Principles of nine cross-domain implementation methods (full version)

Principles of nine cross-domain implementation methods (full version)

[Original article from 51CTO.com] Cross-domain requests are often encountered in front-end and back-end data interaction. What is cross-domain and what are the cross-domain methods? This article will discuss this.

Please check the GitHub blog for the complete source code of this article.

1. What is cross-domain?

1. What is the same-origin policy and what are its restrictions?

The same-origin policy is a convention. It is the most core and basic security function of the browser. If the same-origin policy is missing, the browser is very vulnerable to attacks such as XSS and CSFR. The so-called same-origin refers to the same "protocol + domain name + port". Even if two different domain names point to the same IP address, they are not of the same origin.

The same-origin policy restricts the following:

  • Storage contents such as Cookies, LocalStorage, IndexedDB, etc.
  • DOM Nodes
  • AJAX request could not be sent

However, there are three tags that allow cross-domain loading of resources:

  1. < img src = XXX >
  2. < link href = XXX >
  3. < script src = XXX >

2. Common cross-domain scenarios

When any of the protocols, subdomains, primary domains, and port numbers are different, they are considered different domains. When different domains request resources from each other, it is considered "cross-domain". Common cross-domain scenarios are shown in the following figure:

Two points in particular:

  • First: If it is a cross-domain problem caused by the protocol and port, the "front desk" is powerless.
  • Second: In the cross-domain issue, it is only identified by the "URL header" and not by whether the IP address corresponding to the domain name is the same. The "URL header" can be understood as "the protocol, domain name and port must match".

You may have a question here: if the request is cross-domain, is the request sent out?

Cross-domain does not mean that the request cannot be sent. The request can be sent, the server can receive the request and return the result normally, but the result is blocked by the browser. You may wonder why Ajax can't initiate a cross-domain request when a form can initiate a cross-domain request? Because in the final analysis, cross-domain is to prevent users from reading content under another domain name. Ajax can get the response, and the browser thinks this is unsafe, so it intercepts the response. However, the form will not get new content, so a cross-domain request can be initiated. It also shows that cross-domain cannot completely prevent CSRF, because the request is sent after all.

2. Cross-domain solutions

1. JSONP

(1) JSONP principle

By taking advantage of the fact that the <script> tag has no cross-domain restriction, a web page can obtain JSON data dynamically generated from other sources. JSONP requests must be supported by the other party's server.

(2) Comparison between JSONP and AJAX

JSONP and AJAX are the same, both are ways for the client to send requests to the server and get data from the server. However, AJAX belongs to the same-origin policy, while JSONP belongs to the non-same-origin policy (cross-domain request)

(3) Advantages and disadvantages of JSONP

The advantage of JSONP is that it is simple and compatible, and can be used to solve the cross-domain data access problem of mainstream browsers. The disadvantage is that it only supports the get method, which is limited and unsafe and may be subject to XSS attacks.

(4) JSONP implementation process

  • Declare a callback function with its function name (such as show) as the parameter value to be passed to the server that requests data across domains. The function parameter is the target data to be obtained (data returned by the server).
  • Create a <script> tag, assign the cross-domain API data interface address to the script's src, and pass the function name to the server in this address (you can pass the parameter through a question mark: ?callback=show).
  • After receiving the request, the server needs to perform special processing: concatenate the passed function name and the data it needs to give you into a string. For example, the passed function name is show, and the data it prepares is show('I don't love you').
  • Finally, the server returns the prepared data to the client through the HTTP protocol, and the client then calls the callback function (show) declared before to operate on the returned data.

During development, you may encounter multiple JSONP request callback function names that are the same. In this case, you need to encapsulate a JSONP function yourself.

  1. // index.html
  2. function jsonp({ url, params, callback }) {
  3. return new Promise((resolve, reject) = > {
  4. let script = document .createElement('script')
  5. window[callback] = function(data) {
  6. resolve(data)
  7. document.body.removeChild(script)
  8. }
  9. params = { ...params, callback } // wd = b & callback = show
  10. let arrs = []
  11. for (let key in params) {
  12. arrs.push(`${key}=${params[key]}`)
  13. }
  14. script.src = `${url}?${arrs.join('&')}`
  15. document.body.appendChild(script)
  16. })
  17. }
  18. jsonp({
  19. url: 'http://localhost:3000/say',
  20. params: { wd: 'Iloveyou' },
  21. callback: 'show'
  22. }).then( data = > {
  23. console.log(data)
  24. })

The above code is equivalent to requesting data from the address http://localhost:3000/say?wd=Iloveyou&callback=show, and then the background returns show('I don't love you'), and finally runs the show() function to print out 'I don't love you'

  1. // server.js
  2. let express = require ('express')
  3. let app = express ()
  4. app.get('/say', function(req, res) {
  5. let { wd, callback } = req.query
  6. console.log(wd) // Iloveyou
  7. console.log(callback) // show
  8. res.end(`${callback}('I don't love you')`)
  9. })
  10. app.listen(3000)

(5) jQuery's JSONP form

JSONP is all GET and asynchronous requests. There are no other request methods or synchronous requests, and jQuery will clear the cache for JSONP requests by default.

  1. $.ajax({
  2. url:"http://crossdomain.com/jsonServerResponse",
  3. dataType:"jsonp",
  4. type:"get", // can be omitted
  5. jsonpCallback:"show", //- > Customize the function name passed to the server instead of using jQuery to automatically generate it, can be omitted
  6. jsonp:"callback", //- > pass the function name as the parameter callback, which can be omitted
  7. success:function (data){
  8. console.log(data);}
  9. });

2. CORS

CORS requires support from both the browser and the backend. IE 8 and 9 need to use XDomainRequest to implement it.

The browser will automatically perform CORS communication. The key to achieving CORS communication is the backend. As long as the backend implements CORS, cross-domain communication is achieved.

CORS can be enabled by setting Access-Control-Allow-Origin on the server. This attribute indicates which domain names can access resources. If a wildcard is set, all websites can access resources.

Although setting CORS has nothing to do with the front end, if the cross-domain problem is solved in this way, two situations will occur when sending requests: simple requests and complex requests.

(1) Simple request

As long as the following two conditions are met at the same time, it is a simple request

Condition 1: Use one of the following methods:

  • GET
  • HEAD
  • POST

Condition 2: The value of Content-Type is limited to one of the following three:

  • text/plain
  • multipart/form-data
  • application/x-www-form-urlencoded

Any XMLHttpRequestUpload objects in the request do not have any event listeners registered; XMLHttpRequestUpload objects can be accessed using the XMLHttpRequest.upload property.

(2) Complex requests

Requests that do not meet the above conditions are definitely complex requests. A CORS request for a complex request will add an HTTP query request before formal communication, called a "pre-check" request. This request is an option method, and is used to determine whether the server allows cross-domain requests.

When we use PUT to request the backend, it is a complex request and the backend needs to be configured as follows:

  1. // Which method is allowed to access me
  2. res.setHeader('Access-Control-Allow-Methods', 'PUT')
  3. // Pre-check survival time
  4. res.setHeader('Access-Control-Max-Age', 6)
  5. // No processing is done on the OPTIONS request
  6. if ( req.method === 'OPTIONS') {
  7. res.end()
  8. }
  9. // Define the content returned by the background
  10. app.put('/getData', function(req, res) {
  11. console.log(req.headers)
  12. res.end('I don't love you')
  13. })

Next, let's look at an example of a complete complex request and introduce the fields related to the CORS request.

  1. // index.html
  2. let xhr = new XMLHttpRequest()
  3. document.cookie = 'name=xiamen' // Cookies cannot cross domains
  4. xhr.withCredentials = true // Front-end settings whether to include cookies
  5. xhr.open('PUT', 'http://localhost:4000/getData', true)
  6. xhr.setRequestHeader('name', 'xiamen')
  7. xhr.onreadystatechange = function () {
  8. if ( xhr. readyState === 4) {
  9. if ((xhr.status > = 200 && xhr.status < 300 ) || xhr.status === 304) {
  10. console.log(xhr.response)
  11. //Get the response header, the backend needs to set Access-Control-Expose-Headers
  12. console.log(xhr.getResponseHeader('name'))
  13. }
  14. }
  15. }
  16. xhr.send()
  1. //server1.js
  2. let express = require ('express');
  3. let app = express ();
  4. app.use(express.static(__dirname));
  5. app.listen(3000);
  1. //server2.js
  2. let express = require ('express')
  3. let app = express ()
  4. let whiteList = ['http://localhost:3000'] //Set up the whitelist
  5. app.use(function(req, res, next) {
  6. let origin = req .headers.origin
  7. if (whitList.includes(origin)) {
  8. // Set which source can access me
  9. res.setHeader('Access-Control-Allow-Origin', origin)
  10. // Which header is allowed to access me
  11. res.setHeader('Access-Control-Allow-Headers', 'name')
  12. // Which method is allowed to access me
  13. res.setHeader('Access-Control-Allow-Methods', 'PUT')
  14. // Allow cookies
  15. res.setHeader('Access-Control-Allow-Credentials', true)
  16. // Pre-check survival time
  17. res.setHeader('Access-Control-Max-Age', 6)
  18. // Allowed headers to be returned
  19. res.setHeader('Access-Control-Expose-Headers', 'name')
  20. if ( req.method === 'OPTIONS') {
  21. res.end() // No processing is done on the OPTIONS request
  22. }
  23. }
  24. next()
  25. })
  26. app.put('/getData', function(req, res) {
  27. console.log(req.headers)
  28. res.setHeader('name', 'jw') //Return a response header, which needs to be set in the background
  29. res.end('I don't love you')
  30. })
  31. app.get('/getData', function(req, res) {
  32. console.log(req.headers)
  33. res.end('I don't love you')
  34. })
  35. app.use(express.static(__dirname))
  36. app.listen(4000)

The above code makes a cross-domain request from http://localhost:3000/index.html to http://localhost:4000/. As we said above, the backend is the key to implementing CORS communication.

3. postMessage

postMessage is an API in HTML5 XMLHttpRequest Level 2 and is one of the few window attributes that can be operated across domains. It can be used to solve the following problems:

  • Data transfer between the page and the new window it opens
  • Message passing between multiple windows
  • Page and nested iframe messaging
  • Cross-domain data transmission in the above three scenarios

The postMessage() method allows scripts from different sources to communicate asynchronously in a limited manner, which can achieve cross-text document, multi-window, and cross-domain message delivery.

otherWindow.postMessage(message, targetOrigin, [transfer]);
  • message: data to be sent to other windows.
  • targetOrigin: Use the origin property of the window to specify which windows can receive message events. Its value can be a string "*" (indicating no restrictions) or a URI. When sending a message, if any of the target window's protocol, host address, or port does not match the value provided by targetOrigin, the message will not be sent; only if the three completely match, the message will be sent.
  • transfer (optional): is a list of Transferable objects that are passed along with the message. The ownership of these objects will be transferred to the recipient of the message, and the sender will no longer retain ownership.

Let's look at an example: The http://localhost:3000/a.html page sends "I love you" to http://localhost:4000/b.html, and the latter sends back "I don't love you".

  1. // a.html
  2. < iframe src = "http://localhost:4000/b.html" frameborder = "0" id = "frame" onload = "load()" > </ iframe > //Wait for it to load and then trigger an event
  3. //Embedded in http://localhost:3000/a.html
  4. < script >
  5. function load() {
  6. let frame = document .getElementById('frame')
  7. frame.contentWindow.postMessage('I love you', 'http://localhost:4000') //Send data
  8. window.onmessage = function (e) { //Accept the returned data
  9. console.log(e.data) //I don't love you
  10. }
  11. }
  12. </ script >
  1. // b.html
  2. window.onmessage = function (e) {
  3. console.log(e.data) //I love you
  4. e.source.postMessage('I don't love you', e.origin)
  5. }

4. websocket

Websocket is a persistent protocol of HTML5, which realizes full-duplex communication between browser and server, and is also a cross-domain solution. WebSocket and HTTP are both application layer protocols, both based on TCP protocol. However, WebSocket is a two-way communication protocol. After the connection is established, the server and client of WebSocket can actively send or receive data to each other. At the same time, WebSocket needs to use HTTP protocol when establishing a connection. After the connection is established, the two-way communication between client and server has nothing to do with HTTP.

The native WebSocket API is not very convenient to use, so we use Socket.io, which encapsulates the webSocket interface well, provides a simpler and more flexible interface, and also provides backward compatibility for browsers that do not support webSocket.

Let's take a look at an example: the local file socket.html sends and receives data to localhost:3000.

  1. //socket.html
  2. < script >
  3. let socket = new WebSocket('ws://localhost:3000');
  4. socket.onopen = function () {
  5. socket.send('I love you'); //Send data to the server
  6. }
  7. socket.onmessage = function (e) {
  8. console.log(e.data); //Receive data returned by the server
  9. }
  10. </ script >
  1. // server.js
  2. let express = require ('express');
  3. let app = express ();
  4. let WebSocket = require ('ws'); //Remember to install ws
  5. let wss = new WebSocket.Server({port:3000});
  6. wss.on('connection',function(ws) {
  7. ws.on('message', function (data) {
  8. console.log(data);
  9. ws.send('I don't love you')
  10. });
  11. })

5. Node middleware proxy (two cross-domain)

Implementation principle: The same-origin policy is a standard that browsers need to follow, but if a server requests another server, it does not need to follow the same-origin policy. The proxy server needs to do the following steps:

  • Accept client requests.
  • Forwards the request to the server.
  • Get the server response data.
  • Forward the response to the client.

Let's take a look at an example: the local file index.html requests data from the target server http://localhost:4000 through the proxy server http://localhost:3000.

  1. // index.html(http://127.0.0.1:5500)
  2. < script src = "https://cdn.bootcss.com/jquery/3.3.1/jquery.min.js" > </ script >
  3. < script >
  4. $.ajax({
  5. url: 'http://localhost:3000',
  6. type: 'post',
  7. data: { name: 'xiamen', password: '123456' },
  8. contentType: 'application/json; charset = utf -8',
  9. success: function(result) {
  10. console.log(result) // {"title":"fontend","password":"123456"}
  11. },
  12. error: function(msg) {
  13. console.log(msg)
  14. }
  15. })
  16. </ script >
  1. // server1.js proxy server (http://localhost:3000)
  2. const http = require ('http')
  3. // Step 1: Accept client request
  4. const server = http .createServer((request, response) = > {
  5. // The proxy server interacts directly with the browser and needs to set the CORS header field
  6. response.writeHead(200, {
  7. 'Access-Control-Allow-Origin': '*',
  8. 'Access-Control-Allow-Methods': '*',
  9. 'Access-Control-Allow-Headers': 'Content-Type'
  10. })
  11. // Step 2: Forward the request to the server
  12. const proxyRequest = http
  13. .request(
  14. {
  15. host: '127.0.0.1',
  16. port: 4000,
  17. url: '/',
  18. method: request.method,
  19. headers: request.headers
  20. },
  21. serverResponse = > {
  22. // Step 3: Receive a response from the server
  23. var body = ''
  24. serverResponse.on('data', chunk = > {
  25. body += chunk
  26. })
  27. serverResponse.on('end', () = > {
  28. console.log('The data is ' + body)
  29. // Step 4: Forward the response result to the browser
  30. response.end(body)
  31. })
  32. }
  33. )
  34. .end()
  35. })
  36. server.listen(3000, () = > {
  37. console.log('The proxyServer is running at http://localhost:3000')
  38. })
  1. // server2.js(http://localhost:4000)
  2. const http = require ('http')
  3. const data = { title: 'fontend', password: '123456' }
  4. const server = http .createServer((request, response) = > {
  5. if ( request.url === '/' ) {
  6. response.end(JSON.stringify(data))
  7. }
  8. })
  9. server.listen(4000, () = > {
  10. console.log('The server is running at http://localhost:4000')
  11. })

The above code goes through two cross-domains. It is worth noting that the browser sends a request to the proxy server and also follows the same-origin policy. Finally, {"title":"fontend","password":"123456"} is printed in the index.html file.

6. nginx reverse proxy

The implementation principle is similar to that of the Node middleware proxy. You need to build a transit nginx server to forward requests.

Using nginx reverse proxy to achieve cross-domain is the simplest way to achieve cross-domain. You only need to modify the nginx configuration to solve the cross-domain problem. It supports all browsers and sessions, does not require any code modification, and does not affect server performance.

Implementation idea: Configure a proxy server (domain name is the same as domain1, but different port) through nginx as a jump server, and use reverse proxy to access the domain2 interface. You can also modify the domain information in the cookie to facilitate writing the current domain cookie and achieve cross-domain login.

Download nginx first, and then modify the nginx.conf in the nginx directory as follows:

  1. // proxy server
  2. server {
  3. listen 81;
  4. server_name www.domain1.com;
  5. location / {
  6. proxy_pass http://www.domain2.com:8080; #Reverse proxy
  7. proxy_cookie_domain www.domain2.com www.domain1.com; #Modify the domain name in the cookie
  8. index index.html index.htm;
  9. # When using webpack-dev-server and other middleware proxy interfaces to access nignx, there is no browser involved, so there is no homology restriction, and the following cross-domain configuration can be disabled
  10. add_header Access-Control-Allow-Origin http://www.domain1.com; #When the front end only crosses the domain without cookies, it can be *
  11. add_header Access-Control-Allow-Credentials true;
  12. }
  13. }

Finally, start nginx through the command line nginx -s reload:

  1. // index.html
  2. var xhr = new XMLHttpRequest();
  3. // Front-end switch: whether the browser reads and writes cookies
  4. xhr.withCredentials = true ;
  5. // Access the proxy server in nginx
  6. xhr.open('get', 'http://www.domain1.com:81/? user = admin ', true);
  7. xhr.send();
  1. // server.js
  2. var http = require ('http');
  3. var server = http .createServer();
  4. var qs = require ('querystring');
  5. server.on('request', function(req, res) {
  6. var params = qs .parse(req.url.substring(2));
  7. // Write cookies to the front desk
  8. res.writeHead(200, {
  9. 'Set-Cookie': ' l = a123456 ; Path = /; Domain = www .domain2.com; HttpOnly' // HttpOnly: scripts cannot read
  10. });
  11. res.write(JSON.stringify(params));
  12. res.end();
  13. });
  14. server.listen('8080');
  15. console.log('Server is running at port 8080...');

7. window.name + iframe

The uniqueness of the window.name property: the name value persists after loading different pages (even different domain names), and can support very long name values ​​(2MB).

a.html and b.html are in the same domain, both are http://localhost:3000; and c.html is http://localhost:4000.

  1. // a.html(http://localhost:3000/b.html)
  2. < iframe src = "http://localhost:4000/c.html" frameborder = "0" onload = "load()" id = "iframe" > </ iframe >
  3. < script >
  4. let first = true
  5. // The onload event will be triggered twice, the first time loading the cross-domain page and saving the data in window.name
  6. function load() {
  7. if(first){
  8. // After the first onload (cross-domain page) succeeds, switch to the same-domain proxy page
  9. let iframe = document .getElementById('iframe');
  10. iframe.src = 'http://localhost:3000/b.html' ;
  11. first = false ;
  12. }else{
  13. // After the second onload (b.html page in the same domain) succeeds, read the data in window.name in the same domain
  14. console.log(iframe.contentWindow.name);
  15. }
  16. }
  17. </ script >

b.html is an intermediate proxy page, which is in the same domain as a.html and has empty content.

  1. // c.html(http://localhost:4000/c.html)
  2. < script >
  3. window.name = 'I don't love you'
  4. </ script >

Summary: By transferring the src attribute of the iframe from the external domain to the local domain, the cross-domain data is transferred from the external domain to the local domain by the window.name of the iframe. This cleverly bypasses the cross-domain access restrictions of the browser, but at the same time it is a safe operation.

8. location.hash + iframe

Implementation principle: a.html wants to communicate with c.html across domains through the intermediate page b.html. The three pages use the location.hash of iframe to pass values ​​between different domains, and directly access js to communicate between the same domains.

Specific implementation steps: At first, a.html passes a hash value to c.html, and then c.html passes the hash value to b.html after receiving the hash value, and finally b.html puts the result into the hash value of a.html. Similarly, a.html and b.html are in the same domain, both are http://localhost:3000; while c.html is http://localhost:4000.

  1. // a.html
  2. < iframe src = "http://localhost:4000/c.html#iloveyou" > </ iframe >
  3. < script >
  4. window.onhashchange = function () { //Detect changes in hash
  5. console.log(location.hash);
  6. }
  7. </ script >
  1. // b.html
  2. < script >
  3. window.parent.parent.location.hash = location.hash
  4. //b.html puts the result into the hash value of a.html, b.html can access the a.html page through parent.parent
  5. </ script >
  1. // c.html
  2. console.log(location.hash);
  3. let iframe = document .createElement('iframe');
  4. iframe.src = 'http://localhost:3000/b.html#idontloveyou' ;
  5. document.body.appendChild(iframe);

9. document.domain + iframe

This method can only be used when the second-level domain names are the same, for example, a.test.com and b.test.com are suitable for this method. You only need to add document.domain = 'test.com' to the page to indicate that the second-level domain names are the same to achieve cross-domain.

Implementation principle: Both pages use js to force document.domain to be the basic primary domain, thus achieving the same domain.

Let's look at an example: page a.zf1.cn:3000/a.html gets the value of a in page b.zf1.cn:3000/b.html.

  1. // a.html
  2. < body >
  3. helloa
  4. < iframe src = "http://b.zf1.cn:3000/b.html" frameborder = "0" onload = "load()" id = "frame" > </ iframe >
  5. < script >
  6. document.domain = 'zf1.cn'
  7. function load() {
  8. console.log(frame.contentWindow.a);
  9. }
  10. </ script >
  11. </ body >
  1. // b.html
  2. < body >
  3. hellob
  4. < script >
  5. document.domain = 'zf1.cn'
  6. var a = 100 ;
  7. </ script >
  8. </ body >

Conclusion

  • CORS supports all types of HTTP requests and is the fundamental solution for cross-domain HTTP requests.
  • JSONP only supports GET requests. The advantage of JSONP is that it supports old browsers and can request data from websites that do not support CORS.
  • Whether it is Node middleware proxy or nginx reverse proxy, the main purpose is to not restrict the server through the same-origin policy.
  • In daily work, the more commonly used cross-domain solutions are cors and nginx reverse proxy

Author: Langlixingzhou, a certified author of MOOC.com, a front-end enthusiast, determined to develop into a full-stack engineer, has been engaged in front-end for more than a year. His current technology stack includes Vue, ES6, and less. He is happy to share. In the past year, he has written fifty or sixty original technical articles, which have received many praises!

[51CTO original article, please indicate the original author and source as 51CTO.com when reprinting on partner sites]

<<:  From 2G to 5G, three changes in the discourse power of mobile Internet

>>:  How to set IP addresses for network monitoring projects with more than 254 points?

Recommend

Six advantages of single-pair Ethernet technology

As Single Pair Ethernet (SPE) gains more and more...

5G commercialization has arrived, how far are 6G and the "terahertz era"?

On October 31, 2019, the three major operators an...

RackNerd Los Angeles DC02 restock, VPS promotion starts at $9.89 per year

Earlier this month, we shared a summary of RackNe...

On-Prem vs. Colocation vs. Cloud vs. Edge: Pros and Cons

In today's digital economy, technology has be...

Google Fiber: 5 Gbps and 8 Gbps services coming early next year

Google Fiber will launch symmetrical 5Gbps and 8G...

How should NFV be deployed today?

Network Function Virtualization is maturing among...

5G Massive MIMO Says Goodbye to Power-hungry 5G Base Stations

The attacks on the large-scale construction of 5G...