Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
michael@0 | 1 | # -*- Mode: JavaScript; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 2 -*- |
michael@0 | 2 | # This Source Code Form is subject to the terms of the Mozilla Public |
michael@0 | 3 | # License, v. 2.0. If a copy of the MPL was not distributed with this |
michael@0 | 4 | # file, You can obtain one at http://mozilla.org/MPL/2.0/. |
michael@0 | 5 | |
michael@0 | 6 | // XXX Toolkit-specific preferences should be moved into toolkit.js |
michael@0 | 7 | |
michael@0 | 8 | #filter substitution |
michael@0 | 9 | |
michael@0 | 10 | # |
michael@0 | 11 | # SYNTAX HINTS: |
michael@0 | 12 | # |
michael@0 | 13 | # - Dashes are delimiters; use underscores instead. |
michael@0 | 14 | # - The first character after a period must be alphabetic. |
michael@0 | 15 | # - Computed values (e.g. 50 * 1024) don't work. |
michael@0 | 16 | # |
michael@0 | 17 | |
michael@0 | 18 | #ifdef XP_UNIX |
michael@0 | 19 | #ifndef XP_MACOSX |
michael@0 | 20 | #define UNIX_BUT_NOT_MAC |
michael@0 | 21 | #endif |
michael@0 | 22 | #endif |
michael@0 | 23 | |
michael@0 | 24 | pref("browser.chromeURL","chrome://browser/content/"); |
michael@0 | 25 | pref("browser.hiddenWindowChromeURL", "chrome://browser/content/hiddenWindow.xul"); |
michael@0 | 26 | |
michael@0 | 27 | // Enables some extra Extension System Logging (can reduce performance) |
michael@0 | 28 | pref("extensions.logging.enabled", false); |
michael@0 | 29 | |
michael@0 | 30 | // Disables strict compatibility, making addons compatible-by-default. |
michael@0 | 31 | pref("extensions.strictCompatibility", false); |
michael@0 | 32 | |
michael@0 | 33 | // Specifies a minimum maxVersion an addon needs to say it's compatible with |
michael@0 | 34 | // for it to be compatible by default. |
michael@0 | 35 | pref("extensions.minCompatibleAppVersion", "4.0"); |
michael@0 | 36 | // Temporary preference to forcibly make themes more safe with Australis even if |
michael@0 | 37 | // extensions.checkCompatibility=false has been set. |
michael@0 | 38 | pref("extensions.checkCompatibility.temporaryThemeOverride_minAppVersion", "29.0a1"); |
michael@0 | 39 | |
michael@0 | 40 | // Preferences for AMO integration |
michael@0 | 41 | pref("extensions.getAddons.cache.enabled", true); |
michael@0 | 42 | pref("extensions.getAddons.maxResults", 15); |
michael@0 | 43 | pref("extensions.getAddons.get.url", "https://services.addons.mozilla.org/%LOCALE%/firefox/api/%API_VERSION%/search/guid:%IDS%?src=firefox&appOS=%OS%&appVersion=%VERSION%"); |
michael@0 | 44 | pref("extensions.getAddons.getWithPerformance.url", "https://services.addons.mozilla.org/%LOCALE%/firefox/api/%API_VERSION%/search/guid:%IDS%?src=firefox&appOS=%OS%&appVersion=%VERSION%&tMain=%TIME_MAIN%&tFirstPaint=%TIME_FIRST_PAINT%&tSessionRestored=%TIME_SESSION_RESTORED%"); |
michael@0 | 45 | pref("extensions.getAddons.search.browseURL", "https://addons.mozilla.org/%LOCALE%/firefox/search?q=%TERMS%&platform=%OS%&appver=%VERSION%"); |
michael@0 | 46 | pref("extensions.getAddons.search.url", "https://services.addons.mozilla.org/%LOCALE%/firefox/api/%API_VERSION%/search/%TERMS%/all/%MAX_RESULTS%/%OS%/%VERSION%/%COMPATIBILITY_MODE%?src=firefox"); |
michael@0 | 47 | pref("extensions.webservice.discoverURL", "https://services.addons.mozilla.org/%LOCALE%/firefox/discovery/pane/%VERSION%/%OS%/%COMPATIBILITY_MODE%"); |
michael@0 | 48 | pref("extensions.getAddons.recommended.url", "https://services.addons.mozilla.org/%LOCALE%/%APP%/api/%API_VERSION%/list/recommended/all/%MAX_RESULTS%/%OS%/%VERSION%?src=firefox"); |
michael@0 | 49 | |
michael@0 | 50 | // Blocklist preferences |
michael@0 | 51 | pref("extensions.blocklist.enabled", true); |
michael@0 | 52 | pref("extensions.blocklist.interval", 86400); |
michael@0 | 53 | // Controls what level the blocklist switches from warning about items to forcibly |
michael@0 | 54 | // blocking them. |
michael@0 | 55 | pref("extensions.blocklist.level", 2); |
michael@0 | 56 | pref("extensions.blocklist.url", "https://addons.mozilla.org/blocklist/3/%APP_ID%/%APP_VERSION%/%PRODUCT%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL%/%OS_VERSION%/%DISTRIBUTION%/%DISTRIBUTION_VERSION%/%PING_COUNT%/%TOTAL_PING_COUNT%/%DAYS_SINCE_LAST_PING%/"); |
michael@0 | 57 | pref("extensions.blocklist.detailsURL", "https://www.mozilla.org/%LOCALE%/blocklist/"); |
michael@0 | 58 | pref("extensions.blocklist.itemURL", "https://addons.mozilla.org/%LOCALE%/%APP%/blocked/%blockID%"); |
michael@0 | 59 | |
michael@0 | 60 | pref("extensions.update.autoUpdateDefault", true); |
michael@0 | 61 | |
michael@0 | 62 | pref("extensions.hotfix.id", "firefox-hotfix@mozilla.org"); |
michael@0 | 63 | pref("extensions.hotfix.cert.checkAttributes", true); |
michael@0 | 64 | pref("extensions.hotfix.certs.1.sha1Fingerprint", "91:53:98:0C:C1:86:DF:47:8F:35:22:9E:11:C9:A7:31:04:49:A1:AA"); |
michael@0 | 65 | |
michael@0 | 66 | // Disable add-ons that are not installed by the user in all scopes by default. |
michael@0 | 67 | // See the SCOPE constants in AddonManager.jsm for values to use here. |
michael@0 | 68 | pref("extensions.autoDisableScopes", 15); |
michael@0 | 69 | |
michael@0 | 70 | // Dictionary download preference |
michael@0 | 71 | pref("browser.dictionaries.download.url", "https://addons.mozilla.org/%LOCALE%/firefox/dictionaries/"); |
michael@0 | 72 | |
michael@0 | 73 | // At startup, should we check to see if the installation |
michael@0 | 74 | // date is older than some threshold |
michael@0 | 75 | pref("app.update.checkInstallTime", true); |
michael@0 | 76 | |
michael@0 | 77 | // The number of days a binary is permitted to be old without checking is defined in |
michael@0 | 78 | // firefox-branding.js (app.update.checkInstallTime.days) |
michael@0 | 79 | |
michael@0 | 80 | // The minimum delay in seconds for the timer to fire. |
michael@0 | 81 | // default=2 minutes |
michael@0 | 82 | pref("app.update.timerMinimumDelay", 120); |
michael@0 | 83 | |
michael@0 | 84 | // App-specific update preferences |
michael@0 | 85 | |
michael@0 | 86 | // The interval to check for updates (app.update.interval) is defined in |
michael@0 | 87 | // firefox-branding.js |
michael@0 | 88 | |
michael@0 | 89 | // Alternative windowtype for an application update user interface window. When |
michael@0 | 90 | // a window with this windowtype is open the application update service won't |
michael@0 | 91 | // open the normal application update user interface window. |
michael@0 | 92 | pref("app.update.altwindowtype", "Browser:About"); |
michael@0 | 93 | |
michael@0 | 94 | // Enables some extra Application Update Logging (can reduce performance) |
michael@0 | 95 | pref("app.update.log", false); |
michael@0 | 96 | |
michael@0 | 97 | // The number of general background check failures to allow before notifying the |
michael@0 | 98 | // user of the failure. User initiated update checks always notify the user of |
michael@0 | 99 | // the failure. |
michael@0 | 100 | pref("app.update.backgroundMaxErrors", 10); |
michael@0 | 101 | |
michael@0 | 102 | // When |app.update.cert.requireBuiltIn| is true or not specified the |
michael@0 | 103 | // final certificate and all certificates the connection is redirected to before |
michael@0 | 104 | // the final certificate for the url specified in the |app.update.url| |
michael@0 | 105 | // preference must be built-in. |
michael@0 | 106 | pref("app.update.cert.requireBuiltIn", true); |
michael@0 | 107 | |
michael@0 | 108 | // When |app.update.cert.checkAttributes| is true or not specified the |
michael@0 | 109 | // certificate attributes specified in the |app.update.certs.| preference branch |
michael@0 | 110 | // are checked against the certificate for the url specified by the |
michael@0 | 111 | // |app.update.url| preference. |
michael@0 | 112 | pref("app.update.cert.checkAttributes", true); |
michael@0 | 113 | |
michael@0 | 114 | // The number of certificate attribute check failures to allow for background |
michael@0 | 115 | // update checks before notifying the user of the failure. User initiated update |
michael@0 | 116 | // checks always notify the user of the certificate attribute check failure. |
michael@0 | 117 | pref("app.update.cert.maxErrors", 5); |
michael@0 | 118 | |
michael@0 | 119 | // The |app.update.certs.| preference branch contains branches that are |
michael@0 | 120 | // sequentially numbered starting at 1 that contain attribute name / value |
michael@0 | 121 | // pairs for the certificate used by the server that hosts the update xml file |
michael@0 | 122 | // as specified in the |app.update.url| preference. When these preferences are |
michael@0 | 123 | // present the following conditions apply for a successful update check: |
michael@0 | 124 | // 1. the uri scheme must be https |
michael@0 | 125 | // 2. the preference name must exist as an attribute name on the certificate and |
michael@0 | 126 | // the value for the name must be the same as the value for the attribute name |
michael@0 | 127 | // on the certificate. |
michael@0 | 128 | // If these conditions aren't met it will be treated the same as when there is |
michael@0 | 129 | // no update available. This validation will not be performed when the |
michael@0 | 130 | // |app.update.url.override| user preference has been set for testing updates or |
michael@0 | 131 | // when the |app.update.cert.checkAttributes| preference is set to false. Also, |
michael@0 | 132 | // the |app.update.url.override| preference should ONLY be used for testing. |
michael@0 | 133 | // IMPORTANT! metro.js should also be updated for updates to certs.X.issuerName |
michael@0 | 134 | |
michael@0 | 135 | pref("app.update.certs.1.issuerName", "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digicert.com,O=DigiCert Inc,C=US"); |
michael@0 | 136 | pref("app.update.certs.1.commonName", "*.torproject.org"); |
michael@0 | 137 | |
michael@0 | 138 | // Whether or not app updates are enabled |
michael@0 | 139 | pref("app.update.enabled", true); |
michael@0 | 140 | |
michael@0 | 141 | // This preference turns on app.update.mode and allows automatic download and |
michael@0 | 142 | // install to take place. We use a separate boolean toggle for this to make |
michael@0 | 143 | // the UI easier to construct. |
michael@0 | 144 | pref("app.update.auto", true); |
michael@0 | 145 | |
michael@0 | 146 | // See chart in nsUpdateService.js source for more details |
michael@0 | 147 | // incompatibilities are ignored by updates in Metro |
michael@0 | 148 | pref("app.update.mode", 1); |
michael@0 | 149 | |
michael@0 | 150 | #ifdef XP_WIN |
michael@0 | 151 | #ifdef MOZ_METRO |
michael@0 | 152 | // Enables update checking in the Metro environment. |
michael@0 | 153 | // add-on incompatibilities are ignored by updates in Metro. |
michael@0 | 154 | pref("app.update.metro.enabled", true); |
michael@0 | 155 | #endif |
michael@0 | 156 | #endif |
michael@0 | 157 | |
michael@0 | 158 | // If set to true, the Update Service will present no UI for any event. |
michael@0 | 159 | pref("app.update.silent", false); |
michael@0 | 160 | |
michael@0 | 161 | // If set to true, the Update Service will apply updates in the background |
michael@0 | 162 | // when it finishes downloading them. |
michael@0 | 163 | pref("app.update.staging.enabled", true); |
michael@0 | 164 | |
michael@0 | 165 | // Update service URL: |
michael@0 | 166 | pref("app.update.url", "https://www.torproject.org/dist/torbrowser/update_2/%CHANNEL%/%BUILD_TARGET%/%VERSION%/%LOCALE%"); |
michael@0 | 167 | // app.update.url.manual is in branding section |
michael@0 | 168 | // app.update.url.details is in branding section |
michael@0 | 169 | |
michael@0 | 170 | // User-settable override to app.update.url for testing purposes. |
michael@0 | 171 | //pref("app.update.url.override", ""); |
michael@0 | 172 | |
michael@0 | 173 | // app.update.interval is in branding section |
michael@0 | 174 | // app.update.promptWaitTime is in branding section |
michael@0 | 175 | |
michael@0 | 176 | // Show the Update Checking/Ready UI when the user was idle for x seconds |
michael@0 | 177 | pref("app.update.idletime", 60); |
michael@0 | 178 | |
michael@0 | 179 | // Whether or not we show a dialog box informing the user that the update was |
michael@0 | 180 | // successfully applied. This is off in Firefox by default since we show a |
michael@0 | 181 | // upgrade start page instead! Other apps may wish to show this UI, and supply |
michael@0 | 182 | // a whatsNewURL field in their brand.properties that contains a link to a page |
michael@0 | 183 | // which tells users what's new in this new update. |
michael@0 | 184 | pref("app.update.showInstalledUI", true); |
michael@0 | 185 | |
michael@0 | 186 | // 0 = suppress prompting for incompatibilities if there are updates available |
michael@0 | 187 | // to newer versions of installed addons that resolve them. |
michael@0 | 188 | // 1 = suppress prompting for incompatibilities only if there are VersionInfo |
michael@0 | 189 | // updates available to installed addons that resolve them, not newer |
michael@0 | 190 | // versions. |
michael@0 | 191 | pref("app.update.incompatible.mode", 0); |
michael@0 | 192 | |
michael@0 | 193 | // Whether or not to attempt using the service for updates. |
michael@0 | 194 | #ifdef MOZ_MAINTENANCE_SERVICE |
michael@0 | 195 | pref("app.update.service.enabled", true); |
michael@0 | 196 | #endif |
michael@0 | 197 | |
michael@0 | 198 | // Symmetric (can be overridden by individual extensions) update preferences. |
michael@0 | 199 | // e.g. |
michael@0 | 200 | // extensions.{GUID}.update.enabled |
michael@0 | 201 | // extensions.{GUID}.update.url |
michael@0 | 202 | // .. etc .. |
michael@0 | 203 | // |
michael@0 | 204 | pref("extensions.update.enabled", true); |
michael@0 | 205 | pref("extensions.update.url", "https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID%&version=%ITEM_VERSION%&maxAppVersion=%ITEM_MAXAPPVERSION%&status=%ITEM_STATUS%&appID=%APP_ID%&appVersion=%APP_VERSION%&appOS=%APP_OS%&appABI=%APP_ABI%&locale=%APP_LOCALE%¤tAppVersion=%CURRENT_APP_VERSION%&updateType=%UPDATE_TYPE%&compatMode=%COMPATIBILITY_MODE%"); |
michael@0 | 206 | pref("extensions.update.background.url", "https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID%&version=%ITEM_VERSION%&maxAppVersion=%ITEM_MAXAPPVERSION%&status=%ITEM_STATUS%&appID=%APP_ID%&appVersion=%APP_VERSION%&appOS=%APP_OS%&appABI=%APP_ABI%&locale=%APP_LOCALE%¤tAppVersion=%CURRENT_APP_VERSION%&updateType=%UPDATE_TYPE%&compatMode=%COMPATIBILITY_MODE%"); |
michael@0 | 207 | pref("extensions.update.interval", 86400); // Check for updates to Extensions and |
michael@0 | 208 | // Themes every day |
michael@0 | 209 | // Non-symmetric (not shared by extensions) extension-specific [update] preferences |
michael@0 | 210 | pref("extensions.dss.enabled", false); // Dynamic Skin Switching |
michael@0 | 211 | pref("extensions.dss.switchPending", false); // Non-dynamic switch pending after next |
michael@0 | 212 | // restart. |
michael@0 | 213 | |
michael@0 | 214 | pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.name", "chrome://browser/locale/browser.properties"); |
michael@0 | 215 | pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.description", "chrome://browser/locale/browser.properties"); |
michael@0 | 216 | |
michael@0 | 217 | pref("xpinstall.whitelist.add", "addons.mozilla.org"); |
michael@0 | 218 | pref("xpinstall.whitelist.add.180", "marketplace.firefox.com"); |
michael@0 | 219 | |
michael@0 | 220 | pref("lightweightThemes.update.enabled", true); |
michael@0 | 221 | |
michael@0 | 222 | // UI tour experience. |
michael@0 | 223 | pref("browser.uitour.enabled", true); |
michael@0 | 224 | pref("browser.uitour.requireSecure", true); |
michael@0 | 225 | pref("browser.uitour.themeOrigin", "https://addons.mozilla.org/%LOCALE%/firefox/themes/"); |
michael@0 | 226 | pref("browser.uitour.pinnedTabUrl", "https://support.mozilla.org/%LOCALE%/kb/pinned-tabs-keep-favorite-websites-open"); |
michael@0 | 227 | pref("browser.uitour.url", "https://www.mozilla.org/%LOCALE%/firefox/%VERSION%/tour/"); |
michael@0 | 228 | pref("browser.uitour.whitelist.add.260", "www.mozilla.org,support.mozilla.org"); |
michael@0 | 229 | |
michael@0 | 230 | pref("browser.customizemode.tip0.shown", false); |
michael@0 | 231 | pref("browser.customizemode.tip0.learnMoreUrl", "https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/customize"); |
michael@0 | 232 | |
michael@0 | 233 | pref("keyword.enabled", true); |
michael@0 | 234 | |
michael@0 | 235 | pref("general.useragent.locale", "@AB_CD@"); |
michael@0 | 236 | pref("general.skins.selectedSkin", "classic/1.0"); |
michael@0 | 237 | |
michael@0 | 238 | pref("general.smoothScroll", true); |
michael@0 | 239 | #ifdef UNIX_BUT_NOT_MAC |
michael@0 | 240 | pref("general.autoScroll", false); |
michael@0 | 241 | #else |
michael@0 | 242 | pref("general.autoScroll", true); |
michael@0 | 243 | #endif |
michael@0 | 244 | |
michael@0 | 245 | // At startup, check if we're the default browser and prompt user if not. |
michael@0 | 246 | pref("browser.shell.checkDefaultBrowser", true); |
michael@0 | 247 | pref("browser.shell.shortcutFavicons",true); |
michael@0 | 248 | |
michael@0 | 249 | // 0 = blank, 1 = home (browser.startup.homepage), 2 = last visited page, 3 = resume previous browser session |
michael@0 | 250 | // The behavior of option 3 is detailed at: http://wiki.mozilla.org/Session_Restore |
michael@0 | 251 | pref("browser.startup.page", 1); |
michael@0 | 252 | pref("browser.startup.homepage", "chrome://branding/locale/browserconfig.properties"); |
michael@0 | 253 | |
michael@0 | 254 | pref("browser.slowStartup.notificationDisabled", false); |
michael@0 | 255 | pref("browser.slowStartup.timeThreshold", 50000); |
michael@0 | 256 | pref("browser.slowStartup.maxSamples", 5); |
michael@0 | 257 | |
michael@0 | 258 | // This url, if changed, MUST continue to point to an https url. Pulling arbitrary content to inject into |
michael@0 | 259 | // this page over http opens us up to a man-in-the-middle attack that we'd rather not face. If you are a downstream |
michael@0 | 260 | // repackager of this code using an alternate snippet url, please keep your users safe |
michael@0 | 261 | pref("browser.aboutHomeSnippets.updateUrl", "https://snippets.mozilla.com/%STARTPAGE_VERSION%/%NAME%/%VERSION%/%APPBUILDID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL%/%OS_VERSION%/%DISTRIBUTION%/%DISTRIBUTION_VERSION%/"); |
michael@0 | 262 | |
michael@0 | 263 | pref("browser.enable_automatic_image_resizing", true); |
michael@0 | 264 | pref("browser.chrome.site_icons", true); |
michael@0 | 265 | pref("browser.chrome.favicons", true); |
michael@0 | 266 | // browser.warnOnQuit == false will override all other possible prompts when quitting or restarting |
michael@0 | 267 | pref("browser.warnOnQuit", true); |
michael@0 | 268 | // browser.showQuitWarning specifically controls the quit warning dialog. We |
michael@0 | 269 | // might still show the window closing dialog with showQuitWarning == false. |
michael@0 | 270 | pref("browser.showQuitWarning", false); |
michael@0 | 271 | pref("browser.fullscreen.autohide", true); |
michael@0 | 272 | pref("browser.fullscreen.animateUp", 1); |
michael@0 | 273 | pref("browser.overlink-delay", 80); |
michael@0 | 274 | |
michael@0 | 275 | #ifdef UNIX_BUT_NOT_MAC |
michael@0 | 276 | pref("browser.urlbar.clickSelectsAll", false); |
michael@0 | 277 | #else |
michael@0 | 278 | pref("browser.urlbar.clickSelectsAll", true); |
michael@0 | 279 | #endif |
michael@0 | 280 | #ifdef UNIX_BUT_NOT_MAC |
michael@0 | 281 | pref("browser.urlbar.doubleClickSelectsAll", true); |
michael@0 | 282 | #else |
michael@0 | 283 | pref("browser.urlbar.doubleClickSelectsAll", false); |
michael@0 | 284 | #endif |
michael@0 | 285 | pref("browser.urlbar.autoFill", true); |
michael@0 | 286 | pref("browser.urlbar.autoFill.typed", true); |
michael@0 | 287 | // 0: Match anywhere (e.g., middle of words) |
michael@0 | 288 | // 1: Match on word boundaries and then try matching anywhere |
michael@0 | 289 | // 2: Match only on word boundaries (e.g., after / or .) |
michael@0 | 290 | // 3: Match at the beginning of the url or title |
michael@0 | 291 | pref("browser.urlbar.matchBehavior", 1); |
michael@0 | 292 | pref("browser.urlbar.filter.javascript", true); |
michael@0 | 293 | |
michael@0 | 294 | // the maximum number of results to show in autocomplete when doing richResults |
michael@0 | 295 | pref("browser.urlbar.maxRichResults", 12); |
michael@0 | 296 | // The amount of time (ms) to wait after the user has stopped typing |
michael@0 | 297 | // before starting to perform autocomplete. 50 is the default set in |
michael@0 | 298 | // autocomplete.xml. |
michael@0 | 299 | pref("browser.urlbar.delay", 50); |
michael@0 | 300 | |
michael@0 | 301 | // The special characters below can be typed into the urlbar to either restrict |
michael@0 | 302 | // the search to visited history, bookmarked, tagged pages; or force a match on |
michael@0 | 303 | // just the title text or url. |
michael@0 | 304 | pref("browser.urlbar.restrict.history", "^"); |
michael@0 | 305 | pref("browser.urlbar.restrict.bookmark", "*"); |
michael@0 | 306 | pref("browser.urlbar.restrict.tag", "+"); |
michael@0 | 307 | pref("browser.urlbar.restrict.openpage", "%"); |
michael@0 | 308 | pref("browser.urlbar.restrict.typed", "~"); |
michael@0 | 309 | pref("browser.urlbar.match.title", "#"); |
michael@0 | 310 | pref("browser.urlbar.match.url", "@"); |
michael@0 | 311 | |
michael@0 | 312 | // The default behavior for the urlbar can be configured to use any combination |
michael@0 | 313 | // of the restrict or match filters with each additional filter restricting |
michael@0 | 314 | // more (intersection). Add the following values to set the behavior as the |
michael@0 | 315 | // default: 1: history, 2: bookmark, 4: tag, 8: title, 16: url, 32: typed, |
michael@0 | 316 | // 64: javascript, 128: tabs |
michael@0 | 317 | // E.g., 0 = show all results (no filtering), 1 = only visited pages in history, |
michael@0 | 318 | // 2 = only bookmarks, 3 = visited bookmarks, 1+16 = history matching in the url |
michael@0 | 319 | pref("browser.urlbar.default.behavior", 0); |
michael@0 | 320 | |
michael@0 | 321 | pref("browser.urlbar.formatting.enabled", true); |
michael@0 | 322 | pref("browser.urlbar.trimURLs", true); |
michael@0 | 323 | |
michael@0 | 324 | pref("browser.altClickSave", false); |
michael@0 | 325 | |
michael@0 | 326 | // Enable logging downloads operations to the Error Console. |
michael@0 | 327 | pref("browser.download.debug", false); |
michael@0 | 328 | |
michael@0 | 329 | // Number of milliseconds to wait for the http headers (and thus |
michael@0 | 330 | // the Content-Disposition filename) before giving up and falling back to |
michael@0 | 331 | // picking a filename without that info in hand so that the user sees some |
michael@0 | 332 | // feedback from their action. |
michael@0 | 333 | pref("browser.download.saveLinkAsFilenameTimeout", 4000); |
michael@0 | 334 | |
michael@0 | 335 | pref("browser.download.useDownloadDir", true); |
michael@0 | 336 | pref("browser.download.folderList", 1); |
michael@0 | 337 | pref("browser.download.manager.addToRecentDocs", true); |
michael@0 | 338 | pref("browser.download.manager.resumeOnWakeDelay", 10000); |
michael@0 | 339 | |
michael@0 | 340 | // This allows disabling the animated notifications shown by |
michael@0 | 341 | // the Downloads Indicator when a download starts or completes. |
michael@0 | 342 | pref("browser.download.animateNotifications", true); |
michael@0 | 343 | |
michael@0 | 344 | // This records whether or not the panel has been shown at least once. |
michael@0 | 345 | pref("browser.download.panel.shown", false); |
michael@0 | 346 | |
michael@0 | 347 | #ifndef XP_MACOSX |
michael@0 | 348 | pref("browser.helperApps.deleteTempFileOnExit", true); |
michael@0 | 349 | #endif |
michael@0 | 350 | |
michael@0 | 351 | // search engines URL |
michael@0 | 352 | pref("browser.search.searchEnginesURL", "https://addons.mozilla.org/%LOCALE%/firefox/search-engines/"); |
michael@0 | 353 | |
michael@0 | 354 | // pointer to the default engine name |
michael@0 | 355 | pref("browser.search.defaultenginename", "chrome://browser-region/locale/region.properties"); |
michael@0 | 356 | |
michael@0 | 357 | // disable logging for the search service by default |
michael@0 | 358 | pref("browser.search.log", false); |
michael@0 | 359 | |
michael@0 | 360 | // Ordering of Search Engines in the Engine list. |
michael@0 | 361 | pref("browser.search.order.1", "chrome://browser-region/locale/region.properties"); |
michael@0 | 362 | pref("browser.search.order.2", "chrome://browser-region/locale/region.properties"); |
michael@0 | 363 | pref("browser.search.order.3", "chrome://browser-region/locale/region.properties"); |
michael@0 | 364 | |
michael@0 | 365 | // search bar results always open in a new tab |
michael@0 | 366 | pref("browser.search.openintab", false); |
michael@0 | 367 | |
michael@0 | 368 | // context menu searches open in the foreground |
michael@0 | 369 | pref("browser.search.context.loadInBackground", false); |
michael@0 | 370 | |
michael@0 | 371 | // send ping to the server to update |
michael@0 | 372 | pref("browser.search.update", true); |
michael@0 | 373 | |
michael@0 | 374 | // disable logging for the search service update system by default |
michael@0 | 375 | pref("browser.search.update.log", false); |
michael@0 | 376 | |
michael@0 | 377 | // Check whether we need to perform engine updates every 6 hours |
michael@0 | 378 | pref("browser.search.update.interval", 21600); |
michael@0 | 379 | |
michael@0 | 380 | // enable search suggestions by default |
michael@0 | 381 | pref("browser.search.suggest.enabled", true); |
michael@0 | 382 | |
michael@0 | 383 | #ifdef MOZ_OFFICIAL_BRANDING |
michael@0 | 384 | // {moz:official} expands to "official" |
michael@0 | 385 | pref("browser.search.official", true); |
michael@0 | 386 | #endif |
michael@0 | 387 | |
michael@0 | 388 | pref("browser.sessionhistory.max_entries", 50); |
michael@0 | 389 | |
michael@0 | 390 | // handle links targeting new windows |
michael@0 | 391 | // 1=current window/tab, 2=new window, 3=new tab in most recent window |
michael@0 | 392 | pref("browser.link.open_newwindow", 3); |
michael@0 | 393 | |
michael@0 | 394 | // handle external links (i.e. links opened from a different application) |
michael@0 | 395 | // default: use browser.link.open_newwindow |
michael@0 | 396 | // 1-3: see browser.link.open_newwindow for interpretation |
michael@0 | 397 | pref("browser.link.open_newwindow.override.external", -1); |
michael@0 | 398 | |
michael@0 | 399 | // 0: no restrictions - divert everything |
michael@0 | 400 | // 1: don't divert window.open at all |
michael@0 | 401 | // 2: don't divert window.open with features |
michael@0 | 402 | pref("browser.link.open_newwindow.restriction", 2); |
michael@0 | 403 | |
michael@0 | 404 | // If true, this pref causes windows opened by window.open to be forced into new |
michael@0 | 405 | // tabs (rather than potentially opening separate windows, depending on |
michael@0 | 406 | // window.open arguments) when the browser is in fullscreen mode. |
michael@0 | 407 | // We set this differently on Mac because the fullscreen implementation there is |
michael@0 | 408 | // different. |
michael@0 | 409 | #ifdef XP_MACOSX |
michael@0 | 410 | pref("browser.link.open_newwindow.disabled_in_fullscreen", true); |
michael@0 | 411 | #else |
michael@0 | 412 | pref("browser.link.open_newwindow.disabled_in_fullscreen", false); |
michael@0 | 413 | #endif |
michael@0 | 414 | |
michael@0 | 415 | // Tabbed browser |
michael@0 | 416 | pref("browser.tabs.closeWindowWithLastTab", true); |
michael@0 | 417 | pref("browser.tabs.insertRelatedAfterCurrent", true); |
michael@0 | 418 | pref("browser.tabs.warnOnClose", true); |
michael@0 | 419 | pref("browser.tabs.warnOnCloseOtherTabs", true); |
michael@0 | 420 | pref("browser.tabs.warnOnOpen", true); |
michael@0 | 421 | pref("browser.tabs.maxOpenBeforeWarn", 15); |
michael@0 | 422 | pref("browser.tabs.loadInBackground", true); |
michael@0 | 423 | pref("browser.tabs.opentabfor.middleclick", true); |
michael@0 | 424 | pref("browser.tabs.loadDivertedInBackground", false); |
michael@0 | 425 | pref("browser.tabs.loadBookmarksInBackground", false); |
michael@0 | 426 | pref("browser.tabs.tabClipWidth", 140); |
michael@0 | 427 | pref("browser.tabs.animate", true); |
michael@0 | 428 | #ifdef UNIX_BUT_NOT_MAC |
michael@0 | 429 | pref("browser.tabs.drawInTitlebar", false); |
michael@0 | 430 | #else |
michael@0 | 431 | pref("browser.tabs.drawInTitlebar", true); |
michael@0 | 432 | #endif |
michael@0 | 433 | |
michael@0 | 434 | // When tabs opened by links in other tabs via a combination of |
michael@0 | 435 | // browser.link.open_newwindow being set to 3 and target="_blank" etc are |
michael@0 | 436 | // closed: |
michael@0 | 437 | // true return to the tab that opened this tab (its owner) |
michael@0 | 438 | // false return to the adjacent tab (old default) |
michael@0 | 439 | pref("browser.tabs.selectOwnerOnClose", true); |
michael@0 | 440 | |
michael@0 | 441 | pref("browser.ctrlTab.previews", false); |
michael@0 | 442 | |
michael@0 | 443 | // By default, do not export HTML at shutdown. |
michael@0 | 444 | // If true, at shutdown the bookmarks in your menu and toolbar will |
michael@0 | 445 | // be exported as HTML to the bookmarks.html file. |
michael@0 | 446 | pref("browser.bookmarks.autoExportHTML", false); |
michael@0 | 447 | |
michael@0 | 448 | // The maximum number of daily bookmark backups to |
michael@0 | 449 | // keep in {PROFILEDIR}/bookmarkbackups. Special values: |
michael@0 | 450 | // -1: unlimited |
michael@0 | 451 | // 0: no backups created (and deletes all existing backups) |
michael@0 | 452 | pref("browser.bookmarks.max_backups", 15); |
michael@0 | 453 | |
michael@0 | 454 | // Scripts & Windows prefs |
michael@0 | 455 | pref("dom.disable_open_during_load", true); |
michael@0 | 456 | pref("javascript.options.showInConsole", true); |
michael@0 | 457 | #ifdef DEBUG |
michael@0 | 458 | pref("general.warnOnAboutConfig", false); |
michael@0 | 459 | #endif |
michael@0 | 460 | |
michael@0 | 461 | // This is the pref to control the location bar, change this to true to |
michael@0 | 462 | // force this - this makes the origin of popup windows more obvious to avoid |
michael@0 | 463 | // spoofing. We would rather not do it by default because it affects UE for web |
michael@0 | 464 | // applications, but without it there isn't a really good way to prevent chrome |
michael@0 | 465 | // spoofing, see bug 337344 |
michael@0 | 466 | pref("dom.disable_window_open_feature.location", true); |
michael@0 | 467 | // prevent JS from setting status messages |
michael@0 | 468 | pref("dom.disable_window_status_change", true); |
michael@0 | 469 | // allow JS to move and resize existing windows |
michael@0 | 470 | pref("dom.disable_window_move_resize", false); |
michael@0 | 471 | // prevent JS from monkeying with window focus, etc |
michael@0 | 472 | pref("dom.disable_window_flip", true); |
michael@0 | 473 | |
michael@0 | 474 | // Disable touch events on Desktop Firefox by default until they are properly |
michael@0 | 475 | // supported (bug 736048) |
michael@0 | 476 | pref("dom.w3c_touch_events.enabled", 0); |
michael@0 | 477 | |
michael@0 | 478 | // popups.policy 1=allow,2=reject |
michael@0 | 479 | pref("privacy.popups.policy", 1); |
michael@0 | 480 | pref("privacy.popups.usecustom", true); |
michael@0 | 481 | pref("privacy.popups.showBrowserMessage", true); |
michael@0 | 482 | |
michael@0 | 483 | pref("privacy.item.cookies", false); |
michael@0 | 484 | |
michael@0 | 485 | pref("privacy.clearOnShutdown.history", true); |
michael@0 | 486 | pref("privacy.clearOnShutdown.formdata", true); |
michael@0 | 487 | pref("privacy.clearOnShutdown.passwords", false); |
michael@0 | 488 | pref("privacy.clearOnShutdown.downloads", true); |
michael@0 | 489 | pref("privacy.clearOnShutdown.cookies", true); |
michael@0 | 490 | pref("privacy.clearOnShutdown.cache", true); |
michael@0 | 491 | pref("privacy.clearOnShutdown.sessions", true); |
michael@0 | 492 | pref("privacy.clearOnShutdown.offlineApps", false); |
michael@0 | 493 | pref("privacy.clearOnShutdown.siteSettings", false); |
michael@0 | 494 | |
michael@0 | 495 | pref("privacy.cpd.history", true); |
michael@0 | 496 | pref("privacy.cpd.formdata", true); |
michael@0 | 497 | pref("privacy.cpd.passwords", false); |
michael@0 | 498 | pref("privacy.cpd.downloads", true); |
michael@0 | 499 | pref("privacy.cpd.cookies", true); |
michael@0 | 500 | pref("privacy.cpd.cache", true); |
michael@0 | 501 | pref("privacy.cpd.sessions", true); |
michael@0 | 502 | pref("privacy.cpd.offlineApps", false); |
michael@0 | 503 | pref("privacy.cpd.siteSettings", false); |
michael@0 | 504 | |
michael@0 | 505 | // What default should we use for the time span in the sanitizer: |
michael@0 | 506 | // 0 - Clear everything |
michael@0 | 507 | // 1 - Last Hour |
michael@0 | 508 | // 2 - Last 2 Hours |
michael@0 | 509 | // 3 - Last 4 Hours |
michael@0 | 510 | // 4 - Today |
michael@0 | 511 | pref("privacy.sanitize.timeSpan", 1); |
michael@0 | 512 | pref("privacy.sanitize.sanitizeOnShutdown", false); |
michael@0 | 513 | |
michael@0 | 514 | pref("privacy.sanitize.migrateFx3Prefs", false); |
michael@0 | 515 | |
michael@0 | 516 | pref("network.proxy.share_proxy_settings", false); // use the same proxy settings for all protocols |
michael@0 | 517 | |
michael@0 | 518 | // The privacy.thirdparty.isolate pref determines whether |
michael@0 | 519 | // an isolated DOM Storage map and image cache are |
michael@0 | 520 | // maintained for each URL bar domain. |
michael@0 | 521 | // 0 - No isolation |
michael@0 | 522 | // 1 - Enable isolation in private windows |
michael@0 | 523 | // 2 - Enable isolation everywhere |
michael@0 | 524 | pref("privacy.thirdparty.isolate", 1); |
michael@0 | 525 | |
michael@0 | 526 | // simple gestures support |
michael@0 | 527 | pref("browser.gesture.swipe.left", "Browser:BackOrBackDuplicate"); |
michael@0 | 528 | pref("browser.gesture.swipe.right", "Browser:ForwardOrForwardDuplicate"); |
michael@0 | 529 | pref("browser.gesture.swipe.up", "cmd_scrollTop"); |
michael@0 | 530 | pref("browser.gesture.swipe.down", "cmd_scrollBottom"); |
michael@0 | 531 | #ifdef XP_MACOSX |
michael@0 | 532 | pref("browser.gesture.pinch.latched", true); |
michael@0 | 533 | pref("browser.gesture.pinch.threshold", 150); |
michael@0 | 534 | #else |
michael@0 | 535 | pref("browser.gesture.pinch.latched", false); |
michael@0 | 536 | pref("browser.gesture.pinch.threshold", 25); |
michael@0 | 537 | #endif |
michael@0 | 538 | #ifdef XP_WIN |
michael@0 | 539 | // Enabled for touch input display zoom. |
michael@0 | 540 | pref("browser.gesture.pinch.out", "cmd_fullZoomEnlarge"); |
michael@0 | 541 | pref("browser.gesture.pinch.in", "cmd_fullZoomReduce"); |
michael@0 | 542 | pref("browser.gesture.pinch.out.shift", "cmd_fullZoomReset"); |
michael@0 | 543 | pref("browser.gesture.pinch.in.shift", "cmd_fullZoomReset"); |
michael@0 | 544 | #else |
michael@0 | 545 | // Disabled by default due to issues with track pad input. |
michael@0 | 546 | pref("browser.gesture.pinch.out", ""); |
michael@0 | 547 | pref("browser.gesture.pinch.in", ""); |
michael@0 | 548 | pref("browser.gesture.pinch.out.shift", ""); |
michael@0 | 549 | pref("browser.gesture.pinch.in.shift", ""); |
michael@0 | 550 | #endif |
michael@0 | 551 | pref("browser.gesture.twist.latched", false); |
michael@0 | 552 | pref("browser.gesture.twist.threshold", 0); |
michael@0 | 553 | pref("browser.gesture.twist.right", "cmd_gestureRotateRight"); |
michael@0 | 554 | pref("browser.gesture.twist.left", "cmd_gestureRotateLeft"); |
michael@0 | 555 | pref("browser.gesture.twist.end", "cmd_gestureRotateEnd"); |
michael@0 | 556 | pref("browser.gesture.tap", "cmd_fullZoomReset"); |
michael@0 | 557 | |
michael@0 | 558 | pref("browser.snapshots.limit", 0); |
michael@0 | 559 | |
michael@0 | 560 | // 0: Nothing happens |
michael@0 | 561 | // 1: Scrolling contents |
michael@0 | 562 | // 2: Go back or go forward, in your history |
michael@0 | 563 | // 3: Zoom in or out. |
michael@0 | 564 | #ifdef XP_MACOSX |
michael@0 | 565 | // On OS X, if the wheel has one axis only, shift+wheel comes through as a |
michael@0 | 566 | // horizontal scroll event. Thus, we can't assign anything other than normal |
michael@0 | 567 | // scrolling to shift+wheel. |
michael@0 | 568 | pref("mousewheel.with_alt.action", 2); |
michael@0 | 569 | pref("mousewheel.with_shift.action", 1); |
michael@0 | 570 | // On MacOS X, control+wheel is typically handled by system and we don't |
michael@0 | 571 | // receive the event. So, command key which is the main modifier key for |
michael@0 | 572 | // acceleration is the best modifier for zoom-in/out. However, we should keep |
michael@0 | 573 | // the control key setting for backward compatibility. |
michael@0 | 574 | pref("mousewheel.with_meta.action", 3); // command key on Mac |
michael@0 | 575 | // Disable control-/meta-modified horizontal mousewheel events, since |
michael@0 | 576 | // those are used on Mac as part of modified swipe gestures (e.g. |
michael@0 | 577 | // Left swipe+Cmd = go back in a new tab). |
michael@0 | 578 | pref("mousewheel.with_control.action.override_x", 0); |
michael@0 | 579 | pref("mousewheel.with_meta.action.override_x", 0); |
michael@0 | 580 | #else |
michael@0 | 581 | pref("mousewheel.with_alt.action", 1); |
michael@0 | 582 | pref("mousewheel.with_shift.action", 2); |
michael@0 | 583 | pref("mousewheel.with_meta.action", 1); // win key on Win, Super/Hyper on Linux |
michael@0 | 584 | #endif |
michael@0 | 585 | pref("mousewheel.with_control.action",3); |
michael@0 | 586 | pref("mousewheel.with_win.action", 1); |
michael@0 | 587 | |
michael@0 | 588 | pref("browser.xul.error_pages.enabled", true); |
michael@0 | 589 | pref("browser.xul.error_pages.expert_bad_cert", false); |
michael@0 | 590 | |
michael@0 | 591 | // Work Offline is best manually managed by the user. |
michael@0 | 592 | pref("network.manage-offline-status", false); |
michael@0 | 593 | |
michael@0 | 594 | // We want to make sure mail URLs are handled externally... |
michael@0 | 595 | pref("network.protocol-handler.external.mailto", true); // for mail |
michael@0 | 596 | pref("network.protocol-handler.external.news", true); // for news |
michael@0 | 597 | pref("network.protocol-handler.external.snews", true); // for secure news |
michael@0 | 598 | pref("network.protocol-handler.external.nntp", true); // also news |
michael@0 | 599 | #ifdef XP_WIN |
michael@0 | 600 | pref("network.protocol-handler.external.ms-windows-store", true); |
michael@0 | 601 | #endif |
michael@0 | 602 | |
michael@0 | 603 | // ...without warning dialogs |
michael@0 | 604 | pref("network.protocol-handler.warn-external.mailto", false); |
michael@0 | 605 | pref("network.protocol-handler.warn-external.news", false); |
michael@0 | 606 | pref("network.protocol-handler.warn-external.snews", false); |
michael@0 | 607 | pref("network.protocol-handler.warn-external.nntp", false); |
michael@0 | 608 | #ifdef XP_WIN |
michael@0 | 609 | pref("network.protocol-handler.warn-external.ms-windows-store", false); |
michael@0 | 610 | #endif |
michael@0 | 611 | |
michael@0 | 612 | // By default, all protocol handlers are exposed. This means that |
michael@0 | 613 | // the browser will respond to openURL commands for all URL types. |
michael@0 | 614 | // It will also try to open link clicks inside the browser before |
michael@0 | 615 | // failing over to the system handlers. |
michael@0 | 616 | pref("network.protocol-handler.expose-all", true); |
michael@0 | 617 | pref("network.protocol-handler.expose.mailto", false); |
michael@0 | 618 | pref("network.protocol-handler.expose.news", false); |
michael@0 | 619 | pref("network.protocol-handler.expose.snews", false); |
michael@0 | 620 | pref("network.protocol-handler.expose.nntp", false); |
michael@0 | 621 | |
michael@0 | 622 | pref("accessibility.typeaheadfind", false); |
michael@0 | 623 | pref("accessibility.typeaheadfind.timeout", 5000); |
michael@0 | 624 | pref("accessibility.typeaheadfind.linksonly", false); |
michael@0 | 625 | pref("accessibility.typeaheadfind.flashBar", 1); |
michael@0 | 626 | |
michael@0 | 627 | // plugin finder service url |
michael@0 | 628 | pref("pfs.datasource.url", "https://pfs.mozilla.org/plugins/PluginFinderService.php?mimetype=%PLUGIN_MIMETYPE%&appID=%APP_ID%&appVersion=%APP_VERSION%&clientOS=%CLIENT_OS%&chromeLocale=%CHROME_LOCALE%&appRelease=%APP_RELEASE%"); |
michael@0 | 629 | |
michael@0 | 630 | // by default we show an infobar message when pages require plugins that are blocked, or are outdated |
michael@0 | 631 | pref("plugins.hide_infobar_for_blocked_plugin", false); |
michael@0 | 632 | pref("plugins.hide_infobar_for_outdated_plugin", false); |
michael@0 | 633 | |
michael@0 | 634 | pref("plugins.update.url", "https://www.mozilla.org/%LOCALE%/plugincheck/"); |
michael@0 | 635 | pref("plugins.update.notifyUser", false); |
michael@0 | 636 | |
michael@0 | 637 | pref("plugins.click_to_play", true); |
michael@0 | 638 | |
michael@0 | 639 | pref("plugins.hideMissingPluginsNotification", false); |
michael@0 | 640 | |
michael@0 | 641 | pref("plugin.default.state", 1); |
michael@0 | 642 | |
michael@0 | 643 | // Plugins bundled in XPIs are enabled by default. |
michael@0 | 644 | pref("plugin.defaultXpi.state", 2); |
michael@0 | 645 | |
michael@0 | 646 | // Flash is enabled by default, and Java is click-to-activate by default on |
michael@0 | 647 | // all channels. |
michael@0 | 648 | pref("plugin.state.flash", 2); |
michael@0 | 649 | pref("plugin.state.java", 1); |
michael@0 | 650 | |
michael@0 | 651 | // Whitelist Requests |
michael@0 | 652 | |
michael@0 | 653 | // Unity player, bug 979849 |
michael@0 | 654 | #ifdef XP_WIN |
michael@0 | 655 | pref("plugin.state.npunity3d", 2); |
michael@0 | 656 | #endif |
michael@0 | 657 | #ifdef XP_MACOSX |
michael@0 | 658 | pref("plugin.state.unity web player", 2); |
michael@0 | 659 | #endif |
michael@0 | 660 | |
michael@0 | 661 | // Cisco Jabber SDK, bug 980133 |
michael@0 | 662 | #ifdef XP_WIN |
michael@0 | 663 | pref("plugin.state.npciscowebcommunicator", 2); |
michael@0 | 664 | #endif |
michael@0 | 665 | #ifdef XP_MACOSX |
michael@0 | 666 | pref("plugin.state.ciscowebcommunicator", 2); |
michael@0 | 667 | #endif |
michael@0 | 668 | |
michael@0 | 669 | // McAfee Security Scanner detection plugin, bug 980772 |
michael@0 | 670 | #ifdef XP_WIN |
michael@0 | 671 | pref("plugin.state.npmcafeemss", 2); |
michael@0 | 672 | #endif |
michael@0 | 673 | |
michael@0 | 674 | // Cisco VGConnect for directv.com, bug 981403 |
michael@0 | 675 | #ifdef XP_WIN |
michael@0 | 676 | pref("plugin.state.npplayerplugin", 2); |
michael@0 | 677 | #endif |
michael@0 | 678 | #ifdef XP_MACOSX |
michael@0 | 679 | pref("plugin.state.playerplugin", 2); |
michael@0 | 680 | #endif |
michael@0 | 681 | |
michael@0 | 682 | // Cisco Jabber Client, bug 981905 |
michael@0 | 683 | #ifdef XP_WIN |
michael@0 | 684 | pref("plugin.state.npchip", 2); |
michael@0 | 685 | #endif |
michael@0 | 686 | #ifdef XP_MACOSX |
michael@0 | 687 | pref("plugin.state.cisco jabber guest plug-in", 2); |
michael@0 | 688 | #endif |
michael@0 | 689 | |
michael@0 | 690 | // Estonian ID-card plugin, bug 982045 |
michael@0 | 691 | #ifdef XP_WIN |
michael@0 | 692 | pref("plugin.state.npesteid-firefox-plugin", 2); |
michael@0 | 693 | #endif |
michael@0 | 694 | #ifdef XP_MACOSX |
michael@0 | 695 | pref("plugin.state.esteidfirefoxplugin", 2); |
michael@0 | 696 | #endif |
michael@0 | 697 | #ifdef UNIX_BUT_NOT_MAC |
michael@0 | 698 | pref("plugin.state.npesteid-firefox-plugin", 2); |
michael@0 | 699 | #endif |
michael@0 | 700 | |
michael@0 | 701 | // coupons.com, bug 984441 |
michael@0 | 702 | #ifdef XP_WIN |
michael@0 | 703 | pref("plugin.state.npmozcouponprinter", 2); |
michael@0 | 704 | #endif |
michael@0 | 705 | #ifdef XP_MACOSX |
michael@0 | 706 | pref("plugin.state.couponprinter-firefox_v", 2); |
michael@0 | 707 | #endif |
michael@0 | 708 | |
michael@0 | 709 | // Nexus Personal BankID, bug 987056 |
michael@0 | 710 | pref("plugin.state.npbispbrowser", 2); |
michael@0 | 711 | |
michael@0 | 712 | // Gradecam, bug 988119 |
michael@0 | 713 | #ifdef XP_WIN |
michael@0 | 714 | pref("plugin.state.npgcplugin", 2); |
michael@0 | 715 | #endif |
michael@0 | 716 | #ifdef XP_MACOSX |
michael@0 | 717 | pref("plugin.state.gcplugin", 2); |
michael@0 | 718 | #endif |
michael@0 | 719 | |
michael@0 | 720 | // Smart Card Plugin, bug 988781 |
michael@0 | 721 | #ifdef XP_WIN |
michael@0 | 722 | pref("plugin.state.npwebcard", 2); |
michael@0 | 723 | #endif |
michael@0 | 724 | |
michael@0 | 725 | // Cisco WebEx, bug 989096 |
michael@0 | 726 | #ifdef XP_WIN |
michael@0 | 727 | pref("plugin.state.npatgpc", 2); |
michael@0 | 728 | #endif |
michael@0 | 729 | #ifdef XP_MACOSX |
michael@0 | 730 | pref("plugin.state.webex", 2); |
michael@0 | 731 | #endif |
michael@0 | 732 | #ifdef UNIX_BUT_NOT_MAC |
michael@0 | 733 | pref("plugin.state.npatgpc", 2); |
michael@0 | 734 | #endif |
michael@0 | 735 | |
michael@0 | 736 | // Skype, bug 990067 |
michael@0 | 737 | #ifdef XP_WIN |
michael@0 | 738 | pref("plugin.state.npskypewebplugin", 2); |
michael@0 | 739 | #endif |
michael@0 | 740 | #ifdef XP_MACOSX |
michael@0 | 741 | pref("plugin.state.skypewebplugin", 2); |
michael@0 | 742 | #endif |
michael@0 | 743 | |
michael@0 | 744 | // Facebook video calling, bug 990068 |
michael@0 | 745 | #ifdef XP_WIN |
michael@0 | 746 | pref("plugin.state.npfacebookvideocalling", 2); |
michael@0 | 747 | #endif |
michael@0 | 748 | #ifdef XP_MACOSX |
michael@0 | 749 | pref("plugin.state.facebookvideocalling", 2); |
michael@0 | 750 | #endif |
michael@0 | 751 | |
michael@0 | 752 | // MS Office Lync plugin, bug 990069 |
michael@0 | 753 | #ifdef XP_WIN |
michael@0 | 754 | pref("plugin.state.npmeetingjoinpluginoc", 2); |
michael@0 | 755 | #endif |
michael@0 | 756 | #ifdef XP_MACOSX |
michael@0 | 757 | pref("plugin.state.lwaplugin", 2); |
michael@0 | 758 | #endif |
michael@0 | 759 | |
michael@0 | 760 | // VidyoWeb, bug 990286 |
michael@0 | 761 | #ifdef XP_WIN |
michael@0 | 762 | pref("plugin.state.npvidyoweb", 2); |
michael@0 | 763 | #endif |
michael@0 | 764 | #ifdef XP_MACOSX |
michael@0 | 765 | pref("plugin.state.npvidyoweb", 2); |
michael@0 | 766 | pref("plugin.state.vidyoweb", 2); |
michael@0 | 767 | #endif |
michael@0 | 768 | |
michael@0 | 769 | // McAfee Virtual Technician, bug 981503 |
michael@0 | 770 | #ifdef XP_WIN |
michael@0 | 771 | pref("plugin.state.npmvtplugin", 2); |
michael@0 | 772 | #endif |
michael@0 | 773 | |
michael@0 | 774 | // Verimatrix ViewRightWeb, bug 989872 |
michael@0 | 775 | #ifdef XP_WIN |
michael@0 | 776 | pref("plugin.state.npviewright", 2); |
michael@0 | 777 | #endif |
michael@0 | 778 | #ifdef XP_MACOSX |
michael@0 | 779 | pref("plugin.state.viewrightwebplayer", 2); |
michael@0 | 780 | #endif |
michael@0 | 781 | |
michael@0 | 782 | // McAfee SiteAdvisor Enterprise, bug 987057 |
michael@0 | 783 | #ifdef XP_WIN |
michael@0 | 784 | pref("plugin.state.npmcffplg", 2); |
michael@0 | 785 | #endif |
michael@0 | 786 | |
michael@0 | 787 | // F5 Networks SSLVPN plugin, bug 985640 |
michael@0 | 788 | #ifdef XP_MACOSX |
michael@0 | 789 | pref("plugin.state.f5 ssl vpn plugin", 2); |
michael@0 | 790 | pref("plugin.state.f5 sam inspection host plugin", 2); |
michael@0 | 791 | #endif |
michael@0 | 792 | |
michael@0 | 793 | // display door hanger if flash not installed |
michael@0 | 794 | pref("plugins.notifyMissingFlash", true); |
michael@0 | 795 | |
michael@0 | 796 | #ifdef XP_WIN |
michael@0 | 797 | pref("browser.preferences.instantApply", false); |
michael@0 | 798 | #else |
michael@0 | 799 | pref("browser.preferences.instantApply", true); |
michael@0 | 800 | #endif |
michael@0 | 801 | #ifdef XP_MACOSX |
michael@0 | 802 | pref("browser.preferences.animateFadeIn", true); |
michael@0 | 803 | #else |
michael@0 | 804 | pref("browser.preferences.animateFadeIn", false); |
michael@0 | 805 | #endif |
michael@0 | 806 | |
michael@0 | 807 | // Toggles between the two Preferences implementations, pop-up window and in-content |
michael@0 | 808 | pref("browser.preferences.inContent", false); |
michael@0 | 809 | |
michael@0 | 810 | pref("browser.download.show_plugins_in_list", true); |
michael@0 | 811 | pref("browser.download.hide_plugins_without_extensions", true); |
michael@0 | 812 | |
michael@0 | 813 | // Backspace and Shift+Backspace behavior |
michael@0 | 814 | // 0 goes Back/Forward |
michael@0 | 815 | // 1 act like PgUp/PgDown |
michael@0 | 816 | // 2 and other values, nothing |
michael@0 | 817 | #ifdef UNIX_BUT_NOT_MAC |
michael@0 | 818 | pref("browser.backspace_action", 2); |
michael@0 | 819 | #else |
michael@0 | 820 | pref("browser.backspace_action", 0); |
michael@0 | 821 | #endif |
michael@0 | 822 | |
michael@0 | 823 | // this will automatically enable inline spellchecking (if it is available) for |
michael@0 | 824 | // editable elements in HTML |
michael@0 | 825 | // 0 = spellcheck nothing |
michael@0 | 826 | // 1 = check multi-line controls [default] |
michael@0 | 827 | // 2 = check multi/single line controls |
michael@0 | 828 | pref("layout.spellcheckDefault", 1); |
michael@0 | 829 | |
michael@0 | 830 | pref("browser.send_pings", false); |
michael@0 | 831 | |
michael@0 | 832 | /* initial web feed readers list */ |
michael@0 | 833 | pref("browser.contentHandlers.types.0.title", "chrome://browser-region/locale/region.properties"); |
michael@0 | 834 | pref("browser.contentHandlers.types.0.uri", "chrome://browser-region/locale/region.properties"); |
michael@0 | 835 | pref("browser.contentHandlers.types.0.type", "application/vnd.mozilla.maybe.feed"); |
michael@0 | 836 | pref("browser.contentHandlers.types.1.title", "chrome://browser-region/locale/region.properties"); |
michael@0 | 837 | pref("browser.contentHandlers.types.1.uri", "chrome://browser-region/locale/region.properties"); |
michael@0 | 838 | pref("browser.contentHandlers.types.1.type", "application/vnd.mozilla.maybe.feed"); |
michael@0 | 839 | pref("browser.contentHandlers.types.2.title", "chrome://browser-region/locale/region.properties"); |
michael@0 | 840 | pref("browser.contentHandlers.types.2.uri", "chrome://browser-region/locale/region.properties"); |
michael@0 | 841 | pref("browser.contentHandlers.types.2.type", "application/vnd.mozilla.maybe.feed"); |
michael@0 | 842 | pref("browser.contentHandlers.types.3.title", "chrome://browser-region/locale/region.properties"); |
michael@0 | 843 | pref("browser.contentHandlers.types.3.uri", "chrome://browser-region/locale/region.properties"); |
michael@0 | 844 | pref("browser.contentHandlers.types.3.type", "application/vnd.mozilla.maybe.feed"); |
michael@0 | 845 | pref("browser.contentHandlers.types.4.title", "chrome://browser-region/locale/region.properties"); |
michael@0 | 846 | pref("browser.contentHandlers.types.4.uri", "chrome://browser-region/locale/region.properties"); |
michael@0 | 847 | pref("browser.contentHandlers.types.4.type", "application/vnd.mozilla.maybe.feed"); |
michael@0 | 848 | pref("browser.contentHandlers.types.5.title", "chrome://browser-region/locale/region.properties"); |
michael@0 | 849 | pref("browser.contentHandlers.types.5.uri", "chrome://browser-region/locale/region.properties"); |
michael@0 | 850 | pref("browser.contentHandlers.types.5.type", "application/vnd.mozilla.maybe.feed"); |
michael@0 | 851 | |
michael@0 | 852 | pref("browser.feeds.handler", "ask"); |
michael@0 | 853 | pref("browser.videoFeeds.handler", "ask"); |
michael@0 | 854 | pref("browser.audioFeeds.handler", "ask"); |
michael@0 | 855 | |
michael@0 | 856 | // At startup, if the handler service notices that the version number in the |
michael@0 | 857 | // region.properties file is newer than the version number in the handler |
michael@0 | 858 | // service datastore, it will add any new handlers it finds in the prefs (as |
michael@0 | 859 | // seeded by this file) to its datastore. |
michael@0 | 860 | pref("gecko.handlerService.defaultHandlersVersion", "chrome://browser-region/locale/region.properties"); |
michael@0 | 861 | |
michael@0 | 862 | // The default set of web-based protocol handlers shown in the application |
michael@0 | 863 | // selection dialog for webcal: ; I've arbitrarily picked 4 default handlers |
michael@0 | 864 | // per protocol, but if some locale wants more than that (or defaults for some |
michael@0 | 865 | // protocol not currently listed here), we should go ahead and add those. |
michael@0 | 866 | |
michael@0 | 867 | // webcal |
michael@0 | 868 | pref("gecko.handlerService.schemes.webcal.0.name", "chrome://browser-region/locale/region.properties"); |
michael@0 | 869 | pref("gecko.handlerService.schemes.webcal.0.uriTemplate", "chrome://browser-region/locale/region.properties"); |
michael@0 | 870 | pref("gecko.handlerService.schemes.webcal.1.name", "chrome://browser-region/locale/region.properties"); |
michael@0 | 871 | pref("gecko.handlerService.schemes.webcal.1.uriTemplate", "chrome://browser-region/locale/region.properties"); |
michael@0 | 872 | pref("gecko.handlerService.schemes.webcal.2.name", "chrome://browser-region/locale/region.properties"); |
michael@0 | 873 | pref("gecko.handlerService.schemes.webcal.2.uriTemplate", "chrome://browser-region/locale/region.properties"); |
michael@0 | 874 | pref("gecko.handlerService.schemes.webcal.3.name", "chrome://browser-region/locale/region.properties"); |
michael@0 | 875 | pref("gecko.handlerService.schemes.webcal.3.uriTemplate", "chrome://browser-region/locale/region.properties"); |
michael@0 | 876 | |
michael@0 | 877 | // mailto |
michael@0 | 878 | pref("gecko.handlerService.schemes.mailto.0.name", "chrome://browser-region/locale/region.properties"); |
michael@0 | 879 | pref("gecko.handlerService.schemes.mailto.0.uriTemplate", "chrome://browser-region/locale/region.properties"); |
michael@0 | 880 | pref("gecko.handlerService.schemes.mailto.1.name", "chrome://browser-region/locale/region.properties"); |
michael@0 | 881 | pref("gecko.handlerService.schemes.mailto.1.uriTemplate", "chrome://browser-region/locale/region.properties"); |
michael@0 | 882 | pref("gecko.handlerService.schemes.mailto.2.name", "chrome://browser-region/locale/region.properties"); |
michael@0 | 883 | pref("gecko.handlerService.schemes.mailto.2.uriTemplate", "chrome://browser-region/locale/region.properties"); |
michael@0 | 884 | pref("gecko.handlerService.schemes.mailto.3.name", "chrome://browser-region/locale/region.properties"); |
michael@0 | 885 | pref("gecko.handlerService.schemes.mailto.3.uriTemplate", "chrome://browser-region/locale/region.properties"); |
michael@0 | 886 | |
michael@0 | 887 | // irc |
michael@0 | 888 | pref("gecko.handlerService.schemes.irc.0.name", "chrome://browser-region/locale/region.properties"); |
michael@0 | 889 | pref("gecko.handlerService.schemes.irc.0.uriTemplate", "chrome://browser-region/locale/region.properties"); |
michael@0 | 890 | pref("gecko.handlerService.schemes.irc.1.name", "chrome://browser-region/locale/region.properties"); |
michael@0 | 891 | pref("gecko.handlerService.schemes.irc.1.uriTemplate", "chrome://browser-region/locale/region.properties"); |
michael@0 | 892 | pref("gecko.handlerService.schemes.irc.2.name", "chrome://browser-region/locale/region.properties"); |
michael@0 | 893 | pref("gecko.handlerService.schemes.irc.2.uriTemplate", "chrome://browser-region/locale/region.properties"); |
michael@0 | 894 | pref("gecko.handlerService.schemes.irc.3.name", "chrome://browser-region/locale/region.properties"); |
michael@0 | 895 | pref("gecko.handlerService.schemes.irc.3.uriTemplate", "chrome://browser-region/locale/region.properties"); |
michael@0 | 896 | |
michael@0 | 897 | // ircs |
michael@0 | 898 | pref("gecko.handlerService.schemes.ircs.0.name", "chrome://browser-region/locale/region.properties"); |
michael@0 | 899 | pref("gecko.handlerService.schemes.ircs.0.uriTemplate", "chrome://browser-region/locale/region.properties"); |
michael@0 | 900 | pref("gecko.handlerService.schemes.ircs.1.name", "chrome://browser-region/locale/region.properties"); |
michael@0 | 901 | pref("gecko.handlerService.schemes.ircs.1.uriTemplate", "chrome://browser-region/locale/region.properties"); |
michael@0 | 902 | pref("gecko.handlerService.schemes.ircs.2.name", "chrome://browser-region/locale/region.properties"); |
michael@0 | 903 | pref("gecko.handlerService.schemes.ircs.2.uriTemplate", "chrome://browser-region/locale/region.properties"); |
michael@0 | 904 | pref("gecko.handlerService.schemes.ircs.3.name", "chrome://browser-region/locale/region.properties"); |
michael@0 | 905 | pref("gecko.handlerService.schemes.ircs.3.uriTemplate", "chrome://browser-region/locale/region.properties"); |
michael@0 | 906 | |
michael@0 | 907 | // By default, we don't want protocol/content handlers to be registered from a different host, see bug 402287 |
michael@0 | 908 | pref("gecko.handlerService.allowRegisterFromDifferentHost", false); |
michael@0 | 909 | |
michael@0 | 910 | #ifdef MOZ_SAFE_BROWSING |
michael@0 | 911 | pref("browser.safebrowsing.enabled", true); |
michael@0 | 912 | pref("browser.safebrowsing.malware.enabled", true); |
michael@0 | 913 | pref("browser.safebrowsing.debug", false); |
michael@0 | 914 | |
michael@0 | 915 | pref("browser.safebrowsing.updateURL", "https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=%VERSION%&pver=2.2&key=%GOOGLE_API_KEY%"); |
michael@0 | 916 | pref("browser.safebrowsing.gethashURL", "https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=%VERSION%&pver=2.2"); |
michael@0 | 917 | pref("browser.safebrowsing.reportURL", "https://safebrowsing.google.com/safebrowsing/report?"); |
michael@0 | 918 | pref("browser.safebrowsing.reportGenericURL", "http://%LOCALE%.phish-generic.mozilla.com/?hl=%LOCALE%"); |
michael@0 | 919 | pref("browser.safebrowsing.reportErrorURL", "http://%LOCALE%.phish-error.mozilla.com/?hl=%LOCALE%"); |
michael@0 | 920 | pref("browser.safebrowsing.reportPhishURL", "http://%LOCALE%.phish-report.mozilla.com/?hl=%LOCALE%"); |
michael@0 | 921 | pref("browser.safebrowsing.reportMalwareURL", "http://%LOCALE%.malware-report.mozilla.com/?hl=%LOCALE%"); |
michael@0 | 922 | pref("browser.safebrowsing.reportMalwareErrorURL", "http://%LOCALE%.malware-error.mozilla.com/?hl=%LOCALE%"); |
michael@0 | 923 | |
michael@0 | 924 | pref("browser.safebrowsing.malware.reportURL", "https://safebrowsing.google.com/safebrowsing/diagnostic?client=%NAME%&hl=%LOCALE%&site="); |
michael@0 | 925 | pref("browser.safebrowsing.appRepURL", "https://sb-ssl.google.com/safebrowsing/clientreport/download?key=%GOOGLE_API_KEY%"); |
michael@0 | 926 | |
michael@0 | 927 | #ifdef MOZILLA_OFFICIAL |
michael@0 | 928 | // Normally the "client ID" sent in updates is appinfo.name, but for |
michael@0 | 929 | // official Firefox releases from Mozilla we use a special identifier. |
michael@0 | 930 | pref("browser.safebrowsing.id", "navclient-auto-ffox"); |
michael@0 | 931 | #endif |
michael@0 | 932 | |
michael@0 | 933 | // Name of the about: page contributed by safebrowsing to handle display of error |
michael@0 | 934 | // pages on phishing/malware hits. (bug 399233) |
michael@0 | 935 | pref("urlclassifier.alternate_error_page", "blocked"); |
michael@0 | 936 | |
michael@0 | 937 | // The number of random entries to send with a gethash request. |
michael@0 | 938 | pref("urlclassifier.gethashnoise", 4); |
michael@0 | 939 | |
michael@0 | 940 | // If an urlclassifier table has not been updated in this number of seconds, |
michael@0 | 941 | // a gethash request will be forced to check that the result is still in |
michael@0 | 942 | // the database. |
michael@0 | 943 | pref("urlclassifier.max-complete-age", 2700); |
michael@0 | 944 | // Tables for application reputation. |
michael@0 | 945 | pref("urlclassifier.downloadBlockTable", "goog-badbinurl-shavar"); |
michael@0 | 946 | #ifdef XP_WIN |
michael@0 | 947 | // Only download the whitelist on Windows, since the whitelist is |
michael@0 | 948 | // only useful for suppressing remote lookups for signed binaries which we can |
michael@0 | 949 | // only verify on Windows (Bug 974579). |
michael@0 | 950 | pref("urlclassifier.downloadAllowTable", "goog-downloadwhite-digest256"); |
michael@0 | 951 | #endif |
michael@0 | 952 | #endif |
michael@0 | 953 | |
michael@0 | 954 | pref("browser.geolocation.warning.infoURL", "https://www.mozilla.org/%LOCALE%/firefox/geolocation/"); |
michael@0 | 955 | |
michael@0 | 956 | pref("browser.EULA.version", 3); |
michael@0 | 957 | pref("browser.rights.version", 3); |
michael@0 | 958 | pref("browser.rights.3.shown", false); |
michael@0 | 959 | |
michael@0 | 960 | #ifdef DEBUG |
michael@0 | 961 | // Don't show the about:rights notification in debug builds. |
michael@0 | 962 | pref("browser.rights.override", true); |
michael@0 | 963 | #endif |
michael@0 | 964 | |
michael@0 | 965 | pref("browser.sessionstore.resume_from_crash", true); |
michael@0 | 966 | pref("browser.sessionstore.resume_session_once", false); |
michael@0 | 967 | |
michael@0 | 968 | // minimal interval between two save operations in milliseconds |
michael@0 | 969 | pref("browser.sessionstore.interval", 15000); |
michael@0 | 970 | // on which sites to save text data, POSTDATA and cookies |
michael@0 | 971 | // 0 = everywhere, 1 = unencrypted sites, 2 = nowhere |
michael@0 | 972 | pref("browser.sessionstore.privacy_level", 0); |
michael@0 | 973 | // the same as browser.sessionstore.privacy_level, but for saving deferred session data |
michael@0 | 974 | pref("browser.sessionstore.privacy_level_deferred", 1); |
michael@0 | 975 | // how many tabs can be reopened (per window) |
michael@0 | 976 | pref("browser.sessionstore.max_tabs_undo", 10); |
michael@0 | 977 | // how many windows can be reopened (per session) - on non-OS X platforms this |
michael@0 | 978 | // pref may be ignored when dealing with pop-up windows to ensure proper startup |
michael@0 | 979 | pref("browser.sessionstore.max_windows_undo", 3); |
michael@0 | 980 | // number of crashes that can occur before the about:sessionrestore page is displayed |
michael@0 | 981 | // (this pref has no effect if more than 6 hours have passed since the last crash) |
michael@0 | 982 | pref("browser.sessionstore.max_resumed_crashes", 1); |
michael@0 | 983 | // number of back button session history entries to restore (-1 = all of them) |
michael@0 | 984 | pref("browser.sessionstore.max_serialize_back", 10); |
michael@0 | 985 | // number of forward button session history entries to restore (-1 = all of them) |
michael@0 | 986 | pref("browser.sessionstore.max_serialize_forward", -1); |
michael@0 | 987 | // restore_on_demand overrides MAX_CONCURRENT_TAB_RESTORES (sessionstore constant) |
michael@0 | 988 | // and restore_hidden_tabs. When true, tabs will not be restored until they are |
michael@0 | 989 | // focused (also applies to tabs that aren't visible). When false, the values |
michael@0 | 990 | // for MAX_CONCURRENT_TAB_RESTORES and restore_hidden_tabs are respected. |
michael@0 | 991 | // Selected tabs are always restored regardless of this pref. |
michael@0 | 992 | pref("browser.sessionstore.restore_on_demand", true); |
michael@0 | 993 | // Whether to automatically restore hidden tabs (i.e., tabs in other tab groups) or not |
michael@0 | 994 | pref("browser.sessionstore.restore_hidden_tabs", false); |
michael@0 | 995 | // If restore_on_demand is set, pinned tabs are restored on startup by default. |
michael@0 | 996 | // When set to true, this pref overrides that behavior, and pinned tabs will only |
michael@0 | 997 | // be restored when they are focused. |
michael@0 | 998 | pref("browser.sessionstore.restore_pinned_tabs_on_demand", false); |
michael@0 | 999 | // The version at which we performed the latest upgrade backup |
michael@0 | 1000 | pref("browser.sessionstore.upgradeBackup.latestBuildID", ""); |
michael@0 | 1001 | // End-users should not run sessionstore in debug mode |
michael@0 | 1002 | pref("browser.sessionstore.debug", false); |
michael@0 | 1003 | |
michael@0 | 1004 | // allow META refresh by default |
michael@0 | 1005 | pref("accessibility.blockautorefresh", false); |
michael@0 | 1006 | |
michael@0 | 1007 | // Whether history is enabled or not. |
michael@0 | 1008 | pref("places.history.enabled", true); |
michael@0 | 1009 | |
michael@0 | 1010 | // the (maximum) number of the recent visits to sample |
michael@0 | 1011 | // when calculating frecency |
michael@0 | 1012 | pref("places.frecency.numVisits", 10); |
michael@0 | 1013 | |
michael@0 | 1014 | // buckets (in days) for frecency calculation |
michael@0 | 1015 | pref("places.frecency.firstBucketCutoff", 4); |
michael@0 | 1016 | pref("places.frecency.secondBucketCutoff", 14); |
michael@0 | 1017 | pref("places.frecency.thirdBucketCutoff", 31); |
michael@0 | 1018 | pref("places.frecency.fourthBucketCutoff", 90); |
michael@0 | 1019 | |
michael@0 | 1020 | // weights for buckets for frecency calculations |
michael@0 | 1021 | pref("places.frecency.firstBucketWeight", 100); |
michael@0 | 1022 | pref("places.frecency.secondBucketWeight", 70); |
michael@0 | 1023 | pref("places.frecency.thirdBucketWeight", 50); |
michael@0 | 1024 | pref("places.frecency.fourthBucketWeight", 30); |
michael@0 | 1025 | pref("places.frecency.defaultBucketWeight", 10); |
michael@0 | 1026 | |
michael@0 | 1027 | // bonus (in percent) for visit transition types for frecency calculations |
michael@0 | 1028 | pref("places.frecency.embedVisitBonus", 0); |
michael@0 | 1029 | pref("places.frecency.framedLinkVisitBonus", 0); |
michael@0 | 1030 | pref("places.frecency.linkVisitBonus", 100); |
michael@0 | 1031 | pref("places.frecency.typedVisitBonus", 2000); |
michael@0 | 1032 | pref("places.frecency.bookmarkVisitBonus", 75); |
michael@0 | 1033 | pref("places.frecency.downloadVisitBonus", 0); |
michael@0 | 1034 | pref("places.frecency.permRedirectVisitBonus", 0); |
michael@0 | 1035 | pref("places.frecency.tempRedirectVisitBonus", 0); |
michael@0 | 1036 | pref("places.frecency.defaultVisitBonus", 0); |
michael@0 | 1037 | |
michael@0 | 1038 | // bonus (in percent) for place types for frecency calculations |
michael@0 | 1039 | pref("places.frecency.unvisitedBookmarkBonus", 140); |
michael@0 | 1040 | pref("places.frecency.unvisitedTypedBonus", 200); |
michael@0 | 1041 | |
michael@0 | 1042 | // Controls behavior of the "Add Exception" dialog launched from SSL error pages |
michael@0 | 1043 | // 0 - don't pre-populate anything |
michael@0 | 1044 | // 1 - pre-populate site URL, but don't fetch certificate |
michael@0 | 1045 | // 2 - pre-populate site URL and pre-fetch certificate |
michael@0 | 1046 | pref("browser.ssl_override_behavior", 2); |
michael@0 | 1047 | |
michael@0 | 1048 | // True if the user should be prompted when a web application supports |
michael@0 | 1049 | // offline apps. |
michael@0 | 1050 | pref("browser.offline-apps.notify", true); |
michael@0 | 1051 | |
michael@0 | 1052 | // if true, use full page zoom instead of text zoom |
michael@0 | 1053 | pref("browser.zoom.full", true); |
michael@0 | 1054 | |
michael@0 | 1055 | // Whether or not to save and restore zoom levels on a per-site basis. |
michael@0 | 1056 | pref("browser.zoom.siteSpecific", true); |
michael@0 | 1057 | |
michael@0 | 1058 | // Whether or not to update background tabs to the current zoom level. |
michael@0 | 1059 | pref("browser.zoom.updateBackgroundTabs", true); |
michael@0 | 1060 | |
michael@0 | 1061 | // The breakpad report server to link to in about:crashes |
michael@0 | 1062 | pref("breakpad.reportURL", "https://crash-stats.mozilla.com/report/index/"); |
michael@0 | 1063 | |
michael@0 | 1064 | #ifndef RELEASE_BUILD |
michael@0 | 1065 | // Override submission of plugin hang reports to a different processing server |
michael@0 | 1066 | // for the smaller-volume nightly/aurora populations. |
michael@0 | 1067 | pref("toolkit.crashreporter.pluginHangSubmitURL", |
michael@0 | 1068 | "https://hang-reports.mozilla.org/submit"); |
michael@0 | 1069 | #endif |
michael@0 | 1070 | |
michael@0 | 1071 | // URL for "Learn More" for Crash Reporter |
michael@0 | 1072 | pref("toolkit.crashreporter.infoURL", |
michael@0 | 1073 | "https://www.mozilla.org/legal/privacy/firefox.html#crash-reporter"); |
michael@0 | 1074 | |
michael@0 | 1075 | // base URL for web-based support pages |
michael@0 | 1076 | pref("app.support.baseURL", "https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/"); |
michael@0 | 1077 | |
michael@0 | 1078 | // base url for web-based feedback pages |
michael@0 | 1079 | pref("app.feedback.baseURL", "https://input.mozilla.org/%LOCALE%/feedback/%APP%/%VERSION%/"); |
michael@0 | 1080 | |
michael@0 | 1081 | // Name of alternate about: page for certificate errors (when undefined, defaults to about:neterror) |
michael@0 | 1082 | pref("security.alternate_certificate_error_page", "certerror"); |
michael@0 | 1083 | |
michael@0 | 1084 | // Whether to start the private browsing mode at application startup |
michael@0 | 1085 | pref("browser.privatebrowsing.autostart", false); |
michael@0 | 1086 | |
michael@0 | 1087 | // Don't try to alter this pref, it'll be reset the next time you use the |
michael@0 | 1088 | // bookmarking dialog |
michael@0 | 1089 | pref("browser.bookmarks.editDialog.firstEditField", "namePicker"); |
michael@0 | 1090 | |
michael@0 | 1091 | // Whether to use a panel that looks like an OS X sheet for customization |
michael@0 | 1092 | #ifdef XP_MACOSX |
michael@0 | 1093 | pref("toolbar.customization.usesheet", true); |
michael@0 | 1094 | #else |
michael@0 | 1095 | pref("toolbar.customization.usesheet", false); |
michael@0 | 1096 | #endif |
michael@0 | 1097 | |
michael@0 | 1098 | #ifdef XP_MACOSX |
michael@0 | 1099 | // On mac, the default pref is per-architecture |
michael@0 | 1100 | pref("dom.ipc.plugins.enabled.i386", true); |
michael@0 | 1101 | pref("dom.ipc.plugins.enabled.x86_64", true); |
michael@0 | 1102 | #else |
michael@0 | 1103 | pref("dom.ipc.plugins.enabled", true); |
michael@0 | 1104 | #endif |
michael@0 | 1105 | |
michael@0 | 1106 | #if defined(NIGHTLY_BUILD) |
michael@0 | 1107 | // browser.tabs.remote is enabled on nightly. However, users won't |
michael@0 | 1108 | // actually get remote tabs unless they enable |
michael@0 | 1109 | // browser.tabs.remote.autostart or they use the "New OOP Window" menu |
michael@0 | 1110 | // option. |
michael@0 | 1111 | pref("browser.tabs.remote", true); |
michael@0 | 1112 | #else |
michael@0 | 1113 | pref("browser.tabs.remote", false); |
michael@0 | 1114 | #endif |
michael@0 | 1115 | pref("browser.tabs.remote.autostart", false); |
michael@0 | 1116 | |
michael@0 | 1117 | // This pref governs whether we attempt to work around problems caused by |
michael@0 | 1118 | // plugins using OS calls to manipulate the cursor while running out-of- |
michael@0 | 1119 | // process. These workarounds all involve intercepting (hooking) certain |
michael@0 | 1120 | // OS calls in the plugin process, then arranging to make certain OS calls |
michael@0 | 1121 | // in the browser process. Eventually plugins will be required to use the |
michael@0 | 1122 | // NPAPI to manipulate the cursor, and these workarounds will be removed. |
michael@0 | 1123 | // See bug 621117. |
michael@0 | 1124 | #ifdef XP_MACOSX |
michael@0 | 1125 | pref("dom.ipc.plugins.nativeCursorSupport", true); |
michael@0 | 1126 | #endif |
michael@0 | 1127 | |
michael@0 | 1128 | #ifdef XP_WIN |
michael@0 | 1129 | pref("browser.taskbar.previews.enable", false); |
michael@0 | 1130 | pref("browser.taskbar.previews.max", 20); |
michael@0 | 1131 | pref("browser.taskbar.previews.cachetime", 5); |
michael@0 | 1132 | pref("browser.taskbar.lists.enabled", true); |
michael@0 | 1133 | pref("browser.taskbar.lists.frequent.enabled", true); |
michael@0 | 1134 | pref("browser.taskbar.lists.recent.enabled", false); |
michael@0 | 1135 | pref("browser.taskbar.lists.maxListItemCount", 7); |
michael@0 | 1136 | pref("browser.taskbar.lists.tasks.enabled", true); |
michael@0 | 1137 | pref("browser.taskbar.lists.refreshInSeconds", 120); |
michael@0 | 1138 | #endif |
michael@0 | 1139 | |
michael@0 | 1140 | #ifdef MOZ_SERVICES_SYNC |
michael@0 | 1141 | // The sync engines to use. |
michael@0 | 1142 | pref("services.sync.registerEngines", "Bookmarks,Form,History,Password,Prefs,Tab,Addons"); |
michael@0 | 1143 | // Preferences to be synced by default |
michael@0 | 1144 | pref("services.sync.prefs.sync.accessibility.blockautorefresh", true); |
michael@0 | 1145 | pref("services.sync.prefs.sync.accessibility.browsewithcaret", true); |
michael@0 | 1146 | pref("services.sync.prefs.sync.accessibility.typeaheadfind", true); |
michael@0 | 1147 | pref("services.sync.prefs.sync.accessibility.typeaheadfind.linksonly", true); |
michael@0 | 1148 | pref("services.sync.prefs.sync.addons.ignoreUserEnabledChanges", true); |
michael@0 | 1149 | // The addons prefs related to repository verification are intentionally |
michael@0 | 1150 | // not synced for security reasons. If a system is compromised, a user |
michael@0 | 1151 | // could weaken the pref locally, install an add-on from an untrusted |
michael@0 | 1152 | // source, and this would propagate automatically to other, |
michael@0 | 1153 | // uncompromised Sync-connected devices. |
michael@0 | 1154 | pref("services.sync.prefs.sync.app.update.mode", true); |
michael@0 | 1155 | pref("services.sync.prefs.sync.browser.formfill.enable", true); |
michael@0 | 1156 | pref("services.sync.prefs.sync.browser.link.open_newwindow", true); |
michael@0 | 1157 | pref("services.sync.prefs.sync.browser.offline-apps.notify", true); |
michael@0 | 1158 | pref("services.sync.prefs.sync.browser.safebrowsing.enabled", true); |
michael@0 | 1159 | pref("services.sync.prefs.sync.browser.safebrowsing.malware.enabled", true); |
michael@0 | 1160 | pref("services.sync.prefs.sync.browser.search.selectedEngine", true); |
michael@0 | 1161 | pref("services.sync.prefs.sync.browser.search.update", true); |
michael@0 | 1162 | pref("services.sync.prefs.sync.browser.sessionstore.restore_on_demand", true); |
michael@0 | 1163 | pref("services.sync.prefs.sync.browser.startup.homepage", true); |
michael@0 | 1164 | pref("services.sync.prefs.sync.browser.startup.page", true); |
michael@0 | 1165 | pref("services.sync.prefs.sync.browser.tabs.loadInBackground", true); |
michael@0 | 1166 | pref("services.sync.prefs.sync.browser.tabs.warnOnClose", true); |
michael@0 | 1167 | pref("services.sync.prefs.sync.browser.tabs.warnOnOpen", true); |
michael@0 | 1168 | pref("services.sync.prefs.sync.browser.urlbar.autocomplete.enabled", true); |
michael@0 | 1169 | pref("services.sync.prefs.sync.browser.urlbar.default.behavior", true); |
michael@0 | 1170 | pref("services.sync.prefs.sync.browser.urlbar.maxRichResults", true); |
michael@0 | 1171 | pref("services.sync.prefs.sync.dom.disable_open_during_load", true); |
michael@0 | 1172 | pref("services.sync.prefs.sync.dom.disable_window_flip", true); |
michael@0 | 1173 | pref("services.sync.prefs.sync.dom.disable_window_move_resize", true); |
michael@0 | 1174 | pref("services.sync.prefs.sync.dom.event.contextmenu.enabled", true); |
michael@0 | 1175 | pref("services.sync.prefs.sync.extensions.personas.current", true); |
michael@0 | 1176 | pref("services.sync.prefs.sync.extensions.update.enabled", true); |
michael@0 | 1177 | pref("services.sync.prefs.sync.intl.accept_languages", true); |
michael@0 | 1178 | pref("services.sync.prefs.sync.javascript.enabled", true); |
michael@0 | 1179 | pref("services.sync.prefs.sync.layout.spellcheckDefault", true); |
michael@0 | 1180 | pref("services.sync.prefs.sync.lightweightThemes.isThemeSelected", true); |
michael@0 | 1181 | pref("services.sync.prefs.sync.lightweightThemes.usedThemes", true); |
michael@0 | 1182 | pref("services.sync.prefs.sync.network.cookie.cookieBehavior", true); |
michael@0 | 1183 | pref("services.sync.prefs.sync.network.cookie.lifetimePolicy", true); |
michael@0 | 1184 | pref("services.sync.prefs.sync.permissions.default.image", true); |
michael@0 | 1185 | pref("services.sync.prefs.sync.pref.advanced.images.disable_button.view_image", true); |
michael@0 | 1186 | pref("services.sync.prefs.sync.pref.advanced.javascript.disable_button.advanced", true); |
michael@0 | 1187 | pref("services.sync.prefs.sync.pref.downloads.disable_button.edit_actions", true); |
michael@0 | 1188 | pref("services.sync.prefs.sync.pref.privacy.disable_button.cookie_exceptions", true); |
michael@0 | 1189 | pref("services.sync.prefs.sync.privacy.clearOnShutdown.cache", true); |
michael@0 | 1190 | pref("services.sync.prefs.sync.privacy.clearOnShutdown.cookies", true); |
michael@0 | 1191 | pref("services.sync.prefs.sync.privacy.clearOnShutdown.downloads", true); |
michael@0 | 1192 | pref("services.sync.prefs.sync.privacy.clearOnShutdown.formdata", true); |
michael@0 | 1193 | pref("services.sync.prefs.sync.privacy.clearOnShutdown.history", true); |
michael@0 | 1194 | pref("services.sync.prefs.sync.privacy.clearOnShutdown.offlineApps", true); |
michael@0 | 1195 | pref("services.sync.prefs.sync.privacy.clearOnShutdown.passwords", true); |
michael@0 | 1196 | pref("services.sync.prefs.sync.privacy.clearOnShutdown.sessions", true); |
michael@0 | 1197 | pref("services.sync.prefs.sync.privacy.clearOnShutdown.siteSettings", true); |
michael@0 | 1198 | pref("services.sync.prefs.sync.privacy.donottrackheader.enabled", true); |
michael@0 | 1199 | pref("services.sync.prefs.sync.privacy.donottrackheader.value", true); |
michael@0 | 1200 | pref("services.sync.prefs.sync.privacy.sanitize.sanitizeOnShutdown", true); |
michael@0 | 1201 | pref("services.sync.prefs.sync.security.OCSP.enabled", true); |
michael@0 | 1202 | pref("services.sync.prefs.sync.security.OCSP.require", true); |
michael@0 | 1203 | pref("services.sync.prefs.sync.security.default_personal_cert", true); |
michael@0 | 1204 | pref("services.sync.prefs.sync.security.tls.version.min", true); |
michael@0 | 1205 | pref("services.sync.prefs.sync.security.tls.version.max", true); |
michael@0 | 1206 | pref("services.sync.prefs.sync.signon.rememberSignons", true); |
michael@0 | 1207 | pref("services.sync.prefs.sync.spellchecker.dictionary", true); |
michael@0 | 1208 | pref("services.sync.prefs.sync.xpinstall.whitelist.required", true); |
michael@0 | 1209 | #endif |
michael@0 | 1210 | |
michael@0 | 1211 | // Disable the error console |
michael@0 | 1212 | pref("devtools.errorconsole.enabled", false); |
michael@0 | 1213 | |
michael@0 | 1214 | // Developer toolbar and GCLI preferences |
michael@0 | 1215 | pref("devtools.toolbar.enabled", true); |
michael@0 | 1216 | pref("devtools.toolbar.visible", false); |
michael@0 | 1217 | pref("devtools.commands.dir", ""); |
michael@0 | 1218 | |
michael@0 | 1219 | // Enable the app manager |
michael@0 | 1220 | pref("devtools.appmanager.enabled", true); |
michael@0 | 1221 | pref("devtools.appmanager.lastTab", "help"); |
michael@0 | 1222 | pref("devtools.appmanager.manifestEditor.enabled", true); |
michael@0 | 1223 | |
michael@0 | 1224 | // Toolbox preferences |
michael@0 | 1225 | pref("devtools.toolbox.footer.height", 250); |
michael@0 | 1226 | pref("devtools.toolbox.sidebar.width", 500); |
michael@0 | 1227 | pref("devtools.toolbox.host", "bottom"); |
michael@0 | 1228 | pref("devtools.toolbox.selectedTool", "webconsole"); |
michael@0 | 1229 | pref("devtools.toolbox.toolbarSpec", '["splitconsole", "paintflashing toggle","tilt toggle","scratchpad","resize toggle","eyedropper"]'); |
michael@0 | 1230 | pref("devtools.toolbox.sideEnabled", true); |
michael@0 | 1231 | pref("devtools.toolbox.zoomValue", "1"); |
michael@0 | 1232 | |
michael@0 | 1233 | // Toolbox Button preferences |
michael@0 | 1234 | pref("devtools.command-button-pick.enabled", true); |
michael@0 | 1235 | pref("devtools.command-button-splitconsole.enabled", true); |
michael@0 | 1236 | pref("devtools.command-button-paintflashing.enabled", false); |
michael@0 | 1237 | pref("devtools.command-button-tilt.enabled", false); |
michael@0 | 1238 | pref("devtools.command-button-scratchpad.enabled", false); |
michael@0 | 1239 | pref("devtools.command-button-responsive.enabled", true); |
michael@0 | 1240 | pref("devtools.command-button-eyedropper.enabled", false); |
michael@0 | 1241 | |
michael@0 | 1242 | // Inspector preferences |
michael@0 | 1243 | // Enable the Inspector |
michael@0 | 1244 | pref("devtools.inspector.enabled", true); |
michael@0 | 1245 | // What was the last active sidebar in the inspector |
michael@0 | 1246 | pref("devtools.inspector.activeSidebar", "ruleview"); |
michael@0 | 1247 | // Enable the markup preview |
michael@0 | 1248 | pref("devtools.inspector.markupPreview", false); |
michael@0 | 1249 | pref("devtools.inspector.remote", false); |
michael@0 | 1250 | // Expand pseudo-elements by default in the rule-view |
michael@0 | 1251 | pref("devtools.inspector.show_pseudo_elements", true); |
michael@0 | 1252 | // The default size for image preview tooltips in the rule-view/computed-view/markup-view |
michael@0 | 1253 | pref("devtools.inspector.imagePreviewTooltipSize", 300); |
michael@0 | 1254 | |
michael@0 | 1255 | // DevTools default color unit |
michael@0 | 1256 | pref("devtools.defaultColorUnit", "hex"); |
michael@0 | 1257 | |
michael@0 | 1258 | // Enable the Responsive UI tool |
michael@0 | 1259 | pref("devtools.responsiveUI.no-reload-notification", false); |
michael@0 | 1260 | |
michael@0 | 1261 | // Enable the Debugger |
michael@0 | 1262 | pref("devtools.debugger.enabled", true); |
michael@0 | 1263 | pref("devtools.debugger.chrome-enabled", true); |
michael@0 | 1264 | pref("devtools.debugger.chrome-debugging-host", "localhost"); |
michael@0 | 1265 | pref("devtools.debugger.chrome-debugging-port", 6080); |
michael@0 | 1266 | pref("devtools.debugger.remote-host", "localhost"); |
michael@0 | 1267 | pref("devtools.debugger.remote-timeout", 20000); |
michael@0 | 1268 | pref("devtools.debugger.pause-on-exceptions", false); |
michael@0 | 1269 | pref("devtools.debugger.ignore-caught-exceptions", true); |
michael@0 | 1270 | pref("devtools.debugger.source-maps-enabled", true); |
michael@0 | 1271 | pref("devtools.debugger.pretty-print-enabled", true); |
michael@0 | 1272 | pref("devtools.debugger.auto-pretty-print", false); |
michael@0 | 1273 | pref("devtools.debugger.tracer", false); |
michael@0 | 1274 | |
michael@0 | 1275 | // The default Debugger UI settings |
michael@0 | 1276 | pref("devtools.debugger.ui.panes-sources-width", 200); |
michael@0 | 1277 | pref("devtools.debugger.ui.panes-instruments-width", 300); |
michael@0 | 1278 | pref("devtools.debugger.ui.panes-visible-on-startup", false); |
michael@0 | 1279 | pref("devtools.debugger.ui.variables-sorting-enabled", true); |
michael@0 | 1280 | pref("devtools.debugger.ui.variables-only-enum-visible", false); |
michael@0 | 1281 | pref("devtools.debugger.ui.variables-searchbox-visible", false); |
michael@0 | 1282 | |
michael@0 | 1283 | // Enable the Profiler |
michael@0 | 1284 | pref("devtools.profiler.enabled", true); |
michael@0 | 1285 | |
michael@0 | 1286 | // The default Profiler UI settings |
michael@0 | 1287 | pref("devtools.profiler.ui.show-platform-data", false); |
michael@0 | 1288 | |
michael@0 | 1289 | // Enable the Network Monitor |
michael@0 | 1290 | pref("devtools.netmonitor.enabled", true); |
michael@0 | 1291 | |
michael@0 | 1292 | // The default Network Monitor UI settings |
michael@0 | 1293 | pref("devtools.netmonitor.panes-network-details-width", 550); |
michael@0 | 1294 | pref("devtools.netmonitor.panes-network-details-height", 450); |
michael@0 | 1295 | pref("devtools.netmonitor.statistics", true); |
michael@0 | 1296 | pref("devtools.netmonitor.filters", "[\"all\"]"); |
michael@0 | 1297 | |
michael@0 | 1298 | // Enable the Tilt inspector |
michael@0 | 1299 | pref("devtools.tilt.enabled", true); |
michael@0 | 1300 | pref("devtools.tilt.intro_transition", true); |
michael@0 | 1301 | pref("devtools.tilt.outro_transition", true); |
michael@0 | 1302 | |
michael@0 | 1303 | // Scratchpad settings |
michael@0 | 1304 | // - recentFileMax: The maximum number of recently-opened files |
michael@0 | 1305 | // stored. Setting this preference to 0 will not |
michael@0 | 1306 | // clear any recent files, but rather hide the |
michael@0 | 1307 | // 'Open Recent'-menu. |
michael@0 | 1308 | // - showTrailingSpace: Whether to highlight trailing space or not. |
michael@0 | 1309 | // - enableCodeFolding: Whether to enable code folding or not. |
michael@0 | 1310 | pref("devtools.scratchpad.recentFilesMax", 10); |
michael@0 | 1311 | pref("devtools.scratchpad.showTrailingSpace", false); |
michael@0 | 1312 | pref("devtools.scratchpad.enableCodeFolding", true); |
michael@0 | 1313 | |
michael@0 | 1314 | // Enable the Style Editor. |
michael@0 | 1315 | pref("devtools.styleeditor.enabled", true); |
michael@0 | 1316 | pref("devtools.styleeditor.source-maps-enabled", false); |
michael@0 | 1317 | pref("devtools.styleeditor.autocompletion-enabled", true); |
michael@0 | 1318 | |
michael@0 | 1319 | // Enable the Shader Editor. |
michael@0 | 1320 | pref("devtools.shadereditor.enabled", false); |
michael@0 | 1321 | |
michael@0 | 1322 | // Enable the Canvas Debugger. |
michael@0 | 1323 | pref("devtools.canvasdebugger.enabled", false); |
michael@0 | 1324 | |
michael@0 | 1325 | // Enable the Web Audio Editor |
michael@0 | 1326 | pref("devtools.webaudioeditor.enabled", false); |
michael@0 | 1327 | |
michael@0 | 1328 | // Default theme ("dark" or "light") |
michael@0 | 1329 | pref("devtools.theme", "light"); |
michael@0 | 1330 | |
michael@0 | 1331 | // Display the introductory text |
michael@0 | 1332 | pref("devtools.gcli.hideIntro", false); |
michael@0 | 1333 | |
michael@0 | 1334 | // How eager are we to show help: never=1, sometimes=2, always=3 |
michael@0 | 1335 | pref("devtools.gcli.eagerHelper", 2); |
michael@0 | 1336 | |
michael@0 | 1337 | // Remember the Web Console filters |
michael@0 | 1338 | pref("devtools.webconsole.filter.network", true); |
michael@0 | 1339 | pref("devtools.webconsole.filter.networkinfo", false); |
michael@0 | 1340 | pref("devtools.webconsole.filter.netwarn", true); |
michael@0 | 1341 | pref("devtools.webconsole.filter.csserror", true); |
michael@0 | 1342 | pref("devtools.webconsole.filter.cssparser", false); |
michael@0 | 1343 | pref("devtools.webconsole.filter.csslog", false); |
michael@0 | 1344 | pref("devtools.webconsole.filter.exception", true); |
michael@0 | 1345 | pref("devtools.webconsole.filter.jswarn", true); |
michael@0 | 1346 | pref("devtools.webconsole.filter.jslog", false); |
michael@0 | 1347 | pref("devtools.webconsole.filter.error", true); |
michael@0 | 1348 | pref("devtools.webconsole.filter.warn", true); |
michael@0 | 1349 | pref("devtools.webconsole.filter.info", true); |
michael@0 | 1350 | pref("devtools.webconsole.filter.log", true); |
michael@0 | 1351 | pref("devtools.webconsole.filter.secerror", true); |
michael@0 | 1352 | pref("devtools.webconsole.filter.secwarn", true); |
michael@0 | 1353 | |
michael@0 | 1354 | // Remember the Browser Console filters |
michael@0 | 1355 | pref("devtools.browserconsole.filter.network", true); |
michael@0 | 1356 | pref("devtools.browserconsole.filter.networkinfo", false); |
michael@0 | 1357 | pref("devtools.browserconsole.filter.netwarn", true); |
michael@0 | 1358 | pref("devtools.browserconsole.filter.csserror", true); |
michael@0 | 1359 | pref("devtools.browserconsole.filter.cssparser", false); |
michael@0 | 1360 | pref("devtools.browserconsole.filter.csslog", false); |
michael@0 | 1361 | pref("devtools.browserconsole.filter.exception", true); |
michael@0 | 1362 | pref("devtools.browserconsole.filter.jswarn", true); |
michael@0 | 1363 | pref("devtools.browserconsole.filter.jslog", true); |
michael@0 | 1364 | pref("devtools.browserconsole.filter.error", true); |
michael@0 | 1365 | pref("devtools.browserconsole.filter.warn", true); |
michael@0 | 1366 | pref("devtools.browserconsole.filter.info", true); |
michael@0 | 1367 | pref("devtools.browserconsole.filter.log", true); |
michael@0 | 1368 | pref("devtools.browserconsole.filter.secerror", true); |
michael@0 | 1369 | pref("devtools.browserconsole.filter.secwarn", true); |
michael@0 | 1370 | |
michael@0 | 1371 | // Text size in the Web Console. Use 0 for the system default size. |
michael@0 | 1372 | pref("devtools.webconsole.fontSize", 0); |
michael@0 | 1373 | |
michael@0 | 1374 | // Persistent logging: |true| if you want the Web Console to keep all of the |
michael@0 | 1375 | // logged messages after reloading the page, |false| if you want the output to |
michael@0 | 1376 | // be cleared each time page navigation happens. |
michael@0 | 1377 | pref("devtools.webconsole.persistlog", false); |
michael@0 | 1378 | |
michael@0 | 1379 | // Web Console timestamp: |true| if you want the logs and instructions |
michael@0 | 1380 | // in the Web Console to display a timestamp, or |false| to not display |
michael@0 | 1381 | // any timestamps. |
michael@0 | 1382 | pref("devtools.webconsole.timestampMessages", false); |
michael@0 | 1383 | |
michael@0 | 1384 | // The number of lines that are displayed in the web console for the Net, |
michael@0 | 1385 | // CSS, JS and Web Developer categories. |
michael@0 | 1386 | pref("devtools.hud.loglimit.network", 200); |
michael@0 | 1387 | pref("devtools.hud.loglimit.cssparser", 200); |
michael@0 | 1388 | pref("devtools.hud.loglimit.exception", 200); |
michael@0 | 1389 | pref("devtools.hud.loglimit.console", 200); |
michael@0 | 1390 | |
michael@0 | 1391 | // By how many times eyedropper will magnify pixels |
michael@0 | 1392 | pref("devtools.eyedropper.zoom", 6); |
michael@0 | 1393 | |
michael@0 | 1394 | // The developer tools editor configuration: |
michael@0 | 1395 | // - tabsize: how many spaces to use when a Tab character is displayed. |
michael@0 | 1396 | // - expandtab: expand Tab characters to spaces. |
michael@0 | 1397 | // - keymap: which keymap to use (can be 'default', 'emacs' or 'vim') |
michael@0 | 1398 | // - autoclosebrackets: whether to permit automatic bracket/quote closing. |
michael@0 | 1399 | // - detectindentation: whether to detect the indentation from the file |
michael@0 | 1400 | pref("devtools.editor.tabsize", 2); |
michael@0 | 1401 | pref("devtools.editor.expandtab", true); |
michael@0 | 1402 | pref("devtools.editor.keymap", "default"); |
michael@0 | 1403 | pref("devtools.editor.autoclosebrackets", true); |
michael@0 | 1404 | pref("devtools.editor.detectindentation", true); |
michael@0 | 1405 | |
michael@0 | 1406 | // Enable the Font Inspector |
michael@0 | 1407 | pref("devtools.fontinspector.enabled", true); |
michael@0 | 1408 | |
michael@0 | 1409 | // Pref to store the browser version at the time of a telemetry ping for an |
michael@0 | 1410 | // opened developer tool. This allows us to ping telemetry just once per browser |
michael@0 | 1411 | // version for each user. |
michael@0 | 1412 | pref("devtools.telemetry.tools.opened.version", "{}"); |
michael@0 | 1413 | |
michael@0 | 1414 | // Whether the character encoding menu is under the main Firefox button. This |
michael@0 | 1415 | // preference is a string so that localizers can alter it. |
michael@0 | 1416 | pref("browser.menu.showCharacterEncoding", "chrome://browser/locale/browser.properties"); |
michael@0 | 1417 | |
michael@0 | 1418 | // Allow using tab-modal prompts when possible. |
michael@0 | 1419 | pref("prompts.tab_modal.enabled", true); |
michael@0 | 1420 | // Whether the Panorama should animate going in/out of tabs |
michael@0 | 1421 | pref("browser.panorama.animate_zoom", true); |
michael@0 | 1422 | |
michael@0 | 1423 | // Defines the url to be used for new tabs. |
michael@0 | 1424 | pref("browser.newtab.url", "about:newtab"); |
michael@0 | 1425 | // Activates preloading of the new tab url. |
michael@0 | 1426 | pref("browser.newtab.preload", true); |
michael@0 | 1427 | |
michael@0 | 1428 | // Toggles the content of 'about:newtab'. Shows the grid when enabled. |
michael@0 | 1429 | pref("browser.newtabpage.enabled", true); |
michael@0 | 1430 | |
michael@0 | 1431 | // number of rows of newtab grid |
michael@0 | 1432 | pref("browser.newtabpage.rows", 3); |
michael@0 | 1433 | |
michael@0 | 1434 | // number of columns of newtab grid |
michael@0 | 1435 | pref("browser.newtabpage.columns", 3); |
michael@0 | 1436 | |
michael@0 | 1437 | pref("browser.newtabpage.directorySource", "data:application/json,{}"); |
michael@0 | 1438 | |
michael@0 | 1439 | // Enable the DOM fullscreen API. |
michael@0 | 1440 | pref("full-screen-api.enabled", true); |
michael@0 | 1441 | |
michael@0 | 1442 | // True if the fullscreen API requires approval upon a domain entering fullscreen. |
michael@0 | 1443 | // Domains that have already had fullscreen permission granted won't re-request |
michael@0 | 1444 | // approval. |
michael@0 | 1445 | pref("full-screen-api.approval-required", true); |
michael@0 | 1446 | |
michael@0 | 1447 | // Startup Crash Tracking |
michael@0 | 1448 | // number of startup crashes that can occur before starting into safe mode automatically |
michael@0 | 1449 | // (this pref has no effect if more than 6 hours have passed since the last crash) |
michael@0 | 1450 | pref("toolkit.startup.max_resumed_crashes", 3); |
michael@0 | 1451 | |
michael@0 | 1452 | // Completely disable pdf.js as an option to preview pdfs within firefox. |
michael@0 | 1453 | // Note: if this is not disabled it does not necessarily mean pdf.js is the pdf |
michael@0 | 1454 | // handler just that it is an option. |
michael@0 | 1455 | pref("pdfjs.disabled", false); |
michael@0 | 1456 | // Used by pdf.js to know the first time firefox is run with it installed so it |
michael@0 | 1457 | // can become the default pdf viewer. |
michael@0 | 1458 | pref("pdfjs.firstRun", true); |
michael@0 | 1459 | // The values of preferredAction and alwaysAskBeforeHandling before pdf.js |
michael@0 | 1460 | // became the default. |
michael@0 | 1461 | pref("pdfjs.previousHandler.preferredAction", 0); |
michael@0 | 1462 | pref("pdfjs.previousHandler.alwaysAskBeforeHandling", false); |
michael@0 | 1463 | |
michael@0 | 1464 | #ifdef NIGHTLY_BUILD |
michael@0 | 1465 | // Shumway component (SWF player) is disabled by default. Also see bug 904346. |
michael@0 | 1466 | pref("shumway.disabled", true); |
michael@0 | 1467 | #endif |
michael@0 | 1468 | |
michael@0 | 1469 | // The maximum amount of decoded image data we'll willingly keep around (we |
michael@0 | 1470 | // might keep around more than this, but we'll try to get down to this value). |
michael@0 | 1471 | // (This is intentionally on the high side; see bug 746055.) |
michael@0 | 1472 | pref("image.mem.max_decoded_image_kb", 256000); |
michael@0 | 1473 | |
michael@0 | 1474 | // Default social providers |
michael@0 | 1475 | pref("social.manifest.facebook", "{\"origin\":\"https://www.facebook.com\",\"name\":\"Facebook Share\",\"shareURL\":\"https://www.facebook.com/sharer/sharer.php?u=%{url}\",\"iconURL\":\"data:image/x-icon;base64,iVBORw0KGgoAAAANSUhEUgAAABAAAAAQCAYAAAAf8%2F9hAAAAX0lEQVQ4jWP4%2F%2F8%2FAyUYTFhHzjgDxP9JxGeQDSBVMxgTbUBCxer%2Fr999%2BQ8DJBuArJksA9A10s8AXIBoA0B%2BR%2FY%2FjD%2BEwoBoA1yT5v3PbdmCE8MAshhID%2FUMoDgzUYIBj0Cgi7ar4coAAAAASUVORK5CYII%3D\",\"icon32URL\":\"data:image/png;base64,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\", \"icon64URL\":\"data:image/png;base64,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\", \"description\":\"Easily share the web to your Facebook friends.\",\"author\":\"Facebook\",\"homepageURL\":\"https://www.facebook.com\",\"builtin\":\"true\",\"version\":1}"); |
michael@0 | 1476 | |
michael@0 | 1477 | pref("social.sidebar.unload_timeout_ms", 10000); |
michael@0 | 1478 | |
michael@0 | 1479 | pref("dom.identity.enabled", false); |
michael@0 | 1480 | |
michael@0 | 1481 | // Turn on the CSP 1.0 parser for Content Security Policy headers |
michael@0 | 1482 | pref("security.csp.speccompliant", true); |
michael@0 | 1483 | |
michael@0 | 1484 | // Block insecure active content on https pages |
michael@0 | 1485 | pref("security.mixed_content.block_active_content", true); |
michael@0 | 1486 | |
michael@0 | 1487 | // 1 = allow MITM for certificate pinning checks. |
michael@0 | 1488 | pref("security.cert_pinning.enforcement_level", 1); |
michael@0 | 1489 | |
michael@0 | 1490 | // Override the Gecko-default value of false for Firefox. |
michael@0 | 1491 | pref("plain_text.wrap_long_lines", true); |
michael@0 | 1492 | |
michael@0 | 1493 | // If this turns true, Moz*Gesture events are not called stopPropagation() |
michael@0 | 1494 | // before content. |
michael@0 | 1495 | pref("dom.debug.propagate_gesture_events_through_content", false); |
michael@0 | 1496 | |
michael@0 | 1497 | // The request URL of the GeoLocation backend. |
michael@0 | 1498 | pref("geo.wifi.uri", "https://www.googleapis.com/geolocation/v1/geolocate?key=%GOOGLE_API_KEY%"); |
michael@0 | 1499 | #ifdef RELEASE_BUILD |
michael@0 | 1500 | pref("geo.wifi.logging.enabled", false); |
michael@0 | 1501 | #else |
michael@0 | 1502 | pref("geo.wifi.logging.enabled", true); |
michael@0 | 1503 | #endif |
michael@0 | 1504 | |
michael@0 | 1505 | // Necko IPC security checks only needed for app isolation for cookies/cache/etc: |
michael@0 | 1506 | // currently irrelevant for desktop e10s |
michael@0 | 1507 | pref("network.disable.ipc.security", true); |
michael@0 | 1508 | |
michael@0 | 1509 | // CustomizableUI debug logging. |
michael@0 | 1510 | pref("browser.uiCustomization.debug", false); |
michael@0 | 1511 | |
michael@0 | 1512 | // CustomizableUI state of the browser's user interface |
michael@0 | 1513 | pref("browser.uiCustomization.state", ""); |
michael@0 | 1514 | |
michael@0 | 1515 | // The remote content URL shown for FxA signup. Must use HTTPS. |
michael@0 | 1516 | pref("identity.fxaccounts.remote.signup.uri", "https://accounts.firefox.com/signup?service=sync&context=fx_desktop_v1"); |
michael@0 | 1517 | |
michael@0 | 1518 | // The URL where remote content that forces re-authentication for Firefox Accounts |
michael@0 | 1519 | // should be fetched. Must use HTTPS. |
michael@0 | 1520 | pref("identity.fxaccounts.remote.force_auth.uri", "https://accounts.firefox.com/force_auth?service=sync&context=fx_desktop_v1"); |
michael@0 | 1521 | |
michael@0 | 1522 | // The remote content URL shown for signin in. Must use HTTPS. |
michael@0 | 1523 | pref("identity.fxaccounts.remote.signin.uri", "https://accounts.firefox.com/signin?service=sync&context=fx_desktop_v1"); |
michael@0 | 1524 | |
michael@0 | 1525 | // The URL we take the user to when they opt to "manage" their Firefox Account. |
michael@0 | 1526 | // Note that this will always need to be in the same TLD as the |
michael@0 | 1527 | // "identity.fxaccounts.remote.signup.uri" pref. |
michael@0 | 1528 | pref("identity.fxaccounts.settings.uri", "https://accounts.firefox.com/settings"); |
michael@0 | 1529 | |
michael@0 | 1530 | // On GTK, we now default to showing the menubar only when alt is pressed: |
michael@0 | 1531 | #ifdef MOZ_WIDGET_GTK |
michael@0 | 1532 | pref("ui.key.menuAccessKeyFocuses", true); |
michael@0 | 1533 | #endif |
michael@0 | 1534 | |
michael@0 | 1535 | |
michael@0 | 1536 | // Delete HTTP cache v2 data of users that didn't opt-in manually |
michael@0 | 1537 | pref("browser.cache.auto_delete_cache_version", 1); |
michael@0 | 1538 | // Play with different values of the decay time and get telemetry, |
michael@0 | 1539 | // 0 means to randomize (and persist) the experiment value in users' profiles, |
michael@0 | 1540 | // -1 means no experiment is run and we use the preferred value for frecency (6h) |
michael@0 | 1541 | pref("browser.cache.frecency_experiment", 0); |
michael@0 | 1542 | |
michael@0 | 1543 | pref("browser.translation.detectLanguage", false); |
michael@0 | 1544 | |
michael@0 | 1545 | // Telemetry experiments settings. |
michael@0 | 1546 | pref("experiments.enabled", true); |
michael@0 | 1547 | pref("experiments.manifest.fetchIntervalSeconds", 86400); |
michael@0 | 1548 | pref("experiments.manifest.uri", "https://telemetry-experiment.cdn.mozilla.net/manifest/v1/firefox/%VERSION%/%CHANNEL%"); |
michael@0 | 1549 | pref("experiments.manifest.certs.1.commonName", "*.cdn.mozilla.net"); |
michael@0 | 1550 | pref("experiments.manifest.certs.1.issuerName", "CN=Cybertrust Public SureServer SV CA,O=Cybertrust Inc"); |
michael@0 | 1551 | // Whether experiments are supported by the current application profile. |
michael@0 | 1552 | pref("experiments.supported", true); |