summaryrefslogtreecommitdiff
path: root/data/extensions/https-everywhere-eff@eff.org/components
diff options
context:
space:
mode:
authorRuben Rodriguez <ruben@gnu.org>2016-02-04 17:35:11 -0600
committerRuben Rodriguez <ruben@gnu.org>2016-02-04 17:35:11 -0600
commit23c04f7d9249b29c84df3707429053fc53fb190d (patch)
treee5706a72d65a344d5c2be0866974c594eddca292 /data/extensions/https-everywhere-eff@eff.org/components
parent501a13debeebf3244f33646ac3bad75f9a0e614d (diff)
HTTPS-Everywhere updated to 5.1.3
Diffstat (limited to 'data/extensions/https-everywhere-eff@eff.org/components')
-rw-r--r--data/extensions/https-everywhere-eff@eff.org/components/https-everywhere.js25
-rw-r--r--data/extensions/https-everywhere-eff@eff.org/components/ssl-observatory.js6
2 files changed, 6 insertions, 25 deletions
diff --git a/data/extensions/https-everywhere-eff@eff.org/components/https-everywhere.js b/data/extensions/https-everywhere-eff@eff.org/components/https-everywhere.js
index 5cd2d74..84f2cd8 100644
--- a/data/extensions/https-everywhere-eff@eff.org/components/https-everywhere.js
+++ b/data/extensions/https-everywhere-eff@eff.org/components/https-everywhere.js
@@ -246,8 +246,7 @@ HTTPSEverywhere.prototype = {
QueryInterface: XPCOMUtils.generateQI(
[ Components.interfaces.nsIObserver,
Components.interfaces.nsISupports,
- Components.interfaces.nsISupportsWeakReference,
- Components.interfaces.nsIChannelEventSink ]),
+ Components.interfaces.nsISupportsWeakReference ]),
wrappedJSObject: null, // Initialized by constructor
@@ -601,7 +600,7 @@ HTTPSEverywhere.prototype = {
},
maybeCleanupObservatoryPrefs: function(ssl_observatory) {
- // Recover from a past UI processing bug that would leave the Obsevatory
+ // Recover from a past UI processing bug that would leave the Observatory
// accidentally disabled for some users
// https://trac.torproject.org/projects/tor/ticket/10728
var clean = ssl_observatory.myGetBoolPref("clean_config");
@@ -642,19 +641,6 @@ HTTPSEverywhere.prototype = {
return cohort;
},
- // nsIChannelEventSink implementation
- // XXX This was here for rewrites in the past. Do we still need it?
- onChannelRedirect: function(oldChannel, newChannel, flags) {
- const uri = newChannel.URI;
- this.log(DBUG,"Got onChannelRedirect to "+uri.spec);
- if (!(newChannel instanceof CI.nsIHttpChannel)) {
- this.log(DBUG, newChannel + " is not an instance of nsIHttpChannel");
- return;
- }
- var alist = this.juggleApplicableListsDuringRedirection(oldChannel, newChannel);
- HTTPS.replaceChannel(alist, newChannel, this.httpNowhereEnabled);
- },
-
juggleApplicableListsDuringRedirection: function(oldChannel, newChannel) {
// If the new channel doesn't yet have a list of applicable rulesets, start
// with the old one because that's probably a better representation of how
@@ -676,11 +662,6 @@ HTTPSEverywhere.prototype = {
return new_alist;
},
- asyncOnChannelRedirect: function(oldChannel, newChannel, flags, callback) {
- this.onChannelRedirect(oldChannel, newChannel, flags);
- callback.onRedirectVerifyCallback(0);
- },
-
get_prefs: function(prefBranch) {
if(!prefBranch) prefBranch = PREFBRANCH_ROOT;
@@ -852,7 +833,7 @@ function https_everywhereLog(level, str) {
if (level >= threshold) {
var levelName = ["", "VERB", "DBUG", "INFO", "NOTE", "WARN"][level];
var prefix = "HTTPS Everywhere " + levelName + ": ";
- // dump() prints to browser stdout. That's sometimes undesireable,
+ // dump() prints to browser stdout. That's sometimes undesirable,
// so only do it when a pref is set (running from test.sh enables
// this pref).
if (prefs.getBoolPref("log_to_stdout")) {
diff --git a/data/extensions/https-everywhere-eff@eff.org/components/ssl-observatory.js b/data/extensions/https-everywhere-eff@eff.org/components/ssl-observatory.js
index 76cc116..6ead746 100644
--- a/data/extensions/https-everywhere-eff@eff.org/components/ssl-observatory.js
+++ b/data/extensions/https-everywhere-eff@eff.org/components/ssl-observatory.js
@@ -194,7 +194,7 @@ SSLObservatory.prototype = {
notifyCertProblem: function(socketInfo, status, targetSite) {
this.log(NOTE, "cert warning for " + targetSite);
if (targetSite == "observatory.eff.org") {
- this.log(WARN, "Surpressing observatory warning");
+ this.log(WARN, "Suppressing observatory warning");
return true;
}
return false;
@@ -841,7 +841,7 @@ SSLObservatory.prototype = {
* custom_proxy_type == "direct" is indicative of the user having selected "submit certs even if
* Tor is not available", rather than true custom Tor proxy settings. So in that case, there's
* not much point probing to see if the direct proxy is actually a Tor connection, and
- * localhost:9050 is a better bet. People whose networks send all traffc through Tor can just
+ * localhost:9050 is a better bet. People whose networks send all traffic through Tor can just
* tell the Observatory to submit certs without Tor.
*/
} else if (this.myGetBoolPref("use_custom_proxy") && !(testingForTor && custom_proxy_type == "direct")) {
@@ -924,7 +924,7 @@ SSLObservatory.prototype = {
if (level >= threshold) {
var levelName = ["", "VERB", "DBUG", "INFO", "NOTE", "WARN"][level];
var prefix = "SSL Observatory " + levelName + ": ";
- // dump() prints to browser stdout. That's sometimes undesireable,
+ // dump() prints to browser stdout. That's sometimes undesirable,
// so only do it when a pref is set (running from test.sh enables
// this pref).
if (this.prefs.getBoolPref("extensions.https_everywhere.log_to_stdout")) {