Since Violentmonkey v2.10.0, a new type of metadata named @inject-into
is introduced. With its help, scripts can be injected into CSP restricted pages in Firefox now!
Contexts
As we know, there are two types of context for a script to execute in:
-
context of a web page
The context in which all scripts of a web page execute. We will call it "page context" later.
-
context of content scripts
The context in which content scripts execute. We will call it "content context" later.
Injection Modes
In earlier versions of Violentmonkey, all scripts will be injected into the page context.
This works well at most times in Chrome. However, Firefox works differently. All scripts will be blocked in websites with CSP rules blocking inline scripts, like GitHub. See issue #173, #408.
By introducing @inject-into
, userscripts can be injected in Firefox now. In pages with CSP restrictions, we can inject userscripts into the content context.
Mode: page
This is the default mode, as the behavior in Violentmonkey v2.9.x.
unsafeWindow
refers to window
of the web page.
Example usage:
// ==UserScript==
// ...
// @inject-into page
// ==/UserScript==
// `@inject-into` should be set to `page` since we need to access `window` of page context.
// Accessing objects attached to `window` of page
alert('Hi, ' + unsafeWindow.context.user);
Mode: content
// ==UserScript==
// @inject-into content
// ==/UserScript==
In this mode, scripts will be injected into the content context.
The content context is an isolated world, scripts in this context have no access to JavaScript objects from page context. But they can communicate with DOM APIs such as addEventListener
.
unsafeWindow
refers to the global
object of content context.
Scripts requiring access to JavaScript objects in the web page will not work in this mode. For example, unsafeWindow.jQuery
becomes inaccessible even if jQuery is introduced in the page.
Mode: auto
// ==UserScript==
// @inject-into auto
// ==/UserScript==
In this mode, scripts will be injected into the page context if possible. If blocked by CSP, they will be injected into the content context. It is the script author's job to check the environments.
Example usage:
// ==UserScript==
// ...
// @inject-into auto
// ==/UserScript==
// `@inject-into` can be set to `auto` if we don't need to access any JavaScript object from page context.
// Accessing JavaScript objects shared in both contexts
alert('The current page link is ' + window.location.href);
// Accessing DOM
document.body.style = 'background: orange';
Violentmonkey Settings
By default, a script will try to execute in the page context. In Firefox, this may fail in CSP restricted pages.
You can change the default behavior in the settings tab of Violentmonkey. By changing the default injection mode to auto
, scripts that do not depend on traditional unsafeWindow
will work again in Firefox.