Skip to content

Conversation

@dependabot
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Dec 22, 2025

Updated Aspire.Hosting from 13.0.0 to 13.1.0.

Release notes

Sourced from Aspire.Hosting's releases.

13.1.0

We are excited to share that our 13.1.0 release of Aspire has shipped! All of the packages are available in NuGet.org now. Head over to https://aspire.dev/whats-new/aspire-13-1/ to find what's new in 13.1.0!

What's Changed

13.0.2

This patch is updating our Project Templates for our Python starter app to ensure we depend on the latest version of React. This is out of an abundance of caution, as we don't depend on any of the react packages that were flagged as vulnerable in GHSA-fv66-9v8q-g76r.

What's Changed

Full Changelog: dotnet/aspire@v13.0.1...v13.0.2

13.0.1

What's Changed

Full Changelog: dotnet/aspire@v13.0.0...v13.0.1

Commits viewable in compare view.

Updated Aspire.Hosting.PostgreSQL from 13.0.0 to 13.1.0.

Release notes

Sourced from Aspire.Hosting.PostgreSQL's releases.

13.1.0

We are excited to share that our 13.1.0 release of Aspire has shipped! All of the packages are available in NuGet.org now. Head over to https://aspire.dev/whats-new/aspire-13-1/ to find what's new in 13.1.0!

What's Changed

13.0.2

This patch is updating our Project Templates for our Python starter app to ensure we depend on the latest version of React. This is out of an abundance of caution, as we don't depend on any of the react packages that were flagged as vulnerable in GHSA-fv66-9v8q-g76r.

What's Changed

Full Changelog: dotnet/aspire@v13.0.1...v13.0.2

13.0.1

What's Changed

Full Changelog: dotnet/aspire@v13.0.0...v13.0.1

Commits viewable in compare view.

Updated Aspire.Hosting.Redis from 13.0.0 to 13.1.0.

Release notes

Sourced from Aspire.Hosting.Redis's releases.

13.1.0

We are excited to share that our 13.1.0 release of Aspire has shipped! All of the packages are available in NuGet.org now. Head over to https://aspire.dev/whats-new/aspire-13-1/ to find what's new in 13.1.0!

What's Changed

13.0.2

This patch is updating our Project Templates for our Python starter app to ensure we depend on the latest version of React. This is out of an abundance of caution, as we don't depend on any of the react packages that were flagged as vulnerable in GHSA-fv66-9v8q-g76r.

What's Changed

Full Changelog: dotnet/aspire@v13.0.1...v13.0.2

13.0.1

What's Changed

Full Changelog: dotnet/aspire@v13.0.0...v13.0.1

Commits viewable in compare view.

Updated Aspire.Npgsql from 13.0.0 to 13.1.0.

Release notes

Sourced from Aspire.Npgsql's releases.

13.1.0

We are excited to share that our 13.1.0 release of Aspire has shipped! All of the packages are available in NuGet.org now. Head over to https://aspire.dev/whats-new/aspire-13-1/ to find what's new in 13.1.0!

What's Changed

13.0.2

This patch is updating our Project Templates for our Python starter app to ensure we depend on the latest version of React. This is out of an abundance of caution, as we don't depend on any of the react packages that were flagged as vulnerable in GHSA-fv66-9v8q-g76r.

What's Changed

Full Changelog: dotnet/aspire@v13.0.1...v13.0.2

13.0.1

What's Changed

Full Changelog: dotnet/aspire@v13.0.0...v13.0.1

Commits viewable in compare view.

Updated Aspire.StackExchange.Redis.DistributedCaching from 13.0.0 to 13.1.0.

Release notes

Sourced from Aspire.StackExchange.Redis.DistributedCaching's releases.

13.1.0

We are excited to share that our 13.1.0 release of Aspire has shipped! All of the packages are available in NuGet.org now. Head over to https://aspire.dev/whats-new/aspire-13-1/ to find what's new in 13.1.0!

What's Changed

13.0.2

This patch is updating our Project Templates for our Python starter app to ensure we depend on the latest version of React. This is out of an abundance of caution, as we don't depend on any of the react packages that were flagged as vulnerable in GHSA-fv66-9v8q-g76r.

What's Changed

Full Changelog: dotnet/aspire@v13.0.1...v13.0.2

13.0.1

What's Changed

Full Changelog: dotnet/aspire@v13.0.0...v13.0.1

Commits viewable in compare view.

Updated dbup-postgresql from 6.0.3 to 6.1.5.

Release notes

Sourced from dbup-postgresql's releases.

6.1.5

What's Changed

Full Changelog: DbUp/dbup-postgresql@6.1.2...6.1.5

6.1.2

What's Changed

New Contributors

Full Changelog: DbUp/dbup-postgresql@6.0.3...6.1.2

Commits viewable in compare view.

Updated FluentAssertions from 7.0.0 to 7.2.0.

Release notes

Sourced from FluentAssertions's releases.

7.2.0

What's Changed

Improvements

Fixes

Others

Full Changelog: fluentassertions/fluentassertions@7.1.0...7.2.0

7.1.0

What's Changed

Improvements

Others

Full Changelog: fluentassertions/fluentassertions@7.0.0...7.1.0

Commits viewable in compare view.

Updated NetEscapades.AspNetCore.SecurityHeaders from 1.1.0 to 1.3.1.

Release notes

Sourced from NetEscapades.AspNetCore.SecurityHeaders's releases.

1.3.1

Changes in 1.3.1

Fixes:

  • Fix WithHashTagHelper() using incorrect tag helper hashes for style-src, style-src-attr, and style-scr-elem CSP directives (#​279)

Breaking Changes:

  • Don't expose WithHashTagHelper() on CustomDirectiveBuilder or DefaultSourceDirectiveBuilder - technically breaking, but really a bug (#​279)

Changes in 1.3.0:

Features:

  • Add API for registering an async policy selector #​259 (Thanks @​jchannon)
  • Update Content-Security-Policy builders to encourage correct directives and to flag incorrect directives #​272
  • Add OverInsecureHttp() and OverInsecureWs() scheme sources to CSP builders #​273

Changes in 1.2.0:

Features:

  • Add support for child-src to Content-Security-Policy #​259
  • Allow multiple calls to AddSecurityHeadersPolicies() for registering named polices #​250

Fixes:

Changes in 1.1.0

Features:

  • Add AddRange() to SourceCollection #​240, #​242 (Thanks @​rankobp)
  • Improve CSP documentation #​241 (Thanks @​Meir017)
  • Add X-Frame-Options ALLOW-FROM with correct method name AddFrameOptionsAllowFrom() #​244

Changes in 1.0.0

This marks the first major release of the NetEscapades.AspNetCore.SecurityHeaders. For simplicity, all the changes since 0.24.0 are included below.

Breaking Changes:

  • Drop support for .NET Standard 2.0, raises minimum framework to .NET Core 3.1 #​167, #​171
  • Removed "document header" functionality, in favour of always adding all headers #​186
  • Remove X-XSS-Protection from default headers and mark obsolete #​168
  • Add cross-origin-opener-policy: same-origin to default headers #​184
  • Mark Feature-Policy as obsolete #​187
  • Mark Expect-CT as obsolete #​197
  • Make nonce generation lazy on call to HttpContext.GetNonce() #​198
  • Remove ambient-light-sensor=() from DefaultSecureDirectives() for permissions policy #​203 (Thanks damienbod!)
  • Update COOP, COEP, and CORP for AddDefaultSecurityHeaders() and AddDefaultApiSecurityHeaders() #​204 (Thanks damienbod!)
  • Removes obsolete APIs (#​217)

Features:

... (truncated)

1.3.0

Changes in 1.3.0:

Features:

  • Add API for registering an async policy selector #​259 (Thanks @​jchannon)
  • Update Content-Security-Policy builders to encourage correct directives and to flag incorrect directives #​272
  • Add OverInsecureHttp() and OverInsecureWs() scheme sources to CSP builders #​273

Changes in 1.2.0:

Features:

  • Add support for child-src to Content-Security-Policy #​259
  • Allow multiple calls to AddSecurityHeadersPolicies() for registering named polices #​250

Fixes:

Changes in 1.1.0

Features:

  • Add AddRange() to SourceCollection #​240, #​242 (Thanks @​rankobp)
  • Improve CSP documentation #​241 (Thanks @​Meir017)
  • Add X-Frame-Options ALLOW-FROM with correct method name AddFrameOptionsAllowFrom() #​244

Changes in 1.0.0

This marks the first major release of the NetEscapades.AspNetCore.SecurityHeaders. For simplicity, all the changes since 0.24.0 are included below.

Breaking Changes:

  • Drop support for .NET Standard 2.0, raises minimum framework to .NET Core 3.1 #​167, #​171
  • Removed "document header" functionality, in favour of always adding all headers #​186
  • Remove X-XSS-Protection from default headers and mark obsolete #​168
  • Add cross-origin-opener-policy: same-origin to default headers #​184
  • Mark Feature-Policy as obsolete #​187
  • Mark Expect-CT as obsolete #​197
  • Make nonce generation lazy on call to HttpContext.GetNonce() #​198
  • Remove ambient-light-sensor=() from DefaultSecureDirectives() for permissions policy #​203 (Thanks damienbod!)
  • Update COOP, COEP, and CORP for AddDefaultSecurityHeaders() and AddDefaultApiSecurityHeaders() #​204 (Thanks damienbod!)
  • Removes obsolete APIs (#​217)

Features:

  • Allow configuring "named" policies, and applying different policies to different endpoints #​172, #​173, #​185
  • Allow customizing the HeaderPolicyCollection just before it is applied, customizing per request #​174, #​185
  • Make adding directives to Content-Security-Policy idempotent to avoid duplicates #​169
  • Add AddDefaultApiSecurityHeaders() for adding default headers to APIs #​183, #​184
  • Add AddPermissionsPolicyWithRecommendedDirectives() and PermissionsPolicyBuilder.AddDefaultSecureDirectives() for adding secure Permissions-Policy directives in bulk #​183, #​184
  • NetEscapades.AspNetCore.SecurityHeaders now has an icon, thanks @​khalidabuhakmeh! #​195
  • Allow accessing an IServiceProvider when configuring a SecurityHeaderPolicyBuilder #​200
  • Adds support for Trusted Types to Content-Security-Policy (#​216, #​218)
    ... (truncated)

1.2.0

Changes in 1.2.0:

Features:

  • Add support for child-src to Content-Security-Policy #​259
  • Allow multiple calls to AddSecurityHeadersPolicies() for registering named polices #​250

Fixes:

Changes in 1.1.0

Features:

  • Add AddRange() to SourceCollection #​240, #​242 (Thanks @​rankobp)
  • Improve CSP documentation #​241 (Thanks @​Meir017)
  • Add X-Frame-Options ALLOW-FROM with correct method name AddFrameOptionsAllowFrom() #​244

Changes in 1.0.0

This marks the first major release of the NetEscapades.AspNetCore.SecurityHeaders. For simplicity, all the changes since 0.24.0 are included below.

Breaking Changes:

  • Drop support for .NET Standard 2.0, raises minimum framework to .NET Core 3.1 #​167, #​171
  • Removed "document header" functionality, in favour of always adding all headers #​186
  • Remove X-XSS-Protection from default headers and mark obsolete #​168
  • Add cross-origin-opener-policy: same-origin to default headers #​184
  • Mark Feature-Policy as obsolete #​187
  • Mark Expect-CT as obsolete #​197
  • Make nonce generation lazy on call to HttpContext.GetNonce() #​198
  • Remove ambient-light-sensor=() from DefaultSecureDirectives() for permissions policy #​203 (Thanks damienbod!)
  • Update COOP, COEP, and CORP for AddDefaultSecurityHeaders() and AddDefaultApiSecurityHeaders() #​204 (Thanks damienbod!)
  • Removes obsolete APIs (#​217)

Features:

  • Allow configuring "named" policies, and applying different policies to different endpoints #​172, #​173, #​185
  • Allow customizing the HeaderPolicyCollection just before it is applied, customizing per request #​174, #​185
  • Make adding directives to Content-Security-Policy idempotent to avoid duplicates #​169
  • Add AddDefaultApiSecurityHeaders() for adding default headers to APIs #​183, #​184
  • Add AddPermissionsPolicyWithRecommendedDirectives() and PermissionsPolicyBuilder.AddDefaultSecureDirectives() for adding secure Permissions-Policy directives in bulk #​183, #​184
  • NetEscapades.AspNetCore.SecurityHeaders now has an icon, thanks @​khalidabuhakmeh! #​195
  • Allow accessing an IServiceProvider when configuring a SecurityHeaderPolicyBuilder #​200
  • Adds support for Trusted Types to Content-Security-Policy (#​216, #​218)

Build updates:

  • Allow building from forks #​232
  • Fix release generation #​231, #​235, #​236
  • Fix recording test results #​221
  • Define version in the build project instead #​223
    ... (truncated)

Commits viewable in compare view.

Updated NetTopologySuite from 2.5.0 to 2.6.0.

Release notes

Sourced from NetTopologySuite's releases.

2.6.0

Release of Milestone: 2.6

This includes everything added to JTS 1.20.0. For details, see the JTS release documentation for this version: https://github.com/locationtech/jts/releases/tag/1.20.0

Other changes include:

  1. NetTopologySuite.Geometries.Utilities.Extracter, which includes our own strongly-typed spin on the other extracters found in this namespace.
  2. #​685 / #​686: Better handling of srsDimension when reading GML.
  3. Start taking advantage of some more modern .NET SDK features. (Don't worry, .NET Standard 2.0 is still fully supported.)
  4. #​702 / #​703: NetTopologySuite.Geometries.GeometryCollection now implements System.Collections.Generic.IReadOnlyList<Geometry>.
  5. #​712 / (related to) NetTopologySuite/NetTopologySuite.IO.GeoJSON#​109: Certain property getters no longer throw exceptions. Very softly related to: PackedCoordinateSequenceFactory does not work correctly when dealing with CoordinateXY. locationtech/jts#434 (comment)
  6. #​733: some help converting between tuples and coordinates
  7. #​738: minor documentation fix
  8. #​745 / #​746: Add a .NET Standard 2.1 target so that the majority of modern applications no longer need to deal with a transient System.Memory package reference.
  9. #​751: .NET-specific (mostly) performance improvement for most queries using NetTopologySuite.Index.Strtree indexes.
  10. #​765 / #​655 / #​656 / locationtech/jts#​714: Deviate from JTS a little bit in an attempt to soften a regression related to elevation that was introduced by OverlayNG. See linked issues for history, discussion, and more.
  11. Bump System.Memory package reference to 4.6.0 so that .NET Standard 2.0 consumers debugging into this will see a link to the currently maintained version of this "slow span" package.

Commits viewable in compare view.

Updated Npgsql from 9.0.2 to 9.0.4.

Release notes

Sourced from Npgsql's releases.

9.0.4

v9.0.4 contains several minor bug fixes.

Milestone issues

Full Changelog: npgsql/npgsql@v9.0.3...v9.0.4

9.0.3

v9.0.3 contains several minor bug fixes.

Milestone issues

Full Changelog: npgsql/npgsql@v9.0.2...v9.0.3

Commits viewable in compare view.

Updated Npgsql.NetTopologySuite from 9.0.2 to 9.0.4.

Release notes

Sourced from Npgsql.NetTopologySuite's releases.

9.0.4

v9.0.4 contains several minor bug fixes.

Milestone issues

Full Changelog: npgsql/npgsql@v9.0.3...v9.0.4

9.0.3

v9.0.3 contains several minor bug fixes.

Milestone issues

Full Changelog: npgsql/npgsql@v9.0.2...v9.0.3

Commits viewable in compare view.

Updated Npgsql.OpenTelemetry from 9.0.4 to 10.0.0.

Release notes

Sourced from Npgsql.OpenTelemetry's releases.

10.0.0

See the release notes.

The full list of changes is available here.

What's Changed

10.0.0-rc.1

Commits viewable in compare view.

Updated OpenTelemetry.Exporter.OpenTelemetryProtocol from 1.12.0 to 1.14.0.

Release notes

Sourced from OpenTelemetry.Exporter.OpenTelemetryProtocol's releases.

1.14.0

For highlights and announcements pertaining to this release see: Release Notes > 1.14.0.

The following changes are from the previous release 1.14.0-rc.1.

  • NuGet: OpenTelemetry v1.14.0

    • Breaking Change NuGet packages now use the Sigstore bundle format
      (.sigstore.json) for digital signatures instead of separate signature
      (.sig) and certificate (.pem) files. This requires cosign 3.0 or later
      for verification. See the Digital signing
      section
      for updated verification instructions.
      (#​6623)

    • Update to stable versions for .NET 10.0 NuGet packages.
      (#​6667)

    • Update Microsoft.Extensions.* dependencies to 10.0.0 for .NET Framework
      and .NET Standard.
      (#​6667)

    See CHANGELOG for details.

  • NuGet: OpenTelemetry.Api v1.14.0

    • Breaking Change NuGet packages now use the Sigstore bundle format
      (.sigstore.json) for digital signatures instead of separate signature
      (.sig) and certificate (.pem) files. This requires cosign 3.0 or later
      for verification. See the Digital signing
      section
      for updated verification instructions.
      (#​6623)

    • Update System.Diagnostics.DiagnosticSource dependency to 10.0.0
      for all target frameworks.
      (#​6667)

    See CHANGELOG for details.

  • NuGet: OpenTelemetry.Api.ProviderBuilderExtensions v1.14.0

    • Breaking Change NuGet packages now use the Sigstore bundle format
      (.sigstore.json) for digital signatures instead of separate signature
      (.sig) and certificate (.pem) files. This requires cosign 3.0 or later
      for verification. See the Digital signing
      section
      for updated verification instructions.
      (#​6623)

    • Update to stable versions for .NET 10.0 NuGet packages.
      (#​6667)

    • Update Microsoft.Extensions.* dependencies to 10.0.0 for .NET Framework
      ... (truncated)

1.14.0-rc.1

The following changes are from the previous release 1.13.1.

Description has been truncated

Bumps Aspire.Hosting from 13.0.0 to 13.1.0
Bumps Aspire.Hosting.PostgreSQL from 13.0.0 to 13.1.0
Bumps Aspire.Hosting.Redis from 13.0.0 to 13.1.0
Bumps Aspire.Npgsql from 13.0.0 to 13.1.0
Bumps Aspire.StackExchange.Redis.DistributedCaching from 13.0.0 to 13.1.0
Bumps dbup-postgresql from 6.0.3 to 6.1.5
Bumps FluentAssertions from 7.0.0 to 7.2.0
Bumps NetEscapades.AspNetCore.SecurityHeaders from 1.1.0 to 1.3.1
Bumps NetTopologySuite from 2.5.0 to 2.6.0
Bumps Npgsql from 9.0.2 to 9.0.4
Bumps Npgsql.NetTopologySuite from 9.0.2 to 9.0.4
Bumps Npgsql.OpenTelemetry from 9.0.4 to 10.0.0
Bumps OpenTelemetry.Exporter.OpenTelemetryProtocol from 1.12.0 to 1.14.0
Bumps OpenTelemetry.Extensions.Hosting from 1.12.0 to 1.14.0
Bumps OpenTelemetry.Instrumentation.AspNetCore from 1.12.0 to 1.14.0
Bumps OpenTelemetry.Instrumentation.Http from 1.12.0 to 1.14.0
Bumps OpenTelemetry.Instrumentation.Runtime from 1.12.0 to 1.14.0
Bumps Polly from 8.4.2 to 8.6.5

---
updated-dependencies:
- dependency-name: Aspire.Hosting
  dependency-version: 13.1.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: dotnet-minor
- dependency-name: Aspire.Hosting.PostgreSQL
  dependency-version: 13.1.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: dotnet-minor
- dependency-name: Aspire.Hosting.Redis
  dependency-version: 13.1.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: dotnet-minor
- dependency-name: Aspire.Npgsql
  dependency-version: 13.1.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: dotnet-minor
- dependency-name: Npgsql.OpenTelemetry
  dependency-version: 10.0.0
  dependency-type: direct:production
  update-type: version-update:semver-major
  dependency-group: dotnet-minor
- dependency-name: OpenTelemetry.Extensions.Hosting
  dependency-version: 1.14.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: dotnet-minor
- dependency-name: Aspire.StackExchange.Redis.DistributedCaching
  dependency-version: 13.1.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: dotnet-minor
- dependency-name: dbup-postgresql
  dependency-version: 6.1.5
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: dotnet-minor
- dependency-name: FluentAssertions
  dependency-version: 7.2.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: dotnet-minor
- dependency-name: NetEscapades.AspNetCore.SecurityHeaders
  dependency-version: 1.3.1
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: dotnet-minor
- dependency-name: NetTopologySuite
  dependency-version: 2.6.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: dotnet-minor
- dependency-name: Npgsql
  dependency-version: 9.0.4
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: dotnet-minor
- dependency-name: Npgsql.NetTopologySuite
  dependency-version: 9.0.4
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: dotnet-minor
- dependency-name: OpenTelemetry.Exporter.OpenTelemetryProtocol
  dependency-version: 1.14.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: dotnet-minor
- dependency-name: OpenTelemetry.Instrumentation.AspNetCore
  dependency-version: 1.14.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: dotnet-minor
- dependency-name: OpenTelemetry.Instrumentation.Http
  dependency-version: 1.14.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: dotnet-minor
- dependency-name: OpenTelemetry.Instrumentation.Runtime
  dependency-version: 1.14.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: dotnet-minor
- dependency-name: Polly
  dependency-version: 8.6.5
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: dotnet-minor
- dependency-name: Polly
  dependency-version: 8.6.5
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: dotnet-minor
- dependency-name: Polly
  dependency-version: 8.6.5
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: dotnet-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot @github
Copy link
Contributor Author

dependabot bot commented on behalf of github Dec 22, 2025

Labels

The following labels could not be found: dependencies, nuget. Please create them before Dependabot can add them to a pull request.

Please fix the above issues or remove invalid values from dependabot.yml.

mikemcdougall and others added 4 commits December 21, 2025 19:57
- Update Npgsql from 9.0.4 to 10.0.0 in TestKit and Postgres projects
- Resolves NU1605 downgrade warnings caused by Aspire.Npgsql 13.1.0 requiring Npgsql >= 10.0.0
- Fixes CI build failures in PR #153
- Remove unused Microsoft.AspNetCore.Http.HttpResults using statement
- Resolves IDE0005 code style warning
@github-actions
Copy link

github-actions bot commented Dec 22, 2025

🤖 LLM Architecture Review

🚫 Assessment: BLOCKING_ISSUES

🏗️ Architecture Review Summary

Process Checks:

  • 🚫 BLOCKING: No GitHub issues linked to this PR.

Diff Review Chunks: 13

Chunk 1/13 (src/Honua.AppHost/Honua.AppHost.csproj)

Findings

  • No issues found in the provided diff chunk.

Overall Assessment: APPROVED

(Note: This assessment is based only on the provided diff chunk. Further review of other chunks may be necessary to determine overall compliance.)

Chunk 2/13 (src/Honua.Postgres/Honua.Postgres.csproj)

Findings

  • [BLOCKING] src/Honua.Postgres/Honua.Postgres.csproj:12 - Honua.Postgres should not reference Honua.Core to maintain correct dependency direction.

Overall Assessment: BLOCKING_ISSUES

Chunk 3/13 (src/Honua.Server/Features/FeatureServer/Models/FeatureServerModels.cs)

Findings

  • [BLOCKING] src/Honua.Server/Features/FeatureServer/Models/FeatureServerModels.cs:1131-1132 - Dependency direction violation: Honua.Server should not reference Honua.Core abstractions directly in JSON serialization attributes.

Overall Assessment: BLOCKING_ISSUES

Chunk 4/13 (src/Honua.Server/Features/OgcFeatures/Models/OgcModels.cs)

Findings

  • No issues detected in the provided diff.

Overall Assessment: APPROVED

Chunk 5/13 (src/Honua.Server/Features/OgcFeatures/OgcFeaturesEndpoints.cs)

Findings

  • [APPROVED] src/Honua.Server/Features/OgcFeatures/OgcFeaturesEndpoints.cs:1237 - No architectural issues detected in the provided diff.

Overall Assessment: APPROVED

Chunk 6/13 (src/Honua.Server/Features/OgcFeatures/OgcJsonContext.cs)

Findings

  • No issues found in the provided diff.

Overall Assessment: APPROVED

Chunk 7/13 (src/Honua.Server/Honua.Server.csproj)

Findings

  • [BLOCKING] src/Honua.Server/Honua.Server.csproj:35 - Addition of 'NetTopologySuite' package might indicate new dependencies that could violate the architectural rules regarding dependency direction or count.

Overall Assessment: NEEDS_ATTENTION

Chunk 8/13 (src/Honua.Server/Program.cs)

Findings

  • [BLOCKING] src/Honua.Server/Program.cs:101-107 - Dependency injection is simplified which might ignore constructor dependencies leading to runtime errors.
  • [WARNING] src/Honua.Server/Program.cs:101-107 - Simplification of DI registration could lead to hidden dependencies exceeding the recommended limit.

Overall Assessment: NEEDS_ATTENTION

Chunk 9/13 (src/Honua.ServiceDefaults/Honua.ServiceDefaults.csproj)

Findings

  • None

Overall Assessment: APPROVED

Explanation:

  • The diff shows only version updates for various package dependencies in the Honua.ServiceDefaults.csproj file.
  • There are no changes that violate the architectural rules regarding dependency direction, API patterns, encapsulation, AOT-safe patterns, public XML documentation, dependency count limits, or sync-over-async issues.
  • The updates are routine maintenance of library versions and do not introduce any new packages that could potentially violate the established architectural rules.

Chunk 10/13 (tests/Honua.Architecture.Tests/Honua.Architecture.Tests.csproj)

Findings

  • No issues found in the provided diff.

Overall Assessment: APPROVED

The diff only shows a version update for the FluentAssertions package in the test project, which does not impact the architectural rules specified.

Chunk 11/13 (tests/Honua.Server.Tests/Honua.Server.Tests.csproj)

Findings

  • No issues found in the provided diff.

Overall Assessment: APPROVED

Chunk 12/13 (tests/Honua.Server.Tests/Infrastructure/Authentication/ApiKeyAuthenticationTests.cs)

Findings

  • No issues detected in the provided diff regarding dependency direction, minimal API usage, infrastructure encapsulation, AOT-safe patterns, public XML docs, dependency count limits, or sync-over-async.

Overall Assessment: APPROVED

Chunk 13/13 (tests/Honua.TestKit/Honua.TestKit.csproj)

Findings

  • No issues found in the provided diff.

Overall Assessment: APPROVED

The changes in the diff are limited to updating package versions in the test project file. There are no violations of the architectural rules regarding dependency direction, API patterns, encapsulation, AOT compatibility, public XML documentation, dependency count limits, or sync-over-async issues.

Overall Assessment: BLOCKING_ISSUES


Automated architectural analysis powered by OpenAI GPT-4
This review focuses on architectural patterns and design decisions
Human review still recommended for complex changes

Mike McDougall added 13 commits December 22, 2025 23:32
- Add OgcJsonContext with JsonSerializable attributes for all OGC models
- Resolves compilation errors for OgcJsonContext usage in endpoints
- Enables AOT-compatible JSON serialization for OGC API Features
- Resolve all merge conflict markers
- Take trunk versions for function signatures and method implementations
- Maintain updated dependency versions from dependabot

Note: Build still failing due to JsonSerializerContext breaking changes in .NET 10
- Remove duplicate OgcJsonContext definition in OgcModels.cs
- Keep unified definition in dedicated OgcJsonContext.cs file
- Add missing ImmutableArray<double> JsonSerializable attribute
- Resolves JSON source generator 'duplicate hintName' errors
- Full solution now builds successfully with dependency updates
- Remove pull_request trigger from performance.yml
- Keep nightly schedule (6 AM UTC) and manual dispatch
- Reduces CI time and resource usage for regular PRs
- Performance tracking continues via nightly runs
- Remove push/pull_request triggers from cite-conformance.yml
- Keep weekly schedule (Monday 6 AM UTC) and manual dispatch
- Reduces CI time and resource usage for regular PRs
- Conformance testing continues via weekly runs
- Update LLM review dependencies to wait for all essential tests
- Includes: build, unit tests, integration tests, architecture tests, security scan, AOT build
- Saves expensive LLM API calls when basic tests fail
- Improves CI efficiency and cost management
- Move integration tests to run after cheap tests (unit, architecture, security)
- Run integration tests and LLM review in parallel after cheap tests pass
- Saves CI time by catching failures early with fast tests
- Expensive tests (Testcontainers + LLM API) only run when needed
- Add aot-build to integration test dependencies
- Integration tests now run after ALL basic tests: build, unit, architecture, security, AOT
- Both integration and LLM tests run in parallel after all basic tests complete
- Ensures expensive tests only run when all cheap tests pass
- Create dedicated security-nightly.yml workflow for dependency scanning
- Remove security-scan job from main CI pipeline
- Update all job dependencies to remove security-scan references
- Add automatic issue creation for critical vulnerabilities
- Improves PR CI speed by removing non-critical dependency scanning
- Security scanning continues nightly with enhanced reporting
- Fix FeatureServerServices DI registration to use proper scoped registration
- Add missing JsonSerializable attributes for IFeatureStore and ILayerCatalog for AOT compatibility
- Remove obsolete AdminEndpoint_DevelopmentEnvironment_NoPassword_AllowsAccess test (dev now requires API keys)

Resolves all unit test infrastructure failures. All Core (97/97) and Postgres (57/57) tests now pass.
- Add 3-minute timeout to Codecov upload step in coverage job
- Prevents CI from hanging indefinitely when Codecov is unresponsive
- Unit tests pass but pipeline was hanging during coverage upload
- Timeout ensures CI completes even if Codecov service is slow

Resolves consistent CI hanging after unit tests complete.
- Revert codecov-action from v5 to v4 due to known hanging issues
- v5 has documented problems causing GitHub Actions to hang for hours/days
- v4 is stable and reliable for coverage uploads
- Remove timeout workaround since v4 doesn't have hanging issues

Addresses systematic CI hanging after unit tests pass.
References: codecov/codecov-action#1579, #1706, #1731
@mikemcdougall mikemcdougall merged commit 26214c7 into trunk Dec 24, 2025
2 checks passed
@dependabot dependabot bot deleted the dependabot/nuget/src/Honua.AppHost/dotnet-minor-48cd2daec3 branch December 24, 2025 14:14
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants