Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
1 /* This Source Code Form is subject to the terms of the Mozilla Public
2 * License, v. 2.0. If a copy of the MPL was not distributed with this
3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
5 "use strict";
7 (function() {
9 const {classes: Cc, interfaces: Ci, utils: Cu} = Components;
11 let {Services} = Cu.import("resource://gre/modules/Services.jsm", {});
13 let nsIFile = Components.Constructor("@mozilla.org/file/local;1", "nsIFile",
14 "initWithPath");
16 const MSG_JAR_FLUSH = "AddonJarFlush";
19 try {
20 if (Services.appinfo.processType !== Services.appinfo.PROCESS_TYPE_DEFAULT) {
21 // Propagate JAR cache flush notifications across process boundaries.
22 addMessageListener(MSG_JAR_FLUSH, function jar_flushMessageListener(message) {
23 let file = new nsIFile(message.data);
24 Services.obs.notifyObservers(file, "flush-cache-entry", null);
25 });
26 }
27 } catch(e) {
28 Cu.reportError(e);
29 }
31 })();