Skip to main content

Prevent breaking changes using Microsoft.CodeAnalysis.PublicApiAnalyzers

For one of my clients, I maintain a set of libraries that help to streamline the development of new applications in .NET Core. The functionality offered through these libraries follow the 'paved road' principle and help the development teams to fall in the pit of success. They are used by multiple development teams working on different projects.

As a library author, I don’t have full control on all the different ways these libraries are used so I have to be very conscious in avoiding breaking changes. In this post I want to share some details on how I try to manage and avoid breaking changes.

Microsoft.CodeAnalysis.PublicApiAnalyzers

The ‘magic’ solution I use to avoid or handle breaking changes is with the help of a specific Roslyn analyzer, the Microsoft.CodeAnalysis.PublicApiAnalyzers.

Let me explain how this analyzer works.

First add a package reference to Microsoft.CodeAnalysis.PublicApiAnalyzers to your project:

dotnet add package Microsoft.CodeAnalysis.PublicAnalyzers

This will add 2 extra files to your project:

  • PublicAPI.Shipped.txt
  • PublicApi.Unshipped.txt

When you now try to build your project, you get a RS0016 diagnostics on all your public APIs:

This warning helps you to be aware that a change is done in a public api so that you can take it into account in code reviews and pull requests (or look at a way to avoid introducing a breaking change).

You can now use the code fix feature to add the API to the PublicAPI.Unshipped.txt file:

Remark: In Visual Studio, you can apply the fix in one go for all changes.

If I have changes in this file, I know that a made a breaking change somewhere. This allows me to track these breaking changes in an effective and centralized way. 

It is up to you as a library author when you release a new version of your library to copy the changes from the PublicAPI.Unshipped.txt file to the PublicAPI.Shipped.txt file.

Remark: While preparing this post, I stumbled over an alternative solution, PublicApiGenerator, mentioned in a blog post by Andrew Lock. If you have experience using this package, please let me now. 

More information

The paved road

NuGet Gallery | Microsoft.CodeAnalysis.PublicApiAnalyzers 3.3.4

Preventing breaking changes in public APIs with PublicApiGenerator

NuGet Gallery | PublicApiGenerator 11.3.0

Popular posts from this blog

.NET 8–Keyed/Named Services

A feature that a lot of IoC container libraries support but that was missing in the default DI container provided by Microsoft is the support for Keyed or Named Services. This feature allows you to register the same type multiple times using different names, allowing you to resolve a specific instance based on the circumstances. Although there is some controversy if supporting this feature is a good idea or not, it certainly can be handy. To support this feature a new interface IKeyedServiceProvider got introduced in .NET 8 providing 2 new methods on our ServiceProvider instance: object? GetKeyedService(Type serviceType, object? serviceKey); object GetRequiredKeyedService(Type serviceType, object? serviceKey); To use it, we need to register our service using one of the new extension methods: Resolving the service can be done either through the FromKeyedServices attribute: or by injecting the IKeyedServiceProvider interface and calling the GetRequiredKeyedServic...

Azure DevOps/ GitHub emoji

I’m really bad at remembering emoji’s. So here is cheat sheet with all emoji’s that can be used in tools that support the github emoji markdown markup: All credits go to rcaviers who created this list.

Kubernetes–Limit your environmental impact

Reducing the carbon footprint and CO2 emission of our (cloud) workloads, is a responsibility of all of us. If you are running a Kubernetes cluster, have a look at Kube-Green . kube-green is a simple Kubernetes operator that automatically shuts down (some of) your pods when you don't need them. A single pod produces about 11 Kg CO2eq per year( here the calculation). Reason enough to give it a try! Installing kube-green in your cluster The easiest way to install the operator in your cluster is through kubectl. We first need to install a cert-manager: kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.14.5/cert-manager.yaml Remark: Wait a minute before you continue as it can take some time before the cert-manager is up & running inside your cluster. Now we can install the kube-green operator: kubectl apply -f https://github.com/kube-green/kube-green/releases/latest/download/kube-green.yaml Now in the namespace where we want t...