Home Web Front-end JS Tutorial Intercept global ajax request instance parsing through JS

Intercept global ajax request instance parsing through JS

Mar 28, 2017 pm 02:39 PM
ajax js intercept ask

Have you ever had the following needs: need to add a unified signature to all ajax requests, need to count the number of times a certain interface is requested, need to limit the method of http requests to get or post, need to analyze other people's network protocols, etc. So how? Think about it, if you can intercept all ajax requests, then the problem will become very simple!

Ajax-hook source code address: https://github.com/wendux/Ajax-hook

How to use

1. Introduce ajaxhook.js

1

<script src="wendu.ajaxhook.js"></script>

Copy after login

2. Intercept the required ajax callbacks or functions.

1

2

3

4

5

6

7

8

9

10

11

12

13

hookAjax({

//拦截回调

onreadystatechange:function(xhr){

console.log("onreadystatechange called: %O",xhr)

},

onload:function(xhr){

console.log("onload called: %O",xhr)

},

//拦截函数

open:function(arg){

console.log("open called: method:%s,url:%s,async:%s",arg[0],arg[1],arg[2])

}

})

Copy after login

ok, let’s use the get method of jQuery (v3.1) to test:

1

2

3

4

// get current page source code

$.get().done(function(d){

console.log(d.substr(0,30)+"...")

})

Copy after login

Result:

1

2

3

4

5

> open called: method:GET,url:http://localhost:63342/Ajax-hook/demo.html,async:true

> onload called: XMLHttpRequest

> <!DOCTYPE html>

<html>

<head l...

Copy after login

The interception was successful! We can also see that jQuery3.1 has abandoned onreadystatechange and used onload instead.

API

##hookAjax(ob)

1.ob, type is object, key is want Interception callback or function, value is our interception function.

2. Return value: original XMLHttpRequest. If you have a write request and don't want to be intercepted, you can use new this.

unHookAjax()

1. Load interception; after uninstalling, the interception will be invalid.

Change ajax behavior

Intercept all ajax requests, detect the request method, if it is "GET", interrupt the request and give a prompt

1

2

3

4

5

6

7

8

hookAjax({

open:function(arg){

if(arg[0]=="GET"){

console.log("Request was aborted! method must be post! ")

return true;

}

}

})

Copy after login

Intercept all ajax requests, request Unifiedly add timestamp

1

2

3

4

5

hookAjax({

open:function(arg){

arg[1]+="?timestamp="+Date.now();

}

})

Copy after login

Modify the data returned by the request "responseText"

1

2

3

4

5

6

hookAjax({

onload:function(xhr){

//请求到的数据首部添加"hook!"

xhr.responseText="hook!"+xhr.responseText;

}

})

Copy after login

Result:

1

2

3

hook!<!DOCTYPE html>

<html>

<h...

Copy after login

With these examples, I believe that the requirements mentioned at the beginning can be easily realized . Finally, test unHook

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

hookAjax({

onreadystatechange:function(xhr){

console.log("onreadystatechange called: %O",xhr)

//return true

},

onload:function(xhr){

console.log("onload called")

xhr.responseText="hook"+xhr.responseText;

//return true;

},

open:function(arg){

console.log("open called: method:%s,url:%s,async:%s",arg[0],arg[1],arg[2])

arg[1]+="?hook_tag=1";

},

send:function(arg){

console.log("send called: %O",arg[0])

}

})

$.get().done(function(d){

console.log(d.substr(0,30)+"...")

//use original XMLHttpRequest

console.log("unhook")

unHookAjax()

$.get().done(function(d){

console.log(d.substr(0,10))

})

})

Copy after login


Output:

1

2

3

4

5

6

7

8

open called: method:GET,url:http://localhost:63342/Ajax-hook/demo.html,async:true

send called: null

onload called

hook<!DOCTYPE html>

<html>

<he...

unhook

<!DOCTYPE

Copy after login
Note

1. The return value of the interception function is a boolean, if it is true, then Will block ajax requests, the default is false, the request will not be blocked.


2. The parameters of all callback interception functions are the current XMLHttpRequest instance, such as onreadystatechange, onload; all interception functions of the ajax original method will pass the original parameters to the interception function in the form of an array. You This can be modified in the interception function.


The above is the JS interception global ajax request example analysis introduced by the editor. I hope it will be helpful to everyone. If you have any questions, please leave me a message and the editor will reply to you in time. of.

Related articles:

Detailed explanation of interception examples of interceptors for ajax requests

Using Mock.js in Node.js server environment Tutorial on intercepting AJAX requests

How to check whether it is an ajax request through php

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Recommended: Excellent JS open source face detection and recognition project Recommended: Excellent JS open source face detection and recognition project Apr 03, 2024 am 11:55 AM

Face detection and recognition technology is already a relatively mature and widely used technology. Currently, the most widely used Internet application language is JS. Implementing face detection and recognition on the Web front-end has advantages and disadvantages compared to back-end face recognition. Advantages include reducing network interaction and real-time recognition, which greatly shortens user waiting time and improves user experience; disadvantages include: being limited by model size, the accuracy is also limited. How to use js to implement face detection on the web? In order to implement face recognition on the Web, you need to be familiar with related programming languages ​​and technologies, such as JavaScript, HTML, CSS, WebRTC, etc. At the same time, you also need to master relevant computer vision and artificial intelligence technologies. It is worth noting that due to the design of the Web side

PHP and Ajax: Building an autocomplete suggestion engine PHP and Ajax: Building an autocomplete suggestion engine Jun 02, 2024 pm 08:39 PM

Build an autocomplete suggestion engine using PHP and Ajax: Server-side script: handles Ajax requests and returns suggestions (autocomplete.php). Client script: Send Ajax request and display suggestions (autocomplete.js). Practical case: Include script in HTML page and specify search-input element identifier.

How to solve the 403 error encountered by jQuery AJAX request How to solve the 403 error encountered by jQuery AJAX request Feb 20, 2024 am 10:07 AM

Title: Methods and code examples to resolve 403 errors in jQuery AJAX requests. The 403 error refers to a request that the server prohibits access to a resource. This error usually occurs because the request lacks permissions or is rejected by the server. When making jQueryAJAX requests, you sometimes encounter this situation. This article will introduce how to solve this problem and provide code examples. Solution: Check permissions: First ensure that the requested URL address is correct and verify that you have sufficient permissions to access the resource.

How to solve jQuery AJAX request 403 error How to solve jQuery AJAX request 403 error Feb 19, 2024 pm 05:55 PM

jQuery is a popular JavaScript library used to simplify client-side development. AJAX is a technology that sends asynchronous requests and interacts with the server without reloading the entire web page. However, when using jQuery to make AJAX requests, you sometimes encounter 403 errors. 403 errors are usually server-denied access errors, possibly due to security policy or permission issues. In this article, we will discuss how to resolve jQueryAJAX request encountering 403 error

How to solve the problem of jQuery AJAX error 403? How to solve the problem of jQuery AJAX error 403? Feb 23, 2024 pm 04:27 PM

How to solve the problem of jQueryAJAX error 403? When developing web applications, jQuery is often used to send asynchronous requests. However, sometimes you may encounter error code 403 when using jQueryAJAX, indicating that access is forbidden by the server. This is usually caused by server-side security settings, but there are ways to work around it. This article will introduce how to solve the problem of jQueryAJAX error 403 and provide specific code examples. 1. to make

How to get variables from PHP method using Ajax? How to get variables from PHP method using Ajax? Mar 09, 2024 pm 05:36 PM

Using Ajax to obtain variables from PHP methods is a common scenario in web development. Through Ajax, the page can be dynamically obtained without refreshing the data. In this article, we will introduce how to use Ajax to get variables from PHP methods, and provide specific code examples. First, we need to write a PHP file to handle the Ajax request and return the required variables. Here is sample code for a simple PHP file getData.php:

The relationship between js and vue The relationship between js and vue Mar 11, 2024 pm 05:21 PM

The relationship between js and vue: 1. JS as the cornerstone of Web development; 2. The rise of Vue.js as a front-end framework; 3. The complementary relationship between JS and Vue; 4. The practical application of JS and Vue.

How to delete all strangers' messages in Kuaishou private messages? Can private messages from strangers be intercepted? How to delete all strangers' messages in Kuaishou private messages? Can private messages from strangers be intercepted? Mar 22, 2024 am 08:50 AM

Kuaishou is a popular short video social platform that allows users to easily connect with others. Over time, users' private messages may be filled with a large number of strangers' messages, which may affect the user's experience. So, how to delete private messages from strangers on Kuaishou? This article will introduce in detail how to delete private messages from strangers on the Kuaishou platform, and whether it is possible to intercept messages from strangers. 1. How to delete all strangers’ messages in Kuaishou private messages? 1. First, open Kuaishou APP and enter the personal center. 2. On the personal center page, find the &quot;Message&quot; option and click to enter. 3. On the message page, find the &quot;Private Message&quot; option and click to enter. 4. On the private message page, you can see different message categories. Find the &quot;Stranger Messages&quot; category and click

See all articles