Files
cgrates/config/dns_test.go
2025-10-13 09:57:41 +02:00

587 lines
17 KiB
Go

/*
Real-time Online/Offline Charging System (OCS) for Telecom & ISP environments
Copyright (C) ITsysCOM GmbH
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU Affero General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU Affero General Public License for more details.
You should have received a copy of the GNU Affero General Public License
along with this program. If not, see <https://www.gnu.org/licenses/>
*/
package config
import (
"reflect"
"testing"
"github.com/cgrates/cgrates/utils"
)
func TestDNSAgentCfgloadFromJsonCfg(t *testing.T) {
jsnCfg := &DNSAgentJsonCfg{
Enabled: utils.BoolPointer(true),
Listeners: &[]*ListenerJsnCfg{
{
Address: utils.StringPointer("127.0.0.1:2053"),
Network: utils.StringPointer("udp"),
},
},
SessionSConns: &[]string{utils.MetaInternal, "*conn1"},
StatSConns: &[]string{utils.MetaInternal, "*conn1"},
ThresholdSConns: &[]string{utils.MetaInternal, "*conn1"},
Timezone: utils.StringPointer("UTC"),
RequestProcessors: &[]*ReqProcessorJsnCfg{
{
ID: utils.StringPointer("OutboundAUTHDryRun"),
Filters: &[]string{"*string:~*req.request_type:OutboundAUTH", "*string:~*req.Msisdn:497700056231"},
Flags: &[]string{"*dryRun"},
Timezone: utils.StringPointer("UTC"),
Request_fields: &[]*FcTemplateJsonCfg{},
Reply_fields: &[]*FcTemplateJsonCfg{
{Tag: utils.StringPointer("Allow"), Path: utils.StringPointer("*rep.response.Allow"), Type: utils.StringPointer("constant"),
Mandatory: utils.BoolPointer(true), Layout: utils.StringPointer(utils.EmptyString)},
},
},
},
}
expected := &DNSAgentCfg{
Enabled: true,
Listeners: []DNSListener{
{
Address: "127.0.0.1:2053",
Network: "udp",
},
},
SessionSConns: []string{utils.ConcatenatedKey(utils.MetaInternal, utils.MetaSessionS), "*conn1"},
StatSConns: []string{utils.ConcatenatedKey(utils.MetaInternal, utils.MetaStats), "*conn1"},
ThresholdSConns: []string{utils.ConcatenatedKey(utils.MetaInternal, utils.MetaThresholds), "*conn1"},
Timezone: "UTC",
RequestProcessors: []*RequestProcessor{
{
ID: "OutboundAUTHDryRun",
Filters: []string{"*string:~*req.request_type:OutboundAUTH", "*string:~*req.Msisdn:497700056231"},
Flags: utils.FlagsWithParamsFromSlice([]string{utils.MetaDryRun}),
Timezone: "UTC",
RequestFields: []*FCTemplate{},
ReplyFields: []*FCTemplate{
{Tag: "Allow", Path: "*rep.response.Allow", Type: "constant", Mandatory: true, Layout: utils.EmptyString},
},
},
},
}
for _, v := range expected.RequestProcessors[0].ReplyFields {
v.ComputePath()
}
jsonCfg := NewDefaultCGRConfig()
if err := jsonCfg.dnsAgentCfg.loadFromJSONCfg(jsnCfg); err != nil {
t.Error(err)
} else if !reflect.DeepEqual(jsonCfg.dnsAgentCfg, expected) {
t.Errorf("Expected %+v \n, received %+v", utils.ToJSON(expected), utils.ToJSON(jsonCfg.dnsAgentCfg))
}
jsnCfg = nil
if err := jsonCfg.dnsAgentCfg.loadFromJSONCfg(jsnCfg); err != nil {
t.Error(err)
}
}
func TestRequestProcessorloadFromJsonCfg(t *testing.T) {
var dareq, expected RequestProcessor
if err := dareq.loadFromJSONCfg(nil); err != nil {
t.Error(err)
} else if !reflect.DeepEqual(dareq, expected) {
t.Errorf("Expected: %+v ,received: %+v", expected, dareq)
}
if err := dareq.loadFromJSONCfg(new(ReqProcessorJsnCfg)); err != nil {
t.Error(err)
} else if !reflect.DeepEqual(dareq, expected) {
t.Errorf("Expected: %+v ,received: %+v", expected, dareq)
}
json := &ReqProcessorJsnCfg{
ID: utils.StringPointer("cgrates"),
Tenant: utils.StringPointer("tenant"),
Filters: &[]string{"filter1", "filter2"},
Flags: &[]string{"flag1", "flag2"},
}
expected = RequestProcessor{
ID: "cgrates",
Tenant: utils.NewRSRParsersMustCompile("tenant", utils.InfieldSep),
Filters: []string{"filter1", "filter2"},
Flags: utils.FlagsWithParams{"flag1": {}, "flag2": {}},
}
if err := dareq.loadFromJSONCfg(json); err != nil {
t.Error(err)
} else if !reflect.DeepEqual(expected, dareq) {
t.Errorf("Expected: %+v , received: %+v", utils.ToJSON(expected), utils.ToJSON(dareq))
}
}
func TestRequestProcessorDNSAgentloadFromJsonCfg(t *testing.T) {
cfgJSON := &DNSAgentJsonCfg{
RequestProcessors: &[]*ReqProcessorJsnCfg{
{
Tenant: utils.StringPointer("a{*"),
},
},
}
expected := "invalid converter terminator in rule: <a{*>"
jsonCfg := NewDefaultCGRConfig()
if err := jsonCfg.dnsAgentCfg.loadFromJSONCfg(cfgJSON); err == nil || err.Error() != expected {
t.Errorf("Expected %+v, received %+v", expected, err)
}
}
func TestRequestProcessorDNSAgentloadFromJsonCfg1(t *testing.T) {
cfgJSONStr := `{
"dns_agent": {
"request_processors": [
{
"id": "random",
},
]
}
}`
cfgJSON := &DNSAgentJsonCfg{
RequestProcessors: &[]*ReqProcessorJsnCfg{
{
ID: utils.StringPointer("random"),
},
},
}
if jsonCfg, err := NewCGRConfigFromJSONStringWithDefaults(cfgJSONStr); err != nil {
t.Error(err)
} else if err := jsonCfg.dnsAgentCfg.loadFromJSONCfg(cfgJSON); err != nil {
t.Error(err)
}
}
func TestRequestProcessorReplyFieldsloadFromJsonCfg(t *testing.T) {
cfgJSON := &DNSAgentJsonCfg{
RequestProcessors: &[]*ReqProcessorJsnCfg{
{
Reply_fields: &[]*FcTemplateJsonCfg{
{
Value: utils.StringPointer("a{*"),
},
},
},
},
}
expected := "invalid converter terminator in rule: <a{*>"
jsonCfg := NewDefaultCGRConfig()
if err := jsonCfg.dnsAgentCfg.loadFromJSONCfg(cfgJSON); err == nil || err.Error() != expected {
t.Errorf("Expected %+v, received %+v", expected, err)
}
}
func TestRequestProcessorRequestFieldsloadFromJsonCfg(t *testing.T) {
cfgJSON := &DNSAgentJsonCfg{
RequestProcessors: &[]*ReqProcessorJsnCfg{
{
Request_fields: &[]*FcTemplateJsonCfg{
{
Value: utils.StringPointer("a{*"),
},
},
},
},
}
expected := "invalid converter terminator in rule: <a{*>"
jsonCfg := NewDefaultCGRConfig()
if err := jsonCfg.dnsAgentCfg.loadFromJSONCfg(cfgJSON); err == nil || err.Error() != expected {
t.Errorf("Expected %+v, received %+v", expected, err)
}
}
func TestDNSAgentCfgAsMapInterface(t *testing.T) {
cfgJSONStr := `{
"dns_agent": {
"enabled": false,
"listeners":[
{
"address": "127.0.0.1:2053",
"network": "udp"
}
],
"sessions_conns": ["*internal"],
"stats_conns": ["*internal"],
"thresholds_conns": ["*internal"],
"timezone": "",
"request_processors": [],
},
}`
eMap := map[string]any{
utils.EnabledCfg: false,
utils.ListenersCfg: []map[string]any{{
utils.AddressCfg: "127.0.0.1:2053",
utils.NetworkCfg: "udp",
}},
utils.SessionSConnsCfg: []string{"*internal"},
utils.StatSConnsCfg: []string{"*internal"},
utils.ThresholdSConnsCfg: []string{"*internal"},
utils.TimezoneCfg: "",
utils.RequestProcessorsCfg: []map[string]any{},
}
if cgrCfg, err := NewCGRConfigFromJSONStringWithDefaults(cfgJSONStr); err != nil {
t.Error(err)
} else if rcv := cgrCfg.dnsAgentCfg.AsMapInterface(); !reflect.DeepEqual(eMap, rcv) {
t.Errorf("Expected %+v, received %+v", eMap, rcv)
}
}
func TestDNSAgentCfgAsMapInterface1(t *testing.T) {
cfgJSONStr := `{
"dns_agent": {
"enabled": false,
"listeners":[
{
"address": "127.0.0.1:2053",
"network": "udp"
}
],
"sessions_conns": ["*internal:*sessions", "*conn1"],
"stats_conns": ["*internal:*stats", "*conn1"],
"thresholds_conns": ["*internal:*thresholds", "*conn1"],
"timezone": "UTC",
"request_processors": [
{
"id": "OutboundAUTHDryRun",
"filters": ["*string:~*req.request_type:OutboundAUTH","*string:~*req.Msisdn:497700056231"],
"tenant": "cgrates.org",
"flags": ["*dryRun"],
"timezone": "UTC",
"request_fields":[],
"reply_fields":[
{"tag": "Allow", "path": "*rep.response.Allow", "type": "*constant",
"value": "1", "mandatory": true},
{"tag": "Concatenated1", "path": "*rep.response.Concatenated", "type": "*composed",
"value": "~*req.MCC;/", "mandatory": true},
{"tag": "Concatenated2", "path": "*rep.response.Concatenated", "type": "*composed",
"value": "Val1"},
{"tag": "MaxDuration", "path": "*rep.response.MaxDuration", "type": "*constant",
"value": "1200", "blocker": true},
{"tag": "Unused", "path": "*rep.response.Unused", "type": "*constant",
"value": "0"},
],
},
],
},
}`
eMap := map[string]any{
utils.EnabledCfg: false,
utils.ListenersCfg: []map[string]any{
{
utils.AddressCfg: "127.0.0.1:2053",
utils.NetworkCfg: "udp",
},
},
utils.SessionSConnsCfg: []string{utils.MetaInternal, "*conn1"},
utils.StatSConnsCfg: []string{utils.MetaInternal, "*conn1"},
utils.ThresholdSConnsCfg: []string{utils.MetaInternal, "*conn1"},
utils.TimezoneCfg: "UTC",
utils.RequestProcessorsCfg: []map[string]any{
{
utils.IDCfg: "OutboundAUTHDryRun",
utils.FiltersCfg: []string{"*string:~*req.request_type:OutboundAUTH", "*string:~*req.Msisdn:497700056231"},
utils.TenantCfg: "cgrates.org",
utils.FlagsCfg: []string{"*dryRun"},
utils.TimezoneCfg: "UTC",
utils.RequestFieldsCfg: []map[string]any{},
utils.ReplyFieldsCfg: []map[string]any{
{utils.TagCfg: "Allow", utils.PathCfg: "*rep.response.Allow", utils.TypeCfg: "*constant", utils.ValueCfg: "1", utils.MandatoryCfg: true},
{utils.TagCfg: "Concatenated1", utils.PathCfg: "*rep.response.Concatenated", utils.TypeCfg: "*composed", utils.ValueCfg: "~*req.MCC;/", utils.MandatoryCfg: true},
{utils.TagCfg: "Concatenated2", utils.PathCfg: "*rep.response.Concatenated", utils.TypeCfg: "*composed", utils.ValueCfg: "Val1"},
{utils.TagCfg: "MaxDuration", utils.PathCfg: "*rep.response.MaxDuration", utils.TypeCfg: "*constant", utils.ValueCfg: "1200", utils.BlockerCfg: true},
{utils.TagCfg: "Unused", utils.PathCfg: "*rep.response.Unused", utils.TypeCfg: "*constant", utils.ValueCfg: "0"},
},
},
},
}
if cgrCfg, err := NewCGRConfigFromJSONStringWithDefaults(cfgJSONStr); err != nil {
t.Error(err)
} else if rcv := cgrCfg.dnsAgentCfg.AsMapInterface(); !reflect.DeepEqual(eMap, rcv) {
t.Errorf("Expected %+v \n, received %+v", utils.ToIJSON(eMap), utils.ToIJSON(rcv))
}
}
func TestRequestProcessorClone(t *testing.T) {
rp := &RequestProcessor{
ID: "cgrates",
Tenant: utils.NewRSRParsersMustCompile("cgrates.org", utils.InfieldSep),
Filters: []string{"*string:~req.Account:1001"},
Flags: utils.FlagsWithParams{utils.MetaAttributes: {}},
Timezone: "UTC",
ReplyFields: []*FCTemplate{{}},
RequestFields: []*FCTemplate{{}},
}
rcv := rp.Clone()
if !reflect.DeepEqual(rp, rcv) {
t.Errorf("Expected: %+v\nReceived: %+v", utils.ToJSON(rp), utils.ToJSON(rcv))
}
rcv.Filters[0] = "*string:~req.Account:1002"
if rp.Filters[0] != "*string:~req.Account:1001" {
t.Errorf("Expected clone to not modify the cloned")
}
rcv.ReplyFields[0].Tag = "new"
if rp.ReplyFields[0].Tag != "" {
t.Errorf("Expected clone to not modify the cloned")
}
}
func TestDNSAgentCfgClone(t *testing.T) {
ban := &DNSAgentCfg{
Enabled: true,
Listeners: []DNSListener{
{
Address: "127.0.0.1:2053",
Network: "udp",
},
},
SessionSConns: []string{utils.ConcatenatedKey(utils.MetaInternal, utils.MetaSessionS), "*conn1"},
StatSConns: []string{utils.ConcatenatedKey(utils.MetaInternal, utils.MetaStats), "*conn1"},
ThresholdSConns: []string{utils.ConcatenatedKey(utils.MetaInternal, utils.MetaThresholds), "*conn1"},
Timezone: "UTC",
RequestProcessors: []*RequestProcessor{
{
ID: "OutboundAUTHDryRun",
Filters: []string{"*string:~*req.request_type:OutboundAUTH", "*string:~*req.Msisdn:497700056231"},
Flags: utils.FlagsWithParamsFromSlice([]string{utils.MetaDryRun}),
Timezone: "UTC",
RequestFields: []*FCTemplate{},
ReplyFields: []*FCTemplate{
{Tag: "Allow", Path: "*rep.response.Allow", Type: "constant", Mandatory: true, Layout: utils.EmptyString},
},
},
},
}
rcv := ban.Clone()
if !reflect.DeepEqual(ban, rcv) {
t.Errorf("Expected: %+v\nReceived: %+v", utils.ToJSON(ban), utils.ToJSON(rcv))
}
if rcv.SessionSConns[1] = ""; ban.SessionSConns[1] != "*conn1" {
t.Errorf("Expected clone to not modify the cloned")
}
if rcv.StatSConns[1] = ""; ban.StatSConns[1] != "*conn1" {
t.Errorf("Expected clone to not modify the cloned")
}
if rcv.ThresholdSConns[1] = ""; ban.ThresholdSConns[1] != "*conn1" {
t.Errorf("Expected clone to not modify the cloned")
}
if rcv.RequestProcessors[0].ID = ""; ban.RequestProcessors[0].ID != "OutboundAUTHDryRun" {
t.Errorf("Expected clone to not modify the cloned")
}
}
func TestDiffDNSAgentJsonCfg(t *testing.T) {
var d *DNSAgentJsonCfg
v1 := &DNSAgentCfg{
Enabled: false,
Listeners: []DNSListener{
{
Address: "localhost:8080",
Network: "tcp",
},
},
SessionSConns: []string{"*localhost"},
StatSConns: []string{"*localhost"},
ThresholdSConns: []string{"*localhost"},
Timezone: "UTC",
RequestProcessors: []*RequestProcessor{},
}
v2 := &DNSAgentCfg{
Enabled: true,
Listeners: []DNSListener{
{
Address: "localhost:8037",
Network: "udp",
},
},
SessionSConns: []string{"*internal"},
StatSConns: []string{"*internal"},
ThresholdSConns: []string{"*internal"},
Timezone: "EEST",
RequestProcessors: []*RequestProcessor{
{
ID: "id",
},
},
}
expected := &DNSAgentJsonCfg{
Enabled: utils.BoolPointer(true),
Listeners: &[]*ListenerJsnCfg{
{
Address: utils.StringPointer("localhost:8037"),
Network: utils.StringPointer("udp"),
},
},
SessionSConns: &[]string{"*internal"},
StatSConns: &[]string{"*internal"},
ThresholdSConns: &[]string{"*internal"},
Timezone: utils.StringPointer("EEST"),
RequestProcessors: &[]*ReqProcessorJsnCfg{
{
ID: utils.StringPointer("id"),
},
},
}
rcv := diffDNSAgentJsonCfg(d, v1, v2)
if !reflect.DeepEqual(rcv, expected) {
t.Errorf("Expected %v \n but received \n %v", utils.ToJSON(expected), utils.ToJSON(rcv))
}
v2_2 := v1
expected2 := &DNSAgentJsonCfg{
Listeners: &[]*ListenerJsnCfg{},
RequestProcessors: &[]*ReqProcessorJsnCfg{},
}
rcv = diffDNSAgentJsonCfg(d, v1, v2_2)
if !reflect.DeepEqual(rcv, expected2) {
t.Errorf("Expected %v \n but received \n %v", expected2, rcv)
}
}
func TestDiffDNSAgentJsonCfgExtraV1(t *testing.T) {
var d *DNSAgentJsonCfg
v1 := &DNSAgentCfg{
Enabled: false,
Listeners: []DNSListener{
{
Address: "localhost:8080",
Network: "tcp",
},
{
Address: "localhost:2054",
Network: "udp",
},
},
}
v2 := &DNSAgentCfg{
Enabled: true,
Listeners: []DNSListener{
{
Address: "localhost:8037",
Network: "udp",
},
},
}
expected := &DNSAgentJsonCfg{
Enabled: utils.BoolPointer(true),
Listeners: &[]*ListenerJsnCfg{
{
Address: utils.StringPointer("localhost:8037"),
Network: utils.StringPointer("udp"),
},
{
Address: utils.StringPointer("localhost:2054"),
Network: utils.StringPointer("udp"),
},
},
RequestProcessors: &[]*ReqProcessorJsnCfg{},
}
rcv := diffDNSAgentJsonCfg(d, v1, v2)
if !reflect.DeepEqual(rcv, expected) {
t.Errorf("Expected %v \n but received \n %v", utils.ToJSON(expected), utils.ToJSON(rcv))
}
}
func TestDiffDNSAgentJsonCfgExtraV2(t *testing.T) {
var d *DNSAgentJsonCfg
v1 := &DNSAgentCfg{
Enabled: false,
Listeners: []DNSListener{
{
Address: "localhost:8080",
Network: "tcp",
},
},
}
v2 := &DNSAgentCfg{
Enabled: true,
Listeners: []DNSListener{
{
Address: "localhost:8037",
Network: "udp",
},
{
Address: "localhost:2054",
Network: "udp",
},
},
}
expected := &DNSAgentJsonCfg{
Enabled: utils.BoolPointer(true),
Listeners: &[]*ListenerJsnCfg{
{
Address: utils.StringPointer("localhost:8037"),
Network: utils.StringPointer("udp"),
},
{
Address: utils.StringPointer("localhost:2054"),
Network: utils.StringPointer("udp"),
},
},
RequestProcessors: &[]*ReqProcessorJsnCfg{},
}
rcv := diffDNSAgentJsonCfg(d, v1, v2)
if !reflect.DeepEqual(rcv, expected) {
t.Errorf("Expected %v \n but received \n %v", utils.ToJSON(expected), utils.ToJSON(rcv))
}
}
func TestDnsAgentCloneSection(t *testing.T) {
dnsCfg := &DNSAgentCfg{
Enabled: false,
Listeners: []DNSListener{
{
Address: "localhost:8080",
Network: "tcp",
},
},
SessionSConns: []string{"*localhost"},
StatSConns: []string{"*localhost"},
ThresholdSConns: []string{"*localhost"},
Timezone: "UTC",
RequestProcessors: []*RequestProcessor{},
}
exp := &DNSAgentCfg{
Enabled: false,
Listeners: []DNSListener{
{
Address: "localhost:8080",
Network: "tcp",
},
},
SessionSConns: []string{"*localhost"},
StatSConns: []string{"*localhost"},
ThresholdSConns: []string{"*localhost"},
Timezone: "UTC",
RequestProcessors: []*RequestProcessor{},
}
rcv := dnsCfg.CloneSection()
if !reflect.DeepEqual(rcv, exp) {
t.Errorf("Expected %v \n but received \n %v", utils.ToJSON(exp), utils.ToJSON(rcv))
}
}