mirror of
https://github.com/cgrates/cgrates.git
synced 2026-02-20 06:38:45 +05:00
1393 lines
47 KiB
Go
1393 lines
47 KiB
Go
/*
|
|
Real-time Online/Offline Charging System (OCS) for Telecom & ISP environments
|
|
Copyright (C) ITsysCOM GmbH
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>
|
|
*/
|
|
|
|
package v1
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"os"
|
|
"path"
|
|
"strconv"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/cgrates/cgrates/config"
|
|
"github.com/cgrates/cgrates/engine"
|
|
"github.com/cgrates/cgrates/guardian"
|
|
"github.com/cgrates/cgrates/scheduler"
|
|
"github.com/cgrates/cgrates/utils"
|
|
)
|
|
|
|
// SchedulerGeter used to avoid ciclic dependency
|
|
type SchedulerGeter interface {
|
|
GetScheduler() *scheduler.Scheduler
|
|
}
|
|
|
|
type ApierV1 struct {
|
|
StorDb engine.LoadStorage // we should consider keeping only one of StorDB type
|
|
CdrDb engine.CdrStorage
|
|
DataManager *engine.DataManager
|
|
Config *config.CGRConfig
|
|
Responder *engine.Responder
|
|
SchedulerService SchedulerGeter // Need to have them capitalize so we can export in V2
|
|
HTTPPoster *engine.HTTPPoster
|
|
FilterS *engine.FilterS //Used for CDR Exporter
|
|
ConnMgr *engine.ConnManager
|
|
|
|
StorDBChan chan engine.StorDB
|
|
}
|
|
|
|
// Call implements rpcclient.ClientConnector interface for internal RPC
|
|
func (apiv1 *ApierV1) Call(serviceMethod string,
|
|
args interface{}, reply interface{}) error {
|
|
return utils.APIerRPCCall(apiv1, serviceMethod, args, reply)
|
|
}
|
|
|
|
func (apiv1 *ApierV1) GetDestination(dstId string, reply *engine.Destination) error {
|
|
if dst, err := apiv1.DataManager.GetDestination(dstId, false, utils.NonTransactional); err != nil {
|
|
return utils.ErrNotFound
|
|
} else {
|
|
*reply = *dst
|
|
}
|
|
return nil
|
|
}
|
|
|
|
type AttrRemoveDestination struct {
|
|
DestinationIDs []string
|
|
Prefixes []string
|
|
}
|
|
|
|
func (apiv1 *ApierV1) RemoveDestination(attr AttrRemoveDestination, reply *string) (err error) {
|
|
for _, dstID := range attr.DestinationIDs {
|
|
if len(attr.Prefixes) == 0 {
|
|
if err = apiv1.DataManager.RemoveDestination(dstID, utils.NonTransactional); err != nil {
|
|
*reply = err.Error()
|
|
break
|
|
} else {
|
|
*reply = utils.OK
|
|
}
|
|
// TODO list
|
|
// get destination
|
|
// remove prefixes
|
|
// handle reverse destination
|
|
// set destinastion
|
|
}
|
|
}
|
|
return
|
|
}
|
|
|
|
// GetReverseDestination retrieves revese destination list for a prefix
|
|
func (apiv1 *ApierV1) GetReverseDestination(prefix string, reply *[]string) (err error) {
|
|
if prefix == "" {
|
|
return utils.NewErrMandatoryIeMissing("prefix")
|
|
}
|
|
var revLst []string
|
|
if revLst, err = apiv1.DataManager.GetReverseDestination(prefix, false, utils.NonTransactional); err != nil {
|
|
return
|
|
}
|
|
*reply = revLst
|
|
return
|
|
}
|
|
|
|
// ComputeReverseDestinations will rebuild complete reverse destinations data
|
|
func (apiv1 *ApierV1) ComputeReverseDestinations(ignr string, reply *string) (err error) {
|
|
if err = apiv1.DataManager.DataDB().RebuildReverseForPrefix(utils.REVERSE_DESTINATION_PREFIX); err != nil {
|
|
return
|
|
}
|
|
*reply = utils.OK
|
|
return
|
|
}
|
|
|
|
// ComputeAccountActionPlans will rebuild complete reverse accountActions data
|
|
func (apiv1 *ApierV1) ComputeAccountActionPlans(ignr string, reply *string) (err error) {
|
|
if err = apiv1.DataManager.DataDB().RebuildReverseForPrefix(utils.AccountActionPlansPrefix); err != nil {
|
|
return
|
|
}
|
|
*reply = utils.OK
|
|
return
|
|
}
|
|
|
|
func (apiv1 *ApierV1) GetSharedGroup(sgId string, reply *engine.SharedGroup) error {
|
|
if sg, err := apiv1.DataManager.GetSharedGroup(sgId, false, utils.NonTransactional); err != nil && err != utils.ErrNotFound { // Not found is not an error here
|
|
return err
|
|
} else {
|
|
if sg != nil {
|
|
*reply = *sg
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (apiv1 *ApierV1) SetDestination(attrs utils.AttrSetDestination, reply *string) (err error) {
|
|
if missing := utils.MissingStructFields(&attrs, []string{"Id", "Prefixes"}); len(missing) != 0 {
|
|
return utils.NewErrMandatoryIeMissing(missing...)
|
|
}
|
|
dest := &engine.Destination{Id: attrs.Id, Prefixes: attrs.Prefixes}
|
|
var oldDest *engine.Destination
|
|
if oldDest, err = apiv1.DataManager.GetDestination(attrs.Id, false, utils.NonTransactional); err != nil {
|
|
if err != utils.ErrNotFound {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
} else if !attrs.Overwrite {
|
|
return utils.ErrExists
|
|
}
|
|
if err := apiv1.DataManager.SetDestination(dest, utils.NonTransactional); err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
if err = apiv1.DataManager.CacheDataFromDB(utils.DESTINATION_PREFIX, []string{attrs.Id}, true); err != nil {
|
|
return
|
|
}
|
|
if err = apiv1.DataManager.UpdateReverseDestination(oldDest, dest, utils.NonTransactional); err != nil {
|
|
return
|
|
}
|
|
if err = apiv1.DataManager.CacheDataFromDB(utils.REVERSE_DESTINATION_PREFIX, dest.Prefixes, true); err != nil {
|
|
return
|
|
}
|
|
*reply = utils.OK
|
|
return nil
|
|
}
|
|
|
|
func (apiv1 *ApierV1) GetRatingPlan(rplnId string, reply *engine.RatingPlan) error {
|
|
rpln, err := apiv1.DataManager.GetRatingPlan(rplnId, false, utils.NonTransactional)
|
|
if err != nil {
|
|
if err.Error() == utils.ErrNotFound.Error() {
|
|
return err
|
|
}
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
*reply = *rpln
|
|
return nil
|
|
}
|
|
|
|
func (apiv1 *ApierV1) RemoveRatingPlan(ID string, reply *string) error {
|
|
if len(ID) == 0 {
|
|
return utils.NewErrMandatoryIeMissing("ID")
|
|
}
|
|
err := apiv1.DataManager.RemoveRatingPlan(ID, utils.NonTransactional)
|
|
if err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
//generate a loadID for CacheRatingPlans and store it in database
|
|
if err := apiv1.DataManager.SetLoadIDs(map[string]int64{utils.CacheRatingPlans: time.Now().UnixNano()}); err != nil {
|
|
return utils.APIErrorHandler(err)
|
|
}
|
|
*reply = utils.OK
|
|
return nil
|
|
}
|
|
|
|
func (apiv1 *ApierV1) ExecuteAction(attr *utils.AttrExecuteAction, reply *string) error {
|
|
at := &engine.ActionTiming{
|
|
ActionsID: attr.ActionsId,
|
|
}
|
|
if attr.Tenant != "" && attr.Account != "" {
|
|
at.SetAccountIDs(utils.StringMap{utils.ConcatenatedKey(attr.Tenant, attr.Account): true})
|
|
}
|
|
if err := at.Execute(nil, nil); err != nil {
|
|
*reply = err.Error()
|
|
return err
|
|
}
|
|
*reply = utils.OK
|
|
return nil
|
|
}
|
|
|
|
type AttrLoadDestination struct {
|
|
TPid string
|
|
ID string
|
|
}
|
|
|
|
// Load destinations from storDb into dataDb.
|
|
func (apiv1 *ApierV1) LoadDestination(attrs AttrLoadDestination, reply *string) error {
|
|
if len(attrs.TPid) == 0 {
|
|
return utils.NewErrMandatoryIeMissing("TPid")
|
|
}
|
|
dbReader, err := engine.NewTpReader(apiv1.DataManager.DataDB(), apiv1.StorDb,
|
|
attrs.TPid, apiv1.Config.GeneralCfg().DefaultTimezone, apiv1.Config.ApierCfg().CachesConns,
|
|
apiv1.Config.ApierCfg().SchedulerConns)
|
|
if err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
if loaded, err := dbReader.LoadDestinationsFiltered(attrs.ID); err != nil {
|
|
return utils.NewErrServerError(err)
|
|
} else if !loaded {
|
|
return utils.ErrNotFound
|
|
}
|
|
if err := apiv1.DataManager.CacheDataFromDB(utils.DESTINATION_PREFIX, []string{attrs.ID}, true); err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
*reply = utils.OK
|
|
return nil
|
|
}
|
|
|
|
type AttrLoadRatingPlan struct {
|
|
TPid string
|
|
RatingPlanId string
|
|
}
|
|
|
|
// Process dependencies and load a specific rating plan from storDb into dataDb.
|
|
func (apiv1 *ApierV1) LoadRatingPlan(attrs AttrLoadRatingPlan, reply *string) error {
|
|
if len(attrs.TPid) == 0 {
|
|
return utils.NewErrMandatoryIeMissing("TPid")
|
|
}
|
|
dbReader, err := engine.NewTpReader(apiv1.DataManager.DataDB(), apiv1.StorDb,
|
|
attrs.TPid, apiv1.Config.GeneralCfg().DefaultTimezone,
|
|
apiv1.Config.ApierCfg().CachesConns, apiv1.Config.ApierCfg().SchedulerConns)
|
|
if err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
if loaded, err := dbReader.LoadRatingPlansFiltered(attrs.RatingPlanId); err != nil {
|
|
return utils.NewErrServerError(err)
|
|
} else if !loaded {
|
|
return utils.ErrNotFound
|
|
}
|
|
*reply = utils.OK
|
|
return nil
|
|
}
|
|
|
|
// Process dependencies and load a specific rating profile from storDb into dataDb.
|
|
func (apiv1 *ApierV1) LoadRatingProfile(attrs utils.TPRatingProfile, reply *string) error {
|
|
if len(attrs.TPid) == 0 {
|
|
return utils.NewErrMandatoryIeMissing("TPid")
|
|
}
|
|
dbReader, err := engine.NewTpReader(apiv1.DataManager.DataDB(), apiv1.StorDb,
|
|
attrs.TPid, apiv1.Config.GeneralCfg().DefaultTimezone,
|
|
apiv1.Config.ApierCfg().CachesConns, apiv1.Config.ApierCfg().SchedulerConns)
|
|
if err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
if err := dbReader.LoadRatingProfilesFiltered(&attrs); err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
*reply = utils.OK
|
|
return nil
|
|
}
|
|
|
|
type AttrLoadSharedGroup struct {
|
|
TPid string
|
|
SharedGroupId string
|
|
}
|
|
|
|
// Load destinations from storDb into dataDb.
|
|
func (apiv1 *ApierV1) LoadSharedGroup(attrs AttrLoadSharedGroup, reply *string) error {
|
|
if len(attrs.TPid) == 0 {
|
|
return utils.NewErrMandatoryIeMissing("TPid")
|
|
}
|
|
dbReader, err := engine.NewTpReader(apiv1.DataManager.DataDB(), apiv1.StorDb,
|
|
attrs.TPid, apiv1.Config.GeneralCfg().DefaultTimezone,
|
|
apiv1.Config.ApierCfg().CachesConns, apiv1.Config.ApierCfg().SchedulerConns)
|
|
if err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
if err := dbReader.LoadSharedGroupsFiltered(attrs.SharedGroupId, true); err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
*reply = utils.OK
|
|
return nil
|
|
}
|
|
|
|
type AttrLoadTpFromStorDb struct {
|
|
TPid string
|
|
DryRun bool // Only simulate, no write
|
|
Validate bool // Run structural checks
|
|
ArgDispatcher *utils.ArgDispatcher
|
|
Caching *string // Caching strategy
|
|
}
|
|
|
|
// Loads complete data in a TP from storDb
|
|
func (apiv1 *ApierV1) LoadTariffPlanFromStorDb(attrs AttrLoadTpFromStorDb, reply *string) error {
|
|
if len(attrs.TPid) == 0 {
|
|
return utils.NewErrMandatoryIeMissing("TPid")
|
|
}
|
|
dbReader, err := engine.NewTpReader(apiv1.DataManager.DataDB(), apiv1.StorDb,
|
|
attrs.TPid, apiv1.Config.GeneralCfg().DefaultTimezone,
|
|
apiv1.Config.ApierCfg().CachesConns, apiv1.Config.ApierCfg().SchedulerConns)
|
|
if err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
if err := dbReader.LoadAll(); err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
if attrs.Validate {
|
|
if !dbReader.IsValid() {
|
|
*reply = utils.OK
|
|
return errors.New("invalid data")
|
|
}
|
|
}
|
|
if attrs.DryRun {
|
|
*reply = utils.OK
|
|
return nil // Mission complete, no errors
|
|
}
|
|
if err := dbReader.WriteToDatabase(false, false); err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
//verify If Caching is present in arguments
|
|
caching := config.CgrConfig().GeneralCfg().DefaultCaching
|
|
if attrs.Caching != nil {
|
|
caching = *attrs.Caching
|
|
}
|
|
// reload cache
|
|
utils.Logger.Info("ApierV1.LoadTariffPlanFromStorDb, reloading cache.")
|
|
if err := dbReader.ReloadCache(caching, true, attrs.ArgDispatcher); err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
if len(apiv1.Config.ApierCfg().SchedulerConns) != 0 {
|
|
utils.Logger.Info("ApierV1.LoadTariffPlanFromStorDb, reloading scheduler.")
|
|
if err := dbReader.ReloadScheduler(true); err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
}
|
|
// release the reader with it's structures
|
|
dbReader.Init()
|
|
*reply = utils.OK
|
|
return nil
|
|
}
|
|
|
|
func (apiv1 *ApierV1) ImportTariffPlanFromFolder(attrs utils.AttrImportTPFromFolder, reply *string) error {
|
|
if missing := utils.MissingStructFields(&attrs, []string{"TPid", "FolderPath"}); len(missing) != 0 {
|
|
return utils.NewErrMandatoryIeMissing(missing...)
|
|
}
|
|
if len(attrs.CsvSeparator) == 0 {
|
|
attrs.CsvSeparator = ","
|
|
}
|
|
if fi, err := os.Stat(attrs.FolderPath); err != nil {
|
|
if strings.HasSuffix(err.Error(), "no such file or directory") {
|
|
return utils.ErrInvalidPath
|
|
}
|
|
return utils.NewErrServerError(err)
|
|
} else if !fi.IsDir() {
|
|
return utils.ErrInvalidPath
|
|
}
|
|
csvImporter := engine.TPCSVImporter{
|
|
TPid: attrs.TPid,
|
|
StorDb: apiv1.StorDb,
|
|
DirPath: attrs.FolderPath,
|
|
Sep: rune(attrs.CsvSeparator[0]),
|
|
Verbose: false,
|
|
ImportId: attrs.RunId,
|
|
}
|
|
if err := csvImporter.Run(); err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
*reply = utils.OK
|
|
return nil
|
|
}
|
|
|
|
// Sets a specific rating profile working with data directly in the DataDB without involving storDb
|
|
func (apiv1 *ApierV1) SetRatingProfile(attrs utils.AttrSetRatingProfile, reply *string) (err error) {
|
|
if missing := utils.MissingStructFields(&attrs, []string{"Tenant", "TOR", "Direction", "Subject", "RatingPlanActivations"}); len(missing) != 0 {
|
|
return utils.NewErrMandatoryIeMissing(missing...)
|
|
}
|
|
for _, rpa := range attrs.RatingPlanActivations {
|
|
if missing := utils.MissingStructFields(rpa, []string{"ActivationTime", "RatingPlanId"}); len(missing) != 0 {
|
|
return fmt.Errorf("%s:RatingPlanActivation:%v", utils.ErrMandatoryIeMissing.Error(), missing)
|
|
}
|
|
}
|
|
tpRpf := utils.TPRatingProfile{Tenant: attrs.Tenant,
|
|
Category: attrs.Category, Subject: attrs.Subject}
|
|
keyId := tpRpf.KeyId()
|
|
var rpfl *engine.RatingProfile
|
|
if !attrs.Overwrite {
|
|
if rpfl, err = apiv1.DataManager.GetRatingProfile(keyId, false, utils.NonTransactional); err != nil && err != utils.ErrNotFound {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
}
|
|
if rpfl == nil {
|
|
rpfl = &engine.RatingProfile{Id: keyId, RatingPlanActivations: make(engine.RatingPlanActivations, 0)}
|
|
}
|
|
for _, ra := range attrs.RatingPlanActivations {
|
|
at, err := utils.ParseTimeDetectLayout(ra.ActivationTime,
|
|
apiv1.Config.GeneralCfg().DefaultTimezone)
|
|
if err != nil {
|
|
return fmt.Errorf(fmt.Sprintf("%s:Cannot parse activation time from %v", utils.ErrServerError.Error(), ra.ActivationTime))
|
|
}
|
|
if exists, err := apiv1.DataManager.HasData(utils.RATING_PLAN_PREFIX,
|
|
ra.RatingPlanId, ""); err != nil {
|
|
return utils.NewErrServerError(err)
|
|
} else if !exists {
|
|
return fmt.Errorf(fmt.Sprintf("%s:RatingPlanId:%s", utils.ErrNotFound.Error(), ra.RatingPlanId))
|
|
}
|
|
rpfl.RatingPlanActivations = append(rpfl.RatingPlanActivations,
|
|
&engine.RatingPlanActivation{
|
|
ActivationTime: at,
|
|
RatingPlanId: ra.RatingPlanId,
|
|
FallbackKeys: utils.FallbackSubjKeys(tpRpf.Tenant,
|
|
tpRpf.Category, ra.FallbackSubjects)})
|
|
}
|
|
if err := apiv1.DataManager.SetRatingProfile(rpfl, utils.NonTransactional); err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
//generate a loadID for CacheRatingProfiles and store it in database
|
|
if err := apiv1.DataManager.SetLoadIDs(map[string]int64{utils.CacheRatingProfiles: time.Now().UnixNano()}); err != nil {
|
|
return utils.APIErrorHandler(err)
|
|
}
|
|
*reply = utils.OK
|
|
return nil
|
|
}
|
|
|
|
// GetRatingProfileIDs returns list of resourceProfile IDs registered for a tenant
|
|
func (apiv1 *ApierV1) GetRatingProfileIDs(args utils.TenantArgWithPaginator, rsPrfIDs *[]string) error {
|
|
if missing := utils.MissingStructFields(&args, []string{utils.Tenant}); len(missing) != 0 { //Params missing
|
|
return utils.NewErrMandatoryIeMissing(missing...)
|
|
}
|
|
prfx := utils.RATING_PROFILE_PREFIX + "*out:" + args.Tenant + ":"
|
|
keys, err := apiv1.DataManager.DataDB().GetKeysForPrefix(prfx)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if len(keys) == 0 {
|
|
return utils.ErrNotFound
|
|
}
|
|
retIDs := make([]string, len(keys))
|
|
for i, key := range keys {
|
|
retIDs[i] = key[len(prfx):]
|
|
}
|
|
*rsPrfIDs = args.PaginateStringSlice(retIDs)
|
|
return nil
|
|
}
|
|
|
|
func (apiv1 *ApierV1) GetRatingProfile(attrs utils.AttrGetRatingProfile, reply *engine.RatingProfile) (err error) {
|
|
if missing := utils.MissingStructFields(&attrs, []string{"Tenant", "Category", "Direction", "Subject"}); len(missing) != 0 {
|
|
return utils.NewErrMandatoryIeMissing(missing...)
|
|
}
|
|
if rpPrf, err := apiv1.DataManager.GetRatingProfile(attrs.GetID(),
|
|
false, utils.NonTransactional); err != nil {
|
|
return utils.APIErrorHandler(err)
|
|
} else {
|
|
*reply = *rpPrf
|
|
}
|
|
return
|
|
}
|
|
|
|
// Deprecated attrs
|
|
type V1AttrSetActions struct {
|
|
ActionsId string // Actions id
|
|
Overwrite bool // If previously defined, will be overwritten
|
|
Actions []*V1TPAction // Set of actions this Actions profile will perform
|
|
}
|
|
type V1TPActions struct {
|
|
TPid string // Tariff plan id
|
|
ActionsId string // Actions id
|
|
Actions []*V1TPAction // Set of actions this Actions profile will perform
|
|
}
|
|
|
|
type V1TPAction struct {
|
|
Identifier string // Identifier mapped in the code
|
|
BalanceId string // Balance identification string (account scope)
|
|
BalanceUuid string // Balance identification string (global scope)
|
|
BalanceType string // Type of balance the action will operate on
|
|
Directions string // Balance direction
|
|
Units float64 // Number of units to add/deduct
|
|
ExpiryTime string // Time when the units will expire
|
|
Filter string // The condition on balances that is checked before the action
|
|
TimingTags string // Timing when balance is active
|
|
DestinationIds string // Destination profile id
|
|
RatingSubject string // Reference a rate subject defined in RatingProfiles
|
|
Categories string // category filter for balances
|
|
SharedGroups string // Reference to a shared group
|
|
BalanceWeight *float64 // Balance weight
|
|
ExtraParameters string
|
|
BalanceBlocker string
|
|
BalanceDisabled string
|
|
Weight float64 // Action's weight
|
|
}
|
|
|
|
func (apiv1 *ApierV1) SetActions(attrs V1AttrSetActions, reply *string) (err error) {
|
|
if missing := utils.MissingStructFields(&attrs, []string{"ActionsId", "Actions"}); len(missing) != 0 {
|
|
return utils.NewErrMandatoryIeMissing(missing...)
|
|
}
|
|
for _, action := range attrs.Actions {
|
|
requiredFields := []string{"Identifier", "Weight"}
|
|
if action.BalanceType != "" { // Add some inter-dependent parameters - if balanceType then we are not talking about simply calling actions
|
|
requiredFields = append(requiredFields, "Direction", "Units")
|
|
}
|
|
if missing := utils.MissingStructFields(action, requiredFields); len(missing) != 0 {
|
|
return fmt.Errorf("%s:Action:%s:%v", utils.ErrMandatoryIeMissing.Error(), action.Identifier, missing)
|
|
}
|
|
}
|
|
if !attrs.Overwrite {
|
|
if exists, err := apiv1.DataManager.HasData(utils.ACTION_PREFIX, attrs.ActionsId, ""); err != nil {
|
|
return utils.NewErrServerError(err)
|
|
} else if exists {
|
|
return utils.ErrExists
|
|
}
|
|
}
|
|
storeActions := make(engine.Actions, len(attrs.Actions))
|
|
for idx, apiAct := range attrs.Actions {
|
|
var blocker *bool
|
|
if apiAct.BalanceBlocker != "" {
|
|
if x, err := strconv.ParseBool(apiAct.BalanceBlocker); err == nil {
|
|
blocker = &x
|
|
} else {
|
|
return err
|
|
}
|
|
}
|
|
|
|
var disabled *bool
|
|
if apiAct.BalanceDisabled != "" {
|
|
if x, err := strconv.ParseBool(apiAct.BalanceDisabled); err == nil {
|
|
disabled = &x
|
|
} else {
|
|
return err
|
|
}
|
|
}
|
|
a := &engine.Action{
|
|
Id: attrs.ActionsId,
|
|
ActionType: apiAct.Identifier,
|
|
Weight: apiAct.Weight,
|
|
ExpirationString: apiAct.ExpiryTime,
|
|
ExtraParameters: apiAct.ExtraParameters,
|
|
Filter: apiAct.Filter,
|
|
Balance: &engine.BalanceFilter{ // TODO: update this part
|
|
Uuid: utils.StringPointer(apiAct.BalanceUuid),
|
|
ID: utils.StringPointer(apiAct.BalanceId),
|
|
Type: utils.StringPointer(apiAct.BalanceType),
|
|
Value: &utils.ValueFormula{Static: apiAct.Units},
|
|
Weight: apiAct.BalanceWeight,
|
|
DestinationIDs: utils.StringMapPointer(utils.ParseStringMap(apiAct.DestinationIds)),
|
|
RatingSubject: utils.StringPointer(apiAct.RatingSubject),
|
|
SharedGroups: utils.StringMapPointer(utils.ParseStringMap(apiAct.SharedGroups)),
|
|
Categories: utils.StringMapPointer(utils.ParseStringMap(apiAct.Categories)),
|
|
TimingIDs: utils.StringMapPointer(utils.ParseStringMap(apiAct.TimingTags)),
|
|
Blocker: blocker,
|
|
Disabled: disabled,
|
|
},
|
|
}
|
|
storeActions[idx] = a
|
|
}
|
|
if err := apiv1.DataManager.SetActions(attrs.ActionsId, storeActions, utils.NonTransactional); err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
//generate a loadID for CacheActions and store it in database
|
|
if err := apiv1.DataManager.SetLoadIDs(map[string]int64{utils.CacheActions: time.Now().UnixNano()}); err != nil {
|
|
return utils.APIErrorHandler(err)
|
|
}
|
|
*reply = utils.OK
|
|
return nil
|
|
}
|
|
|
|
// Retrieves actions attached to specific ActionsId within cache
|
|
func (apiv1 *ApierV1) GetActions(actsId string, reply *[]*utils.TPAction) error {
|
|
if len(actsId) == 0 {
|
|
return fmt.Errorf("%s ActionsId: %s", utils.ErrMandatoryIeMissing.Error(), actsId)
|
|
}
|
|
acts := make([]*utils.TPAction, 0)
|
|
engActs, err := apiv1.DataManager.GetActions(actsId, false, utils.NonTransactional)
|
|
if err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
for _, engAct := range engActs {
|
|
act := &utils.TPAction{
|
|
Identifier: engAct.ActionType,
|
|
ExpiryTime: engAct.ExpirationString,
|
|
ExtraParameters: engAct.ExtraParameters,
|
|
Filter: engAct.Filter,
|
|
Weight: engAct.Weight,
|
|
}
|
|
bf := engAct.Balance
|
|
if bf != nil {
|
|
act.BalanceType = bf.GetType()
|
|
act.Units = strconv.FormatFloat(bf.GetValue(), 'f', -1, 64)
|
|
act.DestinationIds = bf.GetDestinationIDs().String()
|
|
act.RatingSubject = bf.GetRatingSubject()
|
|
act.SharedGroups = bf.GetSharedGroups().String()
|
|
act.BalanceWeight = strconv.FormatFloat(bf.GetWeight(), 'f', -1, 64)
|
|
act.TimingTags = bf.GetTimingIDs().String()
|
|
act.BalanceId = bf.GetID()
|
|
act.Categories = bf.GetCategories().String()
|
|
act.BalanceBlocker = strconv.FormatBool(bf.GetBlocker())
|
|
act.BalanceDisabled = strconv.FormatBool(bf.GetDisabled())
|
|
}
|
|
acts = append(acts, act)
|
|
}
|
|
*reply = acts
|
|
return nil
|
|
}
|
|
|
|
type AttrSetActionPlan struct {
|
|
Id string // Profile id
|
|
ActionPlan []*AttrActionPlan // Set of actions this Actions profile will perform
|
|
Overwrite bool // If previously defined, will be overwritten
|
|
ReloadScheduler bool // Enables automatic reload of the scheduler (eg: useful when adding a single action timing)
|
|
}
|
|
|
|
type AttrActionPlan struct {
|
|
ActionsId string // Actions id
|
|
Years string // semicolon separated list of years this timing is valid on, *any or empty supported
|
|
Months string // semicolon separated list of months this timing is valid on, *any or empty supported
|
|
MonthDays string // semicolon separated list of month's days this timing is valid on, *any or empty supported
|
|
WeekDays string // semicolon separated list of week day names this timing is valid on *any or empty supported
|
|
Time string // String representing the time this timing starts on, *asap supported
|
|
Weight float64 // Binding's weight
|
|
}
|
|
|
|
func (apiv1 *ApierV1) SetActionPlan(attrs AttrSetActionPlan, reply *string) (err error) {
|
|
if missing := utils.MissingStructFields(&attrs, []string{"Id", "ActionPlan"}); len(missing) != 0 {
|
|
return utils.NewErrMandatoryIeMissing(missing...)
|
|
}
|
|
for _, at := range attrs.ActionPlan {
|
|
requiredFields := []string{"ActionsId", "Time", "Weight"}
|
|
if missing := utils.MissingStructFields(at, requiredFields); len(missing) != 0 {
|
|
return fmt.Errorf("%s:Action:%s:%v", utils.ErrMandatoryIeMissing.Error(), at.ActionsId, missing)
|
|
}
|
|
}
|
|
_, err = guardian.Guardian.Guard(func() (interface{}, error) {
|
|
var prevAccountIDs utils.StringMap
|
|
if prevAP, err := apiv1.DataManager.GetActionPlan(attrs.Id, false, utils.NonTransactional); err != nil && err != utils.ErrNotFound {
|
|
return 0, utils.NewErrServerError(err)
|
|
} else if err == nil && !attrs.Overwrite {
|
|
return 0, utils.ErrExists
|
|
} else if prevAP != nil {
|
|
prevAccountIDs = prevAP.AccountIDs
|
|
}
|
|
ap := &engine.ActionPlan{
|
|
Id: attrs.Id,
|
|
}
|
|
for _, apiAtm := range attrs.ActionPlan {
|
|
if exists, err := apiv1.DataManager.HasData(utils.ACTION_PREFIX, apiAtm.ActionsId, ""); err != nil {
|
|
return 0, utils.NewErrServerError(err)
|
|
} else if !exists {
|
|
return 0, fmt.Errorf("%s:%s", utils.ErrBrokenReference.Error(), apiAtm.ActionsId)
|
|
}
|
|
timing := new(engine.RITiming)
|
|
timing.Years.Parse(apiAtm.Years, ";")
|
|
timing.Months.Parse(apiAtm.Months, ";")
|
|
timing.MonthDays.Parse(apiAtm.MonthDays, ";")
|
|
timing.WeekDays.Parse(apiAtm.WeekDays, ";")
|
|
if !verifyFormat(apiAtm.Time) {
|
|
return 0, fmt.Errorf("%s:%s", utils.ErrUnsupportedFormat.Error(), apiAtm.Time)
|
|
}
|
|
timing.StartTime = apiAtm.Time
|
|
ap.ActionTimings = append(ap.ActionTimings, &engine.ActionTiming{
|
|
Uuid: utils.GenUUID(),
|
|
Weight: apiAtm.Weight,
|
|
Timing: &engine.RateInterval{Timing: timing},
|
|
ActionsID: apiAtm.ActionsId,
|
|
})
|
|
}
|
|
if err := apiv1.DataManager.SetActionPlan(ap.Id, ap, true, utils.NonTransactional); err != nil {
|
|
return 0, utils.NewErrServerError(err)
|
|
}
|
|
if err = apiv1.DataManager.CacheDataFromDB(utils.ACTION_PLAN_PREFIX, []string{ap.Id}, true); err != nil {
|
|
return 0, utils.NewErrServerError(err)
|
|
}
|
|
for acntID := range prevAccountIDs {
|
|
if err := apiv1.DataManager.RemAccountActionPlans(acntID, []string{attrs.Id}); err != nil {
|
|
return 0, utils.NewErrServerError(err)
|
|
}
|
|
}
|
|
if len(prevAccountIDs) != 0 {
|
|
if err = apiv1.DataManager.CacheDataFromDB(utils.AccountActionPlansPrefix, prevAccountIDs.Slice(), true); err != nil &&
|
|
err.Error() != utils.ErrNotFound.Error() {
|
|
return 0, utils.NewErrServerError(err)
|
|
}
|
|
}
|
|
return 0, nil
|
|
}, config.CgrConfig().GeneralCfg().LockingTimeout, utils.ACTION_PLAN_PREFIX)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if attrs.ReloadScheduler {
|
|
sched := apiv1.SchedulerService.GetScheduler()
|
|
if sched == nil {
|
|
return errors.New(utils.SchedulerNotRunningCaps)
|
|
}
|
|
sched.Reload()
|
|
}
|
|
//generate a loadID for CacheActionPlans and store it in database
|
|
if err := apiv1.DataManager.SetLoadIDs(map[string]int64{utils.CacheActionPlans: time.Now().UnixNano()}); err != nil {
|
|
return utils.APIErrorHandler(err)
|
|
}
|
|
*reply = utils.OK
|
|
return nil
|
|
}
|
|
|
|
func verifyFormat(tStr string) bool {
|
|
if tStr == utils.EmptyString ||
|
|
tStr == utils.MetaEveryMinute ||
|
|
tStr == utils.MetaHourly ||
|
|
tStr == utils.ASAP {
|
|
return true
|
|
}
|
|
|
|
if len(tStr) > 8 { // hh:mm:ss
|
|
return false
|
|
}
|
|
if a := strings.Split(tStr, utils.InInFieldSep); len(a) != 3 {
|
|
return false
|
|
} else {
|
|
if _, err := strconv.Atoi(a[0]); err != nil {
|
|
return false
|
|
} else if _, err := strconv.Atoi(a[1]); err != nil {
|
|
return false
|
|
} else if _, err := strconv.Atoi(a[2]); err != nil {
|
|
return false
|
|
}
|
|
}
|
|
return true
|
|
}
|
|
|
|
type AttrGetActionPlan struct {
|
|
ID string
|
|
}
|
|
|
|
func (apiv1 *ApierV1) GetActionPlan(attr AttrGetActionPlan, reply *[]*engine.ActionPlan) error {
|
|
var result []*engine.ActionPlan
|
|
if attr.ID == "" || attr.ID == "*" {
|
|
result = make([]*engine.ActionPlan, 0)
|
|
aplsMap, err := apiv1.DataManager.GetAllActionPlans()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
for _, apls := range aplsMap {
|
|
result = append(result, apls)
|
|
}
|
|
} else {
|
|
apls, err := apiv1.DataManager.GetActionPlan(attr.ID, false, utils.NonTransactional)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
result = append(result, apls)
|
|
}
|
|
*reply = result
|
|
return nil
|
|
}
|
|
|
|
func (apiv1 *ApierV1) RemoveActionPlan(attr AttrGetActionPlan, reply *string) (err error) {
|
|
if missing := utils.MissingStructFields(&attr, []string{"ID"}); len(missing) != 0 {
|
|
return utils.NewErrMandatoryIeMissing(missing...)
|
|
}
|
|
if _, err = guardian.Guardian.Guard(func() (interface{}, error) {
|
|
var prevAccountIDs utils.StringMap
|
|
if prevAP, err := apiv1.DataManager.GetActionPlan(attr.ID, false, utils.NonTransactional); err != nil && err != utils.ErrNotFound {
|
|
return 0, err
|
|
} else if prevAP != nil {
|
|
prevAccountIDs = prevAP.AccountIDs
|
|
}
|
|
if err := apiv1.DataManager.RemoveActionPlan(attr.ID, utils.NonTransactional); err != nil {
|
|
return 0, err
|
|
}
|
|
for acntID := range prevAccountIDs {
|
|
if err := apiv1.DataManager.RemAccountActionPlans(acntID, []string{attr.ID}); err != nil {
|
|
return 0, utils.NewErrServerError(err)
|
|
}
|
|
}
|
|
if len(prevAccountIDs) != 0 {
|
|
if err = apiv1.DataManager.CacheDataFromDB(utils.AccountActionPlansPrefix, prevAccountIDs.Slice(), true); err != nil &&
|
|
err.Error() != utils.ErrNotFound.Error() {
|
|
return 0, utils.NewErrServerError(err)
|
|
}
|
|
}
|
|
return 0, nil
|
|
}, config.CgrConfig().GeneralCfg().LockingTimeout, utils.ACTION_PLAN_PREFIX); err != nil {
|
|
return err
|
|
}
|
|
*reply = utils.OK
|
|
return nil
|
|
}
|
|
|
|
// Process dependencies and load a specific AccountActions profile from storDb into dataDb.
|
|
func (apiv1 *ApierV1) LoadAccountActions(attrs utils.TPAccountActions, reply *string) error {
|
|
if len(attrs.TPid) == 0 {
|
|
return utils.NewErrMandatoryIeMissing("TPid")
|
|
}
|
|
dbReader, err := engine.NewTpReader(apiv1.DataManager.DataDB(), apiv1.StorDb,
|
|
attrs.TPid, apiv1.Config.GeneralCfg().DefaultTimezone,
|
|
apiv1.Config.ApierCfg().CachesConns, apiv1.Config.ApierCfg().SchedulerConns)
|
|
if err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
if _, err := guardian.Guardian.Guard(func() (interface{}, error) {
|
|
return 0, dbReader.LoadAccountActionsFiltered(&attrs)
|
|
}, config.CgrConfig().GeneralCfg().LockingTimeout, attrs.LoadId); err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
// ToDo: Get the action keys loaded by dbReader so we reload only these in cache
|
|
// Need to do it before scheduler otherwise actions to run will be unknown
|
|
sched := apiv1.SchedulerService.GetScheduler()
|
|
if sched != nil {
|
|
sched.Reload()
|
|
}
|
|
*reply = utils.OK
|
|
return nil
|
|
}
|
|
|
|
func (apiv1 *ApierV1) LoadTariffPlanFromFolder(attrs utils.AttrLoadTpFromFolder, reply *string) error {
|
|
// verify if FolderPath is present
|
|
if len(attrs.FolderPath) == 0 {
|
|
return fmt.Errorf("%s:%s", utils.ErrMandatoryIeMissing.Error(), "FolderPath")
|
|
}
|
|
// check if exists or is valid
|
|
if fi, err := os.Stat(attrs.FolderPath); err != nil {
|
|
if strings.HasSuffix(err.Error(), "no such file or directory") {
|
|
return utils.ErrInvalidPath
|
|
}
|
|
return utils.NewErrServerError(err)
|
|
} else if !fi.IsDir() {
|
|
return utils.ErrInvalidPath
|
|
}
|
|
|
|
// create the TpReader
|
|
loader, err := engine.NewTpReader(apiv1.DataManager.DataDB(),
|
|
engine.NewFileCSVStorage(utils.CSV_SEP, attrs.FolderPath, attrs.Recursive),
|
|
"", apiv1.Config.GeneralCfg().DefaultTimezone,
|
|
apiv1.Config.ApierCfg().CachesConns, apiv1.Config.ApierCfg().SchedulerConns)
|
|
if err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
//Load the data
|
|
if err := loader.LoadAll(); err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
if attrs.DryRun {
|
|
*reply = utils.OK
|
|
return nil // Mission complete, no errors
|
|
}
|
|
|
|
if attrs.Validate {
|
|
if !loader.IsValid() {
|
|
return errors.New("invalid data")
|
|
}
|
|
}
|
|
|
|
// write data intro Database
|
|
if err := loader.WriteToDatabase(false, false); err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
//verify If Caching is present in arguments
|
|
caching := config.CgrConfig().GeneralCfg().DefaultCaching
|
|
if attrs.Caching != nil {
|
|
caching = *attrs.Caching
|
|
}
|
|
// reload cache
|
|
utils.Logger.Info("ApierV1.LoadTariffPlanFromFolder, reloading cache.")
|
|
if err := loader.ReloadCache(caching, true, attrs.ArgDispatcher); err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
if len(apiv1.Config.ApierCfg().SchedulerConns) != 0 {
|
|
utils.Logger.Info("ApierV1.LoadTariffPlanFromFolder, reloading scheduler.")
|
|
if err := loader.ReloadScheduler(true); err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
}
|
|
// release the reader with it's structures
|
|
loader.Init()
|
|
*reply = utils.OK
|
|
return nil
|
|
}
|
|
|
|
// RemoveTPFromFolder will load the tarrifplan from folder into TpReader object
|
|
// and will delete if from database
|
|
func (apiv1 *ApierV1) RemoveTPFromFolder(attrs utils.AttrLoadTpFromFolder, reply *string) error {
|
|
// verify if FolderPath is present
|
|
if len(attrs.FolderPath) == 0 {
|
|
return fmt.Errorf("%s:%s", utils.ErrMandatoryIeMissing.Error(), "FolderPath")
|
|
}
|
|
// check if exists or is valid
|
|
if fi, err := os.Stat(attrs.FolderPath); err != nil {
|
|
if strings.HasSuffix(err.Error(), "no such file or directory") {
|
|
return utils.ErrInvalidPath
|
|
}
|
|
return utils.NewErrServerError(err)
|
|
} else if !fi.IsDir() {
|
|
return utils.ErrInvalidPath
|
|
}
|
|
|
|
// create the TpReader
|
|
loader, err := engine.NewTpReader(apiv1.DataManager.DataDB(),
|
|
engine.NewFileCSVStorage(utils.CSV_SEP, attrs.FolderPath, attrs.Recursive), "", apiv1.Config.GeneralCfg().DefaultTimezone,
|
|
apiv1.Config.ApierCfg().CachesConns, apiv1.Config.ApierCfg().SchedulerConns)
|
|
if err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
//Load the data
|
|
if err := loader.LoadAll(); err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
if attrs.DryRun {
|
|
*reply = utils.OK
|
|
return nil // Mission complete, no errors
|
|
}
|
|
|
|
if attrs.Validate {
|
|
if !loader.IsValid() {
|
|
return errors.New("invalid data")
|
|
}
|
|
}
|
|
|
|
// remove data from Database
|
|
if err := loader.RemoveFromDatabase(false, false); err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
//verify If Caching is present in arguments
|
|
caching := config.CgrConfig().GeneralCfg().DefaultCaching
|
|
if attrs.Caching != nil {
|
|
caching = *attrs.Caching
|
|
}
|
|
// reload cache
|
|
utils.Logger.Info("ApierV1.RemoveTPFromFolder, reloading cache.")
|
|
if err := loader.ReloadCache(caching, true, attrs.ArgDispatcher); err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
if len(apiv1.Config.ApierCfg().SchedulerConns) != 0 {
|
|
utils.Logger.Info("ApierV1.RemoveTPFromFolder, reloading scheduler.")
|
|
if err := loader.ReloadScheduler(true); err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
}
|
|
// release the reader with it's structures
|
|
loader.Init()
|
|
*reply = utils.OK
|
|
return nil
|
|
}
|
|
|
|
// RemoveTPFromStorDB will load the tarrifplan from StorDB into TpReader object
|
|
// and will delete if from database
|
|
func (apiv1 *ApierV1) RemoveTPFromStorDB(attrs AttrLoadTpFromStorDb, reply *string) error {
|
|
if len(attrs.TPid) == 0 {
|
|
return utils.NewErrMandatoryIeMissing("TPid")
|
|
}
|
|
dbReader, err := engine.NewTpReader(apiv1.DataManager.DataDB(), apiv1.StorDb,
|
|
attrs.TPid, apiv1.Config.GeneralCfg().DefaultTimezone,
|
|
apiv1.Config.ApierCfg().CachesConns, apiv1.Config.ApierCfg().SchedulerConns)
|
|
if err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
if err := dbReader.LoadAll(); err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
if attrs.Validate {
|
|
if !dbReader.IsValid() {
|
|
*reply = utils.OK
|
|
return errors.New("invalid data")
|
|
}
|
|
}
|
|
if attrs.DryRun {
|
|
*reply = utils.OK
|
|
return nil // Mission complete, no errors
|
|
}
|
|
// remove data from Database
|
|
if err := dbReader.RemoveFromDatabase(false, false); err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
//verify If Caching is present in arguments
|
|
caching := config.CgrConfig().GeneralCfg().DefaultCaching
|
|
if attrs.Caching != nil {
|
|
caching = *attrs.Caching
|
|
}
|
|
// reload cache
|
|
utils.Logger.Info("ApierV1.RemoveTPFromStorDB, reloading cache.")
|
|
if err := dbReader.ReloadCache(caching, true, attrs.ArgDispatcher); err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
if len(apiv1.Config.ApierCfg().SchedulerConns) != 0 {
|
|
utils.Logger.Info("ApierV1.RemoveTPFromStorDB, reloading scheduler.")
|
|
if err := dbReader.ReloadScheduler(true); err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
}
|
|
// release the reader with it's structures
|
|
dbReader.Init()
|
|
*reply = utils.OK
|
|
return nil
|
|
}
|
|
|
|
type AttrRemoveRatingProfile struct {
|
|
Direction string
|
|
Tenant string
|
|
Category string
|
|
Subject string
|
|
}
|
|
|
|
func (arrp *AttrRemoveRatingProfile) GetId() (result string) {
|
|
if arrp.Direction != "" && arrp.Direction != utils.ANY {
|
|
result += arrp.Direction
|
|
result += utils.CONCATENATED_KEY_SEP
|
|
} else {
|
|
return
|
|
}
|
|
if arrp.Tenant != "" && arrp.Tenant != utils.ANY {
|
|
result += arrp.Tenant
|
|
result += utils.CONCATENATED_KEY_SEP
|
|
} else {
|
|
return
|
|
}
|
|
|
|
if arrp.Category != "" && arrp.Category != utils.ANY {
|
|
result += arrp.Category
|
|
result += utils.CONCATENATED_KEY_SEP
|
|
} else {
|
|
return
|
|
}
|
|
if arrp.Subject != "" && arrp.Subject != utils.ANY {
|
|
result += arrp.Subject
|
|
}
|
|
return
|
|
}
|
|
|
|
func (apiv1 *ApierV1) RemoveRatingProfile(attr AttrRemoveRatingProfile, reply *string) error {
|
|
if attr.Direction == "" {
|
|
attr.Direction = utils.META_OUT
|
|
}
|
|
if (attr.Subject != "" && utils.IsSliceMember([]string{attr.Direction, attr.Tenant, attr.Category}, "")) ||
|
|
(attr.Category != "" && utils.IsSliceMember([]string{attr.Direction, attr.Tenant}, "")) ||
|
|
attr.Tenant != "" && attr.Direction == "" {
|
|
return utils.ErrMandatoryIeMissing
|
|
}
|
|
_, err := guardian.Guardian.Guard(func() (interface{}, error) {
|
|
return 0, apiv1.DataManager.RemoveRatingProfile(attr.GetId(), utils.NonTransactional)
|
|
}, config.CgrConfig().GeneralCfg().LockingTimeout, "RemoveRatingProfile")
|
|
if err != nil {
|
|
*reply = err.Error()
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
//generate a loadID for CacheActionPlans and store it in database
|
|
if err := apiv1.DataManager.SetLoadIDs(map[string]int64{utils.CacheRatingProfiles: time.Now().UnixNano()}); err != nil {
|
|
return utils.APIErrorHandler(err)
|
|
}
|
|
*reply = utils.OK
|
|
return nil
|
|
}
|
|
|
|
func (apiv1 *ApierV1) GetLoadHistory(attrs utils.Paginator, reply *[]*utils.LoadInstance) error {
|
|
nrItems := -1
|
|
offset := 0
|
|
if attrs.Offset != nil { // For offset we need full data
|
|
offset = *attrs.Offset
|
|
} else if attrs.Limit != nil {
|
|
nrItems = *attrs.Limit
|
|
}
|
|
loadHist, err := apiv1.DataManager.DataDB().GetLoadHistory(nrItems, true, utils.NonTransactional)
|
|
if err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
if attrs.Offset != nil && attrs.Limit != nil { // Limit back to original
|
|
nrItems = *attrs.Limit
|
|
}
|
|
if len(loadHist) == 0 || len(loadHist) <= offset || nrItems == 0 {
|
|
return utils.ErrNotFound
|
|
}
|
|
if offset != 0 {
|
|
nrItems = offset + nrItems
|
|
}
|
|
if nrItems == -1 || nrItems > len(loadHist) { // So we can use it in indexing bellow
|
|
nrItems = len(loadHist)
|
|
}
|
|
*reply = loadHist[offset:nrItems]
|
|
return nil
|
|
}
|
|
|
|
type AttrRemoveActions struct {
|
|
ActionIDs []string
|
|
}
|
|
|
|
func (apiv1 *ApierV1) RemoveActions(attr AttrRemoveActions, reply *string) error {
|
|
if attr.ActionIDs == nil {
|
|
err := utils.ErrNotFound
|
|
*reply = err.Error()
|
|
return err
|
|
}
|
|
// The check could lead to very long execution time. So we decided to leave it at the user's risck.'
|
|
/*
|
|
stringMap := utils.NewStringMap(attr.ActionIDs...)
|
|
keys, err := apiv1.DataManager.DataDB().GetKeysForPrefix(utils.ACTION_TRIGGER_PREFIX, true)
|
|
if err != nil {
|
|
*reply = err.Error()
|
|
return err
|
|
}
|
|
for _, key := range keys {
|
|
getAttrs, err := apiv1.DataManager.DataDB().GetActionTriggers(key[len(utils.ACTION_TRIGGER_PREFIX):])
|
|
if err != nil {
|
|
*reply = err.Error()
|
|
return err
|
|
}
|
|
for _, atr := range getAttrs {
|
|
if _, found := stringMap[atr.ActionsID]; found {
|
|
// found action trigger referencing action; abort
|
|
err := fmt.Errorf("action %s refenced by action trigger %s", atr.ActionsID, atr.ID)
|
|
*reply = err.Error()
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
allAplsMap, err := apiv1.DataManager.GetAllActionPlans()
|
|
if err != nil && err != utils.ErrNotFound {
|
|
*reply = err.Error()
|
|
return err
|
|
}
|
|
for _, apl := range allAplsMap {
|
|
for _, atm := range apl.ActionTimings {
|
|
if _, found := stringMap[atm.ActionsID]; found {
|
|
err := fmt.Errorf("action %s refenced by action plan %s", atm.ActionsID, apl.Id)
|
|
*reply = err.Error()
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
*/
|
|
for _, aID := range attr.ActionIDs {
|
|
if err := apiv1.DataManager.RemoveActions(aID, utils.NonTransactional); err != nil {
|
|
*reply = err.Error()
|
|
return err
|
|
}
|
|
}
|
|
//generate a loadID for CacheActions and store it in database
|
|
if err := apiv1.DataManager.SetLoadIDs(map[string]int64{utils.CacheActions: time.Now().UnixNano()}); err != nil {
|
|
return utils.APIErrorHandler(err)
|
|
}
|
|
*reply = utils.OK
|
|
return nil
|
|
}
|
|
|
|
type ArgsReplyFailedPosts struct {
|
|
FailedRequestsInDir *string // if defined it will be our source of requests to be replayed
|
|
FailedRequestsOutDir *string // if defined it will become our destination for files failing to be replayed, *none to be discarded
|
|
Modules []string // list of modules for which replay the requests, nil for all
|
|
Transports []string // list of transports
|
|
}
|
|
|
|
// ReplayFailedPosts will repost failed requests found in the FailedRequestsInDir
|
|
func (apiv1 *ApierV1) ReplayFailedPosts(args ArgsReplyFailedPosts, reply *string) (err error) {
|
|
failedReqsInDir := apiv1.Config.GeneralCfg().FailedPostsDir
|
|
if args.FailedRequestsInDir != nil && *args.FailedRequestsInDir != "" {
|
|
failedReqsInDir = *args.FailedRequestsInDir
|
|
}
|
|
failedReqsOutDir := failedReqsInDir
|
|
if args.FailedRequestsOutDir != nil && *args.FailedRequestsOutDir != "" {
|
|
failedReqsOutDir = *args.FailedRequestsOutDir
|
|
}
|
|
filesInDir, _ := ioutil.ReadDir(failedReqsInDir)
|
|
if len(filesInDir) == 0 {
|
|
return utils.ErrNotFound
|
|
}
|
|
for _, file := range filesInDir { // First file in directory is the one we need, harder to find it's name out of config
|
|
filePath := path.Join(failedReqsInDir, file.Name())
|
|
ffn, err := utils.NewFallbackFileNameFronString(file.Name())
|
|
if err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
if len(args.Modules) != 0 {
|
|
var allowedModule bool
|
|
for _, mod := range args.Modules {
|
|
if strings.HasPrefix(ffn.Module, mod) {
|
|
allowedModule = true
|
|
break
|
|
}
|
|
}
|
|
if !allowedModule {
|
|
continue // this file is not to be processed due to Modules ACL
|
|
}
|
|
}
|
|
if len(args.Transports) != 0 && !utils.IsSliceMember(args.Transports, ffn.Transport) {
|
|
continue // this file is not to be processed due to Transports ACL
|
|
}
|
|
var fileContent []byte
|
|
_, err = guardian.Guardian.Guard(func() (interface{}, error) {
|
|
if fileContent, err = ioutil.ReadFile(filePath); err != nil {
|
|
return 0, err
|
|
}
|
|
return 0, os.Remove(filePath)
|
|
}, apiv1.Config.GeneralCfg().LockingTimeout, utils.FileLockPrefix+filePath)
|
|
if err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
failoverPath := utils.META_NONE
|
|
if failedReqsOutDir != utils.META_NONE {
|
|
failoverPath = path.Join(failedReqsOutDir, file.Name())
|
|
}
|
|
switch ffn.Transport {
|
|
case utils.MetaHTTPjsonCDR, utils.MetaHTTPjsonMap, utils.MetaHTTPjson, utils.META_HTTP_POST:
|
|
_, err = engine.NewHTTPPoster(apiv1.Config.GeneralCfg().HttpSkipTlsVerify,
|
|
apiv1.Config.GeneralCfg().ReplyTimeout).Post(ffn.Address,
|
|
utils.PosterTransportContentTypes[ffn.Transport], fileContent,
|
|
apiv1.Config.GeneralCfg().PosterAttempts, failoverPath)
|
|
case utils.MetaAMQPjsonCDR, utils.MetaAMQPjsonMap:
|
|
err = engine.PostersCache.PostAMQP(ffn.Address,
|
|
apiv1.Config.GeneralCfg().PosterAttempts, fileContent,
|
|
utils.PosterTransportContentTypes[ffn.Transport],
|
|
failedReqsOutDir, file.Name())
|
|
case utils.MetaAMQPV1jsonMap:
|
|
err = engine.PostersCache.PostAMQPv1(ffn.Address, apiv1.Config.GeneralCfg().PosterAttempts,
|
|
fileContent, failedReqsOutDir, file.Name())
|
|
case utils.MetaSQSjsonMap:
|
|
err = engine.PostersCache.PostSQS(ffn.Address, apiv1.Config.GeneralCfg().PosterAttempts,
|
|
fileContent, failedReqsOutDir, file.Name())
|
|
case utils.MetaKafkajsonMap:
|
|
err = engine.PostersCache.PostKafka(ffn.Address, apiv1.Config.GeneralCfg().PosterAttempts,
|
|
fileContent, failedReqsOutDir, file.Name(), utils.UUIDSha1Prefix())
|
|
case utils.MetaS3jsonMap:
|
|
err = engine.PostersCache.PostS3(ffn.Address, apiv1.Config.GeneralCfg().PosterAttempts,
|
|
fileContent, failedReqsOutDir, file.Name(), utils.UUIDSha1Prefix())
|
|
default:
|
|
err = fmt.Errorf("unsupported replication transport: %s", ffn.Transport)
|
|
}
|
|
if err != nil && failedReqsOutDir != utils.META_NONE { // Got error from HTTPPoster could be that content was not written, we need to write it ourselves
|
|
_, err := guardian.Guardian.Guard(func() (interface{}, error) {
|
|
if _, err := os.Stat(failoverPath); err == nil || !os.IsNotExist(err) {
|
|
return 0, err
|
|
}
|
|
fileOut, err := os.Create(failoverPath)
|
|
if err != nil {
|
|
return 0, err
|
|
}
|
|
_, err = fileOut.Write(fileContent)
|
|
fileOut.Close()
|
|
return 0, err
|
|
}, apiv1.Config.GeneralCfg().LockingTimeout, utils.FileLockPrefix+failoverPath)
|
|
if err != nil {
|
|
return utils.NewErrServerError(err)
|
|
}
|
|
}
|
|
}
|
|
*reply = utils.OK
|
|
return nil
|
|
}
|
|
|
|
// CallCache caching the item based on cacheopt
|
|
// visible in ApierV2
|
|
func (apiv1 *ApierV1) CallCache(cacheOpt string, args utils.ArgsGetCacheItem) (err error) {
|
|
var reply string
|
|
switch cacheOpt {
|
|
case utils.META_NONE:
|
|
return
|
|
case utils.MetaReload:
|
|
if err = apiv1.ConnMgr.Call(apiv1.Config.ApierCfg().CachesConns, nil,
|
|
utils.CacheSv1ReloadCache, utils.AttrReloadCacheWithArgDispatcher{
|
|
AttrReloadCache: composeArgsReload(args)}, &reply); err != nil {
|
|
return err
|
|
}
|
|
case utils.MetaLoad:
|
|
if err = apiv1.ConnMgr.Call(apiv1.Config.ApierCfg().CachesConns, nil,
|
|
utils.CacheSv1LoadCache, utils.AttrReloadCacheWithArgDispatcher{
|
|
AttrReloadCache: composeArgsReload(args)}, &reply); err != nil {
|
|
return err
|
|
}
|
|
case utils.MetaRemove:
|
|
if err = apiv1.ConnMgr.Call(apiv1.Config.ApierCfg().CachesConns, nil,
|
|
utils.CacheSv1RemoveItem,
|
|
&utils.ArgsGetCacheItemWithArgDispatcher{ArgsGetCacheItem: args}, &reply); err != nil {
|
|
return err
|
|
}
|
|
case utils.MetaClear:
|
|
if err = apiv1.ConnMgr.Call(apiv1.Config.ApierCfg().CachesConns, nil,
|
|
utils.CacheSv1FlushCache, utils.AttrReloadCacheWithArgDispatcher{
|
|
AttrReloadCache: composeArgsReload(args)}, &reply); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return
|
|
}
|
|
|
|
func (apiv1 *ApierV1) GetLoadIDs(args string, reply *map[string]int64) (err error) {
|
|
if loadIDs, err := apiv1.DataManager.GetItemLoadIDs(args, false); err != nil {
|
|
return err
|
|
} else {
|
|
*reply = loadIDs
|
|
}
|
|
return
|
|
}
|
|
|
|
type LoadTimeArgs struct {
|
|
Timezone string
|
|
Item string
|
|
}
|
|
|
|
func (apiv1 *ApierV1) GetLoadTimes(args LoadTimeArgs, reply *map[string]string) (err error) {
|
|
if loadIDs, err := apiv1.DataManager.GetItemLoadIDs(args.Item, false); err != nil {
|
|
return err
|
|
} else {
|
|
provMp := make(map[string]string)
|
|
for key, val := range loadIDs {
|
|
timeVal, err := utils.ParseTimeDetectLayout(strconv.FormatInt(val, 10), args.Timezone)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
provMp[key] = timeVal.String()
|
|
}
|
|
*reply = provMp
|
|
}
|
|
return
|
|
}
|
|
|
|
func (apiv1 *ApierV1) ComputeActionPlanIndexes(_ string, reply *string) (err error) {
|
|
if apiv1.DataManager.DataDB().GetStorageType() != utils.REDIS {
|
|
return utils.ErrNotImplemented
|
|
}
|
|
redisDB, can := apiv1.DataManager.DataDB().(*engine.RedisStorage)
|
|
if !can {
|
|
return fmt.Errorf("Storage type %s could not be cated to <*engine.RedisStorage>", apiv1.DataManager.DataDB().GetStorageType())
|
|
}
|
|
if err = redisDB.RebbuildActionPlanKeys(); err != nil {
|
|
return err
|
|
}
|
|
*reply = utils.OK
|
|
return nil
|
|
}
|
|
|
|
// GetActionPlanIDs returns list of ActionPlan IDs registered for a tenant
|
|
func (apiv1 *ApierV1) GetActionPlanIDs(args utils.TenantArgWithPaginator, attrPrfIDs *[]string) error {
|
|
prfx := utils.ACTION_PLAN_PREFIX
|
|
keys, err := apiv1.DataManager.DataDB().GetKeysForPrefix(utils.ACTION_PLAN_PREFIX)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if len(keys) == 0 {
|
|
return utils.ErrNotFound
|
|
}
|
|
retIDs := make([]string, len(keys))
|
|
for i, key := range keys {
|
|
retIDs[i] = key[len(prfx):]
|
|
}
|
|
*attrPrfIDs = args.PaginateStringSlice(retIDs)
|
|
return nil
|
|
}
|
|
|
|
// GetRatingPlanIDs returns list of RatingPlan IDs registered for a tenant
|
|
func (apiv1 *ApierV1) GetRatingPlanIDs(args utils.TenantArgWithPaginator, attrPrfIDs *[]string) error {
|
|
prfx := utils.RATING_PLAN_PREFIX
|
|
keys, err := apiv1.DataManager.DataDB().GetKeysForPrefix(utils.RATING_PLAN_PREFIX)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if len(keys) == 0 {
|
|
return utils.ErrNotFound
|
|
}
|
|
retIDs := make([]string, len(keys))
|
|
for i, key := range keys {
|
|
retIDs[i] = key[len(prfx):]
|
|
}
|
|
*attrPrfIDs = args.PaginateStringSlice(retIDs)
|
|
return nil
|
|
}
|
|
|
|
// ListenAndServe listen for storbd reload
|
|
func (apiv1 *ApierV1) ListenAndServe(stopChan chan struct{}) (err error) {
|
|
for {
|
|
select {
|
|
case <-stopChan:
|
|
return
|
|
case stordb, ok := <-apiv1.StorDBChan:
|
|
if !ok { // the chanel was closed by the shutdown of stordbService
|
|
return
|
|
}
|
|
apiv1.CdrDb = stordb
|
|
apiv1.StorDb = stordb
|
|
}
|
|
}
|
|
}
|