devcert
mkcert
devcert | mkcert | |
---|---|---|
1 | 137 | |
1,282 | 49,136 | |
- | - | |
0.0 | 1.9 | |
7 months ago | 3 months ago | |
TypeScript | Go | |
- | BSD 3-clause "New" or "Revised" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
devcert
-
A safer default for navigation: HTTPS
The devcert tool (and its corresponding devcert-cli command-line interface) is very handy for creating a local root certificate authority that you control & your device trusts:
https://github.com/davewasmer/devcert
mkcert
-
How to configure an Ethernet connection between iPad and RaspberryPi with USB-C
mkcert can help with this! https://github.com/FiloSottile/mkcert
As one-time-setup you’ll need to serve the ROOTCA.pem from the Pi and download and install it on the iPad, but once you’ve done this once, any certs you generate on the Pi will be accepted by the iPad.
mkcert has enabled so many crazy setups and workflows for me over the years, it’s truly fantastic.
-
Just want simple TLS for your .internal network?
mkcert might be getting this as well: https://github.com/FiloSottile/mkcert/pull/309/commits/92215... (this is linked from the current submission's readme)
- Ask HN: Dev/Ops/DevOps tools you use and more people should
-
.INTERNAL is now reserved for private-use applications
I use https://github.com/FiloSottile/mkcert for my internal stuff.
- Ubuntu上默认证书库是怎么回事
-
HTTPS on Localhost with Next.js
The experimental HTTPS flag relies on mkcert, designed for a single development system. If you run a Docker container, the flag won’t configure your local browser to trust its certificate.
- Mkcert: Simple zero-config tool to make locally trusted development certificates
- Mkcert: Simple tool to make locally trusted dev certificates names you'd like
-
You Can't Follow Me
The author mentions difficulties with HTTPS and trying stuff locally.
I've had some success with mkcert [1] to easily create certificates trusted by browsers, I can suggest to look into this. You are your own root CA, I think it can work without an internet connection.
[1] https://github.com/FiloSottile/mkcert/
- SSL Certificates for Home Network
What are some alternatives?
web.dev - The frontend, backend, and content source code for web.dev
minica - minica is a small, simple CA intended for use in situations where the CA operator also operates each host where a certificate will be used.
ecs-fargate-ci-cd-pipeline - Repository from exanubes.com for Fargate App with a SSL Certificate
nginx-docker-ssl-proxy - A docker way to access localhost:8081 from https://local.dev
cert-gen - Generate CA and self-signed SSL certificates usable in your browser for local development.
certificates - 🛡️ A private certificate authority (X.509 & SSH) & ACME server for secure automated certificate management, so you can use TLS everywhere & SSO for SSH.
servercert - Repository for the CA/Browser Forum Server Certificate Chartered Working Group
gosumemory - Cross-Platform memory reader for osu!
vite-plugin-proxy-page - A Vite plugin for projecting your application onto a remote page during development.
rustls - A modern TLS library in Rust
CertInfo - Which Root Certificates should you trust?
uvicorn - An ASGI web server, for Python. 🦄