net/
resource_thread.rs

1/* This Source Code Form is subject to the terms of the Mozilla Public
2 * License, v. 2.0. If a copy of the MPL was not distributed with this
3 * file, You can obtain one at https://mozilla.org/MPL/2.0/. */
4
5//! A thread that takes a URL and streams back the binary data.
6
7use std::borrow::ToOwned;
8use std::collections::HashMap;
9use std::fs::File;
10use std::io::{self, BufReader};
11use std::path::{Path, PathBuf};
12use std::sync::{Arc, Weak};
13use std::thread;
14
15use cookie::Cookie;
16use crossbeam_channel::Sender;
17use devtools_traits::DevtoolsControlMsg;
18use embedder_traits::GenericEmbedderProxy;
19use hyper_serde::Serde;
20use ipc_channel::ipc::IpcSender;
21use log::{debug, trace, warn};
22use net_traits::blob_url_store::{BlobTokenCommunicator, parse_blob_url};
23use net_traits::filemanager_thread::FileTokenCheck;
24use net_traits::pub_domains::public_suffix_list_size_of;
25use net_traits::request::{Destination, PreloadEntry, PreloadId, RequestBuilder, RequestId};
26use net_traits::response::{Response, ResponseInit};
27use net_traits::{
28    AsyncRuntime, CookieAsyncResponse, CookieData, CookieSource, CoreResourceMsg,
29    CoreResourceThread, CustomResponseMediator, DiscardFetch, FetchChannels, FetchTaskTarget,
30    ResourceFetchTiming, ResourceThreads, ResourceTimingType, WebSocketDomAction,
31    WebSocketNetworkEvent,
32};
33use parking_lot::{Mutex, RwLock};
34use profile_traits::mem::{
35    ProcessReports, ProfilerChan as MemProfilerChan, Report, ReportKind, ReportsChan,
36    perform_memory_report,
37};
38use profile_traits::path;
39use profile_traits::time::ProfilerChan;
40use rustc_hash::FxHashMap;
41use rustls_pki_types::CertificateDer;
42use rustls_pki_types::pem::PemObject;
43use serde::{Deserialize, Serialize};
44use servo_base::generic_channel::{
45    self, CallbackSetter, GenericCallback, GenericReceiver, GenericReceiverSet,
46    GenericSelectionResult,
47};
48use servo_base::id::CookieStoreId;
49use servo_url::{ImmutableOrigin, ServoUrl};
50use tokio::sync::Mutex as TokioMutex;
51
52use crate::async_runtime::{init_async_runtime, spawn_task};
53use crate::connector::{
54    CACertificates, CertificateErrorOverrideManager, create_http_client, create_tls_config,
55};
56use crate::cookie::ServoCookie;
57use crate::cookie_storage::CookieStorage;
58use crate::embedder::NetToEmbedderMsg;
59use crate::fetch::cors_cache::CorsCache;
60use crate::fetch::fetch_params::{FetchParams, SharedPreloadedResources};
61use crate::fetch::methods::{
62    AutoRequestBodyStreamCloser, CancellationListener, FetchContext,
63    SharedInflightKeepAliveRecords, WebSocketChannel, fetch,
64    transfers_request_body_stream_to_later_manual_redirect,
65};
66use crate::filemanager_thread::FileManager;
67use crate::hsts::{self, HstsList};
68use crate::http_cache::HttpCache;
69use crate::http_loader::{HttpState, http_redirect_fetch};
70use crate::protocols::ProtocolRegistry;
71use crate::request_interceptor::RequestInterceptor;
72use crate::websocket_loader::create_handshake_request;
73
74/// Load a file with CA certificate and produce a RootCertStore with the results.
75fn load_root_cert_store_from_file(file_path: String) -> io::Result<Vec<CertificateDer<'static>>> {
76    let mut pem = BufReader::new(File::open(file_path)?);
77
78    let certs = CertificateDer::pem_reader_iter(&mut pem)
79        .filter_map(|cert| {
80            cert.inspect_err(|e| log::error!("Could not load certificate ({e}). Ignoring it."))
81                .ok()
82        })
83        .collect();
84    Ok(certs)
85}
86
87/// Returns a tuple of (public, private) senders to the new threads.
88#[expect(clippy::too_many_arguments)]
89pub fn new_resource_threads(
90    devtools_sender: Option<Sender<DevtoolsControlMsg>>,
91    time_profiler_chan: ProfilerChan,
92    mem_profiler_chan: MemProfilerChan,
93    embedder_proxy: GenericEmbedderProxy<NetToEmbedderMsg>,
94    config_dir: Option<PathBuf>,
95    certificate_path: Option<String>,
96    ignore_certificate_errors: bool,
97    protocols: Arc<ProtocolRegistry>,
98) -> (ResourceThreads, ResourceThreads, Box<dyn AsyncRuntime>) {
99    // Initialize the async runtime, and get a handle to it for use in clean shutdown.
100    let async_runtime = init_async_runtime();
101
102    let ca_certificates = certificate_path
103        .and_then(|path| {
104            Some(CACertificates::Override(
105                load_root_cert_store_from_file(path).ok()?,
106            ))
107        })
108        .unwrap_or_default();
109
110    let (public_core, private_core) = new_core_resource_thread(
111        devtools_sender,
112        time_profiler_chan,
113        mem_profiler_chan,
114        embedder_proxy,
115        config_dir,
116        ca_certificates,
117        ignore_certificate_errors,
118        protocols,
119    );
120    (
121        ResourceThreads::new(public_core),
122        ResourceThreads::new(private_core),
123        async_runtime,
124    )
125}
126
127/// Create a CoreResourceThread
128#[expect(clippy::too_many_arguments)]
129pub fn new_core_resource_thread(
130    devtools_sender: Option<Sender<DevtoolsControlMsg>>,
131    time_profiler_chan: ProfilerChan,
132    mem_profiler_chan: MemProfilerChan,
133    embedder_proxy: GenericEmbedderProxy<NetToEmbedderMsg>,
134    config_dir: Option<PathBuf>,
135    ca_certificates: CACertificates<'static>,
136    ignore_certificate_errors: bool,
137    protocols: Arc<ProtocolRegistry>,
138) -> (CoreResourceThread, CoreResourceThread) {
139    let (public_setup_chan, public_setup_port) = generic_channel::channel().unwrap();
140    let (private_setup_chan, private_setup_port) = generic_channel::channel().unwrap();
141    let (report_chan, report_port) = generic_channel::channel().unwrap();
142    let (revoke_sender, revoke_receiver) = generic_channel::channel().unwrap();
143    let (refresh_sender, refresh_receiver) = generic_channel::channel().unwrap();
144
145    let blob_token_communicator = Arc::new(Mutex::new(BlobTokenCommunicator {
146        revoke_sender,
147        refresh_token_sender: refresh_sender,
148    }));
149    thread::Builder::new()
150        .name("ResourceManager".to_owned())
151        .spawn(move || {
152            let resource_manager = CoreResourceManager::new(
153                devtools_sender,
154                time_profiler_chan,
155                embedder_proxy.clone(),
156                ca_certificates.clone(),
157                ignore_certificate_errors,
158                blob_token_communicator,
159            );
160
161            let mut channel_manager = ResourceChannelManager {
162                resource_manager,
163                config_dir,
164                ca_certificates,
165                ignore_certificate_errors,
166                cancellation_listeners: Default::default(),
167                cookie_listeners: Default::default(),
168            };
169
170            mem_profiler_chan.run_with_memory_reporting(
171                || {
172                    channel_manager.start(
173                        public_setup_port,
174                        private_setup_port,
175                        report_port,
176                        revoke_receiver,
177                        refresh_receiver,
178                        protocols,
179                        embedder_proxy,
180                    )
181                },
182                String::from("network-cache-reporter"),
183                report_chan,
184                CoreResourceMsg::CollectMemoryReport,
185            );
186        })
187        .expect("Thread spawning failed");
188    (public_setup_chan, private_setup_chan)
189}
190
191struct ResourceChannelManager {
192    resource_manager: CoreResourceManager,
193    config_dir: Option<PathBuf>,
194    ca_certificates: CACertificates<'static>,
195    ignore_certificate_errors: bool,
196    cancellation_listeners: FxHashMap<RequestId, Weak<CancellationListener>>,
197    cookie_listeners: FxHashMap<CookieStoreId, GenericCallback<CookieAsyncResponse>>,
198}
199
200/// This returns a tuple HttpState and a private HttpState.
201fn create_http_states(
202    config_dir: Option<&Path>,
203    ca_certificates: CACertificates<'static>,
204    ignore_certificate_errors: bool,
205    embedder_proxy: GenericEmbedderProxy<NetToEmbedderMsg>,
206) -> (Arc<HttpState>, Arc<HttpState>) {
207    let mut hsts_list = HstsList::default();
208    let mut auth_cache = AuthCache::default();
209    let mut cookie_jar = CookieStorage::new(150);
210    if let Some(config_dir) = config_dir {
211        servo_base::read_json_from_file(&mut auth_cache, config_dir, "auth_cache.json");
212        servo_base::read_json_from_file(&mut hsts_list, config_dir, "hsts_list.json");
213        servo_base::read_json_from_file(&mut cookie_jar, config_dir, "cookie_jar.json");
214    }
215
216    let override_manager = CertificateErrorOverrideManager::new();
217    let http_state = HttpState {
218        hsts_list: RwLock::new(hsts_list),
219        cookie_jar: RwLock::new(cookie_jar),
220        auth_cache: RwLock::new(auth_cache),
221        history_states: RwLock::new(FxHashMap::default()),
222        http_cache: HttpCache::default(),
223        client: create_http_client(create_tls_config(
224            ca_certificates.clone(),
225            ignore_certificate_errors,
226            override_manager.clone(),
227        )),
228        override_manager,
229        embedder_proxy: embedder_proxy.clone(),
230    };
231
232    let override_manager = CertificateErrorOverrideManager::new();
233    let private_http_state = HttpState {
234        hsts_list: RwLock::new(HstsList::default()),
235        cookie_jar: RwLock::new(CookieStorage::new(150)),
236        auth_cache: RwLock::new(AuthCache::default()),
237        history_states: RwLock::new(FxHashMap::default()),
238        http_cache: HttpCache::default(),
239        client: create_http_client(create_tls_config(
240            ca_certificates,
241            ignore_certificate_errors,
242            override_manager.clone(),
243        )),
244        override_manager,
245        embedder_proxy,
246    };
247
248    (Arc::new(http_state), Arc::new(private_http_state))
249}
250
251impl ResourceChannelManager {
252    #[expect(clippy::too_many_arguments)]
253    fn start(
254        &mut self,
255        public_receiver: GenericReceiver<CoreResourceMsg>,
256        private_receiver: GenericReceiver<CoreResourceMsg>,
257        memory_reporter: GenericReceiver<CoreResourceMsg>,
258        revoke_receiver: GenericReceiver<CoreResourceMsg>,
259        refresh_receiver: GenericReceiver<CoreResourceMsg>,
260        protocols: Arc<ProtocolRegistry>,
261        embedder_proxy: GenericEmbedderProxy<NetToEmbedderMsg>,
262    ) {
263        let (public_http_state, private_http_state) = create_http_states(
264            self.config_dir.as_deref(),
265            self.ca_certificates.clone(),
266            self.ignore_certificate_errors,
267            embedder_proxy,
268        );
269
270        let mut rx_set = GenericReceiverSet::new();
271        let private_id = rx_set.add(private_receiver);
272        let public_id = rx_set.add(public_receiver);
273        let reporter_id = rx_set.add(memory_reporter);
274        let revoker_id = rx_set.add(revoke_receiver);
275        let refresh_id = rx_set.add(refresh_receiver);
276
277        loop {
278            for received in rx_set.select().into_iter() {
279                // Handles case where profiler thread shuts down before resource thread.
280                match received {
281                    GenericSelectionResult::ChannelClosed(_) => continue,
282                    GenericSelectionResult::Error(error) => {
283                        log::error!("Found selection error: {error}")
284                    },
285                    GenericSelectionResult::MessageReceived(id, msg) => {
286                        if id == revoker_id {
287                            let CoreResourceMsg::RevokeTokenForFile(revocation_request) = msg
288                            else {
289                                log::error!("Blob revocation channel received unexpected message");
290                                continue;
291                            };
292                            self.resource_manager.filemanager.invalidate_token(
293                                &FileTokenCheck::Required(revocation_request.token),
294                                &revocation_request.blob_id,
295                            )
296                        } else if id == refresh_id {
297                            let CoreResourceMsg::RefreshTokenForFile(refresh_request) = msg else {
298                                log::error!("Blob revocation channel received unexpected message");
299                                continue;
300                            };
301
302                            let FileTokenCheck::Required(refreshed_token) = self
303                                .resource_manager
304                                .filemanager
305                                .get_token_for_file(&refresh_request.blob_id, true)
306                            else {
307                                unreachable!();
308                            };
309                            let _ = refresh_request.new_token_sender.send(refreshed_token);
310                        } else if id == reporter_id {
311                            if let CoreResourceMsg::CollectMemoryReport(report_chan) = msg {
312                                self.process_report(
313                                    report_chan,
314                                    &public_http_state,
315                                    &private_http_state,
316                                );
317                                continue;
318                            } else {
319                                log::error!("memory reporter should only send CollectMemoryReport");
320                            }
321                        } else {
322                            let group = if id == private_id {
323                                &private_http_state
324                            } else {
325                                assert_eq!(id, public_id);
326                                &public_http_state
327                            };
328                            if !self.process_msg(msg, group, Arc::clone(&protocols)) {
329                                return;
330                            }
331                        }
332                    },
333                }
334            }
335        }
336    }
337
338    fn process_report(
339        &mut self,
340        msg: ReportsChan,
341        public_http_state: &Arc<HttpState>,
342        private_http_state: &Arc<HttpState>,
343    ) {
344        perform_memory_report(|ops| {
345            let mut reports = public_http_state.memory_reports("public", ops);
346            reports.extend(private_http_state.memory_reports("private", ops));
347            reports.extend(vec![
348                Report {
349                    path: path!["hsts-preload-list"],
350                    kind: ReportKind::ExplicitJemallocHeapSize,
351                    size: hsts::hsts_preload_size_of(ops),
352                },
353                Report {
354                    path: path!["public-suffix-list"],
355                    kind: ReportKind::ExplicitJemallocHeapSize,
356                    size: public_suffix_list_size_of(ops),
357                },
358            ]);
359            msg.send(ProcessReports::new(reports));
360        })
361    }
362
363    fn cancellation_listener(&self, request_id: RequestId) -> Option<Arc<CancellationListener>> {
364        self.cancellation_listeners
365            .get(&request_id)
366            .and_then(Weak::upgrade)
367    }
368
369    fn get_or_create_cancellation_listener(
370        &mut self,
371        request_id: RequestId,
372    ) -> Arc<CancellationListener> {
373        if let Some(listener) = self.cancellation_listener(request_id) {
374            return listener;
375        }
376
377        // Clear away any cancellation listeners that are no longer valid.
378        self.cancellation_listeners
379            .retain(|_, listener| listener.strong_count() > 0);
380
381        let cancellation_listener = Arc::new(Default::default());
382        self.cancellation_listeners
383            .insert(request_id, Arc::downgrade(&cancellation_listener));
384        cancellation_listener
385    }
386
387    fn send_cookie_response(&self, store_id: CookieStoreId, data: CookieData) {
388        let Some(sender) = self.cookie_listeners.get(&store_id) else {
389            warn!(
390                "Async cookie request made for store id that is non-existent {:?}",
391                store_id
392            );
393            return;
394        };
395        let res = sender.send(CookieAsyncResponse { data });
396        if res.is_err() {
397            warn!("Unable to send cookie response to script thread");
398        }
399    }
400
401    /// Returns false if the thread should exit.
402    fn process_msg(
403        &mut self,
404        msg: CoreResourceMsg,
405        http_state: &Arc<HttpState>,
406        protocols: Arc<ProtocolRegistry>,
407    ) -> bool {
408        match msg {
409            CoreResourceMsg::Fetch(request_builder, channels) => match channels {
410                FetchChannels::ResponseMsg(sender) => {
411                    let cancellation_listener =
412                        self.get_or_create_cancellation_listener(request_builder.id);
413                    self.resource_manager.fetch(
414                        request_builder,
415                        None,
416                        sender,
417                        http_state,
418                        cancellation_listener,
419                        protocols,
420                    );
421                },
422                FetchChannels::WebSocket {
423                    event_sender,
424                    action_receiver,
425                } => {
426                    let cancellation_listener =
427                        self.get_or_create_cancellation_listener(request_builder.id);
428
429                    self.resource_manager.websocket_connect(
430                        request_builder,
431                        event_sender,
432                        action_receiver,
433                        http_state,
434                        cancellation_listener,
435                        protocols,
436                    )
437                },
438                FetchChannels::Prefetch => self.resource_manager.fetch(
439                    request_builder,
440                    None,
441                    DiscardFetch,
442                    http_state,
443                    Arc::new(Default::default()),
444                    protocols,
445                ),
446            },
447            CoreResourceMsg::Cancel(request_ids) => {
448                for cancellation_listener in request_ids
449                    .into_iter()
450                    .filter_map(|request_id| self.cancellation_listener(request_id))
451                {
452                    cancellation_listener.cancel();
453                }
454            },
455            CoreResourceMsg::DeleteCookiesForSites(sites, sender) => {
456                http_state
457                    .cookie_jar
458                    .write()
459                    .delete_cookies_for_sites(&sites);
460                let _ = sender.send(());
461            },
462            CoreResourceMsg::DeleteCookies(request, sender) => {
463                http_state
464                    .cookie_jar
465                    .write()
466                    .clear_storage(request.as_ref());
467                if let Some(sender) = sender {
468                    let _ = sender.send(());
469                }
470                return true;
471            },
472            CoreResourceMsg::DeleteCookie(request, name) => {
473                http_state
474                    .cookie_jar
475                    .write()
476                    .delete_cookie_with_name(&request, name);
477                return true;
478            },
479            CoreResourceMsg::DeleteCookieAsync(cookie_store_id, url, name) => {
480                http_state
481                    .cookie_jar
482                    .write()
483                    .delete_cookie_with_name(&url, name);
484                self.send_cookie_response(cookie_store_id, CookieData::Delete(Ok(())));
485            },
486            CoreResourceMsg::FetchRedirect(request_builder, res_init, sender) => {
487                let cancellation_listener =
488                    self.get_or_create_cancellation_listener(request_builder.id);
489                self.resource_manager.fetch(
490                    request_builder,
491                    Some(res_init),
492                    sender,
493                    http_state,
494                    cancellation_listener,
495                    protocols,
496                )
497            },
498            CoreResourceMsg::SetCookieForUrl(request, cookie, source, sender) => {
499                self.resource_manager.set_cookie_for_url(
500                    &request,
501                    cookie.into_inner().to_owned(),
502                    source,
503                    http_state,
504                );
505                if let Some(sender) = sender {
506                    let _ = sender.send(());
507                }
508            },
509            CoreResourceMsg::SetCookiesForUrl(request, cookies, source) => {
510                for cookie in cookies {
511                    self.resource_manager.set_cookie_for_url(
512                        &request,
513                        cookie.into_inner(),
514                        source,
515                        http_state,
516                    );
517                }
518            },
519            CoreResourceMsg::SetCookieForUrlAsync(cookie_store_id, url, cookie, source) => {
520                self.resource_manager.set_cookie_for_url(
521                    &url,
522                    cookie.into_inner().to_owned(),
523                    source,
524                    http_state,
525                );
526                self.send_cookie_response(cookie_store_id, CookieData::Set(Ok(())));
527            },
528            CoreResourceMsg::GetCookieStringForUrl(url, consumer, source) => {
529                let mut cookie_jar = http_state.cookie_jar.write();
530                cookie_jar.remove_expired_cookies_for_url(&url);
531                consumer
532                    .send(cookie_jar.cookies_for_url(&url, source))
533                    .unwrap();
534            },
535            CoreResourceMsg::GetCookiesForUrl(url, consumer, source) => {
536                let mut cookie_jar = http_state.cookie_jar.write();
537                cookie_jar.remove_expired_cookies_for_url(&url);
538                let cookies = cookie_jar
539                    .cookies_data_for_url(&url, source)
540                    .map(Serde)
541                    .collect();
542                consumer.send(cookies).unwrap();
543            },
544            CoreResourceMsg::GetCookieDataForUrlAsync(cookie_store_id, url, name) => {
545                let mut cookie_jar = http_state.cookie_jar.write();
546                cookie_jar.remove_expired_cookies_for_url(&url);
547                let cookie = cookie_jar
548                    .query_cookies(&url, name)
549                    .into_iter()
550                    .map(Serde)
551                    .next();
552                self.send_cookie_response(cookie_store_id, CookieData::Get(cookie));
553            },
554            CoreResourceMsg::GetAllCookieDataForUrlAsync(cookie_store_id, url, name) => {
555                let mut cookie_jar = http_state.cookie_jar.write();
556                cookie_jar.remove_expired_cookies_for_url(&url);
557                let cookies = cookie_jar
558                    .query_cookies(&url, name)
559                    .into_iter()
560                    .map(Serde)
561                    .collect();
562                self.send_cookie_response(cookie_store_id, CookieData::GetAll(cookies));
563            },
564            CoreResourceMsg::EmbedderGetCookiesForUrl(operation_id, url, source) => {
565                let mut cookie_jar = http_state.cookie_jar.write();
566                cookie_jar.remove_expired_cookies_for_url(&url);
567                let cookies: Vec<Cookie<'static>> =
568                    cookie_jar.cookies_data_for_url(&url, source).collect();
569                http_state
570                    .embedder_proxy
571                    .send(NetToEmbedderMsg::EmbedderGetCookiesForUrlResponse(
572                        operation_id,
573                        cookies,
574                    ));
575            },
576            CoreResourceMsg::EmbedderSetCookieForUrl(operation_id, url, cookie, source) => {
577                self.resource_manager.set_cookie_for_url(
578                    &url,
579                    cookie.into_inner(),
580                    source,
581                    http_state,
582                );
583                http_state
584                    .embedder_proxy
585                    .send(NetToEmbedderMsg::EmbedderSetCookieForUrlResponse(
586                        operation_id,
587                    ));
588            },
589            CoreResourceMsg::NewCookieListener(cookie_store_id, callback, _url) => {
590                // TODO: Use the URL for setting up the actual monitoring
591                self.cookie_listeners.insert(cookie_store_id, callback);
592            },
593            CoreResourceMsg::RemoveCookieListener(cookie_store_id) => {
594                self.cookie_listeners.remove(&cookie_store_id);
595            },
596            CoreResourceMsg::NetworkMediator(mediator_chan, origin) => {
597                self.resource_manager
598                    .sw_managers
599                    .insert(origin, mediator_chan);
600            },
601            CoreResourceMsg::ListCookies(sender) => {
602                let mut cookie_jar = http_state.cookie_jar.write();
603                cookie_jar.remove_all_expired_cookies();
604                let _ = sender.send(cookie_jar.cookie_site_descriptors());
605            },
606            CoreResourceMsg::GetHistoryState(history_state_id, consumer) => {
607                let history_states = http_state.history_states.read();
608                consumer
609                    .send(history_states.get(&history_state_id).cloned())
610                    .unwrap();
611            },
612            CoreResourceMsg::SetHistoryState(history_state_id, structured_data) => {
613                let mut history_states = http_state.history_states.write();
614                history_states.insert(history_state_id, structured_data);
615            },
616            CoreResourceMsg::RemoveHistoryStates(states_to_remove) => {
617                let mut history_states = http_state.history_states.write();
618                for history_state in states_to_remove {
619                    history_states.remove(&history_state);
620                }
621            },
622            CoreResourceMsg::GetCacheEntries(sender) => {
623                let _ = sender.send(http_state.http_cache.cache_entry_descriptors());
624            },
625            CoreResourceMsg::ClearCache(sender) => {
626                http_state.http_cache.clear();
627                if let Some(sender) = sender {
628                    let _ = sender.send(());
629                }
630            },
631            CoreResourceMsg::ToFileManager(msg) => self.resource_manager.filemanager.handle(msg),
632            CoreResourceMsg::StorePreloadedResponse(preload_id, response) => self
633                .resource_manager
634                .handle_preloaded_response(preload_id, response),
635            CoreResourceMsg::TotalSizeOfInFlightKeepAliveRecords(pipeline_id, sender) => {
636                let total = self
637                    .resource_manager
638                    .in_flight_keep_alive_records
639                    .lock()
640                    .get(&pipeline_id)
641                    .map(|records| {
642                        records
643                            .iter()
644                            .map(|record| record.keep_alive_body_length)
645                            .sum()
646                    })
647                    .unwrap_or_default();
648                let _ = sender.send(total);
649            },
650            CoreResourceMsg::Exit(sender) => {
651                if let Some(ref config_dir) = self.config_dir {
652                    let auth_cache = http_state.auth_cache.read();
653                    servo_base::write_json_to_file(&*auth_cache, config_dir, "auth_cache.json");
654                    let jar = http_state.cookie_jar.read();
655                    servo_base::write_json_to_file(&*jar, config_dir, "cookie_jar.json");
656                    let hsts = http_state.hsts_list.read();
657                    servo_base::write_json_to_file(&*hsts, config_dir, "hsts_list.json");
658                }
659                self.resource_manager.exit();
660                let _ = sender.send(());
661                return false;
662            },
663            // Ignore these messages as they are only sent on very specific channels.
664            CoreResourceMsg::CollectMemoryReport(_) |
665            CoreResourceMsg::RevokeTokenForFile(..) |
666            CoreResourceMsg::RefreshTokenForFile(..) => {},
667        }
668        true
669    }
670}
671
672#[derive(Clone, Debug, Deserialize, Serialize)]
673pub struct AuthCacheEntry {
674    pub user_name: String,
675    pub password: String,
676}
677
678impl Default for AuthCache {
679    fn default() -> Self {
680        Self {
681            version: 1,
682            entries: HashMap::new(),
683        }
684    }
685}
686
687#[derive(Clone, Debug, Deserialize, Serialize)]
688pub struct AuthCache {
689    pub version: u32,
690    pub entries: HashMap<String, AuthCacheEntry>,
691}
692
693pub struct CoreResourceManager {
694    devtools_sender: Option<Sender<DevtoolsControlMsg>>,
695    sw_managers: HashMap<ImmutableOrigin, IpcSender<CustomResponseMediator>>,
696    filemanager: FileManager,
697    request_interceptor: RequestInterceptor,
698    ca_certificates: CACertificates<'static>,
699    ignore_certificate_errors: bool,
700    preloaded_resources: SharedPreloadedResources,
701    /// <https://fetch.spec.whatwg.org/#concept-fetch-record>
702    in_flight_keep_alive_records: SharedInflightKeepAliveRecords,
703}
704
705impl CoreResourceManager {
706    pub fn new(
707        devtools_sender: Option<Sender<DevtoolsControlMsg>>,
708        _profiler_chan: ProfilerChan,
709        embedder_proxy: GenericEmbedderProxy<NetToEmbedderMsg>,
710        ca_certificates: CACertificates<'static>,
711        ignore_certificate_errors: bool,
712        blob_token_communicator: Arc<Mutex<BlobTokenCommunicator>>,
713    ) -> CoreResourceManager {
714        CoreResourceManager {
715            devtools_sender,
716            sw_managers: Default::default(),
717            filemanager: FileManager::new(embedder_proxy.clone(), blob_token_communicator),
718            request_interceptor: RequestInterceptor::new(embedder_proxy),
719            ca_certificates,
720            ignore_certificate_errors,
721            preloaded_resources: Default::default(),
722            in_flight_keep_alive_records: Default::default(),
723        }
724    }
725
726    fn handle_preloaded_response(&self, preload_id: PreloadId, response: Response) {
727        let mut preloaded_resources = self.preloaded_resources.lock().unwrap();
728        if let Some(entry) = preloaded_resources.get_mut(&preload_id) {
729            entry.with_response(response);
730        }
731    }
732
733    /// Exit the core resource manager.
734    pub fn exit(&mut self) {
735        debug!("Exited CoreResourceManager");
736    }
737
738    fn set_cookie_for_url(
739        &mut self,
740        request: &ServoUrl,
741        cookie: Cookie<'static>,
742        source: CookieSource,
743        http_state: &Arc<HttpState>,
744    ) {
745        if let Some(cookie) = ServoCookie::new_wrapped(cookie, request, source) {
746            let mut cookie_jar = http_state.cookie_jar.write();
747            cookie_jar.push(cookie, request, source)
748        }
749    }
750
751    fn fetch<Target: 'static + FetchTaskTarget + Send>(
752        &self,
753        request_builder: RequestBuilder,
754        res_init_: Option<ResponseInit>,
755        mut sender: Target,
756        http_state: &Arc<HttpState>,
757        cancellation_listener: Arc<CancellationListener>,
758        protocols: Arc<ProtocolRegistry>,
759    ) {
760        let http_state = http_state.clone();
761        let devtools_chan = self.devtools_sender.clone();
762        let filemanager = self.filemanager.clone();
763        let request_interceptor = self.request_interceptor.clone();
764
765        let timing_type = match request_builder.destination {
766            Destination::Document => ResourceTimingType::Navigation,
767            _ => ResourceTimingType::Resource,
768        };
769
770        let request = request_builder.build();
771        let url = request.current_url();
772
773        // In the case of a valid blob URL, acquiring a token granting access to a file,
774        // regardless if the URL is revoked after token acquisition.
775        //
776        // Ideally all callers should have claimed the blob entry themselves, but we're not there
777        // yet.
778        let (file_token, blob_url_file_id) = match url.scheme() {
779            "blob" => {
780                if let Some(token) = request.current_url_with_blob_claim().token() {
781                    (FileTokenCheck::Required(token.token), Some(token.file_id))
782                } else if let Ok((id, _)) = parse_blob_url(&url) {
783                    // See https://github.com/servo/servo/issues/25226
784                    log::warn!(
785                        "Failed to claim blob URL entry of valid blob URL before passing it to `net`. This causes race conditions."
786                    );
787                    (self.filemanager.get_token_for_file(&id, false), Some(id))
788                } else {
789                    (FileTokenCheck::ShouldFail, None)
790                }
791            },
792            _ => (FileTokenCheck::NotRequired, None),
793        };
794
795        let ca_certificates = self.ca_certificates.clone();
796        let ignore_certificate_errors = self.ignore_certificate_errors;
797        let in_flight_keep_alive_records = self.in_flight_keep_alive_records.clone();
798        let preloaded_resources = self.preloaded_resources.clone();
799        if let Some(ref preload_id) = request.preload_id {
800            let mut preloaded_resources = self.preloaded_resources.lock().unwrap();
801            let entry = PreloadEntry::new(request.integrity_metadata.clone());
802            preloaded_resources.insert(preload_id.clone(), entry);
803        }
804
805        spawn_task(async move {
806            // XXXManishearth: Check origin against pipeline id (also ensure that the mode is allowed)
807            // todo load context / mimesniff in fetch
808            // todo referrer policy?
809            // todo service worker stuff
810            let context = FetchContext {
811                state: http_state,
812                user_agent: servo_config::pref!(user_agent),
813                devtools_chan,
814                filemanager,
815                file_token,
816                request_interceptor: Arc::new(TokioMutex::new(request_interceptor)),
817                cancellation_listener,
818                timing: ResourceFetchTiming::new(request.timing_type()).into(),
819                protocols,
820                websocket_chan: None,
821                ca_certificates,
822                ignore_certificate_errors,
823                preloaded_resources,
824                in_flight_keep_alive_records,
825            };
826
827            match res_init_ {
828                Some(res_init) => {
829                    let response = Response::from_init(res_init, timing_type);
830
831                    let mut fetch_params = FetchParams::new(request);
832                    let mut request_body_stream_closer =
833                        AutoRequestBodyStreamCloser::new(fetch_params.request.body.as_ref());
834                    let response = http_redirect_fetch(
835                        &mut fetch_params,
836                        &mut CorsCache::default(),
837                        response,
838                        true,
839                        &mut sender,
840                        &mut None,
841                        &context,
842                    )
843                    .await;
844                    if transfers_request_body_stream_to_later_manual_redirect(
845                        &fetch_params.request,
846                        &response,
847                    ) {
848                        request_body_stream_closer.disarm();
849                    }
850                },
851                None => {
852                    fetch(request, &mut sender, &context).await;
853                },
854            };
855
856            // Remove token after fetch.
857            if let Some(id) = blob_url_file_id.as_ref() {
858                context
859                    .filemanager
860                    .invalidate_token(&context.file_token, id);
861            }
862        });
863    }
864
865    /// <https://websockets.spec.whatwg.org/#concept-websocket-establish>
866    fn websocket_connect(
867        &self,
868        mut request: RequestBuilder,
869        event_sender: IpcSender<WebSocketNetworkEvent>,
870        action_receiver: CallbackSetter<WebSocketDomAction>,
871        http_state: &Arc<HttpState>,
872        cancellation_listener: Arc<CancellationListener>,
873        protocols: Arc<ProtocolRegistry>,
874    ) {
875        let http_state = http_state.clone();
876        let devtools_chan = self.devtools_sender.clone();
877        let filemanager = self.filemanager.clone();
878        let request_interceptor = self.request_interceptor.clone();
879
880        let ca_certificates = self.ca_certificates.clone();
881        let ignore_certificate_errors = self.ignore_certificate_errors;
882        let in_flight_keep_alive_records = self.in_flight_keep_alive_records.clone();
883        let preloaded_resources = self.preloaded_resources.clone();
884
885        spawn_task(async move {
886            let mut event_sender = event_sender;
887
888            // Let requestURL be a copy of url, with its scheme set to "http", if url’s scheme is
889            // "ws"; otherwise to "https"
890            let scheme = match request.url.scheme() {
891                "ws" => "http",
892                _ => "https",
893            };
894            request
895                .url
896                .as_mut_url()
897                .set_scheme(scheme)
898                .unwrap_or_else(|_| panic!("Can't set scheme to {scheme}"));
899
900            match create_handshake_request(request, http_state.clone()) {
901                Ok(request) => {
902                    let context = FetchContext {
903                        state: http_state,
904                        user_agent: servo_config::pref!(user_agent),
905                        devtools_chan,
906                        filemanager,
907                        file_token: FileTokenCheck::NotRequired,
908                        request_interceptor: Arc::new(TokioMutex::new(request_interceptor)),
909                        cancellation_listener,
910                        timing: ResourceFetchTiming::new(request.timing_type()).into(),
911                        protocols: protocols.clone(),
912                        websocket_chan: Some(Arc::new(Mutex::new(WebSocketChannel::new(
913                            event_sender.clone(),
914                            Some(action_receiver),
915                        )))),
916                        ca_certificates,
917                        ignore_certificate_errors,
918                        preloaded_resources,
919                        in_flight_keep_alive_records,
920                    };
921                    fetch(request, &mut event_sender, &context).await;
922                },
923                Err(e) => {
924                    trace!("unable to create websocket handshake request {:?}", e);
925                    let _ = event_sender.send(WebSocketNetworkEvent::Fail);
926                },
927            }
928        });
929    }
930}