570 lines
24 KiB
JavaScript
570 lines
24 KiB
JavaScript
/*
|
|
* Copyright (c) 2014
|
|
*
|
|
* This file is licensed under the Affero General Public License version 3
|
|
* or later.
|
|
*
|
|
* See the COPYING-README file.
|
|
*
|
|
*/
|
|
|
|
(function() {
|
|
OC.SetupChecks = {
|
|
|
|
/* Message types */
|
|
MESSAGE_TYPE_INFO:0,
|
|
MESSAGE_TYPE_WARNING:1,
|
|
MESSAGE_TYPE_ERROR:2,
|
|
/**
|
|
* Check whether the WebDAV connection works.
|
|
*
|
|
* @return $.Deferred object resolved with an array of error messages
|
|
*/
|
|
checkWebDAV: function() {
|
|
var deferred = $.Deferred();
|
|
var afterCall = function(xhr) {
|
|
var messages = [];
|
|
if (xhr.status !== 207 && xhr.status !== 401) {
|
|
messages.push({
|
|
msg: t('core', 'Your web server is not yet properly set up to allow file synchronization, because the WebDAV interface seems to be broken.'),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_ERROR
|
|
});
|
|
}
|
|
deferred.resolve(messages);
|
|
};
|
|
|
|
$.ajax({
|
|
type: 'PROPFIND',
|
|
url: OC.linkToRemoteBase('webdav'),
|
|
data: '<?xml version="1.0"?>' +
|
|
'<d:propfind xmlns:d="DAV:">' +
|
|
'<d:prop><d:resourcetype/></d:prop>' +
|
|
'</d:propfind>',
|
|
complete: afterCall,
|
|
allowAuthErrors: true
|
|
});
|
|
return deferred.promise();
|
|
},
|
|
|
|
/**
|
|
* Check whether the .well-known URLs works.
|
|
*
|
|
* @param url the URL to test
|
|
* @param placeholderUrl the placeholder URL - can be found at oc_defaults.docPlaceholderUrl
|
|
* @param {boolean} runCheck if this is set to false the check is skipped and no error is returned
|
|
* @param {int} expectedStatus the expected HTTP status to be returned by the URL, 207 by default
|
|
* @return $.Deferred object resolved with an array of error messages
|
|
*/
|
|
checkWellKnownUrl: function(url, placeholderUrl, runCheck, expectedStatus) {
|
|
if (expectedStatus === undefined) {
|
|
expectedStatus = 207;
|
|
}
|
|
|
|
var deferred = $.Deferred();
|
|
|
|
if(runCheck === false) {
|
|
deferred.resolve([]);
|
|
return deferred.promise();
|
|
}
|
|
var afterCall = function(xhr) {
|
|
var messages = [];
|
|
if (xhr.status !== expectedStatus) {
|
|
var docUrl = placeholderUrl.replace('PLACEHOLDER', 'admin-setup-well-known-URL');
|
|
messages.push({
|
|
msg: t('core', 'Your web server is not properly set up to resolve "{url}". Further information can be found in the <a target="_blank" rel="noreferrer noopener" href="{docLink}">documentation</a>.', { docLink: docUrl, url: url }),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_INFO
|
|
});
|
|
}
|
|
deferred.resolve(messages);
|
|
};
|
|
|
|
$.ajax({
|
|
type: 'PROPFIND',
|
|
url: url,
|
|
complete: afterCall,
|
|
allowAuthErrors: true
|
|
});
|
|
return deferred.promise();
|
|
},
|
|
|
|
/**
|
|
* Check whether the WOFF2 URLs works.
|
|
*
|
|
* @param url the URL to test
|
|
* @param placeholderUrl the placeholder URL - can be found at oc_defaults.docPlaceholderUrl
|
|
* @return $.Deferred object resolved with an array of error messages
|
|
*/
|
|
checkWOFF2Loading: function(url, placeholderUrl) {
|
|
var deferred = $.Deferred();
|
|
|
|
var afterCall = function(xhr) {
|
|
var messages = [];
|
|
if (xhr.status !== 200) {
|
|
var docUrl = placeholderUrl.replace('PLACEHOLDER', 'admin-nginx');
|
|
messages.push({
|
|
msg: t('core', 'Your web server is not properly set up to deliver .woff2 files. This is typically an issue with the Nginx configuration. For Nextcloud 15 it needs an adjustement to also deliver .woff2 files. Compare your Nginx configuration to the recommended configuration in our <a target="_blank" rel="noreferrer noopener" href="{docLink}">documentation</a>.', { docLink: docUrl, url: url }),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_WARNING
|
|
});
|
|
}
|
|
deferred.resolve(messages);
|
|
};
|
|
|
|
$.ajax({
|
|
type: 'GET',
|
|
url: url,
|
|
complete: afterCall,
|
|
allowAuthErrors: true
|
|
});
|
|
return deferred.promise();
|
|
},
|
|
|
|
/**
|
|
* Runs setup checks on the server side
|
|
*
|
|
* @return $.Deferred object resolved with an array of error messages
|
|
*/
|
|
checkSetup: function() {
|
|
var deferred = $.Deferred();
|
|
var afterCall = function(data, statusText, xhr) {
|
|
var messages = [];
|
|
if (xhr.status === 200 && data) {
|
|
if (!data.isGetenvServerWorking) {
|
|
messages.push({
|
|
msg: t('core', 'PHP does not seem to be setup properly to query system environment variables. The test with getenv("PATH") only returns an empty response.') + ' ' +
|
|
t(
|
|
'core',
|
|
'Please check the <a target="_blank" rel="noreferrer noopener" href="{docLink}">installation documentation ↗</a> for PHP configuration notes and the PHP configuration of your server, especially when using php-fpm.',
|
|
{
|
|
docLink: oc_defaults.docPlaceholderUrl.replace('PLACEHOLDER', 'admin-php-fpm')
|
|
}
|
|
),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_WARNING
|
|
});
|
|
}
|
|
if (data.isReadOnlyConfig) {
|
|
messages.push({
|
|
msg: t('core', 'The read-only config has been enabled. This prevents setting some configurations via the web-interface. Furthermore, the file needs to be made writable manually for every update.'),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_INFO
|
|
});
|
|
}
|
|
if (!data.hasValidTransactionIsolationLevel) {
|
|
messages.push({
|
|
msg: t('core', 'Your database does not run with "READ COMMITTED" transaction isolation level. This can cause problems when multiple actions are executed in parallel.'),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_ERROR
|
|
});
|
|
}
|
|
if(!data.hasFileinfoInstalled) {
|
|
messages.push({
|
|
msg: t('core', 'The PHP module "fileinfo" is missing. It is strongly recommended to enable this module to get the best results with MIME type detection.'),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_INFO
|
|
});
|
|
}
|
|
if (data.outdatedCaches.length > 0) {
|
|
data.outdatedCaches.forEach(function(element){
|
|
messages.push({
|
|
msg: t(
|
|
'core',
|
|
'{name} below version {version} is installed, for stability and performance reasons it is recommended to update to a newer {name} version.',
|
|
element
|
|
),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_WARNING
|
|
})
|
|
});
|
|
}
|
|
if(!data.hasWorkingFileLocking) {
|
|
messages.push({
|
|
msg: t('core', 'Transactional file locking is disabled, this might lead to issues with race conditions. Enable "filelocking.enabled" in config.php to avoid these problems. See the <a target="_blank" rel="noreferrer noopener" href="{docLink}">documentation ↗</a> for more information.', {docLink: oc_defaults.docPlaceholderUrl.replace('PLACEHOLDER', 'admin-transactional-locking')}),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_WARNING
|
|
});
|
|
}
|
|
if (data.suggestedOverwriteCliURL !== '') {
|
|
messages.push({
|
|
msg: t('core', 'If your installation is not installed at the root of the domain and uses system cron, there can be issues with the URL generation. To avoid these problems, please set the "overwrite.cli.url" option in your config.php file to the webroot path of your installation (suggestion: "{suggestedOverwriteCliURL}")', {suggestedOverwriteCliURL: data.suggestedOverwriteCliURL}),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_WARNING
|
|
});
|
|
}
|
|
if (data.cronErrors.length > 0) {
|
|
var listOfCronErrors = "";
|
|
data.cronErrors.forEach(function(element){
|
|
listOfCronErrors += "<li>";
|
|
listOfCronErrors += element.error;
|
|
listOfCronErrors += ' ';
|
|
listOfCronErrors += element.hint;
|
|
listOfCronErrors += "</li>";
|
|
});
|
|
messages.push({
|
|
msg: t(
|
|
'core',
|
|
'It was not possible to execute the cron job via CLI. The following technical errors have appeared:'
|
|
) + "<ul>" + listOfCronErrors + "</ul>",
|
|
type: OC.SetupChecks.MESSAGE_TYPE_ERROR
|
|
})
|
|
}
|
|
if (data.cronInfo.diffInSeconds > 3600) {
|
|
messages.push({
|
|
msg: t('core', 'Last background job execution ran {relativeTime}. Something seems wrong.', {relativeTime: data.cronInfo.relativeTime}) +
|
|
' <a href="' + data.cronInfo.backgroundJobsUrl + '">' + t('core', 'Check the background job settings') + '</a>',
|
|
type: OC.SetupChecks.MESSAGE_TYPE_ERROR
|
|
});
|
|
}
|
|
if (!data.serverHasInternetConnection) {
|
|
messages.push({
|
|
msg: t('core', 'This server has no working Internet connection: Multiple endpoints could not be reached. This means that some of the features like mounting external storage, notifications about updates or installation of third-party apps will not work. Accessing files remotely and sending of notification emails might not work, either. Establish a connection from this server to the Internet to enjoy all features.'),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_WARNING
|
|
});
|
|
}
|
|
if(!data.isMemcacheConfigured) {
|
|
messages.push({
|
|
msg: t('core', 'No memory cache has been configured. To enhance performance, please configure a memcache, if available. Further information can be found in the <a target="_blank" rel="noreferrer noopener" href="{docLink}">documentation</a>.', {docLink: data.memcacheDocs}),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_INFO
|
|
});
|
|
}
|
|
if(!data.isRandomnessSecure) {
|
|
messages.push({
|
|
msg: t('core', 'No suitable source for randomness found by PHP which is highly discouraged for security reasons. Further information can be found in the <a target="_blank" rel="noreferrer noopener" href="{docLink}">documentation</a>.', {docLink: data.securityDocs}),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_ERROR
|
|
});
|
|
}
|
|
if(data.isUsedTlsLibOutdated) {
|
|
messages.push({
|
|
msg: data.isUsedTlsLibOutdated,
|
|
type: OC.SetupChecks.MESSAGE_TYPE_WARNING
|
|
});
|
|
}
|
|
if(data.phpSupported && data.phpSupported.eol) {
|
|
messages.push({
|
|
msg: t('core', 'You are currently running PHP {version}. Upgrade your PHP version to take advantage of <a target="_blank" rel="noreferrer noopener" href="{phpLink}">performance and security updates provided by the PHP Group</a> as soon as your distribution supports it.', {version: data.phpSupported.version, phpLink: 'https://secure.php.net/supported-versions.php'}),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_INFO
|
|
});
|
|
}
|
|
if(data.phpSupported && data.phpSupported.version.substr(0, 3) === '5.6') {
|
|
messages.push({
|
|
msg: t('core', 'You are currently running PHP 5.6. The current major version of Nextcloud is the last that is supported on PHP 5.6. It is recommended to upgrade the PHP version to 7.0+ to be able to upgrade to Nextcloud 14.'),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_INFO
|
|
});
|
|
}
|
|
if(!data.forwardedForHeadersWorking) {
|
|
messages.push({
|
|
msg: t('core', 'The reverse proxy header configuration is incorrect, or you are accessing Nextcloud from a trusted proxy. If not, this is a security issue and can allow an attacker to spoof their IP address as visible to the Nextcloud. Further information can be found in the <a target="_blank" rel="noreferrer noopener" href="{docLink}">documentation</a>.', {docLink: data.reverseProxyDocs}),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_WARNING
|
|
});
|
|
}
|
|
if(!data.isCorrectMemcachedPHPModuleInstalled) {
|
|
messages.push({
|
|
msg: t('core', 'Memcached is configured as distributed cache, but the wrong PHP module "memcache" is installed. \\OC\\Memcache\\Memcached only supports "memcached" and not "memcache". See the <a target="_blank" rel="noreferrer noopener" href="{wikiLink}">memcached wiki about both modules</a>.', {wikiLink: 'https://code.google.com/p/memcached/wiki/PHPClientComparison'}),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_WARNING
|
|
});
|
|
}
|
|
if(!data.hasPassedCodeIntegrityCheck) {
|
|
messages.push({
|
|
msg: t(
|
|
'core',
|
|
'Some files have not passed the integrity check. Further information on how to resolve this issue can be found in the <a target="_blank" rel="noreferrer noopener" href="{docLink}">documentation</a>. (<a href="{codeIntegrityDownloadEndpoint}">List of invalid files…</a> / <a href="{rescanEndpoint}">Rescan…</a>)',
|
|
{
|
|
docLink: data.codeIntegrityCheckerDocumentation,
|
|
codeIntegrityDownloadEndpoint: OC.generateUrl('/settings/integrity/failed'),
|
|
rescanEndpoint: OC.generateUrl('/settings/integrity/rescan?requesttoken={requesttoken}', {'requesttoken': OC.requestToken})
|
|
}
|
|
),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_ERROR
|
|
});
|
|
}
|
|
if(!data.hasOpcacheLoaded) {
|
|
messages.push({
|
|
msg: t(
|
|
'core',
|
|
'The PHP OPcache module is not loaded. <a target="_blank" rel="noreferrer noopener" href="{docLink}">For better performance it is recommended</a> to load it into your PHP installation.',
|
|
{
|
|
docLink: data.phpOpcacheDocumentation,
|
|
}
|
|
),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_INFO
|
|
});
|
|
} else if(!data.isOpcacheProperlySetup) {
|
|
messages.push({
|
|
msg: t(
|
|
'core',
|
|
'The PHP OPcache is not properly configured. <a target="_blank" rel="noreferrer noopener" href="{docLink}">For better performance it is recommended</a> to use the following settings in the <code>php.ini</code>:',
|
|
{
|
|
docLink: data.phpOpcacheDocumentation,
|
|
}
|
|
) + "<pre><code>opcache.enable=1\nopcache.enable_cli=1\nopcache.interned_strings_buffer=8\nopcache.max_accelerated_files=10000\nopcache.memory_consumption=128\nopcache.save_comments=1\nopcache.revalidate_freq=1</code></pre>",
|
|
type: OC.SetupChecks.MESSAGE_TYPE_INFO
|
|
});
|
|
}
|
|
if(!data.isSettimelimitAvailable) {
|
|
messages.push({
|
|
msg: t(
|
|
'core',
|
|
'The PHP function "set_time_limit" is not available. This could result in scripts being halted mid-execution, breaking your installation. Enabling this function is strongly recommended.'),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_WARNING
|
|
});
|
|
}
|
|
if (!data.hasFreeTypeSupport) {
|
|
messages.push({
|
|
msg: t(
|
|
'core',
|
|
'Your PHP does not have FreeType support, resulting in breakage of profile pictures and the settings interface.'
|
|
),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_INFO
|
|
})
|
|
}
|
|
if (data.missingIndexes.length > 0) {
|
|
var listOfMissingIndexes = "";
|
|
data.missingIndexes.forEach(function(element){
|
|
listOfMissingIndexes += "<li>";
|
|
listOfMissingIndexes += t('core', 'Missing index "{indexName}" in table "{tableName}".', element);
|
|
listOfMissingIndexes += "</li>";
|
|
});
|
|
messages.push({
|
|
msg: t(
|
|
'core',
|
|
'The database is missing some indexes. Due to the fact that adding indexes on big tables could take some time they were not added automatically. By running "occ db:add-missing-indices" those missing indexes could be added manually while the instance keeps running. Once the indexes are added queries to those tables are usually much faster.'
|
|
) + "<ul>" + listOfMissingIndexes + "</ul>",
|
|
type: OC.SetupChecks.MESSAGE_TYPE_INFO
|
|
})
|
|
}
|
|
if (data.isSqliteUsed) {
|
|
messages.push({
|
|
msg: t(
|
|
'core',
|
|
'SQLite is currently being used as the backend database. For larger installations we recommend that you switch to a different database backend.'
|
|
) + ' ' + t('core', 'This is particularly recommended when using the desktop client for file synchronisation.') + ' ' +
|
|
t(
|
|
'core',
|
|
'To migrate to another database use the command line tool: \'occ db:convert-type\', or see the <a target="_blank" rel="noreferrer noopener" href="{docLink}">documentation ↗</a>.',
|
|
{
|
|
docLink: data.databaseConversionDocumentation,
|
|
}
|
|
),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_WARNING
|
|
})
|
|
}
|
|
if (data.isPhpMailerUsed) {
|
|
messages.push({
|
|
msg: t(
|
|
'core',
|
|
'Use of the the built in php mailer is no longer supported. <a target="_blank" rel="noreferrer noopener" href="{docLink}">Please update your email server settings ↗<a/>.',
|
|
{
|
|
docLink: data.mailSettingsDocumentation,
|
|
}
|
|
),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_WARNING
|
|
});
|
|
}
|
|
if (!data.isMemoryLimitSufficient) {
|
|
messages.push({
|
|
msg: t(
|
|
'core',
|
|
'The PHP memory limit is below the recommended value of 512MB.'
|
|
),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_WARNING
|
|
})
|
|
}
|
|
|
|
if(data.appDirsWithDifferentOwner && data.appDirsWithDifferentOwner.length > 0) {
|
|
var appDirsWithDifferentOwner = data.appDirsWithDifferentOwner.reduce(
|
|
function(appDirsWithDifferentOwner, directory) {
|
|
return appDirsWithDifferentOwner + '<li>' + directory + '</li>';
|
|
},
|
|
''
|
|
);
|
|
messages.push({
|
|
msg: t('core', 'Some app directories are owned by a different user than the web server one. ' +
|
|
'This may be the case if apps have been installed manually. ' +
|
|
'Check the permissions of the following app directories:')
|
|
+ '<ul>' + appDirsWithDifferentOwner + '</ul>',
|
|
type: OC.SetupChecks.MESSAGE_TYPE_WARNING
|
|
});
|
|
}
|
|
|
|
} else {
|
|
messages.push({
|
|
msg: t('core', 'Error occurred while checking server setup'),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_ERROR
|
|
});
|
|
}
|
|
deferred.resolve(messages);
|
|
};
|
|
|
|
$.ajax({
|
|
type: 'GET',
|
|
url: OC.generateUrl('settings/ajax/checksetup'),
|
|
allowAuthErrors: true
|
|
}).then(afterCall, afterCall);
|
|
return deferred.promise();
|
|
},
|
|
|
|
/**
|
|
* Runs generic checks on the server side, the difference to dedicated
|
|
* methods is that we use the same XHR object for all checks to save
|
|
* requests.
|
|
*
|
|
* @return $.Deferred object resolved with an array of error messages
|
|
*/
|
|
checkGeneric: function() {
|
|
var self = this;
|
|
var deferred = $.Deferred();
|
|
var afterCall = function(data, statusText, xhr) {
|
|
var messages = [];
|
|
messages = messages.concat(self._checkSecurityHeaders(xhr));
|
|
messages = messages.concat(self._checkSSL(xhr));
|
|
deferred.resolve(messages);
|
|
};
|
|
|
|
$.ajax({
|
|
type: 'GET',
|
|
url: OC.generateUrl('heartbeat'),
|
|
allowAuthErrors: true
|
|
}).then(afterCall, afterCall);
|
|
|
|
return deferred.promise();
|
|
},
|
|
|
|
checkDataProtected: function() {
|
|
var deferred = $.Deferred();
|
|
if(oc_dataURL === false){
|
|
return deferred.resolve([]);
|
|
}
|
|
var afterCall = function(xhr) {
|
|
var messages = [];
|
|
// .ocdata is an empty file in the data directory - if this is readable then the data dir is not protected
|
|
if (xhr.status === 200 && xhr.responseText === '') {
|
|
messages.push({
|
|
msg: t('core', 'Your data directory and files are probably accessible from the Internet. The .htaccess file is not working. It is strongly recommended that you configure your web server so that the data directory is no longer accessible, or move the data directory outside the web server document root.'),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_ERROR
|
|
});
|
|
}
|
|
deferred.resolve(messages);
|
|
};
|
|
|
|
$.ajax({
|
|
type: 'GET',
|
|
url: OC.linkTo('', oc_dataURL+'/.ocdata?t=' + (new Date()).getTime()),
|
|
complete: afterCall,
|
|
allowAuthErrors: true
|
|
});
|
|
return deferred.promise();
|
|
},
|
|
|
|
/**
|
|
* Runs check for some generic security headers on the server side
|
|
*
|
|
* @param {Object} xhr
|
|
* @return {Array} Array with error messages
|
|
*/
|
|
_checkSecurityHeaders: function(xhr) {
|
|
var messages = [];
|
|
|
|
if (xhr.status === 200) {
|
|
var securityHeaders = {
|
|
'X-Content-Type-Options': ['nosniff'],
|
|
'X-Robots-Tag': ['none'],
|
|
'X-Frame-Options': ['SAMEORIGIN', 'DENY'],
|
|
'X-Download-Options': ['noopen'],
|
|
'X-Permitted-Cross-Domain-Policies': ['none'],
|
|
};
|
|
for (var header in securityHeaders) {
|
|
var option = securityHeaders[header][0];
|
|
if(!xhr.getResponseHeader(header) || xhr.getResponseHeader(header).toLowerCase() !== option.toLowerCase()) {
|
|
var msg = t('core', 'The "{header}" HTTP header is not set to "{expected}". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.', {header: header, expected: option});
|
|
if(xhr.getResponseHeader(header) && securityHeaders[header].length > 1 && xhr.getResponseHeader(header).toLowerCase() === securityHeaders[header][1].toLowerCase()) {
|
|
msg = t('core', 'The "{header}" HTTP header is not set to "{expected}". Some features might not work correctly, as it is recommended to adjust this setting accordingly.', {header: header, expected: option});
|
|
}
|
|
messages.push({
|
|
msg: msg,
|
|
type: OC.SetupChecks.MESSAGE_TYPE_WARNING
|
|
});
|
|
}
|
|
}
|
|
|
|
var xssfields = xhr.getResponseHeader('X-XSS-Protection') ? xhr.getResponseHeader('X-XSS-Protection').split(';').map(function(item) { return item.trim(); }) : [];
|
|
if (xssfields.length === 0 || xssfields.indexOf('1') === -1 || xssfields.indexOf('mode=block') === -1) {
|
|
messages.push({
|
|
msg: t('core', 'The "{header}" HTTP header doesn\'t contain "{expected}". This is a potential security or privacy risk, as it is recommended to adjust this setting accordingly.',
|
|
{
|
|
header: 'X-XSS-Protection',
|
|
expected: '1; mode=block'
|
|
}),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_WARNING
|
|
});
|
|
}
|
|
|
|
if (!xhr.getResponseHeader('Referrer-Policy') ||
|
|
(xhr.getResponseHeader('Referrer-Policy').toLowerCase() !== 'no-referrer' &&
|
|
xhr.getResponseHeader('Referrer-Policy').toLowerCase() !== 'no-referrer-when-downgrade' &&
|
|
xhr.getResponseHeader('Referrer-Policy').toLowerCase() !== 'strict-origin' &&
|
|
xhr.getResponseHeader('Referrer-Policy').toLowerCase() !== 'strict-origin-when-cross-origin' &&
|
|
xhr.getResponseHeader('Referrer-Policy').toLowerCase() !== 'same-origin')) {
|
|
messages.push({
|
|
msg: t('core', 'The "{header}" HTTP header is not set to "{val1}", "{val2}", "{val3}", "{val4}" or "{val5}". This can leak referer information. See the <a target="_blank" rel="noreferrer noopener" href="{link}">W3C Recommendation ↗</a>.',
|
|
{
|
|
header: 'Referrer-Policy',
|
|
val1: 'no-referrer',
|
|
val2: 'no-referrer-when-downgrade',
|
|
val3: 'strict-origin',
|
|
val4: 'strict-origin-when-cross-origin',
|
|
val5: 'same-origin',
|
|
link: 'https://www.w3.org/TR/referrer-policy/'
|
|
}),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_INFO
|
|
});
|
|
}
|
|
} else {
|
|
messages.push({
|
|
msg: t('core', 'Error occurred while checking server setup'),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_ERROR
|
|
});
|
|
}
|
|
|
|
return messages;
|
|
},
|
|
|
|
/**
|
|
* Runs check for some SSL configuration issues on the server side
|
|
*
|
|
* @param {Object} xhr
|
|
* @return {Array} Array with error messages
|
|
*/
|
|
_checkSSL: function(xhr) {
|
|
var messages = [];
|
|
|
|
if (xhr.status === 200) {
|
|
var tipsUrl = oc_defaults.docPlaceholderUrl.replace('PLACEHOLDER', 'admin-security');
|
|
if(OC.getProtocol() === 'https') {
|
|
// Extract the value of 'Strict-Transport-Security'
|
|
var transportSecurityValidity = xhr.getResponseHeader('Strict-Transport-Security');
|
|
if(transportSecurityValidity !== null && transportSecurityValidity.length > 8) {
|
|
var firstComma = transportSecurityValidity.indexOf(";");
|
|
if(firstComma !== -1) {
|
|
transportSecurityValidity = transportSecurityValidity.substring(8, firstComma);
|
|
} else {
|
|
transportSecurityValidity = transportSecurityValidity.substring(8);
|
|
}
|
|
}
|
|
|
|
var minimumSeconds = 15552000;
|
|
if(isNaN(transportSecurityValidity) || transportSecurityValidity <= (minimumSeconds - 1)) {
|
|
messages.push({
|
|
msg: t('core', 'The "Strict-Transport-Security" HTTP header is not set to at least "{seconds}" seconds. For enhanced security, it is recommended to enable HSTS as described in the <a href="{docUrl}" rel="noreferrer noopener">security tips ↗</a>.', {'seconds': minimumSeconds, docUrl: tipsUrl}),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_WARNING
|
|
});
|
|
}
|
|
} else {
|
|
messages.push({
|
|
msg: t('core', 'Accessing site insecurely via HTTP. You are strongly adviced to set up your server to require HTTPS instead, as described in the <a href="{docUrl}">security tips ↗</a>.', {docUrl: tipsUrl}),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_WARNING
|
|
});
|
|
}
|
|
} else {
|
|
messages.push({
|
|
msg: t('core', 'Error occurred while checking server setup'),
|
|
type: OC.SetupChecks.MESSAGE_TYPE_ERROR
|
|
});
|
|
}
|
|
|
|
return messages;
|
|
}
|
|
};
|
|
})();
|