This should allow for easier maintenance and updates in the future, and provides all of our custom settings in one centralized place (This is also similar to ex. LibreWolf)
Signed-off-by: celenity <celenity@celenity.dev>
This is especially important since we now have uBlock Origin as optional on the onboarding; and even with that aside, this is also beneficial for other reasons - ex. I suspect that this will improve performance, this will ensure users are still protected if they disable uBo for a site, etc... - In general, I also just think this is better handled by the browser
Signed-off-by: celenity <celenity@celenity.dev>
This also sets the browser theme back to the default of automatic/following the device's theme, since the website appearance is what's actually fingerprintable
Signed-off-by: celenity <celenity@celenity.dev>
This is probably the last aggressive setting that we inherited from Mull, known to cause a significant amount of breakage on sites - now that we have UI toggles for it, we can set it back to the saner default (This is also the default for ex. LibreWolf, Tor Browser, etc)
So we've now officially eliminated nearly all notable breakage out of the box, which I think is great - I feel like we've been working towards this for a while now :)
Signed-off-by: celenity <celenity@celenity.dev>
The initial set of wallpapers are taken from Fennec F-Droid (Available under the Unsplash License): https://gitlab.com/relan/fennecmedia, but we'll be able to expand this and add additional wallpapers in the future
Signed-off-by: celenity <celenity@celenity.dev>
Currently, to play DRM-controlled content, users are enabling EME and Widevine from the `about:config` by setting `media.eme.enabled` and `media.mediadrm-widevinecdm.visible` to `true`. This *technically* works, but the problem is that we remove the EME permission UI in `fenix-liberate.patch` - so if a user enables EME with the `media.eme.enabled` pref (which we know users are), it allows *all* websites to use DRM, without prompting.
So for folks who insist on enabling/using DRM (which I will emphasize is NOT supported or recommended), this adds a way for them to enable it at their discretion, while still being able to control which sites can and can't use it, like vanilla Firefox allows.
This adds two hidden/secret settings that function as follows:
- `Enable Encrypted Media Extensions (EME)` - When enabled, this sets `media.eme.enabled` to true, and it exposes the UI for controlling the DRM site permission.
- `Enable Widevine CDM` - This depends on the `Enable Encrypted Media Extensions (EME)` setting. When enabled, it sets `media.mediadrm-widevinecdm.visible` to `true`.
Signed-off-by: celenity <celenity@celenity.dev>
Unlike the previous patch, this doesn't break the installation of add-ons locally with the `Install extension from file` option (https://gitlab.com/ironfox-oss/IronFox/-/issues/112)
This now also allows users to specify websites they'd like to allow to install extensions with the `xpinstall.whitelist.add` pref, providing users with more freedom and control. The default list allows AMO (`addons.mozilla.org`), as well as AdGuard and Mullvad, to allow users to install those extensions directly from the devs (and for Mullvad's case, at all). In general we'll want to keep this list to a minimum, and users are NOT recommended to add domains here. In the future though, we can probably look into allowing installation from other specific trustworthy sources - fixes https://gitlab.com/ironfox-oss/IronFox/-/issues/102)
Signed-off-by: celenity <celenity@celenity.dev>
Unlike the previous patch, this doesn't break the installation of add-ons locally with the `Install extension from file` option (https://gitlab.com/ironfox-oss/IronFox/-/issues/112)
This now also allows users to specify websites they'd like to allow to install extensions with the `xpinstall.whitelist.add` pref, providing users with more freedom and control. The default list allows AMO (`addons.mozilla.org`), as well as AdGuard and Mullvad, to allow users to install those extensions directly from the devs (and for Mullvad's case, at all). In general we'll want to keep this list to a minimum, and users are NOT recommended to add domains here. In the future though, we can probably look into allowing installation from other specific trustworthy sources - fixes https://gitlab.com/ironfox-oss/IronFox/-/issues/102)
Signed-off-by: celenity <celenity@celenity.dev>
Unlike the previous patch, this doesn't break the installation of add-ons locally with the `Install extension from file` option (https://gitlab.com/ironfox-oss/IronFox/-/issues/112)
This now also allows users to specify websites they'd like to allow to install extensions with the `xpinstall.whitelist.add` pref, providing users with more freedom and control. The default list allows AMO (`addons.mozilla.org`), as well as AdGuard and Mullvad, to allow users to install those extensions directly from the devs (and for Mullvad's case, at all). In general we'll want to keep this list to a minimum, and users are NOT recommended to add domains here. In the future though, we can probably look into allowing installation from other specific trustworthy sources - fixes https://gitlab.com/ironfox-oss/IronFox/-/issues/102)
Signed-off-by: celenity <celenity@celenity.dev>