- 26 Nov, 2018 1 commit
-
-
Kenton Varda authored
-
- 21 Nov, 2018 1 commit
-
-
Kenton Varda authored
This is to fix a complaint about Cloudflare Workers removing these components as requests pass through, which apparently breaks someone's funky URLs. Arguably "." and ".." processing presents a similar problems. But, allowing ".." to pass through is much more likely to lead to security problems. Browsers will generally process "." and ".." before sending a request (whereas they won't collapse double-slashes), so we're following their lead here.
-
- 26 Aug, 2018 1 commit
-
-
Kenton Varda authored
-
- 04 Jun, 2018 1 commit
-
-
Harris Hancock authored
Occasionally servers processing HTTP requests will see URLs in the wild which have unescaped hash signs in path and query components. This change allows kj::Url to parse such URLs in the Url::HTTP_REQUEST and Url::HTTP_PROXY_REQUEST contexts.
-
- 15 May, 2018 1 commit
-
-
Harris Hancock authored
-
- 02 Apr, 2018 3 commits
-
-
Harris Hancock authored
We'll need more hostname-related code changes in the future, but for now this will solve a Cloudflare customer's existing bug report.
-
Harris Hancock authored
-
Harris Hancock authored
This has the effect of making the authority, path, and fragment components each slightly more permissive in what they don't escape.
-
- 13 Mar, 2018 2 commits
-
-
Harris Hancock authored
-
Harris Hancock authored
The relative URL parser allowed certain hosts which the absolute parser correctly weeded out. This change copies two lines from the absolute parser over to the relative parser.
-
- 05 Feb, 2018 1 commit
-
-
Harris Hancock authored
The main motivation here is to make sure we don't %-escape incoming pluses, but rather interpret them as spaces.
-
- 02 Jun, 2017 1 commit
-
-
Kenton Varda authored
-
- 01 Jun, 2017 2 commits
-
-
Kenton Varda authored
-
Kenton Varda authored
-