Επεξεργασία

Κοινή χρήση μέσω


CLR integration programming model restrictions

Applies to: SQL Server Azure SQL Managed Instance

When you build a managed stored procedure or other managed database object, SQL Server performs certain code checks that need to be considered. These checks are performed on the managed code assembly when first registered in the database, using the CREATE ASSEMBLY statement, and also at runtime. The managed code is also checked at runtime because in an assembly there might be code paths that might never actually be reached at runtime.

These code checks provide flexibility for registering third-party assemblies especially, so that an assembly isn't blocked where there's unsafe code designed to run in a client environment, but would never be executed in the hosted common language runtime (CLR). The requirements that the managed code must meet depend on whether the assembly is registered as SAFE, EXTERNAL_ACCESS, or UNSAFE. SAFE is the strictest security level.

In addition to restrictions being placed on the managed code assemblies, there are also code security permissions that are granted. The CLR supports a security model called code access security (CAS) for managed code. In this model, permissions are granted to assemblies based on the identity of the code. SAFE, EXTERNAL_ACCESS, and UNSAFE assemblies have different CAS permissions. For more information, see CLR Integration Code Access Security.

If the publisher policy is set, CREATE ASSEMBLY fails.

CREATE ASSEMBLY checks

When the CREATE ASSEMBLY statement runs, the following checks are performed for each security level. If any check fails, CREATE ASSEMBLY fails with an error message.

Global (any security level)

All referenced assemblies must meet one or more of the following criteria:

  • The assembly is already registered in the database.

  • The assembly is one of the supported assemblies. For more information, see Supported .NET Framework Libraries.

  • You're using CREATE ASSEMBLY FROM <location>, and all the referenced assemblies and their dependencies are available in <location>.

  • You're using CREATE ASSEMBLY FROM <bytes ...>, and all the references are specified via space separated bytes.

EXTERNAL_ACCESS

All EXTERNAL_ACCESS assemblies must meet the following criteria:

  • Static fields aren't used to store information. Read-only static fields are allowed.

  • The PEVerify test is passed. The PEVerify tool (peverify.exe), which checks that the common intermediate language (CIL) code and associated metadata meet type safety requirements, is provided with the .NET Framework SDK.

  • Synchronization, for example with the SynchronizationAttribute class, isn't used.

  • Finalizer methods aren't used.

The following custom attributes are disallowed in EXTERNAL_ACCESS assemblies:

  • System.ContextStaticAttribute
  • System.MTAThreadAttribute
  • System.Runtime.CompilerServices.MethodImplAttribute
  • System.Runtime.CompilerServices.CompilationRelaxationsAttribute
  • System.Runtime.Remoting.Contexts.ContextAttribute
  • System.Runtime.Remoting.Contexts.SynchronizationAttribute
  • System.Runtime.InteropServices.DllImportAttribute
  • System.Security.Permissions.CodeAccessSecurityAttribute
  • System.Security.SuppressUnmanagedCodeSecurityAttribute
  • System.Security.UnverifiableCodeAttribute
  • System.STAThreadAttribute
  • System.ThreadStaticAttribute

SAFE

  • All EXTERNAL_ACCESS assembly conditions are checked.

Runtime checks

At runtime, the code assembly is checked for the following conditions. If any of these conditions are found, the managed code isn't allowed to run, and an exception is thrown.

UNSAFE

You can't load an assembly, either explicitly by calling the System.Reflection.Assembly.Load() method from a byte array, or implicitly using Reflection.Emit namespace.

EXTERNAL_ACCESS

All UNSAFE conditions are checked.

All types and methods annotated with the following host protection attribute (HPA) values in the supported list of assemblies are disallowed.

  • SelfAffectingProcessMgmt
  • SelfAffectingThreading
  • Synchronization
  • SharedState
  • ExternalProcessMgmt
  • ExternalThreading
  • SecurityInfrastructure
  • MayLeakOnAbort
  • UI

For more information about HPAs and a list of disallowed types and members in the supported assemblies, see Host Protection Attributes and CLR Integration Programming.

SAFE

All EXTERNAL_ACCESS conditions are checked.