ws_packageprocessService.cpp 41 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061
  1. /*##############################################################################
  2. HPCC SYSTEMS software Copyright (C) 2012 HPCC Systems.
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. ############################################################################## */
  13. #pragma warning (disable : 4786)
  14. #include "ws_packageprocessService.hpp"
  15. #include "daclient.hpp"
  16. #include "dalienv.hpp"
  17. #include "dadfs.hpp"
  18. #include "dfuutil.hpp"
  19. #include "ws_fs.hpp"
  20. #include "ws_workunits.hpp"
  21. #include "packageprocess_errors.h"
  22. #include "referencedfilelist.hpp"
  23. #include "package.h"
  24. #define SDS_LOCK_TIMEOUT (5*60*1000) // 5mins, 30s a bit short
  25. void CWsPackageProcessEx::init(IPropertyTree *cfg, const char *process, const char *service)
  26. {
  27. }
  28. bool CWsPackageProcessEx::onEcho(IEspContext &context, IEspEchoRequest &req, IEspEchoResponse &resp)
  29. {
  30. StringBuffer respMsg;
  31. ISecUser* user = context.queryUser();
  32. if(user != NULL)
  33. {
  34. const char* name = user->getName();
  35. if (name && *name)
  36. respMsg.appendf("%s: ", name);
  37. }
  38. const char* reqMsg = req.getRequest();
  39. if (reqMsg && *reqMsg)
  40. respMsg.append(reqMsg);
  41. else
  42. respMsg.append("??");
  43. resp.setResponse(respMsg.str());
  44. return true;
  45. }
  46. inline StringBuffer &buildPkgSetId(StringBuffer &id, const char *process)
  47. {
  48. if (!process || !*process)
  49. process = "*";
  50. return id.append("default_").append(process).replace('*', '#').replace('?', '~');
  51. }
  52. IPropertyTree *getPkgSetRegistry(const char *process, bool readonly)
  53. {
  54. Owned<IRemoteConnection> globalLock = querySDS().connect("/PackageSets/", myProcessSession(), RTM_LOCK_WRITE|RTM_CREATE_QUERY, SDS_LOCK_TIMEOUT);
  55. if (!globalLock)
  56. throw MakeStringException(PKG_DALI_LOOKUP_ERROR, "Unable to connect to PackageSet information in dali /PackageSets");
  57. IPropertyTree *pkgSets = globalLock->queryRoot();
  58. if (!pkgSets)
  59. throw MakeStringException(PKG_DALI_LOOKUP_ERROR, "Unable to open PackageSet information in dali /PackageSets");
  60. if (!process || !*process)
  61. process = "*";
  62. StringBuffer id;
  63. buildPkgSetId(id, process);
  64. //Only lock the branch for the target we're interested in.
  65. VStringBuffer xpath("/PackageSets/PackageSet[@id='%s']", id.str());
  66. Owned<IRemoteConnection> conn = querySDS().connect(xpath.str(), myProcessSession(), readonly ? RTM_LOCK_READ : RTM_LOCK_WRITE, SDS_LOCK_TIMEOUT);
  67. if (!conn)
  68. {
  69. if (readonly)
  70. return NULL;
  71. Owned<IPropertyTree> pkgSet = createPTree();
  72. pkgSet->setProp("@id", id.str());
  73. pkgSet->setProp("@process", process);
  74. pkgSets->addPropTree("PackageSet", pkgSet.getClear());
  75. globalLock->commit();
  76. conn.setown(querySDS().connect(xpath.str(), myProcessSession(), RTM_LOCK_WRITE, SDS_LOCK_TIMEOUT));
  77. }
  78. return (conn) ? conn->getRoot() : NULL;
  79. }
  80. ////////////////////////////////////////////////////////////////////////////////////////
  81. const unsigned roxieQueryRoxieTimeOut = 60000;
  82. #define SDS_LOCK_TIMEOUT (5*60*1000) // 5mins, 30s a bit short
  83. bool isFileKnownOnCluster(const char *logicalname, IConstWUClusterInfo *clusterInfo, IUserDescriptor* userdesc)
  84. {
  85. Owned<IDistributedFile> dst = queryDistributedFileDirectory().lookup(logicalname, userdesc, true);
  86. if (dst)
  87. {
  88. SCMStringBuffer processName;
  89. clusterInfo->getRoxieProcess(processName);
  90. if (dst->findCluster(processName.str()) != NotFound)
  91. return true; // file already known for this cluster
  92. }
  93. return false;
  94. }
  95. bool isFileKnownOnCluster(const char *logicalname, const char *target, IUserDescriptor* userdesc)
  96. {
  97. Owned<IConstWUClusterInfo> clusterInfo = getTargetClusterInfo(target);
  98. if (!clusterInfo)
  99. throw MakeStringException(PKG_TARGET_NOT_DEFINED, "Could not find information about target cluster %s ", target);
  100. return isFileKnownOnCluster(logicalname, clusterInfo, userdesc);
  101. }
  102. void cloneFileInfoToDali(StringArray &notFound, IPropertyTree *packageMap, const char *lookupDaliIp, IConstWUClusterInfo *dstInfo, const char *srcCluster, const char *remotePrefix, bool overWrite, IUserDescriptor* userdesc, bool allowForeignFiles)
  103. {
  104. StringBuffer user;
  105. StringBuffer password;
  106. if (userdesc)
  107. {
  108. userdesc->getUserName(user);
  109. userdesc->getPassword(password);
  110. }
  111. Owned<IReferencedFileList> wufiles = createReferencedFileList(user, password, allowForeignFiles);
  112. wufiles->addFilesFromPackageMap(packageMap);
  113. SCMStringBuffer processName;
  114. dstInfo->getRoxieProcess(processName);
  115. wufiles->resolveFiles(processName.str(), lookupDaliIp, remotePrefix, srcCluster, !overWrite, false);
  116. Owned<IDFUhelper> helper = createIDFUhelper();
  117. wufiles->cloneAllInfo(helper, overWrite, true);
  118. Owned<IReferencedFileIterator> iter = wufiles->getFiles();
  119. ForEach(*iter)
  120. {
  121. IReferencedFile &item = iter->query();
  122. if (item.getFlags() & (RefFileNotFound | RefFileNotOnSource))
  123. notFound.append(item.getLogicalName());
  124. }
  125. }
  126. void cloneFileInfoToDali(StringArray &notFound, IPropertyTree *packageMap, const char *lookupDaliIp, const char *dstCluster, const char *srcCluster, const char *prefix, bool overWrite, IUserDescriptor* userdesc, bool allowForeignFiles)
  127. {
  128. Owned<IConstWUClusterInfo> clusterInfo = getTargetClusterInfo(dstCluster);
  129. if (!clusterInfo)
  130. throw MakeStringException(PKG_TARGET_NOT_DEFINED, "Could not find information about target cluster %s ", dstCluster);
  131. cloneFileInfoToDali(notFound, packageMap, lookupDaliIp, clusterInfo, srcCluster, prefix, overWrite, userdesc, allowForeignFiles);
  132. }
  133. void makePackageActive(IPropertyTree *pkgSetRegistry, IPropertyTree *pkgSetTree, const char *target, bool activate)
  134. {
  135. if (activate)
  136. {
  137. VStringBuffer xpath("PackageMap[@querySet='%s'][@active='1']", target);
  138. Owned<IPropertyTreeIterator> iter = pkgSetRegistry->getElements(xpath.str());
  139. ForEach(*iter)
  140. iter->query().setPropBool("@active", false);
  141. }
  142. pkgSetTree->setPropBool("@active", activate);
  143. }
  144. //////////////////////////////////////////////////////////
  145. void addPackageMapInfo(StringArray &filesNotFound, IPropertyTree *pkgSetRegistry, const char *target, const char *pmid, const char *packageSetName, const char *lookupDaliIp, const char *srcCluster, const char *prefix, IPropertyTree *packageInfo, bool activate, bool overWrite, IUserDescriptor* userdesc, bool allowForeignFiles)
  146. {
  147. if (srcCluster && *srcCluster)
  148. {
  149. if (!isProcessCluster(lookupDaliIp, srcCluster))
  150. throw MakeStringException(PKG_INVALID_CLUSTER_TYPE, "Process cluster %s not found on %s DALI", srcCluster, lookupDaliIp ? lookupDaliIp : "local");
  151. }
  152. Owned<IRemoteConnection> globalLock = querySDS().connect("/PackageMaps/", myProcessSession(), RTM_LOCK_WRITE|RTM_CREATE_QUERY, SDS_LOCK_TIMEOUT);
  153. StringBuffer lcPmid(pmid);
  154. pmid = lcPmid.toLowerCase().str();
  155. VStringBuffer xpath("PackageMap[@id='%s']", pmid);
  156. IPropertyTree *pkgRegTree = pkgSetRegistry->queryPropTree(xpath.str());
  157. IPropertyTree *root = globalLock->queryRoot();
  158. IPropertyTree *mapTree = root->queryPropTree(xpath);
  159. if (!overWrite && (pkgRegTree || mapTree))
  160. throw MakeStringException(PKG_NAME_EXISTS, "Package name %s already exists, either delete it or specify overwrite", pmid);
  161. if (mapTree)
  162. root->removeTree(mapTree);
  163. if (pkgRegTree)
  164. pkgSetRegistry->removeTree(pkgRegTree);
  165. mapTree = root->addPropTree("PackageMap", createPTree());
  166. Owned<IAttributeIterator> attributes = packageInfo->getAttributes();
  167. ForEach(*attributes)
  168. mapTree->setProp(attributes->queryName(), attributes->queryValue());
  169. mapTree->setProp("@id", pmid);
  170. Owned<IConstWUClusterInfo> clusterInfo = getTargetClusterInfo(target);
  171. if (!clusterInfo)
  172. throw MakeStringException(PKG_TARGET_NOT_DEFINED, "Could not find information about target cluster %s ", target);
  173. IPropertyTree *baseInfo = createPTree();
  174. Owned<IPropertyTreeIterator> iter = packageInfo->getElements("Package");
  175. ForEach(*iter)
  176. {
  177. IPropertyTree &item = iter->query();
  178. Owned<IPropertyTreeIterator> super_iter = item.getElements("SuperFile");
  179. if (super_iter->first())
  180. {
  181. ForEach(*super_iter)
  182. {
  183. IPropertyTree &supertree = super_iter->query();
  184. StringBuffer lc(supertree.queryProp("@id"));
  185. const char *id = lc.toLowerCase().str();
  186. if (*id == '~')
  187. id++;
  188. supertree.setProp("@id", id);
  189. Owned<IPropertyTreeIterator> sub_iter = supertree.getElements("SubFile");
  190. ForEach(*sub_iter)
  191. {
  192. IPropertyTree &subtree = sub_iter->query();
  193. const char *subid = subtree.queryProp("@value");
  194. if (subid && *subid == '~')
  195. {
  196. StringAttr value(subid+1);
  197. subtree.setProp("@value", value.get());
  198. }
  199. }
  200. }
  201. mapTree->addPropTree("Package", LINK(&item));
  202. }
  203. else
  204. {
  205. baseInfo->addPropTree("Package", LINK(&item));
  206. }
  207. }
  208. mergePTree(mapTree, baseInfo);
  209. cloneFileInfoToDali(filesNotFound, mapTree, lookupDaliIp, clusterInfo, srcCluster, prefix, overWrite, userdesc, allowForeignFiles);
  210. globalLock->commit();
  211. IPropertyTree *pkgSetTree = pkgSetRegistry->addPropTree("PackageMap", createPTree("PackageMap"));
  212. pkgSetTree->setProp("@id", pmid);
  213. pkgSetTree->setProp("@querySet", target);
  214. makePackageActive(pkgSetRegistry, pkgSetTree, target, activate);
  215. }
  216. void getPackageListInfo(IPropertyTree *mapTree, IEspPackageListMapData *pkgList)
  217. {
  218. pkgList->setId(mapTree->queryProp("@id"));
  219. pkgList->setTarget(mapTree->queryProp("@querySet"));
  220. Owned<IPropertyTreeIterator> iter = mapTree->getElements("Package");
  221. IArrayOf<IConstPackageListData> results;
  222. ForEach(*iter)
  223. {
  224. IPropertyTree &item = iter->query();
  225. Owned<IEspPackageListData> res = createPackageListData("", "");
  226. res->setId(item.queryProp("@id"));
  227. if (item.hasProp("@queries"))
  228. res->setQueries(item.queryProp("@queries"));
  229. results.append(*res.getClear());
  230. }
  231. pkgList->setPkgListData(results);
  232. }
  233. void getAllPackageListInfo(IPropertyTree *mapTree, StringBuffer &info)
  234. {
  235. info.append("<PackageMap id='").append(mapTree->queryProp("@id")).append("'");
  236. Owned<IPropertyTreeIterator> iter = mapTree->getElements("Package");
  237. ForEach(*iter)
  238. {
  239. IPropertyTree &item = iter->query();
  240. info.append("<Package id='").append(item.queryProp("@id")).append("'");
  241. if (item.hasProp("@queries"))
  242. info.append(" queries='").append(item.queryProp("@queries")).append("'");
  243. info.append("></Package>");
  244. }
  245. info.append("</PackageMap>");
  246. }
  247. void listPkgInfo(double version, const char *target, const char *process, IPropertyTree* pkgSetRegistry, IArrayOf<IConstPackageListMapData>* results)
  248. {
  249. Owned<IRemoteConnection> globalLock = querySDS().connect("/PackageMaps/", myProcessSession(), RTM_LOCK_WRITE|RTM_CREATE_QUERY, SDS_LOCK_TIMEOUT);
  250. if (!globalLock)
  251. throw MakeStringException(PKG_DALI_LOOKUP_ERROR, "Unable to retrieve package information from dali /PackageMaps");
  252. IPropertyTree *root = globalLock->queryRoot();
  253. StringBuffer xpath("PackageMap");
  254. if (target && *target)
  255. xpath.appendf("[@querySet='%s']", target);
  256. Owned<IPropertyTreeIterator> iter = pkgSetRegistry->getElements(xpath.str());
  257. ForEach(*iter)
  258. {
  259. IPropertyTree &item = iter->query();
  260. const char *id = item.queryProp("@id");
  261. if (id)
  262. {
  263. StringBuffer xpath;
  264. xpath.append("PackageMap[@id='").append(id).append("']");
  265. IPropertyTree *mapTree = root->queryPropTree(xpath);
  266. if (!mapTree)
  267. continue;
  268. Owned<IEspPackageListMapData> res = createPackageListMapData("", "");
  269. res->setActive(item.getPropBool("@active"));
  270. if (process && *process && (version >= 1.01))
  271. res->setProcess(process);
  272. getPackageListInfo(mapTree, res);
  273. if (target && *target)
  274. res->setTarget(target);
  275. else
  276. res->setTarget(item.queryProp("@querySet"));
  277. results->append(*res.getClear());
  278. }
  279. }
  280. }
  281. void listPkgInfo(double version, const char *target, const char *process, IArrayOf<IConstPackageListMapData>* results)
  282. {
  283. Owned<IPropertyTree> pkgSetRegistry = getPkgSetRegistry((process && *process) ? process : "*", true);
  284. if (pkgSetRegistry) //will be NULL if no package map
  285. {
  286. listPkgInfo(version, target, process, pkgSetRegistry, results);
  287. }
  288. }
  289. void getPkgInfo(const char *target, const char *process, StringBuffer &info)
  290. {
  291. Owned<IRemoteConnection> globalLock = querySDS().connect("/PackageMaps/", myProcessSession(), RTM_LOCK_WRITE|RTM_CREATE_QUERY, SDS_LOCK_TIMEOUT);
  292. if (!globalLock)
  293. throw MakeStringException(PKG_DALI_LOOKUP_ERROR, "Unable to retrieve package information from dali /PackageMaps");
  294. IPropertyTree *root = globalLock->queryRoot();
  295. Owned<IPropertyTree> tree = createPTree("PackageMaps");
  296. Owned<IPropertyTree> pkgSetRegistry = getPkgSetRegistry(process, true);
  297. if (!pkgSetRegistry)
  298. {
  299. toXML(tree, info);
  300. return;
  301. }
  302. StringBuffer xpath("PackageMap[@active='1']");
  303. if (target && *target)
  304. xpath.appendf("[@querySet='%s']", target);
  305. Owned<IPropertyTreeIterator> iter = pkgSetRegistry->getElements(xpath.str());
  306. ForEach(*iter)
  307. {
  308. IPropertyTree &item = iter->query();
  309. const char *id = item.queryProp("@id");
  310. if (id)
  311. {
  312. StringBuffer xpath;
  313. xpath.append("PackageMap[@id='").append(id).append("']");
  314. IPropertyTree *mapTree = root->queryPropTree(xpath);
  315. if (mapTree)
  316. mergePTree(tree, mapTree);
  317. }
  318. }
  319. toXML(tree, info);
  320. }
  321. bool deletePkgInfo(const char *name, const char *target, const char *process, bool globalScope)
  322. {
  323. Owned<IRemoteConnection> pkgSetsConn = querySDS().connect("/PackageSets/", myProcessSession(), RTM_LOCK_WRITE, SDS_LOCK_TIMEOUT);
  324. if (!pkgSetsConn)
  325. throw MakeStringException(PKG_NONE_DEFINED, "No package sets defined");
  326. IPropertyTree* packageSets = pkgSetsConn->queryRoot();
  327. StringBuffer pkgSetId;
  328. buildPkgSetId(pkgSetId, process);
  329. VStringBuffer pkgSet_xpath("PackageSet[@id='%s']", pkgSetId.str());
  330. IPropertyTree *pkgSetRegistry = packageSets->queryPropTree(pkgSet_xpath.str());
  331. if (!pkgSetRegistry)
  332. throw MakeStringException(PKG_TARGET_NOT_DEFINED, "No package sets defined for %s", process);
  333. StringBuffer lcTarget(target);
  334. target = lcTarget.toLowerCase().str();
  335. StringBuffer lcName(name);
  336. name = lcName.toLowerCase().str();
  337. IPropertyTree *mapEntry = NULL;
  338. StringBuffer xpath;
  339. if (!globalScope)
  340. {
  341. xpath.appendf("PackageMap[@id='%s::%s'][@querySet='%s']", target, name, target);
  342. mapEntry = pkgSetRegistry->getPropTree(xpath.str());
  343. }
  344. if (!mapEntry)
  345. {
  346. xpath.clear().appendf("PackageMap[@id='%s'][@querySet='%s']", name, target);
  347. mapEntry = pkgSetRegistry->getPropTree(xpath.str());
  348. if (!mapEntry)
  349. throw MakeStringException(PKG_DELETE_NOT_FOUND, "Unable to delete %s - information not found", lcName.str());
  350. }
  351. StringAttr pmid(mapEntry->queryProp("@id"));
  352. pkgSetRegistry->removeTree(mapEntry);
  353. xpath.clear().appendf("PackageSet/PackageMap[@id='%s']", pmid.get());
  354. if (!packageSets->hasProp(xpath))
  355. {
  356. Owned<IRemoteConnection> pkgMapsConn = querySDS().connect("/PackageMaps/", myProcessSession(), RTM_LOCK_WRITE, SDS_LOCK_TIMEOUT);
  357. if (!pkgMapsConn)
  358. throw MakeStringException(PKG_DALI_LOOKUP_ERROR, "Unable to retrieve PackageMaps information from dali [/PackageMaps]");
  359. IPropertyTree *pkgMaps = pkgMapsConn->queryRoot();
  360. if (!pkgMaps)
  361. throw MakeStringException(PKG_DALI_LOOKUP_ERROR, "Unable to retrieve PackageMaps information from dali [/PackageMaps]");
  362. IPropertyTree *mapTree = pkgMaps->getPropTree(xpath.clear().appendf("PackageMap[@id='%s']", pmid.get()).str());
  363. if (mapTree)
  364. pkgMaps->removeTree(mapTree);
  365. }
  366. return true;
  367. }
  368. void activatePackageMapInfo(const char *target, const char *name, const char *process, bool globalScope, bool activate)
  369. {
  370. if (!target || !*target)
  371. throw MakeStringExceptionDirect(PKG_TARGET_NOT_DEFINED, "No target defined");
  372. if (!name || !*name)
  373. throw MakeStringExceptionDirect(PKG_MISSING_PARAM, "No pmid specified");
  374. Owned<IRemoteConnection> globalLock = querySDS().connect("PackageSets", myProcessSession(), RTM_LOCK_WRITE|RTM_CREATE_QUERY, SDS_LOCK_TIMEOUT);
  375. if (!globalLock)
  376. throw MakeStringException(PKG_DALI_LOOKUP_ERROR, "Unable to retrieve PackageSets information from dali /PackageSets");
  377. StringBuffer lcTarget(target);
  378. target = lcTarget.toLowerCase().str();
  379. StringBuffer lcName(name);
  380. name = lcName.toLowerCase().str();
  381. IPropertyTree *root = globalLock->queryRoot();
  382. if (!root)
  383. throw MakeStringException(PKG_ACTIVATE_NOT_FOUND, "Unable to retrieve PackageSet information");
  384. StringBuffer pkgSetId;
  385. buildPkgSetId(pkgSetId, process);
  386. VStringBuffer xpath("PackageSet[@id='%s']", pkgSetId.str());
  387. IPropertyTree *pkgSetTree = root->queryPropTree(xpath);
  388. if (pkgSetTree)
  389. {
  390. IPropertyTree *mapTree = NULL;
  391. if (!globalScope)
  392. {
  393. xpath.clear().appendf("PackageMap[@querySet='%s'][@id='%s::%s']", target, target, name);
  394. mapTree = pkgSetTree->queryPropTree(xpath);
  395. }
  396. if (!mapTree)
  397. {
  398. xpath.clear().appendf("PackageMap[@querySet='%s'][@id='%s']", target, name);
  399. mapTree = pkgSetTree->queryPropTree(xpath);
  400. }
  401. if (!mapTree)
  402. throw MakeStringException(PKG_ACTIVATE_NOT_FOUND, "PackageMap %s not found on target %s", name, target);
  403. makePackageActive(pkgSetTree, mapTree, target, activate);
  404. }
  405. }
  406. bool CWsPackageProcessEx::readPackageMapString(const char *packageMapString, StringBuffer &target, StringBuffer &process, StringBuffer &packageMap)
  407. {
  408. if (!packageMapString || !*packageMapString)
  409. return false;
  410. StringArray plist;
  411. plist.appendListUniq(packageMapString, ",");
  412. if (plist.length() < 3)
  413. return false;
  414. target.set(plist.item(0));
  415. process.set(plist.item(1));
  416. packageMap.set(plist.item(2));
  417. if (!target.length() || !packageMap.length())
  418. return false;
  419. return true;
  420. }
  421. void CWsPackageProcessEx::getPkgInfoById(const char *packageMapId, IPropertyTree* tree)
  422. {
  423. if (!packageMapId || !*packageMapId)
  424. return;
  425. Owned<IRemoteConnection> globalLock = querySDS().connect("/PackageMaps/", myProcessSession(), RTM_LOCK_WRITE|RTM_CREATE_QUERY, SDS_LOCK_TIMEOUT);
  426. if (!globalLock)
  427. throw MakeStringException(PKG_DALI_LOOKUP_ERROR, "Unable to retrieve package information from dali /PackageMaps");
  428. StringBuffer xpath;
  429. xpath.append("PackageMap[@id='").append(packageMapId).append("']");
  430. IPropertyTree *root = globalLock->queryRoot();
  431. IPropertyTree *mapTree = root->queryPropTree(xpath);
  432. if (mapTree)
  433. mergePTree(tree, mapTree);
  434. }
  435. bool CWsPackageProcessEx::onAddPackage(IEspContext &context, IEspAddPackageRequest &req, IEspAddPackageResponse &resp)
  436. {
  437. resp.updateStatus().setCode(0);
  438. StringAttr target(req.getTarget());
  439. StringAttr name(req.getPackageMap());
  440. if (target.isEmpty())
  441. throw MakeStringExceptionDirect(PKG_MISSING_PARAM, "Target cluster parameter required");
  442. if (name.isEmpty())
  443. throw MakeStringExceptionDirect(PKG_MISSING_PARAM, "PackageMap name parameter required");
  444. StringBuffer pmid;
  445. if (!req.getGlobalScope())
  446. pmid.append(target).append("::");
  447. pmid.append(name.get());
  448. StringBuffer info(req.getInfo());
  449. bool activate = req.getActivate();
  450. bool overWrite = req.getOverWrite();
  451. StringAttr processName(req.getProcess());
  452. Owned<IUserDescriptor> userdesc;
  453. const char *user = context.queryUserId();
  454. const char *password = context.queryPassword();
  455. if (user && *user && *password && *password)
  456. {
  457. userdesc.setown(createUserDescriptor());
  458. userdesc->set(user, password);
  459. }
  460. StringBuffer srcCluster;
  461. StringBuffer daliip;
  462. StringBuffer prefix;
  463. splitDerivedDfsLocation(req.getDaliIp(), srcCluster, daliip, prefix, req.getSourceProcess(), req.getSourceProcess(), NULL, NULL);
  464. Owned<IPropertyTree> packageTree = createPTreeFromXMLString(info.str());
  465. Owned<IPropertyTree> pkgSetRegistry = getPkgSetRegistry(processName.get(), false);
  466. StringArray filesNotFound;
  467. StringBuffer pkgSetId;
  468. buildPkgSetId(pkgSetId, processName.get());
  469. addPackageMapInfo(filesNotFound, pkgSetRegistry, target.get(), pmid.str(), pkgSetId.str(), daliip.str(), srcCluster.str(), prefix.str(), LINK(packageTree), activate, overWrite, userdesc, req.getAllowForeignFiles());
  470. resp.setFilesNotFound(filesNotFound);
  471. StringBuffer msg;
  472. msg.append("Successfully loaded ").append(name.get());
  473. resp.updateStatus().setDescription(msg.str());
  474. return true;
  475. }
  476. void CWsPackageProcessEx::deletePackage(const char *packageMap, const char *target, const char *process, bool globalScope, StringBuffer &returnMsg, int &returnCode)
  477. {
  478. bool ret = deletePkgInfo(packageMap, target, process, globalScope);
  479. (ret) ? returnMsg.append("Successfully ") : returnMsg.append("Unsuccessfully ");
  480. returnMsg.append("deleted ").append(packageMap).append(" from ").append(target).append(";");
  481. if (!ret)
  482. returnCode = -1;
  483. return;
  484. }
  485. bool CWsPackageProcessEx::onDeletePackage(IEspContext &context, IEspDeletePackageRequest &req, IEspDeletePackageResponse &resp)
  486. {
  487. int returnCode = 0;
  488. StringBuffer returnMsg;
  489. IArrayOf<IConstPackageMapEntry>& packageMaps = req.getPackageMaps();
  490. ForEachItemIn(p, packageMaps)
  491. {
  492. IConstPackageMapEntry& item=packageMaps.item(p);
  493. if (!item.getId() || !*item.getId())
  494. {
  495. returnMsg.appendf("PackageMap[%d]: Package map Id not specified; ", p);
  496. continue;
  497. }
  498. if (!item.getTarget() || !*item.getTarget())
  499. {
  500. returnMsg.appendf("PackageMap[%d]: Target not specified;", p);
  501. continue;
  502. }
  503. StringBuffer target, processName, packageMap;
  504. packageMap.set(item.getId());
  505. target.set(item.getTarget());
  506. if (!item.getProcess() || !*item.getProcess())
  507. processName.set("*");
  508. else
  509. processName.set(item.getProcess());
  510. deletePackage(packageMap.str(), target.str(), processName.str(), req.getGlobalScope(), returnMsg, returnCode);
  511. }
  512. if (!packageMaps.length())
  513. {
  514. StringAttr pkgMap(req.getPackageMap());
  515. StringAttr processName(req.getProcess());
  516. if (!processName.length())
  517. processName.set("*");
  518. deletePackage(pkgMap.get(), req.getTarget(), processName.get(), req.getGlobalScope(), returnMsg, returnCode);
  519. }
  520. resp.updateStatus().setDescription(returnMsg.str());
  521. resp.updateStatus().setCode(returnCode);
  522. return true;
  523. }
  524. bool CWsPackageProcessEx::onActivatePackage(IEspContext &context, IEspActivatePackageRequest &req, IEspActivatePackageResponse &resp)
  525. {
  526. resp.updateStatus().setCode(0);
  527. activatePackageMapInfo(req.getTarget(), req.getPackageMap(), req.getProcess(), req.getGlobalScope(), true);
  528. return true;
  529. }
  530. bool CWsPackageProcessEx::onDeActivatePackage(IEspContext &context, IEspDeActivatePackageRequest &req, IEspDeActivatePackageResponse &resp)
  531. {
  532. resp.updateStatus().setCode(0);
  533. activatePackageMapInfo(req.getTarget(), req.getPackageMap(), req.getProcess(), req.getGlobalScope(), false);
  534. return true;
  535. }
  536. bool CWsPackageProcessEx::onListPackage(IEspContext &context, IEspListPackageRequest &req, IEspListPackageResponse &resp)
  537. {
  538. resp.updateStatus().setCode(0);
  539. IArrayOf<IConstPackageListMapData> results;
  540. StringAttr process(req.getProcess());
  541. listPkgInfo(context.getClientVersion(), req.getTarget(), process.length() ? process.get() : "*", &results);
  542. resp.setPkgListMapData(results);
  543. return true;
  544. }
  545. bool CWsPackageProcessEx::onListPackages(IEspContext &context, IEspListPackagesRequest &req, IEspListPackagesResponse &resp)
  546. {
  547. double version = context.getClientVersion();
  548. const char* targetReq = req.getTarget();
  549. const char* processReq = req.getProcess();
  550. const char* processFilterReq = req.getProcessFilter();
  551. IArrayOf<IConstPackageListMapData> results;
  552. if ((!processReq || !*processReq) && (processFilterReq && *processFilterReq))
  553. listPkgInfo(version, targetReq, processFilterReq, &results);
  554. else
  555. {
  556. Owned<IRemoteConnection> conn = querySDS().connect("/PackageSets", myProcessSession(), RTM_LOCK_READ, SDS_LOCK_TIMEOUT);
  557. if (!conn)
  558. throw MakeStringException(PKG_DALI_LOOKUP_ERROR, "Unable to retrieve package information from dali for process");
  559. Owned<IPropertyTree> pkgSetRegistryRoot = conn->getRoot();
  560. if (!pkgSetRegistryRoot)
  561. throw MakeStringException(PKG_DALI_LOOKUP_ERROR, "Unable to retrieve package information from dali for process");
  562. Owned<IPropertyTreeIterator> iter = pkgSetRegistryRoot->getElements("PackageSet");
  563. ForEach(*iter)
  564. {
  565. try
  566. {
  567. Owned<IPropertyTree> pkgSetRegistry= &iter->get();
  568. StringBuffer process;
  569. pkgSetRegistry->getProp("@process", process);
  570. if (process.length() && (streq(process.str(), "*") || WildMatch(process.str(), processReq, true)))
  571. listPkgInfo(version, targetReq, process.str(), pkgSetRegistry, &results);
  572. }
  573. catch(IException* e)
  574. {
  575. int err = e->errorCode();
  576. //Dali throws an exception if packagemap is not available for a process.
  577. if (err == PKG_DALI_LOOKUP_ERROR)
  578. e->Release();
  579. else
  580. throw e;
  581. }
  582. }
  583. if ((version >=1.01) && processReq && *processReq)
  584. {//Show warning if multiple packages are active for the same target.
  585. ForEachItemIn(i, results)
  586. {
  587. IEspPackageListMapData& r1 = (IEspPackageListMapData&) results.item(i);
  588. if (!r1.getActive())
  589. continue;
  590. const char* target1 = r1.getTarget();
  591. for (unsigned ii = i+1; ii<results.length(); ++ii)
  592. {
  593. IEspPackageListMapData& r2 = (IEspPackageListMapData&) results.item(ii);
  594. if (!r2.getActive())
  595. continue;
  596. if (!streq(target1, r2.getTarget()))
  597. continue;
  598. StringBuffer warning;
  599. warning.appendf("Error: package %s is also active.", r1.getId());
  600. r2.setDescription(warning.str());
  601. }
  602. }
  603. }
  604. }
  605. resp.setPackageMapList(results);
  606. resp.updateStatus().setCode(0);
  607. return true;
  608. }
  609. bool CWsPackageProcessEx::onGetPackage(IEspContext &context, IEspGetPackageRequest &req, IEspGetPackageResponse &resp)
  610. {
  611. resp.updateStatus().setCode(0);
  612. StringAttr process(req.getProcess());
  613. StringBuffer info;
  614. getPkgInfo(req.getTarget(), process.length() ? process.get() : "*", info);
  615. resp.setInfo(info);
  616. return true;
  617. }
  618. bool CWsPackageProcessEx::onGetPackageMapById(IEspContext &context, IEspGetPackageMapByIdRequest &req, IEspGetPackageMapByIdResponse &resp)
  619. {
  620. try
  621. {
  622. const char* pkgMapId = req.getPackageMapId();
  623. if (!pkgMapId && !*pkgMapId)
  624. throw MakeStringException(PKG_MISSING_PARAM, "PackageMap Id not specified");
  625. StringBuffer info;
  626. Owned<IPropertyTree> tree = createPTree("PackageMaps");
  627. getPkgInfoById(pkgMapId, tree);
  628. toXML(tree, info);
  629. resp.setInfo(info.str());
  630. resp.updateStatus().setCode(0);
  631. }
  632. catch (IException *e)
  633. {
  634. StringBuffer retMsg;
  635. resp.updateStatus().setDescription(e->errorMessage(retMsg).str());
  636. resp.updateStatus().setCode(-1);
  637. }
  638. return true;
  639. }
  640. bool CWsPackageProcessEx::onValidatePackage(IEspContext &context, IEspValidatePackageRequest &req, IEspValidatePackageResponse &resp)
  641. {
  642. StringArray warnings;
  643. StringArray errors;
  644. StringArray unmatchedQueries;
  645. StringArray unusedPackages;
  646. StringArray unmatchedFiles;
  647. Owned<IHpccPackageSet> set;
  648. Owned<IPropertyTree> mapTree;
  649. const char *target = req.getTarget();
  650. if (!target || !*target)
  651. throw MakeStringException(PKG_TARGET_NOT_DEFINED, "Target cluster required");
  652. Owned<IConstWUClusterInfo> clusterInfo = getTargetClusterInfo(target);
  653. if (!clusterInfo)
  654. throw MakeStringException(PKG_TARGET_NOT_DEFINED, "Target cluster not found");
  655. SCMStringBuffer process;
  656. clusterInfo->getRoxieProcess(process);
  657. if (!process.length())
  658. throw MakeStringException(PKG_TARGET_NOT_DEFINED, "Roxie process not found");
  659. const char* pmID = req.getPMID();
  660. const char* info = req.getInfo();
  661. if (req.getActive()) //validate active map
  662. {
  663. mapTree.setown(resolveActivePackageMap(process.str(), target, true));
  664. if (!mapTree)
  665. throw MakeStringException(PKG_PACKAGEMAP_NOT_FOUND, "Active package map not found");
  666. }
  667. else if (pmID && *pmID)
  668. {
  669. mapTree.setown(getPackageMapById(req.getGlobalScope() ? NULL : target, pmID, true));
  670. if (!mapTree)
  671. throw MakeStringException(PKG_PACKAGEMAP_NOT_FOUND, "Package map %s not found", pmID);
  672. }
  673. else if (info && *info)
  674. {
  675. mapTree.setown(createPTreeFromXMLString(info));
  676. if (!mapTree)
  677. throw MakeStringException(PKG_LOAD_PACKAGEMAP_FAILED, "Error processing package file content");
  678. }
  679. else
  680. {
  681. throw MakeStringException(PKG_PACKAGEMAP_NOT_FOUND, "package map not specified");
  682. }
  683. if (req.getCheckDFS())
  684. {
  685. Owned<IReferencedFileList> pmfiles = createReferencedFileList(context.queryUserId(), context.queryPassword(), true);
  686. pmfiles->addFilesFromPackageMap(mapTree);
  687. pmfiles->resolveFiles(process.str(), NULL, NULL, NULL, true, false);
  688. Owned<IReferencedFileIterator> files = pmfiles->getFiles();
  689. StringArray notInDFS;
  690. ForEach(*files)
  691. {
  692. IReferencedFile &file = files->query();
  693. if (file.getFlags() & RefFileNotFound)
  694. notInDFS.append(file.getLogicalName());
  695. }
  696. resp.updateFiles().setNotInDFS(notInDFS);
  697. }
  698. const char *id = mapTree->queryProp("@id");
  699. Owned<IHpccPackageMap> map = createPackageMapFromPtree(mapTree, target, id);
  700. if (!map)
  701. throw MakeStringException(PKG_LOAD_PACKAGEMAP_FAILED, "Error loading package map %s", id);
  702. StringArray queriesToVerify;
  703. const char *queryid = req.getQueryIdToVerify();
  704. if (queryid && *queryid)
  705. queriesToVerify.append(queryid);
  706. ForEachItemIn(i, req.getQueriesToVerify())
  707. {
  708. queryid = req.getQueriesToVerify().item(i);
  709. if (queryid && *queryid)
  710. queriesToVerify.appendUniq(queryid);
  711. }
  712. map->validate(queriesToVerify, warnings, errors, unmatchedQueries, unusedPackages, unmatchedFiles);
  713. resp.setPMID(map->queryPackageId());
  714. resp.setWarnings(warnings);
  715. resp.setErrors(errors);
  716. resp.updateQueries().setUnmatched(unmatchedQueries);
  717. resp.updatePackages().setUnmatched(unusedPackages);
  718. resp.updateFiles().setUnmatched(unmatchedFiles);
  719. resp.updateStatus().setCode(0);
  720. return true;
  721. }
  722. bool CWsPackageProcessEx::onGetPackageMapSelectOptions(IEspContext &context, IEspGetPackageMapSelectOptionsRequest &req, IEspGetPackageMapSelectOptionsResponse &resp)
  723. {
  724. try
  725. {
  726. bool includeTargets = req.getIncludeTargets();
  727. bool includeProcesses = req.getIncludeProcesses();
  728. if (includeTargets || includeProcesses)
  729. {
  730. Owned<IRemoteConnection> connEnv = querySDS().connect("Environment", myProcessSession(), RTM_LOCK_READ, SDS_LOCK_TIMEOUT);
  731. if (!connEnv)
  732. throw MakeStringException(PKG_DALI_LOOKUP_ERROR,"Failed to get environment information.");
  733. IArrayOf<IConstTargetData> targets;
  734. CConstWUClusterInfoArray clusters;
  735. getEnvironmentClusterInfo(connEnv->queryRoot(), clusters);
  736. ForEachItemIn(c, clusters)
  737. {
  738. SCMStringBuffer str;
  739. IConstWUClusterInfo &cluster = clusters.item(c);
  740. Owned<IEspTargetData> target = createTargetData("", "");
  741. target->setName(cluster.getName(str).str());
  742. ClusterType clusterType = cluster.getPlatform();
  743. if (clusterType == ThorLCRCluster)
  744. target->setType(THORCLUSTER);
  745. else if (clusterType == RoxieCluster)
  746. target->setType(ROXIECLUSTER);
  747. else
  748. target->setType(HTHORCLUSTER);
  749. if (!includeProcesses)
  750. {
  751. targets.append(*target.getClear());
  752. continue;
  753. }
  754. StringArray processes;
  755. if (clusterType == ThorLCRCluster)
  756. {
  757. const StringArray &thors = cluster.getThorProcesses();
  758. ForEachItemIn(i, thors)
  759. {
  760. const char* process = thors.item(i);
  761. if (process && *process)
  762. processes.append(process);
  763. }
  764. }
  765. else if (clusterType == RoxieCluster)
  766. {
  767. SCMStringBuffer process;
  768. cluster.getRoxieProcess(process);
  769. if (process.length())
  770. processes.append(process.str());
  771. }
  772. else if (clusterType == HThorCluster)
  773. {
  774. SCMStringBuffer process;
  775. cluster.getAgentQueue(process);
  776. if (process.length())
  777. processes.append(process.str());
  778. }
  779. if (processes.length())
  780. target->setProcesses(processes);
  781. targets.append(*target.getClear());
  782. }
  783. resp.setTargets(targets);
  784. }
  785. if (req.getIncludeProcessFilters())
  786. {
  787. StringArray processFilters;
  788. processFilters.append("*");
  789. Owned<IRemoteConnection> pkgSet = querySDS().connect("/PackageSets/", myProcessSession(), RTM_LOCK_WRITE, SDS_LOCK_TIMEOUT);
  790. if (pkgSet)
  791. {
  792. Owned<IPropertyTreeIterator> iter = pkgSet->queryRoot()->getElements("PackageSet");
  793. ForEach(*iter)
  794. {
  795. StringBuffer process;
  796. iter->query().getProp("@process", process);
  797. if (process.length() && !processFilters.contains(process.str()))
  798. processFilters.append(process.str());
  799. }
  800. }
  801. resp.setProcessFilters(processFilters);
  802. }
  803. resp.updateStatus().setCode(0);
  804. }
  805. catch (IException *e)
  806. {
  807. StringBuffer retMsg;
  808. resp.updateStatus().setDescription(e->errorMessage(retMsg).str());
  809. resp.updateStatus().setCode(-1);
  810. }
  811. return true;
  812. }
  813. bool CWsPackageProcessEx::onGetQueryFileMapping(IEspContext &context, IEspGetQueryFileMappingRequest &req, IEspGetQueryFileMappingResponse &resp)
  814. {
  815. const char *queryname = req.getQueryName();
  816. if (!queryname || !*queryname)
  817. throw MakeStringException(PKG_INVALID_QUERY_NAME, "Query name required");
  818. const char *target = req.getTarget();
  819. if (!target || !*target)
  820. throw MakeStringException(PKG_TARGET_NOT_DEFINED, "Target cluster required");
  821. Owned<IConstWUClusterInfo> clusterInfo = getTargetClusterInfo(target);
  822. if (!clusterInfo)
  823. throw MakeStringException(PKG_TARGET_NOT_DEFINED, "Unable to find target cluster");
  824. if (clusterInfo->getPlatform()!=RoxieCluster)
  825. throw MakeStringException(PKG_INVALID_CLUSTER_TYPE, "Roxie target required");
  826. Owned<IHpccPackageSet> set;
  827. Owned<IHpccPackageMap> ownedmap;
  828. const IHpccPackageMap *map = NULL;
  829. const char *pmid = req.getPMID();
  830. if (pmid && *pmid)
  831. {
  832. ownedmap.setown(createPackageMapFromPtree(getPackageMapById(req.getGlobalScope() ? NULL : target, pmid, true), target, pmid));
  833. if (!ownedmap)
  834. throw MakeStringException(PKG_LOAD_PACKAGEMAP_FAILED, "Error loading package map %s", req.getPMID());
  835. map = ownedmap;
  836. }
  837. else
  838. {
  839. SCMStringBuffer process;
  840. clusterInfo->getRoxieProcess(process);
  841. set.setown(createPackageSet(process.str()));
  842. if (!set)
  843. throw MakeStringException(PKG_CREATE_PACKAGESET_FAILED, "Unable to create PackageSet");
  844. map = set->queryActiveMap(target);
  845. if (!map)
  846. throw MakeStringException(PKG_PACKAGEMAP_NOT_FOUND, "Active package map not found");
  847. }
  848. Owned<IPropertyTree> fileInfo = createPTree();
  849. map->gatherFileMappingForQuery(queryname, fileInfo);
  850. StringArray unmappedFiles;
  851. Owned<IPropertyTreeIterator> it = fileInfo->getElements("File");
  852. ForEach(*it)
  853. unmappedFiles.append(it->query().queryProp(NULL));
  854. resp.setUnmappedFiles(unmappedFiles);
  855. IArrayOf<IEspSuperFile> superArray;
  856. it.setown(fileInfo->getElements("SuperFile"));
  857. ForEach(*it)
  858. {
  859. IPropertyTree &superTree = it->query();
  860. Owned<IEspSuperFile> superItem = createSuperFile();
  861. superItem->setName(superTree.queryProp("@name"));
  862. StringArray subArray;
  863. Owned<IPropertyTreeIterator> subfiles = superTree.getElements("SubFile");
  864. ForEach(*subfiles)
  865. subArray.append(subfiles->query().queryProp(NULL));
  866. superItem->setSubFiles(subArray);
  867. superArray.append(*superItem.getClear());
  868. }
  869. resp.setSuperFiles(superArray);
  870. return true;
  871. }
  872. int CWsPackageProcessSoapBindingEx::onFinishUpload(IEspContext &ctx, CHttpRequest* request, CHttpResponse* response,
  873. const char *service, const char *method, StringArray& fileNames, StringArray& files, IMultiException *meIn)
  874. {
  875. if (meIn && (meIn->ordinality() > 0))
  876. {
  877. StringBuffer msg;
  878. WARNLOG("Exception(s) in EspHttpBinding::onFinishUpload - %s", meIn->errorMessage(msg).append('\n').str());
  879. if ((ctx.getResponseFormat() == ESPSerializationXML) || (ctx.getResponseFormat() == ESPSerializationJSON))
  880. {
  881. response->handleExceptions(NULL, meIn, "FileSpray", "UploadFile", NULL);
  882. return 0;
  883. }
  884. else
  885. return EspHttpBinding::onFinishUpload(ctx, request, response, service, method, fileNames, files, meIn);
  886. }
  887. StringBuffer respStr;
  888. Owned<IEspWsPackageProcess> iserv = (IEspWsPackageProcess*)getService();
  889. if(iserv == NULL)
  890. {
  891. WARNLOG("Exception(s) in %s::%s - Service not available", service, method);
  892. respStr.append("{\"Code\":-1,\"Exception\":\"Service not available\"}");
  893. }
  894. else
  895. {
  896. checkRequest(ctx);
  897. Owned<CAddPackageRequest> esp_request = new CAddPackageRequest(&ctx, "WsPackageProcess", request->queryParameters(), request->queryAttachments());
  898. Owned<CAddPackageResponse> esp_response = new CAddPackageResponse("WsPackageProcess");
  899. StringBuffer source;
  900. source.setf("WsPackageProcess::%s()", method);
  901. Owned<IMultiException> me = MakeMultiException(source.str());
  902. try
  903. {
  904. if (!files.length())
  905. throw MakeStringExceptionDirect(PKG_INFO_NOT_DEFINED, "Package content not found");
  906. esp_request->setInfo(files.item(0));
  907. iserv->onAddPackage(ctx, *esp_request.get(), *esp_response.get());
  908. }
  909. catch (IMultiException* mex)
  910. {
  911. me->append(*mex);
  912. mex->Release();
  913. }
  914. catch (IException* e)
  915. {
  916. me->append(*e);
  917. }
  918. catch (...)
  919. {
  920. me->append(*MakeStringExceptionDirect(-1, "Unknown Exception"));
  921. }
  922. if (!me->ordinality())
  923. {
  924. respStr.append("{\"Code\":0,\"Description\":\"Package Map added\"}");
  925. }
  926. else
  927. {
  928. StringBuffer msg;
  929. WARNLOG("Exception(s) in %s::%s - %s", service, method, me->errorMessage(msg).str());
  930. respStr.appendf("{\"Code\":-1,\"Exception\":\"%s\"}", msg.str());
  931. }
  932. }
  933. response->setContent(respStr.str());
  934. response->setContentType(HTTP_TYPE_APPLICATION_JSON_UTF8);
  935. response->send();
  936. return 0;
  937. }