/* * Copyright 2009 Google Inc. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package com.google.template.soy.bididirectives; import com.google.common.collect.ImmutableSet; import com.google.template.soy.data.Dir; import com.google.template.soy.data.SanitizedContent; import com.google.template.soy.data.SanitizedContent.ContentKind; import com.google.template.soy.data.SoyValue; import com.google.template.soy.data.UnsafeSanitizedContentOrdainer; import com.google.template.soy.data.restricted.StringData; import com.google.template.soy.internal.i18n.BidiFormatter; import com.google.template.soy.internal.i18n.BidiGlobalDir; import com.google.template.soy.internal.i18n.SoyBidiUtils; import com.google.template.soy.jssrc.restricted.JsExpr; import com.google.template.soy.jssrc.restricted.SoyLibraryAssistedJsSrcPrintDirective; import com.google.template.soy.pysrc.restricted.PyExpr; import com.google.template.soy.pysrc.restricted.SoyPySrcPrintDirective; import com.google.template.soy.shared.restricted.SoyJavaPrintDirective; import java.util.List; import java.util.Set; import javax.inject.Inject; import javax.inject.Provider; import javax.inject.Singleton; /** * A directive that maybe wraps the output within Unicode bidi control characters -- start character * is either LRE (U+202A) or RLE (U+202B), and end character is always PDF (U+202C). This wrapping * is only applied when the output text's bidi directionality is different from the bidi global * directionality. * */ @Singleton final class BidiUnicodeWrapDirective implements SoyJavaPrintDirective, SoyLibraryAssistedJsSrcPrintDirective, SoyPySrcPrintDirective { /** Provider for the current bidi global directionality. */ private final Provider<BidiGlobalDir> bidiGlobalDirProvider; /** @param bidiGlobalDirProvider Provider for the current bidi global directionality. */ @Inject BidiUnicodeWrapDirective(Provider<BidiGlobalDir> bidiGlobalDirProvider) { this.bidiGlobalDirProvider = bidiGlobalDirProvider; } @Override public String getName() { return "|bidiUnicodeWrap"; } @Override public Set<Integer> getValidArgsSizes() { return ImmutableSet.of(0); } @Override public boolean shouldCancelAutoescape() { return false; } @Override public SoyValue applyForJava(SoyValue value, List<SoyValue> args) { ContentKind valueKind = null; Dir valueDir = null; if (value instanceof SanitizedContent) { SanitizedContent sanitizedContent = (SanitizedContent) value; valueKind = sanitizedContent.getContentKind(); valueDir = sanitizedContent.getContentDirection(); } BidiFormatter bidiFormatter = SoyBidiUtils.getBidiFormatter(bidiGlobalDirProvider.get().getStaticValue()); // We treat the value as HTML if and only if it says it's HTML, even though in legacy usage, we // sometimes have an HTML string (not SanitizedContent) that is passed to an autoescape="false" // template or a {print $foo |noAutoescape}, with the output going into an HTML context without // escaping. We simply have no way of knowing if this is what is happening when we get // non-SanitizedContent input, and most of the time it isn't. boolean isHtml = valueKind == ContentKind.HTML; String wrappedValue = bidiFormatter.unicodeWrapWithKnownDir(valueDir, value.coerceToString(), isHtml); // Bidi-wrapping a value converts it to the context directionality. Since it does not cost us // anything, we will indicate this known direction in the output SanitizedContent, even though // the intended consumer of that information - a bidi wrapping directive - has already been run. Dir wrappedValueDir = bidiFormatter.getContextDir(); // Unicode-wrapping UnsanitizedText gives UnsanitizedText. // Unicode-wrapping safe HTML. if (valueKind == ContentKind.TEXT || valueKind == ContentKind.HTML) { return UnsafeSanitizedContentOrdainer.ordainAsSafe(wrappedValue, valueKind, wrappedValueDir); } // Unicode-wrapping does not conform to the syntax of the other types of content. For lack of // anything better to do, we output non-SanitizedContent. // TODO(user): Consider throwing a runtime error on receipt of SanitizedContent other than // TEXT, or HTML. if (valueKind != null) { return StringData.forValue(wrappedValue); } // The input was not SanitizedContent, so our output isn't SanitizedContent either. return StringData.forValue(wrappedValue); } @Override public JsExpr applyForJsSrc(JsExpr value, List<JsExpr> args) { String codeSnippet = bidiGlobalDirProvider.get().getCodeSnippet(); return new JsExpr( "soy.$$bidiUnicodeWrap(" + codeSnippet + ", " + value.getText() + ")", Integer.MAX_VALUE); } @Override public ImmutableSet<String> getRequiredJsLibNames() { return ImmutableSet.of("soy"); } @Override public PyExpr applyForPySrc(PyExpr value, List<PyExpr> args) { String codeSnippet = bidiGlobalDirProvider.get().getCodeSnippet(); return new PyExpr( "bidi.unicode_wrap(" + codeSnippet + ", " + value.getText() + ")", Integer.MAX_VALUE); } }