/* Real-time Online/Offline Charging System (OCS) for Telecom & ISP environments Copyright (C) ITsysCOM GmbH This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see */ package agents import ( "fmt" "net/http" "github.com/cgrates/cgrates/config" "github.com/cgrates/cgrates/engine" "github.com/cgrates/cgrates/sessions" "github.com/cgrates/cgrates/utils" ) // NewHttpAgent will construct a HTTPAgent func NewHTTPAgent(connMgr *engine.ConnManager, sessionConns []string, filterS *engine.FilterS, dfltTenant, reqPayload, rplyPayload string, reqProcessors []*config.RequestProcessor) *HTTPAgent { return &HTTPAgent{ connMgr: connMgr, filterS: filterS, dfltTenant: dfltTenant, reqPayload: reqPayload, rplyPayload: rplyPayload, reqProcessors: reqProcessors, sessionConns: sessionConns, } } // HTTPAgent is a handler for HTTP requests type HTTPAgent struct { connMgr *engine.ConnManager filterS *engine.FilterS dfltTenant, reqPayload, rplyPayload string reqProcessors []*config.RequestProcessor sessionConns []string } // ServeHTTP implements http.Handler interface func (ha *HTTPAgent) ServeHTTP(w http.ResponseWriter, req *http.Request) { reqVars := make(map[string]interface{}) dcdr, err := newHADataProvider(ha.reqPayload, req) // dcdr will provide information from request if err != nil { utils.Logger.Warning( fmt.Sprintf("<%s> error creating decoder: %s", utils.HTTPAgent, err.Error())) return } cgrRplyNM := config.NewNavigableMap(nil) rplyNM := config.NewNavigableMap(nil) reqVars[utils.RemoteHost] = req.RemoteAddr for _, reqProcessor := range ha.reqProcessors { agReq := NewAgentRequest(dcdr, reqVars, cgrRplyNM, rplyNM, reqProcessor.Tenant, ha.dfltTenant, utils.FirstNonEmpty(reqProcessor.Timezone, config.CgrConfig().GeneralCfg().DefaultTimezone), ha.filterS, nil, nil) lclProcessed, err := ha.processRequest(reqProcessor, agReq) if err != nil { utils.Logger.Warning( fmt.Sprintf("<%s> error: %s processing request: %s", utils.HTTPAgent, err.Error(), utils.ToJSON(agReq))) return // FixMe with returning some error on HTTP level } if !lclProcessed { continue } if lclProcessed && !reqProcessor.Flags.GetBool(utils.MetaContinue) { break } } encdr, err := newHAReplyEncoder(ha.rplyPayload, w) if err != nil { utils.Logger.Warning( fmt.Sprintf("<%s> error creating reply encoder: %s", utils.HTTPAgent, err.Error())) return } if err = encdr.Encode(rplyNM); err != nil { utils.Logger.Warning( fmt.Sprintf("<%s> error: %s encoding out %s", utils.HTTPAgent, err.Error(), utils.ToJSON(rplyNM))) return } } // processRequest represents one processor processing the request func (ha *HTTPAgent) processRequest(reqProcessor *config.RequestProcessor, agReq *AgentRequest) (processed bool, err error) { if pass, err := ha.filterS.Pass(agReq.Tenant, reqProcessor.Filters, agReq); err != nil || !pass { return pass, err } if err = agReq.SetFields(reqProcessor.RequestFields); err != nil { return } cgrEv := agReq.CGRRequest.AsCGREvent(agReq.Tenant, utils.NestingSep) var reqType string for _, typ := range []string{ utils.MetaDryRun, utils.MetaAuth, utils.MetaInitiate, utils.MetaUpdate, utils.MetaTerminate, utils.MetaMessage, utils.MetaCDRs, utils.MetaEvent, utils.MetaEmpty} { if reqProcessor.Flags.HasKey(typ) { // request type is identified through flags reqType = typ break } } cgrArgs := cgrEv.ExtractArgs(reqProcessor.Flags.HasKey(utils.MetaDispatchers), reqType == utils.MetaAuth || reqType == utils.MetaMessage || reqType == utils.MetaEvent) if reqProcessor.Flags.HasKey(utils.MetaLog) { utils.Logger.Info( fmt.Sprintf("<%s> LOG, processorID: %s, http message: %s", utils.HTTPAgent, reqProcessor.ID, agReq.Request.String())) } switch reqType { default: return false, fmt.Errorf("unknown request type: <%s>", reqType) case utils.META_NONE: // do nothing on CGRateS side case utils.MetaDryRun: utils.Logger.Info( fmt.Sprintf("<%s> DRY_RUN, processorID: %s, CGREvent: %s", utils.HTTPAgent, reqProcessor.ID, utils.ToJSON(cgrEv))) case utils.MetaAuth: authArgs := sessions.NewV1AuthorizeArgs( reqProcessor.Flags.HasKey(utils.MetaAttributes), reqProcessor.Flags.ParamsSlice(utils.MetaAttributes), reqProcessor.Flags.HasKey(utils.MetaThresholds), reqProcessor.Flags.ParamsSlice(utils.MetaThresholds), reqProcessor.Flags.HasKey(utils.MetaStats), reqProcessor.Flags.ParamsSlice(utils.MetaStats), reqProcessor.Flags.HasKey(utils.MetaResources), reqProcessor.Flags.HasKey(utils.MetaAccounts), reqProcessor.Flags.HasKey(utils.MetaSuppliers), reqProcessor.Flags.HasKey(utils.MetaSuppliersIgnoreErrors), reqProcessor.Flags.HasKey(utils.MetaSuppliersEventCost), cgrEv, cgrArgs.ArgDispatcher, *cgrArgs.SupplierPaginator, ) rply := new(sessions.V1AuthorizeReply) err = ha.connMgr.Call(ha.sessionConns, nil, utils.SessionSv1AuthorizeEvent, authArgs, rply) if err = agReq.setCGRReply(rply, err); err != nil { return } case utils.MetaInitiate: initArgs := sessions.NewV1InitSessionArgs( reqProcessor.Flags.HasKey(utils.MetaAttributes), reqProcessor.Flags.ParamsSlice(utils.MetaAttributes), reqProcessor.Flags.HasKey(utils.MetaThresholds), reqProcessor.Flags.ParamsSlice(utils.MetaThresholds), reqProcessor.Flags.HasKey(utils.MetaStats), reqProcessor.Flags.ParamsSlice(utils.MetaStats), reqProcessor.Flags.HasKey(utils.MetaResources), reqProcessor.Flags.HasKey(utils.MetaAccounts), cgrEv, cgrArgs.ArgDispatcher) rply := new(sessions.V1InitSessionReply) err = ha.connMgr.Call(ha.sessionConns, nil, utils.SessionSv1InitiateSession, initArgs, rply) if err = agReq.setCGRReply(rply, err); err != nil { return } case utils.MetaUpdate: updateArgs := sessions.NewV1UpdateSessionArgs( reqProcessor.Flags.HasKey(utils.MetaAttributes), reqProcessor.Flags.ParamsSlice(utils.MetaAttributes), reqProcessor.Flags.HasKey(utils.MetaAccounts), cgrEv, cgrArgs.ArgDispatcher) rply := new(sessions.V1UpdateSessionReply) err = ha.connMgr.Call(ha.sessionConns, nil, utils.SessionSv1UpdateSession, updateArgs, rply) if err = agReq.setCGRReply(rply, err); err != nil { return } case utils.MetaTerminate: terminateArgs := sessions.NewV1TerminateSessionArgs( reqProcessor.Flags.HasKey(utils.MetaAccounts), reqProcessor.Flags.HasKey(utils.MetaResources), reqProcessor.Flags.HasKey(utils.MetaThresholds), reqProcessor.Flags.ParamsSlice(utils.MetaThresholds), reqProcessor.Flags.HasKey(utils.MetaStats), reqProcessor.Flags.ParamsSlice(utils.MetaStats), cgrEv, cgrArgs.ArgDispatcher) rply := utils.StringPointer("") err = ha.connMgr.Call(ha.sessionConns, nil, utils.SessionSv1TerminateSession, terminateArgs, rply) if err = agReq.setCGRReply(nil, err); err != nil { return } case utils.MetaMessage: evArgs := sessions.NewV1ProcessMessageArgs( reqProcessor.Flags.HasKey(utils.MetaAttributes), reqProcessor.Flags.ParamsSlice(utils.MetaAttributes), reqProcessor.Flags.HasKey(utils.MetaThresholds), reqProcessor.Flags.ParamsSlice(utils.MetaThresholds), reqProcessor.Flags.HasKey(utils.MetaStats), reqProcessor.Flags.ParamsSlice(utils.MetaStats), reqProcessor.Flags.HasKey(utils.MetaResources), reqProcessor.Flags.HasKey(utils.MetaAccounts), reqProcessor.Flags.HasKey(utils.MetaSuppliers), reqProcessor.Flags.HasKey(utils.MetaSuppliersIgnoreErrors), reqProcessor.Flags.HasKey(utils.MetaSuppliersEventCost), cgrEv, cgrArgs.ArgDispatcher, *cgrArgs.SupplierPaginator) rply := new(sessions.V1ProcessMessageReply) err = ha.connMgr.Call(ha.sessionConns, nil, utils.SessionSv1ProcessMessage, evArgs, rply) if utils.ErrHasPrefix(err, utils.RalsErrorPrfx) { cgrEv.Event[utils.Usage] = 0 // avoid further debits } else if evArgs.Debit { cgrEv.Event[utils.Usage] = rply.MaxUsage // make sure the CDR reflects the debit } if err = agReq.setCGRReply(nil, err); err != nil { return } case utils.MetaEvent: evArgs := &sessions.V1ProcessEventArgs{ Flags: reqProcessor.Flags.SliceFlags(), CGREvent: cgrEv, ArgDispatcher: cgrArgs.ArgDispatcher, Paginator: *cgrArgs.SupplierPaginator, } needMaxUsage := reqProcessor.Flags.HasKey(utils.MetaAuth) || reqProcessor.Flags.HasKey(utils.MetaInit) || reqProcessor.Flags.HasKey(utils.MetaUpdate) rply := new(sessions.V1ProcessEventReply) err = ha.connMgr.Call(ha.sessionConns, nil, utils.SessionSv1ProcessEvent, evArgs, rply) if utils.ErrHasPrefix(err, utils.RalsErrorPrfx) { cgrEv.Event[utils.Usage] = 0 // avoid further debits } else if needMaxUsage { cgrEv.Event[utils.Usage] = rply.MaxUsage // make sure the CDR reflects the debit } if err = agReq.setCGRReply(rply, err); err != nil { return } case utils.MetaCDRs: // allow CDR processing } // separate request so we can capture the Terminate/Event also here if reqProcessor.Flags.HasKey(utils.MetaCDRs) && !reqProcessor.Flags.HasKey(utils.MetaDryRun) { rplyCDRs := utils.StringPointer("") if err = ha.connMgr.Call(ha.sessionConns, nil, utils.SessionSv1ProcessCDR, &utils.CGREventWithArgDispatcher{CGREvent: cgrEv, ArgDispatcher: cgrArgs.ArgDispatcher}, rplyCDRs); err != nil { agReq.CGRReply.Set([]string{utils.Error}, err.Error(), false, false) } } if err := agReq.SetFields(reqProcessor.ReplyFields); err != nil { return false, err } if reqProcessor.Flags.HasKey(utils.MetaLog) { utils.Logger.Info( fmt.Sprintf("<%s> LOG, HTTP reply: %s", utils.HTTPAgent, agReq.Reply)) } if reqType == utils.MetaDryRun { utils.Logger.Info( fmt.Sprintf("<%s> DRY_RUN, HTTP reply: %s", utils.HTTPAgent, agReq.Reply)) } return true, nil }