mirror of https://github.com/tongzx/nt5src
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
141 lines
3.0 KiB
141 lines
3.0 KiB
/*++
|
|
Copyright (c) 1997-1999 Microsoft Corporation
|
|
|
|
Module Name:
|
|
|
|
rndobjsf.h
|
|
|
|
Abstract:
|
|
|
|
Definitions for CRendObjectSafety class.
|
|
--*/
|
|
|
|
|
|
#ifndef _REND_OBJECT_SAFETY_
|
|
#define _REND_OBJECT_SAFETY_
|
|
|
|
#define IDD_TAPI_SECURITY_DIALOG 500
|
|
#define IDC_SECURITY_WARNING_TEXT 502
|
|
#define IDC_DONOT_PROMPT_IN_THE_FUTURE 503
|
|
#define ID_YES 505
|
|
#define ID_NO 506
|
|
#define ID_YES_DONT_ASK_AGAIN 557
|
|
|
|
#define IDS_REND_SEC_PROMPT 91
|
|
|
|
#include <PromptedObjectSafety.h>
|
|
#include <ScrpScrtDlg.h>
|
|
#include <ObjectWithSite.h>
|
|
|
|
static const TCHAR gszCookieName[] = _T("rend");
|
|
|
|
class CRendObjectSafety : public CPromptedObjectSafety, public CObjectWithSite
|
|
{
|
|
|
|
|
|
public:
|
|
|
|
//
|
|
// call CObjectWithSite's constructor and pass in the cookie name
|
|
//
|
|
|
|
CRendObjectSafety()
|
|
:CObjectWithSite(gszCookieName)
|
|
{
|
|
}
|
|
|
|
|
|
//
|
|
// implementing CPromptedObjectSafety's pure virtual method
|
|
// if the page is not in the safe list, and this is the first
|
|
// time we are asking, prompt the user. act accordingly.
|
|
// if the user chooses, mark the page safe for scripting (persistently)
|
|
//
|
|
|
|
virtual BOOL Ask()
|
|
{
|
|
|
|
//
|
|
// if the object does not have a site pointer. we should not consider
|
|
// it to be safe. Do not prompt the user.
|
|
//
|
|
|
|
if ( !HaveSite() )
|
|
{
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
|
|
EnValidation enCurrentValidation = GetValidation();
|
|
|
|
//
|
|
// if the page has not been validated, try to validate it.
|
|
//
|
|
|
|
if (UNVALIDATED == enCurrentValidation)
|
|
{
|
|
if( IsIntranet())
|
|
{
|
|
Validate(VALIDATED_SAFE);
|
|
enCurrentValidation = GetValidation();
|
|
return TRUE;
|
|
}
|
|
|
|
CScriptSecurityDialog *pDialog = new CScriptSecurityDialog;
|
|
|
|
//
|
|
// if succeeded displaying the dialog
|
|
// validate the page based on user's input
|
|
//
|
|
|
|
if ( NULL != pDialog )
|
|
{
|
|
|
|
switch (pDialog->DoModalWithText(IDS_REND_SEC_PROMPT))
|
|
{
|
|
|
|
case ID_YES:
|
|
|
|
Validate(VALIDATED_SAFE);
|
|
break;
|
|
|
|
case ID_NO:
|
|
|
|
Validate(VALIDATED_UNSAFE);
|
|
break;
|
|
|
|
case ID_YES_DONT_ASK_AGAIN:
|
|
|
|
Validate(VALIDATED_SAFE_PERMANENT);
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
delete pDialog;
|
|
|
|
//
|
|
// get the new validation.
|
|
//
|
|
|
|
enCurrentValidation = GetValidation();
|
|
|
|
} // if (NULL != pDialog)
|
|
|
|
}
|
|
|
|
//
|
|
// by now we either got the validation data or validation did not change
|
|
//
|
|
// return true if the page is validated as safe
|
|
//
|
|
|
|
return (VALIDATED_SAFE == enCurrentValidation) ;
|
|
}
|
|
};
|
|
|
|
#endif // _REND_OBJECT_SAFETY_
|