initial commit of firefox-forbidden-policies.js (autoconfig take#2)

This commit is contained in:
Aminda Suomalainen 2024-05-19 14:05:04 +03:00
parent 6293ce0a14
commit 17a189396b
Signed by: Mikaela
SSH Key Fingerprint: SHA256:CXLULpqNBdUKB6E6fLA1b/4SzG0HvKD19PbIePU175Q
5 changed files with 75 additions and 7 deletions

View File

@ -20,11 +20,15 @@ cat etc/ssh/ssh_config >~/.ssh/config
cat .editorconfig >~/.editorconfig
mkdir -p ~/.local/firefox/defaults/pref/
cat conf/autoconfig.js >~/.local/firefox/defaults/pref/autoconfig.js
cat conf/librewolf.overrides.cfg >~/.local/firefox/librewolf.overrides.cfg
cat conf/librewolf.overrides.cfg >~/public_html/autoconfig.js
#cat conf/librewolf.overrides.cfg >~/.local/firefox/librewolf.overrides.cfg
cat conf/firefox-forbidden-policies.js >~/.local/firefox/firefox-forbidden-policies.js
#cat conf/librewolf.overrides.cfg >~/public_html/autoconfig.js
cat conf/firefox-forbidden-policies.js >~/public_html/autoconfig.js
mkdir -p ~/.librewolf/ ~/.var/app/io.gitlab.librewolf-community/.librewolf/
cat conf/librewolf.overrides.cfg >~/.librewolf/librewolf.overrides.cfg
cat conf/librewolf.overrides.cfg >~/.var/app/io.gitlab.librewolf-community/.librewolf/librewolf.overrides.cfg
#cat conf/librewolf.overrides.cfg >~/.librewolf/librewolf.overrides.cfg
cat conf/firefox-forbidden-policies.js >~/.librewolf/librewolf.overrides.cfg
#cat conf/librewolf.overrides.cfg >~/.var/app/io.gitlab.librewolf-community/.librewolf/librewolf.overrides.cfg
cat conf/firefox-forbidden-policies.js >~/.var/app/io.gitlab.librewolf-community/.librewolf/librewolf.overrides.cfg
mkdir -p ~/.local/share/applications
ln -sfv ~/.shell-things/local/share/applications ~/.local/share/applications/shell-things
rm -fv ~/.shell-things/local/share/applications/applications

View File

@ -3,6 +3,7 @@
// However the file below belongs to ../../ e.g. /usr/lib/64/firefox/ or
// ~/.local/firefox/
pref("general.config.filename", "librewolf.overrides.cfg");
//pref("general.config.filename", "librewolf.overrides.cfg");
pref("general.config.filename", "firefox-forbidden-policies.js");
pref("general.config.obscure_value", 0);
// vim: filetype=javascript

View File

@ -1,6 +1,6 @@
// This file belongs to Firefox `default/pref` directory as `autoconfig.js`.
// E.g. /usr/lib64/firefox/defaults/pref/autoconfig.js
//pref("autoadmin.global_config_url","https://gitea.blesmrt.net/mikaela/shell-things/raw/branch/master/conf/librewolf.overrides.cfg");
//pref("autoadmin.global_config_url","https://gitea.blesmrt.net/mikaela/shell-things/raw/branch/master/conf/firefox-forbidden-policies.js");
pref("autoadmin.global_config_url","file:///home/aminda/public_html/autoconfig.js");
pref("general.config.obscure_value", 0);
pref("autoadmin.refresh_interval", 120);

View File

@ -0,0 +1,63 @@
// Remember to start writing at line 2. This is my second attempt at Firefox
// autoconfig after being taught by LibreAwoo, but this time I am trying to
// avoid duplicating my browser policy, which you can find from the same
// repository, etc/firefox/policies/policies.json
// If autoconfig is not found, fallback. Also means this file.
pref("autoadmin.failover_to_cached", true);
pref(
"autoadmin.global_config_url",
"https://gitea.blesmrt.net/mikaela/shell-things/raw/branch/master/conf/firefox-forbidden-policies.js",
);
pref("autoadmin.offline_failover", true);
pref("autoadmin.refresh_interval", 120);
// Automatically click cookiebanners although uBlock Origin might block them
pref("cookiebanners.bannerClicking.enabled", true);
pref("cookiebanners.service.mode", 2);
pref("cookiebanners.service.mode.privateBrowsing", 2);
// Play animated images only once, accessibility.
pref("image.animation.mode", "once");
// Spoof en-US as language to scripts
pref("javascript.use_us_english_locale", true);
// DNT although PrivacyBadger from policy handles this
pref("privacy.donottrackheader.enabled", true);
pref("privacy.donottrackheader.value", 1);
// More tunable privacy.resistfingerprinting. I have lost the privacy game
// many times before this point, so this is nothing.
pref("privacy.fingerprintingProtection", true);
pref(
"privacy.fingerprintingProtection.overrides",
"+AllTargets,-KeyboardEvents,-SpeechSynthesis,-CSSPrefersColorScheme,-CSSPrefersReducedMotion,-NavigatorPlatform,-NavigatorUserAgent,-JSDateTimeUTC,-HttpUserAgent,-FontVisibilityRestrictGenerics,-FontVisibilityBaseSystem,-FontVisibilityLangPack",
);
pref("privacy.fingerprintingProtection.pbmode", true);
// (Incompatible with the above)
pref("privacy.resistFingerprinting", false);
pref("privacy.resistFingerprinting.block_mozAddonManage", true);
// Letterboxing from Tor Browser, I like it in general.
pref("privacy.resistFingerprinting.letterboxing", true);
// Still Incompatible with the above
pref("privacy.resistFingerprinting.pbmode", false);
// Enable containers without extensions (although those are forced by the
// policy. TODO: Remove these as they are in the policy, but disallowed by
// current ESR
pref("privacy.userContext.enabled", true);
pref("privacy.userContext.ui.enabled", true);
// Enables reading mode for all pages (at least in theory)
pref("reader.parse-on-load.force-enabled", true);
// Ensure OCSP stapling is enabled, especially if the server has it
pref("security.ssl.enable_ocsp_must_staple", true);
// TODO: Consider removing this when ESR updates as only it needs this for
// ECH, which is otherwise the default=
pref("security.tls.ech.grease_http3", true);
// No making configuration on the last line of the file!
//

View File

@ -251,7 +251,7 @@
"Comment": "Preference not allowed for stability reasons. :(",
"Status": "locked",
"Type": "string",
"Value": "https://gitea.blesmrt.net/mikaela/shell-things/raw/branch/master/conf/librewolf.overrides.cfg"
"Value": "https://gitea.blesmrt.net/mikaela/shell-things/raw/branch/master/conf/firefox-forbidden-policies.js"
},
"autoadmin.offline_failover": {
"Comment": "Preference not allowed for stability reasons. :(",