1use std::collections::VecDeque;
2use std::pin::Pin;
3use std::sync::Arc;
4use std::time::Instant;
5
6use chromiumoxide_cdp::cdp::browser_protocol::target::DetachFromTargetParams;
7use futures::channel::oneshot::Sender;
8use futures::stream::Stream;
9use futures::task::{Context, Poll};
10
11use crate::auth::Credentials;
12use crate::cdp::browser_protocol::target::CloseTargetParams;
13use crate::cmd::CommandChain;
14use crate::cmd::CommandMessage;
15use crate::error::{CdpError, Result};
16use crate::handler::browser::BrowserContext;
17use crate::handler::domworld::DOMWorldKind;
18use crate::handler::emulation::EmulationManager;
19use crate::handler::frame::FrameRequestedNavigation;
20use crate::handler::frame::{
21 FrameEvent, FrameManager, NavigationError, NavigationId, NavigationOk,
22};
23use crate::handler::network::{NetworkEvent, NetworkManager};
24use crate::handler::page::PageHandle;
25use crate::handler::viewport::Viewport;
26use crate::handler::{PageInner, REQUEST_TIMEOUT};
27use crate::listeners::{EventListenerRequest, EventListeners};
28use crate::{page::Page, ArcHttpRequest};
29use chromiumoxide_cdp::cdp::browser_protocol::{
30 browser::BrowserContextId,
31 log as cdplog,
32 page::{FrameId, GetFrameTreeParams},
33 target::{AttachToTargetParams, SessionId, SetAutoAttachParams, TargetId, TargetInfo},
34};
35use chromiumoxide_cdp::cdp::events::CdpEvent;
36use chromiumoxide_cdp::cdp::js_protocol::runtime::{
37 ExecutionContextId, RunIfWaitingForDebuggerParams,
38};
39use chromiumoxide_cdp::cdp::CdpEventMessage;
40use chromiumoxide_types::{Command, Method, Request, Response};
41use spider_network_blocker::intercept_manager::NetworkInterceptManager;
42use std::time::Duration;
43
44macro_rules! advance_state {
45 ($s:ident, $cx:ident, $now:ident, $cmds: ident, $next_state:expr ) => {{
46 if let Poll::Ready(poll) = $cmds.poll($now) {
47 return match poll {
48 None => {
49 $s.init_state = $next_state;
50 $s.poll($cx, $now)
51 }
52 Some(Ok((method, params))) => Some(TargetEvent::Request(Request {
53 method,
54 session_id: $s.session_id.clone().map(Into::into),
55 params,
56 })),
57 Some(Err(_)) => Some($s.on_initialization_failed()),
58 };
59 } else {
60 return None;
61 }
62 }};
63}
64
65lazy_static::lazy_static! {
66 static ref INIT_COMMANDS_PARAMS: Vec<(chromiumoxide_types::MethodId, serde_json::Value)> = {
68 if let Ok(attach) = SetAutoAttachParams::builder()
69 .flatten(true)
70 .auto_attach(true)
71 .wait_for_debugger_on_start(true)
72 .build() {
73 let disable_log = cdplog::DisableParams::default();
74
75 let mut cmds = vec![
76 (
77 attach.identifier(),
78 serde_json::to_value(attach).unwrap_or_default(),
79 ),
80 (
81 disable_log.identifier(),
82 serde_json::to_value(disable_log).unwrap_or_default(),
83 )
84 ];
85
86 if cfg!(feature = "collect_metrics") {
88 let enable_performance = chromiumoxide_cdp::cdp::browser_protocol::performance::EnableParams::default();
89 cmds.push((
90 enable_performance.identifier(),
91 serde_json::to_value(enable_performance).unwrap_or_default(),
92 ));
93 }
94
95 cmds
96 } else {
97 vec![]
98 }
99 };
100
101 static ref ATTACH_TARGET: (chromiumoxide_types::MethodId, serde_json::Value) = {
103 let runtime_cmd = RunIfWaitingForDebuggerParams::default();
104
105 (runtime_cmd.identifier(), serde_json::to_value(runtime_cmd).unwrap_or_default())
106 };
107}
108
109#[derive(Debug)]
110pub struct Target {
111 info: TargetInfo,
113 r#type: TargetType,
115 config: TargetConfig,
117 browser_context: BrowserContext,
119 frame_manager: FrameManager,
122 pub(crate) network_manager: NetworkManager,
124 emulation_manager: EmulationManager,
125 session_id: Option<SessionId>,
127 page: Option<PageHandle>,
129 pub(crate) init_state: TargetInit,
131 queued_events: VecDeque<TargetEvent>,
133 event_listeners: EventListeners,
135 wait_for_frame_navigation: Vec<Sender<ArcHttpRequest>>,
137 wait_for_network_idle: Vec<Sender<ArcHttpRequest>>,
139 wait_for_network_almost_idle: Vec<Sender<ArcHttpRequest>>,
141 initiator: Option<Sender<Result<Page>>>,
143}
144
145impl Target {
146 pub fn new(info: TargetInfo, config: TargetConfig, browser_context: BrowserContext) -> Self {
149 let ty = TargetType::new(&info.r#type);
150 let request_timeout: Duration = config.request_timeout;
151 let mut network_manager = NetworkManager::new(config.ignore_https_errors, request_timeout);
152
153 if !config.cache_enabled {
154 network_manager.set_cache_enabled(false);
155 }
156
157 if !config.service_worker_enabled {
158 network_manager.set_service_worker_enabled(true);
159 }
160
161 network_manager.set_request_interception(config.request_intercept);
162 network_manager.max_bytes_allowed = config.max_bytes_allowed;
163
164 if let Some(headers) = &config.extra_headers {
165 network_manager.set_extra_headers(headers.clone());
166 }
167
168 if let Some(whitelist) = &config.whitelist_patterns {
169 network_manager.set_whitelist_patterns(whitelist.clone());
170 }
171
172 if let Some(blacklist) = &config.blacklist_patterns {
173 network_manager.set_blacklist_patterns(blacklist);
174 }
175
176 network_manager.ignore_visuals = config.ignore_visuals;
177 network_manager.block_javascript = config.ignore_javascript;
178 network_manager.block_analytics = config.ignore_analytics;
179 network_manager.block_stylesheets = config.ignore_stylesheets;
180 network_manager.only_html = config.only_html;
181 network_manager.intercept_manager = config.intercept_manager;
182
183 Self {
184 info,
185 r#type: ty,
186 config,
187 frame_manager: FrameManager::new(request_timeout),
188 network_manager,
189 emulation_manager: EmulationManager::new(request_timeout),
190 session_id: None,
191 page: None,
192 init_state: TargetInit::AttachToTarget,
193 wait_for_frame_navigation: Default::default(),
194 wait_for_network_idle: Default::default(),
195 wait_for_network_almost_idle: Default::default(),
196 queued_events: Default::default(),
197 event_listeners: Default::default(),
198 initiator: None,
199 browser_context,
200 }
201 }
202
203 pub fn set_session_id(&mut self, id: SessionId) {
205 self.session_id = Some(id)
206 }
207
208 pub fn session_id(&self) -> Option<&SessionId> {
210 self.session_id.as_ref()
211 }
212
213 pub fn session_id_mut(&mut self) -> &mut Option<SessionId> {
215 &mut self.session_id
216 }
217
218 pub fn browser_context(&self) -> &BrowserContext {
220 &self.browser_context
221 }
222
223 pub fn target_id(&self) -> &TargetId {
225 &self.info.target_id
226 }
227
228 pub fn r#type(&self) -> &TargetType {
230 &self.r#type
231 }
232
233 pub fn is_initialized(&self) -> bool {
235 matches!(self.init_state, TargetInit::Initialized)
236 }
237
238 pub fn goto(&mut self, req: FrameRequestedNavigation) {
240 if self.network_manager.has_target_domain() {
241 self.network_manager.clear_target_domain();
242 let goto_url = req
243 .req
244 .params
245 .as_object()
246 .and_then(|o| o.get("url"))
247 .and_then(|v| v.as_str());
248
249 if let Some(url) = goto_url {
250 self.network_manager.set_page_url(url.into());
251 }
252 }
253 self.frame_manager.goto(req);
254 }
255
256 fn create_page(&mut self) {
258 if self.page.is_none() {
259 if let Some(session) = self.session_id.clone() {
260 let handle =
261 PageHandle::new(self.target_id().clone(), session, self.opener_id().cloned());
262 self.page = Some(handle);
263 }
264 }
265 }
266
267 pub(crate) fn get_or_create_page(&mut self) -> Option<&Arc<PageInner>> {
269 self.create_page();
270 self.page.as_ref().map(|p| p.inner())
271 }
272
273 pub fn is_page(&self) -> bool {
275 self.r#type().is_page()
276 }
277
278 pub fn browser_context_id(&self) -> Option<&BrowserContextId> {
280 self.info.browser_context_id.as_ref()
281 }
282
283 pub fn info(&self) -> &TargetInfo {
285 &self.info
286 }
287
288 pub fn opener_id(&self) -> Option<&TargetId> {
290 self.info.opener_id.as_ref()
291 }
292
293 pub fn frame_manager(&self) -> &FrameManager {
294 &self.frame_manager
295 }
296
297 pub fn frame_manager_mut(&mut self) -> &mut FrameManager {
299 &mut self.frame_manager
300 }
301
302 pub fn event_listeners_mut(&mut self) -> &mut EventListeners {
304 &mut self.event_listeners
305 }
306
307 pub fn on_response(&mut self, resp: Response, method: &str) {
309 if let Some(cmds) = self.init_state.commands_mut() {
310 cmds.received_response(method);
311 }
312
313 if let GetFrameTreeParams::IDENTIFIER = method {
314 if let Some(resp) = resp
315 .result
316 .and_then(|val| GetFrameTreeParams::response_from_value(val).ok())
317 {
318 self.frame_manager.on_frame_tree(resp.frame_tree);
319 }
320 }
321 }
324
325 pub fn on_event(&mut self, event: CdpEventMessage) {
327 let CdpEventMessage {
328 params,
329 method,
330 session_id,
331 ..
332 } = event;
333
334 let is_session_scoped = matches!(
335 params,
336 CdpEvent::FetchRequestPaused(_)
337 | CdpEvent::FetchAuthRequired(_)
338 | CdpEvent::NetworkRequestWillBeSent(_)
339 | CdpEvent::NetworkResponseReceived(_)
340 | CdpEvent::NetworkLoadingFinished(_)
341 | CdpEvent::NetworkLoadingFailed(_)
342 | CdpEvent::PageFrameAttached(_)
343 | CdpEvent::PageFrameDetached(_)
344 | CdpEvent::PageFrameNavigated(_)
345 | CdpEvent::PageNavigatedWithinDocument(_)
346 | CdpEvent::PageLifecycleEvent(_)
347 | CdpEvent::PageFrameStartedLoading(_)
348 | CdpEvent::PageFrameStoppedLoading(_)
349 | CdpEvent::RuntimeExecutionContextCreated(_)
350 | CdpEvent::RuntimeExecutionContextDestroyed(_)
351 | CdpEvent::RuntimeExecutionContextsCleared(_)
352 | CdpEvent::RuntimeBindingCalled(_)
353 );
354
355 if is_session_scoped {
356 let ev_sid: &str = match session_id.as_deref() {
357 Some(s) => s,
358 None => return,
359 };
360
361 let self_sid: &str = match self.session_id.as_ref() {
362 Some(sid) => sid.as_ref(),
363 None => return,
364 };
365
366 if self_sid != ev_sid {
367 return;
368 }
369 }
370
371 match ¶ms {
372 CdpEvent::PageFrameAttached(ev) => self
374 .frame_manager
375 .on_frame_attached(ev.frame_id.clone(), Some(ev.parent_frame_id.clone())),
376 CdpEvent::PageFrameDetached(ev) => self.frame_manager.on_frame_detached(ev),
377 CdpEvent::PageFrameNavigated(ev) => {
378 self.frame_manager.on_frame_navigated(&ev.frame);
379 }
380 CdpEvent::PageNavigatedWithinDocument(ev) => {
381 self.frame_manager.on_frame_navigated_within_document(ev)
382 }
383 CdpEvent::RuntimeExecutionContextCreated(ev) => {
384 self.frame_manager.on_frame_execution_context_created(ev)
385 }
386 CdpEvent::RuntimeExecutionContextDestroyed(ev) => {
387 self.frame_manager.on_frame_execution_context_destroyed(ev)
388 }
389 CdpEvent::RuntimeExecutionContextsCleared(_) => {
390 self.frame_manager.on_execution_contexts_cleared()
391 }
392 CdpEvent::RuntimeBindingCalled(ev) => {
393 self.frame_manager.on_runtime_binding_called(ev)
395 }
396 CdpEvent::PageLifecycleEvent(ev) => self.frame_manager.on_page_lifecycle_event(ev),
397 CdpEvent::PageFrameStartedLoading(ev) => {
398 self.frame_manager.on_frame_started_loading(ev);
399 }
400 CdpEvent::PageFrameStoppedLoading(ev) => {
401 self.frame_manager.on_frame_stopped_loading(ev);
402 }
403 CdpEvent::TargetAttachedToTarget(ev) => {
405 if ev.waiting_for_debugger {
406 let runtime_cmd = ATTACH_TARGET.clone();
407
408 self.queued_events.push_back(TargetEvent::Request(Request {
409 method: runtime_cmd.0,
410 session_id: Some(ev.session_id.clone().into()),
411 params: runtime_cmd.1,
412 }));
413 }
414
415 if "service_worker" == &ev.target_info.r#type {
416 let detach_command = DetachFromTargetParams::builder()
417 .session_id(ev.session_id.clone())
418 .build();
419
420 let method = detach_command.identifier();
421
422 if let Ok(params) = serde_json::to_value(detach_command) {
423 self.queued_events.push_back(TargetEvent::Request(Request {
424 method,
425 session_id: self.session_id.clone().map(Into::into),
426 params,
427 }));
428 }
429 }
430 }
431 CdpEvent::FetchRequestPaused(ev) => self.network_manager.on_fetch_request_paused(ev),
433 CdpEvent::FetchAuthRequired(ev) => self.network_manager.on_fetch_auth_required(ev),
434 CdpEvent::NetworkRequestWillBeSent(ev) => {
435 self.network_manager.on_request_will_be_sent(ev)
436 }
437 CdpEvent::NetworkRequestServedFromCache(ev) => {
438 self.network_manager.on_request_served_from_cache(ev)
439 }
440 CdpEvent::NetworkResponseReceived(ev) => self.network_manager.on_response_received(ev),
441 CdpEvent::NetworkLoadingFinished(ev) => {
442 self.network_manager.on_network_loading_finished(ev)
443 }
444 CdpEvent::NetworkLoadingFailed(ev) => {
445 self.network_manager.on_network_loading_failed(ev)
446 }
447 _ => (),
448 }
449 chromiumoxide_cdp::consume_event!(match params {
450 |ev| self.event_listeners.start_send(ev),
451 |json| { let _ = self.event_listeners.try_send_custom(&method, json);}
452 });
453 }
454
455 fn on_initialization_failed(&mut self) -> TargetEvent {
457 if let Some(initiator) = self.initiator.take() {
458 let _ = initiator.send(Err(CdpError::Timeout));
459 }
460 self.init_state = TargetInit::Closing;
461 let close_target = CloseTargetParams::new(self.info.target_id.clone());
462
463 TargetEvent::Request(Request {
464 method: close_target.identifier(),
465 session_id: self.session_id.clone().map(Into::into),
466 params: serde_json::to_value(close_target).unwrap_or_default(),
467 })
468 }
469
470 pub(crate) fn poll(&mut self, cx: &mut Context<'_>, now: Instant) -> Option<TargetEvent> {
472 if !self.is_page() {
473 return None;
475 }
476
477 match &mut self.init_state {
478 TargetInit::AttachToTarget => {
479 self.init_state = TargetInit::InitializingFrame(FrameManager::init_commands(
480 self.config.request_timeout,
481 ));
482
483 if let Ok(params) = AttachToTargetParams::builder()
484 .target_id(self.target_id().clone())
485 .flatten(true)
486 .build()
487 {
488 return Some(TargetEvent::Request(Request::new(
489 params.identifier(),
490 serde_json::to_value(params).unwrap_or_default(),
491 )));
492 } else {
493 return None;
494 }
495 }
496 TargetInit::InitializingFrame(cmds) => {
497 self.session_id.as_ref()?;
498 if let Poll::Ready(poll) = cmds.poll(now) {
499 return match poll {
500 None => {
501 if let Some(world_name) = self.frame_manager.get_isolated_world_name() {
502 let world_name = world_name.clone();
503
504 if let Some(isolated_world_cmds) =
505 self.frame_manager.ensure_isolated_world(&world_name)
506 {
507 *cmds = isolated_world_cmds;
508 } else {
509 self.init_state = TargetInit::InitializingNetwork(
510 self.network_manager.init_commands(),
511 );
512 }
513 } else {
514 self.init_state = TargetInit::InitializingNetwork(
515 self.network_manager.init_commands(),
516 );
517 }
518 self.poll(cx, now)
519 }
520 Some(Ok((method, params))) => Some(TargetEvent::Request(Request {
521 method,
522 session_id: self.session_id.clone().map(Into::into),
523 params,
524 })),
525 Some(Err(_)) => Some(self.on_initialization_failed()),
526 };
527 } else {
528 return None;
529 }
530 }
531 TargetInit::InitializingNetwork(cmds) => {
532 advance_state!(
533 self,
534 cx,
535 now,
536 cmds,
537 TargetInit::InitializingPage(Self::page_init_commands(
538 self.config.request_timeout
539 ))
540 );
541 }
542 TargetInit::InitializingPage(cmds) => {
543 advance_state!(
544 self,
545 cx,
546 now,
547 cmds,
548 match self.config.viewport.as_ref() {
549 Some(viewport) => TargetInit::InitializingEmulation(
550 self.emulation_manager.init_commands(viewport)
551 ),
552 None => TargetInit::Initialized,
553 }
554 );
555 }
556 TargetInit::InitializingEmulation(cmds) => {
557 advance_state!(self, cx, now, cmds, TargetInit::Initialized);
558 }
559 TargetInit::Initialized => {
560 if let Some(initiator) = self.initiator.take() {
561 if self
563 .frame_manager
564 .main_frame()
565 .map(|frame| frame.is_loaded())
566 .unwrap_or_default()
567 {
568 if let Some(page) = self.get_or_create_page() {
569 let _ = initiator.send(Ok(page.clone().into()));
570 } else {
571 self.initiator = Some(initiator);
572 }
573 } else {
574 self.initiator = Some(initiator);
575 }
576 }
577 }
578 TargetInit::Closing => return None,
579 };
580
581 loop {
582 if self.init_state == TargetInit::Closing {
583 break None;
584 }
585
586 if let Some(frame) = self.frame_manager.main_frame() {
587 if frame.is_loaded() {
588 while let Some(tx) = self.wait_for_frame_navigation.pop() {
589 let _ = tx.send(frame.http_request().cloned());
590 }
591 }
592
593 if frame.is_network_idle() {
594 while let Some(tx) = self.wait_for_network_idle.pop() {
595 let _ = tx.send(frame.http_request().cloned());
596 }
597 }
598
599 if frame.is_network_almost_idle() {
600 while let Some(tx) = self.wait_for_network_almost_idle.pop() {
601 let _ = tx.send(frame.http_request().cloned());
602 }
603 }
604 }
605
606 if let Some(ev) = self.queued_events.pop_front() {
608 return Some(ev);
609 }
610
611 if let Some(handle) = self.page.as_mut() {
612 while let Poll::Ready(Some(msg)) = Pin::new(&mut handle.rx).poll_next(cx) {
613 if self.init_state == TargetInit::Closing {
614 break;
615 }
616
617 match msg {
618 TargetMessage::Command(cmd) => {
619 if cmd.method == "Network.setBlockedURLs" {
620 if let Some(arr) = cmd.params.get("urls").and_then(|v| v.as_array())
621 {
622 let mut unblock_all = false;
623 let mut block_all = false;
624
625 for s in arr.iter().filter_map(|v| v.as_str()) {
626 if s == "!*" {
627 unblock_all = true;
628 break; }
630 if s.contains('*') {
631 block_all = true;
632 }
633 }
634
635 if unblock_all {
636 self.network_manager.set_block_all(false);
637 } else if block_all {
638 self.network_manager.set_block_all(true);
639 }
640 }
641 }
642 self.queued_events.push_back(TargetEvent::Command(cmd));
643 }
644 TargetMessage::MainFrame(tx) => {
645 let _ =
646 tx.send(self.frame_manager.main_frame().map(|f| f.id().clone()));
647 }
648 TargetMessage::AllFrames(tx) => {
649 let _ = tx.send(
650 self.frame_manager
651 .frames()
652 .map(|f| f.id().clone())
653 .collect(),
654 );
655 }
656 #[cfg(feature = "_cache")]
657 TargetMessage::CacheKey((cache_key, cache_policy)) => {
658 self.network_manager.set_cache_site_key(cache_key);
659 self.network_manager.set_cache_policy(cache_policy);
660 }
661 TargetMessage::Url(req) => {
662 let GetUrl { frame_id, tx } = req;
663 let frame = if let Some(frame_id) = frame_id {
664 self.frame_manager.frame(&frame_id)
665 } else {
666 self.frame_manager.main_frame()
667 };
668 let _ = tx.send(frame.and_then(|f| f.url().map(str::to_string)));
669 }
670 TargetMessage::Name(req) => {
671 let GetName { frame_id, tx } = req;
672 let frame = if let Some(frame_id) = frame_id {
673 self.frame_manager.frame(&frame_id)
674 } else {
675 self.frame_manager.main_frame()
676 };
677 let _ = tx.send(frame.and_then(|f| f.name().map(str::to_string)));
678 }
679 TargetMessage::Parent(req) => {
680 let GetParent { frame_id, tx } = req;
681 let frame = self.frame_manager.frame(&frame_id);
682 let _ = tx.send(frame.and_then(|f| f.parent_id().cloned()));
683 }
684 TargetMessage::WaitForNavigation(tx) => {
685 if let Some(frame) = self.frame_manager.main_frame() {
686 if frame.is_loaded() {
690 let _ = tx.send(frame.http_request().cloned());
691 } else {
692 self.wait_for_frame_navigation.push(tx);
693 }
694 } else {
695 self.wait_for_frame_navigation.push(tx);
696 }
697 }
698 TargetMessage::WaitForNetworkIdle(tx) => {
699 if let Some(frame) = self.frame_manager.main_frame() {
700 if frame.is_network_idle() {
701 let _ = tx.send(frame.http_request().cloned());
702 } else {
703 self.wait_for_network_idle.push(tx);
704 }
705 } else {
706 self.wait_for_network_idle.push(tx);
707 }
708 }
709 TargetMessage::WaitForNetworkAlmostIdle(tx) => {
710 if let Some(frame) = self.frame_manager.main_frame() {
711 if frame.is_network_almost_idle() {
712 let _ = tx.send(frame.http_request().cloned());
713 } else {
714 self.wait_for_network_almost_idle.push(tx);
715 }
716 } else {
717 self.wait_for_network_almost_idle.push(tx);
718 }
719 }
720 TargetMessage::AddEventListener(req) => {
721 if req.method == "Fetch.requestPaused" {
722 self.network_manager.enable_request_intercept();
723 }
724 self.event_listeners.add_listener(req);
726 }
727 TargetMessage::GetExecutionContext(ctx) => {
728 let GetExecutionContext {
729 dom_world,
730 frame_id,
731 tx,
732 } = ctx;
733 let frame = if let Some(frame_id) = frame_id {
734 self.frame_manager.frame(&frame_id)
735 } else {
736 self.frame_manager.main_frame()
737 };
738
739 if let Some(frame) = frame {
740 match dom_world {
741 DOMWorldKind::Main => {
742 let _ = tx.send(frame.main_world().execution_context());
743 }
744 DOMWorldKind::Secondary => {
745 let _ =
746 tx.send(frame.secondary_world().execution_context());
747 }
748 }
749 } else {
750 let _ = tx.send(None);
751 }
752 }
753 TargetMessage::Authenticate(credentials) => {
754 self.network_manager.authenticate(credentials);
755 }
756 TargetMessage::BlockNetwork(blocked) => {
757 self.network_manager.set_block_all(blocked);
758 }
759 TargetMessage::EnableInterception(enabled) => {
760 self.network_manager.user_request_interception_enabled = !enabled;
762 }
763 }
764 }
765 }
766
767 while let Some(event) = self.network_manager.poll() {
768 if self.init_state == TargetInit::Closing {
769 break;
770 }
771 match event {
772 NetworkEvent::SendCdpRequest((method, params)) => {
773 self.queued_events.push_back(TargetEvent::Request(Request {
775 method,
776 session_id: self.session_id.clone().map(Into::into),
777 params,
778 }))
779 }
780 NetworkEvent::Request(_) => {}
781 NetworkEvent::Response(_) => {}
782 NetworkEvent::RequestFailed(request) => {
783 self.frame_manager.on_http_request_finished(request);
784 }
785 NetworkEvent::RequestFinished(request) => {
786 self.frame_manager.on_http_request_finished(request);
787 }
788 NetworkEvent::BytesConsumed(n) => {
789 self.queued_events.push_back(TargetEvent::BytesConsumed(n));
790 }
791 }
792 }
793
794 while let Some(event) = self.frame_manager.poll(now) {
795 if self.init_state == TargetInit::Closing {
796 break;
797 }
798 match event {
799 FrameEvent::NavigationResult(res) => {
800 self.queued_events
801 .push_back(TargetEvent::NavigationResult(res));
802 }
803 FrameEvent::NavigationRequest(id, req) => {
804 self.queued_events
805 .push_back(TargetEvent::NavigationRequest(id, req));
806 }
807 }
808 }
809
810 if self.queued_events.is_empty() {
811 return None;
812 }
813 }
814 }
815
816 pub fn set_initiator(&mut self, tx: Sender<Result<Page>>) {
819 self.initiator = Some(tx);
820 }
821
822 pub(crate) fn page_init_commands(timeout: Duration) -> CommandChain {
823 CommandChain::new(INIT_COMMANDS_PARAMS.clone(), timeout)
824 }
825}
826
827#[derive(Debug, Clone)]
829pub struct TargetConfig {
830 pub ignore_https_errors: bool,
833 pub request_timeout: Duration,
836 pub viewport: Option<Viewport>,
839 pub request_intercept: bool,
842 pub cache_enabled: bool,
845 pub ignore_visuals: bool,
848 pub ignore_javascript: bool,
851 pub ignore_analytics: bool,
854 pub ignore_stylesheets: bool,
857 pub only_html: bool,
860 pub service_worker_enabled: bool,
863 pub extra_headers: Option<std::collections::HashMap<String, String>>,
866 pub intercept_manager: NetworkInterceptManager,
869 pub max_bytes_allowed: Option<u64>,
872 pub whitelist_patterns: Option<Vec<String>>,
874 pub blacklist_patterns: Option<Vec<String>>,
876}
877
878impl Default for TargetConfig {
879 fn default() -> Self {
880 Self {
881 ignore_https_errors: true,
882 request_timeout: Duration::from_secs(REQUEST_TIMEOUT),
883 viewport: Default::default(),
884 request_intercept: false,
885 cache_enabled: true,
886 service_worker_enabled: true,
887 ignore_javascript: false,
888 ignore_visuals: false,
889 ignore_stylesheets: false,
890 ignore_analytics: true,
891 only_html: false,
892 extra_headers: Default::default(),
893 intercept_manager: NetworkInterceptManager::Unknown,
894 max_bytes_allowed: None,
895 whitelist_patterns: None,
896 blacklist_patterns: None,
897 }
898 }
899}
900
901#[derive(Debug, Clone, Eq, PartialEq)]
902pub enum TargetType {
903 Page,
904 BackgroundPage,
905 ServiceWorker,
906 SharedWorker,
907 Other,
908 Browser,
909 Webview,
910 Unknown(String),
911}
912
913impl TargetType {
914 pub fn new(ty: &str) -> Self {
915 match ty {
916 "page" => TargetType::Page,
917 "background_page" => TargetType::BackgroundPage,
918 "service_worker" => TargetType::ServiceWorker,
919 "shared_worker" => TargetType::SharedWorker,
920 "other" => TargetType::Other,
921 "browser" => TargetType::Browser,
922 "webview" => TargetType::Webview,
923 s => TargetType::Unknown(s.to_string()),
924 }
925 }
926
927 pub fn is_page(&self) -> bool {
928 matches!(self, TargetType::Page)
929 }
930
931 pub fn is_background_page(&self) -> bool {
932 matches!(self, TargetType::BackgroundPage)
933 }
934
935 pub fn is_service_worker(&self) -> bool {
936 matches!(self, TargetType::ServiceWorker)
937 }
938
939 pub fn is_shared_worker(&self) -> bool {
940 matches!(self, TargetType::SharedWorker)
941 }
942
943 pub fn is_other(&self) -> bool {
944 matches!(self, TargetType::Other)
945 }
946
947 pub fn is_browser(&self) -> bool {
948 matches!(self, TargetType::Browser)
949 }
950
951 pub fn is_webview(&self) -> bool {
952 matches!(self, TargetType::Webview)
953 }
954}
955
956#[derive(Debug)]
957pub(crate) enum TargetEvent {
958 Request(Request),
960 NavigationRequest(NavigationId, Request),
962 NavigationResult(Result<NavigationOk, NavigationError>),
964 Command(CommandMessage),
966 BytesConsumed(u64),
968}
969
970#[derive(Debug, PartialEq)]
972pub enum TargetInit {
973 InitializingFrame(CommandChain),
974 InitializingNetwork(CommandChain),
975 InitializingPage(CommandChain),
976 InitializingEmulation(CommandChain),
977 AttachToTarget,
978 Initialized,
979 Closing,
980}
981
982impl TargetInit {
983 fn commands_mut(&mut self) -> Option<&mut CommandChain> {
984 match self {
985 TargetInit::InitializingFrame(cmd) => Some(cmd),
986 TargetInit::InitializingNetwork(cmd) => Some(cmd),
987 TargetInit::InitializingPage(cmd) => Some(cmd),
988 TargetInit::InitializingEmulation(cmd) => Some(cmd),
989 TargetInit::AttachToTarget => None,
990 TargetInit::Initialized => None,
991 TargetInit::Closing => None,
992 }
993 }
994}
995
996#[derive(Debug)]
997pub struct GetExecutionContext {
998 pub dom_world: DOMWorldKind,
1000 pub frame_id: Option<FrameId>,
1002 pub tx: Sender<Option<ExecutionContextId>>,
1004}
1005
1006impl GetExecutionContext {
1007 pub fn new(tx: Sender<Option<ExecutionContextId>>) -> Self {
1008 Self {
1009 dom_world: DOMWorldKind::Main,
1010 frame_id: None,
1011 tx,
1012 }
1013 }
1014}
1015
1016#[derive(Debug)]
1017pub struct GetUrl {
1018 pub frame_id: Option<FrameId>,
1020 pub tx: Sender<Option<String>>,
1022}
1023
1024impl GetUrl {
1025 pub fn new(tx: Sender<Option<String>>) -> Self {
1026 Self { frame_id: None, tx }
1027 }
1028}
1029
1030#[derive(Debug)]
1031pub struct GetName {
1032 pub frame_id: Option<FrameId>,
1034 pub tx: Sender<Option<String>>,
1036}
1037
1038#[derive(Debug)]
1039pub struct GetParent {
1040 pub frame_id: FrameId,
1042 pub tx: Sender<Option<FrameId>>,
1044}
1045
1046#[derive(Debug)]
1047pub enum TargetMessage {
1048 Command(CommandMessage),
1050 MainFrame(Sender<Option<FrameId>>),
1052 AllFrames(Sender<Vec<FrameId>>),
1054 #[cfg(feature = "_cache")]
1055 CacheKey((Option<String>, Option<crate::cache::BasicCachePolicy>)),
1057 Url(GetUrl),
1059 Name(GetName),
1061 Parent(GetParent),
1063 WaitForNavigation(Sender<ArcHttpRequest>),
1065 WaitForNetworkIdle(Sender<ArcHttpRequest>),
1067 WaitForNetworkAlmostIdle(Sender<ArcHttpRequest>),
1069 AddEventListener(EventListenerRequest),
1072 GetExecutionContext(GetExecutionContext),
1074 Authenticate(Credentials),
1075 BlockNetwork(bool),
1077 EnableInterception(bool),
1079}