WebRTC M89 is currently available in the Chrome beta channel with over 39 bug fixes, feature enhancements, stability and performance improvements. This article is the Chinese version of WebRTC M89 Release Notes. Welcome to follow us, we will regularly translate WebRTC related content, help developers get the latest information, walk in the forefront of the industry.

Public Service Announcements

WebRTC’s Plan B SDP semantics will be deprecated and removed.

WebRTC version 1.0 is currently a W3C recommendation for Unified Plan in the SDP standard format, supported by all major browsers. It’s time to deprecate and move the standard Chromium SDP format — PlanB — this year. Here’s the timeline:

  • M89 (stable February 2021) : Developers added deprecation warnings to the console.
  • M93 (Stable in August 2021) : Plan B was removed, and the Reverse Origin Trial could be added to extend the deadline.
  • M96 (Stable January 2022) : Extended deadline ends and Plan B is removed.

In the M88 and M89 versions, the performance improvements significantly reduce CPU usage and the time it takes to call the WebRTC negotiation method, thanks to the use of Unified Plan.

Click on webrtc.org/chrome to see the use of RTP payload types [35-65].

Dynamic RTP load types in the range 96-127 are exhausted. This requires special consideration for interoperability with older versions of Chrome. Please read the announcement for details.

A =extmap-allow-mixed will be provided by default.

Chrome has supported the SDP attribute extmap-allow-mixed since M71. However, if extmap-allow-mixed is provided, SDP negotiation will fail in Chrome prior to M71.

However, in Chrome versions prior to M71, SDP negotiation will fail if extmap-allow-mixed is provided. Starting with Chrome M89, extmap-allow-mixed will be provided by default. You can read this announcement.

Deprecation Deprecates parameters

Can be found at bugs.chromium.org/p/webrtc/is… ID to query bug details

Platform Platform Issue problem The Description described Component components
WebRTC 6471 Delete the class RTPFragmentationHeader Deletes the class RTPFragmentationHeader Video Video

Functions and problem fixes

Can be found at bugs.chromium.org/p/webrtc/is… ID to query bug details.

Chrome

No.1

  • Type: Feature
  • Problem ID: 1146942
  • Description: Upgrade pipeWire building Chromium/WebrTC from 0.2 to 0.3
  • Components: Internals > Media > ScreenCapture

No.2

  • Type: Vulnerability
  • Problem ID: 1152841
  • Description: The browser occasionally hangs when the share target picker is turned off
  • Components: Internals > Media > ScreenCapture

No.3

  • Type: Vulnerability
  • Problem ID: 1155459
  • Description: The default STUN attribute length limit value is too small
  • Components: Blink > WebRTC > Network

No.4

  • Type: Vulnerability
  • Problem ID: 943975
  • Description: Set the upper limit of messages displayed in RTCsctp Transport
  • Components: Blink > WebRTC > PeerConnection

No.5

  • Type: Feature
  • Problem ID: 10439
  • Description: provides a generic interface for code stream parsing
  • Components: Video

No.6

  • Type: Feature
  • Problem ID: 10480
  • Description: Improve RNN VAD efficiency and code quality
  • Components: Audio

No.7

  • Type: Vulnerability
  • Problem ID: 10675
  • Description: Support recording raw RTP in Text2pCAP format
  • Components: Network > RTP

No.8

  • Type: Feature
  • Problem ID: 10897
  • Description: Add TURN_LOGGING_ID
  • Components: Network > ICE, PeerConnection

No.9

  • Type: Vulnerability
  • Problem ID: 11266
  • Description: The branch is marked expired with information
  • Components: Documentation

No.10

  • Type: Vulnerability
  • Problem ID: 11767
  • Description: Reduces the number of block calls from 2 to 1
  • Components: Stats

No.11

  • Type: Feature
  • Problem ID: 12111
  • Description: Designed VoipVolumeControl interface for VoIP API
  • Components: Audio

No.12

  • Type: Vulnerability
  • Problem ID: 12148
  • Description: AV1 active decoder target mask is incorrectly set
  • Components: Video

No.13

  • Type: Vulnerability
  • Problem ID: 12167
  • Description: AV1 Packetizer sets tag bits on each spatial layer
  • Components: Network > RTP

No.14

  • Type: Vulnerability
  • Problem ID: 12181
  • TransportId is missing from RTCCodecStats
  • Components: Stats

No.15

  • Type: Vulnerability
  • Problem ID: 12185
  • Description: Incorrect GetLinearAecOutput output range
  • Components: Audio

No.16

  • Type: Feature
  • Problem ID: 12193
  • Description: VoIP API result types and enforcement policies
  • Components: Audio

No.17

  • Type: Vulnerability
  • Problem ID: 12194
  • Description: The dynamic RTP value range has been used up
  • Components: PeerConnection

No.18

  • Type: Vulnerability
  • Problem ID: 12204
  • Description: Fix corrupted video_replay thread
  • Components: the Tools

No.19

  • Type: Vulnerability
  • Problem ID: 12215
  • Description: call CreateSessionDescription SetLocalDescription/SetRemoteDescription three times
  • Components: PeerConnection

No.20

  • Type: Vulnerability
  • Problem ID: 12216
  • Description: Allows initial frame loss of simulcast streams
  • Components: Video

No.21

  • Type: Vulnerability
  • Problem ID: 12217
  • Description: A mechanical tone is heard when TLSv1.2 is used for communication
  • Components: Audio, Network

No.22

  • Type: Vulnerability
  • Problem ID: 12238
  • Description: RTCPeerConnection Create should return an error code
  • Components: PeerConnection

No.23

  • Type: Vulnerability
  • Problem ID: 12261
  • Description: [Adaptability] Allows TestBed to simulate within CPU limits
  • Components: Video

No.24

  • Type: Vulnerability
  • Problem ID: 12265
  • Description: AEC3: Linear filter gradually diverges over a long call
  • Components: Audio

No.25

  • Type: Vulnerability
  • Problem ID: 12274
  • Description: The Libvpx VP9 codec package is difficult to test
  • Components: Video

No.26

  • Type: Vulnerability
  • Problem ID: 12297
  • Description: VideoReceiveStream2: Delete postTasks that are not needed
  • Components: Perf

No.27

  • Type: Vulnerability
  • Problem ID: 12314
  • Description: Collates the #includes header for different style guides under the ILBC module
  • Components: Audio

No.28

  • Type: Vulnerability
  • Problem ID: 12323
  • JsepSessionDescription: : Clone () don’t copy the ICE candidate items
  • Components: PeerConnection

No.29

  • Type: Vulnerability
  • Problem ID: 8133
  • Description: RTP transmits OPUS stereo mixing to mono channel
  • Components: Audio

No.30

  • Type: Vulnerability
  • Problem ID: 9424
  • Description: SrtpTransport: : error writability OnWritableState calculation
  • Components: PeerConnection

More technical dry goods, welcome to pay attention to [netease Smart enterprise technology +] wechat public number