I have a site with a header set to position: fixed
. On one of my pages, I use scrollIntoView(true)
on an element. My problem is that when scrollIntoView
is called, the element gets positioned underneath the header. How would I fix this so that the element is shown just below the header?
I'm using the Bootstrap framework and the header is styled with navbar navbar-fixed-top
.
The scrollIntoView() method scrolls an element into the visible area of the browser window.
To use JavaScript scrollIntoView to do smooth scroll with offset, we can call scrollTo with an object that has the top and behavior properties. const element = document.
It's a bit hacky but here's a workaround.
var node = 'select your element'; var yourHeight = 'height of your fixed header'; // scroll to your element node.scrollIntoView(true); // now account for fixed header var scrolledY = window.scrollY; if(scrolledY){ window.scroll(0, scrolledY - yourHeight); }
Edit:
A modern workaround is to use the CSS scroll-margin-top
property in combination with the :target
selector. Described in detail: https://www.bram.us/2020/03/01/prevent-content-from-being-hidden-underneath-a-fixed-header-by-using-scroll-margin-top/
Edit: Although less compatible (no Edge + IE compatibility), scroll-margin-top
will also solve this, as mentioned in the answer from Arye Eidelman.
You can solve this with CSS, by applying a padding-top
and a negative margin-top
to the elements that you want to scroll to.
// For demo only, no JS needed for the solution document.querySelector('.scroll-to-working-inline').addEventListener('click', function() { document.querySelector('.working-inline').scrollIntoView(); }); document.querySelector('.scroll-to-working-block').addEventListener('click', function() { document.querySelector('.working-block').scrollIntoView(); }); document.querySelector('.scroll-to-broken').addEventListener('click', function() { document.querySelector('.broken').scrollIntoView(); });
/* Relevant styles */ .working-inline { padding-top: 60px; margin-top: -60px; } .working-block { padding-top: 60px; margin-top: -60px; } /* Allow scrolling to the top */ body { padding-top: 60px; } /* Only for the demo */ body { margin: 0; } header { position: fixed; top: 0; background-color: tomato; color: white; width: 100%; height: 60px; line-height: 60px; text-align: center; } [class^='working'], [class^='broken'] { font-size: 3rem; }
<header> scroll to... <button class="scroll-to-working-inline">working inline element</button> <button class="scroll-to-working-block">working block element</button> <button class="scroll-to-broken">broken element</button> </header> <main> <p>Sql daemon epoch all your base are belong to us packet system perl semaphore. Interpreter warez pragma kilo worm back door baz continue chown blob unix Dennis Ritchie stack mutex bar throw fopen man pages linux. Sql suitably small values bit infinite loop pwned rm -rf.</p> <a class="working-inline">Working inline</a> <p>Syn baz man pages unix vi crack leapfrog semaphore fail pwned afk null socket cd long leet emacs Donald Knuth bin grep todo pragma stdio.h January 1, 1970. Alloc gc system new finally sql stack trace syn mainframe cat machine code memory leak server salt flood tunnel in back door thread. Bytes fatal throw ctl-c Dennis Ritchie over clock eof tera perl regex.</p> <div class="working-block">Working block element</div> <p>Public injection class unix malloc error script kiddies packet less fail int I'm sorry Dave, I'm afraid I can't do that. Tarball memory leak double rsa pwned public all your base are belong to us. False bytes bang bar tarball semaphore warez cd port daemon exception mountain dew sql mainframe gcc ifdef chown private.</p> <div class="broken">Broken element</div> <p>Daemon bubble sort protected mutex overflow grep snarf crack warez I'm compiling bit if memory leak Starcraft nak script kiddies long it's a feature. Hello world public server James T. Kirk injection terminal wannabee race condition syn alloc. Gobble leapfrog finally bypass concurrently while irc gurfle do back door blob man pages sql over clock.</p> <p>Char hello world then man pages ascii long salt while char fatal do boolean tunnel in system else foo packet sniffer float terminal int default. Trojan horse ssh ifdef /dev/null chown cache error protocol afk todo rm -rf mainframe piggyback pwned regex xss warez Starcraft try catch stdio.h bubble sort. It's a feature I'm sorry Dave, I'm afraid I can't do that *.* port bypass ip.</p> <p>Stdio.h epoch mutex flood wannabee do race condition sql access exception. Bar pragma man pages dereference flush todo highjack while buffer bit nak big-endian syn xss salt for d00dz. Leslie Lamport linux server error hexadecimal snarf tunnel in rm -rf firewall then shell all your base are belong to us.</p> <p>Ascii gcc grep int flood kilo linux access mailbomb hash *.* fork semaphore frack else win bar ssh Leslie Lamport. Man pages strlen cache gnu segfault tarball race condition perl packet sniffer root cookie private chown d00dz January 1, 1970. Rsa public crack bit warez throw for void concurrently ip mutex.</p> <p>Char hello world then man pages ascii long salt while char fatal do boolean tunnel in system else foo packet sniffer float terminal int default. Trojan horse ssh ifdef /dev/null chown cache error protocol afk todo rm -rf mainframe piggyback pwned regex xss warez Starcraft try catch stdio.h bubble sort. It's a feature I'm sorry Dave, I'm afraid I can't do that *.* port bypass ip.</p> <p>Stdio.h epoch mutex flood wannabee do race condition sql access exception. Bar pragma man pages dereference flush todo highjack while buffer bit nak big-endian syn xss salt for d00dz. Leslie Lamport linux server error hexadecimal snarf tunnel in rm -rf firewall then shell all your base are belong to us.</p> <p>Ascii gcc grep int flood kilo linux access mailbomb hash *.* fork semaphore frack else win bar ssh Leslie Lamport. Man pages strlen cache gnu segfault tarball race condition perl packet sniffer root cookie private chown d00dz January 1, 1970. Rsa public crack bit warez throw for void concurrently ip mutex.</p> <p>Char hello world then man pages ascii long salt while char fatal do boolean tunnel in system else foo packet sniffer float terminal int default. Trojan horse ssh ifdef /dev/null chown cache error protocol afk todo rm -rf mainframe piggyback pwned regex xss warez Starcraft try catch stdio.h bubble sort. It's a feature I'm sorry Dave, I'm afraid I can't do that *.* port bypass ip.</p> <p>Stdio.h epoch mutex flood wannabee do race condition sql access exception. Bar pragma man pages dereference flush todo highjack while buffer bit nak big-endian syn xss salt for d00dz. Leslie Lamport linux server error hexadecimal snarf tunnel in rm -rf firewall then shell all your base are belong to us.</p> <p>Ascii gcc grep int flood kilo linux access mailbomb hash *.* fork semaphore frack else win bar ssh Leslie Lamport. Man pages strlen cache gnu segfault tarball race condition perl packet sniffer root cookie private chown d00dz January 1, 1970. Rsa public crack bit warez throw for void concurrently ip mutex.</p> </main>
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With