Please do not reply to this email- if you want to comment on the bug, go to the
URL shown below and enter your comments there.

Changed by [EMAIL PROTECTED]

http://bugzilla.ximian.com/show_bug.cgi?id=81133

--- shadow/81133        2007-03-13 21:39:16.000000000 -0500
+++ shadow/81133.tmp.26045      2007-03-14 09:37:54.000000000 -0500
@@ -1,13 +1,13 @@
 Bug#: 81133
 Product: Mono: Runtime
 Version: 1.2
 OS: unknown
 OS Details: Debian Etch, kernel 2.6.12.6-xen, x86_64
-Status: NEW   
-Resolution: 
+Status: RESOLVED   
+Resolution: FIXED
 Severity: Unknown
 Priority: Wishlist
 Component: misc
 AssignedTo: [EMAIL PROTECTED]                            
 ReportedBy: [EMAIL PROTECTED]               
 QAContact: [EMAIL PROTECTED]
@@ -92,6 +92,16 @@
 manager is (and stays) experimental and unsupported - i.e. it
 shouldn't be used for a "critical part" of anything.
 
 In this particular case, non-CAS permission, the use of imperative
 security (source) instead of declarative security (attribute) should
 work (in a non-experimental and supported way).
+
+------- Additional Comments From [EMAIL PROTECTED]  2007-03-14 09:37 -------
+I have tested latest svn version on AMD Athlon(tm) 64 X2 Dual 
+Core Processor 3800+, but 
+with ./configure --build=i686-pc-linux-gnu --with-xen_opt. Now it 
+works well. It was probably bug in debian's build (mono 1.2.2.1).
+
+Thanks Sebastien, I found useful information about CAS and RBAC in 
+your blog. I'll consider to drob declarative security but it will 
+have negative impact to current design. 
_______________________________________________
mono-bugs maillist  -  [email protected]
http://lists.ximian.com/mailman/listinfo/mono-bugs

Reply via email to