WebRTC M89 is currently available in the Chrome Beta channel and contains more than 39 bug fixes, feature enhancements, stability and performance improvements. This article is WebRTC M89 Release Notes. Welcome to follow us, we will regularly translate WebRTC related content, help developers to get the latest news, walk in the forefront of the industry.
Public Service Notices
The Plan B SDP semantics of WebRTC will be deprecated and removed.
WebRTC version 1.0 is currently a W3C Recommendation Protocol (data) using the SDP standard format, Unified Plan, and is supported by all major browsers. This year it’s time to deprecate and move unless the standard Chromium SDP format, PLANB, is deprecated as follows:
- M89 (stable Feb 2021) : Developers added deprecation warnings to the console.
- M93 (stable August 2021) : Plan B has been removed and has the option of joining the Reverse Origin Trial to extend this deadline.
- M96 (stable January 2022) : The extended deadline ends and Plan B is removed.
In the M88 and M89 versions, the performance improvements significantly reduced the CPU usage and invocation time of the WebRTC negotiation method, thanks to the use of the Unified Plan.
Click to see the use of the RTP payload types [35-65] at webrtc.org/chrome.
Dynamic RTP load types in the range 96-127 are exhausted. This requires special consideration for interoperability with older versions of Chrome. Please read the announcement for details.
A = ExtMap-Allow-Mixed will be provided by default.
ExtMap-Allow-Mixed is an extMap-Allow-Mixed attribute that Chrome has supported since the M71 version. If the extMap-Allow-Mixed attribute is provided, the SDP negotiation for previous versions of Chrome will fail.
However, in Chrome versions prior to M71, SDP negotiation will fail if extMap-Allow-Mixed is provided. Starting with Chrome M89, extMap-Allow-Mixed will be provided by default. You can read this announcement.
Deprecation Deprecation parameter
Can be found at https://bugs.chromium.org/p/w. ID can query the bug details
Platform Platform | Issue problem | The Description described | Component components |
---|---|---|---|
WebRTC | 6471 | Delete the class RTPFragmentationHeader | Video Video |
Function and problem fixes
Can be found at https://bugs.chromium.org/p/w. ID can query the bug details.
Chrome
No.1
- Type: Features
- Problem ID: 1146942
- Description: Upgrade the Pipewire that builds Chromium/WebRTC from 0.2 to 0.3
- Components: Internals > Media > ScreenCapture
No.2
- Type: Vulnerability
- Problem ID: 1152841
- Description: The browser occasionally hangs when Share Target Picker is turned off
- Components: Internals > Media > ScreenCapture
No.3
- Type: Vulnerability
- Problem ID: 1155459
- Description: The default STUN attribute length limit is too small
- Components: Blink > WebRTC > Network
No.4
- Type: Vulnerability
- Problem ID: 943975
- Description: Set the display message limit in RTCSCTP Transport
- Components: Blink > WebRTC > PeerConnection
No.5
- Type: Features
- Problem ID: 10439
- Description: Provides a common interface for stream parsing
- Components: Video
No.6
- Type: Features
- Problem ID: 10480
- Description: Improve RNN VAD efficiency and code quality
- Components: Audio
No.7
- Type: Vulnerability
- Problem ID: 10675
- Description: Support recording raw RTP in text2pcap format
- Components: Network > RTP
No.8
- Type: Features
- Problem ID: 10897
- Description: Add TURN_LOGGING_ID
- Components: Network > ICE, PeerConnection
No.9
- Type: Vulnerability
- Problem ID: 11266
- Description: Branches are marked as expired with information
- Components: Documentation
No.10
- Type: Vulnerability
- Problem ID: 11767
- Description: Reduce the number of block calls from 2 to 1
- Components: Stats
No.11
- Type: Features
- Problem ID: 12111
- Description: Design the VoIP volumecontrol interface for the VoIP API
- Components: Audio
No.12
- Type: Vulnerability
- Problem ID: 12148
- Description: AV1 active decoder target mask is not set correctly
- Components: Video
No.13
- Type: Vulnerability
- Problem ID: 12167
- Description: AV1 PACKETIZER sets the marker bits at each spatial layer
- Components: Network > RTP
No.14
- Type: Vulnerability
- Problem ID: 12181
- TransportID is missing in RTCCODECSTATS
- Components: Stats
No.15
- Type: Vulnerability
- Problem ID: 12185
- Description: Incorrect GetLinearaECOutput output range
- Components: Audio
No.16
- Type: Features
- Problem ID: 12193
- Description: VoIP API result types and implementation policies
- Components: Audio
No.17
- Type: Vulnerability
- Problem ID: 12194
- Description: Dynamic RTP value range has been exhausted
- Components: PeerConnection
No.18
- Type: Vulnerability
- Problem ID: 12204
- Description: Fix the damaged video_replay thread
- Components: the Tools
No.19
- Type: Vulnerability
- Problem ID: 12215
- Description: call CreateSessionDescription SetLocalDescription/SetRemoteDescription three times
- Components: PeerConnection
No.20
- Type: Vulnerability
- Question ID: 12216
- Description: Allows initial frames of a Simulcast stream to drop frames
- Components: Video
No.21
- Type: Vulnerability
- Problem ID: 12217
- Description: Mechanical sound is heard when communicating using TLSV1.2 protocol
- Components: Audio, Network
No.22
- Type: Vulnerability
- Problem ID: 12238
- Description: The RTCPEERConnection Create function should return an error code
- Components: PeerConnection
No.23
- Type: Vulnerability
- Problem ID: 12261
- Description: [Adaptability] Allows Testbed to simulate under CPU constraints
- Components: Video
No.24
- Type: Vulnerability
- Problem ID: 12265
- Description: AEC3: Linear filters diverge gradually over long calls
- Components: Audio
No.25
- Type: Vulnerability
- Problem ID: 12274
- Description: Libvpx VP9 codec package is difficult to test
- Components: Video
No.26
- Type: Vulnerability
- Problem ID: 12297
- Description: VideoReceiveStream2: Delete unwanted PostTasks
- Components: Perf
No.27
- Type: Vulnerability
- Question ID: 12314
- Description: Organize the #includes header files of different style guides under the ILBC module
- Components: Audio
No.28
- Type: Vulnerability
- Question ID: 12323
- JsepSessionDescription: : Clone () don’t copy the ICE candidate items
- Components: PeerConnection
No.29
- Type: Vulnerability
- Problem ID: 8133
- Description: RTP transmits Opus Stereo Blend to Mono
- Components: Audio
No.30
- Type: Vulnerability
- Problem ID: 9424
- Description: SrtpTransport: : error writability OnWritableState calculation
- Components: PeerConnection
More technical dry goods, welcome to pay attention to “netease intelligent enterprise technology +” WeChat public number