Highlights
- 69 discussions answered
Popular repositories
-
-
Forked from newlysoft/HttpClient
Fully managed HttpMessageHandler implementation based on sockets.
C# 2
1,702 contributions in the last year
Less
More
Activity overview
Contributed to
dotnet/aspnetcore,
microsoft/reverse-proxy,
dotnet/AspNetCore.Docs
and 5 other
repositories
Contribution activity
May 2021
Created 17 commits in 4 repositories
Created a pull request in microsoft/reverse-proxy that received 9 comments
Add json serialization tests
Fixes #352 By adding regression tests. After #995 (Encoding) and #994 (X509Certificate) were resolved the only types left in the config model that …
+193
−0
•
9
comments
Opened 9 other pull requests in 2 repositories
microsoft/reverse-proxy
1
open
6
merged
dotnet/aspnetcore
2
merged
Reviewed 51 pull requests in 6 repositories
dotnet/aspnetcore 26 pull requests
- Continue work for QueryCollection
- Add WebSocket compression support
- Turn on some CodeAnalysis rules
-
Update
///comments to help consumers of the API - Allow POST/PUT without Content-Length or chunked
-
Quarantine
Caching_SendFileWithFullContentLength_Cached() - Add support for customising the creation of Kestrel listen sockets
- Add IActivityFeature
- Update CODEOWNERS
- Update Startup.cs
- Update cert that became valid and broke tests
- Add CancellationSupport to ITIcketStore
- Add option to the JSON.NET output formatter
- Further simplify empty project template
- Increase KestrelServerLimits.KeepAliveTimeout to 130 seconds
- Make trailers safer in TestHost
- Sync shared code from runtime
- Improvements to IIS IO
- Unquarantine Settings_MaxConcurrentStreamsGet_Server
-
Quarantining
Server_SetConnectionLimitChangeAfterStarted_Success - [5.0] HTTP/2: Ignore additional RST_STREAM frames sent to stream
- [SignalR] Close connection on auth expiration
- Remove System.Security.Cryptography.Cng Dependency
- HTTP/2: Ignore additional RST_STREAM frames sent to stream
- Add Readme for Analyzers, ObjectPool and Identity
- Some pull request reviews not shown.
microsoft/reverse-proxy 21 pull requests
- Ingress controller docs
- Set default User-Agent for active health check requests
- Set default value to success for response headers and trailers transform
- Enable nullable on TelemetryConsumption
- Add json serialization tests
- Remove prohibited headers
- Include updating sample package references in release checklist
- Use StartsWith
- Cleanup after connection headers filtering change
- Filter out disallowed connection-related request headers
- Enable nullable on Yarp.ReverseProxy
- Session affinity cookies are configured per cluster
- Add net6.0 targets
- Empty values in QueryParameterTransform and headers *Remove transforms
- [Docs] Source code archival release step
- Update docs and samples
- Rename cluster sub options types to config
- Move to v3 publishing
- API renames: Clusters
- Consistently use #if NET
- ProxyAsync returns ProxyError
aspnet/AspNetKatana 1 pull request
dotnet/runtime 1 pull request
dotnet/AspNetCore.Docs 1 pull request
dotnet/designs 1 pull request
Created an issue in microsoft/reverse-proxy that received 15 comments
Affinity conflicts between clusters
The affinity flow looks like this: request -> route -> cluster -> check affinity -> load balance -> proxy request -> establish affinity to destinat…
15
comments

