#region License Information
/* HeuristicLab
* Copyright (C) 2002-2010 Heuristic and Evolutionary Algorithms Laboratory (HEAL)
*
* This file is part of HeuristicLab.
*
* HeuristicLab is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* HeuristicLab is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with HeuristicLab. If not, see .
*/
#endregion
using System;
using System.Collections.Generic;
using System.Diagnostics;
using System.Linq;
using System.Reflection;
using System.Security;
using System.Security.Permissions;
using System.Security.Policy;
using HeuristicLab.PluginInfrastructure.Manager;
namespace HeuristicLab.PluginInfrastructure.Sandboxing {
public class SandboxManager {
// static class
private SandboxManager() { }
private static StrongName CreateStrongName(Assembly assembly) {
if (assembly == null)
throw new ArgumentNullException("assembly");
AssemblyName assemblyName = assembly.GetName();
Trace.Assert(assemblyName != null, "Could not get assembly name");
// get the public key blob
byte[] publicKey = assemblyName.GetPublicKey();
if (publicKey == null || publicKey.Length == 0)
throw new InvalidOperationException("Assembly is not strongly named");
StrongNamePublicKeyBlob keyBlob = new StrongNamePublicKeyBlob(publicKey);
// and create the StrongName
return new StrongName(keyBlob, assemblyName.Name, assemblyName.Version);
}
#region ISandboxManager Members
public static AppDomain CreateAndInitSandbox(string appDomainName, string applicationBase, string configFilePath) {
PermissionSet pset;
#region permission set for sandbox
// Uncomment code for sandboxed appdomain
//pset = new PermissionSet(PermissionState.None);
//pset.AddPermission(new SecurityPermission(SecurityPermissionFlag.Execution));
//pset.AddPermission(new ReflectionPermission(ReflectionPermissionFlag.MemberAccess));
//FileIOPermission fPerm = new FileIOPermission(PermissionState.None);
//foreach (IPluginDescription plugin in ApplicationManager.Manager.Plugins) {
// fPerm.AddPathList(FileIOPermissionAccess.Read | FileIOPermissionAccess.PathDiscovery, plugin.Files.ToArray());
//}
//pset.AddPermission(fPerm);
#endregion
#region permission set of unrestricted appdomain
// unrestricted appdomain
pset = new PermissionSet(PermissionState.Unrestricted);
#endregion
AppDomainSetup setup = AppDomain.CurrentDomain.SetupInformation;
setup.PrivateBinPath = applicationBase;
setup.ApplicationBase = applicationBase;
setup.ConfigurationFile = configFilePath;
AppDomain applicationDomain = AppDomain.CreateDomain(appDomainName, AppDomain.CurrentDomain.Evidence, setup, pset, CreateStrongName(Assembly.GetExecutingAssembly()));
Type applicationManagerType = typeof(DefaultApplicationManager);
DefaultApplicationManager applicationManager =
(DefaultApplicationManager)applicationDomain.CreateInstanceAndUnwrap(applicationManagerType.Assembly.FullName, applicationManagerType.FullName, true, BindingFlags.NonPublic | BindingFlags.Instance, null, null, null, null, null);
PluginManager pm = new PluginManager(applicationBase);
pm.DiscoverAndCheckPlugins();
ApplicationDescription[] apps = pm.Applications.Cast().ToArray();
PluginDescription[] plugins = pm.Plugins.Cast().ToArray();
applicationManager.PrepareApplicationDomain(apps, plugins);
return applicationDomain;
}
#endregion
}
}