WebRTC M89 is currently available in the Chrome beta channel with over 39 bug fixes, feature enhancements, stability and performance improvements. This article is the Chinese version of WebRTC M89 Release Notes. Welcome to follow us, we will regularly translate WebRTC related content, help developers get the latest information, walk in the forefront of the industry.
Public Service Announcements
WebRTC’s Plan B SDP semantics will be deprecated and removed.
WebRTC version 1.0 is currently a W3C recommendation for Unified Plan in the SDP standard format, supported by all major browsers. It’s time to deprecate and move the standard Chromium SDP format — PlanB — this year. Here’s the timeline:
- M89 (stable February 2021) : Developers added deprecation warnings to the console.
- M93 (Stable in August 2021) : Plan B was removed, and the Reverse Origin Trial could be added to extend the deadline.
- M96 (Stable January 2022) : Extended deadline ends and Plan B is removed.
In the M88 and M89 versions, the performance improvements significantly reduce CPU usage and the time it takes to call the WebRTC negotiation method, thanks to the use of Unified Plan.
Click on webrtc.org/chrome to see the use of RTP payload types [35-65].
Dynamic RTP load types in the range 96-127 are exhausted. This requires special consideration for interoperability with older versions of Chrome. Please read the announcement for details.
A =extmap-allow-mixed will be provided by default.
Chrome has supported the SDP attribute extmap-allow-mixed since M71. However, if extmap-allow-mixed is provided, SDP negotiation will fail in Chrome prior to M71.
However, in Chrome versions prior to M71, SDP negotiation will fail if extmap-allow-mixed is provided. Starting with Chrome M89, extmap-allow-mixed will be provided by default. You can read this announcement.
Deprecation Deprecates parameters
Can be found at bugs.chromium.org/p/webrtc/is… ID to query bug details
Platform Platform | Issue problem | The Description described | Component components |
---|---|---|---|
WebRTC | 6471 | Delete the class RTPFragmentationHeader Deletes the class RTPFragmentationHeader | Video Video |
Functions and problem fixes
Can be found at bugs.chromium.org/p/webrtc/is… ID to query bug details.
Chrome
No.1
- Type: Feature
- Problem ID: 1146942
- Description: Upgrade pipeWire building Chromium/WebrTC from 0.2 to 0.3
- Components: Internals > Media > ScreenCapture
No.2
- Type: Vulnerability
- Problem ID: 1152841
- Description: The browser occasionally hangs when the share target picker is turned off
- Components: Internals > Media > ScreenCapture
No.3
- Type: Vulnerability
- Problem ID: 1155459
- Description: The default STUN attribute length limit value is too small
- Components: Blink > WebRTC > Network
No.4
- Type: Vulnerability
- Problem ID: 943975
- Description: Set the upper limit of messages displayed in RTCsctp Transport
- Components: Blink > WebRTC > PeerConnection
No.5
- Type: Feature
- Problem ID: 10439
- Description: provides a generic interface for code stream parsing
- Components: Video
No.6
- Type: Feature
- Problem ID: 10480
- Description: Improve RNN VAD efficiency and code quality
- Components: Audio
No.7
- Type: Vulnerability
- Problem ID: 10675
- Description: Support recording raw RTP in Text2pCAP format
- Components: Network > RTP
No.8
- Type: Feature
- Problem ID: 10897
- Description: Add TURN_LOGGING_ID
- Components: Network > ICE, PeerConnection
No.9
- Type: Vulnerability
- Problem ID: 11266
- Description: The branch is marked expired with information
- Components: Documentation
No.10
- Type: Vulnerability
- Problem ID: 11767
- Description: Reduces the number of block calls from 2 to 1
- Components: Stats
No.11
- Type: Feature
- Problem ID: 12111
- Description: Designed VoipVolumeControl interface for VoIP API
- Components: Audio
No.12
- Type: Vulnerability
- Problem ID: 12148
- Description: AV1 active decoder target mask is incorrectly set
- Components: Video
No.13
- Type: Vulnerability
- Problem ID: 12167
- Description: AV1 Packetizer sets tag bits on each spatial layer
- Components: Network > RTP
No.14
- Type: Vulnerability
- Problem ID: 12181
- TransportId is missing from RTCCodecStats
- Components: Stats
No.15
- Type: Vulnerability
- Problem ID: 12185
- Description: Incorrect GetLinearAecOutput output range
- Components: Audio
No.16
- Type: Feature
- Problem ID: 12193
- Description: VoIP API result types and enforcement policies
- Components: Audio
No.17
- Type: Vulnerability
- Problem ID: 12194
- Description: The dynamic RTP value range has been used up
- Components: PeerConnection
No.18
- Type: Vulnerability
- Problem ID: 12204
- Description: Fix corrupted video_replay thread
- Components: the Tools
No.19
- Type: Vulnerability
- Problem ID: 12215
- Description: call CreateSessionDescription SetLocalDescription/SetRemoteDescription three times
- Components: PeerConnection
No.20
- Type: Vulnerability
- Problem ID: 12216
- Description: Allows initial frame loss of simulcast streams
- Components: Video
No.21
- Type: Vulnerability
- Problem ID: 12217
- Description: A mechanical tone is heard when TLSv1.2 is used for communication
- Components: Audio, Network
No.22
- Type: Vulnerability
- Problem ID: 12238
- Description: RTCPeerConnection Create should return an error code
- Components: PeerConnection
No.23
- Type: Vulnerability
- Problem ID: 12261
- Description: [Adaptability] Allows TestBed to simulate within CPU limits
- Components: Video
No.24
- Type: Vulnerability
- Problem ID: 12265
- Description: AEC3: Linear filter gradually diverges over a long call
- Components: Audio
No.25
- Type: Vulnerability
- Problem ID: 12274
- Description: The Libvpx VP9 codec package is difficult to test
- Components: Video
No.26
- Type: Vulnerability
- Problem ID: 12297
- Description: VideoReceiveStream2: Delete postTasks that are not needed
- Components: Perf
No.27
- Type: Vulnerability
- Problem ID: 12314
- Description: Collates the #includes header for different style guides under the ILBC module
- Components: Audio
No.28
- Type: Vulnerability
- Problem ID: 12323
- JsepSessionDescription: : Clone () don’t copy the ICE candidate items
- Components: PeerConnection
No.29
- Type: Vulnerability
- Problem ID: 8133
- Description: RTP transmits OPUS stereo mixing to mono channel
- Components: Audio
No.30
- Type: Vulnerability
- Problem ID: 9424
- Description: SrtpTransport: : error writability OnWritableState calculation
- Components: PeerConnection
More technical dry goods, welcome to pay attention to [netease Smart enterprise technology +] wechat public number