Goals
The URL standard takes the following approach towards making URLs fully interoperable:
-
Align RFC 3986 and RFC 3987 with contemporary implementations and obsolete them in the process. (E.g., spaces, other "illegal" code points, query encoding, equality, canonicalization, are all concepts not entirely shared, or defined.) URL parsing needs to become as solid as HTML parsing. [RFC3986] [RFC3987]
-
Standardize on the term URL. URI and IRI are just confusing. In practice a single algorithm is used for both so keeping them distinct is not helping anyone. URL also easily wins the search result popularity contest.
-
Supplanting Origin of a URI [sic]. [RFC6454]
-
Define URL’s existing JavaScript API in full detail and add enhancements to make it easier to work with. Add a new
URL
object as well for URL manipulation without usage of HTML elements. (Useful for JavaScript worker environments.)
As the editors learn more about the subject matter the goals might increase in scope somewhat.
1. Infrastructure
This specification depends on the Infra Standard. [INFRA]
Some terms used in this specification are defined in the DOM, Encoding, IDNA, and Web IDL Standards. [DOM] [ENCODING] [IDNA] [WEBIDL]
To serialize an integer, represent it as the shortest possible decimal number.
A Windows drive letter is two code points, of which the first is
an ASCII alpha and the second is either ":
" or "|
".
A normalized Windows drive letter is a Windows drive letter of which
the second code point is ":
".
1.1. Parsers
The EOF code point is a conceptual code point that signifies the end of a string or code point stream.
Within a parser algorithm that uses a pointer variable, c references the code point the pointer variable points to.
Within a string-based parser algorithm that uses a pointer variable, remaining references the substring after pointer in the string being processed.
If "mailto:username@example
" is a string being
processed and pointer points to "@
", c is "@
" and remaining is
"example
".
A syntax violation indicates a non-fatal mismatch between input and syntax requirements. User agents, especially conformance checkers are encouraged to report them somewhere.
A syntax violation does not mean that the parser terminates. Termination of a parser is always stated explicitly. E.g., through a return statement.
1.2. Percent-encoded bytes
A percent-encoded byte is "%
", followed by two ASCII hex digits.
Sequences of percent-encoded bytes, after conversion to bytes,
should not cause UTF-8 decode without BOM or fail to return failure.
To percent encode a byte into a percent-encoded byte, return a string consisting of
"%
", followed by a double-digit, uppercase, hexadecimal
representation of byte.
To percent decode a byte sequence input, run these steps:
Using anything but UTF-8 decode without BOM when the input contains bytes that are not ASCII bytes might be insecure and is not recommended.
-
Let output be an empty byte sequence.
-
For each byte byte in input, run these steps:
-
If byte is not `
%
`, append byte to output. -
Otherwise, if byte is `
%
` and the next two bytes after byte in input are not in the ranges 0x30 to 0x39, 0x41 to 0x46, and 0x61 to 0x66, append byte to output. -
Otherwise, run these substeps:
-
Let bytePoint be the two bytes after byte in input, decoded, and then interpreted as hexadecimal number.
-
Append a byte whose value is bytePoint to output.
-
Skip the next two bytes in input.
-
-
-
Return output.
The simple encode set are C0 controls and all code points greater than U+007E.
The default encode set is the simple encode set and code points U+0020,
'"
',
"#
",
"<
",
">
",
"?
",
"`
",
"{
",
and
"}
".
The userinfo encode set is the default encode set and code points
"/
",
":
",
";
",
"=
",
"@
",
"[
",
"\
",
"]
",
"^
",
and
"|
".
To UTF-8 percent encode a codePoint, using an encode set, run these steps:
-
If codePoint is not in encode set, return codePoint.
-
Let bytes be the result of running UTF-8 encode on codePoint.
-
Percent encode each byte in bytes, and then return the results concatenated, in the same order.
2. Security considerations
The security of a URL is a function of its environment. Care is to be taken when rendering, interpreting, and passing URLs around.
When rendering and allocating new URLs "spoofing" needs to be considered. An attack whereby one host or URL can be confused for another. E.g., consider how 1/l/I, m/rn/rri, 0/O, and а/a can all appear eerily similar. Or worse, consider how U+202A and similar code points are invisible. [UTS36]
When passing a URL from party A to B, both need to carefully consider what is happening. A might end up leaking data it does not want to leak. B might receive input it did not expect and take an action that harms the user. In particular, B should never trust A, as at some point URLs from A can come from untrusted sources.
3. Hosts (domains and IP addresses)
A host is a domain, an IPv4 address, or an IPv6 address. Typically a host serves as a network address, but it is sometimes (ab)used as opaque identifier in URLs where a network address is not necessary.
The RFCs referenced in the paragraphs below are for informative purposes only. They have no influence on host syntax, parsing, and serialization. Unless stated otherwise in the sections that follow.
A domain identifies a realm within a network. [RFC1034]
The example.com
and example.com.
domains are
not equivalent and typically treated as distinct.
An IPv4 address is a 32-bit identifier. [RFC791]
An IPv6 address is a 128-bit identifier and for the purposes of this specification represented as an ordered list of eight 16-bit pieces. [RFC4291]
Support for <zone_id>
is intentionally omitted.
3.1. IDNA
The domain to ASCII given a domain domain, runs these steps:
-
Let result be the result of running Unicode ToASCII with domain_name set to domain, UseSTD3ASCIIRules set to false, processing_option set to Transitional_Processing, and VerifyDnsLength set to false.
-
If result is a failure value, syntax violation, return failure.
-
Return result.
The domain to Unicode given a domain domain, runs these steps:
-
Let result be the result of running Unicode ToUnicode with domain_name set to domain, UseSTD3ASCIIRules set to false.
-
Signify syntax violations for any returned errors, and then, return result.
3.2. Host syntax
A host string must be a domain string, an IPv4 address string, or "[
", followed by an IPv6 address string, followed
by "]
".
A domain is a valid domain if these steps return success:
-
Let result be the result of running Unicode ToASCII with domain_name set to domain, UseSTD3ASCIIRules set to true, processing_option set to Nontransitional_Processing, and VerifyDnsLength set to true.
-
If result is a failure value, return failure.
-
Set result to the result of running Unicode ToUnicode with domain_name set to result, UseSTD3ASCIIRules set to true.
-
If result contains any errors, return failure.
-
Return success.
Ideally we define this in terms of a sequence of code points that make up a valid domain rather than through a whack-a-mole: bug 25334.
A domain string must be a string that is a valid domain.
An IPv4 address string must be four sequences of up to
three ASCII digits per sequence, each representing a decimal number no greater than 255, and
separated from each other by ".
".
An IPv6 address string is defined in the "Text Representation of Addresses" chapter of IP Version 6 Addressing Architecture. [RFC4291]
3.3. Host parsing
The host parser takes a string input and an optional Unicode flag (unset unless stated otherwise), and then runs these steps:
-
If input starts with "
[
", run these substeps:-
If input does not end with "
]
", syntax violation, return failure. -
Return the result of IPv6 parsing input with its leading "
[
" and trailing "]
" removed.
-
-
Let domain be the result of UTF-8 decode without BOM on the percent decoding of UTF-8 encode on input.
-
Let asciiDomain be the result of running domain to ASCII on domain.
-
If asciiDomain is failure, return failure.
-
If asciiDomain contains U+0000, U+0009, U+000A, U+000D, U+0020, "
#
", "%
", "/
", ":
", "?
", "@
", "[
", "\
", or "]
", syntax violation, return failure. -
Let ipv4Host be the result of IPv4 parsing asciiDomain.
-
If ipv4Host is an IPv4 address or failure, return ipv4Host.
-
Return asciiDomain if the Unicode flag is unset, and the result of running domain to Unicode on asciiDomain otherwise.
The IPv4 number parser takes a string input and a syntaxViolationFlag pointer, and then runs these steps:
-
Let R be 10.
-
If input contains at least two code points and the first two code points are either "
0x
" or "0X
", run these substeps:-
Set syntaxViolationFlag.
-
Remove the first two code points from input.
-
Set R to 16.
-
-
Otherwise, if input contains at least two code points and the first code point is "
0
", run these substeps:-
Set syntaxViolationFlag.
-
Remove the first code point from input.
-
Set R to 8.
-
-
If input is the empty string, then return zero.
-
If input contains a code point that is not a radix-R digit, then return failure.
-
Return the mathematical integer value that is represented by input in radix-R notation, using ASCII hex digits for digits with values 0 through 15.
The IPv4 parser takes a string input and then runs these steps:
-
Let syntaxViolationFlag be unset.
-
Let parts be input split on "
.
". -
If the last item in parts is the empty string, set syntaxViolationFlag and remove the last item from parts.
-
If parts has more than four items, return input.
-
Let numbers be the empty list.
-
For each part in parts:
-
If part is the empty string, return input.
0..0x300
is a domain, not an IPv4 address. -
Let n be the result of parsing part using syntaxViolationFlag.
-
If n is failure, return input.
-
Append n to numbers.
-
-
If syntaxViolationFlag is set, syntax violation.
-
If any item in numbers is greater than 255, syntax violation.
-
If any but the last item in numbers is greater than 255, return failure.
-
If the last item in numbers is greater than or equal to 256(5 − the number of items in numbers), syntax violation, return failure.
-
Let ipv4 be the last item in numbers.
-
Remove the last item from numbers.
-
Let counter be zero.
-
For each n in numbers:
-
Increment ipv4 by n × 256(3 − counter).
-
Increment counter by one.
-
-
Return ipv4.
The IPv6 parser takes a string input and then runs these steps:
-
Let address be a new IPv6 address with its 16-bit pieces initialized to 0.
-
Let piece pointer be a pointer into address’s 16-bit pieces, initially zero (pointing to the first 16-bit piece), and let piece be the 16-bit piece it points to.
-
Let compress pointer be another pointer into address’s 16-bit pieces, initially null and pointing to nothing.
-
Let pointer be a pointer into input, initially zero (pointing to the first code point).
-
If c is "
:
", run these substeps:-
If remaining does not start with "
:
", syntax violation, return failure. -
Increase pointer by two.
-
Increase piece pointer by one and then set compress pointer to piece pointer.
-
-
Main: While c is not the EOF code point, run these substeps:
-
If piece pointer is eight, syntax violation, return failure.
-
If c is "
:
", run these inner substeps:-
If compress pointer is non-null, syntax violation, return failure.
- Increase pointer and piece pointer by one, set compress pointer to piece pointer, and then jump to Main.
-
-
Let value and length be 0.
-
While length is less than 4 and c is an ASCII hex digit, set value to value × 0x10 + c interpreted as hexadecimal number, and increase pointer and length by one.
-
Switching on c:
- "
.
" -
-
If length is 0, syntax violation, return failure.
-
Decrease pointer by length.
-
Jump to IPv4.
-
- "
:
" -
-
Increase pointer by one.
-
If c is the EOF code point, syntax violation, return failure.
-
- Anything but the EOF code point
-
Syntax violation, return failure.
- "
-
Set piece to value.
-
Increase piece pointer by one.
-
-
If c is the EOF code point, jump to Finale.
-
IPv4: If piece pointer is greater than six, syntax violation, return failure.
-
Let numbersSeen be 0.
-
While c is not the EOF code point, run these substeps:
-
Let value be null.
-
If numbersSeen is greater than 0, then:
-
If c is a "
.
" and numbersSeen is less than 4, then increase pointer by one. - Otherwise, syntax violation, return failure.
-
-
If c is not an ASCII digit, syntax violation, return failure.
-
While c is an ASCII digit, run these subsubsteps:
-
Let number be c interpreted as decimal number.
-
If value is null, set value to number.
Otherwise, if value is 0, syntax violation, return failure.
Otherwise, set value to value × 10 + number.
-
Increase pointer by one.
-
If value is greater than 255, syntax violation, return failure.
-
-
Set piece to piece × 0x100 + value.
-
Increase numbersSeen by one.
-
If numbersSeen is 2 or 4, then increase piece pointer by one.
-
If c is the EOF code point and numbersSeen is not 4, syntax violation, return failure.
-
-
Finale: If compress pointer is non-null, run these substeps:
-
Let swaps be piece pointer − compress pointer.
-
Set piece pointer to seven.
-
While piece pointer is not zero and swaps is greater than zero, swap piece with the piece at pointer compress pointer + swaps − 1, and then decrease both piece pointer and swaps by one.
-
-
Otherwise, if compress pointer is null and piece pointer is not eight, syntax violation, return failure.
-
Return address.
To be clear, Main, IPv4, and Finale are markers. They serve no purpose other than being a location the algorithm can jump to.
3.4. Host serializing
The host serializer takes a host host and then runs these steps:
-
If host is an IPv4 address, return the result of running the IPv4 serializer on host.
-
Otherwise, if host is an IPv6 address, return "
[
", followed by the result of running the IPv6 serializer on host, followed by "]
". -
Otherwise, host is a domain, return host.
The IPv4 serializer takes an IPv4 address address and then runs these steps:
-
Let output be the empty string.
-
Let n be the value of address.
-
Repeat four times:
-
Prepend n % 256, serialized, to output.
-
Unless this is the fourth time, prepend "
.
" to output. -
Set n to floor(n / 256).
-
-
Return output.
The IPv6 serializer takes an IPv6 address address and then runs these steps:
-
Let output be the empty string.
-
Let compress pointer be a pointer to the first 16-bit piece in the first longest sequences of address’s 16-bit pieces that are 0.
-
If there is no sequence of address’s 16-bit pieces that are 0 longer than one, set compress pointer to null.
-
For each piece in address’s pieces, run these substeps:
-
If compress pointer points to piece, append "
::
" to output if piece is address’s first piece and append ":
" otherwise, and then run these substeps again with all subsequent pieces in address’s pieces that are 0 skipped or go the next step in the overall set of steps if that leaves no pieces. -
Append piece, represented as the shortest possible lowercase hexadecimal number, to output.
-
If piece is not address’s last piece, append "
:
" to output.
-
-
Return output.
This algorithm requires the recommendation from A Recommendation for IPv6 Address Text Representation. [RFC5952]
3.5. Host equivalence
To determine whether a host A equals B, return true if A is B, and false otherwise.
Certificate comparison requires a host equivalence check that ignores the trailing dot of a domain (if any). However, those hosts have also various other facets enforced, such as DNS length, that are not enforced here, as URLs do not enforce them. If anyone has a good suggestion for how to bring these two closer together, or what a good unified model would be, please file an issue.
4. URLs
A URL is a universal identifier. To disambiguate from a URL string it can also be referred to as a URL record.
A URL’s scheme is an ASCII string that identifies the type of URL and can be used to dispatch a URL for further processing after parsing. It is initially the empty string.
A URL’s username is an ASCII string identifying a username. It is initially the empty string.
A URL’s password is an ASCII string identifying a password. It is initially the empty string.
A URL’s host is either null or a host. It is initially null.
A URL’s port is either null or a 16-bit unsigned integer that identifies a networking port. It is initially null.
A URL’s path is a list of zero or more ASCII string holding data, usually identifying a location in hierarchical form. It is initially the empty list.
A URL’s query is either null or an ASCII string holding data. It is initially null.
A URL’s fragment is either null or an ASCII string holding data that can be used for further processing on the resource the URL’s other components identify. It is initially null.
A URL also has an associated cannot-be-a-base-URL flag. It is initially unset.
A URL also has an associated object that is null, a Blob
object, a MediaSource
object, or a MediaStream
object. It is initially null. [FILEAPI] [MEDIA-SOURCE] [MEDIACAPTURE-STREAMS]
At this point this is used primarily to support
"blob
" URLs, but others can be added going forward, hence
"object".
A special scheme is a scheme listed in the first column of the following table. A default port is a special scheme’s optional corresponding port and is listed in the second column on the same row.
scheme | port |
---|---|
"ftp "
| 21 |
"file "
| |
"gopher "
| 70 |
"http "
| 80 |
"https "
| 443 |
"ws "
| 80 |
"wss "
| 443 |
A URL is special if its scheme is a special scheme.
A local scheme is a scheme that is "about
",
"blob
", "data
", or "filesystem
".
A URL is local if its scheme is a local scheme.
This definition is used externally. E.g., by the Fetch Standard and Referrer Policy. [FETCH] [REFERRER-POLICY]
An HTTP(S) scheme is a scheme that is
"http
" or "https
".
A network scheme is a scheme that is "ftp
" or an HTTP(S) scheme.
A fetch scheme is a scheme that is "about
",
"blob
", "data
", "file
", "filesystem
", or a network scheme.
HTTP(S) scheme, network scheme, and fetch scheme are used by HTML. [HTML]
A URL includes credentials if its username or password is not the empty string.
A URL can be designated as base URL.
A base URL is useful for the URL parser when the input might be a relative-URL string.
-
Let path be url’s path.
-
If path’s size is 0, then return.
-
If url’s scheme is "
file
", path’s size is 1, and path[0] is a normalized Windows drive letter, then return. -
Remove path’s last item.
4.1. URL syntax
A URL string must be either a relative-URL-with-fragment string or an absolute-URL-with-fragment string.
An absolute-URL-with-fragment string must be an absolute-URL string, optionally followed by "#
" and a URL-fragment string.
An absolute-URL string must be one of the following
-
a URL-scheme string that is an ASCII case-insensitive match for a special scheme and not an ASCII case-insensitive match for "
file
", followed by ":
" and a scheme-relative-URL string -
a URL-scheme string that is not an ASCII case-insensitive match for a special scheme, followed by "
:
" and a relative-URL string -
a URL-scheme string that is an ASCII case-insensitive match for "
file
", followed by ":
" and a scheme-relative-file-URL string
any optionally followed by "?
" and a URL-query string.
A URL-scheme string must be one ASCII alpha,
followed by zero or more of ASCII alphanumeric, "+
", "-
", and
".
". Schemes should be registered in the IANA URI [sic] Schemes registry. [IANA-URI-SCHEMES] [RFC7595]
A relative-URL-with-fragment string must be a relative-URL string, optionally followed by "#
" and a URL-fragment string.
A relative-URL string must be one of the following, switching on base URL’s scheme:
- Not "
file
" -
- "
file
" -
a scheme-relative-file-URL string
a path-absolute-URL string if base URL’s host is null
a path-absolute-non-Windows-file-URL string if base URL’s host is non-null
any optionally followed by "?
" and a URL-query string.
A non-null base URL is necessary when parsing a relative-URL string.
A scheme-relative-URL string must be
"//
", followed by a host string, optionally followed by ":
"
and a URL-port string, optionally followed by a path-absolute-URL string.
A URL-port string must be zero or more ASCII digits.
A scheme-relative-file-URL string must be
"//
", followed by one of the following
-
a host string, optionally followed by a path-absolute-non-Windows-file-URL string
A path-absolute-URL string must be "/
"
followed by a path-relative-URL string.
A path-absolute-non-Windows-file-URL string must be a path-absolute-URL string that does not start with: "/
", followed by a Windows drive letter, followed by "/
".
A path-relative-URL string must be zero or more URL-path-segment strings, separated from each other by "/
", and not start with
"/
".
A path-relative-scheme-less-URL string must be a path-relative-URL string that does not start with: a URL-scheme string,
followed by ":
".
A URL-path-segment string must be one of the following
-
zero or more URL units, excluding "
/
" and "?
", that together are not a single-dot path segment or a double-dot path segment.
A single-dot path segment must be
".
" or an ASCII case-insensitive match for "%2e
".
A double-dot path segment must be
"..
" or an ASCII case-insensitive match for ".%2e
",
"%2e.
", or "%2e%2e
".
A URL-query string must be zero or more URL units.
A URL-fragment string must be zero or more URL units.
The URL code points are ASCII alphanumeric,
"!
",
"$
",
"&
",
"'
",
"(
",
")
",
"*
",
"+
",
",
",
"-
",
".
",
"/
",
":
",
";
",
"=
",
"?
",
"@
",
"_
",
"~
",
and code points in the ranges
U+00A0 to U+D7FF,
U+E000 to
U+FDCF,
U+FDF0 to U+FFFD,
U+10000 to U+1FFFD,
U+20000 to U+2FFFD,
U+30000 to U+3FFFD,
U+40000 to U+4FFFD,
U+50000 to U+5FFFD,
U+60000 to U+6FFFD,
U+70000 to U+7FFFD,
U+80000 to U+8FFFD,
U+90000 to U+9FFFD,
U+A0000 to U+AFFFD,
U+B0000 to U+BFFFD,
U+C0000 to U+CFFFD,
U+D0000 to U+DFFFD,
U+E0000 to U+EFFFD,
U+F0000 to U+FFFFD,
U+100000 to U+10FFFD.
Code points higher than U+007F will be converted to percent-encoded bytes by the URL parser.
In HTML, when the document encoding is a legacy encoding, code points in the URL-query string that are higher than U+007F will be converted to percent-encoded bytes using the document’s encoding. This can cause problems if a URL that works in one document is copied to another document that uses a different document encoding. Using the UTF-8 encoding everywhere solves this problem.
For example, consider this HTML document:
<!doctype html> <meta charset="windows-1252"> <a href="?smörgåsbord">Test</a>
Since the document encoding is windows-1252, the link’s URL’s query will be "sm%F6rg%E5sbord". If the document encoding had been UTF-8, it would instead be "sm%C3%B6rg%C3%A5sbord".
The URL units are URL code points and percent-encoded bytes.
Percent-encoded bytes can be used to encode code points that are not URL code points or are excluded from a syntax production.
There is no conforming way to express a username or password of a URL record within a URL string.
4.2. URL parsing
The URL parser takes a string input, with an optional base URL base and an optional encoding encoding override, and then runs these steps:
Non-web-browser implementations only need to implement the basic URL parser.
-
Let url be the result of running the basic URL parser on input with base, and encoding override as provided.
-
If url is failure, return failure.
-
If url’s scheme is not "
blob
", return url. -
If the first string in url’s path is not in the blob URL store, return url. [FILEAPI]
-
Set url’s object to a StructuredClone of the entry in the blob URL store corresponding to the first string in url’s path. [HTML]
-
Return url.
Input | Base | Output |
---|---|---|
https:example.org
| https://example.org/
| |
https://////example.com///
| https://example.com///
| |
https://example.com/././foo
| https://example.com/foo
| |
hello:world
| https://example.com
| hello:world
|
https:example.org
| https://example.com
| https://example.com/example.org
|
\example\..\demo/.\
| https://example.com
| https://example.com/demo/
|
example
| https://example.com/demo
| https://example.com/example
|
example
| Failure | |
https://example.com:demo
| Failure | |
http://[www.example.com]/
| Failure |
The base and output URL are represented in serialized form for brevity.
The basic URL parser takes a string input, optionally with a base URL base, optionally with an encoding encoding override, optionally with a URL url and a state override state override, and then runs these steps:
The encoding override argument is a legacy concept only relevant for HTML. The url and state override arguments are only for use by various APIs. [HTML]
When the url and state override arguments are not passed, the basic URL parser returns either a new URL or failure. If they are passed, the algorithm modifies the passed url and can terminate without returning anything.
-
If url is not given:
-
Set url to a new URL.
-
If input contains any leading or trailing C0 control or space, syntax violation.
-
Remove any leading and trailing C0 control or space from input.
-
-
If input contains any ASCII tab or newline, syntax violation.
-
Remove all ASCII tab or newline from input.
-
Let state be state override if given, or scheme start state otherwise.
-
If base is not given, set it to null.
-
Let encoding be UTF-8.
-
If encoding override is given, set encoding to the result of getting an output encoding from encoding override.
-
Let buffer be the empty string.
-
Let the @ flag, [] flag, and passwordTokenSeenFlag be unset.
-
Let pointer be a pointer to first code point in input.
-
Keep running the following state machine by switching on state. If after a run pointer points to EOF code point, go to the next step. Otherwise, increase pointer by one and continue with the state machine.
- scheme start state
-
-
If c is an ASCII alpha, append c, lowercased, to buffer, and set state to scheme state.
-
Otherwise, if state override is not given, set state to no scheme state, and decrease pointer by one.
-
Otherwise, syntax violation, return failure.
This indication of failure is used exclusively by
Location
object’sprotocol
attribute.
-
- scheme state
-
-
If c is an ASCII alphanumeric, "
+
", "-
", or ".
", append c, lowercased, to buffer. -
Otherwise, if c is "
:
", run these substeps:-
If state override is given, run these subsubsteps:
-
If url’s scheme is a special scheme and buffer is not, terminate this algorithm.
-
If url’s scheme is not a special scheme and buffer is, terminate this algorithm.
-
-
Set url’s scheme to buffer.
-
Set buffer to the empty string.
-
If state override is given, terminate this algorithm.
-
If url’s scheme is "
file
", run these subsubsteps:-
If remaining does not start with "
//
", syntax violation. -
Set state to file state.
-
-
Otherwise, if url is special, base is non-null, and base’s scheme is equal to url’s scheme, set state to special relative or authority state.
This means that base’s cannot-be-a-base-URL flag is unset.
-
Otherwise, if url is special, set state to special authority slashes state.
-
Otherwise, if remaining starts with an "
/
", set state to path or authority state, and increase pointer by one. -
Otherwise, set url’s cannot-be-a-base-URL flag, append an empty string to url’s path, and set state to cannot-be-a-base-URL path state.
-
-
Otherwise, if state override is not given, set buffer to the empty string, state to no scheme state, and start over (from the first code point in input).
-
Otherwise, syntax violation, return failure.
This indication of failure is used exclusively by
Location
object’sprotocol
attribute. Furthermore, the non-failure termination earlier in this state is an intentional difference for defining that attribute.
-
- no scheme state
-
-
If base is null, or base’s cannot-be-a-base-URL flag is set and c is not "
#
", syntax violation, return failure. -
Otherwise, if base’s cannot-be-a-base-URL flag is set and c is "
#
", set url’s scheme to base’s scheme, url’s path to base’s path, url’s query to base’s query, url’s fragment to the empty string, set url’s cannot-be-a-base-URL flag, and set state to fragment state. -
Otherwise, if base’s scheme is not "
file
", set state to relative state and decrease pointer by one. -
Otherwise, set state to file state and decrease pointer by one.
-
- special relative or authority state
-
If c is "
/
" and remaining starts with "/
", set state to special authority ignore slashes state and increase pointer by one.Otherwise, syntax violation, set state to relative state and decrease pointer by one.
- path or authority state
-
If c is "
/
", set state to authority state.Otherwise, set state to path state, and decrease pointer by one.
- relative state
-
Set url’s scheme to base’s scheme, and then, switching on c:
- EOF code point
-
Set url’s username to base’s username, url’s password to base’s password, url’s host to base’s host, url’s port to base’s port, url’s path to base’s path, and url’s query to base’s query.
- "
/
" -
Set state to relative slash state.
- "
?
" -
Set url’s username to base’s username, url’s password to base’s password, url’s host to base’s host, url’s port to base’s port, url’s path to base’s path, url’s query to the empty string, and state to query state.
- "
#
" -
Set url’s username to base’s username, url’s password to base’s password, url’s host to base’s host, url’s port to base’s port, url’s path to base’s path, url’s query to base’s query, url’s fragment to the empty string, and state to fragment state.
- Otherwise
-
If url is special and c is "
\
", syntax violation, set state to relative slash state.Otherwise, run these steps:
- relative slash state
-
-
If either c is "
/
", or url is special and c is "\
", run these substeps:-
If c is "
\
", syntax violation. -
Set state to special authority ignore slashes state.
-
-
Otherwise, set url’s username to base’s username, url’s password to base’s password, url’s host to base’s host, url’s port to base’s port, state to path state, and then, decrease pointer by one.
-
- special authority slashes state
-
If c is "
/
" and remaining starts with "/
", set state to special authority ignore slashes state, and increase pointer by one.Otherwise, syntax violation, set state to special authority ignore slashes state, and decrease pointer by one.
- special authority ignore slashes state
-
If c is neither "
/
" nor "\
", set state to authority state, and decrease pointer by one.Otherwise, syntax violation.
- authority state
-
-
If c is "
@
", run these substeps:-
If the @ flag is set, prepend "
%40
" to buffer. -
Set the @ flag.
-
For each codePoint in buffer, run these substeps:
-
If codePoint is "
:
" and passwordTokenSeenFlag is unset, then set passwordTokenSeenFlag and run these substeps for the next code point. -
Let encodedCodePoints be the result of running UTF-8 percent encode codePoint using the userinfo encode set.
-
If passwordTokenSeenFlag is set, then append encodedCodePoints to url’s password.
-
Otherwise, append encodedCodePoints to url’s username.
-
-
Set buffer to the empty string.
-
Otherwise, if one of the following is true
-
c is EOF code point, "
/
", "?
", or "#
" -
url is special and c is "
\
"
then decrease pointer by the number of code points in buffer plus one, set buffer to the empty string, and set state to host state.
-
-
Otherwise, append c to buffer.
-
- host state
- hostname state
-
-
If c is "
:
" and the [] flag is unset, run these substeps:-
If url is special and buffer is the empty string, return failure.
-
Let host be the result of host parsing buffer.
-
If host is failure, return failure.
-
Set url’s host to host, buffer to the empty string, and state to port state.
-
If state override is hostname state, terminate this algorithm.
-
-
Otherwise, if one of the following is true
-
c is EOF code point, "
/
", "?
", or "#
" -
url is special and c is "
\
"
then decrease pointer by one, and run these substeps:
-
If url is special and buffer is the empty string, return failure.
-
Let host be the result of host parsing buffer.
-
If host is failure, return failure.
-
Set url’s host to host, buffer to the empty string, and state to path start state.
-
If state override is given, terminate this algorithm.
-
-
Otherwise, run these substeps:
-
- port state
-
-
If c is an ASCII digit, append c to buffer.
-
Otherwise, if one of the following is true
-
c is EOF code point, "
/
", "?
", or "#
" -
url is special and c is "
\
" -
state override is given
run these substeps:
-
If buffer is not the empty string, run these subsubsteps:
-
Let port be the mathematical integer value that is represented by buffer in radix-10 using ASCII digits for digits with values 0 through 9.
-
If port is greater than 216 − 1, syntax violation, return failure.
-
Set url’s port to null, if port is url’s scheme’s default port, and to port otherwise.
-
Set buffer to the empty string.
-
-
If state override is given, terminate this algorithm.
-
Set state to path start state, and decrease pointer by one.
-
-
Otherwise, syntax violation, return failure.
-
- file state
-
Set url’s scheme to "
file
", and then, switching on c:- EOF code point
-
If base is non-null and base’s scheme is "
file
", set url’s host to base’s host, url’s path to base’s path, and url’s query to base’s query. - "
/
"- "
\
" - "
-
-
If c is "
\
", syntax violation. -
Set state to file slash state.
-
- "
?
" -
If base is non-null and base’s scheme is "
file
", set url’s host to base’s host, url’s path to base’s path, url’s query to the empty string, and state to query state. - "
#
" -
If base is non-null and base’s scheme is "
file
", set url’s host to base’s host, url’s path to base’s path, url’s query to base’s query, url’s fragment to the empty string, and state to fragment state. - Otherwise
-
-
If base is non-null, base’s scheme is "
file
", and at least one of the following is true-
c and the first code point of remaining are not a Windows drive letter
-
remaining consists of one code point
- remaining’s second code point is not "
/
", "\
", "?
", or "#
"
then set url’s host to base’s host, url’s path to base’s path, and then shorten url’s path.
This is a (platform-independent) Windows drive letter quirk.
-
-
Otherwise, if base is non-null and base’s scheme is "
file
", syntax violation. -
Set state to path state, and decrease pointer by one.
-
- file slash state
-
-
If c is "
/
" or "\
", run these substeps:-
If c is "
\
", syntax violation. -
Set state to file host state.
-
-
Otherwise, run these substeps:
-
If base is non-null, base’s scheme is "
file
", and base’s path first string is a normalized Windows drive letter, append base’s path first string to url’s path.This is a (platform-independent) Windows drive letter quirk. Both url’s and base’s host are null under these conditions and therefore not copied.
-
Set state to path state, and decrease pointer by one.
-
-
- file host state
-
-
If c is EOF code point, "
/
", "\
", "?
", or "#
", decrease pointer by one, and run these substeps:-
If buffer is a Windows drive letter, syntax violation, set state to path state.
This is a (platform-independent) Windows drive letter quirk. buffer is not reset here and instead used in the path state.
-
Otherwise, if buffer is the empty string, set state to path start state.
-
Otherwise, run these steps:
-
Let host be the result of host parsing buffer.
-
If host is failure, return failure.
-
If host is not "
localhost
", set url’s host to host. -
Set buffer to the empty string and state to path start state.
-
-
-
Otherwise, append c to buffer.
-
- path start state
-
-
If url is special and c is "
\
", syntax violation. -
Set state to path state, and if neither c is "
/
", nor url is special and c is "\
", decrease pointer by one.
-
- path state
-
-
If one of the following is true
-
c is EOF code point or "
/
" -
url is special and c is "
\
" -
state override is not given and c is "
?
" or "#
"
then run these substeps:
-
If url is special and c is "
\
", syntax violation. -
If buffer is a double-dot path segment, shorten url’s path, and then if neither c is "
/
", nor url is special and c is "\
", append the empty string to url’s path. -
Otherwise, if buffer is a single-dot path segment and if neither c is "
/
", nor url is special and c is "\
", append the empty string to url’s path. -
Otherwise, if buffer is not a single-dot path segment, run these subsubsteps:
-
If url’s scheme is "
file
", url’s path is empty, and buffer is a Windows drive letter, run these subsubsubsteps:-
If url’s host is non-null, syntax violation.
-
Set url’s host to null and replace the second code point in buffer with "
:
".
This is a (platform-independent) Windows drive letter quirk.
-
-
Append buffer to url’s path.
-
-
Set buffer to the empty string.
-
If c is "
?
", set url’s query to the empty string, and state to query state. -
If c is "
#
", set url’s fragment to the empty string, and state to fragment state.
-
-
Otherwise, run these steps:
-
If c is not a URL code point and not "
%
", syntax violation. -
If c is "
%
" and remaining does not start with two ASCII hex digits, syntax violation. -
UTF-8 percent encode c using the default encode set, and append the result to buffer.
-
-
- cannot-be-a-base-URL path state
-
-
If c is "
?
", set url’s query to the empty string and state to query state. -
Otherwise, if c is "
#
", set url’s fragment to the empty string and state to fragment state. -
Otherwise, run these substeps:
-
If c is not EOF code point, not a URL code point, and not "
%
", syntax violation. -
If c is "
%
" and remaining does not start with two ASCII hex digits, syntax violation. -
If c is not EOF code point, UTF-8 percent encode c using the simple encode set, and append the result to the first string in url’s path.
-
-
- query state
-
-
If c is EOF code point, or state override is not given and c is "
#
", run these substeps:-
If url is not special or url’s scheme is either "
ws
" or "wss
", set encoding to UTF-8. -
Set buffer to the result of encoding buffer using encoding.
-
For each byte in buffer run these subsubsteps:
-
If byte is less than 0x21, greater than 0x7E, or is 0x22, 0x23, 0x3C, or 0x3E, append byte, percent encoded, to url’s query.
-
Otherwise, append a code point whose value is byte to url’s query.
-
-
Set buffer to the empty string.
-
If c is "
#
", set url’s fragment to the empty string, and state to fragment state.
-
-
Otherwise, run these substeps:
-
If c is not a URL code point and not "
%
", syntax violation. -
If c is "
%
" and remaining does not start with two ASCII hex digits, syntax violation. -
Append c to buffer.
-
-
- fragment state
-
Switching on c:
- EOF code point
-
Do nothing.
- U+0000
- Otherwise
-
-
If c is not a URL code point and not "
%
", syntax violation. -
If c is "
%
" and remaining does not start with two ASCII hex digits, syntax violation. -
UTF-8 percent encode c using the simple encode set and append the result to url’s fragment.
-
-
Return url.
To set the username given a url and username, run these steps:
-
Set url’s username to the empty string.
-
For each code point in username, UTF-8 percent encode it using the userinfo encode set, and append the result to url’s username.
To set the password given a url and password, run these steps:
-
Set url’s password to the empty string.
-
For each code point in password, UTF-8 percent encode it using the userinfo encode set, and append the result to url’s password.
4.3. URL serializing
The URL serializer takes a URL url, an optional exclude fragment flag, and then runs these steps:
-
Let output be url’s scheme and "
:
" concatenated. -
If url’s host is non-null:
-
Append "
//
" to output. -
If url includes credentials, then:
-
Append url’s host, serialized, to output.
-
If url’s port is non-null, append "
:
" followed by url’s port, serialized, to output.
-
-
Otherwise, if url’s host is null and url’s scheme is "
file
", append "//
" to output. -
If url’s cannot-be-a-base-URL flag is set, append the first string in url’s path to output.
-
Otherwise, append "
/
", followed by the strings in url’s path (including empty strings), separated from each other by "/
", to output. -
If url’s query is non-null, append "
?
", followed by url’s query, to output. -
If the exclude fragment flag is unset and url’s fragment is non-null, append "
#
", followed by url’s fragment, to output. -
Return output.
4.4. URL equivalence
To determine whether a URL A equals B, optionally with an exclude fragments flag, run these steps:
-
Let serializedA be the result of serializing A, with the exclude fragment flag set if the exclude fragments flag is set.
-
Let serializedB be the result of serializing B, with the exclude fragment flag set if the exclude fragments flag is set.
-
Return true if serializedA is serializedB, and false otherwise.
4.5. Origin
See origin’s definition in HTML for the necessary background information. [HTML]
A URL’s origin is the origin returned by running these steps, switching on URL’s scheme:
- "
blob
" -
Let url be the result of parsing the first string in URL’s path.
Return a new opaque origin, if url is failure, and url’s origin otherwise.
The origin of
blob:https://whatwg.org/d0360e2f-caee-469f-9a2f-87d5b0456f6f
is the tuple (https
,whatwg.org
,443
, null). - "
ftp
"- "
gopher
"- "
http
"- "
https
"- "
ws
"- "
wss
" - "
-
Return a tuple consisting of URL’s scheme, URL’s host, URL’s port, and null.
- "
file
" -
Unfortunate as it is, this is left as an exercise to the reader. When in doubt, return a new opaque origin.
- Otherwise
-
Return a new opaque origin.
This does indeed mean that these URLs cannot be same-origin with themselves.
4.6. URL rendering
A URL should be rendered in its serialized form, with these modifications:
-
A URL’s username and password should not be rendered as they can be mistaken for a URL’s host. E.g., consider
https://examplecorp.com@attacker.example/
. -
A URL’s host should be rendered using domain to Unicode.
-
Other parts of the URL should have their sequences of percent-encoded bytes replaced with code points resulting from percent decoding those sequences converted to bytes, unless that renders those sequences invisible.
For the purposes of bidirectional text it should be rendered as if it were in a left-to-right embedding. [BIDI]
Unfortunately, as rendered URLs are strings and can appear anywhere, a specific bidirectional algorithm for rendered URLs would not see wide adoption. Bidirectional text interacts with the parts of a URL in ways that can cause the rendering to be different from the model. Users of bidirectional languages are thus cautioned that this is to be expected, particularly in plain text environments.
Due to the confusion that can arise between a URL’s host and path with bidirectional text, browsers are encouraged to only render a URL’s host in places where it is important for users to distinguish between the two. E.g., users are expected to make trust decisions based on a URL’s host rendered in the address bar.
5. application/x-www-form-urlencoded
The application/x-www-form-urlencoded
format
provides a way to encode name-value pairs.
The application/x-www-form-urlencoded
format is in many ways
an aberrant monstrosity, the result of many years of implementation accidents and compromises
leading to a set of requirements necessary for interoperability, but in no way representing good
design practices. In particular, readers are cautioned to pay close attention to the twisted details
involving repeated (and in some cases nested) conversions between character encodings and byte
sequences. Unfortunately the format is in widespread use due to the prevalence of HTML forms.[HTML]
5.1. application/x-www-form-urlencoded
parsing
A legacy server-oriented implementation might have to support encodings other than UTF-8 as well as have special logic for tuples of which the
name is `_charset
`. Such logic is not described here as only UTF-8 is
conforming.
The application/x-www-form-urlencoded
parser takes a byte sequence input, and then runs these steps:
-
Let sequences be the result of splitting input on `
&
`. -
Let tuples be an empty list of name-value tuples where both name and value hold a byte sequence.
-
For each byte sequence bytes in sequences, run these substeps:
-
If bytes is the empty byte sequence, run these substeps for the next byte sequence.
-
If bytes contains a `
=
`, then let name be the bytes from the start of bytes up to but excluding its first `=
`, and let value be the bytes, if any, after the first `=
` up to the end of bytes. If `=
` is the first byte, then name will be the empty byte sequence. If it is the last, then value will be the empty byte sequence. -
Otherwise, let name have the value of bytes and let value be the empty byte sequence.
-
Replace any `
+
` in name and value with 0x20. -
Add a tuple consisting of name and value to tuples.
-
-
Let output be an empty list of name-value tuples where both name and value hold a string.
-
For each name-value tuple in tuples, append a name-value tuple to output where the new name and value appended to output are the result of running UTF-8 decode without BOM on the percent decoding of the name and value from tuples, respectively, using encoding.
-
Return output.
5.2. application/x-www-form-urlencoded
serializing
The application/x-www-form-urlencoded
byte serializer takes a byte sequence input and then runs these steps:
-
Let output be the empty string.
-
For each byte in input, depending on byte:
- 0x20
-
Append U+002B to output.
- 0x2A
- 0x2D
- 0x2E
- 0x30 to 0x39
- 0x41 to 0x5A
- 0x5F
- 0x61 to 0x7A
- 0x2D
-
Append a code point whose value is byte to output.
- Otherwise
-
Append byte, percent encoded, to output.
-
Return output.
The application/x-www-form-urlencoded
serializer takes a list of name-value or name-value-type tuples tuples, optionally with an encoding encoding override, and then runs these steps:
-
Let encoding be UTF-8.
-
If encoding override is given, set encoding to the result of getting an output encoding from encoding override.
-
Let output be the empty string.
-
For each tuple in tuples, run these substeps:
-
Let name be the result of serializing the result of encoding tuple’s name, using encoding.
-
Let value be tuple’s value.
-
If tuple has a type, then:
-
If tuple’s type is "
hidden
" and name is "_charset_
", then set value to encoding’s name. -
Otherwise, if tuple’s type is "
file
", then set value to value’s filename.
-
-
Set value to the result of serializing the result of encoding value, using encoding.
-
If tuple is not the first pair in tuples, then append "
&
" to output. - Append name, followed by "
=
", followed by value, to output.
-
- Return output.
The HTML standard invokes this algorithm with name-value-type tuples. [HTML]
5.3. Hooks
The application/x-www-form-urlencoded
string parser takes a string input, UTF-8 encodes it, and then returns the result of application/x-www-form-urlencoded
parsing it.
6. API
[Constructor(USVString url, optional USVString base), Exposed=(Window,Worker)] interface URL { stringifier attribute USVString href; readonly attribute USVString origin; attribute USVString protocol; attribute USVString username; attribute USVString password; attribute USVString host; attribute USVString hostname; attribute USVString port; attribute USVString pathname; attribute USVString search; [SameObject] readonly attribute URLSearchParams searchParams; attribute USVString hash; };
A URL
object has an associated url (a URL) and query object (a URLSearchParams
object).
6.1. Constructors
The URL(url, base)
constructor,
when invoked, must run these steps:
-
Let parsedBase be null.
-
If base is given, run these substeps:
-
Let parsedBase be the result of running the basic URL parser on base.
-
If parsedBase is failure, throw a
TypeError
exception.
-
-
Let parsedURL be the result of running the basic URL parser on url with parsedBase.
-
If parsedURL is failure, throw a
TypeError
exception. -
Let query be parsedURL’s query, if that is non-null, and the empty string otherwise.
-
Let result be a new
URL
object. -
Set result’s url to parsedURL.
-
Set result’s query object to a new
URLSearchParams
object using query, and then set that query object’s url object to result. -
Return result.
To parse a string into a URL without using a base URL, invoke the URL
constructor with a single argument:
var input = "https://example.org/💩", url = new URL(input) url.pathname // "/%F0%9F%92%A9"
This throws an exception if the input is not an absolute-URL string:
try { var url = new URL("/🍣🍺") } catch(e) { // that happened }
A base URL is necessary if the input is a relative-URL string:
var input = "/🍣🍺", url = new URL(input, document.baseURI) url.href // "https://url.spec.whatwg.org/%F0%9F%8D%A3%F0%9F%8D%BA"
A URL
object can be used as base URL (while IDL requires a string as argument, a URL
object stringifies to its href
attribute value):
var url = new URL("🏳️🌈", new URL("https://pride.example/hello-world")) url.pathname // "/%F0%9F%8F%B3%EF%B8%8F%E2%80%8D%F0%9F%8C%88"
6.2. URL
members
The href
attribute’s getter must return the serialization of context object’s url.
The href
attribute’s setter must run these steps:
-
Let parsedURL be the result of running the basic URL parser on the given value.
-
If parsedURL is failure, throw a
TypeError
exception. -
Set context object’s url to parsedURL.
-
Empty context object’s query object’s list.
-
Let query be context object’s url’s query.
-
If query is non-null, then set context object’s query object’s list to the result of parsing query.
The origin
attribute’s getter must return the Unicode serialization of context object’s url’s origin. [HTML]
It returns the Unicode rather than the ASCII serialization for
compatibility with HTML’s MessageEvent
feature. [HTML]
The protocol
attribute’s getter must return context object url’s scheme, followed by ":
".
The protocol
attribute’s setter must basic URL parse the given value, followed by ":
", with context object’s url as url and scheme start state as state override.
The username
attribute’s getter must return context object’s url’s username.
The username
attribute’s setter must run these steps:
-
If context object’s url’s host is null, or its cannot-be-a-base-URL flag is set, terminate these steps.
-
Set the username given context object’s url and the given value.
The password
attribute’s getter must return context object’s url’s password.
The password
attribute’s setter must run these steps:
-
If context object’s url’s host is null, or its cannot-be-a-base-URL flag is set, terminate these steps.
-
Set the password given context object’s url and the given value.
The host
attribute’s getter must run these steps:
-
Let url be context object’s url.
-
If url’s host is null, return the empty string.
-
If url’s port is null, return url’s host, serialized.
-
Return url’s host, serialized, followed by "
:
" and url’s port, serialized.
The host
attribute’s setter must run these steps:
-
If context object’s url’s cannot-be-a-base-URL flag is set, terminate these steps.
-
Basic URL parse the given value with context object’s url as url and host state as state override.
If the given value for the host
attribute’s setter lacks a port, context object’s url’s port will not change. This can be unexpected as host
attribute’s getter does return a URL-port string so one might have assumed
the setter to always "reset" both.
The hostname
attribute’s getter must run these steps:
-
If context object’s url’s host is null, return the empty string.
-
Return context object’s url’s host, serialized.
The hostname
attribute’s setter must run these steps:
-
If context object’s url’s cannot-be-a-base-URL flag is set, terminate these steps.
-
Basic URL parse the given value with context object’s url as url and hostname state as state override.
The port
attribute’s getter must run these steps:
-
If context object’s url’s port is null, return the empty string.
-
Return context object’s url’s port, serialized.
The port
attribute’s setter must run these steps:
-
If context object’s url’s host is null, its cannot-be-a-base-URL flag is set, or its scheme is "
file
", terminate these steps. -
If the given value is the empty string, then set url’s port to null.
-
Otherwise, basic URL parse the given value with context object’s url as url and port state as state override.
The pathname
attribute’s getter must run these steps:
-
If context object’s url’s cannot-be-a-base-URL flag is set, return the first string in context object’s url’s path.
-
Return "
/
", followed by the strings in context object’s url’s path (including empty strings), separated from each other by "/
".
The pathname
attribute’s setter must
run these steps:
-
If context object’s url’s cannot-be-a-base-URL flag is set, terminate these steps.
-
Empty context object’s url’s path.
-
Basic URL parse the given value with context object’s url as url and path start state as state override.
The search
attribute’s getter must run these steps:
-
If context object’s url’s query is either null or the empty string, return the empty string.
-
Return "
?
", followed by context object’s url’s query.
The search
attribute’s setter must run these
steps:
-
Let url be context object’s url.
-
If the given value is the empty string, set url’s query to null, empty context object’s query object’s list, and terminate these steps.
-
Let input be the given value with a single leading "
?
" removed, if any. -
Set url’s query to the empty string.
-
Basic URL parse input with url as url and query state as state override.
-
Set context object’s query object’s list to the result of parsing input.
The searchParams
attribute’s getter must return context object’s query object.
The hash
attribute’s
getter must run these steps:
-
If context object’s url’s fragment is either null or the empty string, return the empty string.
-
Return "
#
", followed by context object’s url’s fragment.
The hash
attribute’s setter must run these
steps:
-
If context object’s url’s scheme is "
javascript
", terminate these steps. -
If the given value is the empty string, set context object’s url’s fragment to null and terminate these steps.
-
Let input be the given value with a single leading "
#
" removed, if any. -
Set context object’s url’s fragment to the empty string.
-
Basic URL parse input with context object’s url as url and fragment state as state override.
6.3. Interface URLSearchParams
[Constructor(optional (sequence<sequence<USVString>> or record<USVString, USVString> or USVString) init = ""), Exposed=(Window,Worker)] interface URLSearchParams { void append(USVString name, USVString value); void delete(USVString name); USVString? get(USVString name); sequence<USVString> getAll(USVString name); boolean has(USVString name); void set(USVString name, USVString value); void sort(); iterable<USVString, USVString>; stringifier; };
Constructing and stringifying a URLSearchParams
object is fairly straightforward:
let params = new URLSearchParams({key: "730d67"})
params.toString() // "key=730d67"
A URLSearchParams
object has an associated list of name-value pairs,
which is initially empty.
A URLSearchParams
object has an associated url object, which is
initially null.
To create a new URLSearchParams
object, optionally using init, run these steps:
-
Let query be a new
URLSearchParams
object. -
If init is a sequence, then for each pair in init:
-
Otherwise, if init is a record, then for each mapping (name, value) in init, append a new name-value pair whose name is name and value is value, to query’s list.
-
Otherwise, init is a string, then set query’s list to the result of parsing init.
-
Return query.
A URLSearchParams
object’s update steps are to set url object’s url’s query to the serialization of URLSearchParams
object’s list.
The URLSearchParams(init)
constructor, when invoked, must run these steps:
-
If init is given, is a string, and starts with "
?
", remove the first code point from init. -
Return a new
URLSearchParams
object, using init if given.
The append(name, value)
method, when invoked, must run these steps:
-
Append a new name-value pair whose name is name and value is value, to list.
-
Run the update steps.
The delete(name)
method, when
invoked, must run these steps:
-
Remove all name-value pairs whose name is name from list.
-
Run the update steps.
The get(name)
method, when invoked, must return the value of the first name-value pair whose name is name in list, if there is such a pair, and null otherwise.
The getAll(name)
method, when invoked, must return the values of all name-value pairs whose name is name,
in list, in list order, and the empty sequence otherwise.
The has(name)
method, when invoked, must return true if there is a name-value pair whose name is name in list, and false otherwise.
The set(name, value)
method, when invoked, must run these steps:
-
If there are any name-value pairs whose name is name, in list, set the value of the first such name-value pair to value and remove the others.
-
Otherwise, append a new name-value pair whose name is name and value is value, to list.
-
Run the update steps.
It can be useful to sort the name-value pairs in a URLSearchParams
object, in particular to
increase cache hits. This can be accomplished simply through invoking the sort()
method:
const url = new URL("https://example.org/?q=🏳️🌈&key=e1f7bc78");
url.searchParams.sort();
url.search; // "?key=e1f7bc78&q=%F0%9F%8F%B3%EF%B8%8F%E2%80%8D%F0%9F%8C%88"
To avoid altering the original input, e.g., for comparison purposes, construct a new URLSearchParams
object:
const sorted = new URLSearchParams(url.search)
sorted.sort()
The sort()
method, when invoked, must run
these steps:
-
Sort all name-value pairs, if any, by their names. Sorting must be done by comparison of code units. The relative order between name-value pairs with equal names must be preserved.
-
Run the update steps.
The value pairs to iterate over are the list name-value pairs with the key being the name and the value being the value.
The stringification behavior must return the serialization of the URLSearchParams
object’s list.
6.4. URL APIs elsewhere
A standard that exposes URLs, should expose the URL as a
string (by serializing an internal URL). A
standard should not expose a URL using a URL
object. URL
objects
are meant for URL manipulation. In IDL the USVString type should be used.
The higher-level notion here is that values are to be exposed as immutable data structures.
If a standard decides to use a variant of the name "URL" for a feature it defines, it should name such a feature "url" (i.e., lowercase and with an "l" at the end). Names such as "URL", "URI", and "IRI" should not be used. However, if the name is a compound, "URL" (i.e., uppercase) is preferred, e.g., "newURL" and "oldURL".
The EventSource
and HashChangeEvent
interfaces in HTML are examples of
proper naming. [HTML]
Acknowledgments
There have been a lot of people that have helped make URLs more interoperable over the years and thereby furthered the goals of this standard. Likewise many people have helped making this standard what it is today.
With that, many thanks to 100の人, Adam Barth, Addison Phillips, Albert Wiersch, Alex Christensen, Alexandre Morgaut, Andrew Sullivan, Arkadiusz Michalski, Behnam Esfahbod, Bobby Holley, Boris Zbarsky, Brad Hill, Brandon Ross, Chris Dumez, Chris Rebert, Corey Farwell, Dan Appelquist, Daniel Bratell, David Burns, David Håsäther, David Sheets, David Singer, David Walp, Domenic Denicola, Erik Arvidsson, Gavin Carothers, Geoff Richards, Glenn Maynard, Henri Sivonen, Ian Hickson, Ilya Grigorik, Italo A. Casas, Jakub Gieryluk, James Graham, James Manger, James Ross, Jeffrey Posnick, Joe Duarte, Joshua Bell, Jxck, Kevin Grandon, Kornel Lesiński, Larry Masinter, Leif Halvard Silli, Mark Davis, Marcos Cáceres, Martin Dürst, Mathias Bynens, Michael Peick, Michael™ Smith, Michel Suignard, Noah Levitt, Peter Occil, Philip Jägenstedt, Prayag Verma, Rimas Misevičius, Rodney Rehm, Roy Fielding, Ryan Sleevi, Sam Ruby, Santiago M. Mola, Sebastian Mayr, Simon Pieters, Simon Sapin, Steven Vachon, Stuart Cook, Sven Uhlig, Tab Atkins, 吉野剛史 (Takeshi Yoshino), Tantek Çelik, Tiancheng "Timothy" Gu, Tim Berners-Lee, 簡冠庭 (Tim Guan-tin Chien), Titi_Alone, Tomek Wytrębowicz, Valentin Gosu, Vyacheslav Matva, Wei Wang, 山岸和利 (Yamagishi Kazutoshi), and 成瀬ゆい (Yui Naruse) for being awesome!
This standard is written by Anne van Kesteren (Mozilla, annevk@annevk.nl).
Per CC0, to the extent possible under law, the editors have waived all copyright and related or neighboring rights to this work.