Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
1 /* This Source Code Form is subject to the terms of the Mozilla Public
2 * License, v. 2.0. If a copy of the MPL was not distributed with this
3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
5 #include "nsISupports.idl"
7 /**
8 * A container for policy information to be used during channel creation.
9 *
10 * This interface exists to allow the content policy mechanism to function
11 * properly during channel redirects. Channels can be created with this
12 * interface placed in the property bag and upon redirect, the interface can
13 * be transferred from the old channel to the new channel.
14 */
15 [scriptable, uuid(18045e96-1afe-4162-837a-04691267158c)]
16 interface nsIChannelPolicy : nsISupports
17 {
18 /**
19 * Indicates what type of content is being loaded, e.g.
20 * nsIContentPolicy::TYPE_IMAGE
21 */
22 attribute unsigned long loadType;
24 /**
25 * A nsIContentSecurityPolicy object to determine if the load should
26 * be allowed.
27 */
28 attribute nsISupports contentSecurityPolicy;
29 };