490 lines
20 KiB
C++
Executable File
490 lines
20 KiB
C++
Executable File
/*************************************************************************
|
|
*
|
|
* $RCSfile: ScriptSecurityManager.cxx,v $
|
|
*
|
|
* $Revision: 1.9 $
|
|
*
|
|
* last change: $Author: dfoster $ $Date: 2003-02-13 17:29:38 $
|
|
*
|
|
* The Contents of this file are made available subject to the terms of
|
|
* either of the following licenses
|
|
*
|
|
* - GNU Lesser General Public License Version 2.1
|
|
* - Sun Industry Standards Source License Version 1.1
|
|
*
|
|
* Sun Microsystems Inc., October, 2000
|
|
*
|
|
* GNU Lesser General Public License Version 2.1
|
|
* =============================================
|
|
* Copyright 2000 by Sun Microsystems, Inc.
|
|
* 901 San Antonio Road, Palo Alto, CA 94303, USA
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License version 2.1, as published by the Free Software Foundation.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library; if not, write to the Free Software
|
|
* Foundation, Inc., 59 Temple Place, Suite 330, Boston,
|
|
* MA 02111-1307 USA
|
|
*
|
|
*
|
|
* Sun Industry Standards Source License Version 1.1
|
|
* =================================================
|
|
* The contents of this file are subject to the Sun Industry Standards
|
|
* Source License Version 1.1 (the "License"); You may not use this file
|
|
* except in compliance with the License. You may obtain a copy of the
|
|
* License at http://www.openoffice.org/license.html.
|
|
*
|
|
* Software provided under this License is provided on an "AS IS" basis,
|
|
* WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING,
|
|
* WITHOUT LIMITATION, WARRANTIES THAT THE SOFTWARE IS FREE OF DEFECTS,
|
|
* MERCHANTABLE, FIT FOR A PARTICULAR PURPOSE, OR NON-INFRINGING.
|
|
* See the License for the specific provisions governing your rights and
|
|
* obligations concerning the Software.
|
|
*
|
|
* The Initial Developer of the Original Code is: Sun Microsystems, Inc.
|
|
*
|
|
* Copyright: 2000 by Sun Microsystems, Inc.
|
|
*
|
|
* All Rights Reserved.
|
|
*
|
|
* Contributor(s): _______________________________________
|
|
*
|
|
*
|
|
************************************************************************/
|
|
|
|
#include <com/sun/star/lang/XMultiComponentFactory.hpp>
|
|
#include <com/sun/star/lang/XMultiServiceFactory.hpp>
|
|
#include <com/sun/star/beans/XPropertySet.hpp>
|
|
#include <com/sun/star/beans/PropertyValue.hpp>
|
|
#include <com/sun/star/container/XNameReplace.hpp>
|
|
#include <com/sun/star/util/XChangesBatch.hpp>
|
|
#include <com/sun/star/util/XMacroExpander.hpp>
|
|
#include <com/sun/star/util/XStringSubstitution.hpp>
|
|
#include <com/sun/star/awt/XDialog.hpp>
|
|
#include <drafts/com/sun/star/script/framework/storage/XScriptStorageManager.hpp>
|
|
#include <drafts/com/sun/star/script/framework/storage/XScriptInfoAccess.hpp>
|
|
#include "ScriptSecurityManager.hxx"
|
|
#include <util/util.hxx>
|
|
#include <util/scriptingconstants.hxx>
|
|
|
|
|
|
using namespace ::rtl;
|
|
using namespace ::osl;
|
|
using namespace ::com::sun::star;
|
|
using namespace ::com::sun::star::uno;
|
|
using namespace ::drafts::com::sun::star::script::framework;
|
|
|
|
// is this in the utils?
|
|
const char* const SCRIPTSTORAGEMANAGER_SERVICE =
|
|
"/singletons/drafts.com.sun.star.script.framework.storage.theScriptStorageManager";
|
|
|
|
namespace scripting_securitymgr
|
|
{
|
|
|
|
static OUString s_configProv = ::rtl::OUString::createFromAscii(
|
|
"com.sun.star.configuration.ConfigurationProvider");
|
|
|
|
static OUString s_configAccess = ::rtl::OUString::createFromAscii(
|
|
"com.sun.star.configuration.ConfigurationAccess");
|
|
|
|
static OUString s_configUpdate = ::rtl::OUString::createFromAscii(
|
|
"com.sun.star.configuration.ConfigurationUpdateAccess");
|
|
|
|
static OUString s_securityDialog = ::rtl::OUString::createFromAscii(
|
|
"com.sun.star.script.framework.security.SecurityDialog");
|
|
|
|
//*************************************************************************
|
|
// ScriptSecurityManager Constructor
|
|
ScriptSecurityManager::ScriptSecurityManager(
|
|
const Reference< XComponentContext > & xContext ) throw ( RuntimeException )
|
|
: m_xContext( xContext)
|
|
{
|
|
OSL_TRACE( "< ScriptSecurityManager ctor called >\n" );
|
|
validateXRef( m_xContext,
|
|
"ScriptSecurityManager::ScriptSecurityManager: invalid context" );
|
|
// test purposes only
|
|
readConfiguration();
|
|
}
|
|
|
|
void ScriptSecurityManager::addScriptStorage( rtl::OUString url,
|
|
sal_Int32 storageID)
|
|
{
|
|
readConfiguration();
|
|
StoragePerm newPerm;
|
|
newPerm.url=url;
|
|
newPerm.storageID=storageID;
|
|
|
|
// we err on the side of caution!!
|
|
newPerm.execPermission=sal_False;
|
|
|
|
Reference< XInterface > xInterface;
|
|
//need to check if storage has any scripts
|
|
Any a = m_xContext->getValueByName(
|
|
OUString::createFromAscii( SCRIPTSTORAGEMANAGER_SERVICE ) );
|
|
if ( sal_False == ( a >>= xInterface ) )
|
|
{
|
|
throw RuntimeException(
|
|
OUSTR( "ScriptSecurityManager::addScriptStorage: could not obtain ScriptStorageManager singleton" ),
|
|
Reference< XInterface >() );
|
|
}
|
|
validateXRef( xInterface,
|
|
"ScriptSecurityManager::addScriptStorage: cannot get Storage service" );
|
|
Reference< storage::XScriptStorageManager > xScriptStorageManager(
|
|
xInterface, UNO_QUERY_THROW );
|
|
Reference< XInterface > xScriptStorage =
|
|
xScriptStorageManager->getScriptStorage( storageID );
|
|
validateXRef( xScriptStorage,
|
|
"ScriptNameResolverImpl::getStorageInstance: cannot get Script Storage service" );
|
|
Reference< storage::XScriptInfoAccess > xScriptInfoAccess =
|
|
Reference< storage::XScriptInfoAccess > ( xScriptStorage,
|
|
UNO_QUERY_THROW );
|
|
Sequence< ::rtl::OUString > logicalNames = xScriptInfoAccess->getScriptLogicalNames();
|
|
if( logicalNames.getLength() ) // we have some logical names
|
|
{
|
|
// get the serice manager from the context
|
|
Reference< lang::XMultiComponentFactory > xMgr = m_xContext->getServiceManager();
|
|
validateXRef( xMgr,
|
|
"ScriptSecurityManager::addScriptStorage: cannot get ServiceManager" );
|
|
switch( m_officeBasic )
|
|
{
|
|
case 0: // never
|
|
{
|
|
OSL_TRACE("never run");
|
|
break;
|
|
}
|
|
case 1: // according to path list
|
|
{
|
|
OSL_TRACE("according to path");
|
|
// check path
|
|
rtl::OUString path = url.copy( 0, url.lastIndexOf( '/' ) );
|
|
OSL_TRACE( "no of elts in path list = %d",
|
|
(int)m_secureURL.getLength() );
|
|
for(int j=m_secureURL.getLength();j>0;j--)
|
|
{
|
|
#ifdef __WIN32__
|
|
if( path.equalsIgnoreAsciiCase( m_secureURL[j-1] ) )
|
|
#else
|
|
if( path.equals( m_secureURL[j-1] ) )
|
|
#endif
|
|
{
|
|
if( m_warning == sal_True )
|
|
{
|
|
OUString dummyStr;
|
|
OSL_TRACE("path match & warning dialog");
|
|
short result = executeDialog( dummyStr );
|
|
if ( result&1 == 1 )
|
|
{
|
|
newPerm.execPermission=sal_True;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
OSL_TRACE("path match & no warning dialog");
|
|
newPerm.execPermission=sal_True;
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
if( m_confirmationRequired == sal_True )
|
|
{
|
|
OSL_TRACE("no path match & confirmation dialog");
|
|
short result = executeDialog( path );
|
|
if ( result&1 == 1 )
|
|
{
|
|
newPerm.execPermission=sal_True;
|
|
}
|
|
/* this might be better (result ==3) */
|
|
if ( result&2 == 2 )
|
|
{
|
|
/* if checkbox clicked then need to add path to registry*/
|
|
addToSecurePaths(path);
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
case 2: // always
|
|
if( m_warning == sal_True )
|
|
{
|
|
OSL_TRACE("always & warning dialog");
|
|
OUString dummyStr;
|
|
short result = executeDialog( dummyStr );
|
|
if ( result&1 == 1 )
|
|
{
|
|
newPerm.execPermission=sal_True;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
OSL_TRACE("always & no warning dialog");
|
|
newPerm.execPermission=sal_True;
|
|
}
|
|
break;
|
|
default:
|
|
//
|
|
throw RuntimeException(
|
|
OUSTR( "ScriptSecurityManager::addScriptStorage got invalid OfficeBasic setting"),
|
|
Reference< XInterface > ());
|
|
}
|
|
}
|
|
if ( newPerm.execPermission == sal_True )
|
|
{
|
|
OSL_TRACE("setting exec permission to true for %s",
|
|
::rtl::OUStringToOString( url,
|
|
RTL_TEXTENCODING_ASCII_US ).pData->buffer);
|
|
}
|
|
else
|
|
{
|
|
OSL_TRACE("setting exec permission to false for %s",
|
|
::rtl::OUStringToOString( url,
|
|
RTL_TEXTENCODING_ASCII_US ).pData->buffer);
|
|
}
|
|
|
|
/* need to clear out vector in case we've seen this doc before */
|
|
::std::vector< StoragePerm >::iterator iter;
|
|
::std::vector< StoragePerm >::iterator iterEnd =
|
|
m_permissionSettings.end();
|
|
for ( iter = m_permissionSettings.begin() ; iter != iterEnd; ++iter )
|
|
{
|
|
if ( iter->url.equals( url ) )
|
|
{
|
|
m_permissionSettings.erase(iter);
|
|
}
|
|
}
|
|
m_permissionSettings.push_back(newPerm);
|
|
}
|
|
|
|
short ScriptSecurityManager::executeDialog( const OUString & path )
|
|
{
|
|
Sequence < Any > aArgs;
|
|
if( path.getLength() != 0 )
|
|
{
|
|
OSL_TRACE("reallocing");
|
|
aArgs.realloc(1);
|
|
aArgs[ 0 ] <<= path;
|
|
}
|
|
Reference< lang::XMultiComponentFactory > xMgr = m_xContext->getServiceManager();
|
|
validateXRef( xMgr,
|
|
"ScriptSecurityManager::executeDialog: cannot get ServiceManager" );
|
|
Reference< XInterface > xInterface =
|
|
xMgr->createInstanceWithArgumentsAndContext( s_securityDialog,
|
|
aArgs, m_xContext );
|
|
validateXRef( xInterface, "ScriptSecurityManager::executeDialog: Can't create SecurityDialog" );
|
|
Reference< awt::XDialog > xDialog( xInterface, UNO_QUERY_THROW );
|
|
return xDialog->execute();
|
|
}
|
|
|
|
/**
|
|
* checks to see whether the requested ScriptPeremission is allowed.
|
|
* This was modelled after the Java AccessController, but at this time
|
|
* we can't see a good reason not to return a bool, rather than throw
|
|
* an exception if the request is not granted (as is the case in Java).
|
|
*/
|
|
sal_Bool ScriptSecurityManager::checkPermission( const OUString & scriptStorageURL,
|
|
const OUString & permissionRequest )
|
|
throw ( RuntimeException )
|
|
{
|
|
if( permissionRequest.equals( OUString::createFromAscii( "execute" ) ) )
|
|
{
|
|
OSL_TRACE(
|
|
"ScriptSecurityManager::checkPermission: execute permission request for %s",
|
|
::rtl::OUStringToOString( scriptStorageURL,
|
|
RTL_TEXTENCODING_ASCII_US ).pData->buffer);
|
|
::std::vector< StoragePerm >::const_iterator iter;
|
|
::std::vector< StoragePerm >::const_iterator iterEnd =
|
|
m_permissionSettings.end();
|
|
for ( iter = m_permissionSettings.begin() ; iter != iterEnd; ++iter )
|
|
{
|
|
if ( iter->url.equals( scriptStorageURL ) )
|
|
{
|
|
// warning dialog if necessary
|
|
return iter->execPermission;
|
|
}
|
|
}
|
|
// we should never get here!!
|
|
throw RuntimeException( OUString::createFromAscii( "ScriptSecurityManager::checkPermission: storageURL not found" ), Reference< XInterface > () );
|
|
}
|
|
else
|
|
return sal_True;
|
|
}
|
|
|
|
void ScriptSecurityManager::readConfiguration()
|
|
throw ( RuntimeException)
|
|
{
|
|
// get the serice manager from the context
|
|
Reference< lang::XMultiComponentFactory > xMgr = m_xContext->getServiceManager();
|
|
validateXRef( xMgr,
|
|
"ScriptSecurityManager::ScriptSecurityManager: cannot get ServiceManager" );
|
|
// create an instance of the ConfigurationProvider
|
|
Reference< XInterface > xInterface = xMgr->createInstanceWithContext(
|
|
s_configProv, m_xContext );
|
|
validateXRef( xInterface,
|
|
"ScriptSecurityManager::ScriptSecurityManager: cannot get ConfigurationProvider" );
|
|
beans::PropertyValue configPath;
|
|
configPath.Name = ::rtl::OUString::createFromAscii( "nodepath" );
|
|
configPath.Value <<= ::rtl::OUString::createFromAscii( "org.openoffice.Office.Common/Security/Scripting" );
|
|
Sequence < Any > aargs( 1 );
|
|
aargs[ 0 ] <<= configPath;
|
|
// create an instance of the ConfigurationAccess for accessing the
|
|
// scripting security settings
|
|
Reference < lang::XMultiServiceFactory > xFactory( xInterface, UNO_QUERY );
|
|
validateXRef( xFactory,
|
|
"ScriptSecurityManager::ScriptSecurityManager: cannot get XMultiServiceFactory interface from ConfigurationProvider" );
|
|
xInterface = xFactory->createInstanceWithArguments( s_configAccess,
|
|
aargs );
|
|
validateXRef( xInterface,
|
|
"ScriptSecurityManager::ScriptSecurityManager: cannot get ConfigurationAccess" );
|
|
// get the XPropertySet interface from the ConfigurationAccess service
|
|
Reference < beans::XPropertySet > xPropSet( xInterface, UNO_QUERY );
|
|
Any value;
|
|
value=xPropSet->getPropertyValue( OUSTR( "Confirmation" ) );
|
|
if ( sal_False == ( value >>= m_confirmationRequired ) )
|
|
{
|
|
throw RuntimeException(
|
|
OUSTR( "ScriptSecurityManager: can't get Confirmation setting" ),
|
|
Reference< XInterface > () );
|
|
}
|
|
if ( m_confirmationRequired == sal_True )
|
|
{
|
|
OSL_TRACE( "ScriptSecurityManager: confirmation is true" );
|
|
}
|
|
else
|
|
{
|
|
OSL_TRACE( "ScriptSecurityManager: confirmation is false" );
|
|
}
|
|
value=xPropSet->getPropertyValue( OUSTR( "Warning" ) );
|
|
if ( sal_False == ( value >>= m_warning ) )
|
|
{
|
|
throw RuntimeException(
|
|
OUSTR( "ScriptSecurityManager: can't get Warning setting" ),
|
|
Reference< XInterface > () );
|
|
}
|
|
if ( m_warning == sal_True )
|
|
{
|
|
OSL_TRACE( "ScriptSecurityManager: warning is true" );
|
|
}
|
|
else
|
|
{
|
|
OSL_TRACE( "ScriptSecurityManager: warning is false" );
|
|
}
|
|
value=xPropSet->getPropertyValue( OUSTR( "OfficeBasic" ) );
|
|
if ( sal_False == ( value >>= m_officeBasic ) )
|
|
{
|
|
throw RuntimeException(
|
|
OUSTR( "ScriptSecurityManager: can't get OfficeBasic setting" ),
|
|
Reference< XInterface > () );
|
|
}
|
|
OSL_TRACE( "ScriptSecurityManager: OfficeBasic = %d", m_officeBasic );
|
|
value=xPropSet->getPropertyValue( OUSTR( "SecureURL" ) );
|
|
if ( sal_False == ( value >>= m_secureURL ) )
|
|
{
|
|
throw RuntimeException(
|
|
OUSTR( "ScriptSecurityManager: can't get SecureURL setting" ),
|
|
Reference< XInterface > () );
|
|
}
|
|
// need debug output for contents of sequence
|
|
for(int i=m_secureURL.getLength();i>0;i--)
|
|
{
|
|
OSL_TRACE( "ScriptSecurityManager: path = %s",
|
|
::rtl::OUStringToOString(m_secureURL[i-1] ,
|
|
RTL_TEXTENCODING_ASCII_US ).pData->buffer );
|
|
|
|
xInterface = xMgr->createInstanceWithContext(
|
|
::rtl::OUString::createFromAscii(
|
|
"com.sun.star.util.PathSubstitution"), m_xContext);
|
|
validateXRef( xInterface,
|
|
"ScriptSecurityManager::ScriptSecurityManager: cannot get ConfigurationProvider" );
|
|
Reference< util::XStringSubstitution > xStringSubstitution(
|
|
xInterface, UNO_QUERY);
|
|
validateXRef( xStringSubstitution,
|
|
"ScriptSecurityManager::ScriptSecurityManager: cannot get ConfigurationProvider" );
|
|
OSL_TRACE( "ScriptSecurityManager: subpath = %s",
|
|
::rtl::OUStringToOString(
|
|
xStringSubstitution->substituteVariables( m_secureURL[i-1], true ),
|
|
RTL_TEXTENCODING_ASCII_US ).pData->buffer );
|
|
m_secureURL[i-1] = xStringSubstitution->substituteVariables( m_secureURL[i-1], true );
|
|
}
|
|
for(int j=m_secureURL.getLength();j>0;j--)
|
|
{
|
|
OSL_TRACE( "ScriptSecurityManager: path = %s",
|
|
::rtl::OUStringToOString(m_secureURL[j-1] ,
|
|
RTL_TEXTENCODING_ASCII_US ).pData->buffer );
|
|
}
|
|
}
|
|
|
|
void ScriptSecurityManager::addToSecurePaths( const OUString & path )
|
|
{
|
|
OSL_TRACE( "--->ScriptSecurityManager::addToSecurePaths" );
|
|
// get the serice manager from the context
|
|
Reference< lang::XMultiComponentFactory > xMgr = m_xContext->getServiceManager();
|
|
validateXRef( xMgr,
|
|
"ScriptSecurityManager::ScriptSecurityManager: cannot get ServiceManager" );
|
|
// create an instance of the ConfigurationProvider
|
|
Reference< XInterface > xInterface = xMgr->createInstanceWithContext(
|
|
s_configProv, m_xContext );
|
|
validateXRef( xInterface,
|
|
"ScriptSecurityManager::ScriptSecurityManager: cannot get ConfigurationProvider" );
|
|
beans::PropertyValue configPath;
|
|
configPath.Name = ::rtl::OUString::createFromAscii( "nodepath" );
|
|
configPath.Value <<= ::rtl::OUString::createFromAscii( "org.openoffice.Office.Common/Security/Scripting" );
|
|
Sequence < Any > aargs( 1 );
|
|
aargs[ 0 ] <<= configPath;
|
|
// create an instance of the ConfigurationAccess for accessing the
|
|
// scripting security settings
|
|
Reference < lang::XMultiServiceFactory > xFactory( xInterface, UNO_QUERY );
|
|
validateXRef( xFactory,
|
|
"ScriptSecurityManager::ScriptSecurityManager: cannot get XMultiServiceFactory interface from ConfigurationProvider" );
|
|
xInterface = xFactory->createInstanceWithArguments( s_configUpdate,
|
|
aargs );
|
|
validateXRef( xInterface,
|
|
"ScriptSecurityManager::ScriptSecurityManager: cannot get ConfigurationAccess" );
|
|
Reference < container::XNameReplace > xNameReplace( xInterface, UNO_QUERY );
|
|
validateXRef( xNameReplace,
|
|
"ScriptSecurityManager::ScriptSecurityManager: cannot get XNameReplace" );
|
|
Reference < util::XChangesBatch > xChangesBatch( xInterface, UNO_QUERY );
|
|
validateXRef( xChangesBatch,
|
|
"ScriptSecurityManager::ScriptSecurityManager: cannot get XChangesBatch" );
|
|
|
|
OSL_TRACE( "--->ScriptSecurityManager::addToSecurePaths: after if stuff" );
|
|
Reference < beans::XPropertySet > xPropSet( xInterface, UNO_QUERY );
|
|
css::uno::Sequence< rtl::OUString > newSecureURL;
|
|
Any value;
|
|
value=xPropSet->getPropertyValue( OUSTR( "SecureURL" ) );
|
|
if ( sal_False == ( value >>= newSecureURL ) )
|
|
{
|
|
throw RuntimeException(
|
|
OUSTR( "ScriptSecurityManager: can't get SecureURL setting" ),
|
|
Reference< XInterface > () );
|
|
}
|
|
try
|
|
{
|
|
sal_Int32 length = newSecureURL.getLength();
|
|
newSecureURL.realloc( length + 1 );
|
|
newSecureURL[ length ] = path;
|
|
Any aNewSecureURL;
|
|
aNewSecureURL <<= newSecureURL;
|
|
xNameReplace->replaceByName( OUSTR( "SecureURL"), aNewSecureURL );
|
|
xChangesBatch->commitChanges();
|
|
m_secureURL = newSecureURL;
|
|
}
|
|
catch ( Exception e )
|
|
{
|
|
OSL_TRACE( "Error updating secure paths: " );
|
|
}
|
|
}
|
|
|
|
//*************************************************************************
|
|
// ScriptSecurityManager Destructor
|
|
ScriptSecurityManager::~ScriptSecurityManager()
|
|
{
|
|
OSL_TRACE( "< ScriptSecurityManager dtor called >\n" );
|
|
}
|
|
|
|
} // Namespace
|