1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83
|
// Copyright 2024 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "content/browser/media/key_system_support_android.h"
#include <optional>
#include "base/test/scoped_feature_list.h"
#include "base/test/task_environment.h"
#include "base/test/test_future.h"
#include "content/public/common/cdm_info.h"
#include "media/base/cdm_capability.h"
#include "media/base/media_switches.h"
#include "testing/gtest/include/gtest/gtest.h"
namespace content {
namespace {
const char kWidevineKeySystem[] = "com.widevine.alpha";
const char kUnsupportedKeySystem[] = "keysystem.test.unsupported";
} // namespace
// These tests disable the mojo remote process as it uses a sandbox which does
// not appear to be available during testing.
TEST(KeySystemSupportAndroidTest, SoftwareSecureWidevine) {
base::test::SingleThreadTaskEnvironment task_environment;
base::test::ScopedFeatureList scoped_feature_list;
scoped_feature_list.InitWithFeatureStates(
{{media::kAllowMediaCodecCallsInSeparateProcess, false},
{media::kUseSecurityLevelWhenCheckingMediaDrmVersion, false}});
base::test::TestFuture<media::CdmCapabilityOrStatus> capability;
GetAndroidCdmCapability(kWidevineKeySystem,
CdmInfo::Robustness::kSoftwareSecure,
capability.GetCallback());
// As the capabilities depend on the device this is running on, just check
// that we get something back. All Android devices should support some
// form of Widevine for software secure operation. Different devices may not
// return a version string for Widevine, so not checking the version.
ASSERT_TRUE(capability.Get<media::CdmCapabilityOrStatus>().has_value());
}
TEST(KeySystemSupportAndroidTest, HardwareSecureWidevine) {
base::test::SingleThreadTaskEnvironment task_environment;
base::test::ScopedFeatureList scoped_feature_list;
scoped_feature_list.InitWithFeatureStates(
{{media::kAllowMediaCodecCallsInSeparateProcess, false},
{media::kUseSecurityLevelWhenCheckingMediaDrmVersion, false}});
base::test::TestFuture<media::CdmCapabilityOrStatus> capability;
GetAndroidCdmCapability(kWidevineKeySystem,
CdmInfo::Robustness::kHardwareSecure,
capability.GetCallback());
// As the capabilities depend on the device this is running on, just check
// that we get something back. Some devices (e.g. emulators) will not have
// any hardware secure capabilities.
ASSERT_TRUE(capability.Wait());
}
TEST(KeySystemSupportAndroidTest, UnknownKeySystem) {
base::test::SingleThreadTaskEnvironment task_environment;
base::test::ScopedFeatureList scoped_feature_list;
scoped_feature_list.InitWithFeatureStates(
{{media::kAllowMediaCodecCallsInSeparateProcess, false},
{media::kUseSecurityLevelWhenCheckingMediaDrmVersion, false}});
base::test::TestFuture<media::CdmCapabilityOrStatus> capability;
GetAndroidCdmCapability(kUnsupportedKeySystem,
CdmInfo::Robustness::kSoftwareSecure,
capability.GetCallback());
// Key system should not exist, so no capabilities should be found.
auto cdm_capability_or_status = capability.Get();
ASSERT_FALSE(cdm_capability_or_status.has_value());
ASSERT_TRUE(std::move(cdm_capability_or_status).error() ==
media::CdmCapabilityQueryStatus::kUnsupportedKeySystem);
}
} // namespace content
|