-
-
Notifications
You must be signed in to change notification settings - Fork 82
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Should we use less strict uri parsing? #19
Comments
Perhaps add either a |
To what? There are many functions that take uris, and it will be a pain to add an extra parameter to all of them...
There are many ways to escape a URI depending on which piece of the URI you're talking about.
lua-http uses lpeg_patterns.uri for uri parsing. I'm actually tempted to close this issue. I think being strict about URIs is probably the better path here. Various encodings and pieces of software rely on invalid uri characters to work well. e.g.
The biggest exception seems to be browsers, where anything starting with a scheme seems to get thrown through a uri escaping process. That hasn't been great for everyone either (see https://bugzilla.mozilla.org/show_bug.cgi?id=473822 ). I originally created this issue when I was working with postgrest's foreign entitys syntax and wanted to copy/paste from docs to lua-http; but now I don't think it's worth it. |
Another link: https://tools.ietf.org/html/draft-ruby-url-problem-01 |
At the moment url parsing is strict: it doesn't allow forbidden characters like
{
.Should things like
request.new_from_uri
normalise to the encoded form?References
The text was updated successfully, but these errors were encountered: