Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(638)

Side by Side Diff: content/renderer/media/crypto/ppapi_decryptor.cc

Issue 265993002: Add Promises for EME (Chromium side) (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: One more trybot issue Created 6 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2013 The Chromium Authors. All rights reserved. 1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "content/renderer/media/crypto/ppapi_decryptor.h" 5 #include "content/renderer/media/crypto/ppapi_decryptor.h"
6 6
7 #include <string> 7 #include <string>
8 8
9 #include "base/bind.h" 9 #include "base/bind.h"
10 #include "base/callback.h"
10 #include "base/callback_helpers.h" 11 #include "base/callback_helpers.h"
11 #include "base/location.h" 12 #include "base/location.h"
12 #include "base/logging.h" 13 #include "base/logging.h"
13 #include "base/message_loop/message_loop.h" 14 #include "base/message_loop/message_loop.h"
14 #include "base/message_loop/message_loop_proxy.h" 15 #include "base/message_loop/message_loop_proxy.h"
15 #include "content/renderer/media/crypto/key_systems.h" 16 #include "content/renderer/media/crypto/key_systems.h"
16 #include "content/renderer/pepper/content_decryptor_delegate.h" 17 #include "content/renderer/pepper/content_decryptor_delegate.h"
17 #include "content/renderer/pepper/pepper_plugin_instance_impl.h" 18 #include "content/renderer/pepper/pepper_plugin_instance_impl.h"
18 #include "media/base/audio_decoder_config.h" 19 #include "media/base/audio_decoder_config.h"
20 #include "media/base/cdm_promise.h"
19 #include "media/base/data_buffer.h" 21 #include "media/base/data_buffer.h"
20 #include "media/base/decoder_buffer.h" 22 #include "media/base/decoder_buffer.h"
21 #include "media/base/video_decoder_config.h" 23 #include "media/base/video_decoder_config.h"
22 #include "media/base/video_frame.h" 24 #include "media/base/video_frame.h"
23 25
24 namespace content { 26 namespace content {
25 27
28 // This class is needed so that resolving an Update() promise triggers playback
29 // of the stream. It intercepts the resolve() call to invoke an additional
30 // callback.
31 class SessionUpdatedPromise : public media::SimpleCdmPromise {
32 public:
33 SessionUpdatedPromise(scoped_ptr<media::SimpleCdmPromise> caller_promise,
34 base::Closure additional_resolve_cb)
35 : caller_promise_(caller_promise.Pass()),
36 additional_resolve_cb_(additional_resolve_cb) {}
37
38 virtual void resolve() OVERRIDE {
39 DCHECK(is_pending_);
40 is_pending_ = false;
41 additional_resolve_cb_.Run();
42 caller_promise_->resolve();
43 }
44
45 virtual void reject(media::MediaKeys::Exception exception_code,
46 uint32 system_code,
47 const std::string& error_message) OVERRIDE {
48 DCHECK(is_pending_);
49 is_pending_ = false;
50 caller_promise_->reject(exception_code, system_code, error_message);
51 }
52
53 protected:
54 scoped_ptr<media::SimpleCdmPromise> caller_promise_;
55 base::Closure additional_resolve_cb_;
56 };
57
26 scoped_ptr<PpapiDecryptor> PpapiDecryptor::Create( 58 scoped_ptr<PpapiDecryptor> PpapiDecryptor::Create(
27 const std::string& key_system, 59 const std::string& key_system,
28 const GURL& security_origin, 60 const GURL& security_origin,
29 const CreatePepperCdmCB& create_pepper_cdm_cb, 61 const CreatePepperCdmCB& create_pepper_cdm_cb,
30 const media::SessionCreatedCB& session_created_cb,
31 const media::SessionMessageCB& session_message_cb, 62 const media::SessionMessageCB& session_message_cb,
32 const media::SessionReadyCB& session_ready_cb, 63 const media::SessionReadyCB& session_ready_cb,
33 const media::SessionClosedCB& session_closed_cb, 64 const media::SessionClosedCB& session_closed_cb,
34 const media::SessionErrorCB& session_error_cb) { 65 const media::SessionErrorCB& session_error_cb) {
35 std::string plugin_type = GetPepperType(key_system); 66 std::string plugin_type = GetPepperType(key_system);
36 DCHECK(!plugin_type.empty()); 67 DCHECK(!plugin_type.empty());
37 scoped_ptr<PepperCdmWrapper> pepper_cdm_wrapper = 68 scoped_ptr<PepperCdmWrapper> pepper_cdm_wrapper =
38 create_pepper_cdm_cb.Run(plugin_type, security_origin); 69 create_pepper_cdm_cb.Run(plugin_type, security_origin);
39 if (!pepper_cdm_wrapper) { 70 if (!pepper_cdm_wrapper) {
40 DLOG(ERROR) << "Plugin instance creation failed."; 71 DLOG(ERROR) << "Plugin instance creation failed.";
41 return scoped_ptr<PpapiDecryptor>(); 72 return scoped_ptr<PpapiDecryptor>();
42 } 73 }
43 74
44 return scoped_ptr<PpapiDecryptor>( 75 return scoped_ptr<PpapiDecryptor>(
45 new PpapiDecryptor(key_system, 76 new PpapiDecryptor(key_system,
46 pepper_cdm_wrapper.Pass(), 77 pepper_cdm_wrapper.Pass(),
47 session_created_cb,
48 session_message_cb, 78 session_message_cb,
49 session_ready_cb, 79 session_ready_cb,
50 session_closed_cb, 80 session_closed_cb,
51 session_error_cb)); 81 session_error_cb));
52 } 82 }
53 83
54 PpapiDecryptor::PpapiDecryptor( 84 PpapiDecryptor::PpapiDecryptor(
55 const std::string& key_system, 85 const std::string& key_system,
56 scoped_ptr<PepperCdmWrapper> pepper_cdm_wrapper, 86 scoped_ptr<PepperCdmWrapper> pepper_cdm_wrapper,
57 const media::SessionCreatedCB& session_created_cb,
58 const media::SessionMessageCB& session_message_cb, 87 const media::SessionMessageCB& session_message_cb,
59 const media::SessionReadyCB& session_ready_cb, 88 const media::SessionReadyCB& session_ready_cb,
60 const media::SessionClosedCB& session_closed_cb, 89 const media::SessionClosedCB& session_closed_cb,
61 const media::SessionErrorCB& session_error_cb) 90 const media::SessionErrorCB& session_error_cb)
62 : pepper_cdm_wrapper_(pepper_cdm_wrapper.Pass()), 91 : pepper_cdm_wrapper_(pepper_cdm_wrapper.Pass()),
63 session_created_cb_(session_created_cb),
64 session_message_cb_(session_message_cb), 92 session_message_cb_(session_message_cb),
65 session_ready_cb_(session_ready_cb), 93 session_ready_cb_(session_ready_cb),
66 session_closed_cb_(session_closed_cb), 94 session_closed_cb_(session_closed_cb),
67 session_error_cb_(session_error_cb), 95 session_error_cb_(session_error_cb),
68 render_loop_proxy_(base::MessageLoopProxy::current()), 96 render_loop_proxy_(base::MessageLoopProxy::current()),
69 weak_ptr_factory_(this) { 97 weak_ptr_factory_(this) {
70 DCHECK(pepper_cdm_wrapper_.get()); 98 DCHECK(pepper_cdm_wrapper_.get());
71 DCHECK(!session_created_cb_.is_null());
72 DCHECK(!session_message_cb_.is_null()); 99 DCHECK(!session_message_cb_.is_null());
73 DCHECK(!session_ready_cb_.is_null()); 100 DCHECK(!session_ready_cb_.is_null());
74 DCHECK(!session_closed_cb_.is_null()); 101 DCHECK(!session_closed_cb_.is_null());
75 DCHECK(!session_error_cb_.is_null()); 102 DCHECK(!session_error_cb_.is_null());
76 103
77 base::WeakPtr<PpapiDecryptor> weak_this = weak_ptr_factory_.GetWeakPtr(); 104 base::WeakPtr<PpapiDecryptor> weak_this = weak_ptr_factory_.GetWeakPtr();
78 CdmDelegate()->Initialize( 105 CdmDelegate()->Initialize(
79 key_system, 106 key_system,
80 base::Bind(&PpapiDecryptor::OnSessionCreated, weak_this),
81 base::Bind(&PpapiDecryptor::OnSessionMessage, weak_this), 107 base::Bind(&PpapiDecryptor::OnSessionMessage, weak_this),
82 base::Bind(&PpapiDecryptor::OnSessionReady, weak_this), 108 base::Bind(&PpapiDecryptor::OnSessionReady, weak_this),
83 base::Bind(&PpapiDecryptor::OnSessionClosed, weak_this), 109 base::Bind(&PpapiDecryptor::OnSessionClosed, weak_this),
84 base::Bind(&PpapiDecryptor::OnSessionError, weak_this), 110 base::Bind(&PpapiDecryptor::OnSessionError, weak_this),
85 base::Bind(&PpapiDecryptor::OnFatalPluginError, weak_this)); 111 base::Bind(&PpapiDecryptor::OnFatalPluginError, weak_this));
86 } 112 }
87 113
88 PpapiDecryptor::~PpapiDecryptor() { 114 PpapiDecryptor::~PpapiDecryptor() {
89 pepper_cdm_wrapper_.reset(); 115 pepper_cdm_wrapper_.reset();
90 } 116 }
91 117
92 bool PpapiDecryptor::CreateSession(uint32 session_id, 118 void PpapiDecryptor::CreateSession(
93 const std::string& content_type, 119 const std::string& init_data_type,
94 const uint8* init_data, 120 const uint8* init_data,
95 int init_data_length) { 121 int init_data_length,
96 DVLOG(2) << __FUNCTION__; 122 SessionType session_type,
97 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); 123 scoped_ptr<media::NewSessionCdmPromise> promise) {
98
99 if (!CdmDelegate() ||
100 !CdmDelegate()->CreateSession(
101 session_id, content_type, init_data, init_data_length)) {
102 ReportFailureToCallPlugin(session_id);
103 return false;
104 }
105
106 return true;
107 }
108
109 void PpapiDecryptor::LoadSession(uint32 session_id,
110 const std::string& web_session_id) {
111 DVLOG(2) << __FUNCTION__; 124 DVLOG(2) << __FUNCTION__;
112 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); 125 DCHECK(render_loop_proxy_->BelongsToCurrentThread());
113 126
114 if (!CdmDelegate()) { 127 if (!CdmDelegate()) {
115 ReportFailureToCallPlugin(session_id); 128 promise->reject(INVALID_STATE_ERROR, 0, "CdmDelegate() does not exist.");
116 return; 129 return;
117 } 130 }
118 131
119 CdmDelegate()->LoadSession(session_id, web_session_id); 132 CdmDelegate()->CreateSession(init_data_type,
133 init_data,
134 init_data_length,
135 session_type,
136 promise.Pass());
120 } 137 }
121 138
122 void PpapiDecryptor::UpdateSession(uint32 session_id, 139 void PpapiDecryptor::LoadSession(
123 const uint8* response, 140 const std::string& web_session_id,
124 int response_length) { 141 scoped_ptr<media::NewSessionCdmPromise> promise) {
125 DVLOG(2) << __FUNCTION__; 142 DVLOG(2) << __FUNCTION__;
126 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); 143 DCHECK(render_loop_proxy_->BelongsToCurrentThread());
127 144
128 if (!CdmDelegate() || 145 if (!CdmDelegate()) {
129 !CdmDelegate()->UpdateSession(session_id, response, response_length)) { 146 promise->reject(INVALID_STATE_ERROR, 0, "CdmDelegate() does not exist.");
130 ReportFailureToCallPlugin(session_id);
131 return; 147 return;
132 } 148 }
149
150 CdmDelegate()->LoadSession(web_session_id, promise.Pass());
133 } 151 }
134 152
135 void PpapiDecryptor::ReleaseSession(uint32 session_id) { 153 void PpapiDecryptor::UpdateSession(
136 DVLOG(2) << __FUNCTION__; 154 const std::string& web_session_id,
155 const uint8* response,
156 int response_length,
157 scoped_ptr<media::SimpleCdmPromise> promise) {
137 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); 158 DCHECK(render_loop_proxy_->BelongsToCurrentThread());
138 159
139 if (!CdmDelegate() || !CdmDelegate()->ReleaseSession(session_id)) { 160 if (!CdmDelegate()) {
140 ReportFailureToCallPlugin(session_id); 161 promise->reject(INVALID_STATE_ERROR, 0, "CdmDelegate() does not exist.");
141 return; 162 return;
142 } 163 }
164
165 scoped_ptr<SessionUpdatedPromise> session_updated_promise(
166 new SessionUpdatedPromise(promise.Pass(),
167 base::Bind(&PpapiDecryptor::ResumePlayback,
168 weak_ptr_factory_.GetWeakPtr())));
169 CdmDelegate()->UpdateSession(
170 web_session_id,
171 response,
172 response_length,
173 session_updated_promise.PassAs<media::SimpleCdmPromise>());
174 }
175
176 void PpapiDecryptor::ReleaseSession(
177 const std::string& web_session_id,
178 scoped_ptr<media::SimpleCdmPromise> promise) {
179 DCHECK(render_loop_proxy_->BelongsToCurrentThread());
180
181 if (!CdmDelegate()) {
182 promise->reject(INVALID_STATE_ERROR, 0, "CdmDelegate() does not exist.");
183 return;
184 }
185
186 CdmDelegate()->ReleaseSession(web_session_id, promise.Pass());
143 } 187 }
144 188
145 media::Decryptor* PpapiDecryptor::GetDecryptor() { 189 media::Decryptor* PpapiDecryptor::GetDecryptor() {
146 return this; 190 return this;
147 } 191 }
148 192
149 void PpapiDecryptor::RegisterNewKeyCB(StreamType stream_type, 193 void PpapiDecryptor::RegisterNewKeyCB(StreamType stream_type,
150 const NewKeyCB& new_key_cb) { 194 const NewKeyCB& new_key_cb) {
151 if (!render_loop_proxy_->BelongsToCurrentThread()) { 195 if (!render_loop_proxy_->BelongsToCurrentThread()) {
152 render_loop_proxy_->PostTask(FROM_HERE, 196 render_loop_proxy_->PostTask(FROM_HERE,
(...skipping 170 matching lines...) Expand 10 before | Expand all | Expand 10 after
323 weak_ptr_factory_.GetWeakPtr(), 367 weak_ptr_factory_.GetWeakPtr(),
324 stream_type)); 368 stream_type));
325 return; 369 return;
326 } 370 }
327 371
328 DVLOG(2) << __FUNCTION__ << " - stream_type: " << stream_type; 372 DVLOG(2) << __FUNCTION__ << " - stream_type: " << stream_type;
329 if (CdmDelegate()) 373 if (CdmDelegate())
330 CdmDelegate()->DeinitializeDecoder(stream_type); 374 CdmDelegate()->DeinitializeDecoder(stream_type);
331 } 375 }
332 376
333 void PpapiDecryptor::ReportFailureToCallPlugin(uint32 session_id) {
334 DCHECK(render_loop_proxy_->BelongsToCurrentThread());
335 DVLOG(1) << "Failed to call plugin.";
336 session_error_cb_.Run(session_id, kUnknownError, 0);
337 }
338
339 void PpapiDecryptor::OnDecoderInitialized(StreamType stream_type, 377 void PpapiDecryptor::OnDecoderInitialized(StreamType stream_type,
340 bool success) { 378 bool success) {
341 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); 379 DCHECK(render_loop_proxy_->BelongsToCurrentThread());
342 switch (stream_type) { 380 switch (stream_type) {
343 case kAudio: 381 case kAudio:
344 DCHECK(!audio_decoder_init_cb_.is_null()); 382 DCHECK(!audio_decoder_init_cb_.is_null());
345 base::ResetAndReturn(&audio_decoder_init_cb_).Run(success); 383 base::ResetAndReturn(&audio_decoder_init_cb_).Run(success);
346 break; 384 break;
347 case kVideo: 385 case kVideo:
348 DCHECK(!video_decoder_init_cb_.is_null()); 386 DCHECK(!video_decoder_init_cb_.is_null());
349 base::ResetAndReturn(&video_decoder_init_cb_).Run(success); 387 base::ResetAndReturn(&video_decoder_init_cb_).Run(success);
350 break; 388 break;
351 default: 389 default:
352 NOTREACHED(); 390 NOTREACHED();
353 } 391 }
354 } 392 }
355 393
356 void PpapiDecryptor::OnSessionCreated(uint32 session_id, 394 void PpapiDecryptor::OnSessionMessage(const std::string& web_session_id,
357 const std::string& web_session_id) {
358 DCHECK(render_loop_proxy_->BelongsToCurrentThread());
359 session_created_cb_.Run(session_id, web_session_id);
360 }
361
362 void PpapiDecryptor::OnSessionMessage(uint32 session_id,
363 const std::vector<uint8>& message, 395 const std::vector<uint8>& message,
364 const GURL& destination_url) { 396 const GURL& destination_url) {
365 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); 397 DCHECK(render_loop_proxy_->BelongsToCurrentThread());
366 session_message_cb_.Run(session_id, message, destination_url); 398 session_message_cb_.Run(web_session_id, message, destination_url);
367 } 399 }
368 400
369 void PpapiDecryptor::OnSessionReady(uint32 session_id) { 401 void PpapiDecryptor::OnSessionReady(const std::string& web_session_id) {
370 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); 402 DCHECK(render_loop_proxy_->BelongsToCurrentThread());
371 403
404 ResumePlayback();
405 session_ready_cb_.Run(web_session_id);
406 }
407
408 void PpapiDecryptor::OnSessionClosed(const std::string& web_session_id) {
409 DCHECK(render_loop_proxy_->BelongsToCurrentThread());
410 session_closed_cb_.Run(web_session_id);
411 }
412
413 void PpapiDecryptor::OnSessionError(const std::string& web_session_id,
414 MediaKeys::Exception exception_code,
415 uint32 system_code,
416 const std::string& error_description) {
417 DCHECK(render_loop_proxy_->BelongsToCurrentThread());
418 session_error_cb_.Run(
419 web_session_id, exception_code, system_code, error_description);
420 }
421
422 void PpapiDecryptor::ResumePlayback() {
372 // Based on the spec, we need to resume playback when update() completes 423 // Based on the spec, we need to resume playback when update() completes
373 // successfully, or when a session is successfully loaded. In both cases, 424 // successfully, or when a session is successfully loaded (triggered by
374 // the CDM fires OnSessionReady() event. So we choose to call the NewKeyCBs 425 // OnSessionReady()). So we choose to call the NewKeyCBs here.
375 // here.
376 // TODO(xhwang): Rename OnSessionReady to indicate that the playback may
377 // resume successfully (e.g. a new key is available or available again).
378 if (!new_audio_key_cb_.is_null()) 426 if (!new_audio_key_cb_.is_null())
379 new_audio_key_cb_.Run(); 427 new_audio_key_cb_.Run();
380 428
381 if (!new_video_key_cb_.is_null()) 429 if (!new_video_key_cb_.is_null())
382 new_video_key_cb_.Run(); 430 new_video_key_cb_.Run();
383
384 session_ready_cb_.Run(session_id);
385 }
386
387 void PpapiDecryptor::OnSessionClosed(uint32 session_id) {
388 DCHECK(render_loop_proxy_->BelongsToCurrentThread());
389 session_closed_cb_.Run(session_id);
390 }
391
392 void PpapiDecryptor::OnSessionError(uint32 session_id,
393 media::MediaKeys::KeyError error_code,
394 uint32 system_code) {
395 DCHECK(render_loop_proxy_->BelongsToCurrentThread());
396 session_error_cb_.Run(session_id, error_code, system_code);
397 } 431 }
398 432
399 void PpapiDecryptor::OnFatalPluginError() { 433 void PpapiDecryptor::OnFatalPluginError() {
400 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); 434 DCHECK(render_loop_proxy_->BelongsToCurrentThread());
401 pepper_cdm_wrapper_.reset(); 435 pepper_cdm_wrapper_.reset();
402 } 436 }
403 437
404 ContentDecryptorDelegate* PpapiDecryptor::CdmDelegate() { 438 ContentDecryptorDelegate* PpapiDecryptor::CdmDelegate() {
405 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); 439 DCHECK(render_loop_proxy_->BelongsToCurrentThread());
406 return (pepper_cdm_wrapper_) ? pepper_cdm_wrapper_->GetCdmDelegate() : NULL; 440 return (pepper_cdm_wrapper_) ? pepper_cdm_wrapper_->GetCdmDelegate() : NULL;
407 } 441 }
408 442
409 } // namespace content 443 } // namespace content
OLDNEW
« no previous file with comments | « content/renderer/media/crypto/ppapi_decryptor.h ('k') | content/renderer/media/crypto/proxy_decryptor.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698