summaryrefslogtreecommitdiffstats
path: root/comm/mail/extensions/am-e2e/prefs/e2e-prefs.js
diff options
context:
space:
mode:
Diffstat (limited to 'comm/mail/extensions/am-e2e/prefs/e2e-prefs.js')
-rw-r--r--comm/mail/extensions/am-e2e/prefs/e2e-prefs.js285
1 files changed, 285 insertions, 0 deletions
diff --git a/comm/mail/extensions/am-e2e/prefs/e2e-prefs.js b/comm/mail/extensions/am-e2e/prefs/e2e-prefs.js
new file mode 100644
index 0000000000..1a88003a75
--- /dev/null
+++ b/comm/mail/extensions/am-e2e/prefs/e2e-prefs.js
@@ -0,0 +1,285 @@
+#filter dumbComments emptyLines substitution
+
+// This Source Code Form is subject to the terms of the Mozilla Public
+// License, v. 2.0. If a copy of the MPL was not distributed with this
+// file, You can obtain one at http://mozilla.org/MPL/2.0/.
+
+//
+// Prefs shared by OpenPGP and S/MIME
+//
+
+pref("mail.identity.default.encryptionpolicy", 0);
+pref("mail.identity.default.sign_mail", false);
+
+//
+// S/MIME prefs
+//
+
+pref("mail.identity.default.encryption_cert_name", "");
+pref("mail.identity.default.signing_cert_name", "");
+
+//
+// OpenPGP prefs
+//
+
+pref("openpgp.loglevel", "Warn");
+
+// If true, we allow the use of GnuPG for OpenPGP secret key operations
+pref("mail.openpgp.allow_external_gnupg", false);
+// If allow_external_gnupg is true: Optionally use a different gpg executable
+pref("mail.openpgp.alternative_gpg_path", "");
+// The hexadecimal OpenPGP key ID used for an identity.
+pref("mail.identity.default.openpgp_key_id", "");
+// If true, then openpgp_key_id is managed externally by GnuPG
+pref("mail.identity.default.is_gnupg_key_id", false);
+// The hexadecimal OpenPGP key ID externally configured by GnuPG used for an identity.
+pref("mail.identity.default.last_entered_external_gnupg_key_id", "");
+// When using external GnuPG, also load public keys from GnuPG keyring
+pref("mail.openpgp.fetch_pubkeys_from_gnupg", false);
+
+// When sending an OpenPGP message that is both signed and encrypted,
+// it's possible to use one combined MIME layer, or separate layers.
+pref("mail.openpgp.separate_mime_layers", false);
+
+// Load a JSON file that contains recipient key alias rules. See bug 1644085.
+// Suggested filename: openpgp-alias-rules.json
+// Simple filenames (without path) are loaded from the profile directory.
+// If you need to specify a path, use a file:// URL
+pref("mail.openpgp.alias_rules_file", "");
+
+pref("mail.openpgp.key_assistant.enable", true);
+
+// If set to true, enable user interface that allows the user to optionally set
+// and manage individual, user-defined passphrases for OpenPGP secret keys.
+// If set to false, the respective user interface will be hidden.
+// Even when set to true, the user may decide to use the original approach
+// for OpenPGP key protection (using the global primary password or none),
+// by selecting the respective choices in the user interface.
+// Note, if a user sets an user-defined passphrase while this this setting
+// is true, and then switches this setting to false, the keys will keep
+// the user-defined passphrase protection. The application will still prompt
+// to unlock the key using the user-defined passphrase whenever necessary.
+pref("mail.openpgp.passphrases.enabled", false);
+
+// Automatically enable encryption if S/MIME certificates or OpenPGP keys are
+// available for all recipients, and thus encryption is possible.
+// This pref is only about enabling, and doesn't control automatic disabling.
+pref("mail.e2ee.auto_enable", false);
+
+// If end-to-end encryption with S/MIME or OpenPGP is enabled,
+// and the user adds another recipient with unavailable certificate or key,
+// and this preference is true, then automatically disable encryption.
+// This pref is dangerous, and it is recommended to always keep it at false.
+// If you change the pref to true, the user might assume that encryption
+// is still enabled, and might not notice that encryption gets disabled.
+// There is an exception: If encryption was enabled, because the message
+// refers to an existing encrypted conversation (e.g. replying to an
+// encrypted message), this preference is ignored, encryption will
+// remain on. It isn't possible to override that behavior.
+// Note that encryption will never be disabled automatically on sending,
+// only when the list of recipients is changed.
+// If mail.e2ee.auto_enable is false, then mail.e2ee.auto_disable
+// will be ignored.
+pref("mail.e2ee.auto_disable", false);
+
+// If end-to-end encryption gets automatically disabled, inform the user
+// using a prompt.
+pref("mail.e2ee.notify_on_auto_disable", true);
+
+// If false, disable the reminder in composer, whether email could be
+// sent with OpenPGP encryption (without further user actions/decisions).
+pref("mail.openpgp.remind_encryption_possible", true);
+
+// If false, disable the reminder in composer, whether email could be
+// sent with S/MIME encryption (without further user actions/decisions).
+pref("mail.smime.remind_encryption_possible", true);
+
+pref("mail.smime.accept_insecure_sha1_message_signatures", false);
+
+// When sending, encrypt to this additional key. Not available in release channel builds.
+pref("mail.openpgp.debug.extra_encryption_key", "");
+
+// Hide prefs and menu entries from non-advanced users
+pref("temp.openpgp.advancedUser", false);
+
+// ** enigmail keySel preferences:
+// use rules to assign keys
+pref("temp.openpgp.assignKeysByRules", true);
+// use email addresses to assign keys
+pref("temp.openpgp.assignKeysByEmailAddr", true);
+// use manual dialog to assign missing keys
+pref("temp.openpgp.assignKeysManuallyIfMissing", true);
+// always srats manual dialog for keys
+pref("temp.openpgp.assignKeysManuallyAlways", false);
+
+// enable automatically decrypt/verify
+pref("temp.openpgp.autoDecrypt", true);
+
+// countdown for alerts when composing inline PGP HTML msgs
+pref("temp.openpgp.composeHtmlAlertCount", 3);
+
+// show warning message when clicking on sign icon
+pref("temp.openpgp.displaySignWarn", true);
+
+// try to match secondary uid to from address
+pref("temp.openpgp.displaySecondaryUid", true);
+
+// treat '-- ' as signature separator
+pref("temp.openpgp.doubleDashSeparator", true);
+
+// skip the attachments dialog
+pref("temp.openpgp.encryptAttachmentsSkipDlg", 0);
+
+// Encrypt to self
+pref("temp.openpgp.encryptToSelf", true);
+
+// enable 'Decrypt & open' for double click on attachment (if possible)
+pref("temp.openpgp.handleDoubleClick", true);
+
+// disable '<' and '>' around email addresses
+pref("temp.openpgp.hushMailSupport", false);
+
+// use -a for encrypting attachments for inline PGP
+pref("temp.openpgp.inlineAttachAsciiArmor", false);
+
+// extension to append for inline-encrypted attachments
+pref("temp.openpgp.inlineAttachExt", ".pgp");
+
+// extension to append for inline-signed attachments
+pref("temp.openpgp.inlineSigAttachExt", ".sig");
+
+// debug log directory (if set, also enabled debugging)
+pref("temp.openpgp.logDirectory", "");
+
+// List of key servers to use (comma separated list), ordered by priority.
+// Only the first supported keyserver will be used for uploading keys.
+pref("mail.openpgp.keyserver_list", "vks://keys.openpgp.org, hkps://keys.mailvelope.com");
+
+// keep passphrase for ... minutes
+pref("temp.openpgp.maxIdleMinutes", 5);
+
+// maximum number of parallel decrypt processes that Enigmaik will handle
+// (requests above the threshold are ignored)
+pref("temp.openpgp.maxNumProcesses", 3);
+
+// GnuPG hash algorithm
+// 0: automatic seletion (i.e. let GnuPG choose)
+// 1: SHA1, 2: RIPEMD160, 3: SHA256, 4: SHA384, 5: SHA512, 6: SHA224
+pref("temp.openpgp.mimeHashAlgorithm", 0);
+
+// no passphrase for GnuPG key needed
+pref("temp.openpgp.noPassphrase", false);
+
+// show quoted printable warning message (and remember selected state)
+pref("temp.openpgp.quotedPrintableWarn", 0);
+
+// use http proxy settings as set in Mozilla/Thunderbird
+pref("temp.openpgp.respectHttpProxy", true);
+
+// selection for which encryption model to prefer
+// 0: convenient encryption settings DEFAULT
+// 1: manual encryption settings
+pref("temp.openpgp.encryptionModel", 0);
+
+// enable encryption for replies to encrypted mails
+pref("temp.openpgp.keepSettingsForReply", true);
+
+// holds the last result of the dayily key expiry check
+pref("temp.openpgp.keyCheckResult", "");
+
+// selection for automatic send encrypted if all keys valid
+// 0: never
+// 1: if all keys found and accepted DEFAULT
+pref("temp.openpgp.autoSendEncrypted", 1);
+
+// enable automatic lookup of keys using Web Key Directory (WKD)
+// (see https://tools.ietf.org/html/draft-koch-openpgp-webkey-service)
+// 0: no
+// 1: yes DEFAULT
+pref("temp.openpgp.autoWkdLookup", 1);
+
+// ask to confirm before sending
+// 0: never DEFAULT
+// 1: always
+// 2: if send encrypted
+// 3: if send unencrypted
+// 4: if send (un)encrypted due to rules
+pref("temp.openpgp.confirmBeforeSending", 0);
+
+// show "Missing Trust in own keys" message (and remember selected state)
+pref("temp.openpgp.warnOnMissingOwnerTrust", true);
+
+// use GnuPG's default instead of Enigmail/Mozilla comment of for signed messages
+pref("temp.openpgp.useDefaultComment", true);
+
+// allow encryption to newsgroups
+pref("temp.openpgp.encryptToNews", false);
+pref("temp.openpgp.warnOnSendingNewsgroups", true);
+
+// holds the timestamp of the last check for GnuPG updates
+pref("temp.openpgp.gpgLastUpdate", "0");
+
+// set locale for GnuPG calls to en-US (Windows only)
+pref("temp.openpgp.gpgLocaleEn", true);
+
+// use PGP/MIME (0=never, 1=allow, 2=always)
+// pref("temp.openpgp.usePGPMimeOption",1); -- OBSOLETE, see mail.identity.default.pgpMimeMode
+
+// show "conflicting rules" message (and remember selected state)
+pref("temp.openpgp.warnOnRulesConflict", 0);
+
+// display a warning when the passphrase is cleared
+pref("temp.openpgp.warnClearPassphrase", true);
+
+// display a warning if the GnuPG version is deprecated
+pref("temp.openpgp.warnDeprecatedGnuPG", true);
+
+// warn if gpg-agent is found and "remember passphrase for X minutes is active"
+pref("temp.openpgp.warnGpgAgentAndIdleTime", true);
+
+// display a warning when the keys for all contacts are downloaded
+pref("temp.openpgp.warnDownloadContactKeys", true);
+
+// wrap HTML messages before sending inline PGP messages
+pref("temp.openpgp.wrapHtmlBeforeSend", true);
+
+// do reset the "references" and "in-reply-to" headers?
+pref("temp.openpgp.protectReferencesHdr", false);
+
+// tor configuration
+pref("temp.openpgp.torIpAddr", "127.0.0.1");
+pref("temp.openpgp.torServicePort", "9050");
+pref("temp.openpgp.torBrowserBundlePort", "9150");
+
+// gpg tor actions
+pref("temp.openpgp.downloadKeyWithTor", false);
+pref("temp.openpgp.downloadKeyRequireTor", false);
+pref("temp.openpgp.searchKeyWithTor", false);
+pref("temp.openpgp.searchKeyRequireTor", false);
+pref("temp.openpgp.uploadKeyWithTor", false);
+pref("temp.openpgp.uploadKeyRequireTor", false);
+
+// enable experimental features.
+// WARNING: such features may unfinished functions or tests that can break
+// existing functionality in Enigmail and Thunderbird!
+pref("temp.openpgp.enableExperiments", false);
+
+
+// Default pref values for the enigmail per-identity
+// settings
+
+pref("mail.identity.default.sendAutocryptHeaders", true);
+pref("mail.identity.default.attachPgpKey", true);
+pref("mail.identity.default.autoEncryptDrafts", true);
+pref("mail.identity.default.protectSubject", true);
+
+// 0 selected automatically, 1 prefer S/MIME, 2 prefer OpenPGP
+pref("mail.identity.default.e2etechpref", 0);
+
+//
+// Other settings (change Mozilla behaviour)
+//
+
+// disable flowed text by default
+// TODO: pref("mailnews.send_plaintext_flowed", false);
+