Code:
/ Dotnetfx_Win7_3.5.1 / Dotnetfx_Win7_3.5.1 / 3.5.1 / DEVDIV / depot / DevDiv / releases / whidbey / NetFXspW7 / ndp / fx / src / xsp / System / Web / Configuration / RemoteWebConfigurationHostServer.cs / 1 / RemoteWebConfigurationHostServer.cs
//------------------------------------------------------------------------------ //// Copyright (c) Microsoft Corporation. All rights reserved. // //----------------------------------------------------------------------------- namespace System.Web.Configuration { using System.Collections; using System.Configuration; using System.Security; using System.IO; using System.Globalization; using System.Text; using System.Runtime.InteropServices; using System.Reflection; using System.Web.Util; using System.Collections.Specialized; using System.Xml; using System.Security.Cryptography; #if !FEATURE_PAL // FEATURE_PAL does not enable access control using System.Security.AccessControl; #endif // !FEATURE_PAL using System.Security.Permissions; #if !FEATURE_PAL // FEATURE_PAL does not enable COM [ComVisible(true), ClassInterface(ClassInterfaceType.AutoDual), #if WIN64 Guid("CE6ED9D0-3BF2-4243-B0AB-919BAC47542B"), ProgId("System.Web.Configuration.RemoteWebConfigurationHostServer_64")] #else Guid("8DEC0FA2-CC19-494F-8613-1F6221C0C5AB"), ProgId("System.Web.Configuration.RemoteWebConfigurationHostServer_32")] #endif #endif // FEATURE_PAL does not enable COM [SecurityPermission(SecurityAction.Demand, Unrestricted = true)] [AspNetHostingPermission(SecurityAction.LinkDemand, Level=AspNetHostingPermissionLevel.Minimal)] [AspNetHostingPermission(SecurityAction.InheritanceDemand, Level=AspNetHostingPermissionLevel.Minimal)] public class RemoteWebConfigurationHostServer : IRemoteWebConfigurationHostServer { internal const char FilePathsSeparatorChar = '<'; static internal readonly char[] FilePathsSeparatorParams = new char[] {FilePathsSeparatorChar}; public byte[] GetData(string fileName, bool getReadTimeOnly, out long readTime) { if (!fileName.ToLowerInvariant().EndsWith(".config", StringComparison.Ordinal)) throw new Exception(SR.GetString(SR.Can_not_access_files_other_than_config)); byte [] buf; if (File.Exists(fileName)) { if (getReadTimeOnly) { buf = new byte[0]; } else { buf = File.ReadAllBytes(fileName); } DateTime lastWrite = File.GetLastWriteTimeUtc(fileName); readTime = (DateTime.UtcNow > lastWrite ? DateTime.UtcNow.Ticks : lastWrite.Ticks); } else { buf = new byte[0]; readTime = DateTime.UtcNow.Ticks; } return buf; } public void WriteData(string fileName, string templateFileName, byte[] data, ref long readTime) { if (!fileName.ToLowerInvariant().EndsWith(".config", StringComparison.Ordinal)) throw new Exception(SR.GetString(SR.Can_not_access_files_other_than_config)); bool fileExists = File.Exists(fileName); FileInfo fileInfo = null; FileAttributes fileAttributes = FileAttributes.Normal; string tempFile = null; Exception createStreamExcep = null; FileStream tempFileStream = null; long lastWriteTicks = 0; long utcNowTicks = 0; ///////////////////////////////////////////////////////////////////// // Step 1: If the file exists, then make sure it hasn't been written to since it was read if (fileExists && File.GetLastWriteTimeUtc(fileName).Ticks > readTime) { throw new Exception(SR.GetString(SR.File_changed_since_read, fileName)); } ///////////////////////////////////////////////////////////////////// // Step 2: Get the security-descriptor and attributes of the file if (fileExists) { try { fileInfo = new FileInfo(fileName); fileAttributes = fileInfo.Attributes; } catch { } if (((int)(fileAttributes & (FileAttributes.ReadOnly | FileAttributes.Hidden))) != 0) throw new Exception(SR.GetString(SR.File_is_read_only, fileName)); } ///////////////////////////////////////////////////////////////////// // Step 3: Generate a temp file name. Make sure that the temp file doesn't exist tempFile = fileName + "." + GetRandomFileExt() + ".tmp"; for (int iter = 0; File.Exists(tempFile); iter++) { // if it exists, then use a different random name if (iter > 100) // don't try more than 100 times throw new Exception(SR.GetString(SR.Unable_to_create_temp_file)); else tempFile = fileName + "." + GetRandomFileExt() + ".tmp"; } ///////////////////////////////////////////////////////////////////// // Step 4: Write the buffer to the temp file, and move it to the actual file try { tempFileStream = new FileStream(tempFile, FileMode.CreateNew, FileAccess.Write, FileShare.ReadWrite, data.Length, FileOptions.WriteThrough); tempFileStream.Write(data, 0, data.Length); } catch (Exception e) { createStreamExcep = e; } finally { if (tempFileStream != null) tempFileStream.Close(); } if (createStreamExcep != null) { try { File.Delete(tempFile); } catch { } throw createStreamExcep; } if (fileExists) { try { DuplicateFileAttributes(fileName, tempFile); } catch { } } else if ( templateFileName != null ) { try { DuplicateTemplateAttributes(fileName, templateFileName); } catch { } } ///////////////////////////////////////////////////////////////////// // Step 4: Move the temp filt to the actual file if (!UnsafeNativeMethods.MoveFileEx(tempFile, fileName, MOVEFILE_COPY_ALLOWED | MOVEFILE_REPLACE_EXISTING | MOVEFILE_WRITE_THROUGH)) { try { File.Delete(tempFile); } catch { } Marshal.ThrowExceptionForHR(Marshal.GetHRForLastWin32Error()); } ///////////////////////////////////////////////////////////////////// // Step 5: Set the attributes of the file if (fileExists) { fileInfo = new FileInfo(fileName); fileInfo.Attributes = fileAttributes; } ///////////////////////////////////////////////////////////////////// // Step 6: Record the current time as the read-time lastWriteTicks = File.GetLastWriteTimeUtc(fileName).Ticks; utcNowTicks = DateTime.UtcNow.Ticks; readTime = (utcNowTicks > lastWriteTicks ? utcNowTicks : lastWriteTicks); } public string GetFilePaths(int webLevelAsInt, string path, string site, string locationSubPath) { WebLevel webLevel = (WebLevel) webLevelAsInt; IConfigMapPath configMapPath = IISMapPath.GetInstance(); // Get the configuration paths and application information string appSiteName, appSiteID; VirtualPath appPath; string configPath, locationConfigPath; WebConfigurationHost.GetConfigPaths(configMapPath, webLevel, VirtualPath.CreateNonRelativeAllowNull(path), site, locationSubPath, out appPath, out appSiteName, out appSiteID, out configPath, out locationConfigPath); // // Format of filePaths: // appPath < appSiteName < appSiteID < configPath < locationConfigPath [< configPath < fileName]+ // ArrayList filePaths = new ArrayList(); filePaths.Add(VirtualPath.GetVirtualPathString(appPath)); filePaths.Add(appSiteName); filePaths.Add(appSiteID); filePaths.Add(configPath); filePaths.Add(locationConfigPath); string dummySiteID; VirtualPath virtualPath; WebConfigurationHost.GetSiteIDAndVPathFromConfigPath(configPath, out dummySiteID, out virtualPath); // pathmap for machine.config filePaths.Add(WebConfigurationHost.MachineConfigPath); filePaths.Add(HttpConfigurationSystem.MachineConfigurationFilePath); // pathmap for root web.config if (webLevel != WebLevel.Machine) { filePaths.Add(WebConfigurationHost.RootWebConfigPath); filePaths.Add(HttpConfigurationSystem.RootWebConfigurationFilePath); // pathmap for other paths for (VirtualPath currentVirtualPath = virtualPath; currentVirtualPath != null; currentVirtualPath = currentVirtualPath.Parent) { string currentConfigPath = WebConfigurationHost.GetConfigPathFromSiteIDAndVPath(appSiteID, currentVirtualPath); string currentFilePath = configMapPath.MapPath(appSiteID, currentVirtualPath.VirtualPathString); currentFilePath = System.IO.Path.Combine(currentFilePath, HttpConfigurationSystem.WebConfigFileName); filePaths.Add(currentConfigPath); filePaths.Add(currentFilePath); } } // join into a single string StringBuilder sb = new StringBuilder(); for (int i = 0; i < filePaths.Count; i++) { if (i > 0) { sb.Append(FilePathsSeparatorChar); } string part = (string) filePaths[i]; sb.Append(part); } return sb.ToString(); } public string DoEncryptOrDecrypt(bool doEncrypt, string xmlString, string protectionProviderName, string protectionProviderType, string[] paramKeys, string[] paramValues) { Type t = Type.GetType(protectionProviderType, true); if (!typeof(ProtectedConfigurationProvider).IsAssignableFrom(t)) { throw new Exception(SR.GetString(SR.WrongType_of_Protected_provider)); } ProtectedConfigurationProvider provider = (ProtectedConfigurationProvider)Activator.CreateInstance(t); NameValueCollection cloneParams = new NameValueCollection(paramKeys.Length); XmlNode node; for(int iter=0; iter// Copyright (c) Microsoft Corporation. All rights reserved. // //----------------------------------------------------------------------------- namespace System.Web.Configuration { using System.Collections; using System.Configuration; using System.Security; using System.IO; using System.Globalization; using System.Text; using System.Runtime.InteropServices; using System.Reflection; using System.Web.Util; using System.Collections.Specialized; using System.Xml; using System.Security.Cryptography; #if !FEATURE_PAL // FEATURE_PAL does not enable access control using System.Security.AccessControl; #endif // !FEATURE_PAL using System.Security.Permissions; #if !FEATURE_PAL // FEATURE_PAL does not enable COM [ComVisible(true), ClassInterface(ClassInterfaceType.AutoDual), #if WIN64 Guid("CE6ED9D0-3BF2-4243-B0AB-919BAC47542B"), ProgId("System.Web.Configuration.RemoteWebConfigurationHostServer_64")] #else Guid("8DEC0FA2-CC19-494F-8613-1F6221C0C5AB"), ProgId("System.Web.Configuration.RemoteWebConfigurationHostServer_32")] #endif #endif // FEATURE_PAL does not enable COM [SecurityPermission(SecurityAction.Demand, Unrestricted = true)] [AspNetHostingPermission(SecurityAction.LinkDemand, Level=AspNetHostingPermissionLevel.Minimal)] [AspNetHostingPermission(SecurityAction.InheritanceDemand, Level=AspNetHostingPermissionLevel.Minimal)] public class RemoteWebConfigurationHostServer : IRemoteWebConfigurationHostServer { internal const char FilePathsSeparatorChar = '<'; static internal readonly char[] FilePathsSeparatorParams = new char[] {FilePathsSeparatorChar}; public byte[] GetData(string fileName, bool getReadTimeOnly, out long readTime) { if (!fileName.ToLowerInvariant().EndsWith(".config", StringComparison.Ordinal)) throw new Exception(SR.GetString(SR.Can_not_access_files_other_than_config)); byte [] buf; if (File.Exists(fileName)) { if (getReadTimeOnly) { buf = new byte[0]; } else { buf = File.ReadAllBytes(fileName); } DateTime lastWrite = File.GetLastWriteTimeUtc(fileName); readTime = (DateTime.UtcNow > lastWrite ? DateTime.UtcNow.Ticks : lastWrite.Ticks); } else { buf = new byte[0]; readTime = DateTime.UtcNow.Ticks; } return buf; } public void WriteData(string fileName, string templateFileName, byte[] data, ref long readTime) { if (!fileName.ToLowerInvariant().EndsWith(".config", StringComparison.Ordinal)) throw new Exception(SR.GetString(SR.Can_not_access_files_other_than_config)); bool fileExists = File.Exists(fileName); FileInfo fileInfo = null; FileAttributes fileAttributes = FileAttributes.Normal; string tempFile = null; Exception createStreamExcep = null; FileStream tempFileStream = null; long lastWriteTicks = 0; long utcNowTicks = 0; ///////////////////////////////////////////////////////////////////// // Step 1: If the file exists, then make sure it hasn't been written to since it was read if (fileExists && File.GetLastWriteTimeUtc(fileName).Ticks > readTime) { throw new Exception(SR.GetString(SR.File_changed_since_read, fileName)); } ///////////////////////////////////////////////////////////////////// // Step 2: Get the security-descriptor and attributes of the file if (fileExists) { try { fileInfo = new FileInfo(fileName); fileAttributes = fileInfo.Attributes; } catch { } if (((int)(fileAttributes & (FileAttributes.ReadOnly | FileAttributes.Hidden))) != 0) throw new Exception(SR.GetString(SR.File_is_read_only, fileName)); } ///////////////////////////////////////////////////////////////////// // Step 3: Generate a temp file name. Make sure that the temp file doesn't exist tempFile = fileName + "." + GetRandomFileExt() + ".tmp"; for (int iter = 0; File.Exists(tempFile); iter++) { // if it exists, then use a different random name if (iter > 100) // don't try more than 100 times throw new Exception(SR.GetString(SR.Unable_to_create_temp_file)); else tempFile = fileName + "." + GetRandomFileExt() + ".tmp"; } ///////////////////////////////////////////////////////////////////// // Step 4: Write the buffer to the temp file, and move it to the actual file try { tempFileStream = new FileStream(tempFile, FileMode.CreateNew, FileAccess.Write, FileShare.ReadWrite, data.Length, FileOptions.WriteThrough); tempFileStream.Write(data, 0, data.Length); } catch (Exception e) { createStreamExcep = e; } finally { if (tempFileStream != null) tempFileStream.Close(); } if (createStreamExcep != null) { try { File.Delete(tempFile); } catch { } throw createStreamExcep; } if (fileExists) { try { DuplicateFileAttributes(fileName, tempFile); } catch { } } else if ( templateFileName != null ) { try { DuplicateTemplateAttributes(fileName, templateFileName); } catch { } } ///////////////////////////////////////////////////////////////////// // Step 4: Move the temp filt to the actual file if (!UnsafeNativeMethods.MoveFileEx(tempFile, fileName, MOVEFILE_COPY_ALLOWED | MOVEFILE_REPLACE_EXISTING | MOVEFILE_WRITE_THROUGH)) { try { File.Delete(tempFile); } catch { } Marshal.ThrowExceptionForHR(Marshal.GetHRForLastWin32Error()); } ///////////////////////////////////////////////////////////////////// // Step 5: Set the attributes of the file if (fileExists) { fileInfo = new FileInfo(fileName); fileInfo.Attributes = fileAttributes; } ///////////////////////////////////////////////////////////////////// // Step 6: Record the current time as the read-time lastWriteTicks = File.GetLastWriteTimeUtc(fileName).Ticks; utcNowTicks = DateTime.UtcNow.Ticks; readTime = (utcNowTicks > lastWriteTicks ? utcNowTicks : lastWriteTicks); } public string GetFilePaths(int webLevelAsInt, string path, string site, string locationSubPath) { WebLevel webLevel = (WebLevel) webLevelAsInt; IConfigMapPath configMapPath = IISMapPath.GetInstance(); // Get the configuration paths and application information string appSiteName, appSiteID; VirtualPath appPath; string configPath, locationConfigPath; WebConfigurationHost.GetConfigPaths(configMapPath, webLevel, VirtualPath.CreateNonRelativeAllowNull(path), site, locationSubPath, out appPath, out appSiteName, out appSiteID, out configPath, out locationConfigPath); // // Format of filePaths: // appPath < appSiteName < appSiteID < configPath < locationConfigPath [< configPath < fileName]+ // ArrayList filePaths = new ArrayList(); filePaths.Add(VirtualPath.GetVirtualPathString(appPath)); filePaths.Add(appSiteName); filePaths.Add(appSiteID); filePaths.Add(configPath); filePaths.Add(locationConfigPath); string dummySiteID; VirtualPath virtualPath; WebConfigurationHost.GetSiteIDAndVPathFromConfigPath(configPath, out dummySiteID, out virtualPath); // pathmap for machine.config filePaths.Add(WebConfigurationHost.MachineConfigPath); filePaths.Add(HttpConfigurationSystem.MachineConfigurationFilePath); // pathmap for root web.config if (webLevel != WebLevel.Machine) { filePaths.Add(WebConfigurationHost.RootWebConfigPath); filePaths.Add(HttpConfigurationSystem.RootWebConfigurationFilePath); // pathmap for other paths for (VirtualPath currentVirtualPath = virtualPath; currentVirtualPath != null; currentVirtualPath = currentVirtualPath.Parent) { string currentConfigPath = WebConfigurationHost.GetConfigPathFromSiteIDAndVPath(appSiteID, currentVirtualPath); string currentFilePath = configMapPath.MapPath(appSiteID, currentVirtualPath.VirtualPathString); currentFilePath = System.IO.Path.Combine(currentFilePath, HttpConfigurationSystem.WebConfigFileName); filePaths.Add(currentConfigPath); filePaths.Add(currentFilePath); } } // join into a single string StringBuilder sb = new StringBuilder(); for (int i = 0; i < filePaths.Count; i++) { if (i > 0) { sb.Append(FilePathsSeparatorChar); } string part = (string) filePaths[i]; sb.Append(part); } return sb.ToString(); } public string DoEncryptOrDecrypt(bool doEncrypt, string xmlString, string protectionProviderName, string protectionProviderType, string[] paramKeys, string[] paramValues) { Type t = Type.GetType(protectionProviderType, true); if (!typeof(ProtectedConfigurationProvider).IsAssignableFrom(t)) { throw new Exception(SR.GetString(SR.WrongType_of_Protected_provider)); } ProtectedConfigurationProvider provider = (ProtectedConfigurationProvider)Activator.CreateInstance(t); NameValueCollection cloneParams = new NameValueCollection(paramKeys.Length); XmlNode node; for(int iter=0; iter
Link Menu

This book is available now!
Buy at Amazon US or
Buy at Amazon UK
- MimeBasePart.cs
- AssemblyUtil.cs
- Storyboard.cs
- ToggleButtonAutomationPeer.cs
- ThemeDirectoryCompiler.cs
- GeometryHitTestResult.cs
- WindowsGraphicsCacheManager.cs
- CategoryAttribute.cs
- ModifierKeysConverter.cs
- StringArrayConverter.cs
- DebugController.cs
- ByteKeyFrameCollection.cs
- initElementDictionary.cs
- SimpleRecyclingCache.cs
- BamlLocalizerErrorNotifyEventArgs.cs
- WebResponse.cs
- GeneralTransform2DTo3D.cs
- UMPAttributes.cs
- MemoryRecordBuffer.cs
- Freezable.cs
- FrameworkElementFactory.cs
- ToolStripDropTargetManager.cs
- SelectionEditingBehavior.cs
- XmlAnyElementAttribute.cs
- CodeLabeledStatement.cs
- Calendar.cs
- path.cs
- UriSectionReader.cs
- SqlConnectionFactory.cs
- Track.cs
- WarningException.cs
- TextRange.cs
- Vector3D.cs
- PersonalizableTypeEntry.cs
- LinqDataSourceView.cs
- DetailsViewActionList.cs
- PrefixQName.cs
- sqlser.cs
- Object.cs
- RuntimeEnvironment.cs
- AutomationElement.cs
- KeyedHashAlgorithm.cs
- CompilerGlobalScopeAttribute.cs
- MenuItemBinding.cs
- RegisterResponseInfo.cs
- DataTableNewRowEvent.cs
- BitmapEffectInputData.cs
- ListBoxItemWrapperAutomationPeer.cs
- AsymmetricKeyExchangeDeformatter.cs
- Itemizer.cs
- EntityDataSource.cs
- DateTimePickerDesigner.cs
- UIElementHelper.cs
- SafeFileHandle.cs
- OleTxTransactionInfo.cs
- PageStatePersister.cs
- ApplicationSecurityManager.cs
- BrowserInteropHelper.cs
- LockedBorderGlyph.cs
- SuppressMessageAttribute.cs
- XmlSchemaValidator.cs
- ThicknessAnimation.cs
- ToolStripArrowRenderEventArgs.cs
- DSACryptoServiceProvider.cs
- CngAlgorithm.cs
- SpeakInfo.cs
- EmptyEnumerable.cs
- WindowAutomationPeer.cs
- DetailsViewCommandEventArgs.cs
- ProcessModule.cs
- ToolStripOverflow.cs
- PnrpPermission.cs
- Adorner.cs
- UntypedNullExpression.cs
- WebBrowserHelper.cs
- CapabilitiesRule.cs
- DataServiceRequestException.cs
- SchemaConstraints.cs
- LocationSectionRecord.cs
- StackBuilderSink.cs
- Decoder.cs
- Figure.cs
- Win32KeyboardDevice.cs
- GroupStyle.cs
- MessageDispatch.cs
- CookielessData.cs
- IndicFontClient.cs
- COM2ExtendedBrowsingHandler.cs
- Inflater.cs
- documentsequencetextcontainer.cs
- RouteItem.cs
- ThrowHelper.cs
- ConnectionPointCookie.cs
- ExpressionCopier.cs
- TypedDatasetGenerator.cs
- DataDocumentXPathNavigator.cs
- RtfNavigator.cs
- CatalogZoneBase.cs
- WindowClosedEventArgs.cs
- GorillaCodec.cs