forked from web-platform-tests/wpt
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Implement support for EME with MediaSourceExtensionsForWebCodecs.
This adds the required EME fields to specify encryption details and wires them up to the relevant media::(Audio|Video)DecoderConfig and media::DecoderBuffer entries. Bug: 1144908 Change-Id: Id14adae90bcb53f3ece79506929b6b228fa1ce13 Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/4927877 Reviewed-by: Xiaohan Wang <[email protected]> Commit-Queue: Dale Curtis <[email protected]> Cr-Commit-Position: refs/heads/main@{#1211069}
- Loading branch information
1 parent
f48355a
commit bbb13dc
Showing
3 changed files
with
164 additions
and
34 deletions.
There are no files selected for viewing
136 changes: 136 additions & 0 deletions
136
media-source/mse-for-webcodecs/tentative/media-source-webcodecs-util.js
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,136 @@ | ||
const testIV = window.crypto.getRandomValues(new Uint8Array(16)); | ||
const testKey = window.crypto.getRandomValues(new Uint8Array(16)); | ||
const testKeyId = window.crypto.getRandomValues(new Uint8Array(8)); | ||
var testEncodedKey = null; | ||
|
||
const keySystemConfig = [{ | ||
initDataTypes: ['keyids'], | ||
videoCapabilities: [{contentType: 'video/mp4; codecs="vp09.00.10.08"'}] | ||
}]; | ||
|
||
// TODO(crbug.com/1144908): Consider extracting metadata into helper library | ||
// shared with webcodecs tests. This metadata is adapted from | ||
// webcodecs/video-decoder-any.js. | ||
const vp9 = { | ||
async buffer() { | ||
return (await fetch('vp9.mp4')).arrayBuffer(); | ||
}, | ||
// Note, file might not actually be level 1. See original metadata in | ||
// webcodecs test suite. | ||
codec: 'vp09.00.10.08', | ||
frames: [ | ||
{offset: 44, size: 3315, type: 'key'}, | ||
{offset: 3359, size: 203, type: 'delta'}, | ||
{offset: 3562, size: 245, type: 'delta'}, | ||
{offset: 3807, size: 172, type: 'delta'}, | ||
{offset: 3979, size: 312, type: 'delta'}, | ||
{offset: 4291, size: 170, type: 'delta'}, | ||
{offset: 4461, size: 195, type: 'delta'}, | ||
{offset: 4656, size: 181, type: 'delta'}, | ||
{offset: 4837, size: 356, type: 'delta'}, | ||
{offset: 5193, size: 159, type: 'delta'} | ||
] | ||
}; | ||
|
||
async function getOpenMediaSource(t) { | ||
return new Promise(async resolve => { | ||
const v = document.createElement('video'); | ||
document.body.appendChild(v); | ||
const mediaSource = new MediaSource(); | ||
const url = URL.createObjectURL(mediaSource); | ||
mediaSource.addEventListener( | ||
'sourceopen', t.step_func(() => { | ||
URL.revokeObjectURL(url); | ||
assert_equals(mediaSource.readyState, 'open', 'MediaSource is open'); | ||
resolve([v, mediaSource]); | ||
}), | ||
{once: true}); | ||
v.src = url; | ||
}); | ||
} | ||
|
||
async function setupEme(t, video) { | ||
testEncodedKey = await crypto.subtle.importKey( | ||
'raw', testKey.buffer, 'AES-CTR', false, ['encrypt', 'decrypt']); | ||
|
||
var handler = new MessageHandler( | ||
'org.w3.clearkey', {keys: [{kid: testKeyId, key: testKey}]}); | ||
|
||
function handleMessage(event) { | ||
handler.messagehandler(event.messageType, event.message).then(response => { | ||
event.target.update(response).catch(e => { | ||
assert_unreached('Failed to update session: ' + e); | ||
}); | ||
}); | ||
} | ||
|
||
return navigator | ||
.requestMediaKeySystemAccess('org.w3.clearkey', keySystemConfig) | ||
.then(keySystemAccess => { | ||
return keySystemAccess.createMediaKeys(); | ||
}) | ||
.then(createdMediaKeys => { | ||
return video.setMediaKeys(createdMediaKeys); | ||
}) | ||
.then(_ => { | ||
let session = video.mediaKeys.createSession(); | ||
session.addEventListener('message', handleMessage, false); | ||
|
||
let encoder = new TextEncoder(); | ||
let initData = encoder.encode( | ||
JSON.stringify({'kids': [base64urlEncode(testKeyId)]})); | ||
session.generateRequest('keyids', initData).catch(e => { | ||
assert_unreached('Failed to generate a license request: ' + e); | ||
}); | ||
}) | ||
.catch(e => { | ||
assert_unreached('Failed to setup EME: ', e); | ||
}); | ||
} | ||
|
||
async function runEncryptedChunksTest(t) { | ||
let buffer = await vp9.buffer(); | ||
let [videoElement, mediaSource] = await getOpenMediaSource(t); | ||
|
||
// Makes early prototype demo playback easier to control manually. | ||
videoElement.controls = true; | ||
|
||
await setupEme(t, videoElement); | ||
|
||
let sourceBuffer = mediaSource.addSourceBuffer( | ||
{videoConfig: {codec: vp9.codec, encryptionScheme: 'cenc'}}); | ||
let nextTimestamp = 0; | ||
let frameDuration = 100 * 1000; // 100 milliseconds | ||
// forEach with async callbacks makes it too easy to have uncaught rejections | ||
// that don't fail this promise_test or even emit harness error. | ||
// Iterating explicitly instead. | ||
for (i = 0; i < vp9.frames.length; i++, nextTimestamp += frameDuration) { | ||
let frameMetadata = vp9.frames[i]; | ||
let frameData = | ||
new Uint8Array(buffer, frameMetadata.offset, frameMetadata.size); | ||
let encryptedFrameData = await window.crypto.subtle.encrypt( | ||
{name: 'AES-CTR', counter: testIV, length: 128}, testEncodedKey, | ||
frameData); | ||
|
||
await sourceBuffer.appendEncodedChunks(new EncodedVideoChunk({ | ||
type: frameMetadata.type, | ||
timestamp: nextTimestamp, | ||
duration: frameDuration, | ||
data: encryptedFrameData, | ||
decryptConfig: { | ||
encryptionScheme: 'cenc', | ||
keyId: testKeyId, | ||
initializationVector: testIV, | ||
subsampleLayout: [{clearBytes: 0, cypherBytes: frameMetadata.size}], | ||
} | ||
})); | ||
} | ||
|
||
mediaSource.endOfStream(); | ||
|
||
return new Promise((resolve, reject) => { | ||
videoElement.onended = resolve; | ||
videoElement.onerror = reject; | ||
videoElement.play(); | ||
}); | ||
} |
27 changes: 27 additions & 0 deletions
27
...r-webcodecs/tentative/mediasource-encrypted-webcodecs-appendencodedchunks-play.https.html
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,27 @@ | ||
<!DOCTYPE html> | ||
<html> | ||
<title>Test encoded chunk buffering and playback with EME + MediaSource</title> | ||
<script src="/resources/testharness.js"></script> | ||
<script src="/resources/testharnessreport.js"></script> | ||
<script src="/encrypted-media/util/utf8.js"></script> | ||
<script src="/encrypted-media/util/utils.js"></script> | ||
<script src="/encrypted-media/util/clearkey-messagehandler.js"></script> | ||
<script src="media-source-webcodecs-util.js"></script> | ||
<script> | ||
setup(() => { | ||
assert_implements( | ||
SourceBuffer.prototype.hasOwnProperty('appendEncodedChunks'), | ||
'SourceBuffer prototype hasOwnProperty "appendEncodedChunks", used ' + | ||
'here to feature detect MSE-for-WebCodecs implementation.'); | ||
}); | ||
|
||
promise_test(async t => { | ||
return runEncryptedChunksTest(t); | ||
}, "Buffer encrypted EncodedVideoChunks (VP9) one-by-one and play them with MSE"); | ||
|
||
// TODO(crbug.com/1144908): More exhaustive tests (multiple sourcebuffers, | ||
// varying append patterns, invalid append patterns; eventually more codecs, | ||
// out-of-order DTS, durations, etc.) | ||
|
||
</script> | ||
</html> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters