Skip to content

Commit

Permalink
Revert to casing to lowercase-kebab
Browse files Browse the repository at this point in the history
  • Loading branch information
TRowbotham committed May 12, 2020
1 parent 9a21959 commit e076612
Showing 1 changed file with 58 additions and 58 deletions.
116 changes: 58 additions & 58 deletions url.bs
Original file line number Diff line number Diff line change
Expand Up @@ -93,16 +93,16 @@ valid input. User agents, especially conformance checkers, are encouraged to rep
<th>Fatal
<tbody>
<tr>
<td><dfn>unexpected-C0-control-or-space</dfn>
<td><dfn>unexpected-c0-control-or-space</dfn>
<td><p>The input to the URL parser contains leading or trailing <a>C0 control or space</a> code
points. The URL parser subsequently strips any matching code points.
<p class=example id=example-unexpected-C0-control-or-space>" https://example.org "
<p class=example id=example-unexpected-c0-control-or-space>" https://example.org "
<td>
<tr>
<td><dfn>unexpected-ASCII-tab-or-newline</dfn>
<td><dfn>unexpected-ascii-tab-or-newline</dfn>
<td><p>The input to the URL parser contains <a>ASCII tab or newline</a> code points. The URL
parser subsequently strips any matching code points.
<p class=example id=example-unexpected-ASCII-tab-or-newline>"ht\ttps://example.org"
<p class=example id=example-unexpected-ascii-tab-or-newline>"ht\ttps://example.org"
<td>
<tr>
<td><dfn>invalid-scheme-start-code-point</dfn>
Expand All @@ -122,11 +122,11 @@ valid input. User agents, especially conformance checkers, are encouraged to rep
<p class=example id=example-invalid-scheme>"^_^://example.org"<br>"https//example.org"
<td>
<tr>
<td><dfn>missing-scheme-non-relative-URL</dfn>
<td><dfn>missing-scheme-non-relative-url</dfn>
<td><p>The input is missing a <a>scheme</a>, because it does not begin with an
<a>ASCII alpha</a>, and either no <a>base URL</a> was provided or the <a>base URL</a> cannot be
used as a <a>base URL</a> because its <a>cannot-be-a-base-URL flag</a> is set.
<div class=example id=example-missing-scheme-non-relative-URL>
<div class=example id=example-missing-scheme-non-relative-url>
<p>Input's <a>scheme</a> is missing and no <a>base URL</a> is given:
<pre><code class=lang-javascript>
let url = new URL("💩");
Expand All @@ -138,10 +138,10 @@ valid input. User agents, especially conformance checkers, are encouraged to rep
</code></pre>
<td>
<tr>
<td><dfn>relative-URL-missing-beginning-solidus</dfn>
<td><dfn>relative-url-missing-beginning-solidus</dfn>
<td><p>The input is a <a>relative-URL String</a> that does not begin with a U+002F (/) code
point.
<div class=example id=example-relative-URL-missing-beginning-solidus>
<div class=example id=example-relative-url-missing-beginning-solidus>
<pre><code class="lang-javascript">
let url = new URL("foo.html", "https://example.org/");
</code></pre>
Expand Down Expand Up @@ -241,20 +241,20 @@ valid input. User agents, especially conformance checkers, are encouraged to rep
<p class=example id=example-unescaped-percent-sign>"https://example.org/%💩"
<td>
<tr>
<td><dfn>unclosed-IPv6-address</dfn>
<td><dfn>unclosed-ipv6-address</dfn>
<td><p>An IPv6 address is missing the closing U+005D (]) code point.
<p class=example id=example-unclosed-IPv6-address>"https://[::1"
<p class=example id=example-unclosed-ipv6-address>"https://[::1"
<td>
<tr>
<td><dfn>domain-to-ASCII-failure</dfn>
<td><dfn>domain-to-ascii-failure</dfn>
<td><p>The result of <a abstract-op lt=ToASCII>Unicode toASCII</a> records an error while
processing the input domain.
<p class=note>[[!UTS46]] conformance does not require the reporting of precise errors, only that
an error has occurred. If the [[!UTS46]] implementation reports precise error codes, user agents
are encouraged pass those codes along.
<td>
<tr>
<td><dfn>domain-to-ASCII-empty-domain-failure</dfn>
<td><dfn>domain-to-ascii-empty-domain-failure</dfn>
<td><p>The result of <a abstract-op lt=ToASCII>Unicode toASCII</a> returns an empty string. This
can be caused by a number of things, such as:
<ul>
Expand All @@ -276,50 +276,50 @@ valid input. User agents, especially conformance checkers, are encouraged to rep
<p class=example id=example-unexpected-non-decimal-number>"https://127.0.0x0.1"
<td>
<tr>
<td><dfn>IPv4-part-out-of-range</dfn>
<td><dfn>ipv4-part-out-of-range</dfn>
<td><p>An IPv4 part exceeds 255. This is only fatal if the last part exceeds 255.
<p class=example id=example-IPv4-part-out-of-range>"https://255.255.4000.1"
<p class=example id=example-ipv4-part-out-of-range>"https://255.255.4000.1"
<td>
<tr>
<td><dfn>invalid-compressed-IPv6-address</dfn>
<td><dfn>invalid-compressed-ipv6-address</dfn>
<td><p>An IPv6 address begins with improper compression.
<p class=example id=example-invalid-compressed-IPv6-address>"https://[:1]"
<p class=example id=example-invalid-compressed-ipv6-address>"https://[:1]"
<td>
<tr>
<td><dfn>IPv6-too-many-pieces</dfn>
<td><dfn>ipv6-too-many-pieces</dfn>
<td><p>An IPv6 address contains more than 8 pieces.
<p class=example id=example-IPv6-too-many-pieces>"https://[1:2:3:4:5:6:7:8:9]"
<p class=example id=example-ipv6-too-many-pieces>"https://[1:2:3:4:5:6:7:8:9]"
<td>
<tr>
<td><dfn>IPv6-multiple-compression</dfn>
<td><dfn>ipv6-multiple-compression</dfn>
<td><p>An IPv6 address is compressed in more than one spot.
<p class=example id=example-IPv6-multiple-compression>"https://[1::1::1]"
<p class=example id=example-ipv6-multiple-compression>"https://[1::1::1]"
<td>
<tr>
<td><dfn>IPv4-in-IPv6-empty-part</dfn>
<td><dfn>ipv4-in-ipv6-empty-part</dfn>
<td><p>An IPv6 address that contains an IPv4 address has an empty part in the IPv4 address.
<p class=example id=example-IPv4-in-IPv6-empty-part>"https://[ffff::.0.0.1]"
<p class=example id=example-ipv4-in-ipv6-empty-part>"https://[ffff::.0.0.1]"
<td>
<tr>
<td><dfn>IPv4-in-IPv6-too-many-pieces</dfn>
<td><dfn>ipv4-in-ipv6-too-many-pieces</dfn>
<td><p>An IPv6 address contains an IPv4 address and the IPv6 address has more than 6 pieces.
<p class=example id=example-IPv4-in-IPv6-too-many-pieces>"https://[1:1:1:1:1:1:1:127.0.0.1]"
<p class=example id=example-ipv4-in-ipv6-too-many-pieces>"https://[1:1:1:1:1:1:1:127.0.0.1]"
<td>
<tr>
<td><dfn>IPv6-unexpected-EOF</dfn>
<td><dfn>ipv6-unexpected-eof</dfn>
<td><p>An IPv6 address unexpectedly ends.
<p class=example id=example-IPv6-unexpected-EOF>"https://[1:2:3:]"
<p class=example id=example-ipv6-unexpected-eof>"https://[1:2:3:]"
<td>
<tr>
<td><dfn>IPv6-unexpected-delimiter</dfn>
<td><dfn>ipv6-unexpected-delimiter</dfn>
<td><p>An IPv6 address contains a code point that is not an <a>ASCII hex digit</a> and not a
U+003A (:) code point.
<p class=example id=example-IPv6-unexpected-delimiter>"https://[1:2:3!:4]"
<p class=example id=example-ipv6-unexpected-delimiter>"https://[1:2:3!:4]"
<td>
<tr>
<td><dfn>IPv6-too-few-pieces</dfn>
<td><dfn>ipv6-too-few-pieces</dfn>
<td><p>An uncompressed IPv6 address contains fewer than 8 pieces.
<p class=example id=example-IPv6-too-few-pieces>"https://[1:2:3]"
<p class=example id=example-ipv6-too-few-pieces>"https://[1:2:3]"
<td>
<tr>
<td><dfn>opaque-host-forbidden-code-point</dfn>
Expand All @@ -328,30 +328,30 @@ valid input. User agents, especially conformance checkers, are encouraged to rep
<p class=example id=example-opaque-host-forbidden-code-point>"foo://exa[mple.org"
<td>
<tr>
<td><dfn>IPv4-in-IPv6-too-many-parts</dfn>
<td><dfn>ipv4-in-ipv6-too-many-parts</dfn>
<td><p>An IPv6 address contains an IPv4 address and the IPv4 address has more than 4 parts.
<p class=example id=example-IPv4-in-IPv6-too-many-parts>"https://[ffff::127.0.0.1.2]"
<p class=example id=example-ipv4-in-ipv6-too-many-parts>"https://[ffff::127.0.0.1.2]"
<td>
<tr>
<td><dfn>IPv4-in-IPv6-unexpected-code-point</dfn>
<td><dfn>ipv4-in-ipv6-unexpected-code-point</dfn>
<td><p>An IPv6 address contains an IPv4 address whose parts contain code points other than
<a>ASCII digits</a> or is an empty string.
<p class=example id=example-IPv4-in-IPv6-unexpected-code-point>"https://[ffff::127.0.xyz.1]"
<p class=example id=example-ipv4-in-ipv6-unexpected-code-point>"https://[ffff::127.0.xyz.1]"
<td>
<tr>
<td><dfn>IPv4-in-IPv6-invalid-first-part</dfn>
<td><dfn>ipv4-in-ipv6-invalid-first-part</dfn>
<td><p>The first part of an IPv4 address that is contained within an IPv6 address is 0.
<p class=example id=example-IPv4-in-IPv6-invalid-first-part>"https://[ffff::0.0.0.1]"
<p class=example id=example-ipv4-in-ipv6-invalid-first-part>"https://[ffff::0.0.0.1]"
<td>
<tr>
<td><dfn>IPv4-in-IPv6-part-out-of-range</dfn>
<td><dfn>ipv4-in-ipv6-part-out-of-range</dfn>
<td><p>An IPv4 address contained within an IPv6 address contains a part that exceeds 255.
<p class=example id=example-IPv4-in-IPv6-part-out-of-range>"https://[ffff::127.0.0.4000]"
<p class=example id=example-ipv4-in-ipv6-part-out-of-range>"https://[ffff::127.0.0.4000]"
<td>
<tr>
<td><dfn>IPv4-in-IPv6-too-few-parts</dfn>
<td><dfn>ipv4-in-ipv6-too-few-parts</dfn>
<td><p>An IPv4 address contained within an IPv6 address does not contain exactly 4 parts.
<p class=example id=example-IPv4-in-IPv6-too-few-parts>"https://[ffff::127.0.0]"
<p class=example id=example-ipv4-in-ipv6-too-few-parts>"https://[ffff::127.0.0]"
<td>
</table>

Expand Down Expand Up @@ -719,10 +719,10 @@ decisions made, i.e. whether to use the <a>same site</a> or <a>schemelessly same
<i>CheckJoiners</i> set to true, <i>Transitional_Processing</i> set to false,
and <i>VerifyDnsLength</i> set to <var>beStrict</var>.

<li><p>If <var>result</var> is a failure value, <a>domain-to-ASCII-failure</a>
<li><p>If <var>result</var> is a failure value, <a>domain-to-ascii-failure</a>
<a>validation error</a> return failure.

<li><p>If <var>result</var> is the empty string, <a>domain-to-ASCII-empty-domain-failure</a>
<li><p>If <var>result</var> is the empty string, <a>domain-to-ascii-empty-domain-failure</a>
<a>validation error</a> return failure.

<li><p>Return <var>result</var>.
Expand Down Expand Up @@ -808,7 +808,7 @@ string <var>input</var> with an optional boolean <var>isNotSpecial</var>, and th
<p>If <var>input</var> starts with U+005B ([), then:

<ol>
<li><p>If <var>input</var> does not end with U+005D (]), <a>unclosed-IPv6-address</a>
<li><p>If <var>input</var> does not end with U+005D (]), <a>unclosed-ipv6-address</a>
<a>validation error</a>, return failure.

<li><p>Return the result of <a lt="IPv6 parser">IPv6 parsing</a> <var>input</var> with its
Expand All @@ -831,7 +831,7 @@ string <var>input</var> with an optional boolean <var>isNotSpecial</var>, and th
<li><p>Let <var>asciiDomain</var> be the result of running
<a>domain to ASCII</a> on <var>domain</var>.

<li><p>If <var>asciiDomain</var> is failure, <a>domain-to-ASCII-failure</a>
<li><p>If <var>asciiDomain</var> is failure, <a>domain-to-ascii-failure</a>
<a>validation error</a>, return failure.

<li><p>If <var>asciiDomain</var> contains a <a>forbidden host code point</a>,
Expand Down Expand Up @@ -906,15 +906,15 @@ these steps:
treated as an IPv4 address (or failure). And therefore error reporting resumes.
</li>

<li><p>If any item in <var>numbers</var> is greater than 255, <a>IPv4-part-out-of-range</a>
<li><p>If any item in <var>numbers</var> is greater than 255, <a>ipv4-part-out-of-range</a>
<a>validation error</a>.

<li><p>If any but the last <a for=list>item</a> in <var>numbers</var> is greater than 255, then
return failure.

<li><p>If the last <a for=list>item</a> in <var>numbers</var> is greater than or equal to
256<sup>(5 &minus; <var>numbers</var>'s <a for=list>size</a>)</sup>,
<a>IPv4-part-out-of-range</a> <a>validation error</a>, return failure.
<a>ipv4-part-out-of-range</a> <a>validation error</a>, return failure.

<li><p>Let <var>ipv4</var> be the last <a for=list>item</a> in <var>numbers</var>.

Expand Down Expand Up @@ -1002,7 +1002,7 @@ then runs these steps:

<ol>
<li><p>If <a>remaining</a> does not start with U+003A (:),
<a>invalid-compressed-IPv6-address</a> <a>validation error</a>, return failure.
<a>invalid-compressed-ipv6-address</a> <a>validation error</a>, return failure.

<li><p>Increase <var>pointer</var> by 2.

Expand All @@ -1014,14 +1014,14 @@ then runs these steps:
<p>While <a>c</a> is not the <a>EOF code point</a>:

<ol>
<li><p>If <var>pieceIndex</var> is 8, <a>IPv6-too-many-pieces</a>
<li><p>If <var>pieceIndex</var> is 8, <a>ipv6-too-many-pieces</a>
<a>validation error</a>, return failure.

<li>
<p>If <a>c</a> is U+003A (:), then:

<ol>
<li><p>If <var>compress</var> is non-null, <a>IPv6-multiple-compression</a>
<li><p>If <var>compress</var> is non-null, <a>ipv6-multiple-compression</a>
<a>validation error</a>, return failure.

<li>Increase <var>pointer</var> and <var>pieceIndex</var> by 1, set <var>compress</var> to
Expand All @@ -1038,12 +1038,12 @@ then runs these steps:
<p>If <a>c</a> is U+002E (.), then:

<ol>
<li><p>If <var>length</var> is 0, <a>IPv4-in-IPv6-empty-part</a> <a>validation error</a>,
<li><p>If <var>length</var> is 0, <a>ipv4-in-ipv6-empty-part</a> <a>validation error</a>,
return failure.

<li><p>Decrease <var>pointer</var> by <var>length</var>.

<li><p>If <var>pieceIndex</var> is greater than 6, <a>IPv4-in-IPv6-too-many-pieces</a>
<li><p>If <var>pieceIndex</var> is greater than 6, <a>ipv4-in-ipv6-too-many-pieces</a>
<a>validation error</a>, return failure.

<li><p>Let <var>numbersSeen</var> be 0.
Expand All @@ -1061,10 +1061,10 @@ then runs these steps:
<li><p>If <a>c</a> is a U+002E (.) and <var>numbersSeen</var> is less than 4, then increase
<var>pointer</var> by 1.

<li>Otherwise, <a>IPv4-in-IPv6-too-many-parts</a> <a>validation error</a>, return failure.
<li>Otherwise, <a>ipv4-in-ipv6-too-many-parts</a> <a>validation error</a>, return failure.
</ol>

<li><p>If <a>c</a> is not an <a>ASCII digit</a>, <a>IPv4-in-IPv6-unexpected-code-point</a>
<li><p>If <a>c</a> is not an <a>ASCII digit</a>, <a>ipv4-in-ipv6-unexpected-code-point</a>
<a>validation error</a>, return failure.
<!-- prevent the empty string -->

Expand All @@ -1077,13 +1077,13 @@ then runs these steps:
<li>
<p>If <var>ipv4Piece</var> is null, then set <var>ipv4Piece</var> to <var>number</var>.

<p>Otherwise, if <var>ipv4Piece</var> is 0, <a>IPv4-in-IPv6-invalid-first-part</a>
<p>Otherwise, if <var>ipv4Piece</var> is 0, <a>ipv4-in-ipv6-invalid-first-part</a>
<a>validation error</a>, return failure.

<p>Otherwise, set <var>ipv4Piece</var> to <var>ipv4Piece</var> &times; 10 +
<var>number</var>.

<li><p>If <var>ipv4Piece</var> is greater than 255, <a>IPv4-in-IPv6-part-out-of-range</a>
<li><p>If <var>ipv4Piece</var> is greater than 255, <a>ipv4-in-ipv6-part-out-of-range</a>
<a>validation error</a>, return failure.

<li><p>Increase <var>pointer</var> by 1.
Expand All @@ -1097,7 +1097,7 @@ then runs these steps:
<li><p>If <var>numbersSeen</var> is 2 or 4, then increase <var>pieceIndex</var> by 1.
</ol>

<li><p>If <var>numbersSeen</var> is not 4, <a>IPv4-in-IPv6-too-few-parts</a>
<li><p>If <var>numbersSeen</var> is not 4, <a>ipv4-in-ipv6-too-few-parts</a>
<a>validation error</a>, return failure.

<li><p><a for=iteration>Break</a>.
Expand All @@ -1113,7 +1113,7 @@ then runs these steps:
<a>validation error</a>, return failure.
</ol>

<li><p>Otherwise, if <a>c</a> is not the <a>EOF code point</a>, <a>IPv6-unexpected-delimiter</a>
<li><p>Otherwise, if <a>c</a> is not the <a>EOF code point</a>, <a>ipv6-unexpected-delimiter</a>
<a>validation error</a>, return failure.

<li><p>Set <var>address</var>[<var>pieceIndex</var>] to <var>value</var>.
Expand All @@ -1136,7 +1136,7 @@ then runs these steps:
</ol>

<li><p>Otherwise, if <var>compress</var> is null and <var>pieceIndex</var> is not 8,
<a>IPv6-too-few-pieces</a> <a>validation error</a>, return failure.
<a>ipv6-too-few-pieces</a> <a>validation error</a>, return failure.

<li><p>Return <var>address</var>.
</ol>
Expand Down

0 comments on commit e076612

Please sign in to comment.