Juan Hernandez has posted comments on this change.

Change subject: core: Disable PKCS#11 security provider
......................................................................


Patch Set 1:

This isn't a RHEL specific issue, but an issue that will affect any platform 
where the leaky PKCS#11 provider is enabled, so we need to disable it in all 
the platforms.

Of course the fix should be in the PKCS#11 provider, and the relevant people is 
already working on that. But meanwhile we can't put our users in a situation 
where they system will surely crash after a few days running.

Users can always override anything, the java.security file that we provide or 
the default java.security file.

-- 
To view, visit http://gerrit.ovirt.org/21827
To unsubscribe, visit http://gerrit.ovirt.org/settings

Gerrit-MessageType: comment
Gerrit-Change-Id: I474b0ff84700f00c8dcab2c5eb8a6a2f3d13aeaf
Gerrit-PatchSet: 1
Gerrit-Project: ovirt-engine
Gerrit-Branch: master
Gerrit-Owner: Juan Hernandez <[email protected]>
Gerrit-Reviewer: Alon Bar-Lev <[email protected]>
Gerrit-Reviewer: Eli Mesika <[email protected]>
Gerrit-Reviewer: Itamar Heim <[email protected]>
Gerrit-Reviewer: Juan Hernandez <[email protected]>
Gerrit-Reviewer: Liran Zelkha <[email protected]>
Gerrit-Reviewer: Sandro Bonazzola <[email protected]>
Gerrit-Reviewer: oVirt Jenkins CI Server
Gerrit-HasComments: No
_______________________________________________
Engine-patches mailing list
[email protected]
http://lists.ovirt.org/mailman/listinfo/engine-patches

Reply via email to