@@ -1429,16 +1429,16 @@ func TestParseErrors(t *testing.T) {
1429
1429
{"http://[::1]/" , false },
1430
1430
{"http://[::1]a" , true },
1431
1431
{"http://[::1]%23" , true },
1432
- {"http://[::1%25en0]" , false }, // valid zone id
1433
- {"http://[::1]:" , false }, // colon, but no port OK
1434
- {"http://x:" , false }, // colon, but no port OK
1435
- {"http://[::1]:%38%30" , true }, // not allowed: % encoding only for non-ASCII
1436
- {"http://[::1%25%41]" , false }, // RFC 6874 allows over-escaping in zone
1437
- {"http://[%10::1]" , true }, // no %xx escapes in IP address
1438
- {"http://[::1]/%48" , false }, // %xx in path is fine
1439
- {"http://%41:8080/" , true }, // not allowed: % encoding only for non-ASCII
1440
- {"mysql://x@y(z:123)/foo" , false }, // golang.org/issue/12023
1441
- {"mysql://x@y(1.2.3.4:123)/foo" , false },
1432
+ {"http://[::1%25en0]" , false }, // valid zone id
1433
+ {"http://[::1]:" , false }, // colon, but no port OK
1434
+ {"http://x:" , false }, // colon, but no port OK
1435
+ {"http://[::1]:%38%30" , true }, // not allowed: % encoding only for non-ASCII
1436
+ {"http://[::1%25%41]" , false }, // RFC 6874 allows over-escaping in zone
1437
+ {"http://[%10::1]" , true }, // no %xx escapes in IP address
1438
+ {"http://[::1]/%48" , false }, // %xx in path is fine
1439
+ {"http://%41:8080/" , true }, // not allowed: % encoding only for non-ASCII
1440
+ {"mysql://x@y(z:123)/foo" , true }, // not well-formed per RFC 3986, github.com/golang/go/issues/33646
1441
+ {"mysql://x@y(1.2.3.4:123)/foo" , true },
1442
1442
1443
1443
{"http://[]%20%48%54%54%50%2f%31%2e%31%0a%4d%79%48%65%61%64%65%72%3a%20%31%32%33%0a%0a/" , true }, // golang.org/issue/11208
1444
1444
{"http://a b.com/" , true }, // no space in host name please
0 commit comments