mirror of
https://github.com/nextcloud/server.git
synced 2024-12-29 00:18:42 +00:00
dae7c159f7
Signed-off-by: Andy Scherzinger <info@andy-scherzinger.de>
40 lines
1.4 KiB
PHP
40 lines
1.4 KiB
PHP
<?php
|
|
|
|
declare(strict_types=1);
|
|
/**
|
|
* SPDX-FileCopyrightText: 2016-2024 Nextcloud GmbH and Nextcloud contributors
|
|
* SPDX-FileCopyrightText: 2016 ownCloud, Inc.
|
|
* SPDX-License-Identifier: AGPL-3.0-only
|
|
*/
|
|
namespace OCP\Security;
|
|
|
|
use OCP\AppFramework\Http\EmptyContentSecurityPolicy;
|
|
|
|
/**
|
|
* Used for Content Security Policy manipulations
|
|
*
|
|
* @since 9.0.0
|
|
* @deprecated 17.0.0 listen to the AddContentSecurityPolicyEvent to add a policy
|
|
*/
|
|
interface IContentSecurityPolicyManager {
|
|
/**
|
|
* Allows to inject something into the default content policy. This is for
|
|
* example useful when you're injecting Javascript code into a view belonging
|
|
* to another controller and cannot modify its Content-Security-Policy itself.
|
|
* Note that the adjustment is only applied to applications that use AppFramework
|
|
* controllers.
|
|
*
|
|
* To use this from your `app.php` use `\OC::$server->getContentSecurityPolicyManager()->addDefaultPolicy($policy)`,
|
|
* $policy has to be of type `\OCP\AppFramework\Http\ContentSecurityPolicy`.
|
|
*
|
|
* WARNING: Using this API incorrectly may make the instance more insecure.
|
|
* Do think twice before adding whitelisting resources. Please do also note
|
|
* that it is not possible to use the `disallowXYZ` functions.
|
|
*
|
|
* @param EmptyContentSecurityPolicy $policy
|
|
* @since 9.0.0
|
|
* @deprecated 17.0.0 listen to the AddContentSecurityPolicyEvent to add a policy
|
|
*/
|
|
public function addDefaultPolicy(EmptyContentSecurityPolicy $policy);
|
|
}
|