Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
1 /* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
2 /* This Source Code Form is subject to the terms of the Mozilla Public
3 * License, v. 2.0. If a copy of the MPL was not distributed with this
4 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
6 #ifndef TRANSFRMX_TXNAMESPACEMAP_H
7 #define TRANSFRMX_TXNAMESPACEMAP_H
9 #include "nsIAtom.h"
10 #include "nsCOMArray.h"
11 #include "nsTArray.h"
13 class txNamespaceMap
14 {
15 public:
16 txNamespaceMap();
17 txNamespaceMap(const txNamespaceMap& aOther);
19 nsrefcnt AddRef()
20 {
21 return ++mRefCnt;
22 }
23 nsrefcnt Release()
24 {
25 if (--mRefCnt == 0) {
26 mRefCnt = 1; //stabilize
27 delete this;
28 return 0;
29 }
30 return mRefCnt;
31 }
33 nsresult mapNamespace(nsIAtom* aPrefix, const nsAString& aNamespaceURI);
34 int32_t lookupNamespace(nsIAtom* aPrefix);
35 int32_t lookupNamespaceWithDefault(const nsAString& aPrefix);
37 private:
38 nsAutoRefCnt mRefCnt;
39 nsCOMArray<nsIAtom> mPrefixes;
40 nsTArray<int32_t> mNamespaces;
41 };
43 #endif //TRANSFRMX_TXNAMESPACEMAP_H