Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
1 /* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
2 /* This Source Code Form is subject to the terms of the Mozilla Public
3 * License, v. 2.0. If a copy of the MPL was not distributed with this
4 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
6 #ifndef mozilla_a11y_XULAlertAccessible_h__
7 #define mozilla_a11y_XULAlertAccessible_h__
9 #include "AccessibleWrap.h"
11 namespace mozilla {
12 namespace a11y {
14 /**
15 * Accessible for supporting XUL alerts.
16 */
18 class XULAlertAccessible : public AccessibleWrap
19 {
20 public:
21 XULAlertAccessible(nsIContent* aContent, DocAccessible* aDoc);
23 NS_DECL_ISUPPORTS_INHERITED
25 // Accessible
26 virtual mozilla::a11y::ENameValueFlag Name(nsString& aName);
27 virtual a11y::role NativeRole();
28 virtual uint64_t NativeState();
30 // Widgets
31 virtual bool IsWidget() const;
32 virtual Accessible* ContainerWidget() const;
33 };
35 } // namespace a11y
36 } // namespace mozilla
38 #endif