Conversation
- use Directory.Build.props for common config - use Directory.Packages.props for dependencies - add package icon - enable source link, deterministic builds, etc - configure licence, package, etc in package file - add net481 as an explicit TFM (avoids some ns* package-hell scenarios) - use automatic versioning with pinned assembly version - configure build SDK
|
Build fail is because of git height / automatic version; investigating:
We might also have to tweak global.json; IMO we should change the CI server to build with (whatever it says there), and run with (chosen platform) - otherwise we need to limit the C# to the lowest version supported by SDKs in the CI suite. |
| "version": "1.0", | ||
| "assemblyVersion": "1.0.0.0", | ||
| "publicReleaseRefSpec": [ | ||
| "^refs/heads/main$", |
There was a problem hiding this comment.
consider changing the way versions handled for release pipeline here in nuget-release
There was a problem hiding this comment.
Yep, that would be good to resolve along with NBGV, which is the default/go-to automated versioning tool; however, that was complaining about git checkout - looks like somewhere we're using shallow clone (NBGV needs a bit more to calculate the version via commits), so: that's something we'd need to fix in parallel. I suggest we defer that for now, but yes: that would be a good thing to fix.
There was a problem hiding this comment.
basically: this version.json was "get that process started", but: a cog fell out, so that's slightly incomplete
|
ah, yes, that's the voodoo I was looking for; what's your preference:
|
|
As a side note: before we pat ourselves on the back about ticking all the boxes: IMO the big missing box at the moment is strong naming (#77), which is causing problems (#99, #416). Normally I'd be a bit "eek" about adding a strong-name, but IMO since it only went 1.0 in March, my vote goes for "YOLO, add the strong name, and rev the major to 2.0" - I'd love your input on that, @uglide @atakavci |
|
@mgravell |
whatever feels comfortable with you =) |
|
On strong name vs signing - you're right; I think one of the later comments
in the signing one was actually talking about strong naming (see the
public-key-token reference), and that misled me.
Actual signing is ... yeah, a massive nuisance. If Redis have the key
infrastructure to do so with suitable keys: fine. But I would suggest that
it doesn't actually solve a problem re supply-chain substitution attacks
unless SE.Redis and any other dependencies are *also* signed.
|
|
Sorry for the spam, but heads-up in case this PR might be a better place to add a couple properties I suggested via #434 . |
|
I was worried for a moment that I'd missed an obvious pre-existing PR, but
it looks like yours is a newer one, and that I've already got it covered.
If that understanding is correct, I think it is best we close the new one
as a dup of this, but: thanks: your input is appreciated and correct -
simply: I'm already cleaning up.
… Message ID: ***@***.***>
|
* fix build errors * use redis.io as the project url * enable API change tracking * upgrade packages and finish cleaning output * more cleanup * be explicit about langver * CI: install SDK 9 * Update action.yml * preserve compilation context * re-enable VSTest for net6/net7 * Enable netfx build anywhere * drop net6/net7 CI (they're EOL); add net9; net8 is preserved as LTS * dotnet format * don't ref NetTopologySuite unnecessarily
# Conflicts: # src/NRedisStack/Search/FieldName.cs # src/NRedisStack/Search/Schema.cs # src/NRedisStack/SerializedCommand.cs # tests/NRedisStack.Tests/AbstractNRedisStackTest.cs # tests/NRedisStack.Tests/Search/IndexCreationTests.cs


Uh oh!
There was an error while loading. Please reload this page.