Revision fced01876b48e034b64d9dad6de14d1bdeba3cc0 authored by Daniel Cheng on 12 April 2018, 12:08:45 UTC, committed by Chromium WPT Sync on 12 April 2018, 12:08:45 UTC
Change-Id: I1e66f2cdc50be889b697b54401be6352607fa649
Reviewed-on: https://chromium-review.googlesource.com/1006528
Commit-Queue: Daniel Cheng <dcheng@chromium.org>
Reviewed-by: Kent Tamura <tkent@chromium.org>
Reviewed-by: Kentaro Hara <haraken@chromium.org>
Reviewed-by: Yuki Shiino <yukishiino@chromium.org>
Cr-Commit-Position: refs/heads/master@{#550152}
1 parent 19a42b9
Raw File
access-control-basic-allow-non-cors-safelisted-method.htm
<!DOCTYPE html>
<html>
  <head>
    <title>Tests cross-origin request with non-CORS-safelisted method</title>
    <script src="/resources/testharness.js"></script>
    <script src="/resources/testharnessreport.js"></script>
    <script src="/common/get-host-info.sub.js"></script>
  </head>
  <body>
    <script type="text/javascript">
    test(function() {
      const xhr = new XMLHttpRequest;

      xhr.open("PUT", get_host_info().HTTP_REMOTE_ORIGIN + "/xhr/resources/access-control-basic-put-allow.py", false);

      xhr.setRequestHeader("Content-Type", "text/plain; charset=UTF-8");

      xhr.send("PASS: PUT data received");

      assert_equals(xhr.responseText, "PASS: Cross-domain access allowed.\nPASS: PUT data received");
    }, "Allow PUT request");
    </script>
  </body>
</html>
back to top