1// Copyright (c) 2012 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "chrome/common/net/url_fixer_upper.h"
6
7#include <algorithm>
8
9#if defined(OS_POSIX)
10#include "base/environment.h"
11#endif
12#include "base/file_util.h"
13#include "base/logging.h"
14#include "base/strings/string_util.h"
15#include "base/strings/utf_string_conversions.h"
16#include "chrome/common/url_constants.h"
17#include "net/base/escape.h"
18#include "net/base/net_util.h"
19#include "net/base/registry_controlled_domains/registry_controlled_domain.h"
20#include "url/url_file.h"
21#include "url/url_parse.h"
22#include "url/url_util.h"
23
24const char* URLFixerUpper::home_directory_override = NULL;
25
26namespace {
27
28// TODO(estade): Remove these ugly, ugly functions. They are only used in
29// SegmentURL. A url_parse::Parsed object keeps track of a bunch of indices into
30// a url string, and these need to be updated when the URL is converted from
31// UTF8 to UTF16. Instead of this after-the-fact adjustment, we should parse it
32// in the correct string format to begin with.
33url_parse::Component UTF8ComponentToUTF16Component(
34    const std::string& text_utf8,
35    const url_parse::Component& component_utf8) {
36  if (component_utf8.len == -1)
37    return url_parse::Component();
38
39  std::string before_component_string =
40      text_utf8.substr(0, component_utf8.begin);
41  std::string component_string = text_utf8.substr(component_utf8.begin,
42                                                  component_utf8.len);
43  string16 before_component_string_16 = UTF8ToUTF16(before_component_string);
44  string16 component_string_16 = UTF8ToUTF16(component_string);
45  url_parse::Component component_16(before_component_string_16.length(),
46                                    component_string_16.length());
47  return component_16;
48}
49
50void UTF8PartsToUTF16Parts(const std::string& text_utf8,
51                           const url_parse::Parsed& parts_utf8,
52                           url_parse::Parsed* parts) {
53  if (IsStringASCII(text_utf8)) {
54    *parts = parts_utf8;
55    return;
56  }
57
58  parts->scheme =
59      UTF8ComponentToUTF16Component(text_utf8, parts_utf8.scheme);
60  parts ->username =
61      UTF8ComponentToUTF16Component(text_utf8, parts_utf8.username);
62  parts->password =
63      UTF8ComponentToUTF16Component(text_utf8, parts_utf8.password);
64  parts->host =
65      UTF8ComponentToUTF16Component(text_utf8, parts_utf8.host);
66  parts->port =
67      UTF8ComponentToUTF16Component(text_utf8, parts_utf8.port);
68  parts->path =
69      UTF8ComponentToUTF16Component(text_utf8, parts_utf8.path);
70  parts->query =
71      UTF8ComponentToUTF16Component(text_utf8, parts_utf8.query);
72  parts->ref =
73      UTF8ComponentToUTF16Component(text_utf8, parts_utf8.ref);
74}
75
76TrimPositions TrimWhitespaceUTF8(const std::string& input,
77                                 TrimPositions positions,
78                                 std::string* output) {
79  // This implementation is not so fast since it converts the text encoding
80  // twice. Please feel free to file a bug if this function hurts the
81  // performance of Chrome.
82  DCHECK(IsStringUTF8(input));
83  string16 input16 = UTF8ToUTF16(input);
84  string16 output16;
85  TrimPositions result = TrimWhitespace(input16, positions, &output16);
86  *output = UTF16ToUTF8(output16);
87  return result;
88}
89
90// does some basic fixes for input that we want to test for file-ness
91void PrepareStringForFileOps(const base::FilePath& text,
92                             base::FilePath::StringType* output) {
93#if defined(OS_WIN)
94  TrimWhitespace(text.value(), TRIM_ALL, output);
95  replace(output->begin(), output->end(), '/', '\\');
96#else
97  TrimWhitespaceUTF8(text.value(), TRIM_ALL, output);
98#endif
99}
100
101// Tries to create a full path from |text|.  If the result is valid and the
102// file exists, returns true and sets |full_path| to the result.  Otherwise,
103// returns false and leaves |full_path| unchanged.
104bool ValidPathForFile(const base::FilePath::StringType& text,
105                      base::FilePath* full_path) {
106  base::FilePath file_path = base::MakeAbsoluteFilePath(base::FilePath(text));
107  if (file_path.empty())
108    return false;
109
110  if (!base::PathExists(file_path))
111    return false;
112
113  *full_path = file_path;
114  return true;
115}
116
117#if defined(OS_POSIX)
118// Given a path that starts with ~, return a path that starts with an
119// expanded-out /user/foobar directory.
120std::string FixupHomedir(const std::string& text) {
121  DCHECK(text.length() > 0 && text[0] == '~');
122
123  if (text.length() == 1 || text[1] == '/') {
124    const char* home = getenv(base::env_vars::kHome);
125    if (URLFixerUpper::home_directory_override)
126      home = URLFixerUpper::home_directory_override;
127    // We'll probably break elsewhere if $HOME is undefined, but check here
128    // just in case.
129    if (!home)
130      return text;
131    return home + text.substr(1);
132  }
133
134  // Otherwise, this is a path like ~foobar/baz, where we must expand to
135  // user foobar's home directory.  Officially, we should use getpwent(),
136  // but that is a nasty blocking call.
137
138#if defined(OS_MACOSX)
139  static const char kHome[] = "/Users/";
140#else
141  static const char kHome[] = "/home/";
142#endif
143  return kHome + text.substr(1);
144}
145#endif
146
147// Tries to create a file: URL from |text| if it looks like a filename, even if
148// it doesn't resolve as a valid path or to an existing file.  Returns a
149// (possibly invalid) file: URL in |fixed_up_url| for input beginning
150// with a drive specifier or "\\".  Returns the unchanged input in other cases
151// (including file: URLs: these don't look like filenames).
152std::string FixupPath(const std::string& text) {
153  DCHECK(!text.empty());
154
155  base::FilePath::StringType filename;
156#if defined(OS_WIN)
157  base::FilePath input_path(UTF8ToWide(text));
158  PrepareStringForFileOps(input_path, &filename);
159
160  // Fixup Windows-style drive letters, where "C:" gets rewritten to "C|".
161  if (filename.length() > 1 && filename[1] == '|')
162    filename[1] = ':';
163#elif defined(OS_POSIX)
164  base::FilePath input_path(text);
165  PrepareStringForFileOps(input_path, &filename);
166  if (filename.length() > 0 && filename[0] == '~')
167    filename = FixupHomedir(filename);
168#endif
169
170  // Here, we know the input looks like a file.
171  GURL file_url = net::FilePathToFileURL(base::FilePath(filename));
172  if (file_url.is_valid()) {
173    return UTF16ToUTF8(net::FormatUrl(file_url, std::string(),
174        net::kFormatUrlOmitUsernamePassword, net::UnescapeRule::NORMAL, NULL,
175        NULL, NULL));
176  }
177
178  // Invalid file URL, just return the input.
179  return text;
180}
181
182// Checks |domain| to see if a valid TLD is already present.  If not, appends
183// |desired_tld| to the domain, and prepends "www." unless it's already present.
184void AddDesiredTLD(const std::string& desired_tld, std::string* domain) {
185  if (desired_tld.empty() || domain->empty())
186    return;
187
188  // Check the TLD.  If the return value is positive, we already have a TLD, so
189  // abort.  If the return value is std::string::npos, there's no valid host,
190  // but we can try to append a TLD anyway, since the host may become valid once
191  // the TLD is attached -- for example, "999999999999" is detected as a broken
192  // IP address and marked invalid, but attaching ".com" makes it legal.  When
193  // the return value is 0, there's a valid host with no known TLD, so we can
194  // definitely append the user's TLD.  We disallow unknown registries here so
195  // users can input "mail.yahoo" and hit ctrl-enter to get
196  // "www.mail.yahoo.com".
197  const size_t registry_length =
198      net::registry_controlled_domains::GetRegistryLength(
199          *domain,
200          net::registry_controlled_domains::EXCLUDE_UNKNOWN_REGISTRIES,
201          net::registry_controlled_domains::EXCLUDE_PRIVATE_REGISTRIES);
202  if ((registry_length != 0) && (registry_length != std::string::npos))
203    return;
204
205  // Add the suffix at the end of the domain.
206  const size_t domain_length(domain->length());
207  DCHECK_GT(domain_length, 0U);
208  DCHECK_NE(desired_tld[0], '.');
209  if ((*domain)[domain_length - 1] != '.')
210    domain->push_back('.');
211  domain->append(desired_tld);
212
213  // Now, if the domain begins with "www.", stop.
214  const std::string prefix("www.");
215  if (domain->compare(0, prefix.length(), prefix) != 0) {
216    // Otherwise, add www. to the beginning of the URL.
217    domain->insert(0, prefix);
218  }
219}
220
221inline void FixupUsername(const std::string& text,
222                          const url_parse::Component& part,
223                          std::string* url) {
224  if (!part.is_valid())
225    return;
226
227  // We don't fix up the username at the moment.
228  url->append(text, part.begin, part.len);
229  // Do not append the trailing '@' because we might need to include the user's
230  // password.  FixupURL itself will append the '@' for us.
231}
232
233inline void FixupPassword(const std::string& text,
234                          const url_parse::Component& part,
235                          std::string* url) {
236  if (!part.is_valid())
237    return;
238
239  // We don't fix up the password at the moment.
240  url->append(":");
241  url->append(text, part.begin, part.len);
242}
243
244void FixupHost(const std::string& text,
245               const url_parse::Component& part,
246               bool has_scheme,
247               const std::string& desired_tld,
248               std::string* url) {
249  if (!part.is_valid())
250    return;
251
252  // Make domain valid.
253  // Strip all leading dots and all but one trailing dot, unless the user only
254  // typed dots, in which case their input is totally invalid and we should just
255  // leave it unchanged.
256  std::string domain(text, part.begin, part.len);
257  const size_t first_nondot(domain.find_first_not_of('.'));
258  if (first_nondot != std::string::npos) {
259    domain.erase(0, first_nondot);
260    size_t last_nondot(domain.find_last_not_of('.'));
261    DCHECK(last_nondot != std::string::npos);
262    last_nondot += 2;  // Point at second period in ending string
263    if (last_nondot < domain.length())
264      domain.erase(last_nondot);
265  }
266
267  // Add any user-specified TLD, if applicable.
268  AddDesiredTLD(desired_tld, &domain);
269
270  url->append(domain);
271}
272
273void FixupPort(const std::string& text,
274               const url_parse::Component& part,
275               std::string* url) {
276  if (!part.is_valid())
277    return;
278
279  // We don't fix up the port at the moment.
280  url->append(":");
281  url->append(text, part.begin, part.len);
282}
283
284inline void FixupPath(const std::string& text,
285                      const url_parse::Component& part,
286                      std::string* url) {
287  if (!part.is_valid() || part.len == 0) {
288    // We should always have a path.
289    url->append("/");
290    return;
291  }
292
293  // Append the path as is.
294  url->append(text, part.begin, part.len);
295}
296
297inline void FixupQuery(const std::string& text,
298                       const url_parse::Component& part,
299                       std::string* url) {
300  if (!part.is_valid())
301    return;
302
303  // We don't fix up the query at the moment.
304  url->append("?");
305  url->append(text, part.begin, part.len);
306}
307
308inline void FixupRef(const std::string& text,
309                     const url_parse::Component& part,
310                     std::string* url) {
311  if (!part.is_valid())
312    return;
313
314  // We don't fix up the ref at the moment.
315  url->append("#");
316  url->append(text, part.begin, part.len);
317}
318
319bool HasPort(const std::string& original_text,
320             const url_parse::Component& scheme_component) {
321  // Find the range between the ":" and the "/".
322  size_t port_start = scheme_component.end() + 1;
323  size_t port_end = port_start;
324  while ((port_end < original_text.length()) &&
325         !url_parse::IsAuthorityTerminator(original_text[port_end]))
326    ++port_end;
327  if (port_end == port_start)
328    return false;
329
330  // Scan the range to see if it is entirely digits.
331  for (size_t i = port_start; i < port_end; ++i) {
332    if (!IsAsciiDigit(original_text[i]))
333      return false;
334  }
335
336  return true;
337}
338
339// Try to extract a valid scheme from the beginning of |text|.
340// If successful, set |scheme_component| to the text range where the scheme
341// was located, and fill |canon_scheme| with its canonicalized form.
342// Otherwise, return false and leave the outputs in an indeterminate state.
343bool GetValidScheme(const std::string &text,
344                    url_parse::Component* scheme_component,
345                    std::string* canon_scheme) {
346  // Locate everything up to (but not including) the first ':'
347  if (!url_parse::ExtractScheme(text.data(), static_cast<int>(text.length()),
348                                scheme_component)) {
349    return false;
350  }
351
352  // Make sure the scheme contains only valid characters, and convert
353  // to lowercase.  This also catches IPv6 literals like [::1], because
354  // brackets are not in the whitelist.
355  url_canon::StdStringCanonOutput canon_scheme_output(canon_scheme);
356  url_parse::Component canon_scheme_component;
357  if (!url_canon::CanonicalizeScheme(text.data(), *scheme_component,
358                                     &canon_scheme_output,
359                                     &canon_scheme_component))
360    return false;
361
362  // Strip the ':', and any trailing buffer space.
363  DCHECK_EQ(0, canon_scheme_component.begin);
364  canon_scheme->erase(canon_scheme_component.len);
365
366  // We need to fix up the segmentation for "www.example.com:/".  For this
367  // case, we guess that schemes with a "." are not actually schemes.
368  if (canon_scheme->find('.') != std::string::npos)
369    return false;
370
371  // We need to fix up the segmentation for "www:123/".  For this case, we
372  // will add an HTTP scheme later and make the URL parser happy.
373  // TODO(pkasting): Maybe we should try to use GURL's parser for this?
374  if (HasPort(text, *scheme_component))
375    return false;
376
377  // Everything checks out.
378  return true;
379}
380
381// Performs the work for URLFixerUpper::SegmentURL. |text| may be modified on
382// output on success: a semicolon following a valid scheme is replaced with a
383// colon.
384std::string SegmentURLInternal(std::string* text, url_parse::Parsed* parts) {
385  // Initialize the result.
386  *parts = url_parse::Parsed();
387
388  std::string trimmed;
389  TrimWhitespaceUTF8(*text, TRIM_ALL, &trimmed);
390  if (trimmed.empty())
391    return std::string();  // Nothing to segment.
392
393#if defined(OS_WIN)
394  int trimmed_length = static_cast<int>(trimmed.length());
395  if (url_parse::DoesBeginWindowsDriveSpec(trimmed.data(), 0, trimmed_length) ||
396      url_parse::DoesBeginUNCPath(trimmed.data(), 0, trimmed_length, true))
397    return "file";
398#elif defined(OS_POSIX)
399  if (base::FilePath::IsSeparator(trimmed.data()[0]) ||
400      trimmed.data()[0] == '~')
401    return "file";
402#endif
403
404  // Otherwise, we need to look at things carefully.
405  std::string scheme;
406  if (!GetValidScheme(*text, &parts->scheme, &scheme)) {
407    // Try again if there is a ';' in the text. If changing it to a ':' results
408    // in a scheme being found, continue processing with the modified text.
409    bool found_scheme = false;
410    size_t semicolon = text->find(';');
411    if (semicolon != 0 && semicolon != std::string::npos) {
412      (*text)[semicolon] = ':';
413      if (GetValidScheme(*text, &parts->scheme, &scheme))
414        found_scheme = true;
415      else
416        (*text)[semicolon] = ';';
417    }
418    if (!found_scheme) {
419      // Couldn't determine the scheme, so just pick one.
420      parts->scheme.reset();
421      scheme.assign(StartsWithASCII(*text, "ftp.", false) ?
422                    chrome::kFtpScheme : chrome::kHttpScheme);
423    }
424  }
425
426  // Proceed with about and chrome schemes, but not file or nonstandard schemes.
427  if ((scheme != chrome::kAboutScheme) && (scheme != chrome::kChromeUIScheme) &&
428      ((scheme == chrome::kFileScheme) || !url_util::IsStandard(scheme.c_str(),
429           url_parse::Component(0, static_cast<int>(scheme.length())))))
430    return scheme;
431
432  if (scheme == chrome::kFileSystemScheme) {
433    // Have the GURL parser do the heavy lifting for us.
434    url_parse::ParseFileSystemURL(text->data(),
435        static_cast<int>(text->length()), parts);
436    return scheme;
437  }
438
439  if (parts->scheme.is_valid()) {
440    // Have the GURL parser do the heavy lifting for us.
441    url_parse::ParseStandardURL(text->data(), static_cast<int>(text->length()),
442                                parts);
443    return scheme;
444  }
445
446  // We need to add a scheme in order for ParseStandardURL to be happy.
447  // Find the first non-whitespace character.
448  std::string::iterator first_nonwhite = text->begin();
449  while ((first_nonwhite != text->end()) && IsWhitespace(*first_nonwhite))
450    ++first_nonwhite;
451
452  // Construct the text to parse by inserting the scheme.
453  std::string inserted_text(scheme);
454  inserted_text.append(content::kStandardSchemeSeparator);
455  std::string text_to_parse(text->begin(), first_nonwhite);
456  text_to_parse.append(inserted_text);
457  text_to_parse.append(first_nonwhite, text->end());
458
459  // Have the GURL parser do the heavy lifting for us.
460  url_parse::ParseStandardURL(text_to_parse.data(),
461                              static_cast<int>(text_to_parse.length()),
462                              parts);
463
464  // Offset the results of the parse to match the original text.
465  const int offset = -static_cast<int>(inserted_text.length());
466  URLFixerUpper::OffsetComponent(offset, &parts->scheme);
467  URLFixerUpper::OffsetComponent(offset, &parts->username);
468  URLFixerUpper::OffsetComponent(offset, &parts->password);
469  URLFixerUpper::OffsetComponent(offset, &parts->host);
470  URLFixerUpper::OffsetComponent(offset, &parts->port);
471  URLFixerUpper::OffsetComponent(offset, &parts->path);
472  URLFixerUpper::OffsetComponent(offset, &parts->query);
473  URLFixerUpper::OffsetComponent(offset, &parts->ref);
474
475  return scheme;
476}
477
478}  // namespace
479
480std::string URLFixerUpper::SegmentURL(const std::string& text,
481                                      url_parse::Parsed* parts) {
482  std::string mutable_text(text);
483  return SegmentURLInternal(&mutable_text, parts);
484}
485
486string16 URLFixerUpper::SegmentURL(const string16& text,
487                                   url_parse::Parsed* parts) {
488  std::string text_utf8 = UTF16ToUTF8(text);
489  url_parse::Parsed parts_utf8;
490  std::string scheme_utf8 = SegmentURL(text_utf8, &parts_utf8);
491  UTF8PartsToUTF16Parts(text_utf8, parts_utf8, parts);
492  return UTF8ToUTF16(scheme_utf8);
493}
494
495GURL URLFixerUpper::FixupURL(const std::string& text,
496                             const std::string& desired_tld) {
497  std::string trimmed;
498  TrimWhitespaceUTF8(text, TRIM_ALL, &trimmed);
499  if (trimmed.empty())
500    return GURL();  // Nothing here.
501
502  // Segment the URL.
503  url_parse::Parsed parts;
504  std::string scheme(SegmentURLInternal(&trimmed, &parts));
505
506  // For view-source: URLs, we strip "view-source:", do fixup, and stick it back
507  // on.  This allows us to handle things like "view-source:google.com".
508  if (scheme == content::kViewSourceScheme) {
509    // Reject "view-source:view-source:..." to avoid deep recursion.
510    std::string view_source(content::kViewSourceScheme + std::string(":"));
511    if (!StartsWithASCII(text, view_source + view_source, false)) {
512      return GURL(content::kViewSourceScheme + std::string(":") +
513          FixupURL(trimmed.substr(scheme.length() + 1),
514                   desired_tld).possibly_invalid_spec());
515    }
516  }
517
518  // We handle the file scheme separately.
519  if (scheme == chrome::kFileScheme)
520    return GURL(parts.scheme.is_valid() ? text : FixupPath(text));
521
522  // We handle the filesystem scheme separately.
523  if (scheme == chrome::kFileSystemScheme) {
524    if (parts.inner_parsed() && parts.inner_parsed()->scheme.is_valid())
525      return GURL(text);
526    return GURL();
527  }
528
529  // Parse and rebuild about: and chrome: URLs, except about:blank.
530  bool chrome_url = !LowerCaseEqualsASCII(trimmed, content::kAboutBlankURL) &&
531      ((scheme == chrome::kAboutScheme) || (scheme == chrome::kChromeUIScheme));
532
533  // For some schemes whose layouts we understand, we rebuild it.
534  if (chrome_url || url_util::IsStandard(scheme.c_str(),
535          url_parse::Component(0, static_cast<int>(scheme.length())))) {
536    // Replace the about: scheme with the chrome: scheme.
537    std::string url(chrome_url ? chrome::kChromeUIScheme : scheme);
538    url.append(content::kStandardSchemeSeparator);
539
540    // We need to check whether the |username| is valid because it is our
541    // responsibility to append the '@' to delineate the user information from
542    // the host portion of the URL.
543    if (parts.username.is_valid()) {
544      FixupUsername(trimmed, parts.username, &url);
545      FixupPassword(trimmed, parts.password, &url);
546      url.append("@");
547    }
548
549    FixupHost(trimmed, parts.host, parts.scheme.is_valid(), desired_tld, &url);
550    if (chrome_url && !parts.host.is_valid())
551      url.append(chrome::kChromeUIDefaultHost);
552    FixupPort(trimmed, parts.port, &url);
553    FixupPath(trimmed, parts.path, &url);
554    FixupQuery(trimmed, parts.query, &url);
555    FixupRef(trimmed, parts.ref, &url);
556
557    return GURL(url);
558  }
559
560  // In the worst-case, we insert a scheme if the URL lacks one.
561  if (!parts.scheme.is_valid()) {
562    std::string fixed_scheme(scheme);
563    fixed_scheme.append(content::kStandardSchemeSeparator);
564    trimmed.insert(0, fixed_scheme);
565  }
566
567  return GURL(trimmed);
568}
569
570// The rules are different here than for regular fixup, since we need to handle
571// input like "hello.html" and know to look in the current directory.  Regular
572// fixup will look for cues that it is actually a file path before trying to
573// figure out what file it is.  If our logic doesn't work, we will fall back on
574// regular fixup.
575GURL URLFixerUpper::FixupRelativeFile(const base::FilePath& base_dir,
576                                      const base::FilePath& text) {
577  base::FilePath old_cur_directory;
578  if (!base_dir.empty()) {
579    // Save the old current directory before we move to the new one.
580    file_util::GetCurrentDirectory(&old_cur_directory);
581    file_util::SetCurrentDirectory(base_dir);
582  }
583
584  // Allow funny input with extra whitespace and the wrong kind of slashes.
585  base::FilePath::StringType trimmed;
586  PrepareStringForFileOps(text, &trimmed);
587
588  bool is_file = true;
589  // Avoid recognizing definite non-file URLs as file paths.
590  GURL gurl(trimmed);
591  if (gurl.is_valid() && gurl.IsStandard())
592    is_file = false;
593  base::FilePath full_path;
594  if (is_file && !ValidPathForFile(trimmed, &full_path)) {
595    // Not a path as entered, try unescaping it in case the user has
596    // escaped things. We need to go through 8-bit since the escaped values
597    // only represent 8-bit values.
598#if defined(OS_WIN)
599    std::wstring unescaped = UTF8ToWide(net::UnescapeURLComponent(
600        WideToUTF8(trimmed),
601        net::UnescapeRule::SPACES | net::UnescapeRule::URL_SPECIAL_CHARS));
602#elif defined(OS_POSIX)
603    std::string unescaped = net::UnescapeURLComponent(
604        trimmed,
605        net::UnescapeRule::SPACES | net::UnescapeRule::URL_SPECIAL_CHARS);
606#endif
607
608    if (!ValidPathForFile(unescaped, &full_path))
609      is_file = false;
610  }
611
612  // Put back the current directory if we saved it.
613  if (!base_dir.empty())
614    file_util::SetCurrentDirectory(old_cur_directory);
615
616  if (is_file) {
617    GURL file_url = net::FilePathToFileURL(full_path);
618    if (file_url.is_valid())
619      return GURL(UTF16ToUTF8(net::FormatUrl(file_url, std::string(),
620          net::kFormatUrlOmitUsernamePassword, net::UnescapeRule::NORMAL, NULL,
621          NULL, NULL)));
622    // Invalid files fall through to regular processing.
623  }
624
625  // Fall back on regular fixup for this input.
626#if defined(OS_WIN)
627  std::string text_utf8 = WideToUTF8(text.value());
628#elif defined(OS_POSIX)
629  std::string text_utf8 = text.value();
630#endif
631  return FixupURL(text_utf8, std::string());
632}
633
634void URLFixerUpper::OffsetComponent(int offset, url_parse::Component* part) {
635  DCHECK(part);
636
637  if (part->is_valid()) {
638    // Offset the location of this component.
639    part->begin += offset;
640
641    // This part might not have existed in the original text.
642    if (part->begin < 0)
643      part->reset();
644  }
645}
646