/* Real-time Online/Offline Charging System (OCS) for Telecom & ISP environments Copyright (C) ITsysCOM GmbH This program is free software: you can redistribute it and/or modify it under the terms of the GNU Affero General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more details. You should have received a copy of the GNU Affero General Public License along with this program. If not, see */ package config import ( "reflect" "testing" "github.com/cgrates/cgrates/utils" ) func TestDNSAgentCfgloadFromJsonCfg(t *testing.T) { jsnCfg := &DNSAgentJsonCfg{ Enabled: utils.BoolPointer(true), Listeners: &[]*DnsListenerJsnCfg{ { Address: utils.StringPointer("127.0.0.1:2053"), Network: utils.StringPointer("udp"), }, }, SessionSConns: &[]string{utils.MetaInternal, "*conn1"}, StatSConns: &[]string{utils.MetaInternal, "*conn1"}, ThresholdSConns: &[]string{utils.MetaInternal, "*conn1"}, Timezone: utils.StringPointer("UTC"), RequestProcessors: &[]*ReqProcessorJsnCfg{ { ID: utils.StringPointer("OutboundAUTHDryRun"), Filters: &[]string{"*string:~*req.request_type:OutboundAUTH", "*string:~*req.Msisdn:497700056231"}, Flags: &[]string{"*dryrun"}, Timezone: utils.StringPointer("UTC"), Request_fields: &[]*FcTemplateJsonCfg{}, Reply_fields: &[]*FcTemplateJsonCfg{ {Tag: utils.StringPointer("Allow"), Path: utils.StringPointer("*rep.response.Allow"), Type: utils.StringPointer("constant"), Mandatory: utils.BoolPointer(true), Layout: utils.StringPointer(utils.EmptyString)}, }, }, }, } expected := &DNSAgentCfg{ Enabled: true, Listeners: []DnsListener{ { Address: "127.0.0.1:2053", Network: "udp", }, }, SessionSConns: []string{utils.ConcatenatedKey(utils.MetaInternal, utils.MetaSessionS), "*conn1"}, StatSConns: []string{utils.ConcatenatedKey(utils.MetaInternal, utils.MetaStats), "*conn1"}, ThresholdSConns: []string{utils.ConcatenatedKey(utils.MetaInternal, utils.MetaThresholds), "*conn1"}, Timezone: "UTC", RequestProcessors: []*RequestProcessor{ { ID: "OutboundAUTHDryRun", Filters: []string{"*string:~*req.request_type:OutboundAUTH", "*string:~*req.Msisdn:497700056231"}, Flags: utils.FlagsWithParamsFromSlice([]string{utils.MetaDryRun}), Timezone: "UTC", RequestFields: []*FCTemplate{}, ReplyFields: []*FCTemplate{ {Tag: "Allow", Path: "*rep.response.Allow", Type: "constant", Mandatory: true, Layout: utils.EmptyString}, }, }, }, } for _, v := range expected.RequestProcessors[0].ReplyFields { v.ComputePath() } jsonCfg := NewDefaultCGRConfig() if err := jsonCfg.dnsAgentCfg.loadFromJSONCfg(jsnCfg, jsonCfg.generalCfg.RSRSep); err != nil { t.Error(err) } else if !reflect.DeepEqual(jsonCfg.dnsAgentCfg, expected) { t.Errorf("Expected %+v \n, received %+v", utils.ToJSON(expected), utils.ToJSON(jsonCfg.dnsAgentCfg)) } } func TestRequestProcessorloadFromJsonCfg(t *testing.T) { var dareq, expected RequestProcessor if err := dareq.loadFromJSONCfg(nil, utils.InfieldSep); err != nil { t.Error(err) } else if !reflect.DeepEqual(dareq, expected) { t.Errorf("Expected: %+v ,received: %+v", expected, dareq) } if err := dareq.loadFromJSONCfg(new(ReqProcessorJsnCfg), utils.InfieldSep); err != nil { t.Error(err) } else if !reflect.DeepEqual(dareq, expected) { t.Errorf("Expected: %+v ,received: %+v", expected, dareq) } json := &ReqProcessorJsnCfg{ ID: utils.StringPointer("cgrates"), Tenant: utils.StringPointer("tenant"), Filters: &[]string{"filter1", "filter2"}, Flags: &[]string{"flag1", "flag2"}, } expected = RequestProcessor{ ID: "cgrates", Tenant: NewRSRParsersMustCompile("tenant", utils.InfieldSep), Filters: []string{"filter1", "filter2"}, Flags: utils.FlagsWithParams{"flag1": {}, "flag2": {}}, } if err := dareq.loadFromJSONCfg(json, utils.InfieldSep); err != nil { t.Error(err) } else if !reflect.DeepEqual(expected, dareq) { t.Errorf("Expected: %+v , received: %+v", utils.ToJSON(expected), utils.ToJSON(dareq)) } } func TestRequestProcessorDNSAgentloadFromJsonCfg(t *testing.T) { cfgJSON := &DNSAgentJsonCfg{ RequestProcessors: &[]*ReqProcessorJsnCfg{ { Tenant: utils.StringPointer("a{*"), }, }, } expected := "invalid converter terminator in rule: " jsonCfg := NewDefaultCGRConfig() if err := jsonCfg.dnsAgentCfg.loadFromJSONCfg(cfgJSON, jsonCfg.generalCfg.RSRSep); err == nil || err.Error() != expected { t.Errorf("Expected %+v, received %+v", expected, err) } } func TestRequestProcessorDNSAgentloadFromJsonCfg1(t *testing.T) { cfgJSONStr := `{ "dns_agent": { "request_processors": [ { "id": "random", }, ] } }` cfgJSON := &DNSAgentJsonCfg{ RequestProcessors: &[]*ReqProcessorJsnCfg{ { ID: utils.StringPointer("random"), }, }, } if jsonCfg, err := NewCGRConfigFromJSONStringWithDefaults(cfgJSONStr); err != nil { t.Error(err) } else if err = jsonCfg.dnsAgentCfg.loadFromJSONCfg(cfgJSON, jsonCfg.generalCfg.RSRSep); err != nil { t.Error(err) } } func TestRequestProcessorReplyFieldsloadFromJsonCfg(t *testing.T) { cfgJSON := &DNSAgentJsonCfg{ RequestProcessors: &[]*ReqProcessorJsnCfg{ { Reply_fields: &[]*FcTemplateJsonCfg{ { Value: utils.StringPointer("a{*"), }, }, }, }, } expected := "invalid converter terminator in rule: " jsonCfg := NewDefaultCGRConfig() if err := jsonCfg.dnsAgentCfg.loadFromJSONCfg(cfgJSON, jsonCfg.generalCfg.RSRSep); err == nil || err.Error() != expected { t.Errorf("Expected %+v, received %+v", expected, err) } } func TestRequestProcessorRequestFieldsloadFromJsonCfg(t *testing.T) { cfgJSON := &DNSAgentJsonCfg{ RequestProcessors: &[]*ReqProcessorJsnCfg{ { Request_fields: &[]*FcTemplateJsonCfg{ { Value: utils.StringPointer("a{*"), }, }, }, }, } expected := "invalid converter terminator in rule: " jsonCfg := NewDefaultCGRConfig() if err := jsonCfg.dnsAgentCfg.loadFromJSONCfg(cfgJSON, jsonCfg.generalCfg.RSRSep); err == nil || err.Error() != expected { t.Errorf("Expected %+v, received %+v", expected, err) } } func TestDNSAgentCfgAsMapInterface(t *testing.T) { cfgJSONStr := `{ "dns_agent": { "enabled": false, "listeners":[ { "address": "127.0.0.1:2053", "network": "udp" } ], "sessions_conns": ["*internal"], "timezone": "", "request_processors": [], }, }` eMap := map[string]any{ utils.EnabledCfg: false, utils.ListenersCfg: []map[string]any{ { utils.AddressCfg: "127.0.0.1:2053", utils.NetworkCfg: "udp", }, }, utils.SessionSConnsCfg: []string{"*internal"}, utils.StatSConnsCfg: []string{}, utils.ThresholdSConnsCfg: []string{}, utils.TimezoneCfg: "", utils.RequestProcessorsCfg: []map[string]any{}, } if cgrCfg, err := NewCGRConfigFromJSONStringWithDefaults(cfgJSONStr); err != nil { t.Error(err) } else if rcv := cgrCfg.dnsAgentCfg.AsMapInterface(utils.EmptyString); !reflect.DeepEqual(eMap, rcv) { t.Errorf("Expected %+v, received %+v", eMap, rcv) } } func TestDNSAgentCfgAsMapInterface1(t *testing.T) { cfgJSONStr := `{ "dns_agent": { "enabled": false, "listeners":[ { "address": "127.0.0.1:2053", "network": "udp" } ], "sessions_conns": ["*internal:*sessions", "*conn1"], "stats_conns": ["*internal:*stats", "*conn1"], "thresholds_conns": ["*internal:*thresholds", "*conn1"], "timezone": "UTC", "request_processors": [ { "id": "OutboundAUTHDryRun", "filters": ["*string:~*req.request_type:OutboundAUTH","*string:~*req.Msisdn:497700056231"], "tenant": "cgrates.org", "flags": ["*dryrun"], "timezone": "UTC", "request_fields":[], "reply_fields":[ {"tag": "Allow", "path": "*rep.response.Allow", "type": "*constant", "value": "1", "mandatory": true}, {"tag": "Concatenated1", "path": "*rep.response.Concatenated", "type": "*composed", "value": "~*req.MCC;/", "mandatory": true}, {"tag": "Concatenated2", "path": "*rep.response.Concatenated", "type": "*composed", "value": "Val1"}, {"tag": "MaxDuration", "path": "*rep.response.MaxDuration", "type": "*constant", "value": "1200", "blocker": true}, {"tag": "Unused", "path": "*rep.response.Unused", "type": "*constant", "value": "0"}, ], }, ], }, }` eMap := map[string]any{ utils.EnabledCfg: false, utils.ListenersCfg: []map[string]any{ { utils.AddressCfg: "127.0.0.1:2053", utils.NetworkCfg: "udp", }, }, utils.SessionSConnsCfg: []string{utils.MetaInternal, "*conn1"}, utils.StatSConnsCfg: []string{utils.MetaInternal, "*conn1"}, utils.ThresholdSConnsCfg: []string{utils.MetaInternal, "*conn1"}, utils.TimezoneCfg: "UTC", utils.RequestProcessorsCfg: []map[string]any{ { utils.IDCfg: "OutboundAUTHDryRun", utils.FiltersCfg: []string{"*string:~*req.request_type:OutboundAUTH", "*string:~*req.Msisdn:497700056231"}, utils.TenantCfg: "cgrates.org", utils.FlagsCfg: []string{"*dryrun"}, utils.TimezoneCfg: "UTC", utils.RequestFieldsCfg: []map[string]any{}, utils.ReplyFieldsCfg: []map[string]any{ {utils.TagCfg: "Allow", utils.PathCfg: "*rep.response.Allow", utils.TypeCfg: "*constant", utils.ValueCfg: "1", utils.MandatoryCfg: true}, {utils.TagCfg: "Concatenated1", utils.PathCfg: "*rep.response.Concatenated", utils.TypeCfg: "*composed", utils.ValueCfg: "~*req.MCC;/", utils.MandatoryCfg: true}, {utils.TagCfg: "Concatenated2", utils.PathCfg: "*rep.response.Concatenated", utils.TypeCfg: "*composed", utils.ValueCfg: "Val1"}, {utils.TagCfg: "MaxDuration", utils.PathCfg: "*rep.response.MaxDuration", utils.TypeCfg: "*constant", utils.ValueCfg: "1200", utils.BlockerCfg: true}, {utils.TagCfg: "Unused", utils.PathCfg: "*rep.response.Unused", utils.TypeCfg: "*constant", utils.ValueCfg: "0"}, }, }, }, } if cgrCfg, err := NewCGRConfigFromJSONStringWithDefaults(cfgJSONStr); err != nil { t.Error(err) } else if rcv := cgrCfg.dnsAgentCfg.AsMapInterface(cgrCfg.generalCfg.RSRSep); !reflect.DeepEqual(eMap, rcv) { t.Errorf("Expected %+v \n, received %+v", utils.ToIJSON(eMap), utils.ToIJSON(rcv)) } } func TestRequestProcessorClone(t *testing.T) { rp := &RequestProcessor{ ID: "cgrates", Tenant: NewRSRParsersMustCompile("cgrates.org", utils.InfieldSep), Filters: []string{"*string:~req.Account:1001"}, Flags: utils.FlagsWithParams{utils.MetaAttributes: {}}, Timezone: "UTC", ReplyFields: []*FCTemplate{{}}, RequestFields: []*FCTemplate{{}}, } rcv := rp.Clone() if !reflect.DeepEqual(rp, rcv) { t.Errorf("Expected: %+v\nReceived: %+v", utils.ToJSON(rp), utils.ToJSON(rcv)) } rcv.Filters[0] = "*string:~req.Account:1002" if rp.Filters[0] != "*string:~req.Account:1001" { t.Errorf("Expected clone to not modify the cloned") } rcv.ReplyFields[0].Tag = "new" if rp.ReplyFields[0].Tag != "" { t.Errorf("Expected clone to not modify the cloned") } } func TestDNSAgentCfgClone(t *testing.T) { ban := &DNSAgentCfg{ Enabled: true, Listeners: []DnsListener{ { Address: "127.0.0.1:2053", Network: "udp", }, }, SessionSConns: []string{utils.ConcatenatedKey(utils.MetaInternal, utils.MetaSessionS), "*conn1"}, StatSConns: []string{}, ThresholdSConns: []string{}, Timezone: "UTC", RequestProcessors: []*RequestProcessor{ { ID: "OutboundAUTHDryRun", Filters: []string{"*string:~*req.request_type:OutboundAUTH", "*string:~*req.Msisdn:497700056231"}, Flags: utils.FlagsWithParamsFromSlice([]string{utils.MetaDryRun}), Timezone: "UTC", RequestFields: []*FCTemplate{}, ReplyFields: []*FCTemplate{ {Tag: "Allow", Path: "*rep.response.Allow", Type: "constant", Mandatory: true, Layout: utils.EmptyString}, }, }, }, } rcv := ban.Clone() if !reflect.DeepEqual(ban, rcv) { t.Errorf("Expected: %+v\nReceived: %+v", utils.ToJSON(ban), utils.ToJSON(rcv)) } if rcv.SessionSConns[1] = ""; ban.SessionSConns[1] != "*conn1" { t.Errorf("Expected clone to not modify the cloned") } if rcv.RequestProcessors[0].ID = ""; ban.RequestProcessors[0].ID != "OutboundAUTHDryRun" { t.Errorf("Expected clone to not modify the cloned") } }