Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 /*
2 * If we're running in e10s, determines whether we're in child directory or
3 * not.
4 */
6 var inChild = false;
7 var filePrefix = "";
8 try {
9 inChild = Components.classes["@mozilla.org/xre/runtime;1"].
10 getService(Components.interfaces.nsIXULRuntime).processType
11 != Components.interfaces.nsIXULRuntime.PROCESS_TYPE_DEFAULT;
12 if (inChild) {
13 // use "jar:remoteopenfile://" in child instead of "jar:file://"
14 filePrefix = "remoteopen";
15 }
16 }
17 catch (e) { }