//go:build integration // +build integration /* Real-time Online/Offline Charging System (OCS) for Telecom & ISP environments Copyright (C) ITsysCOM GmbH This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see */ package general_tests // import ( // "path" // "testing" // "time" // "github.com/cgrates/cgrates/config" // "github.com/cgrates/cgrates/engine" // "github.com/cgrates/cgrates/sessions" // "github.com/cgrates/cgrates/utils" // "github.com/cgrates/rpcclient" // ) // var ( // tlsCfgPath string // tlsCfg *config.CGRConfig // tlsRpcClientJson *rpcclient.RPCClient // tlsRpcClientGob *rpcclient.RPCClient // tlsHTTPJson *rpcclient.RPCClient // tlsConfDIR string //run tests for specific configuration // tlsDelay int // sTestsTLS = []func(t *testing.T){ // testTLSLoadConfig, // testTLSInitDataDb, // testTLSStartEngine, // testTLSRpcConn, // testTLSPing, // testTLSStopEngine, // } // ) // // Test start here // func TestTLS(t *testing.T) { // tlsConfDIR = "tls" // for _, stest := range sTestsTLS { // t.Run(tlsConfDIR, stest) // } // } // func testTLSLoadConfig(t *testing.T) { // var err error // tlsCfgPath = path.Join(*dataDir, "conf", "samples", tlsConfDIR) // if *encoding == utils.MetaGOB { // tlsCfgPath = path.Join(*dataDir, "conf", "samples", tlsConfDIR+"_gob") // } // if tlsCfg, err = config.NewCGRConfigFromPath(tlsCfgPath); err != nil { // t.Error(err) // } // tlsDelay = 2000 // } // func testTLSInitDataDb(t *testing.T) { // if err := engine.InitDataDB(tlsCfg); err != nil { // t.Fatal(err) // } // } // func testTLSStartEngine(t *testing.T) { // if _, err := engine.StopStartEngine(tlsCfgPath, tlsDelay); err != nil { // t.Fatal(err) // } // } // func testTLSRpcConn(t *testing.T) { // var err error // tlsRpcClientJson, err = rpcclient.NewRPCClient(utils.TCP, "localhost:2022", true, tlsCfg.TLSCfg().ClientKey, // tlsCfg.TLSCfg().ClientCerificate, tlsCfg.TLSCfg().CaCertificate, 3, 3, // time.Second, 5*time.Minute, rpcclient.JSONrpc, nil, false, nil) // if err != nil { // t.Errorf("Error: %s when dialing", err) // } // tlsRpcClientGob, err = rpcclient.NewRPCClient(utils.TCP, "localhost:2023", true, tlsCfg.TLSCfg().ClientKey, // tlsCfg.TLSCfg().ClientCerificate, tlsCfg.TLSCfg().CaCertificate, 3, 3, // time.Second, 5*time.Minute, rpcclient.GOBrpc, nil, false, nil) // if err != nil { // t.Errorf("Error: %s when dialing", err) // } // tlsHTTPJson, err = rpcclient.NewRPCClient(utils.TCP, "https://localhost:2280/jsonrpc", true, tlsCfg.TLSCfg().ClientKey, // tlsCfg.TLSCfg().ClientCerificate, tlsCfg.TLSCfg().CaCertificate, 3, 3, // time.Second, 5*time.Minute, rpcclient.HTTPjson, nil, false, nil) // if err != nil { // t.Errorf("Error: %s when dialing", err) // } // } // func testTLSPing(t *testing.T) { // var reply string // if err := tlsRpcClientJson.Call(utils.ThresholdSv1Ping, new(utils.CGREvent), &reply); err != nil { // t.Error(err) // } else if reply != utils.Pong { // t.Errorf("Received: %s", reply) // } // if err := tlsRpcClientGob.Call(utils.ThresholdSv1Ping, new(utils.CGREvent), &reply); err != nil { // t.Error(err) // } else if reply != utils.Pong { // t.Errorf("Received: %s", reply) // } // if err := tlsHTTPJson.Call(utils.ThresholdSv1Ping, new(utils.CGREvent), &reply); err != nil { // t.Error(err) // } else if reply != utils.Pong { // t.Errorf("Received: %s", reply) // } // if err := tlsRpcClientJson.Call(utils.DispatcherSv1Ping, "", &reply); err == nil { // t.Error(err) // } // if err := tlsRpcClientGob.Call(utils.DispatcherSv1Ping, "", &reply); err == nil { // t.Error(err) // } // if err := tlsHTTPJson.Call(utils.DispatcherSv1Ping, "", &reply); err == nil { // t.Error(err) // } // initUsage := 5 * time.Minute // args := &sessions.V1InitSessionArgs{ // InitSession: true, // AllocateResources: true, // GetAttributes: true, // CGREvent: &utils.CGREvent{ // Tenant: "cgrates.org", // ID: "TestSSv1ItInitiateSession", // Event: map[string]interface{}{ // utils.Tenant: "cgrates.org", // utils.Category: "call", // utils.ToR: utils.MetaVoice, // utils.OriginID: "TestSSv1It1", // utils.RequestType: utils.MetaPrepaid, // utils.AccountField: "1001", // utils.Subject: "ANY2CNT", // utils.Destination: "1002", // utils.SetupTime: time.Date(2018, time.January, 7, 16, 60, 0, 0, time.UTC), // utils.AnswerTime: time.Date(2018, time.January, 7, 16, 60, 10, 0, time.UTC), // utils.Usage: initUsage, // }, // }, // } // var rply sessions.V1InitReplyWithDigest // if err := tlsHTTPJson.Call(utils.SessionSv1InitiateSessionWithDigest, // args, &rply); err == nil { // t.Error(err) // } // } // func testTLSStopEngine(t *testing.T) { // if err := engine.KillEngine(100); err != nil { // t.Error(err) // } // }