You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
103 lines
3.4 KiB
103 lines
3.4 KiB
<?php |
|
/** |
|
* @copyright Copyright (c) 2016, ownCloud, Inc. |
|
* |
|
* @author Lukas Reschke <lukas@statuscode.ch> |
|
* @author Morris Jobke <hey@morrisjobke.de> |
|
* @author sualko <klaus@jsxc.org> |
|
* @author Thomas Citharel <tcit@tcit.fr> |
|
* |
|
* @license AGPL-3.0 |
|
* |
|
* This code is free software: you can redistribute it and/or modify |
|
* it under the terms of the GNU Affero General Public License, version 3, |
|
* as published by the Free Software Foundation. |
|
* |
|
* This program is distributed in the hope that it will be useful, |
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
* GNU Affero General Public License for more details. |
|
* |
|
* You should have received a copy of the GNU Affero General Public License, version 3, |
|
* along with this program. If not, see <http://www.gnu.org/licenses/> |
|
* |
|
*/ |
|
|
|
namespace OCP\AppFramework\Http; |
|
|
|
/** |
|
* Class ContentSecurityPolicy is a simple helper which allows applications to |
|
* modify the Content-Security-Policy sent by Nextcloud. Per default only JavaScript, |
|
* stylesheets, images, fonts, media and connections from the same domain |
|
* ('self') are allowed. |
|
* |
|
* Even if a value gets modified above defaults will still get appended. Please |
|
* notice that Nextcloud ships already with sensible defaults and those policies |
|
* should require no modification at all for most use-cases. |
|
* |
|
* This class allows unsafe-eval of javascript and unsafe-inline of CSS. |
|
* |
|
* @package OCP\AppFramework\Http |
|
* @since 8.1.0 |
|
*/ |
|
class ContentSecurityPolicy extends EmptyContentSecurityPolicy { |
|
/** @var bool Whether inline JS snippets are allowed */ |
|
protected $inlineScriptAllowed = false; |
|
/** @var bool Whether eval in JS scripts is allowed */ |
|
protected $evalScriptAllowed = false; |
|
/** @var array Domains from which scripts can get loaded */ |
|
protected $allowedScriptDomains = [ |
|
'\'self\'', |
|
]; |
|
/** |
|
* @var bool Whether inline CSS is allowed |
|
* TODO: Disallow per default |
|
* @link https://github.com/owncloud/core/issues/13458 |
|
*/ |
|
protected $inlineStyleAllowed = true; |
|
/** @var array Domains from which CSS can get loaded */ |
|
protected $allowedStyleDomains = [ |
|
'\'self\'', |
|
]; |
|
/** @var array Domains from which images can get loaded */ |
|
protected $allowedImageDomains = [ |
|
'\'self\'', |
|
'data:', |
|
'blob:', |
|
]; |
|
/** @var array Domains to which connections can be done */ |
|
protected $allowedConnectDomains = [ |
|
'\'self\'', |
|
]; |
|
/** @var array Domains from which media elements can be loaded */ |
|
protected $allowedMediaDomains = [ |
|
'\'self\'', |
|
]; |
|
/** @var array Domains from which object elements can be loaded */ |
|
protected $allowedObjectDomains = []; |
|
/** @var array Domains from which iframes can be loaded */ |
|
protected $allowedFrameDomains = []; |
|
/** @var array Domains from which fonts can be loaded */ |
|
protected $allowedFontDomains = [ |
|
'\'self\'', |
|
'data:', |
|
]; |
|
/** @var array Domains from which web-workers and nested browsing content can load elements */ |
|
protected $allowedChildSrcDomains = []; |
|
|
|
/** @var array Domains which can embed this Nextcloud instance */ |
|
protected $allowedFrameAncestors = [ |
|
'\'self\'', |
|
]; |
|
|
|
/** @var array Domains from which web-workers can be loaded */ |
|
protected $allowedWorkerSrcDomains = []; |
|
|
|
/** @var array Domains which can be used as target for forms */ |
|
protected $allowedFormActionDomains = [ |
|
'\'self\'', |
|
]; |
|
|
|
/** @var array Locations to report violations to */ |
|
protected $reportTo = []; |
|
}
|
|
|