Closed
Description
As a developer, I want my app to continue working after I apply security patches.
- Be on Magento v2.4.6-p7, with a working application.
- Upgrade to v2.4.6-p8 on release day because there are security vulnerabilities.
- Break existing user-facing workflows because semver doesn't matter and software is a meme.
- Wonder how this commit made it into a security release.
For reproduction:
- Run
placeOrder
on v2.4.6-p7 and expect an error graphql response. - Write code based on the behavior of v2.4.6-p7
- Upgrade to v2.4.6-p8
- Run
placeOrder
on v2.4.6-p7 and expect an error graphql response. - (BREAKING CHANGE) Get a "success" response with a
null
for data with a new "errors" key.
{
"data": {
"placeOrder": {
"order": null,
"__typename": "PlaceOrderOutput"
}
}
}
I'm getting painfully bored and tired of breaking applications because I try to have good security routines like applying security patches the day of release.
https://experienceleague.adobe.com/en/docs/commerce-operations/release/notes/security-patches/2-4-6-patches contains no mention of this BiC change.
If a change results in user programs breaking, it's a bug in the kernel. We never EVER blame the user programs. How hard can this be to understand?
Seriously. Do better.