Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Conversation

@mislav
Copy link
Contributor

@mislav mislav commented Mar 13, 2020

Web developers who have had at any previous point ran an application on http://localhost that enabled HSTS (HTTP Strict Transport Security) will find themselves unable to authenticate because their browser (typically Safari) will keep redirecting them to https://localhost, which isn't handled by our local server.

This switches the authorization callback to be to 127.0.0.1, which should be equivalent to localhost, but not subject to HSTS.

The GitHub CLI OAuth apps have been edited to add http://127.0.0.1/callback as an additional allow-listed callback URL. /cc @ptoomey3

Fixes #616

Web developers who have previously ran an application on
`http://localhost` that enabled HSTS (HTTP Strict Transport Security)
will find themselves unable to authenticate because their browser
(typically Safari, in practice) will keep redirecting them to
`https://localhost`, which isn't handled by our local server.

This switches the authorization callback to be to `127.0.0.1`, which
should be equivalent to `localhost`, but not subject to HSTS.
@mislav mislav merged commit da4bbe3 into master Mar 16, 2020
@mislav mislav deleted the oauth-localhost-callback branch March 16, 2020 14:08
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Unable to authenticate

3 participants