Commit 8c35e971 authored by Alex Catarineu's avatar Alex Catarineu
Browse files

Revert "Bug 14970: Don't block our unsigned extensions"

This reverts commit c1e58594.
parent 885968e7
......@@ -2196,11 +2196,7 @@ BrowserGlue.prototype = {
);
AddonManager.getAddonsByIDs(disabledAddons).then(addons => {
for (let addon of addons) {
// We don't need a false notification that our extensions are
// disabled. Even if they lack Mozilla's blessing they are enabled
// nevertheless.
if ((addon.signedState <= AddonManager.SIGNEDSTATE_MISSING) &&
(addon.id !== "https-everywhere-eff@eff.org")) {
if (addon.signedState <= AddonManager.SIGNEDSTATE_MISSING) {
this._notifyUnsignedAddonsDisabled();
break;
}
......
......@@ -214,15 +214,9 @@ var gBrowser = {
},
};
// This function is the central check point to decide whether to show a warning
// about unsigned extensions or not. We want those warnings but only for
// extensions we don't distribute.
function isCorrectlySigned(addon) {
// Add-ons without an "isCorrectlySigned" property are correctly signed as
// they aren't the correct type for signing.
if (addon.id == "https-everywhere-eff@eff.org") {
return true;
}
return addon.isCorrectlySigned !== false;
}
......
......@@ -2207,11 +2207,6 @@ this.XPIDatabase = {
* True if the add-on should not be appDisabled
*/
isUsableAddon(aAddon) {
// Ensure that we allow https-everywhere
if (aAddon.id == "https-everywhere-eff@eff.org") {
return true;
}
if (this.mustSign(aAddon.type) && !aAddon.isCorrectlySigned) {
logger.warn(`Add-on ${aAddon.id} is not correctly signed.`);
if (Services.prefs.getBoolPref(PREF_XPI_SIGNATURES_DEV_ROOT, false)) {
......
......@@ -3834,7 +3834,6 @@ var XPIInstall = {
if (
XPIDatabase.mustSign(addon.type) &&
addon.id !== "https-everywhere-eff@eff.org" &&
addon.signedState <= AddonManager.SIGNEDSTATE_MISSING
) {
throw new Error(
......
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment