ws_packageprocessService.cpp 42 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101
  1. /*##############################################################################
  2. HPCC SYSTEMS software Copyright (C) 2012 HPCC Systems®.
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. ############################################################################## */
  13. #pragma warning (disable : 4786)
  14. #include "ws_packageprocessService.hpp"
  15. #include "daclient.hpp"
  16. #include "dalienv.hpp"
  17. #include "dadfs.hpp"
  18. #include "dfuutil.hpp"
  19. #include "ws_fs.hpp"
  20. #include "ws_workunits.hpp"
  21. #include "packageprocess_errors.h"
  22. #include "referencedfilelist.hpp"
  23. #include "package.h"
  24. #define SDS_LOCK_TIMEOUT (5*60*1000) // 5mins, 30s a bit short
  25. void CWsPackageProcessEx::init(IPropertyTree *cfg, const char *process, const char *service)
  26. {
  27. packageMapAndSet.subscribe();
  28. }
  29. bool CWsPackageProcessEx::onEcho(IEspContext &context, IEspEchoRequest &req, IEspEchoResponse &resp)
  30. {
  31. StringBuffer respMsg;
  32. ISecUser* user = context.queryUser();
  33. if(user != NULL)
  34. {
  35. const char* name = user->getName();
  36. if (name && *name)
  37. respMsg.appendf("%s: ", name);
  38. }
  39. const char* reqMsg = req.getRequest();
  40. if (reqMsg && *reqMsg)
  41. respMsg.append(reqMsg);
  42. else
  43. respMsg.append("??");
  44. resp.setResponse(respMsg.str());
  45. return true;
  46. }
  47. inline StringBuffer &buildPkgSetId(StringBuffer &id, const char *process)
  48. {
  49. if (!process || !*process)
  50. process = "*";
  51. return id.append("default_").append(process).replace('*', '#').replace('?', '~');
  52. }
  53. IPropertyTree *getPkgSetRegistry(const char *process, bool readonly)
  54. {
  55. Owned<IRemoteConnection> globalLock = querySDS().connect("/PackageSets/", myProcessSession(), RTM_LOCK_WRITE|RTM_CREATE_QUERY, SDS_LOCK_TIMEOUT);
  56. if (!globalLock)
  57. throw MakeStringException(PKG_DALI_LOOKUP_ERROR, "Unable to connect to PackageSet information in dali /PackageSets");
  58. IPropertyTree *pkgSets = globalLock->queryRoot();
  59. if (!pkgSets)
  60. throw MakeStringException(PKG_DALI_LOOKUP_ERROR, "Unable to open PackageSet information in dali /PackageSets");
  61. if (!process || !*process)
  62. process = "*";
  63. StringBuffer id;
  64. buildPkgSetId(id, process);
  65. //Only lock the branch for the target we're interested in.
  66. VStringBuffer xpath("/PackageSets/PackageSet[@id='%s']", id.str());
  67. Owned<IRemoteConnection> conn = querySDS().connect(xpath.str(), myProcessSession(), readonly ? RTM_LOCK_READ : RTM_LOCK_WRITE, SDS_LOCK_TIMEOUT);
  68. if (!conn)
  69. {
  70. if (readonly)
  71. return NULL;
  72. Owned<IPropertyTree> pkgSet = createPTree();
  73. pkgSet->setProp("@id", id.str());
  74. pkgSet->setProp("@process", process);
  75. pkgSets->addPropTree("PackageSet", pkgSet.getClear());
  76. globalLock->commit();
  77. conn.setown(querySDS().connect(xpath.str(), myProcessSession(), RTM_LOCK_WRITE, SDS_LOCK_TIMEOUT));
  78. }
  79. return (conn) ? conn->getRoot() : NULL;
  80. }
  81. ////////////////////////////////////////////////////////////////////////////////////////
  82. const unsigned roxieQueryRoxieTimeOut = 60000;
  83. #define SDS_LOCK_TIMEOUT (5*60*1000) // 5mins, 30s a bit short
  84. bool isFileKnownOnCluster(const char *logicalname, IConstWUClusterInfo *clusterInfo, IUserDescriptor* userdesc)
  85. {
  86. Owned<IDistributedFile> dst = queryDistributedFileDirectory().lookup(logicalname, userdesc, true);
  87. if (dst)
  88. {
  89. SCMStringBuffer processName;
  90. clusterInfo->getRoxieProcess(processName);
  91. if (dst->findCluster(processName.str()) != NotFound)
  92. return true; // file already known for this cluster
  93. }
  94. return false;
  95. }
  96. bool isFileKnownOnCluster(const char *logicalname, const char *target, IUserDescriptor* userdesc)
  97. {
  98. Owned<IConstWUClusterInfo> clusterInfo = getTargetClusterInfo(target);
  99. if (!clusterInfo)
  100. throw MakeStringException(PKG_TARGET_NOT_DEFINED, "Could not find information about target cluster %s ", target);
  101. return isFileKnownOnCluster(logicalname, clusterInfo, userdesc);
  102. }
  103. void cloneFileInfoToDali(unsigned updateFlags, StringArray &notFound, IPropertyTree *packageMap, const char *lookupDaliIp, IConstWUClusterInfo *dstInfo, const char *srcCluster, const char *remotePrefix, IUserDescriptor* userdesc, bool allowForeignFiles)
  104. {
  105. StringBuffer user;
  106. StringBuffer password;
  107. if (userdesc)
  108. {
  109. userdesc->getUserName(user);
  110. userdesc->getPassword(password);
  111. }
  112. Owned<IReferencedFileList> wufiles = createReferencedFileList(user, password, allowForeignFiles, false);
  113. wufiles->addFilesFromPackageMap(packageMap);
  114. SCMStringBuffer processName;
  115. dstInfo->getRoxieProcess(processName);
  116. wufiles->resolveFiles(processName.str(), lookupDaliIp, remotePrefix, srcCluster, !(updateFlags & (DALI_UPDATEF_REPLACE_FILE | DALI_UPDATEF_CLONE_FROM)), false, false);
  117. StringBuffer defReplicateFolder;
  118. getConfigurationDirectory(NULL, "data2", "roxie", processName.str(), defReplicateFolder);
  119. Owned<IDFUhelper> helper = createIDFUhelper();
  120. wufiles->cloneAllInfo(updateFlags, helper, true, false, dstInfo->getRoxieRedundancy(), dstInfo->getChannelsPerNode(), dstInfo->getRoxieReplicateOffset(), defReplicateFolder);
  121. Owned<IReferencedFileIterator> iter = wufiles->getFiles();
  122. ForEach(*iter)
  123. {
  124. IReferencedFile &item = iter->query();
  125. if (item.getFlags() & (RefFileNotFound | RefFileNotOnSource))
  126. notFound.append(item.getLogicalName());
  127. }
  128. }
  129. void cloneFileInfoToDali(unsigned updateFlags, StringArray &notFound, IPropertyTree *packageMap, const char *lookupDaliIp, const char *dstCluster, const char *srcCluster, const char *prefix, IUserDescriptor* userdesc, bool allowForeignFiles)
  130. {
  131. Owned<IConstWUClusterInfo> clusterInfo = getTargetClusterInfo(dstCluster);
  132. if (!clusterInfo)
  133. throw MakeStringException(PKG_TARGET_NOT_DEFINED, "Could not find information about target cluster %s ", dstCluster);
  134. cloneFileInfoToDali(updateFlags, notFound, packageMap, lookupDaliIp, clusterInfo, srcCluster, prefix, userdesc, allowForeignFiles);
  135. }
  136. void makePackageActive(IPropertyTree *pkgSet, IPropertyTree *psEntryNew, const char *target, bool activate)
  137. {
  138. if (activate)
  139. {
  140. VStringBuffer xpath("PackageMap[@querySet='%s'][@active='1']", target);
  141. Owned<IPropertyTreeIterator> psEntries = pkgSet->getElements(xpath.str());
  142. ForEach(*psEntries)
  143. {
  144. IPropertyTree &entry = psEntries->query();
  145. if (psEntryNew != &entry)
  146. entry.setPropBool("@active", false);
  147. }
  148. }
  149. if (psEntryNew->getPropBool("@active") != activate)
  150. psEntryNew->setPropBool("@active", activate);
  151. }
  152. //////////////////////////////////////////////////////////
  153. void addPackageMapInfo(unsigned updateFlags, const char *xml, StringArray &filesNotFound, const char *process, const char *target, const char *pmid, const char *packageSetName, const char *lookupDaliIp, const char *srcCluster, const char *prefix, bool activate, IUserDescriptor* userdesc, bool allowForeignFiles, bool preloadAll)
  154. {
  155. if (!xml || !*xml)
  156. throw MakeStringExceptionDirect(PKG_INFO_NOT_DEFINED, "PackageMap info not provided");
  157. if (srcCluster && *srcCluster)
  158. {
  159. if (!isProcessCluster(lookupDaliIp, srcCluster))
  160. throw MakeStringException(PKG_INVALID_CLUSTER_TYPE, "Process cluster %s not found on %s DALI", srcCluster, lookupDaliIp ? lookupDaliIp : "local");
  161. }
  162. Owned<IConstWUClusterInfo> clusterInfo = getTargetClusterInfo(target);
  163. if (!clusterInfo)
  164. throw MakeStringException(PKG_TARGET_NOT_DEFINED, "Could not find information about target cluster %s ", target);
  165. Owned<IPropertyTree> pmTree = createPTreeFromXMLString(xml);
  166. if (!pmTree)
  167. throw MakeStringExceptionDirect(PKG_INFO_NOT_DEFINED, "Invalid PackageMap info");
  168. StringBuffer lcPmid(pmid);
  169. pmid = lcPmid.toLowerCase().str();
  170. pmTree->setProp("@id", pmid);
  171. Owned<IPropertyTreeIterator> iter = pmTree->getElements("Package");
  172. ForEach(*iter)
  173. {
  174. IPropertyTree &item = iter->query();
  175. if (preloadAll)
  176. item.setPropBool("@preload", true);
  177. Owned<IPropertyTreeIterator> superFiles = item.getElements("SuperFile");
  178. ForEach(*superFiles)
  179. {
  180. IPropertyTree &superFile = superFiles->query();
  181. StringBuffer lc(superFile.queryProp("@id"));
  182. const char *id = lc.toLowerCase().str();
  183. if (*id == '~')
  184. id++;
  185. superFile.setProp("@id", id);
  186. Owned<IPropertyTreeIterator> subFiles = superFile.getElements("SubFile");
  187. ForEach(*subFiles)
  188. {
  189. IPropertyTree &subFile = subFiles->query();
  190. id = subFile.queryProp("@value");
  191. if (id && *id == '~')
  192. {
  193. StringAttr value(id+1);
  194. subFile.setProp("@value", value.get());
  195. }
  196. }
  197. }
  198. }
  199. VStringBuffer xpath("PackageMap[@id='%s']", pmid);
  200. Owned<IRemoteConnection> globalLock = querySDS().connect("/PackageMaps", myProcessSession(), RTM_LOCK_WRITE|RTM_CREATE_QUERY, SDS_LOCK_TIMEOUT);
  201. IPropertyTree *packageMaps = globalLock->queryRoot();
  202. IPropertyTree *pmExisting = packageMaps->queryPropTree(xpath);
  203. xpath.appendf("[@querySet='%s']", target);
  204. Owned<IPropertyTree> pkgSet = getPkgSetRegistry(process, false);
  205. IPropertyTree *psEntry = pkgSet->queryPropTree(xpath);
  206. if (!(updateFlags & DALI_UPDATEF_PACKAGEMAP) && (psEntry || pmExisting))
  207. throw MakeStringException(PKG_NAME_EXISTS, "Package name %s already exists, either delete it or specify replace packagemap", pmid);
  208. cloneFileInfoToDali(updateFlags, filesNotFound, pmTree, lookupDaliIp, clusterInfo, srcCluster, prefix, userdesc, allowForeignFiles);
  209. if (pmExisting)
  210. packageMaps->removeTree(pmExisting);
  211. packageMaps->addPropTree("PackageMap", pmTree.getClear());
  212. if (!psEntry)
  213. {
  214. psEntry = pkgSet->addPropTree("PackageMap", createPTree("PackageMap"));
  215. psEntry->setProp("@id", pmid);
  216. psEntry->setProp("@querySet", target);
  217. }
  218. makePackageActive(pkgSet, psEntry, target, activate);
  219. }
  220. void getPackageListInfo(IPropertyTree *mapTree, IEspPackageListMapData *pkgList)
  221. {
  222. pkgList->setId(mapTree->queryProp("@id"));
  223. pkgList->setTarget(mapTree->queryProp("@querySet"));
  224. Owned<IPropertyTreeIterator> iter = mapTree->getElements("Package");
  225. IArrayOf<IConstPackageListData> results;
  226. ForEach(*iter)
  227. {
  228. IPropertyTree &item = iter->query();
  229. Owned<IEspPackageListData> res = createPackageListData("", "");
  230. res->setId(item.queryProp("@id"));
  231. if (item.hasProp("@queries"))
  232. res->setQueries(item.queryProp("@queries"));
  233. results.append(*res.getClear());
  234. }
  235. pkgList->setPkgListData(results);
  236. }
  237. void getAllPackageListInfo(IPropertyTree *mapTree, StringBuffer &info)
  238. {
  239. info.append("<PackageMap id='").append(mapTree->queryProp("@id")).append("'");
  240. Owned<IPropertyTreeIterator> iter = mapTree->getElements("Package");
  241. ForEach(*iter)
  242. {
  243. IPropertyTree &item = iter->query();
  244. info.append("<Package id='").append(item.queryProp("@id")).append("'");
  245. if (item.hasProp("@queries"))
  246. info.append(" queries='").append(item.queryProp("@queries")).append("'");
  247. info.append("></Package>");
  248. }
  249. info.append("</PackageMap>");
  250. }
  251. void listPkgInfo(double version, const char *target, const char *process, const IPropertyTree* packageMaps, IPropertyTree* pkgSetRegistry, IArrayOf<IConstPackageListMapData>* results)
  252. {
  253. StringBuffer xpath("PackageMap");
  254. if (target && *target)
  255. xpath.appendf("[@querySet='%s']", target);
  256. Owned<IPropertyTreeIterator> iter = pkgSetRegistry->getElements(xpath.str());
  257. ForEach(*iter)
  258. {
  259. IPropertyTree &item = iter->query();
  260. const char *id = item.queryProp("@id");
  261. if (!id || !*id)
  262. continue;
  263. StringBuffer xpath;
  264. xpath.append("PackageMap[@id='").append(id).append("']");
  265. IPropertyTree *mapTree = packageMaps->queryPropTree(xpath);
  266. if (!mapTree)
  267. continue;
  268. Owned<IEspPackageListMapData> res = createPackageListMapData("", "");
  269. res->setActive(item.getPropBool("@active"));
  270. if (process && *process && (version >= 1.01))
  271. res->setProcess(process);
  272. getPackageListInfo(mapTree, res);
  273. if (target && *target)
  274. res->setTarget(target);
  275. else
  276. res->setTarget(item.queryProp("@querySet"));
  277. results->append(*res.getClear());
  278. }
  279. }
  280. void listPkgInfo(double version, const char *target, const char *process, const IPropertyTree* packageMaps, IArrayOf<IConstPackageListMapData>* results)
  281. {
  282. Owned<IPropertyTree> pkgSetRegistry = getPkgSetRegistry((process && *process) ? process : "*", true);
  283. if (pkgSetRegistry) //will be NULL if no package map
  284. {
  285. listPkgInfo(version, target, process, packageMaps, pkgSetRegistry, results);
  286. }
  287. }
  288. void getPkgInfo(const IPropertyTree *packageMaps, const char *target, const char *process, StringBuffer &info)
  289. {
  290. Owned<IPropertyTree> tree = createPTree("PackageMaps");
  291. Owned<IPropertyTree> pkgSetRegistry = getPkgSetRegistry(process, true);
  292. if (!pkgSetRegistry)
  293. {
  294. toXML(tree, info);
  295. return;
  296. }
  297. StringBuffer xpath("PackageMap[@active='1']");
  298. if (target && *target)
  299. xpath.appendf("[@querySet='%s']", target);
  300. Owned<IPropertyTreeIterator> iter = pkgSetRegistry->getElements(xpath.str());
  301. ForEach(*iter)
  302. {
  303. IPropertyTree &item = iter->query();
  304. const char *id = item.queryProp("@id");
  305. if (id)
  306. {
  307. StringBuffer xpath;
  308. xpath.append("PackageMap[@id='").append(id).append("']");
  309. IPropertyTree *mapTree = packageMaps->queryPropTree(xpath);
  310. if (mapTree)
  311. mergePTree(tree, mapTree);
  312. }
  313. }
  314. toXML(tree, info);
  315. }
  316. bool deletePkgInfo(const char *name, const char *target, const char *process, bool globalScope)
  317. {
  318. Owned<IRemoteConnection> pkgSetsConn = querySDS().connect("/PackageSets/", myProcessSession(), RTM_LOCK_WRITE, SDS_LOCK_TIMEOUT);
  319. if (!pkgSetsConn)
  320. throw MakeStringException(PKG_NONE_DEFINED, "No package sets defined");
  321. IPropertyTree* packageSets = pkgSetsConn->queryRoot();
  322. StringBuffer pkgSetId;
  323. buildPkgSetId(pkgSetId, process);
  324. VStringBuffer pkgSet_xpath("PackageSet[@id='%s']", pkgSetId.str());
  325. IPropertyTree *pkgSetRegistry = packageSets->queryPropTree(pkgSet_xpath.str());
  326. if (!pkgSetRegistry)
  327. throw MakeStringException(PKG_TARGET_NOT_DEFINED, "No package sets defined for %s", process);
  328. StringBuffer lcTarget(target);
  329. target = lcTarget.toLowerCase().str();
  330. StringBuffer lcName(name);
  331. name = lcName.toLowerCase().str();
  332. Owned<IPropertyTree> mapEntry;
  333. StringBuffer xpath;
  334. if (!globalScope)
  335. {
  336. xpath.appendf("PackageMap[@id='%s::%s'][@querySet='%s']", target, name, target);
  337. mapEntry.setown(pkgSetRegistry->getPropTree(xpath.str()));
  338. }
  339. if (!mapEntry)
  340. {
  341. xpath.clear().appendf("PackageMap[@id='%s'][@querySet='%s']", name, target);
  342. mapEntry.setown(pkgSetRegistry->getPropTree(xpath.str()));
  343. if (!mapEntry)
  344. throw MakeStringException(PKG_DELETE_NOT_FOUND, "Unable to delete %s - information not found", lcName.str());
  345. }
  346. StringAttr pmid(mapEntry->queryProp("@id"));
  347. pkgSetRegistry->removeTree(mapEntry);
  348. xpath.clear().appendf("PackageSet/PackageMap[@id='%s']", pmid.get());
  349. if (!packageSets->hasProp(xpath))
  350. {
  351. Owned<IRemoteConnection> pkgMapsConn = querySDS().connect("/PackageMaps/", myProcessSession(), RTM_LOCK_WRITE, SDS_LOCK_TIMEOUT);
  352. if (!pkgMapsConn)
  353. throw MakeStringException(PKG_DALI_LOOKUP_ERROR, "Unable to retrieve PackageMaps information from dali [/PackageMaps]");
  354. IPropertyTree *pkgMaps = pkgMapsConn->queryRoot();
  355. if (!pkgMaps)
  356. throw MakeStringException(PKG_DALI_LOOKUP_ERROR, "Unable to retrieve PackageMaps information from dali [/PackageMaps]");
  357. IPropertyTree *mapTree = pkgMaps->queryPropTree(xpath.clear().appendf("PackageMap[@id='%s']", pmid.get()).str());
  358. if (mapTree)
  359. pkgMaps->removeTree(mapTree);
  360. }
  361. return true;
  362. }
  363. void activatePackageMapInfo(const char *target, const char *name, const char *process, bool globalScope, bool activate)
  364. {
  365. if (!target || !*target)
  366. throw MakeStringExceptionDirect(PKG_TARGET_NOT_DEFINED, "No target defined");
  367. if (!name || !*name)
  368. throw MakeStringExceptionDirect(PKG_MISSING_PARAM, "No pmid specified");
  369. Owned<IRemoteConnection> globalLock = querySDS().connect("PackageSets", myProcessSession(), RTM_LOCK_WRITE|RTM_CREATE_QUERY, SDS_LOCK_TIMEOUT);
  370. if (!globalLock)
  371. throw MakeStringException(PKG_DALI_LOOKUP_ERROR, "Unable to retrieve PackageSets information from dali /PackageSets");
  372. StringBuffer lcTarget(target);
  373. target = lcTarget.toLowerCase().str();
  374. StringBuffer lcName(name);
  375. name = lcName.toLowerCase().str();
  376. IPropertyTree *root = globalLock->queryRoot();
  377. if (!root)
  378. throw MakeStringException(PKG_ACTIVATE_NOT_FOUND, "Unable to retrieve PackageSet information");
  379. StringBuffer pkgSetId;
  380. buildPkgSetId(pkgSetId, process);
  381. VStringBuffer xpath("PackageSet[@id='%s']", pkgSetId.str());
  382. IPropertyTree *pkgSetTree = root->queryPropTree(xpath);
  383. if (pkgSetTree)
  384. {
  385. IPropertyTree *mapTree = NULL;
  386. if (!globalScope)
  387. {
  388. xpath.clear().appendf("PackageMap[@querySet='%s'][@id='%s::%s']", target, target, name);
  389. mapTree = pkgSetTree->queryPropTree(xpath);
  390. }
  391. if (!mapTree)
  392. {
  393. xpath.clear().appendf("PackageMap[@querySet='%s'][@id='%s']", target, name);
  394. mapTree = pkgSetTree->queryPropTree(xpath);
  395. }
  396. if (!mapTree)
  397. throw MakeStringException(PKG_ACTIVATE_NOT_FOUND, "PackageMap %s not found on target %s", name, target);
  398. makePackageActive(pkgSetTree, mapTree, target, activate);
  399. }
  400. }
  401. void PackageMapAndSet::load(const char* path, IPropertyTree* t)
  402. {
  403. Owned<IRemoteConnection> globalLock = querySDS().connect(path, myProcessSession(), RTM_LOCK_READ, SDS_LOCK_TIMEOUT);
  404. if (!globalLock)
  405. throw MakeStringException(PKG_DALI_LOOKUP_ERROR, "Unable to retrieve %s information from dali /%s", path, path);
  406. t->removeProp(path);
  407. IPropertyTree *root = globalLock->queryRoot();
  408. if (root)
  409. t->addPropTree(path, createPTreeFromIPT(root));
  410. }
  411. void PackageMapAndSet::load(unsigned flags)
  412. {
  413. Owned<IPropertyTree> t = createPTreeFromIPT(tree);
  414. if (flags & PMAS_RELOAD_PACKAGE_SET)
  415. load("PackageSets", t);
  416. if (flags & PMAS_RELOAD_PACKAGE_MAP)
  417. load("PackageMaps", t);
  418. tree.setown(t.getClear());
  419. }
  420. bool CWsPackageProcessEx::readPackageMapString(const char *packageMapString, StringBuffer &target, StringBuffer &process, StringBuffer &packageMap)
  421. {
  422. if (!packageMapString || !*packageMapString)
  423. return false;
  424. StringArray plist;
  425. plist.appendListUniq(packageMapString, ",");
  426. if (plist.length() < 3)
  427. return false;
  428. target.set(plist.item(0));
  429. process.set(plist.item(1));
  430. packageMap.set(plist.item(2));
  431. if (!target.length() || !packageMap.length())
  432. return false;
  433. return true;
  434. }
  435. void CWsPackageProcessEx::getPkgInfoById(const char *packageMapId, IPropertyTree* tree)
  436. {
  437. if (!packageMapId || !*packageMapId)
  438. return;
  439. Owned<IPropertyTree> packageMaps = packageMapAndSet.getPackageMaps();
  440. if (!packageMaps)
  441. throw MakeStringException(PKG_DALI_LOOKUP_ERROR, "Unable to retrieve information about package maps from dali server");
  442. StringBuffer xpath;
  443. xpath.append("PackageMap[@id='").append(packageMapId).append("']");
  444. IPropertyTree *mapTree = packageMaps->queryPropTree(xpath);
  445. if (mapTree)
  446. mergePTree(tree, mapTree);
  447. }
  448. bool CWsPackageProcessEx::onAddPackage(IEspContext &context, IEspAddPackageRequest &req, IEspAddPackageResponse &resp)
  449. {
  450. resp.updateStatus().setCode(0);
  451. StringAttr target(req.getTarget());
  452. StringAttr name(req.getPackageMap());
  453. if (target.isEmpty())
  454. throw MakeStringExceptionDirect(PKG_MISSING_PARAM, "Target cluster parameter required");
  455. if (name.isEmpty())
  456. throw MakeStringExceptionDirect(PKG_MISSING_PARAM, "PackageMap name parameter required");
  457. DBGLOG("%s adding packagemap %s to target %s", context.queryUserId(), name.str(), target.str());
  458. StringBuffer pmid;
  459. if (!req.getGlobalScope())
  460. pmid.append(target).append("::");
  461. pmid.append(name.get());
  462. bool activate = req.getActivate();
  463. unsigned updateFlags = 0;
  464. if (req.getOverWrite())
  465. updateFlags |= (DALI_UPDATEF_PACKAGEMAP | DALI_UPDATEF_REPLACE_FILE | DALI_UPDATEF_CLONE_FROM | DALI_UPDATEF_SUPERFILES);
  466. if (req.getReplacePackageMap())
  467. updateFlags |= DALI_UPDATEF_PACKAGEMAP;
  468. if (req.getUpdateCloneFrom())
  469. updateFlags |= DALI_UPDATEF_CLONE_FROM;
  470. if (req.getUpdateSuperFiles())
  471. updateFlags |= DALI_UPDATEF_SUPERFILES;
  472. if (req.getAppendCluster())
  473. updateFlags |= DALI_UPDATEF_APPEND_CLUSTER;
  474. StringAttr processName(req.getProcess());
  475. Owned<IUserDescriptor> userdesc;
  476. const char *user = context.queryUserId();
  477. const char *password = context.queryPassword();
  478. if (user && *user && *password && *password)
  479. {
  480. userdesc.setown(createUserDescriptor());
  481. userdesc->set(user, password);
  482. }
  483. StringBuffer srcCluster;
  484. StringBuffer daliip;
  485. StringBuffer prefix;
  486. splitDerivedDfsLocation(req.getDaliIp(), srcCluster, daliip, prefix, req.getSourceProcess(), req.getSourceProcess(), NULL, NULL);
  487. StringBuffer pkgSetId;
  488. buildPkgSetId(pkgSetId, processName.get());
  489. StringArray filesNotFound;
  490. addPackageMapInfo(updateFlags, req.getInfo(), filesNotFound, processName, target, pmid, pkgSetId, daliip, srcCluster, prefix, activate, userdesc, req.getAllowForeignFiles(), req.getPreloadAllPackages());
  491. resp.setFilesNotFound(filesNotFound);
  492. StringBuffer msg;
  493. msg.append("Successfully loaded ").append(name.get());
  494. resp.updateStatus().setDescription(msg.str());
  495. return true;
  496. }
  497. void CWsPackageProcessEx::deletePackage(const char *packageMap, const char *target, const char *process, bool globalScope, StringBuffer &returnMsg, int &returnCode)
  498. {
  499. bool ret = deletePkgInfo(packageMap, target, process, globalScope);
  500. (ret) ? returnMsg.append("Successfully ") : returnMsg.append("Unsuccessfully ");
  501. returnMsg.append("deleted ").append(packageMap).append(" from ").append(target).append(";");
  502. if (!ret)
  503. returnCode = -1;
  504. return;
  505. }
  506. bool CWsPackageProcessEx::onDeletePackage(IEspContext &context, IEspDeletePackageRequest &req, IEspDeletePackageResponse &resp)
  507. {
  508. int returnCode = 0;
  509. StringBuffer returnMsg;
  510. IArrayOf<IConstPackageMapEntry>& packageMaps = req.getPackageMaps();
  511. ForEachItemIn(p, packageMaps)
  512. {
  513. IConstPackageMapEntry& item=packageMaps.item(p);
  514. if (!item.getId() || !*item.getId())
  515. {
  516. returnMsg.appendf("PackageMap[%d]: Package map Id not specified; ", p);
  517. continue;
  518. }
  519. if (!item.getTarget() || !*item.getTarget())
  520. {
  521. returnMsg.appendf("PackageMap[%d]: Target not specified;", p);
  522. continue;
  523. }
  524. StringBuffer target, processName, packageMap;
  525. packageMap.set(item.getId());
  526. target.set(item.getTarget());
  527. if (!item.getProcess() || !*item.getProcess())
  528. processName.set("*");
  529. else
  530. processName.set(item.getProcess());
  531. deletePackage(packageMap.str(), target.str(), processName.str(), req.getGlobalScope(), returnMsg, returnCode);
  532. }
  533. if (!packageMaps.length())
  534. {
  535. StringAttr pkgMap(req.getPackageMap());
  536. StringAttr processName(req.getProcess());
  537. if (!processName.length())
  538. processName.set("*");
  539. deletePackage(pkgMap.get(), req.getTarget(), processName.get(), req.getGlobalScope(), returnMsg, returnCode);
  540. }
  541. resp.updateStatus().setDescription(returnMsg.str());
  542. resp.updateStatus().setCode(returnCode);
  543. return true;
  544. }
  545. bool CWsPackageProcessEx::onActivatePackage(IEspContext &context, IEspActivatePackageRequest &req, IEspActivatePackageResponse &resp)
  546. {
  547. resp.updateStatus().setCode(0);
  548. activatePackageMapInfo(req.getTarget(), req.getPackageMap(), req.getProcess(), req.getGlobalScope(), true);
  549. return true;
  550. }
  551. bool CWsPackageProcessEx::onDeActivatePackage(IEspContext &context, IEspDeActivatePackageRequest &req, IEspDeActivatePackageResponse &resp)
  552. {
  553. resp.updateStatus().setCode(0);
  554. activatePackageMapInfo(req.getTarget(), req.getPackageMap(), req.getProcess(), req.getGlobalScope(), false);
  555. return true;
  556. }
  557. bool CWsPackageProcessEx::onListPackage(IEspContext &context, IEspListPackageRequest &req, IEspListPackageResponse &resp)
  558. {
  559. Owned<IPropertyTree> packageMaps = packageMapAndSet.getPackageMaps();
  560. if (!packageMaps)
  561. throw MakeStringException(PKG_DALI_LOOKUP_ERROR, "Unable to retrieve information about package maps from dali server");
  562. resp.updateStatus().setCode(0);
  563. IArrayOf<IConstPackageListMapData> results;
  564. StringAttr process(req.getProcess());
  565. listPkgInfo(context.getClientVersion(), req.getTarget(), process.length() ? process.get() : "*", packageMaps, &results);
  566. resp.setPkgListMapData(results);
  567. return true;
  568. }
  569. bool CWsPackageProcessEx::onListPackages(IEspContext &context, IEspListPackagesRequest &req, IEspListPackagesResponse &resp)
  570. {
  571. Owned<IPropertyTree> packageMaps = packageMapAndSet.getPackageMaps();
  572. if (!packageMaps)
  573. throw MakeStringException(PKG_DALI_LOOKUP_ERROR, "Unable to retrieve information about package maps from dali server");
  574. double version = context.getClientVersion();
  575. const char* targetReq = req.getTarget();
  576. const char* processReq = req.getProcess();
  577. const char* processFilterReq = req.getProcessFilter();
  578. IArrayOf<IConstPackageListMapData> results;
  579. if ((!processReq || !*processReq) && (processFilterReq && *processFilterReq))
  580. listPkgInfo(version, targetReq, processFilterReq, packageMaps, &results);
  581. else
  582. {
  583. Owned<IPropertyTree> pkgSetRegistryRoot = packageMapAndSet.getPackageSets();
  584. if (!pkgSetRegistryRoot)
  585. throw MakeStringException(PKG_DALI_LOOKUP_ERROR, "Unable to retrieve information about package sets from dali server");
  586. Owned<IPropertyTreeIterator> iter = pkgSetRegistryRoot->getElements("PackageSet");
  587. ForEach(*iter)
  588. {
  589. try
  590. {
  591. Owned<IPropertyTree> pkgSetRegistry= &iter->get();
  592. StringBuffer process;
  593. pkgSetRegistry->getProp("@process", process);
  594. if (process.length() && (streq(process.str(), "*") || WildMatch(process.str(), processReq, true)))
  595. listPkgInfo(version, targetReq, process.str(), packageMaps, pkgSetRegistry, &results);
  596. }
  597. catch(IException* e)
  598. {
  599. int err = e->errorCode();
  600. //Dali throws an exception if packagemap is not available for a process.
  601. if (err == PKG_DALI_LOOKUP_ERROR)
  602. e->Release();
  603. else
  604. throw e;
  605. }
  606. }
  607. if ((version >=1.01) && processReq && *processReq)
  608. {//Show warning if multiple packages are active for the same target.
  609. ForEachItemIn(i, results)
  610. {
  611. IEspPackageListMapData& r1 = (IEspPackageListMapData&) results.item(i);
  612. if (!r1.getActive())
  613. continue;
  614. const char* target1 = r1.getTarget();
  615. for (unsigned ii = i+1; ii<results.length(); ++ii)
  616. {
  617. IEspPackageListMapData& r2 = (IEspPackageListMapData&) results.item(ii);
  618. if (!r2.getActive())
  619. continue;
  620. if (!streq(target1, r2.getTarget()))
  621. continue;
  622. StringBuffer warning;
  623. warning.appendf("Error: package %s is also active.", r1.getId());
  624. r2.setDescription(warning.str());
  625. }
  626. }
  627. }
  628. }
  629. resp.setPackageMapList(results);
  630. resp.updateStatus().setCode(0);
  631. return true;
  632. }
  633. bool CWsPackageProcessEx::onGetPackage(IEspContext &context, IEspGetPackageRequest &req, IEspGetPackageResponse &resp)
  634. {
  635. Owned<IPropertyTree> packageMaps = packageMapAndSet.getPackageMaps();
  636. if (!packageMaps)
  637. throw MakeStringException(PKG_DALI_LOOKUP_ERROR, "Unable to retrieve information about package maps from dali server");
  638. resp.updateStatus().setCode(0);
  639. StringAttr process(req.getProcess());
  640. StringBuffer info;
  641. getPkgInfo(packageMaps, req.getTarget(), process.length() ? process.get() : "*", info);
  642. resp.setInfo(info);
  643. return true;
  644. }
  645. bool CWsPackageProcessEx::onGetPackageMapById(IEspContext &context, IEspGetPackageMapByIdRequest &req, IEspGetPackageMapByIdResponse &resp)
  646. {
  647. try
  648. {
  649. const char* pkgMapId = req.getPackageMapId();
  650. if (!pkgMapId && !*pkgMapId)
  651. throw MakeStringException(PKG_MISSING_PARAM, "PackageMap Id not specified");
  652. StringBuffer info;
  653. Owned<IPropertyTree> tree = createPTree("PackageMaps");
  654. getPkgInfoById(pkgMapId, tree);
  655. toXML(tree, info);
  656. resp.setInfo(info.str());
  657. resp.updateStatus().setCode(0);
  658. }
  659. catch (IException *e)
  660. {
  661. StringBuffer retMsg;
  662. resp.updateStatus().setDescription(e->errorMessage(retMsg).str());
  663. resp.updateStatus().setCode(-1);
  664. }
  665. return true;
  666. }
  667. bool CWsPackageProcessEx::onValidatePackage(IEspContext &context, IEspValidatePackageRequest &req, IEspValidatePackageResponse &resp)
  668. {
  669. StringArray warnings;
  670. StringArray errors;
  671. StringArray unmatchedQueries;
  672. StringArray unusedPackages;
  673. StringArray unmatchedFiles;
  674. Owned<IHpccPackageSet> set;
  675. Owned<IPropertyTree> mapTree;
  676. const char *target = req.getTarget();
  677. if (!target || !*target)
  678. throw MakeStringException(PKG_TARGET_NOT_DEFINED, "Target cluster required");
  679. Owned<IConstWUClusterInfo> clusterInfo = getTargetClusterInfo(target);
  680. if (!clusterInfo)
  681. throw MakeStringException(PKG_TARGET_NOT_DEFINED, "Target cluster not found");
  682. SCMStringBuffer process;
  683. clusterInfo->getRoxieProcess(process);
  684. if (!process.length())
  685. throw MakeStringException(PKG_TARGET_NOT_DEFINED, "Roxie process not found");
  686. const char* pmID = req.getPMID();
  687. const char* info = req.getInfo();
  688. if (req.getActive()) //validate active map
  689. {
  690. mapTree.setown(resolveActivePackageMap(process.str(), target, true));
  691. if (!mapTree)
  692. throw MakeStringException(PKG_PACKAGEMAP_NOT_FOUND, "Active package map not found");
  693. }
  694. else if (pmID && *pmID)
  695. {
  696. mapTree.setown(getPackageMapById(req.getGlobalScope() ? NULL : target, pmID, true));
  697. if (!mapTree)
  698. throw MakeStringException(PKG_PACKAGEMAP_NOT_FOUND, "Package map %s not found", pmID);
  699. }
  700. else if (info && *info)
  701. {
  702. mapTree.setown(createPTreeFromXMLString(info));
  703. if (!mapTree)
  704. throw MakeStringException(PKG_LOAD_PACKAGEMAP_FAILED, "Error processing package file content");
  705. }
  706. else
  707. {
  708. throw MakeStringException(PKG_PACKAGEMAP_NOT_FOUND, "package map not specified");
  709. }
  710. if (req.getCheckDFS())
  711. {
  712. Owned<IReferencedFileList> pmfiles = createReferencedFileList(context.queryUserId(), context.queryPassword(), true, false);
  713. pmfiles->addFilesFromPackageMap(mapTree);
  714. pmfiles->resolveFiles(process.str(), NULL, NULL, NULL, true, false, false);
  715. Owned<IReferencedFileIterator> files = pmfiles->getFiles();
  716. StringArray notInDFS;
  717. ForEach(*files)
  718. {
  719. IReferencedFile &file = files->query();
  720. if (file.getFlags() & RefFileNotFound)
  721. notInDFS.append(file.getLogicalName());
  722. }
  723. resp.updateFiles().setNotInDFS(notInDFS);
  724. }
  725. const char *id = mapTree->queryProp("@id");
  726. Owned<IHpccPackageMap> map = createPackageMapFromPtree(mapTree, target, id);
  727. if (!map)
  728. throw MakeStringException(PKG_LOAD_PACKAGEMAP_FAILED, "Error loading package map %s", id);
  729. StringArray queriesToVerify;
  730. const char *queryid = req.getQueryIdToVerify();
  731. if (queryid && *queryid)
  732. queriesToVerify.append(queryid);
  733. ForEachItemIn(i, req.getQueriesToVerify())
  734. {
  735. queryid = req.getQueriesToVerify().item(i);
  736. if (queryid && *queryid)
  737. queriesToVerify.appendUniq(queryid);
  738. }
  739. map->validate(queriesToVerify, warnings, errors, unmatchedQueries, unusedPackages, unmatchedFiles);
  740. resp.setPMID(map->queryPackageId());
  741. resp.setWarnings(warnings);
  742. resp.setErrors(errors);
  743. resp.updateQueries().setUnmatched(unmatchedQueries);
  744. resp.updatePackages().setUnmatched(unusedPackages);
  745. resp.updateFiles().setUnmatched(unmatchedFiles);
  746. resp.updateStatus().setCode(0);
  747. return true;
  748. }
  749. bool CWsPackageProcessEx::onGetPackageMapSelectOptions(IEspContext &context, IEspGetPackageMapSelectOptionsRequest &req, IEspGetPackageMapSelectOptionsResponse &resp)
  750. {
  751. try
  752. {
  753. bool includeTargets = req.getIncludeTargets();
  754. bool includeProcesses = req.getIncludeProcesses();
  755. if (includeTargets || includeProcesses)
  756. {
  757. Owned<IEnvironmentFactory> factory = getEnvironmentFactory();
  758. Owned<IConstEnvironment> env = factory->openEnvironment();
  759. if (!env)
  760. throw MakeStringException(PKG_DALI_LOOKUP_ERROR,"Failed to get environment information.");
  761. Owned<IPropertyTree> root = &env->getPTree();
  762. IArrayOf<IConstTargetData> targets;
  763. CConstWUClusterInfoArray clusters;
  764. getEnvironmentClusterInfo(root, clusters);
  765. ForEachItemIn(c, clusters)
  766. {
  767. SCMStringBuffer str;
  768. IConstWUClusterInfo &cluster = clusters.item(c);
  769. Owned<IEspTargetData> target = createTargetData("", "");
  770. target->setName(cluster.getName(str).str());
  771. ClusterType clusterType = cluster.getPlatform();
  772. if (clusterType == ThorLCRCluster)
  773. target->setType(THORCLUSTER);
  774. else if (clusterType == RoxieCluster)
  775. target->setType(ROXIECLUSTER);
  776. else
  777. target->setType(HTHORCLUSTER);
  778. if (!includeProcesses)
  779. {
  780. targets.append(*target.getClear());
  781. continue;
  782. }
  783. StringArray processes;
  784. if (clusterType == ThorLCRCluster)
  785. {
  786. const StringArray &thors = cluster.getThorProcesses();
  787. ForEachItemIn(i, thors)
  788. {
  789. const char* process = thors.item(i);
  790. if (process && *process)
  791. processes.append(process);
  792. }
  793. }
  794. else if (clusterType == RoxieCluster)
  795. {
  796. SCMStringBuffer process;
  797. cluster.getRoxieProcess(process);
  798. if (process.length())
  799. processes.append(process.str());
  800. }
  801. else if (clusterType == HThorCluster)
  802. {
  803. SCMStringBuffer process;
  804. cluster.getAgentQueue(process);
  805. if (process.length())
  806. processes.append(process.str());
  807. }
  808. if (processes.length())
  809. target->setProcesses(processes);
  810. targets.append(*target.getClear());
  811. }
  812. resp.setTargets(targets);
  813. }
  814. if (req.getIncludeProcessFilters())
  815. {
  816. StringArray processFilters;
  817. processFilters.append("*");
  818. Owned<IPropertyTree> pkgSets = packageMapAndSet.getPackageSets();
  819. if (pkgSets)
  820. {
  821. Owned<IPropertyTreeIterator> iter = pkgSets->getElements("PackageSet");
  822. ForEach(*iter)
  823. {
  824. StringBuffer process;
  825. iter->query().getProp("@process", process);
  826. if (process.length() && !processFilters.contains(process.str()))
  827. processFilters.append(process.str());
  828. }
  829. }
  830. resp.setProcessFilters(processFilters);
  831. }
  832. resp.updateStatus().setCode(0);
  833. }
  834. catch (IException *e)
  835. {
  836. StringBuffer retMsg;
  837. resp.updateStatus().setDescription(e->errorMessage(retMsg).str());
  838. resp.updateStatus().setCode(-1);
  839. }
  840. return true;
  841. }
  842. bool CWsPackageProcessEx::onGetQueryFileMapping(IEspContext &context, IEspGetQueryFileMappingRequest &req, IEspGetQueryFileMappingResponse &resp)
  843. {
  844. const char *queryname = req.getQueryName();
  845. if (!queryname || !*queryname)
  846. throw MakeStringException(PKG_INVALID_QUERY_NAME, "Query name required");
  847. const char *target = req.getTarget();
  848. if (!target || !*target)
  849. throw MakeStringException(PKG_TARGET_NOT_DEFINED, "Target cluster required");
  850. Owned<IConstWUClusterInfo> clusterInfo = getTargetClusterInfo(target);
  851. if (!clusterInfo)
  852. throw MakeStringException(PKG_TARGET_NOT_DEFINED, "Unable to find target cluster");
  853. if (clusterInfo->getPlatform()!=RoxieCluster)
  854. throw MakeStringException(PKG_INVALID_CLUSTER_TYPE, "Roxie target required");
  855. Owned<IHpccPackageSet> set;
  856. Owned<IHpccPackageMap> ownedmap;
  857. const IHpccPackageMap *map = NULL;
  858. const char *pmid = req.getPMID();
  859. if (pmid && *pmid)
  860. {
  861. Owned<IPropertyTree> pm = getPackageMapById(req.getGlobalScope() ? NULL : target, pmid, true);
  862. ownedmap.setown(createPackageMapFromPtree(pm, target, pmid));
  863. if (!ownedmap)
  864. throw MakeStringException(PKG_LOAD_PACKAGEMAP_FAILED, "Error loading package map %s", req.getPMID());
  865. map = ownedmap;
  866. }
  867. else
  868. {
  869. SCMStringBuffer process;
  870. clusterInfo->getRoxieProcess(process);
  871. set.setown(createPackageSet(process.str()));
  872. if (!set)
  873. throw MakeStringException(PKG_CREATE_PACKAGESET_FAILED, "Unable to create PackageSet");
  874. map = set->queryActiveMap(target);
  875. if (!map)
  876. throw MakeStringException(PKG_PACKAGEMAP_NOT_FOUND, "Active package map not found");
  877. }
  878. Owned<IPropertyTree> fileInfo = createPTree();
  879. map->gatherFileMappingForQuery(queryname, fileInfo);
  880. StringArray unmappedFiles;
  881. Owned<IPropertyTreeIterator> it = fileInfo->getElements("File");
  882. ForEach(*it)
  883. unmappedFiles.append(it->query().queryProp(NULL));
  884. resp.setUnmappedFiles(unmappedFiles);
  885. IArrayOf<IEspSuperFile> superArray;
  886. it.setown(fileInfo->getElements("SuperFile"));
  887. ForEach(*it)
  888. {
  889. IPropertyTree &superTree = it->query();
  890. Owned<IEspSuperFile> superItem = createSuperFile();
  891. superItem->setName(superTree.queryProp("@name"));
  892. StringArray subArray;
  893. Owned<IPropertyTreeIterator> subfiles = superTree.getElements("SubFile");
  894. ForEach(*subfiles)
  895. subArray.append(subfiles->query().queryProp(NULL));
  896. superItem->setSubFiles(subArray);
  897. superArray.append(*superItem.getClear());
  898. }
  899. resp.setSuperFiles(superArray);
  900. return true;
  901. }
  902. int CWsPackageProcessSoapBindingEx::onFinishUpload(IEspContext &ctx, CHttpRequest* request, CHttpResponse* response,
  903. const char *service, const char *method, StringArray& fileNames, StringArray& files, IMultiException *meIn)
  904. {
  905. if (meIn && (meIn->ordinality() > 0))
  906. {
  907. StringBuffer msg;
  908. WARNLOG("Exception(s) in EspHttpBinding::onFinishUpload - %s", meIn->errorMessage(msg).append('\n').str());
  909. if ((ctx.getResponseFormat() == ESPSerializationXML) || (ctx.getResponseFormat() == ESPSerializationJSON))
  910. {
  911. response->handleExceptions(NULL, meIn, "FileSpray", "UploadFile", NULL);
  912. return 0;
  913. }
  914. else
  915. return EspHttpBinding::onFinishUpload(ctx, request, response, service, method, fileNames, files, meIn);
  916. }
  917. StringBuffer respStr;
  918. Owned<IEspWsPackageProcess> iserv = (IEspWsPackageProcess*)getService();
  919. if(iserv == NULL)
  920. {
  921. WARNLOG("Exception(s) in %s::%s - Service not available", service, method);
  922. respStr.append("{\"Code\":-1,\"Exception\":\"Service not available\"}");
  923. }
  924. else
  925. {
  926. checkRequest(ctx);
  927. Owned<CAddPackageRequest> esp_request = new CAddPackageRequest(&ctx, "WsPackageProcess", request->queryParameters(), request->queryAttachments());
  928. Owned<CAddPackageResponse> esp_response = new CAddPackageResponse("WsPackageProcess");
  929. StringBuffer source;
  930. source.setf("WsPackageProcess::%s()", method);
  931. Owned<IMultiException> me = MakeMultiException(source.str());
  932. try
  933. {
  934. if (!files.length())
  935. throw MakeStringExceptionDirect(PKG_INFO_NOT_DEFINED, "Package content not found");
  936. esp_request->setInfo(files.item(0));
  937. iserv->onAddPackage(ctx, *esp_request.get(), *esp_response.get());
  938. }
  939. catch (IMultiException* mex)
  940. {
  941. me->append(*mex);
  942. mex->Release();
  943. }
  944. catch (IException* e)
  945. {
  946. me->append(*e);
  947. }
  948. catch (...)
  949. {
  950. me->append(*MakeStringExceptionDirect(-1, "Unknown Exception"));
  951. }
  952. if (!me->ordinality())
  953. {
  954. respStr.append("{\"Code\":0,\"Description\":\"Package Map added\"}");
  955. }
  956. else
  957. {
  958. StringBuffer msg;
  959. WARNLOG("Exception(s) in %s::%s - %s", service, method, me->errorMessage(msg).str());
  960. respStr.appendf("{\"Code\":-1,\"Exception\":\"%s\"}", msg.str());
  961. }
  962. }
  963. response->setContent(respStr.str());
  964. response->setContentType(HTTP_TYPE_APPLICATION_JSON_UTF8);
  965. response->send();
  966. return 0;
  967. }