diff options
Diffstat (limited to 'data/extensions/https-everywhere-eff@eff.org/components')
-rw-r--r-- | data/extensions/https-everywhere-eff@eff.org/components/https-everywhere.js | 25 | ||||
-rw-r--r-- | data/extensions/https-everywhere-eff@eff.org/components/ssl-observatory.js | 6 |
2 files changed, 6 insertions, 25 deletions
diff --git a/data/extensions/https-everywhere-eff@eff.org/components/https-everywhere.js b/data/extensions/https-everywhere-eff@eff.org/components/https-everywhere.js index 5cd2d74..84f2cd8 100644 --- a/data/extensions/https-everywhere-eff@eff.org/components/https-everywhere.js +++ b/data/extensions/https-everywhere-eff@eff.org/components/https-everywhere.js @@ -246,8 +246,7 @@ HTTPSEverywhere.prototype = { QueryInterface: XPCOMUtils.generateQI( [ Components.interfaces.nsIObserver, Components.interfaces.nsISupports, - Components.interfaces.nsISupportsWeakReference, - Components.interfaces.nsIChannelEventSink ]), + Components.interfaces.nsISupportsWeakReference ]), wrappedJSObject: null, // Initialized by constructor @@ -601,7 +600,7 @@ HTTPSEverywhere.prototype = { }, maybeCleanupObservatoryPrefs: function(ssl_observatory) { - // Recover from a past UI processing bug that would leave the Obsevatory + // Recover from a past UI processing bug that would leave the Observatory // accidentally disabled for some users // https://trac.torproject.org/projects/tor/ticket/10728 var clean = ssl_observatory.myGetBoolPref("clean_config"); @@ -642,19 +641,6 @@ HTTPSEverywhere.prototype = { return cohort; }, - // nsIChannelEventSink implementation - // XXX This was here for rewrites in the past. Do we still need it? - onChannelRedirect: function(oldChannel, newChannel, flags) { - const uri = newChannel.URI; - this.log(DBUG,"Got onChannelRedirect to "+uri.spec); - if (!(newChannel instanceof CI.nsIHttpChannel)) { - this.log(DBUG, newChannel + " is not an instance of nsIHttpChannel"); - return; - } - var alist = this.juggleApplicableListsDuringRedirection(oldChannel, newChannel); - HTTPS.replaceChannel(alist, newChannel, this.httpNowhereEnabled); - }, - juggleApplicableListsDuringRedirection: function(oldChannel, newChannel) { // If the new channel doesn't yet have a list of applicable rulesets, start // with the old one because that's probably a better representation of how @@ -676,11 +662,6 @@ HTTPSEverywhere.prototype = { return new_alist; }, - asyncOnChannelRedirect: function(oldChannel, newChannel, flags, callback) { - this.onChannelRedirect(oldChannel, newChannel, flags); - callback.onRedirectVerifyCallback(0); - }, - get_prefs: function(prefBranch) { if(!prefBranch) prefBranch = PREFBRANCH_ROOT; @@ -852,7 +833,7 @@ function https_everywhereLog(level, str) { if (level >= threshold) { var levelName = ["", "VERB", "DBUG", "INFO", "NOTE", "WARN"][level]; var prefix = "HTTPS Everywhere " + levelName + ": "; - // dump() prints to browser stdout. That's sometimes undesireable, + // dump() prints to browser stdout. That's sometimes undesirable, // so only do it when a pref is set (running from test.sh enables // this pref). if (prefs.getBoolPref("log_to_stdout")) { diff --git a/data/extensions/https-everywhere-eff@eff.org/components/ssl-observatory.js b/data/extensions/https-everywhere-eff@eff.org/components/ssl-observatory.js index 76cc116..6ead746 100644 --- a/data/extensions/https-everywhere-eff@eff.org/components/ssl-observatory.js +++ b/data/extensions/https-everywhere-eff@eff.org/components/ssl-observatory.js @@ -194,7 +194,7 @@ SSLObservatory.prototype = { notifyCertProblem: function(socketInfo, status, targetSite) { this.log(NOTE, "cert warning for " + targetSite); if (targetSite == "observatory.eff.org") { - this.log(WARN, "Surpressing observatory warning"); + this.log(WARN, "Suppressing observatory warning"); return true; } return false; @@ -841,7 +841,7 @@ SSLObservatory.prototype = { * custom_proxy_type == "direct" is indicative of the user having selected "submit certs even if * Tor is not available", rather than true custom Tor proxy settings. So in that case, there's * not much point probing to see if the direct proxy is actually a Tor connection, and - * localhost:9050 is a better bet. People whose networks send all traffc through Tor can just + * localhost:9050 is a better bet. People whose networks send all traffic through Tor can just * tell the Observatory to submit certs without Tor. */ } else if (this.myGetBoolPref("use_custom_proxy") && !(testingForTor && custom_proxy_type == "direct")) { @@ -924,7 +924,7 @@ SSLObservatory.prototype = { if (level >= threshold) { var levelName = ["", "VERB", "DBUG", "INFO", "NOTE", "WARN"][level]; var prefix = "SSL Observatory " + levelName + ": "; - // dump() prints to browser stdout. That's sometimes undesireable, + // dump() prints to browser stdout. That's sometimes undesirable, // so only do it when a pref is set (running from test.sh enables // this pref). if (this.prefs.getBoolPref("extensions.https_everywhere.log_to_stdout")) { |