Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
1 function handleRequest(request, response)
2 {
3 var query = {};
4 request.queryString.split('&').forEach(function (val) {
5 var [name, value] = val.split('=');
6 query[name] = unescape(value);
7 });
9 if ("setState" in query) {
10 setState("test/content/base/test_CrossSiteXHR_cache:secData",
11 query.setState);
13 response.setHeader("Cache-Control", "no-cache", false);
14 response.setHeader("Content-Type", "text/plain", false);
15 response.write("hi");
17 return;
18 }
20 var isPreflight = request.method == "OPTIONS";
22 // Send response
24 secData =
25 eval(getState("test/content/base/test_CrossSiteXHR_cache:secData"));
27 if (secData.allowOrigin)
28 response.setHeader("Access-Control-Allow-Origin", secData.allowOrigin);
30 if (isPreflight) {
31 if (secData.allowHeaders)
32 response.setHeader("Access-Control-Allow-Headers", secData.allowHeaders);
34 if (secData.allowMethods)
35 response.setHeader("Access-Control-Allow-Methods", secData.allowMethods);
37 if (secData.cacheTime)
38 response.setHeader("Access-Control-Max-Age", secData.cacheTime.toString());
40 return;
41 }
43 response.setHeader("Cache-Control", "no-cache", false);
44 response.setHeader("Content-Type", "application/xml", false);
45 response.write("<res>hello pass</res>\n");
46 }