chromiumoxide/handler/
target.rs

1use std::collections::VecDeque;
2use std::pin::Pin;
3use std::sync::Arc;
4use std::time::Instant;
5
6use chromiumoxide_cdp::cdp::browser_protocol::target::DetachFromTargetParams;
7use futures::channel::oneshot::Sender;
8use futures::stream::Stream;
9use futures::task::{Context, Poll};
10
11use chromiumoxide_cdp::cdp::browser_protocol::page::{FrameId, GetFrameTreeParams};
12use chromiumoxide_cdp::cdp::browser_protocol::{
13    browser::BrowserContextId,
14    log as cdplog, performance,
15    target::{AttachToTargetParams, SessionId, SetAutoAttachParams, TargetId, TargetInfo},
16};
17use chromiumoxide_cdp::cdp::events::CdpEvent;
18use chromiumoxide_cdp::cdp::CdpEventMessage;
19use chromiumoxide_types::{Command, Method, Request, Response};
20
21use super::blockers::intercept_manager::NetworkInterceptManager;
22use crate::auth::Credentials;
23use crate::cdp::browser_protocol::target::CloseTargetParams;
24use crate::cmd::CommandChain;
25use crate::cmd::CommandMessage;
26use crate::error::{CdpError, Result};
27use crate::handler::browser::BrowserContext;
28use crate::handler::domworld::DOMWorldKind;
29use crate::handler::emulation::EmulationManager;
30use crate::handler::frame::FrameRequestedNavigation;
31use crate::handler::frame::{
32    FrameEvent, FrameManager, NavigationError, NavigationId, NavigationOk,
33};
34use crate::handler::network::{NetworkEvent, NetworkManager};
35use crate::handler::page::PageHandle;
36use crate::handler::viewport::Viewport;
37use crate::handler::{PageInner, REQUEST_TIMEOUT};
38use crate::listeners::{EventListenerRequest, EventListeners};
39use crate::{page::Page, ArcHttpRequest};
40use chromiumoxide_cdp::cdp::js_protocol::runtime::{
41    ExecutionContextId, RunIfWaitingForDebuggerParams,
42};
43use std::time::Duration;
44
45macro_rules! advance_state {
46    ($s:ident, $cx:ident, $now:ident, $cmds: ident, $next_state:expr ) => {{
47        if let Poll::Ready(poll) = $cmds.poll($now) {
48            return match poll {
49                None => {
50                    $s.init_state = $next_state;
51                    $s.poll($cx, $now)
52                }
53                Some(Ok((method, params))) => Some(TargetEvent::Request(Request {
54                    method,
55                    session_id: $s.session_id.clone().map(Into::into),
56                    params,
57                })),
58                Some(Err(_)) => Some($s.on_initialization_failed()),
59            };
60        } else {
61            return None;
62        }
63    }};
64}
65
66lazy_static::lazy_static! {
67    /// Initial start command params.
68    static ref INIT_COMMANDS_PARAMS: Vec<(chromiumoxide_types::MethodId, serde_json::Value)> = {
69        let attach = SetAutoAttachParams::builder()
70            .flatten(true)
71            .auto_attach(true)
72            .wait_for_debugger_on_start(true)
73            .build()
74            .unwrap();
75        let enable_performance = performance::EnableParams::default();
76        let disable_log = cdplog::DisableParams::default();
77
78        vec![
79                (
80                    attach.identifier(),
81                    serde_json::to_value(attach).unwrap_or_default(),
82                ),
83                (
84                    enable_performance.identifier(),
85                    serde_json::to_value(enable_performance).unwrap_or_default(),
86                ),
87                (
88                    disable_log.identifier(),
89                    serde_json::to_value(disable_log).unwrap_or_default(),
90                )
91            ]
92    };
93
94    /// Attach to target commands
95    static ref ATTACH_TARGET: (chromiumoxide_types::MethodId, serde_json::Value) = {
96        let runtime_cmd = RunIfWaitingForDebuggerParams::default();
97
98        (runtime_cmd.identifier(), serde_json::to_value(runtime_cmd).unwrap_or_default())
99    };
100}
101
102#[derive(Debug)]
103pub struct Target {
104    /// Info about this target as returned from the chromium instance
105    info: TargetInfo,
106    /// The type of this target
107    r#type: TargetType,
108    /// Configs for this target
109    config: TargetConfig,
110    /// The context this target is running in
111    browser_context: BrowserContext,
112    /// The frame manager that maintains the state of all frames and handles
113    /// navigations of frames
114    frame_manager: FrameManager,
115    /// Handles all the https
116    network_manager: NetworkManager,
117    emulation_manager: EmulationManager,
118    /// The identifier of the session this target is attached to
119    session_id: Option<SessionId>,
120    /// The handle of the browser page of this target
121    page: Option<PageHandle>,
122    /// Drives this target towards initialization
123    pub(crate) init_state: TargetInit,
124    /// Currently queued events to report to the `Handler`
125    queued_events: VecDeque<TargetEvent>,
126    /// All registered event subscriptions
127    event_listeners: EventListeners,
128    /// Senders that need to be notified once the main frame has loaded
129    wait_for_frame_navigation: Vec<Sender<ArcHttpRequest>>,
130    /// The sender who requested the page.
131    initiator: Option<Sender<Result<Page>>>,
132}
133
134impl Target {
135    /// Create a new target instance with `TargetInfo` after a
136    /// `CreateTargetParams` request.
137    pub fn new(info: TargetInfo, config: TargetConfig, browser_context: BrowserContext) -> Self {
138        let ty = TargetType::new(&info.r#type);
139        let request_timeout = config.request_timeout;
140        let mut network_manager = NetworkManager::new(config.ignore_https_errors, request_timeout);
141
142        if !config.cache_enabled {
143            network_manager.set_cache_enabled(false);
144        }
145
146        if !config.service_worker_enabled {
147            network_manager.set_service_worker_enabled(true);
148        }
149
150        network_manager.set_request_interception(config.request_intercept);
151
152        if let Some(ref headers) = config.extra_headers {
153            network_manager.set_extra_headers(headers.clone());
154        }
155
156        network_manager.ignore_visuals = config.ignore_visuals;
157        network_manager.block_javascript = config.ignore_javascript;
158        network_manager.block_analytics = config.ignore_analytics;
159        network_manager.block_stylesheets = config.ignore_stylesheets;
160        network_manager.only_html = config.only_html;
161        network_manager.intercept_manager = config.intercept_manager;
162
163        Self {
164            info,
165            r#type: ty,
166            config,
167            frame_manager: FrameManager::new(request_timeout),
168            network_manager,
169            emulation_manager: EmulationManager::new(request_timeout),
170            session_id: None,
171            page: None,
172            init_state: TargetInit::AttachToTarget,
173            wait_for_frame_navigation: Default::default(),
174            queued_events: Default::default(),
175            event_listeners: Default::default(),
176            initiator: None,
177            browser_context,
178        }
179    }
180
181    pub fn set_session_id(&mut self, id: SessionId) {
182        self.session_id = Some(id)
183    }
184
185    pub fn session_id(&self) -> Option<&SessionId> {
186        self.session_id.as_ref()
187    }
188
189    pub fn browser_context(&self) -> &BrowserContext {
190        &self.browser_context
191    }
192
193    pub fn session_id_mut(&mut self) -> &mut Option<SessionId> {
194        &mut self.session_id
195    }
196
197    /// The identifier for this target
198    pub fn target_id(&self) -> &TargetId {
199        &self.info.target_id
200    }
201
202    /// The type of this target
203    pub fn r#type(&self) -> &TargetType {
204        &self.r#type
205    }
206
207    /// Whether this target is already initialized
208    pub fn is_initialized(&self) -> bool {
209        matches!(self.init_state, TargetInit::Initialized)
210    }
211
212    /// Navigate a frame
213    pub fn goto(&mut self, req: FrameRequestedNavigation) {
214        self.frame_manager.goto(req)
215    }
216
217    fn create_page(&mut self) {
218        if self.page.is_none() {
219            if let Some(session) = self.session_id.clone() {
220                let handle =
221                    PageHandle::new(self.target_id().clone(), session, self.opener_id().cloned());
222                self.page = Some(handle);
223            }
224        }
225    }
226
227    /// Tries to create the `PageInner` if this target is already initialized
228    pub(crate) fn get_or_create_page(&mut self) -> Option<&Arc<PageInner>> {
229        self.create_page();
230        self.page.as_ref().map(|p| p.inner())
231    }
232
233    pub fn is_page(&self) -> bool {
234        self.r#type().is_page()
235    }
236
237    pub fn browser_context_id(&self) -> Option<&BrowserContextId> {
238        self.info.browser_context_id.as_ref()
239    }
240
241    pub fn info(&self) -> &TargetInfo {
242        &self.info
243    }
244
245    /// Get the target that opened this target. Top-level targets return `None`.
246    pub fn opener_id(&self) -> Option<&TargetId> {
247        self.info.opener_id.as_ref()
248    }
249
250    pub fn frame_manager(&self) -> &FrameManager {
251        &self.frame_manager
252    }
253
254    pub fn frame_manager_mut(&mut self) -> &mut FrameManager {
255        &mut self.frame_manager
256    }
257
258    pub fn event_listeners_mut(&mut self) -> &mut EventListeners {
259        &mut self.event_listeners
260    }
261
262    /// Received a response to a command issued by this target
263    pub fn on_response(&mut self, resp: Response, method: &str) {
264        if let Some(cmds) = self.init_state.commands_mut() {
265            cmds.received_response(method);
266        }
267
268        if let GetFrameTreeParams::IDENTIFIER = method {
269            if let Some(resp) = resp
270                .result
271                .and_then(|val| GetFrameTreeParams::response_from_value(val).ok())
272            {
273                self.frame_manager.on_frame_tree(resp.frame_tree);
274            }
275        }
276        // requests originated from the network manager all return an empty response, hence they
277        // can be ignored here
278    }
279
280    pub fn on_event(&mut self, event: CdpEventMessage) {
281        let CdpEventMessage { params, method, .. } = event;
282
283        match &params {
284            // `FrameManager` events
285            CdpEvent::PageFrameAttached(ev) => self
286                .frame_manager
287                .on_frame_attached(ev.frame_id.clone(), Some(ev.parent_frame_id.clone())),
288            CdpEvent::PageFrameDetached(ev) => self.frame_manager.on_frame_detached(ev),
289            CdpEvent::PageFrameNavigated(ev) => self.frame_manager.on_frame_navigated(&ev.frame),
290            CdpEvent::PageNavigatedWithinDocument(ev) => {
291                self.frame_manager.on_frame_navigated_within_document(ev)
292            }
293            CdpEvent::RuntimeExecutionContextCreated(ev) => {
294                self.frame_manager.on_frame_execution_context_created(ev)
295            }
296            CdpEvent::RuntimeExecutionContextDestroyed(ev) => {
297                self.frame_manager.on_frame_execution_context_destroyed(ev)
298            }
299            CdpEvent::RuntimeExecutionContextsCleared(_) => {
300                self.frame_manager.on_execution_contexts_cleared()
301            }
302            CdpEvent::RuntimeBindingCalled(ev) => {
303                // TODO check if binding registered and payload is json
304                self.frame_manager.on_runtime_binding_called(ev)
305            }
306            CdpEvent::PageLifecycleEvent(ev) => self.frame_manager.on_page_lifecycle_event(ev),
307            CdpEvent::PageFrameStartedLoading(ev) => {
308                self.frame_manager.on_frame_started_loading(ev);
309            }
310            CdpEvent::PageFrameStoppedLoading(ev) => {
311                self.frame_manager.on_frame_stopped_loading(ev);
312            }
313            // `Target` events
314            CdpEvent::TargetAttachedToTarget(ev) => {
315                if ev.waiting_for_debugger {
316                    let runtime_cmd = ATTACH_TARGET.clone();
317
318                    self.queued_events.push_back(TargetEvent::Request(Request {
319                        method: runtime_cmd.0,
320                        session_id: Some(ev.session_id.clone().into()),
321                        params: runtime_cmd.1,
322                    }));
323                }
324
325                if "service_worker" == &ev.target_info.r#type {
326                    let detach_command = DetachFromTargetParams::builder()
327                        .session_id(ev.session_id.clone())
328                        .build();
329
330                    self.queued_events.push_back(TargetEvent::Request(Request {
331                        method: detach_command.identifier(),
332                        session_id: self.session_id.clone().map(Into::into),
333                        params: serde_json::to_value(detach_command).unwrap_or_default(),
334                    }));
335                }
336            }
337
338            // `NetworkManager` events
339            CdpEvent::FetchRequestPaused(ev) => self.network_manager.on_fetch_request_paused(ev),
340            CdpEvent::FetchAuthRequired(ev) => self.network_manager.on_fetch_auth_required(ev),
341            CdpEvent::NetworkRequestWillBeSent(ev) => {
342                self.network_manager.on_request_will_be_sent(ev)
343            }
344            CdpEvent::NetworkRequestServedFromCache(ev) => {
345                self.network_manager.on_request_served_from_cache(ev)
346            }
347            CdpEvent::NetworkResponseReceived(ev) => self.network_manager.on_response_received(ev),
348            CdpEvent::NetworkLoadingFinished(ev) => {
349                self.network_manager.on_network_loading_finished(ev)
350            }
351            CdpEvent::NetworkLoadingFailed(ev) => {
352                self.network_manager.on_network_loading_failed(ev)
353            }
354            _ => (),
355        }
356        chromiumoxide_cdp::consume_event!(match params {
357           |ev| self.event_listeners.start_send(ev),
358           |json| { let _ = self.event_listeners.try_send_custom(&method, json);}
359        });
360    }
361
362    /// Called when a init command timed out
363    fn on_initialization_failed(&mut self) -> TargetEvent {
364        if let Some(initiator) = self.initiator.take() {
365            let _ = initiator.send(Err(CdpError::Timeout));
366        }
367        self.init_state = TargetInit::Closing;
368        let close_target = CloseTargetParams::new(self.info.target_id.clone());
369        TargetEvent::Request(Request {
370            method: close_target.identifier(),
371            session_id: self.session_id.clone().map(Into::into),
372            params: serde_json::to_value(close_target).unwrap_or_default(),
373        })
374    }
375
376    /// Advance that target's state
377    pub(crate) fn poll(&mut self, cx: &mut Context<'_>, now: Instant) -> Option<TargetEvent> {
378        if !self.is_page() {
379            // can only poll pages
380            return None;
381        }
382
383        match &mut self.init_state {
384            TargetInit::AttachToTarget => {
385                self.init_state = TargetInit::InitializingFrame(FrameManager::init_commands(
386                    self.config.request_timeout,
387                ));
388
389                if let Ok(params) = AttachToTargetParams::builder()
390                    .target_id(self.target_id().clone())
391                    .flatten(true)
392                    .build()
393                {
394                    return Some(TargetEvent::Request(Request::new(
395                        params.identifier(),
396                        serde_json::to_value(params).unwrap_or_default(),
397                    )));
398                } else {
399                    return None;
400                }
401            }
402            TargetInit::InitializingFrame(cmds) => {
403                self.session_id.as_ref()?;
404                if let Poll::Ready(poll) = cmds.poll(now) {
405                    return match poll {
406                        None => {
407                            if let Some(world_name) = self.frame_manager.get_isolated_world_name() {
408                                let world_name = world_name.clone();
409
410                                if let Some(isolated_world_cmds) =
411                                    self.frame_manager.ensure_isolated_world(&world_name)
412                                {
413                                    *cmds = isolated_world_cmds;
414                                } else {
415                                    self.init_state = TargetInit::InitializingNetwork(
416                                        self.network_manager.init_commands(),
417                                    );
418                                }
419                            } else {
420                                self.init_state = TargetInit::InitializingNetwork(
421                                    self.network_manager.init_commands(),
422                                );
423                            }
424
425                            self.poll(cx, now)
426                        }
427                        Some(Ok((method, params))) => Some(TargetEvent::Request(Request {
428                            method,
429                            session_id: self.session_id.clone().map(Into::into),
430                            params,
431                        })),
432                        Some(Err(_)) => Some(self.on_initialization_failed()),
433                    };
434                } else {
435                    return None;
436                }
437            }
438            TargetInit::InitializingNetwork(cmds) => {
439                advance_state!(
440                    self,
441                    cx,
442                    now,
443                    cmds,
444                    TargetInit::InitializingPage(Self::page_init_commands(
445                        self.config.request_timeout
446                    ))
447                );
448            }
449            TargetInit::InitializingPage(cmds) => {
450                advance_state!(
451                    self,
452                    cx,
453                    now,
454                    cmds,
455                    match self.config.viewport.as_ref() {
456                        Some(viewport) => TargetInit::InitializingEmulation(
457                            self.emulation_manager.init_commands(viewport)
458                        ),
459                        None => TargetInit::Initialized,
460                    }
461                );
462            }
463            TargetInit::InitializingEmulation(cmds) => {
464                advance_state!(self, cx, now, cmds, TargetInit::Initialized);
465            }
466            TargetInit::Initialized => {
467                if let Some(initiator) = self.initiator.take() {
468                    // make sure that the main frame of the page has finished loading
469                    if self
470                        .frame_manager
471                        .main_frame()
472                        .map(|frame| frame.is_loaded())
473                        .unwrap_or_default()
474                    {
475                        if let Some(page) = self.get_or_create_page() {
476                            let _ = initiator.send(Ok(page.clone().into()));
477                        } else {
478                            self.initiator = Some(initiator);
479                        }
480                    } else {
481                        self.initiator = Some(initiator);
482                    }
483                }
484            }
485            TargetInit::Closing => return None,
486        };
487
488        loop {
489            if self.init_state == TargetInit::Closing {
490                break None;
491            }
492
493            if let Some(frame) = self.frame_manager.main_frame() {
494                if frame.is_loaded() {
495                    while let Some(tx) = self.wait_for_frame_navigation.pop() {
496                        let _ = tx.send(frame.http_request().cloned());
497                    }
498                }
499            }
500
501            // Drain queued messages first.
502            if let Some(ev) = self.queued_events.pop_front() {
503                return Some(ev);
504            }
505
506            if let Some(handle) = self.page.as_mut() {
507                while let Poll::Ready(Some(msg)) = Pin::new(&mut handle.rx).poll_next(cx) {
508                    if self.init_state == TargetInit::Closing {
509                        break;
510                    }
511
512                    match msg {
513                        TargetMessage::Command(cmd) => {
514                            self.queued_events.push_back(TargetEvent::Command(cmd));
515                        }
516                        TargetMessage::MainFrame(tx) => {
517                            let _ =
518                                tx.send(self.frame_manager.main_frame().map(|f| f.id().clone()));
519                        }
520                        TargetMessage::AllFrames(tx) => {
521                            let _ = tx.send(
522                                self.frame_manager
523                                    .frames()
524                                    .map(|f| f.id().clone())
525                                    .collect(),
526                            );
527                        }
528                        TargetMessage::Url(req) => {
529                            let GetUrl { frame_id, tx } = req;
530                            let frame = if let Some(frame_id) = frame_id {
531                                self.frame_manager.frame(&frame_id)
532                            } else {
533                                self.frame_manager.main_frame()
534                            };
535                            let _ = tx.send(frame.and_then(|f| f.url().map(str::to_string)));
536                        }
537                        TargetMessage::Name(req) => {
538                            let GetName { frame_id, tx } = req;
539                            let frame = if let Some(frame_id) = frame_id {
540                                self.frame_manager.frame(&frame_id)
541                            } else {
542                                self.frame_manager.main_frame()
543                            };
544                            let _ = tx.send(frame.and_then(|f| f.name().map(str::to_string)));
545                        }
546                        TargetMessage::Parent(req) => {
547                            let GetParent { frame_id, tx } = req;
548                            let frame = self.frame_manager.frame(&frame_id);
549                            let _ = tx.send(frame.and_then(|f| f.parent_id().cloned()));
550                        }
551                        TargetMessage::WaitForNavigation(tx) => {
552                            if let Some(frame) = self.frame_manager.main_frame() {
553                                // TODO submit a navigation watcher: waitForFrameNavigation
554
555                                // TODO return the watchers navigationResponse
556                                if frame.is_loaded() {
557                                    let _ = tx.send(frame.http_request().cloned());
558                                } else {
559                                    self.wait_for_frame_navigation.push(tx);
560                                }
561                            } else {
562                                self.wait_for_frame_navigation.push(tx);
563                            }
564                        }
565                        TargetMessage::AddEventListener(req) => {
566                            if req.method == "Fetch.requestPaused" {
567                                self.network_manager.disable_request_intercept();
568                            }
569                            // register a new listener
570                            self.event_listeners.add_listener(req);
571                        }
572                        TargetMessage::GetExecutionContext(ctx) => {
573                            let GetExecutionContext {
574                                dom_world,
575                                frame_id,
576                                tx,
577                            } = ctx;
578                            let frame = if let Some(frame_id) = frame_id {
579                                self.frame_manager.frame(&frame_id)
580                            } else {
581                                self.frame_manager.main_frame()
582                            };
583
584                            if let Some(frame) = frame {
585                                match dom_world {
586                                    DOMWorldKind::Main => {
587                                        let _ = tx.send(frame.main_world().execution_context());
588                                    }
589                                    DOMWorldKind::Secondary => {
590                                        let _ =
591                                            tx.send(frame.secondary_world().execution_context());
592                                    }
593                                }
594                            } else {
595                                let _ = tx.send(None);
596                            }
597                        }
598                        TargetMessage::Authenticate(credentials) => {
599                            self.network_manager.authenticate(credentials);
600                        }
601                    }
602                }
603            }
604
605            while let Some(event) = self.network_manager.poll() {
606                if self.init_state == TargetInit::Closing {
607                    break;
608                }
609                match event {
610                    NetworkEvent::SendCdpRequest((method, params)) => {
611                        // send a message to the browser
612                        self.queued_events.push_back(TargetEvent::Request(Request {
613                            method,
614                            session_id: self.session_id.clone().map(Into::into),
615                            params,
616                        }))
617                    }
618                    NetworkEvent::Request(_) => {}
619                    NetworkEvent::Response(_) => {}
620                    NetworkEvent::RequestFailed(request) => {
621                        self.frame_manager.on_http_request_finished(request);
622                    }
623                    NetworkEvent::RequestFinished(request) => {
624                        self.frame_manager.on_http_request_finished(request);
625                    }
626                }
627            }
628
629            while let Some(event) = self.frame_manager.poll(now) {
630                if self.init_state == TargetInit::Closing {
631                    break;
632                }
633                match event {
634                    FrameEvent::NavigationResult(res) => {
635                        self.queued_events
636                            .push_back(TargetEvent::NavigationResult(res));
637                    }
638                    FrameEvent::NavigationRequest(id, req) => {
639                        self.queued_events
640                            .push_back(TargetEvent::NavigationRequest(id, req));
641                    }
642                }
643            }
644
645            if self.queued_events.is_empty() {
646                return None;
647            }
648        }
649    }
650
651    /// Set the sender half of the channel who requested the creation of this
652    /// target
653    pub fn set_initiator(&mut self, tx: Sender<Result<Page>>) {
654        self.initiator = Some(tx);
655    }
656
657    pub(crate) fn page_init_commands(timeout: Duration) -> CommandChain {
658        CommandChain::new(INIT_COMMANDS_PARAMS.clone(), timeout)
659    }
660}
661
662#[derive(Debug, Clone)]
663pub struct TargetConfig {
664    pub ignore_https_errors: bool,
665    ///  Request timeout to use
666    pub request_timeout: Duration,
667    pub viewport: Option<Viewport>,
668    pub request_intercept: bool,
669    pub cache_enabled: bool,
670    pub ignore_visuals: bool,
671    pub ignore_javascript: bool,
672    pub ignore_analytics: bool,
673    pub ignore_stylesheets: bool,
674    pub only_html: bool,
675    pub service_worker_enabled: bool,
676    pub extra_headers: Option<std::collections::HashMap<String, String>>,
677    pub intercept_manager: NetworkInterceptManager,
678}
679
680impl Default for TargetConfig {
681    fn default() -> Self {
682        Self {
683            ignore_https_errors: true,
684            request_timeout: Duration::from_secs(REQUEST_TIMEOUT),
685            viewport: Default::default(),
686            request_intercept: false,
687            cache_enabled: true,
688            service_worker_enabled: true,
689            ignore_javascript: false,
690            ignore_visuals: false,
691            ignore_stylesheets: false,
692            ignore_analytics: true,
693            only_html: false,
694            extra_headers: Default::default(),
695            intercept_manager: NetworkInterceptManager::Unknown,
696        }
697    }
698}
699
700#[derive(Debug, Clone, Eq, PartialEq)]
701pub enum TargetType {
702    Page,
703    BackgroundPage,
704    ServiceWorker,
705    SharedWorker,
706    Other,
707    Browser,
708    Webview,
709    Unknown(String),
710}
711
712impl TargetType {
713    pub fn new(ty: &str) -> Self {
714        match ty {
715            "page" => TargetType::Page,
716            "background_page" => TargetType::BackgroundPage,
717            "service_worker" => TargetType::ServiceWorker,
718            "shared_worker" => TargetType::SharedWorker,
719            "other" => TargetType::Other,
720            "browser" => TargetType::Browser,
721            "webview" => TargetType::Webview,
722            s => TargetType::Unknown(s.to_string()),
723        }
724    }
725
726    pub fn is_page(&self) -> bool {
727        matches!(self, TargetType::Page)
728    }
729
730    pub fn is_background_page(&self) -> bool {
731        matches!(self, TargetType::BackgroundPage)
732    }
733
734    pub fn is_service_worker(&self) -> bool {
735        matches!(self, TargetType::ServiceWorker)
736    }
737
738    pub fn is_shared_worker(&self) -> bool {
739        matches!(self, TargetType::SharedWorker)
740    }
741
742    pub fn is_other(&self) -> bool {
743        matches!(self, TargetType::Other)
744    }
745
746    pub fn is_browser(&self) -> bool {
747        matches!(self, TargetType::Browser)
748    }
749
750    pub fn is_webview(&self) -> bool {
751        matches!(self, TargetType::Webview)
752    }
753}
754
755#[derive(Debug)]
756pub(crate) enum TargetEvent {
757    /// An internal request
758    Request(Request),
759    /// An internal navigation request
760    NavigationRequest(NavigationId, Request),
761    /// Indicates that a previous requested navigation has finished
762    NavigationResult(Result<NavigationOk, NavigationError>),
763    /// A new command arrived via a channel
764    Command(CommandMessage),
765}
766
767// TODO this can be moved into the classes?
768#[derive(Debug, PartialEq)]
769pub enum TargetInit {
770    InitializingFrame(CommandChain),
771    InitializingNetwork(CommandChain),
772    InitializingPage(CommandChain),
773    InitializingEmulation(CommandChain),
774    AttachToTarget,
775    Initialized,
776    Closing,
777}
778
779impl TargetInit {
780    fn commands_mut(&mut self) -> Option<&mut CommandChain> {
781        match self {
782            TargetInit::InitializingFrame(cmd) => Some(cmd),
783            TargetInit::InitializingNetwork(cmd) => Some(cmd),
784            TargetInit::InitializingPage(cmd) => Some(cmd),
785            TargetInit::InitializingEmulation(cmd) => Some(cmd),
786            TargetInit::AttachToTarget => None,
787            TargetInit::Initialized => None,
788            TargetInit::Closing => None,
789        }
790    }
791}
792
793#[derive(Debug)]
794pub struct GetExecutionContext {
795    /// For which world the execution context was requested
796    pub dom_world: DOMWorldKind,
797    /// The if of the frame to get the `ExecutionContext` for
798    pub frame_id: Option<FrameId>,
799    /// Sender half of the channel to send the response back
800    pub tx: Sender<Option<ExecutionContextId>>,
801}
802
803impl GetExecutionContext {
804    pub fn new(tx: Sender<Option<ExecutionContextId>>) -> Self {
805        Self {
806            dom_world: DOMWorldKind::Main,
807            frame_id: None,
808            tx,
809        }
810    }
811}
812
813#[derive(Debug)]
814pub struct GetUrl {
815    /// The id of the frame to get the url for (None = main frame)
816    pub frame_id: Option<FrameId>,
817    /// Sender half of the channel to send the response back
818    pub tx: Sender<Option<String>>,
819}
820
821impl GetUrl {
822    pub fn new(tx: Sender<Option<String>>) -> Self {
823        Self { frame_id: None, tx }
824    }
825}
826
827#[derive(Debug)]
828pub struct GetName {
829    /// The id of the frame to get the name for (None = main frame)
830    pub frame_id: Option<FrameId>,
831    /// Sender half of the channel to send the response back
832    pub tx: Sender<Option<String>>,
833}
834
835#[derive(Debug)]
836pub struct GetParent {
837    /// The id of the frame to get the parent for (None = main frame)
838    pub frame_id: FrameId,
839    /// Sender half of the channel to send the response back
840    pub tx: Sender<Option<FrameId>>,
841}
842
843#[derive(Debug)]
844pub enum TargetMessage {
845    /// Execute a command within the session of this target
846    Command(CommandMessage),
847    /// Return the main frame of this target's page
848    MainFrame(Sender<Option<FrameId>>),
849    /// Return all the frames of this target's page
850    AllFrames(Sender<Vec<FrameId>>),
851    /// Return the url if available
852    Url(GetUrl),
853    /// Return the name if available
854    Name(GetName),
855    /// Return the parent id of a frame
856    Parent(GetParent),
857    /// A Message that resolves when the frame finished loading a new url
858    WaitForNavigation(Sender<ArcHttpRequest>),
859    /// A request to submit a new listener that gets notified with every
860    /// received event
861    AddEventListener(EventListenerRequest),
862    /// Get the `ExecutionContext` if available
863    GetExecutionContext(GetExecutionContext),
864    Authenticate(Credentials),
865}