mirror of
https://github.com/cgrates/cgrates.git
synced 2026-02-11 18:16:24 +05:00
291 lines
8.4 KiB
Go
291 lines
8.4 KiB
Go
/*
|
|
Real-time Online/Offline Charging System (OCS) for Telecom & ISP environments
|
|
Copyright (C) ITsysCOM GmbH
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>
|
|
*/
|
|
|
|
package engine
|
|
|
|
import (
|
|
"reflect"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/cgrates/cgrates/config"
|
|
"github.com/cgrates/cgrates/guardian"
|
|
"github.com/cgrates/cgrates/utils"
|
|
)
|
|
|
|
type Responder struct {
|
|
ExitChan chan bool
|
|
Timeout time.Duration
|
|
Timezone string
|
|
MaxComputedUsage map[string]time.Duration
|
|
}
|
|
|
|
// usageAllowed checks requested usage against configured MaxComputedUsage
|
|
func (rs *Responder) usageAllowed(tor string, reqUsage time.Duration) (allowed bool) {
|
|
mcu, has := rs.MaxComputedUsage[tor]
|
|
if !has {
|
|
mcu = rs.MaxComputedUsage[utils.ANY]
|
|
}
|
|
if reqUsage <= mcu {
|
|
allowed = true
|
|
}
|
|
return
|
|
}
|
|
|
|
/*
|
|
RPC method that provides the external RPC interface for getting the rating information.
|
|
*/
|
|
func (rs *Responder) GetCost(arg *CallDescriptorWithArgDispatcher, reply *CallCost) (err error) {
|
|
// RPC caching
|
|
if config.CgrConfig().CacheCfg()[utils.CacheRPCResponses].Limit != 0 {
|
|
cacheKey := utils.ConcatenatedKey(utils.ResponderGetCost, arg.CgrID)
|
|
refID := guardian.Guardian.GuardIDs("",
|
|
config.CgrConfig().GeneralCfg().LockingTimeout, cacheKey) // RPC caching needs to be atomic
|
|
defer guardian.Guardian.UnguardIDs(refID)
|
|
|
|
if itm, has := Cache.Get(utils.CacheRPCResponses, cacheKey); has {
|
|
cachedResp := itm.(*utils.CachedRPCResponse)
|
|
if cachedResp.Error == nil {
|
|
*reply = *cachedResp.Result.(*CallCost)
|
|
}
|
|
return cachedResp.Error
|
|
}
|
|
defer Cache.Set(utils.CacheRPCResponses, cacheKey,
|
|
&utils.CachedRPCResponse{Result: reply, Error: err},
|
|
nil, true, utils.NonTransactional)
|
|
}
|
|
// end of RPC caching
|
|
if arg.Tenant == "" {
|
|
arg.Tenant = config.CgrConfig().GeneralCfg().DefaultTenant
|
|
}
|
|
if arg.Category == "" {
|
|
arg.Category = config.CgrConfig().GeneralCfg().DefaultCategory
|
|
}
|
|
if arg.Subject == "" {
|
|
arg.Subject = arg.Account
|
|
}
|
|
if !rs.usageAllowed(arg.TOR, arg.GetDuration()) {
|
|
return utils.ErrMaxUsageExceeded
|
|
}
|
|
r, e := guardian.Guardian.Guard(func() (interface{}, error) {
|
|
return arg.GetCost()
|
|
}, config.CgrConfig().GeneralCfg().LockingTimeout, utils.ACCOUNT_PREFIX+arg.GetAccountKey())
|
|
if r != nil {
|
|
*reply = *r.(*CallCost)
|
|
}
|
|
if e != nil {
|
|
return e
|
|
}
|
|
return
|
|
}
|
|
|
|
func (rs *Responder) Debit(arg *CallDescriptorWithArgDispatcher, reply *CallCost) (err error) {
|
|
// RPC caching
|
|
if config.CgrConfig().CacheCfg()[utils.CacheRPCResponses].Limit != 0 {
|
|
cacheKey := utils.ConcatenatedKey(utils.ResponderDebit, arg.CgrID)
|
|
refID := guardian.Guardian.GuardIDs("",
|
|
config.CgrConfig().GeneralCfg().LockingTimeout, cacheKey) // RPC caching needs to be atomic
|
|
defer guardian.Guardian.UnguardIDs(refID)
|
|
|
|
if itm, has := Cache.Get(utils.CacheRPCResponses, cacheKey); has {
|
|
cachedResp := itm.(*utils.CachedRPCResponse)
|
|
if cachedResp.Error == nil {
|
|
*reply = *cachedResp.Result.(*CallCost)
|
|
}
|
|
return cachedResp.Error
|
|
}
|
|
defer Cache.Set(utils.CacheRPCResponses, cacheKey,
|
|
&utils.CachedRPCResponse{Result: reply, Error: err},
|
|
nil, true, utils.NonTransactional)
|
|
}
|
|
// end of RPC caching
|
|
|
|
if arg.Subject == "" {
|
|
arg.Subject = arg.Account
|
|
}
|
|
if !rs.usageAllowed(arg.TOR, arg.GetDuration()) {
|
|
err = utils.ErrMaxUsageExceeded
|
|
return
|
|
}
|
|
var r *CallCost
|
|
if r, err = arg.Debit(); err != nil {
|
|
return
|
|
}
|
|
if r != nil {
|
|
*reply = *r
|
|
}
|
|
return
|
|
}
|
|
|
|
func (rs *Responder) MaxDebit(arg *CallDescriptorWithArgDispatcher, reply *CallCost) (err error) {
|
|
// RPC caching
|
|
if config.CgrConfig().CacheCfg()[utils.CacheRPCResponses].Limit != 0 {
|
|
cacheKey := utils.ConcatenatedKey(utils.ResponderMaxDebit, arg.CgrID)
|
|
refID := guardian.Guardian.GuardIDs("",
|
|
config.CgrConfig().GeneralCfg().LockingTimeout, cacheKey) // RPC caching needs to be atomic
|
|
defer guardian.Guardian.UnguardIDs(refID)
|
|
|
|
if itm, has := Cache.Get(utils.CacheRPCResponses, cacheKey); has {
|
|
cachedResp := itm.(*utils.CachedRPCResponse)
|
|
if cachedResp.Error == nil {
|
|
*reply = *cachedResp.Result.(*CallCost)
|
|
}
|
|
return cachedResp.Error
|
|
}
|
|
defer Cache.Set(utils.CacheRPCResponses, cacheKey,
|
|
&utils.CachedRPCResponse{Result: reply, Error: err},
|
|
nil, true, utils.NonTransactional)
|
|
}
|
|
// end of RPC caching
|
|
if arg.Subject == "" {
|
|
arg.Subject = arg.Account
|
|
}
|
|
if !rs.usageAllowed(arg.TOR, arg.GetDuration()) {
|
|
err = utils.ErrMaxUsageExceeded
|
|
return
|
|
}
|
|
var r *CallCost
|
|
if r, err = arg.MaxDebit(); err != nil {
|
|
return
|
|
}
|
|
if r != nil {
|
|
*reply = *r
|
|
}
|
|
return
|
|
}
|
|
|
|
func (rs *Responder) RefundIncrements(arg *CallDescriptorWithArgDispatcher, reply *Account) (err error) {
|
|
// RPC caching
|
|
if config.CgrConfig().CacheCfg()[utils.CacheRPCResponses].Limit != 0 {
|
|
cacheKey := utils.ConcatenatedKey(utils.ResponderRefundIncrements, arg.CgrID)
|
|
refID := guardian.Guardian.GuardIDs("",
|
|
config.CgrConfig().GeneralCfg().LockingTimeout, cacheKey) // RPC caching needs to be atomic
|
|
defer guardian.Guardian.UnguardIDs(refID)
|
|
|
|
if itm, has := Cache.Get(utils.CacheRPCResponses, cacheKey); has {
|
|
cachedResp := itm.(*utils.CachedRPCResponse)
|
|
if cachedResp.Error == nil {
|
|
*reply = *cachedResp.Result.(*Account)
|
|
}
|
|
return cachedResp.Error
|
|
}
|
|
defer Cache.Set(utils.CacheRPCResponses, cacheKey,
|
|
&utils.CachedRPCResponse{Result: reply, Error: err},
|
|
nil, true, utils.NonTransactional)
|
|
}
|
|
// end of RPC caching
|
|
|
|
if arg.Subject == "" {
|
|
arg.Subject = arg.Account
|
|
}
|
|
if !rs.usageAllowed(arg.TOR, arg.GetDuration()) {
|
|
err = utils.ErrMaxUsageExceeded
|
|
return
|
|
}
|
|
var acnt *Account
|
|
if acnt, err = arg.RefundIncrements(); err != nil {
|
|
return
|
|
}
|
|
if acnt != nil {
|
|
*reply = *acnt
|
|
}
|
|
return
|
|
}
|
|
|
|
func (rs *Responder) RefundRounding(arg *CallDescriptorWithArgDispatcher, reply *float64) (err error) {
|
|
// RPC caching
|
|
if config.CgrConfig().CacheCfg()[utils.CacheRPCResponses].Limit != 0 {
|
|
cacheKey := utils.ConcatenatedKey(utils.ResponderRefundRounding, arg.CgrID)
|
|
refID := guardian.Guardian.GuardIDs("",
|
|
config.CgrConfig().GeneralCfg().LockingTimeout, cacheKey) // RPC caching needs to be atomic
|
|
defer guardian.Guardian.UnguardIDs(refID)
|
|
|
|
if itm, has := Cache.Get(utils.CacheRPCResponses, cacheKey); has {
|
|
cachedResp := itm.(*utils.CachedRPCResponse)
|
|
if cachedResp.Error == nil {
|
|
*reply = *cachedResp.Result.(*float64)
|
|
}
|
|
return cachedResp.Error
|
|
}
|
|
defer Cache.Set(utils.CacheRPCResponses, cacheKey,
|
|
&utils.CachedRPCResponse{Result: reply, Error: err},
|
|
nil, true, utils.NonTransactional)
|
|
}
|
|
|
|
if arg.Subject == "" {
|
|
arg.Subject = arg.Account
|
|
}
|
|
if !rs.usageAllowed(arg.TOR, arg.GetDuration()) {
|
|
err = utils.ErrMaxUsageExceeded
|
|
return
|
|
}
|
|
err = arg.RefundRounding()
|
|
return
|
|
}
|
|
|
|
func (rs *Responder) GetMaxSessionTime(arg *CallDescriptorWithArgDispatcher, reply *time.Duration) (err error) {
|
|
if arg.Subject == "" {
|
|
arg.Subject = arg.Account
|
|
}
|
|
if !rs.usageAllowed(arg.TOR, arg.GetDuration()) {
|
|
return utils.ErrMaxUsageExceeded
|
|
}
|
|
*reply, err = arg.GetMaxSessionDuration()
|
|
return
|
|
}
|
|
|
|
func (rs *Responder) Shutdown(arg *utils.TenantWithArgDispatcher, reply *string) (err error) {
|
|
dm.DataDB().Close()
|
|
cdrStorage.Close()
|
|
defer func() { rs.ExitChan <- true }()
|
|
*reply = "Done!"
|
|
return
|
|
}
|
|
|
|
// Ping used to detreminate if component is active
|
|
func (chSv1 *Responder) Ping(ign *utils.CGREventWithArgDispatcher, reply *string) error {
|
|
*reply = utils.Pong
|
|
return nil
|
|
}
|
|
|
|
func (rs *Responder) Call(serviceMethod string, args interface{}, reply interface{}) error {
|
|
parts := strings.Split(serviceMethod, ".")
|
|
if len(parts) != 2 {
|
|
return utils.ErrNotImplemented
|
|
}
|
|
// get method
|
|
method := reflect.ValueOf(rs).MethodByName(parts[1])
|
|
if !method.IsValid() {
|
|
return utils.ErrNotImplemented
|
|
}
|
|
// construct the params
|
|
params := []reflect.Value{reflect.ValueOf(args), reflect.ValueOf(reply)}
|
|
ret := method.Call(params)
|
|
if len(ret) != 1 {
|
|
return utils.ErrServerError
|
|
}
|
|
if ret[0].Interface() == nil {
|
|
return nil
|
|
}
|
|
err, ok := ret[0].Interface().(error)
|
|
if !ok {
|
|
return utils.ErrServerError
|
|
}
|
|
return err
|
|
}
|