diff options
author | Martin Stransky <stransky@anakreon.cz> | 2016-03-21 10:04:31 +0100 |
---|---|---|
committer | Martin Stransky <stransky@anakreon.cz> | 2016-03-21 10:04:31 +0100 |
commit | bfde9d04e27d44829cef7c39438930915e96f05f (patch) | |
tree | fb56a7a74718b497f3d589a6c7525640a3b28c73 /Allow-unsigned-addons-in-usr-lib-share-mozilla-exten.patch | |
parent | spec fix - patch order (diff) | |
download | librewolf-fedora-ff-bfde9d04e27d44829cef7c39438930915e96f05f.tar.gz librewolf-fedora-ff-bfde9d04e27d44829cef7c39438930915e96f05f.tar.bz2 librewolf-fedora-ff-bfde9d04e27d44829cef7c39438930915e96f05f.zip |
Fixed rhbz#1293874 - use a Debian patch for disabled extension signing
Diffstat (limited to 'Allow-unsigned-addons-in-usr-lib-share-mozilla-exten.patch')
-rw-r--r-- | Allow-unsigned-addons-in-usr-lib-share-mozilla-exten.patch | 37 |
1 files changed, 37 insertions, 0 deletions
diff --git a/Allow-unsigned-addons-in-usr-lib-share-mozilla-exten.patch b/Allow-unsigned-addons-in-usr-lib-share-mozilla-exten.patch new file mode 100644 index 0000000..7a41e79 --- /dev/null +++ b/Allow-unsigned-addons-in-usr-lib-share-mozilla-exten.patch @@ -0,0 +1,37 @@ +From: Mike Hommey <mh@glandium.org> +Date: Sat, 5 Dec 2015 18:23:58 +0900 +Subject: Allow unsigned addons in /usr/{lib,share}/mozilla/extensions +See rhbz#1293874 + +--- + toolkit/mozapps/extensions/content/extensions.js | 2 ++ + toolkit/mozapps/extensions/internal/XPIProvider.jsm | 3 ++- + 2 files changed, 4 insertions(+), 1 deletion(-) + +diff --git a/toolkit/mozapps/extensions/content/extensions.js b/toolkit/mozapps/extensions/content/extensions.js +index 8625097..9152096 100644 +--- a/toolkit/mozapps/extensions/content/extensions.js ++++ b/toolkit/mozapps/extensions/content/extensions.js +@@ -211,6 +211,8 @@ function isCorrectlySigned(aAddon) { + // temporary add-ons do not require signing + if (aAddon.scope == AddonManager.SCOPE_TEMPORARY) + return true; ++ if (aAddon.scope == AddonManager.SCOPE_SYSTEM) ++ return true; + if (aAddon.signedState <= AddonManager.SIGNEDSTATE_MISSING) + return false; + if (aAddon.foreignInstall && aAddon.signedState < AddonManager.SIGNEDSTATE_SIGNED) +diff --git a/toolkit/mozapps/extensions/internal/XPIProvider.jsm b/toolkit/mozapps/extensions/internal/XPIProvider.jsm +index 343c087..de62d8a 100644 +--- a/toolkit/mozapps/extensions/internal/XPIProvider.jsm ++++ b/toolkit/mozapps/extensions/internal/XPIProvider.jsm +@@ -682,7 +682,8 @@ function isUsableAddon(aAddon) { + return false; + } + // temporary and system add-ons do not require signing +- if ((aAddon._installLocation.name != KEY_APP_SYSTEM_DEFAULTS && ++ if ((aAddon._installLocation.scope != AddonManager.SCOPE_SYSTEM && ++ aAddon._installLocation.name != KEY_APP_SYSTEM_DEFAULTS && + aAddon._installLocation.name != KEY_APP_TEMPORARY) && + mustSign(aAddon.type)) { + if (aAddon.signedState <= AddonManager.SIGNEDSTATE_MISSING) |