Issue metadata
Sign in to add a comment
|
CSP allowing a 3rd party media-src domain for <track> should take precedence over lack of crossorigin attribute on parent <video>
Reported by
kyv...@gmail.com,
Apr 4 2016
|
||||||||||||||||||||||
Issue descriptionUserAgent: Mozilla/5.0 (X11; Linux i686; rv:46.0) Gecko/20100101 Firefox/46.0 Steps to reproduce the problem: 1. Load the attached testcase 2. Play the audio 3. Look for captions What is the expected behavior? Captions should load from the 3rd party site as allowed by meta CSP media-src directive. What went wrong? <track> src is denied due to lack of the crossorigin attribute on the parent <video>, while the <source> src from the same 3rd party site is allowed. Did this work before? N/A Chrome version: Channel: n/a OS Version: Flash Version: In Firefox the testcase shows the captions.
,
Apr 4 2016
Hi Charlie, I was hoping you could help me find an appropriate person to triage this bug. I'm not sure what component/area it would fall under. Thanks much!
,
Apr 4 2016
Dale, do you know who's working on <track> captions?
,
Apr 4 2016
,
Apr 5 2016
,
Apr 5 2016
I'm not sure it makes sense for CSP to override any requirements we have for `crossorigin`. The two are completely orthogonal, and CSP does not aim to grant any ability to the page that it doesn't already have (quite the opposite).
,
Apr 5 2016
In other words, per current specs, this is a feature request and not a bug?
,
Apr 5 2016
All I'm saying is that if `<track>` requires `crossorigin` on the parent `<video>`, then adding its URL to CSP's whitelist should now and will not bypass that requirement. I don't know enough about `<track>` and `<video>` to say whether the `crossorigin` requirement itself makes sense.
,
Apr 5 2016
The spec for this is https://html.spec.whatwg.org/multipage/embedded-content.html#start-the-track-processing-model and to the best of my knowledge it makes sense. IIRC, it seemed like overkill to add a separate crossorigin attribute to the track element itself, so that's why the video element's attribute is used. I'm not sure if there are bugs in how the crossorigin attribute is handled for the media resource itself. kyvago@, you wrote "<track> src is denied due to lack of the crossorigin attribute on the parent <video>, while the <source> src from the same 3rd party site is allowed." Is the fact that the behavior is different what caused you to notice this?
,
Apr 5 2016
The seemingly inconsistent implementations of this between Firefox and Chrome are what made me notice this. It appears Firefox is the one not up to date with the current spec. I also saw an additional line from https://www.w3.org/TR/html5/embedded-content-0.html "The resource obtained in this fashion, if any, contains the text track data. If any data is obtained, it is by definition CORS-same-origin (cross-origin resources that are not suitably CORS-enabled do not get this far)." It does baffle me how forcing <track> to be CORS-enabled makes sense over either CSP directives or the upcoming integrity attribute. The end result on the clientside wanting accessibility is a prohibitive standard for those servers either unconfigurable to be or just not CORS-aware. But that's a spec issue so this bug is invalid.
,
Apr 5 2016
Note that https://www.w3.org/TR/html5/embedded-content-0.html is not up to date, currently the only HTML spec that's actively maintained when it comes to details and algorithms of this sort is https://html.spec.whatwg.org/ (Disclaimer: I'm one of the editors.) I'm not sure what the current state of implementation here and can't say I'm certain that the spec makes sense, although I suspect it does. Can you file an issue at https://github.com/whatwg/html/issues if you have some specific change in mind and mention @foolip (me)?
,
Apr 5 2016
,
May 23 2016
Renamed Blink>Text>Track to Blink>Media>Track. Moving these bugs to the new component.
,
Jul 13 2016
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Oct 1 2016
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Oct 2 2016
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Oct 2 2016
|
|||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||
Comment 1 by kyv...@gmail.com
, Apr 4 20161.1 KB
1.1 KB View Download