- 04 Jun, 2018 1 commit
-
-
Harris Hancock authored
Occasionally servers processing HTTP requests will see URLs in the wild which have unescaped hash signs in path and query components. This change allows kj::Url to parse such URLs in the Url::HTTP_REQUEST and Url::HTTP_PROXY_REQUEST contexts.
-
- 15 May, 2018 1 commit
-
-
Harris Hancock authored
-
- 03 Apr, 2018 1 commit
-
-
Harris Hancock authored
Our query string encoding function (encodeWwwForm()) was already doing the right thing. I changed the comment in encodeUriPath() to clarify that it's intended to implement a URL class which stores its path in percent-decoded form, not either/or. I was wrong before.
-
- 02 Apr, 2018 3 commits
-
-
Harris Hancock authored
We'll need more hostname-related code changes in the future, but for now this will solve a Cloudflare customer's existing bug report.
-
Harris Hancock authored
-
Harris Hancock authored
This has the effect of making the authority, path, and fragment components each slightly more permissive in what they don't escape.
-
- 13 Mar, 2018 2 commits
-
-
Harris Hancock authored
-
Harris Hancock authored
The relative URL parser allowed certain hosts which the absolute parser correctly weeded out. This change copies two lines from the absolute parser over to the relative parser.
-
- 05 Feb, 2018 1 commit
-
-
Harris Hancock authored
The main motivation here is to make sure we don't %-escape incoming pluses, but rather interpret them as spaces.
-
- 01 Jun, 2017 2 commits
-
-
Kenton Varda authored
-
Kenton Varda authored
-