improve: note 和 reference 使用 hashmap 存储,更方便查询
Signed-off-by: Jia Chao <jiac13@chinaunicom.cn>
This commit is contained in:
parent
524b23e0d8
commit
61a06e5ba6
20
src/lib.rs
20
src/lib.rs
|
@ -111,10 +111,10 @@ pub struct CVRF {
|
||||||
pub documenttracking: DocumentTracking,
|
pub documenttracking: DocumentTracking,
|
||||||
|
|
||||||
// <DocumentNotes>
|
// <DocumentNotes>
|
||||||
pub documentnotes: Vec<Note>,
|
pub documentnotes: HashMap<String, Note>,
|
||||||
|
|
||||||
// <DocumentReferences>
|
// <DocumentReferences>
|
||||||
pub documentreferences: Vec<Reference>,
|
pub documentreferences: HashMap<String, Reference>,
|
||||||
|
|
||||||
// <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
|
// <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
|
||||||
pub producttree: ProductTree,
|
pub producttree: ProductTree,
|
||||||
|
@ -132,10 +132,10 @@ impl CVRF {
|
||||||
documenttype: String::new(),
|
documenttype: String::new(),
|
||||||
documentpublisher: Publisher::new(),
|
documentpublisher: Publisher::new(),
|
||||||
documenttracking: DocumentTracking::new(),
|
documenttracking: DocumentTracking::new(),
|
||||||
documentnotes: vec![],
|
documentnotes: HashMap::new(),
|
||||||
documentreferences: vec![],
|
documentreferences: HashMap::new(),
|
||||||
producttree: ProductTree::new(),
|
producttree: ProductTree::new(),
|
||||||
vulnerabilities: vec![],
|
vulnerabilities: Vec::new(),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -187,7 +187,7 @@ impl CVRF {
|
||||||
if xmlreader.depth < 2 {
|
if xmlreader.depth < 2 {
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
self.documentnotes.push(note);
|
self.documentnotes.insert(note.title.clone(), note);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -199,7 +199,7 @@ impl CVRF {
|
||||||
if xmlreader.depth < 2 {
|
if xmlreader.depth < 2 {
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
self.documentreferences.push(reference);
|
self.documentreferences.insert(reference.r#type.clone(), reference);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -736,7 +736,7 @@ impl Product {
|
||||||
#[derive(Debug, Clone, Serialize, Deserialize)]
|
#[derive(Debug, Clone, Serialize, Deserialize)]
|
||||||
pub struct Vulnerability {
|
pub struct Vulnerability {
|
||||||
// <Notes>...</Notes>
|
// <Notes>...</Notes>
|
||||||
pub notes: Vec<Note>,
|
pub notes: HashMap<String, Note>,
|
||||||
|
|
||||||
// <ReleaseDate>
|
// <ReleaseDate>
|
||||||
pub releasedate: String,
|
pub releasedate: String,
|
||||||
|
@ -760,7 +760,7 @@ pub struct Vulnerability {
|
||||||
impl Vulnerability {
|
impl Vulnerability {
|
||||||
pub fn new() -> Self {
|
pub fn new() -> Self {
|
||||||
Vulnerability {
|
Vulnerability {
|
||||||
notes: Vec::new(),
|
notes: HashMap::new(),
|
||||||
releasedate: String::new(),
|
releasedate: String::new(),
|
||||||
cve: String::new(),
|
cve: String::new(),
|
||||||
productstatuses: Vec::new(),
|
productstatuses: Vec::new(),
|
||||||
|
@ -800,7 +800,7 @@ impl Vulnerability {
|
||||||
if xmlreader.depth < 3 {
|
if xmlreader.depth < 3 {
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
self.notes.push(note);
|
self.notes.insert(note.title.clone(), note);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
22
src/test.rs
22
src/test.rs
|
@ -42,19 +42,27 @@ fn cvrf_works() {
|
||||||
let note_title = "Synopsis";
|
let note_title = "Synopsis";
|
||||||
let note_type = "General";
|
let note_type = "General";
|
||||||
let note_ordinal = "1";
|
let note_ordinal = "1";
|
||||||
let note_content = "An update for golang is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1,openEuler-22.03-LTS-SP2 and openEuler-22.03-LTS-SP3.";
|
let note_content = "golang security update";
|
||||||
assert_eq!(cvrf.documentnotes.len(), 6);
|
assert_eq!(cvrf.documentnotes.len(), 6);
|
||||||
assert_eq!(cvrf.documentnotes[0].title, note_title);
|
if let Some(note) = cvrf.documentnotes.get("Synopsis") {
|
||||||
assert_eq!(cvrf.documentnotes[0].r#type, note_type);
|
assert_eq!(note.title, note_title);
|
||||||
assert_eq!(cvrf.documentnotes[0].ordinal, note_ordinal);
|
assert_eq!(note.r#type, note_type);
|
||||||
assert_eq!(cvrf.documentnotes[1].content, note_content);
|
assert_eq!(note.ordinal, note_ordinal);
|
||||||
|
assert_eq!(note.content, note_content);
|
||||||
|
} else {
|
||||||
|
assert!(false);
|
||||||
|
}
|
||||||
|
|
||||||
// references
|
// references
|
||||||
let reference_type = "openEuler CVE";
|
let reference_type = "openEuler CVE";
|
||||||
let reference_url = "https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-45288";
|
let reference_url = "https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-45288";
|
||||||
assert_eq!(cvrf.documentreferences.len(), 3);
|
assert_eq!(cvrf.documentreferences.len(), 3);
|
||||||
assert_eq!(cvrf.documentreferences[1].r#type, reference_type);
|
if let Some(reference) = cvrf.documentreferences.get("openEuler CVE") {
|
||||||
assert_eq!(cvrf.documentreferences[1].url[0], reference_url);
|
assert_eq!(reference.r#type, reference_type);
|
||||||
|
assert_eq!(reference.url[0], reference_url);
|
||||||
|
} else {
|
||||||
|
assert!(false);
|
||||||
|
}
|
||||||
|
|
||||||
// producttree
|
// producttree
|
||||||
let producttree_productid = "openEuler-22.03-LTS";
|
let producttree_productid = "openEuler-22.03-LTS";
|
||||||
|
|
Loading…
Reference in New Issue
Block a user