Index: content/renderer/media/crypto/proxy_media_keys.cc |
diff --git a/content/renderer/media/crypto/proxy_media_keys.cc b/content/renderer/media/crypto/proxy_media_keys.cc |
index 354211ff898f424b98361dc12ba92f99c255e994..551570ce6474603423238bc7d4024b68092514c3 100644 |
--- a/content/renderer/media/crypto/proxy_media_keys.cc |
+++ b/content/renderer/media/crypto/proxy_media_keys.cc |
@@ -8,8 +8,10 @@ |
#include "base/basictypes.h" |
#include "base/logging.h" |
+#include "base/stl_util.h" |
#include "content/renderer/media/crypto/key_systems.h" |
#include "content/renderer/media/crypto/renderer_cdm_manager.h" |
+#include "media/base/cdm_promise.h" |
namespace content { |
@@ -17,7 +19,6 @@ scoped_ptr<ProxyMediaKeys> ProxyMediaKeys::Create( |
const std::string& key_system, |
const GURL& security_origin, |
RendererCdmManager* manager, |
- const media::SessionCreatedCB& session_created_cb, |
const media::SessionMessageCB& session_message_cb, |
const media::SessionReadyCB& session_ready_cb, |
const media::SessionClosedCB& session_closed_cb, |
@@ -25,7 +26,6 @@ scoped_ptr<ProxyMediaKeys> ProxyMediaKeys::Create( |
DCHECK(manager); |
scoped_ptr<ProxyMediaKeys> proxy_media_keys( |
new ProxyMediaKeys(manager, |
- session_created_cb, |
session_message_cb, |
session_ready_cb, |
session_closed_cb, |
@@ -37,77 +37,163 @@ scoped_ptr<ProxyMediaKeys> ProxyMediaKeys::Create( |
ProxyMediaKeys::~ProxyMediaKeys() { |
manager_->DestroyCdm(cdm_id_); |
manager_->UnregisterMediaKeys(cdm_id_); |
+ |
+ // Reject any outstanding promises. |
+ for (PromiseMap::iterator it = session_id_to_promise_map_.begin(); |
+ it != session_id_to_promise_map_.end(); |
+ ++it) { |
+ it->second->reject( |
+ media::MediaKeys::NOT_SUPPORTED_ERROR, 0, "The operation was aborted."); |
+ } |
+ session_id_to_promise_map_.clear(); |
} |
-bool ProxyMediaKeys::CreateSession(uint32 session_id, |
- const std::string& content_type, |
- const uint8* init_data, |
- int init_data_length) { |
+void ProxyMediaKeys::CreateSession( |
+ const std::string& init_data_type, |
+ const uint8* init_data, |
+ int init_data_length, |
+ SessionType session_type, |
+ scoped_ptr<media::NewSessionCdmPromise> promise) { |
// TODO(xhwang): Move these checks up to blink and DCHECK here. |
// See http://crbug.com/342510 |
- CdmHostMsg_CreateSession_ContentType session_type; |
- if (content_type == "audio/mp4" || content_type == "video/mp4") { |
- session_type = CREATE_SESSION_TYPE_MP4; |
- } else if (content_type == "audio/webm" || content_type == "video/webm") { |
- session_type = CREATE_SESSION_TYPE_WEBM; |
+ CdmHostMsg_CreateSession_ContentType create_session_content_type; |
+ if (init_data_type == "audio/mp4" || init_data_type == "video/mp4") { |
+ create_session_content_type = CREATE_SESSION_TYPE_MP4; |
+ } else if (init_data_type == "audio/webm" || init_data_type == "video/webm") { |
+ create_session_content_type = CREATE_SESSION_TYPE_WEBM; |
} else { |
DLOG(ERROR) << "Unsupported EME CreateSession content type of " |
- << content_type; |
- return false; |
+ << init_data_type; |
+ promise->reject( |
+ NOT_SUPPORTED_ERROR, |
+ 0, |
+ "Unsupported EME CreateSession init data type of " + init_data_type); |
+ return; |
} |
+ uint32 session_id = CreateSessionId(); |
+ SavePromise(session_id, promise.PassAs<media::CdmPromise>()); |
manager_->CreateSession( |
cdm_id_, |
session_id, |
- session_type, |
+ create_session_content_type, |
std::vector<uint8>(init_data, init_data + init_data_length)); |
- return true; |
} |
-void ProxyMediaKeys::LoadSession(uint32 session_id, |
- const std::string& web_session_id) { |
+void ProxyMediaKeys::LoadSession( |
+ const std::string& web_session_id, |
+ scoped_ptr<media::NewSessionCdmPromise> promise) { |
// TODO(xhwang): Check key system and platform support for LoadSession in |
// blink and add NOTREACHED() here. |
DLOG(ERROR) << "ProxyMediaKeys doesn't support session loading."; |
- OnSessionError(session_id, media::MediaKeys::kUnknownError, 0); |
+ promise->reject(NOT_SUPPORTED_ERROR, 0, "LoadSession() is not supported."); |
} |
-void ProxyMediaKeys::UpdateSession(uint32 session_id, |
- const uint8* response, |
- int response_length) { |
+void ProxyMediaKeys::UpdateSession( |
+ const std::string& web_session_id, |
+ const uint8* response, |
+ int response_length, |
+ scoped_ptr<media::SimpleCdmPromise> promise) { |
+ uint32 session_id = LookupSessionId(web_session_id); |
+ if (!session_id) { |
+ promise->reject(INVALID_ACCESS_ERROR, 0, "Session does not exist."); |
+ return; |
+ } |
+ |
+ SavePromise(session_id, promise.PassAs<media::CdmPromise>()); |
manager_->UpdateSession( |
cdm_id_, |
session_id, |
std::vector<uint8>(response, response + response_length)); |
} |
-void ProxyMediaKeys::ReleaseSession(uint32 session_id) { |
+void ProxyMediaKeys::ReleaseSession( |
+ const std::string& web_session_id, |
+ scoped_ptr<media::SimpleCdmPromise> promise) { |
+ uint32 session_id = LookupSessionId(web_session_id); |
+ if (!session_id) { |
+ promise->reject(INVALID_ACCESS_ERROR, 0, "Session does not exist."); |
+ return; |
+ } |
+ |
+ SavePromise(session_id, promise.PassAs<media::CdmPromise>()); |
manager_->ReleaseSession(cdm_id_, session_id); |
} |
void ProxyMediaKeys::OnSessionCreated(uint32 session_id, |
const std::string& web_session_id) { |
- session_created_cb_.Run(session_id, web_session_id); |
+ AssignWebSessionId(session_id, web_session_id); |
+ scoped_ptr<media::CdmPromise> promise = TakePromise(session_id); |
+ if (promise) { |
+ media::NewSessionCdmPromise* session_promise( |
+ static_cast<media::NewSessionCdmPromise*>(promise.get())); |
+ session_promise->resolve(web_session_id); |
+ } |
} |
void ProxyMediaKeys::OnSessionMessage(uint32 session_id, |
const std::vector<uint8>& message, |
const GURL& destination_url) { |
- session_message_cb_.Run(session_id, message, destination_url); |
+ session_message_cb_.Run( |
+ LookupWebSessionId(session_id), message, destination_url); |
} |
void ProxyMediaKeys::OnSessionReady(uint32 session_id) { |
- session_ready_cb_.Run(session_id); |
+ scoped_ptr<media::CdmPromise> promise = TakePromise(session_id); |
+ if (promise) { |
+ media::SimpleCdmPromise* simple_promise( |
+ static_cast<media::SimpleCdmPromise*>(promise.get())); |
+ simple_promise->resolve(); |
+ } else { |
+ // Still needed for keyadded. |
+ const std::string web_session_id = LookupWebSessionId(session_id); |
+ session_ready_cb_.Run(web_session_id); |
+ } |
} |
void ProxyMediaKeys::OnSessionClosed(uint32 session_id) { |
- session_closed_cb_.Run(session_id); |
+ const std::string web_session_id = LookupWebSessionId(session_id); |
+ DropWebSessionId(web_session_id); |
+ scoped_ptr<media::CdmPromise> promise = TakePromise(session_id); |
+ if (promise) { |
+ media::SimpleCdmPromise* simple_promise( |
+ static_cast<media::SimpleCdmPromise*>(promise.get())); |
+ simple_promise->resolve(); |
+ } else { |
+ // It is possible for the CDM to close a session independent of a |
+ // Release() request. |
+ session_closed_cb_.Run(web_session_id); |
+ } |
} |
void ProxyMediaKeys::OnSessionError(uint32 session_id, |
media::MediaKeys::KeyError error_code, |
uint32 system_code) { |
- session_error_cb_.Run(session_id, error_code, system_code); |
+ const std::string web_session_id = LookupWebSessionId(session_id); |
+ media::MediaKeys::Exception exception_code; |
+ switch (error_code) { |
+ case media::MediaKeys::kClientError: |
+ exception_code = media::MediaKeys::CLIENT_ERROR; |
+ break; |
+ case media::MediaKeys::kOutputError: |
+ exception_code = media::MediaKeys::OUTPUT_ERROR; |
+ break; |
+ case media::MediaKeys::kUnknownError: |
+ default: |
+ exception_code = media::MediaKeys::UNKNOWN_ERROR; |
+ break; |
+ } |
+ |
+ scoped_ptr<media::CdmPromise> promise = TakePromise(session_id); |
+ if (promise) { |
+ promise->reject(exception_code, system_code, std::string()); |
+ return; |
+ } |
+ |
+ // Errors generally happen in response to a request, but it is possible |
+ // for something bad to happen in the CDM and it needs to tell the client. |
+ session_error_cb_.Run( |
+ web_session_id, exception_code, system_code, std::string()); |
} |
int ProxyMediaKeys::GetCdmId() const { |
@@ -116,13 +202,11 @@ int ProxyMediaKeys::GetCdmId() const { |
ProxyMediaKeys::ProxyMediaKeys( |
RendererCdmManager* manager, |
- const media::SessionCreatedCB& session_created_cb, |
const media::SessionMessageCB& session_message_cb, |
const media::SessionReadyCB& session_ready_cb, |
const media::SessionClosedCB& session_closed_cb, |
const media::SessionErrorCB& session_error_cb) |
: manager_(manager), |
- session_created_cb_(session_created_cb), |
session_message_cb_(session_message_cb), |
session_ready_cb_(session_ready_cb), |
session_closed_cb_(session_closed_cb), |
@@ -135,4 +219,54 @@ void ProxyMediaKeys::InitializeCdm(const std::string& key_system, |
manager_->InitializeCdm(cdm_id_, this, key_system, security_origin); |
} |
+uint32_t ProxyMediaKeys::CreateSessionId() { |
+ return next_session_id_++; |
+} |
+ |
+void ProxyMediaKeys::AssignWebSessionId(uint32_t session_id, |
+ const std::string& web_session_id) { |
+ DCHECK(!ContainsKey(web_session_to_session_id_map_, web_session_id)); |
+ DCHECK(session_id); |
+ web_session_to_session_id_map_.insert( |
+ std::make_pair(web_session_id, session_id)); |
+} |
+ |
+uint32_t ProxyMediaKeys::LookupSessionId( |
+ const std::string& web_session_id) const { |
+ SessionIdMap::const_iterator it = |
+ web_session_to_session_id_map_.find(web_session_id); |
+ return (it != web_session_to_session_id_map_.end()) ? it->second : 0; |
+} |
+ |
+std::string ProxyMediaKeys::LookupWebSessionId(uint32_t session_id) const { |
+ for (SessionIdMap::const_iterator it = web_session_to_session_id_map_.begin(); |
+ it != web_session_to_session_id_map_.end(); |
+ ++it) { |
+ if (it->second == session_id) |
+ return it->first; |
+ } |
+ // Possible to get an error creating a session, so no |web_session_id| |
+ // available. |
+ return std::string(); |
+} |
+ |
+void ProxyMediaKeys::DropWebSessionId(const std::string& web_session_id) { |
+ web_session_to_session_id_map_.erase(web_session_id); |
+} |
+ |
+void ProxyMediaKeys::SavePromise(uint32_t session_id, |
+ scoped_ptr<media::CdmPromise> promise) { |
+ // Should only be one promise outstanding for any |session_id|. |
+ DCHECK(!ContainsKey(session_id_to_promise_map_, session_id)); |
+ session_id_to_promise_map_.add(session_id, promise.Pass()); |
+} |
+ |
+scoped_ptr<media::CdmPromise> ProxyMediaKeys::TakePromise(uint32_t session_id) { |
+ PromiseMap::iterator it = session_id_to_promise_map_.find(session_id); |
+ // May not be a promise associated with this session for asynchronous events. |
+ if (it == session_id_to_promise_map_.end()) |
+ return scoped_ptr<media::CdmPromise>(); |
+ return session_id_to_promise_map_.take_and_erase(it); |
+} |
+ |
} // namespace content |