1use std::borrow::ToOwned;
6use std::cell::Cell;
7use std::cmp;
8use std::default::Default;
9use std::str::{self, FromStr};
10use std::sync::Arc;
11use std::time::{Duration, Instant};
12
13use atomic_refcell::AtomicRefCell;
14use constellation_traits::BlobImpl;
15use data_url::mime::Mime;
16use dom_struct::dom_struct;
17use encoding_rs::{Encoding, UTF_8};
18use headers::{ContentLength, ContentType, HeaderMapExt};
19use html5ever::serialize;
20use html5ever::serialize::SerializeOpts;
21use http::Method;
22use http::header::{self, HeaderMap, HeaderName, HeaderValue};
23use hyper_serde::Serde;
24use js::jsapi::{Heap, JS_ClearPendingException};
25use js::jsval::{JSVal, NullValue};
26use js::rust::wrappers::JS_ParseJSON;
27use js::rust::{HandleObject, MutableHandleValue};
28use js::typedarray::{ArrayBuffer, ArrayBufferU8};
29use net_traits::fetch::headers::extract_mime_type_as_dataurl_mime;
30use net_traits::http_status::HttpStatus;
31use net_traits::request::{CredentialsMode, Referrer, RequestBuilder, RequestId, RequestMode};
32use net_traits::{
33 FetchMetadata, FilteredMetadata, NetworkError, ReferrerPolicy, ResourceFetchTiming,
34 trim_http_whitespace,
35};
36use script_bindings::conversions::SafeToJSValConvertible;
37use script_bindings::num::Finite;
38use script_traits::DocumentActivity;
39use servo_url::ServoUrl;
40use stylo_atoms::Atom;
41use url::Position;
42
43use crate::body::{BodySource, Extractable, ExtractedBody, decode_to_utf16_with_bom_removal};
44use crate::document_loader::DocumentLoader;
45use crate::dom::bindings::buffer_source::HeapBufferSource;
46use crate::dom::bindings::cell::DomRefCell;
47use crate::dom::bindings::codegen::Bindings::WindowBinding::WindowMethods;
48use crate::dom::bindings::codegen::Bindings::XMLHttpRequestBinding::{
49 XMLHttpRequestMethods, XMLHttpRequestResponseType,
50};
51use crate::dom::bindings::codegen::UnionTypes::DocumentOrBlobOrArrayBufferViewOrArrayBufferOrFormDataOrStringOrURLSearchParams as DocumentOrXMLHttpRequestBodyInit;
52use crate::dom::bindings::error::{Error, ErrorResult, Fallible};
53use crate::dom::bindings::inheritance::Castable;
54use crate::dom::bindings::refcounted::Trusted;
55use crate::dom::bindings::reflector::{DomGlobal, reflect_dom_object_with_proto};
56use crate::dom::bindings::root::{Dom, DomRoot, MutNullableDom};
57use crate::dom::bindings::str::{ByteString, DOMString, USVString, is_token};
58use crate::dom::blob::{Blob, normalize_type_string};
59use crate::dom::csp::{GlobalCspReporting, Violation};
60use crate::dom::document::{Document, DocumentSource, HasBrowsingContext, IsHTMLDocument};
61use crate::dom::event::{Event, EventBubbles, EventCancelable};
62use crate::dom::eventtarget::EventTarget;
63use crate::dom::globalscope::GlobalScope;
64use crate::dom::headers::is_forbidden_request_header;
65use crate::dom::node::Node;
66use crate::dom::performance::performanceresourcetiming::InitiatorType;
67use crate::dom::progressevent::ProgressEvent;
68use crate::dom::readablestream::ReadableStream;
69use crate::dom::servoparser::ServoParser;
70use crate::dom::servoparser::html::HtmlSerialize;
71use crate::dom::window::Window;
72use crate::dom::workerglobalscope::WorkerGlobalScope;
73use crate::dom::xmlhttprequesteventtarget::XMLHttpRequestEventTarget;
74use crate::dom::xmlhttprequestupload::XMLHttpRequestUpload;
75use crate::fetch::FetchCanceller;
76use crate::mime::{APPLICATION, CHARSET, HTML, MimeExt, TEXT, XML};
77use crate::network_listener::{self, FetchResponseListener, ResourceTimingListener};
78use crate::script_runtime::{CanGc, JSContext};
79use crate::task_source::{SendableTaskSource, TaskSourceName};
80use crate::timers::{OneshotTimerCallback, OneshotTimerHandle};
81
82#[derive(Clone, Copy, Debug, JSTraceable, MallocSizeOf, PartialEq)]
83enum XMLHttpRequestState {
84 Unsent = 0,
85 Opened = 1,
86 HeadersReceived = 2,
87 Loading = 3,
88 Done = 4,
89}
90
91#[derive(Clone, Copy, JSTraceable, MallocSizeOf, PartialEq)]
92pub(crate) struct GenerationId(u32);
93
94struct XHRContext {
97 xhr: TrustedXHRAddress,
98 gen_id: GenerationId,
99 sync_status: Arc<AtomicRefCell<Option<ErrorResult>>>,
100 url: ServoUrl,
101}
102
103impl FetchResponseListener for XHRContext {
104 fn process_request_body(&mut self, _: RequestId) {
105 }
107
108 fn process_request_eof(&mut self, _: RequestId) {
109 }
111
112 fn process_response(&mut self, _: RequestId, metadata: Result<FetchMetadata, NetworkError>) {
113 let xhr = self.xhr.root();
114 let rv = xhr.process_headers_available(self.gen_id, metadata, CanGc::note());
115 if rv.is_err() {
116 *self.sync_status.borrow_mut() = Some(rv);
117 }
118 }
119
120 fn process_response_chunk(&mut self, _: RequestId, chunk: Vec<u8>) {
121 self.xhr
122 .root()
123 .process_data_available(self.gen_id, chunk, CanGc::note());
124 }
125
126 fn process_response_eof(
127 self,
128 _: RequestId,
129 response: Result<ResourceFetchTiming, NetworkError>,
130 ) {
131 let rv = self.xhr.root().process_response_complete(
132 self.gen_id,
133 response.clone().map(|_| ()),
134 CanGc::note(),
135 );
136 *self.sync_status.borrow_mut() = Some(rv);
137
138 if let Ok(response) = response {
139 network_listener::submit_timing(&self, &response, CanGc::note());
140 }
141 }
142
143 fn process_csp_violations(&mut self, _request_id: RequestId, violations: Vec<Violation>) {
144 let global = &self.resource_timing_global();
145 global.report_csp_violations(violations, None, None);
146 }
147
148 fn should_invoke(&self) -> bool {
149 self.xhr.root().generation_id.get() == self.gen_id
150 }
151}
152
153impl ResourceTimingListener for XHRContext {
154 fn resource_timing_information(&self) -> (InitiatorType, ServoUrl) {
155 (InitiatorType::XMLHttpRequest, self.url.clone())
156 }
157
158 fn resource_timing_global(&self) -> DomRoot<GlobalScope> {
159 self.xhr.root().global()
160 }
161}
162
163#[derive(Clone)]
164pub(crate) enum XHRProgress {
165 HeadersReceived(GenerationId, Option<HeaderMap>, HttpStatus),
167 Loading(GenerationId, Vec<u8>),
169 Done(GenerationId),
171 Errored(GenerationId, Error),
173}
174
175impl XHRProgress {
176 fn generation_id(&self) -> GenerationId {
177 match *self {
178 XHRProgress::HeadersReceived(id, _, _) |
179 XHRProgress::Loading(id, _) |
180 XHRProgress::Done(id) |
181 XHRProgress::Errored(id, _) => id,
182 }
183 }
184}
185
186#[dom_struct]
187pub(crate) struct XMLHttpRequest {
188 eventtarget: XMLHttpRequestEventTarget,
189 ready_state: Cell<XMLHttpRequestState>,
190 timeout: Cell<Duration>,
191 with_credentials: Cell<bool>,
192 upload: Dom<XMLHttpRequestUpload>,
193 response_url: DomRefCell<String>,
194 #[no_trace]
195 status: DomRefCell<HttpStatus>,
196 response: DomRefCell<Vec<u8>>,
197 response_type: Cell<XMLHttpRequestResponseType>,
198 response_xml: MutNullableDom<Document>,
199 response_blob: MutNullableDom<Blob>,
200 #[ignore_malloc_size_of = "mozjs"]
201 response_arraybuffer: HeapBufferSource<ArrayBufferU8>,
202 #[ignore_malloc_size_of = "Defined in rust-mozjs"]
203 response_json: Heap<JSVal>,
204 #[ignore_malloc_size_of = "Defined in hyper"]
205 #[no_trace]
206 response_headers: DomRefCell<HeaderMap>,
207 #[ignore_malloc_size_of = "Defined in hyper"]
208 #[no_trace]
209 override_mime_type: DomRefCell<Option<Mime>>,
210
211 #[ignore_malloc_size_of = "Defined in hyper"]
213 #[no_trace]
214 request_method: DomRefCell<Method>,
215 #[no_trace]
216 request_url: DomRefCell<Option<ServoUrl>>,
217 #[ignore_malloc_size_of = "Defined in hyper"]
218 #[no_trace]
219 request_headers: DomRefCell<HeaderMap>,
220 request_body_len: Cell<usize>,
221 sync: Cell<bool>,
222 upload_complete: Cell<bool>,
223 upload_listener: Cell<bool>,
224 send_flag: Cell<bool>,
225
226 timeout_cancel: DomRefCell<Option<OneshotTimerHandle>>,
227 fetch_time: Cell<Instant>,
228 generation_id: Cell<GenerationId>,
229 response_status: Cell<Result<(), ()>>,
230 #[no_trace]
231 referrer: Referrer,
232 #[no_trace]
233 referrer_policy: ReferrerPolicy,
234 canceller: DomRefCell<FetchCanceller>,
235}
236
237impl XMLHttpRequest {
238 fn new_inherited(global: &GlobalScope, can_gc: CanGc) -> XMLHttpRequest {
239 XMLHttpRequest {
240 eventtarget: XMLHttpRequestEventTarget::new_inherited(),
241 ready_state: Cell::new(XMLHttpRequestState::Unsent),
242 timeout: Cell::new(Duration::ZERO),
243 with_credentials: Cell::new(false),
244 upload: Dom::from_ref(&*XMLHttpRequestUpload::new(global, can_gc)),
245 response_url: DomRefCell::new(String::new()),
246 status: DomRefCell::new(HttpStatus::new_error()),
247 response: DomRefCell::new(vec![]),
248 response_type: Cell::new(XMLHttpRequestResponseType::_empty),
249 response_xml: Default::default(),
250 response_blob: Default::default(),
251 response_arraybuffer: HeapBufferSource::default(),
252 response_json: Heap::default(),
253 response_headers: DomRefCell::new(HeaderMap::new()),
254 override_mime_type: DomRefCell::new(None),
255
256 request_method: DomRefCell::new(Method::GET),
257 request_url: DomRefCell::new(None),
258 request_headers: DomRefCell::new(HeaderMap::new()),
259 request_body_len: Cell::new(0),
260 sync: Cell::new(false),
261 upload_complete: Cell::new(false),
262 upload_listener: Cell::new(false),
263 send_flag: Cell::new(false),
264
265 timeout_cancel: DomRefCell::new(None),
266 fetch_time: Cell::new(Instant::now()),
267 generation_id: Cell::new(GenerationId(0)),
268 response_status: Cell::new(Ok(())),
269 referrer: global.get_referrer(),
270 referrer_policy: global.get_referrer_policy(),
271 canceller: DomRefCell::new(Default::default()),
272 }
273 }
274
275 fn new(
276 global: &GlobalScope,
277 proto: Option<HandleObject>,
278 can_gc: CanGc,
279 ) -> DomRoot<XMLHttpRequest> {
280 reflect_dom_object_with_proto(
281 Box::new(XMLHttpRequest::new_inherited(global, can_gc)),
282 global,
283 proto,
284 can_gc,
285 )
286 }
287
288 fn sync_in_window(&self) -> bool {
289 self.sync.get() && self.global().is::<Window>()
290 }
291}
292
293impl XMLHttpRequestMethods<crate::DomTypeHolder> for XMLHttpRequest {
294 fn Constructor(
296 global: &GlobalScope,
297 proto: Option<HandleObject>,
298 can_gc: CanGc,
299 ) -> Fallible<DomRoot<XMLHttpRequest>> {
300 Ok(XMLHttpRequest::new(global, proto, can_gc))
301 }
302
303 event_handler!(
305 readystatechange,
306 GetOnreadystatechange,
307 SetOnreadystatechange
308 );
309
310 fn ReadyState(&self) -> u16 {
312 self.ready_state.get() as u16
313 }
314
315 fn Open(&self, method: ByteString, url: USVString) -> ErrorResult {
317 self.Open_(method, url, true, None, None)
319 }
320
321 fn Open_(
323 &self,
324 method: ByteString,
325 url: USVString,
326 asynch: bool,
327 username: Option<USVString>,
328 password: Option<USVString>,
329 ) -> ErrorResult {
330 if let Some(window) = DomRoot::downcast::<Window>(self.global()) {
332 if !window.Document().is_fully_active() {
333 return Err(Error::InvalidState(None));
334 }
335 }
336
337 let maybe_method = method.as_str().and_then(|s| {
340 let upper = s.to_ascii_uppercase();
346 match &*upper {
347 "DELETE" | "GET" | "HEAD" | "OPTIONS" | "POST" | "PUT" | "CONNECT" | "TRACE" |
348 "TRACK" => upper.parse().ok(),
349 _ => s.parse().ok(),
350 }
351 });
352
353 match maybe_method {
354 Some(Method::CONNECT) | Some(Method::TRACE) => Err(Error::Security(None)),
356 Some(ref t) if t.as_str() == "TRACK" => Err(Error::Security(None)),
357 Some(parsed_method) => {
358 if !is_token(&method) {
360 return Err(Error::Syntax(None));
361 }
362
363 let base = self.global().api_base_url();
365 let mut parsed_url = match base.join(&url.0) {
367 Ok(parsed) => parsed,
368 Err(_) => return Err(Error::Syntax(None)),
370 };
371
372 if parsed_url.host().is_some() {
374 if let Some(user_str) = username {
375 parsed_url.set_username(&user_str.0).unwrap();
376 }
377 if let Some(pass_str) = password {
378 parsed_url.set_password(Some(&pass_str.0)).unwrap();
379 }
380 }
381
382 if !asynch {
384 if !self.timeout.get().is_zero() ||
386 self.response_type.get() != XMLHttpRequestResponseType::_empty
387 {
388 return Err(Error::InvalidAccess(None));
389 }
390 }
391 self.terminate_ongoing_fetch();
393
394 *self.request_method.borrow_mut() = parsed_method;
402 *self.request_url.borrow_mut() = Some(parsed_url);
403 self.sync.set(!asynch);
404 *self.request_headers.borrow_mut() = HeaderMap::new();
405 self.send_flag.set(false);
406 self.upload_listener.set(false);
407 *self.status.borrow_mut() = HttpStatus::new_error();
408
409 if self.ready_state.get() != XMLHttpRequestState::Opened {
411 self.change_ready_state(XMLHttpRequestState::Opened, CanGc::note());
412 }
413 Ok(())
414 },
415 _ => Err(Error::Syntax(None)),
419 }
420 }
421
422 fn SetRequestHeader(&self, name: ByteString, value: ByteString) -> ErrorResult {
424 if self.ready_state.get() != XMLHttpRequestState::Opened || self.send_flag.get() {
427 return Err(Error::InvalidState(None));
428 }
429
430 let value = trim_http_whitespace(&value);
432
433 if !is_token(&name) || !is_field_value(value) {
436 return Err(Error::Syntax(None));
437 }
438
439 let name_str = name.as_str().ok_or(Error::Syntax(None))?;
440
441 if is_forbidden_request_header(name_str, value) {
443 return Ok(());
444 }
445
446 debug!(
447 "SetRequestHeader: name={:?}, value={:?}",
448 name_str,
449 str::from_utf8(value).ok()
450 );
451 let mut headers = self.request_headers.borrow_mut();
452
453 let value = match headers.get(name_str).map(HeaderValue::as_bytes) {
456 Some(raw) => {
457 let mut buf = raw.to_vec();
458 buf.extend_from_slice(b", ");
459 buf.extend_from_slice(value);
460 buf
461 },
462 None => value.into(),
463 };
464
465 headers.insert(
466 HeaderName::from_str(name_str).unwrap(),
467 HeaderValue::from_bytes(&value).unwrap(),
468 );
469 Ok(())
470 }
471
472 fn Timeout(&self) -> u32 {
474 self.timeout.get().as_millis() as u32
475 }
476
477 fn SetTimeout(&self, timeout: u32) -> ErrorResult {
479 if self.sync_in_window() {
481 return Err(Error::InvalidAccess(None));
482 }
483
484 let timeout = Duration::from_millis(timeout as u64);
486 self.timeout.set(timeout);
487
488 if self.send_flag.get() {
489 if timeout.is_zero() {
490 self.cancel_timeout();
491 return Ok(());
492 }
493 let progress = Instant::now() - self.fetch_time.get();
494 if timeout > progress {
495 self.set_timeout(timeout - progress);
496 } else {
497 self.set_timeout(Duration::ZERO);
499 }
500 }
501 Ok(())
502 }
503
504 fn WithCredentials(&self) -> bool {
506 self.with_credentials.get()
507 }
508
509 fn SetWithCredentials(&self, with_credentials: bool) -> ErrorResult {
511 match self.ready_state.get() {
512 XMLHttpRequestState::HeadersReceived |
514 XMLHttpRequestState::Loading |
515 XMLHttpRequestState::Done => Err(Error::InvalidState(None)),
516 _ if self.send_flag.get() => Err(Error::InvalidState(None)),
518 _ => {
520 self.with_credentials.set(with_credentials);
521 Ok(())
522 },
523 }
524 }
525
526 fn Upload(&self) -> DomRoot<XMLHttpRequestUpload> {
528 DomRoot::from_ref(&*self.upload)
529 }
530
531 fn Send(&self, data: Option<DocumentOrXMLHttpRequestBodyInit>, can_gc: CanGc) -> ErrorResult {
533 if self.ready_state.get() != XMLHttpRequestState::Opened || self.send_flag.get() {
535 return Err(Error::InvalidState(None));
536 }
537
538 let data = match *self.request_method.borrow() {
540 Method::GET | Method::HEAD => None,
541 _ => data,
542 };
543 let mut extracted_or_serialized = match data {
545 Some(DocumentOrXMLHttpRequestBodyInit::Document(ref doc)) => {
546 let bytes = Vec::from(&*serialize_document(doc)?.as_bytes());
547 let content_type = if doc.is_html_document() {
548 "text/html;charset=UTF-8"
549 } else {
550 "application/xml;charset=UTF-8"
551 };
552 let total_bytes = bytes.len();
553 let global = self.global();
554 let stream = ReadableStream::new_from_bytes(&global, bytes, can_gc)?;
555 Some(ExtractedBody {
556 stream,
557 total_bytes: Some(total_bytes),
558 content_type: Some(DOMString::from(content_type)),
559 source: BodySource::Object,
560 })
561 },
562 Some(DocumentOrXMLHttpRequestBodyInit::Blob(ref b)) => {
563 let extracted_body = b
564 .extract(&self.global(), can_gc)
565 .expect("Couldn't extract body.");
566 if !extracted_body.in_memory() && self.sync.get() {
567 warn!("Sync XHR with not in-memory Blob as body not supported");
568 None
569 } else {
570 Some(extracted_body)
571 }
572 },
573 Some(DocumentOrXMLHttpRequestBodyInit::FormData(ref formdata)) => Some(
574 formdata
575 .extract(&self.global(), can_gc)
576 .expect("Couldn't extract body."),
577 ),
578 Some(DocumentOrXMLHttpRequestBodyInit::String(ref str)) => Some(
579 str.extract(&self.global(), can_gc)
580 .expect("Couldn't extract body."),
581 ),
582 Some(DocumentOrXMLHttpRequestBodyInit::URLSearchParams(ref urlsp)) => Some(
583 urlsp
584 .extract(&self.global(), can_gc)
585 .expect("Couldn't extract body."),
586 ),
587 Some(DocumentOrXMLHttpRequestBodyInit::ArrayBuffer(ref typedarray)) => {
588 let bytes = typedarray.to_vec();
589 let total_bytes = bytes.len();
590 let global = self.global();
591 let stream = ReadableStream::new_from_bytes(&global, bytes, can_gc)?;
592 Some(ExtractedBody {
593 stream,
594 total_bytes: Some(total_bytes),
595 content_type: None,
596 source: BodySource::Object,
597 })
598 },
599 Some(DocumentOrXMLHttpRequestBodyInit::ArrayBufferView(ref typedarray)) => {
600 let bytes = typedarray.to_vec();
601 let total_bytes = bytes.len();
602 let global = self.global();
603 let stream = ReadableStream::new_from_bytes(&global, bytes, can_gc)?;
604 Some(ExtractedBody {
605 stream,
606 total_bytes: Some(total_bytes),
607 content_type: None,
608 source: BodySource::Object,
609 })
610 },
611 None => None,
612 };
613
614 self.request_body_len.set(
615 extracted_or_serialized
616 .as_ref()
617 .map_or(0, |e| e.total_bytes.unwrap_or(0)),
618 );
619
620 let has_handlers = self.upload.upcast::<EventTarget>().has_handlers();
623 self.upload_listener.set(has_handlers && data.is_some());
624
625 self.upload_complete.set(false);
629 self.upload_complete.set(extracted_or_serialized.is_none());
633 self.send_flag.set(true);
635
636 if !self.sync.get() {
638 let gen_id = self.generation_id.get();
642 self.dispatch_response_progress_event(atom!("loadstart"), can_gc);
643 if self.generation_id.get() != gen_id {
644 return Ok(());
645 }
646 if !self.upload_complete.get() && self.upload_listener.get() {
648 self.dispatch_upload_progress_event(atom!("loadstart"), Ok(Some(0)), can_gc);
649 if self.generation_id.get() != gen_id {
650 return Ok(());
651 }
652 }
653 }
654
655 let credentials_mode = if self.with_credentials.get() {
658 CredentialsMode::Include
659 } else {
660 CredentialsMode::CredentialsSameOrigin
661 };
662 let use_url_credentials = if let Some(ref url) = *self.request_url.borrow() {
663 !url.username().is_empty() || url.password().is_some()
664 } else {
665 unreachable!()
666 };
667
668 let content_type = match extracted_or_serialized.as_mut() {
669 Some(body) => body.content_type.take(),
670 None => None,
671 };
672
673 let global = self.global();
674 let mut request = RequestBuilder::new(
675 global.webview_id(),
676 self.request_url.borrow().clone().unwrap(),
677 self.referrer.clone(),
678 )
679 .method(self.request_method.borrow().clone())
680 .headers((*self.request_headers.borrow()).clone())
681 .unsafe_request(true)
682 .body(extracted_or_serialized.map(|e| e.into_net_request_body().0))
684 .synchronous(self.sync.get())
685 .mode(RequestMode::CorsMode)
686 .use_cors_preflight(self.upload_listener.get())
687 .credentials_mode(credentials_mode)
688 .use_url_credentials(use_url_credentials)
689 .origin(global.origin().immutable().clone())
690 .referrer_policy(self.referrer_policy)
691 .insecure_requests_policy(global.insecure_requests_policy())
692 .has_trustworthy_ancestor_origin(global.has_trustworthy_ancestor_or_current_origin())
693 .policy_container(global.policy_container())
694 .pipeline_id(Some(global.pipeline_id()));
695
696 if let Some(content_type) = content_type {
698 let encoding = match data {
699 Some(DocumentOrXMLHttpRequestBodyInit::String(_)) |
700 Some(DocumentOrXMLHttpRequestBodyInit::Document(_)) =>
701 {
705 Some("UTF-8")
706 },
707 _ => None,
708 };
709
710 let mut content_type_set = false;
711 if !request.headers.contains_key(header::CONTENT_TYPE) {
712 request.headers.insert(
713 header::CONTENT_TYPE,
714 HeaderValue::from_str(&content_type.str()).unwrap(),
715 );
716 content_type_set = true;
717 }
718
719 if !content_type_set {
720 let ct = request.headers.typed_get::<ContentType>();
721 if let Some(ct) = ct {
722 if let Some(encoding) = encoding {
723 let mime: Mime = ct.to_string().parse().unwrap();
724 for param in mime.parameters.iter() {
725 if param.0 == CHARSET && !param.1.eq_ignore_ascii_case(encoding) {
726 let params_iter = mime.parameters.iter();
727 let new_params: Vec<(String, String)> = params_iter
728 .filter(|p| p.0 != CHARSET)
729 .map(|p| (p.0.clone(), p.1.clone()))
730 .collect();
731
732 let new_mime = format!(
733 "{}/{};charset={}{}{}",
734 mime.type_,
735 mime.subtype,
736 encoding,
737 if new_params.is_empty() { "" } else { "; " },
738 new_params
739 .iter()
740 .map(|p| format!("{}={}", p.0, p.1))
741 .collect::<Vec<String>>()
742 .join("; ")
743 );
744
745 request.headers.insert(
746 header::CONTENT_TYPE,
747 HeaderValue::from_str(&new_mime).unwrap(),
748 );
749 }
750 }
751 }
752 }
753 }
754 }
755
756 self.fetch_time.set(Instant::now());
757
758 let rv = self.fetch(request, &self.global(), can_gc);
759 if self.sync.get() {
761 return rv;
762 }
763
764 let timeout = self.timeout.get();
765 if timeout > Duration::ZERO {
766 self.set_timeout(timeout);
767 }
768 Ok(())
769 }
770
771 fn Abort(&self, can_gc: CanGc) {
773 self.terminate_ongoing_fetch();
775 let state = self.ready_state.get();
777 if (state == XMLHttpRequestState::Opened && self.send_flag.get()) ||
778 state == XMLHttpRequestState::HeadersReceived ||
779 state == XMLHttpRequestState::Loading
780 {
781 let gen_id = self.generation_id.get();
782 self.process_partial_response(XHRProgress::Errored(gen_id, Error::Abort(None)), can_gc);
783 if self.generation_id.get() != gen_id {
786 return;
787 }
788 }
789 if self.ready_state.get() == XMLHttpRequestState::Done {
791 self.change_ready_state(XMLHttpRequestState::Unsent, can_gc);
792 self.response_status.set(Err(()));
793 *self.status.borrow_mut() = HttpStatus::new_error();
794 self.response.borrow_mut().clear();
795 self.response_headers.borrow_mut().clear();
796 }
797 }
798
799 fn ResponseURL(&self) -> USVString {
801 USVString(self.response_url.borrow().clone())
802 }
803
804 fn Status(&self) -> u16 {
806 self.status.borrow().raw_code()
807 }
808
809 fn StatusText(&self) -> ByteString {
811 ByteString::new(self.status.borrow().message().to_vec())
812 }
813
814 fn GetResponseHeader(&self, name: ByteString) -> Option<ByteString> {
816 let headers = self.filter_response_headers();
817 let headers = headers.get_all(HeaderName::from_str(&name.as_str()?.to_lowercase()).ok()?);
818 let mut first = true;
819 let s = headers.iter().fold(Vec::new(), |mut vec, value| {
820 if !first {
821 vec.extend(", ".as_bytes());
822 }
823 if let Ok(v) = str::from_utf8(value.as_bytes()).map(|s| s.trim().as_bytes()) {
824 vec.extend(v);
825 first = false;
826 }
827 vec
828 });
829
830 if first {
832 None
833 } else {
834 Some(ByteString::new(s))
835 }
836 }
837
838 fn GetAllResponseHeaders(&self) -> ByteString {
840 let headers = self.filter_response_headers();
841 let keys = headers.keys();
842 let v = keys.fold(Vec::new(), |mut vec, k| {
843 let values = headers.get_all(k);
844 vec.extend(k.as_str().as_bytes());
845 vec.extend(": ".as_bytes());
846 let mut first = true;
847 for value in values {
848 if !first {
849 vec.extend(", ".as_bytes());
850 first = false;
851 }
852 vec.extend(value.as_bytes());
853 }
854 vec.extend("\r\n".as_bytes());
855 vec
856 });
857
858 ByteString::new(v)
859 }
860
861 fn OverrideMimeType(&self, mime: DOMString) -> ErrorResult {
863 match self.ready_state.get() {
866 XMLHttpRequestState::Loading | XMLHttpRequestState::Done => {
867 return Err(Error::InvalidState(None));
868 },
869 _ => {},
870 }
871
872 let override_mime = match mime.parse::<Mime>() {
876 Ok(mime) => mime,
877 Err(_) => "application/octet-stream"
878 .parse::<Mime>()
879 .map_err(|_| Error::Syntax(None))?,
880 };
881
882 *self.override_mime_type.borrow_mut() = Some(override_mime);
883 Ok(())
884 }
885
886 fn ResponseType(&self) -> XMLHttpRequestResponseType {
888 self.response_type.get()
889 }
890
891 fn SetResponseType(&self, response_type: XMLHttpRequestResponseType) -> ErrorResult {
893 if self.global().is::<WorkerGlobalScope>() &&
895 response_type == XMLHttpRequestResponseType::Document
896 {
897 return Ok(());
898 }
899 match self.ready_state.get() {
900 XMLHttpRequestState::Loading | XMLHttpRequestState::Done => {
902 Err(Error::InvalidState(None))
903 },
904 _ => {
905 if self.sync_in_window() {
906 Err(Error::InvalidAccess(None))
908 } else {
909 self.response_type.set(response_type);
911 Ok(())
912 }
913 },
914 }
915 }
916
917 fn Response(&self, cx: JSContext, can_gc: CanGc, mut rval: MutableHandleValue) {
919 match self.response_type.get() {
920 XMLHttpRequestResponseType::_empty | XMLHttpRequestResponseType::Text => {
921 let ready_state = self.ready_state.get();
922 if ready_state == XMLHttpRequestState::Done ||
924 ready_state == XMLHttpRequestState::Loading
925 {
926 self.text_response().safe_to_jsval(cx, rval, can_gc);
927 } else {
928 "".safe_to_jsval(cx, rval, can_gc);
930 }
931 },
932 _ if self.ready_state.get() != XMLHttpRequestState::Done => {
934 rval.set(NullValue());
935 },
936 XMLHttpRequestResponseType::Document => self
938 .document_response(can_gc)
939 .safe_to_jsval(cx, rval, can_gc),
940 XMLHttpRequestResponseType::Json => self.json_response(cx, rval),
941 XMLHttpRequestResponseType::Blob => {
942 self.blob_response(can_gc).safe_to_jsval(cx, rval, can_gc)
943 },
944 XMLHttpRequestResponseType::Arraybuffer => {
945 match self.arraybuffer_response(cx, can_gc) {
946 Some(array_buffer) => array_buffer.safe_to_jsval(cx, rval, can_gc),
947 None => rval.set(NullValue()),
948 }
949 },
950 }
951 }
952
953 fn GetResponseText(&self) -> Fallible<USVString> {
955 match self.response_type.get() {
956 XMLHttpRequestResponseType::_empty | XMLHttpRequestResponseType::Text => {
957 Ok(USVString(match self.ready_state.get() {
958 XMLHttpRequestState::Loading | XMLHttpRequestState::Done => {
960 self.text_response()
961 },
962 _ => "".to_owned(),
964 }))
965 },
966 _ => Err(Error::InvalidState(None)),
968 }
969 }
970
971 fn GetResponseXML(&self, can_gc: CanGc) -> Fallible<Option<DomRoot<Document>>> {
973 match self.response_type.get() {
974 XMLHttpRequestResponseType::_empty | XMLHttpRequestResponseType::Document => {
975 if let XMLHttpRequestState::Done = self.ready_state.get() {
977 Ok(self.document_response(can_gc))
978 } else {
979 Ok(None)
981 }
982 },
983 _ => Err(Error::InvalidState(None)),
985 }
986 }
987}
988
989pub(crate) type TrustedXHRAddress = Trusted<XMLHttpRequest>;
990
991impl XMLHttpRequest {
992 fn change_ready_state(&self, rs: XMLHttpRequestState, can_gc: CanGc) {
993 assert_ne!(self.ready_state.get(), rs);
994 self.ready_state.set(rs);
995 if rs != XMLHttpRequestState::Unsent {
996 let event = Event::new(
997 &self.global(),
998 atom!("readystatechange"),
999 EventBubbles::DoesNotBubble,
1000 EventCancelable::Cancelable,
1001 can_gc,
1002 );
1003 event.fire(self.upcast(), can_gc);
1004 }
1005 }
1006
1007 fn process_headers_available(
1008 &self,
1009 gen_id: GenerationId,
1010 metadata: Result<FetchMetadata, NetworkError>,
1011 can_gc: CanGc,
1012 ) -> Result<(), Error> {
1013 let metadata = match metadata {
1014 Ok(meta) => match meta {
1015 FetchMetadata::Unfiltered(m) => m,
1016 FetchMetadata::Filtered { filtered, .. } => match filtered {
1017 FilteredMetadata::Basic(m) => m,
1018 FilteredMetadata::Cors(m) => m,
1019 FilteredMetadata::Opaque => return Err(Error::Network(None)),
1020 FilteredMetadata::OpaqueRedirect(_) => return Err(Error::Network(None)),
1021 },
1022 },
1023 Err(_) => {
1024 self.process_partial_response(
1025 XHRProgress::Errored(gen_id, Error::Network(None)),
1026 can_gc,
1027 );
1028 return Err(Error::Network(None));
1029 },
1030 };
1031
1032 metadata.final_url[..Position::AfterQuery].clone_into(&mut self.response_url.borrow_mut());
1033
1034 self.process_partial_response(
1036 XHRProgress::HeadersReceived(
1037 gen_id,
1038 metadata.headers.map(Serde::into_inner),
1039 metadata.status,
1040 ),
1041 can_gc,
1042 );
1043 Ok(())
1044 }
1045
1046 fn process_data_available(&self, gen_id: GenerationId, payload: Vec<u8>, can_gc: CanGc) {
1047 self.process_partial_response(XHRProgress::Loading(gen_id, payload), can_gc);
1048 }
1049
1050 fn process_response_complete(
1051 &self,
1052 gen_id: GenerationId,
1053 status: Result<(), NetworkError>,
1054 can_gc: CanGc,
1055 ) -> ErrorResult {
1056 match status {
1057 Ok(()) => {
1058 self.process_partial_response(XHRProgress::Done(gen_id), can_gc);
1059 Ok(())
1060 },
1061 Err(_) => {
1062 self.process_partial_response(
1063 XHRProgress::Errored(gen_id, Error::Network(None)),
1064 can_gc,
1065 );
1066 Err(Error::Network(None))
1067 },
1068 }
1069 }
1070
1071 fn process_partial_response(&self, progress: XHRProgress, can_gc: CanGc) {
1072 let msg_id = progress.generation_id();
1073
1074 macro_rules! return_if_fetch_was_terminated(
1077 () => (
1078 if msg_id != self.generation_id.get() {
1079 return
1080 }
1081 );
1082 );
1083
1084 return_if_fetch_was_terminated!();
1086
1087 if self.response_status.get().is_err() {
1089 return;
1090 }
1091
1092 match progress {
1093 XHRProgress::HeadersReceived(_, headers, status) => {
1094 assert!(self.ready_state.get() == XMLHttpRequestState::Opened);
1095 self.upload_complete.set(true);
1101 if !self.sync.get() && self.upload_listener.get() {
1103 self.dispatch_upload_progress_event(atom!("progress"), Ok(None), can_gc);
1104 return_if_fetch_was_terminated!();
1105 self.dispatch_upload_progress_event(atom!("load"), Ok(None), can_gc);
1106 return_if_fetch_was_terminated!();
1107 self.dispatch_upload_progress_event(atom!("loadend"), Ok(None), can_gc);
1108 return_if_fetch_was_terminated!();
1109 }
1110 if !status.is_error() {
1114 *self.status.borrow_mut() = status.clone();
1115 }
1116 if let Some(h) = headers.as_ref() {
1117 *self.response_headers.borrow_mut() = h.clone();
1118 }
1119 {
1120 let len = headers.and_then(|h| h.typed_get::<ContentLength>());
1121 let mut response = self.response.borrow_mut();
1122 response.clear();
1123 if let Some(len) = len {
1124 let size = cmp::min(0b100_0000000000_0000000000, len.0 as usize);
1131
1132 response.reserve(size);
1134 }
1135 }
1136 if !self.sync.get() {
1138 self.change_ready_state(XMLHttpRequestState::HeadersReceived, can_gc);
1139 }
1140 },
1141 XHRProgress::Loading(_, mut partial_response) => {
1142 self.response.borrow_mut().append(&mut partial_response);
1147 if !self.sync.get() {
1148 if self.ready_state.get() == XMLHttpRequestState::HeadersReceived {
1149 self.ready_state.set(XMLHttpRequestState::Loading);
1150 }
1151 let event = Event::new(
1152 &self.global(),
1153 atom!("readystatechange"),
1154 EventBubbles::DoesNotBubble,
1155 EventCancelable::Cancelable,
1156 can_gc,
1157 );
1158 event.fire(self.upcast(), can_gc);
1159 return_if_fetch_was_terminated!();
1160 self.dispatch_response_progress_event(atom!("progress"), can_gc);
1161 }
1162 },
1163 XHRProgress::Done(_) => {
1164 assert!(
1165 self.ready_state.get() == XMLHttpRequestState::HeadersReceived ||
1166 self.ready_state.get() == XMLHttpRequestState::Loading ||
1167 self.sync.get()
1168 );
1169
1170 self.cancel_timeout();
1171 self.canceller.borrow_mut().ignore();
1172
1173 self.send_flag.set(false);
1178
1179 self.change_ready_state(XMLHttpRequestState::Done, can_gc);
1180 return_if_fetch_was_terminated!();
1181 self.dispatch_response_progress_event(atom!("load"), can_gc);
1183 return_if_fetch_was_terminated!();
1184 self.dispatch_response_progress_event(atom!("loadend"), can_gc);
1185 },
1186 XHRProgress::Errored(_, e) => {
1187 self.cancel_timeout();
1188 self.canceller.borrow_mut().ignore();
1189
1190 self.discard_subsequent_responses();
1191 self.send_flag.set(false);
1192 *self.status.borrow_mut() = HttpStatus::new_error();
1193 self.response_headers.borrow_mut().clear();
1194 self.change_ready_state(XMLHttpRequestState::Done, can_gc);
1196 return_if_fetch_was_terminated!();
1197
1198 let errormsg = match e {
1199 Error::Abort(None) => "abort",
1200 Error::Timeout(None) => "timeout",
1201 _ => "error",
1202 };
1203
1204 let upload_complete = &self.upload_complete;
1205 if !upload_complete.get() {
1206 upload_complete.set(true);
1207 if self.upload_listener.get() {
1208 self.dispatch_upload_progress_event(Atom::from(errormsg), Err(()), can_gc);
1209 return_if_fetch_was_terminated!();
1210 self.dispatch_upload_progress_event(atom!("loadend"), Err(()), can_gc);
1211 return_if_fetch_was_terminated!();
1212 }
1213 }
1214 self.dispatch_response_progress_event(Atom::from(errormsg), can_gc);
1215 return_if_fetch_was_terminated!();
1216 self.dispatch_response_progress_event(atom!("loadend"), can_gc);
1217 },
1218 }
1219 }
1220
1221 fn terminate_ongoing_fetch(&self) {
1222 self.canceller.borrow_mut().cancel();
1223 let GenerationId(prev_id) = self.generation_id.get();
1224 self.generation_id.set(GenerationId(prev_id + 1));
1225 self.response_status.set(Ok(()));
1226 }
1227
1228 fn dispatch_progress_event(
1229 &self,
1230 upload: bool,
1231 type_: Atom,
1232 loaded: u64,
1233 total: Option<u64>,
1234 can_gc: CanGc,
1235 ) {
1236 let (total_length, length_computable) = if self
1237 .response_headers
1238 .borrow()
1239 .contains_key(header::CONTENT_ENCODING)
1240 {
1241 (0, false)
1242 } else {
1243 (total.unwrap_or(0), total.is_some())
1244 };
1245 let progressevent = ProgressEvent::new(
1246 &self.global(),
1247 type_,
1248 EventBubbles::DoesNotBubble,
1249 EventCancelable::NotCancelable,
1250 length_computable,
1251 Finite::wrap(loaded as f64),
1252 Finite::wrap(total_length as f64),
1253 can_gc,
1254 );
1255 let target = if upload {
1256 self.upload.upcast()
1257 } else {
1258 self.upcast()
1259 };
1260 progressevent.upcast::<Event>().fire(target, can_gc);
1261 }
1262
1263 fn dispatch_upload_progress_event(
1264 &self,
1265 type_: Atom,
1266 partial_load: Result<Option<u64>, ()>,
1267 can_gc: CanGc,
1268 ) {
1269 let request_body_len = self.request_body_len.get() as u64;
1273 let (loaded, total) = match partial_load {
1274 Ok(l) => match l {
1275 Some(loaded) => (loaded, Some(request_body_len)),
1276 None => (request_body_len, Some(request_body_len)),
1277 },
1278 Err(()) => (0, None),
1279 };
1280 self.dispatch_progress_event(true, type_, loaded, total, can_gc);
1281 }
1282
1283 fn dispatch_response_progress_event(&self, type_: Atom, can_gc: CanGc) {
1284 let len = self.response.borrow().len() as u64;
1285 let total = self
1286 .response_headers
1287 .borrow()
1288 .typed_get::<ContentLength>()
1289 .map(|v| v.0);
1290 self.dispatch_progress_event(false, type_, len, total, can_gc);
1291 }
1292
1293 fn set_timeout(&self, duration: Duration) {
1294 let callback = OneshotTimerCallback::XhrTimeout(XHRTimeoutCallback {
1297 xhr: Trusted::new(self),
1298 generation_id: self.generation_id.get(),
1299 });
1300 *self.timeout_cancel.borrow_mut() =
1301 Some(self.global().schedule_callback(callback, duration));
1302 }
1303
1304 fn cancel_timeout(&self) {
1305 if let Some(handle) = self.timeout_cancel.borrow_mut().take() {
1306 self.global().unschedule_callback(handle);
1307 }
1308 }
1309
1310 fn text_response(&self) -> String {
1312 let charset = self.final_charset().unwrap_or(UTF_8);
1314 let response = self.response.borrow();
1320 let (text, _, _) = charset.decode(&response);
1321 text.into_owned()
1322 }
1323
1324 fn blob_response(&self, can_gc: CanGc) -> DomRoot<Blob> {
1326 if let Some(response) = self.response_blob.get() {
1328 return response;
1329 }
1330 let mime = normalize_type_string(&self.final_mime_type().to_string());
1332
1333 let bytes = self.response.borrow().to_vec();
1335 let blob = Blob::new(
1336 &self.global(),
1337 BlobImpl::new_from_bytes(bytes, mime),
1338 can_gc,
1339 );
1340 self.response_blob.set(Some(&blob));
1341 blob
1342 }
1343
1344 fn arraybuffer_response(&self, cx: JSContext, can_gc: CanGc) -> Option<ArrayBuffer> {
1346 if !self.response_arraybuffer.is_initialized() {
1349 let bytes = self.response.borrow();
1350
1351 self.response_arraybuffer
1353 .set_data(cx, &bytes, can_gc)
1354 .ok()?;
1355 }
1356
1357 self.response_arraybuffer.get_typed_array().ok()
1359 }
1360
1361 fn document_response(&self, can_gc: CanGc) -> Option<DomRoot<Document>> {
1363 let response = self.response_xml.get();
1365 if response.is_some() {
1366 return response;
1367 }
1368
1369 if self.response_status.get().is_err() {
1371 return None;
1372 }
1373
1374 let final_mime = self.final_mime_type();
1376
1377 let is_xml_mime_type = final_mime.matches(TEXT, XML) ||
1379 final_mime.matches(APPLICATION, XML) ||
1380 final_mime.has_suffix(XML);
1381 if !final_mime.matches(TEXT, HTML) && !is_xml_mime_type {
1382 return None;
1383 }
1384
1385 let charset;
1388 let temp_doc;
1389 if final_mime.matches(TEXT, HTML) {
1390 if self.response_type.get() == XMLHttpRequestResponseType::_empty {
1391 return None;
1392 }
1393
1394 charset = Some(self.final_charset().unwrap_or(UTF_8));
1401
1402 temp_doc = self.document_text_html(can_gc);
1406 } else {
1407 assert!(is_xml_mime_type);
1408
1409 temp_doc = self.handle_xml(can_gc);
1416 charset = self.final_charset();
1417
1418 let has_no_child_nodes = temp_doc.upcast::<Node>().children().next().is_none();
1422 if has_no_child_nodes {
1423 return None;
1424 }
1425 }
1426
1427 let charset = charset.unwrap_or(UTF_8);
1429
1430 temp_doc.set_encoding(charset);
1432
1433 self.response_xml.set(Some(&temp_doc));
1441 self.response_xml.get()
1442 }
1443
1444 #[expect(unsafe_code)]
1445 fn json_response(&self, cx: JSContext, mut rval: MutableHandleValue) {
1447 let response_json = self.response_json.get();
1449 if !response_json.is_null_or_undefined() {
1450 return rval.set(response_json);
1451 }
1452 let bytes = self.response.borrow();
1454 if bytes.is_empty() {
1456 return rval.set(NullValue());
1457 }
1458 let json_text = decode_to_utf16_with_bom_removal(&bytes, UTF_8);
1465 unsafe {
1467 if !JS_ParseJSON(
1468 *cx,
1469 json_text.as_ptr(),
1470 json_text.len() as u32,
1471 rval.reborrow(),
1472 ) {
1473 JS_ClearPendingException(*cx);
1474 return rval.set(NullValue());
1475 }
1476 }
1477 self.response_json.set(rval.get());
1479 }
1480
1481 fn document_text_html(&self, can_gc: CanGc) -> DomRoot<Document> {
1482 let charset = self.final_charset().unwrap_or(UTF_8);
1483 let wr = self.global();
1484 let response = self.response.borrow();
1485 let (decoded, _, _) = charset.decode(&response);
1486 let document = self.new_doc(IsHTMLDocument::HTMLDocument, can_gc);
1487 ServoParser::parse_html_document(
1489 &document,
1490 Some(DOMString::from(decoded)),
1491 wr.get_url(),
1492 can_gc,
1493 );
1494 document
1495 }
1496
1497 fn handle_xml(&self, can_gc: CanGc) -> DomRoot<Document> {
1498 let charset = self.final_charset().unwrap_or(UTF_8);
1499 let wr = self.global();
1500 let response = self.response.borrow();
1501 let (decoded, _, _) = charset.decode(&response);
1502 let document = self.new_doc(IsHTMLDocument::NonHTMLDocument, can_gc);
1503 ServoParser::parse_xml_document(
1505 &document,
1506 Some(DOMString::from(decoded)),
1507 wr.get_url(),
1508 can_gc,
1509 );
1510 document
1511 }
1512
1513 fn new_doc(&self, is_html_document: IsHTMLDocument, can_gc: CanGc) -> DomRoot<Document> {
1514 let wr = self.global();
1515 let win = wr.as_window();
1516 let doc = win.Document();
1517 let docloader = DocumentLoader::new(&doc.loader());
1518 let base = wr.get_url();
1519 let parsed_url = base.join(&self.ResponseURL().0).ok();
1520 let content_type = Some(self.final_mime_type());
1521 Document::new(
1522 win,
1523 HasBrowsingContext::No,
1524 parsed_url,
1525 doc.origin().clone(),
1526 is_html_document,
1527 content_type,
1528 None,
1529 DocumentActivity::Inactive,
1530 DocumentSource::FromParser,
1531 docloader,
1532 None,
1533 None,
1534 Default::default(),
1535 false,
1536 false,
1537 Some(doc.insecure_requests_policy()),
1538 doc.has_trustworthy_ancestor_origin(),
1539 doc.custom_element_reaction_stack(),
1540 doc.creation_sandboxing_flag_set(),
1541 can_gc,
1542 )
1543 }
1544
1545 fn filter_response_headers(&self) -> HeaderMap {
1546 let mut headers = self.response_headers.borrow().clone();
1548 headers.remove(header::SET_COOKIE);
1549 headers.remove(HeaderName::from_static("set-cookie2"));
1550 headers
1552 }
1553
1554 fn discard_subsequent_responses(&self) {
1555 self.response_status.set(Err(()));
1556 }
1557
1558 fn fetch(
1559 &self,
1560 request_builder: RequestBuilder,
1561 global: &GlobalScope,
1562 can_gc: CanGc,
1563 ) -> ErrorResult {
1564 let xhr = Trusted::new(self);
1565
1566 let sync_status = Arc::new(AtomicRefCell::new(None));
1567 let context = XHRContext {
1568 xhr,
1569 gen_id: self.generation_id.get(),
1570 sync_status: sync_status.clone(),
1571 url: request_builder.url.clone(),
1572 };
1573
1574 let (task_source, script_port) = if self.sync.get() {
1575 let (sender, receiver) = global.new_script_pair();
1576 (
1577 SendableTaskSource {
1578 sender,
1579 pipeline_id: global.pipeline_id(),
1580 name: TaskSourceName::Networking,
1581 canceller: Default::default(),
1582 },
1583 Some(receiver),
1584 )
1585 } else {
1586 (
1587 global.task_manager().networking_task_source().to_sendable(),
1588 None,
1589 )
1590 };
1591
1592 *self.canceller.borrow_mut() =
1593 FetchCanceller::new(request_builder.id, global.core_resource_thread());
1594
1595 global.fetch(request_builder, context, task_source);
1596
1597 if let Some(script_port) = script_port {
1598 loop {
1599 if !global.process_event(script_port.recv().unwrap(), can_gc) {
1600 return Err(Error::Abort(None));
1602 }
1603 if let Some(ref status) = *sync_status.borrow() {
1604 return status.clone();
1605 }
1606 }
1607 }
1608 Ok(())
1609 }
1610
1611 fn final_charset(&self) -> Option<&'static Encoding> {
1613 let response_charset = self
1617 .response_mime_type()
1618 .get_parameter(CHARSET)
1619 .map(ToString::to_string);
1620
1621 let override_charset = self
1623 .override_mime_type
1624 .borrow()
1625 .as_ref()
1626 .and_then(|mime| mime.get_parameter(CHARSET))
1627 .map(ToString::to_string);
1628
1629 override_charset
1634 .or(response_charset)
1635 .and_then(|charset| Encoding::for_label(charset.as_bytes()))
1636 }
1637
1638 fn response_mime_type(&self) -> Mime {
1640 extract_mime_type_as_dataurl_mime(&self.response_headers.borrow())
1645 .unwrap_or_else(|| Mime::new(TEXT, XML))
1646 }
1647
1648 fn final_mime_type(&self) -> Mime {
1650 self.override_mime_type
1651 .borrow()
1652 .as_ref()
1653 .map(MimeExt::clone)
1654 .unwrap_or_else(|| self.response_mime_type())
1655 }
1656}
1657
1658#[derive(JSTraceable, MallocSizeOf)]
1659pub(crate) struct XHRTimeoutCallback {
1660 #[ignore_malloc_size_of = "Because it is non-owning"]
1661 xhr: Trusted<XMLHttpRequest>,
1662 generation_id: GenerationId,
1663}
1664
1665impl XHRTimeoutCallback {
1666 pub(crate) fn invoke(self, can_gc: CanGc) {
1667 let xhr = self.xhr.root();
1668 if xhr.ready_state.get() != XMLHttpRequestState::Done {
1669 xhr.process_partial_response(
1670 XHRProgress::Errored(self.generation_id, Error::Timeout(None)),
1671 can_gc,
1672 );
1673 }
1674 }
1675}
1676
1677fn serialize_document(doc: &Document) -> Fallible<DOMString> {
1678 let mut writer = vec![];
1679 match serialize(
1680 &mut writer,
1681 &HtmlSerialize::new(doc.upcast::<Node>()),
1682 SerializeOpts::default(),
1683 ) {
1684 Ok(_) => Ok(DOMString::from(String::from_utf8(writer).unwrap())),
1685 Err(_) => Err(Error::InvalidState(None)),
1686 }
1687}
1688
1689pub(crate) fn is_field_value(slice: &[u8]) -> bool {
1692 #[derive(PartialEq)]
1694 #[allow(clippy::upper_case_acronyms)]
1695 enum PreviousCharacter {
1696 Other,
1697 CR,
1698 LF,
1699 SPHT, }
1701 let mut prev = PreviousCharacter::Other; slice.iter().all(|&x| {
1703 match x {
1705 13 => {
1706 if prev == PreviousCharacter::Other || prev == PreviousCharacter::SPHT {
1708 prev = PreviousCharacter::CR;
1709 true
1710 } else {
1711 false
1712 }
1713 },
1714 10 => {
1715 if prev == PreviousCharacter::CR {
1717 prev = PreviousCharacter::LF;
1718 true
1719 } else {
1720 false
1721 }
1722 },
1723 32 => {
1724 if prev == PreviousCharacter::LF || prev == PreviousCharacter::SPHT {
1726 prev = PreviousCharacter::SPHT;
1727 true
1728 } else if prev == PreviousCharacter::Other {
1729 true
1734 } else {
1735 false
1736 }
1737 },
1738 9 => {
1739 if prev == PreviousCharacter::LF || prev == PreviousCharacter::SPHT {
1741 prev = PreviousCharacter::SPHT;
1742 true
1743 } else {
1744 false
1745 }
1746 },
1747 0..=31 | 127 => false, x if x > 127 => false, _ if prev == PreviousCharacter::Other || prev == PreviousCharacter::SPHT => {
1750 prev = PreviousCharacter::Other;
1751 true
1752 },
1753 _ => false, }
1755 })
1756}