An extra security layer has been integrated against Cross-Site Scripting (XSS) attacks. It requires developers to specify dataType:”script” in the options of the $.ajax() and the $.get() methods. This prevents the possibility of an attack where the remote site delivers non-script content but furtherdecides to serve a malicious script. Since the jQuery.getScript() explicitly sets dataType:”script” , it is unaffected by this change.
$.ajax({ accepts: { mynewcustomtype: 'application/abc-some-custom-type' }, // how to deserialize a `mynewcustomtype` converters: { 'text mynewcustomtype': function(result) { // do things return newresult; } }, // Expect a `mynewcustomtype` back from server dataType: 'mynewcustomtype' }); 9. The Invalid Hash MarkjQuery 3 throws a syntax error if a selector string consists of nothing but a hash-mark, such as jQuery(“#”) and .find(“#”) . In the older version, $(“#”) returned an empty collection and .find(“#”) threw an error.
8. New Method To Escape StringThe new jQuery.escapeSelector() method allows you to escape any string or character that has a special meaning in a CSS selector. It is useful in cases where an ID or a class name characters with a special meaning in CSS, such as semicolon or dot.
For instance, if an element on the page has an id of “abc.xyz”, it can’t be selected with $(“abc.xyz”) because the selector is parsed as an element with id ‘abc’, which also has a class ‘xyz’. However, it can be selected with new method $(“#” + $.escapeSelector(“abc.xyz”)) .
7.本文前端(javascript)相关术语:javascript是什么意思 javascript下载 javascript权威指南 javascript基础教程 javascript 正则表达式 javascript设计模式 javascript高级程序设计 精通javascript javascript教程
主题: jQuery、CSS、CSS3、HTML、
分页:12
转载请注明
本文标题:What’s New In jQuery 3 : 17 Added Features & How To Use Them
本站链接:
分享请点击:
1.凡CodeSecTeam转载的文章,均出自其它媒体或其他官网介绍,目的在于传递更多的信息,并不代表本站赞同其观点和其真实性负责;
2.转载的文章仅代表原创作者观点,与本站无关。其原创性以及文中陈述文字和内容未经本站证实,本站对该文以及其中全部或者部分内容、文字的真实性、完整性、及时性,不作出任何保证或承若;
3.如本站转载稿涉及版权等问题,请作者及时联系本站,我们会及时处理。
登录后可拥有收藏文章、关注作者等权限...
注册 登录