-
-
Notifications
You must be signed in to change notification settings - Fork 1.4k
Change secure check in production environment & Run with Heroku #179
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
By analyzing the blame information on this pull request, we identified @flovilmart, @drew-gross and @gimdongwoo to be potential reviewers. |
|
Sweet! This looks like it should be pretty close to what we want. The X-Forwarded-Proto header can be spoofed on non-Heroku environments, though, so we need to deal with that. I think the idiomatic |
|
@gimdongwoo updated the pull request. |
|
Heh, I was just about open a pull request for this. This will also need to use |
|
Then I've merged v1.0.5, heroku build fails. local is ok. It's logs from heroku. 59% 53/64 build modulesContainer#eachAtRule is deprecated. Use Container#walkAtRules instead. |
|
Heroku seems to be taking issue with the "engines": {
"node": ">=4.3"
},in |
|
@gimdongwoo updated the pull request. |
|
This causes an error during the build on Heroku. If it do not use, operation with no problem. Many people like to use the parse dashboard & server on Heroku. So do I. Thank you!! |
|
The |
|
@gimdongwoo updated the pull request. |
fix: deploy-prod script
req.secure is undefined in production evironment.
It works on heroku with https.
Thank you.