File: DNSServiceBase.cpp

package info (click to toggle)
firefox 148.0-1
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 4,719,656 kB
  • sloc: cpp: 7,618,171; javascript: 6,701,506; ansic: 3,781,787; python: 1,418,364; xml: 638,647; asm: 438,962; java: 186,285; sh: 62,885; makefile: 19,010; objc: 13,092; perl: 12,763; yacc: 4,583; cs: 3,846; pascal: 3,448; lex: 1,720; ruby: 1,003; php: 436; lisp: 258; awk: 247; sql: 66; sed: 54; csh: 10; exp: 6
file content (82 lines) | stat: -rw-r--r-- 3,155 bytes parent folder | download | duplicates (14)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set sw=2 ts=8 et tw=80 : */
/* This Source Code Form is subject to the terms of the Mozilla Public
 * License, v. 2.0. If a copy of the MPL was not distributed with this
 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */

#include "DNSServiceBase.h"

#include "DNS.h"
#include "mozilla/Preferences.h"
#include "mozilla/StaticPrefs_network.h"
#include "nsIDNSService.h"
#include "nsIProtocolProxyService2.h"
#include "nsIPrefBranch.h"
#include "nsIProxyInfo.h"

namespace mozilla::net {

static const char kPrefProxyType[] = "network.proxy.type";
static const char kPrefDisablePrefetch[] = "network.dns.disablePrefetch";
static const char kPrefNetworkProxySOCKS[] = "network.proxy.socks";
static const char kPrefNetworkProxySOCKSVersion[] =
    "network.proxy.socks_version";

NS_IMPL_ISUPPORTS(DNSServiceBase, nsIObserver)

void DNSServiceBase::AddPrefObserver(nsIPrefBranch* aPrefs) {
  aPrefs->AddObserver(kPrefProxyType, this, false);
  aPrefs->AddObserver(kPrefDisablePrefetch, this, false);
  // Monitor these to see if there is a change in proxy configuration
  aPrefs->AddObserver(kPrefNetworkProxySOCKS, this, false);
  aPrefs->AddObserver(kPrefNetworkProxySOCKSVersion, this, false);
}

void DNSServiceBase::ReadPrefs(const char* aName) {
  if (!aName || !strcmp(aName, kPrefNetworkProxySOCKS) ||
      !strcmp(aName, kPrefNetworkProxySOCKSVersion)) {
    uint32_t socksVersion = Preferences::GetInt(kPrefNetworkProxySOCKSVersion);
    nsAutoCString socks;
    if (NS_SUCCEEDED(Preferences::GetCString(kPrefNetworkProxySOCKS, socks))) {
      mSocksProxyVersion = 0;
      if (!socks.IsEmpty()) {
        if (socksVersion == nsIProxyInfo::SOCKS_V4) {
          mSocksProxyVersion = nsIProxyInfo::SOCKS_V4;
        } else if (socksVersion == nsIProxyInfo::SOCKS_V5) {
          mSocksProxyVersion = nsIProxyInfo::SOCKS_V5;
        }
      }
    }
  }
  if (!aName || !strcmp(aName, kPrefDisablePrefetch) ||
      !strcmp(aName, kPrefProxyType)) {
    mDisablePrefetch = Preferences::GetBool(kPrefDisablePrefetch, false) ||
                       (StaticPrefs::network_proxy_type() ==
                        nsIProtocolProxyService::PROXYCONFIG_MANUAL);
  }
}

bool DNSServiceBase::DNSForbiddenByActiveProxy(const nsACString& aHostname,
                                               uint32_t aFlags) {
  if (aFlags & nsIDNSService::RESOLVE_IGNORE_SOCKS_DNS) {
    return false;
  }

  // TODO(Bug 1890542): use nsIProxyInfo object whether sending DNS request to
  //     local network is fine.
  // We should avoid doing DNS when a proxy is in use.
  if (StaticPrefs::network_proxy_type() ==
          nsIProtocolProxyService::PROXYCONFIG_MANUAL &&
      ((mSocksProxyVersion == nsIProxyInfo::SOCKS_V4 &&
        StaticPrefs::network_proxy_socks_remote_dns()) ||
       (mSocksProxyVersion == nsIProxyInfo::SOCKS_V5 &&
        StaticPrefs::network_proxy_socks5_remote_dns()))) {
    // Allow IP lookups through, but nothing else.
    if (!HostIsIPLiteral(aHostname)) {
      return true;
    }
  }
  return false;
}

}  // namespace mozilla::net