Closed
Bug 909498
Opened 12 years ago
Closed 7 years ago
Add proxy settings for WiFi to the B2G UI
Categories
(Firefox OS Graveyard :: Gaia::Settings, defect)
Tracking
(Not tracked)
RESOLVED
WONTFIX
People
(Reporter: hsteen, Unassigned)
References
Details
(Whiteboard: [dependency: marketplace-partners][games])
It's a common requirement for web site and web app debugging to use some HTTP debugging proxy (MS Fiddler, Charles proxy et al). These tools are widely known and loved - and to support developers accustomed workflows better, it's a good idea to add a proxy setting somewhere in the developer UI. (This requires a fix for bug 902345)
Updated•12 years ago
|
Component: Gaia → Gaia::Settings
Comment 3•11 years ago
|
||
Not having proxy settings and dropping support for existing proxy support that we had in 1.1 blocks a partner for releasing a game end of Q4.
Their QA team depend on Charles [1] or Fiddler [2] to ensure COPPA. They used Charles before successfully on Firefox 1.1 for another game. We have instructions on MDN on how to proxy traffic which seemed to have stopped working on newer Firefox OS version [3].
[1]: http://www.charlesproxy.com/documentation/configuration/browser-and-system-configuration/
[2]: http://docs.telerik.com/fiddler/configure-fiddler/tasks/ConfigureForAndroid
[3]: https://developer.mozilla.org/en-US/Firefox_OS/Debugging/Intercepting_traffic_using_a_proxy
Severity: normal → blocker
Flags: needinfo?(dougt)
Whiteboard: [dependency: marketplace-partners][games]
Comment 4•11 years ago
|
||
I've been trying to find a workaround for this for charles (Using Flame with 2.1)
Firstly I'm seeing issues with the CA cert for charles not being seen as valid in recent FF. I've contacted the developer about that. But I was able to workaround that by creating my own CA cert for charles using these docs: http://0x74696d.com/posts/CharlesSSL/
* For the device I can add certs to the wifi settings but this doesn't appear to allow setting of trust. You add the cert by putting it in /sdcard/downloads and then you can import it.
* I've tried pulling the cert9.db and key4.db and manipulating that locally with certutil (as per http://wiki.mozfr.org/Adding_CA_to_FirefoxOS) to add the cert
This doesn't seem to work. Charles sees the following message:
SSLHandshake: Received fatal alert: bad_certificate
Comment 5•11 years ago
|
||
Just to prove certuil sees my custom CA cert as valid (whereas the charles one isn't):
$ certutil -V -n 'Charles MRL' -u V -d sql:.
certutil: certificate is valid
Here's the output of the modified cert list:
$ certutil -L -d sql:.
Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI
DigiCert Secure Server CA ,,
DigiCert SHA2 Extended Validation Server CA ,,
GeoTrust SSL CA - G3 ,,
GeoTrust Global CA ,,
DigiCert High Assurance CA-3 ,,
Charles MRL CT,c,c
GeoTrust SSL CA - G2 ,,
Comment 6•11 years ago
|
||
Stuart -- jumping in late. Did you follow these instructions:
http://wiki.mozfr.org/Adding_CA_to_FirefoxOS
Flags: needinfo?(dougt)
Comment 7•11 years ago
|
||
(In reply to Doug Turner (:dougt) from comment #6)
> Stuart -- jumping in late. Did you follow these instructions:
>
> http://wiki.mozfr.org/Adding_CA_to_FirefoxOS
I've been over my steps - mozTCPSocket requests were throwing me as they can't be decrypted or don't use the cert store in the same way.
Anyway - here's the instructions that got it working for me: https://muffinresearch.co.uk/proxying-connections-from-ffos/
Let me know if there's any gaps.
Comment 8•11 years ago
|
||
Thanks a lot Stuart! The mozTCPSocket not using proxies is tracked in bug 902345.
Nick, please share https://muffinresearch.co.uk/proxying-connections-from-ffos/ with our partners to let them confirm it works for them.
Flags: needinfo?(nick)
Comment 11•7 years ago
|
||
Firefox OS is not being worked on
Status: NEW → RESOLVED
Closed: 7 years ago
Resolution: --- → WONTFIX
You need to log in
before you can comment on or make changes to this bug.
Description
•