├── _config.yml
├── windows
├── de-DE
│ ├── mozilla.adml
│ └── thunderbird.adml
├── en-US
│ ├── mozilla.adml
│ └── thunderbird.adml
├── es-ES
│ ├── mozilla.adml
│ └── thunderbird.adml
├── it-IT
│ ├── mozilla.adml
│ └── thunderbird.adml
├── mozilla.admx
└── thunderbird.admx
├── SECURITY.md
├── .github
└── ISSUE_TEMPLATE
│ ├── change-to-documentation-request.md
│ ├── bug_report.md
│ └── feature_request.md
├── CODE_OF_CONDUCT.md
├── README.md
└── LICENSE
/_config.yml:
--------------------------------------------------------------------------------
1 | theme: jekyll-theme-cayman
--------------------------------------------------------------------------------
/windows/de-DE/mozilla.adml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 | Mozilla
8 |
9 |
10 |
11 |
--------------------------------------------------------------------------------
/windows/en-US/mozilla.adml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 | Mozilla
8 |
9 |
10 |
11 |
--------------------------------------------------------------------------------
/windows/es-ES/mozilla.adml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 | Mozilla
8 |
9 |
10 |
11 |
--------------------------------------------------------------------------------
/windows/it-IT/mozilla.adml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 | Mozilla
8 |
9 |
10 |
11 |
--------------------------------------------------------------------------------
/windows/mozilla.admx:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
--------------------------------------------------------------------------------
/SECURITY.md:
--------------------------------------------------------------------------------
1 | # Security Policy
2 |
3 | ## Supported Versions
4 |
5 | Use this section to tell people about which versions of your project are
6 | currently being supported with security updates.
7 |
8 | | Version | Supported |
9 | | ------- | ------------------ |
10 | | v0.5 | :white_check_mark: |
11 | | v0.4.1 | :white_check_mark: |
12 | | master | :x: |
13 | | older | :x: |
14 |
15 | ## Reporting a Vulnerability
16 |
17 | To report an issue, open a [bug issue](https://github.com/drlellinger/thunderbird-policies/issues/new?assignees=&labels=security&template=bug_report.md&title=).
18 |
--------------------------------------------------------------------------------
/.github/ISSUE_TEMPLATE/change-to-documentation-request.md:
--------------------------------------------------------------------------------
1 | ---
2 | name: Change to documentation request
3 | about: Suggest a change to documentation here.
4 | title: ''
5 | labels: documentation
6 | assignees: ''
7 |
8 | ---
9 |
10 | **Is your feature request related to a problem? Please describe.**
11 | A clear and concise description of what the problem is. Ex. I'm not happy with [...]
12 |
13 | **Describe the solution you'd like**
14 | A clear and concise description of what you want to happen.
15 |
16 | **Describe alternatives you've considered**
17 | A clear and concise description of any alternative solutions or features you've considered.
18 |
19 | **Additional context**
20 | Add any other context or screenshots about the feature request here.
21 |
--------------------------------------------------------------------------------
/.github/ISSUE_TEMPLATE/bug_report.md:
--------------------------------------------------------------------------------
1 | ---
2 | name: Bug report
3 | about: Create a report to help us improve
4 | title: ''
5 | labels: bug
6 | assignees: ''
7 |
8 | ---
9 |
10 | **Describe the bug**
11 | A clear and concise description of what the bug is. Remember: only bug fixing requests in scope of the policy templates. For policy engine requests please open a bug on https://bugzilla.mozilla.org/enter_bug.cgi#h=dupes%7CThunderbird
12 |
13 | **To Reproduce**
14 | Steps to reproduce the behavior:
15 | 1. Go to '...'
16 | 2. Click on '....'
17 | 3. Scroll down to '....'
18 | 4. See error
19 |
20 | **Expected behavior**
21 | A clear and concise description of what you expected to happen.
22 |
23 | **Screenshots**
24 | If applicable, add screenshots to help explain your problem.
25 |
26 | **Desktop (please complete the following information):**
27 | - Version [e.g. 68.1.2]
28 |
--------------------------------------------------------------------------------
/.github/ISSUE_TEMPLATE/feature_request.md:
--------------------------------------------------------------------------------
1 | ---
2 | name: Feature request
3 | about: Suggest an feature for this project
4 | title: ''
5 | labels: enhancement
6 | assignees: ''
7 |
8 | ---
9 |
10 | **Is your feature request related to a problem? Please describe.**
11 | A clear and concise description of what the problem is. Remember: only feature requests in scope of the policy templates. For policy engine requests please open a bug on https://bugzilla.mozilla.org/enter_bug.cgi#h=dupes%7CThunderbird
12 | Ex. I'm always frustrated when [...]
13 |
14 | **Describe the solution you'd like**
15 | A clear and concise description of what you want to happen.
16 |
17 | **Describe alternatives you've considered**
18 | A clear and concise description of any alternative solutions or features you've considered.
19 |
20 | **Additional context**
21 | Add any other context or screenshots about the feature request here.
22 |
--------------------------------------------------------------------------------
/CODE_OF_CONDUCT.md:
--------------------------------------------------------------------------------
1 | # Contributor Covenant Code of Conduct
2 |
3 | ## Our Pledge
4 |
5 | In the interest of fostering an open and welcoming environment, we as
6 | contributors and maintainers pledge to making participation in our project and
7 | our community a harassment-free experience for everyone, regardless of age, body
8 | size, disability, ethnicity, sex characteristics, gender identity and expression,
9 | level of experience, education, socio-economic status, nationality, personal
10 | appearance, race, religion, or sexual identity and orientation.
11 |
12 | ## Our Standards
13 |
14 | Examples of behavior that contributes to creating a positive environment
15 | include:
16 |
17 | * Using welcoming and inclusive language
18 | * Being respectful of differing viewpoints and experiences
19 | * Gracefully accepting constructive criticism
20 | * Focusing on what is best for the community
21 | * Showing empathy towards other community members
22 |
23 | Examples of unacceptable behavior by participants include:
24 |
25 | * The use of sexualized language or imagery and unwelcome sexual attention or
26 | advances
27 | * Trolling, insulting/derogatory comments, and personal or political attacks
28 | * Public or private harassment
29 | * Republishing the content of this repository without the maintainers' consent
30 | * Publishing the content of this repository without name attribution
31 | * Publishing others' private information, such as a physical or electronic
32 | address, without explicit permission
33 | * Other conduct which could reasonably be considered inappropriate in a
34 | professional setting
35 |
36 | ## Our Responsibilities
37 |
38 | Project maintainers are responsible for clarifying the standards of acceptable
39 | behavior and are expected to take appropriate and fair corrective action in
40 | response to any instances of unacceptable behavior.
41 |
42 | Project maintainers have the right and responsibility to remove, edit, or
43 | reject comments, commits, code, wiki edits, issues, and other contributions
44 | that are not aligned to this Code of Conduct, or to ban temporarily or
45 | permanently any contributor for other behaviors that they deem inappropriate,
46 | threatening, offensive, or harmful.
47 |
48 | ## Scope
49 |
50 | This Code of Conduct applies both within project spaces and in public spaces
51 | when an individual is representing the project or its community. Examples of
52 | representing a project or community include using an official project e-mail
53 | address, posting via an official social media account, or acting as an appointed
54 | representative at an online or offline event. Representation of a project may be
55 | further defined and clarified by project maintainers.
56 |
57 | ## Enforcement
58 |
59 | Instances of abusive, harassing, or otherwise unacceptable behavior may be
60 | reported by contacting the project team. All
61 | complaints will be reviewed and investigated and will result in a response that
62 | is deemed necessary and appropriate to the circumstances. The project team is
63 | obligated to maintain confidentiality with regard to the reporter of an incident.
64 | Further details of specific enforcement policies may be posted separately.
65 |
66 | Project maintainers who do not follow or enforce the Code of Conduct in good
67 | faith may face temporary or permanent repercussions as determined by other
68 | members of the project's leadership.
69 |
70 | ## Attribution
71 |
72 | This Code of Conduct is adapted from the [Contributor Covenant][homepage], version 1.4,
73 | available at https://www.contributor-covenant.org/version/1/4/code-of-conduct.html
74 |
75 | [homepage]: https://www.contributor-covenant.org
76 |
77 | For answers to common questions about this code of conduct, see
78 | https://www.contributor-covenant.org/faq
79 |
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | **These policies are in active development and so might contain changes that do not work with current versions of Thunderbird.**
2 |
3 | **You should use the officially released versions (https://github.com/drlellinger/thunderbird-policies/releases) if you are deploying changes.**
4 |
5 | Policies can be specified using the Group Policy templates on Windows (https://github.com/drlellinger/thunderbird-policies/tree/master/windows)
6 |
7 | | Policy Name | Description
8 | | --- | --- |
9 | | **[`AppUpdateURL`](#AppUpdateURL)** | Change the URL for application update.
10 | | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
11 | | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config. (Bug fixed with TB 68.1.1)
12 | | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to about:profiles.
13 | | **[`Certificates`](#certificates)** |
14 | | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
15 | | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Thunderbird certificate store.
16 | | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
17 | | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
18 | | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
19 | | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
20 | | **`ExtensionSettings`** | Manage all aspects of extensions.
21 | | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
22 |
23 | ### AppUpdateURL
24 |
25 | Change the URL for application update.
26 |
27 | **Compatibility:** Thunderbird 68\
28 | **CCK2 Equivalent:** N/A\
29 | **Preferences Affected:** `app.update.url`
30 |
31 | #### Windows
32 | ```
33 | Software\Policies\Mozilla\Thunderbird\AppUpdateURL = "https://yoursite.com"
34 | ```
35 | ### BlockAboutAddons
36 |
37 | Block access to the Add-ons Manager (about:addons).
38 |
39 | **Compatibility:** Thunderbird 68\
40 | **CCK2 Equivalent:** `disableAddonsManager`\
41 | **Preferences Affected:** N/A
42 |
43 | #### Windows
44 | ```
45 | Software\Policies\Mozilla\Thunderbird\BlockAboutAddons = 0x1 | 0x0
46 | ```
47 | ### BlockAboutConfig
48 |
49 | Block access to about:config.
50 |
51 | **Compatibility:** Thunderbird 68\
52 | **CCK2 Equivalent:** `disableAboutConfig`\
53 | **Preferences Affected:** N/A
54 |
55 | #### Windows
56 | ```
57 | Software\Policies\Mozilla\Thunderbird\BlockAboutConfig = 0x1 | 0x0
58 | ```
59 | ### BlockAboutProfiles
60 |
61 | Block access to About Profiles (about:profiles).
62 |
63 | **Compatibility:** Thunderbird 68\
64 | **CCK2 Equivalent:** `disableAboutProfiles`\
65 | **Preferences Affected:** N/A
66 |
67 | #### Windows
68 | ```
69 | Software\Policies\Mozilla\Thunderbird\BlockAboutProfiles = 0x1 | 0x0
70 | ```
71 | ### Certificates | Install
72 |
73 | Install certificates into the Thunderbird certificate store. If only a filename is specified, Thunderbird searches for the file in the following locations:
74 |
75 | - Windows
76 | - %USERPROFILE%\AppData\Local\Thunderbird\Certificates
77 | - %USERPROFILE%\AppData\Roaming\Thunderbird\Certificates
78 |
79 | Certificates are installed using the trust string `CT,CT,`.
80 |
81 | Binary (DER) and ASCII (PEM) certificates are both supported.
82 |
83 | **Compatibility:** Thunderbird 68\
84 | **CCK2 Equivalent:** `certs.ca`\
85 | **Preferences Affected:** N/A
86 |
87 | #### Windows
88 | ```
89 | Software\Policies\Mozilla\Thunderbird\Certificates\Install\1 = "cert1.der"
90 | Software\Policies\Mozilla\Thunderbird\Certificates\Install\2 = "C:\Users\username\cert2.pem"
91 | ```
92 | ### DisableAppUpdate
93 | Turn off application updates.
94 |
95 | **Compatibility:** Thunderbird 68\
96 | **CCK2 Equivalent:** `disableThunderbirdUpdates`\
97 | **Preferences Affected:** N/A
98 |
99 | #### Windows
100 | ```
101 | Software\Policies\Mozilla\Thunderbird\DisableAppUpdate = 0x1 | 0x0
102 | ```
103 | ### DisableDeveloperTools
104 | Remove access to all developer tools.
105 |
106 | **Compatibility:** Thunderbird 68\
107 | **CCK2 Equivalent:** `removeDeveloperTools`\
108 | **Preferences Affected:** `devtools.policy.disabled`
109 |
110 | #### Windows
111 | ```
112 | Software\Policies\Mozilla\Thunderbird\DisableDeveloperTools = 0x1 | 0x0`
113 | ```
114 | ### DisableMasterPasswordCreation
115 | Remove the master password functionality.
116 |
117 | **Compatibility:** Thunderbird 68\
118 | **CCK2 Equivalent:** `noMasterPassword`\
119 | **Preferences Affected:** N/A
120 |
121 | #### Windows
122 | ```
123 | Software\Policies\Thunderbird\Thunderbird\DisableMasterPasswordCreation = 0x1 | 0x0
124 | ```
125 | ### Extensions
126 | Control the installation, uninstallation and locking of extensions.
127 |
128 | `Install` is a list of URLs or native paths for extensions to be installed.
129 |
130 | `Uninstall` is a list of extension IDs that should be uninstalled if found.
131 |
132 | `Locked` is a list of extension IDs that the user cannot disable or uninstall.
133 |
134 | **Compatibility:** Thunderbird 68\
135 | **CCK2 Equivalent:** `addons`\
136 | **Preferences Affected:** N/A
137 |
138 | #### Windows
139 | ```
140 | Software\Policies\Mozilla\Thunderbird\Extensions\Install\1 = "//path/to/xpi"
141 | Software\Policies\Mozilla\Thunderbird\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
142 | Software\Policies\Mozilla\Thunderbird\Extensions\Locked\1 = "addon_id@mozilla.org"
143 | ```
144 | ### ExtensionUpdate
145 | Control extension updates.
146 |
147 | **Compatibility:** Thunderbird 68\
148 | **CCK2 Equivalent:** N/A\
149 | **Preferences Affected:** `extensions.update.enabled`
150 |
151 | #### Windows
152 | ```
153 | Software\Policies\Mozilla\Thunderbird\ExtensionUpdate = 0x1 | 0x0
154 | ```
155 |
--------------------------------------------------------------------------------
/windows/en-US/thunderbird.adml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 | Microsoft Windows XP SP2 or later
8 | Thunderbird 68 or later
9 | Thunderbird
10 | Extensions
11 | Addons
12 | Certificates
13 | Block Add-ons Manager
14 | If this policy is enabled, the user cannot access the Add-ons Manager or about:addons.
15 |
16 | If this policy is disabled or not configured, the user can access the Add-ons Manager and about:addons.
17 | Block about:config
18 | If this policy is enabled, the user cannot access about:config.
19 |
20 | If this policy is disabled or not configured, the user can access about:config.
21 | Block about:profiles
22 | If this policy is enabled, the user cannot access about:profiles.
23 |
24 | If this policy is disabled or not configured, the user can access about:profiles.
25 | Custom Update URL
26 | If this policy is enabled, you can set a URL to an update server other than the default. This could be helpful if you run your own update server on your network.
27 |
28 | If this policy is disabled or not configured, the default update URL is used.
29 | Import Enterprise Roots
30 | If this policy is enabled, Thunderbird will read certificates from the Windows certificate store.
31 |
32 | If this policy is disabled or not configured, Thunderbird will not read certificates from the Windows certificate store.
33 | Install Certificates
34 | If this policy is enabled, Thunderbird will install the listed certificates into Thunderbird. It will look in %USERPROFILE%\AppData\Local\Thunderbird\Certificates and %USERPROFILE%\AppData\Roaming\Thunderbird\Certificates.
35 |
36 | If this policy is disabled or not configured, Thunderbird will not install additional certificates.
37 | Disable Update
38 | If this policy is enabled, Thunderbird does not receive updates.
39 |
40 | If this policy is disabled or not configured, Thunderbird receives updates.
41 | Disable Developer Tools
42 | If this policy is enabled, developer tools are not available within Thunderbird.
43 |
44 | If this policy is disabled or not configured, developer tools are available within Thunderbird.
45 | Disable Master Password Creation
46 | If this policy is enabled, users cannot create a master password.
47 |
48 | If this policy is disabled or not configured, users can create a master password.
49 | Prevent overriding certificate errors
50 | If this policy is enabled, the "Add Exception" button is not available when a certificate is invalid. This prevents the user from overriding the certificate error.
51 |
52 | If this policy is disabled or not configured, certificate errors can be overridden.
53 | Prevent overriding safe browsing errors
54 | If this policy is enabled, a user cannot bypass the warning and visit a harmful site.
55 |
56 | If this policy is disabled or not configured, a user can choose to visit a harmful site.
57 | Extensions to Install
58 | If this policy is enabled, you can specify a list of extension URLs or paths that will be installed when Thunderbird is started.
59 | Anytime this list is changed, the extensions will be reinstalled.
60 |
61 | If this policy is disabled or not configured, no extensions are installed.
62 | Extensions to Uninstall
63 | If this policy is enabled, you can specify a list of extension IDs that will be uninstalled.
64 | Anytime this list is changed, the extensions will be uninstalled.
65 |
66 | If this policy is disabled or not configured, no extensions are uninstalled.
67 | Prevent extensions from being disabled or removed
68 | If this policy is enabled, you can specify a list of extension IDs that the user will be unable to uninstall or disable.
69 |
70 | If this policy is disabled or not configured, no extensions are locked
71 | Extension Update
72 | If this policy is disabled, extensions will not be updated automatically.
73 |
74 | If this policy is enabled or not configured, extensions will be updated automatically.
75 | Extension Management
76 | If this policy is enabled, you can use JSON to describe the extension management policy.
77 |
78 | If this policy is disabled or not configured, extensions will not be managed.
79 | Proxy Settings
80 | If this policy is enabled, you can configure and lock network settings.
81 |
82 | Select the connection type and then fill in the appropriate sections. Due to a bug, you must select a value for the SOCKS proxy version.
83 |
84 | If this policy is disabled or not configured, the default network settings are used and user can change them.
85 | SOCKS v4
86 | SOCKS v5
87 | Automatic proxy configuration URL
88 | These should only be set if you selected autoConfig
89 | Proxy bypass URLs
90 | These should only be set if you selected manual proxy
91 | Connection Type
92 | No Proxy
93 | Use system proxy settings
94 | Manual proxy configuration
95 | Auto-detect proxy settings
96 | Automatic proxy configuration
97 |
98 |
99 |
100 |
101 |
102 |
103 |
104 |
105 | Don't allow proxy settings to be changed.
106 | Connection Type:
107 |
108 | HTTP Proxy:
109 |
110 |
111 |
112 | Use this proxy server for all protocols.
113 | SSL Proxy:
114 |
115 |
116 |
117 | FTP Proxy:
118 |
119 |
120 |
121 | SOCKS Host:
122 |
123 |
124 |
125 | SOCKS Version:
126 |
127 | No proxy for
128 |
129 |
130 |
131 | Example: .mozilla.org, .net.nz, 192.168.1.0/24
132 | Automatic proxy configuration URL:
133 |
134 |
135 |
136 | Do not prompt for authentication if password is saved.
137 | Proxy DNS when using SOCKS v5.
138 |
139 |
140 |
141 |
142 |
143 |
144 |
145 |
146 |
147 |
148 |
149 |
150 |
151 |
--------------------------------------------------------------------------------
/windows/es-ES/thunderbird.adml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 | Microsoft Windows XP SP2 o posterior
8 | Thunderbird 68 o posterior
9 | Thunderbird
10 | Extensiones
11 | Complementos
12 | Certificados
13 | Bloquear el administrador de complementos
14 | Si esta política está habilitada, el usuario no podrá acceder al administrador de complementos o en about:addons.
15 |
16 | Si esta política está deshabilitada o no está configurada, el usuario podrá acceder al administrador de complementos o en about:addons.
17 | Bloquear about:config
18 | Si esta política está habilitada, el usuario no podrá acceder en about:config.
19 |
20 | Si esta política está deshabilitada o no está configurada, el usuario podrá acceder en about:config.
21 | Bloquear about:profiles
22 | Si esta política está habilitada, el usuario no podrá acceder en about:profiles.
23 |
24 | Si esta política está deshabilitada o no está configurada, el usuario podrá acceder en about:profiles.
25 | URL de actualización personalizada
26 | Si esta política está habilitada, podrá establecer una URL para un servidor de actualización que no sea el predeterminado. Esto podría ser útil si ejecuta su propio servidor de actualización en su red.
27 |
28 | Si esta política está deshabilitada o no está configurada, se utilizará la URL de actualización predeterminada.
29 | Importar certificados raíces
30 | Si esta política está habilitada, Thunderbird leerá los certificados del almacén de certificados de Windows.
31 |
32 | Si esta política está deshabilitada o no está configurada, Thunderbird no leerá los certificados del almacén de certificados de Windows.
33 | Instalar certificados
34 | Si esta política está habilitada, Thunderbird instalará los certificados listados en Thunderbird. Se verá en %USERPROFILE%\AppData\Local\Thunderbird\Certificates and %USERPROFILE%\AppData\Roaming\Thunderbird\Certificates.
35 |
36 | Si esta política está deshabilitada o no está configurada, Thunderbird no instalará certificados adicionales.
37 | Deshabilitar actualización
38 | Si esta política está habilitada, Thunderbird no recibirá actualizaciones.
39 |
40 | Si esta política está deshabilitada o no está configurada, Thunderbird recibirá actualizaciones.
41 | Deshabilitar herramientas para desarrolladores
42 | Si esta política está habilitada, las herramientas para desarrolladores web no están disponibles dentro de Thunderbird.
43 |
44 | Si esta política está deshabilitada o no está configurada, las herramientas para desarrolladores web estarán disponibles dentro de Thunderbird.
45 | Deshabilitar la creación de contraseña maestra
46 | Si esta política está habilitada, los usuarios no podrán crear una contraseña maestra.
47 |
48 | Si esta política está deshabilitada o no está configurada, los usuarios podrán crear una contraseña maestra.
49 | Evitar anular los errores de certificado
50 | Si esta política está habilitada, el botón "Añadir excepción" no estará disponible cuando un certificado no es válido. Esto evita que el usuario anule el error de certificado.
51 |
52 | Si esta política está deshabilitada o no está configurada, los errores de certificado pueden anularse.
53 | Evitar anular los errores de navegación segura
54 | Si esta política está habilitada, un usuario no podrá eludir la advertencia y visitar un sitio dañino.
55 |
56 | Si esta política está deshabilitada o no está configurada, un usuario podrá elegir visitar un sitio dañino.
57 | Extensiones para instalar
58 | Si esta política está habilitada, podrá especificar una lista de URL de extensiones o rutas que se instalarán cuando se inicie Thunderbird.
59 | Cada vez que se cambie esta lista, las extensiones se reinstalarán.
60 |
61 | Si esta política está deshabilitada o no está configurada, no se instalarán extensiones.
62 | Extensiones para desinstalar
63 | Si esta política está habilitada, podrá especificar una lista de ID de extensiones que se desinstalarán.
64 | Cada vez que se cambie esta lista, las extensiones se desinstalarán.
65 |
66 | Si esta política está deshabilitada o no está configurada, no se desinstalarán las extensiones.
67 | Evitar que las extensiones se deshabiliten o se borrén
68 | Si esta política está habilitada, podrá especificar una lista de ID de extensiones que el usuario no podrá desinstalar o deshabilitar.
69 |
70 | Si esta política está deshabilitada o no está configurada, no se bloquearán las extensiones.
71 | Actualización de extensiones
72 | Si esta política está deshabilitada, las extensiones no se actualizarán automáticamente.
73 |
74 | Si esta política está habilitada o no está configurada, las extensiones se actualizarán automáticamente.
75 | Gestión de extensiones
76 | Si esta política está habilitada, podrá utilizar JSON para describir la política de gestión de extensiones.
77 |
78 | Si esta política está deshabilitada o no está configurada, las extensiones no se gestionarán.
79 | Configuración del proxy
80 | Si esta política está habilitada, podrá configurar y bloquear la configuración de red.
81 |
82 | Seleccione el tipo de conexión y luego complete las secciones correspondientes. Debido a un error, debe seleccionar un valor para la versión proxy de SOCKS.
83 |
84 | Si esta política está deshabilitada o no está configurada, se usa la configuración de red predeterminada y el usuario podrá cambiarla.
85 | SOCKS v4
86 | SOCKS v5
87 | Configuración automática de URL del proxy
88 | Esto solo debería establecerse si seleccionó autoConfig
89 | URL omitidas por proxy
90 | Esto solo debe configurarse si seleccionó proxy manual
91 | Tipo de conexión
92 | Sin Proxy
93 | Usar la configuración de proxy del sistema
94 | Configuración manual del proxy
95 | Detección automática de la configuración del proxy
96 | Configuración automática de proxy
97 |
98 |
99 |
100 |
101 |
102 |
103 |
104 |
105 | No permitir que se cambie la configuración del proxy.
106 | Tipo de conexión:
107 |
108 | Prosy HTTP:
109 |
110 |
111 |
112 | Utilizar este servidor proxy para todos los protocolos.
113 | Proxy SSL:
114 |
115 |
116 |
117 | Proxy FTP:
118 |
119 |
120 |
121 | Servidor SOCKS:
122 |
123 |
124 |
125 | Versión de SOCKS:
126 |
127 | No usar proxy para
128 |
129 |
130 |
131 | Ejemplo: .mozilla.org, .net.nz, 192.168.1.0/24
132 | Configuración automática de URL del proxy:
133 |
134 |
135 |
136 | No solicitar la autenticación si se guarda la contraseña.
137 | DNS proxy cuando se utiliza SOCKS v5.
138 |
139 |
140 |
141 |
142 |
143 |
144 |
145 |
146 |
147 |
148 |
149 |
150 |
151 |
--------------------------------------------------------------------------------
/windows/it-IT/thunderbird.adml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 | Microsoft Windows XP SP2 o versione successiva
8 | Thunderbird 68 o versione successiva
9 | Thunderbird
10 | Estensioni
11 | Componenti aggiuntivi
12 | Certificati
13 | Blocca Gestore componenti aggiuntivi
14 | Se questo criterio è abilitato, l'utente non può accedere al Gestore componenti aggiuntivi o ad about:addons.
15 |
16 | Se questo criterio è disabilitato o non configurato, l'utente può accedere al Gestore componenti aggiuntivi e ad about:addons.
17 | Blocca about:config
18 | Se questo criterio è abilitato, l'utente non può accedere ad about:config.
19 |
20 | Se questo criterio è disabilitato o non configurato, l'utente può accedere ad about:config.
21 | Blocca about:profiles
22 | Se questo criterio è abilitato, l'utente non può accedere ad about:profiles.
23 |
24 | Se questo criterio è disabilitato o non configurato, l'utente può accedere ad about:profiles.
25 | URL aggiornamento personalizzato
26 | Se questo criterio è abilitato, è possibile impostare un URL diverso da quello predefinito per il server di aggiornamento. Ciò potrebbe essere utile se si dispone di un server di aggiornamento sulla propria rete.
27 |
28 | Se questo criterio è disabilitato o non utilizzato, verrà utilizzato l'URL di aggiornamento predefinito.
29 | Importa Autorità di certificazione radice enterprise
30 | Se questo criterio è abilitato, Thunderbird utilizzerà i certificati radice nell'Archivio certificati di Windows.
31 |
32 | Se questo criterio è disabilitato o non configurato, Thunderbird non utilizzerà i certificati radice nell'Archivio certificati di Windows.
33 | Installa certificati
34 | Se questo criterio è abilitato, Thunderbird installerà i certificati elencati in Thunderbird. Questi saranno cercati in %USERPROFILE%\AppData\Local\Thunderbird\Certificates e in %USERPROFILE%\AppData\Roaming\Thunderbird\Certificates.
35 |
36 | Se questo criterio è disabilitato o non configurato, Thunderbird non installerà certificati aggiuntivi.
37 | Disabilita aggiornamenti
38 | Se questo criterio è abilitato, Thunderbird non riceverà aggiornamenti.
39 |
40 | Se questo criterio è disabilitato o non configurato, Thunderbird riceverà aggiornamenti.
41 | Disabilita Strumenti di sviluppo
42 | Se questo criterio è abilitato, gli strumenti di sviluppo non saranno disponibili in Thunderbird.
43 |
44 | Se questo criterio è disabilitato o non configurato, gli strumenti di sviluppo saranno disponibili in Thunderbird.
45 | Disabilita creazione password principale
46 | Se questo criterio è abilitato, gli utenti non possono creare una password principale.
47 |
48 | Se questo criterio è disabilitato o non configurato, gli utenti possono creare una password principale.
49 | Impedisci l'override degli errori certificato
50 | Se questo criterio è abilitato, il pulsante "Aggiungi eccezione" non è disponibile se un certificato non è valido. Ciò impedisce all'utente di eseguire l'override dell'errore del certificato.
51 |
52 | Se questo criterio è disabilitato o non configurato, è possibile eseguire l'override degli errori certificato.
53 | Impedisci l'override degli errori Protezione phishing e malware
54 | Se questo criterio è abilitato, un utente non può ignorare l'avvertimento e visitare un sito malevolo.
55 |
56 | Se questo criterio è disabilitato o non configurato, un utente può decidere di visitare un sito malevolo.
57 | Estensioni da installare
58 | Se questo criterio è abilitato, è possibile specificare un elenco di URL o percorsi a estensioni che saranno installate all'avvio di Thunderbird.
59 | Le estensioni saranno reinstallate a ogni modifica dell'elenco.
60 |
61 | Se questo criterio è disabilitato o non configurato, non sarà installata alcuna estensione.
62 | Estensioni da disinstallare
63 | Se questo criterio è abilitato, è possibile specificare un elenco di ID di estensioni da disinstallare.
64 | Le estensioni saranno disinstallate a ogni modifica dell'elenco.
65 |
66 | Se questo criterio è disabilitato o non configurato, non sarà disinstallata alcuna estensione.
67 | Impedisci la disabilitazione o la rimozione delle estensioni
68 | Se questo criterio è abilitato, è possibile specificare un elenco di ID delle estensioni che l'utente non sarà in grado di disinstallare o disabilitare.
69 |
70 | Se questo criterio è disabilitato o non configurato, non sarà bloccata nessuna estensione.
71 | Aggiornamento estensioni
72 | Se questo criterio è disabilitato, le estensioni non saranno aggiornate automaticamente.
73 |
74 | Se questo criterio è abilitato o non configurato, le estensioni saranno aggiornate automaticamente.
75 | Gestione estensioni
76 | Se questo criterio è abilitato, è possibile utilizzare JSON per descrivere la politica di gestione delle estensioni.
77 |
78 | Se questo criterio è disabilitato o non configurato, le estensioni non saranno gestite.
79 | Impostazioni proxy
80 | Se questo criterio è abilitato, è possibile configurare e bloccare le impostazioni di rete.
81 |
82 | Selezionare il tipo di connessione e quindi compilare le sezioni appropriate. A causa di un bug, è necessario selezionare un valore per la versione del proxy SOCKS.
83 |
84 | Se questo criterio è disabilitato o non configurato, saranno utilizzate le impostazioni di rete predefinite e l'utente potrà modificarle.
85 | SOCKS v4
86 | SOCKS v5
87 | URL configurazione automatica proxy
88 | Queste opzioni devono essere impostate solo se è stata selezionata la configurazione automatica
89 | Nessun proxy per
90 | Queste opzioni devono essere impostate solo se è stata selezionata la configurazione manuale dei proxy
91 | Tipo connessione
92 | Nessun proxy
93 | Utilizza le impostazioni proxy del sistemas
94 | Configurazione manuale dei proxy
95 | Individua automaticamente le impostazioni proxy
96 | Configurazione automatica proxy
97 |
98 |
99 |
100 |
101 |
102 |
103 |
104 |
105 | Non consentire la modifica delle impostazioni del proxy.
106 | Tipo connessione:
107 |
108 | Proxy HTTP:
109 |
110 |
111 |
112 | Use this proxy server for all protocols.
113 | Proxy SSL:
114 |
115 |
116 |
117 | Proxy FTP:
118 |
119 |
120 |
121 | Host SOCKS:
122 |
123 |
124 |
125 | Versione SOCKS:
126 |
127 | Nessun proxy per
128 |
129 |
130 |
131 | Esempio: .mozilla.org, .net.nz, 192.168.1.0/24
132 | URL configurazione automatica proxy:
133 |
134 |
135 |
136 | Non richiedere l'autenticazione se la password è salvata.
137 | DNS proxy per SOCKS v5.
138 |
139 |
140 |
141 |
142 |
143 |
144 |
145 |
146 |
147 |
148 |
149 |
150 |
151 |
--------------------------------------------------------------------------------
/windows/de-DE/thunderbird.adml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 | Microsoft Windows XP SP2 oder neuer
8 | Thunderbird 68 oder neuer
9 | Thunderbird
10 | Erweiterungen
11 | Addons
12 | Zertifikate
13 | Add-ons Manager blockieren
14 | Wenn diese Gruppenrichtlinieneinstellung aktiviert ist, kann der Nutzer nicht auf den Add-ons Manager oder about:addons zugreifen.
15 |
16 | Wenn diese Gruppenrichtlinieneinstellung deaktiviert oder nicht konfiguriert ist, kann der Nutzer auf den Add-ons Manager oder about:addons zugreifen.
17 | about:config blockieren
18 | Wenn diese Gruppenrichtlinieneinstellung aktiviert ist, kann der Nutzer nicht auf about:config zugreifen.
19 |
20 | Wenn diese Gruppenrichtlinieneinstellung deaktiviert oder nicht konfiguriert ist, kann der Nutzer auf about:config zugreifen.
21 | about:profiles blockieren
22 | Wenn diese Gruppenrichtlinieneinstellung aktiviert ist, kann der Nutzer nicht auf about:profiles zugreifen.
23 |
24 | Wenn diese Gruppenrichtlinieneinstellung deaktiviert oder nicht konfiguriert ist, kann der Nutzer auf about:profiles zugreifen.
25 | Vorgegebene Update-URL
26 | Wenn diese Gruppenrichtlinieneinstellung aktiviert ist, wird eine vorgegebene URL als Update-Server anstelle des standardmäßigen Update-Servers festgelegt. Dies ist hilfreich, wenn man seinen eigenen Updateserver im Firmennetzwerk einsetzt.
27 |
28 | Wenn diese Gruppenrichtlinieneinstellung deaktiviert oder nicht konfiguriert ist, verwendet Thunderbird die standardmäßige Update-URL.
29 | Enterprise Root-Zertifikate importieren
30 | Wenn diese Gruppenrichtlinieneinstellung aktiviert ist, wird Thunderbird Zertifikate vom Windows-eigenen Zertifikatsspeicher importieren.
31 |
32 | Wenn diese Gruppenrichtlinieneinstellung deaktiviert oder nicht konfiguriert ist, wird Thunderbird keine Zertifikate vom Windows-eigenen Zertifikatsspeicher importieren.
33 | Zertifikate installieren
34 | Wenn diese Gruppenrichtlinieneinstellung aktiviert ist, wird Thunderbird die aufgelisteten Zertifikate installieren. Die Zertifikate müssen sich in %USERPROFILE%\AppData\Local\Thunderbird\Certificates und %USERPROFILE%\AppData\Roaming\Thunderbird\Certificates befinden.
35 |
36 | Wenn diese Gruppenrichtlinieneinstellung deaktiviert oder nicht konfiguriert ist, wird Thunderbird keine Zertifikate installieren.
37 | Updates deaktvieren
38 | Wenn diese Gruppenrichtlinieneinstellung aktiviert ist, wird Thunderbird keine Updates installieren.
39 |
40 | Wenn diese Gruppenrichtlinieneinstellung deaktiviert oder nicht konfiguriert ist, wird Thunderbird Updates erhalten.
41 | Developer Tools deaktivieren
42 | Wenn diese Gruppenrichtlinieneinstellung aktiviert ist, sind Developer Tools in Thunderbird deaktiviert.
43 |
44 | Wenn diese Gruppenrichtlinieneinstellung deaktiviert oder nicht konfiguriert ist, sind Developer Tools in Thunderbird weiterhin vorhanden.
45 | Masterpasswort Erstellung deaktivieren
46 | Wenn diese Gruppenrichtlinieneinstellung aktiviert ist, sind Nutzer nicht in der Lage Masterpasswörter einzurichten.
47 |
48 | Wenn diese Gruppenrichtlinieneinstellung deaktiviert oder nicht konfiguriert ist, können Nutzer nach wie vor Masterpasswörter einrichten.
49 | Nutzer abhalten, Zertifikatsfehler zu ignorieren
50 | Wenn diese Gruppenrichtlinieneinstellung aktiviert ist, können Nutzer die Schaltfläche "Ausnahme hinzufügen..." nicht verwenden.
51 |
52 | Wenn diese Gruppenrichtlinieneinstellung deaktiviert oder nicht konfiguriert ist, können Ausnahmen bei auftretenden Zertifikatsfehlern hinzugefügt werden.
53 | Betrugsversuch- und Schadprogrammschutz ändern
54 | Wenn Sie die Richtlinieneinstellung aktivieren, können Benutzer Warnungen zu Betrugsversuch- und Schadprogrammschutz nicht umgehen um eine schädliche Webseite zu besuchen.
55 |
56 | Wenn Sie die Richtlinieneinstellung deaktivieren oder nicht konfigurieren, können Benutzer Warnungen zu Betrugsversuch- und Schadprogrammschutz umgehen um eine schädliche Webseite zu besuchen.
57 | Erweiterungen installieren
58 | Wenn Sie die Richtlinieneinstellung aktivieren, können Sie eine Liste mit Erweiterungs-URLs oder -pfaden angeben, die beim Start von Thunderbird installiert werden.
59 | Jedes Mal, wenn diese Liste geändert wird, werden die Erweiterungen erneut installiert.
60 |
61 | Wenn Sie die Richtlinieneinstellung deaktivieren oder nicht konfigurieren, werden keine Erweiterungen installiert.
62 | Erweiterungen deinstallieren
63 | Wenn Sie die Richtlinieneinstellung aktivieren, können Sie eine Liste mit Erweiterungs-IDs angeben, die beim Start deinstalliert werden.
64 | Jedes Mal, wenn diese Liste geändert wird, werden die Erweiterungen deinstalliert.
65 |
66 | Wenn Sie die Richtlinieneinstellung deaktivieren oder nicht konfigurieren, werden keine Erweiterungen deinstalliert.
67 | Verhindern, dass Erweiterungen deaktiviert oder gelöscht werden
68 | Wenn Sie die Richtlinieneinstellung aktivieren, können Sie eine Liste mit Erweiterungs-IDs angeben, die den Benutzer hindert die angegebenen Erweiterungen zu deinstallieren oder zu deaktivieren.
69 |
70 | Wenn Sie die Richtlinieneinstellung deaktivieren oder nicht konfigurieren, werden keine Erweiterungen gesperrt.
71 | Extension Update
72 | Wenn Sie die Richtlinieneinstellung deaktivieren, werden Add-ons nicht automatisch aktualisiert.
73 |
74 | Wenn Sie die Richtlinieneinstellung aktivieren oder nicht konfigurieren, werden Add-ons automatisch aktualisiert.
75 | Extension Management
76 | If this policy is enabled, you can use JSON to describe the extension management policy.
77 |
78 | If this policy is disabled or not configured, extensions will not be managed.
79 | Proxy Settings
80 | Wenn Sie die Richtlinieneinstellung aktivieren, können Sie die Netzwerkeinstellungen ändern und sperren.
81 |
82 | Wählen Sie den Verbindungstyp und füllen Sie die entsprechenden Abschnitte aus. Aufgrund eines Fehlers müssen Sie einen Wert für die SOCKS-Proxy-Version auswählen.
83 |
84 | Wenn Sie die Richtlinieneinstellung deaktivieren oder nicht konfigurieren, werden die Standard Netzwerk-Einstellungen verwenden. Diese können vom Benutzer verändert werden.
85 | SOCKS v4
86 | SOCKS v5
87 | Automatische Proxy Konfigurations-URL
88 | Diese Richtlinieneinstellung sollte nur gewählt werden, wenn autoConfig aktiviert ist.
89 | Proxy bypass URLs
90 | These should only be set if you selected manual proxy
91 | Verbindungsart
92 | Kein Proxy
93 | System Proxy verwenden
94 | Manuelle Proxy Konfiguration
95 | Automatisch Proxy erkennen
96 | Automatisch Proxy-Einstellungen setzen
97 |
98 |
99 |
100 |
101 |
102 |
103 |
104 |
105 | Änderungen an den Proxy-Einstellungen verbieten.
106 | Verbindungsart:
107 |
108 | HTTP Proxy:
109 |
110 |
111 |
112 | Diesen Proxy für alle Protokolle verwenden.
113 | SSL Proxy:
114 |
115 |
116 |
117 | FTP Proxy:
118 |
119 |
120 |
121 | SOCKS Host:
122 |
123 |
124 |
125 | SOCKS Version:
126 |
127 | Kein Proxy für:
128 |
129 |
130 |
131 | Beispiele: .mozilla.org, .net.nz, 192.168.1.0/24
132 | Automatische Proxy Konfigurations-URL:
133 |
134 |
135 |
136 | Keine Authentifizierungsanfrage bei gespeichertem Passwort.
137 | Bei Verwendung von SOCKS v5 den Proxy für DNS-Anfragen verwenden.
138 |
139 |
140 |
141 |
142 |
143 |
144 |
145 |
146 |
147 |
148 |
149 |
150 |
151 |
--------------------------------------------------------------------------------
/windows/thunderbird.admx:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
15 |
16 |
17 |
18 |
19 |
20 |
21 |
22 |
23 |
24 |
25 |
26 |
27 |
28 |
29 |
30 |
31 |
32 |
33 |
34 |
35 |
36 |
37 |
38 |
39 |
40 |
41 |
42 |
43 |
44 |
45 |
46 |
47 |
48 |
49 |
50 |
51 |
52 |
53 |
54 |
55 |
56 |
57 |
58 |
59 |
60 |
61 |
62 |
63 |
64 |
65 |
66 |
67 |
68 |
69 |
70 |
71 |
72 |
73 |
74 |
75 |
76 |
77 |
78 |
79 |
80 |
81 |
82 |
83 |
84 |
85 |
86 |
87 |
88 |
89 |
90 |
91 |
92 |
93 |
94 |
95 |
96 |
97 |
98 |
99 |
100 |
101 |
102 |
103 |
104 |
105 |
106 |
107 |
108 |
109 |
110 |
111 |
112 |
113 |
114 |
115 |
116 |
117 |
118 |
119 |
120 |
121 |
122 |
123 |
124 |
125 |
126 |
127 |
128 |
129 |
130 |
131 |
132 |
133 |
134 |
135 |
136 |
137 |
138 |
139 |
140 |
141 |
142 |
143 |
144 |
145 |
146 |
147 |
148 |
149 |
150 |
151 |
152 | ">
153 |
154 |
155 |
156 |
157 |
158 |
159 |
160 |
161 |
162 |
163 |
164 |
165 |
166 |
167 |
168 |
169 |
170 |
171 |
172 |
173 |
174 |
175 |
176 |
177 |
178 |
179 |
180 |
181 |
182 |
183 |
184 | none
185 |
186 |
187 |
188 |
189 | system
190 |
191 |
192 |
193 |
194 | manual
195 |
196 |
197 |
198 |
199 | autoDetect
200 |
201 |
202 |
203 |
204 | autoConfig
205 |
206 |
207 |
208 |
209 |
210 |
211 |
212 |
213 |
214 |
215 |
216 |
217 |
218 |
219 |
220 |
221 |
222 |
223 |
224 |
225 |
226 |
227 |
228 |
229 |
230 |
231 |
232 |
233 |
234 |
235 |
236 |
237 |
238 |
239 |
240 |
241 |
242 |
243 |
244 |
245 |
246 |
247 |
248 |
249 |
250 |
251 |
252 |
253 |
254 |
--------------------------------------------------------------------------------
/LICENSE:
--------------------------------------------------------------------------------
1 | Mozilla Public License Version 2.0
2 | ==================================
3 |
4 | 1. Definitions
5 | --------------
6 |
7 | 1.1. "Contributor"
8 | means each individual or legal entity that creates, contributes to
9 | the creation of, or owns Covered Software.
10 |
11 | 1.2. "Contributor Version"
12 | means the combination of the Contributions of others (if any) used
13 | by a Contributor and that particular Contributor's Contribution.
14 |
15 | 1.3. "Contribution"
16 | means Covered Software of a particular Contributor.
17 |
18 | 1.4. "Covered Software"
19 | means Source Code Form to which the initial Contributor has attached
20 | the notice in Exhibit A, the Executable Form of such Source Code
21 | Form, and Modifications of such Source Code Form, in each case
22 | including portions thereof.
23 |
24 | 1.5. "Incompatible With Secondary Licenses"
25 | means
26 |
27 | (a) that the initial Contributor has attached the notice described
28 | in Exhibit B to the Covered Software; or
29 |
30 | (b) that the Covered Software was made available under the terms of
31 | version 1.1 or earlier of the License, but not also under the
32 | terms of a Secondary License.
33 |
34 | 1.6. "Executable Form"
35 | means any form of the work other than Source Code Form.
36 |
37 | 1.7. "Larger Work"
38 | means a work that combines Covered Software with other material, in
39 | a separate file or files, that is not Covered Software.
40 |
41 | 1.8. "License"
42 | means this document.
43 |
44 | 1.9. "Licensable"
45 | means having the right to grant, to the maximum extent possible,
46 | whether at the time of the initial grant or subsequently, any and
47 | all of the rights conveyed by this License.
48 |
49 | 1.10. "Modifications"
50 | means any of the following:
51 |
52 | (a) any file in Source Code Form that results from an addition to,
53 | deletion from, or modification of the contents of Covered
54 | Software; or
55 |
56 | (b) any new file in Source Code Form that contains any Covered
57 | Software.
58 |
59 | 1.11. "Patent Claims" of a Contributor
60 | means any patent claim(s), including without limitation, method,
61 | process, and apparatus claims, in any patent Licensable by such
62 | Contributor that would be infringed, but for the grant of the
63 | License, by the making, using, selling, offering for sale, having
64 | made, import, or transfer of either its Contributions or its
65 | Contributor Version.
66 |
67 | 1.12. "Secondary License"
68 | means either the GNU General Public License, Version 2.0, the GNU
69 | Lesser General Public License, Version 2.1, the GNU Affero General
70 | Public License, Version 3.0, or any later versions of those
71 | licenses.
72 |
73 | 1.13. "Source Code Form"
74 | means the form of the work preferred for making modifications.
75 |
76 | 1.14. "You" (or "Your")
77 | means an individual or a legal entity exercising rights under this
78 | License. For legal entities, "You" includes any entity that
79 | controls, is controlled by, or is under common control with You. For
80 | purposes of this definition, "control" means (a) the power, direct
81 | or indirect, to cause the direction or management of such entity,
82 | whether by contract or otherwise, or (b) ownership of more than
83 | fifty percent (50%) of the outstanding shares or beneficial
84 | ownership of such entity.
85 |
86 | 2. License Grants and Conditions
87 | --------------------------------
88 |
89 | 2.1. Grants
90 |
91 | Each Contributor hereby grants You a world-wide, royalty-free,
92 | non-exclusive license:
93 |
94 | (a) under intellectual property rights (other than patent or trademark)
95 | Licensable by such Contributor to use, reproduce, make available,
96 | modify, display, perform, distribute, and otherwise exploit its
97 | Contributions, either on an unmodified basis, with Modifications, or
98 | as part of a Larger Work; and
99 |
100 | (b) under Patent Claims of such Contributor to make, use, sell, offer
101 | for sale, have made, import, and otherwise transfer either its
102 | Contributions or its Contributor Version.
103 |
104 | 2.2. Effective Date
105 |
106 | The licenses granted in Section 2.1 with respect to any Contribution
107 | become effective for each Contribution on the date the Contributor first
108 | distributes such Contribution.
109 |
110 | 2.3. Limitations on Grant Scope
111 |
112 | The licenses granted in this Section 2 are the only rights granted under
113 | this License. No additional rights or licenses will be implied from the
114 | distribution or licensing of Covered Software under this License.
115 | Notwithstanding Section 2.1(b) above, no patent license is granted by a
116 | Contributor:
117 |
118 | (a) for any code that a Contributor has removed from Covered Software;
119 | or
120 |
121 | (b) for infringements caused by: (i) Your and any other third party's
122 | modifications of Covered Software, or (ii) the combination of its
123 | Contributions with other software (except as part of its Contributor
124 | Version); or
125 |
126 | (c) under Patent Claims infringed by Covered Software in the absence of
127 | its Contributions.
128 |
129 | This License does not grant any rights in the trademarks, service marks,
130 | or logos of any Contributor (except as may be necessary to comply with
131 | the notice requirements in Section 3.4).
132 |
133 | 2.4. Subsequent Licenses
134 |
135 | No Contributor makes additional grants as a result of Your choice to
136 | distribute the Covered Software under a subsequent version of this
137 | License (see Section 10.2) or under the terms of a Secondary License (if
138 | permitted under the terms of Section 3.3).
139 |
140 | 2.5. Representation
141 |
142 | Each Contributor represents that the Contributor believes its
143 | Contributions are its original creation(s) or it has sufficient rights
144 | to grant the rights to its Contributions conveyed by this License.
145 |
146 | 2.6. Fair Use
147 |
148 | This License is not intended to limit any rights You have under
149 | applicable copyright doctrines of fair use, fair dealing, or other
150 | equivalents.
151 |
152 | 2.7. Conditions
153 |
154 | Sections 3.1, 3.2, 3.3, and 3.4 are conditions of the licenses granted
155 | in Section 2.1.
156 |
157 | 3. Responsibilities
158 | -------------------
159 |
160 | 3.1. Distribution of Source Form
161 |
162 | All distribution of Covered Software in Source Code Form, including any
163 | Modifications that You create or to which You contribute, must be under
164 | the terms of this License. You must inform recipients that the Source
165 | Code Form of the Covered Software is governed by the terms of this
166 | License, and how they can obtain a copy of this License. You may not
167 | attempt to alter or restrict the recipients' rights in the Source Code
168 | Form.
169 |
170 | 3.2. Distribution of Executable Form
171 |
172 | If You distribute Covered Software in Executable Form then:
173 |
174 | (a) such Covered Software must also be made available in Source Code
175 | Form, as described in Section 3.1, and You must inform recipients of
176 | the Executable Form how they can obtain a copy of such Source Code
177 | Form by reasonable means in a timely manner, at a charge no more
178 | than the cost of distribution to the recipient; and
179 |
180 | (b) You may distribute such Executable Form under the terms of this
181 | License, or sublicense it under different terms, provided that the
182 | license for the Executable Form does not attempt to limit or alter
183 | the recipients' rights in the Source Code Form under this License.
184 |
185 | 3.3. Distribution of a Larger Work
186 |
187 | You may create and distribute a Larger Work under terms of Your choice,
188 | provided that You also comply with the requirements of this License for
189 | the Covered Software. If the Larger Work is a combination of Covered
190 | Software with a work governed by one or more Secondary Licenses, and the
191 | Covered Software is not Incompatible With Secondary Licenses, this
192 | License permits You to additionally distribute such Covered Software
193 | under the terms of such Secondary License(s), so that the recipient of
194 | the Larger Work may, at their option, further distribute the Covered
195 | Software under the terms of either this License or such Secondary
196 | License(s).
197 |
198 | 3.4. Notices
199 |
200 | You may not remove or alter the substance of any license notices
201 | (including copyright notices, patent notices, disclaimers of warranty,
202 | or limitations of liability) contained within the Source Code Form of
203 | the Covered Software, except that You may alter any license notices to
204 | the extent required to remedy known factual inaccuracies.
205 |
206 | 3.5. Application of Additional Terms
207 |
208 | You may choose to offer, and to charge a fee for, warranty, support,
209 | indemnity or liability obligations to one or more recipients of Covered
210 | Software. However, You may do so only on Your own behalf, and not on
211 | behalf of any Contributor. You must make it absolutely clear that any
212 | such warranty, support, indemnity, or liability obligation is offered by
213 | You alone, and You hereby agree to indemnify every Contributor for any
214 | liability incurred by such Contributor as a result of warranty, support,
215 | indemnity or liability terms You offer. You may include additional
216 | disclaimers of warranty and limitations of liability specific to any
217 | jurisdiction.
218 |
219 | 4. Inability to Comply Due to Statute or Regulation
220 | ---------------------------------------------------
221 |
222 | If it is impossible for You to comply with any of the terms of this
223 | License with respect to some or all of the Covered Software due to
224 | statute, judicial order, or regulation then You must: (a) comply with
225 | the terms of this License to the maximum extent possible; and (b)
226 | describe the limitations and the code they affect. Such description must
227 | be placed in a text file included with all distributions of the Covered
228 | Software under this License. Except to the extent prohibited by statute
229 | or regulation, such description must be sufficiently detailed for a
230 | recipient of ordinary skill to be able to understand it.
231 |
232 | 5. Termination
233 | --------------
234 |
235 | 5.1. The rights granted under this License will terminate automatically
236 | if You fail to comply with any of its terms. However, if You become
237 | compliant, then the rights granted under this License from a particular
238 | Contributor are reinstated (a) provisionally, unless and until such
239 | Contributor explicitly and finally terminates Your grants, and (b) on an
240 | ongoing basis, if such Contributor fails to notify You of the
241 | non-compliance by some reasonable means prior to 60 days after You have
242 | come back into compliance. Moreover, Your grants from a particular
243 | Contributor are reinstated on an ongoing basis if such Contributor
244 | notifies You of the non-compliance by some reasonable means, this is the
245 | first time You have received notice of non-compliance with this License
246 | from such Contributor, and You become compliant prior to 30 days after
247 | Your receipt of the notice.
248 |
249 | 5.2. If You initiate litigation against any entity by asserting a patent
250 | infringement claim (excluding declaratory judgment actions,
251 | counter-claims, and cross-claims) alleging that a Contributor Version
252 | directly or indirectly infringes any patent, then the rights granted to
253 | You by any and all Contributors for the Covered Software under Section
254 | 2.1 of this License shall terminate.
255 |
256 | 5.3. In the event of termination under Sections 5.1 or 5.2 above, all
257 | end user license agreements (excluding distributors and resellers) which
258 | have been validly granted by You or Your distributors under this License
259 | prior to termination shall survive termination.
260 |
261 | ************************************************************************
262 | * *
263 | * 6. Disclaimer of Warranty *
264 | * ------------------------- *
265 | * *
266 | * Covered Software is provided under this License on an "as is" *
267 | * basis, without warranty of any kind, either expressed, implied, or *
268 | * statutory, including, without limitation, warranties that the *
269 | * Covered Software is free of defects, merchantable, fit for a *
270 | * particular purpose or non-infringing. The entire risk as to the *
271 | * quality and performance of the Covered Software is with You. *
272 | * Should any Covered Software prove defective in any respect, You *
273 | * (not any Contributor) assume the cost of any necessary servicing, *
274 | * repair, or correction. This disclaimer of warranty constitutes an *
275 | * essential part of this License. No use of any Covered Software is *
276 | * authorized under this License except under this disclaimer. *
277 | * *
278 | ************************************************************************
279 |
280 | ************************************************************************
281 | * *
282 | * 7. Limitation of Liability *
283 | * -------------------------- *
284 | * *
285 | * Under no circumstances and under no legal theory, whether tort *
286 | * (including negligence), contract, or otherwise, shall any *
287 | * Contributor, or anyone who distributes Covered Software as *
288 | * permitted above, be liable to You for any direct, indirect, *
289 | * special, incidental, or consequential damages of any character *
290 | * including, without limitation, damages for lost profits, loss of *
291 | * goodwill, work stoppage, computer failure or malfunction, or any *
292 | * and all other commercial damages or losses, even if such party *
293 | * shall have been informed of the possibility of such damages. This *
294 | * limitation of liability shall not apply to liability for death or *
295 | * personal injury resulting from such party's negligence to the *
296 | * extent applicable law prohibits such limitation. Some *
297 | * jurisdictions do not allow the exclusion or limitation of *
298 | * incidental or consequential damages, so this exclusion and *
299 | * limitation may not apply to You. *
300 | * *
301 | ************************************************************************
302 |
303 | 8. Litigation
304 | -------------
305 |
306 | Any litigation relating to this License may be brought only in the
307 | courts of a jurisdiction where the defendant maintains its principal
308 | place of business and such litigation shall be governed by laws of that
309 | jurisdiction, without reference to its conflict-of-law provisions.
310 | Nothing in this Section shall prevent a party's ability to bring
311 | cross-claims or counter-claims.
312 |
313 | 9. Miscellaneous
314 | ----------------
315 |
316 | This License represents the complete agreement concerning the subject
317 | matter hereof. If any provision of this License is held to be
318 | unenforceable, such provision shall be reformed only to the extent
319 | necessary to make it enforceable. Any law or regulation which provides
320 | that the language of a contract shall be construed against the drafter
321 | shall not be used to construe this License against a Contributor.
322 |
323 | 10. Versions of the License
324 | ---------------------------
325 |
326 | 10.1. New Versions
327 |
328 | Mozilla Foundation is the license steward. Except as provided in Section
329 | 10.3, no one other than the license steward has the right to modify or
330 | publish new versions of this License. Each version will be given a
331 | distinguishing version number.
332 |
333 | 10.2. Effect of New Versions
334 |
335 | You may distribute the Covered Software under the terms of the version
336 | of the License under which You originally received the Covered Software,
337 | or under the terms of any subsequent version published by the license
338 | steward.
339 |
340 | 10.3. Modified Versions
341 |
342 | If you create software not governed by this License, and you want to
343 | create a new license for such software, you may create and use a
344 | modified version of this License if you rename the license and remove
345 | any references to the name of the license steward (except to note that
346 | such modified license differs from this License).
347 |
348 | 10.4. Distributing Source Code Form that is Incompatible With Secondary
349 | Licenses
350 |
351 | If You choose to distribute Source Code Form that is Incompatible With
352 | Secondary Licenses under the terms of this version of the License, the
353 | notice described in Exhibit B of this License must be attached.
354 |
355 | Exhibit A - Source Code Form License Notice
356 | -------------------------------------------
357 |
358 | This Source Code Form is subject to the terms of the Mozilla Public
359 | License, v. 2.0. If a copy of the MPL was not distributed with this
360 | file, You can obtain one at http://mozilla.org/MPL/2.0/.
361 |
362 | If it is not possible or desirable to put the notice in a particular
363 | file, then You may include the notice in a location (such as a LICENSE
364 | file in a relevant directory) where a recipient would be likely to look
365 | for such a notice.
366 |
367 | You may add additional accurate notices of copyright ownership.
368 |
369 | Exhibit B - "Incompatible With Secondary Licenses" Notice
370 | ---------------------------------------------------------
371 |
372 | This Source Code Form is "Incompatible With Secondary Licenses", as
373 | defined by the Mozilla Public License, v. 2.0.
374 |
--------------------------------------------------------------------------------