silksh / security-bundle
Security related extensions for Symfony
Installs: 2 876
Dependents: 0
Suggesters: 0
Security: 0
Stars: 0
Watchers: 5
Forks: 0
Open Issues: 0
Type:symfony-bundle
pkg:composer/silksh/security-bundle
Requires
- ezyang/htmlpurifier: ^4.10
- symfony/framework-bundle: ^3.0 || ^4.0 || ^5.0
- symfony/validator: ^3.0 || ^4.0 || ^5.0
- twig/twig: ^1.28 || ^2.0 || ^3.0
This package is not auto-updated.
Last update: 2025-11-04 14:15:30 UTC
README
This bundle requires Symfony 3 or Symfony 4.
Bundle installation
Add the bundle to you project dependencies:
composer require silksh/security-bundle
Symfony 3. Enable the bundle:
// app/AppKernel.php class AppKernel extends Kernel { public function registerBundles() { return array( // ... new SilkSH\SecurityBundle\SilkshSecurityBundle(), ); } }
Symfony 4. It's automatic, but if Symfony did not do it for you, enable the bundle manually in bundles.php:
// config/bundles.php return [ // ... SilkSH\SecurityBundle\SilkshSecurityBundle::class => ['all' => true], ]
Validators
The bundle provides some Validators in the namespace SilkSH\SecurityBundle\Validator\Constraints.
-
FileNamevalidates filenames. Possible properties:maxFilenameLength, default: 100.maxFilenameLengthMessage: custom length error message. You can use{{ max_length }}inside.allowedExtensions, default: "pdf", "txt", "doc", "docx", "ppt", "pptx", "jpg", "jpeg", "png"allowedExtensionsMessage, custom error message about wrong extension. You can use{{ extension }}and{{ extensions }}inside.
Example:
use SilkSH\SecurityBundle\Validator\Constraints as SecurityAssert; ... /** * @Vich\UploadableField(mapping="uploads", fileNameProperty="filename") * @SecurityAssert\FileName( * maxFilenameLength=8, * maxFilenameLengthMessage="Maximal file length is {{ max_length }} characters", * allowedExtensions={"zip","bz2"}, * allowedExtensionsMessage="Extension '{{ extension }}' is not allowed. Allowed extensions: {{ extensions }}" * ) */ private $file;
-
Nameallows only international alphanumeric and some special characters (A-z 0-9 - + _ . , @ " '). Possible properties:message: custom error message. You can use{{ allowed_signs }}inside.
-
HTMLPurifierallows only whitelisted HTML tags and attributes. It uses HTML Purifier library. Possible properties:message: custom error message.
-
TagWhitelist: simple and buggy HTML tag validator that usesDOMDocument. UsingHTMLPurifierinstead is recommended. Possible properties:allowedTags, default: "html", "head", "meta", "title", "style", "body", "table", "tr", "th", "td", "h1", "h2", "h3", "h4", "h5", "h6", "p", "a", "img", "br", "span", "small".allowedTagsMessage, custom error message for non valid tags. You can use{{ allowed_tags }}inside.allowedAttributes, default: "width", "align", "cellspacing", "cellpadding", "class", "style", "href", "http-equiv", "name", "alt", "border", "content", "bgcolor", "type", "target", "src".allowedAttributesMessage, custom error message for non valid attributes. You can use{{ allowed_attributes }}inside.
Twig extension
The bundle provides purify filter for Twig.
It uses HTML Purifier to remove all unsafe tags (like <script>) and attributes (like onclick) from HTML code.
Let's say we have some HTML code in the variable value and we want to render it unescaped,
so that the user sees formatted output. Usage:
{{ value|purify|raw }}