Граф коммитов

208 Коммитов

Автор SHA1 Сообщение Дата
Kershaw Chang 89ca1976ab Bug 1570732 - Skip trr when parental control is enabled r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D42489

--HG--
extra : moz-landing-system : lando
2019-08-23 21:17:15 +00:00
Kershaw Chang 91a654a9e3 Bug 1542037 - Only create nsDNSService on parent process r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D41211

--HG--
extra : moz-landing-system : lando
2019-08-14 19:37:13 +00:00
Kershaw Chang 93e82cb323 Bug 1569196 - Make ChildDNSService run on socket process r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D40592

--HG--
extra : moz-landing-system : lando
2019-08-05 20:54:01 +00:00
Kershaw Chang 5036125ab8 Bug 1542037 - Avoid accessing nsDNSService on middleman process r=dragana
- This patch makes sure that we don't create nsDNSService on both child process and middleman process.
- gNeckoChild won't be created in middleman process, so it's fine to create ChildDNSService on middleman process.
- Add some MOZ_DIAGNOSTIC_ASSERT in TRR, so we know where TRR is used on child process.

Differential Revision: https://phabricator.services.mozilla.com/D40018

--HG--
extra : moz-landing-system : lando
2019-08-06 12:09:19 +00:00
Sylvestre Ledru e226046cb8 Bug 1547143 - Format the tree: Be prescriptive with the pointer style (left) r=Ehsan
# ignore-this-changeset

Depends on D28954

Differential Revision: https://phabricator.services.mozilla.com/D28956

--HG--
extra : moz-landing-system : lando
2019-05-01 08:47:10 +00:00
Coroiu Cristina 8442bbf9c9 Backed out 3 changesets (bug 1525640) for causing leaks a=backout
Backed out changeset efdd32c00dc6 (bug 1525640)
Backed out changeset e71641f0465b (bug 1525640)
Backed out changeset e3539a40afdf (bug 1525640)
2019-04-13 14:57:11 +03:00
Valentin Gosu f172b45edc Bug 1525640 - Pass TRR status from sockettransport to channel r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D26882

--HG--
extra : moz-landing-system : lando
2019-04-12 13:54:08 +00:00
Valentin Gosu 50597c68ef Bug 1450893 - Add way to clear DNS cache r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D24300

--HG--
extra : moz-landing-system : lando
2019-03-21 12:41:39 +00:00
Tooru Fujisawa 7983faeb5d Bug 1511393 - Use c-basic-offset: 2 in Emacs mode line for C/C++ code. r=nbp 2018-12-01 04:52:05 +09:00
Benjamin Bouvier a7f1d173a0 Bug 1511383: Update vim modelines after clang-format; r=sylvestre
- modify line wrap up to 80 chars; (tw=80)
- modify size of tab to 2 chars everywhere; (sts=2, sw=2)

--HG--
extra : rebase_source : 7eedce0311b340c9a5a1265dc42d3121cc0f32a0
extra : amend_source : 9cb4ffdd5005f5c4c14172390dd00b04b2066cd7
2018-11-30 16:39:55 +01:00
Sylvestre Ledru 265e672179 Bug 1511181 - Reformat everything to the Google coding style r=ehsan a=clang-format
# ignore-this-changeset

--HG--
extra : amend_source : 4d301d3b0b8711c4692392aa76088ba7fd7d1022
2018-11-30 11:46:48 +01:00
Dragana Damjanovic 428228861f Bug 1502641 - Change ref-counting for nsHostRecord, change nsCOMPtr<*HostRecord> into RefPtr<*HostRecord>, remove pure virtual functions from nsHostRecord. r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D12121

--HG--
extra : moz-landing-system : lando
2018-11-19 15:23:39 +00:00
Dragana Damjanovic 0b0b0258ef Bug 1481251 - Optimize non-A/AAAA type DNS records. r=bagder
Split nsHostRecord into AddrHostRecord and TypeHostRecord for standard address dns queries and queries by-type.

Differential Revision: https://phabricator.services.mozilla.com/D6130

--HG--
extra : moz-landing-system : lando
2018-09-27 09:28:36 +00:00
Brindusan Cristian de21f30c98 Backed out changeset 72d92155fb64 (bug 1481251) for bc assertion failures in /obj-firefox/dist/include/mozilla/TimeStamp.h. CLOSED TREE 2018-09-27 05:58:31 +03:00
Dragana Damjanovic 2d89f4170e Bug 1481251 - Optimize non-A/AAAA type DNS records. r=bagder
Split nsHostRecord into AddrHostRecord and TypeHostRecord for standard address dns queries and queries by-type.

Differential Revision: https://phabricator.services.mozilla.com/D6130

--HG--
extra : moz-landing-system : lando
2018-09-26 20:10:30 +00:00
Dragana Damjanovic 9cadc84486 Bug 1473736 - Implement necko part of ESNI r=mak,kmag,mcmanus
--HG--
extra : rebase_source : be79870960953ef9535ccb6a440515ec4a8232d5
extra : histedit_source : 8096ab2eaf246cbbeb97bace0531b86b8c69ff66
2018-09-22 23:54:11 +03:00
Gurzau Raul 07d30b811f Backed out changeset dc225279994a (bug 1473736) for web platform leaks 2018-09-21 04:30:10 +03:00
Dragana Damjanovic 70e0646d75 Bug 1473736 - Implement necko part of ESNI r=mak,kmag,mcmanus
Implement necko part of ESNI

Differential Revision: https://phabricator.services.mozilla.com/D2716

--HG--
extra : moz-landing-system : lando
2018-09-20 20:53:28 +00:00
Noemi Erli efdd6a208a Backed out changeset 7aa742bff8fb (bug 1473736) for xpcshell failures and bc failures in browser_urlbarSearchSingleWordNotification.js 2018-09-18 22:07:58 +03:00
Dragana Damjanovic f000a5b4b0 Bug 1473736 - Implement necko part of ESNI r=mcmanus
Implement necko part of ESNI

Differential Revision: https://phabricator.services.mozilla.com/D2716

--HG--
extra : moz-landing-system : lando
2018-09-17 23:08:14 +00:00
Valentin Gosu 0267a22bb2 Bug 1486228 - Grab mutex when accessing nsDNSService::mLocalDomains r=mayhemer!
Differential Revision: https://phabricator.services.mozilla.com/D4452

--HG--
extra : moz-landing-system : lando
2018-08-28 22:37:12 +00:00
Dorel Luca b53fbe3617 Merge mozilla-central to autoland 2018-06-15 05:43:31 +03:00
Valentin Gosu d9800226a5 Bug 1417827 - Pass DNS arguments as nsACString& instead of char* r=bagder
MozReview-Commit-ID: 7Zk0wM2wsJF

--HG--
extra : rebase_source : 6bfe7a9c21d447252db1b0a5351305bdecb0fa3a
2018-06-15 01:15:13 +02:00
Andi-Bogdan Postelnicu 90ac230485 Bug 1453795 - Necko - Initialize member fields in classes/ structures. r=michal 2018-06-14 11:19:07 +03:00
Jeff Hemphill 0d0efc9d92 Bug 1417827: Convert internal char* to nsCString in DNS.h r=bagder
MozReview-Commit-ID: Js1mXiKaKnt

--HG--
extra : rebase_source : 55ae6349a65f20a2401aa76711b1e9c871b0c167
2017-11-29 23:30:27 -08:00
Dorel Luca ff4d587dc8 Backed out 2 changesets (bug 1417827) for windows build bustage. CLOSED TREE
Backed out changeset 35655153f9c9 (bug 1417827)
Backed out changeset 9606d0d95b53 (bug 1417827)

--HG--
extra : amend_source : ce9a86c7b5ded39d1b00a7c626ba7a082efaabde
2018-06-14 22:07:18 +03:00
Valentin Gosu e5efdc876d Bug 1417827 - Pass DNS arguments as nsACString& instead of char* r=bagder
MozReview-Commit-ID: GqNYfjy9SFp

--HG--
extra : source : 190c4f057ffafa28a9abec657a0c70fe8a9489ab
2018-06-14 14:30:40 +02:00
Jeff Hemphill deb1d4dff1 Bug 1417827: Convert internal char* to nsCString in DNS.h r=bagder
MozReview-Commit-ID: Js1mXiKaKnt

--HG--
extra : source : fc388a747aba88d3eb535e6105305bd85914600b
2017-11-29 23:30:27 -08:00
Gurzau Raul f2d3a45d49 Backed out 2 changesets (bug 1417827) backed out due to gecko decision task failure, tests did not run
Backed out changeset 190c4f057ffa (bug 1417827)
Backed out changeset fc388a747aba (bug 1417827)
2018-06-14 19:07:48 +03:00
Valentin Gosu 3620424d66 Bug 1417827 - Pass DNS arguments as nsACString& instead of char* r=bagder
MozReview-Commit-ID: GqNYfjy9SFp

--HG--
extra : rebase_source : 6bd7c4fcb1f6a5bbbaa9654907ce1b1224be64b2
2018-06-14 14:30:40 +02:00
Jeff Hemphill 85150abc1d Bug 1417827: Convert internal char* to nsCString in DNS.h r=bagder
MozReview-Commit-ID: Js1mXiKaKnt

--HG--
extra : rebase_source : 835ab465653aef0d9d513b8836ba54a27b98e556
2017-11-29 23:30:27 -08:00
Patrick McManus f18aa94399 Bug 1462357 - remove the channel and socket interface id r=bagder,baku
the id was a b2g feature only settable via chrome privd xhr and is no
longer active in the code base

MozReview-Commit-ID: 84GPNvhvjNb

--HG--
extra : rebase_source : ab5c2229b98e1407b8b74ef2ee00dcfea45e046a
2018-05-16 16:05:03 -04:00
Sebastian Hengst 0819f35e51 Backed out 4 changesets (bug 525063) on request from Andi. a=backout
Backed out changeset 516c4fb1e4b8 (bug 525063)
Backed out changeset 6ff8aaef2866 (bug 525063)
Backed out changeset bf13e4103150 (bug 525063)
Backed out changeset d7d2f08e051c (bug 525063)
2018-04-13 16:01:28 +03:00
Tristan Bourvon a3a77c0312 Bug 525063 - Initialize uninitialized class attributes in m-c. r=ehsan 2018-04-10 21:11:02 +02:00
Daniel Stenberg e443c66c37 bug 1447642 - no more DNSService restarts r=valentin
The DNS service was shutdown and restarted again in several scenarios,
for example when one of its prefs changed and by nsIOService when going
offline/online. The DNSService restart dragged the resolver, TRRService
and others with it and they too were thus restarted.

Most notably this hurt TRR resolving, as the restart caused short gaps
in time when there was no TRRService available and nsHostResolver
defaults to TRR Mode "native" if there's no TRRservice up, causing the
name resolver to occasionally use the wrong or unexpected resolver even
though TRR is enabled.

The resolver restart also flushed the DNS cache which is now avoided.

It is also a performance gain.

MozReview-Commit-ID: pp4Y8bNQJk

--HG--
extra : rebase_source : 9e3b3e6c0df16b8ca6287d8045f594026ae9ad6d
2018-03-21 14:35:53 +01:00
Daniel Stenberg e5d3226694 bug 1434852 - introducing TRR (DOH); r=mcmanus,valentin
Provides an optional resolver mechanism for Firefox that allows running
together with or instead of the native resolver.

TRR offers resolving of host names using a dedicated DNS-over-HTTPS server
(HTTPS is required, HTTP/2 is preferable).

DNS-over-HTTPS (DOH) allows DNS resolves with enhanced privacy, secure
transfers and improved performance.

To keep the failure rate at a minimum, the TRR system manages a dynamic
persistent blacklist for host names that can't be resolved with DOH but works
with the native resolver. Blacklisted entries will not be retried over DOH for
a couple of days. "localhost" and names in the ".local" TLD will not be
resolved via DOH.

TRR is preffed OFF by default and you need to set a URI for an available DOH
server to be able to use it. Since the URI for DOH is set with a name itself,
it may have to use the native resolver for bootstrapping. (Optionally, the
user can set the IP address of the DOH server in a pref to avoid the required
initial native resolve.)

When TRR starts up, it will first verify that it works by checking a
"confirmation" domain name. This confirmation domain is a pref by default set
to "example.com". TRR will also by default await the captive-portal detection
to raise its green flag before getting activated.

All prefs for TRR are under the "network.trr" hierarchy.

The DNS-over-HTTPS spec: https://tools.ietf.org/html/draft-ietf-doh-dns-over-https-03

MozReview-Commit-ID: GuuU6vjTjlm

--HG--
extra : rebase_source : 53fcca757334090ac05fec540ef29d109d5ceed3
2018-02-01 10:20:49 +01:00
Kris Maglione a75561bd62 Bug 1412726: Clean up XPCOM singleton constructor refcount handling. r=froydnj
This is a follow-up to bug 1409249. There are a lot of places where our
factory singleton constructors either don't correctly handle their returned
references being released by the component manager, or do handle it, but in
ways that are not obvious.

This patch handles a few places where we can sometimes wind up with dangling
singleton pointers, adds some explanatory comments and sanity check
assertions, and replaces some uses of manual refcounting with StaticRefPtr and
ClearOnShutdown.

There are still some places where we may wind up with odd behavior if the
first QI for a getService call fails. In those cases, we wind up destroying
the first instance of a service that we create, and re-creating a new one
later.

MozReview-Commit-ID: ANYndvd7aZx

--HG--
extra : rebase_source : acfb0611a028fef6b9387eb5d1d9e285782fbc7c
2017-10-29 16:02:40 -07:00
Jeff Hemphill 73c0663aec Bug 1425807 - Convert nsHostKey members to nsCString r=valentin
MozReview-Commit-ID: 8tZUukA8Rrk

--HG--
extra : rebase_source : 4877c8eef1c2fd3a630316641d492189663acc61
2017-12-22 14:08:17 -08:00
Valentin Gosu a7fe7a006d Bug 1424834 - Replace nsHostRecord.callbacks with LinkedList<RefPtr<nsResolveHostCallback>> r=mayhemer
* nsResolveHostCallback extends nsISupports (for addref-ing and because nsDNSAsyncRequest implements nsICancelable)
* nsResolveHostCallback extends LinkedListElement<RefPtr<nsResolveHostCallback>> so the list can properly manage references
* nsDNSAsyncRequest and nsDNSSyncRequest properly implement nsISupports and use RefPtr to manage lifetimes


MozReview-Commit-ID: 5NvBcWZzfyN

--HG--
extra : rebase_source : 67adcbd20a29803e5abbb3d16324f9cac6771d28
2017-12-20 01:13:46 +01:00
Dorel Luca d9227411a0 Backed out 2 changesets (bug 1424834) for AddressSanitizer failure r=backout a=backout
Backed out changeset 00e1d58aedfe (bug 1424834)
Backed out changeset 9b69f2b7d373 (bug 1424834)
2017-12-19 13:59:02 +02:00
Phil Ringnalda 74065c09ed Backed out changeset fc0b6106be47 (bug 1425807) for static build bustage
CLOSED TREE
2017-12-18 18:31:20 -08:00
Jeff Hemphill 6d1f1c52d8 Bug 1425807 - Convert nsHostKey members to nsCString. r=valentin
MozReview-Commit-ID: 8tZUukA8Rrk

--HG--
extra : source : 966836866e8afe423a01a9926834a26cb3d3e2b0
extra : amend_source : 8602ab726f16bc561fafc5196d05fa9578073471
extra : histedit_source : 724da61db9ba94554bfdb15992a3a2aad18eca14%2C2a576438e92928c4a8196429dbcd76d1bd1eca7d
2017-12-18 11:27:38 -08:00
Csoregi Natalia 10b1db0472 Backed out changeset 966836866e8a (bug 1425807) for Build Bustage. r=backout on a CLOSED TREE 2017-12-19 03:09:04 +02:00
Jeff Hemphill 0e5ba4ebd8 Bug 1425807 - Convert nsHostKey members to nsCString r=valentin
MozReview-Commit-ID: 8tZUukA8Rrk

--HG--
extra : rebase_source : 717e730de9c79f13553fa617c7588805683f18c5
2017-12-18 11:27:38 -08:00
Valentin Gosu d4f5405148 Bug 1424834 - Replace nsHostRecord.callbacks with LinkedList<RefPtr<nsResolveHostCallback>> r=mayhemer
* nsResolveHostCallback extends nsISupports (for addref-ing and because nsDNSAsyncRequest implements nsICancelable)
* nsResolveHostCallback extends LinkedListElement<RefPtr<nsResolveHostCallback>> so the list can properly manage references
* nsDNSAsyncRequest and nsDNSSyncRequest properly implement nsISupports and use RefPtr to manage lifetimes


MozReview-Commit-ID: 5NvBcWZzfyN

--HG--
extra : rebase_source : d8c5c89c35e455c5d8e6556a140a0ef119b95e86
2017-12-15 15:46:24 -06:00
Cosmin Sabou f0ab0b072a Backed out 2 changesets (bug 1424834) for leaks at netwerk/dns/nsHostResolver.cpp:352 r=backout a=backout
Backed out changeset 2503df83bbd9 (bug 1424834)
Backed out changeset 49cc08386f17 (bug 1424834)
2017-12-18 11:52:06 +02:00
Valentin Gosu d2697a43d6 Bug 1424834 - Replace nsHostRecord.callbacks with LinkedList<RefPtr<nsResolveHostCallback>> r=mayhemer
* nsResolveHostCallback extends nsISupports (for addref-ing and because nsDNSAsyncRequest implements nsICancelable)
* nsResolveHostCallback extends LinkedListElement<RefPtr<nsResolveHostCallback>> so the list can properly manage references
* nsDNSAsyncRequest and nsDNSSyncRequest properly implement nsISupports and use RefPtr to manage lifetimes


MozReview-Commit-ID: 5NvBcWZzfyN

--HG--
extra : rebase_source : d8c5c89c35e455c5d8e6556a140a0ef119b95e86
2017-12-15 15:46:24 -06:00
Valentin Gosu 10292308b3 Bug 1424066 - Rename nsResolveHostCallback.OnLookupComplete and nsHostResolver.OnLookupComplete r=mayhemer
We have several different methods called OnLookupComplete, with similar but different arguments.
This makes it difficult to reason about the code, when lots of methods are called the same.

* renames nsResolveHostCallback.OnLookupComplete to nsResolveHostCallback.OnResolveHostComplete
* renames nsHostResolver.OnLookupComplete to nsHostResolver.CompleteLookup

MozReview-Commit-ID: AeWTErs4OQM

--HG--
extra : rebase_source : 6d06b50c1fa2ba678a887b93f28e1e602e209da4
2017-12-07 23:19:48 +01:00
Valentin Gosu 1951f81b85 Bug 1422173 - Backed out changeset 34cfc821e335 (Bug 1417827) r=me
MozReview-Commit-ID: 5C5YN8zgAgt
2017-12-04 16:02:58 +01:00
Jeff Hemphill 0a383a895e Bug 1417827: Convert internal char* to nsCString in DNS.h r=valentin
MozReview-Commit-ID: Js1mXiKaKnt

--HG--
extra : rebase_source : 0b24a9a75dbb5a404f261e055a5bbc7fae95eff9
2017-11-29 23:30:27 -08:00