Middleware and TagHelpers for CSP support in ASP.NET#24548
Closed
aaronshim wants to merge 28 commits into
Closed
Conversation
…fter this commit.
…nd run after this commit." This reverts commit 591cb47.
…point and handler
…t tags. ASP.NET doesn't seem to allow Optional/Nullable binds, so we will have to call AddNonces on every webapp that uses CSP.
…s have nonces. Does not build yet because of some root directory configuration in the Startup.
…for this behaviour
|
|
Member
|
Should this be closed in favor of aspnet/AspLabs#298? |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Hello ASP.NET Devs!
This PR adds Content Security Policy support for ASP.NET as a middleware. A very popular security mitigation against XSS and other injection vulnerabilities. CSP comes in many flavours, but we've chosen to add support for the most robust of them: nonce-based, strict-dynamic CSP.
Summary of the changes (Less than 80 chars)
With these tools, developers can enable CSP in reporting mode, collect reports and identify and refactor existing code that is incompatible with CSP from these reports. Finally, developers will be able to switch CSP to enforcing mode, which will provide a very robust defense against XSS.
Addresses #6001 (in this specific format)
Co-authored-by: Santiago Diaz - salchoman@gmail.com