-
Notifications
You must be signed in to change notification settings - Fork 190
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CORS configuration too much #8393
Comments
I agree, the only 'global' CORS config should be the allowed origin. the rest should IMO be hardcoded. At least we should drop the |
I agree generally, but on a higher level we need to really change our attitude towards config. We are getting more and more feedback, that our todays practise leads to broken deployments on every release. The reality is, nobody reads the docs. The biggest problem is exactly what we have here: Removals of config which was working before. |
The Helm Chart currently only exposes the CORS allow origins setting: |
This comment was marked as off-topic.
This comment was marked as off-topic.
Actually you need to configure CORS on your SSO for this to work. |
Thanks for the clarification, @wkloucek . Disregard the above |
Describe the bug
As of now some CORS parameters are configurable via env vars e.g.
OCIS_CORS_ALLOW_METHODS
,OCIS_CORS_ALLOW_HEADERS
(andOCIS_CORS_EXPOSE_HEADERS
- see upcoming PR by @butonic )Besides the fact that different services require different methods and headers and need to be configured on service level - changing the working default to anything different will most probably break some services partially.
Proposal
Do not configure allow methods, allow headers, expose headers and max ago but leave this to the individual services.
The text was updated successfully, but these errors were encountered: