- From: Anne van Kesteren <notifications@github.com>
- Date: Thu, 27 Apr 2017 00:43:47 -0700
- To: w3c/webpayments-method-identifiers <webpayments-method-identifiers@noreply.github.com>
- Cc: Subscribed <subscribed@noreply.github.com>
- Message-ID: <w3c/webpayments-method-identifiers/pull/35/review/35036362@github.com>
annevk commented on this pull request.
> </p>
+ <ol class="algorithm">
+ <li>Let <var>url</var> be the result of trying to <a data-lt=
+ "URL Parser">parse</a> <var>potential URL</var>.
+ </li>
+ <li>If failure, <a>throw</a> a <code>TypeError</code> exception.
"If _url_ is failure"
> </p>
+ <ol class="algorithm">
+ <li>Let <var>url</var> be the result of trying to <a data-lt=
+ "URL Parser">parse</a> <var>potential URL</var>.
+ </li>
+ <li>If failure, <a>throw</a> a <code>TypeError</code> exception.
+ </li>
+ <li>If running <a>potentially trustworthy URL</a> with <var>url</var>
+ returns <code>"Not Trustworthy"</code>, <a>throw</a> a
+ <code>SecurityError</code> exception.
Different exception really necessary? You'll have to write some tests to make sure it's thrown before a non-null query...
> </li>
- <li>If either <em>urlB.query</em> or <em>urlB.fragment</em> are not
- <em>null</em> terminate the algorithm with a result of <em>no
- match</em> and discard <em>B</em> from further matching.
+ <li>
+ <a>Serialize</a> <var>urlA</var> and <var>urlB</var> and attempt to
+ <a>validate</a> each. If either throws, return false.
I was hoping you'd abstract validate a bit somehow instead. Parse -> serialize -> parse seems really hacky.
> </h2>
<p>
- For W3C strings, user agents MUST use exact string matching.
+ For <a>standardized payment method identifier</a>, user agents MUST
identifiers*
> </p>
</section>
</section>
<section>
<h2>
+ Security consideration
+ </h2>
+ <p>
+ The URLs relied upon by this specification are only expected to be used
+ by APIs, or internally by the user agent. As such, there is no
+ expectation that URLs defined in this specification would ever be
+ rendered or passed around by end-users. However, in the off-chance that
+ they are, implementers need to be aware of the <a data-cite=
+ "!URL#security-considerations">security considerations</a> from the
+ [[!URL]] specification.
Surely you should know whether they ever are? This seems a little weird.
--
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/w3c/webpayments-method-identifiers/pull/35#pullrequestreview-35036362
Received on Thursday, 27 April 2017 07:44:30 UTC