Code:
/ 4.0 / 4.0 / DEVDIV_TFS / Dev10 / Releases / RTMRel / ndp / fx / src / xsp / System / Extensions / ApplicationServices / ApplicationServiceHelper.cs / 1305376 / ApplicationServiceHelper.cs
//------------------------------------------------------------------------------ //// Copyright (c) Microsoft Corporation. All rights reserved. // //----------------------------------------------------------------------------- namespace System.Web.ApplicationServices { using System; using System.Collections.Generic; using System.Collections.ObjectModel; using System.Configuration; using System.Globalization; using System.Security.Principal; using System.Threading; using System.Web; using System.Web.Configuration; using System.Web.Profile; using System.Web.Resources; internal static class ApplicationServiceHelper { // store profile properties allowed for get/set over the webservice // a dictionary is used for perf, as .ContainsKey is called often // These dictionaries are used for concurrent reads, but all writes are done on a new instance one per thread // and isn't available for reading from other threads until the operation is complete. // So it is safe to use Dictionaryin this case. // We use Dictionary instead of Dictionary to avoid violating // FxCop Rule CA908: UseApprovedGenericsForPrecompiledAssemblies. private static Dictionary _profileAllowedGet; private static Dictionary _profileAllowedSet; private static bool? _profileServiceEnabled; private static bool? _roleServiceEnabled; private static bool? _authServiceEnabled; private static bool _authRequiresSSL; internal static Dictionary ProfileAllowedGet { get { EnsureProfileConfigLoaded(); return _profileAllowedGet; } } internal static Dictionary ProfileAllowedSet { get { EnsureProfileConfigLoaded(); return _profileAllowedSet; } } internal static bool AuthenticationServiceEnabled { get { EnsureAuthenticationConfigLoaded(); return _authServiceEnabled.Value; } } internal static bool ProfileServiceEnabled { get { EnsureProfileConfigLoaded(); return _profileServiceEnabled.Value; } } internal static bool RoleServiceEnabled { get { // Get the flag on demand from config if (_roleServiceEnabled == null) { ScriptingRoleServiceSection roleServiceSection = ScriptingRoleServiceSection.GetConfigurationSection(); _roleServiceEnabled = (roleServiceSection != null) && roleServiceSection.Enabled; } return _roleServiceEnabled.Value; } } internal static void EnsureAuthenticated(HttpContext context) { // bool authenticated = false; IPrincipal user = GetCurrentUser(context); if (user != null) { IIdentity userIdentity = user.Identity; if (userIdentity != null) { authenticated = userIdentity.IsAuthenticated; } } if (!authenticated) { throw new HttpException(AtlasWeb.UserIsNotAuthenticated); } } private static void EnsureAuthenticationConfigLoaded() { // DevDiv 52730: drop the unnecessary double checked lock if (_authServiceEnabled == null) { ScriptingAuthenticationServiceSection authServicesSection = ScriptingAuthenticationServiceSection.GetConfigurationSection(); if (authServicesSection != null) { _authRequiresSSL = authServicesSection.RequireSSL; _authServiceEnabled = authServicesSection.Enabled; } else { _authServiceEnabled = false; } } } // Fail if the Authentication Service is disabled or this is a non-ssl request and ssl is required internal static void EnsureAuthenticationServiceEnabled(HttpContext context, bool enforceSSL) { if (!AuthenticationServiceEnabled) { throw new InvalidOperationException(string.Format(CultureInfo.CurrentCulture, AtlasWeb.AppService_Disabled, "AuthenticationService")); } if (enforceSSL && _authRequiresSSL && !context.Request.IsSecureConnection) { throw new HttpException(403, AtlasWeb.AppService_RequiredSSL); } } private static void EnsureProfileConfigLoaded() { if (_profileServiceEnabled == null) { #pragma warning disable 0436 ScriptingProfileServiceSection profileServiceSection = ScriptingProfileServiceSection.GetConfigurationSection(); #pragma warning restore 0436 Dictionary readAccessProperties = null; Dictionary writeAccessProperties = null; bool enabled = (profileServiceSection != null) && profileServiceSection.Enabled; if (enabled) { string[] enabledForRead = profileServiceSection.ReadAccessProperties; if (enabledForRead != null && enabledForRead.Length > 0) { readAccessProperties = new Dictionary (StringComparer.OrdinalIgnoreCase); ParseProfilePropertyList(readAccessProperties, enabledForRead); } string[] enabledForWriting = profileServiceSection.WriteAccessProperties; if (enabledForWriting != null && enabledForWriting.Length > 0) { writeAccessProperties = new Dictionary (StringComparer.OrdinalIgnoreCase); ParseProfilePropertyList(writeAccessProperties, enabledForWriting); } } _profileAllowedGet = readAccessProperties; _profileAllowedSet = writeAccessProperties; _profileServiceEnabled = enabled; } } // Fail if the Profile Service is disabled internal static void EnsureProfileServiceEnabled() { if (!ProfileServiceEnabled) { throw new InvalidOperationException(string.Format(CultureInfo.CurrentCulture, AtlasWeb.AppService_Disabled, "ProfileService")); } } // Fail if the Role Service is disabled internal static void EnsureRoleServiceEnabled() { if (!RoleServiceEnabled) { throw new InvalidOperationException(string.Format(CultureInfo.CurrentCulture, AtlasWeb.AppService_Disabled, "RoleService")); } } internal static IPrincipal GetCurrentUser(HttpContext context) { return (context != null) ? context.User : Thread.CurrentPrincipal; } internal static Collection GetProfilePropertiesMetadata() { EnsureProfileConfigLoaded(); if (ProfileBase.Properties == null) { return new Collection (); } Collection metadatas = new Collection (); foreach (SettingsProperty property in ProfileBase.Properties) { string propertyName = property.Name; // only return property metadata for properties that are allowed for Reading and/or Writing bool allowedReadOrWrite = _profileAllowedGet.ContainsKey(propertyName) || _profileAllowedSet.ContainsKey(propertyName); if (!allowedReadOrWrite) { continue; } string defaultValue = null; if (property.DefaultValue != null) { if (property.DefaultValue is string) { defaultValue = (string)property.DefaultValue; } else { defaultValue = Convert.ToBase64String((byte[])property.DefaultValue); } } ProfilePropertyMetadata metadata = new ProfilePropertyMetadata(); metadata.PropertyName = propertyName; metadata.DefaultValue = defaultValue; metadata.TypeName = property.PropertyType.AssemblyQualifiedName; metadata.AllowAnonymousAccess = (bool)property.Attributes["AllowAnonymous"]; metadata.SerializeAs = (int)property.SerializeAs; metadata.IsReadOnly = property.IsReadOnly; metadatas.Add(metadata); } return metadatas; } internal static string GetUserName(IPrincipal user) { if (user == null || user.Identity == null) { return String.Empty; } else { return user.Identity.Name; } } private static void ParseProfilePropertyList(Dictionary dictionary, string[] properties) { foreach (string property in properties) { string trimmed = property == null ? String.Empty : property.Trim(); if (property.Length > 0) { dictionary[trimmed] = true; } } } } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007. //------------------------------------------------------------------------------ // // Copyright (c) Microsoft Corporation. All rights reserved. // //----------------------------------------------------------------------------- namespace System.Web.ApplicationServices { using System; using System.Collections.Generic; using System.Collections.ObjectModel; using System.Configuration; using System.Globalization; using System.Security.Principal; using System.Threading; using System.Web; using System.Web.Configuration; using System.Web.Profile; using System.Web.Resources; internal static class ApplicationServiceHelper { // store profile properties allowed for get/set over the webservice // a dictionary is used for perf, as .ContainsKey is called often // These dictionaries are used for concurrent reads, but all writes are done on a new instance one per thread // and isn't available for reading from other threads until the operation is complete. // So it is safe to use Dictionaryin this case. // We use Dictionary instead of Dictionary to avoid violating // FxCop Rule CA908: UseApprovedGenericsForPrecompiledAssemblies. private static Dictionary _profileAllowedGet; private static Dictionary _profileAllowedSet; private static bool? _profileServiceEnabled; private static bool? _roleServiceEnabled; private static bool? _authServiceEnabled; private static bool _authRequiresSSL; internal static Dictionary ProfileAllowedGet { get { EnsureProfileConfigLoaded(); return _profileAllowedGet; } } internal static Dictionary ProfileAllowedSet { get { EnsureProfileConfigLoaded(); return _profileAllowedSet; } } internal static bool AuthenticationServiceEnabled { get { EnsureAuthenticationConfigLoaded(); return _authServiceEnabled.Value; } } internal static bool ProfileServiceEnabled { get { EnsureProfileConfigLoaded(); return _profileServiceEnabled.Value; } } internal static bool RoleServiceEnabled { get { // Get the flag on demand from config if (_roleServiceEnabled == null) { ScriptingRoleServiceSection roleServiceSection = ScriptingRoleServiceSection.GetConfigurationSection(); _roleServiceEnabled = (roleServiceSection != null) && roleServiceSection.Enabled; } return _roleServiceEnabled.Value; } } internal static void EnsureAuthenticated(HttpContext context) { // bool authenticated = false; IPrincipal user = GetCurrentUser(context); if (user != null) { IIdentity userIdentity = user.Identity; if (userIdentity != null) { authenticated = userIdentity.IsAuthenticated; } } if (!authenticated) { throw new HttpException(AtlasWeb.UserIsNotAuthenticated); } } private static void EnsureAuthenticationConfigLoaded() { // DevDiv 52730: drop the unnecessary double checked lock if (_authServiceEnabled == null) { ScriptingAuthenticationServiceSection authServicesSection = ScriptingAuthenticationServiceSection.GetConfigurationSection(); if (authServicesSection != null) { _authRequiresSSL = authServicesSection.RequireSSL; _authServiceEnabled = authServicesSection.Enabled; } else { _authServiceEnabled = false; } } } // Fail if the Authentication Service is disabled or this is a non-ssl request and ssl is required internal static void EnsureAuthenticationServiceEnabled(HttpContext context, bool enforceSSL) { if (!AuthenticationServiceEnabled) { throw new InvalidOperationException(string.Format(CultureInfo.CurrentCulture, AtlasWeb.AppService_Disabled, "AuthenticationService")); } if (enforceSSL && _authRequiresSSL && !context.Request.IsSecureConnection) { throw new HttpException(403, AtlasWeb.AppService_RequiredSSL); } } private static void EnsureProfileConfigLoaded() { if (_profileServiceEnabled == null) { #pragma warning disable 0436 ScriptingProfileServiceSection profileServiceSection = ScriptingProfileServiceSection.GetConfigurationSection(); #pragma warning restore 0436 Dictionary readAccessProperties = null; Dictionary writeAccessProperties = null; bool enabled = (profileServiceSection != null) && profileServiceSection.Enabled; if (enabled) { string[] enabledForRead = profileServiceSection.ReadAccessProperties; if (enabledForRead != null && enabledForRead.Length > 0) { readAccessProperties = new Dictionary (StringComparer.OrdinalIgnoreCase); ParseProfilePropertyList(readAccessProperties, enabledForRead); } string[] enabledForWriting = profileServiceSection.WriteAccessProperties; if (enabledForWriting != null && enabledForWriting.Length > 0) { writeAccessProperties = new Dictionary (StringComparer.OrdinalIgnoreCase); ParseProfilePropertyList(writeAccessProperties, enabledForWriting); } } _profileAllowedGet = readAccessProperties; _profileAllowedSet = writeAccessProperties; _profileServiceEnabled = enabled; } } // Fail if the Profile Service is disabled internal static void EnsureProfileServiceEnabled() { if (!ProfileServiceEnabled) { throw new InvalidOperationException(string.Format(CultureInfo.CurrentCulture, AtlasWeb.AppService_Disabled, "ProfileService")); } } // Fail if the Role Service is disabled internal static void EnsureRoleServiceEnabled() { if (!RoleServiceEnabled) { throw new InvalidOperationException(string.Format(CultureInfo.CurrentCulture, AtlasWeb.AppService_Disabled, "RoleService")); } } internal static IPrincipal GetCurrentUser(HttpContext context) { return (context != null) ? context.User : Thread.CurrentPrincipal; } internal static Collection GetProfilePropertiesMetadata() { EnsureProfileConfigLoaded(); if (ProfileBase.Properties == null) { return new Collection (); } Collection metadatas = new Collection (); foreach (SettingsProperty property in ProfileBase.Properties) { string propertyName = property.Name; // only return property metadata for properties that are allowed for Reading and/or Writing bool allowedReadOrWrite = _profileAllowedGet.ContainsKey(propertyName) || _profileAllowedSet.ContainsKey(propertyName); if (!allowedReadOrWrite) { continue; } string defaultValue = null; if (property.DefaultValue != null) { if (property.DefaultValue is string) { defaultValue = (string)property.DefaultValue; } else { defaultValue = Convert.ToBase64String((byte[])property.DefaultValue); } } ProfilePropertyMetadata metadata = new ProfilePropertyMetadata(); metadata.PropertyName = propertyName; metadata.DefaultValue = defaultValue; metadata.TypeName = property.PropertyType.AssemblyQualifiedName; metadata.AllowAnonymousAccess = (bool)property.Attributes["AllowAnonymous"]; metadata.SerializeAs = (int)property.SerializeAs; metadata.IsReadOnly = property.IsReadOnly; metadatas.Add(metadata); } return metadatas; } internal static string GetUserName(IPrincipal user) { if (user == null || user.Identity == null) { return String.Empty; } else { return user.Identity.Name; } } private static void ParseProfilePropertyList(Dictionary dictionary, string[] properties) { foreach (string property in properties) { string trimmed = property == null ? String.Empty : property.Trim(); if (property.Length > 0) { dictionary[trimmed] = true; } } } } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007.
Link Menu
This book is available now!
Buy at Amazon US or
Buy at Amazon UK
- Form.cs
- FlowchartDesigner.xaml.cs
- StylusPointPropertyInfo.cs
- GroupLabel.cs
- IgnoreSectionHandler.cs
- BamlRecords.cs
- CodeGenerator.cs
- ClientConvert.cs
- VirtualPath.cs
- BaseDataBoundControl.cs
- DataControlFieldsEditor.cs
- TextTrailingWordEllipsis.cs
- _HelperAsyncResults.cs
- ObjectIDGenerator.cs
- CompilerTypeWithParams.cs
- Menu.cs
- PassportIdentity.cs
- ToolStripItemDataObject.cs
- CommonGetThemePartSize.cs
- SemanticResultKey.cs
- XamlReaderHelper.cs
- EventListener.cs
- Range.cs
- _ReceiveMessageOverlappedAsyncResult.cs
- RootBrowserWindowProxy.cs
- ProfileSettingsCollection.cs
- HttpModuleCollection.cs
- Logging.cs
- AliasGenerator.cs
- ListBox.cs
- CqlQuery.cs
- PackageRelationshipCollection.cs
- ValueChangedEventManager.cs
- WindowProviderWrapper.cs
- SqlDataAdapter.cs
- FormatStringEditor.cs
- UrlAuthFailureHandler.cs
- HashMembershipCondition.cs
- ApplyTemplatesAction.cs
- XmlUtf8RawTextWriter.cs
- SmiEventSink.cs
- HyperLinkField.cs
- ExtensionQuery.cs
- ProxyManager.cs
- ServiceMetadataPublishingElement.cs
- SafeRightsManagementHandle.cs
- TcpChannelFactory.cs
- ToolStripRendererSwitcher.cs
- AccessibleObject.cs
- RoutedCommand.cs
- EventLogPermissionHolder.cs
- XmlSchemaAnnotation.cs
- DeviceSpecificChoice.cs
- QueryLifecycle.cs
- ThousandthOfEmRealDoubles.cs
- FilterUserControlBase.cs
- XmlNotation.cs
- ListDataBindEventArgs.cs
- ToolStripTextBox.cs
- CachingHintValidation.cs
- LeftCellWrapper.cs
- RequestCachePolicyConverter.cs
- dbdatarecord.cs
- WebPartChrome.cs
- ExpandCollapseProviderWrapper.cs
- CodeValidator.cs
- PanelStyle.cs
- AuthenticationService.cs
- Matrix.cs
- GeneralTransform.cs
- SecurityDescriptor.cs
- FontCollection.cs
- Token.cs
- DBConnectionString.cs
- TreeViewImageIndexConverter.cs
- ArgumentException.cs
- ProxyBuilder.cs
- DurableTimerExtension.cs
- ByteStorage.cs
- SettingsPropertyNotFoundException.cs
- HtmlShimManager.cs
- AxisAngleRotation3D.cs
- TextSpanModifier.cs
- ToolStripRendererSwitcher.cs
- DataGridColumn.cs
- EntryIndex.cs
- WebPartConnectionsCloseVerb.cs
- InstanceCompleteException.cs
- PersonalizableTypeEntry.cs
- ComplexTypeEmitter.cs
- QilInvokeLateBound.cs
- XmlAttributeHolder.cs
- HttpResponseInternalWrapper.cs
- MemberAccessException.cs
- StructuredTypeInfo.cs
- ModulesEntry.cs
- DataGridViewTextBoxEditingControl.cs
- CssStyleCollection.cs
- RtfToXamlReader.cs
- PathGradientBrush.cs