1use std::collections::VecDeque;
2use std::pin::Pin;
3use std::sync::Arc;
4use std::time::Instant;
5
6use futures::channel::oneshot::Sender;
7use futures::stream::Stream;
8use futures::task::{Context, Poll};
9
10use crate::auth::Credentials;
11use crate::cdp::browser_protocol::target::CloseTargetParams;
12use crate::cmd::CommandChain;
13use crate::cmd::CommandMessage;
14use crate::error::{CdpError, Result};
15use crate::handler::browser::BrowserContext;
16use crate::handler::domworld::DOMWorldKind;
17use crate::handler::emulation::EmulationManager;
18use crate::handler::frame::FrameRequestedNavigation;
19use crate::handler::frame::{
20 FrameEvent, FrameManager, NavigationError, NavigationId, NavigationOk,
21};
22use crate::handler::network::{NetworkEvent, NetworkManager};
23use crate::handler::page::PageHandle;
24use crate::handler::viewport::Viewport;
25use crate::handler::{PageInner, REQUEST_TIMEOUT};
26use crate::listeners::{EventListenerRequest, EventListeners};
27use crate::{page::Page, ArcHttpRequest};
28use chromiumoxide_cdp::cdp::browser_protocol::{
29 browser::BrowserContextId,
30 log as cdplog,
31 page::{FrameId, GetFrameTreeParams},
32 target::{AttachToTargetParams, SessionId, SetAutoAttachParams, TargetId, TargetInfo},
33};
34use chromiumoxide_cdp::cdp::events::CdpEvent;
35use chromiumoxide_cdp::cdp::js_protocol::runtime::{
36 ExecutionContextId, RunIfWaitingForDebuggerParams,
37};
38use chromiumoxide_cdp::cdp::CdpEventMessage;
39use chromiumoxide_types::{Command, Method, MethodId, Request, Response};
40use spider_network_blocker::intercept_manager::NetworkInterceptManager;
41use std::time::Duration;
42
43macro_rules! advance_state {
44 ($s:ident, $cx:ident, $now:ident, $cmds: ident, $next_state:expr ) => {{
45 if let Poll::Ready(poll) = $cmds.poll($now) {
46 return match poll {
47 None => {
48 $s.init_state = $next_state;
49 $s.poll($cx, $now)
50 }
51 Some(Ok((method, params))) => Some(TargetEvent::Request(Request {
52 method,
53 session_id: $s.session_id.clone().map(Into::into),
54 params,
55 })),
56 Some(Err(_)) => Some($s.on_initialization_failed()),
57 };
58 } else {
59 return None;
60 }
61 }};
62}
63
64lazy_static::lazy_static! {
65 static ref INIT_COMMANDS_PARAMS: Vec<(MethodId, serde_json::Value)> = {
67 if let Ok(attach) = SetAutoAttachParams::builder()
68 .flatten(true)
69 .auto_attach(true)
70 .wait_for_debugger_on_start(true)
71 .build() {
72 let disable_log = cdplog::DisableParams::default();
73
74 let mut cmds = vec![
75 (
76 attach.identifier(),
77 serde_json::to_value(attach).unwrap_or_default(),
78 ),
79 (
80 disable_log.identifier(),
81 serde_json::to_value(disable_log).unwrap_or_default(),
82 )
83 ];
84
85 if cfg!(feature = "collect_metrics") {
87 let enable_performance = chromiumoxide_cdp::cdp::browser_protocol::performance::EnableParams::default();
88 cmds.push((
89 enable_performance.identifier(),
90 serde_json::to_value(enable_performance).unwrap_or_default(),
91 ));
92 }
93
94 cmds
95 } else {
96 vec![]
97 }
98 };
99
100 static ref ATTACH_TARGET: (MethodId, serde_json::Value) = {
102 let runtime_cmd = RunIfWaitingForDebuggerParams::default();
103 (
104 runtime_cmd.identifier(),
105 serde_json::to_value(runtime_cmd).unwrap_or_default()
106 )
107 };
108}
109
110#[derive(Debug)]
111pub struct Target {
112 info: TargetInfo,
114 r#type: TargetType,
116 config: TargetConfig,
118 browser_context: BrowserContext,
120 frame_manager: FrameManager,
123 pub(crate) network_manager: NetworkManager,
125 emulation_manager: EmulationManager,
126 session_id: Option<SessionId>,
128 page: Option<PageHandle>,
130 pub(crate) init_state: TargetInit,
132 queued_events: VecDeque<TargetEvent>,
134 event_listeners: EventListeners,
136 wait_for_frame_navigation: Vec<Sender<ArcHttpRequest>>,
138 wait_for_network_idle: Vec<Sender<ArcHttpRequest>>,
140 wait_for_network_almost_idle: Vec<Sender<ArcHttpRequest>>,
142 initiator: Option<Sender<Result<Page>>>,
144 attached_emulation_init_cmds: Vec<(MethodId, serde_json::Value)>,
146 attached_user_agent_override: Option<(MethodId, serde_json::Value)>,
148}
149
150impl Target {
151 pub fn new(info: TargetInfo, config: TargetConfig, browser_context: BrowserContext) -> Self {
154 let ty = TargetType::new(&info.r#type);
155 let request_timeout: Duration = config.request_timeout;
156 let mut network_manager = NetworkManager::new(config.ignore_https_errors, request_timeout);
157
158 if !config.cache_enabled {
159 network_manager.set_cache_enabled(false);
160 }
161
162 if !config.service_worker_enabled {
163 network_manager.set_service_worker_enabled(true);
164 }
165
166 network_manager.set_request_interception(config.request_intercept);
167 network_manager.max_bytes_allowed = config.max_bytes_allowed;
168
169 if let Some(headers) = &config.extra_headers {
170 network_manager.set_extra_headers(headers.clone());
171 }
172
173 if let Some(white_list) = &config.whitelist_patterns {
174 network_manager.set_whitelist_patterns(white_list.clone());
175 }
176
177 network_manager.ignore_visuals = config.ignore_visuals;
178 network_manager.block_javascript = config.ignore_javascript;
179 network_manager.block_analytics = config.ignore_analytics;
180 network_manager.block_stylesheets = config.ignore_stylesheets;
181 network_manager.only_html = config.only_html;
182 network_manager.intercept_manager = config.intercept_manager;
183
184 Self {
185 info,
186 r#type: ty,
187 config,
188 frame_manager: FrameManager::new(request_timeout),
189 network_manager,
190 emulation_manager: EmulationManager::new(request_timeout),
191 session_id: None,
192 page: None,
193 init_state: TargetInit::AttachToTarget,
194 wait_for_frame_navigation: Default::default(),
195 wait_for_network_idle: Default::default(),
196 wait_for_network_almost_idle: Default::default(),
197 queued_events: Default::default(),
198 event_listeners: Default::default(),
199 initiator: None,
200 browser_context,
201 attached_emulation_init_cmds: Vec::new(),
202 attached_user_agent_override: None,
203 }
204 }
205
206 pub fn set_session_id(&mut self, id: SessionId) {
208 self.session_id = Some(id)
209 }
210
211 pub fn session_id(&self) -> Option<&SessionId> {
213 self.session_id.as_ref()
214 }
215
216 pub fn session_id_mut(&mut self) -> &mut Option<SessionId> {
218 &mut self.session_id
219 }
220
221 pub fn browser_context(&self) -> &BrowserContext {
223 &self.browser_context
224 }
225
226 pub fn target_id(&self) -> &TargetId {
228 &self.info.target_id
229 }
230
231 pub fn r#type(&self) -> &TargetType {
233 &self.r#type
234 }
235
236 pub fn is_initialized(&self) -> bool {
238 matches!(self.init_state, TargetInit::Initialized)
239 }
240
241 pub fn goto(&mut self, req: FrameRequestedNavigation) {
243 if self.network_manager.has_target_domain() {
244 self.network_manager.clear_target_domain();
245 let goto_url = req
246 .req
247 .params
248 .as_object()
249 .and_then(|o| o.get("url"))
250 .and_then(|v| v.as_str());
251
252 if let Some(url) = goto_url {
253 self.network_manager.set_page_url(url.into());
254 }
255 }
256 self.frame_manager.goto(req);
257 }
258
259 fn create_page(&mut self) {
261 if self.page.is_none() {
262 if let Some(session) = self.session_id.clone() {
263 let handle =
264 PageHandle::new(self.target_id().clone(), session, self.opener_id().cloned());
265 self.page = Some(handle);
266 }
267 }
268 }
269
270 pub(crate) fn get_or_create_page(&mut self) -> Option<&Arc<PageInner>> {
272 self.create_page();
273 self.page.as_ref().map(|p| p.inner())
274 }
275
276 pub fn is_page(&self) -> bool {
278 self.r#type().is_page()
279 }
280
281 pub fn browser_context_id(&self) -> Option<&BrowserContextId> {
283 self.info.browser_context_id.as_ref()
284 }
285
286 pub fn info(&self) -> &TargetInfo {
288 &self.info
289 }
290
291 pub fn opener_id(&self) -> Option<&TargetId> {
293 self.info.opener_id.as_ref()
294 }
295
296 pub fn frame_manager(&self) -> &FrameManager {
297 &self.frame_manager
298 }
299
300 pub fn frame_manager_mut(&mut self) -> &mut FrameManager {
302 &mut self.frame_manager
303 }
304
305 pub fn event_listeners_mut(&mut self) -> &mut EventListeners {
307 &mut self.event_listeners
308 }
309
310 pub fn on_response(&mut self, resp: Response, method: &str) {
312 if let Some(cmds) = self.init_state.commands_mut() {
313 cmds.received_response(method);
314 }
315
316 if let GetFrameTreeParams::IDENTIFIER = method {
317 if let Some(resp) = resp
318 .result
319 .and_then(|val| GetFrameTreeParams::response_from_value(val).ok())
320 {
321 self.frame_manager.on_frame_tree(resp.frame_tree);
322 }
323 }
324 }
327
328 pub fn on_event(&mut self, event: CdpEventMessage) {
330 let CdpEventMessage {
331 params,
332 method,
333 session_id,
334 ..
335 } = event;
336
337 let is_session_scoped = matches!(
338 params,
339 CdpEvent::FetchRequestPaused(_)
340 | CdpEvent::FetchAuthRequired(_)
341 | CdpEvent::NetworkRequestWillBeSent(_)
342 | CdpEvent::NetworkResponseReceived(_)
343 | CdpEvent::NetworkLoadingFinished(_)
344 | CdpEvent::NetworkLoadingFailed(_)
345 | CdpEvent::PageFrameAttached(_)
346 | CdpEvent::PageFrameDetached(_)
347 | CdpEvent::PageFrameNavigated(_)
348 | CdpEvent::PageNavigatedWithinDocument(_)
349 | CdpEvent::PageLifecycleEvent(_)
350 | CdpEvent::PageFrameStartedLoading(_)
351 | CdpEvent::PageFrameStoppedLoading(_)
352 | CdpEvent::RuntimeExecutionContextCreated(_)
353 | CdpEvent::RuntimeExecutionContextDestroyed(_)
354 | CdpEvent::RuntimeExecutionContextsCleared(_)
355 | CdpEvent::RuntimeBindingCalled(_)
356 );
357
358 if is_session_scoped {
359 let ev_sid: &str = match session_id.as_deref() {
360 Some(s) => s,
361 None => return,
362 };
363
364 let self_sid: &str = match self.session_id.as_ref() {
365 Some(sid) => sid.as_ref(),
366 None => return,
367 };
368
369 if self_sid != ev_sid {
370 return;
371 }
372 }
373
374 match ¶ms {
375 CdpEvent::PageFrameAttached(ev) => self
377 .frame_manager
378 .on_frame_attached(ev.frame_id.clone(), Some(ev.parent_frame_id.clone())),
379 CdpEvent::PageFrameDetached(ev) => self.frame_manager.on_frame_detached(ev),
380 CdpEvent::PageFrameNavigated(ev) => {
381 self.frame_manager.on_frame_navigated(&ev.frame);
382 }
383 CdpEvent::PageNavigatedWithinDocument(ev) => {
384 self.frame_manager.on_frame_navigated_within_document(ev)
385 }
386 CdpEvent::RuntimeExecutionContextCreated(ev) => {
387 self.frame_manager.on_frame_execution_context_created(ev)
388 }
389 CdpEvent::RuntimeExecutionContextDestroyed(ev) => {
390 self.frame_manager.on_frame_execution_context_destroyed(ev)
391 }
392 CdpEvent::RuntimeExecutionContextsCleared(_) => {
393 self.frame_manager.on_execution_contexts_cleared()
394 }
395 CdpEvent::RuntimeBindingCalled(ev) => {
396 self.frame_manager.on_runtime_binding_called(ev)
398 }
399 CdpEvent::PageLifecycleEvent(ev) => self.frame_manager.on_page_lifecycle_event(ev),
400 CdpEvent::PageFrameStartedLoading(ev) => {
401 self.frame_manager.on_frame_started_loading(ev);
402 }
403 CdpEvent::PageFrameStoppedLoading(ev) => {
404 self.frame_manager.on_frame_stopped_loading(ev);
405 }
406 CdpEvent::TargetAttachedToTarget(ev) => {
408 if ev.waiting_for_debugger {
409 let runtime_cmd = ATTACH_TARGET.clone();
410
411 self.queued_events.push_back(TargetEvent::Request(Request {
412 method: runtime_cmd.0,
413 session_id: Some(ev.session_id.clone().into()),
414 params: runtime_cmd.1,
415 }));
416 }
417
418 let target_type = ev.target_info.r#type.as_str();
420 let is_worker_like =
421 matches!(target_type, "worker" | "shared_worker" | "service_worker");
422
423 if is_worker_like {
424 for (method, params) in &self.attached_emulation_init_cmds {
425 self.queued_events.push_back(TargetEvent::Request(Request {
426 method: method.clone(),
427 session_id: Some(ev.session_id.clone().into()),
428 params: params.clone(),
429 }));
430 }
431
432 if let Some((method, params)) = &self.attached_user_agent_override {
433 self.queued_events.push_back(TargetEvent::Request(Request {
434 method: method.clone(),
435 session_id: Some(ev.session_id.clone().into()),
436 params: params.clone(),
437 }));
438 }
439 }
440 }
441 CdpEvent::FetchRequestPaused(ev) => self.network_manager.on_fetch_request_paused(ev),
443 CdpEvent::FetchAuthRequired(ev) => self.network_manager.on_fetch_auth_required(ev),
444 CdpEvent::NetworkRequestWillBeSent(ev) => {
445 self.network_manager.on_request_will_be_sent(ev)
446 }
447 CdpEvent::NetworkRequestServedFromCache(ev) => {
448 self.network_manager.on_request_served_from_cache(ev)
449 }
450 CdpEvent::NetworkResponseReceived(ev) => self.network_manager.on_response_received(ev),
451 CdpEvent::NetworkLoadingFinished(ev) => {
452 self.network_manager.on_network_loading_finished(ev)
453 }
454 CdpEvent::NetworkLoadingFailed(ev) => {
455 self.network_manager.on_network_loading_failed(ev)
456 }
457 _ => (),
458 }
459 chromiumoxide_cdp::consume_event!(match params {
460 |ev| self.event_listeners.start_send(ev),
461 |json| { let _ = self.event_listeners.try_send_custom(&method, json);}
462 });
463 }
464
465 fn on_initialization_failed(&mut self) -> TargetEvent {
467 if let Some(initiator) = self.initiator.take() {
468 let _ = initiator.send(Err(CdpError::Timeout));
469 }
470 self.init_state = TargetInit::Closing;
471 let close_target = CloseTargetParams::new(self.info.target_id.clone());
472
473 TargetEvent::Request(Request {
474 method: close_target.identifier(),
475 session_id: self.session_id.clone().map(Into::into),
476 params: serde_json::to_value(close_target).unwrap_or_default(),
477 })
478 }
479
480 pub(crate) fn poll(&mut self, cx: &mut Context<'_>, now: Instant) -> Option<TargetEvent> {
482 if !self.is_page() {
483 return None;
485 }
486
487 match &mut self.init_state {
488 TargetInit::AttachToTarget => {
489 self.init_state = TargetInit::InitializingFrame(FrameManager::init_commands(
490 self.config.request_timeout,
491 ));
492
493 if let Ok(params) = AttachToTargetParams::builder()
494 .target_id(self.target_id().clone())
495 .flatten(true)
496 .build()
497 {
498 return Some(TargetEvent::Request(Request::new(
499 params.identifier(),
500 serde_json::to_value(params).unwrap_or_default(),
501 )));
502 } else {
503 return None;
504 }
505 }
506 TargetInit::InitializingFrame(cmds) => {
507 self.session_id.as_ref()?;
508 if let Poll::Ready(poll) = cmds.poll(now) {
509 return match poll {
510 None => {
511 if let Some(world_name) = self.frame_manager.get_isolated_world_name() {
512 let world_name = world_name.clone();
513
514 if let Some(isolated_world_cmds) =
515 self.frame_manager.ensure_isolated_world(&world_name)
516 {
517 *cmds = isolated_world_cmds;
518 } else {
519 self.init_state = TargetInit::InitializingNetwork(
520 self.network_manager.init_commands(),
521 );
522 }
523 } else {
524 self.init_state = TargetInit::InitializingNetwork(
525 self.network_manager.init_commands(),
526 );
527 }
528 self.poll(cx, now)
529 }
530 Some(Ok((method, params))) => Some(TargetEvent::Request(Request {
531 method,
532 session_id: self.session_id.clone().map(Into::into),
533 params,
534 })),
535 Some(Err(_)) => Some(self.on_initialization_failed()),
536 };
537 } else {
538 return None;
539 }
540 }
541 TargetInit::InitializingNetwork(cmds) => {
542 advance_state!(
543 self,
544 cx,
545 now,
546 cmds,
547 TargetInit::InitializingPage(Self::page_init_commands(
548 self.config.request_timeout
549 ))
550 );
551 }
552 TargetInit::InitializingPage(cmds) => {
553 advance_state!(
554 self,
555 cx,
556 now,
557 cmds,
558 match self.config.viewport.as_ref() {
559 Some(viewport) => TargetInit::InitializingEmulation(
560 self.emulation_manager.init_commands(viewport)
561 ),
562 None => TargetInit::Initialized,
563 }
564 );
565 }
566 TargetInit::InitializingEmulation(cmds) => {
567 if let Poll::Ready(poll) = cmds.poll(now) {
570 return match poll {
571 None => {
572 self.init_state = TargetInit::Initialized;
573 self.poll(cx, now)
574 }
575 Some(Ok((method, params))) => {
576 if method.as_ref().starts_with("Emulation.") {
578 self.attached_emulation_init_cmds
579 .push((method.clone(), params.clone()));
580 }
581
582 Some(TargetEvent::Request(Request {
583 method,
584 session_id: self.session_id.clone().map(Into::into),
585 params,
586 }))
587 }
588 Some(Err(_)) => Some(self.on_initialization_failed()),
589 };
590 } else {
591 return None;
592 }
593 }
594 TargetInit::Initialized => {
595 if let Some(initiator) = self.initiator.take() {
596 if self
598 .frame_manager
599 .main_frame()
600 .map(|frame| frame.is_loaded())
601 .unwrap_or_default()
602 {
603 if let Some(page) = self.get_or_create_page() {
604 let _ = initiator.send(Ok(page.clone().into()));
605 } else {
606 self.initiator = Some(initiator);
607 }
608 } else {
609 self.initiator = Some(initiator);
610 }
611 }
612 }
613 TargetInit::Closing => return None,
614 };
615
616 loop {
617 if self.init_state == TargetInit::Closing {
618 break None;
619 }
620
621 if let Some(frame) = self.frame_manager.main_frame() {
622 if frame.is_loaded() {
623 while let Some(tx) = self.wait_for_frame_navigation.pop() {
624 let _ = tx.send(frame.http_request().cloned());
625 }
626 }
627
628 if frame.is_network_idle() {
629 while let Some(tx) = self.wait_for_network_idle.pop() {
630 let _ = tx.send(frame.http_request().cloned());
631 }
632 }
633
634 if frame.is_network_almost_idle() {
635 while let Some(tx) = self.wait_for_network_almost_idle.pop() {
636 let _ = tx.send(frame.http_request().cloned());
637 }
638 }
639 }
640
641 if let Some(ev) = self.queued_events.pop_front() {
643 return Some(ev);
644 }
645
646 if let Some(handle) = self.page.as_mut() {
647 while let Poll::Ready(Some(msg)) = Pin::new(&mut handle.rx).poll_next(cx) {
648 if self.init_state == TargetInit::Closing {
649 break;
650 }
651
652 match msg {
653 TargetMessage::Command(cmd) => {
654 if cmd.method == "Network.setBlockedURLs" {
656 if let Some(arr) = cmd.params.get("urls").and_then(|v| v.as_array())
657 {
658 let mut unblock_all = false;
659 let mut block_all = false;
660
661 for s in arr.iter().filter_map(|v| v.as_str()) {
662 if s == "!*" {
663 unblock_all = true;
664 break; }
666 if s.contains('*') {
667 block_all = true;
668 }
669 }
670
671 if unblock_all {
672 self.network_manager.set_block_all(false);
673 } else if block_all {
674 self.network_manager.set_block_all(true);
675 }
676 }
677 }
678
679 let method_str = cmd.method.as_ref();
681 if method_str == "Network.setUserAgentOverride"
682 || method_str == "Emulation.setUserAgentOverride"
683 {
684 self.attached_user_agent_override =
685 Some((cmd.method.clone(), cmd.params.clone()));
686 }
687
688 self.queued_events.push_back(TargetEvent::Command(cmd));
689 }
690 TargetMessage::MainFrame(tx) => {
691 let _ =
692 tx.send(self.frame_manager.main_frame().map(|f| f.id().clone()));
693 }
694 TargetMessage::AllFrames(tx) => {
695 let _ = tx.send(
696 self.frame_manager
697 .frames()
698 .map(|f| f.id().clone())
699 .collect(),
700 );
701 }
702 #[cfg(feature = "_cache")]
703 TargetMessage::CacheKey((cache_key, cache_policy)) => {
704 self.network_manager.set_cache_site_key(cache_key);
705 self.network_manager.set_cache_policy(cache_policy);
706 }
707 TargetMessage::Url(req) => {
708 let GetUrl { frame_id, tx } = req;
709 let frame = if let Some(frame_id) = frame_id {
710 self.frame_manager.frame(&frame_id)
711 } else {
712 self.frame_manager.main_frame()
713 };
714 let _ = tx.send(frame.and_then(|f| f.url().map(str::to_string)));
715 }
716 TargetMessage::Name(req) => {
717 let GetName { frame_id, tx } = req;
718 let frame = if let Some(frame_id) = frame_id {
719 self.frame_manager.frame(&frame_id)
720 } else {
721 self.frame_manager.main_frame()
722 };
723 let _ = tx.send(frame.and_then(|f| f.name().map(str::to_string)));
724 }
725 TargetMessage::Parent(req) => {
726 let GetParent { frame_id, tx } = req;
727 let frame = self.frame_manager.frame(&frame_id);
728 let _ = tx.send(frame.and_then(|f| f.parent_id().cloned()));
729 }
730 TargetMessage::WaitForNavigation(tx) => {
731 if let Some(frame) = self.frame_manager.main_frame() {
732 if frame.is_loaded() {
736 let _ = tx.send(frame.http_request().cloned());
737 } else {
738 self.wait_for_frame_navigation.push(tx);
739 }
740 } else {
741 self.wait_for_frame_navigation.push(tx);
742 }
743 }
744 TargetMessage::WaitForNetworkIdle(tx) => {
745 if let Some(frame) = self.frame_manager.main_frame() {
746 if frame.is_network_idle() {
747 let _ = tx.send(frame.http_request().cloned());
748 } else {
749 self.wait_for_network_idle.push(tx);
750 }
751 } else {
752 self.wait_for_network_idle.push(tx);
753 }
754 }
755 TargetMessage::WaitForNetworkAlmostIdle(tx) => {
756 if let Some(frame) = self.frame_manager.main_frame() {
757 if frame.is_network_almost_idle() {
758 let _ = tx.send(frame.http_request().cloned());
759 } else {
760 self.wait_for_network_almost_idle.push(tx);
761 }
762 } else {
763 self.wait_for_network_almost_idle.push(tx);
764 }
765 }
766 TargetMessage::AddEventListener(req) => {
767 if req.method == "Fetch.requestPaused" {
768 self.network_manager.enable_request_intercept();
769 }
770 self.event_listeners.add_listener(req);
772 }
773 TargetMessage::GetExecutionContext(ctx) => {
774 let GetExecutionContext {
775 dom_world,
776 frame_id,
777 tx,
778 } = ctx;
779 let frame = if let Some(frame_id) = frame_id {
780 self.frame_manager.frame(&frame_id)
781 } else {
782 self.frame_manager.main_frame()
783 };
784
785 if let Some(frame) = frame {
786 match dom_world {
787 DOMWorldKind::Main => {
788 let _ = tx.send(frame.main_world().execution_context());
789 }
790 DOMWorldKind::Secondary => {
791 let _ =
792 tx.send(frame.secondary_world().execution_context());
793 }
794 }
795 } else {
796 let _ = tx.send(None);
797 }
798 }
799 TargetMessage::Authenticate(credentials) => {
800 self.network_manager.authenticate(credentials);
801 }
802 }
803 }
804 }
805
806 while let Some(event) = self.network_manager.poll() {
807 if self.init_state == TargetInit::Closing {
808 break;
809 }
810 match event {
811 NetworkEvent::SendCdpRequest((method, params)) => {
812 self.queued_events.push_back(TargetEvent::Request(Request {
814 method,
815 session_id: self.session_id.clone().map(Into::into),
816 params,
817 }))
818 }
819 NetworkEvent::Request(_) => {}
820 NetworkEvent::Response(_) => {}
821 NetworkEvent::RequestFailed(request) => {
822 self.frame_manager.on_http_request_finished(request);
823 }
824 NetworkEvent::RequestFinished(request) => {
825 self.frame_manager.on_http_request_finished(request);
826 }
827 NetworkEvent::BytesConsumed(n) => {
828 self.queued_events.push_back(TargetEvent::BytesConsumed(n));
829 }
830 }
831 }
832
833 while let Some(event) = self.frame_manager.poll(now) {
834 if self.init_state == TargetInit::Closing {
835 break;
836 }
837 match event {
838 FrameEvent::NavigationResult(res) => {
839 self.queued_events
840 .push_back(TargetEvent::NavigationResult(res));
841 }
842 FrameEvent::NavigationRequest(id, req) => {
843 self.queued_events
844 .push_back(TargetEvent::NavigationRequest(id, req));
845 }
846 }
847 }
848
849 if self.queued_events.is_empty() {
850 return None;
851 }
852 }
853 }
854
855 pub fn set_initiator(&mut self, tx: Sender<Result<Page>>) {
858 self.initiator = Some(tx);
859 }
860
861 pub(crate) fn page_init_commands(timeout: Duration) -> CommandChain {
862 CommandChain::new(INIT_COMMANDS_PARAMS.clone(), timeout)
863 }
864}
865
866#[derive(Debug, Clone)]
868pub struct TargetConfig {
869 pub ignore_https_errors: bool,
870 pub request_timeout: Duration,
871 pub viewport: Option<Viewport>,
872 pub request_intercept: bool,
873 pub cache_enabled: bool,
874 pub ignore_visuals: bool,
875 pub ignore_javascript: bool,
876 pub ignore_analytics: bool,
877 pub ignore_stylesheets: bool,
878 pub only_html: bool,
879 pub service_worker_enabled: bool,
880 pub extra_headers: Option<std::collections::HashMap<String, String>>,
881 pub intercept_manager: NetworkInterceptManager,
882 pub max_bytes_allowed: Option<u64>,
883 pub whitelist_patterns: Option<Vec<String>>,
884}
885
886impl Default for TargetConfig {
887 fn default() -> Self {
888 Self {
889 ignore_https_errors: true,
890 request_timeout: Duration::from_secs(REQUEST_TIMEOUT),
891 viewport: Default::default(),
892 request_intercept: false,
893 cache_enabled: true,
894 service_worker_enabled: true,
895 ignore_javascript: false,
896 ignore_visuals: false,
897 ignore_stylesheets: false,
898 ignore_analytics: true,
899 only_html: false,
900 extra_headers: Default::default(),
901 intercept_manager: NetworkInterceptManager::Unknown,
902 max_bytes_allowed: None,
903 whitelist_patterns: None,
904 }
905 }
906}
907
908#[derive(Debug, Clone, Eq, PartialEq)]
909pub enum TargetType {
910 Page,
911 BackgroundPage,
912 ServiceWorker,
913 SharedWorker,
914 Other,
915 Browser,
916 Webview,
917 Unknown(String),
918}
919
920impl TargetType {
921 pub fn new(ty: &str) -> Self {
922 match ty {
923 "page" => TargetType::Page,
924 "background_page" => TargetType::BackgroundPage,
925 "service_worker" => TargetType::ServiceWorker,
926 "shared_worker" => TargetType::SharedWorker,
927 "other" => TargetType::Other,
928 "browser" => TargetType::Browser,
929 "webview" => TargetType::Webview,
930 s => TargetType::Unknown(s.to_string()),
931 }
932 }
933
934 pub fn is_page(&self) -> bool {
935 matches!(self, TargetType::Page)
936 }
937
938 pub fn is_background_page(&self) -> bool {
939 matches!(self, TargetType::BackgroundPage)
940 }
941
942 pub fn is_service_worker(&self) -> bool {
943 matches!(self, TargetType::ServiceWorker)
944 }
945
946 pub fn is_shared_worker(&self) -> bool {
947 matches!(self, TargetType::SharedWorker)
948 }
949
950 pub fn is_other(&self) -> bool {
951 matches!(self, TargetType::Other)
952 }
953
954 pub fn is_browser(&self) -> bool {
955 matches!(self, TargetType::Browser)
956 }
957
958 pub fn is_webview(&self) -> bool {
959 matches!(self, TargetType::Webview)
960 }
961}
962
963#[derive(Debug)]
964pub(crate) enum TargetEvent {
965 Request(Request),
967 NavigationRequest(NavigationId, Request),
969 NavigationResult(Result<NavigationOk, NavigationError>),
971 Command(CommandMessage),
973 BytesConsumed(u64),
975}
976
977#[derive(Debug, PartialEq)]
979pub enum TargetInit {
980 InitializingFrame(CommandChain),
981 InitializingNetwork(CommandChain),
982 InitializingPage(CommandChain),
983 InitializingEmulation(CommandChain),
984 AttachToTarget,
985 Initialized,
986 Closing,
987}
988
989impl TargetInit {
990 fn commands_mut(&mut self) -> Option<&mut CommandChain> {
991 match self {
992 TargetInit::InitializingFrame(cmd) => Some(cmd),
993 TargetInit::InitializingNetwork(cmd) => Some(cmd),
994 TargetInit::InitializingPage(cmd) => Some(cmd),
995 TargetInit::InitializingEmulation(cmd) => Some(cmd),
996 TargetInit::AttachToTarget => None,
997 TargetInit::Initialized => None,
998 TargetInit::Closing => None,
999 }
1000 }
1001}
1002
1003#[derive(Debug)]
1004pub struct GetExecutionContext {
1005 pub dom_world: DOMWorldKind,
1007 pub frame_id: Option<FrameId>,
1009 pub tx: Sender<Option<ExecutionContextId>>,
1011}
1012
1013impl GetExecutionContext {
1014 pub fn new(tx: Sender<Option<ExecutionContextId>>) -> Self {
1015 Self {
1016 dom_world: DOMWorldKind::Main,
1017 frame_id: None,
1018 tx,
1019 }
1020 }
1021}
1022
1023#[derive(Debug)]
1024pub struct GetUrl {
1025 pub frame_id: Option<FrameId>,
1027 pub tx: Sender<Option<String>>,
1029}
1030
1031impl GetUrl {
1032 pub fn new(tx: Sender<Option<String>>) -> Self {
1033 Self { frame_id: None, tx }
1034 }
1035}
1036
1037#[derive(Debug)]
1038pub struct GetName {
1039 pub frame_id: Option<FrameId>,
1041 pub tx: Sender<Option<String>>,
1043}
1044
1045#[derive(Debug)]
1046pub struct GetParent {
1047 pub frame_id: FrameId,
1049 pub tx: Sender<Option<FrameId>>,
1051}
1052
1053#[derive(Debug)]
1054pub enum TargetMessage {
1055 Command(CommandMessage),
1057 MainFrame(Sender<Option<FrameId>>),
1059 AllFrames(Sender<Vec<FrameId>>),
1061 #[cfg(feature = "_cache")]
1062 CacheKey((Option<String>, Option<crate::cache::BasicCachePolicy>)),
1064 Url(GetUrl),
1066 Name(GetName),
1068 Parent(GetParent),
1070 WaitForNavigation(Sender<ArcHttpRequest>),
1072 WaitForNetworkIdle(Sender<ArcHttpRequest>),
1074 WaitForNetworkAlmostIdle(Sender<ArcHttpRequest>),
1076 AddEventListener(EventListenerRequest),
1079 GetExecutionContext(GetExecutionContext),
1081 Authenticate(Credentials),
1082}