OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "content/renderer/media/crypto/ppapi_decryptor.h" | 5 #include "content/renderer/media/crypto/ppapi_decryptor.h" |
6 | 6 |
7 #include <string> | 7 #include <string> |
8 | 8 |
9 #include "base/bind.h" | 9 #include "base/bind.h" |
| 10 #include "base/callback.h" |
10 #include "base/callback_helpers.h" | 11 #include "base/callback_helpers.h" |
11 #include "base/location.h" | 12 #include "base/location.h" |
12 #include "base/logging.h" | 13 #include "base/logging.h" |
13 #include "base/message_loop/message_loop.h" | 14 #include "base/message_loop/message_loop.h" |
14 #include "base/message_loop/message_loop_proxy.h" | 15 #include "base/message_loop/message_loop_proxy.h" |
15 #include "content/renderer/media/crypto/key_systems.h" | 16 #include "content/renderer/media/crypto/key_systems.h" |
16 #include "content/renderer/pepper/content_decryptor_delegate.h" | 17 #include "content/renderer/pepper/content_decryptor_delegate.h" |
17 #include "content/renderer/pepper/pepper_plugin_instance_impl.h" | 18 #include "content/renderer/pepper/pepper_plugin_instance_impl.h" |
18 #include "media/base/audio_decoder_config.h" | 19 #include "media/base/audio_decoder_config.h" |
| 20 #include "media/base/cdm_promise.h" |
19 #include "media/base/data_buffer.h" | 21 #include "media/base/data_buffer.h" |
20 #include "media/base/decoder_buffer.h" | 22 #include "media/base/decoder_buffer.h" |
21 #include "media/base/video_decoder_config.h" | 23 #include "media/base/video_decoder_config.h" |
22 #include "media/base/video_frame.h" | 24 #include "media/base/video_frame.h" |
23 | 25 |
24 namespace content { | 26 namespace content { |
25 | 27 |
| 28 // This class is needed so that resolving an Update() promise triggers playback |
| 29 // of the stream. It intercepts the resolve() call to invoke an additional |
| 30 // callback. |
| 31 class SessionUpdatedPromise : public media::SimpleCdmPromise { |
| 32 public: |
| 33 SessionUpdatedPromise(scoped_ptr<media::SimpleCdmPromise> caller_promise, |
| 34 base::Closure additional_resolve_cb) |
| 35 : caller_promise_(caller_promise.Pass()), |
| 36 additional_resolve_cb_(additional_resolve_cb) {} |
| 37 |
| 38 virtual void resolve() OVERRIDE { |
| 39 DCHECK(is_pending_); |
| 40 is_pending_ = false; |
| 41 additional_resolve_cb_.Run(); |
| 42 caller_promise_->resolve(); |
| 43 } |
| 44 |
| 45 virtual void reject(media::MediaKeys::Exception exception_code, |
| 46 uint32 system_code, |
| 47 const std::string& error_message) OVERRIDE { |
| 48 DCHECK(is_pending_); |
| 49 is_pending_ = false; |
| 50 caller_promise_->reject(exception_code, system_code, error_message); |
| 51 } |
| 52 |
| 53 protected: |
| 54 scoped_ptr<media::SimpleCdmPromise> caller_promise_; |
| 55 base::Closure additional_resolve_cb_; |
| 56 }; |
| 57 |
26 scoped_ptr<PpapiDecryptor> PpapiDecryptor::Create( | 58 scoped_ptr<PpapiDecryptor> PpapiDecryptor::Create( |
27 const std::string& key_system, | 59 const std::string& key_system, |
28 const GURL& security_origin, | 60 const GURL& security_origin, |
29 const CreatePepperCdmCB& create_pepper_cdm_cb, | 61 const CreatePepperCdmCB& create_pepper_cdm_cb, |
30 const media::SessionCreatedCB& session_created_cb, | |
31 const media::SessionMessageCB& session_message_cb, | 62 const media::SessionMessageCB& session_message_cb, |
32 const media::SessionReadyCB& session_ready_cb, | 63 const media::SessionReadyCB& session_ready_cb, |
33 const media::SessionClosedCB& session_closed_cb, | 64 const media::SessionClosedCB& session_closed_cb, |
34 const media::SessionErrorCB& session_error_cb) { | 65 const media::SessionErrorCB& session_error_cb) { |
35 std::string plugin_type = GetPepperType(key_system); | 66 std::string plugin_type = GetPepperType(key_system); |
36 DCHECK(!plugin_type.empty()); | 67 DCHECK(!plugin_type.empty()); |
37 scoped_ptr<PepperCdmWrapper> pepper_cdm_wrapper = | 68 scoped_ptr<PepperCdmWrapper> pepper_cdm_wrapper = |
38 create_pepper_cdm_cb.Run(plugin_type, security_origin); | 69 create_pepper_cdm_cb.Run(plugin_type, security_origin); |
39 if (!pepper_cdm_wrapper) { | 70 if (!pepper_cdm_wrapper) { |
40 DLOG(ERROR) << "Plugin instance creation failed."; | 71 DLOG(ERROR) << "Plugin instance creation failed."; |
41 return scoped_ptr<PpapiDecryptor>(); | 72 return scoped_ptr<PpapiDecryptor>(); |
42 } | 73 } |
43 | 74 |
44 return scoped_ptr<PpapiDecryptor>( | 75 return scoped_ptr<PpapiDecryptor>( |
45 new PpapiDecryptor(key_system, | 76 new PpapiDecryptor(key_system, |
46 pepper_cdm_wrapper.Pass(), | 77 pepper_cdm_wrapper.Pass(), |
47 session_created_cb, | |
48 session_message_cb, | 78 session_message_cb, |
49 session_ready_cb, | 79 session_ready_cb, |
50 session_closed_cb, | 80 session_closed_cb, |
51 session_error_cb)); | 81 session_error_cb)); |
52 } | 82 } |
53 | 83 |
54 PpapiDecryptor::PpapiDecryptor( | 84 PpapiDecryptor::PpapiDecryptor( |
55 const std::string& key_system, | 85 const std::string& key_system, |
56 scoped_ptr<PepperCdmWrapper> pepper_cdm_wrapper, | 86 scoped_ptr<PepperCdmWrapper> pepper_cdm_wrapper, |
57 const media::SessionCreatedCB& session_created_cb, | |
58 const media::SessionMessageCB& session_message_cb, | 87 const media::SessionMessageCB& session_message_cb, |
59 const media::SessionReadyCB& session_ready_cb, | 88 const media::SessionReadyCB& session_ready_cb, |
60 const media::SessionClosedCB& session_closed_cb, | 89 const media::SessionClosedCB& session_closed_cb, |
61 const media::SessionErrorCB& session_error_cb) | 90 const media::SessionErrorCB& session_error_cb) |
62 : pepper_cdm_wrapper_(pepper_cdm_wrapper.Pass()), | 91 : pepper_cdm_wrapper_(pepper_cdm_wrapper.Pass()), |
63 session_created_cb_(session_created_cb), | |
64 session_message_cb_(session_message_cb), | 92 session_message_cb_(session_message_cb), |
65 session_ready_cb_(session_ready_cb), | 93 session_ready_cb_(session_ready_cb), |
66 session_closed_cb_(session_closed_cb), | 94 session_closed_cb_(session_closed_cb), |
67 session_error_cb_(session_error_cb), | 95 session_error_cb_(session_error_cb), |
68 render_loop_proxy_(base::MessageLoopProxy::current()), | 96 render_loop_proxy_(base::MessageLoopProxy::current()), |
69 weak_ptr_factory_(this) { | 97 weak_ptr_factory_(this) { |
70 DCHECK(pepper_cdm_wrapper_.get()); | 98 DCHECK(pepper_cdm_wrapper_.get()); |
71 DCHECK(!session_created_cb_.is_null()); | |
72 DCHECK(!session_message_cb_.is_null()); | 99 DCHECK(!session_message_cb_.is_null()); |
73 DCHECK(!session_ready_cb_.is_null()); | 100 DCHECK(!session_ready_cb_.is_null()); |
74 DCHECK(!session_closed_cb_.is_null()); | 101 DCHECK(!session_closed_cb_.is_null()); |
75 DCHECK(!session_error_cb_.is_null()); | 102 DCHECK(!session_error_cb_.is_null()); |
76 | 103 |
77 base::WeakPtr<PpapiDecryptor> weak_this = weak_ptr_factory_.GetWeakPtr(); | 104 base::WeakPtr<PpapiDecryptor> weak_this = weak_ptr_factory_.GetWeakPtr(); |
78 CdmDelegate()->Initialize( | 105 CdmDelegate()->Initialize( |
79 key_system, | 106 key_system, |
80 base::Bind(&PpapiDecryptor::OnSessionCreated, weak_this), | |
81 base::Bind(&PpapiDecryptor::OnSessionMessage, weak_this), | 107 base::Bind(&PpapiDecryptor::OnSessionMessage, weak_this), |
82 base::Bind(&PpapiDecryptor::OnSessionReady, weak_this), | 108 base::Bind(&PpapiDecryptor::OnSessionReady, weak_this), |
83 base::Bind(&PpapiDecryptor::OnSessionClosed, weak_this), | 109 base::Bind(&PpapiDecryptor::OnSessionClosed, weak_this), |
84 base::Bind(&PpapiDecryptor::OnSessionError, weak_this), | 110 base::Bind(&PpapiDecryptor::OnSessionError, weak_this), |
85 base::Bind(&PpapiDecryptor::OnFatalPluginError, weak_this)); | 111 base::Bind(&PpapiDecryptor::OnFatalPluginError, weak_this)); |
86 } | 112 } |
87 | 113 |
88 PpapiDecryptor::~PpapiDecryptor() { | 114 PpapiDecryptor::~PpapiDecryptor() { |
89 pepper_cdm_wrapper_.reset(); | 115 pepper_cdm_wrapper_.reset(); |
90 } | 116 } |
91 | 117 |
92 bool PpapiDecryptor::CreateSession(uint32 session_id, | 118 void PpapiDecryptor::CreateSession( |
93 const std::string& content_type, | 119 const std::string& init_data_type, |
94 const uint8* init_data, | 120 const uint8* init_data, |
95 int init_data_length) { | 121 int init_data_length, |
96 DVLOG(2) << __FUNCTION__; | 122 SessionType session_type, |
97 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); | 123 scoped_ptr<media::NewSessionCdmPromise> promise) { |
98 | |
99 if (!CdmDelegate() || | |
100 !CdmDelegate()->CreateSession( | |
101 session_id, content_type, init_data, init_data_length)) { | |
102 ReportFailureToCallPlugin(session_id); | |
103 return false; | |
104 } | |
105 | |
106 return true; | |
107 } | |
108 | |
109 void PpapiDecryptor::LoadSession(uint32 session_id, | |
110 const std::string& web_session_id) { | |
111 DVLOG(2) << __FUNCTION__; | 124 DVLOG(2) << __FUNCTION__; |
112 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); | 125 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); |
113 | 126 |
114 if (!CdmDelegate()) { | 127 if (!CdmDelegate()) { |
115 ReportFailureToCallPlugin(session_id); | 128 promise->reject(INVALID_STATE_ERROR, 0, "CdmDelegate() does not exist."); |
116 return; | 129 return; |
117 } | 130 } |
118 | 131 |
119 CdmDelegate()->LoadSession(session_id, web_session_id); | 132 CdmDelegate()->CreateSession(init_data_type, |
| 133 init_data, |
| 134 init_data_length, |
| 135 session_type, |
| 136 promise.Pass()); |
120 } | 137 } |
121 | 138 |
122 void PpapiDecryptor::UpdateSession(uint32 session_id, | 139 void PpapiDecryptor::LoadSession( |
123 const uint8* response, | 140 const std::string& web_session_id, |
124 int response_length) { | 141 scoped_ptr<media::NewSessionCdmPromise> promise) { |
125 DVLOG(2) << __FUNCTION__; | 142 DVLOG(2) << __FUNCTION__; |
126 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); | 143 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); |
127 | 144 |
128 if (!CdmDelegate() || | 145 if (!CdmDelegate()) { |
129 !CdmDelegate()->UpdateSession(session_id, response, response_length)) { | 146 promise->reject(INVALID_STATE_ERROR, 0, "CdmDelegate() does not exist."); |
130 ReportFailureToCallPlugin(session_id); | |
131 return; | 147 return; |
132 } | 148 } |
| 149 |
| 150 CdmDelegate()->LoadSession(web_session_id, promise.Pass()); |
133 } | 151 } |
134 | 152 |
135 void PpapiDecryptor::ReleaseSession(uint32 session_id) { | 153 void PpapiDecryptor::UpdateSession( |
136 DVLOG(2) << __FUNCTION__; | 154 const std::string& web_session_id, |
| 155 const uint8* response, |
| 156 int response_length, |
| 157 scoped_ptr<media::SimpleCdmPromise> promise) { |
137 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); | 158 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); |
138 | 159 |
139 if (!CdmDelegate() || !CdmDelegate()->ReleaseSession(session_id)) { | 160 if (!CdmDelegate()) { |
140 ReportFailureToCallPlugin(session_id); | 161 promise->reject(INVALID_STATE_ERROR, 0, "CdmDelegate() does not exist."); |
141 return; | 162 return; |
142 } | 163 } |
| 164 |
| 165 scoped_ptr<SessionUpdatedPromise> session_updated_promise( |
| 166 new SessionUpdatedPromise(promise.Pass(), |
| 167 base::Bind(&PpapiDecryptor::ResumePlayback, |
| 168 weak_ptr_factory_.GetWeakPtr()))); |
| 169 CdmDelegate()->UpdateSession( |
| 170 web_session_id, |
| 171 response, |
| 172 response_length, |
| 173 session_updated_promise.PassAs<media::SimpleCdmPromise>()); |
| 174 } |
| 175 |
| 176 void PpapiDecryptor::ReleaseSession( |
| 177 const std::string& web_session_id, |
| 178 scoped_ptr<media::SimpleCdmPromise> promise) { |
| 179 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); |
| 180 |
| 181 if (!CdmDelegate()) { |
| 182 promise->reject(INVALID_STATE_ERROR, 0, "CdmDelegate() does not exist."); |
| 183 return; |
| 184 } |
| 185 |
| 186 CdmDelegate()->ReleaseSession(web_session_id, promise.Pass()); |
143 } | 187 } |
144 | 188 |
145 media::Decryptor* PpapiDecryptor::GetDecryptor() { | 189 media::Decryptor* PpapiDecryptor::GetDecryptor() { |
146 return this; | 190 return this; |
147 } | 191 } |
148 | 192 |
149 void PpapiDecryptor::RegisterNewKeyCB(StreamType stream_type, | 193 void PpapiDecryptor::RegisterNewKeyCB(StreamType stream_type, |
150 const NewKeyCB& new_key_cb) { | 194 const NewKeyCB& new_key_cb) { |
151 if (!render_loop_proxy_->BelongsToCurrentThread()) { | 195 if (!render_loop_proxy_->BelongsToCurrentThread()) { |
152 render_loop_proxy_->PostTask(FROM_HERE, | 196 render_loop_proxy_->PostTask(FROM_HERE, |
(...skipping 170 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
323 weak_ptr_factory_.GetWeakPtr(), | 367 weak_ptr_factory_.GetWeakPtr(), |
324 stream_type)); | 368 stream_type)); |
325 return; | 369 return; |
326 } | 370 } |
327 | 371 |
328 DVLOG(2) << __FUNCTION__ << " - stream_type: " << stream_type; | 372 DVLOG(2) << __FUNCTION__ << " - stream_type: " << stream_type; |
329 if (CdmDelegate()) | 373 if (CdmDelegate()) |
330 CdmDelegate()->DeinitializeDecoder(stream_type); | 374 CdmDelegate()->DeinitializeDecoder(stream_type); |
331 } | 375 } |
332 | 376 |
333 void PpapiDecryptor::ReportFailureToCallPlugin(uint32 session_id) { | |
334 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); | |
335 DVLOG(1) << "Failed to call plugin."; | |
336 session_error_cb_.Run(session_id, kUnknownError, 0); | |
337 } | |
338 | |
339 void PpapiDecryptor::OnDecoderInitialized(StreamType stream_type, | 377 void PpapiDecryptor::OnDecoderInitialized(StreamType stream_type, |
340 bool success) { | 378 bool success) { |
341 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); | 379 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); |
342 switch (stream_type) { | 380 switch (stream_type) { |
343 case kAudio: | 381 case kAudio: |
344 DCHECK(!audio_decoder_init_cb_.is_null()); | 382 DCHECK(!audio_decoder_init_cb_.is_null()); |
345 base::ResetAndReturn(&audio_decoder_init_cb_).Run(success); | 383 base::ResetAndReturn(&audio_decoder_init_cb_).Run(success); |
346 break; | 384 break; |
347 case kVideo: | 385 case kVideo: |
348 DCHECK(!video_decoder_init_cb_.is_null()); | 386 DCHECK(!video_decoder_init_cb_.is_null()); |
349 base::ResetAndReturn(&video_decoder_init_cb_).Run(success); | 387 base::ResetAndReturn(&video_decoder_init_cb_).Run(success); |
350 break; | 388 break; |
351 default: | 389 default: |
352 NOTREACHED(); | 390 NOTREACHED(); |
353 } | 391 } |
354 } | 392 } |
355 | 393 |
356 void PpapiDecryptor::OnSessionCreated(uint32 session_id, | 394 void PpapiDecryptor::OnSessionMessage(const std::string& web_session_id, |
357 const std::string& web_session_id) { | |
358 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); | |
359 session_created_cb_.Run(session_id, web_session_id); | |
360 } | |
361 | |
362 void PpapiDecryptor::OnSessionMessage(uint32 session_id, | |
363 const std::vector<uint8>& message, | 395 const std::vector<uint8>& message, |
364 const GURL& destination_url) { | 396 const GURL& destination_url) { |
365 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); | 397 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); |
366 session_message_cb_.Run(session_id, message, destination_url); | 398 session_message_cb_.Run(web_session_id, message, destination_url); |
367 } | 399 } |
368 | 400 |
369 void PpapiDecryptor::OnSessionReady(uint32 session_id) { | 401 void PpapiDecryptor::OnSessionReady(const std::string& web_session_id) { |
370 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); | 402 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); |
371 | 403 |
| 404 ResumePlayback(); |
| 405 session_ready_cb_.Run(web_session_id); |
| 406 } |
| 407 |
| 408 void PpapiDecryptor::OnSessionClosed(const std::string& web_session_id) { |
| 409 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); |
| 410 session_closed_cb_.Run(web_session_id); |
| 411 } |
| 412 |
| 413 void PpapiDecryptor::OnSessionError(const std::string& web_session_id, |
| 414 MediaKeys::Exception exception_code, |
| 415 uint32 system_code, |
| 416 const std::string& error_description) { |
| 417 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); |
| 418 session_error_cb_.Run( |
| 419 web_session_id, exception_code, system_code, error_description); |
| 420 } |
| 421 |
| 422 void PpapiDecryptor::ResumePlayback() { |
372 // Based on the spec, we need to resume playback when update() completes | 423 // Based on the spec, we need to resume playback when update() completes |
373 // successfully, or when a session is successfully loaded. In both cases, | 424 // successfully, or when a session is successfully loaded (triggered by |
374 // the CDM fires OnSessionReady() event. So we choose to call the NewKeyCBs | 425 // OnSessionReady()). So we choose to call the NewKeyCBs here. |
375 // here. | |
376 // TODO(xhwang): Rename OnSessionReady to indicate that the playback may | |
377 // resume successfully (e.g. a new key is available or available again). | |
378 if (!new_audio_key_cb_.is_null()) | 426 if (!new_audio_key_cb_.is_null()) |
379 new_audio_key_cb_.Run(); | 427 new_audio_key_cb_.Run(); |
380 | 428 |
381 if (!new_video_key_cb_.is_null()) | 429 if (!new_video_key_cb_.is_null()) |
382 new_video_key_cb_.Run(); | 430 new_video_key_cb_.Run(); |
383 | |
384 session_ready_cb_.Run(session_id); | |
385 } | |
386 | |
387 void PpapiDecryptor::OnSessionClosed(uint32 session_id) { | |
388 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); | |
389 session_closed_cb_.Run(session_id); | |
390 } | |
391 | |
392 void PpapiDecryptor::OnSessionError(uint32 session_id, | |
393 media::MediaKeys::KeyError error_code, | |
394 uint32 system_code) { | |
395 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); | |
396 session_error_cb_.Run(session_id, error_code, system_code); | |
397 } | 431 } |
398 | 432 |
399 void PpapiDecryptor::OnFatalPluginError() { | 433 void PpapiDecryptor::OnFatalPluginError() { |
400 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); | 434 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); |
401 pepper_cdm_wrapper_.reset(); | 435 pepper_cdm_wrapper_.reset(); |
402 } | 436 } |
403 | 437 |
404 ContentDecryptorDelegate* PpapiDecryptor::CdmDelegate() { | 438 ContentDecryptorDelegate* PpapiDecryptor::CdmDelegate() { |
405 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); | 439 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); |
406 return (pepper_cdm_wrapper_) ? pepper_cdm_wrapper_->GetCdmDelegate() : NULL; | 440 return (pepper_cdm_wrapper_) ? pepper_cdm_wrapper_->GetCdmDelegate() : NULL; |
407 } | 441 } |
408 | 442 |
409 } // namespace content | 443 } // namespace content |
OLD | NEW |