Configure CORS
Cross-Origin Resource Sharing (CORS) ↗ is a standardized method that prevents domain X from accessing the resources of domain Y. It does so by using special headers in HTTP responses from domain Y, that allow your browser to verify that domain Y permits domain X to access these resources.
While CORS can help protect your data from malicious websites, CORS is also used to interact with objects in your bucket and configure policies on your bucket.
CORS is used when you interact with a bucket from a web browser, and you have two options:
Set a bucket to public: This option makes your bucket accessible on the Internet as read-only, which means anyone can request and load objects from your bucket in their browser or anywhere else. This option is ideal if your bucket contains images used in a public blog.
Presigned URLs: Allows anyone with access to the unique URL to perform specific actions on your bucket.
Before you configure CORS, you must have:
- An R2 bucket with at least one object. If you need to create a bucket, refer to Create a public bucket.
- A domain you can use to access the object. This can also be a
localhost. - (Optional) Access keys. An access key is only required when creating a presigned URL.
To use CORS with a public bucket, ensure your bucket is set to allow public access.
Next, add a CORS policy to your bucket to allow the file to be shared.
Presigned URLs allow temporary access to perform specific actions on your bucket without exposing your credentials. While presigned URLs handle authentication, you still need to configure CORS when making requests from a browser.
When a browser makes a request to a presigned URL on a different origin, the browser enforces CORS. Without a CORS policy, browser-based uploads and downloads using presigned URLs will fail, even though the presigned URL itself is valid.
To enable browser-based access with presigned URLs:
-
Add a CORS policy to your bucket that allows requests from your application's origin.
-
Set
AllowedMethodsto match the operations your presigned URLs perform, useGET,PUT,HEAD, and/orDELETE. -
Set
AllowedHeadersto include any headers the client will send when using the presigned URL, such as headers for content type, checksums, caching, or custom metadata. -
(Optional) Set
ExposeHeadersto allow your JavaScript to read response headers likeETag, which contains the object's hash and is useful for verifying uploads. -
(Optional) Set
MaxAgeSecondsto cache the preflight response and reduce the number of preflight requests the browser makes.
The following example allows browser-based uploads from https://example.com with a Content-Type header:
[ { "AllowedOrigins": ["https://example.com"], "AllowedMethods": ["PUT"], "AllowedHeaders": ["Content-Type"], "ExposeHeaders": ["ETag"], "MaxAgeSeconds": 3600 }]-
In the Cloudflare dashboard, go to the R2 object storage page.
Go to Overview -
Locate and select your bucket from the list.
-
Select Settings.
-
Under CORS Policy, select Add CORS policy.
-
From the JSON tab, manually enter or copy and paste your policy into the text box.
-
When you are done, select Save.
Your policy displays on the Settings page for your bucket.
You can configure CORS rules using the Wrangler CLI.
- Create a JSON file with your CORS configuration:
{ "rules": [ { "allowed": { "origins": ["https://example.com"], "methods": ["GET"] } } ]}- Apply the CORS policy to your bucket:
npx wrangler r2 bucket cors set <BUCKET_NAME> --file cors.json- Verify the CORS policy was applied:
npx wrangler r2 bucket cors list <BUCKET_NAME>The following fields in an R2 CORS policy map to HTTP response headers. These response headers are only returned when the incoming HTTP request is a valid CORS request.
| Field Name | Description | Example |
|---|---|---|
AllowedOrigins | Specifies the value for the Access-Control-Allow-Origin header R2 sets when requesting objects in a bucket from a browser. | If a website at www.test.com needs to access resources (e.g. fonts, scripts) on a custom domain of static.example.com, you would set https://www.test.com as an AllowedOrigin. |
AllowedMethods | Specifies the value for the Access-Control-Allow-Methods header R2 sets when requesting objects in a bucket from a browser. | GET, POST, PUT |
AllowedHeaders | Specifies the value for the Access-Control-Allow-Headers header R2 sets when requesting objects in this bucket from a browser.Cross-origin requests that include custom headers (e.g. x-user-id) should specify these headers as AllowedHeaders. | x-requested-by, User-Agent |
ExposeHeaders | Specifies the headers that can be exposed back, and accessed by, the JavaScript making the cross-origin request. If you need to access headers beyond the safelisted response headers ↗, such as Content-Encoding or cf-cache-status, you must specify it here. | Content-Encoding, cf-cache-status, Date |
MaxAgeSeconds | Specifies the amount of time (in seconds) browsers are allowed to cache CORS preflight responses. Browsers may limit this to 2 hours or less, even if the maximum value (86400) is specified. | 3600 |
This example shows a CORS policy added for a bucket that contains the Roboto-Light.ttf object, which is a font file.
The AllowedOrigins specify the web server being used, and localhost:3000 is the hostname where the web server is running. The AllowedMethods specify that only GET requests are allowed and can read objects in your bucket.
[ { "AllowedOrigins": ["http://localhost:3000"], "AllowedMethods": ["GET"] }]In general, a good strategy for making sure you have set the correct CORS rules is to look at the network request that is being blocked by your browser.
- Make sure the rule's
AllowedOriginsincludes the origin where the request is being made from. (likehttp://localhost:3000orhttps://yourdomain.com) - Make sure the rule's
AllowedMethodsincludes the blocked request's method. - Make sure the rule's
AllowedHeadersincludes the blocked request's headers.
Also note that CORS rule propagation can, in rare cases, take up to 30 seconds.
- Only a cross-origin request will include CORS response headers.
- A cross-origin request is identified by the presence of an
OriginHTTP request header, with the value of theOriginrepresenting a valid, allowed origin as defined by theAllowedOriginsfield of your CORS policy. - A request without an
OriginHTTP request header will not return any CORS response headers. Origin values must match exactly.
- A cross-origin request is identified by the presence of an
- The value(s) for
AllowedOriginsin your CORS policy must be a valid HTTP Origin header value ↗. A validOriginheader does not include a path component and must only be comprised of ascheme://host[:port](where port is optional).- Valid
AllowedOriginsvalue:https://static.example.com- includes the scheme and host. A port is optional and implied by the scheme. - Invalid
AllowedOriginsvalue:https://static.example.com/orhttps://static.example.com/fonts/Calibri.woff2- incorrectly includes the path component.
- Valid
- If you need to access specific header values via JavaScript on the origin page, such as when using a video player, ensure you set
Access-Control-Expose-Headerscorrectly and include the headers your JavaScript needs access to, such asContent-Length.
Was this helpful?
- Resources
- API
- New to Cloudflare?
- Directory
- Sponsorships
- Open Source
- Support
- Help Center
- System Status
- Compliance
- GDPR
- Company
- cloudflare.com
- Our team
- Careers
- © 2025 Cloudflare, Inc.
- Privacy Policy
- Terms of Use
- Report Security Issues
- Trademark
-