77c43a388e
This is especially useful because the caller doesn't need to generate valid url keys, which involves some escaping of characters, and may involve taking a md5sum of the url if it's too long. |
||
---|---|---|
.. | ||
Hash.hs | ||
URL.hs | ||
Utilities.hs | ||
WORM.hs |