Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
michael@0 | 1 | /* |
michael@0 | 2 | * If we're running in e10s, determines whether we're in child directory or |
michael@0 | 3 | * not. |
michael@0 | 4 | */ |
michael@0 | 5 | |
michael@0 | 6 | var inChild = false; |
michael@0 | 7 | var filePrefix = ""; |
michael@0 | 8 | try { |
michael@0 | 9 | inChild = Components.classes["@mozilla.org/xre/runtime;1"]. |
michael@0 | 10 | getService(Components.interfaces.nsIXULRuntime).processType |
michael@0 | 11 | != Components.interfaces.nsIXULRuntime.PROCESS_TYPE_DEFAULT; |
michael@0 | 12 | if (inChild) { |
michael@0 | 13 | // use "jar:remoteopenfile://" in child instead of "jar:file://" |
michael@0 | 14 | filePrefix = "remoteopen"; |
michael@0 | 15 | } |
michael@0 | 16 | } |
michael@0 | 17 | catch (e) { } |