blob: c4b69842f51525b984bbd097f792df20172b64a2 [file] [log] [blame]
/*
* Copyright (C) 2016 Metrological Group B.V.
* Copyright (C) 2016 Igalia S.L.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above
* copyright notice, this list of conditions and the following
* disclaimer in the documentation and/or other materials provided
* with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
* HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include "config.h"
#include "MediaKeys.h"
#if ENABLE(ENCRYPTED_MEDIA)
#include "CDM.h"
#include "CDMClient.h"
#include "CDMInstance.h"
#include "Document.h"
#include "EventLoop.h"
#include "JSDOMPromiseDeferred.h"
#include "Logging.h"
#include "MediaKeySession.h"
#include "SharedBuffer.h"
#include <wtf/Logger.h>
#include <wtf/LoggerHelper.h>
namespace WebCore {
#if !RELEASE_LOG_DISABLED
static WTFLogChannel& logChannel() { return LogEME; }
static const char* logClassName() { return "MediaKeys"; }
#endif
MediaKeys::MediaKeys(Document& document, bool useDistinctiveIdentifier, bool persistentStateAllowed, const Vector<MediaKeySessionType>& supportedSessionTypes, Ref<CDM>&& implementation, Ref<CDMInstance>&& instance)
: m_useDistinctiveIdentifier(useDistinctiveIdentifier)
, m_persistentStateAllowed(persistentStateAllowed)
, m_supportedSessionTypes(supportedSessionTypes)
, m_implementation(WTFMove(implementation))
, m_instance(WTFMove(instance))
#if !RELEASE_LOG_DISABLED
, m_logger(document.logger())
, m_logIdentifier(LoggerHelper::uniqueLogIdentifier())
#endif
{
#if !RELEASE_LOG_DISABLED
m_instance->setLogger(document.logger(), m_logIdentifier);
#else
UNUSED_PARAM(document);
#endif
m_instance->setClient(makeWeakPtr(this));
}
MediaKeys::~MediaKeys() = default;
ExceptionOr<Ref<MediaKeySession>> MediaKeys::createSession(Document& document, MediaKeySessionType sessionType)
{
// https://w3c.github.io/encrypted-media/#dom-mediakeys-setservercertificate
// W3C Editor's Draft 09 November 2016
auto identifier = LOGIDENTIFIER;
INFO_LOG(identifier, "EME - check if a new session can be created");
// When this method is invoked, the user agent must run the following steps:
// 1. If this object's supported session types value does not contain sessionType, throw [WebIDL] a NotSupportedError.
if (!m_supportedSessionTypes.contains(sessionType)) {
INFO_LOG(identifier, "Exception: unsupported sessionType: ", sessionType);
return Exception(NotSupportedError);
}
// 2. If the implementation does not support MediaKeySession operations in the current state, throw [WebIDL] an InvalidStateError.
if (!m_implementation->supportsSessions()) {
INFO_LOG(identifier, "Exception: implementation does not support sessions");
return Exception(InvalidStateError);
}
auto instanceSession = m_instance->createSession();
if (!instanceSession) {
INFO_LOG(identifier, "Exception: could not create session");
return Exception(InvalidStateError);
}
// 3. Let session be a new MediaKeySession object, and initialize it as follows:
// NOTE: Continued in MediaKeySession.
// 4. Return session.
auto session = MediaKeySession::create(document, makeWeakPtr(*this), sessionType, m_useDistinctiveIdentifier, m_implementation.copyRef(), instanceSession.releaseNonNull());
INFO_LOG(identifier, "Created session");
m_sessions.append(session.copyRef());
return session;
}
void MediaKeys::setServerCertificate(const BufferSource& serverCertificate, Ref<DeferredPromise>&& promise)
{
// https://w3c.github.io/encrypted-media/#dom-mediakeys-setservercertificate
// W3C Editor's Draft 09 November 2016
auto identifier = LOGIDENTIFIER;
// When this method is invoked, the user agent must run the following steps:
// 1. If the Key System implementation represented by this object's cdm implementation value does not support
// server certificates, return a promise resolved with false.
if (!m_implementation->supportsServerCertificates()) {
INFO_LOG(identifier, "Rejected: !supportsServerCertificates()");
promise->resolve<IDLBoolean>(false);
return;
}
// 2. If serverCertificate is an empty array, return a promise rejected with a new a newly created TypeError.
if (!serverCertificate.length()) {
INFO_LOG(identifier, "Rejected: empty serverCertificate");
promise->reject(TypeError);
return;
}
// 3. Let certificate be a copy of the contents of the serverCertificate parameter.
auto certificate = SharedBuffer::create(serverCertificate.data(), serverCertificate.length());
// 4. Let promise be a new promise.
// 5. Run the following steps in parallel:
// 5.1. Use this object's cdm instance to process certificate.
m_instance->setServerCertificate(WTFMove(certificate), [this, protectedThis = makeRef(*this), promise = WTFMove(promise), identifier = WTFMove(identifier)] (auto success) {
// 5.2. If the preceding step failed, resolve promise with a new DOMException whose name is the appropriate error name.
// 5.1. [Else,] Resolve promise with true.
if (success == CDMInstance::Failed) {
INFO_LOG(identifier, "::task() - Rejected, setServerCertificate() failed");
promise->reject(InvalidStateError);
return;
}
INFO_LOG(identifier, "::task() - Resolved");
promise->resolve<IDLBoolean>(true);
});
// 6. Return promise.
}
void MediaKeys::attachCDMClient(CDMClient& client)
{
ASSERT(!m_cdmClients.contains(client));
m_cdmClients.add(client);
}
void MediaKeys::detachCDMClient(CDMClient& client)
{
ASSERT(m_cdmClients.contains(client));
m_cdmClients.remove(client);
}
void MediaKeys::attemptToResumePlaybackOnClients()
{
for (auto& cdmClient : m_cdmClients)
cdmClient.cdmClientAttemptToResumePlaybackIfNecessary();
}
bool MediaKeys::hasOpenSessions() const
{
return std::any_of(m_sessions.begin(), m_sessions.end(),
[](auto& session) {
return !session->isClosed();
});
}
void MediaKeys::unrequestedInitializationDataReceived(const String& initDataType, Ref<SharedBuffer>&& initData)
{
for (auto& cdmClient : m_cdmClients)
cdmClient.cdmClientUnrequestedInitializationDataReceived(initDataType, initData.copyRef());
}
#if !RELEASE_LOG_DISABLED
const void* MediaKeys::nextChildIdentifier() const
{
return LoggerHelper::childLogIdentifier(m_logIdentifier, ++m_childIdentifierSeed);
}
#endif
} // namespace WebCore
#endif // ENABLE(ENCRYPTED_MEDIA)