Understanding the Restrictions of CSS :after on Certain Elements
The CSS :after pseudo-element is used to add content after an element's document tree content. While the CSS spec doesn't explicitly state any limitations, it has been observed that :after only works with certain elements.
Determining Element Compatibility
The key factor determining whether an element can accept a :after property is whether it is a replaced element. Replaced elements, such as images () and form inputs (), have their appearance and dimensions defined by external resources.
The CSS specification explicitly states that :before and :after only work with non-replaced elements. This means that replaced elements, such as:
Reasoning Behind the Restriction
The incompatibility stems from the fact that replaced elements are not rendered as part of the document tree. Instead, they are rendered as external objects, so it is not possible for the browser to insert additional content before or after them.
Example of DOM Structure
For non-replaced elements, such as divs or spans, :before and :after content can be inserted into the DOM structure. For example:
<span><pre class="brush:php;toolbar:false"><before>Before Content</before> Span Content <after>After Content</after>
Conclusion
The CSS :after property is restricted to non-replaced elements due to the inherent characteristics of replaced elements. This ensures that the rendered content on the page is consistent and adheres to the specified CSS rules.
The above is the detailed content of When Does CSS :after Fail to Add Content After an Element?. For more information, please follow other related articles on the PHP Chinese website!

CSS Grid is a powerful tool for creating complex, responsive web layouts. It simplifies design, improves accessibility, and offers more control than older methods.

Article discusses CSS Flexbox, a layout method for efficient alignment and distribution of space in responsive designs. It explains Flexbox usage, compares it with CSS Grid, and details browser support.

The article discusses techniques for creating responsive websites using CSS, including viewport meta tags, flexible grids, fluid media, media queries, and relative units. It also covers using CSS Grid and Flexbox together and recommends CSS framework

The article discusses the CSS box-sizing property, which controls how element dimensions are calculated. It explains values like content-box, border-box, and padding-box, and their impact on layout design and form alignment.

Article discusses creating animations using CSS, key properties, and combining with JavaScript. Main issue is browser compatibility.

Article discusses using CSS for 3D transformations, key properties, browser compatibility, and performance considerations for web projects.(Character count: 159)

The article discusses using CSS gradients (linear, radial, repeating) to enhance website visuals, adding depth, focus, and modern aesthetics.

Article discusses pseudo-elements in CSS, their use in enhancing HTML styling, and differences from pseudo-classes. Provides practical examples.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Zend Studio 13.0.1
Powerful PHP integrated development environment

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

SublimeText3 Chinese version
Chinese version, very easy to use

SublimeText3 Linux new version
SublimeText3 Linux latest version

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.
