2014-02-14 23:21:05 +00:00
|
|
|
// Copyright 2014 Google Inc. All rights reserved.
|
|
|
|
//
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file or at
|
|
|
|
// https://developers.google.com/open-source/licenses/bsd
|
2014-01-15 22:44:11 +00:00
|
|
|
|
2014-10-15 21:56:12 +00:00
|
|
|
#include "packager/app/packager_util.h"
|
|
|
|
|
2014-01-15 22:44:11 +00:00
|
|
|
#include <gflags/gflags.h>
|
|
|
|
#include <iostream>
|
|
|
|
|
2014-10-01 22:10:21 +00:00
|
|
|
#include "packager/app/fixed_key_encryption_flags.h"
|
2017-01-05 17:32:17 +00:00
|
|
|
#include "packager/app/playready_key_encryption_flags.h"
|
2014-10-01 22:10:21 +00:00
|
|
|
#include "packager/app/mpd_flags.h"
|
|
|
|
#include "packager/app/muxer_flags.h"
|
|
|
|
#include "packager/app/widevine_encryption_flags.h"
|
|
|
|
#include "packager/base/logging.h"
|
|
|
|
#include "packager/base/strings/string_number_conversions.h"
|
2016-02-19 20:23:37 +00:00
|
|
|
#include "packager/media/base/fixed_key_source.h"
|
2014-10-01 22:10:21 +00:00
|
|
|
#include "packager/media/base/muxer_options.h"
|
2017-01-05 17:32:17 +00:00
|
|
|
#include "packager/media/base/playready_key_source.h"
|
2014-10-01 22:10:21 +00:00
|
|
|
#include "packager/media/base/request_signer.h"
|
|
|
|
#include "packager/media/base/widevine_key_source.h"
|
2017-02-24 01:17:47 +00:00
|
|
|
#include "packager/media/chunking/chunking_handler.h"
|
2014-10-01 22:10:21 +00:00
|
|
|
#include "packager/media/file/file.h"
|
2017-02-21 18:36:50 +00:00
|
|
|
#include "packager/mpd/base/mpd_options.h"
|
2014-01-15 22:44:11 +00:00
|
|
|
|
2016-07-12 20:48:28 +00:00
|
|
|
DEFINE_bool(mp4_use_decoding_timestamp_in_timeline,
|
|
|
|
false,
|
|
|
|
"If set, decoding timestamp instead of presentation timestamp will "
|
|
|
|
"be used when generating media timeline, e.g. timestamps in sidx "
|
|
|
|
"and mpd. This is to workaround a Chromium bug that decoding "
|
|
|
|
"timestamp is used in buffered range, https://crbug.com/398130.");
|
2014-01-15 22:44:11 +00:00
|
|
|
DEFINE_bool(dump_stream_info, false, "Dump demuxed stream info.");
|
|
|
|
|
2016-05-20 21:19:33 +00:00
|
|
|
namespace shaka {
|
2014-01-15 22:44:11 +00:00
|
|
|
namespace media {
|
|
|
|
|
2016-08-17 17:41:40 +00:00
|
|
|
std::unique_ptr<RequestSigner> CreateSigner() {
|
|
|
|
std::unique_ptr<RequestSigner> signer;
|
2014-10-13 22:06:48 +00:00
|
|
|
|
|
|
|
if (!FLAGS_aes_signing_key.empty()) {
|
|
|
|
signer.reset(AesRequestSigner::CreateSigner(
|
|
|
|
FLAGS_signer, FLAGS_aes_signing_key, FLAGS_aes_signing_iv));
|
|
|
|
if (!signer) {
|
|
|
|
LOG(ERROR) << "Cannot create an AES signer object from '"
|
|
|
|
<< FLAGS_aes_signing_key << "':'" << FLAGS_aes_signing_iv
|
|
|
|
<< "'.";
|
2016-08-17 17:41:40 +00:00
|
|
|
return std::unique_ptr<RequestSigner>();
|
2014-10-13 22:06:48 +00:00
|
|
|
}
|
|
|
|
} else if (!FLAGS_rsa_signing_key_path.empty()) {
|
|
|
|
std::string rsa_private_key;
|
|
|
|
if (!File::ReadFileToString(FLAGS_rsa_signing_key_path.c_str(),
|
|
|
|
&rsa_private_key)) {
|
|
|
|
LOG(ERROR) << "Failed to read from '" << FLAGS_rsa_signing_key_path
|
|
|
|
<< "'.";
|
2016-08-17 17:41:40 +00:00
|
|
|
return std::unique_ptr<RequestSigner>();
|
2014-10-13 22:06:48 +00:00
|
|
|
}
|
|
|
|
signer.reset(RsaRequestSigner::CreateSigner(FLAGS_signer, rsa_private_key));
|
|
|
|
if (!signer) {
|
|
|
|
LOG(ERROR) << "Cannot create a RSA signer object from '"
|
|
|
|
<< FLAGS_rsa_signing_key_path << "'.";
|
2016-08-17 17:41:40 +00:00
|
|
|
return std::unique_ptr<RequestSigner>();
|
2014-01-15 22:44:11 +00:00
|
|
|
}
|
2014-08-20 23:51:15 +00:00
|
|
|
}
|
2016-08-17 17:41:40 +00:00
|
|
|
return signer;
|
2014-08-20 23:51:15 +00:00
|
|
|
}
|
2014-01-15 22:44:11 +00:00
|
|
|
|
2016-08-17 17:41:40 +00:00
|
|
|
std::unique_ptr<KeySource> CreateEncryptionKeySource() {
|
|
|
|
std::unique_ptr<KeySource> encryption_key_source;
|
2014-08-20 23:51:15 +00:00
|
|
|
if (FLAGS_enable_widevine_encryption) {
|
2016-08-17 17:41:40 +00:00
|
|
|
std::unique_ptr<WidevineKeySource> widevine_key_source(
|
2016-03-21 18:09:24 +00:00
|
|
|
new WidevineKeySource(FLAGS_key_server_url, FLAGS_include_common_pssh));
|
2014-10-15 00:47:25 +00:00
|
|
|
if (!FLAGS_signer.empty()) {
|
2016-08-17 17:41:40 +00:00
|
|
|
std::unique_ptr<RequestSigner> request_signer(CreateSigner());
|
2014-10-15 00:47:25 +00:00
|
|
|
if (!request_signer)
|
2016-08-17 17:41:40 +00:00
|
|
|
return std::unique_ptr<KeySource>();
|
|
|
|
widevine_key_source->set_signer(std::move(request_signer));
|
2014-10-15 00:47:25 +00:00
|
|
|
}
|
|
|
|
|
2014-09-30 21:52:21 +00:00
|
|
|
std::vector<uint8_t> content_id;
|
2014-08-20 23:51:15 +00:00
|
|
|
if (!base::HexStringToBytes(FLAGS_content_id, &content_id)) {
|
|
|
|
LOG(ERROR) << "Invalid content_id hex string specified.";
|
2016-08-17 17:41:40 +00:00
|
|
|
return std::unique_ptr<KeySource>();
|
2014-08-20 23:51:15 +00:00
|
|
|
}
|
2014-10-15 00:47:25 +00:00
|
|
|
Status status = widevine_key_source->FetchKeys(content_id, FLAGS_policy);
|
2014-05-08 23:34:45 +00:00
|
|
|
if (!status.ok()) {
|
2014-08-20 23:51:15 +00:00
|
|
|
LOG(ERROR) << "Widevine encryption key source failed to fetch keys: "
|
2014-05-08 23:34:45 +00:00
|
|
|
<< status.ToString();
|
2016-08-17 17:41:40 +00:00
|
|
|
return std::unique_ptr<KeySource>();
|
2014-05-08 23:34:45 +00:00
|
|
|
}
|
2016-08-17 17:41:40 +00:00
|
|
|
encryption_key_source = std::move(widevine_key_source);
|
2014-01-15 22:44:11 +00:00
|
|
|
} else if (FLAGS_enable_fixed_key_encryption) {
|
2016-02-19 20:23:37 +00:00
|
|
|
encryption_key_source = FixedKeySource::CreateFromHexStrings(
|
2015-09-25 22:48:18 +00:00
|
|
|
FLAGS_key_id, FLAGS_key, FLAGS_pssh, FLAGS_iv);
|
2017-01-05 17:32:17 +00:00
|
|
|
} else if (FLAGS_enable_playready_encryption) {
|
|
|
|
if (!FLAGS_playready_key_id.empty() && !FLAGS_playready_key.empty()) {
|
|
|
|
encryption_key_source = PlayReadyKeySource::CreateFromKeyAndKeyId(
|
|
|
|
FLAGS_playready_key_id, FLAGS_playready_key);
|
|
|
|
} else if (!FLAGS_playready_server_url.empty() &&
|
|
|
|
!FLAGS_program_identifier.empty()) {
|
|
|
|
std::unique_ptr<PlayReadyKeySource> playready_key_source;
|
|
|
|
if (!FLAGS_client_cert_file.empty() &&
|
|
|
|
!FLAGS_client_cert_private_key_file.empty() &&
|
|
|
|
!FLAGS_client_cert_private_key_password.empty()) {
|
|
|
|
playready_key_source.reset(new PlayReadyKeySource(
|
|
|
|
FLAGS_playready_server_url,
|
|
|
|
FLAGS_client_cert_file,
|
|
|
|
FLAGS_client_cert_private_key_file,
|
|
|
|
FLAGS_client_cert_private_key_password));
|
|
|
|
} else {
|
|
|
|
playready_key_source.reset(new PlayReadyKeySource(
|
|
|
|
FLAGS_playready_server_url));
|
|
|
|
}
|
|
|
|
if (!FLAGS_ca_file.empty()) {
|
|
|
|
playready_key_source->SetCaFile(FLAGS_ca_file);
|
|
|
|
}
|
|
|
|
playready_key_source->FetchKeysWithProgramIdentifier(FLAGS_program_identifier);
|
|
|
|
encryption_key_source = std::move(playready_key_source);
|
|
|
|
} else {
|
|
|
|
LOG(ERROR) << "Error creating PlayReady key source.";
|
|
|
|
return std::unique_ptr<KeySource>();
|
|
|
|
}
|
2014-01-15 22:44:11 +00:00
|
|
|
}
|
2016-08-17 17:41:40 +00:00
|
|
|
return encryption_key_source;
|
2014-01-15 22:44:11 +00:00
|
|
|
}
|
|
|
|
|
2016-08-17 17:41:40 +00:00
|
|
|
std::unique_ptr<KeySource> CreateDecryptionKeySource() {
|
|
|
|
std::unique_ptr<KeySource> decryption_key_source;
|
2014-08-20 23:51:15 +00:00
|
|
|
if (FLAGS_enable_widevine_decryption) {
|
2016-08-17 17:41:40 +00:00
|
|
|
std::unique_ptr<WidevineKeySource> widevine_key_source(
|
2016-03-21 18:09:24 +00:00
|
|
|
new WidevineKeySource(FLAGS_key_server_url, FLAGS_include_common_pssh));
|
2014-10-15 00:47:25 +00:00
|
|
|
if (!FLAGS_signer.empty()) {
|
2016-08-17 17:41:40 +00:00
|
|
|
std::unique_ptr<RequestSigner> request_signer(CreateSigner());
|
2014-10-15 00:47:25 +00:00
|
|
|
if (!request_signer)
|
2016-08-17 17:41:40 +00:00
|
|
|
return std::unique_ptr<KeySource>();
|
|
|
|
widevine_key_source->set_signer(std::move(request_signer));
|
2014-10-15 00:47:25 +00:00
|
|
|
}
|
|
|
|
|
2016-08-17 17:41:40 +00:00
|
|
|
decryption_key_source = std::move(widevine_key_source);
|
2014-08-25 22:51:19 +00:00
|
|
|
} else if (FLAGS_enable_fixed_key_decryption) {
|
2016-02-19 20:23:37 +00:00
|
|
|
const char kNoPssh[] = "";
|
|
|
|
const char kNoIv[] = "";
|
|
|
|
decryption_key_source = FixedKeySource::CreateFromHexStrings(
|
|
|
|
FLAGS_key_id, FLAGS_key, kNoPssh, kNoIv);
|
2014-08-20 23:51:15 +00:00
|
|
|
}
|
2016-08-17 17:41:40 +00:00
|
|
|
return decryption_key_source;
|
2014-08-20 23:51:15 +00:00
|
|
|
}
|
|
|
|
|
2017-02-24 01:17:47 +00:00
|
|
|
ChunkingOptions GetChunkingOptions() {
|
|
|
|
ChunkingOptions chunking_options;
|
|
|
|
chunking_options.segment_duration_in_seconds = FLAGS_segment_duration;
|
|
|
|
chunking_options.subsegment_duration_in_seconds = FLAGS_fragment_duration;
|
|
|
|
chunking_options.segment_sap_aligned = FLAGS_segment_sap_aligned;
|
|
|
|
chunking_options.subsegment_sap_aligned = FLAGS_fragment_sap_aligned;
|
|
|
|
return chunking_options;
|
|
|
|
}
|
2014-01-15 22:44:11 +00:00
|
|
|
|
2017-02-24 01:17:47 +00:00
|
|
|
MuxerOptions GetMuxerOptions() {
|
|
|
|
MuxerOptions muxer_options;
|
|
|
|
muxer_options.num_subsegments_per_sidx = FLAGS_num_subsegments_per_sidx;
|
|
|
|
muxer_options.webm_subsample_encryption = FLAGS_webm_subsample_encryption;
|
2016-07-12 20:48:28 +00:00
|
|
|
if (FLAGS_mp4_use_decoding_timestamp_in_timeline) {
|
|
|
|
LOG(WARNING) << "Flag --mp4_use_decoding_timestamp_in_timeline is set. "
|
|
|
|
"Note that it is a temporary hack to workaround Chromium "
|
|
|
|
"bug https://crbug.com/398130. The flag may be removed "
|
|
|
|
"when the Chromium bug is fixed.";
|
|
|
|
}
|
2017-02-24 01:17:47 +00:00
|
|
|
muxer_options.mp4_use_decoding_timestamp_in_timeline =
|
2016-07-12 20:48:28 +00:00
|
|
|
FLAGS_mp4_use_decoding_timestamp_in_timeline;
|
2017-02-24 01:17:47 +00:00
|
|
|
muxer_options.temp_dir = FLAGS_temp_dir;
|
|
|
|
return muxer_options;
|
2014-01-15 22:44:11 +00:00
|
|
|
}
|
|
|
|
|
2017-02-24 01:17:47 +00:00
|
|
|
MpdOptions GetMpdOptions(bool on_demand_profile) {
|
|
|
|
MpdOptions mpd_options;
|
|
|
|
mpd_options.dash_profile =
|
2017-01-07 02:40:37 +00:00
|
|
|
on_demand_profile ? DashProfile::kOnDemand : DashProfile::kLive;
|
2017-02-24 01:17:47 +00:00
|
|
|
mpd_options.mpd_type = (on_demand_profile || FLAGS_generate_static_mpd)
|
|
|
|
? MpdType::kStatic
|
|
|
|
: MpdType::kDynamic;
|
|
|
|
mpd_options.availability_time_offset = FLAGS_availability_time_offset;
|
|
|
|
mpd_options.minimum_update_period = FLAGS_minimum_update_period;
|
|
|
|
mpd_options.min_buffer_time = FLAGS_min_buffer_time;
|
|
|
|
mpd_options.time_shift_buffer_depth = FLAGS_time_shift_buffer_depth;
|
|
|
|
mpd_options.suggested_presentation_delay = FLAGS_suggested_presentation_delay;
|
|
|
|
mpd_options.default_language = FLAGS_default_language;
|
|
|
|
return mpd_options;
|
2014-06-26 01:33:09 +00:00
|
|
|
}
|
|
|
|
|
2014-01-15 22:44:11 +00:00
|
|
|
} // namespace media
|
2016-05-20 21:19:33 +00:00
|
|
|
} // namespace shaka
|