Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

improve CORS security #262

Merged
merged 1 commit into from
Sep 1, 2023
Merged

improve CORS security #262

merged 1 commit into from
Sep 1, 2023

Conversation

dirkhh
Copy link
Contributor

@dirkhh dirkhh commented Aug 28, 2023

Instead of creating a wildcard access control allow origin, limit it to the route api server.

Change requested by Ramon (@kx1t)

@dirkhh
Copy link
Contributor Author

dirkhh commented Aug 28, 2023

I would suggest not merging this until @kx1t agrees that this is what he's looking for.
I did test it (will wonders never cease) and it seems to work, but I'd be lying if I claimed that I fully understand how all this is supposed to work... I mean... I start a request TO adsb.lol and tell them that I'm ok with adsb.lol? I mean... what?

This has nothing to do with CORS. There is no need for this header.

This should address a change requested by Ramon (@kx1t)

Signed-off-by: Dirk Hohndel <[email protected]>
@dirkhh
Copy link
Contributor Author

dirkhh commented Aug 28, 2023

The branch name is now completely bogus, but this should still address the concern that @kx1t voiced to me.
The wildcard header is now simply gone.

@iakat
Copy link
Contributor

iakat commented Sep 1, 2023

(also this has no impact to security as the client is not the authority on CORS, the server is, so the request header did/does/will always do nothing)

@wiedehopf wiedehopf merged commit 5427b49 into wiedehopf:master Sep 1, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants