OLD | NEW |
---|---|
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "modules/encryptedmedia/NavigatorRequestMediaKeySystemAccess.h" | 5 #include "modules/encryptedmedia/NavigatorRequestMediaKeySystemAccess.h" |
6 | 6 |
7 #include "bindings/core/v8/ScriptPromiseResolver.h" | 7 #include "bindings/core/v8/ScriptPromiseResolver.h" |
8 #include "bindings/core/v8/ScriptState.h" | 8 #include "bindings/core/v8/ScriptState.h" |
9 #include "core/dom/DOMException.h" | 9 #include "core/dom/DOMException.h" |
10 #include "core/dom/Document.h" | 10 #include "core/dom/Document.h" |
(...skipping 104 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
115 // TODO(xhwang): Remove after we handle empty robustness correctly. | 115 // TODO(xhwang): Remove after we handle empty robustness correctly. |
116 // See http://crbug.com/482277 | 116 // See http://crbug.com/482277 |
117 void checkVideoCapabilityRobustness() const; | 117 void checkVideoCapabilityRobustness() const; |
118 | 118 |
119 // Generate deprecation warning and log UseCounter if configuration | 119 // Generate deprecation warning and log UseCounter if configuration |
120 // contains only container-only contentType strings. | 120 // contains only container-only contentType strings. |
121 // TODO(jrummell): Remove once this is no longer allowed. | 121 // TODO(jrummell): Remove once this is no longer allowed. |
122 // See http://crbug.com/605661. | 122 // See http://crbug.com/605661. |
123 void checkEmptyCodecs(const WebMediaKeySystemConfiguration&); | 123 void checkEmptyCodecs(const WebMediaKeySystemConfiguration&); |
124 | 124 |
125 // Generate deprecation warning and log UseCounter if configuration does | |
126 // not have at least one of 'audioCapabilities' and 'videoCapabilities' | |
127 // non-empty. | |
128 // TODO(jrummell): Remove once this is enforced. | |
129 // See http://crbug.com/616233. | |
130 void checkCapabilitiesProvided(const WebMediaKeySystemConfiguration&); | |
131 | |
125 Member<ScriptPromiseResolver> m_resolver; | 132 Member<ScriptPromiseResolver> m_resolver; |
126 const String m_keySystem; | 133 const String m_keySystem; |
127 WebVector<WebMediaKeySystemConfiguration> m_supportedConfigurations; | 134 WebVector<WebMediaKeySystemConfiguration> m_supportedConfigurations; |
128 }; | 135 }; |
129 | 136 |
130 MediaKeySystemAccessInitializer::MediaKeySystemAccessInitializer(ScriptState* sc riptState, const String& keySystem, const HeapVector<MediaKeySystemConfiguration >& supportedConfigurations) | 137 MediaKeySystemAccessInitializer::MediaKeySystemAccessInitializer(ScriptState* sc riptState, const String& keySystem, const HeapVector<MediaKeySystemConfiguration >& supportedConfigurations) |
131 : m_resolver(ScriptPromiseResolver::create(scriptState)) | 138 : m_resolver(ScriptPromiseResolver::create(scriptState)) |
132 , m_keySystem(keySystem) | 139 , m_keySystem(keySystem) |
133 , m_supportedConfigurations(supportedConfigurations.size()) | 140 , m_supportedConfigurations(supportedConfigurations.size()) |
134 { | 141 { |
135 for (size_t i = 0; i < supportedConfigurations.size(); ++i) { | 142 for (size_t i = 0; i < supportedConfigurations.size(); ++i) { |
136 const MediaKeySystemConfiguration& config = supportedConfigurations[i]; | 143 const MediaKeySystemConfiguration& config = supportedConfigurations[i]; |
137 WebMediaKeySystemConfiguration webConfig; | 144 WebMediaKeySystemConfiguration webConfig; |
138 if (config.hasInitDataTypes()) { | 145 |
139 webConfig.hasInitDataTypes = true; | 146 DCHECK(config.hasInitDataTypes()); |
140 webConfig.initDataTypes = convertInitDataTypes(config.initDataTypes( )); | 147 webConfig.initDataTypes = convertInitDataTypes(config.initDataTypes()); |
141 } | 148 |
142 if (config.hasAudioCapabilities()) { | 149 DCHECK(config.hasAudioCapabilities()); |
143 webConfig.hasAudioCapabilities = true; | 150 webConfig.audioCapabilities = convertCapabilities(config.audioCapabiliti es()); |
144 webConfig.audioCapabilities = convertCapabilities(config.audioCapabi lities()); | 151 |
145 } | 152 DCHECK(config.hasVideoCapabilities()); |
146 if (config.hasVideoCapabilities()) { | 153 webConfig.videoCapabilities = convertCapabilities(config.videoCapabiliti es()); |
147 webConfig.hasVideoCapabilities = true; | 154 |
148 webConfig.videoCapabilities = convertCapabilities(config.videoCapabi lities()); | 155 checkCapabilitiesProvided(webConfig); |
foolip
2016/09/23 08:18:39
I can't find where the "If video capabilities is n
jrummell
2016/09/29 20:40:02
Most of the steps are done in media/blink/key_syst
| |
149 } | 156 |
150 DCHECK(config.hasDistinctiveIdentifier()); | 157 DCHECK(config.hasDistinctiveIdentifier()); |
151 webConfig.distinctiveIdentifier = convertMediaKeysRequirement(config.dis tinctiveIdentifier()); | 158 webConfig.distinctiveIdentifier = convertMediaKeysRequirement(config.dis tinctiveIdentifier()); |
159 | |
152 DCHECK(config.hasPersistentState()); | 160 DCHECK(config.hasPersistentState()); |
153 webConfig.persistentState = convertMediaKeysRequirement(config.persisten tState()); | 161 webConfig.persistentState = convertMediaKeysRequirement(config.persisten tState()); |
162 | |
154 if (config.hasSessionTypes()) { | 163 if (config.hasSessionTypes()) { |
155 webConfig.hasSessionTypes = true; | 164 webConfig.hasSessionTypes = true; |
156 webConfig.sessionTypes = convertSessionTypes(config.sessionTypes()); | 165 webConfig.sessionTypes = convertSessionTypes(config.sessionTypes()); |
157 } | 166 } |
167 | |
158 // If |label| is not present, it will be a null string. | 168 // If |label| is not present, it will be a null string. |
159 webConfig.label = config.label(); | 169 webConfig.label = config.label(); |
160 m_supportedConfigurations[i] = webConfig; | 170 m_supportedConfigurations[i] = webConfig; |
161 } | 171 } |
162 | 172 |
163 checkVideoCapabilityRobustness(); | 173 checkVideoCapabilityRobustness(); |
164 } | 174 } |
165 | 175 |
166 void MediaKeySystemAccessInitializer::requestSucceeded(WebContentDecryptionModul eAccess* access) | 176 void MediaKeySystemAccessInitializer::requestSucceeded(WebContentDecryptionModul eAccess* access) |
167 { | 177 { |
(...skipping 12 matching lines...) Expand all Loading... | |
180 void MediaKeySystemAccessInitializer::checkVideoCapabilityRobustness() const | 190 void MediaKeySystemAccessInitializer::checkVideoCapabilityRobustness() const |
181 { | 191 { |
182 // Only check for widevine key system. | 192 // Only check for widevine key system. |
183 if (keySystem() != "com.widevine.alpha") | 193 if (keySystem() != "com.widevine.alpha") |
184 return; | 194 return; |
185 | 195 |
186 bool hasVideoCapabilities = false; | 196 bool hasVideoCapabilities = false; |
187 bool hasEmptyRobustness = false; | 197 bool hasEmptyRobustness = false; |
188 | 198 |
189 for (const auto& config : m_supportedConfigurations) { | 199 for (const auto& config : m_supportedConfigurations) { |
190 if (!config.hasVideoCapabilities) | |
191 continue; | |
192 | |
193 hasVideoCapabilities = true; | |
194 | |
195 for (const auto& capability : config.videoCapabilities) { | 200 for (const auto& capability : config.videoCapabilities) { |
201 hasVideoCapabilities = true; | |
196 if (capability.robustness.isEmpty()) { | 202 if (capability.robustness.isEmpty()) { |
197 hasEmptyRobustness = true; | 203 hasEmptyRobustness = true; |
198 break; | 204 break; |
199 } | 205 } |
200 } | 206 } |
201 | 207 |
202 if (hasEmptyRobustness) | 208 if (hasEmptyRobustness) |
203 break; | 209 break; |
204 } | 210 } |
205 | 211 |
(...skipping 11 matching lines...) Expand all Loading... | |
217 | 223 |
218 void MediaKeySystemAccessInitializer::checkEmptyCodecs(const WebMediaKeySystemCo nfiguration& config) | 224 void MediaKeySystemAccessInitializer::checkEmptyCodecs(const WebMediaKeySystemCo nfiguration& config) |
219 { | 225 { |
220 // This is only checking for empty codecs in the selected configuration, | 226 // This is only checking for empty codecs in the selected configuration, |
221 // as apps may pass container only contentType strings for compatibility | 227 // as apps may pass container only contentType strings for compatibility |
222 // with other implementations. | 228 // with other implementations. |
223 // This will only check that all returned capabilities do not contain | 229 // This will only check that all returned capabilities do not contain |
224 // codecs. This avoids alerting on configurations that will continue | 230 // codecs. This avoids alerting on configurations that will continue |
225 // to succeed in the future once strict checking is enforced. | 231 // to succeed in the future once strict checking is enforced. |
226 bool areAllAudioCodecsEmpty = false; | 232 bool areAllAudioCodecsEmpty = false; |
227 if (config.hasAudioCapabilities && !config.audioCapabilities.isEmpty()) { | 233 if (!config.audioCapabilities.isEmpty()) { |
228 areAllAudioCodecsEmpty = std::find_if(config.audioCapabilities.begin(), config.audioCapabilities.end(), AreCodecsSpecified) | 234 areAllAudioCodecsEmpty = std::find_if(config.audioCapabilities.begin(), config.audioCapabilities.end(), AreCodecsSpecified) |
229 == config.audioCapabilities.end(); | 235 == config.audioCapabilities.end(); |
230 } | 236 } |
231 | 237 |
232 bool areAllVideoCodecsEmpty = false; | 238 bool areAllVideoCodecsEmpty = false; |
233 if (config.hasVideoCapabilities && !config.videoCapabilities.isEmpty()) { | 239 if (!config.videoCapabilities.isEmpty()) { |
234 areAllVideoCodecsEmpty = std::find_if(config.videoCapabilities.begin(), config.videoCapabilities.end(), AreCodecsSpecified) | 240 areAllVideoCodecsEmpty = std::find_if(config.videoCapabilities.begin(), config.videoCapabilities.end(), AreCodecsSpecified) |
235 == config.videoCapabilities.end(); | 241 == config.videoCapabilities.end(); |
236 } | 242 } |
237 | 243 |
238 if (areAllAudioCodecsEmpty || areAllVideoCodecsEmpty) { | 244 if (areAllAudioCodecsEmpty || areAllVideoCodecsEmpty) { |
239 Deprecation::countDeprecation(m_resolver->getExecutionContext(), UseCoun ter::EncryptedMediaAllSelectedContentTypesMissingCodecs); | 245 Deprecation::countDeprecation(m_resolver->getExecutionContext(), UseCoun ter::EncryptedMediaAllSelectedContentTypesMissingCodecs); |
240 } else { | 246 } else { |
241 UseCounter::count(m_resolver->getExecutionContext(), UseCounter::Encrypt edMediaAllSelectedContentTypesHaveCodecs); | 247 UseCounter::count(m_resolver->getExecutionContext(), UseCounter::Encrypt edMediaAllSelectedContentTypesHaveCodecs); |
242 } | 248 } |
243 } | 249 } |
244 | 250 |
251 void MediaKeySystemAccessInitializer::checkCapabilitiesProvided(const WebMediaKe ySystemConfiguration& config) | |
252 { | |
253 bool atLeastOneAudioCapability = config.audioCapabilities.size() > 0; | |
254 bool atLeastOneVideoCapability = config.videoCapabilities.size() > 0; | |
255 | |
256 if (atLeastOneAudioCapability || atLeastOneVideoCapability) { | |
257 UseCounter::count(m_resolver->getExecutionContext(), UseCounter::Encrypt edMediaCapabilityProvided); | |
258 } else { | |
259 Deprecation::countDeprecation(m_resolver->getExecutionContext(), UseCoun ter::EncryptedMediaCapabilityNotProvided); | |
foolip
2016/09/23 08:18:39
Optional nit: refactor so that the deprecation is
jrummell
2016/09/29 20:40:02
I wish :). Most of the checks happen outside of bl
| |
260 } | |
261 } | |
262 | |
245 } // namespace | 263 } // namespace |
246 | 264 |
247 ScriptPromise NavigatorRequestMediaKeySystemAccess::requestMediaKeySystemAccess( | 265 ScriptPromise NavigatorRequestMediaKeySystemAccess::requestMediaKeySystemAccess( |
248 ScriptState* scriptState, | 266 ScriptState* scriptState, |
249 Navigator& navigator, | 267 Navigator& navigator, |
250 const String& keySystem, | 268 const String& keySystem, |
251 const HeapVector<MediaKeySystemConfiguration>& supportedConfigurations) | 269 const HeapVector<MediaKeySystemConfiguration>& supportedConfigurations) |
252 { | 270 { |
253 DVLOG(3) << __func__; | 271 DVLOG(3) << __func__; |
254 | 272 |
255 // From https://w3c.github.io/encrypted-media/#requestMediaKeySystemAccess | 273 // From https://w3c.github.io/encrypted-media/#requestMediaKeySystemAccess |
256 // When this method is invoked, the user agent must run the following steps: | 274 // When this method is invoked, the user agent must run the following steps: |
257 // 1. If keySystem is an empty string, return a promise rejected with a | 275 // 1. If keySystem is an empty string, return a promise rejected with a |
258 // new DOMException whose name is InvalidAccessError. | 276 // new DOMException whose name is InvalidAccessError. |
259 if (keySystem.isEmpty()) { | 277 if (keySystem.isEmpty()) { |
260 return ScriptPromise::rejectWithDOMException( | 278 return ScriptPromise::rejectWithDOMException( |
261 scriptState, DOMException::create(InvalidAccessError, "The keySystem parameter is empty.")); | 279 scriptState, DOMException::create(InvalidAccessError, "The keySystem parameter is empty.")); |
262 } | 280 } |
263 | 281 |
264 // 2. If supportedConfigurations was provided and is empty, return a | 282 // 2. If supportedConfigurations was provided and is empty, return a |
265 // promise rejected with a new DOMException whose name is | 283 // promise rejected with a new DOMException whose name is |
266 // InvalidAccessError. | 284 // InvalidAccessError. |
267 if (!supportedConfigurations.size()) { | 285 if (!supportedConfigurations.size()) { |
268 return ScriptPromise::rejectWithDOMException( | 286 return ScriptPromise::rejectWithDOMException( |
269 scriptState, DOMException::create(InvalidAccessError, "The supported Configurations parameter is empty.")); | 287 scriptState, DOMException::create(InvalidAccessError, "The supported Configurations parameter is empty.")); |
270 } | 288 } |
271 | 289 |
272 // 3-4. 'May Document use powerful features?' check. | 290 // Note: This method should only be exposed to secure contexts as indicated |
291 // by the [SecureContext] IDL attribute. Since that will break some existing | |
292 // sites, we simply keep track of sites that aren't secure and output a | |
293 // deprecation message. | |
273 ExecutionContext* executionContext = scriptState->getExecutionContext(); | 294 ExecutionContext* executionContext = scriptState->getExecutionContext(); |
274 String errorMessage; | 295 String errorMessage; |
275 if (executionContext->isSecureContext(errorMessage)) { | 296 if (executionContext->isSecureContext(errorMessage)) { |
276 UseCounter::count(executionContext, UseCounter::EncryptedMediaSecureOrig in); | 297 UseCounter::count(executionContext, UseCounter::EncryptedMediaSecureOrig in); |
277 } else { | 298 } else { |
278 Deprecation::countDeprecation(executionContext, UseCounter::EncryptedMed iaInsecureOrigin); | 299 Deprecation::countDeprecation(executionContext, UseCounter::EncryptedMed iaInsecureOrigin); |
279 // TODO(ddorwin): Implement the following: | 300 // TODO(ddorwin): Implement the following: |
280 // Reject promise with a new DOMException whose name is NotSupportedErro r. | 301 // Reject promise with a new DOMException whose name is NotSupportedErro r. |
281 } | 302 } |
282 | 303 |
283 // 5. Let origin be the origin of document. | 304 // 3. Let document be the calling context's Document. |
284 // (Passed with the execution context in step 7.) | |
285 | |
286 // 6. Let promise be a new promise. | |
287 Document* document = toDocument(executionContext); | 305 Document* document = toDocument(executionContext); |
288 if (!document->page()) { | 306 if (!document->page()) { |
289 return ScriptPromise::rejectWithDOMException( | 307 return ScriptPromise::rejectWithDOMException( |
290 scriptState, DOMException::create(InvalidStateError, "The context pr ovided is not associated with a page.")); | 308 scriptState, DOMException::create(InvalidStateError, "The context pr ovided is not associated with a page.")); |
291 } | 309 } |
292 | 310 |
311 // 4. Let origin be the origin of document. | |
312 // (Passed with the execution context.) | |
313 | |
314 // 5. Let promise be a new promise. | |
293 MediaKeySystemAccessInitializer* initializer = new MediaKeySystemAccessIniti alizer(scriptState, keySystem, supportedConfigurations); | 315 MediaKeySystemAccessInitializer* initializer = new MediaKeySystemAccessIniti alizer(scriptState, keySystem, supportedConfigurations); |
294 ScriptPromise promise = initializer->promise(); | 316 ScriptPromise promise = initializer->promise(); |
295 | 317 |
296 // 7. Asynchronously determine support, and if allowed, create and | 318 // 6. Asynchronously determine support, and if allowed, create and |
297 // initialize the MediaKeySystemAccess object. | 319 // initialize the MediaKeySystemAccess object. |
298 MediaKeysController* controller = MediaKeysController::from(document->page() ); | 320 MediaKeysController* controller = MediaKeysController::from(document->page() ); |
299 WebEncryptedMediaClient* mediaClient = controller->encryptedMediaClient(exec utionContext); | 321 WebEncryptedMediaClient* mediaClient = controller->encryptedMediaClient(exec utionContext); |
300 mediaClient->requestMediaKeySystemAccess(WebEncryptedMediaRequest(initialize r)); | 322 mediaClient->requestMediaKeySystemAccess(WebEncryptedMediaRequest(initialize r)); |
301 | 323 |
302 // 8. Return promise. | 324 // 7. Return promise. |
303 return promise; | 325 return promise; |
304 } | 326 } |
305 | 327 |
306 } // namespace blink | 328 } // namespace blink |
OLD | NEW |