Code:
/ 4.0 / 4.0 / DEVDIV_TFS / Dev10 / Releases / RTMRel / ndp / fx / src / AddIn / AddIn / System / Addin / Hosting / AddInServer.cs / 1305376 / AddInServer.cs
// ==++== // // Copyright (c) Microsoft Corporation. All rights reserved. // // ==--== /*============================================================ ** ** Class: AddInServer ** ** Purpose: Created in the remote process, this worker is ** used to start up & shut down the add-in. ** ===========================================================*/ using System; using System.AddIn; using System.AddIn.Contract; using System.AddIn.Hosting; using System.AddIn.Pipeline; using System.Collections.Generic; using System.ComponentModel; using System.Diagnostics; using System.Diagnostics.CodeAnalysis; using System.IO; using System.Reflection; using System.Runtime.Remoting; using System.Security; using System.Security.Permissions; using System.Threading; using System.Diagnostics.Contracts; namespace System.AddIn.Hosting { [SuppressMessage("Microsoft.Performance","CA1812:AvoidUninstantiatedInternalClasses", Justification="Instantiation is via remoting")] internal sealed class AddInServer : MarshalByRefObject { private int _addInAppDomains = 0; private volatile bool _startedExitProcess = false; // This serves as a MBRO that can send the ShuttingDown event back to the client private EventWorker _eventWorker; public void Initialize(EventWorker eventWorker) { _eventWorker = eventWorker; } //// [System.Security.SecuritySafeCritical] public AddInServerWorker CreateDomain(AddInToken token, PermissionSet permissionSet) { AppDomain domain; AppDomainSetup setup = new AppDomainSetup(); setup.ApplicationBase = Path.GetDirectoryName(token._addin.Location); setup.ConfigurationFile = token._addin.Location + ".config"; Assembly sysCore = typeof(AddInActivator).Assembly; domain = AppDomain.CreateDomain(token.Name, AppDomain.CurrentDomain.Evidence, setup, permissionSet, AddInActivator.CreateStrongName(sysCore)); // Grant full trust to System.Core.dll // Ensure we load System.Core.dll in this new AD. domain.Load(sysCore.FullName); ObjectHandle workerHandle = Activator.CreateInstance(domain, sysCore.FullName, typeof(AddInServerWorker).FullName); AddInServerWorker server = (AddInServerWorker)workerHandle.Unwrap(); server.AddInServer = this; Interlocked.Increment(ref _addInAppDomains); return server; } public void ExitProcess() { // set flag so that we don't call back to host from finalizers _startedExitProcess = true; // This is called in the full-trust appdomain, so no assert is needed. Environment.Exit(0); } public void AddInDomainFinalized() { long val = Interlocked.Decrement(ref _addInAppDomains); if (!_startedExitProcess && val == 0) { try { // the host will call ExitProcess here if it is not cancelled _eventWorker.SendShutdownMessage(); } catch (RemotingException) { // the application likely has shut down itself. // The main thread will shut down this app } } } // Don't let this object time out in Remoting. public override Object InitializeLifetimeService() { return null; } } [SuppressMessage("Microsoft.Performance","CA1812:AvoidUninstantiatedInternalClasses", Justification="Instantiation is via remoting")] [System.Diagnostics.CodeAnalysis.SuppressMessage("Microsoft.Security", "CA2128:SecurityTransparentCodeShouldNotAssert", Justification = "This is a SecurityRules.Level1 assembly, in which this rule is being incorrectly applied")] internal sealed class AddInServerWorker : MarshalByRefObject { AddInServer _addInServer; [SuppressMessage("Microsoft.Security","CA2128:SecurityTransparentCodeShouldNotAssert", Justification="SafeCritical code can Assert")] [System.Security.SecuritySafeCritical] public AddInServerWorker() { PermissionSet permissionSet = new PermissionSet(PermissionState.None); permissionSet.AddPermission(new SecurityPermission(SecurityPermissionFlag.ControlPrincipal)); permissionSet.AddPermission(new SecurityPermission(SecurityPermissionFlag.UnmanagedCode)); permissionSet.AddPermission(new ReflectionPermission(PermissionState.Unrestricted)); permissionSet.Assert(); // without this call to initialize the client channel, this object cannot be remoted RemotingHelper.InitializeClientChannel(); } //// // // [System.Diagnostics.CodeAnalysis.SuppressMessage("Microsoft.Performance", "CA1822:MarkMembersAsStatic", Justification="Needs to be instance for remoting"), System.Diagnostics.CodeAnalysis.SuppressMessage("Microsoft.Security", "CA2122:DoNotIndirectlyExposeMethodsWithLinkDemands", Justification = "Reviewed")] [System.Security.SecuritySafeCritical] [System.Diagnostics.CodeAnalysis.SuppressMessage("Microsoft.Security", "CA2128:SecurityTransparentCodeShouldNotAssert", Justification = "This is a SecurityRules.Level1 assembly, in which this rule is being incorrectly applied")] public void SetAppDomainOwner(IContract contract) { new SecurityPermission(SecurityPermissionFlag.ControlAppDomain).Assert(); AppDomain.CurrentDomain.SetData(ContractHandle.s_appDomainOwner, contract); } public AddInServer AddInServer { set { _addInServer = value; } } [System.Diagnostics.CodeAnalysis.SuppressMessage("Microsoft.Performance", "CA1822:MarkMembersAsStatic", Justification="Needs to be instance for remoting")] public IContract Activate(AddInToken pipeline, out ActivationWorker worker) { worker = new ActivationWorker(pipeline); IContract contract = worker.Activate(); return contract; } // Don't let this object time out in Remoting. public override Object InitializeLifetimeService() { return null; } //// // // [System.Diagnostics.CodeAnalysis.SuppressMessage("Microsoft.Performance", "CA1822:MarkMembersAsStatic", Justification="Needs to be instance for remoting")] [System.Security.SecurityCritical] public void UnloadAppDomain() { SecurityPermission permission = new SecurityPermission(SecurityPermissionFlag.ControlAppDomain); permission.Assert(); AppDomain.Unload(AppDomain.CurrentDomain); // thread will be aborted } //This appdomain must be going away //// // [System.Security.SecurityCritical] ~AddInServerWorker() { if (_addInServer != null) { _addInServer.AddInDomainFinalized(); } } } internal sealed class EventWorker : MarshalByRefObject { AddInProcess _process; public EventWorker(AddInProcess process) { _process = process; } public bool SendShutdownMessage() { CancelEventArgs args = new CancelEventArgs(); _process.SendShuttingDown(args); return args.Cancel; } } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007. // ==++== // // Copyright (c) Microsoft Corporation. All rights reserved. // // ==--== /*============================================================ ** ** Class: AddInServer ** ** Purpose: Created in the remote process, this worker is ** used to start up & shut down the add-in. ** ===========================================================*/ using System; using System.AddIn; using System.AddIn.Contract; using System.AddIn.Hosting; using System.AddIn.Pipeline; using System.Collections.Generic; using System.ComponentModel; using System.Diagnostics; using System.Diagnostics.CodeAnalysis; using System.IO; using System.Reflection; using System.Runtime.Remoting; using System.Security; using System.Security.Permissions; using System.Threading; using System.Diagnostics.Contracts; namespace System.AddIn.Hosting { [SuppressMessage("Microsoft.Performance","CA1812:AvoidUninstantiatedInternalClasses", Justification="Instantiation is via remoting")] internal sealed class AddInServer : MarshalByRefObject { private int _addInAppDomains = 0; private volatile bool _startedExitProcess = false; // This serves as a MBRO that can send the ShuttingDown event back to the client private EventWorker _eventWorker; public void Initialize(EventWorker eventWorker) { _eventWorker = eventWorker; } //// // [System.Security.SecuritySafeCritical] public AddInServerWorker CreateDomain(AddInToken token, PermissionSet permissionSet) { AppDomain domain; AppDomainSetup setup = new AppDomainSetup(); setup.ApplicationBase = Path.GetDirectoryName(token._addin.Location); setup.ConfigurationFile = token._addin.Location + ".config"; Assembly sysCore = typeof(AddInActivator).Assembly; domain = AppDomain.CreateDomain(token.Name, AppDomain.CurrentDomain.Evidence, setup, permissionSet, AddInActivator.CreateStrongName(sysCore)); // Grant full trust to System.Core.dll // Ensure we load System.Core.dll in this new AD. domain.Load(sysCore.FullName); ObjectHandle workerHandle = Activator.CreateInstance(domain, sysCore.FullName, typeof(AddInServerWorker).FullName); AddInServerWorker server = (AddInServerWorker)workerHandle.Unwrap(); server.AddInServer = this; Interlocked.Increment(ref _addInAppDomains); return server; } public void ExitProcess() { // set flag so that we don't call back to host from finalizers _startedExitProcess = true; // This is called in the full-trust appdomain, so no assert is needed. Environment.Exit(0); } public void AddInDomainFinalized() { long val = Interlocked.Decrement(ref _addInAppDomains); if (!_startedExitProcess && val == 0) { try { // the host will call ExitProcess here if it is not cancelled _eventWorker.SendShutdownMessage(); } catch (RemotingException) { // the application likely has shut down itself. // The main thread will shut down this app } } } // Don't let this object time out in Remoting. public override Object InitializeLifetimeService() { return null; } } [SuppressMessage("Microsoft.Performance","CA1812:AvoidUninstantiatedInternalClasses", Justification="Instantiation is via remoting")] [System.Diagnostics.CodeAnalysis.SuppressMessage("Microsoft.Security", "CA2128:SecurityTransparentCodeShouldNotAssert", Justification = "This is a SecurityRules.Level1 assembly, in which this rule is being incorrectly applied")] internal sealed class AddInServerWorker : MarshalByRefObject { AddInServer _addInServer; [SuppressMessage("Microsoft.Security","CA2128:SecurityTransparentCodeShouldNotAssert", Justification="SafeCritical code can Assert")] [System.Security.SecuritySafeCritical] public AddInServerWorker() { PermissionSet permissionSet = new PermissionSet(PermissionState.None); permissionSet.AddPermission(new SecurityPermission(SecurityPermissionFlag.ControlPrincipal)); permissionSet.AddPermission(new SecurityPermission(SecurityPermissionFlag.UnmanagedCode)); permissionSet.AddPermission(new ReflectionPermission(PermissionState.Unrestricted)); permissionSet.Assert(); // without this call to initialize the client channel, this object cannot be remoted RemotingHelper.InitializeClientChannel(); } //// // // [System.Diagnostics.CodeAnalysis.SuppressMessage("Microsoft.Performance", "CA1822:MarkMembersAsStatic", Justification="Needs to be instance for remoting"), System.Diagnostics.CodeAnalysis.SuppressMessage("Microsoft.Security", "CA2122:DoNotIndirectlyExposeMethodsWithLinkDemands", Justification = "Reviewed")] [System.Security.SecuritySafeCritical] [System.Diagnostics.CodeAnalysis.SuppressMessage("Microsoft.Security", "CA2128:SecurityTransparentCodeShouldNotAssert", Justification = "This is a SecurityRules.Level1 assembly, in which this rule is being incorrectly applied")] public void SetAppDomainOwner(IContract contract) { new SecurityPermission(SecurityPermissionFlag.ControlAppDomain).Assert(); AppDomain.CurrentDomain.SetData(ContractHandle.s_appDomainOwner, contract); } public AddInServer AddInServer { set { _addInServer = value; } } [System.Diagnostics.CodeAnalysis.SuppressMessage("Microsoft.Performance", "CA1822:MarkMembersAsStatic", Justification="Needs to be instance for remoting")] public IContract Activate(AddInToken pipeline, out ActivationWorker worker) { worker = new ActivationWorker(pipeline); IContract contract = worker.Activate(); return contract; } // Don't let this object time out in Remoting. public override Object InitializeLifetimeService() { return null; } //// // // [System.Diagnostics.CodeAnalysis.SuppressMessage("Microsoft.Performance", "CA1822:MarkMembersAsStatic", Justification="Needs to be instance for remoting")] [System.Security.SecurityCritical] public void UnloadAppDomain() { SecurityPermission permission = new SecurityPermission(SecurityPermissionFlag.ControlAppDomain); permission.Assert(); AppDomain.Unload(AppDomain.CurrentDomain); // thread will be aborted } //This appdomain must be going away //// // [System.Security.SecurityCritical] ~AddInServerWorker() { if (_addInServer != null) { _addInServer.AddInDomainFinalized(); } } } internal sealed class EventWorker : MarshalByRefObject { AddInProcess _process; public EventWorker(AddInProcess process) { _process = process; } public bool SendShutdownMessage() { CancelEventArgs args = new CancelEventArgs(); _process.SendShuttingDown(args); return args.Cancel; } } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007.//
Link Menu
This book is available now!
Buy at Amazon US or
Buy at Amazon UK
- GPRECT.cs
- TrackingStringDictionary.cs
- COM2IPerPropertyBrowsingHandler.cs
- IdentityHolder.cs
- OdbcCommand.cs
- DataObject.cs
- Clipboard.cs
- Operator.cs
- Pts.cs
- DesignerListAdapter.cs
- ContextInformation.cs
- DirectoryObjectSecurity.cs
- ScriptManagerProxy.cs
- MailSettingsSection.cs
- _SecureChannel.cs
- XamlToRtfWriter.cs
- XslCompiledTransform.cs
- DynamicPropertyHolder.cs
- ForwardPositionQuery.cs
- XmlElement.cs
- SqlCachedBuffer.cs
- EntityParameter.cs
- HtmlInputSubmit.cs
- XmlSchemaNotation.cs
- LassoHelper.cs
- BigInt.cs
- ExecutionTracker.cs
- Stackframe.cs
- XmlSchemaParticle.cs
- BoundsDrawingContextWalker.cs
- PagesSection.cs
- Timer.cs
- Renderer.cs
- Vector3DAnimation.cs
- AsynchronousChannelMergeEnumerator.cs
- ExtendedProperty.cs
- RSAPKCS1KeyExchangeFormatter.cs
- EraserBehavior.cs
- DataSourceHelper.cs
- mediaeventargs.cs
- FileDialog_Vista.cs
- OutputChannel.cs
- SqlProcedureAttribute.cs
- NameTable.cs
- StringFormat.cs
- VirtualDirectoryMapping.cs
- UserCancellationException.cs
- SoapBinding.cs
- RootBuilder.cs
- HttpHandlersSection.cs
- InputProviderSite.cs
- TextStore.cs
- Typeface.cs
- EntityObject.cs
- ThemeDirectoryCompiler.cs
- LogicalMethodInfo.cs
- RectangleGeometry.cs
- DataControlButton.cs
- CatalogPartChrome.cs
- DotAtomReader.cs
- ObjectStateManagerMetadata.cs
- ProtocolState.cs
- ChangeNode.cs
- AddressingVersion.cs
- SkewTransform.cs
- FocusWithinProperty.cs
- WindowsEditBoxRange.cs
- ZoneIdentityPermission.cs
- FormatterServices.cs
- CompilerWrapper.cs
- ShortcutKeysEditor.cs
- DataGridViewIntLinkedList.cs
- ColorConverter.cs
- hwndwrapper.cs
- TransformedBitmap.cs
- SignedInfo.cs
- ChineseLunisolarCalendar.cs
- XmlSerializableReader.cs
- ContextMarshalException.cs
- TemplateKey.cs
- IriParsingElement.cs
- ByValueEqualityComparer.cs
- IBuiltInEvidence.cs
- FormViewUpdatedEventArgs.cs
- SamlConstants.cs
- XmlDocumentType.cs
- TextSpanModifier.cs
- OleDbConnectionInternal.cs
- XmlQueryStaticData.cs
- HttpWebResponse.cs
- CLSCompliantAttribute.cs
- Polyline.cs
- SymmetricSecurityProtocol.cs
- SynchronizedRandom.cs
- RepeatEnumerable.cs
- GPPOINT.cs
- EarlyBoundInfo.cs
- SafeProcessHandle.cs
- _HTTPDateParse.cs
- FileRegion.cs