Skip to main content

chromiumoxide/handler/
target.rs

1use std::collections::VecDeque;
2use std::sync::Arc;
3use std::time::Instant;
4
5use chromiumoxide_cdp::cdp::browser_protocol::target::DetachFromTargetParams;
6use std::task::{Context, Poll};
7use tokio::sync::oneshot::Sender;
8
9use tokio::sync::Notify;
10
11use crate::auth::Credentials;
12use crate::cdp::browser_protocol::target::CloseTargetParams;
13use crate::cmd::CommandChain;
14use crate::cmd::CommandMessage;
15use crate::error::{CdpError, Result};
16use crate::handler::browser::BrowserContext;
17use crate::handler::domworld::DOMWorldKind;
18use crate::handler::emulation::EmulationManager;
19use crate::handler::frame::FrameRequestedNavigation;
20use crate::handler::frame::{
21    FrameEvent, FrameManager, NavigationError, NavigationId, NavigationOk,
22};
23use crate::handler::network::{NetworkEvent, NetworkManager};
24use crate::handler::page::PageHandle;
25use crate::handler::viewport::Viewport;
26use crate::handler::{PageInner, REQUEST_TIMEOUT};
27use crate::listeners::{EventListenerRequest, EventListeners};
28use crate::{page::Page, ArcHttpRequest};
29use chromiumoxide_cdp::cdp::browser_protocol::{
30    browser::BrowserContextId,
31    log as cdplog,
32    page::{FrameId, GetFrameTreeParams},
33    target::{AttachToTargetParams, SessionId, SetAutoAttachParams, TargetId, TargetInfo},
34};
35use chromiumoxide_cdp::cdp::events::CdpEvent;
36use chromiumoxide_cdp::cdp::js_protocol::runtime::{
37    ExecutionContextId, RunIfWaitingForDebuggerParams,
38};
39use chromiumoxide_cdp::cdp::CdpEventMessage;
40use chromiumoxide_types::{Command, Method, Request, Response};
41use spider_network_blocker::intercept_manager::NetworkInterceptManager;
42use std::time::Duration;
43
44macro_rules! advance_state {
45    ($s:ident, $cx:ident, $now:ident, $cmds: ident, $next_state:expr ) => {{
46        if let Poll::Ready(poll) = $cmds.poll($now) {
47            return match poll {
48                None => {
49                    $s.init_state = $next_state;
50                    $s.poll($cx, $now)
51                }
52                Some(Ok((method, params))) => Some(TargetEvent::Request(Request {
53                    method,
54                    session_id: $s.session_id.clone().map(Into::into),
55                    params,
56                })),
57                Some(Err(_)) => Some($s.on_initialization_failed()),
58            };
59        } else {
60            return None;
61        }
62    }};
63}
64
65lazy_static::lazy_static! {
66    /// Initial start command params.
67    static ref INIT_COMMANDS_PARAMS: Vec<(chromiumoxide_types::MethodId, serde_json::Value)> = {
68        if let Ok(attach) = SetAutoAttachParams::builder()
69            .flatten(true)
70            .auto_attach(true)
71            .wait_for_debugger_on_start(true)
72            .build() {
73                let disable_log = cdplog::DisableParams::default();
74
75                let mut cmds =  vec![
76                    (
77                        attach.identifier(),
78                        serde_json::to_value(attach).unwrap_or_default(),
79                    ),
80                    (
81                        disable_log.identifier(),
82                        serde_json::to_value(disable_log).unwrap_or_default(),
83                    )
84                ];
85
86                // enable performance on pages.
87                if cfg!(feature = "collect_metrics") {
88                    let enable_performance = chromiumoxide_cdp::cdp::browser_protocol::performance::EnableParams::default();
89                    cmds.push((
90                        enable_performance.identifier(),
91                        serde_json::to_value(enable_performance).unwrap_or_default(),
92                    ));
93                }
94
95                cmds
96            } else {
97                vec![]
98            }
99    };
100
101    /// Attach to target commands
102    static ref ATTACH_TARGET: (chromiumoxide_types::MethodId, serde_json::Value) = {
103        let runtime_cmd = RunIfWaitingForDebuggerParams::default();
104
105        (runtime_cmd.identifier(), serde_json::to_value(runtime_cmd).unwrap_or_default())
106    };
107}
108
109/// Per-queue cap on waiter sends per `Target::poll` call.
110///
111/// Each `wait_for_*` queue can hold an unbounded number of `oneshot::Sender`s
112/// registered by concurrent callers. Firing them all in one tight `pop()`
113/// loop previously produced multi-hundred-microsecond synchronous bursts
114/// inside the handler's event loop under fan-out (e.g. 1000 tasks awaiting
115/// `wait_for_load` on one page). Capping at 64 per queue per poll keeps
116/// worst-case burst at ~5 × 64 oneshot sends (~6μs) before yielding. Any
117/// remainder is drained on subsequent polls, re-armed via `Waker::wake_by_ref`.
118const WAITER_DRAIN_BUDGET: usize = 64;
119
120/// Pop up to `budget` senders from `queue` and deliver `value` to each.
121///
122/// Returns `true` when the queue still contains senders after draining.
123/// Dropped receivers (closed senders) are silently ignored — they consume
124/// a budget slot but contribute no cost beyond the cheap `send` no-op.
125///
126/// The queue is pruned of closed senders elsewhere once per `Target::poll`
127/// (before this helper runs), so in steady state `budget` slots approximate
128/// `budget` live fan-out sends.
129#[inline]
130fn drain_waiters_bounded(
131    queue: &mut Vec<Sender<ArcHttpRequest>>,
132    http_request: Option<&Arc<crate::handler::http::HttpRequest>>,
133    budget: usize,
134) -> bool {
135    let to_fire = queue.len().min(budget);
136    for _ in 0..to_fire {
137        // `pop` cannot be `None` here: `to_fire <= queue.len()`.
138        if let Some(tx) = queue.pop() {
139            let _ = tx.send(http_request.cloned());
140        }
141    }
142    !queue.is_empty()
143}
144
145#[derive(Debug)]
146pub struct Target {
147    /// Info about this target as returned from the chromium instance
148    info: TargetInfo,
149    /// The type of this target
150    r#type: TargetType,
151    /// Configs for this target
152    config: TargetConfig,
153    /// The context this target is running in
154    browser_context: BrowserContext,
155    /// The frame manager that maintains the state of all frames and handles
156    /// navigations of frames
157    frame_manager: FrameManager,
158    /// Handles all the https
159    pub(crate) network_manager: NetworkManager,
160    emulation_manager: EmulationManager,
161    /// The identifier of the session this target is attached to
162    session_id: Option<SessionId>,
163    /// The handle of the browser page of this target
164    page: Option<PageHandle>,
165    /// Drives this target towards initialization
166    pub(crate) init_state: TargetInit,
167    /// Currently queued events to report to the `Handler`
168    queued_events: VecDeque<TargetEvent>,
169    /// All registered event subscriptions
170    event_listeners: EventListeners,
171    /// Senders that need to be notified once the main frame has loaded
172    wait_for_frame_navigation: Vec<Sender<ArcHttpRequest>>,
173    /// Senders notified once `DOMContentLoaded` fires (before `load`).
174    wait_for_dom_content_loaded: Vec<Sender<ArcHttpRequest>>,
175    /// Senders notified once the `load` event fires (all subresources done).
176    wait_for_load: Vec<Sender<ArcHttpRequest>>,
177    /// Senders that need to be notified once the main frame reaches `networkIdle`.
178    wait_for_network_idle: Vec<Sender<ArcHttpRequest>>,
179    /// (Optional) for `networkAlmostIdle` if you want it as well.
180    wait_for_network_almost_idle: Vec<Sender<ArcHttpRequest>>,
181    /// The sender who requested the page.
182    initiator: Option<Sender<Result<Page>>>,
183}
184
185impl Target {
186    /// Create a new target instance with `TargetInfo` after a
187    /// `CreateTargetParams` request.
188    pub fn new(info: TargetInfo, config: TargetConfig, browser_context: BrowserContext) -> Self {
189        let ty = TargetType::new(&info.r#type);
190        let request_timeout: Duration = config.request_timeout;
191        let mut network_manager = NetworkManager::new(config.ignore_https_errors, request_timeout);
192
193        if !config.cache_enabled {
194            network_manager.set_cache_enabled(false);
195        }
196
197        if !config.service_worker_enabled {
198            network_manager.set_service_worker_enabled(true);
199        }
200
201        network_manager.set_request_interception(config.request_intercept);
202        network_manager.max_bytes_allowed = config.max_bytes_allowed;
203        network_manager.max_redirects = config.max_redirects;
204
205        if let Some(headers) = &config.extra_headers {
206            network_manager.set_extra_headers(headers.clone());
207        }
208
209        if let Some(whitelist) = &config.whitelist_patterns {
210            network_manager.set_whitelist_patterns(whitelist.clone());
211        }
212
213        if let Some(blacklist) = &config.blacklist_patterns {
214            network_manager.set_blacklist_patterns(blacklist);
215        }
216
217        network_manager.ignore_visuals = config.ignore_visuals;
218        network_manager.block_javascript = config.ignore_javascript;
219        network_manager.block_analytics = config.ignore_analytics;
220        network_manager.block_prefetch = config.ignore_prefetch;
221
222        network_manager.block_stylesheets = config.ignore_stylesheets;
223        network_manager.only_html = config.only_html;
224        network_manager.intercept_manager = config.intercept_manager;
225
226        #[cfg(feature = "adblock")]
227        if let Some(rules) = &config.adblock_filter_rules {
228            use adblock::lists::{FilterSet, ParseOptions, RuleTypes};
229
230            let mut filter_set = FilterSet::new(false);
231            let mut opts = ParseOptions::default();
232            opts.rule_types = RuleTypes::All;
233
234            // Include built-in patterns.
235            filter_set.add_filters(
236                &*spider_network_blocker::adblock::ADBLOCK_PATTERNS,
237                opts.clone(),
238            );
239            // Merge user-supplied rules (e.g. EasyList / EasyPrivacy content).
240            filter_set.add_filters(rules.iter().map(|s| s.as_str()), opts);
241
242            let engine = adblock::Engine::from_filter_set(filter_set, true);
243            network_manager.set_adblock_engine(std::sync::Arc::new(engine));
244        }
245
246        let mut frame_manager = FrameManager::new(request_timeout);
247        frame_manager.set_max_main_frame_navigations(config.max_main_frame_navigations);
248
249        Self {
250            info,
251            r#type: ty,
252            config,
253            frame_manager,
254            network_manager,
255            emulation_manager: EmulationManager::new(request_timeout),
256            session_id: None,
257            page: None,
258            init_state: TargetInit::AttachToTarget,
259            wait_for_frame_navigation: Default::default(),
260            wait_for_dom_content_loaded: Default::default(),
261            wait_for_load: Default::default(),
262            wait_for_network_idle: Default::default(),
263            wait_for_network_almost_idle: Default::default(),
264            queued_events: Default::default(),
265            event_listeners: Default::default(),
266            initiator: None,
267            browser_context,
268        }
269    }
270
271    /// Set the session id.
272    pub fn set_session_id(&mut self, id: SessionId) {
273        self.session_id = Some(id)
274    }
275
276    /// Get the session id.
277    pub fn session_id(&self) -> Option<&SessionId> {
278        self.session_id.as_ref()
279    }
280
281    /// Get the session id mut.
282    pub fn session_id_mut(&mut self) -> &mut Option<SessionId> {
283        &mut self.session_id
284    }
285
286    /// Get the browser context.
287    pub fn browser_context(&self) -> &BrowserContext {
288        &self.browser_context
289    }
290
291    /// The identifier for this target
292    pub fn target_id(&self) -> &TargetId {
293        &self.info.target_id
294    }
295
296    /// The type of this target
297    pub fn r#type(&self) -> &TargetType {
298        &self.r#type
299    }
300
301    /// Whether this target is already initialized
302    pub fn is_initialized(&self) -> bool {
303        matches!(self.init_state, TargetInit::Initialized)
304    }
305
306    /// Navigate a frame
307    pub fn goto(&mut self, req: FrameRequestedNavigation) {
308        if self.network_manager.has_target_domain() {
309            self.network_manager.clear_target_domain();
310            let goto_url = req
311                .req
312                .params
313                .as_object()
314                .and_then(|o| o.get("url"))
315                .and_then(|v| v.as_str());
316
317            if let Some(url) = goto_url {
318                self.network_manager.set_page_url(url.into());
319            }
320        }
321        self.frame_manager.goto(req);
322    }
323
324    /// Create a new page from the session.
325    fn create_page(&mut self) {
326        if self.page.is_none() {
327            if let Some(session) = self.session_id.clone() {
328                let handle = PageHandle::with_capacity(
329                    self.target_id().clone(),
330                    session,
331                    self.opener_id().cloned(),
332                    self.config.request_timeout,
333                    self.config.page_wake.clone(),
334                    self.config.page_channel_capacity,
335                );
336                self.page = Some(handle);
337            }
338        }
339    }
340
341    /// Tries to create the `PageInner` if this target is already initialized
342    pub(crate) fn get_or_create_page(&mut self) -> Option<&Arc<PageInner>> {
343        self.create_page();
344        self.page.as_ref().map(|p| p.inner())
345    }
346
347    /// Mutable access to the page handle (for `try_recv` in `Handler::run()`).
348    pub(crate) fn page_mut(&mut self) -> Option<&mut PageHandle> {
349        self.page.as_mut()
350    }
351
352    /// Is the target a page?
353    pub fn is_page(&self) -> bool {
354        self.r#type().is_page()
355    }
356
357    /// The browser context ID.
358    pub fn browser_context_id(&self) -> Option<&BrowserContextId> {
359        self.info.browser_context_id.as_ref()
360    }
361
362    /// The target connection info.
363    pub fn info(&self) -> &TargetInfo {
364        &self.info
365    }
366
367    /// Get the target that opened this target. Top-level targets return `None`.
368    pub fn opener_id(&self) -> Option<&TargetId> {
369        self.info.opener_id.as_ref()
370    }
371
372    pub fn frame_manager(&self) -> &FrameManager {
373        &self.frame_manager
374    }
375
376    /// The frame manager.
377    pub fn frame_manager_mut(&mut self) -> &mut FrameManager {
378        &mut self.frame_manager
379    }
380
381    /// Get event listeners mutably.
382    pub fn event_listeners_mut(&mut self) -> &mut EventListeners {
383        &mut self.event_listeners
384    }
385
386    /// Received a response to a command issued by this target
387    pub fn on_response(&mut self, resp: Response, method: &str) {
388        if let Some(cmds) = self.init_state.commands_mut() {
389            cmds.received_response(method);
390        }
391
392        if let GetFrameTreeParams::IDENTIFIER = method {
393            if let Some(resp) = resp
394                .result
395                .and_then(|val| GetFrameTreeParams::response_from_value(val).ok())
396            {
397                self.frame_manager.on_frame_tree(resp.frame_tree);
398            }
399        }
400        // requests originated from the network manager all return an empty response, hence they
401        // can be ignored here
402    }
403
404    /// On CDP Event message.
405    pub fn on_event(&mut self, event: CdpEventMessage) {
406        let CdpEventMessage {
407            params,
408            method,
409            session_id,
410            ..
411        } = event;
412
413        let is_session_scoped = matches!(
414            params,
415            CdpEvent::FetchRequestPaused(_)
416                | CdpEvent::FetchAuthRequired(_)
417                | CdpEvent::NetworkRequestWillBeSent(_)
418                | CdpEvent::NetworkResponseReceived(_)
419                | CdpEvent::NetworkLoadingFinished(_)
420                | CdpEvent::NetworkLoadingFailed(_)
421                | CdpEvent::PageFrameAttached(_)
422                | CdpEvent::PageFrameDetached(_)
423                | CdpEvent::PageFrameNavigated(_)
424                | CdpEvent::PageNavigatedWithinDocument(_)
425                | CdpEvent::PageLifecycleEvent(_)
426                | CdpEvent::PageFrameStartedLoading(_)
427                | CdpEvent::PageFrameStoppedLoading(_)
428                | CdpEvent::RuntimeExecutionContextCreated(_)
429                | CdpEvent::RuntimeExecutionContextDestroyed(_)
430                | CdpEvent::RuntimeExecutionContextsCleared(_)
431                | CdpEvent::RuntimeBindingCalled(_)
432        );
433
434        if is_session_scoped {
435            let ev_sid: &str = match session_id.as_deref() {
436                Some(s) => s,
437                None => return,
438            };
439
440            let self_sid: &str = match self.session_id.as_ref() {
441                Some(sid) => sid.as_ref(),
442                None => return,
443            };
444
445            if self_sid != ev_sid {
446                return;
447            }
448        }
449
450        match &params {
451            // `FrameManager` events
452            CdpEvent::PageFrameAttached(ev) => self
453                .frame_manager
454                .on_frame_attached(ev.frame_id.clone(), Some(ev.parent_frame_id.clone())),
455            CdpEvent::PageFrameDetached(ev) => self.frame_manager.on_frame_detached(ev),
456            CdpEvent::PageFrameNavigated(ev) => {
457                self.frame_manager.on_frame_navigated(&ev.frame);
458            }
459            CdpEvent::PageNavigatedWithinDocument(ev) => {
460                self.frame_manager.on_frame_navigated_within_document(ev)
461            }
462            CdpEvent::RuntimeExecutionContextCreated(ev) => {
463                self.frame_manager.on_frame_execution_context_created(ev)
464            }
465            CdpEvent::RuntimeExecutionContextDestroyed(ev) => {
466                self.frame_manager.on_frame_execution_context_destroyed(ev)
467            }
468            CdpEvent::RuntimeExecutionContextsCleared(_) => {
469                self.frame_manager.on_execution_contexts_cleared()
470            }
471            CdpEvent::RuntimeBindingCalled(ev) => {
472                // TODO check if binding registered and payload is json
473                self.frame_manager.on_runtime_binding_called(ev)
474            }
475            CdpEvent::PageLifecycleEvent(ev) => self.frame_manager.on_page_lifecycle_event(ev),
476            CdpEvent::PageFrameStartedLoading(ev) => {
477                self.frame_manager.on_frame_started_loading(ev);
478            }
479            CdpEvent::PageFrameStoppedLoading(ev) => {
480                self.frame_manager.on_frame_stopped_loading(ev);
481            }
482            // `Target` events
483            CdpEvent::TargetAttachedToTarget(ev) => {
484                if ev.waiting_for_debugger {
485                    let runtime_cmd = ATTACH_TARGET.clone();
486
487                    self.queued_events.push_back(TargetEvent::Request(Request {
488                        method: runtime_cmd.0,
489                        session_id: Some(ev.session_id.clone().into()),
490                        params: runtime_cmd.1,
491                    }));
492                }
493
494                if "service_worker" == &ev.target_info.r#type {
495                    let detach_command = DetachFromTargetParams::builder()
496                        .session_id(ev.session_id.clone())
497                        .build();
498
499                    let method = detach_command.identifier();
500
501                    if let Ok(params) = serde_json::to_value(detach_command) {
502                        self.queued_events.push_back(TargetEvent::Request(Request {
503                            method,
504                            session_id: self.session_id.clone().map(Into::into),
505                            params,
506                        }));
507                    }
508                }
509            }
510            // `NetworkManager` events
511            CdpEvent::FetchRequestPaused(ev) => self.network_manager.on_fetch_request_paused(ev),
512            CdpEvent::FetchAuthRequired(ev) => self.network_manager.on_fetch_auth_required(ev),
513            CdpEvent::NetworkRequestWillBeSent(ev) => {
514                self.network_manager.on_request_will_be_sent(ev)
515            }
516            CdpEvent::NetworkRequestServedFromCache(ev) => {
517                self.network_manager.on_request_served_from_cache(ev)
518            }
519            CdpEvent::NetworkResponseReceived(ev) => self.network_manager.on_response_received(ev),
520            CdpEvent::NetworkLoadingFinished(ev) => {
521                self.network_manager.on_network_loading_finished(ev)
522            }
523            CdpEvent::NetworkLoadingFailed(ev) => {
524                self.network_manager.on_network_loading_failed(ev)
525            }
526            _ => (),
527        }
528        chromiumoxide_cdp::consume_event!(match params {
529           |ev| self.event_listeners.start_send(ev),
530           |json| { let _ = self.event_listeners.try_send_custom(&method, json);}
531        });
532    }
533
534    /// Called when a init command timed out
535    fn on_initialization_failed(&mut self) -> TargetEvent {
536        if let Some(initiator) = self.initiator.take() {
537            let _ = initiator.send(Err(CdpError::Timeout));
538        }
539        self.init_state = TargetInit::Closing;
540        let close_target = CloseTargetParams::new(self.info.target_id.clone());
541
542        TargetEvent::Request(Request {
543            method: close_target.identifier(),
544            session_id: self.session_id.clone().map(Into::into),
545            params: serde_json::to_value(close_target).unwrap_or_default(),
546        })
547    }
548
549    /// Advance that target's state
550    pub(crate) fn poll(&mut self, cx: &mut Context<'_>, now: Instant) -> Option<TargetEvent> {
551        if !self.is_page() {
552            // can only poll pages
553            return None;
554        }
555
556        match &mut self.init_state {
557            TargetInit::AttachToTarget => {
558                self.init_state = TargetInit::InitializingFrame(FrameManager::init_commands(
559                    self.config.request_timeout,
560                ));
561
562                if let Ok(params) = AttachToTargetParams::builder()
563                    .target_id(self.target_id().clone())
564                    .flatten(true)
565                    .build()
566                {
567                    return Some(TargetEvent::Request(Request::new(
568                        params.identifier(),
569                        serde_json::to_value(params).unwrap_or_default(),
570                    )));
571                } else {
572                    return None;
573                }
574            }
575            TargetInit::InitializingFrame(cmds) => {
576                self.session_id.as_ref()?;
577                if let Poll::Ready(poll) = cmds.poll(now) {
578                    return match poll {
579                        None => {
580                            if let Some(world_name) = self.frame_manager.get_isolated_world_name() {
581                                let world_name = world_name.clone();
582
583                                if let Some(isolated_world_cmds) =
584                                    self.frame_manager.ensure_isolated_world(&world_name)
585                                {
586                                    *cmds = isolated_world_cmds;
587                                } else {
588                                    self.init_state = TargetInit::InitializingNetwork(
589                                        self.network_manager.init_commands(),
590                                    );
591                                }
592                            } else {
593                                self.init_state = TargetInit::InitializingNetwork(
594                                    self.network_manager.init_commands(),
595                                );
596                            }
597                            self.poll(cx, now)
598                        }
599                        Some(Ok((method, params))) => Some(TargetEvent::Request(Request {
600                            method,
601                            session_id: self.session_id.clone().map(Into::into),
602                            params,
603                        })),
604                        Some(Err(_)) => Some(self.on_initialization_failed()),
605                    };
606                } else {
607                    return None;
608                }
609            }
610            TargetInit::InitializingNetwork(cmds) => {
611                advance_state!(
612                    self,
613                    cx,
614                    now,
615                    cmds,
616                    TargetInit::InitializingPage(Self::page_init_commands(
617                        self.config.request_timeout
618                    ))
619                );
620            }
621            TargetInit::InitializingPage(cmds) => {
622                advance_state!(
623                    self,
624                    cx,
625                    now,
626                    cmds,
627                    match self.config.viewport.as_ref() {
628                        Some(viewport) => TargetInit::InitializingEmulation(
629                            self.emulation_manager.init_commands(viewport)
630                        ),
631                        None => TargetInit::Initialized,
632                    }
633                );
634            }
635            TargetInit::InitializingEmulation(cmds) => {
636                advance_state!(self, cx, now, cmds, TargetInit::Initialized);
637            }
638            TargetInit::Initialized => {
639                if let Some(initiator) = self.initiator.take() {
640                    // make sure that the main frame of the page has finished loading
641                    if self
642                        .frame_manager
643                        .main_frame()
644                        .map(|frame| frame.is_loaded())
645                        .unwrap_or_default()
646                    {
647                        if let Some(page) = self.get_or_create_page() {
648                            let _ = initiator.send(Ok(page.clone().into()));
649                        } else {
650                            self.initiator = Some(initiator);
651                        }
652                    } else {
653                        self.initiator = Some(initiator);
654                    }
655                }
656            }
657            TargetInit::Closing => return None,
658        };
659
660        // Prune senders whose receivers have been dropped (caller
661        // timed out or was cancelled) so the vecs don't grow unbounded.
662        // Done once per poll() call, outside the inner loop.
663        if !self.wait_for_frame_navigation.is_empty() {
664            self.wait_for_frame_navigation.retain(|tx| !tx.is_closed());
665        }
666        if !self.wait_for_dom_content_loaded.is_empty() {
667            self.wait_for_dom_content_loaded
668                .retain(|tx| !tx.is_closed());
669        }
670        if !self.wait_for_load.is_empty() {
671            self.wait_for_load.retain(|tx| !tx.is_closed());
672        }
673        if !self.wait_for_network_idle.is_empty() {
674            self.wait_for_network_idle.retain(|tx| !tx.is_closed());
675        }
676        if !self.wait_for_network_almost_idle.is_empty() {
677            self.wait_for_network_almost_idle
678                .retain(|tx| !tx.is_closed());
679        }
680
681        loop {
682            if self.init_state == TargetInit::Closing {
683                break None;
684            }
685
686            if let Some(frame) = self.frame_manager.main_frame() {
687                let req = frame.http_request();
688                let mut waiters_remaining = false;
689
690                if frame.is_dom_content_loaded() {
691                    waiters_remaining |= drain_waiters_bounded(
692                        &mut self.wait_for_dom_content_loaded,
693                        req,
694                        WAITER_DRAIN_BUDGET,
695                    );
696                    waiters_remaining |= drain_waiters_bounded(
697                        &mut self.wait_for_frame_navigation,
698                        req,
699                        WAITER_DRAIN_BUDGET,
700                    );
701                }
702
703                if frame.is_loaded() {
704                    waiters_remaining |= drain_waiters_bounded(
705                        &mut self.wait_for_load,
706                        req,
707                        WAITER_DRAIN_BUDGET,
708                    );
709                }
710
711                if frame.is_network_idle() {
712                    waiters_remaining |= drain_waiters_bounded(
713                        &mut self.wait_for_network_idle,
714                        req,
715                        WAITER_DRAIN_BUDGET,
716                    );
717                }
718
719                if frame.is_network_almost_idle() {
720                    waiters_remaining |= drain_waiters_bounded(
721                        &mut self.wait_for_network_almost_idle,
722                        req,
723                        WAITER_DRAIN_BUDGET,
724                    );
725                }
726
727                if waiters_remaining {
728                    // More waiters queued than the per-poll budget.
729                    // Self-wake so the handler re-enters and drains the
730                    // remainder on the next tick instead of stalling.
731                    cx.waker().wake_by_ref();
732                }
733            }
734
735            // Drain queued messages first.
736            if let Some(ev) = self.queued_events.pop_front() {
737                return Some(ev);
738            }
739
740            if let Some(handle) = self.page.as_mut() {
741                while let Poll::Ready(Some(msg)) = handle.rx.poll_recv(cx) {
742                    if self.init_state == TargetInit::Closing {
743                        break;
744                    }
745
746                    match msg {
747                        TargetMessage::Command(cmd) => {
748                            if cmd.method == "Network.setBlockedURLs" {
749                                if let Some(arr) = cmd.params.get("urls").and_then(|v| v.as_array())
750                                {
751                                    let mut unblock_all = false;
752                                    let mut block_all = false;
753
754                                    for s in arr.iter().filter_map(|v| v.as_str()) {
755                                        if s == "!*" {
756                                            unblock_all = true;
757                                            break; // "!*" overrides any block rules
758                                        }
759                                        if s.contains('*') {
760                                            block_all = true;
761                                        }
762                                    }
763
764                                    if unblock_all {
765                                        self.network_manager.set_block_all(false);
766                                    } else if block_all {
767                                        self.network_manager.set_block_all(true);
768                                    }
769                                }
770                            }
771                            self.queued_events.push_back(TargetEvent::Command(cmd));
772                        }
773                        TargetMessage::MainFrame(tx) => {
774                            let _ =
775                                tx.send(self.frame_manager.main_frame().map(|f| f.id().clone()));
776                        }
777                        TargetMessage::AllFrames(tx) => {
778                            let _ = tx.send(
779                                self.frame_manager
780                                    .frames()
781                                    .map(|f| f.id().clone())
782                                    .collect(),
783                            );
784                        }
785                        #[cfg(feature = "_cache")]
786                        TargetMessage::CacheKey((cache_key, cache_policy)) => {
787                            self.network_manager.set_cache_site_key(cache_key);
788                            self.network_manager.set_cache_policy(cache_policy);
789                        }
790                        TargetMessage::Url(req) => {
791                            let GetUrl { frame_id, tx } = req;
792                            let frame = if let Some(frame_id) = frame_id {
793                                self.frame_manager.frame(&frame_id)
794                            } else {
795                                self.frame_manager.main_frame()
796                            };
797                            let _ = tx.send(frame.and_then(|f| f.url().map(str::to_string)));
798                        }
799                        TargetMessage::Name(req) => {
800                            let GetName { frame_id, tx } = req;
801                            let frame = if let Some(frame_id) = frame_id {
802                                self.frame_manager.frame(&frame_id)
803                            } else {
804                                self.frame_manager.main_frame()
805                            };
806                            let _ = tx.send(frame.and_then(|f| f.name().map(str::to_string)));
807                        }
808                        TargetMessage::Parent(req) => {
809                            let GetParent { frame_id, tx } = req;
810                            let frame = self.frame_manager.frame(&frame_id);
811                            let _ = tx.send(frame.and_then(|f| f.parent_id().cloned()));
812                        }
813                        TargetMessage::WaitForNavigation(tx) => {
814                            if let Some(frame) = self.frame_manager.main_frame() {
815                                if frame.is_dom_content_loaded() {
816                                    let _ = tx.send(frame.http_request().cloned());
817                                } else {
818                                    self.wait_for_frame_navigation.push(tx);
819                                }
820                            } else {
821                                self.wait_for_frame_navigation.push(tx);
822                            }
823                        }
824                        TargetMessage::WaitForDomContentLoaded(tx) => {
825                            if let Some(frame) = self.frame_manager.main_frame() {
826                                if frame.is_dom_content_loaded() {
827                                    let _ = tx.send(frame.http_request().cloned());
828                                } else {
829                                    self.wait_for_dom_content_loaded.push(tx);
830                                }
831                            } else {
832                                self.wait_for_dom_content_loaded.push(tx);
833                            }
834                        }
835                        TargetMessage::WaitForLoad(tx) => {
836                            if let Some(frame) = self.frame_manager.main_frame() {
837                                if frame.is_loaded() {
838                                    let _ = tx.send(frame.http_request().cloned());
839                                } else {
840                                    self.wait_for_load.push(tx);
841                                }
842                            } else {
843                                self.wait_for_load.push(tx);
844                            }
845                        }
846                        TargetMessage::WaitForNetworkIdle(tx) => {
847                            if let Some(frame) = self.frame_manager.main_frame() {
848                                if frame.is_network_idle() {
849                                    let _ = tx.send(frame.http_request().cloned());
850                                } else {
851                                    self.wait_for_network_idle.push(tx);
852                                }
853                            } else {
854                                self.wait_for_network_idle.push(tx);
855                            }
856                        }
857                        TargetMessage::WaitForNetworkAlmostIdle(tx) => {
858                            if let Some(frame) = self.frame_manager.main_frame() {
859                                if frame.is_network_almost_idle() {
860                                    let _ = tx.send(frame.http_request().cloned());
861                                } else {
862                                    self.wait_for_network_almost_idle.push(tx);
863                                }
864                            } else {
865                                self.wait_for_network_almost_idle.push(tx);
866                            }
867                        }
868                        TargetMessage::AddEventListener(req) => {
869                            if req.method == "Fetch.requestPaused" {
870                                self.network_manager.enable_request_intercept();
871                            }
872                            // register a new listener
873                            self.event_listeners.add_listener(req);
874                        }
875                        TargetMessage::GetExecutionContext(ctx) => {
876                            let GetExecutionContext {
877                                dom_world,
878                                frame_id,
879                                tx,
880                            } = ctx;
881                            let frame = if let Some(frame_id) = frame_id {
882                                self.frame_manager.frame(&frame_id)
883                            } else {
884                                self.frame_manager.main_frame()
885                            };
886
887                            if let Some(frame) = frame {
888                                match dom_world {
889                                    DOMWorldKind::Main => {
890                                        let _ = tx.send(frame.main_world().execution_context());
891                                    }
892                                    DOMWorldKind::Secondary => {
893                                        let _ =
894                                            tx.send(frame.secondary_world().execution_context());
895                                    }
896                                }
897                            } else {
898                                let _ = tx.send(None);
899                            }
900                        }
901                        TargetMessage::Authenticate(credentials) => {
902                            self.network_manager.authenticate(credentials);
903                        }
904                        TargetMessage::BlockNetwork(blocked) => {
905                            self.network_manager.set_block_all(blocked);
906                        }
907                        TargetMessage::EnableInterception(enabled) => {
908                            // if interception is enabled disable the user facing handling.
909                            self.network_manager.user_request_interception_enabled = !enabled;
910                        }
911                    }
912                }
913            }
914
915            while let Some(event) = self.network_manager.poll() {
916                if self.init_state == TargetInit::Closing {
917                    break;
918                }
919                match event {
920                    NetworkEvent::SendCdpRequest((method, params)) => {
921                        // send a message to the browser
922                        self.queued_events.push_back(TargetEvent::Request(Request {
923                            method,
924                            session_id: self.session_id.clone().map(Into::into),
925                            params,
926                        }))
927                    }
928                    NetworkEvent::Request(_) => {}
929                    NetworkEvent::Response(_) => {}
930                    NetworkEvent::RequestFailed(request) => {
931                        self.frame_manager.on_http_request_finished(request);
932                    }
933                    NetworkEvent::RequestFinished(request) => {
934                        self.frame_manager.on_http_request_finished(request);
935                    }
936                    NetworkEvent::BytesConsumed(n) => {
937                        self.queued_events.push_back(TargetEvent::BytesConsumed(n));
938                    }
939                }
940            }
941
942            while let Some(event) = self.frame_manager.poll(now) {
943                if self.init_state == TargetInit::Closing {
944                    break;
945                }
946                match event {
947                    FrameEvent::NavigationResult(res) => {
948                        self.queued_events
949                            .push_back(TargetEvent::NavigationResult(res));
950                    }
951                    FrameEvent::NavigationRequest(id, req) => {
952                        self.queued_events
953                            .push_back(TargetEvent::NavigationRequest(id, req));
954                    }
955                }
956            }
957
958            if self.queued_events.is_empty() {
959                return None;
960            }
961        }
962    }
963
964    /// Process a single message from the page channel.
965    ///
966    /// Used by `Handler::run()` after `try_recv()` drains the page channel.
967    pub(crate) fn on_page_message(&mut self, msg: TargetMessage) {
968        if self.init_state == TargetInit::Closing {
969            return;
970        }
971        match msg {
972            TargetMessage::Command(cmd) => {
973                if cmd.method == "Network.setBlockedURLs" {
974                    if let Some(arr) = cmd.params.get("urls").and_then(|v| v.as_array()) {
975                        let mut unblock_all = false;
976                        let mut block_all = false;
977                        for s in arr.iter().filter_map(|v| v.as_str()) {
978                            if s == "!*" {
979                                unblock_all = true;
980                                break;
981                            }
982                            if s.contains('*') {
983                                block_all = true;
984                            }
985                        }
986                        if unblock_all {
987                            self.network_manager.set_block_all(false);
988                        } else if block_all {
989                            self.network_manager.set_block_all(true);
990                        }
991                    }
992                }
993                self.queued_events.push_back(TargetEvent::Command(cmd));
994            }
995            TargetMessage::MainFrame(tx) => {
996                let _ = tx.send(self.frame_manager.main_frame().map(|f| f.id().clone()));
997            }
998            TargetMessage::AllFrames(tx) => {
999                let _ = tx.send(
1000                    self.frame_manager
1001                        .frames()
1002                        .map(|f| f.id().clone())
1003                        .collect(),
1004                );
1005            }
1006            #[cfg(feature = "_cache")]
1007            TargetMessage::CacheKey((cache_key, cache_policy)) => {
1008                self.network_manager.set_cache_site_key(cache_key);
1009                self.network_manager.set_cache_policy(cache_policy);
1010            }
1011            TargetMessage::Url(req) => {
1012                let GetUrl { frame_id, tx } = req;
1013                let frame = if let Some(frame_id) = frame_id {
1014                    self.frame_manager.frame(&frame_id)
1015                } else {
1016                    self.frame_manager.main_frame()
1017                };
1018                let _ = tx.send(frame.and_then(|f| f.url().map(str::to_string)));
1019            }
1020            TargetMessage::Name(req) => {
1021                let GetName { frame_id, tx } = req;
1022                let frame = if let Some(frame_id) = frame_id {
1023                    self.frame_manager.frame(&frame_id)
1024                } else {
1025                    self.frame_manager.main_frame()
1026                };
1027                let _ = tx.send(frame.and_then(|f| f.name().map(str::to_string)));
1028            }
1029            TargetMessage::Parent(req) => {
1030                let GetParent { frame_id, tx } = req;
1031                let frame = self.frame_manager.frame(&frame_id);
1032                let _ = tx.send(frame.and_then(|f| f.parent_id().cloned()));
1033            }
1034            TargetMessage::WaitForNavigation(tx) => {
1035                if let Some(frame) = self.frame_manager.main_frame() {
1036                    if frame.is_dom_content_loaded() {
1037                        let _ = tx.send(frame.http_request().cloned());
1038                    } else {
1039                        self.wait_for_frame_navigation.push(tx);
1040                    }
1041                } else {
1042                    self.wait_for_frame_navigation.push(tx);
1043                }
1044            }
1045            TargetMessage::WaitForDomContentLoaded(tx) => {
1046                if let Some(frame) = self.frame_manager.main_frame() {
1047                    if frame.is_dom_content_loaded() {
1048                        let _ = tx.send(frame.http_request().cloned());
1049                    } else {
1050                        self.wait_for_dom_content_loaded.push(tx);
1051                    }
1052                } else {
1053                    self.wait_for_dom_content_loaded.push(tx);
1054                }
1055            }
1056            TargetMessage::WaitForLoad(tx) => {
1057                if let Some(frame) = self.frame_manager.main_frame() {
1058                    if frame.is_loaded() {
1059                        let _ = tx.send(frame.http_request().cloned());
1060                    } else {
1061                        self.wait_for_load.push(tx);
1062                    }
1063                } else {
1064                    self.wait_for_load.push(tx);
1065                }
1066            }
1067            TargetMessage::WaitForNetworkIdle(tx) => {
1068                if let Some(frame) = self.frame_manager.main_frame() {
1069                    if frame.is_network_idle() {
1070                        let _ = tx.send(frame.http_request().cloned());
1071                    } else {
1072                        self.wait_for_network_idle.push(tx);
1073                    }
1074                } else {
1075                    self.wait_for_network_idle.push(tx);
1076                }
1077            }
1078            TargetMessage::WaitForNetworkAlmostIdle(tx) => {
1079                if let Some(frame) = self.frame_manager.main_frame() {
1080                    if frame.is_network_almost_idle() {
1081                        let _ = tx.send(frame.http_request().cloned());
1082                    } else {
1083                        self.wait_for_network_almost_idle.push(tx);
1084                    }
1085                } else {
1086                    self.wait_for_network_almost_idle.push(tx);
1087                }
1088            }
1089            TargetMessage::AddEventListener(req) => {
1090                if req.method == "Fetch.requestPaused" {
1091                    self.network_manager.enable_request_intercept();
1092                }
1093                self.event_listeners.add_listener(req);
1094            }
1095            TargetMessage::GetExecutionContext(ctx) => {
1096                let GetExecutionContext {
1097                    dom_world,
1098                    frame_id,
1099                    tx,
1100                } = ctx;
1101                let frame = if let Some(frame_id) = frame_id {
1102                    self.frame_manager.frame(&frame_id)
1103                } else {
1104                    self.frame_manager.main_frame()
1105                };
1106                if let Some(frame) = frame {
1107                    match dom_world {
1108                        DOMWorldKind::Main => {
1109                            let _ = tx.send(frame.main_world().execution_context());
1110                        }
1111                        DOMWorldKind::Secondary => {
1112                            let _ = tx.send(frame.secondary_world().execution_context());
1113                        }
1114                    }
1115                } else {
1116                    let _ = tx.send(None);
1117                }
1118            }
1119            TargetMessage::Authenticate(credentials) => {
1120                self.network_manager.authenticate(credentials);
1121            }
1122            TargetMessage::BlockNetwork(blocked) => {
1123                self.network_manager.set_block_all(blocked);
1124            }
1125            TargetMessage::EnableInterception(enabled) => {
1126                self.network_manager.user_request_interception_enabled = !enabled;
1127            }
1128        }
1129    }
1130
1131    /// Advance the target's state machine and drain queued events.
1132    ///
1133    /// Like [`poll`](Self::poll) but does **not** read from the page channel
1134    /// (that is handled externally by `Handler::run()` via `try_recv`).
1135    pub(crate) fn advance(&mut self, now: Instant) -> Option<TargetEvent> {
1136        if !self.is_page() {
1137            return None;
1138        }
1139
1140        // Init state machine
1141        match &mut self.init_state {
1142            TargetInit::AttachToTarget => {
1143                self.init_state = TargetInit::InitializingFrame(FrameManager::init_commands(
1144                    self.config.request_timeout,
1145                ));
1146                if let Ok(params) = AttachToTargetParams::builder()
1147                    .target_id(self.target_id().clone())
1148                    .flatten(true)
1149                    .build()
1150                {
1151                    return Some(TargetEvent::Request(Request::new(
1152                        params.identifier(),
1153                        serde_json::to_value(params).unwrap_or_default(),
1154                    )));
1155                } else {
1156                    return None;
1157                }
1158            }
1159            TargetInit::InitializingFrame(cmds) => {
1160                self.session_id.as_ref()?;
1161                if let Poll::Ready(poll) = cmds.poll(now) {
1162                    return match poll {
1163                        None => {
1164                            if let Some(world_name) = self.frame_manager.get_isolated_world_name() {
1165                                let world_name = world_name.clone();
1166                                if let Some(isolated_world_cmds) =
1167                                    self.frame_manager.ensure_isolated_world(&world_name)
1168                                {
1169                                    *cmds = isolated_world_cmds;
1170                                } else {
1171                                    self.init_state = TargetInit::InitializingNetwork(
1172                                        self.network_manager.init_commands(),
1173                                    );
1174                                }
1175                            } else {
1176                                self.init_state = TargetInit::InitializingNetwork(
1177                                    self.network_manager.init_commands(),
1178                                );
1179                            }
1180                            self.advance(now)
1181                        }
1182                        Some(Ok((method, params))) => Some(TargetEvent::Request(Request {
1183                            method,
1184                            session_id: self.session_id.clone().map(Into::into),
1185                            params,
1186                        })),
1187                        Some(Err(_)) => Some(self.on_initialization_failed()),
1188                    };
1189                } else {
1190                    return None;
1191                }
1192            }
1193            TargetInit::InitializingNetwork(cmds) => {
1194                if let Poll::Ready(poll) = cmds.poll(now) {
1195                    return match poll {
1196                        None => {
1197                            self.init_state = TargetInit::InitializingPage(
1198                                Self::page_init_commands(self.config.request_timeout),
1199                            );
1200                            self.advance(now)
1201                        }
1202                        Some(Ok((method, params))) => Some(TargetEvent::Request(Request {
1203                            method,
1204                            session_id: self.session_id.clone().map(Into::into),
1205                            params,
1206                        })),
1207                        Some(Err(_)) => Some(self.on_initialization_failed()),
1208                    };
1209                } else {
1210                    return None;
1211                }
1212            }
1213            TargetInit::InitializingPage(cmds) => {
1214                if let Poll::Ready(poll) = cmds.poll(now) {
1215                    return match poll {
1216                        None => {
1217                            self.init_state = match self.config.viewport.as_ref() {
1218                                Some(viewport) => TargetInit::InitializingEmulation(
1219                                    self.emulation_manager.init_commands(viewport),
1220                                ),
1221                                None => TargetInit::Initialized,
1222                            };
1223                            self.advance(now)
1224                        }
1225                        Some(Ok((method, params))) => Some(TargetEvent::Request(Request {
1226                            method,
1227                            session_id: self.session_id.clone().map(Into::into),
1228                            params,
1229                        })),
1230                        Some(Err(_)) => Some(self.on_initialization_failed()),
1231                    };
1232                } else {
1233                    return None;
1234                }
1235            }
1236            TargetInit::InitializingEmulation(cmds) => {
1237                if let Poll::Ready(poll) = cmds.poll(now) {
1238                    return match poll {
1239                        None => {
1240                            self.init_state = TargetInit::Initialized;
1241                            self.advance(now)
1242                        }
1243                        Some(Ok((method, params))) => Some(TargetEvent::Request(Request {
1244                            method,
1245                            session_id: self.session_id.clone().map(Into::into),
1246                            params,
1247                        })),
1248                        Some(Err(_)) => Some(self.on_initialization_failed()),
1249                    };
1250                } else {
1251                    return None;
1252                }
1253            }
1254            TargetInit::Initialized => {
1255                if let Some(initiator) = self.initiator.take() {
1256                    if self
1257                        .frame_manager
1258                        .main_frame()
1259                        .map(|frame| frame.is_loaded())
1260                        .unwrap_or_default()
1261                    {
1262                        if let Some(page) = self.get_or_create_page() {
1263                            let _ = initiator.send(Ok(page.clone().into()));
1264                        } else {
1265                            self.initiator = Some(initiator);
1266                        }
1267                    } else {
1268                        self.initiator = Some(initiator);
1269                    }
1270                }
1271            }
1272            TargetInit::Closing => return None,
1273        };
1274
1275        // Prune dead waiters
1276        if !self.wait_for_frame_navigation.is_empty() {
1277            self.wait_for_frame_navigation.retain(|tx| !tx.is_closed());
1278        }
1279        if !self.wait_for_dom_content_loaded.is_empty() {
1280            self.wait_for_dom_content_loaded
1281                .retain(|tx| !tx.is_closed());
1282        }
1283        if !self.wait_for_load.is_empty() {
1284            self.wait_for_load.retain(|tx| !tx.is_closed());
1285        }
1286        if !self.wait_for_network_idle.is_empty() {
1287            self.wait_for_network_idle.retain(|tx| !tx.is_closed());
1288        }
1289        if !self.wait_for_network_almost_idle.is_empty() {
1290            self.wait_for_network_almost_idle
1291                .retain(|tx| !tx.is_closed());
1292        }
1293
1294        // Drain events loop (same as poll's inner loop, minus page channel reading)
1295        loop {
1296            if self.init_state == TargetInit::Closing {
1297                break None;
1298            }
1299
1300            if let Some(frame) = self.frame_manager.main_frame() {
1301                if frame.is_dom_content_loaded() {
1302                    while let Some(tx) = self.wait_for_dom_content_loaded.pop() {
1303                        let _ = tx.send(frame.http_request().cloned());
1304                    }
1305                    while let Some(tx) = self.wait_for_frame_navigation.pop() {
1306                        let _ = tx.send(frame.http_request().cloned());
1307                    }
1308                }
1309                if frame.is_loaded() {
1310                    while let Some(tx) = self.wait_for_load.pop() {
1311                        let _ = tx.send(frame.http_request().cloned());
1312                    }
1313                }
1314                if frame.is_network_idle() {
1315                    while let Some(tx) = self.wait_for_network_idle.pop() {
1316                        let _ = tx.send(frame.http_request().cloned());
1317                    }
1318                }
1319                if frame.is_network_almost_idle() {
1320                    while let Some(tx) = self.wait_for_network_almost_idle.pop() {
1321                        let _ = tx.send(frame.http_request().cloned());
1322                    }
1323                }
1324            }
1325
1326            if let Some(ev) = self.queued_events.pop_front() {
1327                return Some(ev);
1328            }
1329
1330            while let Some(event) = self.network_manager.poll() {
1331                if self.init_state == TargetInit::Closing {
1332                    break;
1333                }
1334                match event {
1335                    NetworkEvent::SendCdpRequest((method, params)) => {
1336                        self.queued_events.push_back(TargetEvent::Request(Request {
1337                            method,
1338                            session_id: self.session_id.clone().map(Into::into),
1339                            params,
1340                        }));
1341                    }
1342                    NetworkEvent::Request(_) => {}
1343                    NetworkEvent::Response(_) => {}
1344                    NetworkEvent::RequestFailed(request) => {
1345                        self.frame_manager.on_http_request_finished(request);
1346                    }
1347                    NetworkEvent::RequestFinished(request) => {
1348                        self.frame_manager.on_http_request_finished(request);
1349                    }
1350                    NetworkEvent::BytesConsumed(n) => {
1351                        self.queued_events.push_back(TargetEvent::BytesConsumed(n));
1352                    }
1353                }
1354            }
1355
1356            while let Some(event) = self.frame_manager.poll(now) {
1357                if self.init_state == TargetInit::Closing {
1358                    break;
1359                }
1360                match event {
1361                    FrameEvent::NavigationResult(res) => {
1362                        self.queued_events
1363                            .push_back(TargetEvent::NavigationResult(res));
1364                    }
1365                    FrameEvent::NavigationRequest(id, req) => {
1366                        self.queued_events
1367                            .push_back(TargetEvent::NavigationRequest(id, req));
1368                    }
1369                }
1370            }
1371
1372            if self.queued_events.is_empty() {
1373                return None;
1374            }
1375        }
1376    }
1377
1378    /// Set the sender half of the channel who requested the creation of this
1379    /// target
1380    pub fn set_initiator(&mut self, tx: Sender<Result<Page>>) {
1381        self.initiator = Some(tx);
1382    }
1383
1384    pub(crate) fn page_init_commands(timeout: Duration) -> CommandChain {
1385        CommandChain::new(INIT_COMMANDS_PARAMS.clone(), timeout)
1386    }
1387}
1388
1389/// Configuration for how a single target/page should be fetched and processed.
1390#[derive(Debug, Clone)]
1391pub struct TargetConfig {
1392    /// Whether to ignore TLS/HTTPS certificate errors (e.g. self-signed or expired certs).
1393    /// When `true`, connections will proceed even if certificate validation fails.
1394    pub ignore_https_errors: bool,
1395    /// Request timeout to use for the main navigation / resource fetch.
1396    /// This is the total time allowed before a request is considered failed.
1397    pub request_timeout: Duration,
1398    /// Optional browser viewport to use for this target.
1399    /// When `None`, the default viewport (or headless browser default) is used.
1400    pub viewport: Option<Viewport>,
1401    /// Enable request interception for this target.
1402    /// When `true`, all network requests will pass through the intercept manager.
1403    pub request_intercept: bool,
1404    /// Enable caching for this target.
1405    /// When `true`, responses may be read from and written to the cache layer.
1406    pub cache_enabled: bool,
1407    /// If `true`, skip visual/asset resources that are not required for HTML content
1408    /// (e.g. images, fonts, media). Useful for performance-oriented crawls.
1409    pub ignore_visuals: bool,
1410    /// If `true`, block JavaScript execution (or avoid loading JS resources)
1411    /// for this target. This is useful for purely static HTML crawls.
1412    pub ignore_javascript: bool,
1413    /// If `true`, block analytics / tracking requests (e.g. Google Analytics,
1414    /// common tracker domains, etc.).
1415    pub ignore_analytics: bool,
1416    /// Ignore prefetching.
1417    pub ignore_prefetch: bool,
1418    /// If `true`, block stylesheets and related CSS resources for this target.
1419    /// This can reduce bandwidth when only raw HTML is needed.
1420    pub ignore_stylesheets: bool,
1421    /// If `true`, only HTML documents will be fetched/kept.
1422    /// Non-HTML subresources may be skipped entirely.
1423    pub only_html: bool,
1424    /// Whether service workers are allowed for this target.
1425    /// When `true`, service workers may register and intercept requests.
1426    pub service_worker_enabled: bool,
1427    /// Extra HTTP headers to send with each request for this target.
1428    /// Keys should be header names, values their corresponding header values.
1429    pub extra_headers: Option<std::collections::HashMap<String, String>>,
1430    /// Network intercept manager used to make allow/deny/modify decisions
1431    /// for requests when `request_intercept` is enabled.
1432    pub intercept_manager: NetworkInterceptManager,
1433    /// The maximum number of response bytes allowed for this target.
1434    /// When set, responses larger than this limit may be truncated or aborted.
1435    pub max_bytes_allowed: Option<u64>,
1436    /// Cap on Document-type redirect hops before the navigation is aborted.
1437    /// `None` disables enforcement; `Some(n)` mirrors `reqwest::redirect::Policy::limited(n)`.
1438    pub max_redirects: Option<usize>,
1439    /// Cap on main-frame cross-document navigations per `goto`. Defends against
1440    /// JS / meta-refresh loops that bypass the HTTP redirect guard. `None`
1441    /// disables the guard.
1442    pub max_main_frame_navigations: Option<u32>,
1443    /// Whitelist patterns to allow through the network.
1444    pub whitelist_patterns: Option<Vec<String>>,
1445    /// Blacklist patterns to black through the network.
1446    pub blacklist_patterns: Option<Vec<String>>,
1447    /// Extra ABP/uBO filter rules for the adblock engine.
1448    #[cfg(feature = "adblock")]
1449    pub adblock_filter_rules: Option<Vec<String>>,
1450    /// Optional notify handle for waking `Handler::run()`'s select loop.
1451    /// `None` when using the `impl Stream for Handler` path (no overhead).
1452    pub page_wake: Option<Arc<Notify>>,
1453    /// Capacity of the per-page mpsc channel carrying `TargetMessage`s
1454    /// from the page handle to the handler. Defaults to
1455    /// `crate::handler::page::DEFAULT_PAGE_CHANNEL_CAPACITY` (2048);
1456    /// override via `HandlerConfig::page_channel_capacity`. Clamped to
1457    /// a minimum of 1 at channel creation time.
1458    pub page_channel_capacity: usize,
1459}
1460
1461impl Default for TargetConfig {
1462    fn default() -> Self {
1463        Self {
1464            ignore_https_errors: true,
1465            request_timeout: Duration::from_millis(REQUEST_TIMEOUT),
1466            viewport: Default::default(),
1467            request_intercept: false,
1468            cache_enabled: true,
1469            service_worker_enabled: true,
1470            ignore_javascript: false,
1471            ignore_visuals: false,
1472            ignore_stylesheets: false,
1473            ignore_analytics: true,
1474            ignore_prefetch: true,
1475            only_html: false,
1476            extra_headers: Default::default(),
1477            intercept_manager: NetworkInterceptManager::Unknown,
1478            max_bytes_allowed: None,
1479            max_redirects: None,
1480            max_main_frame_navigations: None,
1481            whitelist_patterns: None,
1482            blacklist_patterns: None,
1483            #[cfg(feature = "adblock")]
1484            adblock_filter_rules: None,
1485            page_wake: None,
1486            page_channel_capacity: crate::handler::page::DEFAULT_PAGE_CHANNEL_CAPACITY,
1487        }
1488    }
1489}
1490
1491#[derive(Debug, Clone, Eq, PartialEq)]
1492pub enum TargetType {
1493    Page,
1494    BackgroundPage,
1495    ServiceWorker,
1496    SharedWorker,
1497    Other,
1498    Browser,
1499    Webview,
1500    Unknown(String),
1501}
1502
1503impl TargetType {
1504    pub fn new(ty: &str) -> Self {
1505        match ty {
1506            "page" => TargetType::Page,
1507            "background_page" => TargetType::BackgroundPage,
1508            "service_worker" => TargetType::ServiceWorker,
1509            "shared_worker" => TargetType::SharedWorker,
1510            "other" => TargetType::Other,
1511            "browser" => TargetType::Browser,
1512            "webview" => TargetType::Webview,
1513            s => TargetType::Unknown(s.to_string()),
1514        }
1515    }
1516
1517    pub fn is_page(&self) -> bool {
1518        matches!(self, TargetType::Page)
1519    }
1520
1521    pub fn is_background_page(&self) -> bool {
1522        matches!(self, TargetType::BackgroundPage)
1523    }
1524
1525    pub fn is_service_worker(&self) -> bool {
1526        matches!(self, TargetType::ServiceWorker)
1527    }
1528
1529    pub fn is_shared_worker(&self) -> bool {
1530        matches!(self, TargetType::SharedWorker)
1531    }
1532
1533    pub fn is_other(&self) -> bool {
1534        matches!(self, TargetType::Other)
1535    }
1536
1537    pub fn is_browser(&self) -> bool {
1538        matches!(self, TargetType::Browser)
1539    }
1540
1541    pub fn is_webview(&self) -> bool {
1542        matches!(self, TargetType::Webview)
1543    }
1544}
1545
1546#[derive(Debug)]
1547pub(crate) enum TargetEvent {
1548    /// An internal request
1549    Request(Request),
1550    /// An internal navigation request
1551    NavigationRequest(NavigationId, Request),
1552    /// Indicates that a previous requested navigation has finished
1553    NavigationResult(Result<NavigationOk, NavigationError>),
1554    /// A new command arrived via a channel
1555    Command(CommandMessage),
1556    /// The bytes consumed by the network.
1557    BytesConsumed(u64),
1558}
1559
1560// TODO this can be moved into the classes?
1561#[derive(Debug, PartialEq)]
1562pub enum TargetInit {
1563    InitializingFrame(CommandChain),
1564    InitializingNetwork(CommandChain),
1565    InitializingPage(CommandChain),
1566    InitializingEmulation(CommandChain),
1567    AttachToTarget,
1568    Initialized,
1569    Closing,
1570}
1571
1572impl TargetInit {
1573    fn commands_mut(&mut self) -> Option<&mut CommandChain> {
1574        match self {
1575            TargetInit::InitializingFrame(cmd) => Some(cmd),
1576            TargetInit::InitializingNetwork(cmd) => Some(cmd),
1577            TargetInit::InitializingPage(cmd) => Some(cmd),
1578            TargetInit::InitializingEmulation(cmd) => Some(cmd),
1579            TargetInit::AttachToTarget => None,
1580            TargetInit::Initialized => None,
1581            TargetInit::Closing => None,
1582        }
1583    }
1584}
1585
1586#[derive(Debug)]
1587pub struct GetExecutionContext {
1588    /// For which world the execution context was requested
1589    pub dom_world: DOMWorldKind,
1590    /// The if of the frame to get the `ExecutionContext` for
1591    pub frame_id: Option<FrameId>,
1592    /// Sender half of the channel to send the response back
1593    pub tx: Sender<Option<ExecutionContextId>>,
1594}
1595
1596impl GetExecutionContext {
1597    pub fn new(tx: Sender<Option<ExecutionContextId>>) -> Self {
1598        Self {
1599            dom_world: DOMWorldKind::Main,
1600            frame_id: None,
1601            tx,
1602        }
1603    }
1604}
1605
1606#[derive(Debug)]
1607pub struct GetUrl {
1608    /// The id of the frame to get the url for (None = main frame)
1609    pub frame_id: Option<FrameId>,
1610    /// Sender half of the channel to send the response back
1611    pub tx: Sender<Option<String>>,
1612}
1613
1614impl GetUrl {
1615    pub fn new(tx: Sender<Option<String>>) -> Self {
1616        Self { frame_id: None, tx }
1617    }
1618}
1619
1620#[derive(Debug)]
1621pub struct GetName {
1622    /// The id of the frame to get the name for (None = main frame)
1623    pub frame_id: Option<FrameId>,
1624    /// Sender half of the channel to send the response back
1625    pub tx: Sender<Option<String>>,
1626}
1627
1628#[derive(Debug)]
1629pub struct GetParent {
1630    /// The id of the frame to get the parent for (None = main frame)
1631    pub frame_id: FrameId,
1632    /// Sender half of the channel to send the response back
1633    pub tx: Sender<Option<FrameId>>,
1634}
1635
1636#[derive(Debug)]
1637pub enum TargetMessage {
1638    /// Execute a command within the session of this target
1639    Command(CommandMessage),
1640    /// Return the main frame of this target's page
1641    MainFrame(Sender<Option<FrameId>>),
1642    /// Return all the frames of this target's page
1643    AllFrames(Sender<Vec<FrameId>>),
1644    #[cfg(feature = "_cache")]
1645    /// Set the cache key and policy for the target page.
1646    CacheKey((Option<String>, Option<crate::cache::BasicCachePolicy>)),
1647    /// Return the url if available
1648    Url(GetUrl),
1649    /// Return the name if available
1650    Name(GetName),
1651    /// Return the parent id of a frame
1652    Parent(GetParent),
1653    /// A Message that resolves when the frame finished loading a new url
1654    WaitForNavigation(Sender<ArcHttpRequest>),
1655    /// Resolves when `DOMContentLoaded` fires (HTML parsed, sync scripts
1656    /// executed) — before `load`, so subresources may still be in-flight.
1657    WaitForDomContentLoaded(Sender<ArcHttpRequest>),
1658    /// Resolves when the `load` event fires — all subresources (images,
1659    /// fonts, XHRs) are done. Slower than `WaitForNavigation` through proxies.
1660    WaitForLoad(Sender<ArcHttpRequest>),
1661    /// A Message that resolves when the frame network is idle
1662    WaitForNetworkIdle(Sender<ArcHttpRequest>),
1663    /// A Message that resolves when the frame network is almost idle
1664    WaitForNetworkAlmostIdle(Sender<ArcHttpRequest>),
1665    /// A request to submit a new listener that gets notified with every
1666    /// received event
1667    AddEventListener(EventListenerRequest),
1668    /// Get the `ExecutionContext` if available
1669    GetExecutionContext(GetExecutionContext),
1670    Authenticate(Credentials),
1671    /// Set block/unblocked networking
1672    BlockNetwork(bool),
1673    /// Enable/Disable internal request paused interception
1674    EnableInterception(bool),
1675}
1676
1677#[cfg(test)]
1678mod waiter_drain_tests {
1679    //! Unit tests for `drain_waiters_bounded`.
1680    //!
1681    //! These cover the isolated drain helper — they do not spin up a real
1682    //! `Target` or browser, so they run in microseconds and exhaustively
1683    //! exercise the budget / re-arm contract:
1684    //!
1685    //! - drain with no waiters is a no-op and reports `remaining = false`
1686    //! - drain with fewer waiters than budget fires all and reports `false`
1687    //! - drain with exactly `budget` waiters fires all and reports `false`
1688    //! - drain with more waiters than `budget` fires `budget` and reports `true`
1689    //! - senders whose receivers were dropped don't panic or consume extra work
1690    //! - repeated draining eventually empties any queue (no deadlock)
1691    //!
1692    //! The last test is the key "no deadlock" property: if re-arm were broken
1693    //! (say, we forgot to wake), the handler could stall with waiters pending
1694    //! forever. Here we prove the helper itself always makes forward progress.
1695    use super::{drain_waiters_bounded, WAITER_DRAIN_BUDGET};
1696    use crate::ArcHttpRequest;
1697    use tokio::sync::oneshot::{self, Sender};
1698
1699    fn make_waiters(n: usize) -> (Vec<Sender<ArcHttpRequest>>, Vec<oneshot::Receiver<ArcHttpRequest>>) {
1700        let mut txs = Vec::with_capacity(n);
1701        let mut rxs = Vec::with_capacity(n);
1702        for _ in 0..n {
1703            let (tx, rx) = oneshot::channel();
1704            txs.push(tx);
1705            rxs.push(rx);
1706        }
1707        (txs, rxs)
1708    }
1709
1710    #[test]
1711    fn empty_queue_is_noop() {
1712        let mut queue: Vec<Sender<ArcHttpRequest>> = Vec::new();
1713        let remaining = drain_waiters_bounded(&mut queue, None, WAITER_DRAIN_BUDGET);
1714        assert!(!remaining, "empty queue should not mark 'remaining'");
1715        assert!(queue.is_empty());
1716    }
1717
1718    #[test]
1719    fn drains_fewer_than_budget() {
1720        let (mut queue, mut rxs) = make_waiters(10);
1721        let remaining = drain_waiters_bounded(&mut queue, None, WAITER_DRAIN_BUDGET);
1722        assert!(!remaining);
1723        assert!(queue.is_empty());
1724        // All receivers got a value.
1725        for rx in rxs.iter_mut() {
1726            assert!(rx.try_recv().is_ok(), "every waiter must receive a value");
1727        }
1728    }
1729
1730    #[test]
1731    fn drains_exactly_budget() {
1732        let (mut queue, mut rxs) = make_waiters(WAITER_DRAIN_BUDGET);
1733        let remaining = drain_waiters_bounded(&mut queue, None, WAITER_DRAIN_BUDGET);
1734        assert!(!remaining, "exactly-budget drain should empty the queue");
1735        assert!(queue.is_empty());
1736        for rx in rxs.iter_mut() {
1737            assert!(rx.try_recv().is_ok());
1738        }
1739    }
1740
1741    #[test]
1742    fn drains_budget_when_over_capacity() {
1743        let n = WAITER_DRAIN_BUDGET * 3 + 7; // 199 waiters at the default 64
1744        let (mut queue, _rxs) = make_waiters(n);
1745        let remaining = drain_waiters_bounded(&mut queue, None, WAITER_DRAIN_BUDGET);
1746        assert!(remaining, "over-budget drain must mark 'remaining = true'");
1747        assert_eq!(
1748            queue.len(),
1749            n - WAITER_DRAIN_BUDGET,
1750            "exactly `budget` waiters should be popped per call"
1751        );
1752    }
1753
1754    #[test]
1755    fn dropped_receiver_does_not_panic() {
1756        let (mut queue, mut rxs) = make_waiters(4);
1757        // Drop half the receivers — their senders become closed.
1758        rxs.truncate(2);
1759        let remaining = drain_waiters_bounded(&mut queue, None, WAITER_DRAIN_BUDGET);
1760        assert!(!remaining);
1761        assert!(queue.is_empty());
1762        // The remaining receivers either got a value or were the popped ones;
1763        // at minimum, no panic occurred.
1764    }
1765
1766    #[test]
1767    fn repeated_draining_empties_any_queue() {
1768        // "No deadlock" property: repeatedly calling the helper always makes
1769        // forward progress and eventually empties the queue. If this loop
1770        // ever ran forever, the re-arm contract would be unreachable.
1771        let n = 10_000;
1772        let (mut queue, _rxs) = make_waiters(n);
1773        let mut rounds = 0;
1774        loop {
1775            let remaining = drain_waiters_bounded(&mut queue, None, WAITER_DRAIN_BUDGET);
1776            rounds += 1;
1777            if !remaining {
1778                break;
1779            }
1780            assert!(
1781                rounds < n,
1782                "drain must make forward progress on every call"
1783            );
1784        }
1785        assert!(queue.is_empty());
1786        // 10_000 / 64 = 156.25 → 157 full rounds + final clean-up = 157
1787        assert_eq!(
1788            rounds,
1789            n.div_ceil(WAITER_DRAIN_BUDGET),
1790            "each round should pop exactly `budget` waiters until the tail"
1791        );
1792    }
1793}