[meta] Improve secure context development experience
Categories
(DevTools :: General, enhancement, P3)
Tracking
(Not tracked)
People
(Reporter: jkt, Unassigned)
References
(Depends on 3 open bugs, Blocks 1 open bug)
Details
(Keywords: meta)
Reporter | ||
Updated•7 years ago
|
Updated•7 years ago
|
Comment 1•7 years ago
|
||
Comment 2•7 years ago
|
||
Comment 3•7 years ago
|
||
Comment 5•7 years ago
|
||
Comment 7•7 years ago
|
||
Comment 8•7 years ago
|
||
Updated•6 years ago
|
Just my 2¢, just allow a whilelist of domains to treat equivalently to localhost. That'll allow people on my_hostname.local mdns domains, localhost, 127.0.0.1, or whatever variant of dev.example.com that they use to work.
Comment 10•5 years ago
|
||
I think there should be no discussion at all that 1) localhost is not enough; and 2) media.devices.insecure.enabled
it's heavy artillery. A whitelist or a command line switch (like --unsafely-treat-insecure-origin-as-secure
in Chrome) may be a perfect solution.
Comment 11•5 years ago
|
||
IMHO all these *.insecure.enabled prefs should be removed.
Please run a local https server like nginx (Linux, Windows, MacOS) with https://github.com/FiloSottile/mkcert to test your application properly and avoid any occurences of http:// and ws://. You could also use it as reverse proxy in front of your http://127.0.0.1:port/ app.
Comment 12•5 years ago
|
||
@Jan if that were feasible that would be nice, but dictating that everyone use nginx is pretty unrealistic. And some people are already working on projects that use the webpack dev server directly or indirectly (for example create-react-app uses it under the hood and doesn't allow configuring it without creating a LOT more ongoing work for yourself).
Honestly anything that resolves to 127.0.0.1
, ::1
or the like should be treated the same as localhost
for the purpose of trust.
Updated•2 years ago
|
Description
•