Not including it in the release notes
explicitly for 6.28.0 was a mistake. This exception type will be removed
completely in the next few months as the team moves towards a major
version bump. More information on how to replace the usage going forward
can be found here: https://aka.ms/SecurityTokenUnableToValidateException

Indicate that a SecurityTokenDescriptor can create JWS or JWE

[AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet#2055
Specify 'UTC' in log messages

AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet@ceb10b1
Fix order of log messages

AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet@05eeeb5

Fixed issues with matching Jwt.Kid with a X509SecurityKey.x5t

[AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet#2057

[AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet#2061

Marked Exception that is no longer used as obsolete

[AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet#2060

Added support for AesGcm on .NET 6.0 or higher

AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet@85fa86a

First round of triming analysis preperation for AOT

[AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet#2042

Added new API on TokenHandler.ValidateTokenAsync(SecurityToken ...)
implemented only on JsonWebTokenHandler.

[AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet#2056

</details>

---

### Configuration

📅 **Schedule**: Branch creation - "after 10pm every weekday,every
weekend,before 5am every weekday" in timezone Europe/Berlin, Automerge -
At any time (no schedule defined).

🚦 **Automerge**: Enabled.

♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the
rebase/retry checkbox.

🔕 **Ignore**: Close this PR and you won't be reminded about this update
again.

---

- [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check
this box

---

This PR has been generated by [Mend
Renovate](https://www.mend.io/free-developer-tools/renovate/). View
repository job log
[here](https://app.renovatebot.com/dashboard#github/orso-co/Orso.Arpa.Api).

<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiIzNS42My4xIiwidXBkYXRlZEluVmVyIjoiMzUuNjMuMSJ9-->

Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants