blob: 38fddfc9e9a0d357c8000718aa4ca9f07de5afb5 [file] [log] [blame]
// Copyright 2013 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
// TODO(sandersd): Refactor to remove recomputed codec arrays, and generally
// shorten and improve coverage.
// - http://crbug.com/417444
// - http://crbug.com/457438
// TODO(sandersd): Add tests to cover codec vectors with empty items.
// http://crbug.com/417461
#include <string>
#include <vector>
#include "base/logging.h"
#include "cobalt/media/base/eme_constants.h"
#include "cobalt/media/base/key_systems.h"
#include "cobalt/media/base/media.h"
#include "cobalt/media/base/media_client.h"
#include "testing/gtest/include/gtest/gtest.h"
namespace cobalt {
namespace media {
// These are the (fake) key systems that are registered for these tests.
// kUsesAes uses the AesDecryptor like Clear Key.
// kExternal uses an external CDM, such as Pepper-based or Android platform CDM.
const char kUsesAes[] = "x-org.example.clear";
const char kUseAesNameForUMA[] = "UseAes";
const char kExternal[] = "x-com.example.test";
const char kExternalNameForUMA[] = "External";
const char kClearKey[] = "org.w3.clearkey";
const char kExternalClearKey[] = "org.chromium.externalclearkey";
const char kAudioWebM[] = "audio/webm";
const char kVideoWebM[] = "video/webm";
const char kAudioFoo[] = "audio/foo";
const char kVideoFoo[] = "video/foo";
// Pick some arbitrary bit fields as long as they are not in conflict with the
// real ones.
enum TestCodec {
TEST_CODEC_FOO_AUDIO = 1 << 10, // An audio codec for foo container.
TEST_CODEC_FOO_AUDIO_ALL = TEST_CODEC_FOO_AUDIO,
TEST_CODEC_FOO_VIDEO = 1 << 11, // A video codec for foo container.
TEST_CODEC_FOO_VIDEO_ALL = TEST_CODEC_FOO_VIDEO,
TEST_CODEC_FOO_ALL = TEST_CODEC_FOO_AUDIO_ALL | TEST_CODEC_FOO_VIDEO_ALL
};
static_assert((TEST_CODEC_FOO_ALL & EME_CODEC_ALL) == EME_CODEC_NONE,
"test codec masks should only use invalid codec masks");
class TestKeySystemProperties : public KeySystemProperties {
public:
bool IsSupportedInitDataType(EmeInitDataType init_data_type) const override {
return init_data_type == EmeInitDataType::WEBM;
}
SupportedCodecs GetSupportedCodecs() const override {
return EME_CODEC_WEBM_ALL | TEST_CODEC_FOO_ALL;
}
EmeConfigRule GetRobustnessConfigRule(
EmeMediaType media_type,
const std::string& requested_robustness) const override {
return requested_robustness.empty() ? EmeConfigRule::SUPPORTED
: EmeConfigRule::NOT_SUPPORTED;
}
EmeSessionTypeSupport GetPersistentReleaseMessageSessionSupport()
const override {
return EmeSessionTypeSupport::NOT_SUPPORTED;
}
};
class AesKeySystemProperties : public TestKeySystemProperties {
public:
explicit AesKeySystemProperties(const std::string& name) : name_(name) {}
std::string GetKeySystemName() const override { return name_; }
EmeSessionTypeSupport GetPersistentLicenseSessionSupport() const override {
return EmeSessionTypeSupport::NOT_SUPPORTED;
}
EmeFeatureSupport GetPersistentStateSupport() const override {
return EmeFeatureSupport::NOT_SUPPORTED;
}
EmeFeatureSupport GetDistinctiveIdentifierSupport() const override {
return EmeFeatureSupport::NOT_SUPPORTED;
}
bool UseAesDecryptor() const override { return true; }
private:
std::string name_;
};
class ExternalKeySystemProperties : public TestKeySystemProperties {
public:
std::string GetKeySystemName() const override { return kExternal; }
EmeSessionTypeSupport GetPersistentLicenseSessionSupport() const override {
return EmeSessionTypeSupport::SUPPORTED;
}
EmeFeatureSupport GetPersistentStateSupport() const override {
return EmeFeatureSupport::ALWAYS_ENABLED;
}
EmeFeatureSupport GetDistinctiveIdentifierSupport() const override {
return EmeFeatureSupport::ALWAYS_ENABLED;
}
std::string GetPepperType() const override {
return "application/x-ppapi-external-cdm";
}
};
// Adapt IsSupportedKeySystemWithMediaMimeType() to the new API,
// IsSupportedCodecCombination().
static bool IsSupportedKeySystemWithMediaMimeType(
const std::string& mime_type, const std::vector<std::string>& codecs,
const std::string& key_system) {
return (KeySystems::GetInstance()->GetContentTypeConfigRule(
key_system, EmeMediaType::VIDEO, mime_type, codecs) !=
EmeConfigRule::NOT_SUPPORTED);
}
static bool IsSupportedKeySystemWithAudioMimeType(
const std::string& mime_type, const std::vector<std::string>& codecs,
const std::string& key_system) {
return (KeySystems::GetInstance()->GetContentTypeConfigRule(
key_system, EmeMediaType::AUDIO, mime_type, codecs) !=
EmeConfigRule::NOT_SUPPORTED);
}
static bool IsSupportedKeySystem(const std::string& key_system) {
return KeySystems::GetInstance()->IsSupportedKeySystem(key_system);
}
// Adds test container and codec masks.
// This function must be called after SetMediaClient() if a MediaClient will be
// provided.
// More details: AddXxxMask() will create KeySystems if it hasn't been created.
// During KeySystems's construction GetMediaClient() will be used to add key
// systems. In test code, the MediaClient is set by SetMediaClient().
// Therefore, SetMediaClient() must be called before this function to make sure
// MediaClient in effect when constructing KeySystems.
static void AddContainerAndCodecMasksForTest() {
// Since KeySystems is a singleton. Make sure we only add test container and
// codec masks once per process.
static bool is_test_masks_added = false;
if (is_test_masks_added) return;
AddCodecMask(EmeMediaType::AUDIO, "fooaudio", TEST_CODEC_FOO_AUDIO);
AddCodecMask(EmeMediaType::VIDEO, "foovideo", TEST_CODEC_FOO_VIDEO);
AddMimeTypeCodecMask("audio/foo", TEST_CODEC_FOO_AUDIO_ALL);
AddMimeTypeCodecMask("video/foo", TEST_CODEC_FOO_VIDEO_ALL);
is_test_masks_added = true;
}
static bool CanRunExternalKeySystemTests() {
#if defined(OS_ANDROID)
if (HasPlatformDecoderSupport()) return true;
EXPECT_FALSE(IsSupportedKeySystem(kExternal));
return false;
#else
return true;
#endif
}
class TestMediaClient : public MediaClient {
public:
TestMediaClient();
~TestMediaClient() OVERRIDE;
// MediaClient implementation.
void AddKeySystemsInfoForUMA(
std::vector<KeySystemInfoForUMA>* key_systems_info_for_uma) final;
bool IsKeySystemsUpdateNeeded() final;
void AddSupportedKeySystems(std::vector<std::unique_ptr<KeySystemProperties>>*
key_systems_properties) OVERRIDE;
void RecordRapporURL(const std::string& metric, const GURL& url) final;
bool IsSupportedVideoConfig(media::VideoCodec codec,
media::VideoCodecProfile profile,
int level) final;
// Helper function to test the case where IsKeySystemsUpdateNeeded() is true
// after AddSupportedKeySystems() is called.
void SetKeySystemsUpdateNeeded();
// Helper function to disable "kExternal" key system support so that we can
// test the key system update case.
void DisableExternalKeySystemSupport();
private:
bool is_update_needed_;
bool supports_external_key_system_;
};
TestMediaClient::TestMediaClient()
: is_update_needed_(true), supports_external_key_system_(true) {}
TestMediaClient::~TestMediaClient() {}
void TestMediaClient::AddKeySystemsInfoForUMA(
std::vector<KeySystemInfoForUMA>* key_systems_info_for_uma) {
key_systems_info_for_uma->push_back(
media::KeySystemInfoForUMA(kUsesAes, kUseAesNameForUMA));
key_systems_info_for_uma->push_back(
media::KeySystemInfoForUMA(kExternal, kExternalNameForUMA));
}
bool TestMediaClient::IsKeySystemsUpdateNeeded() { return is_update_needed_; }
void TestMediaClient::AddSupportedKeySystems(
std::vector<std::unique_ptr<KeySystemProperties>>* key_systems) {
DCHECK(is_update_needed_);
key_systems->emplace_back(new AesKeySystemProperties(kUsesAes));
if (supports_external_key_system_)
key_systems->emplace_back(new ExternalKeySystemProperties());
is_update_needed_ = false;
}
void TestMediaClient::RecordRapporURL(const std::string& /* metric */,
const GURL& /* url */) {
NOTIMPLEMENTED();
}
bool TestMediaClient::IsSupportedVideoConfig(media::VideoCodec codec,
media::VideoCodecProfile profile,
int level) {
return true;
}
void TestMediaClient::SetKeySystemsUpdateNeeded() { is_update_needed_ = true; }
void TestMediaClient::DisableExternalKeySystemSupport() {
supports_external_key_system_ = false;
}
class PotentiallySupportedNamesTestMediaClient : public TestMediaClient {
void AddSupportedKeySystems(std::vector<std::unique_ptr<KeySystemProperties>>*
key_systems_properties) final;
};
void PotentiallySupportedNamesTestMediaClient::AddSupportedKeySystems(
std::vector<std::unique_ptr<KeySystemProperties>>* key_systems) {
// org.w3.clearkey is automatically registered.
key_systems->emplace_back(new AesKeySystemProperties("com.widevine.alpha"));
key_systems->emplace_back(
new AesKeySystemProperties("org.chromium.externalclearkey"));
key_systems->emplace_back(
new AesKeySystemProperties("org.chromium.externalclearkey.something"));
key_systems->emplace_back(
new AesKeySystemProperties("com.chromecast.something"));
key_systems->emplace_back(new AesKeySystemProperties("x-something"));
}
class KeySystemsPotentiallySupportedNamesTest : public testing::Test {
protected:
KeySystemsPotentiallySupportedNamesTest() {
SetMediaClient(&test_media_client_);
}
~KeySystemsPotentiallySupportedNamesTest() override {
// Clear the use of |test_media_client_|, which was set in SetUp().
SetMediaClient(NULL);
}
private:
PotentiallySupportedNamesTestMediaClient test_media_client_;
};
class KeySystemsTest : public testing::Test {
protected:
KeySystemsTest() {
vp8_codec_.push_back("vp8");
vp80_codec_.push_back("vp8.0");
vp9_codec_.push_back("vp9");
vp90_codec_.push_back("vp9.0");
vorbis_codec_.push_back("vorbis");
vp8_and_vorbis_codecs_.push_back("vp8");
vp8_and_vorbis_codecs_.push_back("vorbis");
vp9_and_vorbis_codecs_.push_back("vp9");
vp9_and_vorbis_codecs_.push_back("vorbis");
foovideo_codec_.push_back("foovideo");
foovideo_extended_codec_.push_back("foovideo.4D400C");
foovideo_dot_codec_.push_back("foovideo.");
fooaudio_codec_.push_back("fooaudio");
foovideo_and_fooaudio_codecs_.push_back("foovideo");
foovideo_and_fooaudio_codecs_.push_back("fooaudio");
unknown_codec_.push_back("unknown");
mixed_codecs_.push_back("vorbis");
mixed_codecs_.push_back("foovideo");
SetMediaClient(&test_media_client_);
}
void SetUp() override { AddContainerAndCodecMasksForTest(); }
~KeySystemsTest() override {
// Clear the use of |test_media_client_|, which was set in SetUp().
SetMediaClient(NULL);
}
void UpdateClientKeySystems() {
test_media_client_.SetKeySystemsUpdateNeeded();
test_media_client_.DisableExternalKeySystemSupport();
}
typedef std::vector<std::string> CodecVector;
const CodecVector& no_codecs() const { return no_codecs_; }
const CodecVector& vp8_codec() const { return vp8_codec_; }
const CodecVector& vp80_codec() const { return vp80_codec_; }
const CodecVector& vp9_codec() const { return vp9_codec_; }
const CodecVector& vp90_codec() const { return vp90_codec_; }
const CodecVector& vorbis_codec() const { return vorbis_codec_; }
const CodecVector& vp8_and_vorbis_codecs() const {
return vp8_and_vorbis_codecs_;
}
const CodecVector& vp9_and_vorbis_codecs() const {
return vp9_and_vorbis_codecs_;
}
const CodecVector& foovideo_codec() const { return foovideo_codec_; }
const CodecVector& foovideo_extended_codec() const {
return foovideo_extended_codec_;
}
const CodecVector& foovideo_dot_codec() const { return foovideo_dot_codec_; }
const CodecVector& fooaudio_codec() const { return fooaudio_codec_; }
const CodecVector& foovideo_and_fooaudio_codecs() const {
return foovideo_and_fooaudio_codecs_;
}
const CodecVector& unknown_codec() const { return unknown_codec_; }
const CodecVector& mixed_codecs() const { return mixed_codecs_; }
private:
const CodecVector no_codecs_;
CodecVector vp8_codec_;
CodecVector vp80_codec_;
CodecVector vp9_codec_;
CodecVector vp90_codec_;
CodecVector vorbis_codec_;
CodecVector vp8_and_vorbis_codecs_;
CodecVector vp9_and_vorbis_codecs_;
CodecVector foovideo_codec_;
CodecVector foovideo_extended_codec_;
CodecVector foovideo_dot_codec_;
CodecVector fooaudio_codec_;
CodecVector foovideo_and_fooaudio_codecs_;
CodecVector unknown_codec_;
CodecVector mixed_codecs_;
TestMediaClient test_media_client_;
};
// TODO(ddorwin): Consider moving GetPepperType() calls out to their own test.
TEST_F(KeySystemsTest, EmptyKeySystem) {
EXPECT_FALSE(IsSupportedKeySystem(std::string()));
EXPECT_EQ("Unknown", GetKeySystemNameForUMA(std::string()));
}
// Clear Key is the only key system registered in content.
TEST_F(KeySystemsTest, ClearKey) {
EXPECT_TRUE(IsSupportedKeySystem(kClearKey));
EXPECT_TRUE(IsSupportedKeySystemWithMediaMimeType(kVideoWebM, no_codecs(),
kClearKey));
EXPECT_EQ("ClearKey", GetKeySystemNameForUMA(kClearKey));
}
TEST_F(KeySystemsTest, ClearKeyWithInitDataType) {
EXPECT_TRUE(IsSupportedKeySystem(kClearKey));
EXPECT_TRUE(
IsSupportedKeySystemWithInitDataType(kClearKey, EmeInitDataType::WEBM));
EXPECT_TRUE(
IsSupportedKeySystemWithInitDataType(kClearKey, EmeInitDataType::KEYIDS));
// All other InitDataTypes are not supported.
EXPECT_FALSE(IsSupportedKeySystemWithInitDataType(kClearKey,
EmeInitDataType::UNKNOWN));
}
// The key system is not registered and therefore is unrecognized.
TEST_F(KeySystemsTest, Basic_UnrecognizedKeySystem) {
static const char* const kUnrecognized = "x-org.example.unrecognized";
EXPECT_FALSE(IsSupportedKeySystem(kUnrecognized));
EXPECT_EQ("Unknown", GetKeySystemNameForUMA(kUnrecognized));
EXPECT_FALSE(CanUseAesDecryptor(kUnrecognized));
#if defined(ENABLE_PEPPER_CDMS)
std::string type;
#if !defined(NDEBUG) || defined(DCHECK_ALWAYS_ON)
EXPECT_DEATH(type = GetPepperType(kUnrecognized),
"x-org.example.unrecognized is not a known system");
#endif
EXPECT_TRUE(type.empty());
#endif
}
TEST_F(KeySystemsTest, Basic_UsesAesDecryptor) {
EXPECT_TRUE(IsSupportedKeySystem(kUsesAes));
EXPECT_TRUE(
IsSupportedKeySystemWithMediaMimeType(kVideoWebM, no_codecs(), kUsesAes));
// No UMA value for this test key system.
EXPECT_EQ("UseAes", GetKeySystemNameForUMA(kUsesAes));
EXPECT_TRUE(CanUseAesDecryptor(kUsesAes));
#if defined(ENABLE_PEPPER_CDMS)
std::string type;
#if !defined(NDEBUG) || defined(DCHECK_ALWAYS_ON)
EXPECT_DEATH(type = GetPepperType(kUsesAes),
"x-org.example.clear is not Pepper-based");
#endif
EXPECT_TRUE(type.empty());
#endif
}
TEST_F(KeySystemsTest,
IsSupportedKeySystemWithMediaMimeType_UsesAesDecryptor_TypesContainer1) {
// Valid video types.
EXPECT_TRUE(
IsSupportedKeySystemWithMediaMimeType(kVideoWebM, vp8_codec(), kUsesAes));
EXPECT_TRUE(IsSupportedKeySystemWithMediaMimeType(kVideoWebM, vp80_codec(),
kUsesAes));
EXPECT_TRUE(
IsSupportedKeySystemWithMediaMimeType(kVideoWebM, vp9_codec(), kUsesAes));
EXPECT_TRUE(IsSupportedKeySystemWithMediaMimeType(kVideoWebM, vp90_codec(),
kUsesAes));
// Audio in a video container.
EXPECT_FALSE(IsSupportedKeySystemWithMediaMimeType(
kVideoWebM, vp8_and_vorbis_codecs(), kUsesAes));
EXPECT_FALSE(IsSupportedKeySystemWithMediaMimeType(
kVideoWebM, vp9_and_vorbis_codecs(), kUsesAes));
EXPECT_FALSE(IsSupportedKeySystemWithMediaMimeType(kVideoWebM, vorbis_codec(),
kUsesAes));
// Non-Webm codecs.
EXPECT_FALSE(IsSupportedKeySystemWithMediaMimeType(
kVideoWebM, foovideo_codec(), kUsesAes));
EXPECT_FALSE(IsSupportedKeySystemWithMediaMimeType(
kVideoWebM, unknown_codec(), kUsesAes));
EXPECT_FALSE(IsSupportedKeySystemWithMediaMimeType(kVideoWebM, mixed_codecs(),
kUsesAes));
// Valid audio types.
EXPECT_TRUE(
IsSupportedKeySystemWithAudioMimeType(kAudioWebM, no_codecs(), kUsesAes));
EXPECT_TRUE(IsSupportedKeySystemWithAudioMimeType(kAudioWebM, vorbis_codec(),
kUsesAes));
// Non-audio codecs.
EXPECT_FALSE(
IsSupportedKeySystemWithMediaMimeType(kAudioWebM, vp8_codec(), kUsesAes));
EXPECT_FALSE(IsSupportedKeySystemWithMediaMimeType(
kAudioWebM, vp8_and_vorbis_codecs(), kUsesAes));
EXPECT_FALSE(
IsSupportedKeySystemWithMediaMimeType(kAudioWebM, vp9_codec(), kUsesAes));
EXPECT_FALSE(IsSupportedKeySystemWithMediaMimeType(
kAudioWebM, vp9_and_vorbis_codecs(), kUsesAes));
// Non-Webm codec.
EXPECT_FALSE(IsSupportedKeySystemWithAudioMimeType(
kAudioWebM, fooaudio_codec(), kUsesAes));
}
TEST_F(KeySystemsTest, IsSupportedKeySystem_InvalidVariants) {
// Case sensitive.
EXPECT_FALSE(IsSupportedKeySystem("x-org.example.ClEaR"));
// TLDs are not allowed.
EXPECT_FALSE(IsSupportedKeySystem("org."));
EXPECT_FALSE(IsSupportedKeySystem("com"));
// Extra period.
EXPECT_FALSE(IsSupportedKeySystem("x-org.example.clear."));
// Prefix.
EXPECT_FALSE(IsSupportedKeySystem("x-org.example."));
EXPECT_FALSE(IsSupportedKeySystem("x-org.example"));
// Incomplete.
EXPECT_FALSE(IsSupportedKeySystem("x-org.example.clea"));
// Extra character.
EXPECT_FALSE(IsSupportedKeySystem("x-org.example.clearz"));
// There are no child key systems for UsesAes.
EXPECT_FALSE(IsSupportedKeySystem("x-org.example.clear.foo"));
}
TEST_F(KeySystemsTest, IsSupportedKeySystemWithMediaMimeType_NoType) {
EXPECT_FALSE(IsSupportedKeySystemWithMediaMimeType(std::string(), no_codecs(),
kUsesAes));
EXPECT_FALSE(IsSupportedKeySystemWithMediaMimeType(std::string(), no_codecs(),
"x-org.example.foo"));
EXPECT_FALSE(IsSupportedKeySystemWithMediaMimeType(
std::string(), no_codecs(), "x-org.example.clear.foo"));
}
// Tests the second registered container type.
// TODO(ddorwin): Combined with TypesContainer1 in a future CL.
TEST_F(KeySystemsTest,
IsSupportedKeySystemWithMediaMimeType_UsesAesDecryptor_TypesContainer2) {
// Valid video types.
EXPECT_TRUE(
IsSupportedKeySystemWithMediaMimeType(kVideoFoo, no_codecs(), kUsesAes));
EXPECT_TRUE(IsSupportedKeySystemWithMediaMimeType(kVideoFoo, foovideo_codec(),
kUsesAes));
// Audio in a video container.
EXPECT_FALSE(IsSupportedKeySystemWithMediaMimeType(
kVideoFoo, foovideo_and_fooaudio_codecs(), kUsesAes));
EXPECT_FALSE(IsSupportedKeySystemWithMediaMimeType(
kVideoFoo, fooaudio_codec(), kUsesAes));
// Extended codecs fail because this is handled by SimpleWebMimeRegistryImpl.
// They should really pass canPlayType().
EXPECT_FALSE(IsSupportedKeySystemWithMediaMimeType(
kVideoFoo, foovideo_extended_codec(), kUsesAes));
// Invalid codec format.
EXPECT_FALSE(IsSupportedKeySystemWithMediaMimeType(
kVideoFoo, foovideo_dot_codec(), kUsesAes));
// Non-container2 codec.
EXPECT_FALSE(
IsSupportedKeySystemWithMediaMimeType(kVideoFoo, vp8_codec(), kUsesAes));
EXPECT_FALSE(IsSupportedKeySystemWithMediaMimeType(kVideoFoo, unknown_codec(),
kUsesAes));
EXPECT_FALSE(IsSupportedKeySystemWithMediaMimeType(kVideoFoo, mixed_codecs(),
kUsesAes));
// Valid audio types.
EXPECT_TRUE(
IsSupportedKeySystemWithAudioMimeType(kAudioFoo, no_codecs(), kUsesAes));
EXPECT_TRUE(IsSupportedKeySystemWithAudioMimeType(kAudioFoo, fooaudio_codec(),
kUsesAes));
// Non-audio codecs.
EXPECT_FALSE(IsSupportedKeySystemWithAudioMimeType(
kAudioFoo, foovideo_codec(), kUsesAes));
EXPECT_FALSE(IsSupportedKeySystemWithAudioMimeType(
kAudioFoo, foovideo_and_fooaudio_codecs(), kUsesAes));
// Non-container2 codec.
EXPECT_FALSE(IsSupportedKeySystemWithAudioMimeType(kAudioFoo, vorbis_codec(),
kUsesAes));
}
//
// Non-AesDecryptor-based key system.
//
TEST_F(KeySystemsTest, Basic_ExternalDecryptor) {
if (!CanRunExternalKeySystemTests()) return;
EXPECT_TRUE(IsSupportedKeySystem(kExternal));
EXPECT_TRUE(IsSupportedKeySystemWithMediaMimeType(kVideoWebM, no_codecs(),
kExternal));
EXPECT_FALSE(CanUseAesDecryptor(kExternal));
#if defined(ENABLE_PEPPER_CDMS)
EXPECT_EQ("application/x-ppapi-external-cdm", GetPepperType(kExternal));
#endif // defined(ENABLE_PEPPER_CDMS)
}
TEST_F(
KeySystemsTest,
IsSupportedKeySystemWithMediaMimeType_ExternalDecryptor_TypesContainer1) {
if (!CanRunExternalKeySystemTests()) return;
// Valid video types.
EXPECT_TRUE(IsSupportedKeySystemWithMediaMimeType(kVideoWebM, no_codecs(),
kExternal));
EXPECT_TRUE(IsSupportedKeySystemWithMediaMimeType(kVideoWebM, vp8_codec(),
kExternal));
EXPECT_TRUE(IsSupportedKeySystemWithMediaMimeType(kVideoWebM, vp80_codec(),
kExternal));
EXPECT_TRUE(IsSupportedKeySystemWithMediaMimeType(kVideoWebM, vp9_codec(),
kExternal));
EXPECT_TRUE(IsSupportedKeySystemWithMediaMimeType(kVideoWebM, vp90_codec(),
kExternal));
// Audio in a video container.
EXPECT_FALSE(IsSupportedKeySystemWithMediaMimeType(
kVideoWebM, vp8_and_vorbis_codecs(), kExternal));
EXPECT_FALSE(IsSupportedKeySystemWithMediaMimeType(
kVideoWebM, vp9_and_vorbis_codecs(), kExternal));
EXPECT_FALSE(IsSupportedKeySystemWithMediaMimeType(kVideoWebM, vorbis_codec(),
kExternal));
// Non-Webm codecs.
EXPECT_FALSE(IsSupportedKeySystemWithMediaMimeType(
kVideoWebM, foovideo_codec(), kExternal));
EXPECT_FALSE(IsSupportedKeySystemWithMediaMimeType(
kVideoWebM, unknown_codec(), kExternal));
EXPECT_FALSE(IsSupportedKeySystemWithMediaMimeType(kVideoWebM, mixed_codecs(),
kExternal));
// Valid audio types.
EXPECT_TRUE(IsSupportedKeySystemWithAudioMimeType(kAudioWebM, no_codecs(),
kExternal));
EXPECT_TRUE(IsSupportedKeySystemWithAudioMimeType(kAudioWebM, vorbis_codec(),
kExternal));
// Non-audio codecs.
EXPECT_FALSE(IsSupportedKeySystemWithAudioMimeType(kAudioWebM, vp8_codec(),
kExternal));
EXPECT_FALSE(IsSupportedKeySystemWithAudioMimeType(
kAudioWebM, vp8_and_vorbis_codecs(), kExternal));
EXPECT_FALSE(IsSupportedKeySystemWithAudioMimeType(kAudioWebM, vp9_codec(),
kExternal));
EXPECT_FALSE(IsSupportedKeySystemWithAudioMimeType(
kAudioWebM, vp9_and_vorbis_codecs(), kExternal));
// Non-Webm codec.
EXPECT_FALSE(IsSupportedKeySystemWithAudioMimeType(
kAudioWebM, fooaudio_codec(), kExternal));
}
TEST_F(
KeySystemsTest,
IsSupportedKeySystemWithMediaMimeType_ExternalDecryptor_TypesContainer2) {
if (!CanRunExternalKeySystemTests()) return;
// Valid video types.
EXPECT_TRUE(
IsSupportedKeySystemWithMediaMimeType(kVideoFoo, no_codecs(), kExternal));
EXPECT_TRUE(IsSupportedKeySystemWithMediaMimeType(kVideoFoo, foovideo_codec(),
kExternal));
// Audio in a video container.
EXPECT_FALSE(IsSupportedKeySystemWithMediaMimeType(
kVideoFoo, foovideo_and_fooaudio_codecs(), kExternal));
EXPECT_FALSE(IsSupportedKeySystemWithMediaMimeType(
kVideoFoo, fooaudio_codec(), kExternal));
// Extended codecs fail because this is handled by SimpleWebMimeRegistryImpl.
// They should really pass canPlayType().
EXPECT_FALSE(IsSupportedKeySystemWithMediaMimeType(
kVideoFoo, foovideo_extended_codec(), kExternal));
// Invalid codec format.
EXPECT_FALSE(IsSupportedKeySystemWithMediaMimeType(
kVideoFoo, foovideo_dot_codec(), kExternal));
// Non-container2 codecs.
EXPECT_FALSE(
IsSupportedKeySystemWithMediaMimeType(kVideoFoo, vp8_codec(), kExternal));
EXPECT_FALSE(IsSupportedKeySystemWithMediaMimeType(kVideoFoo, unknown_codec(),
kExternal));
EXPECT_FALSE(IsSupportedKeySystemWithMediaMimeType(kVideoFoo, mixed_codecs(),
kExternal));
// Valid audio types.
EXPECT_TRUE(
IsSupportedKeySystemWithAudioMimeType(kAudioFoo, no_codecs(), kExternal));
EXPECT_TRUE(IsSupportedKeySystemWithAudioMimeType(kAudioFoo, fooaudio_codec(),
kExternal));
// Non-audio codecs.
EXPECT_FALSE(IsSupportedKeySystemWithAudioMimeType(
kAudioFoo, foovideo_codec(), kExternal));
EXPECT_FALSE(IsSupportedKeySystemWithAudioMimeType(
kAudioFoo, foovideo_and_fooaudio_codecs(), kExternal));
// Non-container2 codec.
EXPECT_FALSE(IsSupportedKeySystemWithAudioMimeType(kAudioFoo, vorbis_codec(),
kExternal));
}
TEST_F(KeySystemsTest, KeySystemNameForUMA) {
EXPECT_EQ("ClearKey", GetKeySystemNameForUMA(kClearKey));
// External Clear Key never has a UMA name.
if (CanRunExternalKeySystemTests())
EXPECT_EQ("Unknown", GetKeySystemNameForUMA(kExternalClearKey));
}
TEST_F(KeySystemsTest, KeySystemsUpdate) {
EXPECT_TRUE(IsSupportedKeySystem(kUsesAes));
EXPECT_TRUE(
IsSupportedKeySystemWithMediaMimeType(kVideoWebM, no_codecs(), kUsesAes));
if (CanRunExternalKeySystemTests()) {
EXPECT_TRUE(IsSupportedKeySystem(kExternal));
EXPECT_TRUE(IsSupportedKeySystemWithMediaMimeType(kVideoWebM, no_codecs(),
kExternal));
}
UpdateClientKeySystems();
EXPECT_TRUE(IsSupportedKeySystem(kUsesAes));
EXPECT_TRUE(
IsSupportedKeySystemWithMediaMimeType(kVideoWebM, no_codecs(), kUsesAes));
if (CanRunExternalKeySystemTests())
EXPECT_FALSE(IsSupportedKeySystem(kExternal));
}
TEST_F(KeySystemsPotentiallySupportedNamesTest, PotentiallySupportedNames) {
EXPECT_FALSE(IsSupportedKeySystem("org.w3"));
EXPECT_FALSE(IsSupportedKeySystem("org.w3."));
EXPECT_FALSE(IsSupportedKeySystem("org.w3.clearke"));
EXPECT_TRUE(IsSupportedKeySystem("org.w3.clearkey"));
EXPECT_FALSE(IsSupportedKeySystem("org.w3.clearkeys"));
EXPECT_FALSE(IsSupportedKeySystem("com.widevine"));
EXPECT_FALSE(IsSupportedKeySystem("com.widevine."));
EXPECT_FALSE(IsSupportedKeySystem("com.widevine.alph"));
EXPECT_TRUE(IsSupportedKeySystem("com.widevine.alpha"));
EXPECT_FALSE(IsSupportedKeySystem("com.widevine.beta"));
EXPECT_FALSE(IsSupportedKeySystem("com.widevine.alphabeta"));
EXPECT_FALSE(IsSupportedKeySystem("com.widevine.alpha.beta"));
EXPECT_FALSE(IsSupportedKeySystem("org.chromium"));
EXPECT_FALSE(IsSupportedKeySystem("org.chromium."));
EXPECT_FALSE(IsSupportedKeySystem("org.chromium.externalclearke"));
EXPECT_TRUE(IsSupportedKeySystem("org.chromium.externalclearkey"));
EXPECT_FALSE(IsSupportedKeySystem("org.chromium.externalclearkeys"));
EXPECT_FALSE(IsSupportedKeySystem("org.chromium.externalclearkey."));
EXPECT_TRUE(IsSupportedKeySystem("org.chromium.externalclearkey.something"));
EXPECT_FALSE(
IsSupportedKeySystem("org.chromium.externalclearkey.something.else"));
EXPECT_FALSE(IsSupportedKeySystem("org.chromium.externalclearkey.other"));
EXPECT_FALSE(IsSupportedKeySystem("org.chromium.other"));
EXPECT_FALSE(IsSupportedKeySystem("com.chromecast"));
EXPECT_FALSE(IsSupportedKeySystem("com.chromecast."));
EXPECT_TRUE(IsSupportedKeySystem("com.chromecast.something"));
EXPECT_FALSE(IsSupportedKeySystem("com.chromecast.something.else"));
EXPECT_FALSE(IsSupportedKeySystem("com.chromecast.other"));
EXPECT_FALSE(IsSupportedKeySystem("x-"));
EXPECT_TRUE(IsSupportedKeySystem("x-something"));
EXPECT_FALSE(IsSupportedKeySystem("x-something.else"));
EXPECT_FALSE(IsSupportedKeySystem("x-other"));
}
} // namespace media
} // namespace cobalt