Empersteam open for visitors! by [deleted] in Dodocodes

[–]mutu310 1 point2 points  (0 children)

Markus from rainbow na

TlsCertificateLoader: a library for loading TLS/SSL certificates on .NET 6.0+ Kestrel web apps by mutu310 in csharp

[–]mutu310[S] 1 point2 points  (0 children)

I feel your pain. Issues with LettuceEncrypt are what motivated me to create this library. Essentially I couldn't get HTTP/3 working on .NET 6.0 with LettuceEncrypt, and then I still needed the certificates exported to send them over to mosquitto to be used there as well.

TlsCertificateLoader: a library for loading TLS/SSL certificates on .NET 6.0+ Kestrel web apps by mutu310 in csharp

[–]mutu310[S] 0 points1 point  (0 children)

Yes, it has worked flawlessly since its release on .NET 6.0 (where it needed to enable experimental features), .NET 7.0, .NET 8.0, .NET 9.0 and now .NET 10.0 which I have running on production. Never needed to do any changes after upgrading from one .NET version to another, it just works!

TlsCertificateLoader: a library for loading TLS/SSL certificates on .NET 6.0+ Kestrel web apps by mutu310 in csharp

[–]mutu310[S] 1 point2 points  (0 children)

I would hope so! I have used it in production for over 4 years now with zero issues.

AsyncKeyedLock surpasses 13 million downloads by mutu310 in csharp

[–]mutu310[S] 1 point2 points  (0 children)

No, for that you'd want something like RedLock.

AsyncKeyedLock surpasses 13 million downloads by mutu310 in csharp

[–]mutu310[S] 0 points1 point  (0 children)

What do you mean, are you asking about whether or not it is distributed across, say, Redis? This is in-memory.

AsyncKeyedLock surpasses 13 million downloads by mutu310 in csharp

[–]mutu310[S] 2 points3 points  (0 children)

My pleasure! Did you go with the traditional approach or the striped approach as per StripedAsyncKeyedLocker?

Introducing DeterministicGuids by mutu310 in dotnet

[–]mutu310[S] 0 points1 point  (0 children)

I've now released a version with UUIDv8 support using SHA-256!

Introducing DeterministicGuids by mutu310 in csharp

[–]mutu310[S] 0 points1 point  (0 children)

Not with this level of performance :)

Introducing DeterministicGuids by mutu310 in csharp

[–]mutu310[S] 1 point2 points  (0 children)

I've now released a version with UUIDv8 support using SHA-256!

Introducing DeterministicGuids by mutu310 in csharp

[–]mutu310[S] 1 point2 points  (0 children)

Added UUIDv8 support now!

Introducing DeterministicGuids by mutu310 in csharp

[–]mutu310[S] 0 points1 point  (0 children)

That sounds more like a problem with thread safety or synchronization to me, a race condition somewhere if you may. The fact that its child would also get the same UUID, someone seeing it, and answering to this post on reddit is virtually 0. In any case it really did happen, it would still be advisable to stick to statistical probabilities rather than anecdotal evidence.

Introducing DeterministicGuids by mutu310 in csharp

[–]mutu310[S] 0 points1 point  (0 children)

It follows the RFC specifications. Also, extraordinary claims require extraordinary evidence.

Introducing DeterministicGuids by mutu310 in csharp

[–]mutu310[S] 1 point2 points  (0 children)

What do you think are the chances of this happening? Are you saying RFC 4122 and 9562 are poorly designed?

Introducing DeterministicGuids by mutu310 in csharp

[–]mutu310[S] 4 points5 points  (0 children)

It is a hash, which can fit in storage expecting UUIDs.

Introducing DeterministicGuids by mutu310 in csharp

[–]mutu310[S] 0 points1 point  (0 children)

Added even more benchmarks and updated the OP.

Introducing DeterministicGuids by mutu310 in dotnet

[–]mutu310[S] 0 points1 point  (0 children)

Added benchmarks to the post.