[meta] Improve secure context development experience
Categories
(DevTools :: General, enhancement, P3)
Tracking
(Not tracked)
People
(Reporter: jkt, Unassigned)
References
(Depends on 3 open bugs, Blocks 1 open bug)
Details
(Keywords: meta)
| Reporter | ||
Updated•8 years ago
|
Updated•7 years ago
|
Comment 1•7 years ago
|
||
Comment 2•7 years ago
|
||
Comment 3•7 years ago
|
||
Comment 5•7 years ago
|
||
Comment 7•7 years ago
|
||
Comment 8•7 years ago
|
||
Updated•7 years ago
|
Just my 2¢, just allow a whilelist of domains to treat equivalently to localhost. That'll allow people on my_hostname.local mdns domains, localhost, 127.0.0.1, or whatever variant of dev.example.com that they use to work.
Comment 10•5 years ago
|
||
I think there should be no discussion at all that 1) localhost is not enough; and 2) media.devices.insecure.enabled it's heavy artillery. A whitelist or a command line switch (like --unsafely-treat-insecure-origin-as-secure in Chrome) may be a perfect solution.
Comment 11•5 years ago
•
|
||
IMHO all these *.insecure.enabled prefs should be removed.
Please run a local https server like nginx (Linux, Windows, MacOS) with https://github.com/FiloSottile/mkcert to test your application properly and avoid any occurences of http:// and ws://. You could also use it as reverse proxy in front of your http://127.0.0.1:port/ app.
Comment 12•5 years ago
|
||
@Jan if that were feasible that would be nice, but dictating that everyone use nginx is pretty unrealistic. And some people are already working on projects that use the webpack dev server directly or indirectly (for example create-react-app uses it under the hood and doesn't allow configuring it without creating a LOT more ongoing work for yourself).
Honestly anything that resolves to 127.0.0.1, ::1 or the like should be treated the same as localhost for the purpose of trust.
Updated•3 years ago
|
| Comment hidden (me-too) |
| Comment hidden (advocacy) |
Comment 15•5 months ago
|
||
My company build the code-server on top of http connection. it there any way to select that these urls are secure? like Insecure origins treated as secure in microsoft edges
Comment 16•1 month ago
|
||
Please run a local https server like nginx (Linux, Windows, MacOS) with https://github.com/FiloSottile/mkcert to test your application properly and avoid any occurences of http:// and ws://. You could also use it as reverse proxy in front of your http://127.0.0.1:port/ app.
How's that going to help us observer SSL certs for IP addresses? Not many issuers provide us with direct certs for ips.
Description
•