Implement plugin whitelist

VERIFIED FIXED in Firefox 30

Status

()

defect
VERIFIED FIXED
5 years ago
3 years ago

People

(Reporter: benjamin, Assigned: benjamin)

Tracking

({dev-doc-complete, feature, site-compat})

unspecified
mozilla31
Points:
---

Firefox Tracking Flags

(firefox29 wontfix, firefox30+ verified, firefox31+ verified, relnote-firefox 30+)

Details

Attachments

(1 attachment)

Assignee

Description

5 years ago
This is a rollup for whitelist all of the plugins that have submitted applications and been accepted so far. This includes the following plugins:

* bug 979849 - Unity
* bug 980133 - Cisco Jabber SDK
* bug 980772 - McAfee Security Scanner
* bug 981403 - Cisco VGConnect for directv.com
* bug 981905 - Cisco Jabber Guest
* bug 982045 - Estonian ID card
* bug 984441 - coupons.com
* bug 987056 - Nexus Personal BankID
* bug 988119 - gradecam
* bug 988781 - Smart Card Plugin
* bug 989096 - Cisco WebEx
* bug 990067 - Skype
* bug 990068 - Facebook video calling
* bug 990069 - MS Office Lync plugin
* bug 990286 - VidyoWeb plugin

QA for each plugin will be performed by the plugin vendor who submitted the whitelist request.
Assignee

Comment 1

5 years ago
Attachment #8402760 - Flags: review?(georg.fritzsche)
Attachment #8402760 - Flags: review?(georg.fritzsche) → review+
Assignee

Comment 2

5 years ago
https://hg.mozilla.org/integration/fx-team/rev/24fc89305763
Target Milestone: --- → mozilla31
Assignee

Comment 3

5 years ago
Comment on attachment 8402760 [details] [diff] [review]
plugin-whitelist

[Approval Request Comment]
Bug caused by (feature/regressing bug #): Feature: turning on CTP plugins by default in Firefox 30
User impact if declined: slip CTP plugins to Firefox 31
Testing completed (on m-c, etc.): Most of the plugin vendors have passed QA that verifies this bug. This is the list which has not yet reported QA results: https://bugzilla.mozilla.org/buglist.cgi?quicksearch=component%3A%22Plugin%20Click-To-Activate%20Whitelist%22%20sw%3Aaccepted%20-sw%3A%22qa%20complete%22&list_id=9946879

Risk to taking this patch (and alternatives if risky): There is low risk of unintentional changes. The risk is all about doing it at all, and we need beta feedback to verify that again.

String or IDL/UUID changes made by this patch: None
Attachment #8402760 - Flags: approval-mozilla-aurora?
https://hg.mozilla.org/mozilla-central/rev/24fc89305763
Status: NEW → RESOLVED
Closed: 5 years ago
Resolution: --- → FIXED
OS: Linux → All
Hardware: x86_64 → All
Attachment #8402760 - Flags: approval-mozilla-aurora? → approval-mozilla-aurora+
Even though each vendor is QAing their own whitelist request I think it would be good for us to give this at least one smoketest pass. Paul, can you take care of this?
Keywords: verifyme
QA Contact: paul.silaghi
Looks like Bogdan Maris is already taking care of some of the testing here:
https://etherpad.mozilla.org/Plugin-Whitelist-30b1

Bogdan, can you please report your results when done?
QA Contact: paul.silaghi → bogdan.maris
Sure. We went through all the plugins from comment 0, there were some plugins that we could not install (private, premium account needed etc) or were not available (i.e. on Linux most of them). More details can be found in the etherpad from comment 8.

Let me know if there is anything else we should cover here.
I went through all the plugins from comment 0 (except for private, premium account needed, missing linux plugin etc) again using Firefox 31 beta 7. Details about my testing can be found in etherpad https://etherpad.mozilla.org/Plugin-Whitelist-31b7.
Status: RESOLVED → VERIFIED
Keywords: verifyme
You need to log in before you can comment on or make changes to this bug.