Remove the usage of JsonWriter in WidevineKeySource
Uses protobuf JSON util instead. packager/base/json_writer comes from Chromium base. We are going to replace it with abseil, which does not have a JSON library. The code is much more cleaner now. This is unfortunately, at the expense of increased output binary size. packager binary increases by another 100KB. Change-Id: I83a9217a484cad3c41147ad9a75311384347c49c
This commit is contained in:
parent
b209aeeb7a
commit
ae82cd16f3
|
@ -8,16 +8,16 @@
|
||||||
|
|
||||||
#include "packager/base/base64.h"
|
#include "packager/base/base64.h"
|
||||||
#include "packager/base/bind.h"
|
#include "packager/base/bind.h"
|
||||||
#include "packager/base/json/json_reader.h"
|
|
||||||
#include "packager/base/json/json_writer.h"
|
|
||||||
#include "packager/base/strings/string_number_conversions.h"
|
#include "packager/base/strings/string_number_conversions.h"
|
||||||
#include "packager/media/base/http_key_fetcher.h"
|
#include "packager/media/base/http_key_fetcher.h"
|
||||||
#include "packager/media/base/network_util.h"
|
#include "packager/media/base/network_util.h"
|
||||||
#include "packager/media/base/producer_consumer_queue.h"
|
#include "packager/media/base/producer_consumer_queue.h"
|
||||||
#include "packager/media/base/protection_system_specific_info.h"
|
#include "packager/media/base/protection_system_specific_info.h"
|
||||||
|
#include "packager/media/base/proto_json_util.h"
|
||||||
#include "packager/media/base/pssh_generator_util.h"
|
#include "packager/media/base/pssh_generator_util.h"
|
||||||
#include "packager/media/base/rcheck.h"
|
#include "packager/media/base/rcheck.h"
|
||||||
#include "packager/media/base/request_signer.h"
|
#include "packager/media/base/request_signer.h"
|
||||||
|
#include "packager/media/base/widevine_common_encryption.pb.h"
|
||||||
#include "packager/media/base/widevine_pssh_generator.h"
|
#include "packager/media/base/widevine_pssh_generator.h"
|
||||||
|
|
||||||
namespace shaka {
|
namespace shaka {
|
||||||
|
@ -26,11 +26,6 @@ namespace {
|
||||||
|
|
||||||
const bool kEnableKeyRotation = true;
|
const bool kEnableKeyRotation = true;
|
||||||
|
|
||||||
const char kLicenseStatusOK[] = "OK";
|
|
||||||
// Server may return INTERNAL_ERROR intermittently, which is a transient error
|
|
||||||
// and the next client request may succeed without problem.
|
|
||||||
const char kLicenseStatusTransientError[] = "INTERNAL_ERROR";
|
|
||||||
|
|
||||||
// Number of times to retry requesting keys in case of a transient error from
|
// Number of times to retry requesting keys in case of a transient error from
|
||||||
// the server.
|
// the server.
|
||||||
const int kNumTransientErrorRetries = 5;
|
const int kNumTransientErrorRetries = 5;
|
||||||
|
@ -42,73 +37,24 @@ const int kDefaultCryptoPeriodCount = 10;
|
||||||
const int kGetKeyTimeoutInSeconds = 5 * 60; // 5 minutes.
|
const int kGetKeyTimeoutInSeconds = 5 * 60; // 5 minutes.
|
||||||
const int kKeyFetchTimeoutInSeconds = 60; // 1 minute.
|
const int kKeyFetchTimeoutInSeconds = 60; // 1 minute.
|
||||||
|
|
||||||
bool Base64StringToBytes(const std::string& base64_string,
|
CommonEncryptionRequest::ProtectionScheme ToCommonEncryptionProtectionScheme(
|
||||||
std::vector<uint8_t>* bytes) {
|
FourCC protection_scheme) {
|
||||||
DCHECK(bytes);
|
switch (protection_scheme) {
|
||||||
std::string str;
|
case FOURCC_cenc:
|
||||||
if (!base::Base64Decode(base64_string, &str))
|
return CommonEncryptionRequest::CENC;
|
||||||
return false;
|
case FOURCC_cbcs:
|
||||||
bytes->assign(str.begin(), str.end());
|
case kAppleSampleAesProtectionScheme:
|
||||||
return true;
|
// Treat sample aes as a variant of cbcs.
|
||||||
}
|
return CommonEncryptionRequest::CBCS;
|
||||||
|
case FOURCC_cbc1:
|
||||||
void BytesToBase64String(const std::vector<uint8_t>& bytes,
|
return CommonEncryptionRequest::CBC1;
|
||||||
std::string* base64_string) {
|
case FOURCC_cens:
|
||||||
DCHECK(base64_string);
|
return CommonEncryptionRequest::CENS;
|
||||||
base::Base64Encode(base::StringPiece(reinterpret_cast<const char*>
|
default:
|
||||||
(bytes.data()), bytes.size()),
|
LOG(WARNING) << "Ignore unrecognized protection scheme "
|
||||||
base64_string);
|
<< FourCCToString(protection_scheme);
|
||||||
}
|
return CommonEncryptionRequest::UNSPECIFIED;
|
||||||
|
|
||||||
bool GetKeyFromTrack(const base::DictionaryValue& track_dict,
|
|
||||||
std::vector<uint8_t>* key) {
|
|
||||||
DCHECK(key);
|
|
||||||
std::string key_base64_string;
|
|
||||||
RCHECK(track_dict.GetString("key", &key_base64_string));
|
|
||||||
VLOG(2) << "Key:" << key_base64_string;
|
|
||||||
RCHECK(Base64StringToBytes(key_base64_string, key));
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
bool GetKeyIdFromTrack(const base::DictionaryValue& track_dict,
|
|
||||||
std::vector<uint8_t>* key_id) {
|
|
||||||
DCHECK(key_id);
|
|
||||||
std::string key_id_base64_string;
|
|
||||||
RCHECK(track_dict.GetString("key_id", &key_id_base64_string));
|
|
||||||
VLOG(2) << "Keyid:" << key_id_base64_string;
|
|
||||||
RCHECK(Base64StringToBytes(key_id_base64_string, key_id));
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
bool GetPsshDataFromTrack(const base::DictionaryValue& track_dict,
|
|
||||||
std::vector<uint8_t>* pssh_data) {
|
|
||||||
DCHECK(pssh_data);
|
|
||||||
|
|
||||||
const base::ListValue* pssh_list;
|
|
||||||
RCHECK(track_dict.GetList("pssh", &pssh_list));
|
|
||||||
// Invariant check. We don't want to crash in release mode if possible.
|
|
||||||
// The following code handles it gracefully if GetSize() does not return 1.
|
|
||||||
DCHECK_EQ(1u, pssh_list->GetSize());
|
|
||||||
|
|
||||||
const base::DictionaryValue* pssh_dict;
|
|
||||||
RCHECK(pssh_list->GetDictionary(0, &pssh_dict));
|
|
||||||
std::string drm_type;
|
|
||||||
RCHECK(pssh_dict->GetString("drm_type", &drm_type));
|
|
||||||
if (drm_type != "WIDEVINE") {
|
|
||||||
LOG(ERROR) << "Expecting drm_type 'WIDEVINE', get '" << drm_type << "'.";
|
|
||||||
return false;
|
|
||||||
}
|
}
|
||||||
std::string pssh_data_base64_string;
|
|
||||||
RCHECK(pssh_dict->GetString("data", &pssh_data_base64_string));
|
|
||||||
|
|
||||||
VLOG(2) << "Pssh Data:" << pssh_data_base64_string;
|
|
||||||
RCHECK(Base64StringToBytes(pssh_data_base64_string, pssh_data));
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
bool IsProtectionSchemeValid(FourCC protection_scheme) {
|
|
||||||
return protection_scheme == FOURCC_cenc || protection_scheme == FOURCC_cbcs ||
|
|
||||||
protection_scheme == FOURCC_cbc1 || protection_scheme == FOURCC_cens;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
} // namespace
|
} // namespace
|
||||||
|
@ -145,22 +91,12 @@ WidevineKeySource::~WidevineKeySource() {
|
||||||
Status WidevineKeySource::FetchKeys(const std::vector<uint8_t>& content_id,
|
Status WidevineKeySource::FetchKeys(const std::vector<uint8_t>& content_id,
|
||||||
const std::string& policy) {
|
const std::string& policy) {
|
||||||
base::AutoLock scoped_lock(lock_);
|
base::AutoLock scoped_lock(lock_);
|
||||||
request_dict_.Clear();
|
common_encryption_request_.reset(new CommonEncryptionRequest);
|
||||||
std::string content_id_base64_string;
|
common_encryption_request_->set_content_id(content_id.data(),
|
||||||
BytesToBase64String(content_id, &content_id_base64_string);
|
content_id.size());
|
||||||
request_dict_.SetString("content_id", content_id_base64_string);
|
common_encryption_request_->set_policy(policy);
|
||||||
request_dict_.SetString("policy", policy);
|
common_encryption_request_->set_protection_scheme(
|
||||||
|
ToCommonEncryptionProtectionScheme(protection_scheme_));
|
||||||
FourCC protection_scheme = protection_scheme_;
|
|
||||||
// Treat sample aes as a variant of cbcs.
|
|
||||||
if (protection_scheme == kAppleSampleAesProtectionScheme)
|
|
||||||
protection_scheme = FOURCC_cbcs;
|
|
||||||
if (IsProtectionSchemeValid(protection_scheme)) {
|
|
||||||
request_dict_.SetInteger("protection_scheme", protection_scheme);
|
|
||||||
} else {
|
|
||||||
LOG(WARNING) << "Ignore unrecognized protection scheme "
|
|
||||||
<< FourCCToString(protection_scheme);
|
|
||||||
}
|
|
||||||
|
|
||||||
return FetchKeysInternal(!kEnableKeyRotation, 0, false);
|
return FetchKeysInternal(!kEnableKeyRotation, 0, false);
|
||||||
}
|
}
|
||||||
|
@ -217,15 +153,12 @@ Status WidevineKeySource::FetchKeys(EmeInitDataType init_data_type,
|
||||||
const bool widevine_classic =
|
const bool widevine_classic =
|
||||||
init_data_type == EmeInitDataType::WIDEVINE_CLASSIC;
|
init_data_type == EmeInitDataType::WIDEVINE_CLASSIC;
|
||||||
base::AutoLock scoped_lock(lock_);
|
base::AutoLock scoped_lock(lock_);
|
||||||
request_dict_.Clear();
|
common_encryption_request_.reset(new CommonEncryptionRequest);
|
||||||
if (widevine_classic) {
|
if (widevine_classic) {
|
||||||
// Javascript/JSON does not support int64_t or unsigned numbers. Use double
|
common_encryption_request_->set_asset_id(asset_id);
|
||||||
// instead as 32-bit integer can be lossless represented using double.
|
|
||||||
request_dict_.SetDouble("asset_id", asset_id);
|
|
||||||
} else {
|
} else {
|
||||||
std::string pssh_data_base64_string;
|
common_encryption_request_->set_pssh_data(pssh_data.data(),
|
||||||
BytesToBase64String(pssh_data, &pssh_data_base64_string);
|
pssh_data.size());
|
||||||
request_dict_.SetString("pssh_data", pssh_data_base64_string);
|
|
||||||
}
|
}
|
||||||
return FetchKeysInternal(!kEnableKeyRotation, 0, widevine_classic);
|
return FetchKeysInternal(!kEnableKeyRotation, 0, widevine_classic);
|
||||||
}
|
}
|
||||||
|
@ -336,10 +269,8 @@ void WidevineKeySource::FetchKeysTask() {
|
||||||
Status WidevineKeySource::FetchKeysInternal(bool enable_key_rotation,
|
Status WidevineKeySource::FetchKeysInternal(bool enable_key_rotation,
|
||||||
uint32_t first_crypto_period_index,
|
uint32_t first_crypto_period_index,
|
||||||
bool widevine_classic) {
|
bool widevine_classic) {
|
||||||
std::string request;
|
CommonEncryptionRequest request;
|
||||||
FillRequest(enable_key_rotation,
|
FillRequest(enable_key_rotation, first_crypto_period_index, &request);
|
||||||
first_crypto_period_index,
|
|
||||||
&request);
|
|
||||||
|
|
||||||
std::string message;
|
std::string message;
|
||||||
Status status = GenerateKeyMessage(request, &message);
|
Status status = GenerateKeyMessage(request, &message);
|
||||||
|
@ -357,23 +288,15 @@ Status WidevineKeySource::FetchKeysInternal(bool enable_key_rotation,
|
||||||
if (status.ok()) {
|
if (status.ok()) {
|
||||||
VLOG(1) << "Retry [" << i << "] Response:" << raw_response;
|
VLOG(1) << "Retry [" << i << "] Response:" << raw_response;
|
||||||
|
|
||||||
std::string response;
|
|
||||||
if (!DecodeResponse(raw_response, &response)) {
|
|
||||||
return Status(error::SERVER_ERROR,
|
|
||||||
"Failed to decode response '" + raw_response + "'.");
|
|
||||||
}
|
|
||||||
|
|
||||||
bool transient_error = false;
|
bool transient_error = false;
|
||||||
if (ExtractEncryptionKey(enable_key_rotation,
|
if (ExtractEncryptionKey(enable_key_rotation, widevine_classic,
|
||||||
widevine_classic,
|
raw_response, &transient_error))
|
||||||
response,
|
|
||||||
&transient_error))
|
|
||||||
return Status::OK;
|
return Status::OK;
|
||||||
|
|
||||||
if (!transient_error) {
|
if (!transient_error) {
|
||||||
return Status(
|
return Status(
|
||||||
error::SERVER_ERROR,
|
error::SERVER_ERROR,
|
||||||
"Failed to extract encryption key from '" + response + "'.");
|
"Failed to extract encryption key from '" + raw_response + "'.");
|
||||||
}
|
}
|
||||||
} else if (status.error_code() != error::TIME_OUT) {
|
} else if (status.error_code() != error::TIME_OUT) {
|
||||||
return status;
|
return status;
|
||||||
|
@ -392,106 +315,50 @@ Status WidevineKeySource::FetchKeysInternal(bool enable_key_rotation,
|
||||||
|
|
||||||
void WidevineKeySource::FillRequest(bool enable_key_rotation,
|
void WidevineKeySource::FillRequest(bool enable_key_rotation,
|
||||||
uint32_t first_crypto_period_index,
|
uint32_t first_crypto_period_index,
|
||||||
std::string* request) {
|
CommonEncryptionRequest* request) {
|
||||||
|
DCHECK(common_encryption_request_);
|
||||||
DCHECK(request);
|
DCHECK(request);
|
||||||
DCHECK(!request_dict_.empty());
|
*request = *common_encryption_request_;
|
||||||
|
|
||||||
// Build tracks.
|
request->add_tracks()->set_type("SD");
|
||||||
base::ListValue* tracks = new base::ListValue();
|
request->add_tracks()->set_type("HD");
|
||||||
|
request->add_tracks()->set_type("UHD1");
|
||||||
|
request->add_tracks()->set_type("UHD2");
|
||||||
|
request->add_tracks()->set_type("AUDIO");
|
||||||
|
|
||||||
base::DictionaryValue* track_sd = new base::DictionaryValue();
|
request->add_drm_types(ModularDrmType::WIDEVINE);
|
||||||
track_sd->SetString("type", "SD");
|
|
||||||
tracks->Append(track_sd);
|
|
||||||
base::DictionaryValue* track_hd = new base::DictionaryValue();
|
|
||||||
track_hd->SetString("type", "HD");
|
|
||||||
tracks->Append(track_hd);
|
|
||||||
base::DictionaryValue* track_uhd1 = new base::DictionaryValue();
|
|
||||||
track_uhd1->SetString("type", "UHD1");
|
|
||||||
tracks->Append(track_uhd1);
|
|
||||||
base::DictionaryValue* track_uhd2 = new base::DictionaryValue();
|
|
||||||
track_uhd2->SetString("type", "UHD2");
|
|
||||||
tracks->Append(track_uhd2);
|
|
||||||
base::DictionaryValue* track_audio = new base::DictionaryValue();
|
|
||||||
track_audio->SetString("type", "AUDIO");
|
|
||||||
tracks->Append(track_audio);
|
|
||||||
|
|
||||||
request_dict_.Set("tracks", tracks);
|
|
||||||
|
|
||||||
// Build DRM types.
|
|
||||||
base::ListValue* drm_types = new base::ListValue();
|
|
||||||
drm_types->AppendString("WIDEVINE");
|
|
||||||
request_dict_.Set("drm_types", drm_types);
|
|
||||||
|
|
||||||
// Build key rotation fields.
|
|
||||||
if (enable_key_rotation) {
|
if (enable_key_rotation) {
|
||||||
// Javascript/JSON does not support int64_t or unsigned numbers. Use double
|
request->set_first_crypto_period_index(first_crypto_period_index);
|
||||||
// instead as 32-bit integer can be lossless represented using double.
|
request->set_crypto_period_count(crypto_period_count_);
|
||||||
request_dict_.SetDouble("first_crypto_period_index",
|
|
||||||
first_crypto_period_index);
|
|
||||||
request_dict_.SetInteger("crypto_period_count", crypto_period_count_);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Set group id if present.
|
if (!group_id_.empty())
|
||||||
if (!group_id_.empty()) {
|
request->set_group_id(group_id_.data(), group_id_.size());
|
||||||
std::string group_id_base64;
|
|
||||||
BytesToBase64String(group_id_, &group_id_base64);
|
|
||||||
request_dict_.SetString("group_id", group_id_base64);
|
|
||||||
}
|
|
||||||
|
|
||||||
base::JSONWriter::WriteWithOptions(
|
|
||||||
request_dict_,
|
|
||||||
// Write doubles that have no fractional part as a normal integer, i.e.
|
|
||||||
// without using exponential notation or appending a '.0'.
|
|
||||||
base::JSONWriter::OPTIONS_OMIT_DOUBLE_TYPE_PRESERVATION, request);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
Status WidevineKeySource::GenerateKeyMessage(const std::string& request,
|
Status WidevineKeySource::GenerateKeyMessage(
|
||||||
|
const CommonEncryptionRequest& request,
|
||||||
std::string* message) {
|
std::string* message) {
|
||||||
DCHECK(message);
|
DCHECK(message);
|
||||||
|
|
||||||
std::string request_base64_string;
|
SignedModularDrmRequest signed_request;
|
||||||
base::Base64Encode(request, &request_base64_string);
|
signed_request.set_request(MessageToJsonString(request));
|
||||||
|
|
||||||
base::DictionaryValue request_dict;
|
|
||||||
request_dict.SetString("request", request_base64_string);
|
|
||||||
|
|
||||||
// Sign the request.
|
// Sign the request.
|
||||||
if (signer_) {
|
if (signer_) {
|
||||||
std::string signature;
|
std::string signature;
|
||||||
if (!signer_->GenerateSignature(request, &signature))
|
if (!signer_->GenerateSignature(signed_request.request(), &signature))
|
||||||
return Status(error::INTERNAL_ERROR, "Signature generation failed.");
|
return Status(error::INTERNAL_ERROR, "Signature generation failed.");
|
||||||
|
|
||||||
std::string signature_base64_string;
|
signed_request.set_signature(signature);
|
||||||
base::Base64Encode(signature, &signature_base64_string);
|
signed_request.set_signer(signer_->signer_name());
|
||||||
|
|
||||||
request_dict.SetString("signature", signature_base64_string);
|
|
||||||
request_dict.SetString("signer", signer_->signer_name());
|
|
||||||
}
|
}
|
||||||
|
|
||||||
base::JSONWriter::Write(request_dict, message);
|
*message = MessageToJsonString(signed_request);
|
||||||
return Status::OK;
|
return Status::OK;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool WidevineKeySource::DecodeResponse(
|
|
||||||
const std::string& raw_response,
|
|
||||||
std::string* response) {
|
|
||||||
DCHECK(response);
|
|
||||||
|
|
||||||
// Extract base64 formatted response from JSON formatted raw response.
|
|
||||||
std::unique_ptr<base::Value> root(base::JSONReader::Read(raw_response));
|
|
||||||
if (!root) {
|
|
||||||
LOG(ERROR) << "'" << raw_response << "' is not in JSON format.";
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
const base::DictionaryValue* response_dict = NULL;
|
|
||||||
RCHECK(root->GetAsDictionary(&response_dict));
|
|
||||||
|
|
||||||
std::string response_base64_string;
|
|
||||||
RCHECK(response_dict->GetString("response", &response_base64_string));
|
|
||||||
RCHECK(base::Base64Decode(response_base64_string, response));
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
bool WidevineKeySource::ExtractEncryptionKey(
|
bool WidevineKeySource::ExtractEncryptionKey(
|
||||||
bool enable_key_rotation,
|
bool enable_key_rotation,
|
||||||
bool widevine_classic,
|
bool widevine_classic,
|
||||||
|
@ -500,46 +367,45 @@ bool WidevineKeySource::ExtractEncryptionKey(
|
||||||
DCHECK(transient_error);
|
DCHECK(transient_error);
|
||||||
*transient_error = false;
|
*transient_error = false;
|
||||||
|
|
||||||
std::unique_ptr<base::Value> root(base::JSONReader::Read(response));
|
SignedModularDrmResponse signed_response_proto;
|
||||||
if (!root) {
|
if (!JsonStringToMessage(response, &signed_response_proto)) {
|
||||||
LOG(ERROR) << "'" << response << "' is not in JSON format.";
|
LOG(ERROR) << "Failed to convert JSON to proto: " << response;
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
const base::DictionaryValue* license_dict = NULL;
|
CommonEncryptionResponse response_proto;
|
||||||
RCHECK(root->GetAsDictionary(&license_dict));
|
if (!JsonStringToMessage(signed_response_proto.response(), &response_proto)) {
|
||||||
|
LOG(ERROR) << "Failed to convert JSON to proto: "
|
||||||
|
<< signed_response_proto.response();
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
std::string license_status;
|
if (response_proto.status() != CommonEncryptionResponse::OK) {
|
||||||
RCHECK(license_dict->GetString("status", &license_status));
|
|
||||||
if (license_status != kLicenseStatusOK) {
|
|
||||||
LOG(ERROR) << "Received non-OK license response: " << response;
|
LOG(ERROR) << "Received non-OK license response: " << response;
|
||||||
*transient_error = (license_status == kLicenseStatusTransientError);
|
// Server may return INTERNAL_ERROR intermittently, which is a transient
|
||||||
|
// error and the next client request may succeed without problem.
|
||||||
|
*transient_error =
|
||||||
|
(response_proto.status() == CommonEncryptionResponse::INTERNAL_ERROR);
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
const base::ListValue* tracks;
|
RCHECK(enable_key_rotation
|
||||||
RCHECK(license_dict->GetList("tracks", &tracks));
|
? response_proto.tracks_size() >= crypto_period_count_
|
||||||
// Should have at least one track per crypto_period.
|
: response_proto.tracks_size() >= 1);
|
||||||
RCHECK(enable_key_rotation ? tracks->GetSize() >= 1 * crypto_period_count_
|
|
||||||
: tracks->GetSize() >= 1);
|
|
||||||
|
|
||||||
int current_crypto_period_index = first_crypto_period_index_;
|
uint32_t current_crypto_period_index = first_crypto_period_index_;
|
||||||
|
|
||||||
EncryptionKeyMap encryption_key_map;
|
EncryptionKeyMap encryption_key_map;
|
||||||
for (size_t i = 0; i < tracks->GetSize(); ++i) {
|
for (const auto& track : response_proto.tracks()) {
|
||||||
const base::DictionaryValue* track_dict;
|
VLOG(2) << "track " << track.ShortDebugString();
|
||||||
RCHECK(tracks->GetDictionary(i, &track_dict));
|
|
||||||
|
|
||||||
if (enable_key_rotation) {
|
if (enable_key_rotation) {
|
||||||
int crypto_period_index;
|
if (track.crypto_period_index() != current_crypto_period_index) {
|
||||||
RCHECK(
|
if (track.crypto_period_index() != current_crypto_period_index + 1) {
|
||||||
track_dict->GetInteger("crypto_period_index", &crypto_period_index));
|
|
||||||
if (crypto_period_index != current_crypto_period_index) {
|
|
||||||
if (crypto_period_index != current_crypto_period_index + 1) {
|
|
||||||
LOG(ERROR) << "Expecting crypto period index "
|
LOG(ERROR) << "Expecting crypto period index "
|
||||||
<< current_crypto_period_index << " or "
|
<< current_crypto_period_index << " or "
|
||||||
<< current_crypto_period_index + 1 << "; Seen "
|
<< current_crypto_period_index + 1 << "; Seen "
|
||||||
<< crypto_period_index << " at track " << i;
|
<< track.crypto_period_index();
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
if (!PushToKeyPool(&encryption_key_map))
|
if (!PushToKeyPool(&encryption_key_map))
|
||||||
|
@ -548,24 +414,25 @@ bool WidevineKeySource::ExtractEncryptionKey(
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
std::string stream_label;
|
const std::string& stream_label = track.type();
|
||||||
RCHECK(track_dict->GetString("type", &stream_label));
|
|
||||||
RCHECK(encryption_key_map.find(stream_label) == encryption_key_map.end());
|
RCHECK(encryption_key_map.find(stream_label) == encryption_key_map.end());
|
||||||
VLOG(2) << "drm label:" << stream_label;
|
|
||||||
|
|
||||||
std::unique_ptr<EncryptionKey> encryption_key(new EncryptionKey());
|
std::unique_ptr<EncryptionKey> encryption_key(new EncryptionKey());
|
||||||
|
encryption_key->key.assign(track.key().begin(), track.key().end());
|
||||||
if (!GetKeyFromTrack(*track_dict, &encryption_key->key))
|
|
||||||
return false;
|
|
||||||
|
|
||||||
// Get key ID and PSSH data for CENC content only.
|
// Get key ID and PSSH data for CENC content only.
|
||||||
if (!widevine_classic) {
|
if (!widevine_classic) {
|
||||||
if (!GetKeyIdFromTrack(*track_dict, &encryption_key->key_id))
|
encryption_key->key_id.assign(track.key_id().begin(),
|
||||||
return false;
|
track.key_id().end());
|
||||||
|
|
||||||
std::vector<uint8_t> pssh_data;
|
if (track.pssh_size() != 1) {
|
||||||
if (!GetPsshDataFromTrack(*track_dict, &pssh_data))
|
LOG(ERROR) << "Expecting one and only one pssh, seeing "
|
||||||
|
<< track.pssh_size();
|
||||||
return false;
|
return false;
|
||||||
|
}
|
||||||
|
const auto& pssh_proto = track.pssh(0);
|
||||||
|
const std::vector<uint8_t> pssh_data(pssh_proto.data().begin(),
|
||||||
|
pssh_proto.data().end());
|
||||||
|
|
||||||
PsshBoxBuilder pssh_builder;
|
PsshBoxBuilder pssh_builder;
|
||||||
pssh_builder.add_key_id(encryption_key->key_id);
|
pssh_builder.add_key_id(encryption_key->key_id);
|
||||||
|
|
|
@ -10,12 +10,14 @@
|
||||||
#include <map>
|
#include <map>
|
||||||
#include <memory>
|
#include <memory>
|
||||||
#include "packager/base/synchronization/waitable_event.h"
|
#include "packager/base/synchronization/waitable_event.h"
|
||||||
#include "packager/base/values.h"
|
|
||||||
#include "packager/media/base/closure_thread.h"
|
#include "packager/media/base/closure_thread.h"
|
||||||
#include "packager/media/base/fourccs.h"
|
#include "packager/media/base/fourccs.h"
|
||||||
#include "packager/media/base/key_source.h"
|
#include "packager/media/base/key_source.h"
|
||||||
|
|
||||||
namespace shaka {
|
namespace shaka {
|
||||||
|
|
||||||
|
class CommonEncryptionRequest;
|
||||||
|
|
||||||
namespace media {
|
namespace media {
|
||||||
|
|
||||||
class KeyFetcher;
|
class KeyFetcher;
|
||||||
|
@ -91,13 +93,11 @@ class WidevineKeySource : public KeySource {
|
||||||
// |request| should not be NULL.
|
// |request| should not be NULL.
|
||||||
void FillRequest(bool enable_key_rotation,
|
void FillRequest(bool enable_key_rotation,
|
||||||
uint32_t first_crypto_period_index,
|
uint32_t first_crypto_period_index,
|
||||||
std::string* request);
|
CommonEncryptionRequest* request);
|
||||||
// Base64 escape and format the request. Optionally sign the request if a
|
// Get request in JSON string. Optionally sign the request if a signer is
|
||||||
// signer is provided. |message| should not be NULL. Return OK on success.
|
// provided. |message| should not be NULL. Return OK on success.
|
||||||
Status GenerateKeyMessage(const std::string& request, std::string* message);
|
Status GenerateKeyMessage(const CommonEncryptionRequest& request,
|
||||||
// Decode |response| from JSON formatted |raw_response|.
|
std::string* message);
|
||||||
// |response| should not be NULL.
|
|
||||||
bool DecodeResponse(const std::string& raw_response, std::string* response);
|
|
||||||
// Extract encryption key from |response|, which is expected to be properly
|
// Extract encryption key from |response|, which is expected to be properly
|
||||||
// formatted. |transient_error| will be set to true if it fails and the
|
// formatted. |transient_error| will be set to true if it fails and the
|
||||||
// failure is because of a transient error from the server. |transient_error|
|
// failure is because of a transient error from the server. |transient_error|
|
||||||
|
@ -116,9 +116,9 @@ class WidevineKeySource : public KeySource {
|
||||||
std::unique_ptr<KeyFetcher> key_fetcher_;
|
std::unique_ptr<KeyFetcher> key_fetcher_;
|
||||||
std::string server_url_;
|
std::string server_url_;
|
||||||
std::unique_ptr<RequestSigner> signer_;
|
std::unique_ptr<RequestSigner> signer_;
|
||||||
base::DictionaryValue request_dict_;
|
std::unique_ptr<CommonEncryptionRequest> common_encryption_request_;
|
||||||
|
|
||||||
const uint32_t crypto_period_count_;
|
const int crypto_period_count_;
|
||||||
FourCC protection_scheme_;
|
FourCC protection_scheme_;
|
||||||
base::Lock lock_;
|
base::Lock lock_;
|
||||||
bool key_production_started_;
|
bool key_production_started_;
|
||||||
|
|
|
@ -52,26 +52,25 @@ const char kLicenseStatusTransientError[] = "INTERNAL_ERROR";
|
||||||
const char kLicenseStatusUnknownError[] = "UNKNOWN_ERROR";
|
const char kLicenseStatusUnknownError[] = "UNKNOWN_ERROR";
|
||||||
|
|
||||||
const char kExpectedRequestMessageFormat[] =
|
const char kExpectedRequestMessageFormat[] =
|
||||||
"{\"content_id\":\"%s\",\"drm_types\":[\"WIDEVINE\"],\"policy\":\"%s\","
|
R"({"content_id":"%s","policy":"%s",)"
|
||||||
"\"protection_scheme\":%d,"
|
R"("tracks":[{"type":"SD"},{"type":"HD"},{"type":"UHD1"},)"
|
||||||
"\"tracks\":[{\"type\":\"SD\"},{\"type\":\"HD\"},{\"type\":\"UHD1\"},"
|
R"({"type":"UHD2"},{"type":"AUDIO"}],)"
|
||||||
"{\"type\":\"UHD2\"},{\"type\":\"AUDIO\"}]}";
|
R"("drm_types":["WIDEVINE"],"protection_scheme":"%s"})";
|
||||||
const char kExpectedRequestMessageWithAssetIdFormat[] =
|
const char kExpectedRequestMessageWithAssetIdFormat[] =
|
||||||
"{\"asset_id\":%u,\"drm_types\":[\"WIDEVINE\"],"
|
R"({"tracks":[{"type":"SD"},{"type":"HD"},{"type":"UHD1"},)"
|
||||||
"\"tracks\":[{\"type\":\"SD\"},{\"type\":\"HD\"},{\"type\":\"UHD1\"},"
|
R"({"type":"UHD2"},{"type":"AUDIO"}],)"
|
||||||
"{\"type\":\"UHD2\"},{\"type\":\"AUDIO\"}]}";
|
R"("drm_types":["WIDEVINE"],"asset_id":%u})";
|
||||||
const char kExpectedRequestMessageWithPsshFormat[] =
|
const char kExpectedRequestMessageWithPsshFormat[] =
|
||||||
"{\"drm_types\":[\"WIDEVINE\"],\"pssh_data\":\"%s\","
|
R"({"tracks":[{"type":"SD"},{"type":"HD"},{"type":"UHD1"},)"
|
||||||
"\"tracks\":[{\"type\":\"SD\"},{\"type\":\"HD\"},{\"type\":\"UHD1\"},"
|
R"({"type":"UHD2"},{"type":"AUDIO"}],)"
|
||||||
"{\"type\":\"UHD2\"},{\"type\":\"AUDIO\"}]}";
|
R"("drm_types":["WIDEVINE"],"pssh_data":"%s"})";
|
||||||
const char kExpectedSignedMessageFormat[] =
|
const char kExpectedSignedMessageFormat[] =
|
||||||
"{\"request\":\"%s\",\"signature\":\"%s\",\"signer\":\"%s\"}";
|
R"({"request":"%s","signature":"%s","signer":"%s"})";
|
||||||
const char kTrackFormat[] =
|
const char kTrackFormat[] = R"({"type":"%s","key_id":"%s","key":"%s",)"
|
||||||
"{\"type\":\"%s\",\"key_id\":\"%s\",\"key\":"
|
R"("pssh":[{"drm_type":"WIDEVINE","data":"%s"}]})";
|
||||||
"\"%s\",\"pssh\":[{\"drm_type\":\"WIDEVINE\",\"data\":\"%s\"}]}";
|
const char kClassicTrackFormat[] = R"({"type":"%s","key":"%s"})";
|
||||||
const char kClassicTrackFormat[] = "{\"type\":\"%s\",\"key\":\"%s\"}";
|
const char kLicenseResponseFormat[] = R"({"status":"%s","tracks":[%s]})";
|
||||||
const char kLicenseResponseFormat[] = "{\"status\":\"%s\",\"tracks\":[%s]}";
|
const char kHttpResponseFormat[] = R"({"response":"%s"})";
|
||||||
const char kHttpResponseFormat[] = "{\"response\":\"%s\"}";
|
|
||||||
const uint8_t kRequestPsshBox[] = {
|
const uint8_t kRequestPsshBox[] = {
|
||||||
0, 0, 0, 44, 'p', 's', 's', 'h', 0, 0, 0,
|
0, 0, 0, 44, 'p', 's', 's', 'h', 0, 0, 0,
|
||||||
0, 0xed, 0xef, 0x8b, 0xa9, 0x79, 0xd6, 0x4a, 0xce, 0xa3, 0xc8,
|
0, 0xed, 0xef, 0x8b, 0xa9, 0x79, 0xd6, 0x4a, 0xce, 0xa3, 0xc8,
|
||||||
|
@ -187,11 +186,21 @@ class WidevineKeySourceTest : public Test {
|
||||||
}
|
}
|
||||||
|
|
||||||
protected:
|
protected:
|
||||||
FourCC GetExpectedProtectionScheme() {
|
std::string GetExpectedProtectionScheme() {
|
||||||
|
switch (protection_scheme_) {
|
||||||
|
case FOURCC_cenc:
|
||||||
|
return "CENC";
|
||||||
|
case FOURCC_cbcs:
|
||||||
|
case kAppleSampleAesProtectionScheme:
|
||||||
// Apple SAMPLE-AES is considered as a variation of cbcs.
|
// Apple SAMPLE-AES is considered as a variation of cbcs.
|
||||||
if (protection_scheme_ == kAppleSampleAesProtectionScheme)
|
return "CBCS";
|
||||||
return FOURCC_cbcs;
|
case FOURCC_cbc1:
|
||||||
return protection_scheme_;
|
return "CBC1";
|
||||||
|
case FOURCC_cens:
|
||||||
|
return "CENS";
|
||||||
|
default:
|
||||||
|
return "UNKNOWN";
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
void CreateWidevineKeySource() {
|
void CreateWidevineKeySource() {
|
||||||
|
@ -330,7 +339,7 @@ class WidevineKeySourceParameterizedTest
|
||||||
TEST_P(WidevineKeySourceParameterizedTest, HttpFetchFailure) {
|
TEST_P(WidevineKeySourceParameterizedTest, HttpFetchFailure) {
|
||||||
std::string expected_message = base::StringPrintf(
|
std::string expected_message = base::StringPrintf(
|
||||||
kExpectedRequestMessageFormat, Base64Encode(kContentId).c_str(), kPolicy,
|
kExpectedRequestMessageFormat, Base64Encode(kContentId).c_str(), kPolicy,
|
||||||
GetExpectedProtectionScheme());
|
GetExpectedProtectionScheme().c_str());
|
||||||
EXPECT_CALL(*mock_request_signer_,
|
EXPECT_CALL(*mock_request_signer_,
|
||||||
GenerateSignature(StrEq(expected_message), _))
|
GenerateSignature(StrEq(expected_message), _))
|
||||||
.WillOnce(DoAll(SetArgPointee<1>(kMockSignature), Return(true)));
|
.WillOnce(DoAll(SetArgPointee<1>(kMockSignature), Return(true)));
|
||||||
|
@ -447,16 +456,17 @@ TEST_P(WidevineKeySourceParameterizedTest, LicenseStatusClassicOK) {
|
||||||
namespace {
|
namespace {
|
||||||
|
|
||||||
const char kCryptoPeriodRequestMessageFormat[] =
|
const char kCryptoPeriodRequestMessageFormat[] =
|
||||||
"{\"content_id\":\"%s\",\"crypto_period_count\":%u,\"drm_types\":["
|
R"({"content_id":"%s","policy":"%s",)"
|
||||||
"\"WIDEVINE\"],\"first_crypto_period_index\":%u,\"policy\":\"%s\","
|
R"("tracks":[{"type":"SD"},{"type":"HD"},{"type":"UHD1"},)"
|
||||||
"\"protection_scheme\":%d,"
|
R"({"type":"UHD2"},{"type":"AUDIO"}],)"
|
||||||
"\"tracks\":[{\"type\":\"SD\"},{\"type\":\"HD\"},{\"type\":\"UHD1\"},"
|
R"("drm_types":["WIDEVINE"],)"
|
||||||
"{\"type\":\"UHD2\"},{\"type\":\"AUDIO\"}]}";
|
R"("first_crypto_period_index":%u,"crypto_period_count":%u,)"
|
||||||
|
R"("protection_scheme":"%s"})";
|
||||||
|
|
||||||
const char kCryptoPeriodTrackFormat[] =
|
const char kCryptoPeriodTrackFormat[] =
|
||||||
"{\"type\":\"%s\",\"key_id\":\"%s\",\"key\":"
|
R"({"type":"%s","key_id":"%s","key":"%s",)"
|
||||||
"\"%s\",\"pssh\":[{\"drm_type\":\"WIDEVINE\",\"data\":\"\"}], "
|
R"("pssh":[{"drm_type":"WIDEVINE","data":""}], )"
|
||||||
"\"crypto_period_index\":%u}";
|
R"("crypto_period_index":%u})";
|
||||||
|
|
||||||
std::string GetMockKey(const std::string& track_type, uint32_t index) {
|
std::string GetMockKey(const std::string& track_type, uint32_t index) {
|
||||||
// The key must be 16 characters, in case the key is needed to generate a
|
// The key must be 16 characters, in case the key is needed to generate a
|
||||||
|
@ -515,8 +525,8 @@ TEST_P(WidevineKeySourceParameterizedTest, KeyRotationTest) {
|
||||||
kFirstCryptoPeriodIndex - 1 + i * kCryptoPeriodCount;
|
kFirstCryptoPeriodIndex - 1 + i * kCryptoPeriodCount;
|
||||||
std::string expected_message = base::StringPrintf(
|
std::string expected_message = base::StringPrintf(
|
||||||
kCryptoPeriodRequestMessageFormat, Base64Encode(kContentId).c_str(),
|
kCryptoPeriodRequestMessageFormat, Base64Encode(kContentId).c_str(),
|
||||||
kCryptoPeriodCount, first_crypto_period_index, kPolicy,
|
kPolicy, first_crypto_period_index, kCryptoPeriodCount,
|
||||||
GetExpectedProtectionScheme());
|
GetExpectedProtectionScheme().c_str());
|
||||||
EXPECT_CALL(*mock_request_signer_, GenerateSignature(expected_message, _))
|
EXPECT_CALL(*mock_request_signer_, GenerateSignature(expected_message, _))
|
||||||
.WillOnce(DoAll(SetArgPointee<1>(kMockSignature), Return(true)));
|
.WillOnce(DoAll(SetArgPointee<1>(kMockSignature), Return(true)));
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue