NetEscapades.AspNetCore.SecurityHeaders.TagHelpers 0.9.0

There is a newer version of this package available.
See the version list below for details.
dotnet add package NetEscapades.AspNetCore.SecurityHeaders.TagHelpers --version 0.9.0                
NuGet\Install-Package NetEscapades.AspNetCore.SecurityHeaders.TagHelpers -Version 0.9.0                
This command is intended to be used within the Package Manager Console in Visual Studio, as it uses the NuGet module's version of Install-Package.
<PackageReference Include="NetEscapades.AspNetCore.SecurityHeaders.TagHelpers" Version="0.9.0" />                
For projects that support PackageReference, copy this XML node into the project file to reference the package.
paket add NetEscapades.AspNetCore.SecurityHeaders.TagHelpers --version 0.9.0                
#r "nuget: NetEscapades.AspNetCore.SecurityHeaders.TagHelpers, 0.9.0"                
#r directive can be used in F# Interactive and Polyglot Notebooks. Copy this into the interactive tool or source code of the script to reference the package.
// Install NetEscapades.AspNetCore.SecurityHeaders.TagHelpers as a Cake Addin
#addin nuget:?package=NetEscapades.AspNetCore.SecurityHeaders.TagHelpers&version=0.9.0

// Install NetEscapades.AspNetCore.SecurityHeaders.TagHelpers as a Cake Tool
#tool nuget:?package=NetEscapades.AspNetCore.SecurityHeaders.TagHelpers&version=0.9.0                

Tag Helpers for the ASP.NET Core Security Headers middleware for adding Nonces for use with SecurityHeadersMiddleware

Product Compatible and additional computed target framework versions.
.NET net5.0 was computed.  net5.0-windows was computed.  net6.0 was computed.  net6.0-android was computed.  net6.0-ios was computed.  net6.0-maccatalyst was computed.  net6.0-macos was computed.  net6.0-tvos was computed.  net6.0-windows was computed.  net7.0 was computed.  net7.0-android was computed.  net7.0-ios was computed.  net7.0-maccatalyst was computed.  net7.0-macos was computed.  net7.0-tvos was computed.  net7.0-windows was computed.  net8.0 was computed.  net8.0-android was computed.  net8.0-browser was computed.  net8.0-ios was computed.  net8.0-maccatalyst was computed.  net8.0-macos was computed.  net8.0-tvos was computed.  net8.0-windows was computed. 
.NET Core netcoreapp2.0 was computed.  netcoreapp2.1 was computed.  netcoreapp2.2 was computed.  netcoreapp3.0 was computed.  netcoreapp3.1 was computed. 
.NET Standard netstandard2.0 is compatible.  netstandard2.1 was computed. 
.NET Framework net461 was computed.  net462 was computed.  net463 was computed.  net47 was computed.  net471 was computed.  net472 was computed.  net48 was computed.  net481 was computed. 
MonoAndroid monoandroid was computed. 
MonoMac monomac was computed. 
MonoTouch monotouch was computed. 
Tizen tizen40 was computed.  tizen60 was computed. 
Xamarin.iOS xamarinios was computed. 
Xamarin.Mac xamarinmac was computed. 
Xamarin.TVOS xamarintvos was computed. 
Xamarin.WatchOS xamarinwatchos was computed. 
Compatible target framework(s)
Included target framework(s) (in package)
Learn more about Target Frameworks and .NET Standard.

NuGet packages (4)

Showing the top 4 NuGet packages that depend on NetEscapades.AspNetCore.SecurityHeaders.TagHelpers:

Package Downloads
FamilyHubs.SharedKernel.Razor

Package Description

KoloDev.GDS.UI

Kolo GDS UI Accelerator

Indiko.Hosting.BlazorServer

Building Blocks Hosting Blazor Server

Etch.Cms.Umbraco.Civic

Package Description

GitHub repositories (5)

Showing the top 5 popular GitHub repositories that depend on NetEscapades.AspNetCore.SecurityHeaders.TagHelpers:

Repository Stars
damienbod/AspNetCoreHybridFlowWithApi
Different ASP.NET Core applications using OpenID Connect Hybrid flow Code Flow, Code Flow with PKCE, JWT APIs, MFA examples
damienbod/AspNetCoreOpeniddict
OpenIddict with Angular and Blazor WASM BFF OpenID Connect Code Flow with PKCE clients and ASP.NET Core APIs
damienbod/IdentityServer4AspNetCoreIdentityTemplate
An ASP.NET Core 6.0 IdentityServer4 Identity Bootstrap 4 template with localization
damienbod/AspNetCoreAngularSignalRSecurity
Security with ASP.NET Core, SignalR and Angular
damienbod/IdentityServer4VueJs
IdentityServer4 Vue.js oidc-client-js OpenID Connect code flow with PKCE
Version Downloads Last updated
1.0.0-preview.2 43 10/31/2024
1.0.0-preview.1 823 9/28/2024
0.24.0 14,795 9/12/2024
0.23.0 7,675 8/26/2024
0.22.0 39,190 6/14/2024
0.21.0 156,559 9/29/2023
0.20.0 30,098 7/10/2023
0.19.0 6,110 6/12/2023
0.18.0 108,311 1/2/2023
0.17.0 64,285 6/28/2022
0.16.1 76,078 11/23/2021
0.16.0 21,631 8/1/2021
0.15.0 1,711 6/26/2021
0.14.0 2,849 4/21/2021
0.13.0 11,177 2/9/2021
0.12.1 56,258 10/2/2020
0.12.0 638 10/1/2020
0.11.2 1,519 7/27/2020
0.11.1 606 7/27/2020
0.11.0 57,402 10/31/2019
0.10.0 735 9/27/2019
0.9.0 16,071 10/28/2018

Features:

* Add support for Nonce generation for Content-Security-Policy headers. See README.md for details
* Add TagHelpers library for adding nonces and generating hashes for Razor elements (NetEscapades.AspNetCore.SecurityHeaders.TagHelpers)
* Allow using HSTS preload with Strict-Transport-Security
* Allow excluding domains from Strict-Transport-Security. Similar to the Microsoft HstsMiddlewareyou can skip applying Strict-Transport-Security to specific hosts

Breaking Changes:

* All obsolete classes have been removed.
* Many classes have changed namespace to better reflect their location in the project, and also to aid discovery. If you're using the recommended builders and extension methods, you should not have any build-time breaking changes, but the package is not runtime-compatible with previous versions
* The Strict-Transport-Security header is no longer applied to localhost by default. Generally speaking, this isn't something you should do anyway.
* The CSP classes have undergone significant refactoring to allow dynamic values per-request (i.e. nonces). This doesn't affect the main public API, but will impact you if you're working with the low-level infrastructure classes.


See https://github.com/andrewlock/NetEscapades.AspNetCore.SecurityHeaders/blob/master/CHANGELOG.md#v090 for more details.