chromiumoxide/handler/
target.rs

1use std::collections::VecDeque;
2use std::pin::Pin;
3use std::sync::Arc;
4use std::time::Instant;
5
6use chromiumoxide_cdp::cdp::browser_protocol::target::DetachFromTargetParams;
7use futures::channel::oneshot::Sender;
8use futures::stream::Stream;
9use futures::task::{Context, Poll};
10
11use crate::auth::Credentials;
12use crate::cdp::browser_protocol::target::CloseTargetParams;
13use crate::cmd::CommandChain;
14use crate::cmd::CommandMessage;
15use crate::error::{CdpError, Result};
16use crate::handler::browser::BrowserContext;
17use crate::handler::domworld::DOMWorldKind;
18use crate::handler::emulation::EmulationManager;
19use crate::handler::frame::FrameRequestedNavigation;
20use crate::handler::frame::{
21    FrameEvent, FrameManager, NavigationError, NavigationId, NavigationOk,
22};
23use crate::handler::network::{NetworkEvent, NetworkManager};
24use crate::handler::page::PageHandle;
25use crate::handler::viewport::Viewport;
26use crate::handler::{PageInner, REQUEST_TIMEOUT};
27use crate::listeners::{EventListenerRequest, EventListeners};
28use crate::{page::Page, ArcHttpRequest};
29use chromiumoxide_cdp::cdp::browser_protocol::page::{FrameId, GetFrameTreeParams};
30use chromiumoxide_cdp::cdp::browser_protocol::{
31    browser::BrowserContextId,
32    log as cdplog, performance,
33    target::{AttachToTargetParams, SessionId, SetAutoAttachParams, TargetId, TargetInfo},
34};
35use chromiumoxide_cdp::cdp::events::CdpEvent;
36use chromiumoxide_cdp::cdp::js_protocol::runtime::{
37    ExecutionContextId, RunIfWaitingForDebuggerParams,
38};
39use chromiumoxide_cdp::cdp::CdpEventMessage;
40use chromiumoxide_types::{Command, Method, Request, Response};
41use spider_network_blocker::intercept_manager::NetworkInterceptManager;
42use std::time::Duration;
43
44macro_rules! advance_state {
45    ($s:ident, $cx:ident, $now:ident, $cmds: ident, $next_state:expr ) => {{
46        if let Poll::Ready(poll) = $cmds.poll($now) {
47            return match poll {
48                None => {
49                    $s.init_state = $next_state;
50                    $s.poll($cx, $now)
51                }
52                Some(Ok((method, params))) => Some(TargetEvent::Request(Request {
53                    method,
54                    session_id: $s.session_id.clone().map(Into::into),
55                    params,
56                })),
57                Some(Err(_)) => Some($s.on_initialization_failed()),
58            };
59        } else {
60            return None;
61        }
62    }};
63}
64
65lazy_static::lazy_static! {
66    /// Initial start command params.
67    static ref INIT_COMMANDS_PARAMS: Vec<(chromiumoxide_types::MethodId, serde_json::Value)> = {
68        let attach = SetAutoAttachParams::builder()
69            .flatten(true)
70            .auto_attach(true)
71            .wait_for_debugger_on_start(true)
72            .build()
73            .unwrap();
74        let enable_performance = performance::EnableParams::default();
75        let disable_log = cdplog::DisableParams::default();
76
77        vec![
78                (
79                    attach.identifier(),
80                    serde_json::to_value(attach).unwrap_or_default(),
81                ),
82                (
83                    enable_performance.identifier(),
84                    serde_json::to_value(enable_performance).unwrap_or_default(),
85                ),
86                (
87                    disable_log.identifier(),
88                    serde_json::to_value(disable_log).unwrap_or_default(),
89                )
90            ]
91    };
92
93    /// Attach to target commands
94    static ref ATTACH_TARGET: (chromiumoxide_types::MethodId, serde_json::Value) = {
95        let runtime_cmd = RunIfWaitingForDebuggerParams::default();
96
97        (runtime_cmd.identifier(), serde_json::to_value(runtime_cmd).unwrap_or_default())
98    };
99}
100
101#[derive(Debug)]
102pub struct Target {
103    /// Info about this target as returned from the chromium instance
104    info: TargetInfo,
105    /// The type of this target
106    r#type: TargetType,
107    /// Configs for this target
108    config: TargetConfig,
109    /// The context this target is running in
110    browser_context: BrowserContext,
111    /// The frame manager that maintains the state of all frames and handles
112    /// navigations of frames
113    frame_manager: FrameManager,
114    /// Handles all the https
115    network_manager: NetworkManager,
116    emulation_manager: EmulationManager,
117    /// The identifier of the session this target is attached to
118    session_id: Option<SessionId>,
119    /// The handle of the browser page of this target
120    page: Option<PageHandle>,
121    /// Drives this target towards initialization
122    pub(crate) init_state: TargetInit,
123    /// Currently queued events to report to the `Handler`
124    queued_events: VecDeque<TargetEvent>,
125    /// All registered event subscriptions
126    event_listeners: EventListeners,
127    /// Senders that need to be notified once the main frame has loaded
128    wait_for_frame_navigation: Vec<Sender<ArcHttpRequest>>,
129    /// The sender who requested the page.
130    initiator: Option<Sender<Result<Page>>>,
131}
132
133impl Target {
134    /// Create a new target instance with `TargetInfo` after a
135    /// `CreateTargetParams` request.
136    pub fn new(info: TargetInfo, config: TargetConfig, browser_context: BrowserContext) -> Self {
137        let ty = TargetType::new(&info.r#type);
138        let request_timeout = config.request_timeout;
139        let mut network_manager = NetworkManager::new(config.ignore_https_errors, request_timeout);
140
141        if !config.cache_enabled {
142            network_manager.set_cache_enabled(false);
143        }
144
145        if !config.service_worker_enabled {
146            network_manager.set_service_worker_enabled(true);
147        }
148
149        network_manager.set_request_interception(config.request_intercept);
150
151        if let Some(ref headers) = config.extra_headers {
152            network_manager.set_extra_headers(headers.clone());
153        }
154
155        network_manager.ignore_visuals = config.ignore_visuals;
156        network_manager.block_javascript = config.ignore_javascript;
157        network_manager.block_analytics = config.ignore_analytics;
158        network_manager.block_stylesheets = config.ignore_stylesheets;
159        network_manager.only_html = config.only_html;
160        network_manager.intercept_manager = config.intercept_manager;
161
162        Self {
163            info,
164            r#type: ty,
165            config,
166            frame_manager: FrameManager::new(request_timeout),
167            network_manager,
168            emulation_manager: EmulationManager::new(request_timeout),
169            session_id: None,
170            page: None,
171            init_state: TargetInit::AttachToTarget,
172            wait_for_frame_navigation: Default::default(),
173            queued_events: Default::default(),
174            event_listeners: Default::default(),
175            initiator: None,
176            browser_context,
177        }
178    }
179
180    pub fn set_session_id(&mut self, id: SessionId) {
181        self.session_id = Some(id)
182    }
183
184    pub fn session_id(&self) -> Option<&SessionId> {
185        self.session_id.as_ref()
186    }
187
188    pub fn browser_context(&self) -> &BrowserContext {
189        &self.browser_context
190    }
191
192    pub fn session_id_mut(&mut self) -> &mut Option<SessionId> {
193        &mut self.session_id
194    }
195
196    /// The identifier for this target
197    pub fn target_id(&self) -> &TargetId {
198        &self.info.target_id
199    }
200
201    /// The type of this target
202    pub fn r#type(&self) -> &TargetType {
203        &self.r#type
204    }
205
206    /// Whether this target is already initialized
207    pub fn is_initialized(&self) -> bool {
208        matches!(self.init_state, TargetInit::Initialized)
209    }
210
211    /// Navigate a frame
212    pub fn goto(&mut self, req: FrameRequestedNavigation) {
213        self.frame_manager.goto(req)
214    }
215
216    fn create_page(&mut self) {
217        if self.page.is_none() {
218            if let Some(session) = self.session_id.clone() {
219                let handle =
220                    PageHandle::new(self.target_id().clone(), session, self.opener_id().cloned());
221                self.page = Some(handle);
222            }
223        }
224    }
225
226    /// Tries to create the `PageInner` if this target is already initialized
227    pub(crate) fn get_or_create_page(&mut self) -> Option<&Arc<PageInner>> {
228        self.create_page();
229        self.page.as_ref().map(|p| p.inner())
230    }
231
232    pub fn is_page(&self) -> bool {
233        self.r#type().is_page()
234    }
235
236    pub fn browser_context_id(&self) -> Option<&BrowserContextId> {
237        self.info.browser_context_id.as_ref()
238    }
239
240    pub fn info(&self) -> &TargetInfo {
241        &self.info
242    }
243
244    /// Get the target that opened this target. Top-level targets return `None`.
245    pub fn opener_id(&self) -> Option<&TargetId> {
246        self.info.opener_id.as_ref()
247    }
248
249    pub fn frame_manager(&self) -> &FrameManager {
250        &self.frame_manager
251    }
252
253    pub fn frame_manager_mut(&mut self) -> &mut FrameManager {
254        &mut self.frame_manager
255    }
256
257    pub fn event_listeners_mut(&mut self) -> &mut EventListeners {
258        &mut self.event_listeners
259    }
260
261    /// Received a response to a command issued by this target
262    pub fn on_response(&mut self, resp: Response, method: &str) {
263        if let Some(cmds) = self.init_state.commands_mut() {
264            cmds.received_response(method);
265        }
266
267        if let GetFrameTreeParams::IDENTIFIER = method {
268            if let Some(resp) = resp
269                .result
270                .and_then(|val| GetFrameTreeParams::response_from_value(val).ok())
271            {
272                self.frame_manager.on_frame_tree(resp.frame_tree);
273            }
274        }
275        // requests originated from the network manager all return an empty response, hence they
276        // can be ignored here
277    }
278
279    pub fn on_event(&mut self, event: CdpEventMessage) {
280        let CdpEventMessage { params, method, .. } = event;
281
282        match &params {
283            // `FrameManager` events
284            CdpEvent::PageFrameAttached(ev) => self
285                .frame_manager
286                .on_frame_attached(ev.frame_id.clone(), Some(ev.parent_frame_id.clone())),
287            CdpEvent::PageFrameDetached(ev) => self.frame_manager.on_frame_detached(ev),
288            CdpEvent::PageFrameNavigated(ev) => self.frame_manager.on_frame_navigated(&ev.frame),
289            CdpEvent::PageNavigatedWithinDocument(ev) => {
290                self.frame_manager.on_frame_navigated_within_document(ev)
291            }
292            CdpEvent::RuntimeExecutionContextCreated(ev) => {
293                self.frame_manager.on_frame_execution_context_created(ev)
294            }
295            CdpEvent::RuntimeExecutionContextDestroyed(ev) => {
296                self.frame_manager.on_frame_execution_context_destroyed(ev)
297            }
298            CdpEvent::RuntimeExecutionContextsCleared(_) => {
299                self.frame_manager.on_execution_contexts_cleared()
300            }
301            CdpEvent::RuntimeBindingCalled(ev) => {
302                // TODO check if binding registered and payload is json
303                self.frame_manager.on_runtime_binding_called(ev)
304            }
305            CdpEvent::PageLifecycleEvent(ev) => self.frame_manager.on_page_lifecycle_event(ev),
306            CdpEvent::PageFrameStartedLoading(ev) => {
307                self.frame_manager.on_frame_started_loading(ev);
308            }
309            CdpEvent::PageFrameStoppedLoading(ev) => {
310                self.frame_manager.on_frame_stopped_loading(ev);
311            }
312            // `Target` events
313            CdpEvent::TargetAttachedToTarget(ev) => {
314                if ev.waiting_for_debugger {
315                    let runtime_cmd = ATTACH_TARGET.clone();
316
317                    self.queued_events.push_back(TargetEvent::Request(Request {
318                        method: runtime_cmd.0,
319                        session_id: Some(ev.session_id.clone().into()),
320                        params: runtime_cmd.1,
321                    }));
322                }
323
324                if "service_worker" == &ev.target_info.r#type {
325                    let detach_command = DetachFromTargetParams::builder()
326                        .session_id(ev.session_id.clone())
327                        .build();
328
329                    self.queued_events.push_back(TargetEvent::Request(Request {
330                        method: detach_command.identifier(),
331                        session_id: self.session_id.clone().map(Into::into),
332                        params: serde_json::to_value(detach_command).unwrap_or_default(),
333                    }));
334                }
335            }
336
337            // `NetworkManager` events
338            CdpEvent::FetchRequestPaused(ev) => self.network_manager.on_fetch_request_paused(ev),
339            CdpEvent::FetchAuthRequired(ev) => self.network_manager.on_fetch_auth_required(ev),
340            CdpEvent::NetworkRequestWillBeSent(ev) => {
341                self.network_manager.on_request_will_be_sent(ev)
342            }
343            CdpEvent::NetworkRequestServedFromCache(ev) => {
344                self.network_manager.on_request_served_from_cache(ev)
345            }
346            CdpEvent::NetworkResponseReceived(ev) => self.network_manager.on_response_received(ev),
347            CdpEvent::NetworkLoadingFinished(ev) => {
348                self.network_manager.on_network_loading_finished(ev)
349            }
350            CdpEvent::NetworkLoadingFailed(ev) => {
351                self.network_manager.on_network_loading_failed(ev)
352            }
353            _ => (),
354        }
355        chromiumoxide_cdp::consume_event!(match params {
356           |ev| self.event_listeners.start_send(ev),
357           |json| { let _ = self.event_listeners.try_send_custom(&method, json);}
358        });
359    }
360
361    /// Called when a init command timed out
362    fn on_initialization_failed(&mut self) -> TargetEvent {
363        if let Some(initiator) = self.initiator.take() {
364            let _ = initiator.send(Err(CdpError::Timeout));
365        }
366        self.init_state = TargetInit::Closing;
367        let close_target = CloseTargetParams::new(self.info.target_id.clone());
368        TargetEvent::Request(Request {
369            method: close_target.identifier(),
370            session_id: self.session_id.clone().map(Into::into),
371            params: serde_json::to_value(close_target).unwrap_or_default(),
372        })
373    }
374
375    /// Advance that target's state
376    pub(crate) fn poll(&mut self, cx: &mut Context<'_>, now: Instant) -> Option<TargetEvent> {
377        if !self.is_page() {
378            // can only poll pages
379            return None;
380        }
381
382        match &mut self.init_state {
383            TargetInit::AttachToTarget => {
384                self.init_state = TargetInit::InitializingFrame(FrameManager::init_commands(
385                    self.config.request_timeout,
386                ));
387
388                if let Ok(params) = AttachToTargetParams::builder()
389                    .target_id(self.target_id().clone())
390                    .flatten(true)
391                    .build()
392                {
393                    return Some(TargetEvent::Request(Request::new(
394                        params.identifier(),
395                        serde_json::to_value(params).unwrap_or_default(),
396                    )));
397                } else {
398                    return None;
399                }
400            }
401            TargetInit::InitializingFrame(cmds) => {
402                self.session_id.as_ref()?;
403                if let Poll::Ready(poll) = cmds.poll(now) {
404                    return match poll {
405                        None => {
406                            if let Some(world_name) = self.frame_manager.get_isolated_world_name() {
407                                let world_name = world_name.clone();
408
409                                if let Some(isolated_world_cmds) =
410                                    self.frame_manager.ensure_isolated_world(&world_name)
411                                {
412                                    *cmds = isolated_world_cmds;
413                                } else {
414                                    self.init_state = TargetInit::InitializingNetwork(
415                                        self.network_manager.init_commands(),
416                                    );
417                                }
418                            } else {
419                                self.init_state = TargetInit::InitializingNetwork(
420                                    self.network_manager.init_commands(),
421                                );
422                            }
423
424                            self.poll(cx, now)
425                        }
426                        Some(Ok((method, params))) => Some(TargetEvent::Request(Request {
427                            method,
428                            session_id: self.session_id.clone().map(Into::into),
429                            params,
430                        })),
431                        Some(Err(_)) => Some(self.on_initialization_failed()),
432                    };
433                } else {
434                    return None;
435                }
436            }
437            TargetInit::InitializingNetwork(cmds) => {
438                advance_state!(
439                    self,
440                    cx,
441                    now,
442                    cmds,
443                    TargetInit::InitializingPage(Self::page_init_commands(
444                        self.config.request_timeout
445                    ))
446                );
447            }
448            TargetInit::InitializingPage(cmds) => {
449                advance_state!(
450                    self,
451                    cx,
452                    now,
453                    cmds,
454                    match self.config.viewport.as_ref() {
455                        Some(viewport) => TargetInit::InitializingEmulation(
456                            self.emulation_manager.init_commands(viewport)
457                        ),
458                        None => TargetInit::Initialized,
459                    }
460                );
461            }
462            TargetInit::InitializingEmulation(cmds) => {
463                advance_state!(self, cx, now, cmds, TargetInit::Initialized);
464            }
465            TargetInit::Initialized => {
466                if let Some(initiator) = self.initiator.take() {
467                    // make sure that the main frame of the page has finished loading
468                    if self
469                        .frame_manager
470                        .main_frame()
471                        .map(|frame| frame.is_loaded())
472                        .unwrap_or_default()
473                    {
474                        if let Some(page) = self.get_or_create_page() {
475                            let _ = initiator.send(Ok(page.clone().into()));
476                        } else {
477                            self.initiator = Some(initiator);
478                        }
479                    } else {
480                        self.initiator = Some(initiator);
481                    }
482                }
483            }
484            TargetInit::Closing => return None,
485        };
486
487        loop {
488            if self.init_state == TargetInit::Closing {
489                break None;
490            }
491
492            if let Some(frame) = self.frame_manager.main_frame() {
493                if frame.is_loaded() {
494                    while let Some(tx) = self.wait_for_frame_navigation.pop() {
495                        let _ = tx.send(frame.http_request().cloned());
496                    }
497                }
498            }
499
500            // Drain queued messages first.
501            if let Some(ev) = self.queued_events.pop_front() {
502                return Some(ev);
503            }
504
505            if let Some(handle) = self.page.as_mut() {
506                while let Poll::Ready(Some(msg)) = Pin::new(&mut handle.rx).poll_next(cx) {
507                    if self.init_state == TargetInit::Closing {
508                        break;
509                    }
510
511                    match msg {
512                        TargetMessage::Command(cmd) => {
513                            self.queued_events.push_back(TargetEvent::Command(cmd));
514                        }
515                        TargetMessage::MainFrame(tx) => {
516                            let _ =
517                                tx.send(self.frame_manager.main_frame().map(|f| f.id().clone()));
518                        }
519                        TargetMessage::AllFrames(tx) => {
520                            let _ = tx.send(
521                                self.frame_manager
522                                    .frames()
523                                    .map(|f| f.id().clone())
524                                    .collect(),
525                            );
526                        }
527                        TargetMessage::Url(req) => {
528                            let GetUrl { frame_id, tx } = req;
529                            let frame = if let Some(frame_id) = frame_id {
530                                self.frame_manager.frame(&frame_id)
531                            } else {
532                                self.frame_manager.main_frame()
533                            };
534                            let _ = tx.send(frame.and_then(|f| f.url().map(str::to_string)));
535                        }
536                        TargetMessage::Name(req) => {
537                            let GetName { frame_id, tx } = req;
538                            let frame = if let Some(frame_id) = frame_id {
539                                self.frame_manager.frame(&frame_id)
540                            } else {
541                                self.frame_manager.main_frame()
542                            };
543                            let _ = tx.send(frame.and_then(|f| f.name().map(str::to_string)));
544                        }
545                        TargetMessage::Parent(req) => {
546                            let GetParent { frame_id, tx } = req;
547                            let frame = self.frame_manager.frame(&frame_id);
548                            let _ = tx.send(frame.and_then(|f| f.parent_id().cloned()));
549                        }
550                        TargetMessage::WaitForNavigation(tx) => {
551                            if let Some(frame) = self.frame_manager.main_frame() {
552                                // TODO submit a navigation watcher: waitForFrameNavigation
553
554                                // TODO return the watchers navigationResponse
555                                if frame.is_loaded() {
556                                    let _ = tx.send(frame.http_request().cloned());
557                                } else {
558                                    self.wait_for_frame_navigation.push(tx);
559                                }
560                            } else {
561                                self.wait_for_frame_navigation.push(tx);
562                            }
563                        }
564                        TargetMessage::AddEventListener(req) => {
565                            if req.method == "Fetch.requestPaused" {
566                                self.network_manager.disable_request_intercept();
567                            }
568                            // register a new listener
569                            self.event_listeners.add_listener(req);
570                        }
571                        TargetMessage::GetExecutionContext(ctx) => {
572                            let GetExecutionContext {
573                                dom_world,
574                                frame_id,
575                                tx,
576                            } = ctx;
577                            let frame = if let Some(frame_id) = frame_id {
578                                self.frame_manager.frame(&frame_id)
579                            } else {
580                                self.frame_manager.main_frame()
581                            };
582
583                            if let Some(frame) = frame {
584                                match dom_world {
585                                    DOMWorldKind::Main => {
586                                        let _ = tx.send(frame.main_world().execution_context());
587                                    }
588                                    DOMWorldKind::Secondary => {
589                                        let _ =
590                                            tx.send(frame.secondary_world().execution_context());
591                                    }
592                                }
593                            } else {
594                                let _ = tx.send(None);
595                            }
596                        }
597                        TargetMessage::Authenticate(credentials) => {
598                            self.network_manager.authenticate(credentials);
599                        }
600                    }
601                }
602            }
603
604            while let Some(event) = self.network_manager.poll() {
605                if self.init_state == TargetInit::Closing {
606                    break;
607                }
608                match event {
609                    NetworkEvent::SendCdpRequest((method, params)) => {
610                        // send a message to the browser
611                        self.queued_events.push_back(TargetEvent::Request(Request {
612                            method,
613                            session_id: self.session_id.clone().map(Into::into),
614                            params,
615                        }))
616                    }
617                    NetworkEvent::Request(_) => {}
618                    NetworkEvent::Response(_) => {}
619                    NetworkEvent::RequestFailed(request) => {
620                        self.frame_manager.on_http_request_finished(request);
621                    }
622                    NetworkEvent::RequestFinished(request) => {
623                        self.frame_manager.on_http_request_finished(request);
624                    }
625                }
626            }
627
628            while let Some(event) = self.frame_manager.poll(now) {
629                if self.init_state == TargetInit::Closing {
630                    break;
631                }
632                match event {
633                    FrameEvent::NavigationResult(res) => {
634                        self.queued_events
635                            .push_back(TargetEvent::NavigationResult(res));
636                    }
637                    FrameEvent::NavigationRequest(id, req) => {
638                        self.queued_events
639                            .push_back(TargetEvent::NavigationRequest(id, req));
640                    }
641                }
642            }
643
644            if self.queued_events.is_empty() {
645                return None;
646            }
647        }
648    }
649
650    /// Set the sender half of the channel who requested the creation of this
651    /// target
652    pub fn set_initiator(&mut self, tx: Sender<Result<Page>>) {
653        self.initiator = Some(tx);
654    }
655
656    pub(crate) fn page_init_commands(timeout: Duration) -> CommandChain {
657        CommandChain::new(INIT_COMMANDS_PARAMS.clone(), timeout)
658    }
659}
660
661#[derive(Debug, Clone)]
662pub struct TargetConfig {
663    pub ignore_https_errors: bool,
664    ///  Request timeout to use
665    pub request_timeout: Duration,
666    pub viewport: Option<Viewport>,
667    pub request_intercept: bool,
668    pub cache_enabled: bool,
669    pub ignore_visuals: bool,
670    pub ignore_javascript: bool,
671    pub ignore_analytics: bool,
672    pub ignore_stylesheets: bool,
673    pub only_html: bool,
674    pub service_worker_enabled: bool,
675    pub extra_headers: Option<std::collections::HashMap<String, String>>,
676    pub intercept_manager: NetworkInterceptManager,
677}
678
679impl Default for TargetConfig {
680    fn default() -> Self {
681        Self {
682            ignore_https_errors: true,
683            request_timeout: Duration::from_secs(REQUEST_TIMEOUT),
684            viewport: Default::default(),
685            request_intercept: false,
686            cache_enabled: true,
687            service_worker_enabled: true,
688            ignore_javascript: false,
689            ignore_visuals: false,
690            ignore_stylesheets: false,
691            ignore_analytics: true,
692            only_html: false,
693            extra_headers: Default::default(),
694            intercept_manager: NetworkInterceptManager::Unknown,
695        }
696    }
697}
698
699#[derive(Debug, Clone, Eq, PartialEq)]
700pub enum TargetType {
701    Page,
702    BackgroundPage,
703    ServiceWorker,
704    SharedWorker,
705    Other,
706    Browser,
707    Webview,
708    Unknown(String),
709}
710
711impl TargetType {
712    pub fn new(ty: &str) -> Self {
713        match ty {
714            "page" => TargetType::Page,
715            "background_page" => TargetType::BackgroundPage,
716            "service_worker" => TargetType::ServiceWorker,
717            "shared_worker" => TargetType::SharedWorker,
718            "other" => TargetType::Other,
719            "browser" => TargetType::Browser,
720            "webview" => TargetType::Webview,
721            s => TargetType::Unknown(s.to_string()),
722        }
723    }
724
725    pub fn is_page(&self) -> bool {
726        matches!(self, TargetType::Page)
727    }
728
729    pub fn is_background_page(&self) -> bool {
730        matches!(self, TargetType::BackgroundPage)
731    }
732
733    pub fn is_service_worker(&self) -> bool {
734        matches!(self, TargetType::ServiceWorker)
735    }
736
737    pub fn is_shared_worker(&self) -> bool {
738        matches!(self, TargetType::SharedWorker)
739    }
740
741    pub fn is_other(&self) -> bool {
742        matches!(self, TargetType::Other)
743    }
744
745    pub fn is_browser(&self) -> bool {
746        matches!(self, TargetType::Browser)
747    }
748
749    pub fn is_webview(&self) -> bool {
750        matches!(self, TargetType::Webview)
751    }
752}
753
754#[derive(Debug)]
755pub(crate) enum TargetEvent {
756    /// An internal request
757    Request(Request),
758    /// An internal navigation request
759    NavigationRequest(NavigationId, Request),
760    /// Indicates that a previous requested navigation has finished
761    NavigationResult(Result<NavigationOk, NavigationError>),
762    /// A new command arrived via a channel
763    Command(CommandMessage),
764}
765
766// TODO this can be moved into the classes?
767#[derive(Debug, PartialEq)]
768pub enum TargetInit {
769    InitializingFrame(CommandChain),
770    InitializingNetwork(CommandChain),
771    InitializingPage(CommandChain),
772    InitializingEmulation(CommandChain),
773    AttachToTarget,
774    Initialized,
775    Closing,
776}
777
778impl TargetInit {
779    fn commands_mut(&mut self) -> Option<&mut CommandChain> {
780        match self {
781            TargetInit::InitializingFrame(cmd) => Some(cmd),
782            TargetInit::InitializingNetwork(cmd) => Some(cmd),
783            TargetInit::InitializingPage(cmd) => Some(cmd),
784            TargetInit::InitializingEmulation(cmd) => Some(cmd),
785            TargetInit::AttachToTarget => None,
786            TargetInit::Initialized => None,
787            TargetInit::Closing => None,
788        }
789    }
790}
791
792#[derive(Debug)]
793pub struct GetExecutionContext {
794    /// For which world the execution context was requested
795    pub dom_world: DOMWorldKind,
796    /// The if of the frame to get the `ExecutionContext` for
797    pub frame_id: Option<FrameId>,
798    /// Sender half of the channel to send the response back
799    pub tx: Sender<Option<ExecutionContextId>>,
800}
801
802impl GetExecutionContext {
803    pub fn new(tx: Sender<Option<ExecutionContextId>>) -> Self {
804        Self {
805            dom_world: DOMWorldKind::Main,
806            frame_id: None,
807            tx,
808        }
809    }
810}
811
812#[derive(Debug)]
813pub struct GetUrl {
814    /// The id of the frame to get the url for (None = main frame)
815    pub frame_id: Option<FrameId>,
816    /// Sender half of the channel to send the response back
817    pub tx: Sender<Option<String>>,
818}
819
820impl GetUrl {
821    pub fn new(tx: Sender<Option<String>>) -> Self {
822        Self { frame_id: None, tx }
823    }
824}
825
826#[derive(Debug)]
827pub struct GetName {
828    /// The id of the frame to get the name for (None = main frame)
829    pub frame_id: Option<FrameId>,
830    /// Sender half of the channel to send the response back
831    pub tx: Sender<Option<String>>,
832}
833
834#[derive(Debug)]
835pub struct GetParent {
836    /// The id of the frame to get the parent for (None = main frame)
837    pub frame_id: FrameId,
838    /// Sender half of the channel to send the response back
839    pub tx: Sender<Option<FrameId>>,
840}
841
842#[derive(Debug)]
843pub enum TargetMessage {
844    /// Execute a command within the session of this target
845    Command(CommandMessage),
846    /// Return the main frame of this target's page
847    MainFrame(Sender<Option<FrameId>>),
848    /// Return all the frames of this target's page
849    AllFrames(Sender<Vec<FrameId>>),
850    /// Return the url if available
851    Url(GetUrl),
852    /// Return the name if available
853    Name(GetName),
854    /// Return the parent id of a frame
855    Parent(GetParent),
856    /// A Message that resolves when the frame finished loading a new url
857    WaitForNavigation(Sender<ArcHttpRequest>),
858    /// A request to submit a new listener that gets notified with every
859    /// received event
860    AddEventListener(EventListenerRequest),
861    /// Get the `ExecutionContext` if available
862    GetExecutionContext(GetExecutionContext),
863    Authenticate(Credentials),
864}