1use std::borrow::ToOwned;
8use std::collections::HashMap;
9use std::fs::File;
10use std::io::{self, BufReader};
11use std::path::{Path, PathBuf};
12use std::sync::{Arc, Weak};
13use std::thread;
14
15use cookie::Cookie;
16use crossbeam_channel::Sender;
17use devtools_traits::DevtoolsControlMsg;
18use embedder_traits::GenericEmbedderProxy;
19use hyper_serde::Serde;
20use ipc_channel::ipc::IpcSender;
21use log::{debug, trace, warn};
22use net_traits::blob_url_store::{BlobTokenCommunicator, parse_blob_url};
23use net_traits::filemanager_thread::FileTokenCheck;
24use net_traits::pub_domains::public_suffix_list_size_of;
25use net_traits::request::{Destination, PreloadEntry, PreloadId, RequestBuilder, RequestId};
26use net_traits::response::{Response, ResponseInit};
27use net_traits::{
28 AsyncRuntime, CookieAsyncResponse, CookieData, CookieSource, CoreResourceMsg,
29 CoreResourceThread, CustomResponseMediator, DiscardFetch, FetchChannels, FetchTaskTarget,
30 ResourceFetchTiming, ResourceThreads, ResourceTimingType, WebSocketDomAction,
31 WebSocketNetworkEvent,
32};
33use parking_lot::{Mutex, RwLock};
34use profile_traits::mem::{
35 ProcessReports, ProfilerChan as MemProfilerChan, Report, ReportKind, ReportsChan,
36 perform_memory_report,
37};
38use profile_traits::path;
39use profile_traits::time::ProfilerChan;
40use rustc_hash::FxHashMap;
41use rustls_pki_types::CertificateDer;
42use rustls_pki_types::pem::PemObject;
43use serde::{Deserialize, Serialize};
44use servo_base::generic_channel::{
45 self, CallbackSetter, GenericCallback, GenericReceiver, GenericReceiverSet,
46 GenericSelectionResult,
47};
48use servo_base::id::CookieStoreId;
49use servo_url::{ImmutableOrigin, ServoUrl};
50use tokio::sync::Mutex as TokioMutex;
51
52use crate::async_runtime::{init_async_runtime, spawn_task};
53use crate::connector::{
54 CACertificates, CertificateErrorOverrideManager, create_http_client, create_tls_config,
55};
56use crate::cookie::ServoCookie;
57use crate::cookie_storage::CookieStorage;
58use crate::embedder::NetToEmbedderMsg;
59use crate::fetch::cors_cache::CorsCache;
60use crate::fetch::fetch_params::{FetchParams, SharedPreloadedResources};
61use crate::fetch::methods::{
62 AutoRequestBodyStreamCloser, CancellationListener, FetchContext,
63 SharedInflightKeepAliveRecords, WebSocketChannel, fetch,
64 transfers_request_body_stream_to_later_manual_redirect,
65};
66use crate::filemanager_thread::FileManager;
67use crate::hsts::{self, HstsList};
68use crate::http_cache::HttpCache;
69use crate::http_loader::{HttpState, http_redirect_fetch};
70use crate::protocols::ProtocolRegistry;
71use crate::request_interceptor::RequestInterceptor;
72use crate::websocket_loader::create_handshake_request;
73
74fn load_root_cert_store_from_file(file_path: String) -> io::Result<Vec<CertificateDer<'static>>> {
76 let mut pem = BufReader::new(File::open(file_path)?);
77
78 let certs = CertificateDer::pem_reader_iter(&mut pem)
79 .filter_map(|cert| {
80 cert.inspect_err(|e| log::error!("Could not load certificate ({e}). Ignoring it."))
81 .ok()
82 })
83 .collect();
84 Ok(certs)
85}
86
87#[expect(clippy::too_many_arguments)]
89pub fn new_resource_threads(
90 devtools_sender: Option<Sender<DevtoolsControlMsg>>,
91 time_profiler_chan: ProfilerChan,
92 mem_profiler_chan: MemProfilerChan,
93 embedder_proxy: GenericEmbedderProxy<NetToEmbedderMsg>,
94 config_dir: Option<PathBuf>,
95 certificate_path: Option<String>,
96 ignore_certificate_errors: bool,
97 protocols: Arc<ProtocolRegistry>,
98) -> (ResourceThreads, ResourceThreads, Box<dyn AsyncRuntime>) {
99 let async_runtime = init_async_runtime();
101
102 let ca_certificates = certificate_path
103 .and_then(|path| {
104 Some(CACertificates::Override(
105 load_root_cert_store_from_file(path).ok()?,
106 ))
107 })
108 .unwrap_or_default();
109
110 let (public_core, private_core) = new_core_resource_thread(
111 devtools_sender,
112 time_profiler_chan,
113 mem_profiler_chan,
114 embedder_proxy,
115 config_dir,
116 ca_certificates,
117 ignore_certificate_errors,
118 protocols,
119 );
120 (
121 ResourceThreads::new(public_core),
122 ResourceThreads::new(private_core),
123 async_runtime,
124 )
125}
126
127#[expect(clippy::too_many_arguments)]
129pub fn new_core_resource_thread(
130 devtools_sender: Option<Sender<DevtoolsControlMsg>>,
131 time_profiler_chan: ProfilerChan,
132 mem_profiler_chan: MemProfilerChan,
133 embedder_proxy: GenericEmbedderProxy<NetToEmbedderMsg>,
134 config_dir: Option<PathBuf>,
135 ca_certificates: CACertificates<'static>,
136 ignore_certificate_errors: bool,
137 protocols: Arc<ProtocolRegistry>,
138) -> (CoreResourceThread, CoreResourceThread) {
139 let (public_setup_chan, public_setup_port) = generic_channel::channel().unwrap();
140 let (private_setup_chan, private_setup_port) = generic_channel::channel().unwrap();
141 let (report_chan, report_port) = generic_channel::channel().unwrap();
142 let (revoke_sender, revoke_receiver) = generic_channel::channel().unwrap();
143 let (refresh_sender, refresh_receiver) = generic_channel::channel().unwrap();
144
145 let blob_token_communicator = Arc::new(Mutex::new(BlobTokenCommunicator {
146 revoke_sender,
147 refresh_token_sender: refresh_sender,
148 }));
149 thread::Builder::new()
150 .name("ResourceManager".to_owned())
151 .spawn(move || {
152 let resource_manager = CoreResourceManager::new(
153 devtools_sender,
154 time_profiler_chan,
155 embedder_proxy.clone(),
156 ca_certificates.clone(),
157 ignore_certificate_errors,
158 blob_token_communicator,
159 );
160
161 let mut channel_manager = ResourceChannelManager {
162 resource_manager,
163 config_dir,
164 ca_certificates,
165 ignore_certificate_errors,
166 cancellation_listeners: Default::default(),
167 cookie_listeners: Default::default(),
168 };
169
170 mem_profiler_chan.run_with_memory_reporting(
171 || {
172 channel_manager.start(
173 public_setup_port,
174 private_setup_port,
175 report_port,
176 revoke_receiver,
177 refresh_receiver,
178 protocols,
179 embedder_proxy,
180 )
181 },
182 String::from("network-cache-reporter"),
183 report_chan,
184 CoreResourceMsg::CollectMemoryReport,
185 );
186 })
187 .expect("Thread spawning failed");
188 (public_setup_chan, private_setup_chan)
189}
190
191struct ResourceChannelManager {
192 resource_manager: CoreResourceManager,
193 config_dir: Option<PathBuf>,
194 ca_certificates: CACertificates<'static>,
195 ignore_certificate_errors: bool,
196 cancellation_listeners: FxHashMap<RequestId, Weak<CancellationListener>>,
197 cookie_listeners: FxHashMap<CookieStoreId, GenericCallback<CookieAsyncResponse>>,
198}
199
200fn create_http_states(
202 config_dir: Option<&Path>,
203 ca_certificates: CACertificates<'static>,
204 ignore_certificate_errors: bool,
205 embedder_proxy: GenericEmbedderProxy<NetToEmbedderMsg>,
206) -> (Arc<HttpState>, Arc<HttpState>) {
207 let mut hsts_list = HstsList::default();
208 let mut auth_cache = AuthCache::default();
209 let mut cookie_jar = CookieStorage::new(150);
210 if let Some(config_dir) = config_dir {
211 servo_base::read_json_from_file(&mut auth_cache, config_dir, "auth_cache.json");
212 servo_base::read_json_from_file(&mut hsts_list, config_dir, "hsts_list.json");
213 servo_base::read_json_from_file(&mut cookie_jar, config_dir, "cookie_jar.json");
214 }
215
216 let override_manager = CertificateErrorOverrideManager::new();
217 let http_state = HttpState {
218 hsts_list: RwLock::new(hsts_list),
219 cookie_jar: RwLock::new(cookie_jar),
220 auth_cache: RwLock::new(auth_cache),
221 history_states: RwLock::new(FxHashMap::default()),
222 http_cache: HttpCache::default(),
223 client: create_http_client(create_tls_config(
224 ca_certificates.clone(),
225 ignore_certificate_errors,
226 override_manager.clone(),
227 )),
228 override_manager,
229 embedder_proxy: embedder_proxy.clone(),
230 };
231
232 let override_manager = CertificateErrorOverrideManager::new();
233 let private_http_state = HttpState {
234 hsts_list: RwLock::new(HstsList::default()),
235 cookie_jar: RwLock::new(CookieStorage::new(150)),
236 auth_cache: RwLock::new(AuthCache::default()),
237 history_states: RwLock::new(FxHashMap::default()),
238 http_cache: HttpCache::default(),
239 client: create_http_client(create_tls_config(
240 ca_certificates,
241 ignore_certificate_errors,
242 override_manager.clone(),
243 )),
244 override_manager,
245 embedder_proxy,
246 };
247
248 (Arc::new(http_state), Arc::new(private_http_state))
249}
250
251impl ResourceChannelManager {
252 #[expect(clippy::too_many_arguments)]
253 fn start(
254 &mut self,
255 public_receiver: GenericReceiver<CoreResourceMsg>,
256 private_receiver: GenericReceiver<CoreResourceMsg>,
257 memory_reporter: GenericReceiver<CoreResourceMsg>,
258 revoke_receiver: GenericReceiver<CoreResourceMsg>,
259 refresh_receiver: GenericReceiver<CoreResourceMsg>,
260 protocols: Arc<ProtocolRegistry>,
261 embedder_proxy: GenericEmbedderProxy<NetToEmbedderMsg>,
262 ) {
263 let (public_http_state, private_http_state) = create_http_states(
264 self.config_dir.as_deref(),
265 self.ca_certificates.clone(),
266 self.ignore_certificate_errors,
267 embedder_proxy,
268 );
269
270 let mut rx_set = GenericReceiverSet::new();
271 let private_id = rx_set.add(private_receiver);
272 let public_id = rx_set.add(public_receiver);
273 let reporter_id = rx_set.add(memory_reporter);
274 let revoker_id = rx_set.add(revoke_receiver);
275 let refresh_id = rx_set.add(refresh_receiver);
276
277 loop {
278 for received in rx_set.select().into_iter() {
279 match received {
281 GenericSelectionResult::ChannelClosed(_) => continue,
282 GenericSelectionResult::Error(error) => {
283 log::error!("Found selection error: {error}")
284 },
285 GenericSelectionResult::MessageReceived(id, msg) => {
286 if id == revoker_id {
287 let CoreResourceMsg::RevokeTokenForFile(revocation_request) = msg
288 else {
289 log::error!("Blob revocation channel received unexpected message");
290 continue;
291 };
292 self.resource_manager.filemanager.invalidate_token(
293 &FileTokenCheck::Required(revocation_request.token),
294 &revocation_request.blob_id,
295 )
296 } else if id == refresh_id {
297 let CoreResourceMsg::RefreshTokenForFile(refresh_request) = msg else {
298 log::error!("Blob revocation channel received unexpected message");
299 continue;
300 };
301
302 let FileTokenCheck::Required(refreshed_token) = self
303 .resource_manager
304 .filemanager
305 .get_token_for_file(&refresh_request.blob_id, true)
306 else {
307 unreachable!();
308 };
309 let _ = refresh_request.new_token_sender.send(refreshed_token);
310 } else if id == reporter_id {
311 if let CoreResourceMsg::CollectMemoryReport(report_chan) = msg {
312 self.process_report(
313 report_chan,
314 &public_http_state,
315 &private_http_state,
316 );
317 continue;
318 } else {
319 log::error!("memory reporter should only send CollectMemoryReport");
320 }
321 } else {
322 let group = if id == private_id {
323 &private_http_state
324 } else {
325 assert_eq!(id, public_id);
326 &public_http_state
327 };
328 if !self.process_msg(msg, group, Arc::clone(&protocols)) {
329 return;
330 }
331 }
332 },
333 }
334 }
335 }
336 }
337
338 fn process_report(
339 &mut self,
340 msg: ReportsChan,
341 public_http_state: &Arc<HttpState>,
342 private_http_state: &Arc<HttpState>,
343 ) {
344 perform_memory_report(|ops| {
345 let mut reports = public_http_state.memory_reports("public", ops);
346 reports.extend(private_http_state.memory_reports("private", ops));
347 reports.extend(vec![
348 Report {
349 path: path!["hsts-preload-list"],
350 kind: ReportKind::ExplicitJemallocHeapSize,
351 size: hsts::hsts_preload_size_of(ops),
352 },
353 Report {
354 path: path!["public-suffix-list"],
355 kind: ReportKind::ExplicitJemallocHeapSize,
356 size: public_suffix_list_size_of(ops),
357 },
358 ]);
359 msg.send(ProcessReports::new(reports));
360 })
361 }
362
363 fn cancellation_listener(&self, request_id: RequestId) -> Option<Arc<CancellationListener>> {
364 self.cancellation_listeners
365 .get(&request_id)
366 .and_then(Weak::upgrade)
367 }
368
369 fn get_or_create_cancellation_listener(
370 &mut self,
371 request_id: RequestId,
372 ) -> Arc<CancellationListener> {
373 if let Some(listener) = self.cancellation_listener(request_id) {
374 return listener;
375 }
376
377 self.cancellation_listeners
379 .retain(|_, listener| listener.strong_count() > 0);
380
381 let cancellation_listener = Arc::new(Default::default());
382 self.cancellation_listeners
383 .insert(request_id, Arc::downgrade(&cancellation_listener));
384 cancellation_listener
385 }
386
387 fn send_cookie_response(&self, store_id: CookieStoreId, data: CookieData) {
388 let Some(sender) = self.cookie_listeners.get(&store_id) else {
389 warn!(
390 "Async cookie request made for store id that is non-existent {:?}",
391 store_id
392 );
393 return;
394 };
395 let res = sender.send(CookieAsyncResponse { data });
396 if res.is_err() {
397 warn!("Unable to send cookie response to script thread");
398 }
399 }
400
401 fn process_msg(
403 &mut self,
404 msg: CoreResourceMsg,
405 http_state: &Arc<HttpState>,
406 protocols: Arc<ProtocolRegistry>,
407 ) -> bool {
408 match msg {
409 CoreResourceMsg::Fetch(request_builder, channels) => match channels {
410 FetchChannels::ResponseMsg(sender) => {
411 let cancellation_listener =
412 self.get_or_create_cancellation_listener(request_builder.id);
413 self.resource_manager.fetch(
414 request_builder,
415 None,
416 sender,
417 http_state,
418 cancellation_listener,
419 protocols,
420 );
421 },
422 FetchChannels::WebSocket {
423 event_sender,
424 action_receiver,
425 } => {
426 let cancellation_listener =
427 self.get_or_create_cancellation_listener(request_builder.id);
428
429 self.resource_manager.websocket_connect(
430 request_builder,
431 event_sender,
432 action_receiver,
433 http_state,
434 cancellation_listener,
435 protocols,
436 )
437 },
438 FetchChannels::Prefetch => self.resource_manager.fetch(
439 request_builder,
440 None,
441 DiscardFetch,
442 http_state,
443 Arc::new(Default::default()),
444 protocols,
445 ),
446 },
447 CoreResourceMsg::Cancel(request_ids) => {
448 for cancellation_listener in request_ids
449 .into_iter()
450 .filter_map(|request_id| self.cancellation_listener(request_id))
451 {
452 cancellation_listener.cancel();
453 }
454 },
455 CoreResourceMsg::DeleteCookiesForSites(sites, sender) => {
456 http_state
457 .cookie_jar
458 .write()
459 .delete_cookies_for_sites(&sites);
460 let _ = sender.send(());
461 },
462 CoreResourceMsg::DeleteCookies(request, sender) => {
463 http_state
464 .cookie_jar
465 .write()
466 .clear_storage(request.as_ref());
467 if let Some(sender) = sender {
468 let _ = sender.send(());
469 }
470 return true;
471 },
472 CoreResourceMsg::DeleteCookie(request, name) => {
473 http_state
474 .cookie_jar
475 .write()
476 .delete_cookie_with_name(&request, name);
477 return true;
478 },
479 CoreResourceMsg::DeleteCookieAsync(cookie_store_id, url, name) => {
480 http_state
481 .cookie_jar
482 .write()
483 .delete_cookie_with_name(&url, name);
484 self.send_cookie_response(cookie_store_id, CookieData::Delete(Ok(())));
485 },
486 CoreResourceMsg::FetchRedirect(request_builder, res_init, sender) => {
487 let cancellation_listener =
488 self.get_or_create_cancellation_listener(request_builder.id);
489 self.resource_manager.fetch(
490 request_builder,
491 Some(res_init),
492 sender,
493 http_state,
494 cancellation_listener,
495 protocols,
496 )
497 },
498 CoreResourceMsg::SetCookieForUrl(request, cookie, source, sender) => {
499 self.resource_manager.set_cookie_for_url(
500 &request,
501 cookie.into_inner().to_owned(),
502 source,
503 http_state,
504 );
505 if let Some(sender) = sender {
506 let _ = sender.send(());
507 }
508 },
509 CoreResourceMsg::SetCookiesForUrl(request, cookies, source) => {
510 for cookie in cookies {
511 self.resource_manager.set_cookie_for_url(
512 &request,
513 cookie.into_inner(),
514 source,
515 http_state,
516 );
517 }
518 },
519 CoreResourceMsg::SetCookieForUrlAsync(cookie_store_id, url, cookie, source) => {
520 self.resource_manager.set_cookie_for_url(
521 &url,
522 cookie.into_inner().to_owned(),
523 source,
524 http_state,
525 );
526 self.send_cookie_response(cookie_store_id, CookieData::Set(Ok(())));
527 },
528 CoreResourceMsg::GetCookieStringForUrl(url, consumer, source) => {
529 let mut cookie_jar = http_state.cookie_jar.write();
530 cookie_jar.remove_expired_cookies_for_url(&url);
531 consumer
532 .send(cookie_jar.cookies_for_url(&url, source))
533 .unwrap();
534 },
535 CoreResourceMsg::GetCookiesForUrl(url, consumer, source) => {
536 let mut cookie_jar = http_state.cookie_jar.write();
537 cookie_jar.remove_expired_cookies_for_url(&url);
538 let cookies = cookie_jar
539 .cookies_data_for_url(&url, source)
540 .map(Serde)
541 .collect();
542 consumer.send(cookies).unwrap();
543 },
544 CoreResourceMsg::GetCookieDataForUrlAsync(cookie_store_id, url, name) => {
545 let mut cookie_jar = http_state.cookie_jar.write();
546 cookie_jar.remove_expired_cookies_for_url(&url);
547 let cookie = cookie_jar
548 .query_cookies(&url, name)
549 .into_iter()
550 .map(Serde)
551 .next();
552 self.send_cookie_response(cookie_store_id, CookieData::Get(cookie));
553 },
554 CoreResourceMsg::GetAllCookieDataForUrlAsync(cookie_store_id, url, name) => {
555 let mut cookie_jar = http_state.cookie_jar.write();
556 cookie_jar.remove_expired_cookies_for_url(&url);
557 let cookies = cookie_jar
558 .query_cookies(&url, name)
559 .into_iter()
560 .map(Serde)
561 .collect();
562 self.send_cookie_response(cookie_store_id, CookieData::GetAll(cookies));
563 },
564 CoreResourceMsg::EmbedderGetCookiesForUrl(operation_id, url, source) => {
565 let mut cookie_jar = http_state.cookie_jar.write();
566 cookie_jar.remove_expired_cookies_for_url(&url);
567 let cookies: Vec<Cookie<'static>> =
568 cookie_jar.cookies_data_for_url(&url, source).collect();
569 http_state
570 .embedder_proxy
571 .send(NetToEmbedderMsg::EmbedderGetCookiesForUrlResponse(
572 operation_id,
573 cookies,
574 ));
575 },
576 CoreResourceMsg::EmbedderSetCookieForUrl(operation_id, url, cookie, source) => {
577 self.resource_manager.set_cookie_for_url(
578 &url,
579 cookie.into_inner(),
580 source,
581 http_state,
582 );
583 http_state
584 .embedder_proxy
585 .send(NetToEmbedderMsg::EmbedderSetCookieForUrlResponse(
586 operation_id,
587 ));
588 },
589 CoreResourceMsg::NewCookieListener(cookie_store_id, callback, _url) => {
590 self.cookie_listeners.insert(cookie_store_id, callback);
592 },
593 CoreResourceMsg::RemoveCookieListener(cookie_store_id) => {
594 self.cookie_listeners.remove(&cookie_store_id);
595 },
596 CoreResourceMsg::NetworkMediator(mediator_chan, origin) => {
597 self.resource_manager
598 .sw_managers
599 .insert(origin, mediator_chan);
600 },
601 CoreResourceMsg::ListCookies(sender) => {
602 let mut cookie_jar = http_state.cookie_jar.write();
603 cookie_jar.remove_all_expired_cookies();
604 let _ = sender.send(cookie_jar.cookie_site_descriptors());
605 },
606 CoreResourceMsg::GetHistoryState(history_state_id, consumer) => {
607 let history_states = http_state.history_states.read();
608 consumer
609 .send(history_states.get(&history_state_id).cloned())
610 .unwrap();
611 },
612 CoreResourceMsg::SetHistoryState(history_state_id, structured_data) => {
613 let mut history_states = http_state.history_states.write();
614 history_states.insert(history_state_id, structured_data);
615 },
616 CoreResourceMsg::RemoveHistoryStates(states_to_remove) => {
617 let mut history_states = http_state.history_states.write();
618 for history_state in states_to_remove {
619 history_states.remove(&history_state);
620 }
621 },
622 CoreResourceMsg::GetCacheEntries(sender) => {
623 let _ = sender.send(http_state.http_cache.cache_entry_descriptors());
624 },
625 CoreResourceMsg::ClearCache(sender) => {
626 http_state.http_cache.clear();
627 if let Some(sender) = sender {
628 let _ = sender.send(());
629 }
630 },
631 CoreResourceMsg::ToFileManager(msg) => self.resource_manager.filemanager.handle(msg),
632 CoreResourceMsg::StorePreloadedResponse(preload_id, response) => self
633 .resource_manager
634 .handle_preloaded_response(preload_id, response),
635 CoreResourceMsg::TotalSizeOfInFlightKeepAliveRecords(pipeline_id, sender) => {
636 let total = self
637 .resource_manager
638 .in_flight_keep_alive_records
639 .lock()
640 .get(&pipeline_id)
641 .map(|records| {
642 records
643 .iter()
644 .map(|record| record.keep_alive_body_length)
645 .sum()
646 })
647 .unwrap_or_default();
648 let _ = sender.send(total);
649 },
650 CoreResourceMsg::Exit(sender) => {
651 if let Some(ref config_dir) = self.config_dir {
652 let auth_cache = http_state.auth_cache.read();
653 servo_base::write_json_to_file(&*auth_cache, config_dir, "auth_cache.json");
654 let jar = http_state.cookie_jar.read();
655 servo_base::write_json_to_file(&*jar, config_dir, "cookie_jar.json");
656 let hsts = http_state.hsts_list.read();
657 servo_base::write_json_to_file(&*hsts, config_dir, "hsts_list.json");
658 }
659 self.resource_manager.exit();
660 let _ = sender.send(());
661 return false;
662 },
663 CoreResourceMsg::CollectMemoryReport(_) |
665 CoreResourceMsg::RevokeTokenForFile(..) |
666 CoreResourceMsg::RefreshTokenForFile(..) => {},
667 }
668 true
669 }
670}
671
672#[derive(Clone, Debug, Deserialize, Serialize)]
673pub struct AuthCacheEntry {
674 pub user_name: String,
675 pub password: String,
676}
677
678impl Default for AuthCache {
679 fn default() -> Self {
680 Self {
681 version: 1,
682 entries: HashMap::new(),
683 }
684 }
685}
686
687#[derive(Clone, Debug, Deserialize, Serialize)]
688pub struct AuthCache {
689 pub version: u32,
690 pub entries: HashMap<String, AuthCacheEntry>,
691}
692
693pub struct CoreResourceManager {
694 devtools_sender: Option<Sender<DevtoolsControlMsg>>,
695 sw_managers: HashMap<ImmutableOrigin, IpcSender<CustomResponseMediator>>,
696 filemanager: FileManager,
697 request_interceptor: RequestInterceptor,
698 ca_certificates: CACertificates<'static>,
699 ignore_certificate_errors: bool,
700 preloaded_resources: SharedPreloadedResources,
701 in_flight_keep_alive_records: SharedInflightKeepAliveRecords,
703}
704
705impl CoreResourceManager {
706 pub fn new(
707 devtools_sender: Option<Sender<DevtoolsControlMsg>>,
708 _profiler_chan: ProfilerChan,
709 embedder_proxy: GenericEmbedderProxy<NetToEmbedderMsg>,
710 ca_certificates: CACertificates<'static>,
711 ignore_certificate_errors: bool,
712 blob_token_communicator: Arc<Mutex<BlobTokenCommunicator>>,
713 ) -> CoreResourceManager {
714 CoreResourceManager {
715 devtools_sender,
716 sw_managers: Default::default(),
717 filemanager: FileManager::new(embedder_proxy.clone(), blob_token_communicator),
718 request_interceptor: RequestInterceptor::new(embedder_proxy),
719 ca_certificates,
720 ignore_certificate_errors,
721 preloaded_resources: Default::default(),
722 in_flight_keep_alive_records: Default::default(),
723 }
724 }
725
726 fn handle_preloaded_response(&self, preload_id: PreloadId, response: Response) {
727 let mut preloaded_resources = self.preloaded_resources.lock().unwrap();
728 if let Some(entry) = preloaded_resources.get_mut(&preload_id) {
729 entry.with_response(response);
730 }
731 }
732
733 pub fn exit(&mut self) {
735 debug!("Exited CoreResourceManager");
736 }
737
738 fn set_cookie_for_url(
739 &mut self,
740 request: &ServoUrl,
741 cookie: Cookie<'static>,
742 source: CookieSource,
743 http_state: &Arc<HttpState>,
744 ) {
745 if let Some(cookie) = ServoCookie::new_wrapped(cookie, request, source) {
746 let mut cookie_jar = http_state.cookie_jar.write();
747 cookie_jar.push(cookie, request, source)
748 }
749 }
750
751 fn fetch<Target: 'static + FetchTaskTarget + Send>(
752 &self,
753 request_builder: RequestBuilder,
754 res_init_: Option<ResponseInit>,
755 mut sender: Target,
756 http_state: &Arc<HttpState>,
757 cancellation_listener: Arc<CancellationListener>,
758 protocols: Arc<ProtocolRegistry>,
759 ) {
760 let http_state = http_state.clone();
761 let devtools_chan = self.devtools_sender.clone();
762 let filemanager = self.filemanager.clone();
763 let request_interceptor = self.request_interceptor.clone();
764
765 let timing_type = match request_builder.destination {
766 Destination::Document => ResourceTimingType::Navigation,
767 _ => ResourceTimingType::Resource,
768 };
769
770 let request = request_builder.build();
771 let url = request.current_url();
772
773 let (file_token, blob_url_file_id) = match url.scheme() {
779 "blob" => {
780 if let Some(token) = request.current_url_with_blob_claim().token() {
781 (FileTokenCheck::Required(token.token), Some(token.file_id))
782 } else if let Ok((id, _)) = parse_blob_url(&url) {
783 log::warn!(
785 "Failed to claim blob URL entry of valid blob URL before passing it to `net`. This causes race conditions."
786 );
787 (self.filemanager.get_token_for_file(&id, false), Some(id))
788 } else {
789 (FileTokenCheck::ShouldFail, None)
790 }
791 },
792 _ => (FileTokenCheck::NotRequired, None),
793 };
794
795 let ca_certificates = self.ca_certificates.clone();
796 let ignore_certificate_errors = self.ignore_certificate_errors;
797 let in_flight_keep_alive_records = self.in_flight_keep_alive_records.clone();
798 let preloaded_resources = self.preloaded_resources.clone();
799 if let Some(ref preload_id) = request.preload_id {
800 let mut preloaded_resources = self.preloaded_resources.lock().unwrap();
801 let entry = PreloadEntry::new(request.integrity_metadata.clone());
802 preloaded_resources.insert(preload_id.clone(), entry);
803 }
804
805 spawn_task(async move {
806 let context = FetchContext {
811 state: http_state,
812 user_agent: servo_config::pref!(user_agent),
813 devtools_chan,
814 filemanager,
815 file_token,
816 request_interceptor: Arc::new(TokioMutex::new(request_interceptor)),
817 cancellation_listener,
818 timing: ResourceFetchTiming::new(request.timing_type()).into(),
819 protocols,
820 websocket_chan: None,
821 ca_certificates,
822 ignore_certificate_errors,
823 preloaded_resources,
824 in_flight_keep_alive_records,
825 };
826
827 match res_init_ {
828 Some(res_init) => {
829 let response = Response::from_init(res_init, timing_type);
830
831 let mut fetch_params = FetchParams::new(request);
832 let mut request_body_stream_closer =
833 AutoRequestBodyStreamCloser::new(fetch_params.request.body.as_ref());
834 let response = http_redirect_fetch(
835 &mut fetch_params,
836 &mut CorsCache::default(),
837 response,
838 true,
839 &mut sender,
840 &mut None,
841 &context,
842 )
843 .await;
844 if transfers_request_body_stream_to_later_manual_redirect(
845 &fetch_params.request,
846 &response,
847 ) {
848 request_body_stream_closer.disarm();
849 }
850 },
851 None => {
852 fetch(request, &mut sender, &context).await;
853 },
854 };
855
856 if let Some(id) = blob_url_file_id.as_ref() {
858 context
859 .filemanager
860 .invalidate_token(&context.file_token, id);
861 }
862 });
863 }
864
865 fn websocket_connect(
867 &self,
868 mut request: RequestBuilder,
869 event_sender: IpcSender<WebSocketNetworkEvent>,
870 action_receiver: CallbackSetter<WebSocketDomAction>,
871 http_state: &Arc<HttpState>,
872 cancellation_listener: Arc<CancellationListener>,
873 protocols: Arc<ProtocolRegistry>,
874 ) {
875 let http_state = http_state.clone();
876 let devtools_chan = self.devtools_sender.clone();
877 let filemanager = self.filemanager.clone();
878 let request_interceptor = self.request_interceptor.clone();
879
880 let ca_certificates = self.ca_certificates.clone();
881 let ignore_certificate_errors = self.ignore_certificate_errors;
882 let in_flight_keep_alive_records = self.in_flight_keep_alive_records.clone();
883 let preloaded_resources = self.preloaded_resources.clone();
884
885 spawn_task(async move {
886 let mut event_sender = event_sender;
887
888 let scheme = match request.url.scheme() {
891 "ws" => "http",
892 _ => "https",
893 };
894 request
895 .url
896 .as_mut_url()
897 .set_scheme(scheme)
898 .unwrap_or_else(|_| panic!("Can't set scheme to {scheme}"));
899
900 match create_handshake_request(request, http_state.clone()) {
901 Ok(request) => {
902 let context = FetchContext {
903 state: http_state,
904 user_agent: servo_config::pref!(user_agent),
905 devtools_chan,
906 filemanager,
907 file_token: FileTokenCheck::NotRequired,
908 request_interceptor: Arc::new(TokioMutex::new(request_interceptor)),
909 cancellation_listener,
910 timing: ResourceFetchTiming::new(request.timing_type()).into(),
911 protocols: protocols.clone(),
912 websocket_chan: Some(Arc::new(Mutex::new(WebSocketChannel::new(
913 event_sender.clone(),
914 Some(action_receiver),
915 )))),
916 ca_certificates,
917 ignore_certificate_errors,
918 preloaded_resources,
919 in_flight_keep_alive_records,
920 };
921 fetch(request, &mut event_sender, &context).await;
922 },
923 Err(e) => {
924 trace!("unable to create websocket handshake request {:?}", e);
925 let _ = event_sender.send(WebSocketNetworkEvent::Fail);
926 },
927 }
928 });
929 }
930}