DotNetVault 0.1.4.2-beta

Additional Details

Please use v. 0.1.5 and later

This is a prerelease version of DotNetVault.
There is a newer version of this package available.
See the version list below for details.
dotnet add package DotNetVault --version 0.1.4.2-beta
NuGet\Install-Package DotNetVault -Version 0.1.4.2-beta
This command is intended to be used within the Package Manager Console in Visual Studio, as it uses the NuGet module's version of Install-Package.
<PackageReference Include="DotNetVault" Version="0.1.4.2-beta" />
For projects that support PackageReference, copy this XML node into the project file to reference the package.
paket add DotNetVault --version 0.1.4.2-beta
#r "nuget: DotNetVault, 0.1.4.2-beta"
#r directive can be used in F# Interactive and Polyglot Notebooks. Copy this into the interactive tool or source code of the script to reference the package.
// Install DotNetVault as a Cake Addin
#addin nuget:?package=DotNetVault&version=0.1.4.2-beta&prerelease

// Install DotNetVault as a Cake Tool
#tool nuget:?package=DotNetVault&version=0.1.4.2-beta&prerelease

DotNetVault

Synchronization Library and Static Analysis Tool for C# 8

Advantages:

Deadlock avoidance: by default, all locks are timed. If the resource has already been obtained or you have accidentally changed the acquisition order of various locks somewhere in the code, you get a TimeoutException, allowing you to identify your mistake. In addition to being able to base termination of an acquisition attempt on timeout, you can also use a cancellation token to propagate the cancellation request.

RAII (Scope-based) Lock Acquisition and Release: Locks are stack-only objects (ref structs) and the integrated Roslyn analyzer forces you to declare the lock inline in a using statement or declaration, or it will cause a compilation error. There is no danger of accidentally holding the lock open longer than its scope even in the presence of an exception or early return.

Isolation of Protected Resources: The need for programmer discipline is reduced: 1. programmers do not need to remember which mutexes protect which resources, 2. programmers cannot access the protected resource before they obtain the lock and cannot access any mutable state from the protected resource after releasing the lock, 3. static analysis rules enforced by compilation errors emitted from the integrated Roslyn analyzer prevent references to mutable state from outside the protected resource from becoming part of the protected resource and prevent the leaking of references to mutable state inside the protected resource to the outside.

See Pdf for full description of this project.

RELEASE NOTES VERSION 0.1.4.2:

Added quick start guide pdf for Linux (project available on GitHub)

Upated quick start guide pdf for Windows (project available on GitHub)

RELEASE NOTES VERSION 0.1.4.1:

Added quick start guide pdf and project (project available on GitHub).

Updated readme.md

RELEASE NOTES VERSION 0.1.4.0:

Bug# 61 FIXED.  Double dispose is now practically impossible.  Analyzer now forbids out of line, pre-declaration of a variable that will be the subject of a using statement or declaration.  Analysis rules now prevent manual calls to Dispose method and additional method and analysis rules were added to account for the two use-cases where manual release of protected resource is necessary.  These rules make it difficult to accidentally use the new manual release method accidentally.

Bug# 62 FIXED.  Analysis now considers call of extension method using extension method syntax to be equivalent to a call thereto using static syntax.

Bug# 48 Fields in base classes were not being considered in vault safety analysis.  An otherwise fine sealed class could be considered vault safe despite fields in a base clase violating vault-safety rules.

Bug# 48 FIXED.  Analyzer now considers all fields from base classes when performing vault-safety analysis.  If a base class has field that, if present in sealed derived class being analyzed for vault-safety, would prevent the sealed derived class from being considered vault-safe, the sealed derived class will not be considered vault-safe.  A derived class, however, will not be considered not vault-safe MERELY because it inherits from a base class.  This change to the analyzer, does not, however, permit the base classes themselves to be used in a vault-safe context.

Laundry machine simulation can go significantly more quickly now.  With parameters of 1, 2, and 3 milliseconds and 200 laundry articles, the test completes on my pc in less than two minutes.  It no longer sleeps during task simulation if the timespan parameters entered are small enough that the sleeping will cause the tasks to take much longer than the parameters specified.  

A few convenience-based changes were made to the LaundryMachine simulation and the ConsoleStressTest.  Code in the ExampleCodePlayground, ConsoleStressTest and LaundryStessTest projects was updated to comply with new analysis rules as needed.

The console stress test now outputs whether the time stamps it gathers are based on a high precision timer or not.

Unit tests were added to the unit test project that validate the new analyis rules.

The pdf documentation was edited and updated based on the foregoing changes.

Xml Doc Comments for DotNetVault analyzer/library are now included in the NuGet package.
Product Compatible and additional computed target framework versions.
.NET net5.0 was computed.  net5.0-windows was computed.  net6.0 was computed.  net6.0-android was computed.  net6.0-ios was computed.  net6.0-maccatalyst was computed.  net6.0-macos was computed.  net6.0-tvos was computed.  net6.0-windows was computed.  net7.0 was computed.  net7.0-android was computed.  net7.0-ios was computed.  net7.0-maccatalyst was computed.  net7.0-macos was computed.  net7.0-tvos was computed.  net7.0-windows was computed.  net8.0 was computed.  net8.0-android was computed.  net8.0-browser was computed.  net8.0-ios was computed.  net8.0-maccatalyst was computed.  net8.0-macos was computed.  net8.0-tvos was computed.  net8.0-windows was computed. 
.NET Core netcoreapp2.0 was computed.  netcoreapp2.1 was computed.  netcoreapp2.2 was computed.  netcoreapp3.0 was computed.  netcoreapp3.1 was computed. 
.NET Standard netstandard2.0 is compatible.  netstandard2.1 was computed. 
.NET Framework net461 was computed.  net462 was computed.  net463 was computed.  net47 was computed.  net471 was computed.  net472 was computed.  net48 was computed.  net481 was computed. 
MonoAndroid monoandroid was computed. 
MonoMac monomac was computed. 
MonoTouch monotouch was computed. 
Tizen tizen40 was computed.  tizen60 was computed. 
Xamarin.iOS xamarinios was computed. 
Xamarin.Mac xamarinmac was computed. 
Xamarin.TVOS xamarintvos was computed. 
Xamarin.WatchOS xamarinwatchos was computed. 
Compatible target framework(s)
Included target framework(s) (in package)
Learn more about Target Frameworks and .NET Standard.

NuGet packages

This package is not used by any NuGet packages.

GitHub repositories

This package is not used by any popular GitHub repositories.

Version Downloads Last updated
1.0.0.1 478 10/30/2021
1.0.0 317 8/21/2021
0.2.5.18 315 8/13/2021
0.2.5.15-beta 246 8/8/2021
0.2.5.10-beta 202 8/5/2021
0.2.5.9 393 5/22/2021
0.2.5.8 355 12/14/2020
0.2.5.3 525 10/25/2020
0.2.5.1 429 10/14/2020
0.2.5 432 10/11/2020
0.2.2.12-beta 287 8/23/2020
0.2.2.1-beta 433 7/12/2020
0.2.1.22-beta 351 4/7/2020
0.2.1.9-alpha 444 3/15/2020
0.2.0.2-alpha 321 2/13/2020
0.1.5.4 528 2/17/2020
0.1.5.2 481 2/8/2020
0.1.5 477 2/2/2020
0.1.4.2-beta 566 2/1/2020
0.1.4.1-beta 538 1/26/2020
0.1.4-beta 492 1/21/2020
0.1.3.13-beta 517 1/11/2020
0.1.3.11-beta 562 1/8/2020
0.1.3.8-beta 655 1/4/2020
0.1.3.5-beta 555 1/1/2020

RELEASE NOTES VERSION 0.1.4.2:

   Added quick start guide pdf for Linux (project available on GitHub)

   Upated quick start guide pdf for Windows (project available on GitHub)

RELEASE NOTES VERSION 0.1.4.1:

Added quick start guide pdf and project (project available on GitHub).

Updated readme.md
 
RELEASE NOTES VERSION 0.1.4.0:
   
   Bug# 61 FIXED.  Double dispose is now practically impossible.  Analyzer now forbids out of line, pre-declaration of a variable that will be the subject of a using statement or declaration.  Analysis rules now prevent manual calls to Dispose method and additional method and analysis rules were added to account for the two use-cases where manual release of protected resource is necessary.  These rules make it difficult to accidentally use the new manual release method accidentally.

   Bug# 62 FIXED.  Analysis now considers call of extension method using extension method syntax to be equivalent to a call thereto using static syntax.

   Bug# 48 Fields in base classes were not being considered in vault safety analysis.  An otherwise fine sealed class could be considered vault safe despite fields in a base clase violating vault-safety rules.
   
   Bug# 48 FIXED.  Analyzer now considers all fields from base classes when performing vault-safety analysis.  If a base class has field that, if present in sealed derived class being analyzed for vault-safety, would prevent the sealed derived class from being considered vault-safe, the sealed derived class will not be considered vault-safe.  A derived class, however, will not be considered not vault-safe MERELY because it inherits from a base class.  This change to the analyzer, does not, however, permit the base classes themselves to be used in a vault-safe context.

   Laundry machine simulation can go significantly more quickly now.  With parameters of 1, 2, and 3 milliseconds and 200 laundry articles, the test completes on my pc in less than two minutes.  It no longer sleeps during task simulation if the timespan parameters entered are small enough that the sleeping will cause the tasks to take much longer than the parameters specified.  

   A few convenience-based changes were made to the LaundryMachine simulation and the ConsoleStressTest.  Code in the ExampleCodePlayground, ConsoleStressTest and LaundryStessTest projects was updated to comply with new analysis rules as needed.

   The console stress test now outputs whether the time stamps it gathers are based on a high precision timer or not.

   Unit tests were added to the unit test project that validate the new analyis rules.

   The pdf documentation was edited and updated based on the foregoing changes.

   Xml Doc Comments for DotNetVault analyzer/library are now included in the NuGet package.

RELEASE NOTES VERSION 0.1.3.13:

   Fixed two flaws in the ConsoleStressTest.  
   The default ordering comparer for stress test logic now considers ThreadId, then Action Number, then TimeStamp, then Text.

   It now takes linearithmic rather than quadratic time to process and validate the results of the Console Stress test.

   Added a table of know flaws and issues to the pdf documentation.  Code examples shown for these flaws now appear in the ExampleCodePlayground as well.