Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
68publishers-cookie-consent
Advanced tools
Cookie consent wrapper based on orestbida/cookieconsent with GTM integration.
An extended integration of orestbida/cookieconsent with support of the Google Tag Manager.
Open Google Tag Manager web administration and select a container for your website.
Next, go through the Templates
link in the left navigation and click on the button New
inside a section Tag Templates
.
All you need is a file gtm_template.tpl
from the root directory of this package. Download the file and import it in the Template editor:
After successful import click on the button Save
, leave the Template editor, and go through the Tags
link in the left navigation.
Then create the new tag with the imported Template, as trigger set an option Consent Initialization - All Pages
and save it.
Now you can open a preview of the website and as you can see the cookie widget is here! But let's configure it a bit.
:exclamation: Locking the package version is highly recommended (see the field
Package version
below) after you successfully configure the template. Avoid using thelatest
version in production containers!
The plugin is configurable using fields inside the tag definition.
Field | Description |
---|---|
Package version | Version of the package 68publishers/cookie-consent . Valid inputs are the latest or a version in formats x.x.x , x.x.x-beta.x and x.x.x-alpha-x . For available versions see the releases. |
Make consent required | The page will be blocked until a user action. |
Show the widget as soon as possible | The widget will be displayed automatically on the page load. You must trigger the widget manually by calling CookieConsentWrapper.unwrap().show() if the option is disabled. |
Hide from bots | Enable if you don't want the plugin to run when a bot/crawler/webdriver is detected. |
Revision | Revision number of your terms of use of cookies. For more information see below. |
Delay | Number of milliseconds before showing the consent modal. |
Both sections contain these fields: Layout
, Position
, Transition
. These settings affect where modals appear and what shape they take.
The behavior of the consent modal buttons can be configured through fields Primary button role
, Secondary button role
(accept necessary cookies or open the settings modal), and Buttons order
.
See the widget documentation for more details.
The consent modal has also an option Show third button
that adds the third button to the modal. If the secondary button's role is Open settings
the third button's role is Accept necessary
and vice versa.
The settings modal has one special option with the name Settings modal trigger selector
. A value of the option can be CSS selector for automatic creation of the trigger button that opens the modal. Check the example.
Field | Description |
---|---|
Cookie name | The name of a cookie value that holds information about the user's consent. |
Cookie domain | The domain name for the cookie that holds information about the user's consent, for example ".example.com". If the value is empty, it is automatically set in a browser using the "window.location.hostname" variable. |
Cookie expiration | Expiration of the cookie in days. |
Enable cookies auto-clear | All cookies will be deleted based on the user's consent and a selected strategy if the option is enabled. |
Cookies auto-clear strategy | Strategy for cookies auto-clear feature. |
Cookie names | Names of the cookies that will be deleted or kept (based on a selected strategy). |
The following strategies are implemented:
Clear all except defined
* - All cookies except those you define in the field Cookie names
will be deleted when the user denies any storage.Clear defined only
* - All cookies you defined in the field Cookie names
will be deleted when the user denies any storage.Use cookie tables
- Cookie clearing is based on cookie tables from the original plugin. Integration of CMP application is required for this option.* There is no need to define a name from the Cookie name
field because this cookie is never automatically deleted.
The following types of storage are available:
Each storage defines the name of a trigger that will be invoked if the user provides consent. It is not necessary to use or display each storage in the widget. Also, the consent for the storage can be synchronized with the consent of another storage.
Field | Description |
---|---|
Visibility and default state | Defines whether the storage should be visible in the widget and what its default value is. |
- Visible, Enabled by default | Storage is visible in the widget and is enabled by default. |
- Visible & Readonly, Enabled by default | Storage is visible in the widget, it is always enabled and cannot be disabled (usually used for Functionality storage ). |
- Visible, Disabled by default | Storage is visible in the widget and is disabled by default. |
- Hidden, Synchronized | Storage is not visible in the widget and the consent is synchronized with another storage. |
- Hidden, Disabled always | Storage is not visible in the widget and is always disabled. Use for storages that are not used by the application at all. |
Synchronize consent with | The consent can be synchronized with another storage. The option is available only if the option Visibility and default state is set to Hidden, Synchronized . |
If the storage is denied show the modal again after x days | The settings modal will be opened again after the specified number of days if the storage is denied. The option is available only if the option Display in the widget is set to Visible, Enabled by default or Visible, Disabled by default . |
Event trigger name | The name of an event trigger that will be invoked on granted consent with storage. The name may not be unique for each storage (unique triggers are invoked only). No trigger is invoked if the option has an empty value. |
As mentioned above, each storage can define a trigger that is invoked when consent with the storage has been granted.
In some situations, you may want some trigger to be fired only if the user gives consent with multiple storage types.
For example, if you have a trigger called fb_pixel_trigger
and you want to fire it only if the user gives consent with the analytics_storage
and the ad_stroage
.
Then your configuration may look like this:
The package comes with the default translations for the following languages:
Translations that will be loaded and accessible for the widget are taken from the field Locales
. Each locale must be defined on a new line.
Alternatively, from version 1.0.0
, the URL from which the translations are to be downloaded can also be entered.
In the example above, the default translations for the English language are downloaded and the translations for the German language are downloaded from the URL https://www.example.com/public/cc-translations/de.json
.
A translation file must always be in JSON format and its name must match a locale.
If you want to rewrite default translations, or you want to add translations for a new locale then you can define them in a table Translations
.
Locale detection can be affected with the following fields:
Field | Description |
---|---|
Locale detection strategy | Browser to get user's browser language or Document to read a value from <html lang="..."> of the current page. |
Locale | You must define the website locale when the detection strategy is disabled. The locale must be one of the previously defined locales in the field Locales . |
The default revision number is 0
and the number can be changed through the field Revision
. When you change the value the consent modal will be displayed for all users again.
You can define a message that will be displayed in the consent modal's description. If you want to do that define custom translation with the key consent_modal_revision_message
and rewrite a translation with the key consent_modal_description
. The plugin will replace the placeholder [[revision_message]]
in the consent modal description with your revision message.
Note: the cookieconsent plugin uses the placeholder {{revision_message}}
but this notation is used by GTM for variables so the package comes with the placeholder [[revision_message]]
instead.
Field | Description |
---|---|
Include default stylesheets | The default stylesheet for the widget will be loaded into the page if the option is checked. We recommend keeping the option checked and adding custom stylesheets through the next options. |
External stylesheets | The list of custom CSS stylesheets. One URL per line. |
Internal stylesheet | Custom CSS rules that will be injected into the page after default stylesheets and other external stylesheets. |
Field | Description |
---|---|
Manage page scripts | Enable if you want to easily manage existing <script> tags. |
Script selector | The name of a data attribute that is used for managed |
Managing page scripts is disabled by default. When the feature is enabled then the following notation can be used for scripts you want to manage:
<script type="text/plain" data-cookiecategory="analytics_storage" src="analytics.js" defer></script>
<script type="text/plain" data-cookiecategory="ad_storage" defer>
console.log('Ad storage enabled!');
</script>
When the user dismisses the consent modal then the modal is not displayed until the consent cookie expires. But you want to give the ability to change preferences later.
This can be done automatically with the configuration field Settings modal trigger selector
. For example, if you have this HTML code on your website:
<footer>
<div class="footer-container">
<div class="footer-item">
<a href="/terms-of-use">
<span class="footer-item-text">Terms of use</span>
</a>
</div>
<div class="footer-item">
<a href="/faq">FAQ</a>
</div>
<div class="footer-item">
<a href="/contact">
<span class="footer-item-text">Contact</span>
</a>
</div>
</div>
</footer>
And the field Settings modal trigger selector
is configured like this:
Then the plugin injects a new item into the footer automatically:
<footer>
<div class="footer-container">
<div class="footer-item">
<a href="/terms-of-use">
<span class="footer-item-text">Terms of use</span>
</a>
</div>
<div class="footer-item">
<a href="/faq">FAQ</a>
</div>
<div class="footer-item">
<a href="/contact">
<span class="footer-item-text">Contact</span>
</a>
</div>
<div class="footer-item">
<a href="#cookie-settings" data-cc="c-settings">
<span class="footer-item-text">Cookie settings</span>
</a>
</div>
</div>
</footer>
However, it is not always possible to achieve the right result with this automation (depending on the website layout). In this case, leave the Settings modal trigger selector
field blank and define the link in your layout manually.
Opening of the settings modal will be triggered automatically to the link.
Tags are triggered after the consent with event triggers that are defined for each storage. For example, if you have the analytics_storage
configured like this:
Then create a custom trigger with the following options:
And a tag that is fired with the trigger:
The wrapper is accessible in the window
under the name CookieConsentWrapper
. The recommended way how to manipulate with it is through event callbacks because the wrapper may not be fully initialized at the time your script is executed.
Callbacks are attached with calling of the method CookieConsentWrapper.on()
, however since the version 1.0.0
the preferred method is to use the window.cookieConsentWrapperEvents
variable.
The use of the variable avoids the situation when the wrapper does not exist in the window yet.
A callback is invoked when the wrapper is fully initialized or directly if everything has been already initialized.
<script>
window.cookieConsentWrapperEvents = window.cookieConsentWrapperEvents || [];
window.cookieConsentWrapperEvents.push(['init', function () {
if (CookieConsentWrapper.allowedCategory('analytics_storage')) {
// check if the analytics_storage is granted
}
CookieConsentWrapper.unwrap(); // get the original cookie consent plugin
}]);
</script>
<script>
window.cookieConsentWrapperEvents = window.cookieConsentWrapperEvents || [];
window.cookieConsentWrapperEvents.push(['consent:first-action', function (consent) {
// called on the first user's action
}]);
window.cookieConsentWrapperEvents.push(['consent:accepted', function (consent) {
// called on every page load after the first user's action
}]);
window.cookieConsentWrapperEvents.push(['consent:changed', function (consent, changedCategories) {
// called when preferences changed
}]);
</script>
<script>
window.cookieConsentWrapperEvents = window.cookieConsentWrapperEvents || [];
window.cookieConsentWrapperEvents.push(['locale:change', function (locale) {
// called when the plugin locale is changed through method `CookieConsentWrapper.changeLocale()`
console.log(locale + '!');
}]);
// ...
CookieConsentWrapper.changeLocale('cs', true) // cs!
CookieConsentWrapper.changeLocale('en', true) // en!
</script>
The widget can be integrated with the CMP application.
The first thing to do is to set up the user information under the Integration
section. Each user must have an identity (ID).
The default option is Generated UUID
, however you can set a custom GTM variable that will return the ID of the current user of your website.
The ID will be accessible in all your translations with placeholder [[user_identity]]
.
You can also set other attributes that will be sent to the CMP application along with the consents.
Configuration of the CMP application is easy, just set the URL of your application and the project code (if you leave it blank, the site domain is used as the code).
The configuration includes two options
If you check the Consent API enabled
option, the widget will automatically send consents to the CMP application.
If you check the Cookies API enabled
option then the widget will automatically pull all cookies from the CMP application for the project and creates cookie tables from them.
Below this field you can define which columns the cookie table should contain.
CookieConsentWrapper
object is created from values defined inside the taggtag
functionCookieConsentWrapper
object is fully initialized
CookieConsentWrapper.on('init')
are firedCookieConsentWrapper.on('consent:first-action')
are firedCookieConsentWrapper.on('consent:accepted')
are firedCookieConsentWrapper.on('consent:changed')
are firedIf you want to update to the newer version please firstly look into releases to see what has changed until the release that you using.
For update, you must reimport the Template in your GTM in the same way how you imported it for the first time. The template will be updated but existing configurations inside tags will be kept. Of course, if the Template wasn't changed between releases then you can skip this step.
Then open the associated tag and update the value of the field Package version
.
For more detailed information on migrating from 0.4.x
to 0.5.x
, please continue to the page Migration from v0.4 to v0.5.
Firstly download the package and install dependencies:
$ git clone https://github.com/68publishers/cookie-consent.git
$ cd cookie-consent
$ npm install
Use predefined commands for the package build:
$ npm run build:dev # or prod
Paths of output files are:
~/demo/cookie-consent.js
(dev mode)~/dist/cookie-consent.min.js
(production mode)A simple demo page without real GTM is located in ~/demo/index.html
. To show the demo in your browser run:
$ npm run start:dev
Then visit the page http://localhost:3000
.
The package is distributed under the MIT License. See LICENSE for more information.
FAQs
Cookie consent wrapper based on orestbida/cookieconsent with GTM integration.
We found that 68publishers-cookie-consent demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.