| Commit message (Collapse) | Author | Age | Lines |
| |
|
| |
|
|
|
|
|
|
| |
and AutomaticAuth, and default to not prompting.
This resolves #1275.
|
|
|
|
| |
This should do it for all the commits to files I changed, but while I'm in here I could probably go ahead and turn ALL the singular if defined statements into ifdef statements by using grep/find on the tree. On the other hand, perhaps we should do that as a separate issue so that this doesn't become a case of scope creep.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
u_int32_t and u_int64_t.
https://bugzilla.mozilla.org/show_bug.cgi?id=1350355
u_int32_t is not an stdint.h type. Windows already requires this, Solaris needs it too. If someone has a nit with this approach, the alternatives include:
1. Just replacing every instance of u_int32_t with uint32_t.
2. Including <sys/types.h> for Solaris only, which does define this.
3. Changing the original ifdef to be WIN32 || XP_SOLARIS
But it really doesn't matter how you solve this problem, all of the approaches are functionally equivalent, and this one has been used in Firefox since version 55. As far as I can tell, all it does is apply a fix that was being done for Windows already to any platform that needs it.
|
|
|
|
|
|
|
|
|
|
| |
gathered together.
https://bugzilla.mozilla.org/show_bug.cgi?id=1158445
https://bugzilla.mozilla.org/show_bug.cgi?id=963983
https://bugzilla.mozilla.org/show_bug.cgi?id=1542758
Solaris madvise and malign don't perfectly map to their POSIX counterparts, and some Linux versions (especially Android) don't define the POSIX counterparts at all, so options are limited. Ideally posix_madvise and posix_malign should be the safer and more portable options for all platforms.
|
| |
|
|
|
|
|
| |
General consensus seems to be that color management on Linux desktops
is not mature enough to enable by default.
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
This prevents cross-file access from files loaded into the browser from
the local file system, further restricting the origin policy of file:
URIs.
Added a pref to control this behavior for local file access if required
for certain applications, since this change might break using the
browser to run applications on the local file system that require
access to local files.
|
|
|
|
|
|
| |
Still allow this to be bypassed with a pref for those really rare corner
cases where images are loaded cross-origin by design and the session
hasn't been/can't be authenticated ahead of time.
|
| |
|
|
|
|
|
| |
- Keep .wake as an alias until we're certain it can be removed.
- Enable SAB memory
|
| |
|
|
|
|
| |
Create a new pref 'dom.meta-set-cookie.enabled' which is set to 'false', disabling http-equiv meta cookies.
|
| |
|
| |
|
|
|
|
| |
See previous commit for removal of browser identity module.
|
| |
|
|
|
|
| |
Issue #186
|
|
|
|
| |
value, r=bsmedberg.
|
|
|
|
|
| |
This should be all that's needed for #1017, but verification of
impact is definitely desired.
|
| |
|
| |
|
|
|
|
|
|
| |
This reverts commit 260b06c1c96285459947231a93f08e413be89dd0.
This fixes #976
|
| |
|
| |
|
| |
|
|
|
|
| |
This reverts commit ac1beef5c10a114afe18897d5d3ced24ac378b92.
|
|
|
|
| |
See #934 and #935.
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
Adds a dedicated handler for performance warnings to be logged to
consoles if known performance-impacting methods are called.
Search service init is changed from a deprecation warning to a
performance warning for synchronous init.
This also re-enables the warning for the Basilisk & Co. search service
initialization which was previously removed in [a930a79]
See also the discussion on #916.
|
|
|
|
| |
This resolves #249
|
| |
|
| |
|
| |
|
|
|
|
| |
This resolves #881
|
|
|
|
| |
This resolves #864
|
|
|
|
|
| |
This reverts commit f62eee7c510238bf93b6ad43acd8b8a79a44417c.
Verified that a hardening patch landed after this already negates what this patch was a stopgap for, so we no longer need it at all.
|
|
|
|
|
| |
This exposes the new pref and also sets the Alt-Svc pref for OE to false.
Basilisk gets a default opt-in for both to stay close to Firefox.
|
|
|
|
|
|
| |
Apparently there is some functional and naming confusion here.
Backing out to re-land after evaluation and possible changes.
Tag #863.
|
|
|
|
| |
Tag #863
|
| |
|
|
|
|
|
|
|
| |
This adds a pref "network.http.opportunistic-encryption" that controls whether
we send an "Upgrade-Insecure-Requests : 1" header on document navigation or not.
This patch modifies the platform network parts. Default for the platform is "true".
Part 1 for #863
|
| |
|
|
|
|
| |
Dev note needed upon release. This resolves #444.
|
|
|
|
| |
Disabled by default.
|
|
|
|
| |
Resolves #823 (alternative suggestion)
|
|
|
|
| |
Fixes #820 (regression).
|