//go:build integration // +build integration /* Real-time Online/Offline Charging System (OCS) for Telecom & ISP environments Copyright (C) ITsysCOM GmbH This program is free software: you can redistribute it and/or modify it under the terms of the GNU Affero General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more details. You should have received a copy of the GNU Affero General Public License along with this program. If not, see */ package agents import ( "bytes" "fmt" "os/exec" "path" "testing" "time" "github.com/cgrates/birpc" "github.com/cgrates/birpc/context" "github.com/cgrates/cgrates/config" "github.com/cgrates/cgrates/engine" "github.com/cgrates/cgrates/sessions" "github.com/cgrates/cgrates/utils" "github.com/cgrates/radigo" ) var ( raonfigDIR string raCfgPath string raCfg *config.CGRConfig raAuthClnt, raAcctClnt *radigo.Client raRPC *birpc.Client sTestsRadius = []func(t *testing.T){ testRAitInitCfg, testRAitResetDataDb, testRAitResetStorDb, testRAitStartEngine, testRAitApierRpcConn, testRAitTPFromFolder, testRAitAuthPAPSuccess, testRAitAuthPAPSuccessTCP, testRAitAuthPAPFail, testRAitAuthPAPFailTCP, testRAitMandatoryFail, testRAitMandatoryFailTCP, testRAitWithVendor, testRAitWithVendorTCP, testRAitAuthCHAPSuccess, testRAitAuthCHAPSuccessTCP, testRAitAuthCHAPFail, testRAitAuthCHAPFailTCP, testRAitAuthCHAPWithChallengeAVP, testRAitAuthCHAPWithChallengeAVPTCP, testRAitAuthMSCHAPV2Success, testRAitAuthMSCHAPV2SuccessTCP, testRAitAuthMSCHAPV2Fail, testRAitAuthMSCHAPV2FailTCP, testRAitChallenge, testRAitChallengeTCP, testRAitChallengeResponse, testRAitChallengeResponseTCP, testRAitAcctStart, testRAitAcctStartTCP, testRAitAcctStop, testRAitStopCgrEngine, } ) // Test start here func TestRAit(t *testing.T) { // engine.KillEngine(0) switch *utils.DBType { case utils.MetaInternal: raonfigDIR = "radagent_internal" case utils.MetaMySQL: raonfigDIR = "radagent_mysql" case utils.MetaMongo: raonfigDIR = "radagent_mongo" case utils.MetaPostgres: t.SkipNow() default: t.Fatal("Unknown Database type") } if *utils.Encoding == utils.MetaGOB { raonfigDIR += "_gob" } for _, stest := range sTestsRadius { t.Run(raonfigDIR, stest) } } func TestRAitDispatcher(t *testing.T) { engine.KillEngine(100) if *utils.Encoding == utils.MetaGOB { t.SkipNow() return } isDispatcherActive = true engine.StartEngine(path.Join(*utils.DataDir, "conf", "samples", "dispatchers", "all"), 400) engine.StartEngine(path.Join(*utils.DataDir, "conf", "samples", "dispatchers", "all2"), 400) raonfigDIR = "dispatchers/radagent" testRadiusitResetAllDB(t) for _, stest := range sTestsRadius { t.Run(diamConfigDIR, stest) } engine.KillEngine(100) isDispatcherActive = false } func testRAitInitCfg(t *testing.T) { raCfgPath = path.Join(*utils.DataDir, "conf", "samples", raonfigDIR) // Init config first var err error raCfg, err = config.NewCGRConfigFromPath(raCfgPath) if err != nil { t.Error(err) } if isDispatcherActive { raCfg.ListenCfg().RPCJSONListen = ":6012" } } func testRadiusitResetAllDB(t *testing.T) { cfgPath1 := path.Join(*utils.DataDir, "conf", "samples", "dispatchers", "all") allCfg, err := config.NewCGRConfigFromPath(cfgPath1) if err != nil { t.Fatal(err) } if err := engine.InitDataDB(allCfg); err != nil { t.Fatal(err) } if err := engine.InitStorDb(allCfg); err != nil { t.Fatal(err) } } // Remove data in both rating and accounting db func testRAitResetDataDb(t *testing.T) { if err := engine.InitDataDB(raCfg); err != nil { t.Fatal(err) } } // Wipe out the cdr database func testRAitResetStorDb(t *testing.T) { if err := engine.InitStorDb(raCfg); err != nil { t.Fatal(err) } } // Start CGR Engine func testRAitStartEngine(t *testing.T) { if _, err := engine.StartEngine(raCfgPath, *utils.WaitRater); err != nil { t.Fatal(err) } } // Connect rpc client to rater func testRAitApierRpcConn(t *testing.T) { var err error raRPC, err = newRPCClient(raCfg.ListenCfg()) // We connect over JSON so we can also troubleshoot if needed if err != nil { t.Fatal(err) } } // Load the tariff plan, creating accounts and their balances func testRAitTPFromFolder(t *testing.T) { attrs := &utils.AttrLoadTpFromFolder{FolderPath: path.Join(*utils.DataDir, "tariffplans", "oldtutorial")} var loadInst utils.LoadInstance if err := raRPC.Call(context.Background(), utils.APIerSv2LoadTariffPlanFromFolder, attrs, &loadInst); err != nil { t.Error(err) } if isDispatcherActive { testRadiusitTPLoadData(t) } time.Sleep(time.Duration(*utils.WaitRater) * time.Millisecond) // Give time for scheduler to execute topups } func testRadiusitTPLoadData(t *testing.T) { wchan := make(chan struct{}, 1) go func() { loaderPath, err := exec.LookPath("cgr-loader") if err != nil { t.Error(err) } loader := exec.Command(loaderPath, "-config_path", raCfgPath, "-path", path.Join(*utils.DataDir, "tariffplans", "dispatchers")) if err := loader.Start(); err != nil { t.Error(err) } loader.Wait() wchan <- struct{}{} }() select { case <-wchan: case <-time.After(5 * time.Second): t.Errorf("cgr-loader failed: ") } } func testRAitAuthPAPSuccess(t *testing.T) { if raAuthClnt, err = radigo.NewClient(utils.UDP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil { t.Fatal(err) } authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps() if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("User-Password", "CGRateSPassword1", ""); err != nil { t.Error(err) } // encode the password as required so we can decode it properly authReq.AVPs[1].RawValue = radigo.EncodeUserPassword([]byte("CGRateSPassword1"), []byte("CGRateS.org"), authReq.Authenticator[:]) if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Sip-From-Tag", "51585361", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil { t.Error(err) } reply, err := raAuthClnt.SendRequest(authReq) if err != nil { t.Fatal(err) } if reply.Code != radigo.AccessAccept { t.Errorf("Received reply: %+v", utils.ToJSON(reply)) } if len(reply.AVPs) != 1 { // make sure max duration is received t.Errorf("Received AVPs: %+v", utils.ToJSON(reply.AVPs)) } else if !bytes.Equal([]byte("session_max_time#10800"), reply.AVPs[0].RawValue) { t.Errorf("Received: %s", string(reply.AVPs[0].RawValue)) } } func testRAitAuthPAPSuccessTCP(t *testing.T) { if raAuthClnt, err = radigo.NewClient(utils.TCP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil { t.Fatal(err) } authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps() if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("User-Password", "CGRateSPassword1", ""); err != nil { t.Error(err) } // encode the password as required so we can decode it properly authReq.AVPs[1].RawValue = radigo.EncodeUserPassword([]byte("CGRateSPassword1"), []byte("CGRateS.org"), authReq.Authenticator[:]) if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Sip-From-Tag", "51585361", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil { t.Error(err) } reply, err := raAuthClnt.SendRequest(authReq) if err != nil { t.Fatal(err) } if reply.Code != radigo.AccessAccept { t.Errorf("Received reply: %+v", utils.ToJSON(reply)) } if len(reply.AVPs) != 1 { // make sure max duration is received t.Errorf("Received AVPs: %+v", utils.ToJSON(reply.AVPs)) } else if !bytes.Equal([]byte("session_max_time#10800"), reply.AVPs[0].RawValue) { t.Errorf("Received: %s", string(reply.AVPs[0].RawValue)) } } func testRAitAuthPAPFail(t *testing.T) { if raAuthClnt, err = radigo.NewClient(utils.UDP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil { t.Fatal(err) } authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps() if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("User-Password", "CGRateSPassword2", ""); err != nil { t.Error(err) } // encode the password as required so we can decode it properly authReq.AVPs[1].RawValue = radigo.EncodeUserPassword([]byte("CGRateSPassword2"), []byte("CGRateS.org"), authReq.Authenticator[:]) if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Sip-From-Tag", "51585361", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil { t.Error(err) } reply, err := raAuthClnt.SendRequest(authReq) if err != nil { t.Fatal(err) } if reply.Code != radigo.AccessReject { t.Errorf("Received reply: %+v", reply) } if len(reply.AVPs) != 1 { // make sure max duration is received t.Errorf("Received AVPs: %+v", reply.AVPs) } else if utils.RadauthFailed != string(reply.AVPs[0].RawValue) { t.Errorf("Received: %s", string(reply.AVPs[0].RawValue)) } } func testRAitAuthPAPFailTCP(t *testing.T) { if raAuthClnt, err = radigo.NewClient(utils.TCP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil { t.Fatal(err) } authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps() if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("User-Password", "CGRateSPassword2", ""); err != nil { t.Error(err) } // encode the password as required so we can decode it properly authReq.AVPs[1].RawValue = radigo.EncodeUserPassword([]byte("CGRateSPassword2"), []byte("CGRateS.org"), authReq.Authenticator[:]) if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Sip-From-Tag", "51585361", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil { t.Error(err) } reply, err := raAuthClnt.SendRequest(authReq) if err != nil { t.Fatal(err) } if reply.Code != radigo.AccessReject { t.Errorf("Received reply: %+v", reply) } if len(reply.AVPs) != 1 { // make sure max duration is received t.Errorf("Received AVPs: %+v", reply.AVPs) } else if utils.RadauthFailed != string(reply.AVPs[0].RawValue) { t.Errorf("Received: %s", string(reply.AVPs[0].RawValue)) } } func testRAitMandatoryFail(t *testing.T) { if raAuthClnt, err = radigo.NewClient(utils.UDP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil { t.Fatal(err) } authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) if err := authReq.AddAVPWithName("User-Name", "10011", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("User-Password", "CGRateSPassword3", ""); err != nil { t.Error(err) } authReq.AVPs[1].RawValue = radigo.EncodeUserPassword([]byte("CGRateSPassword3"), []byte("CGRateS.org"), authReq.Authenticator[:]) reply, err := raAuthClnt.SendRequest(authReq) if err != nil { t.Fatal(err) } if reply.Code != radigo.AccessReject { t.Errorf("Received reply: %+v", reply) } exp := "ATTRIBUTES_ERROR:" + utils.MandatoryIEMissingCaps + ": [RadReplyMessage]" if len(reply.AVPs) != 1 { t.Errorf("Received AVPs: %+v", reply.AVPs) } else if exp != string(reply.AVPs[0].RawValue) { t.Errorf("Expected <%+v>, Received: <%+v>", exp, string(reply.AVPs[0].RawValue)) } } func testRAitMandatoryFailTCP(t *testing.T) { if raAuthClnt, err = radigo.NewClient(utils.TCP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil { t.Fatal(err) } authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) if err := authReq.AddAVPWithName("User-Name", "10011", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("User-Password", "CGRateSPassword3", ""); err != nil { t.Error(err) } authReq.AVPs[1].RawValue = radigo.EncodeUserPassword([]byte("CGRateSPassword3"), []byte("CGRateS.org"), authReq.Authenticator[:]) reply, err := raAuthClnt.SendRequest(authReq) if err != nil { t.Fatal(err) } if reply.Code != radigo.AccessReject { t.Errorf("Received reply: %+v", reply) } exp := "ATTRIBUTES_ERROR:" + utils.MandatoryIEMissingCaps + ": [RadReplyMessage]" if len(reply.AVPs) != 1 { t.Errorf("Received AVPs: %+v", reply.AVPs) } else if exp != string(reply.AVPs[0].RawValue) { t.Errorf("Expected <%+v>, Received: <%+v>", exp, string(reply.AVPs[0].RawValue)) } } func testRAitWithVendor(t *testing.T) { if raAuthClnt, err = radigo.NewClient(utils.UDP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil { t.Fatal(err) } authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) if err := authReq.AddAVPWithName("User-Name", "10012", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("User-Password", "CGRateSPassword3", ""); err != nil { t.Error(err) } authReq.AVPs[1].RawValue = radigo.EncodeUserPassword([]byte("CGRateSPassword3"), []byte("CGRateS.org"), authReq.Authenticator[:]) reply, err := raAuthClnt.SendRequest(authReq) if err != nil { t.Fatal(err) } if reply.Code != radigo.AccessAccept { t.Errorf("Received reply: %+v", reply) } if len(reply.AVPs) != 3 { t.Errorf("Received AVPs: %+v", reply.AVPs) } else if string(reply.AVPs[0].RawValue) != "\x00\x00\x00\x00*\bClass1" { t.Errorf("Expected <%+q>, Received: <%+q>", "\x00\x00\x00\x00*\bClass1", string(reply.AVPs[0].RawValue)) } else if string(reply.AVPs[1].RawValue) != "\x00\x00\x00\x00*\bClass2" { t.Errorf("Expected <%q>, Received: <%q>", "\x00\x00\x00\x00*\bClass2", string(reply.AVPs[1].RawValue)) } else if string(reply.AVPs[2].RawValue) != "\x00\x00\x00\x00*\bClass3" { t.Errorf("Expected <%q>, Received: <%q>", "\x00\x00\x00\x00*\bClass3", string(reply.AVPs[2].RawValue)) } } func testRAitWithVendorTCP(t *testing.T) { if raAuthClnt, err = radigo.NewClient(utils.TCP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil { t.Fatal(err) } authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) if err := authReq.AddAVPWithName("User-Name", "10012", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("User-Password", "CGRateSPassword3", ""); err != nil { t.Error(err) } authReq.AVPs[1].RawValue = radigo.EncodeUserPassword([]byte("CGRateSPassword3"), []byte("CGRateS.org"), authReq.Authenticator[:]) reply, err := raAuthClnt.SendRequest(authReq) if err != nil { t.Fatal(err) } if reply.Code != radigo.AccessAccept { t.Errorf("Received reply: %+v", reply) } if len(reply.AVPs) != 3 { t.Errorf("Received AVPs: %+v", reply.AVPs) } else if string(reply.AVPs[0].RawValue) != "\x00\x00\x00\x00*\bClass1" { t.Errorf("Expected <%+q>, Received: <%+q>", "\x00\x00\x00\x00*\bClass1", string(reply.AVPs[0].RawValue)) } else if string(reply.AVPs[1].RawValue) != "\x00\x00\x00\x00*\bClass2" { t.Errorf("Expected <%q>, Received: <%q>", "\x00\x00\x00\x00*\bClass2", string(reply.AVPs[1].RawValue)) } else if string(reply.AVPs[2].RawValue) != "\x00\x00\x00\x00*\bClass3" { t.Errorf("Expected <%q>, Received: <%q>", "\x00\x00\x00\x00*\bClass3", string(reply.AVPs[2].RawValue)) } } func testRAitAuthCHAPSuccess(t *testing.T) { if raAuthClnt, err = radigo.NewClient(utils.UDP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil { t.Fatal(err) } authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps() if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("CHAP-Password", "CGRateSPassword1", ""); err != nil { t.Error(err) } authReq.AVPs[1].RawValue = radigo.EncodeCHAPPassword([]byte("CGRateSPassword1"), authReq.Authenticator[:]) if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Sip-From-Tag", "51585362", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil { t.Error(err) } reply, err := raAuthClnt.SendRequest(authReq) if err != nil { t.Fatal(err) } if reply.Code != radigo.AccessAccept { t.Errorf("Received reply: %+v", utils.ToJSON(reply)) } if len(reply.AVPs) != 1 { // make sure max duration is received t.Errorf("Received AVPs: %+v", utils.ToJSON(reply.AVPs)) } else if !bytes.Equal([]byte("session_max_time#10800"), reply.AVPs[0].RawValue) { t.Errorf("Received: %s", string(reply.AVPs[0].RawValue)) } } func testRAitAuthCHAPSuccessTCP(t *testing.T) { if raAuthClnt, err = radigo.NewClient(utils.TCP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil { t.Fatal(err) } authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps() if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("CHAP-Password", "CGRateSPassword1", ""); err != nil { t.Error(err) } authReq.AVPs[1].RawValue = radigo.EncodeCHAPPassword([]byte("CGRateSPassword1"), authReq.Authenticator[:]) if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Sip-From-Tag", "51585362", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil { t.Error(err) } reply, err := raAuthClnt.SendRequest(authReq) if err != nil { t.Fatal(err) } if reply.Code != radigo.AccessAccept { t.Errorf("Received reply: %+v", utils.ToJSON(reply)) } if len(reply.AVPs) != 1 { // make sure max duration is received t.Errorf("Received AVPs: %+v", utils.ToJSON(reply.AVPs)) } else if !bytes.Equal([]byte("session_max_time#10800"), reply.AVPs[0].RawValue) { t.Errorf("Received: %s", string(reply.AVPs[0].RawValue)) } } func testRAitAuthCHAPFail(t *testing.T) { if raAuthClnt, err = radigo.NewClient(utils.UDP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil { t.Fatal(err) } authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps() if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("CHAP-Password", "CGRateSPassword2", ""); err != nil { t.Error(err) } authReq.AVPs[1].RawValue = radigo.EncodeCHAPPassword([]byte("CGRateSPassword2"), authReq.Authenticator[:]) if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Sip-From-Tag", "51585362", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil { t.Error(err) } reply, err := raAuthClnt.SendRequest(authReq) if err != nil { t.Fatal(err) } if reply.Code != radigo.AccessReject { t.Errorf("Received reply: %+v", reply) } if len(reply.AVPs) != 1 { // make sure max duration is received t.Errorf("Received AVPs: %+v", reply.AVPs) } else if utils.RadauthFailed != string(reply.AVPs[0].RawValue) { t.Errorf("Received: %s", string(reply.AVPs[0].RawValue)) } } func testRAitAuthCHAPFailTCP(t *testing.T) { if raAuthClnt, err = radigo.NewClient(utils.TCP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil { t.Fatal(err) } authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps() if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("CHAP-Password", "CGRateSPassword2", ""); err != nil { t.Error(err) } authReq.AVPs[1].RawValue = radigo.EncodeCHAPPassword([]byte("CGRateSPassword2"), authReq.Authenticator[:]) if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Sip-From-Tag", "51585362", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil { t.Error(err) } reply, err := raAuthClnt.SendRequest(authReq) if err != nil { t.Fatal(err) } if reply.Code != radigo.AccessReject { t.Errorf("Received reply: %+v", reply) } if len(reply.AVPs) != 1 { // make sure max duration is received t.Errorf("Received AVPs: %+v", reply.AVPs) } else if utils.RadauthFailed != string(reply.AVPs[0].RawValue) { t.Errorf("Received: %s", string(reply.AVPs[0].RawValue)) } } func testRAitAuthCHAPWithChallengeAVP(t *testing.T) { if raAuthClnt, err = radigo.NewClient(utils.UDP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil { t.Fatal(err) } authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil { t.Error(err) } // Use a challenge different from the Request Authenticator chapChallenge := []byte("customchallenge!") if err := authReq.AddAVPWithName("CHAP-Challenge", string(chapChallenge), ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("CHAP-Password", "CGRateSPassword1", ""); err != nil { t.Error(err) } authReq.AVPs[2].RawValue = radigo.EncodeCHAPPassword([]byte("CGRateSPassword1"), chapChallenge) if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Sip-From-Tag", "51585362", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil { t.Error(err) } reply, err := raAuthClnt.SendRequest(authReq) if err != nil { t.Fatal(err) } if reply.Code != radigo.AccessAccept { t.Errorf("Received reply: %+v", utils.ToJSON(reply)) } if len(reply.AVPs) != 1 { t.Errorf("Received AVPs: %+v", utils.ToJSON(reply.AVPs)) } else if !bytes.Equal([]byte("session_max_time#10800"), reply.AVPs[0].RawValue) { t.Errorf("Received: %s", string(reply.AVPs[0].RawValue)) } } func testRAitAuthCHAPWithChallengeAVPTCP(t *testing.T) { if raAuthClnt, err = radigo.NewClient(utils.TCP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil { t.Fatal(err) } authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil { t.Error(err) } // Use a challenge different from the Request Authenticator chapChallenge := []byte("customchallenge!") if err := authReq.AddAVPWithName("CHAP-Challenge", string(chapChallenge), ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("CHAP-Password", "CGRateSPassword1", ""); err != nil { t.Error(err) } authReq.AVPs[2].RawValue = radigo.EncodeCHAPPassword([]byte("CGRateSPassword1"), chapChallenge) if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Sip-From-Tag", "51585362", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil { t.Error(err) } reply, err := raAuthClnt.SendRequest(authReq) if err != nil { t.Fatal(err) } if reply.Code != radigo.AccessAccept { t.Errorf("Received reply: %+v", utils.ToJSON(reply)) } if len(reply.AVPs) != 1 { t.Errorf("Received AVPs: %+v", utils.ToJSON(reply.AVPs)) } else if !bytes.Equal([]byte("session_max_time#10800"), reply.AVPs[0].RawValue) { t.Errorf("Received: %s", string(reply.AVPs[0].RawValue)) } } func testRAitAuthMSCHAPV2Success(t *testing.T) { for _, dictPath := range raCfg.RadiusAgentCfg().ClientDictionaries { if dictRad, err = radigo.NewDictionaryFromFoldersWithRFC2865(dictPath); err != nil { return } } if raAuthClnt, err = radigo.NewClient(utils.UDP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil { t.Fatal(err) } authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps() if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("MS-CHAP-Challenge", string(authReq.Authenticator[:]), "Microsoft"); err != nil { t.Error(err) } respVal, err := radigo.GenerateClientMSCHAPResponse(authReq.Authenticator, "1001", "CGRateSPassword1") if err != nil { t.Error(err) } if err := authReq.AddAVPWithName("MS-CHAP2-Response", string(respVal), "Microsoft"); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Sip-From-Tag", "51585363", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil { t.Error(err) } reply, err := raAuthClnt.SendRequest(authReq) if err != nil { t.Fatal(err) } if reply.Code != radigo.AccessAccept { t.Errorf("Received reply: %+v", utils.ToJSON(reply)) } if len(reply.AVPs) != 2 { // make sure max duration is received t.Errorf("Received AVPs: %+v", utils.ToJSON(reply.AVPs)) } else { for _, avp := range reply.AVPs { if avp.Number == 26 && len(avp.RawValue) != 49 { t.Errorf("Unexpected lenght of MS-CHAP2-Success AVP: %+v", len(avp.RawValue)) } if avp.Number == 225 && !bytes.Equal([]byte("session_max_time#10800"), reply.AVPs[1].RawValue) { t.Errorf("Received: %s", string(reply.AVPs[0].RawValue)) } } } } func testRAitAuthMSCHAPV2SuccessTCP(t *testing.T) { for _, dictPath := range raCfg.RadiusAgentCfg().ClientDictionaries { if dictRad, err = radigo.NewDictionaryFromFoldersWithRFC2865(dictPath); err != nil { return } } if raAuthClnt, err = radigo.NewClient(utils.TCP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil { t.Fatal(err) } authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps() if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("MS-CHAP-Challenge", string(authReq.Authenticator[:]), "Microsoft"); err != nil { t.Error(err) } respVal, err := radigo.GenerateClientMSCHAPResponse(authReq.Authenticator, "1001", "CGRateSPassword1") if err != nil { t.Error(err) } if err := authReq.AddAVPWithName("MS-CHAP2-Response", string(respVal), "Microsoft"); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Sip-From-Tag", "51585363", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil { t.Error(err) } reply, err := raAuthClnt.SendRequest(authReq) if err != nil { t.Fatal(err) } if reply.Code != radigo.AccessAccept { t.Errorf("Received reply: %+v", utils.ToJSON(reply)) } if len(reply.AVPs) != 2 { // make sure max duration is received t.Errorf("Received AVPs: %+v", utils.ToJSON(reply.AVPs)) } else { for _, avp := range reply.AVPs { if avp.Number == 26 && len(avp.RawValue) != 49 { t.Errorf("Unexpected lenght of MS-CHAP2-Success AVP: %+v", len(avp.RawValue)) } if avp.Number == 225 && !bytes.Equal([]byte("session_max_time#10800"), reply.AVPs[1].RawValue) { t.Errorf("Received: %s", string(reply.AVPs[0].RawValue)) } } } } func testRAitAuthMSCHAPV2Fail(t *testing.T) { for _, dictPath := range raCfg.RadiusAgentCfg().ClientDictionaries { if dictRad, err = radigo.NewDictionaryFromFoldersWithRFC2865(dictPath); err != nil { return } } if raAuthClnt, err = radigo.NewClient(utils.UDP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil { t.Fatal(err) } authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps() if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("MS-CHAP-Challenge", string(authReq.Authenticator[:]), "Microsoft"); err != nil { t.Error(err) } respVal, err := radigo.GenerateClientMSCHAPResponse(authReq.Authenticator, "1001", "CGRateSPassword2") if err != nil { t.Error(err) } if err := authReq.AddAVPWithName("MS-CHAP2-Response", string(respVal), "Microsoft"); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Sip-From-Tag", "51585363", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil { t.Error(err) } reply, err := raAuthClnt.SendRequest(authReq) if err != nil { t.Fatal(err) } if reply.Code != radigo.AccessReject { t.Errorf("Received reply: %+v", reply) } if len(reply.AVPs) != 1 { // make sure max duration is received t.Errorf("Received AVPs: %+v", reply.AVPs) } else if utils.RadauthFailed != string(reply.AVPs[0].RawValue) { t.Errorf("Received: %s", string(reply.AVPs[0].RawValue)) } } func testRAitAuthMSCHAPV2FailTCP(t *testing.T) { for _, dictPath := range raCfg.RadiusAgentCfg().ClientDictionaries { if dictRad, err = radigo.NewDictionaryFromFoldersWithRFC2865(dictPath); err != nil { return } } if raAuthClnt, err = radigo.NewClient(utils.TCP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil { t.Fatal(err) } authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps() if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("MS-CHAP-Challenge", string(authReq.Authenticator[:]), "Microsoft"); err != nil { t.Error(err) } respVal, err := radigo.GenerateClientMSCHAPResponse(authReq.Authenticator, "1001", "CGRateSPassword2") if err != nil { t.Error(err) } if err := authReq.AddAVPWithName("MS-CHAP2-Response", string(respVal), "Microsoft"); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Sip-From-Tag", "51585363", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil { t.Error(err) } reply, err := raAuthClnt.SendRequest(authReq) if err != nil { t.Fatal(err) } if reply.Code != radigo.AccessReject { t.Errorf("Received reply: %+v", reply) } if len(reply.AVPs) != 1 { // make sure max duration is received t.Errorf("Received AVPs: %+v", reply.AVPs) } else if utils.RadauthFailed != string(reply.AVPs[0].RawValue) { t.Errorf("Received: %s", string(reply.AVPs[0].RawValue)) } } func testRAitChallenge(t *testing.T) { if raAuthClnt, err = radigo.NewClient(utils.UDP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil { t.Fatal(err) } authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps() if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Sip-From-Tag", "12345678", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil { t.Error(err) } reply, err := raAuthClnt.SendRequest(authReq) if err != nil { t.Fatal(err) } if reply.Code != radigo.AccessChallenge { t.Errorf("Received reply: %+v", utils.ToJSON(reply)) } if len(reply.AVPs) != 1 { // make sure the client receive the message t.Errorf("Received AVPs: %+v", utils.ToJSON(reply.AVPs)) } else if !bytes.Equal([]byte("Missing User-Password"), reply.AVPs[0].RawValue) { t.Errorf("Received: %s", string(reply.AVPs[0].RawValue)) } } func testRAitChallengeTCP(t *testing.T) { if raAuthClnt, err = radigo.NewClient(utils.TCP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil { t.Fatal(err) } authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps() if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Sip-From-Tag", "12345678", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil { t.Error(err) } reply, err := raAuthClnt.SendRequest(authReq) if err != nil { t.Fatal(err) } if reply.Code != radigo.AccessChallenge { t.Errorf("Received reply: %+v", utils.ToJSON(reply)) } if len(reply.AVPs) != 1 { // make sure the client receive the message t.Errorf("Received AVPs: %+v", utils.ToJSON(reply.AVPs)) } else if !bytes.Equal([]byte("Missing User-Password"), reply.AVPs[0].RawValue) { t.Errorf("Received: %s", string(reply.AVPs[0].RawValue)) } } func testRAitChallengeResponse(t *testing.T) { if raAuthClnt, err = radigo.NewClient(utils.UDP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil { t.Fatal(err) } authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps() if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("User-Password", "CGRateSPassword1", ""); err != nil { t.Error(err) } // encode the password as required so we can decode it properly authReq.AVPs[1].RawValue = radigo.EncodeUserPassword([]byte("CGRateSPassword1"), []byte("CGRateS.org"), authReq.Authenticator[:]) if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Sip-From-Tag", "12345678", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil { t.Error(err) } reply, err := raAuthClnt.SendRequest(authReq) if err != nil { t.Fatal(err) } if reply.Code != radigo.AccessAccept { t.Errorf("Received reply: %+v", utils.ToJSON(reply)) } if len(reply.AVPs) != 1 { // make sure max duration is received t.Errorf("Received AVPs: %+v", utils.ToJSON(reply.AVPs)) } else if !bytes.Equal([]byte("session_max_time#10800"), reply.AVPs[0].RawValue) { t.Errorf("Received: %s", string(reply.AVPs[0].RawValue)) } } func testRAitChallengeResponseTCP(t *testing.T) { if raAuthClnt, err = radigo.NewClient(utils.TCP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil { t.Fatal(err) } authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps() if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("User-Password", "CGRateSPassword1", ""); err != nil { t.Error(err) } // encode the password as required so we can decode it properly authReq.AVPs[1].RawValue = radigo.EncodeUserPassword([]byte("CGRateSPassword1"), []byte("CGRateS.org"), authReq.Authenticator[:]) if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Sip-From-Tag", "12345678", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil { t.Error(err) } if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil { t.Error(err) } reply, err := raAuthClnt.SendRequest(authReq) if err != nil { t.Fatal(err) } if reply.Code != radigo.AccessAccept { t.Errorf("Received reply: %+v", utils.ToJSON(reply)) } if len(reply.AVPs) != 1 { // make sure max duration is received t.Errorf("Received AVPs: %+v", utils.ToJSON(reply.AVPs)) } else if !bytes.Equal([]byte("session_max_time#10800"), reply.AVPs[0].RawValue) { t.Errorf("Received: %s", string(reply.AVPs[0].RawValue)) } } func testRAitAcctStart(t *testing.T) { if raAcctClnt, err = radigo.NewClient(utils.UDP, "127.0.0.1:1813", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil { t.Fatal(err) } req := raAcctClnt.NewRequest(radigo.AccountingRequest, 2) // emulates Kamailio packet for accounting start if err := req.AddAVPWithName("Acct-Status-Type", "Start", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("Service-Type", "Sip-Session", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("Sip-Response-Code", "200", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("Sip-Method", "Invite", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("Sip-From-Tag", "51585361", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("Sip-To-Tag", "75c2f57b", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("User-Name", "1001", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("Ascend-User-Acct-Time", "1497106115", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("NAS-Port", "5060", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("Acct-Delay-Time", "0", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil { t.Error(err) } reply, err := raAcctClnt.SendRequest(req) if err != nil { t.Error(err) } if reply.Code != radigo.AccountingResponse { t.Errorf("Received reply: %+v", reply) } if len(reply.AVPs) != 0 { // we don't expect AVPs to be populated t.Errorf("Received AVPs: %+v", reply.AVPs) } // Make sure the sessin is managed by SMG time.Sleep(10 * time.Millisecond) expUsage := 10 * time.Second if isDispatcherActive { // no debit interval set on dispatched session expUsage = 3 * time.Hour } var aSessions []*sessions.ExternalSession if err := raRPC.Call(context.Background(), utils.SessionSv1GetActiveSessions, utils.SessionFilter{ Filters: []string{ fmt.Sprintf("*string:~*req.%s:%s", utils.RunID, utils.MetaDefault), fmt.Sprintf("*string:~*req.%s:%s", utils.OriginID, "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0-51585361-75c2f57b"), }, }, &aSessions); err != nil { t.Error(err) } else if len(aSessions) != 1 { t.Errorf("Unexpected number of sessions received: %+v", aSessions) } else if aSessions[0].Usage != expUsage { t.Errorf("Expecting %v, received usage: %v\nAnd Session: %s ", expUsage, aSessions[0].Usage, utils.ToJSON(aSessions)) } } func testRAitAcctStartTCP(t *testing.T) { if raAcctClnt, err = radigo.NewClient(utils.TCP, "127.0.0.1:1813", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil { t.Fatal(err) } req := raAcctClnt.NewRequest(radigo.AccountingRequest, 2) // emulates Kamailio packet for accounting start if err := req.AddAVPWithName("Acct-Status-Type", "Start", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("Service-Type", "Sip-Session", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("Sip-Response-Code", "200", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("Sip-Method", "Invite", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("Sip-From-Tag", "51585361", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("Sip-To-Tag", "75c2f57b", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("User-Name", "1001", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("Ascend-User-Acct-Time", "1497106115", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("NAS-Port", "5060", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("Acct-Delay-Time", "0", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil { t.Error(err) } reply, err := raAcctClnt.SendRequest(req) if err != nil { t.Error(err) } if reply.Code != radigo.AccountingResponse { t.Errorf("Received reply: %+v", reply) } if len(reply.AVPs) != 0 { // we don't expect AVPs to be populated t.Errorf("Received AVPs: %+v", reply.AVPs) } // Make sure the sessin is managed by SMG time.Sleep(10 * time.Millisecond) expUsage := 10 * time.Second if isDispatcherActive { // no debit interval set on dispatched session expUsage = 3 * time.Hour } var aSessions []*sessions.ExternalSession if err := raRPC.Call(context.Background(), utils.SessionSv1GetActiveSessions, utils.SessionFilter{ Filters: []string{ fmt.Sprintf("*string:~*req.%s:%s", utils.RunID, utils.MetaDefault), fmt.Sprintf("*string:~*req.%s:%s", utils.OriginID, "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0-51585361-75c2f57b"), }, }, &aSessions); err != nil { t.Error(err) } else if len(aSessions) != 1 { t.Errorf("Unexpected number of sessions received: %+v", aSessions) } else if aSessions[0].Usage != expUsage { t.Errorf("Expecting %v, received usage: %v\nAnd Session: %s ", expUsage, aSessions[0].Usage, utils.ToJSON(aSessions)) } } func testRAitAcctStop(t *testing.T) { req := raAcctClnt.NewRequest(radigo.AccountingRequest, 3) // emulates Kamailio packet for accounting start if err := req.AddAVPWithName("Acct-Status-Type", "Stop", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("Service-Type", "Sip-Session", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("Sip-Response-Code", "200", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("Sip-Method", "Bye", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("Event-Timestamp", "1497106119", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("Sip-From-Tag", "51585361", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("Sip-To-Tag", "75c2f57b", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("User-Name", "1001", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("Ascend-User-Acct-Time", "1497106115", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("NAS-Port", "5060", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("Acct-Delay-Time", "0", ""); err != nil { t.Error(err) } if err := req.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil { t.Error(err) } reply, err := raAcctClnt.SendRequest(req) if err != nil { t.Error(err) } if reply.Code != radigo.AccountingResponse { t.Errorf("Received reply: %+v", reply) } if len(reply.AVPs) != 0 { // we don't expect AVPs to be populated t.Errorf("Received AVPs: %+v", reply.AVPs) } // Make sure the sessin was disconnected from SMG var aSessions []*sessions.ExternalSession if err := raRPC.Call(context.Background(), utils.SessionSv1GetActiveSessions, utils.SessionFilter{ Filters: []string{ fmt.Sprintf("*string:~*req.%s:%s", utils.RunID, utils.MetaDefault), fmt.Sprintf("*string:~*req.%s:%s", utils.OriginID, "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0-51585361-75c2f57b"), }, }, &aSessions); err == nil || err.Error() != utils.ErrNotFound.Error() { t.Error(err) } time.Sleep(150 * time.Millisecond) var cdrs []*engine.ExternalCDR args := utils.RPCCDRsFilter{RunIDs: []string{utils.MetaDefault}, DestinationPrefixes: []string{"1002"}} if err := raRPC.Call(context.Background(), utils.APIerSv2GetCDRs, &args, &cdrs); err != nil { t.Error("Unexpected error: ", err.Error()) } else if len(cdrs) != 1 { t.Error("Unexpected number of CDRs returned: ", len(cdrs)) } else { if cdrs[0].Usage != "4s" { t.Errorf("Unexpected CDR Usage received, cdr: %v ", cdrs[0]) } if cdrs[0].CostSource != utils.MetaSessionS { t.Errorf("Unexpected CDR CostSource received for CDR: %v", cdrs[0]) } if cdrs[0].Cost != 0.01 { t.Errorf("Unexpected CDR Cost received for CDR: %v", cdrs[0].Cost) } if cdrs[0].ExtraFields["RemoteAddr"] != "127.0.0.1" { t.Errorf("Unexpected CDR RemoteAddr received for CDR: %+v", utils.ToJSON(cdrs[0])) } } } func testRAitStopCgrEngine(t *testing.T) { if err := engine.KillEngine(100); err != nil { t.Error(err) } }