[ 
https://issues.apache.org/jira/browse/COUCHDB-832?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12893795#action_12893795
 ] 

Chris Anderson commented on COUCHDB-832:
----------------------------------------

Could you describe the nature of this patch?

I'm vaguely familiar with the use of OPTIONS for pre-flight testing of the 
acceptance of cross-domain requests.

Does this patch open up CouchDB to all cross-domain requests? Does that mean if 
you are logged into a couch as an admin, and then you visit a malicious site, 
they can delete all your databases / trigger outbound replication / otherwise 
cause mayhem?

Or is this patch more controlled? I'd imagine if we are going to support this 
we'll need a way to configure which domains are allowed to trigger cross domain 
requests. 

Maybe I'm totally off-base... please let us know what you think about these 
issues.

> Handling HTTP OPTIONS method
> ----------------------------
>
>                 Key: COUCHDB-832
>                 URL: https://issues.apache.org/jira/browse/COUCHDB-832
>             Project: CouchDB
>          Issue Type: Bug
>          Components: HTTP Interface
>    Affects Versions: 1.0
>            Reporter: Stanisław
>
> Method OPTIONS is not allowed, which disables ability for cross-site 
> XMLHttpRequest (other than GET) within the browser (see: 
> http://www.w3.org/TR/cors)
> Current headers:
>   curl -X OPTIONS http://localhost:5984 -v
>   ...
>   < HTTP/1.1 405 Method Not Allowed
>   < Server: CouchDB/1.0.0 (Erlang OTP/R13B)
>   < Date: Thu, 22 Jul 2010 17:56:59 GMT
>   < Content-Type: text/plain;charset=utf-8
>   < Content-Length: 64
>   < Cache-Control: must-revalidate
>   < Allow: GET,HEAD
> Expected headers:
>   HTTP/1.1 200 OK
>   Access-Control-Allow-Methods: POST, GET, OPTIONS
>   Access-Control-Allow-Headers: X-PINGOTHER
> Stan.

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply via email to