This is especially useful because the caller doesn't need to generate valid url keys, which involves some escaping of characters, and may involve taking a md5sum of the url if it's too long. |
||
|---|---|---|
| .. | ||
| Hash.hs | ||
| URL.hs | ||
| Utilities.hs | ||
| WORM.hs | ||
This is especially useful because the caller doesn't need to generate valid url keys, which involves some escaping of characters, and may involve taking a md5sum of the url if it's too long. |
||
|---|---|---|
| .. | ||
| Hash.hs | ||
| URL.hs | ||
| Utilities.hs | ||
| WORM.hs | ||