A Django app for handling reports from web browsers of violations of your website's content security policy.
This app does not handle the setting of the Content-Security-Policy HTTP headers, but deals with handling the reports that web browsers may submit to your site (via the report-uri
) when the stated content security policy is violated.
It is recommended that you use an app such as django-csp (Github) to set the Content-Security-Policy
headers.
It receives the reports from the browser and does any/all of the following with them:
- Logs them using the python
logging
module. - Sends them to you via email.
- Saves them to the database via a Django model.
- Runs any of your own custom functions on them.
- Can generate a summary of a reports.
Supports Python 3.5 to 3.10 and Django 2.2 to 4.x (latest).
Python 2.7 support is available in version 1.4 and/or the python2.7-support
branch.
- Install this app into your Django project, e.g.
pip install django-csp-reports
. - Add
'cspreports'
to yourINSTALLED_APPS
. - Include
cspreports.urls
in your URL config somewhere, e.g.urlpatterns = [path('csp/', include('cspreports.urls'))]
. - In your
Content-Security-Policy
HTTP headers, setreverse('report_csp')
as thereport-uri
. (Note, with django-csp, you will want to setCSP_REPORT_URI = reverse_lazy('report_csp')
in settings.py). - Set all/any of the following in settings.py as you so desire, hopefully they are self-explanatory:
-
CSP_REPORTS_EMAIL_ADMINS
(bool
defaults toTrue
). -
CSP_REPORTS_LOG
(bool
, whether or not to log the reporting using the pythonlogging
module, defaults toTrue
). -
CSP_REPORTS_LOG_LEVEL
(str
, one of the Python logging module's available log functions, defaults to'warning'
). -
CSP_REPORTS_SAVE
(bool
defaults toTrue
). Determines whether the reports are saved to the database. -
CSP_REPORTS_ADDITIONAL_HANDLERS
(iterable
defaults to[]
).- Each value should be a dot-separated string path to a function which you want be called when a report is received.
- Each function is passed the
HttpRequest
of the CSP report.
-
CSP_REPORTS_FILTER_FUNCTION
(str
of dotted path to a callable, defaults toNone
).- If set, the specificed function is passed each
HttpRequest
object of the CSP report before it's processed. Only requests for which the function returnsTrue
are processed. - You may want to set this to
"cspreports.filters.filter_browser_extensions"
as a starting point.
- If set, the specificed function is passed each
-
CSP_REPORTS_LOGGER_NAME
(str
defaults toCSP Reports
). Specifies the logger name that will be used for logging CSP reports, if enabled. -
CSP_REPORTS_MODEL
(<app_label>.<model_name>
defaults to"cspreports.CSPReport"
). Specifies the model to be used for storing the CSP reports. You can easily extend the model by implementing the abstract base classcspreports.models.CSPReportBase
and adding your additional fields to it:# your_app.model.py from cspreports.models import CSPReportBase class CustomCSPReport(CSPReportBase): # Add your fields here pass
# settings.py CSP_REPORTS_MODEL = "your_app.CustomCSPReport"
-
- Set a cron to generate summaries.
- Enjoy.
Deletes old reports from the database.
Options:
--limit
- timestamp that all reports created since will not be deleted. Defaults to 1 week. Accepts any string that can be parsed as a datetime.
Generates a summary of CSP reports.
By default includes reports from yesterday (00:00:00 to midnight). The summary shows the top 10 violation sources (i.e. pages from which violations were reported), the top 10 blocked URIs (banned resources which the pages tried to load), and the top 10 invalid reports (which the browser provided an invalid CSP report).
Options:
--since
- timestamp of the oldest reports to include. Accepts any string that can be parsed as a datetime.--to
- timestamp of the newest reports to include. Accepts any string that can be parsed as a datetime.--top
- limit of how many examples to show. Default is 10.