Hi Jess,
We’re using a self-hosted instance of Kaltura behind a firewall so unfortunately I don’t have a public URL.
After upgrade to Community Edition 12.9.0, player no longer works in Chrome, client is trying to access server on port 88. We configured nginx with ssl on port 8443 however client still attempting to connect to server on port 88
From browser console (Chrome):
It fails cause port 88 on nginx is configured for http
GET https://mytestserver.mydomain:88/hls/p/100/sp/10000/serveFlavor/entryId/0_om60kqjq/v/2/flavorId/0_klwtd4p9/name/a.mp4/index.m3u8 net::ERR_SSL_PROTOCOL_ERRORvalue @ load.php?debug=false&lang=en&modules=Hlsjs%2CacCheck%2CacPreview%2Cbase64_decode%2Cbase64_encode%2C…:1
auto:1 Uncaught (in promise) DOMException: The play() request was interrupted by a call to pause().
TDP dump capture fraction
16:19:36.821720 IP 192.168.XXX.XXX.443 > 192.168.NNN.NNN.54968: Flags [.], ack 1737, win 141, length 0
16:19:36.833163 IP 192.168.NNN.NNN.54969 > 192.168.XXX.XXX.88: Flags [S], seq 3955500888, win 8192, options [mss 1376,nop,wscale 8,nop,nop,sackOK], length 0
16:19:36.833231 IP 192.168.XXX.XXX.88 > 192.168.NNN.NNN.54969: Flags [S.], seq 970236052, ack 3955500889, win 14600, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
16:19:36.834031 IP 192.168.NNN.NNN.54969 > 192.168.XXX.XXX.88: Flags [.], ack 1, win 258, length 0
16:19:36.839397 IP 192.168.NNN.NNN.54969 > 192.168.XXX.XXX.88: Flags [P.], seq 1:204, ack 1, win 258, length 203
16:19:36.839452 IP 192.168.XXX.XXX.88 > 192.168.NNN.NNN.54969: Flags [.], ack 204, win 123, length 0
16:19:36.839713 IP 192.168.XXX.XXX.88 > 192.168.NNN.NNN.54969: Flags [P.], seq 1:326, ack 204, win 123, length 325
16:19:36.839773 IP 192.168.XXX.XXX.88 > 192.168.NNN.NNN.54969: Flags [F.], seq 326, ack 204, win 123, length 0
16:19:36.842148 IP 192.168.NNN.NNN.54969 > 192.168.XXX.XXX.88: Flags [.], ack 327, win 256, length 0
16:19:36.842298 IP 192.168.NNN.NNN.54969 > 192.168.XXX.XXX.88: Flags [P.], seq 204:211, ack 327, win 256, length 7
16:19:36.842327 IP 192.168.NNN.NNN.54969 > 192.168.XXX.XXX.88: Flags [F.], seq 211, ack 327, win 256, length 0
16:19:36.842339 IP 192.168.XXX.XXX.88 > 192.168.NNN.NNN.54969: Flags [.], ack 212, win 123, length 0
16:19:37.966719 IP 192.168.NNN.NNN.54970 > 192.168.XXX.XXX.88: Flags [S], seq 1207419756, win 8192, options [mss 1376,nop,wscale 8,nop,nop,sackOK], length 0
16:19:37.966822 IP 192.168.XXX.XXX.88 > 192.168.NNN.NNN.54970: Flags [S.], seq 566435542, ack 1207419757, win 14600, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
16:19:37.967907 IP 192.168.NNN.NNN.54970 > 192.168.XXX.XXX.88: Flags [.], ack 1, win 258, length 0
16:19:37.968167 IP 192.168.NNN.NNN.54970 > 192.168.XXX.XXX.88: Flags [P.], seq 1:204, ack 1, win 258, length 203
16:19:37.968208 IP 192.168.XXX.XXX.88 > 192.168.NNN.NNN.54970: Flags [.], ack 204, win 123, length 0
16:19:37.968331 IP 192.168.XXX.XXX.88 > 192.168.NNN.NNN.54970: Flags [P.], seq 1:326, ack 204, win 123, length 325
16:19:37.968387 IP 192.168.XXX.XXX.88 > 192.168.NNN.NNN.54970: Flags [F.], seq 326, ack 204, win 123, length 0
16:19:37.969044 IP 192.168.NNN.NNN.54970 > 192.168.XXX.XXX.88: Flags [.], ack 327, win 256, length 0
16:19:37.969237 IP 192.168.NNN.NNN.54970 > 192.168.XXX.XXX.88: Flags [P.], seq 204:211, ack 327, win 256, length 7
16:19:37.969350 IP 192.168.NNN.NNN.54970 > 192.168.XXX.XXX.88: Flags [F.], seq 211, ack 327, win 256, length 0
where:
client ip - 192.168.NNN.NNN
servier ip - 192.168.XXX.XXX