diff options
Diffstat (limited to 'firefox-52-prefs.patch')
-rw-r--r-- | firefox-52-prefs.patch | 260 |
1 files changed, 260 insertions, 0 deletions
diff --git a/firefox-52-prefs.patch b/firefox-52-prefs.patch new file mode 100644 index 000000000000..3152bce31f52 --- /dev/null +++ b/firefox-52-prefs.patch @@ -0,0 +1,260 @@ +--- firefox-52.0esr.bak/browser/app/profile/firefox.js 2017-03-09 ++++ firefox-52.0esr/browser/app/profile/firefox.js 2017-03-09 +@@ -206,7 +206,7 @@ + #endif + + // At startup, check if we're the default browser and prompt user if not. +-pref("browser.shell.checkDefaultBrowser", true); ++pref("browser.shell.checkDefaultBrowser", false); + pref("browser.shell.shortcutFavicons",true); + pref("browser.shell.mostRecentDateSetAsDefault", ""); + #ifdef RELEASE_OR_BETA +@@ -220,7 +220,7 @@ + + // 0 = blank, 1 = home (browser.startup.homepage), 2 = last visited page, 3 = resume previous browser session + // The behavior of option 3 is detailed at: http://wiki.mozilla.org/Session_Restore +-pref("browser.startup.page", 1); ++pref("browser.startup.page", 0); + pref("browser.startup.homepage", "chrome://branding/locale/browserconfig.properties"); + // Whether we should skip the homepage when opening the first-run page + pref("browser.startup.firstrunSkipsHomepage", false); +@@ -294,7 +294,7 @@ + pref("browser.urlbar.suggest.bookmark", true); + pref("browser.urlbar.suggest.openpage", true); + pref("browser.urlbar.suggest.searches", false); +-pref("browser.urlbar.userMadeSearchSuggestionsChoice", false); ++pref("browser.urlbar.userMadeSearchSuggestionsChoice", true); + // 4 here means the suggestion notification will be automatically + // hidden the 4th day, so it will actually be shown on 3 different days. + pref("browser.urlbar.daysBeforeHidingSuggestionsPrompt", 4); +@@ -344,7 +344,7 @@ + pref("browser.download.animateNotifications", true); + + // This records whether or not the panel has been shown at least once. +-pref("browser.download.panel.shown", false); ++pref("browser.download.panel.shown", true); + + #ifndef XP_MACOSX + pref("browser.helperApps.deleteTempFileOnExit", true); +@@ -419,7 +419,7 @@ + // Tabbed browser + pref("browser.tabs.closeWindowWithLastTab", true); + pref("browser.tabs.insertRelatedAfterCurrent", true); +-pref("browser.tabs.warnOnClose", true); ++pref("browser.tabs.warnOnClose", false); + pref("browser.tabs.warnOnCloseOtherTabs", true); + pref("browser.tabs.warnOnOpen", true); + pref("browser.tabs.maxOpenBeforeWarn", 15); +@@ -596,7 +596,7 @@ + pref("browser.xul.error_pages.expert_bad_cert", false); + + // Enable captive portal detection. +-pref("network.captive-portal-service.enabled", true); ++pref("network.captive-portal-service.enabled", false); + + // If true, network link events will change the value of navigator.onLine + pref("network.manage-offline-status", true); +@@ -1155,7 +1155,7 @@ + // Remembers if the about:newtab intro has been shown + // NOTE: This preference is unused but was not removed in case + // this information will be valuable in the future. +-pref("browser.newtabpage.introShown", false); ++pref("browser.newtabpage.introShown", true); + + // Toggles the content of 'about:newtab'. Shows the grid when enabled. + pref("browser.newtabpage.enabled", true); +--- firefox-52.0esr.bak/browser/branding/official/pref/firefox-branding.js 2017-03-09 ++++ firefox-52.0esr/browser/branding/official/pref/firefox-branding.js 2017-03-09 +@@ -3,8 +3,7 @@ + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ + + pref("startup.homepage_override_url", ""); +-pref("startup.homepage_welcome_url", "https://www.mozilla.org/%LOCALE%/firefox/%VERSION%/firstrun/"); +-pref("startup.homepage_welcome_url.additional", ""); ++pref("startup.homepage_welcome_url", "about:blank"); + // Interval: Time between checks for a new version (in seconds) + pref("app.update.interval", 43200); // 12 hours + // The time interval between the downloading of mar file chunks in the +--- firefox-52.0esr.bak/build/application.ini 2017-03-09 ++++ firefox-52.0esr/build/application.ini 2017-03-09 +@@ -43,7 +43,7 @@ + + [XRE] + #ifdef MOZ_PROFILE_MIGRATOR +-EnableProfileMigrator=1 ++EnableProfileMigrator=0 + #endif + + #if MOZ_CRASHREPORTER +--- firefox-52.0esr.bak/toolkit/components/telemetry/healthreport-prefs.js 2017-03-09 ++++ firefox-52.0esr/toolkit/components/telemetry/healthreport-prefs.js 2017-03-09 +@@ -5,6 +5,6 @@ + pref("datareporting.healthreport.infoURL", "https://www.mozilla.org/legal/privacy/firefox.html#health-report"); + + // Health Report is enabled by default on all channels. +-pref("datareporting.healthreport.uploadEnabled", true); ++pref("datareporting.healthreport.uploadEnabled", false); + + pref("datareporting.healthreport.about.reportUrl", "https://fhr.cdn.mozilla.net/%LOCALE%/v4/"); +--- firefox-52.0esr.bak/modules/libpref/init/all.js 2017-03-09 ++++ firefox-52.0esr/modules/libpref/init/all.js 2017-03-09 +@@ -29,7 +29,7 @@ + + pref("general.config.obscure_value", 13); // for MCD .cfg files + +-pref("general.warnOnAboutConfig", true); ++pref("general.warnOnAboutConfig", false); + + // maximum number of dated backups to keep at any time + pref("browser.bookmarks.max_backups", 5); +@@ -1527,7 +1527,7 @@ + + // The maximum number of current global half open sockets allowable + // when starting a new speculative connection. +-pref("network.http.speculative-parallel-limit", 6); ++pref("network.http.speculative-parallel-limit", 0); + + // Whether or not to block requests for non head js/css items (e.g. media) + // while those elements load. +@@ -1863,7 +1863,7 @@ + pref("network.dir.format", 2); + + // enables the prefetch service (i.e., prefetching of <link rel="next"> URLs). +-pref("network.prefetch-next", true); ++pref("network.prefetch-next", false); + + // enables the predictive service + pref("network.predictor.enabled", true); +@@ -2183,7 +2183,7 @@ + pref("services.settings.server", "https://firefox.settings.services.mozilla.com/v1"); + + // Blocklist preferences +-pref("extensions.blocklist.enabled", true); ++pref("extensions.blocklist.enabled", false); + // OneCRL freshness checking depends on this value, so if you change it, + // please also update security.onecrl.maximum_staleness_in_seconds. + pref("extensions.blocklist.interval", 86400); +@@ -3916,7 +3916,7 @@ + + // Middle-mouse handling + pref("middlemouse.paste", true); +-pref("middlemouse.contentLoadURL", true); ++pref("middlemouse.contentLoadURL", false); + pref("middlemouse.openNewWindow", true); + pref("middlemouse.scrollbarPosition", true); + +@@ -3979,7 +3979,7 @@ + + // Middle-mouse handling + pref("middlemouse.paste", true); +-pref("middlemouse.contentLoadURL", true); ++pref("middlemouse.contentLoadURL", false); + pref("middlemouse.openNewWindow", true); + pref("middlemouse.scrollbarPosition", true); + +@@ -4375,7 +4375,7 @@ + + // Satchel (Form Manager) prefs + pref("browser.formfill.debug", false); +-pref("browser.formfill.enable", true); ++pref("browser.formfill.enable", false); + pref("browser.formfill.expire_days", 180); + pref("browser.formfill.saveHttpsForms", true); + pref("browser.formfill.agedWeight", 2); +@@ -5065,18 +5065,18 @@ + pref("dom.mapped_arraybuffer.enabled", true); + + // The tables used for Safebrowsing phishing and malware checks. +-pref("urlclassifier.malwareTable", "goog-malware-shavar,goog-unwanted-shavar,test-malware-simple,test-unwanted-simple"); ++pref("urlclassifier.malwareTable", ""); + + #ifdef MOZILLA_OFFICIAL + // In the official build, we are allowed to use google's private + // phishing list "goog-phish-shavar". See Bug 1288840. +-pref("urlclassifier.phishTable", "goog-phish-shavar,test-phish-simple"); ++pref("urlclassifier.phishTable", ""); + #else +-pref("urlclassifier.phishTable", "googpub-phish-shavar,test-phish-simple"); ++pref("urlclassifier.phishTable", ""); + #endif + + // Tables for application reputation. +-pref("urlclassifier.downloadBlockTable", "goog-badbinurl-shavar"); ++pref("urlclassifier.downloadBlockTable", ""); + + #ifdef XP_WIN + // Only download the whitelist on Windows, since the whitelist is +@@ -5110,48 +5110,48 @@ + pref("urlclassifier.alternate_error_page", "blocked"); + + // Enable phishing protection +-pref("browser.safebrowsing.phishing.enabled", true); ++pref("browser.safebrowsing.phishing.enabled", false); + + // Enable malware protection +-pref("browser.safebrowsing.malware.enabled", true); ++pref("browser.safebrowsing.malware.enabled", false); + +-pref("browser.safebrowsing.downloads.enabled", true); +-pref("browser.safebrowsing.downloads.remote.enabled", true); ++pref("browser.safebrowsing.downloads.enabled", false); ++pref("browser.safebrowsing.downloads.remote.enabled", false); + pref("browser.safebrowsing.downloads.remote.timeout_ms", 10000); +-pref("browser.safebrowsing.downloads.remote.url", "https://sb-ssl.google.com/safebrowsing/clientreport/download?key=%GOOGLE_API_KEY%"); +-pref("browser.safebrowsing.downloads.remote.block_dangerous", true); +-pref("browser.safebrowsing.downloads.remote.block_dangerous_host", true); +-pref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", true); +-pref("browser.safebrowsing.downloads.remote.block_uncommon", true); ++pref("browser.safebrowsing.downloads.remote.url", ""); ++pref("browser.safebrowsing.downloads.remote.block_dangerous", false); ++pref("browser.safebrowsing.downloads.remote.block_dangerous_host", false); ++pref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", false); ++pref("browser.safebrowsing.downloads.remote.block_uncommon", false); + pref("browser.safebrowsing.debug", false); + + // The protocol version we communicate with google server. + pref("browser.safebrowsing.provider.google.pver", "2.2"); +-pref("browser.safebrowsing.provider.google.lists", "goog-badbinurl-shavar,goog-downloadwhite-digest256,goog-phish-shavar,googpub-phish-shavar,goog-malware-shavar,goog-unwanted-shavar"); +-pref("browser.safebrowsing.provider.google.updateURL", "https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2&key=%GOOGLE_API_KEY%"); +-pref("browser.safebrowsing.provider.google.gethashURL", "https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2"); +-pref("browser.safebrowsing.provider.google.reportURL", "https://safebrowsing.google.com/safebrowsing/diagnostic?client=%NAME%&hl=%LOCALE%&site="); ++pref("browser.safebrowsing.provider.google.lists", ""); ++pref("browser.safebrowsing.provider.google.updateURL", ""); ++pref("browser.safebrowsing.provider.google.gethashURL", ""); ++pref("browser.safebrowsing.provider.google.reportURL", ""); + + // Prefs for v4. + pref("browser.safebrowsing.provider.google4.pver", "4"); +-pref("browser.safebrowsing.provider.google4.lists", "goog-phish-proto,googpub-phish-proto,goog-malware-proto,goog-unwanted-proto"); +-pref("browser.safebrowsing.provider.google4.updateURL", "https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGLE_API_KEY%"); +-pref("browser.safebrowsing.provider.google4.gethashURL", "https://safebrowsing.googleapis.com/v4/fullHashes:find?$req=%REQUEST_BASE64%&$ct=application/x-protobuf&key=%GOOGLE_API_KEY%"); +-pref("browser.safebrowsing.provider.google4.reportURL", "https://safebrowsing.google.com/safebrowsing/diagnostic?client=%NAME%&hl=%LOCALE%&site="); +- +-pref("browser.safebrowsing.reportPhishMistakeURL", "https://%LOCALE%.phish-error.mozilla.com/?hl=%LOCALE%&url="); +-pref("browser.safebrowsing.reportPhishURL", "https://%LOCALE%.phish-report.mozilla.com/?hl=%LOCALE%&url="); +-pref("browser.safebrowsing.reportMalwareMistakeURL", "https://%LOCALE%.malware-error.mozilla.com/?hl=%LOCALE%&url="); ++pref("browser.safebrowsing.provider.google4.lists", ""); ++pref("browser.safebrowsing.provider.google4.updateURL", ""); ++pref("browser.safebrowsing.provider.google4.gethashURL", ""); ++pref("browser.safebrowsing.provider.google4.reportURL", ""); ++ ++pref("browser.safebrowsing.reportPhishMistakeURL", ""); ++pref("browser.safebrowsing.reportPhishURL", ""); ++pref("browser.safebrowsing.reportMalwareMistakeURL", ""); + + // The table and global pref for blocking plugin content +-pref("browser.safebrowsing.blockedURIs.enabled", true); ++pref("browser.safebrowsing.blockedURIs.enabled", false); + pref("urlclassifier.blockedTable", "test-block-simple,mozplugin-block-digest256"); + + // The protocol version we communicate with mozilla server. + pref("browser.safebrowsing.provider.mozilla.pver", "2.2"); +-pref("browser.safebrowsing.provider.mozilla.lists", "base-track-digest256,mozstd-trackwhite-digest256,content-track-digest256,mozplugin-block-digest256,mozplugin2-block-digest256"); +-pref("browser.safebrowsing.provider.mozilla.updateURL", "https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2"); +-pref("browser.safebrowsing.provider.mozilla.gethashURL", "https://shavar.services.mozilla.com/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2"); ++pref("browser.safebrowsing.provider.mozilla.lists", ""); ++pref("browser.safebrowsing.provider.mozilla.updateURL", ""); ++pref("browser.safebrowsing.provider.mozilla.gethashURL", ""); + // Set to a date in the past to force immediate download in new profiles. + pref("browser.safebrowsing.provider.mozilla.nextupdatetime", "1"); + // Block lists for tracking protection. The name values will be used as the keys |