Files
cgrates/engine/filters_test.go
2025-06-24 17:59:46 +02:00

3552 lines
102 KiB
Go

/*
Real-time Online/Offline Charging System (OCS) for Telecom & ISP environments
Copyright (C) ITsysCOM GmbH
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>
*/
package engine
import (
"encoding/json"
"fmt"
"net/http"
"net/http/httptest"
"reflect"
"strings"
"testing"
"time"
"github.com/cgrates/baningo"
"github.com/cgrates/birpc"
"github.com/cgrates/birpc/context"
"github.com/cgrates/cgrates/config"
"github.com/cgrates/cgrates/utils"
)
func TestFilterPassString(t *testing.T) {
cd := &CallDescriptor{
Category: "call",
Tenant: "cgrates.org",
Subject: "dan",
Destination: "+4986517174963",
TimeStart: time.Date(2013, time.October, 7, 14, 50, 0, 0, time.UTC),
TimeEnd: time.Date(2013, time.October, 7, 14, 52, 12, 0, time.UTC),
DurationIndex: 132 * time.Second,
ExtraFields: map[string]string{"navigation": "off"},
}
rf := &FilterRule{Type: utils.MetaString,
Element: "~Category", Values: []string{"call"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.passString(cd); err != nil {
t.Error(err)
} else if !passes {
t.Error("Not passes filter")
}
rf = &FilterRule{Type: utils.MetaString,
Element: "~Category", Values: []string{"cal"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.passString(cd); err != nil {
t.Error(err)
} else if passes {
t.Error("Filter passes")
}
//not
rf = &FilterRule{Type: utils.MetaNotString,
Element: "~Category", Values: []string{"call"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.Pass(cd); err != nil {
t.Error(err)
} else if passes {
t.Error("Filter passes")
}
rf = &FilterRule{Type: utils.MetaNotString,
Element: "~Category", Values: []string{"cal"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.Pass(cd); err != nil {
t.Error(err)
} else if !passes {
t.Error("Not passes filter")
}
}
func TestFilterPassContains(t *testing.T) {
dp := utils.MapStorage{
utils.MetaReq: map[string]any{
"Attribute": "AttributeProfile1",
utils.AnswerTime: time.Date(2014, 7, 14, 14, 30, 0, 0, time.UTC),
"UsageInterval": "1s",
utils.Weight: "20.0",
"Account": "1001",
"OriginHost": "22.15.81.122",
}}
rF, _ := NewFilterRule(utils.MetaContains, "~*req.Attribute", []string{"Profile"})
if pass, err := rF.passContains(dp); err != nil {
t.Error(err)
} else if !pass {
t.Error("FilterRule should pass")
}
rF, _ = NewFilterRule(utils.MetaContains, "~*req.OriginHost", []string{"81"})
if pass, err := rF.passContains(dp); err != nil {
t.Error(err)
} else if !pass {
t.Error("FilterRule should pass")
}
rF, _ = NewFilterRule(utils.MetaContains, "~*req.Account", []string{"200"})
if pass, err := rF.passContains(dp); err != nil {
t.Error(err)
} else if pass {
t.Error("FilterRule should not pass")
}
}
func TestFilterPassRegex(t *testing.T) {
cd := &CallDescriptor{
Category: "call",
Tenant: "cgrates.org",
Subject: "dan",
Destination: "+4986517174963",
TimeStart: time.Date(2013, time.October, 7, 14, 50, 0, 0, time.UTC),
TimeEnd: time.Date(2013, time.October, 7, 14, 52, 12, 0, time.UTC),
DurationIndex: 132 * time.Second,
ExtraFields: map[string]string{"navigation": "off"},
}
rf := &FilterRule{Type: utils.MetaRegex,
Element: "~Category", Values: []string{"^call$"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.passRegex(cd); err != nil {
t.Error(err)
} else if !passes {
t.Error("Not passes filter")
}
rf = &FilterRule{Type: utils.MetaRegex,
Element: "~Category", Values: []string{"cal$"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.passRegex(cd); err != nil {
t.Error(err)
} else if passes {
t.Error("Filter passes")
}
//not
rf = &FilterRule{Type: utils.MetaNotRegex,
Element: "~Category", Values: []string{"^call$"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.Pass(cd); err != nil {
t.Error(err)
} else if passes {
t.Error("Filter passes")
}
rf = &FilterRule{Type: utils.MetaNotRegex,
Element: "~Category", Values: []string{"cal$"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.Pass(cd); err != nil {
t.Error(err)
} else if !passes {
t.Error("Not passes filter")
}
}
func TestFilterPassEmpty(t *testing.T) {
cd := &CallDescriptor{
Category: "",
Tenant: "cgrates.org",
Subject: "dan",
Destination: "+4986517174963",
TimeStart: time.Date(2013, time.October, 7, 14, 50, 0, 0, time.UTC),
TimeEnd: time.Date(2013, time.October, 7, 14, 52, 12, 0, time.UTC),
DurationIndex: 132 * time.Second,
ExtraFields: map[string]string{"navigation": "off"},
}
rf := &FilterRule{Type: utils.MetaEmpty, Element: "~Category", Values: []string{}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.passEmpty(cd); err != nil {
t.Error(err)
} else if !passes {
t.Error("Not passes filter")
}
rf = &FilterRule{Type: utils.MetaEmpty, Element: "~ExtraFields", Values: []string{}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.passEmpty(cd); err != nil {
t.Error(err)
} else if passes {
t.Error("Filter passes")
}
cd.ExtraFields = map[string]string{}
rf = &FilterRule{Type: utils.MetaEmpty, Element: "~ExtraFields", Values: []string{}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.passEmpty(cd); err != nil {
t.Error(err)
} else if !passes {
t.Error("Not passes filter")
}
//not
rf = &FilterRule{Type: utils.MetaNotEmpty, Element: "~Category", Values: []string{}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.Pass(cd); err != nil {
t.Error(err)
} else if passes {
t.Error("Filter passes")
}
}
func TestFilterPassExists(t *testing.T) {
cd := &CallDescriptor{
Category: "",
Tenant: "cgrates.org",
Subject: "dan",
Destination: "+4986517174963",
TimeStart: time.Date(2013, time.October, 7, 14, 50, 0, 0, time.UTC),
TimeEnd: time.Date(2013, time.October, 7, 14, 52, 12, 0, time.UTC),
DurationIndex: 132 * time.Second,
ExtraFields: map[string]string{"navigation": "off"},
}
rf := &FilterRule{Type: utils.MetaExists, Element: "~Category", Values: []string{}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.passExists(cd); err != nil {
t.Error(err)
} else if !passes {
t.Error("Not passes filter")
}
rf = &FilterRule{Type: utils.MetaExists, Element: "~ExtraFields1", Values: []string{}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.passExists(cd); err != nil {
t.Error(err)
} else if passes {
t.Error("Filter passes")
}
cd.ExtraFields = map[string]string{}
rf = &FilterRule{Type: utils.MetaExists, Element: "~ExtraFields", Values: []string{}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.passExists(cd); err != nil {
t.Error(err)
} else if !passes {
t.Error("Not passes filter")
}
//not
rf = &FilterRule{Type: utils.MetaNotExists, Element: "~Category1", Values: []string{}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.Pass(cd); err != nil {
t.Error(err)
} else if !passes {
t.Error("Not passes filter")
}
}
func TestFilterPassStringPrefix(t *testing.T) {
cd := &CallDescriptor{
Category: "call",
Tenant: "cgrates.org",
Subject: "dan",
Destination: "+4986517174963",
TimeStart: time.Date(2013, time.October, 7, 14, 50, 0, 0, time.UTC),
TimeEnd: time.Date(2013, time.October, 7, 14, 52, 12, 0, time.UTC),
DurationIndex: 132 * time.Second,
ExtraFields: map[string]string{"navigation": "off"},
}
rf := &FilterRule{Type: utils.MetaPrefix, Element: "~Category", Values: []string{"call"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.passStringPrefix(cd); err != nil {
t.Error(err)
} else if !passes {
t.Error("Not passes filter")
}
rf = &FilterRule{Type: utils.MetaPrefix, Element: "~Category", Values: []string{"premium"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.passStringPrefix(cd); err != nil {
t.Error(err)
} else if passes {
t.Error("Passes filter")
}
rf = &FilterRule{Type: utils.MetaPrefix, Element: "~Destination", Values: []string{"+49"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.passStringPrefix(cd); err != nil {
t.Error(err)
} else if !passes {
t.Error("Not passes filter")
}
rf = &FilterRule{Type: utils.MetaPrefix, Element: "~Destination", Values: []string{"+499"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.passStringPrefix(cd); err != nil {
t.Error(err)
} else if passes {
t.Error("Passes filter")
}
rf = &FilterRule{Type: utils.MetaPrefix, Element: "~navigation", Values: []string{"off"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.passStringPrefix(cd); err != nil {
t.Error(err)
} else if !passes {
t.Error("Not passes filter")
}
rf = &FilterRule{Type: utils.MetaPrefix, Element: "~nonexisting", Values: []string{"off"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passing, err := rf.passStringPrefix(cd); err != nil {
t.Error(err)
} else if passing {
t.Error("Passes filter")
}
//not
rf = &FilterRule{Type: utils.MetaNotPrefix, Element: "~Category", Values: []string{"premium"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.Pass(cd); err != nil {
t.Error(err)
} else if !passes {
t.Error("Not passes filter")
}
}
func TestFilterPassStringSuffix(t *testing.T) {
cd := &CallDescriptor{
Category: "call",
Tenant: "cgrates.org",
Subject: "dan",
Destination: "+4986517174963",
TimeStart: time.Date(2013, time.October, 7, 14, 50, 0, 0, time.UTC),
TimeEnd: time.Date(2013, time.October, 7, 14, 52, 12, 0, time.UTC),
DurationIndex: 132 * time.Second,
ExtraFields: map[string]string{"navigation": "off"},
}
rf := &FilterRule{Type: utils.MetaSuffix, Element: "~Category", Values: []string{"call"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.passStringSuffix(cd); err != nil {
t.Error(err)
} else if !passes {
t.Error("Not passes filter")
}
rf = &FilterRule{Type: utils.MetaSuffix, Element: "~Category", Values: []string{"premium"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.passStringSuffix(cd); err != nil {
t.Error(err)
} else if passes {
t.Error("Passes filter")
}
rf = &FilterRule{Type: utils.MetaSuffix, Element: "~Destination", Values: []string{"963"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.passStringSuffix(cd); err != nil {
t.Error(err)
} else if !passes {
t.Error("Not passes filter")
}
rf = &FilterRule{Type: utils.MetaSuffix, Element: "~Destination", Values: []string{"4966"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.passStringSuffix(cd); err != nil {
t.Error(err)
} else if passes {
t.Error("Passes filter")
}
rf = &FilterRule{Type: utils.MetaSuffix, Element: "~navigation", Values: []string{"off"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.passStringSuffix(cd); err != nil {
t.Error(err)
} else if !passes {
t.Error("Not passes filter")
}
rf = &FilterRule{Type: utils.MetaSuffix, Element: "~nonexisting", Values: []string{"off"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passing, err := rf.passStringSuffix(cd); err != nil {
t.Error(err)
} else if passing {
t.Error("Passes filter")
}
//not
rf = &FilterRule{Type: utils.MetaNotSuffix, Element: "~Destination", Values: []string{"963"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.Pass(cd); err != nil {
t.Error(err)
} else if passes {
t.Error("Passes filter")
}
}
func TestFilterPassRSRFields(t *testing.T) {
cd := &CallDescriptor{
Category: "call",
Tenant: "cgrates.org",
Subject: "dan",
Destination: "+4986517174963",
TimeStart: time.Date(2013, time.October, 7, 14, 50, 0, 0, time.UTC),
TimeEnd: time.Date(2013, time.October, 7, 14, 52, 12, 0, time.UTC),
DurationIndex: 132 * time.Second,
ExtraFields: map[string]string{"navigation": "off"},
}
rf, err := NewFilterRule(utils.MetaRSR, "~Tenant", []string{"~^cgr.*\\.org$"})
if err != nil {
t.Error(err)
}
if passes, err := rf.passRSR(cd); err != nil {
t.Error(err)
} else if !passes {
t.Error("Not passing")
}
rf, err = NewFilterRule(utils.MetaRSR, "~navigation", []string{"on"})
if err != nil {
t.Error(err)
}
if passes, err := rf.passRSR(cd); err != nil {
t.Error(err)
} else if passes {
t.Error("Passing")
}
rf, err = NewFilterRule(utils.MetaRSR, "~navigation", []string{"off"})
if err != nil {
t.Error(err)
}
if passes, err := rf.passRSR(cd); err != nil {
t.Error(err)
} else if !passes {
t.Error("Not passing")
}
//not
rf, err = NewFilterRule(utils.MetaNotRSR, "~navigation", []string{"off"})
if err != nil {
t.Error(err)
}
if passes, err := rf.Pass(cd); err != nil {
t.Error(err)
} else if passes {
t.Error("Passing")
}
}
func TestFilterPassGtOrLtPass(t *testing.T) {
rf, err := NewFilterRule(utils.MetaGreaterThan, "~Usage", []string{"70"})
if err != nil {
t.Error(err)
}
ev := utils.MapStorage{
"Usage": "77",
}
if passes, err := rf.passGreaterThan(ev); err != nil {
t.Error(err)
} else if !passes {
t.Error("not passing")
}
rf, err = NewFilterRule(utils.MetaGreaterOrEqual, "~Usage", []string{"77"})
if err != nil {
t.Error(err)
}
if passes, err := rf.passGreaterThan(ev); err != nil {
t.Error(err)
} else if !passes {
t.Error("not passing")
}
rf, err = NewFilterRule(utils.MetaLessThan, "~Usage", []string{"80"})
if err != nil {
t.Error(err)
}
if passes, err := rf.passGreaterThan(ev); err != nil {
t.Error(err)
} else if !passes {
t.Error("not passing")
}
rf, err = NewFilterRule(utils.MetaLessOrEqual, "~Usage", []string{"77"})
if err != nil {
t.Error(err)
}
if passes, err := rf.passGreaterThan(ev); err != nil {
t.Error(err)
} else if !passes {
t.Error("not passing")
}
}
func TestFilterPassGtOrLtFail(t *testing.T) {
ev := utils.MapStorage{
"Usage": "77",
}
rf, err := NewFilterRule(utils.MetaGreaterThan, "~Usage", []string{"80"})
if err != nil {
t.Error(err)
}
if passes, err := rf.passGreaterThan(ev); err != nil {
t.Error(err)
} else if passes {
t.Error("passing")
}
rf, err = NewFilterRule(utils.MetaGreaterOrEqual, "~Usage", []string{"80"})
if err != nil {
t.Error(err)
}
if passes, err := rf.passGreaterThan(ev); err != nil {
t.Error(err)
} else if passes {
t.Error("passing")
}
rf, err = NewFilterRule(utils.MetaLessThan, "~Usage", []string{"70"})
if err != nil {
t.Error(err)
}
if passes, err := rf.passGreaterThan(ev); err != nil {
t.Error(err)
} else if passes {
t.Error("passing")
}
rf, err = NewFilterRule(utils.MetaLessOrEqual, "~Usage", []string{"70"})
if err != nil {
t.Error(err)
}
if passes, err := rf.passGreaterThan(ev); err != nil {
t.Error(err)
} else if passes {
t.Error("passing")
}
}
func TestFilterPassGreaterThan(t *testing.T) {
rf, err := NewFilterRule(utils.MetaLessThan, "~ASR", []string{"40"})
if err != nil {
t.Error(err)
}
ev := utils.MapStorage{}
ev.Set([]string{"ASR"}, 20)
if passes, err := rf.passGreaterThan(ev); err != nil {
t.Error(err)
} else if !passes {
t.Error("not passing")
}
ev = utils.MapStorage{}
ev.Set([]string{"ASR"}, 40)
if passes, err := rf.passGreaterThan(ev); err != nil {
t.Error(err)
} else if passes {
t.Error("equal should not be passing")
}
rf, err = NewFilterRule(utils.MetaLessOrEqual, "~ASR", []string{"40"})
if err != nil {
t.Error(err)
}
if passes, err := rf.passGreaterThan(ev); err != nil {
t.Error(err)
} else if !passes {
t.Error("not passing")
}
rf, err = NewFilterRule(utils.MetaGreaterOrEqual, "~ASR", []string{"40"})
if err != nil {
t.Error(err)
}
if passes, err := rf.passGreaterThan(ev); err != nil {
t.Error(err)
} else if !passes {
t.Error("not passing")
}
rf, err = NewFilterRule(utils.MetaGreaterOrEqual, "~ASR", []string{"35.5"})
if err != nil {
t.Error(err)
}
if passes, err := rf.passGreaterThan(ev); err != nil {
t.Error(err)
} else if !passes {
t.Error("not passing")
}
ev = utils.MapStorage{}
ev.Set([]string{"ASR"}, 20)
if passes, err := rf.passGreaterThan(ev); err != nil {
t.Error(err)
} else if passes {
t.Error("should not pass")
}
rf, err = NewFilterRule(utils.MetaGreaterOrEqual, "~ACD", []string{"1m50s"})
if err != nil {
t.Error(err)
}
ev = utils.MapStorage{}
ev.Set([]string{"ACD"}, 2*time.Minute)
if passes, err := rf.passGreaterThan(ev); err != nil {
t.Error(err)
} else if !passes {
t.Error("not pass")
}
// Second
ev = utils.MapStorage{}
ev.Set([]string{"ASR"}, 20*time.Second)
rf, err = NewFilterRule("*gte", "~ASR", []string{"10s"})
if err != nil {
t.Error(err)
}
if passes, err := rf.passGreaterThan(ev); err != nil {
t.Error(err)
} else if !passes {
t.Error("passing")
}
rf, err = NewFilterRule("*gte", "~ASR", []string{"10"})
if err != nil {
t.Error(err)
}
if passes, err := rf.passGreaterThan(ev); err != nil {
t.Error(err)
} else if !passes {
t.Error("passing")
}
ev = utils.MapStorage{}
ev.Set([]string{"ASR"}, float64(20*time.Second))
rf, err = NewFilterRule("*gte", "~ASR", []string{"10s"})
if err != nil {
t.Error(err)
}
if passes, err := rf.passGreaterThan(ev); err != nil {
t.Error(err)
} else if !passes {
t.Error("passing")
}
//Here converter will be consider part of path and will get error : NOT_FOUND
ev = utils.MapStorage{}
ev.Set([]string{"ASR"}, 20)
rf, err = NewFilterRule("*gte", "~ASR{*duration_seconds}", []string{"10"})
if err != nil {
t.Error(err)
}
if passes, err := rf.passGreaterThan(ev); err != nil {
t.Error(err)
} else if passes {
t.Error("passing")
}
//Here converter will be consider part of path and will get error : NOT_FOUND
ev = utils.MapStorage{}
ev.Set([]string{"ASR"}, 20)
rf, err = NewFilterRule("*gte", "~ASR{*duration_seconds}", []string{"10s"})
if err != nil {
t.Error(err)
}
if passes, err := rf.passGreaterThan(ev); err != nil {
t.Error(err)
} else if passes {
t.Error("passing")
}
}
func TestFilterpassEqualTo(t *testing.T) {
rf, err := NewFilterRule(utils.MetaEqual, "~ASR", []string{"40"})
if err != nil {
t.Error(err)
}
ev := utils.MapStorage{}
ev.Set([]string{"ASR"}, 40.0)
if passes, err := rf.passEqualTo(ev); err != nil {
t.Error(err)
} else if !passes {
t.Error("not passing")
}
ev = utils.MapStorage{}
ev.Set([]string{"ASR"}, 39)
if passes, err := rf.passEqualTo(ev); err != nil {
t.Error(err)
} else if passes {
t.Error("equal should not be passing")
}
rf, err = NewFilterRule(utils.MetaNotEqual, "~ASR", []string{"40"})
if err != nil {
t.Error(err)
}
if passes, err := rf.Pass(ev); err != nil {
t.Error(err)
} else if !passes {
t.Error("not passing", passes)
}
ev = utils.MapStorage{}
ev.Set([]string{"ASR"}, "string1")
rf, err = NewFilterRule(utils.MetaEqual, "~ASR", []string{"string1"})
if err != nil {
t.Error(err)
}
if passes, err := rf.passEqualTo(ev); err != nil {
t.Error(err)
} else if !passes {
t.Error("not passing")
}
}
func TestFilterNewRequestFilter(t *testing.T) {
rf, err := NewFilterRule(utils.MetaString, "~MetaString", []string{"String"})
if err != nil {
t.Errorf("Error: %+v", err)
}
erf := &FilterRule{Type: utils.MetaString, Element: "~MetaString", Values: []string{"String"}, negative: utils.BoolPointer(false)}
if err = erf.CompileValues(); err != nil {
t.Fatal(err)
}
if !reflect.DeepEqual(erf, rf) {
t.Errorf("Expecting: %+v, received: %+v", erf, rf)
}
rf, err = NewFilterRule(utils.MetaEmpty, "~MetaEmpty", []string{})
if err != nil {
t.Errorf("Error: %+v", err)
}
erf = &FilterRule{Type: utils.MetaEmpty, Element: "~MetaEmpty", Values: []string{}, negative: utils.BoolPointer(false)}
if err = erf.CompileValues(); err != nil {
t.Fatal(err)
}
if !reflect.DeepEqual(erf, rf) {
t.Errorf("Expecting: %+v, received: %+v", erf, rf)
}
rf, err = NewFilterRule(utils.MetaExists, "~MetaExists", []string{})
if err != nil {
t.Errorf("Error: %+v", err)
}
erf = &FilterRule{Type: utils.MetaExists, Element: "~MetaExists", Values: []string{}, negative: utils.BoolPointer(false)}
if err = erf.CompileValues(); err != nil {
t.Fatal(err)
}
if !reflect.DeepEqual(erf, rf) {
t.Errorf("Expecting: %+v, received: %+v", erf, rf)
}
rf, err = NewFilterRule(utils.MetaPrefix, "~MetaPrefix", []string{"stringPrefix"})
if err != nil {
t.Errorf("Error: %+v", err)
}
erf = &FilterRule{Type: utils.MetaPrefix, Element: "~MetaPrefix", Values: []string{"stringPrefix"}, negative: utils.BoolPointer(false)}
if err = erf.CompileValues(); err != nil {
t.Fatal(err)
}
if !reflect.DeepEqual(erf, rf) {
t.Errorf("Expecting: %+v, received: %+v", erf, rf)
}
rf, err = NewFilterRule(utils.MetaSuffix, "~MetaSuffix", []string{"stringSuffix"})
if err != nil {
t.Errorf("Error: %+v", err)
}
erf = &FilterRule{Type: utils.MetaSuffix, Element: "~MetaSuffix", Values: []string{"stringSuffix"}, negative: utils.BoolPointer(false)}
if err = erf.CompileValues(); err != nil {
t.Fatal(err)
}
if !reflect.DeepEqual(erf, rf) {
t.Errorf("Expecting: %+v, received: %+v", erf, rf)
}
// rf, err = NewFilterRule(utils.MetaTimings, "~MetaTimings", []string{""})
// if err != nil {
// t.Errorf("Error: %+v", err)
// }
// erf = &FilterRule{Type: utils.MetaTimings, Element: "~MetaTimings", Values: []string{""}, negative: utils.BoolPointer(false)}
// if err = erf.CompileValues(); err != nil {
// t.Fatal(err)
// }
// if !reflect.DeepEqual(erf, rf) {
// t.Errorf("Expecting: %+v, received: %+v", erf, rf)
// }
rf, err = NewFilterRule(utils.MetaDestinations, "~MetaDestinations", []string{"1001"})
if err != nil {
t.Errorf("Error: %+v", err)
}
erf = &FilterRule{Type: utils.MetaDestinations, Element: "~MetaDestinations", Values: []string{"1001"}, negative: utils.BoolPointer(false)}
if err = erf.CompileValues(); err != nil {
t.Fatal(err)
}
if !reflect.DeepEqual(erf, rf) {
t.Errorf("Expecting: %+v, received: %+v", erf, rf)
}
rf, err = NewFilterRule(utils.MetaLessThan, "~MetaLessThan", []string{"20"})
if err != nil {
t.Errorf("Error: %+v", err)
}
erf = &FilterRule{Type: utils.MetaLessThan, Element: "~MetaLessThan", Values: []string{"20"}, negative: utils.BoolPointer(false)}
if err = erf.CompileValues(); err != nil {
t.Fatal(err)
}
if !reflect.DeepEqual(erf, rf) {
t.Errorf("Expecting: %+v, received: %+v", erf, rf)
}
rf, err = NewFilterRule(utils.MetaLessOrEqual, "~MetaLessOrEqual", []string{"20"})
if err != nil {
t.Errorf("Error: %+v", err)
}
erf = &FilterRule{Type: utils.MetaLessOrEqual, Element: "~MetaLessOrEqual", Values: []string{"20"}, negative: utils.BoolPointer(false)}
if err = erf.CompileValues(); err != nil {
t.Fatal(err)
}
if !reflect.DeepEqual(erf, rf) {
t.Errorf("Expecting: %+v, received: %+v", erf, rf)
}
rf, err = NewFilterRule(utils.MetaGreaterThan, "~MetaGreaterThan", []string{"20"})
if err != nil {
t.Errorf("Error: %+v", err)
}
erf = &FilterRule{Type: utils.MetaGreaterThan, Element: "~MetaGreaterThan", Values: []string{"20"}, negative: utils.BoolPointer(false)}
if err = erf.CompileValues(); err != nil {
t.Fatal(err)
}
if !reflect.DeepEqual(erf, rf) {
t.Errorf("Expecting: %+v, received: %+v", erf, rf)
}
rf, err = NewFilterRule(utils.MetaGreaterOrEqual, "~MetaGreaterOrEqual", []string{"20"})
if err != nil {
t.Errorf("Error: %+v", err)
}
erf = &FilterRule{Type: utils.MetaGreaterOrEqual, Element: "~MetaGreaterOrEqual", Values: []string{"20"}, negative: utils.BoolPointer(false)}
if err = erf.CompileValues(); err != nil {
t.Fatal(err)
}
if !reflect.DeepEqual(erf, rf) {
t.Errorf("Expecting: %+v, received: %+v", erf, rf)
}
rf, err = NewFilterRule(utils.MetaRegex, "~MetaRegex", []string{"Regex"})
if err != nil {
t.Errorf("Error: %+v", err)
}
erf = &FilterRule{Type: utils.MetaRegex, Element: "~MetaRegex", Values: []string{"Regex"}, negative: utils.BoolPointer(false)}
if err = erf.CompileValues(); err != nil {
t.Fatal(err)
}
if !reflect.DeepEqual(erf, rf) {
t.Errorf("Expecting: %+v, received: %+v", erf, rf)
}
if _, err = NewFilterRule("", "~MetaRegex", []string{"Regex"}); err == nil {
t.Error(err)
} else if _, err = NewFilterRule(utils.MetaRegex, "", []string{"Regex"}); err == nil {
t.Error(err)
} else if _, err = NewFilterRule(utils.MetaRegex, "~MetaRegex", []string{}); err == nil {
t.Error(err)
}
}
func TestInlineFilterPassFiltersForEvent(t *testing.T) {
cfg := config.NewDefaultCGRConfig()
data, dErr := NewInternalDB(nil, nil, true, nil, cfg.DataDbCfg().Items)
if dErr != nil {
t.Error(dErr)
}
dmFilterPass := NewDataManager(data, config.CgrConfig().CacheCfg(), nil)
filterS := FilterS{
cfg: cfg,
dm: dmFilterPass,
}
failEvent := map[string]any{
"Account": "1001",
}
passEvent := map[string]any{
"Account": "1007",
}
fEv := utils.MapStorage{}
fEv.Set([]string{utils.MetaReq}, failEvent)
if pass, err := filterS.Pass("cgrates.org",
[]string{"*string:~*req.Account:1007:error"}, fEv); err != nil {
t.Error(err)
} else if pass {
t.Errorf("Expecting: %+v, received: %+v", false, pass)
}
if pass, err := filterS.Pass("cgrates.org",
[]string{"*string:~*req.Account:1007"}, fEv); err != nil {
t.Error(err)
} else if pass {
t.Errorf("Expecting: %+v, received: %+v", false, pass)
}
pEv := utils.MapStorage{}
pEv.Set([]string{utils.MetaReq}, passEvent)
if pass, err := filterS.Pass("cgrates.org",
[]string{"*string:~*req.Account:1007"}, pEv); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("Expecting: %+v, received: %+v", true, pass)
}
//not
if pass, err := filterS.Pass("cgrates.org",
[]string{"*notstring:~*req.Account:1007"}, pEv); err != nil {
t.Error(err)
} else if pass {
t.Errorf("Expecting: %+v, received: %+v", false, pass)
}
failEvent = map[string]any{
"Account": "2001",
}
passEvent = map[string]any{
"Account": "1007",
}
fEv = utils.MapStorage{}
fEv.Set([]string{utils.MetaReq}, failEvent)
pEv = utils.MapStorage{}
pEv.Set([]string{utils.MetaReq}, passEvent)
if pass, err := filterS.Pass("cgrates.org",
[]string{"*prefix:~*req.Account:10"}, fEv); err != nil {
t.Error(err)
} else if pass {
t.Errorf("Expecting: %+v, received: %+v", false, pass)
}
if pass, err := filterS.Pass("cgrates.org",
[]string{"*prefix:~*req.Account:10"}, pEv); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("Expecting: %+v, received: %+v", true, pass)
}
if pass, err := filterS.Pass("cgrates.org",
[]string{"*suffix:~*req.Account:07"}, fEv); err != nil {
t.Error(err)
} else if pass {
t.Errorf("Expecting: %+v, received: %+v", false, pass)
}
if pass, err := filterS.Pass("cgrates.org",
[]string{"*suffix:~*req.Account:07"}, pEv); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("Expecting: %+v, received: %+v", true, pass)
}
//not
if pass, err := filterS.Pass("cgrates.org",
[]string{"*notsuffix:~*req.Account:07"}, pEv); err != nil {
t.Error(err)
} else if pass {
t.Errorf("Expecting: %+v, received: %+v", false, pass)
}
failEvent = map[string]any{
"Tenant": "anotherTenant.org",
}
passEvent = map[string]any{
"Tenant": "cgrates.org",
}
fEv = utils.MapStorage{}
fEv.Set([]string{utils.MetaReq}, failEvent)
pEv = utils.MapStorage{}
pEv.Set([]string{utils.MetaReq}, passEvent)
if pass, err := filterS.Pass("cgrates.org",
[]string{"*rsr:~*req.Tenant:~^cgr.*\\.org$"}, fEv); err != nil {
t.Error(err)
} else if pass {
t.Errorf("Expecting: %+v, received: %+v", false, pass)
}
if pass, err := filterS.Pass("cgrates.org",
[]string{"*rsr:~*req.Tenant:~^cgr.*\\.org$"}, pEv); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("Expecting: %+v, received: %+v", true, pass)
}
//not
if pass, err := filterS.Pass("cgrates.org",
[]string{"*notrsr:~*req.Tenant:~^cgr.*\\.org$"}, pEv); err != nil {
t.Error(err)
} else if pass {
t.Errorf("Expecting: %+v, received: %+v", false, pass)
}
failEvent = map[string]any{
utils.Weight: 10,
}
passEvent = map[string]any{
utils.Weight: 20,
}
fEv = utils.MapStorage{}
fEv.Set([]string{utils.MetaReq}, failEvent)
pEv = utils.MapStorage{}
pEv.Set([]string{utils.MetaReq}, passEvent)
if pass, err := filterS.Pass("cgrates.org",
[]string{"*gte:~*req.Weight:20"}, fEv); err != nil {
t.Error(err)
} else if pass {
t.Errorf("Expecting: %+v, received: %+v", false, pass)
}
if pass, err := filterS.Pass("cgrates.org",
[]string{"*gte:~*req.Weight:10"}, pEv); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("Expecting: %+v, received: %+v", true, pass)
}
failEvent = map[string]any{
"EmptyString": "nonEmpty",
"EmptySlice": []string{""},
"EmptyMap": map[string]string{"": ""},
"EmptyPtr": &struct{}{},
"EmptyPtr2": &struct{}{},
"EmptyPtrSlice": &[]string{""},
"EmptyPtrMap": &map[string]string{"": ""},
}
var testnil *struct{} = nil
passEvent = map[string]any{
"EmptyString": "",
"EmptySlice": []string{},
"EmptyMap": map[string]string{},
"EmptyPtr": testnil,
"EmptyPtr2": nil,
"EmptyPtrSlice": &[]string{},
"EmptyPtrMap": &map[string]string{},
}
fEv = utils.MapStorage{}
fEv.Set([]string{utils.MetaReq}, failEvent)
pEv = utils.MapStorage{}
pEv.Set([]string{utils.MetaReq}, passEvent)
for key := range failEvent {
if pass, err := filterS.Pass("cgrates.org", []string{"*empty:~*req." + key + ":"},
fEv); err != nil {
t.Error(err)
} else if pass {
t.Errorf("For %s expecting: %+v, received: %+v", key, false, pass)
}
if pass, err := filterS.Pass("cgrates.org", []string{"*empty:~*req." + key + ":"},
pEv); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("For %s expecting: %+v, received: %+v", key, true, pass)
}
}
if pass, err := filterS.Pass("cgrates.org", []string{"*exists:~*req.NewKey:"},
fEv); err != nil {
t.Error(err)
} else if pass {
t.Errorf("For NewKey expecting: %+v, received: %+v", false, pass)
}
if pass, err := filterS.Pass("cgrates.org", []string{"*notexists:~*req.NewKey:"},
fEv); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("For NewKey expecting: %+v, received: %+v", true, pass)
}
failEvent = map[string]any{
"Account": "1001",
}
passEvent = map[string]any{
"Account": "1007",
}
fEv = utils.MapStorage{}
fEv.Set([]string{utils.MetaReq}, failEvent)
if pass, err := filterS.Pass("cgrates.org",
[]string{"*regex:~*req.Account:^1007:error"}, fEv); err != nil {
t.Error(err)
} else if pass {
t.Errorf("Expecting: %+v, received: %+v", false, pass)
}
if pass, err := filterS.Pass("cgrates.org",
[]string{"*regex:~*req.Account:\\d{3}7"}, fEv); err != nil {
t.Error(err)
} else if pass {
t.Errorf("Expecting: %+v, received: %+v", false, pass)
}
pEv = utils.MapStorage{}
pEv.Set([]string{utils.MetaReq}, passEvent)
if pass, err := filterS.Pass("cgrates.org",
[]string{"*regex:~*req.Account:\\d{3}7"}, pEv); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("Expecting: %+v, received: %+v", true, pass)
}
//not
if pass, err := filterS.Pass("cgrates.org",
[]string{"*notregex:~*req.Account:\\d{3}7"}, pEv); err != nil {
t.Error(err)
} else if pass {
t.Errorf("Expecting: %+v, received: %+v", false, pass)
}
pEv = utils.MapStorage{utils.MetaReq: utils.MapStorage{utils.AccountField: "sip:12345678901234567@abcdefg"}}
if pass, err := filterS.Pass("cgrates.org",
[]string{"*regex:~*req.Account:.{29,}"}, pEv); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("Expecting: %+v, received: %+v", true, pass)
}
if pass, err := filterS.Pass("cgrates.org",
[]string{"*regex:~*req.Account:^.{28}$"}, pEv); err != nil {
t.Error(err)
} else if pass {
t.Errorf("Expecting: %+v, received: %+v", false, pass)
}
if pass, err := filterS.Pass("cgrates.org",
[]string{"*gte:~*req.Account{*len}:29"}, pEv); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("Expecting: %+v, received: %+v", true, pass)
}
pEv = utils.MapStorage{utils.MetaReq: utils.MapStorage{utils.AccountField: "[1,2,3]"}}
if pass, err := filterS.Pass("cgrates.org",
[]string{"*eq:~*req.Account{*slice&*len}:3"}, pEv); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("Expecting: %+v, received: %+v", true, pass)
}
}
func TestPassFiltersForEventWithEmptyFilter(t *testing.T) {
cfg := config.NewDefaultCGRConfig()
data, dErr := NewInternalDB(nil, nil, true, nil, cfg.DataDbCfg().Items)
if dErr != nil {
t.Error(dErr)
}
dmFilterPass := NewDataManager(data, config.CgrConfig().CacheCfg(), nil)
filterS := FilterS{
cfg: cfg,
dm: dmFilterPass,
}
passEvent1 := map[string]any{
utils.Tenant: "cgrates.org",
utils.AccountField: "1010",
utils.Destination: "+49",
utils.Weight: 10,
}
passEvent2 := map[string]any{
utils.Tenant: "itsyscom.com",
utils.AccountField: "dan",
utils.Destination: "+4986517174963",
utils.Weight: 20,
}
pEv1 := utils.MapStorage{}
pEv1.Set([]string{utils.MetaReq}, passEvent1)
pEv2 := utils.MapStorage{}
pEv2.Set([]string{utils.MetaReq}, passEvent2)
if pass, err := filterS.Pass("cgrates.org",
[]string{}, pEv1); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("Expecting: %+v, received: %+v", false, pass)
}
if pass, err := filterS.Pass("itsyscom.com",
[]string{}, pEv2); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("Expecting: %+v, received: %+v", true, pass)
}
ev := map[string]any{
"Test": "MultipleCharacter",
}
pEv := utils.MapStorage{}
pEv.Set([]string{utils.MetaReq}, ev)
if pass, err := filterS.Pass("cgrates.org",
[]string{"*rsr:~*req.Test:~^\\w{30,}"}, pEv); err != nil {
t.Error(err)
} else if pass {
t.Errorf("Expecting: %+v, received: %+v", false, pass)
}
ev = map[string]any{
"Test": "MultipleCharacter123456789MoreThan30Character",
}
pEv = utils.MapStorage{}
pEv.Set([]string{utils.MetaReq}, ev)
if pass, err := filterS.Pass("cgrates.org",
[]string{"*rsr:~*req.Test:~^\\w{30,}"}, pEv); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("Expecting: %+v, received: %+v", true, pass)
}
ev = map[string]any{
"Test": map[string]any{
"Test2": "MultipleCharacter",
},
}
pEv = utils.MapStorage{}
pEv.Set([]string{utils.MetaReq}, ev)
if pass, err := filterS.Pass("cgrates.org",
[]string{"*rsr:~*req.Test.Test2:~^\\w{30,}"}, pEv); err != nil {
t.Error(err)
} else if pass {
t.Errorf("Expecting: %+v, received: %+v", false, pass)
}
ev = map[string]any{
"Test": map[string]any{
"Test2": "MultipleCharacter123456789MoreThan30Character",
},
}
pEv = utils.MapStorage{}
pEv.Set([]string{utils.MetaReq}, ev)
if pass, err := filterS.Pass("cgrates.org",
[]string{"*rsr:~*req.Test.Test2:~^\\w{30,}"}, pEv); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("Expecting: %+v, received: %+v", false, pass)
}
ev = map[string]any{
utils.AccountField: "1003",
utils.Subject: "1003",
utils.Destination: "1002",
utils.SetupTime: time.Date(2017, 12, 1, 14, 25, 0, 0, time.UTC),
utils.Usage: "1m20s",
}
pEv = utils.MapStorage{}
pEv.Set([]string{utils.MetaReq}, ev)
if pass, err := filterS.Pass("cgrates.org",
[]string{
"*string:~*req.Account:1003",
"*prefix:~*req.Destination:10",
"*suffix:~*req.Subject:03",
"*rsr:~*req.Destination:1002"},
pEv); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("Expecting: %+v, received: %+v", true, pass)
}
}
func TestPassFilterMaxCost(t *testing.T) {
cfg := config.NewDefaultCGRConfig()
data, dErr := NewInternalDB(nil, nil, true, nil, cfg.DataDbCfg().Items)
if dErr != nil {
t.Error(dErr)
}
dmFilterPass := NewDataManager(data, config.CgrConfig().CacheCfg(), nil)
filterS := FilterS{
cfg: cfg,
dm: dmFilterPass,
}
//check with max usage -1 should fail
passEvent1 := map[string]any{
"MaxUsage": -1,
}
pEv := utils.MapStorage{}
pEv.Set([]string{utils.MetaReq}, passEvent1)
if pass, err := filterS.Pass("cgrates.org",
[]string{"*gt:~*req.MaxUsage:0s"}, pEv); err != nil {
t.Error(err)
} else if pass {
t.Errorf("Expecting: false , received: %+v", pass)
}
//check with max usage 0 should fail
passEvent2 := map[string]any{
"MaxUsage": 0,
}
pEv = utils.MapStorage{}
pEv.Set([]string{utils.MetaReq}, passEvent2)
if pass, err := filterS.Pass("cgrates.org",
[]string{"*gt:~*req.MaxUsage:0s"}, pEv); err != nil {
t.Error(err)
} else if pass {
t.Errorf("Expecting: false, received: %+v", pass)
}
//check with max usage 123 should pass
passEvent3 := map[string]any{
"MaxUsage": 123,
}
pEv = utils.MapStorage{}
pEv.Set([]string{utils.MetaReq}, passEvent3)
if pass, err := filterS.Pass("cgrates.org",
[]string{"*gt:~*req.MaxUsage:0"}, pEv); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("Expecting: true, received: %+v", pass)
}
if pass, err := filterS.Pass("cgrates.org",
[]string{"*gt:~*req.MaxUsage:0"}, pEv); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("Expecting: true, received: %+v", pass)
}
}
func TestPassFilterMissingField(t *testing.T) {
cfg := config.NewDefaultCGRConfig()
data, dErr := NewInternalDB(nil, nil, true, nil, cfg.DataDbCfg().Items)
if dErr != nil {
t.Error(dErr)
}
dmFilterPass := NewDataManager(data, config.CgrConfig().CacheCfg(), nil)
filterS := FilterS{
cfg: cfg,
dm: dmFilterPass,
}
passEvent1 := map[string]any{
"test": "call",
}
pEv := utils.MapStorage{}
pEv.Set([]string{utils.MetaReq}, passEvent1)
if pass, err := filterS.Pass("cgrates.org",
[]string{"*rsr:~*req.Category:^$"}, pEv); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("Expecting: true , received: %+v", pass)
}
passEvent2 := map[string]any{
"Category": "",
}
pEv = utils.MapStorage{}
pEv.Set([]string{utils.MetaReq}, passEvent2)
if pass, err := filterS.Pass("cgrates.org",
[]string{"*rsr:~*req.Category:^$"}, pEv); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("Expecting: true , received: %+v", pass)
}
passEvent3 := map[string]any{
"Category": "call",
}
pEv = utils.MapStorage{}
pEv.Set([]string{utils.MetaReq}, passEvent3)
if pass, err := filterS.Pass("cgrates.org",
[]string{"*rsr:~*req.Category:^$"}, pEv); err != nil {
t.Error(err)
} else if pass {
t.Errorf("Expecting: false , received: %+v", pass)
}
}
func TestEventCostFilter(t *testing.T) {
cfg := config.NewDefaultCGRConfig()
data, dErr := NewInternalDB(nil, nil, true, nil, cfg.DataDbCfg().Items)
if dErr != nil {
t.Error(dErr)
}
dmFilterPass := NewDataManager(data, config.CgrConfig().CacheCfg(), nil)
filterS := FilterS{
cfg: cfg,
dm: dmFilterPass,
}
cd := &EventCost{
Cost: utils.Float64Pointer(0.264933),
CGRID: "d8534def2b7067f4f5ad4f7ec7bbcc94bb46111a",
Rates: ChargedRates{
"3db483c": RateGroups{
{
Value: 0.1574,
RateUnit: 60000000000,
RateIncrement: 30000000000,
GroupIntervalStart: 0,
},
{
Value: 0.1574,
RateUnit: 60000000000,
RateIncrement: 1000000000,
GroupIntervalStart: 30000000000,
},
},
},
RunID: "*default",
Usage: utils.DurationPointer(101 * time.Second),
Rating: Rating{
"7f3d423": &RatingUnit{
MaxCost: 40,
RatesID: "3db483c",
TimingID: "128e970",
ConnectFee: 0,
RoundingMethod: "*up",
MaxCostStrategy: "*disconnect",
RatingFiltersID: "f8e95f2",
RoundingDecimals: 4,
},
},
Charges: []*ChargingInterval{
{
RatingID: "7f3d423",
Increments: []*ChargingIncrement{
{
Cost: 0.0787,
Usage: 30000000000,
AccountingID: "fee8a3a",
CompressFactor: 1,
},
},
CompressFactor: 1,
},
{
RatingID: "7f3d423",
Increments: []*ChargingIncrement{
{
Cost: 0.002623,
Usage: 1000000000,
AccountingID: "3463957",
CompressFactor: 71,
},
},
CompressFactor: 1,
},
},
Timings: ChargedTimings{
"128e970": &ChargedTiming{
StartTime: "00:00:00",
},
},
StartTime: time.Date(2019, 12, 06, 11, 57, 32, 0, time.UTC),
Accounting: Accounting{
"3463957": &BalanceCharge{
Units: 0.002623,
RatingID: "",
AccountID: "cgrates.org:1001",
BalanceUUID: "154419f2-45e0-4629-a203-06034ccb493f",
ExtraChargeID: "",
},
"fee8a3a": &BalanceCharge{
Units: 0.0787,
RatingID: "",
AccountID: "cgrates.org:1001",
BalanceUUID: "154419f2-45e0-4629-a203-06034ccb493f",
ExtraChargeID: "",
},
},
RatingFilters: RatingFilters{
"f8e95f2": RatingMatchedFilters{
"Subject": "*out:cgrates.org:mo_call_UK_Mobile_O2_GBRCN:*any",
"RatingPlanID": "RP_MO_CALL_44800",
"DestinationID": "DST_44800",
"DestinationPrefix": "44800",
},
},
AccountSummary: &AccountSummary{
ID: "234189200129930",
Tenant: "cgrates.org",
Disabled: false,
AllowNegative: false,
BalanceSummaries: BalanceSummaries{
&BalanceSummary{
ID: "MOBILE_DATA",
Type: "*data",
UUID: "08a05723-5849-41b9-b6a9-8ee362539280",
Value: 3221225472,
Disabled: false,
},
&BalanceSummary{
ID: "MOBILE_SMS",
Type: "*sms",
UUID: "06a87f20-3774-4eeb-826e-a79c5f175fd3",
Value: 247,
Disabled: false,
},
&BalanceSummary{
ID: "MOBILE_VOICE",
Type: "*voice",
UUID: "4ad16621-6e22-4e35-958e-5e1ff93ad7b7",
Value: 14270000000000,
Disabled: false,
},
&BalanceSummary{
ID: "MONETARY_POSTPAID",
Type: "*monetary",
UUID: "154419f2-45e0-4629-a203-06034ccb493f",
Value: 50,
Disabled: false,
},
},
},
}
cd.initCache()
cgrDp := utils.MapStorage{utils.MetaEC: cd}
if pass, err := filterS.Pass("cgrates.org",
[]string{"*string:~*ec.Charges[0].Increments[0].Accounting.Balance.Value:50"}, cgrDp); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("Expecting: true , received: %+v", pass)
}
if pass, err := filterS.Pass("cgrates.org",
[]string{"*string:~*ec.Charges[0].Increments[0].Accounting.AccountID:cgrates.org:1001"}, cgrDp); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("Expecting: true , received: %+v", pass)
}
if pass, err := filterS.Pass("cgrates.org",
[]string{"*string:~*ec.Charges[0].Rating.Rates[0].Value:0.1574"}, cgrDp); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("Expecting: true , received: %+v", pass)
}
if pass, err := filterS.Pass("cgrates.org",
[]string{"*string:~*ec.Charges[0].Increments[0].Accounting.Balance.ID:MONETARY_POSTPAID"}, cgrDp); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("Expecting: true , received: %+v", pass)
}
if pass, err := filterS.Pass("cgrates.org",
[]string{"*lt:~*ec.AccountSummary.BalanceSummaries.MONETARY_POSTPAID.Value:60"}, cgrDp); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("Expecting: true , received: %+v", pass)
}
}
func TestVerifyPrefixes(t *testing.T) {
rf, err := NewFilterRule(utils.MetaString, "~*req.Account", []string{"1001"})
if err != nil {
t.Errorf("Error: %+v", err)
}
prefixes := []string{utils.DynamicDataPrefix + utils.MetaReq}
if check := verifyPrefixes(rf, prefixes); !check {
t.Errorf("Expecting: true , received: %+v", check)
}
rf, err = NewFilterRule(utils.MetaString, "~*req.Account", []string{"~*req.Field1"})
if err != nil {
t.Errorf("Error: %+v", err)
}
if check := verifyPrefixes(rf, prefixes); !check {
t.Errorf("Expecting: true , received: %+v", check)
}
rf, err = NewFilterRule(utils.MetaString, "~*req.Account", []string{"~*req.Field1", "~*req.Field2"})
if err != nil {
t.Errorf("Error: %+v", err)
}
if check := verifyPrefixes(rf, prefixes); !check {
t.Errorf("Expecting: true , received: %+v", check)
}
rf, err = NewFilterRule(utils.MetaString, "~*vars.Account", []string{"1001"})
if err != nil {
t.Errorf("Error: %+v", err)
}
if check := verifyPrefixes(rf, prefixes); check {
t.Errorf("Expecting: false , received: %+v", check)
}
rf, err = NewFilterRule(utils.MetaString, "~*req.Account", []string{"~*req.Field1", "~*vars.Field2"})
if err != nil {
t.Errorf("Error: %+v", err)
}
if check := verifyPrefixes(rf, prefixes); check {
t.Errorf("Expecting: false , received: %+v", check)
}
rf, err = NewFilterRule(utils.MetaString, "~*req.Account", []string{"~*req.Field1", "~*vars.Field2"})
if err != nil {
t.Errorf("Error: %+v", err)
}
prefixes = []string{utils.DynamicDataPrefix + utils.MetaReq, utils.DynamicDataPrefix + utils.MetaVars}
if check := verifyPrefixes(rf, prefixes); !check {
t.Errorf("Expecting: true , received: %+v", check)
}
}
func TestPassPartial(t *testing.T) {
cfg := config.NewDefaultCGRConfig()
data, dErr := NewInternalDB(nil, nil, true, nil, cfg.DataDbCfg().Items)
if dErr != nil {
t.Error(dErr)
}
dmFilterPass := NewDataManager(data, config.CgrConfig().CacheCfg(), nil)
filterS := FilterS{
cfg: cfg,
dm: dmFilterPass,
}
passEvent := map[string]any{
"Account": "1007",
}
fEv := utils.MapStorage{}
fEv.Set([]string{utils.MetaReq}, passEvent)
prefixes := []string{utils.DynamicDataPrefix + utils.MetaReq}
if pass, ruleList, err := filterS.LazyPass("cgrates.org",
[]string{"*string:~*req.Account:1007"}, fEv, prefixes); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("Expecting: %+v, received: %+v", true, pass)
} else if len(ruleList) != 0 {
t.Errorf("Expecting: %+v, received: %+v", 0, len(ruleList))
}
// in PartialPass we verify the filters matching the prefixes
if pass, ruleList, err := filterS.LazyPass("cgrates.org",
[]string{"*string:~*req.Account:1007", "*string:~*vars.Field1:Val1"}, fEv, prefixes); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("Expecting: %+v, received: %+v", true, pass)
} else if len(ruleList) != 1 {
t.Errorf("Expecting: %+v, received: %+v", 1, len(ruleList))
}
if pass, ruleList, err := filterS.LazyPass("cgrates.org",
[]string{"*string:~*req.Account:1010", "*string:~*vars.Field1:Val1"}, fEv, prefixes); err != nil {
t.Error(err)
} else if pass {
t.Errorf("Expecting: %+v, received: %+v", false, pass)
} else if len(ruleList) != 0 {
t.Errorf("Expecting: %+v, received: %+v", 0, len(ruleList))
}
}
func TestNewFilterFromInline(t *testing.T) {
exp := &Filter{
Tenant: "cgrates.org",
ID: "*string:~*req.Account:~*uhc.<~*req.CGRID;-Account>|1001",
Rules: []*FilterRule{
{
Type: utils.MetaString,
Element: "~*req.Account",
Values: []string{"~*uhc.<~*req.CGRID;-Account>", "1001"},
},
},
}
if err := exp.Compile(); err != nil {
t.Fatal(err)
}
if rcv, err := NewFilterFromInline("cgrates.org", "*string:~*req.Account:~*uhc.<~*req.CGRID;-Account>|1001"); err != nil {
t.Error(err)
} else if !reflect.DeepEqual(exp, rcv) {
t.Errorf("Expected: %s , received: %s", utils.ToJSON(exp), utils.ToJSON(rcv))
}
if _, err := NewFilterFromInline("cgrates.org", "*string:~*req.Account"); err == nil {
t.Error("Expected error received nil")
}
if _, err := NewFilterFromInline("cgrates.org", "*string:~*req.Account:~*req.CGRID{*|1001"); err == nil {
t.Error("Expected error received nil")
}
}
func TestVerifyInlineFilterS(t *testing.T) {
if err := verifyInlineFilterS([]string{"ATTR", "*string:~*req,Acoount:1001"}); err != nil {
t.Error(err)
}
if err := verifyInlineFilterS([]string{"ATTR", "*string:~*req,Acoount1001"}); err == nil {
t.Errorf("Expected error received nil")
}
}
func TestActivationIntervalPass(t *testing.T) {
cfg := config.NewDefaultCGRConfig()
data, dErr := NewInternalDB(nil, nil, true, nil, cfg.DataDbCfg().Items)
if dErr != nil {
t.Error(dErr)
}
dmFilterPass := NewDataManager(data, config.CgrConfig().CacheCfg(), nil)
filterS := FilterS{
cfg: cfg,
dm: dmFilterPass,
}
passEvent := map[string]any{
"CustomTime": time.Date(2013, time.July, 1, 0, 0, 0, 0, time.UTC),
}
fEv := utils.MapStorage{}
fEv.Set([]string{utils.MetaReq}, passEvent)
if pass, err := filterS.Pass("cgrates.org",
[]string{"*ai:~*req.CustomTime:2013-06-01T00:00:00Z"}, fEv); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("Expecting: %+v, received: %+v", true, pass)
}
if pass, err := filterS.Pass("cgrates.org",
[]string{"*ai:~*req.CustomTime:2013-09-01T00:00:00Z"}, fEv); err != nil {
t.Error(err)
} else if pass {
t.Errorf("Expecting: %+v, received: %+v", false, pass)
}
if pass, err := filterS.Pass("cgrates.org",
[]string{"*ai:~*req.CustomTime:|2013-09-01T00:00:00Z"}, fEv); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("Expecting: %+v, received: %+v", true, pass)
}
if pass, err := filterS.Pass("cgrates.org",
[]string{"*ai:~*req.CustomTime:|2013-06-01T00:00:00Z"}, fEv); err != nil {
t.Error(err)
} else if pass {
t.Errorf("Expecting: %+v, received: %+v", false, pass)
}
if pass, err := filterS.Pass("cgrates.org",
[]string{"*ai:~*req.CustomTime:2013-06-01T00:00:00Z|2013-09-01T00:00:00Z"}, fEv); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("Expecting: %+v, received: %+v", true, pass)
}
if pass, err := filterS.Pass("cgrates.org",
[]string{"*ai:~*req.CustomTime:2013-08-01T00:00:00Z|2013-09-01T00:00:00Z"}, fEv); err != nil {
t.Error(err)
} else if pass {
t.Errorf("Expecting: %+v, received: %+v", false, pass)
}
}
func TestFilterPassIPNet(t *testing.T) {
cd := utils.MapStorage{
"IP": "192.0.2.0",
"WrongIP": "192.0.3.",
}
rf := &FilterRule{Type: utils.MetaIPNet,
Element: "~IP", Values: []string{"192.0.2.1/24"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.passIPNet(cd); err != nil {
t.Error(err)
} else if !passes {
t.Error("Not passes filter")
}
rf = &FilterRule{Type: utils.MetaIPNet,
Element: "~IP", Values: []string{"~IP2", "192.0.3.0/30"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.passIPNet(cd); err != nil {
t.Error(err)
} else if passes {
t.Error("Filter passes")
}
//not
rf = &FilterRule{Type: utils.MetaNotIPNet,
Element: "~IP", Values: []string{"192.0.2.0/24"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.Pass(cd); err != nil {
t.Error(err)
} else if passes {
t.Error("Filter passes")
}
rf = &FilterRule{Type: utils.MetaNotIPNet,
Element: "~IP", Values: []string{"192.0.3.0/24"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.Pass(cd); err != nil {
t.Error(err)
} else if !passes {
t.Error("Not passes filter")
}
rf = &FilterRule{Type: utils.MetaIPNet,
Element: "~IP2", Values: []string{"192.0.2.0/24"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.passIPNet(cd); err != nil {
t.Error(err)
} else if passes {
t.Error("Filter passes")
}
rf = &FilterRule{Type: utils.MetaIPNet,
Element: "~IP", Values: []string{"192.0.2.0"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.passIPNet(cd); err != nil {
t.Error(err)
} else if passes {
t.Error("Filter passes")
}
rf = &FilterRule{Type: utils.MetaIPNet,
Element: "~WrongIP", Values: []string{"192.0.2.0"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if passes, err := rf.passIPNet(cd); err != nil {
t.Error(err)
} else if passes {
t.Error("Filter passes")
}
rf = &FilterRule{Type: utils.MetaIPNet,
Element: "~IP{*duration}", Values: []string{"192.0.2.0/24"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if _, err := rf.Pass(cd); err == nil {
t.Error(err)
}
}
func TestAPIBan(t *testing.T) {
var counter int
testServer := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
if r.Method != "GET" {
w.WriteHeader(http.StatusMethodNotAllowed)
return
}
responses := map[string]struct {
code int
body []byte
}{
"/testKey/check/1.2.3.251": {code: http.StatusOK, body: []byte(`{"ipaddress":["1.2.3.251"], "ID":"987654321"}`)},
"/testKey/check/1.2.3.254": {code: http.StatusBadRequest, body: []byte(`{"ipaddress":["not blocked"], "ID":"none"}`)},
}
if val, has := responses[r.URL.EscapedPath()]; has {
w.WriteHeader(val.code)
if val.body != nil {
w.Write(val.body)
}
return
}
counter++
w.WriteHeader(http.StatusOK)
if counter < 2 {
_, _ = w.Write([]byte(`{"ipaddress": ["1.2.3.251", "1.2.3.252"], "ID": "100"}`))
} else {
_, _ = w.Write([]byte(`{"ID": "none"}`))
counter = 0
}
}))
defer testServer.Close()
baningo.RootURL = testServer.URL + "/"
dp := utils.MapStorage{
utils.MetaReq: utils.MapStorage{
"bannedIP": "1.2.3.251",
"bannedIP2": "1.2.3.252",
"IP": "1.2.3.253",
"IP2": "1.2.3.254",
},
}
cfg := config.NewDefaultCGRConfig()
data, dErr := NewInternalDB(nil, nil, true, nil, cfg.DataDbCfg().Items)
if dErr != nil {
t.Error(dErr)
}
dmFilterPass := NewDataManager(data, config.CgrConfig().CacheCfg(), nil)
filterS := FilterS{
cfg: cfg,
dm: dmFilterPass,
}
config.CgrConfig().APIBanCfg().Keys = []string{"testKey"}
if pass, err := filterS.Pass("cgrates.org", []string{"*apiban:~*req.IP:*all"}, dp); err != nil {
t.Fatal(err)
} else if pass {
t.Error("Expected not to pass")
}
// from cache
if pass, err := filterS.Pass("cgrates.org", []string{"*apiban:~*req.IP:*all"}, dp); err != nil {
t.Fatal(err)
} else if pass {
t.Error("Expected not to pass")
}
if pass, err := filterS.Pass("cgrates.org", []string{"*apiban:~*req.IP2:*single"}, dp); err != nil {
t.Fatal(err)
} else if pass {
t.Error("Expected not to pass")
}
Cache.Clear([]string{utils.MetaAPIBan})
if pass, err := filterS.Pass("cgrates.org", []string{"*apiban:~*req.bannedIP:*single"}, dp); err != nil {
t.Fatal(err)
} else if !pass {
t.Error("Expected to pass")
}
if pass, err := filterS.Pass("cgrates.org", []string{"*apiban:~*req.bannedIP2:*all"}, dp); err != nil {
t.Fatal(err)
} else if !pass {
t.Error("Expected to pass")
}
if pass, err := filterS.Pass("cgrates.org", []string{"*apiban:~*req.notFound:*all"}, dp); err != nil {
t.Fatal(err)
} else if pass {
t.Error("Expected not to pass")
}
expErr := "invalid value for apiban filter: <*any>"
if _, err := filterS.Pass("cgrates.org", []string{"*apiban:~*req.IP:*any"}, dp); err == nil || err.Error() != expErr {
t.Errorf("Expected error %s received: %v", expErr, err)
}
baningo.RootURL = "http://127.0.0.1:12345/"
expErr = `Get "http://127.0.0.1:12345/testKey/banned/100": dial tcp 127.0.0.1:12345: connect: connection refused`
if _, err := filterS.Pass("cgrates.org", []string{"*apiban:~*req.IP:*all"}, dp); err == nil || err.Error() != expErr {
t.Errorf("Expected error %s received: %v", expErr, err)
}
expErr = `Get "http://127.0.0.1:12345/testKey/check/1.2.3.253": dial tcp 127.0.0.1:12345: connect: connection refused`
if _, err := filterS.Pass("cgrates.org", []string{"*apiban:~*req.IP:*single"}, dp); err == nil || err.Error() != expErr {
t.Errorf("Expected error %s received: %v", expErr, err)
}
expErr = `invalid converter value in string: <*>, err: unsupported converter definition: <*>`
if _, err := filterS.Pass("cgrates.org", []string{"*apiban:~*req.<~*req.IP>{*}:*all"}, dp); err == nil || err.Error() != expErr {
t.Errorf("Expected error %s received: %v", expErr, err)
}
}
func TestFiltersPassTimingsErrParseNotFound(t *testing.T) {
fltr, err := NewFilterRule(utils.MetaTimings, "~*req.AnswerTime", []string{"2018-01-07T17:00:10Z"})
if err != nil {
t.Fatal(err)
}
dtP := utils.MapStorage{}
rcv, err := fltr.passTimings(dtP)
if err != nil {
t.Error(err)
}
if rcv != false {
t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", false, rcv)
}
}
func TestFiltersPassTimingsErrParseWrongPath(t *testing.T) {
fltr, err := NewFilterRule(utils.MetaTimings, "~*req.AnswerTime", []string{"2018-01-07T17:00:10Z"})
if err != nil {
t.Fatal(err)
}
dtP := utils.MapStorage{
utils.MetaReq: 13,
}
experr := utils.ErrWrongPath
rcv, err := fltr.passTimings(dtP)
if err == nil || err != experr {
t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", experr, err)
}
if rcv != false {
t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", false, rcv)
}
}
func TestFiltersPassTimingsTimeConvertErr(t *testing.T) {
fltr, err := NewFilterRule(utils.MetaTimings, "~*req.AnswerTime", []string{"2018-01-07T17:00:10Z"})
if err != nil {
t.Fatal(err)
}
dtP := utils.MapStorage{
utils.MetaReq: map[string]any{
"AnswerTime": "invalid time",
},
}
experr := "Unsupported time format"
rcv, err := fltr.passTimings(dtP)
if err == nil || err.Error() != experr {
t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", experr, err)
}
if rcv != false {
t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", false, rcv)
}
}
func TestFiltersPassTimingsParseDPErr(t *testing.T) {
fltr, err := NewFilterRule(utils.MetaTimings, "~*req.AnswerTime", []string{"~2018-01-07T17:00:10Z"})
if err != nil {
t.Fatal(err)
}
dtP := utils.MapStorage{
utils.MetaReq: map[string]any{
"AnswerTime": "2018-01-07T17:00:10Z",
},
}
experr := utils.ErrNotFound
rcv, err := fltr.passTimings(dtP)
if err == nil || err != experr {
t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", experr, err)
}
if rcv != false {
t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", false, rcv)
}
}
func TestFiltersPassTimingsCallSuccessful(t *testing.T) {
tmp1, tmp2 := connMgr, config.CgrConfig()
defer func() {
connMgr = tmp1
config.SetCgrConfig(tmp2)
}()
cfg := config.NewDefaultCGRConfig()
cfg.FilterSCfg().ApierSConns = []string{utils.ConcatenatedKey(utils.MetaInternal, utils.MetaApier)}
config.SetCgrConfig(cfg)
Cache.Clear(nil)
client := make(chan birpc.ClientConnector, 1)
ccM := &ccMock{
calls: map[string]func(ctx *context.Context, args any, reply any) error{
utils.APIerSv1GetTiming: func(ctx *context.Context, args, reply any) error {
exp := &utils.TPTiming{
ID: "MIDNIGHT",
Years: utils.Years{2020, 2018},
Months: utils.Months{1, 2, 3, 4},
MonthDays: utils.MonthDays{5, 6, 7, 8},
WeekDays: utils.WeekDays{0, 1, 2, 3, 4, 5, 6},
StartTime: "17:00:00",
EndTime: "17:00:18",
}
*reply.(*utils.TPTiming) = *exp
return nil
},
},
}
client <- ccM
NewConnManager(cfg, map[string]chan birpc.ClientConnector{
utils.ConcatenatedKey(utils.MetaInternal, utils.MetaApier): client,
})
fltr, err := NewFilterRule(utils.MetaTimings, "~*req.AnswerTime", []string{"2018-01-07T17:00:10Z"})
if err != nil {
t.Fatal(err)
}
dtP := utils.MapStorage{
utils.MetaReq: map[string]any{
"AnswerTime": "2018-01-07T17:00:10Z",
},
}
rcv, err := fltr.passTimings(dtP)
if err != nil {
t.Error(err)
}
if rcv != true {
t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", true, rcv)
}
}
func TestFiltersPassTimingsCallErr(t *testing.T) {
fltr, err := NewFilterRule(utils.MetaTimings, "~*req.AnswerTime", []string{"2018-01-07T17:00:10Z"})
if err != nil {
t.Fatal(err)
}
dtP := utils.MapStorage{
utils.MetaReq: map[string]any{
"AnswerTime": "2018-01-07T17:00:10Z",
},
}
rcv, err := fltr.passTimings(dtP)
if err.Error() != "MANDATORY_IE_MISSING: [connIDs]" {
t.Error(err)
}
if rcv != false {
t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", false, rcv)
}
}
func TestFiltersPassDestinationsErrParseNotFound(t *testing.T) {
fltr, err := NewFilterRule(utils.MetaDestinations, "~*req.Destination", []string{"DST_1001"})
if err != nil {
t.Fatal(err)
}
dtP := utils.MapStorage{}
rcv, err := fltr.passDestinations(dtP)
if err != nil {
t.Error(err)
}
if rcv != false {
t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", false, rcv)
}
}
func TestFiltersPassDestinationsErrParseWrongPath(t *testing.T) {
fltr, err := NewFilterRule(utils.MetaDestinations, "~*req.Destination", []string{"DST_1001"})
if err != nil {
t.Fatal(err)
}
dtP := utils.MapStorage{
utils.MetaReq: 13,
}
experr := utils.ErrWrongPath
rcv, err := fltr.passDestinations(dtP)
if err == nil || err != experr {
t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", experr, err)
}
if rcv != false {
t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", false, rcv)
}
}
func TestFiltersPassDestinationsCallErr(t *testing.T) {
fltr, err := NewFilterRule(utils.MetaDestinations, "~*req.Destination", []string{"DST_1001"})
if err != nil {
t.Fatal(err)
}
dtP := utils.MapStorage{
utils.MetaReq: map[string]any{
utils.Destination: "DST_1001",
},
}
rcv, err := fltr.passDestinations(dtP)
if err.Error() != "MANDATORY_IE_MISSING: [connIDs]" {
t.Error(err)
}
if rcv != false {
t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", false, rcv)
}
}
func TestFiltersPassDestinationsCallSuccessSameDest(t *testing.T) {
tmp1, tmp2 := connMgr, config.CgrConfig()
defer func() {
connMgr = tmp1
config.SetCgrConfig(tmp2)
}()
cfg := config.NewDefaultCGRConfig()
cfg.FilterSCfg().ApierSConns = []string{utils.ConcatenatedKey(utils.MetaInternal, utils.MetaApier)}
config.SetCgrConfig(cfg)
Cache.Clear(nil)
client := make(chan birpc.ClientConnector, 1)
ccM := &ccMock{
calls: map[string]func(ctx *context.Context, args any, reply any) error{
utils.APIerSv1GetDestination: func(ctx *context.Context, args, reply any) error {
*reply.(*Destination) = Destination{
Id: "DST_1002",
Prefixes: []string{"1002"},
}
return nil
},
},
}
client <- ccM
NewConnManager(cfg, map[string]chan birpc.ClientConnector{
utils.ConcatenatedKey(utils.MetaInternal, utils.MetaApier): client,
})
fltr, err := NewFilterRule(utils.MetaDestinations, "~*req.Destination", []string{"DST_1002"})
if err != nil {
t.Fatal(err)
}
dtP := utils.MapStorage{
utils.MetaReq: map[string]any{
utils.Destination: "1002",
},
}
rcv, err := fltr.passDestinations(dtP)
if err != nil {
t.Error(err)
}
if rcv != true {
t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", true, rcv)
}
}
func TestFiltersPassDestinationsCallSuccessParseErr(t *testing.T) {
tmp1, tmp2 := connMgr, config.CgrConfig()
defer func() {
connMgr = tmp1
config.SetCgrConfig(tmp2)
}()
cfg := config.NewDefaultCGRConfig()
cfg.FilterSCfg().ApierSConns = []string{utils.ConcatenatedKey(utils.MetaInternal, utils.MetaApier)}
config.SetCgrConfig(cfg)
Cache.Clear(nil)
client := make(chan birpc.ClientConnector, 1)
ccM := &ccMock{
calls: map[string]func(ctx *context.Context, args any, reply any) error{
utils.APIerSv1GetDestination: func(ctx *context.Context, args, reply any) error {
*reply.(*Destination) = Destination{
Id: "DST_1002",
Prefixes: []string{"1002"},
}
return nil
},
},
}
client <- ccM
NewConnManager(cfg, map[string]chan birpc.ClientConnector{
utils.ConcatenatedKey(utils.MetaInternal, utils.MetaApier): client,
})
fltr, err := NewFilterRule(utils.MetaDestinations, "~*req.Destination", []string{"~DST_1002"})
if err != nil {
t.Fatal(err)
}
dtP := utils.MapStorage{
utils.MetaReq: map[string]any{
utils.Destination: "DST_1002",
},
}
rcv, err := fltr.passDestinations(dtP)
if err != nil {
t.Error(err)
}
if rcv != false {
t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", false, rcv)
}
}
func TestFiltersPassRSRErrParseWrongPath(t *testing.T) {
fltr, err := NewFilterRule(utils.MetaDestinations, "~*req.Destination", []string{"DST_1001"})
if err != nil {
t.Fatal(err)
}
dtP := utils.MapStorage{
utils.MetaReq: 13,
}
experr := utils.ErrWrongPath
rcv, err := fltr.passRSR(dtP)
if err == nil || err != experr {
t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", experr, err)
}
if rcv != false {
t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", false, rcv)
}
}
func TestFiltersPassGreaterThanErrParseWrongPath(t *testing.T) {
fltr, err := NewFilterRule(utils.MetaGreaterThan, "~*req.Usage", []string{"10"})
if err != nil {
t.Fatal(err)
}
dtP := utils.MapStorage{
utils.MetaReq: 13,
}
experr := utils.ErrWrongPath
rcv, err := fltr.passGreaterThan(dtP)
if err == nil || err != experr {
t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", experr, err)
}
if rcv != false {
t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", false, rcv)
}
}
func TestFiltersPassGreaterThanErrIncomparable(t *testing.T) {
fltr, err := NewFilterRule(utils.MetaGreaterThan, "~*req.Usage", []string{"10"})
fltr.rsrElement.Rules = "rules"
if err != nil {
t.Fatal(err)
}
dtP := utils.MapStorage{
utils.MetaReq: map[string]any{
utils.Usage: nil,
},
}
experr := fmt.Sprintf("incomparable: <%v> with <%d>", nil, 10)
rcv, err := fltr.passGreaterThan(dtP)
if err == nil || err.Error() != experr {
t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", experr, err)
}
if rcv != false {
t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", false, rcv)
}
}
func TestFiltersPassGreaterThanErrParseValues(t *testing.T) {
fltr, err := NewFilterRule(utils.MetaGreaterThan, "~*req.Usage", []string{"~10"})
if err != nil {
t.Fatal(err)
}
dtP := utils.MapStorage{
utils.MetaReq: map[string]any{
utils.Usage: "10",
},
}
rcv, err := fltr.passGreaterThan(dtP)
if err != nil {
t.Error(err)
}
if rcv != false {
t.Errorf("\nexpected: <%+v>, \nreceived: <%+v>", false, rcv)
}
}
func TestFilterPassRSRFieldsWithMultplieValues(t *testing.T) {
ev := utils.MapStorage{
utils.MetaReq: utils.MapStorage{
"23": "sip:11561561561561568@dan",
},
}
cfg := config.NewDefaultCGRConfig()
idb, dErr := NewInternalDB(nil, nil, true, nil, cfg.DataDbCfg().Items)
if dErr != nil {
t.Error(dErr)
}
dm := NewDataManager(idb, cfg.CacheCfg(), nil)
flts := NewFilterS(cfg, nil, dm)
if passes, err := flts.Pass("cgrates.org", []string{"*rsr:~*req.23:dan|1001"}, ev); err != nil {
t.Error(err)
} else if !passes {
t.Error("Not passing")
}
if passes, err := flts.Pass("cgrates.org", []string{"*rsr:~*req.23:dan"}, ev); err != nil {
t.Error(err)
} else if !passes {
t.Error("Not passing")
}
}
func TestFilterGreaterThanOnObjectDP(t *testing.T) {
cfg := config.NewDefaultCGRConfig()
cfg.FilterSCfg().ResourceSConns = []string{utils.ConcatenatedKey(utils.MetaInternal, utils.MetaResources)}
idb, dErr := NewInternalDB(nil, nil, true, nil, cfg.DataDbCfg().Items)
if dErr != nil {
t.Error(dErr)
}
dm := NewDataManager(idb, cfg.CacheCfg(), nil)
mockConn := &ccMock{
calls: map[string]func(ctx *context.Context, args any, reply any) error{
utils.ResourceSv1GetResourceWithConfig: func(ctx *context.Context, args any, reply any) error {
*(reply.(*ResourceWithConfig)) = ResourceWithConfig{
Resource: &Resource{},
}
return nil
},
},
}
mockChan := make(chan birpc.ClientConnector, 1)
mockChan <- mockConn
connMgr := NewConnManager(cfg, map[string]chan birpc.ClientConnector{
utils.ConcatenatedKey(utils.MetaInternal, utils.MetaResources): mockChan,
})
flts := NewFilterS(cfg, connMgr, dm)
ev := utils.MapStorage{}
if _, err := flts.Pass("cgrates.org", []string{"*gte:~*resources.RES1.Available2:2",
"*lt:~*resources.RES1.Available2:10"}, ev); err != nil {
t.Error(err)
}
}
func TestWeightFromDynamics(t *testing.T) {
dWs := []*utils.DynamicWeight{
{
FilterIDs: []string{"*destinations:~*req.Destination:EU"},
Weight: 10.2,
},
}
cfg := config.NewDefaultCGRConfig()
data, dErr := NewInternalDB(nil, nil, true, nil, cfg.DataDbCfg().Items)
if dErr != nil {
t.Error(dErr)
}
dmSPP := NewDataManager(data, config.CgrConfig().CacheCfg(), nil)
passEvent := map[string]any{
utils.Destination: "+4986517174963",
}
pEv := utils.MapStorage{utils.MetaReq: passEvent}
fltrS := &FilterS{
cfg: cfg,
dm: dmSPP,
connMgr: nil,
}
if _, err := WeightFromDynamics(dWs, fltrS, "cgrates.org", pEv); err.Error() != "MANDATORY_IE_MISSING: [connIDs]" {
t.Error(err)
}
}
func TestCheckFilterErr(t *testing.T) {
fltr := &Filter{
Tenant: "cgrates.org",
ID: "FLTR_CP_2",
Rules: []*FilterRule{
{
Type: utils.MetaString,
Element: "~.",
Values: []string{"ChargerProfile2"},
},
},
}
if err := CheckFilter(fltr); err == nil || !strings.Contains(err.Error(), "Empty field path for filter <&{cgrates.org FLTR_CP_2 ") {
t.Error(err)
}
fltr = &Filter{
Tenant: "cgrates.org",
ID: "TestFilter",
Rules: []*FilterRule{{
Element: "~*req.Account",
Type: utils.MetaString,
Values: []string{"~."},
},
},
}
if err := CheckFilter(fltr); err == nil || !strings.Contains(err.Error(), "Empty field path for filter <&{cgrates.org TestFilter ") {
t.Error(err)
}
}
func TestFilterPassRegexErr(t *testing.T) {
cd := &CallDescriptor{
Category: "callx",
Tenant: "cgrates.org",
Subject: "dan",
Destination: "+4986517174963",
TimeStart: time.Date(2013, time.October, 7, 14, 50, 0, 0, time.UTC),
TimeEnd: time.Date(2013, time.October, 7, 14, 52, 12, 0, time.UTC),
DurationIndex: 132 * time.Second,
ExtraFields: map[string]string{"navigation": "off"},
}
rf := &FilterRule{Type: utils.MetaRegex,
Element: "~ategory", Values: []string{"^call"}}
if err := rf.CompileValues(); err != nil {
t.Fatal(err)
}
if pass, err := rf.passRegex(cd); err != nil || pass {
t.Error(err)
}
}
func TestFilterLazyPassErr(t *testing.T) {
tmp := Cache
defer func() {
Cache = tmp
}()
Cache.Clear(nil)
cfg := config.NewDefaultCGRConfig()
db, dErr := NewInternalDB(nil, nil, true, nil, cfg.DataDbCfg().Items)
if dErr != nil {
t.Error(dErr)
}
dm := NewDataManager(db, config.CgrConfig().CacheCfg(), nil)
filterS := FilterS{
cfg: cfg,
dm: dm,
}
fltrID := "*string:~*req.Account:1007"
passEvent := map[string]any{
"Account": "1007",
}
dm.dataDB = &DataDBMock{}
fEv := utils.MapStorage{}
fEv.Set([]string{utils.MetaReq}, passEvent)
prefixes := []string{utils.DynamicDataPrefix + utils.MetaReq}
Cache.Set(utils.CacheFilters, utils.ConcatenatedKey("cgrates.org", fltrID), nil, []string{}, true, utils.NonTransactional)
if _, _, err := filterS.LazyPass("cgrates.org",
[]string{fltrID}, fEv, prefixes); err == nil || err.Error() != utils.ErrPrefixNotFound(fltrID).Error() {
t.Error(err)
}
}
func TestSentryPeer(t *testing.T) {
token := "token27072023"
count := 0
testServer := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
if r.Method == http.MethodPost {
if r.URL.EscapedPath() != "/oauth/token" {
w.WriteHeader(http.StatusNotFound)
return
}
contentType := r.Header.Get(utils.ContentType)
if contentType != utils.JsonBody {
w.WriteHeader(http.StatusBadRequest)
return
}
var data map[string]string
err := json.NewDecoder(r.Body).Decode(&data)
if err != nil {
w.WriteHeader(http.StatusBadRequest)
return
}
if data[utils.ClientIdCfg] != "ererwffwssf" ||
data[utils.ClientSecretCfg] != "3354rf43f34sf" ||
data[utils.AudienceCfg] != "https://sentrypeer.com/api" ||
data[utils.GrantTypeCfg] != "client_credentials" {
w.WriteHeader(http.StatusBadRequest)
return
}
response := struct {
AccessToken string `json:"access_token"`
}{
AccessToken: token,
}
w.WriteHeader(http.StatusOK)
err = json.NewEncoder(w).Encode(response)
if err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
return
}
return
}
if r.Method != http.MethodGet {
w.WriteHeader(http.StatusMethodNotAllowed)
return
}
responses := map[string]struct {
code int
body []byte
}{
"/api/ip-addresses/1.2.3.254": {code: http.StatusNotFound, body: []byte(`{"IP Address not found"}`)},
"/api/ip-addresses/184.168.31.232": {code: http.StatusOK, body: []byte(`{"IP Address found"}`)},
"/api/phone-numbers/22663272712": {code: http.StatusNotFound, body: []byte(`Phone Number not found`)},
"/api/phone-numbers/90046322651795": {code: http.StatusOK, body: []byte(`{"Phone Number found`)},
"/api/phone-numbers/1123452353245": {code: http.StatusUnauthorized, body: []byte(`{"Not Authorized`)},
}
if val, has := responses[r.URL.EscapedPath()]; has {
if r.Header.Get(utils.AuthorizationHdr) != utils.BearerAuth+" "+token {
w.WriteHeader(http.StatusUnauthorized)
return
}
if count == 1 {
w.WriteHeader(http.StatusNotFound)
w.Write([]byte(`Phone number not found`))
return
}
if val.code == http.StatusUnauthorized {
count++
}
w.WriteHeader(val.code)
if val.body != nil {
w.Write(val.body)
}
return
}
w.WriteHeader(http.StatusBadRequest)
w.Write([]byte(`Wrong path in the request`))
}))
defer testServer.Close()
cfg := config.NewDefaultCGRConfig()
data, dErr := NewInternalDB(nil, nil, true, nil, cfg.DataDbCfg().Items)
if dErr != nil {
t.Error(dErr)
}
dm := NewDataManager(data, config.CgrConfig().CacheCfg(), nil)
filterS := FilterS{
cfg: cfg,
dm: dm,
}
dp := utils.MapStorage{
utils.MetaReq: utils.MapStorage{
"BADIP": "184.168.31.232",
"IP": "1.2.3.254",
"Number": "22663272712",
"BadNumber": "90046322651795",
"No": "1123452353245",
},
}
config.CgrConfig().SentryPeerCfg().ClientID = "ererwffwssf"
config.CgrConfig().SentryPeerCfg().ClientSecret = "3354rf43f34sf"
config.CgrConfig().SentryPeerCfg().TokenUrl = testServer.URL + "/oauth/token"
config.CgrConfig().SentryPeerCfg().IpsUrl = testServer.URL + "/api/ip-addresses"
config.CgrConfig().SentryPeerCfg().NumbersUrl = testServer.URL + "/api/phone-numbers"
if pass, err := filterS.Pass("cgrates.org", []string{"*sentrypeer:~*req.IP:*ip"}, dp); err != nil {
t.Error(err)
} else if !pass {
t.Error("Expected to pass")
}
if val, has := Cache.Get(utils.MetaSentryPeer, utils.MetaToken); !has {
t.Error("Expected token to be set in the cahe")
} else if val.(string) != token {
t.Errorf("Expected +%v,Received +%v", token, val)
}
if val, has := Cache.Get(utils.MetaSentryPeer, utils.ConcatenatedKey(utils.MetaIp, "1.2.3.254")); !has {
t.Error("value should had been set in cache")
} else if !val.(bool) {
t.Error("Expected item to be true")
}
if pass, err := filterS.Pass("cgrates.org", []string{"*sentrypeer:~*req.BADIP:*ip"}, dp); err != nil {
t.Error(err)
} else if pass {
t.Error("Expected to not pass")
}
if val, has := Cache.Get(utils.MetaSentryPeer, utils.ConcatenatedKey(utils.MetaIp, "184.168.31.232")); !has {
t.Error("value should had been set in cache")
} else if val.(bool) {
t.Error("Expected item to be false")
}
if pass, err := filterS.Pass("cgrates.org", []string{"*sentrypeer:~*req.Number:*number"}, dp); err != nil {
t.Error(err)
} else if !pass {
t.Error("Expected to pass")
}
if val, has := Cache.Get(utils.MetaSentryPeer, utils.ConcatenatedKey(utils.MetaNumber, "22663272712")); !has {
t.Error("value should had been set in cache")
} else if !val.(bool) {
t.Error("Expected item to be true")
}
if pass, err := filterS.Pass("cgrates.org", []string{"*sentrypeer:~*req.BadNumber:*number"}, dp); err != nil {
t.Error(err)
} else if pass {
t.Error("Expected to not pass")
}
if val, has := Cache.Get(utils.MetaSentryPeer, utils.ConcatenatedKey(utils.MetaNumber, "90046322651795")); !has {
t.Error("value should had been set in cache")
} else if val.(bool) {
t.Error("Expected item to be false")
}
if pass, err := filterS.Pass("cgrates.org", []string{"*sentrypeer:~*req.No:*number"}, dp); err != nil {
t.Error(err)
} else if !pass {
t.Error("Expected to pass")
}
if val, has := Cache.Get(utils.MetaSentryPeer, utils.ConcatenatedKey(utils.MetaNumber, "1123452353245")); !has {
t.Error("value should had been set in cache")
} else if !val.(bool) {
t.Error("Expected item to be true")
}
}
func TestFilterPassTiming(t *testing.T) {
tmp1, tmp2 := connMgr, config.CgrConfig()
defer func() {
connMgr = tmp1
config.SetCgrConfig(tmp2)
}()
cfg := config.NewDefaultCGRConfig()
cfg.FilterSCfg().ApierSConns = []string{utils.ConcatenatedKey(utils.MetaInternal, utils.MetaApier)}
config.SetCgrConfig(cfg)
Cache.Clear(nil)
client := make(chan birpc.ClientConnector, 1)
ccM := &ccMock{
calls: map[string]func(ctx *context.Context, args any, reply any) error{
utils.APIerSv1GetTiming: func(ctx *context.Context, args, reply any) error {
exp := &utils.TPTiming{
ID: "MIDNIGHT",
Years: utils.Years{2023},
Months: utils.Months{1, 2, 3, 4},
MonthDays: utils.MonthDays{5, 6, 7, 8},
WeekDays: utils.WeekDays{0, 1, 2, 3, 4, 5, 6},
StartTime: "17:00:00",
EndTime: "17:00:18",
}
*reply.(*utils.TPTiming) = *exp
return nil
},
},
}
client <- ccM
NewConnManager(cfg, map[string]chan birpc.ClientConnector{
utils.ConcatenatedKey(utils.MetaInternal, utils.MetaApier): client,
})
fltr, err := NewFilterRule(utils.MetaTimings, "~*req.AnswerTime", []string{"2023-01-07T17:00:10Z"})
if err != nil {
t.Fatal(err)
}
dtP := utils.MapStorage{
utils.MetaReq: map[string]any{
"AnswerTime": "2023-01-07T17:00:10Z",
},
}
if pass, err := fltr.Pass(dtP); err != nil {
t.Error(err)
} else if !pass {
t.Errorf("expected: <%+v>, received: <%+v>", false, pass)
}
}
func TestHttpInlineFilter(t *testing.T) {
dP := &utils.MapStorage{
utils.MetaReq: map[string]any{
"Attribute": "AttributeProfile1",
utils.CGRID: "CGRATES_ID1",
utils.AccountField: "1002",
utils.AnswerTime: time.Date(2013, 12, 30, 14, 59, 31, 0, time.UTC),
},
}
srv := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
if r.Method != http.MethodGet {
w.WriteHeader(http.StatusMethodNotAllowed)
return
}
if len(r.URL.Query()) != 0 {
queryVal := r.URL.Query()
reply := queryVal.Has("~*req.Account") && queryVal.Get("~*req.Account") == "1002"
w.WriteHeader(http.StatusOK)
fmt.Fprint(w, reply)
return
}
var data map[string]any
if err := json.NewDecoder(r.Body).Decode(&data); err != nil {
http.Error(w, err.Error(), http.StatusBadRequest)
return
}
_, has := data["*req"]
w.WriteHeader(http.StatusOK)
fmt.Fprint(w, has)
}))
defer srv.Close()
url := "*http#" + "[" + srv.URL + "]"
exp := &Filter{
Tenant: "cgrates.org",
ID: url + ":" + "~*req.Account:",
Rules: []*FilterRule{
{
Type: url,
Element: "~*req.Account",
},
},
}
if err := exp.Compile(); err != nil {
t.Fatal(err)
}
if fl, err := NewFilterFromInline("cgrates.org", url+":"+"~*req.Account:"); err != nil {
t.Error(err)
} else if !reflect.DeepEqual(exp, fl) {
t.Errorf("Expected: %s , received: %s", utils.ToJSON(exp), utils.ToJSON(fl))
}
if pass, err := exp.Rules[0].Pass(dP); err != nil {
t.Error(err)
} else if !pass {
t.Error("should had passed")
}
exp2 := &Filter{
Tenant: "cgrates.org",
ID: url + ":" + "*any:",
Rules: []*FilterRule{
{
Type: url,
Element: "*any",
},
},
}
if fl2, err := NewFilterFromInline("cgrates.org", url+":"+"*any:"); err != nil {
t.Error(err)
} else if fl2.Rules[0].Type != exp2.Rules[0].Type {
t.Errorf("Expected: %s , received: %s", utils.ToJSON(exp2), utils.ToJSON(fl2))
} else if pass, err := fl2.Rules[0].Pass(dP); err != nil {
t.Error(err)
} else if !pass {
t.Error("should had passed")
}
}
func TestFilterStats(t *testing.T) {
tmpConn := connMgr
defer func() {
connMgr = tmpConn
}()
clientConn := make(chan context.ClientConnector, 1)
clientConn <- &ccMock{
calls: map[string]func(ctx *context.Context, args any, reply any) error{
utils.StatSv1GetQueueFloatMetrics: func(ctx *context.Context, args, reply any) error {
*reply.(*map[string]float64) = map[string]float64{
"*sum#~*req.CostDetails.Charges[0].Increments[0].Accounting.Balance.Value": 45,
utils.MetaTCD: float64(20 * time.Second),
"*average#~*req.Usage": float64(5 * time.Second),
utils.MetaACC: 22.2,
}
return nil
},
},
}
connMgr = NewConnManager(config.NewDefaultCGRConfig(), map[string]chan context.ClientConnector{
utils.ConcatenatedKey(utils.MetaInternal, utils.MetaStats): clientConn,
})
testCases := []struct {
name string
input string
shouldPass bool
}{
{
name: "ComposedStatMetric",
input: "*gte:~*stats.SQ_1002.*sum#~*req.CostDetails.Charges[0].Increments[0].Accounting.Balance.Value:20",
shouldPass: true,
},
{
name: "TCDStatMetric",
input: "*lte:~*stats.SQ_1.*tcd:20s",
shouldPass: true,
},
{
name: "AverageStatMetric",
input: "*gt:~*stats.SQ_2.*average#~*req.Usage:4s",
shouldPass: true,
},
{
name: "AverageCallCostStatMetric",
input: "*eq:~*stats.SQ_3.*acc:22.2",
shouldPass: true,
},
}
initDP := utils.MapStorage{}
dp := newDynamicDP(nil, []string{utils.ConcatenatedKey(utils.MetaInternal, utils.MetaStats)}, nil, nil, nil, "cgrates.org", initDP)
for _, tc := range testCases {
t.Run(tc.name, func(t *testing.T) {
fl, err := NewFilterFromInline("cgrates.org", tc.input)
if err != nil {
t.Fatal(err)
}
rule := fl.Rules[0]
pass, err := rule.Pass(dp)
if err != nil {
t.Fatalf("rule.Pass() unexpected error: %v", err)
}
if pass != tc.shouldPass {
t.Errorf("expected rule.Pass() to return %v", tc.shouldPass)
}
})
}
}
func TestFilterTrends(t *testing.T) {
tmpConn := connMgr
defer func() {
connMgr = tmpConn
}()
clientConn := make(chan context.ClientConnector, 1)
clientConn <- &ccMock{
calls: map[string]func(ctx *context.Context, args any, reply any) error{
utils.TrendSv1GetTrendSummary: func(ctx *context.Context, args, reply any) error {
argGetTrend, ok := args.(*utils.TenantIDWithAPIOpts)
if !ok {
return fmt.Errorf("wrong args")
}
if argGetTrend.ID == "Trend1" && argGetTrend.Tenant == "cgrates.org" {
now := time.Now()
now2 := now.Add(time.Second)
tr := Trend{
Tenant: "cgrates.org",
ID: "Trend1",
RunTimes: []time.Time{now, now2},
Metrics: map[time.Time]map[string]*MetricWithTrend{
now: {
"*acc": {ID: "*acc", Value: 45, TrendGrowth: -1.0, TrendLabel: utils.NotAvailable},
"*acd": {ID: "*acd", Value: 50, TrendGrowth: -1.0, TrendLabel: utils.NotAvailable},
},
now2: {
"*acc": {ID: "*acc", Value: 42, TrendGrowth: -3.0, TrendLabel: utils.MetaNegative},
"*acd": {ID: "*acd", Value: 52, TrendGrowth: 2.0, TrendLabel: utils.MetaPositive},
},
},
}
trS := tr.asTrendSummary()
*reply.(*TrendSummary) = *trS
return nil
}
return utils.ErrNotFound
},
},
}
now3 := time.Now().Add(-time.Second * 3).Format(time.RFC3339)
connMgr = NewConnManager(config.NewDefaultCGRConfig(), map[string]chan context.ClientConnector{
utils.ConcatenatedKey(utils.MetaInternal, utils.MetaTrends): clientConn,
})
testCases := []struct {
name string
filter string
shouldPass bool
}{
{
name: "TrendPassACCLabel",
filter: "*string:~*trends.Trend1.Metrics.*acc.TrendLabel:*negative",
shouldPass: true,
},
{
name: "TrendPassID",
filter: "*string:~*trends.Trend1.ID:Trend1",
shouldPass: true,
},
{
name: "TrendPassACDLabel",
filter: "*string:~*trends.Trend1.Metrics.*acd.TrendLabel:*positive",
shouldPass: true,
},
{
name: "TrendFailACCGrowth",
filter: "*gt:~*trends.Trend1.Metrics.*acc.TrendGrowth:1.0",
shouldPass: false,
},
{
name: "TrendPassACDGrowth",
filter: "*gte:~*trends.Trend1.Metrics.*acd.TrendGrowth:2",
shouldPass: true,
},
{
name: "TrendPassTime",
filter: fmt.Sprintf("*ai:~*trends.Trend1.Time:%s", now3),
shouldPass: true,
},
}
initDP := utils.MapStorage{}
dp := newDynamicDP(nil, nil, nil, []string{utils.ConcatenatedKey(utils.MetaInternal, utils.MetaTrends)}, nil, "cgrates.org", initDP)
for _, tc := range testCases {
t.Run(tc.name, func(t *testing.T) {
fl, err := NewFilterFromInline("cgrates.org", tc.filter)
if err != nil {
t.Fatal(err)
}
rule := fl.Rules[0]
pass, err := rule.Pass(dp)
if err != nil {
t.Fatalf("rule.Pass() unexpected error: %v", err)
}
if pass != tc.shouldPass {
t.Errorf("rule.Pass() expected: %t ,got: %t", tc.shouldPass, pass)
}
})
}
}
func TestFilterRanking(t *testing.T) {
tmpConn := connMgr
defer func() {
connMgr = tmpConn
}()
clientConn := make(chan context.ClientConnector, 1)
clientConn <- &ccMock{
calls: map[string]func(ctx *context.Context, args any, reply any) error{
utils.RankingSv1GetRankingSummary: func(ctx *context.Context, args any, reply any) error {
argTntID, ok := args.(*utils.TenantIDWithAPIOpts)
if !ok {
return fmt.Errorf("wrong args")
}
if argTntID.ID == "Ranking1" && argTntID.Tenant == "cgrates.org" {
rn := Ranking{
Tenant: "cgrates.org",
ID: "Ranking1",
LastUpdate: time.Now(),
SortedStatIDs: []string{"Stat5", "Stat6", "Stat7", "Stat4", "Stat3", "Stat1", "Stat2"},
}
rnS := rn.asRankingSummary()
*reply.(*RankingSummary) = *rnS
return nil
}
return utils.ErrNotFound
},
}}
connMgr = NewConnManager(config.NewDefaultCGRConfig(), map[string]chan context.ClientConnector{
utils.ConcatenatedKey(utils.MetaInternal, utils.MetaRankings): clientConn,
})
now := time.Now().Add(-2 * time.Second).Format(time.RFC3339)
testCases := []struct {
name string
filter string
pass bool
}{
{name: "RankingPassID", filter: "*string:~*rankings.Ranking1.ID:Ranking1", pass: true},
{name: "RankingPassLastUpdate", filter: fmt.Sprintf("*ai:~*rankings.Ranking1.LastUpdate:%s", now), pass: true},
{name: "RankingPassFirstSortedStatIDs", filter: "*string:~*rankings.Ranking1.SortedStatIDs[0]:Stat5", pass: true},
{name: "RankingPassLastSortedStatIDs", filter: "*string:~*rankings.Ranking1.SortedStatIDs[6]:Stat2", pass: true},
{name: "RankingFailSortedStatIDsIdx", filter: "*string:~*rankings.Ranking1.SortedStatIDs[1]:Stat4", pass: false},
}
initDP := utils.MapStorage{}
dp := newDynamicDP(nil, nil, nil, nil, []string{utils.ConcatenatedKey(utils.MetaInternal, utils.MetaRankings)}, "cgrates.org", initDP)
for _, tc := range testCases {
t.Run(tc.name, func(t *testing.T) {
fl, err := NewFilterFromInline(dp.tenant, tc.filter)
if err != nil {
t.Fatal(err)
}
rule := fl.Rules[0]
pass, err := rule.Pass(dp)
if err != nil {
t.Fatalf("rule.Pass() unexpected error: %v", err)
}
if pass != tc.pass {
t.Errorf("rule.Pass() expected: %t ,got: %t", tc.pass, pass)
}
})
}
}
func TestFilterRuleElementItems(t *testing.T) {
rf, err := NewFilterRule(utils.MetaEqual, "~*req.cost_details.Charges[0].RatingID", []string{"RatingID2"})
if err != nil {
t.Errorf("Error: %+v", err)
}
exp := []string{"~*req", "cost_details", "Charges[0]", "RatingID"}
rcv := rf.ElementItems()
if !reflect.DeepEqual(exp, rcv) {
t.Errorf("Expected: %v , received: %v", exp, rcv)
}
}
func TestNewFilterRule(t *testing.T) {
t.Run("Valid filter rule", func(t *testing.T) {
rfType := "*regex"
fieldName := "field"
vals := []string{"val1", "val2"}
rule, err := NewFilterRule(rfType, fieldName, vals)
if err != nil {
t.Errorf("Expected no error, got %v", err)
}
if rule == nil {
t.Fatalf("Expected a valid FilterRule, got nil")
}
if rule.Type != rfType {
t.Errorf("Expected Type to be %v, got %v", rfType, rule.Type)
}
if rule.Element != fieldName {
t.Errorf("Expected Element to be %v, got %v", fieldName, rule.Element)
}
if len(rule.Values) != len(vals) || rule.Values[0] != vals[0] || rule.Values[1] != vals[1] {
t.Errorf("Expected Values to be %v, got %v", vals, rule.Values)
}
if rule.negative == nil || *rule.negative {
t.Errorf("Expected negative to be false, got %v", rule.negative)
}
})
t.Run("Unsupported filter type", func(t *testing.T) {
rfType := "*unsupported"
fieldName := "field"
vals := []string{"val1"}
rule, err := NewFilterRule(rfType, fieldName, vals)
if err == nil || err.Error() != "Unsupported filter Type: *unsupported" {
t.Errorf("Expected error 'Unsupported filter Type: *unsupported', got %v", err)
}
if rule != nil {
t.Errorf("Expected nil FilterRule, got %v", rule)
}
})
t.Run("Missing field name for type requiring it", func(t *testing.T) {
rfType := "*regex"
fieldName := ""
vals := []string{"val1"}
rule, err := NewFilterRule(rfType, fieldName, vals)
if err == nil || err.Error() != "Element is mandatory for Type: *regex" {
t.Errorf("Expected error 'Element is mandatory for Type: *regex', got %v", err)
}
if rule != nil {
t.Errorf("Expected nil FilterRule, got %v", rule)
}
})
t.Run("Missing values for type requiring them", func(t *testing.T) {
rfType := "*regex"
fieldName := "field"
vals := []string{}
rule, err := NewFilterRule(rfType, fieldName, vals)
if err == nil || err.Error() != "Values is mandatory for Type: *regex" {
t.Errorf("Expected error 'Values is mandatory for Type: *regex', got %v", err)
}
if rule != nil {
t.Errorf("Expected nil FilterRule, got %v", rule)
}
})
t.Run("MetaHTTP prefix handling", func(t *testing.T) {
rfType := "*http/specific"
fieldName := "url"
vals := []string{"http://cgrates.com"}
rule, err := NewFilterRule(rfType, fieldName, vals)
if err != nil {
t.Errorf("Expected no error, got %v", err)
}
if rule == nil {
t.Fatalf("Expected a valid FilterRule, got nil")
}
if rule.Element != fieldName {
t.Errorf("Expected Element to be %v, got %v", fieldName, rule.Element)
}
if len(rule.Values) != len(vals) || rule.Values[0] != vals[0] {
t.Errorf("Expected Values to be %v, got %v", vals, rule.Values)
}
})
t.Run("CompileValues error handling", func(t *testing.T) {
rfType := "*regex"
fieldName := "pattern"
vals := []string{"[invalid-regex"}
rule, err := NewFilterRule(rfType, fieldName, vals)
if err == nil || !strings.Contains(err.Error(), "error parsing regexp") {
t.Errorf("Expected error parsing regexp, got %v", err)
}
if rule != nil {
t.Errorf("Expected nil FilterRule, got %v", rule)
}
})
}
func TestFilterToSQLQuery(t *testing.T) {
tests := []struct {
name string
fltrRule FilterRule
expected []string
}{
{"MetaEqual with values", FilterRule{Type: utils.MetaEqual, Element: "~*req.cost_details.Charges[0].RatingID", Values: []string{"RatingID2"}}, []string{"JSON_VALUE(cost_details, '$.Charges[0].RatingID') = 'RatingID2'"}},
{"MetaExists with no values", FilterRule{Type: utils.MetaExists, Element: "~*req.answer_time", Values: nil}, []string{"answer_time IS NULL"}},
{"MetaExists with JSON field", FilterRule{Type: utils.MetaExists, Element: "~*req.cost_details.Charges[0].RatingID", Values: nil}, []string{"JSON_VALUE(cost_details, '$.Charges[0].RatingID') IS NULL"}},
{"MetaNotExists with no values", FilterRule{Type: utils.MetaNotExists, Element: "~*req.answer_time", Values: nil}, []string{"answer_time IS NOT NULL"}},
{"MetaNotExists with JSON field", FilterRule{Type: utils.MetaNotExists, Element: "~*req.cost_details.Charges[0].RatingID", Values: nil}, []string{"JSON_VALUE(cost_details, '$.Charges[0].RatingID') IS NOT NULL"}},
{"MetaString with values", FilterRule{Type: utils.MetaString, Element: "~*req.answer_time", Values: []string{"value1", "value2"}}, []string{"answer_time = 'value1'", "answer_time = 'value2'"}},
{"MetaNotString with values", FilterRule{Type: utils.MetaNotString, Element: "~*req.cost_details.Charges[0].RatingID", Values: []string{"value1"}}, []string{"JSON_VALUE(cost_details, '$.Charges[0].RatingID') != 'value1'"}},
{"MetaEmpty with no values", FilterRule{Type: utils.MetaEmpty, Element: "~*req.answer_time", Values: nil}, []string{"answer_time == ''"}},
{"MetaEmpty with JSON field", FilterRule{Type: utils.MetaEmpty, Element: "~*req.cost_details.Charges[0].RatingID", Values: nil}, []string{"JSON_VALUE(cost_details, '$.Charges[0].RatingID') == ''"}},
{"MetaNotEmpty with no values", FilterRule{Type: utils.MetaNotEmpty, Element: "~*req.answer_time", Values: nil}, []string{"answer_time != ''"}},
{"MetaNotEmpty with JSON field", FilterRule{Type: utils.MetaNotEmpty, Element: "~*req.cost_details.Charges[0].RatingID", Values: nil}, []string{"JSON_VALUE(cost_details, '$.Charges[0].RatingID') != ''"}},
{"MetaGreaterOrEqual with values", FilterRule{Type: utils.MetaGreaterOrEqual, Element: "~*req.answer_time", Values: []string{"10"}}, []string{"answer_time >= '10'"}},
{"MetaGreaterThan with values", FilterRule{Type: utils.MetaGreaterThan, Element: "~*req.cost_details.Charges[0].RatingID", Values: []string{"20"}}, []string{"JSON_VALUE(cost_details, '$.Charges[0].RatingID') > '20'"}},
{"MetaLessThan with values", FilterRule{Type: utils.MetaLessThan, Element: "~*req.answer_time", Values: []string{"5"}}, []string{"answer_time < '5'"}},
{"MetaLessOrEqual with values", FilterRule{Type: utils.MetaLessOrEqual, Element: "~*req.cost_details.Charges[0].RatingID", Values: []string{"15"}}, []string{"JSON_VALUE(cost_details, '$.Charges[0].RatingID') <= '15'"}},
{"MetaPrefix with values", FilterRule{Type: utils.MetaPrefix, Element: "~*req.answer_time", Values: []string{"pre"}}, []string{"answer_time LIKE 'pre%'"}},
{"MetaNotPrefix with values", FilterRule{Type: utils.MetaNotPrefix, Element: "~*req.cost_details.Charges[0].RatingID", Values: []string{"pre"}}, []string{"JSON_VALUE(cost_details, '$.Charges[0].RatingID') NOT LIKE 'pre%'"}},
{"MetaSuffix with values", FilterRule{Type: utils.MetaSuffix, Element: "~*req.answer_time", Values: []string{"suf"}}, []string{"answer_time LIKE '%suf'"}},
{"MetaNotSuffix with values", FilterRule{Type: utils.MetaNotSuffix, Element: "~*req.cost_details.Charges[0].RatingID", Values: []string{"suf"}}, []string{"JSON_VALUE(cost_details, '$.Charges[0].RatingID') NOT LIKE '%suf'"}},
{"MetaGreaterOrEqual with JSON field", FilterRule{Type: utils.MetaGreaterOrEqual, Element: "~*req.cost_details.Charges[0].RatingID", Values: []string{"100"}}, []string{"JSON_VALUE(cost_details, '$.Charges[0].RatingID') >= '100'"}},
{"MetaRegex with values", FilterRule{Type: utils.MetaRegex, Element: "~*req.answer_time", Values: []string{"pattern1", "pattern2"}}, []string{"answer_time REGEXP 'pattern1'", "answer_time REGEXP 'pattern2'"}},
{"MetaNotRegex with values", FilterRule{Type: utils.MetaNotRegex, Element: "~*req.cost_details.Charges[0].RatingID", Values: []string{"pattern"}}, []string{"JSON_VALUE(cost_details, '$.Charges[0].RatingID') NOT REGEXP 'pattern'"}},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
got := tt.fltrRule.FilterToSQLQuery()
if len(got) != len(tt.expected) {
t.Errorf("expected %v, got %v", tt.expected, got)
return
}
for i, cond := range got {
if cond != tt.expected[i] {
t.Errorf("expected %v, got %v", tt.expected[i], cond)
}
}
})
}
}
func TestFilterToSQLQueryValidations(t *testing.T) {
tests := []struct {
name string
fltrRule FilterRule
expected []string
}{
{
name: "Boolean true value",
fltrRule: FilterRule{
Type: utils.MetaString,
Element: "~*req.active",
Values: []string{"true"},
},
expected: []string{"active = '1'"},
},
{
name: "Boolean false value",
fltrRule: FilterRule{
Type: utils.MetaString,
Element: "~*req.active",
Values: []string{"false"},
},
expected: []string{"active = '0'"},
},
{
name: "Greater than or equal with empty beforeSep",
fltrRule: FilterRule{
Type: utils.MetaGreaterOrEqual,
Element: "~*req.score",
Values: []string{"10"},
},
expected: []string{"score >= '10'"},
},
{
name: "Greater than with empty beforeSep",
fltrRule: FilterRule{
Type: utils.MetaGreaterThan,
Element: "~*req.score",
Values: []string{"20"},
},
expected: []string{"score > '20'"},
},
{
name: "Less than or equal with empty beforeSep",
fltrRule: FilterRule{
Type: utils.MetaLessOrEqual,
Element: "~*req.score",
Values: []string{"30"},
},
expected: []string{"score <= '30'"},
},
{
name: "Less than with empty beforeSep",
fltrRule: FilterRule{
Type: utils.MetaLessThan,
Element: "~*req.score",
Values: []string{"40"},
},
expected: []string{"score < '40'"},
},
{
name: "Prefix NOT LIKE with empty beforeSep",
fltrRule: FilterRule{
Type: utils.MetaNotPrefix,
Element: "~*req.name",
Values: []string{"prefix"},
},
expected: []string{"name NOT LIKE 'prefix%'"},
},
{
name: "Prefix LIKE with JSON_VALUE",
fltrRule: FilterRule{
Type: utils.MetaPrefix,
Element: "~*req.data.name",
Values: []string{"prefix"},
},
expected: []string{"JSON_VALUE(data, '$.name') LIKE 'prefix%'"},
},
{
name: "Suffix NOT LIKE with empty beforeSep",
fltrRule: FilterRule{
Type: utils.MetaNotSuffix,
Element: "~*req.name",
Values: []string{"suffix"},
},
expected: []string{"name NOT LIKE '%suffix'"},
},
{
name: "Suffix LIKE with JSON_VALUE",
fltrRule: FilterRule{
Type: utils.MetaSuffix,
Element: "~*req.data.name",
Values: []string{"suffix"},
},
expected: []string{"JSON_VALUE(data, '$.name') LIKE '%suffix'"},
},
{
name: "Regex NOT REGEXP with empty beforeSep",
fltrRule: FilterRule{
Type: utils.MetaNotRegex,
Element: "~*req.pattern",
Values: []string{"[a-z]+"},
},
expected: []string{"pattern NOT REGEXP '[a-z]+'"},
},
{
name: "Regex REGEXP with JSON_VALUE",
fltrRule: FilterRule{
Type: utils.MetaRegex,
Element: "~*req.data.pattern",
Values: []string{"[0-9]+"},
},
expected: []string{"JSON_VALUE(data, '$.pattern') REGEXP '[0-9]+'"},
},
{
name: "Not equal with empty beforeSep",
fltrRule: FilterRule{
Type: utils.MetaNotString,
Element: "~*req.status",
Values: []string{"inactive"},
},
expected: []string{"status != 'inactive'"},
},
{
name: "Equal condition with JSON_VALUE",
fltrRule: FilterRule{
Type: utils.MetaString,
Element: "~*req.data.status",
Values: []string{"active"},
},
expected: []string{"JSON_VALUE(data, '$.status') = 'active'"},
},
{
name: "Greater than condition with JSON_VALUE",
fltrRule: FilterRule{
Type: utils.MetaGreaterThan,
Element: "~*req.data.score",
Values: []string{"50"},
},
expected: []string{"JSON_VALUE(data, '$.score') > '50'"},
},
{
name: "Less than or equal condition with JSON_VALUE",
fltrRule: FilterRule{
Type: utils.MetaLessOrEqual,
Element: "~*req.data.score",
Values: []string{"30"},
},
expected: []string{"JSON_VALUE(data, '$.score') <= '30'"},
},
{
name: "Less than condition with JSON_VALUE",
fltrRule: FilterRule{
Type: utils.MetaLessThan,
Element: "~*req.data.score",
Values: []string{"20"},
},
expected: []string{"JSON_VALUE(data, '$.score') < '20'"},
},
{
name: "MetaExists with no values",
fltrRule: FilterRule{
Type: utils.MetaExists,
Element: "~*req.column1",
Values: nil,
},
expected: []string{"column1 IS NULL"},
},
{
name: "MetaNotExists with no values",
fltrRule: FilterRule{
Type: utils.MetaNotExists,
Element: "~*req.json_field.key",
Values: nil,
},
expected: []string{"JSON_VALUE(json_field, '$.key') IS NOT NULL"},
},
{
name: "MetaString with values",
fltrRule: FilterRule{
Type: utils.MetaString,
Element: "~*req.column2",
Values: []string{"value1", "value2"},
},
expected: []string{"column2 = 'value1'", "column2 = 'value2'"},
},
{
name: "MetaPrefix with NOT condition",
fltrRule: FilterRule{
Type: utils.MetaNotPrefix,
Element: "~*req.json_field.key",
Values: []string{"prefix1"},
},
expected: []string{"JSON_VALUE(json_field, '$.key') NOT LIKE 'prefix1%'"},
},
{
name: "MetaRegex with multiple values",
fltrRule: FilterRule{
Type: utils.MetaRegex,
Element: "~*req.column3",
Values: []string{"pattern1", "pattern2"},
},
expected: []string{"column3 REGEXP 'pattern1'", "column3 REGEXP 'pattern2'"},
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
got := tt.fltrRule.FilterToSQLQuery()
if len(got) != len(tt.expected) {
t.Errorf("expected %v, got %v", tt.expected, got)
return
}
for i, cond := range got {
if cond != tt.expected[i] {
t.Errorf("expected %v, got %v", tt.expected[i], cond)
}
}
})
}
}
func TestWeightFromDynamics2(t *testing.T) {
cfg := config.NewDefaultCGRConfig()
connMgr = NewConnManager(cfg, nil)
db, _ := NewInternalDB(nil, nil, true, nil, cfg.DataDbCfg().Items)
dm := NewDataManager(db, cfg.CacheCfg(), nil)
filterS := NewFilterS(cfg, connMgr, dm)
testCases := []struct {
name string
dynamicWeights []*utils.DynamicWeight
tenant string
event utils.DataProvider
expectedWeight float64
expectedErr bool
}{
{
name: "EmptyDynamicWeight",
dynamicWeights: []*utils.DynamicWeight{},
tenant: "cgrates.org",
event: utils.MapStorage{},
expectedWeight: 0.0,
expectedErr: false,
},
{
name: "MatchingWeight",
dynamicWeights: []*utils.DynamicWeight{
{
FilterIDs: []string{"*string:~*req.Account:1001"},
Weight: 10.0,
},
},
tenant: "cgrates.org",
event: utils.MapStorage{
"*req": utils.MapStorage{
"Account": "1001",
},
},
expectedWeight: 10.0,
},
{
name: "MultipleMatchingWeights",
dynamicWeights: []*utils.DynamicWeight{
{
FilterIDs: []string{"*prefix:~*req.Destination:GER"},
Weight: 10.0,
},
{
FilterIDs: []string{"*string:~*opts.subsys:*sessions"},
Weight: 5.0,
},
},
tenant: "cgrates.org",
event: utils.MapStorage{
"*req": utils.MapStorage{
"Destination": "GER_0055",
},
"*opts": utils.MapStorage{
"*subsys": "*sessions",
},
},
expectedWeight: 10.0,
},
{
name: "NoMatchingWeightFilterErr",
dynamicWeights: []*utils.DynamicWeight{
{
FilterIDs: []string{"FLTR1"},
Weight: 10.0,
},
},
tenant: "cgrates.org",
event: utils.MapStorage{
"*req": utils.MapStorage{
"Account": "1001",
},
},
expectedErr: true,
},
}
for _, tc := range testCases {
t.Run(tc.name, func(t *testing.T) {
weight, err := WeightFromDynamics(tc.dynamicWeights, filterS, tc.tenant, tc.event)
if tc.expectedErr {
if err == nil {
t.Error("Expected error but got none")
}
} else {
if err != nil {
t.Errorf("Unexpected error: %v", err)
}
if weight != tc.expectedWeight {
t.Errorf("Expected weight %v, got %v", tc.expectedWeight, weight)
}
}
})
}
}