2014-02-20 22:38:28 +00:00
|
|
|
// Copyright 2014 Google Inc. All rights reserved.
|
|
|
|
//
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file or at
|
|
|
|
// https://developers.google.com/open-source/licenses/bsd
|
|
|
|
|
|
|
|
#include "media/base/widevine_encryptor_source.h"
|
|
|
|
|
|
|
|
#include "base/base64.h"
|
|
|
|
#include "base/strings/stringprintf.h"
|
|
|
|
#include "media/base/http_fetcher.h"
|
|
|
|
#include "media/base/request_signer.h"
|
|
|
|
#include "media/base/status_test_util.h"
|
|
|
|
#include "testing/gmock/include/gmock/gmock.h"
|
|
|
|
#include "testing/gtest/include/gtest/gtest.h"
|
|
|
|
|
|
|
|
namespace {
|
|
|
|
const char kServerUrl[] = "http://www.foo.com/getcontentkey";
|
|
|
|
const char kContentId[] = "ContentFoo";
|
|
|
|
const char kSignerName[] = "SignerFoo";
|
|
|
|
|
|
|
|
const char kMockSignature[] = "MockSignature";
|
|
|
|
|
2014-04-15 22:18:26 +00:00
|
|
|
// The license service may return an error indicating a transient error has
|
2014-02-20 22:38:28 +00:00
|
|
|
// just happened in the server, or other types of errors.
|
|
|
|
// WidevineEncryptorSource will perform a number of retries on transient errors;
|
|
|
|
// WidevineEncryptorSource does not know about other errors and retries are not
|
|
|
|
// performed.
|
|
|
|
const char kLicenseStatusTransientError[] = "INTERNAL_ERROR";
|
|
|
|
const char kLicenseStatusUnknownError[] = "UNKNOWN_ERROR";
|
|
|
|
|
|
|
|
const char kExpectedRequestMessageFormat[] =
|
|
|
|
"{\"content_id\":\"%s\",\"drm_types\":[\"WIDEVINE\"],\"policy\":\"\","
|
|
|
|
"\"tracks\":[{\"type\":\"SD\"},{\"type\":\"HD\"},{\"type\":\"AUDIO\"}]}";
|
|
|
|
const char kExpectedSignedMessageFormat[] =
|
|
|
|
"{\"request\":\"%s\",\"signature\":\"%s\",\"signer\":\"%s\"}";
|
2014-04-15 22:18:26 +00:00
|
|
|
const char kTrackFormat[] =
|
|
|
|
"{\"type\":\"%s\",\"key_id\":\"%s\",\"key\":"
|
|
|
|
"\"%s\",\"pssh\":[{\"drm_type\":\"WIDEVINE\",\"data\":\"%s\"}]}";
|
|
|
|
const char kLicenseResponseFormat[] =
|
|
|
|
"{\"status\":\"%s\",\"tracks\":[%s]}";
|
2014-02-20 22:38:28 +00:00
|
|
|
const char kHttpResponseFormat[] = "{\"response\":\"%s\"}";
|
|
|
|
|
|
|
|
std::string Base64Encode(const std::string& input) {
|
|
|
|
std::string output;
|
|
|
|
base::Base64Encode(input, &output);
|
|
|
|
return output;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string ToString(const std::vector<uint8> v) {
|
|
|
|
return std::string(v.begin(), v.end());
|
|
|
|
}
|
2014-04-15 22:18:26 +00:00
|
|
|
|
|
|
|
std::string GetMockKeyId(const std::string& track_type) {
|
|
|
|
return "MockKeyId" + track_type;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string GetMockKey(const std::string& track_type) {
|
|
|
|
return "MockKey" + track_type;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string GetMockPsshData(const std::string& track_type) {
|
|
|
|
return "MockPsshData" + track_type;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string GenerateMockLicenseResponse() {
|
|
|
|
const std::string kTrackTypes[] = {"SD", "HD", "AUDIO"};
|
|
|
|
std::string tracks;
|
|
|
|
for (size_t i = 0; i < 3; ++i) {
|
|
|
|
if (!tracks.empty())
|
|
|
|
tracks += ",";
|
|
|
|
tracks += base::StringPrintf(
|
|
|
|
kTrackFormat,
|
|
|
|
kTrackTypes[i].c_str(),
|
|
|
|
Base64Encode(GetMockKeyId(kTrackTypes[i])).c_str(),
|
|
|
|
Base64Encode(GetMockKey(kTrackTypes[i])).c_str(),
|
|
|
|
Base64Encode(GetMockPsshData(kTrackTypes[i])).c_str());
|
|
|
|
}
|
|
|
|
return base::StringPrintf(kLicenseResponseFormat, "OK", tracks.c_str());
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string GetPsshDataFromPsshBox(const std::string& pssh_box) {
|
|
|
|
const size_t kPsshDataOffset = 32u;
|
|
|
|
DCHECK_LT(kPsshDataOffset, pssh_box.size());
|
|
|
|
return pssh_box.substr(kPsshDataOffset);
|
|
|
|
}
|
|
|
|
|
2014-02-20 22:38:28 +00:00
|
|
|
} // namespace
|
|
|
|
|
|
|
|
using ::testing::_;
|
|
|
|
using ::testing::DoAll;
|
|
|
|
using ::testing::Return;
|
|
|
|
using ::testing::SetArgPointee;
|
|
|
|
|
|
|
|
namespace media {
|
|
|
|
|
|
|
|
class MockRequestSigner : public RequestSigner {
|
|
|
|
public:
|
|
|
|
explicit MockRequestSigner(const std::string& signer_name)
|
|
|
|
: RequestSigner(signer_name) {}
|
|
|
|
virtual ~MockRequestSigner() {}
|
|
|
|
|
|
|
|
MOCK_METHOD2(GenerateSignature,
|
|
|
|
bool(const std::string& message, std::string* signature));
|
|
|
|
|
|
|
|
private:
|
|
|
|
DISALLOW_COPY_AND_ASSIGN(MockRequestSigner);
|
|
|
|
};
|
|
|
|
|
|
|
|
class MockHttpFetcher : public HttpFetcher {
|
|
|
|
public:
|
|
|
|
MockHttpFetcher() : HttpFetcher() {}
|
|
|
|
virtual ~MockHttpFetcher() {}
|
|
|
|
|
|
|
|
MOCK_METHOD2(Get, Status(const std::string& url, std::string* response));
|
|
|
|
MOCK_METHOD3(Post,
|
|
|
|
Status(const std::string& url,
|
|
|
|
const std::string& data,
|
|
|
|
std::string* response));
|
|
|
|
|
|
|
|
private:
|
|
|
|
DISALLOW_COPY_AND_ASSIGN(MockHttpFetcher);
|
|
|
|
};
|
|
|
|
|
|
|
|
class WidevineEncryptorSourceTest : public ::testing::Test {
|
|
|
|
public:
|
|
|
|
WidevineEncryptorSourceTest()
|
|
|
|
: mock_request_signer_(new MockRequestSigner(kSignerName)),
|
|
|
|
mock_http_fetcher_(new MockHttpFetcher()) {}
|
|
|
|
|
|
|
|
protected:
|
|
|
|
void CreateWidevineEncryptorSource() {
|
|
|
|
widevine_encryptor_source_.reset(new WidevineEncryptorSource(
|
|
|
|
kServerUrl,
|
|
|
|
kContentId,
|
|
|
|
mock_request_signer_.PassAs<RequestSigner>()));
|
|
|
|
widevine_encryptor_source_->set_http_fetcher(
|
|
|
|
mock_http_fetcher_.PassAs<HttpFetcher>());
|
|
|
|
}
|
|
|
|
|
|
|
|
scoped_ptr<MockRequestSigner> mock_request_signer_;
|
|
|
|
scoped_ptr<MockHttpFetcher> mock_http_fetcher_;
|
|
|
|
scoped_ptr<WidevineEncryptorSource> widevine_encryptor_source_;
|
|
|
|
|
|
|
|
private:
|
|
|
|
DISALLOW_COPY_AND_ASSIGN(WidevineEncryptorSourceTest);
|
|
|
|
};
|
|
|
|
|
|
|
|
TEST_F(WidevineEncryptorSourceTest, GetTrackTypeFromString) {
|
2014-04-15 22:18:26 +00:00
|
|
|
EXPECT_EQ(EncryptorSource::TRACK_TYPE_SD,
|
|
|
|
EncryptorSource::GetTrackTypeFromString("SD"));
|
|
|
|
EXPECT_EQ(EncryptorSource::TRACK_TYPE_HD,
|
|
|
|
EncryptorSource::GetTrackTypeFromString("HD"));
|
|
|
|
EXPECT_EQ(EncryptorSource::TRACK_TYPE_AUDIO,
|
|
|
|
EncryptorSource::GetTrackTypeFromString("AUDIO"));
|
|
|
|
EXPECT_EQ(EncryptorSource::TRACK_TYPE_UNKNOWN,
|
|
|
|
EncryptorSource::GetTrackTypeFromString("FOO"));
|
2014-02-20 22:38:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST_F(WidevineEncryptorSourceTest, GeneratureSignatureFailure) {
|
|
|
|
EXPECT_CALL(*mock_request_signer_, GenerateSignature(_, _))
|
|
|
|
.WillOnce(Return(false));
|
|
|
|
|
|
|
|
CreateWidevineEncryptorSource();
|
2014-04-15 22:18:26 +00:00
|
|
|
EncryptionKey encryption_key;
|
2014-02-20 22:38:28 +00:00
|
|
|
ASSERT_EQ(Status(error::INTERNAL_ERROR, "Signature generation failed."),
|
2014-04-15 22:18:26 +00:00
|
|
|
widevine_encryptor_source_->GetKey(EncryptorSource::TRACK_TYPE_SD,
|
|
|
|
&encryption_key));
|
2014-02-20 22:38:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Check whether expected request message and post data was generated and
|
|
|
|
// verify the correct behavior on http failure.
|
|
|
|
TEST_F(WidevineEncryptorSourceTest, HttpPostFailure) {
|
|
|
|
std::string expected_message = base::StringPrintf(
|
|
|
|
kExpectedRequestMessageFormat, Base64Encode(kContentId).c_str());
|
|
|
|
EXPECT_CALL(*mock_request_signer_, GenerateSignature(expected_message, _))
|
|
|
|
.WillOnce(DoAll(SetArgPointee<1>(kMockSignature), Return(true)));
|
|
|
|
|
|
|
|
std::string expected_post_data =
|
|
|
|
base::StringPrintf(kExpectedSignedMessageFormat,
|
|
|
|
Base64Encode(expected_message).c_str(),
|
|
|
|
Base64Encode(kMockSignature).c_str(),
|
|
|
|
kSignerName);
|
|
|
|
const Status kMockStatus = Status::UNKNOWN;
|
|
|
|
EXPECT_CALL(*mock_http_fetcher_, Post(kServerUrl, expected_post_data, _))
|
|
|
|
.WillOnce(Return(kMockStatus));
|
|
|
|
|
|
|
|
CreateWidevineEncryptorSource();
|
2014-04-15 22:18:26 +00:00
|
|
|
EncryptionKey encryption_key;
|
|
|
|
ASSERT_EQ(kMockStatus,
|
|
|
|
widevine_encryptor_source_->GetKey(EncryptorSource::TRACK_TYPE_SD,
|
|
|
|
&encryption_key));
|
2014-02-20 22:38:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST_F(WidevineEncryptorSourceTest, LicenseStatusOK) {
|
|
|
|
EXPECT_CALL(*mock_request_signer_, GenerateSignature(_, _))
|
|
|
|
.WillOnce(Return(true));
|
|
|
|
|
|
|
|
std::string expected_response = base::StringPrintf(
|
2014-04-15 22:18:26 +00:00
|
|
|
kHttpResponseFormat, Base64Encode(GenerateMockLicenseResponse()).c_str());
|
2014-02-20 22:38:28 +00:00
|
|
|
|
|
|
|
EXPECT_CALL(*mock_http_fetcher_, Post(_, _, _))
|
|
|
|
.WillOnce(DoAll(SetArgPointee<2>(expected_response), Return(Status::OK)));
|
|
|
|
|
|
|
|
CreateWidevineEncryptorSource();
|
2014-04-15 22:18:26 +00:00
|
|
|
|
|
|
|
EncryptionKey encryption_key;
|
|
|
|
const std::string kTrackTypes[] = {"SD", "HD", "AUDIO"};
|
|
|
|
for (size_t i = 0; i < 3; ++i) {
|
|
|
|
ASSERT_OK(widevine_encryptor_source_->GetKey(
|
|
|
|
EncryptorSource::GetTrackTypeFromString(kTrackTypes[i]),
|
|
|
|
&encryption_key));
|
|
|
|
EXPECT_EQ(GetMockKeyId(kTrackTypes[i]), ToString(encryption_key.key_id));
|
|
|
|
EXPECT_EQ(GetMockKey(kTrackTypes[i]), ToString(encryption_key.key));
|
|
|
|
EXPECT_EQ(GetMockPsshData(kTrackTypes[i]),
|
|
|
|
GetPsshDataFromPsshBox(ToString(encryption_key.pssh)));
|
|
|
|
}
|
2014-02-20 22:38:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST_F(WidevineEncryptorSourceTest, RetryOnTransientError) {
|
|
|
|
EXPECT_CALL(*mock_request_signer_, GenerateSignature(_, _))
|
|
|
|
.WillOnce(Return(true));
|
|
|
|
|
|
|
|
std::string mock_license_status = base::StringPrintf(
|
2014-04-15 22:18:26 +00:00
|
|
|
kLicenseResponseFormat, kLicenseStatusTransientError, "");
|
2014-02-20 22:38:28 +00:00
|
|
|
std::string expected_response = base::StringPrintf(
|
|
|
|
kHttpResponseFormat, Base64Encode(mock_license_status).c_str());
|
|
|
|
|
|
|
|
std::string expected_retried_response = base::StringPrintf(
|
2014-04-15 22:18:26 +00:00
|
|
|
kHttpResponseFormat, Base64Encode(GenerateMockLicenseResponse()).c_str());
|
2014-02-20 22:38:28 +00:00
|
|
|
|
|
|
|
// Retry is expected on transient error.
|
|
|
|
EXPECT_CALL(*mock_http_fetcher_, Post(_, _, _))
|
|
|
|
.WillOnce(DoAll(SetArgPointee<2>(expected_response), Return(Status::OK)))
|
|
|
|
.WillOnce(DoAll(SetArgPointee<2>(expected_retried_response),
|
|
|
|
Return(Status::OK)));
|
|
|
|
|
|
|
|
CreateWidevineEncryptorSource();
|
2014-04-15 22:18:26 +00:00
|
|
|
EncryptionKey encryption_key;
|
|
|
|
ASSERT_OK(widevine_encryptor_source_->GetKey(EncryptorSource::TRACK_TYPE_SD,
|
|
|
|
&encryption_key));
|
|
|
|
EXPECT_EQ(GetMockKeyId("SD"), ToString(encryption_key.key_id));
|
|
|
|
EXPECT_EQ(GetMockKey("SD"), ToString(encryption_key.key));
|
|
|
|
EXPECT_EQ(GetMockPsshData("SD"),
|
|
|
|
GetPsshDataFromPsshBox(ToString(encryption_key.pssh)));
|
2014-02-20 22:38:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST_F(WidevineEncryptorSourceTest, NoRetryOnUnknownError) {
|
|
|
|
EXPECT_CALL(*mock_request_signer_, GenerateSignature(_, _))
|
|
|
|
.WillOnce(Return(true));
|
|
|
|
|
|
|
|
std::string mock_license_status = base::StringPrintf(
|
2014-04-15 22:18:26 +00:00
|
|
|
kLicenseResponseFormat, kLicenseStatusUnknownError, "");
|
2014-02-20 22:38:28 +00:00
|
|
|
std::string mock_response = base::StringPrintf(
|
|
|
|
kHttpResponseFormat, Base64Encode(mock_license_status).c_str());
|
|
|
|
|
|
|
|
EXPECT_CALL(*mock_http_fetcher_, Post(_, _, _))
|
|
|
|
.WillOnce(DoAll(SetArgPointee<2>(mock_response), Return(Status::OK)));
|
|
|
|
|
|
|
|
CreateWidevineEncryptorSource();
|
2014-04-15 22:18:26 +00:00
|
|
|
EncryptionKey encryption_key;
|
2014-02-20 22:38:28 +00:00
|
|
|
ASSERT_EQ(error::SERVER_ERROR,
|
2014-04-15 22:18:26 +00:00
|
|
|
widevine_encryptor_source_->GetKey(EncryptorSource::TRACK_TYPE_SD,
|
|
|
|
&encryption_key).error_code());
|
2014-02-20 22:38:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace media
|