From 987f4d5e84e5f129cea5460a5d9a8423e0e783f9 Mon Sep 17 00:00:00 2001 From: Andrei Nesterov Date: Sun, 6 Mar 2016 18:57:28 +0300 Subject: Add cow_http_hd:access_control_allow_methods/1 --- src/cow_http_hd.erl | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) (limited to 'src/cow_http_hd.erl') diff --git a/src/cow_http_hd.erl b/src/cow_http_hd.erl index 0baacab..80a2f8a 100644 --- a/src/cow_http_hd.erl +++ b/src/cow_http_hd.erl @@ -114,6 +114,7 @@ %% Building. -export([access_control_allow_credentials/0]). -export([access_control_allow_headers/1]). +-export([access_control_allow_methods/1]). -type etag() :: {weak | strong, binary()}. -export_type([etag/0]). @@ -3251,6 +3252,34 @@ horse_access_control_allow_headers() -> ). -endif. +%% @doc Build the Access-Control-Allow-Methods header. + +-spec access_control_allow_methods([binary()]) -> iodata(). +access_control_allow_methods(Methods) -> + join_token_list(nonempty(Methods)). + +-ifdef(TEST). +access_control_allow_methods_test_() -> + Tests = [ + {[<<"GET">>], <<"GET">>}, + {[<<"GET">>, <<"POST">>, <<"DELETE">>], <<"GET, POST, DELETE">>} + ], + [{lists:flatten(io_lib:format("~p", [V])), + fun() -> R = iolist_to_binary(access_control_allow_methods(V)) end} || {V, R} <- Tests]. + +access_control_allow_methods_error_test_() -> + Tests = [ + [] + ], + [{lists:flatten(io_lib:format("~p", [V])), + fun() -> {'EXIT', _} = (catch access_control_allow_methods(V)) end} || V <- Tests]. + +horse_access_control_allow_methods() -> + horse:repeat(200000, + access_control_allow_methods([<<"GET">>, <<"POST">>, <<"DELETE">>]) + ). +-endif. + %% Internal. %% Only return if the list is not empty. -- cgit v1.2.3