patterns.negative.check
Check negative patterns for create or update process.
Parameters
struct |
user { |
|
string |
session |
Session (as retrieved from client.loginByToken() )
|
int |
userId |
(optional) Managed user ID
|
|
} |
|
|
array |
patterns ( |
|
struct |
{ |
|
int |
groupId |
Group id, where the pattern will be created
|
|
} |
|
|
|
) |
|
|
Response
struct |
{ |
|
int |
status |
Status code (see bellow)
|
string |
statusMessage |
Status code description
|
string |
session |
(optional) Refreshed session
|
array |
diagnostics ( |
(optional) Various diagnostics(warnings, errors, other information)
|
|
) |
|
|
|
} |
|
|
Response status codes:
List of all possible response status codes:
200: OK
206: Partially OK
301: User is serviced
400: Bad arguments
401: Invalid session
403: Access Denied
404: Not found
406: Bad values of attributes
413: Too many items requested.
429: Too many requests. Has to wait.
500: Server Error.
409: Conflict
Diagnostics:
List of all possible diagnostics:
cpt_too_high
cpt_too_low
floating_invalid_targeting
group_access_denied
group_pattern_duplicity: Given patterns already exist in the same group.
group_pattern_parameters_duplicity: Duplicate patterns for the same group in input parameters.
not_allowed_for_campaign_type
pattern_access_denied
pattern_cpc_is_too_low
pattern_cpc_out_of_range
pattern_id_parameters_duplicity: Pattern ID duplicity in input parameters.
pattern_invalid_status
pattern_too_long
pattern_value_invalid
simple_ads_invalid_targeting
user_access_denied