This is an automated email from the git hooks/post-receive script.
pierov pushed a commit to branch tor-browser-102.2.0esr-12.0-1 in repository tor-browser.
commit 443f5b17e681f26d4062fb0e08eaa2172250c622 Author: Tom Schuster tschuster@mozilla.com AuthorDate: Mon Jun 20 14:46:18 2022 +0000
Bug 1775102 - Disable security.block_fileuri_script_with_wrong_mime outside of early beta or earlier. r=ckerschb a=pascalc
Differential Revision: https://phabricator.services.mozilla.com/D149774 --- dom/security/test/general/browser_file_nonscript.js | 4 ++++ modules/libpref/init/StaticPrefList.yaml | 2 +- 2 files changed, 5 insertions(+), 1 deletion(-)
diff --git a/dom/security/test/general/browser_file_nonscript.js b/dom/security/test/general/browser_file_nonscript.js index e8a8dec7b3df1..052acc49dcf19 100644 --- a/dom/security/test/general/browser_file_nonscript.js +++ b/dom/security/test/general/browser_file_nonscript.js @@ -4,6 +4,10 @@ "use strict";
add_task(async function test_fileurl_nonscript_load() { + await SpecialPowers.pushPrefEnv({ + set: [["security.block_fileuri_script_with_wrong_mime", true]], + }); + let file = getChromeDir(getResolvedURI(gTestPath)); file.append("file_loads_nonscript.html"); let uriString = Services.io.newFileURI(file).spec; diff --git a/modules/libpref/init/StaticPrefList.yaml b/modules/libpref/init/StaticPrefList.yaml index 764b19ff41005..c487b04a35872 100644 --- a/modules/libpref/init/StaticPrefList.yaml +++ b/modules/libpref/init/StaticPrefList.yaml @@ -12081,7 +12081,7 @@ # (OS) mapping when loaded via the file:// protocol. - name: security.block_fileuri_script_with_wrong_mime type: bool - value: true + value: @IS_EARLY_BETA_OR_EARLIER@ mirror: always
# Cancel outgoing requests from SystemPrincipal: