UNPKG

validator

Version:
161 lines (157 loc) 6.74 kB
function _slicedToArray(r, e) { return _arrayWithHoles(r) || _iterableToArrayLimit(r, e) || _unsupportedIterableToArray(r, e) || _nonIterableRest(); } function _nonIterableRest() { throw new TypeError("Invalid attempt to destructure non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method."); } function _unsupportedIterableToArray(r, a) { if (r) { if ("string" == typeof r) return _arrayLikeToArray(r, a); var t = {}.toString.call(r).slice(8, -1); return "Object" === t && r.constructor && (t = r.constructor.name), "Map" === t || "Set" === t ? Array.from(r) : "Arguments" === t || /^(?:Ui|I)nt(?:8|16|32)(?:Clamped)?Array$/.test(t) ? _arrayLikeToArray(r, a) : void 0; } } function _arrayLikeToArray(r, a) { (null == a || a > r.length) && (a = r.length); for (var e = 0, n = Array(a); e < a; e++) n[e] = r[e]; return n; } function _iterableToArrayLimit(r, l) { var t = null == r ? null : "undefined" != typeof Symbol && r[Symbol.iterator] || r["@@iterator"]; if (null != t) { var e, n, i, u, a = [], f = !0, o = !1; try { if (i = (t = t.call(r)).next, 0 === l) { if (Object(t) !== t) return; f = !1; } else for (; !(f = (e = i.call(t)).done) && (a.push(e.value), a.length !== l); f = !0); } catch (r) { o = !0, n = r; } finally { try { if (!f && null != t["return"] && (u = t["return"](), Object(u) !== u)) return; } finally { if (o) throw n; } } return a; } } function _arrayWithHoles(r) { if (Array.isArray(r)) return r; } import assertString from './util/assertString'; import checkHost from './util/checkHost'; import includes from './util/includesString'; import isFQDN from './isFQDN'; import isIP from './isIP'; import merge from './util/merge'; /* options for isURL method protocols - valid protocols can be modified with this option. require_tld - If set to false isURL will not check if the URL's host includes a top-level domain. require_protocol - if set to true isURL will return false if protocol is not present in the URL. require_host - if set to false isURL will not check if host is present in the URL. require_port - if set to true isURL will check if port is present in the URL. require_valid_protocol - isURL will check if the URL's protocol is present in the protocols option. allow_underscores - if set to true, the validator will allow underscores in the URL. host_whitelist - if set to an array of strings or regexp, and the domain matches none of the strings defined in it, the validation fails. host_blacklist - if set to an array of strings or regexp, and the domain matches any of the strings defined in it, the validation fails. allow_trailing_dot - if set to true, the validator will allow the domain to end with a `.` character. allow_protocol_relative_urls - if set to true protocol relative URLs will be allowed. allow_fragments - if set to false isURL will return false if fragments are present. allow_query_components - if set to false isURL will return false if query components are present. disallow_auth - if set to true, the validator will fail if the URL contains an authentication component, e.g. `http://username:password@example.com` validate_length - if set to false isURL will skip string length validation. `max_allowed_length` will be ignored if this is set as `false`. max_allowed_length - if set, isURL will not allow URLs longer than the specified value (default is 2084 that IE maximum URL length). */ var default_url_options = { protocols: ['http', 'https', 'ftp'], require_tld: true, require_protocol: false, require_host: true, require_port: false, require_valid_protocol: true, allow_underscores: false, allow_trailing_dot: false, allow_protocol_relative_urls: false, allow_fragments: true, allow_query_components: true, validate_length: true, max_allowed_length: 2084 }; var wrapped_ipv6 = /^\[([^\]]+)\](?::([0-9]+))?$/; export default function isURL(url, options) { assertString(url); if (!url || /[\s<>]/.test(url)) { return false; } if (url.indexOf('mailto:') === 0) { return false; } options = merge(options, default_url_options); if (options.validate_length && url.length > options.max_allowed_length) { return false; } if (!options.allow_fragments && includes(url, '#')) { return false; } if (!options.allow_query_components && (includes(url, '?') || includes(url, '&'))) { return false; } var protocol, auth, host, hostname, port, port_str, split, ipv6; split = url.split('#'); url = split.shift(); split = url.split('?'); url = split.shift(); split = url.split('://'); if (split.length > 1) { protocol = split.shift().toLowerCase(); if (options.require_valid_protocol && options.protocols.indexOf(protocol) === -1) { return false; } } else if (options.require_protocol) { return false; } else if (url.slice(0, 2) === '//') { if (!options.allow_protocol_relative_urls) { return false; } split[0] = url.slice(2); } url = split.join('://'); if (url === '') { return false; } split = url.split('/'); url = split.shift(); if (url === '' && !options.require_host) { return true; } split = url.split('@'); if (split.length > 1) { if (options.disallow_auth) { return false; } if (split[0] === '') { return false; } auth = split.shift(); if (auth.indexOf(':') >= 0 && auth.split(':').length > 2) { return false; } var _auth$split = auth.split(':'), _auth$split2 = _slicedToArray(_auth$split, 2), user = _auth$split2[0], password = _auth$split2[1]; if (user === '' && password === '') { return false; } } hostname = split.join('@'); port_str = null; ipv6 = null; var ipv6_match = hostname.match(wrapped_ipv6); if (ipv6_match) { host = ''; ipv6 = ipv6_match[1]; port_str = ipv6_match[2] || null; } else { split = hostname.split(':'); host = split.shift(); if (split.length) { port_str = split.join(':'); } } if (port_str !== null && port_str.length > 0) { port = parseInt(port_str, 10); if (!/^[0-9]+$/.test(port_str) || port <= 0 || port > 65535) { return false; } } else if (options.require_port) { return false; } if (options.host_whitelist) { return checkHost(host, options.host_whitelist); } if (host === '' && !options.require_host) { return true; } if (!isIP(host) && !isFQDN(host, options) && (!ipv6 || !isIP(ipv6, 6))) { return false; } host = host || ipv6; if (options.host_blacklist && checkHost(host, options.host_blacklist)) { return false; } return true; }