Chromium Code Reviews| Index: media/base/android/media_drm_bridge.cc |
| diff --git a/media/base/android/media_drm_bridge.cc b/media/base/android/media_drm_bridge.cc |
| index 14bdbda03f0ac81e2f32ea958d02103f3b91e3d1..5ff49ee017c02f024aa8c6aafd2b8f11490ff21c 100644 |
| --- a/media/base/android/media_drm_bridge.cc |
| +++ b/media/base/android/media_drm_bridge.cc |
| @@ -9,6 +9,7 @@ |
| #include "base/android/build_info.h" |
| #include "base/android/jni_array.h" |
| #include "base/android/jni_string.h" |
| +#include "base/bind.h" |
| #include "base/callback_helpers.h" |
| #include "base/containers/hash_tables.h" |
| #include "base/lazy_instance.h" |
| @@ -23,11 +24,23 @@ |
| #include "base/thread_task_runner_handle.h" |
| #include "jni/MediaDrmBridge_jni.h" |
| #include "media/base/android/media_client_android.h" |
| +#include "media/base/android/media_codec_player.h" // for GetMediaTaskRunner() |
| #include "media/base/android/media_drm_bridge_delegate.h" |
| #include "media/base/cdm_key_information.h" |
| #include "widevine_cdm_version.h" // In SHARED_INTERMEDIATE_DIR. |
| +#define RUN_CB_ON_MEDIA_THREAD(cb, ...) \ |
| + do { \ |
| + if (run_on_media_thread_ && \ |
| + !GetMediaTaskRunner()->BelongsToCurrentThread()) { \ |
| + GetMediaTaskRunner()->PostTask(FROM_HERE, \ |
| + base::Bind(cb, ##__VA_ARGS__)); \ |
| + } else { \ |
| + cb.Run(__VA_ARGS__); \ |
| + } \ |
| + } while (0) |
| + |
| using base::android::AttachCurrentThread; |
| using base::android::ConvertUTF8ToJavaString; |
| using base::android::ConvertJavaStringToUTF8; |
| @@ -228,6 +241,31 @@ bool MediaDrmBridge::IsAvailable() { |
| return true; |
| } |
| +// static |
| +bool MediaDrmBridge::CanCreate(const std::string& key_system, |
| + SecurityLevel widevine_security_level) { |
| + if (!IsAvailable()) { |
| + DVLOG(1) << __FUNCTION__ << ": DRM is not available"; |
| + return false; |
| + } |
| + |
| + UUID scheme_uuid = g_key_system_manager.Get().GetUUID(key_system); |
| + if (scheme_uuid.empty()) { |
| + DVLOG(1) << __FUNCTION__ << ": key system " << key_system |
| + << " not supported"; |
| + return false; |
| + } |
| + |
| + if (key_system == kWidevineKeySystem && |
| + widevine_security_level != SECURITY_LEVEL_NONE && |
| + !std::equal(scheme_uuid.begin(), scheme_uuid.end(), kWidevineUuid)) { |
| + NOTREACHED() << "Widevine security level " << widevine_security_level |
| + << "used with another key system"; |
| + return false; |
| + } |
| + return true; |
| +} |
| + |
| // TODO(ddorwin): This is specific to Widevine. http://crbug.com/459400 |
| // static |
| bool MediaDrmBridge::IsSecureDecoderRequired(SecurityLevel security_level) { |
| @@ -254,6 +292,7 @@ bool MediaDrmBridge::IsKeySystemSupportedWithType( |
| return IsKeySystemSupportedWithTypeImpl(key_system, container_mime_type); |
| } |
| +// static |
| bool MediaDrmBridge::RegisterMediaDrmBridge(JNIEnv* env) { |
| return RegisterNativesImpl(env); |
| } |
| @@ -270,7 +309,29 @@ MediaDrmBridge::MediaDrmBridge( |
| session_closed_cb_(session_closed_cb), |
| legacy_session_error_cb_(legacy_session_error_cb), |
| session_keys_change_cb_(session_keys_change_cb), |
| - session_expiration_update_cb_(session_expiration_update_cb) { |
| + session_expiration_update_cb_(session_expiration_update_cb), |
| + run_on_media_thread_(false), |
| + weak_factory_(this) { |
| + DVLOG(1) << "MediaDrmBridge::MediaDrmBridge"; |
| + |
| + // When this flag is set we need to repost the notifications about |
| + // crypto became ready and a key had been added to the Media thread. |
| + run_on_media_thread_ = GetMediaTaskRunner()->BelongsToCurrentThread(); |
| + |
| + // Create internal callbacks to repost Java new key notification and |
| + // promise related notifications to the media thread. |
| + |
| + base::WeakPtr<MediaDrmBridge> weak_this = weak_factory_.GetWeakPtr(); |
| + |
| + internal_keys_added_cb_ = |
| + base::Bind(&MediaDrmBridge::InternalKeysAdded, weak_this); |
| + internal_promise_resolved_cb_ = |
| + base::Bind(&MediaDrmBridge::InternalPromiseResolved, weak_this); |
| + internal_promise_resolved_with_session_cb_ = base::Bind( |
| + &MediaDrmBridge::InternalPromiseResolvedWithSession, weak_this); |
| + internal_promise_rejected_cb_ = |
| + base::Bind(&MediaDrmBridge::InternalPromiseRejected, weak_this); |
| + |
| JNIEnv* env = AttachCurrentThread(); |
| CHECK(env); |
| @@ -288,14 +349,15 @@ MediaDrmBridge::~MediaDrmBridge() { |
| } |
| // static |
| -scoped_ptr<MediaDrmBridge> MediaDrmBridge::Create( |
| +scoped_ptr<MediaDrmBridge, BrowserCdmDeleter> MediaDrmBridge::Create( |
| const std::string& key_system, |
| + SecurityLevel widevine_security_level, |
| const SessionMessageCB& session_message_cb, |
| const SessionClosedCB& session_closed_cb, |
| const LegacySessionErrorCB& legacy_session_error_cb, |
| const SessionKeysChangeCB& session_keys_change_cb, |
| const SessionExpirationUpdateCB& session_expiration_update_cb) { |
| - scoped_ptr<MediaDrmBridge> media_drm_bridge; |
| + scoped_ptr<MediaDrmBridge, BrowserCdmDeleter> media_drm_bridge; |
| if (!IsAvailable()) |
| return media_drm_bridge.Pass(); |
| @@ -311,15 +373,24 @@ scoped_ptr<MediaDrmBridge> MediaDrmBridge::Create( |
| if (media_drm_bridge->j_media_drm_.is_null()) |
| media_drm_bridge.reset(); |
| + if (key_system == kWidevineKeySystem && |
|
ddorwin
2015/09/16 20:42:21
We shouldn't need the WV check here again.
|
| + widevine_security_level != SECURITY_LEVEL_NONE && |
| + !media_drm_bridge->SetSecurityLevel(widevine_security_level)) { |
| + DVLOG(1) << __FUNCTION__ << ": failed to set security level " |
| + << widevine_security_level; |
| + media_drm_bridge.reset(); |
| + } |
| + |
| return media_drm_bridge.Pass(); |
| } |
| // static |
| -scoped_ptr<MediaDrmBridge> MediaDrmBridge::CreateWithoutSessionSupport( |
| - const std::string& key_system) { |
| - return MediaDrmBridge::Create( |
| - key_system, SessionMessageCB(), SessionClosedCB(), LegacySessionErrorCB(), |
| - SessionKeysChangeCB(), SessionExpirationUpdateCB()); |
| +scoped_ptr<MediaDrmBridge, BrowserCdmDeleter> |
| +MediaDrmBridge::CreateWithoutSessionSupport(const std::string& key_system) { |
| + return MediaDrmBridge::Create(key_system, SECURITY_LEVEL_NONE, |
| + SessionMessageCB(), SessionClosedCB(), |
| + LegacySessionErrorCB(), SessionKeysChangeCB(), |
| + SessionExpirationUpdateCB()); |
| } |
| bool MediaDrmBridge::SetSecurityLevel(SecurityLevel security_level) { |
| @@ -425,7 +496,7 @@ void MediaDrmBridge::UpdateSession( |
| const std::string& session_id, |
| const std::vector<uint8_t>& response, |
| scoped_ptr<media::SimpleCdmPromise> promise) { |
| - DVLOG(1) << __FUNCTION__; |
| + DVLOG(1) << __FUNCTION__ << " session_id:" << session_id; |
| JNIEnv* env = AttachCurrentThread(); |
| ScopedJavaLocalRef<jbyteArray> j_response = base::android::ToJavaByteArray( |
| @@ -441,6 +512,7 @@ void MediaDrmBridge::UpdateSession( |
| void MediaDrmBridge::CloseSession(const std::string& session_id, |
| scoped_ptr<media::SimpleCdmPromise> promise) { |
| DVLOG(1) << __FUNCTION__; |
| + |
| JNIEnv* env = AttachCurrentThread(); |
| ScopedJavaLocalRef<jbyteArray> j_session_id = base::android::ToJavaByteArray( |
| env, reinterpret_cast<const uint8_t*>(session_id.data()), |
| @@ -472,6 +544,8 @@ void MediaDrmBridge::UnregisterPlayer(int registration_id) { |
| } |
| void MediaDrmBridge::SetMediaCryptoReadyCB(const base::Closure& closure) { |
| + DVLOG(1) << "MediaDrmBridge::" << __FUNCTION__; |
| + |
| if (closure.is_null()) { |
| media_crypto_ready_cb_.Reset(); |
| return; |
| @@ -487,32 +561,62 @@ void MediaDrmBridge::SetMediaCryptoReadyCB(const base::Closure& closure) { |
| media_crypto_ready_cb_ = closure; |
| } |
| -void MediaDrmBridge::OnMediaCryptoReady(JNIEnv* env, jobject) { |
| +void MediaDrmBridge::OnMediaCryptoReady(JNIEnv* env, jobject j_media_drm) { |
| + DVLOG(1) << "MediaDrmBridge::" << __FUNCTION__; |
| + |
| DCHECK(!GetMediaCrypto().is_null()); |
| - if (!media_crypto_ready_cb_.is_null()) |
| - base::ResetAndReturn(&media_crypto_ready_cb_).Run(); |
| + |
| + if (media_crypto_ready_cb_.is_null()) |
| + return; |
| + |
| + RUN_CB_ON_MEDIA_THREAD(base::ResetAndReturn(&media_crypto_ready_cb_)); |
| } |
| void MediaDrmBridge::OnPromiseResolved(JNIEnv* env, |
| jobject j_media_drm, |
| jint j_promise_id) { |
| - cdm_promise_adapter_.ResolvePromise(j_promise_id); |
| + DVLOG(1) << "MediaDrmBridge::" << __FUNCTION__; |
| + RUN_CB_ON_MEDIA_THREAD(internal_promise_resolved_cb_, j_promise_id); |
| +} |
| + |
| +void MediaDrmBridge::InternalPromiseResolved(uint32_t promise_id) { |
| + DVLOG(1) << "MediaDrmBridge::" << __FUNCTION__ |
| + << ": promise_id:" << promise_id; |
| + cdm_promise_adapter_.ResolvePromise(promise_id); |
| } |
| void MediaDrmBridge::OnPromiseResolvedWithSession(JNIEnv* env, |
| jobject j_media_drm, |
| jint j_promise_id, |
| jbyteArray j_session_id) { |
| - cdm_promise_adapter_.ResolvePromise(j_promise_id, |
| - GetSessionId(env, j_session_id)); |
| + DVLOG(1) << "MediaDrmBridge::" << __FUNCTION__; |
| + RUN_CB_ON_MEDIA_THREAD(internal_promise_resolved_with_session_cb_, |
| + j_promise_id, GetSessionId(env, j_session_id)); |
| +} |
| + |
| +void MediaDrmBridge::InternalPromiseResolvedWithSession( |
| + uint32_t promise_id, |
| + const std::string& session_id) { |
| + DVLOG(1) << "MediaDrmBridge::" << __FUNCTION__ |
| + << ": promise_id:" << promise_id << " session_id:" << session_id; |
| + cdm_promise_adapter_.ResolvePromise(promise_id, session_id); |
| } |
| void MediaDrmBridge::OnPromiseRejected(JNIEnv* env, |
| jobject j_media_drm, |
| jint j_promise_id, |
| jstring j_error_message) { |
| + DVLOG(1) << "MediaDrmBridge::" << __FUNCTION__; |
| std::string error_message = ConvertJavaStringToUTF8(env, j_error_message); |
| - cdm_promise_adapter_.RejectPromise(j_promise_id, MediaKeys::UNKNOWN_ERROR, 0, |
| + RUN_CB_ON_MEDIA_THREAD(internal_promise_rejected_cb_, j_promise_id, |
| + error_message); |
| +} |
| + |
| +void MediaDrmBridge::InternalPromiseRejected(uint32_t promise_id, |
| + const std::string& error_message) { |
| + DVLOG(1) << "MediaDrmBridge::" << __FUNCTION__ |
| + << ": promise_id:" << promise_id << " error:" << error_message; |
| + cdm_promise_adapter_.RejectPromise(promise_id, MediaKeys::UNKNOWN_ERROR, 0, |
| error_message); |
| } |
| @@ -529,14 +633,26 @@ void MediaDrmBridge::OnSessionMessage(JNIEnv* env, |
| MediaKeys::MessageType message_type = |
| GetMessageType(static_cast<RequestType>(j_message_type)); |
| - session_message_cb_.Run(GetSessionId(env, j_session_id), message_type, |
| - message, legacy_destination_url); |
| + std::string session_id = GetSessionId(env, j_session_id); |
| + |
| + DVLOG(1) << "MediaDrmBridge::" << __FUNCTION__ |
| + << " session_id:" << session_id; |
| + |
| + // We need to preserve the order of messages. If the promise-related |
| + // callbacks are posted to the Media thread, we have to do the same with |
| + // all callbacks. See the comment in media_drm_proxy.h. |
| + RUN_CB_ON_MEDIA_THREAD(session_message_cb_, session_id, message_type, message, |
| + legacy_destination_url); |
| } |
| void MediaDrmBridge::OnSessionClosed(JNIEnv* env, |
| jobject j_media_drm, |
| jbyteArray j_session_id) { |
| - session_closed_cb_.Run(GetSessionId(env, j_session_id)); |
| + std::string session_id = GetSessionId(env, j_session_id); |
| + DVLOG(1) << "MediaDrmBridge::" << __FUNCTION__ |
| + << " session_id:" << session_id; |
| + |
| + RUN_CB_ON_MEDIA_THREAD(session_closed_cb_, session_id); |
|
ddorwin
2015/09/16 20:42:21
Should it be up to the caller to ensure this? At w
|
| } |
| void MediaDrmBridge::OnSessionKeysChange(JNIEnv* env, |
| @@ -544,8 +660,7 @@ void MediaDrmBridge::OnSessionKeysChange(JNIEnv* env, |
| jbyteArray j_session_id, |
| jobjectArray j_keys_info, |
| bool has_additional_usable_key) { |
| - if (has_additional_usable_key) |
| - player_tracker_.NotifyNewKey(); |
| + DVLOG(1) << "MediaDrmBridge::" << __FUNCTION__; |
| CdmKeysInfo cdm_keys_info; |
| @@ -579,8 +694,24 @@ void MediaDrmBridge::OnSessionKeysChange(JNIEnv* env, |
| cdm_keys_info.push_back(cdm_key_information.release()); |
| } |
| - session_keys_change_cb_.Run(GetSessionId(env, j_session_id), |
| - has_additional_usable_key, cdm_keys_info.Pass()); |
| + RUN_CB_ON_MEDIA_THREAD(internal_keys_added_cb_, has_additional_usable_key); |
| + |
| + std::string session_id = GetSessionId(env, j_session_id); |
| + |
| + if (run_on_media_thread_ && !GetMediaTaskRunner()->BelongsToCurrentThread()) { |
| + GetMediaTaskRunner()->PostTask( |
| + FROM_HERE, |
| + base::Bind(session_keys_change_cb_, session_id, |
| + has_additional_usable_key, base::Passed(&cdm_keys_info))); |
| + } else { |
| + session_keys_change_cb_.Run(session_id, has_additional_usable_key, |
| + cdm_keys_info.Pass()); |
| + } |
| +} |
| + |
| +void MediaDrmBridge::InternalKeysAdded(bool has_additional_usable_key) { |
| + if (has_additional_usable_key) |
| + player_tracker_.NotifyNewKey(); |
| } |
| // According to MeidaDrm documentation [1], zero |expiry_time_ms| means the keys |
| @@ -597,19 +728,27 @@ void MediaDrmBridge::OnSessionExpirationUpdate(JNIEnv* env, |
| jobject j_media_drm, |
| jbyteArray j_session_id, |
| jlong expiry_time_ms) { |
| - DVLOG(2) << __FUNCTION__ << ": " << expiry_time_ms << " ms"; |
| - session_expiration_update_cb_.Run( |
| - GetSessionId(env, j_session_id), |
| - base::Time::FromDoubleT(expiry_time_ms / 1000.0)); |
| + std::string session_id = GetSessionId(env, j_session_id); |
| + DVLOG(1) << "MediaDrmBridge::" << __FUNCTION__ |
| + << ": session_id:" << session_id << " expiration:" << expiry_time_ms |
| + << " ms"; |
| + |
| + RUN_CB_ON_MEDIA_THREAD(session_expiration_update_cb_, session_id, |
| + base::Time::FromDoubleT(expiry_time_ms / 1000.0)); |
| } |
| void MediaDrmBridge::OnLegacySessionError(JNIEnv* env, |
| jobject j_media_drm, |
| jbyteArray j_session_id, |
| jstring j_error_message) { |
| + std::string session_id = GetSessionId(env, j_session_id); |
| std::string error_message = ConvertJavaStringToUTF8(env, j_error_message); |
| - legacy_session_error_cb_.Run(GetSessionId(env, j_session_id), |
| - MediaKeys::UNKNOWN_ERROR, 0, error_message); |
| + |
| + DVLOG(1) << "MediaDrmBridge::" << __FUNCTION__ << " session_id:" << session_id |
| + << " error:" << error_message; |
| + |
| + RUN_CB_ON_MEDIA_THREAD(legacy_session_error_cb_, session_id, |
| + MediaKeys::UNKNOWN_ERROR, 0, error_message); |
| } |
| ScopedJavaLocalRef<jobject> MediaDrmBridge::GetMediaCrypto() { |
| @@ -645,7 +784,9 @@ void MediaDrmBridge::ResetDeviceCredentials( |
| void MediaDrmBridge::OnResetDeviceCredentialsCompleted( |
| JNIEnv* env, jobject, bool success) { |
| - base::ResetAndReturn(&reset_credentials_cb_).Run(success); |
| + DVLOG(1) << "MediaDrmBridge::" << __FUNCTION__ << ": success:" << success; |
| + |
| + RUN_CB_ON_MEDIA_THREAD(base::ResetAndReturn(&reset_credentials_cb_), success); |
| } |
| } // namespace media |