Access Permission. Assert Method
Declares that the calling code can access the resource protected by a permission demand through the code that calls this method, even if callers higher in the stack have not been granted permission to access the resource. Using Assert() can create security issues.
public: virtual void Assert();
public: void Assert();
public void Assert ();
[System.Diagnostics.Conditional("FEATURE_MONO_CAS")] public void Assert ();
abstract member Assert : unit -> unit override this.Assert : unit -> unit
member this.Assert : unit -> unit
Public Sub Assert ()
The calling code does not have Assertion.
There is already an active Assert() for the current frame.
The call stack is typically represented as growing down, so that methods higher in the call stack call methods lower in the call stack. Calling Assert prevents a stack walk originating lower in the call stack from proceeding up the call stack beyond the code that calls this method. Therefore, even if callers higher on the call stack do not have the requisite permissions to access a resource, they can still access it through the code that calls this method on the necessary permission. An assertion is effective only if the code that calls Assert passes the security check for the permission that it is asserting.
The call to Assert is effective until the calling code returns to its caller. Only one Assert can be active on a frame. An attempt to call Assert when an active Assert exists on the frame results in a SecurityException. Call RevertAssert or RevertAll to remove an active Assert.
Assert is ignored for a permission not granted because a demand for that permission will not succeed. However, if code lower on the call stack calls Demand for that permission, a SecurityException is thrown when the stack walk reaches the code that tried to call Assert. This happens because the code that called Assert has not been granted the permission, even though it tried to Assert it.
Because calling Assert removes the requirement that all code in the call chain must be granted permission to access the specified resource, it can open up security issues if used incorrectly or inappropriately. Therefore, it should be used with great caution.
Notes to Inheritors
You cannot override this method.