From 5f8de423f190bbb79a62f804151bc24824fa32d8 Mon Sep 17 00:00:00 2001 From: "Matt A. Tobin" Date: Fri, 2 Feb 2018 04:16:08 -0500 Subject: Add m-esr52 at 52.6.0 --- browser/app/Makefile.in | 94 + browser/app/blocklist.xml | 5085 ++++++++++++++++++++ browser/app/firefox.exe.manifest | 43 + browser/app/macbuild/Contents/Info.plist.in | 224 + browser/app/macbuild/Contents/MacOS-files.in | 9 + .../Resources/English.lproj/InfoPlist.strings.in | 5 + browser/app/macversion.py | 44 + browser/app/module.ver | 8 + browser/app/moz.build | 91 + browser/app/nsBrowserApp.cpp | 429 ++ browser/app/permissions | 23 + browser/app/profile/channel-prefs.js | 5 + browser/app/profile/extensions/moz.build | 7 + .../install.rdf.in | 40 + .../moz.build | 11 + browser/app/profile/firefox.js | 1571 ++++++ browser/app/profile/pagethemes.rdf | 7 + browser/app/profile/prefs.js | 13 + browser/app/splash.rc | 21 + 19 files changed, 7730 insertions(+) create mode 100644 browser/app/Makefile.in create mode 100644 browser/app/blocklist.xml create mode 100644 browser/app/firefox.exe.manifest create mode 100644 browser/app/macbuild/Contents/Info.plist.in create mode 100644 browser/app/macbuild/Contents/MacOS-files.in create mode 100644 browser/app/macbuild/Contents/Resources/English.lproj/InfoPlist.strings.in create mode 100644 browser/app/macversion.py create mode 100644 browser/app/module.ver create mode 100644 browser/app/moz.build create mode 100644 browser/app/nsBrowserApp.cpp create mode 100644 browser/app/permissions create mode 100644 browser/app/profile/channel-prefs.js create mode 100644 browser/app/profile/extensions/moz.build create mode 100644 browser/app/profile/extensions/{972ce4c6-7e08-4474-a285-3208198ce6fd}/install.rdf.in create mode 100644 browser/app/profile/extensions/{972ce4c6-7e08-4474-a285-3208198ce6fd}/moz.build create mode 100644 browser/app/profile/firefox.js create mode 100644 browser/app/profile/pagethemes.rdf create mode 100644 browser/app/profile/prefs.js create mode 100644 browser/app/splash.rc (limited to 'browser/app') diff --git a/browser/app/Makefile.in b/browser/app/Makefile.in new file mode 100644 index 000000000..cbd2ec0fc --- /dev/null +++ b/browser/app/Makefile.in @@ -0,0 +1,94 @@ +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. + +dist_dest = $(DIST)/$(MOZ_MACBUNDLE_NAME) + +# hardcode en-US for the moment +AB_CD = en-US + +# Build a binary bootstrapping with XRE_main + +ifndef MOZ_WINCONSOLE +ifneq (,$(MOZ_DEBUG)$(MOZ_ASAN)) +MOZ_WINCONSOLE = 1 +else +MOZ_WINCONSOLE = 0 +endif +endif + +# This switches $(INSTALL) to copy mode, like $(SYSINSTALL), so things that +# shouldn't get 755 perms need $(IFLAGS1) for either way of calling nsinstall. +NSDISTMODE = copy + +include $(topsrcdir)/config/config.mk + +ifeq ($(OS_ARCH),WINNT) +# Rebuild firefox.exe if the manifest changes - it's included by splash.rc. +# (this dependency should really be just for firefox.exe, not other targets) +# Note the manifest file exists in the tree, so we use the explicit filename +# here. +EXTRA_DEPS += firefox.exe.manifest +endif + +PROGRAMS_DEST = $(DIST)/bin + +include $(topsrcdir)/config/rules.mk + +ifneq (,$(filter-out WINNT,$(OS_ARCH))) + +ifdef COMPILE_ENVIRONMENT +libs:: + cp -p $(MOZ_APP_NAME)$(BIN_SUFFIX) $(DIST)/bin/$(MOZ_APP_NAME)-bin$(BIN_SUFFIX) +endif + +GARBAGE += $(addprefix $(FINAL_TARGET)/defaults/pref/, firefox.js) + +endif + +# channel-prefs.js is handled separate from other prefs due to bug 756325 +libs:: $(srcdir)/profile/channel-prefs.js + $(NSINSTALL) -D $(DIST)/bin/defaults/pref + $(call py_action,preprocessor,-Fsubstitution $(PREF_PPFLAGS) $(ACDEFINES) $^ -o $(DIST)/bin/defaults/pref/channel-prefs.js) + +ifeq (cocoa,$(MOZ_WIDGET_TOOLKIT)) + +MAC_APP_NAME = $(MOZ_APP_DISPLAYNAME) + +ifdef MOZ_DEBUG +MAC_APP_NAME := $(MAC_APP_NAME)Debug +endif + +AB_CD = $(MOZ_UI_LOCALE) + +ifeq (zh-TW,$(AB_CD)) +LPROJ_ROOT := $(subst -,_,$(AB_CD)) +else +LPROJ_ROOT := $(firstword $(subst -, ,$(AB_CD))) +endif +LPROJ := Contents/Resources/$(LPROJ_ROOT).lproj + +clean clobber repackage:: + $(RM) -r $(dist_dest) + +MAC_BUNDLE_VERSION = $(shell $(PYTHON) $(srcdir)/macversion.py --version=$(MOZ_APP_VERSION) --buildid=$(DEPTH)/buildid.h) + +.PHONY: repackage +tools repackage:: $(DIST)/bin/$(MOZ_APP_NAME) + $(MKDIR) -p $(dist_dest)/Contents/MacOS + $(MKDIR) -p $(dist_dest)/$(LPROJ) + rsync -a --exclude '*.in' $(srcdir)/macbuild/Contents $(dist_dest) --exclude English.lproj + rsync -a --exclude '*.in' $(srcdir)/macbuild/Contents/Resources/English.lproj/ $(dist_dest)/$(LPROJ) + sed -e 's/%APP_VERSION%/$(MOZ_APP_VERSION)/' -e 's/%MAC_APP_NAME%/$(MAC_APP_NAME)/' -e 's/%MOZ_MACBUNDLE_ID%/$(MOZ_MACBUNDLE_ID)/' -e 's/%MAC_BUNDLE_VERSION%/$(MAC_BUNDLE_VERSION)/' $(srcdir)/macbuild/Contents/Info.plist.in > $(dist_dest)/Contents/Info.plist + sed -e 's/%MAC_APP_NAME%/$(MAC_APP_NAME)/' $(srcdir)/macbuild/Contents/Resources/English.lproj/InfoPlist.strings.in | iconv -f UTF-8 -t UTF-16 > $(dist_dest)/$(LPROJ)/InfoPlist.strings + rsync -a --exclude-from='$(srcdir)/macbuild/Contents/MacOS-files.in' $(DIST)/bin/ $(dist_dest)/Contents/Resources + rsync -a --include-from='$(srcdir)/macbuild/Contents/MacOS-files.in' --exclude '*' $(DIST)/bin/ $(dist_dest)/Contents/MacOS + $(RM) $(dist_dest)/Contents/MacOS/$(MOZ_APP_NAME) + rsync -aL $(DIST)/bin/$(MOZ_APP_NAME) $(dist_dest)/Contents/MacOS + cp -RL $(DIST)/branding/firefox.icns $(dist_dest)/Contents/Resources/firefox.icns + cp -RL $(DIST)/branding/document.icns $(dist_dest)/Contents/Resources/document.icns + $(MKDIR) -p $(dist_dest)/Contents/Library/LaunchServices + mv -f $(dist_dest)/Contents/MacOS/updater.app/Contents/MacOS/org.mozilla.updater $(dist_dest)/Contents/Library/LaunchServices + ln -s ../../../../Library/LaunchServices/org.mozilla.updater $(dist_dest)/Contents/MacOS/updater.app/Contents/MacOS/org.mozilla.updater + printf APPLMOZB > $(dist_dest)/Contents/PkgInfo +endif diff --git a/browser/app/blocklist.xml b/browser/app/blocklist.xml new file mode 100644 index 000000000..2753992a5 --- /dev/null +++ b/browser/app/blocklist.xml @@ -0,0 +1,5085 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + browser.startup.homepage + browser.search.defaultenginename + + + + + + + + + + + + + + + + + + + + + + + + + + app.update.auto + app.update.enabled + app.update.interval + app.update.url + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + browser.startup.homepage + browser.search.defaultenginename + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + browser.search.defaultenginename + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + browser.startup.homepage + browser.search.defaultenginename + + + + + + browser.startup.homepage + browser.search.defaultenginename + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + browser.startup.homepage + browser.search.defaultenginename + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + browser.startup.homepage + browser.search.defaultenginename + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + browser.startup.homepage + browser.search.defaultenginename + + + + + + + + + + + + + + + + + + + + + + browser.startup.homepage + + + + + + security.csp.enable + security.fileuri.strict_origin_policy + security.mixed_content.block_active_content + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + browser.startup.homepage + browser.search.defaultenginename + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + browser.search.defaultenginename + + + + + + browser.startup.homepage + browser.search.defaultenginename + + + + + + browser.startup.homepage + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + browser.startup.homepage + browser.search.defaultenginename + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + browser.startup.homepage + browser.search.defaultenginename + + + + + + + + + + + + + + + + + + + + + + browser.startup.homepage + browser.search.defaultenginename + + + + + + + + + + browser.startup.homepage + browser.search.defaultenginename + + + + + + browser.startup.homepage + browser.search.defaultenginename + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + browser.startup.homepage + browser.search.defaultenginename + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + browser.startup.homepage + browser.search.defaultenginename + + + + + + + + + + + + + + + + + + browser.startup.homepage + browser.search.defaultenginename + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + browser.startup.homepage + browser.search.defaultenginename + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + browser.startup.homepage + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + browser.startup.homepage + browser.search.defaultenginename + + + + + + + + + + + + + + browser.startup.homepage + browser.search.defaultenginename + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + browser.startup.homepage + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + browser.startup.homepage + browser.search.defaultenginename + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + browser.startup.homepage + browser.search.defaultenginename + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + https://java.com/ + + + + + + + + + + + + + https://java.com/ + + + + + + + + + + + + + + + + + + + + + + + + + + https://java.com/ + + + + + https://real.com/ + + + + + https://get.adobe.com/flashplayer/ + + + + + + + + + + + + + https://java.com/ + + + + + + + + + + + + + + + + + + https://java.com/ + + + + + + + + + + + + + + + + + + + + + https://get.adobe.com/flashplayer/ + + + + + + + + + + https://get.adobe.com/flashplayer/ + + + + + + + + + https://get.adobe.com/reader/ + + + + + + https://java.com/ + + + + + https://get.adobe.com/reader/ + + + + + + + + + + + + + + + + + + + + + https://java.com/ + + + + + + + + + https://get.adobe.com/flashplayer/ + + + + + + + + + https://get.adobe.com/reader + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + https://get.adobe.com/reader/ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + https://get.adobe.com/shockwave/ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + https://java.com/ + + + + + + + + + + https://java.com/ + + + + + + + + + + + + + + + + + + + + + + + + https://java.com/ + + + + + https://java.com/ + + + + + + + + + + + + + + https://java.com/ + + + + + + https://java.com/ + + + + + + + + + https://get.adobe.com/flashplayer/ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + https://java.com/ + + + + + + + + + + + + + https://java.com/ + + + + + + + + + + + + + + + https://java.com/ + + + + + + https://java.com/ + + + + + + + + + + + + + + + + + + + https://get.adobe.com/flashplayer/ + + + + + + + + + + https://get.adobe.com/flashplayer/ + + + + + + + + + + + + + https://java.com/ + + + + + + + + + + + https://java.com/ + + + + + + https://java.com/ + + + + + + + + + https://get.adobe.com/reader + + + + + https://support.apple.com/en-us/HT205771 + + + + + + + + + + + https://java.com/ + + + + + + https://java.com/ + + + + + + https://java.com/ + + + + + + + + + https://java.com/ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + https://java.com/ + + + + + + https://java.com/ + + + + + + + + + + + + + + https://java.com/ + + + + + + + + + https://get.adobe.com/shockwave/ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + https://get.adobe.com/reader + + + + + + + + + + + + + + + https://java.com/ + + + + + https://www.microsoft.com/getsilverlight + + + + + + + + + https://java.com/ + + + + + + https://java.com/ + + + + + + https://java.com/ + + + + + + https://java.com/ + + + + + + WINNT 6.1 + 0x10de + DIRECT2D + BLOCKED_DRIVER_VERSION + 8.17.12.5896 + LESS_THAN_OR_EQUAL + + 0x0a6c + + + + WINNT 6.2 + 0x1022 + DIRECT2D + BLOCKED_DRIVER_VERSION + 9.10.8.0 + LESS_THAN_OR_EQUAL + + + All + 0x8086 + BLOCKED_DRIVER_VERSION + 8.15.10.1872 + EQUAL + + 0x2a42 + 0x2e22 + 0x2e12 + 0x2e32 + 0x0046 + + + + All + 0x8086 + BLOCKED_DRIVER_VERSION + 8.15.10.1994 + EQUAL + + 0x2a42 + 0x2e22 + 0x2e12 + 0x2e32 + 0x0046 + + + + WINNT 5.2 + 0x8086 + HARDWARE_VIDEO_DECODING + BLOCKED_DRIVER_VERSION + 10.18.10.3947 + EQUAL + + + WINNT 6.3 + 0x8086 + HARDWARE_VIDEO_DECODING + BLOCKED_DRIVER_VERSION + 10.18.10.3947 + EQUAL + + + Darwin 12 + 0x1002 + WEBGL_MSAA + BLOCKED_DEVICE + + + Darwin 10 + 0x8086 + WEBGL_MSAA + BLOCKED_DEVICE + + + All + 0x1002 + DIRECT2D + BLOCKED_DRIVER_VERSION + 8.982.0.0 + EQUAL + + + WINNT 5.1 + 0x8086 + DIRECT3D_9_LAYERS + BLOCKED_DRIVER_VERSION + 6.14.10.5218 + LESS_THAN + + + Darwin 10 + 0x1002 + WEBGL_MSAA + BLOCKED_DEVICE + + + WINNT 5.1 + 0x8086 + HARDWARE_VIDEO_DECODING + BLOCKED_DRIVER_VERSION + 10.18.10.3947 + EQUAL + + + WINNT 6.2 + 0x1002 + DIRECT2D + BLOCKED_DRIVER_VERSION + 9.10.8.0 + LESS_THAN_OR_EQUAL + + + WINNT 10.0 + 0x8086 + HARDWARE_VIDEO_DECODING + BLOCKED_DRIVER_VERSION + 10.18.10.3947 + EQUAL + + + All + 0x1002 + DIRECT3D_9_LAYERS + BLOCKED_DRIVER_VERSION + 8.982.0.0 + EQUAL + + + WINNT 6.1 + 0x10de + DIRECT3D_9_LAYERS + BLOCKED_DRIVER_VERSION + 8.17.12.5896 + LESS_THAN_OR_EQUAL + + 0x0a6c + + + + WINNT 6.2 + 0x8086 + HARDWARE_VIDEO_DECODING + BLOCKED_DRIVER_VERSION + 10.18.10.3947 + EQUAL + + + WINNT 8.1 + 0x1002 + DIRECT2D + BLOCKED_DRIVER_VERSION + 15.201.1151.0 + LESS_THAN + + 0x6920 + 0x6921 + 0x6928 + 0x6929 + 0x692b + 0x692f + 0x6930 + 0x6938 + 0x6939 + 0x6900 + 0x6901 + 0x6902 + 0x6903 + 0x6907 + 0x7300 + 0x9870 + 0x9874 + 0x9875 + 0x9876 + 0x9877 + + + + WINNT 6.1 + 0x8086 + HARDWARE_VIDEO_DECODING + BLOCKED_DRIVER_VERSION + 10.18.10.3947 + EQUAL + + + All + 0x8086 + BLOCKED_DRIVER_VERSION + 8.15.10.2086 + EQUAL + + 0x2a42 + 0x2e22 + 0x2e12 + 0x2e32 + 0x0046 + + + + All + 0x1022 + DIRECT3D_9_LAYERS + BLOCKED_DRIVER_VERSION + 8.982.0.0 + EQUAL + + + Darwin 11 + 0x1002 + WEBGL_MSAA + BLOCKED_DEVICE + + + Darwin 11 + 0x8086 + WEBGL_MSAA + BLOCKED_DEVICE + + + All + 0x8086 + BLOCKED_DRIVER_VERSION + 8.15.10.1855 + EQUAL + + 0x2a42 + 0x2e22 + 0x2e12 + 0x2e32 + 0x0046 + + + + WINNT 6.1 + 0x1002 + DIRECT3D_9_LAYERS + BLOCKED_DEVICE + + 0x9802 + 0x9803 + 0x9803 + 0x9804 + 0x9805 + 0x9806 + 0x9807 + + + + WINNT 6.0 + 0x8086 + HARDWARE_VIDEO_DECODING + BLOCKED_DRIVER_VERSION + 10.18.10.3947 + EQUAL + + + Darwin 12 + 0x10de + WEBGL_MSAA + BLOCKED_DEVICE + + + Darwin 12 + 0x8086 + WEBGL_MSAA + BLOCKED_DEVICE + + + Darwin 11 + 0x10de + WEBGL_MSAA + BLOCKED_DEVICE + + + All + 0x8086 + BLOCKED_DRIVER_VERSION + 8.15.10.1851 + EQUAL + + 0x2a42 + 0x2e22 + 0x2e12 + 0x2e32 + 0x0046 + + + + WINNT 6.1 + 0x1002 + DIRECT2D + BLOCKED_DEVICE + + 0x9802 + 0x9803 + 0x9803 + 0x9804 + 0x9805 + 0x9806 + 0x9807 + + + + Darwin 10 + 0x10de + WEBGL_MSAA + BLOCKED_DEVICE + + + All + 0x8086 + BLOCKED_DRIVER_VERSION + 8.15.10.1883 + EQUAL + + 0x2a42 + 0x2e22 + 0x2e12 + 0x2e32 + 0x0046 + + + + All + 0x8086 + BLOCKED_DRIVER_VERSION + 8.15.10.1892 + EQUAL + + 0x2a42 + 0x2e22 + 0x2e12 + 0x2e32 + 0x0046 + + + + All + 0x1022 + DIRECT2D + BLOCKED_DRIVER_VERSION + 8.982.0.0 + EQUAL + + + WINNT 5.1 + 0x8086 + WEBGL_ANGLE + BLOCKED_DRIVER_VERSION + 6.14.10.5218 + LESS_THAN + + + + WINNT 10.0 + 0x1002 + DIRECT2D + BLOCKED_DRIVER_VERSION + 15.201.1151.0 + LESS_THAN + + 0x6920 + 0x6921 + 0x6928 + 0x6929 + 0x692b + 0x692f + 0x6930 + 0x6938 + 0x6939 + 0x6900 + 0x6901 + 0x6902 + 0x6903 + 0x6907 + 0x7300 + 0x9870 + 0x9874 + 0x9875 + 0x9876 + 0x9877 + + + + All + 0x8086 + DIRECT2D + BLOCKED_DRIVER_VERSION + 8.15.10.2413 + LESS_THAN_OR_EQUAL + + + WINNT 5.1 + 0x10de + DIRECT3D_9_LAYERS + BLOCKED_DRIVER_VERSION + 7.0.0.0 + GREATER_THAN_OR_EQUAL + + + + + L79XLVO2ZmtAu7FAG8Wmzw== + + + ESDDtMgFFiaUfKo7HD9qImM7 + + + TurPPI6eivtNeGYdM0ZWXQ== + + + Hwexgn/ZCJicZPcsIyI8zxQ= + + + Bydrxg== + + + a9/VeyVWrzFD7rM2PEHwQA== + + + BAAAAAABJ/v3ZwA= + + + STMAjg== + + + AMs= + + + AzL4tLuklekJ8lSh6VnRMSrk + + + BAAAAAABFqoAZoI= + + + A+ly3y1rVP59k/MKfcE3DoEq + + + GN2Hrh9LtnM= + + + 45KI4WIxyXfNrdtdj7C6 + + + BAAAAAABI54PryQ= + + + BJDHnthjoDRutxFRJPFnixbU + + + CeFU2w== + + + APB/jQRgyP8Q + + + KjoVfZ3by6+pL8fssyfM6A== + + + A5oET6WBWx72ColKf0txoWyR + + + NpsJHyt3o1U47AAgw3UNXA== + + + CLc= + + + eLumDUO40KwnecZLJxFM2A== + + + eohOGeS5ZHJeptyBvCu/mQ== + + + C2tQZWb2eoQD2XC3F5JSzg== + + + fbsHfUkagQtznc3rtY1uDg== + + + CqnbFQ== + + + A/99bZCzSpexYL5y6dSryDn3 + + + WD1AyQAAAAAAJQ== + + + ByfJhw== + + + AJBQSPqrEvDE2Hz8xH39Low= + + + IyIVazG4RE9AERkb+ekH8w== + + + BydeGg== + + + Bg== + + + GA== + + + BAAAAAABHJRKMpA= + + + BAAAAAABAJmPjfQ= + + + Er0moq4zwH8ke2pYafIKdg== + + + HQ== + + + ByeLBg== + + + Eg== + + + Bydxog== + + + Pgyeh2mqlVzqI9hFntRbUQ== + + + Gd/pPu+qLnXUdvP9sW73CQ== + + + F5Bg6C237Q== + + + Ai7cBJYqBE0I9NdyoZfRrw== + + + WgAFElcDxFjoswSzjAABAAUSVw== + + + UKM/CNF2OvC4giYnAUG/Ag== + + + LzVYePklc3vH3jkk0BZr9g== + + + BYOGvG32ukb1Yxj2oKoFyw== + + + P4sUnc++hlU/bXj0zSTlcQ== + + + AKrMYlJmUUin8FOM/0TJrmk= + + + A7uy+rmTav6tDH4dRrsnvXGH + + + bqapwACCtKhVagTl7cEP7KFbM0E= + + + RUT1Gehd1KKYPfqOlgspoQ== + + + KuzHPJLdK5hNgJRo3R47Ag== + + + WJ2qHzWUqTk= + + + ATE6Xw== + + + AQAAAAQ= + + + OE4/d+p3YRzzcSl+kmZ8Mw== + + + OOkLFZaa4CXGyJlLTIEjUQ== + + + Byc85g== + + + BAAAAAABRE7wRk4= + + + BFA= + + + ByeQ9g== + + + OYBKgxEHpW/8XGAGAlvJyMA= + + + bzTw0uq05TUYEGS98bh0Ww== + + + azAcTWL+ijs= + + + OUOBG6TE0Lr+uYYGxeVbHg== + + + EEpERSryZFMagbsNw/WoWQ== + + + A4w= + + + Aw== + + + TsaDDThhoyhX10SURO3NMg== + + + CSU= + + + BAAAAAABHkSHlSo= + + + QDi5sA== + + + X3iUdzxCEtOAKpiTLsqjBA== + + + Bydp0g== + + + SrQ125q7UcLfxVKepx+lRg== + + + BAAAAAABM6d3Z0s= + + + aBXsv0oU3xqh2xkUPOi8 + + + APt5i5rs4dIIQPwZdk9/ISc= + + + CjM= + + + BAAAAAABGMG0Gmw= + + + Xmo3AIW2VHeeJoR0o09RGQ== + + + bf8hEJywo1lAp4UNcLl5Ew== + + + BAAAAAABHkSl6Co= + + + CWhp + + + YwslVqGwc9CHkaZkXNZ4xw== + + + cDggUYfwJ3A1YcdoeT6s4A== + + + CrTHPEE6AZSfI3jysin2bA== + + + U3KGm6UTqJ/nsMyteiUa2g== + + + OIJdAvYxHmLb6YaaMmwmjg== + + + ATE3ew== + + + BAAAAAABL07hTcY= + + + E5I2y6sIonl4a+TmlXc7fw== + + + VBSf+IncsTB3RZS4KFCJPQ== + + + DA== + + + YR0zGQAAAAAAAw== + + + dSBsq/te0hzZauKHgJ3EWg== + + + UVKsEezpGWOVQ4W9esstng== + + + Ikdj3zYXXGsC/Afm9Tvx+g== + + + BAAAAAABHkSl6mw= + + + QDi5sQ== + + + BAAAAAABCUVQ9No= + + + U4P1tUoxl/XkztlVHdtdgw== + + + AIQ8dLGqNIaxxMeg31W16Q== + + + TqfXw+FkhxfVgE9GVMgjWQ== + + + YRJNfMoc12IpmW+Enpv3Pdo= + + + Byd/Tg== + + + AjpW + + + DL8= + + + A8wZnhfuY6VIV1SwGsTGNR7L + + + A+RCQYwhofmXM+/hxdyoUzkI + + + OUvvVscW0/NltofkmV9qmg== + + + Cf0103tCm9oulH1QK0weTA== + + + EDQMI0tR4kSntv1O37N10g== + + + WX89jn8yGZVvoKTD9jDfRQ== + + + U+1Y1QpJc0FOR5JdCJ01gQ== + + + ATk= + + + ESISuBo/wdW2tBztKmHdFCFz + + + Byd/UA== + + + NMpMcEnex3eXx4ohk9glcQ== + + + A7T0V6o47rgCKl3oUb7jF2Ph + + + F6QlB/yX+A== + + + CgFBQgAAAUFcf/EVAAAAAg== + + + LizeWXFWP5pZPI/dLc+PVQ== + + + TrKEMhb2PKktH8lHg0AV5A== + + + AuhvPsYZfVP6UDsuyjeZ4Q== + + + BAAAAAABJ/ufRdg= + + + FJl6tXgNpSg= + + + BAAAAAABIBnBjWg= + + + AL691kTvkemG9UQNa6McQg8= + + + OeKv0wi+ATDxfQ6CWir1vA== + + + F5BhE0zbgQ== + + + VLm3Xe60+1YgPpXCGtXLng== + + + Qh/O5w== + + + Bycfmw== + + + VP3bQF/UdNfxq/UOypU1zQ== + + + BAAAAAABQaHhPSY= + + + QAAnEQ== + + + A4g= + + + A3ZQibPGSZ8nPVbuccaCvUfa + + + BAAAAAABJZbEU4I= + + + BycfpA== + + + BHT6CK6B569m/dd5dEluBOEd + + + Ew1ee9Jq7Q/Dig3ACF4V6Q== + + + ORFgmCj072NjcJnrxOMfQA== + + + Aj/CJN2QWZAF25GXPXADOA== + + + WU+jmMhGAumhewqVKrZBmg== + + + HxT1XSjIpzjMprp9Qu1gYQ== + + + BAAAAAABL07hUBg= + + + BAAAAAABL07hRxA= + + + ESDYXNBhF+dePFjojs7u2vj1 + + + Cfk9qg== + + + BydInw== + + + d8ToN4Dfs5RqD2yfAp12yQ== + + + F7PAjw2k0dTX5escPnyVOBo= + + + DoP7aSdEs/3y+o2Gj9zgWA== + + + Aa8e+91erglSMgsk/mtVaA== + + + fqRDfSf8haCEh2nWE6O+bA== + + + ByeBQg== + + + BAAAAAABAPpuVh0= + + + A/kVDQpE7c9h+WxlWQFzSQ== + + + Byc68g== + + + RmI44ARDVCUOgXNK9ACAbg== + + + GN2Hrh9LtnY= + + + APdCebq8ZyZr/T0luxlicNw= + + + B2VhZAPxCDH3s9Mkbu3HfQ== + + + OfJBIhFwAdQ= + + + YUlF+VXF2FWFqCo472HfZlw= + + + A7GX+szdK8/7Kf0xUuarfyIN + + + BAAAAAABF2Tb8Bc= + + + IA== + + + GN2Hrh9LtnE= + + + UT6GtTGbEC6SXJteWAKy2g== + + + P6G7IYSL2RZxtzTh8I6qPA== + + + TasC8Zd8BT8kXEE67cFQmA== + + + YR3YYQAAAAAABA== + + + GN2Hrh9LtnQ= + + + ByfNeA== + + + VIFPnH3Io2OmF0J5KK8gzA== + + + D/VlGqmz9Nai1ywCydT/RQ== + + + GTPOETOFf5mIsbuzrojGfw== + + + M64Z5ufZzDRVTHkJR1uXzw== + + + Byd/Tw== + + + WfPUsnnSF04ShWVYEa/KRA== + + + XbPH0u4MjoIrWzN8QCilfg== + + + LdbnCbsA9sOgI4mkUpWXPw== + + + AINVG9I4T2jgQgW4N9SNhw== + + + e7wSpVxmgAS5/ioLi2iBIA== + + + Byemag== + + + AxPlMqxkByCn3XNuYMhYNMcp + + + cXXMzbWDHMIdCotb3h64yw== + + + E/YGRk12iZqZuMfsIiVaeg== + + + Bye2Cg== + + + AJiWmg== + + + BAAAAAABJpQ0AbA= + + + acI1CFIgmwSFBoU5+ahDgg== + + + BAAAAAABL07hXdQ= + + + CuUEKEJM4xhxlFXraPcSpQ== + + + CgFBQQAAATjkOB1sAAAAAg== + + + QOu0a5Z9rCkw6Nk7Rg1/AQ== + + + ByfNbw== + + + ElBUYv/f+6+gnbAJ23qnAA== + + + a9rf7/BmG9JkKvRuy7J5QA== + + + QM1zZ4GZ4gfwpQtUYye3Ne0= + + + XOZMbPKQuJEw8Ib5neDVpQ== + + + M0VSOewW3WI= + + + CcHC/g== + + + Xbevr3ut3Z9m1GuXC9SonA== + + + BAAAAAABKUXDqxw= + + + A3TWA5Aylxw0x8bVvrmUSNJd + + + A3UNTBOHUkbq+k999nJeSJdF + + + QZBvapTZFvmYktEPsBYLQQ== + + + fMTRbGCp280pnyE/u53zbA== + + + ANX8SnNRxCmsE/GCl5hw+8A= + + + RFlmmjulj6Ve7PfBi44nnw== + + + XJ8pGvGNM9RIcLUG9YQjLQ== + + + DYifRdP6aQQ8MLbXZY2f5g== + + + CqL7CA== + + + UKKK5ol/rKBZchAAOnZjaA== + + + KUZMXOUj2sdY2i2Rfgp/5Q== + + + BAAAAAABLM/7qjk= + + + HNo1DR4XCe4mS1iUMsY6Wg== + + + AeNmeF8oVpDp/4GPvA== + + + UN78HLEKf7W9vQYkzYpJnw== + + + UdNjvA== + + + Os2rnHWYhryvdOXfgan06A== + + + OhrtngFwotLcm4i+z00SjA== + + + ANU= + + + BGU= + + + fZ10MyCe51jAjZCsDgqaxA== + + + CcL+EA== + + + BAAAAAABJQcQRNU= + + + HVRikKXRQ1ouhOpYcOna/A== + + + TA5iEg== + + + e0bEFhI16xx9U1yvlI56rA== + + + JGKKnm00uOQ= + + + L1fHogsVxmfMBka5q4uzaQ== + + + HA== + + + AJiU+bpWh2Uc4xFRf8GM9yA= + + + UV9aaDeNRNtQuXjRYk4Skhg= + + + RdHgEmEIjdyRFWDRRlk= + + + JjjcXrfGjTCi1ug/AEeYlg== + + + AQw= + + + JLLEdDl2iHqqyenVWwQ/XA== + + + FJl6tXgNpSk= + + + TbPyD9NnsEcxyK6LIsr78g== + + + BAAAAAAA+X/GIyk= + + + ESDItX4ruWiLnrlz0rk4/bmz + + + GN2Hrh9LtnI= + + + BAAAAAABJ/ufQg8= + + + QZCrvQ== + + + BAAAAAABMrS7t2g= + + + QjiuX0y1agXQQqmDB2yh3w== + + + LTRcDHabRHU= + + + AUa47POQ1dN5 + + + JLiDzgpL7oFNgJN+jIjt7w== + + + Mq0P6o03FDk0B2bnJ+mYPGo= + + + ESAyW/JX3+hZIp44EAMlXU2b + + + Bydvrw== + + + Aw== + + + UfM8pWkcmmLGRiGIVydmoA== + + + GN2Hrh9Ltms= + + + AyYMguSo1my449OZq51C3s3Z + + + Qh/QbQ== + + + B8f7CHJUqV3VareLPE+2kA== + + + DA== + + + ZECgRdZEsns= + + + AQAAAAM= + + + UUFV3S2cUidOOv7ESN65Ng== + + + Bydr0Q== + + + GdXz4L1b6FKNCMG9Jz2tjA== + + + BAAAAAABMxvC9bk= + + + EkoaKijVTGVYI5c604iweg== + + + TAA2G+UIK6mqznQKBT77NA== + + + RvCM2iRdkCE82ZOO2dU= + + + GskXrIFkzLS+4yohQM9EUA== + + + ESCyHU+xOECnh9Rf2IvgR8zS + + + ESByNJZ5TPjg9iZyL6a/h5Zx + + + AaoZYg== + + + DNHqTQd9QC+JnMy6AWyhkg== + + + fwAAAQAAAUrz/HmrAAAAAg== + + + BAAAAAABHkSl5AQ= + + + ByemaQ== + + + K1ftto7Xcb0YKwQ6uMvOIA== + + + AIZ6Wq/4deFQzwC6NnFpUA== + + + AOfHzdPzlvw5 + + + BA== + + + L7tgs/W85vnhV7I7qJ6N/g== + + + Qh/SqA== + + + Byd/UQ== + + + A9GPKQ8jv9oIxfwiOy7qxQ== + + + GtXUVojhwOTkaQ4bTKblEQ== + + + BAAAAAABIg08FMU= + + + Byd/Ug== + + + BOPwjyn5eqfeoxs7Z0y3vqNN + + + VNb2Hjai/t7dmCtOzRXXew== + + + BKobzjrOxa/6kCR0ImKoqaQW + + + HGD2RtvXMaPDqHIPLdXocw== + + + ARQ= + + + AQAAAAA= + + + BA== + + + COwoDFvz7GD8R2K7Lo0rYQ== + + + VN2yeFexyXjPf34fHGmbhg== + + + R4af5A== + + + BAAAAAABLF5/HXY= + + + Hnms0W0OxHSYE2F0XE97sw== + + + BAAAAAABBHYoIFs= + + + BUE= + + + D/wZ7+m1Mv8SONSEFcs73w== + + + Byeaqw== + + + Ermwxw== + + + em/HTY01Cvv6ITgkH+ftlg== + + + ESBrHE7sFC7CQ8EM681xA3CY + + + Rea7UUYH3jl33BryPIo= + + + eR1nUEz8k+nDSBD+bb5uIQ== + + + Ermwtg== + + + LAVIFm0MWZYH+Sv8Vf+IqkM= + + + RkNUwM80Jt7beb4ek+iI8w== + + + STMAeg== + + + Byd5cg== + + + NvEJoRYL2yvAZrAjbDIipQ== + + + QDi5rw== + + + bAOrKSMsmA0MLJyAJ5BRsUM= + + + MABJTA== + + + AklaZYwhC9k= + + + BydCwg== + + + BOc11keA9WJ9R20XQY8hO7yi + + + WgAFElbyxxPA8BdM4gABAAUSVg== + + + Cw== + + + ANUANvVYN7xqAISA9rvJPzQ= + + + QFLH3Zrq+I5WQ6TlWzfUxA== + + + XLhHIg7vP+tWfRqvuKeAxw== + + + AOVojQRgyPca + + + BAAAAAABJQdAjik= + + + JpUvYJyWjdGmeoH7YcYunw== + + + TA6EVg== + + + ByeekA== + + + BAAAAAABHJRKNmk= + + + CeagHQ== + + + RH7WhshwXRK6f0VfOfjXgQ== + + + BAAAAAABJQcQQN0= + + + OnvXX72mvUI2Id/NMzegmg== + + + AjqK + + + DAk9hy8DhHSo+aQetvPB/fY= + + + ESD9YhzIEOwiOT7Nwip+E1KI + + + BXA= + + + By7fBTreouRwX/qrpgSUsg== + + + CSY= + + + LJ8wKbrQXgT8VExZ6vEfWA== + + + F5Bg/C8eXg== + + + J2La+q+JOURNWkX60OP2lQ== + + + R/j2qA== + + + AIQ8dLGqNIaxxMeg31W16Q== + + + A/7DHCczBnP5qUVh0jF2pvwB + + + GN2Hrh9Ltmw= + + + DA== + + + CdWFNw== + + + BAAAAAABElatX7I= + + + X4C5SJIG0BDeJvpQq4ngCw== + + + ESC8DawWRiAyEMd38UXbfgPR + + + Ah69dEvrzT4= + + + BAAAAAABK84ykc0= + + + BAAAAAABHkSHki0= + + + e9JTGBe45yw= + + + AQAAAAI= + + + O2S99lVUxErLSk56GvWRv+E= + + + ODTGURr0vY14WkIt15hHrg== + + + OqQ2rV0ISTc308Z/oQgzFw== + + + RXJFI0h6EJY= + + + Aw1SPC56593ZCZ9vCNHKwQ== + + + BycpYA== + + + FK+rVRFA0o0PnW+X6V60gQ== + + + RMgdRGEBv0KzFCjgGFp0Hg== + + + JD1wxDd8IgmiqX7MyPPg1g== + + + BAAAAAABQaHhNLo= + + + AwBGo0Zmp6KRryAguuMvXATI + + + AJk3QFH13eHUHHVnsvwS0Vo= + + + U3t2Vk8pfxTcaUPpIq0seQ== + + + bx/XHJqcwxDOptxJ2lh5vw== + + + LU4d0t7PAsZNgJGZcb+o/w== + + + c0ENPRDbRozjU83garZrdA== + + + LnfcUaXG/pxV2CpXM5+YSg== + + + EgtJ1f+/tZwlGfg0Uu7XCQ== + + + sPNcCSE9Nkg3jy5IN1xe2Q== + + + BAAAAAABCfhiO+s= + + + Ajp+ + + + RbG+tfPUe/vBRfTZF54i8g== + + + cFbYT3bxd1sAAAAAUdNX8A== + + + ZgwfEqZnBsUNvNuZ77FbQA== + + + Iqpyf/YoGgvHc8HiDAxAI8o= + + + f43O9TualR8= + + + OgxXyntHYBXnPAHDxY0OXg== + + + BOIIipysxAz5xHIMmFRvYchY + + + Jq6jgeApiT9O4W2Tx/NTRQ== + + + SeEzbpTltqUtqW7UiuJ2 + + + Iw== + + + ANygrItIJ2rcKlyS3Lue07U= + + + ARU= + + + ATFpsA== + + + IHj3eiEK3K1Xrpu1uvtBuvE= + + + cpqpXVWPk5AXzGw+zNIcBw== + + + ESCEUbthDurBjJw0/h/FfuNY + + + AI7cApIcPA3cfSpQMf40onQ= + + + BAAAAAABQaHhOT4= + + + VUtahOwvvmJFwlvmGDZP5w== + + + GN2Hrh9Ltm0= + + + BAAAAAABFUtaxac= + + + MWzraR3LLhU9m/qKEhvVLQ== + + + KvQ5AzK6tQy8eBy7NAD/lQ== + + + APiyCXmwAUq+95DYa3DmGw== + + + Ax6Jm7ajV49tqHgf9nYnzRCI + + + AygWP2Fgd2T+iLbmAlKT6g== + + + dUIqmrcgq/261bRbo7fM1g== + + + BWuckD4dPHZYW5ThBsl+aQ== + + + BydSYg== + + + ByfHkw== + + + CMNfzETd7XxesS9FOUj9Mg== + + + VfTSum25nb65YPlpuhJAvg== + + + RqFXxGPuA18= + + + UW3oKZKTDsrPy/rfwmGNaQ== + + + QAEy3RIAAAAAAAAMweH5dw== + + + E77H6yvyFQjO0PcN3x0H+Q== + + + A3WVy2V+2VFkWtMvA6HFwnhq + + + B+U= + + + KRfQOuBdOSpEmAxSpDZGZg== + + + Cbssdw== + + + JV/LVzSKI/wsDgg3UuZHlA== + + + GN2Hrh9LtnA= + + + BOncXh7IZp1SNydhtUdyh2O2 + + + cx0HrIEQg8JHWTP7DzOxSQ== + + + A8aDg1/IA4O8gjMPZHVqPI+w + + + Fw== + + + Gz4uHrL2usrTZrPCHeuF5g== + + + UWMOvf4tj/x5cQN2PXVSww== + + + NlLRZJFLco/An3cLAGjGgQ== + + + e/fIfg2Dj2tkYIWVu2r82Cc= + + + UMUwXwT1Z4juyQ/CNTf4mw== + + + d8AtKymQwkOPDBj+hjPzFg== + + + fa9agGguMHfBorMTXXMd9g== + + + IIxFSyNM6mWtCgTG0IL3Og== + + + Ajp/ + + + RVWTeb5EKqE7cy7MUD2oJ3M= + + + UoRGnb96CUDTxIqVry6LBg== + + + F5Bg+EziQQ== + + + ATE0vw== + + + APB/jQRgyPca + + + TXxtAQ== + + + CskruA== + + + Ig== + + + U3SgRR3J+D6575WuCxuXeQ== + + + Cd/dug== + + + WW8OCQ== + + + SdegFrLaFTCsoMAW5ED+zA== + + + EAdmaA== + + + CgFBQQAAATjtdPY5AAAAAg== + + + BLlQHJ611eOZuedFrFgVAfAs + + + EQ== + + + BAAAAAABGMGjftY= + + + A1V4dX0tTb1rdTZxdWcuZ7YR + + + AOVojQRgyPcY + + + BAAAAAABHkSHjz8= + + + BUrYjru5px1ym4QUN33TOQ== + + + RurwlgVMxeP6Zepun0LGZA== + + + SurdtfsuPcXXDpY2LkBpYO6BT7o= + + + ALxyZmb/WL/wAuUiPK5oK/g= + + + AxW0+uDsfyCSfhECdsGGpVD8 + + + BydIoA== + + + dhjnNtYx6cojdAE55TgIBA== + + + A9BRwOwbXRRhCe+kcmglgW3z + + + BHk= + + + EYfoVrySx7V3OUqs4xKvgA== + + + EqthLKdUgwI= + + + J8mznxvTvOR5p4Br3a3sm5j5iM0= + + + a9HDb1beqQYmkvFH0qExcg== + + + BydKkg== + + + OGPFrg== + + + FNISyWWTGi5Yco6fGh58/A== + + + BAAAAAABA/A35EU= + + + QZCrvA== + + + BAAAAAABEAuMoRs= + + + A0BOaf9UbJxzqBudSyes/cEM + + + BQ== + + + NTgf4iwIfeyJPIomw2dwSXEwtxQ= + + + AjqL + + + ESDu2nhlLPzfx+LYgjlYFP/k + + + buROL/l2GuXISv+/JVLkdA== + + + CqZgEvHAsnzkT//QV9KjXw== + + + HwAABsvzDP+DIzUG6QAAAAAGyw== + + + HZyLf+K70FKc+jomm8DiDw== + + + Ew== + + + IARKrBjlKQLyVGA4X52L7w== + + + BAAAAAABKUXDqA8= + + + Qh/SnQ== + + + BDV89QWZE9MJYlCpFQUv5Y2W + + + Xrr31RF0DoIzMKXS6XtD+g== + + + D4dSwi4udjGtMftKLTSFyg== + + + BAAAAAABCFiEp9s= + + + PAdKZPiaac2CvPxbOrsHOw== + + + GuJ0aGBYhChXAOljooJZ3A== + + + BPVqx4UbKVAbJSFTKwrcFryU + + + UbQGvw== + + + AQAAAAU= + + + Cfk9lw== + + + AIChpbGNqu4XKp9J70syKEs= + + + cJ+vg4742XhNgJW2ot9eIg== + + + N4XreFRrqFQ= + + + Cyr1PA== + + + Gg== + + + BKrxi2/1iFxHEFzyZvegxq5C + + + H08= + + + BAAAAAABKB/OGqI= + + + Rvm2CEw2IC2Mu/ax0A46QQ== + + + ByfFnw== + + + F5BhENPfVw== + + + GN2Hrh9Ltm4= + + + ESJJweWBPhoXAaB9c8SHwI4O + + + VOcIuNbTqkpOMUyI108FOg== + + + RnQ3dYovwvB0D5q2YGY= + + + CGo/+42e75JBJ2JcOEaMFw== + + + Eg== + + + UDE/uwr4z5V8eZI4+1gkAw== + + + ezdAeCxKH7BFs7vn3byYaw== + + + AZ0= + + + CcHC1w== + + + BEeJFwO0nu759EPo9tKluw== + + + BAAAAAABK84yjs8= + + + DjIvBkX+ECVbB/C3i6w2Gg== + + + ESCC9oPNcRdPOox+SjWm9dTX + + + O2Qh+qhbBRuZA11yDhcLGQ== + + + UU3AP1SMxmyhBFq7MRFZmf0= + + + BAAAAAABHhw1vwc= + + + BAAAAAABIg08D3U= + + + A8LV4zckxcwdttbQSk0EPnoA + + + D9UltDPl4XVfSSqQOvdiwQ== + + + Ermw0Q== + + + fWK0j/Vi8vNWg3VAGjc02w== + + + ESCLRVuhcUZaluIgIVlRJx+O + + + ATE5Ig== + + + Aw== + + + BAAAAAABL07hSVI= + + + Q1r0dRkkG9miuHj/Y52izw== + + + YNOos6YJoPC77qwSGCpb7w== + + + DHmmaw== + + + STMAFQ== + + + Nbc68Q8EHza72P/hSWcddw== + + + Bw== + + + dItWlz2V62Philqj9m6Pbg== + + + AN9bfYOvlR1t + + + EA== + + + frj5jTuqBnQ4fljPvVU3KA== + + + PbXdgANzAyCOCZ5qa/7E6A== + + + ByembA== + + + LYTXWk7gMu8= + + + ATFEdg== + + + RnQ3dg5KdDZs0nyFZk4= + + + BwImeaRkSZQLYwFREwKo3R1Jn+8= + + + PmDn14AwWY28IlJeBXkDvA== + + + BONHqLIx/ibQE08IQIyoGaXg + + + ESCis569omrbb20yySF39+aE + + + ATE6YA== + + + XhcFm2g619rt8Sro+a4rHA== + + + BAAAAAABL07hW2M= + + + ESBqoILo90ntDW7OTK43MS2F + + + BYyEX2b5+K+myAIR7eXaRQ== + + + A7RCxMe1S9Hb7ENzRxl0mxGP + + + BAAAAAABLF5/Gog= + + + TA6BjA== + + + BAAAAAABMYnGRuw= + + + a2GKnRbYMZ0oZkRzJE8NIw== + + + Eg== + + + G8sz+bm+vQjTpQNBh5CfMg== + + + EM8bDLBnnoYe4LnWpLIhS4esr3I= + + + Cfk9oA== + + + Sx51x7V8pYe8rp7PMP/3qg== + + + FQ== + + + BAAAAAABHkSl7L4= + + + BydiAg== + + + Cj0= + + + AyjNQ4dnGD3FD6WL5gYrYru7 + + + BAAAAAABHkSl5ao= + + + MABJSw== + + + ESCVop+Q4/OBgtf4WJkr01Gh + + + eViJ2GX26lp5HbF+XNp1kQ== + + + ByfDtA== + + + GN2Hrh9Ltm8= + + + ANsAyDuSSs7Z83LfMZ+TDw== + + + ESByYNtAIfizf2L3NMzCH8zZ + + + QspbHxzWb41SX9TUhF1N1A== + + + KNhgX8XuJduYciIyatpOQg== + + + AImQERVYPoeb + + + GpO48aJ8GngtwECqZhm/xA== + + + CdYL9vSQCEKzBwjO10ud2w== + + + a12RvBNhznU= + + + diff --git a/browser/app/firefox.exe.manifest b/browser/app/firefox.exe.manifest new file mode 100644 index 000000000..b23c2a4c0 --- /dev/null +++ b/browser/app/firefox.exe.manifest @@ -0,0 +1,43 @@ + + + +Firefox + + + + + + + + + + + + + + + True/PM + + + + + + + + + + + + diff --git a/browser/app/macbuild/Contents/Info.plist.in b/browser/app/macbuild/Contents/Info.plist.in new file mode 100644 index 000000000..6212e886d --- /dev/null +++ b/browser/app/macbuild/Contents/Info.plist.in @@ -0,0 +1,224 @@ + + + + + CFBundleDevelopmentRegion + English + CFBundleDocumentTypes + + + CFBundleTypeExtensions + + html + htm + shtml + xht + xhtml + + CFBundleTypeIconFile + document.icns + CFBundleTypeName + HTML Document + CFBundleTypeOSTypes + + HTML + + CFBundleTypeRole + Viewer + + + CFBundleTypeExtensions + + svg + + CFBundleTypeIconFile + document.icns + CFBundleTypeMIMETypes + + image/svg+xml + + CFBundleTypeName + SVG document + CFBundleTypeOSTypes + + TEXT + + CFBundleTypeRole + Viewer + NSDocumentClass + BrowserDocument + + + CFBundleTypeExtensions + + text + txt + js + log + css + xul + rdf + + CFBundleTypeIconFile + document.icns + CFBundleTypeName + Text Document + CFBundleTypeOSTypes + + TEXT + utxt + + CFBundleTypeRole + Viewer + + + CFBundleTypeExtensions + + jpeg + jpg + png + gif + + CFBundleTypeIconFile + fileBookmark.icns + CFBundleTypeName + document.icns + CFBundleTypeOSTypes + + GIFf + JPEG + PNGf + + CFBundleTypeRole + Viewer + + + CFBundleTypeExtensions + + oga + ogg + + CFBundleTypeIconFile + document.icns + CFBundleTypeMIMETypes + + audio/ogg + + CFBundleTypeName + HTML5 Audio (Ogg) + CFBundleTypeRole + Viewer + + + CFBundleTypeExtensions + + ogv + + CFBundleTypeIconFile + document.icns + CFBundleTypeMIMETypes + + video/ogg + + CFBundleTypeName + HTML5 Video (Ogg) + CFBundleTypeRole + Viewer + + + CFBundleTypeExtensions + + webm + + CFBundleTypeIconFile + document.icns + CFBundleTypeMIMETypes + + video/webm + + CFBundleTypeName + HTML5 Video (WebM) + CFBundleTypeRole + Viewer + + + CFBundleExecutable + firefox + CFBundleGetInfoString + %MAC_APP_NAME% %APP_VERSION% + CFBundleIconFile + firefox.icns + CFBundleIdentifier + %MOZ_MACBUNDLE_ID% + CFBundleInfoDictionaryVersion + 6.0 + CFBundleName + %MAC_APP_NAME% + CFBundlePackageType + APPL + CFBundleShortVersionString + %APP_VERSION% + CFBundleSignature + MOZB + CFBundleURLTypes + + + CFBundleURLIconFile + document.icns + CFBundleURLName + http URL + CFBundleURLSchemes + + http + + + + CFBundleURLIconFile + document.icns + CFBundleURLName + https URL + CFBundleURLSchemes + + https + + + + CFBundleURLName + ftp URL + CFBundleURLSchemes + + ftp + + + + CFBundleURLName + file URL + CFBundleURLSchemes + + file + + + + CFBundleVersion + %MAC_BUNDLE_VERSION% + NSAppleScriptEnabled + + LSApplicationCategoryType + public.app-category.productivity + LSFileQuarantineEnabled + + LSMinimumSystemVersion + 10.9.0 + NSSupportsAutomaticGraphicsSwitching + + NSPrincipalClass + GeckoNSApplication + SMPrivilegedExecutables + + org.mozilla.updater + identifier "org.mozilla.updater" and ((anchor apple generic and certificate leaf[field.1.2.840.113635.100.6.1.9]) or (anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] and certificate leaf[field.1.2.840.113635.100.6.1.13] and certificate leaf[subject.OU] = "43AQ936H96")) + + NSDisablePersistence + + + diff --git a/browser/app/macbuild/Contents/MacOS-files.in b/browser/app/macbuild/Contents/MacOS-files.in new file mode 100644 index 000000000..849336bc9 --- /dev/null +++ b/browser/app/macbuild/Contents/MacOS-files.in @@ -0,0 +1,9 @@ +/*.app/*** +/*.dylib +/certutil +/firefox-bin +/gtest/*** +/pk12util +/ssltunnel +/xpcshell +/XUL diff --git a/browser/app/macbuild/Contents/Resources/English.lproj/InfoPlist.strings.in b/browser/app/macbuild/Contents/Resources/English.lproj/InfoPlist.strings.in new file mode 100644 index 000000000..74d192cb0 --- /dev/null +++ b/browser/app/macbuild/Contents/Resources/English.lproj/InfoPlist.strings.in @@ -0,0 +1,5 @@ +/* This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ + +CFBundleName = "%MAC_APP_NAME%"; diff --git a/browser/app/macversion.py b/browser/app/macversion.py new file mode 100644 index 000000000..839aac1ff --- /dev/null +++ b/browser/app/macversion.py @@ -0,0 +1,44 @@ +#!/usr/bin/python +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. + + +from optparse import OptionParser +import sys +import re + +o = OptionParser() +o.add_option("--buildid", dest="buildid") +o.add_option("--version", dest="version") + +(options, args) = o.parse_args() + +if not options.buildid: + print >>sys.stderr, "--buildid is required" + sys.exit(1) + +if not options.version: + print >>sys.stderr, "--version is required" + sys.exit(1) + +# We want to build a version number that matches the format allowed for +# CFBundleVersion (nnnnn[.nn[.nn]]). We'll incorporate both the version +# number as well as the date, so that it changes at least daily (for nightly +# builds), but also so that newly-built older versions (e.g. beta build) aren't +# considered "newer" than previously-built newer versions (e.g. a trunk nightly) + +define, MOZ_BUILDID, buildid = open(options.buildid, 'r').read().split() + +# extract only the major version (i.e. "14" from "14.0b1") +majorVersion = re.match(r'^(\d+)[^\d].*', options.version).group(1) +# last two digits of the year +twodigityear = buildid[2:4] +month = buildid[4:6] +if month[0] == '0': + month = month[1] +day = buildid[6:8] +if day[0] == '0': + day = day[1] + +print '%s.%s.%s' % (majorVersion + twodigityear, month, day) diff --git a/browser/app/module.ver b/browser/app/module.ver new file mode 100644 index 000000000..5ef8d2a02 --- /dev/null +++ b/browser/app/module.ver @@ -0,0 +1,8 @@ +WIN32_MODULE_COMPANYNAME=Mozilla Corporation +WIN32_MODULE_COPYRIGHT=©Firefox and Mozilla Developers; available under the MPL 2 license. +WIN32_MODULE_PRODUCTVERSION=@MOZ_APP_WINVERSION@ +WIN32_MODULE_PRODUCTVERSION_STRING=@MOZ_APP_VERSION@ +WIN32_MODULE_TRADEMARKS=Firefox is a Trademark of The Mozilla Foundation. +WIN32_MODULE_DESCRIPTION=@MOZ_APP_DISPLAYNAME@ +WIN32_MODULE_PRODUCTNAME=@MOZ_APP_DISPLAYNAME@ +WIN32_MODULE_NAME=@MOZ_APP_DISPLAYNAME@ diff --git a/browser/app/moz.build b/browser/app/moz.build new file mode 100644 index 000000000..520ce4425 --- /dev/null +++ b/browser/app/moz.build @@ -0,0 +1,91 @@ +# -*- Mode: python; indent-tabs-mode: nil; tab-width: 40 -*- +# vim: set filetype=python: +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. + +DIRS += ['profile/extensions'] + +GeckoProgram(CONFIG['MOZ_APP_NAME']) + +JS_PREFERENCE_PP_FILES += [ + 'profile/firefox.js', +] + +SOURCES += [ + 'nsBrowserApp.cpp', +] + +FINAL_TARGET_FILES += ['blocklist.xml'] +FINAL_TARGET_FILES.defaults.profile += ['profile/prefs.js'] +FINAL_TARGET_FILES.defaults += ['permissions'] + +DEFINES['APP_VERSION'] = CONFIG['MOZ_APP_VERSION'] + +LOCAL_INCLUDES += [ + '!/build', + '/toolkit/xre', + '/xpcom/base', + '/xpcom/build', +] + +USE_LIBS += [ + 'mozglue', +] + +if CONFIG['LIBFUZZER']: + USE_LIBS += [ 'fuzzer' ] + +if CONFIG['_MSC_VER']: + # Always enter a Windows program through wmain, whether or not we're + # a console application. + WIN32_EXE_LDFLAGS += ['-ENTRY:wmainCRTStartup'] + +if CONFIG['OS_ARCH'] == 'WINNT': + RCINCLUDE = 'splash.rc' + DEFINES['MOZ_PHOENIX'] = True + +for cdm in CONFIG['MOZ_EME_MODULES']: + DEFINES['MOZ_%s_EME' % cdm.upper()] = True + +if CONFIG['MOZ_SANDBOX'] and CONFIG['OS_ARCH'] == 'WINNT': + # For sandbox includes and the include dependencies those have + LOCAL_INCLUDES += [ + '/security/sandbox/chromium', + '/security/sandbox/chromium-shim', + ] + + USE_LIBS += [ + 'sandbox_s', + ] + + DELAYLOAD_DLLS += [ + 'winmm.dll', + 'user32.dll', + ] + +# Control the default heap size. +# This is the heap returned by GetProcessHeap(). +# As we use the CRT heap, the default size is too large and wastes VM. +# +# The default heap size is 1MB on Win32. +# The heap will grow if need be. +# +# Set it to 256k. See bug 127069. +if CONFIG['OS_ARCH'] == 'WINNT' and not CONFIG['GNU_CC']: + LDFLAGS += ['/HEAP:0x40000'] + +DISABLE_STL_WRAPPING = True + +if CONFIG['MOZ_LINKER']: + OS_LIBS += CONFIG['MOZ_ZLIB_LIBS'] + +if CONFIG['HAVE_CLOCK_MONOTONIC']: + OS_LIBS += CONFIG['REALTIME_LIBS'] + +if CONFIG['MOZ_GPSD']: + DEFINES['MOZ_GPSD'] = True + +for icon in ('firefox', 'document', 'newwindow', 'newtab', 'pbmode'): + DEFINES[icon.upper() + '_ICO'] = '"%s/dist/branding/%s.ico"' % ( + TOPOBJDIR, icon) diff --git a/browser/app/nsBrowserApp.cpp b/browser/app/nsBrowserApp.cpp new file mode 100644 index 000000000..981e2f14c --- /dev/null +++ b/browser/app/nsBrowserApp.cpp @@ -0,0 +1,429 @@ +/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ +/* This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ + +#include "nsXULAppAPI.h" +#include "mozilla/AppData.h" +#include "application.ini.h" +#include "nsXPCOMGlue.h" +#if defined(XP_WIN) +#include +#include +#elif defined(XP_UNIX) +#include +#include +#endif + +#include +#include +#include + +#include "nsCOMPtr.h" +#include "nsIFile.h" +#include "nsStringGlue.h" + +#ifdef XP_WIN +#ifdef MOZ_ASAN +// ASAN requires firefox.exe to be built with -MD, and it's OK if we don't +// support Windows XP SP2 in ASAN builds. +#define XRE_DONT_SUPPORT_XPSP2 +#endif +#define XRE_WANT_ENVIRON +#define strcasecmp _stricmp +#ifdef MOZ_SANDBOX +#include "mozilla/sandboxing/SandboxInitialization.h" +#endif +#endif +#include "BinaryPath.h" + +#include "nsXPCOMPrivate.h" // for MAXPATHLEN and XPCOM_DLL + +#include "mozilla/Sprintf.h" +#include "mozilla/Telemetry.h" +#include "mozilla/WindowsDllBlocklist.h" + +#if !defined(MOZ_WIDGET_COCOA) && !defined(MOZ_WIDGET_ANDROID) \ + && !(defined(XP_LINUX) && defined(MOZ_SANDBOX)) +#define MOZ_BROWSER_CAN_BE_CONTENTPROC +#include "../../ipc/contentproc/plugin-container.cpp" +#endif + +using namespace mozilla; + +#ifdef XP_MACOSX +#define kOSXResourcesFolder "Resources" +#endif +#define kDesktopFolder "browser" + +static void Output(const char *fmt, ... ) +{ + va_list ap; + va_start(ap, fmt); + +#ifndef XP_WIN + vfprintf(stderr, fmt, ap); +#else + char msg[2048]; + vsnprintf_s(msg, _countof(msg), _TRUNCATE, fmt, ap); + + wchar_t wide_msg[2048]; + MultiByteToWideChar(CP_UTF8, + 0, + msg, + -1, + wide_msg, + _countof(wide_msg)); +#if MOZ_WINCONSOLE + fwprintf_s(stderr, wide_msg); +#else + // Linking user32 at load-time interferes with the DLL blocklist (bug 932100). + // This is a rare codepath, so we can load user32 at run-time instead. + HMODULE user32 = LoadLibraryW(L"user32.dll"); + if (user32) { + decltype(MessageBoxW)* messageBoxW = + (decltype(MessageBoxW)*) GetProcAddress(user32, "MessageBoxW"); + if (messageBoxW) { + messageBoxW(nullptr, wide_msg, L"Firefox", MB_OK + | MB_ICONERROR + | MB_SETFOREGROUND); + } + FreeLibrary(user32); + } +#endif +#endif + + va_end(ap); +} + +/** + * Return true if |arg| matches the given argument name. + */ +static bool IsArg(const char* arg, const char* s) +{ + if (*arg == '-') + { + if (*++arg == '-') + ++arg; + return !strcasecmp(arg, s); + } + +#if defined(XP_WIN) + if (*arg == '/') + return !strcasecmp(++arg, s); +#endif + + return false; +} + +XRE_GetFileFromPathType XRE_GetFileFromPath; +XRE_CreateAppDataType XRE_CreateAppData; +XRE_FreeAppDataType XRE_FreeAppData; +XRE_TelemetryAccumulateType XRE_TelemetryAccumulate; +XRE_StartupTimelineRecordType XRE_StartupTimelineRecord; +XRE_mainType XRE_main; +XRE_StopLateWriteChecksType XRE_StopLateWriteChecks; +XRE_XPCShellMainType XRE_XPCShellMain; +XRE_GetProcessTypeType XRE_GetProcessType; +XRE_SetProcessTypeType XRE_SetProcessType; +XRE_InitChildProcessType XRE_InitChildProcess; +XRE_EnableSameExecutableForContentProcType XRE_EnableSameExecutableForContentProc; +#ifdef LIBFUZZER +XRE_LibFuzzerSetMainType XRE_LibFuzzerSetMain; +XRE_LibFuzzerGetFuncsType XRE_LibFuzzerGetFuncs; +#endif + +static const nsDynamicFunctionLoad kXULFuncs[] = { + { "XRE_GetFileFromPath", (NSFuncPtr*) &XRE_GetFileFromPath }, + { "XRE_CreateAppData", (NSFuncPtr*) &XRE_CreateAppData }, + { "XRE_FreeAppData", (NSFuncPtr*) &XRE_FreeAppData }, + { "XRE_TelemetryAccumulate", (NSFuncPtr*) &XRE_TelemetryAccumulate }, + { "XRE_StartupTimelineRecord", (NSFuncPtr*) &XRE_StartupTimelineRecord }, + { "XRE_main", (NSFuncPtr*) &XRE_main }, + { "XRE_StopLateWriteChecks", (NSFuncPtr*) &XRE_StopLateWriteChecks }, + { "XRE_XPCShellMain", (NSFuncPtr*) &XRE_XPCShellMain }, + { "XRE_GetProcessType", (NSFuncPtr*) &XRE_GetProcessType }, + { "XRE_SetProcessType", (NSFuncPtr*) &XRE_SetProcessType }, + { "XRE_InitChildProcess", (NSFuncPtr*) &XRE_InitChildProcess }, + { "XRE_EnableSameExecutableForContentProc", (NSFuncPtr*) &XRE_EnableSameExecutableForContentProc }, +#ifdef LIBFUZZER + { "XRE_LibFuzzerSetMain", (NSFuncPtr*) &XRE_LibFuzzerSetMain }, + { "XRE_LibFuzzerGetFuncs", (NSFuncPtr*) &XRE_LibFuzzerGetFuncs }, +#endif + { nullptr, nullptr } +}; + +#ifdef LIBFUZZER +int libfuzzer_main(int argc, char **argv); + +/* This wrapper is used by the libFuzzer main to call into libxul */ + +void libFuzzerGetFuncs(const char* moduleName, LibFuzzerInitFunc* initFunc, + LibFuzzerTestingFunc* testingFunc) { + return XRE_LibFuzzerGetFuncs(moduleName, initFunc, testingFunc); +} +#endif + +static int do_main(int argc, char* argv[], char* envp[], nsIFile *xreDirectory) +{ + nsCOMPtr appini; + nsresult rv; + uint32_t mainFlags = 0; + + // Allow firefox.exe to launch XULRunner apps via -app + // Note that -app must be the *first* argument. + const char *appDataFile = getenv("XUL_APP_FILE"); + if (appDataFile && *appDataFile) { + rv = XRE_GetFileFromPath(appDataFile, getter_AddRefs(appini)); + if (NS_FAILED(rv)) { + Output("Invalid path found: '%s'", appDataFile); + return 255; + } + } + else if (argc > 1 && IsArg(argv[1], "app")) { + if (argc == 2) { + Output("Incorrect number of arguments passed to -app"); + return 255; + } + + rv = XRE_GetFileFromPath(argv[2], getter_AddRefs(appini)); + if (NS_FAILED(rv)) { + Output("application.ini path not recognized: '%s'", argv[2]); + return 255; + } + + char appEnv[MAXPATHLEN]; + SprintfLiteral(appEnv, "XUL_APP_FILE=%s", argv[2]); + if (putenv(strdup(appEnv))) { + Output("Couldn't set %s.\n", appEnv); + return 255; + } + argv[2] = argv[0]; + argv += 2; + argc -= 2; + } else if (argc > 1 && IsArg(argv[1], "xpcshell")) { + for (int i = 1; i < argc; i++) { + argv[i] = argv[i + 1]; + } + + XREShellData shellData; +#if defined(XP_WIN) && defined(MOZ_SANDBOX) + shellData.sandboxBrokerServices = + sandboxing::GetInitializedBrokerServices(); +#endif + + return XRE_XPCShellMain(--argc, argv, envp, &shellData); + } + + if (appini) { + nsXREAppData *appData; + rv = XRE_CreateAppData(appini, &appData); + if (NS_FAILED(rv)) { + Output("Couldn't read application.ini"); + return 255; + } +#if defined(HAS_DLL_BLOCKLIST) + // The dll blocklist operates in the exe vs. xullib. Pass a flag to + // xullib so automated tests can check the result once the browser + // is up and running. + appData->flags |= + DllBlocklist_CheckStatus() ? NS_XRE_DLL_BLOCKLIST_ENABLED : 0; +#endif + // xreDirectory already has a refcount from NS_NewLocalFile + appData->xreDirectory = xreDirectory; + int result = XRE_main(argc, argv, appData, mainFlags); + XRE_FreeAppData(appData); + return result; + } + + ScopedAppData appData(&sAppData); + nsCOMPtr exeFile; + rv = mozilla::BinaryPath::GetFile(argv[0], getter_AddRefs(exeFile)); + if (NS_FAILED(rv)) { + Output("Couldn't find the application directory.\n"); + return 255; + } + + nsCOMPtr greDir; + exeFile->GetParent(getter_AddRefs(greDir)); +#ifdef XP_MACOSX + greDir->SetNativeLeafName(NS_LITERAL_CSTRING(kOSXResourcesFolder)); +#endif + nsCOMPtr appSubdir; + greDir->Clone(getter_AddRefs(appSubdir)); + appSubdir->Append(NS_LITERAL_STRING(kDesktopFolder)); + + SetStrongPtr(appData.directory, static_cast(appSubdir.get())); + // xreDirectory already has a refcount from NS_NewLocalFile + appData.xreDirectory = xreDirectory; + +#if defined(HAS_DLL_BLOCKLIST) + appData.flags |= + DllBlocklist_CheckStatus() ? NS_XRE_DLL_BLOCKLIST_ENABLED : 0; +#endif + +#if defined(XP_WIN) && defined(MOZ_SANDBOX) + sandbox::BrokerServices* brokerServices = + sandboxing::GetInitializedBrokerServices(); +#if defined(MOZ_CONTENT_SANDBOX) + if (!brokerServices) { + Output("Couldn't initialize the broker services.\n"); + return 255; + } +#endif + appData.sandboxBrokerServices = brokerServices; +#endif + +#ifdef LIBFUZZER + if (getenv("LIBFUZZER")) + XRE_LibFuzzerSetMain(argc, argv, libfuzzer_main); +#endif + + return XRE_main(argc, argv, &appData, mainFlags); +} + +static bool +FileExists(const char *path) +{ +#ifdef XP_WIN + wchar_t wideDir[MAX_PATH]; + MultiByteToWideChar(CP_UTF8, 0, path, -1, wideDir, MAX_PATH); + DWORD fileAttrs = GetFileAttributesW(wideDir); + return fileAttrs != INVALID_FILE_ATTRIBUTES; +#else + return access(path, R_OK) == 0; +#endif +} + +static nsresult +InitXPCOMGlue(const char *argv0, nsIFile **xreDirectory) +{ + char exePath[MAXPATHLEN]; + + nsresult rv = mozilla::BinaryPath::Get(argv0, exePath); + if (NS_FAILED(rv)) { + Output("Couldn't find the application directory.\n"); + return rv; + } + + char *lastSlash = strrchr(exePath, XPCOM_FILE_PATH_SEPARATOR[0]); + if (!lastSlash || + (size_t(lastSlash - exePath) > MAXPATHLEN - sizeof(XPCOM_DLL) - 1)) + return NS_ERROR_FAILURE; + + strcpy(lastSlash + 1, XPCOM_DLL); + + if (!FileExists(exePath)) { + Output("Could not find the Mozilla runtime.\n"); + return NS_ERROR_FAILURE; + } + + // We do this because of data in bug 771745 + XPCOMGlueEnablePreload(); + + rv = XPCOMGlueStartup(exePath); + if (NS_FAILED(rv)) { + Output("Couldn't load XPCOM.\n"); + return rv; + } + + rv = XPCOMGlueLoadXULFunctions(kXULFuncs); + if (NS_FAILED(rv)) { + Output("Couldn't load XRE functions.\n"); + return rv; + } + + // This will set this thread as the main thread. + NS_LogInit(); + + if (xreDirectory) { + // chop XPCOM_DLL off exePath + *lastSlash = '\0'; +#ifdef XP_MACOSX + lastSlash = strrchr(exePath, XPCOM_FILE_PATH_SEPARATOR[0]); + strcpy(lastSlash + 1, kOSXResourcesFolder); +#endif +#ifdef XP_WIN + rv = NS_NewLocalFile(NS_ConvertUTF8toUTF16(exePath), false, + xreDirectory); +#else + rv = NS_NewNativeLocalFile(nsDependentCString(exePath), false, + xreDirectory); +#endif + } + + return rv; +} + +int main(int argc, char* argv[], char* envp[]) +{ + mozilla::TimeStamp start = mozilla::TimeStamp::Now(); + +#ifdef HAS_DLL_BLOCKLIST + DllBlocklist_Initialize(); + +#ifdef DEBUG + // In order to be effective against AppInit DLLs, the blocklist must be + // initialized before user32.dll is loaded into the process (bug 932100). + if (GetModuleHandleA("user32.dll")) { + fprintf(stderr, "DLL blocklist was unable to intercept AppInit DLLs.\n"); + } +#endif +#endif + +#ifdef MOZ_BROWSER_CAN_BE_CONTENTPROC + // We are launching as a content process, delegate to the appropriate + // main + if (argc > 1 && IsArg(argv[1], "contentproc")) { +#if defined(XP_WIN) && defined(MOZ_SANDBOX) + // We need to initialize the sandbox TargetServices before InitXPCOMGlue + // because we might need the sandbox broker to give access to some files. + if (IsSandboxedProcess() && !sandboxing::GetInitializedTargetServices()) { + Output("Failed to initialize the sandbox target services."); + return 255; + } +#endif + + nsresult rv = InitXPCOMGlue(argv[0], nullptr); + if (NS_FAILED(rv)) { + return 255; + } + + int result = content_process_main(argc, argv); + + // InitXPCOMGlue calls NS_LogInit, so we need to balance it here. + NS_LogTerm(); + + return result; + } +#endif + + + nsIFile *xreDirectory; + + nsresult rv = InitXPCOMGlue(argv[0], &xreDirectory); + if (NS_FAILED(rv)) { + return 255; + } + + XRE_StartupTimelineRecord(mozilla::StartupTimeline::START, start); + +#ifdef MOZ_BROWSER_CAN_BE_CONTENTPROC + XRE_EnableSameExecutableForContentProc(); +#endif + + int result = do_main(argc, argv, envp, xreDirectory); + + NS_LogTerm(); + +#ifdef XP_MACOSX + // Allow writes again. While we would like to catch writes from static + // destructors to allow early exits to use _exit, we know that there is + // at least one such write that we don't control (see bug 826029). For + // now we enable writes again and early exits will have to use exit instead + // of _exit. + XRE_StopLateWriteChecks(); +#endif + + return result; +} diff --git a/browser/app/permissions b/browser/app/permissions new file mode 100644 index 000000000..a2afdded2 --- /dev/null +++ b/browser/app/permissions @@ -0,0 +1,23 @@ +# This file has default permissions for the permission manager. +# The file-format is strict: +# * matchtype \t type \t permission \t host +# * "origin" should be used for matchtype, "host" is supported for legacy reasons +# * type is a string that identifies the type of permission (e.g. "cookie") +# * permission is an integer between 1 and 15 +# See nsPermissionManager.cpp for more... + +# UITour +origin uitour 1 https://www.mozilla.org +origin uitour 1 https://self-repair.mozilla.org +origin uitour 1 https://support.mozilla.org +origin uitour 1 https://addons.mozilla.org +origin uitour 1 https://discovery.addons.mozilla.org +origin uitour 1 about:home + +# XPInstall +origin install 1 https://addons.mozilla.org +origin install 1 https://testpilot.firefox.com + +# Remote troubleshooting +origin remote-troubleshooting 1 https://input.mozilla.org +origin remote-troubleshooting 1 https://support.mozilla.org diff --git a/browser/app/profile/channel-prefs.js b/browser/app/profile/channel-prefs.js new file mode 100644 index 000000000..633c489f3 --- /dev/null +++ b/browser/app/profile/channel-prefs.js @@ -0,0 +1,5 @@ +/* This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ + +pref("app.update.channel", "@MOZ_UPDATE_CHANNEL@"); diff --git a/browser/app/profile/extensions/moz.build b/browser/app/profile/extensions/moz.build new file mode 100644 index 000000000..bb02c9165 --- /dev/null +++ b/browser/app/profile/extensions/moz.build @@ -0,0 +1,7 @@ +# -*- Mode: python; indent-tabs-mode: nil; tab-width: 40 -*- +# vim: set filetype=python: +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. + +DIRS += ['{972ce4c6-7e08-4474-a285-3208198ce6fd}'] diff --git a/browser/app/profile/extensions/{972ce4c6-7e08-4474-a285-3208198ce6fd}/install.rdf.in b/browser/app/profile/extensions/{972ce4c6-7e08-4474-a285-3208198ce6fd}/install.rdf.in new file mode 100644 index 000000000..3e803af5b --- /dev/null +++ b/browser/app/profile/extensions/{972ce4c6-7e08-4474-a285-3208198ce6fd}/install.rdf.in @@ -0,0 +1,40 @@ + + + + +#filter substitution + + + + + {972ce4c6-7e08-4474-a285-3208198ce6fd} + @FIREFOX_VERSION@ + + + + + {ec8030f7-c20a-464f-9b0e-13a3a9e97384} + @FIREFOX_VERSION@ + @FIREFOX_VERSION@ + + + + + Default + The default theme. + + + Mozilla + Mozilla Contributors + + + true + + classic/1.0 + + + diff --git a/browser/app/profile/extensions/{972ce4c6-7e08-4474-a285-3208198ce6fd}/moz.build b/browser/app/profile/extensions/{972ce4c6-7e08-4474-a285-3208198ce6fd}/moz.build new file mode 100644 index 000000000..20a4c1cbe --- /dev/null +++ b/browser/app/profile/extensions/{972ce4c6-7e08-4474-a285-3208198ce6fd}/moz.build @@ -0,0 +1,11 @@ +# -*- Mode: python; indent-tabs-mode: nil; tab-width: 40 -*- +# vim: set filetype=python: +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. + +FINAL_TARGET = 'dist/bin/browser/extensions/{972ce4c6-7e08-4474-a285-3208198ce6fd}' + +FINAL_TARGET_PP_FILES += [ + 'install.rdf.in', +] diff --git a/browser/app/profile/firefox.js b/browser/app/profile/firefox.js new file mode 100644 index 000000000..82f8e45a5 --- /dev/null +++ b/browser/app/profile/firefox.js @@ -0,0 +1,1571 @@ +# -*- indent-tabs-mode: nil; js-indent-level: 2 -*- +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. + +// XXX Toolkit-specific preferences should be moved into toolkit.js + +#filter substitution + +# +# SYNTAX HINTS: +# +# - Dashes are delimiters; use underscores instead. +# - The first character after a period must be alphabetic. +# - Computed values (e.g. 50 * 1024) don't work. +# + +#ifdef XP_UNIX +#ifndef XP_MACOSX +#define UNIX_BUT_NOT_MAC +#endif +#endif + +pref("browser.chromeURL","chrome://browser/content/"); +pref("browser.hiddenWindowChromeURL", "chrome://browser/content/hiddenWindow.xul"); + +// Enables some extra Extension System Logging (can reduce performance) +pref("extensions.logging.enabled", false); + +// Disables strict compatibility, making addons compatible-by-default. +pref("extensions.strictCompatibility", false); + +// Specifies a minimum maxVersion an addon needs to say it's compatible with +// for it to be compatible by default. +pref("extensions.minCompatibleAppVersion", "4.0"); +// Temporary preference to forcibly make themes more safe with Australis even if +// extensions.checkCompatibility=false has been set. +pref("extensions.checkCompatibility.temporaryThemeOverride_minAppVersion", "29.0a1"); + +pref("xpinstall.customConfirmationUI", true); + +// Preferences for AMO integration +pref("extensions.getAddons.cache.enabled", true); +pref("extensions.getAddons.maxResults", 15); +pref("extensions.getAddons.get.url", "https://services.addons.mozilla.org/%LOCALE%/firefox/api/%API_VERSION%/search/guid:%IDS%?src=firefox&appOS=%OS%&appVersion=%VERSION%"); +pref("extensions.getAddons.getWithPerformance.url", "https://services.addons.mozilla.org/%LOCALE%/firefox/api/%API_VERSION%/search/guid:%IDS%?src=firefox&appOS=%OS%&appVersion=%VERSION%&tMain=%TIME_MAIN%&tFirstPaint=%TIME_FIRST_PAINT%&tSessionRestored=%TIME_SESSION_RESTORED%"); +pref("extensions.getAddons.search.browseURL", "https://addons.mozilla.org/%LOCALE%/firefox/search?q=%TERMS%&platform=%OS%&appver=%VERSION%"); +pref("extensions.getAddons.search.url", "https://services.addons.mozilla.org/%LOCALE%/firefox/api/%API_VERSION%/search/%TERMS%/all/%MAX_RESULTS%/%OS%/%VERSION%/%COMPATIBILITY_MODE%?src=firefox"); +pref("extensions.webservice.discoverURL", "https://discovery.addons.mozilla.org/%LOCALE%/firefox/discovery/pane/%VERSION%/%OS%/%COMPATIBILITY_MODE%"); +pref("extensions.getAddons.recommended.url", "https://services.addons.mozilla.org/%LOCALE%/%APP%/api/%API_VERSION%/list/recommended/all/%MAX_RESULTS%/%OS%/%VERSION%?src=firefox"); +pref("extensions.getAddons.link.url", "https://addons.mozilla.org/%LOCALE%/firefox/"); + +pref("extensions.update.autoUpdateDefault", true); + +pref("extensions.hotfix.id", "firefox-hotfix@mozilla.org"); +pref("extensions.hotfix.cert.checkAttributes", true); +pref("extensions.hotfix.certs.1.sha1Fingerprint", "91:53:98:0C:C1:86:DF:47:8F:35:22:9E:11:C9:A7:31:04:49:A1:AA"); +pref("extensions.hotfix.certs.2.sha1Fingerprint", "39:E7:2B:7A:5B:CF:37:78:F9:5D:4A:E0:53:2D:2F:3D:68:53:C5:60"); + +// Check AUS for system add-on updates. +pref("extensions.systemAddon.update.url", "https://aus5.mozilla.org/update/3/SystemAddons/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL%/%OS_VERSION%/%DISTRIBUTION%/%DISTRIBUTION_VERSION%/update.xml"); + +// Disable add-ons that are not installed by the user in all scopes by default. +// See the SCOPE constants in AddonManager.jsm for values to use here. +pref("extensions.autoDisableScopes", 15); + +// Add-on content security policies. +pref("extensions.webextensions.base-content-security-policy", "script-src 'self' https://* moz-extension: blob: filesystem: 'unsafe-eval' 'unsafe-inline'; object-src 'self' https://* moz-extension: blob: filesystem:;"); +pref("extensions.webextensions.default-content-security-policy", "script-src 'self'; object-src 'self';"); + +// Require signed add-ons by default +pref("xpinstall.signatures.required", true); +pref("xpinstall.signatures.devInfoURL", "https://wiki.mozilla.org/Addons/Extension_Signing"); + +// Dictionary download preference +pref("browser.dictionaries.download.url", "https://addons.mozilla.org/%LOCALE%/firefox/dictionaries/"); + +// At startup, should we check to see if the installation +// date is older than some threshold +pref("app.update.checkInstallTime", true); + +// The number of days a binary is permitted to be old without checking is defined in +// firefox-branding.js (app.update.checkInstallTime.days) + +// The minimum delay in seconds for the timer to fire between the notification +// of each consumer of the timer manager. +// minimum=30 seconds, default=120 seconds, and maximum=300 seconds +pref("app.update.timerMinimumDelay", 120); + +// The minimum delay in milliseconds for the first firing after startup of the timer +// to notify consumers of the timer manager. +// minimum=10 seconds, default=30 seconds, and maximum=120 seconds +pref("app.update.timerFirstInterval", 30000); + +// App-specific update preferences + +// The interval to check for updates (app.update.interval) is defined in +// firefox-branding.js + +// Alternative windowtype for an application update user interface window. When +// a window with this windowtype is open the application update service won't +// open the normal application update user interface window. +pref("app.update.altwindowtype", "Browser:About"); + +// Enables some extra Application Update Logging (can reduce performance) +pref("app.update.log", false); + +// The number of general background check failures to allow before notifying the +// user of the failure. User initiated update checks always notify the user of +// the failure. +pref("app.update.backgroundMaxErrors", 10); + +// Whether or not app updates are enabled +pref("app.update.enabled", true); + +// If set to true, the Update Service will automatically download updates when +// app updates are enabled per the app.update.enabled preference and if the user +// can apply updates. +pref("app.update.auto", true); + +// If set to true, the Update Service will present no UI for any event. +pref("app.update.silent", false); + +// If set to true, the hamburger button will show badges for update events. +#ifndef RELEASE_OR_BETA +pref("app.update.badge", true); +#else +pref("app.update.badge", false); +#endif +// app.update.badgeWaitTime is in branding section + +// If set to true, the Update Service will apply updates in the background +// when it finishes downloading them. +pref("app.update.staging.enabled", true); + +// Update service URL: +pref("app.update.url", "https://aus5.mozilla.org/update/6/%PRODUCT%/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL%/%OS_VERSION%/%SYSTEM_CAPABILITIES%/%DISTRIBUTION%/%DISTRIBUTION_VERSION%/update.xml"); +// app.update.url.manual is in branding section +// app.update.url.details is in branding section + +// app.update.interval is in branding section +// app.update.promptWaitTime is in branding section + +// Show the Update Checking/Ready UI when the user was idle for x seconds +pref("app.update.idletime", 60); + +// Whether or not to attempt using the service for updates. +#ifdef MOZ_MAINTENANCE_SERVICE +pref("app.update.service.enabled", true); +#endif + +// Symmetric (can be overridden by individual extensions) update preferences. +// e.g. +// extensions.{GUID}.update.enabled +// extensions.{GUID}.update.url +// .. etc .. +// +pref("extensions.update.enabled", true); +pref("extensions.update.url", "https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID%&version=%ITEM_VERSION%&maxAppVersion=%ITEM_MAXAPPVERSION%&status=%ITEM_STATUS%&appID=%APP_ID%&appVersion=%APP_VERSION%&appOS=%APP_OS%&appABI=%APP_ABI%&locale=%APP_LOCALE%¤tAppVersion=%CURRENT_APP_VERSION%&updateType=%UPDATE_TYPE%&compatMode=%COMPATIBILITY_MODE%"); +pref("extensions.update.background.url", "https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID%&version=%ITEM_VERSION%&maxAppVersion=%ITEM_MAXAPPVERSION%&status=%ITEM_STATUS%&appID=%APP_ID%&appVersion=%APP_VERSION%&appOS=%APP_OS%&appABI=%APP_ABI%&locale=%APP_LOCALE%¤tAppVersion=%CURRENT_APP_VERSION%&updateType=%UPDATE_TYPE%&compatMode=%COMPATIBILITY_MODE%"); +pref("extensions.update.interval", 86400); // Check for updates to Extensions and + // Themes every day +// Non-symmetric (not shared by extensions) extension-specific [update] preferences +pref("extensions.dss.enabled", false); // Dynamic Skin Switching +pref("extensions.dss.switchPending", false); // Non-dynamic switch pending after next + // restart. + +pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.name", "chrome://browser/locale/browser.properties"); +pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.description", "chrome://browser/locale/browser.properties"); + +pref("lightweightThemes.update.enabled", true); +pref("lightweightThemes.getMoreURL", "https://addons.mozilla.org/%LOCALE%/firefox/themes"); +pref("lightweightThemes.recommendedThemes", "[{\"id\":\"recommended-1\",\"homepageURL\":\"https://addons.mozilla.org/firefox/addon/a-web-browser-renaissance/\",\"headerURL\":\"resource:///chrome/browser/content/browser/defaultthemes/1.header.jpg\",\"footerURL\":\"resource:///chrome/browser/content/browser/defaultthemes/1.footer.jpg\",\"textcolor\":\"#000000\",\"accentcolor\":\"#f2d9b1\",\"iconURL\":\"resource:///chrome/browser/content/browser/defaultthemes/1.icon.jpg\",\"previewURL\":\"resource:///chrome/browser/content/browser/defaultthemes/1.preview.jpg\",\"author\":\"Sean.Martell\",\"version\":\"0\"},{\"id\":\"recommended-2\",\"homepageURL\":\"https://addons.mozilla.org/firefox/addon/space-fantasy/\",\"headerURL\":\"resource:///chrome/browser/content/browser/defaultthemes/2.header.jpg\",\"footerURL\":\"resource:///chrome/browser/content/browser/defaultthemes/2.footer.jpg\",\"textcolor\":\"#ffffff\",\"accentcolor\":\"#d9d9d9\",\"iconURL\":\"resource:///chrome/browser/content/browser/defaultthemes/2.icon.jpg\",\"previewURL\":\"resource:///chrome/browser/content/browser/defaultthemes/2.preview.jpg\",\"author\":\"fx5800p\",\"version\":\"1.0\"},{\"id\":\"recommended-3\",\"homepageURL\":\"https://addons.mozilla.org/firefox/addon/linen-light/\",\"headerURL\":\"resource:///chrome/browser/content/browser/defaultthemes/3.header.png\",\"footerURL\":\"resource:///chrome/browser/content/browser/defaultthemes/3.footer.png\",\"accentcolor\":\"#ada8a8\",\"iconURL\":\"resource:///chrome/browser/content/browser/defaultthemes/3.icon.png\",\"previewURL\":\"resource:///chrome/browser/content/browser/defaultthemes/3.preview.png\",\"author\":\"DVemer\",\"version\":\"1.0\"},{\"id\":\"recommended-4\",\"homepageURL\":\"https://addons.mozilla.org/firefox/addon/pastel-gradient/\",\"headerURL\":\"resource:///chrome/browser/content/browser/defaultthemes/4.header.png\",\"footerURL\":\"resource:///chrome/browser/content/browser/defaultthemes/4.footer.png\",\"textcolor\":\"#000000\",\"accentcolor\":\"#000000\",\"iconURL\":\"resource:///chrome/browser/content/browser/defaultthemes/4.icon.png\",\"previewURL\":\"resource:///chrome/browser/content/browser/defaultthemes/4.preview.png\",\"author\":\"darrinhenein\",\"version\":\"1.0\"},{\"id\":\"recommended-5\",\"homepageURL\":\"https://addons.mozilla.org/firefox/addon/carbon-light/\",\"headerURL\":\"resource:///chrome/browser/content/browser/defaultthemes/5.header.png\",\"footerURL\":\"resource:///chrome/browser/content/browser/defaultthemes/5.footer.png\",\"textcolor\":\"#3b3b3b\",\"accentcolor\":\"#2e2e2e\",\"iconURL\":\"resource:///chrome/browser/content/browser/defaultthemes/5.icon.jpg\",\"previewURL\":\"resource:///chrome/browser/content/browser/defaultthemes/5.preview.jpg\",\"author\":\"Jaxivo\",\"version\":\"1.0\"}]"); + +#if defined(MOZ_ADOBE_EME) || defined(MOZ_WIDEVINE_EME) +pref("browser.eme.ui.enabled", true); +#else +pref("browser.eme.ui.enabled", false); +#endif + +// UI tour experience. +pref("browser.uitour.enabled", true); +pref("browser.uitour.loglevel", "Error"); +pref("browser.uitour.requireSecure", true); +pref("browser.uitour.themeOrigin", "https://addons.mozilla.org/%LOCALE%/firefox/themes/"); +pref("browser.uitour.url", "https://www.mozilla.org/%LOCALE%/firefox/%VERSION%/tour/"); +// This is used as a regexp match against the page's URL. +pref("browser.uitour.readerViewTrigger", "^https:\\/\\/www\\.mozilla\\.org\\/[^\\/]+\\/firefox\\/reading\\/start"); +// How long to show a Hearbeat survey (two hours, in seconds) +pref("browser.uitour.surveyDuration", 7200); + +pref("browser.customizemode.tip0.shown", false); +pref("browser.customizemode.tip0.learnMoreUrl", "https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/customize"); + +pref("keyword.enabled", true); +pref("browser.fixup.domainwhitelist.localhost", true); + +pref("general.useragent.locale", "@AB_CD@"); +pref("general.skins.selectedSkin", "classic/1.0"); + +pref("general.smoothScroll", true); +#ifdef UNIX_BUT_NOT_MAC +pref("general.autoScroll", false); +#else +pref("general.autoScroll", true); +#endif + +// At startup, check if we're the default browser and prompt user if not. +pref("browser.shell.checkDefaultBrowser", true); +pref("browser.shell.shortcutFavicons",true); +pref("browser.shell.mostRecentDateSetAsDefault", ""); +#ifdef RELEASE_OR_BETA +pref("browser.shell.skipDefaultBrowserCheckOnFirstRun", false); +#else +pref("browser.shell.skipDefaultBrowserCheckOnFirstRun", true); +#endif +pref("browser.shell.skipDefaultBrowserCheck", true); +pref("browser.shell.defaultBrowserCheckCount", 0); +pref("browser.defaultbrowser.notificationbar", false); + +// 0 = blank, 1 = home (browser.startup.homepage), 2 = last visited page, 3 = resume previous browser session +// The behavior of option 3 is detailed at: http://wiki.mozilla.org/Session_Restore +pref("browser.startup.page", 1); +pref("browser.startup.homepage", "chrome://branding/locale/browserconfig.properties"); +// Whether we should skip the homepage when opening the first-run page +pref("browser.startup.firstrunSkipsHomepage", false); + +pref("browser.slowStartup.notificationDisabled", false); +pref("browser.slowStartup.timeThreshold", 40000); +pref("browser.slowStartup.maxSamples", 5); + +// This url, if changed, MUST continue to point to an https url. Pulling arbitrary content to inject into +// this page over http opens us up to a man-in-the-middle attack that we'd rather not face. If you are a downstream +// repackager of this code using an alternate snippet url, please keep your users safe +pref("browser.aboutHomeSnippets.updateUrl", "https://snippets.cdn.mozilla.net/%STARTPAGE_VERSION%/%NAME%/%VERSION%/%APPBUILDID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL%/%OS_VERSION%/%DISTRIBUTION%/%DISTRIBUTION_VERSION%/"); + +pref("browser.enable_automatic_image_resizing", true); +pref("browser.casting.enabled", false); +pref("browser.chrome.site_icons", true); +pref("browser.chrome.favicons", true); +// browser.warnOnQuit == false will override all other possible prompts when quitting or restarting +pref("browser.warnOnQuit", true); +// browser.showQuitWarning specifically controls the quit warning dialog. We +// might still show the window closing dialog with showQuitWarning == false. +pref("browser.showQuitWarning", false); +pref("browser.fullscreen.autohide", true); +pref("browser.fullscreen.animate", true); +pref("browser.overlink-delay", 80); + +#ifdef UNIX_BUT_NOT_MAC +pref("browser.urlbar.clickSelectsAll", false); +#else +pref("browser.urlbar.clickSelectsAll", true); +#endif +#ifdef UNIX_BUT_NOT_MAC +pref("browser.urlbar.doubleClickSelectsAll", true); +#else +pref("browser.urlbar.doubleClickSelectsAll", false); +#endif + +// Control autoFill behavior +pref("browser.urlbar.autoFill", true); +pref("browser.urlbar.autoFill.typed", true); + +// 0: Match anywhere (e.g., middle of words) +// 1: Match on word boundaries and then try matching anywhere +// 2: Match only on word boundaries (e.g., after / or .) +// 3: Match at the beginning of the url or title +pref("browser.urlbar.matchBehavior", 1); +pref("browser.urlbar.filter.javascript", true); + +// the maximum number of results to show in autocomplete when doing richResults +pref("browser.urlbar.maxRichResults", 10); +// The amount of time (ms) to wait after the user has stopped typing +// before starting to perform autocomplete. 50 is the default set in +// autocomplete.xml. +pref("browser.urlbar.delay", 50); + +// The special characters below can be typed into the urlbar to either restrict +// the search to visited history, bookmarked, tagged pages; or force a match on +// just the title text or url. +pref("browser.urlbar.restrict.history", "^"); +pref("browser.urlbar.restrict.bookmark", "*"); +pref("browser.urlbar.restrict.tag", "+"); +pref("browser.urlbar.restrict.openpage", "%"); +pref("browser.urlbar.restrict.typed", "~"); +pref("browser.urlbar.restrict.searches", "$"); +pref("browser.urlbar.match.title", "#"); +pref("browser.urlbar.match.url", "@"); + +// The default behavior for the urlbar can be configured to use any combination +// of the match filters with each additional filter adding more results (union). +pref("browser.urlbar.suggest.history", true); +pref("browser.urlbar.suggest.bookmark", true); +pref("browser.urlbar.suggest.openpage", true); +pref("browser.urlbar.suggest.searches", false); +pref("browser.urlbar.userMadeSearchSuggestionsChoice", false); +// 4 here means the suggestion notification will be automatically +// hidden the 4th day, so it will actually be shown on 3 different days. +pref("browser.urlbar.daysBeforeHidingSuggestionsPrompt", 4); +pref("browser.urlbar.lastSuggestionsPromptDate", 20160601); + +// Limit the number of characters sent to the current search engine to fetch +// suggestions. +pref("browser.urlbar.maxCharsForSearchSuggestions", 20); + +// Restrictions to current suggestions can also be applied (intersection). +// Typed suggestion works only if history is set to true. +pref("browser.urlbar.suggest.history.onlyTyped", false); + +pref("browser.urlbar.formatting.enabled", true); +pref("browser.urlbar.trimURLs", true); + +#if defined(NIGHTLY_BUILD) +pref("browser.urlbar.oneOffSearches", true); +#else +pref("browser.urlbar.oneOffSearches", false); +#endif + +pref("browser.altClickSave", false); + +// Enable logging downloads operations to the Console. +pref("browser.download.loglevel", "Error"); + +// Number of milliseconds to wait for the http headers (and thus +// the Content-Disposition filename) before giving up and falling back to +// picking a filename without that info in hand so that the user sees some +// feedback from their action. +pref("browser.download.saveLinkAsFilenameTimeout", 4000); + +pref("browser.download.useDownloadDir", true); +pref("browser.download.folderList", 1); +pref("browser.download.manager.addToRecentDocs", true); +pref("browser.download.manager.resumeOnWakeDelay", 10000); + +#ifdef RELEASE_OR_BETA +pref("browser.download.showPanelDropmarker", false); +#else +pref("browser.download.showPanelDropmarker", true); +#endif + +// This allows disabling the animated notifications shown by +// the Downloads Indicator when a download starts or completes. +pref("browser.download.animateNotifications", true); + +// This records whether or not the panel has been shown at least once. +pref("browser.download.panel.shown", false); + +#ifndef XP_MACOSX +pref("browser.helperApps.deleteTempFileOnExit", true); +#endif + +// search engines URL +pref("browser.search.searchEnginesURL", "https://addons.mozilla.org/%LOCALE%/firefox/search-engines/"); + +// pointer to the default engine name +pref("browser.search.defaultenginename", "chrome://browser-region/locale/region.properties"); + +// Ordering of Search Engines in the Engine list. +pref("browser.search.order.1", "chrome://browser-region/locale/region.properties"); +pref("browser.search.order.2", "chrome://browser-region/locale/region.properties"); +pref("browser.search.order.3", "chrome://browser-region/locale/region.properties"); + +// Market-specific search defaults +// This is disabled globally, and then enabled for individual locales +// in firefox-l10n.js (eg. it's enabled for en-US). +pref("browser.search.geoSpecificDefaults", false); +pref("browser.search.geoSpecificDefaults.url", "https://search.services.mozilla.com/1/%APP%/%VERSION%/%CHANNEL%/%LOCALE%/%REGION%/%DISTRIBUTION%/%DISTRIBUTION_VERSION%"); + +// US specific default (used as a fallback if the geoSpecificDefaults request fails). +pref("browser.search.defaultenginename.US", "data:text/plain,browser.search.defaultenginename.US=Google"); +pref("browser.search.order.US.1", "data:text/plain,browser.search.order.US.1=Google"); +pref("browser.search.order.US.2", "data:text/plain,browser.search.order.US.2=Yahoo"); +pref("browser.search.order.US.3", "data:text/plain,browser.search.order.US.3=Bing"); + +// search bar results always open in a new tab +pref("browser.search.openintab", false); + +// context menu searches open in the foreground +pref("browser.search.context.loadInBackground", false); + +// comma seperated list of of engines to hide in the search panel. +pref("browser.search.hiddenOneOffs", ""); + +#ifndef RELEASE_OR_BETA +pref("browser.search.reset.enabled", true); +#endif + +pref("browser.sessionhistory.max_entries", 50); + +// Built-in default permissions. +pref("permissions.manager.defaultsUrl", "resource://app/defaults/permissions"); + +// handle links targeting new windows +// 1=current window/tab, 2=new window, 3=new tab in most recent window +pref("browser.link.open_newwindow", 3); + +// handle external links (i.e. links opened from a different application) +// default: use browser.link.open_newwindow +// 1-3: see browser.link.open_newwindow for interpretation +pref("browser.link.open_newwindow.override.external", -1); + +// 0: no restrictions - divert everything +// 1: don't divert window.open at all +// 2: don't divert window.open with features +pref("browser.link.open_newwindow.restriction", 2); + +// If true, this pref causes windows opened by window.open to be forced into new +// tabs (rather than potentially opening separate windows, depending on +// window.open arguments) when the browser is in fullscreen mode. +// We set this differently on Mac because the fullscreen implementation there is +// different. +#ifdef XP_MACOSX +pref("browser.link.open_newwindow.disabled_in_fullscreen", true); +#else +pref("browser.link.open_newwindow.disabled_in_fullscreen", false); +#endif + +// Tabbed browser +pref("browser.tabs.closeWindowWithLastTab", true); +pref("browser.tabs.insertRelatedAfterCurrent", true); +pref("browser.tabs.warnOnClose", true); +pref("browser.tabs.warnOnCloseOtherTabs", true); +pref("browser.tabs.warnOnOpen", true); +pref("browser.tabs.maxOpenBeforeWarn", 15); +pref("browser.tabs.loadInBackground", true); +pref("browser.tabs.opentabfor.middleclick", true); +pref("browser.tabs.loadDivertedInBackground", false); +pref("browser.tabs.loadBookmarksInBackground", false); +pref("browser.tabs.tabClipWidth", 140); +pref("browser.tabs.animate", true); +#ifdef UNIX_BUT_NOT_MAC +pref("browser.tabs.drawInTitlebar", false); +#else +pref("browser.tabs.drawInTitlebar", true); +#endif + +// When tabs opened by links in other tabs via a combination of +// browser.link.open_newwindow being set to 3 and target="_blank" etc are +// closed: +// true return to the tab that opened this tab (its owner) +// false return to the adjacent tab (old default) +pref("browser.tabs.selectOwnerOnClose", true); + +pref("browser.tabs.showAudioPlayingIcon", true); +// This should match Chromium's audio indicator delay. +pref("browser.tabs.delayHidingAudioPlayingIconMS", 3000); + +pref("browser.tabs.dontfocusfordialogs", true); + +pref("browser.ctrlTab.previews", false); + +// By default, do not export HTML at shutdown. +// If true, at shutdown the bookmarks in your menu and toolbar will +// be exported as HTML to the bookmarks.html file. +pref("browser.bookmarks.autoExportHTML", false); + +// The maximum number of daily bookmark backups to +// keep in {PROFILEDIR}/bookmarkbackups. Special values: +// -1: unlimited +// 0: no backups created (and deletes all existing backups) +pref("browser.bookmarks.max_backups", 15); + +pref("browser.bookmarks.showRecentlyBookmarked", true); + +// Scripts & Windows prefs +pref("dom.disable_open_during_load", true); +pref("javascript.options.showInConsole", true); +#ifdef DEBUG +pref("general.warnOnAboutConfig", false); +#endif + +// This is the pref to control the location bar, change this to true to +// force this - this makes the origin of popup windows more obvious to avoid +// spoofing. We would rather not do it by default because it affects UE for web +// applications, but without it there isn't a really good way to prevent chrome +// spoofing, see bug 337344 +pref("dom.disable_window_open_feature.location", true); +// prevent JS from setting status messages +pref("dom.disable_window_status_change", true); +// allow JS to move and resize existing windows +pref("dom.disable_window_move_resize", false); +// prevent JS from monkeying with window focus, etc +pref("dom.disable_window_flip", true); + +// popups.policy 1=allow,2=reject +pref("privacy.popups.policy", 1); +pref("privacy.popups.usecustom", true); +pref("privacy.popups.showBrowserMessage", true); + +pref("privacy.item.cookies", false); + +pref("privacy.clearOnShutdown.history", true); +pref("privacy.clearOnShutdown.formdata", true); +pref("privacy.clearOnShutdown.downloads", true); +pref("privacy.clearOnShutdown.cookies", true); +pref("privacy.clearOnShutdown.cache", true); +pref("privacy.clearOnShutdown.sessions", true); +pref("privacy.clearOnShutdown.offlineApps", false); +pref("privacy.clearOnShutdown.siteSettings", false); +pref("privacy.clearOnShutdown.openWindows", false); + +pref("privacy.cpd.history", true); +pref("privacy.cpd.formdata", true); +pref("privacy.cpd.passwords", false); +pref("privacy.cpd.downloads", true); +pref("privacy.cpd.cookies", true); +pref("privacy.cpd.cache", true); +pref("privacy.cpd.sessions", true); +pref("privacy.cpd.offlineApps", false); +pref("privacy.cpd.siteSettings", false); +pref("privacy.cpd.openWindows", false); + +// What default should we use for the time span in the sanitizer: +// 0 - Clear everything +// 1 - Last Hour +// 2 - Last 2 Hours +// 3 - Last 4 Hours +// 4 - Today +// 5 - Last 5 minutes +// 6 - Last 24 hours +pref("privacy.sanitize.timeSpan", 1); +pref("privacy.sanitize.sanitizeOnShutdown", false); + +pref("privacy.sanitize.migrateFx3Prefs", false); + +pref("privacy.panicButton.enabled", true); + +pref("privacy.firstparty.isolate", false); + +pref("network.proxy.share_proxy_settings", false); // use the same proxy settings for all protocols + +// simple gestures support +pref("browser.gesture.swipe.left", "Browser:BackOrBackDuplicate"); +pref("browser.gesture.swipe.right", "Browser:ForwardOrForwardDuplicate"); +pref("browser.gesture.swipe.up", "cmd_scrollTop"); +pref("browser.gesture.swipe.down", "cmd_scrollBottom"); +#ifdef XP_MACOSX +pref("browser.gesture.pinch.latched", true); +pref("browser.gesture.pinch.threshold", 150); +#else +pref("browser.gesture.pinch.latched", false); +pref("browser.gesture.pinch.threshold", 25); +#endif +#ifdef XP_WIN +// Enabled for touch input display zoom. +pref("browser.gesture.pinch.out", "cmd_fullZoomEnlarge"); +pref("browser.gesture.pinch.in", "cmd_fullZoomReduce"); +pref("browser.gesture.pinch.out.shift", "cmd_fullZoomReset"); +pref("browser.gesture.pinch.in.shift", "cmd_fullZoomReset"); +#else +// Disabled by default due to issues with track pad input. +pref("browser.gesture.pinch.out", ""); +pref("browser.gesture.pinch.in", ""); +pref("browser.gesture.pinch.out.shift", ""); +pref("browser.gesture.pinch.in.shift", ""); +#endif +pref("browser.gesture.twist.latched", false); +pref("browser.gesture.twist.threshold", 0); +pref("browser.gesture.twist.right", "cmd_gestureRotateRight"); +pref("browser.gesture.twist.left", "cmd_gestureRotateLeft"); +pref("browser.gesture.twist.end", "cmd_gestureRotateEnd"); +pref("browser.gesture.tap", "cmd_fullZoomReset"); + +pref("browser.snapshots.limit", 0); + +// 0: Nothing happens +// 1: Scrolling contents +// 2: Go back or go forward, in your history +// 3: Zoom in or out. +#ifdef XP_MACOSX +// On OS X, if the wheel has one axis only, shift+wheel comes through as a +// horizontal scroll event. Thus, we can't assign anything other than normal +// scrolling to shift+wheel. +pref("mousewheel.with_alt.action", 2); +pref("mousewheel.with_shift.action", 1); +// On MacOS X, control+wheel is typically handled by system and we don't +// receive the event. So, command key which is the main modifier key for +// acceleration is the best modifier for zoom-in/out. However, we should keep +// the control key setting for backward compatibility. +pref("mousewheel.with_meta.action", 3); // command key on Mac +// Disable control-/meta-modified horizontal mousewheel events, since +// those are used on Mac as part of modified swipe gestures (e.g. +// Left swipe+Cmd = go back in a new tab). +pref("mousewheel.with_control.action.override_x", 0); +pref("mousewheel.with_meta.action.override_x", 0); +#else +pref("mousewheel.with_alt.action", 1); +pref("mousewheel.with_shift.action", 2); +pref("mousewheel.with_meta.action", 1); // win key on Win, Super/Hyper on Linux +#endif +pref("mousewheel.with_control.action",3); +pref("mousewheel.with_win.action", 1); + +pref("browser.xul.error_pages.enabled", true); +pref("browser.xul.error_pages.expert_bad_cert", false); + +// Enable captive portal detection. +pref("network.captive-portal-service.enabled", true); + +// If true, network link events will change the value of navigator.onLine +pref("network.manage-offline-status", true); + +// We want to make sure mail URLs are handled externally... +pref("network.protocol-handler.external.mailto", true); // for mail +pref("network.protocol-handler.external.news", true); // for news +pref("network.protocol-handler.external.snews", true); // for secure news +pref("network.protocol-handler.external.nntp", true); // also news +#ifdef XP_WIN +pref("network.protocol-handler.external.ms-windows-store", true); +#endif + +// ...without warning dialogs +pref("network.protocol-handler.warn-external.mailto", false); +pref("network.protocol-handler.warn-external.news", false); +pref("network.protocol-handler.warn-external.snews", false); +pref("network.protocol-handler.warn-external.nntp", false); +#ifdef XP_WIN +pref("network.protocol-handler.warn-external.ms-windows-store", false); +#endif + +// By default, all protocol handlers are exposed. This means that +// the browser will respond to openURL commands for all URL types. +// It will also try to open link clicks inside the browser before +// failing over to the system handlers. +pref("network.protocol-handler.expose-all", true); +pref("network.protocol-handler.expose.mailto", false); +pref("network.protocol-handler.expose.news", false); +pref("network.protocol-handler.expose.snews", false); +pref("network.protocol-handler.expose.nntp", false); + +pref("accessibility.typeaheadfind", false); +pref("accessibility.typeaheadfind.timeout", 5000); +pref("accessibility.typeaheadfind.linksonly", false); +pref("accessibility.typeaheadfind.flashBar", 1); + +#ifdef NIGHTLY_BUILD +pref("findbar.highlightAll", true); +pref("findbar.modalHighlight", true); +#endif + +// Tracks when accessibility is loaded into the previous session. +pref("accessibility.loadedInLastSession", false); + +pref("plugins.click_to_play", true); +pref("plugins.testmode", false); + +pref("plugin.default.state", 1); + +// Plugins bundled in XPIs are enabled by default. +pref("plugin.defaultXpi.state", 2); + +// Flash is enabled by default, and Java is click-to-activate by default on +// all channels. +pref("plugin.state.flash", 2); +pref("plugin.state.java", 1); + +// On ESR only, we re-enable all plugins instead of only loading Flash. +pref("plugin.load_flash_only", false); + +#ifdef XP_MACOSX +pref("browser.preferences.animateFadeIn", true); +#else +pref("browser.preferences.animateFadeIn", false); +#endif + +#ifdef XP_WIN +pref("browser.preferences.instantApply", false); +#else +pref("browser.preferences.instantApply", true); +#endif + +pref("browser.download.show_plugins_in_list", true); +pref("browser.download.hide_plugins_without_extensions", true); + +// Backspace and Shift+Backspace behavior +// 0 goes Back/Forward +// 1 act like PgUp/PgDown +// 2 and other values, nothing +#ifdef UNIX_BUT_NOT_MAC +pref("browser.backspace_action", 2); +#else +pref("browser.backspace_action", 0); +#endif + +// this will automatically enable inline spellchecking (if it is available) for +// editable elements in HTML +// 0 = spellcheck nothing +// 1 = check multi-line controls [default] +// 2 = check multi/single line controls +pref("layout.spellcheckDefault", 1); + +pref("browser.send_pings", false); + +/* initial web feed readers list */ +pref("browser.contentHandlers.types.0.title", "chrome://browser-region/locale/region.properties"); +pref("browser.contentHandlers.types.0.uri", "chrome://browser-region/locale/region.properties"); +pref("browser.contentHandlers.types.0.type", "application/vnd.mozilla.maybe.feed"); +pref("browser.contentHandlers.types.1.title", "chrome://browser-region/locale/region.properties"); +pref("browser.contentHandlers.types.1.uri", "chrome://browser-region/locale/region.properties"); +pref("browser.contentHandlers.types.1.type", "application/vnd.mozilla.maybe.feed"); +pref("browser.contentHandlers.types.2.title", "chrome://browser-region/locale/region.properties"); +pref("browser.contentHandlers.types.2.uri", "chrome://browser-region/locale/region.properties"); +pref("browser.contentHandlers.types.2.type", "application/vnd.mozilla.maybe.feed"); +pref("browser.contentHandlers.types.3.title", "chrome://browser-region/locale/region.properties"); +pref("browser.contentHandlers.types.3.uri", "chrome://browser-region/locale/region.properties"); +pref("browser.contentHandlers.types.3.type", "application/vnd.mozilla.maybe.feed"); +pref("browser.contentHandlers.types.4.title", "chrome://browser-region/locale/region.properties"); +pref("browser.contentHandlers.types.4.uri", "chrome://browser-region/locale/region.properties"); +pref("browser.contentHandlers.types.4.type", "application/vnd.mozilla.maybe.feed"); +pref("browser.contentHandlers.types.5.title", "chrome://browser-region/locale/region.properties"); +pref("browser.contentHandlers.types.5.uri", "chrome://browser-region/locale/region.properties"); +pref("browser.contentHandlers.types.5.type", "application/vnd.mozilla.maybe.feed"); + +pref("browser.feeds.handler", "ask"); +pref("browser.videoFeeds.handler", "ask"); +pref("browser.audioFeeds.handler", "ask"); + +// At startup, if the handler service notices that the version number in the +// region.properties file is newer than the version number in the handler +// service datastore, it will add any new handlers it finds in the prefs (as +// seeded by this file) to its datastore. +pref("gecko.handlerService.defaultHandlersVersion", "chrome://browser-region/locale/region.properties"); + +// The default set of web-based protocol handlers shown in the application +// selection dialog for webcal: ; I've arbitrarily picked 4 default handlers +// per protocol, but if some locale wants more than that (or defaults for some +// protocol not currently listed here), we should go ahead and add those. + +// webcal +pref("gecko.handlerService.schemes.webcal.0.name", "chrome://browser-region/locale/region.properties"); +pref("gecko.handlerService.schemes.webcal.0.uriTemplate", "chrome://browser-region/locale/region.properties"); +pref("gecko.handlerService.schemes.webcal.1.name", "chrome://browser-region/locale/region.properties"); +pref("gecko.handlerService.schemes.webcal.1.uriTemplate", "chrome://browser-region/locale/region.properties"); +pref("gecko.handlerService.schemes.webcal.2.name", "chrome://browser-region/locale/region.properties"); +pref("gecko.handlerService.schemes.webcal.2.uriTemplate", "chrome://browser-region/locale/region.properties"); +pref("gecko.handlerService.schemes.webcal.3.name", "chrome://browser-region/locale/region.properties"); +pref("gecko.handlerService.schemes.webcal.3.uriTemplate", "chrome://browser-region/locale/region.properties"); + +// mailto +pref("gecko.handlerService.schemes.mailto.0.name", "chrome://browser-region/locale/region.properties"); +pref("gecko.handlerService.schemes.mailto.0.uriTemplate", "chrome://browser-region/locale/region.properties"); +pref("gecko.handlerService.schemes.mailto.1.name", "chrome://browser-region/locale/region.properties"); +pref("gecko.handlerService.schemes.mailto.1.uriTemplate", "chrome://browser-region/locale/region.properties"); +pref("gecko.handlerService.schemes.mailto.2.name", "chrome://browser-region/locale/region.properties"); +pref("gecko.handlerService.schemes.mailto.2.uriTemplate", "chrome://browser-region/locale/region.properties"); +pref("gecko.handlerService.schemes.mailto.3.name", "chrome://browser-region/locale/region.properties"); +pref("gecko.handlerService.schemes.mailto.3.uriTemplate", "chrome://browser-region/locale/region.properties"); + +// irc +pref("gecko.handlerService.schemes.irc.0.name", "chrome://browser-region/locale/region.properties"); +pref("gecko.handlerService.schemes.irc.0.uriTemplate", "chrome://browser-region/locale/region.properties"); +pref("gecko.handlerService.schemes.irc.1.name", "chrome://browser-region/locale/region.properties"); +pref("gecko.handlerService.schemes.irc.1.uriTemplate", "chrome://browser-region/locale/region.properties"); +pref("gecko.handlerService.schemes.irc.2.name", "chrome://browser-region/locale/region.properties"); +pref("gecko.handlerService.schemes.irc.2.uriTemplate", "chrome://browser-region/locale/region.properties"); +pref("gecko.handlerService.schemes.irc.3.name", "chrome://browser-region/locale/region.properties"); +pref("gecko.handlerService.schemes.irc.3.uriTemplate", "chrome://browser-region/locale/region.properties"); + +// ircs +pref("gecko.handlerService.schemes.ircs.0.name", "chrome://browser-region/locale/region.properties"); +pref("gecko.handlerService.schemes.ircs.0.uriTemplate", "chrome://browser-region/locale/region.properties"); +pref("gecko.handlerService.schemes.ircs.1.name", "chrome://browser-region/locale/region.properties"); +pref("gecko.handlerService.schemes.ircs.1.uriTemplate", "chrome://browser-region/locale/region.properties"); +pref("gecko.handlerService.schemes.ircs.2.name", "chrome://browser-region/locale/region.properties"); +pref("gecko.handlerService.schemes.ircs.2.uriTemplate", "chrome://browser-region/locale/region.properties"); +pref("gecko.handlerService.schemes.ircs.3.name", "chrome://browser-region/locale/region.properties"); +pref("gecko.handlerService.schemes.ircs.3.uriTemplate", "chrome://browser-region/locale/region.properties"); + +// By default, we don't want protocol/content handlers to be registered from a different host, see bug 402287 +pref("gecko.handlerService.allowRegisterFromDifferentHost", false); + +pref("browser.geolocation.warning.infoURL", "https://www.mozilla.org/%LOCALE%/firefox/geolocation/"); + +pref("browser.EULA.version", 3); +pref("browser.rights.version", 3); +pref("browser.rights.3.shown", false); + +#ifdef DEBUG +// Don't show the about:rights notification in debug builds. +pref("browser.rights.override", true); +#endif + +pref("browser.selfsupport.url", "https://self-repair.mozilla.org/%LOCALE%/repair"); + +pref("browser.sessionstore.resume_from_crash", true); +pref("browser.sessionstore.resume_session_once", false); + +// minimal interval between two save operations in milliseconds +pref("browser.sessionstore.interval", 15000); +// on which sites to save text data, POSTDATA and cookies +// 0 = everywhere, 1 = unencrypted sites, 2 = nowhere +pref("browser.sessionstore.privacy_level", 0); +// how many tabs can be reopened (per window) +pref("browser.sessionstore.max_tabs_undo", 10); +// how many windows can be reopened (per session) - on non-OS X platforms this +// pref may be ignored when dealing with pop-up windows to ensure proper startup +pref("browser.sessionstore.max_windows_undo", 3); +// number of crashes that can occur before the about:sessionrestore page is displayed +// (this pref has no effect if more than 6 hours have passed since the last crash) +pref("browser.sessionstore.max_resumed_crashes", 1); +// number of back button session history entries to restore (-1 = all of them) +pref("browser.sessionstore.max_serialize_back", 10); +// number of forward button session history entries to restore (-1 = all of them) +pref("browser.sessionstore.max_serialize_forward", -1); +// restore_on_demand overrides MAX_CONCURRENT_TAB_RESTORES (sessionstore constant) +// and restore_hidden_tabs. When true, tabs will not be restored until they are +// focused (also applies to tabs that aren't visible). When false, the values +// for MAX_CONCURRENT_TAB_RESTORES and restore_hidden_tabs are respected. +// Selected tabs are always restored regardless of this pref. +pref("browser.sessionstore.restore_on_demand", true); +// Whether to automatically restore hidden tabs (i.e., tabs in other tab groups) or not +pref("browser.sessionstore.restore_hidden_tabs", false); +// If restore_on_demand is set, pinned tabs are restored on startup by default. +// When set to true, this pref overrides that behavior, and pinned tabs will only +// be restored when they are focused. +pref("browser.sessionstore.restore_pinned_tabs_on_demand", false); +// The version at which we performed the latest upgrade backup +pref("browser.sessionstore.upgradeBackup.latestBuildID", ""); +// How many upgrade backups should be kept +pref("browser.sessionstore.upgradeBackup.maxUpgradeBackups", 3); +// End-users should not run sessionstore in debug mode +pref("browser.sessionstore.debug", false); +// Causes SessionStore to ignore non-final update messages from +// browser tabs that were not caused by a flush from the parent. +// This is a testing flag and should not be used by end-users. +pref("browser.sessionstore.debug.no_auto_updates", false); +// Forget closed windows/tabs after two weeks +pref("browser.sessionstore.cleanup.forget_closed_after", 1209600000); + +// allow META refresh by default +pref("accessibility.blockautorefresh", false); + +// Whether history is enabled or not. +pref("places.history.enabled", true); + +// the (maximum) number of the recent visits to sample +// when calculating frecency +pref("places.frecency.numVisits", 10); + +// buckets (in days) for frecency calculation +pref("places.frecency.firstBucketCutoff", 4); +pref("places.frecency.secondBucketCutoff", 14); +pref("places.frecency.thirdBucketCutoff", 31); +pref("places.frecency.fourthBucketCutoff", 90); + +// weights for buckets for frecency calculations +pref("places.frecency.firstBucketWeight", 100); +pref("places.frecency.secondBucketWeight", 70); +pref("places.frecency.thirdBucketWeight", 50); +pref("places.frecency.fourthBucketWeight", 30); +pref("places.frecency.defaultBucketWeight", 10); + +// bonus (in percent) for visit transition types for frecency calculations +pref("places.frecency.embedVisitBonus", 0); +pref("places.frecency.framedLinkVisitBonus", 0); +pref("places.frecency.linkVisitBonus", 100); +pref("places.frecency.typedVisitBonus", 2000); +pref("places.frecency.bookmarkVisitBonus", 75); +pref("places.frecency.downloadVisitBonus", 0); +pref("places.frecency.permRedirectVisitBonus", 0); +pref("places.frecency.tempRedirectVisitBonus", 0); +pref("places.frecency.reloadVisitBonus", 0); +pref("places.frecency.defaultVisitBonus", 0); + +// bonus (in percent) for place types for frecency calculations +pref("places.frecency.unvisitedBookmarkBonus", 140); +pref("places.frecency.unvisitedTypedBonus", 200); + +// Controls behavior of the "Add Exception" dialog launched from SSL error pages +// 0 - don't pre-populate anything +// 1 - pre-populate site URL, but don't fetch certificate +// 2 - pre-populate site URL and pre-fetch certificate +pref("browser.ssl_override_behavior", 2); + +// True if the user should be prompted when a web application supports +// offline apps. +pref("browser.offline-apps.notify", true); + +// if true, use full page zoom instead of text zoom +pref("browser.zoom.full", true); + +// Whether or not to save and restore zoom levels on a per-site basis. +pref("browser.zoom.siteSpecific", true); + +// Whether or not to update background tabs to the current zoom level. +pref("browser.zoom.updateBackgroundTabs", true); + +// The breakpad report server to link to in about:crashes +pref("breakpad.reportURL", "https://crash-stats.mozilla.com/report/index/"); + +// URL for "Learn More" for Crash Reporter +pref("toolkit.crashreporter.infoURL", + "https://www.mozilla.org/legal/privacy/firefox.html#crash-reporter"); + +// base URL for web-based support pages +pref("app.support.baseURL", "https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/"); + +// a11y conflicts with e10s support page +pref("app.support.e10sAccessibilityUrl", "https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/accessibility-ppt"); + +// base url for web-based feedback pages +#ifdef MOZ_DEV_EDITION +pref("app.feedback.baseURL", "https://input.mozilla.org/%LOCALE%/feedback/firefoxdev/%VERSION%/"); +#else +pref("app.feedback.baseURL", "https://input.mozilla.org/%LOCALE%/feedback/%APP%/%VERSION%/"); +#endif + + +// Name of alternate about: page for certificate errors (when undefined, defaults to about:neterror) +pref("security.alternate_certificate_error_page", "certerror"); + +// Whether to start the private browsing mode at application startup +pref("browser.privatebrowsing.autostart", false); + +// Don't try to alter this pref, it'll be reset the next time you use the +// bookmarking dialog +pref("browser.bookmarks.editDialog.firstEditField", "namePicker"); + +pref("dom.ipc.plugins.flash.disable-protected-mode", false); + +// Feature-disable the protected-mode auto-flip +pref("browser.flash-protected-mode-flip.enable", false); + +// Whether we've already flipped protected mode automatically +pref("browser.flash-protected-mode-flip.done", false); + +pref("dom.ipc.shims.enabledWarnings", false); + +// Start the browser in e10s mode +pref("browser.tabs.remote.autostart", false); +pref("browser.tabs.remote.desktopbehavior", true); + +#if defined(XP_WIN) && defined(MOZ_SANDBOX) +// When this pref is true the Windows process sandbox will set up dummy +// interceptions and log to the browser console when calls fail in the sandboxed +// process and also if they are subsequently allowed by the broker process. +// This will require a restart. +pref("security.sandbox.windows.log", false); + +// Controls whether and how the Windows NPAPI plugin process is sandboxed. +// To get a different setting for a particular plugin replace "default", with +// the plugin's nice file name, see: nsPluginTag::GetNiceFileName. +// On windows these levels are: +// 0 - no sandbox +// 1 - sandbox with USER_NON_ADMIN access token level +// 2 - a more strict sandbox, which might cause functionality issues. This now +// includes running at low integrity. +// 3 - the strongest settings we seem to be able to use without breaking +// everything, but will probably cause some functionality restrictions +pref("dom.ipc.plugins.sandbox-level.default", 0); +#if defined(_AMD64_) +// The lines in PluginModuleParent.cpp should be changed in line with this. +pref("dom.ipc.plugins.sandbox-level.flash", 2); +#else +pref("dom.ipc.plugins.sandbox-level.flash", 0); +#endif + +#if defined(MOZ_CONTENT_SANDBOX) +// This controls the strength of the Windows content process sandbox for testing +// purposes. This will require a restart. +// On windows these levels are: +// See - security/sandbox/win/src/sandboxbroker/sandboxBroker.cpp +// SetSecurityLevelForContentProcess() for what the different settings mean. +#if defined(NIGHTLY_BUILD) +pref("security.sandbox.content.level", 2); +#else +pref("security.sandbox.content.level", 1); +#endif + +// This controls the depth of stack trace that is logged when Windows sandbox +// logging is turned on. This is only currently available for the content +// process because the only other sandbox (for GMP) has too strict a policy to +// allow stack tracing. This does not require a restart to take effect. +pref("security.sandbox.windows.log.stackTraceDepth", 0); +#endif +#endif + +#if defined(XP_MACOSX) && defined(MOZ_SANDBOX) && defined(MOZ_CONTENT_SANDBOX) +// This pref is discussed in bug 1083344, the naming is inspired from its +// Windows counterpart, but on Mac it's an integer which means: +// 0 -> "no sandbox" +// 1 -> "preliminary content sandboxing enabled: write access to +// home directory is prevented" +// 2 -> "preliminary content sandboxing enabled with profile protection: +// write access to home directory is prevented, read and write access +// to ~/Library and profile directories are prevented (excluding +// $PROFILE/{extensions,weave})" +// This setting is read when the content process is started. On Mac the content +// process is killed when all windows are closed, so a change will take effect +// when the 1st window is opened. +#if defined(NIGHTLY_BUILD) +pref("security.sandbox.content.level", 2); +#else +pref("security.sandbox.content.level", 1); +#endif +#endif + +#if defined(XP_LINUX) && defined(MOZ_SANDBOX) && defined(MOZ_CONTENT_SANDBOX) +// This pref is introduced as part of bug 742434, the naming is inspired from +// its Windows/Mac counterpart, but on Linux it's an integer which means: +// 0 -> "no sandbox" +// 1 -> "content sandbox using seccomp-bpf when available" +// 2 -> "seccomp-bpf + file broker" +// Content sandboxing on Linux is currently in the stage of +// 'just getting it enabled', which includes a very permissive whitelist. We +// enable seccomp-bpf on nightly to see if everything is running, or if we need +// to whitelist more system calls. +// +// So the purpose of this setting is to allow nightly users to disable the +// sandbox while we fix their problems. This way, they won't have to wait for +// another nightly release which disables seccomp-bpf again. +// +// This setting may not be required anymore once we decide to permanently +// enable the content sandbox. +pref("security.sandbox.content.level", 2); +#endif + +#if defined(XP_MACOSX) || defined(XP_WIN) +#if defined(MOZ_SANDBOX) && defined(MOZ_CONTENT_SANDBOX) +// ID (a UUID when set by gecko) that is used to form the name of a +// sandbox-writable temporary directory to be used by content processes +// when a temporary writable file is required in a level 1 sandbox. +pref("security.sandbox.content.tempDirSuffix", ""); +#endif +#endif + +// This pref governs whether we attempt to work around problems caused by +// plugins using OS calls to manipulate the cursor while running out-of- +// process. These workarounds all involve intercepting (hooking) certain +// OS calls in the plugin process, then arranging to make certain OS calls +// in the browser process. Eventually plugins will be required to use the +// NPAPI to manipulate the cursor, and these workarounds will be removed. +// See bug 621117. +#ifdef XP_MACOSX +pref("dom.ipc.plugins.nativeCursorSupport", true); +#endif + +#ifdef XP_WIN +pref("browser.taskbar.previews.enable", false); +pref("browser.taskbar.previews.max", 20); +pref("browser.taskbar.previews.cachetime", 5); +pref("browser.taskbar.lists.enabled", true); +pref("browser.taskbar.lists.frequent.enabled", true); +pref("browser.taskbar.lists.recent.enabled", false); +pref("browser.taskbar.lists.maxListItemCount", 7); +pref("browser.taskbar.lists.tasks.enabled", true); +pref("browser.taskbar.lists.refreshInSeconds", 120); +#endif + +// The sync engines to use. +pref("services.sync.registerEngines", "Bookmarks,Form,History,Password,Prefs,Tab,Addons,ExtensionStorage"); +// Preferences to be synced by default +pref("services.sync.prefs.sync.accessibility.blockautorefresh", true); +pref("services.sync.prefs.sync.accessibility.browsewithcaret", true); +pref("services.sync.prefs.sync.accessibility.typeaheadfind", true); +pref("services.sync.prefs.sync.accessibility.typeaheadfind.linksonly", true); +pref("services.sync.prefs.sync.addons.ignoreUserEnabledChanges", true); +// The addons prefs related to repository verification are intentionally +// not synced for security reasons. If a system is compromised, a user +// could weaken the pref locally, install an add-on from an untrusted +// source, and this would propagate automatically to other, +// uncompromised Sync-connected devices. +pref("services.sync.prefs.sync.browser.ctrlTab.previews", true); +pref("services.sync.prefs.sync.browser.download.useDownloadDir", true); +pref("services.sync.prefs.sync.browser.formfill.enable", true); +pref("services.sync.prefs.sync.browser.link.open_newwindow", true); +pref("services.sync.prefs.sync.browser.newtabpage.enabled", true); +pref("services.sync.prefs.sync.browser.newtabpage.enhanced", true); +pref("services.sync.prefs.sync.browser.newtabpage.pinned", true); +pref("services.sync.prefs.sync.browser.offline-apps.notify", true); +pref("services.sync.prefs.sync.browser.safebrowsing.phishing.enabled", true); +pref("services.sync.prefs.sync.browser.safebrowsing.malware.enabled", true); +pref("services.sync.prefs.sync.browser.search.update", true); +pref("services.sync.prefs.sync.browser.sessionstore.restore_on_demand", true); +pref("services.sync.prefs.sync.browser.startup.homepage", true); +pref("services.sync.prefs.sync.browser.startup.page", true); +pref("services.sync.prefs.sync.browser.tabs.loadInBackground", true); +pref("services.sync.prefs.sync.browser.tabs.warnOnClose", true); +pref("services.sync.prefs.sync.browser.tabs.warnOnOpen", true); +pref("services.sync.prefs.sync.browser.urlbar.autocomplete.enabled", true); +pref("services.sync.prefs.sync.browser.urlbar.maxRichResults", true); +pref("services.sync.prefs.sync.browser.urlbar.suggest.bookmark", true); +pref("services.sync.prefs.sync.browser.urlbar.suggest.history", true); +pref("services.sync.prefs.sync.browser.urlbar.suggest.history.onlyTyped", true); +pref("services.sync.prefs.sync.browser.urlbar.suggest.openpage", true); +pref("services.sync.prefs.sync.browser.urlbar.suggest.searches", true); +pref("services.sync.prefs.sync.dom.disable_open_during_load", true); +pref("services.sync.prefs.sync.dom.disable_window_flip", true); +pref("services.sync.prefs.sync.dom.disable_window_move_resize", true); +pref("services.sync.prefs.sync.dom.event.contextmenu.enabled", true); +pref("services.sync.prefs.sync.extensions.personas.current", true); +pref("services.sync.prefs.sync.extensions.update.enabled", true); +pref("services.sync.prefs.sync.intl.accept_languages", true); +pref("services.sync.prefs.sync.javascript.enabled", true); +pref("services.sync.prefs.sync.layout.spellcheckDefault", true); +pref("services.sync.prefs.sync.lightweightThemes.selectedThemeID", true); +pref("services.sync.prefs.sync.lightweightThemes.usedThemes", true); +pref("services.sync.prefs.sync.network.cookie.cookieBehavior", true); +pref("services.sync.prefs.sync.network.cookie.lifetimePolicy", true); +pref("services.sync.prefs.sync.network.cookie.lifetime.days", true); +pref("services.sync.prefs.sync.network.cookie.thirdparty.sessionOnly", true); +pref("services.sync.prefs.sync.permissions.default.image", true); +pref("services.sync.prefs.sync.pref.advanced.images.disable_button.view_image", true); +pref("services.sync.prefs.sync.pref.advanced.javascript.disable_button.advanced", true); +pref("services.sync.prefs.sync.pref.downloads.disable_button.edit_actions", true); +pref("services.sync.prefs.sync.pref.privacy.disable_button.cookie_exceptions", true); +pref("services.sync.prefs.sync.privacy.clearOnShutdown.cache", true); +pref("services.sync.prefs.sync.privacy.clearOnShutdown.cookies", true); +pref("services.sync.prefs.sync.privacy.clearOnShutdown.downloads", true); +pref("services.sync.prefs.sync.privacy.clearOnShutdown.formdata", true); +pref("services.sync.prefs.sync.privacy.clearOnShutdown.history", true); +pref("services.sync.prefs.sync.privacy.clearOnShutdown.offlineApps", true); +pref("services.sync.prefs.sync.privacy.clearOnShutdown.sessions", true); +pref("services.sync.prefs.sync.privacy.clearOnShutdown.siteSettings", true); +pref("services.sync.prefs.sync.privacy.donottrackheader.enabled", true); +pref("services.sync.prefs.sync.privacy.sanitize.sanitizeOnShutdown", true); +pref("services.sync.prefs.sync.privacy.trackingprotection.enabled", true); +pref("services.sync.prefs.sync.privacy.trackingprotection.pbmode.enabled", true); +pref("services.sync.prefs.sync.security.OCSP.enabled", true); +pref("services.sync.prefs.sync.security.OCSP.require", true); +pref("services.sync.prefs.sync.security.default_personal_cert", true); +pref("services.sync.prefs.sync.security.tls.version.min", true); +pref("services.sync.prefs.sync.security.tls.version.max", true); +pref("services.sync.prefs.sync.services.sync.syncedTabs.showRemoteIcons", true); +pref("services.sync.prefs.sync.signon.rememberSignons", true); +pref("services.sync.prefs.sync.spellchecker.dictionary", true); +pref("services.sync.prefs.sync.xpinstall.whitelist.required", true); + +// A preference that controls whether we should show the icon for a remote tab. +// This pref has no UI but exists because some people may be concerned that +// fetching these icons to show remote tabs may leak information about that +// user's tabs and bookmarks. Note this pref is also synced. +pref("services.sync.syncedTabs.showRemoteIcons", true); + +pref("services.sync.sendTabToDevice.enabled", true); + +// Developer edition preferences +#ifdef MOZ_DEV_EDITION +sticky_pref("lightweightThemes.selectedThemeID", "firefox-devedition@mozilla.org"); +#else +sticky_pref("lightweightThemes.selectedThemeID", ""); +#endif + +// Whether the character encoding menu is under the main Firefox button. This +// preference is a string so that localizers can alter it. +pref("browser.menu.showCharacterEncoding", "chrome://browser/locale/browser.properties"); + +// Allow using tab-modal prompts when possible. +pref("prompts.tab_modal.enabled", true); + +// Activates preloading of the new tab url. +pref("browser.newtab.preload", true); + +// Remembers if the about:newtab intro has been shown +// NOTE: This preference is unused but was not removed in case +// this information will be valuable in the future. +pref("browser.newtabpage.introShown", false); + +// Toggles the content of 'about:newtab'. Shows the grid when enabled. +pref("browser.newtabpage.enabled", true); + +// Toggles the enhanced content of 'about:newtab'. Shows sponsored tiles. +sticky_pref("browser.newtabpage.enhanced", true); + +// enables Activity Stream inspired layout +pref("browser.newtabpage.compact", false); + +// enables showing basic placeholders for missing thumbnails +pref("browser.newtabpage.thumbnailPlaceholder", false); + +// number of rows of newtab grid +pref("browser.newtabpage.rows", 3); + +// number of columns of newtab grid +pref("browser.newtabpage.columns", 5); + +// directory tiles download URL +pref("browser.newtabpage.directory.source", "https://tiles.services.mozilla.com/v3/links/fetch/%LOCALE%/%CHANNEL%"); + +// endpoint to send newtab click and view pings +pref("browser.newtabpage.directory.ping", "https://tiles.services.mozilla.com/v3/links/"); + +// activates the remote-hosted newtab page +pref("browser.newtabpage.remote", false); + +// remote newtab version targeted +pref("browser.newtabpage.remote.version", "1"); + +// Toggles endpoints allowed for remote newtab communications +pref("browser.newtabpage.remote.mode", "production"); + +// content-signature tests for remote newtab +pref("browser.newtabpage.remote.content-signing-test", false); + +// verification keys for remote-hosted newtab page +pref("browser.newtabpage.remote.keys", ""); + +// Enable the DOM fullscreen API. +pref("full-screen-api.enabled", true); + +// Startup Crash Tracking +// number of startup crashes that can occur before starting into safe mode automatically +// (this pref has no effect if more than 6 hours have passed since the last crash) +pref("toolkit.startup.max_resumed_crashes", 3); + +// Completely disable pdf.js as an option to preview pdfs within firefox. +// Note: if this is not disabled it does not necessarily mean pdf.js is the pdf +// handler just that it is an option. +pref("pdfjs.disabled", false); +// Used by pdf.js to know the first time firefox is run with it installed so it +// can become the default pdf viewer. +pref("pdfjs.firstRun", true); +// The values of preferredAction and alwaysAskBeforeHandling before pdf.js +// became the default. +pref("pdfjs.previousHandler.preferredAction", 0); +pref("pdfjs.previousHandler.alwaysAskBeforeHandling", false); + +// The maximum amount of decoded image data we'll willingly keep around (we +// might keep around more than this, but we'll try to get down to this value). +// (This is intentionally on the high side; see bug 746055.) +pref("image.mem.max_decoded_image_kb", 256000); + +pref("social.sidebar.unload_timeout_ms", 10000); + +// Activation from inside of share panel is possible if activationPanelEnabled +// is true. Pref'd off for release while usage testing is done through beta. +pref("social.share.activationPanelEnabled", true); +pref("social.shareDirectory", "https://activations.cdn.mozilla.net/sharePanel.html"); + +// Block insecure active content on https pages +pref("security.mixed_content.block_active_content", true); + +// Show degraded UI for http pages with password fields. +pref("security.insecure_password.ui.enabled", true); + +// Show in-content login form warning UI for insecure login fields +pref("security.insecure_field_warning.contextual.enabled", true); + +// 1 = allow MITM for certificate pinning checks. +pref("security.cert_pinning.enforcement_level", 1); + + +// Override the Gecko-default value of false for Firefox. +pref("plain_text.wrap_long_lines", true); + +// If this turns true, Moz*Gesture events are not called stopPropagation() +// before content. +pref("dom.debug.propagate_gesture_events_through_content", false); + +// The request URL of the GeoLocation backend. +#ifdef RELEASE_OR_BETA +pref("geo.wifi.uri", "https://www.googleapis.com/geolocation/v1/geolocate?key=%GOOGLE_API_KEY%"); +#else +pref("geo.wifi.uri", "https://location.services.mozilla.com/v1/geolocate?key=%MOZILLA_API_KEY%"); +#endif + +#ifdef XP_MACOSX +#ifdef RELEASE_OR_BETA +pref("geo.provider.use_corelocation", false); +#else +pref("geo.provider.use_corelocation", true); +#endif +#endif + +#ifdef XP_WIN +pref("geo.provider.ms-windows-location", false); +#endif + +#ifdef MOZ_WIDGET_GTK +#ifdef MOZ_GPSD +#ifdef RELEASE_OR_BETA +pref("geo.provider.use_gpsd", false); +#else +pref("geo.provider.use_gpsd", true); +#endif +#endif +#endif + +// Necko IPC security checks only needed for app isolation for cookies/cache/etc: +// currently irrelevant for desktop e10s +pref("network.disable.ipc.security", true); + +// CustomizableUI debug logging. +pref("browser.uiCustomization.debug", false); + +// CustomizableUI state of the browser's user interface +pref("browser.uiCustomization.state", ""); + +// The remote content URL shown for FxA signup. Must use HTTPS. +pref("identity.fxaccounts.remote.signup.uri", "https://accounts.firefox.com/signup?service=sync&context=fx_desktop_v3"); + +// The URL where remote content that forces re-authentication for Firefox Accounts +// should be fetched. Must use HTTPS. +pref("identity.fxaccounts.remote.force_auth.uri", "https://accounts.firefox.com/force_auth?service=sync&context=fx_desktop_v3"); + +// The remote content URL shown for signin in. Must use HTTPS. +pref("identity.fxaccounts.remote.signin.uri", "https://accounts.firefox.com/signin?service=sync&context=fx_desktop_v3"); + +// The remote content URL where FxAccountsWebChannel messages originate. +pref("identity.fxaccounts.remote.webchannel.uri", "https://accounts.firefox.com/"); + +// The value of the context query parameter passed in some fxa requests when config +// discovery is enabled. +pref("identity.fxaccounts.contextParam", "fx_desktop_v3"); + +// The URL we take the user to when they opt to "manage" their Firefox Account. +// Note that this will always need to be in the same TLD as the +// "identity.fxaccounts.remote.signup.uri" pref. +pref("identity.fxaccounts.settings.uri", "https://accounts.firefox.com/settings?service=sync&context=fx_desktop_v3"); + +// The remote URL of the FxA Profile Server +pref("identity.fxaccounts.remote.profile.uri", "https://profile.accounts.firefox.com/v1"); + +// The remote URL of the FxA OAuth Server +pref("identity.fxaccounts.remote.oauth.uri", "https://oauth.accounts.firefox.com/v1"); + +// Whether we display profile images in the UI or not. +pref("identity.fxaccounts.profile_image.enabled", true); + +// Token server used by the FxA Sync identity. +pref("identity.sync.tokenserver.uri", "https://token.services.mozilla.com/1.0/sync/1.5"); + +// URLs for promo links to mobile browsers. Note that consumers are expected to +// append a value for utm_campaign. +pref("identity.mobilepromo.android", "https://www.mozilla.org/firefox/android/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_campaign="); +pref("identity.mobilepromo.ios", "https://www.mozilla.org/firefox/ios/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_campaign="); + +// Migrate any existing Firefox Account data from the default profile to the +// Developer Edition profile. +#ifdef MOZ_DEV_EDITION +pref("identity.fxaccounts.migrateToDevEdition", true); +#else +pref("identity.fxaccounts.migrateToDevEdition", false); +#endif + +// On GTK, we now default to showing the menubar only when alt is pressed: +#ifdef MOZ_WIDGET_GTK +pref("ui.key.menuAccessKeyFocuses", true); +#endif + +// Encrypted media extensions. +#ifdef XP_LINUX +// On Linux EME is visible but disabled by default. This is so that the +// "Play DRM content" checkbox in the Firefox UI is unchecked by default. +// DRM requires downloading and installing proprietary binaries, which +// users on an open source operating systems didn't opt into. The first +// time a site using EME is encountered, the user will be prompted to +// enable DRM, whereupon the EME plugin binaries will be downloaded if +// permission is granted. +pref("media.eme.enabled", false); +#else +pref("media.eme.enabled", true); +#endif +pref("media.eme.apiVisible", true); + +// Decode using Gecko Media Plugins in