mirror of
https://github.com/bigskysoftware/htmx.git
synced 2025-09-28 21:41:40 +00:00
Merge remote-tracking branch 'origin/master'
This commit is contained in:
commit
667e07f432
@ -2,23 +2,25 @@
|
||||
title = "hx-headers"
|
||||
+++
|
||||
|
||||
The `hx-headers` attribute allows you to add to the headers that will be submitted with an AJAX request.
|
||||
The `hx-headers` attribute allows you to add to the headers that will be submitted with an AJAX request.
|
||||
|
||||
By default, the value of this attribute is a list of name-expression values in [JSON (JavaScript Object Notation)](https://www.json.org/json-en.html)
|
||||
By default, the value of this attribute is a list of name-expression values in [JSON (JavaScript Object Notation)](https://www.json.org/json-en.html)
|
||||
format.
|
||||
|
||||
If you wish for `hx-headers` to *evaluate* the values given, you can prefix the values with `javascript:` or `js:`.
|
||||
|
||||
```html
|
||||
<div hx-get="/example" hx-headers='{"myHeader": "My Value"}'>Get Some HTML, Including A Custom Header in the Request</div>
|
||||
|
||||
<div hx-get="/example" hx-headers='js:{myVal: calculateValue()}'>Get Some HTML, Including a Dynamic Custom Header from Javascript in the Request</div>
|
||||
```
|
||||
|
||||
## Security Considerations
|
||||
|
||||
* By default, the value of `hx-headers` must be valid [JSON](https://developer.mozilla.org/en-US/docs/Glossary/JSON).
|
||||
* By default, the value of `hx-headers` must be valid [JSON](https://developer.mozilla.org/en-US/docs/Glossary/JSON).
|
||||
It is **not** dynamically computed. If you use the `javascript:` prefix, be aware that you are introducing
|
||||
security considerations, especially when dealing with user input such as query strings or user-generated content,
|
||||
which could introduce a [Cross-Site Scripting (XSS)](https://owasp.org/www-community/attacks/xss/) vulnerability.
|
||||
security considerations, especially when dealing with user input such as query strings or user-generated content,
|
||||
which could introduce a [Cross-Site Scripting (XSS)](https://owasp.org/www-community/attacks/xss/) vulnerability.
|
||||
|
||||
## Notes
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user