response.php 4.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110
  1. <?php
  2. /**
  3. * @copyright Copyright (c) 2016, ownCloud, Inc.
  4. *
  5. * @author Andreas Fischer <bantu@owncloud.com>
  6. * @author Bart Visscher <bartv@thisnet.nl>
  7. * @author Joas Schilling <coding@schilljs.com>
  8. * @author Jörn Friedrich Dreyer <jfd@butonic.de>
  9. * @author Lukas Reschke <lukas@statuscode.ch>
  10. * @author Morris Jobke <hey@morrisjobke.de>
  11. * @author Robin McCorkell <robin@mccorkell.me.uk>
  12. * @author Sergio Bertolín <sbertolin@solidgear.es>
  13. * @author Stefan Weil <sw@weilnetz.de>
  14. * @author Thomas Müller <thomas.mueller@tmit.eu>
  15. * @author Vincent Petry <pvince81@owncloud.com>
  16. *
  17. * @license AGPL-3.0
  18. *
  19. * This code is free software: you can redistribute it and/or modify
  20. * it under the terms of the GNU Affero General Public License, version 3,
  21. * as published by the Free Software Foundation.
  22. *
  23. * This program is distributed in the hope that it will be useful,
  24. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  25. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  26. * GNU Affero General Public License for more details.
  27. *
  28. * You should have received a copy of the GNU Affero General Public License, version 3,
  29. * along with this program. If not, see <http://www.gnu.org/licenses/>
  30. *
  31. */
  32. class OC_Response {
  33. /**
  34. * Sets the content disposition header (with possible workarounds)
  35. * @param string $filename file name
  36. * @param string $type disposition type, either 'attachment' or 'inline'
  37. */
  38. static public function setContentDispositionHeader( $filename, $type = 'attachment' ) {
  39. if (\OC::$server->getRequest()->isUserAgent(
  40. [
  41. \OC\AppFramework\Http\Request::USER_AGENT_IE,
  42. \OC\AppFramework\Http\Request::USER_AGENT_ANDROID_MOBILE_CHROME,
  43. \OC\AppFramework\Http\Request::USER_AGENT_FREEBOX,
  44. ])) {
  45. header( 'Content-Disposition: ' . rawurlencode($type) . '; filename="' . rawurlencode( $filename ) . '"' );
  46. } else {
  47. header( 'Content-Disposition: ' . rawurlencode($type) . '; filename*=UTF-8\'\'' . rawurlencode( $filename )
  48. . '; filename="' . rawurlencode( $filename ) . '"' );
  49. }
  50. }
  51. /**
  52. * Sets the content length header (with possible workarounds)
  53. * @param string|int|float $length Length to be sent
  54. */
  55. static public function setContentLengthHeader($length) {
  56. if (PHP_INT_SIZE === 4) {
  57. if ($length > PHP_INT_MAX && stripos(PHP_SAPI, 'apache') === 0) {
  58. // Apache PHP SAPI casts Content-Length headers to PHP integers.
  59. // This enforces a limit of PHP_INT_MAX (2147483647 on 32-bit
  60. // platforms). So, if the length is greater than PHP_INT_MAX,
  61. // we just do not send a Content-Length header to prevent
  62. // bodies from being received incompletely.
  63. return;
  64. }
  65. // Convert signed integer or float to unsigned base-10 string.
  66. $lfh = new \OC\LargeFileHelper;
  67. $length = $lfh->formatUnsignedInteger($length);
  68. }
  69. header('Content-Length: '.$length);
  70. }
  71. /**
  72. * This function adds some security related headers to all requests served via base.php
  73. * The implementation of this function has to happen here to ensure that all third-party
  74. * components (e.g. SabreDAV) also benefit from this headers.
  75. */
  76. public static function addSecurityHeaders() {
  77. /**
  78. * FIXME: Content Security Policy for legacy ownCloud components. This
  79. * can be removed once \OCP\AppFramework\Http\Response from the AppFramework
  80. * is used everywhere.
  81. * @see \OCP\AppFramework\Http\Response::getHeaders
  82. */
  83. $policy = 'default-src \'self\'; '
  84. . 'script-src \'self\' \'unsafe-eval\' \'nonce-'.\OC::$server->getContentSecurityPolicyNonceManager()->getNonce().'\'; '
  85. . 'style-src \'self\' \'unsafe-inline\'; '
  86. . 'frame-src *; '
  87. . 'img-src * data: blob:; '
  88. . 'font-src \'self\' data:; '
  89. . 'media-src *; '
  90. . 'connect-src *; '
  91. . 'object-src \'none\'; '
  92. . 'base-uri \'self\'; ';
  93. header('Content-Security-Policy:' . $policy);
  94. header('X-Frame-Options: SAMEORIGIN'); // Disallow iFraming from other domains
  95. // Send fallback headers for installations that don't have the possibility to send
  96. // custom headers on the webserver side
  97. if(getenv('modHeadersAvailable') !== 'true') {
  98. header('X-XSS-Protection: 1; mode=block'); // Enforce browser based XSS filters
  99. header('X-Content-Type-Options: nosniff'); // Disable sniffing the content type for IE
  100. header('X-Robots-Tag: none'); // https://developers.google.com/webmasters/control-crawl-index/docs/robots_meta_tag
  101. header('X-Download-Options: noopen'); // https://msdn.microsoft.com/en-us/library/jj542450(v=vs.85).aspx
  102. header('X-Permitted-Cross-Domain-Policies: none'); // https://www.adobe.com/devnet/adobe-media-server/articles/cross-domain-xml-for-streaming.html
  103. }
  104. }
  105. }