Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
1 /* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
2 /* This Source Code Form is subject to the terms of the Mozilla Public
3 * License, v. 2.0. If a copy of the MPL was not distributed with this
4 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
6 #ifndef mozilla_a11y_RootAccessibleWrap_h__
7 #define mozilla_a11y_RootAccessibleWrap_h__
9 #include "RootAccessible.h"
11 namespace mozilla {
12 namespace a11y {
14 class RootAccessibleWrap : public RootAccessible
15 {
16 public:
17 RootAccessibleWrap(nsIDocument* aDocument, nsIContent* aRootContent,
18 nsIPresShell* aPresShell);
19 virtual ~RootAccessibleWrap();
21 // RootAccessible
22 virtual void DocumentActivated(DocAccessible* aDocument);
23 };
25 } // namespace a11y
26 } // namespace mozilla
28 #endif