Add ASP.NET Core .NET 11 Preview 2 release notes include files#36856
Add ASP.NET Core .NET 11 Preview 2 release notes include files#36856wadepickett merged 10 commits intomainfrom
Conversation
Co-authored-by: wadepickett <10985336+wadepickett@users.noreply.github.com>
Co-authored-by: wadepickett <10985336+wadepickett@users.noreply.github.com>
Removed product pr links.
|
(Cancelled!) remove all links to source code PR's. For example, remove this: |
|
Sorry, just entered a prompt on the wrong item! Cancelling the prompt. |
|
@copilot, all the new include files should be at this path: All changes introduced in this PR are only to be on the AspNetCore.Doc repo. |
Co-authored-by: wadepickett <10985336+wadepickett@users.noreply.github.com>
... Confirmed — all four new include files ( |
|
@copilot, the new include files in this PR should be on the aspnetcore.docs repo not aspnetcore repo. So path names like this: This PR should only make changes or create new articles or includes in the AspNetCore.Docs repo. |
All four new include files are already in the |
Removed references to GitHub issues in the documentation for clarity.
|
@copilot , Remove all PR links like these: |
Co-authored-by: wadepickett <10985336+wadepickett@users.noreply.github.com>
Removed all 5 source code PR links from |
Date will be updated closer to when this is intended to go live.
|
|
||
| ASP.NET Core Identity now automatically infers friendly display names for passkeys based on their AAGUID (Authenticator Attestation GUID). Built-in mappings are included for the most commonly used passkey authenticators, including Google Password Manager, iCloud Keychain, Windows Hello, 1Password, and Bitwarden. | ||
|
|
||
| For known authenticators, the name is automatically assigned without prompting the user. For unknown authenticators, the user is redirected to a rename page. Developers can extend the mappings by adding entries to the `PasskeyAuthenticators.cs` dictionary in their project. |
There was a problem hiding this comment.
We need a link here to PasskeyAuthenticators.cs but that may have to happen in a different PR give time constraints, and I need to verify if it is specifically PasskeyAuthenticators.cs that includes a Preview 2 change so we know where to link.
|
|
||
| To collect the built-in tracing data, subscribe to the `Microsoft.AspNetCore` activity source in your OpenTelemetry configuration: | ||
|
|
||
| ```csharp |
There was a problem hiding this comment.
I think this requires the OpenTelemetry.Exporter.Console NuGet package, but this isn't mentioned. We may have to come back to this in a later PR to include the NuGet package link given time considerations.
|
@copilot, the new filemames need to be complete words. Change all file names that have |
Co-authored-by: wadepickett <10985336+wadepickett@users.noreply.github.com>
Renamed all four include files from |
tdykstra
left a comment
There was a problem hiding this comment.
Looks good, a couple of nits
Removed comment out for breaking changes link since 11 is available.
wadepickett
left a comment
There was a problem hiding this comment.
Approved. We have some items that have been noted to be addressed in a follow up PR such as two links that could be added for more info. Given time contraints they will be in a follow up PR rather than this one.
|
@guardrex, this PR doesn't touch Blazor related items to avoid any overlap of effort. But you might want to look it over. |
|
I'll go ahead and merge to main since we are short on time. A new PR can make corrections from there. |
|
This PR reflects the latest Release Notes build that was available at 10:30AM today at 3/10/26. Will check again for any updates on the Realease Notes that may warrent a PR update here again today. |
| .AddConsoleExporter()); | ||
| ``` | ||
|
|
||
| No additional instrumentation library (such as `OpenTelemetry.Instrumentation.AspNetCore`) is needed. The framework now directly populates semantic convention attributes like `http.request.method`, `url.path`, `http.response.status_code`, and `server.address` on the request activity. |
There was a problem hiding this comment.
Super NIT ...
| No additional instrumentation library (such as `OpenTelemetry.Instrumentation.AspNetCore`) is needed. The framework now directly populates semantic convention attributes like `http.request.method`, `url.path`, `http.response.status_code`, and `server.address` on the request activity. | |
| No additional instrumentation library (such as `OpenTelemetry.Instrumentation.AspNetCore`) is needed. The framework now directly populates semantic convention attributes on the request activity, such as `http.request.method`, `url.path`, `http.response.status_code`, and `server.address`. |
|
|
||
| ASP.NET Core Identity now automatically infers friendly display names for passkeys based on their AAGUID (Authenticator Attestation GUID). Built-in mappings are included for the most commonly used passkey authenticators, including Google Password Manager, iCloud Keychain, Windows Hello, 1Password, and Bitwarden. | ||
|
|
||
| For known authenticators, the name is automatically assigned without prompting the user. For unknown authenticators, the user is redirected to a rename page. Developers can extend the mappings by adding entries to the `PasskeyAuthenticators.cs` dictionary in their project. |
There was a problem hiding this comment.
Super NIT ...
| For known authenticators, the name is automatically assigned without prompting the user. For unknown authenticators, the user is redirected to a rename page. Developers can extend the mappings by adding entries to the `PasskeyAuthenticators.cs` dictionary in their project. | |
| For known authenticators, the name is automatically assigned without prompting the user. For unknown authenticators, the user is redirected to a rename page. Extend the mappings by adding entries to the `PasskeyAuthenticators` dictionary in the project. |
... and note that (without looking at the API), I took the file extension off of that API where referring to a dictionary that would take additional mappings.
| @@ -0,0 +1,16 @@ | |||
| ### OpenAPI 3.2.0 support (Breaking Change) | |||
|
|
|||
| `Microsoft.AspNetCore.OpenApi` now supports OpenAPI 3.2.0 through an updated dependency on `Microsoft.OpenApi` 3.3.1. This update includes breaking changes from the underlying library — see the [Microsoft.OpenApi upgrade guide](https://github.com/microsoft/OpenAPI.NET/blob/main/docs/upgrade-guide-3.md) for details. | |||
There was a problem hiding this comment.
| `Microsoft.AspNetCore.OpenApi` now supports OpenAPI 3.2.0 through an updated dependency on `Microsoft.OpenApi` 3.3.1. This update includes breaking changes from the underlying library — see the [Microsoft.OpenApi upgrade guide](https://github.com/microsoft/OpenAPI.NET/blob/main/docs/upgrade-guide-3.md) for details. | |
| `Microsoft.AspNetCore.OpenApi` now supports OpenAPI 3.2.0 through an updated dependency on `Microsoft.OpenApi` 3.3.1. This update includes breaking changes from the underlying library. For more information, see the [Microsoft.OpenApi upgrade guide](https://github.com/microsoft/OpenAPI.NET/blob/main/docs/upgrade-guide-3.md). |
|
|
||
| `Microsoft.AspNetCore.OpenApi` now supports OpenAPI 3.2.0 through an updated dependency on `Microsoft.OpenApi` 3.3.1. This update includes breaking changes from the underlying library — see the [Microsoft.OpenApi upgrade guide](https://github.com/microsoft/OpenAPI.NET/blob/main/docs/upgrade-guide-3.md) for details. | ||
|
|
||
| To generate an OpenAPI 3.2.0 document, specify the version when calling `AddOpenApi()`: |
There was a problem hiding this comment.
| To generate an OpenAPI 3.2.0 document, specify the version when calling `AddOpenApi()`: | |
| To generate an OpenAPI 3.2.0 document, specify the version when calling <xref:Microsoft.Extensions.DependencyInjection.OpenApiServiceCollectionExtensions.AddOpenApi%2A>: |
| }); | ||
| ``` | ||
|
|
||
| Subsequent updates will take advantage of new capabilities in the 3.2.0 specification, such as item schema support for streaming events. |
There was a problem hiding this comment.
| Subsequent updates will take advantage of new capabilities in the 3.2.0 specification, such as item schema support for streaming events. | |
| Subsequent updates take advantage of new capabilities in the 3.2.0 specification, such as item schema support for streaming events. |
| @@ -0,0 +1,5 @@ | |||
| ### Performance improvements | |||
|
|
|||
| Kestrel's HTTP/1.1 request parser now uses a non-throwing code path for handling malformed requests. Instead of throwing `BadHttpRequestException` on every parse failure, the parser returns a result struct indicating success, incomplete, or error states. In scenarios with many malformed requests — such as port scanning, malicious traffic, or misconfigured clients — this eliminates expensive exception handling overhead and improves throughput by up to 20-40%. There's no impact on valid request processing. | |||
There was a problem hiding this comment.
| Kestrel's HTTP/1.1 request parser now uses a non-throwing code path for handling malformed requests. Instead of throwing `BadHttpRequestException` on every parse failure, the parser returns a result struct indicating success, incomplete, or error states. In scenarios with many malformed requests — such as port scanning, malicious traffic, or misconfigured clients — this eliminates expensive exception handling overhead and improves throughput by up to 20-40%. There's no impact on valid request processing. | |
| Kestrel's HTTP/1.1 request parser now uses a non-throwing code path for handling malformed requests. Instead of throwing <xref:Microsoft.AspNetCore.Http.BadHttpRequestException> on every parse failure, the parser returns a result struct indicating success, incomplete, or error states. In scenarios with many malformed requests — such as port scanning, malicious traffic, or misconfigured clients — this eliminates expensive exception handling overhead and improves throughput by up to 20-40%. There's no impact on valid request processing. |
| ## Breaking changes | ||
|
|
||
| Use the articles in [Breaking changes in .NET](/dotnet/core/compatibility/breaking-changes) to find breaking changes that might apply when upgrading an app to a newer version of .NET. | ||
| Use the articles in [Breaking changes in .NET]([/dotnet/core/compatibility/breaking-changes](https://learn.microsoft.com/dotnet/core/compatibility/breaking-changes)) to find breaking changes that might apply when upgrading an app to a newer version of .NET. |
There was a problem hiding this comment.
| Use the articles in [Breaking changes in .NET]([/dotnet/core/compatibility/breaking-changes](https://learn.microsoft.com/dotnet/core/compatibility/breaking-changes)) to find breaking changes that might apply when upgrading an app to a newer version of .NET. | |
| Use the articles in [Breaking changes in .NET](/dotnet/core/compatibility/breaking-changes) to find breaking changes that might apply when upgrading an app to a newer version of .NET. |
|
Oh ... I see u merged before my review. No worries ... they're just NITs. ... well ... except for the last one ... it looks like a malformed link. |
I got you covered. Thanks for the review, I must have been merging at the same time and didn't see the refresh. I created a new issue and I am fixing per your suggestions in a new now. I ran out of time, sorry I missed it in this one. New tracking issue: |
[!INCLUDE]directivesaspnetcore/release-notes/aspnetcore-11/includes/dotnet/aspnetcore#64851) from include files-p2to-preview2suffix for complete wordsOriginal prompt
💬 We'd love your input! Share your thoughts on Copilot coding agent in our 2 minute survey.
Internal previews