Conversation
…d 'Microsoft TLS ECC Root G2'
ca-certificates-base: 'Microsoft TLS RSA Root G2' and 'Microsoft TLS ECC Root G2'ca-certificates-base: 'Microsoft TLS RSA Root G2' and 'Microsoft TLS ECC Root G2'
✅ PR Check PassedNo critical issues detected in spec file changes. 🤖 AI Analysis Summary:Brief Analysis: Critical Issues Found: Recommended Actions: 📋 For detailed analysis and recommendations, check the Azure DevOps pipeline logs. |
…G2' and 'Microsoft TLS ECC Root G2' (microsoft#14593)
Merge Checklist
All boxes should be checked before merging the PR (just tick any boxes which don't apply to this PR)
*-staticsubpackages, etc.) have had theirReleasetag incremented../cgmanifest.json,./toolkit/scripts/toolchain/cgmanifest.json,.github/workflows/cgmanifest.json)./SPECS/LICENSES-AND-NOTICES/data/licenses.json,./SPECS/LICENSES-AND-NOTICES/LICENSES-MAP.md,./SPECS/LICENSES-AND-NOTICES/LICENSE-EXCEPTIONS.PHOTON)*.signatures.jsonfilessudo make go-tidy-allandsudo make go-test-coveragepassSummary
Standard maintenance. Microsoft release new public MSPKI G2 CAs, so I'm adding them to our
ca-certificates-basepackage, so that authentication of any servers with certificates chaining to these CAs is successful.Does this affect the toolchain?
Yes.
Test Methodology