Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
1 /* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
2 /* vim:set ts=2 sw=2 sts=2 et cindent: */
3 /* This Source Code Form is subject to the terms of the Mozilla Public
4 * License, v. 2.0. If a copy of the MPL was not distributed with this
5 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
7 #include "mozilla/dom/CallbackInterface.h"
8 #include "jsapi.h"
9 #include "mozilla/dom/BindingUtils.h"
10 #include "nsPrintfCString.h"
12 namespace mozilla {
13 namespace dom {
15 bool
16 CallbackInterface::GetCallableProperty(JSContext* cx, const char* aPropName,
17 JS::MutableHandle<JS::Value> aCallable)
18 {
19 if (!JS_GetProperty(cx, CallbackPreserveColor(), aPropName, aCallable)) {
20 return false;
21 }
22 if (!aCallable.isObject() ||
23 !JS_ObjectIsCallable(cx, &aCallable.toObject())) {
24 nsPrintfCString description("Property '%s'", aPropName);
25 ThrowErrorMessage(cx, MSG_NOT_CALLABLE, description.get());
26 return false;
27 }
29 return true;
30 }
32 } // namespace dom
33 } // namespace mozilla