From 3a80194f2543259f2752d900e050fd2022ee415c Mon Sep 17 00:00:00 2001 From: wicknix <39230578+wicknix@users.noreply.github.com> Date: Sat, 18 Dec 2021 14:12:37 -0600 Subject: [PATCH] Adjust prefs --- browser/app/profile/firefox.js | 11019 ++++++++++++++++++++++++++----- 1 file changed, 9374 insertions(+), 1645 deletions(-) diff --git a/browser/app/profile/firefox.js b/browser/app/profile/firefox.js index ff5cd9f37..be794f843 100644 --- a/browser/app/profile/firefox.js +++ b/browser/app/profile/firefox.js @@ -1,1645 +1,9374 @@ -# -*- indent-tabs-mode: nil; js-indent-level: 2 -*- -# This Source Code Form is subject to the terms of the Mozilla Public -# License, v. 2.0. If a copy of the MPL was not distributed with this -# file, You can obtain one at http://mozilla.org/MPL/2.0/. - -// XXX Toolkit-specific preferences should be moved into toolkit.js - -#filter substitution - -# -# SYNTAX HINTS: -# -# - Dashes are delimiters; use underscores instead. -# - The first character after a period must be alphabetic. -# - Computed values (e.g. 50 * 1024) don't work. -# - -#ifdef XP_UNIX -#ifndef XP_MACOSX -#define UNIX_BUT_NOT_MAC -#endif -#endif - -pref("browser.chromeURL","chrome://browser/content/"); -pref("browser.hiddenWindowChromeURL", "chrome://browser/content/hiddenWindow.xul"); - -// Enables some extra Extension System Logging (can reduce performance) -pref("extensions.logging.enabled", false); - -// Disables strict compatibility, making addons compatible-by-default. -pref("extensions.strictCompatibility", false); - -// Specifies a minimum maxVersion an addon needs to say it's compatible with -// for it to be compatible by default. -pref("extensions.minCompatibleAppVersion", "4.0"); -// Temporary preference to forcibly make themes more safe with Australis even if -// extensions.checkCompatibility=false has been set. -pref("extensions.checkCompatibility.temporaryThemeOverride_minAppVersion", "38.0"); - -pref("xpinstall.customConfirmationUI", true); - -// Preferences for AMO integration -// AMO is dead, and Basilisk addons site has blocked 3rd party browsers -pref("extensions.getAddons.cache.enabled", true); -pref("extensions.getAddons.maxResults", 15); -pref("extensions.getAddons.get.url", ""); -pref("extensions.getAddons.getWithPerformance.url", ""); -pref("extensions.getAddons.search.browseURL", ""); -pref("extensions.getAddons.search.url", ""); -pref("extensions.webservice.discoverURL", ""); -pref("extensions.getAddons.recommended.url", ""); -pref("extensions.getAddons.link.url", ""); - -// Blocklist preferences -pref("extensions.blocklist.enabled", false); -// OneCRL freshness checking depends on this value, so if you change it, -// please also update security.onecrl.maximum_staleness_in_seconds. -pref("extensions.blocklist.interval", 86400); -// Controls what level the blocklist switches from warning about items to forcibly -// blocking them. -pref("extensions.blocklist.level", 2); -pref("extensions.blocklist.url", ""); -pref("extensions.blocklist.detailsURL", ""); -pref("extensions.blocklist.itemURL", ""); - -pref("extensions.update.autoUpdateDefault", true); - -pref("extensions.hotfix.id", "firefox-hotfix@mozilla.org"); -pref("extensions.hotfix.cert.checkAttributes", true); -pref("extensions.hotfix.certs.1.sha1Fingerprint", "91:53:98:0C:C1:86:DF:47:8F:35:22:9E:11:C9:A7:31:04:49:A1:AA"); -pref("extensions.hotfix.certs.2.sha1Fingerprint", "39:E7:2B:7A:5B:CF:37:78:F9:5D:4A:E0:53:2D:2F:3D:68:53:C5:60"); - -// Check AUS for system add-on updates. -pref("extensions.systemAddon.update.url", ""); - -// Disable add-ons that are not installed by the user in all scopes by default. -// See the SCOPE constants in AddonManager.jsm for values to use here. -pref("extensions.autoDisableScopes", 15); - -// Require signed add-ons by default -// ... except on TenFourFox -pref("xpinstall.signatures.required", false); -pref("xpinstall.signatures.devInfoURL", ""); - -// Dictionary download preference -pref("browser.dictionaries.download.url", "https://repository.binaryoutcast.com/dicts/"); - -// At startup, should we check to see if the installation -// date is older than some threshold -pref("app.update.checkInstallTime", false); - -// The number of days a binary is permitted to be old without checking is defined in -// firefox-branding.js (app.update.checkInstallTime.days) - -// The minimum delay in seconds for the timer to fire. -// default=2 minutes -pref("app.update.timerMinimumDelay", 120); - -// App-specific update preferences - -// The interval to check for updates (app.update.interval) is defined in -// firefox-branding.js - -// Alternative windowtype for an application update user interface window. When -// a window with this windowtype is open the application update service won't -// open the normal application update user interface window. -pref("app.update.altwindowtype", "Browser:About"); - -// Enables some extra Application Update Logging (can reduce performance) -pref("app.update.log", false); - -// The number of general background check failures to allow before notifying the -// user of the failure. User initiated update checks always notify the user of -// the failure. -pref("app.update.backgroundMaxErrors", 10); - -// The aus update xml certificate checks for application update are disabled on -// Windows, Mac OS X, and Linux since the mar signature check are implemented on -// these platforms and is sufficient to prevent us from applying a mar that is -// not valid. Bug 1182352 will remove the update xml certificate checks and the -// following two preferences. -pref("app.update.cert.requireBuiltIn", false); -pref("app.update.cert.checkAttributes", false); - -// Whether or not app updates are enabled -pref("app.update.enabled", false); - -// This preference turns on app.update.mode and allows automatic download and -// install to take place. We use a separate boolean toggle for this to make -// the UI easier to construct. -pref("app.update.auto", false); - -// See chart in nsUpdateService.js source for more details -pref("app.update.mode", 2); - -// If set to true, the Update Service will present no UI for any event. -pref("app.update.silent", true); - -// If set to true, the hamburger button will show badges for update events. -#ifndef RELEASE_BUILD -pref("app.update.badge", true); -#else -pref("app.update.badge", false); -#endif -// app.update.badgeWaitTime is in branding section - -// If set to true, the Update Service will apply updates in the background -// when it finishes downloading them. -pref("app.update.staging.enabled", false); - -// Update service URL: -pref("app.update.url", ""); -// app.update.url.manual is in branding section -// app.update.url.details is in branding section - -// User-settable override to app.update.url for testing purposes. -//pref("app.update.url.override", ""); - -// app.update.interval is in branding section -// app.update.promptWaitTime is in branding section - -// Show the Update Checking/Ready UI when the user was idle for x seconds -pref("app.update.idletime", 60); - -// Whether or not we show a dialog box informing the user that the update was -// successfully applied. This is off in Firefox by default since we show a -// upgrade start page instead! Other apps may wish to show this UI, and supply -// a whatsNewURL field in their brand.properties that contains a link to a page -// which tells users what's new in this new update. -pref("app.update.showInstalledUI", false); - -// 0 = suppress prompting for incompatibilities if there are updates available -// to newer versions of installed addons that resolve them. -// 1 = suppress prompting for incompatibilities only if there are VersionInfo -// updates available to installed addons that resolve them, not newer -// versions. -pref("app.update.incompatible.mode", 0); - -// Whether or not to attempt using the service for updates. -#ifdef MOZ_MAINTENANCE_SERVICE -pref("app.update.service.enabled", false); -#endif - -// Symmetric (can be overridden by individual extensions) update preferences. -// e.g. -// extensions.{GUID}.update.enabled -// extensions.{GUID}.update.url -// .. etc .. -// -pref("extensions.update.enabled", false); -pref("extensions.update.url", ""); -pref("extensions.update.background.url", ""); -pref("extensions.update.interval", 86400); // Check for updates to Extensions and - // Themes every day -// Non-symmetric (not shared by extensions) extension-specific [update] preferences -pref("extensions.dss.enabled", false); // Dynamic Skin Switching -pref("extensions.dss.switchPending", false); // Non-dynamic switch pending after next - // restart. - -pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.name", "chrome://browser/locale/browser.properties"); -pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.description", "chrome://browser/locale/browser.properties"); - -pref("lightweightThemes.update.enabled", false); -pref("lightweightThemes.getMoreURL", ""); -pref("lightweightThemes.recommendedThemes", "" -pref("browser.eme.ui.enabled", false); - -// UI tour experience. -pref("browser.uitour.enabled", false); -pref("browser.uitour.loglevel", "Error"); -pref("browser.uitour.requireSecure", true); -pref("browser.uitour.themeOrigin", ""); -pref("browser.uitour.url", ""); -// This is used as a regexp match against the page's URL. -pref("browser.uitour.readerViewTrigger", "^https:\\/\\/www\\.mozilla\\.org\\/[^\\/]+\\/firefox\\/reading\\/start"); - -pref("browser.customizemode.tip0.shown", false); -pref("browser.customizemode.tip0.learnMoreUrl", ""); - -pref("keyword.enabled", true); -pref("browser.fixup.domainwhitelist.localhost", true); - -pref("general.useragent.locale", "@AB_CD@"); -pref("general.skins.selectedSkin", "classic/1.0"); - -// too slow on TenFourFox -pref("general.smoothScroll", false); -#ifdef UNIX_BUT_NOT_MAC -pref("general.autoScroll", false); -#else -pref("general.autoScroll", true); -#endif - -// At startup, check if we're the default browser and prompt user if not. -pref("browser.shell.checkDefaultBrowser", true); -pref("browser.shell.shortcutFavicons",true); -pref("browser.shell.mostRecentDateSetAsDefault", ""); -pref("browser.shell.skipDefaultBrowserCheck", true); -pref("browser.shell.defaultBrowserCheckCount", 0); - -// 0 = blank, 1 = home (browser.startup.homepage), 2 = last visited page, 3 = resume previous browser session -// The behavior of option 3 is detailed at: http://wiki.mozilla.org/Session_Restore -pref("browser.startup.page", 1); -pref("browser.startup.homepage", "chrome://branding/locale/browserconfig.properties"); - -pref("browser.slowStartup.notificationDisabled", true); // STFU! -pref("browser.slowStartup.timeThreshold", 40000); -pref("browser.slowStartup.maxSamples", 5); - -// This url, if changed, MUST continue to point to an https url. Pulling arbitrary content to inject into -// this page over http opens us up to a man-in-the-middle attack that we'd rather not face. If you are a downstream -// repackager of this code using an alternate snippet url, please keep your users safe -// We will use duckduckgo as a placeholder -pref("browser.aboutHomeSnippets.updateUrl", "https://duckduckgo.com"); - -pref("browser.enable_automatic_image_resizing", true); -pref("browser.casting.enabled", false); -pref("browser.chrome.site_icons", true); -pref("browser.chrome.favicons", true); -// browser.warnOnQuit == false will override all other possible prompts when quitting or restarting -pref("browser.warnOnQuit", true); -// browser.showQuitWarning specifically controls the quit warning dialog. We -// might still show the window closing dialog with showQuitWarning == false. -pref("browser.showQuitWarning", false); -pref("browser.fullscreen.autohide", true); -pref("browser.fullscreen.animate", true); -pref("browser.overlink-delay", 80); - -#ifdef UNIX_BUT_NOT_MAC -pref("browser.urlbar.clickSelectsAll", false); -#else -pref("browser.urlbar.clickSelectsAll", true); -#endif -#ifdef UNIX_BUT_NOT_MAC -pref("browser.urlbar.doubleClickSelectsAll", true); -#else -pref("browser.urlbar.doubleClickSelectsAll", false); -#endif - -// Control autoFill behavior -pref("browser.urlbar.autoFill", true); -pref("browser.urlbar.autoFill.typed", true); - -pref("browser.urlbar.unifiedcomplete", true); - -// 0: Match anywhere (e.g., middle of words) -// 1: Match on word boundaries and then try matching anywhere -// 2: Match only on word boundaries (e.g., after / or .) -// 3: Match at the beginning of the url or title -pref("browser.urlbar.matchBehavior", 1); -pref("browser.urlbar.filter.javascript", true); - -// the maximum number of results to show in autocomplete when doing richResults -pref("browser.urlbar.maxRichResults", 6); -// The amount of time (ms) to wait after the user has stopped typing -// before starting to perform autocomplete. 50 is the default set in -// autocomplete.xml. -pref("browser.urlbar.delay", 250); - -// The special characters below can be typed into the urlbar to either restrict -// the search to visited history, bookmarked, tagged pages; or force a match on -// just the title text or url. -pref("browser.urlbar.restrict.history", "^"); -pref("browser.urlbar.restrict.bookmark", "*"); -pref("browser.urlbar.restrict.tag", "+"); -pref("browser.urlbar.restrict.openpage", "%"); -pref("browser.urlbar.restrict.typed", "~"); -pref("browser.urlbar.restrict.searches", "$"); -pref("browser.urlbar.match.title", "#"); -pref("browser.urlbar.match.url", "@"); - -// The default behavior for the urlbar can be configured to use any combination -// of the match filters with each additional filter adding more results (union). -pref("browser.urlbar.suggest.history", false); -pref("browser.urlbar.suggest.bookmark", true); -pref("browser.urlbar.suggest.openpage", false); -pref("browser.urlbar.suggest.searches", false); -pref("browser.urlbar.userMadeSearchSuggestionsChoice", false); - -// Limit the number of characters sent to the current search engine to fetch -// suggestions. -pref("browser.urlbar.maxCharsForSearchSuggestions", 20); - -// Restrictions to current suggestions can also be applied (intersection). -// Typed suggestion works only if history is set to true. -pref("browser.urlbar.suggest.history.onlyTyped", false); - -pref("browser.urlbar.formatting.enabled", true); -pref("browser.urlbar.trimURLs", false); - -pref("browser.altClickSave", false); - -// Enable logging downloads operations to the Console. -pref("browser.download.loglevel", "Error"); - -// Number of milliseconds to wait for the http headers (and thus -// the Content-Disposition filename) before giving up and falling back to -// picking a filename without that info in hand so that the user sees some -// feedback from their action. -pref("browser.download.saveLinkAsFilenameTimeout", 4000); - -pref("browser.download.useDownloadDir", true); -pref("browser.download.folderList", 1); -pref("browser.download.manager.addToRecentDocs", true); -pref("browser.download.manager.resumeOnWakeDelay", 10000); - -// This allows disabling the animated notifications shown by -// the Downloads Indicator when a download starts or completes. -pref("browser.download.animateNotifications", true); - -// This records whether or not the panel has been shown at least once. -pref("browser.download.panel.shown", false); - -#ifndef XP_MACOSX -pref("browser.helperApps.deleteTempFileOnExit", true); -#endif - -// search engines URL -pref("browser.search.searchEnginesURL", "https://addons.basilisk-browser.org/search-plugins/"); - -// pointer to the default engine name -pref("browser.search.defaultenginename", "chrome://browser-region/locale/region.properties"); - -// Ordering of Search Engines in the Engine list. -pref("browser.search.order.1", "chrome://browser-region/locale/region.properties"); -pref("browser.search.order.2", "chrome://browser-region/locale/region.properties"); -pref("browser.search.order.3", "chrome://browser-region/locale/region.properties"); - -// Market-specific search defaults -// This is disabled globally, and then enabled for individual locales -// in firefox-l10n.js (eg. it's enabled for en-US). -pref("browser.search.geoSpecificDefaults", false); -pref("browser.search.geoSpecificDefaults.url", ""); - -// US specific default (used as a fallback if the geoSpecificDefaults request fails). -pref("browser.search.defaultenginename.US", "data:text/plain,browser.search.defaultenginename.US=Yahoo"); -pref("browser.search.order.US.1", "data:text/plain,browser.search.order.US.1=Yahoo"); -pref("browser.search.order.US.2", "data:text/plain,browser.search.order.US.2=Google"); -pref("browser.search.order.US.3", "data:text/plain,browser.search.order.US.3=Bing"); - -// search bar results always open in a new tab -pref("browser.search.openintab", false); - -// context menu searches open in the foreground -pref("browser.search.context.loadInBackground", false); - -// comma seperated list of of engines to hide in the search panel. -pref("browser.search.hiddenOneOffs", ""); - -#ifdef XP_WIN -pref("browser.search.redirectWindowsSearch", true); -#else -pref("browser.search.redirectWindowsSearch", false); -#endif - -pref("browser.usedOnWindows10", false); -pref("browser.usedOnWindows10.introURL", "https://www.mozilla.org/%LOCALE%/firefox/windows-10/welcome/?utm_source=firefox-browser&utm_medium=firefox-browser"); - -pref("browser.sessionhistory.max_entries", 50); - -// Built-in default permissions. -pref("permissions.manager.defaultsUrl", "resource://app/defaults/permissions"); - -// handle links targeting new windows -// 1=current window/tab, 2=new window, 3=new tab in most recent window -pref("browser.link.open_newwindow", 3); - -// handle external links (i.e. links opened from a different application) -// default: use browser.link.open_newwindow -// 1-3: see browser.link.open_newwindow for interpretation -pref("browser.link.open_newwindow.override.external", -1); - -// 0: no restrictions - divert everything -// 1: don't divert window.open at all -// 2: don't divert window.open with features -pref("browser.link.open_newwindow.restriction", 2); - -// If true, this pref causes windows opened by window.open to be forced into new -// tabs (rather than potentially opening separate windows, depending on -// window.open arguments) when the browser is in fullscreen mode. -// We set this differently on Mac because the fullscreen implementation there is -// different. -#ifdef XP_MACOSX -pref("browser.link.open_newwindow.disabled_in_fullscreen", true); -#else -pref("browser.link.open_newwindow.disabled_in_fullscreen", false); -#endif - -// Tabbed browser -pref("browser.tabs.closeWindowWithLastTab", true); -pref("browser.tabs.insertRelatedAfterCurrent", true); -pref("browser.tabs.warnOnClose", true); -pref("browser.tabs.warnOnCloseOtherTabs", true); -pref("browser.tabs.warnOnOpen", true); -pref("browser.tabs.maxOpenBeforeWarn", 15); -pref("browser.tabs.loadInBackground", true); -pref("browser.tabs.opentabfor.middleclick", true); -pref("browser.tabs.loadDivertedInBackground", false); -pref("browser.tabs.loadBookmarksInBackground", false); -pref("browser.tabs.tabClipWidth", 140); -pref("browser.tabs.animate", true); -#ifdef UNIX_BUT_NOT_MAC -pref("browser.tabs.drawInTitlebar", false); -#else -pref("browser.tabs.drawInTitlebar", true); -#endif - -// When tabs opened by links in other tabs via a combination of -// browser.link.open_newwindow being set to 3 and target="_blank" etc are -// closed: -// true return to the tab that opened this tab (its owner) -// false return to the adjacent tab (old default) -pref("browser.tabs.selectOwnerOnClose", true); - -pref("browser.tabs.showAudioPlayingIcon", true); - -pref("browser.tabs.dontfocusfordialogs", true); - -pref("browser.ctrlTab.previews", false); - -// By default, do not export HTML at shutdown. -// If true, at shutdown the bookmarks in your menu and toolbar will -// be exported as HTML to the bookmarks.html file. -pref("browser.bookmarks.autoExportHTML", false); - -// The maximum number of daily bookmark backups to -// keep in {PROFILEDIR}/bookmarkbackups. Special values: -// -1: unlimited -// 0: no backups created (and deletes all existing backups) -pref("browser.bookmarks.max_backups", 15); - -// Scripts & Windows prefs -pref("dom.disable_open_during_load", true); -pref("javascript.options.showInConsole", true); -#ifdef DEBUG -pref("general.warnOnAboutConfig", false); -#endif - -// This is the pref to control the location bar, change this to true to -// force this - this makes the origin of popup windows more obvious to avoid -// spoofing. We would rather not do it by default because it affects UE for web -// applications, but without it there isn't a really good way to prevent chrome -// spoofing, see bug 337344 -pref("dom.disable_window_open_feature.location", true); -// prevent JS from setting status messages -pref("dom.disable_window_status_change", true); -// allow JS to move and resize existing windows -pref("dom.disable_window_move_resize", false); -// prevent JS from monkeying with window focus, etc -pref("dom.disable_window_flip", true); - -// popups.policy 1=allow,2=reject -pref("privacy.popups.policy", 1); -pref("privacy.popups.usecustom", true); -pref("privacy.popups.showBrowserMessage", true); - -pref("privacy.item.cookies", false); - -pref("privacy.clearOnShutdown.history", true); -pref("privacy.clearOnShutdown.formdata", true); -pref("privacy.clearOnShutdown.downloads", true); -pref("privacy.clearOnShutdown.cookies", true); -pref("privacy.clearOnShutdown.cache", true); -pref("privacy.clearOnShutdown.sessions", true); -pref("privacy.clearOnShutdown.offlineApps", false); -pref("privacy.clearOnShutdown.siteSettings", false); -pref("privacy.clearOnShutdown.openWindows", false); - -pref("privacy.cpd.history", true); -pref("privacy.cpd.formdata", true); -pref("privacy.cpd.passwords", false); -pref("privacy.cpd.downloads", true); -pref("privacy.cpd.cookies", true); -pref("privacy.cpd.cache", true); -pref("privacy.cpd.sessions", true); -pref("privacy.cpd.offlineApps", false); -pref("privacy.cpd.siteSettings", false); -pref("privacy.cpd.openWindows", false); - -// What default should we use for the time span in the sanitizer: -// 0 - Clear everything -// 1 - Last Hour -// 2 - Last 2 Hours -// 3 - Last 4 Hours -// 4 - Today -// 5 - Last 5 minutes -// 6 - Last 24 hours -pref("privacy.sanitize.timeSpan", 1); -pref("privacy.sanitize.sanitizeOnShutdown", false); - -pref("privacy.sanitize.migrateFx3Prefs", false); - -pref("privacy.sanitize.migrateClearSavedPwdsOnExit", false); - -pref("privacy.panicButton.enabled", true); - -pref("network.proxy.share_proxy_settings", false); // use the same proxy settings for all protocols - -// simple gestures support -pref("browser.gesture.swipe.left", "Browser:BackOrBackDuplicate"); -pref("browser.gesture.swipe.right", "Browser:ForwardOrForwardDuplicate"); -pref("browser.gesture.swipe.up", "cmd_scrollTop"); -pref("browser.gesture.swipe.down", "cmd_scrollBottom"); -#ifdef XP_MACOSX -pref("browser.gesture.pinch.latched", true); -pref("browser.gesture.pinch.threshold", 150); -#else -pref("browser.gesture.pinch.latched", false); -pref("browser.gesture.pinch.threshold", 25); -#endif -#ifdef XP_WIN -// Enabled for touch input display zoom. -pref("browser.gesture.pinch.out", "cmd_fullZoomEnlarge"); -pref("browser.gesture.pinch.in", "cmd_fullZoomReduce"); -pref("browser.gesture.pinch.out.shift", "cmd_fullZoomReset"); -pref("browser.gesture.pinch.in.shift", "cmd_fullZoomReset"); -#else -// Disabled by default due to issues with track pad input. -pref("browser.gesture.pinch.out", ""); -pref("browser.gesture.pinch.in", ""); -pref("browser.gesture.pinch.out.shift", ""); -pref("browser.gesture.pinch.in.shift", ""); -#endif -pref("browser.gesture.twist.latched", false); -pref("browser.gesture.twist.threshold", 0); -pref("browser.gesture.twist.right", "cmd_gestureRotateRight"); -pref("browser.gesture.twist.left", "cmd_gestureRotateLeft"); -pref("browser.gesture.twist.end", "cmd_gestureRotateEnd"); -pref("browser.gesture.tap", "cmd_fullZoomReset"); - -pref("browser.snapshots.limit", 0); - -// 0: Nothing happens -// 1: Scrolling contents -// 2: Go back or go forward, in your history -// 3: Zoom in or out. -#ifdef XP_MACOSX -// On OS X, if the wheel has one axis only, shift+wheel comes through as a -// horizontal scroll event. Thus, we can't assign anything other than normal -// scrolling to shift+wheel. -pref("mousewheel.with_alt.action", 2); -pref("mousewheel.with_shift.action", 1); -// On MacOS X, control+wheel is typically handled by system and we don't -// receive the event. So, command key which is the main modifier key for -// acceleration is the best modifier for zoom-in/out. However, we should keep -// the control key setting for backward compatibility. -pref("mousewheel.with_meta.action", 3); // command key on Mac -// Disable control-/meta-modified horizontal mousewheel events, since -// those are used on Mac as part of modified swipe gestures (e.g. -// Left swipe+Cmd = go back in a new tab). -pref("mousewheel.with_control.action.override_x", 0); -pref("mousewheel.with_meta.action.override_x", 0); -#else -pref("mousewheel.with_alt.action", 1); -pref("mousewheel.with_shift.action", 2); -pref("mousewheel.with_meta.action", 1); // win key on Win, Super/Hyper on Linux -#endif -pref("mousewheel.with_control.action",3); -pref("mousewheel.with_win.action", 1); - -pref("browser.xul.error_pages.enabled", true); -pref("browser.xul.error_pages.expert_bad_cert", false); - -// If true, network link events will change the value of navigator.onLine -pref("network.manage-offline-status", true); - -// We want to make sure mail URLs are handled externally... -pref("network.protocol-handler.external.mailto", true); // for mail -pref("network.protocol-handler.external.news", true); // for news -pref("network.protocol-handler.external.snews", true); // for secure news -pref("network.protocol-handler.external.nntp", true); // also news -#ifdef XP_WIN -pref("network.protocol-handler.external.ms-windows-store", true); -#endif - -// ...without warning dialogs -pref("network.protocol-handler.warn-external.mailto", false); -pref("network.protocol-handler.warn-external.news", false); -pref("network.protocol-handler.warn-external.snews", false); -pref("network.protocol-handler.warn-external.nntp", false); -#ifdef XP_WIN -pref("network.protocol-handler.warn-external.ms-windows-store", false); -#endif - -// By default, all protocol handlers are exposed. This means that -// the browser will respond to openURL commands for all URL types. -// It will also try to open link clicks inside the browser before -// failing over to the system handlers. -pref("network.protocol-handler.expose-all", true); -pref("network.protocol-handler.expose.mailto", false); -pref("network.protocol-handler.expose.news", false); -pref("network.protocol-handler.expose.snews", false); -pref("network.protocol-handler.expose.nntp", false); - -pref("accessibility.typeaheadfind", false); -pref("accessibility.typeaheadfind.timeout", 5000); -pref("accessibility.typeaheadfind.linksonly", false); -pref("accessibility.typeaheadfind.flashBar", 1); - -// Tracks when accessibility is loaded into the previous session. -pref("accessibility.loadedInLastSession", false); - -pref("plugins.update.url", ""); -pref("plugins.update.notifyUser", false); - -pref("plugins.click_to_play", true); -pref("plugins.testmode", false); - -pref("plugin.default.state", 1); - -// Plugins bundled in XPIs are enabled by default. -pref("plugin.defaultXpi.state", 2); - -// Flash is enabled by default, and Java is click-to-activate by default on -// all channels. -pref("plugin.state.flash", 2); -pref("plugin.state.java", 1); - -// Whitelist Requests - -// Unity player, bug 979849 -#ifdef XP_WIN -pref("plugin.state.npunity3d", 2); -#endif -#ifdef XP_MACOSX -pref("plugin.state.unity web player", 2); -#endif - -// Cisco Jabber SDK, bug 980133 -#ifdef XP_WIN -pref("plugin.state.npciscowebcommunicator", 2); -#endif -#ifdef XP_MACOSX -pref("plugin.state.ciscowebcommunicator", 2); -#endif - -// McAfee Security Scanner detection plugin, bug 980772 -#ifdef XP_WIN -pref("plugin.state.npmcafeemss", 2); -#endif - -// Cisco VGConnect for directv.com, bug 981403 & bug 1051772 -#ifdef XP_WIN -pref("plugin.state.npplayerplugin", 2); -#endif -#ifdef XP_MACOSX -pref("plugin.state.playerplugin", 2); -pref("plugin.state.playerplugin.dtv", 2); -pref("plugin.state.playerplugin.ciscodrm", 2); -pref("plugin.state.playerplugin.charter", 2); -#endif - -// Cisco Jabber Client, bug 981905 -#ifdef XP_WIN -pref("plugin.state.npchip", 2); -#endif -#ifdef XP_MACOSX -pref("plugin.state.cisco jabber guest plug-in", 2); -#endif - -// Estonian ID-card plugin, bug 982045 -#ifdef XP_WIN -pref("plugin.state.npesteid-firefox-plugin", 2); -#endif -#ifdef XP_MACOSX -pref("plugin.state.esteidfirefoxplugin", 2); -#endif -#ifdef UNIX_BUT_NOT_MAC -pref("plugin.state.npesteid-firefox-plugin", 2); -#endif - -// coupons.com, bug 984441 -#ifdef XP_WIN -pref("plugin.state.npmozcouponprinter", 2); -#endif -#ifdef XP_MACOSX -pref("plugin.state.couponprinter-firefox_v", 2); -#endif - -// Nexus Personal BankID, bug 987056 -pref("plugin.state.npbispbrowser", 2); - -// Gradecam, bug 988119 -#ifdef XP_WIN -pref("plugin.state.npgcplugin", 2); -#endif -#ifdef XP_MACOSX -pref("plugin.state.gcplugin", 2); -#endif - -// Smart Card Plugin, bug 988781 -#ifdef XP_WIN -pref("plugin.state.npwebcard", 2); -#endif - -// Cisco WebEx, bug 989096 -#ifdef XP_WIN -pref("plugin.state.npatgpc", 2); -#endif -#ifdef XP_MACOSX -pref("plugin.state.webex", 2); -#endif -#ifdef UNIX_BUT_NOT_MAC -pref("plugin.state.npatgpc", 2); -#endif - -// Skype, bug 990067 -#ifdef XP_WIN -pref("plugin.state.npskypewebplugin", 2); -#endif -#ifdef XP_MACOSX -pref("plugin.state.skypewebplugin", 2); -#endif - -// Facebook video calling, bug 990068 -#ifdef XP_WIN -pref("plugin.state.npfacebookvideocalling", 2); -#endif -#ifdef XP_MACOSX -pref("plugin.state.facebookvideocalling", 2); -#endif - -// MS Office Lync plugin, bug 990069 -#ifdef XP_WIN -pref("plugin.state.npmeetingjoinpluginoc", 2); -#endif -#ifdef XP_MACOSX -pref("plugin.state.lwaplugin", 2); -#endif - -// VidyoWeb, bug 990286 -#ifdef XP_WIN -pref("plugin.state.npvidyoweb", 2); -#endif -#ifdef XP_MACOSX -pref("plugin.state.npvidyoweb", 2); -pref("plugin.state.vidyoweb", 2); -#endif - -// McAfee Virtual Technician, bug 981503 -#ifdef XP_WIN -pref("plugin.state.npmvtplugin", 2); -#endif - -// Verimatrix ViewRightWeb, bug 989872 -#ifdef XP_WIN -pref("plugin.state.npviewright", 2); -#endif -#ifdef XP_MACOSX -pref("plugin.state.viewrightwebplayer", 2); -#endif - -// McAfee SiteAdvisor Enterprise, bug 987057 -#ifdef XP_WIN -pref("plugin.state.npmcffplg", 2); -#endif - -// F5 Networks SSLVPN plugin, bug 985640 -#ifdef XP_MACOSX -pref("plugin.state.f5 ssl vpn plugin", 2); -pref("plugin.state.f5 sam inspection host plugin", 2); -#endif - -// Roblox Launcher Plugin, bug 1024073 -#ifdef XP_WIN -pref("plugin.state.nprobloxproxy", 2); -#endif -#ifdef XP_MACOSX -pref("plugin.state.nproblox", 2); -#endif - -// Box Edit, bug 1029654 -#ifdef XP_WIN -pref("plugin.state.npboxedit", 2); -#endif -#ifdef XP_MACOSX -pref("plugin.state.box edit", 2); -#endif - -// Nexus Personal, bug 1024965 -#ifdef XP_WIN -pref("plugin.state.np_prsnl", 2); -#endif -#ifdef XP_MACOSX -pref("plugin.state.personalplugin", 2); -#endif -#ifdef UNIX_BUT_NOT_MAC -pref("plugin.state.libplugins", 2); -#endif - -// Novell iPrint Client, bug 1036693 -#ifdef XP_WIN -pref("plugin.state.npnipp", 2); -pref("plugin.state.npnisp", 2); -#endif -#ifdef XP_MACOSX -pref("plugin.state.iprint", 2); -#endif - -#ifdef XP_MACOSX -pref("browser.preferences.animateFadeIn", false); -#else -pref("browser.preferences.animateFadeIn", false); -#endif - -#ifdef XP_WIN -pref("browser.preferences.instantApply", false); -#else -pref("browser.preferences.instantApply", true); -#endif - -pref("browser.download.show_plugins_in_list", true); -pref("browser.download.hide_plugins_without_extensions", true); - -// Backspace and Shift+Backspace behavior -// 0 goes Back/Forward -// 1 act like PgUp/PgDown -// 2 and other values, nothing -#ifdef UNIX_BUT_NOT_MAC -pref("browser.backspace_action", 2); -#else -pref("browser.backspace_action", 0); -#endif - -// this will automatically enable inline spellchecking (if it is available) for -// editable elements in HTML -// 0 = spellcheck nothing -// 1 = check multi-line controls [default] -// 2 = check multi/single line controls -pref("layout.spellcheckDefault", 1); - -pref("browser.send_pings", false); - -/* initial web feed readers list */ -pref("browser.contentHandlers.types.0.title", "chrome://browser-region/locale/region.properties"); -pref("browser.contentHandlers.types.0.uri", "chrome://browser-region/locale/region.properties"); -pref("browser.contentHandlers.types.0.type", "application/vnd.mozilla.maybe.feed"); -pref("browser.contentHandlers.types.1.title", "chrome://browser-region/locale/region.properties"); -pref("browser.contentHandlers.types.1.uri", "chrome://browser-region/locale/region.properties"); -pref("browser.contentHandlers.types.1.type", "application/vnd.mozilla.maybe.feed"); -pref("browser.contentHandlers.types.2.title", "chrome://browser-region/locale/region.properties"); -pref("browser.contentHandlers.types.2.uri", "chrome://browser-region/locale/region.properties"); -pref("browser.contentHandlers.types.2.type", "application/vnd.mozilla.maybe.feed"); -pref("browser.contentHandlers.types.3.title", "chrome://browser-region/locale/region.properties"); -pref("browser.contentHandlers.types.3.uri", "chrome://browser-region/locale/region.properties"); -pref("browser.contentHandlers.types.3.type", "application/vnd.mozilla.maybe.feed"); -pref("browser.contentHandlers.types.4.title", "chrome://browser-region/locale/region.properties"); -pref("browser.contentHandlers.types.4.uri", "chrome://browser-region/locale/region.properties"); -pref("browser.contentHandlers.types.4.type", "application/vnd.mozilla.maybe.feed"); -pref("browser.contentHandlers.types.5.title", "chrome://browser-region/locale/region.properties"); -pref("browser.contentHandlers.types.5.uri", "chrome://browser-region/locale/region.properties"); -pref("browser.contentHandlers.types.5.type", "application/vnd.mozilla.maybe.feed"); - -pref("browser.feeds.handler", "ask"); -pref("browser.videoFeeds.handler", "ask"); -pref("browser.audioFeeds.handler", "ask"); - -// At startup, if the handler service notices that the version number in the -// region.properties file is newer than the version number in the handler -// service datastore, it will add any new handlers it finds in the prefs (as -// seeded by this file) to its datastore. -pref("gecko.handlerService.defaultHandlersVersion", "chrome://browser-region/locale/region.properties"); - -// The default set of web-based protocol handlers shown in the application -// selection dialog for webcal: ; I've arbitrarily picked 4 default handlers -// per protocol, but if some locale wants more than that (or defaults for some -// protocol not currently listed here), we should go ahead and add those. - -// webcal -pref("gecko.handlerService.schemes.webcal.0.name", "chrome://browser-region/locale/region.properties"); -pref("gecko.handlerService.schemes.webcal.0.uriTemplate", "chrome://browser-region/locale/region.properties"); -pref("gecko.handlerService.schemes.webcal.1.name", "chrome://browser-region/locale/region.properties"); -pref("gecko.handlerService.schemes.webcal.1.uriTemplate", "chrome://browser-region/locale/region.properties"); -pref("gecko.handlerService.schemes.webcal.2.name", "chrome://browser-region/locale/region.properties"); -pref("gecko.handlerService.schemes.webcal.2.uriTemplate", "chrome://browser-region/locale/region.properties"); -pref("gecko.handlerService.schemes.webcal.3.name", "chrome://browser-region/locale/region.properties"); -pref("gecko.handlerService.schemes.webcal.3.uriTemplate", "chrome://browser-region/locale/region.properties"); - -// mailto -pref("gecko.handlerService.schemes.mailto.0.name", "chrome://browser-region/locale/region.properties"); -pref("gecko.handlerService.schemes.mailto.0.uriTemplate", "chrome://browser-region/locale/region.properties"); -pref("gecko.handlerService.schemes.mailto.1.name", "chrome://browser-region/locale/region.properties"); -pref("gecko.handlerService.schemes.mailto.1.uriTemplate", "chrome://browser-region/locale/region.properties"); -pref("gecko.handlerService.schemes.mailto.2.name", "chrome://browser-region/locale/region.properties"); -pref("gecko.handlerService.schemes.mailto.2.uriTemplate", "chrome://browser-region/locale/region.properties"); -pref("gecko.handlerService.schemes.mailto.3.name", "chrome://browser-region/locale/region.properties"); -pref("gecko.handlerService.schemes.mailto.3.uriTemplate", "chrome://browser-region/locale/region.properties"); - -// irc -pref("gecko.handlerService.schemes.irc.0.name", "chrome://browser-region/locale/region.properties"); -pref("gecko.handlerService.schemes.irc.0.uriTemplate", "chrome://browser-region/locale/region.properties"); -pref("gecko.handlerService.schemes.irc.1.name", "chrome://browser-region/locale/region.properties"); -pref("gecko.handlerService.schemes.irc.1.uriTemplate", "chrome://browser-region/locale/region.properties"); -pref("gecko.handlerService.schemes.irc.2.name", "chrome://browser-region/locale/region.properties"); -pref("gecko.handlerService.schemes.irc.2.uriTemplate", "chrome://browser-region/locale/region.properties"); -pref("gecko.handlerService.schemes.irc.3.name", "chrome://browser-region/locale/region.properties"); -pref("gecko.handlerService.schemes.irc.3.uriTemplate", "chrome://browser-region/locale/region.properties"); - -// ircs -pref("gecko.handlerService.schemes.ircs.0.name", "chrome://browser-region/locale/region.properties"); -pref("gecko.handlerService.schemes.ircs.0.uriTemplate", "chrome://browser-region/locale/region.properties"); -pref("gecko.handlerService.schemes.ircs.1.name", "chrome://browser-region/locale/region.properties"); -pref("gecko.handlerService.schemes.ircs.1.uriTemplate", "chrome://browser-region/locale/region.properties"); -pref("gecko.handlerService.schemes.ircs.2.name", "chrome://browser-region/locale/region.properties"); -pref("gecko.handlerService.schemes.ircs.2.uriTemplate", "chrome://browser-region/locale/region.properties"); -pref("gecko.handlerService.schemes.ircs.3.name", "chrome://browser-region/locale/region.properties"); -pref("gecko.handlerService.schemes.ircs.3.uriTemplate", "chrome://browser-region/locale/region.properties"); - -// By default, we don't want protocol/content handlers to be registered from a different host, see bug 402287 -pref("gecko.handlerService.allowRegisterFromDifferentHost", false); - -#ifdef MOZ_SAFE_BROWSING -pref("browser.safebrowsing.enabled", false); -pref("browser.safebrowsing.malware.enabled", false); -pref("browser.safebrowsing.downloads.enabled", false); -pref("browser.safebrowsing.downloads.remote.enabled", false); -pref("browser.safebrowsing.downloads.remote.timeout_ms", 10000); -pref("browser.safebrowsing.debug", false); - -pref("browser.safebrowsing.provider.google.lists", "goog-badbinurl-shavar,goog-downloadwhite-digest256,goog-phish-shavar,goog-malware-shavar,goog-unwanted-shavar"); -pref("browser.safebrowsing.provider.google.updateURL", ""); -pref("browser.safebrowsing.provider.google.gethashURL", ""); -pref("browser.safebrowsing.provider.google.reportURL", ""); - -pref("browser.safebrowsing.reportPhishMistakeURL", ""); -pref("browser.safebrowsing.reportPhishURL", ""); -pref("browser.safebrowsing.reportMalwareMistakeURL", ""); -pref("browser.safebrowsing.appRepURL", ""); - -#ifdef MOZILLA_OFFICIAL -// Normally the "client ID" sent in updates is appinfo.name, but for -// official Firefox releases from Mozilla we use a special identifier. -pref("browser.safebrowsing.id", "navclient-auto-ffox"); -#endif - -// Name of the about: page contributed by safebrowsing to handle display of error -// pages on phishing/malware hits. (bug 399233) -pref("urlclassifier.alternate_error_page", "blocked"); - -// The number of random entries to send with a gethash request. -pref("urlclassifier.gethashnoise", 4); - -// Gethash timeout for Safebrowsing. -pref("urlclassifier.gethash.timeout_ms", 5000); - -// If an urlclassifier table has not been updated in this number of seconds, -// a gethash request will be forced to check that the result is still in -// the database. -pref("urlclassifier.max-complete-age", 2700); -// Tables for application reputation. -pref("urlclassifier.downloadBlockTable", "goog-badbinurl-shavar"); -#ifdef XP_WIN -// Only download the whitelist on Windows, since the whitelist is -// only useful for suppressing remote lookups for signed binaries which we can -// only verify on Windows (Bug 974579). Other platforms always do remote lookups. -pref("urlclassifier.downloadAllowTable", "goog-downloadwhite-digest256"); -#endif -#endif - -pref("browser.geolocation.warning.infoURL", ""); - -pref("browser.EULA.version", 3); -pref("browser.rights.version", 3); -pref("browser.rights.3.shown", false); - -#ifdef DEBUG -// Don't show the about:rights notification in debug builds. -pref("browser.rights.override", true); -#endif - -pref("browser.selfsupport.url", ""); - -pref("browser.sessionstore.resume_from_crash", true); -pref("browser.sessionstore.resume_session_once", false); - -// minimal interval between two save operations in milliseconds -pref("browser.sessionstore.interval", 60000); -// on which sites to save text data, POSTDATA and cookies -// 0 = everywhere, 1 = unencrypted sites, 2 = nowhere -pref("browser.sessionstore.privacy_level", 0); -// how many tabs can be reopened (per window) -pref("browser.sessionstore.max_tabs_undo", 4); -// how many windows can be reopened (per session) - on non-OS X platforms this -// pref may be ignored when dealing with pop-up windows to ensure proper startup -pref("browser.sessionstore.max_windows_undo", 2); -// number of crashes that can occur before the about:sessionrestore page is displayed -// (this pref has no effect if more than 6 hours have passed since the last crash) -pref("browser.sessionstore.max_resumed_crashes", 1); -// number of back button session history entries to restore (-1 = all of them) -pref("browser.sessionstore.max_serialize_back", 5); -// number of forward button session history entries to restore (-1 = all of them) -pref("browser.sessionstore.max_serialize_forward", 5); -// restore_on_demand overrides MAX_CONCURRENT_TAB_RESTORES (sessionstore constant) -// and restore_hidden_tabs. When true, tabs will not be restored until they are -// focused (also applies to tabs that aren't visible). When false, the values -// for MAX_CONCURRENT_TAB_RESTORES and restore_hidden_tabs are respected. -// Selected tabs are always restored regardless of this pref. -pref("browser.sessionstore.restore_on_demand", true); -// Whether to automatically restore hidden tabs (i.e., tabs in other tab groups) or not -pref("browser.sessionstore.restore_hidden_tabs", false); -// If restore_on_demand is set, pinned tabs are restored on startup by default. -// When set to true, this pref overrides that behavior, and pinned tabs will only -// be restored when they are focused. -pref("browser.sessionstore.restore_pinned_tabs_on_demand", false); -// The version at which we performed the latest upgrade backup -pref("browser.sessionstore.upgradeBackup.latestBuildID", ""); -// How many upgrade backups should be kept -pref("browser.sessionstore.upgradeBackup.maxUpgradeBackups", 3); -// End-users should not run sessionstore in debug mode -pref("browser.sessionstore.debug", false); -// Causes SessionStore to ignore non-final update messages from -// browser tabs that were not caused by a flush from the parent. -// This is a testing flag and should not be used by end-users. -pref("browser.sessionstore.debug.no_auto_updates", false); -// Forget closed windows/tabs after 24 hours -pref("browser.sessionstore.cleanup.forget_closed_after", 86400000); - -// allow META refresh by default -pref("accessibility.blockautorefresh", false); - -// Whether history is enabled or not. -pref("places.history.enabled", true); - -// the (maximum) number of the recent visits to sample -// when calculating frecency -pref("places.frecency.numVisits", 10); - -// buckets (in days) for frecency calculation -pref("places.frecency.firstBucketCutoff", 4); -pref("places.frecency.secondBucketCutoff", 14); -pref("places.frecency.thirdBucketCutoff", 31); -pref("places.frecency.fourthBucketCutoff", 90); - -// weights for buckets for frecency calculations -pref("places.frecency.firstBucketWeight", 100); -pref("places.frecency.secondBucketWeight", 70); -pref("places.frecency.thirdBucketWeight", 50); -pref("places.frecency.fourthBucketWeight", 30); -pref("places.frecency.defaultBucketWeight", 10); - -// bonus (in percent) for visit transition types for frecency calculations -pref("places.frecency.embedVisitBonus", 0); -pref("places.frecency.framedLinkVisitBonus", 0); -pref("places.frecency.linkVisitBonus", 100); -pref("places.frecency.typedVisitBonus", 2000); -pref("places.frecency.bookmarkVisitBonus", 75); -pref("places.frecency.downloadVisitBonus", 0); -pref("places.frecency.permRedirectVisitBonus", 0); -pref("places.frecency.tempRedirectVisitBonus", 0); -pref("places.frecency.defaultVisitBonus", 0); - -// bonus (in percent) for place types for frecency calculations -pref("places.frecency.unvisitedBookmarkBonus", 140); -pref("places.frecency.unvisitedTypedBonus", 200); - -// Controls behavior of the "Add Exception" dialog launched from SSL error pages -// 0 - don't pre-populate anything -// 1 - pre-populate site URL, but don't fetch certificate -// 2 - pre-populate site URL and pre-fetch certificate -pref("browser.ssl_override_behavior", 2); - -// True if the user should be prompted when a web application supports -// offline apps. -pref("browser.offline-apps.notify", true); - -// if true, use full page zoom instead of text zoom -pref("browser.zoom.full", true); - -// Whether or not to save and restore zoom levels on a per-site basis. -pref("browser.zoom.siteSpecific", true); - -// Whether or not to update background tabs to the current zoom level. -pref("browser.zoom.updateBackgroundTabs", true); - -// The breakpad report server to link to in about:crashes -pref("breakpad.reportURL", ""); - -// URL for "Learn More" for Crash Reporter -pref("toolkit.crashreporter.infoURL", - ""); - -// base URL for web-based support pages -pref("app.support.baseURL", "https://github.com/wicknix/InterWebPPC"); - -// base url for web-based feedback pages -#ifdef MOZ_DEV_EDITION -pref("app.feedback.baseURL", ""); -#else -pref("app.feedback.baseURL", "https://github.com/wicknix/InterWebPPC); -#endif - - -// Name of alternate about: page for certificate errors (when undefined, defaults to about:neterror) -pref("security.alternate_certificate_error_page", "certerror"); - -// Whether to start the private browsing mode at application startup -pref("browser.privatebrowsing.autostart", false); - -// Don't try to alter this pref, it'll be reset the next time you use the -// bookmarking dialog -pref("browser.bookmarks.editDialog.firstEditField", "namePicker"); - -pref("dom.ipc.plugins.flash.disable-protected-mode", false); - -// Feature-disable the protected-mode auto-flip -pref("browser.flash-protected-mode-flip.enable", false); - -// Whether we've already flipped protected mode automatically -pref("browser.flash-protected-mode-flip.done", false); - -pref("dom.ipc.shims.enabledWarnings", false); - -// Start the browser in e10s mode -pref("browser.tabs.remote.autostart", false); -pref("browser.tabs.remote.desktopbehavior", false); - -#if defined(XP_WIN) && defined(MOZ_SANDBOX) -// When this pref is true the Windows process sandbox will set up dummy -// interceptions and log to the browser console when calls fail in the sandboxed -// process and also if they are subsequently allowed by the broker process. -// This will require a restart. -pref("security.sandbox.windows.log", false); - -// Controls whether and how the Windows NPAPI plugin process is sandboxed. -// To get a different setting for a particular plugin replace "default", with -// the plugin's nice file name, see: nsPluginTag::GetNiceFileName. -// On windows these levels are: -// 0 - no sandbox -// 1 - sandbox with USER_NON_ADMIN access token level -// 2 - a more strict sandbox, which might cause functionality issues. This now -// includes running at low integrity. -// 3 - the strongest settings we seem to be able to use without breaking -// everything, but will probably cause some functionality restrictions -pref("dom.ipc.plugins.sandbox-level.default", 0); -#if defined(_AMD64_) -// The lines in PluginModuleParent.cpp should be changed in line with this. -pref("dom.ipc.plugins.sandbox-level.flash", 2); -#else -pref("dom.ipc.plugins.sandbox-level.flash", 0); -#endif - -#if defined(MOZ_CONTENT_SANDBOX) -// This controls the strength of the Windows content process sandbox for testing -// purposes. This will require a restart. -// On windows these levels are: -// See - security/sandbox/win/src/sandboxbroker/sandboxBroker.cpp -// SetSecurityLevelForContentProcess() for what the different settings mean. -#if defined(NIGHTLY_BUILD) -pref("security.sandbox.content.level", 2); -#else -pref("security.sandbox.content.level", 0); -#endif - -// ID (a UUID when set by gecko) that is used as a per profile suffix to a low -// integrity temp directory. -pref("security.sandbox.content.tempDirSuffix", ""); - -#if defined(MOZ_STACKWALKING) -// This controls the depth of stack trace that is logged when Windows sandbox -// logging is turned on. This is only currently available for the content -// process because the only other sandbox (for GMP) has too strict a policy to -// allow stack tracing. This does not require a restart to take effect. -pref("security.sandbox.windows.log.stackTraceDepth", 0); -#endif -#endif -#endif - -#if defined(XP_MACOSX) && defined(MOZ_SANDBOX) && defined(MOZ_CONTENT_SANDBOX) -// This pref is discussed in bug 1083344, the naming is inspired from its Windows -// counterpart, but on Mac it's an integer which means: -// 0 -> "no sandbox" -// 1 -> "an imperfect sandbox designed to allow firefox to run reasonably well" -// 2 -> "an ideal sandbox which may break many things" -// This setting is read when the content process is started. On Mac the content -// process is killed when all windows are closed, so a change will take effect -// when the 1st window is opened. -pref("security.sandbox.content.level", 0); -#endif - -// This pref governs whether we attempt to work around problems caused by -// plugins using OS calls to manipulate the cursor while running out-of- -// process. These workarounds all involve intercepting (hooking) certain -// OS calls in the plugin process, then arranging to make certain OS calls -// in the browser process. Eventually plugins will be required to use the -// NPAPI to manipulate the cursor, and these workarounds will be removed. -// See bug 621117. -#ifdef XP_MACOSX -pref("dom.ipc.plugins.nativeCursorSupport", true); -#endif - -#ifdef XP_WIN -pref("browser.taskbar.previews.enable", false); -pref("browser.taskbar.previews.max", 20); -pref("browser.taskbar.previews.cachetime", 5); -pref("browser.taskbar.lists.enabled", true); -pref("browser.taskbar.lists.frequent.enabled", true); -pref("browser.taskbar.lists.recent.enabled", false); -pref("browser.taskbar.lists.maxListItemCount", 7); -pref("browser.taskbar.lists.tasks.enabled", true); -pref("browser.taskbar.lists.refreshInSeconds", 120); -#endif - -// The sync engines to use. -pref("services.sync.registerEngines", "Bookmarks,Form,History,Password,Prefs,Tab,Addons"); -// Preferences to be synced by default -pref("services.sync.prefs.sync.accessibility.blockautorefresh", true); -pref("services.sync.prefs.sync.accessibility.browsewithcaret", true); -pref("services.sync.prefs.sync.accessibility.typeaheadfind", true); -pref("services.sync.prefs.sync.accessibility.typeaheadfind.linksonly", true); -pref("services.sync.prefs.sync.addons.ignoreUserEnabledChanges", true); -// The addons prefs related to repository verification are intentionally -// not synced for security reasons. If a system is compromised, a user -// could weaken the pref locally, install an add-on from an untrusted -// source, and this would propagate automatically to other, -// uncompromised Sync-connected devices. -pref("services.sync.prefs.sync.app.update.mode", true); -pref("services.sync.prefs.sync.browser.formfill.enable", true); -pref("services.sync.prefs.sync.browser.link.open_newwindow", true); -pref("services.sync.prefs.sync.browser.newtabpage.enabled", true); -pref("services.sync.prefs.sync.browser.newtabpage.enhanced", true); -pref("services.sync.prefs.sync.browser.newtabpage.pinned", true); -pref("services.sync.prefs.sync.browser.offline-apps.notify", true); -pref("services.sync.prefs.sync.browser.safebrowsing.enabled", true); -pref("services.sync.prefs.sync.browser.safebrowsing.malware.enabled", true); -pref("services.sync.prefs.sync.browser.search.update", true); -pref("services.sync.prefs.sync.browser.sessionstore.restore_on_demand", true); -pref("services.sync.prefs.sync.browser.startup.homepage", true); -pref("services.sync.prefs.sync.browser.startup.page", true); -pref("services.sync.prefs.sync.browser.tabs.loadInBackground", true); -pref("services.sync.prefs.sync.browser.tabs.warnOnClose", true); -pref("services.sync.prefs.sync.browser.tabs.warnOnOpen", true); -pref("services.sync.prefs.sync.browser.urlbar.autocomplete.enabled", true); -pref("services.sync.prefs.sync.browser.urlbar.maxRichResults", true); -pref("services.sync.prefs.sync.dom.disable_open_during_load", true); -pref("services.sync.prefs.sync.dom.disable_window_flip", true); -pref("services.sync.prefs.sync.dom.disable_window_move_resize", true); -pref("services.sync.prefs.sync.dom.event.contextmenu.enabled", true); -pref("services.sync.prefs.sync.extensions.personas.current", true); -pref("services.sync.prefs.sync.extensions.update.enabled", true); -pref("services.sync.prefs.sync.intl.accept_languages", true); -pref("services.sync.prefs.sync.javascript.enabled", true); -pref("services.sync.prefs.sync.layout.spellcheckDefault", true); -pref("services.sync.prefs.sync.lightweightThemes.selectedThemeID", true); -pref("services.sync.prefs.sync.lightweightThemes.usedThemes", true); -pref("services.sync.prefs.sync.network.cookie.cookieBehavior", true); -pref("services.sync.prefs.sync.network.cookie.lifetimePolicy", true); -pref("services.sync.prefs.sync.network.cookie.lifetime.days", true); -pref("services.sync.prefs.sync.network.cookie.thirdparty.sessionOnly", true); -pref("services.sync.prefs.sync.permissions.default.image", true); -pref("services.sync.prefs.sync.pref.advanced.images.disable_button.view_image", true); -pref("services.sync.prefs.sync.pref.advanced.javascript.disable_button.advanced", true); -pref("services.sync.prefs.sync.pref.downloads.disable_button.edit_actions", true); -pref("services.sync.prefs.sync.pref.privacy.disable_button.cookie_exceptions", true); -pref("services.sync.prefs.sync.privacy.clearOnShutdown.cache", true); -pref("services.sync.prefs.sync.privacy.clearOnShutdown.cookies", true); -pref("services.sync.prefs.sync.privacy.clearOnShutdown.downloads", true); -pref("services.sync.prefs.sync.privacy.clearOnShutdown.formdata", true); -pref("services.sync.prefs.sync.privacy.clearOnShutdown.history", true); -pref("services.sync.prefs.sync.privacy.clearOnShutdown.offlineApps", true); -pref("services.sync.prefs.sync.privacy.clearOnShutdown.sessions", true); -pref("services.sync.prefs.sync.privacy.clearOnShutdown.siteSettings", true); -pref("services.sync.prefs.sync.privacy.donottrackheader.enabled", true); -pref("services.sync.prefs.sync.privacy.sanitize.sanitizeOnShutdown", true); -pref("services.sync.prefs.sync.privacy.trackingprotection.enabled", true); -pref("services.sync.prefs.sync.privacy.trackingprotection.pbmode.enabled", true); -pref("services.sync.prefs.sync.security.OCSP.enabled", true); -pref("services.sync.prefs.sync.security.OCSP.require", true); -pref("services.sync.prefs.sync.security.default_personal_cert", true); -pref("services.sync.prefs.sync.security.tls.version.min", true); -pref("services.sync.prefs.sync.security.tls.version.max", true); -pref("services.sync.prefs.sync.signon.rememberSignons", true); -pref("services.sync.prefs.sync.spellchecker.dictionary", true); -pref("services.sync.prefs.sync.xpinstall.whitelist.required", true); - -#ifdef NIGHTLY_BUILD -pref("services.sync.syncedTabsUIRefresh", true); -#else -pref("services.sync.syncedTabsUIRefresh", false); -#endif - -// Developer edition preferences -#ifdef MOZ_DEV_EDITION -sticky_pref("lightweightThemes.selectedThemeID", "firefox-devedition@mozilla.org"); -#else -sticky_pref("lightweightThemes.selectedThemeID", ""); -#endif - -// Whether the character encoding menu is under the main Firefox button. This -// preference is a string so that localizers can alter it. -pref("browser.menu.showCharacterEncoding", "chrome://browser/locale/browser.properties"); - -// Allow using tab-modal prompts when possible. -pref("prompts.tab_modal.enabled", true); -// Whether the Panorama should animate going in/out of tabs -pref("browser.panorama.animate_zoom", true); - -// Activates preloading of the new tab url. -pref("browser.newtab.preload", true); - -// Remembers if the about:newtab intro has been shown -pref("browser.newtabpage.introShown", false); - -// Toggles the content of 'about:newtab'. Shows the grid when enabled. -pref("browser.newtabpage.enabled", true); - -// Toggles the enhanced content of 'about:newtab'. Shows sponsored tiles. -sticky_pref("browser.newtabpage.enhanced", true); - -// number of rows of newtab grid -pref("browser.newtabpage.rows", 3); - -// number of columns of newtab grid -pref("browser.newtabpage.columns", 5); - -// directory tiles download URL -pref("browser.newtabpage.directory.source", ""); - -// endpoint to send newtab click and view pings -pref("browser.newtabpage.directory.ping", ""); - -#ifndef RELEASE_BUILD -// if true, it activates the remote-hosted newtab page -pref("browser.newtabpage.remote", false); -#endif - -// Enable the DOM fullscreen API. -pref("full-screen-api.enabled", true); - -// Startup Crash Tracking -// number of startup crashes that can occur before starting into safe mode automatically -// (this pref has no effect if more than 6 hours have passed since the last crash) -pref("toolkit.startup.max_resumed_crashes", 3); - -// Completely disable pdf.js as an option to preview pdfs within firefox. -// Note: if this is not disabled it does not necessarily mean pdf.js is the pdf -// handler just that it is an option. -pref("pdfjs.disabled", false); -// Used by pdf.js to know the first time firefox is run with it installed so it -// can become the default pdf viewer. -pref("pdfjs.firstRun", true); -// The values of preferredAction and alwaysAskBeforeHandling before pdf.js -// became the default. -pref("pdfjs.previousHandler.preferredAction", 0); -pref("pdfjs.previousHandler.alwaysAskBeforeHandling", false); - -// Shumway is only bundled in Nightly. -#ifdef NIGHTLY_BUILD -pref("shumway.disabled", true); -#endif - -// The maximum amount of decoded image data we'll willingly keep around (we -// might keep around more than this, but we'll try to get down to this value). -// (This is intentionally on the high side; see bug 746055.) -pref("image.mem.max_decoded_image_kb", 256000); - -pref("social.sidebar.unload_timeout_ms", 10000); - -// Activation from inside of share panel is possible if activationPanelEnabled -// is true. Pref'd off for release while usage testing is done through beta. -pref("social.share.activationPanelEnabled", false); -pref("social.shareDirectory", "https://activations.cdn.mozilla.net/sharePanel.html"); - -pref("dom.identity.enabled", false); - -// Block insecure active content on https pages -pref("security.mixed_content.block_active_content", true); - -// Show degraded UI for http pages with password fields -#ifdef NIGHTLY_BUILD -pref("security.insecure_password.ui.enabled", true); -#else -pref("security.insecure_password.ui.enabled", false); -#endif - -// 1 = allow MITM for certificate pinning checks. -pref("security.cert_pinning.enforcement_level", 1); - -// 0 = allow SHA-1 -pref("security.pki.sha1_enforcement_level", 1); - -// Required blocklist freshness for OneCRL OCSP bypass -// (default is 1.25x extensions.blocklist.interval, or 30 hours) -pref("security.onecrl.maximum_staleness_in_seconds", 108000); - -// Override the Gecko-default value of false for Firefox. -pref("plain_text.wrap_long_lines", true); - -// If this turns true, Moz*Gesture events are not called stopPropagation() -// before content. -pref("dom.debug.propagate_gesture_events_through_content", false); - -// The request URL of the GeoLocation backend. -pref("geo.wifi.uri", ""); - -#ifdef XP_MACOSX -#ifdef RELEASE_BUILD -pref("geo.provider.use_corelocation", false); -#else -pref("geo.provider.use_corelocation", true); -#endif -#endif - -#ifdef XP_WIN -pref("geo.provider.ms-windows-location", false); -#endif - -// Necko IPC security checks only needed for app isolation for cookies/cache/etc: -// currently irrelevant for desktop e10s -pref("network.disable.ipc.security", true); - -// CustomizableUI debug logging. -pref("browser.uiCustomization.debug", false); - -// CustomizableUI state of the browser's user interface -pref("browser.uiCustomization.state", ""); - -// The remote content URL shown for FxA signup. Must use HTTPS. -pref("identity.fxaccounts.remote.signup.uri", "https://accounts.firefox.com/signup?service=sync&context=fx_desktop_v3"); - -// The URL where remote content that forces re-authentication for Firefox Accounts -// should be fetched. Must use HTTPS. -pref("identity.fxaccounts.remote.force_auth.uri", "https://accounts.firefox.com/force_auth?service=sync&context=fx_desktop_v3"); - -// The remote content URL shown for signin in. Must use HTTPS. -pref("identity.fxaccounts.remote.signin.uri", "https://accounts.firefox.com/signin?service=sync&context=fx_desktop_v3"); - -// The remote content URL where FxAccountsWebChannel messages originate. -pref("identity.fxaccounts.remote.webchannel.uri", "https://accounts.firefox.com/"); - -// The URL we take the user to when they opt to "manage" their Firefox Account. -// Note that this will always need to be in the same TLD as the -// "identity.fxaccounts.remote.signup.uri" pref. -pref("identity.fxaccounts.settings.uri", "https://accounts.firefox.com/settings"); - -// The remote URL of the FxA Profile Server -pref("identity.fxaccounts.remote.profile.uri", "https://profile.accounts.firefox.com/v1"); - -// The remote URL of the FxA OAuth Server -pref("identity.fxaccounts.remote.oauth.uri", "https://oauth.accounts.firefox.com/v1"); - -// Whether we display profile images in the UI or not. -pref("identity.fxaccounts.profile_image.enabled", true); - -// Token server used by the FxA Sync identity. -pref("identity.sync.tokenserver.uri", "https://token.services.mozilla.com/1.0/sync/1.5"); - -// URLs for promo links to mobile browsers. Note that consumers are expected to -// append a value for utm_campaign. -pref("identity.mobilepromo.android", "https://www.mozilla.org/firefox/android/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_campaign="); -pref("identity.mobilepromo.ios", "https://www.mozilla.org/firefox/ios/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_campaign="); - -// Migrate any existing Firefox Account data from the default profile to the -// Developer Edition profile. -#ifdef MOZ_DEV_EDITION -pref("identity.fxaccounts.migrateToDevEdition", true); -#else -pref("identity.fxaccounts.migrateToDevEdition", false); -#endif - -// On GTK, we now default to showing the menubar only when alt is pressed: -#ifdef MOZ_WIDGET_GTK -pref("ui.key.menuAccessKeyFocuses", true); -#endif - -// Encrypted media extensions. -pref("media.eme.enabled", true); -pref("media.eme.apiVisible", true); - -// Decode using Gecko Media Plugins in