[Mono-bugs] [Bug 82043][Nor] Changed - WebMethod and PrincipalPermission
bugzilla-daemon at bugzilla.ximian.com
bugzilla-daemon at bugzilla.ximian.com
Fri Jul 27 10:20:02 EDT 2007
Please do not reply to this email- if you want to comment on the bug, go to the
URL shown below and enter your comments there.
Changed by atsushi at ximian.com.
http://bugzilla.ximian.com/show_bug.cgi?id=82043
--- shadow/82043 2007-07-15 09:10:46.000000000 -0400
+++ shadow/82043.tmp.9219 2007-07-27 10:20:02.000000000 -0400
@@ -10,13 +10,12 @@
Component: Sys.Web.Services
AssignedTo: atsushi at ximian.com
ReportedBy: mmorano at mikeandwan.us
QAContact: mono-bugs at ximian.com
TargetMilestone: ---
URL:
-Cc:
Summary: WebMethod and PrincipalPermission
I am trying to secure a simple web service by leveraging the existing forms
authentication configured for an asp.net site, and was curious if the
following is expected to work at this point:
@@ -121,6 +120,60 @@
directory domain, so I dont believe the comments concerned with the
Name attribute apply here. Is there something I am missing?
Thanks,
Mike
+
+------- Additional Comments From atsushi at ximian.com 2007-07-27 10:20 -------
+Sebastien, should it work regardless of lacking "mono --security=cas"?
+When I tried below, it got an error, though regardless of the
+[PrincipalPermission] existence:
+
+atsushi at linux-4gue:~/tests/82403> MONO_OPTIONS=--security=cas xsp2
+xsp2
+Listening on port: 8080 (non-secure)
+Listening on address: 0.0.0.0
+Root directory: /home/atsushi/tests/82403
+Hit Return to stop the server.
+Stacktrace:
+
+ at (wrapper managed-to-native)
+System.Security.SecurityFrame._GetSecurityStack (int) <0x00004>
+ at (wrapper managed-to-native)
+System.Security.SecurityFrame._GetSecurityStack (int) <0xffffffff>
+ at System.Security.SecurityFrame.GetStack (int) <0x00037>
+ at System.Threading.CompressedStack.Capture () <0x0003f>
+ at System.Security.SecurityContext.Capture () <0x00075>
+ at System.Threading.ExecutionContext.Capture () <0x00079>
+ at (wrapper runtime-invoke)
+System.Threading.ExecutionContext.runtime_invoke_ExecutionContext
+(object,intptr,intptr,intptr) <0xffffffff>
+ at (wrapper managed-to-native)
+System.Object.__icall_wrapper_mono_delegate_begin_invoke
+(object,intptr) <0x00004>
+ at (wrapper managed-to-native)
+System.Object.__icall_wrapper_mono_delegate_begin_invoke
+(object,intptr) <0xffffffff>
+ at (wrapper delegate-begin-invoke)
+System.MulticastDelegate.begin_invoke_IAsyncResult_AsyncCallback_object
+(System.AsyncCallback,object) <0xffffffff>
+ at System.Net.Sockets.Socket.BeginReceive
+(byte[],int,int,System.Net.Sockets.SocketFlags,System.AsyncCallback,object)
+<0x00145>
+ at System.Net.Sockets.NetworkStream.BeginRead
+(byte[],int,int,System.AsyncCallback,object) <0x00072>
+ at Mono.WebServer.XSPWorker.Run (object) <0x00085>
+ at Mono.WebServer.ApplicationServer.StartRequest
+(System.Net.Sockets.Socket,int) <0x0007f>
+ at Mono.WebServer.ApplicationServer.ReuseSocket
+(System.Net.Sockets.Socket,int) <0x00010>
+ at (wrapper remoting-invoke-with-check)
+Mono.WebServer.ApplicationServer.ReuseSocket
+(System.Net.Sockets.Socket,int) <0xffffffff>
+ at Mono.WebServer.XSPWorker.Close (bool) <0x000e4>
+ at Mono.WebServer.XSPRequestBroker.Close (int,bool) <0x00046>
+ at (wrapper remoting-invoke-with-check)
+Mono.WebServer.XSPRequestBroker.Close (int,bool) <0xffffffff>
+ at (wrapper xdomain-dispatch) Mono.WebServer.XSPRequestBroker.Close
+(object,byte[]&,byte[]&,int,bool) <0xffffffff>
+
More information about the mono-bugs
mailing list