mirror of
https://github.com/nextcloud/server.git
synced 2026-02-12 23:37:26 -05:00
Allows to inject something into the default content policy. This is for
example useful when you're injecting Javascript code into a view belonging
to another controller and cannot modify its Content-Security-Policy itself.
Note that the adjustment is only applied to applications that use AppFramework
controllers.
To use this from your `app.php` use `\OC::$server->getContentSecurityPolicyManager()->addDefaultPolicy($policy)`,
$policy has to be of type `\OCP\AppFramework\Http\ContentSecurityPolicy`.
To test this add something like the following into an `app.php` of any enabled app:
```
$manager = \OC::$server->getContentSecurityPolicyManager();
$policy = new \OCP\AppFramework\Http\ContentSecurityPolicy(false);
$policy->addAllowedFrameDomain('asdf');
$policy->addAllowedScriptDomain('yolo.com');
$policy->allowInlineScript(false);
$manager->addDefaultPolicy($policy);
$policy = new \OCP\AppFramework\Http\ContentSecurityPolicy(false);
$policy->addAllowedFontDomain('yolo.com');
$manager->addDefaultPolicy($policy);
$policy = new \OCP\AppFramework\Http\ContentSecurityPolicy(false);
$policy->addAllowedFrameDomain('banana.com');
$manager->addDefaultPolicy($policy);
```
If you now open the files app the policy should be:
```
Content-Security-Policy:default-src 'none';script-src yolo.com 'self' 'unsafe-eval';style-src 'self' 'unsafe-inline';img-src 'self' data: blob:;font-src yolo.com 'self';connect-src 'self';media-src 'self';frame-src asdf banana.com 'self'
```
50 lines
1.8 KiB
PHP
50 lines
1.8 KiB
PHP
<?php
|
|
/**
|
|
* @author Lukas Reschke <lukas@owncloud.com>
|
|
*
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
* @license AGPL-3.0
|
|
*
|
|
* This code is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
* as published by the Free Software Foundation.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU Affero General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
|
*
|
|
*/
|
|
|
|
namespace OCP\Security;
|
|
use OCP\AppFramework\Http\EmptyContentSecurityPolicy;
|
|
|
|
/**
|
|
* Used for Content Security Policy manipulations
|
|
*
|
|
* @package OCP\Security
|
|
* @since 9.0.0
|
|
*/
|
|
interface IContentSecurityPolicyManager {
|
|
/**
|
|
* Allows to inject something into the default content policy. This is for
|
|
* example useful when you're injecting Javascript code into a view belonging
|
|
* to another controller and cannot modify its Content-Security-Policy itself.
|
|
* Note that the adjustment is only applied to applications that use AppFramework
|
|
* controllers.
|
|
*
|
|
* To use this from your `app.php` use `\OC::$server->getContentSecurityPolicyManager()->addDefaultPolicy($policy)`,
|
|
* $policy has to be of type `\OCP\AppFramework\Http\ContentSecurityPolicy`.
|
|
*
|
|
* WARNING: Using this API incorrectly may make the instance more insecure.
|
|
* Do think twice before adding whitelisting resources. Please do also note
|
|
* that it is not possible to use the `disallowXYZ` functions.
|
|
*
|
|
* @param EmptyContentSecurityPolicy $policy
|
|
* @since 9.0.0
|
|
*/
|
|
public function addDefaultPolicy(EmptyContentSecurityPolicy $policy);
|
|
}
|