Files
cgrates/apier/v1/resourcesv1_it_test.go
2025-10-29 19:42:40 +01:00

1369 lines
42 KiB
Go

//go:build integration
// +build integration
/*
Real-time Online/Offline Charging System (OCS) for Telecom & ISP environments
Copyright (C) ITsysCOM GmbH
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU Affero General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU Affero General Public License for more details.
You should have received a copy of the GNU Affero General Public License
along with this program. If not, see <https://www.gnu.org/licenses/>
*/
package v1
import (
"os"
"path"
"reflect"
"sort"
"testing"
"time"
"github.com/cgrates/birpc"
"github.com/cgrates/birpc/context"
"github.com/cgrates/cgrates/config"
"github.com/cgrates/cgrates/engine"
"github.com/cgrates/cgrates/utils"
)
var (
rlsV1CfgPath string
rlsV1Cfg *config.CGRConfig
rlsV1Rpc *birpc.Client
rlsV1ConfDIR string //run tests for specific configuration
rlsConfig *engine.ResourceProfileWithAPIOpts
sTestsRLSV1 = []func(t *testing.T){
testV1RsLoadConfig,
testV1RsInitDataDb,
testV1RsResetStorDb,
testV1RsStartEngine,
testV1RsRpcConn,
testV1ResourceStartCPUProfiling,
testV1RsCacheResourceBeforeLoad,
testV1RsFromFolder,
testV1RsCacheResourceAfterLoad,
testV1RsCacheResourceWithConfig,
testV1RsGetResourcesForEvent,
testV1RsTTL0,
testV1RsAllocateResource,
testV1RsAuthorizeResources,
testV1RsReleaseResource,
testV1ResourceStopCPUProfiling,
testV1RsDBStore,
testV1RsGetResourceProfileBeforeSet,
testV1RsSetResourceProfile,
testV1RsGetResourceProfileIDs,
testV1RsGetResourceProfileAfterSet,
testV1RsUpdateResourceProfile,
testV1RsGetResourceProfileAfterUpdate,
testV1RsRemResourceProfile,
testV1RsGetResourceProfileAfterDelete,
testV1RsResourcePing,
testV1RsMatchNotFound,
testV1RsAllocateUnlimited,
testV1RsGetResourceProfileWithoutTenant,
testV1RsRemResourceProfileWithoutTenant,
testV1RsSetResourceProfileWithOpts,
testV1RsAuthorizeResourcesWithOpts,
testV1RsStopEngine,
testV1RsStartEngine,
testV1RsRpcConn,
testV1RsCheckAuthorizeResourcesAfterRestart,
testV1RsStopEngine,
//cache test
testV1RsLoadConfig,
testV1RsInitDataDb,
testV1RsResetStorDb,
testV1RsStartEngine,
testV1RsRpcConn,
testResourceSCacheTestGetNotFound,
testResourceSCacheTestSet,
testResourceSCacheTestGetNotFound,
testResourceSCacheReload,
testResourceSCacheTestGetFound,
testV1RsStopEngine,
//allocate/release test
testV1RsLoadConfig,
testV1RsInitDataDb,
testV1RsResetStorDb,
testV1RsStartEngine,
testV1RsRpcConn,
testResourceSSetThresholdProfile,
testResourceSSetResourceProfile,
testResourceSCheckThresholdAfterResourceAllocate,
testResourceSCheckThresholdAfterResourceRelease,
testV1RsStopEngine,
}
)
// Test start here
func TestRsV1IT(t *testing.T) {
switch *utils.DBType {
case utils.MetaInternal:
rlsV1ConfDIR = "tutinternal_offline"
defer func() {
if err := os.RemoveAll("/tmp/internal_db"); err != nil {
t.Error(err)
}
}()
case utils.MetaMySQL:
rlsV1ConfDIR = "tutmysql"
case utils.MetaMongo:
rlsV1ConfDIR = "tutmongo"
case utils.MetaPostgres:
t.SkipNow()
default:
t.Fatal("Unknown Database type")
}
for _, stest := range sTestsRLSV1 {
t.Run(rlsV1ConfDIR, stest)
}
}
func testV1RsLoadConfig(t *testing.T) {
var err error
rlsV1CfgPath = path.Join(*utils.DataDir, "conf", "samples", rlsV1ConfDIR)
if rlsV1Cfg, err = config.NewCGRConfigFromPath(rlsV1CfgPath); err != nil {
t.Error(err)
}
if *utils.DBType == utils.MetaInternal {
if err := os.MkdirAll(rlsV1Cfg.DataDbCfg().Opts.InternalDBDumpPath, 0755); err != nil {
t.Fatal(err)
}
if err := os.MkdirAll(rlsV1Cfg.StorDbCfg().Opts.InternalDBDumpPath, 0755); err != nil {
t.Fatal(err)
}
}
}
func testV1RsInitDataDb(t *testing.T) {
if err := engine.InitDataDB(rlsV1Cfg); err != nil {
t.Fatal(err)
}
}
// Wipe out the cdr database
func testV1RsResetStorDb(t *testing.T) {
if err := engine.InitStorDb(rlsV1Cfg); err != nil {
t.Fatal(err)
}
}
func testV1RsStartEngine(t *testing.T) {
if _, err := engine.StopStartEngine(rlsV1CfgPath, *utils.WaitRater); err != nil {
t.Fatal(err)
}
}
func testV1RsRpcConn(t *testing.T) {
var err error
rlsV1Rpc, err = newRPCClient(rlsV1Cfg.ListenCfg()) // We connect over JSON so we can also troubleshoot if needed
if err != nil {
t.Fatal("Could not connect to rater: ", err.Error())
}
}
func testV1ResourceStartCPUProfiling(t *testing.T) {
argPath := &utils.DirectoryArgs{
DirPath: "/tmp",
}
var reply string
if err := rlsV1Rpc.Call(context.Background(), utils.CoreSv1StartCPUProfiling,
argPath, &reply); err != nil {
t.Error(err)
}
}
func testV1RsCacheResourceBeforeLoad(t *testing.T) { // cache it with not found
var rplyRes *engine.Resource
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1GetResource, &utils.TenantIDWithAPIOpts{
TenantID: &utils.TenantID{Tenant: "cgrates.org", ID: "ResGroup1"},
}, &rplyRes); err == nil || err.Error() != utils.ErrNotFound.Error() {
t.Error(err)
}
}
func testV1RsCacheResourceAfterLoad(t *testing.T) { // the APIerSv1LoadTariffPlanFromFolder should also reload the cache for resources
var rplyRes *engine.Resource
expRes := &engine.Resource{
Tenant: "cgrates.org",
ID: "ResGroup1",
Usages: map[string]*engine.ResourceUsage{},
}
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1GetResource, &utils.TenantIDWithAPIOpts{
TenantID: &utils.TenantID{Tenant: "cgrates.org", ID: "ResGroup1"},
}, &rplyRes); err != nil {
t.Error(err)
} else if !reflect.DeepEqual(expRes, rplyRes) {
t.Errorf("Expecting: %+v, received: %+v", utils.ToJSON(expRes), utils.ToJSON(rplyRes))
}
}
func testV1RsCacheResourceWithConfig(t *testing.T) {
var rplyRes *engine.ResourceWithConfig
expRes := &engine.ResourceWithConfig{
Resource: &engine.Resource{
Tenant: "cgrates.org",
ID: "ResGroup1",
Usages: map[string]*engine.ResourceUsage{},
TTLIdx: nil,
},
Config: &engine.ResourceProfile{
Tenant: "cgrates.org",
ID: "ResGroup1",
FilterIDs: []string{"FLTR_1"},
ActivationInterval: &utils.ActivationInterval{
ActivationTime: time.Date(2014, 07, 29, 15, 0, 0, 0, time.UTC),
ExpiryTime: time.Date(0001, 01, 01, 0, 0, 0, 0, time.UTC),
},
UsageTTL: 1000000000,
Limit: 7,
AllocationMessage: "",
Blocker: false,
Stored: false,
Weight: 20,
ThresholdIDs: []string{"*none"},
},
}
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1GetResourceWithConfig, &utils.TenantIDWithAPIOpts{
TenantID: &utils.TenantID{Tenant: "cgrates.org", ID: "ResGroup1"},
}, &rplyRes); err != nil {
t.Error(err)
} else if !reflect.DeepEqual(expRes, rplyRes) {
t.Errorf("Expecting: %+v, received: %+v", utils.ToJSON(expRes), utils.ToJSON(rplyRes))
}
}
func testV1RsFromFolder(t *testing.T) {
var reply string
attrs := &utils.AttrLoadTpFromFolder{FolderPath: path.Join(*utils.DataDir, "tariffplans", "oldtutorial")}
if err := rlsV1Rpc.Call(context.Background(), utils.APIerSv1LoadTariffPlanFromFolder, attrs, &reply); err != nil {
t.Error(err)
}
time.Sleep(100 * time.Millisecond)
}
func testV1RsGetResourcesForEvent(t *testing.T) {
var reply *engine.Resources
args := &utils.CGREvent{
Tenant: "cgrates.org",
ID: "Event1",
Event: map[string]any{"Unknown": "unknown"},
APIOpts: map[string]any{
utils.OptsResourcesUsageID: "RandomUsageID",
},
}
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1GetResourcesForEvent, args, &reply); err == nil || err.Error() != utils.ErrNotFound.Error() {
t.Error(err)
}
args.Event = map[string]any{"Destination": "10", "Account": "1001"}
args.ID = utils.UUIDSha1Prefix()
args.APIOpts[utils.OptsResourcesUsageID] = "RandomUsageID2"
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1GetResourcesForEvent, args, &reply); err != nil {
t.Error(err)
}
if reply == nil {
t.Errorf("Expecting reply to not be nil")
// reply shoud not be nil so exit function
// to avoid nil segmentation fault;
// if this happens try to run this test manualy
return
}
if len(*reply) != 1 {
t.Fatalf("Expecting: %+v, received: %+v", 1, len(*reply))
}
if (*reply)[0].ID != "ResGroup2" {
t.Errorf("Expecting: %+v, received: %+v", "ResGroup2", (*reply)[0].ID)
}
args.Event = map[string]any{"Destination": "20"}
args.ID = utils.UUIDSha1Prefix()
args.APIOpts[utils.OptsResourcesUsageID] = "RandomUsageID3"
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1GetResourcesForEvent, args, &reply); err == nil || err.Error() != utils.ErrNotFound.Error() {
t.Error(err)
}
args.Event = map[string]any{"Account": "1002", "Subject": "test", "Destination": "1002"}
args.ID = utils.UUIDSha1Prefix()
args.APIOpts[utils.OptsResourcesUsageID] = "RandomUsageID5"
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1GetResourcesForEvent, args, &reply); err != nil {
t.Error(err)
}
if len(*reply) != 1 {
t.Errorf("Expecting: %+v, received: %+v", 2, len(*reply))
}
args.Event = map[string]any{"Account": "1002", "Subject": "test", "Destination": "1001"}
args.ID = utils.UUIDSha1Prefix()
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1GetResourcesForEvent, args, &reply); err != nil {
t.Error(err)
}
if len(*reply) != 1 {
t.Errorf("Expecting: %+v, received: %+v", 1, len(*reply))
}
if (*reply)[0].ID != "ResGroup2" {
t.Errorf("Expecting: %+v, received: %+v", "ResGroup2", (*reply)[0].ID)
}
args.Tenant = utils.EmptyString
args.ID = utils.UUIDSha1Prefix()
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1GetResourcesForEvent, args, &reply); err != nil {
t.Error(err)
}
if len(*reply) != 1 {
t.Errorf("Expecting: %+v, received: %+v", 1, len(*reply))
}
if (*reply)[0].ID != "ResGroup2" {
t.Errorf("Expecting: %+v, received: %+v", "ResGroup2", (*reply)[0].ID)
}
}
func testV1RsTTL0(t *testing.T) {
// only matching Resource3
ev := &utils.CGREvent{
Tenant: "cgrates.org",
ID: utils.UUIDSha1Prefix(),
Event: map[string]any{
"Account": "3001",
"Destination": "3002",
},
APIOpts: map[string]any{
utils.OptsResourcesUsageID: "651a8db2-4f67-4cf8-b622-169e8a482e21",
utils.OptsResourcesUnits: 1,
},
}
var reply string
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1AllocateResources,
ev, &reply); err != nil {
t.Error(err)
}
// overwrite the first allocation
ev = &utils.CGREvent{
Tenant: "cgrates.org",
ID: utils.UUIDSha1Prefix(),
Event: map[string]any{
"Account": "3001",
"Destination": "3002",
},
APIOpts: map[string]any{
utils.OptsResourcesUsageID: "651a8db2-4f67-4cf8-b622-169e8a482e21",
utils.OptsResourcesUnits: 2,
},
}
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1AllocateResources, ev, &reply); err != nil {
t.Error(err)
}
// too many units should be rejected
ev = &utils.CGREvent{
Tenant: "cgrates.org",
ID: utils.UUIDSha1Prefix(),
Event: map[string]any{
"Account": "3001",
"Destination": "3002",
},
APIOpts: map[string]any{
utils.OptsResourcesUsageID: "651a8db2-4f67-4cf8-b622-169e8a482e22",
utils.OptsResourcesUnits: 4,
},
}
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1AllocateResources, ev, &reply); err == nil ||
err.Error() != utils.ErrResourceUnavailable.Error() {
t.Error(err)
}
// check the record
var rs *engine.Resources
args := &utils.CGREvent{
Tenant: "cgrates.org",
ID: utils.UUIDSha1Prefix(),
Event: map[string]any{
"Account": "3001",
"Destination": "3002",
},
APIOpts: map[string]any{
utils.OptsResourcesUsageID: "651a8db2-4f67-4cf8-b622-169e8a482e21",
},
}
expiryTime, err := utils.ParseTimeDetectLayout("0001-01-01T00:00:00Z", "")
if err != nil {
t.Error(err)
}
expectedResources := &engine.Resource{
Tenant: "cgrates.org",
ID: "ResGroup3",
Usages: map[string]*engine.ResourceUsage{
"651a8db2-4f67-4cf8-b622-169e8a482e21": {
Tenant: "cgrates.org",
ID: "651a8db2-4f67-4cf8-b622-169e8a482e21",
ExpiryTime: expiryTime,
Units: 2,
},
},
}
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1GetResourcesForEvent,
args, &rs); err != nil {
t.Error(err)
} else if len(*rs) != 1 {
t.Errorf("Resources: %+v", rs)
} else {
res := *rs
if !reflect.DeepEqual(expectedResources.Tenant, res[0].Tenant) {
t.Errorf("Expecting: %+v, received: %+v", expectedResources.Tenant, res[0].Tenant)
} else if !reflect.DeepEqual(expectedResources.ID, res[0].ID) {
t.Errorf("Expecting: %+v, received: %+v", expectedResources.ID, res[0].ID)
} else if !reflect.DeepEqual(expectedResources.Usages, res[0].Usages) {
t.Errorf("Expecting: %+v, received: %+v", expectedResources.Usages, res[0].Usages)
}
}
// release should not give out errors
var releaseReply string
ev = &utils.CGREvent{
Tenant: "cgrates.org",
ID: utils.UUIDSha1Prefix(),
Event: map[string]any{
"Account": "3001",
"Destination": "3002",
},
APIOpts: map[string]any{
utils.OptsResourcesUsageID: "651a8db2-4f67-4cf8-b622-169e8a482e25", // same ID should be accepted by first group since the previous resource should be expired
},
}
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1ReleaseResources,
ev, &releaseReply); err != nil {
t.Error(err)
}
ev.Tenant = utils.EmptyString
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1ReleaseResources,
ev, &releaseReply); err != nil {
t.Error(err)
}
}
func testV1RsAllocateResource(t *testing.T) {
// first event matching Resource1
var reply string
ev := &utils.CGREvent{
Tenant: "cgrates.org",
ID: utils.UUIDSha1Prefix(),
Event: map[string]any{
"Account": "1002",
"Subject": "1001",
"Destination": "1002",
},
APIOpts: map[string]any{
utils.OptsResourcesUsageID: "651a8db2-4f67-4cf8-b622-169e8a482e51",
utils.OptsResourcesUnits: 3,
},
}
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1AllocateResources,
ev, &reply); err != nil {
t.Error(err)
}
eAllocationMsg := "ResGroup1"
if reply != eAllocationMsg {
t.Errorf("Expecting: %+v, received: %+v", eAllocationMsg, reply)
}
// Second event to test matching of exact limit of first resource
ev = &utils.CGREvent{
Tenant: "cgrates.org",
ID: utils.UUIDSha1Prefix(),
Event: map[string]any{
"Account": "1002",
"Subject": "1001",
"Destination": "1002",
},
APIOpts: map[string]any{
utils.OptsResourcesUsageID: "651a8db2-4f67-4cf8-b622-169e8a482e52",
utils.OptsResourcesUnits: 4,
},
}
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1AllocateResources,
ev, &reply); err != nil {
t.Error(err)
}
eAllocationMsg = "ResGroup1"
if reply != eAllocationMsg {
t.Errorf("Expecting: %+v, received: %+v", eAllocationMsg, reply)
}
// Third event testing overflow to second resource which still has one resource available
ev = &utils.CGREvent{
Tenant: "cgrates.org",
ID: utils.UUIDSha1Prefix(),
Event: map[string]any{
"Account": "dan",
"Subject": "dan",
"Destination": "1002",
},
APIOpts: map[string]any{
utils.OptsResourcesUsageID: "651a8db2-4f67-4cf8-b622-169e8a482e53",
utils.OptsResourcesUnits: 1,
},
}
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1AllocateResources,
ev, &reply); err != nil {
t.Error(err)
}
eAllocationMsg = "SPECIAL_1002"
if reply != eAllocationMsg {
t.Errorf("Expecting: %+v, received: %+v", eAllocationMsg, reply)
}
// Test resource unavailable
ev = &utils.CGREvent{
Tenant: "cgrates.org",
ID: utils.UUIDSha1Prefix(),
Event: map[string]any{
"Account": "1002",
"Subject": "1001",
"Destination": "1002",
},
APIOpts: map[string]any{
utils.OptsResourcesUsageID: "651a8db2-4f67-4cf8-b622-169e8a482e54", // same ID should be accepted by first group since the previous resource should be expired
utils.OptsResourcesUnits: 1,
},
}
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1AllocateResources,
ev, &reply); err == nil || err.Error() != utils.ErrResourceUnavailable.Error() {
t.Error(err)
}
eAllocationMsg = "ResGroup1"
time.Sleep(time.Second) // Give time for allocations on first resource to expire
ev = &utils.CGREvent{
Tenant: "cgrates.org",
ID: utils.UUIDSha1Prefix(),
Event: map[string]any{
"Account": "1002",
"Subject": "1001",
"Destination": "1002",
},
APIOpts: map[string]any{
utils.OptsResourcesUsageID: "651a8db2-4f67-4cf8-b622-169e8a482e55", // same ID should be accepted by first group since the previous resource should be expired
utils.OptsResourcesUnits: 1,
},
}
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1AllocateResources,
ev, &reply); err != nil {
t.Error(err)
}
eAllocationMsg = "ResGroup1"
if reply != eAllocationMsg {
t.Errorf("Expecting: %+v, received: %+v", eAllocationMsg, reply)
}
}
func testV1RsAuthorizeResources(t *testing.T) {
var reply string
argsRU := &utils.CGREvent{
Tenant: "cgrates.org",
ID: utils.UUIDSha1Prefix(),
Event: map[string]any{
"Account": "1002",
"Subject": "1001",
"Destination": "1002",
},
APIOpts: map[string]any{
utils.OptsResourcesUnits: 6,
utils.OptsResourcesUsageID: "651a8db2-4f67-4cf8-b622-169e8a482e61",
},
}
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1AuthorizeResources, &argsRU, &reply); err != nil {
t.Error(err)
} else if reply != "ResGroup1" { // already 3 usages active before allow call, we should have now more than allowed
t.Error("Unexpected reply returned", reply)
}
argsRU = &utils.CGREvent{
Tenant: "cgrates.org",
ID: utils.UUIDSha1Prefix(),
Event: map[string]any{
"Account": "1002",
"Subject": "1001",
"Destination": "1002",
},
APIOpts: map[string]any{
utils.OptsResourcesUsageID: "651a8db2-4f67-4cf8-b622-169e8a482e61",
utils.OptsResourcesUnits: 7,
},
}
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1AuthorizeResources,
&argsRU, &reply); err.Error() != utils.ErrResourceUnauthorized.Error() {
t.Error(err)
}
}
func testV1RsReleaseResource(t *testing.T) {
// release the only resource active for Resource1
var reply string
argsRU := &utils.CGREvent{
Tenant: "cgrates.org",
ID: utils.UUIDSha1Prefix(),
Event: map[string]any{
"Account": "1002",
"Subject": "1001",
"Destination": "1002",
},
APIOpts: map[string]any{
utils.OptsResourcesUsageID: "651a8db2-4f67-4cf8-b622-169e8a482e55", // same ID should be accepted by first group since the previous resource should be expired
},
}
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1ReleaseResources,
argsRU, &reply); err != nil {
t.Error(err)
}
// try reserving with full units for Resource1, case which did not work in previous test
// only match Resource1 since we don't want for storing of the resource2 bellow
argsRU = &utils.CGREvent{
Tenant: "cgrates.org",
ID: utils.UUIDSha1Prefix(),
Event: map[string]any{
"Account": "1002",
"Subject": "1001",
"Destination": "1002",
},
APIOpts: map[string]any{
utils.OptsResourcesUsageID: "651a8db2-4f67-4cf8-b622-169e8a482e61",
utils.OptsResourcesUnits: 7,
},
}
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1AuthorizeResources, &argsRU, &reply); err != nil {
t.Error(err)
} else if reply != "ResGroup1" {
t.Error("Unexpected reply returned", reply)
}
var rs *engine.Resources
args := &utils.CGREvent{
Tenant: "cgrates.org",
ID: "Event5",
Event: map[string]any{
"Account": "1002",
"Subject": "1001",
"Destination": "1002",
},
APIOpts: map[string]any{
utils.OptsResourcesUsageID: utils.UUIDSha1Prefix(),
},
}
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1GetResourcesForEvent, args, &rs); err != nil {
t.Error(err)
} else if len(*rs) != 2 {
t.Errorf("Resources: %+v", rs)
}
if rs == nil {
t.Fatal("Expecting rs to not be nil")
}
// make sure Resource1 have no more active resources
for _, r := range *rs {
if r.ID == "ResGroup1" &&
(len(r.Usages) != 0 || len(r.TTLIdx) != 0) {
t.Errorf("Unexpected resource: %+v", r)
}
}
// release an empty resource should return error
argsRU = &utils.CGREvent{
Tenant: "cgrates.org",
ID: utils.UUIDSha1Prefix(),
Event: map[string]any{
"Account": "1002",
"Subject": "1001",
"Destination": "1002",
},
APIOpts: map[string]any{
utils.OptsResourcesUsageID: "651a8db2-4f67-4cf8-b622-169e8a482e55", // same ID should be accepted by first group since the previous resource should be expired
},
}
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1ReleaseResources,
argsRU, &reply); err == nil || err.Error() != "cannot find usage record with id: 651a8db2-4f67-4cf8-b622-169e8a482e55" {
t.Error(err)
}
}
func testV1RsDBStore(t *testing.T) {
if rlsV1ConfDIR == "tutinternal" {
t.SkipNow()
}
argsRU := &utils.CGREvent{
Tenant: "cgrates.org",
ID: utils.UUIDSha1Prefix(),
Event: map[string]any{
"Account": "1002",
"Subject": "1001",
"Destination": "1002",
},
APIOpts: map[string]any{
utils.OptsResourcesUsageID: "651a8db2-4f67-4cf8-b622-169e8a482e71",
utils.OptsResourcesUnits: 1,
},
}
var reply string
eAllocationMsg := "ResGroup1"
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1AllocateResources, argsRU, &reply); err != nil {
t.Error(err)
} else if reply != eAllocationMsg {
t.Errorf("Expecting: %+v, received: %+v", eAllocationMsg, reply)
}
var rs *engine.Resources
args := &utils.CGREvent{
Tenant: "cgrates.org",
ID: "Event3",
Event: map[string]any{
"Account": "1002",
"Subject": "1001",
"Destination": "1002",
},
APIOpts: map[string]any{
utils.OptsResourcesUsageID: "651a8db2-4f67-4cf8-b622-169e8a482e71",
},
}
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1GetResourcesForEvent, args, &rs); err != nil {
t.Error(err)
} else if len(*rs) != 2 {
t.Errorf("Resources: %+v", rs)
}
if rs == nil {
t.Fatal("Expecting rs to not be nil")
}
// count resources before restart
for _, r := range *rs {
switch r.ID {
case "ResGroup1":
if len(r.Usages) != 1 || len(r.TTLIdx) != 1 {
t.Errorf("Unexpected resource: %+v", r)
}
case "ResGroup2":
if len(r.Usages) != 4 || len(r.TTLIdx) != 4 {
t.Errorf("Unexpected resource: %+v", r)
}
}
}
if _, err := engine.StopStartEngine(rlsV1CfgPath, *utils.WaitRater); err != nil {
t.Fatal(err)
}
var err error
rlsV1Rpc, err = newRPCClient(rlsV1Cfg.ListenCfg()) // We connect over JSON so we can also troubleshoot if needed
if err != nil {
t.Fatal("Could not connect to rater: ", err.Error())
}
rs = new(engine.Resources)
args = &utils.CGREvent{
Tenant: "cgrates.org",
ID: "Event4",
Event: map[string]any{
"Account": "1002",
"Subject": "1001",
"Destination": "1002",
},
APIOpts: map[string]any{
utils.OptsResourcesUsageID: "651a8db2-4f67-4cf8-b622-169e8a482e71",
},
}
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1GetResourcesForEvent, args, &rs); err != nil {
t.Error(err)
} else if len(*rs) != 2 {
t.Errorf("Resources: %+v", rs)
}
// count resources after restart
for _, r := range *rs {
switch r.ID {
case "ResGroup1":
if len(r.Usages) != 0 || len(r.TTLIdx) != 0 {
t.Errorf("Unexpected resource: %+v", r)
}
case "ResGroup2":
if len(r.Usages) != 4 || len(r.TTLIdx) != 4 {
t.Errorf("Unexpected resource: %s", utils.ToJSON(r))
}
}
}
}
func testV1RsGetResourceProfileBeforeSet(t *testing.T) {
var reply *string
if err := rlsV1Rpc.Call(context.Background(), utils.APIerSv1GetResourceProfile,
&utils.TenantID{Tenant: "cgrates.org", ID: "RES_GR_TEST"},
&reply); err == nil || err.Error() != utils.ErrNotFound.Error() {
t.Error(err)
}
}
func testV1RsSetResourceProfile(t *testing.T) {
rlsConfig = &engine.ResourceProfileWithAPIOpts{
ResourceProfile: &engine.ResourceProfile{
Tenant: "cgrates.org",
ID: "RES_GR_TEST",
FilterIDs: []string{"*wrong:inline"},
ActivationInterval: &utils.ActivationInterval{
ActivationTime: time.Date(2014, 7, 14, 14, 25, 0, 0, time.UTC),
ExpiryTime: time.Date(2014, 7, 14, 14, 25, 0, 0, time.UTC),
},
UsageTTL: time.Nanosecond,
Limit: 10,
AllocationMessage: "MessageAllocation",
Blocker: true,
Stored: true,
Weight: 20,
ThresholdIDs: []string{"Val1"},
},
}
var result string
expErr := "SERVER_ERROR: broken reference to filter: <*wrong:inline> for item with ID: cgrates.org:RES_GR_TEST"
if err := rlsV1Rpc.Call(context.Background(), utils.APIerSv1SetResourceProfile, rlsConfig, &result); err == nil || err.Error() != expErr {
t.Fatalf("Expected error: %q, received: %v", expErr, err)
}
rlsConfig.FilterIDs = []string{"*string:~*req.Account:1001"}
if err := rlsV1Rpc.Call(context.Background(), utils.APIerSv1SetResourceProfile, rlsConfig, &result); err != nil {
t.Error(err)
} else if result != utils.OK {
t.Error("Unexpected reply returned", result)
}
}
func testV1RsGetResourceProfileIDs(t *testing.T) {
expected := []string{"ResGroup2", "ResGroup1", "ResGroup3", "RES_GR_TEST"}
sort.Strings(expected)
var result []string
if err := rlsV1Rpc.Call(context.Background(), utils.APIerSv1GetResourceProfileIDs, utils.PaginatorWithTenant{}, &result); err != nil {
t.Error(err)
}
if err := rlsV1Rpc.Call(context.Background(), utils.APIerSv1GetResourceProfileIDs, utils.PaginatorWithTenant{Tenant: "cgrates.org"}, &result); err != nil {
t.Error(err)
}
sort.Strings(result)
if !reflect.DeepEqual(expected, result) {
t.Errorf("Expecting : %+v, received: %+v", expected, result)
}
}
func testV1RsGetResourceProfileAfterSet(t *testing.T) {
var reply *engine.ResourceProfile
if err := rlsV1Rpc.Call(context.Background(), utils.APIerSv1GetResourceProfile,
&utils.TenantID{Tenant: "cgrates.org", ID: rlsConfig.ID}, &reply); err != nil {
t.Error(err)
} else if !reflect.DeepEqual(reply, rlsConfig.ResourceProfile) {
t.Errorf("Expecting: %+v, received: %+v", utils.ToJSON(rlsConfig.ResourceProfile), utils.ToJSON(reply))
}
}
func testV1RsUpdateResourceProfile(t *testing.T) {
var result string
rlsConfig.FilterIDs = []string{"*string:~*req.Account:1001", "*prefix:~*req.DST:10"}
if err := rlsV1Rpc.Call(context.Background(), utils.APIerSv1SetResourceProfile, rlsConfig, &result); err != nil {
t.Error(err)
} else if result != utils.OK {
t.Error("Unexpected reply returned", result)
}
}
func testV1RsGetResourceProfileAfterUpdate(t *testing.T) {
var reply *engine.ResourceProfile
if err := rlsV1Rpc.Call(context.Background(), utils.APIerSv1GetResourceProfile,
&utils.TenantID{Tenant: "cgrates.org", ID: rlsConfig.ID}, &reply); err != nil {
t.Error(err)
} else {
sort.Strings(reply.FilterIDs)
sort.Strings(rlsConfig.ResourceProfile.FilterIDs)
if !reflect.DeepEqual(reply, rlsConfig.ResourceProfile) {
t.Errorf("Expecting: %+v, received: %+v", utils.ToJSON(rlsConfig.ResourceProfile), utils.ToJSON(reply))
}
}
}
func testV1RsRemResourceProfile(t *testing.T) {
var resp string
if err := rlsV1Rpc.Call(context.Background(), utils.APIerSv1RemoveResourceProfile,
&utils.TenantID{Tenant: "cgrates.org", ID: rlsConfig.ID}, &resp); err != nil {
t.Error(err)
} else if resp != utils.OK {
t.Error("Unexpected reply returned", resp)
}
if err := rlsV1Rpc.Call(context.Background(), utils.APIerSv1RemoveResourceProfile,
&utils.TenantID{Tenant: "cgrates.org", ID: rlsConfig.ID}, &resp); err.Error() != utils.ErrNotFound.Error() {
t.Errorf("Expected error: %v received: %v", utils.ErrNotFound, err)
}
}
func testV1RsGetResourceProfileAfterDelete(t *testing.T) {
var reply *string
if err := rlsV1Rpc.Call(context.Background(), utils.APIerSv1GetResourceProfile,
&utils.TenantID{Tenant: "cgrates.org", ID: "RES_GR_TEST"},
&reply); err == nil || err.Error() != utils.ErrNotFound.Error() {
t.Error(err)
}
}
func testV1RsResourcePing(t *testing.T) {
var resp string
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1Ping, new(utils.CGREvent), &resp); err != nil {
t.Error(err)
} else if resp != utils.Pong {
t.Error("Unexpected reply returned", resp)
}
}
func testV1RsMatchNotFound(t *testing.T) {
rlsConfig = &engine.ResourceProfileWithAPIOpts{
ResourceProfile: &engine.ResourceProfile{
Tenant: "cgrates.org",
ID: "Res_NotFound",
FilterIDs: []string{"*string:~*req.Account:CustomTest", "*notempty:~*req.Custom:"},
UsageTTL: time.Nanosecond,
Limit: 10,
AllocationMessage: "MessageAllocation",
Stored: true,
Weight: 20,
ThresholdIDs: []string{utils.MetaNone},
},
}
var result string
if err := rlsV1Rpc.Call(context.Background(), utils.APIerSv1SetResourceProfile, rlsConfig, &result); err != nil {
t.Error(err)
} else if result != utils.OK {
t.Error("Unexpected reply returned", result)
}
argsRU := &utils.CGREvent{
Tenant: "cgrates.org",
ID: utils.UUIDSha1Prefix(),
Event: map[string]any{
"Account": "CustomTest",
"Custom": "",
},
APIOpts: map[string]any{
utils.OptsResourcesUsageID: "test",
utils.OptsResourcesUnits: 1,
},
}
var reply string
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1ReleaseResources,
argsRU, &reply); err == nil || err.Error() != utils.ErrNotFound.Error() {
t.Error(err)
}
}
func testV1RsAllocateUnlimited(t *testing.T) {
rlsConfig = &engine.ResourceProfileWithAPIOpts{
ResourceProfile: &engine.ResourceProfile{
Tenant: "cgrates.org",
ID: "RES_ULTIMITED",
FilterIDs: []string{"*string:~*req.CustomField:UnlimitedEvent"},
ActivationInterval: &utils.ActivationInterval{
ActivationTime: time.Date(2014, 7, 14, 14, 25, 0, 0, time.UTC),
},
UsageTTL: -1,
Limit: -1,
AllocationMessage: "CustomUnlimitedMessage",
Stored: true,
Weight: 20,
ThresholdIDs: []string{utils.MetaNone},
},
}
var result string
if err := rlsV1Rpc.Call(context.Background(), utils.APIerSv1SetResourceProfile, rlsConfig, &result); err != nil {
t.Error(err)
} else if result != utils.OK {
t.Error("Unexpected reply returned", result)
}
var reply string
ev := &utils.CGREvent{
Tenant: "cgrates.org",
ID: utils.UUIDSha1Prefix(),
Event: map[string]any{
"CustomField": "UnlimitedEvent",
},
APIOpts: map[string]any{
utils.OptsResourcesUsageID: "651a8db2-4f67-4cf8-b622-169e8a482e51",
utils.OptsResourcesUnits: 1,
},
}
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1AllocateResources,
ev, &reply); err != nil {
t.Error(err)
} else if reply != "CustomUnlimitedMessage" {
t.Errorf("Expecting: %+v, received: %+v", "CustomUnlimitedMessage", reply)
}
var rplyRes *engine.Resource
expRes := &engine.Resource{
Tenant: "cgrates.org",
ID: "RES_ULTIMITED",
Usages: map[string]*engine.ResourceUsage{
"651a8db2-4f67-4cf8-b622-169e8a482e51": {
Tenant: "cgrates.org",
ID: "651a8db2-4f67-4cf8-b622-169e8a482e51",
Units: 1,
},
},
}
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1GetResource, &utils.TenantIDWithAPIOpts{
TenantID: &utils.TenantID{Tenant: "cgrates.org", ID: "RES_ULTIMITED"},
}, &rplyRes); err != nil {
t.Error(err)
} else if !reflect.DeepEqual(expRes, rplyRes) {
t.Errorf("Expecting: %+v, received: %+v", expRes, rplyRes)
}
}
func testV1RsStopEngine(t *testing.T) {
if err := engine.KillEngine(*utils.WaitRater); err != nil {
t.Error(err)
}
}
func testV1RsGetResourceProfileWithoutTenant(t *testing.T) {
rlsConfig = &engine.ResourceProfileWithAPIOpts{
ResourceProfile: &engine.ResourceProfile{
ID: "RES_ULTIMITED2",
FilterIDs: []string{"*string:~*req.CustomField:UnlimitedEvent"},
ActivationInterval: &utils.ActivationInterval{
ActivationTime: time.Date(2014, 7, 14, 14, 25, 0, 0, time.UTC),
ExpiryTime: time.Date(2014, 7, 14, 14, 25, 0, 0, time.UTC),
},
UsageTTL: time.Nanosecond,
Limit: 10,
AllocationMessage: "MessageAllocation",
Blocker: true,
Stored: true,
Weight: 20,
ThresholdIDs: []string{"Val1"},
},
}
var reply string
if err := rlsV1Rpc.Call(context.Background(), utils.APIerSv1SetResourceProfile, rlsConfig, &reply); err != nil {
t.Error(err)
} else if reply != utils.OK {
t.Error("Unexpected reply returned", reply)
}
rlsConfig.Tenant = "cgrates.org"
var result *engine.ResourceProfile
if err := rlsV1Rpc.Call(context.Background(), utils.APIerSv1GetResourceProfile,
&utils.TenantID{ID: rlsConfig.ID},
&result); err != nil {
t.Error(err)
} else if !reflect.DeepEqual(rlsConfig.ResourceProfile, result) {
t.Errorf("Expected %+v \n, received %+v", utils.ToJSON(rlsConfig.ResourceProfile), utils.ToJSON(result))
}
}
func testV1RsRemResourceProfileWithoutTenant(t *testing.T) {
var reply string
if err := rlsV1Rpc.Call(context.Background(), utils.APIerSv1RemoveResourceProfile,
&utils.TenantIDWithAPIOpts{TenantID: &utils.TenantID{ID: rlsConfig.ID}},
&reply); err != nil {
t.Error(err)
} else if reply != utils.OK {
t.Error("Unexpected reply returned", reply)
}
var result *engine.ResourceProfile
if err := rlsV1Rpc.Call(context.Background(), utils.APIerSv1GetResourceProfile,
&utils.TenantID{ID: rlsConfig.ID},
&result); err == nil || utils.ErrNotFound.Error() != err.Error() {
t.Error(err)
}
}
func testV1RsSetResourceProfileWithOpts(t *testing.T) {
rlsCfg := &engine.ResourceProfileWithAPIOpts{
ResourceProfile: &engine.ResourceProfile{
Tenant: "cgrates.org",
ID: "TEST_WITH_OPTS",
FilterIDs: []string{"*string:~*opts.CustomField:1007"},
UsageTTL: time.Duration(1) * time.Nanosecond,
Limit: 10,
Blocker: true,
Weight: 20,
ThresholdIDs: []string{utils.MetaNone},
},
}
var reply string
if err := rlsV1Rpc.Call(context.Background(), utils.APIerSv1SetResourceProfile, rlsCfg, &reply); err != nil {
t.Error(err)
} else if reply != utils.OK {
t.Error("Unexpected reply returned", reply)
}
var result *engine.ResourceProfile
if err := rlsV1Rpc.Call(context.Background(), utils.APIerSv1GetResourceProfile,
&utils.TenantID{Tenant: "cgrates.org", ID: "TEST_WITH_OPTS"},
&result); err != nil {
t.Error(err)
} else if !reflect.DeepEqual(rlsCfg.ResourceProfile, result) {
t.Errorf("Expected %+v \n, received %+v", utils.ToJSON(rlsCfg.ResourceProfile), utils.ToJSON(result))
}
}
func testV1RsAuthorizeResourcesWithOpts(t *testing.T) {
var reply string
ev := &utils.CGREvent{
Tenant: "cgrates.org",
ID: "TEST_WITH_OPTS",
Event: map[string]any{
"Subject": "1001",
"Destination": "1002",
},
APIOpts: map[string]any{
"CustomField": "1007",
utils.OptsResourcesUsageID: "651a8db2-4f67-4cf8-b622-169e8a482e45",
utils.OptsResourcesUnits: 6,
},
}
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1AuthorizeResources,
&ev,
&reply); err != nil {
t.Error(err)
} else if reply != "TEST_WITH_OPTS" {
t.Error("Unexpected reply returned", reply)
}
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1AllocateResources,
&ev,
&reply); err != nil {
t.Error(err)
} else if reply != "TEST_WITH_OPTS" {
t.Error("Unexpected reply returned", reply)
}
}
func testV1RsCheckAuthorizeResourcesAfterRestart(t *testing.T) {
var rplyRes *engine.Resource
expRes := &engine.Resource{
Tenant: "cgrates.org",
ID: "RES_ULTIMITED",
Usages: map[string]*engine.ResourceUsage{
"651a8db2-4f67-4cf8-b622-169e8a482e51": {
Tenant: "cgrates.org",
ID: "651a8db2-4f67-4cf8-b622-169e8a482e51",
Units: 1,
},
},
}
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1GetResource, &utils.TenantIDWithAPIOpts{
TenantID: &utils.TenantID{Tenant: "cgrates.org", ID: "RES_ULTIMITED"},
}, &rplyRes); err != nil {
t.Error(err)
} else if !reflect.DeepEqual(expRes, rplyRes) {
t.Errorf("Expecting: %+v, received: %+v", expRes, rplyRes)
}
rplyRes = new(engine.Resource)
expRes = &engine.Resource{
Tenant: "cgrates.org",
ID: "TEST_WITH_OPTS",
Usages: map[string]*engine.ResourceUsage{},
}
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1GetResource, &utils.TenantIDWithAPIOpts{
TenantID: &utils.TenantID{Tenant: "cgrates.org", ID: "TEST_WITH_OPTS"},
}, &rplyRes); err != nil {
t.Error(err)
} else if !reflect.DeepEqual(expRes, rplyRes) {
t.Errorf("Expecting: %+v, received: %+v", utils.ToJSON(expRes), utils.ToJSON(rplyRes))
}
}
func testV1ResourceStopCPUProfiling(t *testing.T) {
argPath := "/tmp/cpu.prof"
var reply string
if err := rlsV1Rpc.Call(context.Background(), utils.CoreSv1StopCPUProfiling,
new(utils.DirectoryArgs), &reply); err != nil {
t.Error(err)
}
file, err := os.Open(argPath)
if err != nil {
t.Error(err)
}
defer file.Close()
//compare the size
size, err := file.Stat()
if err != nil {
t.Error(err)
} else if size.Size() < int64(300) {
t.Errorf("Size of CPUProfile %v is lower that expected", size.Size())
}
//after we checked that CPUProfile was made successfully, can delete it
if err := os.Remove(argPath); err != nil {
t.Error(err)
}
}
func testResourceSCacheTestGetNotFound(t *testing.T) {
var reply *engine.ChargerProfile
if err := rlsV1Rpc.Call(context.Background(), utils.APIerSv1GetResourceProfile,
&utils.TenantID{Tenant: "cgrates.org", ID: "RESOURCE_CACHE"}, &reply); err == nil ||
err.Error() != utils.ErrNotFound.Error() {
t.Fatal(err)
}
}
func testResourceSCacheTestGetFound(t *testing.T) {
var reply *engine.ChargerProfile
if err := rlsV1Rpc.Call(context.Background(), utils.APIerSv1GetResourceProfile,
&utils.TenantID{Tenant: "cgrates.org", ID: "RESOURCE_CACHE"}, &reply); err != nil {
t.Fatal(err)
}
}
func testResourceSCacheTestSet(t *testing.T) {
rlsConfig = &engine.ResourceProfileWithAPIOpts{
ResourceProfile: &engine.ResourceProfile{
Tenant: "cgrates.org",
ID: "RESOURCE_CACHE",
},
APIOpts: map[string]any{
utils.CacheOpt: utils.MetaNone,
},
}
var result string
if err := rlsV1Rpc.Call(context.Background(), utils.APIerSv1SetResourceProfile, rlsConfig, &result); err != nil {
t.Error(err)
} else if result != utils.OK {
t.Error("Unexpected reply returned", result)
}
}
func testResourceSCacheReload(t *testing.T) {
cache := &utils.AttrReloadCacheWithAPIOpts{
ResourceProfileIDs: []string{"cgrates.org:RESOURCE_CACHE"},
}
var reply string
if err := rlsV1Rpc.Call(context.Background(), utils.CacheSv1ReloadCache, cache, &reply); err != nil {
t.Error("Got error on CacheSv1.ReloadCache: ", err.Error())
} else if reply != utils.OK {
t.Error("Calling CacheSv1.ReloadCache got reply: ", reply)
}
}
func testResourceSSetThresholdProfile(t *testing.T) {
ThdPrf := &engine.ThresholdProfileWithAPIOpts{
ThresholdProfile: &engine.ThresholdProfile{
Tenant: "cgrates.org",
FilterIDs: []string{"*string:~*opts.*eventType:ResourceUpdate"},
ID: "THD_1",
MaxHits: -1,
},
}
var reply string
if err := rlsV1Rpc.Call(context.Background(), utils.APIerSv1SetThresholdProfile, ThdPrf,
&reply); err != nil {
t.Error(err)
} else if reply != utils.OK {
t.Error("Unexpected reply returned", reply)
}
args := &utils.TenantID{
Tenant: "cgrates.org",
ID: "THD_1",
}
var result *engine.ThresholdProfile
if err := rlsV1Rpc.Call(context.Background(), utils.APIerSv1GetThresholdProfile, args,
&result); err != nil {
t.Error(err)
} else if !reflect.DeepEqual(result, ThdPrf.ThresholdProfile) {
t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>",
utils.ToJSON(ThdPrf.ThresholdProfile), utils.ToJSON(result))
}
}
func testResourceSSetResourceProfile(t *testing.T) {
ResPrf := &engine.ResourceProfile{
Tenant: "cgrates.org",
ID: "RES_1",
AllocationMessage: "Approved",
Limit: 10,
ThresholdIDs: []string{"THD_1"},
}
var reply string
if err := rlsV1Rpc.Call(context.Background(), utils.APIerSv1SetResourceProfile, ResPrf,
&reply); err != nil {
t.Error(err)
} else if reply != utils.OK {
t.Error("Unexpected reply returned", reply)
}
var result *engine.ResourceProfile
if err := rlsV1Rpc.Call(context.Background(), utils.APIerSv1GetResourceProfile,
&utils.TenantID{Tenant: "cgrates.org", ID: ResPrf.ID}, &result); err != nil {
t.Error(err)
} else if !reflect.DeepEqual(result, ResPrf) {
t.Errorf("expected: %+v, received: %+v",
utils.ToJSON(ResPrf), utils.ToJSON(result))
}
}
func testResourceSCheckThresholdAfterResourceAllocate(t *testing.T) {
var reply string
ev := &utils.CGREvent{
Tenant: "cgrates.org",
ID: "EV_1",
Event: map[string]any{
utils.AccountField: "1001",
},
APIOpts: map[string]any{
utils.OptsResourcesUsageID: "RU_1",
utils.OptsResourcesUnits: 5,
},
}
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1AllocateResources, ev,
&reply); err != nil {
t.Error(err)
} else if reply != "Approved" {
t.Error("Unexpected reply returned", reply)
}
args := &utils.TenantID{
Tenant: "cgrates.org",
ID: "THD_1",
}
var result *engine.Threshold
if err := rlsV1Rpc.Call(context.Background(), utils.ThresholdSv1GetThreshold, args,
&result); err != nil {
t.Error(err)
} else if result.Hits != 1 {
t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", 1, result.Hits)
}
}
func testResourceSCheckThresholdAfterResourceRelease(t *testing.T) {
ev := &utils.CGREvent{
Tenant: "cgrates.org",
ID: "EV_1",
Event: map[string]any{
utils.AccountField: "1001",
},
APIOpts: map[string]any{
utils.OptsResourcesUsageID: "RU_1",
},
}
var reply string
if err := rlsV1Rpc.Call(context.Background(), utils.ResourceSv1ReleaseResources, ev,
&reply); err != nil {
t.Error(err)
}
args := &utils.TenantID{
Tenant: "cgrates.org",
ID: "THD_1",
}
var result *engine.Threshold
if err := rlsV1Rpc.Call(context.Background(), utils.ThresholdSv1GetThreshold, args,
&result); err != nil {
t.Error(err)
} else if result.Hits != 2 {
t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", 2, result.Hits)
}
}