summarylogtreecommitdiffstats
path: root/firefox-52-prefs.patch
diff options
context:
space:
mode:
Diffstat (limited to 'firefox-52-prefs.patch')
-rw-r--r--firefox-52-prefs.patch260
1 files changed, 260 insertions, 0 deletions
diff --git a/firefox-52-prefs.patch b/firefox-52-prefs.patch
new file mode 100644
index 000000000000..3152bce31f52
--- /dev/null
+++ b/firefox-52-prefs.patch
@@ -0,0 +1,260 @@
+--- firefox-52.0esr.bak/browser/app/profile/firefox.js 2017-03-09
++++ firefox-52.0esr/browser/app/profile/firefox.js 2017-03-09
+@@ -206,7 +206,7 @@
+ #endif
+
+ // At startup, check if we're the default browser and prompt user if not.
+-pref("browser.shell.checkDefaultBrowser", true);
++pref("browser.shell.checkDefaultBrowser", false);
+ pref("browser.shell.shortcutFavicons",true);
+ pref("browser.shell.mostRecentDateSetAsDefault", "");
+ #ifdef RELEASE_OR_BETA
+@@ -220,7 +220,7 @@
+
+ // 0 = blank, 1 = home (browser.startup.homepage), 2 = last visited page, 3 = resume previous browser session
+ // The behavior of option 3 is detailed at: http://wiki.mozilla.org/Session_Restore
+-pref("browser.startup.page", 1);
++pref("browser.startup.page", 0);
+ pref("browser.startup.homepage", "chrome://branding/locale/browserconfig.properties");
+ // Whether we should skip the homepage when opening the first-run page
+ pref("browser.startup.firstrunSkipsHomepage", false);
+@@ -294,7 +294,7 @@
+ pref("browser.urlbar.suggest.bookmark", true);
+ pref("browser.urlbar.suggest.openpage", true);
+ pref("browser.urlbar.suggest.searches", false);
+-pref("browser.urlbar.userMadeSearchSuggestionsChoice", false);
++pref("browser.urlbar.userMadeSearchSuggestionsChoice", true);
+ // 4 here means the suggestion notification will be automatically
+ // hidden the 4th day, so it will actually be shown on 3 different days.
+ pref("browser.urlbar.daysBeforeHidingSuggestionsPrompt", 4);
+@@ -344,7 +344,7 @@
+ pref("browser.download.animateNotifications", true);
+
+ // This records whether or not the panel has been shown at least once.
+-pref("browser.download.panel.shown", false);
++pref("browser.download.panel.shown", true);
+
+ #ifndef XP_MACOSX
+ pref("browser.helperApps.deleteTempFileOnExit", true);
+@@ -419,7 +419,7 @@
+ // Tabbed browser
+ pref("browser.tabs.closeWindowWithLastTab", true);
+ pref("browser.tabs.insertRelatedAfterCurrent", true);
+-pref("browser.tabs.warnOnClose", true);
++pref("browser.tabs.warnOnClose", false);
+ pref("browser.tabs.warnOnCloseOtherTabs", true);
+ pref("browser.tabs.warnOnOpen", true);
+ pref("browser.tabs.maxOpenBeforeWarn", 15);
+@@ -596,7 +596,7 @@
+ pref("browser.xul.error_pages.expert_bad_cert", false);
+
+ // Enable captive portal detection.
+-pref("network.captive-portal-service.enabled", true);
++pref("network.captive-portal-service.enabled", false);
+
+ // If true, network link events will change the value of navigator.onLine
+ pref("network.manage-offline-status", true);
+@@ -1155,7 +1155,7 @@
+ // Remembers if the about:newtab intro has been shown
+ // NOTE: This preference is unused but was not removed in case
+ // this information will be valuable in the future.
+-pref("browser.newtabpage.introShown", false);
++pref("browser.newtabpage.introShown", true);
+
+ // Toggles the content of 'about:newtab'. Shows the grid when enabled.
+ pref("browser.newtabpage.enabled", true);
+--- firefox-52.0esr.bak/browser/branding/official/pref/firefox-branding.js 2017-03-09
++++ firefox-52.0esr/browser/branding/official/pref/firefox-branding.js 2017-03-09
+@@ -3,8 +3,7 @@
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+ pref("startup.homepage_override_url", "");
+-pref("startup.homepage_welcome_url", "https://www.mozilla.org/%LOCALE%/firefox/%VERSION%/firstrun/");
+-pref("startup.homepage_welcome_url.additional", "");
++pref("startup.homepage_welcome_url", "about:blank");
+ // Interval: Time between checks for a new version (in seconds)
+ pref("app.update.interval", 43200); // 12 hours
+ // The time interval between the downloading of mar file chunks in the
+--- firefox-52.0esr.bak/build/application.ini 2017-03-09
++++ firefox-52.0esr/build/application.ini 2017-03-09
+@@ -43,7 +43,7 @@
+
+ [XRE]
+ #ifdef MOZ_PROFILE_MIGRATOR
+-EnableProfileMigrator=1
++EnableProfileMigrator=0
+ #endif
+
+ #if MOZ_CRASHREPORTER
+--- firefox-52.0esr.bak/toolkit/components/telemetry/healthreport-prefs.js 2017-03-09
++++ firefox-52.0esr/toolkit/components/telemetry/healthreport-prefs.js 2017-03-09
+@@ -5,6 +5,6 @@
+ pref("datareporting.healthreport.infoURL", "https://www.mozilla.org/legal/privacy/firefox.html#health-report");
+
+ // Health Report is enabled by default on all channels.
+-pref("datareporting.healthreport.uploadEnabled", true);
++pref("datareporting.healthreport.uploadEnabled", false);
+
+ pref("datareporting.healthreport.about.reportUrl", "https://fhr.cdn.mozilla.net/%LOCALE%/v4/");
+--- firefox-52.0esr.bak/modules/libpref/init/all.js 2017-03-09
++++ firefox-52.0esr/modules/libpref/init/all.js 2017-03-09
+@@ -29,7 +29,7 @@
+
+ pref("general.config.obscure_value", 13); // for MCD .cfg files
+
+-pref("general.warnOnAboutConfig", true);
++pref("general.warnOnAboutConfig", false);
+
+ // maximum number of dated backups to keep at any time
+ pref("browser.bookmarks.max_backups", 5);
+@@ -1527,7 +1527,7 @@
+
+ // The maximum number of current global half open sockets allowable
+ // when starting a new speculative connection.
+-pref("network.http.speculative-parallel-limit", 6);
++pref("network.http.speculative-parallel-limit", 0);
+
+ // Whether or not to block requests for non head js/css items (e.g. media)
+ // while those elements load.
+@@ -1863,7 +1863,7 @@
+ pref("network.dir.format", 2);
+
+ // enables the prefetch service (i.e., prefetching of <link rel="next"> URLs).
+-pref("network.prefetch-next", true);
++pref("network.prefetch-next", false);
+
+ // enables the predictive service
+ pref("network.predictor.enabled", true);
+@@ -2183,7 +2183,7 @@
+ pref("services.settings.server", "https://firefox.settings.services.mozilla.com/v1");
+
+ // Blocklist preferences
+-pref("extensions.blocklist.enabled", true);
++pref("extensions.blocklist.enabled", false);
+ // OneCRL freshness checking depends on this value, so if you change it,
+ // please also update security.onecrl.maximum_staleness_in_seconds.
+ pref("extensions.blocklist.interval", 86400);
+@@ -3916,7 +3916,7 @@
+
+ // Middle-mouse handling
+ pref("middlemouse.paste", true);
+-pref("middlemouse.contentLoadURL", true);
++pref("middlemouse.contentLoadURL", false);
+ pref("middlemouse.openNewWindow", true);
+ pref("middlemouse.scrollbarPosition", true);
+
+@@ -3979,7 +3979,7 @@
+
+ // Middle-mouse handling
+ pref("middlemouse.paste", true);
+-pref("middlemouse.contentLoadURL", true);
++pref("middlemouse.contentLoadURL", false);
+ pref("middlemouse.openNewWindow", true);
+ pref("middlemouse.scrollbarPosition", true);
+
+@@ -4375,7 +4375,7 @@
+
+ // Satchel (Form Manager) prefs
+ pref("browser.formfill.debug", false);
+-pref("browser.formfill.enable", true);
++pref("browser.formfill.enable", false);
+ pref("browser.formfill.expire_days", 180);
+ pref("browser.formfill.saveHttpsForms", true);
+ pref("browser.formfill.agedWeight", 2);
+@@ -5065,18 +5065,18 @@
+ pref("dom.mapped_arraybuffer.enabled", true);
+
+ // The tables used for Safebrowsing phishing and malware checks.
+-pref("urlclassifier.malwareTable", "goog-malware-shavar,goog-unwanted-shavar,test-malware-simple,test-unwanted-simple");
++pref("urlclassifier.malwareTable", "");
+
+ #ifdef MOZILLA_OFFICIAL
+ // In the official build, we are allowed to use google's private
+ // phishing list "goog-phish-shavar". See Bug 1288840.
+-pref("urlclassifier.phishTable", "goog-phish-shavar,test-phish-simple");
++pref("urlclassifier.phishTable", "");
+ #else
+-pref("urlclassifier.phishTable", "googpub-phish-shavar,test-phish-simple");
++pref("urlclassifier.phishTable", "");
+ #endif
+
+ // Tables for application reputation.
+-pref("urlclassifier.downloadBlockTable", "goog-badbinurl-shavar");
++pref("urlclassifier.downloadBlockTable", "");
+
+ #ifdef XP_WIN
+ // Only download the whitelist on Windows, since the whitelist is
+@@ -5110,48 +5110,48 @@
+ pref("urlclassifier.alternate_error_page", "blocked");
+
+ // Enable phishing protection
+-pref("browser.safebrowsing.phishing.enabled", true);
++pref("browser.safebrowsing.phishing.enabled", false);
+
+ // Enable malware protection
+-pref("browser.safebrowsing.malware.enabled", true);
++pref("browser.safebrowsing.malware.enabled", false);
+
+-pref("browser.safebrowsing.downloads.enabled", true);
+-pref("browser.safebrowsing.downloads.remote.enabled", true);
++pref("browser.safebrowsing.downloads.enabled", false);
++pref("browser.safebrowsing.downloads.remote.enabled", false);
+ pref("browser.safebrowsing.downloads.remote.timeout_ms", 10000);
+-pref("browser.safebrowsing.downloads.remote.url", "https://sb-ssl.google.com/safebrowsing/clientreport/download?key=%GOOGLE_API_KEY%");
+-pref("browser.safebrowsing.downloads.remote.block_dangerous", true);
+-pref("browser.safebrowsing.downloads.remote.block_dangerous_host", true);
+-pref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", true);
+-pref("browser.safebrowsing.downloads.remote.block_uncommon", true);
++pref("browser.safebrowsing.downloads.remote.url", "");
++pref("browser.safebrowsing.downloads.remote.block_dangerous", false);
++pref("browser.safebrowsing.downloads.remote.block_dangerous_host", false);
++pref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", false);
++pref("browser.safebrowsing.downloads.remote.block_uncommon", false);
+ pref("browser.safebrowsing.debug", false);
+
+ // The protocol version we communicate with google server.
+ pref("browser.safebrowsing.provider.google.pver", "2.2");
+-pref("browser.safebrowsing.provider.google.lists", "goog-badbinurl-shavar,goog-downloadwhite-digest256,goog-phish-shavar,googpub-phish-shavar,goog-malware-shavar,goog-unwanted-shavar");
+-pref("browser.safebrowsing.provider.google.updateURL", "https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2&key=%GOOGLE_API_KEY%");
+-pref("browser.safebrowsing.provider.google.gethashURL", "https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2");
+-pref("browser.safebrowsing.provider.google.reportURL", "https://safebrowsing.google.com/safebrowsing/diagnostic?client=%NAME%&hl=%LOCALE%&site=");
++pref("browser.safebrowsing.provider.google.lists", "");
++pref("browser.safebrowsing.provider.google.updateURL", "");
++pref("browser.safebrowsing.provider.google.gethashURL", "");
++pref("browser.safebrowsing.provider.google.reportURL", "");
+
+ // Prefs for v4.
+ pref("browser.safebrowsing.provider.google4.pver", "4");
+-pref("browser.safebrowsing.provider.google4.lists", "goog-phish-proto,googpub-phish-proto,goog-malware-proto,goog-unwanted-proto");
+-pref("browser.safebrowsing.provider.google4.updateURL", "https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGLE_API_KEY%");
+-pref("browser.safebrowsing.provider.google4.gethashURL", "https://safebrowsing.googleapis.com/v4/fullHashes:find?$req=%REQUEST_BASE64%&$ct=application/x-protobuf&key=%GOOGLE_API_KEY%");
+-pref("browser.safebrowsing.provider.google4.reportURL", "https://safebrowsing.google.com/safebrowsing/diagnostic?client=%NAME%&hl=%LOCALE%&site=");
+-
+-pref("browser.safebrowsing.reportPhishMistakeURL", "https://%LOCALE%.phish-error.mozilla.com/?hl=%LOCALE%&url=");
+-pref("browser.safebrowsing.reportPhishURL", "https://%LOCALE%.phish-report.mozilla.com/?hl=%LOCALE%&url=");
+-pref("browser.safebrowsing.reportMalwareMistakeURL", "https://%LOCALE%.malware-error.mozilla.com/?hl=%LOCALE%&url=");
++pref("browser.safebrowsing.provider.google4.lists", "");
++pref("browser.safebrowsing.provider.google4.updateURL", "");
++pref("browser.safebrowsing.provider.google4.gethashURL", "");
++pref("browser.safebrowsing.provider.google4.reportURL", "");
++
++pref("browser.safebrowsing.reportPhishMistakeURL", "");
++pref("browser.safebrowsing.reportPhishURL", "");
++pref("browser.safebrowsing.reportMalwareMistakeURL", "");
+
+ // The table and global pref for blocking plugin content
+-pref("browser.safebrowsing.blockedURIs.enabled", true);
++pref("browser.safebrowsing.blockedURIs.enabled", false);
+ pref("urlclassifier.blockedTable", "test-block-simple,mozplugin-block-digest256");
+
+ // The protocol version we communicate with mozilla server.
+ pref("browser.safebrowsing.provider.mozilla.pver", "2.2");
+-pref("browser.safebrowsing.provider.mozilla.lists", "base-track-digest256,mozstd-trackwhite-digest256,content-track-digest256,mozplugin-block-digest256,mozplugin2-block-digest256");
+-pref("browser.safebrowsing.provider.mozilla.updateURL", "https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2");
+-pref("browser.safebrowsing.provider.mozilla.gethashURL", "https://shavar.services.mozilla.com/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2");
++pref("browser.safebrowsing.provider.mozilla.lists", "");
++pref("browser.safebrowsing.provider.mozilla.updateURL", "");
++pref("browser.safebrowsing.provider.mozilla.gethashURL", "");
+ // Set to a date in the past to force immediate download in new profiles.
+ pref("browser.safebrowsing.provider.mozilla.nextupdatetime", "1");
+ // Block lists for tracking protection. The name values will be used as the keys