diff options
author | Anthony Ramine <n.oxyde@gmail.com> | 2016-10-08 17:59:51 +0200 |
---|---|---|
committer | Anthony Ramine <n.oxyde@gmail.com> | 2016-10-11 15:03:22 +0200 |
commit | 02162a8bdae61430a1b9f4529330fad699072ff3 (patch) | |
tree | c6509607f8b1baaf6710a1892e55ba996e1e90df /components/script/parse | |
parent | 881f7f4de7132cbe7f5aec17f535ff501112ac3c (diff) | |
download | servo-02162a8bdae61430a1b9f4529330fad699072ff3.tar.gz servo-02162a8bdae61430a1b9f4529330fad699072ff3.zip |
Move ParserContext to script::parse
Diffstat (limited to 'components/script/parse')
-rw-r--r-- | components/script/parse/mod.rs | 172 |
1 files changed, 172 insertions, 0 deletions
diff --git a/components/script/parse/mod.rs b/components/script/parse/mod.rs index ba05ec839d4..dc874baef45 100644 --- a/components/script/parse/mod.rs +++ b/components/script/parse/mod.rs @@ -2,15 +2,33 @@ * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ +use document_loader::LoadType; +use dom::bindings::codegen::Bindings::DocumentBinding::DocumentMethods; +use dom::bindings::codegen::Bindings::HTMLImageElementBinding::HTMLImageElementMethods; +use dom::bindings::codegen::Bindings::NodeBinding::NodeMethods; use dom::bindings::inheritance::Castable; use dom::bindings::js::{JS, Root}; use dom::bindings::refcounted::Trusted; +use dom::bindings::str::DOMString; +use dom::htmlimageelement::HTMLImageElement; +use dom::node::Node; use dom::servohtmlparser::ServoHTMLParser; use dom::servoparser::ServoParser; use dom::servoxmlparser::ServoXMLParser; use dom::window::Window; +use encoding::all::UTF_8; +use encoding::types::{DecoderTrap, Encoding}; +use hyper::header::ContentType; +use hyper::mime::{Mime, SubLevel, TopLevel}; +use hyper_serde::Serde; +use msg::constellation_msg::PipelineId; +use net_traits::{AsyncResponseListener, Metadata, NetworkError}; +use network_listener::PreInvoke; +use script_thread::ScriptThread; use std::cell::UnsafeCell; use std::ptr; +use url::Url; +use util::resource_files::read_resource_file; pub mod html; pub mod xml; @@ -160,3 +178,157 @@ impl<'a> ParserRef<'a> { } } +/// The context required for asynchronously fetching a document +/// and parsing it progressively. +pub struct ParserContext { + /// The parser that initiated the request. + parser: Option<TrustedParser>, + /// Is this a synthesized document + is_synthesized_document: bool, + /// The pipeline associated with this document. + id: PipelineId, + /// The URL for this document. + url: Url, +} + +impl ParserContext { + pub fn new(id: PipelineId, url: Url) -> ParserContext { + ParserContext { + parser: None, + is_synthesized_document: false, + id: id, + url: url, + } + } +} + +impl AsyncResponseListener for ParserContext { + fn headers_available(&mut self, meta_result: Result<Metadata, NetworkError>) { + let mut ssl_error = None; + let metadata = match meta_result { + Ok(meta) => Some(meta), + Err(NetworkError::SslValidation(url, reason)) => { + ssl_error = Some(reason); + let mut meta = Metadata::default(url); + let mime: Option<Mime> = "text/html".parse().ok(); + meta.set_content_type(mime.as_ref()); + Some(meta) + }, + Err(_) => None, + }; + let content_type = + metadata.clone().and_then(|meta| meta.content_type).map(Serde::into_inner); + let parser = match ScriptThread::page_headers_available(&self.id, + metadata) { + Some(parser) => parser, + None => return, + }; + + let parser = parser.r(); + let servo_parser = parser.as_servo_parser(); + self.parser = Some(match parser { + ParserRef::HTML(parser) => TrustedParser::HTML( + Trusted::new(parser)), + ParserRef::XML(parser) => TrustedParser::XML( + Trusted::new(parser)), + }); + + match content_type { + Some(ContentType(Mime(TopLevel::Image, _, _))) => { + self.is_synthesized_document = true; + let page = "<html><body></body></html>".into(); + servo_parser.push_input_chunk(page); + parser.parse_sync(); + + let doc = servo_parser.document(); + let doc_body = Root::upcast::<Node>(doc.GetBody().unwrap()); + let img = HTMLImageElement::new(atom!("img"), None, doc); + img.SetSrc(DOMString::from(self.url.to_string())); + doc_body.AppendChild(&Root::upcast::<Node>(img)).expect("Appending failed"); + + }, + Some(ContentType(Mime(TopLevel::Text, SubLevel::Plain, _))) => { + // https://html.spec.whatwg.org/multipage/#read-text + let page = "<pre>\n".into(); + servo_parser.push_input_chunk(page); + parser.parse_sync(); + parser.set_plaintext_state(); + }, + Some(ContentType(Mime(TopLevel::Text, SubLevel::Html, _))) => { // Handle text/html + if let Some(reason) = ssl_error { + self.is_synthesized_document = true; + let page_bytes = read_resource_file("badcert.html").unwrap(); + let page = String::from_utf8(page_bytes).unwrap(); + let page = page.replace("${reason}", &reason); + servo_parser.push_input_chunk(page); + parser.parse_sync(); + } + }, + Some(ContentType(Mime(TopLevel::Text, SubLevel::Xml, _))) => {}, // Handle text/xml + Some(ContentType(Mime(toplevel, sublevel, _))) => { + if toplevel.as_str() == "application" && sublevel.as_str() == "xhtml+xml" { + // Handle xhtml (application/xhtml+xml). + return; + } + + // Show warning page for unknown mime types. + let page = format!("<html><body><p>Unknown content type ({}/{}).</p></body></html>", + toplevel.as_str(), sublevel.as_str()); + self.is_synthesized_document = true; + servo_parser.push_input_chunk(page); + parser.parse_sync(); + }, + None => { + // No content-type header. + // Merge with #4212 when fixed. + } + } + } + + fn data_available(&mut self, payload: Vec<u8>) { + if !self.is_synthesized_document { + // FIXME: use Vec<u8> (html5ever #34) + let data = UTF_8.decode(&payload, DecoderTrap::Replace).unwrap(); + let parser = match self.parser.as_ref() { + Some(parser) => parser.root(), + None => return, + }; + parser.r().parse_chunk(data); + } + } + + fn response_complete(&mut self, status: Result<(), NetworkError>) { + let parser = match self.parser.as_ref() { + Some(parser) => parser.root(), + None => return, + }; + + if let Err(NetworkError::Internal(ref reason)) = status { + // Show an error page for network errors, + // certificate errors are handled earlier. + self.is_synthesized_document = true; + let parser = parser.r(); + let page_bytes = read_resource_file("neterror.html").unwrap(); + let page = String::from_utf8(page_bytes).unwrap(); + let page = page.replace("${reason}", reason); + parser.as_servo_parser().push_input_chunk(page); + parser.parse_sync(); + } else if let Err(err) = status { + // TODO(Savago): we should send a notification to callers #5463. + debug!("Failed to load page URL {}, error: {:?}", self.url, err); + } + + let parser = parser.r(); + let servo_parser = parser.as_servo_parser(); + + servo_parser.document() + .finish_load(LoadType::PageSource(self.url.clone())); + + servo_parser.mark_last_chunk_received(); + if !parser.is_suspended() { + parser.parse_sync(); + } + } +} + +impl PreInvoke for ParserContext {} |