Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
michael@0 | 1 | /* This Source Code Form is subject to the terms of the Mozilla Public |
michael@0 | 2 | * License, v. 2.0. If a copy of the MPL was not distributed with this |
michael@0 | 3 | * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
michael@0 | 4 | |
michael@0 | 5 | /** |
michael@0 | 6 | * This interface is used to cache associated (sub) content security |
michael@0 | 7 | * state. That is determined asynchronously based on callback notification |
michael@0 | 8 | * while loading the content and its sub content particles. |
michael@0 | 9 | * |
michael@0 | 10 | * Some optimizations like bfcaching removes these callback notifications |
michael@0 | 11 | * and therefor the subcontent state could not be determined. In such |
michael@0 | 12 | * a case it is loaded from this object stored in nsIChannel.securityInfo. |
michael@0 | 13 | */ |
michael@0 | 14 | |
michael@0 | 15 | #include "nsISupports.idl" |
michael@0 | 16 | |
michael@0 | 17 | [scriptable, uuid(a8285dae-f125-454f-9d1b-089e3f01b2c4)] |
michael@0 | 18 | interface nsIAssociatedContentSecurity : nsISupports |
michael@0 | 19 | { |
michael@0 | 20 | attribute long countSubRequestsBrokenSecurity; |
michael@0 | 21 | attribute long countSubRequestsNoSecurity; |
michael@0 | 22 | void flush(); |
michael@0 | 23 | }; |