Download the PHP package hyperia/yii2-secure-headers without Composer
On this page you can find all versions of the php package hyperia/yii2-secure-headers. It is possible to download/install these versions without Composer. Possible dependencies are resolved automatically.
Informations about the package yii2-secure-headers
Yii2 security headers extension
Add security related headers to HTTP response. The package includes extension for easy Yii2 integration.
Installation
The preferred way to install this extension is through composer.
Either run
or add
to the require section of your composer.json.
Configuration (usage)
Parameter description
Source Value | Example | Description |
---|---|---|
* | img-src * | Wildcard, allows any URL except data: blob: filesystem: schemes. |
'none' | object-src 'none' | Prevents loading resources from any source. |
'self' | script-src 'self' | Allows loading resources from the same origin (same scheme, host and port). |
data: | img-src 'self' data: | Allows loading resources via the data scheme (eg Base64 encoded images). |
domain.example.com | img-src domain.example.com | Allows loading resources from the specified domain name. |
*.example.com | img-src *.example.com | Allows loading resources from any subdomain under example.com. |
https://cdn.com | img-src https://cdn.com | Allows loading resources only over HTTPS matching the given domain. |
https: | img-src https: | Allows loading resources only over HTTPS on any domain. |
'unsafe-inline' | script-src 'unsafe-inline' | Allows use of inline source elements such as style attribute, onclick, or script tag bodies (depends on the context of the source it is applied to) |
'unsafe-eval' | script-src 'unsafe-eval' | Allows unsafe dynamic code evaluation such as JavaScript eval() |
false | prefetch-src false | Exclude the property from the directive array to avoid deprecated warning/error from browsers |
Policy
Each header has a reference link in config file, you should read it if you do not know the header. If you want to disable a string type header, just set to null or empty string.
Content Security Policy
We use paragonie/csp-builder to help us support csp header. If you want to disable csp header, set custom-csp to empty string.
Subresource Integrity
If you want to require subresource integrity for style and script sources set requireSriForStyle
and requireSriForScript
to true
Feature Policy
Deprecated. Use Permissions Policy instead. Feature Policy is being created to allow site owners to enable and disable certain web platform features on their own pages and those they embed. Use same directives as for CSP
Permissions Policy
Permissions Policy is new policy which will replace Feature Policy