Chrome incompatibilities

Extensions built with WebExtension APIs are designed to be compatible with Chrome and Opera extensions. As far as possible, extensions written for those browsers should run on Firefox with minimal changes.

However, there are significant differences between Chrome, Firefox, and Edge. In particular:

  • Support for JavaScript APIs differs across browsers. See Browser support for JavaScript APIs for more details.
  • Support for manifest.json keys differs across browsers. See the "Browser compatibility" section in the manifest.json page for more details.
  • Javascript APIs:
    • In Firefox and Edge: JavaScript APIs are accessed under the browser namespace.
    • In Chrome: JavaScript APIs are accessed under the chrome namespace. (cf. Chrome bug 798169)
  • Asynchronous APIs:
    • In Firefox: Asynchronous APIs are implemented using promises.
    • In Chrome and Edge: Asynchronous APIs are implemented using callbacks. (cf. Chrome bug 328932)

The rest of this page summarizes these and other incompatibilities.

JavaScript APIs

*chrome.** and *browser.** namespace

  • In Firefox: The equivalent APIs are accessed using the browser namespace.
    browser.browserAction.setIcon({path: "path/to/icon.png"});
  • In Chrome: Extensions access privileged JavaScript APIs using the chrome namespace.
    chrome.browserAction.setIcon({path: "path/to/icon.png"});

Callbacks and promises

  • In Firefox: Asynchronous APIs use promises to return values instead.
    function logCookie(c) {
    function logError(e) {
    let setCookie = browser.cookies.set(
      {url: ""}
    setCookie.then(logCookie, logError);
  • In Chrome: Asynchronous APIs use callbacks to return values, and runtime.lastError to communicate errors.
    function logCookie(c) {
      if (chrome.runtime.lastError) {
      } else {
      {url: ""},

Firefox supports both the chrome and browser namespaces

As a porting aid, the Firefox implementation of WebExtensions supports chrome, using callbacks, as well as browser, using promises. This means that many Chrome extensions will just work in Firefox without any changes.

Note: However, this is not part of the WebExtensions standard. and may not be supported by all compliant browsers.

If you choose to write your extension to use browser and promises, then Firefox also provides a polyfill that will enable it to run in Chrome:

Partially supported APIs

The page Browser support for JavaScript APIs includes compatibility tables for all APIs that have any support in Firefox. Where there are caveats around support for a given API item, this is indicated in these tables with an asterisk "*" and in the reference page for the API item, the caveats are explained.

These tables are generated from compatibility data stored as JSON files in GitHub.

The rest of this section describes compatibility issues that are not already captured in the tables.

Notifications API

For notifications.create(), with type "basic":

  • In Firefox: iconUrl is optional.
  • In Chrome: iconUrl is required.

When the user clicks on a notification:

  • In Firefox: The notification is cleared immediately.
  • In Chrome: This is not the case.

If you call notifications.create() more than once in rapid succession:

  • In Firefox: In Firefox, the notifications may not display at all. Waiting to make subsequent calls until within the chrome.notifications.create() callback function is not a sufficient delay to prevent this.

Proxy API

Firefox's proxy API followed a completely different design from Chrome's Proxy API.

  • In Firefox: An extension can register a PAC file.
  • In Chrome: An extension can register a PAC file, but can also define explicit proxying rules.

Because this API is incompatible with Chrome's proxy API, the Firefox proxy API is only available through the browser namespace.

Tabs API

When using tabs.executeScript() or tabs.insertCSS():

  • In Firefox: Relative URLs passed are resolved relative to the current page URL.
  • In Chrome: These URLs are resolved relative to the extension's base URL.

To work cross-browser, you can specify the path as an absolute URL, starting at the extension's root, like this:


When querying tabs by URL tabs.query():

  • In Firefox: Extensions must have the "tabs" permission.
  • In Chrome: Extensions do not need the "tabs" permission, but only tabs whose URLs match the extension's host permissions will be included in the results.

When calling tabs.remove():

  • In Firefox: The tabs.remove() promise is fulfilled after the beforeunload event.
  • In Chrome: The callback does not wait for beforeunload.

WebRequest API

  • In Firefox:
    • Requests can be redirected only if their original URL uses the http: or https: scheme.
    • The activeTab permission does not allow intercepting network requests in the current tab. (See bug 1617479)
    • Events are not fired for system requests (for example, extension upgrades or searchbar suggestions).
    • If an extension wants to redirect a public (e.g., HTTPS) URL to an extension page, the extension's manifest.json file must contain a web_accessible_resources key with the URL of the extension page.
      • Note: Any website may then link or redirect to that URL, and extensions should treat any input (POST data, for example) as if it came from an untrusted source, just as a normal web page should.

    • Some of the browser.webRequest.* APIs allow returning Promises that resolves webRequest.BlockingResponse asynchronously.
  • In Chrome: Only webRequest.onAuthRequired supports asynchronous webRequest.BlockingResponse via supplying 'asyncBlocking'.

Windows API

  • In Firefox: onFocusChanged of the windows API, will trigger multiple times for a given focus change.

Unsupported APIs

DeclarativeContent API

Miscellaneous incompatibilities


  • In Firefox: URLs in injected CSS files are resolved relative to the CSS file itself.
  • In Chrome: URLs in injected CSS files are resolved relative to the page they are injected into.

Support for dialogs in background pages


  • In Firefox: Resources are assigned a random UUID that changes for every instance of Firefox: moz-extension://«random-UUID»/«path». This randomness can prevent you from doing a few things, such as add your specific extension's URL to another domain's CSP policy.
  • In Chrome: When a resource is listed in web_accessible_resources, it is accessible as chrome-extension://«your-extension-id»/«path». The extension ID is fixed for a given extension.

Manifest "key" property

  • In Firefox: Since Firefox uses random UUIDs for web_accessible_resources, this property is unsupported.
  • In Chrome: When working with an unpacked extension, the manifest may include a "key" property to pin the extension ID across different machines. This is mainly useful when working with web_accessible_resources.

Content script HTTP(S) requests

  • In Firefox: When a content script makes an HTTP(S) request, you must provide absolute URLs.
  • In Chrome: When a content script makes a request (for example, using fetch()) to a relative URL (like /api), it will be sent to

Sharing variables between content scripts

  • In Firefox: You cannot share variables between content scripts by assigning them to this.{variableName} in one script and then attempting to access them using window.{variableName} in another. This is a limitation created by the sandbox environment in Firefox. This limitation may be removed, see bug 1208775.

Content script lifecycle during navigation

  • In Firefox: Content scripts remain injected in a web page after the user has navigated away, however, window object properties are destroyed. For example, if a content script sets window.prop1 = "prop"  and the user then navigates away and returns to the page window.prop1 is undefined. This issue is tracked in bug 1525400. To mimic the behavior of Chrome, listen for the pageshow and pagehide events. Then simulate the injection or destruction of the content script.
  • In Chrome: Content scripts are destroyed when the user navigates away from a web page. If the user then returns to the page through history, by clicking the back button, the content script is injected into the web page again.

"per-tab" zoom behavior

  • In Firefox: The zoom level persists across page loads and navigation within the tab.
  • In Chrome: Zoom changes are reset on navigation; navigating a tab will always load pages with their per-origin zoom factors.

See tabs.ZoomSettingsScope.

manifest.json keys

The main manifest.json page includes a table describing browser support for manifest.json keys. Where there are caveats around support for a given key, this is indicated in the table with an asterisk "*" and in the reference page for the key, the caveats are explained.

These tables are generated from compatibility data stored as JSON files in GitHub.

Native messaging

Connection-based messaging arguments

On Linux and Mac: Chrome passes one argument to the native app, which is the origin of the extension that started it, in the form: chrome-extension://«extensionID/» (trailing slash required). This enables the app to identify the extension.

On Windows: Chrome passes two arguments:

  1. The origin of the extension
  2. A handle to the Chrome native window that started the app


  • In Firefox: The manifest key is called allowed_extensions.
  • In Chrome: The manifest key is called allowed_origins instead.

App manifest location

Data cloning algorithm

Some extension APIs allow an extension to send data from one part of the extension to another, such as runtime.sendMessage(), tabs.sendMessage(), runtime.onMessage, the postMessage() method of runtime.port, and tabs.executeScript().

The Structured clone algorithm supports more types than the JSON serialization algorithm. A notable exception are (DOM) objects with a toJSON method. DOM objects are not cloneable nor JSON-serializable by default, but with a toJSON() method, these can be JSON-serialized (but still not cloned with the structured cloning algorithm). Examples of JSON-serializable objects that are not structured cloneable include instances of URL and PerformanceEntry.

Extension that rely on the toJSON() method of the JSON serialization algorithm can use JSON.stringify() followed by JSON.parse() to ensure that a message can be exchanged, because a parsed JSON value is always structurally cloneable.