You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@smuu was recently hacking on celestia-node and wasn't able to use any of our APIs in the browser because of CORS issues. We should add CORS headers on both gateway and RPC and allow all the origins
The text was updated successfully, but these errors were encountered:
If the RPC is setting * that is actually a security vulnerability. The correct way to do this is to add a list of allowed origins to the config. Developers can add * there if they want
Ideally, the port the RPC server listens on should not be exposed to WAN. It can be shared in LAN or within datacenter clusters. Even if there is a rare usecase for remote usage, it's better to filter on the IP firewall level rather than polluting the config with HTTP headers for the gateway.
@smuu was recently hacking on celestia-node and wasn't able to use any of our APIs in the browser because of CORS issues. We should add CORS headers on both gateway and RPC and allow all the origins
The text was updated successfully, but these errors were encountered: