├── _config.yml ├── windows ├── de-DE │ ├── mozilla.adml │ └── thunderbird.adml ├── en-US │ ├── mozilla.adml │ └── thunderbird.adml ├── es-ES │ ├── mozilla.adml │ └── thunderbird.adml ├── it-IT │ ├── mozilla.adml │ └── thunderbird.adml ├── mozilla.admx └── thunderbird.admx ├── SECURITY.md ├── .github └── ISSUE_TEMPLATE │ ├── change-to-documentation-request.md │ ├── bug_report.md │ └── feature_request.md ├── CODE_OF_CONDUCT.md ├── README.md └── LICENSE /_config.yml: -------------------------------------------------------------------------------- 1 | theme: jekyll-theme-cayman -------------------------------------------------------------------------------- /windows/de-DE/mozilla.adml: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | Mozilla 8 | 9 | 10 | 11 | -------------------------------------------------------------------------------- /windows/en-US/mozilla.adml: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | Mozilla 8 | 9 | 10 | 11 | -------------------------------------------------------------------------------- /windows/es-ES/mozilla.adml: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | Mozilla 8 | 9 | 10 | 11 | -------------------------------------------------------------------------------- /windows/it-IT/mozilla.adml: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | Mozilla 8 | 9 | 10 | 11 | -------------------------------------------------------------------------------- /windows/mozilla.admx: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | -------------------------------------------------------------------------------- /SECURITY.md: -------------------------------------------------------------------------------- 1 | # Security Policy 2 | 3 | ## Supported Versions 4 | 5 | Use this section to tell people about which versions of your project are 6 | currently being supported with security updates. 7 | 8 | | Version | Supported | 9 | | ------- | ------------------ | 10 | | v0.5 | :white_check_mark: | 11 | | v0.4.1 | :white_check_mark: | 12 | | master | :x: | 13 | | older | :x: | 14 | 15 | ## Reporting a Vulnerability 16 | 17 | To report an issue, open a [bug issue](https://github.com/drlellinger/thunderbird-policies/issues/new?assignees=&labels=security&template=bug_report.md&title=). 18 | -------------------------------------------------------------------------------- /.github/ISSUE_TEMPLATE/change-to-documentation-request.md: -------------------------------------------------------------------------------- 1 | --- 2 | name: Change to documentation request 3 | about: Suggest a change to documentation here. 4 | title: '' 5 | labels: documentation 6 | assignees: '' 7 | 8 | --- 9 | 10 | **Is your feature request related to a problem? Please describe.** 11 | A clear and concise description of what the problem is. Ex. I'm not happy with [...] 12 | 13 | **Describe the solution you'd like** 14 | A clear and concise description of what you want to happen. 15 | 16 | **Describe alternatives you've considered** 17 | A clear and concise description of any alternative solutions or features you've considered. 18 | 19 | **Additional context** 20 | Add any other context or screenshots about the feature request here. 21 | -------------------------------------------------------------------------------- /.github/ISSUE_TEMPLATE/bug_report.md: -------------------------------------------------------------------------------- 1 | --- 2 | name: Bug report 3 | about: Create a report to help us improve 4 | title: '' 5 | labels: bug 6 | assignees: '' 7 | 8 | --- 9 | 10 | **Describe the bug** 11 | A clear and concise description of what the bug is. Remember: only bug fixing requests in scope of the policy templates. For policy engine requests please open a bug on https://bugzilla.mozilla.org/enter_bug.cgi#h=dupes%7CThunderbird 12 | 13 | **To Reproduce** 14 | Steps to reproduce the behavior: 15 | 1. Go to '...' 16 | 2. Click on '....' 17 | 3. Scroll down to '....' 18 | 4. See error 19 | 20 | **Expected behavior** 21 | A clear and concise description of what you expected to happen. 22 | 23 | **Screenshots** 24 | If applicable, add screenshots to help explain your problem. 25 | 26 | **Desktop (please complete the following information):** 27 | - Version [e.g. 68.1.2] 28 | -------------------------------------------------------------------------------- /.github/ISSUE_TEMPLATE/feature_request.md: -------------------------------------------------------------------------------- 1 | --- 2 | name: Feature request 3 | about: Suggest an feature for this project 4 | title: '' 5 | labels: enhancement 6 | assignees: '' 7 | 8 | --- 9 | 10 | **Is your feature request related to a problem? Please describe.** 11 | A clear and concise description of what the problem is. Remember: only feature requests in scope of the policy templates. For policy engine requests please open a bug on https://bugzilla.mozilla.org/enter_bug.cgi#h=dupes%7CThunderbird 12 | Ex. I'm always frustrated when [...] 13 | 14 | **Describe the solution you'd like** 15 | A clear and concise description of what you want to happen. 16 | 17 | **Describe alternatives you've considered** 18 | A clear and concise description of any alternative solutions or features you've considered. 19 | 20 | **Additional context** 21 | Add any other context or screenshots about the feature request here. 22 | -------------------------------------------------------------------------------- /CODE_OF_CONDUCT.md: -------------------------------------------------------------------------------- 1 | # Contributor Covenant Code of Conduct 2 | 3 | ## Our Pledge 4 | 5 | In the interest of fostering an open and welcoming environment, we as 6 | contributors and maintainers pledge to making participation in our project and 7 | our community a harassment-free experience for everyone, regardless of age, body 8 | size, disability, ethnicity, sex characteristics, gender identity and expression, 9 | level of experience, education, socio-economic status, nationality, personal 10 | appearance, race, religion, or sexual identity and orientation. 11 | 12 | ## Our Standards 13 | 14 | Examples of behavior that contributes to creating a positive environment 15 | include: 16 | 17 | * Using welcoming and inclusive language 18 | * Being respectful of differing viewpoints and experiences 19 | * Gracefully accepting constructive criticism 20 | * Focusing on what is best for the community 21 | * Showing empathy towards other community members 22 | 23 | Examples of unacceptable behavior by participants include: 24 | 25 | * The use of sexualized language or imagery and unwelcome sexual attention or 26 | advances 27 | * Trolling, insulting/derogatory comments, and personal or political attacks 28 | * Public or private harassment 29 | * Republishing the content of this repository without the maintainers' consent 30 | * Publishing the content of this repository without name attribution 31 | * Publishing others' private information, such as a physical or electronic 32 | address, without explicit permission 33 | * Other conduct which could reasonably be considered inappropriate in a 34 | professional setting 35 | 36 | ## Our Responsibilities 37 | 38 | Project maintainers are responsible for clarifying the standards of acceptable 39 | behavior and are expected to take appropriate and fair corrective action in 40 | response to any instances of unacceptable behavior. 41 | 42 | Project maintainers have the right and responsibility to remove, edit, or 43 | reject comments, commits, code, wiki edits, issues, and other contributions 44 | that are not aligned to this Code of Conduct, or to ban temporarily or 45 | permanently any contributor for other behaviors that they deem inappropriate, 46 | threatening, offensive, or harmful. 47 | 48 | ## Scope 49 | 50 | This Code of Conduct applies both within project spaces and in public spaces 51 | when an individual is representing the project or its community. Examples of 52 | representing a project or community include using an official project e-mail 53 | address, posting via an official social media account, or acting as an appointed 54 | representative at an online or offline event. Representation of a project may be 55 | further defined and clarified by project maintainers. 56 | 57 | ## Enforcement 58 | 59 | Instances of abusive, harassing, or otherwise unacceptable behavior may be 60 | reported by contacting the project team. All 61 | complaints will be reviewed and investigated and will result in a response that 62 | is deemed necessary and appropriate to the circumstances. The project team is 63 | obligated to maintain confidentiality with regard to the reporter of an incident. 64 | Further details of specific enforcement policies may be posted separately. 65 | 66 | Project maintainers who do not follow or enforce the Code of Conduct in good 67 | faith may face temporary or permanent repercussions as determined by other 68 | members of the project's leadership. 69 | 70 | ## Attribution 71 | 72 | This Code of Conduct is adapted from the [Contributor Covenant][homepage], version 1.4, 73 | available at https://www.contributor-covenant.org/version/1/4/code-of-conduct.html 74 | 75 | [homepage]: https://www.contributor-covenant.org 76 | 77 | For answers to common questions about this code of conduct, see 78 | https://www.contributor-covenant.org/faq 79 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | **These policies are in active development and so might contain changes that do not work with current versions of Thunderbird.** 2 | 3 | **You should use the officially released versions (https://github.com/drlellinger/thunderbird-policies/releases) if you are deploying changes.** 4 | 5 | Policies can be specified using the Group Policy templates on Windows (https://github.com/drlellinger/thunderbird-policies/tree/master/windows) 6 | 7 | | Policy Name | Description 8 | | --- | --- | 9 | | **[`AppUpdateURL`](#AppUpdateURL)** | Change the URL for application update. 10 | | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons). 11 | | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config. (Bug fixed with TB 68.1.1) 12 | | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to about:profiles. 13 | | **[`Certificates`](#certificates)** | 14 | | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator. 15 | | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Thunderbird certificate store. 16 | | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates. 17 | | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools. 18 | | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality. 19 | | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions. 20 | | **`ExtensionSettings`** | Manage all aspects of extensions. 21 | | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates. 22 | 23 | ### AppUpdateURL 24 | 25 | Change the URL for application update. 26 | 27 | **Compatibility:** Thunderbird 68\ 28 | **CCK2 Equivalent:** N/A\ 29 | **Preferences Affected:** `app.update.url` 30 | 31 | #### Windows 32 | ``` 33 | Software\Policies\Mozilla\Thunderbird\AppUpdateURL = "https://yoursite.com" 34 | ``` 35 | ### BlockAboutAddons 36 | 37 | Block access to the Add-ons Manager (about:addons). 38 | 39 | **Compatibility:** Thunderbird 68\ 40 | **CCK2 Equivalent:** `disableAddonsManager`\ 41 | **Preferences Affected:** N/A 42 | 43 | #### Windows 44 | ``` 45 | Software\Policies\Mozilla\Thunderbird\BlockAboutAddons = 0x1 | 0x0 46 | ``` 47 | ### BlockAboutConfig 48 | 49 | Block access to about:config. 50 | 51 | **Compatibility:** Thunderbird 68\ 52 | **CCK2 Equivalent:** `disableAboutConfig`\ 53 | **Preferences Affected:** N/A 54 | 55 | #### Windows 56 | ``` 57 | Software\Policies\Mozilla\Thunderbird\BlockAboutConfig = 0x1 | 0x0 58 | ``` 59 | ### BlockAboutProfiles 60 | 61 | Block access to About Profiles (about:profiles). 62 | 63 | **Compatibility:** Thunderbird 68\ 64 | **CCK2 Equivalent:** `disableAboutProfiles`\ 65 | **Preferences Affected:** N/A 66 | 67 | #### Windows 68 | ``` 69 | Software\Policies\Mozilla\Thunderbird\BlockAboutProfiles = 0x1 | 0x0 70 | ``` 71 | ### Certificates | Install 72 | 73 | Install certificates into the Thunderbird certificate store. If only a filename is specified, Thunderbird searches for the file in the following locations: 74 | 75 | - Windows 76 | - %USERPROFILE%\AppData\Local\Thunderbird\Certificates 77 | - %USERPROFILE%\AppData\Roaming\Thunderbird\Certificates 78 | 79 | Certificates are installed using the trust string `CT,CT,`. 80 | 81 | Binary (DER) and ASCII (PEM) certificates are both supported. 82 | 83 | **Compatibility:** Thunderbird 68\ 84 | **CCK2 Equivalent:** `certs.ca`\ 85 | **Preferences Affected:** N/A 86 | 87 | #### Windows 88 | ``` 89 | Software\Policies\Mozilla\Thunderbird\Certificates\Install\1 = "cert1.der" 90 | Software\Policies\Mozilla\Thunderbird\Certificates\Install\2 = "C:\Users\username\cert2.pem" 91 | ``` 92 | ### DisableAppUpdate 93 | Turn off application updates. 94 | 95 | **Compatibility:** Thunderbird 68\ 96 | **CCK2 Equivalent:** `disableThunderbirdUpdates`\ 97 | **Preferences Affected:** N/A 98 | 99 | #### Windows 100 | ``` 101 | Software\Policies\Mozilla\Thunderbird\DisableAppUpdate = 0x1 | 0x0 102 | ``` 103 | ### DisableDeveloperTools 104 | Remove access to all developer tools. 105 | 106 | **Compatibility:** Thunderbird 68\ 107 | **CCK2 Equivalent:** `removeDeveloperTools`\ 108 | **Preferences Affected:** `devtools.policy.disabled` 109 | 110 | #### Windows 111 | ``` 112 | Software\Policies\Mozilla\Thunderbird\DisableDeveloperTools = 0x1 | 0x0` 113 | ``` 114 | ### DisableMasterPasswordCreation 115 | Remove the master password functionality. 116 | 117 | **Compatibility:** Thunderbird 68\ 118 | **CCK2 Equivalent:** `noMasterPassword`\ 119 | **Preferences Affected:** N/A 120 | 121 | #### Windows 122 | ``` 123 | Software\Policies\Thunderbird\Thunderbird\DisableMasterPasswordCreation = 0x1 | 0x0 124 | ``` 125 | ### Extensions 126 | Control the installation, uninstallation and locking of extensions. 127 | 128 | `Install` is a list of URLs or native paths for extensions to be installed. 129 | 130 | `Uninstall` is a list of extension IDs that should be uninstalled if found. 131 | 132 | `Locked` is a list of extension IDs that the user cannot disable or uninstall. 133 | 134 | **Compatibility:** Thunderbird 68\ 135 | **CCK2 Equivalent:** `addons`\ 136 | **Preferences Affected:** N/A 137 | 138 | #### Windows 139 | ``` 140 | Software\Policies\Mozilla\Thunderbird\Extensions\Install\1 = "//path/to/xpi" 141 | Software\Policies\Mozilla\Thunderbird\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org" 142 | Software\Policies\Mozilla\Thunderbird\Extensions\Locked\1 = "addon_id@mozilla.org" 143 | ``` 144 | ### ExtensionUpdate 145 | Control extension updates. 146 | 147 | **Compatibility:** Thunderbird 68\ 148 | **CCK2 Equivalent:** N/A\ 149 | **Preferences Affected:** `extensions.update.enabled` 150 | 151 | #### Windows 152 | ``` 153 | Software\Policies\Mozilla\Thunderbird\ExtensionUpdate = 0x1 | 0x0 154 | ``` 155 | -------------------------------------------------------------------------------- /windows/en-US/thunderbird.adml: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | Microsoft Windows XP SP2 or later 8 | Thunderbird 68 or later 9 | Thunderbird 10 | Extensions 11 | Addons 12 | Certificates 13 | Block Add-ons Manager 14 | If this policy is enabled, the user cannot access the Add-ons Manager or about:addons. 15 | 16 | If this policy is disabled or not configured, the user can access the Add-ons Manager and about:addons. 17 | Block about:config 18 | If this policy is enabled, the user cannot access about:config. 19 | 20 | If this policy is disabled or not configured, the user can access about:config. 21 | Block about:profiles 22 | If this policy is enabled, the user cannot access about:profiles. 23 | 24 | If this policy is disabled or not configured, the user can access about:profiles. 25 | Custom Update URL 26 | If this policy is enabled, you can set a URL to an update server other than the default. This could be helpful if you run your own update server on your network. 27 | 28 | If this policy is disabled or not configured, the default update URL is used. 29 | Import Enterprise Roots 30 | If this policy is enabled, Thunderbird will read certificates from the Windows certificate store. 31 | 32 | If this policy is disabled or not configured, Thunderbird will not read certificates from the Windows certificate store. 33 | Install Certificates 34 | If this policy is enabled, Thunderbird will install the listed certificates into Thunderbird. It will look in %USERPROFILE%\AppData\Local\Thunderbird\Certificates and %USERPROFILE%\AppData\Roaming\Thunderbird\Certificates. 35 | 36 | If this policy is disabled or not configured, Thunderbird will not install additional certificates. 37 | Disable Update 38 | If this policy is enabled, Thunderbird does not receive updates. 39 | 40 | If this policy is disabled or not configured, Thunderbird receives updates. 41 | Disable Developer Tools 42 | If this policy is enabled, developer tools are not available within Thunderbird. 43 | 44 | If this policy is disabled or not configured, developer tools are available within Thunderbird. 45 | Disable Master Password Creation 46 | If this policy is enabled, users cannot create a master password. 47 | 48 | If this policy is disabled or not configured, users can create a master password. 49 | Prevent overriding certificate errors 50 | If this policy is enabled, the "Add Exception" button is not available when a certificate is invalid. This prevents the user from overriding the certificate error. 51 | 52 | If this policy is disabled or not configured, certificate errors can be overridden. 53 | Prevent overriding safe browsing errors 54 | If this policy is enabled, a user cannot bypass the warning and visit a harmful site. 55 | 56 | If this policy is disabled or not configured, a user can choose to visit a harmful site. 57 | Extensions to Install 58 | If this policy is enabled, you can specify a list of extension URLs or paths that will be installed when Thunderbird is started. 59 | Anytime this list is changed, the extensions will be reinstalled. 60 | 61 | If this policy is disabled or not configured, no extensions are installed. 62 | Extensions to Uninstall 63 | If this policy is enabled, you can specify a list of extension IDs that will be uninstalled. 64 | Anytime this list is changed, the extensions will be uninstalled. 65 | 66 | If this policy is disabled or not configured, no extensions are uninstalled. 67 | Prevent extensions from being disabled or removed 68 | If this policy is enabled, you can specify a list of extension IDs that the user will be unable to uninstall or disable. 69 | 70 | If this policy is disabled or not configured, no extensions are locked 71 | Extension Update 72 | If this policy is disabled, extensions will not be updated automatically. 73 | 74 | If this policy is enabled or not configured, extensions will be updated automatically. 75 | Extension Management 76 | If this policy is enabled, you can use JSON to describe the extension management policy. 77 | 78 | If this policy is disabled or not configured, extensions will not be managed. 79 | Proxy Settings 80 | If this policy is enabled, you can configure and lock network settings. 81 | 82 | Select the connection type and then fill in the appropriate sections. Due to a bug, you must select a value for the SOCKS proxy version. 83 | 84 | If this policy is disabled or not configured, the default network settings are used and user can change them. 85 | SOCKS v4 86 | SOCKS v5 87 | Automatic proxy configuration URL 88 | These should only be set if you selected autoConfig 89 | Proxy bypass URLs 90 | These should only be set if you selected manual proxy 91 | Connection Type 92 | No Proxy 93 | Use system proxy settings 94 | Manual proxy configuration 95 | Auto-detect proxy settings 96 | Automatic proxy configuration 97 | 98 | 99 | 100 | 101 | 102 | 103 | 104 | 105 | Don't allow proxy settings to be changed. 106 | Connection Type: 107 | 108 | HTTP Proxy: 109 | 110 | 112 | Use this proxy server for all protocols. 113 | SSL Proxy: 114 | 115 | 117 | FTP Proxy: 118 | 119 | 121 | SOCKS Host: 122 | 123 | 125 | SOCKS Version: 126 | 127 | No proxy for 128 | 129 | 131 | Example: .mozilla.org, .net.nz, 192.168.1.0/24 132 | Automatic proxy configuration URL: 133 | 134 | 136 | Do not prompt for authentication if password is saved. 137 | Proxy DNS when using SOCKS v5. 138 | 139 | 140 | 141 | 142 | 143 | 144 | 145 | 146 | 147 | 148 | 149 | 150 | 151 | -------------------------------------------------------------------------------- /windows/es-ES/thunderbird.adml: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | Microsoft Windows XP SP2 o posterior 8 | Thunderbird 68 o posterior 9 | Thunderbird 10 | Extensiones 11 | Complementos 12 | Certificados 13 | Bloquear el administrador de complementos 14 | Si esta política está habilitada, el usuario no podrá acceder al administrador de complementos o en about:addons. 15 | 16 | Si esta política está deshabilitada o no está configurada, el usuario podrá acceder al administrador de complementos o en about:addons. 17 | Bloquear about:config 18 | Si esta política está habilitada, el usuario no podrá acceder en about:config. 19 | 20 | Si esta política está deshabilitada o no está configurada, el usuario podrá acceder en about:config. 21 | Bloquear about:profiles 22 | Si esta política está habilitada, el usuario no podrá acceder en about:profiles. 23 | 24 | Si esta política está deshabilitada o no está configurada, el usuario podrá acceder en about:profiles. 25 | URL de actualización personalizada 26 | Si esta política está habilitada, podrá establecer una URL para un servidor de actualización que no sea el predeterminado. Esto podría ser útil si ejecuta su propio servidor de actualización en su red. 27 | 28 | Si esta política está deshabilitada o no está configurada, se utilizará la URL de actualización predeterminada. 29 | Importar certificados raíces 30 | Si esta política está habilitada, Thunderbird leerá los certificados del almacén de certificados de Windows. 31 | 32 | Si esta política está deshabilitada o no está configurada, Thunderbird no leerá los certificados del almacén de certificados de Windows. 33 | Instalar certificados 34 | Si esta política está habilitada, Thunderbird instalará los certificados listados en Thunderbird. Se verá en %USERPROFILE%\AppData\Local\Thunderbird\Certificates and %USERPROFILE%\AppData\Roaming\Thunderbird\Certificates. 35 | 36 | Si esta política está deshabilitada o no está configurada, Thunderbird no instalará certificados adicionales. 37 | Deshabilitar actualización 38 | Si esta política está habilitada, Thunderbird no recibirá actualizaciones. 39 | 40 | Si esta política está deshabilitada o no está configurada, Thunderbird recibirá actualizaciones. 41 | Deshabilitar herramientas para desarrolladores 42 | Si esta política está habilitada, las herramientas para desarrolladores web no están disponibles dentro de Thunderbird. 43 | 44 | Si esta política está deshabilitada o no está configurada, las herramientas para desarrolladores web estarán disponibles dentro de Thunderbird. 45 | Deshabilitar la creación de contraseña maestra 46 | Si esta política está habilitada, los usuarios no podrán crear una contraseña maestra. 47 | 48 | Si esta política está deshabilitada o no está configurada, los usuarios podrán crear una contraseña maestra. 49 | Evitar anular los errores de certificado 50 | Si esta política está habilitada, el botón "Añadir excepción" no estará disponible cuando un certificado no es válido. Esto evita que el usuario anule el error de certificado. 51 | 52 | Si esta política está deshabilitada o no está configurada, los errores de certificado pueden anularse. 53 | Evitar anular los errores de navegación segura 54 | Si esta política está habilitada, un usuario no podrá eludir la advertencia y visitar un sitio dañino. 55 | 56 | Si esta política está deshabilitada o no está configurada, un usuario podrá elegir visitar un sitio dañino. 57 | Extensiones para instalar 58 | Si esta política está habilitada, podrá especificar una lista de URL de extensiones o rutas que se instalarán cuando se inicie Thunderbird. 59 | Cada vez que se cambie esta lista, las extensiones se reinstalarán. 60 | 61 | Si esta política está deshabilitada o no está configurada, no se instalarán extensiones. 62 | Extensiones para desinstalar 63 | Si esta política está habilitada, podrá especificar una lista de ID de extensiones que se desinstalarán. 64 | Cada vez que se cambie esta lista, las extensiones se desinstalarán. 65 | 66 | Si esta política está deshabilitada o no está configurada, no se desinstalarán las extensiones. 67 | Evitar que las extensiones se deshabiliten o se borrén 68 | Si esta política está habilitada, podrá especificar una lista de ID de extensiones que el usuario no podrá desinstalar o deshabilitar. 69 | 70 | Si esta política está deshabilitada o no está configurada, no se bloquearán las extensiones. 71 | Actualización de extensiones 72 | Si esta política está deshabilitada, las extensiones no se actualizarán automáticamente. 73 | 74 | Si esta política está habilitada o no está configurada, las extensiones se actualizarán automáticamente. 75 | Gestión de extensiones 76 | Si esta política está habilitada, podrá utilizar JSON para describir la política de gestión de extensiones. 77 | 78 | Si esta política está deshabilitada o no está configurada, las extensiones no se gestionarán. 79 | Configuración del proxy 80 | Si esta política está habilitada, podrá configurar y bloquear la configuración de red. 81 | 82 | Seleccione el tipo de conexión y luego complete las secciones correspondientes. Debido a un error, debe seleccionar un valor para la versión proxy de SOCKS. 83 | 84 | Si esta política está deshabilitada o no está configurada, se usa la configuración de red predeterminada y el usuario podrá cambiarla. 85 | SOCKS v4 86 | SOCKS v5 87 | Configuración automática de URL del proxy 88 | Esto solo debería establecerse si seleccionó autoConfig 89 | URL omitidas por proxy 90 | Esto solo debe configurarse si seleccionó proxy manual 91 | Tipo de conexión 92 | Sin Proxy 93 | Usar la configuración de proxy del sistema 94 | Configuración manual del proxy 95 | Detección automática de la configuración del proxy 96 | Configuración automática de proxy 97 | 98 | 99 | 100 | 101 | 102 | 103 | 104 | 105 | No permitir que se cambie la configuración del proxy. 106 | Tipo de conexión: 107 | 108 | Prosy HTTP: 109 | 110 | 112 | Utilizar este servidor proxy para todos los protocolos. 113 | Proxy SSL: 114 | 115 | 117 | Proxy FTP: 118 | 119 | 121 | Servidor SOCKS: 122 | 123 | 125 | Versión de SOCKS: 126 | 127 | No usar proxy para 128 | 129 | 131 | Ejemplo: .mozilla.org, .net.nz, 192.168.1.0/24 132 | Configuración automática de URL del proxy: 133 | 134 | 136 | No solicitar la autenticación si se guarda la contraseña. 137 | DNS proxy cuando se utiliza SOCKS v5. 138 | 139 | 140 | 141 | 142 | 143 | 144 | 145 | 146 | 147 | 148 | 149 | 150 | 151 | -------------------------------------------------------------------------------- /windows/it-IT/thunderbird.adml: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | Microsoft Windows XP SP2 o versione successiva 8 | Thunderbird 68 o versione successiva 9 | Thunderbird 10 | Estensioni 11 | Componenti aggiuntivi 12 | Certificati 13 | Blocca Gestore componenti aggiuntivi 14 | Se questo criterio è abilitato, l'utente non può accedere al Gestore componenti aggiuntivi o ad about:addons. 15 | 16 | Se questo criterio è disabilitato o non configurato, l'utente può accedere al Gestore componenti aggiuntivi e ad about:addons. 17 | Blocca about:config 18 | Se questo criterio è abilitato, l'utente non può accedere ad about:config. 19 | 20 | Se questo criterio è disabilitato o non configurato, l'utente può accedere ad about:config. 21 | Blocca about:profiles 22 | Se questo criterio è abilitato, l'utente non può accedere ad about:profiles. 23 | 24 | Se questo criterio è disabilitato o non configurato, l'utente può accedere ad about:profiles. 25 | URL aggiornamento personalizzato 26 | Se questo criterio è abilitato, è possibile impostare un URL diverso da quello predefinito per il server di aggiornamento. Ciò potrebbe essere utile se si dispone di un server di aggiornamento sulla propria rete. 27 | 28 | Se questo criterio è disabilitato o non utilizzato, verrà utilizzato l'URL di aggiornamento predefinito. 29 | Importa Autorità di certificazione radice enterprise 30 | Se questo criterio è abilitato, Thunderbird utilizzerà i certificati radice nell'Archivio certificati di Windows. 31 | 32 | Se questo criterio è disabilitato o non configurato, Thunderbird non utilizzerà i certificati radice nell'Archivio certificati di Windows. 33 | Installa certificati 34 | Se questo criterio è abilitato, Thunderbird installerà i certificati elencati in Thunderbird. Questi saranno cercati in %USERPROFILE%\AppData\Local\Thunderbird\Certificates e in %USERPROFILE%\AppData\Roaming\Thunderbird\Certificates. 35 | 36 | Se questo criterio è disabilitato o non configurato, Thunderbird non installerà certificati aggiuntivi. 37 | Disabilita aggiornamenti 38 | Se questo criterio è abilitato, Thunderbird non riceverà aggiornamenti. 39 | 40 | Se questo criterio è disabilitato o non configurato, Thunderbird riceverà aggiornamenti. 41 | Disabilita Strumenti di sviluppo 42 | Se questo criterio è abilitato, gli strumenti di sviluppo non saranno disponibili in Thunderbird. 43 | 44 | Se questo criterio è disabilitato o non configurato, gli strumenti di sviluppo saranno disponibili in Thunderbird. 45 | Disabilita creazione password principale 46 | Se questo criterio è abilitato, gli utenti non possono creare una password principale. 47 | 48 | Se questo criterio è disabilitato o non configurato, gli utenti possono creare una password principale. 49 | Impedisci l'override degli errori certificato 50 | Se questo criterio è abilitato, il pulsante "Aggiungi eccezione" non è disponibile se un certificato non è valido. Ciò impedisce all'utente di eseguire l'override dell'errore del certificato. 51 | 52 | Se questo criterio è disabilitato o non configurato, è possibile eseguire l'override degli errori certificato. 53 | Impedisci l'override degli errori Protezione phishing e malware 54 | Se questo criterio è abilitato, un utente non può ignorare l'avvertimento e visitare un sito malevolo. 55 | 56 | Se questo criterio è disabilitato o non configurato, un utente può decidere di visitare un sito malevolo. 57 | Estensioni da installare 58 | Se questo criterio è abilitato, è possibile specificare un elenco di URL o percorsi a estensioni che saranno installate all'avvio di Thunderbird. 59 | Le estensioni saranno reinstallate a ogni modifica dell'elenco. 60 | 61 | Se questo criterio è disabilitato o non configurato, non sarà installata alcuna estensione. 62 | Estensioni da disinstallare 63 | Se questo criterio è abilitato, è possibile specificare un elenco di ID di estensioni da disinstallare. 64 | Le estensioni saranno disinstallate a ogni modifica dell'elenco. 65 | 66 | Se questo criterio è disabilitato o non configurato, non sarà disinstallata alcuna estensione. 67 | Impedisci la disabilitazione o la rimozione delle estensioni 68 | Se questo criterio è abilitato, è possibile specificare un elenco di ID delle estensioni che l'utente non sarà in grado di disinstallare o disabilitare. 69 | 70 | Se questo criterio è disabilitato o non configurato, non sarà bloccata nessuna estensione. 71 | Aggiornamento estensioni 72 | Se questo criterio è disabilitato, le estensioni non saranno aggiornate automaticamente. 73 | 74 | Se questo criterio è abilitato o non configurato, le estensioni saranno aggiornate automaticamente. 75 | Gestione estensioni 76 | Se questo criterio è abilitato, è possibile utilizzare JSON per descrivere la politica di gestione delle estensioni. 77 | 78 | Se questo criterio è disabilitato o non configurato, le estensioni non saranno gestite. 79 | Impostazioni proxy 80 | Se questo criterio è abilitato, è possibile configurare e bloccare le impostazioni di rete. 81 | 82 | Selezionare il tipo di connessione e quindi compilare le sezioni appropriate. A causa di un bug, è necessario selezionare un valore per la versione del proxy SOCKS. 83 | 84 | Se questo criterio è disabilitato o non configurato, saranno utilizzate le impostazioni di rete predefinite e l'utente potrà modificarle. 85 | SOCKS v4 86 | SOCKS v5 87 | URL configurazione automatica proxy 88 | Queste opzioni devono essere impostate solo se è stata selezionata la configurazione automatica 89 | Nessun proxy per 90 | Queste opzioni devono essere impostate solo se è stata selezionata la configurazione manuale dei proxy 91 | Tipo connessione 92 | Nessun proxy 93 | Utilizza le impostazioni proxy del sistemas 94 | Configurazione manuale dei proxy 95 | Individua automaticamente le impostazioni proxy 96 | Configurazione automatica proxy 97 | 98 | 99 | 100 | 101 | 102 | 103 | 104 | 105 | Non consentire la modifica delle impostazioni del proxy. 106 | Tipo connessione: 107 | 108 | Proxy HTTP: 109 | 110 | 112 | Use this proxy server for all protocols. 113 | Proxy SSL: 114 | 115 | 117 | Proxy FTP: 118 | 119 | 121 | Host SOCKS: 122 | 123 | 125 | Versione SOCKS: 126 | 127 | Nessun proxy per 128 | 129 | 131 | Esempio: .mozilla.org, .net.nz, 192.168.1.0/24 132 | URL configurazione automatica proxy: 133 | 134 | 136 | Non richiedere l'autenticazione se la password è salvata. 137 | DNS proxy per SOCKS v5. 138 | 139 | 140 | 141 | 142 | 143 | 144 | 145 | 146 | 147 | 148 | 149 | 150 | 151 | -------------------------------------------------------------------------------- /windows/de-DE/thunderbird.adml: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | Microsoft Windows XP SP2 oder neuer 8 | Thunderbird 68 oder neuer 9 | Thunderbird 10 | Erweiterungen 11 | Addons 12 | Zertifikate 13 | Add-ons Manager blockieren 14 | Wenn diese Gruppenrichtlinieneinstellung aktiviert ist, kann der Nutzer nicht auf den Add-ons Manager oder about:addons zugreifen. 15 | 16 | Wenn diese Gruppenrichtlinieneinstellung deaktiviert oder nicht konfiguriert ist, kann der Nutzer auf den Add-ons Manager oder about:addons zugreifen. 17 | about:config blockieren 18 | Wenn diese Gruppenrichtlinieneinstellung aktiviert ist, kann der Nutzer nicht auf about:config zugreifen. 19 | 20 | Wenn diese Gruppenrichtlinieneinstellung deaktiviert oder nicht konfiguriert ist, kann der Nutzer auf about:config zugreifen. 21 | about:profiles blockieren 22 | Wenn diese Gruppenrichtlinieneinstellung aktiviert ist, kann der Nutzer nicht auf about:profiles zugreifen. 23 | 24 | Wenn diese Gruppenrichtlinieneinstellung deaktiviert oder nicht konfiguriert ist, kann der Nutzer auf about:profiles zugreifen. 25 | Vorgegebene Update-URL 26 | Wenn diese Gruppenrichtlinieneinstellung aktiviert ist, wird eine vorgegebene URL als Update-Server anstelle des standardmäßigen Update-Servers festgelegt. Dies ist hilfreich, wenn man seinen eigenen Updateserver im Firmennetzwerk einsetzt. 27 | 28 | Wenn diese Gruppenrichtlinieneinstellung deaktiviert oder nicht konfiguriert ist, verwendet Thunderbird die standardmäßige Update-URL. 29 | Enterprise Root-Zertifikate importieren 30 | Wenn diese Gruppenrichtlinieneinstellung aktiviert ist, wird Thunderbird Zertifikate vom Windows-eigenen Zertifikatsspeicher importieren. 31 | 32 | Wenn diese Gruppenrichtlinieneinstellung deaktiviert oder nicht konfiguriert ist, wird Thunderbird keine Zertifikate vom Windows-eigenen Zertifikatsspeicher importieren. 33 | Zertifikate installieren 34 | Wenn diese Gruppenrichtlinieneinstellung aktiviert ist, wird Thunderbird die aufgelisteten Zertifikate installieren. Die Zertifikate müssen sich in %USERPROFILE%\AppData\Local\Thunderbird\Certificates und %USERPROFILE%\AppData\Roaming\Thunderbird\Certificates befinden. 35 | 36 | Wenn diese Gruppenrichtlinieneinstellung deaktiviert oder nicht konfiguriert ist, wird Thunderbird keine Zertifikate installieren. 37 | Updates deaktvieren 38 | Wenn diese Gruppenrichtlinieneinstellung aktiviert ist, wird Thunderbird keine Updates installieren. 39 | 40 | Wenn diese Gruppenrichtlinieneinstellung deaktiviert oder nicht konfiguriert ist, wird Thunderbird Updates erhalten. 41 | Developer Tools deaktivieren 42 | Wenn diese Gruppenrichtlinieneinstellung aktiviert ist, sind Developer Tools in Thunderbird deaktiviert. 43 | 44 | Wenn diese Gruppenrichtlinieneinstellung deaktiviert oder nicht konfiguriert ist, sind Developer Tools in Thunderbird weiterhin vorhanden. 45 | Masterpasswort Erstellung deaktivieren 46 | Wenn diese Gruppenrichtlinieneinstellung aktiviert ist, sind Nutzer nicht in der Lage Masterpasswörter einzurichten. 47 | 48 | Wenn diese Gruppenrichtlinieneinstellung deaktiviert oder nicht konfiguriert ist, können Nutzer nach wie vor Masterpasswörter einrichten. 49 | Nutzer abhalten, Zertifikatsfehler zu ignorieren 50 | Wenn diese Gruppenrichtlinieneinstellung aktiviert ist, können Nutzer die Schaltfläche "Ausnahme hinzufügen..." nicht verwenden. 51 | 52 | Wenn diese Gruppenrichtlinieneinstellung deaktiviert oder nicht konfiguriert ist, können Ausnahmen bei auftretenden Zertifikatsfehlern hinzugefügt werden. 53 | Betrugsversuch- und Schadprogrammschutz ändern 54 | Wenn Sie die Richtlinieneinstellung aktivieren, können Benutzer Warnungen zu Betrugsversuch- und Schadprogrammschutz nicht umgehen um eine schädliche Webseite zu besuchen. 55 | 56 | Wenn Sie die Richtlinieneinstellung deaktivieren oder nicht konfigurieren, können Benutzer Warnungen zu Betrugsversuch- und Schadprogrammschutz umgehen um eine schädliche Webseite zu besuchen. 57 | Erweiterungen installieren 58 | Wenn Sie die Richtlinieneinstellung aktivieren, können Sie eine Liste mit Erweiterungs-URLs oder -pfaden angeben, die beim Start von Thunderbird installiert werden. 59 | Jedes Mal, wenn diese Liste geändert wird, werden die Erweiterungen erneut installiert. 60 | 61 | Wenn Sie die Richtlinieneinstellung deaktivieren oder nicht konfigurieren, werden keine Erweiterungen installiert. 62 | Erweiterungen deinstallieren 63 | Wenn Sie die Richtlinieneinstellung aktivieren, können Sie eine Liste mit Erweiterungs-IDs angeben, die beim Start deinstalliert werden. 64 | Jedes Mal, wenn diese Liste geändert wird, werden die Erweiterungen deinstalliert. 65 | 66 | Wenn Sie die Richtlinieneinstellung deaktivieren oder nicht konfigurieren, werden keine Erweiterungen deinstalliert. 67 | Verhindern, dass Erweiterungen deaktiviert oder gelöscht werden 68 | Wenn Sie die Richtlinieneinstellung aktivieren, können Sie eine Liste mit Erweiterungs-IDs angeben, die den Benutzer hindert die angegebenen Erweiterungen zu deinstallieren oder zu deaktivieren. 69 | 70 | Wenn Sie die Richtlinieneinstellung deaktivieren oder nicht konfigurieren, werden keine Erweiterungen gesperrt. 71 | Extension Update 72 | Wenn Sie die Richtlinieneinstellung deaktivieren, werden Add-ons nicht automatisch aktualisiert. 73 | 74 | Wenn Sie die Richtlinieneinstellung aktivieren oder nicht konfigurieren, werden Add-ons automatisch aktualisiert. 75 | Extension Management 76 | If this policy is enabled, you can use JSON to describe the extension management policy. 77 | 78 | If this policy is disabled or not configured, extensions will not be managed. 79 | Proxy Settings 80 | Wenn Sie die Richtlinieneinstellung aktivieren, können Sie die Netzwerkeinstellungen ändern und sperren. 81 | 82 | Wählen Sie den Verbindungstyp und füllen Sie die entsprechenden Abschnitte aus. Aufgrund eines Fehlers müssen Sie einen Wert für die SOCKS-Proxy-Version auswählen. 83 | 84 | Wenn Sie die Richtlinieneinstellung deaktivieren oder nicht konfigurieren, werden die Standard Netzwerk-Einstellungen verwenden. Diese können vom Benutzer verändert werden. 85 | SOCKS v4 86 | SOCKS v5 87 | Automatische Proxy Konfigurations-URL 88 | Diese Richtlinieneinstellung sollte nur gewählt werden, wenn autoConfig aktiviert ist. 89 | Proxy bypass URLs 90 | These should only be set if you selected manual proxy 91 | Verbindungsart 92 | Kein Proxy 93 | System Proxy verwenden 94 | Manuelle Proxy Konfiguration 95 | Automatisch Proxy erkennen 96 | Automatisch Proxy-Einstellungen setzen 97 | 98 | 99 | 100 | 101 | 102 | 103 | 104 | 105 | Änderungen an den Proxy-Einstellungen verbieten. 106 | Verbindungsart: 107 | 108 | HTTP Proxy: 109 | 110 | 112 | Diesen Proxy für alle Protokolle verwenden. 113 | SSL Proxy: 114 | 115 | 117 | FTP Proxy: 118 | 119 | 121 | SOCKS Host: 122 | 123 | 125 | SOCKS Version: 126 | 127 | Kein Proxy für: 128 | 129 | 131 | Beispiele: .mozilla.org, .net.nz, 192.168.1.0/24 132 | Automatische Proxy Konfigurations-URL: 133 | 134 | 136 | Keine Authentifizierungsanfrage bei gespeichertem Passwort. 137 | Bei Verwendung von SOCKS v5 den Proxy für DNS-Anfragen verwenden. 138 | 139 | 140 | 141 | 142 | 143 | 144 | 145 | 146 | 147 | 148 | 149 | 150 | 151 | -------------------------------------------------------------------------------- /windows/thunderbird.admx: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 | 83 | 84 | 85 | 86 | 87 | 88 | 89 | 90 | 91 | 92 | 93 | 94 | 95 | 96 | 97 | 98 | 99 | 100 | 101 | 102 | 103 | 104 | 105 | 106 | 107 | 108 | 109 | 110 | 111 | 112 | 113 | 114 | 115 | 116 | 117 | 118 | 119 | 120 | 121 | 122 | 123 | 124 | 125 | 126 | 127 | 128 | 129 | 130 | 131 | 132 | 133 | 134 | 135 | 136 | 137 | 138 | 139 | 140 | 141 | 142 | 143 | 144 | 145 | 146 | 147 | 148 | 149 | 150 | 151 | 152 | "> 153 | 154 | 155 | 156 | 157 | 158 | 159 | 160 | 161 | 162 | 163 | 164 | 165 | 166 | 167 | 168 | 169 | 170 | 171 | 172 | 173 | 174 | 175 | 176 | 177 | 178 | 179 | 180 | 181 | 182 | 183 | 184 | none 185 | 186 | 187 | 188 | 189 | system 190 | 191 | 192 | 193 | 194 | manual 195 | 196 | 197 | 198 | 199 | autoDetect 200 | 201 | 202 | 203 | 204 | autoConfig 205 | 206 | 207 | 208 | 209 | 210 | 211 | 212 | 213 | 214 | 215 | 216 | 217 | 218 | 219 | 220 | 221 | 222 | 223 | 224 | 225 | 226 | 227 | 228 | 229 | 230 | 231 | 232 | 233 | 234 | 235 | 236 | 237 | 238 | 239 | 240 | 241 | 242 | 243 | 244 | 245 | 246 | 247 | 248 | 249 | 250 | 251 | 252 | 253 | 254 | -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | Mozilla Public License Version 2.0 2 | ================================== 3 | 4 | 1. Definitions 5 | -------------- 6 | 7 | 1.1. "Contributor" 8 | means each individual or legal entity that creates, contributes to 9 | the creation of, or owns Covered Software. 10 | 11 | 1.2. "Contributor Version" 12 | means the combination of the Contributions of others (if any) used 13 | by a Contributor and that particular Contributor's Contribution. 14 | 15 | 1.3. "Contribution" 16 | means Covered Software of a particular Contributor. 17 | 18 | 1.4. "Covered Software" 19 | means Source Code Form to which the initial Contributor has attached 20 | the notice in Exhibit A, the Executable Form of such Source Code 21 | Form, and Modifications of such Source Code Form, in each case 22 | including portions thereof. 23 | 24 | 1.5. "Incompatible With Secondary Licenses" 25 | means 26 | 27 | (a) that the initial Contributor has attached the notice described 28 | in Exhibit B to the Covered Software; or 29 | 30 | (b) that the Covered Software was made available under the terms of 31 | version 1.1 or earlier of the License, but not also under the 32 | terms of a Secondary License. 33 | 34 | 1.6. "Executable Form" 35 | means any form of the work other than Source Code Form. 36 | 37 | 1.7. "Larger Work" 38 | means a work that combines Covered Software with other material, in 39 | a separate file or files, that is not Covered Software. 40 | 41 | 1.8. "License" 42 | means this document. 43 | 44 | 1.9. "Licensable" 45 | means having the right to grant, to the maximum extent possible, 46 | whether at the time of the initial grant or subsequently, any and 47 | all of the rights conveyed by this License. 48 | 49 | 1.10. "Modifications" 50 | means any of the following: 51 | 52 | (a) any file in Source Code Form that results from an addition to, 53 | deletion from, or modification of the contents of Covered 54 | Software; or 55 | 56 | (b) any new file in Source Code Form that contains any Covered 57 | Software. 58 | 59 | 1.11. "Patent Claims" of a Contributor 60 | means any patent claim(s), including without limitation, method, 61 | process, and apparatus claims, in any patent Licensable by such 62 | Contributor that would be infringed, but for the grant of the 63 | License, by the making, using, selling, offering for sale, having 64 | made, import, or transfer of either its Contributions or its 65 | Contributor Version. 66 | 67 | 1.12. "Secondary License" 68 | means either the GNU General Public License, Version 2.0, the GNU 69 | Lesser General Public License, Version 2.1, the GNU Affero General 70 | Public License, Version 3.0, or any later versions of those 71 | licenses. 72 | 73 | 1.13. "Source Code Form" 74 | means the form of the work preferred for making modifications. 75 | 76 | 1.14. "You" (or "Your") 77 | means an individual or a legal entity exercising rights under this 78 | License. For legal entities, "You" includes any entity that 79 | controls, is controlled by, or is under common control with You. For 80 | purposes of this definition, "control" means (a) the power, direct 81 | or indirect, to cause the direction or management of such entity, 82 | whether by contract or otherwise, or (b) ownership of more than 83 | fifty percent (50%) of the outstanding shares or beneficial 84 | ownership of such entity. 85 | 86 | 2. License Grants and Conditions 87 | -------------------------------- 88 | 89 | 2.1. Grants 90 | 91 | Each Contributor hereby grants You a world-wide, royalty-free, 92 | non-exclusive license: 93 | 94 | (a) under intellectual property rights (other than patent or trademark) 95 | Licensable by such Contributor to use, reproduce, make available, 96 | modify, display, perform, distribute, and otherwise exploit its 97 | Contributions, either on an unmodified basis, with Modifications, or 98 | as part of a Larger Work; and 99 | 100 | (b) under Patent Claims of such Contributor to make, use, sell, offer 101 | for sale, have made, import, and otherwise transfer either its 102 | Contributions or its Contributor Version. 103 | 104 | 2.2. Effective Date 105 | 106 | The licenses granted in Section 2.1 with respect to any Contribution 107 | become effective for each Contribution on the date the Contributor first 108 | distributes such Contribution. 109 | 110 | 2.3. Limitations on Grant Scope 111 | 112 | The licenses granted in this Section 2 are the only rights granted under 113 | this License. No additional rights or licenses will be implied from the 114 | distribution or licensing of Covered Software under this License. 115 | Notwithstanding Section 2.1(b) above, no patent license is granted by a 116 | Contributor: 117 | 118 | (a) for any code that a Contributor has removed from Covered Software; 119 | or 120 | 121 | (b) for infringements caused by: (i) Your and any other third party's 122 | modifications of Covered Software, or (ii) the combination of its 123 | Contributions with other software (except as part of its Contributor 124 | Version); or 125 | 126 | (c) under Patent Claims infringed by Covered Software in the absence of 127 | its Contributions. 128 | 129 | This License does not grant any rights in the trademarks, service marks, 130 | or logos of any Contributor (except as may be necessary to comply with 131 | the notice requirements in Section 3.4). 132 | 133 | 2.4. Subsequent Licenses 134 | 135 | No Contributor makes additional grants as a result of Your choice to 136 | distribute the Covered Software under a subsequent version of this 137 | License (see Section 10.2) or under the terms of a Secondary License (if 138 | permitted under the terms of Section 3.3). 139 | 140 | 2.5. Representation 141 | 142 | Each Contributor represents that the Contributor believes its 143 | Contributions are its original creation(s) or it has sufficient rights 144 | to grant the rights to its Contributions conveyed by this License. 145 | 146 | 2.6. Fair Use 147 | 148 | This License is not intended to limit any rights You have under 149 | applicable copyright doctrines of fair use, fair dealing, or other 150 | equivalents. 151 | 152 | 2.7. Conditions 153 | 154 | Sections 3.1, 3.2, 3.3, and 3.4 are conditions of the licenses granted 155 | in Section 2.1. 156 | 157 | 3. Responsibilities 158 | ------------------- 159 | 160 | 3.1. Distribution of Source Form 161 | 162 | All distribution of Covered Software in Source Code Form, including any 163 | Modifications that You create or to which You contribute, must be under 164 | the terms of this License. You must inform recipients that the Source 165 | Code Form of the Covered Software is governed by the terms of this 166 | License, and how they can obtain a copy of this License. You may not 167 | attempt to alter or restrict the recipients' rights in the Source Code 168 | Form. 169 | 170 | 3.2. Distribution of Executable Form 171 | 172 | If You distribute Covered Software in Executable Form then: 173 | 174 | (a) such Covered Software must also be made available in Source Code 175 | Form, as described in Section 3.1, and You must inform recipients of 176 | the Executable Form how they can obtain a copy of such Source Code 177 | Form by reasonable means in a timely manner, at a charge no more 178 | than the cost of distribution to the recipient; and 179 | 180 | (b) You may distribute such Executable Form under the terms of this 181 | License, or sublicense it under different terms, provided that the 182 | license for the Executable Form does not attempt to limit or alter 183 | the recipients' rights in the Source Code Form under this License. 184 | 185 | 3.3. Distribution of a Larger Work 186 | 187 | You may create and distribute a Larger Work under terms of Your choice, 188 | provided that You also comply with the requirements of this License for 189 | the Covered Software. If the Larger Work is a combination of Covered 190 | Software with a work governed by one or more Secondary Licenses, and the 191 | Covered Software is not Incompatible With Secondary Licenses, this 192 | License permits You to additionally distribute such Covered Software 193 | under the terms of such Secondary License(s), so that the recipient of 194 | the Larger Work may, at their option, further distribute the Covered 195 | Software under the terms of either this License or such Secondary 196 | License(s). 197 | 198 | 3.4. Notices 199 | 200 | You may not remove or alter the substance of any license notices 201 | (including copyright notices, patent notices, disclaimers of warranty, 202 | or limitations of liability) contained within the Source Code Form of 203 | the Covered Software, except that You may alter any license notices to 204 | the extent required to remedy known factual inaccuracies. 205 | 206 | 3.5. Application of Additional Terms 207 | 208 | You may choose to offer, and to charge a fee for, warranty, support, 209 | indemnity or liability obligations to one or more recipients of Covered 210 | Software. However, You may do so only on Your own behalf, and not on 211 | behalf of any Contributor. You must make it absolutely clear that any 212 | such warranty, support, indemnity, or liability obligation is offered by 213 | You alone, and You hereby agree to indemnify every Contributor for any 214 | liability incurred by such Contributor as a result of warranty, support, 215 | indemnity or liability terms You offer. You may include additional 216 | disclaimers of warranty and limitations of liability specific to any 217 | jurisdiction. 218 | 219 | 4. Inability to Comply Due to Statute or Regulation 220 | --------------------------------------------------- 221 | 222 | If it is impossible for You to comply with any of the terms of this 223 | License with respect to some or all of the Covered Software due to 224 | statute, judicial order, or regulation then You must: (a) comply with 225 | the terms of this License to the maximum extent possible; and (b) 226 | describe the limitations and the code they affect. Such description must 227 | be placed in a text file included with all distributions of the Covered 228 | Software under this License. Except to the extent prohibited by statute 229 | or regulation, such description must be sufficiently detailed for a 230 | recipient of ordinary skill to be able to understand it. 231 | 232 | 5. Termination 233 | -------------- 234 | 235 | 5.1. The rights granted under this License will terminate automatically 236 | if You fail to comply with any of its terms. However, if You become 237 | compliant, then the rights granted under this License from a particular 238 | Contributor are reinstated (a) provisionally, unless and until such 239 | Contributor explicitly and finally terminates Your grants, and (b) on an 240 | ongoing basis, if such Contributor fails to notify You of the 241 | non-compliance by some reasonable means prior to 60 days after You have 242 | come back into compliance. Moreover, Your grants from a particular 243 | Contributor are reinstated on an ongoing basis if such Contributor 244 | notifies You of the non-compliance by some reasonable means, this is the 245 | first time You have received notice of non-compliance with this License 246 | from such Contributor, and You become compliant prior to 30 days after 247 | Your receipt of the notice. 248 | 249 | 5.2. If You initiate litigation against any entity by asserting a patent 250 | infringement claim (excluding declaratory judgment actions, 251 | counter-claims, and cross-claims) alleging that a Contributor Version 252 | directly or indirectly infringes any patent, then the rights granted to 253 | You by any and all Contributors for the Covered Software under Section 254 | 2.1 of this License shall terminate. 255 | 256 | 5.3. In the event of termination under Sections 5.1 or 5.2 above, all 257 | end user license agreements (excluding distributors and resellers) which 258 | have been validly granted by You or Your distributors under this License 259 | prior to termination shall survive termination. 260 | 261 | ************************************************************************ 262 | * * 263 | * 6. Disclaimer of Warranty * 264 | * ------------------------- * 265 | * * 266 | * Covered Software is provided under this License on an "as is" * 267 | * basis, without warranty of any kind, either expressed, implied, or * 268 | * statutory, including, without limitation, warranties that the * 269 | * Covered Software is free of defects, merchantable, fit for a * 270 | * particular purpose or non-infringing. The entire risk as to the * 271 | * quality and performance of the Covered Software is with You. * 272 | * Should any Covered Software prove defective in any respect, You * 273 | * (not any Contributor) assume the cost of any necessary servicing, * 274 | * repair, or correction. This disclaimer of warranty constitutes an * 275 | * essential part of this License. No use of any Covered Software is * 276 | * authorized under this License except under this disclaimer. * 277 | * * 278 | ************************************************************************ 279 | 280 | ************************************************************************ 281 | * * 282 | * 7. Limitation of Liability * 283 | * -------------------------- * 284 | * * 285 | * Under no circumstances and under no legal theory, whether tort * 286 | * (including negligence), contract, or otherwise, shall any * 287 | * Contributor, or anyone who distributes Covered Software as * 288 | * permitted above, be liable to You for any direct, indirect, * 289 | * special, incidental, or consequential damages of any character * 290 | * including, without limitation, damages for lost profits, loss of * 291 | * goodwill, work stoppage, computer failure or malfunction, or any * 292 | * and all other commercial damages or losses, even if such party * 293 | * shall have been informed of the possibility of such damages. This * 294 | * limitation of liability shall not apply to liability for death or * 295 | * personal injury resulting from such party's negligence to the * 296 | * extent applicable law prohibits such limitation. Some * 297 | * jurisdictions do not allow the exclusion or limitation of * 298 | * incidental or consequential damages, so this exclusion and * 299 | * limitation may not apply to You. * 300 | * * 301 | ************************************************************************ 302 | 303 | 8. Litigation 304 | ------------- 305 | 306 | Any litigation relating to this License may be brought only in the 307 | courts of a jurisdiction where the defendant maintains its principal 308 | place of business and such litigation shall be governed by laws of that 309 | jurisdiction, without reference to its conflict-of-law provisions. 310 | Nothing in this Section shall prevent a party's ability to bring 311 | cross-claims or counter-claims. 312 | 313 | 9. Miscellaneous 314 | ---------------- 315 | 316 | This License represents the complete agreement concerning the subject 317 | matter hereof. If any provision of this License is held to be 318 | unenforceable, such provision shall be reformed only to the extent 319 | necessary to make it enforceable. Any law or regulation which provides 320 | that the language of a contract shall be construed against the drafter 321 | shall not be used to construe this License against a Contributor. 322 | 323 | 10. Versions of the License 324 | --------------------------- 325 | 326 | 10.1. New Versions 327 | 328 | Mozilla Foundation is the license steward. Except as provided in Section 329 | 10.3, no one other than the license steward has the right to modify or 330 | publish new versions of this License. Each version will be given a 331 | distinguishing version number. 332 | 333 | 10.2. Effect of New Versions 334 | 335 | You may distribute the Covered Software under the terms of the version 336 | of the License under which You originally received the Covered Software, 337 | or under the terms of any subsequent version published by the license 338 | steward. 339 | 340 | 10.3. Modified Versions 341 | 342 | If you create software not governed by this License, and you want to 343 | create a new license for such software, you may create and use a 344 | modified version of this License if you rename the license and remove 345 | any references to the name of the license steward (except to note that 346 | such modified license differs from this License). 347 | 348 | 10.4. Distributing Source Code Form that is Incompatible With Secondary 349 | Licenses 350 | 351 | If You choose to distribute Source Code Form that is Incompatible With 352 | Secondary Licenses under the terms of this version of the License, the 353 | notice described in Exhibit B of this License must be attached. 354 | 355 | Exhibit A - Source Code Form License Notice 356 | ------------------------------------------- 357 | 358 | This Source Code Form is subject to the terms of the Mozilla Public 359 | License, v. 2.0. If a copy of the MPL was not distributed with this 360 | file, You can obtain one at http://mozilla.org/MPL/2.0/. 361 | 362 | If it is not possible or desirable to put the notice in a particular 363 | file, then You may include the notice in a location (such as a LICENSE 364 | file in a relevant directory) where a recipient would be likely to look 365 | for such a notice. 366 | 367 | You may add additional accurate notices of copyright ownership. 368 | 369 | Exhibit B - "Incompatible With Secondary Licenses" Notice 370 | --------------------------------------------------------- 371 | 372 | This Source Code Form is "Incompatible With Secondary Licenses", as 373 | defined by the Mozilla Public License, v. 2.0. 374 | --------------------------------------------------------------------------------