mcs/brade: What had been the reason for not using esr as the update channel for the stable series, given that Tor Browser is based on that series?
Kathy and I don't remember all of the details, but probably we knew we needed two update channels for our public releases and chose release and alpha. At this point (assuming we want to support the enterprise policy features), it might be easiest to patch the code mentioned in comment:1.
mcs/brade: What had been the reason for not using esr as the update channel for the stable series, given that Tor Browser is based on that series?
Kathy and I don't remember all of the details, but probably we knew we needed two update channels for our public releases and chose release and alpha. At this point (assuming we want to support the enterprise policy features), it might be easiest to patch the code mentioned in comment:1.
As an "escape hatch", support for enterprise policies can still be disabled by setting browser.policies.testing.disallowEnterprise = false (but I would guess that Mozilla only intends that pref to be used for automated tests).
Trac: Status: new to needs_review Keywords: N/Adeleted, TorBrowserTeam201903R added