-
Couldn't load subscription status.
- Fork 316
[7.0.0-preview2] Release Notes #3696
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
benrr101
merged 7 commits into
main
from
dev/russellben/release/7.0.0-preview2-releasenotes
Oct 17, 2025
Merged
Changes from all commits
Commits
Show all changes
7 commits
Select commit
Hold shift + click to select a range
b3f6016
Adding release notes for v7.0.0-preview2
benrr101 0d1d819
Updating with changes that got snuck in
benrr101 65913e7
PR comments
benrr101 0b8c902
more PR comments
benrr101 2349714
even more PR comments
benrr101 bd20766
yet and still, even more pr comments, can you believe it?
benrr101 31d2d9b
...
benrr101 File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,205 @@ | ||
| # Release Notes | ||
|
|
||
| ## Preview Release 7.0.0-preview2.25289.6 - 2025-10-16 | ||
|
|
||
| ## Changes Since [7.0.0-preview1](7.0.0-preview1.md) | ||
|
|
||
| This update brings the following changes since the [7.0.0-preview1](7.0.0-preview1.md) release: | ||
|
|
||
| ### Bug Fixes | ||
|
|
||
| - Fixed a debug assertion in connection pool (no impact to production code) | ||
| ([#3587](https://github.com/dotnet/SqlClient/pull/3587)) | ||
|
|
||
| - Prevent uninitialized performance counters escaping `CreatePerformanceCounters` | ||
| ([#3623](https://github.com/dotnet/SqlClient/pull/3623)) | ||
|
|
||
| - Fix SetProvider to return immediately if user-defined authentication provider found | ||
| ([#3620](https://github.com/dotnet/SqlClient/pull/3620)) | ||
|
|
||
| - Allow SqlBulkCopy to operate on hidden columns | ||
| ([#3590](https://github.com/dotnet/SqlClient/pull/3590)) | ||
|
|
||
| - Fix connection pool concurrency issue | ||
| ([#3632](https://github.com/dotnet/SqlClient/pull/3632)) | ||
|
|
||
| ### Added | ||
|
|
||
| #### App Context Switch for Ignoring Server-Provided Failover Partner | ||
|
|
||
| *What Changed:* | ||
|
|
||
| - A new app context switch `Switch.Microsoft.Data.SqlClient.IgnoreServerProvidedFailoverPartner` was introduced to let the client ignore server-provided failover partner info in Basic Availability Groups (BAGs). When the switch is enabled, only the failover partner specified in the connection string is used; server-supplied partner values are skipped. This context switch was introduced in PR [#3625](https://github.com/dotnet/SqlClient/pull/3625). | ||
|
|
||
| *Who Benefits:* | ||
|
|
||
| - Applications connecting to SQL Server BAGs using TCP and custom ports, especially where the server's provided partner name lacks the protocol, host, or port. This avoids connection failures when the server-provided partner is incompatible or incomplete. | ||
| - Teams who manage availability groups and rely on client-side control of failover behavior in heterogeneous networking environments. | ||
|
|
||
| *Impact:* | ||
|
|
||
| - If your environment might be affected (i.e., you operate a BAG with custom ports, or have experienced failures after failover), you can enable the new switch in your application: | ||
|
|
||
| ``` | ||
| AppContext.SetSwitch("Switch.Microsoft.Data.SqlClient.IgnoreServerProvidedFailoverPartner", true); | ||
| ``` | ||
|
|
||
| - Then, ensure your connection string includes your preferred failover partner (with correct `tcp:host,port`) so that the client uses that instead of the server's suggestion. | ||
| - Without enabling this, by default, the client continues to prefer the server-provided partner, maintaining backwards compatibility. | ||
|
|
||
|
|
||
| #### Other Additions | ||
|
|
||
| - Add app context switch for enabling asynchronous multi-packet improvements | ||
| ([#3605](https://github.com/dotnet/SqlClient/pull/3605)) | ||
|
|
||
|
|
||
| ### Changed | ||
|
|
||
| #### Deprecation of `SqlAuthenticationMethod.ActiveDirectoryPassword` | ||
|
|
||
| *What Changed:* | ||
|
|
||
| - Username/Password authentication for Microsoft Entra (formerly Active Directory) has been deprecated. `SqlAuthenticationMethod.ActiveDirectoryPassword` is now marked as `[Obsolete]`. This change occurred in PR [#3671](https://github.com/dotnet/SqlClient/pull/3671) | ||
|
|
||
| *Who benefits:* | ||
|
|
||
| - Teams moving toward stronger, passwordless or MFA-compliant auth (in line with changes across MSAL/Azure.Identity and Entra MFA enforcement). This aligns Microsoft.Data.SqlClient with Microsoft's direction to avoid username/password (ROPC) flows. See https://learn.microsoft.com/en-us/entra/identity/authentication/concept-mandatory-multifactor-authentication for more explanation of why this change is being made across Microsoft products/services. | ||
|
|
||
| *Impact:* | ||
|
|
||
| - If you use `Authentication=Active Directory Password`, migrate to a supported alternative: | ||
| - Interactive/MFA: `Active Directory Interactive` | ||
| - Service to service: `Active Directory Service Principal` (client secret/certificate) | ||
| - Cloud workloads: `Active Directory Managed Identity` or `Active Directory Workload Identity` | ||
| - Headless/Developer flows: `Active Directory Device Code Flow` or `Active Directory Default` | ||
| - See https://learn.microsoft.com/en-us/sql/connect/ado-net/sql/azure-active-directory-authentication for more information on authentication to SQL Server using Microsoft Entra. | ||
|
|
||
| #### Other changes | ||
|
|
||
| - Improve performance in `SqlStatistics` by using `Environment.TickCount` for calculating execution timing | ||
| ([#3609](https://github.com/dotnet/SqlClient/pull/3609)) | ||
|
|
||
| - Improve performance in Always Encrypted scenarios by using lower-allocation primitives | ||
| ([#3612](https://github.com/dotnet/SqlClient/pull/3612)) | ||
|
|
||
| - Various test improvements: | ||
| ([#3423](https://github.com/dotnet/SqlClient/pull/3423), | ||
| [#3488](https://github.com/dotnet/SqlClient/pull/3488), | ||
| [#3624](https://github.com/dotnet/SqlClient/pull/3624), | ||
| [#3638](https://github.com/dotnet/SqlClient/pull/3638), | ||
| [#3642](https://github.com/dotnet/SqlClient/pull/3642), | ||
| [#3678](https://github.com/dotnet/SqlClient/pull/3678), | ||
| [#3690](https://github.com/dotnet/SqlClient/pull/3690)) | ||
|
|
||
| - Codebase merge project and related cleanup: | ||
| ([#3555](https://github.com/dotnet/SqlClient/pull/3555), | ||
| [#3603](https://github.com/dotnet/SqlClient/pull/3603), | ||
| [#3608](https://github.com/dotnet/SqlClient/pull/3608), | ||
| [#3611](https://github.com/dotnet/SqlClient/pull/3611), | ||
| [#3619](https://github.com/dotnet/SqlClient/pull/3619), | ||
| [#3622](https://github.com/dotnet/SqlClient/pull/3622), | ||
| [#3630](https://github.com/dotnet/SqlClient/pull/3630), | ||
| [#3631](https://github.com/dotnet/SqlClient/pull/3631), | ||
| [#3634](https://github.com/dotnet/SqlClient/pull/3634), | ||
| [#3637](https://github.com/dotnet/SqlClient/pull/3637), | ||
| [#3644](https://github.com/dotnet/SqlClient/pull/3644), | ||
| [#3647](https://github.com/dotnet/SqlClient/pull/3647), | ||
| [#3655](https://github.com/dotnet/SqlClient/pull/3655)) | ||
|
|
||
| - Code health improvements: | ||
| ([#3645](https://github.com/dotnet/SqlClient/pull/3645)) | ||
|
|
||
| - Internal infrastructure improvements: | ||
| ([#3659](https://github.com/dotnet/SqlClient/pull/3659), | ||
| [#3692](https://github.com/dotnet/SqlClient/pull/3692), | ||
| [#3695](https://github.com/dotnet/SqlClient/pull/3695)) | ||
|
|
||
| - Updated Dependencies | ||
| ([#3638](https://github.com/dotnet/SqlClient/pull/3638)): | ||
| - Updated `Azure.Core` to v1.49.0 | ||
| - Updated `Azure.Identity` to v1.16.0 | ||
| - Updated `Azure.Security.KeyVault.Keys` v4.8.0 (AKV provider) | ||
| - Updated `Microsoft.Bcl.Cryptography` to v9.0.9 (net9) | ||
| - Updated `Microsoft.Extensions.Caching.Memory` to v9.0.9 (net9) | ||
| - Updated `Microsoft.IdentityModel.JsonWebTokens` to v8.14.0 | ||
| - Updated `Microsoft.IdentityModel.Protocols.OpenIdConnect` to v8.14.0 | ||
| - Updated `System.Buffers` to v4.6.1 (net462) | ||
| - Updated `System.Memory` to v4.6.3 (net462) | ||
| - Updated `System.Configuration.ConfigurationManager` to v9.0.9 (net9) | ||
| - Updated `System.Security.Cryptography.Pkcs` to v9.0.9 (net9) | ||
benrr101 marked this conversation as resolved.
Show resolved
Hide resolved
|
||
| - Updated `System.Text.Json` to v8.0.6 (net8), v9.0.9 (net9) | ||
benrr101 marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
|
||
| ## Contributors | ||
| We thank the following public contributors. Their efforts toward this project are very much appreciated. | ||
|
|
||
| - [edwardneal](https://github.com/edwardneal) | ||
| - [ShreyaLaxminarayan](https://github.com/ShreyaLaxminarayan) | ||
| - [Wraith2](https://github.com/Wraith2) | ||
|
|
||
| ## Target Platform Support | ||
|
|
||
| - .NET Framework 4.6.2+ (Windows x86, Windows x64, Windows ARM64) | ||
| - .NET 8.0+ (Windows x86, Windows x64, Windows ARM, Windows ARM64, Linux, macOS) | ||
|
|
||
| ### Dependencies | ||
|
|
||
| #### .NET Standard 2.0 | ||
|
|
||
| - Azure.Core 1.49.0 | ||
| - Azure.Identity 1.16.0 | ||
| - Microsoft.Bcl.Cryptography 9.0.9 | ||
| - Microsoft.Data.SqlClient.SNI.runtime 6.0.2 | ||
| - Microsoft.Extensions.Caching.Memory 9.0.9 | ||
| - Microsoft.IdentityModel.JsonWebTokens 8.14.0 | ||
| - Microsoft.IdentityModel.Protocols.OpenIdConnect 8.14.0 | ||
| - Microsoft.SqlServer.Server 1.0.0 | ||
| - System.Configuration.ConfigurationManager 9.0.9 | ||
| - System.Security.Cryptography.Pkcs 9.0.5 | ||
benrr101 marked this conversation as resolved.
Show resolved
Hide resolved
|
||
| - System.Text.Json 9.0.9 | ||
|
|
||
| #### .NET Framework 4.6.2+ | ||
|
|
||
| - Azure.Core 1.49.0 | ||
| - Azure.Identity 1.16.0 | ||
| - Microsoft.Bcl.Cryptography 8.0.0 | ||
| - Microsoft.Data.SqlClient.SNI 6.0.2 | ||
| - Microsoft.Extensions.Caching.Memory 8.0.1 | ||
| - Microsoft.IdentityModel.JsonWebTokens 8.14.0 | ||
| - Microsoft.IdentityModel.Protocols.OpenIdConnect 7.7.1 | ||
| - System.Buffers 4.6.1 | ||
| - System.Data.Common 4.3.0 | ||
| - System.Diagnostics.DiagnosticSource 8.0.1 | ||
| - System.Memory 4.6.3 | ||
| - System.Security.Cryptography.Pkcs 8.0.1 | ||
benrr101 marked this conversation as resolved.
Show resolved
Hide resolved
|
||
| - System.Text.Encodings.Web 8.0.0 | ||
| - System.Text.Json 8.0.6 | ||
| - System.ValueTuple 4.6.1 | ||
|
|
||
| #### .NET 8.0 | ||
|
|
||
| - Azure.Core 1.49.0 | ||
| - Azure.Identity 1.16.0 | ||
| - Microsoft.Bcl.Cryptography 9.0.9 | ||
| - Microsoft.Data.SqlClient.SNI.runtime 6.0.2 | ||
| - Microsoft.Extensions.Caching.Memory 9.0.9 | ||
| - Microsoft.IdentityModel.JsonWebTokens 8.14.0 | ||
| - Microsoft.IdentityModel.Protocols.OpenIdConnect 8.14.0 | ||
| - Microsoft.SqlServer.Server 1.0.0 | ||
| - System.Configuration.ConfigurationManager 9.0.9 | ||
| - System.Security.Cryptography.Pkcs 9.0.5 | ||
benrr101 marked this conversation as resolved.
Show resolved
Hide resolved
|
||
| - System.Text.Json 9.0.9 | ||
|
|
||
| #### .NET 9.0 | ||
|
|
||
| - Azure.Core 1.49.0 | ||
| - Azure.Identity 1.16.0 | ||
| - Microsoft.Bcl.Cryptography 9.0.9 | ||
| - Microsoft.Data.SqlClient.SNI.runtime 6.0.2 | ||
| - Microsoft.Extensions.Caching.Memory 9.0.9 | ||
| - Microsoft.IdentityModel.JsonWebTokens 8.14.0 | ||
| - Microsoft.IdentityModel.Protocols.OpenIdConnect 8.14.0 | ||
| - Microsoft.SqlServer.Server 1.0.0 | ||
| - System.Configuration.ConfigurationManager 9.0.9 | ||
| - System.Security.Cryptography.Pkcs 9.0.9 | ||
| - System.Text.Json 9.0.9 | ||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.