//go:build integration // +build integration /* Real-time Online/Offline Charging System (OCS) for Telecom & ISP environments Copyright (C) ITsysCOM GmbH This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see */ package agents import ( "bytes" "crypto/tls" "crypto/x509" "fmt" "io" "net/http" "net/rpc" "os" "path" "reflect" "testing" "time" "github.com/cgrates/birpc/context" "github.com/cgrates/cgrates/config" "github.com/cgrates/cgrates/engine" "github.com/cgrates/cgrates/utils" ) var ( haCfgPath string haCfgDIR string haCfg *config.CGRConfig haRPC *rpc.Client httpC *http.Client // so we can cache the connection err error isTls bool sTestsHA = []func(t *testing.T){ testHAitInitCfg, testHAitHttp, testHAitResetDB, testHAitStartEngine, testHAitApierRpcConn, testHAitTPFromFolder, testHAitAuthDryRun, testHAitAuth1001, testHAitCDRmtcall, testHAitCDRmtcall2, testHAitTextPlain, testHAitStopEngine, } ) func TestHAit(t *testing.T) { switch *dbType { case utils.MetaInternal: haCfgDIR = "httpagent_internal" case utils.MetaMySQL: haCfgDIR = "httpagent_mysql" case utils.MetaMongo: haCfgDIR = "httpagent_mongo" case utils.MetaPostgres: t.SkipNow() default: t.Fatal("Unknown Database type") } if *encoding == utils.MetaGOB { haCfgDIR += "_gob" } //Run the tests without Tls isTls = false for _, stest := range sTestsHA { t.Run(haCfgDIR, stest) } } func TestHAitTls(t *testing.T) { switch *dbType { case utils.MetaInternal: haCfgDIR = "httpagenttls_internal" case utils.MetaMySQL: haCfgDIR = "httpagenttls_mysql" case utils.MetaMongo: haCfgDIR = "httpagenttls_mongo" case utils.MetaPostgres: t.SkipNow() default: t.Fatal("Unknown Database type") } if *encoding == utils.MetaGOB { haCfgDIR += "_gob" } //Run the tests with Tls isTls = true for _, stest := range sTestsHA { t.Run(haCfgDIR, stest) } } // Init config first func testHAitInitCfg(t *testing.T) { var err error haCfgPath = path.Join(*dataDir, "conf", "samples", haCfgDIR) haCfg, err = config.NewCGRConfigFromPath(context.Background(), haCfgPath) if err != nil { t.Error(err) } } func testHAitHttp(t *testing.T) { if isTls { // With Tls //make http client with tls cert, err := tls.LoadX509KeyPair(haCfg.TLSCfg().ClientCerificate, haCfg.TLSCfg().ClientKey) if err != nil { t.Error(err) } // Load CA cert caCert, err := os.ReadFile(haCfg.TLSCfg().CaCertificate) if err != nil { t.Error(err) } rootCAs, _ := x509.SystemCertPool() if ok := rootCAs.AppendCertsFromPEM(caCert); !ok { t.Error("Cannot append CA") } // Setup HTTPS client tlsConfig := &tls.Config{ Certificates: []tls.Certificate{cert}, RootCAs: rootCAs, } transport := &http.Transport{TLSClientConfig: tlsConfig} httpC = &http.Client{Transport: transport} } else { // Without Tls httpC = new(http.Client) } } // Remove data in both rating and accounting db func testHAitResetDB(t *testing.T) { if err := engine.InitDataDB(haCfg); err != nil { t.Fatal(err) } if err := engine.InitStorDB(haCfg); err != nil { t.Fatal(err) } } // Start CGR Engine func testHAitStartEngine(t *testing.T) { if _, err := engine.StopStartEngine(haCfgPath, *waitRater); err != nil { t.Fatal(err) } } // Connect rpc client to rater func testHAitApierRpcConn(t *testing.T) { var err error haRPC, err = newRPCClient(haCfg.ListenCfg()) // We connect over JSON so we can also troubleshoot if needed if err != nil { t.Fatal(err) } } // Load the tariff plan, creating accounts and their balances func testHAitTPFromFolder(t *testing.T) { attrs := &utils.AttrLoadTpFromFolder{FolderPath: path.Join(*dataDir, "tariffplans", "oldtutorial")} var loadInst utils.LoadInstance if err := haRPC.Call(utils.APIerSv1LoadTariffPlanFromFolder, attrs, &loadInst); err != nil { t.Error(err) } time.Sleep(time.Duration(*waitRater) * time.Millisecond) // Give time for scheduler to execute topups } func testHAitAuthDryRun(t *testing.T) { httpConst := "http" addr := haCfg.ListenCfg().HTTPListen if isTls { addr = haCfg.ListenCfg().HTTPTLSListen httpConst = "https" } reqUrl := fmt.Sprintf("%s://%s%s?request_type=OutboundAUTH&CallID=123456&Msisdn=497700056231&Imsi=2343000000000123&Destination=491239440004&MSRN=0102220233444488999&ProfileID=1&AgentID=176&GlobalMSISDN=497700056129&GlobalIMSI=214180000175129&ICCID=8923418450000089629&MCC=234&MNC=10&calltype=callback", httpConst, addr, haCfg.HTTPAgentCfg()[0].URL) rply, err := httpC.Get(reqUrl) if err != nil { t.Fatal(err) } eXml := []byte(` 1 234/Val1 1200 `) if body, err := io.ReadAll(rply.Body); err != nil { t.Error(err) } else if !reflect.DeepEqual(eXml, body) { t.Errorf("expecting: <%s>, received: <%s>", string(eXml), string(body)) } rply.Body.Close() time.Sleep(time.Millisecond) } func testHAitAuth1001(t *testing.T) { acnt := "20002" maxDuration := 60 attrSetBalance := utils.AttrSetBalance{ Tenant: "cgrates.org", Account: acnt, BalanceType: utils.MetaVoice, Value: float64(maxDuration) * float64(time.Second), Balance: map[string]interface{}{ utils.ID: "TestDynamicDebitBalance", utils.RatingSubject: "*zero5ms", }, } var reply string if err := haRPC.Call(utils.APIerSv2SetBalance, attrSetBalance, &reply); err != nil { t.Error(err) } else if reply != utils.OK { t.Errorf("Received: %s", reply) } time.Sleep(10 * time.Millisecond) httpConst := "http" addr := haCfg.ListenCfg().HTTPListen if isTls { addr = haCfg.ListenCfg().HTTPTLSListen httpConst = "https" } reqUrl := fmt.Sprintf("%s://%s%s?request_type=OutboundAUTH&CallID=123456&Msisdn=%s&Imsi=2343000000000123&Destination=1002&MSRN=0102220233444488999&ProfileID=1&AgentID=176&GlobalMSISDN=497700056129&GlobalIMSI=214180000175129&ICCID=8923418450000089629&MCC=234&MNC=10&calltype=callback", httpConst, addr, haCfg.HTTPAgentCfg()[0].URL, acnt) rply, err := httpC.Get(reqUrl) if err != nil { t.Fatal(err) } eXml := []byte(fmt.Sprintf(` 1 %v `, maxDuration)) if body, err := io.ReadAll(rply.Body); err != nil { t.Error(err) } else if !reflect.DeepEqual(eXml, body) { t.Errorf("expecting: %s, received: %s", string(eXml), string(body)) } rply.Body.Close() time.Sleep(time.Millisecond) } func testHAitCDRmtcall(t *testing.T) { httpConst := "http" addr := haCfg.ListenCfg().HTTPListen if isTls { addr = haCfg.ListenCfg().HTTPTLSListen httpConst = "https" } reqUrl := fmt.Sprintf("%s://%s%s?request_type=MTCALL_CDR×tamp=2018-08-14%%2012:03:22&call_date=2018-0814%%2012:00:49&transactionid=10000&CDR_ID=123456&carrierid=1&mcc=0&mnc=0&imsi=434180000000000&msisdn=1001&destination=1002&leg=C&leg_duration=185&reseller_charge=11.1605&client_charge=0.0000&user_charge=22.0000&IOT=0&user_balance=10.00&cli=%%2B498702190000&polo=0.0100&ddi_map=N", httpConst, addr, haCfg.HTTPAgentCfg()[0].URL) rply, err := httpC.Get(reqUrl) if err != nil { t.Fatal(err) } eXml := []byte(` 123456 1 `) if body, err := io.ReadAll(rply.Body); err != nil { t.Error(err) } else if !reflect.DeepEqual(eXml, body) { t.Errorf("expecting: <%s>, received: <%s>", string(eXml), string(body)) } rply.Body.Close() time.Sleep(50 * time.Millisecond) var cdrs []*engine.ExternalCDR req := utils.RPCCDRsFilter{RunIDs: []string{utils.MetaDefault}} if err := haRPC.Call(utils.APIerSv2GetCDRs, &req, &cdrs); err != nil { t.Error("Unexpected error: ", err.Error()) } else if len(cdrs) != 1 { t.Error("Unexpected number of CDRs returned: ", len(cdrs)) } else { if cdrs[0].Usage != "3m5s" { // should be 1 but maxUsage returns rounded version t.Errorf("Unexpected CDR Usage received, cdr: %s ", utils.ToJSON(cdrs[0])) } if utils.Round(cdrs[0].Cost, 4, utils.MetaRoundingMiddle) != 0.2188 { // sql have only 4 digits after decimal point t.Errorf("Unexpected CDR Cost received, cdr: %+v ", cdrs[0].Cost) } if cdrs[0].OriginHost != "127.0.0.1" { t.Errorf("Unexpected CDR OriginHost received, cdr: %+v ", cdrs[0].OriginHost) } } } func testHAitCDRmtcall2(t *testing.T) { xmlBody := `2005-08-26T14:17:34Data528594447700086788510163Silliname0.14000.1400234447700086788China, Peoples Republic of - China Unicom (CU-GSM)4600013245581.33300.14001.33300.1400` httpConst := "http" addr := haCfg.ListenCfg().HTTPListen if isTls { addr = haCfg.ListenCfg().HTTPTLSListen httpConst = "https" } url := fmt.Sprintf("%s://%s%s", httpConst, addr, haCfg.HTTPAgentCfg()[1].URL) req, err := http.NewRequest("POST", url, bytes.NewBuffer([]byte(xmlBody))) if err != nil { t.Error(err) } req.Header.Add("Content-Type", "application/xml; charset=utf-8") resp, err := httpC.Do(req) if err != nil { t.Fatal(err) } resp.Body.Close() time.Sleep(50 * time.Millisecond) var cdrs []*engine.ExternalCDR fltr := utils.RPCCDRsFilter{RunIDs: []string{utils.MetaDefault}, Accounts: []string{"447700086788"}} if err := haRPC.Call(utils.APIerSv2GetCDRs, &fltr, &cdrs); err != nil { t.Error("Unexpected error: ", err.Error()) } else if len(cdrs) != 1 { t.Error("Unexpected number of CDRs returned: ", len(cdrs)) } else { if cdrs[0].Usage != "4558" { // should be 1 but maxUsage returns rounded version t.Errorf("Unexpected CDR Usage received, cdr: %s ", utils.ToJSON(cdrs[0])) } } } func testHAitTextPlain(t *testing.T) { httpConst := "http" addr := haCfg.ListenCfg().HTTPListen if isTls { addr = haCfg.ListenCfg().HTTPTLSListen httpConst = "https" } reqUrl := fmt.Sprintf("%s://%s%s?request_type=TextPlainDryRun&CallID=123456&Msisdn=497700056231&Imsi=2343000000000123&Destination=491239440004", httpConst, addr, haCfg.HTTPAgentCfg()[2].URL) rply, err := httpC.Get(reqUrl) if err != nil { t.Fatal(err) } response := []byte(`Variable1=Hola1 Variable2=Hola2 ComposedVar=TestComposed Item1.1=Val2 Item1.1=Val1 `) if body, err := io.ReadAll(rply.Body); err != nil { t.Error(err) } else if !reflect.DeepEqual(len(response), len(body)) { t.Errorf("expecting: \n<%s>\n, received: \n<%s>\n", string(response), string(body)) } rply.Body.Close() time.Sleep(time.Millisecond) } func testHAitStopEngine(t *testing.T) { if err := engine.KillEngine(*waitRater); err != nil { t.Error(err) } }