blob: 1083e5e094ed3ed57130f629405a53fa80c1d1f7 [file] [log] [blame]
// Copyright 2014 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include <memory>
#include "base/android/build_info.h"
#include "base/bind.h"
#include "base/bind_helpers.h"
#include "base/logging.h"
#include "base/memory/ptr_util.h"
#include "base/run_loop.h"
#include "base/test/scoped_task_environment.h"
#include "media/base/android/media_drm_bridge.h"
#include "media/base/provision_fetcher.h"
#include "testing/gmock/include/gmock/gmock.h"
#include "testing/gtest/include/gtest/gtest.h"
#include "third_party/widevine/cdm/widevine_cdm_common.h"
using ::testing::_;
using ::testing::StrictMock;
namespace media {
#define EXPECT_TRUE_IF_WIDEVINE_AVAILABLE(a) \
do { \
if (!MediaDrmBridge::IsKeySystemSupported(kWidevineKeySystem)) { \
VLOG(0) << "Widevine not supported on device."; \
EXPECT_FALSE(a); \
} else { \
EXPECT_TRUE(a); \
} \
} while (0)
const char kAudioMp4[] = "audio/mp4";
const char kVideoMp4[] = "video/mp4";
const char kAudioWebM[] = "audio/webm";
const char kVideoWebM[] = "video/webm";
const char kInvalidKeySystem[] = "invalid.keysystem";
const MediaDrmBridge::SecurityLevel kDefault =
MediaDrmBridge::SECURITY_LEVEL_DEFAULT;
const MediaDrmBridge::SecurityLevel kL1 = MediaDrmBridge::SECURITY_LEVEL_1;
const MediaDrmBridge::SecurityLevel kL3 = MediaDrmBridge::SECURITY_LEVEL_3;
const char kTestOrigin[] = "http://www.example.com";
const char kEmptyOrigin[] = "";
// Helper functions to avoid typing "MediaDrmBridge::" in tests.
static bool IsKeySystemSupportedWithType(
const std::string& key_system,
const std::string& container_mime_type) {
return MediaDrmBridge::IsKeySystemSupportedWithType(key_system,
container_mime_type);
}
namespace {
// This class is simply a wrapper that passes on calls to Retrieve() to another
// implementation that is provided to the constructor. This is created as
// MediaDrmBridge::CreateWithoutSessionSupport() requires the creation of a new
// ProvisionFetcher each time it needs to retrieve a license from the license
// server.
class ProvisionFetcherWrapper : public ProvisionFetcher {
public:
explicit ProvisionFetcherWrapper(ProvisionFetcher* provision_fetcher)
: provision_fetcher_(provision_fetcher) {}
// ProvisionFetcher implementation.
void Retrieve(const std::string& default_url,
const std::string& request_data,
const ResponseCB& response_cb) override {
provision_fetcher_->Retrieve(default_url, request_data, response_cb);
}
private:
ProvisionFetcher* provision_fetcher_;
};
} // namespace
class MediaDrmBridgeTest : public ProvisionFetcher, public testing::Test {
public:
MediaDrmBridgeTest() {}
void CreateWithoutSessionSupport(
const std::string& key_system,
const std::string& origin_id,
MediaDrmBridge::SecurityLevel security_level) {
media_drm_bridge_ = MediaDrmBridge::CreateWithoutSessionSupport(
key_system, origin_id, security_level,
base::BindRepeating(&MediaDrmBridgeTest::CreateProvisionFetcher,
base::Unretained(this)));
}
// ProvisionFetcher implementation. Done as a mock method so we can properly
// check if |media_drm_bridge_| invokes it or not.
MOCK_METHOD3(Retrieve,
void(const std::string& default_url,
const std::string& request_data,
const ResponseCB& response_cb));
void Provision() {
media_drm_bridge_->Provision(base::BindOnce(
&MediaDrmBridgeTest::ProvisioningDone, base::Unretained(this)));
}
// MediaDrmBridge::Provision() requires a callback that is called when
// provisioning completes and indicates if it succeeds or not.
MOCK_METHOD1(ProvisioningDone, void(bool));
protected:
scoped_refptr<MediaDrmBridge> media_drm_bridge_;
private:
std::unique_ptr<ProvisionFetcher> CreateProvisionFetcher() {
return std::make_unique<ProvisionFetcherWrapper>(this);
}
base::test::ScopedTaskEnvironment scoped_task_environment_;
};
TEST_F(MediaDrmBridgeTest, IsKeySystemSupported_Widevine) {
// TODO(xhwang): Enable when b/13564917 is fixed.
// EXPECT_TRUE_IF_AVAILABLE(
// IsKeySystemSupportedWithType(kWidevineKeySystem, kAudioMp4));
EXPECT_TRUE_IF_WIDEVINE_AVAILABLE(
IsKeySystemSupportedWithType(kWidevineKeySystem, kVideoMp4));
if (base::android::BuildInfo::GetInstance()->sdk_int() <=
base::android::SDK_VERSION_KITKAT) {
EXPECT_FALSE(IsKeySystemSupportedWithType(kWidevineKeySystem, kAudioWebM));
EXPECT_FALSE(IsKeySystemSupportedWithType(kWidevineKeySystem, kVideoWebM));
} else {
EXPECT_TRUE_IF_WIDEVINE_AVAILABLE(
IsKeySystemSupportedWithType(kWidevineKeySystem, kAudioWebM));
EXPECT_TRUE_IF_WIDEVINE_AVAILABLE(
IsKeySystemSupportedWithType(kWidevineKeySystem, kVideoWebM));
}
EXPECT_FALSE(IsKeySystemSupportedWithType(kWidevineKeySystem, "unknown"));
EXPECT_FALSE(IsKeySystemSupportedWithType(kWidevineKeySystem, "video/avi"));
EXPECT_FALSE(IsKeySystemSupportedWithType(kWidevineKeySystem, "audio/mp3"));
}
// Invalid key system is NOT supported regardless whether MediaDrm is available.
TEST_F(MediaDrmBridgeTest, IsKeySystemSupported_InvalidKeySystem) {
EXPECT_FALSE(MediaDrmBridge::IsKeySystemSupported(kInvalidKeySystem));
EXPECT_FALSE(IsKeySystemSupportedWithType(kInvalidKeySystem, kAudioMp4));
EXPECT_FALSE(IsKeySystemSupportedWithType(kInvalidKeySystem, kVideoMp4));
EXPECT_FALSE(IsKeySystemSupportedWithType(kInvalidKeySystem, kAudioWebM));
EXPECT_FALSE(IsKeySystemSupportedWithType(kInvalidKeySystem, kVideoWebM));
EXPECT_FALSE(IsKeySystemSupportedWithType(kInvalidKeySystem, "unknown"));
EXPECT_FALSE(IsKeySystemSupportedWithType(kInvalidKeySystem, "video/avi"));
EXPECT_FALSE(IsKeySystemSupportedWithType(kInvalidKeySystem, "audio/mp3"));
}
TEST_F(MediaDrmBridgeTest, CreateWithoutSessionSupport_Widevine) {
CreateWithoutSessionSupport(kWidevineKeySystem, kTestOrigin, kDefault);
EXPECT_TRUE_IF_WIDEVINE_AVAILABLE(media_drm_bridge_);
}
// Invalid key system is NOT supported regardless whether MediaDrm is available.
TEST_F(MediaDrmBridgeTest, CreateWithoutSessionSupport_InvalidKeySystem) {
CreateWithoutSessionSupport(kInvalidKeySystem, kTestOrigin, kDefault);
EXPECT_FALSE(media_drm_bridge_);
}
TEST_F(MediaDrmBridgeTest, CreateWithSecurityLevel_Widevine) {
// We test "L3" fully. But for "L1" we don't check the result as it depends on
// whether the test device supports "L1".
CreateWithoutSessionSupport(kWidevineKeySystem, kTestOrigin, kL3);
EXPECT_TRUE_IF_WIDEVINE_AVAILABLE(media_drm_bridge_);
CreateWithoutSessionSupport(kWidevineKeySystem, kTestOrigin, kL1);
}
TEST_F(MediaDrmBridgeTest, Provision_Widevine) {
// Only test this if Widevine is supported. Otherwise
// CreateWithoutSessionSupport() will return null and it can't be tested.
if (!MediaDrmBridge::IsKeySystemSupported(kWidevineKeySystem)) {
VLOG(0) << "Widevine not supported on device.";
return;
}
// Provisioning requires the use of origin isolated storage, so skip this test
// if it's not supported.
if (!MediaDrmBridge::IsPerOriginProvisioningSupported()) {
VLOG(0) << "Origin isolated storage not supported on device.";
return;
}
// On Android M occasionally MediaDrm.getProvisionRequest() throws and thus a
// request can not be generated. This has been fixed in Android N. As Android
// M is unlikely to be fixed, disabling this test if running on Android M.
// http://crbug.com/973096#c21
if (base::android::BuildInfo::GetInstance()->sdk_int() ==
base::android::SDK_VERSION_MARSHMALLOW) {
VLOG(0) << "Disabled for Android M.";
return;
}
// Calling Provision() later should trigger a provisioning request. As we
// can't pass the request to a license server,
// MockProvisionFetcher::Retrieve() simply drops the request and never
// responds. As a result, there should be a call to Retrieve() but not to
// ProvisioningDone() (CB passed to Provision()) as the provisioning never
// completes.
EXPECT_CALL(*this, Retrieve(_, _, _));
EXPECT_CALL(*this, ProvisioningDone(_)).Times(0);
// Create MediaDrmBridge. We only test "L3" as "L1" depends on whether the
// test device supports it or not.
CreateWithoutSessionSupport(kWidevineKeySystem, kTestOrigin, kL3);
EXPECT_TRUE(media_drm_bridge_);
Provision();
// ProvisioningDone() callback is executed asynchronously.
base::RunLoop().RunUntilIdle();
}
TEST_F(MediaDrmBridgeTest, Provision_Widevine_NoOrigin) {
// Only test this if Widevine is supported. Otherwise
// CreateWithoutSessionSupport() will return null and it can't be tested.
if (!MediaDrmBridge::IsKeySystemSupported(kWidevineKeySystem)) {
VLOG(0) << "Widevine not supported on device.";
return;
}
// Calling Provision() later should fail as the origin is not provided (or
// origin isolated storage is not available). No provisioning request should
// be attempted.
EXPECT_CALL(*this, ProvisioningDone(false));
// Create MediaDrmBridge. We only test "L3" as "L1" depends on whether the
// test device supports it or not.
CreateWithoutSessionSupport(kWidevineKeySystem, kEmptyOrigin, kL3);
EXPECT_TRUE(media_drm_bridge_);
Provision();
// ProvisioningDone() callback is executed asynchronously.
base::RunLoop().RunUntilIdle();
}
} // namespace media