.NET Assemblies found in Web.config

Posted on 2011-05-01
Medium Priority
Last Modified: 2012-05-11
I've busted this question into three parts.  This is part three.  

Over the last few months, I've dragged and dropped some chart controls and some other ASP standard and data controls onto some web forms in my project.   Subsequently, some assembly references have appeared in my project Web.config file.  

- Figure 1 shows the project's current assembly references in Web.config.  
- Figure 2 shows the project's current assembly references in the manifest.  
- Figure 3 shows the project's assembly references in Web.config that I've been able to include.  If I include assembly references 2, 3, 4, or 5 shown in figure 1, most (if not all) of my web forms on the production server break.
- One more piece if interesting information: If I delete all assembly references from Web.config on the development server, I can still build the project successfully.

Is the best protocol to leave the assembly references in the development copy of Web.config and to delete them all from the production copy of Web.config.  Or, should I try to include them  in the production copy of Web.config.  If I include them, what steps do I need to take to keep the production website from breaking?
Question by:jdana
LVL 15

Assisted Solution

by:Praveen Venu
Praveen Venu earned 400 total points
ID: 35503888
Seems like this is because those assemblies are not registered to GAC on your production server. Is is possible to install those third part packages on the production server?
LVL 96

Accepted Solution

Bob Learned earned 600 total points
ID: 35508659
Your deployment to the production server should include the referenced assemblies.  You won't need to install them in the GAC, unless that is what you want to do.  What we do is to create a bin folder on the server, and copy all DLLs to that folder on the production server.

Author Closing Comment

ID: 35763996

Featured Post

Nothing ever in the clear!

This technical paper will help you implement VMware’s VM encryption as well as implement Veeam encryption which together will achieve the nothing ever in the clear goal. If a bad guy steals VMs, backups or traffic they get nothing.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Just a quick little trick I learned recently.  Now that I'm using jQuery with abandon in my asp.net applications, I have grown tired of the following syntax:      (CODE) I suppose it just offends my sense of decency to put inline VBScript on a…
Hello there! As a developer I have modified and refactored the unit tests which was written by fellow developers in the past. On the course, I have gone through various misconceptions and technical challenges when it comes to implementation. I would…
this video summaries big data hadoop online training demo (http://onlineitguru.com/big-data-hadoop-online-training-placement.html) , and covers basics in big data hadoop .
Look below the covers at a subform control , and the form that is inside it. Explore properties and see how easy it is to aggregate, get statistics, and synchronize results for your data. A Microsoft Access subform is used to show relevant calcul…
Suggested Courses
Course of the Month15 days, 7 hours left to enroll

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question