aboutsummaryrefslogtreecommitdiff
path: root/src/bun.js/bindings/webcore/HTTPParsers.cpp
diff options
context:
space:
mode:
authorGravatar Ashcon Partovi <ashcon@partovi.net> 2023-08-03 15:31:55 -0700
committerGravatar GitHub <noreply@github.com> 2023-08-03 15:31:55 -0700
commit08cf0d562ae81b4fb30aa5e599ca76056582ac5f (patch)
tree8385fce04c9bf7b4138ae3c3545aa330f388f456 /src/bun.js/bindings/webcore/HTTPParsers.cpp
parent9a2c3dea88b22351ecc85126b0c225bfefea71bf (diff)
downloadbun-08cf0d562ae81b4fb30aa5e599ca76056582ac5f.tar.gz
bun-08cf0d562ae81b4fb30aa5e599ca76056582ac5f.tar.zst
bun-08cf0d562ae81b4fb30aa5e599ca76056582ac5f.zip
Bunch of fixes (#3516)
* Fix #3497 * Fix #3497 * Run prettier * Fix package.json * remove this too * yeah * Fix missing tests * Use native for utf-8-validate * Add module ID names to builtins * Defer evaluation of ESM & CJS modules until link time * Use builtin name for exports in plugins * Add module IDs to builtins * Update JSC build with new flag * WebKit upgrade fixes * Update WebKit * prettier * Upgrade WebKit * bump * Update once again * Add visitAdditionalChildren, remove .fill() usage * Update process.test.js * Update fs.test.ts --------- Co-authored-by: dave caruso <me@paperdave.net> Co-authored-by: Jarred Sumner <709451+Jarred-Sumner@users.noreply.github.com>
Diffstat (limited to 'src/bun.js/bindings/webcore/HTTPParsers.cpp')
-rw-r--r--src/bun.js/bindings/webcore/HTTPParsers.cpp8
1 files changed, 4 insertions, 4 deletions
diff --git a/src/bun.js/bindings/webcore/HTTPParsers.cpp b/src/bun.js/bindings/webcore/HTTPParsers.cpp
index f2c4ff989..66aec4925 100644
--- a/src/bun.js/bindings/webcore/HTTPParsers.cpp
+++ b/src/bun.js/bindings/webcore/HTTPParsers.cpp
@@ -543,7 +543,7 @@ XSSProtectionDisposition parseXSSProtectionHeader(const String& header, String&
ContentTypeOptionsDisposition parseContentTypeOptionsHeader(StringView header)
{
StringView leftToken = header.left(header.find(','));
- if (equalLettersIgnoringASCIICase(leftToken.trim(isJSONOrHTTPWhitespace<UChar>), "nosniff"_s))
+ if (equalLettersIgnoringASCIICase(leftToken.trim(isASCIIWhitespaceWithoutFF<UChar>), "nosniff"_s))
return ContentTypeOptionsDisposition::Nosniff;
return ContentTypeOptionsDisposition::None;
}
@@ -602,7 +602,7 @@ XFrameOptionsDisposition parseXFrameOptionsHeader(StringView header)
// return result;
// for (auto value : StringView(headerValue).split(',')) {
-// auto trimmedValue = value.trim(isJSONOrHTTPWhitespace<UChar>);
+// auto trimmedValue = value.trim(isASCIIWhitespaceWithoutFF<UChar>);
// if (trimmedValue == "\"cache\""_s)
// result.add(ClearSiteDataValue::Cache);
// else if (trimmedValue == "\"cookies\""_s)
@@ -632,7 +632,7 @@ bool parseRange(StringView range, RangeAllowWhitespace allowWhitespace, long lon
if (!startsWithLettersIgnoringASCIICase(range, "bytes"_s))
return false;
- auto byteRange = range.substring(bytesLength).trim(isJSONOrHTTPWhitespace<UChar>);
+ auto byteRange = range.substring(bytesLength).trim(isASCIIWhitespaceWithoutFF<UChar>);
if (!byteRange.startsWith('='))
return false;
@@ -962,7 +962,7 @@ bool isSafeMethod(const String& method)
CrossOriginResourcePolicy parseCrossOriginResourcePolicyHeader(StringView header)
{
- auto trimmedHeader = header.trim(isJSONOrHTTPWhitespace<UChar>);
+ auto trimmedHeader = header.trim(isASCIIWhitespaceWithoutFF<UChar>);
if (trimmedHeader.isEmpty())
return CrossOriginResourcePolicy::None;