Find out how to use a request policy to add CORS support to API deployments with API Gateway.
Web browsers typically implement a "same-origin policy" to prevent code from making requests against a different origin to the one from which the code was served. The intention of the same-origin policy is to provide protection from malicious web sites. However, the same-origin policy can also prevent legitimate interactions between a server and clients of a known and trusted origin.
Cross-Origin Resource Sharing (CORS) is a cross-origin sharing standard to relax the same-origin policy by allowing code on a web page to consume a REST API served from a different origin. The CORS standard uses additional HTTP request headers and response headers to specify the origins that can be accessed.
The CORS standard also requires that for certain HTTP request methods, the request must be "pre-flighted". Before sending the actual request, the web browser sends a pre-flight request to the server to determine whether the methods in the actual request are supported. The server responds with the methods it will allow in an actual request. The web browser only sends the actual request if the response from the server indicates that the methods in the actual request are allowed. The CORS standard also enables servers to notify clients whether requests can include credentials (cookies, authorization headers, or TLS client certificates).
For more information about CORS, see resources available online including those from W3C and Mozilla.
Using the API Gateway service, you can enable CORS
support in the APIs you deploy to API gateways. When you enable CORS support in an API
deployment, HTTP pre-flight requests and actual requests to the API deployment return
one or more CORS response headers to the API client. You set the CORS response header
values in the API deployment specification.
In the API Request Policies section of the Basic Information page, select the Add button beside CORS and specify:
Allowed Origins: An origin that is allowed to access the API deployment. For example, https://oracle.com. Select + Another Origin to enter second and subsequent origins.
Allowed Methods: One or more methods that are allowed in the actual request to the API deployment. For example, GET, PUT.
Allowed Headers: Optionally, an HTTP header that is allowed in the actual request to the API deployment. For example, opc-request-id or If-Match. Select + Another Header to enter second and subsequent headers.
Exposed Headers: Optionally, an HTTP header that API clients can access in the API deployment's response to an actual request. For example, ETag or opc-request-id. Select + Another Header to enter second and subsequent headers.
Max age in seconds: Optionally, an integer value indicating how long (in delta-seconds) the results of a preflight request can be cached by a browser. If you don't specify a value, the default is 0.
Enable Allow Credentials: Whether the actual request to the API deployment can be made using credentials (cookies, authorization headers, or TLS client certificates). By default, this option is not selected.
Select Next to enter details for individual routes in the API deployment on the Routes page. To specify CORS request policies that apply to an individual route, select Show Route Request Policies, select the Add button beside CORS, and specify:
Allowed Origins: An origin that is allowed to access the route. For example, https://oracle.com. Select + Another Origin to enter second and subsequent origins.
Allowed Methods: One or more methods that are allowed in the actual request to the route. For example, GET, PUT.
Allowed Headers: Optionally, an HTTP header that is allowed in the actual request to the route. For example, opc-request-id or If-Match. Select + Another Header to enter second and subsequent headers.
Exposed Headers: Optionally, an HTTP header that API clients can access in the API deployment's response to an actual request. For example, ETag or opc-request-id. Select + Another Header to enter second and subsequent headers.
Max age in seconds: Optionally, an integer value indicating how long (in delta-seconds) the results of a preflight request can be cached by a browser. If you don't specify a value, the default is 0.
Enable Allow Credentials: Whether the actual request to the route can be made using credentials (cookies, authorization headers, or TLS client certificates). By default, this option is not selected.
Editing a JSON File to Add CORS Request Policies 🔗
To add a CORS request policy to an API deployment specification in a JSON file:
Using your preferred JSON editor, edit the existing API deployment specification to which you want to add CORS support, or create a new API deployment specification (see Creating an API Deployment Specification).
For example, the following basic API deployment specification defines a simple Hello World serverless function in OCI Functions as a single back end:
"allowedOrigins": [<list-of-origins>] is a required comma-separated list of origins that are allowed to access the API deployment. For example, "allowedOrigins": ["*", "https://oracle.com"]
"allowedMethods": [<list-of-methods>] is an optional comma-separated list of HTTP methods that are allowed in the actual request to the API deployment. For example, "allowedMethods": ["*", "GET"]
"allowedHeaders": [<list-of-implicit-headers>] is an optional comma-separated list of HTTP headers that are allowed in the actual request to the API deployment. For example, "allowedHeaders": ["opc-request-id", "If-Match"]
"exposedHeaders":
[<list-of-exposed-headers>] is an optional comma-separated list of
HTTP headers that API clients can access in the API deployment's response to an
actual request. For example, "exposedHeaders": ["ETag",
"opc-request-id"]
"isAllowCredentialsEnabled": <true|false> is either true or false, indicating whether the actual request to the API deployment can be made using credentials (cookies, authorization headers, or TLS client certificates). If not specified, the default is false.
"maxAgeInSeconds": <seconds> is an integer value, indicating how long (in delta-seconds) the results of a preflight request can be cached by a browser. If not specified, the default is 0.
"allowedOrigins": [<list-of-origins>] is a required comma-separated list of origins that are allowed to access the API deployment. For example, "allowedOrigins": ["*", "https://oracle.com"]
"allowedMethods": [<list-of-methods>] is an optional comma-separated list of HTTP methods that are allowed in the actual request to the API deployment. For example, "allowedMethods": ["*", "GET"]
"allowedHeaders": [<list-of-implicit-headers>] is an optional comma-separated list of HTTP headers that are allowed in the actual request to the API deployment. For example, "allowedHeaders": ["opc-request-id", "If-Match"]
"exposedHeaders":
[<list-of-exposed-headers>] is an optional comma-separated list of
HTTP headers that API clients can access in the API deployment's response to an
actual request. For example, "exposedHeaders": ["ETag",
"opc-request-id"]
"isAllowCredentialsEnabled": <true|false> is either true or false, indicating whether the actual request to the API deployment can be made using credentials (cookies, authorization headers, or TLS client certificates). If not specified, the default is false.
"maxAgeInSeconds": <seconds> is an integer value, indicating how long (in delta-seconds) the results of a preflight request can be cached by a browser. If not specified, the default is 0.
Used to return a comma-separated list of origins that are allowed to access the API deployment.
Only one origin is allowed by the CORS specification, so in the case of multiple origins the client origin needs to be dynamically checked against the list of allowed values. Values "*" and "null" are allowed.
Used to return a comma-separated list of HTTP headers that clients can access in the API deployment's response to an actual request. This list of HTTP headers is in addition to the CORS-safelisted response headers.
Used to return true or false, indicating whether the actual request to the API deployment can be made using credentials (cookies, authorization headers, or TLS client certificates).
To allow requests to be made with credentials, set isAllowCredentialsEnabled to true.