123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990 |
- <?php
- /**
- * SPDX-FileCopyrightText: 2016-2024 Nextcloud GmbH and Nextcloud contributors
- * SPDX-FileCopyrightText: 2016 ownCloud, Inc.
- * SPDX-License-Identifier: AGPL-3.0-only
- */
- namespace OCP\AppFramework\Http;
- /**
- * Class ContentSecurityPolicy is a simple helper which allows applications to
- * modify the Content-Security-Policy sent by Nextcloud. Per default only JavaScript,
- * stylesheets, images, fonts, media and connections from the same domain
- * ('self') are allowed.
- *
- * Even if a value gets modified above defaults will still get appended. Please
- * notice that Nextcloud ships already with sensible defaults and those policies
- * should require no modification at all for most use-cases.
- *
- * This class allows unsafe-inline of CSS.
- *
- * @since 8.1.0
- */
- class ContentSecurityPolicy extends EmptyContentSecurityPolicy {
- /** @var bool Whether inline JS snippets are allowed */
- protected $inlineScriptAllowed = false;
- /** @var bool Whether eval in JS scripts is allowed */
- protected $evalScriptAllowed = false;
- /** @var bool Whether WebAssembly compilation is allowed */
- protected ?bool $evalWasmAllowed = false;
- /** @var bool Whether strict-dynamic should be set */
- protected $strictDynamicAllowed = false;
- /** @var bool Whether strict-dynamic should be set for 'script-src-elem' */
- protected $strictDynamicAllowedOnScripts = true;
- /** @var array Domains from which scripts can get loaded */
- protected $allowedScriptDomains = [
- '\'self\'',
- ];
- /**
- * @var bool Whether inline CSS is allowed
- * TODO: Disallow per default
- * @link https://github.com/owncloud/core/issues/13458
- */
- protected $inlineStyleAllowed = true;
- /** @var array Domains from which CSS can get loaded */
- protected $allowedStyleDomains = [
- '\'self\'',
- ];
- /** @var array Domains from which images can get loaded */
- protected $allowedImageDomains = [
- '\'self\'',
- 'data:',
- 'blob:',
- ];
- /** @var array Domains to which connections can be done */
- protected $allowedConnectDomains = [
- '\'self\'',
- ];
- /** @var array Domains from which media elements can be loaded */
- protected $allowedMediaDomains = [
- '\'self\'',
- ];
- /** @var array Domains from which object elements can be loaded */
- protected $allowedObjectDomains = [];
- /** @var array Domains from which iframes can be loaded */
- protected $allowedFrameDomains = [];
- /** @var array Domains from which fonts can be loaded */
- protected $allowedFontDomains = [
- '\'self\'',
- 'data:',
- ];
- /** @var array Domains from which web-workers and nested browsing content can load elements */
- protected $allowedChildSrcDomains = [];
- /** @var array Domains which can embed this Nextcloud instance */
- protected $allowedFrameAncestors = [
- '\'self\'',
- ];
- /** @var array Domains from which web-workers can be loaded */
- protected $allowedWorkerSrcDomains = [];
- /** @var array Domains which can be used as target for forms */
- protected $allowedFormActionDomains = [
- '\'self\'',
- ];
- /** @var array Locations to report violations to */
- protected $reportTo = [];
- }
|