Status Update
Comments
lu...@google.com <lu...@google.com> #2
This is to confirm that we plan to resume the rollout of the new cross-signed root CA certificate as described in
The rollout will be very gradual, with incremental launches across the Google Maps Platform services and regions, and its phases will proceed depending on engineering evaluations rather than by a defined timetable. The change will be transparent to the vast majority of Google Maps Platform API clients, including all mainstream maintained OS versions.
For more information, please see the FAQ resources listed in
ig...@gmail.com <ig...@gmail.com> #3
At this stage, the best course of action is to ensure that your client TLS stack can dynamically work with intermediary certificates signed by any of the (~40) root CAs from
In other words, the root CA signing intermediary certificates for requests to
We have published FAQs at the following addresses:
ig...@gmail.com <ig...@gmail.com> #4
Here are several sources that can be used to help you split the root.pem file into 1 file per certificate, if required by your tooling and software environment:
-
-
-
As an immediate fix to get your Google Maps Platform requests working again, the main certificate to install is the "GTS Root R1" certificate, which begins at line 896 in the current roots.pem file. Please note that this issue may reoccur in the future if you don't install all the certificates.
ig...@gmail.com <ig...@gmail.com> #5
To help customers using Java or Mozilla NSS, we have updated the Java keytool
and NSS certutil
sections in our
ma...@lectroid.net <ma...@lectroid.net> #6
Dear developers, the new GTS Root R1 Cross certificates have now fully rolled out to all Google Maps Platform services.
ig...@gmail.com <ig...@gmail.com> #7
Thank you!
th...@google.com <th...@google.com>
md...@gmail.com <md...@gmail.com> #8
ma...@lectroid.net <ma...@lectroid.net> #9
Updating existing extensions may still be supported.
ja...@google.com <ja...@google.com> #10
Please fix this issue as soon as possible.
Thanks
md...@gmail.com <md...@gmail.com> #11
Source:
ma...@lectroid.net <ma...@lectroid.net> #12
Please fix
[Deleted User] <[Deleted User]> #13
sc...@gmail.com <sc...@gmail.com> #14
Please provide an alternate or a solution ASAP.
cb...@google.com <cb...@google.com> #15
A workaround has been released by the Chrome team:
I've attached a sample extension that makes use of this sandboxing technique. To use any of the Chrome extension APIs (e.g. tabs), you'll need to use postMessage to communicate to the popup or background page.
ig...@gmail.com <ig...@gmail.com> #16
I load my own content and to draw a map I need to sandbox the dangerous google maps api from my page to iframe. Great.
ni...@gmail.com <ni...@gmail.com> #17
I don't wish to be rude, but this remains a significant problem.
al...@gmail.com <al...@gmail.com> #19
je...@gmail.com <je...@gmail.com> #21
ic...@gmail.com <ic...@gmail.com> #22
Disabling 'unsafe-eval' makes the test fail.
in...@prettydiff.com <in...@prettydiff.com> #23
in...@prettydiff.com <in...@prettydiff.com> #24
try {
document.write('<' + 'script src="' + src + '"' + ' type="text/javascript"><' + '/script>');
} catch (e) {
var mapRequest = document.createElement("script"),
type = (isNaN(document.xmlVersion) === true || document.contentType.indexOf("application") === 0) ? "application" : "text";
mapRequest.setAttribute("type", type + "/javascript");
mapRequest.setAttribute("src", src);
document.getElementsByTagName("body")[0].appendChild(mapRequest);
}
document.write is purely legacy. Google Chrome does not even recognize the existence of document.write in certain strict rendering modes. Try this against a file with extention ".xhtml".
The code I provided will continue to support document.write as the default method, but when it fails the error will be suppressed and the valid approach that works in all browsers will be applied instead.
There is absolutely no reason to continue using document.write instead of this code here. I recommend just removing document.write though.
pb...@gmail.com <pb...@gmail.com> #25
jo...@jbuckley.ca <jo...@jbuckley.ca> #26
You'll see that it loads the js with a different getScript function:
function getScript(src) {
var s = document.createElement('script');
s.src = src;
document.body.appendChild(s);
}
[Deleted User] <[Deleted User]> #27
[Deleted User] <[Deleted User]> #28
en...@google.com <en...@google.com> #29
ic...@gmail.com <ic...@gmail.com> #30
sw...@gmail.com <sw...@gmail.com> #31
Allowing 'unsafe-eval' is a deal-breaker, and far from ideal.
je...@massar.ch <je...@massar.ch> #32
It basically requires every public website (not even an 'extension' which needs to use the hackish sandboxing stuff) that utilizes a proper CSP header to include 'unsafe-eval' and a very long list of image sources too.
The eval() usage is still in the API. As others noted, after more than two years, maybe time to drop usage of Google Maps API, as it makes sites insecure.
st...@google.com <st...@google.com> #33
This won't be simple for us to fix. We'll keep everyone posted with our progress.
mi...@gmail.com <mi...@gmail.com> #34
nc...@gmail.com <nc...@gmail.com> #35
nc...@gmail.com <nc...@gmail.com> #36
nc...@gmail.com <nc...@gmail.com> #37
This should be the solution for web developers but of course as per usual chrome fails to come correct at the critical hurdle.. img-src .. and please feel free to put me straight if you know why this is or what I might of done wrong.
The snippet bellow is to get leaflet map working for instance *not even google maps* every thing works and seems to make sense untill img-src fowls up.
<meta http-equiv="Content-Security-Policy" content="
default-src
connect-src
font-src
frame-src
img-src http://* data: filesystem: blob:;
media-src
object-src
script-src 'unsafe-inline' 'unsafe-eval'
style-src 'unsafe-inline'
" />
Can you fix it please google!! ;(
I should invoice google for the loss of productivity...
forgive me for being kind of sick of these security features that google keeps asserting on to us each time forgetting or overlooking something trivial but important and thus setting our projects weeks and causing regressions
nc...@gmail.com <nc...@gmail.com> #38
ig...@gmail.com <ig...@gmail.com> #39
All this talk is just useless noise in my mail.
nc...@gmail.com <nc...@gmail.com> #40
nc...@gmail.com <nc...@gmail.com> #41
nc...@gmail.com <nc...@gmail.com> #42
nc...@gmail.com <nc...@gmail.com> #43
nc...@gmail.com <nc...@gmail.com> #44
nc...@gmail.com <nc...@gmail.com> #45
en...@google.com <en...@google.com> #46
en...@google.com <en...@google.com> #47
nc...@gmail.com <nc...@gmail.com> #48
<meta http-equiv="Content-Security-Policy"
content="default-src *;
script-src 'self' 'unsafe-inline' 'unsafe-eval'
https://mysite.com:*
https://*.
https://*.
https://*.
https://*.
https://*.
;
style-src 'self' 'unsafe-inline'
https://*.
https://*.
https://*.
https://*.
https://*.
">
<script type='text/javascript' src='
function googleCallback() {
alert('that will be the day');
}
cs...@google.com <cs...@google.com> #49
nc...@gmail.com <nc...@gmail.com> #50
nc...@gmail.com <nc...@gmail.com> #51
gr...@gmail.com <gr...@gmail.com> #52
st...@google.com <st...@google.com> #53
- delete 'unsafe-inline' and 'unsafe-eval'
- keep https://*.
Regarding #49
When I load your HTML in Chrome, there are no errors in the console.
Regarding #51
The error message is different from the HTML you posted.
The error message doesn't list https://*.
Regarding #53
There are a number of different issues being discussed here, which one are you referring to? If you can be specific, we can probably help you :-)
Description
Now I try to switch to Chrome Extension manifest.v2 and found that Content Security Policy is required to use.
But your code contains "eval" function use and document.write to load scripts, so your maps can't be initialized.