Code:
/ Net / Net / 3.5.50727.3053 / DEVDIV / depot / DevDiv / releases / whidbey / netfxsp / ndp / fx / src / xsp / System / Web / Security / UrlAuthorizationModule.cs / 5 / UrlAuthorizationModule.cs
//------------------------------------------------------------------------------ //// Copyright (c) Microsoft Corporation. All rights reserved. // //----------------------------------------------------------------------------- /* * UrlAuthorizationModule class * * Copyright (c) 1999 Microsoft Corporation */ namespace System.Web.Security { using System.Runtime.Serialization; using System.Web; using System.Web.Util; using System.Collections; using System.Web.Configuration; using System.IO; using System.Security.Principal; using System.Security.Permissions; using System.Web.Management; using System.Web.Hosting; using System.Collections.Generic; ////// This module provides URL based /// authorization services for allowing or denying access to specified resources /// [AspNetHostingPermission(SecurityAction.LinkDemand, Level=AspNetHostingPermissionLevel.Minimal)] public sealed class UrlAuthorizationModule : IHttpModule { ////// [SecurityPermission(SecurityAction.Demand, Unrestricted=true)] public UrlAuthorizationModule() { } ////// Initializes a new instance of the ////// class. /// /// public void Init(HttpApplication app) { app.AuthorizeRequest += new EventHandler(this.OnEnter); } ///[To be supplied.] ////// public void Dispose() { } private static bool s_EnabledDetermined; private static bool s_Enabled; [SecurityPermission(SecurityAction.Demand, Unrestricted=true)] public static bool CheckUrlAccessForPrincipal(String virtualPath, IPrincipal user, string verb) { if (virtualPath == null) throw new ArgumentNullException("virtualPath"); if (user == null) throw new ArgumentNullException("user"); if (verb == null) throw new ArgumentNullException("verb"); verb = verb.Trim(); VirtualPath vPath = VirtualPath.Create(virtualPath); if (!vPath.IsWithinAppRoot) throw new ArgumentException(SR.GetString(SR.Virtual_path_outside_application_not_supported), "virtualPath"); if (!s_EnabledDetermined) { if( !HttpRuntime.UseIntegratedPipeline) { HttpModulesSection modulesSection = RuntimeConfig.GetConfig().HttpModules; int len = modulesSection.Modules.Count; for (int iter = 0; iter < len; iter++) { HttpModuleAction module = modulesSection.Modules[iter]; if (Type.GetType(module.Type, false) == typeof(UrlAuthorizationModule)) { s_Enabled = true; break; } } } else { List[To be supplied.] ///modules = HttpApplication.IntegratedModuleList; foreach (ModuleConfigurationInfo mod in modules) { if (Type.GetType(mod.Type, false) == typeof(UrlAuthorizationModule)) { s_Enabled = true; break; } } } s_EnabledDetermined = true; } if (!s_Enabled) return true; AuthorizationSection settings = RuntimeConfig.GetConfig(vPath).Authorization; // Check if the user is allowed, or the request is for the login page return settings.EveryoneAllowed || settings.IsUserAllowed(user, verb); } //////////////////////////////////////////////////////////// //////////////////////////////////////////////////////////// //////////////////////////////////////////////////////////// // Module Enter: Get the authorization configuration section // and see if this user is allowed or not void OnEnter(Object source, EventArgs eventArgs) { HttpApplication app; HttpContext context; app = (HttpApplication)source; context = app.Context; if (context.SkipAuthorization) { if (context.User == null || !context.User.Identity.IsAuthenticated) PerfCounters.IncrementCounter(AppPerfCounter.ANONYMOUS_REQUESTS); return; } // Get the authorization config object AuthorizationSection settings = RuntimeConfig.GetConfig(context).Authorization; // Check if the user is allowed, or the request is for the login page if (!settings.EveryoneAllowed && !settings.IsUserAllowed(context.User, context.Request.RequestType)) { // Deny access context.Response.StatusCode = 401; WriteErrorMessage(context); if (context.User != null && context.User.Identity.IsAuthenticated) { // We don't raise failure audit event for anonymous user WebBaseEvent.RaiseSystemEvent(this, WebEventCodes.AuditUrlAuthorizationFailure); } app.CompleteRequest(); } else { if (context.User == null || !context.User.Identity.IsAuthenticated) PerfCounters.IncrementCounter(AppPerfCounter.ANONYMOUS_REQUESTS); WebBaseEvent.RaiseSystemEvent(this, WebEventCodes.AuditUrlAuthorizationSuccess); } } ///////////////////////////////////////////////////////////////////////////// void WriteErrorMessage(HttpContext context) { context.Response.Write(UrlAuthFailedErrorFormatter.GetErrorText()); // In Integrated pipeline, ask for handler headers to be generated. This would be unnecessary // if we just threw an access denied exception, and used the standard error mechanism context.Response.GenerateResponseHeadersForHandler(); } static internal bool RequestRequiresAuthorization(HttpContext context) { if (context.SkipAuthorization) return false; AuthorizationSection settings = RuntimeConfig.GetConfig(context).Authorization; // Check if the anonymous user is allowed if (_AnonUser == null) _AnonUser = new GenericPrincipal(new GenericIdentity(String.Empty, String.Empty), new String[0]); return !settings.IsUserAllowed(_AnonUser, context.Request.RequestType); } internal static bool IsUserAllowedToPath(HttpContext context, VirtualPath virtualPath) { AuthorizationSection settings = RuntimeConfig.GetConfig(context, virtualPath).Authorization; return settings.EveryoneAllowed || settings.IsUserAllowed(context.User, context.Request.RequestType); } static GenericPrincipal _AnonUser; } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007. //------------------------------------------------------------------------------ // // Copyright (c) Microsoft Corporation. All rights reserved. // //----------------------------------------------------------------------------- /* * UrlAuthorizationModule class * * Copyright (c) 1999 Microsoft Corporation */ namespace System.Web.Security { using System.Runtime.Serialization; using System.Web; using System.Web.Util; using System.Collections; using System.Web.Configuration; using System.IO; using System.Security.Principal; using System.Security.Permissions; using System.Web.Management; using System.Web.Hosting; using System.Collections.Generic; ////// This module provides URL based /// authorization services for allowing or denying access to specified resources /// [AspNetHostingPermission(SecurityAction.LinkDemand, Level=AspNetHostingPermissionLevel.Minimal)] public sealed class UrlAuthorizationModule : IHttpModule { ////// [SecurityPermission(SecurityAction.Demand, Unrestricted=true)] public UrlAuthorizationModule() { } ////// Initializes a new instance of the ////// class. /// /// public void Init(HttpApplication app) { app.AuthorizeRequest += new EventHandler(this.OnEnter); } ///[To be supplied.] ////// public void Dispose() { } private static bool s_EnabledDetermined; private static bool s_Enabled; [SecurityPermission(SecurityAction.Demand, Unrestricted=true)] public static bool CheckUrlAccessForPrincipal(String virtualPath, IPrincipal user, string verb) { if (virtualPath == null) throw new ArgumentNullException("virtualPath"); if (user == null) throw new ArgumentNullException("user"); if (verb == null) throw new ArgumentNullException("verb"); verb = verb.Trim(); VirtualPath vPath = VirtualPath.Create(virtualPath); if (!vPath.IsWithinAppRoot) throw new ArgumentException(SR.GetString(SR.Virtual_path_outside_application_not_supported), "virtualPath"); if (!s_EnabledDetermined) { if( !HttpRuntime.UseIntegratedPipeline) { HttpModulesSection modulesSection = RuntimeConfig.GetConfig().HttpModules; int len = modulesSection.Modules.Count; for (int iter = 0; iter < len; iter++) { HttpModuleAction module = modulesSection.Modules[iter]; if (Type.GetType(module.Type, false) == typeof(UrlAuthorizationModule)) { s_Enabled = true; break; } } } else { List[To be supplied.] ///modules = HttpApplication.IntegratedModuleList; foreach (ModuleConfigurationInfo mod in modules) { if (Type.GetType(mod.Type, false) == typeof(UrlAuthorizationModule)) { s_Enabled = true; break; } } } s_EnabledDetermined = true; } if (!s_Enabled) return true; AuthorizationSection settings = RuntimeConfig.GetConfig(vPath).Authorization; // Check if the user is allowed, or the request is for the login page return settings.EveryoneAllowed || settings.IsUserAllowed(user, verb); } //////////////////////////////////////////////////////////// //////////////////////////////////////////////////////////// //////////////////////////////////////////////////////////// // Module Enter: Get the authorization configuration section // and see if this user is allowed or not void OnEnter(Object source, EventArgs eventArgs) { HttpApplication app; HttpContext context; app = (HttpApplication)source; context = app.Context; if (context.SkipAuthorization) { if (context.User == null || !context.User.Identity.IsAuthenticated) PerfCounters.IncrementCounter(AppPerfCounter.ANONYMOUS_REQUESTS); return; } // Get the authorization config object AuthorizationSection settings = RuntimeConfig.GetConfig(context).Authorization; // Check if the user is allowed, or the request is for the login page if (!settings.EveryoneAllowed && !settings.IsUserAllowed(context.User, context.Request.RequestType)) { // Deny access context.Response.StatusCode = 401; WriteErrorMessage(context); if (context.User != null && context.User.Identity.IsAuthenticated) { // We don't raise failure audit event for anonymous user WebBaseEvent.RaiseSystemEvent(this, WebEventCodes.AuditUrlAuthorizationFailure); } app.CompleteRequest(); } else { if (context.User == null || !context.User.Identity.IsAuthenticated) PerfCounters.IncrementCounter(AppPerfCounter.ANONYMOUS_REQUESTS); WebBaseEvent.RaiseSystemEvent(this, WebEventCodes.AuditUrlAuthorizationSuccess); } } ///////////////////////////////////////////////////////////////////////////// void WriteErrorMessage(HttpContext context) { context.Response.Write(UrlAuthFailedErrorFormatter.GetErrorText()); // In Integrated pipeline, ask for handler headers to be generated. This would be unnecessary // if we just threw an access denied exception, and used the standard error mechanism context.Response.GenerateResponseHeadersForHandler(); } static internal bool RequestRequiresAuthorization(HttpContext context) { if (context.SkipAuthorization) return false; AuthorizationSection settings = RuntimeConfig.GetConfig(context).Authorization; // Check if the anonymous user is allowed if (_AnonUser == null) _AnonUser = new GenericPrincipal(new GenericIdentity(String.Empty, String.Empty), new String[0]); return !settings.IsUserAllowed(_AnonUser, context.Request.RequestType); } internal static bool IsUserAllowedToPath(HttpContext context, VirtualPath virtualPath) { AuthorizationSection settings = RuntimeConfig.GetConfig(context, virtualPath).Authorization; return settings.EveryoneAllowed || settings.IsUserAllowed(context.User, context.Request.RequestType); } static GenericPrincipal _AnonUser; } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007.
Link Menu
This book is available now!
Buy at Amazon US or
Buy at Amazon UK
- DataGridViewSortCompareEventArgs.cs
- MasterPageCodeDomTreeGenerator.cs
- ColumnResizeAdorner.cs
- HitTestResult.cs
- SingleAnimation.cs
- SettingsContext.cs
- ProcessHostConfigUtils.cs
- DBSqlParser.cs
- MailAddressCollection.cs
- PopupEventArgs.cs
- PathSegmentCollection.cs
- unsafenativemethodsother.cs
- Variant.cs
- GC.cs
- EventHandlers.cs
- WindowsListViewSubItem.cs
- ImageUrlEditor.cs
- BackgroundWorker.cs
- NamedObject.cs
- FloatAverageAggregationOperator.cs
- HtmlSelect.cs
- PagesChangedEventArgs.cs
- XmlEncodedRawTextWriter.cs
- SiteOfOriginPart.cs
- CodeExpressionRuleDeclaration.cs
- StringCollection.cs
- HtmlTernaryTree.cs
- OlePropertyStructs.cs
- PerCallInstanceContextProvider.cs
- ObjectTag.cs
- GridViewColumnCollectionChangedEventArgs.cs
- AngleUtil.cs
- BooleanKeyFrameCollection.cs
- CroppedBitmap.cs
- SafeNativeMethodsMilCoreApi.cs
- DynamicQueryStringParameter.cs
- Content.cs
- ItemsPanelTemplate.cs
- HttpResponseWrapper.cs
- ScriptResourceHandler.cs
- XmlArrayItemAttribute.cs
- UInt32Converter.cs
- ErrorWrapper.cs
- DocumentPageTextView.cs
- SchemaImporterExtensionElementCollection.cs
- SystemDiagnosticsSection.cs
- ActiveXSerializer.cs
- FieldDescriptor.cs
- ActivationArguments.cs
- DesignRelation.cs
- Stopwatch.cs
- ListenerElementsCollection.cs
- UIntPtr.cs
- WindowsSolidBrush.cs
- CriticalFinalizerObject.cs
- PreservationFileReader.cs
- ConfigXmlCDataSection.cs
- MessageSecurityProtocolFactory.cs
- Qualifier.cs
- EnumValAlphaComparer.cs
- BufferedReadStream.cs
- HtmlTableCellCollection.cs
- PlatformNotSupportedException.cs
- HtmlTernaryTree.cs
- Span.cs
- DelayedRegex.cs
- SupportingTokenProviderSpecification.cs
- HatchBrush.cs
- linebase.cs
- GuidelineCollection.cs
- IsolatedStorage.cs
- SettingsPropertyIsReadOnlyException.cs
- SectionRecord.cs
- ListItemCollection.cs
- DataMember.cs
- SqlDataSourceCache.cs
- FormViewPageEventArgs.cs
- JulianCalendar.cs
- AffineTransform3D.cs
- PageHandlerFactory.cs
- RtfControls.cs
- HorizontalAlignConverter.cs
- DataViewSettingCollection.cs
- BuildManagerHost.cs
- StoreContentChangedEventArgs.cs
- CommonDialog.cs
- GetPageNumberCompletedEventArgs.cs
- BaseParagraph.cs
- Cursor.cs
- PropertyValueEditor.cs
- PublisherMembershipCondition.cs
- ConfigXmlSignificantWhitespace.cs
- RequiredAttributeAttribute.cs
- GroupStyle.cs
- SettingsPropertyValueCollection.cs
- ConfigurationLocationCollection.cs
- Decimal.cs
- DataObjectAttribute.cs
- SafeIUnknown.cs
- XmlDownloadManager.cs