1use std::collections::VecDeque;
2use std::pin::Pin;
3use std::sync::Arc;
4use std::time::Instant;
5
6use chromiumoxide_cdp::cdp::browser_protocol::target::DetachFromTargetParams;
7use futures::channel::oneshot::Sender;
8use futures::stream::Stream;
9use futures::task::{Context, Poll};
10
11use chromiumoxide_cdp::cdp::browser_protocol::page::{FrameId, GetFrameTreeParams};
12use chromiumoxide_cdp::cdp::browser_protocol::{
13 browser::BrowserContextId,
14 log as cdplog, performance,
15 target::{AttachToTargetParams, SessionId, SetAutoAttachParams, TargetId, TargetInfo},
16};
17use chromiumoxide_cdp::cdp::events::CdpEvent;
18use chromiumoxide_cdp::cdp::CdpEventMessage;
19use chromiumoxide_types::{Command, Method, Request, Response};
20
21use super::blockers::intercept_manager::NetworkInterceptManager;
22use crate::auth::Credentials;
23use crate::cdp::browser_protocol::target::CloseTargetParams;
24use crate::cmd::CommandChain;
25use crate::cmd::CommandMessage;
26use crate::error::{CdpError, Result};
27use crate::handler::browser::BrowserContext;
28use crate::handler::domworld::DOMWorldKind;
29use crate::handler::emulation::EmulationManager;
30use crate::handler::frame::{
31 FrameEvent, FrameManager, NavigationError, NavigationId, NavigationOk,
32};
33use crate::handler::frame::{FrameRequestedNavigation, UTILITY_WORLD_NAME};
34use crate::handler::network::{NetworkEvent, NetworkManager};
35use crate::handler::page::PageHandle;
36use crate::handler::viewport::Viewport;
37use crate::handler::{PageInner, REQUEST_TIMEOUT};
38use crate::listeners::{EventListenerRequest, EventListeners};
39use crate::{page::Page, ArcHttpRequest};
40use chromiumoxide_cdp::cdp::js_protocol::runtime::{
41 ExecutionContextId, RunIfWaitingForDebuggerParams,
42};
43use std::time::Duration;
44
45macro_rules! advance_state {
46 ($s:ident, $cx:ident, $now:ident, $cmds: ident, $next_state:expr ) => {{
47 if let Poll::Ready(poll) = $cmds.poll($now) {
48 return match poll {
49 None => {
50 $s.init_state = $next_state;
51 $s.poll($cx, $now)
52 }
53 Some(Ok((method, params))) => Some(TargetEvent::Request(Request {
54 method,
55 session_id: $s.session_id.clone().map(Into::into),
56 params,
57 })),
58 Some(Err(_)) => Some($s.on_initialization_failed()),
59 };
60 } else {
61 return None;
62 }
63 }};
64}
65
66lazy_static::lazy_static! {
67 static ref INIT_COMMANDS_PARAMS: Vec<(chromiumoxide_types::MethodId, serde_json::Value)> = {
69 let attach = SetAutoAttachParams::builder()
70 .flatten(true)
71 .auto_attach(true)
72 .wait_for_debugger_on_start(true)
73 .build()
74 .unwrap();
75 let enable_performance = performance::EnableParams::default();
76 let enable_log = cdplog::EnableParams::default();
77
78 vec![
79 (
80 attach.identifier(),
81 serde_json::to_value(attach).unwrap_or_default(),
82 ),
83 (
84 enable_performance.identifier(),
85 serde_json::to_value(enable_performance).unwrap_or_default(),
86 ),
87 (
88 enable_log.identifier(),
89 serde_json::to_value(enable_log).unwrap_or_default(),
90 )
91 ]
92 };
93
94 static ref ATTACH_TARGET: (chromiumoxide_types::MethodId, serde_json::Value) = {
96 let runtime_cmd = RunIfWaitingForDebuggerParams::default();
97
98 (runtime_cmd.identifier(), serde_json::to_value(runtime_cmd).unwrap_or_default())
99 };
100}
101
102#[derive(Debug)]
103pub struct Target {
104 info: TargetInfo,
106 r#type: TargetType,
108 config: TargetConfig,
110 browser_context: BrowserContext,
112 frame_manager: FrameManager,
115 network_manager: NetworkManager,
117 emulation_manager: EmulationManager,
118 session_id: Option<SessionId>,
120 page: Option<PageHandle>,
122 pub(crate) init_state: TargetInit,
124 queued_events: VecDeque<TargetEvent>,
126 event_listeners: EventListeners,
128 wait_for_frame_navigation: Vec<Sender<ArcHttpRequest>>,
130 initiator: Option<Sender<Result<Page>>>,
132}
133
134impl Target {
135 pub fn new(info: TargetInfo, config: TargetConfig, browser_context: BrowserContext) -> Self {
138 let ty = TargetType::new(&info.r#type);
139 let request_timeout = config.request_timeout;
140 let mut network_manager = NetworkManager::new(config.ignore_https_errors, request_timeout);
141
142 if !config.cache_enabled {
143 network_manager.set_cache_enabled(false);
144 }
145
146 if !config.service_worker_enabled {
147 network_manager.set_service_worker_enabled(true);
148 }
149
150 network_manager.set_request_interception(config.request_intercept);
151
152 if let Some(ref headers) = config.extra_headers {
153 network_manager.set_extra_headers(headers.clone());
154 }
155
156 network_manager.ignore_visuals = config.ignore_visuals;
157 network_manager.block_javascript = config.ignore_javascript;
158 network_manager.block_analytics = config.ignore_analytics;
159 network_manager.block_stylesheets = config.ignore_stylesheets;
160 network_manager.only_html = config.only_html;
161 network_manager.intercept_manager = config.intercept_manager;
162
163 Self {
164 info,
165 r#type: ty,
166 config,
167 frame_manager: FrameManager::new(request_timeout),
168 network_manager,
169 emulation_manager: EmulationManager::new(request_timeout),
170 session_id: None,
171 page: None,
172 init_state: TargetInit::AttachToTarget,
173 wait_for_frame_navigation: Default::default(),
174 queued_events: Default::default(),
175 event_listeners: Default::default(),
176 initiator: None,
177 browser_context,
178 }
179 }
180
181 pub fn set_session_id(&mut self, id: SessionId) {
182 self.session_id = Some(id)
183 }
184
185 pub fn session_id(&self) -> Option<&SessionId> {
186 self.session_id.as_ref()
187 }
188
189 pub fn browser_context(&self) -> &BrowserContext {
190 &self.browser_context
191 }
192
193 pub fn session_id_mut(&mut self) -> &mut Option<SessionId> {
194 &mut self.session_id
195 }
196
197 pub fn target_id(&self) -> &TargetId {
199 &self.info.target_id
200 }
201
202 pub fn r#type(&self) -> &TargetType {
204 &self.r#type
205 }
206
207 pub fn is_initialized(&self) -> bool {
209 matches!(self.init_state, TargetInit::Initialized)
210 }
211
212 pub fn goto(&mut self, req: FrameRequestedNavigation) {
214 self.frame_manager.goto(req)
215 }
216
217 fn create_page(&mut self) {
218 if self.page.is_none() {
219 if let Some(session) = self.session_id.clone() {
220 let handle =
221 PageHandle::new(self.target_id().clone(), session, self.opener_id().cloned());
222 self.page = Some(handle);
223 }
224 }
225 }
226
227 pub(crate) fn get_or_create_page(&mut self) -> Option<&Arc<PageInner>> {
229 self.create_page();
230 self.page.as_ref().map(|p| p.inner())
231 }
232
233 pub fn is_page(&self) -> bool {
234 self.r#type().is_page()
235 }
236
237 pub fn browser_context_id(&self) -> Option<&BrowserContextId> {
238 self.info.browser_context_id.as_ref()
239 }
240
241 pub fn info(&self) -> &TargetInfo {
242 &self.info
243 }
244
245 pub fn opener_id(&self) -> Option<&TargetId> {
247 self.info.opener_id.as_ref()
248 }
249
250 pub fn frame_manager(&self) -> &FrameManager {
251 &self.frame_manager
252 }
253
254 pub fn frame_manager_mut(&mut self) -> &mut FrameManager {
255 &mut self.frame_manager
256 }
257
258 pub fn event_listeners_mut(&mut self) -> &mut EventListeners {
259 &mut self.event_listeners
260 }
261
262 pub fn on_response(&mut self, resp: Response, method: &str) {
264 if let Some(cmds) = self.init_state.commands_mut() {
265 cmds.received_response(method);
266 }
267
268 if let GetFrameTreeParams::IDENTIFIER = method {
269 if let Some(resp) = resp
270 .result
271 .and_then(|val| GetFrameTreeParams::response_from_value(val).ok())
272 {
273 self.frame_manager.on_frame_tree(resp.frame_tree);
274 }
275 }
276 }
279
280 pub fn on_event(&mut self, event: CdpEventMessage) {
281 let CdpEventMessage { params, method, .. } = event;
282
283 match ¶ms {
284 CdpEvent::PageFrameAttached(ev) => self
286 .frame_manager
287 .on_frame_attached(ev.frame_id.clone(), Some(ev.parent_frame_id.clone())),
288 CdpEvent::PageFrameDetached(ev) => self.frame_manager.on_frame_detached(ev),
289 CdpEvent::PageFrameNavigated(ev) => self.frame_manager.on_frame_navigated(&ev.frame),
290 CdpEvent::PageNavigatedWithinDocument(ev) => {
291 self.frame_manager.on_frame_navigated_within_document(ev)
292 }
293 CdpEvent::RuntimeExecutionContextCreated(ev) => {
294 self.frame_manager.on_frame_execution_context_created(ev)
295 }
296 CdpEvent::RuntimeExecutionContextDestroyed(ev) => {
297 self.frame_manager.on_frame_execution_context_destroyed(ev)
298 }
299 CdpEvent::RuntimeExecutionContextsCleared(_) => {
300 self.frame_manager.on_execution_contexts_cleared()
301 }
302 CdpEvent::RuntimeBindingCalled(ev) => {
303 self.frame_manager.on_runtime_binding_called(ev)
305 }
306 CdpEvent::PageLifecycleEvent(ev) => self.frame_manager.on_page_lifecycle_event(ev),
307 CdpEvent::PageFrameStartedLoading(ev) => {
308 self.frame_manager.on_frame_started_loading(ev);
309 }
310 CdpEvent::PageFrameStoppedLoading(ev) => {
311 self.frame_manager.on_frame_stopped_loading(ev);
312 }
313 CdpEvent::TargetAttachedToTarget(ev) => {
315 if ev.waiting_for_debugger {
316 let runtime_cmd = ATTACH_TARGET.clone();
317
318 self.queued_events.push_back(TargetEvent::Request(Request {
319 method: runtime_cmd.0,
320 session_id: Some(ev.session_id.clone().into()),
321 params: runtime_cmd.1,
322 }));
323 }
324
325 if "service_worker" == &ev.target_info.r#type {
326 let detach_command = DetachFromTargetParams::builder()
327 .session_id(ev.session_id.clone())
328 .build();
329
330 self.queued_events.push_back(TargetEvent::Request(Request {
331 method: detach_command.identifier(),
332 session_id: self.session_id.clone().map(Into::into),
333 params: serde_json::to_value(detach_command).unwrap_or_default(),
334 }));
335 }
336 }
337
338 CdpEvent::FetchRequestPaused(ev) => self.network_manager.on_fetch_request_paused(ev),
340 CdpEvent::FetchAuthRequired(ev) => self.network_manager.on_fetch_auth_required(ev),
341 CdpEvent::NetworkRequestWillBeSent(ev) => {
342 self.network_manager.on_request_will_be_sent(ev)
343 }
344 CdpEvent::NetworkRequestServedFromCache(ev) => {
345 self.network_manager.on_request_served_from_cache(ev)
346 }
347 CdpEvent::NetworkResponseReceived(ev) => self.network_manager.on_response_received(ev),
348 CdpEvent::NetworkLoadingFinished(ev) => {
349 self.network_manager.on_network_loading_finished(ev)
350 }
351 CdpEvent::NetworkLoadingFailed(ev) => {
352 self.network_manager.on_network_loading_failed(ev)
353 }
354 _ => (),
355 }
356 chromiumoxide_cdp::consume_event!(match params {
357 |ev| self.event_listeners.start_send(ev),
358 |json| { let _ = self.event_listeners.try_send_custom(&method, json);}
359 });
360 }
361
362 fn on_initialization_failed(&mut self) -> TargetEvent {
364 if let Some(initiator) = self.initiator.take() {
365 let _ = initiator.send(Err(CdpError::Timeout));
366 }
367 self.init_state = TargetInit::Closing;
368 let close_target = CloseTargetParams::new(self.info.target_id.clone());
369 TargetEvent::Request(Request {
370 method: close_target.identifier(),
371 session_id: self.session_id.clone().map(Into::into),
372 params: serde_json::to_value(close_target).unwrap_or_default(),
373 })
374 }
375
376 pub(crate) fn poll(&mut self, cx: &mut Context<'_>, now: Instant) -> Option<TargetEvent> {
378 if !self.is_page() {
379 return None;
381 }
382
383 match &mut self.init_state {
384 TargetInit::AttachToTarget => {
385 self.init_state = TargetInit::InitializingFrame(FrameManager::init_commands(
386 self.config.request_timeout,
387 ));
388
389 if let Ok(params) = AttachToTargetParams::builder()
390 .target_id(self.target_id().clone())
391 .flatten(true)
392 .build()
393 {
394 return Some(TargetEvent::Request(Request::new(
395 params.identifier(),
396 serde_json::to_value(params).unwrap_or_default(),
397 )));
398 } else {
399 return None;
400 }
401 }
402 TargetInit::InitializingFrame(cmds) => {
403 self.session_id.as_ref()?;
404 if let Poll::Ready(poll) = cmds.poll(now) {
405 return match poll {
406 None => {
407 if let Some(isolated_world_cmds) =
408 self.frame_manager.ensure_isolated_world(UTILITY_WORLD_NAME)
409 {
410 *cmds = isolated_world_cmds;
411 } else {
412 self.init_state = TargetInit::InitializingNetwork(
413 self.network_manager.init_commands(),
414 );
415 }
416
417 self.poll(cx, now)
418 }
419 Some(Ok((method, params))) => Some(TargetEvent::Request(Request {
420 method,
421 session_id: self.session_id.clone().map(Into::into),
422 params,
423 })),
424 Some(Err(_)) => Some(self.on_initialization_failed()),
425 };
426 } else {
427 return None;
428 }
429 }
430 TargetInit::InitializingNetwork(cmds) => {
431 advance_state!(
432 self,
433 cx,
434 now,
435 cmds,
436 TargetInit::InitializingPage(Self::page_init_commands(
437 self.config.request_timeout
438 ))
439 );
440 }
441 TargetInit::InitializingPage(cmds) => {
442 advance_state!(
443 self,
444 cx,
445 now,
446 cmds,
447 match self.config.viewport.as_ref() {
448 Some(viewport) => TargetInit::InitializingEmulation(
449 self.emulation_manager.init_commands(viewport)
450 ),
451 None => TargetInit::Initialized,
452 }
453 );
454 }
455 TargetInit::InitializingEmulation(cmds) => {
456 advance_state!(self, cx, now, cmds, TargetInit::Initialized);
457 }
458 TargetInit::Initialized => {
459 if let Some(initiator) = self.initiator.take() {
460 if self
462 .frame_manager
463 .main_frame()
464 .map(|frame| frame.is_loaded())
465 .unwrap_or_default()
466 {
467 if let Some(page) = self.get_or_create_page() {
468 let _ = initiator.send(Ok(page.clone().into()));
469 } else {
470 self.initiator = Some(initiator);
471 }
472 } else {
473 self.initiator = Some(initiator);
474 }
475 }
476 }
477 TargetInit::Closing => return None,
478 };
479
480 loop {
481 if self.init_state == TargetInit::Closing {
482 break None;
483 }
484
485 if let Some(frame) = self.frame_manager.main_frame() {
486 if frame.is_loaded() {
487 while let Some(tx) = self.wait_for_frame_navigation.pop() {
488 let _ = tx.send(frame.http_request().cloned());
489 }
490 }
491 }
492
493 if let Some(ev) = self.queued_events.pop_front() {
495 return Some(ev);
496 }
497
498 if let Some(handle) = self.page.as_mut() {
499 while let Poll::Ready(Some(msg)) = Pin::new(&mut handle.rx).poll_next(cx) {
500 if self.init_state == TargetInit::Closing {
501 break;
502 }
503
504 match msg {
505 TargetMessage::Command(cmd) => {
506 self.queued_events.push_back(TargetEvent::Command(cmd));
507 }
508 TargetMessage::MainFrame(tx) => {
509 let _ =
510 tx.send(self.frame_manager.main_frame().map(|f| f.id().clone()));
511 }
512 TargetMessage::AllFrames(tx) => {
513 let _ = tx.send(
514 self.frame_manager
515 .frames()
516 .map(|f| f.id().clone())
517 .collect(),
518 );
519 }
520 TargetMessage::Url(req) => {
521 let GetUrl { frame_id, tx } = req;
522 let frame = if let Some(frame_id) = frame_id {
523 self.frame_manager.frame(&frame_id)
524 } else {
525 self.frame_manager.main_frame()
526 };
527 let _ = tx.send(frame.and_then(|f| f.url().map(str::to_string)));
528 }
529 TargetMessage::Name(req) => {
530 let GetName { frame_id, tx } = req;
531 let frame = if let Some(frame_id) = frame_id {
532 self.frame_manager.frame(&frame_id)
533 } else {
534 self.frame_manager.main_frame()
535 };
536 let _ = tx.send(frame.and_then(|f| f.name().map(str::to_string)));
537 }
538 TargetMessage::Parent(req) => {
539 let GetParent { frame_id, tx } = req;
540 let frame = self.frame_manager.frame(&frame_id);
541 let _ = tx.send(frame.and_then(|f| f.parent_id().cloned()));
542 }
543 TargetMessage::WaitForNavigation(tx) => {
544 if let Some(frame) = self.frame_manager.main_frame() {
545 if frame.is_loaded() {
549 let _ = tx.send(frame.http_request().cloned());
550 } else {
551 self.wait_for_frame_navigation.push(tx);
552 }
553 } else {
554 self.wait_for_frame_navigation.push(tx);
555 }
556 }
557 TargetMessage::AddEventListener(req) => {
558 if req.method == "Fetch.requestPaused" {
559 self.network_manager.disable_request_intercept();
560 }
561 self.event_listeners.add_listener(req);
563 }
564 TargetMessage::GetExecutionContext(ctx) => {
565 let GetExecutionContext {
566 dom_world,
567 frame_id,
568 tx,
569 } = ctx;
570 let frame = if let Some(frame_id) = frame_id {
571 self.frame_manager.frame(&frame_id)
572 } else {
573 self.frame_manager.main_frame()
574 };
575
576 if let Some(frame) = frame {
577 match dom_world {
578 DOMWorldKind::Main => {
579 let _ = tx.send(frame.main_world().execution_context());
580 }
581 DOMWorldKind::Secondary => {
582 let _ =
583 tx.send(frame.secondary_world().execution_context());
584 }
585 }
586 } else {
587 let _ = tx.send(None);
588 }
589 }
590 TargetMessage::Authenticate(credentials) => {
591 self.network_manager.authenticate(credentials);
592 }
593 }
594 }
595 }
596
597 while let Some(event) = self.network_manager.poll() {
598 if self.init_state == TargetInit::Closing {
599 break;
600 }
601 match event {
602 NetworkEvent::SendCdpRequest((method, params)) => {
603 self.queued_events.push_back(TargetEvent::Request(Request {
605 method,
606 session_id: self.session_id.clone().map(Into::into),
607 params,
608 }))
609 }
610 NetworkEvent::Request(_) => {}
611 NetworkEvent::Response(_) => {}
612 NetworkEvent::RequestFailed(request) => {
613 self.frame_manager.on_http_request_finished(request);
614 }
615 NetworkEvent::RequestFinished(request) => {
616 self.frame_manager.on_http_request_finished(request);
617 }
618 }
619 }
620
621 while let Some(event) = self.frame_manager.poll(now) {
622 if self.init_state == TargetInit::Closing {
623 break;
624 }
625 match event {
626 FrameEvent::NavigationResult(res) => {
627 self.queued_events
628 .push_back(TargetEvent::NavigationResult(res));
629 }
630 FrameEvent::NavigationRequest(id, req) => {
631 self.queued_events
632 .push_back(TargetEvent::NavigationRequest(id, req));
633 }
634 }
635 }
636
637 if self.queued_events.is_empty() {
638 return None;
639 }
640 }
641 }
642
643 pub fn set_initiator(&mut self, tx: Sender<Result<Page>>) {
646 self.initiator = Some(tx);
647 }
648
649 pub(crate) fn page_init_commands(timeout: Duration) -> CommandChain {
650 CommandChain::new(INIT_COMMANDS_PARAMS.clone(), timeout)
651 }
652}
653
654#[derive(Debug, Clone)]
655pub struct TargetConfig {
656 pub ignore_https_errors: bool,
657 pub request_timeout: Duration,
659 pub viewport: Option<Viewport>,
660 pub request_intercept: bool,
661 pub cache_enabled: bool,
662 pub ignore_visuals: bool,
663 pub ignore_javascript: bool,
664 pub ignore_analytics: bool,
665 pub ignore_stylesheets: bool,
666 pub only_html: bool,
667 pub service_worker_enabled: bool,
668 pub extra_headers: Option<std::collections::HashMap<String, String>>,
669 pub intercept_manager: NetworkInterceptManager,
670}
671
672impl Default for TargetConfig {
673 fn default() -> Self {
674 Self {
675 ignore_https_errors: true,
676 request_timeout: Duration::from_secs(REQUEST_TIMEOUT),
677 viewport: Default::default(),
678 request_intercept: false,
679 cache_enabled: true,
680 service_worker_enabled: true,
681 ignore_javascript: false,
682 ignore_visuals: false,
683 ignore_stylesheets: false,
684 ignore_analytics: true,
685 only_html: false,
686 extra_headers: Default::default(),
687 intercept_manager: NetworkInterceptManager::Unknown,
688 }
689 }
690}
691
692#[derive(Debug, Clone, Eq, PartialEq)]
693pub enum TargetType {
694 Page,
695 BackgroundPage,
696 ServiceWorker,
697 SharedWorker,
698 Other,
699 Browser,
700 Webview,
701 Unknown(String),
702}
703
704impl TargetType {
705 pub fn new(ty: &str) -> Self {
706 match ty {
707 "page" => TargetType::Page,
708 "background_page" => TargetType::BackgroundPage,
709 "service_worker" => TargetType::ServiceWorker,
710 "shared_worker" => TargetType::SharedWorker,
711 "other" => TargetType::Other,
712 "browser" => TargetType::Browser,
713 "webview" => TargetType::Webview,
714 s => TargetType::Unknown(s.to_string()),
715 }
716 }
717
718 pub fn is_page(&self) -> bool {
719 matches!(self, TargetType::Page)
720 }
721
722 pub fn is_background_page(&self) -> bool {
723 matches!(self, TargetType::BackgroundPage)
724 }
725
726 pub fn is_service_worker(&self) -> bool {
727 matches!(self, TargetType::ServiceWorker)
728 }
729
730 pub fn is_shared_worker(&self) -> bool {
731 matches!(self, TargetType::SharedWorker)
732 }
733
734 pub fn is_other(&self) -> bool {
735 matches!(self, TargetType::Other)
736 }
737
738 pub fn is_browser(&self) -> bool {
739 matches!(self, TargetType::Browser)
740 }
741
742 pub fn is_webview(&self) -> bool {
743 matches!(self, TargetType::Webview)
744 }
745}
746
747#[derive(Debug)]
748pub(crate) enum TargetEvent {
749 Request(Request),
751 NavigationRequest(NavigationId, Request),
753 NavigationResult(Result<NavigationOk, NavigationError>),
755 Command(CommandMessage),
757}
758
759#[derive(Debug, PartialEq)]
761pub enum TargetInit {
762 InitializingFrame(CommandChain),
763 InitializingNetwork(CommandChain),
764 InitializingPage(CommandChain),
765 InitializingEmulation(CommandChain),
766 AttachToTarget,
767 Initialized,
768 Closing,
769}
770
771impl TargetInit {
772 fn commands_mut(&mut self) -> Option<&mut CommandChain> {
773 match self {
774 TargetInit::InitializingFrame(cmd) => Some(cmd),
775 TargetInit::InitializingNetwork(cmd) => Some(cmd),
776 TargetInit::InitializingPage(cmd) => Some(cmd),
777 TargetInit::InitializingEmulation(cmd) => Some(cmd),
778 TargetInit::AttachToTarget => None,
779 TargetInit::Initialized => None,
780 TargetInit::Closing => None,
781 }
782 }
783}
784
785#[derive(Debug)]
786pub struct GetExecutionContext {
787 pub dom_world: DOMWorldKind,
789 pub frame_id: Option<FrameId>,
791 pub tx: Sender<Option<ExecutionContextId>>,
793}
794
795impl GetExecutionContext {
796 pub fn new(tx: Sender<Option<ExecutionContextId>>) -> Self {
797 Self {
798 dom_world: DOMWorldKind::Main,
799 frame_id: None,
800 tx,
801 }
802 }
803}
804
805#[derive(Debug)]
806pub struct GetUrl {
807 pub frame_id: Option<FrameId>,
809 pub tx: Sender<Option<String>>,
811}
812
813impl GetUrl {
814 pub fn new(tx: Sender<Option<String>>) -> Self {
815 Self { frame_id: None, tx }
816 }
817}
818
819#[derive(Debug)]
820pub struct GetName {
821 pub frame_id: Option<FrameId>,
823 pub tx: Sender<Option<String>>,
825}
826
827#[derive(Debug)]
828pub struct GetParent {
829 pub frame_id: FrameId,
831 pub tx: Sender<Option<FrameId>>,
833}
834
835#[derive(Debug)]
836pub enum TargetMessage {
837 Command(CommandMessage),
839 MainFrame(Sender<Option<FrameId>>),
841 AllFrames(Sender<Vec<FrameId>>),
843 Url(GetUrl),
845 Name(GetName),
847 Parent(GetParent),
849 WaitForNavigation(Sender<ArcHttpRequest>),
851 AddEventListener(EventListenerRequest),
854 GetExecutionContext(GetExecutionContext),
856 Authenticate(Credentials),
857}