CORS middleware with full W3C spec support
Find a file
2022-06-07 13:26:54 -04:00
src Merge pull request #50 from gswalden/patch-1 2017-11-16 22:13:58 -08:00
test Merge pull request #50 from gswalden/patch-1 2017-11-16 22:13:58 -08:00
.gitignore First commit, supports 12/15 items of the spec 2014-05-08 12:16:17 +10:00
.npmignore Don't publish test code to npm (.npmignore) 2016-07-11 14:54:18 +10:00
.travis.yml Update .travis.yml 2017-07-31 17:11:16 +02:00
package.json Test updating peer dependencies 2022-06-07 13:26:54 -04:00
README.md Merge pull request #48 from ClementParis016/patch-1 2017-10-31 11:16:59 -07:00

restify-cors-middleware

CORS middleware with full W3C spec support.

NPM License

Build Status Dependencies Dev dependencies Peer dependencies Known Vulnerabilities

JavaScript Style Guide

Setup

$ npm install restify-cors-middleware --save

Usage

const corsMiddleware = require('restify-cors-middleware')

const cors = corsMiddleware({
  preflightMaxAge: 5, //Optional
  origins: ['http://api.myapp.com', 'http://web.myapp.com'],
  allowHeaders: ['API-Token'],
  exposeHeaders: ['API-Token-Expiry']
})

server.pre(cors.preflight)
server.use(cors.actual)

Allowed origins

You can specify the full list of domains and subdomains allowed in your application, using strings or regular expressions.

origins: [
  'http://myapp.com',
  'http://*.myapp.com',
  /^https?:\/\/myapp.com(:[\d]+)?$/
]

For added security, this middleware sets Access-Control-Allow-Origin to the origin that matched, not the configured wildcard. This means callers won't know about other domains that are supported.

Setting origins: ['*'] is also valid, although it comes with obvious security implications. Note that it will still return a customised response (matching Origin), so any caching layer (reverse proxy or CDN) will grow in size accordingly.

Troubleshooting

As per the spec, requests without an Origin will not receive any headers. Requests with a matching Origin will receive the appropriate response headers. Always be careful that any reverse proxies (e.g. Varnish) very their cache depending on the origin, so you don't serve CORS headers to the wrong request.

Compliance to the spec

See unit tests for examples of preflight and actual requests.