Title: [210549] trunk
Revision
210549
Author
[email protected]
Date
2017-01-10 09:25:56 -0800 (Tue, 10 Jan 2017)

Log Message

Add support for MediaKeys.setServerCertificate()
https://bugs.webkit.org/show_bug.cgi?id=166772

Reviewed by Darin Adler.

Source/WebCore:

Test: media/encrypted-media/mock-MediaKeys-setServerCertificate.html

Implement MediaKeys::setServerCertificate(). This requires some additions
to CDM, CDMPrivate, and CDMInstance to support platform adoption and to
implement mock support for testing.

* Modules/encryptedmedia/CDM.cpp:
(WebCore::CDM::supportsServerCertificates):
* Modules/encryptedmedia/CDM.h:
* Modules/encryptedmedia/CDMInstance.h:
* Modules/encryptedmedia/CDMPrivate.h:
* Modules/encryptedmedia/MediaKeys.cpp:
(WebCore::MediaKeys::setServerCertificate):
* Modules/encryptedmedia/MediaKeys.h:
* testing/MockCDMFactory.cpp:
(WebCore::MockCDM::supportsServerCertificates):
(WebCore::MockCDMInstance::setServerCertificate):
* testing/MockCDMFactory.h:
(WebCore::MockCDMFactory::supportsServerCertificates):
(WebCore::MockCDMFactory::setSupportsServerCertificates):
* testing/MockCDMFactory.idl:

LayoutTests:

* media/encrypted-media/mock-MediaKeys-setServerCertificate-expected.txt: Added.
* media/encrypted-media/mock-MediaKeys-setServerCertificate.html: Added.

Modified Paths

Added Paths

Diff

Modified: trunk/LayoutTests/ChangeLog (210548 => 210549)


--- trunk/LayoutTests/ChangeLog	2017-01-10 17:18:51 UTC (rev 210548)
+++ trunk/LayoutTests/ChangeLog	2017-01-10 17:25:56 UTC (rev 210549)
@@ -1,3 +1,13 @@
+2017-01-10  Jer Noble  <[email protected]>
+
+        Add support for MediaKeys.setServerCertificate()
+        https://bugs.webkit.org/show_bug.cgi?id=166772
+
+        Reviewed by Darin Adler.
+
+        * media/encrypted-media/mock-MediaKeys-setServerCertificate-expected.txt: Added.
+        * media/encrypted-media/mock-MediaKeys-setServerCertificate.html: Added.
+
 2017-01-10  Youenn Fablet  <[email protected]>
 
         CachedScript cloning does not clone encodedSize

Added: trunk/LayoutTests/media/encrypted-media/mock-MediaKeys-setServerCertificate-expected.txt (0 => 210549)


--- trunk/LayoutTests/media/encrypted-media/mock-MediaKeys-setServerCertificate-expected.txt	                        (rev 0)
+++ trunk/LayoutTests/media/encrypted-media/mock-MediaKeys-setServerCertificate-expected.txt	2017-01-10 17:25:56 UTC (rev 210549)
@@ -0,0 +1,25 @@
+RUN(internals.initializeMockMediaSource())
+RUN(mock = internals.registerMockCDM())
+RUN(mock.supportedDataTypes = ["mock"])
+RUN(capabilities.initDataTypes = ["mock"])
+RUN(capabilities.videoCapabilities = [{ contentType: 'video/mock; codecs="mock"' }] )
+RUN(promise = navigator.requestMediaKeySystemAccess("org.webkit.mock", [capabilities]))
+Promise resolved OK
+
+RUN(promise = mediaKeySystemAccess.createMediaKeys())
+Promise resolved OK
+
+RUN(promise = mediaKeys.setServerCertificate(new ArrayBuffer()))
+Promise rejected correctly OK
+
+RUN(promise = mediaKeys.setServerCertificate(stringToUInt8Array("invalid")))
+Promise rejected correctly OK
+
+RUN(promise = mediaKeys.setServerCertificate(stringToUInt8Array("valid")))
+Promise resolved OK
+
+RUN(mock.supportsServerCertificates = false)
+RUN(promise = mediaKeys.setServerCertificate(stringToUInt8Array("valid")))
+Promise rejected correctly OK
+END OF TEST
+

Added: trunk/LayoutTests/media/encrypted-media/mock-MediaKeys-setServerCertificate.html (0 => 210549)


--- trunk/LayoutTests/media/encrypted-media/mock-MediaKeys-setServerCertificate.html	                        (rev 0)
+++ trunk/LayoutTests/media/encrypted-media/mock-MediaKeys-setServerCertificate.html	2017-01-10 17:25:56 UTC (rev 210549)
@@ -0,0 +1,111 @@
+<!DOCTYPE html>
+<html>
+<head>
+    <script src=""
+    <script type="text/_javascript_">
+    var mock;
+    var promise;
+    var mediaKeySystemAccess;
+    var mediaKeys;
+    var capabilities = {};
+
+    function doTest()
+    {
+        if (!window.internals) {
+            failTest("Internals is required for this test.")
+            return;
+        }
+
+        run('internals.initializeMockMediaSource()');
+        run('mock = internals.registerMockCDM()');
+        run('mock.supportedDataTypes = ["mock"]');
+        run('capabilities.initDataTypes = ["mock"]');
+        run(`capabilities.videoCapabilities = [{ contentType: 'video/mock; codecs="mock"' }] `);
+        run('promise = navigator.requestMediaKeySystemAccess("org.webkit.mock", [capabilities])');
+        promise.then(gotMediaKeySystemAccess).catch(failTest);
+    }
+
+    function next() {
+        if (!tests.length) {
+            mock.unregister();
+            endTest()
+            return;
+        }
+
+        var nextTest = tests.shift();
+        consoleWrite('');
+        nextTest();
+    }
+
+    function shouldResolve(promise) {
+        promise.then(mediaKeySystemAccess => {
+            logResult(Success, 'Promise resolved');
+            next();
+        }, () => {
+            logResult(Failed, 'Promise rejected');
+            next();
+        });
+    }
+
+    function shouldReject(promise) {
+        promise.then(() => {
+            logResult(Failed, 'Promise resolved incorrectly');
+            next();
+        }, exceptionCode => {
+            logResult(Success, 'Promise rejected correctly');
+            next();
+        });
+    }
+
+    function gotMediaKeySystemAccess(result) {
+        logResult(Success, 'Promise resolved');
+        mediaKeySystemAccess = result;
+        next();
+    }
+
+    function gotMediaKeys(result) {
+        logResult(Success, 'Promise resolved');
+        mediaKeys = result;
+        next();
+    }
+
+    function stringToUInt8Array(str)
+    {
+       var array = new Uint8Array(str.length);
+       for (var i=0; i<str.length; i++)
+            array[i] = str.charCodeAt(i);
+       return array;
+    }
+
+    tests = [
+        function() {
+            run('promise = mediaKeySystemAccess.createMediaKeys()');
+            promise.then(gotMediaKeys).catch(failTest);
+        },
+
+        function() {
+            run('promise = mediaKeys.setServerCertificate(new ArrayBuffer())');
+            shouldReject(promise);
+        },
+
+        function() {
+            run('promise = mediaKeys.setServerCertificate(stringToUInt8Array("invalid"))');
+            shouldReject(promise);
+        },
+
+        function() {
+            run('promise = mediaKeys.setServerCertificate(stringToUInt8Array("valid"))');
+            shouldResolve(promise);
+        },
+
+        function() {
+            run('mock.supportsServerCertificates = false');
+            run('promise = mediaKeys.setServerCertificate(stringToUInt8Array("valid"))');
+            shouldReject(promise);
+        },
+    ];
+    </script>
+</head>
+<body _onload_="doTest()">
+</body>
+</html>

Modified: trunk/LayoutTests/platform/mac/TestExpectations (210548 => 210549)


--- trunk/LayoutTests/platform/mac/TestExpectations	2017-01-10 17:18:51 UTC (rev 210548)
+++ trunk/LayoutTests/platform/mac/TestExpectations	2017-01-10 17:25:56 UTC (rev 210549)
@@ -1467,6 +1467,7 @@
 # New Encrypted Media API not enabled on Mac
 media/encrypted-media/mock-navigator-requestMediaKeySystemAccess.html [ Skip ]
 media/encrypted-media/mock-MediaKeySystemAccess.html [ Skip ]
+media/encrypted-media/mock-MediaKeys-setServerCertificate.html [ Skip ]
 
 webkit.org/b/166025 http/tests/fetch/fetching-same-resource-with-diffferent-options.html [ Pass Failure ]
 

Modified: trunk/Source/WebCore/ChangeLog (210548 => 210549)


--- trunk/Source/WebCore/ChangeLog	2017-01-10 17:18:51 UTC (rev 210548)
+++ trunk/Source/WebCore/ChangeLog	2017-01-10 17:25:56 UTC (rev 210549)
@@ -1,3 +1,32 @@
+2017-01-10  Jer Noble  <[email protected]>
+
+        Add support for MediaKeys.setServerCertificate()
+        https://bugs.webkit.org/show_bug.cgi?id=166772
+
+        Reviewed by Darin Adler.
+
+        Test: media/encrypted-media/mock-MediaKeys-setServerCertificate.html
+
+        Implement MediaKeys::setServerCertificate(). This requires some additions
+        to CDM, CDMPrivate, and CDMInstance to support platform adoption and to
+        implement mock support for testing.
+
+        * Modules/encryptedmedia/CDM.cpp:
+        (WebCore::CDM::supportsServerCertificates):
+        * Modules/encryptedmedia/CDM.h:
+        * Modules/encryptedmedia/CDMInstance.h:
+        * Modules/encryptedmedia/CDMPrivate.h:
+        * Modules/encryptedmedia/MediaKeys.cpp:
+        (WebCore::MediaKeys::setServerCertificate):
+        * Modules/encryptedmedia/MediaKeys.h:
+        * testing/MockCDMFactory.cpp:
+        (WebCore::MockCDM::supportsServerCertificates):
+        (WebCore::MockCDMInstance::setServerCertificate):
+        * testing/MockCDMFactory.h:
+        (WebCore::MockCDMFactory::supportsServerCertificates):
+        (WebCore::MockCDMFactory::setSupportsServerCertificates):
+        * testing/MockCDMFactory.idl:
+
 2017-01-10  Youenn Fablet  <[email protected]>
 
         CachedScript cloning does not clone encodedSize

Modified: trunk/Source/WebCore/Modules/encryptedmedia/CDM.cpp (210548 => 210549)


--- trunk/Source/WebCore/Modules/encryptedmedia/CDM.cpp	2017-01-10 17:18:51 UTC (rev 210548)
+++ trunk/Source/WebCore/Modules/encryptedmedia/CDM.cpp	2017-01-10 17:25:56 UTC (rev 210549)
@@ -624,6 +624,11 @@
     return m_private->createInstance();
 }
 
+bool CDM::supportsServerCertificates() const
+{
+    return m_private && m_private->supportsServerCertificates();
 }
 
+}
+
 #endif

Modified: trunk/Source/WebCore/Modules/encryptedmedia/CDM.h (210548 => 210549)


--- trunk/Source/WebCore/Modules/encryptedmedia/CDM.h	2017-01-10 17:18:51 UTC (rev 210548)
+++ trunk/Source/WebCore/Modules/encryptedmedia/CDM.h	2017-01-10 17:25:56 UTC (rev 210549)
@@ -71,6 +71,7 @@
 
     void loadAndInitialize();
     std::unique_ptr<CDMInstance> createInstance();
+    bool supportsServerCertificates() const;
 
 private:
     CDM(Document&, const String& keySystem);

Modified: trunk/Source/WebCore/Modules/encryptedmedia/CDMInstance.h (210548 => 210549)


--- trunk/Source/WebCore/Modules/encryptedmedia/CDMInstance.h	2017-01-10 17:18:51 UTC (rev 210548)
+++ trunk/Source/WebCore/Modules/encryptedmedia/CDMInstance.h	2017-01-10 17:25:56 UTC (rev 210549)
@@ -29,6 +29,10 @@
 
 #include <wtf/Forward.h>
 
+namespace JSC {
+class ArrayBuffer;
+}
+
 namespace WebCore {
 
 struct MediaKeySystemConfiguration;
@@ -45,6 +49,7 @@
     virtual SuccessValue initializeWithConfiguration(const MediaKeySystemConfiguration&) = 0;
     virtual SuccessValue setDistinctiveIdentifiersAllowed(bool) = 0;
     virtual SuccessValue setPersistentStateAllowed(bool) = 0;
+    virtual SuccessValue setServerCertificate(JSC::ArrayBuffer&) = 0;
 };
 
 }

Modified: trunk/Source/WebCore/Modules/encryptedmedia/CDMPrivate.h (210548 => 210549)


--- trunk/Source/WebCore/Modules/encryptedmedia/CDMPrivate.h	2017-01-10 17:18:51 UTC (rev 210548)
+++ trunk/Source/WebCore/Modules/encryptedmedia/CDMPrivate.h	2017-01-10 17:25:56 UTC (rev 210549)
@@ -51,6 +51,7 @@
     virtual bool distinctiveIdentifiersAreUniquePerOriginAndClearable(const MediaKeySystemConfiguration&) = 0;
     virtual std::unique_ptr<CDMInstance> createInstance() = 0;
     virtual void loadAndInitialize() = 0;
+    virtual bool supportsServerCertificates() const = 0;
 };
 
 }

Modified: trunk/Source/WebCore/Modules/encryptedmedia/MediaKeySystemAccess.cpp (210548 => 210549)


--- trunk/Source/WebCore/Modules/encryptedmedia/MediaKeySystemAccess.cpp	2017-01-10 17:18:51 UTC (rev 210548)
+++ trunk/Source/WebCore/Modules/encryptedmedia/MediaKeySystemAccess.cpp	2017-01-10 17:25:56 UTC (rev 210549)
@@ -74,7 +74,7 @@
         m_implementation->loadAndInitialize();
 
         // 2.5. Let instance be a new instance of the Key System implementation represented by this object's cdm implementation value.
-        std::unique_ptr<CDMInstance> instance = m_implementation->createInstance();
+        auto instance = m_implementation->createInstance();
         if (!instance) {
             promise->reject(INVALID_STATE_ERR);
             return;

Modified: trunk/Source/WebCore/Modules/encryptedmedia/MediaKeys.cpp (210548 => 210549)


--- trunk/Source/WebCore/Modules/encryptedmedia/MediaKeys.cpp	2017-01-10 17:18:51 UTC (rev 210548)
+++ trunk/Source/WebCore/Modules/encryptedmedia/MediaKeys.cpp	2017-01-10 17:25:56 UTC (rev 210549)
@@ -35,6 +35,7 @@
 #include "CDMInstance.h"
 #include "MediaKeySession.h"
 #include "NotImplemented.h"
+#include <runtime/ArrayBuffer.h>
 
 namespace WebCore {
 
@@ -55,9 +56,44 @@
     return Exception { NOT_SUPPORTED_ERR };
 }
 
-void MediaKeys::setServerCertificate(const BufferSource&, Ref<DeferredPromise>&&)
+void MediaKeys::setServerCertificate(const BufferSource& serverCertificate, Ref<DeferredPromise>&& promise)
 {
-    notImplemented();
+    // https://w3c.github.io/encrypted-media/#dom-mediakeys-setservercertificate
+    // W3C Editor's Draft 09 November 2016
+
+    // When this method is invoked, the user agent must run the following steps:
+    // 1. If the Key System implementation represented by this object's cdm implementation value does not support
+    //    server certificates, return a promise resolved with false.
+    if (!m_implementation->supportsServerCertificates()) {
+        promise->reject(false);
+        return;
+    }
+
+    // 2. If serverCertificate is an empty array, return a promise rejected with a new a newly created TypeError.
+    if (!serverCertificate.length()) {
+        promise->reject(TypeError);
+        return;
+    }
+
+    // 3. Let certificate be a copy of the contents of the serverCertificate parameter.
+    auto certificate = ArrayBuffer::create(serverCertificate.data(), serverCertificate.length());
+
+    // 4. Let promise be a new promise.
+    // 5. Run the following steps in parallel:
+
+    m_taskQueue.enqueueTask([this, certificate = WTFMove(certificate), promise = WTFMove(promise)] () mutable {
+        // 5.1. Use this object's cdm instance to process certificate.
+        if (m_instance->setServerCertificate(certificate) == CDMInstance::Failed) {
+            // 5.2. If the preceding step failed, resolve promise with a new DOMException whose name is the appropriate error name.
+            promise->reject(INVALID_STATE_ERR);
+            return;
+        }
+
+        // 5.1. Resolve promise with true.
+        promise->resolve<IDLBoolean>(true);
+    });
+
+    // 6. Return promise.
 }
 
 } // namespace WebCore

Modified: trunk/Source/WebCore/Modules/encryptedmedia/MediaKeys.h (210548 => 210549)


--- trunk/Source/WebCore/Modules/encryptedmedia/MediaKeys.h	2017-01-10 17:18:51 UTC (rev 210548)
+++ trunk/Source/WebCore/Modules/encryptedmedia/MediaKeys.h	2017-01-10 17:25:56 UTC (rev 210549)
@@ -31,6 +31,7 @@
 #if ENABLE(ENCRYPTED_MEDIA)
 
 #include "ExceptionOr.h"
+#include "GenericTaskQueue.h"
 #include "JSDOMPromise.h"
 #include "MediaKeySessionType.h"
 #include <wtf/Ref.h>
@@ -66,6 +67,7 @@
     Vector<MediaKeySessionType> m_supportedSessionTypes;
     Ref<CDM> m_implementation;
     std::unique_ptr<CDMInstance> m_instance;
+    GenericTaskQueue<Timer> m_taskQueue;
 };
 
 } // namespace WebCore

Modified: trunk/Source/WebCore/testing/MockCDMFactory.cpp (210548 => 210549)


--- trunk/Source/WebCore/testing/MockCDMFactory.cpp	2017-01-10 17:18:51 UTC (rev 210548)
+++ trunk/Source/WebCore/testing/MockCDMFactory.cpp	2017-01-10 17:25:56 UTC (rev 210549)
@@ -28,7 +28,8 @@
 
 #if ENABLE(ENCRYPTED_MEDIA)
 
-#include <wtf/NeverDestroyed.h>
+#include <runtime/ArrayBuffer.h>
+#include <wtf/text/StringView.h>
 
 namespace WebCore {
 
@@ -132,6 +133,11 @@
     // No-op.
 }
 
+bool MockCDM::supportsServerCertificates() const
+{
+    return m_factory && m_factory->supportsServerCertificates();
+}
+
 MockCDMInstance::MockCDMInstance(WeakPtr<MockCDM> cdm)
     : m_cdm(cdm)
 {
@@ -150,7 +156,7 @@
     if (m_distinctiveIdentifiersAllowed == distinctiveIdentifiersAllowed)
         return Succeeded;
 
-    MockCDMFactory* factory = m_cdm ? m_cdm->factory() : nullptr;
+    auto* factory = m_cdm ? m_cdm->factory() : nullptr;
 
     if (!factory || (!distinctiveIdentifiersAllowed && factory->distinctiveIdentifiersRequirement() == MediaKeysRequirement::Required))
         return Failed;
@@ -173,6 +179,15 @@
     return Succeeded;
 }
 
+CDMInstance::SuccessValue MockCDMInstance::setServerCertificate(ArrayBuffer& certificate)
+{
+    StringView certificateStringView(static_cast<const LChar*>(certificate.data()), certificate.byteLength());
+
+    if (equalIgnoringASCIICase(certificateStringView, "valid"))
+        return Succeeded;
+    return Failed;
 }
 
+}
+
 #endif

Modified: trunk/Source/WebCore/testing/MockCDMFactory.h (210548 => 210549)


--- trunk/Source/WebCore/testing/MockCDMFactory.h	2017-01-10 17:18:51 UTC (rev 210548)
+++ trunk/Source/WebCore/testing/MockCDMFactory.h	2017-01-10 17:25:56 UTC (rev 210549)
@@ -57,6 +57,9 @@
     bool canCreateInstances() const { return m_canCreateInstances; }
     void setCanCreateInstances(bool flag) { m_canCreateInstances = flag; }
 
+    bool supportsServerCertificates() const { return m_supportsServerCertificates; }
+    void setSupportsServerCertificates(bool flag) { m_supportsServerCertificates = flag; }
+
     void unregister();
 
 private:
@@ -70,6 +73,7 @@
     Vector<String> m_supportedRobustness;
     bool m_registered { true };
     bool m_canCreateInstances { true };
+    bool m_supportsServerCertificates { true };
     WeakPtrFactory<MockCDMFactory> m_weakPtrFactory;
 };
 
@@ -92,6 +96,7 @@
     bool distinctiveIdentifiersAreUniquePerOriginAndClearable(const MediaKeySystemConfiguration&) final;
     std::unique_ptr<CDMInstance> createInstance() final;
     void loadAndInitialize() final;
+    bool supportsServerCertificates() const final;
 
     WeakPtr<MockCDMFactory> m_factory;
     WeakPtrFactory<MockCDM> m_weakPtrFactory;
@@ -105,6 +110,7 @@
     SuccessValue initializeWithConfiguration(const MediaKeySystemConfiguration&) final;
     SuccessValue setDistinctiveIdentifiersAllowed(bool) final;
     SuccessValue setPersistentStateAllowed(bool) final;
+    SuccessValue setServerCertificate(JSC::ArrayBuffer&) final;
 
     WeakPtr<MockCDM> m_cdm;
     bool m_distinctiveIdentifiersAllowed { true };

Modified: trunk/Source/WebCore/testing/MockCDMFactory.idl (210548 => 210549)


--- trunk/Source/WebCore/testing/MockCDMFactory.idl	2017-01-10 17:18:51 UTC (rev 210548)
+++ trunk/Source/WebCore/testing/MockCDMFactory.idl	2017-01-10 17:25:56 UTC (rev 210549)
@@ -33,6 +33,7 @@
     attribute MediaKeysRequirement distinctiveIdentifiersRequirement;
     attribute MediaKeysRequirement persistentStateRequirement;
     attribute boolean canCreateInstances;
+    attribute boolean supportsServerCertificates;
 
     void unregister();
 };
_______________________________________________
webkit-changes mailing list
[email protected]
https://lists.webkit.org/mailman/listinfo/webkit-changes

Reply via email to