Files
cloudpods/pkg/notify/models/topic.go
2022-03-01 17:21:24 +08:00

629 lines
21 KiB
Go

// Copyright 2019 Yunion
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package models
import (
"context"
"fmt"
"strings"
"sync"
"yunion.io/x/jsonutils"
"yunion.io/x/log"
"yunion.io/x/pkg/errors"
"yunion.io/x/pkg/tristate"
"yunion.io/x/pkg/util/sets"
"yunion.io/x/sqlchemy"
"yunion.io/x/onecloud/pkg/apis/notify"
"yunion.io/x/onecloud/pkg/cloudcommon/db"
"yunion.io/x/onecloud/pkg/httperrors"
"yunion.io/x/onecloud/pkg/mcclient"
"yunion.io/x/onecloud/pkg/util/bitmap"
"yunion.io/x/onecloud/pkg/util/stringutils2"
)
func parseEvent(es string) (notify.SNotifyEvent, error) {
es = strings.ToLower(es)
ess := strings.Split(es, notify.DelimiterInEvent)
if len(ess) != 2 && len(ess) != 3 {
return notify.SNotifyEvent{}, fmt.Errorf("invalid event string %q", es)
}
event := notify.Event.WithResourceType(ess[0]).WithAction(notify.SAction(ess[1]))
if len(ess) == 3 {
event = event.WithResult(notify.SResult(ess[2]))
}
return event, nil
}
type STopicManager struct {
db.SStandaloneResourceBaseManager
db.SEnabledResourceBaseManager
}
var TopicManager *STopicManager
func init() {
TopicManager = &STopicManager{
SStandaloneResourceBaseManager: db.NewStandaloneResourceBaseManager(
STopic{},
"topic_tbl",
"topic",
"topics",
),
}
TopicManager.SetVirtualObject(TopicManager)
}
type STopic struct {
db.SStandaloneResourceBase
db.SEnabledResourceBase
Type string `width:"20" nullable:"false" create:"required" update:"user" list:"user"`
Resources uint64 `nullable:"false"`
Actions uint32 `nullable:"false"`
Results uint8 `nullable:"false"`
AdvanceDays int `nullable:"false"`
WebconsoleDisable tristate.TriState
}
const (
DefaultResourceCreateDelete = "resource create or delete"
DefaultResourceChangeConfig = "resource change config"
DefaultResourceUpdate = "resource update"
DefaultResourceReleaseDue1Day = "resource release due 1 day"
DefaultResourceReleaseDue3Day = "resource release due 3 day"
DefaultResourceReleaseDue30Day = "resource release due 30 day"
DefaultScheduledTaskExecute = "scheduled task execute"
DefaultScalingPolicyExecute = "scaling policy execute"
DefaultSnapshotPolicyExecute = "snapshot policy execute"
DefaultResourceOperationFailed = "resource operation failed"
DefaultResourceSync = "resource sync"
DefaultSystemExceptionEvent = "system exception event"
)
func (sm *STopicManager) InitializeData() error {
initSNames := sets.NewString(
DefaultResourceCreateDelete,
DefaultResourceChangeConfig,
DefaultResourceUpdate,
DefaultResourceReleaseDue1Day,
DefaultResourceReleaseDue3Day,
DefaultResourceReleaseDue30Day,
DefaultScheduledTaskExecute,
DefaultScalingPolicyExecute,
DefaultSnapshotPolicyExecute,
DefaultResourceOperationFailed,
DefaultResourceSync,
DefaultSystemExceptionEvent,
)
q := sm.Query()
topics := make([]STopic, 0, initSNames.Len())
err := db.FetchModelObjects(sm, q, &topics)
if err != nil {
return errors.Wrap(err, "unable to FetchModelObjects")
}
nameTopicMap := make(map[string]*STopic, len(topics))
for i := range topics {
t := &topics[i]
initSNames.Delete(t.Name)
nameTopicMap[t.Name] = t
}
for _, name := range initSNames.UnsortedList() {
nameTopicMap[name] = nil
}
ctx := context.Background()
for name, topic := range nameTopicMap {
t := new(STopic)
t.Name = name
t.Enabled = tristate.True
switch name {
case DefaultResourceCreateDelete:
t.addResources(
notify.TOPIC_RESOURCE_SERVER,
notify.TOPIC_RESOURCE_SCALINGGROUP,
notify.TOPIC_RESOURCE_IMAGE,
notify.TOPIC_RESOURCE_DISK,
notify.TOPIC_RESOURCE_SNAPSHOT,
notify.TOPIC_RESOURCE_INSTANCESNAPSHOT,
notify.TOPIC_RESOURCE_SNAPSHOTPOLICY,
notify.TOPIC_RESOURCE_NETWORK,
notify.TOPIC_RESOURCE_EIP,
notify.TOPIC_RESOURCE_LOADBALANCER,
notify.TOPIC_RESOURCE_LOADBALANCERACL,
notify.TOPIC_RESOURCE_LOADBALANCERCERTIFICATE,
notify.TOPIC_RESOURCE_BUCKET,
notify.TOPIC_RESOURCE_DBINSTANCE,
notify.TOPIC_RESOURCE_ELASTICCACHE,
notify.TOPIC_RESOURCE_BAREMETAL,
notify.TOPIC_RESOURCE_SECGROUP,
notify.TOPIC_RESOURCE_FILESYSTEM,
notify.TOPIC_RESOURCE_NATGATEWAY,
notify.TOPIC_RESOURCE_VPC,
notify.TOPIC_RESOURCE_CDNDOMAIN,
notify.TOPIC_RESOURCE_WAF,
notify.TOPIC_RESOURCE_KAFKA,
notify.TOPIC_RESOURCE_ELASTICSEARCH,
notify.TOPIC_RESOURCE_MONGODB,
notify.TOPIC_RESOURCE_DNSZONE,
notify.TOPIC_RESOURCE_DNSRECORDSET,
notify.TOPIC_RESOURCE_LOADBALANCERLISTENER,
notify.TOPIC_RESOURCE_LOADBALANCERBACKEDNGROUP,
)
t.addAction(
notify.ActionCreate,
notify.ActionDelete,
notify.ActionPendingDelete,
)
t.Type = notify.TOPIC_TYPE_RESOURCE
case DefaultResourceChangeConfig:
t.addResources(
notify.TOPIC_RESOURCE_SERVER,
notify.TOPIC_RESOURCE_DBINSTANCE,
notify.TOPIC_RESOURCE_ELASTICCACHE,
)
t.addAction(notify.ActionChangeConfig)
t.Type = notify.TOPIC_TYPE_RESOURCE
case DefaultResourceUpdate:
t.addResources(
notify.TOPIC_RESOURCE_SERVER,
notify.TOPIC_RESOURCE_DBINSTANCE,
notify.TOPIC_RESOURCE_ELASTICCACHE,
)
t.addAction(notify.ActionUpdate)
t.addAction(notify.ActionRebuildRoot)
t.addAction(notify.ActionResetPassword)
t.addAction(notify.ActionChangeIpaddr)
t.Type = notify.TOPIC_TYPE_RESOURCE
case DefaultResourceReleaseDue1Day:
t.addResources(
notify.TOPIC_RESOURCE_SERVER,
notify.TOPIC_RESOURCE_DISK,
notify.TOPIC_RESOURCE_EIP,
notify.TOPIC_RESOURCE_LOADBALANCER,
notify.TOPIC_RESOURCE_DBINSTANCE,
notify.TOPIC_RESOURCE_ELASTICCACHE,
)
t.addAction(notify.ActionExpiredRelease)
t.Type = notify.TOPIC_TYPE_RESOURCE
t.AdvanceDays = 1
case DefaultResourceReleaseDue3Day:
t.addResources(
notify.TOPIC_RESOURCE_SERVER,
notify.TOPIC_RESOURCE_DISK,
notify.TOPIC_RESOURCE_EIP,
notify.TOPIC_RESOURCE_LOADBALANCER,
notify.TOPIC_RESOURCE_DBINSTANCE,
notify.TOPIC_RESOURCE_ELASTICCACHE,
)
t.addAction(notify.ActionExpiredRelease)
t.Type = notify.TOPIC_TYPE_RESOURCE
t.AdvanceDays = 3
case DefaultResourceReleaseDue30Day:
t.addResources(
notify.TOPIC_RESOURCE_SERVER,
notify.TOPIC_RESOURCE_LOADBALANCER,
notify.TOPIC_RESOURCE_DBINSTANCE,
notify.TOPIC_RESOURCE_ELASTICCACHE,
)
t.addAction(notify.ActionExpiredRelease)
t.Type = notify.TOPIC_TYPE_RESOURCE
t.AdvanceDays = 30
case DefaultScheduledTaskExecute:
t.addResources(notify.TOPIC_RESOURCE_SCHEDULEDTASK)
t.addAction(notify.ActionExecute)
t.Type = notify.TOPIC_TYPE_AUTOMATED_PROCESS
case DefaultScalingPolicyExecute:
t.addResources(notify.TOPIC_RESOURCE_SCALINGPOLICY)
t.addAction(notify.ActionExecute)
t.Type = notify.TOPIC_TYPE_AUTOMATED_PROCESS
case DefaultSnapshotPolicyExecute:
t.addResources(notify.TOPIC_RESOURCE_SNAPSHOTPOLICY)
t.addAction(notify.ActionExecute)
t.Type = notify.TOPIC_TYPE_AUTOMATED_PROCESS
case DefaultResourceOperationFailed:
t.addResources(
notify.TOPIC_RESOURCE_SERVER,
notify.TOPIC_RESOURCE_EIP,
notify.TOPIC_RESOURCE_LOADBALANCER,
notify.TOPIC_RESOURCE_DBINSTANCE,
notify.TOPIC_RESOURCE_ELASTICCACHE,
)
t.addAction(
notify.ActionCreate,
notify.ActionSyncStatus,
notify.ActionRebuildRoot,
notify.ActionChangeConfig,
notify.ActionCreateBackupServer,
notify.ActionDelBackupServer,
notify.ActionMigrate,
)
t.Type = notify.TOPIC_TYPE_RESOURCE
case DefaultResourceSync:
t.addResources(
notify.TOPIC_RESOURCE_SERVER,
notify.TOPIC_RESOURCE_DISK,
notify.TOPIC_RESOURCE_DBINSTANCE,
notify.TOPIC_RESOURCE_ELASTICCACHE,
notify.TOPIC_RESOURCE_LOADBALANCER,
notify.TOPIC_RESOURCE_EIP,
notify.TOPIC_RESOURCE_VPC,
notify.TOPIC_RESOURCE_NETWORK,
notify.TOPIC_RESOURCE_LOADBALANCERCERTIFICATE,
notify.TOPIC_RESOURCE_DNSZONE,
notify.TOPIC_RESOURCE_NATGATEWAY,
notify.TOPIC_RESOURCE_BUCKET,
notify.TOPIC_RESOURCE_FILESYSTEM,
notify.TOPIC_RESOURCE_WEBAPP,
notify.TOPIC_RESOURCE_CDNDOMAIN,
notify.TOPIC_RESOURCE_WAF,
notify.TOPIC_RESOURCE_KAFKA,
notify.TOPIC_RESOURCE_ELASTICSEARCH,
notify.TOPIC_RESOURCE_MONGODB,
notify.TOPIC_RESOURCE_DNSRECORDSET,
notify.TOPIC_RESOURCE_LOADBALANCERLISTENER,
notify.TOPIC_RESOURCE_LOADBALANCERBACKEDNGROUP,
)
t.addAction(
notify.ActionSyncCreate,
notify.ActionSyncUpdate,
notify.ActionSyncDelete,
)
t.Type = notify.TOPIC_TYPE_RESOURCE
t.WebconsoleDisable = tristate.True
case DefaultSystemExceptionEvent:
t.addResources(
notify.TOPIC_RESOURCE_HOST,
notify.TOPIC_RESOURCE_TASK,
)
t.addAction(
notify.ActionSystemPanic,
notify.ActionSystemException,
notify.ActionOffline,
)
t.Type = notify.TOPIC_TYPE_RESOURCE
}
if topic == nil {
err := sm.TableSpec().Insert(ctx, t)
if err != nil {
return errors.Wrapf(err, "unable to insert %s", name)
}
} else {
_, err := db.Update(topic, func() error {
topic.Resources = t.Resources
topic.Actions = t.Actions
topic.Type = t.Type
topic.WebconsoleDisable = t.WebconsoleDisable
return nil
})
if err != nil {
return errors.Wrapf(err, "unable to update topic %s", topic.Name)
}
}
}
return nil
}
func (sm *STopicManager) ListItemFilter(ctx context.Context, q *sqlchemy.SQuery, userCred mcclient.TokenCredential, input notify.TopicListInput) (*sqlchemy.SQuery, error) {
q, err := sm.SStandaloneResourceBaseManager.ListItemFilter(ctx, q, userCred, input.StandaloneResourceListInput)
if err != nil {
return nil, errors.Wrap(err, "SStandaloneResourceBaseManager.ListItemFilter")
}
q, err = sm.SEnabledResourceBaseManager.ListItemFilter(ctx, q, userCred, input.EnabledResourceBaseListInput)
if err != nil {
return nil, errors.Wrap(err, "SEnabledResourceBaseManager.ListItemFilter")
}
return q, nil
}
func (sm *STopicManager) FetchCustomizeColumns(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, objs []interface{}, fields stringutils2.SSortedStrings, isList bool) []notify.TopicDetails {
sRows := sm.SStandaloneResourceBaseManager.FetchCustomizeColumns(ctx, userCred, query, objs, fields, isList)
rows := make([]notify.TopicDetails, len(objs))
for i := range rows {
rows[i].StandaloneResourceDetails = sRows[i]
ss := objs[i].(*STopic)
rows[i].Resources = ss.getResources()
}
return rows
}
type SSubscriberDis struct {
SSubscriber
ReceiverName string `json:"receiver_name"`
RoleName string `json:"role_name"`
}
func (s *STopic) subscriptionReceiverDiss() ([]SSubscriberDis, error) {
q := SubscriberManager.Query().Equals("subscription_id", s.Id)
rq := ReceiverManager.Query("id", "name").SubQuery()
roq := db.RoleCacheManager.Query("id", "name").SubQuery()
q = q.LeftJoin(rq, sqlchemy.Equals(q.Field("receiver"), rq.Field("id")))
q = q.LeftJoin(roq, sqlchemy.Equals(q.Field("receiver"), roq.Field("id")))
// It looks strange, but the order of append cannot be changed
q.AppendField(q.QueryFields()...)
q.AppendField(rq.Field("name", "receiver_name"))
q.AppendField(roq.Field("name", "role_name"))
srs := make([]SSubscriberDis, 0)
err := q.All(&srs)
if err != nil {
return nil, errors.Wrap(err, "unable to fetch All")
}
return srs, nil
}
func (sm *STopicManager) ValidateCreateData(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, query jsonutils.JSONObject, input jsonutils.JSONObject) (jsonutils.JSONObject, error) {
return nil, httperrors.NewForbiddenError("prohibit creation")
}
func (ss *STopic) ValidateUpdateData(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input jsonutils.JSONObject) (jsonutils.JSONObject, error) {
return input, httperrors.NewForbiddenError("update prohibited")
}
func (ss *STopic) ValidateDeleteCondition(ctx context.Context, info jsonutils.JSONObject) error {
return httperrors.NewForbiddenError("prohibit deletion")
}
func (s *STopic) addResources(resources ...string) {
for _, resource := range resources {
v := converter.resourceValue(resource)
if v < 0 {
continue
}
s.Resources += 1 << v
}
}
func (s *STopic) addAction(actions ...notify.SAction) {
for _, action := range actions {
v := converter.actionValue(action)
if v < 0 {
continue
}
s.Actions += 1 << v
}
}
func (s *STopic) getResources() []string {
vs := bitmap.Uint64ToIntArray(s.Resources)
resources := make([]string, 0, len(vs))
for _, v := range vs {
resources = append(resources, converter.resource(v))
}
return resources
}
func (s *STopic) getActions() []notify.SAction {
vs := bitmap.Uint2IntArray(s.Actions)
actions := make([]notify.SAction, 0, len(vs))
for _, v := range vs {
actions = append(actions, converter.action(v))
}
return actions
}
func (sm *STopicManager) TopicsByEvent(eventStr string, advanceDays int) ([]STopic, error) {
event, err := parseEvent(eventStr)
if err != nil {
return nil, errors.Wrapf(err, "unable to parse event %q", event)
}
resourceV := converter.resourceValue(event.ResourceType())
if resourceV < 0 {
log.Warningf("unknown resource type: %s", event.ResourceType())
return nil, nil
}
actionV := converter.actionValue(event.Action())
if actionV < 0 {
log.Warningf("unknown action type: %s", event.Action())
return nil, nil
}
q := sm.Query().Equals("advance_days", advanceDays)
q = q.Filter(sqlchemy.GT(sqlchemy.AND_Val("", q.Field("resources"), 1<<resourceV), 0))
q = q.Filter(sqlchemy.GT(sqlchemy.AND_Val("", q.Field("actions"), 1<<actionV), 0))
var topics []STopic
err = db.FetchModelObjects(sm, q, &topics)
if err != nil {
return nil, errors.Wrap(err, "unable to FetchModelObjects")
}
return topics, nil
}
func (t *STopic) AllowPerformEnable(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input notify.PerformEnableInput) bool {
return db.IsAdminAllowPerform(userCred, t, "enable")
}
func (t *STopic) PreCheckPerformAction(
ctx context.Context, userCred mcclient.TokenCredential,
action string, query jsonutils.JSONObject, data jsonutils.JSONObject,
) error {
if err := t.SStandaloneResourceBase.PreCheckPerformAction(ctx, userCred, action, query, data); err != nil {
return err
}
if action == "enable" || action == "disable" {
if !db.IsAdminAllowPerform(userCred, t, action) {
return httperrors.NewForbiddenError("only allow admin to perform enable operations")
}
}
return nil
}
func (t *STopic) PerformEnable(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input notify.PerformEnableInput) (jsonutils.JSONObject, error) {
err := db.EnabledPerformEnable(t, ctx, userCred, true)
if err != nil {
return nil, errors.Wrap(err, "EnabledPerformEnable")
}
return nil, nil
}
func (t *STopic) AllowPerformDisable(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input notify.PerformDisableInput) bool {
return db.IsAdminAllowPerform(userCred, t, "disable")
}
func (t *STopic) PerformDisable(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input notify.PerformDisableInput) (jsonutils.JSONObject, error) {
err := db.EnabledPerformEnable(t, ctx, userCred, false)
if err != nil {
return nil, errors.Wrap(err, "EnabledPerformEnable")
}
return nil, nil
}
func init() {
converter = &sConverter{
resource2Value: &sync.Map{},
value2Resource: &sync.Map{},
action2Value: &sync.Map{},
value2Action: &sync.Map{},
}
converter.registerResource(
map[string]int{
notify.TOPIC_RESOURCE_SERVER: 0,
notify.TOPIC_RESOURCE_SCALINGGROUP: 1,
notify.TOPIC_RESOURCE_SCALINGPOLICY: 2,
notify.TOPIC_RESOURCE_IMAGE: 3,
notify.TOPIC_RESOURCE_DISK: 4,
notify.TOPIC_RESOURCE_SNAPSHOT: 5,
notify.TOPIC_RESOURCE_INSTANCESNAPSHOT: 6,
notify.TOPIC_RESOURCE_SNAPSHOTPOLICY: 7,
notify.TOPIC_RESOURCE_NETWORK: 8,
notify.TOPIC_RESOURCE_EIP: 9,
notify.TOPIC_RESOURCE_SECGROUP: 10,
notify.TOPIC_RESOURCE_LOADBALANCER: 11,
notify.TOPIC_RESOURCE_LOADBALANCERACL: 12,
notify.TOPIC_RESOURCE_LOADBALANCERCERTIFICATE: 13,
notify.TOPIC_RESOURCE_BUCKET: 14,
notify.TOPIC_RESOURCE_DBINSTANCE: 15,
notify.TOPIC_RESOURCE_ELASTICCACHE: 16,
notify.TOPIC_RESOURCE_SCHEDULEDTASK: 17,
notify.TOPIC_RESOURCE_BAREMETAL: 18,
notify.TOPIC_RESOURCE_VPC: 19,
notify.TOPIC_RESOURCE_DNSZONE: 20,
notify.TOPIC_RESOURCE_NATGATEWAY: 21,
notify.TOPIC_RESOURCE_WEBAPP: 22,
notify.TOPIC_RESOURCE_CDNDOMAIN: 23,
notify.TOPIC_RESOURCE_FILESYSTEM: 24,
notify.TOPIC_RESOURCE_WAF: 25,
notify.TOPIC_RESOURCE_KAFKA: 26,
notify.TOPIC_RESOURCE_ELASTICSEARCH: 27,
notify.TOPIC_RESOURCE_MONGODB: 28,
notify.TOPIC_RESOURCE_DNSRECORDSET: 29,
notify.TOPIC_RESOURCE_LOADBALANCERLISTENER: 30,
notify.TOPIC_RESOURCE_LOADBALANCERBACKEDNGROUP: 31,
notify.TOPIC_RESOURCE_HOST: 32,
notify.TOPIC_RESOURCE_TASK: 33,
},
)
converter.registerAction(
map[notify.SAction]int{
notify.ActionCreate: 0,
notify.ActionDelete: 1,
notify.ActionPendingDelete: 2,
notify.ActionUpdate: 3,
notify.ActionRebuildRoot: 4,
notify.ActionResetPassword: 5,
notify.ActionChangeConfig: 6,
notify.ActionExpiredRelease: 7,
notify.ActionExecute: 8,
notify.ActionChangeIpaddr: 9,
notify.ActionSyncStatus: 10,
notify.ActionCleanData: 11,
notify.ActionMigrate: 12,
notify.ActionCreateBackupServer: 13,
notify.ActionDelBackupServer: 14,
notify.ActionSyncCreate: 15,
notify.ActionSyncUpdate: 16,
notify.ActionSyncDelete: 17,
notify.ActionOffline: 18,
notify.ActionSystemPanic: 19,
notify.ActionSystemException: 20,
},
)
}
var converter *sConverter
type sConverter struct {
resource2Value *sync.Map
value2Resource *sync.Map
action2Value *sync.Map
value2Action *sync.Map
}
type sResourceValue struct {
resource string
value int
}
type sActionValue struct {
action string
value int
}
func (rc *sConverter) registerResource(resourceValues map[string]int) {
for resource, value := range resourceValues {
if v, ok := rc.resource2Value.Load(resource); ok && v.(int) != value {
log.Fatalf("resource '%s' has been mapped to value '%d', and it is not allowed to map to another value '%d'", resource, v, value)
}
if r, ok := rc.value2Resource.Load(value); ok && r.(string) != resource {
log.Fatalf("value '%d' has been mapped to resource '%s', and it is not allowed to map to another resource '%s'", value, r, resource)
}
rc.resource2Value.Store(resource, value)
rc.value2Resource.Store(value, resource)
}
}
func (rc *sConverter) registerAction(actionValues map[notify.SAction]int) {
for action, value := range actionValues {
if v, ok := rc.action2Value.Load(action); ok && v.(int) != value {
log.Fatalf("action '%s' has been mapped to value '%d', and it is not allowed to map to another value '%d'", action, v, value)
}
if a, ok := rc.value2Action.Load(value); ok && a.(notify.SAction) != action {
log.Fatalf("value '%d' has been mapped to action '%s', and it is not allowed to map to another action '%s'", value, a, action)
}
rc.action2Value.Store(action, value)
rc.value2Action.Store(value, action)
}
}
func (rc *sConverter) resourceValue(resource string) int {
v, ok := rc.resource2Value.Load(resource)
if !ok {
return -1
}
return v.(int)
}
func (rc *sConverter) resource(resourceValue int) string {
r, ok := rc.value2Resource.Load(resourceValue)
if !ok {
return ""
}
return r.(string)
}
func (rc *sConverter) actionValue(action notify.SAction) int {
v, ok := rc.action2Value.Load(action)
if !ok {
return -1
}
return v.(int)
}
func (rc *sConverter) action(actionValue int) notify.SAction {
a, ok := rc.value2Action.Load(actionValue)
if !ok {
return notify.SAction("")
}
return a.(notify.SAction)
}