Skip to content

Commit 9298c5e

Browse files
committed
CSP nonce example
1 parent bf116c5 commit 9298c5e

File tree

3 files changed

+130
-3
lines changed

3 files changed

+130
-3
lines changed

content/_index.md

+2-3
Original file line numberDiff line numberDiff line change
@@ -105,10 +105,9 @@ app.use(
105105

106106
```js
107107
// Sets the `script-src` directive to
108-
// "'self' 'nonce-e33ccde670f149c1789b1e1e113b0916'"
109-
// (or similar)
108+
// "'self' 'nonce-e33...'" (or similar)
110109
app.use((req, res, next) => {
111-
res.locals.cspNonce = crypto.randomBytes(16).toString("hex");
110+
res.locals.cspNonce = crypto.randomBytes(32).toString("hex");
112111
next();
113112
});
114113
app.use(

content/faq/_index.md

+1
Original file line numberDiff line numberDiff line change
@@ -8,5 +8,6 @@ title: "Frequently asked questions (FAQ)"
88
- [What if I don't want to install Helmet?]({{< ref "faq/you-might-not-need-helmet" >}})
99
- [How do I use Helmet without Express?]({{< ref "faq/use-without-express" >}})
1010
- [How do I upgrade from Helmet 3 to Helmet 4?]({{< ref "faq/helmet-4-upgrade" >}})
11+
- [How do I set a Content Security Policy nonce?]({{< ref "faq/csp-nonce-example" >}})
1112
- [How do I set both `Content-Security-Policy` and `Content-Security-Policy-Report-Only` headers?](https://github.com/helmetjs/helmet/issues/351#issuecomment-1015498560)
1213
- [Who made Helmet?]({{< ref "faq/contributors" >}})

content/faq/csp-nonce-example.md

+127
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,127 @@
1+
---
2+
title: "Content Security Policy + nonce example"
3+
---
4+
5+
Some `Content-Security-Policy` directives support a nonce value. It is one way to avoid using `unsafe-inline` with inline scripts and styles.
6+
7+
At a high level, you'll do the following:
8+
9+
1. Generate a nonce value, unique for each request. Save it to `res.locals.cspNonce` or equivalent.
10+
1. Tell Helmet about this nonce.
11+
1. Add the `nonce` HTML attribute to your relevant `<script>` or `<style>` tags.
12+
13+
## Step 1: generate a nonce value
14+
15+
First, you'll need to generate a nonce value and save it to `res.locals`. It should be difficult to guess this nonce, so we'll generate 32 random bytes (256 random bits) and convert them to a hex string.
16+
17+
```javascript
18+
import * as crypto from "node:crypto";
19+
20+
// ...
21+
22+
app.use((_req, res, next) => {
23+
// Asynchronously generate a unique nonce for each request.
24+
crypto.randomBytes(32, (err, randomBytes) => {
25+
if (err) {
26+
// If there was a problem, bail.
27+
next(err);
28+
} else {
29+
// Save the nonce, as a hex string, to `res.locals` for later.
30+
res.locals.cspNonce = randomBytes.toString("hex");
31+
next();
32+
}
33+
});
34+
});
35+
```
36+
37+
## Step 2: tell Helmet about this nonce
38+
39+
Next, tell Helmet about this nonce. More specifically, tell the `script-src` directive about it.
40+
41+
In this example, we plan to use this nonce with a `<script>` tag. If you want to use an inline style instead, use the `styleSrc` directive.
42+
43+
```javascript
44+
app.use(
45+
helmet({
46+
contentSecurityPolicy: {
47+
directives: {
48+
scriptSrc: [
49+
"'self'",
50+
// Include this nonce in the `script-src` directive.
51+
(_req, res) => `'nonce-${res.locals.cspNonce}'`,
52+
],
53+
},
54+
},
55+
}),
56+
);
57+
```
58+
59+
## Step 3: put the nonce in your HTML
60+
61+
Finally, you need to set the `nonce` attribute of your `<script>` or `<style>` tag.
62+
63+
It's likely that you're using a templating engine like Pug or EJS, but we'll do something simpler for this example and just send HTML inline.
64+
65+
```javascript
66+
app.get("/", (_req, res) => {
67+
// When rendering the `<script>` tag, include the nonce.
68+
res.send(`
69+
<script nonce="${res.locals.cspNonce}">
70+
console.log("Hello world!");
71+
</script>
72+
`);
73+
});
74+
```
75+
76+
If you've done everything correctly, you should see "Hello world!" in the console. You should also see a difference `nonce` value every time you refresh the page.
77+
78+
## Full app code
79+
80+
Here's the full source code for this example.
81+
82+
```javascript
83+
import express from "express";
84+
import helmet from "helmet";
85+
import * as crypto from "node:crypto";
86+
87+
const app = express();
88+
89+
app.use((_req, res, next) => {
90+
// Asynchronously generate a unique nonce for each request.
91+
crypto.randomBytes(32, (err, randomBytes) => {
92+
if (err) {
93+
// If there was a problem, bail.
94+
next(err);
95+
} else {
96+
// Save the nonce, as a hex string, to `res.locals` for later.
97+
res.locals.cspNonce = randomBytes.toString("hex");
98+
next();
99+
}
100+
});
101+
});
102+
103+
app.use(
104+
helmet({
105+
contentSecurityPolicy: {
106+
directives: {
107+
scriptSrc: [
108+
"'self'",
109+
// Include this nonce in the `script-src` directive.
110+
(_req, res) => `'nonce-${res.locals.cspNonce}'`,
111+
],
112+
},
113+
},
114+
}),
115+
);
116+
117+
app.get("/", (_req, res) => {
118+
// When rendering the `<script>` tag, include the nonce.
119+
res.send(`
120+
<script nonce="${res.locals.cspNonce}">
121+
console.log("Hello world!");
122+
</script>
123+
`);
124+
});
125+
126+
app.listen(3000);
127+
```

0 commit comments

Comments
 (0)