-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove [SecurityCritical] and [SecuritySafeCritical] attributes #18938
Comments
Same applies for eg [SecurityTransparent] but I don't really see use of that. |
Also [ComVisible] can be removed |
Any assemblies that can also be used on .NET Framework need to keep their attributes or they may break. |
@morganbr how does one identify which assembly can be used on .NET fx? |
(Edit) The assemblies in this category are: System.Collections.Immutable, System.IO.Compression and System.Net.Http - so we need to be careful about cleaning it up from those. It should be fine to clean it up everywhere else. |
@jkotas cheers, and what about ComVisible? |
There are a few cases where ComVisible is needed for tests, or other corner cases; but it should be fine to remove otherwise. It was scrubbed once already (dotnet/corefx#782), so there are not that many files that have it. |
The assembly attributes for that are SecurityTransparent, SecurityCritical, and AllowPartiallyTrustedCallers. |
@JeremyKuhne are you still working on it? Or should we flip it back to "up for grabs"? |
When we find cases where we need to keep the attributes for at least one build configuration can we please just keep it for all configurations instead of #ifdef'ing them like we are doing in dotnet/corefx#17262 (comment) |
Security transparency will not be implemented in CoreFX, and use of these attributes can be removed throughout.
The text was updated successfully, but these errors were encountered: