diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-19 00:47:55 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-19 00:47:55 +0000 |
commit | 26a029d407be480d791972afb5975cf62c9360a6 (patch) | |
tree | f435a8308119effd964b339f76abb83a57c29483 /netwerk/dns/nsDNSService2.h | |
parent | Initial commit. (diff) | |
download | firefox-e51783d008170d9ab27d25da98ca3a38b0a41b67.tar.xz firefox-e51783d008170d9ab27d25da98ca3a38b0a41b67.zip |
Adding upstream version 124.0.1.upstream/124.0.1
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'netwerk/dns/nsDNSService2.h')
-rw-r--r-- | netwerk/dns/nsDNSService2.h | 135 |
1 files changed, 135 insertions, 0 deletions
diff --git a/netwerk/dns/nsDNSService2.h b/netwerk/dns/nsDNSService2.h new file mode 100644 index 0000000000..11f22c038e --- /dev/null +++ b/netwerk/dns/nsDNSService2.h @@ -0,0 +1,135 @@ +/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ +/* vim: set sw=2 ts=8 et tw=80 : */ +/* This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ + +#ifndef nsDNSService2_h__ +#define nsDNSService2_h__ + +#include "DNSServiceBase.h" +#include "nsClassHashtable.h" +#include "nsPIDNSService.h" +#include "nsIIDNService.h" +#include "nsIMemoryReporter.h" +#include "nsIObserver.h" +#include "nsHostResolver.h" +#include "nsString.h" +#include "nsTHashSet.h" +#include "nsHashKeys.h" +#include "mozilla/Mutex.h" +#include "mozilla/Attributes.h" +#include "TRRService.h" + +class nsAuthSSPI; + +class DNSServiceWrapper final : public nsPIDNSService { + public: + NS_DECL_THREADSAFE_ISUPPORTS + NS_FORWARD_NSPIDNSSERVICE(PIDNSService()->) + NS_FORWARD_NSIDNSSERVICE(DNSService()->) + + DNSServiceWrapper() = default; + + static already_AddRefed<nsIDNSService> GetSingleton(); + static void SwitchToBackupDNSService(); + + private: + ~DNSServiceWrapper() = default; + nsIDNSService* DNSService(); + nsPIDNSService* PIDNSService(); + + mozilla::Mutex mLock{"DNSServiceWrapper.mLock"}; + nsCOMPtr<nsIDNSService> mDNSServiceInUse; + nsCOMPtr<nsIDNSService> mBackupDNSService; +}; + +class nsDNSService final : public mozilla::net::DNSServiceBase, + public nsPIDNSService, + public nsIMemoryReporter { + public: + NS_DECL_ISUPPORTS_INHERITED + NS_DECL_NSPIDNSSERVICE + NS_DECL_NSIDNSSERVICE + NS_DECL_NSIOBSERVER + NS_DECL_NSIMEMORYREPORTER + + nsDNSService() = default; + + static already_AddRefed<nsIDNSService> GetXPCOMSingleton(); + + size_t SizeOfIncludingThis(mozilla::MallocSizeOf mallocSizeOf) const; + + bool GetOffline() const; + + protected: + friend class nsAuthSSPI; + friend class DNSServiceWrapper; + + nsresult DeprecatedSyncResolve( + const nsACString& aHostname, nsIDNSService::DNSFlags flags, + const mozilla::OriginAttributes& aOriginAttributes, + nsIDNSRecord** result); + + private: + ~nsDNSService() = default; + + void ReadPrefs(const char* name) override; + static already_AddRefed<nsDNSService> GetSingleton(); + + uint16_t GetAFForLookup(const nsACString& host, + nsIDNSService::DNSFlags flags); + + nsresult PreprocessHostname(bool aLocalDomain, const nsACString& aInput, + nsIIDNService* aIDN, nsACString& aACE); + + nsresult AsyncResolveInternal( + const nsACString& aHostname, uint16_t type, nsIDNSService::DNSFlags flags, + nsIDNSAdditionalInfo* aInfo, nsIDNSListener* aListener, + nsIEventTarget* target_, + const mozilla::OriginAttributes& aOriginAttributes, + nsICancelable** result); + + nsresult CancelAsyncResolveInternal( + const nsACString& aHostname, uint16_t aType, + nsIDNSService::DNSFlags aFlags, nsIDNSAdditionalInfo* aInfo, + nsIDNSListener* aListener, nsresult aReason, + const mozilla::OriginAttributes& aOriginAttributes); + + nsresult ResolveInternal(const nsACString& aHostname, + nsIDNSService::DNSFlags flags, + const mozilla::OriginAttributes& aOriginAttributes, + nsIDNSRecord** result); + + // Locks the mutex and returns an addreffed resolver. May return null. + already_AddRefed<nsHostResolver> GetResolverLocked(); + + RefPtr<nsHostResolver> mResolver; + nsCOMPtr<nsIIDNService> mIDN; + + // mLock protects access to mResolver, mLocalDomains, mIPv4OnlyDomains and + // mFailedSVCDomainNames + mozilla::Mutex mLock MOZ_UNANNOTATED{"nsDNSServer.mLock"}; + + // mIPv4OnlyDomains is a comma-separated list of domains for which only + // IPv4 DNS lookups are performed. This allows the user to disable IPv6 on + // a per-domain basis and work around broken DNS servers. See bug 68796. + nsCString mIPv4OnlyDomains; + nsCString mForceResolve; + bool mBlockDotOnion = false; + bool mNotifyResolution = false; + bool mOfflineLocalhost = false; + bool mForceResolveOn = false; + nsTHashSet<nsCString> mLocalDomains; + RefPtr<mozilla::net::TRRService> mTrrService; + + uint32_t mResCacheEntries = 0; + uint32_t mResCacheExpiration = 0; + uint32_t mResCacheGrace = 0; + bool mResolverPrefsUpdated = false; + nsClassHashtable<nsCStringHashKey, nsTArray<nsCString>> mFailedSVCDomainNames; +}; + +already_AddRefed<nsIDNSService> GetOrInitDNSService(); + +#endif // nsDNSService2_h__ |