Source: lib/media/drm_engine.js

  1. /*! @license
  2. * Shaka Player
  3. * Copyright 2016 Google LLC
  4. * SPDX-License-Identifier: Apache-2.0
  5. */
  6. goog.provide('shaka.media.DrmEngine');
  7. goog.require('goog.asserts');
  8. goog.require('shaka.log');
  9. goog.require('shaka.net.NetworkingEngine');
  10. goog.require('shaka.transmuxer.TransmuxerEngine');
  11. goog.require('shaka.util.BufferUtils');
  12. goog.require('shaka.util.Destroyer');
  13. goog.require('shaka.util.DrmUtils');
  14. goog.require('shaka.util.Error');
  15. goog.require('shaka.util.EventManager');
  16. goog.require('shaka.util.FakeEvent');
  17. goog.require('shaka.util.IDestroyable');
  18. goog.require('shaka.util.Iterables');
  19. goog.require('shaka.util.Lazy');
  20. goog.require('shaka.util.ManifestParserUtils');
  21. goog.require('shaka.util.MapUtils');
  22. goog.require('shaka.util.MimeUtils');
  23. goog.require('shaka.util.ObjectUtils');
  24. goog.require('shaka.util.Platform');
  25. goog.require('shaka.util.Pssh');
  26. goog.require('shaka.util.PublicPromise');
  27. goog.require('shaka.util.StreamUtils');
  28. goog.require('shaka.util.StringUtils');
  29. goog.require('shaka.util.Timer');
  30. goog.require('shaka.util.TXml');
  31. goog.require('shaka.util.Uint8ArrayUtils');
  32. /** @implements {shaka.util.IDestroyable} */
  33. shaka.media.DrmEngine = class {
  34. /**
  35. * @param {shaka.media.DrmEngine.PlayerInterface} playerInterface
  36. */
  37. constructor(playerInterface) {
  38. /** @private {?shaka.media.DrmEngine.PlayerInterface} */
  39. this.playerInterface_ = playerInterface;
  40. /** @private {!Set.<string>} */
  41. this.supportedTypes_ = new Set();
  42. /** @private {MediaKeys} */
  43. this.mediaKeys_ = null;
  44. /** @private {HTMLMediaElement} */
  45. this.video_ = null;
  46. /** @private {boolean} */
  47. this.initialized_ = false;
  48. /** @private {boolean} */
  49. this.initializedForStorage_ = false;
  50. /** @private {number} */
  51. this.licenseTimeSeconds_ = 0;
  52. /** @private {?shaka.extern.DrmInfo} */
  53. this.currentDrmInfo_ = null;
  54. /** @private {shaka.util.EventManager} */
  55. this.eventManager_ = new shaka.util.EventManager();
  56. /**
  57. * @private {!Map.<MediaKeySession,
  58. * shaka.media.DrmEngine.SessionMetaData>}
  59. */
  60. this.activeSessions_ = new Map();
  61. /**
  62. * @private {!Map<string,
  63. * {initData: ?Uint8Array, initDataType: ?string}>}
  64. */
  65. this.storedPersistentSessions_ = new Map();
  66. /** @private {!shaka.util.PublicPromise} */
  67. this.allSessionsLoaded_ = new shaka.util.PublicPromise();
  68. /** @private {?shaka.extern.DrmConfiguration} */
  69. this.config_ = null;
  70. /** @private {function(!shaka.util.Error)} */
  71. this.onError_ = (err) => {
  72. if (err.severity == shaka.util.Error.Severity.CRITICAL) {
  73. this.allSessionsLoaded_.reject(err);
  74. }
  75. playerInterface.onError(err);
  76. };
  77. /**
  78. * The most recent key status information we have.
  79. * We may not have announced this information to the outside world yet,
  80. * which we delay to batch up changes and avoid spurious "missing key"
  81. * errors.
  82. * @private {!Map.<string, string>}
  83. */
  84. this.keyStatusByKeyId_ = new Map();
  85. /**
  86. * The key statuses most recently announced to other classes.
  87. * We may have more up-to-date information being collected in
  88. * this.keyStatusByKeyId_, which has not been batched up and released yet.
  89. * @private {!Map.<string, string>}
  90. */
  91. this.announcedKeyStatusByKeyId_ = new Map();
  92. /** @private {shaka.util.Timer} */
  93. this.keyStatusTimer_ =
  94. new shaka.util.Timer(() => this.processKeyStatusChanges_());
  95. /** @private {boolean} */
  96. this.usePersistentLicenses_ = false;
  97. /** @private {!Array.<!MediaKeyMessageEvent>} */
  98. this.mediaKeyMessageEvents_ = [];
  99. /** @private {boolean} */
  100. this.initialRequestsSent_ = false;
  101. /** @private {?shaka.util.Timer} */
  102. this.expirationTimer_ = new shaka.util.Timer(() => {
  103. this.pollExpiration_();
  104. });
  105. // Add a catch to the Promise to avoid console logs about uncaught errors.
  106. const noop = () => {};
  107. this.allSessionsLoaded_.catch(noop);
  108. /** @const {!shaka.util.Destroyer} */
  109. this.destroyer_ = new shaka.util.Destroyer(() => this.destroyNow_());
  110. /** @private {boolean} */
  111. this.srcEquals_ = false;
  112. /** @private {Promise} */
  113. this.mediaKeysAttached_ = null;
  114. /** @private {?shaka.extern.InitDataOverride} */
  115. this.manifestInitData_ = null;
  116. }
  117. /** @override */
  118. destroy() {
  119. return this.destroyer_.destroy();
  120. }
  121. /**
  122. * Destroy this instance of DrmEngine. This assumes that all other checks
  123. * about "if it should" have passed.
  124. *
  125. * @private
  126. */
  127. async destroyNow_() {
  128. // |eventManager_| should only be |null| after we call |destroy|. Destroy it
  129. // first so that we will stop responding to events.
  130. this.eventManager_.release();
  131. this.eventManager_ = null;
  132. // Since we are destroying ourselves, we don't want to react to the "all
  133. // sessions loaded" event.
  134. this.allSessionsLoaded_.reject();
  135. // Stop all timers. This will ensure that they do not start any new work
  136. // while we are destroying ourselves.
  137. this.expirationTimer_.stop();
  138. this.expirationTimer_ = null;
  139. this.keyStatusTimer_.stop();
  140. this.keyStatusTimer_ = null;
  141. // Close all open sessions.
  142. await this.closeOpenSessions_();
  143. // |video_| will be |null| if we never attached to a video element.
  144. if (this.video_) {
  145. // Webkit EME implementation requires the src to be defined to clear
  146. // the MediaKeys.
  147. if (!shaka.util.Platform.isMediaKeysPolyfilled('webkit')) {
  148. goog.asserts.assert(!this.video_.src,
  149. 'video src must be removed first!');
  150. }
  151. try {
  152. await this.video_.setMediaKeys(null);
  153. } catch (error) {
  154. // Ignore any failures while removing media keys from the video element.
  155. shaka.log.debug(`DrmEngine.destroyNow_ exception`, error);
  156. }
  157. this.video_ = null;
  158. }
  159. // Break references to everything else we hold internally.
  160. this.currentDrmInfo_ = null;
  161. this.supportedTypes_.clear();
  162. this.mediaKeys_ = null;
  163. this.storedPersistentSessions_ = new Map();
  164. this.config_ = null;
  165. this.onError_ = () => {};
  166. this.playerInterface_ = null;
  167. this.srcEquals_ = false;
  168. this.mediaKeysAttached_ = null;
  169. }
  170. /**
  171. * Called by the Player to provide an updated configuration any time it
  172. * changes.
  173. * Must be called at least once before init().
  174. *
  175. * @param {shaka.extern.DrmConfiguration} config
  176. */
  177. configure(config) {
  178. this.config_ = config;
  179. if (this.expirationTimer_) {
  180. this.expirationTimer_.tickEvery(
  181. /* seconds= */ this.config_.updateExpirationTime);
  182. }
  183. }
  184. /**
  185. * @param {!boolean} value
  186. */
  187. setSrcEquals(value) {
  188. this.srcEquals_ = value;
  189. }
  190. /**
  191. * Initialize the drm engine for storing and deleting stored content.
  192. *
  193. * @param {!Array.<shaka.extern.Variant>} variants
  194. * The variants that are going to be stored.
  195. * @param {boolean} usePersistentLicenses
  196. * Whether or not persistent licenses should be requested and stored for
  197. * |manifest|.
  198. * @return {!Promise}
  199. */
  200. initForStorage(variants, usePersistentLicenses) {
  201. this.initializedForStorage_ = true;
  202. // There are two cases for this call:
  203. // 1. We are about to store a manifest - in that case, there are no offline
  204. // sessions and therefore no offline session ids.
  205. // 2. We are about to remove the offline sessions for this manifest - in
  206. // that case, we don't need to know about them right now either as
  207. // we will be told which ones to remove later.
  208. this.storedPersistentSessions_ = new Map();
  209. // What we really need to know is whether or not they are expecting to use
  210. // persistent licenses.
  211. this.usePersistentLicenses_ = usePersistentLicenses;
  212. return this.init_(variants);
  213. }
  214. /**
  215. * Initialize the drm engine for playback operations.
  216. *
  217. * @param {!Array.<shaka.extern.Variant>} variants
  218. * The variants that we want to support playing.
  219. * @param {!Array.<string>} offlineSessionIds
  220. * @return {!Promise}
  221. */
  222. initForPlayback(variants, offlineSessionIds) {
  223. this.storedPersistentSessions_ = new Map();
  224. for (const sessionId of offlineSessionIds) {
  225. this.storedPersistentSessions_.set(
  226. sessionId, {initData: null, initDataType: null});
  227. }
  228. for (const metadata of this.config_.persistentSessionsMetadata) {
  229. this.storedPersistentSessions_.set(
  230. metadata.sessionId,
  231. {initData: metadata.initData, initDataType: metadata.initDataType});
  232. }
  233. this.usePersistentLicenses_ = this.storedPersistentSessions_.size > 0;
  234. return this.init_(variants);
  235. }
  236. /**
  237. * Initializes the drm engine for removing persistent sessions. Only the
  238. * removeSession(s) methods will work correctly, creating new sessions may not
  239. * work as desired.
  240. *
  241. * @param {string} keySystem
  242. * @param {string} licenseServerUri
  243. * @param {Uint8Array} serverCertificate
  244. * @param {!Array.<MediaKeySystemMediaCapability>} audioCapabilities
  245. * @param {!Array.<MediaKeySystemMediaCapability>} videoCapabilities
  246. * @return {!Promise}
  247. */
  248. initForRemoval(keySystem, licenseServerUri, serverCertificate,
  249. audioCapabilities, videoCapabilities) {
  250. /** @type {!Map.<string, MediaKeySystemConfiguration>} */
  251. const configsByKeySystem = new Map();
  252. /** @type {MediaKeySystemConfiguration} */
  253. const config = {
  254. audioCapabilities: audioCapabilities,
  255. videoCapabilities: videoCapabilities,
  256. distinctiveIdentifier: 'optional',
  257. persistentState: 'required',
  258. sessionTypes: ['persistent-license'],
  259. label: keySystem, // Tracked by us, ignored by EME.
  260. };
  261. // TODO: refactor, don't stick drmInfos onto MediaKeySystemConfiguration
  262. config['drmInfos'] = [{ // Non-standard attribute, ignored by EME.
  263. keySystem: keySystem,
  264. licenseServerUri: licenseServerUri,
  265. distinctiveIdentifierRequired: false,
  266. persistentStateRequired: true,
  267. audioRobustness: '', // Not required by queryMediaKeys_
  268. videoRobustness: '', // Same
  269. serverCertificate: serverCertificate,
  270. serverCertificateUri: '',
  271. initData: null,
  272. keyIds: null,
  273. }];
  274. configsByKeySystem.set(keySystem, config);
  275. return this.queryMediaKeys_(configsByKeySystem,
  276. /* variants= */ []);
  277. }
  278. /**
  279. * Negotiate for a key system and set up MediaKeys.
  280. * This will assume that both |usePersistentLicences_| and
  281. * |storedPersistentSessions_| have been properly set.
  282. *
  283. * @param {!Array.<shaka.extern.Variant>} variants
  284. * The variants that we expect to operate with during the drm engine's
  285. * lifespan of the drm engine.
  286. * @return {!Promise} Resolved if/when a key system has been chosen.
  287. * @private
  288. */
  289. async init_(variants) {
  290. goog.asserts.assert(this.config_,
  291. 'DrmEngine configure() must be called before init()!');
  292. // ClearKey config overrides the manifest DrmInfo if present. The variants
  293. // are modified so that filtering in Player still works.
  294. // This comes before hadDrmInfo because it influences the value of that.
  295. /** @type {?shaka.extern.DrmInfo} */
  296. const clearKeyDrmInfo = this.configureClearKey_();
  297. if (clearKeyDrmInfo) {
  298. for (const variant of variants) {
  299. if (variant.video) {
  300. variant.video.drmInfos = [clearKeyDrmInfo];
  301. }
  302. if (variant.audio) {
  303. variant.audio.drmInfos = [clearKeyDrmInfo];
  304. }
  305. }
  306. }
  307. const hadDrmInfo = variants.some((variant) => {
  308. if (variant.video && variant.video.drmInfos.length) {
  309. return true;
  310. }
  311. if (variant.audio && variant.audio.drmInfos.length) {
  312. return true;
  313. }
  314. return false;
  315. });
  316. // When preparing to play live streams, it is possible that we won't know
  317. // about some upcoming encrypted content. If we initialize the drm engine
  318. // with no key systems, we won't be able to play when the encrypted content
  319. // comes.
  320. //
  321. // To avoid this, we will set the drm engine up to work with as many key
  322. // systems as possible so that we will be ready.
  323. if (!hadDrmInfo) {
  324. const servers = shaka.util.MapUtils.asMap(this.config_.servers);
  325. shaka.media.DrmEngine.replaceDrmInfo_(variants, servers);
  326. }
  327. /** @type {!Set<shaka.extern.DrmInfo>} */
  328. const drmInfos = new Set();
  329. for (const variant of variants) {
  330. const variantDrmInfos = this.getVariantDrmInfos_(variant);
  331. for (const info of variantDrmInfos) {
  332. drmInfos.add(info);
  333. }
  334. }
  335. for (const info of drmInfos) {
  336. shaka.media.DrmEngine.fillInDrmInfoDefaults_(
  337. info,
  338. shaka.util.MapUtils.asMap(this.config_.servers),
  339. shaka.util.MapUtils.asMap(this.config_.advanced || {}),
  340. this.config_.keySystemsMapping);
  341. }
  342. /** @type {!Map.<string, MediaKeySystemConfiguration>} */
  343. let configsByKeySystem;
  344. // We should get the decodingInfo results for the variants after we filling
  345. // in the drm infos, and before queryMediaKeys_().
  346. await shaka.util.StreamUtils.getDecodingInfosForVariants(variants,
  347. this.usePersistentLicenses_, this.srcEquals_,
  348. this.config_.preferredKeySystems);
  349. this.destroyer_.ensureNotDestroyed();
  350. const hasDrmInfo = hadDrmInfo || Object.keys(this.config_.servers).length;
  351. // An unencrypted content is initialized.
  352. if (!hasDrmInfo) {
  353. this.initialized_ = true;
  354. return Promise.resolve();
  355. }
  356. const p = this.queryMediaKeys_(configsByKeySystem, variants);
  357. // TODO(vaage): Look into the assertion below. If we do not have any drm
  358. // info, we create drm info so that content can play if it has drm info
  359. // later.
  360. // However it is okay if we fail to initialize? If we fail to initialize,
  361. // it means we won't be able to play the later-encrypted content, which is
  362. // not okay.
  363. // If the content did not originally have any drm info, then it doesn't
  364. // matter if we fail to initialize the drm engine, because we won't need it
  365. // anyway.
  366. return hadDrmInfo ? p : p.catch(() => {});
  367. }
  368. /**
  369. * Attach MediaKeys to the video element
  370. * @return {Promise}
  371. * @private
  372. */
  373. async attachMediaKeys_() {
  374. if (this.video_.mediaKeys) {
  375. return;
  376. }
  377. // An attach process has already started, let's wait it out
  378. if (this.mediaKeysAttached_) {
  379. await this.mediaKeysAttached_;
  380. this.destroyer_.ensureNotDestroyed();
  381. return;
  382. }
  383. try {
  384. this.mediaKeysAttached_ = this.video_.setMediaKeys(this.mediaKeys_);
  385. await this.mediaKeysAttached_;
  386. } catch (exception) {
  387. goog.asserts.assert(exception instanceof Error, 'Wrong error type!');
  388. this.onError_(new shaka.util.Error(
  389. shaka.util.Error.Severity.CRITICAL,
  390. shaka.util.Error.Category.DRM,
  391. shaka.util.Error.Code.FAILED_TO_ATTACH_TO_VIDEO,
  392. exception.message));
  393. }
  394. this.destroyer_.ensureNotDestroyed();
  395. }
  396. /**
  397. * Processes encrypted event and start licence challenging
  398. * @return {!Promise}
  399. * @private
  400. */
  401. async onEncryptedEvent_(event) {
  402. /**
  403. * MediaKeys should be added when receiving an encrypted event. Setting
  404. * mediaKeys before could result into encrypted event not being fired on
  405. * some browsers
  406. */
  407. await this.attachMediaKeys_();
  408. this.newInitData(
  409. event.initDataType,
  410. shaka.util.BufferUtils.toUint8(event.initData));
  411. }
  412. /**
  413. * Start processing events.
  414. * @param {HTMLMediaElement} video
  415. * @return {!Promise}
  416. */
  417. async attach(video) {
  418. if (!this.mediaKeys_) {
  419. // Unencrypted, or so we think. We listen for encrypted events in order
  420. // to warn when the stream is encrypted, even though the manifest does
  421. // not know it.
  422. // Don't complain about this twice, so just listenOnce().
  423. // FIXME: This is ineffective when a prefixed event is translated by our
  424. // polyfills, since those events are only caught and translated by a
  425. // MediaKeys instance. With clear content and no polyfilled MediaKeys
  426. // instance attached, you'll never see the 'encrypted' event on those
  427. // platforms (Safari).
  428. this.eventManager_.listenOnce(video, 'encrypted', (event) => {
  429. this.onError_(new shaka.util.Error(
  430. shaka.util.Error.Severity.CRITICAL,
  431. shaka.util.Error.Category.DRM,
  432. shaka.util.Error.Code.ENCRYPTED_CONTENT_WITHOUT_DRM_INFO));
  433. });
  434. return;
  435. }
  436. this.video_ = video;
  437. this.eventManager_.listenOnce(this.video_, 'play', () => this.onPlay_());
  438. if ('webkitCurrentPlaybackTargetIsWireless' in this.video_) {
  439. this.eventManager_.listen(this.video_,
  440. 'webkitcurrentplaybacktargetiswirelesschanged',
  441. () => this.closeOpenSessions_());
  442. }
  443. this.manifestInitData_ = this.currentDrmInfo_ ?
  444. (this.currentDrmInfo_.initData.find(
  445. (initDataOverride) => initDataOverride.initData.length > 0,
  446. ) || null) : null;
  447. /**
  448. * We can attach media keys before the playback actually begins when:
  449. * - If we are not using FairPlay Modern EME
  450. * - Some initData already has been generated (through the manifest)
  451. * - In case of an offline session
  452. */
  453. if (this.manifestInitData_ ||
  454. this.currentDrmInfo_.keySystem !== 'com.apple.fps' ||
  455. this.storedPersistentSessions_.size) {
  456. await this.attachMediaKeys_();
  457. }
  458. this.createOrLoad().catch(() => {
  459. // Silence errors
  460. // createOrLoad will run async, errors are triggered through onError_
  461. });
  462. // Explicit init data for any one stream or an offline session is
  463. // sufficient to suppress 'encrypted' events for all streams.
  464. // Also suppress 'encrypted' events when parsing in-band ppsh
  465. // from media segments because that serves the same purpose as the
  466. // 'encrypted' events.
  467. if (!this.manifestInitData_ && !this.storedPersistentSessions_.size &&
  468. !this.config_.parseInbandPsshEnabled) {
  469. this.eventManager_.listen(
  470. this.video_, 'encrypted', (e) => this.onEncryptedEvent_(e));
  471. }
  472. }
  473. /**
  474. * Returns true if the manifest has init data.
  475. *
  476. * @return {boolean}
  477. */
  478. hasManifestInitData() {
  479. return !!this.manifestInitData_;
  480. }
  481. /**
  482. * Sets the server certificate based on the current DrmInfo.
  483. *
  484. * @return {!Promise}
  485. */
  486. async setServerCertificate() {
  487. goog.asserts.assert(this.initialized_,
  488. 'Must call init() before setServerCertificate');
  489. if (!this.mediaKeys_ || !this.currentDrmInfo_) {
  490. return;
  491. }
  492. if (this.currentDrmInfo_.serverCertificateUri &&
  493. (!this.currentDrmInfo_.serverCertificate ||
  494. !this.currentDrmInfo_.serverCertificate.length)) {
  495. const request = shaka.net.NetworkingEngine.makeRequest(
  496. [this.currentDrmInfo_.serverCertificateUri],
  497. this.config_.retryParameters);
  498. try {
  499. const operation = this.playerInterface_.netEngine.request(
  500. shaka.net.NetworkingEngine.RequestType.SERVER_CERTIFICATE,
  501. request);
  502. const response = await operation.promise;
  503. this.currentDrmInfo_.serverCertificate =
  504. shaka.util.BufferUtils.toUint8(response.data);
  505. } catch (error) {
  506. // Request failed!
  507. goog.asserts.assert(error instanceof shaka.util.Error,
  508. 'Wrong NetworkingEngine error type!');
  509. throw new shaka.util.Error(
  510. shaka.util.Error.Severity.CRITICAL,
  511. shaka.util.Error.Category.DRM,
  512. shaka.util.Error.Code.SERVER_CERTIFICATE_REQUEST_FAILED,
  513. error);
  514. }
  515. if (this.destroyer_.destroyed()) {
  516. return;
  517. }
  518. }
  519. if (!this.currentDrmInfo_.serverCertificate ||
  520. !this.currentDrmInfo_.serverCertificate.length) {
  521. return;
  522. }
  523. try {
  524. const supported = await this.mediaKeys_.setServerCertificate(
  525. this.currentDrmInfo_.serverCertificate);
  526. if (!supported) {
  527. shaka.log.warning('Server certificates are not supported by the ' +
  528. 'key system. The server certificate has been ' +
  529. 'ignored.');
  530. }
  531. } catch (exception) {
  532. throw new shaka.util.Error(
  533. shaka.util.Error.Severity.CRITICAL,
  534. shaka.util.Error.Category.DRM,
  535. shaka.util.Error.Code.INVALID_SERVER_CERTIFICATE,
  536. exception.message);
  537. }
  538. }
  539. /**
  540. * Remove an offline session and delete it's data. This can only be called
  541. * after a successful call to |init|. This will wait until the
  542. * 'license-release' message is handled. The returned Promise will be rejected
  543. * if there is an error releasing the license.
  544. *
  545. * @param {string} sessionId
  546. * @return {!Promise}
  547. */
  548. async removeSession(sessionId) {
  549. goog.asserts.assert(this.mediaKeys_,
  550. 'Must call init() before removeSession');
  551. const session = await this.loadOfflineSession_(
  552. sessionId, {initData: null, initDataType: null});
  553. // This will be null on error, such as session not found.
  554. if (!session) {
  555. shaka.log.v2('Ignoring attempt to remove missing session', sessionId);
  556. return;
  557. }
  558. // TODO: Consider adding a timeout to get the 'message' event.
  559. // Note that the 'message' event will get raised after the remove()
  560. // promise resolves.
  561. const tasks = [];
  562. const found = this.activeSessions_.get(session);
  563. if (found) {
  564. // This will force us to wait until the 'license-release' message has been
  565. // handled.
  566. found.updatePromise = new shaka.util.PublicPromise();
  567. tasks.push(found.updatePromise);
  568. }
  569. shaka.log.v2('Attempting to remove session', sessionId);
  570. tasks.push(session.remove());
  571. await Promise.all(tasks);
  572. this.activeSessions_.delete(session);
  573. }
  574. /**
  575. * Creates the sessions for the init data and waits for them to become ready.
  576. *
  577. * @return {!Promise}
  578. */
  579. async createOrLoad() {
  580. if (this.storedPersistentSessions_.size) {
  581. this.storedPersistentSessions_.forEach((metadata, sessionId) => {
  582. this.loadOfflineSession_(sessionId, metadata);
  583. });
  584. await this.allSessionsLoaded_;
  585. const keyIds = (this.currentDrmInfo_ && this.currentDrmInfo_.keyIds) ||
  586. new Set([]);
  587. // All the needed keys are already loaded, we don't need another license
  588. // Therefore we prevent starting a new session
  589. if (keyIds.size > 0 && this.areAllKeysUsable_()) {
  590. return this.allSessionsLoaded_;
  591. }
  592. // Reset the promise for the next sessions to come if key needs aren't
  593. // satisfied with persistent sessions
  594. this.allSessionsLoaded_ = new shaka.util.PublicPromise();
  595. this.allSessionsLoaded_.catch(() => {});
  596. }
  597. // Create sessions.
  598. const initDatas =
  599. (this.currentDrmInfo_ ? this.currentDrmInfo_.initData : []) || [];
  600. for (const initDataOverride of initDatas) {
  601. this.newInitData(
  602. initDataOverride.initDataType, initDataOverride.initData);
  603. }
  604. // If there were no sessions to load, we need to resolve the promise right
  605. // now or else it will never get resolved.
  606. // We determine this by checking areAllSessionsLoaded_, rather than checking
  607. // the number of initDatas, since the newInitData method can reject init
  608. // datas in some circumstances.
  609. if (this.areAllSessionsLoaded_()) {
  610. this.allSessionsLoaded_.resolve();
  611. }
  612. return this.allSessionsLoaded_;
  613. }
  614. /**
  615. * Called when new initialization data is encountered. If this data hasn't
  616. * been seen yet, this will create a new session for it.
  617. *
  618. * @param {string} initDataType
  619. * @param {!Uint8Array} initData
  620. */
  621. newInitData(initDataType, initData) {
  622. if (!initData.length) {
  623. return;
  624. }
  625. // Suppress duplicate init data.
  626. // Note that some init data are extremely large and can't portably be used
  627. // as keys in a dictionary.
  628. const metadatas = this.activeSessions_.values();
  629. for (const metadata of metadatas) {
  630. if (shaka.util.BufferUtils.equal(initData, metadata.initData) &&
  631. this.config_.ignoreDuplicateInitData) {
  632. shaka.log.debug('Ignoring duplicate init data.');
  633. return;
  634. }
  635. }
  636. // If there are pre-existing sessions that have all been loaded
  637. // then reset the allSessionsLoaded_ promise, which can now be
  638. // used to wait for new sesssions to be loaded
  639. if (this.activeSessions_.size > 0 && this.areAllSessionsLoaded_()) {
  640. this.allSessionsLoaded_.resolve();
  641. this.allSessionsLoaded_ = new shaka.util.PublicPromise();
  642. this.allSessionsLoaded_.catch(() => {});
  643. }
  644. this.createSession(initDataType, initData,
  645. this.currentDrmInfo_.sessionType);
  646. }
  647. /** @return {boolean} */
  648. initialized() {
  649. return this.initialized_;
  650. }
  651. /**
  652. * @param {?shaka.extern.DrmInfo} drmInfo
  653. * @return {string} */
  654. static keySystem(drmInfo) {
  655. return drmInfo ? drmInfo.keySystem : '';
  656. }
  657. /**
  658. * Check if DrmEngine (as initialized) will likely be able to support the
  659. * given content type.
  660. *
  661. * @param {string} contentType
  662. * @return {boolean}
  663. */
  664. willSupport(contentType) {
  665. // Edge 14 does not report correct capabilities. It will only report the
  666. // first MIME type even if the others are supported. To work around this,
  667. // we say that Edge supports everything.
  668. //
  669. // See https://github.com/shaka-project/shaka-player/issues/1495 for details.
  670. if (shaka.util.Platform.isLegacyEdge()) {
  671. return true;
  672. }
  673. contentType = contentType.toLowerCase();
  674. if (shaka.util.Platform.isTizen() &&
  675. contentType.includes('codecs="ac-3"')) {
  676. // Some Tizen devices seem to misreport AC-3 support. This works around
  677. // the issue, by falling back to EC-3, which seems to be supported on the
  678. // same devices and be correctly reported in all cases we have observed.
  679. // See https://github.com/shaka-project/shaka-player/issues/2989 for
  680. // details.
  681. const fallback = contentType.replace('ac-3', 'ec-3');
  682. return this.supportedTypes_.has(contentType) ||
  683. this.supportedTypes_.has(fallback);
  684. }
  685. return this.supportedTypes_.has(contentType);
  686. }
  687. /**
  688. * Returns the ID of the sessions currently active.
  689. *
  690. * @return {!Array.<string>}
  691. */
  692. getSessionIds() {
  693. const sessions = this.activeSessions_.keys();
  694. const ids = shaka.util.Iterables.map(sessions, (s) => s.sessionId);
  695. // TODO: Make |getSessionIds| return |Iterable| instead of |Array|.
  696. return Array.from(ids);
  697. }
  698. /**
  699. * Returns the active sessions metadata
  700. *
  701. * @return {!Array.<shaka.extern.DrmSessionMetadata>}
  702. */
  703. getActiveSessionsMetadata() {
  704. const sessions = this.activeSessions_.keys();
  705. const metadata = shaka.util.Iterables.map(sessions, (session) => {
  706. const metadata = this.activeSessions_.get(session);
  707. return {
  708. sessionId: session.sessionId,
  709. sessionType: metadata.type,
  710. initData: metadata.initData,
  711. initDataType: metadata.initDataType,
  712. };
  713. });
  714. return Array.from(metadata);
  715. }
  716. /**
  717. * Returns the next expiration time, or Infinity.
  718. * @return {number}
  719. */
  720. getExpiration() {
  721. // This will equal Infinity if there are no entries.
  722. let min = Infinity;
  723. const sessions = this.activeSessions_.keys();
  724. for (const session of sessions) {
  725. if (!isNaN(session.expiration)) {
  726. min = Math.min(min, session.expiration);
  727. }
  728. }
  729. return min;
  730. }
  731. /**
  732. * Returns the time spent on license requests during this session, or NaN.
  733. *
  734. * @return {number}
  735. */
  736. getLicenseTime() {
  737. if (this.licenseTimeSeconds_) {
  738. return this.licenseTimeSeconds_;
  739. }
  740. return NaN;
  741. }
  742. /**
  743. * Returns the DrmInfo that was used to initialize the current key system.
  744. *
  745. * @return {?shaka.extern.DrmInfo}
  746. */
  747. getDrmInfo() {
  748. return this.currentDrmInfo_;
  749. }
  750. /**
  751. * Return the media keys created from the current mediaKeySystemAccess.
  752. * @return {MediaKeys}
  753. */
  754. getMediaKeys() {
  755. return this.mediaKeys_;
  756. }
  757. /**
  758. * Returns the current key statuses.
  759. *
  760. * @return {!Object.<string, string>}
  761. */
  762. getKeyStatuses() {
  763. return shaka.util.MapUtils.asObject(this.announcedKeyStatusByKeyId_);
  764. }
  765. /**
  766. * Returns the current media key sessions.
  767. *
  768. * @return {!Array.<MediaKeySession>}
  769. */
  770. getMediaKeySessions() {
  771. return Array.from(this.activeSessions_.keys());
  772. }
  773. /**
  774. * @param {shaka.extern.Stream} stream
  775. * @param {string=} codecOverride
  776. * @return {string}
  777. * @private
  778. */
  779. static computeMimeType_(stream, codecOverride) {
  780. const realMimeType = shaka.util.MimeUtils.getFullType(stream.mimeType,
  781. codecOverride || stream.codecs);
  782. const TransmuxerEngine = shaka.transmuxer.TransmuxerEngine;
  783. if (TransmuxerEngine.isSupported(realMimeType, stream.type)) {
  784. // This will be handled by the Transmuxer, so use the MIME type that the
  785. // Transmuxer will produce.
  786. return TransmuxerEngine.convertCodecs(stream.type, realMimeType);
  787. }
  788. return realMimeType;
  789. }
  790. /**
  791. * @param {!Map.<string, MediaKeySystemConfiguration>} configsByKeySystem
  792. * A dictionary of configs, indexed by key system, with an iteration order
  793. * (insertion order) that reflects the preference for the application.
  794. * @param {!Array.<shaka.extern.Variant>} variants
  795. * @return {!Promise} Resolved if/when a key system has been chosen.
  796. * @private
  797. */
  798. async queryMediaKeys_(configsByKeySystem, variants) {
  799. const drmInfosByKeySystem = new Map();
  800. const mediaKeySystemAccess = variants.length ?
  801. this.getKeySystemAccessFromVariants_(variants, drmInfosByKeySystem) :
  802. await this.getKeySystemAccessByConfigs_(configsByKeySystem);
  803. if (!mediaKeySystemAccess) {
  804. throw new shaka.util.Error(
  805. shaka.util.Error.Severity.CRITICAL,
  806. shaka.util.Error.Category.DRM,
  807. shaka.util.Error.Code.REQUESTED_KEY_SYSTEM_CONFIG_UNAVAILABLE);
  808. }
  809. this.destroyer_.ensureNotDestroyed();
  810. try {
  811. // Get the set of supported content types from the audio and video
  812. // capabilities. Avoid duplicates so that it is easier to read what is
  813. // supported.
  814. this.supportedTypes_.clear();
  815. // Store the capabilities of the key system.
  816. const realConfig = mediaKeySystemAccess.getConfiguration();
  817. shaka.log.v2(
  818. 'Got MediaKeySystemAccess with configuration',
  819. realConfig);
  820. const audioCaps = realConfig.audioCapabilities || [];
  821. const videoCaps = realConfig.videoCapabilities || [];
  822. for (const cap of audioCaps) {
  823. this.supportedTypes_.add(cap.contentType.toLowerCase());
  824. }
  825. for (const cap of videoCaps) {
  826. this.supportedTypes_.add(cap.contentType.toLowerCase());
  827. }
  828. goog.asserts.assert(this.supportedTypes_.size,
  829. 'We should get at least one supported MIME type');
  830. if (variants.length) {
  831. this.currentDrmInfo_ = this.createDrmInfoByInfos_(
  832. mediaKeySystemAccess.keySystem,
  833. drmInfosByKeySystem.get(mediaKeySystemAccess.keySystem));
  834. } else {
  835. this.currentDrmInfo_ = shaka.media.DrmEngine.createDrmInfoByConfigs_(
  836. mediaKeySystemAccess.keySystem,
  837. configsByKeySystem.get(mediaKeySystemAccess.keySystem));
  838. }
  839. if (!this.currentDrmInfo_.licenseServerUri) {
  840. throw new shaka.util.Error(
  841. shaka.util.Error.Severity.CRITICAL,
  842. shaka.util.Error.Category.DRM,
  843. shaka.util.Error.Code.NO_LICENSE_SERVER_GIVEN,
  844. this.currentDrmInfo_.keySystem);
  845. }
  846. const mediaKeys = await mediaKeySystemAccess.createMediaKeys();
  847. this.destroyer_.ensureNotDestroyed();
  848. shaka.log.info('Created MediaKeys object for key system',
  849. this.currentDrmInfo_.keySystem);
  850. this.mediaKeys_ = mediaKeys;
  851. if (this.config_.minHdcpVersion != '' &&
  852. 'getStatusForPolicy' in this.mediaKeys_) {
  853. try {
  854. const status = await this.mediaKeys_.getStatusForPolicy({
  855. minHdcpVersion: this.config_.minHdcpVersion,
  856. });
  857. if (status != 'usable') {
  858. throw new shaka.util.Error(
  859. shaka.util.Error.Severity.CRITICAL,
  860. shaka.util.Error.Category.DRM,
  861. shaka.util.Error.Code.MIN_HDCP_VERSION_NOT_MATCH);
  862. }
  863. this.destroyer_.ensureNotDestroyed();
  864. } catch (e) {
  865. if (e instanceof shaka.util.Error) {
  866. throw e;
  867. }
  868. throw new shaka.util.Error(
  869. shaka.util.Error.Severity.CRITICAL,
  870. shaka.util.Error.Category.DRM,
  871. shaka.util.Error.Code.ERROR_CHECKING_HDCP_VERSION,
  872. e.message);
  873. }
  874. }
  875. this.initialized_ = true;
  876. await this.setServerCertificate();
  877. this.destroyer_.ensureNotDestroyed();
  878. } catch (exception) {
  879. this.destroyer_.ensureNotDestroyed(exception);
  880. // Don't rewrap a shaka.util.Error from earlier in the chain:
  881. this.currentDrmInfo_ = null;
  882. this.supportedTypes_.clear();
  883. if (exception instanceof shaka.util.Error) {
  884. throw exception;
  885. }
  886. // We failed to create MediaKeys. This generally shouldn't happen.
  887. throw new shaka.util.Error(
  888. shaka.util.Error.Severity.CRITICAL,
  889. shaka.util.Error.Category.DRM,
  890. shaka.util.Error.Code.FAILED_TO_CREATE_CDM,
  891. exception.message);
  892. }
  893. }
  894. /**
  895. * Get the MediaKeySystemAccess from the decodingInfos of the variants.
  896. * @param {!Array.<shaka.extern.Variant>} variants
  897. * @param {!Map.<string, !Array.<shaka.extern.DrmInfo>>} drmInfosByKeySystem
  898. * A dictionary of drmInfos, indexed by key system.
  899. * @return {MediaKeySystemAccess}
  900. * @private
  901. */
  902. getKeySystemAccessFromVariants_(variants, drmInfosByKeySystem) {
  903. for (const variant of variants) {
  904. // Get all the key systems in the variant that shouldHaveLicenseServer.
  905. const drmInfos = this.getVariantDrmInfos_(variant);
  906. for (const info of drmInfos) {
  907. if (!drmInfosByKeySystem.has(info.keySystem)) {
  908. drmInfosByKeySystem.set(info.keySystem, []);
  909. }
  910. drmInfosByKeySystem.get(info.keySystem).push(info);
  911. }
  912. }
  913. if (drmInfosByKeySystem.size == 1 && drmInfosByKeySystem.has('')) {
  914. throw new shaka.util.Error(
  915. shaka.util.Error.Severity.CRITICAL,
  916. shaka.util.Error.Category.DRM,
  917. shaka.util.Error.Code.NO_RECOGNIZED_KEY_SYSTEMS);
  918. }
  919. // If we have configured preferredKeySystems, choose a preferred keySystem
  920. // if available.
  921. for (const preferredKeySystem of this.config_.preferredKeySystems) {
  922. for (const variant of variants) {
  923. const decodingInfo = variant.decodingInfos.find((decodingInfo) => {
  924. return decodingInfo.supported &&
  925. decodingInfo.keySystemAccess != null &&
  926. decodingInfo.keySystemAccess.keySystem == preferredKeySystem;
  927. });
  928. if (decodingInfo) {
  929. return decodingInfo.keySystemAccess;
  930. }
  931. }
  932. }
  933. // Try key systems with configured license servers first. We only have to
  934. // try key systems without configured license servers for diagnostic
  935. // reasons, so that we can differentiate between "none of these key
  936. // systems are available" and "some are available, but you did not
  937. // configure them properly." The former takes precedence.
  938. for (const shouldHaveLicenseServer of [true, false]) {
  939. for (const variant of variants) {
  940. for (const decodingInfo of variant.decodingInfos) {
  941. if (!decodingInfo.supported || !decodingInfo.keySystemAccess) {
  942. continue;
  943. }
  944. const drmInfos =
  945. drmInfosByKeySystem.get(decodingInfo.keySystemAccess.keySystem);
  946. for (const info of drmInfos) {
  947. if (!!info.licenseServerUri == shouldHaveLicenseServer) {
  948. return decodingInfo.keySystemAccess;
  949. }
  950. }
  951. }
  952. }
  953. }
  954. return null;
  955. }
  956. /**
  957. * Get the MediaKeySystemAccess by querying requestMediaKeySystemAccess.
  958. * @param {!Map.<string, MediaKeySystemConfiguration>} configsByKeySystem
  959. * A dictionary of configs, indexed by key system, with an iteration order
  960. * (insertion order) that reflects the preference for the application.
  961. * @return {!Promise.<MediaKeySystemAccess>} Resolved if/when a
  962. * mediaKeySystemAccess has been chosen.
  963. * @private
  964. */
  965. async getKeySystemAccessByConfigs_(configsByKeySystem) {
  966. /** @type {MediaKeySystemAccess} */
  967. let mediaKeySystemAccess;
  968. if (configsByKeySystem.size == 1 && configsByKeySystem.has('')) {
  969. throw new shaka.util.Error(
  970. shaka.util.Error.Severity.CRITICAL,
  971. shaka.util.Error.Category.DRM,
  972. shaka.util.Error.Code.NO_RECOGNIZED_KEY_SYSTEMS);
  973. }
  974. // If there are no tracks of a type, these should be not present.
  975. // Otherwise the query will fail.
  976. for (const config of configsByKeySystem.values()) {
  977. if (config.audioCapabilities.length == 0) {
  978. delete config.audioCapabilities;
  979. }
  980. if (config.videoCapabilities.length == 0) {
  981. delete config.videoCapabilities;
  982. }
  983. }
  984. // If we have configured preferredKeySystems, choose the preferred one if
  985. // available.
  986. for (const keySystem of this.config_.preferredKeySystems) {
  987. if (configsByKeySystem.has(keySystem)) {
  988. const config = configsByKeySystem.get(keySystem);
  989. try {
  990. mediaKeySystemAccess = // eslint-disable-next-line no-await-in-loop
  991. await navigator.requestMediaKeySystemAccess(keySystem, [config]);
  992. return mediaKeySystemAccess;
  993. } catch (error) {
  994. // Suppress errors.
  995. shaka.log.v2(
  996. 'Requesting', keySystem, 'failed with config', config, error);
  997. }
  998. this.destroyer_.ensureNotDestroyed();
  999. }
  1000. }
  1001. // Try key systems with configured license servers first. We only have to
  1002. // try key systems without configured license servers for diagnostic
  1003. // reasons, so that we can differentiate between "none of these key
  1004. // systems are available" and "some are available, but you did not
  1005. // configure them properly." The former takes precedence.
  1006. // TODO: once MediaCap implementation is complete, this part can be
  1007. // simplified or removed.
  1008. for (const shouldHaveLicenseServer of [true, false]) {
  1009. for (const keySystem of configsByKeySystem.keys()) {
  1010. const config = configsByKeySystem.get(keySystem);
  1011. // TODO: refactor, don't stick drmInfos onto
  1012. // MediaKeySystemConfiguration
  1013. const hasLicenseServer = config['drmInfos'].some((info) => {
  1014. return !!info.licenseServerUri;
  1015. });
  1016. if (hasLicenseServer != shouldHaveLicenseServer) {
  1017. continue;
  1018. }
  1019. try {
  1020. mediaKeySystemAccess = // eslint-disable-next-line no-await-in-loop
  1021. await navigator.requestMediaKeySystemAccess(keySystem, [config]);
  1022. return mediaKeySystemAccess;
  1023. } catch (error) {
  1024. // Suppress errors.
  1025. shaka.log.v2(
  1026. 'Requesting', keySystem, 'failed with config', config, error);
  1027. }
  1028. this.destroyer_.ensureNotDestroyed();
  1029. }
  1030. }
  1031. return mediaKeySystemAccess;
  1032. }
  1033. /**
  1034. * Create a DrmInfo using configured clear keys.
  1035. * The server URI will be a data URI which decodes to a clearkey license.
  1036. * @return {?shaka.extern.DrmInfo} or null if clear keys are not configured.
  1037. * @private
  1038. * @see https://bit.ly/2K8gOnv for the spec on the clearkey license format.
  1039. */
  1040. configureClearKey_() {
  1041. const clearKeys = shaka.util.MapUtils.asMap(this.config_.clearKeys);
  1042. if (clearKeys.size == 0) {
  1043. return null;
  1044. }
  1045. const ManifestParserUtils = shaka.util.ManifestParserUtils;
  1046. return ManifestParserUtils.createDrmInfoFromClearKeys(clearKeys);
  1047. }
  1048. /**
  1049. * Resolves the allSessionsLoaded_ promise when all the sessions are loaded
  1050. *
  1051. * @private
  1052. */
  1053. checkSessionsLoaded_() {
  1054. if (this.areAllSessionsLoaded_()) {
  1055. this.allSessionsLoaded_.resolve();
  1056. }
  1057. }
  1058. /**
  1059. * In case there are no key statuses, consider this session loaded
  1060. * after a reasonable timeout. It should definitely not take 5
  1061. * seconds to process a license.
  1062. * @param {!shaka.media.DrmEngine.SessionMetaData} metadata
  1063. * @private
  1064. */
  1065. setLoadSessionTimeoutTimer_(metadata) {
  1066. const timer = new shaka.util.Timer(() => {
  1067. metadata.loaded = true;
  1068. this.checkSessionsLoaded_();
  1069. });
  1070. timer.tickAfter(
  1071. /* seconds= */ shaka.media.DrmEngine.SESSION_LOAD_TIMEOUT_);
  1072. }
  1073. /**
  1074. * @param {string} sessionId
  1075. * @param {{initData: ?Uint8Array, initDataType: ?string}} sessionMetadata
  1076. * @return {!Promise.<MediaKeySession>}
  1077. * @private
  1078. */
  1079. async loadOfflineSession_(sessionId, sessionMetadata) {
  1080. let session;
  1081. const sessionType = 'persistent-license';
  1082. try {
  1083. shaka.log.v1('Attempting to load an offline session', sessionId);
  1084. session = this.mediaKeys_.createSession(sessionType);
  1085. } catch (exception) {
  1086. const error = new shaka.util.Error(
  1087. shaka.util.Error.Severity.CRITICAL,
  1088. shaka.util.Error.Category.DRM,
  1089. shaka.util.Error.Code.FAILED_TO_CREATE_SESSION,
  1090. exception.message);
  1091. this.onError_(error);
  1092. return Promise.reject(error);
  1093. }
  1094. this.eventManager_.listen(session, 'message',
  1095. /** @type {shaka.util.EventManager.ListenerType} */(
  1096. (event) => this.onSessionMessage_(event)));
  1097. this.eventManager_.listen(session, 'keystatuseschange',
  1098. (event) => this.onKeyStatusesChange_(event));
  1099. const metadata = {
  1100. initData: sessionMetadata.initData,
  1101. initDataType: sessionMetadata.initDataType,
  1102. loaded: false,
  1103. oldExpiration: Infinity,
  1104. updatePromise: null,
  1105. type: sessionType,
  1106. };
  1107. this.activeSessions_.set(session, metadata);
  1108. try {
  1109. const present = await session.load(sessionId);
  1110. this.destroyer_.ensureNotDestroyed();
  1111. shaka.log.v2('Loaded offline session', sessionId, present);
  1112. if (!present) {
  1113. this.activeSessions_.delete(session);
  1114. const severity = this.config_.persistentSessionOnlinePlayback ?
  1115. shaka.util.Error.Severity.RECOVERABLE :
  1116. shaka.util.Error.Severity.CRITICAL;
  1117. this.onError_(new shaka.util.Error(
  1118. severity,
  1119. shaka.util.Error.Category.DRM,
  1120. shaka.util.Error.Code.OFFLINE_SESSION_REMOVED));
  1121. metadata.loaded = true;
  1122. }
  1123. this.setLoadSessionTimeoutTimer_(metadata);
  1124. this.checkSessionsLoaded_();
  1125. return session;
  1126. } catch (error) {
  1127. this.destroyer_.ensureNotDestroyed(error);
  1128. this.activeSessions_.delete(session);
  1129. const severity = this.config_.persistentSessionOnlinePlayback ?
  1130. shaka.util.Error.Severity.RECOVERABLE :
  1131. shaka.util.Error.Severity.CRITICAL;
  1132. this.onError_(new shaka.util.Error(
  1133. severity,
  1134. shaka.util.Error.Category.DRM,
  1135. shaka.util.Error.Code.FAILED_TO_CREATE_SESSION,
  1136. error.message));
  1137. metadata.loaded = true;
  1138. this.checkSessionsLoaded_();
  1139. }
  1140. return Promise.resolve();
  1141. }
  1142. /**
  1143. * @param {string} initDataType
  1144. * @param {!Uint8Array} initData
  1145. * @param {string} sessionType
  1146. */
  1147. createSession(initDataType, initData, sessionType) {
  1148. goog.asserts.assert(this.mediaKeys_,
  1149. 'mediaKeys_ should be valid when creating temporary session.');
  1150. let session;
  1151. try {
  1152. shaka.log.info('Creating new', sessionType, 'session');
  1153. session = this.mediaKeys_.createSession(sessionType);
  1154. } catch (exception) {
  1155. this.onError_(new shaka.util.Error(
  1156. shaka.util.Error.Severity.CRITICAL,
  1157. shaka.util.Error.Category.DRM,
  1158. shaka.util.Error.Code.FAILED_TO_CREATE_SESSION,
  1159. exception.message));
  1160. return;
  1161. }
  1162. this.eventManager_.listen(session, 'message',
  1163. /** @type {shaka.util.EventManager.ListenerType} */(
  1164. (event) => this.onSessionMessage_(event)));
  1165. this.eventManager_.listen(session, 'keystatuseschange',
  1166. (event) => this.onKeyStatusesChange_(event));
  1167. const metadata = {
  1168. initData: initData,
  1169. initDataType: initDataType,
  1170. loaded: false,
  1171. oldExpiration: Infinity,
  1172. updatePromise: null,
  1173. type: sessionType,
  1174. };
  1175. this.activeSessions_.set(session, metadata);
  1176. try {
  1177. initData = this.config_.initDataTransform(
  1178. initData, initDataType, this.currentDrmInfo_);
  1179. } catch (error) {
  1180. let shakaError = error;
  1181. if (!(error instanceof shaka.util.Error)) {
  1182. shakaError = new shaka.util.Error(
  1183. shaka.util.Error.Severity.CRITICAL,
  1184. shaka.util.Error.Category.DRM,
  1185. shaka.util.Error.Code.INIT_DATA_TRANSFORM_ERROR,
  1186. error);
  1187. }
  1188. this.onError_(shakaError);
  1189. return;
  1190. }
  1191. if (this.config_.logLicenseExchange) {
  1192. const str = shaka.util.Uint8ArrayUtils.toBase64(initData);
  1193. shaka.log.info('EME init data: type=', initDataType, 'data=', str);
  1194. }
  1195. session.generateRequest(initDataType, initData).catch((error) => {
  1196. if (this.destroyer_.destroyed()) {
  1197. return;
  1198. }
  1199. goog.asserts.assert(error instanceof Error, 'Wrong error type!');
  1200. this.activeSessions_.delete(session);
  1201. // This may be supplied by some polyfills.
  1202. /** @type {MediaKeyError} */
  1203. const errorCode = error['errorCode'];
  1204. let extended;
  1205. if (errorCode && errorCode.systemCode) {
  1206. extended = errorCode.systemCode;
  1207. if (extended < 0) {
  1208. extended += Math.pow(2, 32);
  1209. }
  1210. extended = '0x' + extended.toString(16);
  1211. }
  1212. this.onError_(new shaka.util.Error(
  1213. shaka.util.Error.Severity.CRITICAL,
  1214. shaka.util.Error.Category.DRM,
  1215. shaka.util.Error.Code.FAILED_TO_GENERATE_LICENSE_REQUEST,
  1216. error.message, error, extended));
  1217. });
  1218. }
  1219. /**
  1220. * @param {!MediaKeyMessageEvent} event
  1221. * @private
  1222. */
  1223. onSessionMessage_(event) {
  1224. if (this.delayLicenseRequest_()) {
  1225. this.mediaKeyMessageEvents_.push(event);
  1226. } else {
  1227. this.sendLicenseRequest_(event);
  1228. }
  1229. }
  1230. /**
  1231. * @return {boolean}
  1232. * @private
  1233. */
  1234. delayLicenseRequest_() {
  1235. if (!this.video_) {
  1236. // If there's no video, don't delay the license request; i.e., in the case
  1237. // of offline storage.
  1238. return false;
  1239. }
  1240. return (this.config_.delayLicenseRequestUntilPlayed &&
  1241. this.video_.paused && !this.initialRequestsSent_);
  1242. }
  1243. /**
  1244. * Sends a license request.
  1245. * @param {!MediaKeyMessageEvent} event
  1246. * @private
  1247. */
  1248. async sendLicenseRequest_(event) {
  1249. /** @type {!MediaKeySession} */
  1250. const session = event.target;
  1251. shaka.log.v1(
  1252. 'Sending license request for session', session.sessionId, 'of type',
  1253. event.messageType);
  1254. if (this.config_.logLicenseExchange) {
  1255. const str = shaka.util.Uint8ArrayUtils.toBase64(event.message);
  1256. shaka.log.info('EME license request', str);
  1257. }
  1258. const metadata = this.activeSessions_.get(session);
  1259. let url = this.currentDrmInfo_.licenseServerUri;
  1260. const advancedConfig =
  1261. this.config_.advanced[this.currentDrmInfo_.keySystem];
  1262. if (event.messageType == 'individualization-request' && advancedConfig &&
  1263. advancedConfig.individualizationServer) {
  1264. url = advancedConfig.individualizationServer;
  1265. }
  1266. const requestType = shaka.net.NetworkingEngine.RequestType.LICENSE;
  1267. const request = shaka.net.NetworkingEngine.makeRequest(
  1268. [url], this.config_.retryParameters);
  1269. request.body = event.message;
  1270. request.method = 'POST';
  1271. request.licenseRequestType = event.messageType;
  1272. request.sessionId = session.sessionId;
  1273. request.drmInfo = this.currentDrmInfo_;
  1274. if (metadata) {
  1275. request.initData = metadata.initData;
  1276. request.initDataType = metadata.initDataType;
  1277. }
  1278. if (advancedConfig && advancedConfig.headers) {
  1279. // Add these to the existing headers. Do not clobber them!
  1280. // For PlayReady, there will already be headers in the request.
  1281. for (const header in advancedConfig.headers) {
  1282. request.headers[header] = advancedConfig.headers[header];
  1283. }
  1284. }
  1285. // NOTE: allowCrossSiteCredentials can be set in a request filter.
  1286. if (shaka.util.DrmUtils.isPlayReadyKeySystem(
  1287. this.currentDrmInfo_.keySystem)) {
  1288. this.unpackPlayReadyRequest_(request);
  1289. }
  1290. const startTimeRequest = Date.now();
  1291. let response;
  1292. try {
  1293. const req = this.playerInterface_.netEngine.request(requestType, request);
  1294. response = await req.promise;
  1295. } catch (error) {
  1296. if (this.destroyer_.destroyed()) {
  1297. return;
  1298. }
  1299. // Request failed!
  1300. goog.asserts.assert(error instanceof shaka.util.Error,
  1301. 'Wrong NetworkingEngine error type!');
  1302. const shakaErr = new shaka.util.Error(
  1303. shaka.util.Error.Severity.CRITICAL,
  1304. shaka.util.Error.Category.DRM,
  1305. shaka.util.Error.Code.LICENSE_REQUEST_FAILED,
  1306. error);
  1307. if (this.activeSessions_.size == 1) {
  1308. this.onError_(shakaErr);
  1309. if (metadata && metadata.updatePromise) {
  1310. metadata.updatePromise.reject(shakaErr);
  1311. }
  1312. } else {
  1313. if (metadata && metadata.updatePromise) {
  1314. metadata.updatePromise.reject(shakaErr);
  1315. }
  1316. this.activeSessions_.delete(session);
  1317. if (this.areAllSessionsLoaded_()) {
  1318. this.allSessionsLoaded_.resolve();
  1319. this.keyStatusTimer_.tickAfter(/* seconds= */ 0.1);
  1320. }
  1321. }
  1322. return;
  1323. }
  1324. if (this.destroyer_.destroyed()) {
  1325. return;
  1326. }
  1327. this.licenseTimeSeconds_ += (Date.now() - startTimeRequest) / 1000;
  1328. if (this.config_.logLicenseExchange) {
  1329. const str = shaka.util.Uint8ArrayUtils.toBase64(response.data);
  1330. shaka.log.info('EME license response', str);
  1331. }
  1332. // Request succeeded, now pass the response to the CDM.
  1333. try {
  1334. shaka.log.v1('Updating session', session.sessionId);
  1335. await session.update(response.data);
  1336. } catch (error) {
  1337. // Session update failed!
  1338. const shakaErr = new shaka.util.Error(
  1339. shaka.util.Error.Severity.CRITICAL,
  1340. shaka.util.Error.Category.DRM,
  1341. shaka.util.Error.Code.LICENSE_RESPONSE_REJECTED,
  1342. error.message);
  1343. this.onError_(shakaErr);
  1344. if (metadata && metadata.updatePromise) {
  1345. metadata.updatePromise.reject(shakaErr);
  1346. }
  1347. return;
  1348. }
  1349. if (this.destroyer_.destroyed()) {
  1350. return;
  1351. }
  1352. const updateEvent = new shaka.util.FakeEvent('drmsessionupdate');
  1353. this.playerInterface_.onEvent(updateEvent);
  1354. if (metadata) {
  1355. if (metadata.updatePromise) {
  1356. metadata.updatePromise.resolve();
  1357. }
  1358. this.setLoadSessionTimeoutTimer_(metadata);
  1359. }
  1360. }
  1361. /**
  1362. * Unpacks PlayReady license requests. Modifies the request object.
  1363. * @param {shaka.extern.Request} request
  1364. * @private
  1365. */
  1366. unpackPlayReadyRequest_(request) {
  1367. // On Edge, the raw license message is UTF-16-encoded XML. We need
  1368. // to unpack the Challenge element (base64-encoded string containing the
  1369. // actual license request) and any HttpHeader elements (sent as request
  1370. // headers).
  1371. // Example XML:
  1372. // <PlayReadyKeyMessage type="LicenseAcquisition">
  1373. // <LicenseAcquisition Version="1">
  1374. // <Challenge encoding="base64encoded">{Base64Data}</Challenge>
  1375. // <HttpHeaders>
  1376. // <HttpHeader>
  1377. // <name>Content-Type</name>
  1378. // <value>text/xml; charset=utf-8</value>
  1379. // </HttpHeader>
  1380. // <HttpHeader>
  1381. // <name>SOAPAction</name>
  1382. // <value>http://schemas.microsoft.com/DRM/etc/etc</value>
  1383. // </HttpHeader>
  1384. // </HttpHeaders>
  1385. // </LicenseAcquisition>
  1386. // </PlayReadyKeyMessage>
  1387. const TXml = shaka.util.TXml;
  1388. const xml = shaka.util.StringUtils.fromUTF16(
  1389. request.body, /* littleEndian= */ true, /* noThrow= */ true);
  1390. if (!xml.includes('PlayReadyKeyMessage')) {
  1391. // This does not appear to be a wrapped message as on Edge. Some
  1392. // clients do not need this unwrapping, so we will assume this is one of
  1393. // them. Note that "xml" at this point probably looks like random
  1394. // garbage, since we interpreted UTF-8 as UTF-16.
  1395. shaka.log.debug('PlayReady request is already unwrapped.');
  1396. request.headers['Content-Type'] = 'text/xml; charset=utf-8';
  1397. return;
  1398. }
  1399. shaka.log.debug('Unwrapping PlayReady request.');
  1400. const dom = TXml.parseXmlString(xml, 'PlayReadyKeyMessage');
  1401. goog.asserts.assert(dom, 'Failed to parse PlayReady XML!');
  1402. // Set request headers.
  1403. const headers = TXml.getElementsByTagName(dom, 'HttpHeader');
  1404. for (const header of headers) {
  1405. const name = TXml.getElementsByTagName(header, 'name')[0];
  1406. const value = TXml.getElementsByTagName(header, 'value')[0];
  1407. goog.asserts.assert(name && value, 'Malformed PlayReady headers!');
  1408. request.headers[
  1409. /** @type {string} */(shaka.util.TXml.getTextContents(name))] =
  1410. /** @type {string} */(shaka.util.TXml.getTextContents(value));
  1411. }
  1412. // Unpack the base64-encoded challenge.
  1413. const challenge = TXml.getElementsByTagName(dom, 'Challenge')[0];
  1414. goog.asserts.assert(challenge,
  1415. 'Malformed PlayReady challenge!');
  1416. goog.asserts.assert(challenge.attributes['encoding'] == 'base64encoded',
  1417. 'Unexpected PlayReady challenge encoding!');
  1418. request.body = shaka.util.Uint8ArrayUtils.fromBase64(
  1419. /** @type{string} */(shaka.util.TXml.getTextContents(challenge)));
  1420. }
  1421. /**
  1422. * @param {!Event} event
  1423. * @private
  1424. * @suppress {invalidCasts} to swap keyId and status
  1425. */
  1426. onKeyStatusesChange_(event) {
  1427. const session = /** @type {!MediaKeySession} */(event.target);
  1428. shaka.log.v2('Key status changed for session', session.sessionId);
  1429. const found = this.activeSessions_.get(session);
  1430. const keyStatusMap = session.keyStatuses;
  1431. let hasExpiredKeys = false;
  1432. keyStatusMap.forEach((status, keyId) => {
  1433. // The spec has changed a few times on the exact order of arguments here.
  1434. // As of 2016-06-30, Edge has the order reversed compared to the current
  1435. // EME spec. Given the back and forth in the spec, it may not be the only
  1436. // one. Try to detect this and compensate:
  1437. if (typeof keyId == 'string') {
  1438. const tmp = keyId;
  1439. keyId = /** @type {!ArrayBuffer} */(status);
  1440. status = /** @type {string} */(tmp);
  1441. }
  1442. // Microsoft's implementation in Edge seems to present key IDs as
  1443. // little-endian UUIDs, rather than big-endian or just plain array of
  1444. // bytes.
  1445. // standard: 6e 5a 1d 26 - 27 57 - 47 d7 - 80 46 ea a5 d1 d3 4b 5a
  1446. // on Edge: 26 1d 5a 6e - 57 27 - d7 47 - 80 46 ea a5 d1 d3 4b 5a
  1447. // Bug filed: https://bit.ly/2thuzXu
  1448. // NOTE that we skip this if byteLength != 16. This is used for Edge
  1449. // which uses single-byte dummy key IDs.
  1450. // However, unlike Edge and Chromecast, Tizen doesn't have this problem.
  1451. if (shaka.util.DrmUtils.isPlayReadyKeySystem(
  1452. this.currentDrmInfo_.keySystem) &&
  1453. keyId.byteLength == 16 &&
  1454. (shaka.util.Platform.isEdge() || shaka.util.Platform.isPS4())) {
  1455. // Read out some fields in little-endian:
  1456. const dataView = shaka.util.BufferUtils.toDataView(keyId);
  1457. const part0 = dataView.getUint32(0, /* LE= */ true);
  1458. const part1 = dataView.getUint16(4, /* LE= */ true);
  1459. const part2 = dataView.getUint16(6, /* LE= */ true);
  1460. // Write it back in big-endian:
  1461. dataView.setUint32(0, part0, /* BE= */ false);
  1462. dataView.setUint16(4, part1, /* BE= */ false);
  1463. dataView.setUint16(6, part2, /* BE= */ false);
  1464. }
  1465. if (status != 'status-pending') {
  1466. found.loaded = true;
  1467. }
  1468. if (!found) {
  1469. // We can get a key status changed for a closed session after it has
  1470. // been removed from |activeSessions_|. If it is closed, none of its
  1471. // keys should be usable.
  1472. goog.asserts.assert(
  1473. status != 'usable', 'Usable keys found in closed session');
  1474. }
  1475. if (status == 'expired') {
  1476. hasExpiredKeys = true;
  1477. }
  1478. const keyIdHex = shaka.util.Uint8ArrayUtils.toHex(keyId).slice(0, 32);
  1479. this.keyStatusByKeyId_.set(keyIdHex, status);
  1480. });
  1481. // If the session has expired, close it.
  1482. // Some CDMs do not have sub-second time resolution, so the key status may
  1483. // fire with hundreds of milliseconds left until the stated expiration time.
  1484. const msUntilExpiration = session.expiration - Date.now();
  1485. if (msUntilExpiration < 0 || (hasExpiredKeys && msUntilExpiration < 1000)) {
  1486. // If this is part of a remove(), we don't want to close the session until
  1487. // the update is complete. Otherwise, we will orphan the session.
  1488. if (found && !found.updatePromise) {
  1489. shaka.log.debug('Session has expired', session.sessionId);
  1490. this.activeSessions_.delete(session);
  1491. session.close().catch(() => {}); // Silence uncaught rejection errors
  1492. }
  1493. }
  1494. if (!this.areAllSessionsLoaded_()) {
  1495. // Don't announce key statuses or resolve the "all loaded" promise until
  1496. // everything is loaded.
  1497. return;
  1498. }
  1499. this.allSessionsLoaded_.resolve();
  1500. // Batch up key status changes before checking them or notifying Player.
  1501. // This handles cases where the statuses of multiple sessions are set
  1502. // simultaneously by the browser before dispatching key status changes for
  1503. // each of them. By batching these up, we only send one status change event
  1504. // and at most one EXPIRED error on expiration.
  1505. this.keyStatusTimer_.tickAfter(
  1506. /* seconds= */ shaka.media.DrmEngine.KEY_STATUS_BATCH_TIME);
  1507. }
  1508. /** @private */
  1509. processKeyStatusChanges_() {
  1510. const privateMap = this.keyStatusByKeyId_;
  1511. const publicMap = this.announcedKeyStatusByKeyId_;
  1512. // Copy the latest key statuses into the publicly-accessible map.
  1513. publicMap.clear();
  1514. privateMap.forEach((status, keyId) => publicMap.set(keyId, status));
  1515. // If all keys are expired, fire an error. |every| is always true for an
  1516. // empty array but we shouldn't fire an error for a lack of key status info.
  1517. const statuses = Array.from(publicMap.values());
  1518. const allExpired = statuses.length &&
  1519. statuses.every((status) => status == 'expired');
  1520. if (allExpired) {
  1521. this.onError_(new shaka.util.Error(
  1522. shaka.util.Error.Severity.CRITICAL,
  1523. shaka.util.Error.Category.DRM,
  1524. shaka.util.Error.Code.EXPIRED));
  1525. }
  1526. this.playerInterface_.onKeyStatus(shaka.util.MapUtils.asObject(publicMap));
  1527. }
  1528. /**
  1529. * Returns true if the browser has recent EME APIs.
  1530. *
  1531. * @return {boolean}
  1532. */
  1533. static isBrowserSupported() {
  1534. const basic =
  1535. !!window.MediaKeys &&
  1536. !!window.navigator &&
  1537. !!window.navigator.requestMediaKeySystemAccess &&
  1538. !!window.MediaKeySystemAccess &&
  1539. // eslint-disable-next-line no-restricted-syntax
  1540. !!window.MediaKeySystemAccess.prototype.getConfiguration;
  1541. return basic;
  1542. }
  1543. /**
  1544. * Returns a Promise to a map of EME support for well-known key systems.
  1545. *
  1546. * @return {!Promise.<!Object.<string, ?shaka.extern.DrmSupportType>>}
  1547. */
  1548. static async probeSupport() {
  1549. goog.asserts.assert(shaka.media.DrmEngine.isBrowserSupported(),
  1550. 'Must have basic EME support');
  1551. const testKeySystems = [
  1552. 'org.w3.clearkey',
  1553. 'com.widevine.alpha',
  1554. 'com.microsoft.playready',
  1555. 'com.microsoft.playready.hardware',
  1556. 'com.microsoft.playready.recommendation',
  1557. 'com.chromecast.playready',
  1558. 'com.apple.fps.1_0',
  1559. 'com.apple.fps',
  1560. ];
  1561. const widevineRobustness = [
  1562. 'SW_SECURE_CRYPTO',
  1563. 'SW_SECURE_DECODE',
  1564. 'HW_SECURE_CRYPTO',
  1565. 'HW_SECURE_DECODE',
  1566. 'HW_SECURE_ALL',
  1567. ];
  1568. const playreadyRobustness = [
  1569. '150',
  1570. '2000',
  1571. '3000',
  1572. ];
  1573. const testRobustness = {
  1574. 'com.widevine.alpha': widevineRobustness,
  1575. 'com.microsoft.playready.recommendation': playreadyRobustness,
  1576. };
  1577. const basicVideoCapabilities = [
  1578. {contentType: 'video/mp4; codecs="avc1.42E01E"'},
  1579. {contentType: 'video/webm; codecs="vp8"'},
  1580. ];
  1581. const basicAudioCapabilities = [
  1582. {contentType: 'audio/mp4; codecs="mp4a.40.2"'},
  1583. {contentType: 'audio/webm; codecs="opus"'},
  1584. ];
  1585. const basicConfigTemplate = {
  1586. videoCapabilities: basicVideoCapabilities,
  1587. audioCapabilities: basicAudioCapabilities,
  1588. initDataTypes: ['cenc', 'sinf', 'skd', 'keyids'],
  1589. };
  1590. const testEncryptionSchemes = [
  1591. null,
  1592. 'cenc',
  1593. 'cbcs',
  1594. 'cbcs-1-9',
  1595. ];
  1596. /** @type {!Map.<string, ?shaka.extern.DrmSupportType>} */
  1597. const support = new Map();
  1598. /**
  1599. * @param {string} keySystem
  1600. * @param {MediaKeySystemAccess} access
  1601. * @return {!Promise}
  1602. */
  1603. const processMediaKeySystemAccess = async (keySystem, access) => {
  1604. try {
  1605. await access.createMediaKeys();
  1606. } catch (error) {
  1607. // In some cases, we can get a successful access object but fail to
  1608. // create a MediaKeys instance. When this happens, don't update the
  1609. // support structure. If a previous test succeeded, we won't overwrite
  1610. // any of the results.
  1611. return;
  1612. }
  1613. // If sessionTypes is missing, assume no support for persistent-license.
  1614. const sessionTypes = access.getConfiguration().sessionTypes;
  1615. let persistentState = sessionTypes ?
  1616. sessionTypes.includes('persistent-license') : false;
  1617. // Tizen 3.0 doesn't support persistent licenses, but reports that it
  1618. // does. It doesn't fail until you call update() with a license
  1619. // response, which is way too late.
  1620. // This is a work-around for #894.
  1621. if (shaka.util.Platform.isTizen3()) {
  1622. persistentState = false;
  1623. }
  1624. const videoCapabilities = access.getConfiguration().videoCapabilities;
  1625. const audioCapabilities = access.getConfiguration().audioCapabilities;
  1626. let supportValue = {
  1627. persistentState,
  1628. encryptionSchemes: [],
  1629. videoRobustnessLevels: [],
  1630. audioRobustnessLevels: [],
  1631. };
  1632. if (support.has(keySystem) && support.get(keySystem)) {
  1633. // Update the existing non-null value.
  1634. supportValue = support.get(keySystem);
  1635. } else {
  1636. // Set a new one.
  1637. support.set(keySystem, supportValue);
  1638. }
  1639. // If the returned config doesn't mention encryptionScheme, the field
  1640. // is not supported. If installed, our polyfills should make sure this
  1641. // doesn't happen.
  1642. const returnedScheme = videoCapabilities[0].encryptionScheme;
  1643. if (returnedScheme &&
  1644. !supportValue.encryptionSchemes.includes(returnedScheme)) {
  1645. supportValue.encryptionSchemes.push(returnedScheme);
  1646. }
  1647. const videoRobustness = videoCapabilities[0].robustness;
  1648. if (videoRobustness &&
  1649. !supportValue.videoRobustnessLevels.includes(videoRobustness)) {
  1650. supportValue.videoRobustnessLevels.push(videoRobustness);
  1651. }
  1652. const audioRobustness = audioCapabilities[0].robustness;
  1653. if (audioRobustness &&
  1654. !supportValue.audioRobustnessLevels.includes(audioRobustness)) {
  1655. supportValue.audioRobustnessLevels.push(audioRobustness);
  1656. }
  1657. };
  1658. const testSystemEme = async (keySystem, encryptionScheme,
  1659. videoRobustness, audioRobustness) => {
  1660. try {
  1661. const basicConfig =
  1662. shaka.util.ObjectUtils.cloneObject(basicConfigTemplate);
  1663. for (const cap of basicConfig.videoCapabilities) {
  1664. cap.encryptionScheme = encryptionScheme;
  1665. cap.robustness = videoRobustness;
  1666. }
  1667. for (const cap of basicConfig.audioCapabilities) {
  1668. cap.encryptionScheme = encryptionScheme;
  1669. cap.robustness = audioRobustness;
  1670. }
  1671. const offlineConfig = shaka.util.ObjectUtils.cloneObject(basicConfig);
  1672. offlineConfig.persistentState = 'required';
  1673. offlineConfig.sessionTypes = ['persistent-license'];
  1674. const configs = [offlineConfig, basicConfig];
  1675. const access = await navigator.requestMediaKeySystemAccess(
  1676. keySystem, configs);
  1677. await processMediaKeySystemAccess(keySystem, access);
  1678. } catch (error) {} // Ignore errors.
  1679. };
  1680. const testSystemMcap = async (keySystem, encryptionScheme,
  1681. videoRobustness, audioRobustness) => {
  1682. try {
  1683. const decodingConfig = {
  1684. type: 'media-source',
  1685. video: {
  1686. contentType: basicVideoCapabilities[0].contentType,
  1687. width: 640,
  1688. height: 480,
  1689. bitrate: 1,
  1690. framerate: 1,
  1691. },
  1692. audio: {
  1693. contentType: basicAudioCapabilities[0].contentType,
  1694. channels: 2,
  1695. bitrate: 1,
  1696. samplerate: 1,
  1697. },
  1698. keySystemConfiguration: {
  1699. keySystem,
  1700. video: {
  1701. encryptionScheme,
  1702. robustness: videoRobustness,
  1703. },
  1704. audio: {
  1705. encryptionScheme,
  1706. robustness: audioRobustness,
  1707. },
  1708. },
  1709. };
  1710. const decodingInfo =
  1711. await navigator.mediaCapabilities.decodingInfo(decodingConfig);
  1712. const access = decodingInfo.keySystemAccess;
  1713. await processMediaKeySystemAccess(keySystem, access);
  1714. } catch (error) {} // Ignore errors.
  1715. };
  1716. // Initialize the support structure for each key system.
  1717. for (const keySystem of testKeySystems) {
  1718. support.set(keySystem, null);
  1719. }
  1720. // Test each key system and encryption scheme.
  1721. const tests = [];
  1722. for (const encryptionScheme of testEncryptionSchemes) {
  1723. for (const keySystem of testKeySystems) {
  1724. // Our Polyfill will reject anything apart com.apple.fps key systems.
  1725. // It seems the Safari modern EME API will allow to request a
  1726. // MediaKeySystemAccess for the ClearKey CDM, create and update a key
  1727. // session but playback will never start
  1728. // Safari bug: https://bugs.webkit.org/show_bug.cgi?id=231006
  1729. if (keySystem === 'org.w3.clearkey' &&
  1730. shaka.util.Platform.isSafari()) {
  1731. continue;
  1732. }
  1733. tests.push(testSystemEme(keySystem, encryptionScheme, '', ''));
  1734. tests.push(testSystemMcap(keySystem, encryptionScheme, '', ''));
  1735. }
  1736. }
  1737. for (const keySystem of testKeySystems) {
  1738. for (const robustness of (testRobustness[keySystem] || [])) {
  1739. tests.push(testSystemEme(keySystem, null, robustness, ''));
  1740. tests.push(testSystemEme(keySystem, null, '', robustness));
  1741. tests.push(testSystemMcap(keySystem, null, robustness, ''));
  1742. tests.push(testSystemMcap(keySystem, null, '', robustness));
  1743. }
  1744. }
  1745. await Promise.all(tests);
  1746. return shaka.util.MapUtils.asObject(support);
  1747. }
  1748. /** @private */
  1749. onPlay_() {
  1750. for (const event of this.mediaKeyMessageEvents_) {
  1751. this.sendLicenseRequest_(event);
  1752. }
  1753. this.initialRequestsSent_ = true;
  1754. this.mediaKeyMessageEvents_ = [];
  1755. }
  1756. /**
  1757. * Close a drm session while accounting for a bug in Chrome. Sometimes the
  1758. * Promise returned by close() never resolves.
  1759. *
  1760. * See issue #2741 and http://crbug.com/1108158.
  1761. * @param {!MediaKeySession} session
  1762. * @return {!Promise}
  1763. * @private
  1764. */
  1765. async closeSession_(session) {
  1766. const DrmEngine = shaka.media.DrmEngine;
  1767. const timeout = new Promise((resolve, reject) => {
  1768. const timer = new shaka.util.Timer(reject);
  1769. timer.tickAfter(DrmEngine.CLOSE_TIMEOUT_);
  1770. });
  1771. try {
  1772. await Promise.race([
  1773. Promise.all([session.close(), session.closed]),
  1774. timeout,
  1775. ]);
  1776. } catch (e) {
  1777. shaka.log.warning('Timeout waiting for session close');
  1778. }
  1779. }
  1780. /** @private */
  1781. async closeOpenSessions_() {
  1782. // Close all open sessions.
  1783. const openSessions = Array.from(this.activeSessions_.entries());
  1784. this.activeSessions_.clear();
  1785. // Close all sessions before we remove media keys from the video element.
  1786. await Promise.all(openSessions.map(async ([session, metadata]) => {
  1787. try {
  1788. /**
  1789. * Special case when a persistent-license session has been initiated,
  1790. * without being registered in the offline sessions at start-up.
  1791. * We should remove the session to prevent it from being orphaned after
  1792. * the playback session ends
  1793. */
  1794. if (!this.initializedForStorage_ &&
  1795. !this.storedPersistentSessions_.has(session.sessionId) &&
  1796. metadata.type === 'persistent-license' &&
  1797. !this.config_.persistentSessionOnlinePlayback) {
  1798. shaka.log.v1('Removing session', session.sessionId);
  1799. await session.remove();
  1800. } else {
  1801. shaka.log.v1('Closing session', session.sessionId, metadata);
  1802. await this.closeSession_(session);
  1803. }
  1804. } catch (error) {
  1805. // Ignore errors when closing the sessions. Closing a session that
  1806. // generated no key requests will throw an error.
  1807. shaka.log.error('Failed to close or remove the session', error);
  1808. }
  1809. }));
  1810. }
  1811. /**
  1812. * Check if a variant is likely to be supported by DrmEngine. This will err on
  1813. * the side of being too accepting and may not reject a variant that it will
  1814. * later fail to play.
  1815. *
  1816. * @param {!shaka.extern.Variant} variant
  1817. * @return {boolean}
  1818. */
  1819. supportsVariant(variant) {
  1820. /** @type {?shaka.extern.Stream} */
  1821. const audio = variant.audio;
  1822. /** @type {?shaka.extern.Stream} */
  1823. const video = variant.video;
  1824. if (audio && audio.encrypted) {
  1825. const audioContentType = shaka.media.DrmEngine.computeMimeType_(audio);
  1826. if (!this.willSupport(audioContentType)) {
  1827. return false;
  1828. }
  1829. }
  1830. if (video && video.encrypted) {
  1831. const videoContentType = shaka.media.DrmEngine.computeMimeType_(video);
  1832. if (!this.willSupport(videoContentType)) {
  1833. return false;
  1834. }
  1835. }
  1836. const keySystem = shaka.media.DrmEngine.keySystem(this.currentDrmInfo_);
  1837. const drmInfos = this.getVariantDrmInfos_(variant);
  1838. return drmInfos.length == 0 ||
  1839. drmInfos.some((drmInfo) => drmInfo.keySystem == keySystem);
  1840. }
  1841. /**
  1842. * Checks if two DrmInfos can be decrypted using the same key system.
  1843. * Clear content is considered compatible with every key system.
  1844. *
  1845. * @param {!Array.<!shaka.extern.DrmInfo>} drms1
  1846. * @param {!Array.<!shaka.extern.DrmInfo>} drms2
  1847. * @return {boolean}
  1848. */
  1849. static areDrmCompatible(drms1, drms2) {
  1850. if (!drms1.length || !drms2.length) {
  1851. return true;
  1852. }
  1853. if (drms1 === drms2) {
  1854. return true;
  1855. }
  1856. return shaka.media.DrmEngine.getCommonDrmInfos(
  1857. drms1, drms2).length > 0;
  1858. }
  1859. /**
  1860. * Returns an array of drm infos that are present in both input arrays.
  1861. * If one of the arrays is empty, returns the other one since clear
  1862. * content is considered compatible with every drm info.
  1863. *
  1864. * @param {!Array.<!shaka.extern.DrmInfo>} drms1
  1865. * @param {!Array.<!shaka.extern.DrmInfo>} drms2
  1866. * @return {!Array.<!shaka.extern.DrmInfo>}
  1867. */
  1868. static getCommonDrmInfos(drms1, drms2) {
  1869. if (!drms1.length) {
  1870. return drms2;
  1871. }
  1872. if (!drms2.length) {
  1873. return drms1;
  1874. }
  1875. const commonDrms = [];
  1876. for (const drm1 of drms1) {
  1877. for (const drm2 of drms2) {
  1878. if (drm1.keySystem == drm2.keySystem) {
  1879. const initDataMap = new Map();
  1880. const bothInitDatas = (drm1.initData || [])
  1881. .concat(drm2.initData || []);
  1882. for (const d of bothInitDatas) {
  1883. initDataMap.set(d.keyId, d);
  1884. }
  1885. const initData = Array.from(initDataMap.values());
  1886. const keyIds = drm1.keyIds && drm2.keyIds ?
  1887. new Set([...drm1.keyIds, ...drm2.keyIds]) :
  1888. drm1.keyIds || drm2.keyIds;
  1889. const mergedDrm = {
  1890. keySystem: drm1.keySystem,
  1891. licenseServerUri: drm1.licenseServerUri || drm2.licenseServerUri,
  1892. distinctiveIdentifierRequired: drm1.distinctiveIdentifierRequired ||
  1893. drm2.distinctiveIdentifierRequired,
  1894. persistentStateRequired: drm1.persistentStateRequired ||
  1895. drm2.persistentStateRequired,
  1896. videoRobustness: drm1.videoRobustness || drm2.videoRobustness,
  1897. audioRobustness: drm1.audioRobustness || drm2.audioRobustness,
  1898. serverCertificate: drm1.serverCertificate || drm2.serverCertificate,
  1899. serverCertificateUri: drm1.serverCertificateUri ||
  1900. drm2.serverCertificateUri,
  1901. initData,
  1902. keyIds,
  1903. };
  1904. commonDrms.push(mergedDrm);
  1905. break;
  1906. }
  1907. }
  1908. }
  1909. return commonDrms;
  1910. }
  1911. /**
  1912. * Concat the audio and video drmInfos in a variant.
  1913. * @param {shaka.extern.Variant} variant
  1914. * @return {!Array.<!shaka.extern.DrmInfo>}
  1915. * @private
  1916. */
  1917. getVariantDrmInfos_(variant) {
  1918. const videoDrmInfos = variant.video ? variant.video.drmInfos : [];
  1919. const audioDrmInfos = variant.audio ? variant.audio.drmInfos : [];
  1920. return videoDrmInfos.concat(audioDrmInfos);
  1921. }
  1922. /**
  1923. * Called in an interval timer to poll the expiration times of the sessions.
  1924. * We don't get an event from EME when the expiration updates, so we poll it
  1925. * so we can fire an event when it happens.
  1926. * @private
  1927. */
  1928. pollExpiration_() {
  1929. this.activeSessions_.forEach((metadata, session) => {
  1930. const oldTime = metadata.oldExpiration;
  1931. let newTime = session.expiration;
  1932. if (isNaN(newTime)) {
  1933. newTime = Infinity;
  1934. }
  1935. if (newTime != oldTime) {
  1936. this.playerInterface_.onExpirationUpdated(session.sessionId, newTime);
  1937. metadata.oldExpiration = newTime;
  1938. }
  1939. });
  1940. }
  1941. /**
  1942. * @return {boolean}
  1943. * @private
  1944. */
  1945. areAllSessionsLoaded_() {
  1946. const metadatas = this.activeSessions_.values();
  1947. return shaka.util.Iterables.every(metadatas, (data) => data.loaded);
  1948. }
  1949. /**
  1950. * @return {boolean}
  1951. * @private
  1952. */
  1953. areAllKeysUsable_() {
  1954. const keyIds = (this.currentDrmInfo_ && this.currentDrmInfo_.keyIds) ||
  1955. new Set([]);
  1956. for (const keyId of keyIds) {
  1957. const status = this.keyStatusByKeyId_.get(keyId);
  1958. if (status !== 'usable') {
  1959. return false;
  1960. }
  1961. }
  1962. return true;
  1963. }
  1964. /**
  1965. * Replace the drm info used in each variant in |variants| to reflect each
  1966. * key service in |keySystems|.
  1967. *
  1968. * @param {!Array.<shaka.extern.Variant>} variants
  1969. * @param {!Map.<string, string>} keySystems
  1970. * @private
  1971. */
  1972. static replaceDrmInfo_(variants, keySystems) {
  1973. const drmInfos = [];
  1974. keySystems.forEach((uri, keySystem) => {
  1975. drmInfos.push({
  1976. keySystem: keySystem,
  1977. licenseServerUri: uri,
  1978. distinctiveIdentifierRequired: false,
  1979. persistentStateRequired: false,
  1980. audioRobustness: '',
  1981. videoRobustness: '',
  1982. serverCertificate: null,
  1983. serverCertificateUri: '',
  1984. initData: [],
  1985. keyIds: new Set(),
  1986. });
  1987. });
  1988. for (const variant of variants) {
  1989. if (variant.video) {
  1990. variant.video.drmInfos = drmInfos;
  1991. }
  1992. if (variant.audio) {
  1993. variant.audio.drmInfos = drmInfos;
  1994. }
  1995. }
  1996. }
  1997. /**
  1998. * Creates a DrmInfo object describing the settings used to initialize the
  1999. * engine.
  2000. *
  2001. * @param {string} keySystem
  2002. * @param {!Array.<shaka.extern.DrmInfo>} drmInfos
  2003. * @return {shaka.extern.DrmInfo}
  2004. *
  2005. * @private
  2006. */
  2007. createDrmInfoByInfos_(keySystem, drmInfos) {
  2008. /** @type {!Array.<string>} */
  2009. const encryptionSchemes = [];
  2010. /** @type {!Array.<string>} */
  2011. const licenseServers = [];
  2012. /** @type {!Array.<string>} */
  2013. const serverCertificateUris = [];
  2014. /** @type {!Array.<!Uint8Array>} */
  2015. const serverCerts = [];
  2016. /** @type {!Array.<!shaka.extern.InitDataOverride>} */
  2017. const initDatas = [];
  2018. /** @type {!Set.<string>} */
  2019. const keyIds = new Set();
  2020. shaka.media.DrmEngine.processDrmInfos_(
  2021. drmInfos, encryptionSchemes, licenseServers, serverCerts,
  2022. serverCertificateUris, initDatas, keyIds);
  2023. if (encryptionSchemes.length > 1) {
  2024. shaka.log.warning('Multiple unique encryption schemes found! ' +
  2025. 'Only the first will be used.');
  2026. }
  2027. if (serverCerts.length > 1) {
  2028. shaka.log.warning('Multiple unique server certificates found! ' +
  2029. 'Only the first will be used.');
  2030. }
  2031. if (licenseServers.length > 1) {
  2032. shaka.log.warning('Multiple unique license server URIs found! ' +
  2033. 'Only the first will be used.');
  2034. }
  2035. if (serverCertificateUris.length > 1) {
  2036. shaka.log.warning('Multiple unique server certificate URIs found! ' +
  2037. 'Only the first will be used.');
  2038. }
  2039. const defaultSessionType =
  2040. this.usePersistentLicenses_ ? 'persistent-license' : 'temporary';
  2041. /** @type {shaka.extern.DrmInfo} */
  2042. const res = {
  2043. keySystem,
  2044. encryptionScheme: encryptionSchemes[0],
  2045. licenseServerUri: licenseServers[0],
  2046. distinctiveIdentifierRequired: drmInfos[0].distinctiveIdentifierRequired,
  2047. persistentStateRequired: drmInfos[0].persistentStateRequired,
  2048. sessionType: drmInfos[0].sessionType || defaultSessionType,
  2049. audioRobustness: drmInfos[0].audioRobustness || '',
  2050. videoRobustness: drmInfos[0].videoRobustness || '',
  2051. serverCertificate: serverCerts[0],
  2052. serverCertificateUri: serverCertificateUris[0],
  2053. initData: initDatas,
  2054. keyIds,
  2055. };
  2056. for (const info of drmInfos) {
  2057. if (info.distinctiveIdentifierRequired) {
  2058. res.distinctiveIdentifierRequired = info.distinctiveIdentifierRequired;
  2059. }
  2060. if (info.persistentStateRequired) {
  2061. res.persistentStateRequired = info.persistentStateRequired;
  2062. }
  2063. }
  2064. return res;
  2065. }
  2066. /**
  2067. * Creates a DrmInfo object describing the settings used to initialize the
  2068. * engine.
  2069. *
  2070. * @param {string} keySystem
  2071. * @param {MediaKeySystemConfiguration} config
  2072. * @return {shaka.extern.DrmInfo}
  2073. *
  2074. * @private
  2075. */
  2076. static createDrmInfoByConfigs_(keySystem, config) {
  2077. /** @type {!Array.<string>} */
  2078. const encryptionSchemes = [];
  2079. /** @type {!Array.<string>} */
  2080. const licenseServers = [];
  2081. /** @type {!Array.<string>} */
  2082. const serverCertificateUris = [];
  2083. /** @type {!Array.<!Uint8Array>} */
  2084. const serverCerts = [];
  2085. /** @type {!Array.<!shaka.extern.InitDataOverride>} */
  2086. const initDatas = [];
  2087. /** @type {!Set.<string>} */
  2088. const keyIds = new Set();
  2089. // TODO: refactor, don't stick drmInfos onto MediaKeySystemConfiguration
  2090. shaka.media.DrmEngine.processDrmInfos_(
  2091. config['drmInfos'], encryptionSchemes, licenseServers, serverCerts,
  2092. serverCertificateUris, initDatas, keyIds);
  2093. if (encryptionSchemes.length > 1) {
  2094. shaka.log.warning('Multiple unique encryption schemes found! ' +
  2095. 'Only the first will be used.');
  2096. }
  2097. if (serverCerts.length > 1) {
  2098. shaka.log.warning('Multiple unique server certificates found! ' +
  2099. 'Only the first will be used.');
  2100. }
  2101. if (serverCertificateUris.length > 1) {
  2102. shaka.log.warning('Multiple unique server certificate URIs found! ' +
  2103. 'Only the first will be used.');
  2104. }
  2105. if (licenseServers.length > 1) {
  2106. shaka.log.warning('Multiple unique license server URIs found! ' +
  2107. 'Only the first will be used.');
  2108. }
  2109. // TODO: This only works when all DrmInfo have the same robustness.
  2110. const audioRobustness =
  2111. config.audioCapabilities ? config.audioCapabilities[0].robustness : '';
  2112. const videoRobustness =
  2113. config.videoCapabilities ? config.videoCapabilities[0].robustness : '';
  2114. const distinctiveIdentifier = config.distinctiveIdentifier;
  2115. return {
  2116. keySystem,
  2117. encryptionScheme: encryptionSchemes[0],
  2118. licenseServerUri: licenseServers[0],
  2119. distinctiveIdentifierRequired: (distinctiveIdentifier == 'required'),
  2120. persistentStateRequired: (config.persistentState == 'required'),
  2121. sessionType: config.sessionTypes[0] || 'temporary',
  2122. audioRobustness: audioRobustness || '',
  2123. videoRobustness: videoRobustness || '',
  2124. serverCertificate: serverCerts[0],
  2125. serverCertificateUri: serverCertificateUris[0],
  2126. initData: initDatas,
  2127. keyIds,
  2128. };
  2129. }
  2130. /**
  2131. * Extract license server, server cert, and init data from |drmInfos|, taking
  2132. * care to eliminate duplicates.
  2133. *
  2134. * @param {!Array.<shaka.extern.DrmInfo>} drmInfos
  2135. * @param {!Array.<string>} licenseServers
  2136. * @param {!Array.<string>} encryptionSchemes
  2137. * @param {!Array.<!Uint8Array>} serverCerts
  2138. * @param {!Array.<string>} serverCertificateUris
  2139. * @param {!Array.<!shaka.extern.InitDataOverride>} initDatas
  2140. * @param {!Set.<string>} keyIds
  2141. * @private
  2142. */
  2143. static processDrmInfos_(
  2144. drmInfos, encryptionSchemes, licenseServers, serverCerts,
  2145. serverCertificateUris, initDatas, keyIds) {
  2146. /** @type {function(shaka.extern.InitDataOverride,
  2147. * shaka.extern.InitDataOverride):boolean} */
  2148. const initDataOverrideEqual = (a, b) => {
  2149. if (a.keyId && a.keyId == b.keyId) {
  2150. // Two initDatas with the same keyId are considered to be the same,
  2151. // unless that "same keyId" is null.
  2152. return true;
  2153. }
  2154. return a.initDataType == b.initDataType &&
  2155. shaka.util.BufferUtils.equal(a.initData, b.initData);
  2156. };
  2157. const clearkeyDataStart = 'data:application/json;base64,';
  2158. const clearKeyLicenseServers = [];
  2159. for (const drmInfo of drmInfos) {
  2160. // Build an array of unique encryption schemes.
  2161. if (!encryptionSchemes.includes(drmInfo.encryptionScheme)) {
  2162. encryptionSchemes.push(drmInfo.encryptionScheme);
  2163. }
  2164. // Build an array of unique license servers.
  2165. if (drmInfo.keySystem == 'org.w3.clearkey' &&
  2166. drmInfo.licenseServerUri.startsWith(clearkeyDataStart)) {
  2167. if (!clearKeyLicenseServers.includes(drmInfo.licenseServerUri)) {
  2168. clearKeyLicenseServers.push(drmInfo.licenseServerUri);
  2169. }
  2170. } else if (!licenseServers.includes(drmInfo.licenseServerUri)) {
  2171. licenseServers.push(drmInfo.licenseServerUri);
  2172. }
  2173. // Build an array of unique license servers.
  2174. if (!serverCertificateUris.includes(drmInfo.serverCertificateUri)) {
  2175. serverCertificateUris.push(drmInfo.serverCertificateUri);
  2176. }
  2177. // Build an array of unique server certs.
  2178. if (drmInfo.serverCertificate) {
  2179. const found = serverCerts.some(
  2180. (cert) => shaka.util.BufferUtils.equal(
  2181. cert, drmInfo.serverCertificate));
  2182. if (!found) {
  2183. serverCerts.push(drmInfo.serverCertificate);
  2184. }
  2185. }
  2186. // Build an array of unique init datas.
  2187. if (drmInfo.initData) {
  2188. for (const initDataOverride of drmInfo.initData) {
  2189. const found = initDatas.some(
  2190. (initData) =>
  2191. initDataOverrideEqual(initData, initDataOverride));
  2192. if (!found) {
  2193. initDatas.push(initDataOverride);
  2194. }
  2195. }
  2196. }
  2197. if (drmInfo.keyIds) {
  2198. for (const keyId of drmInfo.keyIds) {
  2199. keyIds.add(keyId);
  2200. }
  2201. }
  2202. }
  2203. if (clearKeyLicenseServers.length == 1) {
  2204. licenseServers.push(clearKeyLicenseServers[0]);
  2205. } else if (clearKeyLicenseServers.length > 0) {
  2206. const keys = [];
  2207. for (const clearKeyLicenseServer of clearKeyLicenseServers) {
  2208. const license = window.atob(
  2209. clearKeyLicenseServer.split(clearkeyDataStart).pop());
  2210. const jwkSet = /** @type {{keys: !Array}} */(JSON.parse(license));
  2211. keys.push(...jwkSet.keys);
  2212. }
  2213. const newJwkSet = {keys: keys};
  2214. const newLicense = JSON.stringify(newJwkSet);
  2215. licenseServers.push(clearkeyDataStart + window.btoa(newLicense));
  2216. }
  2217. }
  2218. /**
  2219. * Use |servers| and |advancedConfigs| to fill in missing values in drmInfo
  2220. * that the parser left blank. Before working with any drmInfo, it should be
  2221. * passed through here as it is uncommon for drmInfo to be complete when
  2222. * fetched from a manifest because most manifest formats do not have the
  2223. * required information. Also applies the key systems mapping.
  2224. *
  2225. * @param {shaka.extern.DrmInfo} drmInfo
  2226. * @param {!Map.<string, string>} servers
  2227. * @param {!Map.<string, shaka.extern.AdvancedDrmConfiguration>}
  2228. * advancedConfigs
  2229. * @param {!Object.<string, string>} keySystemsMapping
  2230. * @private
  2231. */
  2232. static fillInDrmInfoDefaults_(drmInfo, servers, advancedConfigs,
  2233. keySystemsMapping) {
  2234. const originalKeySystem = drmInfo.keySystem;
  2235. if (!originalKeySystem) {
  2236. // This is a placeholder from the manifest parser for an unrecognized key
  2237. // system. Skip this entry, to avoid logging nonsensical errors.
  2238. return;
  2239. }
  2240. // The order of preference for drmInfo:
  2241. // 1. Clear Key config, used for debugging, should override everything else.
  2242. // (The application can still specify a clearkey license server.)
  2243. // 2. Application-configured servers, if any are present, should override
  2244. // anything from the manifest. Nuance: if key system A is in the
  2245. // manifest and key system B is in the player config, only B will be
  2246. // used, not A.
  2247. // 3. Manifest-provided license servers are only used if nothing else is
  2248. // specified.
  2249. // This is important because it allows the application a clear way to
  2250. // indicate which DRM systems should be used on platforms with multiple DRM
  2251. // systems.
  2252. // The only way to get license servers from the manifest is not to specify
  2253. // any in your player config.
  2254. if (originalKeySystem == 'org.w3.clearkey' && drmInfo.licenseServerUri) {
  2255. // Preference 1: Clear Key with pre-configured keys will have a data URI
  2256. // assigned as its license server. Don't change anything.
  2257. return;
  2258. } else if (servers.size) {
  2259. // Preference 2: If anything is configured at the application level,
  2260. // override whatever was in the manifest.
  2261. const server = servers.get(originalKeySystem) || '';
  2262. drmInfo.licenseServerUri = server;
  2263. } else {
  2264. // Preference 3: Keep whatever we had in drmInfo.licenseServerUri, which
  2265. // comes from the manifest.
  2266. }
  2267. if (!drmInfo.keyIds) {
  2268. drmInfo.keyIds = new Set();
  2269. }
  2270. const advancedConfig = advancedConfigs.get(originalKeySystem);
  2271. if (advancedConfig) {
  2272. if (!drmInfo.distinctiveIdentifierRequired) {
  2273. drmInfo.distinctiveIdentifierRequired =
  2274. advancedConfig.distinctiveIdentifierRequired;
  2275. }
  2276. if (!drmInfo.persistentStateRequired) {
  2277. drmInfo.persistentStateRequired =
  2278. advancedConfig.persistentStateRequired;
  2279. }
  2280. if (!drmInfo.videoRobustness) {
  2281. drmInfo.videoRobustness = advancedConfig.videoRobustness;
  2282. }
  2283. if (!drmInfo.audioRobustness) {
  2284. drmInfo.audioRobustness = advancedConfig.audioRobustness;
  2285. }
  2286. if (!drmInfo.serverCertificate) {
  2287. drmInfo.serverCertificate = advancedConfig.serverCertificate;
  2288. }
  2289. if (advancedConfig.sessionType) {
  2290. drmInfo.sessionType = advancedConfig.sessionType;
  2291. }
  2292. if (!drmInfo.serverCertificateUri) {
  2293. drmInfo.serverCertificateUri = advancedConfig.serverCertificateUri;
  2294. }
  2295. }
  2296. if (keySystemsMapping[originalKeySystem]) {
  2297. drmInfo.keySystem = keySystemsMapping[originalKeySystem];
  2298. }
  2299. // Chromecast has a variant of PlayReady that uses a different key
  2300. // system ID. Since manifest parsers convert the standard PlayReady
  2301. // UUID to the standard PlayReady key system ID, here we will switch
  2302. // to the Chromecast version if we are running on that platform.
  2303. // Note that this must come after fillInDrmInfoDefaults_, since the
  2304. // player config uses the standard PlayReady ID for license server
  2305. // configuration.
  2306. if (window.cast && window.cast.__platform__) {
  2307. if (originalKeySystem == 'com.microsoft.playready') {
  2308. drmInfo.keySystem = 'com.chromecast.playready';
  2309. }
  2310. }
  2311. }
  2312. /**
  2313. * Parse pssh from a media segment and announce new initData
  2314. *
  2315. * @param {shaka.util.ManifestParserUtils.ContentType} contentType
  2316. * @param {!BufferSource} mediaSegment
  2317. * @return {!Promise<void>}
  2318. */
  2319. parseInbandPssh(contentType, mediaSegment) {
  2320. if (!this.config_.parseInbandPsshEnabled || this.manifestInitData_) {
  2321. return Promise.resolve();
  2322. }
  2323. const ContentType = shaka.util.ManifestParserUtils.ContentType;
  2324. if (![ContentType.AUDIO, ContentType.VIDEO].includes(contentType)) {
  2325. return Promise.resolve();
  2326. }
  2327. const pssh = new shaka.util.Pssh(
  2328. shaka.util.BufferUtils.toUint8(mediaSegment));
  2329. let totalLength = 0;
  2330. for (const data of pssh.data) {
  2331. totalLength += data.length;
  2332. }
  2333. if (totalLength == 0) {
  2334. return Promise.resolve();
  2335. }
  2336. const combinedData = new Uint8Array(totalLength);
  2337. let pos = 0;
  2338. for (const data of pssh.data) {
  2339. combinedData.set(data, pos);
  2340. pos += data.length;
  2341. }
  2342. this.newInitData('cenc', combinedData);
  2343. return this.allSessionsLoaded_;
  2344. }
  2345. /**
  2346. * A method for generating a key for the MediaKeySystemAccessRequests cache.
  2347. *
  2348. * @param {string} videoCodec
  2349. * @param {string} audioCodec
  2350. * @param {string} keySystem
  2351. * @return {string}
  2352. * @private
  2353. */
  2354. static generateKeySystemCacheKey_(videoCodec, audioCodec, keySystem) {
  2355. return `${videoCodec}#${audioCodec}#${keySystem}`;
  2356. }
  2357. /**
  2358. * Check does MediaKeySystemAccess cache contains something for following
  2359. * attributes.
  2360. *
  2361. * @param {string} videoCodec
  2362. * @param {string} audioCodec
  2363. * @param {string} keySystem
  2364. * @return {boolean}
  2365. */
  2366. static hasMediaKeySystemAccess(videoCodec, audioCodec, keySystem) {
  2367. const DrmEngine = shaka.media.DrmEngine;
  2368. const key = DrmEngine.generateKeySystemCacheKey_(
  2369. videoCodec, audioCodec, keySystem);
  2370. return DrmEngine.memoizedMediaKeySystemAccessRequests_.has(key);
  2371. }
  2372. /**
  2373. * Get MediaKeySystemAccess object for following attributes.
  2374. *
  2375. * @param {string} videoCodec
  2376. * @param {string} audioCodec
  2377. * @param {string} keySystem
  2378. * @return {?MediaKeySystemAccess}
  2379. */
  2380. static getMediaKeySystemAccess(videoCodec, audioCodec, keySystem) {
  2381. const DrmEngine = shaka.media.DrmEngine;
  2382. const key = DrmEngine.generateKeySystemCacheKey_(
  2383. videoCodec, audioCodec, keySystem);
  2384. return DrmEngine.memoizedMediaKeySystemAccessRequests_.get(key) || null;
  2385. }
  2386. /**
  2387. * Store MediaKeySystemAccess object associated with specified attributes.
  2388. *
  2389. * @param {string} videoCodec
  2390. * @param {string} audioCodec
  2391. * @param {string} keySystem
  2392. * @param {!MediaKeySystemAccess} mksa
  2393. */
  2394. static setMediaKeySystemAccess(videoCodec, audioCodec, keySystem, mksa) {
  2395. const DrmEngine = shaka.media.DrmEngine;
  2396. const key = DrmEngine.generateKeySystemCacheKey_(
  2397. videoCodec, audioCodec, keySystem);
  2398. return DrmEngine.memoizedMediaKeySystemAccessRequests_.set(key, mksa);
  2399. }
  2400. /**
  2401. * Clears underlying cache.
  2402. */
  2403. static clearMediaKeySystemAccessMap() {
  2404. const DrmEngine = shaka.media.DrmEngine;
  2405. DrmEngine.memoizedMediaKeySystemAccessRequests_.clear();
  2406. }
  2407. };
  2408. /**
  2409. * @typedef {{
  2410. * loaded: boolean,
  2411. * initData: Uint8Array,
  2412. * initDataType: ?string,
  2413. * oldExpiration: number,
  2414. * type: string,
  2415. * updatePromise: shaka.util.PublicPromise
  2416. * }}
  2417. *
  2418. * @description A record to track sessions and suppress duplicate init data.
  2419. * @property {boolean} loaded
  2420. * True once the key status has been updated (to a non-pending state). This
  2421. * does not mean the session is 'usable'.
  2422. * @property {Uint8Array} initData
  2423. * The init data used to create the session.
  2424. * @property {?string} initDataType
  2425. * The init data type used to create the session.
  2426. * @property {!MediaKeySession} session
  2427. * The session object.
  2428. * @property {number} oldExpiration
  2429. * The expiration of the session on the last check. This is used to fire
  2430. * an event when it changes.
  2431. * @property {string} type
  2432. * The session type
  2433. * @property {shaka.util.PublicPromise} updatePromise
  2434. * An optional Promise that will be resolved/rejected on the next update()
  2435. * call. This is used to track the 'license-release' message when calling
  2436. * remove().
  2437. */
  2438. shaka.media.DrmEngine.SessionMetaData;
  2439. /**
  2440. * @typedef {{
  2441. * netEngine: !shaka.net.NetworkingEngine,
  2442. * onError: function(!shaka.util.Error),
  2443. * onKeyStatus: function(!Object.<string,string>),
  2444. * onExpirationUpdated: function(string,number),
  2445. * onEvent: function(!Event)
  2446. * }}
  2447. *
  2448. * @property {shaka.net.NetworkingEngine} netEngine
  2449. * The NetworkingEngine instance to use. The caller retains ownership.
  2450. * @property {function(!shaka.util.Error)} onError
  2451. * Called when an error occurs. If the error is recoverable (see
  2452. * {@link shaka.util.Error}) then the caller may invoke either
  2453. * StreamingEngine.switch*() or StreamingEngine.seeked() to attempt recovery.
  2454. * @property {function(!Object.<string,string>)} onKeyStatus
  2455. * Called when key status changes. The argument is a map of hex key IDs to
  2456. * statuses.
  2457. * @property {function(string,number)} onExpirationUpdated
  2458. * Called when the session expiration value changes.
  2459. * @property {function(!Event)} onEvent
  2460. * Called when an event occurs that should be sent to the app.
  2461. */
  2462. shaka.media.DrmEngine.PlayerInterface;
  2463. /**
  2464. * The amount of time, in seconds, we wait to consider a session closed.
  2465. * This allows us to work around Chrome bug https://crbug.com/1108158.
  2466. * @private {number}
  2467. */
  2468. shaka.media.DrmEngine.CLOSE_TIMEOUT_ = 1;
  2469. /**
  2470. * The amount of time, in seconds, we wait to consider session loaded even if no
  2471. * key status information is available. This allows us to support browsers/CDMs
  2472. * without key statuses.
  2473. * @private {number}
  2474. */
  2475. shaka.media.DrmEngine.SESSION_LOAD_TIMEOUT_ = 5;
  2476. /**
  2477. * The amount of time, in seconds, we wait to batch up rapid key status changes.
  2478. * This allows us to avoid multiple expiration events in most cases.
  2479. * @type {number}
  2480. */
  2481. shaka.media.DrmEngine.KEY_STATUS_BATCH_TIME = 0.5;
  2482. /**
  2483. * Contains the suggested "default" key ID used by EME polyfills that do not
  2484. * have a per-key key status. See w3c/encrypted-media#32.
  2485. * @type {!shaka.util.Lazy.<!ArrayBuffer>}
  2486. */
  2487. shaka.media.DrmEngine.DUMMY_KEY_ID = new shaka.util.Lazy(
  2488. () => shaka.util.BufferUtils.toArrayBuffer(new Uint8Array([0])));
  2489. /**
  2490. * A cache that stores the MediaKeySystemAccess result of calling
  2491. * `navigator.requestMediaKeySystemAccess` by a key combination of
  2492. * video/audio codec and key system string.
  2493. *
  2494. * @private {!Map<string, !MediaKeySystemAccess>}
  2495. */
  2496. shaka.media.DrmEngine.memoizedMediaKeySystemAccessRequests_ = new Map();