-
-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow for insecure redirect URI for development #1021
Comments
I just saw that this is actually handled in fosite, do you want me to open the issue there instead? Any configuration would be done on hydra, but handling would happen in fosite. |
And this was apparently discussed already in ory/fosite#273 as wontfix. Should have searched better beforehand. |
Flags like Is there no other way to work around this for you? |
I understand that letting a way to do insecure thing is globally a bad thing, because people tend to choose the easy way over the secure one. If that's your stance, I totally understand it and will not argue this further. For my particular situation, we do not mirror the public production domain. We have subdomain, unresolvable from the Internet, routable only from private networks and VPNs, that is used for development machines. .localhost is a bit annoying because it does resolve to the current machine (as I said, through nss-myhostname, enabled on systemd hosts), and does not even allow a Hydra instance in a Docker container. If the way of not allowing whitelisting domains is kept, I'll continue using a patched fork that adds my internal domain to fosite for my development host, that is not a big deal. :) |
Yes, the "mantra" of this ecosystem is to make bad things hard. Another option is of course to add an SSL termination proxy in front of your API gateway or whatever you use, with a certificate that is either issued by an internal-trusted CA or self-issued (and trusted obviously) |
It makes sense to fix that and lower developer frustration. It makes sense to have |
We will probably not address this as part of rc.1 but it's on the roadmap for 1.0 stable! |
Revisiting this, I think it makes sense to have a list of domains whitelisted for development. This would only work when |
This patch enables developers to whitelist insecure redirect URLs while using flag `--dangerous-force-http`. Closes #1021 Signed-off-by: aeneasr <aeneas@ory.sh>
This patch enables developers to whitelist insecure redirect URLs while using flag `--dangerous-force-http`. Closes #1021 Signed-off-by: aeneasr <aeneas@ory.sh>
Related issue cropping up when running with EDIT Addressed above with #1354 so great just a config issue for those using |
Hi,
This is a feature request.
Currently, even when dangerous-force-http is enabled, there is a hard requirement that all redirect URIs be HTTPS, except for .localhost suffixes (and possibly raw IP adresses). I have to admit this is a pain for development, when using a domain that maps to a private network (Docker, VM, etc.).
The hardcoded .localhost suffix is also problematic, as on some Linux distros (with nss-myhostname), it automatically resolves to 127.0.0.1, bypassing DNS totally (and therefore not hitting my Hydra box), unless the NSS module is totally disabled.
My company also has a policy to use a public TLD for development domains even if the IP is non-routable, and as far as I know, Hydra is not usable like that without a proper DNS certificate.
I totally understand that forcing HTTPS is a feature for production, but I think it would be interesting to either:
Thanks for your input.
The text was updated successfully, but these errors were encountered: