Fired when the server sends a 401 or 407 status code (that is, when the server is asking the client to provide authentication credentials, such as a username and password).
The listener can respond in one of four different ways:
The listener can do nothing, just observing the request. If this happens, it will have no effect on the handling of the request, and the browser will probably just ask the user to log in.
The listener can cancel the request. If they do this, then authentication will fail, and the user will not be asked to log in. Extensions can cancel requests as follows:
"blocking" in the extraInfoSpec parametercancel property set to true
If credentials are available synchronously, the extension can supply them synchronously. If the extension does this, then the browser will attempt to log in with the given credentials. The listener can provide credentials synchronously as follows:
"blocking" in the extraInfoSpec parameterauthCredentials property set to the credentials to supplyThe extension might need to fetch credentials asynchronously. For example, the extension might need to fetch credentials from storage, or ask the user. In this case, the listener can supply credentials asynchronously as follows:
"blocking" in the extraInfoSpec parameterPromise that is resolved with an object containing an authCredentials property, set to the credentials to supplySee Examples.
If you use "blocking" you must have the "webRequestBlocking" API permission in your manifest.json.
If your extension provides bad credentials, then the listener will be called again. For this reason, take care not to enter an infinite loop by repeatedly providing bad credentials.
In general, Firefox does not fire webRequest events for system requests, such as browser or extension upgrades, or search engine queries. To enable proxy authorization to work smoothly for system requests, from version 57 Firefox implements an exception to this.
If an extension has the "webRequest", "webRequestBlocking", "proxy", and "<all_urls>" permissions, then it will be able to use onAuthRequired to supply credentials for proxy authorization (but not for normal web authorization). The listener will not be able to cancel system requests or make any other modifications to any system requests.
browser.webRequest.onAuthRequired.addListener( listener, // function filter, // object extraInfoSpec // optional array of strings ) browser.webRequest.onAuthRequired.removeListener(listener) browser.webRequest.onAuthRequired.hasListener(listener)
Events have three functions:
addListener(callback, filter, extraInfoSpec)removeListener(listener)listener argument is the listener to remove.hasListener(listener)listener is registered for this event. Returns true if it is listening, false otherwise.callbackA function that will be called when this event occurs. The function will be passed the following arguments:
Returns: webRequest.BlockingResponse or a Promise.
"blocking" in the extraInfoSpec parameter and return a BlockingResponse object, with its cancel or its authCredentials properties set."blocking" in the extraInfoSpec parameter and return a Promise that is resolved with a BlockingResponse object, with its cancel or its authCredentials properties set.filterwebRequest.RequestFilter. A filter that restricts the events that will be sent to this listener.extraInfoSpecOptional
array of string. Extra options for the event. You can pass any of the following values:"blocking": make the request block, so you can cancel the request or supply authentication credentials"responseHeaders": include responseHeaders in the details object passed to the listenerchallengerobject. The server requesting authentication. This is an object with the following properties:
hoststring. The server's hostname.isProxy is true.portinteger. The server's port number.cookieStoreIdstring. If the request is from a tab open in a contextual identity, the cookie store ID of the contextual identity.frameIdinteger. This is 0 if the request happens in the main frame; a positive value is the ID of a subframe in which the request happens. If the document of a (sub-)frame is loaded (type is main_frame or sub_frame), frameId indicates the ID of this frame, not the ID of the outer frame. Frame IDs are unique within a tab.incognitoboolean. Whether the request is from a private browsing window.isProxyboolean. true for Proxy-Authenticate, false for WWW-Authenticate. Note: webRequest.onAuthRequired is only called for HTTP and HTTPS/SSL proxy servers requiring authentication, and not for SOCKS proxy servers requiring authentication.methodstring. Standard HTTP method (For example, "GET" or "POST").parentFrameIdinteger. ID of the frame that contains the frame which sent the request. Set to -1 if no parent frame exists.proxyInfoobject. This property is present only if the request is being proxied. It contains the following properties:
hoststring. The hostname of the proxy server.portinteger. The port number of the proxy server.typestring. The type of proxy server. One of:
"http": HTTP proxy (or SSL CONNECT for HTTPS)"https": HTTP proxying over TLS connection to proxy"socks": SOCKS v5 proxy"socks4": SOCKS v4 proxy"direct": no proxy"unknown": unknown proxyusernamestring. Username for the proxy service.proxyDNSboolean. True if the proxy will perform domain name resolution based on the hostname supplied, meaning that the client should not do its own DNS lookup.failoverTimeoutinteger. Failover timeout in seconds. If the connection fails to connect the proxy server after this number of seconds, the next proxy server in the array returned from FindProxyForURL() will be used.realmOptional
string. The authentication realm provided by the server, if there is one.requestIdstring. The ID of the request. Request IDs are unique within a browser session, so you can use them to relate different events associated with the same request.responseHeadersOptional
webRequest.HttpHeaders. The HTTP response headers that were received along with this response.schemestring. The authentication scheme: "basic" or "digest".statusCodeinteger. Standard HTTP status code returned by the server.statusLinestring. HTTP status line of the response or the 'HTTP/0.9 200 OK' string for HTTP/0.9 responses (i.e., responses that lack a status line) or an empty string if there are no headers.tabIdinteger. ID of the tab in which the request takes place. Set to -1 if the request isn't related to a tab.thirdPartyboolean. Indicates whether the request and its content window hierarchy are third party.timeStampnumber. The time when this event fired, in milliseconds since the epoch.typewebRequest.ResourceType. The type of resource being requested: for example, "image", "script", "stylesheet".urlstring. Target of the request.urlClassificationobject. The type of tracking associated with the request, if with the request has been classified by Firefox Tracking Protection. This is an object with the following properties:firstPartyarray of strings. Classification flags for the request's first party.thirdPartyarray of strings. Classification flags for the request or its window hierarchy's third parties.fingerprinting and fingerprinting_content: indicates the request is involved in fingerprinting. fingerprinting_content indicates the request is loaded from an origin that has been found to fingerprint but is not considered to participate in tracking, such as a payment provider.cryptomining and cryptomining_content: similar to the fingerprinting category but for cryptomining resources.tracking, tracking_ad, tracking_analytics, tracking_social, and tracking_content: indicates the request is involved in tracking. tracking is any generic tracking request, the ad, analytics, social, and content suffixes identify the type of tracker.any_basic_tracking: a meta flag that combines any tracking and fingerprinting flags, excluding tracking_content and fingerprinting_content.any_strict_tracking: a meta flag that combines any tracking and fingerprinting flags, including tracking_content and fingerprinting_content.any_social_tracking: a meta flag that combines any social tracking flags.| Desktop | Mobile | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Chrome | Edge | Firefox | Internet Explorer | Opera | Safari | WebView Android | Chrome Android | Firefox for Android | Opera Android | Safari on IOS | Samsung Internet | |
onAuthRequired |
Yes |
14 |
54
To handle a request asynchronously, return a Promise from the listener.
|
? |
Yes |
14
extraInfoSpec options are not supported.
|
? |
? |
54
To handle a request asynchronously, return a Promise from the listener.
|
? |
? |
? |
asyncBlocking |
Yes |
14 |
No |
? |
Yes |
No |
? |
? |
No |
? |
? |
? |
This code just observes authentication requests for the target URL:
const target = "https://intranet.company.com/"; function observe(requestDetails) { console.log(`observing: ${requestDetails.requestId}`); } browser.webRequest.onAuthRequired.addListener( observe, {urls: [target]} );
This code cancels authentication requests for the target URL:
const target = "https://intranet.company.com/"; function cancel(requestDetails) { console.log(`canceling: ${requestDetails.requestId}`); return {cancel: true}; } browser.webRequest.onAuthRequired.addListener( cancel, {urls: [target]}, ["blocking"] );
This code supplies credentials synchronously. It has to keep track of outstanding requests, to ensure that it doesn't repeatedly try to submit bad credentials:
const target = "https://intranet.company.com/"; const myCredentials = { username: "[email protected]", password: "zDR$ERHGDFy" } const pendingRequests = []; // A request has completed. // We can stop worrying about it. function completed(requestDetails) { console.log(`completed: ${requestDetails.requestId}`); var index = pendingRequests.indexOf(requestDetails.requestId); if (index > -1) { pendingRequests.splice(index, 1); } } function provideCredentialsSync(requestDetails) { // If we have seen this request before, then // assume our credentials were bad, and give up. if (pendingRequests.indexOf(requestDetails.requestId) != -1) { console.log(`bad credentials for: ${requestDetails.requestId}`); return {cancel:true}; } pendingRequests.push(requestDetails.requestId); console.log(`providing credentials for: ${requestDetails.requestId}`); return {authCredentials: myCredentials}; } browser.webRequest.onAuthRequired.addListener( provideCredentialsSync, {urls: [target]}, ["blocking"] ); browser.webRequest.onCompleted.addListener( completed, {urls: [target]} ); browser.webRequest.onErrorOccurred.addListener( completed, {urls: [target]} );
This code supplies credentials asynchronously, fetching them from storage. It also has to keep track of outstanding requests, to ensure that it doesn't repeatedly try to submit bad credentials:
const target = "https://httpbin.org/basic-auth/*"; const pendingRequests = []; /* * A request has completed. We can stop worrying about it. */ function completed(requestDetails) { console.log(`completed: ${requestDetails.requestId}`); var index = pendingRequests.indexOf(requestDetails.requestId); if (index > -1) { pendingRequests.splice(index, 1); } } function provideCredentialsAsync(requestDetails) { // If we have seen this request before, // then assume our credentials were bad, // and give up. if (pendingRequests.indexOf(requestDetails.requestId) != -1) { console.log(`bad credentials for: ${requestDetails.requestId}`); return {cancel: true}; } else { pendingRequests.push(requestDetails.requestId); console.log(`providing credentials for: ${requestDetails.requestId}`); // we can return a promise that will be resolved // with the stored credentials return browser.storage.local.get(null); } } browser.webRequest.onAuthRequired.addListener( provideCredentialsAsync, {urls: [target]}, ["blocking"] ); browser.webRequest.onCompleted.addListener( completed, {urls: [target]} ); browser.webRequest.onErrorOccurred.addListener( completed, {urls: [target]} );
Note: This API is based on Chromium's chrome.webRequest API. This documentation is derived from web_request.json in the Chromium code.
Microsoft Edge compatibility data is supplied by Microsoft Corporation and is included here under the Creative Commons Attribution 3.0 United States License.
© 2005–2021 MDN contributors.
Licensed under the Creative Commons Attribution-ShareAlike License v2.5 or later.
https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/WebExtensions/API/webRequest/onAuthRequired