Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Can we drop the secure context (https) requirement? #383

Closed
bp2008 opened this issue Oct 22, 2021 · 10 comments
Closed

Can we drop the secure context (https) requirement? #383

bp2008 opened this issue Oct 22, 2021 · 10 comments
Assignees
Labels
extension Interface changes that extend without breaking.

Comments

@bp2008
Copy link

bp2008 commented Oct 22, 2021

Hello.

I am very excited about WebCodecs, but I notice in Chrome 94/95, the API is only available in a secure context (https). I cannot imagine why, except to arbitrarily promote usage of TLS. Media processing capabilities have long been available on the unencrypted web by other means. WebCodecs just makes it (much) more convenient for the developer, and better-performing for the user. Why is this restricted to secure contexts?

This is a big problem for my use case, which is a web interface for popular video security software that is installed locally on end-user machines. The web interface is hosted locally too (not from "the cloud") using unencrypted HTTP, hence the problem.

The only way most users will use HTTPS is if we force it, and provide a self-signed certificate. The user experience is awful and it will teach users to navigate through scary browser warnings without a second thought.

@yume-chan
Copy link

The web interface is hosted locally too

Chrome treats localhost as a secure context (https://www.chromestatus.com/feature/6269417340010496), how do you exactly "host" the web interface? Via file:// URLs?

@bp2008
Copy link
Author

bp2008 commented Oct 22, 2021

The video security software has an embedded web server which hosts the web interface. Therefore most users access it via private IPv4 address with a custom port number, e.g. http://192.168.0.100:81 or if they have set up port forwarding, then they swap in their public IP or a dynamic DNS hostname.

localhost and file:// URLs unfortunately are not helpful, as the goal is remote access without having to install a dedicated app on client machines.

@MikeLud
Copy link

MikeLud commented Oct 22, 2021

I would also like to see the secure context (https) requirement removed

Thanks
Mike

@aesterling
Copy link

aesterling commented Oct 23, 2021

@bp2008 makes a good point. This https requirement should be removed. There are lots of legitimate use cases that the current implementation prevents. Thanks!

@chcunningham chcunningham added the extension Interface changes that extend without breaking. label Nov 30, 2021
@FergoTheGreat
Copy link

I would love to know the reason why it was thought necessary to limit this to secure contexts only. I know SSL/TLS certificates are considered trivial/essential and used pretty much by default by all corporations these days. I don't like that being an excuse to just give everything a secure context requirement "just to be safe" instead of because it was strictly necessary.

@tidoust
Copy link
Member

tidoust commented Mar 29, 2022

I note issue #350, which details the rationale used for introducing [SecureContext] in the first place.

@Djuffin Djuffin added the agenda Add to Media WG call agenda label Sep 28, 2023
@Djuffin Djuffin removed the agenda Add to Media WG call agenda label Oct 10, 2023
@Djuffin
Copy link
Contributor

Djuffin commented Oct 10, 2023

Chromium policy about new web APIs available in not secure context hasn't changed.
I believe the same is true for Firefox.

So I don't think we can drop https requirement for webcodecs.

@Djuffin Djuffin closed this as completed Oct 10, 2023
@Djuffin
Copy link
Contributor

Djuffin commented Oct 10, 2023

cc @youennf

@Djuffin
Copy link
Contributor

Djuffin commented Oct 10, 2023

For Chromium based browsers you can use chrome://flags/#unsafely-treat-insecure-origin-as-secure to treat LAN websites as secure

@chrisn
Copy link
Member

chrisn commented Nov 7, 2023

Discussed in Media WG meeting, 10 October 2023 minutes

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
extension Interface changes that extend without breaking.
Projects
None yet
Development

No branches or pull requests

10 participants