Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
1 /* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
2 /* This Source Code Form is subject to the terms of the Mozilla Public
3 * License, v. 2.0. If a copy of the MPL was not distributed with this
4 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
6 #include "nsISupports.idl"
8 [scriptable, uuid(C1B1F426-7E83-4759-9F88-0E1B17F49366)]
9 interface nsIByteRangeRequest : nsISupports
10 {
11 /**
12 * Returns true IFF this request is a byte range request, otherwise it
13 * returns false (This is effectively the same as checking to see if
14 * |startRequest| is zero and |endRange| is the content length.)
15 */
16 readonly attribute boolean isByteRangeRequest;
18 /**
19 * Absolute start position in remote file for this request.
20 */
21 readonly attribute long long startRange;
23 /**
24 * Absolute end postion in remote file for this request
25 */
26 readonly attribute long long endRange;
27 };