Compare commits
2 commits
ce7c924944
...
9660522100
| Author | SHA1 | Date | |
|---|---|---|---|
| 9660522100 | |||
| e64c1dcad5 |
3 changed files with 14 additions and 20 deletions
|
|
@ -217,24 +217,11 @@
|
||||||
name: "*"
|
name: "*"
|
||||||
state: latest # noqa: package-latest
|
state: latest # noqa: package-latest
|
||||||
# Install a policy file to force Firefox to use encrypted DNS
|
# Install a policy file to force Firefox to use encrypted DNS
|
||||||
- name: Create Firefox DNS policy, line 1
|
- name: Create Firefox DNS policy
|
||||||
ansible.builtin.lineinfile:
|
ansible.builtin.template:
|
||||||
path: /usr/lib64/firefox/defaults/pref/autoconfig.js
|
src: templates/policies.json
|
||||||
|
dest: /etc/firefox/policies/policies.json
|
||||||
mode: "644"
|
mode: "644"
|
||||||
create: true
|
|
||||||
line: lockPref("network.trr.mode", 3);
|
|
||||||
- name: Create Firefox DNS policy, line 1
|
|
||||||
ansible.builtin.lineinfile:
|
|
||||||
path: /usr/lib64/firefox/defaults/pref/autoconfig.js
|
|
||||||
mode: "644"
|
|
||||||
create: true
|
|
||||||
line: lockPref("network.trr.url", "{{ dns_server }}");
|
|
||||||
- name: Create Firefox DNS policy, line 1
|
|
||||||
ansible.builtin.lineinfile:
|
|
||||||
path: /usr/lib64/firefox/defaults/pref/autoconfig.js
|
|
||||||
mode: "644"
|
|
||||||
create: true
|
|
||||||
line: lockPref("network.trr.custom_uri", "{{ dns_server }}");
|
|
||||||
|
|
||||||
# Generally speaking, I try to install Flatpak applications at the user level
|
# Generally speaking, I try to install Flatpak applications at the user level
|
||||||
# b/c that really gives more credence to the whole sandboxing idea (concept of
|
# b/c that really gives more credence to the whole sandboxing idea (concept of
|
||||||
|
|
|
||||||
|
|
@ -237,9 +237,6 @@
|
||||||
"extensions.formautofill.addresses.enabled" = false;
|
"extensions.formautofill.addresses.enabled" = false;
|
||||||
"extensions.formautofill.creditCards.enabled" = false;
|
"extensions.formautofill.creditCards.enabled" = false;
|
||||||
"extensions.autoDisableScopes" = 0;
|
"extensions.autoDisableScopes" = 0;
|
||||||
"network.trr.mode" = 3; # DNS over HTTPS always
|
|
||||||
"network.trr.uri" = "https://family.dns.mullvad.net/dns-query";
|
|
||||||
"network.trr.custom_uri" = "https://family.dns.mullvad.net/dns-query";
|
|
||||||
"privacy.bounceTrackingProtection.mode" = 1;
|
"privacy.bounceTrackingProtection.mode" = 1;
|
||||||
"privacy.clearOnShutdown_v2.browsingHistoryAndDownloads" = false;
|
"privacy.clearOnShutdown_v2.browsingHistoryAndDownloads" = false;
|
||||||
"privacy.clearOnShutdown_v2.cache" = true;
|
"privacy.clearOnShutdown_v2.cache" = true;
|
||||||
|
|
|
||||||
10
templates/policies.json
Normal file
10
templates/policies.json
Normal file
|
|
@ -0,0 +1,10 @@
|
||||||
|
{
|
||||||
|
"policies": {
|
||||||
|
"DNSOverHTTPS": {
|
||||||
|
"Enabled": true,
|
||||||
|
"ProviderURL": "{{ dns_server }}",
|
||||||
|
"Locked": true,
|
||||||
|
"Fallback": false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
Loading…
Add table
Add a link
Reference in a new issue