forked from mirrors/gecko-dev
		
	 44ce2304ab
			
		
	
	
		44ce2304ab
		
	
	
	
	
		
			
			<!-- Please describe your changes on the following line: --> --- <!-- Thank you for contributing to Servo! Please replace each `[ ]` by `[X]` when the step is complete, and replace `__` with appropriate data: --> - [X] `./mach build -d` does not report any errors - [X] `./mach test-tidy` does not report any errors - [ ] These changes fix #__ (github issue number if applicable). <!-- Either: --> - [ ] There are tests for these changes OR - [X] These changes do not require tests because refactoring <!-- Pull requests that do not address these steps are welcome, but they will require additional verification as part of the review process. --> r? @emilio Source-Repo: https://github.com/servo/servo Source-Revision: ac6a2681ae9f94827ebd989c3d3c3b175cbb455f
		
			
				
	
	
		
			1462 lines
		
	
	
	
		
			55 KiB
		
	
	
	
		
			Rust
		
	
	
	
	
	
			
		
		
	
	
			1462 lines
		
	
	
	
		
			55 KiB
		
	
	
	
		
			Rust
		
	
	
	
	
	
| /* This Source Code Form is subject to the terms of the Mozilla Public
 | |
|  * License, v. 2.0. If a copy of the MPL was not distributed with this
 | |
|  * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
 | |
| 
 | |
| use document_loader::DocumentLoader;
 | |
| use dom::bindings::cell::DOMRefCell;
 | |
| use dom::bindings::codegen::Bindings::BlobBinding::BlobMethods;
 | |
| use dom::bindings::codegen::Bindings::EventHandlerBinding::EventHandlerNonNull;
 | |
| use dom::bindings::codegen::Bindings::WindowBinding::WindowMethods;
 | |
| use dom::bindings::codegen::Bindings::XMLHttpRequestBinding;
 | |
| use dom::bindings::codegen::Bindings::XMLHttpRequestBinding::BodyInit;
 | |
| use dom::bindings::codegen::Bindings::XMLHttpRequestBinding::XMLHttpRequestMethods;
 | |
| use dom::bindings::codegen::Bindings::XMLHttpRequestBinding::XMLHttpRequestResponseType;
 | |
| use dom::bindings::conversions::ToJSValConvertible;
 | |
| use dom::bindings::error::{Error, ErrorResult, Fallible};
 | |
| use dom::bindings::inheritance::Castable;
 | |
| use dom::bindings::js::{JS, MutHeapJSVal, MutNullableHeap};
 | |
| use dom::bindings::js::{Root, RootedReference};
 | |
| use dom::bindings::refcounted::Trusted;
 | |
| use dom::bindings::reflector::{Reflectable, reflect_dom_object};
 | |
| use dom::bindings::str::{ByteString, DOMString, USVString, is_token};
 | |
| use dom::blob::{Blob, BlobImpl};
 | |
| use dom::document::{Document, IsHTMLDocument};
 | |
| use dom::document::DocumentSource;
 | |
| use dom::event::{Event, EventBubbles, EventCancelable};
 | |
| use dom::eventtarget::EventTarget;
 | |
| use dom::globalscope::GlobalScope;
 | |
| use dom::headers::is_forbidden_header_name;
 | |
| use dom::htmlformelement::{encode_multipart_form_data, generate_boundary};
 | |
| use dom::progressevent::ProgressEvent;
 | |
| use dom::servoparser::ServoParser;
 | |
| use dom::window::Window;
 | |
| use dom::workerglobalscope::WorkerGlobalScope;
 | |
| use dom::xmlhttprequesteventtarget::XMLHttpRequestEventTarget;
 | |
| use dom::xmlhttprequestupload::XMLHttpRequestUpload;
 | |
| use encoding::all::UTF_8;
 | |
| use encoding::label::encoding_from_whatwg_label;
 | |
| use encoding::types::{DecoderTrap, EncoderTrap, Encoding, EncodingRef};
 | |
| use euclid::length::Length;
 | |
| use hyper::header::{ContentLength, ContentType};
 | |
| use hyper::header::Headers;
 | |
| use hyper::method::Method;
 | |
| use hyper::mime::{self, Attr as MimeAttr, Mime, Value as MimeValue};
 | |
| use hyper_serde::Serde;
 | |
| use ipc_channel::ipc;
 | |
| use ipc_channel::router::ROUTER;
 | |
| use js::jsapi::{JSContext, JS_ParseJSON};
 | |
| use js::jsapi::JS_ClearPendingException;
 | |
| use js::jsval::{JSVal, NullValue, UndefinedValue};
 | |
| use msg::constellation_msg::PipelineId;
 | |
| use net_traits::{FetchMetadata, FilteredMetadata};
 | |
| use net_traits::{FetchResponseListener, LoadOrigin, NetworkError, ReferrerPolicy};
 | |
| use net_traits::CoreResourceMsg::Fetch;
 | |
| use net_traits::request::{CredentialsMode, Destination, RequestInit, RequestMode};
 | |
| use net_traits::trim_http_whitespace;
 | |
| use network_listener::{NetworkListener, PreInvoke};
 | |
| use servo_atoms::Atom;
 | |
| use servo_url::ServoUrl;
 | |
| use std::ascii::AsciiExt;
 | |
| use std::borrow::ToOwned;
 | |
| use std::cell::Cell;
 | |
| use std::default::Default;
 | |
| use std::str;
 | |
| use std::sync::{Arc, Mutex};
 | |
| use task_source::networking::NetworkingTaskSource;
 | |
| use time;
 | |
| use timers::{OneshotTimerCallback, OneshotTimerHandle};
 | |
| use url::Position;
 | |
| use util::prefs::PREFS;
 | |
| 
 | |
| #[derive(JSTraceable, PartialEq, Copy, Clone, HeapSizeOf)]
 | |
| enum XMLHttpRequestState {
 | |
|     Unsent = 0,
 | |
|     Opened = 1,
 | |
|     HeadersReceived = 2,
 | |
|     Loading = 3,
 | |
|     Done = 4,
 | |
| }
 | |
| 
 | |
| #[derive(JSTraceable, PartialEq, Clone, Copy, HeapSizeOf)]
 | |
| pub struct GenerationId(u32);
 | |
| 
 | |
| /// Closure of required data for each async network event that comprises the
 | |
| /// XHR's response.
 | |
| struct XHRContext {
 | |
|     xhr: TrustedXHRAddress,
 | |
|     gen_id: GenerationId,
 | |
|     buf: DOMRefCell<Vec<u8>>,
 | |
|     sync_status: DOMRefCell<Option<ErrorResult>>,
 | |
| }
 | |
| 
 | |
| #[derive(Clone)]
 | |
| pub enum XHRProgress {
 | |
|     /// Notify that headers have been received
 | |
|     HeadersReceived(GenerationId, Option<Headers>, Option<(u16, Vec<u8>)>),
 | |
|     /// Partial progress (after receiving headers), containing portion of the response
 | |
|     Loading(GenerationId, ByteString),
 | |
|     /// Loading is done
 | |
|     Done(GenerationId),
 | |
|     /// There was an error (only Error::Abort, Error::Timeout or Error::Network is used)
 | |
|     Errored(GenerationId, Error),
 | |
| }
 | |
| 
 | |
| impl XHRProgress {
 | |
|     fn generation_id(&self) -> GenerationId {
 | |
|         match *self {
 | |
|             XHRProgress::HeadersReceived(id, _, _) |
 | |
|             XHRProgress::Loading(id, _) |
 | |
|             XHRProgress::Done(id) |
 | |
|             XHRProgress::Errored(id, _) => id
 | |
|         }
 | |
|     }
 | |
| }
 | |
| 
 | |
| #[dom_struct]
 | |
| pub struct XMLHttpRequest {
 | |
|     eventtarget: XMLHttpRequestEventTarget,
 | |
|     ready_state: Cell<XMLHttpRequestState>,
 | |
|     timeout: Cell<u32>,
 | |
|     with_credentials: Cell<bool>,
 | |
|     upload: JS<XMLHttpRequestUpload>,
 | |
|     response_url: DOMRefCell<String>,
 | |
|     status: Cell<u16>,
 | |
|     status_text: DOMRefCell<ByteString>,
 | |
|     response: DOMRefCell<ByteString>,
 | |
|     response_type: Cell<XMLHttpRequestResponseType>,
 | |
|     response_xml: MutNullableHeap<JS<Document>>,
 | |
|     response_blob: MutNullableHeap<JS<Blob>>,
 | |
|     #[ignore_heap_size_of = "Defined in rust-mozjs"]
 | |
|     response_json: MutHeapJSVal,
 | |
|     #[ignore_heap_size_of = "Defined in hyper"]
 | |
|     response_headers: DOMRefCell<Headers>,
 | |
|     #[ignore_heap_size_of = "Defined in hyper"]
 | |
|     override_mime_type: DOMRefCell<Option<Mime>>,
 | |
|     #[ignore_heap_size_of = "Defined in rust-encoding"]
 | |
|     override_charset: DOMRefCell<Option<EncodingRef>>,
 | |
| 
 | |
|     // Associated concepts
 | |
|     #[ignore_heap_size_of = "Defined in hyper"]
 | |
|     request_method: DOMRefCell<Method>,
 | |
|     request_url: DOMRefCell<Option<ServoUrl>>,
 | |
|     #[ignore_heap_size_of = "Defined in hyper"]
 | |
|     request_headers: DOMRefCell<Headers>,
 | |
|     request_body_len: Cell<usize>,
 | |
|     sync: Cell<bool>,
 | |
|     upload_complete: Cell<bool>,
 | |
|     send_flag: Cell<bool>,
 | |
| 
 | |
|     timeout_cancel: DOMRefCell<Option<OneshotTimerHandle>>,
 | |
|     fetch_time: Cell<i64>,
 | |
|     generation_id: Cell<GenerationId>,
 | |
|     response_status: Cell<Result<(), ()>>,
 | |
|     referrer_url: Option<ServoUrl>,
 | |
|     referrer_policy: Option<ReferrerPolicy>,
 | |
| }
 | |
| 
 | |
| impl XMLHttpRequest {
 | |
|     fn new_inherited(global: &GlobalScope) -> XMLHttpRequest {
 | |
|         //TODO - update this when referrer policy implemented for workers
 | |
|         let (referrer_url, referrer_policy) = if let Some(window) = global.downcast::<Window>() {
 | |
|             let document = window.Document();
 | |
|             (Some(document.url()), document.get_referrer_policy())
 | |
|         } else {
 | |
|             (None, None)
 | |
|         };
 | |
| 
 | |
|         XMLHttpRequest {
 | |
|             eventtarget: XMLHttpRequestEventTarget::new_inherited(),
 | |
|             ready_state: Cell::new(XMLHttpRequestState::Unsent),
 | |
|             timeout: Cell::new(0u32),
 | |
|             with_credentials: Cell::new(false),
 | |
|             upload: JS::from_ref(&*XMLHttpRequestUpload::new(global)),
 | |
|             response_url: DOMRefCell::new(String::new()),
 | |
|             status: Cell::new(0),
 | |
|             status_text: DOMRefCell::new(ByteString::new(vec!())),
 | |
|             response: DOMRefCell::new(ByteString::new(vec!())),
 | |
|             response_type: Cell::new(XMLHttpRequestResponseType::_empty),
 | |
|             response_xml: Default::default(),
 | |
|             response_blob: Default::default(),
 | |
|             response_json: MutHeapJSVal::new(),
 | |
|             response_headers: DOMRefCell::new(Headers::new()),
 | |
|             override_mime_type: DOMRefCell::new(None),
 | |
|             override_charset: DOMRefCell::new(None),
 | |
| 
 | |
|             request_method: DOMRefCell::new(Method::Get),
 | |
|             request_url: DOMRefCell::new(None),
 | |
|             request_headers: DOMRefCell::new(Headers::new()),
 | |
|             request_body_len: Cell::new(0),
 | |
|             sync: Cell::new(false),
 | |
|             upload_complete: Cell::new(false),
 | |
|             send_flag: Cell::new(false),
 | |
| 
 | |
|             timeout_cancel: DOMRefCell::new(None),
 | |
|             fetch_time: Cell::new(0),
 | |
|             generation_id: Cell::new(GenerationId(0)),
 | |
|             response_status: Cell::new(Ok(())),
 | |
|             referrer_url: referrer_url,
 | |
|             referrer_policy: referrer_policy,
 | |
|         }
 | |
|     }
 | |
|     pub fn new(global: &GlobalScope) -> Root<XMLHttpRequest> {
 | |
|         reflect_dom_object(box XMLHttpRequest::new_inherited(global),
 | |
|                            global,
 | |
|                            XMLHttpRequestBinding::Wrap)
 | |
|     }
 | |
| 
 | |
|     // https://xhr.spec.whatwg.org/#constructors
 | |
|     pub fn Constructor(global: &GlobalScope) -> Fallible<Root<XMLHttpRequest>> {
 | |
|         Ok(XMLHttpRequest::new(global))
 | |
|     }
 | |
| 
 | |
|     fn sync_in_window(&self) -> bool {
 | |
|         self.sync.get() && self.global().is::<Window>()
 | |
|     }
 | |
| 
 | |
|     fn initiate_async_xhr(context: Arc<Mutex<XHRContext>>,
 | |
|                           task_source: NetworkingTaskSource,
 | |
|                           global: &GlobalScope,
 | |
|                           init: RequestInit) {
 | |
|         impl FetchResponseListener for XHRContext {
 | |
|             fn process_request_body(&mut self) {
 | |
|                 // todo
 | |
|             }
 | |
| 
 | |
|             fn process_request_eof(&mut self) {
 | |
|                 // todo
 | |
|             }
 | |
| 
 | |
|             fn process_response(&mut self,
 | |
|                                 metadata: Result<FetchMetadata, NetworkError>) {
 | |
|                 let xhr = self.xhr.root();
 | |
|                 let rv = xhr.process_headers_available(self.gen_id, metadata);
 | |
|                 if rv.is_err() {
 | |
|                     *self.sync_status.borrow_mut() = Some(rv);
 | |
|                 }
 | |
|             }
 | |
| 
 | |
|             fn process_response_chunk(&mut self, mut chunk: Vec<u8>) {
 | |
|                 self.buf.borrow_mut().append(&mut chunk);
 | |
|                 self.xhr.root().process_data_available(self.gen_id, self.buf.borrow().clone());
 | |
|             }
 | |
| 
 | |
|             fn process_response_eof(&mut self, response: Result<(), NetworkError>) {
 | |
|                 let rv = match response {
 | |
|                     Ok(()) => {
 | |
|                         self.xhr.root().process_response_complete(self.gen_id, Ok(()))
 | |
|                     }
 | |
|                     Err(e) => {
 | |
|                         self.xhr.root().process_response_complete(self.gen_id, Err(e))
 | |
|                     }
 | |
|                 };
 | |
|                 *self.sync_status.borrow_mut() = Some(rv);
 | |
|             }
 | |
|         }
 | |
| 
 | |
|         impl PreInvoke for XHRContext {
 | |
|             fn should_invoke(&self) -> bool {
 | |
|                 self.xhr.root().generation_id.get() == self.gen_id
 | |
|             }
 | |
|         }
 | |
| 
 | |
|         let (action_sender, action_receiver) = ipc::channel().unwrap();
 | |
|         let listener = NetworkListener {
 | |
|             context: context,
 | |
|             task_source: task_source,
 | |
|             wrapper: Some(global.get_runnable_wrapper())
 | |
|         };
 | |
|         ROUTER.add_route(action_receiver.to_opaque(), box move |message| {
 | |
|             listener.notify_fetch(message.to().unwrap());
 | |
|         });
 | |
|         global.core_resource_thread().send(Fetch(init, action_sender)).unwrap();
 | |
|     }
 | |
| }
 | |
| 
 | |
| impl LoadOrigin for XMLHttpRequest {
 | |
|     fn referrer_url(&self) -> Option<ServoUrl> {
 | |
|         return self.referrer_url.clone();
 | |
|     }
 | |
| 
 | |
|     fn referrer_policy(&self) -> Option<ReferrerPolicy> {
 | |
|         return self.referrer_policy;
 | |
|     }
 | |
| 
 | |
|     fn pipeline_id(&self) -> Option<PipelineId> {
 | |
|         Some(self.global().pipeline_id())
 | |
|     }
 | |
| }
 | |
| 
 | |
| impl XMLHttpRequestMethods for XMLHttpRequest {
 | |
|     // https://xhr.spec.whatwg.org/#handler-xhr-onreadystatechange
 | |
|     event_handler!(readystatechange, GetOnreadystatechange, SetOnreadystatechange);
 | |
| 
 | |
|     // https://xhr.spec.whatwg.org/#dom-xmlhttprequest-readystate
 | |
|     fn ReadyState(&self) -> u16 {
 | |
|         self.ready_state.get() as u16
 | |
|     }
 | |
| 
 | |
|     // https://xhr.spec.whatwg.org/#the-open()-method
 | |
|     fn Open(&self, method: ByteString, url: USVString) -> ErrorResult {
 | |
|         // Step 8
 | |
|         self.Open_(method, url, true, None, None)
 | |
|     }
 | |
| 
 | |
|     // https://xhr.spec.whatwg.org/#the-open()-method
 | |
|     fn Open_(&self, method: ByteString, url: USVString, async: bool,
 | |
|              username: Option<USVString>, password: Option<USVString>) -> ErrorResult {
 | |
|         // Step 1
 | |
|         if let Some(window) = Root::downcast::<Window>(self.global()) {
 | |
|             if !window.Document().is_fully_active() {
 | |
|                 return Err(Error::InvalidState);
 | |
|             }
 | |
|         }
 | |
| 
 | |
|         // Step 5
 | |
|         //FIXME(seanmonstar): use a Trie instead?
 | |
|         let maybe_method = method.as_str().and_then(|s| {
 | |
|             // Note: hyper tests against the uppercase versions
 | |
|             // Since we want to pass methods not belonging to the short list above
 | |
|             // without changing capitalization, this will actually sidestep rust-http's type system
 | |
|             // since methods like "patch" or "PaTcH" will be considered extension methods
 | |
|             // despite the there being a rust-http method variant for them
 | |
|             let upper = s.to_ascii_uppercase();
 | |
|             match &*upper {
 | |
|                 "DELETE" | "GET" | "HEAD" | "OPTIONS" |
 | |
|                 "POST" | "PUT" | "CONNECT" | "TRACE" |
 | |
|                 "TRACK" => upper.parse().ok(),
 | |
|                 _ => s.parse().ok()
 | |
|             }
 | |
|         });
 | |
| 
 | |
|         match maybe_method {
 | |
|             // Step 4
 | |
|             Some(Method::Connect) | Some(Method::Trace) => Err(Error::Security),
 | |
|             Some(Method::Extension(ref t)) if &**t == "TRACK" => Err(Error::Security),
 | |
|             Some(parsed_method) => {
 | |
|                 // Step 3
 | |
|                 if !is_token(&method) {
 | |
|                     return Err(Error::Syntax)
 | |
|                 }
 | |
| 
 | |
|                 // Step 2
 | |
|                 let base = self.global().api_base_url();
 | |
|                 // Step 6
 | |
|                 let mut parsed_url = match base.join(&url.0) {
 | |
|                     Ok(parsed) => parsed,
 | |
|                     // Step 7
 | |
|                     Err(_) => return Err(Error::Syntax)
 | |
|                 };
 | |
| 
 | |
|                 // Step 9
 | |
|                 if parsed_url.host().is_some() {
 | |
|                     if let Some(user_str) = username {
 | |
|                         parsed_url.set_username(&user_str.0).unwrap();
 | |
|                         let password = password.as_ref().map(|pass_str| &*pass_str.0);
 | |
|                         parsed_url.set_password(password).unwrap();
 | |
|                     }
 | |
|                 }
 | |
| 
 | |
|                 // Step 10
 | |
|                 if !async {
 | |
|                     // FIXME: This should only happen if the global environment is a document environment
 | |
|                     if self.timeout.get() != 0 || self.response_type.get() != XMLHttpRequestResponseType::_empty {
 | |
|                         return Err(Error::InvalidAccess)
 | |
|                     }
 | |
|                 }
 | |
|                 // Step 11 - abort existing requests
 | |
|                 self.terminate_ongoing_fetch();
 | |
| 
 | |
|                 // FIXME(#13767): In the WPT test: FileAPI/blob/Blob-XHR-revoke.html,
 | |
|                 // the xhr.open(url) is expected to hold a reference to the URL,
 | |
|                 // thus renders following revocations invalid. Though we won't
 | |
|                 // implement this for now, if ever needed, we should check blob
 | |
|                 // scheme and trigger corresponding actions here.
 | |
| 
 | |
|                 // Step 12
 | |
|                 *self.request_method.borrow_mut() = parsed_method;
 | |
|                 *self.request_url.borrow_mut() = Some(parsed_url);
 | |
|                 self.sync.set(!async);
 | |
|                 *self.request_headers.borrow_mut() = Headers::new();
 | |
|                 self.send_flag.set(false);
 | |
|                 *self.status_text.borrow_mut() = ByteString::new(vec!());
 | |
|                 self.status.set(0);
 | |
| 
 | |
|                 // Step 13
 | |
|                 if self.ready_state.get() != XMLHttpRequestState::Opened {
 | |
|                     self.change_ready_state(XMLHttpRequestState::Opened);
 | |
|                 }
 | |
|                 Ok(())
 | |
|             },
 | |
|             // Step 3
 | |
|             // This includes cases where as_str() returns None, and when is_token() returns false,
 | |
|             // both of which indicate invalid extension method names
 | |
|             _ => Err(Error::Syntax)
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     // https://xhr.spec.whatwg.org/#the-setrequestheader()-method
 | |
|     fn SetRequestHeader(&self, name: ByteString, value: ByteString) -> ErrorResult {
 | |
|         // Step 1, 2
 | |
|         if self.ready_state.get() != XMLHttpRequestState::Opened || self.send_flag.get() {
 | |
|             return Err(Error::InvalidState);
 | |
|         }
 | |
| 
 | |
|         // Step 3
 | |
|         let value = trim_http_whitespace(&value);
 | |
| 
 | |
|         // Step 4
 | |
|         if !is_token(&name) || !is_field_value(&value) {
 | |
|             return Err(Error::Syntax);
 | |
|         }
 | |
|         let name_lower = name.to_lower();
 | |
|         let name_str = match name_lower.as_str() {
 | |
|             Some(s) => {
 | |
|                 // Step 5
 | |
|                 // Disallowed headers and header prefixes:
 | |
|                 // https://fetch.spec.whatwg.org/#forbidden-header-name
 | |
|                 if is_forbidden_header_name(s) {
 | |
|                     return Ok(());
 | |
|                 } else {
 | |
|                     s
 | |
|                 }
 | |
|             },
 | |
|             None => unreachable!()
 | |
|         };
 | |
| 
 | |
|         debug!("SetRequestHeader: name={:?}, value={:?}", name.as_str(), str::from_utf8(value).ok());
 | |
|         let mut headers = self.request_headers.borrow_mut();
 | |
| 
 | |
| 
 | |
|         // Step 6
 | |
|         let value = match headers.get_raw(name_str) {
 | |
|             Some(raw) => {
 | |
|                 debug!("SetRequestHeader: old value = {:?}", raw[0]);
 | |
|                 let mut buf = raw[0].clone();
 | |
|                 buf.extend_from_slice(b", ");
 | |
|                 buf.extend_from_slice(value);
 | |
|                 debug!("SetRequestHeader: new value = {:?}", buf);
 | |
|                 buf
 | |
|             },
 | |
|             None => value.into(),
 | |
|         };
 | |
| 
 | |
|         headers.set_raw(name_str.to_owned(), vec![value]);
 | |
|         Ok(())
 | |
|     }
 | |
| 
 | |
|     // https://xhr.spec.whatwg.org/#the-timeout-attribute
 | |
|     fn Timeout(&self) -> u32 {
 | |
|         self.timeout.get()
 | |
|     }
 | |
| 
 | |
|     // https://xhr.spec.whatwg.org/#the-timeout-attribute
 | |
|     fn SetTimeout(&self, timeout: u32) -> ErrorResult {
 | |
|         // Step 1
 | |
|         if self.sync_in_window() {
 | |
|             return Err(Error::InvalidAccess);
 | |
|         }
 | |
|         // Step 2
 | |
|         self.timeout.set(timeout);
 | |
| 
 | |
|         if self.send_flag.get() {
 | |
|             if timeout == 0 {
 | |
|                 self.cancel_timeout();
 | |
|                 return Ok(());
 | |
|             }
 | |
|             let progress = time::now().to_timespec().sec - self.fetch_time.get();
 | |
|             if timeout > (progress * 1000) as u32 {
 | |
|                 self.set_timeout(timeout - (progress * 1000) as u32);
 | |
|             } else {
 | |
|                 // Immediately execute the timeout steps
 | |
|                 self.set_timeout(0);
 | |
|             }
 | |
|         }
 | |
|         Ok(())
 | |
|     }
 | |
| 
 | |
|     // https://xhr.spec.whatwg.org/#the-withcredentials-attribute
 | |
|     fn WithCredentials(&self) -> bool {
 | |
|         self.with_credentials.get()
 | |
|     }
 | |
| 
 | |
|     // https://xhr.spec.whatwg.org/#dom-xmlhttprequest-withcredentials
 | |
|     fn SetWithCredentials(&self, with_credentials: bool) -> ErrorResult {
 | |
|         match self.ready_state.get() {
 | |
|             // Step 1
 | |
|             XMLHttpRequestState::HeadersReceived |
 | |
|             XMLHttpRequestState::Loading |
 | |
|             XMLHttpRequestState::Done => Err(Error::InvalidState),
 | |
|             // Step 2
 | |
|             _ if self.send_flag.get() => Err(Error::InvalidState),
 | |
|             // Step 3
 | |
|             _ => {
 | |
|                 self.with_credentials.set(with_credentials);
 | |
|                 Ok(())
 | |
|             }
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     // https://xhr.spec.whatwg.org/#the-upload-attribute
 | |
|     fn Upload(&self) -> Root<XMLHttpRequestUpload> {
 | |
|         Root::from_ref(&*self.upload)
 | |
|     }
 | |
| 
 | |
|     // https://xhr.spec.whatwg.org/#the-send()-method
 | |
|     fn Send(&self, data: Option<BodyInit>) -> ErrorResult {
 | |
|         // Step 1, 2
 | |
|         if self.ready_state.get() != XMLHttpRequestState::Opened || self.send_flag.get() {
 | |
|             return Err(Error::InvalidState);
 | |
|         }
 | |
| 
 | |
|         // Step 3
 | |
|         let data = match *self.request_method.borrow() {
 | |
|             Method::Get | Method::Head => None,
 | |
|             _ => data
 | |
|         };
 | |
|         // Step 4 (first half)
 | |
|         let extracted = data.as_ref().map(|d| d.extract());
 | |
| 
 | |
|         self.request_body_len.set(extracted.as_ref().map_or(0, |e| e.0.len()));
 | |
| 
 | |
|         // todo preserved headers?
 | |
| 
 | |
|         // Step 6
 | |
|         self.upload_complete.set(false);
 | |
|         // Step 7
 | |
|         self.upload_complete.set(match extracted {
 | |
|             None => true,
 | |
|             Some(ref e) if e.0.is_empty() => true,
 | |
|             _ => false
 | |
|         });
 | |
|         // Step 8
 | |
|         self.send_flag.set(true);
 | |
| 
 | |
|         // Step 9
 | |
|         if !self.sync.get() {
 | |
|             // If one of the event handlers below aborts the fetch by calling
 | |
|             // abort or open we will need the current generation id to detect it.
 | |
|             // Substep 1
 | |
|             let gen_id = self.generation_id.get();
 | |
|             self.dispatch_response_progress_event(atom!("loadstart"));
 | |
|             if self.generation_id.get() != gen_id {
 | |
|                 return Ok(());
 | |
|             }
 | |
|             // Substep 2
 | |
|             if !self.upload_complete.get() {
 | |
|                 self.dispatch_upload_progress_event(atom!("loadstart"), Some(0));
 | |
|                 if self.generation_id.get() != gen_id {
 | |
|                     return Ok(());
 | |
|                 }
 | |
|             }
 | |
| 
 | |
|         }
 | |
| 
 | |
|         // Step 5
 | |
|         //TODO - set referrer_policy/referrer_url in request
 | |
|         let has_handlers = self.upload.upcast::<EventTarget>().has_handlers();
 | |
|         let credentials_mode = if self.with_credentials.get() {
 | |
|             CredentialsMode::Include
 | |
|         } else {
 | |
|             CredentialsMode::CredentialsSameOrigin
 | |
|         };
 | |
|         let use_url_credentials = if let Some(ref url) = *self.request_url.borrow() {
 | |
|             !url.username().is_empty() || url.password().is_some()
 | |
|         } else {
 | |
|             unreachable!()
 | |
|         };
 | |
| 
 | |
|         let bypass_cross_origin_check = {
 | |
|             // We want to be able to do cross-origin requests in browser.html.
 | |
|             // If the XHR happens in a top level window and the mozbrowser
 | |
|             // preference is enabled, we allow bypassing the CORS check.
 | |
|             // This is a temporary measure until we figure out Servo privilege
 | |
|             // story. See https://github.com/servo/servo/issues/9582
 | |
|             if let Some(win) = Root::downcast::<Window>(self.global()) {
 | |
|                 let is_root_pipeline = win.parent_info().is_none();
 | |
|                 is_root_pipeline && PREFS.is_mozbrowser_enabled()
 | |
|             } else {
 | |
|                 false
 | |
|             }
 | |
|         };
 | |
| 
 | |
|         let mut request = RequestInit {
 | |
|             method: self.request_method.borrow().clone(),
 | |
|             url: self.request_url.borrow().clone().unwrap(),
 | |
|             headers: (*self.request_headers.borrow()).clone(),
 | |
|             unsafe_request: true,
 | |
|             // XXXManishearth figure out how to avoid this clone
 | |
|             body: extracted.as_ref().map(|e| e.0.clone()),
 | |
|             // XXXManishearth actually "subresource", but it doesn't exist
 | |
|             // https://github.com/whatwg/xhr/issues/71
 | |
|             destination: Destination::None,
 | |
|             synchronous: self.sync.get(),
 | |
|             mode: RequestMode::CorsMode,
 | |
|             use_cors_preflight: has_handlers,
 | |
|             credentials_mode: credentials_mode,
 | |
|             use_url_credentials: use_url_credentials,
 | |
|             origin: self.global().get_url(),
 | |
|             referrer_url: self.referrer_url.clone(),
 | |
|             referrer_policy: self.referrer_policy.clone(),
 | |
|             pipeline_id: self.pipeline_id(),
 | |
|             .. RequestInit::default()
 | |
|         };
 | |
| 
 | |
|         if bypass_cross_origin_check {
 | |
|             request.mode = RequestMode::Navigate;
 | |
|         }
 | |
| 
 | |
|         // step 4 (second half)
 | |
|         match extracted {
 | |
|             Some((_, ref content_type)) => {
 | |
|                 // this should handle Document bodies too, not just BodyInit
 | |
|                 let encoding = if let Some(BodyInit::String(_)) = data {
 | |
|                     // XHR spec differs from http, and says UTF-8 should be in capitals,
 | |
|                     // instead of "utf-8", which is what Hyper defaults to. So not
 | |
|                     // using content types provided by Hyper.
 | |
|                     Some(MimeValue::Ext("UTF-8".to_string()))
 | |
|                 } else {
 | |
|                     None
 | |
|                 };
 | |
| 
 | |
|                 let mut content_type_set = false;
 | |
|                 if let Some(ref ct) = *content_type {
 | |
|                     if !request.headers.has::<ContentType>() {
 | |
|                         request.headers.set_raw("content-type", vec![ct.bytes().collect()]);
 | |
|                         content_type_set = true;
 | |
|                     }
 | |
|                 }
 | |
| 
 | |
|                 if !content_type_set {
 | |
|                     let ct = request.headers.get_mut::<ContentType>();
 | |
|                     if let Some(mut ct) = ct {
 | |
|                         if let Some(encoding) = encoding {
 | |
|                             for param in &mut (ct.0).2 {
 | |
|                                 if param.0 == MimeAttr::Charset {
 | |
|                                     if !param.0.as_str().eq_ignore_ascii_case(encoding.as_str()) {
 | |
|                                         *param = (MimeAttr::Charset, encoding.clone());
 | |
|                                     }
 | |
|                                 }
 | |
|                             }
 | |
|                         }
 | |
|                     }
 | |
|                 }
 | |
| 
 | |
|             }
 | |
|             _ => (),
 | |
|         }
 | |
| 
 | |
|         debug!("request.headers = {:?}", request.headers);
 | |
| 
 | |
|         self.fetch_time.set(time::now().to_timespec().sec);
 | |
| 
 | |
|         let rv = self.fetch(request, &self.global());
 | |
|         // Step 10
 | |
|         if self.sync.get() {
 | |
|             return rv;
 | |
|         }
 | |
| 
 | |
|         let timeout = self.timeout.get();
 | |
|         if timeout > 0 {
 | |
|             self.set_timeout(timeout);
 | |
|         }
 | |
|         Ok(())
 | |
|     }
 | |
| 
 | |
|     // https://xhr.spec.whatwg.org/#the-abort()-method
 | |
|     fn Abort(&self) {
 | |
|         // Step 1
 | |
|         self.terminate_ongoing_fetch();
 | |
|         // Step 2
 | |
|         let state = self.ready_state.get();
 | |
|         if (state == XMLHttpRequestState::Opened && self.send_flag.get()) ||
 | |
|            state == XMLHttpRequestState::HeadersReceived ||
 | |
|            state == XMLHttpRequestState::Loading {
 | |
|             let gen_id = self.generation_id.get();
 | |
|             self.process_partial_response(XHRProgress::Errored(gen_id, Error::Abort));
 | |
|             // If open was called in one of the handlers invoked by the
 | |
|             // above call then we should terminate the abort sequence
 | |
|             if self.generation_id.get() != gen_id {
 | |
|                 return
 | |
|             }
 | |
|         }
 | |
|         // Step 3
 | |
|         self.ready_state.set(XMLHttpRequestState::Unsent);
 | |
|     }
 | |
| 
 | |
|     // https://xhr.spec.whatwg.org/#the-responseurl-attribute
 | |
|     fn ResponseURL(&self) -> USVString {
 | |
|         USVString(self.response_url.borrow().clone())
 | |
|     }
 | |
| 
 | |
|     // https://xhr.spec.whatwg.org/#the-status-attribute
 | |
|     fn Status(&self) -> u16 {
 | |
|         self.status.get()
 | |
|     }
 | |
| 
 | |
|     // https://xhr.spec.whatwg.org/#the-statustext-attribute
 | |
|     fn StatusText(&self) -> ByteString {
 | |
|         self.status_text.borrow().clone()
 | |
|     }
 | |
| 
 | |
|     // https://xhr.spec.whatwg.org/#the-getresponseheader()-method
 | |
|     fn GetResponseHeader(&self, name: ByteString) -> Option<ByteString> {
 | |
|         self.filter_response_headers().iter().find(|h| {
 | |
|             name.eq_ignore_case(&h.name().parse().unwrap())
 | |
|         }).map(|h| {
 | |
|             ByteString::new(h.value_string().into_bytes())
 | |
|         })
 | |
|     }
 | |
| 
 | |
|     // https://xhr.spec.whatwg.org/#the-getallresponseheaders()-method
 | |
|     fn GetAllResponseHeaders(&self) -> ByteString {
 | |
|         ByteString::new(self.filter_response_headers().to_string().into_bytes())
 | |
|     }
 | |
| 
 | |
|     // https://xhr.spec.whatwg.org/#the-overridemimetype()-method
 | |
|     fn OverrideMimeType(&self, mime: DOMString) -> ErrorResult {
 | |
|         // Step 1
 | |
|         match self.ready_state.get() {
 | |
|             XMLHttpRequestState::Loading | XMLHttpRequestState::Done => return Err(Error::InvalidState),
 | |
|             _ => {},
 | |
|         }
 | |
|         // Step 2
 | |
|         let override_mime = try!(mime.parse::<Mime>().map_err(|_| Error::Syntax));
 | |
|         // Step 3
 | |
|         let mime_no_params = Mime(override_mime.clone().0, override_mime.clone().1, vec![]);
 | |
|         *self.override_mime_type.borrow_mut() = Some(mime_no_params);
 | |
|         // Step 4
 | |
|         let value = override_mime.get_param(mime::Attr::Charset);
 | |
|         *self.override_charset.borrow_mut() = value.and_then(|value| {
 | |
|             encoding_from_whatwg_label(value)
 | |
|         });
 | |
|         Ok(())
 | |
|     }
 | |
| 
 | |
|     // https://xhr.spec.whatwg.org/#the-responsetype-attribute
 | |
|     fn ResponseType(&self) -> XMLHttpRequestResponseType {
 | |
|         self.response_type.get()
 | |
|     }
 | |
| 
 | |
|     // https://xhr.spec.whatwg.org/#the-responsetype-attribute
 | |
|     fn SetResponseType(&self, response_type: XMLHttpRequestResponseType) -> ErrorResult {
 | |
|         // Step 1
 | |
|         if self.global().is::<WorkerGlobalScope>() && response_type == XMLHttpRequestResponseType::Document {
 | |
|             return Ok(());
 | |
|         }
 | |
|         match self.ready_state.get() {
 | |
|             // Step 2
 | |
|             XMLHttpRequestState::Loading | XMLHttpRequestState::Done => Err(Error::InvalidState),
 | |
|             _ => {
 | |
|                 if self.sync_in_window() {
 | |
|                     // Step 3
 | |
|                     Err(Error::InvalidAccess)
 | |
|                 } else {
 | |
|                     // Step 4
 | |
|                     self.response_type.set(response_type);
 | |
|                     Ok(())
 | |
|                 }
 | |
|             }
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     #[allow(unsafe_code)]
 | |
|     // https://xhr.spec.whatwg.org/#the-response-attribute
 | |
|     unsafe fn Response(&self, cx: *mut JSContext) -> JSVal {
 | |
|         rooted!(in(cx) let mut rval = UndefinedValue());
 | |
|         match self.response_type.get() {
 | |
|             XMLHttpRequestResponseType::_empty | XMLHttpRequestResponseType::Text => {
 | |
|                 let ready_state = self.ready_state.get();
 | |
|                 // Step 2
 | |
|                 if ready_state == XMLHttpRequestState::Done || ready_state == XMLHttpRequestState::Loading {
 | |
|                     self.text_response().to_jsval(cx, rval.handle_mut());
 | |
|                 } else {
 | |
|                 // Step 1
 | |
|                     "".to_jsval(cx, rval.handle_mut());
 | |
|                 }
 | |
|             },
 | |
|             // Step 1
 | |
|             _ if self.ready_state.get() != XMLHttpRequestState::Done => {
 | |
|                 return NullValue();
 | |
|             },
 | |
|             // Step 2
 | |
|             XMLHttpRequestResponseType::Document => {
 | |
|                 let op_doc = self.document_response();
 | |
|                 if let Some(doc) = op_doc {
 | |
|                     doc.to_jsval(cx, rval.handle_mut());
 | |
|                 } else {
 | |
|                 // Substep 1
 | |
|                     return NullValue();
 | |
|                 }
 | |
|             },
 | |
|             XMLHttpRequestResponseType::Json => {
 | |
|                 self.json_response(cx).to_jsval(cx, rval.handle_mut());
 | |
|             },
 | |
|             XMLHttpRequestResponseType::Blob => {
 | |
|                 self.blob_response().to_jsval(cx, rval.handle_mut());
 | |
|             },
 | |
|             _ => {
 | |
|                 // XXXManishearth handle other response types
 | |
|                 self.response.borrow().to_jsval(cx, rval.handle_mut());
 | |
|             }
 | |
|         }
 | |
|         rval.get()
 | |
|     }
 | |
| 
 | |
|     // https://xhr.spec.whatwg.org/#the-responsetext-attribute
 | |
|     fn GetResponseText(&self) -> Fallible<USVString> {
 | |
|         match self.response_type.get() {
 | |
|             XMLHttpRequestResponseType::_empty | XMLHttpRequestResponseType::Text => {
 | |
|                 Ok(USVString(String::from(match self.ready_state.get() {
 | |
|                     // Step 3
 | |
|                     XMLHttpRequestState::Loading | XMLHttpRequestState::Done => self.text_response(),
 | |
|                     // Step 2
 | |
|                     _ => "".to_owned()
 | |
|                 })))
 | |
|             },
 | |
|             // Step 1
 | |
|             _ => Err(Error::InvalidState)
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     // https://xhr.spec.whatwg.org/#the-responsexml-attribute
 | |
|     fn GetResponseXML(&self) -> Fallible<Option<Root<Document>>> {
 | |
|         // TODO(#2823): Until [Exposed] is implemented, this attribute needs to return null
 | |
|         //              explicitly in the worker scope.
 | |
|         if self.global().is::<WorkerGlobalScope>() {
 | |
|             return Ok(None);
 | |
|         }
 | |
| 
 | |
|         match self.response_type.get() {
 | |
|             XMLHttpRequestResponseType::_empty | XMLHttpRequestResponseType::Document => {
 | |
|                 // Step 3
 | |
|                 if let XMLHttpRequestState::Done = self.ready_state.get() {
 | |
|                     Ok(self.response_xml.get().or_else(|| {
 | |
|                         let response = self.document_response();
 | |
|                         self.response_xml.set(response.r());
 | |
|                         response
 | |
|                     }))
 | |
|                 } else {
 | |
|                 // Step 2
 | |
|                     Ok(None)
 | |
|                 }
 | |
|             }
 | |
|             // Step 1
 | |
|             _ => { Err(Error::InvalidState) }
 | |
|         }
 | |
|     }
 | |
| }
 | |
| 
 | |
| pub type TrustedXHRAddress = Trusted<XMLHttpRequest>;
 | |
| 
 | |
| 
 | |
| impl XMLHttpRequest {
 | |
|     fn change_ready_state(&self, rs: XMLHttpRequestState) {
 | |
|         assert!(self.ready_state.get() != rs);
 | |
|         self.ready_state.set(rs);
 | |
|         let event = Event::new(&self.global(),
 | |
|                                atom!("readystatechange"),
 | |
|                                EventBubbles::DoesNotBubble,
 | |
|                                EventCancelable::Cancelable);
 | |
|         event.fire(self.upcast());
 | |
|     }
 | |
| 
 | |
|     fn process_headers_available(&self,
 | |
|                                  gen_id: GenerationId,
 | |
|                                  metadata: Result<FetchMetadata, NetworkError>)
 | |
|                                  -> Result<(), Error> {
 | |
|         let metadata = match metadata {
 | |
|             Ok(meta) => match meta {
 | |
|                 FetchMetadata::Unfiltered(m) => m,
 | |
|                 FetchMetadata::Filtered { filtered, .. } => match filtered {
 | |
|                     FilteredMetadata::Opaque => return Err(Error::Network),
 | |
|                     FilteredMetadata::Transparent(m) => m
 | |
|                 }
 | |
|             },
 | |
|             Err(_) => {
 | |
|                 self.process_partial_response(XHRProgress::Errored(gen_id, Error::Network));
 | |
|                 return Err(Error::Network);
 | |
|             },
 | |
|         };
 | |
| 
 | |
|         *self.response_url.borrow_mut() = metadata.final_url[..Position::AfterQuery].to_owned();
 | |
| 
 | |
|         // XXXManishearth Clear cache entries in case of a network error
 | |
|         self.process_partial_response(XHRProgress::HeadersReceived(
 | |
|             gen_id,
 | |
|             metadata.headers.map(Serde::into_inner),
 | |
|             metadata.status));
 | |
|         Ok(())
 | |
|     }
 | |
| 
 | |
|     fn process_data_available(&self, gen_id: GenerationId, payload: Vec<u8>) {
 | |
|         self.process_partial_response(XHRProgress::Loading(gen_id, ByteString::new(payload)));
 | |
|     }
 | |
| 
 | |
|     fn process_response_complete(&self, gen_id: GenerationId, status: Result<(), NetworkError>)
 | |
|                                  -> ErrorResult {
 | |
|         match status {
 | |
|             Ok(()) => {
 | |
|                 self.process_partial_response(XHRProgress::Done(gen_id));
 | |
|                 Ok(())
 | |
|             },
 | |
|             Err(_) => {
 | |
|                 self.process_partial_response(XHRProgress::Errored(gen_id, Error::Network));
 | |
|                 Err(Error::Network)
 | |
|             }
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     fn process_partial_response(&self, progress: XHRProgress) {
 | |
|         let msg_id = progress.generation_id();
 | |
| 
 | |
|         // Aborts processing if abort() or open() was called
 | |
|         // (including from one of the event handlers called below)
 | |
|         macro_rules! return_if_fetch_was_terminated(
 | |
|             () => (
 | |
|                 if msg_id != self.generation_id.get() {
 | |
|                     return
 | |
|                 }
 | |
|             );
 | |
|         );
 | |
| 
 | |
|         // Ignore message if it belongs to a terminated fetch
 | |
|         return_if_fetch_was_terminated!();
 | |
| 
 | |
|         // Ignore messages coming from previously-errored responses or requests that have timed out
 | |
|         if self.response_status.get().is_err() {
 | |
|             return;
 | |
|         }
 | |
| 
 | |
|         match progress {
 | |
|             XHRProgress::HeadersReceived(_, headers, status) => {
 | |
|                 assert!(self.ready_state.get() == XMLHttpRequestState::Opened);
 | |
|                 // For synchronous requests, this should not fire any events, and just store data
 | |
|                 // XXXManishearth Find a way to track partial progress of the send (onprogresss for XHRUpload)
 | |
| 
 | |
|                 // Part of step 13, send() (processing request end of file)
 | |
|                 // Substep 1
 | |
|                 self.upload_complete.set(true);
 | |
|                 // Substeps 2-4
 | |
|                 if !self.sync.get() {
 | |
|                     self.dispatch_upload_progress_event(atom!("progress"), None);
 | |
|                     return_if_fetch_was_terminated!();
 | |
|                     self.dispatch_upload_progress_event(atom!("load"), None);
 | |
|                     return_if_fetch_was_terminated!();
 | |
|                     self.dispatch_upload_progress_event(atom!("loadend"), None);
 | |
|                     return_if_fetch_was_terminated!();
 | |
|                 }
 | |
|                 // Part of step 13, send() (processing response)
 | |
|                 // XXXManishearth handle errors, if any (substep 1)
 | |
|                 // Substep 2
 | |
|                 status.map(|(code, reason)| {
 | |
|                     self.status.set(code);
 | |
|                     *self.status_text.borrow_mut() = ByteString::new(reason);
 | |
|                 });
 | |
|                 headers.as_ref().map(|h| *self.response_headers.borrow_mut() = h.clone());
 | |
| 
 | |
|                 // Substep 3
 | |
|                 if !self.sync.get() {
 | |
|                     self.change_ready_state(XMLHttpRequestState::HeadersReceived);
 | |
|                 }
 | |
|             },
 | |
|             XHRProgress::Loading(_, partial_response) => {
 | |
|                 // For synchronous requests, this should not fire any events, and just store data
 | |
|                 // Part of step 11, send() (processing response body)
 | |
|                 // XXXManishearth handle errors, if any (substep 2)
 | |
| 
 | |
|                 *self.response.borrow_mut() = partial_response;
 | |
|                 if !self.sync.get() {
 | |
|                     if self.ready_state.get() == XMLHttpRequestState::HeadersReceived {
 | |
|                         self.ready_state.set(XMLHttpRequestState::Loading);
 | |
|                     }
 | |
|                     let event = Event::new(
 | |
|                         &self.global(),
 | |
|                         atom!("readystatechange"),
 | |
|                         EventBubbles::DoesNotBubble,
 | |
|                         EventCancelable::Cancelable);
 | |
|                     event.fire(self.upcast());
 | |
|                     return_if_fetch_was_terminated!();
 | |
|                     self.dispatch_response_progress_event(atom!("progress"));
 | |
|                 }
 | |
|             },
 | |
|             XHRProgress::Done(_) => {
 | |
|                 assert!(self.ready_state.get() == XMLHttpRequestState::HeadersReceived ||
 | |
|                         self.ready_state.get() == XMLHttpRequestState::Loading ||
 | |
|                         self.sync.get());
 | |
| 
 | |
|                 self.cancel_timeout();
 | |
| 
 | |
|                 // Part of step 11, send() (processing response end of file)
 | |
|                 // XXXManishearth handle errors, if any (substep 2)
 | |
| 
 | |
|                 // Subsubsteps 5-7
 | |
|                 self.send_flag.set(false);
 | |
| 
 | |
|                 self.change_ready_state(XMLHttpRequestState::Done);
 | |
|                 return_if_fetch_was_terminated!();
 | |
|                 // Subsubsteps 10-12
 | |
|                 self.dispatch_response_progress_event(atom!("progress"));
 | |
|                 return_if_fetch_was_terminated!();
 | |
|                 self.dispatch_response_progress_event(atom!("load"));
 | |
|                 return_if_fetch_was_terminated!();
 | |
|                 self.dispatch_response_progress_event(atom!("loadend"));
 | |
|             },
 | |
|             XHRProgress::Errored(_, e) => {
 | |
|                 self.cancel_timeout();
 | |
| 
 | |
|                 self.discard_subsequent_responses();
 | |
|                 self.send_flag.set(false);
 | |
|                 // XXXManishearth set response to NetworkError
 | |
|                 self.change_ready_state(XMLHttpRequestState::Done);
 | |
|                 return_if_fetch_was_terminated!();
 | |
| 
 | |
|                 let errormsg = match e {
 | |
|                     Error::Abort => "abort",
 | |
|                     Error::Timeout => "timeout",
 | |
|                     _ => "error",
 | |
|                 };
 | |
| 
 | |
|                 let upload_complete = &self.upload_complete;
 | |
|                 if !upload_complete.get() {
 | |
|                     upload_complete.set(true);
 | |
|                     self.dispatch_upload_progress_event(atom!("progress"), None);
 | |
|                     return_if_fetch_was_terminated!();
 | |
|                     self.dispatch_upload_progress_event(Atom::from(errormsg), None);
 | |
|                     return_if_fetch_was_terminated!();
 | |
|                     self.dispatch_upload_progress_event(atom!("loadend"), None);
 | |
|                     return_if_fetch_was_terminated!();
 | |
|                 }
 | |
|                 self.dispatch_response_progress_event(atom!("progress"));
 | |
|                 return_if_fetch_was_terminated!();
 | |
|                 self.dispatch_response_progress_event(Atom::from(errormsg));
 | |
|                 return_if_fetch_was_terminated!();
 | |
|                 self.dispatch_response_progress_event(atom!("loadend"));
 | |
|             }
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     fn terminate_ongoing_fetch(&self) {
 | |
|         let GenerationId(prev_id) = self.generation_id.get();
 | |
|         self.generation_id.set(GenerationId(prev_id + 1));
 | |
|         self.response_status.set(Ok(()));
 | |
|     }
 | |
| 
 | |
|     fn dispatch_progress_event(&self, upload: bool, type_: Atom, loaded: u64, total: Option<u64>) {
 | |
|         let progressevent = ProgressEvent::new(&self.global(),
 | |
|                                                type_,
 | |
|                                                EventBubbles::DoesNotBubble,
 | |
|                                                EventCancelable::NotCancelable,
 | |
|                                                total.is_some(), loaded,
 | |
|                                                total.unwrap_or(0));
 | |
|         let target = if upload {
 | |
|             self.upload.upcast()
 | |
|         } else {
 | |
|             self.upcast()
 | |
|         };
 | |
|         progressevent.upcast::<Event>().fire(target);
 | |
|     }
 | |
| 
 | |
|     fn dispatch_upload_progress_event(&self, type_: Atom, partial_load: Option<u64>) {
 | |
|         // If partial_load is None, loading has completed and we can just use the value from the request body
 | |
| 
 | |
|         let total = self.request_body_len.get() as u64;
 | |
|         self.dispatch_progress_event(true, type_, partial_load.unwrap_or(total), Some(total));
 | |
|     }
 | |
| 
 | |
|     fn dispatch_response_progress_event(&self, type_: Atom) {
 | |
|         let len = self.response.borrow().len() as u64;
 | |
|         let total = self.response_headers.borrow().get::<ContentLength>().map(|x| { **x as u64 });
 | |
|         self.dispatch_progress_event(false, type_, len, total);
 | |
|     }
 | |
|     fn set_timeout(&self, duration_ms: u32) {
 | |
|         // Sets up the object to timeout in a given number of milliseconds
 | |
|         // This will cancel all previous timeouts
 | |
|         let callback = OneshotTimerCallback::XhrTimeout(XHRTimeoutCallback {
 | |
|             xhr: Trusted::new(self),
 | |
|             generation_id: self.generation_id.get(),
 | |
|         });
 | |
|         let duration = Length::new(duration_ms as u64);
 | |
|         *self.timeout_cancel.borrow_mut() =
 | |
|             Some(self.global().schedule_callback(callback, duration));
 | |
|     }
 | |
| 
 | |
|     fn cancel_timeout(&self) {
 | |
|         if let Some(handle) = self.timeout_cancel.borrow_mut().take() {
 | |
|             self.global().unschedule_callback(handle);
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     // https://xhr.spec.whatwg.org/#text-response
 | |
|     fn text_response(&self) -> String {
 | |
|         // Step 3, 5
 | |
|         let charset = self.final_charset().unwrap_or(UTF_8);
 | |
|         // TODO: Step 4 - add support for XML encoding guess stuff using XML spec
 | |
| 
 | |
|         // According to Simon, decode() should never return an error, so unwrap()ing
 | |
|         // the result should be fine. XXXManishearth have a closer look at this later
 | |
|         // Step 1, 2, 6
 | |
|         charset.decode(&self.response.borrow(), DecoderTrap::Replace).unwrap()
 | |
|     }
 | |
| 
 | |
|     // https://xhr.spec.whatwg.org/#blob-response
 | |
|     fn blob_response(&self) -> Root<Blob> {
 | |
|         // Step 1
 | |
|         if let Some(response) = self.response_blob.get() {
 | |
|             return response;
 | |
|         }
 | |
|         // Step 2
 | |
|         let mime = self.final_mime_type().as_ref().map(Mime::to_string).unwrap_or("".to_owned());
 | |
| 
 | |
|         // Step 3, 4
 | |
|         let bytes = self.response.borrow().to_vec();
 | |
|         let blob = Blob::new(&self.global(), BlobImpl::new_from_bytes(bytes), mime);
 | |
|         self.response_blob.set(Some(&blob));
 | |
|         blob
 | |
|     }
 | |
| 
 | |
|     // https://xhr.spec.whatwg.org/#document-response
 | |
|     fn document_response(&self) -> Option<Root<Document>> {
 | |
|         // Step 1
 | |
|         let response = self.response_xml.get();
 | |
|         if response.is_some() {
 | |
|             return self.response_xml.get();
 | |
|         }
 | |
| 
 | |
|         let mime_type = self.final_mime_type();
 | |
|         // TODO: prescan the response to determine encoding if final charset is null
 | |
|         let charset = self.final_charset().unwrap_or(UTF_8);
 | |
|         let temp_doc: Root<Document>;
 | |
|         match mime_type {
 | |
|             Some(Mime(mime::TopLevel::Text, mime::SubLevel::Html, _)) => {
 | |
|                 // Step 5
 | |
|                 if self.response_type.get() == XMLHttpRequestResponseType::_empty {
 | |
|                     return None;
 | |
|                 } else {
 | |
|                     // Step 6
 | |
|                     temp_doc = self.document_text_html();
 | |
|                 }
 | |
|             },
 | |
|             // Step 7
 | |
|             Some(Mime(mime::TopLevel::Text, mime::SubLevel::Xml, _)) |
 | |
|             Some(Mime(mime::TopLevel::Application, mime::SubLevel::Xml, _)) |
 | |
|             None => {
 | |
|                 temp_doc = self.handle_xml();
 | |
|             },
 | |
|             Some(Mime(_, mime::SubLevel::Ext(sub), _)) => {
 | |
|                 if sub.ends_with("+xml") {
 | |
|                     temp_doc = self.handle_xml();
 | |
|                 } else {
 | |
|                     return None;
 | |
|                 }
 | |
|             },
 | |
|             // Step 4
 | |
|             _ => { return None; }
 | |
|         }
 | |
|         // Step 9
 | |
|         temp_doc.set_encoding(charset);
 | |
|         // Step 13
 | |
|         self.response_xml.set(Some(&temp_doc));
 | |
|         return self.response_xml.get();
 | |
|     }
 | |
| 
 | |
|     #[allow(unsafe_code)]
 | |
|     // https://xhr.spec.whatwg.org/#json-response
 | |
|     fn json_response(&self, cx: *mut JSContext) -> JSVal {
 | |
|         // Step 1
 | |
|         let response_json = self.response_json.get();
 | |
|         if !response_json.is_null_or_undefined() {
 | |
|             return response_json;
 | |
|         }
 | |
|         // Step 2
 | |
|         let bytes = self.response.borrow();
 | |
|         // Step 3
 | |
|         if bytes.len() == 0 {
 | |
|             return NullValue();
 | |
|         }
 | |
|         // Step 4
 | |
|         let json_text = UTF_8.decode(&bytes, DecoderTrap::Replace).unwrap();
 | |
|         let json_text: Vec<u16> = json_text.encode_utf16().collect();
 | |
|         // Step 5
 | |
|         rooted!(in(cx) let mut rval = UndefinedValue());
 | |
|         unsafe {
 | |
|             if !JS_ParseJSON(cx,
 | |
|                              json_text.as_ptr(),
 | |
|                              json_text.len() as u32,
 | |
|                              rval.handle_mut()) {
 | |
|                 JS_ClearPendingException(cx);
 | |
|                 return NullValue();
 | |
|             }
 | |
|         }
 | |
|         // Step 6
 | |
|         self.response_json.set(rval.get());
 | |
|         self.response_json.get()
 | |
|     }
 | |
| 
 | |
|     fn document_text_html(&self) -> Root<Document>{
 | |
|         let charset = self.final_charset().unwrap_or(UTF_8);
 | |
|         let wr = self.global();
 | |
|         let decoded = charset.decode(&self.response.borrow(), DecoderTrap::Replace).unwrap();
 | |
|         let document = self.new_doc(IsHTMLDocument::HTMLDocument);
 | |
|         // TODO: Disable scripting while parsing
 | |
|         ServoParser::parse_html_document(
 | |
|             &document,
 | |
|             DOMString::from(decoded),
 | |
|             wr.get_url(),
 | |
|             Some(wr.pipeline_id()));
 | |
|         document
 | |
|     }
 | |
| 
 | |
|     fn handle_xml(&self) -> Root<Document> {
 | |
|         let charset = self.final_charset().unwrap_or(UTF_8);
 | |
|         let wr = self.global();
 | |
|         let decoded = charset.decode(&self.response.borrow(), DecoderTrap::Replace).unwrap();
 | |
|         let document = self.new_doc(IsHTMLDocument::NonHTMLDocument);
 | |
|         // TODO: Disable scripting while parsing
 | |
|         ServoParser::parse_xml_document(
 | |
|             &document,
 | |
|             DOMString::from(decoded),
 | |
|             wr.get_url(),
 | |
|             Some(wr.pipeline_id()));
 | |
|         document
 | |
|     }
 | |
| 
 | |
|     fn new_doc(&self, is_html_document: IsHTMLDocument) -> Root<Document> {
 | |
|         let wr = self.global();
 | |
|         let win = wr.as_window();
 | |
|         let doc = win.Document();
 | |
|         let docloader = DocumentLoader::new(&*doc.loader());
 | |
|         let base = wr.get_url();
 | |
|         let parsed_url = match base.join(&self.ResponseURL().0) {
 | |
|             Ok(parsed) => Some(parsed),
 | |
|             Err(_) => None // Step 7
 | |
|         };
 | |
|         let mime_type = self.final_mime_type();
 | |
|         let content_type = mime_type.map(|mime|{
 | |
|             DOMString::from(format!("{}", mime))
 | |
|         });
 | |
|         Document::new(win,
 | |
|                       None,
 | |
|                       parsed_url,
 | |
|                       is_html_document,
 | |
|                       content_type,
 | |
|                       None,
 | |
|                       DocumentSource::FromParser,
 | |
|                       docloader,
 | |
|                       None,
 | |
|                       None)
 | |
|     }
 | |
| 
 | |
|     fn filter_response_headers(&self) -> Headers {
 | |
|         // https://fetch.spec.whatwg.org/#concept-response-header-list
 | |
|         use hyper::error::Result;
 | |
|         use hyper::header::{Header, HeaderFormat};
 | |
|         use hyper::header::SetCookie;
 | |
|         use std::fmt;
 | |
| 
 | |
|         // a dummy header so we can use headers.remove::<SetCookie2>()
 | |
|         #[derive(Clone, Debug, HeapSizeOf)]
 | |
|         struct SetCookie2;
 | |
|         impl Header for SetCookie2 {
 | |
|             fn header_name() -> &'static str {
 | |
|                 "set-cookie2"
 | |
|             }
 | |
| 
 | |
|             fn parse_header(_: &[Vec<u8>]) -> Result<SetCookie2> {
 | |
|                 unimplemented!()
 | |
|             }
 | |
|         }
 | |
|         impl HeaderFormat for SetCookie2 {
 | |
|             fn fmt_header(&self, _f: &mut fmt::Formatter) -> fmt::Result {
 | |
|                 unimplemented!()
 | |
|             }
 | |
|         }
 | |
| 
 | |
|         let mut headers = self.response_headers.borrow().clone();
 | |
|         headers.remove::<SetCookie>();
 | |
|         headers.remove::<SetCookie2>();
 | |
|         // XXXManishearth additional CORS filtering goes here
 | |
|         headers
 | |
|     }
 | |
| 
 | |
|     fn discard_subsequent_responses(&self) {
 | |
|         self.response_status.set(Err(()));
 | |
|     }
 | |
| 
 | |
|     fn fetch(&self,
 | |
|               init: RequestInit,
 | |
|               global: &GlobalScope) -> ErrorResult {
 | |
|         let xhr = Trusted::new(self);
 | |
| 
 | |
|         let context = Arc::new(Mutex::new(XHRContext {
 | |
|             xhr: xhr,
 | |
|             gen_id: self.generation_id.get(),
 | |
|             buf: DOMRefCell::new(vec!()),
 | |
|             sync_status: DOMRefCell::new(None),
 | |
|         }));
 | |
| 
 | |
|         let (task_source, script_port) = if self.sync.get() {
 | |
|             let (tx, rx) = global.new_script_pair();
 | |
|             (NetworkingTaskSource(tx), Some(rx))
 | |
|         } else {
 | |
|             (global.networking_task_source(), None)
 | |
|         };
 | |
| 
 | |
|         XMLHttpRequest::initiate_async_xhr(context.clone(), task_source,
 | |
|                                            global, init);
 | |
| 
 | |
|         if let Some(script_port) = script_port {
 | |
|             loop {
 | |
|                 global.process_event(script_port.recv().unwrap());
 | |
|                 let context = context.lock().unwrap();
 | |
|                 let sync_status = context.sync_status.borrow();
 | |
|                 if let Some(ref status) = *sync_status {
 | |
|                     return status.clone();
 | |
|                 }
 | |
|             }
 | |
|         }
 | |
|         Ok(())
 | |
|     }
 | |
| 
 | |
|     fn final_charset(&self) -> Option<EncodingRef> {
 | |
|         if self.override_charset.borrow().is_some() {
 | |
|             self.override_charset.borrow().clone()
 | |
|         } else {
 | |
|             match self.response_headers.borrow().get() {
 | |
|                 Some(&ContentType(ref mime)) => {
 | |
|                     let value = mime.get_param(mime::Attr::Charset);
 | |
|                     value.and_then(|value|{
 | |
|                         encoding_from_whatwg_label(value)
 | |
|                     })
 | |
|                 }
 | |
|                 None => { None }
 | |
|             }
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     fn final_mime_type(&self) -> Option<Mime> {
 | |
|         if self.override_mime_type.borrow().is_some() {
 | |
|             self.override_mime_type.borrow().clone()
 | |
|         } else {
 | |
|             match self.response_headers.borrow().get() {
 | |
|                 Some(&ContentType(ref mime)) => { Some(mime.clone()) },
 | |
|                 None => { None }
 | |
|             }
 | |
|         }
 | |
|     }
 | |
| }
 | |
| 
 | |
| #[derive(JSTraceable, HeapSizeOf)]
 | |
| pub struct XHRTimeoutCallback {
 | |
|     #[ignore_heap_size_of = "Because it is non-owning"]
 | |
|     xhr: Trusted<XMLHttpRequest>,
 | |
|     generation_id: GenerationId,
 | |
| }
 | |
| 
 | |
| impl XHRTimeoutCallback {
 | |
|     pub fn invoke(self) {
 | |
|         let xhr = self.xhr.root();
 | |
|         if xhr.ready_state.get() != XMLHttpRequestState::Done {
 | |
|             xhr.process_partial_response(XHRProgress::Errored(self.generation_id, Error::Timeout));
 | |
|         }
 | |
|     }
 | |
| }
 | |
| 
 | |
| pub trait Extractable {
 | |
|     fn extract(&self) -> (Vec<u8>, Option<DOMString>);
 | |
| }
 | |
| impl Extractable for BodyInit {
 | |
|     // https://fetch.spec.whatwg.org/#concept-bodyinit-extract
 | |
|     fn extract(&self) -> (Vec<u8>, Option<DOMString>) {
 | |
|         match *self {
 | |
|             BodyInit::String(ref s) => {
 | |
|                 let encoding = UTF_8 as EncodingRef;
 | |
|                 (encoding.encode(s, EncoderTrap::Replace).unwrap(),
 | |
|                     Some(DOMString::from("text/plain;charset=UTF-8")))
 | |
|             }
 | |
|             BodyInit::URLSearchParams(ref usp) => {
 | |
|                 // Default encoding is UTF-8.
 | |
|                 (usp.serialize(None).into_bytes(),
 | |
|                     Some(DOMString::from("application/x-www-form-urlencoded;charset=UTF-8")))
 | |
|             }
 | |
|             BodyInit::Blob(ref b) => {
 | |
|                 let content_type = if b.Type().as_ref().is_empty() {
 | |
|                     None
 | |
|                 } else {
 | |
|                     Some(b.Type())
 | |
|                 };
 | |
|                 let bytes = b.get_bytes().unwrap_or(vec![]);
 | |
|                 (bytes, content_type)
 | |
|             }
 | |
|             BodyInit::FormData(ref formdata) => {
 | |
|                 let boundary = generate_boundary();
 | |
|                 let bytes = encode_multipart_form_data(&mut formdata.datums(), boundary.clone(),
 | |
|                                                        UTF_8 as EncodingRef);
 | |
|                 (bytes, Some(DOMString::from(format!("multipart/form-data;boundary={}", boundary))))
 | |
|             }
 | |
|         }
 | |
|     }
 | |
| }
 | |
| 
 | |
| /// Returns whether `bs` is a `field-value`, as defined by
 | |
| /// [RFC 2616](http://tools.ietf.org/html/rfc2616#page-32).
 | |
| pub fn is_field_value(slice: &[u8]) -> bool {
 | |
|     // Classifications of characters necessary for the [CRLF] (SP|HT) rule
 | |
|     #[derive(PartialEq)]
 | |
|     enum PreviousCharacter {
 | |
|         Other,
 | |
|         CR,
 | |
|         LF,
 | |
|         SPHT, // SP or HT
 | |
|     }
 | |
|     let mut prev = PreviousCharacter::Other; // The previous character
 | |
|     slice.iter().all(|&x| {
 | |
|         // http://tools.ietf.org/html/rfc2616#section-2.2
 | |
|         match x {
 | |
|             13  => { // CR
 | |
|                 if prev == PreviousCharacter::Other || prev == PreviousCharacter::SPHT {
 | |
|                     prev = PreviousCharacter::CR;
 | |
|                     true
 | |
|                 } else {
 | |
|                     false
 | |
|                 }
 | |
|             },
 | |
|             10 => { // LF
 | |
|                 if prev == PreviousCharacter::CR {
 | |
|                     prev = PreviousCharacter::LF;
 | |
|                     true
 | |
|                 } else {
 | |
|                     false
 | |
|                 }
 | |
|             },
 | |
|             32 => { // SP
 | |
|                 if prev == PreviousCharacter::LF || prev == PreviousCharacter::SPHT {
 | |
|                     prev = PreviousCharacter::SPHT;
 | |
|                     true
 | |
|                 } else if prev == PreviousCharacter::Other {
 | |
|                     // Counts as an Other here, since it's not preceded by a CRLF
 | |
|                     // SP is not a CTL, so it can be used anywhere
 | |
|                     // though if used immediately after a CR the CR is invalid
 | |
|                     // We don't change prev since it's already Other
 | |
|                     true
 | |
|                 } else {
 | |
|                     false
 | |
|                 }
 | |
|             },
 | |
|             9 => { // HT
 | |
|                 if prev == PreviousCharacter::LF || prev == PreviousCharacter::SPHT {
 | |
|                     prev = PreviousCharacter::SPHT;
 | |
|                     true
 | |
|                 } else {
 | |
|                     false
 | |
|                 }
 | |
|             },
 | |
|             0...31 | 127 => false, // CTLs
 | |
|             x if x > 127 => false, // non ASCII
 | |
|             _ if prev == PreviousCharacter::Other || prev == PreviousCharacter::SPHT => {
 | |
|                 prev = PreviousCharacter::Other;
 | |
|                 true
 | |
|             },
 | |
|             _ => false // Previous character was a CR/LF but not part of the [CRLF] (SP|HT) rule
 | |
|         }
 | |
|     })
 | |
| }
 |