[5.2] Fix | Fix issue with Socket.Connect in managed SNI (#2777) #2779
Build #22801 had test failures
Details
- Failed: 5 (0.00%)
- Passed: 364,160 (98.22%)
- Other: 6,601 (1.78%)
- Total: 370,766
- 44977 of 61930 line covered (72.63%)
Annotations
Check failure on line 189 in build.proj
azure-pipelines / Release 5.2
build.proj#L189
build.proj(189,5): Error MSB3073: The command "dotnet test "src\Microsoft.Data.SqlClient\tests\ManualTests\Microsoft.Data.SqlClient.ManualTesting.Tests.csproj" -p:Configuration=Release -p:TargetnetcoreVersion=net6.0 --no-build -l "console;verbosity=normal" --collect "Code coverage" -p:TestSet=2 --results-directory TestResults -p:TestTargetOS=Windowsnetcoreapp --filter "category!=nonnetcoreapptests&category!=failing&category!=nonwindowstests" "--logger:trx;LogFilePrefix=Manual-Windowsnetcoreapp-2"" exited with code 1.
Check failure on line 2605 in Build log
azure-pipelines / Release 5.2
Build log #L2605
Process 'msbuild.exe' exited with code '1'.
azure-pipelines / Release 5.2
Microsoft.Data.SqlClient.ManualTesting.Tests.ConnectionExceptionTest.TestConnectionStateWithErrorClass20
Assert.Equal() Failure: Values differ
Expected: 11
Actual: 20
Raw output
at Microsoft.Data.SqlClient.ManualTesting.Tests.ConnectionExceptionTest.TestConnectionStateWithErrorClass20() in /_/src/Microsoft.Data.SqlClient/tests/ManualTests/SQL/ExceptionTest/ConnectionExceptionTest.cs:line 43
azure-pipelines / Release 5.2
Microsoft.Data.SqlClient.ManualTesting.Tests.CertificateTest.OpenningConnectionWithGoodCertificateTest
System.Exception : Could not generate certificate.Error out put: Certificate folder path is: C:\Certificates
Directory: C:\
Mode LastWriteTime Length Name
---- ------------- ------ ----
d----- 8/15/2024 9:58 PM Certificates
Certificate created successfully
Certificate Thumbprint: E650278FB26C1D7EC1D066D34315AC2E9EAB968F
Directory: C:\Certificates
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 8/15/2024 9:58 PM 855 SQLClientSelfSignedCertificate.cer
PSPath : Microsoft.PowerShell.Security\Certificate::LocalMachine\Root\E650278FB26C1D7EC1D066D34315AC2
E9EAB968F
PSParentPath : Microsoft.PowerShell.Security\Certificate::LocalMachine\Root
PSChildName : E650278FB26C1D7EC1D066D34315AC2E9EAB968F
PSIsContainer : False
Archived : False
Extensions : {System.Security.Cryptography.Oid, System.Security.Cryptography.Oid,
System.Security.Cryptography.Oid, System.Security.Cryptography.Oid}
FriendlyName :
IssuerName : System.Security.Cryptography.X509Certificates.X500DistinguishedName
NotAfter : 8/15/2027 9:58:26 PM
NotBefore : 8/15/2024 9:48:28 PM
HasPrivateKey : False
PrivateKey :
PublicKey : System.Security.Cryptography.X509Certificates.PublicKey
RawData : {48, 130, 3, 83...}
SerialNumber : 72444D56504C19B543B9531A1DEB2641
SubjectName : System.Security.Cryptography.X509Certificates.X500DistinguishedName
SignatureAlgorithm : System.Security.Cryptography.Oid
Thumbprint : E650278FB26C1D7EC1D066D34315AC2E9EAB968F
Version : 3
Handle : 2235234844560
Issuer : CN=768e5266c000000
Subject : CN=768e5266c000000
EnhancedKeyUsageList : {Server Authentication (1.3.6.1.5.5.7.3.1)}
DnsNameList : {768e5266c000000, localhost, SQLAliasName}
SendAsTrustedIssuer : False
EnrollmentPolicyEndPoint : Microsoft.CertificateServices.Commands.EnrollmentEndPointProperty
EnrollmentServerEndPoint : Microsoft.CertificateServices.Commands.EnrollmentEndPointProperty
PolicyId :
Raw output
at Microsoft.Data.SqlClient.ManualTesting.Tests.CertificateTest.CreateValidCertificate(String script) in /_/src/Microsoft.Data.SqlClient/tests/ManualTests/SQL/ConnectionTestWithSSLCert/CertificateTest.cs:line 233
at Microsoft.Data.SqlClient.ManualTesting.Tests.CertificateTest..ctor() in /_/src/Microsoft.Data.SqlClient/tests/ManualTests/SQL/ConnectionTestWithSSLCert/CertificateTest.cs:line 81
azure-pipelines / Release 5.2
Microsoft.Data.SqlClient.ManualTesting.Tests.CertificateTest.OpenningConnectionWithGoodCertificateTest
System.Exception : Could not generate certificate.Error out put: Certificate folder path is: C:\Certificates
Directory: C:\
Mode LastWriteTime Length Name
---- ------------- ------ ----
d----- 8/15/2024 9:57 PM Certificates
Certificate created successfully
Certificate Thumbprint: 32279D4631EEDE174B8FB6869604F3473FF5341F
Directory: C:\Certificates
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 8/15/2024 9:57 PM 855 SQLClientSelfSignedCertificate.cer
PSPath : Microsoft.PowerShell.Security\Certificate::LocalMachine\Root\32279D4631EEDE174B8FB6869604F34
73FF5341F
PSParentPath : Microsoft.PowerShell.Security\Certificate::LocalMachine\Root
PSChildName : 32279D4631EEDE174B8FB6869604F3473FF5341F
PSIsContainer : False
Archived : False
Extensions : {System.Security.Cryptography.Oid, System.Security.Cryptography.Oid,
System.Security.Cryptography.Oid, System.Security.Cryptography.Oid}
FriendlyName :
IssuerName : System.Security.Cryptography.X509Certificates.X500DistinguishedName
NotAfter : 8/15/2027 9:57:42 PM
NotBefore : 8/15/2024 9:47:44 PM
HasPrivateKey : False
PrivateKey :
PublicKey : System.Security.Cryptography.X509Certificates.PublicKey
RawData : {48, 130, 3, 83...}
SerialNumber : 1F931C45C9FD2DB546DA525667A14780
SubjectName : System.Security.Cryptography.X509Certificates.X500DistinguishedName
SignatureAlgorithm : System.Security.Cryptography.Oid
Thumbprint : 32279D4631EEDE174B8FB6869604F3473FF5341F
Version : 3
Handle : 3077026210464
Issuer : CN=afe83d26c000000
Subject : CN=afe83d26c000000
EnhancedKeyUsageList : {Server Authentication (1.3.6.1.5.5.7.3.1)}
DnsNameList : {afe83d26c000000, localhost, SQLAliasName}
SendAsTrustedIssuer : False
EnrollmentPolicyEndPoint : Microsoft.CertificateServices.Commands.EnrollmentEndPointProperty
EnrollmentServerEndPoint : Microsoft.CertificateServices.Commands.EnrollmentEndPointProperty
PolicyId :
Raw output
at Microsoft.Data.SqlClient.ManualTesting.Tests.CertificateTest.CreateValidCertificate(String script) in /_/src/Microsoft.Data.SqlClient/tests/ManualTests/SQL/ConnectionTestWithSSLCert/CertificateTest.cs:line 228
at Microsoft.Data.SqlClient.ManualTesting.Tests.CertificateTest..ctor() in /_/src/Microsoft.Data.SqlClient/tests/ManualTests/SQL/ConnectionTestWithSSLCert/CertificateTest.cs:line 80
at System.RuntimeType.CreateInstanceDefaultCtor(Boolean publicOnly, Boolean wrapExceptions)
azure-pipelines / Release 5.2
Microsoft.Data.SqlClient.ManualTesting.Tests.CertificateTest.OpenningConnectionWithGoodCertificateTest
System.Exception : Could not generate certificate.Error out put: Certificate folder path is: C:\Certificates
Directory: C:\
Mode LastWriteTime Length Name
---- ------------- ------ ----
d----- 8/15/2024 10:01 PM Certificates
Certificate created successfully
Certificate Thumbprint: B5D8F0AA860161BCD66B4995FB468B6740369B33
Directory: C:\Certificates
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 8/15/2024 10:01 PM 855 SQLClientSelfSignedCertificate.cer
PSPath : Microsoft.PowerShell.Security\Certificate::LocalMachine\Root\B5D8F0AA860161BCD66B4995FB468B6
740369B33
PSParentPath : Microsoft.PowerShell.Security\Certificate::LocalMachine\Root
PSChildName : B5D8F0AA860161BCD66B4995FB468B6740369B33
PSIsContainer : False
Archived : False
Extensions : {System.Security.Cryptography.Oid, System.Security.Cryptography.Oid,
System.Security.Cryptography.Oid, System.Security.Cryptography.Oid}
FriendlyName :
IssuerName : System.Security.Cryptography.X509Certificates.X500DistinguishedName
NotAfter : 8/15/2027 10:01:47 PM
NotBefore : 8/15/2024 9:51:49 PM
HasPrivateKey : False
PrivateKey :
PublicKey : System.Security.Cryptography.X509Certificates.PublicKey
RawData : {48, 130, 3, 83...}
SerialNumber : 533C0C62410D669844704F0D447640E1
SubjectName : System.Security.Cryptography.X509Certificates.X500DistinguishedName
SignatureAlgorithm : System.Security.Cryptography.Oid
Thumbprint : B5D8F0AA860161BCD66B4995FB468B6740369B33
Version : 3
Handle : 2406333314128
Issuer : CN=f0ea7065c000000
Subject : CN=f0ea7065c000000
EnhancedKeyUsageList : {Server Authentication (1.3.6.1.5.5.7.3.1)}
DnsNameList : {f0ea7065c000000, localhost, SQLAliasName}
SendAsTrustedIssuer : False
EnrollmentPolicyEndPoint : Microsoft.CertificateServices.Commands.EnrollmentEndPointProperty
EnrollmentServerEndPoint : Microsoft.CertificateServices.Commands.EnrollmentEndPointProperty
PolicyId :
Raw output
at Microsoft.Data.SqlClient.ManualTesting.Tests.CertificateTest.CreateValidCertificate(String script) in /_/src/Microsoft.Data.SqlClient/tests/ManualTests/SQL/ConnectionTestWithSSLCert/CertificateTest.cs:line 228
at Microsoft.Data.SqlClient.ManualTesting.Tests.CertificateTest..ctor() in /_/src/Microsoft.Data.SqlClient/tests/ManualTests/SQL/ConnectionTestWithSSLCert/CertificateTest.cs:line 80
at System.RuntimeType.CreateInstanceDefaultCtor(Boolean publicOnly, Boolean wrapExceptions)