Download the PHP package bnomei/kirby3-security-headers without Composer
On this page you can find all versions of the php package bnomei/kirby3-security-headers. It is possible to download/install these versions without Composer. Possible dependencies are resolved automatically.
Download bnomei/kirby3-security-headers
More information about bnomei/kirby3-security-headers
Files in bnomei/kirby3-security-headers
Package kirby3-security-headers
Short Description Kirby Plugin for easier Security Headers setup
License MIT
Informations about the package kirby3-security-headers
Kirby Content Security Policy Header
Kirby Plugin for easier Content Security Policy (CSP) Headers setup.
Installation
- unzip master.zip as folder
site/plugins/kirby3-security-headers
or git submodule add https://github.com/bnomei/kirby3-security-headers.git site/plugins/kirby3-security-headers
orcomposer require bnomei/kirby3-security-headers
Default CSP Headers
The following headers will be applied by default, you do not need to set them explicitly. They provide a good starting point for most websites and ensure a sane level of security.
[!TIP] See
\Bnomei\SecurityHeaders::HEADERS_DEFAULT
for more details.
Zero Configuration? Almost.
Installing the plugin is enough to protect your website. A route:before
-hook takes care of sending the CSP headers
automatically. But you will most likely need to customize the CSP headers when using third-party services like
- Content Delivery Networks (CDN),
- analytic scripts like Google-Tag-Manager/Fathom/Matomo/Piwik/Plausible/Umami,
- embedding external media like from Youtube/Vimeo/Instagram/X,
- external newsletter sign-up forms from Brevo/Mailchimp/Mailjet/Mailcoach,
- any other third-party service not hosted on your domain or subdomain or
- when using inline
<script>
and/or<style>
.
[!TIP] The plugin will automatically disable itself on local setups to not get in your way while developing. To test the CSP headers locally, you can use the
'bnomei.securityheaders.enabled' => true,
option to enforce sending the headers.
Customizing CSP Headers & Nonces
You can customize the CSP headers by providing a custom Loader and/or Setter via the Kirby config.
Loader
The Loader is used to initially create the CSP-Builder object with a given set of mostly static data. You can provide a
path to a file, return an array or null
to create blank CSP-Builder object.
[!TIP] See
\Bnomei\SecurityHeaders::LOADER_DEFAULT
for more details.[!WARNING] Consider using a custom loader ONLY if you find yourself adding a lot of configurations in the Setter. The default loader is already quite extensive and should cover most use-cases.
Setter
The Setter is applied after the Loader. Use it to add dynamic stuff like rules for external services, hashes and nonces.
/site/config/config.php
[!TIP] You can define nonces in the
Setter
-option and later retrieved using$page->nonce(...)
or$page->nonceAttr(...)
. But the plugin also provides a single nonce for frontend use out of the box.
Nonces
For convenience the plugin also provides you with a single
frontend nonce to use as attribute in <link>
, <style>
and <script>
elements. You can retrieve the nonce with
site()->nonce()
.
[!NOTE] This plugin automatically registers the nonce that Kirby creates for its panel (in case that ever might be needed).
Disabling the plugin
The CSP headers will be sent before Kirby renders HTML using a route:before
hook but the plugin will be automatically
disabled if one the following conditions apply:
- Kirby determines it is a local setup or
- The plugins setting
bnomei.securityheaders.enabled
is set tofalse
.
[!WARNING] By default, CSP headers are never sent for any Kirby Panel, API and Media routes.
Settings
bnomei.securityheaders. | Default | Description |
---|---|---|
enabled | null/true/false |
will set headers |
seed | callback |
returns a unique seed for frontend nonces on every request |
headers | callback |
array of sensible default values |
loader | callback |
returning filepath or array |
setter | callback |
instance which allows customizing the CSPBuilder |
Dependencies
Disclaimer
This plugin is provided "as is" with no guarantee. Use it at your own risk and always test it yourself before using it in a production environment. If you find any issues, please create a new issue.
License
It is discouraged to use this plugin in any project that promotes racism, sexism, homophobia, animal abuse, violence or any other form of hate speech.
All versions of kirby3-security-headers with dependencies
getkirby/composer-installer Version ^1.2
paragonie/csp-builder Version ^3.0