Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
1 /* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
2 /* vim: set ts=8 sts=2 et sw=2 tw=80: */
3 /* This Source Code Form is subject to the terms of the Mozilla Public
4 * License, v. 2.0. If a copy of the MPL was not distributed with this
5 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
7 /* Representation for dates. */
9 #ifndef mozilla_dom_Date_h
10 #define mozilla_dom_Date_h
12 #include "js/TypeDecls.h"
14 namespace mozilla {
15 namespace dom {
17 class Date
18 {
19 public:
20 // Not inlining much here to avoid the includes we'd need.
21 Date();
22 Date(double aMilliseconds)
23 : mMsecSinceEpoch(aMilliseconds)
24 {}
26 bool IsUndefined() const;
27 double TimeStamp() const
28 {
29 return mMsecSinceEpoch;
30 }
31 void SetTimeStamp(double aMilliseconds)
32 {
33 mMsecSinceEpoch = aMilliseconds;
34 }
35 // Can return false if CheckedUnwrap fails. This will NOT throw;
36 // callers should do it as needed.
37 bool SetTimeStamp(JSContext* aCx, JSObject* aObject);
39 bool ToDateObject(JSContext* aCx, JS::MutableHandle<JS::Value> aRval) const;
41 private:
42 double mMsecSinceEpoch;
43 };
45 } // namespace dom
46 } // namespace mozilla
48 #endif // mozilla_dom_Date_h