/* Real-time Online/Offline Charging System (OCS) for Telecom & ISP environments Copyright (C) ITsysCOM GmbH This program is free software: you can redistribute it and/or modify it under the terms of the GNU Affero General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more details. You should have received a copy of the GNU Affero General Public License along with this program. If not, see */ package engine import ( "encoding/json" "fmt" "net/http" "net/http/httptest" "reflect" "strings" "testing" "time" "github.com/cgrates/baningo" "github.com/cgrates/birpc" "github.com/cgrates/birpc/context" "github.com/cgrates/cgrates/config" "github.com/cgrates/cgrates/utils" ) func TestFilterPassString(t *testing.T) { cd := &CallDescriptor{ Category: "call", Tenant: "cgrates.org", Subject: "dan", Destination: "+4986517174963", TimeStart: time.Date(2013, time.October, 7, 14, 50, 0, 0, time.UTC), TimeEnd: time.Date(2013, time.October, 7, 14, 52, 12, 0, time.UTC), DurationIndex: 132 * time.Second, ExtraFields: map[string]string{"navigation": "off"}, } rf := &FilterRule{Type: utils.MetaString, Element: "~Category", Values: []string{"call"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.passString(cd); err != nil { t.Error(err) } else if !passes { t.Error("Not passes filter") } rf = &FilterRule{Type: utils.MetaString, Element: "~Category", Values: []string{"cal"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.passString(cd); err != nil { t.Error(err) } else if passes { t.Error("Filter passes") } //not rf = &FilterRule{Type: utils.MetaNotString, Element: "~Category", Values: []string{"call"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.Pass(cd); err != nil { t.Error(err) } else if passes { t.Error("Filter passes") } rf = &FilterRule{Type: utils.MetaNotString, Element: "~Category", Values: []string{"cal"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.Pass(cd); err != nil { t.Error(err) } else if !passes { t.Error("Not passes filter") } } func TestFilterPassContains(t *testing.T) { dp := utils.MapStorage{ utils.MetaReq: map[string]any{ "Attribute": "AttributeProfile1", utils.AnswerTime: time.Date(2014, 7, 14, 14, 30, 0, 0, time.UTC), "UsageInterval": "1s", utils.Weight: "20.0", "Account": "1001", "OriginHost": "22.15.81.122", }} rF, _ := NewFilterRule(utils.MetaContains, "~*req.Attribute", []string{"Profile"}) if pass, err := rF.passContains(dp); err != nil { t.Error(err) } else if !pass { t.Error("FilterRule should pass") } rF, _ = NewFilterRule(utils.MetaContains, "~*req.OriginHost", []string{"81"}) if pass, err := rF.passContains(dp); err != nil { t.Error(err) } else if !pass { t.Error("FilterRule should pass") } rF, _ = NewFilterRule(utils.MetaContains, "~*req.Account", []string{"200"}) if pass, err := rF.passContains(dp); err != nil { t.Error(err) } else if pass { t.Error("FilterRule should not pass") } } func TestFilterPassRegex(t *testing.T) { cd := &CallDescriptor{ Category: "call", Tenant: "cgrates.org", Subject: "dan", Destination: "+4986517174963", TimeStart: time.Date(2013, time.October, 7, 14, 50, 0, 0, time.UTC), TimeEnd: time.Date(2013, time.October, 7, 14, 52, 12, 0, time.UTC), DurationIndex: 132 * time.Second, ExtraFields: map[string]string{"navigation": "off"}, } rf := &FilterRule{Type: utils.MetaRegex, Element: "~Category", Values: []string{"^call$"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.passRegex(cd); err != nil { t.Error(err) } else if !passes { t.Error("Not passes filter") } rf = &FilterRule{Type: utils.MetaRegex, Element: "~Category", Values: []string{"cal$"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.passRegex(cd); err != nil { t.Error(err) } else if passes { t.Error("Filter passes") } //not rf = &FilterRule{Type: utils.MetaNotRegex, Element: "~Category", Values: []string{"^call$"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.Pass(cd); err != nil { t.Error(err) } else if passes { t.Error("Filter passes") } rf = &FilterRule{Type: utils.MetaNotRegex, Element: "~Category", Values: []string{"cal$"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.Pass(cd); err != nil { t.Error(err) } else if !passes { t.Error("Not passes filter") } } func TestFilterPassEmpty(t *testing.T) { cd := &CallDescriptor{ Category: "", Tenant: "cgrates.org", Subject: "dan", Destination: "+4986517174963", TimeStart: time.Date(2013, time.October, 7, 14, 50, 0, 0, time.UTC), TimeEnd: time.Date(2013, time.October, 7, 14, 52, 12, 0, time.UTC), DurationIndex: 132 * time.Second, ExtraFields: map[string]string{"navigation": "off"}, } rf := &FilterRule{Type: utils.MetaEmpty, Element: "~Category", Values: []string{}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.passEmpty(cd); err != nil { t.Error(err) } else if !passes { t.Error("Not passes filter") } rf = &FilterRule{Type: utils.MetaEmpty, Element: "~ExtraFields", Values: []string{}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.passEmpty(cd); err != nil { t.Error(err) } else if passes { t.Error("Filter passes") } cd.ExtraFields = map[string]string{} rf = &FilterRule{Type: utils.MetaEmpty, Element: "~ExtraFields", Values: []string{}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.passEmpty(cd); err != nil { t.Error(err) } else if !passes { t.Error("Not passes filter") } //not rf = &FilterRule{Type: utils.MetaNotEmpty, Element: "~Category", Values: []string{}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.Pass(cd); err != nil { t.Error(err) } else if passes { t.Error("Filter passes") } } func TestFilterPassExists(t *testing.T) { cd := &CallDescriptor{ Category: "", Tenant: "cgrates.org", Subject: "dan", Destination: "+4986517174963", TimeStart: time.Date(2013, time.October, 7, 14, 50, 0, 0, time.UTC), TimeEnd: time.Date(2013, time.October, 7, 14, 52, 12, 0, time.UTC), DurationIndex: 132 * time.Second, ExtraFields: map[string]string{"navigation": "off"}, } rf := &FilterRule{Type: utils.MetaExists, Element: "~Category", Values: []string{}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.passExists(cd); err != nil { t.Error(err) } else if !passes { t.Error("Not passes filter") } rf = &FilterRule{Type: utils.MetaExists, Element: "~ExtraFields1", Values: []string{}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.passExists(cd); err != nil { t.Error(err) } else if passes { t.Error("Filter passes") } cd.ExtraFields = map[string]string{} rf = &FilterRule{Type: utils.MetaExists, Element: "~ExtraFields", Values: []string{}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.passExists(cd); err != nil { t.Error(err) } else if !passes { t.Error("Not passes filter") } //not rf = &FilterRule{Type: utils.MetaNotExists, Element: "~Category1", Values: []string{}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.Pass(cd); err != nil { t.Error(err) } else if !passes { t.Error("Not passes filter") } } func TestFilterPassStringPrefix(t *testing.T) { cd := &CallDescriptor{ Category: "call", Tenant: "cgrates.org", Subject: "dan", Destination: "+4986517174963", TimeStart: time.Date(2013, time.October, 7, 14, 50, 0, 0, time.UTC), TimeEnd: time.Date(2013, time.October, 7, 14, 52, 12, 0, time.UTC), DurationIndex: 132 * time.Second, ExtraFields: map[string]string{"navigation": "off"}, } rf := &FilterRule{Type: utils.MetaPrefix, Element: "~Category", Values: []string{"call"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.passStringPrefix(cd); err != nil { t.Error(err) } else if !passes { t.Error("Not passes filter") } rf = &FilterRule{Type: utils.MetaPrefix, Element: "~Category", Values: []string{"premium"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.passStringPrefix(cd); err != nil { t.Error(err) } else if passes { t.Error("Passes filter") } rf = &FilterRule{Type: utils.MetaPrefix, Element: "~Destination", Values: []string{"+49"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.passStringPrefix(cd); err != nil { t.Error(err) } else if !passes { t.Error("Not passes filter") } rf = &FilterRule{Type: utils.MetaPrefix, Element: "~Destination", Values: []string{"+499"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.passStringPrefix(cd); err != nil { t.Error(err) } else if passes { t.Error("Passes filter") } rf = &FilterRule{Type: utils.MetaPrefix, Element: "~navigation", Values: []string{"off"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.passStringPrefix(cd); err != nil { t.Error(err) } else if !passes { t.Error("Not passes filter") } rf = &FilterRule{Type: utils.MetaPrefix, Element: "~nonexisting", Values: []string{"off"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passing, err := rf.passStringPrefix(cd); err != nil { t.Error(err) } else if passing { t.Error("Passes filter") } //not rf = &FilterRule{Type: utils.MetaNotPrefix, Element: "~Category", Values: []string{"premium"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.Pass(cd); err != nil { t.Error(err) } else if !passes { t.Error("Not passes filter") } } func TestFilterPassStringSuffix(t *testing.T) { cd := &CallDescriptor{ Category: "call", Tenant: "cgrates.org", Subject: "dan", Destination: "+4986517174963", TimeStart: time.Date(2013, time.October, 7, 14, 50, 0, 0, time.UTC), TimeEnd: time.Date(2013, time.October, 7, 14, 52, 12, 0, time.UTC), DurationIndex: 132 * time.Second, ExtraFields: map[string]string{"navigation": "off"}, } rf := &FilterRule{Type: utils.MetaSuffix, Element: "~Category", Values: []string{"call"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.passStringSuffix(cd); err != nil { t.Error(err) } else if !passes { t.Error("Not passes filter") } rf = &FilterRule{Type: utils.MetaSuffix, Element: "~Category", Values: []string{"premium"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.passStringSuffix(cd); err != nil { t.Error(err) } else if passes { t.Error("Passes filter") } rf = &FilterRule{Type: utils.MetaSuffix, Element: "~Destination", Values: []string{"963"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.passStringSuffix(cd); err != nil { t.Error(err) } else if !passes { t.Error("Not passes filter") } rf = &FilterRule{Type: utils.MetaSuffix, Element: "~Destination", Values: []string{"4966"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.passStringSuffix(cd); err != nil { t.Error(err) } else if passes { t.Error("Passes filter") } rf = &FilterRule{Type: utils.MetaSuffix, Element: "~navigation", Values: []string{"off"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.passStringSuffix(cd); err != nil { t.Error(err) } else if !passes { t.Error("Not passes filter") } rf = &FilterRule{Type: utils.MetaSuffix, Element: "~nonexisting", Values: []string{"off"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passing, err := rf.passStringSuffix(cd); err != nil { t.Error(err) } else if passing { t.Error("Passes filter") } //not rf = &FilterRule{Type: utils.MetaNotSuffix, Element: "~Destination", Values: []string{"963"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.Pass(cd); err != nil { t.Error(err) } else if passes { t.Error("Passes filter") } } func TestFilterPassRSRFields(t *testing.T) { cd := &CallDescriptor{ Category: "call", Tenant: "cgrates.org", Subject: "dan", Destination: "+4986517174963", TimeStart: time.Date(2013, time.October, 7, 14, 50, 0, 0, time.UTC), TimeEnd: time.Date(2013, time.October, 7, 14, 52, 12, 0, time.UTC), DurationIndex: 132 * time.Second, ExtraFields: map[string]string{"navigation": "off"}, } rf, err := NewFilterRule(utils.MetaRSR, "~Tenant", []string{"~^cgr.*\\.org$"}) if err != nil { t.Error(err) } if passes, err := rf.passRSR(cd); err != nil { t.Error(err) } else if !passes { t.Error("Not passing") } rf, err = NewFilterRule(utils.MetaRSR, "~navigation", []string{"on"}) if err != nil { t.Error(err) } if passes, err := rf.passRSR(cd); err != nil { t.Error(err) } else if passes { t.Error("Passing") } rf, err = NewFilterRule(utils.MetaRSR, "~navigation", []string{"off"}) if err != nil { t.Error(err) } if passes, err := rf.passRSR(cd); err != nil { t.Error(err) } else if !passes { t.Error("Not passing") } //not rf, err = NewFilterRule(utils.MetaNotRSR, "~navigation", []string{"off"}) if err != nil { t.Error(err) } if passes, err := rf.Pass(cd); err != nil { t.Error(err) } else if passes { t.Error("Passing") } } func TestFilterPassGtOrLtPass(t *testing.T) { rf, err := NewFilterRule(utils.MetaGreaterThan, "~Usage", []string{"70"}) if err != nil { t.Error(err) } ev := utils.MapStorage{ "Usage": "77", } if passes, err := rf.passGreaterThan(ev); err != nil { t.Error(err) } else if !passes { t.Error("not passing") } rf, err = NewFilterRule(utils.MetaGreaterOrEqual, "~Usage", []string{"77"}) if err != nil { t.Error(err) } if passes, err := rf.passGreaterThan(ev); err != nil { t.Error(err) } else if !passes { t.Error("not passing") } rf, err = NewFilterRule(utils.MetaLessThan, "~Usage", []string{"80"}) if err != nil { t.Error(err) } if passes, err := rf.passGreaterThan(ev); err != nil { t.Error(err) } else if !passes { t.Error("not passing") } rf, err = NewFilterRule(utils.MetaLessOrEqual, "~Usage", []string{"77"}) if err != nil { t.Error(err) } if passes, err := rf.passGreaterThan(ev); err != nil { t.Error(err) } else if !passes { t.Error("not passing") } } func TestFilterPassGtOrLtFail(t *testing.T) { ev := utils.MapStorage{ "Usage": "77", } rf, err := NewFilterRule(utils.MetaGreaterThan, "~Usage", []string{"80"}) if err != nil { t.Error(err) } if passes, err := rf.passGreaterThan(ev); err != nil { t.Error(err) } else if passes { t.Error("passing") } rf, err = NewFilterRule(utils.MetaGreaterOrEqual, "~Usage", []string{"80"}) if err != nil { t.Error(err) } if passes, err := rf.passGreaterThan(ev); err != nil { t.Error(err) } else if passes { t.Error("passing") } rf, err = NewFilterRule(utils.MetaLessThan, "~Usage", []string{"70"}) if err != nil { t.Error(err) } if passes, err := rf.passGreaterThan(ev); err != nil { t.Error(err) } else if passes { t.Error("passing") } rf, err = NewFilterRule(utils.MetaLessOrEqual, "~Usage", []string{"70"}) if err != nil { t.Error(err) } if passes, err := rf.passGreaterThan(ev); err != nil { t.Error(err) } else if passes { t.Error("passing") } } func TestFilterPassGreaterThan(t *testing.T) { rf, err := NewFilterRule(utils.MetaLessThan, "~ASR", []string{"40"}) if err != nil { t.Error(err) } ev := utils.MapStorage{} ev.Set([]string{"ASR"}, 20) if passes, err := rf.passGreaterThan(ev); err != nil { t.Error(err) } else if !passes { t.Error("not passing") } ev = utils.MapStorage{} ev.Set([]string{"ASR"}, 40) if passes, err := rf.passGreaterThan(ev); err != nil { t.Error(err) } else if passes { t.Error("equal should not be passing") } rf, err = NewFilterRule(utils.MetaLessOrEqual, "~ASR", []string{"40"}) if err != nil { t.Error(err) } if passes, err := rf.passGreaterThan(ev); err != nil { t.Error(err) } else if !passes { t.Error("not passing") } rf, err = NewFilterRule(utils.MetaGreaterOrEqual, "~ASR", []string{"40"}) if err != nil { t.Error(err) } if passes, err := rf.passGreaterThan(ev); err != nil { t.Error(err) } else if !passes { t.Error("not passing") } rf, err = NewFilterRule(utils.MetaGreaterOrEqual, "~ASR", []string{"35.5"}) if err != nil { t.Error(err) } if passes, err := rf.passGreaterThan(ev); err != nil { t.Error(err) } else if !passes { t.Error("not passing") } ev = utils.MapStorage{} ev.Set([]string{"ASR"}, 20) if passes, err := rf.passGreaterThan(ev); err != nil { t.Error(err) } else if passes { t.Error("should not pass") } rf, err = NewFilterRule(utils.MetaGreaterOrEqual, "~ACD", []string{"1m50s"}) if err != nil { t.Error(err) } ev = utils.MapStorage{} ev.Set([]string{"ACD"}, 2*time.Minute) if passes, err := rf.passGreaterThan(ev); err != nil { t.Error(err) } else if !passes { t.Error("not pass") } // Second ev = utils.MapStorage{} ev.Set([]string{"ASR"}, 20*time.Second) rf, err = NewFilterRule("*gte", "~ASR", []string{"10s"}) if err != nil { t.Error(err) } if passes, err := rf.passGreaterThan(ev); err != nil { t.Error(err) } else if !passes { t.Error("passing") } rf, err = NewFilterRule("*gte", "~ASR", []string{"10"}) if err != nil { t.Error(err) } if passes, err := rf.passGreaterThan(ev); err != nil { t.Error(err) } else if !passes { t.Error("passing") } ev = utils.MapStorage{} ev.Set([]string{"ASR"}, float64(20*time.Second)) rf, err = NewFilterRule("*gte", "~ASR", []string{"10s"}) if err != nil { t.Error(err) } if passes, err := rf.passGreaterThan(ev); err != nil { t.Error(err) } else if !passes { t.Error("passing") } //Here converter will be consider part of path and will get error : NOT_FOUND ev = utils.MapStorage{} ev.Set([]string{"ASR"}, 20) rf, err = NewFilterRule("*gte", "~ASR{*duration_seconds}", []string{"10"}) if err != nil { t.Error(err) } if passes, err := rf.passGreaterThan(ev); err != nil { t.Error(err) } else if passes { t.Error("passing") } //Here converter will be consider part of path and will get error : NOT_FOUND ev = utils.MapStorage{} ev.Set([]string{"ASR"}, 20) rf, err = NewFilterRule("*gte", "~ASR{*duration_seconds}", []string{"10s"}) if err != nil { t.Error(err) } if passes, err := rf.passGreaterThan(ev); err != nil { t.Error(err) } else if passes { t.Error("passing") } } func TestFilterpassEqualTo(t *testing.T) { rf, err := NewFilterRule(utils.MetaEqual, "~ASR", []string{"40"}) if err != nil { t.Error(err) } ev := utils.MapStorage{} ev.Set([]string{"ASR"}, 40.0) if passes, err := rf.passEqualTo(ev); err != nil { t.Error(err) } else if !passes { t.Error("not passing") } ev = utils.MapStorage{} ev.Set([]string{"ASR"}, 39) if passes, err := rf.passEqualTo(ev); err != nil { t.Error(err) } else if passes { t.Error("equal should not be passing") } rf, err = NewFilterRule(utils.MetaNotEqual, "~ASR", []string{"40"}) if err != nil { t.Error(err) } if passes, err := rf.Pass(ev); err != nil { t.Error(err) } else if !passes { t.Error("not passing", passes) } ev = utils.MapStorage{} ev.Set([]string{"ASR"}, "string1") rf, err = NewFilterRule(utils.MetaEqual, "~ASR", []string{"string1"}) if err != nil { t.Error(err) } if passes, err := rf.passEqualTo(ev); err != nil { t.Error(err) } else if !passes { t.Error("not passing") } } func TestFilterNewRequestFilter(t *testing.T) { rf, err := NewFilterRule(utils.MetaString, "~MetaString", []string{"String"}) if err != nil { t.Errorf("Error: %+v", err) } erf := &FilterRule{Type: utils.MetaString, Element: "~MetaString", Values: []string{"String"}, negative: utils.BoolPointer(false)} if err = erf.CompileValues(); err != nil { t.Fatal(err) } if !reflect.DeepEqual(erf, rf) { t.Errorf("Expecting: %+v, received: %+v", erf, rf) } rf, err = NewFilterRule(utils.MetaEmpty, "~MetaEmpty", []string{}) if err != nil { t.Errorf("Error: %+v", err) } erf = &FilterRule{Type: utils.MetaEmpty, Element: "~MetaEmpty", Values: []string{}, negative: utils.BoolPointer(false)} if err = erf.CompileValues(); err != nil { t.Fatal(err) } if !reflect.DeepEqual(erf, rf) { t.Errorf("Expecting: %+v, received: %+v", erf, rf) } rf, err = NewFilterRule(utils.MetaExists, "~MetaExists", []string{}) if err != nil { t.Errorf("Error: %+v", err) } erf = &FilterRule{Type: utils.MetaExists, Element: "~MetaExists", Values: []string{}, negative: utils.BoolPointer(false)} if err = erf.CompileValues(); err != nil { t.Fatal(err) } if !reflect.DeepEqual(erf, rf) { t.Errorf("Expecting: %+v, received: %+v", erf, rf) } rf, err = NewFilterRule(utils.MetaPrefix, "~MetaPrefix", []string{"stringPrefix"}) if err != nil { t.Errorf("Error: %+v", err) } erf = &FilterRule{Type: utils.MetaPrefix, Element: "~MetaPrefix", Values: []string{"stringPrefix"}, negative: utils.BoolPointer(false)} if err = erf.CompileValues(); err != nil { t.Fatal(err) } if !reflect.DeepEqual(erf, rf) { t.Errorf("Expecting: %+v, received: %+v", erf, rf) } rf, err = NewFilterRule(utils.MetaSuffix, "~MetaSuffix", []string{"stringSuffix"}) if err != nil { t.Errorf("Error: %+v", err) } erf = &FilterRule{Type: utils.MetaSuffix, Element: "~MetaSuffix", Values: []string{"stringSuffix"}, negative: utils.BoolPointer(false)} if err = erf.CompileValues(); err != nil { t.Fatal(err) } if !reflect.DeepEqual(erf, rf) { t.Errorf("Expecting: %+v, received: %+v", erf, rf) } // rf, err = NewFilterRule(utils.MetaTimings, "~MetaTimings", []string{""}) // if err != nil { // t.Errorf("Error: %+v", err) // } // erf = &FilterRule{Type: utils.MetaTimings, Element: "~MetaTimings", Values: []string{""}, negative: utils.BoolPointer(false)} // if err = erf.CompileValues(); err != nil { // t.Fatal(err) // } // if !reflect.DeepEqual(erf, rf) { // t.Errorf("Expecting: %+v, received: %+v", erf, rf) // } rf, err = NewFilterRule(utils.MetaDestinations, "~MetaDestinations", []string{"1001"}) if err != nil { t.Errorf("Error: %+v", err) } erf = &FilterRule{Type: utils.MetaDestinations, Element: "~MetaDestinations", Values: []string{"1001"}, negative: utils.BoolPointer(false)} if err = erf.CompileValues(); err != nil { t.Fatal(err) } if !reflect.DeepEqual(erf, rf) { t.Errorf("Expecting: %+v, received: %+v", erf, rf) } rf, err = NewFilterRule(utils.MetaLessThan, "~MetaLessThan", []string{"20"}) if err != nil { t.Errorf("Error: %+v", err) } erf = &FilterRule{Type: utils.MetaLessThan, Element: "~MetaLessThan", Values: []string{"20"}, negative: utils.BoolPointer(false)} if err = erf.CompileValues(); err != nil { t.Fatal(err) } if !reflect.DeepEqual(erf, rf) { t.Errorf("Expecting: %+v, received: %+v", erf, rf) } rf, err = NewFilterRule(utils.MetaLessOrEqual, "~MetaLessOrEqual", []string{"20"}) if err != nil { t.Errorf("Error: %+v", err) } erf = &FilterRule{Type: utils.MetaLessOrEqual, Element: "~MetaLessOrEqual", Values: []string{"20"}, negative: utils.BoolPointer(false)} if err = erf.CompileValues(); err != nil { t.Fatal(err) } if !reflect.DeepEqual(erf, rf) { t.Errorf("Expecting: %+v, received: %+v", erf, rf) } rf, err = NewFilterRule(utils.MetaGreaterThan, "~MetaGreaterThan", []string{"20"}) if err != nil { t.Errorf("Error: %+v", err) } erf = &FilterRule{Type: utils.MetaGreaterThan, Element: "~MetaGreaterThan", Values: []string{"20"}, negative: utils.BoolPointer(false)} if err = erf.CompileValues(); err != nil { t.Fatal(err) } if !reflect.DeepEqual(erf, rf) { t.Errorf("Expecting: %+v, received: %+v", erf, rf) } rf, err = NewFilterRule(utils.MetaGreaterOrEqual, "~MetaGreaterOrEqual", []string{"20"}) if err != nil { t.Errorf("Error: %+v", err) } erf = &FilterRule{Type: utils.MetaGreaterOrEqual, Element: "~MetaGreaterOrEqual", Values: []string{"20"}, negative: utils.BoolPointer(false)} if err = erf.CompileValues(); err != nil { t.Fatal(err) } if !reflect.DeepEqual(erf, rf) { t.Errorf("Expecting: %+v, received: %+v", erf, rf) } rf, err = NewFilterRule(utils.MetaRegex, "~MetaRegex", []string{"Regex"}) if err != nil { t.Errorf("Error: %+v", err) } erf = &FilterRule{Type: utils.MetaRegex, Element: "~MetaRegex", Values: []string{"Regex"}, negative: utils.BoolPointer(false)} if err = erf.CompileValues(); err != nil { t.Fatal(err) } if !reflect.DeepEqual(erf, rf) { t.Errorf("Expecting: %+v, received: %+v", erf, rf) } if _, err = NewFilterRule("", "~MetaRegex", []string{"Regex"}); err == nil { t.Error(err) } else if _, err = NewFilterRule(utils.MetaRegex, "", []string{"Regex"}); err == nil { t.Error(err) } else if _, err = NewFilterRule(utils.MetaRegex, "~MetaRegex", []string{}); err == nil { t.Error(err) } } func TestInlineFilterPassFiltersForEvent(t *testing.T) { cfg := config.NewDefaultCGRConfig() data, dErr := NewInternalDB(nil, nil, true, nil, cfg.DataDbCfg().Items) if dErr != nil { t.Error(dErr) } dmFilterPass := NewDataManager(data, config.CgrConfig().CacheCfg(), nil) filterS := FilterS{ cfg: cfg, dm: dmFilterPass, } failEvent := map[string]any{ "Account": "1001", } passEvent := map[string]any{ "Account": "1007", } fEv := utils.MapStorage{} fEv.Set([]string{utils.MetaReq}, failEvent) if pass, err := filterS.Pass("cgrates.org", []string{"*string:~*req.Account:1007:error"}, fEv); err != nil { t.Error(err) } else if pass { t.Errorf("Expecting: %+v, received: %+v", false, pass) } if pass, err := filterS.Pass("cgrates.org", []string{"*string:~*req.Account:1007"}, fEv); err != nil { t.Error(err) } else if pass { t.Errorf("Expecting: %+v, received: %+v", false, pass) } pEv := utils.MapStorage{} pEv.Set([]string{utils.MetaReq}, passEvent) if pass, err := filterS.Pass("cgrates.org", []string{"*string:~*req.Account:1007"}, pEv); err != nil { t.Error(err) } else if !pass { t.Errorf("Expecting: %+v, received: %+v", true, pass) } //not if pass, err := filterS.Pass("cgrates.org", []string{"*notstring:~*req.Account:1007"}, pEv); err != nil { t.Error(err) } else if pass { t.Errorf("Expecting: %+v, received: %+v", false, pass) } failEvent = map[string]any{ "Account": "2001", } passEvent = map[string]any{ "Account": "1007", } fEv = utils.MapStorage{} fEv.Set([]string{utils.MetaReq}, failEvent) pEv = utils.MapStorage{} pEv.Set([]string{utils.MetaReq}, passEvent) if pass, err := filterS.Pass("cgrates.org", []string{"*prefix:~*req.Account:10"}, fEv); err != nil { t.Error(err) } else if pass { t.Errorf("Expecting: %+v, received: %+v", false, pass) } if pass, err := filterS.Pass("cgrates.org", []string{"*prefix:~*req.Account:10"}, pEv); err != nil { t.Error(err) } else if !pass { t.Errorf("Expecting: %+v, received: %+v", true, pass) } if pass, err := filterS.Pass("cgrates.org", []string{"*suffix:~*req.Account:07"}, fEv); err != nil { t.Error(err) } else if pass { t.Errorf("Expecting: %+v, received: %+v", false, pass) } if pass, err := filterS.Pass("cgrates.org", []string{"*suffix:~*req.Account:07"}, pEv); err != nil { t.Error(err) } else if !pass { t.Errorf("Expecting: %+v, received: %+v", true, pass) } //not if pass, err := filterS.Pass("cgrates.org", []string{"*notsuffix:~*req.Account:07"}, pEv); err != nil { t.Error(err) } else if pass { t.Errorf("Expecting: %+v, received: %+v", false, pass) } failEvent = map[string]any{ "Tenant": "anotherTenant.org", } passEvent = map[string]any{ "Tenant": "cgrates.org", } fEv = utils.MapStorage{} fEv.Set([]string{utils.MetaReq}, failEvent) pEv = utils.MapStorage{} pEv.Set([]string{utils.MetaReq}, passEvent) if pass, err := filterS.Pass("cgrates.org", []string{"*rsr:~*req.Tenant:~^cgr.*\\.org$"}, fEv); err != nil { t.Error(err) } else if pass { t.Errorf("Expecting: %+v, received: %+v", false, pass) } if pass, err := filterS.Pass("cgrates.org", []string{"*rsr:~*req.Tenant:~^cgr.*\\.org$"}, pEv); err != nil { t.Error(err) } else if !pass { t.Errorf("Expecting: %+v, received: %+v", true, pass) } //not if pass, err := filterS.Pass("cgrates.org", []string{"*notrsr:~*req.Tenant:~^cgr.*\\.org$"}, pEv); err != nil { t.Error(err) } else if pass { t.Errorf("Expecting: %+v, received: %+v", false, pass) } failEvent = map[string]any{ utils.Weight: 10, } passEvent = map[string]any{ utils.Weight: 20, } fEv = utils.MapStorage{} fEv.Set([]string{utils.MetaReq}, failEvent) pEv = utils.MapStorage{} pEv.Set([]string{utils.MetaReq}, passEvent) if pass, err := filterS.Pass("cgrates.org", []string{"*gte:~*req.Weight:20"}, fEv); err != nil { t.Error(err) } else if pass { t.Errorf("Expecting: %+v, received: %+v", false, pass) } if pass, err := filterS.Pass("cgrates.org", []string{"*gte:~*req.Weight:10"}, pEv); err != nil { t.Error(err) } else if !pass { t.Errorf("Expecting: %+v, received: %+v", true, pass) } failEvent = map[string]any{ "EmptyString": "nonEmpty", "EmptySlice": []string{""}, "EmptyMap": map[string]string{"": ""}, "EmptyPtr": &struct{}{}, "EmptyPtr2": &struct{}{}, "EmptyPtrSlice": &[]string{""}, "EmptyPtrMap": &map[string]string{"": ""}, } var testnil *struct{} = nil passEvent = map[string]any{ "EmptyString": "", "EmptySlice": []string{}, "EmptyMap": map[string]string{}, "EmptyPtr": testnil, "EmptyPtr2": nil, "EmptyPtrSlice": &[]string{}, "EmptyPtrMap": &map[string]string{}, } fEv = utils.MapStorage{} fEv.Set([]string{utils.MetaReq}, failEvent) pEv = utils.MapStorage{} pEv.Set([]string{utils.MetaReq}, passEvent) for key := range failEvent { if pass, err := filterS.Pass("cgrates.org", []string{"*empty:~*req." + key + ":"}, fEv); err != nil { t.Error(err) } else if pass { t.Errorf("For %s expecting: %+v, received: %+v", key, false, pass) } if pass, err := filterS.Pass("cgrates.org", []string{"*empty:~*req." + key + ":"}, pEv); err != nil { t.Error(err) } else if !pass { t.Errorf("For %s expecting: %+v, received: %+v", key, true, pass) } } if pass, err := filterS.Pass("cgrates.org", []string{"*exists:~*req.NewKey:"}, fEv); err != nil { t.Error(err) } else if pass { t.Errorf("For NewKey expecting: %+v, received: %+v", false, pass) } if pass, err := filterS.Pass("cgrates.org", []string{"*notexists:~*req.NewKey:"}, fEv); err != nil { t.Error(err) } else if !pass { t.Errorf("For NewKey expecting: %+v, received: %+v", true, pass) } failEvent = map[string]any{ "Account": "1001", } passEvent = map[string]any{ "Account": "1007", } fEv = utils.MapStorage{} fEv.Set([]string{utils.MetaReq}, failEvent) if pass, err := filterS.Pass("cgrates.org", []string{"*regex:~*req.Account:^1007:error"}, fEv); err != nil { t.Error(err) } else if pass { t.Errorf("Expecting: %+v, received: %+v", false, pass) } if pass, err := filterS.Pass("cgrates.org", []string{"*regex:~*req.Account:\\d{3}7"}, fEv); err != nil { t.Error(err) } else if pass { t.Errorf("Expecting: %+v, received: %+v", false, pass) } pEv = utils.MapStorage{} pEv.Set([]string{utils.MetaReq}, passEvent) if pass, err := filterS.Pass("cgrates.org", []string{"*regex:~*req.Account:\\d{3}7"}, pEv); err != nil { t.Error(err) } else if !pass { t.Errorf("Expecting: %+v, received: %+v", true, pass) } //not if pass, err := filterS.Pass("cgrates.org", []string{"*notregex:~*req.Account:\\d{3}7"}, pEv); err != nil { t.Error(err) } else if pass { t.Errorf("Expecting: %+v, received: %+v", false, pass) } pEv = utils.MapStorage{utils.MetaReq: utils.MapStorage{utils.AccountField: "sip:12345678901234567@abcdefg"}} if pass, err := filterS.Pass("cgrates.org", []string{"*regex:~*req.Account:.{29,}"}, pEv); err != nil { t.Error(err) } else if !pass { t.Errorf("Expecting: %+v, received: %+v", true, pass) } if pass, err := filterS.Pass("cgrates.org", []string{"*regex:~*req.Account:^.{28}$"}, pEv); err != nil { t.Error(err) } else if pass { t.Errorf("Expecting: %+v, received: %+v", false, pass) } if pass, err := filterS.Pass("cgrates.org", []string{"*gte:~*req.Account{*len}:29"}, pEv); err != nil { t.Error(err) } else if !pass { t.Errorf("Expecting: %+v, received: %+v", true, pass) } pEv = utils.MapStorage{utils.MetaReq: utils.MapStorage{utils.AccountField: "[1,2,3]"}} if pass, err := filterS.Pass("cgrates.org", []string{"*eq:~*req.Account{*slice&*len}:3"}, pEv); err != nil { t.Error(err) } else if !pass { t.Errorf("Expecting: %+v, received: %+v", true, pass) } } func TestPassFiltersForEventWithEmptyFilter(t *testing.T) { cfg := config.NewDefaultCGRConfig() data, dErr := NewInternalDB(nil, nil, true, nil, cfg.DataDbCfg().Items) if dErr != nil { t.Error(dErr) } dmFilterPass := NewDataManager(data, config.CgrConfig().CacheCfg(), nil) filterS := FilterS{ cfg: cfg, dm: dmFilterPass, } passEvent1 := map[string]any{ utils.Tenant: "cgrates.org", utils.AccountField: "1010", utils.Destination: "+49", utils.Weight: 10, } passEvent2 := map[string]any{ utils.Tenant: "itsyscom.com", utils.AccountField: "dan", utils.Destination: "+4986517174963", utils.Weight: 20, } pEv1 := utils.MapStorage{} pEv1.Set([]string{utils.MetaReq}, passEvent1) pEv2 := utils.MapStorage{} pEv2.Set([]string{utils.MetaReq}, passEvent2) if pass, err := filterS.Pass("cgrates.org", []string{}, pEv1); err != nil { t.Error(err) } else if !pass { t.Errorf("Expecting: %+v, received: %+v", false, pass) } if pass, err := filterS.Pass("itsyscom.com", []string{}, pEv2); err != nil { t.Error(err) } else if !pass { t.Errorf("Expecting: %+v, received: %+v", true, pass) } ev := map[string]any{ "Test": "MultipleCharacter", } pEv := utils.MapStorage{} pEv.Set([]string{utils.MetaReq}, ev) if pass, err := filterS.Pass("cgrates.org", []string{"*rsr:~*req.Test:~^\\w{30,}"}, pEv); err != nil { t.Error(err) } else if pass { t.Errorf("Expecting: %+v, received: %+v", false, pass) } ev = map[string]any{ "Test": "MultipleCharacter123456789MoreThan30Character", } pEv = utils.MapStorage{} pEv.Set([]string{utils.MetaReq}, ev) if pass, err := filterS.Pass("cgrates.org", []string{"*rsr:~*req.Test:~^\\w{30,}"}, pEv); err != nil { t.Error(err) } else if !pass { t.Errorf("Expecting: %+v, received: %+v", true, pass) } ev = map[string]any{ "Test": map[string]any{ "Test2": "MultipleCharacter", }, } pEv = utils.MapStorage{} pEv.Set([]string{utils.MetaReq}, ev) if pass, err := filterS.Pass("cgrates.org", []string{"*rsr:~*req.Test.Test2:~^\\w{30,}"}, pEv); err != nil { t.Error(err) } else if pass { t.Errorf("Expecting: %+v, received: %+v", false, pass) } ev = map[string]any{ "Test": map[string]any{ "Test2": "MultipleCharacter123456789MoreThan30Character", }, } pEv = utils.MapStorage{} pEv.Set([]string{utils.MetaReq}, ev) if pass, err := filterS.Pass("cgrates.org", []string{"*rsr:~*req.Test.Test2:~^\\w{30,}"}, pEv); err != nil { t.Error(err) } else if !pass { t.Errorf("Expecting: %+v, received: %+v", false, pass) } ev = map[string]any{ utils.AccountField: "1003", utils.Subject: "1003", utils.Destination: "1002", utils.SetupTime: time.Date(2017, 12, 1, 14, 25, 0, 0, time.UTC), utils.Usage: "1m20s", } pEv = utils.MapStorage{} pEv.Set([]string{utils.MetaReq}, ev) if pass, err := filterS.Pass("cgrates.org", []string{ "*string:~*req.Account:1003", "*prefix:~*req.Destination:10", "*suffix:~*req.Subject:03", "*rsr:~*req.Destination:1002"}, pEv); err != nil { t.Error(err) } else if !pass { t.Errorf("Expecting: %+v, received: %+v", true, pass) } } func TestPassFilterMaxCost(t *testing.T) { cfg := config.NewDefaultCGRConfig() data, dErr := NewInternalDB(nil, nil, true, nil, cfg.DataDbCfg().Items) if dErr != nil { t.Error(dErr) } dmFilterPass := NewDataManager(data, config.CgrConfig().CacheCfg(), nil) filterS := FilterS{ cfg: cfg, dm: dmFilterPass, } //check with max usage -1 should fail passEvent1 := map[string]any{ "MaxUsage": -1, } pEv := utils.MapStorage{} pEv.Set([]string{utils.MetaReq}, passEvent1) if pass, err := filterS.Pass("cgrates.org", []string{"*gt:~*req.MaxUsage:0s"}, pEv); err != nil { t.Error(err) } else if pass { t.Errorf("Expecting: false , received: %+v", pass) } //check with max usage 0 should fail passEvent2 := map[string]any{ "MaxUsage": 0, } pEv = utils.MapStorage{} pEv.Set([]string{utils.MetaReq}, passEvent2) if pass, err := filterS.Pass("cgrates.org", []string{"*gt:~*req.MaxUsage:0s"}, pEv); err != nil { t.Error(err) } else if pass { t.Errorf("Expecting: false, received: %+v", pass) } //check with max usage 123 should pass passEvent3 := map[string]any{ "MaxUsage": 123, } pEv = utils.MapStorage{} pEv.Set([]string{utils.MetaReq}, passEvent3) if pass, err := filterS.Pass("cgrates.org", []string{"*gt:~*req.MaxUsage:0"}, pEv); err != nil { t.Error(err) } else if !pass { t.Errorf("Expecting: true, received: %+v", pass) } if pass, err := filterS.Pass("cgrates.org", []string{"*gt:~*req.MaxUsage:0"}, pEv); err != nil { t.Error(err) } else if !pass { t.Errorf("Expecting: true, received: %+v", pass) } } func TestPassFilterMissingField(t *testing.T) { cfg := config.NewDefaultCGRConfig() data, dErr := NewInternalDB(nil, nil, true, nil, cfg.DataDbCfg().Items) if dErr != nil { t.Error(dErr) } dmFilterPass := NewDataManager(data, config.CgrConfig().CacheCfg(), nil) filterS := FilterS{ cfg: cfg, dm: dmFilterPass, } passEvent1 := map[string]any{ "test": "call", } pEv := utils.MapStorage{} pEv.Set([]string{utils.MetaReq}, passEvent1) if pass, err := filterS.Pass("cgrates.org", []string{"*rsr:~*req.Category:^$"}, pEv); err != nil { t.Error(err) } else if !pass { t.Errorf("Expecting: true , received: %+v", pass) } passEvent2 := map[string]any{ "Category": "", } pEv = utils.MapStorage{} pEv.Set([]string{utils.MetaReq}, passEvent2) if pass, err := filterS.Pass("cgrates.org", []string{"*rsr:~*req.Category:^$"}, pEv); err != nil { t.Error(err) } else if !pass { t.Errorf("Expecting: true , received: %+v", pass) } passEvent3 := map[string]any{ "Category": "call", } pEv = utils.MapStorage{} pEv.Set([]string{utils.MetaReq}, passEvent3) if pass, err := filterS.Pass("cgrates.org", []string{"*rsr:~*req.Category:^$"}, pEv); err != nil { t.Error(err) } else if pass { t.Errorf("Expecting: false , received: %+v", pass) } } func TestEventCostFilter(t *testing.T) { cfg := config.NewDefaultCGRConfig() data, dErr := NewInternalDB(nil, nil, true, nil, cfg.DataDbCfg().Items) if dErr != nil { t.Error(dErr) } dmFilterPass := NewDataManager(data, config.CgrConfig().CacheCfg(), nil) filterS := FilterS{ cfg: cfg, dm: dmFilterPass, } cd := &EventCost{ Cost: utils.Float64Pointer(0.264933), CGRID: "d8534def2b7067f4f5ad4f7ec7bbcc94bb46111a", Rates: ChargedRates{ "3db483c": RateGroups{ { Value: 0.1574, RateUnit: 60000000000, RateIncrement: 30000000000, GroupIntervalStart: 0, }, { Value: 0.1574, RateUnit: 60000000000, RateIncrement: 1000000000, GroupIntervalStart: 30000000000, }, }, }, RunID: "*default", Usage: utils.DurationPointer(101 * time.Second), Rating: Rating{ "7f3d423": &RatingUnit{ MaxCost: 40, RatesID: "3db483c", TimingID: "128e970", ConnectFee: 0, RoundingMethod: "*up", MaxCostStrategy: "*disconnect", RatingFiltersID: "f8e95f2", RoundingDecimals: 4, }, }, Charges: []*ChargingInterval{ { RatingID: "7f3d423", Increments: []*ChargingIncrement{ { Cost: 0.0787, Usage: 30000000000, AccountingID: "fee8a3a", CompressFactor: 1, }, }, CompressFactor: 1, }, { RatingID: "7f3d423", Increments: []*ChargingIncrement{ { Cost: 0.002623, Usage: 1000000000, AccountingID: "3463957", CompressFactor: 71, }, }, CompressFactor: 1, }, }, Timings: ChargedTimings{ "128e970": &ChargedTiming{ StartTime: "00:00:00", }, }, StartTime: time.Date(2019, 12, 06, 11, 57, 32, 0, time.UTC), Accounting: Accounting{ "3463957": &BalanceCharge{ Units: 0.002623, RatingID: "", AccountID: "cgrates.org:1001", BalanceUUID: "154419f2-45e0-4629-a203-06034ccb493f", ExtraChargeID: "", }, "fee8a3a": &BalanceCharge{ Units: 0.0787, RatingID: "", AccountID: "cgrates.org:1001", BalanceUUID: "154419f2-45e0-4629-a203-06034ccb493f", ExtraChargeID: "", }, }, RatingFilters: RatingFilters{ "f8e95f2": RatingMatchedFilters{ "Subject": "*out:cgrates.org:mo_call_UK_Mobile_O2_GBRCN:*any", "RatingPlanID": "RP_MO_CALL_44800", "DestinationID": "DST_44800", "DestinationPrefix": "44800", }, }, AccountSummary: &AccountSummary{ ID: "234189200129930", Tenant: "cgrates.org", Disabled: false, AllowNegative: false, BalanceSummaries: BalanceSummaries{ &BalanceSummary{ ID: "MOBILE_DATA", Type: "*data", UUID: "08a05723-5849-41b9-b6a9-8ee362539280", Value: 3221225472, Disabled: false, }, &BalanceSummary{ ID: "MOBILE_SMS", Type: "*sms", UUID: "06a87f20-3774-4eeb-826e-a79c5f175fd3", Value: 247, Disabled: false, }, &BalanceSummary{ ID: "MOBILE_VOICE", Type: "*voice", UUID: "4ad16621-6e22-4e35-958e-5e1ff93ad7b7", Value: 14270000000000, Disabled: false, }, &BalanceSummary{ ID: "MONETARY_POSTPAID", Type: "*monetary", UUID: "154419f2-45e0-4629-a203-06034ccb493f", Value: 50, Disabled: false, }, }, }, } cd.initCache() cgrDp := utils.MapStorage{utils.MetaEC: cd} if pass, err := filterS.Pass("cgrates.org", []string{"*string:~*ec.Charges[0].Increments[0].Accounting.Balance.Value:50"}, cgrDp); err != nil { t.Error(err) } else if !pass { t.Errorf("Expecting: true , received: %+v", pass) } if pass, err := filterS.Pass("cgrates.org", []string{"*string:~*ec.Charges[0].Increments[0].Accounting.AccountID:cgrates.org:1001"}, cgrDp); err != nil { t.Error(err) } else if !pass { t.Errorf("Expecting: true , received: %+v", pass) } if pass, err := filterS.Pass("cgrates.org", []string{"*string:~*ec.Charges[0].Rating.Rates[0].Value:0.1574"}, cgrDp); err != nil { t.Error(err) } else if !pass { t.Errorf("Expecting: true , received: %+v", pass) } if pass, err := filterS.Pass("cgrates.org", []string{"*string:~*ec.Charges[0].Increments[0].Accounting.Balance.ID:MONETARY_POSTPAID"}, cgrDp); err != nil { t.Error(err) } else if !pass { t.Errorf("Expecting: true , received: %+v", pass) } if pass, err := filterS.Pass("cgrates.org", []string{"*lt:~*ec.AccountSummary.BalanceSummaries.MONETARY_POSTPAID.Value:60"}, cgrDp); err != nil { t.Error(err) } else if !pass { t.Errorf("Expecting: true , received: %+v", pass) } } func TestVerifyPrefixes(t *testing.T) { rf, err := NewFilterRule(utils.MetaString, "~*req.Account", []string{"1001"}) if err != nil { t.Errorf("Error: %+v", err) } prefixes := []string{utils.DynamicDataPrefix + utils.MetaReq} if check := verifyPrefixes(rf, prefixes); !check { t.Errorf("Expecting: true , received: %+v", check) } rf, err = NewFilterRule(utils.MetaString, "~*req.Account", []string{"~*req.Field1"}) if err != nil { t.Errorf("Error: %+v", err) } if check := verifyPrefixes(rf, prefixes); !check { t.Errorf("Expecting: true , received: %+v", check) } rf, err = NewFilterRule(utils.MetaString, "~*req.Account", []string{"~*req.Field1", "~*req.Field2"}) if err != nil { t.Errorf("Error: %+v", err) } if check := verifyPrefixes(rf, prefixes); !check { t.Errorf("Expecting: true , received: %+v", check) } rf, err = NewFilterRule(utils.MetaString, "~*vars.Account", []string{"1001"}) if err != nil { t.Errorf("Error: %+v", err) } if check := verifyPrefixes(rf, prefixes); check { t.Errorf("Expecting: false , received: %+v", check) } rf, err = NewFilterRule(utils.MetaString, "~*req.Account", []string{"~*req.Field1", "~*vars.Field2"}) if err != nil { t.Errorf("Error: %+v", err) } if check := verifyPrefixes(rf, prefixes); check { t.Errorf("Expecting: false , received: %+v", check) } rf, err = NewFilterRule(utils.MetaString, "~*req.Account", []string{"~*req.Field1", "~*vars.Field2"}) if err != nil { t.Errorf("Error: %+v", err) } prefixes = []string{utils.DynamicDataPrefix + utils.MetaReq, utils.DynamicDataPrefix + utils.MetaVars} if check := verifyPrefixes(rf, prefixes); !check { t.Errorf("Expecting: true , received: %+v", check) } } func TestPassPartial(t *testing.T) { cfg := config.NewDefaultCGRConfig() data, dErr := NewInternalDB(nil, nil, true, nil, cfg.DataDbCfg().Items) if dErr != nil { t.Error(dErr) } dmFilterPass := NewDataManager(data, config.CgrConfig().CacheCfg(), nil) filterS := FilterS{ cfg: cfg, dm: dmFilterPass, } passEvent := map[string]any{ "Account": "1007", } fEv := utils.MapStorage{} fEv.Set([]string{utils.MetaReq}, passEvent) prefixes := []string{utils.DynamicDataPrefix + utils.MetaReq} if pass, ruleList, err := filterS.LazyPass("cgrates.org", []string{"*string:~*req.Account:1007"}, fEv, prefixes); err != nil { t.Error(err) } else if !pass { t.Errorf("Expecting: %+v, received: %+v", true, pass) } else if len(ruleList) != 0 { t.Errorf("Expecting: %+v, received: %+v", 0, len(ruleList)) } // in PartialPass we verify the filters matching the prefixes if pass, ruleList, err := filterS.LazyPass("cgrates.org", []string{"*string:~*req.Account:1007", "*string:~*vars.Field1:Val1"}, fEv, prefixes); err != nil { t.Error(err) } else if !pass { t.Errorf("Expecting: %+v, received: %+v", true, pass) } else if len(ruleList) != 1 { t.Errorf("Expecting: %+v, received: %+v", 1, len(ruleList)) } if pass, ruleList, err := filterS.LazyPass("cgrates.org", []string{"*string:~*req.Account:1010", "*string:~*vars.Field1:Val1"}, fEv, prefixes); err != nil { t.Error(err) } else if pass { t.Errorf("Expecting: %+v, received: %+v", false, pass) } else if len(ruleList) != 0 { t.Errorf("Expecting: %+v, received: %+v", 0, len(ruleList)) } } func TestNewFilterFromInline(t *testing.T) { exp := &Filter{ Tenant: "cgrates.org", ID: "*string:~*req.Account:~*uhc.<~*req.CGRID;-Account>|1001", Rules: []*FilterRule{ { Type: utils.MetaString, Element: "~*req.Account", Values: []string{"~*uhc.<~*req.CGRID;-Account>", "1001"}, }, }, } if err := exp.Compile(); err != nil { t.Fatal(err) } if rcv, err := NewFilterFromInline("cgrates.org", "*string:~*req.Account:~*uhc.<~*req.CGRID;-Account>|1001"); err != nil { t.Error(err) } else if !reflect.DeepEqual(exp, rcv) { t.Errorf("Expected: %s , received: %s", utils.ToJSON(exp), utils.ToJSON(rcv)) } if _, err := NewFilterFromInline("cgrates.org", "*string:~*req.Account"); err == nil { t.Error("Expected error received nil") } if _, err := NewFilterFromInline("cgrates.org", "*string:~*req.Account:~*req.CGRID{*|1001"); err == nil { t.Error("Expected error received nil") } } func TestVerifyInlineFilterS(t *testing.T) { if err := verifyInlineFilterS([]string{"ATTR", "*string:~*req,Acoount:1001"}); err != nil { t.Error(err) } if err := verifyInlineFilterS([]string{"ATTR", "*string:~*req,Acoount1001"}); err == nil { t.Errorf("Expected error received nil") } } func TestActivationIntervalPass(t *testing.T) { cfg := config.NewDefaultCGRConfig() data, dErr := NewInternalDB(nil, nil, true, nil, cfg.DataDbCfg().Items) if dErr != nil { t.Error(dErr) } dmFilterPass := NewDataManager(data, config.CgrConfig().CacheCfg(), nil) filterS := FilterS{ cfg: cfg, dm: dmFilterPass, } passEvent := map[string]any{ "CustomTime": time.Date(2013, time.July, 1, 0, 0, 0, 0, time.UTC), } fEv := utils.MapStorage{} fEv.Set([]string{utils.MetaReq}, passEvent) if pass, err := filterS.Pass("cgrates.org", []string{"*ai:~*req.CustomTime:2013-06-01T00:00:00Z"}, fEv); err != nil { t.Error(err) } else if !pass { t.Errorf("Expecting: %+v, received: %+v", true, pass) } if pass, err := filterS.Pass("cgrates.org", []string{"*ai:~*req.CustomTime:2013-09-01T00:00:00Z"}, fEv); err != nil { t.Error(err) } else if pass { t.Errorf("Expecting: %+v, received: %+v", false, pass) } if pass, err := filterS.Pass("cgrates.org", []string{"*ai:~*req.CustomTime:|2013-09-01T00:00:00Z"}, fEv); err != nil { t.Error(err) } else if !pass { t.Errorf("Expecting: %+v, received: %+v", true, pass) } if pass, err := filterS.Pass("cgrates.org", []string{"*ai:~*req.CustomTime:|2013-06-01T00:00:00Z"}, fEv); err != nil { t.Error(err) } else if pass { t.Errorf("Expecting: %+v, received: %+v", false, pass) } if pass, err := filterS.Pass("cgrates.org", []string{"*ai:~*req.CustomTime:2013-06-01T00:00:00Z|2013-09-01T00:00:00Z"}, fEv); err != nil { t.Error(err) } else if !pass { t.Errorf("Expecting: %+v, received: %+v", true, pass) } if pass, err := filterS.Pass("cgrates.org", []string{"*ai:~*req.CustomTime:2013-08-01T00:00:00Z|2013-09-01T00:00:00Z"}, fEv); err != nil { t.Error(err) } else if pass { t.Errorf("Expecting: %+v, received: %+v", false, pass) } } func TestFilterPassIPNet(t *testing.T) { cd := utils.MapStorage{ "IP": "192.0.2.0", "WrongIP": "192.0.3.", } rf := &FilterRule{Type: utils.MetaIPNet, Element: "~IP", Values: []string{"192.0.2.1/24"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.passIPNet(cd); err != nil { t.Error(err) } else if !passes { t.Error("Not passes filter") } rf = &FilterRule{Type: utils.MetaIPNet, Element: "~IP", Values: []string{"~IP2", "192.0.3.0/30"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.passIPNet(cd); err != nil { t.Error(err) } else if passes { t.Error("Filter passes") } //not rf = &FilterRule{Type: utils.MetaNotIPNet, Element: "~IP", Values: []string{"192.0.2.0/24"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.Pass(cd); err != nil { t.Error(err) } else if passes { t.Error("Filter passes") } rf = &FilterRule{Type: utils.MetaNotIPNet, Element: "~IP", Values: []string{"192.0.3.0/24"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.Pass(cd); err != nil { t.Error(err) } else if !passes { t.Error("Not passes filter") } rf = &FilterRule{Type: utils.MetaIPNet, Element: "~IP2", Values: []string{"192.0.2.0/24"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.passIPNet(cd); err != nil { t.Error(err) } else if passes { t.Error("Filter passes") } rf = &FilterRule{Type: utils.MetaIPNet, Element: "~IP", Values: []string{"192.0.2.0"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.passIPNet(cd); err != nil { t.Error(err) } else if passes { t.Error("Filter passes") } rf = &FilterRule{Type: utils.MetaIPNet, Element: "~WrongIP", Values: []string{"192.0.2.0"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if passes, err := rf.passIPNet(cd); err != nil { t.Error(err) } else if passes { t.Error("Filter passes") } rf = &FilterRule{Type: utils.MetaIPNet, Element: "~IP{*duration}", Values: []string{"192.0.2.0/24"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if _, err := rf.Pass(cd); err == nil { t.Error(err) } } func TestAPIBan(t *testing.T) { var counter int testServer := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { if r.Method != "GET" { w.WriteHeader(http.StatusMethodNotAllowed) return } responses := map[string]struct { code int body []byte }{ "/testKey/check/1.2.3.251": {code: http.StatusOK, body: []byte(`{"ipaddress":["1.2.3.251"], "ID":"987654321"}`)}, "/testKey/check/1.2.3.254": {code: http.StatusBadRequest, body: []byte(`{"ipaddress":["not blocked"], "ID":"none"}`)}, } if val, has := responses[r.URL.EscapedPath()]; has { w.WriteHeader(val.code) if val.body != nil { w.Write(val.body) } return } counter++ w.WriteHeader(http.StatusOK) if counter < 2 { _, _ = w.Write([]byte(`{"ipaddress": ["1.2.3.251", "1.2.3.252"], "ID": "100"}`)) } else { _, _ = w.Write([]byte(`{"ID": "none"}`)) counter = 0 } })) defer testServer.Close() baningo.RootURL = testServer.URL + "/" dp := utils.MapStorage{ utils.MetaReq: utils.MapStorage{ "bannedIP": "1.2.3.251", "bannedIP2": "1.2.3.252", "IP": "1.2.3.253", "IP2": "1.2.3.254", }, } cfg := config.NewDefaultCGRConfig() data, dErr := NewInternalDB(nil, nil, true, nil, cfg.DataDbCfg().Items) if dErr != nil { t.Error(dErr) } dmFilterPass := NewDataManager(data, config.CgrConfig().CacheCfg(), nil) filterS := FilterS{ cfg: cfg, dm: dmFilterPass, } config.CgrConfig().APIBanCfg().Keys = []string{"testKey"} if pass, err := filterS.Pass("cgrates.org", []string{"*apiban:~*req.IP:*all"}, dp); err != nil { t.Fatal(err) } else if pass { t.Error("Expected not to pass") } // from cache if pass, err := filterS.Pass("cgrates.org", []string{"*apiban:~*req.IP:*all"}, dp); err != nil { t.Fatal(err) } else if pass { t.Error("Expected not to pass") } if pass, err := filterS.Pass("cgrates.org", []string{"*apiban:~*req.IP2:*single"}, dp); err != nil { t.Fatal(err) } else if pass { t.Error("Expected not to pass") } Cache.Clear([]string{utils.MetaAPIBan}) if pass, err := filterS.Pass("cgrates.org", []string{"*apiban:~*req.bannedIP:*single"}, dp); err != nil { t.Fatal(err) } else if !pass { t.Error("Expected to pass") } if pass, err := filterS.Pass("cgrates.org", []string{"*apiban:~*req.bannedIP2:*all"}, dp); err != nil { t.Fatal(err) } else if !pass { t.Error("Expected to pass") } if pass, err := filterS.Pass("cgrates.org", []string{"*apiban:~*req.notFound:*all"}, dp); err != nil { t.Fatal(err) } else if pass { t.Error("Expected not to pass") } expErr := "invalid value for apiban filter: <*any>" if _, err := filterS.Pass("cgrates.org", []string{"*apiban:~*req.IP:*any"}, dp); err == nil || err.Error() != expErr { t.Errorf("Expected error %s received: %v", expErr, err) } baningo.RootURL = "http://127.0.0.1:12345/" expErr = `Get "http://127.0.0.1:12345/testKey/banned/100": dial tcp 127.0.0.1:12345: connect: connection refused` if _, err := filterS.Pass("cgrates.org", []string{"*apiban:~*req.IP:*all"}, dp); err == nil || err.Error() != expErr { t.Errorf("Expected error %s received: %v", expErr, err) } expErr = `Get "http://127.0.0.1:12345/testKey/check/1.2.3.253": dial tcp 127.0.0.1:12345: connect: connection refused` if _, err := filterS.Pass("cgrates.org", []string{"*apiban:~*req.IP:*single"}, dp); err == nil || err.Error() != expErr { t.Errorf("Expected error %s received: %v", expErr, err) } expErr = `invalid converter value in string: <*>, err: unsupported converter definition: <*>` if _, err := filterS.Pass("cgrates.org", []string{"*apiban:~*req.<~*req.IP>{*}:*all"}, dp); err == nil || err.Error() != expErr { t.Errorf("Expected error %s received: %v", expErr, err) } } func TestFiltersPassTimingsErrParseNotFound(t *testing.T) { fltr, err := NewFilterRule(utils.MetaTimings, "~*req.AnswerTime", []string{"2018-01-07T17:00:10Z"}) if err != nil { t.Fatal(err) } dtP := utils.MapStorage{} rcv, err := fltr.passTimings(dtP) if err != nil { t.Error(err) } if rcv != false { t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", false, rcv) } } func TestFiltersPassTimingsErrParseWrongPath(t *testing.T) { fltr, err := NewFilterRule(utils.MetaTimings, "~*req.AnswerTime", []string{"2018-01-07T17:00:10Z"}) if err != nil { t.Fatal(err) } dtP := utils.MapStorage{ utils.MetaReq: 13, } experr := utils.ErrWrongPath rcv, err := fltr.passTimings(dtP) if err == nil || err != experr { t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", experr, err) } if rcv != false { t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", false, rcv) } } func TestFiltersPassTimingsTimeConvertErr(t *testing.T) { fltr, err := NewFilterRule(utils.MetaTimings, "~*req.AnswerTime", []string{"2018-01-07T17:00:10Z"}) if err != nil { t.Fatal(err) } dtP := utils.MapStorage{ utils.MetaReq: map[string]any{ "AnswerTime": "invalid time", }, } experr := "Unsupported time format" rcv, err := fltr.passTimings(dtP) if err == nil || err.Error() != experr { t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", experr, err) } if rcv != false { t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", false, rcv) } } func TestFiltersPassTimingsParseDPErr(t *testing.T) { fltr, err := NewFilterRule(utils.MetaTimings, "~*req.AnswerTime", []string{"~2018-01-07T17:00:10Z"}) if err != nil { t.Fatal(err) } dtP := utils.MapStorage{ utils.MetaReq: map[string]any{ "AnswerTime": "2018-01-07T17:00:10Z", }, } experr := utils.ErrNotFound rcv, err := fltr.passTimings(dtP) if err == nil || err != experr { t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", experr, err) } if rcv != false { t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", false, rcv) } } func TestFiltersPassTimingsCallSuccessful(t *testing.T) { tmp1, tmp2 := connMgr, config.CgrConfig() defer func() { connMgr = tmp1 config.SetCgrConfig(tmp2) }() cfg := config.NewDefaultCGRConfig() cfg.FilterSCfg().ApierSConns = []string{utils.ConcatenatedKey(utils.MetaInternal, utils.MetaApier)} config.SetCgrConfig(cfg) Cache.Clear(nil) client := make(chan birpc.ClientConnector, 1) ccM := &ccMock{ calls: map[string]func(ctx *context.Context, args any, reply any) error{ utils.APIerSv1GetTiming: func(ctx *context.Context, args, reply any) error { exp := &utils.TPTiming{ ID: "MIDNIGHT", Years: utils.Years{2020, 2018}, Months: utils.Months{1, 2, 3, 4}, MonthDays: utils.MonthDays{5, 6, 7, 8}, WeekDays: utils.WeekDays{0, 1, 2, 3, 4, 5, 6}, StartTime: "17:00:00", EndTime: "17:00:18", } *reply.(*utils.TPTiming) = *exp return nil }, }, } client <- ccM NewConnManager(cfg, map[string]chan birpc.ClientConnector{ utils.ConcatenatedKey(utils.MetaInternal, utils.MetaApier): client, }) fltr, err := NewFilterRule(utils.MetaTimings, "~*req.AnswerTime", []string{"2018-01-07T17:00:10Z"}) if err != nil { t.Fatal(err) } dtP := utils.MapStorage{ utils.MetaReq: map[string]any{ "AnswerTime": "2018-01-07T17:00:10Z", }, } rcv, err := fltr.passTimings(dtP) if err != nil { t.Error(err) } if rcv != true { t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", true, rcv) } } func TestFiltersPassTimingsCallErr(t *testing.T) { fltr, err := NewFilterRule(utils.MetaTimings, "~*req.AnswerTime", []string{"2018-01-07T17:00:10Z"}) if err != nil { t.Fatal(err) } dtP := utils.MapStorage{ utils.MetaReq: map[string]any{ "AnswerTime": "2018-01-07T17:00:10Z", }, } rcv, err := fltr.passTimings(dtP) if err.Error() != "MANDATORY_IE_MISSING: [connIDs]" { t.Error(err) } if rcv != false { t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", false, rcv) } } func TestFiltersPassDestinationsErrParseNotFound(t *testing.T) { fltr, err := NewFilterRule(utils.MetaDestinations, "~*req.Destination", []string{"DST_1001"}) if err != nil { t.Fatal(err) } dtP := utils.MapStorage{} rcv, err := fltr.passDestinations(dtP) if err != nil { t.Error(err) } if rcv != false { t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", false, rcv) } } func TestFiltersPassDestinationsErrParseWrongPath(t *testing.T) { fltr, err := NewFilterRule(utils.MetaDestinations, "~*req.Destination", []string{"DST_1001"}) if err != nil { t.Fatal(err) } dtP := utils.MapStorage{ utils.MetaReq: 13, } experr := utils.ErrWrongPath rcv, err := fltr.passDestinations(dtP) if err == nil || err != experr { t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", experr, err) } if rcv != false { t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", false, rcv) } } func TestFiltersPassDestinationsCallErr(t *testing.T) { fltr, err := NewFilterRule(utils.MetaDestinations, "~*req.Destination", []string{"DST_1001"}) if err != nil { t.Fatal(err) } dtP := utils.MapStorage{ utils.MetaReq: map[string]any{ utils.Destination: "DST_1001", }, } rcv, err := fltr.passDestinations(dtP) if err.Error() != "MANDATORY_IE_MISSING: [connIDs]" { t.Error(err) } if rcv != false { t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", false, rcv) } } func TestFiltersPassDestinationsCallSuccessSameDest(t *testing.T) { tmp1, tmp2 := connMgr, config.CgrConfig() defer func() { connMgr = tmp1 config.SetCgrConfig(tmp2) }() cfg := config.NewDefaultCGRConfig() cfg.FilterSCfg().ApierSConns = []string{utils.ConcatenatedKey(utils.MetaInternal, utils.MetaApier)} config.SetCgrConfig(cfg) Cache.Clear(nil) client := make(chan birpc.ClientConnector, 1) ccM := &ccMock{ calls: map[string]func(ctx *context.Context, args any, reply any) error{ utils.APIerSv1GetDestination: func(ctx *context.Context, args, reply any) error { *reply.(*Destination) = Destination{ Id: "DST_1002", Prefixes: []string{"1002"}, } return nil }, }, } client <- ccM NewConnManager(cfg, map[string]chan birpc.ClientConnector{ utils.ConcatenatedKey(utils.MetaInternal, utils.MetaApier): client, }) fltr, err := NewFilterRule(utils.MetaDestinations, "~*req.Destination", []string{"DST_1002"}) if err != nil { t.Fatal(err) } dtP := utils.MapStorage{ utils.MetaReq: map[string]any{ utils.Destination: "1002", }, } rcv, err := fltr.passDestinations(dtP) if err != nil { t.Error(err) } if rcv != true { t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", true, rcv) } } func TestFiltersPassDestinationsCallSuccessParseErr(t *testing.T) { tmp1, tmp2 := connMgr, config.CgrConfig() defer func() { connMgr = tmp1 config.SetCgrConfig(tmp2) }() cfg := config.NewDefaultCGRConfig() cfg.FilterSCfg().ApierSConns = []string{utils.ConcatenatedKey(utils.MetaInternal, utils.MetaApier)} config.SetCgrConfig(cfg) Cache.Clear(nil) client := make(chan birpc.ClientConnector, 1) ccM := &ccMock{ calls: map[string]func(ctx *context.Context, args any, reply any) error{ utils.APIerSv1GetDestination: func(ctx *context.Context, args, reply any) error { *reply.(*Destination) = Destination{ Id: "DST_1002", Prefixes: []string{"1002"}, } return nil }, }, } client <- ccM NewConnManager(cfg, map[string]chan birpc.ClientConnector{ utils.ConcatenatedKey(utils.MetaInternal, utils.MetaApier): client, }) fltr, err := NewFilterRule(utils.MetaDestinations, "~*req.Destination", []string{"~DST_1002"}) if err != nil { t.Fatal(err) } dtP := utils.MapStorage{ utils.MetaReq: map[string]any{ utils.Destination: "DST_1002", }, } rcv, err := fltr.passDestinations(dtP) if err != nil { t.Error(err) } if rcv != false { t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", false, rcv) } } func TestFiltersPassRSRErrParseWrongPath(t *testing.T) { fltr, err := NewFilterRule(utils.MetaDestinations, "~*req.Destination", []string{"DST_1001"}) if err != nil { t.Fatal(err) } dtP := utils.MapStorage{ utils.MetaReq: 13, } experr := utils.ErrWrongPath rcv, err := fltr.passRSR(dtP) if err == nil || err != experr { t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", experr, err) } if rcv != false { t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", false, rcv) } } func TestFiltersPassGreaterThanErrParseWrongPath(t *testing.T) { fltr, err := NewFilterRule(utils.MetaGreaterThan, "~*req.Usage", []string{"10"}) if err != nil { t.Fatal(err) } dtP := utils.MapStorage{ utils.MetaReq: 13, } experr := utils.ErrWrongPath rcv, err := fltr.passGreaterThan(dtP) if err == nil || err != experr { t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", experr, err) } if rcv != false { t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", false, rcv) } } func TestFiltersPassGreaterThanErrIncomparable(t *testing.T) { fltr, err := NewFilterRule(utils.MetaGreaterThan, "~*req.Usage", []string{"10"}) fltr.rsrElement.Rules = "rules" if err != nil { t.Fatal(err) } dtP := utils.MapStorage{ utils.MetaReq: map[string]any{ utils.Usage: nil, }, } experr := fmt.Sprintf("incomparable: <%v> with <%d>", nil, 10) rcv, err := fltr.passGreaterThan(dtP) if err == nil || err.Error() != experr { t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", experr, err) } if rcv != false { t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", false, rcv) } } func TestFiltersPassGreaterThanErrParseValues(t *testing.T) { fltr, err := NewFilterRule(utils.MetaGreaterThan, "~*req.Usage", []string{"~10"}) if err != nil { t.Fatal(err) } dtP := utils.MapStorage{ utils.MetaReq: map[string]any{ utils.Usage: "10", }, } rcv, err := fltr.passGreaterThan(dtP) if err != nil { t.Error(err) } if rcv != false { t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", false, rcv) } } func TestFilterPassRSRFieldsWithMultplieValues(t *testing.T) { ev := utils.MapStorage{ utils.MetaReq: utils.MapStorage{ "23": "sip:11561561561561568@dan", }, } cfg := config.NewDefaultCGRConfig() idb, dErr := NewInternalDB(nil, nil, true, nil, cfg.DataDbCfg().Items) if dErr != nil { t.Error(dErr) } dm := NewDataManager(idb, cfg.CacheCfg(), nil) flts := NewFilterS(cfg, nil, dm) if passes, err := flts.Pass("cgrates.org", []string{"*rsr:~*req.23:dan|1001"}, ev); err != nil { t.Error(err) } else if !passes { t.Error("Not passing") } if passes, err := flts.Pass("cgrates.org", []string{"*rsr:~*req.23:dan"}, ev); err != nil { t.Error(err) } else if !passes { t.Error("Not passing") } } func TestFilterGreaterThanOnObjectDP(t *testing.T) { cfg := config.NewDefaultCGRConfig() cfg.FilterSCfg().ResourceSConns = []string{utils.ConcatenatedKey(utils.MetaInternal, utils.MetaResources)} idb, dErr := NewInternalDB(nil, nil, true, nil, cfg.DataDbCfg().Items) if dErr != nil { t.Error(dErr) } dm := NewDataManager(idb, cfg.CacheCfg(), nil) mockConn := &ccMock{ calls: map[string]func(ctx *context.Context, args any, reply any) error{ utils.ResourceSv1GetResourceWithConfig: func(ctx *context.Context, args any, reply any) error { *(reply.(*ResourceWithConfig)) = ResourceWithConfig{ Resource: &Resource{}, } return nil }, }, } mockChan := make(chan birpc.ClientConnector, 1) mockChan <- mockConn connMgr := NewConnManager(cfg, map[string]chan birpc.ClientConnector{ utils.ConcatenatedKey(utils.MetaInternal, utils.MetaResources): mockChan, }) flts := NewFilterS(cfg, connMgr, dm) ev := utils.MapStorage{} if _, err := flts.Pass("cgrates.org", []string{"*gte:~*resources.RES1.Available2:2", "*lt:~*resources.RES1.Available2:10"}, ev); err != nil { t.Error(err) } } func TestWeightFromDynamics(t *testing.T) { dWs := []*utils.DynamicWeight{ { FilterIDs: []string{"*destinations:~*req.Destination:EU"}, Weight: 10.2, }, } cfg := config.NewDefaultCGRConfig() data, dErr := NewInternalDB(nil, nil, true, nil, cfg.DataDbCfg().Items) if dErr != nil { t.Error(dErr) } dmSPP := NewDataManager(data, config.CgrConfig().CacheCfg(), nil) passEvent := map[string]any{ utils.Destination: "+4986517174963", } pEv := utils.MapStorage{utils.MetaReq: passEvent} fltrS := &FilterS{ cfg: cfg, dm: dmSPP, connMgr: nil, } if _, err := WeightFromDynamics(dWs, fltrS, "cgrates.org", pEv); err.Error() != "MANDATORY_IE_MISSING: [connIDs]" { t.Error(err) } } func TestCheckFilterErr(t *testing.T) { fltr := &Filter{ Tenant: "cgrates.org", ID: "FLTR_CP_2", Rules: []*FilterRule{ { Type: utils.MetaString, Element: "~.", Values: []string{"ChargerProfile2"}, }, }, } if err := CheckFilter(fltr); err == nil || !strings.Contains(err.Error(), "Empty field path for filter <&{cgrates.org FLTR_CP_2 ") { t.Error(err) } fltr = &Filter{ Tenant: "cgrates.org", ID: "TestFilter", Rules: []*FilterRule{{ Element: "~*req.Account", Type: utils.MetaString, Values: []string{"~."}, }, }, } if err := CheckFilter(fltr); err == nil || !strings.Contains(err.Error(), "Empty field path for filter <&{cgrates.org TestFilter ") { t.Error(err) } } func TestCheckFilterNotEmptyErr(t *testing.T) { fltr := &Filter{ Tenant: "cgrates.org", ID: "TestFilter", Rules: []*FilterRule{ { Type: utils.MetaNotEmpty, Element: "~*req.Account", Values: []string{"''"}, }, }, } expErr := `value of filter is not empty <''>` if err := CheckFilter(fltr); err == nil || err.Error() != expErr { t.Error(err) } } func TestFilterPassRegexErr(t *testing.T) { cd := &CallDescriptor{ Category: "callx", Tenant: "cgrates.org", Subject: "dan", Destination: "+4986517174963", TimeStart: time.Date(2013, time.October, 7, 14, 50, 0, 0, time.UTC), TimeEnd: time.Date(2013, time.October, 7, 14, 52, 12, 0, time.UTC), DurationIndex: 132 * time.Second, ExtraFields: map[string]string{"navigation": "off"}, } rf := &FilterRule{Type: utils.MetaRegex, Element: "~ategory", Values: []string{"^call"}} if err := rf.CompileValues(); err != nil { t.Fatal(err) } if pass, err := rf.passRegex(cd); err != nil || pass { t.Error(err) } } func TestFilterLazyPassErr(t *testing.T) { tmp := Cache defer func() { Cache = tmp }() Cache.Clear(nil) cfg := config.NewDefaultCGRConfig() db, dErr := NewInternalDB(nil, nil, true, nil, cfg.DataDbCfg().Items) if dErr != nil { t.Error(dErr) } dm := NewDataManager(db, config.CgrConfig().CacheCfg(), nil) filterS := FilterS{ cfg: cfg, dm: dm, } fltrID := "*string:~*req.Account:1007" passEvent := map[string]any{ "Account": "1007", } dm.dataDB = &DataDBMock{} fEv := utils.MapStorage{} fEv.Set([]string{utils.MetaReq}, passEvent) prefixes := []string{utils.DynamicDataPrefix + utils.MetaReq} Cache.Set(utils.CacheFilters, utils.ConcatenatedKey("cgrates.org", fltrID), nil, []string{}, true, utils.NonTransactional) if _, _, err := filterS.LazyPass("cgrates.org", []string{fltrID}, fEv, prefixes); err == nil || err.Error() != utils.ErrPrefixNotFound(fltrID).Error() { t.Error(err) } } func TestSentryPeer(t *testing.T) { token := "token27072023" count := 0 testServer := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { if r.Method == http.MethodPost { if r.URL.EscapedPath() != "/oauth/token" { w.WriteHeader(http.StatusNotFound) return } contentType := r.Header.Get(utils.ContentType) if contentType != utils.JsonBody { w.WriteHeader(http.StatusBadRequest) return } var data map[string]string err := json.NewDecoder(r.Body).Decode(&data) if err != nil { w.WriteHeader(http.StatusBadRequest) return } if data[utils.ClientIdCfg] != "ererwffwssf" || data[utils.ClientSecretCfg] != "3354rf43f34sf" || data[utils.AudienceCfg] != "https://sentrypeer.com/api" || data[utils.GrantTypeCfg] != "client_credentials" { w.WriteHeader(http.StatusBadRequest) return } response := struct { AccessToken string `json:"access_token"` }{ AccessToken: token, } w.WriteHeader(http.StatusOK) err = json.NewEncoder(w).Encode(response) if err != nil { http.Error(w, err.Error(), http.StatusInternalServerError) return } return } if r.Method != http.MethodGet { w.WriteHeader(http.StatusMethodNotAllowed) return } responses := map[string]struct { code int body []byte }{ "/api/ip-addresses/1.2.3.254": {code: http.StatusNotFound, body: []byte(`{"IP Address not found"}`)}, "/api/ip-addresses/184.168.31.232": {code: http.StatusOK, body: []byte(`{"IP Address found"}`)}, "/api/phone-numbers/22663272712": {code: http.StatusNotFound, body: []byte(`Phone Number not found`)}, "/api/phone-numbers/90046322651795": {code: http.StatusOK, body: []byte(`{"Phone Number found`)}, "/api/phone-numbers/1123452353245": {code: http.StatusUnauthorized, body: []byte(`{"Not Authorized`)}, } if val, has := responses[r.URL.EscapedPath()]; has { if r.Header.Get(utils.AuthorizationHdr) != utils.BearerAuth+" "+token { w.WriteHeader(http.StatusUnauthorized) return } if count == 1 { w.WriteHeader(http.StatusNotFound) w.Write([]byte(`Phone number not found`)) return } if val.code == http.StatusUnauthorized { count++ } w.WriteHeader(val.code) if val.body != nil { w.Write(val.body) } return } w.WriteHeader(http.StatusBadRequest) w.Write([]byte(`Wrong path in the request`)) })) defer testServer.Close() cfg := config.NewDefaultCGRConfig() data, dErr := NewInternalDB(nil, nil, true, nil, cfg.DataDbCfg().Items) if dErr != nil { t.Error(dErr) } dm := NewDataManager(data, config.CgrConfig().CacheCfg(), nil) filterS := FilterS{ cfg: cfg, dm: dm, } dp := utils.MapStorage{ utils.MetaReq: utils.MapStorage{ "BADIP": "184.168.31.232", "IP": "1.2.3.254", "Number": "22663272712", "BadNumber": "90046322651795", "No": "1123452353245", }, } config.CgrConfig().SentryPeerCfg().ClientID = "ererwffwssf" config.CgrConfig().SentryPeerCfg().ClientSecret = "3354rf43f34sf" config.CgrConfig().SentryPeerCfg().TokenUrl = testServer.URL + "/oauth/token" config.CgrConfig().SentryPeerCfg().IpsUrl = testServer.URL + "/api/ip-addresses" config.CgrConfig().SentryPeerCfg().NumbersUrl = testServer.URL + "/api/phone-numbers" if pass, err := filterS.Pass("cgrates.org", []string{"*sentrypeer:~*req.IP:*ip"}, dp); err != nil { t.Error(err) } else if !pass { t.Error("Expected to pass") } if val, has := Cache.Get(utils.MetaSentryPeer, utils.MetaToken); !has { t.Error("Expected token to be set in the cahe") } else if val.(string) != token { t.Errorf("Expected +%v,Received +%v", token, val) } if val, has := Cache.Get(utils.MetaSentryPeer, utils.ConcatenatedKey(utils.MetaIp, "1.2.3.254")); !has { t.Error("value should had been set in cache") } else if !val.(bool) { t.Error("Expected item to be true") } if pass, err := filterS.Pass("cgrates.org", []string{"*sentrypeer:~*req.BADIP:*ip"}, dp); err != nil { t.Error(err) } else if pass { t.Error("Expected to not pass") } if val, has := Cache.Get(utils.MetaSentryPeer, utils.ConcatenatedKey(utils.MetaIp, "184.168.31.232")); !has { t.Error("value should had been set in cache") } else if val.(bool) { t.Error("Expected item to be false") } if pass, err := filterS.Pass("cgrates.org", []string{"*sentrypeer:~*req.Number:*number"}, dp); err != nil { t.Error(err) } else if !pass { t.Error("Expected to pass") } if val, has := Cache.Get(utils.MetaSentryPeer, utils.ConcatenatedKey(utils.MetaNumber, "22663272712")); !has { t.Error("value should had been set in cache") } else if !val.(bool) { t.Error("Expected item to be true") } if pass, err := filterS.Pass("cgrates.org", []string{"*sentrypeer:~*req.BadNumber:*number"}, dp); err != nil { t.Error(err) } else if pass { t.Error("Expected to not pass") } if val, has := Cache.Get(utils.MetaSentryPeer, utils.ConcatenatedKey(utils.MetaNumber, "90046322651795")); !has { t.Error("value should had been set in cache") } else if val.(bool) { t.Error("Expected item to be false") } if pass, err := filterS.Pass("cgrates.org", []string{"*sentrypeer:~*req.No:*number"}, dp); err != nil { t.Error(err) } else if !pass { t.Error("Expected to pass") } if val, has := Cache.Get(utils.MetaSentryPeer, utils.ConcatenatedKey(utils.MetaNumber, "1123452353245")); !has { t.Error("value should had been set in cache") } else if !val.(bool) { t.Error("Expected item to be true") } } func TestFilterPassTiming(t *testing.T) { tmp1, tmp2 := connMgr, config.CgrConfig() defer func() { connMgr = tmp1 config.SetCgrConfig(tmp2) }() cfg := config.NewDefaultCGRConfig() cfg.FilterSCfg().ApierSConns = []string{utils.ConcatenatedKey(utils.MetaInternal, utils.MetaApier)} config.SetCgrConfig(cfg) Cache.Clear(nil) client := make(chan birpc.ClientConnector, 1) ccM := &ccMock{ calls: map[string]func(ctx *context.Context, args any, reply any) error{ utils.APIerSv1GetTiming: func(ctx *context.Context, args, reply any) error { exp := &utils.TPTiming{ ID: "MIDNIGHT", Years: utils.Years{2023}, Months: utils.Months{1, 2, 3, 4}, MonthDays: utils.MonthDays{5, 6, 7, 8}, WeekDays: utils.WeekDays{0, 1, 2, 3, 4, 5, 6}, StartTime: "17:00:00", EndTime: "17:00:18", } *reply.(*utils.TPTiming) = *exp return nil }, }, } client <- ccM NewConnManager(cfg, map[string]chan birpc.ClientConnector{ utils.ConcatenatedKey(utils.MetaInternal, utils.MetaApier): client, }) fltr, err := NewFilterRule(utils.MetaTimings, "~*req.AnswerTime", []string{"2023-01-07T17:00:10Z"}) if err != nil { t.Fatal(err) } dtP := utils.MapStorage{ utils.MetaReq: map[string]any{ "AnswerTime": "2023-01-07T17:00:10Z", }, } if pass, err := fltr.Pass(dtP); err != nil { t.Error(err) } else if !pass { t.Errorf("expected: <%+v>, received: <%+v>", false, pass) } } func TestHttpInlineFilter(t *testing.T) { dP := &utils.MapStorage{ utils.MetaReq: map[string]any{ "Attribute": "AttributeProfile1", utils.CGRID: "CGRATES_ID1", utils.AccountField: "1002", utils.AnswerTime: time.Date(2013, 12, 30, 14, 59, 31, 0, time.UTC), }, } srv := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { if r.Method != http.MethodGet { w.WriteHeader(http.StatusMethodNotAllowed) return } if len(r.URL.Query()) != 0 { queryVal := r.URL.Query() reply := queryVal.Has("~*req.Account") && queryVal.Get("~*req.Account") == "1002" w.WriteHeader(http.StatusOK) fmt.Fprint(w, reply) return } var data map[string]any if err := json.NewDecoder(r.Body).Decode(&data); err != nil { http.Error(w, err.Error(), http.StatusBadRequest) return } _, has := data["*req"] w.WriteHeader(http.StatusOK) fmt.Fprint(w, has) })) defer srv.Close() url := "*http#" + "[" + srv.URL + "]" exp := &Filter{ Tenant: "cgrates.org", ID: url + ":" + "~*req.Account:", Rules: []*FilterRule{ { Type: url, Element: "~*req.Account", }, }, } if err := exp.Compile(); err != nil { t.Fatal(err) } if fl, err := NewFilterFromInline("cgrates.org", url+":"+"~*req.Account:"); err != nil { t.Error(err) } else if !reflect.DeepEqual(exp, fl) { t.Errorf("Expected: %s , received: %s", utils.ToJSON(exp), utils.ToJSON(fl)) } if pass, err := exp.Rules[0].Pass(dP); err != nil { t.Error(err) } else if !pass { t.Error("should had passed") } exp2 := &Filter{ Tenant: "cgrates.org", ID: url + ":" + "*any:", Rules: []*FilterRule{ { Type: url, Element: "*any", }, }, } if fl2, err := NewFilterFromInline("cgrates.org", url+":"+"*any:"); err != nil { t.Error(err) } else if fl2.Rules[0].Type != exp2.Rules[0].Type { t.Errorf("Expected: %s , received: %s", utils.ToJSON(exp2), utils.ToJSON(fl2)) } else if pass, err := fl2.Rules[0].Pass(dP); err != nil { t.Error(err) } else if !pass { t.Error("should had passed") } } func TestFilterStats(t *testing.T) { tmpConn := connMgr defer func() { connMgr = tmpConn }() clientConn := make(chan context.ClientConnector, 1) clientConn <- &ccMock{ calls: map[string]func(ctx *context.Context, args any, reply any) error{ utils.StatSv1GetQueueFloatMetrics: func(ctx *context.Context, args, reply any) error { *reply.(*map[string]float64) = map[string]float64{ "*sum#~*req.CostDetails.Charges[0].Increments[0].Accounting.Balance.Value": 45, utils.MetaTCD: float64(20 * time.Second), "*average#~*req.Usage": float64(5 * time.Second), utils.MetaACC: 22.2, } return nil }, }, } connMgr = NewConnManager(config.NewDefaultCGRConfig(), map[string]chan context.ClientConnector{ utils.ConcatenatedKey(utils.MetaInternal, utils.MetaStats): clientConn, }) testCases := []struct { name string input string shouldPass bool }{ { name: "ComposedStatMetric", input: "*gte:~*stats.SQ_1002.*sum#~*req.CostDetails.Charges[0].Increments[0].Accounting.Balance.Value:20", shouldPass: true, }, { name: "TCDStatMetric", input: "*lte:~*stats.SQ_1.*tcd:20s", shouldPass: true, }, { name: "AverageStatMetric", input: "*gt:~*stats.SQ_2.*average#~*req.Usage:4s", shouldPass: true, }, { name: "AverageCallCostStatMetric", input: "*eq:~*stats.SQ_3.*acc:22.2", shouldPass: true, }, } initDP := utils.MapStorage{} dp := newDynamicDP(nil, []string{utils.ConcatenatedKey(utils.MetaInternal, utils.MetaStats)}, nil, nil, nil, "cgrates.org", initDP) for _, tc := range testCases { t.Run(tc.name, func(t *testing.T) { fl, err := NewFilterFromInline("cgrates.org", tc.input) if err != nil { t.Fatal(err) } rule := fl.Rules[0] pass, err := rule.Pass(dp) if err != nil { t.Fatalf("rule.Pass() unexpected error: %v", err) } if pass != tc.shouldPass { t.Errorf("expected rule.Pass() to return %v", tc.shouldPass) } }) } } func TestFilterTrends(t *testing.T) { tmpConn := connMgr defer func() { connMgr = tmpConn }() clientConn := make(chan context.ClientConnector, 1) clientConn <- &ccMock{ calls: map[string]func(ctx *context.Context, args any, reply any) error{ utils.TrendSv1GetTrendSummary: func(ctx *context.Context, args, reply any) error { argGetTrend, ok := args.(*utils.TenantIDWithAPIOpts) if !ok { return fmt.Errorf("wrong args") } if argGetTrend.ID == "Trend1" && argGetTrend.Tenant == "cgrates.org" { now := time.Now() now2 := now.Add(time.Second) tr := Trend{ Tenant: "cgrates.org", ID: "Trend1", RunTimes: []time.Time{now, now2}, Metrics: map[time.Time]map[string]*MetricWithTrend{ now: { "*acc": {ID: "*acc", Value: 45, TrendGrowth: -1.0, TrendLabel: utils.NotAvailable}, "*acd": {ID: "*acd", Value: 50, TrendGrowth: -1.0, TrendLabel: utils.NotAvailable}, }, now2: { "*acc": {ID: "*acc", Value: 42, TrendGrowth: -3.0, TrendLabel: utils.MetaNegative}, "*acd": {ID: "*acd", Value: 52, TrendGrowth: 2.0, TrendLabel: utils.MetaPositive}, }, }, } trS := tr.asTrendSummary() *reply.(*TrendSummary) = *trS return nil } return utils.ErrNotFound }, }, } now3 := time.Now().Add(-time.Second * 3).Format(time.RFC3339) connMgr = NewConnManager(config.NewDefaultCGRConfig(), map[string]chan context.ClientConnector{ utils.ConcatenatedKey(utils.MetaInternal, utils.MetaTrends): clientConn, }) testCases := []struct { name string filter string shouldPass bool }{ { name: "TrendPassACCLabel", filter: "*string:~*trends.Trend1.Metrics.*acc.TrendLabel:*negative", shouldPass: true, }, { name: "TrendPassID", filter: "*string:~*trends.Trend1.ID:Trend1", shouldPass: true, }, { name: "TrendPassACDLabel", filter: "*string:~*trends.Trend1.Metrics.*acd.TrendLabel:*positive", shouldPass: true, }, { name: "TrendFailACCGrowth", filter: "*gt:~*trends.Trend1.Metrics.*acc.TrendGrowth:1.0", shouldPass: false, }, { name: "TrendPassACDGrowth", filter: "*gte:~*trends.Trend1.Metrics.*acd.TrendGrowth:2", shouldPass: true, }, { name: "TrendPassTime", filter: fmt.Sprintf("*ai:~*trends.Trend1.Time:%s", now3), shouldPass: true, }, } initDP := utils.MapStorage{} dp := newDynamicDP(nil, nil, nil, []string{utils.ConcatenatedKey(utils.MetaInternal, utils.MetaTrends)}, nil, "cgrates.org", initDP) for _, tc := range testCases { t.Run(tc.name, func(t *testing.T) { fl, err := NewFilterFromInline("cgrates.org", tc.filter) if err != nil { t.Fatal(err) } rule := fl.Rules[0] pass, err := rule.Pass(dp) if err != nil { t.Fatalf("rule.Pass() unexpected error: %v", err) } if pass != tc.shouldPass { t.Errorf("rule.Pass() expected: %t ,got: %t", tc.shouldPass, pass) } }) } } func TestFilterRanking(t *testing.T) { tmpConn := connMgr defer func() { connMgr = tmpConn }() clientConn := make(chan context.ClientConnector, 1) clientConn <- &ccMock{ calls: map[string]func(ctx *context.Context, args any, reply any) error{ utils.RankingSv1GetRankingSummary: func(ctx *context.Context, args any, reply any) error { argTntID, ok := args.(*utils.TenantIDWithAPIOpts) if !ok { return fmt.Errorf("wrong args") } if argTntID.ID == "Ranking1" && argTntID.Tenant == "cgrates.org" { rn := Ranking{ Tenant: "cgrates.org", ID: "Ranking1", LastUpdate: time.Now(), SortedStatIDs: []string{"Stat5", "Stat6", "Stat7", "Stat4", "Stat3", "Stat1", "Stat2"}, } rnS := rn.asRankingSummary() *reply.(*RankingSummary) = *rnS return nil } return utils.ErrNotFound }, }} connMgr = NewConnManager(config.NewDefaultCGRConfig(), map[string]chan context.ClientConnector{ utils.ConcatenatedKey(utils.MetaInternal, utils.MetaRankings): clientConn, }) now := time.Now().Add(-2 * time.Second).Format(time.RFC3339) testCases := []struct { name string filter string pass bool }{ {name: "RankingPassID", filter: "*string:~*rankings.Ranking1.ID:Ranking1", pass: true}, {name: "RankingPassLastUpdate", filter: fmt.Sprintf("*ai:~*rankings.Ranking1.LastUpdate:%s", now), pass: true}, {name: "RankingPassFirstSortedStatIDs", filter: "*string:~*rankings.Ranking1.SortedStatIDs[0]:Stat5", pass: true}, {name: "RankingPassLastSortedStatIDs", filter: "*string:~*rankings.Ranking1.SortedStatIDs[6]:Stat2", pass: true}, {name: "RankingFailSortedStatIDsIdx", filter: "*string:~*rankings.Ranking1.SortedStatIDs[1]:Stat4", pass: false}, } initDP := utils.MapStorage{} dp := newDynamicDP(nil, nil, nil, nil, []string{utils.ConcatenatedKey(utils.MetaInternal, utils.MetaRankings)}, "cgrates.org", initDP) for _, tc := range testCases { t.Run(tc.name, func(t *testing.T) { fl, err := NewFilterFromInline(dp.tenant, tc.filter) if err != nil { t.Fatal(err) } rule := fl.Rules[0] pass, err := rule.Pass(dp) if err != nil { t.Fatalf("rule.Pass() unexpected error: %v", err) } if pass != tc.pass { t.Errorf("rule.Pass() expected: %t ,got: %t", tc.pass, pass) } }) } } func TestFilterRuleElementItems(t *testing.T) { rf, err := NewFilterRule(utils.MetaEqual, "~*req.cost_details.Charges[0].RatingID", []string{"RatingID2"}) if err != nil { t.Errorf("Error: %+v", err) } exp := []string{"~*req", "cost_details", "Charges[0]", "RatingID"} rcv := rf.ElementItems() if !reflect.DeepEqual(exp, rcv) { t.Errorf("Expected: %v , received: %v", exp, rcv) } } func TestNewFilterRule(t *testing.T) { t.Run("Valid filter rule", func(t *testing.T) { rfType := "*regex" fieldName := "field" vals := []string{"val1", "val2"} rule, err := NewFilterRule(rfType, fieldName, vals) if err != nil { t.Errorf("Expected no error, got %v", err) } if rule == nil { t.Fatalf("Expected a valid FilterRule, got nil") } if rule.Type != rfType { t.Errorf("Expected Type to be %v, got %v", rfType, rule.Type) } if rule.Element != fieldName { t.Errorf("Expected Element to be %v, got %v", fieldName, rule.Element) } if len(rule.Values) != len(vals) || rule.Values[0] != vals[0] || rule.Values[1] != vals[1] { t.Errorf("Expected Values to be %v, got %v", vals, rule.Values) } if rule.negative == nil || *rule.negative { t.Errorf("Expected negative to be false, got %v", rule.negative) } }) t.Run("Unsupported filter type", func(t *testing.T) { rfType := "*unsupported" fieldName := "field" vals := []string{"val1"} rule, err := NewFilterRule(rfType, fieldName, vals) if err == nil || err.Error() != "Unsupported filter Type: *unsupported" { t.Errorf("Expected error 'Unsupported filter Type: *unsupported', got %v", err) } if rule != nil { t.Errorf("Expected nil FilterRule, got %v", rule) } }) t.Run("Missing field name for type requiring it", func(t *testing.T) { rfType := "*regex" fieldName := "" vals := []string{"val1"} rule, err := NewFilterRule(rfType, fieldName, vals) if err == nil || err.Error() != "Element is mandatory for Type: *regex" { t.Errorf("Expected error 'Element is mandatory for Type: *regex', got %v", err) } if rule != nil { t.Errorf("Expected nil FilterRule, got %v", rule) } }) t.Run("Missing values for type requiring them", func(t *testing.T) { rfType := "*regex" fieldName := "field" vals := []string{} rule, err := NewFilterRule(rfType, fieldName, vals) if err == nil || err.Error() != "Values is mandatory for Type: *regex" { t.Errorf("Expected error 'Values is mandatory for Type: *regex', got %v", err) } if rule != nil { t.Errorf("Expected nil FilterRule, got %v", rule) } }) t.Run("MetaHTTP prefix handling", func(t *testing.T) { rfType := "*http/specific" fieldName := "url" vals := []string{"http://cgrates.com"} rule, err := NewFilterRule(rfType, fieldName, vals) if err != nil { t.Errorf("Expected no error, got %v", err) } if rule == nil { t.Fatalf("Expected a valid FilterRule, got nil") } if rule.Element != fieldName { t.Errorf("Expected Element to be %v, got %v", fieldName, rule.Element) } if len(rule.Values) != len(vals) || rule.Values[0] != vals[0] { t.Errorf("Expected Values to be %v, got %v", vals, rule.Values) } }) t.Run("CompileValues error handling", func(t *testing.T) { rfType := "*regex" fieldName := "pattern" vals := []string{"[invalid-regex"} rule, err := NewFilterRule(rfType, fieldName, vals) if err == nil || !strings.Contains(err.Error(), "error parsing regexp") { t.Errorf("Expected error parsing regexp, got %v", err) } if rule != nil { t.Errorf("Expected nil FilterRule, got %v", rule) } }) } func TestFilterToSQLQuery(t *testing.T) { tests := []struct { name string fltrRule FilterRule expected []string }{ {"MetaEqual with values", FilterRule{Type: utils.MetaEqual, Element: "~*req.cost_details.Charges[0].RatingID", Values: []string{"RatingID2"}}, []string{"JSON_VALUE(cost_details, '$.Charges[0].RatingID') = 'RatingID2'"}}, {"MetaExists with no values", FilterRule{Type: utils.MetaExists, Element: "~*req.answer_time", Values: nil}, []string{"answer_time IS NOT NULL"}}, {"MetaExists with JSON field", FilterRule{Type: utils.MetaExists, Element: "~*req.cost_details.Charges[0].RatingID", Values: nil}, []string{"JSON_VALUE(cost_details, '$.Charges[0].RatingID') IS NOT NULL"}}, {"MetaNotExists with no values", FilterRule{Type: utils.MetaNotExists, Element: "~*req.answer_time", Values: nil}, []string{"answer_time IS NULL"}}, {"MetaNotExists with JSON field", FilterRule{Type: utils.MetaNotExists, Element: "~*req.cost_details.Charges[0].RatingID", Values: nil}, []string{"JSON_VALUE(cost_details, '$.Charges[0].RatingID') IS NULL"}}, {"MetaString with values", FilterRule{Type: utils.MetaString, Element: "~*req.answer_time", Values: []string{"value1", "value2"}}, []string{"answer_time = 'value1'", "answer_time = 'value2'"}}, {"MetaNotString with values", FilterRule{Type: utils.MetaNotString, Element: "~*req.cost_details.Charges[0].RatingID", Values: []string{"value1"}}, []string{"JSON_VALUE(cost_details, '$.Charges[0].RatingID') != 'value1'"}}, {"MetaEmpty with no values", FilterRule{Type: utils.MetaEmpty, Element: "~*req.answer_time", Values: nil}, []string{"answer_time == ''"}}, {"MetaEmpty with JSON field", FilterRule{Type: utils.MetaEmpty, Element: "~*req.cost_details.Charges[0].RatingID", Values: nil}, []string{"JSON_VALUE(cost_details, '$.Charges[0].RatingID') == ''"}}, {"MetaNotEmpty with no values", FilterRule{Type: utils.MetaNotEmpty, Element: "~*req.answer_time", Values: nil}, []string{"answer_time != ''"}}, {"MetaNotEmpty with JSON field", FilterRule{Type: utils.MetaNotEmpty, Element: "~*req.cost_details.Charges[0].RatingID", Values: nil}, []string{"JSON_VALUE(cost_details, '$.Charges[0].RatingID') != ''"}}, {"MetaGreaterOrEqual with values", FilterRule{Type: utils.MetaGreaterOrEqual, Element: "~*req.answer_time", Values: []string{"10"}}, []string{"answer_time >= '10'"}}, {"MetaGreaterThan with values", FilterRule{Type: utils.MetaGreaterThan, Element: "~*req.cost_details.Charges[0].RatingID", Values: []string{"20"}}, []string{"JSON_VALUE(cost_details, '$.Charges[0].RatingID') > '20'"}}, {"MetaLessThan with values", FilterRule{Type: utils.MetaLessThan, Element: "~*req.answer_time", Values: []string{"5"}}, []string{"answer_time < '5'"}}, {"MetaLessOrEqual with values", FilterRule{Type: utils.MetaLessOrEqual, Element: "~*req.cost_details.Charges[0].RatingID", Values: []string{"15"}}, []string{"JSON_VALUE(cost_details, '$.Charges[0].RatingID') <= '15'"}}, {"MetaPrefix with values", FilterRule{Type: utils.MetaPrefix, Element: "~*req.answer_time", Values: []string{"pre"}}, []string{"answer_time LIKE 'pre%'"}}, {"MetaNotPrefix with values", FilterRule{Type: utils.MetaNotPrefix, Element: "~*req.cost_details.Charges[0].RatingID", Values: []string{"pre"}}, []string{"JSON_VALUE(cost_details, '$.Charges[0].RatingID') NOT LIKE 'pre%'"}}, {"MetaSuffix with values", FilterRule{Type: utils.MetaSuffix, Element: "~*req.answer_time", Values: []string{"suf"}}, []string{"answer_time LIKE '%suf'"}}, {"MetaNotSuffix with values", FilterRule{Type: utils.MetaNotSuffix, Element: "~*req.cost_details.Charges[0].RatingID", Values: []string{"suf"}}, []string{"JSON_VALUE(cost_details, '$.Charges[0].RatingID') NOT LIKE '%suf'"}}, {"MetaGreaterOrEqual with JSON field", FilterRule{Type: utils.MetaGreaterOrEqual, Element: "~*req.cost_details.Charges[0].RatingID", Values: []string{"100"}}, []string{"JSON_VALUE(cost_details, '$.Charges[0].RatingID') >= '100'"}}, {"MetaRegex with values", FilterRule{Type: utils.MetaRegex, Element: "~*req.answer_time", Values: []string{"pattern1", "pattern2"}}, []string{"answer_time REGEXP 'pattern1'", "answer_time REGEXP 'pattern2'"}}, {"MetaNotRegex with values", FilterRule{Type: utils.MetaNotRegex, Element: "~*req.cost_details.Charges[0].RatingID", Values: []string{"pattern"}}, []string{"JSON_VALUE(cost_details, '$.Charges[0].RatingID') NOT REGEXP 'pattern'"}}, } for _, tt := range tests { t.Run(tt.name, func(t *testing.T) { got := tt.fltrRule.FilterToSQLQuery() if len(got) != len(tt.expected) { t.Errorf("expected %v, got %v", tt.expected, got) return } for i, cond := range got { if cond != tt.expected[i] { t.Errorf("expected %v, got %v", tt.expected[i], cond) } } }) } } func TestFilterToSQLQueryValidations(t *testing.T) { tests := []struct { name string fltrRule FilterRule expected []string }{ { name: "Boolean true value", fltrRule: FilterRule{ Type: utils.MetaString, Element: "~*req.active", Values: []string{"true"}, }, expected: []string{"active = '1'"}, }, { name: "Boolean false value", fltrRule: FilterRule{ Type: utils.MetaString, Element: "~*req.active", Values: []string{"false"}, }, expected: []string{"active = '0'"}, }, { name: "Greater than or equal with empty beforeSep", fltrRule: FilterRule{ Type: utils.MetaGreaterOrEqual, Element: "~*req.score", Values: []string{"10"}, }, expected: []string{"score >= '10'"}, }, { name: "Greater than with empty beforeSep", fltrRule: FilterRule{ Type: utils.MetaGreaterThan, Element: "~*req.score", Values: []string{"20"}, }, expected: []string{"score > '20'"}, }, { name: "Less than or equal with empty beforeSep", fltrRule: FilterRule{ Type: utils.MetaLessOrEqual, Element: "~*req.score", Values: []string{"30"}, }, expected: []string{"score <= '30'"}, }, { name: "Less than with empty beforeSep", fltrRule: FilterRule{ Type: utils.MetaLessThan, Element: "~*req.score", Values: []string{"40"}, }, expected: []string{"score < '40'"}, }, { name: "Prefix NOT LIKE with empty beforeSep", fltrRule: FilterRule{ Type: utils.MetaNotPrefix, Element: "~*req.name", Values: []string{"prefix"}, }, expected: []string{"name NOT LIKE 'prefix%'"}, }, { name: "Prefix LIKE with JSON_VALUE", fltrRule: FilterRule{ Type: utils.MetaPrefix, Element: "~*req.data.name", Values: []string{"prefix"}, }, expected: []string{"JSON_VALUE(data, '$.name') LIKE 'prefix%'"}, }, { name: "Prefix LIKE with * column with JSON_VALUE", fltrRule: FilterRule{ Type: utils.MetaPrefix, Element: "~*req.data.*name", Values: []string{"prefix"}, }, expected: []string{`JSON_UNQUOTE(JSON_VALUE(data, '$."*name"') LIKE 'prefix%')`}, }, { name: "Suffix NOT LIKE with empty beforeSep", fltrRule: FilterRule{ Type: utils.MetaNotSuffix, Element: "~*req.name", Values: []string{"suffix"}, }, expected: []string{"name NOT LIKE '%suffix'"}, }, { name: "Suffix LIKE with JSON_VALUE", fltrRule: FilterRule{ Type: utils.MetaSuffix, Element: "~*req.data.name", Values: []string{"suffix"}, }, expected: []string{"JSON_VALUE(data, '$.name') LIKE '%suffix'"}, }, { name: "Suffix LIKE with * column with JSON_VALUE", fltrRule: FilterRule{ Type: utils.MetaSuffix, Element: "~*req.data.*name", Values: []string{"suffix"}, }, expected: []string{`JSON_UNQUOTE(JSON_VALUE(data, '$."*name"') LIKE '%suffix')`}, }, { name: "Regex NOT REGEXP with empty beforeSep", fltrRule: FilterRule{ Type: utils.MetaNotRegex, Element: "~*req.pattern", Values: []string{"[a-z]+"}, }, expected: []string{"pattern NOT REGEXP '[a-z]+'"}, }, { name: "Regex REGEXP with JSON_VALUE", fltrRule: FilterRule{ Type: utils.MetaRegex, Element: "~*req.data.pattern", Values: []string{"[0-9]+"}, }, expected: []string{"JSON_VALUE(data, '$.pattern') REGEXP '[0-9]+'"}, }, { name: "Regex REGEXP with * column with JSON_VALUE", fltrRule: FilterRule{ Type: utils.MetaRegex, Element: "~*req.data.*pattern", Values: []string{"[0-9]+"}, }, expected: []string{`JSON_UNQUOTE(JSON_VALUE(data, '$."*pattern"') REGEXP '[0-9]+')`}, }, { name: "Not equal with empty beforeSep", fltrRule: FilterRule{ Type: utils.MetaNotString, Element: "~*req.status", Values: []string{"inactive"}, }, expected: []string{"status != 'inactive'"}, }, { name: "Equal condition with JSON_VALUE", fltrRule: FilterRule{ Type: utils.MetaString, Element: "~*req.data.status", Values: []string{"active"}, }, expected: []string{"JSON_VALUE(data, '$.status') = 'active'"}, }, { name: "Equal condition with * column with JSON_VALUE", fltrRule: FilterRule{ Type: utils.MetaString, Element: "~*req.data.*status", Values: []string{"active"}, }, expected: []string{`JSON_UNQUOTE(JSON_VALUE(data, '$."*status"') = 'active')`}, }, { name: "Greater than condition with JSON_VALUE", fltrRule: FilterRule{ Type: utils.MetaGreaterThan, Element: "~*req.data.score", Values: []string{"50"}, }, expected: []string{"JSON_VALUE(data, '$.score') > '50'"}, }, { name: "Greater than condition with * column with JSON_VALUE", fltrRule: FilterRule{ Type: utils.MetaGreaterThan, Element: "~*req.data.*score", Values: []string{"50"}, }, expected: []string{`JSON_UNQUOTE(JSON_VALUE(data, '$."*score"') > '50')`}, }, { name: "Less than or equal condition with JSON_VALUE", fltrRule: FilterRule{ Type: utils.MetaLessOrEqual, Element: "~*req.data.score", Values: []string{"30"}, }, expected: []string{"JSON_VALUE(data, '$.score') <= '30'"}, }, { name: "Less than or equal condition with * column with JSON_VALUE", fltrRule: FilterRule{ Type: utils.MetaLessOrEqual, Element: "~*req.data.*score", Values: []string{"30"}, }, expected: []string{`JSON_UNQUOTE(JSON_VALUE(data, '$."*score"') <= '30')`}, }, { name: "Less than condition with JSON_VALUE", fltrRule: FilterRule{ Type: utils.MetaLessThan, Element: "~*req.data.score", Values: []string{"20"}, }, expected: []string{"JSON_VALUE(data, '$.score') < '20'"}, }, { name: "Less than condition with * column with JSON_VALUE", fltrRule: FilterRule{ Type: utils.MetaLessThan, Element: "~*req.data.*score", Values: []string{"20"}, }, expected: []string{`JSON_UNQUOTE(JSON_VALUE(data, '$."*score"') < '20')`}, }, { name: "MetaExists with no values", fltrRule: FilterRule{ Type: utils.MetaExists, Element: "~*req.column1", Values: nil, }, expected: []string{"column1 IS NOT NULL"}, }, { name: "MetaNotExists with no values", fltrRule: FilterRule{ Type: utils.MetaNotExists, Element: "~*req.json_field.key", Values: nil, }, expected: []string{"JSON_VALUE(json_field, '$.key') IS NULL"}, }, { name: "MetaNotExists with *column with no values", fltrRule: FilterRule{ Type: utils.MetaNotExists, Element: "~*req.json_field.*key", Values: nil, }, expected: []string{`JSON_UNQUOTE(JSON_VALUE(json_field, '$."*key"') IS NULL)`}, }, { name: "MetaString with values", fltrRule: FilterRule{ Type: utils.MetaString, Element: "~*req.column2", Values: []string{"value1", "value2"}, }, expected: []string{"column2 = 'value1'", "column2 = 'value2'"}, }, { name: "MetaPrefix with NOT condition", fltrRule: FilterRule{ Type: utils.MetaNotPrefix, Element: "~*req.json_field.key", Values: []string{"prefix1"}, }, expected: []string{"JSON_VALUE(json_field, '$.key') NOT LIKE 'prefix1%'"}, }, { name: "MetaPrefix with *column name NOT condition", fltrRule: FilterRule{ Type: utils.MetaNotPrefix, Element: "~*req.json_field.*key", Values: []string{"prefix1"}, }, expected: []string{`JSON_UNQUOTE(JSON_VALUE(json_field, '$."*key"') NOT LIKE 'prefix1%')`}, }, { name: "MetaRegex with multiple values", fltrRule: FilterRule{ Type: utils.MetaRegex, Element: "~*req.column3", Values: []string{"pattern1", "pattern2"}, }, expected: []string{"column3 REGEXP 'pattern1'", "column3 REGEXP 'pattern2'"}, }, } for _, tt := range tests { t.Run(tt.name, func(t *testing.T) { got := tt.fltrRule.FilterToSQLQuery() if len(got) != len(tt.expected) { t.Errorf("expected %v, got %v", tt.expected, got) return } for i, cond := range got { if cond != tt.expected[i] { t.Errorf("expected %v, got %v", tt.expected[i], cond) } } }) } } func TestWeightFromDynamics2(t *testing.T) { cfg := config.NewDefaultCGRConfig() connMgr = NewConnManager(cfg, nil) db, _ := NewInternalDB(nil, nil, true, nil, cfg.DataDbCfg().Items) dm := NewDataManager(db, cfg.CacheCfg(), nil) filterS := NewFilterS(cfg, connMgr, dm) testCases := []struct { name string dynamicWeights []*utils.DynamicWeight tenant string event utils.DataProvider expectedWeight float64 expectedErr bool }{ { name: "EmptyDynamicWeight", dynamicWeights: []*utils.DynamicWeight{}, tenant: "cgrates.org", event: utils.MapStorage{}, expectedWeight: 0.0, expectedErr: false, }, { name: "MatchingWeight", dynamicWeights: []*utils.DynamicWeight{ { FilterIDs: []string{"*string:~*req.Account:1001"}, Weight: 10.0, }, }, tenant: "cgrates.org", event: utils.MapStorage{ "*req": utils.MapStorage{ "Account": "1001", }, }, expectedWeight: 10.0, }, { name: "MultipleMatchingWeights", dynamicWeights: []*utils.DynamicWeight{ { FilterIDs: []string{"*prefix:~*req.Destination:GER"}, Weight: 10.0, }, { FilterIDs: []string{"*string:~*opts.subsys:*sessions"}, Weight: 5.0, }, }, tenant: "cgrates.org", event: utils.MapStorage{ "*req": utils.MapStorage{ "Destination": "GER_0055", }, "*opts": utils.MapStorage{ "*subsys": "*sessions", }, }, expectedWeight: 10.0, }, { name: "NoMatchingWeightFilterErr", dynamicWeights: []*utils.DynamicWeight{ { FilterIDs: []string{"FLTR1"}, Weight: 10.0, }, }, tenant: "cgrates.org", event: utils.MapStorage{ "*req": utils.MapStorage{ "Account": "1001", }, }, expectedErr: true, }, } for _, tc := range testCases { t.Run(tc.name, func(t *testing.T) { weight, err := WeightFromDynamics(tc.dynamicWeights, filterS, tc.tenant, tc.event) if tc.expectedErr { if err == nil { t.Error("Expected error but got none") } } else { if err != nil { t.Errorf("Unexpected error: %v", err) } if weight != tc.expectedWeight { t.Errorf("Expected weight %v, got %v", tc.expectedWeight, weight) } } }) } } func TestFiltersPassNIString(t *testing.T) { dDP := utils.MapStorage{ utils.AccountField: "1001", utils.Destination: "1002", utils.Category: "call", } tests := []struct { name string fltr *FilterRule want bool }{ { name: "NIStringMatch", fltr: &FilterRule{ Type: utils.MetaNIString, Element: "~Category", Values: []string{"call"}, }, want: true, }, { name: "NIStringNotMatch", fltr: &FilterRule{ Type: utils.MetaNIString, Element: "~Category", Values: []string{"premium"}, }, want: false, }, { name: "NIStringMultipleValues", fltr: &FilterRule{ Type: utils.MetaNIString, Element: "~Account", Values: []string{"1001", "1002", "1003"}, }, want: true, }, } for _, tt := range tests { t.Run(tt.name, func(t *testing.T) { if err := tt.fltr.CompileValues(); err != nil { t.Fatal(err) } got, gotErr := tt.fltr.Pass(dDP) if gotErr != nil { t.Errorf("Pass() failed: %v", gotErr) return } if got != tt.want { t.Errorf("Pass() = %v, want %v", got, tt.want) } }) } } func TestFiltersPassNISuffix(t *testing.T) { dDP := utils.MapStorage{ utils.AccountField: "1001", utils.Destination: "+4985837291", utils.Category: "call", } tests := []struct { name string fltr *FilterRule want bool }{ { name: "MatchingNISuffix", fltr: &FilterRule{ Type: utils.MetaNISuffix, Element: "~Destination", Values: []string{"91"}, }, want: true, }, { name: "NonMatchingSuffix", fltr: &FilterRule{ Type: utils.MetaNISuffix, Element: "~Account", Values: []string{"02"}, }, want: false, }, { name: "NISuffixPassMultipleValues", fltr: &FilterRule{ Type: utils.MetaNISuffix, Element: "~Destination", Values: []string{"3", "91", "22"}, }, want: true, }, } for _, tt := range tests { t.Run(tt.name, func(t *testing.T) { if err := tt.fltr.CompileValues(); err != nil { t.Fatal(err) } got, err := tt.fltr.Pass(dDP) if err != nil { t.Errorf("Pass() error = %v", err) return } if got != tt.want { t.Errorf("Pass() = %v, want %v", got, tt.want) } }) } } func TestFiltersPassNIExists(t *testing.T) { dDP := utils.MapStorage{ utils.AccountField: "1001", utils.Destination: "1002", utils.Category: "call", } tests := []struct { name string fltr *FilterRule want bool }{ { name: "NIExistsField", fltr: &FilterRule{ Type: utils.MetaNIExists, Element: "~Category", Values: []string{}, }, want: true, }, { name: "NonNIExistentField", fltr: &FilterRule{ Type: utils.MetaNIExists, Element: "~NonExistentField", Values: []string{}, }, want: false, }, { name: "NIExistsAccount", fltr: &FilterRule{ Type: utils.MetaNIExists, Element: "~Account", Values: []string{}, }, want: true, }, { name: "NIExistsDestination", fltr: &FilterRule{ Type: utils.MetaNIExists, Element: "~Destination", Values: []string{}, }, want: true, }, } for _, tt := range tests { t.Run(tt.name, func(t *testing.T) { if err := tt.fltr.CompileValues(); err != nil { t.Fatal(err) } got, err := tt.fltr.Pass(dDP) if err != nil { t.Errorf("Pass() error = %v", err) return } if got != tt.want { t.Errorf("Pass() = %v, want %v", got, tt.want) } }) } } func TestFiltersPassNIPrefix(t *testing.T) { dDP := utils.MapStorage{ utils.AccountField: "1001", utils.Destination: "+4985837291", utils.Category: "call", } tests := []struct { name string fltr *FilterRule want bool }{ { name: "MatchingNIPrefix", fltr: &FilterRule{ Type: utils.MetaNIPrefix, Element: "~Destination", Values: []string{"+49"}, }, want: true, }, { name: "NonMatchingNIPrefix", fltr: &FilterRule{ Type: utils.MetaNIPrefix, Element: "~Account", Values: []string{"20"}, }, want: false, }, { name: "NIPrefixPassMultipleValues", fltr: &FilterRule{ Type: utils.MetaNIPrefix, Element: "~Destination", Values: []string{"+49", "+21", "+35"}, }, want: true, }, } for _, tt := range tests { t.Run(tt.name, func(t *testing.T) { if err := tt.fltr.CompileValues(); err != nil { t.Fatal(err) } got, err := tt.fltr.Pass(dDP) if err != nil { t.Errorf("Pass() error = %v", err) return } if got != tt.want { t.Errorf("Pass() = %v, want %v", got, tt.want) } }) } }