John O'Reilly
04/20/2024, 3:14 AMVram Voskanyan
04/20/2024, 6:05 AM<https://cors-anywhere.herokuapp.com/[your> blocking URL]
ex:
insted of calling
<https://third-party.com/image.jpg>
call
<https://cors-anywhere.herokuapp.com/https://third-party.com/image.jpg>
Vram Voskanyan
04/20/2024, 6:08 AMopen -n -a /Applications/Google\ <http://Chrome.app/Contents/MacOS/Google\|Chrome.app/Contents/MacOS/Google\> Chrome --args --user-data-dir="/tmp/chrome_dev_test" --disable-web-security
John O'Reilly
04/20/2024, 7:00 PMno-cors
modehfhbd
04/21/2024, 12:08 AMJohn O'Reilly
04/21/2024, 10:47 AMno-cors
mode that fetch api has....anyway, it seems like some kind of proxy is way to go herebashor
04/21/2024, 9:57 PMChris Athanas
04/22/2024, 3:06 AMno-cors
is really meant to send a message out without expecting any data coming back, like for analytics. CORS is very odd, as we only deal with this in web browsers. The best way around it is to use a public proxy that is backed by a CDN (like http://wsrv.nl), a service that serves public images (like some of the photo sites) or your own server where you can set the CORS values. The CORS must be set up on the server. There is no configuration allowed on the browser side to bypass this. This is all the purpose of CORS and it’s annoying, and I’m not sure how much it prevents what it’s intending to prevent… lol