android_webview: explicitly use gcc for target binaries.
[chromium-blink-merge.git] / chrome / test / data / referrer_policy / referrer-policy-start.html
blob5f5c457b69c4ba18b8a9ca9c96d4ddad692460af
1 <!DOCTYPE html>
2 <html>
3 <head>
4 <script>
5 function run() {
6 var kPolicy = 1;
7 var kPort = 2;
8 var kSslPort = 3;
9 var kRedirect = 4;
10 var kLink = 5;
11 var kTarget = 6;
12 var re = new RegExp("policy=(.*)&port=(.*)&ssl_port=(.*)&redirect=(.*)&" +
13 "link=(.*)&target=(.*)");
14 var matches = re.exec(document.location.search);
16 if (matches == null) {
17 document.body.innerText = "Could not parse parameters!";
18 return;
21 var meta = document.createElement("meta");
22 meta.name = "referrer";
23 meta.content = matches[kPolicy];
24 document.head.appendChild(meta);
26 var destination;
28 if (matches[kRedirect] == "false") {
29 destination = "http://127.0.0.1:" + matches[kPort] +
30 "/files/referrer-policy-log.html";
31 } else if (matches[kRedirect] == "http") {
32 destination = "http://127.0.0.1:" + matches[kPort] +
33 "/server-redirect?http://127.0.0.1:" + matches[kPort] +
34 "/files/referrer-policy-log.html";
35 } else if (matches[kRedirect] == "echoheader") {
36 destination = "http://127.0.0.1:" + matches[kPort] + "/echoheader?Referer";
37 } else {
38 destination = "https://127.0.0.1:" + matches[kSslPort] +
39 "/server-redirect?http://127.0.0.1:" + matches[kPort] +
40 "/files/referrer-policy-log.html";
43 if (matches[kLink] == "true") {
44 var link = document.createElement("a");
45 link.innerText = "link";
46 link.target = matches[kTarget];
47 link.href = destination;
48 document.body.appendChild(link);
49 } else {
50 document.location = destination;
53 </script>
54 </head>
55 <body onload="run()">
56 </body>
57 </html>