Shaka Packager SDK
Loading...
Searching...
No Matches
simple_hls_notifier.cc
1// Copyright 2016 Google LLC. All rights reserved.
2//
3// Use of this source code is governed by a BSD-style
4// license that can be found in the LICENSE file or at
5// https://developers.google.com/open-source/licenses/bsd
6
7#include <packager/hls/base/simple_hls_notifier.h>
8
9#include <cmath>
10#include <filesystem>
11#include <optional>
12
13#include <absl/flags/flag.h>
14#include <absl/log/check.h>
15#include <absl/log/log.h>
16#include <absl/strings/escaping.h>
17#include <absl/strings/numbers.h>
18
19#include <packager/file/file_util.h>
20#include <packager/hls/base/master_playlist.h>
21#include <packager/media/base/protection_system_ids.h>
22#include <packager/media/base/protection_system_specific_info.h>
23#include <packager/media/base/proto_json_util.h>
24#include <packager/media/base/widevine_pssh_data.pb.h>
25
26ABSL_FLAG(bool,
27 enable_legacy_widevine_hls_signaling,
28 false,
29 "Specifies whether Legacy Widevine HLS, i.e. v1 is signalled in "
30 "the media playlist. Applies to Widevine protection system in HLS "
31 "with SAMPLE-AES only.");
32
33namespace shaka {
34
35namespace hls {
36
37namespace {
38
39const char kUriBase64Prefix[] = "data:text/plain;base64,";
40const char kUriBase64Utf16Prefix[] = "data:text/plain;charset=UTF-16;base64,";
41const char kUriFairPlayPrefix[] = "skd://";
42const char kWidevineDashIfIopUUID[] =
43 "urn:uuid:edef8ba9-79d6-4ace-a3c8-27dcd51d21ed";
44
45bool IsWidevineSystemId(const std::vector<uint8_t>& system_id) {
46 return system_id.size() == std::size(media::kWidevineSystemId) &&
47 std::equal(system_id.begin(), system_id.end(),
48 media::kWidevineSystemId);
49}
50
51bool IsCommonSystemId(const std::vector<uint8_t>& system_id) {
52 return system_id.size() == std::size(media::kCommonSystemId) &&
53 std::equal(system_id.begin(), system_id.end(), media::kCommonSystemId);
54}
55
56bool IsFairPlaySystemId(const std::vector<uint8_t>& system_id) {
57 return system_id.size() == std::size(media::kFairPlaySystemId) &&
58 std::equal(system_id.begin(), system_id.end(),
59 media::kFairPlaySystemId);
60}
61
62bool IsLegacyFairPlaySystemId(const std::vector<uint8_t>& system_id) {
63 return system_id.size() == std::size(media::kLegacyFairPlaySystemId) &&
64 std::equal(system_id.begin(), system_id.end(),
65 media::kLegacyFairPlaySystemId);
66}
67
68bool IsPlayReadySystemId(const std::vector<uint8_t>& system_id) {
69 return system_id.size() == std::size(media::kPlayReadySystemId) &&
70 std::equal(system_id.begin(), system_id.end(),
71 media::kPlayReadySystemId);
72}
73
74std::string Base64EncodeData(const std::string& prefix,
75 const std::string& data) {
76 std::string data_base64;
77 absl::Base64Escape(data, &data_base64);
78 return prefix + data_base64;
79}
80
81std::string VectorToString(const std::vector<uint8_t>& v) {
82 return std::string(v.begin(), v.end());
83}
84
85// Segment URL is relative to either output directory or the directory
86// containing the media playlist depends on whether base_url is set.
87std::string GenerateSegmentUrl(const std::string& segment_name,
88 const std::string& base_url,
89 const std::string& output_dir,
90 const std::string& playlist_file_name) {
91 auto output_path = std::filesystem::u8path(output_dir);
92 if (!base_url.empty()) {
93 // Media segment URL is base_url + segment path relative to output
94 // directory.
95 return base_url + MakePathRelative(segment_name, output_path);
96 }
97 // Media segment URL is segment path relative to the directory containing the
98 // playlist.
99 const std::filesystem::path playlist_dir =
100 (output_path / playlist_file_name).parent_path() / "";
101 return MakePathRelative(segment_name, playlist_dir);
102}
103
104MediaInfo MakeMediaInfoPathsRelativeToPlaylist(
105 const MediaInfo& media_info,
106 const std::string& base_url,
107 const std::string& output_dir,
108 const std::string& playlist_name) {
109 MediaInfo media_info_copy = media_info;
110 if (media_info_copy.has_init_segment_name()) {
111 media_info_copy.set_init_segment_url(
112 GenerateSegmentUrl(media_info_copy.init_segment_name(), base_url,
113 output_dir, playlist_name));
114 }
115 if (media_info_copy.has_media_file_name()) {
116 media_info_copy.set_media_file_url(
117 GenerateSegmentUrl(media_info_copy.media_file_name(), base_url,
118 output_dir, playlist_name));
119 }
120 if (media_info_copy.has_segment_template()) {
121 media_info_copy.set_segment_template_url(
122 GenerateSegmentUrl(media_info_copy.segment_template(), base_url,
123 output_dir, playlist_name));
124 }
125 return media_info_copy;
126}
127
128bool WidevinePsshToJson(const std::vector<uint8_t>& pssh_box,
129 const std::vector<uint8_t>& key_id,
130 std::string* pssh_json) {
131 std::unique_ptr<media::PsshBoxBuilder> pssh_builder =
132 media::PsshBoxBuilder::ParseFromBox(pssh_box.data(), pssh_box.size());
133 if (!pssh_builder) {
134 LOG(ERROR) << "Failed to parse PSSH box.";
135 return false;
136 }
137
138 media::WidevinePsshData pssh_proto;
139 if (!pssh_proto.ParseFromArray(pssh_builder->pssh_data().data(),
140 pssh_builder->pssh_data().size())) {
141 LOG(ERROR) << "Failed to parse protection_system_specific_data.";
142 return false;
143 }
144
145 media::WidevineHeader widevine_header;
146
147 if (pssh_proto.has_provider()) {
148 widevine_header.set_provider(pssh_proto.provider());
149 } else {
150 LOG(WARNING) << "Missing provider in Widevine PSSH. The content may not "
151 "play in some devices.";
152 }
153
154 if (pssh_proto.has_content_id()) {
155 widevine_header.set_content_id(pssh_proto.content_id());
156 } else {
157 LOG(WARNING) << "Missing content_id in Widevine PSSH. The content may not "
158 "play in some devices.";
159 }
160
161 // Place the current |key_id| to the front and converts all key_id to hex
162 // format.
163 widevine_header.add_key_ids(absl::BytesToHexString(absl::string_view(
164 reinterpret_cast<const char*>(key_id.data()), key_id.size())));
165 for (const std::string& key_id_in_pssh : pssh_proto.key_id()) {
166 const std::string key_id_hex = absl::BytesToHexString(
167 absl::string_view(reinterpret_cast<const char*>(key_id_in_pssh.data()),
168 key_id_in_pssh.size()));
169 if (widevine_header.key_ids(0) != key_id_hex)
170 widevine_header.add_key_ids(key_id_hex);
171 }
172
173 *pssh_json = media::MessageToJsonString(widevine_header);
174 return true;
175}
176
177std::optional<MediaPlaylist::EncryptionMethod> StringToEncryptionMethod(
178 const std::string& method) {
179 if (method == "cenc") {
180 return MediaPlaylist::EncryptionMethod::kSampleAesCenc;
181 }
182 if (method == "cbcs") {
183 return MediaPlaylist::EncryptionMethod::kSampleAes;
184 }
185 if (method == "cbca") {
186 // cbca is a place holder for sample aes.
187 return MediaPlaylist::EncryptionMethod::kSampleAes;
188 }
189 return std::nullopt;
190}
191
192void NotifyEncryptionToMediaPlaylist(
193 MediaPlaylist::EncryptionMethod encryption_method,
194 const std::string& uri,
195 const std::vector<uint8_t>& key_id,
196 const std::vector<uint8_t>& iv,
197 const std::string& key_format,
198 const std::string& key_format_version,
199 MediaPlaylist* media_playlist) {
200 std::string iv_string;
201 if (!iv.empty()) {
202 iv_string =
203 "0x" + absl::BytesToHexString(absl::string_view(
204 reinterpret_cast<const char*>(iv.data()), iv.size()));
205 }
206 std::string key_id_string;
207 if (!key_id.empty()) {
208 key_id_string = "0x" + absl::BytesToHexString(absl::string_view(
209 reinterpret_cast<const char*>(key_id.data()),
210 key_id.size()));
211 }
212
213 media_playlist->AddEncryptionInfo(
214 encryption_method,
215 uri, key_id_string, iv_string,
216 key_format, key_format_version);
217}
218
219// Creates JSON format and the format similar to MPD.
220bool HandleWidevineKeyFormats(
221 MediaPlaylist::EncryptionMethod encryption_method,
222 const std::vector<uint8_t>& key_id,
223 const std::vector<uint8_t>& iv,
224 const std::vector<uint8_t>& protection_system_specific_data,
225 MediaPlaylist* media_playlist) {
226 if (absl::GetFlag(FLAGS_enable_legacy_widevine_hls_signaling) &&
227 encryption_method == MediaPlaylist::EncryptionMethod::kSampleAes) {
228 // This format allows SAMPLE-AES only.
229 std::string key_uri_data;
230 if (!WidevinePsshToJson(protection_system_specific_data, key_id,
231 &key_uri_data)) {
232 return false;
233 }
234 std::string key_uri_data_base64 =
235 Base64EncodeData(kUriBase64Prefix, key_uri_data);
236 NotifyEncryptionToMediaPlaylist(encryption_method, key_uri_data_base64,
237 std::vector<uint8_t>(), iv, "com.widevine",
238 "1", media_playlist);
239 }
240
241 std::string pssh_as_string(
242 reinterpret_cast<const char*>(protection_system_specific_data.data()),
243 protection_system_specific_data.size());
244 std::string key_uri_data_base64 =
245 Base64EncodeData(kUriBase64Prefix, pssh_as_string);
246 NotifyEncryptionToMediaPlaylist(encryption_method, key_uri_data_base64,
247 key_id, iv, kWidevineDashIfIopUUID, "1",
248 media_playlist);
249 return true;
250}
251
252bool WriteMediaPlaylist(const std::string& output_dir,
253 MediaPlaylist* playlist) {
254 auto file_path = std::filesystem::u8path(output_dir) / playlist->file_name();
255 if (!playlist->WriteToFile(file_path)) {
256 LOG(ERROR) << "Failed to write playlist " << file_path.string();
257 return false;
258 }
259 return true;
260}
261
262} // namespace
263
264MediaPlaylistFactory::~MediaPlaylistFactory() {}
265
266std::unique_ptr<MediaPlaylist> MediaPlaylistFactory::Create(
267 const HlsParams& hls_params,
268 const std::string& file_name,
269 const std::string& name,
270 const std::string& group_id) {
271 return std::unique_ptr<MediaPlaylist>(
272 new MediaPlaylist(hls_params, file_name, name, group_id));
273}
274
275SimpleHlsNotifier::SimpleHlsNotifier(const HlsParams& hls_params)
276 : HlsNotifier(hls_params),
277 media_playlist_factory_(new MediaPlaylistFactory()) {
278 if (hls_params.add_program_date_time) {
279 reference_time_ = absl::Now();
280 }
281 const auto master_playlist_path =
282 std::filesystem::u8path(hls_params.master_playlist_output);
283 master_playlist_dir_ = master_playlist_path.parent_path().string();
284 const std::string& default_audio_langauge = hls_params.default_language;
285 const std::string& default_text_language =
286 hls_params.default_text_language.empty()
287 ? hls_params.default_language
288 : hls_params.default_text_language;
289
290 std::vector<CeaCaption> closed_captions;
291 for (const auto& caption : hls_params.closed_captions) {
292 closed_captions.push_back({caption.name, caption.language, caption.channel,
293 caption.is_default, caption.autoselect});
294 }
295
296 master_playlist_.reset(new MasterPlaylist(
297 master_playlist_path.filename(), default_audio_langauge,
298 default_text_language, closed_captions,
299 hls_params.is_independent_segments, hls_params.create_session_keys));
300}
301
302SimpleHlsNotifier::~SimpleHlsNotifier() {}
303
305 return true;
306}
307
308bool SimpleHlsNotifier::NotifyNewStream(const MediaInfo& media_info,
309 const std::string& playlist_name,
310 const std::string& name,
311 const std::string& group_id,
312 uint32_t* stream_id) {
313 DCHECK(stream_id);
314
315 const std::string relative_playlist_path = MakePathRelative(
316 playlist_name, std::filesystem::u8path(master_playlist_dir_));
317
318 std::unique_ptr<MediaPlaylist> media_playlist =
319 media_playlist_factory_->Create(hls_params(), relative_playlist_path,
320 name, group_id);
321 MediaInfo adjusted_media_info = MakeMediaInfoPathsRelativeToPlaylist(
322 media_info, hls_params().base_url, master_playlist_dir_,
323 media_playlist->file_name());
324 if (!media_playlist->SetMediaInfo(adjusted_media_info)) {
325 LOG(ERROR) << "Failed to set media info for playlist " << playlist_name;
326 return false;
327 }
328 media_playlist->SetReferenceTime(reference_time());
329
330 MediaPlaylist::EncryptionMethod encryption_method =
331 MediaPlaylist::EncryptionMethod::kNone;
332 if (media_info.protected_content().has_protection_scheme()) {
333 const std::string& protection_scheme =
334 media_info.protected_content().protection_scheme();
335 std::optional<MediaPlaylist::EncryptionMethod> enc_method =
336 StringToEncryptionMethod(protection_scheme);
337 if (!enc_method) {
338 LOG(ERROR) << "Failed to recognize protection scheme "
339 << protection_scheme;
340 return false;
341 }
342 encryption_method = enc_method.value();
343 }
344
345 absl::MutexLock lock(&lock_);
346 *stream_id = sequence_number_++;
347 media_playlists_.push_back(media_playlist.get());
348 stream_map_[*stream_id].reset(
349 new StreamEntry{std::move(media_playlist), encryption_method});
350 return true;
351}
352
354 int32_t sample_duration) {
355 absl::MutexLock lock(&lock_);
356 auto stream_iterator = stream_map_.find(stream_id);
357 if (stream_iterator == stream_map_.end()) {
358 LOG(ERROR) << "Cannot find stream with ID: " << stream_id;
359 return false;
360 }
361 auto& media_playlist = stream_iterator->second->media_playlist;
362 media_playlist->SetSampleDuration(sample_duration);
363 return true;
364}
365
367 const std::string& segment_name,
368 int64_t start_time,
369 int64_t duration,
370 uint64_t start_byte_offset,
371 uint64_t size) {
372 absl::MutexLock lock(&lock_);
373 auto stream_iterator = stream_map_.find(stream_id);
374 if (stream_iterator == stream_map_.end()) {
375 LOG(ERROR) << "Cannot find stream with ID: " << stream_id;
376 return false;
377 }
378 auto& media_playlist = stream_iterator->second->media_playlist;
379 const std::string& segment_url =
380 GenerateSegmentUrl(segment_name, hls_params().base_url,
381 master_playlist_dir_, media_playlist->file_name());
382 media_playlist->AddSegment(segment_url, start_time, duration,
383 start_byte_offset, size);
384
385 // Update target duration.
386 int32_t longest_segment_duration =
387 static_cast<int32_t>(ceil(media_playlist->GetLongestSegmentDuration()));
388 bool target_duration_updated = false;
389 if (longest_segment_duration > target_duration_) {
390 target_duration_ = longest_segment_duration;
391 target_duration_updated = true;
392 }
393
394 // Update the playlists when there is new segments in live mode.
395 if (hls_params().playlist_type == HlsPlaylistType::kLive ||
396 hls_params().playlist_type == HlsPlaylistType::kEvent) {
397 // Update all playlists if target duration is updated.
398 if (target_duration_updated) {
399 for (MediaPlaylist* playlist : media_playlists_) {
400 playlist->SetTargetDuration(target_duration_);
401 if (!WriteMediaPlaylist(master_playlist_dir_, playlist))
402 return false;
403 }
404 } else {
405 if (!WriteMediaPlaylist(master_playlist_dir_, media_playlist.get()))
406 return false;
407 }
408 if (!master_playlist_->WriteMasterPlaylist(
409 hls_params().base_url, master_playlist_dir_, media_playlists_)) {
410 LOG(ERROR) << "Failed to write master playlist.";
411 return false;
412 }
413 }
414 return true;
415}
416
417bool SimpleHlsNotifier::NotifyKeyFrame(uint32_t stream_id,
418 int64_t timestamp,
419 uint64_t start_byte_offset,
420 uint64_t size) {
421 absl::MutexLock lock(&lock_);
422 auto stream_iterator = stream_map_.find(stream_id);
423 if (stream_iterator == stream_map_.end()) {
424 LOG(ERROR) << "Cannot find stream with ID: " << stream_id;
425 return false;
426 }
427 auto& media_playlist = stream_iterator->second->media_playlist;
428 media_playlist->AddKeyFrame(timestamp, start_byte_offset, size);
429 return true;
430}
431
432bool SimpleHlsNotifier::NotifyCueEvent(uint32_t stream_id, int64_t timestamp) {
433 absl::MutexLock lock(&lock_);
434 auto stream_iterator = stream_map_.find(stream_id);
435 if (stream_iterator == stream_map_.end()) {
436 LOG(ERROR) << "Cannot find stream with ID: " << stream_id;
437 return false;
438 }
439 auto& media_playlist = stream_iterator->second->media_playlist;
440 media_playlist->AddPlacementOpportunity();
441 return true;
442}
443
445 uint32_t stream_id,
446 const std::vector<uint8_t>& key_id,
447 const std::vector<uint8_t>& system_id,
448 const std::vector<uint8_t>& iv,
449 const std::vector<uint8_t>& protection_system_specific_data) {
450 absl::MutexLock lock(&lock_);
451 auto stream_iterator = stream_map_.find(stream_id);
452 if (stream_iterator == stream_map_.end()) {
453 LOG(ERROR) << "Cannot find stream with ID: " << stream_id;
454 return false;
455 }
456
457 std::unique_ptr<MediaPlaylist>& media_playlist =
458 stream_iterator->second->media_playlist;
459 const MediaPlaylist::EncryptionMethod encryption_method =
460 stream_iterator->second->encryption_method;
461 LOG_IF(WARNING, encryption_method == MediaPlaylist::EncryptionMethod::kNone)
462 << "Got encryption notification but the encryption method is NONE";
463 if (IsWidevineSystemId(system_id)) {
464 return HandleWidevineKeyFormats(encryption_method,
465 key_id, iv, protection_system_specific_data,
466 media_playlist.get());
467 }
468
469 // Key Id does not need to be specified with "identity" and "sdk".
470 const std::vector<uint8_t> empty_key_id;
471
472 if (IsCommonSystemId(system_id)) {
473 const MediaPlaylist::EncryptionMethod encryption_method_from_stream =
474 stream_iterator->second->encryption_method;
475
476 if (encryption_method_from_stream ==
477 MediaPlaylist::EncryptionMethod::kSampleAesCenc) {
478 // We do NOT add the "identity" key format, because CENC must be managed
479 // by a specific DRM (like Widevine)
480 LOG(INFO) << "Skipping KEYFORMAT=\"identity\" for CENC content (stream "
481 << stream_id
482 << ") as it should be handled by a specific DRM system.";
483 return true;
484 }
485
486 std::string key_uri = hls_params().key_uri;
487 if (key_uri.empty()) {
488 // Use key_id as the key_uri. The player needs to have custom logic to
489 // convert it to the actual key uri.
490 std::string key_uri_data = VectorToString(key_id);
491 key_uri = Base64EncodeData(kUriBase64Prefix, key_uri_data);
492 }
493 NotifyEncryptionToMediaPlaylist(encryption_method, key_uri, empty_key_id,
494 iv, "identity", "", media_playlist.get());
495 return true;
496 }
497 if (IsFairPlaySystemId(system_id) || IsLegacyFairPlaySystemId(system_id)) {
498 std::string key_uri = hls_params().key_uri;
499 if (key_uri.empty()) {
500 // Use key_id as the key_uri. The player needs to have custom logic to
501 // convert it to the actual key uri.
502 std::string key_uri_data = VectorToString(key_id);
503 key_uri = Base64EncodeData(kUriFairPlayPrefix, key_uri_data);
504 }
505
506 // FairPlay defines IV to be carried with the key, not the playlist.
507 const std::vector<uint8_t> empty_iv;
508 NotifyEncryptionToMediaPlaylist(encryption_method, key_uri, empty_key_id,
509 empty_iv, "com.apple.streamingkeydelivery",
510 "1", media_playlist.get());
511 return true;
512 }
513 if (IsPlayReadySystemId(system_id)) {
514 std::unique_ptr<media::PsshBoxBuilder> b =
516 protection_system_specific_data.data(),
517 protection_system_specific_data.size());
518 std::string pssh_data(reinterpret_cast<const char*>(b->pssh_data().data()),
519 b->pssh_data().size());
520 std::string key_uri_data_base64 =
521 Base64EncodeData(kUriBase64Utf16Prefix, pssh_data);
522 NotifyEncryptionToMediaPlaylist(encryption_method, key_uri_data_base64,
523 empty_key_id, iv, "com.microsoft.playready",
524 "1", media_playlist.get());
525 return true;
526 }
527
528 LOG(WARNING) << "HLS: Ignore unknown or unsupported system ID: "
529 << absl::BytesToHexString(absl::string_view(
530 reinterpret_cast<const char*>(system_id.data()),
531 system_id.size()));
532 return true;
533}
534
536 absl::MutexLock lock(&lock_);
537 for (MediaPlaylist* playlist : media_playlists_) {
538 if (hls_params().per_playlist_target_duration) {
539 playlist->SetTargetDuration(
540 static_cast<int32_t>(ceil(playlist->GetLongestSegmentDuration())));
541 } else {
542 playlist->SetTargetDuration(target_duration_);
543 }
544 if (!WriteMediaPlaylist(master_playlist_dir_, playlist))
545 return false;
546 }
547 if (!master_playlist_->WriteMasterPlaylist(
548 hls_params().base_url, master_playlist_dir_, media_playlists_)) {
549 LOG(ERROR) << "Failed to write master playlist.";
550 return false;
551 }
552 return true;
553}
554
555} // namespace hls
556} // namespace shaka
const HlsParams & hls_params() const
Methods are virtual for mocking.
bool NotifyNewSegment(uint32_t stream_id, const std::string &segment_name, int64_t start_time, int64_t duration, uint64_t start_byte_offset, uint64_t size) override
SimpleHlsNotifier(const HlsParams &hls_params)
bool NotifyNewStream(const MediaInfo &media_info, const std::string &playlist_name, const std::string &stream_name, const std::string &group_id, uint32_t *stream_id) override
bool NotifyKeyFrame(uint32_t stream_id, int64_t timestamp, uint64_t start_byte_offset, uint64_t size) override
const absl::Time & reference_time() const
}@
bool NotifyEncryptionUpdate(uint32_t stream_id, const std::vector< uint8_t > &key_id, const std::vector< uint8_t > &system_id, const std::vector< uint8_t > &iv, const std::vector< uint8_t > &protection_system_specific_data) override
bool NotifyCueEvent(uint32_t container_id, int64_t timestamp) override
bool NotifySampleDuration(uint32_t stream_id, int32_t sample_duration) override
static std::unique_ptr< PsshBoxBuilder > ParseFromBox(const uint8_t *data, size_t data_size)
All the methods that are virtual are virtual for mocking.