mirror of
https://github.com/unidoc/unioffice.git
synced 2025-05-04 22:17:38 +08:00

- check for namespaces when decoding - merge wordprocessingDrawing into wordprocessingml, this fixes some issues with cyclic import paths (XML namespaces don't translate to to valid go namespaces due to this)
309 lines
9.3 KiB
Go
309 lines
9.3 KiB
Go
// Copyright 2017 Baliance. All rights reserved.
|
|
//
|
|
// DO NOT EDIT: generated by gooxml ECMA-376 generator
|
|
//
|
|
// Use of this source code is governed by the terms of the Affero GNU General
|
|
// Public License version 3.0 as published by the Free Software Foundation and
|
|
// appearing in the file LICENSE included in the packaging of this file. A
|
|
// commercial license can be purchased by contacting sales@baliance.com.
|
|
|
|
package wordprocessingml
|
|
|
|
import (
|
|
"encoding/xml"
|
|
"fmt"
|
|
"strconv"
|
|
|
|
"baliance.com/gooxml/schema/schemas.openxmlformats.org/officeDocument/2006/sharedTypes"
|
|
)
|
|
|
|
type CT_DocProtect struct {
|
|
// Document Editing Restrictions
|
|
EditAttr ST_DocProtect
|
|
// Only Allow Formatting With Unlocked Styles
|
|
FormattingAttr *sharedTypes.ST_OnOff
|
|
// Enforce Document Protection Settings
|
|
EnforcementAttr *sharedTypes.ST_OnOff
|
|
AlgorithmNameAttr *string
|
|
HashValueAttr *string
|
|
SaltValueAttr *string
|
|
SpinCountAttr *int64
|
|
CryptProviderTypeAttr sharedTypes.ST_CryptProv
|
|
CryptAlgorithmClassAttr sharedTypes.ST_AlgClass
|
|
CryptAlgorithmTypeAttr sharedTypes.ST_AlgType
|
|
CryptAlgorithmSidAttr *int64
|
|
CryptSpinCountAttr *int64
|
|
CryptProviderAttr *string
|
|
AlgIdExtAttr *string
|
|
AlgIdExtSourceAttr *string
|
|
CryptProviderTypeExtAttr *string
|
|
CryptProviderTypeExtSourceAttr *string
|
|
HashAttr *string
|
|
SaltAttr *string
|
|
}
|
|
|
|
func NewCT_DocProtect() *CT_DocProtect {
|
|
ret := &CT_DocProtect{}
|
|
return ret
|
|
}
|
|
|
|
func (m *CT_DocProtect) MarshalXML(e *xml.Encoder, start xml.StartElement) error {
|
|
if m.EditAttr != ST_DocProtectUnset {
|
|
attr, err := m.EditAttr.MarshalXMLAttr(xml.Name{Local: "w:edit"})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
start.Attr = append(start.Attr, attr)
|
|
}
|
|
if m.FormattingAttr != nil {
|
|
start.Attr = append(start.Attr, xml.Attr{Name: xml.Name{Local: "w:formatting"},
|
|
Value: fmt.Sprintf("%v", *m.FormattingAttr)})
|
|
}
|
|
if m.EnforcementAttr != nil {
|
|
start.Attr = append(start.Attr, xml.Attr{Name: xml.Name{Local: "w:enforcement"},
|
|
Value: fmt.Sprintf("%v", *m.EnforcementAttr)})
|
|
}
|
|
if m.AlgorithmNameAttr != nil {
|
|
start.Attr = append(start.Attr, xml.Attr{Name: xml.Name{Local: "w:algorithmName"},
|
|
Value: fmt.Sprintf("%v", *m.AlgorithmNameAttr)})
|
|
}
|
|
if m.HashValueAttr != nil {
|
|
start.Attr = append(start.Attr, xml.Attr{Name: xml.Name{Local: "w:hashValue"},
|
|
Value: fmt.Sprintf("%v", *m.HashValueAttr)})
|
|
}
|
|
if m.SaltValueAttr != nil {
|
|
start.Attr = append(start.Attr, xml.Attr{Name: xml.Name{Local: "w:saltValue"},
|
|
Value: fmt.Sprintf("%v", *m.SaltValueAttr)})
|
|
}
|
|
if m.SpinCountAttr != nil {
|
|
start.Attr = append(start.Attr, xml.Attr{Name: xml.Name{Local: "w:spinCount"},
|
|
Value: fmt.Sprintf("%v", *m.SpinCountAttr)})
|
|
}
|
|
if m.CryptProviderTypeAttr != sharedTypes.ST_CryptProvUnset {
|
|
attr, err := m.CryptProviderTypeAttr.MarshalXMLAttr(xml.Name{Local: "w:cryptProviderType"})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
start.Attr = append(start.Attr, attr)
|
|
}
|
|
if m.CryptAlgorithmClassAttr != sharedTypes.ST_AlgClassUnset {
|
|
attr, err := m.CryptAlgorithmClassAttr.MarshalXMLAttr(xml.Name{Local: "w:cryptAlgorithmClass"})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
start.Attr = append(start.Attr, attr)
|
|
}
|
|
if m.CryptAlgorithmTypeAttr != sharedTypes.ST_AlgTypeUnset {
|
|
attr, err := m.CryptAlgorithmTypeAttr.MarshalXMLAttr(xml.Name{Local: "w:cryptAlgorithmType"})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
start.Attr = append(start.Attr, attr)
|
|
}
|
|
if m.CryptAlgorithmSidAttr != nil {
|
|
start.Attr = append(start.Attr, xml.Attr{Name: xml.Name{Local: "w:cryptAlgorithmSid"},
|
|
Value: fmt.Sprintf("%v", *m.CryptAlgorithmSidAttr)})
|
|
}
|
|
if m.CryptSpinCountAttr != nil {
|
|
start.Attr = append(start.Attr, xml.Attr{Name: xml.Name{Local: "w:cryptSpinCount"},
|
|
Value: fmt.Sprintf("%v", *m.CryptSpinCountAttr)})
|
|
}
|
|
if m.CryptProviderAttr != nil {
|
|
start.Attr = append(start.Attr, xml.Attr{Name: xml.Name{Local: "w:cryptProvider"},
|
|
Value: fmt.Sprintf("%v", *m.CryptProviderAttr)})
|
|
}
|
|
if m.AlgIdExtAttr != nil {
|
|
start.Attr = append(start.Attr, xml.Attr{Name: xml.Name{Local: "w:algIdExt"},
|
|
Value: fmt.Sprintf("%v", *m.AlgIdExtAttr)})
|
|
}
|
|
if m.AlgIdExtSourceAttr != nil {
|
|
start.Attr = append(start.Attr, xml.Attr{Name: xml.Name{Local: "w:algIdExtSource"},
|
|
Value: fmt.Sprintf("%v", *m.AlgIdExtSourceAttr)})
|
|
}
|
|
if m.CryptProviderTypeExtAttr != nil {
|
|
start.Attr = append(start.Attr, xml.Attr{Name: xml.Name{Local: "w:cryptProviderTypeExt"},
|
|
Value: fmt.Sprintf("%v", *m.CryptProviderTypeExtAttr)})
|
|
}
|
|
if m.CryptProviderTypeExtSourceAttr != nil {
|
|
start.Attr = append(start.Attr, xml.Attr{Name: xml.Name{Local: "w:cryptProviderTypeExtSource"},
|
|
Value: fmt.Sprintf("%v", *m.CryptProviderTypeExtSourceAttr)})
|
|
}
|
|
if m.HashAttr != nil {
|
|
start.Attr = append(start.Attr, xml.Attr{Name: xml.Name{Local: "w:hash"},
|
|
Value: fmt.Sprintf("%v", *m.HashAttr)})
|
|
}
|
|
if m.SaltAttr != nil {
|
|
start.Attr = append(start.Attr, xml.Attr{Name: xml.Name{Local: "w:salt"},
|
|
Value: fmt.Sprintf("%v", *m.SaltAttr)})
|
|
}
|
|
e.EncodeToken(start)
|
|
e.EncodeToken(xml.EndElement{Name: start.Name})
|
|
return nil
|
|
}
|
|
|
|
func (m *CT_DocProtect) UnmarshalXML(d *xml.Decoder, start xml.StartElement) error {
|
|
// initialize to default
|
|
for _, attr := range start.Attr {
|
|
if attr.Name.Local == "edit" {
|
|
m.EditAttr.UnmarshalXMLAttr(attr)
|
|
}
|
|
if attr.Name.Local == "formatting" {
|
|
parsed, err := ParseUnionST_OnOff(attr.Value)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
m.FormattingAttr = &parsed
|
|
}
|
|
if attr.Name.Local == "enforcement" {
|
|
parsed, err := ParseUnionST_OnOff(attr.Value)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
m.EnforcementAttr = &parsed
|
|
}
|
|
if attr.Name.Local == "algorithmName" {
|
|
parsed, err := attr.Value, error(nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
m.AlgorithmNameAttr = &parsed
|
|
}
|
|
if attr.Name.Local == "hashValue" {
|
|
parsed, err := attr.Value, error(nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
m.HashValueAttr = &parsed
|
|
}
|
|
if attr.Name.Local == "saltValue" {
|
|
parsed, err := attr.Value, error(nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
m.SaltValueAttr = &parsed
|
|
}
|
|
if attr.Name.Local == "spinCount" {
|
|
parsed, err := strconv.ParseInt(attr.Value, 10, 64)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
m.SpinCountAttr = &parsed
|
|
}
|
|
if attr.Name.Local == "cryptProviderType" {
|
|
m.CryptProviderTypeAttr.UnmarshalXMLAttr(attr)
|
|
}
|
|
if attr.Name.Local == "cryptAlgorithmClass" {
|
|
m.CryptAlgorithmClassAttr.UnmarshalXMLAttr(attr)
|
|
}
|
|
if attr.Name.Local == "cryptAlgorithmType" {
|
|
m.CryptAlgorithmTypeAttr.UnmarshalXMLAttr(attr)
|
|
}
|
|
if attr.Name.Local == "cryptAlgorithmSid" {
|
|
parsed, err := strconv.ParseInt(attr.Value, 10, 64)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
m.CryptAlgorithmSidAttr = &parsed
|
|
}
|
|
if attr.Name.Local == "cryptSpinCount" {
|
|
parsed, err := strconv.ParseInt(attr.Value, 10, 64)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
m.CryptSpinCountAttr = &parsed
|
|
}
|
|
if attr.Name.Local == "cryptProvider" {
|
|
parsed, err := attr.Value, error(nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
m.CryptProviderAttr = &parsed
|
|
}
|
|
if attr.Name.Local == "algIdExt" {
|
|
parsed, err := attr.Value, error(nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
m.AlgIdExtAttr = &parsed
|
|
}
|
|
if attr.Name.Local == "algIdExtSource" {
|
|
parsed, err := attr.Value, error(nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
m.AlgIdExtSourceAttr = &parsed
|
|
}
|
|
if attr.Name.Local == "cryptProviderTypeExt" {
|
|
parsed, err := attr.Value, error(nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
m.CryptProviderTypeExtAttr = &parsed
|
|
}
|
|
if attr.Name.Local == "cryptProviderTypeExtSource" {
|
|
parsed, err := attr.Value, error(nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
m.CryptProviderTypeExtSourceAttr = &parsed
|
|
}
|
|
if attr.Name.Local == "hash" {
|
|
parsed, err := attr.Value, error(nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
m.HashAttr = &parsed
|
|
}
|
|
if attr.Name.Local == "salt" {
|
|
parsed, err := attr.Value, error(nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
m.SaltAttr = &parsed
|
|
}
|
|
}
|
|
// skip any extensions we may find, but don't support
|
|
for {
|
|
tok, err := d.Token()
|
|
if err != nil {
|
|
return fmt.Errorf("parsing CT_DocProtect: %s", err)
|
|
}
|
|
if el, ok := tok.(xml.EndElement); ok && el.Name == start.Name {
|
|
break
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Validate validates the CT_DocProtect and its children
|
|
func (m *CT_DocProtect) Validate() error {
|
|
return m.ValidateWithPath("CT_DocProtect")
|
|
}
|
|
|
|
// ValidateWithPath validates the CT_DocProtect and its children, prefixing error messages with path
|
|
func (m *CT_DocProtect) ValidateWithPath(path string) error {
|
|
if err := m.EditAttr.ValidateWithPath(path + "/EditAttr"); err != nil {
|
|
return err
|
|
}
|
|
if m.FormattingAttr != nil {
|
|
if err := m.FormattingAttr.ValidateWithPath(path + "/FormattingAttr"); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
if m.EnforcementAttr != nil {
|
|
if err := m.EnforcementAttr.ValidateWithPath(path + "/EnforcementAttr"); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
if err := m.CryptProviderTypeAttr.ValidateWithPath(path + "/CryptProviderTypeAttr"); err != nil {
|
|
return err
|
|
}
|
|
if err := m.CryptAlgorithmClassAttr.ValidateWithPath(path + "/CryptAlgorithmClassAttr"); err != nil {
|
|
return err
|
|
}
|
|
if err := m.CryptAlgorithmTypeAttr.ValidateWithPath(path + "/CryptAlgorithmTypeAttr"); err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|