Skip to content

Conversation

@bartonjs
Copy link
Member

Mitigates #64389

@ghost ghost added the area-System.Security label Jan 27, 2022
@ghost ghost assigned bartonjs Jan 27, 2022
@ghost
Copy link

ghost commented Jan 27, 2022

Tagging subscribers to this area: @dotnet/area-system-security, @vcsjones
See info in area-owners.md if you want to be subscribed.

Issue Details

Mitigates #64389

Author: bartonjs
Assignees: -
Labels:

area-System.Security

Milestone: -

@vcsjones
Copy link
Member

Does this need to be applied to the Pem ones as well?

They are modeled similarly as the ones you disabled. Is it possible they will be problematic for whatever reason the ones you disabled are?

@bartonjs
Copy link
Member Author

Does this need to be applied to the Pem ones as well?

Per local testing, disabling just these two types (ultimately the base class that powers them) was enough. It'll get CI off the floor and let my compatriots in the OS group figure out what went wrong.

@stephentoub stephentoub merged commit 10df829 into dotnet:main Jan 27, 2022
@bartonjs
Copy link
Member Author

/backport to release/6.0

@github-actions
Copy link
Contributor

Started backporting to release/6.0: https://github.com/dotnet/runtime/actions/runs/1759096282

@bartonjs bartonjs deleted the avoid_cng_lockup branch January 28, 2022 00:19
@ghost ghost locked as resolved and limited conversation to collaborators Feb 27, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants