WebRTC M89 is currently available in the Chrome Beta channel and contains more than 39 bug fixes, feature enhancements, stability and performance improvements. This article is WebRTC M89 Release Notes. Welcome to follow us, we will regularly translate WebRTC related content, help developers to get the latest news, walk in the forefront of the industry.

Public Service Notices

The Plan B SDP semantics of WebRTC will be deprecated and removed.

WebRTC version 1.0 is currently a W3C Recommendation Protocol (data) using the SDP standard format, Unified Plan, and is supported by all major browsers. This year it’s time to deprecate and move unless the standard Chromium SDP format, PLANB, is deprecated as follows:

  • M89 (stable Feb 2021) : Developers added deprecation warnings to the console.
  • M93 (stable August 2021) : Plan B has been removed and has the option of joining the Reverse Origin Trial to extend this deadline.
  • M96 (stable January 2022) : The extended deadline ends and Plan B is removed.

In the M88 and M89 versions, the performance improvements significantly reduced the CPU usage and invocation time of the WebRTC negotiation method, thanks to the use of the Unified Plan.

Click to see the use of the RTP payload types [35-65] at webrtc.org/chrome.

Dynamic RTP load types in the range 96-127 are exhausted. This requires special consideration for interoperability with older versions of Chrome. Please read the announcement for details.

A = ExtMap-Allow-Mixed will be provided by default.

ExtMap-Allow-Mixed is an extMap-Allow-Mixed attribute that Chrome has supported since the M71 version. If the extMap-Allow-Mixed attribute is provided, the SDP negotiation for previous versions of Chrome will fail.

However, in Chrome versions prior to M71, SDP negotiation will fail if extMap-Allow-Mixed is provided. Starting with Chrome M89, extMap-Allow-Mixed will be provided by default. You can read this announcement.

Deprecation Deprecation parameter

Can be found at https://bugs.chromium.org/p/w. ID can query the bug details

Platform Platform Issue problem The Description described Component components
WebRTC 6471 Delete the class RTPFragmentationHeader Video Video

Function and problem fixes

Can be found at https://bugs.chromium.org/p/w. ID can query the bug details.

Chrome

No.1

  • Type: Features
  • Problem ID: 1146942
  • Description: Upgrade the Pipewire that builds Chromium/WebRTC from 0.2 to 0.3
  • Components: Internals > Media > ScreenCapture

No.2

  • Type: Vulnerability
  • Problem ID: 1152841
  • Description: The browser occasionally hangs when Share Target Picker is turned off
  • Components: Internals > Media > ScreenCapture

No.3

  • Type: Vulnerability
  • Problem ID: 1155459
  • Description: The default STUN attribute length limit is too small
  • Components: Blink > WebRTC > Network

No.4

  • Type: Vulnerability
  • Problem ID: 943975
  • Description: Set the display message limit in RTCSCTP Transport
  • Components: Blink > WebRTC > PeerConnection

No.5

  • Type: Features
  • Problem ID: 10439
  • Description: Provides a common interface for stream parsing
  • Components: Video

No.6

  • Type: Features
  • Problem ID: 10480
  • Description: Improve RNN VAD efficiency and code quality
  • Components: Audio

No.7

  • Type: Vulnerability
  • Problem ID: 10675
  • Description: Support recording raw RTP in text2pcap format
  • Components: Network > RTP

No.8

  • Type: Features
  • Problem ID: 10897
  • Description: Add TURN_LOGGING_ID
  • Components: Network > ICE, PeerConnection

No.9

  • Type: Vulnerability
  • Problem ID: 11266
  • Description: Branches are marked as expired with information
  • Components: Documentation

No.10

  • Type: Vulnerability
  • Problem ID: 11767
  • Description: Reduce the number of block calls from 2 to 1
  • Components: Stats

No.11

  • Type: Features
  • Problem ID: 12111
  • Description: Design the VoIP volumecontrol interface for the VoIP API
  • Components: Audio

No.12

  • Type: Vulnerability
  • Problem ID: 12148
  • Description: AV1 active decoder target mask is not set correctly
  • Components: Video

No.13

  • Type: Vulnerability
  • Problem ID: 12167
  • Description: AV1 PACKETIZER sets the marker bits at each spatial layer
  • Components: Network > RTP

No.14

  • Type: Vulnerability
  • Problem ID: 12181
  • TransportID is missing in RTCCODECSTATS
  • Components: Stats

No.15

  • Type: Vulnerability
  • Problem ID: 12185
  • Description: Incorrect GetLinearaECOutput output range
  • Components: Audio

No.16

  • Type: Features
  • Problem ID: 12193
  • Description: VoIP API result types and implementation policies
  • Components: Audio

No.17

  • Type: Vulnerability
  • Problem ID: 12194
  • Description: Dynamic RTP value range has been exhausted
  • Components: PeerConnection

No.18

  • Type: Vulnerability
  • Problem ID: 12204
  • Description: Fix the damaged video_replay thread
  • Components: the Tools

No.19

  • Type: Vulnerability
  • Problem ID: 12215
  • Description: call CreateSessionDescription SetLocalDescription/SetRemoteDescription three times
  • Components: PeerConnection

No.20

  • Type: Vulnerability
  • Question ID: 12216
  • Description: Allows initial frames of a Simulcast stream to drop frames
  • Components: Video

No.21

  • Type: Vulnerability
  • Problem ID: 12217
  • Description: Mechanical sound is heard when communicating using TLSV1.2 protocol
  • Components: Audio, Network

No.22

  • Type: Vulnerability
  • Problem ID: 12238
  • Description: The RTCPEERConnection Create function should return an error code
  • Components: PeerConnection

No.23

  • Type: Vulnerability
  • Problem ID: 12261
  • Description: [Adaptability] Allows Testbed to simulate under CPU constraints
  • Components: Video

No.24

  • Type: Vulnerability
  • Problem ID: 12265
  • Description: AEC3: Linear filters diverge gradually over long calls
  • Components: Audio

No.25

  • Type: Vulnerability
  • Problem ID: 12274
  • Description: Libvpx VP9 codec package is difficult to test
  • Components: Video

No.26

  • Type: Vulnerability
  • Problem ID: 12297
  • Description: VideoReceiveStream2: Delete unwanted PostTasks
  • Components: Perf

No.27

  • Type: Vulnerability
  • Question ID: 12314
  • Description: Organize the #includes header files of different style guides under the ILBC module
  • Components: Audio

No.28

  • Type: Vulnerability
  • Question ID: 12323
  • JsepSessionDescription: : Clone () don’t copy the ICE candidate items
  • Components: PeerConnection

No.29

  • Type: Vulnerability
  • Problem ID: 8133
  • Description: RTP transmits Opus Stereo Blend to Mono
  • Components: Audio

No.30

  • Type: Vulnerability
  • Problem ID: 9424
  • Description: SrtpTransport: : error writability OnWritableState calculation
  • Components: PeerConnection

More technical dry goods, welcome to pay attention to “netease intelligent enterprise technology +” WeChat public number