Permalink
Browse files

Enabled APTCA

Updated Castle.Core
SecuritySaveCritical for methods dealing with Critical apis

- removed IF SYSTEMWEB as we have CLIENTPROFILE for this
  • Loading branch information...
1 parent 7f684c7 commit ed875d4961936dcb524e436da7304491c3fb308d @kkozmic kkozmic committed Feb 15, 2012
Binary file not shown.
Binary file not shown.
View
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
@@ -802,6 +802,7 @@
<Compile Include="AssemblyInfo.cs" />
<Compile Include="MicroKernel\Util\SimpleMethodEqualityComparer.cs" />
<Compile Include="MicroKernel\Util\SimpleTypeEqualityComparer.cs" />
+ <Compile Include="SecurityAssemblyInfo.cs" />
<Compile Include="Windsor\Configuration\AppDomain\CastleSectionHandler.cs">
<SubType>Code</SubType>
</Compile>
@@ -51,6 +51,7 @@ public CallContextLifetimeScope(IWindsorContainer container) : this(container.Ke
{
}
+ [System.Security.SecuritySafeCritical]
public void Dispose()
{
using (var token = @lock.ForReadingUpgradeable())
@@ -90,11 +91,13 @@ public Burden GetCachedInstance(ComponentModel instance, ScopedInstanceActivatio
}
}
+ [System.Security.SecuritySafeCritical]
private void SetCurrentScope(CallContextLifetimeScope lifetimeScope)
{
CallContext.SetData(contextKey, lifetimeScope);
}
+ [System.Security.SecuritySafeCritical]
public static CallContextLifetimeScope ObtainCurrentScope()
{
return (CallContextLifetimeScope)CallContext.GetData(contextKey);
@@ -0,0 +1,6 @@
+// Sets up assembly level security settings
+#if ! SILVERLIGHT
+[assembly: System.Security.AllowPartiallyTrustedCallers]
+[assembly: System.Security.SecurityRules(System.Security.SecurityRuleSet.Level2)]
+// [assembly: System.Security.SecurityTransparent]
+#endif

0 comments on commit ed875d4

Please sign in to comment.