Commit Graph

424 Commits

Author SHA1 Message Date
celenity
05721206f0 Add UI settings to control the cross-origin referer policy (network.http.referer.XOriginPolicy) - and set back to Firefox's default of 0 (Always send cross-origin referers)
This is probably the last aggressive setting that we inherited from Mull, known to cause a significant amount of breakage on sites - now that we have UI toggles for it, we can set it back to the saner default (This is also the default for ex. LibreWolf, Tor Browser, etc)

So we've now officially eliminated nearly all notable breakage out of the box, which I think is great - I feel like we've been working towards this for a while now :)

Signed-off-by: celenity <celenity@celenity.dev>
2025-07-14 18:37:04 -04:00
celenity
6303805e94 Hide the Firefox Sync dropdown menu item if Firefox Sync isn't signed in
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-13 20:57:35 -04:00
celenity
0ebbc1e0c1 Enable Secure Storage
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-13 19:24:56 -04:00
celenity
a9fffc1578 Update patch description to reflect current DoH providers
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-13 17:19:59 -04:00
celenity
a96ea87d22 Unbreak Firefox Translations
This includes a temporary work-around for an upstream bug (https://bugzilla.mozilla.org/show_bug.cgi?id=1977078) that we encounter, due to us disabling the Gecko Profiler

(Also temporarily overrides a Phoenix preference)

Signed-off-by: celenity <celenity@celenity.dev>
2025-07-12 19:27:55 -04:00
celenity
6eb1f610d0 Minor tweaks and adjustments
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-12 03:14:24 -04:00
celenity
c984cb5eef Update Phoenix to 2025.07.11.1 - https://codeberg.org/celenity/Phoenix/releases/tag/2025.07.11.1
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-11 21:39:07 -04:00
celenity
fc77a9d712 fix: prebuild.sh
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-11 03:11:39 -04:00
celenity
d8cb8db9a8 Add a built-in collection of wallpapers for IronFox's homepage - fixes https://gitlab.com/ironfox-oss/IronFox/-/issues/6
The initial set of wallpapers are taken from Fennec F-Droid (Available under the Unsplash License): https://gitlab.com/relan/fennecmedia, but we'll be able to expand this and add additional wallpapers in the future

Signed-off-by: celenity <celenity@celenity.dev>
2025-07-11 03:02:19 -04:00
celenity
321b805bb7 Disable fetching favicons for shortcuts/pins on the browser homepage from Mozilla's Tippy Top provider
(Favicons will still display on the homepage after navigating to the shortcut/pin)

Signed-off-by: celenity <celenity@celenity.dev>
2025-07-10 17:28:55 -04:00
celenity
346608f702 Add NOT supported, NOT recommended secret settings to toggle EME and Widevine (Off by default)
Currently, to play DRM-controlled content, users are enabling EME and Widevine from the `about:config` by setting `media.eme.enabled` and `media.mediadrm-widevinecdm.visible` to `true`. This *technically* works, but the problem is that we remove the EME permission UI in `fenix-liberate.patch` - so if a user enables EME with the `media.eme.enabled` pref (which we know users are), it allows *all* websites to use DRM, without prompting.

So for folks who insist on enabling/using DRM (which I will emphasize is NOT supported or recommended), this adds a way for them to enable it at their discretion, while still being able to control which sites can and can't use it, like vanilla Firefox allows.

This adds two hidden/secret settings that function as follows:

- `Enable Encrypted Media Extensions (EME)` - When enabled, this sets `media.eme.enabled` to true, and it exposes the UI for controlling the DRM site permission.
- `Enable Widevine CDM` - This depends on the `Enable Encrypted Media Extensions (EME)` setting. When enabled, it sets `media.mediadrm-widevinecdm.visible` to `true`.

Signed-off-by: celenity <celenity@celenity.dev>
2025-07-09 17:55:54 -04:00
celenity
23ddf007bd Use GeckoView's SafeBrowsingPolicy setting to enable/disable Safe Browsing, instead of implementing our own
For reference, Mozilla uses this for their Safe Browsing toggle in Firefox Focus - doesn't make sense not to leverage the work they've already done. If/when they add a Safe Browsing toggle to Fenix upstream, this is also likely the same approach they'll use.

Signed-off-by: celenity <celenity@celenity.dev>
2025-07-09 17:09:31 -04:00
celenity
75976e79de Minor tweaks/organization/consolidation for our custom Fenix settings
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-09 16:25:08 -04:00
celenity
8eb65ae3fc Allow configuring more prefs from the about:config, and heavily reduce the number of no-op z99.ignore prefs
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-09 15:48:35 -04:00
celenity
d0a7b46814 fix: syntax
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-08 15:55:43 -04:00
celenity
510905beb1 Merge branch 'dev' into refine
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-08 15:54:41 -04:00
celenity
54500dee00 Add back setting to enable/disable Tab Strip (Off by default)- reverts acc4d6a7f8 - fixes https://gitlab.com/ironfox-oss/IronFox/-/issues/27
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-08 15:42:36 -04:00
celenity
e69f488d20 Merge branch 'dev' into refine 2025-07-08 14:38:50 -04:00
celenity
63774feb7e v140.0.4
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-08 14:28:54 -04:00
celenity
db7ef4d075 Merge branch 'dev' into refine 2025-07-08 04:06:15 -04:00
celenity
1cc588ba08 Merge branch 'dev' into unifiedpush 2025-07-07 19:29:28 -04:00
celenity
ab47849d84 Update for v140.0.3
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-07 19:27:10 -04:00
celenity
03dae936f3 v140.0.3
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-07 16:33:27 -04:00
celenity
dee2382442 Resolve conflict
# Conflicts:
#   patches/fenix-overlay/app/src/main/res/values/ironfox_strings.xml
2025-07-07 17:38:52 +00:00
celenity
36f9a68747 Merge branch 'dev' into refine
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-05 17:28:32 -04:00
celenity
86980f49a5 Merge branch 'dev' into 'refine'
# Conflicts:
#   patches/disable-nags.patch
#   patches/fenix-disable-crash-reporting.patch
#   patches/fenix-disable-nimbus.patch
#   patches/fenix-disable-telemetry.patch
#   patches/gecko-disable-crash-reporting.patch
2025-07-05 19:28:26 +00:00
celenity
3344cb8bcd Merge branch 'dev' into 'feat/if-onboarding'
# Conflicts:
#   patches/fenix-disable-telemetry.patch
2025-07-05 19:27:05 +00:00
celenity
63e1056b7b feat: Add patch to disable Nimbus at the app-services level
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-05 15:20:51 -04:00
celenity
1b50574ef5 feat: Use separate patch to disable remote search configuration
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-05 15:18:32 -04:00
celenity
71c8843ebf feat: Combine disable-cfrs.patch & disable-default-browser-engagement-prompts.patch to create disable-nags.patch, + disable additional CFRs
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-05 02:49:01 -04:00
celenity
076410cd86 feat: Block geolocation and notification prompts by default
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-04 02:05:06 -04:00
celenity
1877300abf feat: Add support for UnifiedPush
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-02 19:25:47 -04:00
celenity
5d0cd167dc feat: Update fenix-disable-telemetry.patch - override Glean's URL to custom no-op endpoint, prevent registering pings and initialization, prevent integration with Nimbus, and hide no-op Debug Drawer hidden setting that depends on Glean
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-02 03:54:01 -04:00
celenity
42184c53f3 feat: Update fenix-disable-telemetry.patch - override Glean's URL to custom no-op endpoint, prevent registering pings and initialization, prevent integration with Nimbus, and hide no-op Debug Drawer hidden setting that depends on Glean
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-02 03:48:25 -04:00
celenity
28e429b147 feat: Update fenix-disable-telemetry.patch - override Glean's URL to custom no-op endpoint, prevent registering pings and initialization, prevent integration with Nimbus, and hide no-op Debug Drawer hidden setting that depends on Glean
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-02 03:46:37 -04:00
celenity
362d4e113b feat: Use separate prefs for default list of sites allowed to install add-ons to provide better organization and make it easier for users to enable/disable individual sources as desired, and add EFF/Privacy Badger & NoScript to the default allowed sites
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-30 20:43:38 -04:00
celenity
fba533d68c feat: Use separate prefs for default list of sites allowed to install add-ons to provide better organization and make it easier for users to enable/disable individual sources as desired, and add EFF/Privacy Badger & NoScript to the default allowed sites
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-30 20:43:28 -04:00
celenity
76b4ebd87a feat: Use separate prefs for default list of sites allowed to install add-ons to provide better organization and make it easier for users to enable/disable individual sources as desired, and add EFF/Privacy Badger & NoScript to the default allowed sites
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-30 20:43:07 -04:00
celenity
8d3b9fe170 feat: Bring back and improve install-addons-without-mozaddonmanager.patch - See details below
Unlike the previous patch, this doesn't break the installation of add-ons locally with the `Install extension from file` option (https://gitlab.com/ironfox-oss/IronFox/-/issues/112)

This now also allows users to specify websites they'd like to allow to install extensions with the `xpinstall.whitelist.add` pref, providing users with more freedom and control. The default list allows AMO (`addons.mozilla.org`), as well as AdGuard and Mullvad, to allow users to install those extensions directly from the devs (and for Mullvad's case, at all). In general we'll want to keep this list to a minimum, and users are NOT recommended to add domains here. In the future though, we can probably look into allowing installation from other specific trustworthy sources - fixes https://gitlab.com/ironfox-oss/IronFox/-/issues/102)

Signed-off-by: celenity <celenity@celenity.dev>
2025-06-30 17:42:21 -04:00
celenity
85cd2d9436 feat: Bring back and improve install-addons-without-mozaddonmanager.patch - See details below
Unlike the previous patch, this doesn't break the installation of add-ons locally with the `Install extension from file` option (https://gitlab.com/ironfox-oss/IronFox/-/issues/112)

This now also allows users to specify websites they'd like to allow to install extensions with the `xpinstall.whitelist.add` pref, providing users with more freedom and control. The default list allows AMO (`addons.mozilla.org`), as well as AdGuard and Mullvad, to allow users to install those extensions directly from the devs (and for Mullvad's case, at all). In general we'll want to keep this list to a minimum, and users are NOT recommended to add domains here. In the future though, we can probably look into allowing installation from other specific trustworthy sources - fixes https://gitlab.com/ironfox-oss/IronFox/-/issues/102)

Signed-off-by: celenity <celenity@celenity.dev>
2025-06-30 17:42:03 -04:00
celenity
bfd146c94c feat: Bring back and improve install-addons-without-mozaddonmanager.patch - See details below
Unlike the previous patch, this doesn't break the installation of add-ons locally with the `Install extension from file` option (https://gitlab.com/ironfox-oss/IronFox/-/issues/112)

This now also allows users to specify websites they'd like to allow to install extensions with the `xpinstall.whitelist.add` pref, providing users with more freedom and control. The default list allows AMO (`addons.mozilla.org`), as well as AdGuard and Mullvad, to allow users to install those extensions directly from the devs (and for Mullvad's case, at all). In general we'll want to keep this list to a minimum, and users are NOT recommended to add domains here. In the future though, we can probably look into allowing installation from other specific trustworthy sources - fixes https://gitlab.com/ironfox-oss/IronFox/-/issues/102)

Signed-off-by: celenity <celenity@celenity.dev>
2025-06-30 17:40:40 -04:00
Akash Yadav
34ffe98714 fix: finalize IronFox onboarding preferences screen
Signed-off-by: Akash Yadav <itsaky01@gmail.com>
2025-06-30 02:14:38 -04:00
Akash Yadav
a5fe5205b7 feat: add initial onboarding screen
Signed-off-by: Akash Yadav <itsaky01@gmail.com>
2025-06-30 02:14:38 -04:00
celenity
f59923a499 feat: Clean-up, organize, and refine various patches to allow for easier maintenance
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-30 02:07:56 -04:00
celenity
e16304d126 feat: Disable Network Connectivity Status Monitoring (thanks to a patch derived from Tor Browser)
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-29 01:41:44 -04:00
celenity
a3c9025e04 feat: Disable SSLKEYLOGGING (thanks to a patch derived from Tor Browser)
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-29 01:00:06 -04:00
celenity
2609477a27 feat: Add our own moz.configure
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-28 22:14:08 -04:00
celenity
38912360ff feat: Disable fetching featured collections, recommendations, and icons from AMO (addons.mozilla.org)
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-28 21:57:35 -04:00
celenity
049bc362a9 feat: Add official+true to local.properties
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-28 21:43:17 -04:00
celenity
631b59e49c feat: Ensure we don't try to check/build with a Google Location Service API key
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-28 21:41:40 -04:00