Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
1 # Copyright 2012 Mozilla Foundation and Mozilla contributors
2 #
3 # Licensed under the Apache License, Version 2.0 (the "License");
4 # you may not use this file except in compliance with the License.
5 # You may obtain a copy of the License at
6 #
7 # http://www.apache.org/licenses/LICENSE-2.0
8 #
9 # Unless required by applicable law or agreed to in writing, software
10 # distributed under the License is distributed on an "AS IS" BASIS,
11 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 # See the License for the specific language governing permissions and
13 # limitations under the License.
15 include $(topsrcdir)/config/rules.mk
17 EXTRA_DSO_LDOPTS += \
18 -L$(DEPTH)/media/omx-plugin/lib/gb/libutils \
19 -lutils \
20 -L$(DEPTH)/media/omx-plugin/lib/froyo/libstagefright \
21 -lstagefright \
22 -L$(DEPTH)/media/omx-plugin/lib/gb/libstagefright_color_conversion \
23 -lstagefright_color_conversion \
24 $(NULL)