[tor-commits] [tor-browser] branch tor-browser-91.10.0esr-11.5-1 updated: fixup! Bug 40458: Implement .tor.onion aliases

gitolite role git at cupani.torproject.org
Tue Jun 21 18:33:19 UTC 2022


This is an automated email from the git hooks/post-receive script.

pierov pushed a commit to branch tor-browser-91.10.0esr-11.5-1
in repository tor-browser.

The following commit(s) were added to refs/heads/tor-browser-91.10.0esr-11.5-1 by this push:
     new f5b70adbf5b73 fixup! Bug 40458: Implement .tor.onion aliases
f5b70adbf5b73 is described below

commit f5b70adbf5b73e7e896ec49255b83bae00f8edd9
Author: Pier Angelo Vendrame <pierov at torproject.org>
AuthorDate: Tue Jun 21 19:33:07 2022 +0200

    fixup! Bug 40458: Implement .tor.onion aliases
    
    Bug 41035: OnionAliasService should use threadsafe ISupports
---
 netwerk/dns/OnionAliasService.cpp | 7 +++++--
 netwerk/dns/OnionAliasService.h   | 4 ++--
 2 files changed, 7 insertions(+), 4 deletions(-)

diff --git a/netwerk/dns/OnionAliasService.cpp b/netwerk/dns/OnionAliasService.cpp
index 2d24bb68023b4..5140f4fe0d833 100644
--- a/netwerk/dns/OnionAliasService.cpp
+++ b/netwerk/dns/OnionAliasService.cpp
@@ -65,7 +65,7 @@ OnionAliasService::AddOnionAlias(const nsACString& aShortHostname,
       !ValidateOnionV3(*longHostname)) {
     return NS_ERROR_INVALID_ARG;
   }
-  mozilla::MutexAutoLock lock(mLock);
+  mozilla::AutoWriteLock lock(mLock);
   mOnionAliases.InsertOrUpdate(shortHostname, std::move(longHostname));
   return NS_OK;
 }
@@ -76,6 +76,9 @@ OnionAliasService::GetOnionAlias(const nsACString& aShortHostname, nsACString& a
   aLongHostname = aShortHostname;
   if (StringEndsWith(aShortHostname, ".tor.onion"_ns)) {
     nsAutoCString* alias = nullptr;
+    // We want to keep the string stored in the map alive at least until we
+    // finish to copy it to the output parameter.
+    mozilla::AutoReadLock lock(mLock);
     if (mOnionAliases.Get(aShortHostname, &alias)) {
       // We take for granted aliases have already been validated
       aLongHostname.Assign(*alias);
@@ -86,7 +89,7 @@ OnionAliasService::GetOnionAlias(const nsACString& aShortHostname, nsACString& a
 
 NS_IMETHODIMP
 OnionAliasService::ClearOnionAliases() {
-  mozilla::MutexAutoLock lock(mLock);
+  mozilla::AutoWriteLock lock(mLock);
   mOnionAliases.Clear();
   return NS_OK;
 }
diff --git a/netwerk/dns/OnionAliasService.h b/netwerk/dns/OnionAliasService.h
index 913157e61ccb6..5f72d295018e8 100644
--- a/netwerk/dns/OnionAliasService.h
+++ b/netwerk/dns/OnionAliasService.h
@@ -8,7 +8,7 @@ namespace torproject {
 
 class OnionAliasService final : public IOnionAliasService {
 public:
-  NS_DECL_ISUPPORTS
+  NS_DECL_THREADSAFE_ISUPPORTS
   NS_DECL_IONIONALIASSERVICE
 
   static already_AddRefed<IOnionAliasService> GetSingleton();
@@ -23,7 +23,7 @@ private:
   virtual ~OnionAliasService() = default;
 
   // mLock protects access to mOnionAliases
-  mozilla::Mutex mLock{"OnionAliasService.mLock"};
+  mozilla::RWLock mLock{"OnionAliasService.mLock"};
 
   // AutoCStrings have a 64 byte buffer, so it is advised not to use them for
   // long storage. However, it is enough to contain onion addresses, so we use

-- 
To stop receiving notification emails like this one, please contact
the administrator of this repository.


More information about the tor-commits mailing list