Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
1 /* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
2 * This Source Code Form is subject to the terms of the Mozilla Public
3 * License, v. 2.0. If a copy of the MPL was not distributed with this
4 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
6 #include "ClientContainerLayer.h"
7 #include "ClientLayerManager.h" // for ClientLayerManager, etc
8 #include "mozilla/mozalloc.h" // for operator new
9 #include "nsAutoPtr.h" // for nsRefPtr
10 #include "nsCOMPtr.h" // for already_AddRefed
11 #include "nsISupportsImpl.h" // for Layer::AddRef, etc
13 namespace mozilla {
14 namespace layers {
16 already_AddRefed<ContainerLayer>
17 ClientLayerManager::CreateContainerLayer()
18 {
19 NS_ASSERTION(InConstruction(), "Only allowed in construction phase");
20 nsRefPtr<ClientContainerLayer> layer =
21 new ClientContainerLayer(this);
22 CREATE_SHADOW(Container);
23 return layer.forget();
24 }
26 already_AddRefed<RefLayer>
27 ClientLayerManager::CreateRefLayer()
28 {
29 NS_ASSERTION(InConstruction(), "Only allowed in construction phase");
30 nsRefPtr<ClientRefLayer> layer =
31 new ClientRefLayer(this);
32 CREATE_SHADOW(Ref);
33 return layer.forget();
34 }
36 }
37 }