OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "config.h" | 5 #include "config.h" |
6 #include "modules/encryptedmedia/HTMLMediaElementEncryptedMedia.h" | 6 #include "modules/encryptedmedia/HTMLMediaElementEncryptedMedia.h" |
7 | 7 |
8 #include "bindings/core/v8/ExceptionState.h" | 8 #include "bindings/core/v8/ExceptionState.h" |
9 #include "bindings/core/v8/ScriptPromise.h" | 9 #include "bindings/core/v8/ScriptPromise.h" |
10 #include "bindings/core/v8/ScriptPromiseResolver.h" | 10 #include "bindings/core/v8/ScriptPromiseResolver.h" |
(...skipping 272 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
283 fail(code, errorMessage); | 283 fail(code, errorMessage); |
284 } | 284 } |
285 | 285 |
286 DEFINE_TRACE(SetMediaKeysHandler) | 286 DEFINE_TRACE(SetMediaKeysHandler) |
287 { | 287 { |
288 visitor->trace(m_element); | 288 visitor->trace(m_element); |
289 visitor->trace(m_newMediaKeys); | 289 visitor->trace(m_newMediaKeys); |
290 ScriptPromiseResolver::trace(visitor); | 290 ScriptPromiseResolver::trace(visitor); |
291 } | 291 } |
292 | 292 |
293 HTMLMediaElementEncryptedMedia::HTMLMediaElementEncryptedMedia() | 293 HTMLMediaElementEncryptedMedia::HTMLMediaElementEncryptedMedia(HTMLMediaElement&
element) |
294 : m_emeMode(EmeModeNotSelected) | 294 : m_mediaElement(element) |
| 295 , m_emeMode(EmeModeNotSelected) |
295 , m_isWaitingForKey(false) | 296 , m_isWaitingForKey(false) |
296 { | 297 { |
297 } | 298 } |
298 | 299 |
299 #if !ENABLE(OILPAN) | 300 #if !ENABLE(OILPAN) |
300 HTMLMediaElementEncryptedMedia::~HTMLMediaElementEncryptedMedia() | 301 HTMLMediaElementEncryptedMedia::~HTMLMediaElementEncryptedMedia() |
301 { | 302 { |
302 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::~HTMLMediaElementEncryptedMe
dia"); | 303 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::~HTMLMediaElementEncryptedMe
dia"); |
303 if (m_mediaKeys) | 304 if (m_mediaKeys) |
304 m_mediaKeys->clearMediaElement(); | 305 m_mediaKeys->clearMediaElement(); |
305 } | 306 } |
306 #endif | 307 #endif |
307 | 308 |
308 const char* HTMLMediaElementEncryptedMedia::supplementName() | 309 const char* HTMLMediaElementEncryptedMedia::supplementName() |
309 { | 310 { |
310 return "HTMLMediaElementEncryptedMedia"; | 311 return "HTMLMediaElementEncryptedMedia"; |
311 } | 312 } |
312 | 313 |
313 HTMLMediaElementEncryptedMedia& HTMLMediaElementEncryptedMedia::from(HTMLMediaEl
ement& element) | 314 HTMLMediaElementEncryptedMedia& HTMLMediaElementEncryptedMedia::from(HTMLMediaEl
ement& element) |
314 { | 315 { |
315 HTMLMediaElementEncryptedMedia* supplement = static_cast<HTMLMediaElementEnc
ryptedMedia*>(WillBeHeapSupplement<HTMLMediaElement>::from(element, supplementNa
me())); | 316 HTMLMediaElementEncryptedMedia* supplement = static_cast<HTMLMediaElementEnc
ryptedMedia*>(WillBeHeapSupplement<HTMLMediaElement>::from(element, supplementNa
me())); |
316 if (!supplement) { | 317 if (!supplement) { |
317 supplement = new HTMLMediaElementEncryptedMedia(); | 318 supplement = new HTMLMediaElementEncryptedMedia(element); |
318 provideTo(element, supplementName(), adoptPtrWillBeNoop(supplement)); | 319 provideTo(element, supplementName(), adoptPtrWillBeNoop(supplement)); |
319 } | 320 } |
320 return *supplement; | 321 return *supplement; |
321 } | 322 } |
322 | 323 |
323 bool HTMLMediaElementEncryptedMedia::setEmeMode(EmeMode emeMode) | 324 bool HTMLMediaElementEncryptedMedia::setEmeMode(EmeMode emeMode) |
324 { | 325 { |
325 if (m_emeMode != EmeModeNotSelected && m_emeMode != emeMode) | 326 if (m_emeMode != EmeModeNotSelected && m_emeMode != emeMode) |
326 return false; | 327 return false; |
327 | 328 |
328 m_emeMode = emeMode; | 329 m_emeMode = emeMode; |
329 return true; | 330 return true; |
330 } | 331 } |
331 | 332 |
332 WebContentDecryptionModule* HTMLMediaElementEncryptedMedia::contentDecryptionMod
ule() | |
333 { | |
334 return m_mediaKeys ? m_mediaKeys->contentDecryptionModule() : 0; | |
335 } | |
336 | |
337 MediaKeys* HTMLMediaElementEncryptedMedia::mediaKeys(HTMLMediaElement& element) | 333 MediaKeys* HTMLMediaElementEncryptedMedia::mediaKeys(HTMLMediaElement& element) |
338 { | 334 { |
339 HTMLMediaElementEncryptedMedia& thisElement = HTMLMediaElementEncryptedMedia
::from(element); | 335 HTMLMediaElementEncryptedMedia& thisElement = HTMLMediaElementEncryptedMedia
::from(element); |
340 return thisElement.m_mediaKeys.get(); | 336 return thisElement.m_mediaKeys.get(); |
341 } | 337 } |
342 | 338 |
343 ScriptPromise HTMLMediaElementEncryptedMedia::setMediaKeys(ScriptState* scriptSt
ate, HTMLMediaElement& element, MediaKeys* mediaKeys) | 339 ScriptPromise HTMLMediaElementEncryptedMedia::setMediaKeys(ScriptState* scriptSt
ate, HTMLMediaElement& element, MediaKeys* mediaKeys) |
344 { | 340 { |
345 HTMLMediaElementEncryptedMedia& thisElement = HTMLMediaElementEncryptedMedia
::from(element); | 341 HTMLMediaElementEncryptedMedia& thisElement = HTMLMediaElementEncryptedMedia
::from(element); |
346 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::setMediaKeys current(%p), ne
w(%p)", thisElement.m_mediaKeys.get(), mediaKeys); | 342 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::setMediaKeys current(%p), ne
w(%p)", thisElement.m_mediaKeys.get(), mediaKeys); |
(...skipping 142 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
489 | 485 |
490 if (!webMediaPlayer) { | 486 if (!webMediaPlayer) { |
491 exceptionState.throwDOMException(InvalidStateError, "No media has been l
oaded."); | 487 exceptionState.throwDOMException(InvalidStateError, "No media has been l
oaded."); |
492 return; | 488 return; |
493 } | 489 } |
494 | 490 |
495 WebMediaPlayer::MediaKeyException result = webMediaPlayer->cancelKeyRequest(
keySystem, sessionId); | 491 WebMediaPlayer::MediaKeyException result = webMediaPlayer->cancelKeyRequest(
keySystem, sessionId); |
496 throwExceptionIfMediaKeyExceptionOccurred(keySystem, sessionId, result, exce
ptionState); | 492 throwExceptionIfMediaKeyExceptionOccurred(keySystem, sessionId, result, exce
ptionState); |
497 } | 493 } |
498 | 494 |
499 void HTMLMediaElementEncryptedMedia::keyAdded(HTMLMediaElement& element, const S
tring& keySystem, const String& sessionId) | 495 void HTMLMediaElementEncryptedMedia::keyAdded(const WebString& keySystem, const
WebString& sessionId) |
500 { | 496 { |
501 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::mediaPlayerKeyAdded"); | 497 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::mediaPlayerKeyAdded"); |
502 | 498 |
503 MediaKeyEventInit initializer; | 499 MediaKeyEventInit initializer; |
504 initializer.setKeySystem(keySystem); | 500 initializer.setKeySystem(keySystem); |
505 initializer.setSessionId(sessionId); | 501 initializer.setSessionId(sessionId); |
506 | 502 |
507 RefPtrWillBeRawPtr<Event> event = MediaKeyEvent::create(EventTypeNames::webk
itkeyadded, initializer); | 503 RefPtrWillBeRawPtr<Event> event = MediaKeyEvent::create(EventTypeNames::webk
itkeyadded, initializer); |
508 event->setTarget(&element); | 504 event->setTarget(&m_mediaElement); |
509 element.scheduleEvent(event.release()); | 505 m_mediaElement.scheduleEvent(event.release()); |
510 } | 506 } |
511 | 507 |
512 void HTMLMediaElementEncryptedMedia::keyError(HTMLMediaElement& element, const S
tring& keySystem, const String& sessionId, WebMediaPlayerClient::MediaKeyErrorCo
de errorCode, unsigned short systemCode) | 508 void HTMLMediaElementEncryptedMedia::keyError(const WebString& keySystem, const
WebString& sessionId, WebMediaPlayerEncryptedMediaClient::MediaKeyErrorCode erro
rCode, unsigned short systemCode) |
513 { | 509 { |
514 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::mediaPlayerKeyError: session
ID=%s, errorCode=%d, systemCode=%d", sessionId.utf8().data(), errorCode, systemC
ode); | 510 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::mediaPlayerKeyError: session
ID=%s, errorCode=%d, systemCode=%d", sessionId.utf8().data(), errorCode, systemC
ode); |
515 | 511 |
516 MediaKeyError::Code mediaKeyErrorCode = MediaKeyError::MEDIA_KEYERR_UNKNOWN; | 512 MediaKeyError::Code mediaKeyErrorCode = MediaKeyError::MEDIA_KEYERR_UNKNOWN; |
517 switch (errorCode) { | 513 switch (errorCode) { |
518 case WebMediaPlayerClient::MediaKeyErrorCodeUnknown: | 514 case WebMediaPlayerEncryptedMediaClient::MediaKeyErrorCodeUnknown: |
519 mediaKeyErrorCode = MediaKeyError::MEDIA_KEYERR_UNKNOWN; | 515 mediaKeyErrorCode = MediaKeyError::MEDIA_KEYERR_UNKNOWN; |
520 break; | 516 break; |
521 case WebMediaPlayerClient::MediaKeyErrorCodeClient: | 517 case WebMediaPlayerEncryptedMediaClient::MediaKeyErrorCodeClient: |
522 mediaKeyErrorCode = MediaKeyError::MEDIA_KEYERR_CLIENT; | 518 mediaKeyErrorCode = MediaKeyError::MEDIA_KEYERR_CLIENT; |
523 break; | 519 break; |
524 case WebMediaPlayerClient::MediaKeyErrorCodeService: | 520 case WebMediaPlayerEncryptedMediaClient::MediaKeyErrorCodeService: |
525 mediaKeyErrorCode = MediaKeyError::MEDIA_KEYERR_SERVICE; | 521 mediaKeyErrorCode = MediaKeyError::MEDIA_KEYERR_SERVICE; |
526 break; | 522 break; |
527 case WebMediaPlayerClient::MediaKeyErrorCodeOutput: | 523 case WebMediaPlayerEncryptedMediaClient::MediaKeyErrorCodeOutput: |
528 mediaKeyErrorCode = MediaKeyError::MEDIA_KEYERR_OUTPUT; | 524 mediaKeyErrorCode = MediaKeyError::MEDIA_KEYERR_OUTPUT; |
529 break; | 525 break; |
530 case WebMediaPlayerClient::MediaKeyErrorCodeHardwareChange: | 526 case WebMediaPlayerEncryptedMediaClient::MediaKeyErrorCodeHardwareChange: |
531 mediaKeyErrorCode = MediaKeyError::MEDIA_KEYERR_HARDWARECHANGE; | 527 mediaKeyErrorCode = MediaKeyError::MEDIA_KEYERR_HARDWARECHANGE; |
532 break; | 528 break; |
533 case WebMediaPlayerClient::MediaKeyErrorCodeDomain: | 529 case WebMediaPlayerEncryptedMediaClient::MediaKeyErrorCodeDomain: |
534 mediaKeyErrorCode = MediaKeyError::MEDIA_KEYERR_DOMAIN; | 530 mediaKeyErrorCode = MediaKeyError::MEDIA_KEYERR_DOMAIN; |
535 break; | 531 break; |
536 } | 532 } |
537 | 533 |
538 MediaKeyEventInit initializer; | 534 MediaKeyEventInit initializer; |
539 initializer.setKeySystem(keySystem); | 535 initializer.setKeySystem(keySystem); |
540 initializer.setSessionId(sessionId); | 536 initializer.setSessionId(sessionId); |
541 initializer.setErrorCode(MediaKeyError::create(mediaKeyErrorCode)); | 537 initializer.setErrorCode(MediaKeyError::create(mediaKeyErrorCode)); |
542 initializer.setSystemCode(systemCode); | 538 initializer.setSystemCode(systemCode); |
543 | 539 |
544 RefPtrWillBeRawPtr<Event> event = MediaKeyEvent::create(EventTypeNames::webk
itkeyerror, initializer); | 540 RefPtrWillBeRawPtr<Event> event = MediaKeyEvent::create(EventTypeNames::webk
itkeyerror, initializer); |
545 event->setTarget(&element); | 541 event->setTarget(&m_mediaElement); |
546 element.scheduleEvent(event.release()); | 542 m_mediaElement.scheduleEvent(event.release()); |
547 } | 543 } |
548 | 544 |
549 void HTMLMediaElementEncryptedMedia::keyMessage(HTMLMediaElement& element, const
String& keySystem, const String& sessionId, const unsigned char* message, unsig
ned messageLength, const WebURL& defaultURL) | 545 void HTMLMediaElementEncryptedMedia::keyMessage(const WebString& keySystem, cons
t WebString& sessionId, const unsigned char* message, unsigned messageLength, co
nst WebURL& defaultURL) |
550 { | 546 { |
551 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::mediaPlayerKeyMessage: sessi
onID=%s", sessionId.utf8().data()); | 547 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::mediaPlayerKeyMessage: sessi
onID=%s", sessionId.utf8().data()); |
552 | 548 |
553 MediaKeyEventInit initializer; | 549 MediaKeyEventInit initializer; |
554 initializer.setKeySystem(keySystem); | 550 initializer.setKeySystem(keySystem); |
555 initializer.setSessionId(sessionId); | 551 initializer.setSessionId(sessionId); |
556 initializer.setMessage(DOMUint8Array::create(message, messageLength)); | 552 initializer.setMessage(DOMUint8Array::create(message, messageLength)); |
557 initializer.setDefaultURL(KURL(defaultURL)); | 553 initializer.setDefaultURL(KURL(defaultURL)); |
558 | 554 |
559 RefPtrWillBeRawPtr<Event> event = MediaKeyEvent::create(EventTypeNames::webk
itkeymessage, initializer); | 555 RefPtrWillBeRawPtr<Event> event = MediaKeyEvent::create(EventTypeNames::webk
itkeymessage, initializer); |
560 event->setTarget(&element); | 556 event->setTarget(&m_mediaElement); |
561 element.scheduleEvent(event.release()); | 557 m_mediaElement.scheduleEvent(event.release()); |
562 } | 558 } |
563 | 559 |
564 void HTMLMediaElementEncryptedMedia::encrypted(HTMLMediaElement& element, WebEnc
ryptedMediaInitDataType initDataType, const unsigned char* initData, unsigned in
itDataLength) | 560 void HTMLMediaElementEncryptedMedia::encrypted(WebEncryptedMediaInitDataType ini
tDataType, const unsigned char* initData, unsigned initDataLength) |
565 { | 561 { |
566 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::encrypted"); | 562 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::encrypted"); |
567 | 563 |
568 if (RuntimeEnabledFeatures::encryptedMediaEnabled()) { | 564 if (RuntimeEnabledFeatures::encryptedMediaEnabled()) { |
569 // Send event for WD EME. | 565 // Send event for WD EME. |
570 RefPtrWillBeRawPtr<Event> event; | 566 RefPtrWillBeRawPtr<Event> event; |
571 if (element.isMediaDataCORSSameOrigin(element.executionContext()->securi
tyOrigin())) { | 567 if (m_mediaElement.isMediaDataCORSSameOrigin(m_mediaElement.executionCon
text()->securityOrigin())) { |
572 event = createEncryptedEvent(initDataType, initData, initDataLength)
; | 568 event = createEncryptedEvent(initDataType, initData, initDataLength)
; |
573 } else { | 569 } else { |
574 // Current page is not allowed to see content from the media file, | 570 // Current page is not allowed to see content from the media file, |
575 // so don't return the initData. However, they still get an event. | 571 // so don't return the initData. However, they still get an event. |
576 event = createEncryptedEvent(WebEncryptedMediaInitDataType::Unknown,
nullptr, 0); | 572 event = createEncryptedEvent(WebEncryptedMediaInitDataType::Unknown,
nullptr, 0); |
577 } | 573 } |
578 | 574 |
579 event->setTarget(&element); | 575 event->setTarget(&m_mediaElement); |
580 element.scheduleEvent(event.release()); | 576 m_mediaElement.scheduleEvent(event.release()); |
581 } | 577 } |
582 | 578 |
583 if (RuntimeEnabledFeatures::prefixedEncryptedMediaEnabled()) { | 579 if (RuntimeEnabledFeatures::prefixedEncryptedMediaEnabled()) { |
584 // Send event for v0.1b EME. | 580 // Send event for v0.1b EME. |
585 RefPtrWillBeRawPtr<Event> event = createWebkitNeedKeyEvent(initData, ini
tDataLength); | 581 RefPtrWillBeRawPtr<Event> event = createWebkitNeedKeyEvent(initData, ini
tDataLength); |
586 event->setTarget(&element); | 582 event->setTarget(&m_mediaElement); |
587 element.scheduleEvent(event.release()); | 583 m_mediaElement.scheduleEvent(event.release()); |
588 } | 584 } |
589 } | 585 } |
590 | 586 |
591 void HTMLMediaElementEncryptedMedia::didBlockPlaybackWaitingForKey(HTMLMediaElem
ent& element) | 587 void HTMLMediaElementEncryptedMedia::didBlockPlaybackWaitingForKey() |
592 { | 588 { |
593 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::didBlockPlaybackWaitingForKe
y"); | 589 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::didBlockPlaybackWaitingForKe
y"); |
594 | 590 |
595 // From https://w3c.github.io/encrypted-media/#queue-waitingforkey: | 591 // From https://w3c.github.io/encrypted-media/#queue-waitingforkey: |
596 // It should only be called when the HTMLMediaElement object is potentially | 592 // It should only be called when the HTMLMediaElement object is potentially |
597 // playing and its readyState is equal to HAVE_FUTURE_DATA or greater. | 593 // playing and its readyState is equal to HAVE_FUTURE_DATA or greater. |
598 // FIXME: Is this really required? | 594 // FIXME: Is this really required? |
599 | 595 |
600 // 1. Let the media element be the specified HTMLMediaElement object. | 596 // 1. Let the media element be the specified HTMLMediaElement object. |
601 HTMLMediaElementEncryptedMedia& thisElement = HTMLMediaElementEncryptedMedia
::from(element); | |
602 | |
603 // 2. If the media element's waiting for key value is false, queue a task | 597 // 2. If the media element's waiting for key value is false, queue a task |
604 // to fire a simple event named waitingforkey at the media element. | 598 // to fire a simple event named waitingforkey at the media element. |
605 if (!thisElement.m_isWaitingForKey) { | 599 if (!m_isWaitingForKey) { |
606 RefPtrWillBeRawPtr<Event> event = Event::create(EventTypeNames::waitingf
orkey); | 600 RefPtrWillBeRawPtr<Event> event = Event::create(EventTypeNames::waitingf
orkey); |
607 event->setTarget(&element); | 601 event->setTarget(&m_mediaElement); |
608 element.scheduleEvent(event.release()); | 602 m_mediaElement.scheduleEvent(event.release()); |
609 } | 603 } |
610 | 604 |
611 // 3. Set the media element's waiting for key value to true. | 605 // 3. Set the media element's waiting for key value to true. |
612 thisElement.m_isWaitingForKey = true; | 606 m_isWaitingForKey = true; |
613 | 607 |
614 // 4. Suspend playback. | 608 // 4. Suspend playback. |
615 // (Already done on the Chromium side by the decryptors.) | 609 // (Already done on the Chromium side by the decryptors.) |
616 } | 610 } |
617 | 611 |
618 void HTMLMediaElementEncryptedMedia::didResumePlaybackBlockedForKey(HTMLMediaEle
ment& element) | 612 void HTMLMediaElementEncryptedMedia::didResumePlaybackBlockedForKey() |
619 { | 613 { |
620 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::didResumePlaybackBlockedForK
ey"); | 614 WTF_LOG(Media, "HTMLMediaElementEncryptedMedia::didResumePlaybackBlockedForK
ey"); |
621 | 615 |
622 // Logic is on the Chromium side to attempt to resume playback when a new | 616 // Logic is on the Chromium side to attempt to resume playback when a new |
623 // key is available. However, |m_isWaitingForKey| needs to be cleared so | 617 // key is available. However, |m_isWaitingForKey| needs to be cleared so |
624 // that a later waitingForKey() call can generate the event. | 618 // that a later waitingForKey() call can generate the event. |
625 HTMLMediaElementEncryptedMedia& thisElement = HTMLMediaElementEncryptedMedia
::from(element); | 619 m_isWaitingForKey = false; |
626 thisElement.m_isWaitingForKey = false; | |
627 } | 620 } |
628 | 621 |
629 WebContentDecryptionModule* HTMLMediaElementEncryptedMedia::contentDecryptionMod
ule(HTMLMediaElement& element) | 622 WebContentDecryptionModule* HTMLMediaElementEncryptedMedia::contentDecryptionMod
ule() |
630 { | 623 { |
631 HTMLMediaElementEncryptedMedia& thisElement = HTMLMediaElementEncryptedMedia
::from(element); | 624 return m_mediaKeys ? m_mediaKeys->contentDecryptionModule() : 0; |
632 return thisElement.contentDecryptionModule(); | |
633 } | 625 } |
634 | 626 |
635 DEFINE_TRACE(HTMLMediaElementEncryptedMedia) | 627 DEFINE_TRACE(HTMLMediaElementEncryptedMedia) |
636 { | 628 { |
637 visitor->trace(m_mediaKeys); | 629 visitor->trace(m_mediaKeys); |
638 WillBeHeapSupplement<HTMLMediaElement>::trace(visitor); | 630 WillBeHeapSupplement<HTMLMediaElement>::trace(visitor); |
639 } | 631 } |
640 | 632 |
641 } // namespace blink | 633 } // namespace blink |
OLD | NEW |