- From: Kingsley Idehen <kidehen@openlinksw.com>
- Date: Sat, 01 Sep 2012 13:24:40 -0400
- To: "public-rww@w3.org" <public-rww@w3.org>
- Message-ID: <504244D8.9090800@openlinksw.com>
All, Making RWW web apps just got a whole lot easier. Excerpts from the announcement: We're delighted to announce support for Cross-Origin Resource Sharing (CORS) in Amazon S3. You can now easily build web applications that use JavaScript and HTML5 to interact with resources in Amazon S3, enabling you to implement HTML5 drag and drop uploads to Amazon S3, show upload progress, or update content. Until now, you needed to run a custom proxy server between your web application and Amazon S3 to support these capabilities. A custom proxy server was required because web browsers limit the way web pages loaded from one site (e.g., mywebsite.com) can interact with content from another location (e.g., a location in Amazon S3 like assets.mywebsite.com.s3.amazonaws.com). Amazon S3's support for CORS replaces the need for this custom proxy server by instructing the web browser to selectively enable these cross-site interactions. Configuring your bucket for CORS is easy. To get started, open the Amazon S3 Management Console <http://www.amazon.com/gp/r.html?R=1EF7ZG1MAXA8C&C=1A1N8J6FJUD3V&H=HXVDX7RXYSAURXXZAUUTXSKVOGIA&T=C&U=https%3A%2F%2Fconsole.aws.amazon.com%2Fs3%2Fhome%3Fref_%3Dpe_12300_25634700>, and follow these simple steps: 1) Right click on your Amazon S3 bucket and open the "Properties" pane. 2) Under the "Permissions" tab, click the "Add CORS configuration" button to add a new CORS configuration. You can then specify the websites (e.g., "mywebsite.com") that should have access to your bucket, and the specific HTTP request methods (e.g., "GET") you wish to allow. 3) Click Save. -- Regards, Kingsley Idehen Founder & CEO OpenLink Software Company Web: http://www.openlinksw.com Personal Weblog: http://www.openlinksw.com/blog/~kidehen Twitter/Identi.ca handle: @kidehen Google+ Profile: https://plus.google.com/112399767740508618350/about LinkedIn Profile: http://www.linkedin.com/in/kidehen
Attachments
- application/pkcs7-signature attachment: S/MIME Cryptographic Signature
Received on Saturday, 1 September 2012 17:25:08 UTC