Security News
The Risks of Misguided Research in Supply Chain Security
Snyk's use of malicious npm packages for research raises ethical concerns, highlighting risks in public deployment, data exfiltration, and unauthorized testing.
@microsoft/gulp-core-build-serve
Advanced tools
`gulp-core-build-serve` is a `gulp-core-build` subtask for testing/serving web content on the localhost, and live reloading it when things change.
gulp-core-build-serve
is a gulp-core-build
subtask for testing/serving web content on the localhost, and live reloading it when things change.
A task which spins up two servers, one for serving files in the project, and another for mocking out an API server to run on a different port.
--nobrowser
will stop the browser from automatically launching.
--port X
will use X as the currently active port.
This configuration has two options. If it is undefined, no API endpoint is created.
Default: undefined
The port to run the API server on.
The path to the API file. This file should export an object of the following interface:
interface IApiMap {
[ route: string ]: Function;
}
The initial URL to load. This is ignored if the --nobrowser
option is specified.
Default: '/index.html'
The port to serve on.
Default: 4321
A boolean determining whether HTTPS mode should be turned on.
Default: false
When the https
option is true
, this is the path to the HTTPS key
Default: undefined
Path to the HTTPS cert
Default: undefined
Path to the HTTPS PFX cert
Default: undefined
If true, when gulp-core-build-serve is initialized and a dev certificate doesn't already exist and hasn't been specified, attempt to generate one and trust it automatically.
Default: false
If this task is configured, whenever it is triggered it will tell gulp-connect
to reload the page.
This task doesn't have any configuration options.
This task generates and trusts a development certificate. The certificate is self-signed and stored, along with its private key, in the user's home directory. On Windows, it's trusted as a root certification authority in the user certificate store. On macOS, it's trusted as a root cert in the keychain. On other platforms, the certificate is generated and signed, but the user must trust it manually. See Development Certificate below for more information.
This task doesn't have any configuration options.
On Windows, this task removes the certificate with the expected serial number from the user's root certification authorities list. On macOS, it finds the SHA signature of the certificate with the expected serial number and then removes that certificate from the keychain. On other platforms, the user must untrust the certificate manually. On all platforms, the certificate and private key are deleted from the user's home directory. See Development Certificate below for more information.
This task doesn't have any configuration options.
gulp-core-build-serve
provides functionality to run a development server in HTTPS. Because
HTTPS-hosted server responses are signed, hosting a server using HTTPS requires a trusted certificate
signed by a root certification authority or modern browsers will show security warnings and block
unsigned responses unless they are explicitly excepted.
Because of this issue gulp-core-build-serve
also provides functionality to generate and trust
(and un-trust) a development certificate. There are two ways to generate the development certificate:
By setting the ServeTask
's tryCreateDevCertificate
configuration option to true
. This option
will make the serve task attempt to generate and trust a development certificate before starting the
server if a certificate wasn't specified using the keyPath
and certPath
parameters or the pfxPath
parameter.
By invoking the TrustCertTask
build task.
The certificate is generated and self-signed with a unique private key and an attempt is made to trust
it (Windows and macOS only). If the user does not agree to trust the certificate, provides invalid root
credentials, or something else goes wrong, the TrustCertTask
will fail and the ServeTask
will serve
with the default, non-trusted certificate. If trust succeeds, the certificate and the private key are
dropped in the .rushstack
directory in the user's home folder in PEM
format. On platforms
other than Windows and macOS, the certificate and key are always dropped in that directory, and the user
must trust the certificate manually.
After the certificate has been generated, trusted, and dropped in the home folder, any instance of
gulp-core-build-serve
running in any project will use it when running in HTTPS mode.
To untrust the certificate, invoke the UntrustCertTask
. On Windows, this task deletes the certificate
by its serial number from the user root certification authorities store, and on macOS the certificate's
signature is found by its serial number and then the certificate is deleted from the keychain by its
signature. Regardless of whether the untrust succeeds or not, the certificate and key are deleted
from the user's home directory.
To manually untrust the certificate, delete the files in the .rushstack
directory under your
home directory and untrust the certificate with the
73 1c 32 17 44 e3 46 50 a2 02 e3 ef 91 c3 c1 b0
serial number.
FAQs
`gulp-core-build-serve` is a `gulp-core-build` subtask for testing/serving web content on the localhost, and live reloading it when things change.
The npm package @microsoft/gulp-core-build-serve receives a total of 9,042 weekly downloads. As such, @microsoft/gulp-core-build-serve popularity was classified as popular.
We found that @microsoft/gulp-core-build-serve demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Snyk's use of malicious npm packages for research raises ethical concerns, highlighting risks in public deployment, data exfiltration, and unauthorized testing.
Research
Security News
Socket researchers found several malicious npm packages typosquatting Chalk and Chokidar, targeting Node.js developers with kill switches and data theft.
Security News
pnpm 10 blocks lifecycle scripts by default to improve security, addressing supply chain attack risks but sparking debate over compatibility and workflow changes.