-
-
Notifications
You must be signed in to change notification settings - Fork 415
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[💡FEATURE REQUEST]: Enhance CORS support #909
Comments
Hey @hustlahusky , thanks for the FR. I need more details about the described problems:
What do you mean by
It should be reflected automatically if the Origin is in the allowed origins list.
Could you please share the |
I mean that
I mean RoadRunner can allow any origin reflected from request header when using asterisk in config.
http:
headers:
cors:
allowed_origin: '*'
allowed_headers: '*'
allowed_methods: '*'
allow_credentials: true |
Multiply
This is not an expected behavior (and non-standard), origins should be set explicitly. Not planned to implement. |
Current CORS headers settings doesn't covers my use cases.
First of all I want a support of multiple allowed origins (or even any origin) with credentials enabled. Currently
http.headers.cors.allowed_origin = *
andhttp.headers.cors.allow_credentials = true
is not working together.Would be nice if
allowed_origin
can be configured as single origin or array of origins, and option to reflectOrigin
from request header (maybe combination ofallowed_origin = *
andallow_credentials = true
or some reservedallowed_origin
value). CORS middleware example in Go, that can acts like described: https://github.com/rs/corsSecond little problem is deprecation message from browser like that, when
allowed_headers = *
:I found out that it can be reflected from
Access-Control-Request-Headers
request header if it specified by client.The text was updated successfully, but these errors were encountered: