mirror of
https://github.com/arkenfox/user.js.git
synced 2024-10-01 01:35:52 -04:00
misc2 (#1010)
* forceMediaMemoryCache breakage * add back ESR68-EOL for prefsCleaner users
This commit is contained in:
parent
75a03df0f7
commit
9c98972d14
101
user.js
101
user.js
@ -586,7 +586,8 @@ user_pref("browser.cache.disk.enable", false);
|
|||||||
* [1] https://bugzilla.mozilla.org/967812 ***/
|
* [1] https://bugzilla.mozilla.org/967812 ***/
|
||||||
// user_pref("permissions.memory_only", true); // [HIDDEN PREF]
|
// user_pref("permissions.memory_only", true); // [HIDDEN PREF]
|
||||||
/* 1007: disable media cache from writing to disk in Private Browsing
|
/* 1007: disable media cache from writing to disk in Private Browsing
|
||||||
* [NOTE] MSE (Media Source Extensions) are already stored in-memory in PB ***/
|
* [NOTE] MSE (Media Source Extensions) are already stored in-memory in PB
|
||||||
|
* [SETUP-WEB] ESR78: playback might break on subsequent loading (1650281) ***/
|
||||||
user_pref("browser.privatebrowsing.forceMediaMemoryCache", true); // [FF75+]
|
user_pref("browser.privatebrowsing.forceMediaMemoryCache", true); // [FF75+]
|
||||||
user_pref("media.memory_cache_max_size", 65536);
|
user_pref("media.memory_cache_max_size", 65536);
|
||||||
|
|
||||||
@ -735,9 +736,11 @@ user_pref("security.mixed_content.block_display_content", true);
|
|||||||
user_pref("security.mixed_content.block_object_subrequest", true);
|
user_pref("security.mixed_content.block_object_subrequest", true);
|
||||||
/* 1244: enable HTTPS-Only mode [FF76+]
|
/* 1244: enable HTTPS-Only mode [FF76+]
|
||||||
* When "https_only_mode" (all windows) is true, "https_only_mode_pbm" (private windows only) is ignored
|
* When "https_only_mode" (all windows) is true, "https_only_mode_pbm" (private windows only) is ignored
|
||||||
|
* [WARNING] This is experimental, see [1] and you can't set exceptions if FPI is enabled, see [2]
|
||||||
* [SETTING] to add site exceptions: Page Info>Permissions>Use insecure HTTP (FF80+)
|
* [SETTING] to add site exceptions: Page Info>Permissions>Use insecure HTTP (FF80+)
|
||||||
* [SETTING] Privacy & Security>HTTPS-Only Mode (FF80+ with browser.preferences.exposeHTTPSOnly = true)
|
* [SETTING] Privacy & Security>HTTPS-Only Mode (FF80+ with browser.preferences.exposeHTTPSOnly = true)
|
||||||
* [1] https://bugzilla.mozilla.org/1613063 ***/
|
* [1] https://bugzilla.mozilla.org/1613063 [META]
|
||||||
|
* [2] https://bugzilla.mozilla.org/1647829 ***/
|
||||||
// user_pref("dom.security.https_only_mode", true); // [FF76+]
|
// user_pref("dom.security.https_only_mode", true); // [FF76+]
|
||||||
// user_pref("dom.security.https_only_mode_pbm", true); // [FF80+]
|
// user_pref("dom.security.https_only_mode_pbm", true); // [FF80+]
|
||||||
// user_pref("dom.security.https_only_mode.upgrade_local", true); // [FF77+]
|
// user_pref("dom.security.https_only_mode.upgrade_local", true); // [FF77+]
|
||||||
@ -1696,5 +1699,99 @@ user_pref("intl.charset.fallback.override", "windows-1252");
|
|||||||
// * * * /
|
// * * * /
|
||||||
// ***/
|
// ***/
|
||||||
|
|
||||||
|
/* ESR68.x still uses all the following prefs
|
||||||
|
// [NOTE] replace the * with a slash in the line above to re-enable them
|
||||||
|
// FF69
|
||||||
|
// 1405: disable WOFF2 (Web Open Font Format) [FF35+]
|
||||||
|
// [-] https://bugzilla.mozilla.org/1556991
|
||||||
|
// user_pref("gfx.downloadable_fonts.woff2.enabled", false);
|
||||||
|
// 1802: enforce click-to-play for plugins
|
||||||
|
// [-] https://bugzilla.mozilla.org/1519434
|
||||||
|
user_pref("plugins.click_to_play", true); // [DEFAULT: true FF25+]
|
||||||
|
// 2033: disable autoplay for muted videos [FF63+] - replaced by 'media.autoplay.default' options (2030)
|
||||||
|
// [-] https://bugzilla.mozilla.org/1562331
|
||||||
|
// user_pref("media.autoplay.allow-muted", false);
|
||||||
|
// * * * /
|
||||||
|
// FF71
|
||||||
|
// 2608: disable WebIDE and ADB extension download
|
||||||
|
// [1] https://trac.torproject.org/projects/tor/ticket/16222
|
||||||
|
// [-] https://bugzilla.mozilla.org/1539462
|
||||||
|
user_pref("devtools.webide.enabled", false); // [DEFAULT: false FF70+]
|
||||||
|
user_pref("devtools.webide.autoinstallADBExtension", false); // [FF64+]
|
||||||
|
// 2731: enforce websites to ask to store data for offline use
|
||||||
|
// [1] https://support.mozilla.org/questions/1098540
|
||||||
|
// [2] https://bugzilla.mozilla.org/959985
|
||||||
|
// [-] https://bugzilla.mozilla.org/1574480
|
||||||
|
user_pref("offline-apps.allow_by_default", false);
|
||||||
|
// * * * /
|
||||||
|
// FF72
|
||||||
|
// 0105a: disable Activity Stream telemetry
|
||||||
|
// [-] https://bugzilla.mozilla.org/1597697
|
||||||
|
user_pref("browser.newtabpage.activity-stream.telemetry.ping.endpoint", "");
|
||||||
|
// 0330: disable Hybdrid Content telemetry
|
||||||
|
// [-] https://bugzilla.mozilla.org/1520491
|
||||||
|
user_pref("toolkit.telemetry.hybridContent.enabled", false); // [FF59+]
|
||||||
|
// 2720: enforce IndexedDB (IDB) as enabled
|
||||||
|
// IDB is required for extensions and Firefox internals (even before FF63 in [1])
|
||||||
|
// To control *website* IDB data, control allowing cookies and service workers, or use
|
||||||
|
// Temporary Containers. To mitigate *website* IDB, FPI helps (4001), and/or sanitize
|
||||||
|
// on close (Offline Website Data, see 2800) or on-demand (Ctrl-Shift-Del), or automatically
|
||||||
|
// via an extension. Note that IDB currently cannot be sanitized by host.
|
||||||
|
// [1] https://blog.mozilla.org/addons/2018/08/03/new-backend-for-storage-local-api/
|
||||||
|
// [-] https://bugzilla.mozilla.org/1488583
|
||||||
|
user_pref("dom.indexedDB.enabled", true); // [DEFAULT: true]
|
||||||
|
// * * * /
|
||||||
|
// FF74
|
||||||
|
// 0203: use Mozilla geolocation service instead of Google when geolocation is enabled
|
||||||
|
// Optionally enable logging to the console (defaults to false)
|
||||||
|
// [-] https://bugzilla.mozilla.org/1613627
|
||||||
|
user_pref("geo.wifi.uri", "https://location.services.mozilla.com/v1/geolocate?key=%MOZILLA_API_KEY%");
|
||||||
|
// user_pref("geo.wifi.logging.enabled", true); // [HIDDEN PREF]
|
||||||
|
// 1704: set behaviour on "+ Tab" button to display container menu [FF53+] [SETUP-CHROME]
|
||||||
|
// 0=no menu (default), 1=show when clicked, 2=show on long press
|
||||||
|
// [1] https://bugzilla.mozilla.org/1328756
|
||||||
|
// [-] https://bugzilla.mozilla.org/1606265
|
||||||
|
user_pref("privacy.userContext.longPressBehavior", 2);
|
||||||
|
// 2012: limit WebGL
|
||||||
|
// [-] https://bugzilla.mozilla.org/1477756
|
||||||
|
user_pref("webgl.disable-extensions", true);
|
||||||
|
// * * * /
|
||||||
|
// FF76
|
||||||
|
// 0401: sanitize blocklist url
|
||||||
|
// [2] https://trac.torproject.org/projects/tor/ticket/16931
|
||||||
|
// [-] https://bugzilla.mozilla.org/1618188
|
||||||
|
user_pref("extensions.blocklist.url", "https://blocklists.settings.services.mozilla.com/v1/blocklist/3/%APP_ID%/%APP_VERSION%/");
|
||||||
|
// 2201: prevent websites from disabling new window features
|
||||||
|
// [-] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1507375,1660524
|
||||||
|
user_pref("dom.disable_window_open_feature.close", true);
|
||||||
|
user_pref("dom.disable_window_open_feature.location", true); // [DEFAULT: true]
|
||||||
|
user_pref("dom.disable_window_open_feature.menubar", true);
|
||||||
|
user_pref("dom.disable_window_open_feature.minimizable", true);
|
||||||
|
user_pref("dom.disable_window_open_feature.personalbar", true); // bookmarks toolbar
|
||||||
|
user_pref("dom.disable_window_open_feature.resizable", true); // [DEFAULT: true]
|
||||||
|
user_pref("dom.disable_window_open_feature.status", true); // [DEFAULT: true]
|
||||||
|
user_pref("dom.disable_window_open_feature.titlebar", true);
|
||||||
|
user_pref("dom.disable_window_open_feature.toolbar", true);
|
||||||
|
// * * * /
|
||||||
|
// FF77
|
||||||
|
// 0850e: disable location bar one-off searches [FF51+]
|
||||||
|
// [-] https://bugzilla.mozilla.org/1628926
|
||||||
|
// user_pref("browser.urlbar.oneOffSearches", false);
|
||||||
|
// 2605: block web content in file processes [FF55+]
|
||||||
|
// [SETUP-WEB] You may want to disable this for corporate or developer environments
|
||||||
|
// [1] https://bugzilla.mozilla.org/1343184
|
||||||
|
// [-] https://bugzilla.mozilla.org/1603007
|
||||||
|
user_pref("browser.tabs.remote.allowLinkedWebInFileUriProcess", false);
|
||||||
|
// * * * /
|
||||||
|
// FF78
|
||||||
|
// 2031: disable autoplay of HTML5 media if you interacted with the site [FF66+] - replaced by 'media.autoplay.blocking_policy'
|
||||||
|
// [-] https://bugzilla.mozilla.org/1509933
|
||||||
|
user_pref("media.autoplay.enabled.user-gestures-needed", false);
|
||||||
|
// 5000's: disable chrome animations - replaced FF77+ by 'ui.prefersReducedMotion' (4520)
|
||||||
|
// [-] https://bugzilla.mozilla.org/1640501
|
||||||
|
// user_pref("toolkit.cosmeticAnimations.enabled", false); // [FF55+]
|
||||||
|
// * * * /
|
||||||
|
// ***/
|
||||||
|
|
||||||
/* END: internal custom pref to test for syntax errors ***/
|
/* END: internal custom pref to test for syntax errors ***/
|
||||||
user_pref("_user.js.parrot", "SUCCESS: No no he's not dead, he's, he's restin'!");
|
user_pref("_user.js.parrot", "SUCCESS: No no he's not dead, he's, he's restin'!");
|
||||||
|
Loading…
Reference in New Issue
Block a user