|Relationship Graph||View Issue Dependency Graph|
View Issue Details
|ID||Project||Category||View Status||Date Submitted||Last Update|
|0017638||phpList 3 application||Statistics||public||09-04-15 13:04||29-04-15 20:40|
|Priority||normal||Severity||minor||Reproducibility||have not tried|
|Target Version||Future developments||Fixed in Version|
|Summary||0017638: special characters in links converted and breaking links|
|Description||clicktracking converts links, which then in some cases causes broken and incorrect links:|
For example, it turns http://whatever/publisher/#!/offer/123 into http://whatever/publisher/#%21/offer/123 which breaks links because they can't handle %21 instead of "!".
also %CA is replaced see https://core.trac.wordpress.org/ticket/31777
|Tags||No tags attached.|
||for the moment, the only way around this is to avoid using the characters, or to use a service like bitly.com to concert the URLs|
I could not repeat this problem. The value stored in linktrack_forward is the same as the value I entered in the editor for the url
and that was the value used when I clicked the link in the email.
Yes, like duncan writes, the DB has:
| 110 | http://whatever/publisher/#!/offer/123 | 0 |
and the "Header forward" is exactly that. phpList is not touching or changing the URL, so it is the browser doing the manipulation of the URL. That's probably because #! is the Unix shebang and it smells like a hack attempt.
Best option is to avoid these kinds of URLs.