Revision fced01876b48e034b64d9dad6de14d1bdeba3cc0 authored by Daniel Cheng on 12 April 2018, 12:08:45 UTC, committed by Chromium WPT Sync on 12 April 2018, 12:08:45 UTC
Change-Id: I1e66f2cdc50be889b697b54401be6352607fa649 Reviewed-on: https://chromium-review.googlesource.com/1006528 Commit-Queue: Daniel Cheng <dcheng@chromium.org> Reviewed-by: Kent Tamura <tkent@chromium.org> Reviewed-by: Kentaro Hara <haraken@chromium.org> Reviewed-by: Yuki Shiino <yukishiino@chromium.org> Cr-Commit-Position: refs/heads/master@{#550152}
1 parent 19a42b9
access-control-basic-allow-non-cors-safelisted-method.htm
<!DOCTYPE html>
<html>
<head>
<title>Tests cross-origin request with non-CORS-safelisted method</title>
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/get-host-info.sub.js"></script>
</head>
<body>
<script type="text/javascript">
test(function() {
const xhr = new XMLHttpRequest;
xhr.open("PUT", get_host_info().HTTP_REMOTE_ORIGIN + "/xhr/resources/access-control-basic-put-allow.py", false);
xhr.setRequestHeader("Content-Type", "text/plain; charset=UTF-8");
xhr.send("PASS: PUT data received");
assert_equals(xhr.responseText, "PASS: Cross-domain access allowed.\nPASS: PUT data received");
}, "Allow PUT request");
</script>
</body>
</html>
Computing file changes ...