summaryrefslogtreecommitdiffstats
path: root/vespajlib
diff options
context:
space:
mode:
authorJon Marius Venstad <jonmv@gmail.com>2022-04-07 15:31:44 +0200
committerJon Marius Venstad <jonmv@gmail.com>2022-04-07 15:31:44 +0200
commitc00d72bc4cdde1bde164e6174ab854f1ef4e7bfd (patch)
tree1cfe2296adc3ef7324b0c3238a5b7f0dc04ba7bb /vespajlib
parentf2850bb028ff11c91adb370f5bd03899ac5022ec (diff)
Resolve conflicts
Diffstat (limited to 'vespajlib')
-rw-r--r--vespajlib/abi-spec.json14
-rw-r--r--vespajlib/src/main/java/ai/vespa/http/DomainName.java (renamed from vespajlib/src/main/java/com/yahoo/net/DomainName.java)6
-rw-r--r--vespajlib/src/main/java/ai/vespa/http/HttpURL.java458
-rw-r--r--vespajlib/src/main/java/ai/vespa/http/package-info.java5
-rw-r--r--vespajlib/src/main/java/com/yahoo/net/HostName.java1
-rw-r--r--vespajlib/src/test/java/ai/vespa/http/DomainNameTest.java (renamed from vespajlib/src/test/java/com/yahoo/net/DomainNameTest.java)3
-rw-r--r--vespajlib/src/test/java/ai/vespa/http/HttpURLTest.java202
7 files changed, 670 insertions, 19 deletions
diff --git a/vespajlib/abi-spec.json b/vespajlib/abi-spec.json
index 642fdd5c16f..ae69564b671 100644
--- a/vespajlib/abi-spec.json
+++ b/vespajlib/abi-spec.json
@@ -349,20 +349,6 @@
],
"fields": []
},
- "com.yahoo.net.DomainName": {
- "superClass": "ai.vespa.validation.PatternedStringWrapper",
- "interfaces": [],
- "attributes": [
- "public"
- ],
- "methods": [
- "public static com.yahoo.net.DomainName of(java.lang.String)",
- "public static java.lang.String requireLabel(java.lang.String)"
- ],
- "fields": [
- "public static final com.yahoo.net.DomainName localhost"
- ]
- },
"com.yahoo.net.HostName": {
"superClass": "ai.vespa.validation.PatternedStringWrapper",
"interfaces": [],
diff --git a/vespajlib/src/main/java/com/yahoo/net/DomainName.java b/vespajlib/src/main/java/ai/vespa/http/DomainName.java
index ff8ba204674..f68ee8ffbcd 100644
--- a/vespajlib/src/main/java/com/yahoo/net/DomainName.java
+++ b/vespajlib/src/main/java/ai/vespa/http/DomainName.java
@@ -1,5 +1,5 @@
// Copyright Yahoo. Licensed under the terms of the Apache 2.0 license. See LICENSE in the project root.
-package com.yahoo.net;
+package ai.vespa.http;
import ai.vespa.validation.PatternedStringWrapper;
@@ -15,8 +15,8 @@ import static ai.vespa.validation.Validation.requireMatch;
*/
public class DomainName extends PatternedStringWrapper<DomainName> {
- static final Pattern labelPattern = Pattern.compile("([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9-]{0,61}[A-Za-z0-9])");
- static final Pattern domainNamePattern = Pattern.compile("(" + labelPattern + "\\.)*" + labelPattern);
+ public static final Pattern labelPattern = Pattern.compile("([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9-]{0,61}[A-Za-z0-9])");
+ public static final Pattern domainNamePattern = Pattern.compile("(" + labelPattern + "\\.)*" + labelPattern);
public static final DomainName localhost = DomainName.of("localhost");
diff --git a/vespajlib/src/main/java/ai/vespa/http/HttpURL.java b/vespajlib/src/main/java/ai/vespa/http/HttpURL.java
new file mode 100644
index 00000000000..607d72f2550
--- /dev/null
+++ b/vespajlib/src/main/java/ai/vespa/http/HttpURL.java
@@ -0,0 +1,458 @@
+// Copyright Yahoo. Licensed under the terms of the Apache 2.0 license. See LICENSE in the project root.
+package ai.vespa.http;
+
+import ai.vespa.validation.StringWrapper;
+
+import java.net.URI;
+import java.net.URISyntaxException;
+import java.util.ArrayList;
+import java.util.Collections;
+import java.util.LinkedHashMap;
+import java.util.List;
+import java.util.Map;
+import java.util.Objects;
+import java.util.OptionalInt;
+import java.util.StringJoiner;
+import java.util.function.Consumer;
+import java.util.function.UnaryOperator;
+
+import static ai.vespa.validation.Validation.require;
+import static ai.vespa.validation.Validation.requireInRange;
+import static java.net.URLDecoder.decode;
+import static java.net.URLEncoder.encode;
+import static java.nio.charset.StandardCharsets.UTF_8;
+import static java.util.Collections.unmodifiableMap;
+import static java.util.Objects.requireNonNull;
+
+/**
+ * This is the best class for creating, manipulating and inspecting HTTP URLs, because:
+ * <ul>
+ * <li>It is more restrictive than {@link URI}, but with a richer construction API, reducing risk of blunder.
+ * <ul>
+ * <li>Scheme must be HTTP or HTTPS.</li>
+ * <li>Authority must be a {@link DomainName}, with an optional port.</li>
+ * <li>{@link Path} must be normalized at all times.</li>
+ * <li>Only {@link Query} is allowed, in addition to the above.</li>
+ * </ul>
+ * </li>
+ * <li>
+ * It contains all those helpful builder methods that {@link URI} has none of.
+ * <ul>
+ * <li>{@link Path} can be parsed, have segments or other paths appended, and cut.</li>
+ * <li>{@link Query} can be parsed, and keys and key-value pairs can be inserted or removed.</li>
+ * </ul>
+ * All these (except the parse methods) operate on <em>decoded</em> values.
+ * </li>
+ * <li>It makes it super-easy to use a {@link StringWrapper} for validation of path and query segments.</li>
+ * </ul>
+ *
+ * @author jonmv
+ */
+public class HttpURL {
+
+ private final Scheme scheme;
+ private final DomainName domain;
+ private final int port;
+ private final Path path;
+ private final Query query;
+
+ private HttpURL(Scheme scheme, DomainName domain, int port, Path path, Query query) {
+ this.scheme = requireNonNull(scheme);
+ this.domain = requireNonNull(domain);
+ this.port = requireInRange(port, "port number", -1, (1 << 16) - 1);
+ this.path = requireNonNull(path);
+ this.query = requireNonNull(query);
+ }
+
+ public static HttpURL create(Scheme scheme, DomainName domain, int port, Path path, Query query) {
+ return new HttpURL(scheme, domain, port, path, query);
+ }
+
+ public static HttpURL create(Scheme scheme, DomainName domain, int port, Path path) {
+ return create(scheme, domain, port, path, Query.empty());
+ }
+
+ public static HttpURL create(Scheme scheme, DomainName domain, int port) {
+ return create(scheme, domain, port, Path.empty(), Query.empty());
+ }
+
+ public static HttpURL create(Scheme scheme, DomainName domain) {
+ return create(scheme, domain, -1);
+ }
+
+ public static HttpURL from(URI uri) {
+ return from(uri, HttpURL::requirePathSegment, HttpURL::requireNothing);
+ }
+
+ public static HttpURL from(URI uri, Consumer<String> pathValidator, Consumer<String> queryValidator) {
+ if ( ! uri.normalize().equals(uri))
+ throw new IllegalArgumentException("uri should be normalized, but got: " + uri);
+
+ return create(Scheme.of(uri.getScheme()),
+ DomainName.of(requireNonNull(uri.getHost(), "URI must specify a host")),
+ uri.getPort(),
+ Path.parse(uri.getRawPath(), pathValidator),
+ Query.parse(uri.getRawQuery(), queryValidator));
+ }
+
+ public HttpURL withScheme(Scheme scheme) {
+ return create(scheme, domain, port, path, query);
+ }
+
+ public HttpURL withDomain(DomainName domain) {
+ return create(scheme, domain, port, path, query);
+ }
+
+ public HttpURL withPort(int port) {
+ return create(scheme, domain, port, path, query);
+ }
+
+ public HttpURL withoutPort() {
+ return create(scheme, domain, -1, path, query);
+ }
+
+ public HttpURL withPath(Path path) {
+ return create(scheme, domain, port, path, query);
+ }
+
+ public HttpURL appendPath(Path path) {
+ return create(scheme, domain, port, this.path.append(path), query);
+ }
+
+ public HttpURL withQuery(Query query) {
+ return create(scheme, domain, port, path, query);
+ }
+
+ public HttpURL mergeQuery(Query query) {
+ return create(scheme, domain, port, path, this.query.merge(query));
+ }
+
+ public Scheme scheme() {
+ return scheme;
+ }
+
+ public DomainName domain() {
+ return domain;
+ }
+
+ public OptionalInt port() {
+ return port == -1 ? OptionalInt.empty() : OptionalInt.of(port);
+ }
+
+ public Path path() {
+ return path;
+ }
+
+ public Query query() {
+ return query;
+ }
+
+ /** Returns an absolute, hierarchical URI representing this HTTP URL. */
+ public URI asURI() {
+ try {
+ return new URI(scheme.name() + "://" + domain.value() + (port == -1 ? "" : ":" + port) + path.raw() + query.raw());
+ }
+ catch (URISyntaxException e) {
+ throw new IllegalStateException("invalid URI, this should not happen", e);
+ }
+ }
+
+ /** Require that the given string (possibly decoded multiple times) contains none of {@code '/', '?', '#'}, and isn't either of {@code "", ".", ".."}. */
+ public static String requirePathSegment(String value) {
+ while ( ! value.equals(value = decode(value, UTF_8)));
+ require( ! value.contains("/"), value, "path segment decoded cannot contain '/'");
+ require( ! value.contains("?"), value, "path segment decoded cannot contain '?'");
+ require( ! value.contains("#"), value, "path segment decoded cannot contain '#'");
+ return Path.requireNonNormalizable(value);
+ }
+
+ private static void requireNothing(String value) { }
+
+ public static class Path {
+
+ private final List<String> segments;
+ private final boolean trailingSlash;
+ private final UnaryOperator<String> validator;
+
+ private Path(List<String> segments, boolean trailingSlash, UnaryOperator<String> validator) {
+ this.segments = requireNonNull(segments);
+ this.trailingSlash = trailingSlash;
+ this.validator = requireNonNull(validator);
+ }
+
+ /** Creates a new, empty path, with a trailing slash, using {@link HttpURL#requirePathSegment} for segment validation. */
+ public static Path empty() {
+ return empty(HttpURL::requirePathSegment);
+ }
+
+ /** Creates a new, empty path, with a trailing slash, using the indicated validator for segments. */
+ public static Path empty(Consumer<String> validator) {
+ return new Path(List.of(), true, segmentValidator(validator));
+ }
+
+ /** Creates a new path with the given <em>decoded</em> segments. */
+ public static Path from(List<String> segments) {
+ return from(segments, __ -> { });
+ }
+
+ /** Creates a new path with the given <em>decoded</em> segments, and the validator applied to each segment. */
+ public static Path from(List<String> segments, Consumer<String> validator) {
+ return empty(validator).append(segments, true);
+ }
+
+ /** Parses the given raw, normalized path string; this ignores whether the path is absolute or relative. */
+ public static Path parse(String raw) {
+ return parse(raw, HttpURL::requirePathSegment);
+ }
+
+ /** Parses the given raw, normalized path string; this ignores whether the path is absolute or relative.) */
+ public static Path parse(String raw, Consumer<String> validator) {
+ Path base = new Path(List.of(), raw.endsWith("/"), segmentValidator(validator));
+ if (raw.startsWith("/")) raw = raw.substring(1);
+ if (raw.isEmpty()) return base;
+ List<String> segments = new ArrayList<>();
+ for (String segment : raw.split("/")) segments.add(decode(segment, UTF_8));
+ if (segments.isEmpty()) requireNonNormalizable(""); // Raw path was only slashes.
+ return base.append(segments);
+ }
+
+ private static UnaryOperator<String> segmentValidator(Consumer<String> validator) {
+ requireNonNull(validator, "segment validator cannot be null");
+ return value -> {
+ requireNonNormalizable(value);
+ validator.accept(value);
+ return value;
+ };
+ }
+
+ private static String requireNonNormalizable(String segment) {
+ return require( ! (segment.isEmpty() || segment.equals(".") || segment.equals("..")),
+ segment, "path segments cannot be \"\", \".\", or \"..\"");
+ }
+
+ /** Returns a copy of this where only the first segments are retained, and with a trailing slash. */
+ public Path head(int count) {
+ return count == segments.size() ? this : new Path(segments.subList(0, count), true, validator);
+ }
+
+ /** Returns a copy of this where only the last segments are retained. */
+ public Path tail(int count) {
+ return count == segments.size() ? this : new Path(segments.subList(segments.size() - count, segments.size()), trailingSlash, validator);
+ }
+
+ /** Returns a copy of this where the first segments are skipped. */
+ public Path skip(int count) {
+ return count == 0 ? this : new Path(segments.subList(count, segments.size()), trailingSlash, validator);
+ }
+
+ /** Returns a copy of this where the last segments are cut off, and with a trailing slash. */
+ public Path cut(int count) {
+ return count == 0 ? this : new Path(segments.subList(0, segments.size() - count), true, validator);
+ }
+
+ /** Returns a copy of this with the <em>decoded</em> segment appended at the end; it may not be either of {@code ""}, {@code "."} or {@code ".."}. */
+ public Path append(String segment) {
+ return append(List.of(segment), trailingSlash);
+ }
+
+ /** Returns a copy of this all segments of the other path appended, with a trailing slash as per the appendage. */
+ public Path append(Path other) {
+ return append(other.segments, other.trailingSlash);
+ }
+
+ /** Returns a copy of this all given segments appended, with a trailing slash as per this path. */
+ public Path append(List<String> segments) {
+ return append(segments, trailingSlash);
+ }
+
+ private Path append(List<String> segments, boolean trailingSlash) {
+ List<String> copy = new ArrayList<>(this.segments);
+ for (String segment : segments) copy.add(validator.apply(segment));
+ return new Path(copy, trailingSlash, validator);
+ }
+
+ /** Whether this path has a trailing slash. */
+ public boolean hasTrailingSlash() {
+ return trailingSlash;
+ }
+
+ /** Returns a copy of this which encodes a trailing slash. */
+ public Path withTrailingSlash() {
+ return new Path(segments, true, validator);
+ }
+
+ /** Returns a copy of this which does not encode a trailing slash. */
+ public Path withoutTrailingSlash() {
+ return new Path(segments, false, validator);
+ }
+
+ /** The <em>URL decoded</em> segments that make up this path; never {@code null}, {@code ""}, {@code "."} or {@code ".."}. */
+ public List<String> segments() {
+ return Collections.unmodifiableList(segments);
+ }
+
+ /** A raw path string which parses to this, by splitting on {@code "/"}, and then URL decoding. */
+ private String raw() {
+ StringJoiner joiner = new StringJoiner("/", "/", trailingSlash ? "/" : "").setEmptyValue(trailingSlash ? "/" : "");
+ for (String segment : segments) joiner.add(encode(segment, UTF_8));
+ return joiner.toString();
+ }
+
+ /** Intentionally not usable for constructing new URIs. Use {@link HttpURL} for that instead. */
+ @Override
+ public String toString() {
+ return "path '" + raw() + "'";
+ }
+
+ @Override
+ public boolean equals(Object o) {
+ if (this == o) return true;
+ if (o == null || getClass() != o.getClass()) return false;
+ Path path = (Path) o;
+ return trailingSlash == path.trailingSlash && segments.equals(path.segments);
+ }
+
+ @Override
+ public int hashCode() {
+ return Objects.hash(segments, trailingSlash);
+ }
+
+ }
+
+
+ public static class Query {
+
+ private final Map<String, String> values;
+ private final UnaryOperator<String> validator;
+
+ private Query(Map<String, String> values, UnaryOperator<String> validator) {
+ this.values = requireNonNull(values);
+ this.validator = requireNonNull(validator);
+ }
+
+ /** Creates a new, empty query part. */
+ public static Query empty() {
+ return empty(__ -> { });
+ }
+
+ /** Creates a new, empty query part, using the indicated string wrapper for keys and non-null values. */
+ public static Query empty(Consumer<String> validator) {
+ return new Query(Map.of(), entryValidator(validator));
+ }
+
+ /** Creates a new query part with the given <em>decoded</em> values. */
+ public static Query from(Map<String, String> values) {
+ return from(values, __ -> { });
+ }
+
+ /** Creates a new query part with the given <em>decoded</em> values, and the validator applied to each pair. */
+ public static Query from(Map<String, String> values, Consumer<String> validator) {
+ return empty(validator).merge(values);
+ }
+
+ /** Parses the given raw query string. */
+ public static Query parse(String raw) {
+ return parse(raw, __-> { });
+ }
+ /** Parses the given raw query string, using the indicated string wrapper to hold keys and non-null values. */
+ public static Query parse(String raw, Consumer<String> validator) {
+ if (raw == null) return empty(validator);
+ Map<String, String> values = new LinkedHashMap<>();
+ for (String pair : raw.split("&")) {
+ int split = pair.indexOf("=");
+ String key, value;
+ if (split == -1) { key = pair; value = null; }
+ else { key = pair.substring(0, split); value = pair.substring(split + 1); }
+ values.put(decode(key, UTF_8), value == null ? null : decode(value, UTF_8));
+ }
+ return empty(validator).merge(values);
+ }
+
+ private static UnaryOperator<String> entryValidator(Consumer<String> validator) {
+ requireNonNull(validator);
+ return value -> {
+ validator.accept(value);
+ return value;
+ };
+ }
+
+ /** Returns a copy of this with the <em>decoded</em> non-null key pointing to the <em>decoded</em> non-null value. */
+ public Query put(String key, String value) {
+ Map<String, String> copy = new LinkedHashMap<>(values);
+ copy.put(validator.apply(requireNonNull(key)), validator.apply(requireNonNull(value)));
+ return new Query(copy, validator);
+ }
+
+ /** Returns a copy of this with the <em>decoded</em> non-null key pointing to "nothing". */
+ public Query add(String key) {
+ Map<String, String> copy = new LinkedHashMap<>(values);
+ copy.put(validator.apply(requireNonNull(key)), null);
+ return new Query(copy, validator);
+ }
+
+ /** Returns a copy of this without any key-value pair with the <em>decoded</em> key. */
+ public Query remove(String key) {
+ Map<String, String> copy = new LinkedHashMap<>(values);
+ copy.remove(validator.apply(requireNonNull(key)));
+ return new Query(copy, validator);
+ }
+
+ /** Returns a copy of this with all mappings from the other query added to this, possibly overwriting existing mappings. */
+ public Query merge(Query other) {
+ return merge(other.values);
+ }
+
+ /** Returns a copy of this with all given mappings added to this, possibly overwriting existing mappings. */
+ public Query merge(Map<String, String> values) {
+ Map<String, String> copy = new LinkedHashMap<>(this.values);
+ values.forEach((key, value) -> copy.put(validator.apply(requireNonNull(key, "keys cannot be null")),
+ value == null ? null : validator.apply(value)));
+ return new Query(copy, validator);
+ }
+
+ /** The <em>URL decoded</em> key-value pairs that make up this query; keys and values may be {@code ""}, and values are {@code null} when only key was specified. */
+ public Map<String, String> entries() {
+ return unmodifiableMap(values);
+ }
+
+ /** A raw query string, with {@code '?'} prepended, that parses to this, by splitting on {@code "&"}, then on {@code "="}, and then URL decoding; or the empty string if this is empty. */
+ private String raw() {
+ StringJoiner joiner = new StringJoiner("&", "?", "").setEmptyValue("");
+ values.forEach((key, value) -> joiner.add(encode(key, UTF_8) +
+ (value == null ? "" : "=" + encode(value, UTF_8))));
+ return joiner.toString();
+ }
+
+ /** Intentionally not usable for constructing new URIs. Use {@link HttpURL} for that instead. */
+ @Override
+ public String toString() {
+ return "query '" + raw() + "'";
+ }
+
+ @Override
+ public boolean equals(Object o) {
+ if (this == o) return true;
+ if (o == null || getClass() != o.getClass()) return false;
+ Query query = (Query) o;
+ return values.equals(query.values);
+ }
+
+ @Override
+ public int hashCode() {
+ return Objects.hash(values);
+ }
+
+ }
+
+
+ public enum Scheme {
+ http,
+ https;
+ public static Scheme of(String scheme) {
+ if (scheme.equalsIgnoreCase(http.name())) return http;
+ if (scheme.equalsIgnoreCase(https.name())) return https;
+ throw new IllegalArgumentException("scheme must be HTTP or HTTPS");
+ }
+ }
+
+}
diff --git a/vespajlib/src/main/java/ai/vespa/http/package-info.java b/vespajlib/src/main/java/ai/vespa/http/package-info.java
new file mode 100644
index 00000000000..e5600c6f82d
--- /dev/null
+++ b/vespajlib/src/main/java/ai/vespa/http/package-info.java
@@ -0,0 +1,5 @@
+// Copyright Yahoo. Licensed under the terms of the Apache 2.0 license. See LICENSE in the project root.
+@ExportPackage
+package ai.vespa.http;
+
+import com.yahoo.osgi.annotation.ExportPackage;
diff --git a/vespajlib/src/main/java/com/yahoo/net/HostName.java b/vespajlib/src/main/java/com/yahoo/net/HostName.java
index 47bd8246bb3..119b648029e 100644
--- a/vespajlib/src/main/java/com/yahoo/net/HostName.java
+++ b/vespajlib/src/main/java/com/yahoo/net/HostName.java
@@ -1,6 +1,7 @@
// Copyright Yahoo. Licensed under the terms of the Apache 2.0 license. See LICENSE in the project root.
package com.yahoo.net;
+import ai.vespa.http.DomainName;
import ai.vespa.validation.PatternedStringWrapper;
import java.util.Optional;
diff --git a/vespajlib/src/test/java/com/yahoo/net/DomainNameTest.java b/vespajlib/src/test/java/ai/vespa/http/DomainNameTest.java
index d8e76b71d7e..aa19e8667f6 100644
--- a/vespajlib/src/test/java/com/yahoo/net/DomainNameTest.java
+++ b/vespajlib/src/test/java/ai/vespa/http/DomainNameTest.java
@@ -1,7 +1,6 @@
// Copyright Yahoo. Licensed under the terms of the Apache 2.0 license. See LICENSE in the project root.
-package com.yahoo.net;
+package ai.vespa.http;
-import com.yahoo.net.DomainName;
import org.junit.jupiter.api.Test;
import static org.junit.jupiter.api.Assertions.assertThrows;
diff --git a/vespajlib/src/test/java/ai/vespa/http/HttpURLTest.java b/vespajlib/src/test/java/ai/vespa/http/HttpURLTest.java
new file mode 100644
index 00000000000..181e02999b8
--- /dev/null
+++ b/vespajlib/src/test/java/ai/vespa/http/HttpURLTest.java
@@ -0,0 +1,202 @@
+// Copyright Yahoo. Licensed under the terms of the Apache 2.0 license. See LICENSE in the project root.
+package ai.vespa.http;
+
+import ai.vespa.http.HttpURL.Path;
+import ai.vespa.validation.Name;
+import ai.vespa.http.HttpURL.Query;
+import org.junit.jupiter.api.Test;
+
+import java.net.URI;
+import java.util.ArrayList;
+import java.util.LinkedHashMap;
+import java.util.List;
+import java.util.Map;
+import java.util.OptionalInt;
+import java.util.function.Consumer;
+
+import static ai.vespa.http.DomainName.localhost;
+import static ai.vespa.http.HttpURL.Scheme.http;
+import static ai.vespa.http.HttpURL.Scheme.https;
+import static org.junit.jupiter.api.Assertions.assertEquals;
+import static org.junit.jupiter.api.Assertions.assertThrows;
+
+/**
+ * @author jonmv
+ */
+class HttpURLTest {
+
+ @Test
+ void testConversionBackAndForth() {
+ for (String uri : List.of("http://minimal",
+ "http://empty.query?",
+ "http://zero-port:0?no=path",
+ "http://only-path/",
+ "https://strange/queries?=&foo",
+ "https://weirdness?=foo",
+ "https://encoded/%3F%3D%26%2F?%3F%3D%26%2F=%3F%3D%26%2F",
+ "https://host.at.domain:123/one/two/?three=four&five")) {
+ Consumer<String> pathValidator = __ -> { };
+ assertEquals(uri, HttpURL.from(URI.create(uri), pathValidator, pathValidator).asURI().toString(),
+ "uri '" + uri + "' should be returned unchanged");
+ }
+ }
+
+ @Test
+ void testModification() {
+ HttpURL url = HttpURL.create(http, localhost).withPath(Path.empty(Name::of));
+ assertEquals(http, url.scheme());
+ assertEquals(localhost, url.domain());
+ assertEquals(OptionalInt.empty(), url.port());
+ assertEquals(Path.empty(Name::of), url.path());
+ assertEquals(HttpURL.Query.empty(Name::of), url.query());
+
+ url = url.withScheme(https)
+ .withDomain(DomainName.of("domain"))
+ .withPort(0)
+ .withPath(url.path().append("foo").withoutTrailingSlash())
+ .withQuery(url.query().put("boo", "bar").add("baz"));
+ assertEquals(https, url.scheme());
+ assertEquals(DomainName.of("domain"), url.domain());
+ assertEquals(OptionalInt.of(0), url.port());
+ assertEquals(Path.parse("/foo", Name::of), url.path());
+ assertEquals(HttpURL.Query.parse("boo=bar&baz", Name::of), url.query());
+ }
+
+ @Test
+ void testInvalidURIs() {
+ assertEquals("scheme must be HTTP or HTTPS",
+ assertThrows(IllegalArgumentException.class,
+ () -> HttpURL.from(URI.create("file:/txt"))).getMessage());
+
+ assertEquals("URI must specify a host",
+ assertThrows(NullPointerException.class,
+ () -> HttpURL.from(URI.create("http:///foo"))).getMessage());
+
+ assertEquals("port number must be at least '-1' and at most '65535', but got: '65536'",
+ assertThrows(IllegalArgumentException.class,
+ () -> HttpURL.from(URI.create("http://foo:65536/bar"))).getMessage());
+
+ assertEquals("uri should be normalized, but got: http://foo//",
+ assertThrows(IllegalArgumentException.class,
+ () -> HttpURL.from(URI.create("http://foo//"))).getMessage());
+
+ assertEquals("uri should be normalized, but got: http://foo/./",
+ assertThrows(IllegalArgumentException.class,
+ () -> HttpURL.from(URI.create("http://foo/./"))).getMessage());
+
+ assertEquals("path segments cannot be \"\", \".\", or \"..\", but got: '..'",
+ assertThrows(IllegalArgumentException.class,
+ () -> HttpURL.from(URI.create("http://foo/.."))).getMessage());
+
+ assertEquals("path segments cannot be \"\", \".\", or \"..\", but got: '..'",
+ assertThrows(IllegalArgumentException.class,
+ () -> HttpURL.from(URI.create("http://foo/.%2E"))).getMessage());
+
+ assertEquals("name must match '[A-Za-z][A-Za-z0-9_-]{0,63}', but got: '/'",
+ assertThrows(IllegalArgumentException.class,
+ () -> HttpURL.from(URI.create("http://foo/%2F"), Name::of, Name::of)).getMessage());
+
+ assertEquals("name must match '[A-Za-z][A-Za-z0-9_-]{0,63}', but got: '/'",
+ assertThrows(IllegalArgumentException.class,
+ () -> HttpURL.from(URI.create("http://foo?%2F"), Name::of, Name::of)).getMessage());
+
+ assertEquals("name must match '[A-Za-z][A-Za-z0-9_-]{0,63}', but got: ''",
+ assertThrows(IllegalArgumentException.class,
+ () -> HttpURL.from(URI.create("http://foo?"), Name::of, Name::of)).getMessage());
+ }
+
+ @Test
+ void testPath() {
+ Path path = Path.parse("foo/bar/baz", Name::of);
+ List<String> expected = List.of("foo", "bar", "baz");
+ assertEquals(expected, path.segments());
+
+ assertEquals(expected.subList(1, 3), path.skip(1).segments());
+ assertEquals(expected.subList(0, 2), path.cut(1).segments());
+ assertEquals(expected.subList(1, 2), path.skip(1).cut(1).segments());
+
+ assertEquals("path '/foo/bar/baz/'", path.withTrailingSlash().toString());
+ assertEquals(path, path.withoutTrailingSlash().withoutTrailingSlash());
+
+ assertEquals(List.of("one", "foo", "bar", "baz", "two"),
+ Path.from(List.of("one")).append(path).append("two").segments());
+
+ assertEquals(List.of(expected.get(2), expected.get(0)),
+ path.append(path).cut(2).skip(2).segments());
+
+ for (int i = 0; i < 3; i++) {
+ assertEquals(path.head(i), path.cut(3 - i));
+ assertEquals(path.tail(i), path.skip(3 - i));
+ }
+
+ assertThrows(NullPointerException.class,
+ () -> path.append((String) null));
+
+ List<String> names = new ArrayList<>();
+ names.add(null);
+ assertThrows(NullPointerException.class,
+ () -> path.append(names));
+
+ assertEquals("name must match '[A-Za-z][A-Za-z0-9_-]{0,63}', but got: '???'",
+ assertThrows(IllegalArgumentException.class,
+ () -> path.append("???")).getMessage());
+
+ assertEquals("fromIndex(2) > toIndex(1)",
+ assertThrows(IllegalArgumentException.class,
+ () -> path.cut(2).skip(2)).getMessage());
+
+ assertEquals("path segment decoded cannot contain '/', but got: '/'",
+ assertThrows(IllegalArgumentException.class,
+ () -> Path.empty().append("%2525252525252525%2525252525253%25252532%252525%252534%36")).getMessage());
+
+ assertEquals("path segment decoded cannot contain '?', but got: '?'",
+ assertThrows(IllegalArgumentException.class,
+ () -> Path.empty().append("?")).getMessage());
+
+ assertEquals("path segment decoded cannot contain '#', but got: '#'",
+ assertThrows(IllegalArgumentException.class,
+ () -> Path.empty().append("#")).getMessage());
+
+ assertEquals("path segments cannot be \"\", \".\", or \"..\", but got: '..'",
+ assertThrows(IllegalArgumentException.class,
+ () -> Path.empty().append("%2E%25252E")).getMessage());
+ }
+
+ @Test
+ void testQuery() {
+ Query query = Query.parse("foo=bar&baz", Name::of);
+ Map<String, String> expected = new LinkedHashMap<>();
+ expected.put("foo", "bar");
+ expected.put("baz", null);
+ assertEquals(expected, query.entries());
+
+ expected.remove("baz");
+ assertEquals(expected, query.remove("baz").entries());
+
+ expected.put("baz", null);
+ expected.remove("foo");
+ assertEquals(expected, query.remove("foo").entries());
+ assertEquals(expected, Query.empty(Name::of).add("baz").entries());
+
+ assertEquals("query '?foo=bar&baz=bax&quu=fez&moo'",
+ query.put("baz", "bax").merge(Query.from(Map.of("quu", "fez"))).add("moo").toString());
+
+ assertThrows(NullPointerException.class,
+ () -> query.remove(null));
+
+ assertThrows(NullPointerException.class,
+ () -> query.add(null));
+
+ assertThrows(NullPointerException.class,
+ () -> query.put(null, "hax"));
+
+ assertThrows(NullPointerException.class,
+ () -> query.put("hax", null));
+
+ Map<String, String> names = new LinkedHashMap<>();
+ names.put(null, "hax");
+ assertThrows(NullPointerException.class,
+ () -> query.merge(names));
+ }
+
+}