Skip to content

Commit bd41428

Browse files
committedOct 18, 2022
8293590: Some syntax checks performed by URL.openConnection() could be performed earlier, at URL construction
Reviewed-by: jpai, michaelm
1 parent 78fed9d commit bd41428

File tree

4 files changed

+638
-39
lines changed

4 files changed

+638
-39
lines changed
 

‎src/java.base/share/classes/java/net/URLStreamHandler.java

+18-5
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 1995, 2021, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 1995, 2022, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -504,10 +504,23 @@ protected void setURL(URL u, String protocol, String host, int port,
504504
String query, String ref) {
505505
if (this != u.handler) {
506506
throw new SecurityException("handler for url different from " +
507-
"this handler");
508-
} else if (host != null && u.isBuiltinStreamHandler(this)) {
509-
String s = IPAddressUtil.checkHostString(host);
510-
if (s != null) throw new IllegalArgumentException(s);
507+
"this handler");
508+
}
509+
// if early parsing, perform additional checks here rather than waiting
510+
// for openConnection()
511+
boolean earlyURLParsing = IPAddressUtil.earlyURLParsing();
512+
boolean isBuiltInHandler = u.isBuiltinStreamHandler(this);
513+
if (host != null && isBuiltInHandler) {
514+
String errMsg = IPAddressUtil.checkHostString(host);
515+
if (errMsg != null) throw new IllegalArgumentException(errMsg);
516+
}
517+
if (userInfo != null && isBuiltInHandler && earlyURLParsing) {
518+
String errMsg = IPAddressUtil.checkUserInfo(userInfo);
519+
if (errMsg != null) throw new IllegalArgumentException(errMsg);
520+
}
521+
if (authority != null && isBuiltInHandler && earlyURLParsing) {
522+
String errMsg = IPAddressUtil.checkAuth(authority);
523+
if (errMsg != null) throw new IllegalArgumentException(errMsg);
511524
}
512525
// ensure that no one can reset the protocol on a given URL.
513526
u.set(u.getProtocol(), host, port, authority, userInfo, path, query, ref);

‎src/java.base/share/classes/sun/net/util/IPAddressUtil.java

+106-25
Original file line numberDiff line numberDiff line change
@@ -427,6 +427,16 @@ private static InetAddress findScopedAddress(InetAddress address) {
427427
// All of the above
428428
private static final long L_EXCLUDE = 0x84008008ffffffffL;
429429
private static final long H_EXCLUDE = 0x8000000038000001L;
430+
// excluded delims: "<>\" " - we don't include % and # here
431+
private static final long L_EXCLUDED_DELIMS = 0x5000000500000000L;
432+
private static final long H_EXCLUDED_DELIMS = 0x0L;
433+
// unwise "{}|\\^[]`";
434+
private static final long L_UNWISE = 0x0L;
435+
private static final long H_UNWISE = 0x3800000178000000L;
436+
private static final long L_FRAGMENT = 0x0000000800000000L;
437+
private static final long H_FRAGMENT = 0x0L;
438+
private static final long L_QUERY = 0x8000000000000000L;
439+
private static final long H_QUERY = 0x0L;
430440

431441
private static final char[] OTHERS = {
432442
8263,8264,8265,8448,8449,8453,8454,10868,
@@ -479,10 +489,14 @@ private static String describeChar(char c) {
479489
return "'" + c + "'";
480490
}
481491

482-
private static String checkUserInfo(String str) {
492+
// Check user-info component.
493+
// This method returns an error message if a problem
494+
// is found. The caller is expected to use that message to
495+
// throw an exception.
496+
public static String checkUserInfo(String str) {
483497
// colon is permitted in user info
484-
int index = scan(str, L_EXCLUDE & ~L_COLON,
485-
H_EXCLUDE & ~H_COLON);
498+
int index = scan(str, MASKS.L_USERINFO_MASK,
499+
MASKS.H_USERINFO_MASK);
486500
if (index >= 0) {
487501
return "Illegal character found in user-info: "
488502
+ describeChar(str.charAt(index));
@@ -498,8 +512,7 @@ private static String checkHost(String str) {
498512
index = str.indexOf('%');
499513
if (index >= 0) {
500514
index = scan(str = str.substring(index),
501-
L_NON_PRINTABLE | L_IPV6_DELIMS,
502-
H_NON_PRINTABLE | H_IPV6_DELIMS);
515+
MASKS.L_SCOPE_MASK, MASKS.H_SCOPE_MASK);
503516
if (index >= 0) {
504517
return "Illegal character found in IPv6 scoped address: "
505518
+ describeChar(str.charAt(index));
@@ -509,7 +522,8 @@ private static String checkHost(String str) {
509522
}
510523
return "Unrecognized IPv6 address format";
511524
} else {
512-
index = scan(str, L_EXCLUDE, H_EXCLUDE);
525+
index = scan(str, L_EXCLUDE | MASKS.L_HOSTNAME_MASK,
526+
H_EXCLUDE | MASKS.H_HOSTNAME_MASK, OTHERS);
513527
if (index >= 0) {
514528
return "Illegal character found in host: "
515529
+ describeChar(str.charAt(index));
@@ -518,7 +532,14 @@ private static String checkHost(String str) {
518532
return null;
519533
}
520534

521-
private static String checkAuth(String str) {
535+
// Simple checks for the authority component.
536+
// Deeper checks on the various parts of a server-based
537+
// authority component may be performed by calling
538+
// #checkAuthority(URL url)
539+
// This method returns an error message if a problem
540+
// is found. The caller is expected to use that message to
541+
// throw an exception.
542+
public static String checkAuth(String str) {
522543
int index = scan(str,
523544
L_EXCLUDE & ~L_AUTH_DELIMS,
524545
H_EXCLUDE & ~H_AUTH_DELIMS);
@@ -529,8 +550,11 @@ private static String checkAuth(String str) {
529550
return null;
530551
}
531552

532-
// check authority of hierarchical URL. Appropriate for
533-
// HTTP-like protocol handlers
553+
// check authority of hierarchical (server based) URL.
554+
// Appropriate for HTTP-like protocol handlers
555+
// This method returns an error message if a problem
556+
// is found. The caller is expected to use that message to
557+
// throw an exception.
534558
public static String checkAuthority(URL url) {
535559
String s, u, h;
536560
if (url == null) return null;
@@ -546,33 +570,53 @@ public static String checkAuthority(URL url) {
546570
return null;
547571
}
548572

549-
// minimal syntax checks - deeper check may be performed
550-
// by the appropriate protocol handler
573+
// minimal syntax checks if delayed parsing is
574+
// enabled - deeper check will be performed
575+
// later by the appropriate protocol handler
576+
// This method returns an error message if a problem
577+
// is found. The caller is expected to use that message to
578+
// throw an exception.
551579
public static String checkExternalForm(URL url) {
552580
String s;
553581
if (url == null) return null;
554-
int index = scan(s = url.getUserInfo(),
555-
L_NON_PRINTABLE | L_SLASH,
556-
H_NON_PRINTABLE | H_SLASH);
557-
if (index >= 0) {
558-
return "Illegal character found in authority: "
559-
+ describeChar(s.charAt(index));
582+
boolean earlyURLParsing = earlyURLParsing();
583+
String userInfo = url.getUserInfo();
584+
if (earlyURLParsing) {
585+
if ((s = checkUserInfo(userInfo)) != null) return s;
586+
} else {
587+
int index = scan(s = userInfo,
588+
L_NON_PRINTABLE | L_SLASH,
589+
H_NON_PRINTABLE | H_SLASH);
590+
if (index >= 0) {
591+
return "Illegal character found in authority: "
592+
+ describeChar(s.charAt(index));
593+
}
560594
}
561-
if ((s = checkHostString(url.getHost())) != null) {
595+
String host = url.getHost();
596+
if ((s = checkHostString(host)) != null) {
562597
return s;
563598
}
564599
return null;
565600
}
566601

602+
// Check host component.
603+
// This method returns an error message if a problem
604+
// is found. The caller is expected to use that message to
605+
// throw an exception.
567606
public static String checkHostString(String host) {
568607
if (host == null) return null;
569-
int index = scan(host,
570-
L_NON_PRINTABLE | L_SLASH,
571-
H_NON_PRINTABLE | H_SLASH,
572-
OTHERS);
573-
if (index >= 0) {
574-
return "Illegal character found in host: "
575-
+ describeChar(host.charAt(index));
608+
if (earlyURLParsing()) {
609+
// also validate IPv6 literal format if present
610+
return checkHost(host);
611+
} else {
612+
int index = scan(host,
613+
MASKS.L_HOSTNAME_MASK,
614+
MASKS.H_HOSTNAME_MASK,
615+
OTHERS);
616+
if (index >= 0) {
617+
return "Illegal character found in host: "
618+
+ describeChar(host.charAt(index));
619+
}
576620
}
577621
return null;
578622
}
@@ -803,6 +847,14 @@ private static int parseAsciiHexDigit(char digit) {
803847
return parseAsciiDigit(c, DECIMAL);
804848
}
805849

850+
public static boolean earlyURLParsing() {
851+
return !MASKS.DELAY_URL_PARSING_SP_VALUE;
852+
}
853+
854+
public static boolean delayURLParsing() {
855+
return MASKS.DELAY_URL_PARSING_SP_VALUE;
856+
}
857+
806858
// Supported radixes
807859
private static final int HEXADECIMAL = 16;
808860
private static final int DECIMAL = 10;
@@ -817,4 +869,33 @@ private static int parseAsciiHexDigit(char digit) {
817869
private static final String ALLOW_AMBIGUOUS_IPADDRESS_LITERALS_SP = "jdk.net.allowAmbiguousIPAddressLiterals";
818870
private static final boolean ALLOW_AMBIGUOUS_IPADDRESS_LITERALS_SP_VALUE = Boolean.valueOf(
819871
GetPropertyAction.privilegedGetProperty(ALLOW_AMBIGUOUS_IPADDRESS_LITERALS_SP, "false"));
872+
private static class MASKS {
873+
private static final String DELAY_URL_PARSING_SP = "jdk.net.url.delayParsing";
874+
private static final boolean DELAY_URL_PARSING_SP_VALUE;
875+
static final long L_USERINFO_MASK = L_EXCLUDE & ~L_COLON;
876+
static final long H_USERINFO_MASK = H_EXCLUDE & ~H_COLON;
877+
static final long L_HOSTNAME_MASK;
878+
static final long H_HOSTNAME_MASK;
879+
static final long L_SCOPE_MASK;
880+
static final long H_SCOPE_MASK;
881+
static {
882+
var value = GetPropertyAction.privilegedGetProperty(
883+
DELAY_URL_PARSING_SP, "false");
884+
DELAY_URL_PARSING_SP_VALUE = value.isEmpty()
885+
|| Boolean.parseBoolean(value);
886+
if (DELAY_URL_PARSING_SP_VALUE) {
887+
L_HOSTNAME_MASK = L_NON_PRINTABLE | L_SLASH;
888+
H_HOSTNAME_MASK = H_NON_PRINTABLE | H_SLASH;
889+
L_SCOPE_MASK = L_NON_PRINTABLE | L_IPV6_DELIMS;
890+
H_SCOPE_MASK = H_NON_PRINTABLE | H_IPV6_DELIMS;
891+
} else {
892+
// the hostname mask can also forbid [ ] brackets, because IPv6 should be
893+
// checked early before the mask is used when earlier parsing checks are performed
894+
L_HOSTNAME_MASK = L_NON_PRINTABLE | L_SLASH | L_UNWISE | L_EXCLUDED_DELIMS;
895+
H_HOSTNAME_MASK = H_NON_PRINTABLE | H_SLASH | H_UNWISE | H_EXCLUDED_DELIMS;
896+
L_SCOPE_MASK = L_NON_PRINTABLE | L_IPV6_DELIMS | L_SLASH | L_BACKSLASH | L_FRAGMENT | L_QUERY;
897+
H_SCOPE_MASK = H_NON_PRINTABLE | H_IPV6_DELIMS | H_SLASH | H_BACKSLASH | H_FRAGMENT | H_QUERY;
898+
}
899+
}
900+
}
820901
}

‎src/java.base/share/classes/sun/net/www/protocol/ftp/FtpURLConnection.java

+7-9
Original file line numberDiff line numberDiff line change
@@ -159,17 +159,15 @@ public void close() throws IOException {
159159
}
160160
}
161161

162-
static URL checkURL(URL u) throws IllegalArgumentException {
162+
private static URL checkURL(URL u) throws MalformedURLException {
163163
if (u != null) {
164164
if (u.toExternalForm().indexOf('\n') > -1) {
165-
Exception mfue = new MalformedURLException("Illegal character in URL");
166-
throw new IllegalArgumentException(mfue.getMessage(), mfue);
165+
throw new MalformedURLException("Illegal character in URL");
167166
}
168167
}
169-
String s = IPAddressUtil.checkAuthority(u);
170-
if (s != null) {
171-
Exception mfue = new MalformedURLException(s);
172-
throw new IllegalArgumentException(mfue.getMessage(), mfue);
168+
String errMsg = IPAddressUtil.checkAuthority(u);
169+
if (errMsg != null) {
170+
throw new MalformedURLException(errMsg);
173171
}
174172
return u;
175173
}
@@ -179,14 +177,14 @@ static URL checkURL(URL u) throws IllegalArgumentException {
179177
*
180178
* @param url The {@code URL} to retrieve or store.
181179
*/
182-
public FtpURLConnection(URL url) {
180+
public FtpURLConnection(URL url) throws MalformedURLException {
183181
this(url, null);
184182
}
185183

186184
/**
187185
* Same as FtpURLconnection(URL) with a per connection proxy specified
188186
*/
189-
FtpURLConnection(URL url, Proxy p) {
187+
FtpURLConnection(URL url, Proxy p) throws MalformedURLException {
190188
super(checkURL(url));
191189
instProxy = p;
192190
host = url.getHost();
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,507 @@
1+
/*
2+
* Copyright (c) 2022, Oracle and/or its affiliates. All rights reserved.
3+
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4+
*
5+
* This code is free software; you can redistribute it and/or modify it
6+
* under the terms of the GNU General Public License version 2 only, as
7+
* published by the Free Software Foundation.
8+
*
9+
* This code is distributed in the hope that it will be useful, but WITHOUT
10+
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11+
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
12+
* version 2 for more details (a copy is included in the LICENSE file that
13+
* accompanied this code).
14+
*
15+
* You should have received a copy of the GNU General Public License version
16+
* 2 along with this work; if not, write to the Free Software Foundation,
17+
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
18+
*
19+
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
20+
* or visit www.oracle.com if you need additional information or have any
21+
* questions.
22+
*/
23+
24+
/*
25+
* @test
26+
* @bug 8293590
27+
* @summary URL built-in protocol handlers should parse the URL early
28+
* to avoid constructing URLs for which openConnection
29+
* would later throw an exception, when possible.
30+
* A jdk.net.url.delayParsing property allows to switch that
31+
* behavior off to mitigate risks of regression
32+
* @run junit EarlyOrDelayedParsing
33+
* @run junit/othervm -Djdk.net.url.delayParsing EarlyOrDelayedParsing
34+
* @run junit/othervm -Djdk.net.url.delayParsing=true EarlyOrDelayedParsing
35+
* @run junit/othervm -Djdk.net.url.delayParsing=false EarlyOrDelayedParsing
36+
*/
37+
38+
import java.io.IOException;
39+
import java.net.ConnectException;
40+
import java.net.MalformedURLException;
41+
import java.net.URL;
42+
import java.net.UnknownHostException;
43+
import java.util.ArrayList;
44+
import java.util.List;
45+
import java.util.stream.IntStream;
46+
import java.util.stream.Stream;
47+
48+
import org.junit.jupiter.params.ParameterizedTest;
49+
import org.junit.jupiter.params.provider.MethodSource;
50+
51+
import static java.lang.System.err;
52+
import static org.junit.jupiter.api.Assertions.*;
53+
54+
public class EarlyOrDelayedParsing {
55+
56+
public final boolean EARLY_PARSING;
57+
{
58+
String value = System.getProperty("jdk.net.url.delayParsing", "false");
59+
EARLY_PARSING = !value.isEmpty() && !Boolean.parseBoolean(value);
60+
}
61+
62+
// Some characters that when included at the wrong place
63+
// in the authority component, without being escaped, would
64+
// cause an exception.
65+
private static final String EXCLUDED_DELIMS = "<>\" ";
66+
private static final String UNWISE = "{}|\\^`";
67+
private static final String DELIMS = "[]/?#@";
68+
69+
// Test data used to test exceptions thrown by URL
70+
// at some point, when constructed with some illegal input.
71+
sealed interface URLArgTest
72+
permits OneArgTest, TwoArgsTest, ThreeArgsTest, FourArgsTest {
73+
74+
// Some character that is expected to cause an exception
75+
// at some point, and which this test case is built for
76+
int character();
77+
78+
// An URL string containing the illegal character
79+
String url();
80+
81+
// Some characters are already checked at construction
82+
// time. They will cause an exception to be thrown,
83+
// whether delayed parsing is activated or not.
84+
// This method returns true if an exception is
85+
// expected at construction time for this test case,
86+
// even when delayed parsing is activated.
87+
boolean early(int c);
88+
89+
// The URL scheme this test case is built for.
90+
// Typically, one of "http", "https", "ftp"...
91+
default String scheme() {
92+
return scheme(url());
93+
}
94+
95+
// Return the URL string of this test case, after
96+
// substituting its scheme with the given scheme.
97+
default String urlWithScheme(String scheme) {
98+
String url = url();
99+
int colon = url.indexOf(':');
100+
String urlWithScheme = scheme + url.substring(colon);
101+
return urlWithScheme;
102+
}
103+
104+
// Which exception to expect when parsing is delayed
105+
default boolean acceptDelayedException(Throwable exception) {
106+
return exception instanceof MalformedURLException
107+
|| exception instanceof UnknownHostException;
108+
}
109+
110+
default String describe() {
111+
return this.getClass().getSimpleName() + "(url=" + url() + ")";
112+
}
113+
114+
static int port(String protocol) {
115+
return switch (protocol) {
116+
case "http" -> 80;
117+
case "https" -> 443;
118+
case "ftp" -> 21;
119+
default -> -1;
120+
};
121+
}
122+
123+
static String scheme(String url) {
124+
return url.substring(0, url.indexOf(':'));
125+
}
126+
}
127+
128+
// Test data for the one arg constructor
129+
// public URL(String spec) throws MalformedURLException
130+
sealed interface OneArgTest extends URLArgTest {
131+
132+
// Create a new test case identical to this one but
133+
// with a different URL scheme
134+
default OneArgTest withScheme(String scheme) {
135+
String urlWithScheme = urlWithScheme(scheme);
136+
if (this instanceof OfHost) {
137+
return new OfHost(character(), urlWithScheme);
138+
}
139+
if (this instanceof OfUserInfo) {
140+
return new OfUserInfo(character(), urlWithScheme);
141+
}
142+
throw new AssertionError("unexpected subclass: " + this.getClass());
143+
}
144+
145+
@Override
146+
default boolean early(int c) {
147+
return this instanceof OfHost &&
148+
(c < 31 || c == 127);
149+
}
150+
151+
@Override
152+
default boolean acceptDelayedException(Throwable exception) {
153+
return URLArgTest.super.acceptDelayedException(exception)
154+
|| "file".equalsIgnoreCase(scheme())
155+
&& character() == '\\'
156+
&& exception instanceof IOException;
157+
}
158+
159+
record OfHost(int character, String url) implements OneArgTest { }
160+
record OfUserInfo(int character, String url) implements OneArgTest { }
161+
162+
static OneArgTest ofHost(int c) {
163+
return new OfHost(c, "http://local%shost/".formatted(Character.toString(c)));
164+
}
165+
static OneArgTest ofUserInfo(int c) {
166+
return new OfUserInfo(c, "http://user%sinfo@localhost:9999/".formatted(Character.toString(c)));
167+
}
168+
}
169+
170+
// Test data for the two arg constructor
171+
// public URL(URL context, String spec) throws MalformedURLException
172+
sealed interface TwoArgsTest extends URLArgTest {
173+
174+
// Create a new test case identical to this one but
175+
// with a different URL scheme
176+
default TwoArgsTest withScheme(String scheme) {
177+
String urlWithScheme = urlWithScheme(scheme);
178+
if (this instanceof OfTwoArgsHost) {
179+
return new OfTwoArgsHost(character(), urlWithScheme);
180+
}
181+
if (this instanceof OfTwoArgsUserInfo) {
182+
return new OfTwoArgsUserInfo(character(), urlWithScheme);
183+
}
184+
throw new AssertionError("unexpected subclass: " + this.getClass());
185+
}
186+
187+
@Override
188+
default boolean early(int c) {
189+
return this instanceof OfTwoArgsHost &&
190+
(c < 31 || c == 127);
191+
}
192+
193+
@Override
194+
default boolean acceptDelayedException(Throwable exception) {
195+
return URLArgTest.super.acceptDelayedException(exception)
196+
|| "file".equalsIgnoreCase(scheme())
197+
&& character() == '\\'
198+
&& exception instanceof IOException;
199+
}
200+
201+
record OfTwoArgsHost(int character, String url) implements TwoArgsTest { }
202+
record OfTwoArgsUserInfo(int character, String url) implements TwoArgsTest { }
203+
204+
static TwoArgsTest ofHost(int c) {
205+
return new OfTwoArgsHost(c, "http://local%shost/".formatted(Character.toString(c)));
206+
}
207+
static TwoArgsTest ofUserInfo(int c) {
208+
return new OfTwoArgsUserInfo(c, "http://user%sinfo@localhost:9999/".formatted(Character.toString(c)));
209+
}
210+
static TwoArgsTest ofOneArgTest(OneArgTest test) {
211+
if (test instanceof OneArgTest.OfHost) {
212+
return ofHost(test.character());
213+
} else if (test instanceof OneArgTest.OfUserInfo) {
214+
return ofUserInfo(test.character());
215+
}
216+
throw new AssertionError("can't convert to TwoArgsTest: "
217+
+ test.getClass());
218+
}
219+
}
220+
221+
222+
// Test data for the three args constructor
223+
// public URL(String scheme, String host, String file)
224+
// throws MalformedURLException
225+
sealed interface ThreeArgsTest extends URLArgTest {
226+
227+
// the host component
228+
String host();
229+
230+
// the path + query components
231+
String file();
232+
233+
// Create a new test case identical to this one but
234+
// with a different URL scheme and port
235+
default ThreeArgsTest withScheme(String scheme) {
236+
String urlWithScheme = urlWithScheme(scheme);
237+
if (this instanceof OfHostFile) {
238+
return new OfHostFile(character(), host(), file(), urlWithScheme);
239+
}
240+
throw new AssertionError("unexpected subclass: " + this.getClass());
241+
}
242+
243+
@Override
244+
default boolean early(int c) {
245+
return (c < 31 || c == 127 || c == '/');
246+
}
247+
248+
@Override
249+
default boolean acceptDelayedException(Throwable exception) {
250+
return URLArgTest.super.acceptDelayedException(exception)
251+
|| "file".equalsIgnoreCase(scheme())
252+
&& exception instanceof IOException;
253+
}
254+
255+
record OfHostFile(int character, String host, String file, String url)
256+
implements ThreeArgsTest {
257+
}
258+
259+
static ThreeArgsTest ofHostFile(int c) {
260+
String host = "local%shost".formatted(Character.toString(c));
261+
String url = "http://" + host + "/";
262+
return new OfHostFile(c, host, "/", url);
263+
}
264+
}
265+
266+
// Test data for the four args constructor
267+
// public URL(String scheme, String host, int port, String file)
268+
// throws MalformedURLException
269+
sealed interface FourArgsTest extends URLArgTest {
270+
271+
// the host component
272+
String host();
273+
274+
// the port component
275+
int port();
276+
277+
// the path + query components
278+
String file();
279+
280+
// Create a new test case identical to this one but
281+
// with a different URL scheme and port
282+
default FourArgsTest withScheme(String scheme) {
283+
String urlWithScheme = urlWithScheme(scheme);
284+
if (this instanceof OfHostFilePort) {
285+
int port = URLArgTest.port(scheme);
286+
return new OfHostFilePort(character(), host(), port, file(), urlWithScheme);
287+
}
288+
throw new AssertionError("unexpected subclass: " + this.getClass());
289+
}
290+
291+
@Override
292+
default boolean early(int c) {
293+
return (c < 31 || c == 127 || c == '/');
294+
}
295+
296+
@Override
297+
default boolean acceptDelayedException(Throwable exception) {
298+
return URLArgTest.super.acceptDelayedException(exception)
299+
|| "file".equalsIgnoreCase(scheme())
300+
&& exception instanceof IOException;
301+
}
302+
303+
record OfHostFilePort(int character, String host, int port, String file, String url)
304+
implements FourArgsTest {
305+
}
306+
307+
static FourArgsTest ofHostPortFile(int c) {
308+
String host = "local%shost".formatted(Character.toString(c));
309+
String url = "http://" + host + "/";
310+
int port = URLArgTest.port(URLArgTest.scheme(url));
311+
return new OfHostFilePort(c, host, port, "/", url);
312+
}
313+
}
314+
315+
316+
// Generate test data for the URL one arg constructor, with variations
317+
// of the host component.
318+
static Stream<OneArgTest> oneArgHostTests() {
319+
List<OneArgTest> tests = new ArrayList<>();
320+
List<OneArgTest> urls = new ArrayList<>();
321+
urls.addAll((UNWISE + EXCLUDED_DELIMS).chars()
322+
.mapToObj(OneArgTest::ofHost).toList());
323+
urls.addAll(IntStream.concat(IntStream.range(0, 31), IntStream.of(127))
324+
.mapToObj(OneArgTest::ofHost).toList());
325+
for (String scheme : List.of("http", "https", "ftp")) {
326+
for (var test : urls) {
327+
tests.add(test.withScheme(scheme));
328+
}
329+
}
330+
return tests.stream();
331+
}
332+
333+
// Generate test data for the URL one arg constructor, with variations
334+
// of the user info component.
335+
static Stream<OneArgTest> oneArgUserInfoTests() {
336+
List<OneArgTest> tests = new ArrayList<>();
337+
List<OneArgTest> urls = new ArrayList<>();
338+
urls.addAll(IntStream.concat(IntStream.range(0, 31), IntStream.of(127))
339+
.mapToObj(OneArgTest::ofUserInfo).toList());
340+
urls.add(OneArgTest.ofUserInfo('\\'));
341+
for (String scheme : List.of("http", "https", "ftp")) {
342+
for (var test : urls) {
343+
tests.add(test.withScheme(scheme));
344+
}
345+
}
346+
return tests.stream();
347+
}
348+
349+
// Test data with all variations for the URL one arg
350+
// constructor (spec)
351+
static Stream<OneArgTest> oneArgTests() {
352+
return Stream.concat(oneArgHostTests(), oneArgUserInfoTests());
353+
}
354+
355+
// Test data with all variations for the URL two arg
356+
// constructor (URL, spec)
357+
static Stream<TwoArgsTest> twoArgTests() {
358+
return oneArgTests().map(TwoArgsTest::ofOneArgTest);
359+
}
360+
361+
// Generate test data for the URL three arguments constructor
362+
// (scheme, host, file)
363+
static Stream<ThreeArgsTest> threeArgsTests() {
364+
List<ThreeArgsTest> urls = new ArrayList<>();
365+
urls.addAll((UNWISE + EXCLUDED_DELIMS + DELIMS).chars()
366+
.mapToObj(ThreeArgsTest::ofHostFile).toList());
367+
urls.addAll(IntStream.concat(IntStream.range(0, 31), IntStream.of(127))
368+
.mapToObj(ThreeArgsTest::ofHostFile).toList());
369+
List<ThreeArgsTest> tests = new ArrayList<>();
370+
for (String scheme : List.of("http", "https", "ftp", "file")) {
371+
for (var test : urls) {
372+
tests.add(test.withScheme(scheme));
373+
}
374+
}
375+
return tests.stream();
376+
}
377+
378+
// Generate test data for the URL four arguments constructor
379+
// (scheme, host, port, file)
380+
static Stream<FourArgsTest> fourArgsTests() {
381+
List<FourArgsTest> urls = new ArrayList<>();
382+
urls.addAll((UNWISE + EXCLUDED_DELIMS + DELIMS).chars()
383+
.mapToObj(FourArgsTest::ofHostPortFile).toList());
384+
urls.addAll(IntStream.concat(IntStream.range(0, 31), IntStream.of(127))
385+
.mapToObj(FourArgsTest::ofHostPortFile).toList());
386+
List<FourArgsTest> tests = new ArrayList<>();
387+
for (String scheme : List.of("http", "https", "ftp", "file")) {
388+
for (var test : urls) {
389+
tests.add(test.withScheme(scheme));
390+
}
391+
}
392+
return tests.stream();
393+
}
394+
395+
396+
397+
@ParameterizedTest
398+
@MethodSource("oneArgTests")
399+
public void testOneArgConstructor(OneArgTest test) throws Exception {
400+
401+
int c = test.character();
402+
String url = test.url();
403+
if (EARLY_PARSING || test.early(c)) {
404+
err.println("Early parsing: " + test.describe());
405+
var exception = assertThrows(MalformedURLException.class, () -> {
406+
new URL(url);
407+
});
408+
err.println("Got expected exception: " + exception);
409+
} else {
410+
err.println("Delayed parsing: " + test.describe());
411+
URL u = new URL(url);
412+
var exception = assertThrows(IOException.class, () -> {
413+
u.openConnection().connect();
414+
});
415+
if (!test.acceptDelayedException(exception)) {
416+
err.println("unexpected exception type: " + exception);
417+
throw exception;
418+
}
419+
err.println("Got expected exception: " + exception);
420+
assertFalse(exception instanceof ConnectException);
421+
}
422+
}
423+
424+
@ParameterizedTest
425+
@MethodSource("twoArgTests")
426+
public void testTwoArgConstructor(TwoArgsTest test) throws Exception {
427+
428+
int c = test.character();
429+
String url = test.url();
430+
String scheme = URLArgTest.scheme(url);
431+
URL u = new URL(scheme, null,"");
432+
if (EARLY_PARSING || test.early(c)) {
433+
err.println("Early parsing: " + test.describe());
434+
var exception = assertThrows(MalformedURLException.class, () -> {
435+
new URL(u, url);
436+
});
437+
err.println("Got expected exception: " + exception);
438+
} else {
439+
err.println("Delayed parsing: " + test.describe());
440+
URL u2 = new URL(u, url);
441+
var exception = assertThrows(IOException.class, () -> {
442+
u2.openConnection().connect();
443+
});
444+
if (!test.acceptDelayedException(exception)) {
445+
err.println("unexpected exception type: " + exception);
446+
throw exception;
447+
}
448+
err.println("Got expected exception: " + exception);
449+
assertFalse(exception instanceof ConnectException);
450+
}
451+
}
452+
453+
@ParameterizedTest
454+
@MethodSource("threeArgsTests")
455+
public void testThreeArgsConstructor(ThreeArgsTest test) throws Exception {
456+
457+
int c = test.character();
458+
String url = test.url();
459+
if (EARLY_PARSING || test.early(c)) {
460+
err.println("Early parsing: " + url);
461+
var exception = assertThrows(MalformedURLException.class, () -> {
462+
new URL(test.scheme(), test.host(), test.file());
463+
});
464+
err.println("Got expected exception: " + exception);
465+
} else {
466+
err.println("Delayed parsing: " + url);
467+
URL u = new URL(test.scheme(), test.host(), test.file());
468+
var exception = assertThrows(IOException.class, () -> {
469+
u.openConnection().connect();
470+
});
471+
if (!test.acceptDelayedException(exception)) {
472+
err.println("unexpected exception type: " + exception);
473+
throw exception;
474+
}
475+
err.println("Got expected exception: " + exception);
476+
assertFalse(exception instanceof ConnectException);
477+
}
478+
}
479+
480+
@ParameterizedTest
481+
@MethodSource("fourArgsTests")
482+
public void testFourArgsConstructor(FourArgsTest test) throws Exception {
483+
484+
int c = test.character();
485+
String url = test.url();
486+
if (EARLY_PARSING || test.early(c)) {
487+
err.println("Early parsing: " + url);
488+
var exception = assertThrows(MalformedURLException.class, () -> {
489+
new URL(test.scheme(), test.host(), test.port(), test.file());
490+
});
491+
err.println("Got expected exception: " + exception);
492+
} else {
493+
err.println("Delayed parsing: " + url);
494+
URL u = new URL(test.scheme(), test.host(), test.port(), test.file());
495+
var exception = assertThrows(IOException.class, () -> {
496+
u.openConnection().connect();
497+
});
498+
if (!test.acceptDelayedException(exception)) {
499+
err.println("unexpected exception type: " + exception);
500+
throw exception;
501+
}
502+
err.println("Got expected exception: " + exception);
503+
assertFalse(exception instanceof ConnectException);
504+
}
505+
}
506+
507+
}

0 commit comments

Comments
 (0)
Please sign in to comment.