diff --git a/browser/actors/BlockedSiteChild.jsm b/browser/actors/BlockedSiteChild.jsm deleted file mode 100644 index 0145f39cfc..0000000000 --- a/browser/actors/BlockedSiteChild.jsm +++ /dev/null @@ -1,211 +0,0 @@ -/* This Source Code Form is subject to the terms of the Mozilla Public - * License, v. 2.0. If a copy of the MPL was not distributed with this - * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ - -const { Services } = ChromeUtils.import("resource://gre/modules/Services.jsm"); - -var EXPORTED_SYMBOLS = ["BlockedSiteChild"]; - -const { ActorChild } = ChromeUtils.import( - "resource://gre/modules/ActorChild.jsm" -); -ChromeUtils.defineModuleGetter( - this, - "E10SUtils", - "resource://gre/modules/E10SUtils.jsm" -); - -ChromeUtils.defineModuleGetter( - this, - "SafeBrowsing", - "resource://gre/modules/SafeBrowsing.jsm" -); - -function getSiteBlockedErrorDetails(docShell) { - let blockedInfo = {}; - if (docShell.failedChannel) { - let classifiedChannel = docShell.failedChannel.QueryInterface( - Ci.nsIClassifiedChannel - ); - if (classifiedChannel) { - let httpChannel = docShell.failedChannel.QueryInterface( - Ci.nsIHttpChannel - ); - - let reportUri = httpChannel.URI; - - // Remove the query to avoid leaking sensitive data - if (reportUri instanceof Ci.nsIURL) { - reportUri = reportUri - .mutate() - .setQuery("") - .finalize(); - } - - let triggeringPrincipal = docShell.failedChannel.loadInfo - ? E10SUtils.serializePrincipal( - docShell.failedChannel.loadInfo.triggeringPrincipal - ) - : null; - blockedInfo = { - list: classifiedChannel.matchedList, - triggeringPrincipal, - provider: classifiedChannel.matchedProvider, - uri: reportUri.asciiSpec, - }; - } - } - return blockedInfo; -} - -class BlockedSiteChild extends ActorChild { - receiveMessage(msg) { - if (msg.name == "DeceptiveBlockedDetails") { - this.mm.sendAsyncMessage("DeceptiveBlockedDetails:Result", { - blockedInfo: getSiteBlockedErrorDetails(this.mm.docShell), - }); - } - } - - handleEvent(event) { - if (event.type == "AboutBlockedLoaded") { - this.onAboutBlockedLoaded(event); - } else if (event.type == "click" && event.button == 0) { - this.onClick(event); - } - } - - onAboutBlockedLoaded(aEvent) { - let global = this.mm; - let content = aEvent.target.ownerGlobal; - - let blockedInfo = getSiteBlockedErrorDetails(global.docShell); - let provider = blockedInfo.provider || ""; - - let doc = content.document; - - /** - * Set error description link in error details. - * For example, the "reported as a deceptive site" link for - * blocked phishing pages. - */ - let desc = Services.prefs.getCharPref( - "browser.safebrowsing.provider." + provider + ".reportURL", - "" - ); - if (desc) { - doc - .getElementById("error_desc_link") - .setAttribute("href", desc + encodeURIComponent(aEvent.detail.url)); - } - - // Set other links in error details. - switch (aEvent.detail.err) { - case "malware": - doc - .getElementById("report_detection") - .setAttribute( - "href", - SafeBrowsing.getReportURL("MalwareMistake", blockedInfo) || - "https://www.stopbadware.org/firefox" - ); - doc - .getElementById("learn_more_link") - .setAttribute("href", "https://www.stopbadware.org/firefox"); - break; - case "unwanted": - doc - .getElementById("learn_more_link") - .setAttribute( - "href", - "https://www.google.com/about/unwanted-software-policy.html" - ); - break; - case "phishing": - doc - .getElementById("report_detection") - .setAttribute( - "href", - SafeBrowsing.getReportURL("PhishMistake", blockedInfo) || - "https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla" - ); - doc - .getElementById("learn_more_link") - .setAttribute("href", "https://www.antiphishing.org//"); - break; - } - - // Set the firefox support url. - doc - .getElementById("firefox_support") - .setAttribute( - "href", - Services.urlFormatter.formatURLPref("app.support.baseURL") + - "phishing-malware" - ); - - // Show safe browsing details on load if the pref is set to true. - let showDetails = Services.prefs.getBoolPref( - "browser.xul.error_pages.show_safe_browsing_details_on_load" - ); - if (showDetails) { - let details = content.document.getElementById( - "errorDescriptionContainer" - ); - details.removeAttribute("hidden"); - } - - // Set safe browsing advisory link. - let advisoryUrl = Services.prefs.getCharPref( - "browser.safebrowsing.provider." + provider + ".advisoryURL", - "" - ); - let advisoryDesc = content.document.getElementById("advisoryDescText"); - if (!advisoryUrl) { - advisoryDesc.remove(); - return; - } - - let advisoryLinkText = Services.prefs.getCharPref( - "browser.safebrowsing.provider." + provider + ".advisoryName", - "" - ); - if (!advisoryLinkText) { - advisoryDesc.remove(); - return; - } - - content.document.l10n.setAttributes( - advisoryDesc, - "safeb-palm-advisory-desc", - { advisoryname: advisoryLinkText } - ); - content.document - .getElementById("advisory_provider") - .setAttribute("href", advisoryUrl); - } - - onClick(event) { - let ownerDoc = event.target.ownerDocument; - if (!ownerDoc) { - return; - } - - var reason = "phishing"; - if (/e=malwareBlocked/.test(ownerDoc.documentURI)) { - reason = "malware"; - } else if (/e=unwantedBlocked/.test(ownerDoc.documentURI)) { - reason = "unwanted"; - } else if (/e=harmfulBlocked/.test(ownerDoc.documentURI)) { - reason = "harmful"; - } - - this.mm.sendAsyncMessage("Browser:SiteBlockedError", { - location: ownerDoc.location.href, - reason, - elementId: event.target.getAttribute("id"), - isTopFrame: ownerDoc.defaultView.parent === ownerDoc.defaultView, - blockedInfo: getSiteBlockedErrorDetails(ownerDoc.defaultView.docShell), - }); - } -} diff --git a/browser/actors/ContextMenuChild.jsm b/browser/actors/ContextMenuChild.jsm index 2a68144960..907ffebf10 100644 --- a/browser/actors/ContextMenuChild.jsm +++ b/browser/actors/ContextMenuChild.jsm @@ -20,7 +20,6 @@ XPCOMUtils.defineLazyGlobalGetters(this, ["URL"]); XPCOMUtils.defineLazyModuleGetters(this, { E10SUtils: "resource://gre/modules/E10SUtils.jsm", BrowserUtils: "resource://gre/modules/BrowserUtils.jsm", - findAllCssSelectors: "resource://gre/modules/css-selector.js", SpellCheckHelper: "resource://gre/modules/InlineSpellChecker.jsm", LoginManagerContent: "resource://gre/modules/LoginManagerContent.jsm", WebNavigationFrames: "resource://gre/modules/WebNavigationFrames.jsm", @@ -575,7 +574,6 @@ class ContextMenuChild extends ActorChild { let selectionInfo = BrowserUtils.getSelectionDetails(this.content); let loadContext = this.docShell.QueryInterface(Ci.nsILoadContext); let userContextId = loadContext.originAttributes.userContextId; - let popupNodeSelectors = findAllCssSelectors(aEvent.composedTarget); this._setContext(aEvent); let context = this.context; @@ -652,7 +650,6 @@ class ContextMenuChild extends ActorChild { customMenuItems, contentDisposition, frameOuterWindowID, - popupNodeSelectors, disableSetDesktopBg, parentAllowsMixedContent, }; diff --git a/browser/actors/LinkHandlerChild.jsm b/browser/actors/LinkHandlerChild.jsm index ba97c38537..ff29d05998 100644 --- a/browser/actors/LinkHandlerChild.jsm +++ b/browser/actors/LinkHandlerChild.jsm @@ -119,6 +119,7 @@ class LinkHandlerChild extends ActorChild { case "apple-touch-icon-precomposed": case "fluid-icon": isRichIcon = true; + // fall through case "icon": if (iconAdded || link.hasAttribute("mask")) { // Masked icons are not supported yet. diff --git a/browser/actors/NetErrorChild.jsm b/browser/actors/NetErrorChild.jsm index be9113fd43..2338bcef4c 100644 --- a/browser/actors/NetErrorChild.jsm +++ b/browser/actors/NetErrorChild.jsm @@ -81,7 +81,11 @@ const PREF_SERVICES_SETTINGS_CLOCK_SKEW_SECONDS = const PREF_SERVICES_SETTINGS_LAST_FETCHED = "services.settings.last_update_seconds"; -const PREF_SSL_IMPACT_ROOTS = ["security.tls.version.", "security.ssl3."]; +const PREF_SSL_IMPACT_ROOTS = [ + "security.tls.version.", + "security.ssl3.", + "security.tls13.", +]; let formatter = new Services.intl.DateTimeFormat(undefined, { dateStyle: "long", diff --git a/browser/actors/PageStyleChild.jsm b/browser/actors/PageStyleChild.jsm index d05acd9c65..76149e7d31 100644 --- a/browser/actors/PageStyleChild.jsm +++ b/browser/actors/PageStyleChild.jsm @@ -104,7 +104,7 @@ class PageStyleChild extends ActorChild { } // Skip any stylesheets that don't match the screen media type. - if (currentStyleSheet.media.length > 0) { + if (currentStyleSheet.media.length) { let mediaQueryList = currentStyleSheet.media.mediaText; if (!content.matchMedia(mediaQueryList).matches) { continue; diff --git a/browser/actors/PluginChild.jsm b/browser/actors/PluginChild.jsm index 499c243cef..7be35fe0fe 100644 --- a/browser/actors/PluginChild.jsm +++ b/browser/actors/PluginChild.jsm @@ -158,7 +158,6 @@ class PluginChild extends ActorChild { let pluginHost = Cc["@mozilla.org/plugin/host;1"].getService( Ci.nsIPluginHost ); - pluginElement.QueryInterface(Ci.nsIObjectLoadingContent); let tagMimetype; let pluginName = gNavigatorBundle.GetStringFromName( @@ -577,8 +576,8 @@ class PluginChild extends ActorChild { "openPluginUpdatePage", pluginTag ); - /* FALLTHRU */ + /* FALLTHRU */ case "PluginVulnerableNoUpdate": case "PluginClickToPlay": this._handleClickToPlayEvent(plugin); @@ -763,14 +762,13 @@ class PluginChild extends ActorChild { let pluginHost = Cc["@mozilla.org/plugin/host;1"].getService( Ci.nsIPluginHost ); - let objLoadingContent = plugin.QueryInterface(Ci.nsIObjectLoadingContent); // guard against giving pluginHost.getPermissionStringForType a type // not associated with any known plugin - if (!this.isKnownPlugin(objLoadingContent)) { + if (!this.isKnownPlugin(plugin)) { return; } let permissionString = pluginHost.getPermissionStringForType( - objLoadingContent.actualType + plugin.actualType ); let principal = doc.defaultView.top.document.nodePrincipal; let pluginPermission = Services.perms.testPermissionFromPrincipal( @@ -797,8 +795,7 @@ class PluginChild extends ActorChild { } onOverlayClick(event) { - let document = event.target.ownerDocument; - let plugin = document.getBindingParent(event.target); + let plugin = event.target.containingShadowRoot.host; let overlay = this.getPluginUI(plugin, "main"); // Have to check that the target is not the link to update the plugin if ( @@ -826,8 +823,7 @@ class PluginChild extends ActorChild { if (overlay) { overlay.removeEventListener("click", this, true); } - let objLoadingContent = plugin.QueryInterface(Ci.nsIObjectLoadingContent); - if (this.canActivatePlugin(objLoadingContent)) { + if (this.canActivatePlugin(plugin)) { this._handleClickToPlayEvent(plugin); } } @@ -847,7 +843,6 @@ class PluginChild extends ActorChild { let pluginFound = false; for (let plugin of plugins) { - plugin.QueryInterface(Ci.nsIObjectLoadingContent); if (!this.isKnownPlugin(plugin)) { continue; } @@ -1110,8 +1105,6 @@ class PluginChild extends ActorChild { } setCrashedNPAPIPluginState({ plugin, state, message }) { - // Force a layout flush so the binding is attached. - plugin.clientTop; let overlay = this.getPluginUI(plugin, "main"); let statusDiv = this.getPluginUI(plugin, "submitStatus"); let optInCB = this.getPluginUI(plugin, "submitURLOptIn"); diff --git a/browser/actors/moz.build b/browser/actors/moz.build index 5eeec819d0..ede9abccbc 100644 --- a/browser/actors/moz.build +++ b/browser/actors/moz.build @@ -22,7 +22,6 @@ with Files("WebRTCChild.jsm"): FINAL_TARGET_FILES.actors += [ 'AboutReaderChild.jsm', - 'BlockedSiteChild.jsm', 'BrowserTabChild.jsm', 'ClickHandlerChild.jsm', 'ContentSearchChild.jsm', diff --git a/browser/app/profile/mypal.js b/browser/app/profile/mypal.js index b826dfbce2..121d1f0af7 100644 --- a/browser/app/profile/mypal.js +++ b/browser/app/profile/mypal.js @@ -14,7 +14,7 @@ #endif #endif -pref("browser.hiddenWindowChromeURL", "chrome://browser/content/hiddenWindow.xul"); +pref("browser.hiddenWindowChromeURL", "chrome://browser/content/hiddenWindowMac.xhtml"); // Enables some extra Extension System Logging (can reduce performance) pref("extensions.logging.enabled", false); @@ -51,6 +51,9 @@ pref("extensions.webextensions.default-content-security-policy", "script-src 'se pref("extensions.webextensions.remote", true); pref("extensions.webextensions.background-delayed-startup", true); +// Disable extensionStorage storage actor by default +pref("devtools.storage.extensionStorage.enabled", false); + // Dictionary download preference pref("browser.dictionaries.download.url", "data:text/plain,"); @@ -199,17 +202,6 @@ pref("browser.warnOnQuit", true); pref("browser.fullscreen.autohide", true); pref("browser.overlink-delay", 80); -#ifdef UNIX_BUT_NOT_MAC - pref("browser.urlbar.clickSelectsAll", false); -#else - pref("browser.urlbar.clickSelectsAll", true); -#endif -#ifdef UNIX_BUT_NOT_MAC - pref("browser.urlbar.doubleClickSelectsAll", true); -#else - pref("browser.urlbar.doubleClickSelectsAll", false); -#endif - // Whether using `ctrl` when hitting return/enter in the URL bar // (or clicking 'go') should prefix 'www.' and suffix // browser.fixup.alternate.suffix to the URL bar value prior to @@ -272,8 +264,10 @@ pref("browser.urlbar.openintab", false); pref("browser.urlbar.usepreloadedtopurls.enabled", false); pref("browser.urlbar.usepreloadedtopurls.expire_days", 14); -// Enable the new Address Bar code. -pref("browser.urlbar.quantumbar", true); +pref("browser.urlbar.update1", false); +pref("browser.urlbar.update1.expandTextOnFocus", false); + +pref("browser.urlbar.openViewOnFocus", false); pref("browser.altClickSave", false); @@ -325,10 +319,6 @@ pref("browser.search.hiddenOneOffs", ""); // Mirrors whether the search-container widget is in the navigation toolbar. pref("browser.search.widget.inNavBar", true); -#ifndef RELEASE_OR_BETA - pref("browser.search.reset.enabled", true); -#endif - pref("browser.sessionhistory.max_entries", 50); // Built-in default permissions. @@ -1095,7 +1085,6 @@ pref("services.sync.prefs.sync.browser.newtabpage.activity-stream.section.highli pref("services.sync.prefs.sync.browser.newtabpage.enabled", true); pref("services.sync.prefs.sync.browser.newtabpage.pinned", true); pref("services.sync.prefs.sync.browser.offline-apps.notify", true); -pref("services.sync.prefs.sync.browser.sessionstore.restore_on_demand", true); pref("services.sync.prefs.sync.browser.startup.homepage", true); pref("services.sync.prefs.sync.browser.startup.page", true); pref("services.sync.prefs.sync.browser.tabs.loadInBackground", true); @@ -1135,12 +1124,6 @@ pref("services.sync.prefs.sync.privacy.donottrackheader.enabled", true); pref("services.sync.prefs.sync.privacy.fuzzyfox.enabled", false); pref("services.sync.prefs.sync.privacy.fuzzyfox.clockgrainus", false); pref("services.sync.prefs.sync.privacy.sanitize.sanitizeOnShutdown", true); -pref("services.sync.prefs.sync.privacy.trackingprotection.enabled", true); -pref("services.sync.prefs.sync.privacy.trackingprotection.cryptomining.enabled", true); -pref("services.sync.prefs.sync.privacy.trackingprotection.cryptomining.annotate.enabled", true); -pref("services.sync.prefs.sync.privacy.trackingprotection.fingerprinting.enabled", true); -pref("services.sync.prefs.sync.privacy.trackingprotection.fingerprinting.annotate.enabled", true); -pref("services.sync.prefs.sync.privacy.trackingprotection.pbmode.enabled", true); pref("services.sync.prefs.sync.privacy.resistFingerprinting", true); pref("services.sync.prefs.sync.privacy.reduceTimerPrecision", true); pref("services.sync.prefs.sync.privacy.resistFingerprinting.reduceTimerPrecision.microseconds", true); @@ -1352,8 +1335,6 @@ pref("media.gmp.trial-create.enabled", true); pref("media.gmp-gmpopenh264.visible", true); pref("media.gmp-gmpopenh264.enabled", true); -// Switch block autoplay logic to v2, and enable UI. -pref("media.autoplay.enabled.user-gestures-needed", true); // Set Firefox to block autoplay, asking for permission by default. pref("media.autoplay.default", 1); // 0=Allowed, 1=Blocked, 5=All Blocked @@ -1414,10 +1395,6 @@ pref("media.gmp-provider.enabled", true); // Enable blocking access to storage from tracking resources only in nightly // and early beta. By default the value is 0: BEHAVIOR_ACCEPT pref("network.cookie.cookieBehavior", 4 /* BEHAVIOR_REJECT_TRACKER */); - // Enable fingerprinting blocking by default only in nightly and early beta. - pref("privacy.trackingprotection.fingerprinting.enabled", true); - // Enable cryptomining blocking by default only in nightly and early beta. - pref("privacy.trackingprotection.cryptomining.enabled", true); #endif pref("dom.storage_access.enabled", true); @@ -1428,39 +1405,6 @@ pref("browser.contentblocking.trackingprotection.control-center.ui.enabled", tru pref("browser.contentblocking.control-center.ui.showBlockedLabels", true); pref("browser.contentblocking.control-center.ui.showAllowedLabels", false); -pref("browser.contentblocking.cryptomining.preferences.ui.enabled", true); -pref("browser.contentblocking.fingerprinting.preferences.ui.enabled", true); - -// Possible values for browser.contentblocking.features.strict pref: -// Tracking Protection: -// "tp": tracking protection enabled -// "-tp": tracking protection disabled -// Tracking Protection in private windows: -// "tpPrivate": tracking protection in private windows enabled -// "-tpPrivate": tracking protection in private windows disabled -// Fingerprinting: -// "fp": fingerprinting blocking enabled -// "-fp": fingerprinting blocking disabled -// Cryptomining: -// "cm": cryptomining blocking enabled -// "-cm": cryptomining blocking disabled -// Cookie behavior: -// "cookieBehavior0": cookie behaviour BEHAVIOR_ACCEPT -// "cookieBehavior1": cookie behaviour BEHAVIOR_REJECT_FOREIGN -// "cookieBehavior2": cookie behaviour BEHAVIOR_REJECT -// "cookieBehavior3": cookie behaviour BEHAVIOR_LIMIT_FOREIGN -// "cookieBehavior4": cookie behaviour BEHAVIOR_REJECT_TRACKER -// "cookieBehavior5": cookie behaviour BEHAVIOR_REJECT_TRACKER_AND_PARTITION_FOREIGN -// One value from each section must be included in the browser.contentblocking.features.strict pref. -pref("browser.contentblocking.features.strict", "tp,tpPrivate,cookieBehavior4,cm,fp"); - -// Enable the Report Breakage UI on Nightly and Beta but not on Release yet. -pref("browser.contentblocking.reportBreakage.enabled", false); -// Show report breakage for tracking cookies in all channels. -pref("browser.contentblocking.rejecttrackers.reportBreakage.enabled", true); - -pref("browser.contentblocking.reportBreakage.url", "data:text/plain,"); - // Enables the new Protections Panel. #ifdef NIGHTLY_BUILD pref("browser.protections_panel.enabled", true); @@ -1472,19 +1416,14 @@ pref("privacy.usercontext.about_newtab_segregation.enabled", true); #ifdef NIGHTLY_BUILD pref("privacy.userContext.enabled", true); pref("privacy.userContext.ui.enabled", true); - - // 0 disables long press, 1 when clicked, the menu is shown, 2 the menu is - // shown after X milliseconds. - pref("privacy.userContext.longPressBehavior", 2); #else pref("privacy.userContext.enabled", false); pref("privacy.userContext.ui.enabled", false); - - // 0 disables long press, 1 when clicked, the menu is shown, 2 the menu is - // shown after X milliseconds. - pref("privacy.userContext.longPressBehavior", 0); #endif pref("privacy.userContext.extension", ""); +// allows user to open container menu on a left click instead of a new +// tab in the default container +pref("privacy.userContext.newTabContainerOnLeftClick.enabled", false); // Start the browser in e10s mode pref("browser.tabs.remote.autostart", true); @@ -1508,30 +1447,11 @@ pref("browser.tabs.crashReporting.requestEmail", false); pref("browser.tabs.crashReporting.emailMe", false); pref("browser.tabs.crashReporting.email", ""); -// How often to check for CPOW timeouts. CPOWs are only timed out by -// the hang monitor. -pref("dom.ipc.cpow.timeout", 500); - -// Causes access on unsafe CPOWs from browser code to throw by default. -pref("dom.ipc.cpows.forbid-unsafe-from-browser", true); - -// Enable e10s hang monitoring (slow script checking and plugin hang -// detection). -pref("dom.ipc.processHangMonitor", false); - #if defined(XP_WIN) // Allows us to deprioritize the processes of background tabs at an OS level pref("dom.ipc.processPriorityManager.enabled", true); #endif -#ifdef DEBUG - // Don't report hangs in DEBUG builds. They're too slow and often a - // debugger is attached. - pref("dom.ipc.reportProcessHangs", false); -#else - pref("dom.ipc.reportProcessHangs", true); -#endif - // Don't limit how many nodes we care about on desktop: pref("reader.parse-node-limit", 0); @@ -1646,13 +1566,6 @@ pref("browser.toolbars.keyboard_navigation", true); pref("identity.fxaccounts.toolbar.enabled", false); pref("identity.fxaccounts.toolbar.accessed", false); -// Check bundled JAR and XPI files for corruption. -#ifdef RELEASE_OR_BETA - pref("corroborator.enabled", false); -#else - pref("corroborator.enabled", true); -#endif - // Toolbox preferences pref("devtools.toolbox.footer.height", 250); pref("devtools.toolbox.sidebar.width", 500); @@ -1670,7 +1583,6 @@ pref("devtools.command-button-pick.enabled", true); pref("devtools.command-button-frames.enabled", true); pref("devtools.command-button-splitconsole.enabled", true); pref("devtools.command-button-paintflashing.enabled", false); -pref("devtools.command-button-scratchpad.enabled", false); pref("devtools.command-button-responsive.enabled", true); pref("devtools.command-button-screenshot.enabled", false); pref("devtools.command-button-rulers.enabled", false); @@ -1847,23 +1759,6 @@ pref("devtools.netmonitor.har.enableAutoExportToFile", false); pref("devtools.netmonitor.features.webSockets", false); #endif -// Scratchpad settings -// - recentFileMax: The maximum number of recently-opened files -// stored. Setting this preference to 0 will not -// clear any recent files, but rather hide the -// 'Open Recent'-menu. -// - lineNumbers: Whether to show line numbers or not. -// - wrapText: Whether to wrap text or not. -// - showTrailingSpace: Whether to highlight trailing space or not. -// - editorFontSize: Editor font size configuration. -// - enableAutocompletion: Whether to enable JavaScript autocompletion. -pref("devtools.scratchpad.recentFilesMax", 10); -pref("devtools.scratchpad.lineNumbers", true); -pref("devtools.scratchpad.wrapText", false); -pref("devtools.scratchpad.showTrailingSpace", false); -pref("devtools.scratchpad.editorFontSize", 12); -pref("devtools.scratchpad.enableAutocompletion", true); - // Enable the Storage Inspector pref("devtools.storage.enabled", true); @@ -1879,9 +1774,6 @@ pref("devtools.styleeditor.transitions", true); pref("devtools.screenshot.clipboard.enabled", false); pref("devtools.screenshot.audio.enabled", true); -// Enable Scratchpad -pref("devtools.scratchpad.enabled", false); - // Make sure the DOM panel is hidden by default pref("devtools.dom.enabled", false); @@ -1932,13 +1824,6 @@ pref("devtools.webconsole.timestampMessages", false); pref("devtools.webconsole.sidebarToggle", false); #endif -// Enable editor mode in the console in Nightly builds. -#if defined(NIGHTLY_BUILD) - pref("devtools.webconsole.features.editor", true); -#else - pref("devtools.webconsole.features.editor", false); -#endif - // Saved editor mode state in the console. pref("devtools.webconsole.input.editor", false); @@ -2000,13 +1885,6 @@ pref("devtools.responsive.metaViewport.enabled", false); // The user agent of the viewport. pref("devtools.responsive.userAgent", ""); -// Whether to show the settings onboarding tooltip only in release or beta -// builds. -#if defined(RELEASE_OR_BETA) - pref("devtools.responsive.show-setting-tooltip", true); -#else - pref("devtools.responsive.show-setting-tooltip", false); -#endif // Show the custom user agent input in Nightly builds. #if defined(NIGHTLY_BUILD) pref("devtools.responsive.showUserAgentInput", true); diff --git a/browser/base/content/aboutDialog-appUpdater-legacy.js b/browser/base/content/aboutDialog-appUpdater-legacy.js index f971b43930..0629e8eaf4 100644 --- a/browser/base/content/aboutDialog-appUpdater-legacy.js +++ b/browser/base/content/aboutDialog-appUpdater-legacy.js @@ -2,7 +2,7 @@ * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ -// Note: this file is included in aboutDialog.xul and preferences/advanced.xul +// Note: this file is included in aboutDialog.xhtml and preferences/advanced.xhtml // if MOZ_UPDATER is defined. /* import-globals-from aboutDialog.js */ diff --git a/browser/base/content/aboutDialog-appUpdater.js b/browser/base/content/aboutDialog-appUpdater.js index b421f01b7d..79828e5a27 100644 --- a/browser/base/content/aboutDialog-appUpdater.js +++ b/browser/base/content/aboutDialog-appUpdater.js @@ -2,7 +2,7 @@ * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ -// Note: this file is included in aboutDialog.xul and preferences/advanced.xul +// Note: this file is included in aboutDialog.xhtml and preferences/advanced.xhtml // if MOZ_UPDATER is defined. /* import-globals-from aboutDialog.js */ diff --git a/browser/base/content/aboutDialog.xul b/browser/base/content/aboutDialog.xhtml similarity index 99% rename from browser/base/content/aboutDialog.xul rename to browser/base/content/aboutDialog.xhtml index 140803eb88..361703041f 100644 --- a/browser/base/content/aboutDialog.xul +++ b/browser/base/content/aboutDialog.xhtml @@ -31,7 +31,7 @@ aria-describedby="version distribution distributionId communityDesc trademark" > #ifdef XP_MACOSX -#include macWindow.inc.xul +#include macWindow.inc.xhtml #endif diff --git a/browser/base/content/aboutFrameCrashed.html b/browser/base/content/aboutFrameCrashed.html index 55e34a346b..2c4c3d38da 100644 --- a/browser/base/content/aboutFrameCrashed.html +++ b/browser/base/content/aboutFrameCrashed.html @@ -6,6 +6,7 @@ + - + &loadError.label; - - - - - - - - - -
- - -
-

-
- -
- - -
-

-
- - -
-

- -

-
- - -
- - - -
-
- -
- - + + +# All sets except for popupsets (commands, keys, and stringbundles) +# *must* go into the browser-sets.inc file so that they can be shared with other +# top level windows in macWindow.inc.xhtml. +#include browser-sets.inc + + + + + + + + + + + + + +