]> git.pld-linux.org Git - packages/firefox.git/blame_incremental - mozilla-firefox-prefs.patch
- updated to 3.6.15, fixes:
[packages/firefox.git] / mozilla-firefox-prefs.patch
... / ...
CommitLineData
1diff -ur mozilla.orig/browser/app/profile/firefox.js mozilla/browser/app/profile/firefox.js
2--- mozilla.orig/browser/app/profile/firefox.js 2008-06-21 12:55:30.000000000 +0200
3+++ mozilla/browser/app/profile/firefox.js 2008-06-21 15:25:48.000000000 +0200
4@@ -89,12 +89,12 @@
5 // App-specific update preferences
6
7 // Whether or not app updates are enabled
8-pref("app.update.enabled", true);
9+pref("app.update.enabled", false);
10
11 // This preference turns on app.update.mode and allows automatic download and
12 // install to take place. We use a separate boolean toggle for this to make
13 // the UI easier to construct.
14-pref("app.update.auto", true);
15+pref("app.update.auto", false);
16
17 // Defines how the Application Update Service notifies the user about updates:
18 //
19@@ -186,7 +186,7 @@
20
21 // Whether or not the application should check at startup each time if it
22 // is the default browser.
23-pref("browser.shell.checkDefaultBrowser", true);
24+pref("browser.shell.checkDefaultBrowser", false);
25
26 // 0 = blank, 1 = home (browser.startup.homepage), 2 = last visited page, 3 = resume previous browser session
27 // The behavior of option 3 is detailed at: http://wiki.mozilla.org/Session_Restore
28@@ -391,6 +394,7 @@
29 pref("network.cookie.cookieBehavior", 0); // 0-Accept, 1-dontAcceptForeign, 2-dontUse
30
31 // l12n and i18n
32+pref("intl.locale.matchOS", true);
33 pref("intl.accept_languages", "chrome://global/locale/intl.properties");
34 pref("intl.charsetmenu.browser.static", "chrome://global/locale/intl.properties");
35 pref("intl.charsetmenu.browser.more1", "chrome://global/locale/intl.properties");
36@@ -445,7 +445,7 @@
37 pref("alerts.totalOpenTime", 4000);
38
39 pref("browser.xul.error_pages.enabled", true);
40-pref("browser.xul.error_pages.expert_bad_cert", false);
41+pref("browser.xul.error_pages.expert_bad_cert", true);
42
43 // We want to make sure mail URLs are handled externally...
44 pref("network.protocol-handler.external.mailto", true); // for mail
45@@ -592,10 +592,10 @@
46
47 #ifdef MOZ_SAFE_BROWSING
48 // Safe browsing does nothing unless this pref is set
49-pref("browser.safebrowsing.enabled", true);
50+pref("browser.safebrowsing.enabled", false);
51
52 // Prevent loading of pages identified as malware
53-pref("browser.safebrowsing.malware.enabled", true);
54+pref("browser.safebrowsing.malware.enabled", false);
55
56 // Non-enhanced mode (local url lists) URL list to check for updates
57 pref("browser.safebrowsing.provider.0.updateURL", "http://safebrowsing.clients.google.com/safebrowsing/downloads?client={moz:client}&appver={moz:version}&pver=2.1");
58diff -ur mozilla.orig/browser/locales/en-US/chrome/overrides/netError.dtd mozilla/browser/locales/en-US/chrome/overrides/netError.dtd
59--- mozilla.orig/browser/locales/en-US/chrome/overrides/netError.dtd 2008-06-21 12:55:30.000000000 +0200
60+++ mozilla/browser/locales/en-US/chrome/overrides/netError.dtd 2008-06-22 13:52:26.000000000 +0200
61@@ -175,6 +175,6 @@
62 <!ENTITY securityOverride.warningText "
63 <p>You should not add an exception if you are using an internet connection that you do not trust completely or if you are not used to seeing a warning for this server.</p>
64
65-<xul:button xmlns:xul='http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul' id='getMeOutOfHereButton' label='&securityOverride.getMeOutOfHereButton;'/>
66 <xul:button xmlns:xul='http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul' id='exceptionDialogButton' label='&securityOverride.exceptionButtonLabel;'/>
67+<xul:button xmlns:xul='http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul' id='getMeOutOfHereButton' label='&securityOverride.getMeOutOfHereButton;'/>
68 ">
This page took 0.029188 seconds and 4 git commands to generate.