Greasemonkey

This article is about the software. For the comic, see Grease Monkey. For other uses, see Grease monkey (disambiguation).
Greasemonkey
Original author(s) Aaron Boodman
Developer(s) Anthony Lieuallen, Johan Sundström,[1] 13 more[2]
Initial release 28 March 2005 (2005-03-28)[3]
Stable release 3.7 / 19 February 2016 (2016-02-19)
Written in JavaScript, XUL, CSS
Operating system Cross-platform
Available in English
Type Mozilla extension
License MIT License
Website www.greasespot.net

Greasemonkey is a Mozilla Firefox extension that allows users to install scripts that make on-the-fly changes to web page content after or before the page is loaded in the browser (also known as augmented browsing).

The changes made to the web pages are executed every time the page is viewed, making them effectively permanent for the user running the script.

Greasemonkey can be used for customizing page appearance, adding new functions to web pages (for example, embedding price comparisons within shopping sites), fixing rendering bugs, combining data from multiple web pages, and numerous other purposes.

History

The Greasemonkey project began 28 November 2004, written by Aaron Boodman.[4][5][6] Boodman was inspired to write Greasemonkey after looking at a Firefox extension designed to clean up the interface of Allmusic.[7] This extension was written by Adrian Holovaty, who later became a userscript developer. By May 2005, there were approximately 60 general and 115 site-specific userscripts distributed for Greasemonkey.[7] During this time, a Greasemonkey compiler was also developed for converting a userscript into a standalone Firefox extension.[8] Greasemonkey was initially met with complaints by publishers, for its ability to block ads.[9] However, this criticism shifted its focus to other addons starting with the 2006 release of Adblock Plus.

Userscripts.org

To accommodate the growing number of scripts, userscripts.org was founded by Britt Selvitelle and other members of the Greasemonkey community in late 2005. Userscripts.org was open sourced in 2007 but the site later moved away from this code base.[10] As the main script repository listed on Greasemonkey's official site, userscripts.org accumulated thousands of scripts per year.

In 2010, the last known admin Jesse Andrews posted that the site was in maintenance mode due to lack of time and asked for a new maintainer to volunteer.[11] Nevertheless, he remained the sole admin of the site until a discussion about install counts began on 1 April 2013.[12] Prior to this, many of the "most popular scripts" as listed by the site had nominal install counts of zero. Over the following year spam scripts became more common, server downtime increased and the install count bug remained.[13] With no further communication by Andrews, userscript writers described the site as neglected and the official Greasemonkey site removed its front page link.[14][15] In response, script writers and other developers began working on the fork "openuserjs.org",[16][17] and later greasyfork.org,[18] as an immediate replacement.[19]

In May 2014, userscripts.org became inaccessible on port 80, prompting users to access it on port 8080 instead.[13] In August 2014, the site was shut down completely. Most of its scripts were backed up to the static mirror "http://userscripts-mirror.org"[20] where they can now be found.[13]

Technical details

Greasemonkey user scripts are written in JavaScript and manipulate the contents of a web page using the Document Object Model interface. Scripts are generally written to be either page-specific or domain-specific (applying to all pages within a domain) but may also be tagged to apply to all domains for global browser enhancements. Users of Greasemonkey can write or download scripts and save them to their own personal library. When users visit a website matching a script in their personal script library, Greasemonkey invokes the relevant scripts.

Greasemonkey scripts can modify a webpage in any way that JavaScript allows, with certain Greasemonkey security restrictions. Scripts can also access other web pages and web services via a non-domain-restricted XMLHTTP request, allowing external content to be merged with the original page content.

Scripts are named somename.user.js, and Greasemonkey offers to install any such script when a URL ending in that suffix is requested. Greasemonkey scripts contain metadata which specifies the name of the script, a description, resources required by the script, a namespace URL used to differentiate identically named scripts, and URL patterns for which the script is intended to be invoked or not.

Writing a Greasemonkey script is similar to writing JavaScript for a web page, with some additional allowances such as cross-site XMLHttpRequests. Compared to writing a full-fledged Firefox extension, user scripting is a very modest step up in complexity from basic web programming. However, Greasemonkey scripts are limited due to security restrictions imposed by Mozilla's XPCNativeWrappers[21] For example, Greasemonkey scripts do not have access to many of Firefox's components, such as the download manager, I/O processes or its main toolbars. Additionally, Greasemonkey scripts run per instance of a matching webpage. Because of this, managing lists of items globally is difficult. However, script writers have been using cookies and Greasemonkey even offers APIs such as GM_getValue and GM_setValue to overcome this.

User scripts

File hosting servers for Greasemonkey require that the URLs for the scripts end with .user.js and not with a MIME type like text/html. Support for HTTPS will meet with Greasemonkey's built in update checker. As of February 2016, the Greasemonkey project lists three recommended user script hostings:[19]

Compatibility

Greasemonkey is available for Firefox, Flock and Web (formerly called Epiphany). The Greasemonkey extension for Web is part of the Web extensions package. However, this extension is not fully compatible as of release 2.15.1, since some Greasemonkey API functions (e.g. GM_getValue) are unsupported. There are also custom versions for SeaMonkey[22][23] and Songbird.[24]

Equivalents for other browsers

Versions 8 and upwards of Opera also have user‐scripting functionality and are capable of running many Greasemonkey user scripts.[25] To make full use of the GM_ API and metadata block, however, one has to use an extension.

For Internet Explorer, similar functionality is offered by IE7Pro,[26] Sleipnir,[27] and iMacros. Adguard,[28] a simple ad‐blocking program, also allows UserScripts to be installed when the interface is switched to advanced mode; these are known as extensions.

Chrome has browser extensions that enable the installation of user scripts.[29][30][31] Chrome had limited[32][33] "native support" for Greasemonkey scripts in February 2010 by internally converting them to extensions.[34] Support for these user created extensions and other unsigned extensions was removed in May 2014 from the MS Windows builds of Chrome.[35]

On Safari for Mac (and other WebKit applications), there is a SIMBL-managed plug-in called GreaseKit. Since the release of Safari 5 there is an extension called NinjaKit that uses the new API interface.[36] Fluid is a site-specific browser with integrated GreaseKit.

The Kango[37] framework allows creating extensions for Firefox, Chrome, Internet Explorer, Opera, and Safari using the same JavaScript code for all these browsers. Kango supports[38] user scripts.

See also

References

  1. "The weblog about Greasemonkey".
  2. "The greasemonkey network graph".
  3. "Initial Greasemonkey Release".
  4. "Greasemonkey Project Info".
  5. Pilgrim, Mark (2005). Greasemonkey Hacks. O'Reilly.
  6. "Aaron Boodman wrote Greasemonkey in 2004".
  7. 1 2 Singel, Ryan (17 May 2005). "Firefox Users Monkey With the Web?". Wired magazine.
  8. Nivi (8 May 2005). "Greasemonkey will blow up business models (as well as your mind)". Archived from the original on 5 February 2008. Retrieved 22 July 2010.
  9. Festa, Paul (24 March 2005). "Firefox add-on lets surfers tweak sites, but is it safe?". CNET.
  10. Selvitelle, Britt (3 January 2007). "Userscripts.org... Opensource!". Archived from the original on 17 January 2007. Retrieved 21 May 2014.
  11. "Passing the torch on userscripts.org". Hacker News. 2010. Retrieved 24 October 2014.
  12. "Fixing Install Counts". 1 April 2013. Archived from the original on 3 November 2013. Retrieved 21 May 2014.
  13. 1 2 3 Brinkmann, Martin (9 May 2014). "Userscripts.org down for good? Here are alternatives". Retrieved 21 May 2014.
  14. "User Script Hosting". 16 May 2014. Retrieved 21 May 2014.
  15. "Please change the official userscript site". greasemonkey-dev (Mailing list). 21 April 2014. Retrieved 21 May 2014.
  16. 1 2 "OpenUserJS". openuserjs.org.
  17. 1 2 "Fixing Install Counts - Page 6". 1 April 2013. Archived from the original on 3 November 2013. Retrieved 5 November 2015.
  18. 1 2 "Greasy Fork". greasyfork.org.
  19. 1 2 Barnabe, Jason (19 February 2014). "Introducing Greasy Fork - a user scripts site". Retrieved 5 November 2015.
  20. "Userscripts.org". userscripts-mirror.org.
  21. .https://developer.mozilla.org/en/XPCNativeWrapper
  22. "Greasemonkey". mozdev.org. mozdev. Retrieved 2009-05-05.
  23. https://openuserjs.org/about/Greasemonkey-Port-for-SeaMonkey
  24. ianloic. "Greasemonkey". Songbird. Retrieved 5 May 2009.
  25. "Take Control with User JavaScript". Opera Software. Retrieved 26 March 2009.
  26. "User Scripts in IE7Pro". Archived from the original on 7 January 2013. Retrieved 28 September 2015.
  27. "You can also add custom functionality to Sleipnir with a wide range of plugins and user scripts". Archived from the original on 13 September 2011. Retrieved 28 September 2015.
  28. "Adguard – The world's most advanced ad blocker!".
  29. "NinjaKit". Chrome web store. Retrieved 16 November 2015.
  30. "Tampermonkey". Chrome web store. 6 November 2015.
  31. "Control Freak". Chrome web store. Retrieved 9 November 2015.
  32. "User Scripts – The Chromium Projects". Retrieved 24 October 2010.
  33. Paul, Ian (18 January 2012). "How to Access Wikipedia on SOPA Protest Day". PC World. Retrieved 28 January 2013.
  34. Boodman, Aaron (1 February 2010). "40,000 More Extensions!". blog.chromium.org. Retrieved 1 February 2010.
  35. Kay, Erik (27 May 2014). "Protecting Chrome users from malicious extensions". Google. Retrieved 24 October 2014.
  36. "New extension for Safari 5 called NinjaKit lets you install GM scripts". Excellatronic Communications. Retrieved 22 July 2010.
  37. "Kango framework".
  38. "Modifying content of web pages using Kango Framework and jQuery".

External links

This article is issued from Wikipedia - version of the Wednesday, May 04, 2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.