Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
michael@0 | 1 | /* This Source Code Form is subject to the terms of the Mozilla Public |
michael@0 | 2 | * License, v. 2.0. If a copy of the MPL was not distributed with this |
michael@0 | 3 | * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
michael@0 | 4 | |
michael@0 | 5 | #include "nsISupports.idl" |
michael@0 | 6 | |
michael@0 | 7 | [scriptable, uuid(08923af1-e7a3-4fae-ba02-128502193994)] |
michael@0 | 8 | interface nsIProfileUnlocker : nsISupports |
michael@0 | 9 | { |
michael@0 | 10 | const unsigned long ATTEMPT_QUIT = 0; |
michael@0 | 11 | const unsigned long FORCE_QUIT = 1; |
michael@0 | 12 | |
michael@0 | 13 | /** |
michael@0 | 14 | * Try to unlock the specified profile by attempting or forcing the |
michael@0 | 15 | * process that currently holds the lock to quit. |
michael@0 | 16 | * |
michael@0 | 17 | * @param aSeverity either ATTEMPT_QUIT or FORCE_QUIT |
michael@0 | 18 | * @throws NS_ERROR_FAILURE if unlocking failed. |
michael@0 | 19 | */ |
michael@0 | 20 | void unlock(in unsigned long aSeverity); |
michael@0 | 21 | }; |