<rt id="bn8ez"></rt>
<label id="bn8ez"></label>

  • <span id="bn8ez"></span>

    <label id="bn8ez"><meter id="bn8ez"></meter></label>

    weidagang2046的專欄

    物格而后知致
    隨筆 - 8, 文章 - 409, 評論 - 101, 引用 - 0
    數據加載中……

    Creating A Client-Side Web Service Broker

    del.icio.us direc.tor: Creating A Client-Side Web Service Broker

    June 20, 2005

    Initially, I had planned on using the XmlHTTPRequest object to create a client-side application that integrated various web services like Google suggest, del.icio.us, Flickr, Yahoo developer network, etc. Unfortunately, the browser security restrictions severely limit the capabilities of a client-side application, essentially eliminating any cross-domain integration services. However, single-domain services can still be implemented by using the Javascript bootloading technique.

    Same-Origin Policy

    The most frustrating part of creating any client-side application is the security model that applies to just about all executable objects that can be accessed by the browser. Designed the prevent cross-site scripting attacks (XSS), the same-origin policy effectively prohibits a page served from www.mydomain.org to access any document served from a different domain, via XmlHTTPRequest, IFRAME's, or similar DOM methods. Therefore, a page with a URL of http://www.mydomain.org:80/ cannot access another page that does not share the same protocol, domain, and port.

    One exception to this rule is when the document.domain property is set. This exception stipulates that in an FRAME/IFRAME situation, documents served from different subdomains of the same base domain may access each other's DOM tree if both pages set their respective document.domain property to the base domain. For example, if a page blue.domainA.org/master.html contains an IFRAME of the page red.domainA.org/slave.html, then by default the two pages will not be allowed to access each other's DOM tree. However, if both pages contain an explicit Javascript command, document.domain = "domainA.org";, then access to the DOMs will be granted. What is somewhat confusing is that all pages have a valid document.domain property that is set, but is considered null by the security model until it is set explicitly. Unfortunately, XmlHTTPRequest objects are not affected by the document.domain property. XmlHTTPRequest will only fetch documents from the originating server. In fact, you have to specify a relative URL, since it completely ignores any URL's with a fully-qualified domain name.

    None of these security policies apply when executing a web page served from localhost. You can use IFRAME's and XmlHTTPRequest objects to access any valid URL to your heart's content.

    Using the Javascript Bootloader

    You can execute arbitrary Javascript code in the security context of any web page by simply typing a javascript command into the browser's address bar:

    javascript:void(document.body.style.backgroundColor='#c00')

    That command can also be bookmarked by either editing a bookmark property directly or using the drag-and-drop method, thus creating a Javascript bookmarklet. As anyone who has had the displeasure of implementing third-party banner ads knows, a web page may contain a <script> reference to any valid URL, i.e. <script src="http://shoddy.advertiser.net"></script>. The Javascript bootloader uses this capability to inject foreign code — not by writing out a <script> string, but by way of DOM node creation:

    				
    						// Create a new script node
    				
    var element = document.createElement('script');
    
    // set the 'src' attribute of the element
    element.setAttribute('src', 'http://johnvey.com/features/deliciousdirector/dboot.js');
    
    // insert the new node into the current document
    document.body.appendChild(element);

    Once the new script node is inserted, the browser will automatically process the attached code. The complete javascript bookmarklet is as follows:

    javascript:void((function() {var%20element=document.createElement('script'); element.setAttribute('src', 'http://johnvey.com/features/deliciousdirector/dboot.js'); document.body.appendChild(element)})())

    This method eliminates the need to include large blocks of Javascript code inside a bookmark (compare with the Javascript shell), and allows central control of the core Javascript code.

    Resetting the Page

    Once the foreign code is loaded, you may want to clear the content from the page in order to start from a clean slate:

    				
    						// clear the body content
    				
    document.body.innerHTML = "";
    
    // remove all the existing stylesheets
    for(i=0; (a = document.getElementsByTagName("link")[i]); i++) {
    	if(a.getAttribute("rel").indexOf("style") != -1) {
    		a.disabled = true;
    	}
    }
    
    // fill in new body content
    document.body.innerHTML = "Hello, World!";
    
    // create a new stylesheet link
    var ns = document.createElement("link");
    ns.rel = "stylesheet";
    ns.type = "text/css";
    ns.;
    document.body.appendChild(ns);
    
    // create a new script node for the main program logic
    var js = document.createElement("script");
    js.language = "javascript";
    js.src = "http://johnvey.com/features/deliciousdirector/d.js";
    document.body.appendChild(js);
    
    // update the page title
    document.title += " (Direc.tor)";



    from: http://johnvey.com/features/deliciousdirector/web-service-broker.html

    posted on 2006-11-20 21:38 weidagang2046 閱讀(553) 評論(0)  編輯  收藏 所屬分類: Javascript

    主站蜘蛛池模板: 亚洲av日韩综合一区久热| 在线观看免费中文视频| 国产在线不卡免费播放| 亚洲国产成AV人天堂无码| 国产成人久久AV免费| 亚洲视频一区二区| 青娱乐在线免费观看视频| 午夜免费福利在线观看| 亚洲一卡2卡3卡4卡国产网站| 嫩草成人永久免费观看| 亚洲熟妇无码乱子AV电影| 全黄A免费一级毛片| 免费看国产精品麻豆| 亚洲avav天堂av在线网毛片| 毛片A级毛片免费播放| 亚洲免费视频播放| 最近中文字幕mv免费高清在线| 亚洲国产精品无码久久久不卡| 狠狠躁狠狠爱免费视频无码| 亚洲精品无码久久毛片| 免费无遮挡无码视频在线观看| 四虎影视精品永久免费| 99亚洲乱人伦aⅴ精品| 日本特黄特色免费大片| 亚洲精品乱码久久久久久V| 在线观看免费宅男视频| 亚洲中文字幕无码久久2020| 国产免费毛不卡片| 精品久久亚洲中文无码| 在线观看日本免费a∨视频| 国产成人亚洲精品| 曰批全过程免费视频在线观看| 亚洲偷自精品三十六区| 精品熟女少妇AV免费观看| 亚洲中文字幕久久精品蜜桃| 最近中文字幕无吗免费高清| 亚洲熟妇少妇任你躁在线观看| 四虎www免费人成| 国产精品亚洲综合网站| 免费a级毛片无码av| 免费毛片毛片网址|