search
HomeWeb Front-endJS TutorialSummary of JavaScript cross-domain methods_javascript skills

Doing web development often requires you to face cross-domain problems. The root cause of cross-domain problems is the same-origin policy in browser security. For example, for http://www.a.com/1.html:

1.http://www.a.com/2.html is of the same origin;
2. https://www.a.com/2.html is from a different source because of different protocols;
3. http://www.a.com:8080/2.html is from different sources because the ports are different;
4. http://sub.a.com/2.html is of different origins because the hosts are different.

In the browser, the tags <script>, <img alt="Summary of JavaScript cross-domain methods_javascript skills" >, <iframe> and <link> can load cross-domain (non-original) resources, and the loading method is actually It is equivalent to an ordinary GET request. The only difference is that for security reasons, the browser does not allow reading and writing operations on the loaded resources in this way, and can only use the capabilities that the tag itself should have (such as script execution, style application, etc.). </script>

The most common cross-domain problem is Ajax cross-domain access. By default, cross-domain URLs cannot be accessed through Ajax. Here I record the cross-domain methods I learned:

1. Server-side proxy , there is nothing to say about this. The disadvantage is that by default, the server that receives the Ajax request cannot obtain the client's IP and UA.

2. iframe, using iframe is actually equivalent to opening a new web page. The specific cross-domain method is roughly that the parent page opened by domain A nests an iframe pointing to domain B, and then submits Data, after completion, B’s server can:

●Return a 302 redirect response and redirect the result back to domain A;
●An iframe pointing to domain A is nested inside this iframe.

Both of them finally realized cross-domain calls. This method is more functional than JSONP introduced below, because after the cross-domain is completed, there is no problem with DOM operations and JavaScript calls between each other, but There are also some restrictions. For example, the results must be passed in URL parameters, which means that when the result data is large, it needs to be split and passed, which is very troublesome. Another trouble is caused by the iframe itself, the interaction between the parent page and the iframe itself. There are inherent security limitations.

3. Use script tags to cross domains . This method is also very common. The script tag can load foreign JavaScript and execute it, and interact with the parent page through a preset callback function. . It has a big name, called JSONP cross-domain. JSONP is the abbreviation of JSON with Padding. It is an unofficial protocol. It is obviously loading script. Why is it related to JSON? It turns out that this is the callback function, and a typical way to use it is to pass parameters through JSON, that is, fill the JSON data into the callback function. This is the meaning of JSON Padding of JSONP.

There are many JSONP services on the Internet to provide data, which is essentially a cross-domain request. If the callback is specified in the request URL, such as callback=result, then after obtaining the data, the result function will be automatically called. , and pass the data in in the form of JSON, for example (search for "football"):

http://ajax.googleapis.com/ajax/services/search/web?v=1.0&q=football&callback=result

Use JQuery to call it as:

Copy code The code is as follows:

$.getJSON("http://ajax.googleapis.com/ajax/services/search/web?v=1.0&q=football&callback=?",function(data){
//...
});

In general, the limitation of JSONP's cross-domain method is that it can only use GET requests, and it cannot solve the problem of how to make JavaScript calls between two pages in different domains.

4. Flash cross-domain:

It will access the crossdomain.xml file under the root directory of the target website and determine whether to allow this cross-domain access based on the content in the file:

Copy code The code is as follows:




5. The img tag can also use , which is also a very common method. The function is a little weaker. It can only send a get request and there is no callback. This is how Google’s click count is determined. .

6. window.PostMessage, this is a new mechanism added to HTML5 for cross-domain communication. It is only supported by Firefox 3, Safari 4, IE8 and later versions. The calling method to use it to send messages to other windows is as follows:

Copy code The code is as follows:

otherWindow.postMessage(message, targetOrigin);

In the receiving window, you need to set up an event processing function to receive the sent message:
Copy code The code is as follows:

window.addEventListener("message", receiveMessage, false);
function receiveMessage(event){
If (event.origin !== "http://example.org:8080")
         return;
}

Note that the origin and source attributes of the message must be used to verify the identity of the sender, otherwise an XSS vulnerability will occur.

7. Access Control

Some browsers support response headers such as Access-Control-Allow-Origin, such as:

Copy code The code is as follows:

header("Access-Control-Allow-Origin: http://www.a.com");

It specifies that cross-domain access to www.a.com is allowed.

8. window.name

This thing has actually been used as a means of hacker XSS before. Its essence is that when the location of the window changes, the page will be reloaded, but what is interesting is that the window.name does not change, so you can use It comes to pass value. Cooperate with iframe and change the iframe's window object several times to complete practical cross-domain data transfer.

9. document.domain

This method is suitable for cross-domain communication between a.example.com and b.example.com, because they have a common domain called example.com. Just set document.domain to example.com. , but if there is communication between a.example1.com and b.example2.com, it has no choice.

10. Fragment Identitier Messaging (FIM)

This method is very interesting and requires the cooperation of iframe. Fragment Identitier is the part after the pound sign (#) of the URL that is often used for anchor positioning. Changes in this part will not cause the page to refresh. The parent window can access the URL of the iframe at will, and the iframe can also access the URL of the parent window at will. , then communication between the two can be achieved by changing the Fragmement Identitier. The disadvantage is that the change of Fragmement Identitier will generate unnecessary historical records, and there is also a length limit; in addition, some browsers do not support the onhashchange event.

11. Cross Frame (CF)

This method is a variant of the above-mentioned FIM method. The essence of CF and FIM is actually introduced in my "First Experience with GWT" article (it is just used to implement the history and back functions). An invisible iframe will be dynamically created, pointing to a foreign domain. After processing, the Fragment Identitier in the URL of this iframe contains the processing results for the parent page to access, and the browser's URL will not change.

12. Cookie P3P Protocol

Using the characteristics of cross-domain access cookies under the P3P protocol to achieve cross-domain access is also a strange trick. P3P is a privacy protection recommended standard published by W3C, aiming to provide privacy protection for Internet users surfing the Internet. Set the cookie path to "/", that is, there is no domain restriction. At this time, some browsers allow pages with other URLs to be read, while others do not. In this case, you need to respond on the parent page. Set the P3P header on the header:

Copy code The code is as follows:

P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
es6数组怎么去掉重复并且重新排序es6数组怎么去掉重复并且重新排序May 05, 2022 pm 07:08 PM

去掉重复并排序的方法:1、使用“Array.from(new Set(arr))”或者“[…new Set(arr)]”语句,去掉数组中的重复元素,返回去重后的新数组;2、利用sort()对去重数组进行排序,语法“去重数组.sort()”。

JavaScript的Symbol类型、隐藏属性及全局注册表详解JavaScript的Symbol类型、隐藏属性及全局注册表详解Jun 02, 2022 am 11:50 AM

本篇文章给大家带来了关于JavaScript的相关知识,其中主要介绍了关于Symbol类型、隐藏属性及全局注册表的相关问题,包括了Symbol类型的描述、Symbol不会隐式转字符串等问题,下面一起来看一下,希望对大家有帮助。

原来利用纯CSS也能实现文字轮播与图片轮播!原来利用纯CSS也能实现文字轮播与图片轮播!Jun 10, 2022 pm 01:00 PM

怎么制作文字轮播与图片轮播?大家第一想到的是不是利用js,其实利用纯CSS也能实现文字轮播与图片轮播,下面来看看实现方法,希望对大家有所帮助!

JavaScript对象的构造函数和new操作符(实例详解)JavaScript对象的构造函数和new操作符(实例详解)May 10, 2022 pm 06:16 PM

本篇文章给大家带来了关于JavaScript的相关知识,其中主要介绍了关于对象的构造函数和new操作符,构造函数是所有对象的成员方法中,最早被调用的那个,下面一起来看一下吧,希望对大家有帮助。

javascript怎么移除元素点击事件javascript怎么移除元素点击事件Apr 11, 2022 pm 04:51 PM

方法:1、利用“点击元素对象.unbind("click");”方法,该方法可以移除被选元素的事件处理程序;2、利用“点击元素对象.off("click");”方法,该方法可以移除通过on()方法添加的事件处理程序。

JavaScript面向对象详细解析之属性描述符JavaScript面向对象详细解析之属性描述符May 27, 2022 pm 05:29 PM

本篇文章给大家带来了关于JavaScript的相关知识,其中主要介绍了关于面向对象的相关问题,包括了属性描述符、数据描述符、存取描述符等等内容,下面一起来看一下,希望对大家有帮助。

整理总结JavaScript常见的BOM操作整理总结JavaScript常见的BOM操作Jun 01, 2022 am 11:43 AM

本篇文章给大家带来了关于JavaScript的相关知识,其中主要介绍了关于BOM操作的相关问题,包括了window对象的常见事件、JavaScript执行机制等等相关内容,下面一起来看一下,希望对大家有帮助。

foreach是es6里的吗foreach是es6里的吗May 05, 2022 pm 05:59 PM

foreach不是es6的方法。foreach是es3中一个遍历数组的方法,可以调用数组的每个元素,并将元素传给回调函数进行处理,语法“array.forEach(function(当前元素,索引,数组){...})”;该方法不处理空数组。

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
2 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
2 weeks agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment

mPDF

mPDF

mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

WebStorm Mac version

WebStorm Mac version

Useful JavaScript development tools

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software