Code:
/ Dotnetfx_Vista_SP2 / Dotnetfx_Vista_SP2 / 8.0.50727.4016 / DEVDIV / depot / DevDiv / releases / Orcas / QFE / wpf / src / Core / CSharp / System / IO / Packaging / PackageStore.cs / 1 / PackageStore.cs
//------------------------------------------------------------------------------ // // Copyright (c) Microsoft Corporation, 2005 // // File: PackageStore.cs // // Description: Collection of packages to be used with PackWebRequest. // // History: // 07/25/2005: YoungGK: Created. //----------------------------------------------------------------------------- using System; using System.Collections; using System.Collections.Specialized; using System.IO; using System.IO.Packaging; using System.Security; using System.Security.Permissions; using System.Windows.Navigation; using MS.Internal.PresentationCore; // for ExceptionStringTable namespace System.IO.Packaging { // Note: we purposely didn't make this class a dictionary to limit the access // to the packages in the store // ////// PackageStore: Collection of packages to be used with PackWebRequest. /// PackWebRequest will use a package from PackageStore if package uri matches /// to obtain the requested part stream /// This mechanism can be used so that PackWebRequest wouldn't open a package /// multiple times to load different resources from the same package. /// ////// Note: Packages placed in PackageStore can be used in multi threading environment if it is used in /// conjunction with Xaml Parser (XmlReader.Load). It is up to an application to do proper locking on the package /// when it accesses the package directly. /// Note: The access to the packages obtained from PackageStore is not limited (or the access level is same /// as the one that is used to do open). It is up to an application to do proper action in modifying or closing /// packages. /// ////// Critical: This class serves as a deposity of packages to be re-used with PackWebRequest /// This affects where we load resources. This class is marked as SecurityCritical /// to ensure that: /// 1. No PT code can add/get/remove custom type of Package since the platform code (PackWebRequest) will /// execute the custom Package (untrusted code) /// 2. Allow PT code to add/get/remove only the well-known platform Package type (trusted code): ZipPackage /// TreatAsSafe: These are public methods. /// [SecurityCritical(SecurityCriticalScope.Everything)] public static class PackageStore { static PackageStore() { _globalLock = new Object(); } #region public Methods // ////// Retrieves a package from the store for the given Uri. /// /// key uri ///Package ////// /// ////// Demands EnvironmentPermission() if package is custom type of Package. /// This prevents Partially Trusted callers from performing this operation on custom type of Package. /// public static Package GetPackage(Uri uri) { ValidatePackageUri(uri); lock (_globalLock) { Package package = null; if (_packages != null && _packages.Contains(uri)) { package = (Package) _packages[uri]; DemandSecurityPermissionIfCustomPackage(package); } return package; } } ////// Adds a uri, package pair to the package store. /// /// key uri /// package ////// /// If a package with the uri is already in the store,it throws an exception. /// The package will not be automatically replaced within the store. /// ////// Demands EnvironmentPermission() if package is custom type of Package. /// This prevents Partially Trusted callers from performing this operation. However, Partially Trusted callers can still /// add well-known platform Package type (ZipPackage) to PackageStore. /// the application's PackageStore. /// public static void AddPackage(Uri uri, Package package) { // Allow well known platform Package to be added into PackageStore under Partial Trust. // Otherwise, demand Environment Permission to make sure only Full Trust app can add a custom Package DemandSecurityPermissionIfCustomPackage(package); ValidatePackageUri(uri); // There are well-known package types that are only for internal use (for resource loading) // (i.e. ResourceContainer - "application://" and SiteOriginContainer - "siteoforigin://" // Adding packages with such key uri will have no effect on PackWebRequest since // they cannot be overriden. So, calling this method with such key Uris should be prevented // However, uri.Equal cannot be used here since the key Uris are used as a pack Uri form and // only PackUriHelper.ComparePackUri can do the proper comparison of pack Uris. Uri packUri = PackUriHelper.Create(uri); if (PackUriHelper.ComparePackUri(packUri, BaseUriHelper.PackAppBaseUri) == 0 || PackUriHelper.ComparePackUri(packUri, BaseUriHelper.SiteOfOriginBaseUri) == 0) { throw new ArgumentException(SR.Get(SRID.NotAllowedPackageUri), "uri"); } if (package == null) { throw new ArgumentNullException("package"); } lock (_globalLock) { if (_packages == null) { _packages = new HybridDictionary(2); } if (_packages.Contains(uri)) { throw new InvalidOperationException(SR.Get(SRID.PackageAlreadyExists)); } _packages.Add(uri, package); } } ////// Removes a uri, package pair from the package store. /// /// key uri ////// /// ////// Demands EnvironmentPermission() if package is custom type of Package. /// This prevents Partially Trusted callers from performing this operation on custom type of Package. /// public static void RemovePackage(Uri uri) { ValidatePackageUri(uri); lock (_globalLock) { if (_packages != null) { DemandSecurityPermissionIfCustomPackage((Package) _packages[uri]); // If the key doesn't exist, it is no op _packages.Remove(uri); } } } #endregion Public Methods #region Private Methods private static void ValidatePackageUri(Uri uri) { if (uri == null) { throw new ArgumentNullException("uri"); } if (!uri.IsAbsoluteUri) { throw new ArgumentException(SR.Get(SRID.UriMustBeAbsolute), "uri"); } } private static void DemandSecurityPermissionIfCustomPackage(Package package) { // Although ZipPackage is sealed and cannot be subclassed, we shouldn't depend on // the "sealedness" of ZipPackage. Checking the object type is more reliable way // than using "as" or "is" operator. if (package != null && package.GetType() != typeof(ZipPackage)) { SecurityHelper.DemandEnvironmentPermission(); } } #endregion Private Methods #region Private Fields // We expect to have no more than 10 packages in the store // per AppDomain for our scenarios // ListDictionary is the best fit for this scenarios; otherwise we should be using // Hashtable. HybridDictionary already has functionality of switching between // ListDictionary and Hashtable depending on the size of the collection static private HybridDictionary _packages; static private Object _globalLock; #endregion Private Fields } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007. // Copyright (c) Microsoft Corporation. All rights reserved. //------------------------------------------------------------------------------ // // Copyright (c) Microsoft Corporation, 2005 // // File: PackageStore.cs // // Description: Collection of packages to be used with PackWebRequest. // // History: // 07/25/2005: YoungGK: Created. //----------------------------------------------------------------------------- using System; using System.Collections; using System.Collections.Specialized; using System.IO; using System.IO.Packaging; using System.Security; using System.Security.Permissions; using System.Windows.Navigation; using MS.Internal.PresentationCore; // for ExceptionStringTable namespace System.IO.Packaging { // Note: we purposely didn't make this class a dictionary to limit the access // to the packages in the store // ////// PackageStore: Collection of packages to be used with PackWebRequest. /// PackWebRequest will use a package from PackageStore if package uri matches /// to obtain the requested part stream /// This mechanism can be used so that PackWebRequest wouldn't open a package /// multiple times to load different resources from the same package. /// ////// Note: Packages placed in PackageStore can be used in multi threading environment if it is used in /// conjunction with Xaml Parser (XmlReader.Load). It is up to an application to do proper locking on the package /// when it accesses the package directly. /// Note: The access to the packages obtained from PackageStore is not limited (or the access level is same /// as the one that is used to do open). It is up to an application to do proper action in modifying or closing /// packages. /// ////// Critical: This class serves as a deposity of packages to be re-used with PackWebRequest /// This affects where we load resources. This class is marked as SecurityCritical /// to ensure that: /// 1. No PT code can add/get/remove custom type of Package since the platform code (PackWebRequest) will /// execute the custom Package (untrusted code) /// 2. Allow PT code to add/get/remove only the well-known platform Package type (trusted code): ZipPackage /// TreatAsSafe: These are public methods. /// [SecurityCritical(SecurityCriticalScope.Everything)] public static class PackageStore { static PackageStore() { _globalLock = new Object(); } #region public Methods // ////// Retrieves a package from the store for the given Uri. /// /// key uri ///Package ////// /// ////// Demands EnvironmentPermission() if package is custom type of Package. /// This prevents Partially Trusted callers from performing this operation on custom type of Package. /// public static Package GetPackage(Uri uri) { ValidatePackageUri(uri); lock (_globalLock) { Package package = null; if (_packages != null && _packages.Contains(uri)) { package = (Package) _packages[uri]; DemandSecurityPermissionIfCustomPackage(package); } return package; } } ////// Adds a uri, package pair to the package store. /// /// key uri /// package ////// /// If a package with the uri is already in the store,it throws an exception. /// The package will not be automatically replaced within the store. /// ////// Demands EnvironmentPermission() if package is custom type of Package. /// This prevents Partially Trusted callers from performing this operation. However, Partially Trusted callers can still /// add well-known platform Package type (ZipPackage) to PackageStore. /// the application's PackageStore. /// public static void AddPackage(Uri uri, Package package) { // Allow well known platform Package to be added into PackageStore under Partial Trust. // Otherwise, demand Environment Permission to make sure only Full Trust app can add a custom Package DemandSecurityPermissionIfCustomPackage(package); ValidatePackageUri(uri); // There are well-known package types that are only for internal use (for resource loading) // (i.e. ResourceContainer - "application://" and SiteOriginContainer - "siteoforigin://" // Adding packages with such key uri will have no effect on PackWebRequest since // they cannot be overriden. So, calling this method with such key Uris should be prevented // However, uri.Equal cannot be used here since the key Uris are used as a pack Uri form and // only PackUriHelper.ComparePackUri can do the proper comparison of pack Uris. Uri packUri = PackUriHelper.Create(uri); if (PackUriHelper.ComparePackUri(packUri, BaseUriHelper.PackAppBaseUri) == 0 || PackUriHelper.ComparePackUri(packUri, BaseUriHelper.SiteOfOriginBaseUri) == 0) { throw new ArgumentException(SR.Get(SRID.NotAllowedPackageUri), "uri"); } if (package == null) { throw new ArgumentNullException("package"); } lock (_globalLock) { if (_packages == null) { _packages = new HybridDictionary(2); } if (_packages.Contains(uri)) { throw new InvalidOperationException(SR.Get(SRID.PackageAlreadyExists)); } _packages.Add(uri, package); } } ////// Removes a uri, package pair from the package store. /// /// key uri ////// /// ////// Demands EnvironmentPermission() if package is custom type of Package. /// This prevents Partially Trusted callers from performing this operation on custom type of Package. /// public static void RemovePackage(Uri uri) { ValidatePackageUri(uri); lock (_globalLock) { if (_packages != null) { DemandSecurityPermissionIfCustomPackage((Package) _packages[uri]); // If the key doesn't exist, it is no op _packages.Remove(uri); } } } #endregion Public Methods #region Private Methods private static void ValidatePackageUri(Uri uri) { if (uri == null) { throw new ArgumentNullException("uri"); } if (!uri.IsAbsoluteUri) { throw new ArgumentException(SR.Get(SRID.UriMustBeAbsolute), "uri"); } } private static void DemandSecurityPermissionIfCustomPackage(Package package) { // Although ZipPackage is sealed and cannot be subclassed, we shouldn't depend on // the "sealedness" of ZipPackage. Checking the object type is more reliable way // than using "as" or "is" operator. if (package != null && package.GetType() != typeof(ZipPackage)) { SecurityHelper.DemandEnvironmentPermission(); } } #endregion Private Methods #region Private Fields // We expect to have no more than 10 packages in the store // per AppDomain for our scenarios // ListDictionary is the best fit for this scenarios; otherwise we should be using // Hashtable. HybridDictionary already has functionality of switching between // ListDictionary and Hashtable depending on the size of the collection static private HybridDictionary _packages; static private Object _globalLock; #endregion Private Fields } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007. // Copyright (c) Microsoft Corporation. All rights reserved.
Link Menu

This book is available now!
Buy at Amazon US or
Buy at Amazon UK
- ButtonBase.cs
- DbInsertCommandTree.cs
- DrawingVisual.cs
- BaseConfigurationRecord.cs
- InvalidDataContractException.cs
- SecurityTokenTypes.cs
- TextBox.cs
- VisualTarget.cs
- ZipFileInfo.cs
- AbandonedMutexException.cs
- SqlException.cs
- SuppressIldasmAttribute.cs
- ContextStack.cs
- MinimizableAttributeTypeConverter.cs
- CategoryAttribute.cs
- MessageQueueConverter.cs
- Byte.cs
- ContentFilePart.cs
- SqlUtils.cs
- DataGridViewIntLinkedList.cs
- PageThemeBuildProvider.cs
- GeneralTransform2DTo3D.cs
- SapiAttributeParser.cs
- RepeaterCommandEventArgs.cs
- XmlSerializationGeneratedCode.cs
- ServiceThrottlingElement.cs
- XmlSchemaCompilationSettings.cs
- CodeDelegateInvokeExpression.cs
- XslUrlEditor.cs
- DeflateEmulationStream.cs
- RuntimeResourceSet.cs
- FileNotFoundException.cs
- TemplateBamlRecordReader.cs
- ItemContainerProviderWrapper.cs
- BaseResourcesBuildProvider.cs
- TdsParserHelperClasses.cs
- Debug.cs
- Latin1Encoding.cs
- SQLInt64.cs
- DirectoryNotFoundException.cs
- UserUseLicenseDictionaryLoader.cs
- SettingsPropertyValueCollection.cs
- NumberFormatter.cs
- XmlNodeList.cs
- MissingMemberException.cs
- DotNetATv1WindowsLogEntryDeserializer.cs
- FrameworkElement.cs
- StrongNamePublicKeyBlob.cs
- MetadataCache.cs
- ExpressionParser.cs
- WebPartConnectionsConnectVerb.cs
- ValidationErrorInfo.cs
- XmlTextReader.cs
- Serializer.cs
- PresentationSource.cs
- ScrollBar.cs
- CompiledQueryCacheEntry.cs
- PolyQuadraticBezierSegment.cs
- ExtendedPropertyCollection.cs
- SqlProfileProvider.cs
- EasingKeyFrames.cs
- SelectedGridItemChangedEvent.cs
- GZipStream.cs
- TextBreakpoint.cs
- RubberbandSelector.cs
- StylusButtonEventArgs.cs
- BitStream.cs
- _TransmitFileOverlappedAsyncResult.cs
- SetUserLanguageRequest.cs
- TextServicesCompartment.cs
- assemblycache.cs
- NameValuePair.cs
- BooleanStorage.cs
- ContainerControlDesigner.cs
- DefaultSection.cs
- WindowsButton.cs
- LowerCaseStringConverter.cs
- Label.cs
- SoapFault.cs
- GPRECTF.cs
- MetadataItem.cs
- HtmlInputRadioButton.cs
- EventLog.cs
- ProfileService.cs
- PackageRelationship.cs
- CqlParser.cs
- PrintController.cs
- SafeCryptoHandles.cs
- FontFaceLayoutInfo.cs
- ScriptModule.cs
- AnimationTimeline.cs
- Button.cs
- WindowsAltTab.cs
- DataGridViewDataErrorEventArgs.cs
- BaseParaClient.cs
- GroupItem.cs
- TextDecoration.cs
- DictionaryCustomTypeDescriptor.cs
- DBCommand.cs
- ArrayConverter.cs