feat: CE × Compliance Crossover Engine
Automatische Erkennung von DSGVO/AI Act/CRA/NIS2/Data Act Implikationen bei CE-Gefaehrdungen. 50 Trigger-Mappings auf Hazard-Patterns → Compliance-Module mit Modul-Links. - compliance_triggers.go: 50 Pattern→Regulation Mappings - compliance_crossover.go: Engine die Projekt-Hazards gegen Trigger prueft - iace_handler_compliance.go: GET /compliance-triggers API - ComplianceAlerts.tsx: Frontend Alert-Panel auf Projekt-Uebersicht Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
This commit is contained in:
@@ -0,0 +1,218 @@
|
||||
'use client'
|
||||
|
||||
import { useState, useEffect } from 'react'
|
||||
import Link from 'next/link'
|
||||
|
||||
interface ComplianceTrigger {
|
||||
id: string
|
||||
regulation: string
|
||||
article: string
|
||||
title: string
|
||||
severity: 'high' | 'medium' | 'low'
|
||||
reason: string
|
||||
affected_hazard_count?: number
|
||||
module_path: string
|
||||
module_label: string
|
||||
}
|
||||
|
||||
interface TriggersResponse {
|
||||
triggers: ComplianceTrigger[]
|
||||
total: number
|
||||
}
|
||||
|
||||
const SEVERITY_CONFIG: Record<string, { border: string; bg: string; text: string; badge: string; icon: string }> = {
|
||||
high: {
|
||||
border: 'border-red-200 dark:border-red-800',
|
||||
bg: 'bg-red-50 dark:bg-red-900/20',
|
||||
text: 'text-red-700 dark:text-red-400',
|
||||
badge: 'bg-red-100 text-red-800 dark:bg-red-900/50 dark:text-red-300',
|
||||
icon: 'text-red-500',
|
||||
},
|
||||
medium: {
|
||||
border: 'border-yellow-200 dark:border-yellow-800',
|
||||
bg: 'bg-yellow-50 dark:bg-yellow-900/20',
|
||||
text: 'text-yellow-700 dark:text-yellow-400',
|
||||
badge: 'bg-yellow-100 text-yellow-800 dark:bg-yellow-900/50 dark:text-yellow-300',
|
||||
icon: 'text-yellow-500',
|
||||
},
|
||||
low: {
|
||||
border: 'border-blue-200 dark:border-blue-800',
|
||||
bg: 'bg-blue-50 dark:bg-blue-900/20',
|
||||
text: 'text-blue-700 dark:text-blue-400',
|
||||
badge: 'bg-blue-100 text-blue-800 dark:bg-blue-900/50 dark:text-blue-300',
|
||||
icon: 'text-blue-500',
|
||||
},
|
||||
}
|
||||
|
||||
const SEVERITY_LABELS: Record<string, string> = {
|
||||
high: 'HOCH',
|
||||
medium: 'MITTEL',
|
||||
low: 'NIEDRIG',
|
||||
}
|
||||
|
||||
const REGULATION_BADGES: { key: string; label: string; activeColor: string }[] = [
|
||||
{ key: 'DSGVO', label: 'DSGVO', activeColor: 'bg-red-100 text-red-800 border-red-300' },
|
||||
{ key: 'AI Act', label: 'AI Act', activeColor: 'bg-orange-100 text-orange-800 border-orange-300' },
|
||||
{ key: 'CRA', label: 'CRA', activeColor: 'bg-yellow-100 text-yellow-800 border-yellow-300' },
|
||||
{ key: 'NIS2', label: 'NIS2', activeColor: 'bg-indigo-100 text-indigo-800 border-indigo-300' },
|
||||
{ key: 'Data Act', label: 'Data Act', activeColor: 'bg-amber-100 text-amber-800 border-amber-300' },
|
||||
]
|
||||
|
||||
function WarningIcon({ className }: { className?: string }) {
|
||||
return (
|
||||
<svg className={className} fill="none" viewBox="0 0 24 24" stroke="currentColor">
|
||||
<path strokeLinecap="round" strokeLinejoin="round" strokeWidth={2}
|
||||
d="M12 9v2m0 4h.01m-6.938 4h13.856c1.54 0 2.502-1.667 1.732-2.5L13.732 4.5c-.77-.833-2.694-.833-3.464 0L3.34 16.5c-.77.833.192 2.5 1.732 2.5z" />
|
||||
</svg>
|
||||
)
|
||||
}
|
||||
|
||||
function ChevronIcon({ open }: { open: boolean }) {
|
||||
return (
|
||||
<svg className={`w-4 h-4 text-gray-400 transition-transform ${open ? 'rotate-180' : ''}`}
|
||||
fill="none" viewBox="0 0 24 24" stroke="currentColor">
|
||||
<path strokeLinecap="round" strokeLinejoin="round" strokeWidth={2} d="M19 9l-7 7-7-7" />
|
||||
</svg>
|
||||
)
|
||||
}
|
||||
|
||||
export function ComplianceAlerts({ projectId }: { projectId: string }) {
|
||||
const [data, setData] = useState<TriggersResponse | null>(null)
|
||||
const [loading, setLoading] = useState(true)
|
||||
const [collapsed, setCollapsed] = useState(false)
|
||||
const [expandedIds, setExpandedIds] = useState<Set<string>>(new Set())
|
||||
|
||||
useEffect(() => {
|
||||
fetch(`/api/sdk/v1/iace/projects/${projectId}/compliance-triggers`)
|
||||
.then((r) => (r.ok ? r.json() : null))
|
||||
.then((json) => {
|
||||
if (json?.triggers) setData(json)
|
||||
else if (Array.isArray(json)) setData({ triggers: json, total: json.length })
|
||||
})
|
||||
.catch(() => {})
|
||||
.finally(() => setLoading(false))
|
||||
}, [projectId])
|
||||
|
||||
if (loading) return null
|
||||
if (!data || data.triggers.length === 0) return null
|
||||
|
||||
const triggers = data.triggers
|
||||
const activeRegulations = new Set(triggers.map((t) => t.regulation))
|
||||
|
||||
function toggleExpanded(id: string) {
|
||||
setExpandedIds((prev) => {
|
||||
const next = new Set(prev)
|
||||
if (next.has(id)) next.delete(id)
|
||||
else next.add(id)
|
||||
return next
|
||||
})
|
||||
}
|
||||
|
||||
return (
|
||||
<div className="bg-white dark:bg-gray-800 rounded-xl border border-red-200 dark:border-red-800">
|
||||
{/* Header */}
|
||||
<button
|
||||
onClick={() => setCollapsed(!collapsed)}
|
||||
className="w-full flex items-center justify-between p-6 text-left"
|
||||
>
|
||||
<div className="flex items-center gap-3">
|
||||
<div className="w-10 h-10 bg-red-50 dark:bg-red-900/30 rounded-lg flex items-center justify-center">
|
||||
<WarningIcon className="w-5 h-5 text-red-600" />
|
||||
</div>
|
||||
<div>
|
||||
<h2 className="text-sm font-semibold text-gray-900 dark:text-white">
|
||||
{triggers.length} Compliance-Hinweise erkannt
|
||||
</h2>
|
||||
<p className="text-xs text-gray-500">
|
||||
Basierend auf den identifizierten Gefaehrdungen bestehen rechtliche Implikationen
|
||||
</p>
|
||||
</div>
|
||||
</div>
|
||||
<div className="w-8 h-8 flex items-center justify-center rounded-full hover:bg-gray-100 dark:hover:bg-gray-700 transition-colors flex-shrink-0">
|
||||
<ChevronIcon open={!collapsed} />
|
||||
</div>
|
||||
</button>
|
||||
|
||||
{!collapsed && (
|
||||
<div className="px-6 pb-6 space-y-4">
|
||||
{/* Regulation summary badges */}
|
||||
<div className="flex flex-wrap gap-2">
|
||||
{REGULATION_BADGES.map((reg) => {
|
||||
const active = activeRegulations.has(reg.key)
|
||||
return (
|
||||
<span
|
||||
key={reg.key}
|
||||
className={`px-2.5 py-1 text-xs font-medium rounded-full border ${
|
||||
active
|
||||
? reg.activeColor
|
||||
: 'bg-gray-50 text-gray-400 border-gray-200 dark:bg-gray-700 dark:text-gray-500 dark:border-gray-600'
|
||||
}`}
|
||||
>
|
||||
{reg.label}
|
||||
</span>
|
||||
)
|
||||
})}
|
||||
</div>
|
||||
|
||||
{/* Trigger list */}
|
||||
<div className="space-y-2">
|
||||
{triggers.map((trigger) => {
|
||||
const sev = SEVERITY_CONFIG[trigger.severity] || SEVERITY_CONFIG.low
|
||||
const isOpen = expandedIds.has(trigger.id)
|
||||
|
||||
return (
|
||||
<div key={trigger.id} className={`rounded-lg border ${sev.border} ${sev.bg} overflow-hidden`}>
|
||||
{/* Trigger header row */}
|
||||
<button
|
||||
onClick={() => toggleExpanded(trigger.id)}
|
||||
className="w-full flex items-center gap-3 px-4 py-3 text-left"
|
||||
>
|
||||
<ChevronIcon open={isOpen} />
|
||||
<div className="flex-1 min-w-0">
|
||||
<span className="text-sm font-medium text-gray-900 dark:text-white">
|
||||
{trigger.regulation} {trigger.article} — {trigger.title}
|
||||
</span>
|
||||
</div>
|
||||
<span className={`px-2 py-0.5 text-xs font-bold rounded ${sev.badge}`}>
|
||||
{SEVERITY_LABELS[trigger.severity] || trigger.severity}
|
||||
</span>
|
||||
</button>
|
||||
|
||||
{/* Expanded detail */}
|
||||
{isOpen && (
|
||||
<div className="px-4 pb-4 pt-0 ml-7 space-y-2">
|
||||
<p className="text-xs text-gray-700 dark:text-gray-300">
|
||||
<span className="font-medium">Grund:</span> {trigger.reason}
|
||||
</p>
|
||||
{trigger.affected_hazard_count != null && trigger.affected_hazard_count > 0 && (
|
||||
<p className="text-xs text-gray-500">
|
||||
Betroffene Gefaehrdungen: {trigger.affected_hazard_count}
|
||||
</p>
|
||||
)}
|
||||
<Link
|
||||
href={trigger.module_path}
|
||||
className={`inline-flex items-center gap-1.5 text-xs font-medium ${sev.text} hover:underline`}
|
||||
>
|
||||
{trigger.module_label} oeffnen
|
||||
<svg className="w-3.5 h-3.5" fill="none" viewBox="0 0 24 24" stroke="currentColor">
|
||||
<path strokeLinecap="round" strokeLinejoin="round" strokeWidth={2} d="M13 7l5 5m0 0l-5 5m5-5H6" />
|
||||
</svg>
|
||||
</Link>
|
||||
</div>
|
||||
)}
|
||||
</div>
|
||||
)
|
||||
})}
|
||||
</div>
|
||||
|
||||
{/* Disclaimer */}
|
||||
<div className="p-3 rounded-lg bg-amber-50 dark:bg-amber-900/20 border border-amber-200 dark:border-amber-800 text-xs text-amber-800 dark:text-amber-300">
|
||||
<strong>Hinweis:</strong> Diese Compliance-Hinweise werden automatisch aus den
|
||||
Gefaehrdungen und Klassifikationen abgeleitet. Der CE-Fachmann muss die
|
||||
regulatorischen Anforderungen im jeweiligen Modul verifizieren.
|
||||
</div>
|
||||
</div>
|
||||
)}
|
||||
</div>
|
||||
)
|
||||
}
|
||||
@@ -4,6 +4,7 @@ import React, { useState, useEffect } from 'react'
|
||||
import Link from 'next/link'
|
||||
import { useParams } from 'next/navigation'
|
||||
import { SuggestedNorms } from './_components/SuggestedNorms'
|
||||
import { ComplianceAlerts } from './_components/ComplianceAlerts'
|
||||
|
||||
interface ProjectOverview {
|
||||
id: string
|
||||
@@ -349,6 +350,9 @@ export default function ProjectOverviewPage() {
|
||||
</div>
|
||||
</div>
|
||||
|
||||
{/* Compliance Alerts */}
|
||||
<ComplianceAlerts projectId={projectId} />
|
||||
|
||||
{/* Suggested Norms */}
|
||||
<SuggestedNorms projectId={projectId} />
|
||||
|
||||
|
||||
@@ -0,0 +1,86 @@
|
||||
package handlers
|
||||
|
||||
import (
|
||||
"net/http"
|
||||
|
||||
"github.com/breakpilot/ai-compliance-sdk/internal/iace"
|
||||
"github.com/gin-gonic/gin"
|
||||
"github.com/google/uuid"
|
||||
)
|
||||
|
||||
// ============================================================================
|
||||
// CE x Compliance Crossover Engine
|
||||
// ============================================================================
|
||||
|
||||
// GetComplianceTriggers handles GET /projects/:id/compliance-triggers.
|
||||
// It analyses the project's hazards and component patterns to determine
|
||||
// which DSGVO, AI Act, CRA, NIS2, and EU Data Act obligations are triggered.
|
||||
// The response includes deduplicated triggers sorted by severity, plus boolean
|
||||
// summary flags (dsfa_required, ai_act_relevant, cra_relevant, etc.).
|
||||
func (h *IACEHandler) GetComplianceTriggers(c *gin.Context) {
|
||||
projectID, err := uuid.Parse(c.Param("id"))
|
||||
if err != nil {
|
||||
c.JSON(http.StatusBadRequest, gin.H{"error": "invalid project ID"})
|
||||
return
|
||||
}
|
||||
|
||||
// Verify project exists
|
||||
project, err := h.store.GetProject(c.Request.Context(), projectID)
|
||||
if err != nil {
|
||||
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
|
||||
return
|
||||
}
|
||||
if project == nil {
|
||||
c.JSON(http.StatusNotFound, gin.H{"error": "project not found"})
|
||||
return
|
||||
}
|
||||
|
||||
// Fetch all hazards for this project
|
||||
hazards, err := h.store.ListHazards(c.Request.Context(), projectID)
|
||||
if err != nil {
|
||||
c.JSON(http.StatusInternalServerError, gin.H{"error": "failed to load hazards: " + err.Error()})
|
||||
return
|
||||
}
|
||||
|
||||
// Also run pattern matching with component tags to catch tag-based triggers.
|
||||
// Collect tags from the project's components (reuse the norms handler logic).
|
||||
componentTags := collectComponentTags(h, c, projectID)
|
||||
|
||||
// Get all patterns from the pattern library
|
||||
allPatterns := iace.AllPatterns()
|
||||
|
||||
// Additionally derive extra fired patterns by re-matching component tags
|
||||
// against the pattern engine. This ensures patterns that are not yet
|
||||
// applied as hazards still contribute their compliance triggers.
|
||||
engine := iace.NewPatternEngine()
|
||||
matchInput := iace.MatchInput{
|
||||
CustomTags: componentTags,
|
||||
}
|
||||
matchResult := engine.Match(matchInput)
|
||||
|
||||
// Merge matched pattern IDs into a pseudo-hazard list so the crossover
|
||||
// engine picks them up. We create lightweight Hazard structs with the
|
||||
// pattern ID embedded in the Description field.
|
||||
mergedHazards := make([]iace.Hazard, len(hazards))
|
||||
copy(mergedHazards, hazards)
|
||||
for _, pm := range matchResult.MatchedPatterns {
|
||||
mergedHazards = append(mergedHazards, iace.Hazard{
|
||||
Name: pm.PatternName,
|
||||
Description: "Pattern " + pm.PatternID,
|
||||
Category: firstOrEmpty(pm.HazardCats),
|
||||
})
|
||||
}
|
||||
|
||||
// Run the crossover engine
|
||||
summary := iace.GetProjectComplianceTriggers(mergedHazards, allPatterns)
|
||||
|
||||
c.JSON(http.StatusOK, summary)
|
||||
}
|
||||
|
||||
// firstOrEmpty returns the first element of a string slice or "".
|
||||
func firstOrEmpty(ss []string) string {
|
||||
if len(ss) > 0 {
|
||||
return ss[0]
|
||||
}
|
||||
return ""
|
||||
}
|
||||
@@ -422,6 +422,9 @@ func registerIACERoutes(v1 *gin.RouterGroup, h *handlers.IACEHandler) {
|
||||
iaceRoutes.GET("/production-lines/:lid/dashboard", h.GetProductionLineDashboard)
|
||||
iaceRoutes.POST("/production-lines/:lid/stations", h.AddStationToLine)
|
||||
iaceRoutes.DELETE("/production-lines/:lid/stations/:sid", h.RemoveStationFromLine)
|
||||
|
||||
// CE x Compliance Crossover
|
||||
iaceRoutes.GET("/projects/:id/compliance-triggers", h.GetComplianceTriggers)
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
@@ -0,0 +1,254 @@
|
||||
package iace
|
||||
|
||||
import "sort"
|
||||
|
||||
// GetProjectComplianceTriggers analyses a project's hazards and the full
|
||||
// pattern library to determine which DSGVO/AI Act/CRA/NIS2/Data Act
|
||||
// obligations are triggered. It returns a deduplicated, severity-sorted
|
||||
// summary with boolean flags for each regulation family.
|
||||
func GetProjectComplianceTriggers(hazards []Hazard, patterns []HazardPattern) *ComplianceTriggerSummary {
|
||||
triggerMap := GetComplianceTriggerMap()
|
||||
|
||||
// Build set of pattern IDs present in the pattern library for quick lookup
|
||||
patternByID := make(map[string]HazardPattern, len(patterns))
|
||||
for _, p := range patterns {
|
||||
patternByID[p.ID] = p
|
||||
}
|
||||
|
||||
// Collect all fired pattern IDs from the project's hazards.
|
||||
// Hazards created from pattern matching store the source pattern ID
|
||||
// in their Description ("Pattern HPXXX") or Name field.
|
||||
firedPatterns := make(map[string]bool)
|
||||
for _, h := range hazards {
|
||||
extractPatternIDs(h.Description, firedPatterns)
|
||||
extractPatternIDs(h.Name, firedPatterns)
|
||||
extractPatternIDs(h.Scenario, firedPatterns)
|
||||
}
|
||||
|
||||
// Also check each pattern against the hazard categories present
|
||||
// in the project — if a pattern generates a category that exists
|
||||
// among the hazards, consider the pattern relevant.
|
||||
hazardCats := make(map[string]bool)
|
||||
for _, h := range hazards {
|
||||
if h.Category != "" {
|
||||
hazardCats[h.Category] = true
|
||||
}
|
||||
}
|
||||
for _, p := range patterns {
|
||||
for _, cat := range p.GeneratedHazardCats {
|
||||
if hazardCats[cat] {
|
||||
firedPatterns[p.ID] = true
|
||||
break
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// Collect tag-level information from hazard metadata
|
||||
tags := collectHazardTags(hazards)
|
||||
tagTriggers := GetTagBasedTriggers(tags)
|
||||
|
||||
// Gather all triggers from fired patterns
|
||||
var results []TriggerResult
|
||||
seenRegulation := make(map[string]bool)
|
||||
|
||||
for pid := range firedPatterns {
|
||||
triggers, ok := triggerMap[pid]
|
||||
if !ok {
|
||||
continue
|
||||
}
|
||||
for _, t := range triggers {
|
||||
key := t.Regulation + "|" + t.Module
|
||||
if seenRegulation[key] {
|
||||
continue
|
||||
}
|
||||
seenRegulation[key] = true
|
||||
|
||||
// Try to find a hazard name for context
|
||||
hName := findHazardNameForPattern(pid, hazards)
|
||||
results = append(results, TriggerResult{
|
||||
HazardID: "",
|
||||
HazardName: hName,
|
||||
PatternID: pid,
|
||||
Trigger: t,
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
// Append tag-based triggers (deduplicated against pattern triggers)
|
||||
for _, t := range tagTriggers {
|
||||
key := t.Regulation + "|" + t.Module
|
||||
if seenRegulation[key] {
|
||||
continue
|
||||
}
|
||||
seenRegulation[key] = true
|
||||
results = append(results, TriggerResult{
|
||||
HazardID: "",
|
||||
HazardName: "Tag-basiert",
|
||||
PatternID: "",
|
||||
Trigger: t,
|
||||
})
|
||||
}
|
||||
|
||||
// Sort by severity: high > medium > low
|
||||
sort.Slice(results, func(i, j int) bool {
|
||||
return severityRank(results[i].Trigger.Severity) > severityRank(results[j].Trigger.Severity)
|
||||
})
|
||||
|
||||
// Build boolean summary flags
|
||||
summary := buildSummaryFlags(results)
|
||||
|
||||
return &ComplianceTriggerSummary{
|
||||
Triggers: results,
|
||||
Total: len(results),
|
||||
Summary: summary,
|
||||
}
|
||||
}
|
||||
|
||||
// AllPatterns returns every hazard pattern from all pattern sources.
|
||||
// This mirrors the aggregation in NewPatternEngine but returns just the slice.
|
||||
func AllPatterns() []HazardPattern {
|
||||
p := GetBuiltinHazardPatterns()
|
||||
p = append(p, GetExtendedHazardPatterns()...)
|
||||
p = append(p, GetPressHazardPatterns()...)
|
||||
p = append(p, GetCobotHazardPatterns()...)
|
||||
p = append(p, GetOperationalHazardPatterns()...)
|
||||
p = append(p, GetDGUVExtendedPatterns()...)
|
||||
p = append(p, GetExtendedHazardPatterns2()...)
|
||||
p = append(p, GetElevatorPatterns()...)
|
||||
p = append(p, GetAGVAgriPatterns()...)
|
||||
p = append(p, GetFoodProcessingPatterns()...)
|
||||
p = append(p, GetPackagingPatterns()...)
|
||||
p = append(p, GetLaserPatterns()...)
|
||||
p = append(p, GetMedicalDevicePatterns()...)
|
||||
p = append(p, GetPressureEquipmentPatterns()...)
|
||||
p = append(p, GetConstructionPatterns()...)
|
||||
p = append(p, GetForestryConveyorPatterns()...)
|
||||
p = append(p, GetPlasticsMetalPatterns()...)
|
||||
p = append(p, GetWeldingGlassTextilePatterns()...)
|
||||
p = append(p, GetSpecificMachinePatterns()...)
|
||||
p = append(p, GetSpecificMachinePatterns2()...)
|
||||
p = append(p, GetCyberExtendedPatterns()...)
|
||||
p = append(p, GetCyberExtendedPatterns2()...)
|
||||
p = append(p, GetCyberExtendedPatterns3()...)
|
||||
p = append(p, GetWorkshopPatterns()...)
|
||||
p = append(p, GetMaintenanceExtPatterns()...)
|
||||
p = append(p, GetFinalPatternsA()...)
|
||||
p = append(p, GetFinalPatternsB()...)
|
||||
p = append(p, GetFinalPatternsC()...)
|
||||
p = append(p, GetFinalPatternsD()...)
|
||||
return p
|
||||
}
|
||||
|
||||
// extractPatternIDs scans a text for "HP" followed by digits and adds
|
||||
// any found pattern IDs to the set.
|
||||
func extractPatternIDs(text string, set map[string]bool) {
|
||||
for i := 0; i < len(text)-2; i++ {
|
||||
if text[i] == 'H' && text[i+1] == 'P' && i+2 < len(text) && text[i+2] >= '0' && text[i+2] <= '9' {
|
||||
end := i + 2
|
||||
for end < len(text) && text[end] >= '0' && text[end] <= '9' {
|
||||
end++
|
||||
}
|
||||
set[text[i:end]] = true
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// findHazardNameForPattern returns the name of the first hazard whose
|
||||
// description/name/scenario mentions the given pattern ID.
|
||||
func findHazardNameForPattern(pid string, hazards []Hazard) string {
|
||||
for _, h := range hazards {
|
||||
if containsPatternID(h.Description, pid) || containsPatternID(h.Name, pid) || containsPatternID(h.Scenario, pid) {
|
||||
return h.Name
|
||||
}
|
||||
}
|
||||
if len(hazards) > 0 {
|
||||
return hazards[0].Name
|
||||
}
|
||||
return ""
|
||||
}
|
||||
|
||||
// containsPatternID checks whether text contains the exact pattern ID token.
|
||||
func containsPatternID(text, pid string) bool {
|
||||
idx := 0
|
||||
for idx <= len(text)-len(pid) {
|
||||
if text[idx:idx+len(pid)] == pid {
|
||||
// Ensure it is not a substring of a longer ID
|
||||
after := idx + len(pid)
|
||||
if after >= len(text) || text[after] < '0' || text[after] > '9' {
|
||||
return true
|
||||
}
|
||||
}
|
||||
idx++
|
||||
}
|
||||
return false
|
||||
}
|
||||
|
||||
// collectHazardTags extracts tag-like signals from hazard fields.
|
||||
func collectHazardTags(hazards []Hazard) []string {
|
||||
tagSet := make(map[string]bool)
|
||||
for _, h := range hazards {
|
||||
// Infer tags from hazard category names
|
||||
switch h.Category {
|
||||
case "software", "steuerung", "steuerungsfehler":
|
||||
tagSet["has_software"] = true
|
||||
tagSet["programmable"] = true
|
||||
case "cyber", "cybersicherheit", "netzwerk":
|
||||
tagSet["is_networked"] = true
|
||||
tagSet["has_software"] = true
|
||||
case "ki", "kuenstliche_intelligenz", "ai_ml":
|
||||
tagSet["has_ai"] = true
|
||||
tagSet["has_software"] = true
|
||||
case "sensorik", "sensor":
|
||||
tagSet["sensor_part"] = true
|
||||
}
|
||||
}
|
||||
tags := make([]string, 0, len(tagSet))
|
||||
for t := range tagSet {
|
||||
tags = append(tags, t)
|
||||
}
|
||||
return tags
|
||||
}
|
||||
|
||||
// severityRank maps severity strings to sort-order integers.
|
||||
func severityRank(s string) int {
|
||||
switch s {
|
||||
case "high":
|
||||
return 3
|
||||
case "medium":
|
||||
return 2
|
||||
case "low":
|
||||
return 1
|
||||
default:
|
||||
return 0
|
||||
}
|
||||
}
|
||||
|
||||
// buildSummaryFlags derives boolean flags from the collected trigger results.
|
||||
func buildSummaryFlags(results []TriggerResult) map[string]bool {
|
||||
summary := map[string]bool{
|
||||
"dsfa_required": false,
|
||||
"ai_act_relevant": false,
|
||||
"cra_relevant": false,
|
||||
"nis2_relevant": false,
|
||||
"data_act_relevant": false,
|
||||
}
|
||||
for _, r := range results {
|
||||
reg := r.Trigger.Regulation
|
||||
if len(reg) >= 4 && reg[:4] == "DSGV" {
|
||||
summary["dsfa_required"] = true
|
||||
}
|
||||
if len(reg) >= 6 && reg[:6] == "AI Act" {
|
||||
summary["ai_act_relevant"] = true
|
||||
}
|
||||
if len(reg) >= 3 && reg[:3] == "CRA" {
|
||||
summary["cra_relevant"] = true
|
||||
}
|
||||
if len(reg) >= 4 && reg[:4] == "NIS2" {
|
||||
summary["nis2_relevant"] = true
|
||||
}
|
||||
if len(reg) >= 11 && reg[:11] == "EU Data Act" {
|
||||
summary["data_act_relevant"] = true
|
||||
}
|
||||
}
|
||||
return summary
|
||||
}
|
||||
@@ -0,0 +1,439 @@
|
||||
package iace
|
||||
|
||||
// ComplianceTrigger maps a CE hazard pattern to a regulatory requirement.
|
||||
// When a pattern fires for a project, the corresponding triggers tell
|
||||
// the user which DSGVO/AI Act/CRA/NIS2/Data Act obligations apply and
|
||||
// which SDK module they should visit.
|
||||
type ComplianceTrigger struct {
|
||||
Regulation string `json:"regulation"` // e.g. "DSGVO Art. 35"
|
||||
TriggerCondDE string `json:"trigger_cond_de"` // Why this triggers (German)
|
||||
Severity string `json:"severity"` // "high", "medium", "low"
|
||||
Module string `json:"module"` // SDK module key
|
||||
ModuleLink string `json:"module_link"` // Frontend route
|
||||
ActionDE string `json:"action_de"` // Recommended action (German)
|
||||
RAGQuery string `json:"rag_query"` // Search query for RAG enrichment
|
||||
}
|
||||
|
||||
// TriggerResult pairs a fired pattern with one of its compliance triggers.
|
||||
type TriggerResult struct {
|
||||
HazardID string `json:"hazard_id"`
|
||||
HazardName string `json:"hazard_name"`
|
||||
PatternID string `json:"pattern_id"`
|
||||
Trigger ComplianceTrigger `json:"trigger"`
|
||||
}
|
||||
|
||||
// ComplianceTriggerSummary is the top-level response for the crossover engine.
|
||||
type ComplianceTriggerSummary struct {
|
||||
Triggers []TriggerResult `json:"triggers"`
|
||||
Total int `json:"total"`
|
||||
Summary map[string]bool `json:"summary"` // dsfa_required, ai_act_relevant, etc.
|
||||
}
|
||||
|
||||
// GetComplianceTriggerMap returns pattern-ID-keyed compliance triggers.
|
||||
// Each entry lists the regulatory obligations that a fired pattern implies.
|
||||
func GetComplianceTriggerMap() map[string][]ComplianceTrigger {
|
||||
m := make(map[string][]ComplianceTrigger)
|
||||
|
||||
// --- Cobot / camera / biometric patterns ---
|
||||
m["HP059"] = []ComplianceTrigger{
|
||||
{
|
||||
Regulation: "DSGVO Art. 35",
|
||||
TriggerCondDE: "Kamera-Personenerkennung verarbeitet biometrische Daten",
|
||||
Severity: "high",
|
||||
Module: "dsfa",
|
||||
ModuleLink: "/sdk/dsfa",
|
||||
ActionDE: "Datenschutz-Folgenabschaetzung fuer Kamera-System durchfuehren",
|
||||
RAGQuery: "DSFA biometrische Daten Kameraerkennung",
|
||||
},
|
||||
{
|
||||
Regulation: "AI Act Art. 6",
|
||||
TriggerCondDE: "Autonome Sicherheitsentscheidung durch KI-System",
|
||||
Severity: "high",
|
||||
Module: "ai-act",
|
||||
ModuleLink: "/sdk/ai-act",
|
||||
ActionDE: "Hochrisiko-KI-Einstufung pruefen und dokumentieren",
|
||||
RAGQuery: "AI Act Hochrisiko autonome Sicherheitsentscheidung",
|
||||
},
|
||||
}
|
||||
m["HP060"] = []ComplianceTrigger{
|
||||
{
|
||||
Regulation: "DSGVO Art. 35",
|
||||
TriggerCondDE: "Werkzeug-Tracking erfordert Personenerkennung",
|
||||
Severity: "high",
|
||||
Module: "dsfa",
|
||||
ModuleLink: "/sdk/dsfa",
|
||||
ActionDE: "DSFA fuer Werkzeug-Tracking mit Personenerkennung erstellen",
|
||||
RAGQuery: "DSFA Personenerkennung Werkzeug-Tracking",
|
||||
},
|
||||
}
|
||||
|
||||
// --- AI/ML safety-critical patterns ---
|
||||
m["HP040"] = []ComplianceTrigger{
|
||||
{
|
||||
Regulation: "AI Act Art. 6",
|
||||
TriggerCondDE: "KI trifft sicherheitsrelevante Entscheidung",
|
||||
Severity: "high",
|
||||
Module: "ai-act",
|
||||
ModuleLink: "/sdk/ai-act",
|
||||
ActionDE: "Hochrisiko-Klassifizierung und Konformitaetsbewertung einleiten",
|
||||
RAGQuery: "AI Act Art 6 Hochrisiko Sicherheitsentscheidung",
|
||||
},
|
||||
{
|
||||
Regulation: "AI Act Art. 9",
|
||||
TriggerCondDE: "Risikomanagement fuer Hochrisiko-KI erforderlich",
|
||||
Severity: "high",
|
||||
Module: "ai-act",
|
||||
ModuleLink: "/sdk/ai-act",
|
||||
ActionDE: "Risikomanagementsystem nach Art. 9 AI Act aufsetzen",
|
||||
RAGQuery: "AI Act Art 9 Risikomanagementsystem Hochrisiko",
|
||||
},
|
||||
}
|
||||
m["HP041"] = []ComplianceTrigger{
|
||||
{
|
||||
Regulation: "AI Act Art. 14",
|
||||
TriggerCondDE: "Menschliche Aufsicht ueber KI-System erforderlich",
|
||||
Severity: "high",
|
||||
Module: "ai-act",
|
||||
ModuleLink: "/sdk/ai-act",
|
||||
ActionDE: "Human-Oversight-Mechanismus implementieren und dokumentieren",
|
||||
RAGQuery: "AI Act Art 14 menschliche Aufsicht Human Oversight",
|
||||
},
|
||||
}
|
||||
m["HP042"] = []ComplianceTrigger{
|
||||
{
|
||||
Regulation: "AI Act Art. 6",
|
||||
TriggerCondDE: "Bias in sicherheitsrelevanter KI moeglich",
|
||||
Severity: "high",
|
||||
Module: "ai-act",
|
||||
ModuleLink: "/sdk/ai-act",
|
||||
ActionDE: "Bias-Analyse und Datenqualitaetspruefung durchfuehren",
|
||||
RAGQuery: "AI Act Bias Diskriminierung Sicherheits-KI",
|
||||
},
|
||||
}
|
||||
m["HP043"] = []ComplianceTrigger{
|
||||
{
|
||||
Regulation: "AI Act Art. 11",
|
||||
TriggerCondDE: "Technische Dokumentation fuer KI-System erforderlich",
|
||||
Severity: "medium",
|
||||
Module: "ai-act",
|
||||
ModuleLink: "/sdk/ai-act",
|
||||
ActionDE: "Technische Dokumentation nach Anhang IV AI Act erstellen",
|
||||
RAGQuery: "AI Act Art 11 technische Dokumentation Anhang IV",
|
||||
},
|
||||
}
|
||||
m["HP044"] = []ComplianceTrigger{
|
||||
{
|
||||
Regulation: "AI Act Art. 13",
|
||||
TriggerCondDE: "Transparenz-Anforderungen fuer KI-System",
|
||||
Severity: "medium",
|
||||
Module: "ai-act",
|
||||
ModuleLink: "/sdk/ai-act",
|
||||
ActionDE: "Transparenzhinweise und Nutzerdokumentation bereitstellen",
|
||||
RAGQuery: "AI Act Art 13 Transparenz KI Nutzerinformation",
|
||||
},
|
||||
}
|
||||
|
||||
// --- Cyber Resilience Act (software/firmware) ---
|
||||
m["HP033"] = []ComplianceTrigger{
|
||||
{
|
||||
Regulation: "CRA Art. 10",
|
||||
TriggerCondDE: "Schwachstellenmanagement fuer Software-Komponente",
|
||||
Severity: "high",
|
||||
Module: "cyber",
|
||||
ModuleLink: "/sdk/security-backlog",
|
||||
ActionDE: "Vulnerability-Management-Prozess nach CRA einrichten",
|
||||
RAGQuery: "CRA Art 10 Schwachstellenmanagement Software",
|
||||
},
|
||||
{
|
||||
Regulation: "CRA Art. 13",
|
||||
TriggerCondDE: "Sicherheitsupdates muessen bereitgestellt werden",
|
||||
Severity: "medium",
|
||||
Module: "cyber",
|
||||
ModuleLink: "/sdk/security-backlog",
|
||||
ActionDE: "Update-Strategie und Patch-Management dokumentieren",
|
||||
RAGQuery: "CRA Art 13 Sicherheitsupdates Patch-Management",
|
||||
},
|
||||
}
|
||||
m["HP158"] = []ComplianceTrigger{
|
||||
{
|
||||
Regulation: "CRA Art. 10",
|
||||
TriggerCondDE: "Schwachstelle in Firmware erfordert Vulnerability-Handling",
|
||||
Severity: "high",
|
||||
Module: "cyber",
|
||||
ModuleLink: "/sdk/security-backlog",
|
||||
ActionDE: "Schwachstellenmeldung und Patch-Prozess nach CRA etablieren",
|
||||
RAGQuery: "CRA Art 10 Firmware Schwachstelle Meldepflicht",
|
||||
},
|
||||
{
|
||||
Regulation: "CRA Art. 11",
|
||||
TriggerCondDE: "Meldepflicht bei bekannter Schwachstelle",
|
||||
Severity: "high",
|
||||
Module: "cyber",
|
||||
ModuleLink: "/sdk/security-backlog",
|
||||
ActionDE: "Meldeprozess an ENISA/BSI fuer Schwachstellen einrichten",
|
||||
RAGQuery: "CRA Art 11 Meldepflicht ENISA Schwachstelle",
|
||||
},
|
||||
}
|
||||
m["HP159"] = []ComplianceTrigger{
|
||||
{
|
||||
Regulation: "CRA Art. 10",
|
||||
TriggerCondDE: "Datenintegritaet der Software muss sichergestellt sein",
|
||||
Severity: "medium",
|
||||
Module: "cyber",
|
||||
ModuleLink: "/sdk/security-backlog",
|
||||
ActionDE: "Integritaetsschutz fuer Software-Artefakte implementieren",
|
||||
RAGQuery: "CRA Art 10 Datenintegritaet Software Signierung",
|
||||
},
|
||||
}
|
||||
m["HP160"] = []ComplianceTrigger{
|
||||
{
|
||||
Regulation: "NIS2 Art. 21",
|
||||
TriggerCondDE: "Cybersicherheits-Risikomanagement erforderlich",
|
||||
Severity: "high",
|
||||
Module: "cyber",
|
||||
ModuleLink: "/sdk/security-backlog",
|
||||
ActionDE: "Cybersicherheits-Risikomanagement nach NIS2 Art. 21 aufsetzen",
|
||||
RAGQuery: "NIS2 Art 21 Cybersicherheit Risikomanagement",
|
||||
},
|
||||
{
|
||||
Regulation: "CRA Anhang I",
|
||||
TriggerCondDE: "Wesentliche Cybersicherheits-Anforderungen nach CRA",
|
||||
Severity: "high",
|
||||
Module: "cyber",
|
||||
ModuleLink: "/sdk/security-backlog",
|
||||
ActionDE: "CRA Anhang I Checkliste fuer Produkt-Cybersicherheit abarbeiten",
|
||||
RAGQuery: "CRA Anhang I wesentliche Anforderungen Cybersicherheit",
|
||||
},
|
||||
}
|
||||
|
||||
// --- Logging/monitoring patterns ---
|
||||
m["HP131"] = []ComplianceTrigger{
|
||||
{
|
||||
Regulation: "DSGVO Art. 6",
|
||||
TriggerCondDE: "Rechtsgrundlage fuer Protokollierung personenbez. Daten",
|
||||
Severity: "medium",
|
||||
Module: "dsfa",
|
||||
ModuleLink: "/sdk/dsfa",
|
||||
ActionDE: "Rechtsgrundlage fuer Protokollierung pruefen und dokumentieren",
|
||||
RAGQuery: "DSGVO Art 6 Rechtsgrundlage Protokollierung Logging",
|
||||
},
|
||||
}
|
||||
|
||||
// --- AGV / movement profile patterns (HP199-HP213) ---
|
||||
agvIDs := genPatternRange("HP", 199, 213)
|
||||
for _, pid := range agvIDs {
|
||||
m[pid] = []ComplianceTrigger{
|
||||
{
|
||||
Regulation: "DSGVO Art. 35",
|
||||
TriggerCondDE: "AGV-Bewegungsprofile koennen Rueckschluesse auf Personen erlauben",
|
||||
Severity: "high",
|
||||
Module: "dsfa",
|
||||
ModuleLink: "/sdk/dsfa",
|
||||
ActionDE: "DSFA fuer AGV-Bewegungsdaten erstellen",
|
||||
RAGQuery: "DSFA Bewegungsprofile AGV Personenbezug",
|
||||
},
|
||||
{
|
||||
Regulation: "EU Data Act Art. 3",
|
||||
TriggerCondDE: "Maschinendaten-Zugangsrecht fuer Nutzer nach Data Act",
|
||||
Severity: "medium",
|
||||
Module: "vendor-compliance",
|
||||
ModuleLink: "/sdk/vendor-compliance",
|
||||
ActionDE: "Datenzugangsrechte nach EU Data Act fuer Maschinendaten pruefen",
|
||||
RAGQuery: "EU Data Act Art 3 Maschinendaten Zugangsrecht",
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
// --- Cyber-security patterns HP800-HP814 ---
|
||||
cyberIDs1 := genPatternRange("HP", 800, 814)
|
||||
for _, pid := range cyberIDs1 {
|
||||
m[pid] = []ComplianceTrigger{
|
||||
{
|
||||
Regulation: "NIS2 Art. 21",
|
||||
TriggerCondDE: "Cybersicherheits-Risikomanagement fuer vernetzte Komponente",
|
||||
Severity: "high",
|
||||
Module: "cyber",
|
||||
ModuleLink: "/sdk/security-backlog",
|
||||
ActionDE: "NIS2 Cybersicherheits-Massnahmen pruefen und dokumentieren",
|
||||
RAGQuery: "NIS2 Art 21 Cybersicherheit vernetzte Maschine",
|
||||
},
|
||||
{
|
||||
Regulation: "CRA Art. 10",
|
||||
TriggerCondDE: "Schwachstellenmanagement fuer vernetzte Komponente",
|
||||
Severity: "high",
|
||||
Module: "cyber",
|
||||
ModuleLink: "/sdk/security-backlog",
|
||||
ActionDE: "CRA-konforme Schwachstellenbehandlung einrichten",
|
||||
RAGQuery: "CRA Art 10 Schwachstellenmanagement vernetzte Maschine",
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
// --- Cyber-security patterns HP815-HP829 ---
|
||||
cyberIDs2 := genPatternRange("HP", 815, 829)
|
||||
for _, pid := range cyberIDs2 {
|
||||
m[pid] = []ComplianceTrigger{
|
||||
{
|
||||
Regulation: "NIS2 Art. 21",
|
||||
TriggerCondDE: "Netzwerk-Sicherheitsmassnahmen nach NIS2",
|
||||
Severity: "high",
|
||||
Module: "cyber",
|
||||
ModuleLink: "/sdk/security-backlog",
|
||||
ActionDE: "NIS2-Sicherheitskonzept fuer Netzwerkkomponenten erstellen",
|
||||
RAGQuery: "NIS2 Art 21 Netzwerk Sicherheit Massnahmen",
|
||||
},
|
||||
{
|
||||
Regulation: "CRA Art. 10",
|
||||
TriggerCondDE: "CRA-Anforderungen fuer Software mit Netzwerkzugang",
|
||||
Severity: "medium",
|
||||
Module: "cyber",
|
||||
ModuleLink: "/sdk/security-backlog",
|
||||
ActionDE: "CRA-Konformitaet fuer Netzwerk-Software sicherstellen",
|
||||
RAGQuery: "CRA Software Netzwerkzugang Sicherheitsanforderungen",
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
// --- AI/ML-specific cyber patterns HP830-HP844 ---
|
||||
aiCyberIDs := genPatternRange("HP", 830, 844)
|
||||
for _, pid := range aiCyberIDs {
|
||||
m[pid] = []ComplianceTrigger{
|
||||
{
|
||||
Regulation: "AI Act Art. 6",
|
||||
TriggerCondDE: "KI/ML-System in sicherheitsrelevantem Kontext",
|
||||
Severity: "high",
|
||||
Module: "ai-act",
|
||||
ModuleLink: "/sdk/ai-act",
|
||||
ActionDE: "Hochrisiko-Einstufung und AI-Act-Konformitaet pruefen",
|
||||
RAGQuery: "AI Act Hochrisiko KI ML sicherheitsrelevant",
|
||||
},
|
||||
{
|
||||
Regulation: "DSGVO Art. 22",
|
||||
TriggerCondDE: "Automatisierte Entscheidungsfindung durch KI moeglich",
|
||||
Severity: "high",
|
||||
Module: "dsfa",
|
||||
ModuleLink: "/sdk/dsfa",
|
||||
ActionDE: "Automatisierte Einzelentscheidung nach Art. 22 DSGVO pruefen",
|
||||
RAGQuery: "DSGVO Art 22 automatisierte Entscheidung KI Profiling",
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
// --- NIS2 network/HMI patterns HP845-HP864 ---
|
||||
nis2IDs := genPatternRange("HP", 845, 864)
|
||||
for _, pid := range nis2IDs {
|
||||
m[pid] = []ComplianceTrigger{
|
||||
{
|
||||
Regulation: "NIS2 Art. 21",
|
||||
TriggerCondDE: "Netzwerk-/HMI-Komponente erfordert NIS2-Massnahmen",
|
||||
Severity: "high",
|
||||
Module: "cyber",
|
||||
ModuleLink: "/sdk/security-backlog",
|
||||
ActionDE: "NIS2-Sicherheitsanforderungen fuer HMI/Netzwerk umsetzen",
|
||||
RAGQuery: "NIS2 Art 21 HMI Netzwerk Sicherheit",
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
return m
|
||||
}
|
||||
|
||||
// GetTagBasedTriggers returns compliance triggers that fire based on
|
||||
// component tag combinations rather than specific pattern IDs.
|
||||
func GetTagBasedTriggers(tags []string) []ComplianceTrigger {
|
||||
tagSet := make(map[string]bool, len(tags))
|
||||
for _, t := range tags {
|
||||
tagSet[t] = true
|
||||
}
|
||||
|
||||
var triggers []ComplianceTrigger
|
||||
|
||||
// has_software + programmable → CRA Art. 10
|
||||
if tagSet["has_software"] && tagSet["programmable"] {
|
||||
triggers = append(triggers, ComplianceTrigger{
|
||||
Regulation: "CRA Art. 10",
|
||||
TriggerCondDE: "Programmierbare Software-Komponente erfordert CRA-Konformitaet",
|
||||
Severity: "medium",
|
||||
Module: "cyber",
|
||||
ModuleLink: "/sdk/security-backlog",
|
||||
ActionDE: "CRA-Anforderungen fuer programmierbare Software pruefen",
|
||||
RAGQuery: "CRA Art 10 programmierbare Software Sicherheit",
|
||||
})
|
||||
}
|
||||
|
||||
// sensor_part + has_software → EU Data Act Art. 3
|
||||
if tagSet["sensor_part"] && tagSet["has_software"] {
|
||||
triggers = append(triggers, ComplianceTrigger{
|
||||
Regulation: "EU Data Act Art. 3",
|
||||
TriggerCondDE: "Sensor mit Software erzeugt Maschinendaten — Zugangsrecht nach Data Act",
|
||||
Severity: "medium",
|
||||
Module: "vendor-compliance",
|
||||
ModuleLink: "/sdk/vendor-compliance",
|
||||
ActionDE: "Datenzugangsrechte fuer Sensor-/Maschinendaten nach Data Act pruefen",
|
||||
RAGQuery: "EU Data Act Art 3 Sensordaten Maschinendaten Zugang",
|
||||
})
|
||||
}
|
||||
|
||||
// has_ai → AI Act Art. 6 (generic)
|
||||
if tagSet["has_ai"] {
|
||||
triggers = append(triggers, ComplianceTrigger{
|
||||
Regulation: "AI Act Art. 6",
|
||||
TriggerCondDE: "KI-Komponente erkannt — Hochrisiko-Einstufung pruefen",
|
||||
Severity: "high",
|
||||
Module: "ai-act",
|
||||
ModuleLink: "/sdk/ai-act",
|
||||
ActionDE: "AI-Act-Klassifizierung fuer KI-Komponente durchfuehren",
|
||||
RAGQuery: "AI Act Art 6 Klassifizierung KI-System Hochrisiko",
|
||||
})
|
||||
}
|
||||
|
||||
// is_networked → NIS2 Art. 21
|
||||
if tagSet["is_networked"] {
|
||||
triggers = append(triggers, ComplianceTrigger{
|
||||
Regulation: "NIS2 Art. 21",
|
||||
TriggerCondDE: "Vernetzte Komponente unterliegt NIS2-Sicherheitspflichten",
|
||||
Severity: "medium",
|
||||
Module: "cyber",
|
||||
ModuleLink: "/sdk/security-backlog",
|
||||
ActionDE: "NIS2-Anforderungen fuer vernetzte Infrastruktur bewerten",
|
||||
RAGQuery: "NIS2 Art 21 vernetzte Infrastruktur Pflichten",
|
||||
})
|
||||
}
|
||||
|
||||
return triggers
|
||||
}
|
||||
|
||||
// genPatternRange generates pattern IDs like "HP800", "HP801", ..., "HP814".
|
||||
func genPatternRange(prefix string, from, to int) []string {
|
||||
ids := make([]string, 0, to-from+1)
|
||||
for i := from; i <= to; i++ {
|
||||
ids = append(ids, prefix+padInt(i))
|
||||
}
|
||||
return ids
|
||||
}
|
||||
|
||||
// padInt formats an integer with leading zeros to 3 digits minimum.
|
||||
func padInt(n int) string {
|
||||
if n < 10 {
|
||||
return "00" + triggerItoa(n)
|
||||
}
|
||||
if n < 100 {
|
||||
return "0" + triggerItoa(n)
|
||||
}
|
||||
return triggerItoa(n)
|
||||
}
|
||||
|
||||
// triggerItoa converts a non-negative integer to a string without importing strconv.
|
||||
func triggerItoa(n int) string {
|
||||
if n == 0 {
|
||||
return "0"
|
||||
}
|
||||
var buf [20]byte
|
||||
pos := len(buf)
|
||||
for n > 0 {
|
||||
pos--
|
||||
buf[pos] = byte('0' + n%10)
|
||||
n /= 10
|
||||
}
|
||||
return string(buf[pos:])
|
||||
}
|
||||
Reference in New Issue
Block a user