Code:
/ 4.0 / 4.0 / DEVDIV_TFS / Dev10 / Releases / RTMRel / wpf / src / Core / CSharp / System / IO / Packaging / PackageStore.cs / 1305600 / PackageStore.cs
//------------------------------------------------------------------------------
//
// Copyright (c) Microsoft Corporation, 2005
//
// File: PackageStore.cs
//
// Description: Collection of packages to be used with PackWebRequest.
//
// History:
// 07/25/2005: [....]: Created.
//-----------------------------------------------------------------------------
using System;
using System.Collections;
using System.Collections.Specialized;
using System.IO;
using System.IO.Packaging;
using System.Security;
using System.Security.Permissions;
using System.Windows.Navigation;
using SecurityHelper=MS.Internal.SecurityHelper;
using MS.Internal.PresentationCore; // for ExceptionStringTable
namespace System.IO.Packaging
{
// Note: we purposely didn't make this class a dictionary to limit the access
// to the packages in the store
//
///
/// PackageStore: Collection of packages to be used with PackWebRequest.
/// PackWebRequest will use a package from PackageStore if package uri matches
/// to obtain the requested part stream
/// This mechanism can be used so that PackWebRequest wouldn't open a package
/// multiple times to load different resources from the same package.
///
///
/// Note: Packages placed in PackageStore can be used in multi threading environment if it is used in
/// conjunction with Xaml Parser (XmlReader.Load). It is up to an application to do proper locking on the package
/// when it accesses the package directly.
/// Note: The access to the packages obtained from PackageStore is not limited (or the access level is same
/// as the one that is used to do open). It is up to an application to do proper action in modifying or closing
/// packages.
///
///
/// Critical: This class serves as a deposity of packages to be re-used with PackWebRequest
/// This affects where we load resources. This class is marked as SecurityCritical
/// to ensure that:
/// 1. No PT code can add/get/remove custom type of Package since the platform code (PackWebRequest) will
/// execute the custom Package (untrusted code)
/// 2. Allow PT code to add/get/remove only the well-known platform Package type (trusted code): ZipPackage
/// TreatAsSafe: These are public methods.
///
[SecurityCritical(SecurityCriticalScope.Everything)]
public static class PackageStore
{
static PackageStore()
{
_globalLock = new Object();
}
#region public Methods
//
///
/// Retrieves a package from the store for the given Uri.
///
/// key uri
/// Package
///
///
///
///
/// Demands EnvironmentPermission() if package is custom type of Package.
/// This prevents Partially Trusted callers from performing this operation on custom type of Package.
///
public static Package GetPackage(Uri uri)
{
ValidatePackageUri(uri);
lock (_globalLock)
{
Package package = null;
if (_packages != null && _packages.Contains(uri))
{
package = (Package) _packages[uri];
DemandSecurityPermissionIfCustomPackage(package);
}
return package;
}
}
///
/// Adds a uri, package pair to the package store.
///
/// key uri
/// package
///
///
/// If a package with the uri is already in the store,it throws an exception.
/// The package will not be automatically replaced within the store.
///
///
/// Demands EnvironmentPermission() if package is custom type of Package.
/// This prevents Partially Trusted callers from performing this operation. However, Partially Trusted callers can still
/// add well-known platform Package type (ZipPackage) to PackageStore.
/// the application's PackageStore.
///
public static void AddPackage(Uri uri, Package package)
{
// Allow well known platform Package to be added into PackageStore under Partial Trust.
// Otherwise, demand Environment Permission to make sure only Full Trust app can add a custom Package
DemandSecurityPermissionIfCustomPackage(package);
ValidatePackageUri(uri);
// There are well-known package types that are only for internal use (for resource loading)
// (i.e. ResourceContainer - "application://" and SiteOriginContainer - "siteoforigin://"
// Adding packages with such key uri will have no effect on PackWebRequest since
// they cannot be overriden. So, calling this method with such key Uris should be prevented
// However, uri.Equal cannot be used here since the key Uris are used as a pack Uri form and
// only PackUriHelper.ComparePackUri can do the proper comparison of pack Uris.
Uri packUri = PackUriHelper.Create(uri);
if (PackUriHelper.ComparePackUri(packUri, BaseUriHelper.PackAppBaseUri) == 0
|| PackUriHelper.ComparePackUri(packUri, BaseUriHelper.SiteOfOriginBaseUri) == 0)
{
throw new ArgumentException(SR.Get(SRID.NotAllowedPackageUri), "uri");
}
if (package == null)
{
throw new ArgumentNullException("package");
}
lock (_globalLock)
{
if (_packages == null)
{
_packages = new HybridDictionary(2);
}
if (_packages.Contains(uri))
{
throw new InvalidOperationException(SR.Get(SRID.PackageAlreadyExists));
}
_packages.Add(uri, package);
}
}
///
/// Removes a uri, package pair from the package store.
///
/// key uri
///
///
///
///
/// Demands EnvironmentPermission() if package is custom type of Package.
/// This prevents Partially Trusted callers from performing this operation on custom type of Package.
///
public static void RemovePackage(Uri uri)
{
ValidatePackageUri(uri);
lock (_globalLock)
{
if (_packages != null)
{
DemandSecurityPermissionIfCustomPackage((Package) _packages[uri]);
// If the key doesn't exist, it is no op
_packages.Remove(uri);
}
}
}
#endregion Public Methods
#region Private Methods
private static void ValidatePackageUri(Uri uri)
{
if (uri == null)
{
throw new ArgumentNullException("uri");
}
if (!uri.IsAbsoluteUri)
{
throw new ArgumentException(SR.Get(SRID.UriMustBeAbsolute), "uri");
}
}
private static void DemandSecurityPermissionIfCustomPackage(Package package)
{
// Although ZipPackage is sealed and cannot be subclassed, we shouldn't depend on
// the "sealedness" of ZipPackage. Checking the object type is more reliable way
// than using "as" or "is" operator.
if (package != null && package.GetType() != typeof(ZipPackage))
{
SecurityHelper.DemandEnvironmentPermission();
}
}
#endregion Private Methods
#region Private Fields
// We expect to have no more than 10 packages in the store
// per AppDomain for our scenarios
// ListDictionary is the best fit for this scenarios; otherwise we should be using
// Hashtable. HybridDictionary already has functionality of switching between
// ListDictionary and Hashtable depending on the size of the collection
static private HybridDictionary _packages;
static private Object _globalLock;
#endregion Private Fields
}
}
// File provided for Reference Use Only by Microsoft Corporation (c) 2007.
// Copyright (c) Microsoft Corporation. All rights reserved.
//------------------------------------------------------------------------------
//
// Copyright (c) Microsoft Corporation, 2005
//
// File: PackageStore.cs
//
// Description: Collection of packages to be used with PackWebRequest.
//
// History:
// 07/25/2005: [....]: Created.
//-----------------------------------------------------------------------------
using System;
using System.Collections;
using System.Collections.Specialized;
using System.IO;
using System.IO.Packaging;
using System.Security;
using System.Security.Permissions;
using System.Windows.Navigation;
using SecurityHelper=MS.Internal.SecurityHelper;
using MS.Internal.PresentationCore; // for ExceptionStringTable
namespace System.IO.Packaging
{
// Note: we purposely didn't make this class a dictionary to limit the access
// to the packages in the store
//
///
/// PackageStore: Collection of packages to be used with PackWebRequest.
/// PackWebRequest will use a package from PackageStore if package uri matches
/// to obtain the requested part stream
/// This mechanism can be used so that PackWebRequest wouldn't open a package
/// multiple times to load different resources from the same package.
///
///
/// Note: Packages placed in PackageStore can be used in multi threading environment if it is used in
/// conjunction with Xaml Parser (XmlReader.Load). It is up to an application to do proper locking on the package
/// when it accesses the package directly.
/// Note: The access to the packages obtained from PackageStore is not limited (or the access level is same
/// as the one that is used to do open). It is up to an application to do proper action in modifying or closing
/// packages.
///
///
/// Critical: This class serves as a deposity of packages to be re-used with PackWebRequest
/// This affects where we load resources. This class is marked as SecurityCritical
/// to ensure that:
/// 1. No PT code can add/get/remove custom type of Package since the platform code (PackWebRequest) will
/// execute the custom Package (untrusted code)
/// 2. Allow PT code to add/get/remove only the well-known platform Package type (trusted code): ZipPackage
/// TreatAsSafe: These are public methods.
///
[SecurityCritical(SecurityCriticalScope.Everything)]
public static class PackageStore
{
static PackageStore()
{
_globalLock = new Object();
}
#region public Methods
//
///
/// Retrieves a package from the store for the given Uri.
///
/// key uri
/// Package
///
///
///
///
/// Demands EnvironmentPermission() if package is custom type of Package.
/// This prevents Partially Trusted callers from performing this operation on custom type of Package.
///
public static Package GetPackage(Uri uri)
{
ValidatePackageUri(uri);
lock (_globalLock)
{
Package package = null;
if (_packages != null && _packages.Contains(uri))
{
package = (Package) _packages[uri];
DemandSecurityPermissionIfCustomPackage(package);
}
return package;
}
}
///
/// Adds a uri, package pair to the package store.
///
/// key uri
/// package
///
///
/// If a package with the uri is already in the store,it throws an exception.
/// The package will not be automatically replaced within the store.
///
///
/// Demands EnvironmentPermission() if package is custom type of Package.
/// This prevents Partially Trusted callers from performing this operation. However, Partially Trusted callers can still
/// add well-known platform Package type (ZipPackage) to PackageStore.
/// the application's PackageStore.
///
public static void AddPackage(Uri uri, Package package)
{
// Allow well known platform Package to be added into PackageStore under Partial Trust.
// Otherwise, demand Environment Permission to make sure only Full Trust app can add a custom Package
DemandSecurityPermissionIfCustomPackage(package);
ValidatePackageUri(uri);
// There are well-known package types that are only for internal use (for resource loading)
// (i.e. ResourceContainer - "application://" and SiteOriginContainer - "siteoforigin://"
// Adding packages with such key uri will have no effect on PackWebRequest since
// they cannot be overriden. So, calling this method with such key Uris should be prevented
// However, uri.Equal cannot be used here since the key Uris are used as a pack Uri form and
// only PackUriHelper.ComparePackUri can do the proper comparison of pack Uris.
Uri packUri = PackUriHelper.Create(uri);
if (PackUriHelper.ComparePackUri(packUri, BaseUriHelper.PackAppBaseUri) == 0
|| PackUriHelper.ComparePackUri(packUri, BaseUriHelper.SiteOfOriginBaseUri) == 0)
{
throw new ArgumentException(SR.Get(SRID.NotAllowedPackageUri), "uri");
}
if (package == null)
{
throw new ArgumentNullException("package");
}
lock (_globalLock)
{
if (_packages == null)
{
_packages = new HybridDictionary(2);
}
if (_packages.Contains(uri))
{
throw new InvalidOperationException(SR.Get(SRID.PackageAlreadyExists));
}
_packages.Add(uri, package);
}
}
///
/// Removes a uri, package pair from the package store.
///
/// key uri
///
///
///
///
/// Demands EnvironmentPermission() if package is custom type of Package.
/// This prevents Partially Trusted callers from performing this operation on custom type of Package.
///
public static void RemovePackage(Uri uri)
{
ValidatePackageUri(uri);
lock (_globalLock)
{
if (_packages != null)
{
DemandSecurityPermissionIfCustomPackage((Package) _packages[uri]);
// If the key doesn't exist, it is no op
_packages.Remove(uri);
}
}
}
#endregion Public Methods
#region Private Methods
private static void ValidatePackageUri(Uri uri)
{
if (uri == null)
{
throw new ArgumentNullException("uri");
}
if (!uri.IsAbsoluteUri)
{
throw new ArgumentException(SR.Get(SRID.UriMustBeAbsolute), "uri");
}
}
private static void DemandSecurityPermissionIfCustomPackage(Package package)
{
// Although ZipPackage is sealed and cannot be subclassed, we shouldn't depend on
// the "sealedness" of ZipPackage. Checking the object type is more reliable way
// than using "as" or "is" operator.
if (package != null && package.GetType() != typeof(ZipPackage))
{
SecurityHelper.DemandEnvironmentPermission();
}
}
#endregion Private Methods
#region Private Fields
// We expect to have no more than 10 packages in the store
// per AppDomain for our scenarios
// ListDictionary is the best fit for this scenarios; otherwise we should be using
// Hashtable. HybridDictionary already has functionality of switching between
// ListDictionary and Hashtable depending on the size of the collection
static private HybridDictionary _packages;
static private Object _globalLock;
#endregion Private Fields
}
}
// File provided for Reference Use Only by Microsoft Corporation (c) 2007.
// Copyright (c) Microsoft Corporation. All rights reserved.
Link Menu

This book is available now!
Buy at Amazon US or
Buy at Amazon UK
- ArgumentValidation.cs
- ElapsedEventArgs.cs
- XmlAttributeOverrides.cs
- FaultPropagationRecord.cs
- WhitespaceSignificantCollectionAttribute.cs
- SiteMembershipCondition.cs
- PreviewPageInfo.cs
- sqlinternaltransaction.cs
- Win32Native.cs
- WebBrowser.cs
- PrintPreviewGraphics.cs
- TextViewBase.cs
- Slider.cs
- DesignerVerbToolStripMenuItem.cs
- ValidationError.cs
- RegistrationProxy.cs
- Literal.cs
- ProxyOperationRuntime.cs
- DesignerOptionService.cs
- ToolStripRenderEventArgs.cs
- Margins.cs
- OraclePermissionAttribute.cs
- XMLDiffLoader.cs
- DataGridViewRowHeightInfoNeededEventArgs.cs
- Page.cs
- ProxyHwnd.cs
- RequestCacheValidator.cs
- DbParameterHelper.cs
- StructuredProperty.cs
- ActivityExecutionFilter.cs
- SkewTransform.cs
- ComponentConverter.cs
- LexicalChunk.cs
- DesignerSerializerAttribute.cs
- SafeRightsManagementHandle.cs
- SqlFlattener.cs
- QilGenerator.cs
- ColorTransform.cs
- StringKeyFrameCollection.cs
- ResolveNameEventArgs.cs
- Underline.cs
- DocumentViewerConstants.cs
- MembershipUser.cs
- FrameworkEventSource.cs
- Stackframe.cs
- ListViewItem.cs
- LocatorBase.cs
- ServiceBehaviorElementCollection.cs
- ProxyDataContractResolver.cs
- JavaScriptString.cs
- SplineKeyFrames.cs
- TextAdaptor.cs
- FlowDocumentPaginator.cs
- PreservationFileReader.cs
- SharedRuntimeState.cs
- NotCondition.cs
- ContentDisposition.cs
- EntityDataSourceUtil.cs
- NonSerializedAttribute.cs
- MessagingActivityHelper.cs
- XhtmlBasicImageAdapter.cs
- HwndHost.cs
- ContentValidator.cs
- FontNamesConverter.cs
- DragEvent.cs
- SoapBinding.cs
- SpeechDetectedEventArgs.cs
- PartitionResolver.cs
- MemoryPressure.cs
- SafeTokenHandle.cs
- _SslState.cs
- Accessible.cs
- SettingsContext.cs
- TextBoxLine.cs
- RemotingConfiguration.cs
- ToolboxBitmapAttribute.cs
- CharEnumerator.cs
- BitmapCodecInfo.cs
- ProfessionalColors.cs
- SchemaImporter.cs
- GenerateHelper.cs
- IBuiltInEvidence.cs
- RelatedView.cs
- Comparer.cs
- BamlBinaryReader.cs
- ToolstripProfessionalRenderer.cs
- Parallel.cs
- securitycriticaldataClass.cs
- FormViewModeEventArgs.cs
- RequiredFieldValidator.cs
- XamlSerializerUtil.cs
- DataGridViewDataConnection.cs
- SkewTransform.cs
- Win32.cs
- RotateTransform3D.cs
- TranslateTransform3D.cs
- MachineSettingsSection.cs
- TextRangeEdit.cs
- UpDownEvent.cs
- MarkerProperties.cs