Skip to content

Conversation

@nkaramarko
Copy link
Contributor

Merge pull request #9128 from wireapp/fix/chrome

Jira: https://wearezeta.atlassian.net/browse/WPB-20719

Update Electron from 35.0.2 to 38.2.0
Chromium version now 140.0.7339.133 (was 134.0.6998.88)
Fixes SAP SSO authentication issue requiring Chromium 139+
Add optional chaining for app.dock to fix TypeScript strictness

chore: update Electron to 38.2.0 for Chromium 140 (SAP SSO compatibility) [WPB-20719]
(cherry picked from commit d02b886)
…8 compatibility)

Replaced disable-features=WebRtcHideLocalIpsWithMdns with
force-webrtc-ip-handling-policy=all to maintain the same behavior
(disable mDNS local IP obfuscation to prevent Windows firewall prompt)
while ensuring compatibility with Electron ≥36.
@nkaramarko nkaramarko requested a review from emil-wire October 31, 2025 12:01
@emil-wire
Copy link
Contributor

@z-dule @EnricoSchw could you have a look as well?

@sonarqubecloud
Copy link

sonarqubecloud bot commented Nov 3, 2025

// do not use mdns for local ip obfuscation to prevent windows firewall prompt
app.commandLine.appendSwitch('disable-features', 'WebRtcHideLocalIpsWithMdns');

app.commandLine.appendSwitch('force-webrtc-ip-handling-policy', 'all');
Copy link

@EnricoSchw EnricoSchw Nov 5, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You're making two changes at once here:

Remove deprackted MDNS (is disabled by default now)

With mdns, your internal IP address is masked. So instead of, for example, broadcasting the local IP address 10.10.10.02, it becomes something like bb5bf085-0e64-438d-8059-20be6887f0cc.local.

This is supposed to increase security, but it also causes problems. Chrome has now disabled it. Firefox still does it by default.

Change global IP gathering police to ALL

This determines which IP addresses Chrome is allowed to use:

There are three settings:

  1. default_public_and_private_interfaces (is default) -> allow all
  2. default_public_interface_only -> blocks private ip
  3. disable_non_proxied_udp -> blocks udp

I couldn't find the "ALL" setting anywhere. But we should leave it on the default setting, otherwise our application won't work anymore.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

7 participants