Decouple key fetcher; Update ECMG API
This commit is contained in:
@@ -7,65 +7,86 @@
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
|
||||
#include <iostream>
|
||||
#include <string>
|
||||
#include <vector>
|
||||
|
||||
#include "glog/logging.h"
|
||||
#include "absl/flags/flag.h"
|
||||
#include "absl/flags/parse.h"
|
||||
#include "common/status.h"
|
||||
#include "media_cas_packager_sdk/public/wv_cas_key_fetcher.h"
|
||||
#include "protos/public/media_cas_encryption.pb.h"
|
||||
|
||||
ABSL_FLAG(std::string, content_id, "21140844", "Content ID");
|
||||
ABSL_FLAG(bool, key_rotation, true, "Whether key rotation is enabled");
|
||||
ABSL_FLAG(std::string, track_type, "SD", "Provider name");
|
||||
const char kContentId[] = "21140844";
|
||||
const char kContentProvider[] = "widevine";
|
||||
const char kTrackType[] = "SD";
|
||||
const bool kKeyRotation = false;
|
||||
const char kSigningProvider[] = "widevine_test";
|
||||
const char kSingingKey[] =
|
||||
"1ae8ccd0e7985cc0b6203a55855a1034afc252980e970ca90e5202689f947ab9";
|
||||
const char kSingingIv[] = "d58ce954203b7c9a9a9d467f59839249";
|
||||
const char kHttpResponse[] =
|
||||
"{\"response\":"
|
||||
"\"eyJzdGF0dXMiOiJPSyIsImNvbnRlbnRfaWQiOiJNakV4TkRBNE5EUT0iLCJlbnRpdGxlbWVu"
|
||||
"dF9rZXlzIjpbeyJrZXlfaWQiOiJNUGFndXhNb1hNNkUxUzhEOUF3RkNBPT0iLCJrZXkiOiJoZ1"
|
||||
"JycmdqeUg4NjQycjY3VHd0OHJ1cU5MUGNMRmtKcWRVSUROdm5GZDBNPSIsInRyYWNrX3R5cGUi"
|
||||
"OiJTRCIsImtleV9zbG90IjoiU0lOR0xFIn1dfQ==\"}";
|
||||
|
||||
int main(int argc, char **argv) {
|
||||
absl::ParseCommandLine(argc, argv);
|
||||
CHECK(!absl::GetFlag(FLAGS_content_id).empty() &&
|
||||
!absl::GetFlag(FLAGS_track_type).empty())
|
||||
<< "Flags 'content_id' and 'track_type' are required";
|
||||
// Required flags in key fetcher.
|
||||
CHECK(!absl::GetFlag(FLAGS_license_server).empty() &&
|
||||
!absl::GetFlag(FLAGS_signing_provider).empty() &&
|
||||
!absl::GetFlag(FLAGS_signing_key).empty() &&
|
||||
!absl::GetFlag(FLAGS_signing_iv).empty())
|
||||
<< "Flags 'license_server', 'signing_provider', 'signing_key' "
|
||||
"and 'signing_iv' are required";
|
||||
using widevine::Status;
|
||||
using widevine::cas::EntitlementKeyInfo;
|
||||
using widevine::cas::EntitlementRequestParams;
|
||||
using widevine::cas::WvCasKeyFetcher;
|
||||
|
||||
class ExampleKeyFetcher : public WvCasKeyFetcher {
|
||||
public:
|
||||
ExampleKeyFetcher(const std::string& signing_provider,
|
||||
const std::string& signing_key,
|
||||
const std::string& signing_iv)
|
||||
: WvCasKeyFetcher(signing_provider, signing_key, signing_iv) {}
|
||||
|
||||
// An example that always returns the same response.
|
||||
Status MakeHttpRequest(const std::string& signed_request_json,
|
||||
std::string* http_response_json) const override {
|
||||
*http_response_json = kHttpResponse;
|
||||
return widevine::OkStatus();
|
||||
}
|
||||
};
|
||||
|
||||
int main(int argc, char** argv) {
|
||||
// Initialize key fetcher.
|
||||
ExampleKeyFetcher key_fetcher(kSigningProvider, kSingingKey, kSingingIv);
|
||||
|
||||
// Create request string.
|
||||
std::string request_str;
|
||||
widevine::CasEncryptionRequest request;
|
||||
request.set_provider(absl::GetFlag(FLAGS_signing_provider));
|
||||
request.set_content_id(absl::GetFlag(FLAGS_content_id));
|
||||
request.set_key_rotation(absl::GetFlag(FLAGS_key_rotation));
|
||||
// Only 1 track in this example.
|
||||
request.add_track_types(absl::GetFlag(FLAGS_track_type));
|
||||
LOG(INFO) << "Request: " << request.ShortDebugString();
|
||||
if (!request.SerializeToString(&request_str)) {
|
||||
LOG(ERROR) << "Failed to serialize request";
|
||||
return -1;
|
||||
}
|
||||
|
||||
std::string signed_response_str;
|
||||
widevine::cas::WvCasKeyFetcher key_fetcher;
|
||||
widevine::Status status =
|
||||
key_fetcher.RequestEntitlementKey(request_str, &signed_response_str);
|
||||
EntitlementRequestParams request_params;
|
||||
request_params.content_id = kContentId;
|
||||
request_params.content_provider = kContentProvider;
|
||||
request_params.track_types = {kTrackType};
|
||||
request_params.key_rotation = kKeyRotation;
|
||||
Status status =
|
||||
key_fetcher.CreateEntitlementRequest(request_params, &request_str);
|
||||
if (!status.ok()) {
|
||||
LOG(ERROR) << "Failed to request entitlement key";
|
||||
return -1;
|
||||
std::cerr << "Failed to create entitlement request, error: " << status
|
||||
<< std::endl;
|
||||
}
|
||||
widevine::SignedCasEncryptionResponse signed_response;
|
||||
if (!signed_response.ParseFromString(signed_response_str)) {
|
||||
LOG(ERROR) << "Failed to deserialize signed response";
|
||||
return -1;
|
||||
std::cout << "Request: " << request_str << std::endl;
|
||||
|
||||
// Request entitlement keys.
|
||||
std::string signed_response_str;
|
||||
status = key_fetcher.MakeHttpRequest(request_str, &signed_response_str);
|
||||
if (!status.ok()) {
|
||||
std::cerr << "Failed to request entitlement key, error: " << status
|
||||
<< std::endl;
|
||||
}
|
||||
LOG(INFO) << "Signed response: " << signed_response.ShortDebugString();
|
||||
widevine::CasEncryptionResponse response;
|
||||
if (!response.ParseFromString(signed_response.response())) {
|
||||
LOG(ERROR) << "Failed to deserialize response";
|
||||
return -1;
|
||||
std::cout << "Response: " << signed_response_str << std::endl;
|
||||
|
||||
// Parse entitlement key response.
|
||||
std::vector<widevine::cas::EntitlementKeyInfo> entitlements;
|
||||
status =
|
||||
key_fetcher.ParseEntitlementResponse(signed_response_str, &entitlements);
|
||||
if (!status.ok()) {
|
||||
std::cerr << "Failed to parse entitlement response, error: " << status
|
||||
<< std::endl;
|
||||
}
|
||||
LOG(INFO) << "Response: " << response.ShortDebugString();
|
||||
std::cout << "Parsed: " << entitlements.size() << " entitlement keys."
|
||||
<< std::endl;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user