From e73bde8d8432146f81b1ab7c6773cfc3ec0b0f91 Mon Sep 17 00:00:00 2001 From: ohfp <1813007-ohfp@users.noreply.gitlab.com> Date: Sat, 2 May 2020 13:26:47 +0200 Subject: [PATCH] include recent cfg changes from master branch; cleanup .js files --- dist/docs/settings/controversial.md | 9 + dist/docs/settings/defaulting.md | 7 + dist/docs/settings/esr-60.md | 13 + dist/docs/settings/general.md | 115 +++- dist/docs/settings/ghacks-user.md | 38 ++ dist/docs/settings/ijwytsu.md | 14 + dist/docs/settings/locale-time-ua.md | 2 +- dist/docs/settings/urlbar.md | 33 ++ dist/docs/settings/user_settings/auto-play.md | 9 +- dist/docs/settings/user_settings/history.md | 7 + .../user_settings/tracking-protection.md | 14 + dist/librewolf.cfg | 36 +- librewolf.cfg/controversial.json | 7 + librewolf.cfg/defaulting.json | 6 + librewolf.cfg/disabled-on-off.js | 270 ---------- librewolf.cfg/esr-60.json | 9 + librewolf.cfg/extensions.js | 110 ---- librewolf.cfg/general.js | 55 -- librewolf.cfg/general.json | 94 +++- librewolf.cfg/ghacks-user.json | 33 +- librewolf.cfg/ijwytsu.js | 498 ------------------ librewolf.cfg/ijwytsu.json | 12 + librewolf.cfg/locale-time-ua.json | 2 +- librewolf.cfg/urlbar.json | 31 ++ librewolf.cfg/user-settings/auto-play.json | 8 +- librewolf.cfg/user-settings/history.json | 27 +- .../user-settings/tracking-protection.json | 12 + 27 files changed, 505 insertions(+), 966 deletions(-) create mode 100644 dist/docs/settings/urlbar.md delete mode 100644 librewolf.cfg/disabled-on-off.js delete mode 100644 librewolf.cfg/extensions.js delete mode 100644 librewolf.cfg/general.js delete mode 100644 librewolf.cfg/ijwytsu.js create mode 100644 librewolf.cfg/urlbar.json diff --git a/dist/docs/settings/controversial.md b/dist/docs/settings/controversial.md index bdb6748..0b3e4c9 100644 --- a/dist/docs/settings/controversial.md +++ b/dist/docs/settings/controversial.md @@ -62,3 +62,12 @@ Status: **locked** Value: `false` +## `network.http.spdy.websockets` + +**Unused Setting** + +Status: **locked** + +Value: `false` + + diff --git a/dist/docs/settings/defaulting.md b/dist/docs/settings/defaulting.md index 213979b..78f9d99 100644 --- a/dist/docs/settings/defaulting.md +++ b/dist/docs/settings/defaulting.md @@ -54,6 +54,13 @@ Status: **unlocked** Value: `2` +## `browser.aboutConfig.showWarning` + +Status: **unlocked** + +Value: `false` + + ## `browser.download.autohideButton` Status: **unlocked** diff --git a/dist/docs/settings/esr-60.md b/dist/docs/settings/esr-60.md index 961f726..b8fb879 100644 --- a/dist/docs/settings/esr-60.md +++ b/dist/docs/settings/esr-60.md @@ -107,6 +107,19 @@ Value: `0` *Disable Java NPAPI plugin* +## `trailhead.firstrun.branches` + +Status: **locked** + +Value: `"join-privacy"` + + + +### References + +[https://github.com/ghacksuserjs/ghacks-user.js/issues/743](https://github.com/ghacksuserjs/ghacks-user.js/issues/743) + + ## `services.blocklist.update_enabled` Status: **locked** diff --git a/dist/docs/settings/general.md b/dist/docs/settings/general.md index 17c8344..5b39e0d 100644 --- a/dist/docs/settings/general.md +++ b/dist/docs/settings/general.md @@ -207,14 +207,14 @@ Value: `0` Status: **locked** -Value: `""` +Value: `"https://gitlab.com/librewolf-community/browser"` ## `app.update.url.manual` Status: **locked** -Value: `""` +Value: `"https://gitlab.com/librewolf-community/browser"` ## `app.vendorURL` @@ -731,6 +731,33 @@ Status: **locked** Value: `""` +## `geo.provider.ms-windows-location` + +Status: **locked** + +Value: `false` + +*Disable using the OS's geolocation service: Windows* + + +## `geo.provider.use_corelocation` + +Status: **locked** + +Value: `false` + +*Disable using the OS's geolocation service: Mac* + + +## `geo.provider.use_gpsd` + +Status: **locked** + +Value: `false` + +*Disable using the OS's geolocation service: Linux* + + ## `identity.fxaccounts.auth.uri` Status: **locked** @@ -759,6 +786,27 @@ Status: **locked** Value: `""` +## `remote.enabled` + +Status: **locked** + +Value: `false` + + +## `remote.force-local` + +Status: **locked** + +Value: `true` + + +## `remote.log.level` + +Status: **locked** + +Value: `"Info"` + + ## `layout.css.visited_links_enabled` Status: **locked** @@ -810,6 +858,41 @@ Status: **locked** Value: `false` +## `network.connectivity-service.enabled` + +Status: **locked** + +Value: `false` + + +## `network.connectivity-service.IPv6.url` + +Status: **locked** + +Value: `"http://0.0.0.0"` + + +## `network.connectivity-service.IPv4.url` + +Status: **locked** + +Value: `"http://0.0.0.0"` + + +## `network.connectivity-service.DNSv6.domain` + +Status: **locked** + +Value: `""` + + +## `network.connectivity-service.DNSv4.domain` + +Status: **locked** + +Value: `""` + + ## `plugins.crash.supportUrl` Status: **locked** @@ -1094,6 +1177,13 @@ Value: `true` *Disable telemetry* +## `toolkit.telemetry.ecosystemtelemetry.enabled` + +Status: **locked** + +Value: `false` + + ## `webextensions.storage.sync.serverURL` Status: **locked** @@ -2382,3 +2472,24 @@ Value: `true` [https://developer.mozilla.org/en-US/docs/Mozilla/Preferences/Preference_reference/browser.pagethumbnails.capturing_disabled](https://developer.mozilla.org/en-US/docs/Mozilla/Preferences/Preference_reference/browser.pagethumbnails.capturing_disabled) +## `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features` + +Status: **locked** + +Value: `false` + + +## `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons` + +Status: **locked** + +Value: `false` + + +## `browser.messaging-system.whatsNewPanel.enabled` + +Status: **locked** + +Value: `false` + + diff --git a/dist/docs/settings/ghacks-user.md b/dist/docs/settings/ghacks-user.md index 28b6560..747150e 100644 --- a/dist/docs/settings/ghacks-user.md +++ b/dist/docs/settings/ghacks-user.md @@ -17,6 +17,27 @@ Status: **locked** Value: `true` +## `browser.discovery.enabled` + +Status: **locked** + +Value: `false` + + +## `browser.discovery.containers.enabled` + +Status: **locked** + +Value: `false` + + +## `browser.discovery.sites` + +Status: **locked** + +Value: `""` + + ## `browser.download.manager.addToRecentDocs` Status: **locked** @@ -108,6 +129,13 @@ Status: **locked** Value: `""` +## `targetBlankNoOpener.enabled` + +Status: **locked** + +Value: `true` + + ## `security.data_uri.block_toplevel_data_uri_navigations` Status: **locked** @@ -397,10 +425,20 @@ Value: `true` ## `dom.IntersectionObserver.enabled` +**Unused Setting** + Status: **locked** Value: `false` +*Disabling this breaks the network panel.* + + + +### References + +[https://github.com/ghacksuserjs/ghacks-user.js/issues/737](https://github.com/ghacksuserjs/ghacks-user.js/issues/737) + ## `accessibility.force_disabled` diff --git a/dist/docs/settings/ijwytsu.md b/dist/docs/settings/ijwytsu.md index 9bd2d54..7a22ccd 100644 --- a/dist/docs/settings/ijwytsu.md +++ b/dist/docs/settings/ijwytsu.md @@ -45,6 +45,20 @@ Status: **locked** Value: `false` +## `extensions.htmlaboutaddons.discovery.api_url` + +Status: **locked** + +Value: `""` + + +## `extensions.htmlaboutaddons.discover.enabled` + +Status: **locked** + +Value: `false` + + ## `extensions.htmlaboutaddons.recommendations.enabled` Status: **locked** diff --git a/dist/docs/settings/locale-time-ua.md b/dist/docs/settings/locale-time-ua.md index 67408a0..fdb0964 100644 --- a/dist/docs/settings/locale-time-ua.md +++ b/dist/docs/settings/locale-time-ua.md @@ -35,7 +35,7 @@ Value: `"en-US"` Status: **unlocked** -Value: `"Mozilla/5.0 (Windows NT 6.1; rv:45.0) Gecko/20100101 Firefox/45.0, 45"` +Value: `"Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0"` ## `general.appname.override` diff --git a/dist/docs/settings/urlbar.md b/dist/docs/settings/urlbar.md new file mode 100644 index 0000000..b15efcf --- /dev/null +++ b/dist/docs/settings/urlbar.md @@ -0,0 +1,33 @@ +--- +title: Urlbar +--- + + Includes temporary fixes to disable the "Megabar" functionality. +## `browser.urlbar.openViewOnFocus` + +Status: **locked** + +Value: `false` + + +## `browser.urlbar.update1` + +Status: **locked** + +Value: `false` + + +## `browser.urlbar.update1.interventions` + +Status: **locked** + +Value: `false` + + +## `browser.urlbar.update1.searchTips` + +Status: **locked** + +Value: `false` + + diff --git a/dist/docs/settings/user_settings/auto-play.md b/dist/docs/settings/user_settings/auto-play.md index b5ce78d..0b0635a 100644 --- a/dist/docs/settings/user_settings/auto-play.md +++ b/dist/docs/settings/user_settings/auto-play.md @@ -7,6 +7,13 @@ title: Autoplay Status: **locked** -Value: `2` +Value: `5` + + +## `media.autoplay.enabled.user-gestures-needed` + +Status: **locked** + +Value: `false` diff --git a/dist/docs/settings/user_settings/history.md b/dist/docs/settings/user_settings/history.md index baf5129..32e62ec 100644 --- a/dist/docs/settings/user_settings/history.md +++ b/dist/docs/settings/user_settings/history.md @@ -155,6 +155,13 @@ Status: **locked** Value: `true` +## `privacy.storagePrincipal.enabledForTrackers` + +Status: **locked** + +Value: `false` + + ## `browser.formfill.expire_days` **Unused Setting** diff --git a/dist/docs/settings/user_settings/tracking-protection.md b/dist/docs/settings/user_settings/tracking-protection.md index a76a9a1..d061040 100644 --- a/dist/docs/settings/user_settings/tracking-protection.md +++ b/dist/docs/settings/user_settings/tracking-protection.md @@ -17,6 +17,13 @@ Status: **locked** Value: `false` +## `privacy.trackingprotection.origin_telemetry.enabled` + +Status: **locked** + +Value: `false` + + ## `privacy.trackingprotection.lower_network_priority` Status: **locked** @@ -31,6 +38,13 @@ Status: **locked** Value: `false` +## `telemetry.origin_telemetry_test_mode.enabled` + +Status: **locked** + +Value: `false` + + ## `urlclassifier.trackingTable` Status: **locked** diff --git a/dist/librewolf.cfg b/dist/librewolf.cfg index 23c5bd6..8cd3e3d 100644 --- a/dist/librewolf.cfg +++ b/dist/librewolf.cfg @@ -27,6 +27,8 @@ lockPref("gecko.handlerService.schemes.ircs.0.uriTemplate", ""); lockPref("toolkit.coverage.enabled", ""); lockPref("extensions.webapi.testing", ""); lockPref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr", ""); +lockPref("extensions.htmlaboutaddons.discovery.api_url", ""); +lockPref("extensions.htmlaboutaddons.discover.enabled", ""); lockPref("extensions.htmlaboutaddons.recommendations.enabled", ""); lockPref("browser.newtabpage.activity-stream.asrouter.providers.cfr", ""); lockPref("browser.newtabpage.activity-stream.asrouter.providers.cfr-fxa", ""); @@ -252,6 +254,14 @@ lockPref("security.ssl3.ecdh_rsa_rc4_128_sha", ""); lockPref("security.ssl3.rsa_seed_sha", ""); +// Urlbar + +lockPref("browser.urlbar.openViewOnFocus", ""); +lockPref("browser.urlbar.update1", ""); +lockPref("browser.urlbar.update1.interventions", ""); +lockPref("browser.urlbar.update1.searchTips", ""); + + // Protection lockPref("general.config.filename", ""); @@ -360,10 +370,16 @@ lockPref("gecko.handlerService.schemes.mailto.1.uriTemplate", ""); lockPref("gecko.handlerService.schemes.webcal.0.uriTemplate", ""); lockPref("geo.enabled", ""); lockPref("geo.wifi.uri", ""); +lockPref("geo.provider.ms-windows-location", ""); +lockPref("geo.provider.use_corelocation", ""); +lockPref("geo.provider.use_gpsd", ""); lockPref("identity.fxaccounts.auth.uri", ""); lockPref("identity.fxaccounts.remote.oauth.uri", ""); lockPref("identity.fxaccounts.remote.profile.uri", ""); lockPref("identity.mobilepromo.ios", ""); +lockPref("remote.enabled", ""); +lockPref("remote.force-local", ""); +lockPref("remote.log.level", ""); lockPref("layout.css.visited_links_enabled", ""); lockPref("lpbmode.enabled", ""); lockPref("mailnews.messageid_browser.url", ""); @@ -371,6 +387,11 @@ lockPref("mailnews.mx_service_url", ""); lockPref("network.predictor.enabled", ""); lockPref("network.predictor.cleaned-up", ""); lockPref("network.predictor.enable-prefetch", ""); +lockPref("network.connectivity-service.enabled", ""); +lockPref("network.connectivity-service.IPv6.url", ""); +lockPref("network.connectivity-service.IPv4.url", ""); +lockPref("network.connectivity-service.DNSv6.domain", ""); +lockPref("network.connectivity-service.DNSv4.domain", ""); lockPref("plugins.crash.supportUrl", ""); lockPref("services.sync.clients.lastSync", ""); lockPref("services.sync.clients.lastSyncLocal", ""); @@ -409,6 +430,7 @@ lockPref("toolkit.telemetry.server_owner", ""); lockPref("toolkit.telemetry.shutdownPingSender.enabled", ""); lockPref("toolkit.telemetry.unified", ""); lockPref("toolkit.telemetry.coverage.opt-out", ""); +lockPref("toolkit.telemetry.ecosystemtelemetry.enabled", ""); lockPref("webextensions.storage.sync.serverURL", ""); lockPref("extensions.screenshots.upload-disabled", ""); lockPref("network.http.referer.trimmingPolicy", ""); @@ -527,12 +549,18 @@ lockPref("network.negotiate-auth.allow-insecure-ntlm-v1-https", ""); lockPref("signon.formlessCapture.enabled", ""); lockPref("browser.helperApps.deleteTempFileOnExit", ""); lockPref("browser.pagethumbnails.capturing_disabled", ""); +lockPref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features", ""); +lockPref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons", ""); +lockPref("browser.messaging-system.whatsNewPanel.enabled", ""); // ghacks user.js lockPref("toolkit.coverage.endpoint.base", ""); lockPref("toolkit.coverage.opt-out", ""); +lockPref("browser.discovery.enabled", ""); +lockPref("browser.discovery.containers.enabled", ""); +lockPref("browser.discovery.sites", ""); lockPref("browser.download.manager.addToRecentDocs", ""); lockPref("browser.download.hide_plugins_without_extensions", ""); lockPref("webchannel.allowObject.urlWhitelist", ""); @@ -546,6 +574,7 @@ lockPref("dom.push.enabled", ""); lockPref("dom.push.connection.enabled", ""); lockPref("dom.push.serverURL", ""); lockPref("dom.push.userAgentID", ""); +lockPref("targetBlankNoOpener.enabled", ""); lockPref("security.data_uri.block_toplevel_data_uri_navigations", ""); lockPref("ui.use_standins_for_native_colors", ""); lockPref("services.blocklist.onecrl.collection", ""); @@ -587,7 +616,6 @@ lockPref("dom.disable_window_open_feature.status", ""); lockPref("dom.disable_window_open_feature.titlebar", ""); lockPref("dom.disable_window_open_feature.toolbar", ""); lockPref("dom.disable_window_move_resize", ""); -lockPref("dom.IntersectionObserver.enabled", ""); lockPref("accessibility.force_disabled", ""); lockPref("browser.uitour.enabled", ""); lockPref("browser.uitour.url", ""); @@ -605,6 +633,7 @@ lockPref("experiments.supported", ""); lockPref("network.jar.block-remote-files", ""); lockPref("network.jar.open-unsafe-types", ""); lockPref("plugin.state.java", ""); +lockPref("trailhead.firstrun.branches", ""); lockPref("services.blocklist.update_enabled", ""); lockPref("shield.savant.enabled", ""); @@ -644,6 +673,7 @@ defaultPref("network.http.referer.defaultPolicy.pbmode", ""); defaultPref("privacy.userContext.ui.enabled", ""); defaultPref("privacy.userContext.enabled", ""); defaultPref("privacy.userContext.longPressBehavior", ""); +defaultPref("browser.aboutConfig.showWarning", ""); defaultPref("browser.download.autohideButton", ""); defaultPref("accessibility.typeaheadfind", ""); defaultPref("clipboard.autocopy", ""); @@ -694,6 +724,7 @@ lockPref("browser.shell.checkDefaultBrowser", ""); // User Settings: Autoplay lockPref("media.autoplay.default", ""); +lockPref("media.autoplay.enabled.user-gestures-needed", ""); // User Settings: Start Page @@ -721,6 +752,7 @@ defaultPref("privacy.sanitize.sanitizeOnShutdown", ""); defaultPref("places.history.enabled", ""); defaultPref("places.history.expiration.max_pages", ""); defaultPref("privacy.history.custom", ""); +lockPref("privacy.storagePrincipal.enabledForTrackers", ""); // User Settings: Do Not Track @@ -739,8 +771,10 @@ lockPref("permissions.default.geo", ""); lockPref("privacy.trackingprotection.enabled", ""); lockPref("privacy.trackingprotection.annotate_channels", ""); +lockPref("privacy.trackingprotection.origin_telemetry.enabled", ""); lockPref("privacy.trackingprotection.lower_network_priority", ""); lockPref("privacy.trackingprotection.pbmode.enabled", ""); +lockPref("telemetry.origin_telemetry_test_mode.enabled", ""); lockPref("urlclassifier.trackingTable", ""); lockPref("pref.privacy.disable_button.change_blocklist", ""); lockPref("browser.contentblocking.reportBreakage.enabled", ""); diff --git a/librewolf.cfg/controversial.json b/librewolf.cfg/controversial.json index 2a968bd..4517379 100644 --- a/librewolf.cfg/controversial.json +++ b/librewolf.cfg/controversial.json @@ -49,6 +49,13 @@ "type": "lockPref", "key": "network.http.spdy.enabled.http2", "value": false + }, + { + "enabled": false, + "comments": "", + "type": "lockPref", + "key": "network.http.spdy.websockets", + "value": false } ] } diff --git a/librewolf.cfg/defaulting.json b/librewolf.cfg/defaulting.json index 9c827c8..4e67248 100644 --- a/librewolf.cfg/defaulting.json +++ b/librewolf.cfg/defaulting.json @@ -47,6 +47,12 @@ "key": "privacy.userContext.longPressBehavior", "value": 2 }, + { + "comments": "", + "type": "defaultPref", + "key": "browser.aboutConfig.showWarning", + "value": false + }, { "comments": "", "type": "defaultPref", diff --git a/librewolf.cfg/disabled-on-off.js b/librewolf.cfg/disabled-on-off.js deleted file mode 100644 index de821a3..0000000 --- a/librewolf.cfg/disabled-on-off.js +++ /dev/null @@ -1,270 +0,0 @@ -// - Disabled - Section OFF ----------------------------------------------------------------- - -// Pref : Don't remember browsing history -// MIGRATED to defaulting section, this setting does not need to be enforced -//lockPref("places.history.enabled", false); - -// Pref : Clear all history on shutdown -// MIGRATED to defaulting section, this setting does not need to be enforced -// This setting may be enforced here if preferred -//lockPref("privacy.sanitize.sanitizeOnShutdown", true); - -// Pref : 2804: reset default history items to clear with Ctrl-Shift-Del (to match above) -// This dialog can also be accessed from the menu History>Clear Recent History -// Firefox remembers your last choices. This will reset them when you start Firefox. -// [NOTE] Regardless of what you set privacy.cpd.downloads to, as soon as the dialog -// for "Clear Recent History" is opened, it is synced with 'privacy.cpd.history' -//defaultPref("privacy.cpd.siteSettings", false); // Site Preferences -//defaultPref("privacy.cpd.downloads", true); // not used, see note above -//defaultPref("privacy.cpd.cache", true); -//defaultPref("privacy.cpd.cookies", true); -//defaultPref("privacy.cpd.formdata", true); // Form & Search History -//defaultPref("privacy.cpd.history", true); // Browsing & Download History -//defaultPref("privacy.cpd.offlineApps", true); // Offline Website Data -//defaultPref("privacy.cpd.passwords", false); // this is not listed -//defaultPref("privacy.cpd.sessions", true); // Active Logins -// Not needed // replaced by //defaultPref("privacy.sanitize.sanitizeOnShutdown", true); -// Also default value are already good - -// Pref : 2803: set which history items are to be cleared on shutdown -// [SETTING] Privacy & Security>History>Custom Settings>Clear history when Firefox closes>Settings -// [NOTE] If 'history' is true, downloads will also be cleared regardless of the value -// but if 'history' is false, downloads can still be cleared independently -// However, this may not always be the case. The interface combines and syncs these -// prefs when set from there, and the sanitize code may change at any time -//defaultPref("privacy.clearOnShutdown.siteSettings", false); // Site Preferences -//defaultPref("privacy.clearOnShutdown.cache", true); -//defaultPref("privacy.clearOnShutdown.cookies", true); -//defaultPref("privacy.clearOnShutdown.downloads", true); // see note above -//defaultPref("privacy.clearOnShutdown.formdata", true); // Form & Search History -//defaultPref("privacy.clearOnShutdown.history", true); // Browsing & Download History -//defaultPref("privacy.clearOnShutdown.offlineApps", true); // Offline Website Data -//defaultPref("privacy.clearOnShutdown.sessions", true); // Active Logins -// Make panel locked (bug) -// replaced by //defaultPref("privacy.sanitize.sanitizeOnShutdown", true); - -// Pref : 0801: disable location bar using search - PRIVACY -// don't leak typos to a search engine; give an error message instead -//lockPref("keyword.enabled", false); -// Beak search from url bar -// After other settings, this does not send any data to search. - -// Pref : Disable Firefox Account -//lockPref("identity.fxaccounts.enabled", false); //Deprecated Active -// Already disabled in policies.json - -// Pref : 2609: disable MathML (Mathematical Markup Language) (FF51+) -// [TEST] http://browserspy.dk/mathml.php -// [1] https://bugzilla.mozilla.org/1173199 -//lockPref("mathml.disabled", true); -// This setting is a fingerprint in itself - -// Pref : 2304: disable web notifications -// [1] https://developer.mozilla.org/docs/Web/API/Notifications_API -//lockPref("dom.webnotifications.enabled", false); // (FF22+) -//lockPref("dom.webnotifications.serviceworker.enabled", false); // (FF44+) -// After tuning, this is no longer a privacy issue but a feature - -// Pref : History sessionhistory -//lockPref("browser.sessionhistory.max_total_viewers", 0); - -// Pref : 0850f: disable location bar suggesting local search history (FF57+) -// [1] https://bugzilla.mozilla.org/1181644 -//lockPref("browser.urlbar.maxHistoricalSearchSuggestions", 0); // max. number of search suggestions -// No privacy issue here - -// Pref : 1020: disable the Session Restore service completely -// [SETUP-CHROME] This also disables the "Recently Closed Tabs" feature -// It does not affect "Recently Closed Windows" or any history. -//lockPref("browser.sessionstore.max_tabs_undo", 0); -//lockPref("browser.sessionstore.max_windows_undo", 0); -// Not really a privacy issue, but it's useful to have this feature - -// Pref : Disable URL bar autocomplete and history/bookmark suggestion dropdown -//lockPref("browser.urlbar.autocomplete.enabled", false); -//lockPref("browser.urlbar.suggest.history", false); -//lockPref("browser.urlbar.suggest.bookmark", false); -//lockPref("browser.urlbar.suggest.openpage", false); -// This does not cause privacy/leaking issues - -// Pref : 2605: block web content in file processes (FF55+) -// [SETUP-WEB] You may want to disable this for corporate or developer environments -// [1] https://bugzilla.mozilla.org/1343184 -//lockPref("browser.tabs.remote.allowLinkedWebInFileUriProcess", false); -// Not an issue - -// DOWNLOADS -// Pref : 2650: discourage downloading to desktop (0=desktop 1=downloads 2=last used) -// [SETTING] To set your default "downloads", set General>Downloads>Save files to -//lockPref("browser.download.folderList", 2); -// Pref : 2651: enforce user interaction for security by always asking the user where to download -// [SETTING] General>Downloads>Always ask you where to save files -//lockPref("browser.download.useDownloadDir", false); -// Pref : 2654: disable "open with" in download dialog (FF50+) -// This is very useful to enable when the browser is sandboxed (e.g. via AppArmor) -// in such a way that it is forbidden to run external applications. -// [SETUP-CHROME] This may interfere with some users' workflow or methods -// [1] https://bugzilla.mozilla.org/1281959 -//lockPref("browser.download.forbid_open_with", true); -// Not an issue - -// OCSP (Online Certificate Status Protocol) -// OCSP leaks the visited sites. Exactly same issue as with safebrowsing. -// Stapling forces the site to prove that its certificate is good -// through the CA, so apparently nothing is leaked in this case. -// [1] https://blog.mozilla.org/security/2013/07/29/ocsp-stapling-in-firefox/ -// Pref : 1211: control when to use OCSP fetching (to confirm current validity of certificates) -// 0=disabled, 1=enabled (default), 2=enabled for EV certificates only -// OCSP (non-stapled) leaks information about the sites you visit to the CA (cert authority) -// It's a trade-off between security (checking) and privacy (leaking info to the CA) -// [NOTE] This pref only controls OCSP fetching and does not affect OCSP stapling -// [1] https://en.wikipedia.org/wiki/Ocsp -//lockPref("security.OCSP.enabled", 1); - -// Pref : 1212: set OCSP fetch failures (non-stapled, see 1211) to hard-fail [SETUP-WEB] -// When a CA cannot be reached to validate a cert, Firefox just continues with the connection (=soft-fail) -// Setting this pref to true tells Firefox to terminate the connection instead (=hard-fail) -// It is pointless to soft-fail when an OCSP fetch fails: you cannot confirm that the cert is still valid (it -// could have been revoked) and/or you could be under attack (e.g. malicious blocking of OCSP servers) -// [1] https://blog.mozilla.org/security/2013/07/29/ocsp-stapling-in-firefox/ -// [2] https://www.imperialviolet.org/2014/04/19/revchecking.html -//lockPref("security.OCSP.require", true); - -// Pref : 1022: disable resuming session from crash [SETUP-CHROME] -//lockPref("browser.sessionstore.resume_from_crash", false); -// Not really a privacy issue, but it's useful to have this feature - -// Pref : 0103: set HOME+NEWWINDOW page -// about:home=Activity Stream (default, see 0105), custom URL, about:blank -// [SETTING] Home>New Windows and Tabs>Homepage and new windows -//lockPref("browser.startup.homepage", "about:blank"); -// Let the user have the choice, and easily change it - -// Pref : 2740: disable service workers cache and cache storage -// [1] https://w3c.github.io/ServiceWorker/#privacy -//lockPref("dom.caches.enabled", false); -// Not really a privacy issue, but it's useful to have this feature -// Other settings solve privacy issues related to this - -// Pref : First-party isolation -// https://bugzilla.mozilla.org/show_bug.cgi?id=1299996 -// https://bugzilla.mozilla.org/show_bug.cgi?id=1260931 -// https://wiki.mozilla.org/Security/FirstPartyIsolation -// First-party isolation breaks Microsoft Teams -// First-party isolation causes HTTP basic auth to ask for credentials for every new tab (see #425) -// Solved by extension -// Pref : 4001: enable First Party Isolation (FF51+) -// [SETUP-WEB] May break cross-domain logins and site functionality until perfected -// [1] https://bugzilla.mozilla.org/1260931 -// enabled via addons -//lockPref("privacy.firstparty.isolate", true); -// Pref : 4002: enforce FPI restriction for window.opener (FF54+) -// [NOTE] Setting this to false may reduce the breakage in 4001 -// [FF65+] blocks postMessage with targetOrigin "*" if originAttributes don't match. But -// to reduce breakage it ignores the 1st-party domain (FPD) originAttribute. (see [2],[3]) -// The 2nd pref removes that limitation and will only allow communication if FPDs also match. -// [1] https://bugzilla.mozilla.org/1319773#c22 -// [2] https://bugzilla.mozilla.org/1492607 -// [3] https://developer.mozilla.org/en-US/docs/Web/API/Window/postMessage -//lockPref("privacy.firstparty.isolate.restrict_opener_access", true); // default: true -// lockPref("privacy.firstparty.isolate.block_post_message", true); // (hidden pref) -// Enforced with addon - -// Pref : 0102: set START page (0=blank, 1=home, 2=last visited page, 3=resume previous session) -// [SETTING] General>Startup>Restore previous session -//lockPref("browser.startup.page", 0); -// Let the user choose over settings page - -// Pref : 1001: disable disk cache -//lockPref("browser.cache.disk.enable", false); -//lockPref("browser.cache.disk.capacity", 0); -//lockPref("browser.cache.disk.smart_size.enabled", false); -//lockPref("browser.cache.disk.smart_size.first_run", false); -// Pref : 1003: disable memory cache -// [NOTE] Not recommended due to performance issues -// lockPref("browser.cache.memory.enable", false); -// lockPref("browser.cache.memory.capacity", 0); // (hidden pref) -// This is overkill. Disabled for performance. -// Firefox should be run in a container: sandbox or otherwise - -// Pref : New tab page -//lockPref("browser.newtabpage.enabled", false); -// New page site shortcuts does not spy after tunning. May be enabled if preferred. - -// Pref : Disable in-content SVG rendering (Firefox >= 53) (disabled) -// Disabling SVG support breaks many UI elements on many sites -// https://bugzilla.mozilla.org/show_bug.cgi?id=1216893 -//lockPref("svg.disabled", true); -// Solved by extension - -// Pref : Disable Caching of SSL Pages -// CIS Version 1.2.0 October 21st, 2011 2.5.8 -// http://kb.mozillazine.org/Browser.cache.disk_cache_ssl -//lockPref("browser.cache.disk_cache_ssl", false); - -// Pref : 2212 : limit events that can cause a popup -// default is "change click dblclick mouseup pointerup notificationclick reset submit touchend" -// [1] http://kb.mozillazine.org/Dom.popup_allowed_events -//lockPref("dom.popup_allowed_events", "click dblclick"); -// This does not cause privacy/leaking issues -// Also already set in "dom.popup_maximum" - -// Pref : 2031 : disable audio auto-play in non-active tabs (FF51+) -// [1] https://www.ghacks.net/2016/11/14/firefox-51-blocks-automatic-audio-playback-in-non-active-tabs/ -//lockPref("media.block-autoplay-until-in-foreground", true); -// Not privacy/security related - -// Pref : 2403 : disable clipboard commands (cut/copy) from "non-privileged" content (FF41+) -// this disables document.execCommand("cut"/"copy") to protect your clipboard -// [1] https://bugzilla.mozilla.org/1170911 -//lockPref("dom.allow_cut_copy", false); // (hidden pref) -// Not an issue - -// Pref : 1405 : disable WOFF2 (Web Open Font Format) (FF35+) -//lockPref("gfx.downloadable_fonts.woff2.enabled", false); -// Solved by extension - -// Pref : 1406 : disable CSS Font Loading API -// Disabling fonts can uglify the web a fair bit. -//lockPref("layout.css.font-loading-api.enabled", false); -// Solved by extension - -// - Disabled - Dumped Disabled From (gHacks, Check user.js for description) ---------------- - -//lockPref("browser.chrome.site_icons", false); -//lockPref("browser.library.activity-stream.enabled", false); -//lockPref("browser.privatebrowsing.autostart", true); -//lockPref("browser.urlbar.maxRichResults", 0); -//lockPref("dom.storage.enabled", false); -//lockPref("dom.storageManager.enabled", false); -//lockPref("extensions.screenshots.disabled", true); -//lockPref("extensions.webextensions.restrictedDomains", ""); -//lockPref("font.name.monospace.x-unicode", "Lucida Console"); -//lockPref("font.name.monospace.x-western", "Lucida Console"); -//lockPref("font.name.sans-serif.x-unicode", "Arial"); -//lockPref("font.name.sans-serif.x-western", "Arial"); -//lockPref("font.name.serif.x-unicode", "Georgia"); -//lockPref("font.name.serif.x-western", "Georgia"); -//lockPref("font.system.whitelist", ""); -//lockPref("full-screen-api.enabled", false); -//lockPref("gfx.downloadable_fonts.enabled", false); -//lockPref("gfx.downloadable_fonts.fallback_delay", -1); -//lockPref("javascript.options.baselinejit", false); -//lockPref("javascript.options.ion", false); -//lockPref("media.media-capabilities.enabled", false); -//lockPref("network.dnsCacheEntries", 400); -//lockPref("network.dnsCacheExpiration", 60); -//lockPref("network.ftp.enabled", false); -//lockPref("permissions.default.camera", 2); -//lockPref("permissions.default.desktop-notification", 2); -//lockPref("permissions.default.microphone", 2); -//lockPref("permissions.default.shortcuts", 2); -//lockPref("privacy.window.maxInnerHeight", 900); -//lockPref("privacy.window.maxInnerWidth", 1600); -//lockPref("security.insecure_connection_text.pbmode.enabled", true); -//lockPref("security.nocertdb", true); -//lockPref("security.ssl3.dhe_rsa_aes_128_sha", false); -//lockPref("security.ssl3.dhe_rsa_aes_256_sha", false); -//lockPref("security.ssl3.ecdhe_ecdsa_aes_128_sha", false); -//lockPref("security.ssl3.ecdhe_rsa_aes_128_sha", false); -//lockPref("urlclassifier.trackingTable", "test-track-simple,base-track-digest256"); diff --git a/librewolf.cfg/esr-60.json b/librewolf.cfg/esr-60.json index 36c8aae..d081347 100644 --- a/librewolf.cfg/esr-60.json +++ b/librewolf.cfg/esr-60.json @@ -70,6 +70,15 @@ "key": "plugin.state.java", "value": 0 }, + { + "comments": "", + "type": "lockPref", + "key": "trailhead.firstrun.branches", + "value": "join-privacy", + "references": [ + "https://github.com/ghacksuserjs/ghacks-user.js/issues/743" + ] + }, { "comments": "Enable Kinto blocklist updates (FF50+)", "notes": "As Firefox transitions to Kinto, the blocklists have been broken down into entries for certs to be revoked, extensions and plugins to be disabled, and gfx environments that cause problems or crashes", diff --git a/librewolf.cfg/extensions.js b/librewolf.cfg/extensions.js deleted file mode 100644 index 6ad61a2..0000000 --- a/librewolf.cfg/extensions.js +++ /dev/null @@ -1,110 +0,0 @@ -// ---------------------------------------------------------------------------------- -// Extensions Firewalling - Blocking Domains : -// ------------------------------------------- - -// !!!!!!!!!!!!!!!!!!! Important !!!!!!!!!!!!!!!!!!! -// Please check readme section "Extensions Firewall" - -// Pref : Restricted Domains I/II -// This will allow extensions to work everywhere -defaultPref("extensions.webextensions.restrictedDomains", ""); -// Default Value : available in "debug-notes.log" - -// Pref : Restricted Domains II/II -// Old restrictedDomains implementation -// Redirect basedomain used by identity api -lockPref("extensions.webextensions.identity.redirectDomain", ""); -// Default Value : "extensions.allizom.org" - -// ---------------------------------------------------------------------------------- -// Extensions Firewalling - Blocking The Network : -// ----------------------------------------------- - -// !!!!!!!!!!!!!!!!!!! Important !!!!!!!!!!!!!!!!!!! -// Please check readme section "Extensions Firewall" - -// Pref : CSP Settings For Extensions I/II : Extension Firewall Feature -// Uncomment to disable network for the extensions -// Enable-Firewall-Feature-In-The-Next-Line extensions-firewall >>>>>> -defaultPref("extensions.webextensions.base-content-security-policy", "script-src 'self' https://* moz-extension: blob: filesystem: 'unsafe-eval' 'unsafe-inline'; object-src 'self' https://* moz-extension: blob: filesystem:;"); - -// Pref : CSP Settings For Extensions II/II : Extension Firewall Feature -// This value is applied after the first one (just ignore this) -//defaultPref("extensions.webextensions.default-content-security-policy", "script-src 'self'; object-src 'self';"); -// Default Value : "script-src 'self'; object-src 'self';" - -// ---------------------------------------------------------------------------------- -// Extensions Firewalling - CSP Main Settings : -// --------------------------------------------- - -// !!!!!!!!!!!!!!!!!!! Important !!!!!!!!!!!!!!!!!!! -// Please check readme section "Extensions Firewall" - -// Pref : CSP Main Settings I/II : -// Those are default values for CSP -// Those are not meant to to be uncommented -//defaultPref("security.csp.enable", true); //This is its default value -//defaultPref("security.csp.enableStrictDynamic", true); //This is its default value -//defaultPref("security.csp.enable_violation_events", true); //This is its default value -//defaultPref("security.csp.experimentalEnabled", false); //This is its default value -//defaultPref("security.csp.reporting.script-sample.max-length", 40); //This is its default value -// Default Content Security Policy to apply to signed contents. -//defaultPref("security.signed_content.CSP.default", "script-src 'self'; style-src 'self'"); //This is its default value - -// Pref : Enable Content Security Policy (CSP) -// https://developer.mozilla.org/en-US/docs/Web/Security/CSP/Introducing_Content_Security_Policy -// https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP -lockPref("security.csp.enable", true); - -// Pref : Enable CSP 1.1 script-nonce directive support -// https://bugzilla.mozilla.org/show_bug.cgi?id=855326 -lockPref("security.csp.experimentalEnabled", true); - -// Pref : CSP Main Settings II/II : Pref : 2681 : Disable CSP Violation Events [FF59+] -// [1] https://developer.mozilla.org/docs/Web/API/SecurityPolicyViolationEvent -// [-] https://bugzilla.mozilla.org/1488165 -// Setting removed in firefox v64 -lockPref("security.csp.enable_violation_events", false); //Deprecated Active - -// ---------------------------------------------------------------------------------- -// Extensions Security : -// --------------------- - -// Pref : Enable tab-hiding API by default. -defaultPref("extensions.webextensions.tabhide.enabled", false); //Default true - -// ---------------------------------------------------------------------------------- -// Extensions IJWY : -// ----------------- - -// Pref : Report Site Issue button -lockPref("extensions.webcompat-reporter.newIssueEndpoint", ""); -// Default Value -// https://webcompat.com/issues/new - -// Pref : 0518 : disable Web Compatibility Reporter (FF56+) -// Web Compatibility Reporter adds a "Report Site Issue" button to send data to Mozilla -// Report Site Issue button -// Note that on enabling the button in other release channels, make sure to -// disable it in problematic tests, see disableNonReleaseActions() inside -// browser/modules/test/browser/head.js -lockPref("extensions.webcompat-reporter.enabled", false); // Default true - -// ---------------------------------------------------------------------------------- -// Extensions Performance : -// ------------------------ - -// Pref : Delaying extensions background script startup -defaultPref("extensions.webextensions.background-delayed-startup", true); //default true - -// Pref :Whether or not the installed extensions should be migrated to the -// storage.local IndexedDB backend. -//defaultPref("extensions.webextensions.ExtensionStorageIDB.enabled", false); //default false - -// Pref : if enabled, store execution times for API calls -//defaultPref("extensions.webextensions.enablePerformanceCounters", false); //default false - -// Pref : Maximum age in milliseconds of performance counters in children -// When reached, the counters are sent to the main process and -// reset, so we reduce memory footprint. -//defaultPref("extensions.webextensions.performanceCountersMaxAge", 1000); //Hidden prefs diff --git a/librewolf.cfg/general.js b/librewolf.cfg/general.js deleted file mode 100644 index 10a48ca..0000000 --- a/librewolf.cfg/general.js +++ /dev/null @@ -1,55 +0,0 @@ - -// Disabling non-essential protocols breaks all interaction with custom protocols such -// as mailto:, irc:, magnet: ... and breaks opening third-party mail/messaging/torrent/... -// clients when clicking on links with these protocols -lockPref("network.protocol-handler.warn-external-default",true); -lockPref("network.protocol-handler.external.http",false); -lockPref("network.protocol-handler.external.https",false); -lockPref("network.protocol-handler.external.javascript",false); -lockPref("network.protocol-handler.external.moz-extension",false); -lockPref("network.protocol-handler.external.ftp",false); -lockPref("network.protocol-handler.external.file",false); -lockPref("network.protocol-handler.external.about",false); -lockPref("network.protocol-handler.external.chrome",false); -lockPref("network.protocol-handler.external.blob",false); -lockPref("network.protocol-handler.external.data",false); -lockPref("network.protocol-handler.expose-all",false); -lockPref("network.protocol-handler.expose.http",true); -lockPref("network.protocol-handler.expose.https",true); -lockPref("network.protocol-handler.expose.javascript",true); -lockPref("network.protocol-handler.expose.moz-extension",true); -lockPref("network.protocol-handler.expose.ftp",true); -lockPref("network.protocol-handler.expose.file",true); -lockPref("network.protocol-handler.expose.about",true); -lockPref("network.protocol-handler.expose.chrome",true); -lockPref("network.protocol-handler.expose.blob",true); -lockPref("network.protocol-handler.expose.data",true); - -// Pref : Disable new tab tile ads, preload, and Activity Stream -// http://www.thewindowsclub.com/disable-remove-ad-tiles-from-firefox -// http://forums.mozillazine.org/viewtopic.php?p=13876331#p13876331 -// https://wiki.mozilla.org/Firefox/Activity_Stream -// https://wiki.mozilla.org/Tiles/Technical_Documentation#Ping -// https://gecko.readthedocs.org/en/latest/browser/browser/DirectoryLinksProvider.html#browser-newtabpage-directory-source -// https://gecko.readthedocs.org/en/latest/browser/browser/DirectoryLinksProvider.html#browser-newtabpage-directory-ping -lockPref("browser.newtabpage.activity-stream.feeds.section.topstories", false); -lockPref("browser.newtabpage.activity-stream.section.highlights.includePocket", false); -lockPref("browser.newtabpage.activity-stream.showSponsored", false); -lockPref("browser.newtabpage.activity-stream.aboutHome.enabled", false); -lockPref("browser.newtabpage.activity-stream.asrouter.messageProviders", ""); -lockPref("browser.newtabpage.activity-stream.asrouter.devtoolsEnableds", true); -lockPref("browser.newtabpage.activity-stream.telemetry", false); -lockPref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", ""); -lockPref("browser.newtabpage.activity-stream.feeds.telemetry", false); -lockPref("browser.newtabpage.activity-stream.feeds.snippets", false); -lockPref("browser.newtabpage.activity-stream.disableSnippets", true); -lockPref("browser.newtabpage.activity-stream.default.sites", ""); -lockPref("browser.newtabpage.activity-stream.discoverystream.config", ""); -lockPref("browser.newtabpage.activity-stream.discoverystream.endpoints", ""); -lockPref("browser.newtabpage.activity-stream.feeds.asrouterfeed", false); -lockPref("browser.newtabpage.activity-stream.feeds.discoverystreamfeed", false); -lockPref("browser.newtabpage.activity-stream.feeds.newtabinit", false); -lockPref("browser.newtabpage.activity-stream.feeds.places", false); -lockPref("browser.newtabpage.activity-stream.feeds.systemtick", false); -lockPref("browser.newtabpage.activity-stream.improvesearch.handoffToAwesomebar", false); -lockPref("browser.newtab.preload", false); diff --git a/librewolf.cfg/general.json b/librewolf.cfg/general.json index f8e0234..fbf845b 100644 --- a/librewolf.cfg/general.json +++ b/librewolf.cfg/general.json @@ -176,13 +176,13 @@ "comments": "", "type": "lockPref", "key": "app.update.url.details", - "value": "" + "value": "https://gitlab.com/librewolf-community/browser" }, { "comments": "", "type": "lockPref", "key": "app.update.url.manual", - "value": "" + "value": "https://gitlab.com/librewolf-community/browser" }, { "comments": "", @@ -618,6 +618,24 @@ "key": "geo.wifi.uri", "value": "" }, + { + "comments": "Disable using the OS's geolocation service: Windows", + "type": "lockPref", + "key": "geo.provider.ms-windows-location", + "value": false + }, + { + "comments": "Disable using the OS's geolocation service: Mac", + "type": "lockPref", + "key": "geo.provider.use_corelocation", + "value": false + }, + { + "comments": "Disable using the OS's geolocation service: Linux", + "type": "lockPref", + "key": "geo.provider.use_gpsd", + "value": false + }, { "comments": "", "type": "lockPref", @@ -642,6 +660,24 @@ "key": "identity.mobilepromo.ios", "value": "" }, + { + "comments": "", + "type": "lockPref", + "key": "remote.enabled", + "value": false + }, + { + "comments": "", + "type": "lockPref", + "key": "remote.force-local", + "value": true + }, + { + "comments": "", + "type": "lockPref", + "key": "remote.log.level", + "value": "Info" + }, { "comments": "", "type": "lockPref", @@ -685,6 +721,36 @@ "key": "network.predictor.enable-prefetch", "value": false }, + { + "comments": "", + "type": "lockPref", + "key": "network.connectivity-service.enabled", + "value": false + }, + { + "comments": "", + "type": "lockPref", + "key": "network.connectivity-service.IPv6.url", + "value": "http://0.0.0.0" + }, + { + "comments": "", + "type": "lockPref", + "key": "network.connectivity-service.IPv4.url", + "value": "http://0.0.0.0" + }, + { + "comments": "", + "type": "lockPref", + "key": "network.connectivity-service.DNSv6.domain", + "value": "" + }, + { + "comments": "", + "type": "lockPref", + "key": "network.connectivity-service.DNSv4.domain", + "value": "" + }, { "comments": "", "type": "lockPref", @@ -914,6 +980,12 @@ "key": "toolkit.telemetry.coverage.opt-out", "value": true }, + { + "comments": "", + "type": "lockPref", + "key": "toolkit.telemetry.ecosystemtelemetry.enabled", + "value": false + }, { "comments": "", "type": "lockPref", @@ -1785,6 +1857,24 @@ "https://support.mozilla.org/en-US/questions/973320", "https://developer.mozilla.org/en-US/docs/Mozilla/Preferences/Preference_reference/browser.pagethumbnails.capturing_disabled" ] + }, + { + "comments": "", + "type": "lockPref", + "key": "browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features", + "value": false + }, + { + "comments": "", + "type": "lockPref", + "key": "browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons", + "value": false + }, + { + "comments": "", + "type": "lockPref", + "key": "browser.messaging-system.whatsNewPanel.enabled", + "value": false } ] } diff --git a/librewolf.cfg/ghacks-user.json b/librewolf.cfg/ghacks-user.json index 6cb79e6..31e4f10 100644 --- a/librewolf.cfg/ghacks-user.json +++ b/librewolf.cfg/ghacks-user.json @@ -16,6 +16,24 @@ "key": "toolkit.coverage.opt-out", "value": true }, + { + "comments": "", + "type": "lockPref", + "key": "browser.discovery.enabled", + "value": false + }, + { + "comments": "", + "type": "lockPref", + "key": "browser.discovery.containers.enabled", + "value": false + }, + { + "comments": "", + "type": "lockPref", + "key": "browser.discovery.sites", + "value": "" + }, { "comments": "", "notes": "Do not disable", @@ -98,6 +116,12 @@ "key": "dom.push.userAgentID", "value": "" }, + { + "comments": "", + "type": "lockPref", + "key": "targetBlankNoOpener.enabled", + "value": true + }, { "comments": "", "type": "lockPref", @@ -106,7 +130,6 @@ }, { "comments": "", - "notes": "Hidden preference", "type": "lockPref", "key": "ui.use_standins_for_native_colors", "value": true @@ -352,10 +375,14 @@ "value": true }, { - "comments": "", + "enabled": false, + "comments": "Disabling this breaks the network panel.", "type": "lockPref", "key": "dom.IntersectionObserver.enabled", - "value": false + "value": false, + "references": [ + "https://github.com/ghacksuserjs/ghacks-user.js/issues/737" + ] }, { "comments": "", diff --git a/librewolf.cfg/ijwytsu.js b/librewolf.cfg/ijwytsu.js deleted file mode 100644 index 5963503..0000000 --- a/librewolf.cfg/ijwytsu.js +++ /dev/null @@ -1,498 +0,0 @@ -// Pref : Disabling performance addon url [FF64+] -lockPref("devtools.performance.recording.ui-base-url", ""); -// Default Value : https://perf-html.io - -// Pref : The default set of protocol handlers for irc [FF64+] -lockPref("gecko.handlerService.schemes.irc.0.uriTemplate", ""); -// Default Value : https://www.mibbit.com/?url=%s - -// Pref : -lockPref("gecko.handlerService.schemes.ircs.0.uriTemplate", ""); // Deprecated Active -// Default Value -// https://www.mibbit.com/?url=%s - -// Pref : "coverage" ping [FF64+] -// This ping is not enabled by default. When enabled, a ping is generated a total of once -//per profile, as a diagnostic tool to determine whether Telemetry is working for users. -lockPref("toolkit.coverage.enabled", false); //default false - -// Pref : Allow extensions access to list of sites -// https://github.com/mozilla/gecko/blob/central/toolkit/mozapps/extensions/AddonManagerWebAPI.cpp -lockPref("extensions.webapi.testing", false); // hidden prefs // default false - -// Pref : Disable recommended extensions [FF64+] -lockPref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr", false); // disable CFR - -// Disable recommended extensions on the add-ons page. -lockPref("extensions.htmlaboutaddons.recommendations.enabled", false); - -// [SETTING] General>Browsing>Recommend extensions as you browse -// [1] https://support.mozilla.org/en-US/kb/extension-recommendations - -// Pref : [FF64+] -lockPref("browser.newtabpage.activity-stream.asrouter.providers.cfr", ""); -lockPref("browser.newtabpage.activity-stream.asrouter.providers.cfr-fxa", ""); -// Default Value : -// {\"id\":\"cfr\",\"enabled\":false,\"type\":\"local\",\"localProvider\":\ -// "CFRMessageProvider\",\"frequency\":{\"custom\":[{\"period\":\"daily\",\"cap\":1}]}} - -// Pref : [FF64+] -lockPref("browser.newtabpage.activity-stream.asrouter.providers.onboarding", ""); -// Default Value : -// {\"id\":\"onboarding\",\"type\":\"local\",\"localProvider\":\"OnboardingMessageProvider\",\"enabled\":true} - -// Pref : [FF64+] -lockPref("browser.newtabpage.activity-stream.asrouter.providers.snippets", ""); -// Default Value : -// {\"id\":\"snippets\",\"enabled\":false,\"type\":\"remote\",\"url\":\"https://snippets.cdn.mozilla.net/ -// %STARTPAGE_VERSION%/%NAME%/%VERSION%/%APPBUILDID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL%/%OS_VERSION% -// /%DISTRIBUTION%/%DISTRIBUTION_VERSION%/\",\"updateCycleInMs\":14400000} - -// Pref : -lockPref("browser.onboarding.notification.tour-ids-queue", ""); - -// Pref : -lockPref("lightweightThemes.getMoreURL", ""); -// Default Value -// https://addons.mozilla.org/%LOCALE%/firefox/themes - -// Pref : -lockPref("devtools.gcli.lodashSrc", ""); -// Default Value -// https://cdnjs.cloudflare.com/ajax/libs/lodash.js/4.6.1/lodash.min.js - -// Pref : -lockPref("media.decoder-doctor.new-issue-endpoint", ""); -// Default Value -// https://webcompat.com/issues/new - -// Pref : -lockPref("identity.sync.tokenserver.uri", ""); -// Default Value -// https://token.services.mozilla.com/1.0/sync/1.5 - -// Pref : -lockPref("devtools.webide.templatesURL", ""); -// Default Value -// https://code.cdn.mozilla.net/templates/list.json - -// Pref : -lockPref("browser.ping-centre.production.endpoint", ""); -// Default Value -// https://tiles.services.mozilla.com/v3/links/ping-centre - -// Pref : -lockPref("browser.translation.engine", ""); -// Default Value -// Google - -// Pref : -lockPref("network.trr.confirmationNS", ""); -// Default Value -// example.com - -// Pref : -lockPref("gecko.handlerService.schemes.mailto.1.name", ""); -// Default Value -// Gmail - -// Pref : -lockPref("gecko.handlerService.schemes.irc.0.name", ""); -// Default Value -// Mibbit - -// Pref : -lockPref("gecko.handlerService.schemes.ircs.0.name", ""); -// Default Value -// Mibbit - -// Pref : -lockPref("gecko.handlerService.schemes.mailto.0.name", ""); -// Default Value -// Yahoo! Mail - -// Pref : -lockPref("services.sync.lastversion", ""); -// Default Value -// firstrun - -// Pref : -lockPref("browser.safebrowsing.provider.mozilla.lists.base", ""); -// Default Value -// moz-std - -// Pref : -lockPref("browser.safebrowsing.provider.mozilla.lists.content", ""); -// Default Value -// moz-full - -// Pref : -lockPref("browser.safebrowsing.provider.google.advisoryName", ""); -// Default Value -// Google Safe Browsing - -// Pref : -lockPref("browser.safebrowsing.provider.google4.advisoryName", ""); -// Default Value -// Google Safe Browsing - -// Pref : Test To Make FFox Silent -lockPref("browser.safebrowsing.provider.mozilla.lists", ""); -// Default Value -// base-track-digest256,mozstd-trackwhite-digest256,content-track-digest256, -// mozplugin-block-digest256,mozplugin2-block-digest256,block-flash-digest256, -// except-flash-digest256,allow-flashallow-digest256,except-flashallow-digest256, -// block-flashsubdoc-digest256,except-flashsubdoc-digest256, -// except-flashinfobar-digest256,ads-track-digest256,social-track-digest256, -// analytics-track-digest256,fastblock1-track-digest256,fastblock1-trackwhite-digest256, -// fastblock2-track-digest256,fastblock2-trackwhite-digest256,fastblock3-track-digest256 - -// Pref : -lockPref("identity.fxaccounts.remote.root", ""); -// Default Value -// https://accounts.firefox.com/ - -// Pref : -lockPref("services.settings.server", ""); -// Default Value -// https://firefox.settings.services.mozilla.com/v1 - -// Pref : -lockPref("services.sync.fxa.privacyURL", ""); -// Default Value -// https://accounts.firefox.com/legal/privacy - -// Pref : -lockPref("services.sync.fxa.termsURL", ""); -// Default Value -// https://accounts.firefox.com/legal/terms - -// Pref : -lockPref("services.blocklist.addons.signer", ""); -// Default Value -// remote-settings.content-signature.mozilla.org - -// Pref : -lockPref("services.blocklist.gfx.signer", ""); -// Default Value -// remote-settings.content-signature.mozilla.org - -// Pref : -lockPref("services.blocklist.onecrl.signer", ""); -// Default Value -// onecrl.content-signature.mozilla.org - -// Pref : -lockPref("services.blocklist.pinning.signer", ""); -// Default Value -// pinning-preload.content-signature.mozilla.org - -// Pref : -lockPref("services.blocklist.plugins.signer", ""); -// Default Value -// remote-settings.content-signature.mozilla.org - -// Pref : -lockPref("services.settings.default_signer", ""); -// Default Value -// remote-settings.content-signature.mozilla.org - -// Pref : -lockPref("accessibility.support.url", ""); -// Default Value -// https://support.mozilla.org/%LOCALE%/kb/accessibility-services - -// Pref : -lockPref("app.normandy.shieldLearnMoreUrl", ""); -// Default Value -// https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield - -// Pref : -lockPref("app.productInfo.baseURL", ""); -// Default Value -// https://www.mozilla.org/firefox/features/ - -// Pref : -lockPref("app.support.baseURL", ""); -// Default Value -// https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/ - -// Pref : -lockPref("browser.chrome.errorReporter.infoURL", ""); -// Default Value -// https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/nightly-error-collection - -// Pref : -lockPref("browser.dictionaries.download.url", ""); -// Default Value -// https://addons.mozilla.org/%LOCALE%/firefox/dictionaries/ - -// Pref : -lockPref("browser.geolocation.warning.infoURL", ""); -// Default Value -// https://www.mozilla.org/%LOCALE%/firefox/geolocation/ - -// Pref : -lockPref("browser.search.searchEnginesURL", ""); -// Default Value -// https://addons.mozilla.org/%LOCALE%/firefox/search-engines/ - -// Pref : -lockPref("browser.uitour.themeOrigin", ""); -// Default Value -// https://addons.mozilla.org/%LOCALE%/firefox/themes/ - -// Pref : Disable WebIDE ADB Dxtension Downloads -// Pref : 2608 : gHacks Deprecated Active -lockPref("devtools.webide.adbAddonURL", ""); -// Default Value -// https://ftp.mozilla.org/pub/mozilla.org/labs/fxos-simulator/adb-helper/#OS#/adbhelper-#OS#-latest.xpi - -// Pref : -lockPref("extensions.getAddons.compatOverides.url", ""); -// Default Value -// https://services.addons.mozilla.org/api/v3/addons/compat-override/?guid=%IDS%&lang=%LOCALE% - -// Pref : -defaultPref("extensions.getAddons.get.url", ""); -// Default Value -// https://services.addons.mozilla.org/api/v3/addons/search/?guid=%IDS%&lang=%LOCALE% - -// Pref : -defaultPref("extensions.getAddons.langpacks.url", ""); -// Default Value -// https://services.addons.mozilla.org/api/v3/addons/language-tools/?app=firefox&type=language&appversion=%VERSION% - -// Pref : -defaultPref("extensions.getAddons.link.url", ""); -// Default Value -// https://addons.mozilla.org/%LOCALE%/firefox/ - -// Pref : -defaultPref("extensions.getAddons.search.browseURL", ""); -// Default Value -// https://addons.mozilla.org/%LOCALE%/firefox/search?q=%TERMS%&platform=%OS%&appver=%VERSION% - -// Pref : -lockPref("extensions.getAddons.themes.browseURL", ""); -// Default Value -// https://addons.mozilla.org/%LOCALE%/firefox/themes/?src=firefox - -// Pref : -lockPref("services.sync.addons.trustedSourceHostnames", ""); -// Default Value -// addons.mozilla.org - -// Pref : -lockPref("toolkit.datacollection.infoURL", ""); -// Default Value -// https://www.mozilla.org/legal/privacy/firefox.html - -// Pref : -lockPref("xpinstall.signatures.devInfoURL", ""); -// Default Value -// https://wiki.mozilla.org/Addons/Extension_Signing - -// Pref : -lockPref("browser.newtabpage.activity-stream.improvesearch.topSiteSearchShortcuts.searchEngines", ""); -// Default Value -// google,amazon - -// Pref : -lockPref("browser.newtabpage.activity-stream.fxaccounts.endpoint", ""); -// Default Value -// https://accounts.firefox.com/ - -// Pref : -defaultPref("extensions.update.url", ""); -// Default Value -// https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion= -// %REQ_VERSION%&id=%ITEM_ID%&version=%ITEM_VERSION%&maxAppVersion= -// %ITEM_MAXAPPVERSION%&status=%ITEM_STATUS%&appID=%APP_ID%&appVersion=%APP_VERSION%&appOS= -// %APP_OS%&appABI=%APP_ABI%&locale=%APP_LOCALE%¤tAppVersion= -// %CURRENT_APP_VERSION%&updateType=%UPDATE_TYPE%&compatMode=%COMPATIBILITY_MODE% - -// Pref : -lockPref("browser.newtabpage.activity-stream.feeds.section.topstories.options", ""); -// Default Value -// {"api_key_pref":"extensions.pocket.oAuthConsumerKey","hidden":false,"provider_icon": -// "pocket","provider_name":"Pocket","read_more_endpoint":"https://getpocket.com/explore/ -// trending?src=fx_new_tab","stories_endpoint":"https://getpocket.cdn.mozilla.net/v3/ -// firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=en-US&feed_variant= -// default_spocs_on","stories_referrer":"https://getpocket.com/recommendations", -// "topics_endpoint":"https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics? -// version=2&consumer_key=$apiKey&locale_lang=en-US","show_spocs":true,"personalized":true} - -// Pref : -lockPref("lightweightThemes.recommendedThemes", ""); -// Default Value -// [{"id":"recommended-1","homepageURL":"https://addons.mozilla.org/firefox/addon/a-web-browser-renaissance/", -// "headerURL":"resource:///chrome/browser/content/browser/defaultthemes/1.header.jpg", -// "textcolor":"#000000","accentcolor":"#834d29","iconURL":"resource:///chrome/browser/content/browser/ -// defaultthemes/1.icon.jpg","previewURL":"resource:///chrome/browser/content/browser/defaultthemes/1. -// preview.jpg","author":"Sean.Martell","version":"0"},{"id":"recommended-2","homepageURL": -// "https://addons.mozilla.org/firefox/addon/space-fantasy/","headerURL": -// "resource:///chrome/browser/content/browser/defaultthemes/2.header.jpg", -// "textcolor":"#ffffff","accentcolor":"#d9d9d9","iconURL":"resource:///chrome/browser/content/browser/ -// defaultthemes/2.icon.jpg","previewURL":"resource:///chrome/browser/content/browser/defaultthemes/ -// 2.preview.jpg","author":"fx5800p","version":"1.0"},{"id":"recommended-4","homepageURL": -// "https://addons.mozilla.org/firefox/addon/pastel-gradient/","headerURL": -// "resource:///chrome/browser/content/browser/defaultthemes/4.header.png", -// "textcolor":"#000000","accentcolor":"#000000","iconURL": -// "resource:///chrome/browser/content/browser/defaultthemes/4.icon.png","previewURL": -// "resource:///chrome/browser/content/browser/defaultthemes/4.preview.png", -// "author":"darrinhenein","version":"1.0"}] - -// Other Sync Settings - Disabling By Prevention --------------------------------------------------------- - -lockPref("services.sync.maxResyncs", 0); //5 -lockPref("services.sync.telemetry.maxPayloadCount", 0); //500 -lockPref("services.sync.addons.ignoreUserEnabledChanges", true); //false -lockPref("services.sync.engine.addons", false); //true -lockPref("services.sync.engine.addresses", false); //false -lockPref("services.sync.engine.bookmarks", false); //true -lockPref("services.sync.engine.bookmarks.buffer", false); //false -lockPref("services.sync.engine.creditcards", false); //false -lockPref("services.sync.engine.creditcards.available", false); //false -lockPref("services.sync.engine.history", false); //true -lockPref("services.sync.engine.passwords", false); //true -lockPref("services.sync.engine.prefs", false); //true -lockPref("services.sync.engine.tabs", false); //true -lockPref("services.sync.log.appender.file.logOnError", false); //true -lockPref("services.sync.log.appender.file.logOnSuccess", false); //false -lockPref("services.sync.log.cryptoDebug", false); //false -lockPref("services.sync.sendVersionInfo", false); //true -lockPref("services.sync.syncedTabs.showRemoteIcons", true); //true -lockPref("services.sync.prefs.sync.accessibility.blockautorefresh", false); //true -lockPref("services.sync.prefs.sync.accessibility.browsewithcaret", false); //true -lockPref("services.sync.prefs.sync.accessibility.typeaheadfind", false); //true -lockPref("services.sync.prefs.sync.accessibility.typeaheadfind.linksonly", false); //true -lockPref("services.sync.prefs.sync.addons.ignoreUserEnabledChanges", true); //true -lockPref("services.sync.prefs.sync.browser.contentblocking.enabled", false); //true -lockPref("services.sync.prefs.sync.browser.ctrlTab.recentlyUsedOrder", false); //true -lockPref("services.sync.prefs.sync.browser.download.useDownloadDir", false); //true -lockPref("services.sync.prefs.sync.browser.formfill.enable", false); //true -lockPref("services.sync.prefs.sync.browser.link.open_newwindow", false); //true -lockPref("services.sync.prefs.sync.browser.newtabpage.enabled", false); //true -lockPref("services.sync.prefs.sync.browser.newtabpage.pinned", false); //true -lockPref("services.sync.prefs.sync.browser.newtabpage.activity-stream.section.highlights.includePocket", false); //true -lockPref("services.sync.prefs.sync.browser.newtabpage.activity-stream.section.highlights.includeVisited", false); //true -lockPref("services.sync.prefs.sync.browser.newtabpage.activity-stream.section.highlights.includeBookmarks", false); //true -lockPref("services.sync.prefs.sync.browser.offline-apps.notify", false); //true -lockPref("services.sync.prefs.sync.browser.search.update", false); //true -lockPref("services.sync.prefs.sync.browser.sessionstore.restore_on_demand", false); //true -lockPref("services.sync.prefs.sync.browser.startup.homepage", false); //true -lockPref("services.sync.prefs.sync.browser.startup.page", false); //true -lockPref("services.sync.prefs.sync.browser.tabs.loadInBackground", false); //true -lockPref("services.sync.prefs.sync.browser.tabs.warnOnClose", false); //true -lockPref("services.sync.prefs.sync.browser.tabs.warnOnOpen", false); //true -lockPref("services.sync.prefs.sync.browser.urlbar.autocomplete.enabled", false); //true -lockPref("services.sync.prefs.sync.browser.urlbar.matchBuckets", false); //true -lockPref("services.sync.prefs.sync.browser.urlbar.maxRichResults", false); //true -lockPref("services.sync.prefs.sync.browser.urlbar.suggest.bookmark", false); //true -lockPref("services.sync.prefs.sync.browser.urlbar.suggest.history", false); //true -lockPref("services.sync.prefs.sync.browser.urlbar.suggest.history.onlyTyped", false); //true -lockPref("services.sync.prefs.sync.browser.urlbar.suggest.openpage", false); //true -lockPref("services.sync.prefs.sync.browser.urlbar.suggest.searches", false); //true -lockPref("services.sync.prefs.sync.dom.disable_open_during_load", false); //true -lockPref("services.sync.prefs.sync.dom.disable_window_flip", false); //true -lockPref("services.sync.prefs.sync.dom.disable_window_move_resize", false); //true -lockPref("services.sync.prefs.sync.dom.event.contextmenu.enabled", false); //true -lockPref("services.sync.prefs.sync.extensions.personas.current", false); //true -lockPref("services.sync.prefs.sync.extensions.update.enabled", false); //true -lockPref("services.sync.prefs.sync.intl.accept_languages", false); //true -lockPref("services.sync.prefs.sync.layout.spellcheckDefault", false); //true -lockPref("services.sync.prefs.sync.lightweightThemes.selectedThemeID", false); //true -lockPref("services.sync.prefs.sync.lightweightThemes.usedThemes", false); //true -lockPref("services.sync.prefs.sync.network.cookie.cookieBehavior", false); //true -lockPref("services.sync.prefs.sync.network.cookie.lifetimePolicy", false); //true -lockPref("services.sync.prefs.sync.network.cookie.thirdparty.sessionOnly", false); //true -lockPref("services.sync.prefs.sync.permissions.default.image", false); //true -lockPref("services.sync.prefs.sync.pref.advanced.images.disable_button.view_image", false); //true -lockPref("services.sync.prefs.sync.pref.advanced.javascript.disable_button.advanced", false); //true -lockPref("services.sync.prefs.sync.pref.downloads.disable_button.edit_actions", false); //true -lockPref("services.sync.prefs.sync.pref.privacy.disable_button.cookie_exceptions", false); //true -lockPref("services.sync.prefs.sync.privacy.clearOnShutdown.cache", false); //true -lockPref("services.sync.prefs.sync.privacy.clearOnShutdown.cookies", false); //true -lockPref("services.sync.prefs.sync.privacy.clearOnShutdown.downloads", false); //true -lockPref("services.sync.prefs.sync.privacy.clearOnShutdown.formdata", false); //true -lockPref("services.sync.prefs.sync.privacy.clearOnShutdown.history", false); //true -lockPref("services.sync.prefs.sync.privacy.clearOnShutdown.offlineApps", false); //true -lockPref("services.sync.prefs.sync.privacy.clearOnShutdown.sessions", false); //true -lockPref("services.sync.prefs.sync.privacy.clearOnShutdown.siteSettings", false); //true -lockPref("services.sync.prefs.sync.privacy.donottrackheader.enabled", false); //true -lockPref("services.sync.prefs.sync.privacy.reduceTimerPrecision", false); //true -lockPref("services.sync.prefs.sync.privacy.resistFingerprinting", false); //true -lockPref("services.sync.prefs.sync.privacy.resistFingerprinting.reduceTimerPrecision.jitter", false); //true -lockPref("services.sync.prefs.sync.privacy.resistFingerprinting.reduceTimerPrecision.microseconds", false); //true -lockPref("services.sync.prefs.sync.privacy.sanitize.sanitizeOnShutdown", false); //true -lockPref("services.sync.prefs.sync.privacy.trackingprotection.enabled", false); //true -lockPref("services.sync.prefs.sync.privacy.trackingprotection.pbmode.enabled", false); //true -lockPref("services.sync.prefs.sync.security.OCSP.enabled", false); //true -lockPref("services.sync.prefs.sync.security.OCSP.require", false); //true -lockPref("services.sync.prefs.sync.security.default_personal_cert", false); //true -lockPref("services.sync.prefs.sync.security.tls.version.max", false); //true -lockPref("services.sync.prefs.sync.security.tls.version.min", false); //true -lockPref("services.sync.prefs.sync.services.sync.syncedTabs.showRemoteIcons", false); //true -lockPref("services.sync.prefs.sync.spellchecker.dictionary", false); //true -lockPref("services.sync.prefs.sync.xpinstall.whitelist.required", false); //true - -// Testing ----------------------------------------------------------------------------------------------- - -// Pref : Test To Make FFox Silent -lockPref("browser.chrome.errorReporter.publicKey", ""); -// Default Value -// c709cb7a2c0b4f0882fcc84a5af161ec - -// Pref : Test To Make FFox Silent -lockPref("prio.publicKeyA", ""); -// Default Value -// 35AC1C7576C7C6EDD7FED6BCFC337B34D48CB4EE45C86BEEFB40BD8875707733 -lockPref("prio.publicKeyB", ""); -// Default Value -// 26E6674E65425B823F1F1D5F96E3BB3EF9E406EC7FBA7DEF8B08A35DD135AF50 - -// Alpha Settings Not Needed At The Moment -------------------------------------------------------------- - -// Pref : -//lockPref("urlclassifier.phishTable", ""); -// Default Value -// goog-phish-proto,test-phish-simple - -// Pref : -//lockPref("urlclassifier.passwordAllowTable", ""); -// Default Value -// goog-passwordwhite-proto - -// Pref : -//lockPref("urlclassifier.downloadAllowTable", ""); -// Default Value -// goog-downloadwhite-proto - -// Pref : -//lockPref("urlclassifier.downloadBlockTable", ""); -// Default Value -// goog-badbinurl-proto - -// Pref : Test To Make FFox Silent -//lockPref("security.content.signature.root_hash", ""); -// Default Value -// 97:E8:BA:9C:F1:2F:B3:DE:53:CC:42:A4:E6:57:7E:D6:4D:F4:93:C2:47:B4:14:FE:A0:36:81:8D:38:23:56:0E - -// Pref : Test To Make FFox Silent -//lockPref("media.gmp-manager.certs.1.issuerName", ""); -// Default Value -// CN=DigiCert SHA2 Secure Server CA,O=DigiCert Inc,C=US - -// Pref : Test To Make FFox Silent -//lockPref("media.gmp-manager.certs.2.issuerName", ""); -// Default Value -// CN=thawte SSL CA - G2,O="thawte, Inc.",C=US - -// Disabled ---------------------------------------------------------------------------------------------- - -// Pref : New page default sites -//lockPref("browser.newtabpage.activity-stream.default.sites", ""); -// Default Value -// https://www.youtube.com/,https://www.facebook.com/,https://www.amazon.com/, -// https://www.reddit.com/,https://www.wikipedia.org/,https://twitter.com/ diff --git a/librewolf.cfg/ijwytsu.json b/librewolf.cfg/ijwytsu.json index 59a1aa5..8926489 100644 --- a/librewolf.cfg/ijwytsu.json +++ b/librewolf.cfg/ijwytsu.json @@ -39,6 +39,18 @@ "key": "browser.newtabpage.activity-stream.asrouter.userprefs.cfr", "value": false }, + { + "comments": "", + "type": "lockPref", + "key": "extensions.htmlaboutaddons.discovery.api_url", + "value": "" + }, + { + "comments": "", + "type": "lockPref", + "key": "extensions.htmlaboutaddons.discover.enabled", + "value": false + }, { "comments": "", "type": "lockPref", diff --git a/librewolf.cfg/locale-time-ua.json b/librewolf.cfg/locale-time-ua.json index e2844cf..487949c 100644 --- a/librewolf.cfg/locale-time-ua.json +++ b/librewolf.cfg/locale-time-ua.json @@ -31,7 +31,7 @@ "comments": "", "type": "defaultPref", "key": "general.useragent.override", - "value": "Mozilla/5.0 (Windows NT 6.1; rv:45.0) Gecko/20100101 Firefox/45.0, 45" + "value": "Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0" }, { "comments": "", diff --git a/librewolf.cfg/urlbar.json b/librewolf.cfg/urlbar.json new file mode 100644 index 0000000..6c96e42 --- /dev/null +++ b/librewolf.cfg/urlbar.json @@ -0,0 +1,31 @@ +{ + "name": "Urlbar", + "subcategory": "", + "notes": "Includes temporary fixes to disable the \"Megabar\" functionality.", + "section": [ + { + "comments": "", + "type": "lockPref", + "key": "browser.urlbar.openViewOnFocus", + "value": false + }, + { + "comments": "", + "type": "lockPref", + "key": "browser.urlbar.update1", + "value": false + }, + { + "comments": "", + "type": "lockPref", + "key": "browser.urlbar.update1.interventions", + "value": false + }, + { + "comments": "", + "type": "lockPref", + "key": "browser.urlbar.update1.searchTips", + "value": false + } + ] +} diff --git a/librewolf.cfg/user-settings/auto-play.json b/librewolf.cfg/user-settings/auto-play.json index 318057b..a505c3e 100644 --- a/librewolf.cfg/user-settings/auto-play.json +++ b/librewolf.cfg/user-settings/auto-play.json @@ -7,7 +7,13 @@ "comments": "", "type": "lockPref", "key": "media.autoplay.default", - "value": 2 + "value": 5 + }, + { + "comments": "", + "type": "lockPref", + "key": "media.autoplay.enabled.user-gestures-needed", + "value": false } ] } diff --git a/librewolf.cfg/user-settings/history.json b/librewolf.cfg/user-settings/history.json index 5a5ae05..408b79d 100644 --- a/librewolf.cfg/user-settings/history.json +++ b/librewolf.cfg/user-settings/history.json @@ -3,119 +3,102 @@ "subcategory": "User Settings", "notes": "", "section": [ - { "comments": "", "type": "lockPref", "key": "browser.sessionhistory.max_entries", "value": 20 }, - { "comments": "", "type": "lockPref", "key": "browser.urlbar.filter.javascript", "value": true }, - { "comments": "", "type": "defaultPref", "key": "browser.uiCustomization.state", "value": "{\"placements\":{\"widget-overflow-fixed-list\":[],\"nav-bar\":[\"home-button\",\"downloads-button\",\"back-button\",\"forward-button\",\"stop-reload-button\",\"urlbar-container\",\"add-ons-button\",\"preferences-button\",\"fxa-toolbar-menu-button\"],\"toolbar-menubar\":[\"menubar-items\"],\"TabsToolbar\":[\"tabbrowser-tabs\",\"new-tab-button\",\"alltabs-button\"],\"PersonalToolbar\":[\"personal-bookmarks\"]},\"seen\":[\"developer-button\"],\"dirtyAreaCache\":[\"nav-bar\",\"toolbar-menubar\",\"TabsToolbar\",\"PersonalToolbar\"],\"currentVersion\":16,\"newElementCount\":3}" }, - { "comments": "", "type": "defaultPref", "key": "browser.uidensity", "value": 2 }, - { "comments": "", "type": "defaultPref", "key": "browser.tabs.drawInTitlebar", "value": true }, - { "comments": "", "type": "pref", "key": "startup.homepage_override_url", "value": "about:blank" }, - { "comments": "", "type": "pref", "key": "startup.homepage_welcome_url", "value": "about:blank" }, - { "comments": "", "type": "pref", "key": "startup.homepage_welcome_url.additional", "value": "" }, - { "comments": "", "type": "defaultPref", "key": "privacy.clearOnShutdown.offlineApps", "value": true }, - { "comments": "Offline Website Data", "type": "defaultPref", "key": "privacy.cpd.offlineApps", "value": true }, - { "comments": "", "type": "defaultPref", "key": "privacy.sanitize.timeSpan", "value": 0 }, - { "comments": "", "type": "defaultPref", "key": "browser.formfill.enable", "value": false }, - { "comments": "", "type": "defaultPref", "key": "privacy.sanitize.sanitizeOnShutdown", "value": true }, - { "comments": "", "type": "defaultPref", "key": "places.history.enabled", "value": false }, - { "comments": "", "type": "defaultPref", "key": "places.history.expiration.max_pages", "value": 2147483647 }, - { "comments": "", "type": "defaultPref", "key": "privacy.history.custom", "value": true }, - { "enabled": false, "comments": "Clear session data", @@ -123,7 +106,6 @@ "key": "privacy.cpd.openWindows", "value": true }, - { "enabled": false, "comments": "", @@ -131,7 +113,6 @@ "key": "privacy.clearOnShutdown.openWindows", "value": true }, - { "enabled": false, "comments": "", @@ -139,7 +120,6 @@ "key": "privacy.sanitize.pending", "value": "[{\"id\":\"shutdown\",\"itemsToClear\":[\"cache\",\"cookies\",\"history\",\"formdata\",\"downloads\"],\"options\":{}}]" }, - { "enabled": false, "comments": "", @@ -148,7 +128,12 @@ "key": "permissions.memory_only", "value": true }, - + { + "comments": "", + "type": "lockPref", + "key": "privacy.storagePrincipal.enabledForTrackers", + "value": false + }, { "enabled": false, "comments": "", diff --git a/librewolf.cfg/user-settings/tracking-protection.json b/librewolf.cfg/user-settings/tracking-protection.json index e790366..e22f5bd 100644 --- a/librewolf.cfg/user-settings/tracking-protection.json +++ b/librewolf.cfg/user-settings/tracking-protection.json @@ -15,6 +15,12 @@ "key": "privacy.trackingprotection.annotate_channels", "value": false }, + { + "comments": "", + "type": "lockPref", + "key": "privacy.trackingprotection.origin_telemetry.enabled", + "value": false + }, { "comments": "", "type": "lockPref", @@ -27,6 +33,12 @@ "key": "privacy.trackingprotection.pbmode.enabled", "value": false }, + { + "comments": "", + "type": "lockPref", + "key": "telemetry.origin_telemetry_test_mode.enabled", + "value": false + }, { "comments": "", "type": "lockPref",