define(function() { var config = {}; /* Select the buttons displayed on the main page to create new collaborative sessions * Existing types : pad, code, poll, slide */ config.availablePadTypes = ['drive', 'pad', 'code', 'slide', 'poll', 'whiteboard', 'file', 'todo', 'contacts']; config.registeredOnlyTypes = ['file', 'contacts']; /* Cryptpad apps use a common API to display notifications to users * by default, notifications are hidden after 5 seconds * You can change their duration here (measured in milliseconds) */ config.notificationTimeout = 5000; config.disableUserlistNotifications = false; config.hideLoadingScreenTips = false; config.enablePinning = true; config.whiteboardPalette = [ '#000000', // black '#FFFFFF', // white '#848484', // grey '#8B4513', // saddlebrown '#FF0000', // red '#FF8080', // peach? '#FF8000', // orange '#FFFF00', // yellow '#80FF80', // light green '#00FF00', // green '#00FFFF', // cyan '#008B8B', // dark cyan '#0000FF', // blue '#FF00FF', // fuschia '#FF00C0', // hot pink '#800080', // purple ]; config.enableTemplates = true; config.enableHistory = true; /* user passwords are hashed with scrypt, and salted with their username. this value will be appended to the username, causing the resulting hash to differ from other CryptPad instances if customized. This makes it such that anyone who wants to bruteforce common credentials must do so again on each CryptPad instance that they wish to attack. WARNING: this should only be set when your CryptPad instance is first created. Changing it at a later time will break logins for all existing users. */ config.loginSalt = ''; config.minimumPasswordLength = 8; config.badStateTimeout = 30000; config.applicationsIcon = { file: 'fa-file-text-o', pad: 'fa-file-word-o', code: 'fa-file-code-o', slide: 'fa-file-powerpoint-o', poll: 'fa-calendar', whiteboard: 'fa-paint-brush', todo: 'fa-tasks', contacts: 'fa-users', }; config.displayCreationScreen = false; config.disableAnonymousStore = false; return config; });