1*b1cdbd2cSJim Jagielski /**************************************************************
2*b1cdbd2cSJim Jagielski *
3*b1cdbd2cSJim Jagielski * Licensed to the Apache Software Foundation (ASF) under one
4*b1cdbd2cSJim Jagielski * or more contributor license agreements. See the NOTICE file
5*b1cdbd2cSJim Jagielski * distributed with this work for additional information
6*b1cdbd2cSJim Jagielski * regarding copyright ownership. The ASF licenses this file
7*b1cdbd2cSJim Jagielski * to you under the Apache License, Version 2.0 (the
8*b1cdbd2cSJim Jagielski * "License"); you may not use this file except in compliance
9*b1cdbd2cSJim Jagielski * with the License. You may obtain a copy of the License at
10*b1cdbd2cSJim Jagielski *
11*b1cdbd2cSJim Jagielski * http://www.apache.org/licenses/LICENSE-2.0
12*b1cdbd2cSJim Jagielski *
13*b1cdbd2cSJim Jagielski * Unless required by applicable law or agreed to in writing,
14*b1cdbd2cSJim Jagielski * software distributed under the License is distributed on an
15*b1cdbd2cSJim Jagielski * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
16*b1cdbd2cSJim Jagielski * KIND, either express or implied. See the License for the
17*b1cdbd2cSJim Jagielski * specific language governing permissions and limitations
18*b1cdbd2cSJim Jagielski * under the License.
19*b1cdbd2cSJim Jagielski *
20*b1cdbd2cSJim Jagielski *************************************************************/
21*b1cdbd2cSJim Jagielski
22*b1cdbd2cSJim Jagielski
23*b1cdbd2cSJim Jagielski
24*b1cdbd2cSJim Jagielski // MARKER(update_precomp.py): autogen include statement, do not remove
25*b1cdbd2cSJim Jagielski #include "precompiled_scripting.hxx"
26*b1cdbd2cSJim Jagielski
27*b1cdbd2cSJim Jagielski #include <com/sun/star/lang/XMultiComponentFactory.hpp>
28*b1cdbd2cSJim Jagielski #include <com/sun/star/lang/XMultiServiceFactory.hpp>
29*b1cdbd2cSJim Jagielski #include <com/sun/star/lang/XComponent.hpp>
30*b1cdbd2cSJim Jagielski #include <com/sun/star/lang/WrappedTargetException.hpp>
31*b1cdbd2cSJim Jagielski #include <com/sun/star/beans/XPropertySet.hpp>
32*b1cdbd2cSJim Jagielski #include <com/sun/star/beans/PropertyValue.hpp>
33*b1cdbd2cSJim Jagielski #include <com/sun/star/beans/UnknownPropertyException.hpp>
34*b1cdbd2cSJim Jagielski #include <com/sun/star/container/XNameReplace.hpp>
35*b1cdbd2cSJim Jagielski #include <com/sun/star/util/XChangesBatch.hpp>
36*b1cdbd2cSJim Jagielski #include <com/sun/star/util/XMacroExpander.hpp>
37*b1cdbd2cSJim Jagielski #include <com/sun/star/util/XStringSubstitution.hpp>
38*b1cdbd2cSJim Jagielski #include <com/sun/star/awt/XDialog.hpp>
39*b1cdbd2cSJim Jagielski #include <com/sun/star/security/AccessControlException.hpp>
40*b1cdbd2cSJim Jagielski #include <com/sun/star/security/RuntimePermission.hpp>
41*b1cdbd2cSJim Jagielski #include <drafts/com/sun/star/script/framework/storage/XScriptStorageManager.hpp>
42*b1cdbd2cSJim Jagielski #include <drafts/com/sun/star/script/framework/storage/XScriptInfoAccess.hpp>
43*b1cdbd2cSJim Jagielski #include "ScriptSecurityManager.hxx"
44*b1cdbd2cSJim Jagielski #include <util/util.hxx>
45*b1cdbd2cSJim Jagielski #include <util/scriptingconstants.hxx>
46*b1cdbd2cSJim Jagielski #include <tools/diagnose_ex.h>
47*b1cdbd2cSJim Jagielski
48*b1cdbd2cSJim Jagielski using namespace ::rtl;
49*b1cdbd2cSJim Jagielski using namespace ::osl;
50*b1cdbd2cSJim Jagielski using namespace ::com::sun::star;
51*b1cdbd2cSJim Jagielski using namespace ::com::sun::star::uno;
52*b1cdbd2cSJim Jagielski using namespace ::drafts::com::sun::star::script::framework;
53*b1cdbd2cSJim Jagielski
54*b1cdbd2cSJim Jagielski // is this in the utils?
55*b1cdbd2cSJim Jagielski const char* const SCRIPTSTORAGEMANAGER_SERVICE =
56*b1cdbd2cSJim Jagielski "/singletons/drafts.com.sun.star.script.framework.storage.theScriptStorageManager";
57*b1cdbd2cSJim Jagielski
58*b1cdbd2cSJim Jagielski namespace scripting_securitymgr
59*b1cdbd2cSJim Jagielski {
60*b1cdbd2cSJim Jagielski
61*b1cdbd2cSJim Jagielski static OUString s_configProv = ::rtl::OUString::createFromAscii(
62*b1cdbd2cSJim Jagielski "com.sun.star.configuration.ConfigurationProvider");
63*b1cdbd2cSJim Jagielski
64*b1cdbd2cSJim Jagielski static OUString s_configAccess = ::rtl::OUString::createFromAscii(
65*b1cdbd2cSJim Jagielski "com.sun.star.configuration.ConfigurationAccess");
66*b1cdbd2cSJim Jagielski
67*b1cdbd2cSJim Jagielski static OUString s_configUpdate = ::rtl::OUString::createFromAscii(
68*b1cdbd2cSJim Jagielski "com.sun.star.configuration.ConfigurationUpdateAccess");
69*b1cdbd2cSJim Jagielski
70*b1cdbd2cSJim Jagielski static OUString s_securityDialog = ::rtl::OUString::createFromAscii(
71*b1cdbd2cSJim Jagielski "com.sun.star.script.framework.security.SecurityDialog");
72*b1cdbd2cSJim Jagielski
73*b1cdbd2cSJim Jagielski static const int PERMISSION_NEVER = 0;
74*b1cdbd2cSJim Jagielski static const int PERMISSION_PATHLIST = 1;
75*b1cdbd2cSJim Jagielski static const int PERMISSION_ALWAYS = 2;
76*b1cdbd2cSJim Jagielski
77*b1cdbd2cSJim Jagielski static const int ALLOW_RUN = 1;
78*b1cdbd2cSJim Jagielski static const int ADD_TO_PATH = 2;
79*b1cdbd2cSJim Jagielski
80*b1cdbd2cSJim Jagielski //*************************************************************************
81*b1cdbd2cSJim Jagielski // ScriptSecurityManager Constructor
ScriptSecurityManager(const Reference<XComponentContext> & xContext)82*b1cdbd2cSJim Jagielski ScriptSecurityManager::ScriptSecurityManager(
83*b1cdbd2cSJim Jagielski const Reference< XComponentContext > & xContext ) throw ( RuntimeException )
84*b1cdbd2cSJim Jagielski : m_xContext( xContext, UNO_SET_THROW )
85*b1cdbd2cSJim Jagielski {
86*b1cdbd2cSJim Jagielski OSL_TRACE( "< ScriptSecurityManager ctor called >\n" );
87*b1cdbd2cSJim Jagielski
88*b1cdbd2cSJim Jagielski // get the service manager from the context
89*b1cdbd2cSJim Jagielski Reference< lang::XMultiComponentFactory > xMgr( m_xContext->getServiceManager(), UNO_SET_THROW );
90*b1cdbd2cSJim Jagielski
91*b1cdbd2cSJim Jagielski // create an instance of the ConfigurationProvider
92*b1cdbd2cSJim Jagielski m_xConfigProvFactory.set( xMgr->createInstanceWithContext( s_configProv, m_xContext ), UNO_QUERY_THROW );
93*b1cdbd2cSJim Jagielski }
94*b1cdbd2cSJim Jagielski
addScriptStorage(rtl::OUString scriptStorageURL,sal_Int32 storageID)95*b1cdbd2cSJim Jagielski void ScriptSecurityManager::addScriptStorage( rtl::OUString scriptStorageURL,
96*b1cdbd2cSJim Jagielski sal_Int32 storageID)
97*b1cdbd2cSJim Jagielski throw ( RuntimeException )
98*b1cdbd2cSJim Jagielski {
99*b1cdbd2cSJim Jagielski Permission_Hash::const_iterator ph_it = m_permissionSettings.find( scriptStorageURL );
100*b1cdbd2cSJim Jagielski if ( ph_it != m_permissionSettings.end() )
101*b1cdbd2cSJim Jagielski {
102*b1cdbd2cSJim Jagielski OSL_TRACE( "ScriptSecurityManager::addScriptStorage: already called for %s",
103*b1cdbd2cSJim Jagielski ::rtl::OUStringToOString( scriptStorageURL,
104*b1cdbd2cSJim Jagielski RTL_TEXTENCODING_ASCII_US ).pData->buffer);
105*b1cdbd2cSJim Jagielski return;
106*b1cdbd2cSJim Jagielski }
107*b1cdbd2cSJim Jagielski StoragePerm newPerm;
108*b1cdbd2cSJim Jagielski newPerm.scriptStorageURL=scriptStorageURL;
109*b1cdbd2cSJim Jagielski newPerm.storageID=storageID;
110*b1cdbd2cSJim Jagielski
111*b1cdbd2cSJim Jagielski // we err on the side of caution!!
112*b1cdbd2cSJim Jagielski newPerm.execPermission=sal_False;
113*b1cdbd2cSJim Jagielski
114*b1cdbd2cSJim Jagielski //need to check if storage has any scripts
115*b1cdbd2cSJim Jagielski try
116*b1cdbd2cSJim Jagielski {
117*b1cdbd2cSJim Jagielski // we have some scripts so read config & decide on that basis
118*b1cdbd2cSJim Jagielski // Setup flags: m_runMacroSetting, m_warning, m_confirmationRequired,
119*b1cdbd2cSJim Jagielski readConfiguration();
120*b1cdbd2cSJim Jagielski }
121*b1cdbd2cSJim Jagielski catch ( RuntimeException & rte )
122*b1cdbd2cSJim Jagielski {
123*b1cdbd2cSJim Jagielski OSL_TRACE( "ScriptSecurityManager::addScriptStorage: caught RuntimeException: %s",
124*b1cdbd2cSJim Jagielski ::rtl::OUStringToOString( rte.Message,
125*b1cdbd2cSJim Jagielski RTL_TEXTENCODING_ASCII_US ).pData->buffer);
126*b1cdbd2cSJim Jagielski throw RuntimeException(
127*b1cdbd2cSJim Jagielski OUSTR( "ScriptSecurityManager::addScriptStorage: caught RuntimeException" ).concat( rte.Message ),
128*b1cdbd2cSJim Jagielski Reference< XInterface >() );
129*b1cdbd2cSJim Jagielski }
130*b1cdbd2cSJim Jagielski
131*b1cdbd2cSJim Jagielski switch( m_runMacroSetting )
132*b1cdbd2cSJim Jagielski {
133*b1cdbd2cSJim Jagielski case PERMISSION_NEVER: // never
134*b1cdbd2cSJim Jagielski {
135*b1cdbd2cSJim Jagielski OSL_TRACE("never run");
136*b1cdbd2cSJim Jagielski break;
137*b1cdbd2cSJim Jagielski }
138*b1cdbd2cSJim Jagielski case PERMISSION_PATHLIST: // according to path list
139*b1cdbd2cSJim Jagielski {
140*b1cdbd2cSJim Jagielski OSL_TRACE("according to path");
141*b1cdbd2cSJim Jagielski // check path
142*b1cdbd2cSJim Jagielski rtl::OUString path = scriptStorageURL.copy( 0, scriptStorageURL.lastIndexOf( '/' ) );
143*b1cdbd2cSJim Jagielski OSL_TRACE( "no of elts in path list = %d",
144*b1cdbd2cSJim Jagielski (int)m_secureURL.getLength() );
145*b1cdbd2cSJim Jagielski bool match = isSecureURL( path );
146*b1cdbd2cSJim Jagielski if( match && ( m_warning == sal_True ) )
147*b1cdbd2cSJim Jagielski {
148*b1cdbd2cSJim Jagielski OSL_TRACE("path match & warning dialog");
149*b1cdbd2cSJim Jagielski int result = (int)executeStandardDialog();
150*b1cdbd2cSJim Jagielski OSL_TRACE("result = %d", (int)result);
151*b1cdbd2cSJim Jagielski if ( (result&ALLOW_RUN) == ALLOW_RUN )
152*b1cdbd2cSJim Jagielski {
153*b1cdbd2cSJim Jagielski newPerm.execPermission=sal_True;
154*b1cdbd2cSJim Jagielski }
155*b1cdbd2cSJim Jagielski break;
156*b1cdbd2cSJim Jagielski }
157*b1cdbd2cSJim Jagielski else if ( match )
158*b1cdbd2cSJim Jagielski {
159*b1cdbd2cSJim Jagielski OSL_TRACE("path match & no warning dialog");
160*b1cdbd2cSJim Jagielski newPerm.execPermission=sal_True;
161*b1cdbd2cSJim Jagielski break;
162*b1cdbd2cSJim Jagielski }
163*b1cdbd2cSJim Jagielski else if( m_confirmationRequired == sal_True )
164*b1cdbd2cSJim Jagielski {
165*b1cdbd2cSJim Jagielski OSL_TRACE("no path match & confirmation dialog");
166*b1cdbd2cSJim Jagielski int result = (int)executePathDialog( path );
167*b1cdbd2cSJim Jagielski OSL_TRACE("result = %d", (int)result);
168*b1cdbd2cSJim Jagielski if ( (result&ALLOW_RUN) == ALLOW_RUN )
169*b1cdbd2cSJim Jagielski {
170*b1cdbd2cSJim Jagielski newPerm.execPermission=sal_True;
171*b1cdbd2cSJim Jagielski }
172*b1cdbd2cSJim Jagielski if ( (result&ADD_TO_PATH) == ADD_TO_PATH )
173*b1cdbd2cSJim Jagielski {
174*b1cdbd2cSJim Jagielski /* if checkbox clicked then need to add path to registry*/
175*b1cdbd2cSJim Jagielski addToSecurePaths(path);
176*b1cdbd2cSJim Jagielski }
177*b1cdbd2cSJim Jagielski }
178*b1cdbd2cSJim Jagielski break;
179*b1cdbd2cSJim Jagielski }
180*b1cdbd2cSJim Jagielski case PERMISSION_ALWAYS: // always
181*b1cdbd2cSJim Jagielski if( m_warning == sal_True )
182*b1cdbd2cSJim Jagielski {
183*b1cdbd2cSJim Jagielski OSL_TRACE("always & warning dialog");
184*b1cdbd2cSJim Jagielski short result = executeStandardDialog();
185*b1cdbd2cSJim Jagielski if ( (result&ALLOW_RUN) == ALLOW_RUN )
186*b1cdbd2cSJim Jagielski {
187*b1cdbd2cSJim Jagielski newPerm.execPermission=sal_True;
188*b1cdbd2cSJim Jagielski }
189*b1cdbd2cSJim Jagielski }
190*b1cdbd2cSJim Jagielski else
191*b1cdbd2cSJim Jagielski {
192*b1cdbd2cSJim Jagielski OSL_TRACE("always & no warning dialog");
193*b1cdbd2cSJim Jagielski newPerm.execPermission=sal_True;
194*b1cdbd2cSJim Jagielski }
195*b1cdbd2cSJim Jagielski break;
196*b1cdbd2cSJim Jagielski default:
197*b1cdbd2cSJim Jagielski //
198*b1cdbd2cSJim Jagielski throw RuntimeException(
199*b1cdbd2cSJim Jagielski OUSTR( "ScriptSecurityManager::addScriptStorage got invalid OfficeBasic setting"),
200*b1cdbd2cSJim Jagielski Reference< XInterface > ());
201*b1cdbd2cSJim Jagielski }
202*b1cdbd2cSJim Jagielski
203*b1cdbd2cSJim Jagielski if ( newPerm.execPermission == sal_True )
204*b1cdbd2cSJim Jagielski {
205*b1cdbd2cSJim Jagielski OSL_TRACE("setting exec permission to true for %s",
206*b1cdbd2cSJim Jagielski ::rtl::OUStringToOString( scriptStorageURL,
207*b1cdbd2cSJim Jagielski RTL_TEXTENCODING_ASCII_US ).pData->buffer );
208*b1cdbd2cSJim Jagielski }
209*b1cdbd2cSJim Jagielski else
210*b1cdbd2cSJim Jagielski {
211*b1cdbd2cSJim Jagielski OSL_TRACE("setting exec permission to false for %s",
212*b1cdbd2cSJim Jagielski ::rtl::OUStringToOString( scriptStorageURL,
213*b1cdbd2cSJim Jagielski RTL_TEXTENCODING_ASCII_US ).pData->buffer );
214*b1cdbd2cSJim Jagielski }
215*b1cdbd2cSJim Jagielski
216*b1cdbd2cSJim Jagielski m_permissionSettings[ scriptStorageURL ] = newPerm;
217*b1cdbd2cSJim Jagielski }
218*b1cdbd2cSJim Jagielski
isSecureURL(const OUString & path)219*b1cdbd2cSJim Jagielski bool ScriptSecurityManager::isSecureURL( const OUString & path )
220*b1cdbd2cSJim Jagielski {
221*b1cdbd2cSJim Jagielski bool match = false;
222*b1cdbd2cSJim Jagielski OSL_TRACE( "no of elts in path list = %d",
223*b1cdbd2cSJim Jagielski (int)m_secureURL.getLength() );
224*b1cdbd2cSJim Jagielski OSL_TRACE("document path: %s",
225*b1cdbd2cSJim Jagielski ::rtl::OUStringToOString( path,
226*b1cdbd2cSJim Jagielski RTL_TEXTENCODING_ASCII_US ).pData->buffer);
227*b1cdbd2cSJim Jagielski int length = m_secureURL.getLength();
228*b1cdbd2cSJim Jagielski for( int j = 0; j < length ; j++ )
229*b1cdbd2cSJim Jagielski {
230*b1cdbd2cSJim Jagielski OSL_TRACE("path list element: %s",
231*b1cdbd2cSJim Jagielski ::rtl::OUStringToOString( m_secureURL[j],
232*b1cdbd2cSJim Jagielski RTL_TEXTENCODING_ASCII_US ).pData->buffer);
233*b1cdbd2cSJim Jagielski #ifdef WIN32
234*b1cdbd2cSJim Jagielski OSL_TRACE("case insensitive comparison");
235*b1cdbd2cSJim Jagielski if( path.equalsIgnoreAsciiCase( m_secureURL[j] ) )
236*b1cdbd2cSJim Jagielski #else
237*b1cdbd2cSJim Jagielski OSL_TRACE("case sensitive comparison");
238*b1cdbd2cSJim Jagielski if( path.equals( m_secureURL[j] ) )
239*b1cdbd2cSJim Jagielski #endif
240*b1cdbd2cSJim Jagielski {
241*b1cdbd2cSJim Jagielski match = true;
242*b1cdbd2cSJim Jagielski break;
243*b1cdbd2cSJim Jagielski }
244*b1cdbd2cSJim Jagielski }
245*b1cdbd2cSJim Jagielski return match;
246*b1cdbd2cSJim Jagielski }
247*b1cdbd2cSJim Jagielski
executeStandardDialog()248*b1cdbd2cSJim Jagielski short ScriptSecurityManager::executeStandardDialog()
249*b1cdbd2cSJim Jagielski throw ( RuntimeException )
250*b1cdbd2cSJim Jagielski {
251*b1cdbd2cSJim Jagielski OUString dummyString;
252*b1cdbd2cSJim Jagielski return executeDialog( dummyString );
253*b1cdbd2cSJim Jagielski }
254*b1cdbd2cSJim Jagielski
executePathDialog(const OUString & path)255*b1cdbd2cSJim Jagielski short ScriptSecurityManager::executePathDialog( const OUString & path )
256*b1cdbd2cSJim Jagielski throw ( RuntimeException )
257*b1cdbd2cSJim Jagielski {
258*b1cdbd2cSJim Jagielski return executeDialog( path );
259*b1cdbd2cSJim Jagielski }
260*b1cdbd2cSJim Jagielski
executeDialog(const OUString & path)261*b1cdbd2cSJim Jagielski short ScriptSecurityManager::executeDialog( const OUString & path )
262*b1cdbd2cSJim Jagielski throw ( RuntimeException )
263*b1cdbd2cSJim Jagielski {
264*b1cdbd2cSJim Jagielski Sequence < Any > aArgs;
265*b1cdbd2cSJim Jagielski if( path.getLength() != 0 )
266*b1cdbd2cSJim Jagielski {
267*b1cdbd2cSJim Jagielski OSL_TRACE("reallocing");
268*b1cdbd2cSJim Jagielski aArgs.realloc(1);
269*b1cdbd2cSJim Jagielski aArgs[ 0 ] <<= path;
270*b1cdbd2cSJim Jagielski }
271*b1cdbd2cSJim Jagielski short result;
272*b1cdbd2cSJim Jagielski try
273*b1cdbd2cSJim Jagielski {
274*b1cdbd2cSJim Jagielski Reference< lang::XMultiComponentFactory > xMgr( m_xContext->getServiceManager(), UNO_SET_THROW );
275*b1cdbd2cSJim Jagielski Reference< awt::XDialog > xDialog(
276*b1cdbd2cSJim Jagielski xMgr->createInstanceWithArgumentsAndContext( s_securityDialog, aArgs, m_xContext ),
277*b1cdbd2cSJim Jagielski UNO_QUERY_THROW );
278*b1cdbd2cSJim Jagielski result = xDialog->execute();
279*b1cdbd2cSJim Jagielski Reference< lang::XComponent > xComponent( xDialog, UNO_QUERY_THROW );
280*b1cdbd2cSJim Jagielski xComponent->dispose();
281*b1cdbd2cSJim Jagielski }
282*b1cdbd2cSJim Jagielski catch ( RuntimeException & rte )
283*b1cdbd2cSJim Jagielski {
284*b1cdbd2cSJim Jagielski throw RuntimeException(
285*b1cdbd2cSJim Jagielski OUSTR( "ScriptSecurityManager::executeDialog: caught RuntimeException: ").concat( rte.Message ),
286*b1cdbd2cSJim Jagielski Reference< XInterface > ());
287*b1cdbd2cSJim Jagielski }
288*b1cdbd2cSJim Jagielski catch ( Exception & e )
289*b1cdbd2cSJim Jagielski {
290*b1cdbd2cSJim Jagielski throw RuntimeException(
291*b1cdbd2cSJim Jagielski OUSTR( "ScriptSecurityManager::executeDialog: caught Exception: ").concat( e.Message ),
292*b1cdbd2cSJim Jagielski Reference< XInterface > ());
293*b1cdbd2cSJim Jagielski }
294*b1cdbd2cSJim Jagielski return result;
295*b1cdbd2cSJim Jagielski }
296*b1cdbd2cSJim Jagielski
297*b1cdbd2cSJim Jagielski /**
298*b1cdbd2cSJim Jagielski * checks to see whether the requested ScriptPermission is allowed.
299*b1cdbd2cSJim Jagielski * This was modelled after the Java AccessController, but at this time
300*b1cdbd2cSJim Jagielski * we can't see a good reason not to return a bool, rather than throw
301*b1cdbd2cSJim Jagielski * an exception if the request is not granted (as is the case in Java).
302*b1cdbd2cSJim Jagielski */
checkPermission(const OUString & scriptStorageURL,const OUString & permissionRequest)303*b1cdbd2cSJim Jagielski void ScriptSecurityManager::checkPermission( const OUString & scriptStorageURL,
304*b1cdbd2cSJim Jagielski const OUString & permissionRequest )
305*b1cdbd2cSJim Jagielski throw ( RuntimeException, lang::IllegalArgumentException, security::AccessControlException )
306*b1cdbd2cSJim Jagielski {
307*b1cdbd2cSJim Jagielski if( permissionRequest.equals( OUString::createFromAscii( "execute" ) ) )
308*b1cdbd2cSJim Jagielski {
309*b1cdbd2cSJim Jagielski OSL_TRACE(
310*b1cdbd2cSJim Jagielski "ScriptSecurityManager::checkPermission: execute permission request for %s",
311*b1cdbd2cSJim Jagielski ::rtl::OUStringToOString( scriptStorageURL,
312*b1cdbd2cSJim Jagielski RTL_TEXTENCODING_ASCII_US ).pData->buffer);
313*b1cdbd2cSJim Jagielski Permission_Hash::const_iterator ph_it = m_permissionSettings.find( scriptStorageURL );
314*b1cdbd2cSJim Jagielski Permission_Hash::const_iterator ph_itend =
315*b1cdbd2cSJim Jagielski m_permissionSettings.end();
316*b1cdbd2cSJim Jagielski if ( ph_it != ph_itend )
317*b1cdbd2cSJim Jagielski {
318*b1cdbd2cSJim Jagielski if ( ph_it->second.execPermission )
319*b1cdbd2cSJim Jagielski {
320*b1cdbd2cSJim Jagielski return;
321*b1cdbd2cSJim Jagielski }
322*b1cdbd2cSJim Jagielski else
323*b1cdbd2cSJim Jagielski {
324*b1cdbd2cSJim Jagielski OSL_TRACE( "permission refused" );
325*b1cdbd2cSJim Jagielski Any aPermission;
326*b1cdbd2cSJim Jagielski security::RuntimePermission permission;
327*b1cdbd2cSJim Jagielski permission.Name = OUString::createFromAscii( "execute" ).concat( scriptStorageURL );
328*b1cdbd2cSJim Jagielski aPermission <<= permission;
329*b1cdbd2cSJim Jagielski throw security::AccessControlException(
330*b1cdbd2cSJim Jagielski OUString::createFromAscii( "ScriptSecurityManager::checkPermission: no execute permission for URL" ).concat( scriptStorageURL ),
331*b1cdbd2cSJim Jagielski Reference< XInterface > (), aPermission );
332*b1cdbd2cSJim Jagielski }
333*b1cdbd2cSJim Jagielski }
334*b1cdbd2cSJim Jagielski // we should never get here!!
335*b1cdbd2cSJim Jagielski throw lang::IllegalArgumentException( OUString::createFromAscii( "ScriptSecurityManager::checkPermission: storageURL not found" ), Reference< XInterface > (), 0 );
336*b1cdbd2cSJim Jagielski }
337*b1cdbd2cSJim Jagielski // inappropriate permission request
338*b1cdbd2cSJim Jagielski throw lang::IllegalArgumentException( OUString::createFromAscii( "ScriptSecurityManager::checkPermission: storageURL not found" ), Reference< XInterface > (), 1 );
339*b1cdbd2cSJim Jagielski }
340*b1cdbd2cSJim Jagielski
removePermissionSettings(::rtl::OUString & scriptStorageURL)341*b1cdbd2cSJim Jagielski void ScriptSecurityManager::removePermissionSettings ( ::rtl::OUString & scriptStorageURL )
342*b1cdbd2cSJim Jagielski {
343*b1cdbd2cSJim Jagielski Permission_Hash::const_iterator ph_it =
344*b1cdbd2cSJim Jagielski m_permissionSettings.find( scriptStorageURL );
345*b1cdbd2cSJim Jagielski
346*b1cdbd2cSJim Jagielski if ( ph_it == m_permissionSettings.end() )
347*b1cdbd2cSJim Jagielski {
348*b1cdbd2cSJim Jagielski OSL_TRACE( "Entry for storage url %s doesn't exist in map",
349*b1cdbd2cSJim Jagielski ::rtl::OUStringToOString( scriptStorageURL,
350*b1cdbd2cSJim Jagielski RTL_TEXTENCODING_ASCII_US ).pData->buffer);
351*b1cdbd2cSJim Jagielski return;
352*b1cdbd2cSJim Jagielski }
353*b1cdbd2cSJim Jagielski
354*b1cdbd2cSJim Jagielski // erase the entry from the hash
355*b1cdbd2cSJim Jagielski m_permissionSettings.erase( scriptStorageURL );
356*b1cdbd2cSJim Jagielski
357*b1cdbd2cSJim Jagielski }
358*b1cdbd2cSJim Jagielski
readConfiguration()359*b1cdbd2cSJim Jagielski void ScriptSecurityManager::readConfiguration()
360*b1cdbd2cSJim Jagielski throw ( RuntimeException)
361*b1cdbd2cSJim Jagielski {
362*b1cdbd2cSJim Jagielski try
363*b1cdbd2cSJim Jagielski {
364*b1cdbd2cSJim Jagielski beans::PropertyValue configPath;
365*b1cdbd2cSJim Jagielski configPath.Name = ::rtl::OUString::createFromAscii( "nodepath" );
366*b1cdbd2cSJim Jagielski configPath.Value <<= ::rtl::OUString::createFromAscii( "org.openoffice.Office.Common/Security/Scripting" );
367*b1cdbd2cSJim Jagielski Sequence < Any > aargs( 1 );
368*b1cdbd2cSJim Jagielski aargs[ 0 ] <<= configPath;
369*b1cdbd2cSJim Jagielski ENSURE_OR_THROW( m_xConfigProvFactory.is(),
370*b1cdbd2cSJim Jagielski "ScriptSecurityManager::readConfiguration: ConfigProviderFactory no longer valid!" );
371*b1cdbd2cSJim Jagielski // get the XPropertySet interface from the ConfigurationAccess service
372*b1cdbd2cSJim Jagielski Reference < beans::XPropertySet > xPropSet( m_xConfigProvFactory->createInstanceWithArguments( s_configAccess, aargs ), UNO_QUERY_THROW );
373*b1cdbd2cSJim Jagielski
374*b1cdbd2cSJim Jagielski m_confirmationRequired = sal_True;
375*b1cdbd2cSJim Jagielski OSL_VERIFY( xPropSet->getPropertyValue( OUSTR( "Confirmation" ) ) >>= m_confirmationRequired );
376*b1cdbd2cSJim Jagielski if ( m_confirmationRequired == sal_True )
377*b1cdbd2cSJim Jagielski {
378*b1cdbd2cSJim Jagielski OSL_TRACE( "ScriptSecurityManager:readConfiguration: confirmation is true" );
379*b1cdbd2cSJim Jagielski }
380*b1cdbd2cSJim Jagielski else
381*b1cdbd2cSJim Jagielski {
382*b1cdbd2cSJim Jagielski OSL_TRACE( "ScriptSecurityManager:readConfiguration: confirmation is false" );
383*b1cdbd2cSJim Jagielski }
384*b1cdbd2cSJim Jagielski
385*b1cdbd2cSJim Jagielski m_warning = true;
386*b1cdbd2cSJim Jagielski OSL_VERIFY( xPropSet->getPropertyValue( OUSTR( "Warning" ) ) >>= m_warning );
387*b1cdbd2cSJim Jagielski
388*b1cdbd2cSJim Jagielski if ( m_warning == sal_True )
389*b1cdbd2cSJim Jagielski {
390*b1cdbd2cSJim Jagielski OSL_TRACE( "ScriptSecurityManager:readConfiguration: warning is true" );
391*b1cdbd2cSJim Jagielski }
392*b1cdbd2cSJim Jagielski else
393*b1cdbd2cSJim Jagielski {
394*b1cdbd2cSJim Jagielski OSL_TRACE( "ScriptSecurityManager:readConfiguration: warning is false" );
395*b1cdbd2cSJim Jagielski }
396*b1cdbd2cSJim Jagielski
397*b1cdbd2cSJim Jagielski m_runMacroSetting = sal_True;
398*b1cdbd2cSJim Jagielski OSL_VERIFY( xPropSet->getPropertyValue( OUSTR( "OfficeBasic" ) ) >>= m_runMacroSetting );
399*b1cdbd2cSJim Jagielski OSL_TRACE( "ScriptSecurityManager:readConfiguration: OfficeBasic = %d", m_runMacroSetting );
400*b1cdbd2cSJim Jagielski
401*b1cdbd2cSJim Jagielski m_secureURL = ::rtl::OUString();
402*b1cdbd2cSJim Jagielski OSL_VERIFY( xPropSet->getPropertyValue( OUSTR( "SecureURL" ) ) >>= m_secureURL );
403*b1cdbd2cSJim Jagielski }
404*b1cdbd2cSJim Jagielski catch ( beans::UnknownPropertyException & upe )
405*b1cdbd2cSJim Jagielski {
406*b1cdbd2cSJim Jagielski throw RuntimeException(
407*b1cdbd2cSJim Jagielski OUSTR( "ScriptSecurityManager:readConfiguration: Attempt to read unknown property: " ).concat( upe.Message ),
408*b1cdbd2cSJim Jagielski Reference< XInterface > () );
409*b1cdbd2cSJim Jagielski }
410*b1cdbd2cSJim Jagielski catch ( lang::WrappedTargetException & wte )
411*b1cdbd2cSJim Jagielski {
412*b1cdbd2cSJim Jagielski throw RuntimeException(
413*b1cdbd2cSJim Jagielski OUSTR( "ScriptSecurityManager:readConfiguration: wrapped target exception? :" ).concat( wte.Message ),
414*b1cdbd2cSJim Jagielski Reference< XInterface > () );
415*b1cdbd2cSJim Jagielski }
416*b1cdbd2cSJim Jagielski catch ( Exception & e )
417*b1cdbd2cSJim Jagielski {
418*b1cdbd2cSJim Jagielski OSL_TRACE( "Unknown exception in readconf: %s",
419*b1cdbd2cSJim Jagielski ::rtl::OUStringToOString(e.Message ,
420*b1cdbd2cSJim Jagielski RTL_TEXTENCODING_ASCII_US ).pData->buffer );
421*b1cdbd2cSJim Jagielski throw RuntimeException(
422*b1cdbd2cSJim Jagielski OUSTR( "ScriptSecurityManager:readConfiguration: exception? :" ).concat( e.Message ),
423*b1cdbd2cSJim Jagielski Reference< XInterface > () );
424*b1cdbd2cSJim Jagielski }
425*b1cdbd2cSJim Jagielski #ifdef _DEBUG
426*b1cdbd2cSJim Jagielski catch ( ... )
427*b1cdbd2cSJim Jagielski {
428*b1cdbd2cSJim Jagielski OSL_TRACE( "Completely Unknown exception in readconf!!!!!!");
429*b1cdbd2cSJim Jagielski throw RuntimeException(
430*b1cdbd2cSJim Jagielski OUSTR( "ScriptSecurityManager:readConfiguration: exception? :" ),
431*b1cdbd2cSJim Jagielski Reference< XInterface > () );
432*b1cdbd2cSJim Jagielski }
433*b1cdbd2cSJim Jagielski #endif
434*b1cdbd2cSJim Jagielski
435*b1cdbd2cSJim Jagielski int length = m_secureURL.getLength();
436*b1cdbd2cSJim Jagielski
437*b1cdbd2cSJim Jagielski // PathSubstitution needed to interpret variables found in config
438*b1cdbd2cSJim Jagielski Reference< lang::XMultiComponentFactory > xMgr( m_xContext->getServiceManager(), UNO_SET_THROW );
439*b1cdbd2cSJim Jagielski Reference< XInterface > xInterface = );
440*b1cdbd2cSJim Jagielski Reference< util::XStringSubstitution > xStringSubstitution(
441*b1cdbd2cSJim Jagielski xMgr->createInstanceWithContext(
442*b1cdbd2cSJim Jagielski ::rtl::OUString::createFromAscii( "com.sun.star.util.PathSubstitution" ), m_xContext
443*b1cdbd2cSJim Jagielski ),
444*b1cdbd2cSJim Jagielski UNO_QUERY_THROW
445*b1cdbd2cSJim Jagielski );
446*b1cdbd2cSJim Jagielski for( int i = 0; i < length; i++ )
447*b1cdbd2cSJim Jagielski {
448*b1cdbd2cSJim Jagielski OSL_TRACE( "ScriptSecurityManager:readConfiguration path = %s",
449*b1cdbd2cSJim Jagielski ::rtl::OUStringToOString(m_secureURL[i] ,
450*b1cdbd2cSJim Jagielski RTL_TEXTENCODING_ASCII_US ).pData->buffer );
451*b1cdbd2cSJim Jagielski
452*b1cdbd2cSJim Jagielski OSL_TRACE( "ScriptSecurityManager: subpath = %s",
453*b1cdbd2cSJim Jagielski ::rtl::OUStringToOString(
454*b1cdbd2cSJim Jagielski xStringSubstitution->substituteVariables( m_secureURL[i], true ),
455*b1cdbd2cSJim Jagielski RTL_TEXTENCODING_ASCII_US ).pData->buffer );
456*b1cdbd2cSJim Jagielski m_secureURL[i] = xStringSubstitution->substituteVariables( m_secureURL[i], true );
457*b1cdbd2cSJim Jagielski }
458*b1cdbd2cSJim Jagielski #ifdef _DEBUG
459*b1cdbd2cSJim Jagielski int length2 = m_secureURL.getLength();
460*b1cdbd2cSJim Jagielski for( int j = 0; j < length2 ; j++ )
461*b1cdbd2cSJim Jagielski {
462*b1cdbd2cSJim Jagielski OSL_TRACE( "ScriptSecurityManager: path = %s",
463*b1cdbd2cSJim Jagielski ::rtl::OUStringToOString(m_secureURL[j] ,
464*b1cdbd2cSJim Jagielski RTL_TEXTENCODING_ASCII_US ).pData->buffer );
465*b1cdbd2cSJim Jagielski }
466*b1cdbd2cSJim Jagielski #endif
467*b1cdbd2cSJim Jagielski }
468*b1cdbd2cSJim Jagielski
addToSecurePaths(const OUString & path)469*b1cdbd2cSJim Jagielski void ScriptSecurityManager::addToSecurePaths( const OUString & path )
470*b1cdbd2cSJim Jagielski throw ( RuntimeException )
471*b1cdbd2cSJim Jagielski {
472*b1cdbd2cSJim Jagielski OSL_TRACE( "--->ScriptSecurityManager::addToSecurePaths" );
473*b1cdbd2cSJim Jagielski beans::PropertyValue configPath;
474*b1cdbd2cSJim Jagielski configPath.Name = ::rtl::OUString::createFromAscii( "nodepath" );
475*b1cdbd2cSJim Jagielski configPath.Value <<= ::rtl::OUString::createFromAscii( "org.openoffice.Office.Common/Security/Scripting" );
476*b1cdbd2cSJim Jagielski Sequence < Any > aargs( 1 );
477*b1cdbd2cSJim Jagielski aargs[ 0 ] <<= configPath;
478*b1cdbd2cSJim Jagielski Reference < container::XNameReplace > xNameReplace(
479*b1cdbd2cSJim Jagielski m_xConfigProvFactory->createInstanceWithArguments( s_configUpdate, aargs ), UNO_QUERY_THROW );
480*b1cdbd2cSJim Jagielski Reference < util::XChangesBatch > xChangesBatch( xNameReplace, UNO_QUERY_THROW );
481*b1cdbd2cSJim Jagielski
482*b1cdbd2cSJim Jagielski OSL_TRACE( "--->ScriptSecurityManager::addToSecurePaths: after if stuff" );
483*b1cdbd2cSJim Jagielski Reference < beans::XPropertySet > xPropSet( xInterface, UNO_QUERY );
484*b1cdbd2cSJim Jagielski css::uno::Sequence< rtl::OUString > newSecureURL;
485*b1cdbd2cSJim Jagielski Any value;
486*b1cdbd2cSJim Jagielski OUString pathListPropName = OUSTR ( "SecureURL" );
487*b1cdbd2cSJim Jagielski value=xPropSet->getPropertyValue( pathListPropName );
488*b1cdbd2cSJim Jagielski if ( sal_False == ( value >>= newSecureURL ) )
489*b1cdbd2cSJim Jagielski {
490*b1cdbd2cSJim Jagielski throw RuntimeException(
491*b1cdbd2cSJim Jagielski OUSTR( "ScriptSecurityManager::addToSecurePaths: can't get SecureURL setting" ),
492*b1cdbd2cSJim Jagielski Reference< XInterface > () );
493*b1cdbd2cSJim Jagielski }
494*b1cdbd2cSJim Jagielski try
495*b1cdbd2cSJim Jagielski {
496*b1cdbd2cSJim Jagielski sal_Int32 length = newSecureURL.getLength();
497*b1cdbd2cSJim Jagielski newSecureURL.realloc( length + 1 );
498*b1cdbd2cSJim Jagielski newSecureURL[ length ] = path;
499*b1cdbd2cSJim Jagielski Any aNewSecureURL;
500*b1cdbd2cSJim Jagielski aNewSecureURL <<= newSecureURL;
501*b1cdbd2cSJim Jagielski xNameReplace->replaceByName( pathListPropName, aNewSecureURL );
502*b1cdbd2cSJim Jagielski xChangesBatch->commitChanges();
503*b1cdbd2cSJim Jagielski m_secureURL = newSecureURL;
504*b1cdbd2cSJim Jagielski }
505*b1cdbd2cSJim Jagielski catch ( Exception & e )
506*b1cdbd2cSJim Jagielski {
507*b1cdbd2cSJim Jagielski OSL_TRACE( "Error updating secure paths: " );
508*b1cdbd2cSJim Jagielski throw RuntimeException(
509*b1cdbd2cSJim Jagielski OUSTR( "ScriptSecurityManager::addToSecurePaths: error updating SecureURL setting" ).concat( e.Message ),
510*b1cdbd2cSJim Jagielski Reference< XInterface > () );
511*b1cdbd2cSJim Jagielski }
512*b1cdbd2cSJim Jagielski }
513*b1cdbd2cSJim Jagielski
514*b1cdbd2cSJim Jagielski //*************************************************************************
515*b1cdbd2cSJim Jagielski // ScriptSecurityManager Destructor
~ScriptSecurityManager()516*b1cdbd2cSJim Jagielski ScriptSecurityManager::~ScriptSecurityManager()
517*b1cdbd2cSJim Jagielski {
518*b1cdbd2cSJim Jagielski OSL_TRACE( "< ScriptSecurityManager dtor called >\n" );
519*b1cdbd2cSJim Jagielski }
520*b1cdbd2cSJim Jagielski
521*b1cdbd2cSJim Jagielski } // Namespace
522