Closed
Bug 401711
Opened 18 years ago
Closed 18 years ago
Compatibility check window ignores extensions.update.enabled pref
Categories
(Toolkit :: Add-ons Manager, defect)
Toolkit
Add-ons Manager
Tracking
()
RESOLVED
WONTFIX
People
(Reporter: jwkbugzilla, Assigned: jwkbugzilla)
References
Details
Attachments
(1 file, 1 obsolete file)
|
1.10 KB,
patch
|
robert.strong.bugs
:
review-
|
Details | Diff | Splinter Review |
Steps to reproduce:
1) Make sure extensions.update.enabled preference is false.
2) Upgrade your application.
3) Restart.
Observed results: compatibility check window opens on startup and suggest looking for updated versions.
Expected behavior: no automatic checks so that a XULRunner application can take care of updates itself.
| Assignee | ||
Comment 1•18 years ago
|
||
Assignee: nobody → trev.moz
Status: NEW → ASSIGNED
Attachment #286684 -
Flags: review?(robert.bugzilla)
Comment 2•18 years ago
|
||
Comment on attachment 286684 [details] [diff] [review]
Proposed patch
This won't fix what the bug appears to be about, that will just stop the add-on update notification (which presumably should never happen if the EM isnt looking for updates to addons).
You want to do the test in or around the call to _showMismatchWindow I believe.
Attachment #286684 -
Flags: review?(robert.bugzilla) → review-
| Assignee | ||
Comment 3•18 years ago
|
||
I was indeed looking in the wrong place, sorry. This patch definitely works now, the compatibility check window doesn't show up if extensions.update.enabled is false.
Attachment #286684 -
Attachment is obsolete: true
Attachment #286690 -
Flags: review?(robert.bugzilla)
Comment 4•18 years ago
|
||
Sounds like another candidate for a xpcshell regression test :)
Flags: in-testsuite?
| Assignee | ||
Comment 5•18 years ago
|
||
I don't see how this can be tested (especially with xpcshell).
Comment 6•18 years ago
|
||
http://lxr.mozilla.org/seamonkey/source/toolkit/mozapps/extensions/test/unit/head_extensionmanager.js#312
Our EM test harness lets you create a temporary profile, and lets you set preferences on said profile.
Comment 8•18 years ago
|
||
Comment on attachment 286690 [details] [diff] [review]
Patch v1.1
I'm not entirely sure we want to do this. On upgrade if a user has extensions that will be disabled due to not being compatible then telling them this should be fine and then they can cancel. This also prevents the synchronization of min / max Version on app upgrade. What is the use case you are trying to solve?
Attachment #286690 -
Flags: review?(robert.bugzilla) → review+
Comment 9•18 years ago
|
||
Comment on attachment 286690 [details] [diff] [review]
Patch v1.1
I'm fine with the code but I'm minusing until an answer to comment #8 is provided.
Attachment #286690 -
Flags: review+ → review-
Comment 10•18 years ago
|
||
btw: IMO using this pref to prevent the compatibility sync and notification of incompatible add-ons is not the right way to go. The pref is for automatically checking for updates in the background and is not for preventing the compatibility sync and notification of incompatible add-ons on app upgrade.
| Assignee | ||
Comment 11•18 years ago
|
||
Use case: XULRunner application that has its own UI for managing add-ons, including an own update check. XULRunner UI that cannot be disabled is very undesirable, especially since our XULRunner builds are not localized. There is also an issue with the functionality - regular update check will respect updateURL setting in the install manifest, something that we don't want to allow for security reasons (AMO doesn't allow it either).
Comment 12•18 years ago
|
||
(In reply to comment #11)
> Use case: XULRunner application that has its own UI for managing add-ons,
> including an own update check. XULRunner UI that cannot be disabled is very
> undesirable, especially since our XULRunner builds are not localized.
I could see this being a new pref then that defaults to performing the check when not present.
> There is
> also an issue with the functionality - regular update check will respect
> updateURL setting in the install manifest, something that we don't want to
> allow for security reasons (AMO doesn't allow it either).
This doesn't parse... AMO doesn't allow AMO installed extensions to provide an updateURL and installing an extension from a non AMO site is no more of a risk than updating the extension now that the update security patch has landed.
| Assignee | ||
Comment 13•18 years ago
|
||
(In reply to comment #12)
> This doesn't parse... AMO doesn't allow AMO installed extensions to provide an
> updateURL and installing an extension from a non AMO site is no more of a risk
> than updating the extension now that the update security patch has landed.
The reason why AMO disallows updateURL in install manifests has nothing to do with the recent patch. The problem is: somebody could get a harmless extension approved by AMO and then serve malware as an update to it. This update would be downloaded from a third-party site which no longer needs AMO's approval. In our case, ignoring updateURL altogether seems to be the best choice.
Comment 14•18 years ago
|
||
(In reply to comment #13)
> (In reply to comment #12)
> > This doesn't parse... AMO doesn't allow AMO installed extensions to provide an
> > updateURL and installing an extension from a non AMO site is no more of a risk
> > than updating the extension now that the update security patch has landed.
>
> The reason why AMO disallows updateURL in install manifests has nothing to do
> with the recent patch. The problem is: somebody could get a harmless extension
> approved by AMO and then serve malware as an update to it. This update would be
> downloaded from a third-party site which no longer needs AMO's approval. In our
> case, ignoring updateURL altogether seems to be the best choice.
Please re-read my comment... I understand the problem that AMO addresses by not allowing updateURL to be specified and the review process specifically looking for code that downloads additional code behind the scenes... I never stated that AMO disallowing updateURL had anything to do with the update security patch. I did say that the update security patch has to do with non AMO sites.
It isn't clear to me but it sounds as if you want to be able to prevent updates from non approved sites... is this true? If so, what about installing extensions from non approved sites?
| Assignee | ||
Comment 15•18 years ago
|
||
> It isn't clear to me but it sounds as if you want to be able
> to prevent updates from non approved sites...
Yes, that's pretty much it.
> If so, what about installing extensions from non approved sites?
This is still open discussion, but we will probably allow updateURL for these extensions only.
Comment 16•18 years ago
|
||
With that as the desired functionality please file an enhancement bug describing what you'd like to accomplish. Resolving -> wontfix per comment #8 and comment #10
Status: ASSIGNED → RESOLVED
Closed: 18 years ago
Resolution: --- → WONTFIX
Updated•17 years ago
|
Product: Firefox → Toolkit
You need to log in
before you can comment on or make changes to this bug.
Description
•