Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
After having a short discussion with @chromium1337 we found a fix for the security vulnerability #1783
The vulnerability mainly had to do with people being able to steal your code as the origin of requests wasn't checked by websocket server.
However the CORS header in the static server comes down to the same vulnerability and as there is no general hostname flag, we can't really secure that server.
Unless we would agree, that both these hostnames would always be the same and deprecate
--hmr-hostname
and create a--hostname
flag instead that adds a cors limitation to both the static and websocket server. This way allowing parcel to be run on a server without having to worry about any security risks (related to CORS).Fixes #1783