mirror of
https://github.com/servo/servo.git
synced 2025-06-25 09:34:32 +01:00
262 lines
14 KiB
JavaScript
262 lines
14 KiB
JavaScript
(function(){
|
|
// Expect utf8decoder and utf8decoder to be TextEncoder('utf-8') and TextDecoder('utf-8') respectively
|
|
//
|
|
// drmconfig format:
|
|
// { <keysystem> : { "serverURL" : <the url for the server>,
|
|
// "httpRequestHeaders" : <map of HTTP request headers>,
|
|
// "servertype" : "microsoft" | "drmtoday", // affects how request parameters are formed
|
|
// "certificate" : <base64 encoded server certificate> } }
|
|
//
|
|
|
|
drmtodaysecret = Uint8Array.from( [144, 34, 109, 76, 134, 7, 97, 107, 98, 251, 140, 28, 98, 79, 153, 222, 231, 245, 154, 226, 193, 1, 213, 207, 152, 204, 144, 15, 13, 2, 37, 236] );
|
|
|
|
drmconfig = {
|
|
"com.widevine.alpha": [ {
|
|
"serverURL": "https://lic.staging.drmtoday.com/license-proxy-widevine/cenc/",
|
|
"servertype" : "drmtoday",
|
|
"merchant" : "w3c-eme-test",
|
|
"secret" : drmtodaysecret
|
|
} ],
|
|
"com.microsoft.playready": [ {
|
|
"serverURL": "http://playready-testserver.azurewebsites.net/rightsmanager.asmx",
|
|
"servertype": "microsoft",
|
|
"sessionTypes" : [ "persistent-usage-record" ],
|
|
"certificate" : "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"
|
|
},
|
|
{
|
|
"serverURL": "http://playready.directtaps.net/pr/svc/rightsmanager.asmx",
|
|
"servertype": "microsoft",
|
|
"sessionTypes" : [ "persistent-usage-record" ],
|
|
"certificate" : "Q0hBSQAAAAEAAAUEAAAAAAAAAAJDRVJUAAAAAQAAAfQAAAFkAAEAAQAAAFjt9G6KdSncCkrjbTQPN+/2AAAAAAAAAAAAAAAJIPbrW9dj0qydQFIomYFHOwbhGZVGP2ZsPwcvjh+NFkP/////AAAAAAAAAAAAAAAAAAAAAAABAAoAAABYxw6TjIuUUmvdCcl00t4RBAAAADpodHRwOi8vcGxheXJlYWR5LmRpcmVjdHRhcHMubmV0L3ByL3N2Yy9yaWdodHNtYW5hZ2VyLmFzbXgAAAAAAQAFAAAADAAAAAAAAQAGAAAAXAAAAAEAAQIAAAAAADBRmRRpqV4cfRLcWz9WoXIGZ5qzD9xxJe0CSI2mXJQdPHEFZltrTkZtdmurwVaEI2etJY0OesCeOCzCqmEtTkcAAAABAAAAAgAAAAcAAAA8AAAAAAAAAAVEVEFQAAAAAAAAABVNZXRlcmluZyBDZXJ0aWZpY2F0ZQAAAAAAAAABAAAAAAABAAgAAACQAAEAQGHic/IPbmLCKXxc/MH20X/RtjhXH4jfowBWsQE1QWgUUBPFId7HH65YuQJ5fxbQJCT6Hw0iHqKzaTkefrhIpOoAAAIAW+uRUsdaChtq/AMUI4qPlK2Bi4bwOyjJcSQWz16LAFfwibn5yHVDEgNA4cQ9lt3kS4drx7pCC+FR/YLlHBAV7ENFUlQAAAABAAAC/AAAAmwAAQABAAAAWMk5Z0ovo2X0b2C9K5PbFX8AAAAAAAAAAAAAAARTYd1EkpFovPAZUjOj2doDLnHiRSfYc89Fs7gosBfar/////8AAAAAAAAAAAAAAAAAAAAAAAEABQAAAAwAAAAAAAEABgAAAGAAAAABAAECAAAAAABb65FSx1oKG2r8AxQjio+UrYGLhvA7KMlxJBbPXosAV/CJufnIdUMSA0DhxD2W3eRLh2vHukIL4VH9guUcEBXsAAAAAgAAAAEAAAAMAAAABwAAAZgAAAAAAAAAgE1pY3Jvc29mdAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgFBsYXlSZWFkeSBTTDAgTWV0ZXJpbmcgUm9vdCBDQQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgDEuMC4wLjEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEACAAAAJAAAQBArAKJsEIDWNG5ulOgLvSUb8I2zZ0c5lZGYvpIO56Z0UNk/uC4Mq3jwXQUUN6m/48V5J/vuLDhWu740aRQc1dDDAAAAgCGTWHP8iVuQixWizwoABz7PhUnZYWEugUht5sYKNk23h2Cao/D5uf6epDVyilG8fZKLvufXc/+fkNOtEKT+sWr"
|
|
},
|
|
{
|
|
"serverURL": "https://lic.staging.drmtoday.com/license-proxy-headerauth/drmtoday/RightsManager.asmx",
|
|
"servertype" : "drmtoday",
|
|
"sessionTypes" : [ "temporary", "persistent-usage-record", "persistent-license" ],
|
|
"merchant" : "w3c-eme-test",
|
|
"secret" : drmtodaysecret
|
|
} ]
|
|
};
|
|
|
|
|
|
var keySystemWrappers = {
|
|
// Key System wrappers map messages and pass to a handler, then map the response and return to caller
|
|
//
|
|
// function wrapper(handler, messageType, message, params)
|
|
//
|
|
// where:
|
|
// Promise<response> handler(messageType, message, responseType, headers, params);
|
|
//
|
|
|
|
'com.widevine.alpha': function(handler, messageType, message, params) {
|
|
return handler.call(this, messageType, new Uint8Array(message), 'json', null, params).then(function(response){
|
|
return base64DecodeToUnit8Array(response.license);
|
|
});
|
|
},
|
|
|
|
'com.microsoft.playready': function(handler, messageType, message, params) {
|
|
var msg, xmlDoc;
|
|
var licenseRequest = null;
|
|
var headers = {};
|
|
var parser = new DOMParser();
|
|
var dataview = new Uint16Array(message);
|
|
|
|
msg = String.fromCharCode.apply(null, dataview);
|
|
xmlDoc = parser.parseFromString(msg, 'application/xml');
|
|
|
|
if (xmlDoc.getElementsByTagName('Challenge')[0]) {
|
|
var challenge = xmlDoc.getElementsByTagName('Challenge')[0].childNodes[0].nodeValue;
|
|
if (challenge) {
|
|
licenseRequest = atob(challenge);
|
|
}
|
|
}
|
|
|
|
var headerNameList = xmlDoc.getElementsByTagName('name');
|
|
var headerValueList = xmlDoc.getElementsByTagName('value');
|
|
for (var i = 0; i < headerNameList.length; i++) {
|
|
headers[headerNameList[i].childNodes[0].nodeValue] = headerValueList[i].childNodes[0].nodeValue;
|
|
}
|
|
// some versions of the PlayReady CDM return 'Content' instead of 'Content-Type',
|
|
// but the license server expects 'Content-Type', so we fix it up here.
|
|
if (headers.hasOwnProperty('Content')) {
|
|
headers['Content-Type'] = headers.Content;
|
|
delete headers.Content;
|
|
}
|
|
|
|
return handler.call(this, messageType, licenseRequest, 'arraybuffer', headers, params).catch(function(response){
|
|
return response.text().then( function( error ) { throw error; } );
|
|
});
|
|
}
|
|
};
|
|
|
|
const requestConstructors = {
|
|
// Server request construction functions
|
|
//
|
|
// Promise<request> constructRequest(config, sessionType, content, messageType, message, params)
|
|
//
|
|
// request = { url: ..., headers: ..., body: ... }
|
|
//
|
|
// content = { assetId: ..., variantId: ..., key: ... }
|
|
// params = { expiration: ... }
|
|
|
|
'drmtoday': function(config, sessionType, content, messageType, message, headers, params) {
|
|
var optData = JSON.stringify({merchant: config.merchant, userId:"12345", sessionId:""});
|
|
var crt = {};
|
|
if (messageType === 'license-request') {
|
|
crt = {assetId: content.assetId,
|
|
outputProtection: {digital : false, analogue: false, enforce: false},
|
|
storeLicense: (sessionType === 'persistent-license')};
|
|
|
|
if (!params || params.expiration === undefined) {
|
|
crt.profile = {purchase: {}};
|
|
} else {
|
|
crt.profile = {rental: {absoluteExpiration: (new Date(params.expiration)).toISOString(),
|
|
playDuration: 3600000 } };
|
|
}
|
|
|
|
if (content.variantId !== undefined) {
|
|
crt.variantId = content.variantId;
|
|
}
|
|
}
|
|
|
|
return JWT.encode("HS256", {optData: optData, crt: JSON.stringify([crt])}, config.secret).then(function(jwt){
|
|
headers = headers || {};
|
|
headers['x-dt-auth-token'] = jwt;
|
|
return {url: config.serverURL, headers: headers, body: message};
|
|
});
|
|
},
|
|
|
|
'microsoft': function(config, sessionType, content, messageType, message, headers, params) {
|
|
var url = config.serverURL;
|
|
if (messageType === 'license-request') {
|
|
url += "?";
|
|
if (sessionType === 'temporary' || sessionType === 'persistent-usage-record') {
|
|
url += "UseSimpleNonPersistentLicense=1&";
|
|
}
|
|
if (sessionType === 'persistent-usage-record') {
|
|
url += "SecureStop=1&";
|
|
}
|
|
url += "PlayEnablers=B621D91F-EDCC-4035-8D4B-DC71760D43E9&"; // disable output protection
|
|
url += "ContentKey=" + btoa(String.fromCharCode.apply(null, content.key));
|
|
return url;
|
|
}
|
|
|
|
// TODO: Include expiration time in URL
|
|
return Promise.resolve({url: url, headers: headers, body: message});
|
|
}
|
|
};
|
|
|
|
MessageHandler = function(keysystem, content, sessionType) {
|
|
sessionType = sessionType || "temporary";
|
|
|
|
this._keysystem = keysystem;
|
|
this._content = content;
|
|
this._sessionType = sessionType;
|
|
try {
|
|
this._drmconfig = drmconfig[this._keysystem].filter(function(drmconfig) {
|
|
return drmconfig.sessionTypes === undefined || (drmconfig.sessionTypes.indexOf(sessionType) !== -1);
|
|
})[0];
|
|
this._requestConstructor = requestConstructors[this._drmconfig.servertype];
|
|
|
|
this.messagehandler = keySystemWrappers[keysystem].bind(this, MessageHandler.prototype.messagehandler);
|
|
|
|
if (this._drmconfig && this._drmconfig.certificate) {
|
|
this.servercertificate = stringToUint8Array(atob(this._drmconfig.certificate));
|
|
}
|
|
} catch(e) {
|
|
return null;
|
|
}
|
|
}
|
|
|
|
MessageHandler.prototype.messagehandler = function messagehandler(messageType, message, responseType, headers, params) {
|
|
|
|
var variantId = params ? params.variantId : undefined;
|
|
var key;
|
|
if( variantId ) {
|
|
var keys = this._content.keys.filter(function(k){return k.variantId === variantId;});
|
|
if (keys[0]) key = keys[0].key;
|
|
}
|
|
if (!key) {
|
|
key = this._content.keys[0].key;
|
|
}
|
|
|
|
var content = {assetId: this._content.assetId,
|
|
variantId: variantId,
|
|
key: key};
|
|
|
|
return this._requestConstructor(this._drmconfig, this._sessionType, content, messageType, message, headers, params).then(function(request){
|
|
return fetch(request.url, {
|
|
method: 'POST',
|
|
headers: request.headers,
|
|
body: request.body });
|
|
}).then(function(fetchresponse){
|
|
if(fetchresponse.status !== 200) {
|
|
throw fetchresponse;
|
|
}
|
|
|
|
if(responseType === 'json') {
|
|
return fetchresponse.json();
|
|
} else if(responseType === 'arraybuffer') {
|
|
return fetchresponse.arrayBuffer();
|
|
}
|
|
});
|
|
}
|
|
|
|
})();
|
|
|
|
(function() {
|
|
|
|
var subtlecrypto = window.crypto.subtle;
|
|
|
|
// Encoding / decoding utilities
|
|
function b64pad(b64) { return b64+"==".substr(0,(b64.length%4)?(4-b64.length%4):0); }
|
|
function str2b64url(str) { return btoa(str).replace(/=+$/g, '').replace(/\+/g, "-").replace(/\//g, "_"); }
|
|
function b64url2str(b64) { return atob(b64pad(b64.replace(/\-/g, "+").replace(/\_/g, "/"))); }
|
|
function str2ab(str) { return Uint8Array.from( str.split(''), function(s){return s.charCodeAt(0)} ); }
|
|
function ab2str(ab) { return String.fromCharCode.apply(null, new Uint8Array(ab)); }
|
|
|
|
function jwt2webcrypto(alg) {
|
|
if (alg === "HS256") return {name: "HMAC", hash: "SHA-256", length: 256};
|
|
else if (alg === "HS384") return { name: "HMAC", hash: "SHA-384", length: 384};
|
|
else if (alg === "HS512") return { name: "HMAC", hash: "SHA-512", length: 512};
|
|
else throw new Error("Unrecognized JWT algorithm: " + alg);
|
|
}
|
|
|
|
JWT = {
|
|
encode: function encode(alg, claims, secret) {
|
|
var algorithm = jwt2webcrypto(alg);
|
|
if (secret.byteLength !== algorithm.length / 8) throw new Error("Unexpected secret length: " + secret.byteLength);
|
|
|
|
if (!claims.iat) claims.iat = ((Date.now() / 1000) | 0) - 60;
|
|
if (!claims.jti) {
|
|
var nonce = new Uint8Array(16);
|
|
window.crypto.getRandomValues(nonce);
|
|
claims.jti = str2b64url( ab2str(nonce) );
|
|
}
|
|
|
|
var header = {typ: "JWT", alg: alg};
|
|
var plaintext = str2b64url(JSON.stringify(header)) + '.' + str2b64url(JSON.stringify(claims));
|
|
return subtlecrypto.importKey("raw", secret, algorithm, false, [ "sign" ]).then( function(key) {
|
|
return subtlecrypto.sign(algorithm, key, str2ab(plaintext));
|
|
}).then(function(hmac){
|
|
return plaintext + '.' + str2b64url(ab2str(hmac));
|
|
});
|
|
},
|
|
|
|
decode: function decode(jwt, secret) {
|
|
var jwtparts = jwt.split('.');
|
|
var header = JSON.parse( b64url2str(jwtparts[0]));
|
|
var claims = JSON.parse( b64url2str(jwtparts[1]));
|
|
var hmac = str2ab(b64url2str(jwtparts[2]));
|
|
var algorithm = jwt2webcrypto(header.alg);
|
|
if (secret.byteLength !== algorithm.length / 8) throw new Error("Unexpected secret length: " + secret.byteLength);
|
|
|
|
return subtlecrypto.importKey("raw", secret, algorithm, false, ["sign", "verify"]).then(function(key) {
|
|
return subtlecrypto.verify(algorithm, key, hmac, str2ab(jwtparts[0] + '.' + jwtparts[1]));
|
|
}).then(function(success){
|
|
if (!success) throw new Error("Invalid signature");
|
|
return claims;
|
|
});
|
|
}
|
|
};
|
|
})();
|