Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
michael@0 | 1 | /* This Source Code Form is subject to the terms of the Mozilla Public |
michael@0 | 2 | * License, v. 2.0. If a copy of the MPL was not distributed with this |
michael@0 | 3 | * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
michael@0 | 4 | |
michael@0 | 5 | #include "nsISupports.idl" |
michael@0 | 6 | |
michael@0 | 7 | [scriptable, uuid(8d171460-a716-41f1-92be-8c659db39b45)] |
michael@0 | 8 | interface nsIAsyncVerifyRedirectCallback : nsISupports |
michael@0 | 9 | { |
michael@0 | 10 | /** |
michael@0 | 11 | * Complement to nsIChannelEventSink asynchronous callback. The result of |
michael@0 | 12 | * the redirect decision is passed through this callback. |
michael@0 | 13 | * |
michael@0 | 14 | * @param result |
michael@0 | 15 | * Result of the redirect veto decision. If FAILED the redirect has been |
michael@0 | 16 | * vetoed. If SUCCEEDED the redirect has been allowed by all consumers. |
michael@0 | 17 | */ |
michael@0 | 18 | void onRedirectVerifyCallback(in nsresult result); |
michael@0 | 19 | }; |