123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682 |
- /*
- * Copyright (c) 2021, Max Wipfli <mail@maxwipfli.ch>
- *
- * SPDX-License-Identifier: BSD-2-Clause
- */
- #include <AK/CharacterTypes.h>
- #include <AK/Debug.h>
- #include <AK/Optional.h>
- #include <AK/SourceLocation.h>
- #include <AK/String.h>
- #include <AK/StringBuilder.h>
- #include <AK/StringUtils.h>
- #include <AK/URLParser.h>
- #include <AK/Utf8View.h>
- namespace AK {
- // NOTE: This is similar to the LibC macro EOF = -1.
- constexpr u32 end_of_file = 0xFFFFFFFF;
- constexpr bool is_url_code_point(u32 code_point)
- {
- // FIXME: [...] and code points in the range U+00A0 to U+10FFFD, inclusive, excluding surrogates and noncharacters.
- return is_ascii_alphanumeric(code_point) || code_point >= 0xA0 || "!$&'()*+,-./:;=?@_~"sv.contains(code_point);
- }
- static void report_validation_error(SourceLocation const& location = SourceLocation::current())
- {
- dbgln_if(URL_PARSER_DEBUG, "URLParser::parse: Validation error! {}", location);
- }
- static Optional<String> parse_opaque_host(StringView input)
- {
- auto forbidden_host_code_points_excluding_percent = "\0\t\n\r #/:<>?@[\\]^|"sv;
- for (auto code_point : forbidden_host_code_points_excluding_percent) {
- if (input.contains(code_point)) {
- report_validation_error();
- return {};
- }
- }
- // FIXME: If input contains a code point that is not a URL code point and not U+0025 (%), validation error.
- // FIXME: If input contains a U+0025 (%) and the two code points following it are not ASCII hex digits, validation error.
- return URL::percent_encode(input, URL::PercentEncodeSet::C0Control);
- }
- static Optional<String> parse_ipv4_address(StringView input)
- {
- // FIXME: Implement the correct IPv4 parser as specified by https://url.spec.whatwg.org/#concept-ipv4-parser.
- return input;
- }
- // https://url.spec.whatwg.org/#concept-host-parser
- // NOTE: This is a very bare-bones implementation.
- static Optional<String> parse_host(StringView input, bool is_not_special = false)
- {
- if (input.starts_with('[')) {
- if (!input.ends_with(']')) {
- report_validation_error();
- return {};
- }
- // FIXME: Return the result of IPv6 parsing input with its leading U+005B ([) and trailing U+005D (]) removed.
- TODO();
- }
- if (is_not_special)
- return parse_opaque_host(input);
- VERIFY(!input.is_empty());
- // FIXME: Let domain be the result of running UTF-8 decode without BOM on the percent-decoding of input.
- auto domain = URL::percent_decode(input);
- // FIXME: Let asciiDomain be the result of running domain to ASCII on domain.
- auto& ascii_domain = domain;
- auto forbidden_host_code_points = "\0\t\n\r #%/:<>?@[\\]^|"sv;
- for (auto code_point : forbidden_host_code_points) {
- if (ascii_domain.view().contains(code_point)) {
- report_validation_error();
- return {};
- }
- }
- auto ipv4_host = parse_ipv4_address(ascii_domain);
- return ipv4_host;
- }
- constexpr bool starts_with_windows_drive_letter(StringView input)
- {
- if (input.length() < 2)
- return false;
- if (!is_ascii_alpha(input[0]) && !(input[1] == ':' || input[1] == '|'))
- return false;
- if (input.length() == 2)
- return true;
- return "/\\?#"sv.contains(input[2]);
- }
- constexpr bool is_windows_drive_letter(StringView input)
- {
- return input.length() == 2 && is_ascii_alpha(input[0]) && (input[1] == ':' || input[1] == '|');
- }
- constexpr bool is_normalized_windows_drive_letter(StringView input)
- {
- return input.length() == 2 && is_ascii_alpha(input[0]) && input[1] == ':';
- }
- constexpr bool is_single_dot_path_segment(StringView input)
- {
- return input == "."sv || input.equals_ignoring_case("%2e"sv);
- }
- constexpr bool is_double_dot_path_segment(StringView input)
- {
- return input == ".."sv || input.equals_ignoring_case(".%2e"sv) || input.equals_ignoring_case("%2e."sv) || input.equals_ignoring_case("%2e%2e"sv);
- }
- // https://fetch.spec.whatwg.org/#data-urls
- // FIXME: This only loosely follows the spec, as we use the same class for "regular" and data URLs, unlike the spec.
- Optional<URL> URLParser::parse_data_url(StringView raw_input)
- {
- dbgln_if(URL_PARSER_DEBUG, "URLParser::parse_data_url: Parsing '{}'.", raw_input);
- VERIFY(raw_input.starts_with("data:"));
- auto input = raw_input.substring_view(5);
- auto comma_offset = input.find(',');
- if (!comma_offset.has_value())
- return {};
- auto mime_type = StringUtils::trim(input.substring_view(0, comma_offset.value()), "\t\n\f\r ", TrimMode::Both);
- auto encoded_body = input.substring_view(comma_offset.value() + 1);
- auto body = URL::percent_decode(encoded_body);
- bool is_base64_encoded = false;
- if (mime_type.ends_with("base64", CaseSensitivity::CaseInsensitive)) {
- auto substring_view = mime_type.substring_view(0, mime_type.length() - 6);
- auto trimmed_substring_view = StringUtils::trim(substring_view, " ", TrimMode::Right);
- if (trimmed_substring_view.ends_with(';')) {
- is_base64_encoded = true;
- mime_type = trimmed_substring_view.substring_view(0, trimmed_substring_view.length() - 1);
- }
- }
- StringBuilder builder;
- if (mime_type.starts_with(";") || mime_type.is_empty()) {
- builder.append("text/plain");
- builder.append(mime_type);
- mime_type = builder.string_view();
- }
- // FIXME: Parse the MIME type's components according to https://mimesniff.spec.whatwg.org/#parse-a-mime-type
- URL url { StringUtils::trim(mime_type, "\n\r\t ", TrimMode::Both), move(body), is_base64_encoded };
- dbgln_if(URL_PARSER_DEBUG, "URLParser::parse_data_url: Parsed data URL to be '{}'.", url.serialize());
- return url;
- }
- // https://url.spec.whatwg.org/#concept-basic-url-parser
- // NOTE: This parser assumes a UTF-8 encoding.
- // NOTE: Refrain from using the URL classes setters inside this algorithm. Rather, set the values directly. This bypasses the setters' built-in
- // validation, which is strictly unnecessary since we set m_valid=true at the end anyways. Furthermore, this algorithm may be used in the
- // future for validation of URLs, which would then lead to infinite recursion.
- // The same goes for base_url, because e.g. the port() getter does not always return m_port, and we are interested in the underlying member
- // variables' values here, not what the URL class presents to its users.
- // NOTE: Since the URL class's member variables contain percent decoded data, we have to deviate from the URL parser specification when setting
- // some of those values. Because the specification leaves all values percent encoded in their URL data structure, we have to percent decode
- // everything before setting the member variables.
- URL URLParser::parse(StringView raw_input, URL const* base_url, Optional<URL> url, Optional<State> state_override)
- {
- dbgln_if(URL_PARSER_DEBUG, "URLParser::parse: Parsing '{}'", raw_input);
- if (raw_input.is_empty())
- return {};
- if (raw_input.starts_with("data:")) {
- auto maybe_url = parse_data_url(raw_input);
- if (!maybe_url.has_value())
- return {};
- return maybe_url.release_value();
- }
- size_t start_index = 0;
- size_t end_index = raw_input.length();
- if (!url.has_value()) {
- url = URL();
- // NOTE: This removes all leading and trailing C0 control or space characters.
- bool has_validation_error = false;
- for (size_t i = 0; i < raw_input.length(); ++i) {
- i8 ch = raw_input[i];
- if (0 <= ch && ch <= 0x20) {
- ++start_index;
- has_validation_error = true;
- } else {
- break;
- }
- }
- for (ssize_t i = raw_input.length() - 1; i >= 0; --i) {
- i8 ch = raw_input[i];
- if (0 <= ch && ch <= 0x20) {
- --end_index;
- has_validation_error = true;
- } else {
- break;
- }
- }
- if (has_validation_error)
- report_validation_error();
- }
- if (start_index >= end_index)
- return {};
- String processed_input = raw_input.substring_view(start_index, end_index - start_index);
- // NOTE: This replaces all tab and newline characters with nothing.
- if (processed_input.contains("\t") || processed_input.contains("\n")) {
- report_validation_error();
- processed_input = processed_input.replace("\t", "", true).replace("\n", "", true);
- }
- State state = state_override.value_or(State::SchemeStart);
- StringBuilder buffer;
- bool at_sign_seen = false;
- bool inside_brackets = false;
- bool password_token_seen = false;
- Utf8View input(processed_input);
- Utf8CodePointIterator iterator = input.begin();
- auto get_remaining = [&input, &iterator] {
- return input.substring_view(iterator - input.begin() + iterator.underlying_code_point_length_in_bytes()).as_string();
- };
- // NOTE: "continue" should only be used to prevent incrementing the iterator, as this is done at the end of the loop.
- // ++iterator : "increase pointer by 1"
- // continue : "decrease pointer by 1"
- for (;;) {
- u32 code_point = end_of_file;
- if (!iterator.done())
- code_point = *iterator;
- if constexpr (URL_PARSER_DEBUG) {
- if (code_point == end_of_file)
- dbgln("URLParser::parse: {} state with EOF.", state_name(state));
- else if (is_ascii_printable(code_point))
- dbgln("URLParser::parse: {} state with code point U+{:04X} ({:c}).", state_name(state), code_point, code_point);
- else
- dbgln("URLParser::parse: {} state with code point U+{:04X}.", state_name(state), code_point);
- }
- switch (state) {
- case State::SchemeStart:
- if (is_ascii_alpha(code_point)) {
- buffer.append_as_lowercase(code_point);
- state = State::Scheme;
- } else {
- state = State::NoScheme;
- continue;
- }
- break;
- case State::Scheme:
- if (is_ascii_alphanumeric(code_point) || code_point == '+' || code_point == '-' || code_point == '.') {
- buffer.append_as_lowercase(code_point);
- } else if (code_point == ':') {
- url->m_scheme = buffer.to_string();
- buffer.clear();
- if (url->scheme() == "file") {
- if (!get_remaining().starts_with("//")) {
- report_validation_error();
- }
- state = State::File;
- } else if (url->is_special()) {
- if (base_url && base_url->m_scheme == url->m_scheme)
- state = State::SpecialRelativeOrAuthority;
- else
- state = State::SpecialAuthoritySlashes;
- } else if (get_remaining().starts_with("/")) {
- state = State::PathOrAuthority;
- ++iterator;
- } else {
- url->m_cannot_be_a_base_url = true;
- url->append_path("");
- state = State::CannotBeABaseUrlPath;
- }
- } else {
- buffer.clear();
- state = State::NoScheme;
- iterator = input.begin();
- continue;
- }
- break;
- case State::NoScheme:
- if (!base_url || (base_url->m_cannot_be_a_base_url && code_point != '#')) {
- report_validation_error();
- return {};
- } else if (base_url->m_cannot_be_a_base_url && code_point == '#') {
- url->m_scheme = base_url->m_scheme;
- url->m_paths = base_url->m_paths;
- url->m_query = base_url->m_query;
- url->m_fragment = "";
- url->m_cannot_be_a_base_url = true;
- state = State::Fragment;
- } else if (base_url->m_scheme != "file") {
- state = State::Relative;
- continue;
- } else {
- state = State::File;
- continue;
- }
- break;
- case State::SpecialRelativeOrAuthority:
- if (code_point == '/' && get_remaining().starts_with("/")) {
- state = State::SpecialAuthorityIgnoreSlashes;
- ++iterator;
- } else {
- report_validation_error();
- state = State::Relative;
- continue;
- }
- break;
- case State::PathOrAuthority:
- if (code_point == '/') {
- state = State::Authority;
- } else {
- state = State::Path;
- continue;
- }
- break;
- case State::Relative:
- url->m_scheme = base_url->m_scheme;
- if (code_point == '/') {
- state = State::RelativeSlash;
- } else if (url->is_special() && code_point == '\\') {
- report_validation_error();
- state = State::RelativeSlash;
- } else {
- url->m_username = base_url->m_username;
- url->m_password = base_url->m_password;
- url->m_host = base_url->m_host;
- url->m_port = base_url->m_port;
- url->m_paths = base_url->m_paths;
- url->m_query = base_url->m_query;
- if (code_point == '?') {
- url->m_query = "";
- state = State::Query;
- } else if (code_point == '#') {
- url->m_fragment = "";
- state = State::Fragment;
- } else if (code_point != end_of_file) {
- url->m_query = {};
- if (url->m_paths.size())
- url->m_paths.remove(url->m_paths.size() - 1);
- state = State::Path;
- continue;
- }
- }
- break;
- case State::RelativeSlash:
- if (url->is_special() && (code_point == '/' || code_point == '\\')) {
- if (code_point == '\\')
- report_validation_error();
- state = State::SpecialAuthorityIgnoreSlashes;
- } else if (code_point == '/') {
- state = State::Authority;
- } else {
- url->m_username = base_url->m_username;
- url->m_password = base_url->m_password;
- url->m_host = base_url->m_host;
- url->m_port = base_url->m_port;
- state = State::Path;
- continue;
- }
- break;
- case State::SpecialAuthoritySlashes:
- if (code_point == '/' && get_remaining().starts_with("/")) {
- state = State::SpecialAuthorityIgnoreSlashes;
- ++iterator;
- } else {
- report_validation_error();
- state = State::SpecialAuthorityIgnoreSlashes;
- continue;
- }
- break;
- case State::SpecialAuthorityIgnoreSlashes:
- if (code_point != '/' && code_point != '\\') {
- state = State::Authority;
- continue;
- } else {
- report_validation_error();
- }
- break;
- case State::Authority:
- if (code_point == '@') {
- report_validation_error();
- if (at_sign_seen) {
- auto content = buffer.to_string();
- buffer.clear();
- buffer.append("%40");
- buffer.append(content);
- }
- at_sign_seen = true;
- StringBuilder builder;
- for (auto c : Utf8View(builder.string_view())) {
- if (c == ':' && !password_token_seen) {
- password_token_seen = true;
- continue;
- }
- builder.clear();
- if (password_token_seen) {
- builder.append(url->password());
- URL::append_percent_encoded_if_necessary(builder, c, URL::PercentEncodeSet::Userinfo);
- // NOTE: This is has to be encoded and then decoded because the original sequence could contain already percent-encoded sequences.
- url->m_password = URL::percent_decode(builder.string_view());
- } else {
- builder.append(url->username());
- URL::append_percent_encoded_if_necessary(builder, c, URL::PercentEncodeSet::Userinfo);
- // NOTE: This is has to be encoded and then decoded because the original sequence could contain already percent-encoded sequences.
- url->m_username = URL::percent_decode(builder.string_view());
- }
- }
- buffer.clear();
- } else if (code_point == end_of_file || code_point == '/' || code_point == '?' || code_point == '#' || (url->is_special() && code_point == '\\')) {
- if (at_sign_seen && buffer.is_empty()) {
- report_validation_error();
- return {};
- }
- // NOTE: This decreases the iterator by the number of code points in buffer plus one.
- iterator = input.iterator_at_byte_offset(iterator - input.begin() - buffer.length() - 1);
- buffer.clear();
- state = State::Host;
- } else {
- buffer.append_code_point(code_point);
- }
- break;
- case State::Host:
- case State::Hostname:
- if (code_point == ':' && !inside_brackets) {
- if (buffer.is_empty()) {
- report_validation_error();
- return {};
- }
- auto host = parse_host(buffer.string_view(), !url->is_special());
- if (!host.has_value())
- return {};
- url->m_host = host.release_value();
- buffer.clear();
- state = State::Port;
- } else if (code_point == end_of_file || code_point == '/' || code_point == '?' || code_point == '#' || (url->is_special() && code_point == '\\')) {
- if (url->is_special() && buffer.is_empty()) {
- report_validation_error();
- return {};
- }
- auto host = parse_host(buffer.string_view(), !url->is_special());
- if (!host.has_value())
- return {};
- url->m_host = host.value();
- buffer.clear();
- state = State::Port;
- continue;
- } else if (code_point == '[') {
- inside_brackets = true;
- } else if (code_point == ']') {
- inside_brackets = false;
- } else {
- buffer.append_code_point(code_point);
- }
- break;
- case State::Port:
- if (is_ascii_digit(code_point)) {
- buffer.append_code_point(code_point);
- } else if (code_point == end_of_file || code_point == '/' || code_point == '?' || code_point == '#' || (url->is_special() && code_point == '\\')) {
- if (!buffer.is_empty()) {
- auto port = buffer.string_view().to_uint();
- if (!port.has_value() || port.value() > 65535) {
- report_validation_error();
- return {};
- }
- if (port.value() == URL::default_port_for_scheme(url->scheme()))
- url->m_port = {};
- else
- url->m_port = port.value();
- buffer.clear();
- }
- state = State::PathStart;
- continue;
- } else {
- report_validation_error();
- return {};
- }
- break;
- case State::File:
- url->m_scheme = "file";
- url->m_host = "";
- if (code_point == '/' || code_point == '\\') {
- if (code_point == '\\')
- report_validation_error();
- state = State::FileSlash;
- } else if (base_url && base_url->m_scheme == "file") {
- url->m_host = base_url->m_host;
- url->m_paths = base_url->m_paths;
- url->m_query = base_url->m_query;
- if (code_point == '?') {
- url->m_query = "";
- state = State::Query;
- } else if (code_point == '#') {
- url->m_fragment = "";
- state = State::Fragment;
- } else if (code_point != end_of_file) {
- url->m_query = {};
- auto substring_from_pointer = input.substring_view(iterator - input.begin()).as_string();
- if (!starts_with_windows_drive_letter(substring_from_pointer)) {
- if (!url->paths().is_empty() && !(url->scheme() == "file" && url->paths().size() == 1 && is_normalized_windows_drive_letter(url->paths()[0])))
- url->m_paths.remove(url->m_paths.size() - 1);
- } else {
- report_validation_error();
- url->m_paths.clear();
- }
- state = State::Path;
- continue;
- }
- }
- break;
- case State::FileSlash:
- if (code_point == '/' || code_point == '\\') {
- if (code_point == '\\')
- report_validation_error();
- state = State::FileHost;
- } else if (base_url && base_url->m_scheme == "file") {
- url->m_host = base_url->m_host;
- auto substring_from_pointer = input.substring_view(iterator - input.begin()).as_string();
- if (!starts_with_windows_drive_letter(substring_from_pointer) && is_normalized_windows_drive_letter(base_url->m_paths[0]))
- url->append_path(base_url->m_paths[0]);
- state = State::Path;
- continue;
- }
- break;
- case State::FileHost:
- if (code_point == end_of_file || code_point == '/' || code_point == '\\' || code_point == '?' || code_point == '#') {
- if (is_windows_drive_letter(buffer.string_view())) {
- report_validation_error();
- state = State::Path;
- } else if (buffer.is_empty()) {
- url->m_host = "";
- state = State::PathStart;
- } else {
- auto host = parse_host(buffer.string_view(), true);
- if (!host.has_value())
- return {};
- if (host.value() == "localhost")
- host = "";
- url->m_host = host.release_value();
- buffer.clear();
- state = State::PathStart;
- }
- continue;
- } else {
- buffer.append_code_point(code_point);
- }
- break;
- case State::PathStart:
- if (url->is_special()) {
- if (code_point == '\\')
- report_validation_error();
- state = State::Path;
- if (code_point != '/' && code_point != '\\')
- continue;
- } else if (code_point == '?') {
- url->m_query = "";
- state = State::Query;
- } else if (code_point == '#') {
- url->m_fragment = "";
- state = State::Fragment;
- } else if (code_point != end_of_file) {
- state = State::Path;
- if (code_point != '/')
- continue;
- }
- break;
- case State::Path:
- if (code_point == end_of_file || code_point == '/' || (url->is_special() && code_point == '\\') || code_point == '?' || code_point == '#') {
- if (url->is_special() && code_point == '\\')
- report_validation_error();
- if (is_double_dot_path_segment(buffer.string_view())) {
- if (!url->m_paths.is_empty() && !(url->m_scheme == "file" && url->m_paths.size() == 1 && is_normalized_windows_drive_letter(url->m_paths[0])))
- url->m_paths.remove(url->m_paths.size() - 1);
- if (code_point != '/' && !(url->is_special() && code_point == '\\'))
- url->append_path("");
- } else if (is_single_dot_path_segment(buffer.string_view()) && code_point != '/' && !(url->is_special() && code_point == '\\')) {
- url->append_path("");
- } else if (!is_single_dot_path_segment(buffer.string_view())) {
- if (url->m_scheme == "file" && url->m_paths.is_empty() && is_windows_drive_letter(buffer.string_view())) {
- auto drive_letter = buffer.string_view()[0];
- buffer.clear();
- buffer.append(drive_letter);
- buffer.append(':');
- }
- // NOTE: This needs to be percent decoded since the member variables contain decoded data.
- url->append_path(URL::percent_decode(buffer.string_view()));
- }
- buffer.clear();
- if (code_point == '?') {
- url->m_query = "";
- state = State::Query;
- } else if (code_point == '#') {
- url->m_fragment = "";
- state = State::Fragment;
- }
- } else {
- if (!is_url_code_point(code_point) && code_point != '%')
- report_validation_error();
- // FIXME: If c is U+0025 (%) and remaining does not start with two ASCII hex digits, validation error.
- URL::append_percent_encoded_if_necessary(buffer, code_point, URL::PercentEncodeSet::Path);
- }
- break;
- case State::CannotBeABaseUrlPath:
- // NOTE: This does not follow the spec exactly but rather uses the buffer and only sets the path on EOF.
- // NOTE: Verify that the assumptions required for this simplification are correct.
- VERIFY(url->m_paths.size() == 1 && url->m_paths[0].is_empty());
- if (code_point == '?') {
- // NOTE: This needs to be percent decoded since the member variables contain decoded data.
- url->m_paths[0] = URL::percent_decode(buffer.string_view());
- url->m_query = "";
- state = State::Query;
- } else if (code_point == '#') {
- // NOTE: This needs to be percent decoded since the member variables contain decoded data.
- url->m_paths[0] = URL::percent_decode(buffer.string_view());
- url->m_fragment = "";
- state = State::Fragment;
- } else {
- if (code_point != end_of_file && !is_url_code_point(code_point) && code_point != '%')
- report_validation_error();
- // FIXME: If c is U+0025 (%) and remaining does not start with two ASCII hex digits, validation error.
- if (code_point != end_of_file) {
- URL::append_percent_encoded_if_necessary(buffer, code_point, URL::PercentEncodeSet::C0Control);
- } else {
- // NOTE: This needs to be percent decoded since the member variables contain decoded data.
- url->m_paths[0] = URL::percent_decode(buffer.string_view());
- }
- }
- break;
- case State::Query:
- if (code_point == end_of_file || code_point == '#') {
- VERIFY(url->m_query == "");
- auto query_percent_encode_set = url->is_special() ? URL::PercentEncodeSet::SpecialQuery : URL::PercentEncodeSet::Query;
- // NOTE: This is has to be encoded and then decoded because the original sequence could contain already percent-encoded sequences.
- url->m_query = URL::percent_decode(URL::percent_encode(buffer.string_view(), query_percent_encode_set));
- buffer.clear();
- if (code_point == '#') {
- url->m_fragment = "";
- state = State::Fragment;
- }
- } else if (code_point != end_of_file) {
- if (!is_url_code_point(code_point) && code_point != '%')
- report_validation_error();
- // FIXME: If c is U+0025 (%) and remaining does not start with two ASCII hex digits, validation error.
- buffer.append_code_point(code_point);
- }
- break;
- case State::Fragment:
- // NOTE: This does not follow the spec exactly but rather uses the buffer and only sets the fragment on EOF.
- if (code_point != end_of_file) {
- if (!is_url_code_point(code_point) && code_point != '%')
- report_validation_error();
- // FIXME: If c is U+0025 (%) and remaining does not start with two ASCII hex digits, validation error.
- buffer.append_code_point(code_point);
- } else {
- // NOTE: This needs to be percent decoded since the member variables contain decoded data.
- url->m_fragment = URL::percent_decode(buffer.string_view());
- buffer.clear();
- }
- break;
- default:
- VERIFY_NOT_REACHED();
- }
- if (iterator.done())
- break;
- ++iterator;
- }
- url->m_valid = true;
- dbgln_if(URL_PARSER_DEBUG, "URLParser::parse: Parsed URL to be '{}'.", url->serialize());
- return url.release_value();
- }
- }
|