File: csp.txt

package info (click to toggle)
python-django 3%3A6.0-1
  • links: PTS, VCS
  • area: main
  • in suites: experimental
  • size: 62,104 kB
  • sloc: python: 371,210; javascript: 19,376; xml: 211; makefile: 187; sh: 28
file content (100 lines) | stat: -rw-r--r-- 3,239 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
===========================================
How to use Django's Content Security Policy
===========================================

.. _csp-config:

Basic config
============

To enable Content Security Policy (CSP) in your Django project:

1. Add the CSP middleware to your :setting:`MIDDLEWARE` setting::

    MIDDLEWARE = [
        # ...
        "django.middleware.csp.ContentSecurityPolicyMiddleware",
        # ...
    ]

2. Configure the CSP policies in your ``settings.py`` using either
   :setting:`SECURE_CSP` or :setting:`SECURE_CSP_REPORT_ONLY` (or both). The
   :ref:`CSP Settings docs <csp-settings>` provide more details about the
   differences between these two::

    from django.utils.csp import CSP

    # To enforce a CSP policy:
    SECURE_CSP = {
        "default-src": [CSP.SELF],
        # Add more directives to be enforced.
    }

    # Or for report-only mode:
    SECURE_CSP_REPORT_ONLY = {
        "default-src": [CSP.SELF],
        # Add more directives as needed.
        "report-uri": "/path/to/reports-endpoint/",
    }

.. _csp-nonce-config:

Nonce config
============

To use nonces in your CSP policy, beside the basic config, you need to:

1. Include the :attr:`~django.utils.csp.CSP.NONCE` placeholder value in the CSP
   settings. This only applies to ``script-src`` or ``style-src`` directives::

    from django.utils.csp import CSP

    SECURE_CSP = {
        "default-src": [CSP.SELF],
        # Allow self-hosted scripts and script tags with matching `nonce` attr.
        "script-src": [CSP.SELF, CSP.NONCE],
        # Example of the less secure 'unsafe-inline' option.
        "style-src": [CSP.SELF, CSP.UNSAFE_INLINE],
    }

2. Add the :func:`~django.template.context_processors.csp` context processor to
   your :setting:`TEMPLATES` setting. This makes the generated nonce value
   available in the Django templates as the ``csp_nonce`` context variable::

    TEMPLATES = [
        {
            "BACKEND": "django.template.backends.django.DjangoTemplates",
            "OPTIONS": {
                "context_processors": [
                    # ...
                    "django.template.context_processors.csp",
                ],
            },
        },
    ]

3. In your templates, add the ``nonce`` attribute to the relevant inline
   ``<style>`` or ``<script>`` tags, using the ``csp_nonce`` context variable:

   .. code-block:: html+django

      <style nonce="{{ csp_nonce }}">
        /* These inline styles will be allowed. */
      </style>

      <script nonce="{{ csp_nonce }}">
        // This inline JavaScript will be allowed.
      </script>

.. admonition:: Caching and Nonce Reuse

   The :class:`~django.middleware.csp.ContentSecurityPolicyMiddleware`
   automatically handles generating a unique nonce and inserting the
   appropriate ``nonce-<value>`` source expression into the
   ``Content-Security-Policy`` (or ``Content-Security-Policy-Report-Only``)
   header when the nonce is used in a template.

   To ensure correct behavior, make sure both the HTML and the header are
   generated within the same request and not served from cache. See the
   reference documentation on :ref:`csp-nonce` for implementation details and
   important caching considerations.