Regular Expressions 101

Community Patterns

1

URL-http(s)

Created·2016-05-19 04:49
Flavor·PCRE (Legacy)
Tests for valid http or https protocol URL. *2 groups- one for protocol,domain, and any subdomains; and one for path, query, params, and fragments(if any. The following WILL match: http://foo.com/blah_blah http://foo.com/blah_blah/ http://foo.com/blah_blah_(wikipedia) http://foo.com/blah_blah_(wikipedia)_(again) http://www.example.com/wpstyle/?p=364 https://www.example.com/foo/?bar=baz&inga=42&quux The following WILL NOT match: http://✪df.ws/123 http://userid:password@example.com:8080 http://userid:password@example.com:8080/ http://userid@example.com http://userid@example.com/ http://userid@example.com:8080 http://مثال.إختبار http://例子.测试 http://उदाहरण.परीक्षा http://-.~_!$&'()*+,;=:%40:80%2f::::::@example.com http://1337.net http://a.b-c.de http://223.255.255.254 The following SHOULD NOT and DO NOT match: http:// http://. http://.. http://../ http://? http://?? http://??/ http://# http://## http://##/ http://foo.bar?q=Spaces should be encoded // //a ///a /// http:///a foo.com rdar://1234 h://test http:// shouldfail.com :// should fail http://foo.bar/foo(bar)baz quux ftps://foo.bar/ http://-error-.invalid/ http://a.b--c.de/ http://-a.b.co http://a.b-.co http://0.0.0.0 http://10.1.1.0 http://10.1.1.255 http://224.1.1.1 http://1.1.1.1.1 http://123.123.123 http://3628126748 http://.www.foo.bar/ http://www.foo.bar./ http://.www.foo.bar./ http://10.1.1.1 I only needed http and https; however others could be added.
Submitted by Brennan
1

Connection String Parser

Created·2024-01-31 18:12
Flavor·PCRE2 (PHP)
Parses connection strings into named groups Key and Value , which can then be handled by whatever programmatic method you like. Ideally handled as key value pairs. I did this in PowerShell using the below: function Resolve-ConnectionString { param( [string]$ConnectionString, [string[]]$IncludeKeys = @(), [switch]$HideSensitiveValues, [switch]$AsObject ) begin { Write-Debug "Enter [$($PSCmdlet.MyInvocation.MyCommand.Name)]..." $PSBoundParameters.Keys.ForEach{ if ($PSBoundParameters.PSItem -is [string]) { Write-Debug "$_ : $($PSBoundParameters.Item($_))" } else { Write-Debug "$_ : $($PSBoundParameters.Item($_).GetType())" } } $SensitiveValueKeys = [System.Collections.Generic.List[string]]::new([string[]]@( 'AccountKey', 'Password', 'SharedAccessKey', 'SharedAccessSignature', 'Token', 'PAT', 'PersonalAccessToken', 'AccessToken' )) Example Connection Strings $testcontent2 = @" AccountEndpoint=https://some-base-name.documents.azure.com:443/;AccountKey=kascuh9823nfsdvxc==; Endpoint=sb://other-more-different-name.servicebus.windows.net/;SharedAccessKeyName=mysak-name;SharedAccessKey=msd8fs2bsc==;EntityPath=someentitypath;TransportType=Amqp Data Source=myServerName.whatever.local;Initial Catalog=MyDatabaseName;Persist Security Info=True;User ID=myUserId;Password=MyBadPractice;MultipleActiveResultSets=True;MultiSubnetFailover=True; "@ $regexString = "(?:(?'Key'[\w|\s]*)=(?'Value'+);?)" } process { if ($AsObject) { $output = [PSCustomObject]::new() } else { $output = @{} } if ($IncludeKeys.Count -gt 0) { $IncludeKeys.ForEach{ Write-Debug "Adding key [$PSItem] to list of sensitive keys" $SensitiveValueKeys.Add($PSItem) } } Write-Debug "SensitiveValueKeys Count: $($SensitiveValueKeys.Count)" [regex]::Matches($ConnectionString, $regexString).foreach{ $Key = $PSItem.Groups.Where({ $PSItem.Name -eq 'Key' })[0].Value $Value = $PSItem.Groups.Where({ $PSItem.Name -eq 'Value' })[0].Value Write-Debug "Key: [$($Key)]" Write-Debug "Value: [$($Value)]" $keyIsSensitive = ($SensitiveValueKeys | ForEach-Object { $Key -like "$PSItem" }).Contains($true) Write-Debug "Key is sensitive: [$($keyIsSensitive)]" if ($HideSensitiveValues -and $keyIsSensitive) { $Value = '**' } elseif ($keyIsSensitive) { Write-Warning "The value of [$($Key)] is sensitive and will be included in the output!!!" } if ($AsObject) { $output | Add-Member -MemberType NoteProperty -Name $Key -Value $Value -Force } else { $output.$Key = $Value } } } end { $output Write-Debug "Exit [$($PSCmdlet.MyInvocation.MyCommand.Name)]..." } }
Submitted by rbleattler