import UBI dotnet7.0-7.0.119-1.el9_4

This commit is contained in:
eabdullin 2024-05-14 21:46:04 +00:00
parent b1e995e22f
commit 0a5e5939f4
4 changed files with 19 additions and 42 deletions

View File

@ -1 +1 @@
0e0bef0a641ecb44414d0f9c4c363621bea115c7 SOURCES/dotnet-v7.0.118.tar.gz
90c02feb5152a6d7cb902078a3f29c2ba96251dd SOURCES/dotnet-v7.0.119.tar.gz

2
.gitignore vendored
View File

@ -1 +1 @@
SOURCES/dotnet-v7.0.118.tar.gz
SOURCES/dotnet-v7.0.119.tar.gz

View File

@ -47,33 +47,6 @@ index 55a044d62a6..e72d42e87d2 100644
using (RSA rsa = RSAFactory.Create(TestData.RSA2048Params))
{
void RoundtripEmpty(RSAEncryptionPadding paddingMode)
@@ -692,26 +701,6 @@ public void NotSupportedValueMethods()
}
}
- [ConditionalTheory]
- [InlineData(new byte[] { 1, 2, 3, 4 })]
- [InlineData(new byte[0])]
- public void Decrypt_Pkcs1_ErrorsForInvalidPadding(byte[] data)
- {
- if (data.Length == 0 && !PlatformSupportsEmptyRSAEncryption)
- {
- throw new SkipTestException("Platform does not support RSA encryption of empty data.");
- }
-
- using (RSA rsa = RSAFactory.Create(TestData.RSA2048Params))
- {
- byte[] encrypted = Encrypt(rsa, data, RSAEncryptionPadding.Pkcs1);
- encrypted[1] ^= 0xFF;
-
- // PKCS#1, the data, and the key are all deterministic so this should always throw an exception.
- Assert.ThrowsAny<CryptographicException>(() => Decrypt(rsa, encrypted, RSAEncryptionPadding.Pkcs1));
- }
- }
-
[Fact]
public void Decrypt_Pkcs1_BadPadding()
{
@@ -726,23 +715,5 @@ public static IEnumerable<object[]> OaepPaddingModes
}
}

View File

@ -6,10 +6,10 @@
# until that's done, disable LTO. This has to happen before setting the flags below.
%define _lto_cflags %{nil}
%global host_version 7.0.18
%global runtime_version 7.0.18
%global host_version 7.0.19
%global runtime_version 7.0.19
%global aspnetcore_runtime_version %{runtime_version}
%global sdk_version 7.0.118
%global sdk_version 7.0.119
%global sdk_feature_band_version %(echo %{sdk_version} | cut -d '-' -f 1 | sed -e 's|[[:digit:]][[:digit:]]$|00|')
%global templates_version %{runtime_version}
#%%global templates_version %%(echo %%{runtime_version} | awk 'BEGIN { FS="."; OFS="." } {print $1, $2, $3+1 }')
@ -612,25 +612,29 @@ rm -rf %{buildroot}%{_libdir}/dotnet/packs/NETStandard.Library.Ref/2.1.0
%changelog
* Tue Apr 02 2024 Omair Majid <omajid@redhat.com> - 7.0.118-1
* Mon May 06 2024 Omair Majid <omajid@redhat.com> - 7.0.119-1
- Update to .NET SDK 7.0.119 and Runtime 7.0.19
- Resolves: RHEL-35314
* Tue Apr 09 2024 Omair Majid <omajid@redhat.com> - 7.0.118-2
- Update to .NET SDK 7.0.118 and Runtime 7.0.18
- Resolves: RHEL-31202
- Resolves: RHEL-31203
* Thu Feb 29 2024 Omair Majid <omajid@redhat.com> - 7.0.117-1
* Tue Mar 19 2024 Omair Majid <omajid@redhat.com> - 7.0.117-2
- Update to .NET SDK 7.0.117 and Runtime 7.0.17
- Resolves: RHEL-27544
- Resolves: RHEL-27545
* Thu Feb 01 2024 Omair Majid <omajid@redhat.com> - 7.0.116-1
* Wed Feb 14 2024 Omair Majid <omajid@redhat.com> - 7.0.116-2
- Update to .NET SDK 7.0.116 and Runtime 7.0.16
- Resolves: RHEL-23793
- Resolves: RHEL-23790
* Wed Dec 20 2023 Omair Majid <omajid@redhat.com> - 7.0.115-1
* Mon Jan 15 2024 Omair Majid <omajid@redhat.com> - 7.0.115-2
- Update to .NET SDK 7.0.115 and Runtime 7.0.15
- Resolves: RHEL-19808
- Resolves: RHEL-19802
* Thu Nov 02 2023 Omair Majid <omajid@redhat.com> - 7.0.114-1
* Mon Dec 11 2023 Omair Majid <omajid@redhat.com> - 7.0.114-2
- Update to .NET SDK 7.0.114 and Runtime 7.0.14
- Resolves: RHEL-15357
- Resolves: RHEL-15351
* Tue Oct 24 2023 Omair Majid <omajid@redhat.com> - 7.0.113-2
- Update to .NET SDK 7.0.113 and Runtime 7.0.13