I thought that the way signing works in general is that the signer issues a certificate for the thing being signed (domain, code, whatever) that contains identifying information for the thing signed (host name for an SSL certificate, checksum of the code for a code signing certificate), the valid from and valid to dates of that certificate, and assorted other information, and either a reference to or a copy of the signer's certificate, and it signs the whole issued certificate with the signer's certificate.
Someone checking the signed thing is supposed to consider it validly signed if:
1. The date is in the valid range for the signed thing's certificate,
2. A check of the signature of that certificate against the signing certificate passes,
3. The signing certificate is recognized as being from an issuer considered trusted by the checker,
4. Neither the signed thing's certificate nor the signing certificate have been revoked, and
5. The signing took place during the valid date range of the signing certificate.
Note there is no "the date of the check is in the valid date range of the signing certificate". A signing certificate expiring should not invalidate things signed by it. It should just prevent signing anything else with it.
So why is a signing certificate expiring for Firefox breaking already signed extensions? Shouldn't it just be stopping new versions of extensions from being signed?