summarylogtreecommitdiffstats
path: root/firefox-52-prefs.patch
diff options
context:
space:
mode:
Diffstat (limited to 'firefox-52-prefs.patch')
-rw-r--r--firefox-52-prefs.patch260
1 files changed, 0 insertions, 260 deletions
diff --git a/firefox-52-prefs.patch b/firefox-52-prefs.patch
deleted file mode 100644
index e9406e32f1bc..000000000000
--- a/firefox-52-prefs.patch
+++ /dev/null
@@ -1,260 +0,0 @@
---- firefox-52.0esr.bak/browser/app/profile/firefox.js 2017-03-09
-+++ firefox-52.0esr/browser/app/profile/firefox.js 2017-03-09
-@@ -206,7 +206,7 @@
- #endif
-
- // At startup, check if we're the default browser and prompt user if not.
--pref("browser.shell.checkDefaultBrowser", true);
-+pref("browser.shell.checkDefaultBrowser", false);
- pref("browser.shell.shortcutFavicons",true);
- pref("browser.shell.mostRecentDateSetAsDefault", "");
- #ifdef RELEASE_OR_BETA
-@@ -220,7 +220,7 @@
-
- // 0 = blank, 1 = home (browser.startup.homepage), 2 = last visited page, 3 = resume previous browser session
- // The behavior of option 3 is detailed at: http://wiki.mozilla.org/Session_Restore
--pref("browser.startup.page", 1);
-+pref("browser.startup.page", 0);
- pref("browser.startup.homepage", "chrome://branding/locale/browserconfig.properties");
- // Whether we should skip the homepage when opening the first-run page
- pref("browser.startup.firstrunSkipsHomepage", false);
-@@ -294,7 +294,7 @@
- pref("browser.urlbar.suggest.bookmark", true);
- pref("browser.urlbar.suggest.openpage", true);
- pref("browser.urlbar.suggest.searches", false);
--pref("browser.urlbar.userMadeSearchSuggestionsChoice", false);
-+pref("browser.urlbar.userMadeSearchSuggestionsChoice", true);
- // 4 here means the suggestion notification will be automatically
- // hidden the 4th day, so it will actually be shown on 3 different days.
- pref("browser.urlbar.daysBeforeHidingSuggestionsPrompt", 4);
-@@ -344,7 +344,7 @@
- pref("browser.download.animateNotifications", true);
-
- // This records whether or not the panel has been shown at least once.
--pref("browser.download.panel.shown", false);
-+pref("browser.download.panel.shown", true);
-
- #ifndef XP_MACOSX
- pref("browser.helperApps.deleteTempFileOnExit", true);
-@@ -419,7 +419,7 @@
- // Tabbed browser
- pref("browser.tabs.closeWindowWithLastTab", true);
- pref("browser.tabs.insertRelatedAfterCurrent", true);
--pref("browser.tabs.warnOnClose", true);
-+pref("browser.tabs.warnOnClose", false);
- pref("browser.tabs.warnOnCloseOtherTabs", true);
- pref("browser.tabs.warnOnOpen", true);
- pref("browser.tabs.maxOpenBeforeWarn", 15);
-@@ -596,7 +596,7 @@
- pref("browser.xul.error_pages.expert_bad_cert", false);
-
- // Enable captive portal detection.
--pref("network.captive-portal-service.enabled", true);
-+pref("network.captive-portal-service.enabled", false);
-
- // If true, network link events will change the value of navigator.onLine
- pref("network.manage-offline-status", true);
-@@ -1155,7 +1155,7 @@
- // Remembers if the about:newtab intro has been shown
- // NOTE: This preference is unused but was not removed in case
- // this information will be valuable in the future.
--pref("browser.newtabpage.introShown", false);
-+pref("browser.newtabpage.introShown", true);
-
- // Toggles the content of 'about:newtab'. Shows the grid when enabled.
- pref("browser.newtabpage.enabled", true);
---- firefox-52.0esr.bak/browser/branding/official/pref/firefox-branding.js 2017-03-09
-+++ firefox-52.0esr/browser/branding/official/pref/firefox-branding.js 2017-03-09
-@@ -3,8 +3,7 @@
- * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
-
- pref("startup.homepage_override_url", "");
--pref("startup.homepage_welcome_url", "https://www.mozilla.org/%LOCALE%/firefox/%VERSION%/firstrun/");
--pref("startup.homepage_welcome_url.additional", "");
-+pref("startup.homepage_welcome_url", "about:blank");
- // Interval: Time between checks for a new version (in seconds)
- pref("app.update.interval", 43200); // 12 hours
- // The time interval between the downloading of mar file chunks in the
---- firefox-52.0esr.bak/build/application.ini 2017-03-09
-+++ firefox-52.0esr/build/application.ini 2017-03-09
-@@ -43,7 +43,7 @@
-
- [XRE]
- #ifdef MOZ_PROFILE_MIGRATOR
--EnableProfileMigrator=1
-+EnableProfileMigrator=0
- #endif
-
- #if MOZ_CRASHREPORTER
---- firefox-52.0esr.bak/toolkit/components/telemetry/healthreport-prefs.js 2017-03-09
-+++ firefox-52.0esr/toolkit/components/telemetry/healthreport-prefs.js 2017-03-09
-@@ -5,6 +5,6 @@
- pref("datareporting.healthreport.infoURL", "https://www.mozilla.org/legal/privacy/firefox.html#health-report");
-
- // Health Report is enabled by default on all channels.
--pref("datareporting.healthreport.uploadEnabled", true);
-+pref("datareporting.healthreport.uploadEnabled", false);
-
- pref("datareporting.healthreport.about.reportUrl", "https://fhr.cdn.mozilla.net/%LOCALE%/v4/");
---- firefox-52.0esr.bak/modules/libpref/init/all.js 2017-03-09
-+++ firefox-52.0esr/modules/libpref/init/all.js 2017-03-09
-@@ -29,7 +29,7 @@
-
- pref("general.config.obscure_value", 13); // for MCD .cfg files
-
--pref("general.warnOnAboutConfig", true);
-+pref("general.warnOnAboutConfig", false);
-
- // maximum number of dated backups to keep at any time
- pref("browser.bookmarks.max_backups", 5);
-@@ -1523,7 +1523,7 @@
-
- // The maximum number of current global half open sockets allowable
- // when starting a new speculative connection.
--pref("network.http.speculative-parallel-limit", 6);
-+pref("network.http.speculative-parallel-limit", 0);
-
- // Whether or not to block requests for non head js/css items (e.g. media)
- // while those elements load.
-@@ -1859,7 +1859,7 @@
- pref("network.dir.format", 2);
-
- // enables the prefetch service (i.e., prefetching of <link rel="next"> URLs).
--pref("network.prefetch-next", true);
-+pref("network.prefetch-next", false);
-
- // enables the predictive service
- pref("network.predictor.enabled", true);
-@@ -2179,7 +2179,7 @@
- pref("services.settings.server", "https://firefox.settings.services.mozilla.com/v1");
-
- // Blocklist preferences
--pref("extensions.blocklist.enabled", true);
-+pref("extensions.blocklist.enabled", false);
- // OneCRL freshness checking depends on this value, so if you change it,
- // please also update security.onecrl.maximum_staleness_in_seconds.
- pref("extensions.blocklist.interval", 86400);
-@@ -3912,7 +3912,7 @@
-
- // Middle-mouse handling
- pref("middlemouse.paste", true);
--pref("middlemouse.contentLoadURL", true);
-+pref("middlemouse.contentLoadURL", false);
- pref("middlemouse.openNewWindow", true);
- pref("middlemouse.scrollbarPosition", true);
-
-@@ -3975,7 +3975,7 @@
-
- // Middle-mouse handling
- pref("middlemouse.paste", true);
--pref("middlemouse.contentLoadURL", true);
-+pref("middlemouse.contentLoadURL", false);
- pref("middlemouse.openNewWindow", true);
- pref("middlemouse.scrollbarPosition", true);
-
-@@ -4371,7 +4371,7 @@
-
- // Satchel (Form Manager) prefs
- pref("browser.formfill.debug", false);
--pref("browser.formfill.enable", true);
-+pref("browser.formfill.enable", false);
- pref("browser.formfill.expire_days", 180);
- pref("browser.formfill.saveHttpsForms", true);
- pref("browser.formfill.agedWeight", 2);
-@@ -5061,18 +5061,18 @@
- pref("dom.mapped_arraybuffer.enabled", true);
-
- // The tables used for Safebrowsing phishing and malware checks.
--pref("urlclassifier.malwareTable", "goog-malware-shavar,goog-unwanted-shavar,test-malware-simple,test-unwanted-simple");
-+pref("urlclassifier.malwareTable", "");
-
- #ifdef MOZILLA_OFFICIAL
- // In the official build, we are allowed to use google's private
- // phishing list "goog-phish-shavar". See Bug 1288840.
--pref("urlclassifier.phishTable", "goog-phish-shavar,test-phish-simple");
-+pref("urlclassifier.phishTable", "");
- #else
--pref("urlclassifier.phishTable", "googpub-phish-shavar,test-phish-simple");
-+pref("urlclassifier.phishTable", "");
- #endif
-
- // Tables for application reputation.
--pref("urlclassifier.downloadBlockTable", "goog-badbinurl-shavar");
-+pref("urlclassifier.downloadBlockTable", "");
-
- #ifdef XP_WIN
- // Only download the whitelist on Windows, since the whitelist is
-@@ -5106,48 +5106,48 @@
- pref("urlclassifier.alternate_error_page", "blocked");
-
- // Enable phishing protection
--pref("browser.safebrowsing.phishing.enabled", true);
-+pref("browser.safebrowsing.phishing.enabled", false);
-
- // Enable malware protection
--pref("browser.safebrowsing.malware.enabled", true);
-+pref("browser.safebrowsing.malware.enabled", false);
-
--pref("browser.safebrowsing.downloads.enabled", true);
--pref("browser.safebrowsing.downloads.remote.enabled", true);
-+pref("browser.safebrowsing.downloads.enabled", false);
-+pref("browser.safebrowsing.downloads.remote.enabled", false);
- pref("browser.safebrowsing.downloads.remote.timeout_ms", 10000);
--pref("browser.safebrowsing.downloads.remote.url", "https://sb-ssl.google.com/safebrowsing/clientreport/download?key=%GOOGLE_API_KEY%");
--pref("browser.safebrowsing.downloads.remote.block_dangerous", true);
--pref("browser.safebrowsing.downloads.remote.block_dangerous_host", true);
--pref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", true);
--pref("browser.safebrowsing.downloads.remote.block_uncommon", true);
-+pref("browser.safebrowsing.downloads.remote.url", "");
-+pref("browser.safebrowsing.downloads.remote.block_dangerous", false);
-+pref("browser.safebrowsing.downloads.remote.block_dangerous_host", false);
-+pref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", false);
-+pref("browser.safebrowsing.downloads.remote.block_uncommon", false);
- pref("browser.safebrowsing.debug", false);
-
- // The protocol version we communicate with google server.
- pref("browser.safebrowsing.provider.google.pver", "2.2");
--pref("browser.safebrowsing.provider.google.lists", "goog-badbinurl-shavar,goog-downloadwhite-digest256,goog-phish-shavar,googpub-phish-shavar,goog-malware-shavar,goog-unwanted-shavar");
--pref("browser.safebrowsing.provider.google.updateURL", "https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2&key=%GOOGLE_API_KEY%");
--pref("browser.safebrowsing.provider.google.gethashURL", "https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2");
--pref("browser.safebrowsing.provider.google.reportURL", "https://safebrowsing.google.com/safebrowsing/diagnostic?client=%NAME%&hl=%LOCALE%&site=");
-+pref("browser.safebrowsing.provider.google.lists", "");
-+pref("browser.safebrowsing.provider.google.updateURL", "");
-+pref("browser.safebrowsing.provider.google.gethashURL", "");
-+pref("browser.safebrowsing.provider.google.reportURL", "");
-
- // Prefs for v4.
- pref("browser.safebrowsing.provider.google4.pver", "4");
--pref("browser.safebrowsing.provider.google4.lists", "goog-phish-proto,googpub-phish-proto,goog-malware-proto,goog-unwanted-proto");
--pref("browser.safebrowsing.provider.google4.updateURL", "https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGLE_API_KEY%");
--pref("browser.safebrowsing.provider.google4.gethashURL", "https://safebrowsing.googleapis.com/v4/fullHashes:find?$req=%REQUEST_BASE64%&$ct=application/x-protobuf&key=%GOOGLE_API_KEY%");
--pref("browser.safebrowsing.provider.google4.reportURL", "https://safebrowsing.google.com/safebrowsing/diagnostic?client=%NAME%&hl=%LOCALE%&site=");
--
--pref("browser.safebrowsing.reportPhishMistakeURL", "https://%LOCALE%.phish-error.mozilla.com/?hl=%LOCALE%&url=");
--pref("browser.safebrowsing.reportPhishURL", "https://%LOCALE%.phish-report.mozilla.com/?hl=%LOCALE%&url=");
--pref("browser.safebrowsing.reportMalwareMistakeURL", "https://%LOCALE%.malware-error.mozilla.com/?hl=%LOCALE%&url=");
-+pref("browser.safebrowsing.provider.google4.lists", "");
-+pref("browser.safebrowsing.provider.google4.updateURL", "");
-+pref("browser.safebrowsing.provider.google4.gethashURL", "");
-+pref("browser.safebrowsing.provider.google4.reportURL", "");
-+
-+pref("browser.safebrowsing.reportPhishMistakeURL", "");
-+pref("browser.safebrowsing.reportPhishURL", "");
-+pref("browser.safebrowsing.reportMalwareMistakeURL", "");
-
- // The table and global pref for blocking plugin content
--pref("browser.safebrowsing.blockedURIs.enabled", true);
-+pref("browser.safebrowsing.blockedURIs.enabled", false);
- pref("urlclassifier.blockedTable", "test-block-simple,mozplugin-block-digest256");
-
- // The protocol version we communicate with mozilla server.
- pref("browser.safebrowsing.provider.mozilla.pver", "2.2");
--pref("browser.safebrowsing.provider.mozilla.lists", "base-track-digest256,mozstd-trackwhite-digest256,content-track-digest256,mozplugin-block-digest256,mozplugin2-block-digest256");
--pref("browser.safebrowsing.provider.mozilla.updateURL", "https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2");
--pref("browser.safebrowsing.provider.mozilla.gethashURL", "https://shavar.services.mozilla.com/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2");
-+pref("browser.safebrowsing.provider.mozilla.lists", "");
-+pref("browser.safebrowsing.provider.mozilla.updateURL", "");
-+pref("browser.safebrowsing.provider.mozilla.gethashURL", "");
- // Set to a date in the past to force immediate download in new profiles.
- pref("browser.safebrowsing.provider.mozilla.nextupdatetime", "1");
- // Block lists for tracking protection. The name values will be used as the keys