Chapter 1. Cross-Origin Resource Sharing (CORS)
Enable and configure CORS in Quarkus to specify allowed origins, methods, and headers, guiding browsers in handling cross-origin requests safely.
Cross-Origin Resource Sharing (CORS) uses HTTP headers to manage browser requests for resources from external origins securely. By specifying permitted origins, methods, and headers, Quarkus servers can use the CORS filter to enable browsers to request resources across domains while maintaining controlled access. This mechanism enhances security and supports legitimate cross-origin requests. For more on origin definitions, see the Web Origin Concept.
1.1. Enabling the CORS filter Copy linkLink copied to clipboard!
To enforce CORS policies in your application, enable the Quarkus CORS filter by adding the following line to the src/main/resources/application.properties file:
quarkus.http.cors.enabled=true
quarkus.http.cors.enabled=true
The filter intercepts all incoming HTTP requests to identify cross-origin requests and applies the configured policy. The filter then adds CORS headers to the HTTP response, informing browsers about allowed origins and access parameters. For preflight requests, the filter returns an HTTP response immediately. For regular CORS requests, the filter denies access with an HTTP 403 status if the request violates the configured policy; otherwise, the filter forwards the request to the destination if the policy allows it.
For detailed configuration options, see the following Configuration Properties section.
🔒 Fixed at build time - Configuration property fixed at build time - All other configuration properties are overridable at runtime
| Configuration property | Type | Default |
|
The origins allowed for CORS.
A comma-separated list of valid URLs, such as
Environment variable: | list of string | |
|
The HTTP methods allowed for CORS requests.
A comma-separated list of valid HTTP methods, such as Default: Any HTTP request method is allowed.
Environment variable: | list of string | |
|
The HTTP headers allowed for CORS requests.
A comma-separated list of valid headers, such as Default: Any HTTP request header is allowed.
Environment variable: | list of string | |
|
The HTTP headers exposed in CORS responses.
A comma-separated list of headers to expose, such as Default: No headers are exposed.
Environment variable: | list of string | |
|
The Informs the browser how long it can cache the results of a preflight request.
Environment variable: | ||
|
The
Tells browsers if front-end JavaScript can be allowed to access credentials when the request’s credentials mode,
Default:
Environment variable: | boolean |
To write duration values, use the standard java.time.Duration format. See the Duration#parse() Java API documentation for more information.
You can also use a simplified format, starting with a number:
- If the value is only a number, it represents time in seconds.
-
If the value is a number followed by
ms, it represents time in milliseconds.
In other cases, the simplified format is translated to the java.time.Duration format for parsing:
-
If the value is a number followed by
h,m, ors, it is prefixed withPT. -
If the value is a number followed by
d, it is prefixed withP.
1.2. Example CORS configuration Copy linkLink copied to clipboard!
The following example shows a complete CORS filter configuration, including a regular expression to define one of the origins.
- 1
- Enables the CORS filter.
- 2
- Specifies allowed origins, including a regular expression.
- 3
- Lists allowed HTTP methods for cross-origin requests.
- 4
- Declares custom headers that clients can include in requests.
- 5
- Identifies response headers that clients can access.
- 6
- Sets how long preflight request results are cached.
- 7
- Allows cookies or credentials in cross-origin requests.
When using regular expressions in an application.properties file, escape special characters with four backward slashes (\\\\) to ensure proper behavior. For example:
-
\\\\.matches a literal.character. -
\\.matches any single character as a regular expression metadata character.
Incorrectly escaped patterns can lead to unintended behavior or security vulnerabilities. Always verify regular expression syntax before deployment.
1.3. Allowing all origins in dev mode Copy linkLink copied to clipboard!
Configuring origins during development can be challenging. To simplify development, consider allowing all origins in development mode only:
quarkus.http.cors.enabled=true %dev.quarkus.http.cors.origins=/.*/
quarkus.http.cors.enabled=true
%dev.quarkus.http.cors.origins=/.*/
Only allow all origins in the development profile (%dev). Allowing unrestricted origins in production environments poses severe security risks, such as unauthorized data access or resource abuse. For production, define explicit origins in the quarkus.http.cors.origins property.