Skip to content

Conversation

@github-actions
Copy link
Contributor

@github-actions github-actions bot commented Nov 4, 2025

Backport of #12654 to release/13.0

Additional test coverage and some bug fixes for customizing certificate paths in containers

/cc @danegsta

Customer Impact

Testing

Risk

Regression?

@github-actions
Copy link
Contributor Author

github-actions bot commented Nov 4, 2025

🚀 Dogfood this PR with:

⚠️ WARNING: Do not do this without first carefully reviewing the code of this PR to satisfy yourself it is safe.

curl -fsSL https://raw.githubusercontent.com/dotnet/aspire/main/eng/scripts/get-aspire-cli-pr.sh | bash -s -- 12657

Or

  • Run remotely in PowerShell:
iex "& { $(irm https://raw.githubusercontent.com/dotnet/aspire/main/eng/scripts/get-aspire-cli-pr.ps1) } 12657"

[InlineData(true, false, false)]
[InlineData(true, true, true)]
public async Task VerifyContainerIncludesExpectedDevCertificateConfiguration(bool? implicitTrust, bool? explicitTrust, bool expectDevCert)
[InlineData(null, null, true, false, CertificateTrustScope.Append)]
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I hope you generated this. I would have used property data and a helper routine to generate all combinations.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This was very much some copilot generated test combos.

Comment on lines +2488 to +2490
var filename = Path.GetFileName(bp);
var dir = bp.Substring(0, bp.Length - filename.Length);
return (dir, filename);
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do we need to be more defensive here?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Only reason this would result in invalid directory or filename is if the user customized the paths and then it would be DCP that would actually return an error due to invalid create file arguments (missing filename or invalid path).

@joperezr joperezr added the Servicing-approved Approved for servicing release label Nov 4, 2025
@danegsta danegsta enabled auto-merge (squash) November 5, 2025 02:08
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants