2019-03-29 01:14:25 +03:00
// Copyright (c) Microsoft. All rights reserved.
// Licensed under the MIT license. See LICENSE file in the project root for full license information.
config({
// No orphan projects are owned by this configuration.
projects: [],
// Packages that define the build extent.
modules: [
...globR(d`Public/Src`, "module.config.dsc"),
...globR(d`Public/Sdk/UnitTests`, "module.config.dsc"),
...globR(d`Private/Wdg`, "module.config.dsc"),
...globR(d`Private/QTest`, "module.config.dsc"),
...globR(d`Private/InternalSdk`, "module.config.dsc"),
...globR(d`Private/Tools`, "module.config.dsc"),
...globR(d`Public/Sdk/SelfHost`, "module.config.dsc"),
],
frontEnd: {
enabledPolicyRules: [
"NoTransformers",
]
},
resolvers: [
// These are the new cleaned up Sdk's
{
kind: "DScript",
modules: [
f`Public/Sdk/Public/Prelude/package.config.dsc`, // Prelude cannot be named module because it is a v1 module
f`Public/Sdk/Public/Transformers/package.config.dsc`, // Transformers cannot be renamed yet because office relies on the filename
...globR(d`Public/Sdk`, "module.config.dsc"),
]
},
{
2022-05-25 21:50:57 +03:00
// The credential provider should be set by defining the env variable NUGET_CREDENTIALPROVIDERS_PATH.
2019-03-29 01:14:25 +03:00
kind: "Nuget",
2024-07-12 01:41:32 +03:00
esrpSignConfiguration : Context.getCurrentHost().os === "win" && Environment.getFlag("ENABLE_ESRP") ? {
signToolPath: p`${Environment.expandEnvironmentVariablesInString(Environment.getStringValue("SIGN_TOOL_PATH"))}`,
signToolConfiguration: Environment.getPathValue("ESRP_SESSION_CONFIG"),
signToolEsrpPolicy: Environment.getPathValue("ESRP_POLICY_CONFIG"),
signToolAadAuth: p`${Context.getMount("SourceRoot").path}/Secrets/CodeSign/EsrpAuthentication.json`,
} : undefined,
2022-09-28 01:40:47 +03:00
2019-05-08 00:20:29 +03:00
repositories: importFile(f`config.microsoftInternal.dsc`).isMicrosoftInternal
2019-03-29 01:14:25 +03:00
? {
2021-07-15 00:21:37 +03:00
// If nuget resolver failed to download VisualCpp tool, then download it
// manually from "BuildXL.Selfhost" feed into some folder, and specify
// that folder as the value of "MyInternal" feed below.
// "MyInternal": "E:/BuildXLInternalRepos/NuGetInternal",
2022-06-03 20:23:46 +03:00
// CODESYNC: bxl.sh, Shared\Scripts\bxl.ps1
2019-04-19 04:23:11 +03:00
"BuildXL.Selfhost": "https://pkgs.dev.azure.com/cloudbuild/_packaging/BuildXL.Selfhost/nuget/v3/index.json",
2019-05-08 00:20:29 +03:00
// Note: From a compliance point of view it is important that MicrosoftInternal has a single feed.
// If you need to consume packages make sure they are upstreamed in that feed.
2019-03-29 01:14:25 +03:00
}
: {
2019-08-02 03:56:42 +03:00
"buildxl-selfhost" : "https://pkgs.dev.azure.com/ms/BuildXL/_packaging/BuildXL.Selfhost/nuget/v3/index.json",
2022-05-25 21:50:57 +03:00
"nuget.org" : "https://api.nuget.org/v3/index.json",
2021-11-02 01:14:46 +03:00
"dotnet-arcade" : "https://dotnetfeed.blob.core.windows.net/dotnet-core/index.json",
2019-05-08 00:20:29 +03:00
},
2019-03-29 01:14:25 +03:00
packages: [
2021-02-24 01:57:22 +03:00
{ id: "NLog", version: "4.7.7" },
2019-03-29 01:14:25 +03:00
{ id: "CLAP", version: "4.6" },
2019-12-13 04:03:27 +03:00
{ id: "CLAP-DotNetCore", version: "4.6" },
2019-03-29 01:14:25 +03:00
2023-07-07 20:09:17 +03:00
{ id: "RuntimeContracts", version: "0.5.0" }, // Be very careful with updating this version, because CloudBuild and other repository needs to be updated as will
2022-11-14 23:59:22 +03:00
{ id: "RuntimeContracts.Analyzer", version: "0.4.3" }, // The versions are different because the analyzer has higher version for now.
2019-03-29 01:14:25 +03:00
2021-01-12 01:56:55 +03:00
{ id: "Microsoft.NETFramework.ReferenceAssemblies.net472", version: "1.0.0" },
2019-03-29 01:14:25 +03:00
2024-02-08 01:11:01 +03:00
{ id: "System.Diagnostics.DiagnosticSource", version: "7.0.2" },
2019-03-29 01:14:25 +03:00
// Roslyn
2022-12-28 22:21:16 +03:00
// The old compiler used by integration tests only.
2021-11-23 02:50:50 +03:00
{ id: "Microsoft.Net.Compilers", version: "4.0.1" }, // Update Public/Src/Engine/UnitTests/Engine/Test.BuildXL.Engine.dsc if you change the version of Microsoft.Net.Compilers.
{ id: "Microsoft.NETCore.Compilers", version: "4.0.1" },
2022-12-28 22:21:16 +03:00
// The package with an actual csc.dll
Merged PR 762198: Update ErrorProne.NET to 0.6.1 and fix a bunch of perf and tracing issues
I've recently updated ErrorProne.NET and added a few rules there.
This PR does the following:
1. Updates ErrorProne.NET to 0.6.1
2. Updates the compiler toolchain to the latest version
3. Fixes the following warnings:
## Structs with default equality and hashcode are used in hashtables
This is problematic since the default methods causes boxing and the hash function is very weak. For instance, hash code for `KeyValuePair<int, int>(1, 1)` and (2,2) are the same.
```
Public\Src\FrontEnd\Core\Incrementality\FrontEndPublicFacadeAndAstProvider.cs(316,20): warning EPC25: The default 'ValueType.Equals' is used in Content.Equals(other.Content)
Public\Src\Utilities\PackedTable\StringTable.cs(128,30): warning EPC24: A struct 'BuildXL.Utilities.PackedTable.CharSpan' with a default Equals and GetHashCode implementation is used as a key in a hash table
Public\Src\Engine\Scheduler\Caching\HistoricMetadataCache.cs(1048,17): warning EPC24: A struct 'BuildXL.Scheduler.Cache.HistoricMetadataCache.Expirable<BuildXL.Scheduler.Cache.HistoricMetadataCache.PublishedEntry>' with a default Equals and GetHashCode implementation is used as a key in a hash table
Public\Src\Tools\Execution.Analyzer\Analyzers.Partner\GraphDiffAnalyzer.cs(391,26): warning EPC24: A struct 'System.Collections.Generic.KeyValuePair<string, (string, bool)>' with a default Equals and GetHashCode implementation is used as a key in a hash table
Public\Src\Tools\Execution.Analyzer\Analyzers.Partner\GraphDiffAnalyzer.cs(94,13): warning EPC24: A struct 'System.Collections.Generic.KeyValuePair<BuildXL.Pips.PipId, BuildXL.Pips.PipId>' with a default Equals and GetHashCode implementation is used as a key in a hash table
Public\Src\Tools\SymbolDaemon\SymbolDaemon.cs(559,13): warning EPC24: A struct 'BuildXL.Ipc.ExternalApi.SealedDirectoryFile' with a default Equals and GetHashCode implementation is used as a key in a hash table
```
## Linear Enumerable.Contains instead of hashset.contains
```
Public\Src\Utilities\UnitTests\TestUtilities.XUnit\XAssert.cs(272,69): warning EPC23: Linear search via Enumerable.Contains is used instead of an instance Contains method
Public\Src\Engine\UnitTests\Processes\SandboxedProcessTest.cs(1601,17): warning EPC23: Linear search via Enumerable.Contains is used instead of an instance Contains method
Public\Src\Engine\Processes\ProcessDumper.cs(230,21): warning EPC23: Linear search via Enumerable.Contains is used instead of an instance Contains method
```
And a bunch of cases when we were using default `ToString` impl which is not helpful.
2024-01-20 00:45:15 +03:00
{ id: "Microsoft.Net.Compilers.Toolset", version: "4.8.0" },
2021-11-23 02:50:50 +03:00
Merged PR 762198: Update ErrorProne.NET to 0.6.1 and fix a bunch of perf and tracing issues
I've recently updated ErrorProne.NET and added a few rules there.
This PR does the following:
1. Updates ErrorProne.NET to 0.6.1
2. Updates the compiler toolchain to the latest version
3. Fixes the following warnings:
## Structs with default equality and hashcode are used in hashtables
This is problematic since the default methods causes boxing and the hash function is very weak. For instance, hash code for `KeyValuePair<int, int>(1, 1)` and (2,2) are the same.
```
Public\Src\FrontEnd\Core\Incrementality\FrontEndPublicFacadeAndAstProvider.cs(316,20): warning EPC25: The default 'ValueType.Equals' is used in Content.Equals(other.Content)
Public\Src\Utilities\PackedTable\StringTable.cs(128,30): warning EPC24: A struct 'BuildXL.Utilities.PackedTable.CharSpan' with a default Equals and GetHashCode implementation is used as a key in a hash table
Public\Src\Engine\Scheduler\Caching\HistoricMetadataCache.cs(1048,17): warning EPC24: A struct 'BuildXL.Scheduler.Cache.HistoricMetadataCache.Expirable<BuildXL.Scheduler.Cache.HistoricMetadataCache.PublishedEntry>' with a default Equals and GetHashCode implementation is used as a key in a hash table
Public\Src\Tools\Execution.Analyzer\Analyzers.Partner\GraphDiffAnalyzer.cs(391,26): warning EPC24: A struct 'System.Collections.Generic.KeyValuePair<string, (string, bool)>' with a default Equals and GetHashCode implementation is used as a key in a hash table
Public\Src\Tools\Execution.Analyzer\Analyzers.Partner\GraphDiffAnalyzer.cs(94,13): warning EPC24: A struct 'System.Collections.Generic.KeyValuePair<BuildXL.Pips.PipId, BuildXL.Pips.PipId>' with a default Equals and GetHashCode implementation is used as a key in a hash table
Public\Src\Tools\SymbolDaemon\SymbolDaemon.cs(559,13): warning EPC24: A struct 'BuildXL.Ipc.ExternalApi.SealedDirectoryFile' with a default Equals and GetHashCode implementation is used as a key in a hash table
```
## Linear Enumerable.Contains instead of hashset.contains
```
Public\Src\Utilities\UnitTests\TestUtilities.XUnit\XAssert.cs(272,69): warning EPC23: Linear search via Enumerable.Contains is used instead of an instance Contains method
Public\Src\Engine\UnitTests\Processes\SandboxedProcessTest.cs(1601,17): warning EPC23: Linear search via Enumerable.Contains is used instead of an instance Contains method
Public\Src\Engine\Processes\ProcessDumper.cs(230,21): warning EPC23: Linear search via Enumerable.Contains is used instead of an instance Contains method
```
And a bunch of cases when we were using default `ToString` impl which is not helpful.
2024-01-20 00:45:15 +03:00
// These packages are used by log generators and because they're old
// we can't use the latest language features there.
2020-06-02 00:40:43 +03:00
{ id: "Microsoft.CodeAnalysis.Common", version: "3.5.0" },
{ id: "Microsoft.CodeAnalysis.CSharp", version: "3.5.0" },
2020-09-16 07:20:22 +03:00
{ id: "Microsoft.CodeAnalysis.VisualBasic", version: "3.5.0" },
2020-06-02 00:40:43 +03:00
{ id: "Microsoft.CodeAnalysis.Workspaces.Common", version: "3.5.0",
2019-03-29 01:14:25 +03:00
dependentPackageIdsToSkip: ["SQLitePCLRaw.bundle_green", "System.Composition"],
dependentPackageIdsToIgnore: ["SQLitePCLRaw.bundle_green", "System.Composition"],
},
2020-06-02 00:40:43 +03:00
{ id: "Microsoft.CodeAnalysis.CSharp.Workspaces", version: "3.5.0" },
2019-03-29 01:14:25 +03:00
2020-12-10 03:44:46 +03:00
// VBCSCompilerLogger needs the latest version (.net 5), but we haven't completed the migration to net 5 for
// the rest of the codebase yet
// Note: if any of the CodeAnalysis packages get upgraded, any new
// switch introduced in the compiler command line argument supported by
// the new version needs to be evaluated and incorporated into VBCSCompilerLogger.cs
{ id: "Microsoft.CodeAnalysis.Common", version: "3.8.0", alias: "Microsoft.CodeAnalysis.Common.ForVBCS"},
{ id: "Microsoft.CodeAnalysis.CSharp", version: "3.8.0", alias: "Microsoft.CodeAnalysis.CSharp.ForVBCS",
dependentPackageIdsToSkip: ["Microsoft.CodeAnalysis.Common"] },
{ id: "Microsoft.CodeAnalysis.VisualBasic", version: "3.8.0", alias: "Microsoft.CodeAnalysis.VisualBasic.ForVBCS",
dependentPackageIdsToSkip: ["Microsoft.CodeAnalysis.Common"]},
{ id: "Microsoft.CodeAnalysis.Workspaces.Common", version: "3.8.0", alias: "Microsoft.CodeAnalysis.Workspaces.Common.ForVBCS",
dependentPackageIdsToSkip: ["SQLitePCLRaw.bundle_green", "System.Composition"],
dependentPackageIdsToIgnore: ["SQLitePCLRaw.bundle_green", "System.Composition"],
},
{ id: "Microsoft.CodeAnalysis.CSharp.Workspaces", version: "3.8.0", alias: "Microsoft.CodeAnalysis.CSharp.Workspaces.ForVBCS" },
{ id: "Humanizer.Core", version: "2.2.0" },
2020-01-14 22:56:56 +03:00
// Old code analysis libraries, for tests only
{ id: "Microsoft.CodeAnalysis.Common", version: "2.10.0", alias: "Microsoft.CodeAnalysis.Common.Old" },
{ id: "Microsoft.CodeAnalysis.CSharp", version: "2.10.0", alias: "Microsoft.CodeAnalysis.CSharp.Old" },
2020-09-16 07:20:22 +03:00
{ id: "Microsoft.CodeAnalysis.VisualBasic", version: "2.10.0", alias: "Microsoft.CodeAnalysis.VisualBasic.Old" },
2020-01-14 22:56:56 +03:00
2019-03-29 01:14:25 +03:00
// Roslyn Analyzers
2021-11-12 00:46:35 +03:00
{ id: "Microsoft.CodeAnalysis.Analyzers", version: "3.3.1" },
2019-03-29 01:14:25 +03:00
{ id: "Microsoft.CodeAnalysis.FxCopAnalyzers", version: "2.6.3" },
{ id: "Microsoft.CodeQuality.Analyzers", version: "2.3.0-beta1" },
{ id: "Microsoft.NetFramework.Analyzers", version: "2.3.0-beta1" },
{ id: "Microsoft.NetCore.Analyzers", version: "2.3.0-beta1" },
2022-06-25 01:08:36 +03:00
{ id: "Microsoft.CodeAnalysis.NetAnalyzers", version: "5.0.3"},
2019-11-14 00:50:21 +03:00
2022-05-11 20:20:13 +03:00
{ id: "AsyncFixer", version: "1.6.0" },
Merged PR 762198: Update ErrorProne.NET to 0.6.1 and fix a bunch of perf and tracing issues
I've recently updated ErrorProne.NET and added a few rules there.
This PR does the following:
1. Updates ErrorProne.NET to 0.6.1
2. Updates the compiler toolchain to the latest version
3. Fixes the following warnings:
## Structs with default equality and hashcode are used in hashtables
This is problematic since the default methods causes boxing and the hash function is very weak. For instance, hash code for `KeyValuePair<int, int>(1, 1)` and (2,2) are the same.
```
Public\Src\FrontEnd\Core\Incrementality\FrontEndPublicFacadeAndAstProvider.cs(316,20): warning EPC25: The default 'ValueType.Equals' is used in Content.Equals(other.Content)
Public\Src\Utilities\PackedTable\StringTable.cs(128,30): warning EPC24: A struct 'BuildXL.Utilities.PackedTable.CharSpan' with a default Equals and GetHashCode implementation is used as a key in a hash table
Public\Src\Engine\Scheduler\Caching\HistoricMetadataCache.cs(1048,17): warning EPC24: A struct 'BuildXL.Scheduler.Cache.HistoricMetadataCache.Expirable<BuildXL.Scheduler.Cache.HistoricMetadataCache.PublishedEntry>' with a default Equals and GetHashCode implementation is used as a key in a hash table
Public\Src\Tools\Execution.Analyzer\Analyzers.Partner\GraphDiffAnalyzer.cs(391,26): warning EPC24: A struct 'System.Collections.Generic.KeyValuePair<string, (string, bool)>' with a default Equals and GetHashCode implementation is used as a key in a hash table
Public\Src\Tools\Execution.Analyzer\Analyzers.Partner\GraphDiffAnalyzer.cs(94,13): warning EPC24: A struct 'System.Collections.Generic.KeyValuePair<BuildXL.Pips.PipId, BuildXL.Pips.PipId>' with a default Equals and GetHashCode implementation is used as a key in a hash table
Public\Src\Tools\SymbolDaemon\SymbolDaemon.cs(559,13): warning EPC24: A struct 'BuildXL.Ipc.ExternalApi.SealedDirectoryFile' with a default Equals and GetHashCode implementation is used as a key in a hash table
```
## Linear Enumerable.Contains instead of hashset.contains
```
Public\Src\Utilities\UnitTests\TestUtilities.XUnit\XAssert.cs(272,69): warning EPC23: Linear search via Enumerable.Contains is used instead of an instance Contains method
Public\Src\Engine\UnitTests\Processes\SandboxedProcessTest.cs(1601,17): warning EPC23: Linear search via Enumerable.Contains is used instead of an instance Contains method
Public\Src\Engine\Processes\ProcessDumper.cs(230,21): warning EPC23: Linear search via Enumerable.Contains is used instead of an instance Contains method
```
And a bunch of cases when we were using default `ToString` impl which is not helpful.
2024-01-20 00:45:15 +03:00
{ id: "ErrorProne.NET.CoreAnalyzers", version: "0.6.1-beta.1" },
2021-06-22 01:19:32 +03:00
{ id: "protobuf-net.BuildTools", version: "3.0.101" },
2023-06-08 02:07:58 +03:00
{ id: "Microsoft.VisualStudio.Threading.Analyzers", version: "17.6.40"},
2019-03-29 01:14:25 +03:00
{ id: "Text.Analyzers", version: "2.3.0-beta1" },
Merged PR 742780: Add PublicAPI Analyzers to BXL and enforce the public API for hashing
This PR adds support for [PublicAPIAnalyzers](https://github.com/dotnet/roslyn-analyzers) - the analyzers developed by the Roslyn team and used by .NET Community to enforce the public surface stability of libraries.
The idea behind the analyzer is that during the build, the analyzer checks `PublicAPI.Shipped.txt` and `PublicAPI.Unshipped.txt` files for the content of the project's public surface. And if there are changes in the public surface in respect to those files, the analyzer would emit a warning.
The analyzers won't prevent you from making breaking changes, but those breaking changes would be intentional (plus some of them are not obvious at all, for instance, adding a default parameter is a runtime breaking change, even though this is not a compile time breaking change).
In order to enable the analyzer the two steps are required:
1. Add `usePublicApianalyzer: true` to a project spec
2. Add `publicApiFiles` to a project spec.
The last part is required since there are multiple strategies that can be used to force the API compatibility. For instance, the API surface might be different for different target frameworks, in this case a helper function `gbetFrameworkSpecificPublicApiFiles` can be used that will get different files depending on the target framework.
The analyzer also warn on some public API anti-patterns, like default arguments for methods with overloads or for default arguments in general.
This PR also enables such analysis for cache hashing project, since the stability of that project is very important in order to avoid runtime failures in BuilxXL, Arficats and CloudBuild.
Related work items: #2112018
2023-11-22 22:40:11 +03:00
{ id: "Microsoft.CodeAnalysis.PublicApiAnalyzers", version: "3.3.4" },
2019-03-29 01:14:25 +03:00
// MEF
{ id: "Microsoft.Composition", version: "1.0.30" },
{ id: "System.Composition.AttributedModel", version: "1.0.31" },
{ id: "System.Composition.Convention", version: "1.0.31" },
{ id: "System.Composition.Hosting", version: "1.0.31" },
{ id: "System.Composition.Runtime", version: "1.0.31" },
{ id: "System.Composition.TypedParts", version: "1.0.31" },
{ id: "Microsoft.Diagnostics.Tracing.EventSource.Redist", version: "1.1.28" },
2023-06-21 21:43:25 +03:00
{ id: "Microsoft.Diagnostics.Tracing.TraceEvent", version: "3.0.7" },
2019-03-29 01:14:25 +03:00
{ id: "Microsoft.Extensions.Globalization.CultureInfoCache", version: "1.0.0-rc1-final" },
{ id: "Microsoft.Extensions.MemoryPool", version: "1.0.0-rc1-final" },
2019-06-28 05:24:58 +03:00
{ id: "Microsoft.Extensions.PlatformAbstractions", version: "1.1.0" },
2024-02-08 01:11:01 +03:00
{ id: "Microsoft.Extensions.Http", version: "7.0.0" },
2019-03-29 01:14:25 +03:00
{ id: "Microsoft.Tpl.Dataflow", version: "4.5.24" },
{ id: "Microsoft.TypeScript.Compiler", version: "1.8" },
{ id: "Microsoft.WindowsAzure.ConfigurationManager", version: "1.8.0.0" },
2024-02-20 22:03:41 +03:00
{ id: "Newtonsoft.Json", version: "13.0.3" },
2019-03-29 01:14:25 +03:00
{ id: "Newtonsoft.Json.Bson", version: "1.0.1" },
2024-05-22 22:35:13 +03:00
{ id: "System.Reflection.Metadata", version: "7.0.0" },
2024-02-08 01:11:01 +03:00
// The VBCS logger is used by QuickBuild and runs in the context of old VS installations, so it cannot use a higher version
// Please do not upgrade this dll (or if you do, make sure this happens in coordination with the QuickBuild team)
{ id: "System.Reflection.Metadata", version: "5.0.0", alias: "System.Reflection.Metadata.ForVBCS" },
2024-05-22 22:35:13 +03:00
{ id: "System.Threading.Tasks.Dataflow", version: "7.0.0" },
2019-03-29 01:14:25 +03:00
// Nuget
2024-02-20 22:03:41 +03:00
{ id: "NuGet.Packaging", version: "6.9.1" },
{ id: "NuGet.Configuration", version: "6.9.1" },
{ id: "NuGet.Common", version: "6.9.1" },
{ id: "NuGet.Protocol", version: "6.9.1" },
{ id: "NuGet.Versioning", version: "6.9.1" },
{ id: "NuGet.CommandLine", version: "6.9.1" },
{ id: "NuGet.Frameworks", version: "6.9.1"}, // needed for qtest on .net core
2019-03-29 01:14:25 +03:00
2019-05-08 00:46:04 +03:00
// ProjFS (virtual file system)
2020-05-07 19:30:39 +03:00
{ id: "Microsoft.Windows.ProjFS", version: "1.2.19351.1" },
2019-05-08 00:46:04 +03:00
2019-03-29 01:14:25 +03:00
// RocksDb
2024-04-22 21:00:12 +03:00
{ id: "RocksDbSharp", version: "8.1.1-20240419.2", alias: "RocksDbSharpSigned" },
{ id: "RocksDbNative", version: "8.1.1-20240419.2" },
2020-09-22 19:02:00 +03:00
2019-04-27 02:35:29 +03:00
{ id: "JsonDiffPatch.Net", version: "2.1.0" },
2019-03-29 01:14:25 +03:00
// Event hubs
2023-05-19 22:03:11 +03:00
{ id: "Microsoft.Azure.Amqp", version: "2.6.1" },
{ id: "Azure.Core.Amqp", version: "1.3.0"},
2024-02-08 01:11:01 +03:00
{ id: "Azure.Messaging.EventHubs", version: "5.9.0" },
2019-03-29 01:14:25 +03:00
{ id: "Microsoft.Azure.KeyVault.Core", version: "1.0.0" },
2024-01-27 02:11:25 +03:00
{ id: "Microsoft.IdentityModel.Logging", version: "7.2.0" },
2024-02-08 01:11:01 +03:00
{ id: "Microsoft.IdentityModel.Tokens", version: "7.2.0" },
2024-01-27 02:11:25 +03:00
{ id: "System.IdentityModel.Tokens.Jwt", version: "7.2.0"},
2024-02-08 01:11:01 +03:00
{ id: "Microsoft.IdentityModel.JsonWebTokens", version: "7.2.0" },
2019-03-29 01:14:25 +03:00
2020-08-03 21:29:15 +03:00
// Key Vault
2023-08-30 21:55:54 +03:00
{ id: "Azure.Security.KeyVault.Secrets", version: "4.5.0" },
{ id: "Azure.Security.KeyVault.Certificates", version: "4.5.1" },
2024-04-16 01:18:01 +03:00
{ id: "Azure.Identity", version: "1.11.0" },
{ id: "Microsoft.Identity.Client", version: "4.60.1" },
2024-01-27 02:11:25 +03:00
{ id: "Microsoft.IdentityModel.Abstractions", version: "7.2.0" },
2024-04-16 01:18:01 +03:00
{ id: "Microsoft.Identity.Client.Extensions.Msal", version: "4.60.1" },
{ id: "Azure.Core", version: "1.38.0" },
2024-02-08 01:11:01 +03:00
{ id: "System.Memory.Data", version: "1.0.2" },
2024-04-16 01:18:01 +03:00
{ id: "System.ClientModel", version: "1.0.0" },
2020-08-03 21:29:15 +03:00
2023-09-07 00:29:48 +03:00
// Authentication
{ id: "Microsoft.Identity.Client.Broker", version: "4.55.0" },
{ id: "Microsoft.Identity.Client.NativeInterop", version: "0.13.8" },
2019-03-29 01:14:25 +03:00
// Package sets
...importFile(f`config.nuget.vssdk.dsc`).pkgs,
...importFile(f`config.nuget.aspNetCore.dsc`).pkgs,
2020-01-30 19:18:57 +03:00
...importFile(f`config.nuget.dotnetcore.dsc`).pkgs,
...importFile(f`config.nuget.grpc.dsc`).pkgs,
2019-03-29 01:14:25 +03:00
...importFile(f`config.microsoftInternal.dsc`).pkgs,
2022-08-05 23:23:16 +03:00
// Azure Blob Storage SDK V12
2024-02-08 01:11:01 +03:00
{ id: "Azure.Storage.Blobs", version: "12.16.0" },
2023-06-30 20:12:22 +03:00
{ id: "Azure.Storage.Common", version: "12.15.0" },
2024-02-08 01:11:01 +03:00
{ id: "System.IO.Hashing", version: "6.0.0" },
2022-08-05 23:23:16 +03:00
{ id: "Azure.Storage.Blobs.Batch", version: "12.10.0" },
2024-02-08 01:11:01 +03:00
{ id: "Azure.Storage.Blobs.ChangeFeed", version: "12.0.0-preview.34" },
2022-08-05 23:23:16 +03:00
2019-03-29 01:14:25 +03:00
// xUnit
2019-05-23 12:37:30 +03:00
{ id: "xunit.abstractions", version: "2.0.3" },
2023-10-27 23:41:18 +03:00
{ id: "xunit.assert", version: "2.5.3" },
{ id: "xunit.extensibility.core", version: "2.5.3" },
{ id: "xunit.extensibility.execution", version: "2.5.3" },
{ id: "xunit.runner.console", version: "2.5.3" },
{ id: "xunit.runner.visualstudio", version: "2.5.3" },
2023-10-31 05:11:25 +03:00
{ id: "xunit.runner.utility", version: "2.5.3" },
{ id: "xunit.runner.reporters", version: "2.5.3" },
{ id: "Microsoft.DotNet.XUnitConsoleRunner", version: "2.5.1-beta.19270.4" },
2020-01-16 02:42:07 +03:00
// microsoft test platform
{ id: "Microsoft.TestPlatform.TestHost", version: "16.4.0"},
{ id: "Microsoft.TestPlatform.ObjectModel", version: "16.4.0"},
{ id: "Microsoft.NET.Test.Sdk", version: "15.9.0" },
{ id: "Microsoft.CodeCoverage", version: "15.9.0" },
2019-03-29 01:14:25 +03:00
2020-05-08 19:46:14 +03:00
{ id: "System.Private.Uri", version: "4.3.2" },
2019-03-29 01:14:25 +03:00
// CloudStore dependencies
2020-03-24 21:40:18 +03:00
{ id: "DeduplicationSigned", version: "1.0.14" },
2019-03-29 01:14:25 +03:00
{ id: "Microsoft.Bcl", version: "1.1.10" },
{ id: "Microsoft.Bcl.Async", version: "1.0.168" },
2024-05-22 22:35:13 +03:00
{ id: "Microsoft.Bcl.AsyncInterfaces", version: "7.0.0" },
2019-03-29 01:14:25 +03:00
{ id: "Microsoft.Bcl.Build", version: "1.0.14" },
2021-02-25 21:37:23 +03:00
2024-02-08 01:11:01 +03:00
{ id: "Pipelines.Sockets.Unofficial", version: "2.2.0" },
2021-02-25 21:37:23 +03:00
{ id: "System.Diagnostics.PerformanceCounter", version: "5.0.0" },
2024-02-08 01:11:01 +03:00
{ id: "System.Threading.Channels", version: "7.0.0" },
2021-02-25 21:37:23 +03:00
2020-05-14 22:24:51 +03:00
{ id: "System.Linq.Async", version: "4.0.0"},
2020-11-11 23:07:23 +03:00
{ id: "Polly", version: "7.2.1" },
{ id: "Polly.Contrib.WaitAndRetry", version: "1.1.1" },
2021-12-06 22:11:17 +03:00
2022-01-26 04:33:06 +03:00
// Azurite node app compiled to standalone executable
// Sources for this package are: https://github.com/Azure/Azurite
// This packaged is produced by the pipeline: https://dev.azure.com/mseng/Domino/_build?definitionId=13199
2023-06-14 20:51:07 +03:00
{ id: "BuildXL.Azurite.Executables", version: "1.0.0-CI-20230614-171424" },
2022-01-26 04:33:06 +03:00
2019-03-29 01:14:25 +03:00
// Testing
2024-02-08 01:11:01 +03:00
{ id: "System.Security.Cryptography.ProtectedData", version: "7.0.0"},
{ id: "System.Configuration.ConfigurationManager", version: "7.0.0"},
{ id: "System.Diagnostics.EventLog", version: "7.0.0" },
{ id: "FluentAssertions", version: "5.3.0" },
2019-03-29 01:14:25 +03:00
{ id: "DotNet.Glob", version: "2.0.3" },
{ id: "Minimatch", version: "1.1.0.0" },
2022-12-09 00:24:45 +03:00
{ id: "Microsoft.ApplicationInsights", version: "2.21.0", dependentPackageIdsToIgnore: ["System.RunTime.InteropServices"] },
2019-03-29 01:14:25 +03:00
{ id: "Microsoft.ApplicationInsights.Agent.Intercept", version: "2.0.7" },
{ id: "Microsoft.ApplicationInsights.DependencyCollector", version: "2.3.0" },
{ id: "Microsoft.ApplicationInsights.PerfCounterCollector", version: "2.3.0" },
{ id: "Microsoft.ApplicationInsights.WindowsServer", version: "2.3.0" },
{ id: "Microsoft.ApplicationInsights.WindowsServer.TelemetryChannel", version: "2.3.0" },
2022-12-14 22:41:52 +03:00
{ id: "System.Security.Cryptography.Xml", version: "4.7.1" },
2024-05-22 22:35:13 +03:00
{ id: "System.Text.Encodings.Web", version: "7.0.0" },
2024-02-08 01:11:01 +03:00
{ id: "System.Security.Permissions", version: "7.0.0" },
{ id: "System.Windows.Extensions", version: "7.0.0" },
{ id: "System.Drawing.Common", version: "7.0.0" },
{ id: "Microsoft.Win32.SystemEvents", version: "7.0.0" },
{ id: "System.Security.Cryptography.Pkcs", version: "7.0.2" },
2019-03-29 01:14:25 +03:00
{ id: "ILRepack", version: "2.0.16" },
// VS language service
{ id: "System.Runtime.Analyzers", version: "1.0.1" },
{ id: "System.Runtime.InteropServices.Analyzers", version: "1.0.1" },
{ id: "System.Security.Cryptography.Hashing.Algorithms.Analyzers", version: "1.1.0" },
2021-11-03 19:39:52 +03:00
{ id: "Validation", version: "2.5.42"},
2019-03-29 01:14:25 +03:00
// VSTS managed API
2022-08-24 23:14:05 +03:00
{ id: "Microsoft.TeamFoundationServer.Client", version: "16.170.0"},
{ id: "Microsoft.TeamFoundation.DistributedTask.WebApi", version: "16.170.0",
2019-12-13 04:03:27 +03:00
dependentPackageIdsToSkip: ["*"] },
2022-08-24 23:14:05 +03:00
{ id: "Microsoft.TeamFoundation.DistributedTask.Common.Contracts", version: "16.170.0"},
2019-03-29 01:14:25 +03:00
// MSBuild. These should be used for compile references only, as at runtime one can only practically use MSBuilds from Visual Studio / dotnet CLI
2024-05-22 22:35:13 +03:00
{ id: "Microsoft.Build", version: "17.7.2" },
{ id: "Microsoft.Build.Runtime", version: "17.7.2" },
{ id: "Microsoft.Build.Tasks.Core", version: "17.7.2" },
{ id: "Microsoft.Build.Utilities.Core", version: "17.0.0" },
{ id: "Microsoft.Build.Framework", version: "17.7.2" },
{ id: "Microsoft.NET.StringTools", version: "1.0.0" },
2022-11-08 04:39:45 +03:00
{ id: "Microsoft.Build.Locator", version: "1.5.5" },
2024-05-22 22:35:13 +03:00
{ id: "System.Reflection.MetadataLoadContext", version: "7.0.0"},
2022-05-27 02:40:38 +03:00
2019-12-24 05:12:31 +03:00
{ id: "System.Resources.Extensions", version: "4.6.0-preview9.19411.4",
2019-12-13 04:03:27 +03:00
dependentPackageIdsToSkip: ["System.Memory"]},
2019-03-29 01:14:25 +03:00
2020-05-28 21:31:46 +03:00
// Buffers and Memory
2020-10-28 23:49:58 +03:00
{ id: "System.Buffers", version: "4.5.1" }, /* Change Sync: BuildXLSdk.cacheBindingRedirects() */ // A different version, because StackExchange.Redis uses it.
2024-02-08 01:11:01 +03:00
{ id: "System.Memory", version: "4.5.5" }, /* Change Sync: BuildXLSdk.cacheBindingRedirects() */
{ id: "System.Runtime.CompilerServices.Unsafe", version: "6.0.0" }, /* Change Sync: BuildXLSdk.cacheBindingRedirects() */
{ id: "System.IO.Pipelines", version: "7.0.0-rc.1.22426.10" },
2020-10-28 23:49:58 +03:00
{ id: "System.Numerics.Vectors", version: "4.5.0" }, /* Change Sync: BuildXLSdk.cacheBindingRedirects() */
2020-05-28 21:31:46 +03:00
2019-03-29 01:14:25 +03:00
// Extra dependencies to make MSBuild work
2024-02-08 01:11:01 +03:00
{ id: "Microsoft.VisualStudio.Setup.Configuration.Interop", version: "3.2.2146"},
2019-03-29 01:14:25 +03:00
{ id: "System.CodeDom", version: "4.4.0"},
2024-02-08 01:11:01 +03:00
{ id: "System.Text.Encoding.CodePages", version: "4.5.1" },
2020-06-11 00:00:39 +03:00
2019-06-06 00:16:36 +03:00
// Used for MSBuild input/output prediction
2019-07-12 22:11:35 +03:00
{ id: "Microsoft.Build.Prediction", version: "0.3.0" },
2019-03-29 01:14:25 +03:00
2022-02-02 03:51:10 +03:00
{ id: "SharpZipLib", version: "1.3.3" },
2019-03-29 01:14:25 +03:00
2022-09-27 22:21:43 +03:00
{ id: "ObjectLayoutInspector", version: "0.1.4" },
2019-03-29 01:14:25 +03:00
// Ninja JSON graph generation helper
2024-04-17 21:43:31 +03:00
{ id: "BuildXL.Tools.Ninjson", version: "1.11.6", osSkip: [ "macOS" ] },
2019-03-29 01:14:25 +03:00
{ id: "BuildXL.Tools.AppHostPatcher", version: "1.0.0" },
2019-05-07 18:22:42 +03:00
2020-07-08 04:30:28 +03:00
// Azure Communication
2023-01-06 22:14:57 +03:00
{ id: "Microsoft.Rest.ClientRuntime", version: "2.3.24",
2020-07-08 04:30:28 +03:00
dependentPackageIdsToSkip: ["Microsoft.NETCore.Runtime"],
dependentPackageIdsToIgnore: ["Microsoft.NETCore.Runtime"],
},
2023-01-06 22:14:57 +03:00
{ id: "Microsoft.Rest.ClientRuntime.Azure", version: "3.3.19" },
2019-08-17 01:33:37 +03:00
// ANTLR
2020-04-02 05:48:45 +03:00
{ id: "Antlr4.Runtime.Standard", version: "4.7.2" },
2021-03-16 10:29:35 +03:00
// For C++ testing
2021-11-12 04:52:08 +03:00
{ id: "boost", version: "1.71.0.0" },
// Needed for SBOM Generation
2024-02-29 21:03:00 +03:00
{ id: "Microsoft.Extensions.Logging.Abstractions", version: "8.0.0" },
2023-04-12 20:56:12 +03:00
{ id: "packageurl-dotnet", version: "1.1.0" },
2022-09-28 04:51:11 +03:00
{ id: "System.Reactive", version: "4.4.1" },
2024-03-05 21:42:25 +03:00
// CredScan
{ id: "Crc32.NET", version: "1.2.0" },
2022-09-28 04:51:11 +03:00
// Windows CoW on ReFS
2024-03-26 23:26:04 +03:00
{ id: "CopyOnWrite", version: "0.3.8" },
2023-10-04 23:58:54 +03:00
// Windows SDK
// CODESYNC: This version should be updated together with the version number in Public/Sdk/Experimental/Msvc/WindowsSdk/windowsSdk.dsc
{ id: "Microsoft.Windows.SDK.cpp", version: "10.0.22621.755", osSkip: [ "macOS", "unix" ] },
{ id: "Microsoft.Windows.SDK.CPP.x86", version: "10.0.22621.755", osSkip: [ "macOS", "unix" ] },
{ id: "Microsoft.Windows.SDK.CPP.x64", version: "10.0.22621.755", osSkip: [ "macOS", "unix" ] },
2019-03-29 01:14:25 +03:00
],
doNotEnforceDependencyVersions: true,
},
importFile(f`config.microsoftInternal.dsc`).resolver,
2021-11-19 00:47:42 +03:00
// .NET Runtimes.
{ kind: "SourceResolver", modules: [f`Public\Sdk\SelfHost\Libraries\Dotnet-Runtime-6-External\module.config.dsc`] },
2024-05-22 22:35:13 +03:00
{ kind: "SourceResolver", modules: [f`Public\Sdk\SelfHost\Libraries\Dotnet-Runtime-7-External\module.config.dsc`] },
2024-02-29 21:03:00 +03:00
{ kind: "SourceResolver", modules: [f`Public\Sdk\SelfHost\Libraries\Dotnet-Runtime-8-External\module.config.dsc`] },
2021-11-19 00:47:42 +03:00
2019-03-29 01:14:25 +03:00
{
kind: "Download",
2022-09-15 21:24:12 +03:00
2019-03-29 01:14:25 +03:00
downloads: [
2020-01-20 17:24:46 +03:00
// XNU kernel sources
{
moduleName: "Apple.Darwin.Xnu",
url: "https://github.com/apple/darwin-xnu/archive/xnu-4903.221.2.tar.gz",
hash: "VSO0:D6D26AEECA99240D2D833B6B8B811609B9A6E3516C0EE97A951B64F9AA4F90F400",
archiveType: "tgz",
},
2024-07-10 01:51:38 +03:00
// DotNet Core Runtime 8.0.7
2024-02-29 21:03:00 +03:00
{
moduleName: "DotNet-Runtime.win-x64.8.0",
2024-07-10 01:51:38 +03:00
url: "https://download.visualstudio.microsoft.com/download/pr/0f2e2c47-3e38-45be-aa3b-f382c5e73ff8/c7890b45dbd8306b4d89daa55abe49f6/dotnet-runtime-8.0.7-win-x64.zip",
hash: "VSO0:39A512EC2E0881BF1FF1239FDD21605AE7EEC2066720A999DC9CFC192E23DAF800",
2024-02-29 21:03:00 +03:00
archiveType: "zip",
},
{
moduleName: "DotNet-Runtime.osx-x64.8.0",
2024-07-10 01:51:38 +03:00
url: "https://download.visualstudio.microsoft.com/download/pr/c0e3a3f4-d235-4531-a1f2-1ff969cac1ab/837430d708532d74b7296108a681b9bb/dotnet-runtime-8.0.7-osx-x64.tar.gz",
hash: "VSO0:0C59652D14B25D9CCBAAB9F59EF9CB7286AC4D5FBB669D7DB8153E0CE56FA03D00",
2024-02-29 21:03:00 +03:00
archiveType: "tgz",
},
{
moduleName: "DotNet-Runtime.linux-x64.8.0",
2024-07-10 01:51:38 +03:00
url: "https://download.visualstudio.microsoft.com/download/pr/cf3418ca-0e14-4b76-b615-ac2f2497f8ec/2583028ea52460cb1534d929dc7970fe/dotnet-runtime-8.0.7-linux-x64.tar.gz",
hash: "VSO0:A739C69C2F8EEF5A32C1F623174AD58E968C2173855DEB0B2D1A0971D47A620000",
2024-02-29 21:03:00 +03:00
archiveType: "tgz",
},
2024-07-10 01:51:38 +03:00
// DotNet Core Runtime 7.0.20
2024-05-22 22:35:13 +03:00
{
moduleName: "DotNet-Runtime.win-x64.7.0",
2024-07-10 01:51:38 +03:00
url: "https://download.visualstudio.microsoft.com/download/pr/990ff1f7-b5df-4a80-a65e-7cff3a1a263c/f1a2f3cab0d1787618f7d8043e3a6827/dotnet-runtime-7.0.20-win-x64.zip",
hash: "VSO0:3BF65B86D8811BA2E65D53DED1EE0DF2BF49A195ED81F4A1324C9C06E8B14DAA00",
2024-05-22 22:35:13 +03:00
archiveType: "zip",
},
{
moduleName: "DotNet-Runtime.osx-x64.7.0",
2024-07-10 01:51:38 +03:00
url: "https://download.visualstudio.microsoft.com/download/pr/cbade9d9-be1e-46c0-9f90-13ba882965dc/31c86e8f4beaf0e5ad9ad35a408be7de/dotnet-runtime-7.0.20-osx-x64.tar.gz",
hash: "VSO0:B0D4908FCBC1E9AEF32E887E004B344E7034966BF10291CC8237A683B5FB986100",
2024-05-22 22:35:13 +03:00
archiveType: "tgz",
},
{
moduleName: "DotNet-Runtime.linux-x64.7.0",
2024-07-10 01:51:38 +03:00
url: "https://download.visualstudio.microsoft.com/download/pr/2c5981ff-0f0c-47ab-bff4-0ea4919b395b/cbfdfa7f35d133b0bdef87fa3830bfa0/dotnet-runtime-7.0.20-linux-x64.tar.gz",
hash: "VSO0:1ED0D63277280A7F9F26011CDF0A2040BE46787031BB0375D49547AD7833FF5800",
2024-05-22 22:35:13 +03:00
archiveType: "tgz",
},
2024-07-10 01:51:38 +03:00
// DotNet Core Runtime 6.0.32
2021-11-19 00:47:42 +03:00
{
2022-03-17 18:42:38 +03:00
moduleName: "DotNet-Runtime.win-x64.6.0.201",
2024-07-10 01:51:38 +03:00
url: "https://download.visualstudio.microsoft.com/download/pr/a36df873-9d55-4697-a598-01ccd758365f/1f82e260f2d18ee644768b07f2eee343/dotnet-runtime-6.0.32-win-x64.zip",
hash: "VSO0:04524FA5FDC3DF3FD7180D7062DF9208A7B9D0D31D93ECF534FD230FBAE93AB900",
2021-11-19 00:47:42 +03:00
archiveType: "zip",
},
{
2022-03-17 18:42:38 +03:00
moduleName: "DotNet-Runtime.osx-x64.6.0.201",
2024-07-10 01:51:38 +03:00
url: "https://download.visualstudio.microsoft.com/download/pr/7ff71c2f-9fc9-402a-b88b-e85510530744/4fe521036c2d271ed8247fd5b761af1d/dotnet-runtime-6.0.32-osx-x64.tar.gz",
hash: "VSO0:DDA8152F41FC13C9BEC671D4B7C3B23F6634F85DDF7DFCF001F4F6D12AD9435000",
2021-11-19 00:47:42 +03:00
archiveType: "tgz",
},
{
2022-03-17 18:42:38 +03:00
moduleName: "DotNet-Runtime.linux-x64.6.0.201",
2024-07-10 01:51:38 +03:00
url: "https://download.visualstudio.microsoft.com/download/pr/37d9269f-d651-4248-beae-ccfbf4dc34fc/17809ba306015df6406cf4338b5cc576/dotnet-runtime-6.0.32-linux-x64.tar.gz",
hash: "VSO0:B302F527FFF576C3ACA7DBD351EACBAF30EC8D836D289080D22B64EA4D34DAA100",
2021-11-19 00:47:42 +03:00
archiveType: "tgz",
},
2019-07-17 20:23:37 +03:00
// The following are needed for dotnet core MSBuild test deployments
{
moduleName: "DotNet-Runtime.win-x64.2.2.2",
2022-12-03 00:34:21 +03:00
url: "https://download.visualstudio.microsoft.com/download/pr/97b97652-4f74-4866-b708-2e9b41064459/7c722daf1a80a89aa8c3dec9103c24fc/dotnet-runtime-2.2.2-linux-x64.tar.gz",
hash: "VSO0:6E5172671364C65B06C9940468A62BAF70EE27392CB2CA8B2C8BFE058CCD088300",
archiveType: "tgz",
2019-07-17 20:23:37 +03:00
},
2019-03-29 01:14:25 +03:00
// NodeJs
{
moduleName: "NodeJs.win-x64",
2022-07-20 09:09:09 +03:00
url: "https://nodejs.org/dist/v18.6.0/node-v18.6.0-win-x64.zip",
hash: "VSO0:EA729EEA528055396523F3F5BD61EDD769C251EB7B4483AABFEB511333E60AA000",
2019-03-29 01:14:25 +03:00
archiveType: "zip",
},
{
moduleName: "NodeJs.osx-x64",
2022-07-20 09:09:09 +03:00
url: "https://nodejs.org/dist/v18.6.0/node-v18.6.0-darwin-x64.tar.gz",
hash: "VSO0:653B5954AD06BB6C9B7141853649602790FCB0031B81FDB82241333E2EE1350200",
2019-03-29 01:14:25 +03:00
archiveType: "tgz",
},
2020-04-21 21:21:00 +03:00
{
moduleName: "NodeJs.linux-x64",
2022-07-20 09:09:09 +03:00
url: "https://nodejs.org/dist/v18.6.0/node-v18.6.0-linux-x64.tar.gz",
hash: "VSO0:15A59CD4CC7C08A91FDF0C028F1C1129DC4B635749514739E1B2C6224E6420FB00",
2020-04-21 21:21:00 +03:00
archiveType: "tgz",
2022-07-20 09:09:09 +03:00
},
{
moduleName: "YarnTool",
extractedValueName: "yarnPackage",
url: 'https://registry.npmjs.org/yarn/-/yarn-1.22.19.tgz',
archiveType: "tgz"
},
Merged PR 748857: Add a cache miss analysis mode that uses latest git commit hashes as fingerprint store key candidates
BuildXL looks up cache miss data based on a priority list of keys configured by the user. In practice, the best general setup is to use a chain of git parent commits. This gets replicated in logic that invokes bxl.exe today for some of our customers. This PR provides this as a default experience without the end user needing to manually perform it.
The approach is heuristic, trying to pick candidate keys that might have been used to publish a fingerprint store for a build as "close" as the one running.
For this, the candidates are picked by
1. Get latest 5 commits from the current HEAD. We should get a match if this branch was built before, for example for a PR we expect one build per 'iteration'. Because an iteration can have multiple commits, we should not use a very small number (like, say, this commit and the one before), but let's not go overboard either (hence 5).
2. For any additional additional branches (indicated by the user in the argument), the assumption is that they run build against every commit (this should typically be the `main` branch, or the target branch for a PR).
a) We retrieve the merge-base from HEAD and that branch. We use as keys the hashes for the 3 commits immediately previous to the merge-base.
b) Finally, as a last resort, we use the latest 3 hashes from that branch as a last resort, assuming again that it was built recently
An example: for a PR (that has branched from `h5` and committed a number of times) merging against main, with this topology:
```
.--b5--b4--b3--b2--b1-- b0 [PR branch]
/
h8 -- h7 --h6--- h5 -- h4 -- h3 -- h2 -- h1 -- h0 [main]
```
The hashes for the keys would be (as described above)
1)`b0, b1, b2, b3, b4, b5`
2a) `h5, h6, h7`
2b) `h0, h1, h2`
Duplicates are removed, so something like this:
```
.--b1-- b0 [PR branch]
/
h8 -- h7 --h6--- h5 -- h1 -- h0 [main]
```
would result in the cadidates being `b0, b1, h5, h6, h7, h0, h1`.
Related work items: #2116194
2023-12-07 00:18:38 +03:00
{
moduleName: "MinGit.win-x64",
url: 'https://github.com/git-for-windows/git/releases/download/v2.43.0.windows.1/MinGit-2.43.0-64-bit.zip',
hash: 'VSO0:15D4663615814ADAE92F449B78A2668C515BD475DFDAC30384EFF84C8413546700',
archiveType: "zip"
}
2019-03-29 01:14:25 +03:00
],
},
],
qualifiers: {
defaultQualifier: {
configuration: "debug",
2024-03-22 01:06:06 +03:00
targetFramework: "net8.0",
2020-09-22 19:02:00 +03:00
targetRuntime:
2020-04-21 21:21:00 +03:00
Context.getCurrentHost().os === "win" ? "win-x64" :
Context.getCurrentHost().os === "macOS" ? "osx-x64" : "linux-x64",
2019-03-29 01:14:25 +03:00
},
namedQualifiers: {
Debug: {
configuration: "debug",
2024-03-22 01:06:06 +03:00
targetFramework: "net8.0",
2019-03-29 01:14:25 +03:00
targetRuntime: "win-x64",
},
DebugNet472: {
configuration: "debug",
targetFramework: "net472",
targetRuntime: "win-x64",
},
2024-02-29 21:03:00 +03:00
DebugNet8: {
configuration: "debug",
targetFramework: "net8.0",
targetRuntime: "win-x64",
},
2024-05-22 22:35:13 +03:00
DebugNet7: {
configuration: "debug",
targetFramework: "net7.0",
targetRuntime: "win-x64",
},
2021-11-19 00:47:42 +03:00
DebugDotNet6: {
configuration: "debug",
targetFramework: "net6.0",
targetRuntime: "win-x64",
},
2019-03-29 01:14:25 +03:00
DebugDotNetCoreMac: {
configuration: "debug",
2024-03-22 01:06:06 +03:00
targetFramework: "net8.0",
2019-03-29 01:14:25 +03:00
targetRuntime: "osx-x64",
},
2024-03-08 02:16:05 +03:00
DebugDotNetCoreMacNet8: {
configuration: "debug",
targetFramework: "net8.0",
targetRuntime: "osx-x64",
},
2020-03-06 23:04:14 +03:00
DebugLinux: {
configuration: "debug",
2024-03-22 01:06:06 +03:00
targetFramework: "net8.0",
2020-03-06 23:04:14 +03:00
targetRuntime: "linux-x64",
},
2024-02-29 21:03:00 +03:00
DebugLinuxNet8: {
configuration: "debug",
2024-03-08 02:16:05 +03:00
targetFramework: "net8.0",
2024-02-29 21:03:00 +03:00
targetRuntime: "linux-x64",
},
2019-03-29 01:14:25 +03:00
// Release
Release: {
configuration: "release",
2024-03-22 01:06:06 +03:00
targetFramework: "net8.0",
2019-03-29 01:14:25 +03:00
targetRuntime: "win-x64",
},
ReleaseNet472: {
configuration: "release",
targetFramework: "net472",
targetRuntime: "win-x64",
},
2024-02-29 21:03:00 +03:00
ReleaseNet8: {
configuration: "release",
targetFramework: "net8.0",
targetRuntime: "win-x64",
},
2024-05-22 22:35:13 +03:00
ReleaseNet7: {
configuration: "release",
targetFramework: "net7.0",
targetRuntime: "win-x64",
},
2021-11-19 00:47:42 +03:00
ReleaseDotNet6: {
configuration: "release",
targetFramework: "net6.0",
targetRuntime: "win-x64",
},
2019-03-29 01:14:25 +03:00
ReleaseDotNetCoreMac: {
configuration: "release",
2024-03-22 01:06:06 +03:00
targetFramework: "net8.0",
2019-03-29 01:14:25 +03:00
targetRuntime: "osx-x64",
},
2024-03-08 02:16:05 +03:00
ReleaseDotNetCoreMacNet8: {
configuration: "release",
targetFramework: "net8.0",
targetRuntime: "osx-x64",
},
2020-03-06 23:04:14 +03:00
ReleaseLinux: {
configuration: "release",
2024-03-22 01:06:06 +03:00
targetFramework: "net8.0",
2020-03-06 23:04:14 +03:00
targetRuntime: "linux-x64",
},
2024-02-29 21:03:00 +03:00
ReleaseLinuxNet8: {
configuration: "release",
targetFramework: "net8.0",
targetRuntime: "linux-x64",
},
2019-03-29 01:14:25 +03:00
}
},
mounts: [
2022-04-13 04:03:25 +03:00
...importFile(f`unix.mounts.dsc`).mounts,
2019-03-29 01:14:25 +03:00
{
name: a`DeploymentRoot`,
path: p`Out/Bin`,
trackSourceFileChanges: true,
isWritable: true,
isReadable: true,
2023-03-10 03:27:17 +03:00
isScrubbable: true,
2019-03-29 01:14:25 +03:00
},
2019-10-03 21:24:02 +03:00
{
name: a`CgNpmRoot`,
path: p`cg/npm`,
trackSourceFileChanges: true,
2019-10-22 01:29:05 +03:00
isWritable: false,
2019-10-03 21:24:02 +03:00
isReadable: true
},
2019-03-29 01:14:25 +03:00
{
// Special scrubbable mount with the content that can be cleaned up by running bxl.exe /scrub
name: a`ScrubbableDeployment`,
2022-12-14 20:47:48 +03:00
path: Context.getCurrentHost().os !== "macOS" ? p`Out/Objects/TempDeployment` : p`Out/Objects.noindex/TempDeployment`,
2019-03-29 01:14:25 +03:00
trackSourceFileChanges: true,
isWritable: true,
isReadable: true,
isScrubbable: true,
},
{
name: a`SdkRoot`,
path: p`Public/Sdk/Public`,
trackSourceFileChanges: true,
isWritable: false,
isReadable: true,
},
{
name: a`Example`,
path: p`Example`,
trackSourceFileChanges: true,
isWritable: false,
isReadable: true
},
{
name: a`Sandbox`,
path: p`Public/Src/Sandbox`,
trackSourceFileChanges: true,
isWritable: false,
isReadable: true
},
2024-06-12 20:11:11 +03:00
{
name: a`NodeJsForUnitTests`,
path: p`Out/NodeJsForUnitTests`,
trackSourceFileChanges: true,
isWritable: true,
isReadable: true,
isScrubbable: true,
},
2021-10-06 06:03:52 +03:00
...(Environment.getStringValue("BUILDXL_DROP_CONFIG") !== undefined ?
[
{
// Path used in CloudBuild for things like drop configuration files. These files should not be tracked.
name: a`CloudBuild`,
path: Environment.getPathValue("BUILDXL_DROP_CONFIG").parent,
trackSourceFileChanges: false,
isWritable: false,
isReadable: true
}
] : []),
2019-03-29 01:14:25 +03:00
{
name: a`ThirdParty_mono`,
path: p`third_party/mono@abad3612068e7333956106e7be02d9ce9e346f92`,
trackSourceFileChanges: true,
isWritable: false,
isReadable: true
2021-10-06 19:20:13 +03:00
},
2022-06-25 01:08:36 +03:00
...(Environment.hasVariable("TOOLPATH_GUARDIAN") ?
[
{
name: a`GuardianDrop`,
path: Environment.getPathValue("TOOLPATH_GUARDIAN").parent,
isReadable: true,
isWritable: true,
trackSourceFileChanges: true
}
2022-09-29 23:58:51 +03:00
] : []),
...(Environment.hasVariable("ESRP_POLICY_CONFIG") ?
[
{
name: a`EsrpPolicyConfig`,
path: Environment.getPathValue("ESRP_POLICY_CONFIG").parent,
isReadable: true,
isWritable: false,
trackSourceFileChanges: true
}
] : []),
...(Environment.hasVariable("ESRP_SESSION_CONFIG") ?
[
{
name: a`EsrpSessionConfig`,
path: Environment.getPathValue("ESRP_SESSION_CONFIG").parent,
isReadable: true,
isWritable: false,
trackSourceFileChanges: true
}
2022-06-25 01:08:36 +03:00
] : [])
2019-03-29 01:14:25 +03:00
],
searchPathEnumerationTools: [
r`cl.exe`,
r`lib.exe`,
r`link.exe`,
r`sn.exe`,
r`csc.exe`,
r`BuildXL.LogGen.exe`,
r`csc.exe`,
r`ccrefgen.exe`,
r`ccrewrite.exe`,
r`FxCopCmd.exe`,
r`NuGet.exe`
],
ide: {
// Let the /VS flag generate the projects in the source tree so that add/remove C# file works properly.
canWriteToSrc: true,
dotSettingsFile: f`Public/Sdk/SelfHost/BuildXL/BuildXL.sln.DotSettings`,
},
2020-07-03 00:35:00 +03:00
cacheableFileAccessAllowlist: Context.getCurrentHost().os !== "win" ? [] : [
2019-03-29 01:14:25 +03:00
// Allow the debugger to be able to be launched from BuildXL Builds
{
name: "JitDebugger",
toolPath: f`${Environment.getDirectoryValue("SystemRoot")}/system32/vsjitdebugger.exe`,
pathRegex: `.*${Environment.getStringValue("CommonProgramFiles").replace("\\", "\\\\")}\\\\Microsoft Shared\\\\VS7Debug\\\\.*`
},
2021-07-15 00:21:37 +03:00
// cl.exe may write temporary files under its working directory
{
name: "cl.exe",
toolPath: a`cl.exe`,
pathRegex: ".*.tmp"
}
2019-03-29 01:14:25 +03:00
]
2024-01-23 01:53:40 +03:00
});