为提升您的使用体验,本站正在维护,部分功能暂时无法使用。如果本站文章无法解决您的问题,您想要向社区提问的话,请到 Twitter 上的 @FirefoxSupport 或 Reddit 上的 /r/firefox 提问,我们的支持社区将会很快回复您的疑问。

搜索 | 用户支持

防范以用户支持为名的诈骗。我们绝对不会要求您拨打电话或发送短信,及提供任何个人信息。请使用“举报滥用”选项报告涉及违规的行为。

详细了解

Fontawesome works in chrome but not in firefox

more options

I'm working on a simple webpage and I noticed that fontawesome fonts don't work in Firefox, but it does work in Chrome. Why?

I'm working on a simple webpage and I noticed that fontawesome fonts don't work in Firefox, but it does work in Chrome. Why? <div id="footer-icons"> <a href="#" target="_blank"><i class="fab fa-facebook-f fa-2x" aria-hidden="true"></i></a> <a href="#" target="_blank"><i class="fab fa-twitter fa-2x" aria-hidden="true"></i></a> <a href="#" target="_blank"><i class="fab fa-github fa-2x" aria-hidden="true"></i></a> <a href="#" target="_blank"><i class="fab fa-google-plus-g fa-2x" aria-hidden="true"></i></a> </div>
已附加屏幕截图

被采纳的解决方案

Hi wfarrar, I assume the deployed/live site still looks normal?

Firefox 68 contains a security patch which restricts the kinds of files that pages can load when you open them from a file:// URL. This change was made to prevent exfiltration of valuable data within reach of a local page, as demonstrated in an available exploit.

Font files don't seem that valuable, so hopefully there will be an exception for those in the future.

For now, though, if you need to see fonts retrieved on file:// URLs during local development, you can roll back the patch as follows:

(1) In a new tab, type or paste about:config in the address bar and press Enter/Return. Click the button promising to be careful or accepting the risk.

(2) In the search box above the list, type or paste uniq and pause while the list is filtered

(3) Double-click the privacy.file_unique_origin preference to switch the value from true to false

To mitigate the vulnerability: If you save pages from untrusted sites in a separate folder, e.g., Downloads\Untrusted, then it would be difficult for an attacker to find any valuable content using local file links.

Hopefully all of that will be educational for your students.

定位到答案原位置 👍 2

所有回复 (4)

more options
more options

The first link is for the javascript console but this is not a JavaScript Problem. Not sure how the network monitor helps. The code is correct, it works in Chrome, Safari and IE. This is a Firefox problem.

For now I will inform my students Not to use Firefox, until I can figure out the problem

more options

选择的解决方案

Hi wfarrar, I assume the deployed/live site still looks normal?

Firefox 68 contains a security patch which restricts the kinds of files that pages can load when you open them from a file:// URL. This change was made to prevent exfiltration of valuable data within reach of a local page, as demonstrated in an available exploit.

Font files don't seem that valuable, so hopefully there will be an exception for those in the future.

For now, though, if you need to see fonts retrieved on file:// URLs during local development, you can roll back the patch as follows:

(1) In a new tab, type or paste about:config in the address bar and press Enter/Return. Click the button promising to be careful or accepting the risk.

(2) In the search box above the list, type or paste uniq and pause while the list is filtered

(3) Double-click the privacy.file_unique_origin preference to switch the value from true to false

To mitigate the vulnerability: If you save pages from untrusted sites in a separate folder, e.g., Downloads\Untrusted, then it would be difficult for an attacker to find any valuable content using local file links.

Hopefully all of that will be educational for your students.

more options

wfarrar said

The first link is for the javascript console but this is not a JavaScript Problem.

Have you not used Firefox's Web Console? It would have flagged up a CORS issue retrieving the font files, because the patch redefines "same origin" in the context of file:// URLs. Admittedly, that would not have led you to the workaround, but telling us that's what you saw could have been helpful.