Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(351)

Side by Side Diff: chrome/browser/media/encrypted_media_browsertest.cc

Issue 332323003: Revert of Integrate browser tests with new EME player. (Closed) Base URL: http://git.chromium.org/chromium/src.git@eme_player
Patch Set: Created 6 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « no previous file | chrome/browser/media/media_browsertest.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright 2013 The Chromium Authors. All rights reserved. 1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "base/command_line.h" 5 #include "base/command_line.h"
6 #include "base/memory/scoped_ptr.h" 6 #include "base/memory/scoped_ptr.h"
7 #include "base/path_service.h" 7 #include "base/path_service.h"
8 #include "base/strings/utf_string_conversions.h" 8 #include "base/strings/utf_string_conversions.h"
9 #include "base/win/windows_version.h" 9 #include "base/win/windows_version.h"
10 #include "chrome/browser/media/media_browsertest.h" 10 #include "chrome/browser/media/media_browsertest.h"
(...skipping 46 matching lines...) Expand 10 before | Expand all | Expand 10 after
57 const char kMP4AudioOnly[] = "audio/mp4; codecs=\"mp4a.40.2\""; 57 const char kMP4AudioOnly[] = "audio/mp4; codecs=\"mp4a.40.2\"";
58 const char kMP4VideoOnly[] = "video/mp4; codecs=\"avc1.4D4041\""; 58 const char kMP4VideoOnly[] = "video/mp4; codecs=\"avc1.4D4041\"";
59 #endif // defined(USE_PROPRIETARY_CODECS) 59 #endif // defined(USE_PROPRIETARY_CODECS)
60 60
61 // Sessions to load. 61 // Sessions to load.
62 const char kNoSessionToLoad[] = ""; 62 const char kNoSessionToLoad[] = "";
63 const char kLoadableSession[] = "LoadableSession"; 63 const char kLoadableSession[] = "LoadableSession";
64 const char kUnknownSession[] = "UnknownSession"; 64 const char kUnknownSession[] = "UnknownSession";
65 65
66 // EME-specific test results and errors. 66 // EME-specific test results and errors.
67 const char kEmeKeyError[] = "KEY_ERROR"; 67 const char kEmeKeyError[] = "KEYERROR";
68 const char kEmeNotSupportedError[] = "NOTSUPPORTEDERROR"; 68 const char kEmeNotSupportedError[] = "NOTSUPPORTEDERROR";
69 const char kFileIOTestSuccess[] = "FILE_IO_TEST_SUCCESS"; 69 const char kFileIOTestSuccess[] = "FILEIOTESTSUCCESS";
70
71 const char kDefaultEmePlayer[] = "eme_player.html";
72 70
73 // The type of video src used to load media. 71 // The type of video src used to load media.
74 enum SrcType { 72 enum SrcType {
75 SRC, 73 SRC,
76 MSE 74 MSE
77 }; 75 };
78 76
79 // Whether to use prefixed or unprefixed EME. 77 // Whether to use prefixed or unprefixed EME.
80 enum EmeVersion { 78 enum EmeVersion {
81 PREFIXED, 79 PREFIXED,
(...skipping 80 matching lines...) Expand 10 before | Expand all | Expand 10 after
162 160
163 void RunSimpleEncryptedMediaTest(const std::string& media_file, 161 void RunSimpleEncryptedMediaTest(const std::string& media_file,
164 const std::string& media_type, 162 const std::string& media_type,
165 const std::string& key_system, 163 const std::string& key_system,
166 SrcType src_type, 164 SrcType src_type,
167 EmeVersion eme_version) { 165 EmeVersion eme_version) {
168 std::string expected_title = kEnded; 166 std::string expected_title = kEnded;
169 if (!IsPlayBackPossible(key_system)) 167 if (!IsPlayBackPossible(key_system))
170 expected_title = kEmeKeyError; 168 expected_title = kEmeKeyError;
171 169
172 RunEncryptedMediaTest(kDefaultEmePlayer, 170 RunEncryptedMediaTest("encrypted_media_player.html",
173 media_file, 171 media_file,
174 media_type, 172 media_type,
175 key_system, 173 key_system,
176 src_type, 174 src_type,
177 eme_version, 175 eme_version,
178 kNoSessionToLoad, 176 kNoSessionToLoad,
179 false, 177 false,
180 expected_title); 178 expected_title);
181 // Check KeyMessage received for all key systems. 179 // Check KeyMessage received for all key systems.
182 bool receivedKeyMessage = false; 180 bool receivedKeyMessage = false;
183 EXPECT_TRUE(content::ExecuteScriptAndExtractBool( 181 EXPECT_TRUE(content::ExecuteScriptAndExtractBool(
184 browser()->tab_strip_model()->GetActiveWebContents(), 182 browser()->tab_strip_model()->GetActiveWebContents(),
185 "window.domAutomationController.send(" 183 "window.domAutomationController.send(video.receivedKeyMessage);",
186 "document.querySelector('video').receivedKeyMessage);",
187 &receivedKeyMessage)); 184 &receivedKeyMessage));
188 EXPECT_TRUE(receivedKeyMessage); 185 EXPECT_TRUE(receivedKeyMessage);
189 } 186 }
190 187
191 188
192 void StartLicenseServerIfNeeded(const std::string& key_system, 189 void StartLicenseServerIfNeeded(const std::string& key_system,
193 std::vector<StringPair>* query_params) { 190 std::vector<StringPair>* query_params) {
194 scoped_ptr<TestLicenseServerConfig> config = GetServerConfig(key_system); 191 scoped_ptr<TestLicenseServerConfig> config = GetServerConfig(key_system);
195 if (!config) 192 if (!config)
196 return; 193 return;
(...skipping 107 matching lines...) Expand 10 before | Expand all | Expand 10 after
304 // Tests encrypted media playback using ExternalClearKey key system in 301 // Tests encrypted media playback using ExternalClearKey key system in
305 // decrypt-and-decode mode. 302 // decrypt-and-decode mode.
306 class ECKEncryptedMediaTest : public EncryptedMediaTestBase { 303 class ECKEncryptedMediaTest : public EncryptedMediaTestBase {
307 public: 304 public:
308 // We use special |key_system| names to do non-playback related tests, e.g. 305 // We use special |key_system| names to do non-playback related tests, e.g.
309 // kExternalClearKeyFileIOTestKeySystem is used to test file IO. 306 // kExternalClearKeyFileIOTestKeySystem is used to test file IO.
310 void TestNonPlaybackCases(const std::string& key_system, 307 void TestNonPlaybackCases(const std::string& key_system,
311 const std::string& expected_title) { 308 const std::string& expected_title) {
312 // Since we do not test playback, arbitrarily choose a test file and source 309 // Since we do not test playback, arbitrarily choose a test file and source
313 // type. 310 // type.
314 RunEncryptedMediaTest(kDefaultEmePlayer, 311 RunEncryptedMediaTest("encrypted_media_player.html",
315 "bear-a-enc_a.webm", 312 "bear-a-enc_a.webm",
316 kWebMAudioOnly, 313 kWebMAudioOnly,
317 key_system, 314 key_system,
318 SRC, 315 SRC,
319 PREFIXED, 316 PREFIXED,
320 kNoSessionToLoad, 317 kNoSessionToLoad,
321 false, 318 false,
322 expected_title); 319 expected_title);
323 } 320 }
324 321
(...skipping 46 matching lines...) Expand 10 before | Expand all | Expand 10 after
371 void TestSimplePlayback(const std::string& encrypted_media, 368 void TestSimplePlayback(const std::string& encrypted_media,
372 const std::string& media_type) { 369 const std::string& media_type) {
373 RunSimpleEncryptedMediaTest(encrypted_media, 370 RunSimpleEncryptedMediaTest(encrypted_media,
374 media_type, 371 media_type,
375 CurrentKeySystem(), 372 CurrentKeySystem(),
376 CurrentSourceType(), 373 CurrentSourceType(),
377 CurrentEmeVersion()); 374 CurrentEmeVersion());
378 } 375 }
379 376
380 void RunInvalidResponseTest() { 377 void RunInvalidResponseTest() {
381 RunEncryptedMediaTest(kDefaultEmePlayer, 378 RunEncryptedMediaTest("encrypted_media_player.html",
382 "bear-320x240-av-enc_av.webm", 379 "bear-320x240-av-enc_av.webm",
383 kWebMAudioVideo, 380 kWebMAudioVideo,
384 CurrentKeySystem(), 381 CurrentKeySystem(),
385 CurrentSourceType(), 382 CurrentSourceType(),
386 CurrentEmeVersion(), 383 CurrentEmeVersion(),
387 kNoSessionToLoad, 384 kNoSessionToLoad,
388 true, 385 true,
389 kEmeKeyError); 386 kEmeKeyError);
390 } 387 }
391 388
(...skipping 195 matching lines...) Expand 10 before | Expand all | Expand 10 after
587 VLOG(0) << "Skipping test; Can only play MP4 encrypted streams by MSE."; 584 VLOG(0) << "Skipping test; Can only play MP4 encrypted streams by MSE.";
588 return; 585 return;
589 } 586 }
590 TestSimplePlayback("bear-640x360-a_frag-cenc.mp4", kMP4AudioOnly); 587 TestSimplePlayback("bear-640x360-a_frag-cenc.mp4", kMP4AudioOnly);
591 } 588 }
592 #endif // defined(USE_PROPRIETARY_CODECS) 589 #endif // defined(USE_PROPRIETARY_CODECS)
593 590
594 #if defined(WIDEVINE_CDM_AVAILABLE) 591 #if defined(WIDEVINE_CDM_AVAILABLE)
595 // The parent key system cannot be used in generateKeyRequest. 592 // The parent key system cannot be used in generateKeyRequest.
596 IN_PROC_BROWSER_TEST_F(WVEncryptedMediaTest, ParentThrowsException_Prefixed) { 593 IN_PROC_BROWSER_TEST_F(WVEncryptedMediaTest, ParentThrowsException_Prefixed) {
597 RunEncryptedMediaTest(kDefaultEmePlayer, 594 RunEncryptedMediaTest("encrypted_media_player.html",
598 "bear-a-enc_a.webm", 595 "bear-a-enc_a.webm",
599 kWebMAudioOnly, 596 kWebMAudioOnly,
600 "com.widevine", 597 "com.widevine",
601 MSE, 598 MSE,
602 PREFIXED, 599 PREFIXED,
603 kNoSessionToLoad, 600 kNoSessionToLoad,
604 false, 601 false,
605 kEmeNotSupportedError); 602 kEmeNotSupportedError);
606 } 603 }
607 604
608 // TODO(jrummell): http://crbug.com/349181 605 // TODO(jrummell): http://crbug.com/349181
609 // The parent key system cannot be used when creating MediaKeys. 606 // The parent key system cannot be used when creating MediaKeys.
610 IN_PROC_BROWSER_TEST_F(WVEncryptedMediaTest, ParentThrowsException) { 607 IN_PROC_BROWSER_TEST_F(WVEncryptedMediaTest, ParentThrowsException) {
611 RunEncryptedMediaTest(kDefaultEmePlayer, 608 RunEncryptedMediaTest("encrypted_media_player.html",
612 "bear-a-enc_a.webm", 609 "bear-a-enc_a.webm",
613 kWebMAudioOnly, 610 kWebMAudioOnly,
614 "com.widevine", 611 "com.widevine",
615 MSE, 612 MSE,
616 UNPREFIXED, 613 UNPREFIXED,
617 kNoSessionToLoad, 614 kNoSessionToLoad,
618 false, 615 false,
619 kEmeNotSupportedError); 616 kEmeNotSupportedError);
620 } 617 }
621 #endif // defined(WIDEVINE_CDM_AVAILABLE) 618 #endif // defined(WIDEVINE_CDM_AVAILABLE)
622 619
623 #if defined(ENABLE_PEPPER_CDMS) 620 #if defined(ENABLE_PEPPER_CDMS)
624 IN_PROC_BROWSER_TEST_F(ECKEncryptedMediaTest, InitializeCDMFail) { 621 IN_PROC_BROWSER_TEST_F(ECKEncryptedMediaTest, InitializeCDMFail) {
625 TestNonPlaybackCases(kExternalClearKeyInitializeFailKeySystem, kEmeKeyError); 622 TestNonPlaybackCases(kExternalClearKeyInitializeFailKeySystem, kEmeKeyError);
626 } 623 }
627 624
625 // TODO(jrummell): Fix these tests to handle rejected promises when the CDM
626 // crashes. Currently the JavaScript doesn't expect to get any more events
627 // after a crash.
628
628 // When CDM crashes, we should still get a decode error. 629 // When CDM crashes, we should still get a decode error.
629 IN_PROC_BROWSER_TEST_F(ECKEncryptedMediaTest, CDMCrashDuringDecode) { 630 IN_PROC_BROWSER_TEST_F(ECKEncryptedMediaTest, DISABLED_CDMCrashDuringDecode) {
630 IgnorePluginCrash(); 631 IgnorePluginCrash();
631 TestNonPlaybackCases(kExternalClearKeyCrashKeySystem, kError); 632 TestNonPlaybackCases(kExternalClearKeyCrashKeySystem, kError);
632 } 633 }
633 634
634 // Testing that the media browser test does fail on plugin crash. 635 // Testing that the media browser test does fail on plugin crash.
635 IN_PROC_BROWSER_TEST_F(ECKEncryptedMediaTest, CDMExpectedCrash) { 636 IN_PROC_BROWSER_TEST_F(ECKEncryptedMediaTest, DISABLED_CDMExpectedCrash) {
636 // Plugin crash is not ignored by default, the test is expected to fail. 637 // Plugin crash is not ignored by default, the test is expected to fail.
637 EXPECT_NONFATAL_FAILURE( 638 EXPECT_NONFATAL_FAILURE(
638 TestNonPlaybackCases(kExternalClearKeyCrashKeySystem, kError), 639 TestNonPlaybackCases(kExternalClearKeyCrashKeySystem, kError),
639 "plugin crash"); 640 "plugin crash");
640 } 641 }
641 642
642 IN_PROC_BROWSER_TEST_F(ECKEncryptedMediaTest, FileIOTest) { 643 IN_PROC_BROWSER_TEST_F(ECKEncryptedMediaTest, FileIOTest) {
643 TestNonPlaybackCases(kExternalClearKeyFileIOTestKeySystem, 644 TestNonPlaybackCases(kExternalClearKeyFileIOTestKeySystem,
644 kFileIOTestSuccess); 645 kFileIOTestSuccess);
645 } 646 }
646 647
647 IN_PROC_BROWSER_TEST_F(ECKEncryptedMediaTest, LoadLoadableSession) { 648 IN_PROC_BROWSER_TEST_F(ECKEncryptedMediaTest, LoadLoadableSession) {
648 RunEncryptedMediaTest(kDefaultEmePlayer, 649 RunEncryptedMediaTest("encrypted_media_player.html",
649 "bear-320x240-v-enc_v.webm", 650 "bear-320x240-v-enc_v.webm",
650 kWebMVideoOnly, 651 kWebMVideoOnly,
651 kExternalClearKeyKeySystem, 652 kExternalClearKeyKeySystem,
652 SRC, 653 SRC,
653 PREFIXED, 654 PREFIXED,
654 kLoadableSession, 655 kLoadableSession,
655 false, 656 false,
656 kEnded); 657 kEnded);
657 } 658 }
658 659
659 IN_PROC_BROWSER_TEST_F(ECKEncryptedMediaTest, LoadUnknownSession) { 660 IN_PROC_BROWSER_TEST_F(ECKEncryptedMediaTest, LoadUnknownSession) {
660 // TODO(xhwang): Add a specific error for this failure, e.g. kSessionNotFound. 661 // TODO(xhwang): Add a specific error for this failure, e.g. kSessionNotFound.
661 RunEncryptedMediaTest(kDefaultEmePlayer, 662 RunEncryptedMediaTest("encrypted_media_player.html",
662 "bear-320x240-v-enc_v.webm", 663 "bear-320x240-v-enc_v.webm",
663 kWebMVideoOnly, 664 kWebMVideoOnly,
664 kExternalClearKeyKeySystem, 665 kExternalClearKeyKeySystem,
665 SRC, 666 SRC,
666 PREFIXED, 667 PREFIXED,
667 kUnknownSession, 668 kUnknownSession,
668 false, 669 false,
669 kEmeKeyError); 670 kEmeKeyError);
670 } 671 }
671 #endif // defined(ENABLE_PEPPER_CDMS) 672 #endif // defined(ENABLE_PEPPER_CDMS)
OLDNEW
« no previous file with comments | « no previous file | chrome/browser/media/media_browsertest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698