Chromium Code Reviews| Index: media/base/android/media_drm_bridge.cc |
| diff --git a/media/base/android/media_drm_bridge.cc b/media/base/android/media_drm_bridge.cc |
| index 14bdbda03f0ac81e2f32ea958d02103f3b91e3d1..128d45d9eef4392f86797afedbfd888e0e375c52 100644 |
| --- a/media/base/android/media_drm_bridge.cc |
| +++ b/media/base/android/media_drm_bridge.cc |
| @@ -9,6 +9,7 @@ |
| #include "base/android/build_info.h" |
| #include "base/android/jni_array.h" |
| #include "base/android/jni_string.h" |
| +#include "base/bind.h" |
| #include "base/callback_helpers.h" |
| #include "base/containers/hash_tables.h" |
| #include "base/lazy_instance.h" |
| @@ -23,11 +24,23 @@ |
| #include "base/thread_task_runner_handle.h" |
| #include "jni/MediaDrmBridge_jni.h" |
| #include "media/base/android/media_client_android.h" |
| +#include "media/base/android/media_codec_player.h" // for GetMediaTaskRunner() |
| #include "media/base/android/media_drm_bridge_delegate.h" |
| #include "media/base/cdm_key_information.h" |
| #include "widevine_cdm_version.h" // In SHARED_INTERMEDIATE_DIR. |
| +#define RUN_CB_ON_MEDIA_THREAD(CB, ...) \ |
|
qinmin
2015/09/15 21:10:44
s/CB/cb/
Tima Vaisburd
2015/09/15 23:48:55
Done.
|
| + do { \ |
| + if (run_on_media_thread_ && \ |
| + !GetMediaTaskRunner()->BelongsToCurrentThread()) { \ |
| + GetMediaTaskRunner()->PostTask(FROM_HERE, \ |
| + base::Bind(CB, ##__VA_ARGS__)); \ |
| + } else { \ |
| + CB.Run(__VA_ARGS__); \ |
| + } \ |
| + } while (0) |
| + |
| using base::android::AttachCurrentThread; |
| using base::android::ConvertUTF8ToJavaString; |
| using base::android::ConvertJavaStringToUTF8; |
| @@ -228,6 +241,31 @@ bool MediaDrmBridge::IsAvailable() { |
| return true; |
| } |
| +// static |
| +bool MediaDrmBridge::CanCreate(const std::string& key_system, |
| + SecurityLevel widevine_security_level) { |
| + if (!IsAvailable()) { |
| + DVLOG(1) << __FUNCTION__ << ": DRM is not available"; |
| + return false; |
| + } |
| + |
| + UUID scheme_uuid = g_key_system_manager.Get().GetUUID(key_system); |
| + if (scheme_uuid.empty()) { |
| + DVLOG(1) << __FUNCTION__ << ": key system " << key_system |
| + << " not supported"; |
| + return false; |
| + } |
| + |
| + if (key_system == kWidevineKeySystem && |
| + widevine_security_level != SECURITY_LEVEL_NONE && |
| + !std::equal(scheme_uuid.begin(), scheme_uuid.end(), kWidevineUuid)) { |
| + NOTREACHED() << "Widevine security level " << widevine_security_level |
| + << "used with another key system"; |
| + return false; |
| + } |
| + return true; |
| +} |
| + |
| // TODO(ddorwin): This is specific to Widevine. http://crbug.com/459400 |
| // static |
| bool MediaDrmBridge::IsSecureDecoderRequired(SecurityLevel security_level) { |
| @@ -254,6 +292,7 @@ bool MediaDrmBridge::IsKeySystemSupportedWithType( |
| return IsKeySystemSupportedWithTypeImpl(key_system, container_mime_type); |
| } |
| +// static |
| bool MediaDrmBridge::RegisterMediaDrmBridge(JNIEnv* env) { |
| return RegisterNativesImpl(env); |
| } |
| @@ -270,7 +309,29 @@ MediaDrmBridge::MediaDrmBridge( |
| session_closed_cb_(session_closed_cb), |
| legacy_session_error_cb_(legacy_session_error_cb), |
| session_keys_change_cb_(session_keys_change_cb), |
| - session_expiration_update_cb_(session_expiration_update_cb) { |
| + session_expiration_update_cb_(session_expiration_update_cb), |
| + run_on_media_thread_(false), |
| + weak_factory_(this) { |
| + DVLOG(1) << "MediaDrmBridge::MediaDrmBridge"; |
| + |
| + // When this flag is set we need to repost the notifications about |
| + // crypto became ready and a key had been added to the Media thread. |
| + run_on_media_thread_ = GetMediaTaskRunner()->BelongsToCurrentThread(); |
| + |
| + // Create internal callbacks to repost Java new key notification and |
| + // promise related notifications to the media thread. |
| + |
| + base::WeakPtr<MediaDrmBridge> weak_this = weak_factory_.GetWeakPtr(); |
| + |
| + internal_keys_added_cb_ = |
| + base::Bind(&MediaDrmBridge::InternalKeysAdded, weak_this); |
| + internal_promise_resolved_cb_ = |
| + base::Bind(&MediaDrmBridge::InternalPromiseResolved, weak_this); |
| + internal_promise_resolved_with_session_cb_ = base::Bind( |
| + &MediaDrmBridge::InternalPromiseResolvedWithSession, weak_this); |
| + internal_promise_rejected_cb_ = |
| + base::Bind(&MediaDrmBridge::InternalPromiseRejected, weak_this); |
| + |
| JNIEnv* env = AttachCurrentThread(); |
| CHECK(env); |
| @@ -288,14 +349,15 @@ MediaDrmBridge::~MediaDrmBridge() { |
| } |
| // static |
| -scoped_ptr<MediaDrmBridge> MediaDrmBridge::Create( |
| +scoped_ptr<MediaDrmBridge, BrowserCdmDeleter> MediaDrmBridge::Create( |
| const std::string& key_system, |
| + SecurityLevel widevine_security_level, |
| const SessionMessageCB& session_message_cb, |
| const SessionClosedCB& session_closed_cb, |
| const LegacySessionErrorCB& legacy_session_error_cb, |
| const SessionKeysChangeCB& session_keys_change_cb, |
| const SessionExpirationUpdateCB& session_expiration_update_cb) { |
| - scoped_ptr<MediaDrmBridge> media_drm_bridge; |
| + scoped_ptr<MediaDrmBridge, BrowserCdmDeleter> media_drm_bridge; |
| if (!IsAvailable()) |
| return media_drm_bridge.Pass(); |
| @@ -311,15 +373,24 @@ scoped_ptr<MediaDrmBridge> MediaDrmBridge::Create( |
| if (media_drm_bridge->j_media_drm_.is_null()) |
| media_drm_bridge.reset(); |
| + if (key_system == kWidevineKeySystem && |
| + widevine_security_level != SECURITY_LEVEL_NONE && |
| + !media_drm_bridge->SetSecurityLevel(widevine_security_level)) { |
| + DVLOG(1) << __FUNCTION__ << ": failed to set security level " |
| + << widevine_security_level; |
| + media_drm_bridge.reset(); |
| + } |
| + |
| return media_drm_bridge.Pass(); |
| } |
| // static |
| -scoped_ptr<MediaDrmBridge> MediaDrmBridge::CreateWithoutSessionSupport( |
| - const std::string& key_system) { |
| - return MediaDrmBridge::Create( |
| - key_system, SessionMessageCB(), SessionClosedCB(), LegacySessionErrorCB(), |
| - SessionKeysChangeCB(), SessionExpirationUpdateCB()); |
| +scoped_ptr<MediaDrmBridge, BrowserCdmDeleter> |
| +MediaDrmBridge::CreateWithoutSessionSupport(const std::string& key_system) { |
| + return MediaDrmBridge::Create(key_system, SECURITY_LEVEL_NONE, |
| + SessionMessageCB(), SessionClosedCB(), |
| + LegacySessionErrorCB(), SessionKeysChangeCB(), |
| + SessionExpirationUpdateCB()); |
| } |
| bool MediaDrmBridge::SetSecurityLevel(SecurityLevel security_level) { |
| @@ -472,6 +543,8 @@ void MediaDrmBridge::UnregisterPlayer(int registration_id) { |
| } |
| void MediaDrmBridge::SetMediaCryptoReadyCB(const base::Closure& closure) { |
| + DVLOG(1) << "MediaDrmBridge::" << __FUNCTION__; |
| + |
| if (closure.is_null()) { |
| media_crypto_ready_cb_.Reset(); |
| return; |
| @@ -487,32 +560,62 @@ void MediaDrmBridge::SetMediaCryptoReadyCB(const base::Closure& closure) { |
| media_crypto_ready_cb_ = closure; |
| } |
| -void MediaDrmBridge::OnMediaCryptoReady(JNIEnv* env, jobject) { |
| +void MediaDrmBridge::OnMediaCryptoReady(JNIEnv* env, jobject j_media_drm) { |
| + DVLOG(1) << "MediaDrmBridge::" << __FUNCTION__; |
| + |
| DCHECK(!GetMediaCrypto().is_null()); |
| - if (!media_crypto_ready_cb_.is_null()) |
| - base::ResetAndReturn(&media_crypto_ready_cb_).Run(); |
| + |
| + if (media_crypto_ready_cb_.is_null()) |
| + return; |
| + |
| + RUN_CB_ON_MEDIA_THREAD(base::ResetAndReturn(&media_crypto_ready_cb_)); |
| } |
| void MediaDrmBridge::OnPromiseResolved(JNIEnv* env, |
| jobject j_media_drm, |
| jint j_promise_id) { |
| - cdm_promise_adapter_.ResolvePromise(j_promise_id); |
| + DVLOG(1) << "MediaDrmBridge::" << __FUNCTION__; |
| + RUN_CB_ON_MEDIA_THREAD(internal_promise_resolved_cb_, j_promise_id); |
| +} |
| + |
| +void MediaDrmBridge::InternalPromiseResolved(uint32_t promise_id) { |
| + DVLOG(1) << "MediaDrmBridge::" << __FUNCTION__ |
| + << ": promise_id:" << promise_id; |
| + cdm_promise_adapter_.ResolvePromise(promise_id); |
| } |
| void MediaDrmBridge::OnPromiseResolvedWithSession(JNIEnv* env, |
| jobject j_media_drm, |
| jint j_promise_id, |
| jbyteArray j_session_id) { |
| - cdm_promise_adapter_.ResolvePromise(j_promise_id, |
| - GetSessionId(env, j_session_id)); |
| + DVLOG(1) << "MediaDrmBridge::" << __FUNCTION__; |
| + RUN_CB_ON_MEDIA_THREAD(internal_promise_resolved_with_session_cb_, |
| + j_promise_id, GetSessionId(env, j_session_id)); |
| +} |
| + |
| +void MediaDrmBridge::InternalPromiseResolvedWithSession( |
| + uint32_t promise_id, |
| + const std::string& session_id) { |
| + DVLOG(1) << "MediaDrmBridge::" << __FUNCTION__ |
| + << ": promise_id:" << promise_id; |
| + cdm_promise_adapter_.ResolvePromise(promise_id, session_id); |
| } |
| void MediaDrmBridge::OnPromiseRejected(JNIEnv* env, |
| jobject j_media_drm, |
| jint j_promise_id, |
| jstring j_error_message) { |
| + DVLOG(1) << "MediaDrmBridge::" << __FUNCTION__; |
| std::string error_message = ConvertJavaStringToUTF8(env, j_error_message); |
| - cdm_promise_adapter_.RejectPromise(j_promise_id, MediaKeys::UNKNOWN_ERROR, 0, |
| + RUN_CB_ON_MEDIA_THREAD(internal_promise_rejected_cb_, j_promise_id, |
| + error_message); |
| +} |
| + |
| +void MediaDrmBridge::InternalPromiseRejected(uint32_t promise_id, |
| + const std::string& error_message) { |
| + DVLOG(1) << "MediaDrmBridge::" << __FUNCTION__ |
| + << ": promise_id:" << promise_id << " error:" << error_message; |
| + cdm_promise_adapter_.RejectPromise(promise_id, MediaKeys::UNKNOWN_ERROR, 0, |
| error_message); |
| } |
| @@ -522,6 +625,8 @@ void MediaDrmBridge::OnSessionMessage(JNIEnv* env, |
| jint j_message_type, |
| jbyteArray j_message, |
| jstring j_legacy_destination_url) { |
| + DVLOG(1) << "MediaDrmBridge::" << __FUNCTION__; |
| + |
| std::vector<uint8> message; |
| JavaByteArrayToByteVector(env, j_message, &message); |
| GURL legacy_destination_url = |
| @@ -536,6 +641,7 @@ void MediaDrmBridge::OnSessionMessage(JNIEnv* env, |
| void MediaDrmBridge::OnSessionClosed(JNIEnv* env, |
| jobject j_media_drm, |
| jbyteArray j_session_id) { |
| + DVLOG(1) << "MediaDrmBridge::" << __FUNCTION__; |
| session_closed_cb_.Run(GetSessionId(env, j_session_id)); |
| } |
| @@ -544,8 +650,7 @@ void MediaDrmBridge::OnSessionKeysChange(JNIEnv* env, |
| jbyteArray j_session_id, |
| jobjectArray j_keys_info, |
| bool has_additional_usable_key) { |
| - if (has_additional_usable_key) |
| - player_tracker_.NotifyNewKey(); |
| + DVLOG(1) << "MediaDrmBridge::" << __FUNCTION__; |
| CdmKeysInfo cdm_keys_info; |
| @@ -579,10 +684,17 @@ void MediaDrmBridge::OnSessionKeysChange(JNIEnv* env, |
| cdm_keys_info.push_back(cdm_key_information.release()); |
| } |
| + RUN_CB_ON_MEDIA_THREAD(internal_keys_added_cb_, has_additional_usable_key); |
| + |
| session_keys_change_cb_.Run(GetSessionId(env, j_session_id), |
| has_additional_usable_key, cdm_keys_info.Pass()); |
| } |
| +void MediaDrmBridge::InternalKeysAdded(bool has_additional_usable_key) { |
| + if (has_additional_usable_key) |
| + player_tracker_.NotifyNewKey(); |
| +} |
| + |
| // According to MeidaDrm documentation [1], zero |expiry_time_ms| means the keys |
| // will never expire. This will be translated into a NULL base::Time() [2], |
| // which will then be mapped to a zero Java time [3]. The zero Java time is |
| @@ -607,6 +719,7 @@ void MediaDrmBridge::OnLegacySessionError(JNIEnv* env, |
| jobject j_media_drm, |
| jbyteArray j_session_id, |
| jstring j_error_message) { |
| + DVLOG(1) << "MediaDrmBridge::" << __FUNCTION__; |
| std::string error_message = ConvertJavaStringToUTF8(env, j_error_message); |
| legacy_session_error_cb_.Run(GetSessionId(env, j_session_id), |
| MediaKeys::UNKNOWN_ERROR, 0, error_message); |
| @@ -645,6 +758,8 @@ void MediaDrmBridge::ResetDeviceCredentials( |
| void MediaDrmBridge::OnResetDeviceCredentialsCompleted( |
| JNIEnv* env, jobject, bool success) { |
| + DVLOG(1) << "MediaDrmBridge::" << __FUNCTION__; |
| + |
| base::ResetAndReturn(&reset_credentials_cb_).Run(success); |
| } |