bnomei / kirby3-security-headers
Kirby Plugin for easier Security Headers setup
Installs: 4 623
Dependents: 0
Suggesters: 5
Security: 0
Stars: 26
Watchers: 2
Forks: 3
Open Issues: 3
Type:kirby-plugin
Requires
- php: >=8.2.0
- getkirby/composer-installer: ^1.2
- paragonie/csp-builder: ^3.0
Requires (Dev)
- getkirby/cms: ^5.0.0-alpha.4
- larastan/larastan: ^v3.0.0
- laravel/pint: ^1.13
- pestphp/pest: ^v3.5.1
- spatie/ray: ^1.39
Suggests
- bnomei/kirby3-doctor: Add a panel button to check health and security of your Kirby installation
- dev-master
- 5.0.1
- 5.0.0
- 4.0.0
- 2.5.5
- 2.5.4
- 2.5.3
- 2.5.2
- 2.5.1
- 2.5.0
- 2.4.2
- 2.4.1
- 2.4.0
- 2.3.2
- 2.3.1
- 2.3.0
- 2.2.5
- 2.2.4
- 2.2.3
- 2.2.2
- 2.2.1
- 2.2.0
- 2.1.0
- 2.0.3
- 2.0.2
- 2.0.1
- 2.0.0
- 1.1.3
- 1.1.2
- 1.1.1
- 1.0.4
- 1.0.3
- 1.0.2
- 1.0.1
- 1.0.0
- 0.6.1
- 0.6.0
- 0.5.7
- 0.5.6
- 0.5.5
- 0.5.4
- 0.5.3
- 0.5.2
- 0.5.1
- 0.5.0
- dev-dependabot/composer/getkirby/cms-3.6.6.2
- dev-dependabot/composer/guzzlehttp/guzzle-7.7.0
- dev-dependabot/composer/guzzlehttp/psr7-2.5.0
This package is auto-updated.
Last update: 2024-12-16 15:18:41 UTC
README
Kirby Plugin for easier Content Security Policy (CSP) Headers setup.
Installation
- unzip master.zip as folder
site/plugins/kirby3-security-headers
or git submodule add https://github.com/bnomei/kirby3-security-headers.git site/plugins/kirby3-security-headers
orcomposer require bnomei/kirby3-security-headers
Default CSP Headers
The following headers will be applied by default, you do not need to set them explicitly. They provide a good starting point for most websites and ensure a sane level of security.
X-Powered-By: "" # unset X-Frame-Options: "SAMEORIGIN" X-XSS-Protection: "1; mode=block" X-Content-Type-Options: "nosniff" Strict-Transport-Security: "max-age=31536000; includeSubdomains" Referrer-Policy: "no-referrer-when-downgrade" Permissions-Policy: "interest-cohort=()" # flock-off # + various Feature-Policies...
Tip
See \Bnomei\SecurityHeaders::HEADERS_DEFAULT
for more details.
Zero Configuration? Almost.
Installing the plugin is enough to protect your website. A route:before
-hook takes care of sending the CSP headers
automatically. But you will most likely need to customize the CSP headers when using third-party services like
- Content Delivery Networks (CDN),
- analytic scripts like Google-Tag-Manager/Fathom/Matomo/Piwik/Plausible/Umami,
- embedding external media like from Youtube/Vimeo/Instagram/X,
- external newsletter sign-up forms from Brevo/Mailchimp/Mailjet/Mailcoach,
- any other third-party service not hosted on your domain or subdomain or
- when using inline
<script>
and/or<style>
.
Tip
The plugin will automatically disable itself on local setups to not get in your way while developing. To test the CSP headers locally, you can use the 'bnomei.securityheaders.enabled' => true,
option to enforce sending the headers.
Customizing CSP Headers & Nonces
You can customize the CSP headers by providing a custom Loader and/or Setter via the Kirby config.
Loader
The Loader is used to initially create the CSP-Builder object with a given set of mostly static data. You can provide a
path to a file, return an array or null
to create blank CSP-Builder object.
Tip
See \Bnomei\SecurityHeaders::LOADER_DEFAULT
for more details.
Warning
Consider using a custom loader ONLY if you find yourself adding a lot of configurations in the Setter. The default loader is already quite extensive and should cover most use-cases.
Setter
The Setter is applied after the Loader. Use it to add dynamic stuff like rules for external services, hashes and nonces.
/site/config/config.php
<?php return [ 'bnomei.securityheaders.setter' => function ($instance) { // https://github.com/paragonie/csp-builder // #build-a-content-security-policy-programmatically /** @var ParagonIE\CSPBuilder\CSPBuilder $csp */ $csp = $instance->csp(); // allowing all inline scripts and styles is // not recommended, try using nonces instead // $csp->setAllowUnsafeEval('script-src', true); // $csp->setAllowUnsafeInline('script-src', true); // $csp->setAllowUnsafeInline('style-src', true); // youtube $csp->addSource('frame', 'https://www.youtube.com'); $csp->addSource('frame', 'https://youtube.com'); $csp->addSource('image', 'https://ggpht.com'); $csp->addSource('image', 'https://youtube.com'); $csp->addSource('image', 'https://ytimg.com'); $csp->addSource('script', 'https://google.com'); $csp->addSource('script', 'https://youtube.com'); // vimeo $csp->addSource('frame', 'player.vimeo.com'); $csp->addSource('image', 'i.vimeocdn.com'); $csp->addSource('script', 'f.vimeocdn.com'); $csp->addSource('source', 'player.vimeo.com'); $csp->addSource('style', 'f.vimeocdn.com'); }, // other options... ];
Tip
You can define nonces in the Setter
-option and later retrieved using $page->nonce(...)
or $page->nonceAttr(...)
.
But the plugin also provides a single nonce for frontend use out of the box.
Nonces
For convenience the plugin also provides you with a single
frontend nonce to use as attribute in <link>
, <style>
and <script>
elements. You can retrieve the nonce with
site()->nonce()
.
<script nonce="<?= site()->nonce() ?>"> /* ... */ </script>
Note
This plugin automatically registers the nonce that Kirby creates for its panel (in case that ever might be needed).
Disabling the plugin
The CSP headers will be sent before Kirby renders HTML using a route:before
hook but the plugin will be automatically
disabled if one the following conditions apply:
- Kirby determines it is a local setup or
- The plugins setting
bnomei.securityheaders.enabled
is set tofalse
.
Warning
By default, CSP headers are never sent for any Kirby Panel, API and Media routes.
Settings
Dependencies
Disclaimer
This plugin is provided "as is" with no guarantee. Use it at your own risk and always test it yourself before using it in a production environment. If you find any issues, please create a new issue.
License
It is discouraged to use this plugin in any project that promotes racism, sexism, homophobia, animal abuse, violence or any other form of hate speech.