Continuing the discussion from Proposal: native.js to "embrace & extend" the WebExtensions API:
This is the new general thread to discuss the changes in Firefox and how to continue developing really interesting add-ons. Especially WebExtensions and e10s are important.
By the way, we (Desktopd Project) are working heavily on the unpublished development versions of Zombie Navigator, a Firefox-specific automation add-on with headless (unattended mode) support:
Zombie Navigator is specifically developed to fill a gap among PhantomJS (WebKit) / SlimerJS (XULRunner), Selenium (WebDriver) and Greasemonkey (add-on).
It automates browsing sessions like SlimerJS or Selenium, and allows running content scripts like Greasemonkey too. It intends to support enterprise Firefox automation needs and at the same time be safe for new users.
But it intentionally has some restrictions by design (or some will be introduced in the future), mainly for security and privacy:
- Greasemonkey-like content scripts are limited to tabs opened by the automating script (Zombie script / session script). Unlike Greasemonkey, there is no installation for a Zombie script. This also means that no script is injected into normal tabs the user opens manually. This is because the add-on is for automation but not customization of the browser.
- Unlike Greasemonkey,
unsafeWindowglobal is not available in content scripts
- Command-line invocation can be disabled in preferences
- No persistent storage is offered specifically for Zombie scripts (which means easier support for Private Browsing)
- The monitoring tab shows what the script is doing with the APIs and this is not suppressable
- Will use a separate set of SDK objects for each script (for better isolation and control, to make the stop button more reliable). We will use nested sandboxes for this
In the coming releases, we will focus on security, safety and stability, as well as new features. We will document the security models, limitations, and warnings.
We have the following specific needs for Add-on APIs:
- Read environment variables
- Run a user-supplied script in a sandbox with our APIs exposed (yes, we don’t want to break APIs unnecessarily), in a CommonJS-like environment (we currently use
toolkit/loaderwith special paths and a resolve callback)
- Inject a
contentScriptstring into a tab (because this is necesarily dynamic) This is safe thanks to special methods used in the add-on. (Modeled after SlimerJS’s API in fact)
- Monitor preferences changes: especially file selection dialogs and action button in
- Open the add-on’s preferences page at
- Ability to mirror the appearance of Firefox in add-on UIs, also considering (complete) themes (i.e. include CSS and image files from
- Want to show the add-on name in the address bar (without a lock icon of course) in add-on pages to prevent fishing/spoofing. (Similar to “This is a secure Firefox page”, but without the Firefox icon) There should be an API for this (there is
- HTTPS (EV):
- Add-on mockup:
- Want to use
Downloads.jsmfunctionality with downloads manager integrated
- Want to save pages as PDF
- Want to take screenshots of tabs
- Want to hide its
resource://files from Web (see https://discourse.mozilla-community.org/t/efficient-method-to-script-embedded-pages-in-an-addon/7353/6)
- Want to suppress/dismiss modal dialogs
- Want to monitor its own network activity (to display a nice table to the user, as well as APIs)
- Want to handle delegates from other add-ons (if explicitly enabled)
We need to support the oldest supported ESR version at all times (so cannot use WebExtension for a while). We would also like to support Seamonkey if possible.
We support signing-enforced official versions of Firefox as well as builds on exotic architectures / OSes and 3rd party products based on Firefox. Development is on GNU(/Linux) systems only.