Add host.docker.internal and host.containers.internal to the dev cert SAN #61155
Labels
area-networking
Includes servers, yarp, json patch, bedrock, websockets, http client factory, and http abstractions
design-proposal
This issue represents a design proposal for a different issue, linked in the description
Summary
Currently the dev certificate is only valid for
localhost
. When running in a container, an app tryting to access the host will try to do it viahost.docker.internal
orhost.containers.internal
.Motivation and goals
Since the dev cert isn't valid for
host.docker.internal
orhost.containers.internal
, TLS validation will fail, even if the certificate is trusted.In scope
host.docker.internal
andhost.containers.internal
as SAN in the dev certificate generated by thedev-certs
toolOut of scope
When container are linked or are aprt of the same network, they can be joined via their name, like
https://myservice
. We will not support such scenarios.Risks / unknowns
We need to raise the version number of the certificate (currently version 2) so that newer version of the tool can create the cert with these additional SAN. However, Kestrel should still
consider version 2 certificate as valid, to avoid any issue when the user update the runtime before updating the SDK.
Examples
Example of "parsable output":
The text was updated successfully, but these errors were encountered: