IMPORTANT ANNOUNCEMENT FOR OUR READERS!
AskPFEPlat is in the process of a transformation to the new Core Infrastructure and Security TechCommunity, and will be moving by the end of March 2019 to our new home at https://aka.ms/CISTechComm (hosted at https://techcommunity.microsoft.com). Please bear with us while we are still under construction!
We will continue bringing you the same great content, from the same great contributors, on our new platform. Until then, you can access our new content on either https://aka.ms/askpfeplat as you do today, or at our new site https://aka.ms/CISTechComm. Please feel free to update your bookmarks accordingly!
Why are we doing this? Simple really; we are looking to expand our team internally in order to provide you even more great content, as well as take on a more proactive role in the future with our readers (more to come on that later)! Since our team encompasses many more roles than Premier Field Engineers these days, we felt it was also time we reflected that initial expansion.
If you have never visited the TechCommunity site, it can be found at https://techcommunity.microsoft.com. On the TechCommunity site, you will find numerous technical communities across many topics, which include discussion areas, along with blog content.
NOTE: In addition to the AskPFEPlat-to-Core Infrastructure and Security transformation, Premier Field Engineers from all technology areas will be working together to expand the TechCommunity site even further, joining together in the technology agnostic Premier Field Engineering TechCommunity (along with Core Infrastructure and Security), which can be found at https://aka.ms/PFETechComm!
As always, thank you for continuing to read the Core Infrastructure and Security (AskPFEPlat) blog, and we look forward to providing you more great content well into the future!
Hi all! Johannes Freundorfer, Ingmar Oosterhoff, and Matthias Herfurth back again for part 3 of our series!
Using the tools downloaded to our Virtual Machine in the previous blog (https://techcommunity.microsoft.com/t5/Core-Infrastructure-and-Security/MSIX-Package-Support-Framework-Part-2-Preparation/ba-p/393864), we’re now going to fix a “made to break” application provided by Microsoft.
This application can be downloaded from Github and needs to be compiled with Visual Studio.
The sources of this application can be found here: https://github.com/Microsoft/MSIX-PackageSupportFramework
Choosing “Clone or Download” will allow you to download the whole set of files as a ZIP-container.
- Expand the. zip to the folder structure created in the previous blog. Once expanded the folder structure should look like this:
2. The next step is to review and compile the broken Sample application. To do this we need Microsoft Visual Studio. You could install that yourself or take the easy route and use the Quick create template in Hyper-V manager on your Windows 10 machine.
3. Select the Windows 10 dev environment VM, and a new VM with Visual Studio is up and running in minutes.
4. We can then copy our Resources folder over to this VM. Oh, and did you notice there is also a VM available with the MSIX Packaging Tool Environment?
5. Once Visual Studio is up and running, open the following file:
6. As this is a project from an external source, some warnings will pop up. To be able to proceed you’ll need to accept those. If you missed some features during Visual Studio installation those will be installed afterwards. You’ll know you’ve succeeded as soon as you’re able to see a similar window in the screenshot below. One Solution called ‘PSFSample’ containing 4 Projects.
7. Right click on the PSFSamplePackage to show the options available. Select Build.
8. “Open Folder in File Explorer” will finally open a window showing you the resulting files.
Preparation is now complete for fixing the application in our next posts…
MSIX – The MSIX Packaging Tool – Using the First Package (Part 1)
MSIX Package Support Framework Part 2 – Preparation