Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
1 /* -*- Mode: IDL; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
2 /* This Source Code Form is subject to the terms of the Mozilla Public
3 * License, v. 2.0. If a copy of the MPL was not distributed with this file,
4 * You can obtain one at http://mozilla.org/MPL/2.0/.
5 */
7 [Constructor(DOMString type, optional HashChangeEventInit eventInitDict), HeaderFile="GeneratedEventClasses.h"]
8 interface HashChangeEvent : Event
9 {
10 readonly attribute DOMString? oldURL;
11 readonly attribute DOMString? newURL;
13 // initHashChangeEvent is a Gecko specific deprecated method.
14 [Throws]
15 void initHashChangeEvent(DOMString type,
16 boolean canBubble,
17 boolean cancelable,
18 DOMString? oldURL,
19 DOMString? newURL);
20 };
22 dictionary HashChangeEventInit : EventInit
23 {
24 DOMString oldURL = "";
25 DOMString newURL = "";
26 };