forked from mirrors/gecko-dev
We treat clicking "Accept" as a user-choice even if no settings were changed. We should persist both the TRR mode and URI that were visible in the dialog at the time of acceptance of the dialog. Differential Revision: https://phabricator.services.mozilla.com/D119877
643 lines
22 KiB
JavaScript
643 lines
22 KiB
JavaScript
/* -*- indent-tabs-mode: nil; js-indent-level: 4 -*- */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
/* import-globals-from ../../../base/content/utilityOverlay.js */
|
|
/* import-globals-from ../../../../toolkit/content/preferencesBindings.js */
|
|
/* import-globals-from ../extensionControlled.js */
|
|
|
|
ChromeUtils.defineModuleGetter(
|
|
this,
|
|
"DoHConfigController",
|
|
"resource:///modules/DoHConfig.jsm"
|
|
);
|
|
|
|
document
|
|
.getElementById("ConnectionsDialog")
|
|
.addEventListener("dialoghelp", window.top.openPrefsHelp);
|
|
|
|
Preferences.addAll([
|
|
// Add network.proxy.autoconfig_url before network.proxy.type so they're
|
|
// both initialized when network.proxy.type initialization triggers a call to
|
|
// gConnectionsDialog.updateReloadButton().
|
|
{ id: "network.proxy.autoconfig_url", type: "string" },
|
|
{ id: "network.proxy.type", type: "int" },
|
|
{ id: "network.proxy.http", type: "string" },
|
|
{ id: "network.proxy.http_port", type: "int" },
|
|
{ id: "network.proxy.ssl", type: "string" },
|
|
{ id: "network.proxy.ssl_port", type: "int" },
|
|
{ id: "network.proxy.socks", type: "string" },
|
|
{ id: "network.proxy.socks_port", type: "int" },
|
|
{ id: "network.proxy.socks_version", type: "int" },
|
|
{ id: "network.proxy.socks_remote_dns", type: "bool" },
|
|
{ id: "network.proxy.no_proxies_on", type: "string" },
|
|
{ id: "network.proxy.share_proxy_settings", type: "bool" },
|
|
{ id: "signon.autologin.proxy", type: "bool" },
|
|
{ id: "pref.advanced.proxies.disable_button.reload", type: "bool" },
|
|
{ id: "network.proxy.backup.ssl", type: "string" },
|
|
{ id: "network.proxy.backup.ssl_port", type: "int" },
|
|
{ id: "network.trr.mode", type: "int" },
|
|
{ id: "network.trr.uri", type: "string" },
|
|
{ id: "network.trr.custom_uri", type: "string" },
|
|
{ id: "doh-rollout.disable-heuristics", type: "bool" },
|
|
{ id: "doh-rollout.skipHeuristicsCheck", type: "bool" },
|
|
]);
|
|
|
|
const DoHConfigObserver = () => {
|
|
gConnectionsDialog.initDnsOverHttpsUI();
|
|
};
|
|
|
|
window.addEventListener(
|
|
"DOMContentLoaded",
|
|
() => {
|
|
Preferences.get("network.proxy.type").on(
|
|
"change",
|
|
gConnectionsDialog.proxyTypeChanged.bind(gConnectionsDialog)
|
|
);
|
|
Preferences.get("network.proxy.socks_version").on(
|
|
"change",
|
|
gConnectionsDialog.updateDNSPref.bind(gConnectionsDialog)
|
|
);
|
|
|
|
Preferences.get("network.trr.uri").on("change", () => {
|
|
gConnectionsDialog.updateDnsOverHttpsUI();
|
|
});
|
|
|
|
Services.obs.addObserver(
|
|
DoHConfigObserver,
|
|
DoHConfigController.kConfigUpdateTopic
|
|
);
|
|
window.addEventListener(
|
|
"unload",
|
|
e => {
|
|
Services.obs.removeObserver(
|
|
DoHConfigObserver,
|
|
DoHConfigController.kConfigUpdateTopic
|
|
);
|
|
},
|
|
{ once: true }
|
|
);
|
|
|
|
// XXX: We can't init the DNS-over-HTTPs UI until the onsyncfrompreference for network.trr.mode
|
|
// has been called. The uiReady promise will be resolved after the first call to
|
|
// readDnsOverHttpsMode and the subsequent call to initDnsOverHttpsUI has happened.
|
|
gConnectionsDialog.uiReady = new Promise(resolve => {
|
|
gConnectionsDialog._areTrrPrefsReady = false;
|
|
gConnectionsDialog._handleTrrPrefsReady = resolve;
|
|
}).then(async () => {
|
|
// awaiting this ensures that initDnsOverHttpsUI() is called after
|
|
// execution has been returned to the caller of _handleTrrPrefsReady,
|
|
// which is the checkbox value reading path. This ensures the checkbox
|
|
// gets checked, then initDnsOverHttpsUI() is called, then the uiReady
|
|
// promise resolves, preventing intermittent failures in tests.
|
|
await gConnectionsDialog.initDnsOverHttpsUI();
|
|
});
|
|
|
|
document
|
|
.getElementById("disableProxyExtension")
|
|
.addEventListener(
|
|
"command",
|
|
makeDisableControllingExtension(PREF_SETTING_TYPE, PROXY_KEY).bind(
|
|
gConnectionsDialog
|
|
)
|
|
);
|
|
gConnectionsDialog.updateProxySettingsUI();
|
|
initializeProxyUI(gConnectionsDialog);
|
|
gConnectionsDialog.registerSyncPrefListeners();
|
|
document
|
|
.getElementById("ConnectionsDialog")
|
|
.addEventListener("beforeaccept", e =>
|
|
gConnectionsDialog.beforeAccept(e)
|
|
);
|
|
},
|
|
{ once: true, capture: true }
|
|
);
|
|
|
|
var gConnectionsDialog = {
|
|
beforeAccept(event) {
|
|
let dnsOverHttpsResolverChoice = document.getElementById(
|
|
"networkDnsOverHttpsResolverChoices"
|
|
).value;
|
|
let writeURIandMode = uri => {
|
|
Services.prefs.setStringPref("network.trr.uri", uri);
|
|
// When writing the URI, also write the mode. This is needed in addition
|
|
// to the mode reacting in realtime to the checkbox state because of the
|
|
// case when the checkbox was ticked due to the rollout being enabled at
|
|
// the time of clicking "Accept".
|
|
Services.prefs.setIntPref(
|
|
"network.trr.mode",
|
|
this.writeDnsOverHttpsMode()
|
|
);
|
|
};
|
|
// We treat clicking "Accept" as a user choice, and set both the TRR
|
|
// URI and mode here. This will cause DoHController to permanently
|
|
// disable heuristics and the values at the time of accept will persist.
|
|
// This includes the case when no changes were made.
|
|
if (dnsOverHttpsResolverChoice == "custom") {
|
|
let customValue = document
|
|
.getElementById("networkCustomDnsOverHttpsInput")
|
|
.value.trim();
|
|
if (customValue) {
|
|
writeURIandMode(customValue);
|
|
} else {
|
|
writeURIandMode(DoHConfigController.currentConfig.fallbackProviderURI);
|
|
}
|
|
} else {
|
|
writeURIandMode(dnsOverHttpsResolverChoice);
|
|
}
|
|
|
|
var proxyTypePref = Preferences.get("network.proxy.type");
|
|
if (proxyTypePref.value == 2) {
|
|
this.doAutoconfigURLFixup();
|
|
return;
|
|
}
|
|
|
|
if (proxyTypePref.value != 1) {
|
|
return;
|
|
}
|
|
|
|
var httpProxyURLPref = Preferences.get("network.proxy.http");
|
|
var httpProxyPortPref = Preferences.get("network.proxy.http_port");
|
|
var shareProxiesPref = Preferences.get(
|
|
"network.proxy.share_proxy_settings"
|
|
);
|
|
|
|
// If the port is 0 and the proxy server is specified, focus on the port and cancel submission.
|
|
for (let prefName of ["http", "ssl", "socks"]) {
|
|
let proxyPortPref = Preferences.get(
|
|
"network.proxy." + prefName + "_port"
|
|
);
|
|
let proxyPref = Preferences.get("network.proxy." + prefName);
|
|
// Only worry about ports which are currently active. If the share option is on, then ignore
|
|
// all ports except the HTTP and SOCKS port
|
|
if (
|
|
proxyPref.value != "" &&
|
|
proxyPortPref.value == 0 &&
|
|
(prefName == "http" || prefName == "socks" || !shareProxiesPref.value)
|
|
) {
|
|
document
|
|
.getElementById("networkProxy" + prefName.toUpperCase() + "_Port")
|
|
.focus();
|
|
event.preventDefault();
|
|
return;
|
|
}
|
|
}
|
|
|
|
// In the case of a shared proxy preference, backup the current values and update with the HTTP value
|
|
if (shareProxiesPref.value) {
|
|
var proxyServerURLPref = Preferences.get("network.proxy.ssl");
|
|
var proxyPortPref = Preferences.get("network.proxy.ssl_port");
|
|
var backupServerURLPref = Preferences.get("network.proxy.backup.ssl");
|
|
var backupPortPref = Preferences.get("network.proxy.backup.ssl_port");
|
|
backupServerURLPref.value =
|
|
backupServerURLPref.value || proxyServerURLPref.value;
|
|
backupPortPref.value = backupPortPref.value || proxyPortPref.value;
|
|
proxyServerURLPref.value = httpProxyURLPref.value;
|
|
proxyPortPref.value = httpProxyPortPref.value;
|
|
}
|
|
|
|
this.sanitizeNoProxiesPref();
|
|
},
|
|
|
|
checkForSystemProxy() {
|
|
if ("@mozilla.org/system-proxy-settings;1" in Cc) {
|
|
document.getElementById("systemPref").removeAttribute("hidden");
|
|
}
|
|
},
|
|
|
|
proxyTypeChanged() {
|
|
var proxyTypePref = Preferences.get("network.proxy.type");
|
|
|
|
// Update http
|
|
var httpProxyURLPref = Preferences.get("network.proxy.http");
|
|
httpProxyURLPref.updateControlDisabledState(proxyTypePref.value != 1);
|
|
var httpProxyPortPref = Preferences.get("network.proxy.http_port");
|
|
httpProxyPortPref.updateControlDisabledState(proxyTypePref.value != 1);
|
|
|
|
// Now update the other protocols
|
|
this.updateProtocolPrefs();
|
|
|
|
var shareProxiesPref = Preferences.get(
|
|
"network.proxy.share_proxy_settings"
|
|
);
|
|
shareProxiesPref.updateControlDisabledState(proxyTypePref.value != 1);
|
|
var autologinProxyPref = Preferences.get("signon.autologin.proxy");
|
|
autologinProxyPref.updateControlDisabledState(proxyTypePref.value == 0);
|
|
var noProxiesPref = Preferences.get("network.proxy.no_proxies_on");
|
|
noProxiesPref.updateControlDisabledState(proxyTypePref.value == 0);
|
|
|
|
var autoconfigURLPref = Preferences.get("network.proxy.autoconfig_url");
|
|
autoconfigURLPref.updateControlDisabledState(proxyTypePref.value != 2);
|
|
|
|
this.updateReloadButton();
|
|
|
|
document.getElementById(
|
|
"networkProxyNoneLocalhost"
|
|
).hidden = Services.prefs.getBoolPref(
|
|
"network.proxy.allow_hijacking_localhost",
|
|
false
|
|
);
|
|
},
|
|
|
|
updateDNSPref() {
|
|
var socksVersionPref = Preferences.get("network.proxy.socks_version");
|
|
var socksDNSPref = Preferences.get("network.proxy.socks_remote_dns");
|
|
var proxyTypePref = Preferences.get("network.proxy.type");
|
|
var isDefinitelySocks4 =
|
|
proxyTypePref.value == 1 && socksVersionPref.value == 4;
|
|
socksDNSPref.updateControlDisabledState(
|
|
isDefinitelySocks4 || proxyTypePref.value == 0
|
|
);
|
|
return undefined;
|
|
},
|
|
|
|
updateReloadButton() {
|
|
// Disable the "Reload PAC" button if the selected proxy type is not PAC or
|
|
// if the current value of the PAC input does not match the value stored
|
|
// in prefs. Likewise, disable the reload button if PAC is not configured
|
|
// in prefs.
|
|
|
|
var typedURL = document.getElementById("networkProxyAutoconfigURL").value;
|
|
var proxyTypeCur = Preferences.get("network.proxy.type").value;
|
|
|
|
var pacURL = Services.prefs.getCharPref("network.proxy.autoconfig_url");
|
|
var proxyType = Services.prefs.getIntPref("network.proxy.type");
|
|
|
|
var disableReloadPref = Preferences.get(
|
|
"pref.advanced.proxies.disable_button.reload"
|
|
);
|
|
disableReloadPref.updateControlDisabledState(
|
|
proxyTypeCur != 2 || proxyType != 2 || typedURL != pacURL
|
|
);
|
|
},
|
|
|
|
readProxyType() {
|
|
this.proxyTypeChanged();
|
|
return undefined;
|
|
},
|
|
|
|
updateProtocolPrefs() {
|
|
var proxyTypePref = Preferences.get("network.proxy.type");
|
|
var shareProxiesPref = Preferences.get(
|
|
"network.proxy.share_proxy_settings"
|
|
);
|
|
var proxyPrefs = ["ssl", "socks"];
|
|
for (var i = 0; i < proxyPrefs.length; ++i) {
|
|
var proxyServerURLPref = Preferences.get(
|
|
"network.proxy." + proxyPrefs[i]
|
|
);
|
|
var proxyPortPref = Preferences.get(
|
|
"network.proxy." + proxyPrefs[i] + "_port"
|
|
);
|
|
|
|
// Restore previous per-proxy custom settings, if present.
|
|
if (proxyPrefs[i] != "socks" && !shareProxiesPref.value) {
|
|
var backupServerURLPref = Preferences.get(
|
|
"network.proxy.backup." + proxyPrefs[i]
|
|
);
|
|
var backupPortPref = Preferences.get(
|
|
"network.proxy.backup." + proxyPrefs[i] + "_port"
|
|
);
|
|
if (backupServerURLPref.hasUserValue) {
|
|
proxyServerURLPref.value = backupServerURLPref.value;
|
|
backupServerURLPref.reset();
|
|
}
|
|
if (backupPortPref.hasUserValue) {
|
|
proxyPortPref.value = backupPortPref.value;
|
|
backupPortPref.reset();
|
|
}
|
|
}
|
|
|
|
proxyServerURLPref.updateElements();
|
|
proxyPortPref.updateElements();
|
|
let prefIsShared = proxyPrefs[i] != "socks" && shareProxiesPref.value;
|
|
proxyServerURLPref.updateControlDisabledState(
|
|
proxyTypePref.value != 1 || prefIsShared
|
|
);
|
|
proxyPortPref.updateControlDisabledState(
|
|
proxyTypePref.value != 1 || prefIsShared
|
|
);
|
|
}
|
|
var socksVersionPref = Preferences.get("network.proxy.socks_version");
|
|
socksVersionPref.updateControlDisabledState(proxyTypePref.value != 1);
|
|
this.updateDNSPref();
|
|
return undefined;
|
|
},
|
|
|
|
readProxyProtocolPref(aProtocol, aIsPort) {
|
|
if (aProtocol != "socks") {
|
|
var shareProxiesPref = Preferences.get(
|
|
"network.proxy.share_proxy_settings"
|
|
);
|
|
if (shareProxiesPref.value) {
|
|
var pref = Preferences.get(
|
|
"network.proxy.http" + (aIsPort ? "_port" : "")
|
|
);
|
|
return pref.value;
|
|
}
|
|
|
|
var backupPref = Preferences.get(
|
|
"network.proxy.backup." + aProtocol + (aIsPort ? "_port" : "")
|
|
);
|
|
return backupPref.hasUserValue ? backupPref.value : undefined;
|
|
}
|
|
return undefined;
|
|
},
|
|
|
|
reloadPAC() {
|
|
Cc["@mozilla.org/network/protocol-proxy-service;1"]
|
|
.getService()
|
|
.reloadPAC();
|
|
},
|
|
|
|
doAutoconfigURLFixup() {
|
|
var autoURL = document.getElementById("networkProxyAutoconfigURL");
|
|
var autoURLPref = Preferences.get("network.proxy.autoconfig_url");
|
|
try {
|
|
autoURLPref.value = autoURL.value = Services.uriFixup.getFixupURIInfo(
|
|
autoURL.value
|
|
).preferredURI.spec;
|
|
} catch (ex) {}
|
|
},
|
|
|
|
sanitizeNoProxiesPref() {
|
|
var noProxiesPref = Preferences.get("network.proxy.no_proxies_on");
|
|
// replace substrings of ; and \n with commas if they're neither immediately
|
|
// preceded nor followed by a valid separator character
|
|
noProxiesPref.value = noProxiesPref.value.replace(
|
|
/([^, \n;])[;\n]+(?![,\n;])/g,
|
|
"$1,"
|
|
);
|
|
// replace any remaining ; and \n since some may follow commas, etc.
|
|
noProxiesPref.value = noProxiesPref.value.replace(/[;\n]/g, "");
|
|
},
|
|
|
|
readHTTPProxyServer() {
|
|
var shareProxiesPref = Preferences.get(
|
|
"network.proxy.share_proxy_settings"
|
|
);
|
|
if (shareProxiesPref.value) {
|
|
this.updateProtocolPrefs();
|
|
}
|
|
return undefined;
|
|
},
|
|
|
|
readHTTPProxyPort() {
|
|
var shareProxiesPref = Preferences.get(
|
|
"network.proxy.share_proxy_settings"
|
|
);
|
|
if (shareProxiesPref.value) {
|
|
this.updateProtocolPrefs();
|
|
}
|
|
return undefined;
|
|
},
|
|
|
|
getProxyControls() {
|
|
let controlGroup = document.getElementById("networkProxyType");
|
|
return [
|
|
...controlGroup.querySelectorAll(":scope > radio"),
|
|
...controlGroup.querySelectorAll("label"),
|
|
...controlGroup.querySelectorAll("input"),
|
|
...controlGroup.querySelectorAll("checkbox"),
|
|
...document.querySelectorAll("#networkProxySOCKSVersion > radio"),
|
|
...document.querySelectorAll("#ConnectionsDialogPane > checkbox"),
|
|
];
|
|
},
|
|
|
|
// Update the UI to show/hide the extension controlled message for
|
|
// proxy settings.
|
|
async updateProxySettingsUI() {
|
|
let isLocked = API_PROXY_PREFS.some(pref =>
|
|
Services.prefs.prefIsLocked(pref)
|
|
);
|
|
|
|
function setInputsDisabledState(isControlled) {
|
|
for (let element of gConnectionsDialog.getProxyControls()) {
|
|
element.disabled = isControlled;
|
|
}
|
|
gConnectionsDialog.proxyTypeChanged();
|
|
}
|
|
|
|
if (isLocked) {
|
|
// An extension can't control this setting if any pref is locked.
|
|
hideControllingExtension(PROXY_KEY);
|
|
} else {
|
|
handleControllingExtension(PREF_SETTING_TYPE, PROXY_KEY).then(
|
|
setInputsDisabledState
|
|
);
|
|
}
|
|
},
|
|
|
|
get dnsOverHttpsResolvers() {
|
|
let providers = DoHConfigController.currentConfig.providerList;
|
|
// if there's no default, we'll hold its position with an empty string
|
|
let defaultURI = DoHConfigController.currentConfig.fallbackProviderURI;
|
|
let defaultIndex = providers.findIndex(p => p.uri == defaultURI);
|
|
if (defaultIndex == -1 && defaultURI) {
|
|
// the default value for the pref isn't included in the resolvers list
|
|
// so we'll make a stub for it. Without an id, we'll have to use the url as the label
|
|
providers.unshift({ uri: defaultURI });
|
|
}
|
|
return providers;
|
|
},
|
|
|
|
isDnsOverHttpsLocked() {
|
|
return Services.prefs.prefIsLocked("network.trr.mode");
|
|
},
|
|
|
|
isDnsOverHttpsEnabled() {
|
|
// We consider DoH enabled if:
|
|
// 1. network.trr.mode has a user-set value equal to 2 or 3.
|
|
// 2. network.trr.mode is 0, and DoH heuristics are enabled
|
|
let trrPref = Preferences.get("network.trr.mode");
|
|
if (trrPref.value > 0) {
|
|
return trrPref.value == 2 || trrPref.value == 3;
|
|
}
|
|
|
|
let rolloutEnabled = DoHConfigController.currentConfig.enabled;
|
|
let heuristicsDisabled =
|
|
Preferences.get("doh-rollout.disable-heuristics").value ||
|
|
Preferences.get("doh-rollout.skipHeuristicsCheck").value;
|
|
return rolloutEnabled && !heuristicsDisabled;
|
|
},
|
|
|
|
readDnsOverHttpsMode() {
|
|
// called to update checked element property to reflect current pref value
|
|
let enabled = this.isDnsOverHttpsEnabled();
|
|
let uriPref = Preferences.get("network.trr.uri");
|
|
uriPref.updateControlDisabledState(!enabled || this.isDnsOverHttpsLocked());
|
|
// this is the first signal we get when the prefs are available, so
|
|
// lazy-init if appropriate
|
|
if (!this._areTrrPrefsReady) {
|
|
this._areTrrPrefsReady = true;
|
|
this._handleTrrPrefsReady();
|
|
} else {
|
|
this.updateDnsOverHttpsUI();
|
|
}
|
|
return enabled;
|
|
},
|
|
|
|
writeDnsOverHttpsMode() {
|
|
// called to update pref with user change
|
|
let trrModeCheckbox = document.getElementById("networkDnsOverHttps");
|
|
// we treat checked/enabled as mode 2
|
|
return trrModeCheckbox.checked ? 2 : 5;
|
|
},
|
|
|
|
updateDnsOverHttpsUI() {
|
|
// init and update of the UI must wait until the pref values are ready
|
|
if (!this._areTrrPrefsReady) {
|
|
return;
|
|
}
|
|
let [menu, customInput] = this.getDnsOverHttpsControls();
|
|
let customDohContainer = document.getElementById(
|
|
"customDnsOverHttpsContainer"
|
|
);
|
|
let customURI = Preferences.get("network.trr.custom_uri").value;
|
|
let currentURI = Preferences.get("network.trr.uri").value;
|
|
let resolvers = this.dnsOverHttpsResolvers;
|
|
let isCustom = menu.value == "custom";
|
|
|
|
if (this.isDnsOverHttpsEnabled()) {
|
|
this.toggleDnsOverHttpsUI(false);
|
|
if (isCustom) {
|
|
// if the current and custom_uri values mismatch, update the uri pref
|
|
if (
|
|
currentURI &&
|
|
!customURI &&
|
|
!resolvers.find(r => r.uri == currentURI)
|
|
) {
|
|
Services.prefs.setStringPref("network.trr.custom_uri", currentURI);
|
|
}
|
|
}
|
|
} else {
|
|
this.toggleDnsOverHttpsUI(true);
|
|
}
|
|
|
|
if (!menu.disabled && isCustom) {
|
|
customDohContainer.hidden = false;
|
|
customInput.disabled = false;
|
|
customInput.scrollIntoView();
|
|
} else {
|
|
customDohContainer.hidden = true;
|
|
customInput.disabled = true;
|
|
}
|
|
|
|
// The height has likely changed, find our SubDialog and tell it to resize.
|
|
requestAnimationFrame(() => {
|
|
let dialogs = window.opener.gSubDialog._dialogs;
|
|
let dialog = dialogs.find(d => d._frame.contentDocument == document);
|
|
if (dialog) {
|
|
dialog.resizeVertically();
|
|
}
|
|
});
|
|
},
|
|
|
|
getDnsOverHttpsControls() {
|
|
return [
|
|
document.getElementById("networkDnsOverHttpsResolverChoices"),
|
|
document.getElementById("networkCustomDnsOverHttpsInput"),
|
|
document.getElementById("networkDnsOverHttpsResolverChoicesLabel"),
|
|
document.getElementById("networkCustomDnsOverHttpsInputLabel"),
|
|
];
|
|
},
|
|
|
|
toggleDnsOverHttpsUI(disabled) {
|
|
for (let element of this.getDnsOverHttpsControls()) {
|
|
element.disabled = disabled;
|
|
}
|
|
},
|
|
|
|
initDnsOverHttpsUI() {
|
|
let resolvers = this.dnsOverHttpsResolvers;
|
|
let defaultURI = DoHConfigController.currentConfig.fallbackProviderURI;
|
|
let currentURI = Preferences.get("network.trr.uri").value;
|
|
let menu = document.getElementById("networkDnsOverHttpsResolverChoices");
|
|
|
|
// populate the DNS-Over-HTTPs resolver list
|
|
menu.removeAllItems();
|
|
for (let resolver of resolvers) {
|
|
let item = menu.appendItem(undefined, resolver.uri);
|
|
if (resolver.uri == defaultURI) {
|
|
document.l10n.setAttributes(
|
|
item,
|
|
"connection-dns-over-https-url-item-default",
|
|
{
|
|
name: resolver.UIName || resolver.uri,
|
|
}
|
|
);
|
|
} else {
|
|
item.label = resolver.UIName || resolver.uri;
|
|
}
|
|
}
|
|
let lastItem = menu.appendItem(undefined, "custom");
|
|
document.l10n.setAttributes(
|
|
lastItem,
|
|
"connection-dns-over-https-url-custom"
|
|
);
|
|
|
|
// set initial selection in the resolver provider picker
|
|
let selectedIndex = currentURI
|
|
? resolvers.findIndex(r => r.uri == currentURI)
|
|
: 0;
|
|
if (selectedIndex == -1) {
|
|
// select the last "Custom" item
|
|
selectedIndex = menu.itemCount - 1;
|
|
}
|
|
menu.selectedIndex = selectedIndex;
|
|
|
|
if (this.isDnsOverHttpsLocked()) {
|
|
// disable all the options and the checkbox itself to disallow enabling them
|
|
this.toggleDnsOverHttpsUI(true);
|
|
document.getElementById("networkDnsOverHttps").disabled = true;
|
|
} else {
|
|
this.toggleDnsOverHttpsUI(false);
|
|
this.updateDnsOverHttpsUI();
|
|
document.getElementById("networkDnsOverHttps").disabled = false;
|
|
}
|
|
},
|
|
|
|
registerSyncPrefListeners() {
|
|
function setSyncFromPrefListener(element_id, callback) {
|
|
Preferences.addSyncFromPrefListener(
|
|
document.getElementById(element_id),
|
|
callback
|
|
);
|
|
}
|
|
function setSyncToPrefListener(element_id, callback) {
|
|
Preferences.addSyncToPrefListener(
|
|
document.getElementById(element_id),
|
|
callback
|
|
);
|
|
}
|
|
setSyncFromPrefListener("networkProxyType", () => this.readProxyType());
|
|
setSyncFromPrefListener("networkProxyHTTP", () =>
|
|
this.readHTTPProxyServer()
|
|
);
|
|
setSyncFromPrefListener("networkProxyHTTP_Port", () =>
|
|
this.readHTTPProxyPort()
|
|
);
|
|
setSyncFromPrefListener("shareAllProxies", () =>
|
|
this.updateProtocolPrefs()
|
|
);
|
|
setSyncFromPrefListener("networkProxySSL", () =>
|
|
this.readProxyProtocolPref("ssl", false)
|
|
);
|
|
setSyncFromPrefListener("networkProxySSL_Port", () =>
|
|
this.readProxyProtocolPref("ssl", true)
|
|
);
|
|
setSyncFromPrefListener("networkProxySOCKS", () =>
|
|
this.readProxyProtocolPref("socks", false)
|
|
);
|
|
setSyncFromPrefListener("networkProxySOCKS_Port", () =>
|
|
this.readProxyProtocolPref("socks", true)
|
|
);
|
|
setSyncFromPrefListener("networkDnsOverHttps", () =>
|
|
this.readDnsOverHttpsMode()
|
|
);
|
|
setSyncToPrefListener("networkDnsOverHttps", () =>
|
|
this.writeDnsOverHttpsMode()
|
|
);
|
|
},
|
|
};
|