Closed Bug 1937136 Opened 3 months ago Closed 2 months ago

Http Exceptionality preferences should be enabled by scotchbonnet pref

Categories

(Firefox :: Address Bar, defect, P3)

Desktop
All
defect

Tracking

()

VERIFIED FIXED
136 Branch
Tracking Status
firefox-esr115 --- unaffected
firefox-esr128 --- unaffected
firefox133 --- disabled
firefox134 --- wontfix
firefox135 --- wontfix
firefox136 --- verified
firefox137 --- verified

People

(Reporter: aflorinescu, Assigned: mak)

References

(Blocks 2 open bugs)

Details

(Whiteboard: [sng])

Attachments

(2 files)

Found in

  • Nightly 134.0b9;

Affected versions

  • 134.0b9
  • most likely 135.0b as well

Tested platforms

  • Affected platforms: Windows 11, Mac 13, Ubuntu 24

Steps to reproduce

  1. Open 134 beta version (nightly135 has different default preferences for this area, but we're assuming these preferences should be controlled by browser.urlbar.scotchBonnet.enableOverride)
  2. Navigate to about:config, flip browser.urlbar.scotchBonnet.enableOverride to true, restarting the browser.
  3. Navigate to about:config and check values for the following preferences:
  • browser.urlbar.trimURLs
  • browser.urlbar.trimHttps
  • browser.urlbar.untrimOnUserInteraction.featureGate
  • dom.security.https_first_schemeless
  • Dom.security.https_first
  • security.insecure_connection_text.enabled

Expected result

  • browser.urlbar.trimURLs true
  • browser.urlbar.trimHttps true
  • browser.urlbar.untrimOnUserInteraction.featureGate true
  • dom.security.https_first_schemeless true
  • Dom.security.https_first false
  • security.insecure_connection_text.enabled true

Actual result

  • browser.urlbar.trimURLs
  • browser.urlbar.trimHttps false
  • browser.urlbar.untrimOnUserInteraction.featureGate false
  • dom.security.https_first_schemeless true
  • Dom.security.https_first false
  • security.insecure_connection_text.enabled false

Regression range

  • N/A
Assignee: nobody → mak
Severity: -- → S3
Status: NEW → ASSIGNED
Priority: -- → P3
Whiteboard: [sng]

To be clear, setting scotchBonnet.enableOverride will not override the value of the pref in about:config, features such as secondaryActions.featureGate will still report false by default, it will only affect when those prefs are read via getScotchBonnetPref

Hower since Marco picked this up I am guessing that some of the prefs that we consider probably should be enabled via getScotchBonnetPref probably arent?

browser.urlbar.untrimOnUserInteraction.featureGate is enabled with scotchBonnet ovverride pref, also dom.security.https_first_schemeless has been released in Firefox 129.
That leaves us with security.insecure_connection_text.enabled and I'm thinking to just enable it in Nightly and uplift to 135. Shouldn't be controversial, it will just be a bit redundant to show both http and the label without Scotch Bonnet, but shouldn't break any workflow.

Attachment #9446332 - Attachment description: Bug 1937136 - Show the label in the address bar for http. r=jteow → Bug 1937136 - Show the not-secure label in the address bar for http. r=jteow
Pushed by mak77@bonardo.net: https://hg.mozilla.org/integration/autoland/rev/801d9915c8f2 Show the not-secure label in the address bar for http. r=jteow https://hg.mozilla.org/integration/autoland/rev/13fc90c67204 Let address bar trimHttps and untrim just be controlled by the ScotchBonnet override. r=jteow
Status: ASSIGNED → RESOLVED
Closed: 2 months ago
Resolution: --- → FIXED
Target Milestone: --- → 136 Branch

The patch landed in nightly and beta is affected.
:mak, is this bug important enough to require an uplift?

  • If yes, please nominate the patch for beta approval.
  • If no, please set status-firefox135 to wontfix.

For more information, please visit BugBot documentation.

Flags: needinfo?(mak)

wontfxing 135 as Scotch Bonnet has been rescheduled to 136, and the not-secure label is not considered critical for Beta testing.

Flags: needinfo?(mak)

Issue is reproducible on Firefox 135.0 on Windows 10.
Verified as fixed on Firefox Nightly 137.0a1 and Firefox 136.0b9 on Windows 10, Ubuntu 22, macOS 14.

Status: RESOLVED → VERIFIED
Flags: qe-verify+
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: