User.js: ToDo: diffs FF65-FF66

Created on 13 Feb 2019  路  12Comments  路  Source: arkenfox/user.js

FF66 is scheduled for release 19th Mar

:exclamation: When updating to FF66, backup your profile just in case (as you should anyway), because the backend for extension storage is changing

FF66 release notes [when ready]
[FF66 for developers](https://developer.mozilla.org/en-US/docs/Mozilla/Firefox/Releases/66)
FF66 compatibility

125 diffs ( 73 new, 29 gone, 23 different )

new in v66.0:

removed, renamed or hidden in v66.0:

DONE - https://github.com/ghacksuserjs/ghacks-user.js/commit/a349662f69d9cf4d9eb90352f589a8ea240be24e

  • [x] errorReporter - 1509888

    • pref("browser.chrome.errorReporter.enabled", false);

    • pref("browser.chrome.errorReporter.submitUrl", "https://sentry.prod.mozaws.net/api/339/store/");

  • [x] pref("network.allow-experiments", true); - 1415625

changed in v66.0:



ignore

click me for details

==NEW

pref("app.normandy.remotesettings.enabled", false);
pref("browser.newtabpage.activity-stream.discoverystream.config", "{\"api_key_pref\":\"extensions.pocket.oAuthConsumerKey\",\"enabled\":false,\"show_spocs\":true,\"layout_endpoint\":\"https://getpocket.com/v3/newtab/layout?version=1&consumer_key=$apiKey&layout_variant=basic\"}");
pref("browser.newtabpage.activity-stream.improvesearch.handoffToAwesomebar", false);
pref("browser.privatebrowsing.searchUI", true);
pref("browser.sanitizer.loglevel", "Warn");
pref("channelclassifier.allowlist_example", false);
pref("devtools.debugger.event-listener-breakpoints", "[]");
pref("devtools.debugger.event-listeners-visible", false);
pref("devtools.debugger.features.event-listeners-breakpoints", false);
pref("devtools.debugger.features.log-points", false);
pref("devtools.debugger.features.original-blackbox", true);
pref("devtools.debugger.features.windowless-workers", false);
pref("devtools.inspector.flexboxHighlighter.combine", false);
pref("devtools.inspector.new-rulesview.enabled", false);
pref("devtools.inspector.scrollable-badges.enabled", false);
pref("devtools.responsive.metaViewport.enabled", false);
pref("devtools.webconsole.input.editor", false);
pref("dom.delay.block_external_protocol_in_iframes", 10);
pref("dom.input_events.conform_to_level_1", true);
pref("dom.inputevent.inputtype.enabled", true);
pref("dom.media.autoplay.autoplay-policy-api", false);
pref("dom.timeout.defer_during_load", true);
pref("dom.timeout.max_idle_defer_ms", 10000);
pref("dom.vr.openvr.action_input", false);
pref("gfx.webrender.all", false);
pref("gfx.webrender.debug.gpu-cache", false);
pref("gfx.webrender.debug.picture-caching", false);
pref("gfx.webrender.debug.primitives", false);
pref("gfx.webrender.debug.texture-cache.disable-shrink", false);
pref("gfx.webrender.enabled", false);
pref("javascript.options.dynamicImport", false);
pref("javascript.options.unboxed_objects", false);
pref("javascript.options.wasm_verbose", false);
pref("layout.css.scroll-anchoring.enabled", true);
pref("layout.css.scroll-anchoring.highlight", false);
pref("layout.dynamic-reflow-roots.enabled", false);
pref("media.autoplay.blackList-override-default", true);
pref("network.process.enabled", false);
pref("pdfjs.disableOpenActionDestination", true);
pref("pdfjs.historyUpdateUrl", false);
pref("performance.adjust_to_machine", false);
pref("performance.low_end_machine", false);
pref("privacy.trackingprotection.cryptomining.enabled", false);
pref("privacy.trackingprotection.fingerprinting.enabled", false);
pref("security.certerrors.permanentOverride", true);
pref("security.remote_settings.intermediates.bucket", "security-state");
pref("security.remote_settings.intermediates.checked", 0);
pref("security.remote_settings.intermediates.collection", "intermediates");
pref("security.remote_settings.intermediates.enabled", false);
pref("security.remote_settings.intermediates.signer", "onecrl.content-signature.mozilla.org");
pref("services.sync.prefs.sync.browser.contentblocking.category", true);
pref("services.sync.prefs.sync.browser.contentblocking.introCount", true);
pref("services.sync.prefs.sync.browser.crashReports.unsubmittedCheck.autoSubmit2", true);
pref("services.sync.prefs.sync.browser.newtabpage.activity-stream.feeds.section.highlights", true);
pref("services.sync.prefs.sync.browser.newtabpage.activity-stream.feeds.section.topstories", true);
pref("services.sync.prefs.sync.browser.newtabpage.activity-stream.feeds.snippets", true);
pref("services.sync.prefs.sync.browser.newtabpage.activity-stream.feeds.topsites", true);
pref("services.sync.prefs.sync.browser.newtabpage.activity-stream.section.highlights.includeBookmarks", true);
pref("services.sync.prefs.sync.browser.newtabpage.activity-stream.section.highlights.includeDownloads", true);
pref("services.sync.prefs.sync.browser.newtabpage.activity-stream.section.highlights.includePocket", true);
pref("services.sync.prefs.sync.browser.newtabpage.activity-stream.section.highlights.includeVisited", true);
pref("services.sync.prefs.sync.browser.newtabpage.activity-stream.section.highlights.rows", true);
pref("services.sync.prefs.sync.browser.newtabpage.activity-stream.section.topstories.rows", true);
pref("services.sync.prefs.sync.browser.newtabpage.activity-stream.showSearch", true);
pref("services.sync.prefs.sync.browser.newtabpage.activity-stream.topSitesRows", true);
pref("services.sync.prefs.sync.browser.taskbar.previews.enable", true);
pref("services.sync.prefs.sync.media.eme.enabled", true);
pref("urlclassifier.features.cryptomining.blacklistTables", "base-cryptomining-track-digest256");
pref("urlclassifier.features.cryptomining.whitelistTables", "mozstd-trackwhite-digest256");
pref("urlclassifier.features.fingerprinting.blacklistTables", "base-fingerprinting-track-digest256");
pref("urlclassifier.features.fingerprinting.whitelistTables", "mozstd-trackwhite-digest256");

==REMOVED or HIDDEN

pref("app.update.download.backgroundInterval", 0);
pref("apz.allow_checkerboarding", true);
pref("browser.chrome.errorReporter.logLevel", "Error");
pref("browser.chrome.errorReporter.projectId", "339");
pref("browser.chrome.errorReporter.publicKey", "c709cb7a2c0b4f0882fcc84a5af161ec");
pref("browser.chrome.errorReporter.sampleRate", "0.001");
pref("devtools.debugger.features.origial-blackbox", false);
pref("devtools.webconsole.jsterm.reverse-search", true);
pref("dom.event.returnValue.enabled", false);
pref("dom.ipc.scheduler.chaoticScheduling", false);
pref("dom.ipc.scheduler.preemption", false);
pref("dom.ipc.scheduler.threadCount", 2);
pref("dom.ipc.scheduler.useMultipleQueues", true);
pref("dom.vr.process.enabled", false);
pref("intl.charset.fallback.utf8_for_file", false);
pref("layout.css.background-blend-mode.enabled", true);
pref("layout.css.box-decoration-break.enabled", true);
pref("layout.css.color-adjust.enabled", true);
pref("layout.css.image-orientation.enabled", true);
pref("layout.css.isolation.enabled", true);
pref("layout.css.mix-blend-mode.enabled", true);
pref("layout.css.overflow.moz-scrollbars.enabled", false);
pref("layout.css.scroll-behavior.property-enabled", true);
pref("media.autoplay.ask-permission", false);
pref("network.http.accept.default", "text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8");
pref("urlclassifier.flashInfobarTable", "except-flashinfobar-digest256");

==CHANGED

pref("app.update.staging.enabled", true); // prev: false
pref("browser.newtabpage.activity-stream.asrouter.providers.onboarding", "{\"id\":\"onboarding\",\"type\":\"local\",\"localProvider\":\"OnboardingMessageProvider\",\"enabled\":true,\"exclude\":[]}"); // prev: "{\"id\":\"onboarding\",\"type\":\"local\",\"localProvider\":\"OnboardingMessageProvider\",\"enabled\":true,\"exclude\":[\"RETURN_TO_AMO_1\"]}"
pref("browser.newtabpage.activity-stream.improvesearch.topSiteSearchShortcuts", true); // prev: false
pref("browser.safebrowsing.provider.mozilla.lists", "base-track-digest256,mozstd-trackwhite-digest256,content-track-digest256,mozplugin-block-digest256,mozplugin2-block-digest256,block-flash-digest256,except-flash-digest256,allow-flashallow-digest256,except-flashallow-digest256,block-flashsubdoc-digest256,except-flashsubdoc-digest256,ads-track-digest256,social-track-digest256,analytics-track-digest256,base-fingerprinting-track-digest256,content-fingerprinting-track-digest256,base-cryptomining-track-digest256,content-cryptomining-track-digest256,fanboyannoyance-ads-digest256,fanboysocial-ads-digest256,easylist-ads-digest256,easyprivacy-ads-digest256,adguard-ads-digest256"); // prev: "base-track-digest256,mozstd-trackwhite-digest256,content-track-digest256,mozplugin-block-digest256,mozplugin2-block-digest256,block-flash-digest256,except-flash-digest256,allow-flashallow-digest256,except-flashallow-digest256,block-flashsubdoc-digest256,except-flashsubdoc-digest256,except-flashinfobar-digest256,ads-track-digest256,social-track-digest256,analytics-track-digest256"
pref("browser.security.newcerterrorpage.enabled", true); // prev: false
pref("browser.security.newcerterrorpage.mitm.enabled", true); // prev: false
pref("dom.ipc.processCount", 8); // prev: 4
pref("dom.keyboardevent.keypress.set_keycode_and_charcode_to_same_value", true); // prev: false
pref("dom.window.event.enabled", true); // prev: false
pref("extensions.webextensions.ExtensionStorageIDB.enabled", true); // prev: false
pref("gfx.webrender.picture-caching", true); // prev: false
pref("html5.flushtimer.initialdelay", 16); // prev: 120
pref("html5.flushtimer.subsequentdelay", 16); // prev: 120
pref("network.http.send_window_size", 1024); // prev: 0
pref("urlclassifier.disallow_completions", "test-malware-simple,test-harmful-simple,test-phish-simple,test-unwanted-simple,test-track-simple,test-trackwhite-simple,test-block-simple,goog-downloadwhite-digest256,base-track-digest256,mozstd-trackwhite-digest256,content-track-digest256,mozplugin-block-digest256,mozplugin2-block-digest256,block-flash-digest256,except-flash-digest256,allow-flashallow-digest256,except-flashallow-digest256,block-flashsubdoc-digest256,except-flashsubdoc-digest256,goog-passwordwhite-proto,ads-track-digest256,social-track-digest256,analytics-track-digest256,base-fingerprinting-track-digest256,content-fingerprinting-track-digest256,base-cryptomining-track-digest256,content-cryptomining-track-digest256,fanboyannoyance-ads-digest256,fanboysocial-ads-digest256,easylist-ads-digest256,easyprivacy-ads-digest256,adguard-ads-digest256"); // prev: "test-malware-simple,test-harmful-simple,test-phish-simple,test-unwanted-simple,test-track-simple,test-trackwhite-simple,test-block-simple,goog-downloadwhite-digest256,base-track-digest256,mozstd-trackwhite-digest256,content-track-digest256,mozplugin-block-digest256,mozplugin2-block-digest256,block-flash-digest256,except-flash-digest256,allow-flashallow-digest256,except-flashallow-digest256,block-flashsubdoc-digest256,except-flashsubdoc-digest256,except-flashinfobar-digest256,goog-passwordwhite-proto,ads-track-digest256,social-track-digest256,analytics-track-digest256"

diffs enhancement task

All 12 comments

some bugzilla tickets

  • app.normandy.remotesettings.enabled
    Bug 1506175 - Fetch recipes from Remote Settings

  • app.update.staging.enabled
    Bug 1505688 - Re-enable update staging on Nightly at the start of the 66 cycle.

  • apz.allow_checkerboarding
    Bug 1514823 - Remove support for apz.allow_checkerboarding=false.

  • breakpad.reportURL
    Bug 618185 - Switch the default URL for sending crash reports to the *.mozilla.org domain

  • browser.chrome.errorReporter.enabled
    Bug 1509888: Remove Browser Error Collection.

  • browser.chrome.errorReporter.logLevel
    Bug 1509888: Remove Browser Error Collection.

  • browser.chrome.errorReporter.projectId
    Bug 1509888: Remove Browser Error Collection.

  • browser.chrome.errorReporter.publicKey
    Bug 1509888: Remove Browser Error Collection.

  • browser.chrome.errorReporter.sampleRate
    Bug 1509888: Remove Browser Error Collection.

  • browser.chrome.errorReporter.submitUrl
    Bug 1509888: Remove Browser Error Collection.

  • browser.newtabpage.activity-stream.improvesearch.handoffToAwesomebar
    Bug 1516044 - Add search hand-off pref to firefox.js

  • browser.newtabpage.activity-stream.improvesearch.topSiteSearchShortcuts
    Bug 1514353 - Turn on topsites search shortcuts in all channels
    Bug 1495517 - Migrate improvesearch.topSiteSearchShortcuts pref from ActivityStream.jsm to firefox.js
    Bug 1495517 - Migrate improvesearch.topSiteSearchShortcuts pref from ActivityStream.jsm to firefox.js.

  • browser.privatebrowsing.searchUI
    Bug 1521961 - Pref Search in PBM OFF by default in 66 Release
    Bug 1508364 - New UI for Private Browsing with Search

  • browser.safebrowsing.provider.mozilla.lists
    Bug 1517641 - [2.0] Rename blocklist names to use a three-part naming scheme.
    Bug 1517641 - [1.0] Add experimental ad-blocking category to the Tracking Protection API.
    Bug 1513490 - Support update cryptomining and fingerprinting list in SafeBrowsing.
    Bug 1519660 - Remove flash info bar from SafeBrowsing list.
    Bug 1509555 - Part 2: Remove the core fastblock code

  • browser.sanitizer.loglevel
    Bug 1524674 - Cleanup site data with custom permissions per subdomains - debug messages.

  • browser.security.newcerterrorpage.mitm.enabled
    Bug 1521756 - Enable AV MitM certificate error page by default on all channels.
    Bug 1450784 - Add a new error page for MOZILLA_PKIX_ERROR_MITM_DETECTED.

  • devtools.inspector.flexboxHighlighter.combine
    Bug 1521612 - Add pref for combined flexbox highlighter

  • devtools.inspector.new-rulesview.enabled
    Bug 1478894 - Part 1: Add an initial boilerplate React/Redux app for the new Rules View.

  • devtools.inspector.scrollable-badges.enabled
    Bug 1521776 - Add new scrollable markup badges;

  • devtools.responsive.metaViewport.enabled
    Bug 1521814 Part 1: Make RDM meta viewport override dependent on a new pref, set to false for now.

  • devtools.webconsole.input.editor
    Bug 1519104 - Create a preference for webconsole editor;r=Honza.

  • devtools.webconsole.jsterm.reverse-search
    Bug 1512289 - Remove webconsole reverse search pref;
    Bug 1512257 - Enable reverse search on every channel;
    Bug 1024913 - Add a preference to enable the reverse search UI;

  • dom.block_external_protocol_in_iframes
    Bug 1522181 - multiple external protocol URL blocker behind pref,

  • dom.delay.block_external_protocol_in_iframes
    Bug 1514547 - Timing token to allow external protocol URLs are blocked in iframes without user-interaction,

  • dom.event.returnValue.enabled
    Bug 1510985 - Remove Event.returnValue temporarily in 64.

  • dom.inputevent.inputtype.enabled
    Bug 1447239 - Implement InputEvent.inputType

  • dom.ipc.scheduler.chaoticScheduling
    Bug 1485216 - remove Scheduler and related code from xpcom/threads;

  • dom.ipc.scheduler.preemption
    Bug 1485216 - remove Scheduler and related code from xpcom/threads;

  • dom.ipc.scheduler.threadCount
    Bug 1485216 - remove Scheduler and related code from xpcom/threads;

  • dom.ipc.scheduler.useMultipleQueues
    Bug 1485216 - remove Scheduler and related code from xpcom/threads;

  • dom.keyboardevent.keypress.set_keycode_and_charcode_to_same_value
    Bug 1479964 - Set KeyboardEvent.keyCode and KeyboardEvent.charCode to same value if the event is "keypress" event

  • dom.media.autoplay.autoplay-policy-api
    Bug 1506290 - part1 : implement 'document.autoplayPolicy'.

  • dom.timeout.defer_during_load
    Bug 1270059: Defer setTimeout/Intervals()s in content during pageload

  • dom.timeout.max_idle_defer_ms
    Bug 1270059: Defer setTimeout/Intervals()s in content during pageload

  • dom.vr.openvr.action_input
    Bug 1496615 - Part 3: Enable OpenVR action input in Nightly.

  • dom.vr.process.enabled
    Bug 1516554 - Enable VR process in Nightly Windows.

  • dom.window.event.enabled
    Bug 1520756 - Disable Window.event, Event.returnValue and setting keyCode and charCode of "keypress" events to same value.
    Bug 1496288 - part 2: Stop dispatching non-printable "keypress" events, set keyCode or charCode value to the other value when it's zero, start to dispatch "keydown" and "keyup" events during composition, and enable window.event by default
    Bug 1503019 - Part I, Remove dom.webcomponents.shadowdom.enabled

  • extensions.webextensions.ExtensionStorageIDB.enabled
    Bug 1488825 - Enable ExtensionStorageIDB backend on all channels.

  • gfx.webrender.debug.gpu-cache
    Bug 1515521 - Support the gpu-cache debugger in Firefox.

  • gfx.webrender.debug.picture-caching
    Bug 1520275 - Add primitive debug display.

  • gfx.webrender.debug.primitives
    Bug 1520275 - Add primitive debug display.

  • gfx.webrender.debug.texture-cache.disable-shrink
    Bug 1441308 - Add pref to disable texture cache clear

  • gfx.webrender.picture-caching
    Bug 1518405 - Turn on picture caching in webrender.
    Bug 1510725 - Add a pref to enable picture caching in WebRender.

  • intl.charset.fallback.utf8_for_file
    Bug 1071816 - Support loading unlabeled/BOMless UTF-8 text/html and text/plain files from file: URLs.

  • javascript.options.dynamicImport
    Bug 1342012 - Initial browser support for dynamic import from module scripts

  • javascript.options.wasm_verbose
    Bug 1507939 - Baldr: add javascript.options.wasm_verbose (r=lth)

  • layout.css.background-blend-mode.enabled
    Bug 1517682 - Drop layout.css.background-blend-mode.enabled pref.

  • layout.css.box-decoration-break.enabled
    Bug 1517682 - Drop layout.css.box-decoration-break.enabled pref.

  • layout.css.color-adjust.enabled
    Bug 1517682 - Drop layout.css.color-adjust.enabled pref.

  • layout.css.image-orientation.enabled
    Bug 1517682 - Drop layout.css.image-orientation.enabled pref.

  • layout.css.isolation.enabled
    Bug 1517682 - Drop layout.css.isolation.enabled pref.

  • layout.css.mix-blend-mode.enabled
    Bug 1517682 - Drop layout.css.mix-blend-mode.enabled pref.

  • layout.css.overflow.moz-scrollbars.enabled
    Bug 1521399 - Remove layout.css.overflow.moz-scrollbars.enabled.
    Bug 1481125 - Put overflow: -moz-scrollbar-* behind pref.

  • layout.css.scroll-anchoring.enabled
    Bug 1305957 part 1 - Add 'layout.scroll-anchoring.enabled' preference behind nightly flag.

  • layout.css.scroll-anchoring.highlight
    Bug 1305957 part 13 - Highlight scroll anchor when 'layout.scroll-anchoring.highlight' is enabled.

  • layout.css.scroll-behavior.property-enabled
    Bug 1517682 - Drop layout.css.scroll-behavior.property-enabled pref.

  • layout.dynamic-reflow-roots.enabled
    Bug 1510369 part 3: Add about:config pref 'layout.dynamic-reflow-roots.enabled' (enabled by default).

  • media.autoplay.ask-permission
    Bug 1513039 - part11 : remove pref 'media.autoplay.ask-permission'.
    Bug 1512283 - Turn off doorhanger in Nightly.

  • media.autoplay.blackList-override-default
    Bug 1520088 - part5 - add pref to control whether blacklist can override the default setting.

  • media.autoplay.default
    Bug 1513039 - part10 : remove nsIAutoplay.PROMPT
    Bug 1487844 - turn on the blocking-autoplay by default for all branches.
    Bug 1512283 - Turn off doorhanger in Nightly.

  • media.autoplay.enabled.user-gestures-needed
    Bug 1487844 - turn on the blocking-autoplay by default for all branches.

  • network.allow-experiments
    Bug 1415625 - Use Telemetry::CanRecordPreReleaseData instead of toolkit.telemetry.enabled. Remove network.allow-experiments because it is not used.

  • network.http.accept.default
    Bug 1417463 - Default accept header should follow the fetch spec,
    Bug 1507691 - Add image/webp to default HTTP Accept header.

  • network.http.send_window_size
    Bug 1514065 - resume the bp-suspension if the divsersion starts
    Bug 1513135 - disable flow control of HTTP e10s back pressure

  • network.process.enabled
    Bug 1513057 - P1: Start the new socket process basics (prefs, full xpcom init, logging, no sandboxing)

  • performance.adjust_to_machine
    Bug 1503339 - try using a lower frame rate for low-end devices

  • performance.low_end_machine
    Bug 1503339 - try using a lower frame rate for low-end devices

  • privacy.trackingprotection.cryptomining.enabled
    Bug 1513300 - Implement Cryptomining URL-Classifier,

  • privacy.trackingprotection.fingerprinting.enabled
    Bug 1513298 - Fingerprinting url-classifier feature,

  • security.certerrors.permanentOverride
    Bug 1492498 - Make certificate exceptions on the new cert error pages permanent by default.

  • security.remote_settings.intermediates.bucket
    Bug 657228: Preload all known intermediate certificates for CAs in our root store

  • security.remote_settings.intermediates.checked
    Bug 657228: Preload all known intermediate certificates for CAs in our root store

  • security.remote_settings.intermediates.collection
    Bug 657228: Preload all known intermediate certificates for CAs in our root store

  • security.remote_settings.intermediates.enabled
    Bug 657228: Preload all known intermediate certificates for CAs in our root store

  • security.remote_settings.intermediates.signer
    Bug 657228: Preload all known intermediate certificates for CAs in our root store

  • services.sync.prefs.sync.browser.contentblocking.category
    Bug 1512397 - Sync the content blocking settings stored in the profile;

  • services.sync.prefs.sync.browser.contentblocking.introCount
    Bug 1512397 - Sync the content blocking settings stored in the profile;

  • services.sync.prefs.sync.browser.crashReports.unsubmittedCheck.autoSubmit2
    Bug 1522424 - Sync Allow Firefox to send backlogged crash reports on your behalf option

  • services.sync.prefs.sync.browser.newtabpage.activity-stream.feeds.section.highlights
    Bug 1490163 - Sync the Firefox Home Content prefs.

  • services.sync.prefs.sync.browser.newtabpage.activity-stream.feeds.section.topstories
    Bug 1490163 - Sync the Firefox Home Content prefs.

  • services.sync.prefs.sync.browser.newtabpage.activity-stream.feeds.snippets
    Bug 1490163 - Sync the Firefox Home Content prefs.

  • services.sync.prefs.sync.browser.newtabpage.activity-stream.feeds.topsites
    Bug 1490163 - Sync the Firefox Home Content prefs.

  • services.sync.prefs.sync.browser.newtabpage.activity-stream.section.highlights.includeBookmarks
    Bug 1490163 - Sync the Firefox Home Content prefs.

  • services.sync.prefs.sync.browser.newtabpage.activity-stream.section.highlights.includeDownloads
    Bug 1490163 - Sync the Firefox Home Content prefs.

  • services.sync.prefs.sync.browser.newtabpage.activity-stream.section.highlights.includePocket
    Bug 1490163 - Sync the Firefox Home Content prefs.

  • services.sync.prefs.sync.browser.newtabpage.activity-stream.section.highlights.includeVisited
    Bug 1490163 - Sync the Firefox Home Content prefs.

  • services.sync.prefs.sync.browser.newtabpage.activity-stream.section.highlights.rows
    Bug 1490163 - Sync the Firefox Home Content prefs.

  • services.sync.prefs.sync.browser.newtabpage.activity-stream.section.topstories.rows
    Bug 1490163 - Sync the Firefox Home Content prefs.

  • services.sync.prefs.sync.browser.newtabpage.activity-stream.showSearch
    Bug 1490163 - Sync the Firefox Home Content prefs.

  • services.sync.prefs.sync.browser.newtabpage.activity-stream.topSitesRows
    Bug 1490163 - Sync the Firefox Home Content prefs.

  • services.sync.prefs.sync.browser.taskbar.previews.enable
    Bug 1521716 - Sync Show tab previews in the Windows taskbar option

  • services.sync.prefs.sync.media.eme.enabled
    Bug 1521715 - Sync Play DRM-controlled content option

  • urlclassifier.disallow_completions
    Bug 1517641 - [2.0] Rename blocklist names to use a three-part naming scheme.
    Bug 1517641 - [1.0] Add experimental ad-blocking category to the Tracking Protection API.
    Bug 1513490 - Support update cryptomining and fingerprinting list in SafeBrowsing.
    Bug 1519660 - Remove flash info bar from SafeBrowsing list.
    Bug 1509555 - Part 2: Remove the core fastblock code

  • urlclassifier.features.cryptomining.blacklistTables
    Bug 1521493 - Add fingerprinting and cryptomining tables to SafeBrowsing update list.
    Bug 1513490 - Support update cryptomining and fingerprinting list in SafeBrowsing.

  • urlclassifier.features.cryptomining.whitelistTables
    Bug 1521493 - Add fingerprinting and cryptomining tables to SafeBrowsing update list.
    Bug 1513490 - Support update cryptomining and fingerprinting list in SafeBrowsing.

  • urlclassifier.features.fingerprinting.blacklistTables
    Bug 1521493 - Add fingerprinting and cryptomining tables to SafeBrowsing update list.
    Bug 1513490 - Support update cryptomining and fingerprinting list in SafeBrowsing.

  • urlclassifier.features.fingerprinting.whitelistTables
    Bug 1521493 - Add fingerprinting and cryptomining tables to SafeBrowsing update list.
    Bug 1513490 - Support update cryptomining and fingerprinting list in SafeBrowsing.

  • urlclassifier.flashInfobarTable
    Bug 1519660 - Remove flash info bar from SafeBrowsing list.

security.remote_settings.intermediates.*

See: https://wiki.mozilla.org/Firefox/RemoteSettings

14 days ago .. waiting on you. Edit: even did the deprecated sticky

  • channelclassifier.allowlist_example - safebrowsing related + is just a test pref anyway. 1511436 - safe to ignore
  • dom.media.autoplay.autoplay-policy-api - still default false and we can ignore it for now
  • media.autoplay.blackList-override-default - apparently makes sure site permissions take precedent over global autoplay allow/deny setting. Default true is fine and no need to add this to the user.js IMO.
  • network.process.enabled - still default false atm. ignore for now
  • pdfjs.* - not my problem
  • security.certerrors.permanentOverride - questionable but an argument can be made for and against it. probably fine to go with the default and ignore
  • extensions.webextensions.ExtensionStorageIDB.enabled - nothing to do with privacy/security. ignore
  • media.autoplay.enabled.user-gestures-needed - I guess this combined with media.autoplay.default=1 disables autoplay until a user interacts with a site

66.0 changes since 66.0b7

new

pref("browser.newtabpage.activity-stream.discoverystream.config", "{\"api_key_pref\":\"extensions.pocket.oAuthConsumerKey\",\"enabled\":false,\"show_spocs\":true,\"layout_endpoint\":\"https://getpocket.com/v3/newtab/layout?version=1&consumer_key=$apiKey&layout_variant=basic\"}"); // v66.0b7: {\"enabled\":false,\"show_spocs\":true,\"layout_endpoint\":\"https://getpocket.com/v3/newtab/layout?version=1&consumer_key=40249-e88c401e1b1f2242d9e441c4&layout_variant=basic\"}
pref("browser.privatebrowsing.searchUI", true); // false in v66.0b7
pref("javascript.options.unboxed_objects", false);
pref("layout.dynamic-reflow-roots.enabled", false); // true in v66.0b7

changed

pref("app.update.channel", "beta"); // prev: "release"
pref("app.update.url.details", "https://www.mozilla.org/%LOCALE%/firefox/beta/notes"); // prev: "https://www.mozilla.org/%LOCALE%/firefox/notes"
pref("app.update.url.manual", "https://www.mozilla.org/firefox/beta"); // prev: "https://www.mozilla.org/firefox/"

pref("browser.newtabpage.activity-stream.asrouter.providers.onboarding", "{\"id\":\"onboarding\",\"type\":\"local\",\"localProvider\":\"OnboardingMessageProvider\",\"enabled\":true,\"exclude\":[]}"); // prev: "{\"id\":\"onboarding\",\"type\":\"local\",\"localProvider\":\"OnboardingMessageProvider\",\"enabled\":true,\"exclude\":[\"RETURN_TO_AMO_1\"]}"
pref("browser.safebrowsing.downloads.remote.url", "https://sb-ssl.google.com/safebrowsing/clientreport/download?key=%GOOGLE_SAFEBROWSING_API_KEY%"); // prev: "https://sb-ssl.google.com/safebrowsing/clientreport/download?key=%GOOGLE_API_KEY%"
pref("browser.safebrowsing.provider.google.updateURL", "https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2&key=%GOOGLE_SAFEBROWSING_API_KEY%"); // prev: "https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2&key=%GOOGLE_API_KEY%"
pref("browser.safebrowsing.provider.google4.dataSharingURL", "https://safebrowsing.googleapis.com/v4/threatHits?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSING_API_KEY%&$httpMethod=POST"); // prev: "https://safebrowsing.googleapis.com/v4/threatHits?$ct=application/x-protobuf&key=%GOOGLE_API_KEY%&$httpMethod=POST"
pref("browser.safebrowsing.provider.google4.gethashURL", "https://safebrowsing.googleapis.com/v4/fullHashes:find?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSING_API_KEY%&$httpMethod=POST"); // prev: "https://safebrowsing.googleapis.com/v4/fullHashes:find?$ct=application/x-protobuf&key=%GOOGLE_API_KEY%&$httpMethod=POST"
pref("browser.safebrowsing.provider.google4.updateURL", "https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSING_API_KEY%&$httpMethod=POST"); // prev: "https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGLE_API_KEY%&$httpMethod=POST"

pref("browser.security.newcerterrorpage.enabled", true); // prev: false
pref("extensions.webcompat-reporter.enabled", true); // prev: false
pref("geo.wifi.uri", "https://www.googleapis.com/geolocation/v1/geolocate?key=%GOOGLE_LOCATION_SERVICE_API_KEY%"); // prev: "https://www.googleapis.com/geolocation/v1/geolocate?key=%GOOGLE_API_KEY%"
pref("media.autoplay.default", 1); // prev: 0
pref("toolkit.telemetry.enabled", true); // prev: false

moved javascript.options.unboxed_objects from new to ignore and browser.newtabpage.activity-stream.asrouter.providers.onboarding + browser.security.newcerterrorpage.enabled from changed to ignore.

browser.newtabpage.activity-stream.feeds.discoverystreamfeed handles new pocket ui for the new tab page

bump... wanna do something with these?

  • browser.newtabpage.activity-stream.feeds.discoverystreamfeed - what exactly does it do. If we already disable pocket being shown, then this new UI change is a nothing-burger. Right? So we can ignore it?
  • media.autoplay.enabled.user-gestures-needed - how do we word this. Can you find a bugzilla for me to read?
  • I'm so tired
  • I miss :cat2: .. do you think Batman finally got him?

@Thorin-Oakenpants

browser.newtabpage.activity-stream.feeds.discoverystreamfeed - what exactly does it do. If we already disable pocket being shown, then this new UI change is a nothing-burger. Right? So we can ignore it?

I can not find information about this. Mozilla never give out information about their patches. Only superficial, where it is not written in detail. I (and U) constantly have to search Google for "What the hell does this preference mean?" And Google says this to me "Who the Fuck knows? I IDK. Dick knows".

Jesus help.


media.autoplay.enabled.user-gestures-needed - how do we word this. Can you find a bugzilla for me to read?

IDK look this:

http://forums.mozillazine.org/viewtopic.php?p=14813334

according to S枚ren Hentzschel media.autoplay.enabled is deprecated and no longer available

bugzilla
https://bugzilla.mozilla.org/show_bug.cgi?id=1420389 !
https://bugzilla.mozilla.org/show_bug.cgi?id=1376321 !
https://bugzilla.mozilla.org/show_bug.cgi?id=1427966
https://bugzilla.mozilla.org/show_bug.cgi?id=1407113

perhaps the earth will find better.

Yeah, sorry - that was all directed at the Big E, because I'm tired and can't be F'ed right now. I didn't search myself, and I know what the pref does, kind of (from another issue here at this repo), but wanted to read what the devs said it is meant to do: i.e I want to get the wording right when I draft something

according to S枚ren Hentzschel media.autoplay.enabled is deprecated and no longer available

yes, we already have that marked as removed in FF63+ in the user.js along with the relevant bugzilla where it was deprecated

:disappointed:

browser.newtabpage.activity-stream.feeds.discoverystreamfeed - FF67 will have a bunch more of these discoverystreamfeed prefs. I'd say let's just kill this shit now and add this pref to 0105c

  • media.autoplay.enabled.user-gestures-needed - how do we word this

IDK. 2 things to note though: setting it to false can apparently completely break playing videos on certain sites, and setting it to false also blocks autoplay of muted videos (and audio?).
The former can probably be worked around by using a site permission and the latter is IMO a good thing anyway because it stops sites from abusing the soon-to-be default config by starting a video muted and then changing the volume a second later or so.

Thanks Pants for doing this one pretty much all by yourself! :kiss:

Was this page helpful?
0 / 5 - 0 ratings

Related issues

grauenwolfe picture grauenwolfe  路  7Comments

crssi picture crssi  路  4Comments

GIPeon picture GIPeon  路  3Comments

Thorin-Oakenpants picture Thorin-Oakenpants  路  5Comments

Thorin-Oakenpants picture Thorin-Oakenpants  路  3Comments