Commit Graph

77 Commits

Author SHA1 Message Date
celenity
63a99045b4 WIP: v141.0
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-22 08:21:43 -04:00
celenity
e0756201f1 If Firefox Sync is signed in, disable downloading the user's profile picture every time the user navigates to Settings...
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-22 01:01:49 -04:00
celenity
03eb98b232 Add a separate settings fragment for IronFox-specific UI settings
This should allow for easier maintenance and updates in the future, and provides all of our custom settings in one centralized place (This is also similar to ex. LibreWolf)

Signed-off-by: celenity <celenity@celenity.dev>
2025-07-22 00:14:23 -04:00
celenity
6e25d5455a Prevent fingerprinting based on whether PDF.js is enabled/disabled
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-18 20:55:39 -04:00
celenity
240a957fa6 Stub the Beacon API (navigator.sendBeacon) internally, instead of relying on uBlock Origin
This is especially important since we now have uBlock Origin as optional on the onboarding; and even with that aside, this is also beneficial for other reasons - ex. I suspect that this will improve performance, this will ensure users are still protected if they disable uBo for a site, etc... - In general, I also just think this is better handled by the browser

Signed-off-by: celenity <celenity@celenity.dev>
2025-07-18 20:22:08 -04:00
celenity
a3287d0c7e Fix typo
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-16 05:12:38 -04:00
celenity
72ba5377d4 Add UI settings to control the website appearance (light/dark mode) independently of the browser theme (like Firefox for Desktop) - Website appearance is set to Light by default, to protect against fingerprinting
This also sets the browser theme back to the default of automatic/following the device's theme, since the website appearance is what's actually fingerprintable

Signed-off-by: celenity <celenity@celenity.dev>
2025-07-15 21:46:13 -04:00
celenity
05721206f0 Add UI settings to control the cross-origin referer policy (network.http.referer.XOriginPolicy) - and set back to Firefox's default of 0 (Always send cross-origin referers)
This is probably the last aggressive setting that we inherited from Mull, known to cause a significant amount of breakage on sites - now that we have UI toggles for it, we can set it back to the saner default (This is also the default for ex. LibreWolf, Tor Browser, etc)

So we've now officially eliminated nearly all notable breakage out of the box, which I think is great - I feel like we've been working towards this for a while now :)

Signed-off-by: celenity <celenity@celenity.dev>
2025-07-14 18:37:04 -04:00
celenity
6303805e94 Hide the Firefox Sync dropdown menu item if Firefox Sync isn't signed in
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-13 20:57:35 -04:00
celenity
0ebbc1e0c1 Enable Secure Storage
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-13 19:24:56 -04:00
celenity
a9fffc1578 Update patch description to reflect current DoH providers
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-13 17:19:59 -04:00
celenity
a96ea87d22 Unbreak Firefox Translations
This includes a temporary work-around for an upstream bug (https://bugzilla.mozilla.org/show_bug.cgi?id=1977078) that we encounter, due to us disabling the Gecko Profiler

(Also temporarily overrides a Phoenix preference)

Signed-off-by: celenity <celenity@celenity.dev>
2025-07-12 19:27:55 -04:00
celenity
6eb1f610d0 Minor tweaks and adjustments
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-12 03:14:24 -04:00
celenity
d8cb8db9a8 Add a built-in collection of wallpapers for IronFox's homepage - fixes https://gitlab.com/ironfox-oss/IronFox/-/issues/6
The initial set of wallpapers are taken from Fennec F-Droid (Available under the Unsplash License): https://gitlab.com/relan/fennecmedia, but we'll be able to expand this and add additional wallpapers in the future

Signed-off-by: celenity <celenity@celenity.dev>
2025-07-11 03:02:19 -04:00
celenity
321b805bb7 Disable fetching favicons for shortcuts/pins on the browser homepage from Mozilla's Tippy Top provider
(Favicons will still display on the homepage after navigating to the shortcut/pin)

Signed-off-by: celenity <celenity@celenity.dev>
2025-07-10 17:28:55 -04:00
celenity
346608f702 Add NOT supported, NOT recommended secret settings to toggle EME and Widevine (Off by default)
Currently, to play DRM-controlled content, users are enabling EME and Widevine from the `about:config` by setting `media.eme.enabled` and `media.mediadrm-widevinecdm.visible` to `true`. This *technically* works, but the problem is that we remove the EME permission UI in `fenix-liberate.patch` - so if a user enables EME with the `media.eme.enabled` pref (which we know users are), it allows *all* websites to use DRM, without prompting.

So for folks who insist on enabling/using DRM (which I will emphasize is NOT supported or recommended), this adds a way for them to enable it at their discretion, while still being able to control which sites can and can't use it, like vanilla Firefox allows.

This adds two hidden/secret settings that function as follows:

- `Enable Encrypted Media Extensions (EME)` - When enabled, this sets `media.eme.enabled` to true, and it exposes the UI for controlling the DRM site permission.
- `Enable Widevine CDM` - This depends on the `Enable Encrypted Media Extensions (EME)` setting. When enabled, it sets `media.mediadrm-widevinecdm.visible` to `true`.

Signed-off-by: celenity <celenity@celenity.dev>
2025-07-09 17:55:54 -04:00
celenity
75976e79de Minor tweaks/organization/consolidation for our custom Fenix settings
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-09 16:25:08 -04:00
celenity
d0a7b46814 fix: syntax
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-08 15:55:43 -04:00
celenity
510905beb1 Merge branch 'dev' into refine
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-08 15:54:41 -04:00
celenity
54500dee00 Add back setting to enable/disable Tab Strip (Off by default)- reverts acc4d6a7f8 - fixes https://gitlab.com/ironfox-oss/IronFox/-/issues/27
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-08 15:42:36 -04:00
celenity
db7ef4d075 Merge branch 'dev' into refine 2025-07-08 04:06:15 -04:00
celenity
dee2382442 Resolve conflict
# Conflicts:
#   patches/fenix-overlay/app/src/main/res/values/ironfox_strings.xml
2025-07-07 17:38:52 +00:00
celenity
36f9a68747 Merge branch 'dev' into refine
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-05 17:28:32 -04:00
celenity
86980f49a5 Merge branch 'dev' into 'refine'
# Conflicts:
#   patches/disable-nags.patch
#   patches/fenix-disable-crash-reporting.patch
#   patches/fenix-disable-nimbus.patch
#   patches/fenix-disable-telemetry.patch
#   patches/gecko-disable-crash-reporting.patch
2025-07-05 19:28:26 +00:00
celenity
3344cb8bcd Merge branch 'dev' into 'feat/if-onboarding'
# Conflicts:
#   patches/fenix-disable-telemetry.patch
2025-07-05 19:27:05 +00:00
celenity
1b50574ef5 feat: Use separate patch to disable remote search configuration
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-05 15:18:32 -04:00
celenity
71c8843ebf feat: Combine disable-cfrs.patch & disable-default-browser-engagement-prompts.patch to create disable-nags.patch, + disable additional CFRs
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-05 02:49:01 -04:00
celenity
076410cd86 feat: Block geolocation and notification prompts by default
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-04 02:05:06 -04:00
celenity
1877300abf feat: Add support for UnifiedPush
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-02 19:25:47 -04:00
celenity
362d4e113b feat: Use separate prefs for default list of sites allowed to install add-ons to provide better organization and make it easier for users to enable/disable individual sources as desired, and add EFF/Privacy Badger & NoScript to the default allowed sites
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-30 20:43:38 -04:00
celenity
fba533d68c feat: Use separate prefs for default list of sites allowed to install add-ons to provide better organization and make it easier for users to enable/disable individual sources as desired, and add EFF/Privacy Badger & NoScript to the default allowed sites
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-30 20:43:28 -04:00
celenity
76b4ebd87a feat: Use separate prefs for default list of sites allowed to install add-ons to provide better organization and make it easier for users to enable/disable individual sources as desired, and add EFF/Privacy Badger & NoScript to the default allowed sites
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-30 20:43:07 -04:00
celenity
8d3b9fe170 feat: Bring back and improve install-addons-without-mozaddonmanager.patch - See details below
Unlike the previous patch, this doesn't break the installation of add-ons locally with the `Install extension from file` option (https://gitlab.com/ironfox-oss/IronFox/-/issues/112)

This now also allows users to specify websites they'd like to allow to install extensions with the `xpinstall.whitelist.add` pref, providing users with more freedom and control. The default list allows AMO (`addons.mozilla.org`), as well as AdGuard and Mullvad, to allow users to install those extensions directly from the devs (and for Mullvad's case, at all). In general we'll want to keep this list to a minimum, and users are NOT recommended to add domains here. In the future though, we can probably look into allowing installation from other specific trustworthy sources - fixes https://gitlab.com/ironfox-oss/IronFox/-/issues/102)

Signed-off-by: celenity <celenity@celenity.dev>
2025-06-30 17:42:21 -04:00
celenity
85cd2d9436 feat: Bring back and improve install-addons-without-mozaddonmanager.patch - See details below
Unlike the previous patch, this doesn't break the installation of add-ons locally with the `Install extension from file` option (https://gitlab.com/ironfox-oss/IronFox/-/issues/112)

This now also allows users to specify websites they'd like to allow to install extensions with the `xpinstall.whitelist.add` pref, providing users with more freedom and control. The default list allows AMO (`addons.mozilla.org`), as well as AdGuard and Mullvad, to allow users to install those extensions directly from the devs (and for Mullvad's case, at all). In general we'll want to keep this list to a minimum, and users are NOT recommended to add domains here. In the future though, we can probably look into allowing installation from other specific trustworthy sources - fixes https://gitlab.com/ironfox-oss/IronFox/-/issues/102)

Signed-off-by: celenity <celenity@celenity.dev>
2025-06-30 17:42:03 -04:00
celenity
bfd146c94c feat: Bring back and improve install-addons-without-mozaddonmanager.patch - See details below
Unlike the previous patch, this doesn't break the installation of add-ons locally with the `Install extension from file` option (https://gitlab.com/ironfox-oss/IronFox/-/issues/112)

This now also allows users to specify websites they'd like to allow to install extensions with the `xpinstall.whitelist.add` pref, providing users with more freedom and control. The default list allows AMO (`addons.mozilla.org`), as well as AdGuard and Mullvad, to allow users to install those extensions directly from the devs (and for Mullvad's case, at all). In general we'll want to keep this list to a minimum, and users are NOT recommended to add domains here. In the future though, we can probably look into allowing installation from other specific trustworthy sources - fixes https://gitlab.com/ironfox-oss/IronFox/-/issues/102)

Signed-off-by: celenity <celenity@celenity.dev>
2025-06-30 17:40:40 -04:00
Akash Yadav
34ffe98714 fix: finalize IronFox onboarding preferences screen
Signed-off-by: Akash Yadav <itsaky01@gmail.com>
2025-06-30 02:14:38 -04:00
Akash Yadav
a5fe5205b7 feat: add initial onboarding screen
Signed-off-by: Akash Yadav <itsaky01@gmail.com>
2025-06-30 02:14:38 -04:00
celenity
f59923a499 feat: Clean-up, organize, and refine various patches to allow for easier maintenance
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-30 02:07:56 -04:00
celenity
e16304d126 feat: Disable Network Connectivity Status Monitoring (thanks to a patch derived from Tor Browser)
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-29 01:41:44 -04:00
celenity
a3c9025e04 feat: Disable SSLKEYLOGGING (thanks to a patch derived from Tor Browser)
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-29 01:00:06 -04:00
celenity
2609477a27 feat: Add our own moz.configure
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-28 22:14:08 -04:00
celenity
38912360ff feat: Disable fetching featured collections, recommendations, and icons from AMO (addons.mozilla.org)
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-28 21:57:35 -04:00
celenity
b6a2e55d26 feat: Create separate patch for disabling telemetry in Mozilla's mach build system
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-28 21:09:00 -04:00
LucasMZ
7fdfd6c33d feat: give strings dedicated folders 2025-06-27 14:28:47 +05:30
celenity
68d0cdbcd4 v140.0
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-24 23:31:38 -04:00
celenity
956aa718e5 WIP: v140.0
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-24 15:40:00 -04:00
celenity
9d0efeb774 fix: Switch back to restricting mozAddonManager, instead of disabling it entirely for now, to unbreak local add-on installation - fixes https://gitlab.com/ironfox-oss/IronFox/-/issues/112
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-24 14:12:04 -04:00
celenity
318c81c54b feat: Allow installing add-ons from addons.mozilla.org without the privileged mozAddonManager API (Like Desktop), and disable mozAddonManager by default
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-04 01:11:56 -04:00
celenity
4ea5e59308 WIP: Update patches for 139.0 (+ clean-up & tweaks)
Signed-off-by: celenity <celenity@celenity.dev>
2025-05-27 19:00:55 -04:00
Akash Yadav
fe0ec3f3a3 fix: allow build date overrides using system env vars
Signed-off-by: Akash Yadav <itsaky01@gmail.com>
2025-05-18 01:59:31 +05:30