mirror of
https://github.com/cgrates/cgrates.git
synced 2026-02-11 18:16:24 +05:00
1345 lines
47 KiB
Go
1345 lines
47 KiB
Go
//go:build integration
|
|
// +build integration
|
|
|
|
/*
|
|
Real-time Online/Offline Charging System (OCS) for Telecom & ISP environments
|
|
Copyright (C) ITsysCOM GmbH
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>
|
|
*/
|
|
|
|
package agents
|
|
|
|
import (
|
|
"bytes"
|
|
"fmt"
|
|
"os/exec"
|
|
"path"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/cgrates/birpc"
|
|
"github.com/cgrates/birpc/context"
|
|
"github.com/cgrates/cgrates/config"
|
|
"github.com/cgrates/cgrates/engine"
|
|
"github.com/cgrates/cgrates/sessions"
|
|
"github.com/cgrates/cgrates/utils"
|
|
"github.com/cgrates/radigo"
|
|
)
|
|
|
|
var (
|
|
raonfigDIR string
|
|
raCfgPath string
|
|
raCfg *config.CGRConfig
|
|
raAuthClnt, raAcctClnt *radigo.Client
|
|
raRPC *birpc.Client
|
|
|
|
sTestsRadius = []func(t *testing.T){
|
|
testRAitInitCfg,
|
|
testRAitResetDataDb,
|
|
testRAitResetStorDb,
|
|
testRAitStartEngine,
|
|
testRAitApierRpcConn,
|
|
testRAitTPFromFolder,
|
|
testRAitAuthPAPSuccess,
|
|
testRAitAuthPAPSuccessTCP,
|
|
testRAitAuthPAPFail,
|
|
testRAitAuthPAPFailTCP,
|
|
testRAitMandatoryFail,
|
|
testRAitMandatoryFailTCP,
|
|
testRAitWithVendor,
|
|
testRAitWithVendorTCP,
|
|
testRAitAuthCHAPSuccess,
|
|
testRAitAuthCHAPSuccessTCP,
|
|
testRAitAuthCHAPFail,
|
|
testRAitAuthCHAPFailTCP,
|
|
testRAitAuthMSCHAPV2Success,
|
|
testRAitAuthMSCHAPV2SuccessTCP,
|
|
testRAitAuthMSCHAPV2Fail,
|
|
testRAitAuthMSCHAPV2FailTCP,
|
|
testRAitChallenge,
|
|
testRAitChallengeTCP,
|
|
testRAitChallengeResponse,
|
|
testRAitChallengeResponseTCP,
|
|
testRAitAcctStart,
|
|
testRAitAcctStartTCP,
|
|
testRAitAcctStop,
|
|
testRAitStopCgrEngine,
|
|
}
|
|
)
|
|
|
|
// Test start here
|
|
func TestRAit(t *testing.T) {
|
|
// engine.KillEngine(0)
|
|
switch *utils.DBType {
|
|
case utils.MetaInternal:
|
|
raonfigDIR = "radagent_internal"
|
|
case utils.MetaMySQL:
|
|
raonfigDIR = "radagent_mysql"
|
|
case utils.MetaMongo:
|
|
raonfigDIR = "radagent_mongo"
|
|
case utils.MetaPostgres:
|
|
t.SkipNow()
|
|
default:
|
|
t.Fatal("Unknown Database type")
|
|
}
|
|
if *utils.Encoding == utils.MetaGOB {
|
|
raonfigDIR += "_gob"
|
|
}
|
|
for _, stest := range sTestsRadius {
|
|
t.Run(raonfigDIR, stest)
|
|
}
|
|
}
|
|
|
|
func TestRAitDispatcher(t *testing.T) {
|
|
engine.KillEngine(100)
|
|
if *utils.Encoding == utils.MetaGOB {
|
|
t.SkipNow()
|
|
return
|
|
}
|
|
isDispatcherActive = true
|
|
engine.StartEngine(path.Join(*utils.DataDir, "conf", "samples", "dispatchers", "all"), 400)
|
|
engine.StartEngine(path.Join(*utils.DataDir, "conf", "samples", "dispatchers", "all2"), 400)
|
|
raonfigDIR = "dispatchers/radagent"
|
|
testRadiusitResetAllDB(t)
|
|
for _, stest := range sTestsRadius {
|
|
t.Run(diamConfigDIR, stest)
|
|
}
|
|
engine.KillEngine(100)
|
|
isDispatcherActive = false
|
|
}
|
|
|
|
func testRAitInitCfg(t *testing.T) {
|
|
raCfgPath = path.Join(*utils.DataDir, "conf", "samples", raonfigDIR)
|
|
// Init config first
|
|
var err error
|
|
raCfg, err = config.NewCGRConfigFromPath(raCfgPath)
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
if isDispatcherActive {
|
|
raCfg.ListenCfg().RPCJSONListen = ":6012"
|
|
}
|
|
}
|
|
|
|
func testRadiusitResetAllDB(t *testing.T) {
|
|
cfgPath1 := path.Join(*utils.DataDir, "conf", "samples", "dispatchers", "all")
|
|
allCfg, err := config.NewCGRConfigFromPath(cfgPath1)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if err := engine.InitDataDB(allCfg); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if err := engine.InitStorDb(allCfg); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
// Remove data in both rating and accounting db
|
|
func testRAitResetDataDb(t *testing.T) {
|
|
if err := engine.InitDataDB(raCfg); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
// Wipe out the cdr database
|
|
func testRAitResetStorDb(t *testing.T) {
|
|
if err := engine.InitStorDb(raCfg); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
// Start CGR Engine
|
|
func testRAitStartEngine(t *testing.T) {
|
|
if _, err := engine.StartEngine(raCfgPath, *utils.WaitRater); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
// Connect rpc client to rater
|
|
func testRAitApierRpcConn(t *testing.T) {
|
|
var err error
|
|
raRPC, err = newRPCClient(raCfg.ListenCfg()) // We connect over JSON so we can also troubleshoot if needed
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
// Load the tariff plan, creating accounts and their balances
|
|
func testRAitTPFromFolder(t *testing.T) {
|
|
attrs := &utils.AttrLoadTpFromFolder{FolderPath: path.Join(*utils.DataDir, "tariffplans", "oldtutorial")}
|
|
var loadInst utils.LoadInstance
|
|
if err := raRPC.Call(context.Background(), utils.APIerSv2LoadTariffPlanFromFolder, attrs, &loadInst); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if isDispatcherActive {
|
|
testRadiusitTPLoadData(t)
|
|
}
|
|
time.Sleep(time.Duration(*utils.WaitRater) * time.Millisecond) // Give time for scheduler to execute topups
|
|
}
|
|
|
|
func testRadiusitTPLoadData(t *testing.T) {
|
|
wchan := make(chan struct{}, 1)
|
|
go func() {
|
|
loaderPath, err := exec.LookPath("cgr-loader")
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
loader := exec.Command(loaderPath, "-config_path", raCfgPath, "-path", path.Join(*utils.DataDir, "tariffplans", "dispatchers"))
|
|
|
|
if err := loader.Start(); err != nil {
|
|
t.Error(err)
|
|
}
|
|
loader.Wait()
|
|
wchan <- struct{}{}
|
|
}()
|
|
select {
|
|
case <-wchan:
|
|
case <-time.After(5 * time.Second):
|
|
t.Errorf("cgr-loader failed: ")
|
|
}
|
|
}
|
|
|
|
func testRAitAuthPAPSuccess(t *testing.T) {
|
|
if raAuthClnt, err = radigo.NewClient(utils.UDP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps()
|
|
if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("User-Password", "CGRateSPassword1", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
// encode the password as required so we can decode it properly
|
|
authReq.AVPs[1].RawValue = radigo.EncodeUserPassword([]byte("CGRateSPassword1"), []byte("CGRateS.org"), authReq.Authenticator[:])
|
|
if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Sip-From-Tag", "51585361", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
reply, err := raAuthClnt.SendRequest(authReq)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if reply.Code != radigo.AccessAccept {
|
|
t.Errorf("Received reply: %+v", utils.ToJSON(reply))
|
|
}
|
|
if len(reply.AVPs) != 1 { // make sure max duration is received
|
|
t.Errorf("Received AVPs: %+v", utils.ToJSON(reply.AVPs))
|
|
} else if !bytes.Equal([]byte("session_max_time#10800"), reply.AVPs[0].RawValue) {
|
|
t.Errorf("Received: %s", string(reply.AVPs[0].RawValue))
|
|
}
|
|
}
|
|
func testRAitAuthPAPSuccessTCP(t *testing.T) {
|
|
if raAuthClnt, err = radigo.NewClient(utils.TCP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps()
|
|
if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("User-Password", "CGRateSPassword1", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
// encode the password as required so we can decode it properly
|
|
authReq.AVPs[1].RawValue = radigo.EncodeUserPassword([]byte("CGRateSPassword1"), []byte("CGRateS.org"), authReq.Authenticator[:])
|
|
if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Sip-From-Tag", "51585361", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
reply, err := raAuthClnt.SendRequest(authReq)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if reply.Code != radigo.AccessAccept {
|
|
t.Errorf("Received reply: %+v", utils.ToJSON(reply))
|
|
}
|
|
if len(reply.AVPs) != 1 { // make sure max duration is received
|
|
t.Errorf("Received AVPs: %+v", utils.ToJSON(reply.AVPs))
|
|
} else if !bytes.Equal([]byte("session_max_time#10800"), reply.AVPs[0].RawValue) {
|
|
t.Errorf("Received: %s", string(reply.AVPs[0].RawValue))
|
|
}
|
|
}
|
|
|
|
func testRAitAuthPAPFail(t *testing.T) {
|
|
if raAuthClnt, err = radigo.NewClient(utils.UDP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps()
|
|
if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("User-Password", "CGRateSPassword2", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
// encode the password as required so we can decode it properly
|
|
authReq.AVPs[1].RawValue = radigo.EncodeUserPassword([]byte("CGRateSPassword2"), []byte("CGRateS.org"), authReq.Authenticator[:])
|
|
if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Sip-From-Tag", "51585361", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
reply, err := raAuthClnt.SendRequest(authReq)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if reply.Code != radigo.AccessReject {
|
|
t.Errorf("Received reply: %+v", reply)
|
|
}
|
|
if len(reply.AVPs) != 1 { // make sure max duration is received
|
|
t.Errorf("Received AVPs: %+v", reply.AVPs)
|
|
} else if utils.RadauthFailed != string(reply.AVPs[0].RawValue) {
|
|
t.Errorf("Received: %s", string(reply.AVPs[0].RawValue))
|
|
}
|
|
}
|
|
|
|
func testRAitAuthPAPFailTCP(t *testing.T) {
|
|
if raAuthClnt, err = radigo.NewClient(utils.TCP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps()
|
|
if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("User-Password", "CGRateSPassword2", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
// encode the password as required so we can decode it properly
|
|
authReq.AVPs[1].RawValue = radigo.EncodeUserPassword([]byte("CGRateSPassword2"), []byte("CGRateS.org"), authReq.Authenticator[:])
|
|
if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Sip-From-Tag", "51585361", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
reply, err := raAuthClnt.SendRequest(authReq)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if reply.Code != radigo.AccessReject {
|
|
t.Errorf("Received reply: %+v", reply)
|
|
}
|
|
if len(reply.AVPs) != 1 { // make sure max duration is received
|
|
t.Errorf("Received AVPs: %+v", reply.AVPs)
|
|
} else if utils.RadauthFailed != string(reply.AVPs[0].RawValue) {
|
|
t.Errorf("Received: %s", string(reply.AVPs[0].RawValue))
|
|
}
|
|
}
|
|
|
|
func testRAitMandatoryFail(t *testing.T) {
|
|
if raAuthClnt, err = radigo.NewClient(utils.UDP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1)
|
|
if err := authReq.AddAVPWithName("User-Name", "10011", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("User-Password", "CGRateSPassword3", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
authReq.AVPs[1].RawValue = radigo.EncodeUserPassword([]byte("CGRateSPassword3"), []byte("CGRateS.org"), authReq.Authenticator[:])
|
|
reply, err := raAuthClnt.SendRequest(authReq)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if reply.Code != radigo.AccessReject {
|
|
t.Errorf("Received reply: %+v", reply)
|
|
}
|
|
exp := "ATTRIBUTES_ERROR:" + utils.MandatoryIEMissingCaps + ": [RadReplyMessage]"
|
|
if len(reply.AVPs) != 1 {
|
|
t.Errorf("Received AVPs: %+v", reply.AVPs)
|
|
} else if exp != string(reply.AVPs[0].RawValue) {
|
|
t.Errorf("Expected <%+v>, Received: <%+v>", exp, string(reply.AVPs[0].RawValue))
|
|
}
|
|
}
|
|
|
|
func testRAitMandatoryFailTCP(t *testing.T) {
|
|
if raAuthClnt, err = radigo.NewClient(utils.TCP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1)
|
|
if err := authReq.AddAVPWithName("User-Name", "10011", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("User-Password", "CGRateSPassword3", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
authReq.AVPs[1].RawValue = radigo.EncodeUserPassword([]byte("CGRateSPassword3"), []byte("CGRateS.org"), authReq.Authenticator[:])
|
|
reply, err := raAuthClnt.SendRequest(authReq)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if reply.Code != radigo.AccessReject {
|
|
t.Errorf("Received reply: %+v", reply)
|
|
}
|
|
exp := "ATTRIBUTES_ERROR:" + utils.MandatoryIEMissingCaps + ": [RadReplyMessage]"
|
|
if len(reply.AVPs) != 1 {
|
|
t.Errorf("Received AVPs: %+v", reply.AVPs)
|
|
} else if exp != string(reply.AVPs[0].RawValue) {
|
|
t.Errorf("Expected <%+v>, Received: <%+v>", exp, string(reply.AVPs[0].RawValue))
|
|
}
|
|
}
|
|
|
|
func testRAitWithVendor(t *testing.T) {
|
|
if raAuthClnt, err = radigo.NewClient(utils.UDP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1)
|
|
if err := authReq.AddAVPWithName("User-Name", "10012", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("User-Password", "CGRateSPassword3", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
authReq.AVPs[1].RawValue = radigo.EncodeUserPassword([]byte("CGRateSPassword3"), []byte("CGRateS.org"), authReq.Authenticator[:])
|
|
reply, err := raAuthClnt.SendRequest(authReq)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if reply.Code != radigo.AccessAccept {
|
|
t.Errorf("Received reply: %+v", reply)
|
|
}
|
|
if len(reply.AVPs) != 3 {
|
|
t.Errorf("Received AVPs: %+v", reply.AVPs)
|
|
} else if string(reply.AVPs[0].RawValue) != "\x00\x00\x00\x00*\bClass1" {
|
|
t.Errorf("Expected <%+q>, Received: <%+q>", "\x00\x00\x00\x00*\bClass1", string(reply.AVPs[0].RawValue))
|
|
} else if string(reply.AVPs[1].RawValue) != "\x00\x00\x00\x00*\bClass2" {
|
|
t.Errorf("Expected <%q>, Received: <%q>", "\x00\x00\x00\x00*\bClass2", string(reply.AVPs[1].RawValue))
|
|
} else if string(reply.AVPs[2].RawValue) != "\x00\x00\x00\x00*\bClass3" {
|
|
t.Errorf("Expected <%q>, Received: <%q>", "\x00\x00\x00\x00*\bClass3", string(reply.AVPs[2].RawValue))
|
|
}
|
|
}
|
|
|
|
func testRAitWithVendorTCP(t *testing.T) {
|
|
if raAuthClnt, err = radigo.NewClient(utils.TCP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1)
|
|
if err := authReq.AddAVPWithName("User-Name", "10012", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("User-Password", "CGRateSPassword3", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
authReq.AVPs[1].RawValue = radigo.EncodeUserPassword([]byte("CGRateSPassword3"), []byte("CGRateS.org"), authReq.Authenticator[:])
|
|
reply, err := raAuthClnt.SendRequest(authReq)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if reply.Code != radigo.AccessAccept {
|
|
t.Errorf("Received reply: %+v", reply)
|
|
}
|
|
if len(reply.AVPs) != 3 {
|
|
t.Errorf("Received AVPs: %+v", reply.AVPs)
|
|
} else if string(reply.AVPs[0].RawValue) != "\x00\x00\x00\x00*\bClass1" {
|
|
t.Errorf("Expected <%+q>, Received: <%+q>", "\x00\x00\x00\x00*\bClass1", string(reply.AVPs[0].RawValue))
|
|
} else if string(reply.AVPs[1].RawValue) != "\x00\x00\x00\x00*\bClass2" {
|
|
t.Errorf("Expected <%q>, Received: <%q>", "\x00\x00\x00\x00*\bClass2", string(reply.AVPs[1].RawValue))
|
|
} else if string(reply.AVPs[2].RawValue) != "\x00\x00\x00\x00*\bClass3" {
|
|
t.Errorf("Expected <%q>, Received: <%q>", "\x00\x00\x00\x00*\bClass3", string(reply.AVPs[2].RawValue))
|
|
}
|
|
}
|
|
|
|
func testRAitAuthCHAPSuccess(t *testing.T) {
|
|
if raAuthClnt, err = radigo.NewClient(utils.UDP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps()
|
|
if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("CHAP-Password", "CGRateSPassword1", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
authReq.AVPs[1].RawValue = radigo.EncodeCHAPPassword([]byte("CGRateSPassword1"), authReq.Authenticator[:])
|
|
if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Sip-From-Tag", "51585362", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
reply, err := raAuthClnt.SendRequest(authReq)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if reply.Code != radigo.AccessAccept {
|
|
t.Errorf("Received reply: %+v", utils.ToJSON(reply))
|
|
}
|
|
if len(reply.AVPs) != 1 { // make sure max duration is received
|
|
t.Errorf("Received AVPs: %+v", utils.ToJSON(reply.AVPs))
|
|
} else if !bytes.Equal([]byte("session_max_time#10800"), reply.AVPs[0].RawValue) {
|
|
t.Errorf("Received: %s", string(reply.AVPs[0].RawValue))
|
|
}
|
|
}
|
|
|
|
func testRAitAuthCHAPSuccessTCP(t *testing.T) {
|
|
if raAuthClnt, err = radigo.NewClient(utils.TCP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps()
|
|
if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("CHAP-Password", "CGRateSPassword1", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
authReq.AVPs[1].RawValue = radigo.EncodeCHAPPassword([]byte("CGRateSPassword1"), authReq.Authenticator[:])
|
|
if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Sip-From-Tag", "51585362", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
reply, err := raAuthClnt.SendRequest(authReq)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if reply.Code != radigo.AccessAccept {
|
|
t.Errorf("Received reply: %+v", utils.ToJSON(reply))
|
|
}
|
|
if len(reply.AVPs) != 1 { // make sure max duration is received
|
|
t.Errorf("Received AVPs: %+v", utils.ToJSON(reply.AVPs))
|
|
} else if !bytes.Equal([]byte("session_max_time#10800"), reply.AVPs[0].RawValue) {
|
|
t.Errorf("Received: %s", string(reply.AVPs[0].RawValue))
|
|
}
|
|
}
|
|
|
|
func testRAitAuthCHAPFail(t *testing.T) {
|
|
if raAuthClnt, err = radigo.NewClient(utils.UDP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps()
|
|
if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("CHAP-Password", "CGRateSPassword2", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
authReq.AVPs[1].RawValue = radigo.EncodeCHAPPassword([]byte("CGRateSPassword2"), authReq.Authenticator[:])
|
|
if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Sip-From-Tag", "51585362", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
reply, err := raAuthClnt.SendRequest(authReq)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if reply.Code != radigo.AccessReject {
|
|
t.Errorf("Received reply: %+v", reply)
|
|
}
|
|
if len(reply.AVPs) != 1 { // make sure max duration is received
|
|
t.Errorf("Received AVPs: %+v", reply.AVPs)
|
|
} else if utils.RadauthFailed != string(reply.AVPs[0].RawValue) {
|
|
t.Errorf("Received: %s", string(reply.AVPs[0].RawValue))
|
|
}
|
|
}
|
|
|
|
func testRAitAuthCHAPFailTCP(t *testing.T) {
|
|
if raAuthClnt, err = radigo.NewClient(utils.TCP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps()
|
|
if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("CHAP-Password", "CGRateSPassword2", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
authReq.AVPs[1].RawValue = radigo.EncodeCHAPPassword([]byte("CGRateSPassword2"), authReq.Authenticator[:])
|
|
if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Sip-From-Tag", "51585362", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
reply, err := raAuthClnt.SendRequest(authReq)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if reply.Code != radigo.AccessReject {
|
|
t.Errorf("Received reply: %+v", reply)
|
|
}
|
|
if len(reply.AVPs) != 1 { // make sure max duration is received
|
|
t.Errorf("Received AVPs: %+v", reply.AVPs)
|
|
} else if utils.RadauthFailed != string(reply.AVPs[0].RawValue) {
|
|
t.Errorf("Received: %s", string(reply.AVPs[0].RawValue))
|
|
}
|
|
}
|
|
|
|
func testRAitAuthMSCHAPV2Success(t *testing.T) {
|
|
for _, dictPath := range raCfg.RadiusAgentCfg().ClientDictionaries {
|
|
if dictRad, err = radigo.NewDictionaryFromFoldersWithRFC2865(dictPath); err != nil {
|
|
return
|
|
}
|
|
}
|
|
if raAuthClnt, err = radigo.NewClient(utils.UDP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps()
|
|
if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("MS-CHAP-Challenge", string(authReq.Authenticator[:]), "Microsoft"); err != nil {
|
|
t.Error(err)
|
|
}
|
|
|
|
respVal, err := radigo.GenerateClientMSCHAPResponse(authReq.Authenticator, "1001", "CGRateSPassword1")
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("MS-CHAP-Response", string(respVal), "Microsoft"); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Sip-From-Tag", "51585363", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
reply, err := raAuthClnt.SendRequest(authReq)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if reply.Code != radigo.AccessAccept {
|
|
t.Errorf("Received reply: %+v", utils.ToJSON(reply))
|
|
}
|
|
if len(reply.AVPs) != 2 { // make sure max duration is received
|
|
t.Errorf("Received AVPs: %+v", utils.ToJSON(reply.AVPs))
|
|
} else {
|
|
for _, avp := range reply.AVPs {
|
|
if avp.Number == 26 && len(avp.RawValue) != 49 {
|
|
t.Errorf("Unexpected lenght of MS-CHAP2-Success AVP: %+v", len(avp.RawValue))
|
|
}
|
|
if avp.Number == 225 && !bytes.Equal([]byte("session_max_time#10800"), reply.AVPs[1].RawValue) {
|
|
t.Errorf("Received: %s", string(reply.AVPs[0].RawValue))
|
|
}
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
func testRAitAuthMSCHAPV2SuccessTCP(t *testing.T) {
|
|
for _, dictPath := range raCfg.RadiusAgentCfg().ClientDictionaries {
|
|
if dictRad, err = radigo.NewDictionaryFromFoldersWithRFC2865(dictPath); err != nil {
|
|
return
|
|
}
|
|
}
|
|
if raAuthClnt, err = radigo.NewClient(utils.TCP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps()
|
|
if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("MS-CHAP-Challenge", string(authReq.Authenticator[:]), "Microsoft"); err != nil {
|
|
t.Error(err)
|
|
}
|
|
|
|
respVal, err := radigo.GenerateClientMSCHAPResponse(authReq.Authenticator, "1001", "CGRateSPassword1")
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("MS-CHAP-Response", string(respVal), "Microsoft"); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Sip-From-Tag", "51585363", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
reply, err := raAuthClnt.SendRequest(authReq)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if reply.Code != radigo.AccessAccept {
|
|
t.Errorf("Received reply: %+v", utils.ToJSON(reply))
|
|
}
|
|
if len(reply.AVPs) != 2 { // make sure max duration is received
|
|
t.Errorf("Received AVPs: %+v", utils.ToJSON(reply.AVPs))
|
|
} else {
|
|
for _, avp := range reply.AVPs {
|
|
if avp.Number == 26 && len(avp.RawValue) != 49 {
|
|
t.Errorf("Unexpected lenght of MS-CHAP2-Success AVP: %+v", len(avp.RawValue))
|
|
}
|
|
if avp.Number == 225 && !bytes.Equal([]byte("session_max_time#10800"), reply.AVPs[1].RawValue) {
|
|
t.Errorf("Received: %s", string(reply.AVPs[0].RawValue))
|
|
}
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
func testRAitAuthMSCHAPV2Fail(t *testing.T) {
|
|
for _, dictPath := range raCfg.RadiusAgentCfg().ClientDictionaries {
|
|
if dictRad, err = radigo.NewDictionaryFromFoldersWithRFC2865(dictPath); err != nil {
|
|
return
|
|
}
|
|
}
|
|
if raAuthClnt, err = radigo.NewClient(utils.UDP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps()
|
|
if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("MS-CHAP-Challenge", string(authReq.Authenticator[:]), "Microsoft"); err != nil {
|
|
t.Error(err)
|
|
}
|
|
respVal, err := radigo.GenerateClientMSCHAPResponse(authReq.Authenticator, "1001", "CGRateSPassword2")
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("MS-CHAP-Response", string(respVal), "Microsoft"); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Sip-From-Tag", "51585363", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
reply, err := raAuthClnt.SendRequest(authReq)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if reply.Code != radigo.AccessReject {
|
|
t.Errorf("Received reply: %+v", reply)
|
|
}
|
|
if len(reply.AVPs) != 1 { // make sure max duration is received
|
|
t.Errorf("Received AVPs: %+v", reply.AVPs)
|
|
} else if utils.RadauthFailed != string(reply.AVPs[0].RawValue) {
|
|
t.Errorf("Received: %s", string(reply.AVPs[0].RawValue))
|
|
}
|
|
}
|
|
|
|
func testRAitAuthMSCHAPV2FailTCP(t *testing.T) {
|
|
for _, dictPath := range raCfg.RadiusAgentCfg().ClientDictionaries {
|
|
if dictRad, err = radigo.NewDictionaryFromFoldersWithRFC2865(dictPath); err != nil {
|
|
return
|
|
}
|
|
}
|
|
if raAuthClnt, err = radigo.NewClient(utils.TCP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps()
|
|
if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("MS-CHAP-Challenge", string(authReq.Authenticator[:]), "Microsoft"); err != nil {
|
|
t.Error(err)
|
|
}
|
|
respVal, err := radigo.GenerateClientMSCHAPResponse(authReq.Authenticator, "1001", "CGRateSPassword2")
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("MS-CHAP-Response", string(respVal), "Microsoft"); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Sip-From-Tag", "51585363", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
reply, err := raAuthClnt.SendRequest(authReq)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if reply.Code != radigo.AccessReject {
|
|
t.Errorf("Received reply: %+v", reply)
|
|
}
|
|
if len(reply.AVPs) != 1 { // make sure max duration is received
|
|
t.Errorf("Received AVPs: %+v", reply.AVPs)
|
|
} else if utils.RadauthFailed != string(reply.AVPs[0].RawValue) {
|
|
t.Errorf("Received: %s", string(reply.AVPs[0].RawValue))
|
|
}
|
|
}
|
|
|
|
func testRAitChallenge(t *testing.T) {
|
|
if raAuthClnt, err = radigo.NewClient(utils.UDP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps()
|
|
if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Sip-From-Tag", "12345678", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
reply, err := raAuthClnt.SendRequest(authReq)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if reply.Code != radigo.AccessChallenge {
|
|
t.Errorf("Received reply: %+v", utils.ToJSON(reply))
|
|
}
|
|
if len(reply.AVPs) != 1 { // make sure the client receive the message
|
|
t.Errorf("Received AVPs: %+v", utils.ToJSON(reply.AVPs))
|
|
} else if !bytes.Equal([]byte("Missing User-Password"), reply.AVPs[0].RawValue) {
|
|
t.Errorf("Received: %s", string(reply.AVPs[0].RawValue))
|
|
}
|
|
}
|
|
|
|
func testRAitChallengeTCP(t *testing.T) {
|
|
if raAuthClnt, err = radigo.NewClient(utils.TCP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps()
|
|
if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Sip-From-Tag", "12345678", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
reply, err := raAuthClnt.SendRequest(authReq)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if reply.Code != radigo.AccessChallenge {
|
|
t.Errorf("Received reply: %+v", utils.ToJSON(reply))
|
|
}
|
|
if len(reply.AVPs) != 1 { // make sure the client receive the message
|
|
t.Errorf("Received AVPs: %+v", utils.ToJSON(reply.AVPs))
|
|
} else if !bytes.Equal([]byte("Missing User-Password"), reply.AVPs[0].RawValue) {
|
|
t.Errorf("Received: %s", string(reply.AVPs[0].RawValue))
|
|
}
|
|
}
|
|
|
|
func testRAitChallengeResponse(t *testing.T) {
|
|
if raAuthClnt, err = radigo.NewClient(utils.UDP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps()
|
|
if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("User-Password", "CGRateSPassword1", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
// encode the password as required so we can decode it properly
|
|
authReq.AVPs[1].RawValue = radigo.EncodeUserPassword([]byte("CGRateSPassword1"), []byte("CGRateS.org"), authReq.Authenticator[:])
|
|
if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Sip-From-Tag", "12345678", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
reply, err := raAuthClnt.SendRequest(authReq)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if reply.Code != radigo.AccessAccept {
|
|
t.Errorf("Received reply: %+v", utils.ToJSON(reply))
|
|
}
|
|
if len(reply.AVPs) != 1 { // make sure max duration is received
|
|
t.Errorf("Received AVPs: %+v", utils.ToJSON(reply.AVPs))
|
|
} else if !bytes.Equal([]byte("session_max_time#10800"), reply.AVPs[0].RawValue) {
|
|
t.Errorf("Received: %s", string(reply.AVPs[0].RawValue))
|
|
}
|
|
}
|
|
|
|
func testRAitChallengeResponseTCP(t *testing.T) {
|
|
if raAuthClnt, err = radigo.NewClient(utils.TCP, "127.0.0.1:1812", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
authReq := raAuthClnt.NewRequest(radigo.AccessRequest, 1) // emulates Kamailio packet out of radius_load_caller_avps()
|
|
if err := authReq.AddAVPWithName("User-Name", "1001", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("User-Password", "CGRateSPassword1", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
// encode the password as required so we can decode it properly
|
|
authReq.AVPs[1].RawValue = radigo.EncodeUserPassword([]byte("CGRateSPassword1"), []byte("CGRateS.org"), authReq.Authenticator[:])
|
|
if err := authReq.AddAVPWithName("Service-Type", "SIP-Caller-AVPs", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Sip-From-Tag", "12345678", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := authReq.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
reply, err := raAuthClnt.SendRequest(authReq)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if reply.Code != radigo.AccessAccept {
|
|
t.Errorf("Received reply: %+v", utils.ToJSON(reply))
|
|
}
|
|
if len(reply.AVPs) != 1 { // make sure max duration is received
|
|
t.Errorf("Received AVPs: %+v", utils.ToJSON(reply.AVPs))
|
|
} else if !bytes.Equal([]byte("session_max_time#10800"), reply.AVPs[0].RawValue) {
|
|
t.Errorf("Received: %s", string(reply.AVPs[0].RawValue))
|
|
}
|
|
}
|
|
|
|
func testRAitAcctStart(t *testing.T) {
|
|
if raAcctClnt, err = radigo.NewClient(utils.UDP, "127.0.0.1:1813", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
req := raAcctClnt.NewRequest(radigo.AccountingRequest, 2) // emulates Kamailio packet for accounting start
|
|
if err := req.AddAVPWithName("Acct-Status-Type", "Start", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("Service-Type", "Sip-Session", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("Sip-Response-Code", "200", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("Sip-Method", "Invite", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("Sip-From-Tag", "51585361", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("Sip-To-Tag", "75c2f57b", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("User-Name", "1001", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("Ascend-User-Acct-Time", "1497106115", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("NAS-Port", "5060", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("Acct-Delay-Time", "0", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
reply, err := raAcctClnt.SendRequest(req)
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
if reply.Code != radigo.AccountingResponse {
|
|
t.Errorf("Received reply: %+v", reply)
|
|
}
|
|
if len(reply.AVPs) != 0 { // we don't expect AVPs to be populated
|
|
t.Errorf("Received AVPs: %+v", reply.AVPs)
|
|
}
|
|
// Make sure the sessin is managed by SMG
|
|
time.Sleep(10 * time.Millisecond)
|
|
expUsage := 10 * time.Second
|
|
if isDispatcherActive { // no debit interval set on dispatched session
|
|
expUsage = 3 * time.Hour
|
|
}
|
|
var aSessions []*sessions.ExternalSession
|
|
if err := raRPC.Call(context.Background(), utils.SessionSv1GetActiveSessions,
|
|
utils.SessionFilter{
|
|
Filters: []string{
|
|
fmt.Sprintf("*string:~*req.%s:%s", utils.RunID, utils.MetaDefault),
|
|
fmt.Sprintf("*string:~*req.%s:%s", utils.OriginID, "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0-51585361-75c2f57b"),
|
|
},
|
|
}, &aSessions); err != nil {
|
|
t.Error(err)
|
|
} else if len(aSessions) != 1 {
|
|
t.Errorf("Unexpected number of sessions received: %+v", aSessions)
|
|
} else if aSessions[0].Usage != expUsage {
|
|
t.Errorf("Expecting %v, received usage: %v\nAnd Session: %s ", expUsage, aSessions[0].Usage, utils.ToJSON(aSessions))
|
|
}
|
|
}
|
|
|
|
func testRAitAcctStartTCP(t *testing.T) {
|
|
if raAcctClnt, err = radigo.NewClient(utils.TCP, "127.0.0.1:1813", "CGRateS.org", dictRad, 1, nil, utils.Logger); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
req := raAcctClnt.NewRequest(radigo.AccountingRequest, 2) // emulates Kamailio packet for accounting start
|
|
if err := req.AddAVPWithName("Acct-Status-Type", "Start", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("Service-Type", "Sip-Session", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("Sip-Response-Code", "200", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("Sip-Method", "Invite", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("Event-Timestamp", "1497106115", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("Sip-From-Tag", "51585361", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("Sip-To-Tag", "75c2f57b", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("User-Name", "1001", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("Ascend-User-Acct-Time", "1497106115", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("NAS-Port", "5060", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("Acct-Delay-Time", "0", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
reply, err := raAcctClnt.SendRequest(req)
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
if reply.Code != radigo.AccountingResponse {
|
|
t.Errorf("Received reply: %+v", reply)
|
|
}
|
|
if len(reply.AVPs) != 0 { // we don't expect AVPs to be populated
|
|
t.Errorf("Received AVPs: %+v", reply.AVPs)
|
|
}
|
|
// Make sure the sessin is managed by SMG
|
|
time.Sleep(10 * time.Millisecond)
|
|
expUsage := 10 * time.Second
|
|
if isDispatcherActive { // no debit interval set on dispatched session
|
|
expUsage = 3 * time.Hour
|
|
}
|
|
var aSessions []*sessions.ExternalSession
|
|
if err := raRPC.Call(context.Background(), utils.SessionSv1GetActiveSessions,
|
|
utils.SessionFilter{
|
|
Filters: []string{
|
|
fmt.Sprintf("*string:~*req.%s:%s", utils.RunID, utils.MetaDefault),
|
|
fmt.Sprintf("*string:~*req.%s:%s", utils.OriginID, "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0-51585361-75c2f57b"),
|
|
},
|
|
}, &aSessions); err != nil {
|
|
t.Error(err)
|
|
} else if len(aSessions) != 1 {
|
|
t.Errorf("Unexpected number of sessions received: %+v", aSessions)
|
|
} else if aSessions[0].Usage != expUsage {
|
|
t.Errorf("Expecting %v, received usage: %v\nAnd Session: %s ", expUsage, aSessions[0].Usage, utils.ToJSON(aSessions))
|
|
}
|
|
}
|
|
|
|
func testRAitAcctStop(t *testing.T) {
|
|
req := raAcctClnt.NewRequest(radigo.AccountingRequest, 3) // emulates Kamailio packet for accounting start
|
|
if err := req.AddAVPWithName("Acct-Status-Type", "Stop", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("Service-Type", "Sip-Session", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("Sip-Response-Code", "200", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("Sip-Method", "Bye", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("Event-Timestamp", "1497106119", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("Sip-From-Tag", "51585361", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("Sip-To-Tag", "75c2f57b", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("Acct-Session-Id", "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("User-Name", "1001", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("Called-Station-Id", "1002", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("Ascend-User-Acct-Time", "1497106115", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("NAS-Port", "5060", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("Acct-Delay-Time", "0", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := req.AddAVPWithName("NAS-IP-Address", "127.0.0.1", ""); err != nil {
|
|
t.Error(err)
|
|
}
|
|
reply, err := raAcctClnt.SendRequest(req)
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
if reply.Code != radigo.AccountingResponse {
|
|
t.Errorf("Received reply: %+v", reply)
|
|
}
|
|
if len(reply.AVPs) != 0 { // we don't expect AVPs to be populated
|
|
t.Errorf("Received AVPs: %+v", reply.AVPs)
|
|
}
|
|
// Make sure the sessin was disconnected from SMG
|
|
var aSessions []*sessions.ExternalSession
|
|
if err := raRPC.Call(context.Background(), utils.SessionSv1GetActiveSessions,
|
|
utils.SessionFilter{
|
|
Filters: []string{
|
|
fmt.Sprintf("*string:~*req.%s:%s", utils.RunID, utils.MetaDefault),
|
|
fmt.Sprintf("*string:~*req.%s:%s", utils.OriginID, "e4921177ab0e3586c37f6a185864b71a@0:0:0:0:0:0:0:0-51585361-75c2f57b"),
|
|
},
|
|
}, &aSessions); err == nil || err.Error() != utils.ErrNotFound.Error() {
|
|
t.Error(err)
|
|
}
|
|
time.Sleep(150 * time.Millisecond)
|
|
var cdrs []*engine.ExternalCDR
|
|
args := utils.RPCCDRsFilter{RunIDs: []string{utils.MetaDefault}, DestinationPrefixes: []string{"1002"}}
|
|
if err := raRPC.Call(context.Background(), utils.APIerSv2GetCDRs, &args, &cdrs); err != nil {
|
|
t.Error("Unexpected error: ", err.Error())
|
|
} else if len(cdrs) != 1 {
|
|
t.Error("Unexpected number of CDRs returned: ", len(cdrs))
|
|
} else {
|
|
if cdrs[0].Usage != "4s" {
|
|
t.Errorf("Unexpected CDR Usage received, cdr: %v ", cdrs[0])
|
|
}
|
|
if cdrs[0].CostSource != utils.MetaSessionS {
|
|
t.Errorf("Unexpected CDR CostSource received for CDR: %v", cdrs[0])
|
|
}
|
|
if cdrs[0].Cost != 0.01 {
|
|
t.Errorf("Unexpected CDR Cost received for CDR: %v", cdrs[0].Cost)
|
|
}
|
|
if cdrs[0].ExtraFields["RemoteAddr"] != "127.0.0.1" {
|
|
t.Errorf("Unexpected CDR RemoteAddr received for CDR: %+v", utils.ToJSON(cdrs[0]))
|
|
}
|
|
}
|
|
}
|
|
|
|
func testRAitStopCgrEngine(t *testing.T) {
|
|
if err := engine.KillEngine(100); err != nil {
|
|
t.Error(err)
|
|
}
|
|
}
|