Code:
/ Dotnetfx_Vista_SP2 / Dotnetfx_Vista_SP2 / 8.0.50727.4016 / DEVDIV / depot / DevDiv / releases / whidbey / NetFxQFE / ndp / fx / src / xsp / System / Web / Configuration / AuthorizationRuleCollection.cs / 1 / AuthorizationRuleCollection.cs
//------------------------------------------------------------------------------ //// Copyright (c) Microsoft Corporation. All rights reserved. // //----------------------------------------------------------------------------- namespace System.Web.Configuration { using System; using System.Xml; using System.Configuration; using System.Collections.Specialized; using System.Collections; using System.Globalization; using System.IO; using System.Text; using System.Security.Principal; using System.Web.Util; using System.ComponentModel; using System.Security.Permissions; [ConfigurationCollection(typeof(AuthorizationRule), AddItemName = "allow,deny", CollectionType = ConfigurationElementCollectionType.BasicMapAlternate)] [AspNetHostingPermission(SecurityAction.LinkDemand, Level=AspNetHostingPermissionLevel.Minimal)] public sealed class AuthorizationRuleCollection : ConfigurationElementCollection { private static ConfigurationPropertyCollection _properties; static AuthorizationRuleCollection() { _properties = new ConfigurationPropertyCollection(); } public AuthorizationRuleCollection() { } protected override ConfigurationPropertyCollection Properties { get { return _properties; } } // public properties public AuthorizationRule this[int index] { get { return (AuthorizationRule)BaseGet(index); } set { if (BaseGet(index) != null) { BaseRemoveAt(index); } BaseAdd(index, value); } } // Protected Overrides protected override ConfigurationElement CreateNewElement() { return new AuthorizationRule(); } protected override ConfigurationElement CreateNewElement(string elementName) { AuthorizationRule newElement = new AuthorizationRule(); switch (elementName.ToLower(CultureInfo.InvariantCulture)) { case "allow": newElement.Action = AuthorizationRuleAction.Allow; break; case "deny": newElement.Action = AuthorizationRuleAction.Deny; break; } return newElement; } protected override Object GetElementKey(ConfigurationElement element) { AuthorizationRule rule = (AuthorizationRule)element; return rule._ActionString; } protected override string ElementName { get { return String.Empty; //_LookUpInElement_ } } public override ConfigurationElementCollectionType CollectionType { get { return ConfigurationElementCollectionType.BasicMapAlternate; } } // IsElement name allows collection with multiple element names to // exist with the base class architecture. Given an element name // it simply returns true if the name is legal for the default collection // or false otherwise. protected override bool IsElementName(string elementname) { bool IsElement = false; switch (elementname.ToLower(CultureInfo.InvariantCulture)) { case "allow": case "deny": IsElement = true; break; } return IsElement; } internal bool IsUserAllowed(IPrincipal user, String verb) { if (user == null) { return false; } if (!_fCheckForCommonCasesDone) { DoCheckForCommonCases(); _fCheckForCommonCasesDone = true; } if (!user.Identity.IsAuthenticated && _iAnonymousAllowed != 0) return (_iAnonymousAllowed > 0); if (_iAllUsersAllowed != 0) return (_iAllUsersAllowed > 0); // Go down the list permissions and check each one foreach (AuthorizationRule rule in this) { int result = rule.IsUserAllowed(user, verb); if (result != 0) return (result > 0); } return false; } private void DoCheckForCommonCases() { bool fStillLookingForAnonymous = true; bool fAnyAllowRulesFound = false; bool fAnyDenyRulesFound = false; foreach (AuthorizationRule rule in this) { if (rule.Everyone) // Found a rule for Every-user { if (!fAnyAllowRulesFound && rule.Action == AuthorizationRuleAction.Deny) _iAllUsersAllowed = -1; if (!fAnyDenyRulesFound && rule.Action == AuthorizationRuleAction.Allow) _iAllUsersAllowed = 1; return; // done! } if (fStillLookingForAnonymous && rule.IncludesAnonymous) // Found a rule for anonymous-user { if (!fAnyAllowRulesFound && rule.Action == AuthorizationRuleAction.Deny) _iAnonymousAllowed = -1; if (!fAnyDenyRulesFound && rule.Action == AuthorizationRuleAction.Allow) _iAnonymousAllowed = 1; fStillLookingForAnonymous = false; } if (!fAnyAllowRulesFound && rule.Action == AuthorizationRuleAction.Allow) fAnyAllowRulesFound = true; if (!fAnyDenyRulesFound && rule.Action == AuthorizationRuleAction.Deny) fAnyDenyRulesFound = true; if (!fStillLookingForAnonymous && fAnyAllowRulesFound && fAnyDenyRulesFound) return; } } // public methods public void Add(AuthorizationRule rule) { BaseAdd(-1, rule); // add to the end of the list and dont overwrite dups! } public void Clear() { BaseClear(); } public AuthorizationRule Get(int index) { return (AuthorizationRule)BaseGet(index); } public void RemoveAt(int index) { BaseRemoveAt(index); } public void Set(int index, AuthorizationRule rule) { BaseAdd(index, rule); } public int IndexOf(AuthorizationRule rule) { for (int x = 0; x < Count; x++) { if (Object.Equals(Get(x), rule)) { return x; } } return -1; } public void Remove(AuthorizationRule rule) { int index = IndexOf(rule); if (index >= 0) { BaseRemoveAt(index); } } private int _iAllUsersAllowed = 0; private int _iAnonymousAllowed = 0; private bool _fCheckForCommonCasesDone = false; } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007. //------------------------------------------------------------------------------ //// Copyright (c) Microsoft Corporation. All rights reserved. // //----------------------------------------------------------------------------- namespace System.Web.Configuration { using System; using System.Xml; using System.Configuration; using System.Collections.Specialized; using System.Collections; using System.Globalization; using System.IO; using System.Text; using System.Security.Principal; using System.Web.Util; using System.ComponentModel; using System.Security.Permissions; [ConfigurationCollection(typeof(AuthorizationRule), AddItemName = "allow,deny", CollectionType = ConfigurationElementCollectionType.BasicMapAlternate)] [AspNetHostingPermission(SecurityAction.LinkDemand, Level=AspNetHostingPermissionLevel.Minimal)] public sealed class AuthorizationRuleCollection : ConfigurationElementCollection { private static ConfigurationPropertyCollection _properties; static AuthorizationRuleCollection() { _properties = new ConfigurationPropertyCollection(); } public AuthorizationRuleCollection() { } protected override ConfigurationPropertyCollection Properties { get { return _properties; } } // public properties public AuthorizationRule this[int index] { get { return (AuthorizationRule)BaseGet(index); } set { if (BaseGet(index) != null) { BaseRemoveAt(index); } BaseAdd(index, value); } } // Protected Overrides protected override ConfigurationElement CreateNewElement() { return new AuthorizationRule(); } protected override ConfigurationElement CreateNewElement(string elementName) { AuthorizationRule newElement = new AuthorizationRule(); switch (elementName.ToLower(CultureInfo.InvariantCulture)) { case "allow": newElement.Action = AuthorizationRuleAction.Allow; break; case "deny": newElement.Action = AuthorizationRuleAction.Deny; break; } return newElement; } protected override Object GetElementKey(ConfigurationElement element) { AuthorizationRule rule = (AuthorizationRule)element; return rule._ActionString; } protected override string ElementName { get { return String.Empty; //_LookUpInElement_ } } public override ConfigurationElementCollectionType CollectionType { get { return ConfigurationElementCollectionType.BasicMapAlternate; } } // IsElement name allows collection with multiple element names to // exist with the base class architecture. Given an element name // it simply returns true if the name is legal for the default collection // or false otherwise. protected override bool IsElementName(string elementname) { bool IsElement = false; switch (elementname.ToLower(CultureInfo.InvariantCulture)) { case "allow": case "deny": IsElement = true; break; } return IsElement; } internal bool IsUserAllowed(IPrincipal user, String verb) { if (user == null) { return false; } if (!_fCheckForCommonCasesDone) { DoCheckForCommonCases(); _fCheckForCommonCasesDone = true; } if (!user.Identity.IsAuthenticated && _iAnonymousAllowed != 0) return (_iAnonymousAllowed > 0); if (_iAllUsersAllowed != 0) return (_iAllUsersAllowed > 0); // Go down the list permissions and check each one foreach (AuthorizationRule rule in this) { int result = rule.IsUserAllowed(user, verb); if (result != 0) return (result > 0); } return false; } private void DoCheckForCommonCases() { bool fStillLookingForAnonymous = true; bool fAnyAllowRulesFound = false; bool fAnyDenyRulesFound = false; foreach (AuthorizationRule rule in this) { if (rule.Everyone) // Found a rule for Every-user { if (!fAnyAllowRulesFound && rule.Action == AuthorizationRuleAction.Deny) _iAllUsersAllowed = -1; if (!fAnyDenyRulesFound && rule.Action == AuthorizationRuleAction.Allow) _iAllUsersAllowed = 1; return; // done! } if (fStillLookingForAnonymous && rule.IncludesAnonymous) // Found a rule for anonymous-user { if (!fAnyAllowRulesFound && rule.Action == AuthorizationRuleAction.Deny) _iAnonymousAllowed = -1; if (!fAnyDenyRulesFound && rule.Action == AuthorizationRuleAction.Allow) _iAnonymousAllowed = 1; fStillLookingForAnonymous = false; } if (!fAnyAllowRulesFound && rule.Action == AuthorizationRuleAction.Allow) fAnyAllowRulesFound = true; if (!fAnyDenyRulesFound && rule.Action == AuthorizationRuleAction.Deny) fAnyDenyRulesFound = true; if (!fStillLookingForAnonymous && fAnyAllowRulesFound && fAnyDenyRulesFound) return; } } // public methods public void Add(AuthorizationRule rule) { BaseAdd(-1, rule); // add to the end of the list and dont overwrite dups! } public void Clear() { BaseClear(); } public AuthorizationRule Get(int index) { return (AuthorizationRule)BaseGet(index); } public void RemoveAt(int index) { BaseRemoveAt(index); } public void Set(int index, AuthorizationRule rule) { BaseAdd(index, rule); } public int IndexOf(AuthorizationRule rule) { for (int x = 0; x < Count; x++) { if (Object.Equals(Get(x), rule)) { return x; } } return -1; } public void Remove(AuthorizationRule rule) { int index = IndexOf(rule); if (index >= 0) { BaseRemoveAt(index); } } private int _iAllUsersAllowed = 0; private int _iAnonymousAllowed = 0; private bool _fCheckForCommonCasesDone = false; } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007.
Link Menu
This book is available now!
Buy at Amazon US or
Buy at Amazon UK
- RegistrySecurity.cs
- UnrecognizedAssertionsBindingElement.cs
- WindowsListViewGroupSubsetLink.cs
- SQLMoneyStorage.cs
- QilValidationVisitor.cs
- PiiTraceSource.cs
- SystemResourceKey.cs
- WindowsListViewGroupHelper.cs
- Subtree.cs
- XmlReaderDelegator.cs
- SqlFunctionAttribute.cs
- DataConnectionHelper.cs
- NonParentingControl.cs
- MembershipUser.cs
- SQLChars.cs
- CodeNamespaceImportCollection.cs
- Point4DConverter.cs
- InternalResources.cs
- ProcessRequestArgs.cs
- PropertyChangedEventArgs.cs
- WebPartManager.cs
- WebMessageBodyStyleHelper.cs
- DataControlField.cs
- PopupEventArgs.cs
- LogLogRecordEnumerator.cs
- DateRangeEvent.cs
- ResourceSet.cs
- ToolStripContainer.cs
- SqlInternalConnectionTds.cs
- GradientSpreadMethodValidation.cs
- TextDecoration.cs
- HttpException.cs
- TemplateField.cs
- HtmlPhoneCallAdapter.cs
- MenuItemStyle.cs
- TrackBar.cs
- PageFunction.cs
- GroupStyle.cs
- SaveFileDialog.cs
- TagMapCollection.cs
- PassportAuthenticationModule.cs
- ClientCultureInfo.cs
- MessageQueueAccessControlEntry.cs
- DataGridPageChangedEventArgs.cs
- ListMarkerSourceInfo.cs
- SchemaImporterExtensionsSection.cs
- CachedRequestParams.cs
- VBIdentifierNameEditor.cs
- TextServicesCompartment.cs
- ImageBrush.cs
- SinglePageViewer.cs
- PeerNameRegistration.cs
- WebServiceErrorEvent.cs
- XPathParser.cs
- LogSwitch.cs
- HandleRef.cs
- TypeContext.cs
- ComboBox.cs
- ConfigurationStrings.cs
- LabelLiteral.cs
- SchemaConstraints.cs
- WebPartManager.cs
- RenderingEventArgs.cs
- EntitySqlQueryBuilder.cs
- RegularExpressionValidator.cs
- InstalledVoice.cs
- X509CertificateCollection.cs
- DbReferenceCollection.cs
- DbTransaction.cs
- EndPoint.cs
- Environment.cs
- ParallelTimeline.cs
- DataList.cs
- RegularExpressionValidator.cs
- OleDbErrorCollection.cs
- Signature.cs
- Serializer.cs
- PasswordBoxAutomationPeer.cs
- ImageCollectionCodeDomSerializer.cs
- Evidence.cs
- SqlTypeSystemProvider.cs
- FileVersionInfo.cs
- DataGridPageChangedEventArgs.cs
- Transform3DGroup.cs
- SubclassTypeValidatorAttribute.cs
- CodeDomSerializer.cs
- SoapSchemaMember.cs
- DataGridViewCheckBoxColumn.cs
- SynchronizationHandlesCodeDomSerializer.cs
- DocumentGrid.cs
- sqlcontext.cs
- OleDbPermission.cs
- MachineKeyValidationConverter.cs
- EntityModelBuildProvider.cs
- CursorInteropHelper.cs
- X509CertificateCollection.cs
- LogicalExpr.cs
- Parameter.cs
- UserUseLicenseDictionaryLoader.cs
- ClientEventManager.cs