changelog
- Thu, 22 Jan 2015 13:21:57 +0100
- by Michael Schloh von Bennewitz <michael@schloh.com> [Thu, 22 Jan 2015 13:21:57 +0100] rev 15
- Incorporate requested changes from Mozilla in review:
https://bugzilla.mozilla.org/show_bug.cgi?id=1123480#c6
- Fri, 16 Jan 2015 18:13:44 +0100
- by Michael Schloh von Bennewitz <michael@schloh.com> [Fri, 16 Jan 2015 18:13:44 +0100] rev 14
- Integrate suggestion from review to improve consistency with existing code.
- Fri, 16 Jan 2015 04:50:19 +0100
- by Michael Schloh von Bennewitz <michael@schloh.com> [Fri, 16 Jan 2015 04:50:19 +0100] rev 13
- Replace accessor implementation with direct member state manipulation, by
request https://trac.torproject.org/projects/tor/ticket/9701#comment:32
- Thu, 15 Jan 2015 21:13:52 +0100
- by Michael Schloh von Bennewitz <michael@schloh.com> [Thu, 15 Jan 2015 21:13:52 +0100] rev 12
- Remove forgotten relic of ABI crash risk averse overloaded method change.
- Thu, 15 Jan 2015 21:03:48 +0100
- by Michael Schloh von Bennewitz <michael@schloh.com> [Thu, 15 Jan 2015 21:03:48 +0100] rev 11
- Integrate friendly tips from Tor colleagues to make (or not) 4.5 alpha 3;
This includes removal of overloaded (but unused) methods, and addition of
a overlooked call to DataStruct::SetData(nsISupports, uint32_t, bool.)
- Thu, 15 Jan 2015 15:59:08 +0100
- by Michael Schloh von Bennewitz <michael@schloh.com> [Thu, 15 Jan 2015 15:59:08 +0100] rev 10
- Implement a real Private Browsing Mode condition by changing the API/ABI;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
- Thu, 15 Jan 2015 15:55:04 +0100
- by Michael Schloh von Bennewitz <michael@schloh.com> [Thu, 15 Jan 2015 15:55:04 +0100] rev 9
- Back out 97036ab72558 which inappropriately compared turds to third parties.
- Tue, 06 Jan 2015 21:39:09 +0100
- by Michael Schloh von Bennewitz <michael@schloh.com> [Tue, 06 Jan 2015 21:39:09 +0100] rev 8
- Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
- Sat, 03 Jan 2015 20:18:00 +0100
- by Michael Schloh von Bennewitz <michael@schloh.com> [Sat, 03 Jan 2015 20:18:00 +0100] rev 7
- Conditionally enable double key logic according to:
private browsing mode or privacy.thirdparty.isolate preference and
implement in GetCookieStringCommon and FindCookie where it counts...
With some reservations of how to convince FindCookie users to test
condition and pass a nullptr when disabling double key logic.
- Wed, 31 Dec 2014 13:27:57 +0100
- by Michael Schloh von Bennewitz <michael@schloh.com> [Wed, 31 Dec 2014 13:27:57 +0100] rev 6
- Ignore runtime configuration files generated during quality assurance.