Commit Graph

419 Commits

Author SHA1 Message Date
celenity
6eb1f610d0 Minor tweaks and adjustments
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-12 03:14:24 -04:00
celenity
c984cb5eef Update Phoenix to 2025.07.11.1 - https://codeberg.org/celenity/Phoenix/releases/tag/2025.07.11.1
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-11 21:39:07 -04:00
celenity
fc77a9d712 fix: prebuild.sh
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-11 03:11:39 -04:00
celenity
d8cb8db9a8 Add a built-in collection of wallpapers for IronFox's homepage - fixes https://gitlab.com/ironfox-oss/IronFox/-/issues/6
The initial set of wallpapers are taken from Fennec F-Droid (Available under the Unsplash License): https://gitlab.com/relan/fennecmedia, but we'll be able to expand this and add additional wallpapers in the future

Signed-off-by: celenity <celenity@celenity.dev>
2025-07-11 03:02:19 -04:00
celenity
321b805bb7 Disable fetching favicons for shortcuts/pins on the browser homepage from Mozilla's Tippy Top provider
(Favicons will still display on the homepage after navigating to the shortcut/pin)

Signed-off-by: celenity <celenity@celenity.dev>
2025-07-10 17:28:55 -04:00
celenity
346608f702 Add NOT supported, NOT recommended secret settings to toggle EME and Widevine (Off by default)
Currently, to play DRM-controlled content, users are enabling EME and Widevine from the `about:config` by setting `media.eme.enabled` and `media.mediadrm-widevinecdm.visible` to `true`. This *technically* works, but the problem is that we remove the EME permission UI in `fenix-liberate.patch` - so if a user enables EME with the `media.eme.enabled` pref (which we know users are), it allows *all* websites to use DRM, without prompting.

So for folks who insist on enabling/using DRM (which I will emphasize is NOT supported or recommended), this adds a way for them to enable it at their discretion, while still being able to control which sites can and can't use it, like vanilla Firefox allows.

This adds two hidden/secret settings that function as follows:

- `Enable Encrypted Media Extensions (EME)` - When enabled, this sets `media.eme.enabled` to true, and it exposes the UI for controlling the DRM site permission.
- `Enable Widevine CDM` - This depends on the `Enable Encrypted Media Extensions (EME)` setting. When enabled, it sets `media.mediadrm-widevinecdm.visible` to `true`.

Signed-off-by: celenity <celenity@celenity.dev>
2025-07-09 17:55:54 -04:00
celenity
23ddf007bd Use GeckoView's SafeBrowsingPolicy setting to enable/disable Safe Browsing, instead of implementing our own
For reference, Mozilla uses this for their Safe Browsing toggle in Firefox Focus - doesn't make sense not to leverage the work they've already done. If/when they add a Safe Browsing toggle to Fenix upstream, this is also likely the same approach they'll use.

Signed-off-by: celenity <celenity@celenity.dev>
2025-07-09 17:09:31 -04:00
celenity
75976e79de Minor tweaks/organization/consolidation for our custom Fenix settings
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-09 16:25:08 -04:00
celenity
8eb65ae3fc Allow configuring more prefs from the about:config, and heavily reduce the number of no-op z99.ignore prefs
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-09 15:48:35 -04:00
celenity
d0a7b46814 fix: syntax
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-08 15:55:43 -04:00
celenity
510905beb1 Merge branch 'dev' into refine
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-08 15:54:41 -04:00
celenity
54500dee00 Add back setting to enable/disable Tab Strip (Off by default)- reverts acc4d6a7f8 - fixes https://gitlab.com/ironfox-oss/IronFox/-/issues/27
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-08 15:42:36 -04:00
celenity
e69f488d20 Merge branch 'dev' into refine 2025-07-08 14:38:50 -04:00
celenity
63774feb7e v140.0.4
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-08 14:28:54 -04:00
celenity
db7ef4d075 Merge branch 'dev' into refine 2025-07-08 04:06:15 -04:00
celenity
1cc588ba08 Merge branch 'dev' into unifiedpush 2025-07-07 19:29:28 -04:00
celenity
ab47849d84 Update for v140.0.3
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-07 19:27:10 -04:00
celenity
03dae936f3 v140.0.3
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-07 16:33:27 -04:00
celenity
dee2382442 Resolve conflict
# Conflicts:
#   patches/fenix-overlay/app/src/main/res/values/ironfox_strings.xml
2025-07-07 17:38:52 +00:00
celenity
36f9a68747 Merge branch 'dev' into refine
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-05 17:28:32 -04:00
celenity
86980f49a5 Merge branch 'dev' into 'refine'
# Conflicts:
#   patches/disable-nags.patch
#   patches/fenix-disable-crash-reporting.patch
#   patches/fenix-disable-nimbus.patch
#   patches/fenix-disable-telemetry.patch
#   patches/gecko-disable-crash-reporting.patch
2025-07-05 19:28:26 +00:00
celenity
3344cb8bcd Merge branch 'dev' into 'feat/if-onboarding'
# Conflicts:
#   patches/fenix-disable-telemetry.patch
2025-07-05 19:27:05 +00:00
celenity
63e1056b7b feat: Add patch to disable Nimbus at the app-services level
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-05 15:20:51 -04:00
celenity
1b50574ef5 feat: Use separate patch to disable remote search configuration
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-05 15:18:32 -04:00
celenity
71c8843ebf feat: Combine disable-cfrs.patch & disable-default-browser-engagement-prompts.patch to create disable-nags.patch, + disable additional CFRs
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-05 02:49:01 -04:00
celenity
076410cd86 feat: Block geolocation and notification prompts by default
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-04 02:05:06 -04:00
celenity
1877300abf feat: Add support for UnifiedPush
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-02 19:25:47 -04:00
celenity
5d0cd167dc feat: Update fenix-disable-telemetry.patch - override Glean's URL to custom no-op endpoint, prevent registering pings and initialization, prevent integration with Nimbus, and hide no-op Debug Drawer hidden setting that depends on Glean
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-02 03:54:01 -04:00
celenity
42184c53f3 feat: Update fenix-disable-telemetry.patch - override Glean's URL to custom no-op endpoint, prevent registering pings and initialization, prevent integration with Nimbus, and hide no-op Debug Drawer hidden setting that depends on Glean
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-02 03:48:25 -04:00
celenity
28e429b147 feat: Update fenix-disable-telemetry.patch - override Glean's URL to custom no-op endpoint, prevent registering pings and initialization, prevent integration with Nimbus, and hide no-op Debug Drawer hidden setting that depends on Glean
Signed-off-by: celenity <celenity@celenity.dev>
2025-07-02 03:46:37 -04:00
celenity
362d4e113b feat: Use separate prefs for default list of sites allowed to install add-ons to provide better organization and make it easier for users to enable/disable individual sources as desired, and add EFF/Privacy Badger & NoScript to the default allowed sites
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-30 20:43:38 -04:00
celenity
fba533d68c feat: Use separate prefs for default list of sites allowed to install add-ons to provide better organization and make it easier for users to enable/disable individual sources as desired, and add EFF/Privacy Badger & NoScript to the default allowed sites
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-30 20:43:28 -04:00
celenity
76b4ebd87a feat: Use separate prefs for default list of sites allowed to install add-ons to provide better organization and make it easier for users to enable/disable individual sources as desired, and add EFF/Privacy Badger & NoScript to the default allowed sites
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-30 20:43:07 -04:00
celenity
8d3b9fe170 feat: Bring back and improve install-addons-without-mozaddonmanager.patch - See details below
Unlike the previous patch, this doesn't break the installation of add-ons locally with the `Install extension from file` option (https://gitlab.com/ironfox-oss/IronFox/-/issues/112)

This now also allows users to specify websites they'd like to allow to install extensions with the `xpinstall.whitelist.add` pref, providing users with more freedom and control. The default list allows AMO (`addons.mozilla.org`), as well as AdGuard and Mullvad, to allow users to install those extensions directly from the devs (and for Mullvad's case, at all). In general we'll want to keep this list to a minimum, and users are NOT recommended to add domains here. In the future though, we can probably look into allowing installation from other specific trustworthy sources - fixes https://gitlab.com/ironfox-oss/IronFox/-/issues/102)

Signed-off-by: celenity <celenity@celenity.dev>
2025-06-30 17:42:21 -04:00
celenity
85cd2d9436 feat: Bring back and improve install-addons-without-mozaddonmanager.patch - See details below
Unlike the previous patch, this doesn't break the installation of add-ons locally with the `Install extension from file` option (https://gitlab.com/ironfox-oss/IronFox/-/issues/112)

This now also allows users to specify websites they'd like to allow to install extensions with the `xpinstall.whitelist.add` pref, providing users with more freedom and control. The default list allows AMO (`addons.mozilla.org`), as well as AdGuard and Mullvad, to allow users to install those extensions directly from the devs (and for Mullvad's case, at all). In general we'll want to keep this list to a minimum, and users are NOT recommended to add domains here. In the future though, we can probably look into allowing installation from other specific trustworthy sources - fixes https://gitlab.com/ironfox-oss/IronFox/-/issues/102)

Signed-off-by: celenity <celenity@celenity.dev>
2025-06-30 17:42:03 -04:00
celenity
bfd146c94c feat: Bring back and improve install-addons-without-mozaddonmanager.patch - See details below
Unlike the previous patch, this doesn't break the installation of add-ons locally with the `Install extension from file` option (https://gitlab.com/ironfox-oss/IronFox/-/issues/112)

This now also allows users to specify websites they'd like to allow to install extensions with the `xpinstall.whitelist.add` pref, providing users with more freedom and control. The default list allows AMO (`addons.mozilla.org`), as well as AdGuard and Mullvad, to allow users to install those extensions directly from the devs (and for Mullvad's case, at all). In general we'll want to keep this list to a minimum, and users are NOT recommended to add domains here. In the future though, we can probably look into allowing installation from other specific trustworthy sources - fixes https://gitlab.com/ironfox-oss/IronFox/-/issues/102)

Signed-off-by: celenity <celenity@celenity.dev>
2025-06-30 17:40:40 -04:00
Akash Yadav
34ffe98714 fix: finalize IronFox onboarding preferences screen
Signed-off-by: Akash Yadav <itsaky01@gmail.com>
2025-06-30 02:14:38 -04:00
Akash Yadav
a5fe5205b7 feat: add initial onboarding screen
Signed-off-by: Akash Yadav <itsaky01@gmail.com>
2025-06-30 02:14:38 -04:00
celenity
f59923a499 feat: Clean-up, organize, and refine various patches to allow for easier maintenance
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-30 02:07:56 -04:00
celenity
e16304d126 feat: Disable Network Connectivity Status Monitoring (thanks to a patch derived from Tor Browser)
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-29 01:41:44 -04:00
celenity
a3c9025e04 feat: Disable SSLKEYLOGGING (thanks to a patch derived from Tor Browser)
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-29 01:00:06 -04:00
celenity
2609477a27 feat: Add our own moz.configure
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-28 22:14:08 -04:00
celenity
38912360ff feat: Disable fetching featured collections, recommendations, and icons from AMO (addons.mozilla.org)
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-28 21:57:35 -04:00
celenity
049bc362a9 feat: Add official+true to local.properties
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-28 21:43:17 -04:00
celenity
631b59e49c feat: Ensure we don't try to check/build with a Google Location Service API key
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-28 21:41:40 -04:00
celenity
b6a2e55d26 feat: Create separate patch for disabling telemetry in Mozilla's mach build system
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-28 21:09:00 -04:00
celenity
2029954259 fix: prebuild.sh
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-27 16:48:54 -04:00
celenity
debec5d2ef Clone Firefox with git instead of manually downloading and extracting the archive (+ other very minor tweaks)
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-27 16:10:36 -04:00
celenity
7fa1653900 feat: Download Phoenix (with the version specified at versions.sh, instead of having to manually copy, paste, and update it
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-27 15:55:25 -04:00
celenity
5c6b02e5a6 feat: Update overlay directories to match locations and remove redundancies
Signed-off-by: celenity <celenity@celenity.dev>
2025-06-27 15:46:36 -04:00