diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-19 00:47:55 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-19 00:47:55 +0000 |
commit | 26a029d407be480d791972afb5975cf62c9360a6 (patch) | |
tree | f435a8308119effd964b339f76abb83a57c29483 /testing/profiles/mochitest | |
parent | Initial commit. (diff) | |
download | firefox-26a029d407be480d791972afb5975cf62c9360a6.tar.xz firefox-26a029d407be480d791972afb5975cf62c9360a6.zip |
Adding upstream version 124.0.1.upstream/124.0.1
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'testing/profiles/mochitest')
-rw-r--r-- | testing/profiles/mochitest/user.js | 24 |
1 files changed, 24 insertions, 0 deletions
diff --git a/testing/profiles/mochitest/user.js b/testing/profiles/mochitest/user.js new file mode 100644 index 0000000000..3b8a485045 --- /dev/null +++ b/testing/profiles/mochitest/user.js @@ -0,0 +1,24 @@ +// Base preferences file used by the mochitest +/* globals user_pref */ +/* eslint quotes: 0 */ + +// Don't restore the last open set of tabs if the browser has crashed +// or if the profile folder is re-used after an exit(0) fast shutdown. +user_pref("browser.sessionstore.resume_from_crash", false); + +// Better stacks for errors. +user_pref("javascript.options.asyncstack_capture_debuggee_only", false); + +// Don't enable paint suppression when the background is unknown. While paint +// is suppressed, synthetic click events and co. go to the old page, which can +// be confusing for tests that send click events before the first paint. +user_pref("nglayout.initialpaint.unsuppress_with_no_background", true); + +// Disable prefers-reduced-motion to ensure that smooth scrolls can be tested. +user_pref("general.smoothScroll", true); + +// Disable secure context pref for testing storage access API. +// Related Bug: https://bugzilla.mozilla.org/show_bug.cgi?id=1840902. +// Plan to remove this pref since all tests must be compliant with the +// storage access API spec for secure contexts. +user_pref("dom.storage_access.dont_grant_insecure_contexts", false); |