如果您知道将使用哪些实体以及它们如何定义,您可以执行以下操作(相当原始和容易出错,但仍然比没有好):
<xsl:stylesheet version="2.0"
xmlns:xsl="http://www.w3.org/1999/XSL/Transform"
xmlns:xs="http://www.w3.org/2001/XMLSchema"
xmlns:my="my:my">
<xsl:output omit-xml-declaration="yes" indent="yes"/>
<xsl:character-map name="mapEntities">
<xsl:output-character character="&" string="&"/>
</xsl:character-map>
<xsl:variable name="vEntities" select=
"'stackoverflow',
'How can I preserve the entity reference when transforming with XSLT\?\?'
"/>
<xsl:variable name="vReplacements" select=
"'&so;', '&question;'"/>
<xsl:template match="node()|@*">
<xsl:copy>
<xsl:apply-templates select="node()|@*"/>
</xsl:copy>
</xsl:template>
<xsl:template match="/">
<xsl:text disable-output-escaping="yes"><![CDATA[<!DOCTYPE doc [ <!ENTITY so "stackoverflow">
<!ENTITY question
"How can I preserve the entity reference when transforming with XSLT??"> ]>
]]>
</xsl:text>
<xsl:apply-templates/>
</xsl:template>
<xsl:template match="text()">
<xsl:value-of select=
"my:multiReplace(.,
$vEntities,
$vReplacements,
count($vEntities)
)
" disable-output-escaping="yes"/>
</xsl:template>
<xsl:function name="my:multiReplace">
<xsl:param name="pText" as="xs:string"/>
<xsl:param name="pEnts" as="xs:string*"/>
<xsl:param name="pReps" as="xs:string*"/>
<xsl:param name="pCount" as="xs:integer"/>
<xsl:sequence select=
"if($pCount > 0)
then
my:multiReplace(replace($pText,
$pEnts[1],
$pReps[1]
),
subsequence($pEnts,2),
subsequence($pReps,2),
$pCount -1
)
else
$pText
"/>
</xsl:function>
</xsl:stylesheet>
当应用于提供的XML文档时:
<!DOCTYPE doc [ <!ENTITY so "stackoverflow">
<!ENTITY question
"How can I preserve the entity reference when transforming with XSLT??"> ]>
<doc>
<text>Hello &so;!</text>
<text>&question;</text>
</doc>
期望的结果已经成功生成:
<!DOCTYPE doc [ <!ENTITY so "stackoverflow">
<!ENTITY question
"How can I preserve the entity reference when transforming with XSLT??"> ]>
<doc>
<text>Hello &so;!</text>
<text>&question;</text>
</doc>
请注意:
替换中的特殊字符(正则表达式)必须进行转义。
我们需要使用 DOE 进行解决,但这并不被建议,因为它违反了 XSLT 架构和处理模型的原则,换句话说,这种解决方案是一种糟糕的 hack。