From a91846ffb58ef6f8bfd74d98409777e9b35f3a07 Mon Sep 17 00:00:00 2001 From: Florian Bruhin Date: Sun, 17 Jan 2021 12:38:19 +0100 Subject: rfc6266: Remove some more --- qutebrowser/browser/webkit/rfc6266.py | 11 ----------- 1 file changed, 11 deletions(-) diff --git a/qutebrowser/browser/webkit/rfc6266.py b/qutebrowser/browser/webkit/rfc6266.py index 35d7895cb..ad1f63ad3 100644 --- a/qutebrowser/browser/webkit/rfc6266.py +++ b/qutebrowser/browser/webkit/rfc6266.py @@ -56,7 +56,6 @@ class _ContentDisposition: well, due to a certain browser using the part after the dot for mime-sniffing. Saving it to a database is fine by itself though. """ - # XXX Reject non-ascii (parsed via qdtext) here? return self.params.get('filename') def is_inline(self): @@ -83,16 +82,6 @@ def parse_headers(content_disposition): # less-than-certain values for some legacy senders. content_disposition = content_disposition.decode('iso-8859-1') - # Our parsing is relaxed in these regards: - # - The grammar allows a final ';' in the header; - # - We do LWS-folding, and possibly normalise other broken - # whitespace, instead of rejecting non-lws-safe text. - # XXX Would prefer to accept only the quoted whitespace - # case, rather than normalising everything. - - if not content_disposition.strip(): - raise Error("Empty value!") - reg = email.headerregistry.HeaderRegistry() parsed = reg('Content-Disposition', content_disposition) -- cgit v1.2.3-54-g00ecf