Uh oh!
There was an error while loading.Please reload this page.
- Notifications
You must be signed in to change notification settings - Fork22
License
socketry/localhost
Folders and files
| Name | Name | Last commit message | Last commit date | |
|---|---|---|---|---|
Repository files navigation
This gem provides a convenient API for generating per-user self-signed root certificates.
HTTP/2 requires SSL in web browsers. If you want to use HTTP/2 for development (and you should), you need to start using URLs likehttps://localhost:8080. In most cases, this requires adding a self-signed certificate to your certificate store (e.g. Keychain on macOS), and storing the private key for the web-server to use.
I wanted to provide a server-agnostic way of doing this, primarily because I think it makes sense to minimise the amount of junky self-signed keys you add to your certificate store forlocalhost.
Please see theproject documentation for more details.
Getting Started - This guide explains how to use
localhostfor provisioning local TLS certificates for development.Example Server - This guide demonstrates how to use
Localhost::Authorityto implement a simple HTTPS client & server.
Please see theproject releases for all releases.
- Add support for
update-ca-truston Linux sytems. - Better command output.
- Add
localhost:purgeto delete all certificates. - Add
localhost:installto install the issuer certificate in the local trust store.
- Falcon — Uses
Localhost::Authorityto provide HTTP/2 with minimal configuration. - Puma — Supports
Localhost::Authorityto provide self-signed HTTP for local development.
We welcome contributions to this project.
- Fork it.
- Create your feature branch (
git checkout -b my-new-feature). - Commit your changes (
git commit -am 'Add some feature'). - Push to the branch (
git push origin my-new-feature). - Create new Pull Request.
In order to protect users of this project, we require all contributors to comply with theDeveloper Certificate of Origin. This ensures that all contributions are properly licensed and attributed.
This project is best served by a collaborative and respectful environment. Treat each other professionally, respect differing viewpoints, and engage constructively. Harassment, discrimination, or harmful behavior is not tolerated. Communicate clearly, listen actively, and support one another. If any issues arise, please inform the project maintainers.
About
Resources
License
Security policy
Uh oh!
There was an error while loading.Please reload this page.
Stars
Watchers
Forks
Sponsor this project
Uh oh!
There was an error while loading.Please reload this page.
Packages0
Uh oh!
There was an error while loading.Please reload this page.