Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Avoid S.S.Permissions dependency in S.S.Crypto.Xml #58731

Merged

Conversation

ViktorHofer
Copy link
Member

Avoid the S.S.Permissions dependency by referencing the
latest available System.Security.AccessControl package
which contans the Evidence types in all tfms in the
System.Security.Cryptography.Xml project.

FYI @dougbu that's the accompanying change to avoid
the System.Security.Permissions dependency in main.

Avoid the S.S.Permissions dependency by referencing the
latest available System.Security.AccessControl package
which contans the Evidence types in all tfms in the
System.Security.Cryptography.Xml project.

Add suppression file for Permissions
@@ -103,7 +103,7 @@
<SystemRuntimeInteropServicesVersion>4.3.0</SystemRuntimeInteropServicesVersion>
<SystemRuntimeInteropServicesRuntimeInformationVersion>4.3.0</SystemRuntimeInteropServicesRuntimeInformationVersion>
<SystemRuntimeSerializationPrimitivesVersion>4.3.0</SystemRuntimeSerializationPrimitivesVersion>
<SystemSecurityAccessControlVersion>5.0.0</SystemSecurityAccessControlVersion>
<SystemSecurityAccessControlVersion>6.0.0-rc.2.21454.1</SystemSecurityAccessControlVersion>
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is OK for now, but we should make sure to remember to update to 6.0.0 stable when available.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

One other place that might be interesting to pick up 6.0.0 prerelease is here:

<PreviousNetCoreAppPackageVersion>5.0.0</PreviousNetCoreAppPackageVersion>

@ViktorHofer
Copy link
Member Author

@ViktorHofer ViktorHofer merged commit d801ae2 into dotnet:main Sep 7, 2021
@ViktorHofer ViktorHofer deleted the SystemSecurityPermissionsAvoid branch September 7, 2021 15:49
@dougbu
Copy link
Member

dougbu commented Sep 7, 2021

I need to wait for a successful dotnet-runtime-official build and a merged dependency update PR in dotnet/aspnetcore before I can put up a reaction PR. Looks like that pipeline hasn't passed in the last few builds. Watching…

@ericstj
Copy link
Member

ericstj commented Sep 7, 2021

My arcade changes for ARM64 broke official build and should be fixed with dotnet/arcade#7845

dougbu added a commit to dotnet/aspnetcore that referenced this pull request Sep 10, 2021
dougbu added a commit to dotnet/aspnetcore that referenced this pull request Sep 22, 2021
dougbu added a commit to dotnet/aspnetcore that referenced this pull request Sep 23, 2021
* [main] React to dotnet/runtime#57816 (#36155)
- `cherry-pick` e58a6c2
- see dotnet/runtime#57816 (comment)
- also reacting to dotnet/runtime#58731
- undo much of 18a61fb

* [main] Cleanup remaining SSP references (#36248)
- `cherry-pick` 888e03a
- remove references to System.Security.Permissions and its closure
  - only mentions are in eng/PackageOverrides.txt and eng/PlatformManifest.txt
  - those files will remain unused until we update them in the run-up to 6.0.1
  - may see some package refs for SSP and its closure elsewhere but this does not impact targeting pack content
- also remove duplication between `@(AspNetCoreReferenceAssemblyPath)` additions (for efficiency)

nit: Only need to exclude System.Net.Quic from `@(_AvailableRuntimeRefAssemblies)`
  - Crypto.Pkcs is **not** present in the transport package
  - other disallowed entries aren't present in the transport package or our dependency closure
@ghost ghost locked as resolved and limited conversation to collaborators Oct 7, 2021
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants