mirror of
https://github.com/cgrates/cgrates.git
synced 2026-02-11 18:16:24 +05:00
1084 lines
36 KiB
Go
1084 lines
36 KiB
Go
//go:build integration
|
|
// +build integration
|
|
|
|
/*
|
|
Real-time Online/Offline Charging System (OCS) for Telecom & ISP environments
|
|
Copyright (C) ITsysCOM GmbH
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU Affero General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU Affero General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Affero General Public License
|
|
along with this program. If not, see <https://www.gnu.org/licenses/>
|
|
*/
|
|
package v1
|
|
|
|
import (
|
|
"os"
|
|
"path"
|
|
"reflect"
|
|
"sort"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/cgrates/birpc"
|
|
"github.com/cgrates/birpc/context"
|
|
"github.com/cgrates/cgrates/config"
|
|
"github.com/cgrates/cgrates/engine"
|
|
"github.com/cgrates/cgrates/utils"
|
|
)
|
|
|
|
var (
|
|
tSv1CfgPath string
|
|
tSv1Cfg *config.CGRConfig
|
|
tSv1Rpc *birpc.Client
|
|
tPrfl *engine.ThresholdProfileWithAPIOpts
|
|
tSv1ConfDIR string //run tests for specific configuration
|
|
|
|
tEvs = []*utils.CGREvent{
|
|
{ // will not match any threshold profile
|
|
Tenant: "cgrates.org",
|
|
ID: "event1",
|
|
Event: map[string]any{
|
|
utils.EventType: utils.AccountUpdate,
|
|
utils.AccountField: "1002",
|
|
utils.AllowNegative: true,
|
|
utils.Disabled: false,
|
|
utils.Units: 12.3},
|
|
APIOpts: map[string]any{
|
|
utils.MetaEventType: utils.AccountUpdate,
|
|
},
|
|
},
|
|
{ // hitting THD_ACNT_BALANCE_1
|
|
Tenant: "cgrates.org",
|
|
ID: "event2",
|
|
Event: map[string]any{
|
|
utils.AllowNegative: false,
|
|
utils.BalanceSummaries: engine.BalanceSummaries{
|
|
{
|
|
ID: utils.MetaDefault,
|
|
Type: utils.MetaMonetary,
|
|
Value: 12.3,
|
|
},
|
|
},
|
|
utils.ID: "1001",
|
|
utils.Tenant: "cgrates.org",
|
|
utils.Disabled: false,
|
|
},
|
|
APIOpts: map[string]any{
|
|
utils.MetaEventType: utils.AccountUpdate,
|
|
},
|
|
},
|
|
{ // hitting THD_STATS_1
|
|
Tenant: "cgrates.org",
|
|
ID: "event3",
|
|
Event: map[string]any{
|
|
utils.EventType: utils.StatUpdate,
|
|
utils.StatID: "Stats1",
|
|
utils.AccountField: "1002",
|
|
"ASR": 35.0,
|
|
"ACD": "2m45s",
|
|
"TCC": 12.7,
|
|
"TCD": "12m15s",
|
|
"ACC": 0.75,
|
|
"PDD": "2s",
|
|
},
|
|
APIOpts: map[string]any{
|
|
utils.MetaEventType: utils.StatUpdate,
|
|
},
|
|
},
|
|
{ // hitting THD_STATS_1 and THD_STATS_2
|
|
Tenant: "cgrates.org",
|
|
ID: "event4",
|
|
Event: map[string]any{
|
|
utils.EventType: utils.StatUpdate,
|
|
utils.StatID: "STATS_HOURLY_DE",
|
|
utils.AccountField: "1002",
|
|
"ASR": 35.0,
|
|
"ACD": "2m45s",
|
|
"TCD": "1h",
|
|
},
|
|
APIOpts: map[string]any{
|
|
utils.MetaEventType: utils.StatUpdate,
|
|
},
|
|
},
|
|
{ // hitting THD_STATS_3
|
|
Tenant: "cgrates.org",
|
|
ID: "event5",
|
|
Event: map[string]any{
|
|
utils.EventType: utils.StatUpdate,
|
|
utils.StatID: "STATS_DAILY_DE",
|
|
utils.AccountField: "1002",
|
|
"ACD": "2m45s",
|
|
"TCD": "3h1s",
|
|
},
|
|
APIOpts: map[string]any{
|
|
utils.MetaEventType: utils.StatUpdate,
|
|
},
|
|
},
|
|
{ // hitting THD_RES_1
|
|
Tenant: "cgrates.org",
|
|
ID: "event6",
|
|
Event: map[string]any{
|
|
utils.EventType: utils.ResourceUpdate,
|
|
utils.AccountField: "1002",
|
|
utils.ResourceID: "RES_GRP_1",
|
|
utils.Usage: 10.0,
|
|
},
|
|
APIOpts: map[string]any{
|
|
utils.MetaEventType: utils.ResourceUpdate,
|
|
},
|
|
},
|
|
{ // hitting THD_RES_1
|
|
Tenant: "cgrates.org",
|
|
ID: "event6",
|
|
Event: map[string]any{
|
|
utils.EventType: utils.ResourceUpdate,
|
|
utils.AccountField: "1002",
|
|
utils.ResourceID: "RES_GRP_1",
|
|
utils.Usage: 10.0,
|
|
},
|
|
APIOpts: map[string]any{
|
|
utils.MetaEventType: utils.ResourceUpdate,
|
|
},
|
|
},
|
|
{ // hitting THD_RES_1
|
|
Tenant: "cgrates.org",
|
|
ID: "event6",
|
|
Event: map[string]any{
|
|
utils.EventType: utils.ResourceUpdate,
|
|
utils.AccountField: "1002",
|
|
utils.ResourceID: "RES_GRP_1",
|
|
utils.Usage: 10.0,
|
|
},
|
|
APIOpts: map[string]any{
|
|
utils.MetaEventType: utils.ResourceUpdate,
|
|
},
|
|
},
|
|
{ // hitting THD_CDRS_1
|
|
Tenant: "cgrates.org",
|
|
ID: "cdrev1",
|
|
Event: map[string]any{
|
|
"field_extr1": "val_extr1",
|
|
"fieldextr2": "valextr2",
|
|
utils.CGRID: utils.Sha1("dsafdsaf", time.Date(2013, 11, 7, 8, 42, 26, 0, time.UTC).String()),
|
|
utils.RunID: utils.MetaRaw,
|
|
utils.OrderID: 123,
|
|
utils.OriginHost: "192.168.1.1",
|
|
utils.Source: utils.UnitTest,
|
|
utils.OriginID: "dsafdsaf",
|
|
utils.ToR: utils.MetaVoice,
|
|
utils.RequestType: utils.MetaRated,
|
|
utils.Tenant: "cgrates.org",
|
|
utils.Category: "call",
|
|
utils.AccountField: "1007",
|
|
utils.Subject: "1007",
|
|
utils.Destination: "+4986517174963",
|
|
utils.SetupTime: time.Date(2013, 11, 7, 8, 42, 20, 0, time.UTC),
|
|
utils.PDD: 0 * time.Second,
|
|
utils.AnswerTime: time.Date(2013, 11, 7, 8, 42, 26, 0, time.UTC),
|
|
utils.Usage: 10 * time.Second,
|
|
utils.Route: "SUPPL1",
|
|
utils.Cost: -1.0,
|
|
},
|
|
APIOpts: map[string]any{
|
|
utils.MetaEventType: utils.CDR,
|
|
},
|
|
},
|
|
}
|
|
|
|
sTestsThresholdSV1 = []func(t *testing.T){
|
|
testV1TSLoadConfig,
|
|
testV1TSInitDataDb,
|
|
testV1TSResetStorDb,
|
|
testV1TSStartEngine,
|
|
testV1TSRpcConn,
|
|
testV1ThresholdStartCPUProfiling,
|
|
testV1TSCacheThresholdBeforeLoad,
|
|
testV1TSFromFolder,
|
|
testV1TSCacheThresholdAfterLoad,
|
|
testV1TSGetThresholds,
|
|
testV1TSProcessEvent,
|
|
testV1TSGetThresholdsAfterProcess,
|
|
testV1ThresholdStopCPUProfiling,
|
|
testV1TSGetThresholdsAfterRestart,
|
|
testv1TSGetThresholdProfileIDs,
|
|
testv1TSGetThresholdProfileIDsCount,
|
|
testV1TSSetThresholdProfileBrokenReference,
|
|
testV1TSSetThresholdProfile,
|
|
testV1TSUpdateThresholdProfile,
|
|
testV1TSRemoveThresholdProfile,
|
|
testV1TSMaxHits,
|
|
testV1TSUpdateSnooze,
|
|
testV1TSGetThresholdProfileWithoutTenant,
|
|
testV1TSRemThresholdProfileWithoutTenant,
|
|
testV1TSProcessEventWithoutTenant,
|
|
testV1TSGetThresholdsWithoutTenant,
|
|
testV1TSProcessAccountUpdateEvent,
|
|
testV1TSResetThresholdsWithoutTenant,
|
|
testV1TSStopEngine,
|
|
//cache test
|
|
testV1TSLoadConfig,
|
|
testV1TSInitDataDb,
|
|
testV1TSResetStorDb,
|
|
testV1TSStartEngine,
|
|
testV1TSRpcConn,
|
|
testThresholdSCacheProcessEventNotFound,
|
|
testThresholdSCacheSet,
|
|
testThresholdSCacheProcessEventNotFound,
|
|
testThresholdSCacheReload,
|
|
testThresholdSCacheProcessEventFound,
|
|
testV1TSStopEngine,
|
|
}
|
|
)
|
|
|
|
// Test start here
|
|
func TestTSV1IT(t *testing.T) {
|
|
sTestsThresholdCacheSV1 := sTestsThresholdSV1
|
|
switch *utils.DBType {
|
|
case utils.MetaInternal:
|
|
tSv1ConfDIR = "tutinternal"
|
|
sTestsThresholdCacheSV1 = sTestsThresholdCacheSV1[:len(sTestsThresholdCacheSV1)-10]
|
|
case utils.MetaMySQL:
|
|
tSv1ConfDIR = "tutmysql"
|
|
case utils.MetaMongo:
|
|
tSv1ConfDIR = "tutmongo"
|
|
case utils.MetaPostgres:
|
|
t.SkipNow()
|
|
default:
|
|
t.Fatal("Unknown Database type")
|
|
}
|
|
|
|
for _, stest := range sTestsThresholdCacheSV1 {
|
|
t.Run(tSv1ConfDIR, stest)
|
|
}
|
|
}
|
|
|
|
func testV1TSLoadConfig(t *testing.T) {
|
|
var err error
|
|
tSv1CfgPath = path.Join(*utils.DataDir, "conf", "samples", tSv1ConfDIR)
|
|
if tSv1Cfg, err = config.NewCGRConfigFromPath(tSv1CfgPath); err != nil {
|
|
t.Error(err)
|
|
}
|
|
}
|
|
|
|
func testV1TSInitDataDb(t *testing.T) {
|
|
if err := engine.InitDataDB(tSv1Cfg); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
// Wipe out the cdr database
|
|
func testV1TSResetStorDb(t *testing.T) {
|
|
if err := engine.InitStorDb(tSv1Cfg); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
func testV1TSStartEngine(t *testing.T) {
|
|
if _, err := engine.StopStartEngine(tSv1CfgPath, *utils.WaitRater); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
func testV1TSRpcConn(t *testing.T) {
|
|
var err error
|
|
tSv1Rpc, err = newRPCClient(tSv1Cfg.ListenCfg()) // We connect over JSON so we can also troubleshoot if needed
|
|
if err != nil {
|
|
t.Fatal("Could not connect to rater: ", err.Error())
|
|
}
|
|
}
|
|
|
|
func testV1ThresholdStartCPUProfiling(t *testing.T) {
|
|
argPath := &utils.DirectoryArgs{
|
|
DirPath: "/tmp",
|
|
}
|
|
var reply string
|
|
if err := tSv1Rpc.Call(context.Background(), utils.CoreSv1StartCPUProfiling,
|
|
argPath, &reply); err != nil {
|
|
t.Error(err)
|
|
}
|
|
}
|
|
|
|
func testV1TSCacheThresholdBeforeLoad(t *testing.T) { // cache it with not found
|
|
var td engine.Threshold
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1GetThreshold,
|
|
&utils.TenantIDWithAPIOpts{TenantID: &utils.TenantID{Tenant: "cgrates.org", ID: "THD_ACNT_BALANCE_1"}},
|
|
&td); err == nil || err.Error() != utils.ErrNotFound.Error() {
|
|
t.Error(err)
|
|
}
|
|
}
|
|
|
|
func testV1TSCacheThresholdAfterLoad(t *testing.T) { // the APIerSv1LoadTariffPlanFromFolder should also reload the cache for resources
|
|
var td engine.Threshold
|
|
eTd := engine.Threshold{Tenant: "cgrates.org", ID: "THD_ACNT_BALANCE_1"}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1GetThreshold,
|
|
&utils.TenantIDWithAPIOpts{TenantID: &utils.TenantID{Tenant: "cgrates.org", ID: "THD_ACNT_BALANCE_1"}}, &td); err != nil {
|
|
t.Error(err)
|
|
} else if !reflect.DeepEqual(eTd, td) {
|
|
t.Errorf("expecting: %+v, received: %+v", eTd, td)
|
|
}
|
|
}
|
|
func testV1TSFromFolder(t *testing.T) {
|
|
var reply string
|
|
attrs := &utils.AttrLoadTpFromFolder{FolderPath: path.Join(*utils.DataDir, "tariffplans", "oldtutorial")}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.APIerSv1LoadTariffPlanFromFolder, attrs, &reply); err != nil {
|
|
t.Error(err)
|
|
}
|
|
time.Sleep(100 * time.Millisecond)
|
|
}
|
|
|
|
func testV1TSGetThresholds(t *testing.T) {
|
|
var tIDs []string
|
|
expectedIDs := []string{"THD_RES_1", "THD_STATS_2", "THD_STATS_1", "THD_ACNT_BALANCE_1", "THD_ACNT_EXPIRED", "THD_STATS_3", "THD_CDRS_1"}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1GetThresholdIDs,
|
|
&utils.TenantWithAPIOpts{}, &tIDs); err != nil {
|
|
t.Error(err)
|
|
} else if len(expectedIDs) != len(tIDs) {
|
|
t.Errorf("expecting: %+v, received reply: %s", expectedIDs, tIDs)
|
|
}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1GetThresholdIDs,
|
|
&utils.TenantWithAPIOpts{Tenant: "cgrates.org"}, &tIDs); err != nil {
|
|
t.Error(err)
|
|
} else if len(expectedIDs) != len(tIDs) {
|
|
t.Errorf("expecting: %+v, received reply: %s", expectedIDs, tIDs)
|
|
}
|
|
var td engine.Threshold
|
|
eTd := engine.Threshold{Tenant: "cgrates.org", ID: expectedIDs[0]}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1GetThreshold,
|
|
&utils.TenantIDWithAPIOpts{TenantID: &utils.TenantID{Tenant: "cgrates.org", ID: expectedIDs[0]}}, &td); err != nil {
|
|
t.Error(err)
|
|
} else if !reflect.DeepEqual(eTd, td) {
|
|
t.Errorf("expecting: %+v, received: %+v", eTd, td)
|
|
}
|
|
}
|
|
|
|
func testV1TSProcessEvent(t *testing.T) {
|
|
var ids []string
|
|
eIDs := []string{}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1ProcessEvent, &tEvs[0], &ids); err == nil ||
|
|
err.Error() != utils.ErrNotFound.Error() {
|
|
t.Error(err)
|
|
}
|
|
eIDs = []string{"THD_ACNT_BALANCE_1"}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1ProcessEvent, &tEvs[1], &ids); err != nil {
|
|
t.Error(err)
|
|
} else if !reflect.DeepEqual(ids, eIDs) {
|
|
t.Errorf("Expecting ids: %s, received: %s", eIDs, ids)
|
|
}
|
|
eIDs = []string{"THD_STATS_1"}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1ProcessEvent, &tEvs[2], &ids); err != nil {
|
|
t.Error(err)
|
|
} else if !reflect.DeepEqual(ids, eIDs) {
|
|
t.Errorf("Expecting ids: %s, received: %s", eIDs, ids)
|
|
}
|
|
eIDs = []string{"THD_STATS_2", "THD_STATS_1"}
|
|
eIDs2 := []string{"THD_STATS_1", "THD_STATS_2"}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1ProcessEvent, &tEvs[3], &ids); err != nil {
|
|
t.Error(err)
|
|
} else if !reflect.DeepEqual(ids, eIDs) && !reflect.DeepEqual(ids, eIDs2) {
|
|
t.Errorf("Expecting ids: %s, received: %s", eIDs, ids)
|
|
}
|
|
eIDs = []string{"THD_STATS_3"}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1ProcessEvent, &tEvs[4], &ids); err != nil {
|
|
t.Error(err)
|
|
} else if !reflect.DeepEqual(ids, eIDs) {
|
|
t.Errorf("Expecting ids: %s, received: %s", eIDs, ids)
|
|
}
|
|
eIDs = []string{"THD_RES_1"}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1ProcessEvent, &tEvs[5], &ids); err != nil {
|
|
t.Error(err)
|
|
} else if !reflect.DeepEqual(ids, eIDs) {
|
|
t.Errorf("Expecting ids: %s, received: %s", eIDs, ids)
|
|
}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1ProcessEvent, &tEvs[6], &ids); err != nil {
|
|
t.Error(err)
|
|
} else if !reflect.DeepEqual(ids, eIDs) {
|
|
t.Errorf("Expecting ids: %s, received: %s", eIDs, ids)
|
|
}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1ProcessEvent, &tEvs[7], &ids); err != nil {
|
|
t.Error(err)
|
|
} else if !reflect.DeepEqual(ids, eIDs) {
|
|
t.Errorf("Expecting ids: %s, received: %s", eIDs, ids)
|
|
}
|
|
eIDs = []string{"THD_CDRS_1"}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1ProcessEvent, &tEvs[8], &ids); err != nil {
|
|
t.Error(err)
|
|
} else if !reflect.DeepEqual(ids, eIDs) {
|
|
t.Errorf("Expecting ids: %s, received: %s", eIDs, ids)
|
|
}
|
|
}
|
|
|
|
func testV1TSGetThresholdsAfterProcess(t *testing.T) {
|
|
var tIDs []string
|
|
expectedIDs := []string{"THD_RES_1", "THD_STATS_2", "THD_STATS_1", "THD_ACNT_BALANCE_1", "THD_ACNT_EXPIRED", "THD_CDRS_1", "THD_STATS_3"}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1GetThresholdIDs,
|
|
&utils.TenantWithAPIOpts{Tenant: "cgrates.org"}, &tIDs); err != nil {
|
|
t.Error(err)
|
|
} else if len(expectedIDs) != len(tIDs) { // THD_STATS_3 is not reccurent, so it was removed
|
|
t.Errorf("expecting: %+v, received reply: %s", expectedIDs, tIDs)
|
|
}
|
|
var td engine.Threshold
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1GetThreshold,
|
|
&utils.TenantIDWithAPIOpts{TenantID: &utils.TenantID{Tenant: "cgrates.org", ID: "THD_ACNT_BALANCE_1"}}, &td); err != nil {
|
|
t.Error(err)
|
|
} else if td.Snooze.IsZero() { // make sure Snooze time was reset during execution
|
|
t.Errorf("received: %+v", td)
|
|
}
|
|
}
|
|
|
|
func testV1TSGetThresholdsAfterRestart(t *testing.T) {
|
|
// in case of internal we skip this test
|
|
if tSv1ConfDIR == "tutinternal" {
|
|
t.SkipNow()
|
|
}
|
|
// time.Sleep(time.Second)
|
|
if _, err := engine.StopStartEngine(tSv1CfgPath, *utils.WaitRater); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
var err error
|
|
tSv1Rpc, err = newRPCClient(tSv1Cfg.ListenCfg()) // We connect over JSON so we can also troubleshoot if needed
|
|
if err != nil {
|
|
t.Fatal("Could not connect to rater: ", err.Error())
|
|
}
|
|
var td engine.Threshold
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1GetThreshold,
|
|
&utils.TenantIDWithAPIOpts{TenantID: &utils.TenantID{Tenant: "cgrates.org", ID: "THD_ACNT_BALANCE_1"}}, &td); err != nil {
|
|
t.Error(err)
|
|
} else if td.Snooze.IsZero() { // make sure Snooze time was reset during execution
|
|
t.Errorf("received: %+v", td)
|
|
}
|
|
}
|
|
|
|
func testV1TSSetThresholdProfileBrokenReference(t *testing.T) {
|
|
var reply *engine.ThresholdProfile
|
|
var result string
|
|
tPrfl = &engine.ThresholdProfileWithAPIOpts{
|
|
ThresholdProfile: &engine.ThresholdProfile{
|
|
Tenant: "cgrates.org",
|
|
ID: "THD_Test",
|
|
FilterIDs: []string{"NonExistingFilter"},
|
|
ActivationInterval: &utils.ActivationInterval{
|
|
ActivationTime: time.Date(2014, 7, 14, 14, 35, 0, 0, time.UTC),
|
|
ExpiryTime: time.Date(2014, 7, 14, 14, 35, 0, 0, time.UTC),
|
|
},
|
|
MaxHits: -1,
|
|
MinSleep: 5 * time.Minute,
|
|
Blocker: false,
|
|
Weight: 20.0,
|
|
ActionIDs: []string{"ACT_1"},
|
|
Async: true,
|
|
},
|
|
}
|
|
expErr := "SERVER_ERROR: broken reference to filter: <NonExistingFilter> for item with ID: cgrates.org:THD_Test"
|
|
if err := tSv1Rpc.Call(context.Background(), utils.APIerSv1SetThresholdProfile, tPrfl, &result); err == nil || err.Error() != expErr {
|
|
t.Fatalf("Expected error: %q, received: %v", expErr, err)
|
|
}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.APIerSv1GetThresholdProfile,
|
|
&utils.TenantID{Tenant: "cgrates.org", ID: "THD_Test"}, &reply); err == nil ||
|
|
err.Error() != utils.ErrNotFound.Error() {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
func testv1TSGetThresholdProfileIDs(t *testing.T) {
|
|
expected := []string{"THD_STATS_1", "THD_STATS_2", "THD_STATS_3", "THD_RES_1", "THD_CDRS_1", "THD_ACNT_BALANCE_1", "THD_ACNT_EXPIRED"}
|
|
var result []string
|
|
if err := tSv1Rpc.Call(context.Background(), utils.APIerSv1GetThresholdProfileIDs, &utils.PaginatorWithTenant{}, &result); err != nil {
|
|
t.Error(err)
|
|
} else if len(expected) != len(result) {
|
|
t.Errorf("Expecting : %+v, received: %+v", expected, result)
|
|
}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.APIerSv1GetThresholdProfileIDs, &utils.PaginatorWithTenant{Tenant: "cgrates.org"}, &result); err != nil {
|
|
t.Error(err)
|
|
} else if len(expected) != len(result) {
|
|
t.Errorf("Expecting : %+v, received: %+v", expected, result)
|
|
}
|
|
}
|
|
|
|
func testV1TSSetThresholdProfile(t *testing.T) {
|
|
var reply *engine.ThresholdProfile
|
|
var result string
|
|
if err := tSv1Rpc.Call(context.Background(), utils.APIerSv1GetThresholdProfile,
|
|
&utils.TenantID{Tenant: "cgrates.org", ID: "THD_Test"}, &reply); err == nil ||
|
|
err.Error() != utils.ErrNotFound.Error() {
|
|
t.Error(err)
|
|
}
|
|
tPrfl = &engine.ThresholdProfileWithAPIOpts{
|
|
ThresholdProfile: &engine.ThresholdProfile{
|
|
Tenant: "cgrates.org",
|
|
ID: "THD_Test",
|
|
FilterIDs: []string{"*string:~*req.Account:1001"},
|
|
ActivationInterval: &utils.ActivationInterval{
|
|
ActivationTime: time.Date(2014, 7, 14, 14, 35, 0, 0, time.UTC),
|
|
ExpiryTime: time.Date(2014, 7, 14, 14, 35, 0, 0, time.UTC),
|
|
},
|
|
MaxHits: -1,
|
|
MinSleep: 5 * time.Minute,
|
|
Blocker: false,
|
|
Weight: 20.0,
|
|
ActionIDs: []string{"ACT_1"},
|
|
Async: true,
|
|
},
|
|
}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.APIerSv1SetThresholdProfile, tPrfl, &result); err != nil {
|
|
t.Error(err)
|
|
} else if result != utils.OK {
|
|
t.Error("Unexpected reply returned", result)
|
|
}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.APIerSv1GetThresholdProfile,
|
|
&utils.TenantID{Tenant: "cgrates.org", ID: "THD_Test"}, &reply); err != nil {
|
|
t.Error(err)
|
|
} else if !reflect.DeepEqual(tPrfl.ThresholdProfile, reply) {
|
|
t.Errorf("Expecting: %+v, received: %+v", tPrfl.ThresholdProfile, reply)
|
|
}
|
|
}
|
|
|
|
func testV1TSUpdateThresholdProfile(t *testing.T) {
|
|
var result string
|
|
tPrfl.FilterIDs = []string{"*string:~*req.Account:1001", "*prefix:~*opts.DST:10"}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.APIerSv1SetThresholdProfile, tPrfl, &result); err != nil {
|
|
t.Error(err)
|
|
} else if result != utils.OK {
|
|
t.Error("Unexpected reply returned", result)
|
|
}
|
|
var reply *engine.ThresholdProfile
|
|
if err := tSv1Rpc.Call(context.Background(), utils.APIerSv1GetThresholdProfile,
|
|
&utils.TenantID{Tenant: "cgrates.org", ID: "THD_Test"}, &reply); err != nil {
|
|
t.Error(err)
|
|
} else {
|
|
sort.Strings(reply.FilterIDs)
|
|
sort.Strings(tPrfl.ThresholdProfile.FilterIDs)
|
|
if !reflect.DeepEqual(tPrfl.ThresholdProfile, reply) {
|
|
t.Errorf("Expecting: %+v, received: %+v", tPrfl.ThresholdProfile, reply)
|
|
}
|
|
}
|
|
}
|
|
|
|
func testV1TSRemoveThresholdProfile(t *testing.T) {
|
|
var resp string
|
|
if err := tSv1Rpc.Call(context.Background(), utils.APIerSv1RemoveThresholdProfile,
|
|
&utils.TenantIDWithAPIOpts{TenantID: &utils.TenantID{Tenant: "cgrates.org", ID: "THD_Test"}}, &resp); err != nil {
|
|
t.Error(err)
|
|
} else if resp != utils.OK {
|
|
t.Error("Unexpected reply returned", resp)
|
|
}
|
|
var sqp *engine.ThresholdProfile
|
|
if err := tSv1Rpc.Call(context.Background(), utils.APIerSv1GetThresholdProfile,
|
|
&utils.TenantID{Tenant: "cgrates.org", ID: "THD_Test"}, &sqp); err == nil ||
|
|
err.Error() != utils.ErrNotFound.Error() {
|
|
t.Errorf("Received %s and the error:%+v", utils.ToJSON(sqp), err)
|
|
}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.APIerSv1RemoveThresholdProfile,
|
|
&utils.TenantIDWithAPIOpts{TenantID: &utils.TenantID{Tenant: "cgrates.org", ID: "THD_Test"}}, &resp); err.Error() != utils.ErrNotFound.Error() {
|
|
t.Errorf("Expected error: %v received: %v", utils.ErrNotFound, err)
|
|
}
|
|
}
|
|
|
|
func testV1TSMaxHits(t *testing.T) {
|
|
var reply string
|
|
// check if exist
|
|
if err := tSv1Rpc.Call(context.Background(), utils.APIerSv1GetThresholdProfile,
|
|
&utils.TenantID{Tenant: "cgrates.org", ID: "TH3"}, &reply); err == nil ||
|
|
err.Error() != utils.ErrNotFound.Error() {
|
|
t.Error(err)
|
|
}
|
|
tPrfl = &engine.ThresholdProfileWithAPIOpts{
|
|
ThresholdProfile: &engine.ThresholdProfile{
|
|
Tenant: "cgrates.org",
|
|
ID: "TH3",
|
|
MaxHits: 3,
|
|
},
|
|
}
|
|
//set
|
|
if err := tSv1Rpc.Call(context.Background(), utils.APIerSv1SetThresholdProfile, tPrfl, &reply); err != nil {
|
|
t.Error(err)
|
|
} else if reply != utils.OK {
|
|
t.Error("Unexpected reply returned", reply)
|
|
}
|
|
|
|
var ids []string
|
|
eIDs := []string{"TH3"}
|
|
thEvent := &utils.CGREvent{ // hitting TH3
|
|
Tenant: "cgrates.org",
|
|
ID: "event1",
|
|
Event: map[string]any{
|
|
utils.AccountField: "1002",
|
|
},
|
|
}
|
|
//process event
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1ProcessEvent, thEvent, &ids); err != nil {
|
|
t.Error(err)
|
|
} else if !reflect.DeepEqual(ids, eIDs) {
|
|
t.Errorf("Expecting ids: %s, received: %s", eIDs, ids)
|
|
}
|
|
//check threshold after first process ( hits : 1)
|
|
var td engine.Threshold
|
|
eTd := engine.Threshold{Tenant: "cgrates.org", ID: "TH3", Hits: 1}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1GetThreshold,
|
|
&utils.TenantIDWithAPIOpts{TenantID: &utils.TenantID{Tenant: "cgrates.org", ID: "TH3"}}, &td); err != nil {
|
|
t.Error(err)
|
|
} else if !reflect.DeepEqual(eTd.Hits, td.Hits) {
|
|
t.Errorf("expecting: %+v, received: %+v", eTd, td)
|
|
}
|
|
//process event
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1ProcessEvent, thEvent, &ids); err != nil {
|
|
t.Error(err)
|
|
} else if !reflect.DeepEqual(ids, eIDs) {
|
|
t.Errorf("Expecting ids: %s, received: %s", eIDs, ids)
|
|
}
|
|
|
|
//check threshold for event
|
|
var ths engine.Thresholds
|
|
eTd.Hits = 2
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1GetThresholdsForEvent,
|
|
thEvent, &ths); err != nil {
|
|
t.Error(err)
|
|
} else if len(ths) != 1 {
|
|
t.Errorf("expecting: 1, received: %+v", utils.ToJSON(ths))
|
|
} else if !reflect.DeepEqual(eTd.TenantID(), ths[0].TenantID()) {
|
|
t.Errorf("expecting: %+v, received: %+v", eTd.TenantID(), ths[0].TenantID())
|
|
} else if !reflect.DeepEqual(eTd.Hits, ths[0].Hits) {
|
|
t.Errorf("expecting: %+v, received: %+v", eTd.Hits, ths[0].Hits)
|
|
}
|
|
|
|
//check threshold for event without tenant
|
|
thEvent.Tenant = utils.EmptyString
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1GetThresholdsForEvent,
|
|
thEvent, &ths); err != nil {
|
|
t.Error(err)
|
|
} else if len(ths) != 1 {
|
|
t.Errorf("expecting: 1, received: %+v", utils.ToJSON(ths))
|
|
} else if !reflect.DeepEqual(eTd.TenantID(), ths[0].TenantID()) {
|
|
t.Errorf("expecting: %+v, received: %+v", eTd.TenantID(), ths[0].TenantID())
|
|
} else if !reflect.DeepEqual(eTd.Hits, ths[0].Hits) {
|
|
t.Errorf("expecting: %+v, received: %+v", eTd.Hits, ths[0].Hits)
|
|
}
|
|
|
|
//check threshold after second process ( hits : 2)
|
|
eTd.Hits = 2
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1GetThreshold,
|
|
&utils.TenantIDWithAPIOpts{TenantID: &utils.TenantID{Tenant: "cgrates.org", ID: "TH3"}}, &td); err != nil {
|
|
t.Error(err)
|
|
} else if !reflect.DeepEqual(eTd.Hits, td.Hits) {
|
|
t.Errorf("expecting: %+v, received: %+v", eTd, td)
|
|
}
|
|
|
|
//process event
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1ProcessEvent, thEvent, &ids); err != nil {
|
|
t.Error(err)
|
|
} else if !reflect.DeepEqual(ids, eIDs) {
|
|
t.Errorf("Expecting ids: %s, received: %s", eIDs, ids)
|
|
}
|
|
//check threshold after third process (reached the maximum hits and should be removed)
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1GetThreshold,
|
|
&utils.TenantIDWithAPIOpts{TenantID: &utils.TenantID{Tenant: "cgrates.org", ID: "TH3"}}, &td); err != nil {
|
|
t.Error(err)
|
|
} else if td.Hits != 3 {
|
|
t.Errorf("expected to reach MaxHits")
|
|
}
|
|
}
|
|
|
|
func testV1TSUpdateSnooze(t *testing.T) {
|
|
var reply string
|
|
// check if exist
|
|
if err := tSv1Rpc.Call(context.Background(), utils.APIerSv1GetThresholdProfile,
|
|
&utils.TenantID{Tenant: "cgrates.org", ID: "TH4"}, &reply); err == nil ||
|
|
err.Error() != utils.ErrNotFound.Error() {
|
|
t.Error(err)
|
|
}
|
|
customTh := &engine.ThresholdProfileWithAPIOpts{
|
|
ThresholdProfile: &engine.ThresholdProfile{
|
|
Tenant: "cgrates.org",
|
|
ID: "TH4",
|
|
FilterIDs: []string{"*string:~*req.CustomEv:SnoozeEv"},
|
|
MinSleep: 10 * time.Minute,
|
|
Weight: 100,
|
|
MaxHits: -1,
|
|
},
|
|
}
|
|
//set
|
|
if err := tSv1Rpc.Call(context.Background(), utils.APIerSv1SetThresholdProfile, customTh, &reply); err != nil {
|
|
t.Error(err)
|
|
} else if reply != utils.OK {
|
|
t.Error("Unexpected reply returned", reply)
|
|
}
|
|
|
|
var ids []string
|
|
eIDs := []string{"TH4"}
|
|
thEvent := &utils.CGREvent{ // hitting TH4
|
|
Tenant: "cgrates.org",
|
|
ID: "event1",
|
|
Event: map[string]any{
|
|
"CustomEv": "SnoozeEv",
|
|
},
|
|
APIOpts: map[string]any{
|
|
utils.OptsThresholdsProfileIDs: []string{"TH4"},
|
|
},
|
|
}
|
|
tNow := time.Now()
|
|
//process event
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1ProcessEvent, thEvent, &ids); err != nil {
|
|
t.Error(err)
|
|
} else if !reflect.DeepEqual(ids, eIDs) {
|
|
t.Errorf("Expecting ids: %s, received: %s", eIDs, ids)
|
|
}
|
|
//check threshold after first process ( hits : 1)
|
|
var td engine.Threshold
|
|
eTd := engine.Threshold{Tenant: "cgrates.org", ID: "TH4", Hits: 1}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1GetThreshold,
|
|
&utils.TenantIDWithAPIOpts{TenantID: &utils.TenantID{Tenant: "cgrates.org", ID: "TH4"}}, &td); err != nil {
|
|
t.Error(err)
|
|
} else if !reflect.DeepEqual(eTd.Hits, td.Hits) {
|
|
t.Errorf("expecting: %+v, received: %+v", eTd, td)
|
|
} else if !(td.Snooze.After(tNow.Add(9*time.Minute)) && td.Snooze.Before(tNow.Add(11*time.Minute))) { // Snooze time should be between time.Now + 9 min and time.Now + 11 min
|
|
t.Errorf("expecting: %+v, received: %+v", tNow.Add(10*time.Minute), td.Snooze)
|
|
}
|
|
|
|
customTh2 := &engine.ThresholdProfileWithAPIOpts{
|
|
ThresholdProfile: &engine.ThresholdProfile{
|
|
Tenant: "cgrates.org",
|
|
ID: "TH4",
|
|
FilterIDs: []string{"*string:~*req.CustomEv:SnoozeEv"},
|
|
MinSleep: 5 * time.Minute,
|
|
Weight: 100,
|
|
},
|
|
}
|
|
//set
|
|
if err := tSv1Rpc.Call(context.Background(), utils.APIerSv1SetThresholdProfile, customTh2, &reply); err != nil {
|
|
t.Error(err)
|
|
} else if reply != utils.OK {
|
|
t.Error("Unexpected reply returned", reply)
|
|
}
|
|
|
|
eTd = engine.Threshold{Tenant: "cgrates.org", ID: "TH4"}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1GetThreshold,
|
|
&utils.TenantIDWithAPIOpts{TenantID: &utils.TenantID{Tenant: "cgrates.org", ID: "TH4"}}, &td); err != nil {
|
|
t.Error(err)
|
|
} else if !reflect.DeepEqual(eTd, td) { // the threshold was reseted because the configuration chaged
|
|
t.Errorf("expecting: %+v, received: %+v", eTd, td)
|
|
}
|
|
|
|
}
|
|
|
|
func testV1TSStopEngine(t *testing.T) {
|
|
if err := engine.KillEngine(*utils.WaitRater); err != nil {
|
|
t.Error(err)
|
|
}
|
|
}
|
|
|
|
func testV1TSGetThresholdProfileWithoutTenant(t *testing.T) {
|
|
tPrfl = &engine.ThresholdProfileWithAPIOpts{
|
|
ThresholdProfile: &engine.ThresholdProfile{
|
|
ID: "randomID",
|
|
FilterIDs: []string{"*string:~*req.Account:1001"},
|
|
ActivationInterval: &utils.ActivationInterval{
|
|
ActivationTime: time.Date(2014, 7, 14, 14, 35, 0, 0, time.UTC),
|
|
ExpiryTime: time.Date(2014, 7, 14, 14, 35, 0, 0, time.UTC),
|
|
},
|
|
MaxHits: -1,
|
|
MinSleep: 5 * time.Minute,
|
|
Blocker: false,
|
|
Weight: 20.0,
|
|
ActionIDs: []string{"ACT_1"},
|
|
Async: true,
|
|
},
|
|
}
|
|
var reply string
|
|
if err := tSv1Rpc.Call(context.Background(), utils.APIerSv1SetThresholdProfile, tPrfl, &reply); err != nil {
|
|
t.Error(err)
|
|
} else if reply != utils.OK {
|
|
t.Error("Unexpected reply returned", reply)
|
|
}
|
|
tPrfl.ThresholdProfile.Tenant = "cgrates.org"
|
|
var result *engine.ThresholdProfile
|
|
if err := tSv1Rpc.Call(context.Background(), utils.APIerSv1GetThresholdProfile,
|
|
&utils.TenantID{ID: "randomID"},
|
|
&result); err != nil {
|
|
t.Error(err)
|
|
} else if !reflect.DeepEqual(tPrfl.ThresholdProfile, result) {
|
|
t.Errorf("Expected %+v \n, received %+v", utils.ToJSON(tPrfl.ThresholdProfile), utils.ToJSON(result))
|
|
}
|
|
}
|
|
|
|
func testV1TSRemThresholdProfileWithoutTenant(t *testing.T) {
|
|
var reply string
|
|
if err := tSv1Rpc.Call(context.Background(), utils.APIerSv1RemoveThresholdProfile,
|
|
&utils.TenantIDWithAPIOpts{TenantID: &utils.TenantID{ID: "randomID"}},
|
|
&reply); err != nil {
|
|
t.Error(err)
|
|
} else if reply != utils.OK {
|
|
t.Error("Unexpected reply returned", reply)
|
|
}
|
|
var result *engine.ThresholdProfile
|
|
if err := tSv1Rpc.Call(context.Background(), utils.APIerSv1GetThresholdProfile,
|
|
&utils.TenantID{ID: "randomID"},
|
|
&result); err == nil || utils.ErrNotFound.Error() != err.Error() {
|
|
t.Error(err)
|
|
}
|
|
}
|
|
|
|
func testv1TSGetThresholdProfileIDsCount(t *testing.T) {
|
|
var reply int
|
|
if err := tSv1Rpc.Call(context.Background(), utils.APIerSv1GetThresholdProfileCount,
|
|
&utils.TenantWithAPIOpts{},
|
|
&reply); err != nil {
|
|
t.Error(err)
|
|
} else if reply != 7 {
|
|
t.Errorf("Expected 7, received %+v", reply)
|
|
}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.APIerSv1GetThresholdProfileCount,
|
|
&utils.TenantWithAPIOpts{Tenant: "cgrates.org"},
|
|
&reply); err != nil {
|
|
t.Error(err)
|
|
} else if reply != 7 {
|
|
t.Errorf("Expected 7, received %+v", reply)
|
|
}
|
|
}
|
|
|
|
func testV1TSProcessEventWithoutTenant(t *testing.T) {
|
|
var ids []string
|
|
eIDs := []string{}
|
|
thEvent := &utils.CGREvent{ // hitting TH4
|
|
ID: "event1",
|
|
Event: map[string]any{
|
|
"CustomEv": "SnoozeEv",
|
|
},
|
|
APIOpts: map[string]any{
|
|
utils.OptsThresholdsProfileIDs: []string{"TH4"},
|
|
},
|
|
}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1ProcessEvent, thEvent, &ids); err != nil {
|
|
t.Error(err)
|
|
} else if !reflect.DeepEqual(ids, eIDs) {
|
|
t.Errorf("Expecting ids: %s, received: %s", eIDs, ids)
|
|
}
|
|
}
|
|
|
|
func testV1TSGetThresholdsWithoutTenant(t *testing.T) {
|
|
expectedThreshold := &engine.Threshold{
|
|
Tenant: "cgrates.org",
|
|
ID: "THD_ACNT_BALANCE_1",
|
|
}
|
|
var reply *engine.Threshold
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1GetThreshold,
|
|
&utils.TenantIDWithAPIOpts{TenantID: &utils.TenantID{ID: "THD_ACNT_BALANCE_1"}},
|
|
&reply); err != nil {
|
|
t.Error(err)
|
|
} else if !reflect.DeepEqual(expectedThreshold.ID, reply.ID) {
|
|
t.Errorf("Expected %+v \n, received %+v", utils.ToJSON(expectedThreshold.ID), utils.ToJSON(reply.ID))
|
|
} else if !reflect.DeepEqual(expectedThreshold.Tenant, reply.Tenant) {
|
|
t.Errorf("Expected %+v \n, received %+v", utils.ToJSON(expectedThreshold.Tenant), utils.ToJSON(reply.Tenant))
|
|
} else if !reflect.DeepEqual(expectedThreshold.ID, reply.ID) {
|
|
t.Errorf("Expected %+v \n, received %+v", utils.ToJSON(expectedThreshold.Tenant), utils.ToJSON(reply.Tenant))
|
|
}
|
|
}
|
|
|
|
func testV1TSProcessAccountUpdateEvent(t *testing.T) {
|
|
var result string
|
|
thAcntUpdate := &engine.ThresholdProfileWithAPIOpts{
|
|
ThresholdProfile: &engine.ThresholdProfile{
|
|
Tenant: "cgrates.org",
|
|
ID: "TH_ACNT_UPDATE_EV",
|
|
FilterIDs: []string{
|
|
"*string:~*opts.*eventType:AccountUpdate",
|
|
"*string:~*asm.ID:testV1TSProcessAccountUpdateEvent",
|
|
"*gt:~*asm.BalanceSummaries.HolidayBalance.Value:1.0",
|
|
},
|
|
MaxHits: 10,
|
|
MinSleep: 10 * time.Millisecond,
|
|
Weight: 20.0,
|
|
ActionIDs: []string{"LOG_WARNING"},
|
|
Async: true,
|
|
},
|
|
}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.APIerSv1SetThresholdProfile, thAcntUpdate, &result); err != nil {
|
|
t.Error(err)
|
|
} else if result != utils.OK {
|
|
t.Error("Unexpected reply returned", result)
|
|
}
|
|
var reply *engine.ThresholdProfile
|
|
if err := tSv1Rpc.Call(context.Background(), utils.APIerSv1GetThresholdProfile,
|
|
&utils.TenantID{Tenant: "cgrates.org", ID: "TH_ACNT_UPDATE_EV"}, &reply); err != nil {
|
|
t.Error(err)
|
|
} else if !reflect.DeepEqual(thAcntUpdate.ThresholdProfile, reply) {
|
|
t.Errorf("Expecting: %+v, received: %+v", thAcntUpdate.ThresholdProfile, reply)
|
|
}
|
|
|
|
attrSetBalance := &utils.AttrSetBalance{
|
|
Tenant: "cgrates.org",
|
|
Account: "testV1TSProcessAccountUpdateEvent",
|
|
BalanceType: "*monetary",
|
|
Value: 1.5,
|
|
Balance: map[string]any{
|
|
utils.ID: "HolidayBalance",
|
|
},
|
|
}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.APIerSv1SetBalance, attrSetBalance, &result); err != nil {
|
|
t.Error("Got error on APIerSv1.SetBalance: ", err.Error())
|
|
} else if result != utils.OK {
|
|
t.Errorf("Calling APIerSv1.SetBalance received: %s", result)
|
|
}
|
|
|
|
var acnt *engine.Account
|
|
attrs := &utils.AttrGetAccount{
|
|
Tenant: "cgrates.org",
|
|
Account: "testV1TSProcessAccountUpdateEvent",
|
|
}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.APIerSv2GetAccount, attrs, &acnt); err != nil {
|
|
t.Error(err)
|
|
}
|
|
|
|
acntUpdateEv := &utils.CGREvent{ // hitting TH_ACNT_UPDATE_EV
|
|
Tenant: "cgrates.org",
|
|
ID: "SIMULATE_ACNT_UPDATE_EV",
|
|
Event: acnt.AsAccountSummary().AsMapInterface(),
|
|
APIOpts: map[string]any{
|
|
utils.MetaEventType: utils.AccountUpdate,
|
|
},
|
|
}
|
|
|
|
var ids []string
|
|
eIDs := []string{"TH_ACNT_UPDATE_EV"}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1ProcessEvent, acntUpdateEv, &ids); err != nil {
|
|
t.Error(err)
|
|
} else if !reflect.DeepEqual(ids, eIDs) {
|
|
t.Errorf("Expecting ids: %s, received: %s", eIDs, ids)
|
|
}
|
|
|
|
}
|
|
|
|
func testV1TSResetThresholdsWithoutTenant(t *testing.T) {
|
|
expectedThreshold := &engine.Threshold{
|
|
Tenant: "cgrates.org",
|
|
ID: "THD_ACNT_BALANCE_1",
|
|
Hits: 1,
|
|
}
|
|
var reply *engine.Threshold
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1GetThreshold,
|
|
&utils.TenantIDWithAPIOpts{TenantID: &utils.TenantID{ID: "THD_ACNT_BALANCE_1"}},
|
|
&reply); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
reply.Snooze = expectedThreshold.Snooze
|
|
if !reflect.DeepEqual(expectedThreshold, reply) {
|
|
t.Errorf("Expected %+v \n, received %+v", utils.ToJSON(expectedThreshold), utils.ToJSON(reply))
|
|
}
|
|
var result string
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1ResetThreshold,
|
|
&utils.TenantIDWithAPIOpts{TenantID: &utils.TenantID{ID: "THD_ACNT_BALANCE_1"}},
|
|
&result); err != nil {
|
|
t.Fatal(err)
|
|
} else if result != utils.OK {
|
|
t.Errorf("Expected %+v \n, received %+v", utils.OK, result)
|
|
}
|
|
expectedThreshold.Hits = 0
|
|
reply = nil
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1GetThreshold,
|
|
&utils.TenantIDWithAPIOpts{TenantID: &utils.TenantID{ID: "THD_ACNT_BALANCE_1"}},
|
|
&reply); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
reply.Snooze = expectedThreshold.Snooze
|
|
if !reflect.DeepEqual(expectedThreshold, reply) {
|
|
t.Errorf("Expected %+v \n, received %+v", utils.ToJSON(expectedThreshold), utils.ToJSON(reply))
|
|
}
|
|
}
|
|
|
|
func testV1ThresholdStopCPUProfiling(t *testing.T) {
|
|
argPath := "/tmp/cpu.prof"
|
|
var reply string
|
|
if err := tSv1Rpc.Call(context.Background(), utils.CoreSv1StopCPUProfiling,
|
|
new(utils.DirectoryArgs), &reply); err != nil {
|
|
t.Error(err)
|
|
}
|
|
file, err := os.Open(argPath)
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
defer file.Close()
|
|
|
|
//compare the size
|
|
size, err := file.Stat()
|
|
if err != nil {
|
|
t.Error(err)
|
|
} else if size.Size() < int64(300) {
|
|
t.Errorf("Size of CPUProfile %v is lower that expected", size.Size())
|
|
}
|
|
//after we checked that CPUProfile was made successfully, can delete it
|
|
if err := os.Remove(argPath); err != nil {
|
|
t.Error(err)
|
|
}
|
|
}
|
|
|
|
func testThresholdSCacheProcessEventNotFound(t *testing.T) {
|
|
var ids []string
|
|
thEvent := &utils.CGREvent{
|
|
Tenant: "cgrates.org",
|
|
ID: "THRESHOLD_CACHE",
|
|
Event: map[string]any{
|
|
"CustomEv": "SnoozeEv",
|
|
},
|
|
APIOpts: map[string]any{
|
|
utils.OptsThresholdsProfileIDs: []string{"THRESHOLD_CACHE"},
|
|
},
|
|
}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1ProcessEvent, thEvent, &ids); err == nil || err.Error() != utils.ErrNotFound.Error() {
|
|
t.Error(err)
|
|
}
|
|
}
|
|
|
|
func testThresholdSCacheProcessEventFound(t *testing.T) {
|
|
var ids []string
|
|
thEvent := &utils.CGREvent{
|
|
Tenant: "cgrates.org",
|
|
ID: "THRESHOLD_CACHE",
|
|
Event: map[string]any{
|
|
"CustomEv": "SnoozeEv",
|
|
},
|
|
APIOpts: map[string]any{
|
|
utils.OptsThresholdsProfileIDs: []string{"THRESHOLD_CACHE"},
|
|
},
|
|
}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.ThresholdSv1ProcessEvent, thEvent, &ids); err != nil {
|
|
t.Error(err)
|
|
}
|
|
}
|
|
|
|
func testThresholdSCacheSet(t *testing.T) {
|
|
var result string
|
|
tPrfl = &engine.ThresholdProfileWithAPIOpts{
|
|
ThresholdProfile: &engine.ThresholdProfile{
|
|
Tenant: "cgrates.org",
|
|
ID: "THRESHOLD_CACHE",
|
|
},
|
|
APIOpts: map[string]any{
|
|
utils.CacheOpt: utils.MetaNone,
|
|
},
|
|
}
|
|
if err := tSv1Rpc.Call(context.Background(), utils.APIerSv1SetThresholdProfile, tPrfl, &result); err != nil {
|
|
t.Error(err)
|
|
} else if result != utils.OK {
|
|
t.Error("Unexpected reply returned", result)
|
|
}
|
|
}
|
|
|
|
func testThresholdSCacheReload(t *testing.T) {
|
|
cache := &utils.AttrReloadCacheWithAPIOpts{
|
|
ThresholdProfileIDs: []string{"cgrates.org:THRESHOLD_CACHE"},
|
|
}
|
|
var reply string
|
|
if err := tSv1Rpc.Call(context.Background(), utils.CacheSv1ReloadCache, cache, &reply); err != nil {
|
|
t.Error("Got error on CacheSv1.ReloadCache: ", err.Error())
|
|
} else if reply != utils.OK {
|
|
t.Error("Calling CacheSv1.ReloadCache got reply: ", reply)
|
|
}
|
|
}
|