2017 © Pedro Peláez
 

library middleware-csp

Provides support for enforcing Content Security Policy with headers in PSR 7 responses.

image

stevenmaguire/middleware-csp

Provides support for enforcing Content Security Policy with headers in PSR 7 responses.

  • Sunday, October 9, 2016
  • by stevenmaguire
  • Repository
  • 1 Watchers
  • 7 Stars
  • 37,492 Installations
  • PHP
  • 1 Dependents
  • 0 Suggesters
  • 2 Forks
  • 2 Open issues
  • 4 Versions
  • 16 % Grown

The README.md

Content Security Policy Middleware

Latest Version Software License Build Status Coverage Status Quality Score Total Downloads, (*1)

Provides support for enforcing Content Security Policy with headers in PSR 7 responses., (*2)

About CSP (Content Security Policy)

The new Content-Security-Policy HTTP response header helps you reduce XSS risks on modern browsers by declaring what dynamic resources are allowed to load via a HTTP Header. - via content-security-policy.com, (*3)

TL;DR from Google

  • Use whitelists to tell the client what's alowed and what isn't.
  • Learn what directives are available.
  • Learn the keywords they take.
  • Inline code and eval() are considered harmful.
  • Report policy violations to your server before enforcing them.

Install

Via Composer, (*4)

``` bash $ composer require stevenmaguire/middleware-csp, (*5)


## Usage Frameworks and routing layer projects may implement middleware differently. This package is designed to aid in the implementation of CSP for many of those variations provided the middleware pattern expects to provide a `Psr\Http\Message\ResponseInterface` and receive an updated `Psr\Http\Message\ResponseInterface` in return. ### Generic Example ``` php <?php namespace Stevenmaguire\Http\Middleware\Test; use Psr\Http\Message\ResponseInterface; use Stevenmaguire\Http\Middleware\EnforceContentSecurity; class GenericMiddleware extends EnforceContentSecurity { /** * Applies content security policy to given response. * * @param ResponseInterface $response * @param array $profiles * * @return ResponseInterface */ public function handle(ResponseInterface $response, $profiles = []) { array_map(function ($profile) { $this->loadProfileByKey($profile); }, $profiles); return $this->addPolicyHeader($response); } /** * Adds profile configuration to underlying middleware. * * @param array $profileConfig * * @return EnforceContentSecurity */ public function addProfileConfiguration($profileConfig = []) { return $this->setProfiles($profileConfig); } /** * Encodes a given configuration into formatted directive string. * * @param array $config * * @return string */ public function getEncodedConfiguration($config = []) { return $this->encodeConfiguration($config); } }

In this example $profiles is an array of middleware-csp-php specific configuration that directs the package on how to decorate the response., (*6)

Here is an example of configuration for two profiles., (*7)

``` php // within config/security.php, (*8)

return [ 'content' => [ 'default' => 'global', 'profiles' => [ 'global' => [ 'base-uri' => "'self'", 'default-src' => "'self'", 'font-src' => [ // e.g. only allows fonts from your server and fonts.gstatic.com "'self'", 'fonts.gstatic.com' ], 'img-src' => "'self'", 'script-src' => "'self'", 'style-src' => [ "'self'", "'unsafe-inline'", 'fonts.googleapis.com' ], ], 'flickr' => [ 'img-src' => [ 'https://*.staticflickr.com', ], ], ], ], ];, (*9)


### Framework Specific Implementations - [Laravel](https://github.com/stevenmaguire/laravel-middleware-csp) ## Defining a CPS You should try to keep your Content Security Policy as strict as possible. It is best to not allow inline scripts and only files from a trusted source. Only add sources that you activly use and not those that you might use in the future. #### CSP 1.0 Spec Directive | Description ----------|------------ `connect-src` (d) | restricts which URLs the protected resource can load using script interfaces. (e.g. send() method of an XMLHttpRequest object) `font-src` (d) | restricts from where the protected resource can load fonts `img-src` (d) | restricts from where the protected resource can load images `media-src` (d) | restricts from where the protected resource can load video, audio, and associated text tracks `object-src` (d) | restricts from where the protected resource can load plugins `script-src` (d) | restricts which scripts the protected resource can execute. Additional restrictions against, inline scripts, and eval. Additional directives in CSP2 for hash and nonce support `style-src` (d) | restricts which styles the user may applies to the protected resource. Additional restrictions against inline and eval. `default-src` | Covers any directive with (d) `frame-src` | restricts from where the protected resource can embed frames. Note, deprecated in CSP2 `report-uri` | specifies a URL to which the user agent sends reports about policy violation `sandbox` | specifies an HTML sandbox policy that the user agent applies to the protected resource. Optional in 1.0 #### New in CSP 2.0 Directive | Description ----------|------------ `form-action` | retricts which URLs can be used as the action of HTML form elements `frame-ancestors` | indicates whether the user agent should allow embedding the resource using a frame, iframe, object, embed or applet element, or equivalent functionality in non-HTML resources `plugin-types` | restricts the set of plugins that can be invoked by the protected resource by limiting the types of resources that can be embedded `base-uri` | restricts the URLs that can be used to specify the document base URL `child-src` (d) | governs the creation of nested browsing contexts as well as Worker execution contexts ## Browser Support This is a high level summary of browser support for CSP. For more detailed specifications review [Mozilla](https://developer.mozilla.org/en-US/docs/Web/Security/CSP/CSP_policy_directives#Browser_compatibility) or [caniuse](http://caniuse.com/#search=csp) [csp1supported]: https://img.shields.io/badge/csp%201.0-supported-green.svg [csp1somesupport]: https://img.shields.io/badge/csp%201.0-partial-orange.svg [csp1unsupported]: https://img.shields.io/badge/csp%201.0-unsupported-red.svg [csp2supported]: https://img.shields.io/badge/csp%202.0-supported-green.svg [csp2somesupport]: https://img.shields.io/badge/csp%202.0-partial-orange.svg [csp2unsupported]: https://img.shields.io/badge/csp%202.0-unsupported-red.svg Browser | CSP 1.0 | CSP 2.0 --------|---------|-------- Chrome | ![][csp1supported] | ![][csp2supported] Firefox | ![][csp1supported] | ![][csp2somesupport] Internet Explorer | ![][csp1unsupported] | ![][csp2unsupported] Edge | ![][csp1unsupported] | ![][csp2unsupported] Opera | ![][csp1unsupported] | ![][csp2unsupported] Safari | ![][csp1unsupported] | ![][csp2unsupported] ## Testing ``` bash $ ./vendor/bin/phpunit

Contributing

Please see CONTRIBUTING for details., (*10)

Credits

License

The MIT License (MIT). Please see License File for more information., (*11)

The Versions

09/10 2016

dev-master

9999999-dev https://github.com/stevenmaguire/middleware-csp-php

Provides support for enforcing Content Security Policy with headers in PSR 7 responses.

  Sources   Download

MIT

The Requires

 

The Development Requires

middleware psr7 headers content security policy

07/08 2015

0.1.2

0.1.2.0 https://github.com/stevenmaguire/middleware-csp-php

Provides support for enforcing Content Security Policy with headers in PSR 7 responses.

  Sources   Download

MIT

The Requires

 

The Development Requires

middleware psr7 headers content security policy

06/08 2015

0.1.1

0.1.1.0 https://github.com/stevenmaguire/middleware-csp-php

Provides support for enforcing Content Security Policy with headers in PSR 7 responses.

  Sources   Download

MIT

The Requires

 

The Development Requires

middleware psr7 headers content security policy

05/08 2015

0.1.0

0.1.0.0 https://github.com/stevenmaguire/middleware-csp-php

Provides support for enforcing Content Security Policy with headers in PSR 7 responses.

  Sources   Download

MIT

The Requires

 

The Development Requires

middleware psr7 headers content security policy