Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(6)

Unified Diff: trunk/src/chrome/browser/media/encrypted_media_browsertest.cc

Issue 383063009: Revert 282795 "Have media content and chrome browser tests load ..." (Closed) Base URL: svn://svn.chromium.org/chrome/
Patch Set: Created 6 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « no previous file | trunk/src/chrome/browser/media/encrypted_media_istypesupported_browsertest.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: trunk/src/chrome/browser/media/encrypted_media_browsertest.cc
===================================================================
--- trunk/src/chrome/browser/media/encrypted_media_browsertest.cc (revision 282811)
+++ trunk/src/chrome/browser/media/encrypted_media_browsertest.cc (working copy)
@@ -115,14 +115,12 @@
}
#endif // defined(WIDEVINE_CDM_AVAILABLE)
- void RunEncryptedMediaTestPage(
- const std::string& html_page,
- const std::string& key_system,
- const media::QueryParams& query_params,
- const std::string& expected_title) {
- media::QueryParams new_query_params = query_params;
- StartLicenseServerIfNeeded(key_system, &new_query_params);
- RunMediaTestPage(html_page, new_query_params, expected_title, true);
+ void RunEncryptedMediaTestPage(const std::string& html_page,
+ const std::string& key_system,
+ std::vector<StringPair>* query_params,
+ const std::string& expected_title) {
+ StartLicenseServerIfNeeded(key_system, query_params);
+ RunMediaTestPage(html_page, query_params, expected_title, true);
}
// Tests |html_page| using |media_file| (with |media_type|) and |key_system|.
@@ -146,7 +144,7 @@
VLOG(0) << "Skipping test - MSE not supported.";
return;
}
- media::QueryParams query_params;
+ std::vector<StringPair> query_params;
query_params.push_back(std::make_pair("mediaFile", media_file));
query_params.push_back(std::make_pair("mediaType", media_type));
query_params.push_back(std::make_pair("keySystem", key_system));
@@ -158,7 +156,7 @@
query_params.push_back(std::make_pair("forceInvalidResponse", "1"));
if (!session_to_load.empty())
query_params.push_back(std::make_pair("sessionToLoad", session_to_load));
- RunEncryptedMediaTestPage(html_page, key_system, query_params,
+ RunEncryptedMediaTestPage(html_page, key_system, &query_params,
expected_title);
}
@@ -190,17 +188,16 @@
EXPECT_TRUE(receivedKeyMessage);
}
- // Starts a license server if available for the |key_system| and adds a
- // 'licenseServerURL' query parameter to |query_params|.
+
void StartLicenseServerIfNeeded(const std::string& key_system,
- media::QueryParams* query_params) {
+ std::vector<StringPair>* query_params) {
scoped_ptr<TestLicenseServerConfig> config = GetServerConfig(key_system);
if (!config)
return;
license_server_.reset(new TestLicenseServer(config.Pass()));
EXPECT_TRUE(license_server_->Start());
- query_params->push_back(
- std::make_pair("licenseServerURL", license_server_->GetServerURL()));
+ query_params->push_back(std::make_pair("licenseServerURL",
+ license_server_->GetServerURL()));
}
bool IsPlayBackPossible(const std::string& key_system) {
@@ -315,7 +312,7 @@
// Since we do not test playback, arbitrarily choose a test file and source
// type.
RunEncryptedMediaTest(kDefaultEmePlayer,
- "bear-a_enc-a.webm",
+ "bear-a-enc_a.webm",
kWebMAudioOnly,
key_system,
SRC,
@@ -382,7 +379,7 @@
void RunInvalidResponseTest() {
RunEncryptedMediaTest(kDefaultEmePlayer,
- "bear-320x240-av_enc-av.webm",
+ "bear-320x240-av-enc_av.webm",
kWebMAudioVideo,
CurrentKeySystem(),
CurrentSourceType(),
@@ -394,7 +391,7 @@
void TestFrameSizeChange() {
RunEncryptedMediaTest("encrypted_frame_size_change.html",
- "frame_size_change-av_enc-v.webm",
+ "frame_size_change-av-enc-v.webm",
kWebMAudioVideo,
CurrentKeySystem(),
CurrentSourceType(),
@@ -406,14 +403,14 @@
void TestConfigChange() {
DCHECK(IsMSESupported());
- media::QueryParams query_params;
+ std::vector<StringPair> query_params;
query_params.push_back(std::make_pair("keySystem", CurrentKeySystem()));
query_params.push_back(std::make_pair("runEncrypted", "1"));
if (CurrentEmeVersion() == PREFIXED)
query_params.push_back(std::make_pair("usePrefixedEME", "1"));
RunEncryptedMediaTestPage("mse_config_change.html",
CurrentKeySystem(),
- query_params,
+ &query_params,
kEnded);
}
@@ -491,7 +488,7 @@
Combine(Values(kExternalClearKeyDecryptOnlyKeySystem),
Values(MSE),
Values(UNPREFIXED)));
-#endif // defined(ENABLE_PEPPER_CDMS)
+#endif // defined(ENABLE_PEPPER_CDMS)
#if defined(WIDEVINE_CDM_AVAILABLE)
// This test doesn't fully test playback with Widevine. So we only run Widevine
@@ -514,27 +511,27 @@
#endif // defined(WIDEVINE_CDM_AVAILABLE)
IN_PROC_BROWSER_TEST_P(EncryptedMediaTest, Playback_AudioOnly_WebM) {
- TestSimplePlayback("bear-a_enc-a.webm", kWebMAudioOnly);
+ TestSimplePlayback("bear-a-enc_a.webm", kWebMAudioOnly);
}
IN_PROC_BROWSER_TEST_P(EncryptedMediaTest, Playback_AudioClearVideo_WebM) {
- TestSimplePlayback("bear-320x240-av_enc-a.webm", kWebMAudioVideo);
+ TestSimplePlayback("bear-320x240-av-enc_a.webm", kWebMAudioVideo);
}
IN_PROC_BROWSER_TEST_P(EncryptedMediaTest, Playback_VideoAudio_WebM) {
- TestSimplePlayback("bear-320x240-av_enc-av.webm", kWebMAudioVideo);
+ TestSimplePlayback("bear-320x240-av-enc_av.webm", kWebMAudioVideo);
}
IN_PROC_BROWSER_TEST_P(EncryptedMediaTest, Playback_VideoOnly_WebM) {
- TestSimplePlayback("bear-320x240-v_enc-v.webm", kWebMVideoOnly);
+ TestSimplePlayback("bear-320x240-v-enc_v.webm", kWebMVideoOnly);
}
IN_PROC_BROWSER_TEST_P(EncryptedMediaTest, Playback_VideoClearAudio_WebM) {
- TestSimplePlayback("bear-320x240-av_enc-v.webm", kWebMAudioVideo);
+ TestSimplePlayback("bear-320x240-av-enc_v.webm", kWebMAudioVideo);
}
IN_PROC_BROWSER_TEST_P(EncryptedMediaTest, Playback_VP9Video_WebM) {
- TestSimplePlayback("bear-320x240-v-vp9_enc-v.webm", kWebMVP9VideoOnly);
+ TestSimplePlayback("bear-320x240-v-vp9-enc_v.webm", kWebMVP9VideoOnly);
}
IN_PROC_BROWSER_TEST_P(EncryptedMediaTest, InvalidResponseKeyError) {
@@ -590,7 +587,7 @@
// The parent key system cannot be used in generateKeyRequest.
IN_PROC_BROWSER_TEST_F(WVEncryptedMediaTest, ParentThrowsException_Prefixed) {
RunEncryptedMediaTest(kDefaultEmePlayer,
- "bear-a_enc-a.webm",
+ "bear-a-enc_a.webm",
kWebMAudioOnly,
"com.widevine",
MSE,
@@ -604,7 +601,7 @@
// The parent key system cannot be used when creating MediaKeys.
IN_PROC_BROWSER_TEST_F(WVEncryptedMediaTest, ParentThrowsException) {
RunEncryptedMediaTest(kDefaultEmePlayer,
- "bear-a_enc-a.webm",
+ "bear-a-enc_a.webm",
kWebMAudioOnly,
"com.widevine",
MSE,
@@ -643,7 +640,7 @@
IN_PROC_BROWSER_TEST_F(ECKEncryptedMediaTest, LoadLoadableSession) {
RunEncryptedMediaTest(kDefaultEmePlayer,
- "bear-320x240-v_enc-v.webm",
+ "bear-320x240-v-enc_v.webm",
kWebMVideoOnly,
kExternalClearKeyKeySystem,
SRC,
@@ -656,7 +653,7 @@
IN_PROC_BROWSER_TEST_F(ECKEncryptedMediaTest, LoadUnknownSession) {
// TODO(xhwang): Add a specific error for this failure, e.g. kSessionNotFound.
RunEncryptedMediaTest(kDefaultEmePlayer,
- "bear-320x240-v_enc-v.webm",
+ "bear-320x240-v-enc_v.webm",
kWebMVideoOnly,
kExternalClearKeyKeySystem,
SRC,
« no previous file with comments | « no previous file | trunk/src/chrome/browser/media/encrypted_media_istypesupported_browsertest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698