Skip to content

Commit 567206c

Browse files
committed
Cleanup and remove pivot
1 parent 133ec88 commit 567206c

File tree

3 files changed

+7
-23
lines changed

3 files changed

+7
-23
lines changed

articles/azure-app-configuration/feature-management-dotnet-reference.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,13 @@ title: .NET feature flag management
33
titleSuffix: Azure App Configuration
44
description: Learn to implement feature flags in your .NET and ASP.NET Core applications using feature management and Azure App Configuration. Dynamically manage feature rollouts, conduct A/B testing, and control feature visibility without redeploying the app.
55
services: azure-app-configuration
6-
author: zhiyuanliang-ms
7-
ms.author: zhiyuanliang
6+
author: rossgrambo
7+
ms.author: rossgrambo
88
ms.service: azure-app-configuration
99
ms.devlang: csharp
1010
ms.custom: devx-track-dotnet
1111
ms.topic: tutorial
12-
ms.date: 05/22/2024
13-
zone_pivot_groups: feature-management
12+
ms.date: 01/07/2024
1413
#Customer intent: I want to control feature availability in my app by using the Feature Management library.
1514
---
1615

articles/azure-app-configuration/howto-targetingfilter-aspnet-core.md

Lines changed: 4 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -138,9 +138,8 @@ In this section, you create a web application that allows users to sign in and u
138138
// ... ...
139139
```
140140
141-
> [!NOTE]
142-
> For Blazor applications, see [instructions](./faq.yml#how-to-enable-feature-management-in-blazor-applications-or-as-scoped-services-in--net-applications) for enabling feature management as scoped services.
143-
141+
---
142+
144143
1. Enable configuration and feature flag refresh from Azure App Configuration with the App Configuration middleware.
145144
146145
Update Program.cs withe the following code.
@@ -202,11 +201,11 @@ In this section, you create a web application that allows users to sign in and u
202201
203202
The targeting filter evaluates a user's feature state based on the user's targeting context, which comprises the user ID and the groups the user belongs to. In this example, you can use the signed-in user's email address as the user ID and the domain name of the email address as the group.
204203
205-
To get targeting context for users automatically (instead of manually constructing a targeting context each time), an implementation of `ITargetingContextAccessor` is required. There's two options for adding an `ITargetingContextAccessor` to your application:
204+
To get targeting context for users automatically (instead of manually constructing a targeting context each time), an implementation of [ITargetingContextAccessor](./feature-management-dotnet-reference.md#itargetingcontextaccessor) is required.
206205
207206
### Default Targeting Accessor
208207
209-
To add a default implementation of `ITargetingContextAccessor` use the `WithTargeting()` extension on the feature management builder as seen below. The default uses `HttpContext.User.Identity.Name` as `UserId` and uses `HttpContext.User.Claims` of type `Role` for `Groups`. You can see how the accessor works by looking at the [DefaultHttpTargetingContextAccessor](https://github.com/microsoft/FeatureManagement-Dotnet/blob/main/src/Microsoft.FeatureManagement.AspNetCore/DefaultHttpTargetingContextAccessor.cs).
208+
To add the default implementation of `ITargetingContextAccessor` use the `WithTargeting()` extension on the feature management builder as seen below. The default uses `HttpContext.User.Identity.Name` as `UserId` and uses `HttpContext.User.Claims` of type `Role` for `Groups`. You can see how the accessor works by looking at the [DefaultHttpTargetingContextAccessor](https://github.com/microsoft/FeatureManagement-Dotnet/blob/main/src/Microsoft.FeatureManagement.AspNetCore/DefaultHttpTargetingContextAccessor.cs).
210209
211210
``` C#
212211
// Existing code in Program.cs
@@ -241,11 +240,6 @@ builder.Services.AddFeatureManagement()
241240
242241
Now sign in as `[email protected]`, using the password you set when registering the account. The **Beta** item doesn't appear on the toolbar, because `[email protected]` is specified as an excluded user.
243242

244-
If you used the `ExampleTargetingContextAccessor`
245-
246-
* You can create more users with `@contoso.com` and `@contoso-xyz.com` email addresses to see the behavior of the group settings.
247-
* Users with `contoso-xyz.com` email addresses won't see the **Beta** item. While 50% of users with `@contoso.com` email addresses will see the **Beta** item, the other 50% won't see the **Beta** item.
248-
249243
## Next steps
250244

251245
To learn more about the feature filters, continue to the following documents.

articles/zone-pivot-groups.yml

Lines changed: 0 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1295,15 +1295,6 @@ groups:
12951295
title: .NET
12961296
- id: framework-spring
12971297
title: Spring Framework
1298-
# Owner: zhiyuanliang
1299-
- id: feature-management
1300-
title: Library version pivots
1301-
prompt: Choose a release
1302-
pivots:
1303-
- id: stable-version
1304-
title: Stable release
1305-
- id: preview-version
1306-
title: Preview release
13071298
# Owner: avanigupta
13081299
- id: appconfig-data-plane-api-version
13091300
title: API version pivots

0 commit comments

Comments
 (0)