flowpack / content-security-policy
Configure your content-security-policy header easily with yaml.
Package info
github.com/Flowpack/Flowpack.ContentSecurityPolicy
Type:neos-package
pkg:composer/flowpack/content-security-policy
Requires
- php: ^8.1
- neos/flow: ^8.3 || ^9.0
Requires (Dev)
- phpstan/extension-installer: ^1.4
- phpstan/phpstan: ^1.12
- phpstan/phpstan-phpunit: ^1.4
- phpstan/phpstan-strict-rules: ^1.6
- phpunit/phpunit: ^11.4
This package is auto-updated.
Last update: 2026-04-30 08:12:23 UTC
README
Introduction
Flow/Neos package to set your site's content security policy header easily with yaml.
Usage
Import the package using composer:
composer require flowpack/content-security-policy
The package is automatically active once imported.
By default, the response header Content-Security-Policy will now be included.
It will use the default configuration which looks like this:
Flowpack: ContentSecurityPolicy: enabled: true report-only: false content-security-policy: default: base-uri: 'self': true connect-src: 'self': true default-src: 'self': true form-action: 'self': true img-src: 'self': true media-src: 'self': true frame-src: 'self': true object-src: 'self': true script-src: 'self': true style-src: 'self': true style-src-attr: 'self': true style-src-elem: 'self': true font-src: 'self': true custom: [ ]
Now only resources from the same origin are allowed for the most common directives. It is enabled by default and the report-only mode is disabled.
Custom directives and values
If you want to override the default config don't forget to add this package as a dependency in the composer.json file of your package. Otherwise, it might not work because of the loading order of the packages.
The default configuration will probably not suit your needs so you can add your own configuration by adding the array custom like this in your own yaml configuration files:
Flowpack: ContentSecurityPolicy: content-security-policy: custom: frame-src: 'https://www.youtube.com': true 'https://staticxx.facebook.com': true
If you fully want to override the entire default config then just override the default key in yaml.
Show CSP configuration
To show the parsed configuration, the built-in command ./flow cspconfig:show can be used.
It shows all directives used by the frontend and the backend.
Throwing exceptions on configuration errors
By default, in production, invalid directives are logged as critical errors and skipped so the rest of the policy is still applied. Also invalid custom backend routes are logged and ignored in production. In development, exceptions are throw instead, which surfaces misconfiguration immediately. You can change that behavior like this:
Flowpack: ContentSecurityPolicy: throw-exception-on-configuration-error: true
Disable or report only
To disable the header simply set enabled to false.
If you want to add it as a report only header set report-only to true.
That way you have the option to see the possible errors without breaking functionality.
Nonce
You might want to use a nonce to allow inline scripts and styles to be still secure.
To do this simply add {nonce} as an option in a directive. Like this:
Flowpack: ContentSecurityPolicy: content-security-policy: custom: script-src: '{nonce}': true
Now the header will include a nonce-automatedgeneratedrandomstring in the script-src directive.
So inline scripts without the corresponding nonce will be blocked.
The nonce will be automatically added to all your script/style tags.
Backend
Due to the current nature of the Neos backend being rendered a bit different then the frontend a separate policy is added for the backend. I currently have found no suitable way the add the nonce in the inline scripts in the Neos UI package. So the CSP for the backend looks like this:
Flowpack: ContentSecurityPolicy: content-security-policy: backend: base-uri: 'self': true connect-src: 'self': true default-src: 'self': true form-action: 'self': true img-src: 'self': true 'data:': true media-src: 'self': true frame-src: 'self': true object-src: 'self': true script-src: 'self': true 'unsafe-inline': true 'unsafe-eval': true style-src: 'self': true 'unsafe-inline': true style-src-attr: 'self': true 'unsafe-inline': true style-src-elem: 'self': true 'unsafe-inline': true font-src: 'self': true 'data:': true custom-backend: [ ]
Unsafe inline scripts and styles are allowed in the backend because otherwise the backend won't work.
Again you can add your own policies in the custom-backend array the same way as the custom array for the frontend.
Custom backend routes
By default, the backend policy is applied to all paths starting with /neos. If you have additional routes that require
the same permissive policy (e.g. a custom admin UI at /monocle), add them to custom-backend.matchUris. Each entry
is a PHP regex (without delimiters) matched against the request path.
Flowpack: ContentSecurityPolicy: policies: custom-backend: matchUris: - '^/monocle(/.*)?$'
The built-in '^/neos' pattern in backend.matchUris is unaffected, so the Neos backend continues to work without any
changes. You only need to touch backend.matchUris if you want to replace the default /neos match entirely.
Thank you
This package originates from https://github.com/LarsNieuwenhuizen/Nieuwenhuizen.ContentSecurityPolicy.
Thank you Lars Nieuwenhuizen for your work.