| Classes in this File | Line Coverage | Branch Coverage | Complexity | ||||
| UrlValidator |
|
| 5.0588235294117645;5.059 |
| 1 | /* | |
| 2 | * Licensed to the Apache Software Foundation (ASF) under one or more | |
| 3 | * contributor license agreements. See the NOTICE file distributed with | |
| 4 | * this work for additional information regarding copyright ownership. | |
| 5 | * The ASF licenses this file to You under the Apache License, Version 2.0 | |
| 6 | * (the "License"); you may not use this file except in compliance with | |
| 7 | * the License. You may obtain a copy of the License at | |
| 8 | * | |
| 9 | * http://www.apache.org/licenses/LICENSE-2.0 | |
| 10 | * | |
| 11 | * Unless required by applicable law or agreed to in writing, software | |
| 12 | * distributed under the License is distributed on an "AS IS" BASIS, | |
| 13 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | |
| 14 | * See the License for the specific language governing permissions and | |
| 15 | * limitations under the License. | |
| 16 | */ | |
| 17 | package org.apache.commons.validator.routines; | |
| 18 | ||
| 19 | import java.io.Serializable; | |
| 20 | import java.net.URI; | |
| 21 | import java.net.URISyntaxException; | |
| 22 | import java.util.Collections; | |
| 23 | import java.util.HashSet; | |
| 24 | import java.util.Locale; | |
| 25 | import java.util.Set; | |
| 26 | import java.util.regex.Matcher; | |
| 27 | import java.util.regex.Pattern; | |
| 28 | ||
| 29 | /** | |
| 30 | * <p><b>URL Validation</b> routines.</p> | |
| 31 | * Behavior of validation is modified by passing in options: | |
| 32 | * <ul> | |
| 33 | * <li>ALLOW_2_SLASHES - [FALSE] Allows double '/' characters in the path | |
| 34 | * component.</li> | |
| 35 | * <li>NO_FRAGMENT- [FALSE] By default fragments are allowed, if this option is | |
| 36 | * included then fragments are flagged as illegal.</li> | |
| 37 | * <li>ALLOW_ALL_SCHEMES - [FALSE] By default only http, https, and ftp are | |
| 38 | * considered valid schemes. Enabling this option will let any scheme pass validation.</li> | |
| 39 | * </ul> | |
| 40 | * | |
| 41 | * <p>Originally based in on php script by Debbie Dyer, validation.php v1.2b, Date: 03/07/02, | |
| 42 | * http://javascript.internet.com. However, this validation now bears little resemblance | |
| 43 | * to the php original.</p> | |
| 44 | * <pre> | |
| 45 | * Example of usage: | |
| 46 | * Construct a UrlValidator with valid schemes of "http", and "https". | |
| 47 | * | |
| 48 | * String[] schemes = {"http","https"}. | |
| 49 | * UrlValidator urlValidator = new UrlValidator(schemes); | |
| 50 | * if (urlValidator.isValid("ftp://foo.bar.com/")) { | |
| 51 | * System.out.println("url is valid"); | |
| 52 | * } else { | |
| 53 | * System.out.println("url is invalid"); | |
| 54 | * } | |
| 55 | * | |
| 56 | * prints "url is invalid" | |
| 57 | * If instead the default constructor is used. | |
| 58 | * | |
| 59 | * UrlValidator urlValidator = new UrlValidator(); | |
| 60 | * if (urlValidator.isValid("ftp://foo.bar.com/")) { | |
| 61 | * System.out.println("url is valid"); | |
| 62 | * } else { | |
| 63 | * System.out.println("url is invalid"); | |
| 64 | * } | |
| 65 | * | |
| 66 | * prints out "url is valid" | |
| 67 | * </pre> | |
| 68 | * | |
| 69 | * @see | |
| 70 | * <a href="http://www.ietf.org/rfc/rfc2396.txt"> | |
| 71 | * Uniform Resource Identifiers (URI): Generic Syntax | |
| 72 | * </a> | |
| 73 | * | |
| 74 | * @version $Revision: 1783203 $ | |
| 75 | * @since Validator 1.4 | |
| 76 | */ | |
| 77 | public class UrlValidator implements Serializable { | |
| 78 | ||
| 79 | private static final long serialVersionUID = 7557161713937335013L; | |
| 80 | ||
| 81 | private static final int MAX_UNSIGNED_16_BIT_INT = 0xFFFF; // port max | |
| 82 | ||
| 83 | /** | |
| 84 | * Allows all validly formatted schemes to pass validation instead of | |
| 85 | * supplying a set of valid schemes. | |
| 86 | */ | |
| 87 | public static final long ALLOW_ALL_SCHEMES = 1 << 0; | |
| 88 | ||
| 89 | /** | |
| 90 | * Allow two slashes in the path component of the URL. | |
| 91 | */ | |
| 92 | public static final long ALLOW_2_SLASHES = 1 << 1; | |
| 93 | ||
| 94 | /** | |
| 95 | * Enabling this options disallows any URL fragments. | |
| 96 | */ | |
| 97 | public static final long NO_FRAGMENTS = 1 << 2; | |
| 98 | ||
| 99 | /** | |
| 100 | * Allow local URLs, such as http://localhost/ or http://machine/ . | |
| 101 | * This enables a broad-brush check, for complex local machine name | |
| 102 | * validation requirements you should create your validator with | |
| 103 | * a {@link RegexValidator} instead ({@link #UrlValidator(RegexValidator, long)}) | |
| 104 | */ | |
| 105 | public static final long ALLOW_LOCAL_URLS = 1 << 3; // CHECKSTYLE IGNORE MagicNumber | |
| 106 | ||
| 107 | /** | |
| 108 | * This expression derived/taken from the BNF for URI (RFC2396). | |
| 109 | */ | |
| 110 | private static final String URL_REGEX = | |
| 111 | "^(([^:/?#]+):)?(//([^/?#]*))?([^?#]*)(\\?([^#]*))?(#(.*))?"; | |
| 112 | // 12 3 4 5 6 7 8 9 | |
| 113 | 1 | private static final Pattern URL_PATTERN = Pattern.compile(URL_REGEX); |
| 114 | ||
| 115 | /** | |
| 116 | * Schema/Protocol (ie. http:, ftp:, file:, etc). | |
| 117 | */ | |
| 118 | private static final int PARSE_URL_SCHEME = 2; | |
| 119 | ||
| 120 | /** | |
| 121 | * Includes hostname/ip and port number. | |
| 122 | */ | |
| 123 | private static final int PARSE_URL_AUTHORITY = 4; | |
| 124 | ||
| 125 | private static final int PARSE_URL_PATH = 5; | |
| 126 | ||
| 127 | private static final int PARSE_URL_QUERY = 7; | |
| 128 | ||
| 129 | private static final int PARSE_URL_FRAGMENT = 9; | |
| 130 | ||
| 131 | /** | |
| 132 | * Protocol scheme (e.g. http, ftp, https). | |
| 133 | */ | |
| 134 | private static final String SCHEME_REGEX = "^\\p{Alpha}[\\p{Alnum}\\+\\-\\.]*"; | |
| 135 | 1 | private static final Pattern SCHEME_PATTERN = Pattern.compile(SCHEME_REGEX); |
| 136 | ||
| 137 | // Drop numeric, and "+-." for now | |
| 138 | // TODO does not allow for optional userinfo. | |
| 139 | // Validation of character set is done by isValidAuthority | |
| 140 | private static final String AUTHORITY_CHARS_REGEX = "\\p{Alnum}\\-\\."; // allows for IPV4 but not IPV6 | |
| 141 | private static final String IPV6_REGEX = "[0-9a-fA-F:]+"; // do this as separate match because : could cause ambiguity with port prefix | |
| 142 | ||
| 143 | // userinfo = *( unreserved / pct-encoded / sub-delims / ":" ) | |
| 144 | // unreserved = ALPHA / DIGIT / "-" / "." / "_" / "~" | |
| 145 | // sub-delims = "!" / "$" / "&" / "'" / "(" / ")" / "*" / "+" / "," / ";" / "=" | |
| 146 | // We assume that password has the same valid chars as user info | |
| 147 | private static final String USERINFO_CHARS_REGEX = "[a-zA-Z0-9%-._~!$&'()*+,;=]"; | |
| 148 | // since neither ':' nor '@' are allowed chars, we don't need to use non-greedy matching | |
| 149 | private static final String USERINFO_FIELD_REGEX = | |
| 150 | USERINFO_CHARS_REGEX + "+" + // At least one character for the name | |
| 151 | "(?::" + USERINFO_CHARS_REGEX + "*)?@"; // colon and password may be absent | |
| 152 | private static final String AUTHORITY_REGEX = | |
| 153 | "(?:\\[("+IPV6_REGEX+")\\]|(?:(?:"+USERINFO_FIELD_REGEX+")?([" + AUTHORITY_CHARS_REGEX + "]*)))(?::(\\d*))?(.*)?"; | |
| 154 | // 1 e.g. user:pass@ 2 3 4 | |
| 155 | 1 | private static final Pattern AUTHORITY_PATTERN = Pattern.compile(AUTHORITY_REGEX); |
| 156 | ||
| 157 | private static final int PARSE_AUTHORITY_IPV6 = 1; | |
| 158 | ||
| 159 | private static final int PARSE_AUTHORITY_HOST_IP = 2; // excludes userinfo, if present | |
| 160 | ||
| 161 | private static final int PARSE_AUTHORITY_PORT = 3; // excludes leading colon | |
| 162 | ||
| 163 | /** | |
| 164 | * Should always be empty. The code currently allows spaces. | |
| 165 | */ | |
| 166 | private static final int PARSE_AUTHORITY_EXTRA = 4; | |
| 167 | ||
| 168 | private static final String PATH_REGEX = "^(/[-\\w:@&?=+,.!/~*'%$_;\\(\\)]*)?$"; | |
| 169 | 1 | private static final Pattern PATH_PATTERN = Pattern.compile(PATH_REGEX); |
| 170 | ||
| 171 | private static final String QUERY_REGEX = "^(\\S*)$"; | |
| 172 | 1 | private static final Pattern QUERY_PATTERN = Pattern.compile(QUERY_REGEX); |
| 173 | ||
| 174 | /** | |
| 175 | * Holds the set of current validation options. | |
| 176 | */ | |
| 177 | private final long options; | |
| 178 | ||
| 179 | /** | |
| 180 | * The set of schemes that are allowed to be in a URL. | |
| 181 | */ | |
| 182 | private final Set<String> allowedSchemes; // Must be lower-case | |
| 183 | ||
| 184 | /** | |
| 185 | * Regular expressions used to manually validate authorities if IANA | |
| 186 | * domain name validation isn't desired. | |
| 187 | */ | |
| 188 | private final RegexValidator authorityValidator; | |
| 189 | ||
| 190 | /** | |
| 191 | * If no schemes are provided, default to this set. | |
| 192 | */ | |
| 193 | 1 | private static final String[] DEFAULT_SCHEMES = {"http", "https", "ftp"}; // Must be lower-case |
| 194 | ||
| 195 | /** | |
| 196 | * Singleton instance of this class with default schemes and options. | |
| 197 | */ | |
| 198 | 1 | private static final UrlValidator DEFAULT_URL_VALIDATOR = new UrlValidator(); |
| 199 | ||
| 200 | /** | |
| 201 | * Returns the singleton instance of this class with default schemes and options. | |
| 202 | * @return singleton instance with default schemes and options | |
| 203 | */ | |
| 204 | public static UrlValidator getInstance() { | |
| 205 | 0 | return DEFAULT_URL_VALIDATOR; |
| 206 | } | |
| 207 | ||
| 208 | /** | |
| 209 | * Create a UrlValidator with default properties. | |
| 210 | */ | |
| 211 | public UrlValidator() { | |
| 212 | 17 | this(null); |
| 213 | 17 | } |
| 214 | ||
| 215 | /** | |
| 216 | * Behavior of validation is modified by passing in several strings options: | |
| 217 | * @param schemes Pass in one or more url schemes to consider valid, passing in | |
| 218 | * a null will default to "http,https,ftp" being valid. | |
| 219 | * If a non-null schemes is specified then all valid schemes must | |
| 220 | * be specified. Setting the ALLOW_ALL_SCHEMES option will | |
| 221 | * ignore the contents of schemes. | |
| 222 | */ | |
| 223 | public UrlValidator(String[] schemes) { | |
| 224 | 21 | this(schemes, 0L); |
| 225 | 21 | } |
| 226 | ||
| 227 | /** | |
| 228 | * Initialize a UrlValidator with the given validation options. | |
| 229 | * @param options The options should be set using the public constants declared in | |
| 230 | * this class. To set multiple options you simply add them together. For example, | |
| 231 | * ALLOW_2_SLASHES + NO_FRAGMENTS enables both of those options. | |
| 232 | */ | |
| 233 | public UrlValidator(long options) { | |
| 234 | 4 | this(null, null, options); |
| 235 | 4 | } |
| 236 | ||
| 237 | /** | |
| 238 | * Behavior of validation is modified by passing in options: | |
| 239 | * @param schemes The set of valid schemes. Ignored if the ALLOW_ALL_SCHEMES option is set. | |
| 240 | * @param options The options should be set using the public constants declared in | |
| 241 | * this class. To set multiple options you simply add them together. For example, | |
| 242 | * ALLOW_2_SLASHES + NO_FRAGMENTS enables both of those options. | |
| 243 | */ | |
| 244 | public UrlValidator(String[] schemes, long options) { | |
| 245 | 24 | this(schemes, null, options); |
| 246 | 24 | } |
| 247 | ||
| 248 | /** | |
| 249 | * Initialize a UrlValidator with the given validation options. | |
| 250 | * @param authorityValidator Regular expression validator used to validate the authority part | |
| 251 | * This allows the user to override the standard set of domains. | |
| 252 | * @param options Validation options. Set using the public constants of this class. | |
| 253 | * To set multiple options, simply add them together: | |
| 254 | * <p><code>ALLOW_2_SLASHES + NO_FRAGMENTS</code></p> | |
| 255 | * enables both of those options. | |
| 256 | */ | |
| 257 | public UrlValidator(RegexValidator authorityValidator, long options) { | |
| 258 | 1 | this(null, authorityValidator, options); |
| 259 | 1 | } |
| 260 | ||
| 261 | /** | |
| 262 | * Customizable constructor. Validation behavior is modifed by passing in options. | |
| 263 | * @param schemes the set of valid schemes. Ignored if the ALLOW_ALL_SCHEMES option is set. | |
| 264 | * @param authorityValidator Regular expression validator used to validate the authority part | |
| 265 | * @param options Validation options. Set using the public constants of this class. | |
| 266 | * To set multiple options, simply add them together: | |
| 267 | * <p><code>ALLOW_2_SLASHES + NO_FRAGMENTS</code></p> | |
| 268 | * enables both of those options. | |
| 269 | */ | |
| 270 | 31 | public UrlValidator(String[] schemes, RegexValidator authorityValidator, long options) { |
| 271 | 31 | this.options = options; |
| 272 | ||
| 273 | 31 | if (isOn(ALLOW_ALL_SCHEMES)) { |
| 274 | 2 | allowedSchemes = Collections.emptySet(); |
| 275 | } else { | |
| 276 | 29 | if (schemes == null) { |
| 277 | 22 | schemes = DEFAULT_SCHEMES; |
| 278 | } | |
| 279 | 29 | allowedSchemes = new HashSet<String>(schemes.length); |
| 280 | 109 | for(int i=0; i < schemes.length; i++) { |
| 281 | 80 | allowedSchemes.add(schemes[i].toLowerCase(Locale.ENGLISH)); |
| 282 | } | |
| 283 | } | |
| 284 | ||
| 285 | 31 | this.authorityValidator = authorityValidator; |
| 286 | 31 | } |
| 287 | ||
| 288 | /** | |
| 289 | * <p>Checks if a field has a valid url address.</p> | |
| 290 | * | |
| 291 | * Note that the method calls #isValidAuthority() | |
| 292 | * which checks that the domain is valid. | |
| 293 | * | |
| 294 | * @param value The value validation is being performed on. A <code>null</code> | |
| 295 | * value is considered invalid. | |
| 296 | * @return true if the url is valid. | |
| 297 | */ | |
| 298 | public boolean isValid(String value) { | |
| 299 | 108137 | if (value == null) { |
| 300 | 0 | return false; |
| 301 | } | |
| 302 | ||
| 303 | // Check the whole url address structure | |
| 304 | 108137 | Matcher urlMatcher = URL_PATTERN.matcher(value); |
| 305 | 108137 | if (!urlMatcher.matches()) { |
| 306 | 0 | return false; |
| 307 | } | |
| 308 | ||
| 309 | 108137 | String scheme = urlMatcher.group(PARSE_URL_SCHEME); |
| 310 | 108137 | if (!isValidScheme(scheme)) { |
| 311 | 40505 | return false; |
| 312 | } | |
| 313 | ||
| 314 | 67632 | String authority = urlMatcher.group(PARSE_URL_AUTHORITY); |
| 315 | 67632 | if ("file".equals(scheme)) {// Special case - file: allows an empty authority |
| 316 | 9 | if (authority != null) { |
| 317 | 8 | if (authority.contains(":")) { // but cannot allow trailing : |
| 318 | 2 | return false; |
| 319 | } | |
| 320 | } | |
| 321 | // drop through to continue validation | |
| 322 | } else { // not file: | |
| 323 | // Validate the authority | |
| 324 | 67623 | if (!isValidAuthority(authority)) { |
| 325 | 60320 | return false; |
| 326 | } | |
| 327 | } | |
| 328 | ||
| 329 | 7310 | if (!isValidPath(urlMatcher.group(PARSE_URL_PATH))) { |
| 330 | 2310 | return false; |
| 331 | } | |
| 332 | ||
| 333 | 5000 | if (!isValidQuery(urlMatcher.group(PARSE_URL_QUERY))) { |
| 334 | 1 | return false; |
| 335 | } | |
| 336 | ||
| 337 | 4999 | if (!isValidFragment(urlMatcher.group(PARSE_URL_FRAGMENT))) { |
| 338 | 576 | return false; |
| 339 | } | |
| 340 | ||
| 341 | 4423 | return true; |
| 342 | } | |
| 343 | ||
| 344 | /** | |
| 345 | * Validate scheme. If schemes[] was initialized to a non null, | |
| 346 | * then only those schemes are allowed. | |
| 347 | * Otherwise the default schemes are "http", "https", "ftp". | |
| 348 | * Matching is case-blind. | |
| 349 | * @param scheme The scheme to validate. A <code>null</code> value is considered | |
| 350 | * invalid. | |
| 351 | * @return true if valid. | |
| 352 | */ | |
| 353 | protected boolean isValidScheme(String scheme) { | |
| 354 | 108145 | if (scheme == null) { |
| 355 | 27000 | return false; |
| 356 | } | |
| 357 | ||
| 358 | // TODO could be removed if external schemes were checked in the ctor before being stored | |
| 359 | 81145 | if (!SCHEME_PATTERN.matcher(scheme).matches()) { |
| 360 | 13501 | return false; |
| 361 | } | |
| 362 | ||
| 363 | 67644 | if (isOff(ALLOW_ALL_SCHEMES) && !allowedSchemes.contains(scheme.toLowerCase(Locale.ENGLISH))) { |
| 364 | 8 | return false; |
| 365 | } | |
| 366 | ||
| 367 | 67636 | return true; |
| 368 | } | |
| 369 | ||
| 370 | /** | |
| 371 | * Returns true if the authority is properly formatted. An authority is the combination | |
| 372 | * of hostname and port. A <code>null</code> authority value is considered invalid. | |
| 373 | * Note: this implementation validates the domain unless a RegexValidator was provided. | |
| 374 | * If a RegexValidator was supplied and it matches, then the authority is regarded | |
| 375 | * as valid with no further checks, otherwise the method checks against the | |
| 376 | * AUTHORITY_PATTERN and the DomainValidator (ALLOW_LOCAL_URLS) | |
| 377 | * @param authority Authority value to validate, alllows IDN | |
| 378 | * @return true if authority (hostname and port) is valid. | |
| 379 | */ | |
| 380 | protected boolean isValidAuthority(String authority) { | |
| 381 | 67623 | if (authority == null) { |
| 382 | 26931 | return false; |
| 383 | } | |
| 384 | ||
| 385 | // check manual authority validation if specified | |
| 386 | 40692 | if (authorityValidator != null && authorityValidator.isValid(authority)) { |
| 387 | 3 | return true; |
| 388 | } | |
| 389 | // convert to ASCII if possible | |
| 390 | 40689 | final String authorityASCII = DomainValidator.unicodeToASCII(authority); |
| 391 | ||
| 392 | 40689 | Matcher authorityMatcher = AUTHORITY_PATTERN.matcher(authorityASCII); |
| 393 | 40689 | if (!authorityMatcher.matches()) { |
| 394 | 0 | return false; |
| 395 | } | |
| 396 | ||
| 397 | // We have to process IPV6 separately because that is parsed in a different group | |
| 398 | 40689 | String ipv6 = authorityMatcher.group(PARSE_AUTHORITY_IPV6); |
| 399 | 40689 | if (ipv6 != null) { |
| 400 | 2 | InetAddressValidator inetAddressValidator = InetAddressValidator.getInstance(); |
| 401 | 2 | if (!inetAddressValidator.isValidInet6Address(ipv6)) { |
| 402 | 0 | return false; |
| 403 | } | |
| 404 | 2 | } else { |
| 405 | 40687 | String hostLocation = authorityMatcher.group(PARSE_AUTHORITY_HOST_IP); |
| 406 | // check if authority is hostname or IP address: | |
| 407 | // try a hostname first since that's much more likely | |
| 408 | 40687 | DomainValidator domainValidator = DomainValidator.getInstance(isOn(ALLOW_LOCAL_URLS)); |
| 409 | 40687 | if (!domainValidator.isValid(hostLocation)) { |
| 410 | // try an IPv4 address | |
| 411 | 28437 | InetAddressValidator inetAddressValidator = InetAddressValidator.getInstance(); |
| 412 | 28437 | if (!inetAddressValidator.isValidInet4Address(hostLocation)) { |
| 413 | // isn't IPv4, so the URL is invalid | |
| 414 | 24387 | return false; |
| 415 | } | |
| 416 | } | |
| 417 | 16300 | String port = authorityMatcher.group(PARSE_AUTHORITY_PORT); |
| 418 | 16300 | if (port != null && port.length() > 0) { |
| 419 | try { | |
| 420 | 12612 | int iPort = Integer.parseInt(port); |
| 421 | 10812 | if (iPort < 0 || iPort > MAX_UNSIGNED_16_BIT_INT) { |
| 422 | 3602 | return false; |
| 423 | } | |
| 424 | 1800 | } catch (NumberFormatException nfe) { |
| 425 | 1800 | return false; // this can happen for big numbers |
| 426 | 7210 | } |
| 427 | } | |
| 428 | } | |
| 429 | ||
| 430 | 10900 | String extra = authorityMatcher.group(PARSE_AUTHORITY_EXTRA); |
| 431 | 10900 | if (extra != null && extra.trim().length() > 0){ |
| 432 | 3600 | return false; |
| 433 | } | |
| 434 | ||
| 435 | 7300 | return true; |
| 436 | } | |
| 437 | ||
| 438 | /** | |
| 439 | * Returns true if the path is valid. A <code>null</code> value is considered invalid. | |
| 440 | * @param path Path value to validate. | |
| 441 | * @return true if path is valid. | |
| 442 | */ | |
| 443 | protected boolean isValidPath(String path) { | |
| 444 | 7310 | if (path == null) { |
| 445 | 0 | return false; |
| 446 | } | |
| 447 | ||
| 448 | 7310 | if (!PATH_PATTERN.matcher(path).matches()) { |
| 449 | 1 | return false; |
| 450 | } | |
| 451 | ||
| 452 | try { | |
| 453 | 7309 | URI uri = new URI(null,null,path,null); |
| 454 | 7309 | String norm = uri.normalize().getPath(); |
| 455 | 7309 | if (norm.startsWith("/../") // Trying to go via the parent dir |
| 456 | || norm.equals("/..")) { // Trying to go to the parent dir | |
| 457 | 2021 | return false; |
| 458 | } | |
| 459 | 0 | } catch (URISyntaxException e) { |
| 460 | 0 | return false; |
| 461 | 5288 | } |
| 462 | ||
| 463 | 5288 | int slash2Count = countToken("//", path); |
| 464 | 5288 | if (isOff(ALLOW_2_SLASHES) && (slash2Count > 0)) { |
| 465 | 288 | return false; |
| 466 | } | |
| 467 | ||
| 468 | 5000 | return true; |
| 469 | } | |
| 470 | ||
| 471 | /** | |
| 472 | * Returns true if the query is null or it's a properly formatted query string. | |
| 473 | * @param query Query value to validate. | |
| 474 | * @return true if query is valid. | |
| 475 | */ | |
| 476 | protected boolean isValidQuery(String query) { | |
| 477 | 5000 | if (query == null) { |
| 478 | 2112 | return true; |
| 479 | } | |
| 480 | ||
| 481 | 2888 | return QUERY_PATTERN.matcher(query).matches(); |
| 482 | } | |
| 483 | ||
| 484 | /** | |
| 485 | * Returns true if the given fragment is null or fragments are allowed. | |
| 486 | * @param fragment Fragment value to validate. | |
| 487 | * @return true if fragment is valid. | |
| 488 | */ | |
| 489 | protected boolean isValidFragment(String fragment) { | |
| 490 | 4999 | if (fragment == null) { |
| 491 | 4422 | return true; |
| 492 | } | |
| 493 | ||
| 494 | 577 | return isOff(NO_FRAGMENTS); |
| 495 | } | |
| 496 | ||
| 497 | /** | |
| 498 | * Returns the number of times the token appears in the target. | |
| 499 | * @param token Token value to be counted. | |
| 500 | * @param target Target value to count tokens in. | |
| 501 | * @return the number of tokens. | |
| 502 | */ | |
| 503 | protected int countToken(String token, String target) { | |
| 504 | 5288 | int tokenIndex = 0; |
| 505 | 5288 | int count = 0; |
| 506 | 11152 | while (tokenIndex != -1) { |
| 507 | 5864 | tokenIndex = target.indexOf(token, tokenIndex); |
| 508 | 5864 | if (tokenIndex > -1) { |
| 509 | 576 | tokenIndex++; |
| 510 | 576 | count++; |
| 511 | } | |
| 512 | } | |
| 513 | 5288 | return count; |
| 514 | } | |
| 515 | ||
| 516 | /** | |
| 517 | * Tests whether the given flag is on. If the flag is not a power of 2 | |
| 518 | * (ie. 3) this tests whether the combination of flags is on. | |
| 519 | * | |
| 520 | * @param flag Flag value to check. | |
| 521 | * | |
| 522 | * @return whether the specified flag value is on. | |
| 523 | */ | |
| 524 | private boolean isOn(long flag) { | |
| 525 | 40718 | return (options & flag) > 0; |
| 526 | } | |
| 527 | ||
| 528 | /** | |
| 529 | * Tests whether the given flag is off. If the flag is not a power of 2 | |
| 530 | * (ie. 3) this tests whether the combination of flags is off. | |
| 531 | * | |
| 532 | * @param flag Flag value to check. | |
| 533 | * | |
| 534 | * @return whether the specified flag value is off. | |
| 535 | */ | |
| 536 | private boolean isOff(long flag) { | |
| 537 | 73509 | return (options & flag) == 0; |
| 538 | } | |
| 539 | ||
| 540 | // Unit test access to pattern matcher | |
| 541 | Matcher matchURL(String value) { | |
| 542 | 0 | return URL_PATTERN.matcher(value); |
| 543 | } | |
| 544 | } |