Hello,

> I'm not a system administrator on a company but a support vendor for
> enterprise customers and I provided different versions for each ESR68
> customer as sideloaded addons. Thus I think I must provide repacked XPIs
> for each customer on the next ESR...

After this reply I've found a possible solution without custom update
info: custom ID (and URL) including version number, like:

{ "policies": {
  "Extensions": {
    "Install": [
      "https://example.com/[email protected]?version=3";
    ],
    "Locked": [
      "[email protected]"
    ],
    "Uninstall": [
      "[email protected]",
      "[email protected]"
    ]
  }
}}

Or:

{ "policies": {
  "ExtensionSettings": {
    "[email protected]": {
      "installation_mode": "force_installed",
      "install_url":
"https://example.com/[email protected]?version=3";
    },
    "[email protected]": {
      "installation_mode": "blocked"
    },
    "[email protected]": {
      "installation_mode": "blocked"
    }
  }
}}

It looks suck but easier than providing custom update info.
(Sorry but the second example is not tested yet by me actually.)



On 2019/11/02 1:25, SHIMODA Hiroshi wrote:
> Hello,
> 
>> To clarify, loading them directly into <FF/TB install>/extensions is
>> going away, and the "as normal extensions" deployment means loading into
>> distribution/extensions, where they are copied into and then run from
>> the user profile?
> 
> If I understand the blog post correctly, it is "yes".
> 
> As the result version lock and controlling of update timing about addons
> installed in this way (or via GPO) become virtually impossible.
> Sideloaded addons can be updated by simple replacing of installed files.
> On the other hand, updating of addons installed into user profiles can
> be done only via the auto update. (It is painful for the system
> administrator that replacing all files placed under each user profile.)
> 
> Otherwise, I think we need to distribute addon packages with custom
> update URL for each case. If the addon is a public addon, you look to
> need to repack it with custom ID and custom update URL.
> 
> https://extensionworkshop.com/documentation/manage/updating-your-extension/
> 
> I'm not a system administrator on a company but a support vendor for
> enterprise customers and I provided different versions for each ESR68
> customer as sideloaded addons. Thus I think I must provide repacked XPIs
> for each customer on the next ESR...
> 
> 
> On 2019/11/02 1:04, Kris Lou via Enterprise wrote:
>>     The thing that is going away is the concept of sideloading where you
>>     put extensions in a central location and they get loaded into
>>     Firefox and the user can't remove them (they can only disable them).
>>     You will still be able to put extensions into
>>     distribution/extensions because they simply get installed into
>>     Firefox as normal extensions.
>>
>>
>> To clarify, loading them directly into <FF/TB install>/extensions is
>> going away, and the "as normal extensions" deployment means loading into
>> distribution/extensions, where they are copied into and then run from
>> the user profile?
>>
>>
>>
>> On Fri, Nov 1, 2019 at 8:59 AM Mike Kaply <[email protected]
>> <mailto:[email protected]>> wrote:
>>
>>     On Fri, Nov 1, 2019 at 10:39 AM Stephen Dowdy <[email protected]
>>     <mailto:[email protected]>> wrote:
>>
>>         On 11/1/19 9:21 AM, Mike Kaply wrote:
>>         > You can deploy extensions as a part of Firefox by putting them
>>         in the distribution/extensions directory and then locking them
>>         via policy.
>>         >
>>         > This has always been a better way then putting them in system
>>         directories where they might not get updated properly.
>>
>>         Mike, i composed the below before this current response from you
>>         came out, but it
>>         sounds like, firefox will STILL support APPDIR extensions
>>         deployment, but not user
>>         PROFDIR deployments  (this changes the extensions.*scopes
>>         preferences functionality
>>         i would assume.)   So, is there a guide on how the old-school
>>         stuff should now be
>>         done with Policies?
>>
>>
>>     The thing that is going away is the concept of sideloading where you
>>     put extensions in a central location and they get loaded into
>>     Firefox and the user can't remove them (they can only disable them).
>>
>>     You will still be able to put extensions into
>>     distribution/extensions because they simply get installed into
>>     Firefox as normal extensions.
>>      
>>
>>
>>         To be blunt:  I really still am puzzled by the entire Policies
>>         thing, as the autoconfig
>>         stuff (to me) seems to be more useful/functional and stuff like
>>         locking/defaulting
>>         Policies was bolted on after it was discovered they didn't offer
>>         the same functionality
>>         of defaultPref() lockPref() etc...  (i.e. it seems to be playing
>>         catchup rather than
>>         offering me something of value.  Security? Maintainability? ?)
>>
>>
>>     autoconfig for setting/locking preferences continues to be available
>>     and will always be available. The only thing being locked down in
>>     autoconfig on release (not ESR) is the fact that you could use
>>     autoconfig to bypass Firefox security and access everything in
>>     Firefox (this is how the CCK2 works).
>>
>>     The reason I haven't made every preference available in policy is:
>>
>>     1. There are way too many preferences.
>>     2. Folks change a ton of preferences without having any idea what
>>     they do.
>>
>>     I still ponder this every so often, but then I see some of the
>>     preferences people change and bang my head against a wall.
>>
>>     If there are prefs you need, please let me know.
>>      
>>
>>
>>         There seems to be a lot of chaos for what i don't see as a
>>         benefit.  It appears a lot
>>         of us are getting frustrated over having to bang our heads on
>>         just maintaining status-quo
>>         operations, and if there is some well-defined reasoning, getting
>>         some better P.R.
>>         out on that might help.  (for me, the camel that broke my back
>>         was removing 'user.js'
>>         functionality for one freakin' stat() call of "performance". 
>>         this is just insane)
>>         (i have been cursing Mozilla for the past year over these types
>>         of things, though)
>>
>>
>>     I don't think user.js has been removed yet, has it?
>>
>>     user.js isn't just about performance. We've seen malware using
>>     user.js to do some serious hijacking of Firefox.
>>
>>     A lot of what we do is in the interest of protecting users. Folks
>>     don't see all the terrible ways these various mechanisms are used to
>>     ruin user experience.
>>
>>     By moving to policies, we can have a standard way to do things and
>>     stop the hodgepodge we had before (which I largely created).
>>
>>      
>>
>>
>>         I really appreciate you *personally* being so engaged and
>>         responsive, however. So
>>         a big Thank You for that.
>>
>>
>>     Thanks
>>
>>     Mike
>>      
>>
>>
>>         --stephen
>>
>>
>>         -----  (previously composed message) -----
>>
>>         This is totally unclear to me what's happening (from the blog
>>         post). Does this
>>         apply to the APPDIR 'extensions' folders? (it seems clear it
>>         applies to PROFDIR
>>         extensions folders). If so, PLEASE tell me how i am supposed to
>>         support an
>>         enterprise install that has preloaded extensions in a SYSADMIN
>>         controlled space?
>>         (at least for linux)
>>
>>         I don't presently do this for *firefox*, but i do for
>>         'thunderbird' (yeah,
>>         the announcement doesn't say tbird, but i presume it'll hit
>>         there sometime) I
>>         load 'mailredirect' because thunderbird fails to offer that
>>         function. (into
>>         /usr/local/thunderbird/extensions/{..}.xpi) and presently, until
>>         'enigmail' is
>>         replaced by builtin PGP functionality, i add that, too.
>>
>>         Replacing a programmatic install with site-selected addons with
>>         a request for interactive action:
>>              "Hey, user, please go to A.M.O. and download this addon
>>               after you start the app the first time",
>>         is totally untenable.
>>
>>
>>         thanks,
>>         --stephen
>>         _______________________________________________
>>         Enterprise mailing list
>>         [email protected] <mailto:[email protected]>
>>         https://mail.mozilla.org/listinfo/enterprise
>>
>>         To unsubscribe from this list, please visit
>>         https://mail.mozilla.org/listinfo/enterprise or send an email to
>>         [email protected]
>>         <mailto:[email protected]> with a subject of
>>         "unsubscribe"
>>
>>     _______________________________________________
>>     Enterprise mailing list
>>     [email protected] <mailto:[email protected]>
>>     https://mail.mozilla.org/listinfo/enterprise
>>
>>     To unsubscribe from this list, please visit
>>     https://mail.mozilla.org/listinfo/enterprise or send an email to
>>     [email protected]
>>     <mailto:[email protected]> with a subject of "unsubscribe"
>>
>>
>> _______________________________________________
>> Enterprise mailing list
>> [email protected]
>> https://mail.mozilla.org/listinfo/enterprise
>>
>> To unsubscribe from this list, please visit 
>> https://mail.mozilla.org/listinfo/enterprise or send an email to 
>> [email protected] with a subject of "unsubscribe"
>>
> 

-- 
結城 洋志 <YUKI Hiroshi>
E-mail: [email protected]
WWW : http://www.clear-code.com/
_______________________________________________
Enterprise mailing list
[email protected]
https://mail.mozilla.org/listinfo/enterprise

To unsubscribe from this list, please visit 
https://mail.mozilla.org/listinfo/enterprise or send an email to 
[email protected] with a subject of "unsubscribe"

Reply via email to