GWT 2.7.0

com.google.gwt.safehtml.shared
Class SafeHtmlUtils

java.lang.Object
  extended by com.google.gwt.safehtml.shared.SafeHtmlUtils

public final class SafeHtmlUtils
extends java.lang.Object

Utility class containing static methods for escaping and sanitizing strings.


Field Summary
static SafeHtml EMPTY_SAFE_HTML
          An empty String.
 
Method Summary
static SafeHtml fromSafeConstant(java.lang.String s)
          Returns a SafeHtml constructed from a safe string, i.e., without escaping the string.
static SafeHtml fromString(java.lang.String s)
          Returns a SafeHtml containing the escaped string.
static SafeHtml fromTrustedString(java.lang.String s)
          Returns a SafeHtml constructed from a trusted string, i.e., without escaping the string.
static java.lang.String htmlEscape(char c)
          HTML-escapes a character.
static java.lang.String htmlEscape(java.lang.String s)
          HTML-escapes a string.
static java.lang.String htmlEscapeAllowEntities(java.lang.String text)
          HTML-escapes a string, but does not double-escape HTML-entities already present in the string.
 
Methods inherited from class java.lang.Object
clone, equals, finalize, getClass, hashCode, notify, notifyAll, toString, wait, wait, wait
 

Field Detail

EMPTY_SAFE_HTML

public static final SafeHtml EMPTY_SAFE_HTML
An empty String.

Method Detail

fromSafeConstant

public static SafeHtml fromSafeConstant(java.lang.String s)
Returns a SafeHtml constructed from a safe string, i.e., without escaping the string.

Important: For this method to be able to honor the SafeHtml contract, all uses of this method must satisfy the following constraints:

  1. The argument expression must be fully determined at compile time.
  2. The value of the argument must end in "inner HTML" context and not contain incomplete HTML tags. I.e., the following is not a correct use of this method, because the <a> tag is incomplete:
     shb.appendHtmlConstant("<a href='").append(url)

The first constraint provides a sufficient condition that the argument (and any HTML markup contained in it) originates from a trusted source. The second constraint ensures the composability of SafeHtml values.

When executing client-side in Development Mode, or server-side with assertions enabled, the argument is HTML-parsed and validated to satisfy the second constraint (the server-side check can also be enabled programmatically, see SafeHtmlHostedModeUtils.maybeCheckCompleteHtml(String) for details). For performance reasons, this check is not performed in Production Mode on the client, and with assertions disabled on the server.

Parameters:
s - the string to be wrapped as a SafeHtml
Returns:
s, wrapped as a SafeHtml
Throws:
java.lang.IllegalArgumentException - if not running in Production Mode and html violates the second constraint

fromString

public static SafeHtml fromString(java.lang.String s)
Returns a SafeHtml containing the escaped string.

Parameters:
s - the input String
Returns:
a SafeHtml instance

fromTrustedString

public static SafeHtml fromTrustedString(java.lang.String s)
Returns a SafeHtml constructed from a trusted string, i.e., without escaping the string. No checks are performed. The calling code should be carefully reviewed to ensure the argument meets the SafeHtml contract.

Parameters:
s - the input String
Returns:
a SafeHtml instance

htmlEscape

public static java.lang.String htmlEscape(char c)
HTML-escapes a character. HTML meta characters will be escaped as follows:
 & - &amp;
 < - &lt;
 > - &gt;
 " - &quot;
 ' - &#39;
 

Parameters:
c - the character to be escaped
Returns:
a string containing either the input character or an equivalent HTML Entity Reference

htmlEscape

public static java.lang.String htmlEscape(java.lang.String s)
HTML-escapes a string. Note: The following variants of this function were profiled on FF36, Chrome6, IE8:
  1. For each case, check indexOf, then use s.replace(regex, string)
  2. For each case, check indexOf, then use s.replaceAll()
  3. Check if any metachar is present using a regex, then use #1
  4. For each case, use s.replace(regex, string)
#1 was found to be the fastest, and is used below.

Parameters:
s - the string to be escaped
Returns:
the input string, with all occurrences of HTML meta-characters replaced with their corresponding HTML Entity References

htmlEscapeAllowEntities

public static java.lang.String htmlEscapeAllowEntities(java.lang.String text)
HTML-escapes a string, but does not double-escape HTML-entities already present in the string.

Parameters:
text - the string to be escaped
Returns:
the input string, with all occurrences of HTML meta-characters replaced with their corresponding HTML Entity References, with the exception that ampersand characters are not double-escaped if they form the start of an HTML Entity Reference

GWT 2.7.0