Brak opisu

Filippo Valsorda c4f873a371 Add a warning for second-level wildcards 6 lat temu
HomebrewFormula 6a3cad1731 Homebrew and usage 6 lat temu
vendor 75a36a6de4 Add punycode support 6 lat temu
AUTHORS c3ffec658a Add LICENSE 6 lat temu
CONTRIBUTORS c3ffec658a Add LICENSE 6 lat temu
Gopkg.lock 75a36a6de4 Add punycode support 6 lat temu
Gopkg.toml 75a36a6de4 Add punycode support 6 lat temu
LICENSE c3ffec658a Add LICENSE 6 lat temu
Makefile ce28959c70 Ahem... a different project leaked into the Makefile 6 lat temu
PATENTS c3ffec658a Add LICENSE 6 lat temu
README.md 8d964eef58 Document Go 1.10 requirement 6 lat temu
cert.go c4f873a371 Add a warning for second-level wildcards 6 lat temu
main.go c4f873a371 Add a warning for second-level wildcards 6 lat temu
truststore_darwin.go e4c5c312a7 Add Firefox support 6 lat temu
truststore_firefox.go 1bc392c3cc Use explicit prefix for dbm NSS databases 6 lat temu
truststore_linux.go 073ee25396 On linux don't declare we installed to the system store (#18) 6 lat temu

README.md

mkcert

mkcert is a simple tool for making locally-trusted development certificates. It requires no configuration.

$ mkcert -install
Created a new local CA at "/Users/filippo/Library/Application Support/mkcert" 💥
The local CA is now installed in the system trust store! ⚡️
The local CA is now installed in the Firefox trust store (requires restart)! 🦊

$ mkcert example.com '*.example.org' myapp.dev localhost 127.0.0.1 ::1
Using the local CA at "/Users/filippo/Library/Application Support/mkcert" ✨

Created a new certificate valid for the following names 📜
 - "example.com"
 - "*.example.org"
 - "myapp.dev"
 - "localhost"
 - "127.0.0.1"
 - "::1"

The certificate is at "./example.com+5.pem" and the key at "./example.com+5-key.pem" ✅

Chrome screenshot

Using certificates from real CAs for development can be dangerous or impossible (for hosts like localhost or 127.0.0.1), but self-signed certificates cause trust errors. Managing your own CA is the best solution, but usually involves arcane commands, specialized knowledge and manual steps.

mkcert automatically creates and installs a local CA in the system root store, and generates locally-trusted certificates.

Installation

On macOS, use Homebrew.

brew install --HEAD https://github.com/FiloSottile/mkcert/raw/master/HomebrewFormula/mkcert.rb
brew install nss # if you use Firefox

On Linux (-install support coming soon!), use the pre-built binaries (again, coming soon), or build from source (requires Go 1.10+).

$ git clone https://github.com/FiloSottile/mkcert
$ cd mkcert && make

Windows will be supported next.

Advanced topics

Changing the location of the CA files

The CA certificate and its key are stored in an application data folder in the user home. You usually don't have to worry about it, as installation is automated, but if you need it it's printed in the first line of the mkcert output.

If you want to manage separate CAs, you can use the environment variable CAROOT to set the folder where mkcert will place and look for the local CA files.

Installing the CA on other computers

Installing in the trust store does not require the CA key, so you can export just the CA certificate and use mkcert to install it in other machines. For example, you can decide to commit just rootCA.pem and not its key to version control.

  • Look for the rootCA.pem file in CAROOT or in the default folder (see above)
  • copy it to a different machine
  • set CAROOT to its directory
  • run mkcert -install

Remember that mkcert is meant for development purposes, not production, so it should not be used on end users' machines.


This is not an official Google project, just some code that happens to be owned by Google.