|
1 # -*- Mode: JavaScript; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 2 -*- |
|
2 # This Source Code Form is subject to the terms of the Mozilla Public |
|
3 # License, v. 2.0. If a copy of the MPL was not distributed with this |
|
4 # file, You can obtain one at http://mozilla.org/MPL/2.0/. |
|
5 |
|
6 // XXX Toolkit-specific preferences should be moved into toolkit.js |
|
7 |
|
8 #filter substitution |
|
9 |
|
10 # |
|
11 # SYNTAX HINTS: |
|
12 # |
|
13 # - Dashes are delimiters; use underscores instead. |
|
14 # - The first character after a period must be alphabetic. |
|
15 # - Computed values (e.g. 50 * 1024) don't work. |
|
16 # |
|
17 |
|
18 #ifdef XP_UNIX |
|
19 #ifndef XP_MACOSX |
|
20 #define UNIX_BUT_NOT_MAC |
|
21 #endif |
|
22 #endif |
|
23 |
|
24 pref("browser.chromeURL","chrome://browser/content/"); |
|
25 pref("browser.hiddenWindowChromeURL", "chrome://browser/content/hiddenWindow.xul"); |
|
26 |
|
27 // Enables some extra Extension System Logging (can reduce performance) |
|
28 pref("extensions.logging.enabled", false); |
|
29 |
|
30 // Disables strict compatibility, making addons compatible-by-default. |
|
31 pref("extensions.strictCompatibility", false); |
|
32 |
|
33 // Specifies a minimum maxVersion an addon needs to say it's compatible with |
|
34 // for it to be compatible by default. |
|
35 pref("extensions.minCompatibleAppVersion", "4.0"); |
|
36 // Temporary preference to forcibly make themes more safe with Australis even if |
|
37 // extensions.checkCompatibility=false has been set. |
|
38 pref("extensions.checkCompatibility.temporaryThemeOverride_minAppVersion", "29.0a1"); |
|
39 |
|
40 // Preferences for AMO integration |
|
41 pref("extensions.getAddons.cache.enabled", true); |
|
42 pref("extensions.getAddons.maxResults", 15); |
|
43 pref("extensions.getAddons.get.url", "https://services.addons.mozilla.org/%LOCALE%/firefox/api/%API_VERSION%/search/guid:%IDS%?src=firefox&appOS=%OS%&appVersion=%VERSION%"); |
|
44 pref("extensions.getAddons.getWithPerformance.url", "https://services.addons.mozilla.org/%LOCALE%/firefox/api/%API_VERSION%/search/guid:%IDS%?src=firefox&appOS=%OS%&appVersion=%VERSION%&tMain=%TIME_MAIN%&tFirstPaint=%TIME_FIRST_PAINT%&tSessionRestored=%TIME_SESSION_RESTORED%"); |
|
45 pref("extensions.getAddons.search.browseURL", "https://addons.mozilla.org/%LOCALE%/firefox/search?q=%TERMS%&platform=%OS%&appver=%VERSION%"); |
|
46 pref("extensions.getAddons.search.url", "https://services.addons.mozilla.org/%LOCALE%/firefox/api/%API_VERSION%/search/%TERMS%/all/%MAX_RESULTS%/%OS%/%VERSION%/%COMPATIBILITY_MODE%?src=firefox"); |
|
47 pref("extensions.webservice.discoverURL", "https://services.addons.mozilla.org/%LOCALE%/firefox/discovery/pane/%VERSION%/%OS%/%COMPATIBILITY_MODE%"); |
|
48 pref("extensions.getAddons.recommended.url", "https://services.addons.mozilla.org/%LOCALE%/%APP%/api/%API_VERSION%/list/recommended/all/%MAX_RESULTS%/%OS%/%VERSION%?src=firefox"); |
|
49 |
|
50 // Blocklist preferences |
|
51 pref("extensions.blocklist.enabled", true); |
|
52 pref("extensions.blocklist.interval", 86400); |
|
53 // Controls what level the blocklist switches from warning about items to forcibly |
|
54 // blocking them. |
|
55 pref("extensions.blocklist.level", 2); |
|
56 pref("extensions.blocklist.url", "https://addons.mozilla.org/blocklist/3/%APP_ID%/%APP_VERSION%/%PRODUCT%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL%/%OS_VERSION%/%DISTRIBUTION%/%DISTRIBUTION_VERSION%/%PING_COUNT%/%TOTAL_PING_COUNT%/%DAYS_SINCE_LAST_PING%/"); |
|
57 pref("extensions.blocklist.detailsURL", "https://www.mozilla.org/%LOCALE%/blocklist/"); |
|
58 pref("extensions.blocklist.itemURL", "https://addons.mozilla.org/%LOCALE%/%APP%/blocked/%blockID%"); |
|
59 |
|
60 pref("extensions.update.autoUpdateDefault", true); |
|
61 |
|
62 pref("extensions.hotfix.id", "firefox-hotfix@mozilla.org"); |
|
63 pref("extensions.hotfix.cert.checkAttributes", true); |
|
64 pref("extensions.hotfix.certs.1.sha1Fingerprint", "91:53:98:0C:C1:86:DF:47:8F:35:22:9E:11:C9:A7:31:04:49:A1:AA"); |
|
65 |
|
66 // Disable add-ons that are not installed by the user in all scopes by default. |
|
67 // See the SCOPE constants in AddonManager.jsm for values to use here. |
|
68 pref("extensions.autoDisableScopes", 15); |
|
69 |
|
70 // Dictionary download preference |
|
71 pref("browser.dictionaries.download.url", "https://addons.mozilla.org/%LOCALE%/firefox/dictionaries/"); |
|
72 |
|
73 // At startup, should we check to see if the installation |
|
74 // date is older than some threshold |
|
75 pref("app.update.checkInstallTime", true); |
|
76 |
|
77 // The number of days a binary is permitted to be old without checking is defined in |
|
78 // firefox-branding.js (app.update.checkInstallTime.days) |
|
79 |
|
80 // The minimum delay in seconds for the timer to fire. |
|
81 // default=2 minutes |
|
82 pref("app.update.timerMinimumDelay", 120); |
|
83 |
|
84 // App-specific update preferences |
|
85 |
|
86 // The interval to check for updates (app.update.interval) is defined in |
|
87 // firefox-branding.js |
|
88 |
|
89 // Alternative windowtype for an application update user interface window. When |
|
90 // a window with this windowtype is open the application update service won't |
|
91 // open the normal application update user interface window. |
|
92 pref("app.update.altwindowtype", "Browser:About"); |
|
93 |
|
94 // Enables some extra Application Update Logging (can reduce performance) |
|
95 pref("app.update.log", false); |
|
96 |
|
97 // The number of general background check failures to allow before notifying the |
|
98 // user of the failure. User initiated update checks always notify the user of |
|
99 // the failure. |
|
100 pref("app.update.backgroundMaxErrors", 10); |
|
101 |
|
102 // When |app.update.cert.requireBuiltIn| is true or not specified the |
|
103 // final certificate and all certificates the connection is redirected to before |
|
104 // the final certificate for the url specified in the |app.update.url| |
|
105 // preference must be built-in. |
|
106 pref("app.update.cert.requireBuiltIn", true); |
|
107 |
|
108 // When |app.update.cert.checkAttributes| is true or not specified the |
|
109 // certificate attributes specified in the |app.update.certs.| preference branch |
|
110 // are checked against the certificate for the url specified by the |
|
111 // |app.update.url| preference. |
|
112 pref("app.update.cert.checkAttributes", true); |
|
113 |
|
114 // The number of certificate attribute check failures to allow for background |
|
115 // update checks before notifying the user of the failure. User initiated update |
|
116 // checks always notify the user of the certificate attribute check failure. |
|
117 pref("app.update.cert.maxErrors", 5); |
|
118 |
|
119 // The |app.update.certs.| preference branch contains branches that are |
|
120 // sequentially numbered starting at 1 that contain attribute name / value |
|
121 // pairs for the certificate used by the server that hosts the update xml file |
|
122 // as specified in the |app.update.url| preference. When these preferences are |
|
123 // present the following conditions apply for a successful update check: |
|
124 // 1. the uri scheme must be https |
|
125 // 2. the preference name must exist as an attribute name on the certificate and |
|
126 // the value for the name must be the same as the value for the attribute name |
|
127 // on the certificate. |
|
128 // If these conditions aren't met it will be treated the same as when there is |
|
129 // no update available. This validation will not be performed when the |
|
130 // |app.update.url.override| user preference has been set for testing updates or |
|
131 // when the |app.update.cert.checkAttributes| preference is set to false. Also, |
|
132 // the |app.update.url.override| preference should ONLY be used for testing. |
|
133 // IMPORTANT! metro.js should also be updated for updates to certs.X.issuerName |
|
134 |
|
135 pref("app.update.certs.1.issuerName", "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digicert.com,O=DigiCert Inc,C=US"); |
|
136 pref("app.update.certs.1.commonName", "*.torproject.org"); |
|
137 |
|
138 // Whether or not app updates are enabled |
|
139 pref("app.update.enabled", true); |
|
140 |
|
141 // This preference turns on app.update.mode and allows automatic download and |
|
142 // install to take place. We use a separate boolean toggle for this to make |
|
143 // the UI easier to construct. |
|
144 pref("app.update.auto", true); |
|
145 |
|
146 // See chart in nsUpdateService.js source for more details |
|
147 // incompatibilities are ignored by updates in Metro |
|
148 pref("app.update.mode", 1); |
|
149 |
|
150 #ifdef XP_WIN |
|
151 #ifdef MOZ_METRO |
|
152 // Enables update checking in the Metro environment. |
|
153 // add-on incompatibilities are ignored by updates in Metro. |
|
154 pref("app.update.metro.enabled", true); |
|
155 #endif |
|
156 #endif |
|
157 |
|
158 // If set to true, the Update Service will present no UI for any event. |
|
159 pref("app.update.silent", false); |
|
160 |
|
161 // If set to true, the Update Service will apply updates in the background |
|
162 // when it finishes downloading them. |
|
163 pref("app.update.staging.enabled", true); |
|
164 |
|
165 // Update service URL: |
|
166 pref("app.update.url", "https://www.torproject.org/dist/torbrowser/update_2/%CHANNEL%/%BUILD_TARGET%/%VERSION%/%LOCALE%"); |
|
167 // app.update.url.manual is in branding section |
|
168 // app.update.url.details is in branding section |
|
169 |
|
170 // User-settable override to app.update.url for testing purposes. |
|
171 //pref("app.update.url.override", ""); |
|
172 |
|
173 // app.update.interval is in branding section |
|
174 // app.update.promptWaitTime is in branding section |
|
175 |
|
176 // Show the Update Checking/Ready UI when the user was idle for x seconds |
|
177 pref("app.update.idletime", 60); |
|
178 |
|
179 // Whether or not we show a dialog box informing the user that the update was |
|
180 // successfully applied. This is off in Firefox by default since we show a |
|
181 // upgrade start page instead! Other apps may wish to show this UI, and supply |
|
182 // a whatsNewURL field in their brand.properties that contains a link to a page |
|
183 // which tells users what's new in this new update. |
|
184 pref("app.update.showInstalledUI", true); |
|
185 |
|
186 // 0 = suppress prompting for incompatibilities if there are updates available |
|
187 // to newer versions of installed addons that resolve them. |
|
188 // 1 = suppress prompting for incompatibilities only if there are VersionInfo |
|
189 // updates available to installed addons that resolve them, not newer |
|
190 // versions. |
|
191 pref("app.update.incompatible.mode", 0); |
|
192 |
|
193 // Whether or not to attempt using the service for updates. |
|
194 #ifdef MOZ_MAINTENANCE_SERVICE |
|
195 pref("app.update.service.enabled", true); |
|
196 #endif |
|
197 |
|
198 // Symmetric (can be overridden by individual extensions) update preferences. |
|
199 // e.g. |
|
200 // extensions.{GUID}.update.enabled |
|
201 // extensions.{GUID}.update.url |
|
202 // .. etc .. |
|
203 // |
|
204 pref("extensions.update.enabled", true); |
|
205 pref("extensions.update.url", "https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID%&version=%ITEM_VERSION%&maxAppVersion=%ITEM_MAXAPPVERSION%&status=%ITEM_STATUS%&appID=%APP_ID%&appVersion=%APP_VERSION%&appOS=%APP_OS%&appABI=%APP_ABI%&locale=%APP_LOCALE%¤tAppVersion=%CURRENT_APP_VERSION%&updateType=%UPDATE_TYPE%&compatMode=%COMPATIBILITY_MODE%"); |
|
206 pref("extensions.update.background.url", "https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID%&version=%ITEM_VERSION%&maxAppVersion=%ITEM_MAXAPPVERSION%&status=%ITEM_STATUS%&appID=%APP_ID%&appVersion=%APP_VERSION%&appOS=%APP_OS%&appABI=%APP_ABI%&locale=%APP_LOCALE%¤tAppVersion=%CURRENT_APP_VERSION%&updateType=%UPDATE_TYPE%&compatMode=%COMPATIBILITY_MODE%"); |
|
207 pref("extensions.update.interval", 86400); // Check for updates to Extensions and |
|
208 // Themes every day |
|
209 // Non-symmetric (not shared by extensions) extension-specific [update] preferences |
|
210 pref("extensions.dss.enabled", false); // Dynamic Skin Switching |
|
211 pref("extensions.dss.switchPending", false); // Non-dynamic switch pending after next |
|
212 // restart. |
|
213 |
|
214 pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.name", "chrome://browser/locale/browser.properties"); |
|
215 pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.description", "chrome://browser/locale/browser.properties"); |
|
216 |
|
217 pref("xpinstall.whitelist.add", "addons.mozilla.org"); |
|
218 pref("xpinstall.whitelist.add.180", "marketplace.firefox.com"); |
|
219 |
|
220 pref("lightweightThemes.update.enabled", true); |
|
221 |
|
222 // UI tour experience. |
|
223 pref("browser.uitour.enabled", true); |
|
224 pref("browser.uitour.requireSecure", true); |
|
225 pref("browser.uitour.themeOrigin", "https://addons.mozilla.org/%LOCALE%/firefox/themes/"); |
|
226 pref("browser.uitour.pinnedTabUrl", "https://support.mozilla.org/%LOCALE%/kb/pinned-tabs-keep-favorite-websites-open"); |
|
227 pref("browser.uitour.url", "https://www.mozilla.org/%LOCALE%/firefox/%VERSION%/tour/"); |
|
228 pref("browser.uitour.whitelist.add.260", "www.mozilla.org,support.mozilla.org"); |
|
229 |
|
230 pref("browser.customizemode.tip0.shown", false); |
|
231 pref("browser.customizemode.tip0.learnMoreUrl", "https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/customize"); |
|
232 |
|
233 pref("keyword.enabled", true); |
|
234 |
|
235 pref("general.useragent.locale", "@AB_CD@"); |
|
236 pref("general.skins.selectedSkin", "classic/1.0"); |
|
237 |
|
238 pref("general.smoothScroll", true); |
|
239 #ifdef UNIX_BUT_NOT_MAC |
|
240 pref("general.autoScroll", false); |
|
241 #else |
|
242 pref("general.autoScroll", true); |
|
243 #endif |
|
244 |
|
245 // At startup, check if we're the default browser and prompt user if not. |
|
246 pref("browser.shell.checkDefaultBrowser", true); |
|
247 pref("browser.shell.shortcutFavicons",true); |
|
248 |
|
249 // 0 = blank, 1 = home (browser.startup.homepage), 2 = last visited page, 3 = resume previous browser session |
|
250 // The behavior of option 3 is detailed at: http://wiki.mozilla.org/Session_Restore |
|
251 pref("browser.startup.page", 1); |
|
252 pref("browser.startup.homepage", "chrome://branding/locale/browserconfig.properties"); |
|
253 |
|
254 pref("browser.slowStartup.notificationDisabled", false); |
|
255 pref("browser.slowStartup.timeThreshold", 50000); |
|
256 pref("browser.slowStartup.maxSamples", 5); |
|
257 |
|
258 // This url, if changed, MUST continue to point to an https url. Pulling arbitrary content to inject into |
|
259 // this page over http opens us up to a man-in-the-middle attack that we'd rather not face. If you are a downstream |
|
260 // repackager of this code using an alternate snippet url, please keep your users safe |
|
261 pref("browser.aboutHomeSnippets.updateUrl", "https://snippets.mozilla.com/%STARTPAGE_VERSION%/%NAME%/%VERSION%/%APPBUILDID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL%/%OS_VERSION%/%DISTRIBUTION%/%DISTRIBUTION_VERSION%/"); |
|
262 |
|
263 pref("browser.enable_automatic_image_resizing", true); |
|
264 pref("browser.chrome.site_icons", true); |
|
265 pref("browser.chrome.favicons", true); |
|
266 // browser.warnOnQuit == false will override all other possible prompts when quitting or restarting |
|
267 pref("browser.warnOnQuit", true); |
|
268 // browser.showQuitWarning specifically controls the quit warning dialog. We |
|
269 // might still show the window closing dialog with showQuitWarning == false. |
|
270 pref("browser.showQuitWarning", false); |
|
271 pref("browser.fullscreen.autohide", true); |
|
272 pref("browser.fullscreen.animateUp", 1); |
|
273 pref("browser.overlink-delay", 80); |
|
274 |
|
275 #ifdef UNIX_BUT_NOT_MAC |
|
276 pref("browser.urlbar.clickSelectsAll", false); |
|
277 #else |
|
278 pref("browser.urlbar.clickSelectsAll", true); |
|
279 #endif |
|
280 #ifdef UNIX_BUT_NOT_MAC |
|
281 pref("browser.urlbar.doubleClickSelectsAll", true); |
|
282 #else |
|
283 pref("browser.urlbar.doubleClickSelectsAll", false); |
|
284 #endif |
|
285 pref("browser.urlbar.autoFill", true); |
|
286 pref("browser.urlbar.autoFill.typed", true); |
|
287 // 0: Match anywhere (e.g., middle of words) |
|
288 // 1: Match on word boundaries and then try matching anywhere |
|
289 // 2: Match only on word boundaries (e.g., after / or .) |
|
290 // 3: Match at the beginning of the url or title |
|
291 pref("browser.urlbar.matchBehavior", 1); |
|
292 pref("browser.urlbar.filter.javascript", true); |
|
293 |
|
294 // the maximum number of results to show in autocomplete when doing richResults |
|
295 pref("browser.urlbar.maxRichResults", 12); |
|
296 // The amount of time (ms) to wait after the user has stopped typing |
|
297 // before starting to perform autocomplete. 50 is the default set in |
|
298 // autocomplete.xml. |
|
299 pref("browser.urlbar.delay", 50); |
|
300 |
|
301 // The special characters below can be typed into the urlbar to either restrict |
|
302 // the search to visited history, bookmarked, tagged pages; or force a match on |
|
303 // just the title text or url. |
|
304 pref("browser.urlbar.restrict.history", "^"); |
|
305 pref("browser.urlbar.restrict.bookmark", "*"); |
|
306 pref("browser.urlbar.restrict.tag", "+"); |
|
307 pref("browser.urlbar.restrict.openpage", "%"); |
|
308 pref("browser.urlbar.restrict.typed", "~"); |
|
309 pref("browser.urlbar.match.title", "#"); |
|
310 pref("browser.urlbar.match.url", "@"); |
|
311 |
|
312 // The default behavior for the urlbar can be configured to use any combination |
|
313 // of the restrict or match filters with each additional filter restricting |
|
314 // more (intersection). Add the following values to set the behavior as the |
|
315 // default: 1: history, 2: bookmark, 4: tag, 8: title, 16: url, 32: typed, |
|
316 // 64: javascript, 128: tabs |
|
317 // E.g., 0 = show all results (no filtering), 1 = only visited pages in history, |
|
318 // 2 = only bookmarks, 3 = visited bookmarks, 1+16 = history matching in the url |
|
319 pref("browser.urlbar.default.behavior", 0); |
|
320 |
|
321 pref("browser.urlbar.formatting.enabled", true); |
|
322 pref("browser.urlbar.trimURLs", true); |
|
323 |
|
324 pref("browser.altClickSave", false); |
|
325 |
|
326 // Enable logging downloads operations to the Error Console. |
|
327 pref("browser.download.debug", false); |
|
328 |
|
329 // Number of milliseconds to wait for the http headers (and thus |
|
330 // the Content-Disposition filename) before giving up and falling back to |
|
331 // picking a filename without that info in hand so that the user sees some |
|
332 // feedback from their action. |
|
333 pref("browser.download.saveLinkAsFilenameTimeout", 4000); |
|
334 |
|
335 pref("browser.download.useDownloadDir", true); |
|
336 pref("browser.download.folderList", 1); |
|
337 pref("browser.download.manager.addToRecentDocs", true); |
|
338 pref("browser.download.manager.resumeOnWakeDelay", 10000); |
|
339 |
|
340 // This allows disabling the animated notifications shown by |
|
341 // the Downloads Indicator when a download starts or completes. |
|
342 pref("browser.download.animateNotifications", true); |
|
343 |
|
344 // This records whether or not the panel has been shown at least once. |
|
345 pref("browser.download.panel.shown", false); |
|
346 |
|
347 #ifndef XP_MACOSX |
|
348 pref("browser.helperApps.deleteTempFileOnExit", true); |
|
349 #endif |
|
350 |
|
351 // search engines URL |
|
352 pref("browser.search.searchEnginesURL", "https://addons.mozilla.org/%LOCALE%/firefox/search-engines/"); |
|
353 |
|
354 // pointer to the default engine name |
|
355 pref("browser.search.defaultenginename", "chrome://browser-region/locale/region.properties"); |
|
356 |
|
357 // disable logging for the search service by default |
|
358 pref("browser.search.log", false); |
|
359 |
|
360 // Ordering of Search Engines in the Engine list. |
|
361 pref("browser.search.order.1", "chrome://browser-region/locale/region.properties"); |
|
362 pref("browser.search.order.2", "chrome://browser-region/locale/region.properties"); |
|
363 pref("browser.search.order.3", "chrome://browser-region/locale/region.properties"); |
|
364 |
|
365 // search bar results always open in a new tab |
|
366 pref("browser.search.openintab", false); |
|
367 |
|
368 // context menu searches open in the foreground |
|
369 pref("browser.search.context.loadInBackground", false); |
|
370 |
|
371 // send ping to the server to update |
|
372 pref("browser.search.update", true); |
|
373 |
|
374 // disable logging for the search service update system by default |
|
375 pref("browser.search.update.log", false); |
|
376 |
|
377 // Check whether we need to perform engine updates every 6 hours |
|
378 pref("browser.search.update.interval", 21600); |
|
379 |
|
380 // enable search suggestions by default |
|
381 pref("browser.search.suggest.enabled", true); |
|
382 |
|
383 #ifdef MOZ_OFFICIAL_BRANDING |
|
384 // {moz:official} expands to "official" |
|
385 pref("browser.search.official", true); |
|
386 #endif |
|
387 |
|
388 pref("browser.sessionhistory.max_entries", 50); |
|
389 |
|
390 // handle links targeting new windows |
|
391 // 1=current window/tab, 2=new window, 3=new tab in most recent window |
|
392 pref("browser.link.open_newwindow", 3); |
|
393 |
|
394 // handle external links (i.e. links opened from a different application) |
|
395 // default: use browser.link.open_newwindow |
|
396 // 1-3: see browser.link.open_newwindow for interpretation |
|
397 pref("browser.link.open_newwindow.override.external", -1); |
|
398 |
|
399 // 0: no restrictions - divert everything |
|
400 // 1: don't divert window.open at all |
|
401 // 2: don't divert window.open with features |
|
402 pref("browser.link.open_newwindow.restriction", 2); |
|
403 |
|
404 // If true, this pref causes windows opened by window.open to be forced into new |
|
405 // tabs (rather than potentially opening separate windows, depending on |
|
406 // window.open arguments) when the browser is in fullscreen mode. |
|
407 // We set this differently on Mac because the fullscreen implementation there is |
|
408 // different. |
|
409 #ifdef XP_MACOSX |
|
410 pref("browser.link.open_newwindow.disabled_in_fullscreen", true); |
|
411 #else |
|
412 pref("browser.link.open_newwindow.disabled_in_fullscreen", false); |
|
413 #endif |
|
414 |
|
415 // Tabbed browser |
|
416 pref("browser.tabs.closeWindowWithLastTab", true); |
|
417 pref("browser.tabs.insertRelatedAfterCurrent", true); |
|
418 pref("browser.tabs.warnOnClose", true); |
|
419 pref("browser.tabs.warnOnCloseOtherTabs", true); |
|
420 pref("browser.tabs.warnOnOpen", true); |
|
421 pref("browser.tabs.maxOpenBeforeWarn", 15); |
|
422 pref("browser.tabs.loadInBackground", true); |
|
423 pref("browser.tabs.opentabfor.middleclick", true); |
|
424 pref("browser.tabs.loadDivertedInBackground", false); |
|
425 pref("browser.tabs.loadBookmarksInBackground", false); |
|
426 pref("browser.tabs.tabClipWidth", 140); |
|
427 pref("browser.tabs.animate", true); |
|
428 #ifdef UNIX_BUT_NOT_MAC |
|
429 pref("browser.tabs.drawInTitlebar", false); |
|
430 #else |
|
431 pref("browser.tabs.drawInTitlebar", true); |
|
432 #endif |
|
433 |
|
434 // When tabs opened by links in other tabs via a combination of |
|
435 // browser.link.open_newwindow being set to 3 and target="_blank" etc are |
|
436 // closed: |
|
437 // true return to the tab that opened this tab (its owner) |
|
438 // false return to the adjacent tab (old default) |
|
439 pref("browser.tabs.selectOwnerOnClose", true); |
|
440 |
|
441 pref("browser.ctrlTab.previews", false); |
|
442 |
|
443 // By default, do not export HTML at shutdown. |
|
444 // If true, at shutdown the bookmarks in your menu and toolbar will |
|
445 // be exported as HTML to the bookmarks.html file. |
|
446 pref("browser.bookmarks.autoExportHTML", false); |
|
447 |
|
448 // The maximum number of daily bookmark backups to |
|
449 // keep in {PROFILEDIR}/bookmarkbackups. Special values: |
|
450 // -1: unlimited |
|
451 // 0: no backups created (and deletes all existing backups) |
|
452 pref("browser.bookmarks.max_backups", 15); |
|
453 |
|
454 // Scripts & Windows prefs |
|
455 pref("dom.disable_open_during_load", true); |
|
456 pref("javascript.options.showInConsole", true); |
|
457 #ifdef DEBUG |
|
458 pref("general.warnOnAboutConfig", false); |
|
459 #endif |
|
460 |
|
461 // This is the pref to control the location bar, change this to true to |
|
462 // force this - this makes the origin of popup windows more obvious to avoid |
|
463 // spoofing. We would rather not do it by default because it affects UE for web |
|
464 // applications, but without it there isn't a really good way to prevent chrome |
|
465 // spoofing, see bug 337344 |
|
466 pref("dom.disable_window_open_feature.location", true); |
|
467 // prevent JS from setting status messages |
|
468 pref("dom.disable_window_status_change", true); |
|
469 // allow JS to move and resize existing windows |
|
470 pref("dom.disable_window_move_resize", false); |
|
471 // prevent JS from monkeying with window focus, etc |
|
472 pref("dom.disable_window_flip", true); |
|
473 |
|
474 // Disable touch events on Desktop Firefox by default until they are properly |
|
475 // supported (bug 736048) |
|
476 pref("dom.w3c_touch_events.enabled", 0); |
|
477 |
|
478 // popups.policy 1=allow,2=reject |
|
479 pref("privacy.popups.policy", 1); |
|
480 pref("privacy.popups.usecustom", true); |
|
481 pref("privacy.popups.showBrowserMessage", true); |
|
482 |
|
483 pref("privacy.item.cookies", false); |
|
484 |
|
485 pref("privacy.clearOnShutdown.history", true); |
|
486 pref("privacy.clearOnShutdown.formdata", true); |
|
487 pref("privacy.clearOnShutdown.passwords", false); |
|
488 pref("privacy.clearOnShutdown.downloads", true); |
|
489 pref("privacy.clearOnShutdown.cookies", true); |
|
490 pref("privacy.clearOnShutdown.cache", true); |
|
491 pref("privacy.clearOnShutdown.sessions", true); |
|
492 pref("privacy.clearOnShutdown.offlineApps", false); |
|
493 pref("privacy.clearOnShutdown.siteSettings", false); |
|
494 |
|
495 pref("privacy.cpd.history", true); |
|
496 pref("privacy.cpd.formdata", true); |
|
497 pref("privacy.cpd.passwords", false); |
|
498 pref("privacy.cpd.downloads", true); |
|
499 pref("privacy.cpd.cookies", true); |
|
500 pref("privacy.cpd.cache", true); |
|
501 pref("privacy.cpd.sessions", true); |
|
502 pref("privacy.cpd.offlineApps", false); |
|
503 pref("privacy.cpd.siteSettings", false); |
|
504 |
|
505 // What default should we use for the time span in the sanitizer: |
|
506 // 0 - Clear everything |
|
507 // 1 - Last Hour |
|
508 // 2 - Last 2 Hours |
|
509 // 3 - Last 4 Hours |
|
510 // 4 - Today |
|
511 pref("privacy.sanitize.timeSpan", 1); |
|
512 pref("privacy.sanitize.sanitizeOnShutdown", false); |
|
513 |
|
514 pref("privacy.sanitize.migrateFx3Prefs", false); |
|
515 |
|
516 pref("network.proxy.share_proxy_settings", false); // use the same proxy settings for all protocols |
|
517 |
|
518 // The privacy.thirdparty.isolate pref determines whether |
|
519 // an isolated DOM Storage map and image cache are |
|
520 // maintained for each URL bar domain. |
|
521 // 0 - No isolation |
|
522 // 1 - Enable isolation in private windows |
|
523 // 2 - Enable isolation everywhere |
|
524 pref("privacy.thirdparty.isolate", 1); |
|
525 |
|
526 // simple gestures support |
|
527 pref("browser.gesture.swipe.left", "Browser:BackOrBackDuplicate"); |
|
528 pref("browser.gesture.swipe.right", "Browser:ForwardOrForwardDuplicate"); |
|
529 pref("browser.gesture.swipe.up", "cmd_scrollTop"); |
|
530 pref("browser.gesture.swipe.down", "cmd_scrollBottom"); |
|
531 #ifdef XP_MACOSX |
|
532 pref("browser.gesture.pinch.latched", true); |
|
533 pref("browser.gesture.pinch.threshold", 150); |
|
534 #else |
|
535 pref("browser.gesture.pinch.latched", false); |
|
536 pref("browser.gesture.pinch.threshold", 25); |
|
537 #endif |
|
538 #ifdef XP_WIN |
|
539 // Enabled for touch input display zoom. |
|
540 pref("browser.gesture.pinch.out", "cmd_fullZoomEnlarge"); |
|
541 pref("browser.gesture.pinch.in", "cmd_fullZoomReduce"); |
|
542 pref("browser.gesture.pinch.out.shift", "cmd_fullZoomReset"); |
|
543 pref("browser.gesture.pinch.in.shift", "cmd_fullZoomReset"); |
|
544 #else |
|
545 // Disabled by default due to issues with track pad input. |
|
546 pref("browser.gesture.pinch.out", ""); |
|
547 pref("browser.gesture.pinch.in", ""); |
|
548 pref("browser.gesture.pinch.out.shift", ""); |
|
549 pref("browser.gesture.pinch.in.shift", ""); |
|
550 #endif |
|
551 pref("browser.gesture.twist.latched", false); |
|
552 pref("browser.gesture.twist.threshold", 0); |
|
553 pref("browser.gesture.twist.right", "cmd_gestureRotateRight"); |
|
554 pref("browser.gesture.twist.left", "cmd_gestureRotateLeft"); |
|
555 pref("browser.gesture.twist.end", "cmd_gestureRotateEnd"); |
|
556 pref("browser.gesture.tap", "cmd_fullZoomReset"); |
|
557 |
|
558 pref("browser.snapshots.limit", 0); |
|
559 |
|
560 // 0: Nothing happens |
|
561 // 1: Scrolling contents |
|
562 // 2: Go back or go forward, in your history |
|
563 // 3: Zoom in or out. |
|
564 #ifdef XP_MACOSX |
|
565 // On OS X, if the wheel has one axis only, shift+wheel comes through as a |
|
566 // horizontal scroll event. Thus, we can't assign anything other than normal |
|
567 // scrolling to shift+wheel. |
|
568 pref("mousewheel.with_alt.action", 2); |
|
569 pref("mousewheel.with_shift.action", 1); |
|
570 // On MacOS X, control+wheel is typically handled by system and we don't |
|
571 // receive the event. So, command key which is the main modifier key for |
|
572 // acceleration is the best modifier for zoom-in/out. However, we should keep |
|
573 // the control key setting for backward compatibility. |
|
574 pref("mousewheel.with_meta.action", 3); // command key on Mac |
|
575 // Disable control-/meta-modified horizontal mousewheel events, since |
|
576 // those are used on Mac as part of modified swipe gestures (e.g. |
|
577 // Left swipe+Cmd = go back in a new tab). |
|
578 pref("mousewheel.with_control.action.override_x", 0); |
|
579 pref("mousewheel.with_meta.action.override_x", 0); |
|
580 #else |
|
581 pref("mousewheel.with_alt.action", 1); |
|
582 pref("mousewheel.with_shift.action", 2); |
|
583 pref("mousewheel.with_meta.action", 1); // win key on Win, Super/Hyper on Linux |
|
584 #endif |
|
585 pref("mousewheel.with_control.action",3); |
|
586 pref("mousewheel.with_win.action", 1); |
|
587 |
|
588 pref("browser.xul.error_pages.enabled", true); |
|
589 pref("browser.xul.error_pages.expert_bad_cert", false); |
|
590 |
|
591 // Work Offline is best manually managed by the user. |
|
592 pref("network.manage-offline-status", false); |
|
593 |
|
594 // We want to make sure mail URLs are handled externally... |
|
595 pref("network.protocol-handler.external.mailto", true); // for mail |
|
596 pref("network.protocol-handler.external.news", true); // for news |
|
597 pref("network.protocol-handler.external.snews", true); // for secure news |
|
598 pref("network.protocol-handler.external.nntp", true); // also news |
|
599 #ifdef XP_WIN |
|
600 pref("network.protocol-handler.external.ms-windows-store", true); |
|
601 #endif |
|
602 |
|
603 // ...without warning dialogs |
|
604 pref("network.protocol-handler.warn-external.mailto", false); |
|
605 pref("network.protocol-handler.warn-external.news", false); |
|
606 pref("network.protocol-handler.warn-external.snews", false); |
|
607 pref("network.protocol-handler.warn-external.nntp", false); |
|
608 #ifdef XP_WIN |
|
609 pref("network.protocol-handler.warn-external.ms-windows-store", false); |
|
610 #endif |
|
611 |
|
612 // By default, all protocol handlers are exposed. This means that |
|
613 // the browser will respond to openURL commands for all URL types. |
|
614 // It will also try to open link clicks inside the browser before |
|
615 // failing over to the system handlers. |
|
616 pref("network.protocol-handler.expose-all", true); |
|
617 pref("network.protocol-handler.expose.mailto", false); |
|
618 pref("network.protocol-handler.expose.news", false); |
|
619 pref("network.protocol-handler.expose.snews", false); |
|
620 pref("network.protocol-handler.expose.nntp", false); |
|
621 |
|
622 pref("accessibility.typeaheadfind", false); |
|
623 pref("accessibility.typeaheadfind.timeout", 5000); |
|
624 pref("accessibility.typeaheadfind.linksonly", false); |
|
625 pref("accessibility.typeaheadfind.flashBar", 1); |
|
626 |
|
627 // plugin finder service url |
|
628 pref("pfs.datasource.url", "https://pfs.mozilla.org/plugins/PluginFinderService.php?mimetype=%PLUGIN_MIMETYPE%&appID=%APP_ID%&appVersion=%APP_VERSION%&clientOS=%CLIENT_OS%&chromeLocale=%CHROME_LOCALE%&appRelease=%APP_RELEASE%"); |
|
629 |
|
630 // by default we show an infobar message when pages require plugins that are blocked, or are outdated |
|
631 pref("plugins.hide_infobar_for_blocked_plugin", false); |
|
632 pref("plugins.hide_infobar_for_outdated_plugin", false); |
|
633 |
|
634 pref("plugins.update.url", "https://www.mozilla.org/%LOCALE%/plugincheck/"); |
|
635 pref("plugins.update.notifyUser", false); |
|
636 |
|
637 pref("plugins.click_to_play", true); |
|
638 |
|
639 pref("plugins.hideMissingPluginsNotification", false); |
|
640 |
|
641 pref("plugin.default.state", 1); |
|
642 |
|
643 // Plugins bundled in XPIs are enabled by default. |
|
644 pref("plugin.defaultXpi.state", 2); |
|
645 |
|
646 // Flash is enabled by default, and Java is click-to-activate by default on |
|
647 // all channels. |
|
648 pref("plugin.state.flash", 2); |
|
649 pref("plugin.state.java", 1); |
|
650 |
|
651 // Whitelist Requests |
|
652 |
|
653 // Unity player, bug 979849 |
|
654 #ifdef XP_WIN |
|
655 pref("plugin.state.npunity3d", 2); |
|
656 #endif |
|
657 #ifdef XP_MACOSX |
|
658 pref("plugin.state.unity web player", 2); |
|
659 #endif |
|
660 |
|
661 // Cisco Jabber SDK, bug 980133 |
|
662 #ifdef XP_WIN |
|
663 pref("plugin.state.npciscowebcommunicator", 2); |
|
664 #endif |
|
665 #ifdef XP_MACOSX |
|
666 pref("plugin.state.ciscowebcommunicator", 2); |
|
667 #endif |
|
668 |
|
669 // McAfee Security Scanner detection plugin, bug 980772 |
|
670 #ifdef XP_WIN |
|
671 pref("plugin.state.npmcafeemss", 2); |
|
672 #endif |
|
673 |
|
674 // Cisco VGConnect for directv.com, bug 981403 |
|
675 #ifdef XP_WIN |
|
676 pref("plugin.state.npplayerplugin", 2); |
|
677 #endif |
|
678 #ifdef XP_MACOSX |
|
679 pref("plugin.state.playerplugin", 2); |
|
680 #endif |
|
681 |
|
682 // Cisco Jabber Client, bug 981905 |
|
683 #ifdef XP_WIN |
|
684 pref("plugin.state.npchip", 2); |
|
685 #endif |
|
686 #ifdef XP_MACOSX |
|
687 pref("plugin.state.cisco jabber guest plug-in", 2); |
|
688 #endif |
|
689 |
|
690 // Estonian ID-card plugin, bug 982045 |
|
691 #ifdef XP_WIN |
|
692 pref("plugin.state.npesteid-firefox-plugin", 2); |
|
693 #endif |
|
694 #ifdef XP_MACOSX |
|
695 pref("plugin.state.esteidfirefoxplugin", 2); |
|
696 #endif |
|
697 #ifdef UNIX_BUT_NOT_MAC |
|
698 pref("plugin.state.npesteid-firefox-plugin", 2); |
|
699 #endif |
|
700 |
|
701 // coupons.com, bug 984441 |
|
702 #ifdef XP_WIN |
|
703 pref("plugin.state.npmozcouponprinter", 2); |
|
704 #endif |
|
705 #ifdef XP_MACOSX |
|
706 pref("plugin.state.couponprinter-firefox_v", 2); |
|
707 #endif |
|
708 |
|
709 // Nexus Personal BankID, bug 987056 |
|
710 pref("plugin.state.npbispbrowser", 2); |
|
711 |
|
712 // Gradecam, bug 988119 |
|
713 #ifdef XP_WIN |
|
714 pref("plugin.state.npgcplugin", 2); |
|
715 #endif |
|
716 #ifdef XP_MACOSX |
|
717 pref("plugin.state.gcplugin", 2); |
|
718 #endif |
|
719 |
|
720 // Smart Card Plugin, bug 988781 |
|
721 #ifdef XP_WIN |
|
722 pref("plugin.state.npwebcard", 2); |
|
723 #endif |
|
724 |
|
725 // Cisco WebEx, bug 989096 |
|
726 #ifdef XP_WIN |
|
727 pref("plugin.state.npatgpc", 2); |
|
728 #endif |
|
729 #ifdef XP_MACOSX |
|
730 pref("plugin.state.webex", 2); |
|
731 #endif |
|
732 #ifdef UNIX_BUT_NOT_MAC |
|
733 pref("plugin.state.npatgpc", 2); |
|
734 #endif |
|
735 |
|
736 // Skype, bug 990067 |
|
737 #ifdef XP_WIN |
|
738 pref("plugin.state.npskypewebplugin", 2); |
|
739 #endif |
|
740 #ifdef XP_MACOSX |
|
741 pref("plugin.state.skypewebplugin", 2); |
|
742 #endif |
|
743 |
|
744 // Facebook video calling, bug 990068 |
|
745 #ifdef XP_WIN |
|
746 pref("plugin.state.npfacebookvideocalling", 2); |
|
747 #endif |
|
748 #ifdef XP_MACOSX |
|
749 pref("plugin.state.facebookvideocalling", 2); |
|
750 #endif |
|
751 |
|
752 // MS Office Lync plugin, bug 990069 |
|
753 #ifdef XP_WIN |
|
754 pref("plugin.state.npmeetingjoinpluginoc", 2); |
|
755 #endif |
|
756 #ifdef XP_MACOSX |
|
757 pref("plugin.state.lwaplugin", 2); |
|
758 #endif |
|
759 |
|
760 // VidyoWeb, bug 990286 |
|
761 #ifdef XP_WIN |
|
762 pref("plugin.state.npvidyoweb", 2); |
|
763 #endif |
|
764 #ifdef XP_MACOSX |
|
765 pref("plugin.state.npvidyoweb", 2); |
|
766 pref("plugin.state.vidyoweb", 2); |
|
767 #endif |
|
768 |
|
769 // McAfee Virtual Technician, bug 981503 |
|
770 #ifdef XP_WIN |
|
771 pref("plugin.state.npmvtplugin", 2); |
|
772 #endif |
|
773 |
|
774 // Verimatrix ViewRightWeb, bug 989872 |
|
775 #ifdef XP_WIN |
|
776 pref("plugin.state.npviewright", 2); |
|
777 #endif |
|
778 #ifdef XP_MACOSX |
|
779 pref("plugin.state.viewrightwebplayer", 2); |
|
780 #endif |
|
781 |
|
782 // McAfee SiteAdvisor Enterprise, bug 987057 |
|
783 #ifdef XP_WIN |
|
784 pref("plugin.state.npmcffplg", 2); |
|
785 #endif |
|
786 |
|
787 // F5 Networks SSLVPN plugin, bug 985640 |
|
788 #ifdef XP_MACOSX |
|
789 pref("plugin.state.f5 ssl vpn plugin", 2); |
|
790 pref("plugin.state.f5 sam inspection host plugin", 2); |
|
791 #endif |
|
792 |
|
793 // display door hanger if flash not installed |
|
794 pref("plugins.notifyMissingFlash", true); |
|
795 |
|
796 #ifdef XP_WIN |
|
797 pref("browser.preferences.instantApply", false); |
|
798 #else |
|
799 pref("browser.preferences.instantApply", true); |
|
800 #endif |
|
801 #ifdef XP_MACOSX |
|
802 pref("browser.preferences.animateFadeIn", true); |
|
803 #else |
|
804 pref("browser.preferences.animateFadeIn", false); |
|
805 #endif |
|
806 |
|
807 // Toggles between the two Preferences implementations, pop-up window and in-content |
|
808 pref("browser.preferences.inContent", false); |
|
809 |
|
810 pref("browser.download.show_plugins_in_list", true); |
|
811 pref("browser.download.hide_plugins_without_extensions", true); |
|
812 |
|
813 // Backspace and Shift+Backspace behavior |
|
814 // 0 goes Back/Forward |
|
815 // 1 act like PgUp/PgDown |
|
816 // 2 and other values, nothing |
|
817 #ifdef UNIX_BUT_NOT_MAC |
|
818 pref("browser.backspace_action", 2); |
|
819 #else |
|
820 pref("browser.backspace_action", 0); |
|
821 #endif |
|
822 |
|
823 // this will automatically enable inline spellchecking (if it is available) for |
|
824 // editable elements in HTML |
|
825 // 0 = spellcheck nothing |
|
826 // 1 = check multi-line controls [default] |
|
827 // 2 = check multi/single line controls |
|
828 pref("layout.spellcheckDefault", 1); |
|
829 |
|
830 pref("browser.send_pings", false); |
|
831 |
|
832 /* initial web feed readers list */ |
|
833 pref("browser.contentHandlers.types.0.title", "chrome://browser-region/locale/region.properties"); |
|
834 pref("browser.contentHandlers.types.0.uri", "chrome://browser-region/locale/region.properties"); |
|
835 pref("browser.contentHandlers.types.0.type", "application/vnd.mozilla.maybe.feed"); |
|
836 pref("browser.contentHandlers.types.1.title", "chrome://browser-region/locale/region.properties"); |
|
837 pref("browser.contentHandlers.types.1.uri", "chrome://browser-region/locale/region.properties"); |
|
838 pref("browser.contentHandlers.types.1.type", "application/vnd.mozilla.maybe.feed"); |
|
839 pref("browser.contentHandlers.types.2.title", "chrome://browser-region/locale/region.properties"); |
|
840 pref("browser.contentHandlers.types.2.uri", "chrome://browser-region/locale/region.properties"); |
|
841 pref("browser.contentHandlers.types.2.type", "application/vnd.mozilla.maybe.feed"); |
|
842 pref("browser.contentHandlers.types.3.title", "chrome://browser-region/locale/region.properties"); |
|
843 pref("browser.contentHandlers.types.3.uri", "chrome://browser-region/locale/region.properties"); |
|
844 pref("browser.contentHandlers.types.3.type", "application/vnd.mozilla.maybe.feed"); |
|
845 pref("browser.contentHandlers.types.4.title", "chrome://browser-region/locale/region.properties"); |
|
846 pref("browser.contentHandlers.types.4.uri", "chrome://browser-region/locale/region.properties"); |
|
847 pref("browser.contentHandlers.types.4.type", "application/vnd.mozilla.maybe.feed"); |
|
848 pref("browser.contentHandlers.types.5.title", "chrome://browser-region/locale/region.properties"); |
|
849 pref("browser.contentHandlers.types.5.uri", "chrome://browser-region/locale/region.properties"); |
|
850 pref("browser.contentHandlers.types.5.type", "application/vnd.mozilla.maybe.feed"); |
|
851 |
|
852 pref("browser.feeds.handler", "ask"); |
|
853 pref("browser.videoFeeds.handler", "ask"); |
|
854 pref("browser.audioFeeds.handler", "ask"); |
|
855 |
|
856 // At startup, if the handler service notices that the version number in the |
|
857 // region.properties file is newer than the version number in the handler |
|
858 // service datastore, it will add any new handlers it finds in the prefs (as |
|
859 // seeded by this file) to its datastore. |
|
860 pref("gecko.handlerService.defaultHandlersVersion", "chrome://browser-region/locale/region.properties"); |
|
861 |
|
862 // The default set of web-based protocol handlers shown in the application |
|
863 // selection dialog for webcal: ; I've arbitrarily picked 4 default handlers |
|
864 // per protocol, but if some locale wants more than that (or defaults for some |
|
865 // protocol not currently listed here), we should go ahead and add those. |
|
866 |
|
867 // webcal |
|
868 pref("gecko.handlerService.schemes.webcal.0.name", "chrome://browser-region/locale/region.properties"); |
|
869 pref("gecko.handlerService.schemes.webcal.0.uriTemplate", "chrome://browser-region/locale/region.properties"); |
|
870 pref("gecko.handlerService.schemes.webcal.1.name", "chrome://browser-region/locale/region.properties"); |
|
871 pref("gecko.handlerService.schemes.webcal.1.uriTemplate", "chrome://browser-region/locale/region.properties"); |
|
872 pref("gecko.handlerService.schemes.webcal.2.name", "chrome://browser-region/locale/region.properties"); |
|
873 pref("gecko.handlerService.schemes.webcal.2.uriTemplate", "chrome://browser-region/locale/region.properties"); |
|
874 pref("gecko.handlerService.schemes.webcal.3.name", "chrome://browser-region/locale/region.properties"); |
|
875 pref("gecko.handlerService.schemes.webcal.3.uriTemplate", "chrome://browser-region/locale/region.properties"); |
|
876 |
|
877 // mailto |
|
878 pref("gecko.handlerService.schemes.mailto.0.name", "chrome://browser-region/locale/region.properties"); |
|
879 pref("gecko.handlerService.schemes.mailto.0.uriTemplate", "chrome://browser-region/locale/region.properties"); |
|
880 pref("gecko.handlerService.schemes.mailto.1.name", "chrome://browser-region/locale/region.properties"); |
|
881 pref("gecko.handlerService.schemes.mailto.1.uriTemplate", "chrome://browser-region/locale/region.properties"); |
|
882 pref("gecko.handlerService.schemes.mailto.2.name", "chrome://browser-region/locale/region.properties"); |
|
883 pref("gecko.handlerService.schemes.mailto.2.uriTemplate", "chrome://browser-region/locale/region.properties"); |
|
884 pref("gecko.handlerService.schemes.mailto.3.name", "chrome://browser-region/locale/region.properties"); |
|
885 pref("gecko.handlerService.schemes.mailto.3.uriTemplate", "chrome://browser-region/locale/region.properties"); |
|
886 |
|
887 // irc |
|
888 pref("gecko.handlerService.schemes.irc.0.name", "chrome://browser-region/locale/region.properties"); |
|
889 pref("gecko.handlerService.schemes.irc.0.uriTemplate", "chrome://browser-region/locale/region.properties"); |
|
890 pref("gecko.handlerService.schemes.irc.1.name", "chrome://browser-region/locale/region.properties"); |
|
891 pref("gecko.handlerService.schemes.irc.1.uriTemplate", "chrome://browser-region/locale/region.properties"); |
|
892 pref("gecko.handlerService.schemes.irc.2.name", "chrome://browser-region/locale/region.properties"); |
|
893 pref("gecko.handlerService.schemes.irc.2.uriTemplate", "chrome://browser-region/locale/region.properties"); |
|
894 pref("gecko.handlerService.schemes.irc.3.name", "chrome://browser-region/locale/region.properties"); |
|
895 pref("gecko.handlerService.schemes.irc.3.uriTemplate", "chrome://browser-region/locale/region.properties"); |
|
896 |
|
897 // ircs |
|
898 pref("gecko.handlerService.schemes.ircs.0.name", "chrome://browser-region/locale/region.properties"); |
|
899 pref("gecko.handlerService.schemes.ircs.0.uriTemplate", "chrome://browser-region/locale/region.properties"); |
|
900 pref("gecko.handlerService.schemes.ircs.1.name", "chrome://browser-region/locale/region.properties"); |
|
901 pref("gecko.handlerService.schemes.ircs.1.uriTemplate", "chrome://browser-region/locale/region.properties"); |
|
902 pref("gecko.handlerService.schemes.ircs.2.name", "chrome://browser-region/locale/region.properties"); |
|
903 pref("gecko.handlerService.schemes.ircs.2.uriTemplate", "chrome://browser-region/locale/region.properties"); |
|
904 pref("gecko.handlerService.schemes.ircs.3.name", "chrome://browser-region/locale/region.properties"); |
|
905 pref("gecko.handlerService.schemes.ircs.3.uriTemplate", "chrome://browser-region/locale/region.properties"); |
|
906 |
|
907 // By default, we don't want protocol/content handlers to be registered from a different host, see bug 402287 |
|
908 pref("gecko.handlerService.allowRegisterFromDifferentHost", false); |
|
909 |
|
910 #ifdef MOZ_SAFE_BROWSING |
|
911 pref("browser.safebrowsing.enabled", true); |
|
912 pref("browser.safebrowsing.malware.enabled", true); |
|
913 pref("browser.safebrowsing.debug", false); |
|
914 |
|
915 pref("browser.safebrowsing.updateURL", "https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=%VERSION%&pver=2.2&key=%GOOGLE_API_KEY%"); |
|
916 pref("browser.safebrowsing.gethashURL", "https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=%VERSION%&pver=2.2"); |
|
917 pref("browser.safebrowsing.reportURL", "https://safebrowsing.google.com/safebrowsing/report?"); |
|
918 pref("browser.safebrowsing.reportGenericURL", "http://%LOCALE%.phish-generic.mozilla.com/?hl=%LOCALE%"); |
|
919 pref("browser.safebrowsing.reportErrorURL", "http://%LOCALE%.phish-error.mozilla.com/?hl=%LOCALE%"); |
|
920 pref("browser.safebrowsing.reportPhishURL", "http://%LOCALE%.phish-report.mozilla.com/?hl=%LOCALE%"); |
|
921 pref("browser.safebrowsing.reportMalwareURL", "http://%LOCALE%.malware-report.mozilla.com/?hl=%LOCALE%"); |
|
922 pref("browser.safebrowsing.reportMalwareErrorURL", "http://%LOCALE%.malware-error.mozilla.com/?hl=%LOCALE%"); |
|
923 |
|
924 pref("browser.safebrowsing.malware.reportURL", "https://safebrowsing.google.com/safebrowsing/diagnostic?client=%NAME%&hl=%LOCALE%&site="); |
|
925 pref("browser.safebrowsing.appRepURL", "https://sb-ssl.google.com/safebrowsing/clientreport/download?key=%GOOGLE_API_KEY%"); |
|
926 |
|
927 #ifdef MOZILLA_OFFICIAL |
|
928 // Normally the "client ID" sent in updates is appinfo.name, but for |
|
929 // official Firefox releases from Mozilla we use a special identifier. |
|
930 pref("browser.safebrowsing.id", "navclient-auto-ffox"); |
|
931 #endif |
|
932 |
|
933 // Name of the about: page contributed by safebrowsing to handle display of error |
|
934 // pages on phishing/malware hits. (bug 399233) |
|
935 pref("urlclassifier.alternate_error_page", "blocked"); |
|
936 |
|
937 // The number of random entries to send with a gethash request. |
|
938 pref("urlclassifier.gethashnoise", 4); |
|
939 |
|
940 // If an urlclassifier table has not been updated in this number of seconds, |
|
941 // a gethash request will be forced to check that the result is still in |
|
942 // the database. |
|
943 pref("urlclassifier.max-complete-age", 2700); |
|
944 // Tables for application reputation. |
|
945 pref("urlclassifier.downloadBlockTable", "goog-badbinurl-shavar"); |
|
946 #ifdef XP_WIN |
|
947 // Only download the whitelist on Windows, since the whitelist is |
|
948 // only useful for suppressing remote lookups for signed binaries which we can |
|
949 // only verify on Windows (Bug 974579). |
|
950 pref("urlclassifier.downloadAllowTable", "goog-downloadwhite-digest256"); |
|
951 #endif |
|
952 #endif |
|
953 |
|
954 pref("browser.geolocation.warning.infoURL", "https://www.mozilla.org/%LOCALE%/firefox/geolocation/"); |
|
955 |
|
956 pref("browser.EULA.version", 3); |
|
957 pref("browser.rights.version", 3); |
|
958 pref("browser.rights.3.shown", false); |
|
959 |
|
960 #ifdef DEBUG |
|
961 // Don't show the about:rights notification in debug builds. |
|
962 pref("browser.rights.override", true); |
|
963 #endif |
|
964 |
|
965 pref("browser.sessionstore.resume_from_crash", true); |
|
966 pref("browser.sessionstore.resume_session_once", false); |
|
967 |
|
968 // minimal interval between two save operations in milliseconds |
|
969 pref("browser.sessionstore.interval", 15000); |
|
970 // on which sites to save text data, POSTDATA and cookies |
|
971 // 0 = everywhere, 1 = unencrypted sites, 2 = nowhere |
|
972 pref("browser.sessionstore.privacy_level", 0); |
|
973 // the same as browser.sessionstore.privacy_level, but for saving deferred session data |
|
974 pref("browser.sessionstore.privacy_level_deferred", 1); |
|
975 // how many tabs can be reopened (per window) |
|
976 pref("browser.sessionstore.max_tabs_undo", 10); |
|
977 // how many windows can be reopened (per session) - on non-OS X platforms this |
|
978 // pref may be ignored when dealing with pop-up windows to ensure proper startup |
|
979 pref("browser.sessionstore.max_windows_undo", 3); |
|
980 // number of crashes that can occur before the about:sessionrestore page is displayed |
|
981 // (this pref has no effect if more than 6 hours have passed since the last crash) |
|
982 pref("browser.sessionstore.max_resumed_crashes", 1); |
|
983 // number of back button session history entries to restore (-1 = all of them) |
|
984 pref("browser.sessionstore.max_serialize_back", 10); |
|
985 // number of forward button session history entries to restore (-1 = all of them) |
|
986 pref("browser.sessionstore.max_serialize_forward", -1); |
|
987 // restore_on_demand overrides MAX_CONCURRENT_TAB_RESTORES (sessionstore constant) |
|
988 // and restore_hidden_tabs. When true, tabs will not be restored until they are |
|
989 // focused (also applies to tabs that aren't visible). When false, the values |
|
990 // for MAX_CONCURRENT_TAB_RESTORES and restore_hidden_tabs are respected. |
|
991 // Selected tabs are always restored regardless of this pref. |
|
992 pref("browser.sessionstore.restore_on_demand", true); |
|
993 // Whether to automatically restore hidden tabs (i.e., tabs in other tab groups) or not |
|
994 pref("browser.sessionstore.restore_hidden_tabs", false); |
|
995 // If restore_on_demand is set, pinned tabs are restored on startup by default. |
|
996 // When set to true, this pref overrides that behavior, and pinned tabs will only |
|
997 // be restored when they are focused. |
|
998 pref("browser.sessionstore.restore_pinned_tabs_on_demand", false); |
|
999 // The version at which we performed the latest upgrade backup |
|
1000 pref("browser.sessionstore.upgradeBackup.latestBuildID", ""); |
|
1001 // End-users should not run sessionstore in debug mode |
|
1002 pref("browser.sessionstore.debug", false); |
|
1003 |
|
1004 // allow META refresh by default |
|
1005 pref("accessibility.blockautorefresh", false); |
|
1006 |
|
1007 // Whether history is enabled or not. |
|
1008 pref("places.history.enabled", true); |
|
1009 |
|
1010 // the (maximum) number of the recent visits to sample |
|
1011 // when calculating frecency |
|
1012 pref("places.frecency.numVisits", 10); |
|
1013 |
|
1014 // buckets (in days) for frecency calculation |
|
1015 pref("places.frecency.firstBucketCutoff", 4); |
|
1016 pref("places.frecency.secondBucketCutoff", 14); |
|
1017 pref("places.frecency.thirdBucketCutoff", 31); |
|
1018 pref("places.frecency.fourthBucketCutoff", 90); |
|
1019 |
|
1020 // weights for buckets for frecency calculations |
|
1021 pref("places.frecency.firstBucketWeight", 100); |
|
1022 pref("places.frecency.secondBucketWeight", 70); |
|
1023 pref("places.frecency.thirdBucketWeight", 50); |
|
1024 pref("places.frecency.fourthBucketWeight", 30); |
|
1025 pref("places.frecency.defaultBucketWeight", 10); |
|
1026 |
|
1027 // bonus (in percent) for visit transition types for frecency calculations |
|
1028 pref("places.frecency.embedVisitBonus", 0); |
|
1029 pref("places.frecency.framedLinkVisitBonus", 0); |
|
1030 pref("places.frecency.linkVisitBonus", 100); |
|
1031 pref("places.frecency.typedVisitBonus", 2000); |
|
1032 pref("places.frecency.bookmarkVisitBonus", 75); |
|
1033 pref("places.frecency.downloadVisitBonus", 0); |
|
1034 pref("places.frecency.permRedirectVisitBonus", 0); |
|
1035 pref("places.frecency.tempRedirectVisitBonus", 0); |
|
1036 pref("places.frecency.defaultVisitBonus", 0); |
|
1037 |
|
1038 // bonus (in percent) for place types for frecency calculations |
|
1039 pref("places.frecency.unvisitedBookmarkBonus", 140); |
|
1040 pref("places.frecency.unvisitedTypedBonus", 200); |
|
1041 |
|
1042 // Controls behavior of the "Add Exception" dialog launched from SSL error pages |
|
1043 // 0 - don't pre-populate anything |
|
1044 // 1 - pre-populate site URL, but don't fetch certificate |
|
1045 // 2 - pre-populate site URL and pre-fetch certificate |
|
1046 pref("browser.ssl_override_behavior", 2); |
|
1047 |
|
1048 // True if the user should be prompted when a web application supports |
|
1049 // offline apps. |
|
1050 pref("browser.offline-apps.notify", true); |
|
1051 |
|
1052 // if true, use full page zoom instead of text zoom |
|
1053 pref("browser.zoom.full", true); |
|
1054 |
|
1055 // Whether or not to save and restore zoom levels on a per-site basis. |
|
1056 pref("browser.zoom.siteSpecific", true); |
|
1057 |
|
1058 // Whether or not to update background tabs to the current zoom level. |
|
1059 pref("browser.zoom.updateBackgroundTabs", true); |
|
1060 |
|
1061 // The breakpad report server to link to in about:crashes |
|
1062 pref("breakpad.reportURL", "https://crash-stats.mozilla.com/report/index/"); |
|
1063 |
|
1064 #ifndef RELEASE_BUILD |
|
1065 // Override submission of plugin hang reports to a different processing server |
|
1066 // for the smaller-volume nightly/aurora populations. |
|
1067 pref("toolkit.crashreporter.pluginHangSubmitURL", |
|
1068 "https://hang-reports.mozilla.org/submit"); |
|
1069 #endif |
|
1070 |
|
1071 // URL for "Learn More" for Crash Reporter |
|
1072 pref("toolkit.crashreporter.infoURL", |
|
1073 "https://www.mozilla.org/legal/privacy/firefox.html#crash-reporter"); |
|
1074 |
|
1075 // base URL for web-based support pages |
|
1076 pref("app.support.baseURL", "https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/"); |
|
1077 |
|
1078 // base url for web-based feedback pages |
|
1079 pref("app.feedback.baseURL", "https://input.mozilla.org/%LOCALE%/feedback/%APP%/%VERSION%/"); |
|
1080 |
|
1081 // Name of alternate about: page for certificate errors (when undefined, defaults to about:neterror) |
|
1082 pref("security.alternate_certificate_error_page", "certerror"); |
|
1083 |
|
1084 // Whether to start the private browsing mode at application startup |
|
1085 pref("browser.privatebrowsing.autostart", false); |
|
1086 |
|
1087 // Don't try to alter this pref, it'll be reset the next time you use the |
|
1088 // bookmarking dialog |
|
1089 pref("browser.bookmarks.editDialog.firstEditField", "namePicker"); |
|
1090 |
|
1091 // Whether to use a panel that looks like an OS X sheet for customization |
|
1092 #ifdef XP_MACOSX |
|
1093 pref("toolbar.customization.usesheet", true); |
|
1094 #else |
|
1095 pref("toolbar.customization.usesheet", false); |
|
1096 #endif |
|
1097 |
|
1098 #ifdef XP_MACOSX |
|
1099 // On mac, the default pref is per-architecture |
|
1100 pref("dom.ipc.plugins.enabled.i386", true); |
|
1101 pref("dom.ipc.plugins.enabled.x86_64", true); |
|
1102 #else |
|
1103 pref("dom.ipc.plugins.enabled", true); |
|
1104 #endif |
|
1105 |
|
1106 #if defined(NIGHTLY_BUILD) |
|
1107 // browser.tabs.remote is enabled on nightly. However, users won't |
|
1108 // actually get remote tabs unless they enable |
|
1109 // browser.tabs.remote.autostart or they use the "New OOP Window" menu |
|
1110 // option. |
|
1111 pref("browser.tabs.remote", true); |
|
1112 #else |
|
1113 pref("browser.tabs.remote", false); |
|
1114 #endif |
|
1115 pref("browser.tabs.remote.autostart", false); |
|
1116 |
|
1117 // This pref governs whether we attempt to work around problems caused by |
|
1118 // plugins using OS calls to manipulate the cursor while running out-of- |
|
1119 // process. These workarounds all involve intercepting (hooking) certain |
|
1120 // OS calls in the plugin process, then arranging to make certain OS calls |
|
1121 // in the browser process. Eventually plugins will be required to use the |
|
1122 // NPAPI to manipulate the cursor, and these workarounds will be removed. |
|
1123 // See bug 621117. |
|
1124 #ifdef XP_MACOSX |
|
1125 pref("dom.ipc.plugins.nativeCursorSupport", true); |
|
1126 #endif |
|
1127 |
|
1128 #ifdef XP_WIN |
|
1129 pref("browser.taskbar.previews.enable", false); |
|
1130 pref("browser.taskbar.previews.max", 20); |
|
1131 pref("browser.taskbar.previews.cachetime", 5); |
|
1132 pref("browser.taskbar.lists.enabled", true); |
|
1133 pref("browser.taskbar.lists.frequent.enabled", true); |
|
1134 pref("browser.taskbar.lists.recent.enabled", false); |
|
1135 pref("browser.taskbar.lists.maxListItemCount", 7); |
|
1136 pref("browser.taskbar.lists.tasks.enabled", true); |
|
1137 pref("browser.taskbar.lists.refreshInSeconds", 120); |
|
1138 #endif |
|
1139 |
|
1140 #ifdef MOZ_SERVICES_SYNC |
|
1141 // The sync engines to use. |
|
1142 pref("services.sync.registerEngines", "Bookmarks,Form,History,Password,Prefs,Tab,Addons"); |
|
1143 // Preferences to be synced by default |
|
1144 pref("services.sync.prefs.sync.accessibility.blockautorefresh", true); |
|
1145 pref("services.sync.prefs.sync.accessibility.browsewithcaret", true); |
|
1146 pref("services.sync.prefs.sync.accessibility.typeaheadfind", true); |
|
1147 pref("services.sync.prefs.sync.accessibility.typeaheadfind.linksonly", true); |
|
1148 pref("services.sync.prefs.sync.addons.ignoreUserEnabledChanges", true); |
|
1149 // The addons prefs related to repository verification are intentionally |
|
1150 // not synced for security reasons. If a system is compromised, a user |
|
1151 // could weaken the pref locally, install an add-on from an untrusted |
|
1152 // source, and this would propagate automatically to other, |
|
1153 // uncompromised Sync-connected devices. |
|
1154 pref("services.sync.prefs.sync.app.update.mode", true); |
|
1155 pref("services.sync.prefs.sync.browser.formfill.enable", true); |
|
1156 pref("services.sync.prefs.sync.browser.link.open_newwindow", true); |
|
1157 pref("services.sync.prefs.sync.browser.offline-apps.notify", true); |
|
1158 pref("services.sync.prefs.sync.browser.safebrowsing.enabled", true); |
|
1159 pref("services.sync.prefs.sync.browser.safebrowsing.malware.enabled", true); |
|
1160 pref("services.sync.prefs.sync.browser.search.selectedEngine", true); |
|
1161 pref("services.sync.prefs.sync.browser.search.update", true); |
|
1162 pref("services.sync.prefs.sync.browser.sessionstore.restore_on_demand", true); |
|
1163 pref("services.sync.prefs.sync.browser.startup.homepage", true); |
|
1164 pref("services.sync.prefs.sync.browser.startup.page", true); |
|
1165 pref("services.sync.prefs.sync.browser.tabs.loadInBackground", true); |
|
1166 pref("services.sync.prefs.sync.browser.tabs.warnOnClose", true); |
|
1167 pref("services.sync.prefs.sync.browser.tabs.warnOnOpen", true); |
|
1168 pref("services.sync.prefs.sync.browser.urlbar.autocomplete.enabled", true); |
|
1169 pref("services.sync.prefs.sync.browser.urlbar.default.behavior", true); |
|
1170 pref("services.sync.prefs.sync.browser.urlbar.maxRichResults", true); |
|
1171 pref("services.sync.prefs.sync.dom.disable_open_during_load", true); |
|
1172 pref("services.sync.prefs.sync.dom.disable_window_flip", true); |
|
1173 pref("services.sync.prefs.sync.dom.disable_window_move_resize", true); |
|
1174 pref("services.sync.prefs.sync.dom.event.contextmenu.enabled", true); |
|
1175 pref("services.sync.prefs.sync.extensions.personas.current", true); |
|
1176 pref("services.sync.prefs.sync.extensions.update.enabled", true); |
|
1177 pref("services.sync.prefs.sync.intl.accept_languages", true); |
|
1178 pref("services.sync.prefs.sync.javascript.enabled", true); |
|
1179 pref("services.sync.prefs.sync.layout.spellcheckDefault", true); |
|
1180 pref("services.sync.prefs.sync.lightweightThemes.isThemeSelected", true); |
|
1181 pref("services.sync.prefs.sync.lightweightThemes.usedThemes", true); |
|
1182 pref("services.sync.prefs.sync.network.cookie.cookieBehavior", true); |
|
1183 pref("services.sync.prefs.sync.network.cookie.lifetimePolicy", true); |
|
1184 pref("services.sync.prefs.sync.permissions.default.image", true); |
|
1185 pref("services.sync.prefs.sync.pref.advanced.images.disable_button.view_image", true); |
|
1186 pref("services.sync.prefs.sync.pref.advanced.javascript.disable_button.advanced", true); |
|
1187 pref("services.sync.prefs.sync.pref.downloads.disable_button.edit_actions", true); |
|
1188 pref("services.sync.prefs.sync.pref.privacy.disable_button.cookie_exceptions", true); |
|
1189 pref("services.sync.prefs.sync.privacy.clearOnShutdown.cache", true); |
|
1190 pref("services.sync.prefs.sync.privacy.clearOnShutdown.cookies", true); |
|
1191 pref("services.sync.prefs.sync.privacy.clearOnShutdown.downloads", true); |
|
1192 pref("services.sync.prefs.sync.privacy.clearOnShutdown.formdata", true); |
|
1193 pref("services.sync.prefs.sync.privacy.clearOnShutdown.history", true); |
|
1194 pref("services.sync.prefs.sync.privacy.clearOnShutdown.offlineApps", true); |
|
1195 pref("services.sync.prefs.sync.privacy.clearOnShutdown.passwords", true); |
|
1196 pref("services.sync.prefs.sync.privacy.clearOnShutdown.sessions", true); |
|
1197 pref("services.sync.prefs.sync.privacy.clearOnShutdown.siteSettings", true); |
|
1198 pref("services.sync.prefs.sync.privacy.donottrackheader.enabled", true); |
|
1199 pref("services.sync.prefs.sync.privacy.donottrackheader.value", true); |
|
1200 pref("services.sync.prefs.sync.privacy.sanitize.sanitizeOnShutdown", true); |
|
1201 pref("services.sync.prefs.sync.security.OCSP.enabled", true); |
|
1202 pref("services.sync.prefs.sync.security.OCSP.require", true); |
|
1203 pref("services.sync.prefs.sync.security.default_personal_cert", true); |
|
1204 pref("services.sync.prefs.sync.security.tls.version.min", true); |
|
1205 pref("services.sync.prefs.sync.security.tls.version.max", true); |
|
1206 pref("services.sync.prefs.sync.signon.rememberSignons", true); |
|
1207 pref("services.sync.prefs.sync.spellchecker.dictionary", true); |
|
1208 pref("services.sync.prefs.sync.xpinstall.whitelist.required", true); |
|
1209 #endif |
|
1210 |
|
1211 // Disable the error console |
|
1212 pref("devtools.errorconsole.enabled", false); |
|
1213 |
|
1214 // Developer toolbar and GCLI preferences |
|
1215 pref("devtools.toolbar.enabled", true); |
|
1216 pref("devtools.toolbar.visible", false); |
|
1217 pref("devtools.commands.dir", ""); |
|
1218 |
|
1219 // Enable the app manager |
|
1220 pref("devtools.appmanager.enabled", true); |
|
1221 pref("devtools.appmanager.lastTab", "help"); |
|
1222 pref("devtools.appmanager.manifestEditor.enabled", true); |
|
1223 |
|
1224 // Toolbox preferences |
|
1225 pref("devtools.toolbox.footer.height", 250); |
|
1226 pref("devtools.toolbox.sidebar.width", 500); |
|
1227 pref("devtools.toolbox.host", "bottom"); |
|
1228 pref("devtools.toolbox.selectedTool", "webconsole"); |
|
1229 pref("devtools.toolbox.toolbarSpec", '["splitconsole", "paintflashing toggle","tilt toggle","scratchpad","resize toggle","eyedropper"]'); |
|
1230 pref("devtools.toolbox.sideEnabled", true); |
|
1231 pref("devtools.toolbox.zoomValue", "1"); |
|
1232 |
|
1233 // Toolbox Button preferences |
|
1234 pref("devtools.command-button-pick.enabled", true); |
|
1235 pref("devtools.command-button-splitconsole.enabled", true); |
|
1236 pref("devtools.command-button-paintflashing.enabled", false); |
|
1237 pref("devtools.command-button-tilt.enabled", false); |
|
1238 pref("devtools.command-button-scratchpad.enabled", false); |
|
1239 pref("devtools.command-button-responsive.enabled", true); |
|
1240 pref("devtools.command-button-eyedropper.enabled", false); |
|
1241 |
|
1242 // Inspector preferences |
|
1243 // Enable the Inspector |
|
1244 pref("devtools.inspector.enabled", true); |
|
1245 // What was the last active sidebar in the inspector |
|
1246 pref("devtools.inspector.activeSidebar", "ruleview"); |
|
1247 // Enable the markup preview |
|
1248 pref("devtools.inspector.markupPreview", false); |
|
1249 pref("devtools.inspector.remote", false); |
|
1250 // Expand pseudo-elements by default in the rule-view |
|
1251 pref("devtools.inspector.show_pseudo_elements", true); |
|
1252 // The default size for image preview tooltips in the rule-view/computed-view/markup-view |
|
1253 pref("devtools.inspector.imagePreviewTooltipSize", 300); |
|
1254 |
|
1255 // DevTools default color unit |
|
1256 pref("devtools.defaultColorUnit", "hex"); |
|
1257 |
|
1258 // Enable the Responsive UI tool |
|
1259 pref("devtools.responsiveUI.no-reload-notification", false); |
|
1260 |
|
1261 // Enable the Debugger |
|
1262 pref("devtools.debugger.enabled", true); |
|
1263 pref("devtools.debugger.chrome-enabled", true); |
|
1264 pref("devtools.debugger.chrome-debugging-host", "localhost"); |
|
1265 pref("devtools.debugger.chrome-debugging-port", 6080); |
|
1266 pref("devtools.debugger.remote-host", "localhost"); |
|
1267 pref("devtools.debugger.remote-timeout", 20000); |
|
1268 pref("devtools.debugger.pause-on-exceptions", false); |
|
1269 pref("devtools.debugger.ignore-caught-exceptions", true); |
|
1270 pref("devtools.debugger.source-maps-enabled", true); |
|
1271 pref("devtools.debugger.pretty-print-enabled", true); |
|
1272 pref("devtools.debugger.auto-pretty-print", false); |
|
1273 pref("devtools.debugger.tracer", false); |
|
1274 |
|
1275 // The default Debugger UI settings |
|
1276 pref("devtools.debugger.ui.panes-sources-width", 200); |
|
1277 pref("devtools.debugger.ui.panes-instruments-width", 300); |
|
1278 pref("devtools.debugger.ui.panes-visible-on-startup", false); |
|
1279 pref("devtools.debugger.ui.variables-sorting-enabled", true); |
|
1280 pref("devtools.debugger.ui.variables-only-enum-visible", false); |
|
1281 pref("devtools.debugger.ui.variables-searchbox-visible", false); |
|
1282 |
|
1283 // Enable the Profiler |
|
1284 pref("devtools.profiler.enabled", true); |
|
1285 |
|
1286 // The default Profiler UI settings |
|
1287 pref("devtools.profiler.ui.show-platform-data", false); |
|
1288 |
|
1289 // Enable the Network Monitor |
|
1290 pref("devtools.netmonitor.enabled", true); |
|
1291 |
|
1292 // The default Network Monitor UI settings |
|
1293 pref("devtools.netmonitor.panes-network-details-width", 550); |
|
1294 pref("devtools.netmonitor.panes-network-details-height", 450); |
|
1295 pref("devtools.netmonitor.statistics", true); |
|
1296 pref("devtools.netmonitor.filters", "[\"all\"]"); |
|
1297 |
|
1298 // Enable the Tilt inspector |
|
1299 pref("devtools.tilt.enabled", true); |
|
1300 pref("devtools.tilt.intro_transition", true); |
|
1301 pref("devtools.tilt.outro_transition", true); |
|
1302 |
|
1303 // Scratchpad settings |
|
1304 // - recentFileMax: The maximum number of recently-opened files |
|
1305 // stored. Setting this preference to 0 will not |
|
1306 // clear any recent files, but rather hide the |
|
1307 // 'Open Recent'-menu. |
|
1308 // - showTrailingSpace: Whether to highlight trailing space or not. |
|
1309 // - enableCodeFolding: Whether to enable code folding or not. |
|
1310 pref("devtools.scratchpad.recentFilesMax", 10); |
|
1311 pref("devtools.scratchpad.showTrailingSpace", false); |
|
1312 pref("devtools.scratchpad.enableCodeFolding", true); |
|
1313 |
|
1314 // Enable the Style Editor. |
|
1315 pref("devtools.styleeditor.enabled", true); |
|
1316 pref("devtools.styleeditor.source-maps-enabled", false); |
|
1317 pref("devtools.styleeditor.autocompletion-enabled", true); |
|
1318 |
|
1319 // Enable the Shader Editor. |
|
1320 pref("devtools.shadereditor.enabled", false); |
|
1321 |
|
1322 // Enable the Canvas Debugger. |
|
1323 pref("devtools.canvasdebugger.enabled", false); |
|
1324 |
|
1325 // Enable the Web Audio Editor |
|
1326 pref("devtools.webaudioeditor.enabled", false); |
|
1327 |
|
1328 // Default theme ("dark" or "light") |
|
1329 pref("devtools.theme", "light"); |
|
1330 |
|
1331 // Display the introductory text |
|
1332 pref("devtools.gcli.hideIntro", false); |
|
1333 |
|
1334 // How eager are we to show help: never=1, sometimes=2, always=3 |
|
1335 pref("devtools.gcli.eagerHelper", 2); |
|
1336 |
|
1337 // Remember the Web Console filters |
|
1338 pref("devtools.webconsole.filter.network", true); |
|
1339 pref("devtools.webconsole.filter.networkinfo", false); |
|
1340 pref("devtools.webconsole.filter.netwarn", true); |
|
1341 pref("devtools.webconsole.filter.csserror", true); |
|
1342 pref("devtools.webconsole.filter.cssparser", false); |
|
1343 pref("devtools.webconsole.filter.csslog", false); |
|
1344 pref("devtools.webconsole.filter.exception", true); |
|
1345 pref("devtools.webconsole.filter.jswarn", true); |
|
1346 pref("devtools.webconsole.filter.jslog", false); |
|
1347 pref("devtools.webconsole.filter.error", true); |
|
1348 pref("devtools.webconsole.filter.warn", true); |
|
1349 pref("devtools.webconsole.filter.info", true); |
|
1350 pref("devtools.webconsole.filter.log", true); |
|
1351 pref("devtools.webconsole.filter.secerror", true); |
|
1352 pref("devtools.webconsole.filter.secwarn", true); |
|
1353 |
|
1354 // Remember the Browser Console filters |
|
1355 pref("devtools.browserconsole.filter.network", true); |
|
1356 pref("devtools.browserconsole.filter.networkinfo", false); |
|
1357 pref("devtools.browserconsole.filter.netwarn", true); |
|
1358 pref("devtools.browserconsole.filter.csserror", true); |
|
1359 pref("devtools.browserconsole.filter.cssparser", false); |
|
1360 pref("devtools.browserconsole.filter.csslog", false); |
|
1361 pref("devtools.browserconsole.filter.exception", true); |
|
1362 pref("devtools.browserconsole.filter.jswarn", true); |
|
1363 pref("devtools.browserconsole.filter.jslog", true); |
|
1364 pref("devtools.browserconsole.filter.error", true); |
|
1365 pref("devtools.browserconsole.filter.warn", true); |
|
1366 pref("devtools.browserconsole.filter.info", true); |
|
1367 pref("devtools.browserconsole.filter.log", true); |
|
1368 pref("devtools.browserconsole.filter.secerror", true); |
|
1369 pref("devtools.browserconsole.filter.secwarn", true); |
|
1370 |
|
1371 // Text size in the Web Console. Use 0 for the system default size. |
|
1372 pref("devtools.webconsole.fontSize", 0); |
|
1373 |
|
1374 // Persistent logging: |true| if you want the Web Console to keep all of the |
|
1375 // logged messages after reloading the page, |false| if you want the output to |
|
1376 // be cleared each time page navigation happens. |
|
1377 pref("devtools.webconsole.persistlog", false); |
|
1378 |
|
1379 // Web Console timestamp: |true| if you want the logs and instructions |
|
1380 // in the Web Console to display a timestamp, or |false| to not display |
|
1381 // any timestamps. |
|
1382 pref("devtools.webconsole.timestampMessages", false); |
|
1383 |
|
1384 // The number of lines that are displayed in the web console for the Net, |
|
1385 // CSS, JS and Web Developer categories. |
|
1386 pref("devtools.hud.loglimit.network", 200); |
|
1387 pref("devtools.hud.loglimit.cssparser", 200); |
|
1388 pref("devtools.hud.loglimit.exception", 200); |
|
1389 pref("devtools.hud.loglimit.console", 200); |
|
1390 |
|
1391 // By how many times eyedropper will magnify pixels |
|
1392 pref("devtools.eyedropper.zoom", 6); |
|
1393 |
|
1394 // The developer tools editor configuration: |
|
1395 // - tabsize: how many spaces to use when a Tab character is displayed. |
|
1396 // - expandtab: expand Tab characters to spaces. |
|
1397 // - keymap: which keymap to use (can be 'default', 'emacs' or 'vim') |
|
1398 // - autoclosebrackets: whether to permit automatic bracket/quote closing. |
|
1399 // - detectindentation: whether to detect the indentation from the file |
|
1400 pref("devtools.editor.tabsize", 2); |
|
1401 pref("devtools.editor.expandtab", true); |
|
1402 pref("devtools.editor.keymap", "default"); |
|
1403 pref("devtools.editor.autoclosebrackets", true); |
|
1404 pref("devtools.editor.detectindentation", true); |
|
1405 |
|
1406 // Enable the Font Inspector |
|
1407 pref("devtools.fontinspector.enabled", true); |
|
1408 |
|
1409 // Pref to store the browser version at the time of a telemetry ping for an |
|
1410 // opened developer tool. This allows us to ping telemetry just once per browser |
|
1411 // version for each user. |
|
1412 pref("devtools.telemetry.tools.opened.version", "{}"); |
|
1413 |
|
1414 // Whether the character encoding menu is under the main Firefox button. This |
|
1415 // preference is a string so that localizers can alter it. |
|
1416 pref("browser.menu.showCharacterEncoding", "chrome://browser/locale/browser.properties"); |
|
1417 |
|
1418 // Allow using tab-modal prompts when possible. |
|
1419 pref("prompts.tab_modal.enabled", true); |
|
1420 // Whether the Panorama should animate going in/out of tabs |
|
1421 pref("browser.panorama.animate_zoom", true); |
|
1422 |
|
1423 // Defines the url to be used for new tabs. |
|
1424 pref("browser.newtab.url", "about:newtab"); |
|
1425 // Activates preloading of the new tab url. |
|
1426 pref("browser.newtab.preload", true); |
|
1427 |
|
1428 // Toggles the content of 'about:newtab'. Shows the grid when enabled. |
|
1429 pref("browser.newtabpage.enabled", true); |
|
1430 |
|
1431 // number of rows of newtab grid |
|
1432 pref("browser.newtabpage.rows", 3); |
|
1433 |
|
1434 // number of columns of newtab grid |
|
1435 pref("browser.newtabpage.columns", 3); |
|
1436 |
|
1437 pref("browser.newtabpage.directorySource", "data:application/json,{}"); |
|
1438 |
|
1439 // Enable the DOM fullscreen API. |
|
1440 pref("full-screen-api.enabled", true); |
|
1441 |
|
1442 // True if the fullscreen API requires approval upon a domain entering fullscreen. |
|
1443 // Domains that have already had fullscreen permission granted won't re-request |
|
1444 // approval. |
|
1445 pref("full-screen-api.approval-required", true); |
|
1446 |
|
1447 // Startup Crash Tracking |
|
1448 // number of startup crashes that can occur before starting into safe mode automatically |
|
1449 // (this pref has no effect if more than 6 hours have passed since the last crash) |
|
1450 pref("toolkit.startup.max_resumed_crashes", 3); |
|
1451 |
|
1452 // Completely disable pdf.js as an option to preview pdfs within firefox. |
|
1453 // Note: if this is not disabled it does not necessarily mean pdf.js is the pdf |
|
1454 // handler just that it is an option. |
|
1455 pref("pdfjs.disabled", false); |
|
1456 // Used by pdf.js to know the first time firefox is run with it installed so it |
|
1457 // can become the default pdf viewer. |
|
1458 pref("pdfjs.firstRun", true); |
|
1459 // The values of preferredAction and alwaysAskBeforeHandling before pdf.js |
|
1460 // became the default. |
|
1461 pref("pdfjs.previousHandler.preferredAction", 0); |
|
1462 pref("pdfjs.previousHandler.alwaysAskBeforeHandling", false); |
|
1463 |
|
1464 #ifdef NIGHTLY_BUILD |
|
1465 // Shumway component (SWF player) is disabled by default. Also see bug 904346. |
|
1466 pref("shumway.disabled", true); |
|
1467 #endif |
|
1468 |
|
1469 // The maximum amount of decoded image data we'll willingly keep around (we |
|
1470 // might keep around more than this, but we'll try to get down to this value). |
|
1471 // (This is intentionally on the high side; see bug 746055.) |
|
1472 pref("image.mem.max_decoded_image_kb", 256000); |
|
1473 |
|
1474 // Default social providers |
|
1475 pref("social.manifest.facebook", "{\"origin\":\"https://www.facebook.com\",\"name\":\"Facebook Share\",\"shareURL\":\"https://www.facebook.com/sharer/sharer.php?u=%{url}\",\"iconURL\":\"data:image/x-icon;base64,iVBORw0KGgoAAAANSUhEUgAAABAAAAAQCAYAAAAf8%2F9hAAAAX0lEQVQ4jWP4%2F%2F8%2FAyUYTFhHzjgDxP9JxGeQDSBVMxgTbUBCxer%2Fr999%2BQ8DJBuArJksA9A10s8AXIBoA0B%2BR%2FY%2FjD%2BEwoBoA1yT5v3PbdmCE8MAshhID%2FUMoDgzUYIBj0Cgi7ar4coAAAAASUVORK5CYII%3D\",\"icon32URL\":\"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAACXBIWXMAAAsTAAALEwEAmpwYAAADbklEQVRYCc1Xv08UQRj99tctexAuCEFjRE0kGBEtLDSGqIWNxkYKbTAxNlY2JhaGWltNtNFeKgsKKxITK43/gCYW+IsoRhA4D47bH7fn9+bcvdm5JR7sefolC3Ozu9978+bNN7PayUv3HN3umdY0Y6IWBtSJ0HSTarXqTOiuTep6Lj+tdxAcA8RAgSmwdd2aCDs0clldYALb/FvgYVhjmfliVA2XpjEgWo0Attn42Z6WH1RFor5ehwo9XQIUZMoVn4qlCoVMSo62EvD8Kh0b3U2Xz43R2PBO6mUCGDlAf65V6MadZzT/rUimoccc2kYA4BfPHqJb105RzjJigKhRq9kEJUBIjgYVuXeL7SAI6eD+Abp5dTwVHOmEHxT50d8WBYJqSOdPj5BjW8gZR8UNqFR2xagx/65XFYaMH+BGWwiYpi4UkBPPLxTp9v1Z+lHc4DWvCQXWmIy6EjITgKowVd5Jjv7N3Hd6y5esigoOwpkJIAmMpZpLJGdiaaC4F0UmAj6bD84GCEwmB/qxMmRilmnwb/mpjAocHh4UEoNAt5NLZB7oy9OJo0PxqkAtePdhiSqunyC1LQUwWMPQaOr6GRre258Ajn4cP7KHcEXhsxpXbj+lT19X2TMNGTLVAcjcalS8gDwsQ2UOMhH4k8FkcrEn5E5ub2sKohxLK2VR77Hl9RUcsrgeRIEiVOT6z+tDbIeLy+vk+kGTCbXxycet6xhl//3f6bJEkdHYhA+mLtDIvoH4ieev5+juoxdk5+pjhALYEdXIpEB5w+NlSKSzqVQ/+H7IO6BLtl3fngGMiqhGJgIwlM6qpyUGFjySdk8m0Zg0ubeD7X9OIDEFajltRQgUJaUKx69tdgaQa0FMADuahZPMFtcEwNPm2hA7ZI5sK4aoE2NvYI+o8hkCIe7CwTv68zS0q9Dk5vpbm/8FXxitSzmMFHpsGj0wyLUheTwD2Y9fVgh1Ae0EPUgD9241ZEnld+v5kgnVZ/8fE0brVh5BK+1oCqKKF72Dk7HwBsssB/pklU1dfChy3S659H5+uelgIb+8WRv1/uGTV9Sdb5wJFlfW6fPCalMhwhSU1j2xKwKbP838GcOwJja4TqO0bjdmXxYTy1EYjFdCWoCEYZhseH/GDL3yJPHnuW6YmT7P1SlIA4768Hke4vOcsX8BE346lLHhDUQAAAAASUVORK5CYII=\", \"icon64URL\":\"data:image/png;base64,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\", \"description\":\"Easily share the web to your Facebook friends.\",\"author\":\"Facebook\",\"homepageURL\":\"https://www.facebook.com\",\"builtin\":\"true\",\"version\":1}"); |
|
1476 |
|
1477 pref("social.sidebar.unload_timeout_ms", 10000); |
|
1478 |
|
1479 pref("dom.identity.enabled", false); |
|
1480 |
|
1481 // Turn on the CSP 1.0 parser for Content Security Policy headers |
|
1482 pref("security.csp.speccompliant", true); |
|
1483 |
|
1484 // Block insecure active content on https pages |
|
1485 pref("security.mixed_content.block_active_content", true); |
|
1486 |
|
1487 // 1 = allow MITM for certificate pinning checks. |
|
1488 pref("security.cert_pinning.enforcement_level", 1); |
|
1489 |
|
1490 // Override the Gecko-default value of false for Firefox. |
|
1491 pref("plain_text.wrap_long_lines", true); |
|
1492 |
|
1493 // If this turns true, Moz*Gesture events are not called stopPropagation() |
|
1494 // before content. |
|
1495 pref("dom.debug.propagate_gesture_events_through_content", false); |
|
1496 |
|
1497 // The request URL of the GeoLocation backend. |
|
1498 pref("geo.wifi.uri", "https://www.googleapis.com/geolocation/v1/geolocate?key=%GOOGLE_API_KEY%"); |
|
1499 #ifdef RELEASE_BUILD |
|
1500 pref("geo.wifi.logging.enabled", false); |
|
1501 #else |
|
1502 pref("geo.wifi.logging.enabled", true); |
|
1503 #endif |
|
1504 |
|
1505 // Necko IPC security checks only needed for app isolation for cookies/cache/etc: |
|
1506 // currently irrelevant for desktop e10s |
|
1507 pref("network.disable.ipc.security", true); |
|
1508 |
|
1509 // CustomizableUI debug logging. |
|
1510 pref("browser.uiCustomization.debug", false); |
|
1511 |
|
1512 // CustomizableUI state of the browser's user interface |
|
1513 pref("browser.uiCustomization.state", ""); |
|
1514 |
|
1515 // The remote content URL shown for FxA signup. Must use HTTPS. |
|
1516 pref("identity.fxaccounts.remote.signup.uri", "https://accounts.firefox.com/signup?service=sync&context=fx_desktop_v1"); |
|
1517 |
|
1518 // The URL where remote content that forces re-authentication for Firefox Accounts |
|
1519 // should be fetched. Must use HTTPS. |
|
1520 pref("identity.fxaccounts.remote.force_auth.uri", "https://accounts.firefox.com/force_auth?service=sync&context=fx_desktop_v1"); |
|
1521 |
|
1522 // The remote content URL shown for signin in. Must use HTTPS. |
|
1523 pref("identity.fxaccounts.remote.signin.uri", "https://accounts.firefox.com/signin?service=sync&context=fx_desktop_v1"); |
|
1524 |
|
1525 // The URL we take the user to when they opt to "manage" their Firefox Account. |
|
1526 // Note that this will always need to be in the same TLD as the |
|
1527 // "identity.fxaccounts.remote.signup.uri" pref. |
|
1528 pref("identity.fxaccounts.settings.uri", "https://accounts.firefox.com/settings"); |
|
1529 |
|
1530 // On GTK, we now default to showing the menubar only when alt is pressed: |
|
1531 #ifdef MOZ_WIDGET_GTK |
|
1532 pref("ui.key.menuAccessKeyFocuses", true); |
|
1533 #endif |
|
1534 |
|
1535 |
|
1536 // Delete HTTP cache v2 data of users that didn't opt-in manually |
|
1537 pref("browser.cache.auto_delete_cache_version", 1); |
|
1538 // Play with different values of the decay time and get telemetry, |
|
1539 // 0 means to randomize (and persist) the experiment value in users' profiles, |
|
1540 // -1 means no experiment is run and we use the preferred value for frecency (6h) |
|
1541 pref("browser.cache.frecency_experiment", 0); |
|
1542 |
|
1543 pref("browser.translation.detectLanguage", false); |
|
1544 |
|
1545 // Telemetry experiments settings. |
|
1546 pref("experiments.enabled", true); |
|
1547 pref("experiments.manifest.fetchIntervalSeconds", 86400); |
|
1548 pref("experiments.manifest.uri", "https://telemetry-experiment.cdn.mozilla.net/manifest/v1/firefox/%VERSION%/%CHANNEL%"); |
|
1549 pref("experiments.manifest.certs.1.commonName", "*.cdn.mozilla.net"); |
|
1550 pref("experiments.manifest.certs.1.issuerName", "CN=Cybertrust Public SureServer SV CA,O=Cybertrust Inc"); |
|
1551 // Whether experiments are supported by the current application profile. |
|
1552 pref("experiments.supported", true); |