summaryrefslogtreecommitdiffstats
path: root/testing/profiles/mochitest
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-19 00:47:55 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-19 00:47:55 +0000
commit26a029d407be480d791972afb5975cf62c9360a6 (patch)
treef435a8308119effd964b339f76abb83a57c29483 /testing/profiles/mochitest
parentInitial commit. (diff)
downloadfirefox-26a029d407be480d791972afb5975cf62c9360a6.tar.xz
firefox-26a029d407be480d791972afb5975cf62c9360a6.zip
Adding upstream version 124.0.1.upstream/124.0.1
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'testing/profiles/mochitest')
-rw-r--r--testing/profiles/mochitest/user.js24
1 files changed, 24 insertions, 0 deletions
diff --git a/testing/profiles/mochitest/user.js b/testing/profiles/mochitest/user.js
new file mode 100644
index 0000000000..3b8a485045
--- /dev/null
+++ b/testing/profiles/mochitest/user.js
@@ -0,0 +1,24 @@
+// Base preferences file used by the mochitest
+/* globals user_pref */
+/* eslint quotes: 0 */
+
+// Don't restore the last open set of tabs if the browser has crashed
+// or if the profile folder is re-used after an exit(0) fast shutdown.
+user_pref("browser.sessionstore.resume_from_crash", false);
+
+// Better stacks for errors.
+user_pref("javascript.options.asyncstack_capture_debuggee_only", false);
+
+// Don't enable paint suppression when the background is unknown. While paint
+// is suppressed, synthetic click events and co. go to the old page, which can
+// be confusing for tests that send click events before the first paint.
+user_pref("nglayout.initialpaint.unsuppress_with_no_background", true);
+
+// Disable prefers-reduced-motion to ensure that smooth scrolls can be tested.
+user_pref("general.smoothScroll", true);
+
+// Disable secure context pref for testing storage access API.
+// Related Bug: https://bugzilla.mozilla.org/show_bug.cgi?id=1840902.
+// Plan to remove this pref since all tests must be compliant with the
+// storage access API spec for secure contexts.
+user_pref("dom.storage_access.dont_grant_insecure_contexts", false);