-
Notifications
You must be signed in to change notification settings - Fork 1.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Strong name signed version #1076
Comments
For MahApps.Metro we decided against strong naming, see StrongName signed assembly? Hey, it's 2017...:
|
@thoemmi It is possible for use to do either strong name signing by our self or use the Strong-Name Signer, but if we do that we need to distribute the signed version out to all our partner developers that are using the platform and in that case it's a question if we will violate the license terms to publish another version of hangfire that is strong name signed. We also need to put maintenance time to update that version with all changes from the this repo that not is needed if the orignal assembly is strong name signed or that the project automatic (conditions is proj-file) is building two different versions and distribute with every release. Strong-Name Signer is working great for package consumers but not for package authors. |
@thoemmi I don't find the article you linked very relevant. It's based on a lot of assumptions. I remember that the runtime can optimize some runtime check on the full framework when it's signed. And here is the best comment on the matter : aspnet/DataProtection#245 (comment) But besides that point, the current Hangfire.Redis.Pro references the unsigned version of StackExchange.Redis where the |
Hi All, Error: Tired this trick also(Did not solve): Milind |
Any news about this? There is no downside to sign, and it would help the use in other projects. I don't understand the deal, it's clear to me that it is better to sign |
Workaround: Nuget |
@achimismaili Unfortunately the workaround has issues in some cases |
@achimismaili did you read the above comments? As I pointed out in an early comment the self signed version is working great in solutions, but now when you deliver packages that someone else is using. |
I agree with you, @caioproiete & @Tasteful. Yes, this is not a solution, just a workaround for some scenarios. |
Any updates on this question? |
Working today with an ecommerce platfor and looking into if we can use Hangfire for scheduled jobs. The only problem that I see today is that we need to ship all our assemblies strong name signed and can't make a reference to Hangfire because of the lack of strong name signed assemblies.
From aspnet/DataProtection#245 (comment) that davidfowl write
Is there any possibility that atleast the "core" package (this repro) can be strong name signed?
I found the following issued about strong naming signing
Sign assemblies with strong names
was closed because of service stack not was signedConsider about ServiceStack.* dependencies
was removing service stack, in the descriptions it says that you want Hangfire to be signed.To sign or not to sign the assemblies
was closed with comment that you not believe that anybody need it, but a comment on that issue exists from user that needing strong named version.And if we check the thirdparty that are used and if the support strong naming for this repo
Dapper.StringNaming
that is a signed replacement and it looks like V2 will only be strong name signed Dapper v3 planning and discussion DapperLib/Dapper#688NCrontab.Signed
that is a signed replacementStackExchange.Redis.StrongName
that is a signed replacement and it looks like V2 will only be strong name signed StackExchange.Redis: Version 2.x Planning StackExchange/StackExchange.Redis#528Dependencies that is placing source into Hangfire is not relevant to be strong name signed
The text was updated successfully, but these errors were encountered: