From 85f3208c34ef8774eeb0cc49576c82dd01b8d689 Mon Sep 17 00:00:00 2001 From: Andrei Nesterov Date: Sun, 6 Mar 2016 18:25:58 +0300 Subject: Add cow_http_hd:access_control_allow_headers/1 --- src/cow_http_hd.erl | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) diff --git a/src/cow_http_hd.erl b/src/cow_http_hd.erl index 6a7837b..0baacab 100644 --- a/src/cow_http_hd.erl +++ b/src/cow_http_hd.erl @@ -113,6 +113,7 @@ %% Building. -export([access_control_allow_credentials/0]). +-export([access_control_allow_headers/1]). -type etag() :: {weak | strong, binary()}. -export_type([etag/0]). @@ -3222,6 +3223,34 @@ parse_x_forwarded_for_error_test_() -> -spec access_control_allow_credentials() -> iodata(). access_control_allow_credentials() -> <<"true">>. +%% @doc Build the Access-Control-Allow-Headers header. + +-spec access_control_allow_headers([binary()]) -> iodata(). +access_control_allow_headers(Headers) -> + join_token_list(nonempty(Headers)). + +-ifdef(TEST). +access_control_allow_headers_test_() -> + Tests = [ + {[<<"accept">>], <<"accept">>}, + {[<<"accept">>, <<"authorization">>, <<"content-type">>], <<"accept, authorization, content-type">>} + ], + [{lists:flatten(io_lib:format("~p", [V])), + fun() -> R = iolist_to_binary(access_control_allow_headers(V)) end} || {V, R} <- Tests]. + +access_control_allow_headers_error_test_() -> + Tests = [ + [] + ], + [{lists:flatten(io_lib:format("~p", [V])), + fun() -> {'EXIT', _} = (catch access_control_allow_headers(V)) end} || V <- Tests]. + +horse_access_control_allow_headers() -> + horse:repeat(200000, + access_control_allow_headers([<<"accept">>, <<"authorization">>, <<"content-type">>]) + ). +-endif. + %% Internal. %% Only return if the list is not empty. -- cgit v1.2.3