Commit Graph

20 Commits

Author SHA1 Message Date
kybernetikos
808e1761ef Make the proxy request use the correct protocol (http/https).
I discovered that the proxy request was using http even when it
was proxying to an https port / url.  This is because we didn't pass
the https parameter through in the proxyRequest method.
2013-06-10 16:41:13 +01:00
Rob Wu
59d5bc6043 Set Host header based on actual input
Fixes #1
2013-03-30 17:40:54 +01:00
Rob W
ac0cced2f5 Updated README and description 2013-01-05 12:59:57 +01:00
Rob W
08791a11ed Updated demo: Redirect loop detection 2013-01-05 11:55:25 +01:00
Rob W
f22a2161cf Update package.json - v0.1.1 2013-01-05 11:14:46 +01:00
Rob W
407ba84a10 Avoid duplicate Access-Control-Expose-Headers 2013-01-05 11:05:32 +01:00
Rob W
792406d445 Added .gitignore 2013-01-05 00:07:29 +01:00
Rob W
eb5c57e729 Better description for non-proxied requests 2013-01-04 23:59:52 +01:00
Rob W
098f425d0a Improved demo, optimized server.js for Heroku 2013-01-04 23:31:13 +01:00
Rob W
051858b480 Location -> X-Location
xhr.getResponseHeader('Location') gives:
> Refused to get unsafe header "Location"
2013-01-04 23:16:38 +01:00
Rob W
204edda774 Clean-up of unused methods 2013-01-04 23:00:27 +01:00
Rob W
968f8439b0 Added demo; Add original status at 333 redirects 2013-01-04 22:55:16 +01:00
Rob W
544a52b0ff Fix for 3xx redirects; Disabled credentials 2013-01-04 22:46:01 +01:00
Rob W
7e198f7455 Updated package.json 2013-01-03 23:15:46 +01:00
Rob W
495a99ebde Docs update, added CORS to some responses. 2013-01-03 22:34:49 +01:00
Rob W
8a27a896d4 Detect port from environment 2013-01-03 21:26:03 +01:00
Rob W
10ce9a01e9 Added engine requirement node >= 0.6.6, npm >= 1.1 2013-01-03 21:11:19 +01:00
Rob W
2cf2300afb More documentation and options. 2013-01-03 20:56:25 +01:00
Rob W
b7ba441712 Updated README 2013-01-03 18:55:36 +01:00
Rob W
8a367bda4b CORS Anywhere - Initial commit 2013-01-03 18:46:50 +01:00