diff --git a/lib/ASRouter.jsm b/lib/ASRouter.jsm index 6096cd8f5..c8e32a8d9 100644 --- a/lib/ASRouter.jsm +++ b/lib/ASRouter.jsm @@ -246,9 +246,8 @@ const MessageLoaderUtils = { const aUri = Services.io.newURI(url); const systemPrincipal = Services.scriptSecurityManager.getSystemPrincipal(); - // AddonManager installation source associated to the addons installed from activitystream - // (See Bug 1496167 for a rationale). - const amTelemetryInfo = {source: "activitystream"}; + // AddonManager installation source associated to the addons installed from activitystream's CFR + const amTelemetryInfo = {source: "amo"}; const install = await AddonManager.getInstallForURL(aUri.spec, "application/x-xpinstall", null, null, null, null, null, amTelemetryInfo); await AddonManager.installAddonFromWebpage("application/x-xpinstall", browser, diff --git a/test/unit/asrouter/MessageLoaderUtils.test.js b/test/unit/asrouter/MessageLoaderUtils.test.js index 65b6177e6..ff450a839 100644 --- a/test/unit/asrouter/MessageLoaderUtils.test.js +++ b/test/unit/asrouter/MessageLoaderUtils.test.js @@ -304,7 +304,7 @@ describe("MessageLoaderUtils", () => { // Verify that the expected installation source has been passed to the getInstallForURL // method (See Bug 1496167 for a rationale). assert.calledWithExactly(getInstallStub, "foo.com", "application/x-xpinstall", null, - null, null, null, null, {source: "activitystream"}); + null, null, null, null, {source: "amo"}); }); it("should not call the Addons API on invalid URLs", async () => { sandbox.stub(global.Services.scriptSecurityManager, "getSystemPrincipal").throws();