Please do not reply to this email- if you want to comment on the bug, go to the URL shown below and enter your comments there.
Changed by [EMAIL PROTECTED] http://bugzilla.ximian.com/show_bug.cgi?id=81133 --- shadow/81133 2007-03-13 21:39:16.000000000 -0500 +++ shadow/81133.tmp.26045 2007-03-14 09:37:54.000000000 -0500 @@ -1,13 +1,13 @@ Bug#: 81133 Product: Mono: Runtime Version: 1.2 OS: unknown OS Details: Debian Etch, kernel 2.6.12.6-xen, x86_64 -Status: NEW -Resolution: +Status: RESOLVED +Resolution: FIXED Severity: Unknown Priority: Wishlist Component: misc AssignedTo: [EMAIL PROTECTED] ReportedBy: [EMAIL PROTECTED] QAContact: [EMAIL PROTECTED] @@ -92,6 +92,16 @@ manager is (and stays) experimental and unsupported - i.e. it shouldn't be used for a "critical part" of anything. In this particular case, non-CAS permission, the use of imperative security (source) instead of declarative security (attribute) should work (in a non-experimental and supported way). + +------- Additional Comments From [EMAIL PROTECTED] 2007-03-14 09:37 ------- +I have tested latest svn version on AMD Athlon(tm) 64 X2 Dual +Core Processor 3800+, but +with ./configure --build=i686-pc-linux-gnu --with-xen_opt. Now it +works well. It was probably bug in debian's build (mono 1.2.2.1). + +Thanks Sebastien, I found useful information about CAS and RBAC in +your blog. I'll consider to drob declarative security but it will +have negative impact to current design. _______________________________________________ mono-bugs maillist - [email protected] http://lists.ximian.com/mailman/listinfo/mono-bugs
