Closed Bug 992995 Opened 11 years ago Closed 11 years ago

Implement plugin whitelist

Categories

(Core Graveyard :: Plug-ins, defect)

defect
Not set
normal

Tracking

(firefox29 wontfix, firefox30+ verified, firefox31+ verified, relnote-firefox 30+)

VERIFIED FIXED
mozilla31
Tracking Status
firefox29 --- wontfix
firefox30 + verified
firefox31 + verified
relnote-firefox --- 30+

People

(Reporter: benjamin, Assigned: benjamin)

Details

(Keywords: dev-doc-complete, feature, site-compat)

Attachments

(1 file)

This is a rollup for whitelist all of the plugins that have submitted applications and been accepted so far. This includes the following plugins: * bug 979849 - Unity * bug 980133 - Cisco Jabber SDK * bug 980772 - McAfee Security Scanner * bug 981403 - Cisco VGConnect for directv.com * bug 981905 - Cisco Jabber Guest * bug 982045 - Estonian ID card * bug 984441 - coupons.com * bug 987056 - Nexus Personal BankID * bug 988119 - gradecam * bug 988781 - Smart Card Plugin * bug 989096 - Cisco WebEx * bug 990067 - Skype * bug 990068 - Facebook video calling * bug 990069 - MS Office Lync plugin * bug 990286 - VidyoWeb plugin QA for each plugin will be performed by the plugin vendor who submitted the whitelist request.
Attached patch plugin-whitelistSplinter Review
Attachment #8402760 - Flags: review?(georg.fritzsche)
Attachment #8402760 - Flags: review?(georg.fritzsche) → review+
Target Milestone: --- → mozilla31
Comment on attachment 8402760 [details] [diff] [review] plugin-whitelist [Approval Request Comment] Bug caused by (feature/regressing bug #): Feature: turning on CTP plugins by default in Firefox 30 User impact if declined: slip CTP plugins to Firefox 31 Testing completed (on m-c, etc.): Most of the plugin vendors have passed QA that verifies this bug. This is the list which has not yet reported QA results: https://bugzilla.mozilla.org/buglist.cgi?quicksearch=component%3A%22Plugin%20Click-To-Activate%20Whitelist%22%20sw%3Aaccepted%20-sw%3A%22qa%20complete%22&list_id=9946879 Risk to taking this patch (and alternatives if risky): There is low risk of unintentional changes. The risk is all about doing it at all, and we need beta feedback to verify that again. String or IDL/UUID changes made by this patch: None
Attachment #8402760 - Flags: approval-mozilla-aurora?
Status: NEW → RESOLVED
Closed: 11 years ago
Resolution: --- → FIXED
OS: Linux → All
Hardware: x86_64 → All
Attachment #8402760 - Flags: approval-mozilla-aurora? → approval-mozilla-aurora+
Even though each vendor is QAing their own whitelist request I think it would be good for us to give this at least one smoketest pass. Paul, can you take care of this?
Keywords: verifyme
QA Contact: paul.silaghi
Looks like Bogdan Maris is already taking care of some of the testing here: https://etherpad.mozilla.org/Plugin-Whitelist-30b1 Bogdan, can you please report your results when done?
QA Contact: paul.silaghi → bogdan.maris
Sure. We went through all the plugins from comment 0, there were some plugins that we could not install (private, premium account needed etc) or were not available (i.e. on Linux most of them). More details can be found in the etherpad from comment 8. Let me know if there is anything else we should cover here.
I went through all the plugins from comment 0 (except for private, premium account needed, missing linux plugin etc) again using Firefox 31 beta 7. Details about my testing can be found in etherpad https://etherpad.mozilla.org/Plugin-Whitelist-31b7.
Status: RESOLVED → VERIFIED
Keywords: verifyme
Product: Core → Core Graveyard
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: