Code:
/ Dotnetfx_Vista_SP2 / Dotnetfx_Vista_SP2 / 8.0.50727.4016 / DEVDIV / depot / DevDiv / releases / whidbey / NetFxQFE / ndp / fx / src / xsp / System / Web / Security / RoleManagerModule.cs / 1 / RoleManagerModule.cs
//------------------------------------------------------------------------------ //// Copyright (c) Microsoft Corporation. All rights reserved. // //----------------------------------------------------------------------------- /* * RoleManagerModule class * * Copyright (c) 1999 Microsoft Corporation */ namespace System.Web.Security { using System.Collections; using System.Security.Principal; using System.Security.Permissions; using System.Text; using System.Threading; using System.Web; using System.Web.Configuration; using System.Web.Caching; using System.Web.Util; ////// [AspNetHostingPermission(SecurityAction.LinkDemand, Level=AspNetHostingPermissionLevel.Minimal)] public sealed class RoleManagerModule : IHttpModule { private const int MAX_COOKIE_LENGTH = 4096; private RoleManagerEventHandler _eventHandler; ///[To be supplied.] ////// [SecurityPermission(SecurityAction.Demand, Unrestricted=true)] public RoleManagerModule() { } public event RoleManagerEventHandler GetRoles { add { HttpRuntime.CheckAspNetHostingPermission(AspNetHostingPermissionLevel.Low, SR.Feature_not_supported_at_this_level); _eventHandler += value; } remove { _eventHandler -= value; } } ////// Initializes a new instance of the ////// class. /// /// public void Dispose() { } ///[To be supplied.] ////// public void Init(HttpApplication app) { // for IIS 7, skip wireup of these delegates altogether unless the // feature is enabled for this application // this avoids the initial OnEnter transition unless it's needed if (Roles.Enabled) { app.PostAuthenticateRequest += new EventHandler(this.OnEnter); app.EndRequest += new EventHandler(this.OnLeave); } } //////////////////////////////////////////////////////////// //////////////////////////////////////////////////////////// //////////////////////////////////////////////////////////// ///[To be supplied.] ////// private void OnEnter(Object source, EventArgs eventArgs) { if (!Roles.Enabled) { if (HttpRuntime.UseIntegratedPipeline) { ((HttpApplication)source).Context.DisableNotifications(RequestNotification.EndRequest, 0); } return; } HttpApplication app = (HttpApplication)source; HttpContext context = app.Context; if (_eventHandler != null) { RoleManagerEventArgs e = new RoleManagerEventArgs(context); _eventHandler(this, e); if (e.RolesPopulated) return; } Debug.Assert(null != context.User, "null != context.User"); if (Roles.CacheRolesInCookie) { if (context.User.Identity.IsAuthenticated && (!Roles.CookieRequireSSL || context.Request.IsSecureConnection)) { // Try to create from cookie try { HttpCookie cookie = context.Request.Cookies[Roles.CookieName]; if (cookie != null) { string cookieValue = cookie.Value; // Ignore cookies that are too long if (cookieValue != null && cookieValue.Length > MAX_COOKIE_LENGTH) { Roles.DeleteCookie(); } else { if (!String.IsNullOrEmpty(Roles.CookiePath) && Roles.CookiePath != "/") { cookie.Path = Roles.CookiePath; } cookie.Domain = Roles.Domain; context.User = new RolePrincipal(context.User.Identity, cookieValue); } } } catch { } // skip exceptions } else { if (context.Request.Cookies[Roles.CookieName] != null) Roles.DeleteCookie(); // if we're not using cookie caching, we don't need the EndRequest // event and can suppress it if (HttpRuntime.UseIntegratedPipeline) { context.DisableNotifications(RequestNotification.EndRequest, 0); } } } if (!(context.User is RolePrincipal)) context.User = new RolePrincipal(context.User.Identity); Thread.CurrentPrincipal = context.User; } private void OnLeave(Object source, EventArgs eventArgs) { HttpApplication app; HttpContext context; app = (HttpApplication)source; context = app.Context; if (!Roles.Enabled || !Roles.CacheRolesInCookie || context.Response.HeadersWritten) return; if (context.User == null || !(context.User is RolePrincipal) || !context.User.Identity.IsAuthenticated) return; if (Roles.CookieRequireSSL && !context.Request.IsSecureConnection) { // if cookie is sent, then clear it if (context.Request.Cookies[Roles.CookieName] != null) Roles.DeleteCookie(); return; } RolePrincipal rp = (RolePrincipal) context.User; if (rp.CachedListChanged && context.Request.Browser.Cookies) { string s = rp.ToEncryptedTicket(); if (string.IsNullOrEmpty(s) || s.Length > MAX_COOKIE_LENGTH) { Roles.DeleteCookie(); } else { HttpCookie cookie = new HttpCookie(Roles.CookieName, s); cookie.HttpOnly = true; cookie.Path = Roles.CookiePath; cookie.Domain = Roles.Domain; if (Roles.CreatePersistentCookie) cookie.Expires = rp.ExpireDate; cookie.Secure = Roles.CookieRequireSSL; context.Response.Cookies.Add(cookie); } } } //////////////////////////////////////////////////////////// //////////////////////////////////////////////////////////// //////////////////////////////////////////////////////////// } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007. //------------------------------------------------------------------------------ //[To be supplied.] ///// Copyright (c) Microsoft Corporation. All rights reserved. // //----------------------------------------------------------------------------- /* * RoleManagerModule class * * Copyright (c) 1999 Microsoft Corporation */ namespace System.Web.Security { using System.Collections; using System.Security.Principal; using System.Security.Permissions; using System.Text; using System.Threading; using System.Web; using System.Web.Configuration; using System.Web.Caching; using System.Web.Util; ////// [AspNetHostingPermission(SecurityAction.LinkDemand, Level=AspNetHostingPermissionLevel.Minimal)] public sealed class RoleManagerModule : IHttpModule { private const int MAX_COOKIE_LENGTH = 4096; private RoleManagerEventHandler _eventHandler; ///[To be supplied.] ////// [SecurityPermission(SecurityAction.Demand, Unrestricted=true)] public RoleManagerModule() { } public event RoleManagerEventHandler GetRoles { add { HttpRuntime.CheckAspNetHostingPermission(AspNetHostingPermissionLevel.Low, SR.Feature_not_supported_at_this_level); _eventHandler += value; } remove { _eventHandler -= value; } } ////// Initializes a new instance of the ////// class. /// /// public void Dispose() { } ///[To be supplied.] ////// public void Init(HttpApplication app) { // for IIS 7, skip wireup of these delegates altogether unless the // feature is enabled for this application // this avoids the initial OnEnter transition unless it's needed if (Roles.Enabled) { app.PostAuthenticateRequest += new EventHandler(this.OnEnter); app.EndRequest += new EventHandler(this.OnLeave); } } //////////////////////////////////////////////////////////// //////////////////////////////////////////////////////////// //////////////////////////////////////////////////////////// ///[To be supplied.] ////// private void OnEnter(Object source, EventArgs eventArgs) { if (!Roles.Enabled) { if (HttpRuntime.UseIntegratedPipeline) { ((HttpApplication)source).Context.DisableNotifications(RequestNotification.EndRequest, 0); } return; } HttpApplication app = (HttpApplication)source; HttpContext context = app.Context; if (_eventHandler != null) { RoleManagerEventArgs e = new RoleManagerEventArgs(context); _eventHandler(this, e); if (e.RolesPopulated) return; } Debug.Assert(null != context.User, "null != context.User"); if (Roles.CacheRolesInCookie) { if (context.User.Identity.IsAuthenticated && (!Roles.CookieRequireSSL || context.Request.IsSecureConnection)) { // Try to create from cookie try { HttpCookie cookie = context.Request.Cookies[Roles.CookieName]; if (cookie != null) { string cookieValue = cookie.Value; // Ignore cookies that are too long if (cookieValue != null && cookieValue.Length > MAX_COOKIE_LENGTH) { Roles.DeleteCookie(); } else { if (!String.IsNullOrEmpty(Roles.CookiePath) && Roles.CookiePath != "/") { cookie.Path = Roles.CookiePath; } cookie.Domain = Roles.Domain; context.User = new RolePrincipal(context.User.Identity, cookieValue); } } } catch { } // skip exceptions } else { if (context.Request.Cookies[Roles.CookieName] != null) Roles.DeleteCookie(); // if we're not using cookie caching, we don't need the EndRequest // event and can suppress it if (HttpRuntime.UseIntegratedPipeline) { context.DisableNotifications(RequestNotification.EndRequest, 0); } } } if (!(context.User is RolePrincipal)) context.User = new RolePrincipal(context.User.Identity); Thread.CurrentPrincipal = context.User; } private void OnLeave(Object source, EventArgs eventArgs) { HttpApplication app; HttpContext context; app = (HttpApplication)source; context = app.Context; if (!Roles.Enabled || !Roles.CacheRolesInCookie || context.Response.HeadersWritten) return; if (context.User == null || !(context.User is RolePrincipal) || !context.User.Identity.IsAuthenticated) return; if (Roles.CookieRequireSSL && !context.Request.IsSecureConnection) { // if cookie is sent, then clear it if (context.Request.Cookies[Roles.CookieName] != null) Roles.DeleteCookie(); return; } RolePrincipal rp = (RolePrincipal) context.User; if (rp.CachedListChanged && context.Request.Browser.Cookies) { string s = rp.ToEncryptedTicket(); if (string.IsNullOrEmpty(s) || s.Length > MAX_COOKIE_LENGTH) { Roles.DeleteCookie(); } else { HttpCookie cookie = new HttpCookie(Roles.CookieName, s); cookie.HttpOnly = true; cookie.Path = Roles.CookiePath; cookie.Domain = Roles.Domain; if (Roles.CreatePersistentCookie) cookie.Expires = rp.ExpireDate; cookie.Secure = Roles.CookieRequireSSL; context.Response.Cookies.Add(cookie); } } } //////////////////////////////////////////////////////////// //////////////////////////////////////////////////////////// //////////////////////////////////////////////////////////// } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007.[To be supplied.] ///
Link Menu

This book is available now!
Buy at Amazon US or
Buy at Amazon UK
- Visual3D.cs
- XmlSchemaIdentityConstraint.cs
- shaperfactory.cs
- HierarchicalDataBoundControl.cs
- AffineTransform3D.cs
- DocumentViewerHelper.cs
- HttpHeaderCollection.cs
- Module.cs
- Subtree.cs
- NonClientArea.cs
- ClientScriptManager.cs
- HtmlImage.cs
- IDQuery.cs
- OrderingInfo.cs
- ToolStripArrowRenderEventArgs.cs
- AbsoluteQuery.cs
- MethodBuilder.cs
- FixedPageProcessor.cs
- CodeNamespace.cs
- RSATokenProvider.cs
- PictureBox.cs
- JournalEntry.cs
- DbConnectionFactory.cs
- ErrorTableItemStyle.cs
- DBSqlParser.cs
- SoapWriter.cs
- DrawItemEvent.cs
- Evaluator.cs
- Delegate.cs
- DocumentOrderQuery.cs
- GlobalProxySelection.cs
- TextStore.cs
- UnaryNode.cs
- InstancePersistence.cs
- RangeBase.cs
- CounterSample.cs
- HttpContext.cs
- IndexedDataBuffer.cs
- ColumnWidthChangedEvent.cs
- SqlGatherConsumedAliases.cs
- DataAdapter.cs
- EventBuilder.cs
- NativeMethods.cs
- PtsContext.cs
- MediaElement.cs
- FlowchartDesigner.xaml.cs
- XPathNodeHelper.cs
- SoapCommonClasses.cs
- SBCSCodePageEncoding.cs
- WinEventTracker.cs
- DataFormats.cs
- PointHitTestParameters.cs
- GridView.cs
- PropertyBuilder.cs
- ProviderUtil.cs
- SelectedGridItemChangedEvent.cs
- Vector3dCollection.cs
- UnsafeNativeMethods.cs
- InheritanceContextChangedEventManager.cs
- SafeFindHandle.cs
- RegexTree.cs
- MimeWriter.cs
- StandardTransformFactory.cs
- ModuleConfigurationInfo.cs
- IgnoreFlushAndCloseStream.cs
- HostProtectionException.cs
- LogRecordSequence.cs
- DesignerCategoryAttribute.cs
- ColumnReorderedEventArgs.cs
- InputLanguageManager.cs
- CompilerCollection.cs
- AutomationIdentifierGuids.cs
- DebugView.cs
- SpecialNameAttribute.cs
- TextElementEnumerator.cs
- RequestCachePolicyConverter.cs
- Literal.cs
- SmiEventSink_Default.cs
- ReadOnlyObservableCollection.cs
- RichTextBox.cs
- StorageFunctionMapping.cs
- SegmentInfo.cs
- ByteBufferPool.cs
- GuidConverter.cs
- SettingsContext.cs
- RTTrackingProfile.cs
- EventProviderClassic.cs
- DispatchProxy.cs
- CellTreeNodeVisitors.cs
- OverflowException.cs
- RegexTree.cs
- BitmapEffect.cs
- mda.cs
- EditingMode.cs
- LineServicesCallbacks.cs
- InkCanvasAutomationPeer.cs
- CompatibleComparer.cs
- UICuesEvent.cs
- CLSCompliantAttribute.cs
- EncryptedKey.cs