Skip to content

Enable Strong Name Signing #416

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
anuj-modi opened this issue Apr 29, 2025 · 2 comments · May be fixed by #417
Open

Enable Strong Name Signing #416

anuj-modi opened this issue Apr 29, 2025 · 2 comments · May be fixed by #417

Comments

@anuj-modi
Copy link

Microsoft's Semantic Kernel framework has a capability to use Redis as a Vector store for AI applications. The Redis connector package is Strong name signed and thus requires all of its dependencies to also be strong name signed in order to load successfully. NRedisStack needs to enable Strong Name signing in order to support using htis package from .NET Framework applications.

The issue I opened with Semantic Kernel is here: microsoft/semantic-kernel#11807

@atakavci
Copy link
Collaborator

hi @anuj-modi , thank you for using NRedisStack and letting us hear about your case.

I noticed there have been other requests related to signing, but it seems it didn't make to the master branch anyway. I'll need to look into those requests further to understand all the details. It also appears there might be some confusion around package signing vs strong-naming the binary.

Having said that, it's clear that your request specifically concerns strong-naming the binary. There are a couple things to evaluate there too, especially with open-source projects as i read. 👉 https://github.com/dotnet/runtime/blob/main/docs/project/strong-name-signing.md

I ll dig in more and keep it updated here. For the time being we are busy with other tasks so i can not provide a clear timeline for it.

@anuj-modi anuj-modi linked a pull request Apr 30, 2025 that will close this issue
@anuj-modi
Copy link
Author

Hi @atakavci. Definitely appreciate you taking a look at this. I made a PR that adds the strong name signing. I understand there are more considerations on top of simply doing the signing, but hopefully this makes your job a little easier.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants