Resource isolation policy for Django using Fetch Metadata request headers.
Project description
django-fetch-metadata
Resource isolation policy for Django using Fetch Metadata request headers.
Browsers send Sec-Fetch-Site and Sec-Fetch-Mode headers on every request,
indicating where the request came from and how it was initiated. This middleware
uses those headers to block cross-site attacks while allowing legitimate
same-origin requests and direct navigations.
This is a defense-in-depth layer that works alongside Django's CSRF middleware, not a replacement for it. Non-browser clients that don't send Fetch Metadata headers (curl, API consumers, webhooks) pass through by default.
Installation
pip install django-fetch-metadata
Add the middleware to your MIDDLEWARE setting, before CsrfViewMiddleware:
MIDDLEWARE = [
'django.middleware.common.CommonMiddleware',
'fetch_metadata.middleware.FetchMetadataMiddleware',
'django.middleware.csrf.CsrfViewMiddleware',
# ...
]
The DEFAULT preset is opinionated: it blocks all cross-site requests except
link clicks (navigations). This includes cross-site fetch() GETs, <script>
includes, <img> loads, and iframe embeds. For CSRF-like protection that only
blocks cross-site state-changing requests, use the LAX preset:
FETCH_METADATA_PRESET = 'LAX'
To enable system checks, add 'fetch_metadata' to INSTALLED_APPS.
Presets
Four named presets cover common configurations:
| Preset | Blocks cross-site GETs | Blocks navigations | Fail Open | Use Case |
|---|---|---|---|---|
| DEFAULT | Yes | Link clicks allowed | Yes | Full resource isolation |
| LAX | No | No | Yes | CSRF-like protection |
| API | Yes | Yes | Yes | API endpoints |
| STRICT | Yes | Yes | No | Admin panels, internal tools |
FETCH_METADATA_PRESET = 'API'
Any settings you specify explicitly will override the preset values.
See Presets for detailed scenarios.
Configuration
All settings are optional. The DEFAULT preset works without any configuration.
| Setting | Default | Description |
|---|---|---|
FETCH_METADATA_PRESET |
'DEFAULT' |
Named preset: DEFAULT, LAX, API, or STRICT |
FETCH_METADATA_ALLOWED_SITES |
preset | List of allowed Sec-Fetch-Site values |
FETCH_METADATA_ALLOW_NAVIGATIONS |
preset | Allow cross-site navigate + GET/HEAD |
FETCH_METADATA_ALLOW_SAFE_METHODS |
preset | Allow all cross-site GET/HEAD requests |
FETCH_METADATA_FAIL_OPEN |
preset | Pass requests with no Sec-Fetch-Site header |
FETCH_METADATA_REPORT_ONLY |
False |
Log violations without blocking |
FETCH_METADATA_EXEMPT_PATHS |
[] |
Path prefixes to skip (e.g. ['/.well-known/']) |
FETCH_METADATA_FAILURE_VIEW |
None |
Dotted path to a custom 403 view |
See Configuration for details.
Per-View Decorators
Exempt a view from all checks:
from fetch_metadata.decorators import fetch_metadata_exempt
@fetch_metadata_exempt
class WebhookView(View):
...
Override the policy for a specific view:
from fetch_metadata.decorators import fetch_metadata_policy
@fetch_metadata_policy(allowed_sites=['same-origin', 'same-site', 'none'])
class SubdomainAPIView(View):
...
Both decorators work on function-based views too:
@fetch_metadata_exempt
def webhook_receiver(request):
...
Test Utilities
FetchMetadataTestMixin provides assertion helpers for testing views against
the policy:
from django.test import TestCase
from fetch_metadata.test import FetchMetadataTestMixin
class MyViewTests(FetchMetadataTestMixin, TestCase):
def test_cross_site_blocked(self):
self.assert_blocks('/api/data/')
def test_same_origin_allowed(self):
self.assert_allows('/api/data/')
assert_blocks sends a cross-site POST by default. assert_allows sends a
same-origin POST. Both accept method, site, and mode keyword arguments.
How It Works
The middleware runs on every request via Django's process_view hook:
- OPTIONS requests always pass (CORS preflight carries no credentials)
- Exempt views and paths skip all checks
- The active policy is resolved (per-view decorator, or global preset + overrides)
- Missing
Sec-Fetch-Siteheader: pass ifFAIL_OPEN, block if not - Header value in
allowed_sites: pass - GET/HEAD with
ALLOW_SAFE_METHODS: pass - Cross-site navigation via GET/HEAD with
ALLOW_NAVIGATIONS: pass - Everything else: log at WARNING and block (or pass in report-only mode)
Under DEFAULT, all cross-site requests are checked, including GETs. A cross-site
fetch() GET is blocked. A cross-site link click (Sec-Fetch-Mode: navigate +
GET) is allowed when ALLOW_NAVIGATIONS is enabled. Under LAX,
ALLOW_SAFE_METHODS passes all cross-site GET/HEAD requests regardless of mode.
Cross-site form POSTs (Sec-Fetch-Mode: navigate + POST) are blocked under all
presets. The navigation exemption only applies to safe methods.
Common Patterns
Subdomain setup (allow requests from other subdomains):
FETCH_METADATA_ALLOWED_SITES = ['same-origin', 'same-site', 'none']
Webhook endpoint exemption:
FETCH_METADATA_EXEMPT_PATHS = ['/webhooks/']
Report-only rollout (log violations without blocking, then review logs):
FETCH_METADATA_REPORT_ONLY = True
Violations are logged to the fetch_metadata logger at WARNING level.
Further Reading
- Configuration - all settings, path exemptions, custom failure views
- Presets - preset details with request flow traces
- W3C Fetch Metadata spec - the underlying browser mechanism
- web.dev: Protect your resources - Google's implementation guide
License
MIT. See LICENSE.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file django_fetch_metadata-0.2.0.tar.gz.
File metadata
- Download URL: django_fetch_metadata-0.2.0.tar.gz
- Upload date:
- Size: 42.2 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: uv/0.10.9 {"installer":{"name":"uv","version":"0.10.9","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":null,"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
dd94fa427b3cbc24c5c75143c97289a64ee5966e0558a3f34b5e0811c229b5fd
|
|
| MD5 |
9d768f669a41dc4c4314e9e8307e19c5
|
|
| BLAKE2b-256 |
7a0b75b8c5cd6b4c10997b5fccb3c724c33bd6c6d1d05af768cc75e5fc6b57ba
|
File details
Details for the file django_fetch_metadata-0.2.0-py3-none-any.whl.
File metadata
- Download URL: django_fetch_metadata-0.2.0-py3-none-any.whl
- Upload date:
- Size: 14.6 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: uv/0.10.9 {"installer":{"name":"uv","version":"0.10.9","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":null,"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
4d603e8e36691c27b0d6f64877ba6e0964a3ec729c8bd3e5ce8e543bde62b950
|
|
| MD5 |
b64aad9229106932f9d4718e7a0886fb
|
|
| BLAKE2b-256 |
3089da7a0016d45bfd8291ad6c6bbe996d46a31f46382a671f6362d9f506beee
|