Delete dev folder
This commit is contained in:
parent
220f234b39
commit
c269040ff5
6 changed files with 0 additions and 2317 deletions
|
|
@ -1,8 +0,0 @@
|
||||||
## Archive
|
|
||||||
|
|
||||||
These are parts of the original LibreFox and have not been reviewed yet. The files in this folder will be reviewed for:
|
|
||||||
|
|
||||||
* Integration into the browser itself
|
|
||||||
* Integration into the configuration scripts
|
|
||||||
* Moving to an external repository
|
|
||||||
* Deletion
|
|
||||||
|
|
@ -1,201 +0,0 @@
|
||||||
========================================================================================================================
|
|
||||||
Build Notes v2 :
|
|
||||||
========================================================================================================================
|
|
||||||
|
|
||||||
|
|
||||||
- Tor files to remove :
|
|
||||||
|
|
||||||
Classic removal plus
|
|
||||||
https-everywhere addon
|
|
||||||
profile.meek-http-helper...
|
|
||||||
|
|
||||||
- Patching release :
|
|
||||||
|
|
||||||
>browser.omni.ja.chrome.browser.content.browser.preferences.in-content.privacy.origin (patch with winrar)
|
|
||||||
Tor : patch mozilla.cfg
|
|
||||||
|
|
||||||
- Tor windows :
|
|
||||||
|
|
||||||
Install it to desktop then get the files
|
|
||||||
(Only the lnk file is a new file compared to compressed version)
|
|
||||||
remove lnk file
|
|
||||||
add link.vbs
|
|
||||||
add bat file
|
|
||||||
|
|
||||||
- Tor mac :
|
|
||||||
|
|
||||||
Under mac, mount and extract all content to a folder
|
|
||||||
Copy by command .DS_Store (from dmg to folder)
|
|
||||||
run "codesign --remove-signature Tor\ Browser.app".
|
|
||||||
With disk utils, create a dmg from a folder (nocompression rw)
|
|
||||||
We are converting iso-dmg to dmg...
|
|
||||||
|
|
||||||
========================================================================================================================
|
|
||||||
JS Note & Debugging :
|
|
||||||
========================================================================================================================
|
|
||||||
|
|
||||||
// ----------
|
|
||||||
// CSP Note :
|
|
||||||
// ----------
|
|
||||||
//
|
|
||||||
// Syntax :
|
|
||||||
// One or more sources can be allowed for the default-src policy:
|
|
||||||
// Content-Security-Policy: default-src <source> <source>;
|
|
||||||
// Content-Security-Policy: default-src <source>;
|
|
||||||
//
|
|
||||||
// default-src is a fallback for :
|
|
||||||
// - child-src
|
|
||||||
// - connect-src
|
|
||||||
// - font-src
|
|
||||||
// - frame-src
|
|
||||||
// - img-src
|
|
||||||
// - manifest-src
|
|
||||||
// - media-src
|
|
||||||
// - object-src
|
|
||||||
// - prefetch-src
|
|
||||||
// - script-src
|
|
||||||
// - style-src
|
|
||||||
// - worker-src
|
|
||||||
//
|
|
||||||
// <source> can be one of the following:
|
|
||||||
//
|
|
||||||
// 'none'
|
|
||||||
// Refers to the empty set; that is, no URLs match. The single quotes are required.
|
|
||||||
//
|
|
||||||
// 'self'
|
|
||||||
// Refers to the origin from which the protected document is being served,
|
|
||||||
// including the same URL scheme and port number. You must include the single quotes.
|
|
||||||
// Some browsers specifically exclude blob and filesystem from source directives.
|
|
||||||
// Sites needing to allow these content types can specify them using the Data attribute.
|
|
||||||
//
|
|
||||||
// 'unsafe-inline'
|
|
||||||
// Allows the use of inline resources, such as inline <script> elements, javascript:
|
|
||||||
// URLs, inline event handlers, and inline <style> elements. You must include the single quotes.
|
|
||||||
//
|
|
||||||
// 'unsafe-eval'
|
|
||||||
// Allows the use of eval() and similar methods for creating code from strings.
|
|
||||||
// You must include the single quotes.
|
|
||||||
//
|
|
||||||
// <scheme-source>
|
|
||||||
// A schema such as 'http:' or 'https:'. The colon is required, single quotes
|
|
||||||
// shouldn't be used. You can also specify data schemas (not recommended).
|
|
||||||
// - data: Allows data: URIs to be used as a content source. This is insecure;
|
|
||||||
// An attacker can also inject arbitrary data: URIs.
|
|
||||||
// Use this sparingly and definitely not for scripts.
|
|
||||||
// - mediastream: Allows mediastream: URIs to be used as a content source.
|
|
||||||
// - blob: Allows blob: URIs to be used as a content source.
|
|
||||||
// - filesystem: Allows filesystem: URIs to be used as a content source.
|
|
||||||
//
|
|
||||||
// <host-source>
|
|
||||||
// Internet hosts by name or IP address, as well as an optional URL scheme and/or port number.
|
|
||||||
// The site's address may include an optional leading wildcard (the asterisk character, '*'),
|
|
||||||
// and you may use a wildcard (again, '*') as the port number, indicating that all
|
|
||||||
// legal ports are valid for the source.
|
|
||||||
// Examples:
|
|
||||||
// - http://*.example.com: Matches all attempts to load from any subdomain of example.com using the http: URL scheme.
|
|
||||||
// - mail.example.com:443: Matches all attempts to access port 443 on mail.example.com.
|
|
||||||
// - https://store.example.com: Matches all attempts to access store.example.com using https:.
|
|
||||||
//
|
|
||||||
// Sources :
|
|
||||||
// https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP
|
|
||||||
// https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/default-src
|
|
||||||
|
|
||||||
// -----------------
|
|
||||||
// Process Isolation
|
|
||||||
// -----------------
|
|
||||||
//
|
|
||||||
// Pref : Separate process for protocol
|
|
||||||
// defaultPref("extensions.webextensions.protocol.remote", true); //default true
|
|
||||||
//
|
|
||||||
// Pref : Separate process for protocol extension
|
|
||||||
// defaultPref("extensions.webextensions.remote", false); //default true
|
|
||||||
//
|
|
||||||
// Process remote (separating process) can partially firewall extension by
|
|
||||||
// denying access to some moz-extension (extension internal url like settings page)
|
|
||||||
// but this is not reliable not usable for a purpose of firewalling
|
|
||||||
// Setting this to false will break moz-extension URI loading
|
|
||||||
// unless other process sandboxing and extension remoting prefs are changed.
|
|
||||||
// Note, extensions.webextensions.protocol.remote=false is for
|
|
||||||
// debugging purposes only. With process-level sandboxing, child
|
|
||||||
// processes (specifically content and extension processes), will
|
|
||||||
// not be able to load most moz-extension URI's when the pref is
|
|
||||||
// set to false.
|
|
||||||
|
|
||||||
// ------------------
|
|
||||||
// Restricted Domains
|
|
||||||
// ------------------
|
|
||||||
//
|
|
||||||
// "extensions.webextensions.restrictedDomains"
|
|
||||||
//
|
|
||||||
// gHacks set this to empty ""... this is list of blocked domain for ext.
|
|
||||||
// Default value :
|
|
||||||
// "accounts-static.cdn.mozilla.net,accounts.firefox.com,addons.cdn.mozilla.net,addons.mozilla.org,
|
|
||||||
// api.accounts.firefox.com,content.cdn.mozilla.net,content.cdn.mozilla.net,discovery.
|
|
||||||
// addons.mozilla.org,input.mozilla.org,install.mozilla.org,oauth.accounts.firefox.
|
|
||||||
// com,profile.accounts.firefox.com,support.mozilla.org,sync.services.
|
|
||||||
// mozilla.com,testpilot.firefox.com"
|
|
||||||
//
|
|
||||||
// Managed in
|
|
||||||
// AddonManagerWebAPI.cpp
|
|
||||||
// WebExtensionPolicy.cpp
|
|
||||||
//
|
|
||||||
// Check function (When fail directly return deny) :
|
|
||||||
//
|
|
||||||
// WebExtensionPolicy::IsRestrictedURI
|
|
||||||
// - Check againt restrictedDomains (false-allow) domains->Contains
|
|
||||||
// - Check if IsValidSite (deny access) (false-allow)
|
|
||||||
// --- Check if empty string --(false-allow)
|
|
||||||
// --- Check https/http --(false-allow)
|
|
||||||
// --- Check SSL --(false-allow)
|
|
||||||
// --- Allow those domain directly --(true---deny)
|
|
||||||
// "addons.mozilla.org"
|
|
||||||
// "discovery.addons.mozilla.org"
|
|
||||||
// "testpilot.firefox.com"
|
|
||||||
// --- If pref "extensions.webapi.testing" --(true---deny)
|
|
||||||
// is true, it allow access to other
|
|
||||||
// sites list
|
|
||||||
// --- Return false --(false-allow)
|
|
||||||
// - Return false (false-allow)
|
|
||||||
|
|
||||||
// -----------------
|
|
||||||
// Other Possibility
|
|
||||||
// -----------------
|
|
||||||
//
|
|
||||||
// Other possibility (securefox extension) compare requests to url... filter etc...
|
|
||||||
//
|
|
||||||
// Other possibility... recompile and make it a native feature... (may be for futur version)
|
|
||||||
// Just invert the code to be !domains->Contains and thus allow only listed domain
|
|
||||||
//
|
|
||||||
// Other hidden setting
|
|
||||||
// int dom.ipc.keepProcessesAlive.extension //hidden settings
|
|
||||||
//
|
|
||||||
// Conclusion : patching binary "IsRestrictedURI" function OR build own version
|
|
||||||
// Durable solution is to rebuild... this feature is paused until futur versions
|
|
||||||
//
|
|
||||||
|
|
||||||
// ---------------------------------------
|
|
||||||
// Pref : CSP Settings For Extensions I/II
|
|
||||||
// ---------------------------------------
|
|
||||||
//
|
|
||||||
// Default Value : "
|
|
||||||
// script-src 'self' https://* moz-extension: blob: filesystem: 'unsafe-eval' 'unsafe-inline';
|
|
||||||
// object-src 'self' https://* moz-extension: blob: filesystem:;
|
|
||||||
// "
|
|
||||||
//
|
|
||||||
// Default Deny Value : "
|
|
||||||
// default-src 'self' moz-extension: blob: filesystem: 'unsafe-eval' 'unsafe-inline';
|
|
||||||
// script-src 'self' moz-extension: blob: filesystem: 'unsafe-eval' 'unsafe-inline';
|
|
||||||
// object-src 'self' moz-extension: blob: filesystem:;
|
|
||||||
// "
|
|
||||||
//
|
|
||||||
// Strict Deny Value : "
|
|
||||||
// default-src 'self' moz-extension: blob: filesystem:;
|
|
||||||
// script-src 'self' moz-extension: blob: filesystem: 'unsafe-eval' 'unsafe-inline';
|
|
||||||
// object-src 'self' moz-extension: blob: filesystem:;
|
|
||||||
// "
|
|
||||||
//
|
|
||||||
// Super Strict Deny Value : "
|
|
||||||
// default-src 'none';
|
|
||||||
// script-src 'self' moz-extension: blob: filesystem: 'unsafe-eval' 'unsafe-inline';
|
|
||||||
// object-src 'self' moz-extension: blob: filesystem:;
|
|
||||||
// "
|
|
||||||
|
|
@ -1,45 +0,0 @@
|
||||||
#!/usr/bin/env bash
|
|
||||||
# The purpose of this file is to automatically install the librewolf settings into every profile that exists in the
|
|
||||||
# profiles.ini file.
|
|
||||||
#
|
|
||||||
# This script is intended to be called at librewolf startup.
|
|
||||||
#
|
|
||||||
# This script should be used from the librewolf source code, otherwise the settings data folder must be specified below
|
|
||||||
#
|
|
||||||
# This script does not overwrite the settings files if they exist, so feel free to customize your per profile configurations
|
|
||||||
#
|
|
||||||
# For Reference, profiles can be found in: /home/<username>/.librewolf/
|
|
||||||
|
|
||||||
LIBREWOLF_FOLDER=$HOME/.librewolf;
|
|
||||||
PROFILE_FILE=${LIBREWOLF_FOLDER}/profiles.ini;
|
|
||||||
SCRIPT_FOLDER=$(realpath $(dirname $0));
|
|
||||||
SETTINGS_DATA_FOLDER=$SCRIPT_FOLDER/settings;
|
|
||||||
|
|
||||||
profile_folders=();
|
|
||||||
|
|
||||||
# Get profile folders from profiles.ini --------------------------------------------------------------------------------
|
|
||||||
function get_profile_folders() {
|
|
||||||
while IFS= read -r line; do # reads file line by line, saving each line to $line
|
|
||||||
if [[ ${line} == "Path="* ]]; then # checks if $line starts with "Path="
|
|
||||||
IFS='='; read -ra split_line <<< "$line"; # splits the line on '=' storing values in the $split_line array
|
|
||||||
path=${split_line[1]}; # gets the path from the second element of the array
|
|
||||||
if [[ ${path} != /* ]]; then
|
|
||||||
path=${LIBREWOLF_FOLDER}/${path};
|
|
||||||
fi
|
|
||||||
profile_folders+=(${path}) # appends the second element of split_line array (the path) to $profile_folders
|
|
||||||
fi
|
|
||||||
done < ${PROFILE_FILE}
|
|
||||||
}
|
|
||||||
|
|
||||||
# Install script to profile folders -------------------------------------------------------------------------------------
|
|
||||||
function add_settings_to_folder() {
|
|
||||||
get_profile_folders;
|
|
||||||
for profile_folder in "${profile_folders[@]}"
|
|
||||||
do
|
|
||||||
echo "Adding settings to" ${profile_folder}
|
|
||||||
cp -rvn ${SETTINGS_DATA_FOLDER} $profile_folder/
|
|
||||||
# do whatever on $i
|
|
||||||
done
|
|
||||||
}
|
|
||||||
|
|
||||||
add_settings_to_folder;
|
|
||||||
File diff suppressed because it is too large
Load diff
|
|
@ -1,14 +0,0 @@
|
||||||
--- privacy.js 2010-01-01 00:00:00.000000000 +0100
|
|
||||||
+++ privacy.patched.js 2018-12-11 17:08:48.076552654 +0100
|
|
||||||
@@ -1746,6 +1746,11 @@
|
|
||||||
});
|
|
||||||
|
|
||||||
// set initial values
|
|
||||||
+
|
|
||||||
+ // Librefox
|
|
||||||
+ if (Services.prefs.prefIsLocked("browser.safebrowsing.downloads.enabled")) {
|
|
||||||
+ enableSafeBrowsing.setAttribute("disabled", "true");
|
|
||||||
+ }
|
|
||||||
|
|
||||||
enableSafeBrowsing.checked = safeBrowsingPhishingPref.value && safeBrowsingMalwarePref.value;
|
|
||||||
if (!enableSafeBrowsing.checked) {
|
|
||||||
|
|
@ -1,27 +0,0 @@
|
||||||
https://github.com/mozilla/policy-templates/blob/master/README.md
|
|
||||||
|
|
||||||
Bookmarks
|
|
||||||
{
|
|
||||||
"policies": {
|
|
||||||
"Bookmarks": [
|
|
||||||
{
|
|
||||||
"Title": "Example",
|
|
||||||
"URL": "http://example.org",
|
|
||||||
"Favicon": "http://example.com/favicon.ico",
|
|
||||||
"Placement": ["toolbar", "menu"],
|
|
||||||
"Folder": "FolderName"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
DNSOverHTTP
|
|
||||||
{
|
|
||||||
"policies": {
|
|
||||||
"DNSOverHTTPS": {
|
|
||||||
"Enabled": [true|false],
|
|
||||||
"ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
|
|
||||||
"Locked": [true|false]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
Loading…
Add table
Reference in a new issue