Kevin, Kevin Day wrote > My inclination is to include the rise in the baseline, ascentline and > descentline, then expose getRise() so that someone who needs the actual > value can get to it (along with clear javadocs indicating that the rise > has already been added to the ***lines). What do you think?
Sounds like a good solution for everyone. Kevin Day wrote > String width can be obtained from the baseline - in all of my work, I've > found that having the baseline vector is the important thing (as opposed > to the width of the string) - I'm certainly open to exposing > getStringWidth() if there is a valid use-case for it - but using a scalar > instead of a vector can cause huge problems in rendering (for example, if > the text is rotated), so I'm having a hard time thinking of a use case... I'm not against using vectors instead of scalars there, not at all (therefore my alternative suggestion concerning a method returning a list of TextRenderInfo instances, one for each character. I was just wondering how one could ease implementing a use case like in the "marked for redaction" thread. If the TextRenderInfo area is not completely inside the marked area, one has to find out which characters in the string of that TextRenderInfo are in the intersection of those areas. The three alternative suggestions represent ideas for ways to do that. The most versatile of those suggested methods would be the one returning the list of sub-TextRenderInfos. It could even be more generalized by allowing to give character positions at which to split the string. Or alternatively a method given coordinate system barriers at which to split. Or even one given an area for which the sub-TextRenderInfo inside that area would be returned... On the other hand this might make the method too generalized after all ;). Regards, Michael -- View this message in context: http://itext-general.2136553.n4.nabble.com/PdfContentStreamProcessor-not-handling-TJ-operator-correctly-maybe-tp4656117p4656268.html Sent from the iText - General mailing list archive at Nabble.com. ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ iText-questions mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/itext-questions iText(R) is a registered trademark of 1T3XT BVBA. Many questions posted to this list can (and will) be answered with a reference to the iText book: http://www.itextpdf.com/book/ Please check the keywords list before you ask for examples: http://itextpdf.com/themes/keywords.php
