Skip to content

Commit 82c6102

Browse files
Copilotwadepickett
andauthored
Apply unresolved review suggestions from What's New 11 P2 release notes (#36859)
* Initial plan * Apply What's New 11 P2 follow-up review suggestions from issue #36858 Co-authored-by: wadepickett <10985336+wadepickett@users.noreply.github.com> * Update release date for ASP.NET Core 11 --------- Co-authored-by: copilot-swe-agent[bot] <198982749+Copilot@users.noreply.github.com> Co-authored-by: wadepickett <10985336+wadepickett@users.noreply.github.com> Co-authored-by: Wade Pickett <wpickett@microsoft.com>
1 parent b295908 commit 82c6102

5 files changed

Lines changed: 8 additions & 8 deletions

File tree

aspnetcore/release-notes/aspnetcore-11.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: wadepickett
55
description: Learn about the new features in ASP.NET Core in .NET 11.
66
ms.author: wpickett
77
ms.custom: mvc
8-
ms.date: 12/04/2025
8+
ms.date: 03/10/2026
99
uid: aspnetcore-11
1010
---
1111
# What's new in ASP.NET Core in .NET 11
@@ -64,5 +64,5 @@ This section describes miscellaneous new features in .NET 11.
6464

6565
## Breaking changes
6666

67-
Use the articles in [Breaking changes in .NET]([/dotnet/core/compatibility/breaking-changes](https://learn.microsoft.com/dotnet/core/compatibility/breaking-changes)) to find breaking changes that might apply when upgrading an app to a newer version of .NET.
67+
Use the articles in [Breaking changes in .NET](/dotnet/core/compatibility/breaking-changes) to find breaking changes that might apply when upgrading an app to a newer version of .NET.
6868

aspnetcore/release-notes/aspnetcore-11/includes/infer-passkey-display-name-preview2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,4 +2,4 @@
22

33
ASP.NET Core Identity now automatically infers friendly display names for passkeys based on their AAGUID (Authenticator Attestation GUID). Built-in mappings are included for the most commonly used passkey authenticators, including Google Password Manager, iCloud Keychain, Windows Hello, 1Password, and Bitwarden.
44

5-
For known authenticators, the name is automatically assigned without prompting the user. For unknown authenticators, the user is redirected to a rename page. Developers can extend the mappings by adding entries to the `PasskeyAuthenticators.cs` dictionary in their project.
5+
For known authenticators, the name is automatically assigned without prompting the user. For unknown authenticators, the user is redirected to a rename page. Extend the mappings by adding entries to the `PasskeyAuthenticators` dictionary in the project.

aspnetcore/release-notes/aspnetcore-11/includes/native-otel-tracing-preview2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,6 @@ builder.Services.AddOpenTelemetry()
1111
.AddConsoleExporter());
1212
```
1313

14-
No additional instrumentation library (such as `OpenTelemetry.Instrumentation.AspNetCore`) is needed. The framework now directly populates semantic convention attributes like `http.request.method`, `url.path`, `http.response.status_code`, and `server.address` on the request activity.
14+
No additional instrumentation library (such as `OpenTelemetry.Instrumentation.AspNetCore`) is needed. The framework now directly populates semantic convention attributes on the request activity, such as `http.request.method`, `url.path`, `http.response.status_code`, and `server.address`.
1515

1616
If you don't want OpenTelemetry attributes added to the activity, you can turn it off by setting the `Microsoft.AspNetCore.Hosting.SuppressActivityOpenTelemetryData` AppContext switch to `true`.
Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
### OpenAPI 3.2.0 support (Breaking Change)
22

3-
`Microsoft.AspNetCore.OpenApi` now supports OpenAPI 3.2.0 through an updated dependency on `Microsoft.OpenApi` 3.3.1. This update includes breaking changes from the underlying librarysee the [Microsoft.OpenApi upgrade guide](https://github.com/microsoft/OpenAPI.NET/blob/main/docs/upgrade-guide-3.md) for details.
3+
`Microsoft.AspNetCore.OpenApi` now supports OpenAPI 3.2.0 through an updated dependency on `Microsoft.OpenApi` 3.3.1. This update includes breaking changes from the underlying library. For more information, see the [Microsoft.OpenApi upgrade guide](https://github.com/microsoft/OpenAPI.NET/blob/main/docs/upgrade-guide-3.md).
44

5-
To generate an OpenAPI 3.2.0 document, specify the version when calling `AddOpenApi()`:
5+
To generate an OpenAPI 3.2.0 document, specify the version when calling <xref:Microsoft.Extensions.DependencyInjection.OpenApiServiceCollectionExtensions.AddOpenApi%2A>:
66

77
```csharp
88
builder.Services.AddOpenApi(options =>
@@ -11,6 +11,6 @@ builder.Services.AddOpenApi(options =>
1111
});
1212
```
1313

14-
Subsequent updates will take advantage of new capabilities in the 3.2.0 specification, such as item schema support for streaming events.
14+
Subsequent updates take advantage of new capabilities in the 3.2.0 specification, such as item schema support for streaming events.
1515

1616
Thank you [@baywet](https://github.com/baywet) for this contribution!
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
### Performance improvements
22

3-
Kestrel's HTTP/1.1 request parser now uses a non-throwing code path for handling malformed requests. Instead of throwing `BadHttpRequestException` on every parse failure, the parser returns a result struct indicating success, incomplete, or error states. In scenarios with many malformed requests — such as port scanning, malicious traffic, or misconfigured clients — this eliminates expensive exception handling overhead and improves throughput by up to 20-40%. There's no impact on valid request processing.
3+
Kestrel's HTTP/1.1 request parser now uses a non-throwing code path for handling malformed requests. Instead of throwing <xref:Microsoft.AspNetCore.Http.BadHttpRequestException> on every parse failure, the parser returns a result struct indicating success, incomplete, or error states. In scenarios with many malformed requests — such as port scanning, malicious traffic, or misconfigured clients — this eliminates expensive exception handling overhead and improves throughput by up to 20-40%. There's no impact on valid request processing.
44

55
The HTTP logging middleware now pools its `ResponseBufferingStream` instances, reducing per-request allocations when response body logging or interceptors are enabled.

0 commit comments

Comments
 (0)