Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(961)

Unified Diff: media/mojo/clients/mojo_cdm_unittest.cc

Issue 2592913002: [eme] Break mojo connection during call (Closed)
Patch Set: remaining nits Created 3 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « media/mojo/clients/mojo_cdm.cc ('k') | no next file » | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: media/mojo/clients/mojo_cdm_unittest.cc
diff --git a/media/mojo/clients/mojo_cdm_unittest.cc b/media/mojo/clients/mojo_cdm_unittest.cc
index 43c7da4e65c6546fea9a01980ef957d43f7a3bcc..2ddd06680ff059c1e108d9d27018694eccdbd726 100644
--- a/media/mojo/clients/mojo_cdm_unittest.cc
+++ b/media/mojo/clients/mojo_cdm_unittest.cc
@@ -7,8 +7,10 @@
#include "base/bind.h"
#include "base/macros.h"
#include "base/memory/ptr_util.h"
+#include "base/memory/ref_counted.h"
#include "base/run_loop.h"
#include "base/test/test_message_loop.h"
+#include "base/time/time.h"
#include "media/base/cdm_config.h"
#include "media/base/content_decryption_module.h"
#include "media/base/mock_filters.h"
@@ -21,12 +23,30 @@
#include "testing/gtest/include/gtest/gtest.h"
using ::testing::_;
+using ::testing::DoAll;
+using ::testing::Invoke;
+using ::testing::ReturnNull;
using ::testing::StrictMock;
+using ::testing::WithArg;
+using ::testing::WithArgs;
+using ::testing::WithoutArgs;
MATCHER(NotEmpty, "") {
return !arg.empty();
}
+ACTION_P2(CdmCreated, cdm, error_message) {
+ arg0.Run(cdm, error_message);
+}
+
+ACTION_P3(InvokeFunction, classPointer, memberFunc, p1) {
+ (classPointer->*memberFunc)(arg0, p1);
+}
+
+ACTION_P4(InvokeFunction2, classPointer, memberFunc, p1, p2) {
+ (classPointer->*memberFunc)(arg0, p1, p2);
+}
+
namespace media {
namespace {
@@ -45,7 +65,12 @@ const uint8_t kKeyId[] = {
class MojoCdmTest : public ::testing::Test {
public:
- enum ExpectedResult { SUCCESS, CONNECTION_ERROR, FAILURE };
+ enum ExpectedResult {
+ SUCCESS,
+ CONNECTION_ERROR_BEFORE,
+ CONNECTION_ERROR_DURING,
+ FAILURE
+ };
MojoCdmTest()
: mojo_cdm_service_(base::MakeUnique<MojoCdmService>(
@@ -55,19 +80,26 @@ class MojoCdmTest : public ::testing::Test {
virtual ~MojoCdmTest() {}
- void Initialize(const std::string& key_system,
- ExpectedResult expected_result) {
+ void Initialize(ExpectedResult expected_result) {
mojom::ContentDecryptionModulePtr remote_cdm;
auto cdm_request = mojo::MakeRequest(&remote_cdm);
- switch (expected_result) {
- case SUCCESS:
- case FAILURE:
- cdm_binding_.Bind(std::move(cdm_request));
- break;
- case CONNECTION_ERROR:
- cdm_request.ResetWithReason(0, "Request dropped for testing.");
- break;
+ cdm_binding_.Bind(std::move(cdm_request));
+
+ std::string key_system;
+ if (expected_result == CONNECTION_ERROR_BEFORE) {
+ // Break the connection before the call.
+ ForceConnectionError();
+ } else if (expected_result != FAILURE) {
+ // In the remaining cases, CDM is expected, so provide a key system.
+ key_system = kClearKeyKeySystem;
+
+ if (expected_result == CONNECTION_ERROR_DURING) {
+ // Create() will be successful, so provide a callback that will break
+ // the connection before returning the CDM.
+ cdm_factory_.SetBeforeCreationCB(base::Bind(
+ &MojoCdmTest::ForceConnectionError, base::Unretained(this)));
+ }
}
MojoCdm::Create(key_system, GURL(kTestSecurityOrigin), CdmConfig(),
@@ -82,7 +114,6 @@ class MojoCdmTest : public ::testing::Test {
base::Unretained(&cdm_client_)),
base::Bind(&MojoCdmTest::OnCdmCreated,
base::Unretained(this), expected_result));
-
base::RunLoop().RunUntilIdle();
}
@@ -97,122 +128,436 @@ class MojoCdmTest : public ::testing::Test {
EXPECT_EQ(SUCCESS, expected_result);
mojo_cdm_ = cdm;
+ remote_cdm_ = cdm_factory_.GetCreatedCdm();
}
void ForceConnectionError() {
- // If there is an existing session it will get closed when the connection
- // is broken.
- if (!session_id_.empty()) {
- EXPECT_CALL(cdm_client_, OnSessionClosed(session_id_));
- }
-
cdm_binding_.CloseWithReason(2, "Test closed connection.");
-
base::RunLoop().RunUntilIdle();
}
void SetServerCertificateAndExpect(const std::vector<uint8_t>& certificate,
ExpectedResult expected_result) {
+ if (expected_result == CONNECTION_ERROR_BEFORE) {
+ // Break the connection before the call, so SetServerCertificate() is
+ // never called.
+ ForceConnectionError();
+ } else {
+ EXPECT_CALL(*remote_cdm_, OnSetServerCertificate(certificate, _))
+ .WillOnce(WithArg<1>(InvokeFunction(this, &MojoCdmTest::HandlePromise,
+ expected_result)));
+ }
+
mojo_cdm_->SetServerCertificate(
certificate,
base::MakeUnique<MockCdmPromise>(expected_result == SUCCESS));
-
base::RunLoop().RunUntilIdle();
}
- void CreateSessionAndExpect(EmeInitDataType data_type,
- const std::vector<uint8_t>& key_id,
+ void CreateSessionAndExpect(const std::string& session_id,
ExpectedResult expected_result) {
- if (expected_result == SUCCESS) {
- EXPECT_CALL(cdm_client_, OnSessionMessage(NotEmpty(), _, _));
+ // Specify parameters needed to call CreateSessionAndGenerateRequest() in
+ // order to verify that the data is passed properly.
+ const CdmSessionType session_type = CdmSessionType::TEMPORARY_SESSION;
+ const EmeInitDataType data_type = EmeInitDataType::WEBM;
+ const std::vector<uint8_t> key_id(kKeyId, kKeyId + arraysize(kKeyId));
+ std::string created_session_id;
+
+ if (expected_result == CONNECTION_ERROR_BEFORE) {
+ // Break the connection before the call, so
+ // CreateSessionAndGenerateRequest() is never called.
+ ForceConnectionError();
+ } else {
+ EXPECT_CALL(*remote_cdm_, OnCreateSessionAndGenerateRequest(
+ session_type, data_type, key_id, _))
+ .WillOnce(WithArg<3>(
+ InvokeFunction2(this, &MojoCdmTest::HandleSessionPromise,
+ session_id, expected_result)));
}
+ // Note that although it's called CreateSessionAndGenerateRequest, no
+ // request is generated.
mojo_cdm_->CreateSessionAndGenerateRequest(
- CdmSessionType::TEMPORARY_SESSION, data_type, key_id,
+ session_type, data_type, key_id,
base::MakeUnique<MockCdmSessionPromise>(expected_result == SUCCESS,
- &session_id_));
-
+ &created_session_id));
base::RunLoop().RunUntilIdle();
+
+ // If the session was "created" ...
+ if (expected_result == SUCCESS) {
+ // Returned session ID must match the session ID provided.
+ EXPECT_EQ(session_id, created_session_id);
+
+ // MojoCdm expects the session to be closed, so invoke SessionClosedCB
+ // to "close" it.
+ EXPECT_CALL(cdm_client_, OnSessionClosed(session_id));
+ remote_cdm_->CallSessionClosedCB(session_id);
+ base::RunLoop().RunUntilIdle();
+ }
}
- void CloseSessionAndExpect(ExpectedResult expected_result) {
- DCHECK(!session_id_.empty()) << "CloseSessionAndExpect() must be called "
- "after a successful "
- "CreateSessionAndExpect()";
+ void LoadSessionAndExpect(const std::string& session_id,
+ ExpectedResult expected_result) {
+ const CdmSessionType session_type =
+ CdmSessionType::PERSISTENT_LICENSE_SESSION;
+ std::string loaded_session_id;
+
+ if (expected_result == CONNECTION_ERROR_BEFORE) {
+ // Break the connection before the call, so LoadSession() is never called.
+ ForceConnectionError();
+ } else {
+ EXPECT_CALL(*remote_cdm_, OnLoadSession(session_type, session_id, _))
+ .WillOnce(WithArg<2>(
+ InvokeFunction2(this, &MojoCdmTest::HandleSessionPromise,
+ session_id, expected_result)));
+ }
+ mojo_cdm_->LoadSession(session_type, session_id,
+ base::MakeUnique<MockCdmSessionPromise>(
+ expected_result == SUCCESS, &loaded_session_id));
+ base::RunLoop().RunUntilIdle();
+
+ // If the session was "loaded" ...
if (expected_result == SUCCESS) {
- EXPECT_CALL(cdm_client_, OnSessionClosed(session_id_));
+ // Returned session ID must match the session ID provided.
+ EXPECT_EQ(session_id, loaded_session_id);
+
+ // MojoCdm expects the session to be closed, so invoke SessionClosedCB
+ // to "close" it.
+ EXPECT_CALL(cdm_client_, OnSessionClosed(session_id));
+ remote_cdm_->CallSessionClosedCB(session_id);
+ base::RunLoop().RunUntilIdle();
}
+ }
- mojo_cdm_->CloseSession(session_id_, base::MakeUnique<MockCdmPromise>(
- expected_result == SUCCESS));
+ void UpdateSessionAndExpect(const std::string& session_id,
+ ExpectedResult expected_result) {
+ // Specify parameters to UpdateSession() in order to verify that
+ // the data is passed properly.
+ const std::vector<uint8_t> response = {1, 2, 3, 4, 5, 6};
+
+ if (expected_result == CONNECTION_ERROR_BEFORE) {
+ // Break the connection before the call, so UpdateSession() is never
+ // called.
+ ForceConnectionError();
+ } else {
+ EXPECT_CALL(*remote_cdm_, OnUpdateSession(session_id, response, _))
+ .WillOnce(WithArg<2>(InvokeFunction(this, &MojoCdmTest::HandlePromise,
+ expected_result)));
+ }
+ mojo_cdm_->UpdateSession(
+ session_id, response,
+ base::MakeUnique<MockCdmPromise>(expected_result == SUCCESS));
base::RunLoop().RunUntilIdle();
}
+ void CloseSessionAndExpect(const std::string& session_id,
+ ExpectedResult expected_result) {
+ if (expected_result == CONNECTION_ERROR_BEFORE) {
+ // Break the connection before the call, so CloseSession() is never
+ // called.
+ ForceConnectionError();
+ } else {
+ EXPECT_CALL(*remote_cdm_, OnCloseSession(session_id, _))
+ .WillOnce(WithArg<1>(InvokeFunction(this, &MojoCdmTest::HandlePromise,
+ expected_result)));
+ }
+
+ mojo_cdm_->CloseSession(session_id, base::MakeUnique<MockCdmPromise>(
+ expected_result == SUCCESS));
+ base::RunLoop().RunUntilIdle();
+ }
+
+ void RemoveSessionAndExpect(const std::string& session_id,
+ ExpectedResult expected_result) {
+ if (expected_result == CONNECTION_ERROR_BEFORE) {
+ // Break the connection before the call, so RemoveSession() is never
+ // called.
+ ForceConnectionError();
+ } else {
+ EXPECT_CALL(*remote_cdm_, OnRemoveSession(session_id, _))
+ .WillOnce(WithArg<1>(InvokeFunction(this, &MojoCdmTest::HandlePromise,
+ expected_result)));
+ }
+
+ mojo_cdm_->RemoveSession(session_id, base::MakeUnique<MockCdmPromise>(
+ expected_result == SUCCESS));
+ base::RunLoop().RunUntilIdle();
+ }
+
+ void HandlePromise(std::unique_ptr<SimpleCdmPromise>& promise,
+ ExpectedResult expected_result) {
+ switch (expected_result) {
+ case SUCCESS:
+ promise->resolve();
+ break;
+
+ case FAILURE:
+ promise->reject(media::CdmPromise::UNKNOWN_ERROR, 0,
+ "Promise rejected");
+ break;
+
+ case CONNECTION_ERROR_BEFORE:
+ // Connection should be broken before this is called.
+ NOTREACHED();
+ break;
+
+ case CONNECTION_ERROR_DURING:
+ ForceConnectionError();
+
+ // Now that the connection is broken the promise result won't be passed
+ // back. However, since we check that every promise is fulfilled, we
+ // need to do something with this promise. Resolve the promise to
+ // fulfill it, but note that the original caller will get back a
+ // failed promise due to the connection being broken.
+ promise->resolve();
+ break;
+ }
+ }
+
+ void HandleSessionPromise(std::unique_ptr<NewSessionCdmPromise>& promise,
+ const std::string& session_id,
+ ExpectedResult expected_result) {
+ switch (expected_result) {
+ case SUCCESS:
+ promise->resolve(session_id);
+ break;
+
+ case FAILURE:
+ promise->reject(media::CdmPromise::UNKNOWN_ERROR, 0,
+ "Promise rejected");
+ break;
+
+ case CONNECTION_ERROR_BEFORE:
+ // Connection should be broken before this is called.
+ NOTREACHED();
+ break;
+
+ case CONNECTION_ERROR_DURING:
+ ForceConnectionError();
+
+ // Now that the connection is broken the promise result won't be passed
+ // back. However, since we check that every promise is fulfilled, we
+ // need to do something with this promise. Resolve the promise to
+ // fulfill it, but note that the original caller will get back a
+ // failed promise due to the connection being broken.
+ promise->resolve(session_id);
+ break;
+ }
+ }
+
// Fixture members.
base::TestMessageLoop message_loop_;
+ // |remote_cdm_| represents the CDM at the end of the mojo message pipe.
+ MockCdm* remote_cdm_;
+ MockCdmFactory cdm_factory_;
+
MojoCdmServiceContext mojo_cdm_service_context_;
StrictMock<MockCdmClient> cdm_client_;
- // TODO(jrummell): Use a MockCdmFactory to create a MockCdm here for more test
- // coverage.
- DefaultCdmFactory cdm_factory_;
-
std::unique_ptr<MojoCdmService> mojo_cdm_service_;
mojo::Binding<mojom::ContentDecryptionModule> cdm_binding_;
scoped_refptr<ContentDecryptionModule> mojo_cdm_;
- // |session_id_| is the latest successful result of calling CreateSession().
- std::string session_id_;
-
private:
DISALLOW_COPY_AND_ASSIGN(MojoCdmTest);
};
TEST_F(MojoCdmTest, Create_Success) {
- Initialize(kClearKeyKeySystem, SUCCESS);
+ Initialize(SUCCESS);
}
-TEST_F(MojoCdmTest, Create_ConnectionError) {
- Initialize(kClearKeyKeySystem, CONNECTION_ERROR);
+TEST_F(MojoCdmTest, Create_Failure) {
+ Initialize(FAILURE);
}
-TEST_F(MojoCdmTest, Create_Failure) {
- // This fails as DefaultCdmFactory only supports Clear Key.
- Initialize("org.random.cdm", FAILURE);
+TEST_F(MojoCdmTest, Create_ConnectionErrorBefore) {
+ Initialize(CONNECTION_ERROR_BEFORE);
+}
+
+TEST_F(MojoCdmTest, Create_ConnectionErrorDuring) {
+ Initialize(CONNECTION_ERROR_DURING);
+}
+
+TEST_F(MojoCdmTest, SetServerCertificate_Success) {
+ const std::vector<uint8_t> certificate = {0, 1, 2};
+ Initialize(SUCCESS);
+ SetServerCertificateAndExpect(certificate, SUCCESS);
+}
+
+TEST_F(MojoCdmTest, SetServerCertificate_Failure) {
+ const std::vector<uint8_t> certificate = {1, 2, 3, 4, 5};
+ Initialize(SUCCESS);
+ SetServerCertificateAndExpect(certificate, FAILURE);
+}
+
+TEST_F(MojoCdmTest, SetServerCertificate_ConnectionErrorBefore) {
+ const std::vector<uint8_t> certificate = {3, 4};
+ Initialize(SUCCESS);
+ SetServerCertificateAndExpect(certificate, CONNECTION_ERROR_BEFORE);
+}
+
+TEST_F(MojoCdmTest, SetServerCertificate_ConnectionErrorDuring) {
+ const std::vector<uint8_t> certificate = {10, 11, 12};
+ Initialize(SUCCESS);
+ SetServerCertificateAndExpect(certificate, CONNECTION_ERROR_DURING);
+}
+
+TEST_F(MojoCdmTest, CreateSession_Success) {
+ const std::string session_id = "create1";
+ Initialize(SUCCESS);
+ CreateSessionAndExpect(session_id, SUCCESS);
+}
+
+TEST_F(MojoCdmTest, CreateSession_Failure) {
+ const std::string session_id = "create2";
+ Initialize(SUCCESS);
+ CreateSessionAndExpect(session_id, FAILURE);
+}
+
+TEST_F(MojoCdmTest, CreateSession_ConnectionErrorBefore) {
+ const std::string session_id = "create3";
+ Initialize(SUCCESS);
+ CreateSessionAndExpect(session_id, CONNECTION_ERROR_BEFORE);
+}
+
+TEST_F(MojoCdmTest, CreateSession_ConnectionErrorDuring) {
+ const std::string session_id = "create4";
+ Initialize(SUCCESS);
+ CreateSessionAndExpect(session_id, CONNECTION_ERROR_DURING);
+}
+
+TEST_F(MojoCdmTest, LoadSession_Success) {
+ const std::string session_id = "load1";
+ Initialize(SUCCESS);
+ LoadSessionAndExpect(session_id, SUCCESS);
+}
+
+TEST_F(MojoCdmTest, LoadSession_Failure) {
+ const std::string session_id = "load2";
+ Initialize(SUCCESS);
+ LoadSessionAndExpect(session_id, FAILURE);
}
-TEST_F(MojoCdmTest, SetServerCertificate_AfterConnectionError) {
- Initialize(kClearKeyKeySystem, SUCCESS);
- ForceConnectionError();
- SetServerCertificateAndExpect({0, 1, 2}, FAILURE);
+TEST_F(MojoCdmTest, LoadSession_ConnectionErrorBefore) {
+ const std::string session_id = "load3";
+ Initialize(SUCCESS);
+ LoadSessionAndExpect(session_id, CONNECTION_ERROR_BEFORE);
}
-TEST_F(MojoCdmTest, CreateSessionAndGenerateRequest_AfterConnectionError) {
- std::vector<uint8_t> key_id(kKeyId, kKeyId + arraysize(kKeyId));
+TEST_F(MojoCdmTest, LoadSession_ConnectionErrorDuring) {
+ const std::string session_id = "load4";
+ Initialize(SUCCESS);
+ LoadSessionAndExpect(session_id, CONNECTION_ERROR_DURING);
+}
- Initialize(kClearKeyKeySystem, SUCCESS);
- ForceConnectionError();
- CreateSessionAndExpect(EmeInitDataType::WEBM, key_id, FAILURE);
+TEST_F(MojoCdmTest, UpdateSession_Success) {
+ const std::string session_id = "update1";
+ Initialize(SUCCESS);
+ UpdateSessionAndExpect(session_id, SUCCESS);
+}
+
+TEST_F(MojoCdmTest, UpdateSession_Failure) {
+ const std::string session_id = "update2";
+ Initialize(SUCCESS);
+ UpdateSessionAndExpect(session_id, FAILURE);
+}
+
+TEST_F(MojoCdmTest, UpdateSession_ConnectionErrorBefore) {
+ const std::string session_id = "update3";
+ Initialize(SUCCESS);
+ UpdateSessionAndExpect(session_id, CONNECTION_ERROR_BEFORE);
+}
+
+TEST_F(MojoCdmTest, UpdateSession_ConnectionErrorDuring) {
+ const std::string session_id = "update4";
+ Initialize(SUCCESS);
+ UpdateSessionAndExpect(session_id, CONNECTION_ERROR_DURING);
}
TEST_F(MojoCdmTest, CloseSession_Success) {
- std::vector<uint8_t> key_id(kKeyId, kKeyId + arraysize(kKeyId));
+ const std::string session_id = "close1";
+ Initialize(SUCCESS);
+ CloseSessionAndExpect(session_id, SUCCESS);
+}
- Initialize(kClearKeyKeySystem, SUCCESS);
- CreateSessionAndExpect(EmeInitDataType::WEBM, key_id, SUCCESS);
- CloseSessionAndExpect(SUCCESS);
+TEST_F(MojoCdmTest, CloseSession_Failure) {
+ const std::string session_id = "close2";
+ Initialize(SUCCESS);
+ CloseSessionAndExpect(session_id, FAILURE);
}
-TEST_F(MojoCdmTest, CloseSession_AfterConnectionError) {
- std::vector<uint8_t> key_id(kKeyId, kKeyId + arraysize(kKeyId));
+TEST_F(MojoCdmTest, CloseSession_ConnectionErrorBefore) {
+ const std::string session_id = "close3";
+ Initialize(SUCCESS);
+ CloseSessionAndExpect(session_id, CONNECTION_ERROR_BEFORE);
+}
+
+TEST_F(MojoCdmTest, CloseSession_ConnectionErrorDuring) {
+ const std::string session_id = "close4";
+ Initialize(SUCCESS);
+ CloseSessionAndExpect(session_id, CONNECTION_ERROR_DURING);
+}
+
+TEST_F(MojoCdmTest, RemoveSession_Success) {
+ const std::string session_id = "remove1";
+ Initialize(SUCCESS);
+ RemoveSessionAndExpect(session_id, SUCCESS);
+}
+
+TEST_F(MojoCdmTest, RemoveSession_Failure) {
+ const std::string session_id = "remove2";
+ Initialize(SUCCESS);
+ RemoveSessionAndExpect(session_id, FAILURE);
+}
+
+TEST_F(MojoCdmTest, RemoveSession_ConnectionErrorBefore) {
+ const std::string session_id = "remove3";
+ Initialize(SUCCESS);
+ RemoveSessionAndExpect(session_id, CONNECTION_ERROR_BEFORE);
+}
+
+TEST_F(MojoCdmTest, RemoveSession_ConnectionErrorDuring) {
+ const std::string session_id = "remove4";
+ Initialize(SUCCESS);
+ RemoveSessionAndExpect(session_id, CONNECTION_ERROR_DURING);
+}
+
+// Note that MojoCdm requires a session to exist when SessionClosedCB is called,
+// so it is currently tested in the success cases for CreateSession/LoadSession.
+
+TEST_F(MojoCdmTest, SessionMessageCB_Success) {
+ const std::string session_id = "message";
+ const ContentDecryptionModule::MessageType message_type =
+ ContentDecryptionModule::LICENSE_REQUEST;
+ const std::vector<uint8_t> message = {0, 1, 2};
+ Initialize(SUCCESS);
+ EXPECT_CALL(cdm_client_, OnSessionMessage(session_id, message_type, message));
+ remote_cdm_->CallSessionMessageCB(session_id, message_type, message);
+ base::RunLoop().RunUntilIdle();
+}
+
+TEST_F(MojoCdmTest, SessionExpirationChangeCB_Success) {
+ const std::string session_id = "expiration";
+ const base::Time time = base::Time::Now();
+ Initialize(SUCCESS);
+ EXPECT_CALL(cdm_client_, OnSessionExpirationUpdate(session_id, time));
+ remote_cdm_->CallSessionExpirationUpdateCB(session_id, time);
+ base::RunLoop().RunUntilIdle();
+}
- Initialize(kClearKeyKeySystem, SUCCESS);
- CreateSessionAndExpect(EmeInitDataType::WEBM, key_id, SUCCESS);
- ForceConnectionError();
- CloseSessionAndExpect(FAILURE);
+TEST_F(MojoCdmTest, SessionKeysChangeCB_Success) {
+ const std::string session_id = "change";
+ bool has_additional_usable_key = true;
+ CdmKeysInfo keys_info;
+ Initialize(SUCCESS);
+ EXPECT_CALL(cdm_client_,
+ OnSessionKeysChangeCalled(session_id, has_additional_usable_key));
+ remote_cdm_->CallSessionKeysChangeCB(session_id, has_additional_usable_key,
+ std::move(keys_info));
+ base::RunLoop().RunUntilIdle();
}
} // namespace media
« no previous file with comments | « media/mojo/clients/mojo_cdm.cc ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698