1
0
Commit Graph

1662 Commits

Author SHA1 Message Date
Thorin-Oakenpants
31e864c16c
0913: disable windows SSO FF91+
- and make 2730 more accurate and add bugzilla
- future RFP additions will be FF91+
2021-07-08 06:21:53 +00:00
earthlng
acc1376c37
Update arkenfox-clear-deprecated.js 2021-07-07 14:33:20 +00:00
earthlng
939d75e5eb
Update arkenfox-clear-removed.js 2021-07-07 14:25:08 +00:00
earthlng
3b573bf9f0
Update arkenfox-clear-RFP-alternatives.js 2021-07-07 14:15:51 +00:00
earthlng
a231c1e90e
Update arkenfox-clear-RFP-alternatives.js 2021-07-07 14:10:24 +00:00
Thorin-Oakenpants
f229a3cb75
fixup FF90 deprecated (#1207) 2021-07-07 11:51:44 +00:00
Thorin-Oakenpants
981462ee54
FF90 deprecated 2021-07-06 13:26:44 +00:00
Thorin-Oakenpants
d940ffb3c6
105c: add "sponsored shortcuts" 2021-07-06 06:32:58 +00:00
Thorin-Oakenpants
a6d20eaf5b
1264: update ciphers, fixes #1196 (#1197) 2021-06-23 16:22:10 +00:00
Thorin-Oakenpants
b93a5e334c
2510 webaudio -> inactive RFP alts, closes #1194 2021-06-20 12:49:57 +00:00
Thorin-Oakenpants
c98606430c
move 2505 to RFP alts, closes #1099 2021-06-20 09:29:38 +00:00
Thorin-Oakenpants
12c0631900
4501: remove confusing RFP line 2021-06-16 16:48:14 +00:00
Thorin-Oakenpants
efcceaf2c3
enforce non-native widget theme 2021-06-15 09:55:42 +00:00
earthlng
9018577a3e
v1.4 (#1189)
- add -s parameter to start immediately / skip prompt / run non-interactive

This is useful if the user wants to automate the process of updating the user.js and cleaning prefs.

- fQuit: error messages to stderr
- fFF_check: info msg to stderr

Better support for suppressing/redirecting stdout while still showing any error messages in the console, useful for example with `prefsCleaner.sh -s >/dev/null`
2021-06-07 11:18:40 +00:00
earthlng
6968b9a369
v3.2 - proper fix for the diff issue
- re-arrange the match patterns to fix the remaining issue of dropping lines after the 9999 block
- make it work on Mac too
- use `|` where possible so we don't need to escape the forward-slashes. That saves a few bytes and makes the pattern easier to read
2021-06-06 21:30:14 +00:00
earthlng
ada31d4f50
v3.1 - (mostly) fix diff functionality
see #1188 

this should fix the issue that "All prefs after a multi-line comment declaration, on a single line, are deleted with the remove_comments function from the updater."
2021-06-06 18:01:56 +00:00
Thorin-Oakenpants
d973e11714
add instagram word, closes #1184 2021-06-05 17:36:56 +00:00
Thorin-Oakenpants
b6d7b2bff5
RFP info tweak 2021-06-01 11:02:30 +00:00
Thorin-Oakenpants
74f804a056
1243: more dead flash 2021-05-25 18:19:22 +00:00
Thorin-Oakenpants
f0b5e3649d
tidy 2021-05-25 17:46:45 +00:00
Thorin-Oakenpants
9cc132e69d
security.ssl.enable_ocsp_stapling
default true since FF26
2021-05-25 17:32:07 +00:00
Thorin-Oakenpants
9419e2faab
remove 1210
been default true since FF26 - thanks earthlng
2021-05-25 17:30:40 +00:00
Thorin-Oakenpants
0566ded651
fixup, closes #1174 2021-05-09 17:52:38 +00:00
Thorin-Oakenpants
ba9b3c217b
tweak 4600s: closes #1172 2021-05-08 14:45:32 +00:00
Thorin-Oakenpants
79c5539edb
goodbye flash
The prefs still exist, but won't do anything since most of the NPAPI code has been removed
2021-05-05 16:41:43 +00:00
Thorin-Oakenpants
cfd7cd01d1
cleanup 0500s, #1170
- they all have on/off switches
- dxr no longer exists: update URL
- don't recommend users delete files
   - saves two lines
   - they poses zero threat (they have prefs)
   - deleting them can causes unwanted console errors/noise
2021-04-25 11:18:39 +00:00
Thorin-Oakenpants
da9f912862
2620: disable pdfjs scripting, v88 final 2021-04-23 14:25:54 +00:00
Thorin-Oakenpants
9930cfbc07
0102: add setup tag #1166 2021-04-17 07:12:20 +00:00
Thorin-Oakenpants
7738e320d5
RFP & Presentation API 2021-04-15 07:10:54 +00:00
Thorin-Oakenpants
9b8735a87a
webgl.min_capability_mode 2021-04-08 01:21:14 +00:00
Thorin-Oakenpants
6c10e03ce5
2012: remove webgl.min_capability_mode
as promised in 4596d721e6
2021-04-08 01:19:42 +00:00
Thorin-Oakenpants
7ad3bb9e61
0702: use a [STATS] tag 2021-04-07 09:44:24 +00:00
Thorin-Oakenpants
5dcf639d33
oophs .. and start 88-alpha 2021-04-07 09:36:56 +00:00
Thorin-Oakenpants
2da3b0192f
update HTTP2 stats 2021-04-07 09:36:01 +00:00
Thorin-Oakenpants
ada8158caf
v87 2021-04-04 20:33:23 +00:00
Thorin-Oakenpants
2071939c5e
use [TOR] tags, add 1247
not that we recommend using tor over firefox: but at least the info is there for fiddlers
2021-04-04 14:21:24 +00:00
Thorin-Oakenpants
f082278217
1607: save one line and some bytes
and make it even MOAR clear we do NOT support tor over firefox
2021-04-04 14:15:53 +00:00
Thorin-Oakenpants
abe37add6e
save some overrides, closes #1157
I do not think anyone will bemoan these four "personal" choices
2021-04-04 12:54:17 +00:00
Thorin-Oakenpants
bc07ca94c0
1830: add [TEST] 2021-04-04 12:37:17 +00:00
Thorin-Oakenpants
728c962684
2402: potential clipboard leak fixed in FF89+
Thanks @gwarser for testing, creating the bugzilla, being patient, and confirming the fix
2021-04-04 12:01:49 +00:00
Thorin-Oakenpants
ca99add006
turn ETP on everywhere
It literally cannot hurt [1], and makes it easier for users to use custom mode with TCP/dFPI. Turning on socialtracking helps gain parity with strict mode

[1] gorhill: https://old.reddit.com/r/firefox/comments/l7xetb/network_priority_for_firefoxs_enhanced_tracking/gl9rn9n/
> All extensions and ETP work in parallel, they all inspect network requests and all make the decision to block or not, hence if they all decide to block, they will all report that they block something. ETP is a bit different than normal extension in that it will give precedence to an extension trying to redirect to a local resource, this ensures ETP works harmoniously with normal extensions.
> 
> Once something is not blocked, it then goes through a DNS query, and the browser waits for the response.
> 
> I will add examples of how ETP + multiple blocker extensions work together when dealing with a network request; let's say "A" and "B" are two different blockers:
> 
>   - ETP=block, A=allow, B=allow: result=block
>   - ETP=allow, A=block, B=allow: result=block
>   - ETP=allow, A=allow, B=redirect: result=redirect
>   - ETP=allow, A=block, B=redirect: result=block
>   - ETP=block, A=allow, B=redirect: result=redirect
> 
> So as you can see, ETP is a bit different than a normal extension in that it won't prevent redirection from happening if ever a network request is redirected by one of the normal extension.
2021-04-04 11:49:07 +00:00
Thorin-Oakenpants
f771027138
2720 was removed in FF72
https://bugzilla.mozilla.org/1488583
2021-04-04 11:18:54 +00:00
Thorin-Oakenpants
8f1c0044b9
2701: add cookie behavior 5 2021-04-04 11:07:39 +00:00
Thorin-Oakenpants
87cd828b5b
browser.send_pings.require_same_host
redundant/defense-in-depth pref for `browser.send_pings` which is still at default false after six years of watching it (false is what we want)
2021-04-03 14:25:46 +00:00
Thorin-Oakenpants
46ccd9f654
cleanup 0600s
three prefs are default since at least 78, and one pref is redundant for a pref that has been at our default since it was added
2021-04-03 14:20:39 +00:00
Thorin-Oakenpants
b1927f9de1
1607 make inactive
Useless, since Firefox doesn't use Tor (and which we don't recommend). It was added for the info factor.
2021-03-27 18:42:52 +00:00
Thorin-Oakenpants
b592e0e592
87 deprecated
It is simpler to leave the PointerEvent pref where it is, until ESR78 is EOL
- FF87+ users who use RFP Alts simply add a dead pref, no harm
- This way ESR78 users don't have to worry about extra char flipping: it's the same as before: 1 flip for ESR, 1 flip for RFP Alts
2021-03-27 07:49:14 +00:00
Thorin-Oakenpants
3b6cd93749
1606: default Referrer Policy default 2021-03-27 07:32:19 +00:00
Thorin-Oakenpants
3a24c01f03
0518: enforce no Web Compat Reporter
only stable is false, at the time of writing. but enforcing this for all channels is good, so no-one ends up wasting mozilla resources reporting a compat problem when they've got 200 odd prefs flipped
2021-03-17 14:01:16 +00:00
Thorin-Oakenpants
b7c80841a9
tweak defaults (#1140)
- don't differentiate between channels
- both can be made inactive
   - webcompat requires user action: and I don't see this as a bad thing to have in non-stable
   - unsubmitted crashReports on Nightly is probably already covered by killing the URL, so no big deal
2021-03-14 11:21:13 +00:00