Skip to content

Releases: nuxt-modules/security

v2.1.5

30 Nov 15:17
b39dbd9
Compare
Choose a tag to compare

🚨Hotfix Release : disable minification by default

This release fixes an issue reported in #576 whereby Nuxt UI v3 styles could break.
The issue was related to minification settings.

This release also deploys the new version of the documentation pages for Nuxt Security
Enjoy reading 📖

What's Changed

New Contributors

Full Changelog: v2.1.4...v2.1.5

2.1.4

22 Nov 15:19
Compare
Choose a tag to compare

compare changes

🩹 Hotfix Release: SRI for PrimeVue

This release introduces specific support for Subresource Integrity with PrimeVue

❤️ Contributors

What's Changed

  • chore(release): 2.1.3 by @vejja in #566
  • fix: #564 resolves issue with element.replace on non-string elements by @lawren in #567

Full Changelog: v2.1.3...v2.1.4

2.1.3

22 Nov 14:50
Compare
Choose a tag to compare

🩹 Hotfix Release: Nonce for PrimeVue

This release introduces specific support for Nonce with PrimeVue

❤️ Contributors

What's Changed

  • chore(release): 2.1.2 by @vejja in #563
  • fix: #564 resolves issue with element.replace on non-string elements by @lawren in #565

New Contributors

Full Changelog: v2.1.2...v2.1.3

2.1.2

19 Nov 14:30
Compare
Choose a tag to compare

🚨Hotfix release: re-enable console.logs in dev mode

This release prevents the removal of console.log statements by Nuxt-Security in development mode.

Nuxt Security helps you ship safer applications by removing console.log statements when the removeLoggers option is set to true, which is the default value.
However, removing console.log statements by default also in development mode is causing our users to search why their logs are disappearing.

With this release, removeLoggers only removes console.log statements in production builds.

What's Changed

  • fix(core): do not remove loggers in dev mode by @vejja in #561

Full Changelog: v2.1.1...v2.1.2

2.1.1

14 Nov 15:48
Compare
Choose a tag to compare

🛠️ Hotfix Release : Node 18 Compatibility

This hotfix release re-introduces support for Node 18.
Node 18 is the minimum requirement for all Nuxt 3 applications.

Full Changelog: v2.1.0...v2.1.1

2.1.0

14 Nov 12:01
84f13ee
Compare
Choose a tag to compare

2.1.0 🎉

This is a new minor version where we focused mainly on fixing bugs but we also introduced Continous Releases by Stackblitz!

Enjoy!

👉 Changelog
compare changes

❤️ Contributors

What's Changed

New Contributors

Full Changelog: v2.0.0...v2.1.0

2.0.0

19 Sep 11:28
6005b46
Compare
Choose a tag to compare

2.0.0 🎉

This is the new major version of the NuxtSecurity module. After nine release candidates versions, we are ready to present you this new amazing version 🚀

With it, we have updated many things that you can check out below in comparison to version 1.4.0.

Enjoy!

New features

As a part of this new release, there are several new features.

A+ Score by default

Our new version delivers an A+ security rating by default on both the Mozilla Observatory and SecurityHeaders.com
Our documentation page is deployed with Nuxt-Security and is tested on these two scanners:
329857551-f181edcd-7059-4399-9af0-26c83a9dc48e329857562-d28f9b97-de64-49d8-9969-eef2692e6dd1

Performance optimization

We are considerably improving the performance of Nuxt Security with this release, by removing all dependency from cheerio.
Applications running in lightweight environments such as workers, will benefit from significantly reduced CPU and memory usage, and increased page delivery.

Many thanks to @GalacticHypernova for leading the full rewrite of our HTML parsing engine 💚

All Nuxt modes

Security headers are now deployed in all Nuxt rendering modes:

  • Universal
  • Client-only
  • Hybrid

See #441 for details.

OWASP compliance

We are updating our default security settings to conform with the latest OWASP default values for headers.
Users benefit from these updating settings out of the box, with no changes required.

See #450 for details.

Full Static Support

We are significantly improving application security for static websites:

  • If the site is deployed with a Nitro Preset, security headers are now delivered natively. Netlify and Vercel static presets have been fully tested.
  • If the site is deployed in a custom environment (e.g. bare-metal server), we provide a new prerenderedHeaders build-time hook that exposes all security headers for complete control of your server's headers.

🗞️ Next steps

We are planning a new release soon with the Nuxt DevTools Tab support 🚀

👉 Changelog
compare changes

❤️ Contributors

What's Changed

New Contributors

2.0.0-rc.7

24 Jun 11:10
Compare
Choose a tag to compare
2.0.0-rc.7 Pre-release
Pre-release

Support for #478

This new version updates the regular expressions in the 30-cspSsgHashes.ts file. The previous regular expression was not correctly capturing the content of inline script and style tags in all scenarios.

The old regular expression for inline scripts:

const INLINE_SCRIPT_RE = /<script(?![^>]?\bsrc="[\w:.-\/]+")[^>]>(.*?)</script>/gi
The updated regular expression:

const INLINE_SCRIPT_RE = /<script(?![^>]?\bsrc="[\w:.-\/]+")[^>]>([\s\S]?)</script>/gi;
The change from (.
?) to ([\s\S]*?) ensures that the regular expression matches any character, including newlines, between the <script> and </script> tags. This change improves the accuracy of inline script content capture, ensuring that our CSP security hashes are correctly generated for all inline scripts.

What's Changed

  • add per route csrf to docs by @moshetanzer in #471
  • fix(csp): inline script/style have whitespace character by @hlhc in #478

New Contributors

Full Changelog: v2.0.0-rc.6...v2.0.0-rc.7

v2.0.0-rc.6

31 May 15:34
Compare
Choose a tag to compare
v2.0.0-rc.6 Pre-release
Pre-release

🩹 Fixes

Remove Experimental Permission-Policy values from default OWASP values.
This clears error warnings in Chrome

Full Changelog: v2.0.0-rc.5...v2.0.0-rc.6

v2.0.0-rc.5

31 May 13:29
Compare
Choose a tag to compare
v2.0.0-rc.5 Pre-release
Pre-release

Improved Security Score 🥇

We apply the Mozilla recommendations for CSP defaults

  • deny by default with default-src 'none'
  • allow on a directive-by-directive basis

Our Mozilla Score is now 120/100
Screenshot 2024-05-31 at 13 37 40

Full Changelog: v2.0.0-rc.4...v2.0.0-rc.5