Skip to content

Commit c83670f

Browse files
1100's: goodbye e10s section
1 parent c399bb1 commit c83670f

File tree

1 file changed

+4
-46
lines changed

1 file changed

+4
-46
lines changed

user.js

Lines changed: 4 additions & 46 deletions
Original file line numberDiff line numberDiff line change
@@ -645,52 +645,6 @@ user_pref("browser.shell.shortcutFavicons", false);
645645
/* 1032: disable favicons in web notifications ***/
646646
user_pref("alerts.showFavicons", false);
647647

648-
/*** 1100: MULTI-PROCESS (e10s) [RESTART]
649-
We recommend you let Firefox handle this. Until e10s is enforced, if
650-
- all your legacy extensions have the 'multiprocessCompatible' flag as true, then FF = e10s
651-
- any legacy extensions have 'multiprocessCompatible' flag as false, then FF != e10s
652-
- any legacy extensions are missing the 'multiprocessCompatible' flag, then they *might* be disabled
653-
[1] https://blog.mozilla.org/addons/2017/02/16/the-road-to-firefox-57-compatibility-milestones/
654-
***/
655-
user_pref("_user.js.parrot", "1100 syntax error: the parrot's bought the farm!");
656-
/* 1101: start the browser in e10s mode (FF48+)
657-
* about:support>Application Basics>Multiprocess Windows ***/
658-
// user_pref("browser.tabs.remote.autostart", true);
659-
// user_pref("browser.tabs.remote.autostart.2", true); // (FF49+) (hidden pref)
660-
// user_pref("browser.tabs.remote.force-enable", true); // (hidden pref)
661-
// user_pref("extensions.e10sBlocksEnabling", false);
662-
/* 1102: control number of content rendering processes
663-
* [SETTING] Options>General>Performance>Custom>Content process limit
664-
* [1] https://www.ghacks.net/2016/02/15/change-how-many-processes-multi-process-firefox-uses/
665-
* [2] https://bugzilla.mozilla.org/show_bug.cgi?id=1207306 ***/
666-
// user_pref("dom.ipc.processCount", 4);
667-
/* 1103: enable extension code to run in a separate process (webext-oop) (FF53+)
668-
* [1] https://wiki.mozilla.org/WebExtensions/Implementing_APIs_out-of-process ***/
669-
// user_pref("extensions.webextensions.remote", true);
670-
/* 1104: enforce separate content process for file://URLs (FF53+)
671-
* [1] https://bugzilla.mozilla.org/show_bug.cgi?id=1147911
672-
* [2] https://www.ghacks.net/2016/11/27/firefox-53-exclusive-content-process-for-local-files/ ***/
673-
user_pref("browser.tabs.remote.separateFileUriProcess", true);
674-
/* 1105: enable console shim warnings for legacy extensions with the 'multiprocessCompatible' flag as false ***/
675-
user_pref("dom.ipc.shims.enabledWarnings", true);
676-
/* 1106: control number of extension processes ***/
677-
// user_pref("dom.ipc.processCount.extension", 1);
678-
/* 1107: control number of file processes ***/
679-
// user_pref("dom.ipc.processCount.file", 1);
680-
/* 1108: block web content in file processes (FF55+)
681-
* [WARNING] [SETUP] You may want to disable this for corporate or developer environments
682-
* [1] https://bugzilla.mozilla.org/show_bug.cgi?id=1343184 ***/
683-
user_pref("browser.tabs.remote.allowLinkedWebInFileUriProcess", false);
684-
/* 1110: set sandbox level. DO NOT MEDDLE WITH THESE. They are included to inform you NOT to play
685-
* with them. The values are integers, but the code below deliberately contains a data mismatch
686-
* [1] https://wiki.mozilla.org/Security/Sandbox
687-
* [2] https://www.ghacks.net/2017/01/23/how-to-change-firefoxs-sandbox-security-level/#comment-4105173 ***/
688-
// user_pref("security.sandbox.content.level", "donotuse");
689-
// user_pref("dom.ipc.plugins.sandbox-level.default", "donotuse");
690-
// user_pref("dom.ipc.plugins.sandbox-level.flash", "donotuse");
691-
/* 1111: enable sandbox logging ***/
692-
// user_pref("security.sandbox.logging.enabled", true);
693-
694648
/*** 1200: HTTPS ( SSL/TLS / OCSP / CERTS / HSTS / HPKP / CIPHERS )
695649
Note that your cipher and other settings can be used server side as a fingerprint attack
696650
vector, see [1] (It's quite technical but the first part is easy to understand
@@ -1145,6 +1099,10 @@ user_pref("dom.push.userAgentID", "");
11451099

11461100
/*** 2400: DOM (DOCUMENT OBJECT MODEL) & JAVASCRIPT ***/
11471101
user_pref("_user.js.parrot", "2400 syntax error: the parrot's kicked the bucket!");
1102+
/* 2401: block web content in file processes (FF55+)
1103+
* [WARNING] [SETUP] You may want to disable this for corporate or developer environments
1104+
* [1] https://bugzilla.mozilla.org/show_bug.cgi?id=1343184 ***/
1105+
user_pref("browser.tabs.remote.allowLinkedWebInFileUriProcess", false);
11481106
/* 2402: disable website access to clipboard events/content
11491107
* [WARNING] This will break some sites functionality such as pasting into facebook, wordpress
11501108
* this applies to onCut, onCopy, onPaste events - i.e. you have to interact with

0 commit comments

Comments
 (0)