Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
1 /* This Source Code Form is subject to the terms of the Mozilla Public
2 * License, v. 2.0. If a copy of the MPL was not distributed with this
3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
5 #ifndef nsChannelProperties_h__
6 #define nsChannelProperties_h__
8 #include "nsStringGlue.h"
9 #ifdef IMPL_LIBXUL
10 #include "nsNetStrings.h"
11 #endif
13 /**
14 * @file
15 * This file contains constants for properties channels can expose.
16 * They can be accessed by using QueryInterface to access the nsIPropertyBag
17 * or nsIPropertyBag2 interface on a channel and reading the value.
18 */
21 /**
22 * Exists to allow content policy mechanism to function properly during channel
23 * redirects. Contains security contextual information about the load.
24 * Type: nsIChannelPolicy
25 */
26 #define NS_CHANNEL_PROP_CHANNEL_POLICY_STR "channel-policy"
28 #ifdef IMPL_LIBXUL
29 #define NS_CHANNEL_PROP_CHANNEL_POLICY gNetStrings->kChannelPolicy
30 #else
31 #define NS_CHANNEL_PROP_CHANNEL_POLICY \
32 NS_LITERAL_STRING(NS_CHANNEL_PROP_CHANNEL_POLICY_STR)
33 #endif
35 #endif