Code:
/ 4.0 / 4.0 / DEVDIV_TFS / Dev10 / Releases / RTMRel / ndp / cdf / src / WCF / System.ServiceModel.Activation / System / ServiceModel / Activation / HostedImpersonationContext.cs / 1305376 / HostedImpersonationContext.cs
//------------------------------------------------------------ // Copyright (c) Microsoft Corporation. All rights reserved. //----------------------------------------------------------- namespace System.ServiceModel.Activation { using System.ComponentModel; using System.Runtime; using System.Runtime.InteropServices; using System.Security; using System.Security.Principal; using System.ServiceModel.Activation.Interop; using System.Threading; [Fx.Tag.SecurityNote(Miscellaneous = "RequiresReview - All member methods are security critical. The class might be used outside of the restricted SecurityContext." + "Ensure they do not accidentally satisfy any demands.")] class HostedImpersonationContext { [Fx.Tag.SecurityNote(Critical = "Stores the impersonation token handle. Since we're allowing 'safe' Impersonation of the token we got from asp.net we need to protect this value.")] [SecurityCritical] SafeCloseHandleCritical tokenHandle; [Fx.Tag.SecurityNote(Critical = "Controls lifetime of token handle, caller must use care.")] [SecurityCritical] int refCount = 0; [Fx.Tag.SecurityNote(Critical = "Security critical field, caller must use care.")] [SecurityCritical] bool isImpersonated; [Fx.Tag.SecurityNote(Critical = "Calls two safe native methods under OpenCurrentThreadTokenCritical: GetCurrentThread and OpenThreadToken." + "Marshal.GetLastWin32Error captures current thread token in a SecurityCritical field.")] [SecurityCritical] public HostedImpersonationContext() { if (ServiceHostingEnvironment.AspNetCompatibilityEnabled) { int error; bool isSuccess = SafeNativeMethods.OpenCurrentThreadTokenCritical(TokenAccessLevels.Query | TokenAccessLevels.Impersonate, true, out tokenHandle, out error); if (isSuccess) { isImpersonated = true; Interlocked.Increment(ref refCount); } else { CloseInvalidOutSafeHandleCritical(tokenHandle); tokenHandle = null; if (error != SafeNativeMethods.ERROR_NO_TOKEN) { throw FxTrace.Exception.AsError(new Win32Exception(error, SR.Hosting_ImpersonationFailed)); } } } } [Fx.Tag.SecurityNote(Critical = "Calls SetHandleAsInvalid which has a LinkDemand for UnmanagedCode.")] [SecurityCritical] static void CloseInvalidOutSafeHandleCritical(SafeHandle handle) { // Workaround for 64-bit CLR bug VSWhidbey 546830 - sometimes invalid SafeHandles come back null. if (handle != null) { Fx.Assert(handle.IsInvalid, "CloseInvalidOutSafeHandle called with a valid handle!"); // Calls SuppressFinalize. handle.SetHandleAsInvalid(); } } public bool IsImpersonated { [Fx.Tag.SecurityNote(Critical = "Accesses SecurityCritical isImpersonated field.", Safe = "Does not leak control or mutable/harmful data, no potential for harm.")] [SecuritySafeCritical] get { return isImpersonated; } } [Fx.Tag.SecurityNote(Critical = "Accesses SecurityCritical tokenHandle field and uses LinkDemanded DangerousGetHandle method as well as UnsafeCreate." + "Caller should use with care, must take responsibility for reverting impersonation.")] [SecurityCritical] public IDisposable Impersonate() { if (!isImpersonated) return null; Fx.Assert(tokenHandle != null, "The token handle was incorrectly released earlier."); HostedInnerImpersonationContext context = null; lock(tokenHandle) { context = HostedInnerImpersonationContext.UnsafeCreate(tokenHandle.DangerousGetHandle()); GC.KeepAlive(tokenHandle); } return context; } [Fx.Tag.SecurityNote(Critical = "Controls lifetime of token handle, caller must use care.")] [SecurityCritical] public void AddRef() { if (IsImpersonated) { Interlocked.Increment(ref refCount); } } [Fx.Tag.SecurityNote(Critical = "Controls lifetime of token handle, caller must use care.")] [SecurityCritical] public void Release() { if (IsImpersonated) { Fx.Assert(tokenHandle != null, "The token handle is incorrectly released earlier."); int currentCount = Interlocked.Decrement(ref refCount); if (currentCount == 0) { lock(tokenHandle) { tokenHandle.Close(); tokenHandle = null; } } } } [Fx.Tag.SecurityNote(Critical = "Keeps track of impersonated user, caller must use with care and call Dispose at the appropriate time.")] #pragma warning disable 618 // have not moved to the v4 security model yet [SecurityCritical(SecurityCriticalScope.Everything)] #pragma warning restore 618 class HostedInnerImpersonationContext : IDisposable { IDisposable impersonatedContext; HostedInnerImpersonationContext(IDisposable impersonatedContext) { if (impersonatedContext == null) { throw FxTrace.Exception.AsError(new InvalidOperationException(SR.Hosting_ImpersonationFailed)); } this.impersonatedContext = impersonatedContext; } public static HostedInnerImpersonationContext UnsafeCreate(IntPtr token) { return new HostedInnerImpersonationContext(HostingEnvironmentWrapper.UnsafeImpersonate(token)); } public void Dispose() { if (impersonatedContext != null) { impersonatedContext.Dispose(); impersonatedContext = null; } } } } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007. //------------------------------------------------------------ // Copyright (c) Microsoft Corporation. All rights reserved. //----------------------------------------------------------- namespace System.ServiceModel.Activation { using System.ComponentModel; using System.Runtime; using System.Runtime.InteropServices; using System.Security; using System.Security.Principal; using System.ServiceModel.Activation.Interop; using System.Threading; [Fx.Tag.SecurityNote(Miscellaneous = "RequiresReview - All member methods are security critical. The class might be used outside of the restricted SecurityContext." + "Ensure they do not accidentally satisfy any demands.")] class HostedImpersonationContext { [Fx.Tag.SecurityNote(Critical = "Stores the impersonation token handle. Since we're allowing 'safe' Impersonation of the token we got from asp.net we need to protect this value.")] [SecurityCritical] SafeCloseHandleCritical tokenHandle; [Fx.Tag.SecurityNote(Critical = "Controls lifetime of token handle, caller must use care.")] [SecurityCritical] int refCount = 0; [Fx.Tag.SecurityNote(Critical = "Security critical field, caller must use care.")] [SecurityCritical] bool isImpersonated; [Fx.Tag.SecurityNote(Critical = "Calls two safe native methods under OpenCurrentThreadTokenCritical: GetCurrentThread and OpenThreadToken." + "Marshal.GetLastWin32Error captures current thread token in a SecurityCritical field.")] [SecurityCritical] public HostedImpersonationContext() { if (ServiceHostingEnvironment.AspNetCompatibilityEnabled) { int error; bool isSuccess = SafeNativeMethods.OpenCurrentThreadTokenCritical(TokenAccessLevels.Query | TokenAccessLevels.Impersonate, true, out tokenHandle, out error); if (isSuccess) { isImpersonated = true; Interlocked.Increment(ref refCount); } else { CloseInvalidOutSafeHandleCritical(tokenHandle); tokenHandle = null; if (error != SafeNativeMethods.ERROR_NO_TOKEN) { throw FxTrace.Exception.AsError(new Win32Exception(error, SR.Hosting_ImpersonationFailed)); } } } } [Fx.Tag.SecurityNote(Critical = "Calls SetHandleAsInvalid which has a LinkDemand for UnmanagedCode.")] [SecurityCritical] static void CloseInvalidOutSafeHandleCritical(SafeHandle handle) { // Workaround for 64-bit CLR bug VSWhidbey 546830 - sometimes invalid SafeHandles come back null. if (handle != null) { Fx.Assert(handle.IsInvalid, "CloseInvalidOutSafeHandle called with a valid handle!"); // Calls SuppressFinalize. handle.SetHandleAsInvalid(); } } public bool IsImpersonated { [Fx.Tag.SecurityNote(Critical = "Accesses SecurityCritical isImpersonated field.", Safe = "Does not leak control or mutable/harmful data, no potential for harm.")] [SecuritySafeCritical] get { return isImpersonated; } } [Fx.Tag.SecurityNote(Critical = "Accesses SecurityCritical tokenHandle field and uses LinkDemanded DangerousGetHandle method as well as UnsafeCreate." + "Caller should use with care, must take responsibility for reverting impersonation.")] [SecurityCritical] public IDisposable Impersonate() { if (!isImpersonated) return null; Fx.Assert(tokenHandle != null, "The token handle was incorrectly released earlier."); HostedInnerImpersonationContext context = null; lock(tokenHandle) { context = HostedInnerImpersonationContext.UnsafeCreate(tokenHandle.DangerousGetHandle()); GC.KeepAlive(tokenHandle); } return context; } [Fx.Tag.SecurityNote(Critical = "Controls lifetime of token handle, caller must use care.")] [SecurityCritical] public void AddRef() { if (IsImpersonated) { Interlocked.Increment(ref refCount); } } [Fx.Tag.SecurityNote(Critical = "Controls lifetime of token handle, caller must use care.")] [SecurityCritical] public void Release() { if (IsImpersonated) { Fx.Assert(tokenHandle != null, "The token handle is incorrectly released earlier."); int currentCount = Interlocked.Decrement(ref refCount); if (currentCount == 0) { lock(tokenHandle) { tokenHandle.Close(); tokenHandle = null; } } } } [Fx.Tag.SecurityNote(Critical = "Keeps track of impersonated user, caller must use with care and call Dispose at the appropriate time.")] #pragma warning disable 618 // have not moved to the v4 security model yet [SecurityCritical(SecurityCriticalScope.Everything)] #pragma warning restore 618 class HostedInnerImpersonationContext : IDisposable { IDisposable impersonatedContext; HostedInnerImpersonationContext(IDisposable impersonatedContext) { if (impersonatedContext == null) { throw FxTrace.Exception.AsError(new InvalidOperationException(SR.Hosting_ImpersonationFailed)); } this.impersonatedContext = impersonatedContext; } public static HostedInnerImpersonationContext UnsafeCreate(IntPtr token) { return new HostedInnerImpersonationContext(HostingEnvironmentWrapper.UnsafeImpersonate(token)); } public void Dispose() { if (impersonatedContext != null) { impersonatedContext.Dispose(); impersonatedContext = null; } } } } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007.
Link Menu
This book is available now!
Buy at Amazon US or
Buy at Amazon UK
- DbLambda.cs
- AbandonedMutexException.cs
- HtmlControl.cs
- XmlILStorageConverter.cs
- AvTrace.cs
- CommandTreeTypeHelper.cs
- HtmlWindow.cs
- Message.cs
- WebServiceTypeData.cs
- ListenerAdapter.cs
- InternalCache.cs
- DoubleConverter.cs
- CompatibleComparer.cs
- DataGridViewToolTip.cs
- RowSpanVector.cs
- JpegBitmapEncoder.cs
- TableLayout.cs
- TransformPattern.cs
- IdnElement.cs
- DataServiceKeyAttribute.cs
- ParallelDesigner.cs
- BulletChrome.cs
- RotateTransform3D.cs
- FlowDocumentPaginator.cs
- SrgsText.cs
- StorageInfo.cs
- HijriCalendar.cs
- LateBoundBitmapDecoder.cs
- RequestContext.cs
- Vector3DCollectionConverter.cs
- EventSetter.cs
- MimeReflector.cs
- StrokeNode.cs
- GridItemPattern.cs
- DateTimeFormatInfoScanner.cs
- safemediahandle.cs
- UniqueEventHelper.cs
- ToolTipAutomationPeer.cs
- GraphicsContext.cs
- StylusPoint.cs
- BindUriHelper.cs
- WebPartDescription.cs
- ToolStripRenderEventArgs.cs
- XPathDocumentNavigator.cs
- SignatureToken.cs
- SqlCacheDependencySection.cs
- MostlySingletonList.cs
- XmlElementList.cs
- CustomTrackingQuery.cs
- XmlSchemaGroupRef.cs
- DesignTimeParseData.cs
- XhtmlBasicPageAdapter.cs
- BinaryMessageEncodingBindingElement.cs
- DockAndAnchorLayout.cs
- DbSourceParameterCollection.cs
- GreenMethods.cs
- XPathChildIterator.cs
- RowType.cs
- WorkflowWebHostingModule.cs
- UrlPath.cs
- PermissionSet.cs
- CustomAttribute.cs
- AsyncStreamReader.cs
- JpegBitmapDecoder.cs
- PointIndependentAnimationStorage.cs
- DbDataAdapter.cs
- XPathSelfQuery.cs
- DrawingGroup.cs
- TextTabProperties.cs
- HttpCapabilitiesBase.cs
- TileBrush.cs
- XmlCharacterData.cs
- ReadOnlyAttribute.cs
- FontNamesConverter.cs
- ExpressionBuilder.cs
- SamlAuthorizationDecisionStatement.cs
- BufferedGraphics.cs
- ModuleBuilder.cs
- ChangeNode.cs
- BinaryUtilClasses.cs
- NameTable.cs
- DataGridViewIntLinkedList.cs
- VBCodeProvider.cs
- RightsManagementEncryptionTransform.cs
- AttributeCollection.cs
- Stream.cs
- InvariantComparer.cs
- TwoPhaseCommitProxy.cs
- ValidationHelper.cs
- PreProcessInputEventArgs.cs
- OutKeywords.cs
- TraceLog.cs
- UnsafeNativeMethods.cs
- UseAttributeSetsAction.cs
- RuleConditionDialog.cs
- ValidationEventArgs.cs
- ApplicationBuildProvider.cs
- SQLDateTime.cs
- AddInDeploymentState.cs
- LinkClickEvent.cs