Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

No longer appearing in Chrome web store #60

Open
hackel opened this issue Apr 18, 2017 · 11 comments
Open

No longer appearing in Chrome web store #60

hackel opened this issue Apr 18, 2017 · 11 comments

Comments

@hackel
Copy link

hackel commented Apr 18, 2017

I realise this is a constantly changing target, and thank you and everyone involved for your work on this!

It seems that Chrome Store Foxified is no longer able to properly inject itself into the Chrome web store. Even when changing the user agent to Chrome, it simply doesn't show an install button of any kind. I assume Google is trying to block Firefox for some obnoxious reason. I noticed the following possibly relevant console messages:

14:11:13.075 SecurityError: Permission denied to access property "exports" on cross-origin object 1 react-with-addons.js:12
14:11:13.186 Content Security Policy: The page's settings blocked the loading of a resource at data:application/javascript;base64,KGZ1b... ("script-src 'unsafe-inline' https: http: 'unsafe-eval'"). 1 (unknown)

I'm running FF 54.0a2 (latest aurora RIP).

@Noitidart
Copy link
Owner

Haha @ aurora RIP

I will start the webext port right away. Will get back to you soon.

@valpackett
Copy link

for some obnoxious reason

Content-Security-Policy is not obnoxious, it's an excellent security mechanism.

Addons like this one could just intercept the store responses and change the policy header

@hackel
Copy link
Author

hackel commented May 5, 2017

@myfreeweb No, intentionally blocking a competitor's browser from installing extensions hosted on your platform is obnoxious. That has nothing to do with CSP itself. Maybe it's a coincidence, but since this used to work just fine, I'm rather sceptical.

@valpackett
Copy link

The fact that the error is CSP makes me think that it's not intentional. The exact same header is sent to both browsers, they don't even check user-agent! Obviously they prioritize security over supporting Firefox extensions that inject scripts into their website…

@Noitidart
Copy link
Owner

Thank you all for helping discuss this. For the webextension version, it will not auto-install the extension, I was trying to find a way around this. So I haven't got to this CSP issue yet, so your discussion about it is much appreciated!

@kjschulz
Copy link

Any word on when this will be resolved?

@Noitidart
Copy link
Owner

Noitidart commented Sep 22, 2017

Yep I'm working on the webext version right now and have not encoutnered the CSP issue yet. I will update this topic as I get a test version out so we can jointly verify. :)

@hackel
Copy link
Author

hackel commented Sep 25, 2017

Much appreciated @Noitidart! In the meantime for anyone else, the cli web-ext tool is pretty awesome for any testing you'd like to do, and makes self-signing extensions a breeze.

@Noitidart
Copy link
Owner

v3 just released, please try it out now :) https://addons.mozilla.org/en-US/firefox/addon/chrome-store-foxified/

@kjschulz
Copy link

kjschulz commented Nov 6, 2017

It didn't work for me, I get the following when trying to install the LastPass addon: Failed to upload to AMO. Internal server error occured, this extension is likely unsupported by the review system and will even fail manual upload.

Should I click theInstall Unsigned link? Sounds scary :/

@Noitidart
Copy link
Owner

Oh thats a bug on addon-server side. Nothing we can do about it. :(

@kjschulz actually "install" is the equivalent of "install unsigned" from a security prespective. Getting it signed, just makes it auto install and stay installed. :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants