-
Notifications
You must be signed in to change notification settings - Fork 1.2k
Remove SecurityCriticalDataForSet #7161
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove SecurityCriticalDataForSet #7161
Conversation
src/Microsoft.DotNet.Wpf/src/PresentationCore/MS/internal/AppModel/SiteOfOriginContainer.cs
Show resolved
Hide resolved
@dotnet/wpf-developers The tests still fail to start even though it works in #7164 (Opened a day later). Maybe it's because my PR is opened from a fork ? |
/azp run |
No pipelines are associated with this pull request. |
@dipeshmsft Could I get some info about what failed here ? |
@ThomasGoulet73, we were not able to investigate the failure yet. Will get back to you with some details. |
@ThomasGoulet73 we investigated the test failure and it turns out that our test relies on While we are inclined to fix our tests so they don't use reflection and we can directly access the value, however, we believe that there might be applications that may be using a similar pattern. And this change maybe a breaking change for applications upgrading to .NET 8. Thoughts ? |
@dipeshmsft I don't think changing internal members should be considered as a breaking change. In my opinion, third-party shouldn't expect internal implementation to not change because then any changes become breaking changes. Also, I took a look at the breaking change documentation for dotnet/runtime and it looks like this PR falls in Bucket 4 which means it is usually acceptable. I believe this change is still worth it but I'll let the team decide. |
ce9b92e
to
712b7f0
Compare
I rebased to fix the conflicts. |
712b7f0
to
79b2838
Compare
I rebased to fix the conflicts. |
79b2838
to
a7f5cd6
Compare
I rebased to fix the conflicts. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@pchaurasia14 Another one that we should get in.
These are CAS holdovers from .NET Framework that add unnecessary complexity. Uses more modern / safer syntax where I've modified code. I've also removed a few asserts where they then fall over on the next line anyway. Similar to and should follow dotnet#7161 and dotnet#6561
So happy this is getting in (and the other ones), but I'm gonna have a nice time resolving merge conflicts on most of my PRs, haha. |
Hey @ThomasGoulet73, can you go ahead and rebase to fix the conflicts. I have reviewed it, and we are going to merge it. I was trying to resolve it myself but it didn't work and now I got confused in all the branches that I have here. |
43be312
to
4363c30
Compare
4363c30
to
a1aa355
Compare
Thanks @ThomasGoulet73 for the quick turnaround on the rebase request. Once again, looking forward to other contributions from you. |
Thanks @dipeshmsft. |
These are CAS holdovers from .NET Framework that add unnecessary complexity. Uses more modern / safer syntax where I've modified code. I've also removed a few asserts where they then fall over on the next line anyway. Similar to and should follow dotnet#7161 and dotnet#6561
* Remove SecurityCriticalData/Class These are CAS holdovers from .NET Framework that add unnecessary complexity. Uses more modern / safer syntax where I've modified code. I've also removed a few asserts where they then fall over on the next line anyway. Similar to and should follow #7161 and #6561 * Address feedback
Description
Removes SecurityCriticalDataForSet which is unused since the removal of CAS attributes in #994.
Customer Impact
Should have tiny performance gain (Probably not measurable), it's mostly about removing useless code.
Regression
No.
Testing
Local build + CI + I tested a simple app.
Risk
Low.
Microsoft Reviewers: Open in CodeFlow