2017 © Pedro Peláez
 

library laravel-csp

Add CSP headers to the responses of a Laravel app

image

spatie/laravel-csp

Add CSP headers to the responses of a Laravel app

  • Friday, July 27, 2018
  • by Spatie
  • Repository
  • 12 Watchers
  • 190 Stars
  • 10,088 Installations
  • PHP
  • 1 Dependents
  • 0 Suggesters
  • 15 Forks
  • 0 Open issues
  • 19 Versions
  • 81 % Grown

The README.md

Set content security policy headers in a Laravel app

Latest Version on Packagist GitHub Workflow Status Check & fix styling Total Downloads, (*1)

By default, all scripts on a webpage are allowed to send and fetch data to any site they want. This can be a security problem. Imagine one of your JavaScript dependencies sends all keystrokes, including passwords, to a third party website., (*2)

It's very easy for someone to hide this malicious behaviour, making it nearly impossible for you to detect it (unless you manually read all the JavaScript code on your site). For a better idea of why you really need to set content security policy headers, read this excellent blog post by David Gilbertson., (*3)

Setting Content Security Policy headers helps solve this problem. These headers dictate which sites your site is allowed to contact. This package makes it easy for you to set the right headers., (*4)

This readme does not aim to fully explain all the possible usages of CSP and its directives. We highly recommend that you read Mozilla's documentation on the Content Security Policy before using this package. Another good resource to learn about CSP, is this edition of the Larasec newsletter by Stephen Rees-Carter., (*5)

Support us

, (*6)

We invest a lot of resources into creating best in class open source packages. You can support us by buying one of our paid products., (*7)

We highly appreciate you sending us a postcard from your hometown, mentioning which of our package(s) you are using. You'll find our address on our contact page. We publish all received postcards on our virtual postcard wall., (*8)

Installation

You can install the package via composer:, (*9)

composer require spatie/laravel-csp

You can publish the config-file with:, (*10)

php artisan vendor:publish --tag=csp-config

This is the contents of the file which will be published at config/csp.php:, (*11)

return [

    /*
     * A policy will determine which CSP headers will be set. A valid CSP policy is
     * any class that extends `Spatie\Csp\Policies\Policy`
     */
    'policy' => Spatie\Csp\Policies\Basic::class,

    /*
     * This policy which will be put in report only mode. This is great for testing out
     * a new policy or changes to existing csp policy without breaking anything.
     */
    'report_only_policy' => '',

    /*
     * All violations against the policy will be reported to this url.
     * A great service you could use for this is https://report-uri.com/
     *
     * You can override this setting by calling `reportTo` on your policy.
     */
    'report_uri' => env('CSP_REPORT_URI', ''),

    /*
     * Headers will only be added if this setting is set to true.
     */
    'enabled' => env('CSP_ENABLED', true),

    /*
     * The class responsible for generating the nonces used in inline tags and headers.
     */
    'nonce_generator' => Spatie\Csp\Nonce\RandomString::class,
];

You can add CSP headers to all responses of your app by registering Spatie\Csp\AddCspHeaders::class in the http kernel., (*12)

// app/Http/Kernel.php

...

protected $middlewareGroups = [
   'web' => [
       ...
       \Spatie\Csp\AddCspHeaders::class,
   ],

Alternatively you can apply the middleware on the route or route group level., (*13)

// in a routes file
Route::get('my-page', 'MyController')->middleware(Spatie\Csp\AddCspHeaders::class);

You can also pass a policy class as a parameter to the middleware:, (*14)

// in a routes file
Route::get('my-page', 'MyController')->middleware(Spatie\Csp\AddCspHeaders::class . ':' . MyPolicy::class);

The given policy will override the one configured in the config file for that specific route or group of routes., (*15)

Usage

This package allows you to define CSP policies. A CSP policy determines which CSP directives will be set in the headers of the response., (*16)

An example of a CSP directive is script-src. If this has the value 'self' www.google.com then your site can only load scripts from it's own domain or www.google.com. You'll find a list with all CSP directives at Mozilla's excellent developer site., (*17)

According to the spec certain directive values need to be surrounded by quotes. Examples of this are 'self', 'none' and 'unsafe-inline'. When using addDirective function you're not required to surround the directive value with quotes manually. We will automatically add quotes. Script/style hashes, as well, will be auto-detected and surrounded with quotes., (*18)

// in a policy
...
   ->addDirective(Directive::SCRIPT, Keyword::SELF) // will output `'self'` when outputting headers
   ->addDirective(Directive::STYLE, 'sha256-hash') // will output `'sha256-hash'` when outputting headers
...

You can add multiple policy options in the same directive giving an array as second parameter to addDirective or a single string in which every option is separated by one or more spaces., (*19)

// in a policy
...
   ->addDirective(Directive::SCRIPT, [
       Keyword::STRICT_DYNAMIC,
       Keyword::SELF,
       'www.google.com',
   ])
   ->addDirective(Directive::SCRIPT, 'strict-dynamic self  www.google.com')
   // will both output `'strict_dynamic' 'self' www.google.com` when outputting headers
...

There are also a few cases where you don't have to or don't need to specify a value, eg. upgrade-insecure-requests, block-all-mixed-content, ... In this case you can use the following value:, (*20)

// in a policy
...
    ->addDirective(Directive::UPGRADE_INSECURE_REQUESTS, Value::NO_VALUE)
    ->addDirective(Directive::BLOCK_ALL_MIXED_CONTENT, Value::NO_VALUE);
...

This will output a CSP like this:, (*21)

Content-Security-Policy: upgrade-insecure-requests;block-all-mixed-content

Creating policies

In the policy key of the csp config file is set to \Spatie\Csp\Policies\Basic::class by default. This class allows your site to only use images, scripts, form actions of your own site. This is how the class looks:, (*22)

namespace App\Support;

use Spatie\Csp\Directive;
use Spatie\Csp\Value;

class Basic extends Policy
{
    public function configure()
    {
        $this
            ->addDirective(Directive::BASE, Keyword::SELF)
            ->addDirective(Directive::CONNECT, Keyword::SELF)
            ->addDirective(Directive::DEFAULT, Keyword::SELF)
            ->addDirective(Directive::FORM_ACTION, Keyword::SELF)
            ->addDirective(Directive::IMG, Keyword::SELF)
            ->addDirective(Directive::MEDIA, Keyword::SELF)
            ->addDirective(Directive::OBJECT, Keyword::NONE)
            ->addDirective(Directive::SCRIPT, Keyword::SELF)
            ->addDirective(Directive::STYLE, Keyword::SELF)
            ->addNonceForDirective(Directive::SCRIPT)
            ->addNonceForDirective(Directive::STYLE);
    }
}

You can allow fetching scripts from www.google.com by extending this class:, (*23)

namespace App\Support;

use Spatie\Csp\Directive;
use Spatie\Csp\Policies\Basic;

class MyCustomPolicy extends Basic
{
    public function configure()
    {
        parent::configure();

        $this->addDirective(Directive::SCRIPT, 'www.google.com');
    }
}

Don't forget to set the policy key in the csp config file to the class name of your policy (in this case it would be App\Support\MyCustomPolicy)., (*24)

Using inline scripts and styles

When using CSP you must specifically allow the use of inline scripts or styles. The recommended way of doing that with this package is to use a nonce. A nonce is a number that is unique per request. The nonce must be specified in the CSP headers and in an attribute on the html tag. This way an attacker has no way of injecting malicious scripts or styles., (*25)

First you must add the nonce to the right directives in your policy:, (*26)

// in a policy

public function configure()
  {
      $this
        ->addDirective(Directive::SCRIPT, 'self')
        ->addDirective(Directive::STYLE, 'self')
        ->addNonceForDirective(Directive::SCRIPT)
        ->addNonceForDirective(Directive::STYLE)
        ...
}

Next you must add the nonce to the html:, (*27)

{{-- in a view --}}
<style nonce="{{ csp_nonce() }}">
   ...
</style>






There are few other options to use inline styles and scripts. Take a look at the CSP docs on the Mozilla developer site to know more., (*28)

Integration with Vite

When building assets, Laravel's Vite plugin can generate a nonce that you can retrieve with Vite::cspNonce. You can use in your own NonceGenerator., (*29)

namespace App\Support;

use Illuminate\Support\Str;
use Illuminate\Support\Facades\Vite;

class LaravelViteNonceGenerator implements NonceGenerator
{
    public function generate(): string
    {
        return Vite::cspNonce();
    }
}

Don't forget to specify the fully qualified class name of your NonceGenerator in the nonce_generator key of the csp config file., (*30)

Alternatively, you can instruct Vite to use a specific value that it should use as nonce., (*31)

namespace App\Support;

use Illuminate\Support\Str;
use Illuminate\Support\Facades\Vite;

class RandomString implements NonceGenerator
{
    public function generate(): string
    {
        $myNonce = ''; // determine the value for `$myNonce` however you want

        Vite::useCspNonce($myNonce);

        return $myNonce;
    }
}

Outputting a CSP Policy as a meta tag

In rare circumstances, a large site may have so many external connections that the CSP header actually exceeds the max header size. Thankfully, the CSP specification allows for outputting information as a meta tag in the head of a webpage., (*32)

To support this use case, this package provides a @cspMetaTag blade directive that you may place in the <head> of your site., (*33)

<head>
    @cspMetaTag(App\Support\MyCustomPolicy::class)
</head>

You should be aware of the following implementation details when using the meta tag blade directive: - Note that you should manually pass the fully qualified class name of the policy we want to output a meta tag for. The csp.policy and csp.report_only_policy config options have no effect here. - Because blade files don't have access to the Response object, the shouldBeApplied method will have no effect. If you have declared the @cspMetaTag directive and the csp.enabled config option is set to true, the meta tag will be output regardless. - Any configuration (such as setting your policy to report only) should be done in the configure method of the policy, rather than relying on settings in the csp config file. The csp.report_uri option will be respected, so there is no need to configure that manually., (*34)

Reporting CSP errors

In the browser

Instead of outright blocking all violations, you can put a policy in report only mode. In this case all requests will be made, but all violations will display in your favourite browser's console., (*35)

To put a policy in report only mode just call reportOnly() in the configure() function of a report:, (*36)

public function configure()
{
    parent::configure();

    $this->reportOnly();
}

To an external url

Any violations against the policy can be reported to a given url. You can set that url in the report_uri key of the csp config file. A great service that is specifically built for handling these violation reports is http://report-uri.io/., (*37)

Using multiple policies

To test changes to your CSP policy you can specify a second policy in the report_only_policy in the csp config key. The policy specified in policy will be enforced, the one in report_only_policy will not. This is great for testing a new policy or changes to existing CSP policy without breaking anything., (*38)

Using whoops

Laravel comes with whoops, an error handling framework that helps you debug your application with a pretty visualization of exceptions. Whoops uses inline scripts and styles because it can't make any assumptions about the environment it is being used in, so it won't work unless you allow unsafe-inline for scripts and styles., (*39)

One approach to this problem is to check config('app.debug') when setting your policy. Unfortunately this bears the risk of forgetting to test your code with all CSP rules enabled and having your app break at deployment. Alternatively, you could allow unsafe-inline only on error pages by adding this to the render method of your exception handler (usually in app/Exceptions/Handler.php):, (*40)

$this->container->singleton(AppPolicy::class, function ($app) {
    return new AppPolicy();
});
app(AppPolicy::class)->addDirective(Directive::SCRIPT, Keyword::UNSAFE_INLINE);
app(AppPolicy::class)->addDirective(Directive::STYLE, Keyword::UNSAFE_INLINE);

where AppPolicy is the name of your CSP policy. This also works in every other situation to change the policy at runtime, in which case the singleton registration should be done in a service provider instead of the exception handler., (*41)

Note that unsafe-inline only works if you're not also sending a nonce or a strict-dynamic directive, so to be able to use this workaround, you have to specify all your inline scripts' and styles' hashes in the CSP header., (*42)

Another approach is to overwrite the Spatie\Csp\Policies\Policy::shouldBeApplied()-function in case Laravel responds with an error:, (*43)

namespace App\Services\Csp\Policies;

use Illuminate\Http\Request;
use Spatie\Csp;
use Symfony\Component\HttpFoundation\Response;

class MyCustomPolicy extends Csp\Policies\Policy
{
    public function configure()
    {
        // Add directives
    }

    public function shouldBeApplied(Request $request, Response $response): bool
    {
        if (config('app.debug') && ($response->isClientError() || $response->isServerError())) {
            return false;
        }

        return parent::shouldBeApplied($request, $response);
    }
}

This approach completely deactivates the CSP and therefore also works if a strict CSP is used., (*44)

Testing

You can run all the tests with:, (*45)

composer test

Changelog

Please see CHANGELOG for more information what has changed recently., (*46)

Contributing

Please see CONTRIBUTING for details., (*47)

Security

If you've found a bug regarding security please mail security@spatie.be instead of using the issue tracker., (*48)

Credits

License

The MIT License (MIT). Please see License File for more information., (*49)

The Versions

27/07 2018

dev-master

9999999-dev https://github.com/spatie/laravel-csp

Add CSP headers to the responses of a Laravel app

  Sources   Download

MIT

The Requires

 

The Development Requires

laravel security spatie headers csp content-security-policy laravel-csp

27/07 2018

1.3.0

1.3.0.0 https://github.com/spatie/laravel-csp

Add CSP headers to the responses of a Laravel app

  Sources   Download

MIT

The Requires

 

The Development Requires

laravel security spatie headers csp content-security-policy laravel-csp

04/05 2018

1.2.2

1.2.2.0 https://github.com/spatie/laravel-csp

Add CSP headers to the responses of a Laravel app

  Sources   Download

MIT

The Requires

 

The Development Requires

laravel security spatie headers csp content-security-policy laravel-csp

30/04 2018

1.2.1

1.2.1.0 https://github.com/spatie/laravel-csp

Add CSP headers to the responses of a Laravel app

  Sources   Download

MIT

The Requires

 

The Development Requires

laravel security spatie headers csp content-security-policy laravel-csp

12/04 2018

1.2.0

1.2.0.0 https://github.com/spatie/laravel-csp

Add CSP headers to the responses of a Laravel app

  Sources   Download

MIT

The Requires

 

The Development Requires

laravel security spatie headers csp content-security-policy laravel-csp

12/04 2018

1.1.0

1.1.0.0 https://github.com/spatie/laravel-csp

Add CSP headers to the responses of a Laravel app

  Sources   Download

MIT

The Requires

 

The Development Requires

laravel security spatie headers csp content-security-policy laravel-csp

09/03 2018

1.0.5

1.0.5.0 https://github.com/spatie/laravel-csp

Add CSP headers to the responses of a Laravel app

  Sources   Download

MIT

The Requires

 

The Development Requires

laravel security spatie headers csp content-security-policy laravel-csp

01/03 2018

1.0.4

1.0.4.0 https://github.com/spatie/laravel-csp

Add CSP headers to the responses of a Laravel app

  Sources   Download

MIT

The Requires

 

The Development Requires

laravel security spatie headers csp content-security-policy laravel-csp

21/02 2018

1.0.3

1.0.3.0 https://github.com/spatie/laravel-csp

Add CSP headers to the responses of a Laravel app

  Sources   Download

MIT

The Requires

 

The Development Requires

laravel security spatie headers csp content-security-policy laravel-csp

21/02 2018

1.0.3.x-dev

1.0.3.9999999-dev https://github.com/spatie/laravel-csp

Add CSP headers to the responses of a Laravel app

  Sources   Download

MIT

The Requires

 

The Development Requires

laravel security spatie headers csp content-security-policy laravel-csp

20/02 2018

1.0.2

1.0.2.0 https://github.com/spatie/laravel-csp

Add CSP headers to the responses of a Laravel app

  Sources   Download

MIT

The Requires

 

The Development Requires

laravel security spatie headers csp content-security-policy laravel-csp

20/02 2018

1.0.1

1.0.1.0 https://github.com/spatie/laravel-csp

Add CSP headers to the responses of a Laravel app

  Sources   Download

MIT

The Requires

 

The Development Requires

laravel security spatie headers csp content-security-policy laravel-csp

20/02 2018

1.0.0

1.0.0.0 https://github.com/spatie/laravel-csp

Add CSP headers to the responses of a Laravel app

  Sources   Download

MIT

The Requires

 

The Development Requires

laravel security spatie headers csp content-security-policy laravel-csp

18/02 2018

0.0.6

0.0.6.0 https://github.com/spatie/laravel-csp

Add CSP headers to the responses of a Laravel app

  Sources   Download

MIT

The Requires

 

The Development Requires

laravel security spatie headers csp content-security-policy laravel-csp

17/02 2018

0.0.5

0.0.5.0 https://github.com/spatie/laravel-csp

Add CSP headers to the responses of a Laravel app

  Sources   Download

MIT

The Requires

 

The Development Requires

laravel security spatie headers csp content-security-policy laravel-csp

17/02 2018

0.0.4

0.0.4.0 https://github.com/spatie/laravel-csp

Add CSP headers to the responses of a Laravel app

  Sources   Download

MIT

The Requires

 

The Development Requires

laravel security spatie headers csp content-security-policy laravel-csp

17/02 2018

0.0.3

0.0.3.0 https://github.com/spatie/laravel-csp

Add CSP headers to the responses of a Laravel app

  Sources   Download

MIT

The Requires

 

The Development Requires

laravel security spatie headers csp content-security-policy laravel-csp

17/02 2018

0.0.2

0.0.2.0 https://github.com/spatie/laravel-csp

Add CSP headers to the responses of a Laravel app

  Sources   Download

MIT

The Requires

 

The Development Requires

laravel security spatie headers csp content-security-policy laravel-csp

17/02 2018

0.0.1

0.0.1.0 https://github.com/spatie/laravel-csp

Add CSP headers to the responses of a Laravel app

  Sources   Download

MIT

The Requires

 

The Development Requires

laravel security spatie headers csp content-security-policy laravel-csp