diff --git a/engine/account.go b/engine/account.go index 8c38b577e..6033723f0 100644 --- a/engine/account.go +++ b/engine/account.go @@ -412,6 +412,9 @@ func (acc *Account) debitCreditBalance(cd *CallDescriptor, count bool, dryRun bo // check for blocker if balance.Blocker { if cd.GetDuration() != 0 { + if !dryRun { + return nil, utils.ErrInsufficientCreditBalanceBlocker + } return } goto COMMIT // don't go to next balances @@ -448,6 +451,9 @@ func (acc *Account) debitCreditBalance(cd *CallDescriptor, count bool, dryRun bo // check for blocker if balance.Blocker { if cd.GetDuration() != 0 { + if !dryRun { + return nil, utils.ErrInsufficientCreditBalanceBlocker + } return } goto COMMIT // don't go to next balances diff --git a/general_tests/balance_blocker_it_test.go b/general_tests/balance_blocker_it_test.go new file mode 100644 index 000000000..84ba4ee81 --- /dev/null +++ b/general_tests/balance_blocker_it_test.go @@ -0,0 +1,1518 @@ +//go:build integration +// +build integration + +/* +Real-time Online/Offline Charging System (OCS) for Telecom & ISP environments +Copyright (C) ITsysCOM GmbH + +This program is free software: you can redistribute it and/or modify +it under the terms of the GNU General Public License as published by +the Free Software Foundation, either version 3 of the License, or +(at your option) any later version. + +This program is distributed in the hope that it will be useful, +but WITHOUT ANY WARRANTY; without even the implied warranty of +MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +GNU General Public License for more details. + +You should have received a copy of the GNU General Public License +along with this program. If not, see +*/ +package general_tests + +import ( + "testing" + "time" + + "github.com/cgrates/cgrates/engine" + "github.com/cgrates/cgrates/sessions" + "github.com/cgrates/cgrates/utils" +) + +func TestBlockerTrueAuthorize(t *testing.T) { + content := `{ + +"general": { + "log_level": 7, +}, + +"data_db": { + "db_type": "*internal" +}, + +"stor_db": { + "db_type": "*internal" +}, + +"rals": { + "enabled": true +}, + +"cdrs": { + "enabled": true, + "rals_conns": ["*localhost"], + "session_cost_retries": 0, +}, + +"chargers": { + "enabled": true, +}, + +"sessions": { + "enabled": true, + "chargers_conns": ["*localhost"], + "rals_conns": ["*localhost"], + "cdrs_conns": ["*localhost"], +}, + +"schedulers": { + "enabled": true +}, + +"apiers": { + "enabled": true, + "scheduler_conns": ["*localhost"] +} + +}` + + tpFiles := map[string]string{ + utils.AccountActionsCsv: `#Tenant,Account,ActionPlanId,ActionTriggersId,AllowNegative,Disabled +cgrates.org,1001,PACKAGE_1001,,,`, + utils.ActionPlansCsv: `#Id,ActionsId,TimingId,Weight +PACKAGE_1001,ACT_TOPUP,*asap,10`, + utils.ActionsCsv: `#ActionsId[0],Action[1],ExtraParameters[2],Filter[3],BalanceId[4],BalanceType[5],Categories[6],DestinationIds[7],RatingSubject[8],SharedGroup[9],ExpiryTime[10],TimingIds[11],Units[12],BalanceWeight[13],BalanceBlocker[14],BalanceDisabled[15],Weight[16] +ACT_TOPUP,*topup_reset,,,balance_voice,*voice,,*any,,,*unlimited,,10s,10,true,false,20`, + utils.ChargersCsv: `#Tenant,ID,FilterIDs,ActivationInterval,RunID,AttributeIDs,Weight +cgrates.org,DEFAULT,,,*default,*none,0`, + utils.DestinationRatesCsv: `#Id,DestinationId,RatesTag,RoundingMethod,RoundingDecimals,MaxCost,MaxCostStrategy +DR_ANY,*any,RT_ANY,*up,20,0,`, + utils.RatesCsv: `#Id,ConnectFee,Rate,RateUnit,RateIncrement,GroupIntervalStart +RT_ANY,0,1,1s,1s,0s`, + utils.RatingPlansCsv: `#Id,DestinationRatesId,TimingTag,Weight +RP_ANY,DR_ANY,*any,10`, + utils.RatingProfilesCsv: `#Tenant,Category,Subject,ActivationTime,RatingPlanId,RatesFallbackSubject +cgrates.org,call,1001,2014-01-14T00:00:00Z,RP_ANY,`, + } + + testEnv := TestEnvironment{ + ConfigJSON: content, + TpFiles: tpFiles, + } + client, _ := testEnv.Setup(t, *utils.WaitRater) + time.Sleep(10 * time.Millisecond) // wait for tps to be loaded + + t.Run("Authorize", func(t *testing.T) { + args := &sessions.V1AuthorizeArgs{ + GetMaxUsage: true, + CGREvent: &utils.CGREvent{ + Tenant: "cgrates.org", + ID: "TestBalBlockTrueAuth", + Event: map[string]any{ + utils.Tenant: "cgrates.org", + utils.ToR: utils.VOICE, + utils.OriginID: "TestBalBlockTrue", + utils.RequestType: utils.META_PREPAID, + utils.Account: "1001", + utils.Subject: "1001", + utils.Destination: "1002", + utils.SetupTime: time.Date(2024, time.August, 9, 9, 0, 0, 0, time.UTC), + utils.AnswerTime: time.Date(2024, time.August, 9, 9, 0, 1, 0, time.UTC), + utils.Usage: "30s", + }, + }, + } + var rplyFirst sessions.V1AuthorizeReply + if err := client.Call(utils.SessionSv1AuthorizeEvent, args, &rplyFirst); err != nil { + t.Fatal(err) + } + if rplyFirst.MaxUsage != 10*time.Second { + t.Errorf("Expected usage <%+v>, Received <%+v>", 10*time.Second, rplyFirst.MaxUsage) + } + }) +} + +func TestBlockerTrueInterimUpdate(t *testing.T) { + content := `{ + +"general": { + "log_level": 7, +}, + +"data_db": { + "db_type": "*internal" +}, + +"stor_db": { + "db_type": "*internal" +}, + +"rals": { + "enabled": true +}, + +"cdrs": { + "enabled": true, + "rals_conns": ["*localhost"], + "session_cost_retries": 0, +}, + +"chargers": { + "enabled": true, +}, + +"sessions": { + "enabled": true, + "chargers_conns": ["*localhost"], + "rals_conns": ["*localhost"], + "cdrs_conns": ["*localhost"], +}, + +"schedulers": { + "enabled": true +}, + +"apiers": { + "enabled": true, + "scheduler_conns": ["*localhost"] +} + +}` + + tpFiles := map[string]string{ + utils.AccountActionsCsv: `#Tenant,Account,ActionPlanId,ActionTriggersId,AllowNegative,Disabled +cgrates.org,1001,PACKAGE_1001,,,`, + utils.ActionPlansCsv: `#Id,ActionsId,TimingId,Weight +PACKAGE_1001,ACT_TOPUP,*asap,10`, + utils.ActionsCsv: `#ActionsId[0],Action[1],ExtraParameters[2],Filter[3],BalanceId[4],BalanceType[5],Categories[6],DestinationIds[7],RatingSubject[8],SharedGroup[9],ExpiryTime[10],TimingIds[11],Units[12],BalanceWeight[13],BalanceBlocker[14],BalanceDisabled[15],Weight[16] +ACT_TOPUP,*topup_reset,,,balance_voice,*voice,,*any,,,*unlimited,,10s,10,true,false,20`, + utils.ChargersCsv: `#Tenant,ID,FilterIDs,ActivationInterval,RunID,AttributeIDs,Weight +cgrates.org,DEFAULT,,,*default,*none,0`, + utils.DestinationRatesCsv: `#Id,DestinationId,RatesTag,RoundingMethod,RoundingDecimals,MaxCost,MaxCostStrategy +DR_ANY,*any,RT_ANY,*up,20,0,`, + utils.RatesCsv: `#Id,ConnectFee,Rate,RateUnit,RateIncrement,GroupIntervalStart +RT_ANY,0,1,1s,1s,0s`, + utils.RatingPlansCsv: `#Id,DestinationRatesId,TimingTag,Weight +RP_ANY,DR_ANY,*any,10`, + utils.RatingProfilesCsv: `#Tenant,Category,Subject,ActivationTime,RatingPlanId,RatesFallbackSubject +cgrates.org,call,1001,2014-01-14T00:00:00Z,RP_ANY,`, + } + + testEnv := TestEnvironment{ + ConfigJSON: content, + TpFiles: tpFiles, + } + client, _ := testEnv.Setup(t, *utils.WaitRater) + time.Sleep(10 * time.Millisecond) // wait for tps to be loaded + + t.Run("InterimUpdate30s", func(t *testing.T) { + updateArgs := &sessions.V1UpdateSessionArgs{ + UpdateSession: true, + CGREvent: &utils.CGREvent{ + Tenant: "cgrates.org", + ID: "TestBalBlockTrueUpdate", + Event: map[string]any{ + utils.OriginID: "TestBalBlockTrue", + utils.ToR: utils.VOICE, + utils.Account: "1001", + utils.Destination: "1002", + utils.RequestType: utils.META_PREPAID, + utils.SetupTime: time.Date(2024, time.August, 9, 9, 0, 0, 0, time.UTC), + utils.AnswerTime: time.Date(2024, time.August, 9, 9, 0, 1, 0, time.UTC), + utils.Usage: "1s", + }, + }, + } + var acnt *engine.Account + attrs := &utils.AttrGetAccount{ + Tenant: "cgrates.org", + Account: "1001", + } + expAccVal := 10000000000.0 + expUsage := 1 * time.Second + for i := 1; i != 30; i++ { + var updateRpl *sessions.V1UpdateSessionReply + if err := client.Call(utils.SessionSv1UpdateSession, + updateArgs, &updateRpl); err != nil { + t.Error(err) + } + if updateRpl.MaxUsage != expUsage { + t.Errorf("Expected usage <%+v>, Received <%+v>", time.Duration(i)*time.Second, updateRpl.MaxUsage) + } + if i == 10 { + expUsage = 0 + } + if expAccVal != 0 { + expAccVal = expAccVal - 1000000000 + } + if err := client.Call(utils.APIerSv2GetAccount, attrs, &acnt); err != nil { + t.Error(err) + } else if len(acnt.BalanceMap) != 1 { + t.Errorf("Unexpected number of balances in the account: <%v>", utils.ToJSON(acnt)) + } else if rply := acnt.BalanceMap[utils.VOICE].GetTotalValue(); rply != expAccVal { + t.Errorf("Expected value %+v, received <%v>", + expAccVal, utils.ToJSON(acnt.BalanceMap[utils.VOICE])) + } + } + }) +} + +func TestBlockerTrueProcessEvent(t *testing.T) { + content := `{ + +"general": { + "log_level": 7, +}, + +"data_db": { + "db_type": "*internal" +}, + +"stor_db": { + "db_type": "*internal" +}, + +"rals": { + "enabled": true +}, + +"cdrs": { + "enabled": true, + "rals_conns": ["*localhost"], + "session_cost_retries": 0, +}, + +"chargers": { + "enabled": true, +}, + +"sessions": { + "enabled": true, + "chargers_conns": ["*localhost"], + "rals_conns": ["*localhost"], + "cdrs_conns": ["*localhost"], +}, + +"schedulers": { + "enabled": true +}, + +"apiers": { + "enabled": true, + "scheduler_conns": ["*localhost"] +} + +}` + + tpFiles := map[string]string{ + utils.AccountActionsCsv: `#Tenant,Account,ActionPlanId,ActionTriggersId,AllowNegative,Disabled +cgrates.org,1001,PACKAGE_1001,,,`, + utils.ActionPlansCsv: `#Id,ActionsId,TimingId,Weight +PACKAGE_1001,ACT_TOPUP,*asap,10`, + utils.ActionsCsv: `#ActionsId[0],Action[1],ExtraParameters[2],Filter[3],BalanceId[4],BalanceType[5],Categories[6],DestinationIds[7],RatingSubject[8],SharedGroup[9],ExpiryTime[10],TimingIds[11],Units[12],BalanceWeight[13],BalanceBlocker[14],BalanceDisabled[15],Weight[16] +ACT_TOPUP,*topup_reset,,,balance_voice,*voice,,*any,,,*unlimited,,10s,10,true,false,20`, + utils.ChargersCsv: `#Tenant,ID,FilterIDs,ActivationInterval,RunID,AttributeIDs,Weight +cgrates.org,DEFAULT,,,*default,*none,0`, + utils.DestinationRatesCsv: `#Id,DestinationId,RatesTag,RoundingMethod,RoundingDecimals,MaxCost,MaxCostStrategy +DR_ANY,*any,RT_ANY,*up,20,0,`, + utils.RatesCsv: `#Id,ConnectFee,Rate,RateUnit,RateIncrement,GroupIntervalStart +RT_ANY,0,1,1s,1s,0s`, + utils.RatingPlansCsv: `#Id,DestinationRatesId,TimingTag,Weight +RP_ANY,DR_ANY,*any,10`, + utils.RatingProfilesCsv: `#Tenant,Category,Subject,ActivationTime,RatingPlanId,RatesFallbackSubject +cgrates.org,call,1001,2014-01-14T00:00:00Z,RP_ANY,`, + } + + testEnv := TestEnvironment{ + ConfigJSON: content, + TpFiles: tpFiles, + } + client, _ := testEnv.Setup(t, *utils.WaitRater) + time.Sleep(10 * time.Millisecond) // wait for tps to be loaded + + t.Run("ProcessEvent", func(t *testing.T) { + args := &sessions.V1ProcessEventArgs{ + Flags: []string{utils.MetaCDRs}, + CGREvent: &utils.CGREvent{ + Tenant: "cgrates.org", + ID: "TestBalBlockTrueProcEv", + Event: map[string]any{ + utils.Tenant: "cgrates.org", + utils.ToR: utils.VOICE, + utils.OriginID: "TestBalBlockTrue", + utils.RequestType: utils.META_PREPAID, + utils.Account: "1001", + utils.Destination: "1002", + utils.SetupTime: time.Date(2024, time.August, 9, 9, 0, 0, 0, time.UTC), + utils.AnswerTime: time.Date(2024, time.August, 9, 9, 0, 1, 0, time.UTC), + utils.Usage: 30 * time.Second, + }, + }, + } + expRply := &sessions.V1ProcessEventReply{MaxUsage: 0} + var reply sessions.V1ProcessEventReply + if err := client.Call(utils.SessionSv1ProcessEvent, + args, &reply); err != nil { + t.Error(err) + } else if utils.ToJSON(expRply) != utils.ToJSON(reply) { + t.Errorf("Expected <%+v>, \nreceived <%+v>", expRply, reply) + } + var acnt *engine.Account + attrs := &utils.AttrGetAccount{ + Tenant: "cgrates.org", + Account: "1001", + } + if err := client.Call(utils.APIerSv2GetAccount, attrs, &acnt); err != nil { + t.Error(err) + } else if len(acnt.BalanceMap) != 1 { + t.Errorf("Unexpected number of balances in the account: <%v>", utils.ToJSON(acnt)) + } else if rply := acnt.BalanceMap[utils.VOICE].GetTotalValue(); rply != 10000000000 { + // it shouldnt take from the balance since its trying to take more than the balance has + t.Errorf("Expected value %+v, received <%v>", + 10000000000, utils.ToJSON(acnt.BalanceMap[utils.VOICE])) + } + + var cdrCnt int64 + req := &utils.RPCCDRsFilterWithArgDispatcher{RPCCDRsFilter: &utils.RPCCDRsFilter{}} + if err := client.Call(utils.CDRsV1GetCDRsCount, req, &cdrCnt); err != nil { + t.Error("Unexpected error: ", err.Error()) + } else if cdrCnt != 1 { + t.Error("Unexpected number of CDRs returned: ", cdrCnt) + } + + var cdrs []*engine.CDR + argsCdr := &utils.RPCCDRsFilterWithArgDispatcher{RPCCDRsFilter: &utils.RPCCDRsFilter{RunIDs: []string{utils.MetaDefault}}} + if err := client.Call(utils.CDRsV1GetCDRs, argsCdr, &cdrs); err != nil { + t.Error("Unexpected error: ", err.Error()) + } else if len(cdrs) != 1 { + t.Error("Unexpected number of CDRs returned: ", len(cdrs)) + } else { + if cdrs[0].Cost != -1.0 { + t.Errorf("Unexpected cost for CDR: %f", cdrs[0].Cost) + } + if cdrs[0].ExtraInfo != utils.ErrInsufficientCreditBalanceBlocker.Error() { + t.Errorf("Expected error <%v>, received <%v>", utils.ErrInsufficientCreditBalanceBlocker, cdrs[0].ExtraInfo) + } + } + + }) +} + +func TestBlockerFalseAuthorize(t *testing.T) { + content := `{ + +"general": { + "log_level": 7, +}, + +"data_db": { + "db_type": "*internal" +}, + +"stor_db": { + "db_type": "*internal" +}, + +"rals": { + "enabled": true +}, + +"cdrs": { + "enabled": true, + "rals_conns": ["*localhost"], + "session_cost_retries": 0, +}, + +"chargers": { + "enabled": true, +}, + +"sessions": { + "enabled": true, + "chargers_conns": ["*localhost"], + "rals_conns": ["*localhost"], + "cdrs_conns": ["*localhost"], +}, + +"schedulers": { + "enabled": true +}, + +"apiers": { + "enabled": true, + "scheduler_conns": ["*localhost"] +} + +}` + + tpFiles := map[string]string{ + utils.AccountActionsCsv: `#Tenant,Account,ActionPlanId,ActionTriggersId,AllowNegative,Disabled +cgrates.org,1001,PACKAGE_1001,,,`, + utils.ActionPlansCsv: `#Id,ActionsId,TimingId,Weight +PACKAGE_1001,ACT_TOPUP,*asap,10`, + utils.ActionsCsv: `#ActionsId[0],Action[1],ExtraParameters[2],Filter[3],BalanceId[4],BalanceType[5],Categories[6],DestinationIds[7],RatingSubject[8],SharedGroup[9],ExpiryTime[10],TimingIds[11],Units[12],BalanceWeight[13],BalanceBlocker[14],BalanceDisabled[15],Weight[16] +ACT_TOPUP,*topup_reset,,,balance_voice,*voice,,*any,,,*unlimited,,10s,10,false,false,20`, + utils.ChargersCsv: `#Tenant,ID,FilterIDs,ActivationInterval,RunID,AttributeIDs,Weight +cgrates.org,DEFAULT,,,*default,*none,0`, + utils.DestinationRatesCsv: `#Id,DestinationId,RatesTag,RoundingMethod,RoundingDecimals,MaxCost,MaxCostStrategy +DR_ANY,*any,RT_ANY,*up,20,0,`, + utils.RatesCsv: `#Id,ConnectFee,Rate,RateUnit,RateIncrement,GroupIntervalStart +RT_ANY,0,1,1s,1s,0s`, + utils.RatingPlansCsv: `#Id,DestinationRatesId,TimingTag,Weight +RP_ANY,DR_ANY,*any,10`, + utils.RatingProfilesCsv: `#Tenant,Category,Subject,ActivationTime,RatingPlanId,RatesFallbackSubject +cgrates.org,call,1001,2014-01-14T00:00:00Z,RP_ANY,`, + } + + testEnv := TestEnvironment{ + ConfigJSON: content, + TpFiles: tpFiles, + } + client, _ := testEnv.Setup(t, *utils.WaitRater) + time.Sleep(10 * time.Millisecond) // wait for tps to be loaded + + t.Run("Authorize", func(t *testing.T) { + args := &sessions.V1AuthorizeArgs{ + GetMaxUsage: true, + CGREvent: &utils.CGREvent{ + Tenant: "cgrates.org", + ID: "TestBalBlockFalseAuth", + Event: map[string]any{ + utils.Tenant: "cgrates.org", + utils.ToR: utils.VOICE, + utils.OriginID: "TestBalBlockFalse", + utils.RequestType: utils.META_PREPAID, + utils.Account: "1001", + utils.Subject: "1001", + utils.Destination: "1002", + utils.SetupTime: time.Date(2024, time.August, 9, 9, 0, 0, 0, time.UTC), + utils.AnswerTime: time.Date(2024, time.August, 9, 9, 0, 1, 0, time.UTC), + utils.Usage: "30s", + }, + }, + } + var rplyFirst sessions.V1AuthorizeReply + if err := client.Call(utils.SessionSv1AuthorizeEvent, args, &rplyFirst); err != nil { + t.Fatal(err) + } + if rplyFirst.MaxUsage != 10*time.Second { + t.Errorf("Expected usage <%+v>, Received <%+v>", 10*time.Second, rplyFirst.MaxUsage) + } + }) +} + +func TestBlockerFalseInterimUpdate(t *testing.T) { + content := `{ + +"general": { + "log_level": 7, +}, + +"data_db": { + "db_type": "*internal" +}, + +"stor_db": { + "db_type": "*internal" +}, + +"rals": { + "enabled": true +}, + +"cdrs": { + "enabled": true, + "rals_conns": ["*localhost"], + "session_cost_retries": 0, +}, + +"chargers": { + "enabled": true, +}, + +"sessions": { + "enabled": true, + "chargers_conns": ["*localhost"], + "rals_conns": ["*localhost"], + "cdrs_conns": ["*localhost"], +}, + +"schedulers": { + "enabled": true +}, + +"apiers": { + "enabled": true, + "scheduler_conns": ["*localhost"] +} + +}` + + tpFiles := map[string]string{ + utils.AccountActionsCsv: `#Tenant,Account,ActionPlanId,ActionTriggersId,AllowNegative,Disabled +cgrates.org,1001,PACKAGE_1001,,,`, + utils.ActionPlansCsv: `#Id,ActionsId,TimingId,Weight +PACKAGE_1001,ACT_TOPUP,*asap,10`, + utils.ActionsCsv: `#ActionsId[0],Action[1],ExtraParameters[2],Filter[3],BalanceId[4],BalanceType[5],Categories[6],DestinationIds[7],RatingSubject[8],SharedGroup[9],ExpiryTime[10],TimingIds[11],Units[12],BalanceWeight[13],BalanceBlocker[14],BalanceDisabled[15],Weight[16] +ACT_TOPUP,*topup_reset,,,balance_voice,*voice,,*any,,,*unlimited,,10s,10,false,false,20`, + utils.ChargersCsv: `#Tenant,ID,FilterIDs,ActivationInterval,RunID,AttributeIDs,Weight +cgrates.org,DEFAULT,,,*default,*none,0`, + utils.DestinationRatesCsv: `#Id,DestinationId,RatesTag,RoundingMethod,RoundingDecimals,MaxCost,MaxCostStrategy +DR_ANY,*any,RT_ANY,*up,20,0,`, + utils.RatesCsv: `#Id,ConnectFee,Rate,RateUnit,RateIncrement,GroupIntervalStart +RT_ANY,0,1,1s,1s,0s`, + utils.RatingPlansCsv: `#Id,DestinationRatesId,TimingTag,Weight +RP_ANY,DR_ANY,*any,10`, + utils.RatingProfilesCsv: `#Tenant,Category,Subject,ActivationTime,RatingPlanId,RatesFallbackSubject +cgrates.org,call,1001,2014-01-14T00:00:00Z,RP_ANY,`, + } + + testEnv := TestEnvironment{ + ConfigJSON: content, + TpFiles: tpFiles, + } + client, _ := testEnv.Setup(t, *utils.WaitRater) + time.Sleep(10 * time.Millisecond) // wait for tps to be loaded + + t.Run("InterimUpdate30s", func(t *testing.T) { + updateArgs := &sessions.V1UpdateSessionArgs{ + UpdateSession: true, + CGREvent: &utils.CGREvent{ + Tenant: "cgrates.org", + ID: "TestBalBlockFalseUpdate", + Event: map[string]any{ + utils.OriginID: "TestBalBlockFalse", + utils.ToR: utils.VOICE, + utils.Account: "1001", + utils.Destination: "1002", + utils.RequestType: utils.META_PREPAID, + utils.SetupTime: time.Date(2024, time.August, 9, 9, 0, 0, 0, time.UTC), + utils.AnswerTime: time.Date(2024, time.August, 9, 9, 0, 1, 0, time.UTC), + utils.Usage: "1s", + }, + }, + } + var acnt *engine.Account + attrs := &utils.AttrGetAccount{ + Tenant: "cgrates.org", + Account: "1001", + } + expAccVal := 10000000000.0 + expUsage := 1 * time.Second + for i := 1; i != 30; i++ { + var updateRpl *sessions.V1UpdateSessionReply + if err := client.Call(utils.SessionSv1UpdateSession, + updateArgs, &updateRpl); err != nil { + t.Error(err) + } + if updateRpl.MaxUsage != expUsage { + t.Errorf("Expected usage <%+v>, Received <%+v>", time.Duration(i)*time.Second, updateRpl.MaxUsage) + } + if i == 10 { // After 10 runs, maxUsage should be 0 + expUsage = 0 + } + if expAccVal != 0 { // After 10 runs, balance should be 0 + expAccVal = expAccVal - 1000000000 + } + if err := client.Call(utils.APIerSv2GetAccount, attrs, &acnt); err != nil { + t.Error(err) + } else if len(acnt.BalanceMap) != 1 { + t.Errorf("Unexpected number of balances in the account: <%v>", utils.ToJSON(acnt)) + } else if rply := acnt.BalanceMap[utils.VOICE].GetTotalValue(); rply != expAccVal { + t.Errorf("Expected value %+v, received <%v>", + expAccVal, utils.ToJSON(acnt.BalanceMap[utils.VOICE])) + } + } + }) +} + +func TestBlockerFalseProcessEvent(t *testing.T) { + content := `{ + +"general": { + "log_level": 7, +}, + +"data_db": { + "db_type": "*internal" +}, + +"stor_db": { + "db_type": "*internal" +}, + +"rals": { + "enabled": true +}, + +"cdrs": { + "enabled": true, + "rals_conns": ["*localhost"], + "session_cost_retries": 0, +}, + +"chargers": { + "enabled": true, +}, + +"sessions": { + "enabled": true, + "chargers_conns": ["*localhost"], + "rals_conns": ["*localhost"], + "cdrs_conns": ["*localhost"], +}, + +"schedulers": { + "enabled": true +}, + +"apiers": { + "enabled": true, + "scheduler_conns": ["*localhost"] +} + +}` + + tpFiles := map[string]string{ + utils.AccountActionsCsv: `#Tenant,Account,ActionPlanId,ActionTriggersId,AllowNegative,Disabled +cgrates.org,1001,PACKAGE_1001,,,`, + utils.ActionPlansCsv: `#Id,ActionsId,TimingId,Weight +PACKAGE_1001,ACT_TOPUP,*asap,10`, + utils.ActionsCsv: `#ActionsId[0],Action[1],ExtraParameters[2],Filter[3],BalanceId[4],BalanceType[5],Categories[6],DestinationIds[7],RatingSubject[8],SharedGroup[9],ExpiryTime[10],TimingIds[11],Units[12],BalanceWeight[13],BalanceBlocker[14],BalanceDisabled[15],Weight[16] +ACT_TOPUP,*topup_reset,,,balance_voice,*voice,,*any,,,*unlimited,,10s,10,false,false,20`, + utils.ChargersCsv: `#Tenant,ID,FilterIDs,ActivationInterval,RunID,AttributeIDs,Weight +cgrates.org,DEFAULT,,,*default,*none,0`, + utils.DestinationRatesCsv: `#Id,DestinationId,RatesTag,RoundingMethod,RoundingDecimals,MaxCost,MaxCostStrategy +DR_ANY,*any,RT_ANY,*up,20,0,`, + utils.RatesCsv: `#Id,ConnectFee,Rate,RateUnit,RateIncrement,GroupIntervalStart +RT_ANY,0,1,1s,1s,0s`, + utils.RatingPlansCsv: `#Id,DestinationRatesId,TimingTag,Weight +RP_ANY,DR_ANY,*any,10`, + utils.RatingProfilesCsv: `#Tenant,Category,Subject,ActivationTime,RatingPlanId,RatesFallbackSubject +cgrates.org,call,1001,2014-01-14T00:00:00Z,RP_ANY,`, + } + + testEnv := TestEnvironment{ + ConfigJSON: content, + TpFiles: tpFiles, + } + client, _ := testEnv.Setup(t, *utils.WaitRater) + time.Sleep(10 * time.Millisecond) // wait for tps to be loaded + + t.Run("ProcessEvent", func(t *testing.T) { + args := &sessions.V1ProcessEventArgs{ + Flags: []string{utils.MetaCDRs}, + CGREvent: &utils.CGREvent{ + Tenant: "cgrates.org", + ID: "TestBalBlockFalseProcEv", + Event: map[string]any{ + utils.Tenant: "cgrates.org", + utils.ToR: utils.VOICE, + utils.OriginID: "TestBalBlockFalse", + utils.RequestType: utils.META_PREPAID, + utils.Account: "1001", + utils.Destination: "1002", + utils.SetupTime: time.Date(2024, time.August, 9, 9, 0, 0, 0, time.UTC), + utils.AnswerTime: time.Date(2024, time.August, 9, 9, 0, 1, 0, time.UTC), + utils.Usage: 30 * time.Second, + }, + }, + } + expRply := &sessions.V1ProcessEventReply{MaxUsage: 0} + var reply sessions.V1ProcessEventReply + if err := client.Call(utils.SessionSv1ProcessEvent, + args, &reply); err != nil { + t.Error(err) + } else if utils.ToJSON(expRply) != utils.ToJSON(reply) { + t.Errorf("Expected <%+v>, \nreceived <%+v>", expRply, reply) + } + var acnt *engine.Account + attrs := &utils.AttrGetAccount{ + Tenant: "cgrates.org", + Account: "1001", + } + if err := client.Call(utils.APIerSv2GetAccount, attrs, &acnt); err != nil { + t.Error(err) + } else if len(acnt.BalanceMap) != 2 { + t.Errorf("Unexpected number of balances in the account: <%v>", utils.ToJSON(acnt)) + } else if acnt.BalanceMap[utils.VOICE].GetTotalValue() != 0 { + t.Errorf("Expected value %+v, received <%v>", + 0, utils.ToJSON(acnt.BalanceMap[utils.VOICE])) + } else if acnt.BalanceMap[utils.MONETARY].GetTotalValue() != -20 { + t.Errorf("Expected value %+v, received <%v>", + -20, utils.ToJSON(acnt.BalanceMap[utils.MONETARY])) + } + + var cdrCnt int64 + req := &utils.RPCCDRsFilterWithArgDispatcher{RPCCDRsFilter: &utils.RPCCDRsFilter{}} + if err := client.Call(utils.CDRsV1GetCDRsCount, req, &cdrCnt); err != nil { + t.Error("Unexpected error: ", err.Error()) + } else if cdrCnt != 1 { + t.Error("Unexpected number of CDRs returned: ", cdrCnt) + } + + var cdrs []*engine.CDR + argsCdr := &utils.RPCCDRsFilterWithArgDispatcher{RPCCDRsFilter: &utils.RPCCDRsFilter{RunIDs: []string{utils.MetaDefault}}} + if err := client.Call(utils.CDRsV1GetCDRs, argsCdr, &cdrs); err != nil { + t.Error("Unexpected error: ", err.Error()) + } else if len(cdrs) != 1 { + t.Error("Unexpected number of CDRs returned: ", len(cdrs)) + } else { + if cdrs[0].Cost != 20 { // cost should be equal to 20 seconds + t.Errorf("Unexpected cost for CDR: %f", cdrs[0].Cost) + } + if cdrs[0].ExtraInfo != "" { + t.Errorf("Expected no error, received <%v>", cdrs[0].ExtraInfo) + } + } + + }) +} + +// Testing monetary to test ConnectFee +func TestBlockerTrueMonetaryAuthorize(t *testing.T) { + content := `{ + +"general": { + "log_level": 7, +}, + +"data_db": { + "db_type": "*internal" +}, + +"stor_db": { + "db_type": "*internal" +}, + +"rals": { + "enabled": true +}, + +"cdrs": { + "enabled": true, + "rals_conns": ["*localhost"], + "session_cost_retries": 0, +}, + +"chargers": { + "enabled": true, +}, + +"sessions": { + "enabled": true, + "chargers_conns": ["*localhost"], + "rals_conns": ["*localhost"], + "cdrs_conns": ["*localhost"], +}, + +"schedulers": { + "enabled": true +}, + +"apiers": { + "enabled": true, + "scheduler_conns": ["*localhost"] +} + +}` + + tpFiles := map[string]string{ + utils.AccountActionsCsv: `#Tenant,Account,ActionPlanId,ActionTriggersId,AllowNegative,Disabled +cgrates.org,1001,PACKAGE_1001,,,`, + utils.ActionPlansCsv: `#Id,ActionsId,TimingId,Weight +PACKAGE_1001,ACT_TOPUP,*asap,10`, + utils.ActionsCsv: `#ActionsId[0],Action[1],ExtraParameters[2],Filter[3],BalanceId[4],BalanceType[5],Categories[6],DestinationIds[7],RatingSubject[8],SharedGroup[9],ExpiryTime[10],TimingIds[11],Units[12],BalanceWeight[13],BalanceBlocker[14],BalanceDisabled[15],Weight[16] +ACT_TOPUP,*topup_reset,,,balance_monetary,*monetary,,*any,,,*unlimited,,10,10,true,false,20`, + utils.ChargersCsv: `#Tenant,ID,FilterIDs,ActivationInterval,RunID,AttributeIDs,Weight +cgrates.org,DEFAULT,,,*default,*none,0`, + utils.DestinationRatesCsv: `#Id,DestinationId,RatesTag,RoundingMethod,RoundingDecimals,MaxCost,MaxCostStrategy +DR_ANY,*any,RT_ANY,*up,20,0,`, + utils.RatesCsv: `#Id,ConnectFee,Rate,RateUnit,RateIncrement,GroupIntervalStart +RT_ANY,1,1,1,1,0`, + utils.RatingPlansCsv: `#Id,DestinationRatesId,TimingTag,Weight +RP_ANY,DR_ANY,*any,10`, + utils.RatingProfilesCsv: `#Tenant,Category,Subject,ActivationTime,RatingPlanId,RatesFallbackSubject +cgrates.org,call,1001,2014-01-14T00:00:00Z,RP_ANY,`, + } + + testEnv := TestEnvironment{ + ConfigJSON: content, + TpFiles: tpFiles, + } + client, _ := testEnv.Setup(t, *utils.WaitRater) + time.Sleep(10 * time.Millisecond) // wait for tps to be loaded + + t.Run("Authorize", func(t *testing.T) { + args := &sessions.V1AuthorizeArgs{ + GetMaxUsage: true, + CGREvent: &utils.CGREvent{ + Tenant: "cgrates.org", + ID: "TestBalBlockTrueAuth", + Event: map[string]any{ + utils.Tenant: "cgrates.org", + utils.ToR: utils.VOICE, + utils.OriginID: "TestBalBlockTrue", + utils.RequestType: utils.META_PREPAID, + utils.Account: "1001", + utils.Subject: "1001", + utils.Destination: "1002", + utils.SetupTime: time.Date(2024, time.August, 9, 9, 0, 0, 0, time.UTC), + utils.AnswerTime: time.Date(2024, time.August, 9, 9, 0, 1, 0, time.UTC), + utils.Usage: 30, + }, + }, + } + var rplyFirst sessions.V1AuthorizeReply + if err := client.Call(utils.SessionSv1AuthorizeEvent, args, &rplyFirst); err != nil { + t.Fatal(err) + } + if rplyFirst.MaxUsage != 9 { + t.Errorf("Expected usage <%+v>, Received <%+v>", 10*time.Second, rplyFirst.MaxUsage) + } + }) +} + +// Testing monetary to test ConnectFee +func TestBlockerTrueMonetaryInterimUpdate(t *testing.T) { + content := `{ + +"general": { + "log_level": 7, +}, + +"data_db": { + "db_type": "*internal" +}, + +"stor_db": { + "db_type": "*internal" +}, + +"rals": { + "enabled": true +}, + +"cdrs": { + "enabled": true, + "rals_conns": ["*localhost"], + "session_cost_retries": 0, +}, + +"chargers": { + "enabled": true, +}, + +"sessions": { + "enabled": true, + "chargers_conns": ["*localhost"], + "rals_conns": ["*localhost"], + "cdrs_conns": ["*localhost"], +}, + +"schedulers": { + "enabled": true +}, + +"apiers": { + "enabled": true, + "scheduler_conns": ["*localhost"] +} + +}` + + tpFiles := map[string]string{ + utils.AccountActionsCsv: `#Tenant,Account,ActionPlanId,ActionTriggersId,AllowNegative,Disabled +cgrates.org,1001,PACKAGE_1001,,,`, + utils.ActionPlansCsv: `#Id,ActionsId,TimingId,Weight +PACKAGE_1001,ACT_TOPUP,*asap,10`, + utils.ActionsCsv: `#ActionsId[0],Action[1],ExtraParameters[2],Filter[3],BalanceId[4],BalanceType[5],Categories[6],DestinationIds[7],RatingSubject[8],SharedGroup[9],ExpiryTime[10],TimingIds[11],Units[12],BalanceWeight[13],BalanceBlocker[14],BalanceDisabled[15],Weight[16] +ACT_TOPUP,*topup_reset,,,balance_monetary,*monetary,,*any,,,*unlimited,,10,10,true,false,20`, + utils.ChargersCsv: `#Tenant,ID,FilterIDs,ActivationInterval,RunID,AttributeIDs,Weight +cgrates.org,DEFAULT,,,*default,*none,0`, + utils.DestinationRatesCsv: `#Id,DestinationId,RatesTag,RoundingMethod,RoundingDecimals,MaxCost,MaxCostStrategy +DR_ANY,*any,RT_ANY,*up,20,0,`, + utils.RatesCsv: `#Id,ConnectFee,Rate,RateUnit,RateIncrement,GroupIntervalStart +RT_ANY,1,1,1,1,0`, + utils.RatingPlansCsv: `#Id,DestinationRatesId,TimingTag,Weight +RP_ANY,DR_ANY,*any,10`, + utils.RatingProfilesCsv: `#Tenant,Category,Subject,ActivationTime,RatingPlanId,RatesFallbackSubject +cgrates.org,call,1001,2014-01-14T00:00:00Z,RP_ANY,`, + } + + testEnv := TestEnvironment{ + ConfigJSON: content, + TpFiles: tpFiles, + } + client, _ := testEnv.Setup(t, *utils.WaitRater) + time.Sleep(10 * time.Millisecond) // wait for tps to be loaded + + t.Run("InterimUpdate30s", func(t *testing.T) { + updateArgs := &sessions.V1UpdateSessionArgs{ + UpdateSession: true, + CGREvent: &utils.CGREvent{ + Tenant: "cgrates.org", + ID: "TestBalBlockTrueUpdate", + Event: map[string]any{ + utils.OriginID: "TestBalBlockTrue", + utils.ToR: utils.VOICE, + utils.Account: "1001", + utils.Destination: "1002", + utils.RequestType: utils.META_PREPAID, + utils.SetupTime: time.Date(2024, time.August, 9, 9, 0, 0, 0, time.UTC), + utils.AnswerTime: time.Date(2024, time.August, 9, 9, 0, 1, 0, time.UTC), + utils.Usage: 1, + }, + }, + } + var acnt *engine.Account + attrs := &utils.AttrGetAccount{ + Tenant: "cgrates.org", + Account: "1001", + } + expAccVal := 9.0 // Expecting 1 unit to be already taken because of connectFee + expUsage := 1 * time.Nanosecond + for i := 1; i != 30; i++ { + var updateRpl *sessions.V1UpdateSessionReply + if err := client.Call(utils.SessionSv1UpdateSession, + updateArgs, &updateRpl); err != nil { + t.Error(err) + } + if updateRpl.MaxUsage != expUsage { + t.Errorf("Expected usage <%+v>, Received <%+v>", time.Duration(i)*time.Nanosecond, updateRpl.MaxUsage) + } + if i == 9 { + expUsage = 0 + } + if expAccVal != 0 { + expAccVal = expAccVal - 1 + } + if err := client.Call(utils.APIerSv2GetAccount, attrs, &acnt); err != nil { + t.Error(err) + } else if len(acnt.BalanceMap) != 1 { + t.Errorf("Unexpected number of balances in the account: <%v>", utils.ToJSON(acnt)) + } else if rply := acnt.BalanceMap[utils.MONETARY].GetTotalValue(); rply != expAccVal { + t.Errorf("Expected value %+v, received <%v>", + expAccVal, utils.ToJSON(acnt.BalanceMap[utils.MONETARY])) + } + } + }) +} + +// Testing monetary to test ConnectFee +func TestBlockerTrueMonetaryProcessEvent(t *testing.T) { + content := `{ + +"general": { + "log_level": 7, +}, + +"data_db": { + "db_type": "*internal" +}, + +"stor_db": { + "db_type": "*internal" +}, + +"rals": { + "enabled": true +}, + +"cdrs": { + "enabled": true, + "rals_conns": ["*localhost"], + "session_cost_retries": 0, +}, + +"chargers": { + "enabled": true, +}, + +"sessions": { + "enabled": true, + "chargers_conns": ["*localhost"], + "rals_conns": ["*localhost"], + "cdrs_conns": ["*localhost"], +}, + +"schedulers": { + "enabled": true +}, + +"apiers": { + "enabled": true, + "scheduler_conns": ["*localhost"] +} + +}` + + tpFiles := map[string]string{ + utils.AccountActionsCsv: `#Tenant,Account,ActionPlanId,ActionTriggersId,AllowNegative,Disabled +cgrates.org,1001,PACKAGE_1001,,,`, + utils.ActionPlansCsv: `#Id,ActionsId,TimingId,Weight +PACKAGE_1001,ACT_TOPUP,*asap,10`, + utils.ActionsCsv: `#ActionsId[0],Action[1],ExtraParameters[2],Filter[3],BalanceId[4],BalanceType[5],Categories[6],DestinationIds[7],RatingSubject[8],SharedGroup[9],ExpiryTime[10],TimingIds[11],Units[12],BalanceWeight[13],BalanceBlocker[14],BalanceDisabled[15],Weight[16] +ACT_TOPUP,*topup_reset,,,balance_monetary,*monetary,,*any,,,*unlimited,,10,10,true,false,20`, + utils.ChargersCsv: `#Tenant,ID,FilterIDs,ActivationInterval,RunID,AttributeIDs,Weight +cgrates.org,DEFAULT,,,*default,*none,0`, + utils.DestinationRatesCsv: `#Id,DestinationId,RatesTag,RoundingMethod,RoundingDecimals,MaxCost,MaxCostStrategy +DR_ANY,*any,RT_ANY,*up,20,0,`, + utils.RatesCsv: `#Id,ConnectFee,Rate,RateUnit,RateIncrement,GroupIntervalStart +RT_ANY,1,1,1,1,0`, + utils.RatingPlansCsv: `#Id,DestinationRatesId,TimingTag,Weight +RP_ANY,DR_ANY,*any,10`, + utils.RatingProfilesCsv: `#Tenant,Category,Subject,ActivationTime,RatingPlanId,RatesFallbackSubject +cgrates.org,call,1001,2014-01-14T00:00:00Z,RP_ANY,`, + } + + testEnv := TestEnvironment{ + ConfigJSON: content, + TpFiles: tpFiles, + } + client, _ := testEnv.Setup(t, *utils.WaitRater) + time.Sleep(10 * time.Millisecond) // wait for tps to be loaded + + t.Run("ProcessEvent", func(t *testing.T) { + args := &sessions.V1ProcessEventArgs{ + Flags: []string{utils.MetaCDRs}, + CGREvent: &utils.CGREvent{ + Tenant: "cgrates.org", + ID: "TestBalBlockTrueProcEv", + Event: map[string]any{ + utils.Tenant: "cgrates.org", + utils.ToR: utils.VOICE, + utils.OriginID: "TestBalBlockTrue", + utils.RequestType: utils.META_PREPAID, + utils.Account: "1001", + utils.Destination: "1002", + utils.SetupTime: time.Date(2024, time.August, 9, 9, 0, 0, 0, time.UTC), + utils.AnswerTime: time.Date(2024, time.August, 9, 9, 0, 1, 0, time.UTC), + utils.Usage: 30, + }, + }, + } + expRply := &sessions.V1ProcessEventReply{MaxUsage: 0} + var reply sessions.V1ProcessEventReply + if err := client.Call(utils.SessionSv1ProcessEvent, + args, &reply); err != nil { + t.Error(err) + } else if utils.ToJSON(expRply) != utils.ToJSON(reply) { + t.Errorf("Expected <%+v>, \nreceived <%+v>", expRply, reply) + } + var acnt *engine.Account + attrs := &utils.AttrGetAccount{ + Tenant: "cgrates.org", + Account: "1001", + } + if err := client.Call(utils.APIerSv2GetAccount, attrs, &acnt); err != nil { + t.Error(err) + } else if len(acnt.BalanceMap) != 1 { + t.Errorf("Unexpected number of balances in the account: <%v>", utils.ToJSON(acnt)) + } else if rply := acnt.BalanceMap[utils.MONETARY].GetTotalValue(); rply != 10 { + // it shouldnt take from the balance since its trying to take more than the balance has + t.Errorf("Expected value %+v, received <%v>", + 10, utils.ToJSON(acnt.BalanceMap[utils.MONETARY])) + } + + var cdrCnt int64 + req := &utils.RPCCDRsFilterWithArgDispatcher{RPCCDRsFilter: &utils.RPCCDRsFilter{}} + if err := client.Call(utils.CDRsV1GetCDRsCount, req, &cdrCnt); err != nil { + t.Error("Unexpected error: ", err.Error()) + } else if cdrCnt != 1 { + t.Error("Unexpected number of CDRs returned: ", cdrCnt) + } + + var cdrs []*engine.CDR + argsCdr := &utils.RPCCDRsFilterWithArgDispatcher{RPCCDRsFilter: &utils.RPCCDRsFilter{RunIDs: []string{utils.MetaDefault}}} + if err := client.Call(utils.CDRsV1GetCDRs, argsCdr, &cdrs); err != nil { + t.Error("Unexpected error: ", err.Error()) + } else if len(cdrs) != 1 { + t.Error("Unexpected number of CDRs returned: ", len(cdrs)) + } else { + if cdrs[0].Cost != -1.0 { + t.Errorf("Unexpected cost for CDR: %f", cdrs[0].Cost) + } + if cdrs[0].ExtraInfo != utils.ErrInsufficientCreditBalanceBlocker.Error() { + t.Errorf("Expected error <%v>, received <%v>", utils.ErrInsufficientCreditBalanceBlocker, cdrs[0].ExtraInfo) + } + } + + }) +} + +// Testing monetary to test ConnectFee +func TestBlockerFalseMonetaryAuthorize(t *testing.T) { + content := `{ + +"general": { + "log_level": 7, +}, + +"data_db": { + "db_type": "*internal" +}, + +"stor_db": { + "db_type": "*internal" +}, + +"rals": { + "enabled": true +}, + +"cdrs": { + "enabled": true, + "rals_conns": ["*localhost"], + "session_cost_retries": 0, +}, + +"chargers": { + "enabled": true, +}, + +"sessions": { + "enabled": true, + "chargers_conns": ["*localhost"], + "rals_conns": ["*localhost"], + "cdrs_conns": ["*localhost"], +}, + +"schedulers": { + "enabled": true +}, + +"apiers": { + "enabled": true, + "scheduler_conns": ["*localhost"] +} + +}` + + tpFiles := map[string]string{ + utils.AccountActionsCsv: `#Tenant,Account,ActionPlanId,ActionTriggersId,AllowNegative,Disabled +cgrates.org,1001,PACKAGE_1001,,,`, + utils.ActionPlansCsv: `#Id,ActionsId,TimingId,Weight +PACKAGE_1001,ACT_TOPUP,*asap,10`, + utils.ActionsCsv: `#ActionsId[0],Action[1],ExtraParameters[2],Filter[3],BalanceId[4],BalanceType[5],Categories[6],DestinationIds[7],RatingSubject[8],SharedGroup[9],ExpiryTime[10],TimingIds[11],Units[12],BalanceWeight[13],BalanceBlocker[14],BalanceDisabled[15],Weight[16] +ACT_TOPUP,*topup_reset,,,balance_monetary,*monetary,,*any,,,*unlimited,,10,10,false,false,20`, + utils.ChargersCsv: `#Tenant,ID,FilterIDs,ActivationInterval,RunID,AttributeIDs,Weight +cgrates.org,DEFAULT,,,*default,*none,0`, + utils.DestinationRatesCsv: `#Id,DestinationId,RatesTag,RoundingMethod,RoundingDecimals,MaxCost,MaxCostStrategy +DR_ANY,*any,RT_ANY,*up,20,0,`, + utils.RatesCsv: `#Id,ConnectFee,Rate,RateUnit,RateIncrement,GroupIntervalStart +RT_ANY,1,1,1,1,0`, + utils.RatingPlansCsv: `#Id,DestinationRatesId,TimingTag,Weight +RP_ANY,DR_ANY,*any,10`, + utils.RatingProfilesCsv: `#Tenant,Category,Subject,ActivationTime,RatingPlanId,RatesFallbackSubject +cgrates.org,call,1001,2014-01-14T00:00:00Z,RP_ANY,`, + } + + testEnv := TestEnvironment{ + ConfigJSON: content, + TpFiles: tpFiles, + } + client, _ := testEnv.Setup(t, *utils.WaitRater) + time.Sleep(10 * time.Millisecond) // wait for tps to be loaded + + t.Run("Authorize", func(t *testing.T) { + args := &sessions.V1AuthorizeArgs{ + GetMaxUsage: true, + CGREvent: &utils.CGREvent{ + Tenant: "cgrates.org", + ID: "TestBalBlockFalseAuth", + Event: map[string]any{ + utils.Tenant: "cgrates.org", + utils.ToR: utils.VOICE, + utils.OriginID: "TestBalBlockFalse", + utils.RequestType: utils.META_PREPAID, + utils.Account: "1001", + utils.Subject: "1001", + utils.Destination: "1002", + utils.SetupTime: time.Date(2024, time.August, 9, 9, 0, 0, 0, time.UTC), + utils.AnswerTime: time.Date(2024, time.August, 9, 9, 0, 1, 0, time.UTC), + utils.Usage: 30, + }, + }, + } + var rplyFirst sessions.V1AuthorizeReply + if err := client.Call(utils.SessionSv1AuthorizeEvent, args, &rplyFirst); err != nil { + t.Fatal(err) + } + if rplyFirst.MaxUsage != 9 { + t.Errorf("Expected usage <%+v>, Received <%+v>", 10*time.Second, rplyFirst.MaxUsage) + } + }) +} + +// Testing monetary to test ConnectFee +func TestBlockerFalseMonetaryInterimUpdate(t *testing.T) { + content := `{ + +"general": { + "log_level": 7, +}, + +"data_db": { + "db_type": "*internal" +}, + +"stor_db": { + "db_type": "*internal" +}, + +"rals": { + "enabled": true +}, + +"cdrs": { + "enabled": true, + "rals_conns": ["*localhost"], + "session_cost_retries": 0, +}, + +"chargers": { + "enabled": true, +}, + +"sessions": { + "enabled": true, + "chargers_conns": ["*localhost"], + "rals_conns": ["*localhost"], + "cdrs_conns": ["*localhost"], +}, + +"schedulers": { + "enabled": true +}, + +"apiers": { + "enabled": true, + "scheduler_conns": ["*localhost"] +} + +}` + + tpFiles := map[string]string{ + utils.AccountActionsCsv: `#Tenant,Account,ActionPlanId,ActionTriggersId,AllowNegative,Disabled +cgrates.org,1001,PACKAGE_1001,,,`, + utils.ActionPlansCsv: `#Id,ActionsId,TimingId,Weight +PACKAGE_1001,ACT_TOPUP,*asap,10`, + utils.ActionsCsv: `#ActionsId[0],Action[1],ExtraParameters[2],Filter[3],BalanceId[4],BalanceType[5],Categories[6],DestinationIds[7],RatingSubject[8],SharedGroup[9],ExpiryTime[10],TimingIds[11],Units[12],BalanceWeight[13],BalanceBlocker[14],BalanceDisabled[15],Weight[16] +ACT_TOPUP,*topup_reset,,,balance_monetary,*monetary,,*any,,,*unlimited,,10,10,false,false,20`, + utils.ChargersCsv: `#Tenant,ID,FilterIDs,ActivationInterval,RunID,AttributeIDs,Weight +cgrates.org,DEFAULT,,,*default,*none,0`, + utils.DestinationRatesCsv: `#Id,DestinationId,RatesTag,RoundingMethod,RoundingDecimals,MaxCost,MaxCostStrategy +DR_ANY,*any,RT_ANY,*up,20,0,`, + utils.RatesCsv: `#Id,ConnectFee,Rate,RateUnit,RateIncrement,GroupIntervalStart +RT_ANY,1,1,1,1,0`, + utils.RatingPlansCsv: `#Id,DestinationRatesId,TimingTag,Weight +RP_ANY,DR_ANY,*any,10`, + utils.RatingProfilesCsv: `#Tenant,Category,Subject,ActivationTime,RatingPlanId,RatesFallbackSubject +cgrates.org,call,1001,2014-01-14T00:00:00Z,RP_ANY,`, + } + + testEnv := TestEnvironment{ + ConfigJSON: content, + TpFiles: tpFiles, + } + client, _ := testEnv.Setup(t, *utils.WaitRater) + time.Sleep(10 * time.Millisecond) // wait for tps to be loaded + + t.Run("InterimUpdate30s", func(t *testing.T) { + updateArgs := &sessions.V1UpdateSessionArgs{ + UpdateSession: true, + CGREvent: &utils.CGREvent{ + Tenant: "cgrates.org", + ID: "TestBalBlockFalseUpdate", + Event: map[string]any{ + utils.OriginID: "TestBalBlockFalse", + utils.ToR: utils.VOICE, + utils.Account: "1001", + utils.Destination: "1002", + utils.RequestType: utils.META_PREPAID, + utils.SetupTime: time.Date(2024, time.August, 9, 9, 0, 0, 0, time.UTC), + utils.AnswerTime: time.Date(2024, time.August, 9, 9, 0, 1, 0, time.UTC), + utils.Usage: 1, + }, + }, + } + var acnt *engine.Account + attrs := &utils.AttrGetAccount{ + Tenant: "cgrates.org", + Account: "1001", + } + expAccVal := 9.0 // Expecting 1 unit to be already taken because of connectFee + expUsage := 1 * time.Nanosecond + for i := 1; i != 30; i++ { + var updateRpl *sessions.V1UpdateSessionReply + if err := client.Call(utils.SessionSv1UpdateSession, + updateArgs, &updateRpl); err != nil { + t.Error(err) + } + if updateRpl.MaxUsage != expUsage { + t.Errorf("Expected usage <%+v>, Received <%+v>", time.Duration(i)*time.Nanosecond, updateRpl.MaxUsage) + } + if i == 9 { // After 9 runs, maxUsage should be 0 + expUsage = 0 + } + if expAccVal != 0 { // After 10 runs, balance should be 0 + expAccVal = expAccVal - 1 + } + if err := client.Call(utils.APIerSv2GetAccount, attrs, &acnt); err != nil { + t.Error(err) + } else if len(acnt.BalanceMap) != 1 { + t.Errorf("Unexpected number of balances in the account: <%v>", utils.ToJSON(acnt)) + } else if rply := acnt.BalanceMap[utils.MONETARY].GetTotalValue(); rply != expAccVal { + t.Errorf("Expected value %+v, received <%v>", + expAccVal, utils.ToJSON(acnt.BalanceMap[utils.MONETARY])) + } + } + }) +} + +// Testing monetary to test ConnectFee +func TestBlockerFalseMonetaryProcessEvent(t *testing.T) { + content := `{ + +"general": { + "log_level": 7, +}, + +"data_db": { + "db_type": "*internal" +}, + +"stor_db": { + "db_type": "*internal" +}, + +"rals": { + "enabled": true +}, + +"cdrs": { + "enabled": true, + "rals_conns": ["*localhost"], + "session_cost_retries": 0, +}, + +"chargers": { + "enabled": true, +}, + +"sessions": { + "enabled": true, + "chargers_conns": ["*localhost"], + "rals_conns": ["*localhost"], + "cdrs_conns": ["*localhost"], +}, + +"schedulers": { + "enabled": true +}, + +"apiers": { + "enabled": true, + "scheduler_conns": ["*localhost"] +} + +}` + + tpFiles := map[string]string{ + utils.AccountActionsCsv: `#Tenant,Account,ActionPlanId,ActionTriggersId,AllowNegative,Disabled +cgrates.org,1001,PACKAGE_1001,,,`, + utils.ActionPlansCsv: `#Id,ActionsId,TimingId,Weight +PACKAGE_1001,ACT_TOPUP,*asap,10`, + utils.ActionsCsv: `#ActionsId[0],Action[1],ExtraParameters[2],Filter[3],BalanceId[4],BalanceType[5],Categories[6],DestinationIds[7],RatingSubject[8],SharedGroup[9],ExpiryTime[10],TimingIds[11],Units[12],BalanceWeight[13],BalanceBlocker[14],BalanceDisabled[15],Weight[16] +ACT_TOPUP,*topup_reset,,,balance_monetary,*monetary,,*any,,,*unlimited,,10,10,false,false,20`, + utils.ChargersCsv: `#Tenant,ID,FilterIDs,ActivationInterval,RunID,AttributeIDs,Weight +cgrates.org,DEFAULT,,,*default,*none,0`, + utils.DestinationRatesCsv: `#Id,DestinationId,RatesTag,RoundingMethod,RoundingDecimals,MaxCost,MaxCostStrategy +DR_ANY,*any,RT_ANY,*up,20,0,`, + utils.RatesCsv: `#Id,ConnectFee,Rate,RateUnit,RateIncrement,GroupIntervalStart +RT_ANY,1,1,1,1,0`, + utils.RatingPlansCsv: `#Id,DestinationRatesId,TimingTag,Weight +RP_ANY,DR_ANY,*any,10`, + utils.RatingProfilesCsv: `#Tenant,Category,Subject,ActivationTime,RatingPlanId,RatesFallbackSubject +cgrates.org,call,1001,2014-01-14T00:00:00Z,RP_ANY,`, + } + + testEnv := TestEnvironment{ + ConfigJSON: content, + TpFiles: tpFiles, + } + client, _ := testEnv.Setup(t, *utils.WaitRater) + time.Sleep(10 * time.Millisecond) // wait for tps to be loaded + + t.Run("ProcessEvent", func(t *testing.T) { + args := &sessions.V1ProcessEventArgs{ + Flags: []string{utils.MetaCDRs}, + CGREvent: &utils.CGREvent{ + Tenant: "cgrates.org", + ID: "TestBalBlockFalseProcEv", + Event: map[string]any{ + utils.Tenant: "cgrates.org", + utils.ToR: utils.VOICE, + utils.OriginID: "TestBalBlockFalse", + utils.RequestType: utils.META_PREPAID, + utils.Account: "1001", + utils.Destination: "1002", + utils.SetupTime: time.Date(2024, time.August, 9, 9, 0, 0, 0, time.UTC), + utils.AnswerTime: time.Date(2024, time.August, 9, 9, 0, 1, 0, time.UTC), + utils.Usage: 30, + }, + }, + } + expRply := &sessions.V1ProcessEventReply{MaxUsage: 0} + var reply sessions.V1ProcessEventReply + if err := client.Call(utils.SessionSv1ProcessEvent, + args, &reply); err != nil { + t.Error(err) + } else if utils.ToJSON(expRply) != utils.ToJSON(reply) { + t.Errorf("Expected <%+v>, \nreceived <%+v>", expRply, reply) + } + var acnt *engine.Account + attrs := &utils.AttrGetAccount{ + Tenant: "cgrates.org", + Account: "1001", + } + if err := client.Call(utils.APIerSv2GetAccount, attrs, &acnt); err != nil { + t.Error(err) + } else if len(acnt.BalanceMap) != 1 { + t.Errorf("Unexpected number of balances in the account: <%v>", utils.ToJSON(acnt)) + } else if len(acnt.BalanceMap[utils.MONETARY]) != 2 { + t.Errorf("Unexpected number of monetary balances in the account: <%v>", utils.ToJSON(acnt)) + } else if acnt.BalanceMap[utils.MONETARY][0].GetValue() != 0 { + t.Errorf("Expected value %+v, received <%v>", + 0, utils.ToJSON(acnt.BalanceMap[utils.MONETARY][0])) + } else if acnt.BalanceMap[utils.MONETARY][1].GetValue() != -21 { + t.Errorf("Expected value %+v, received <%v>", + -21, utils.ToJSON(acnt.BalanceMap[utils.MONETARY][1])) + } + + var cdrCnt int64 + req := &utils.RPCCDRsFilterWithArgDispatcher{RPCCDRsFilter: &utils.RPCCDRsFilter{}} + if err := client.Call(utils.CDRsV1GetCDRsCount, req, &cdrCnt); err != nil { + t.Error("Unexpected error: ", err.Error()) + } else if cdrCnt != 1 { + t.Error("Unexpected number of CDRs returned: ", cdrCnt) + } + + var cdrs []*engine.CDR + argsCdr := &utils.RPCCDRsFilterWithArgDispatcher{RPCCDRsFilter: &utils.RPCCDRsFilter{RunIDs: []string{utils.MetaDefault}}} + if err := client.Call(utils.CDRsV1GetCDRs, argsCdr, &cdrs); err != nil { + t.Error("Unexpected error: ", err.Error()) + } else if len(cdrs) != 1 { + t.Error("Unexpected number of CDRs returned: ", len(cdrs)) + } else { + if cdrs[0].Cost != 31 { // since there is no voice balance this time, the cost includes the precreated monetary balances used cost + t.Errorf("Unexpected cost for CDR: %f", cdrs[0].Cost) + } + if cdrs[0].ExtraInfo != "" { + t.Errorf("Expected no error, received <%v>", cdrs[0].ExtraInfo) + } + } + + }) +} diff --git a/general_tests/balance_it_test.go b/general_tests/balance_it_test.go index 40b1a66a3..53a77ea56 100644 --- a/general_tests/balance_it_test.go +++ b/general_tests/balance_it_test.go @@ -123,7 +123,7 @@ cgrates.org,call,1001,,RP_ANY,`, } }) - // Attempt to debit 0.7, but due to the blocker and the empty balance, the final cost should be 0. + // Attempt to debit 0.7, but due to the blocker and the empty balance, the final cost should be -1. t.Run("ProcessCDR2", func(t *testing.T) { var reply string if err := client.Call(utils.CDRsV1ProcessEvent, @@ -163,28 +163,17 @@ cgrates.org,call,1001,,RP_ANY,`, if len(cdrs) != 2 { t.Fatalf("expected to receive 2 CDRs: %v", utils.ToJSON(cdrs)) } + if cdrs[0].Cost != -1 { + t.Fatalf("expected cost to be -1, received <%v>", utils.ToJSON(cdrs[0])) + } cost := 0.0 - if cdrs[0].CostDetails.Cost != nil { - cost = *cdrs[0].CostDetails.Cost - } - if cost != 1 { - t.Fatalf("cdrs[0].CostDetails.Cost = %v, want %v", cost, 1) - } - balanceSummaries := cdrs[0].CostDetails.AccountSummary.BalanceSummaries - if len(balanceSummaries) != 1 { - t.Fatalf("expected only 1 balance summary inside first CDR, got %s", utils.ToJSON(balanceSummaries)) - } - if balanceSummaries[0].Value != 0 { - t.Errorf("expected balance to be empty, got %v", balanceSummaries[0].Value) - } - if cdrs[1].CostDetails.Cost != nil { cost = *cdrs[1].CostDetails.Cost } - if cost != 0 { - t.Errorf("cdrs[1].CostDetails.Cost = %v, want %v", cost, 0) + if cost != 0.7 { + t.Errorf("cdrs[1].CostDetails.Cost = %v, want %v", cost, 0.7) } - balanceSummaries = cdrs[1].CostDetails.AccountSummary.BalanceSummaries + balanceSummaries := cdrs[1].CostDetails.AccountSummary.BalanceSummaries if len(balanceSummaries) != 1 { t.Errorf("expected only 1 balance summary inside second CDR, got %s", utils.ToJSON(balanceSummaries)) } diff --git a/utils/errors.go b/utils/errors.go index d93cbb86a..e6fad317b 100644 --- a/utils/errors.go +++ b/utils/errors.go @@ -27,51 +27,52 @@ import ( ) var ( - ErrNoMoreData = errors.New("NO_MORE_DATA") - ErrNotImplemented = errors.New("NOT_IMPLEMENTED") - ErrNotFound = errors.New("NOT_FOUND") - ErrTimedOut = errors.New("TIMED_OUT") - ErrServerError = errors.New("SERVER_ERROR") - ErrMaxRecursionDepth = errors.New("MAX_RECURSION_DEPTH") - ErrMandatoryIeMissing = errors.New("MANDATORY_IE_MISSING") - ErrExists = errors.New("EXISTS") - ErrBrokenReference = errors.New("BROKEN_REFERENCE") - ErrParserError = errors.New("PARSER_ERROR") - ErrInvalidPath = errors.New("INVALID_PATH") - ErrInvalidKey = errors.New("INVALID_KEY") - ErrUnauthorizedDestination = errors.New("UNAUTHORIZED_DESTINATION") - ErrRatingPlanNotFound = errors.New("RATING_PLAN_NOT_FOUND") - ErrAccountNotFound = errors.New("ACCOUNT_NOT_FOUND") - ErrAccountDisabled = errors.New("ACCOUNT_DISABLED") - ErrInsufficientCredit = errors.New("INSUFFICIENT_CREDIT") - ErrNotConvertible = errors.New("NOT_CONVERTIBLE") - ErrResourceUnavailable = errors.New("RESOURCE_UNAVAILABLE") - ErrResourceUnauthorized = errors.New("RESOURCE_UNAUTHORIZED") - ErrNoActiveSession = errors.New("NO_ACTIVE_SESSION") - ErrPartiallyExecuted = errors.New("PARTIALLY_EXECUTED") - ErrMaxUsageExceeded = errors.New("MAX_USAGE_EXCEEDED") - ErrFilterNotPassingNoCaps = errors.New("filter not passing") - ErrNotConvertibleNoCaps = errors.New("not convertible") - ErrMandatoryIeMissingNoCaps = errors.New("mandatory information missing") - ErrUnauthorizedApi = errors.New("UNAUTHORIZED_API") - ErrUnknownApiKey = errors.New("UNKNOWN_API_KEY") - ErrReqUnsynchronized = errors.New("REQ_UNSYNCHRONIZED") - ErrUnsupporteServiceMethod = errors.New("UNSUPPORTED_SERVICE_METHOD") - ErrDisconnected = errors.New("DISCONNECTED") - ErrReplyTimeout = errors.New("REPLY_TIMEOUT") - ErrSessionNotFound = errors.New("SESSION_NOT_FOUND") - ErrJsonIncompleteComment = errors.New("JSON_INCOMPLETE_COMMENT") - ErrNotEnoughParameters = errors.New("NotEnoughParameters") - ErrNotConnected = errors.New("NOT_CONNECTED") - RalsErrorPrfx = "RALS_ERROR" - DispatcherErrorPrefix = "DISPATCHER_ERROR" - ErrUnsupportedFormat = errors.New("UNSUPPORTED_FORMAT") - ErrNoDatabaseConn = errors.New("NO_DATA_BASE_CONNECTION") - ErrMaxIncrementsExceeded = errors.New("MAX_INCREMENTS_EXCEEDED") - ErrIndexOutOfBounds = errors.New("INDEX_OUT_OF_BOUNDS") - ErrWrongPath = errors.New("WRONG_PATH") - ErrServiceAlreadyRunning = fmt.Errorf("service already running") - ErrCombimedNotFound = errors.New("COMBIMED_NOT_FOUND") + ErrNoMoreData = errors.New("NO_MORE_DATA") + ErrNotImplemented = errors.New("NOT_IMPLEMENTED") + ErrNotFound = errors.New("NOT_FOUND") + ErrTimedOut = errors.New("TIMED_OUT") + ErrServerError = errors.New("SERVER_ERROR") + ErrMaxRecursionDepth = errors.New("MAX_RECURSION_DEPTH") + ErrMandatoryIeMissing = errors.New("MANDATORY_IE_MISSING") + ErrExists = errors.New("EXISTS") + ErrBrokenReference = errors.New("BROKEN_REFERENCE") + ErrParserError = errors.New("PARSER_ERROR") + ErrInvalidPath = errors.New("INVALID_PATH") + ErrInvalidKey = errors.New("INVALID_KEY") + ErrUnauthorizedDestination = errors.New("UNAUTHORIZED_DESTINATION") + ErrRatingPlanNotFound = errors.New("RATING_PLAN_NOT_FOUND") + ErrAccountNotFound = errors.New("ACCOUNT_NOT_FOUND") + ErrAccountDisabled = errors.New("ACCOUNT_DISABLED") + ErrInsufficientCredit = errors.New("INSUFFICIENT_CREDIT") + ErrNotConvertible = errors.New("NOT_CONVERTIBLE") + ErrResourceUnavailable = errors.New("RESOURCE_UNAVAILABLE") + ErrResourceUnauthorized = errors.New("RESOURCE_UNAUTHORIZED") + ErrNoActiveSession = errors.New("NO_ACTIVE_SESSION") + ErrPartiallyExecuted = errors.New("PARTIALLY_EXECUTED") + ErrMaxUsageExceeded = errors.New("MAX_USAGE_EXCEEDED") + ErrFilterNotPassingNoCaps = errors.New("filter not passing") + ErrNotConvertibleNoCaps = errors.New("not convertible") + ErrMandatoryIeMissingNoCaps = errors.New("mandatory information missing") + ErrUnauthorizedApi = errors.New("UNAUTHORIZED_API") + ErrUnknownApiKey = errors.New("UNKNOWN_API_KEY") + ErrReqUnsynchronized = errors.New("REQ_UNSYNCHRONIZED") + ErrUnsupporteServiceMethod = errors.New("UNSUPPORTED_SERVICE_METHOD") + ErrDisconnected = errors.New("DISCONNECTED") + ErrReplyTimeout = errors.New("REPLY_TIMEOUT") + ErrSessionNotFound = errors.New("SESSION_NOT_FOUND") + ErrJsonIncompleteComment = errors.New("JSON_INCOMPLETE_COMMENT") + ErrNotEnoughParameters = errors.New("NotEnoughParameters") + ErrNotConnected = errors.New("NOT_CONNECTED") + RalsErrorPrfx = "RALS_ERROR" + DispatcherErrorPrefix = "DISPATCHER_ERROR" + ErrUnsupportedFormat = errors.New("UNSUPPORTED_FORMAT") + ErrNoDatabaseConn = errors.New("NO_DATA_BASE_CONNECTION") + ErrMaxIncrementsExceeded = errors.New("MAX_INCREMENTS_EXCEEDED") + ErrIndexOutOfBounds = errors.New("INDEX_OUT_OF_BOUNDS") + ErrWrongPath = errors.New("WRONG_PATH") + ErrServiceAlreadyRunning = fmt.Errorf("service already running") + ErrCombimedNotFound = errors.New("COMBIMED_NOT_FOUND") + ErrInsufficientCreditBalanceBlocker = errors.New("INSUFFICIENT_CREDIT_BALANCE_BLOCKER") ErrMap = map[string]error{ ErrNoMoreData.Error(): ErrNoMoreData,