I built a tool called local-tls-proxy, which allows easy setup of HTTPS for local testing. It works by proxying all `<a href="https://{PORT}.{IP}.sslip.io" rel="nofollow">https://{PORT}.{IP}.sslip.io</a>` requests to their `<a href="http://{IP}:{PORT}" rel="nofollow">http://{IP}:{PORT}</a>` counterparts.<p>It's especially useful for testing in secure contexts in browsers. The tool automatically generates and installs CA certificates, making it convenient for developers on both Linux and Windows.<p>---<p>Usage:<p>1. Install CA certificate<p>For Linux:
$ sudo ./local-tls-proxy -install<p>For Windows (administrator mode):
> local-tls-proxy.exe -install<p>2. Run the proxy
$ ./local-tls-proxy -port 5443<p>3. Now, access via <a href="https://{PORT}.{IP}.sslip.io:5443/" rel="nofollow">https://{PORT}.{IP}.sslip.io:5443/</a> which proxies to <a href="http://{IP}:{PORT}/" rel="nofollow">http://{IP}:{PORT}/</a>.<p>For example:
<a href="https://5173.127-0-0-1.sslip.io:5443/" rel="nofollow">https://5173.127-0-0-1.sslip.io:5443/</a>
proxies to
<a href="http://127.0.0.1:5173/" rel="nofollow">http://127.0.0.1:5173/</a>.