Files
cgrates/general_tests/balance_it_test.go
2024-10-16 12:24:54 +02:00

1468 lines
48 KiB
Go

//go:build integration
// +build integration
/*
Real-time Online/Offline Charging System (OCS) for Telecom & ISP environments
Copyright (C) ITsysCOM GmbH
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>
*/
package general_tests
import (
"reflect"
"strconv"
"testing"
"time"
"github.com/cgrates/birpc/context"
v1 "github.com/cgrates/cgrates/apier/v1"
"github.com/cgrates/cgrates/engine"
"github.com/cgrates/cgrates/sessions"
"github.com/cgrates/cgrates/utils"
)
// TestBalanceBlocker tests the usage of the 'Blocker' field in account balances (issue #4163).
//
// Previously, the 'Blocker' field was ignored regardless if it was set to true of false. The test ensures that when 'Blocker'
// is set to true for a certain balance, no additional balances are debited once that balance is exhausted, while also returning
// an error mentioning the lack of funds.
//
// The test steps are as follows:
// 1. Create an account with an *sms balance of 10 units with 'Blocker' set to true, and a *monetary balance of 1 unit.
// 2. Process an 8 usage (representing 8 sms) event and then check whether the *sms balance has 2 units left.
// 3. Process another event, but this time with 'Usage' set to 3. This time an error should occur during processing, due to *sms balance blocking
// access to subsequent balances required to charge the remaining unit. The error can be found in the CDR's ExtraInfo field.
// 4. Verify that the account's *sms balance is the same as it was in step 2 and that the *monetary balance has not been touched
// at all.
func TestBalanceBlocker(t *testing.T) {
switch *utils.DBType {
case utils.MetaInternal:
case utils.MetaMySQL, utils.MetaMongo, utils.MetaPostgres:
t.SkipNow()
default:
t.Fatal("unsupported dbtype value")
}
content := `{
"general": {
"log_level": 7,
},
"data_db": {
"db_type": "*internal"
},
"stor_db": {
"db_type": "*internal"
},
"rals": {
"enabled": true
},
"cdrs": {
"enabled": true,
"rals_conns": ["*internal"]
},
"schedulers": {
"enabled": true
},
"apiers": {
"enabled": true,
"scheduler_conns": ["*internal"]
}
}`
tpFiles := map[string]string{
utils.AccountActionsCsv: `#Tenant,Account,ActionPlanId,ActionTriggersId,AllowNegative,Disabled
cgrates.org,1001,PACKAGE_1001,,,`,
utils.ActionPlansCsv: `#Id,ActionsId,TimingId,Weight
PACKAGE_1001,ACT_TOPUP,*asap,10`,
utils.ActionsCsv: `#ActionsId[0],Action[1],ExtraParameters[2],Filter[3],BalanceId[4],BalanceType[5],Categories[6],DestinationIds[7],RatingSubject[8],SharedGroup[9],ExpiryTime[10],TimingIds[11],Units[12],BalanceWeight[13],BalanceBlocker[14],BalanceDisabled[15],Weight[16]
ACT_TOPUP,*topup_reset,,,balance_sms,*sms,,,,,*unlimited,,10,20,true,false,20
ACT_TOPUP,*topup_reset,,,balance_monetary,*monetary,,*any,,,*unlimited,,1,10,false,false,20`,
utils.DestinationRatesCsv: `#Id,DestinationId,RatesTag,RoundingMethod,RoundingDecimals,MaxCost,MaxCostStrategy
DR_ANY,*any,RT_ANY,*up,20,0,`,
utils.RatesCsv: `#Id,ConnectFee,Rate,RateUnit,RateIncrement,GroupIntervalStart
RT_ANY,0,1,1,1,0`,
utils.RatingPlansCsv: `#Id,DestinationRatesId,TimingTag,Weight
RP_ANY,DR_ANY,*any,10`,
utils.RatingProfilesCsv: `#Tenant,Category,Subject,ActivationTime,RatingPlanId,RatesFallbackSubject
cgrates.org,sms,1001,2014-01-14T00:00:00Z,RP_ANY,`,
}
ng := engine.TestEngine{
ConfigJSON: content,
TpFiles: tpFiles,
}
client, _ := ng.Run(t)
t.Run("CheckInitialBalance", func(t *testing.T) {
time.Sleep(10 * time.Millisecond) // wait for tps to be loaded
var acnt engine.Account
attrs := &utils.AttrGetAccount{Tenant: "cgrates.org", Account: "1001"}
if err := client.Call(context.Background(), utils.APIerSv2GetAccount, attrs, &acnt); err != nil {
t.Fatal(err)
}
if len(acnt.BalanceMap) != 2 ||
len(acnt.BalanceMap[utils.MetaMonetary]) != 1 ||
len(acnt.BalanceMap[utils.MetaSMS]) != 1 {
t.Fatalf("expected account to have one balance of type *monetary and one of type *sms, received %v", acnt)
}
smsBalance := acnt.BalanceMap[utils.MetaSMS][0]
if smsBalance.ID != "balance_sms" || smsBalance.Value != 10 || !smsBalance.Blocker {
t.Fatalf("received account with unexpected *sms balance: %v", smsBalance)
}
monetaryBalance := acnt.BalanceMap[utils.MetaMonetary][0]
if monetaryBalance.ID != "balance_monetary" || monetaryBalance.Value != 1 {
t.Fatalf("received account with unexpected *monetary balance: %v", monetaryBalance)
}
})
t.Run("ProcessCDR1", func(t *testing.T) {
var reply string
if err := client.Call(context.Background(), utils.CDRsV1ProcessEvent,
&engine.ArgV1ProcessEvent{
Flags: []string{utils.MetaRALs},
CGREvent: utils.CGREvent{
Tenant: "cgrates.org",
ID: "event1",
Event: map[string]any{
utils.RunID: "*default",
utils.Tenant: "cgrates.org",
utils.Category: "sms",
utils.ToR: utils.MetaSMS,
utils.OriginID: "processCDR1",
utils.OriginHost: "127.0.0.1",
utils.RequestType: utils.MetaPostpaid,
utils.AccountField: "1001",
utils.Destination: "1002",
utils.SetupTime: time.Date(2021, time.February, 2, 16, 14, 50, 0, time.UTC),
utils.AnswerTime: time.Date(2021, time.February, 2, 16, 15, 0, 0, time.UTC),
utils.Usage: 8,
},
},
}, &reply); err != nil {
t.Fatal(err)
}
var cdrs []*engine.CDR
if err := client.Call(context.Background(), utils.CDRsV1GetCDRs, &utils.RPCCDRsFilterWithAPIOpts{
RPCCDRsFilter: &utils.RPCCDRsFilter{
RunIDs: []string{"*default"},
OriginIDs: []string{"processCDR1"},
}}, &cdrs); err != nil {
t.Fatal(err)
}
if len(cdrs) != 1 {
t.Fatalf("expected to receive only one CDR: %v", utils.ToJSON(cdrs))
}
smsBalanceValue, err := cdrs[0].CostDetails.FieldAsInterface([]string{"AccountSummary", "BalanceSummaries[0]", "Value"})
if err != nil {
t.Fatalf("could not retrieve *sms balance current value: %v", err)
}
if smsBalanceValue != 2. {
t.Errorf("unexpected balance value: expected %v, received %v", 2., smsBalanceValue)
}
})
t.Run("ProcessCDR2", func(t *testing.T) {
var reply string
if err := client.Call(context.Background(), utils.CDRsV1ProcessEvent,
&engine.ArgV1ProcessEvent{
Flags: []string{utils.MetaRALs},
CGREvent: utils.CGREvent{
Tenant: "cgrates.org",
ID: "event1",
Event: map[string]any{
utils.RunID: "*default",
utils.Tenant: "cgrates.org",
utils.Category: "sms",
utils.ToR: utils.MetaSMS,
utils.OriginID: "processCDR2",
utils.OriginHost: "127.0.0.1",
utils.RequestType: utils.MetaPostpaid,
utils.AccountField: "1001",
utils.Destination: "1002",
utils.SetupTime: time.Date(2021, time.February, 2, 16, 14, 50, 0, time.UTC),
utils.AnswerTime: time.Date(2021, time.February, 2, 16, 15, 0, 0, time.UTC),
utils.Usage: 3,
},
},
}, &reply); err != nil {
t.Fatal(err)
}
var cdrs []*engine.CDR
if err := client.Call(context.Background(), utils.CDRsV1GetCDRs, &utils.RPCCDRsFilterWithAPIOpts{
RPCCDRsFilter: &utils.RPCCDRsFilter{
RunIDs: []string{"*default"},
OriginIDs: []string{"processCDR2"},
}}, &cdrs); err != nil {
t.Fatal(err)
}
if len(cdrs) != 1 {
t.Fatalf("expected to receive only one CDR: %v", utils.ToJSON(cdrs))
}
if cdrs[0].ExtraInfo != utils.ErrInsufficientCreditBalanceBlocker.Error() {
t.Errorf("Unexpected ExtraInfo field value: %v", cdrs[0].ExtraInfo)
}
})
t.Run("CheckFinalBalance", func(t *testing.T) {
var acnt engine.Account
attrs := &utils.AttrGetAccount{Tenant: "cgrates.org", Account: "1001"}
if err := client.Call(context.Background(), utils.APIerSv2GetAccount, attrs, &acnt); err != nil {
t.Fatal(err)
}
if len(acnt.BalanceMap) != 2 ||
len(acnt.BalanceMap[utils.MetaMonetary]) != 1 ||
len(acnt.BalanceMap[utils.MetaSMS]) != 1 {
t.Fatalf("expected account to have one balance of type *monetary and one of type *sms, received %v", acnt)
}
smsBalance := acnt.BalanceMap[utils.MetaSMS][0]
if smsBalance.ID != "balance_sms" || smsBalance.Value != 2 || !smsBalance.Blocker {
t.Fatalf("received account with unexpected *sms balance: %v", smsBalance)
}
monetaryBalance := acnt.BalanceMap[utils.MetaMonetary][0]
if monetaryBalance.ID != "balance_monetary" || monetaryBalance.Value != 1 {
t.Fatalf("received account with unexpected *monetary balance: %v", monetaryBalance)
}
})
}
// TestBalanceFactor tests the usage of the 'Factor' field in account balances.
//
// Previously, the 'Factor' was being populated from the Action's ExtraParameters map,
// where the key represented the ToR of the session being processed. This has now been
// updated to depend on Category instead of ToR.
//
// The test steps are as follows:
// 1. Create an account with an *sms balance of 10 units with a factor of 4 (essentially,
// this means that for every 1 sms, 4 will be exhausted), and a *monetary balance of 5
// units. The RatingPlan used when debiting the *monetary balance will charge 1 unit per
// second.
// 2. Process a 4 usage (representing 16 sms, when taking into consideration the balance
// factor) event.
// 3. Ensure that the *sms balance has 2 units left (10 - (2 sms * 4 factor)) and that 2
// unit were subtracted from the *monetary balance.
// 4. Try to refund the debit made in the previous step to check whether factor is taken
// into consideration for refunds as well.
// 5. Do the above steps also for SessionSv1.ProcessCDR with a different usage and a different
// factor (that we overwrite through the APIerSv1.SetBalance API).
// 6. Set a *voice balance with 100s. Initiate a prepaid session (usage 10s), update it twice
// (usages 5s and 2s), terminate,
// and process CDR.
// 7. Check to see if balance_voice was debitted 34s ((10s+5s+2s) * voiceFactor, where
// voiceFactor is 2) and then also check if it applies correctly for refund (similar
// to step 4).
func TestBalanceFactor(t *testing.T) {
switch *utils.DBType {
case utils.MetaInternal:
case utils.MetaMySQL, utils.MetaMongo, utils.MetaPostgres:
t.SkipNow()
default:
t.Fatal("unsupported dbtype value")
}
content := `{
"general": {
"log_level": 7,
},
"data_db": {
"db_type": "*internal"
},
"stor_db": {
"db_type": "*internal"
},
"rals": {
"enabled": true
},
"cdrs": {
"enabled": true,
"rals_conns": ["*internal"]
},
"schedulers": {
"enabled": true,
"cdrs_conns": ["*internal"]
},
"apiers": {
"enabled": true,
"scheduler_conns": ["*internal"]
},
"sessions": {
"enabled": true,
"cdrs_conns": ["*internal"],
"chargers_conns": ["*internal"],
"rals_conns": ["*internal"],
},
"chargers": {
"enabled": true
}
}`
tpFiles := map[string]string{
utils.AccountActionsCsv: `#Tenant,Account,ActionPlanId,ActionTriggersId,AllowNegative,Disabled
cgrates.org,1001,PACKAGE_1001,,,`,
utils.ActionPlansCsv: `#Id,ActionsId,TimingId,Weight
PACKAGE_1001,ACT_TOPUP,*asap,10`,
utils.ActionsCsv: `#ActionsId[0],Action[1],ExtraParameters[2],Filter[3],BalanceId[4],BalanceType[5],Categories[6],DestinationIds[7],RatingSubject[8],SharedGroup[9],ExpiryTime[10],TimingIds[11],Units[12],BalanceWeight[13],BalanceBlocker[14],BalanceDisabled[15],Weight[16]
ACT_TOPUP,*topup_reset,"{""smsFactor"":4}",,balance_sms,*sms,,,,,*unlimited,,10,20,false,false,20
ACT_TOPUP,*topup_reset,,,balance_monetary,*monetary,,*any,,,*unlimited,,5,10,false,false,20`,
utils.ChargersCsv: `#Id,ActionsId,TimingId,Weight
#Tenant,ID,FilterIDs,ActivationInterval,RunID,AttributeIDs,Weight
cgrates.org,DEFAULT,,,DEFAULT,*none,20`,
utils.DestinationRatesCsv: `#Id,DestinationId,RatesTag,RoundingMethod,RoundingDecimals,MaxCost,MaxCostStrategy
DR_SMS,*any,RT_SMS,*up,20,0,
DR_VOICE,*any,RT_VOICE,*up,20,0,`,
utils.RatesCsv: `#Id,ConnectFee,Rate,RateUnit,RateIncrement,GroupIntervalStart
RT_SMS,0,1,1,1,0
RT_VOICE,0,1,1s,1s,0s`,
utils.RatingPlansCsv: `#Id,DestinationRatesId,TimingTag,Weight
RP_SMS,DR_SMS,*any,10
RP_VOICE,DR_VOICE,*any,10`,
utils.RatingProfilesCsv: `#Tenant,Category,Subject,ActivationTime,RatingPlanId,RatesFallbackSubject
cgrates.org,sms,1001,2014-01-14T00:00:00Z,RP_SMS,
cgrates.org,call,1001,2014-01-14T00:00:00Z,RP_VOICE,`,
}
ng := engine.TestEngine{
ConfigJSON: content,
TpFiles: tpFiles,
}
client, _ := ng.Run(t)
t.Run("CheckInitialBalance", func(t *testing.T) {
time.Sleep(10 * time.Millisecond) // wait for tps to be loaded
var acnt engine.Account
attrs := &utils.AttrGetAccount{Tenant: "cgrates.org", Account: "1001"}
if err := client.Call(context.Background(), utils.APIerSv2GetAccount, attrs, &acnt); err != nil {
t.Fatal(err)
}
if len(acnt.BalanceMap) != 2 ||
len(acnt.BalanceMap[utils.MetaMonetary]) != 1 ||
len(acnt.BalanceMap[utils.MetaSMS]) != 1 {
t.Fatalf("expected account to have one balance of type *monetary and one of type *sms received %v", acnt)
}
smsBalance := acnt.BalanceMap[utils.MetaSMS][0]
if smsBalance.ID != "balance_sms" || smsBalance.Value != 10 {
t.Fatalf("*sms balance value: want %v, got %v", 10, smsBalance)
}
monetaryBalance := acnt.BalanceMap[utils.MetaMonetary][0]
if monetaryBalance.ID != "balance_monetary" || monetaryBalance.Value != 5 {
t.Fatalf("*monetary balance value: want %v, got %v", 5, monetaryBalance)
}
})
t.Run("CDRsV1ProcessCDR", func(t *testing.T) {
var reply string
if err := client.Call(context.Background(), utils.CDRsV1ProcessEvent,
&engine.ArgV1ProcessEvent{
Flags: []string{utils.MetaRALs},
CGREvent: utils.CGREvent{
Tenant: "cgrates.org",
ID: "CDRsV1ProcessCDR",
Event: map[string]any{
utils.RunID: "*default",
utils.Tenant: "cgrates.org",
utils.Category: "sms",
utils.ToR: utils.MetaSMS,
utils.OriginID: "processCDR1",
utils.OriginHost: "127.0.0.1",
utils.RequestType: utils.MetaPostpaid,
utils.AccountField: "1001",
utils.Destination: "1002",
utils.SetupTime: time.Date(2021, time.February, 2, 16, 14, 50, 0, time.UTC),
utils.AnswerTime: time.Date(2021, time.February, 2, 16, 15, 0, 0, time.UTC),
utils.Usage: 4,
utils.BalanceFactorID: "smsFactor",
},
},
}, &reply); err != nil {
t.Fatal(err)
}
var cdrs []*engine.CDR
if err := client.Call(context.Background(), utils.CDRsV1GetCDRs, &utils.RPCCDRsFilterWithAPIOpts{
RPCCDRsFilter: &utils.RPCCDRsFilter{
OriginIDs: []string{"processCDR1"},
}}, &cdrs); err != nil {
t.Fatal(err)
}
if len(cdrs) != 1 {
t.Fatalf("expected to receive only one CDR: %v", utils.ToJSON(cdrs))
}
smsBalanceValue, err := cdrs[0].CostDetails.FieldAsInterface([]string{
"AccountSummary", "BalanceSummaries", "balance_sms", "Value",
})
if err != nil {
t.Fatalf("could not retrieve *sms balance current value: %v", err)
}
if smsBalanceValue != 2. {
t.Errorf("*sms balance value: want %v, got %v", 2, smsBalanceValue)
}
monetaryBalanceValue, err := cdrs[0].CostDetails.FieldAsInterface([]string{
"AccountSummary", "BalanceSummaries", "balance_monetary", "Value",
})
if err != nil {
t.Fatalf("could not retrieve *sms balance current value: %v", err)
}
if monetaryBalanceValue != 3. {
t.Errorf("monetary balance value: want %v, got %v", 3, monetaryBalanceValue)
}
// Attempt refund to check if factor also applies when refunding increments.
//
// Initial *sms balance value: 10
// Initial *monetary balance value: 5
// CDR Usage: 4
// Factor: 4
// Current *sms balance value: 2
// Current *monetary balance value: 3
var replyProcessEvent string
if err := client.Call(context.Background(), utils.CDRsV1ProcessEvent,
&engine.ArgV1ProcessEvent{
Flags: []string{utils.MetaRefund, "*store:false"},
CGREvent: *cdrs[0].AsCGREvent(),
}, &replyProcessEvent); err != nil {
t.Fatal(err)
}
var acnt engine.Account
if err := client.Call(context.Background(), utils.APIerSv2GetAccount,
&utils.AttrGetAccount{
Tenant: "cgrates.org",
Account: "1001",
}, &acnt); err != nil {
t.Fatal(err)
}
smsBalance := acnt.BalanceMap[utils.MetaSMS][0]
if smsBalance.ID != "balance_sms" || smsBalance.Value != 10 {
t.Errorf("*sms balance: want %v, got %v", 10, smsBalance)
}
monetaryBalance := acnt.BalanceMap[utils.MetaMonetary][0]
if monetaryBalance.ID != "balance_monetary" || monetaryBalance.Value != 5 {
t.Errorf("*monetary balance: want %v, got %v", 5, monetaryBalance)
}
smsBalanceFactor, err := cdrs[0].CostDetails.FieldAsInterface([]string{
"AccountSummary", "BalanceSummaries", "balance_sms", "Factors", "smsFactor",
})
if err != nil {
t.Fatalf("could not retrieve *sms balance factor: %v", err)
}
if smsBalanceFactor != 4. {
t.Errorf("balance factor: want %v, got %v", 4, smsBalanceValue)
}
})
t.Run("AlterBalanceFactorThroughAPI", func(t *testing.T) {
// Decrease the smsFactor from balance_sms from 4 to 3.
var replySetBalance string
if err := client.Call(context.Background(), utils.APIerSv1SetBalance,
&utils.AttrSetBalance{
Tenant: "cgrates.org",
Account: "1001",
BalanceType: utils.MetaSMS,
// Value: 100_000_000_000, // 100s
// Value: 20,
Balance: map[string]any{
utils.ID: "balance_sms",
utils.Factors: map[string]float64{
"smsFactor": 3,
},
},
ActionExtraData: &map[string]any{
"BalanceID": "~*acnt.BalanceID",
"NewFactors": "~*acnt.Factors",
},
Cdrlog: true,
}, &replySetBalance); err != nil {
t.Error(err)
}
var cdrs []*engine.CDR
if err := client.Call(context.Background(), utils.CDRsV1GetCDRs, &utils.RPCCDRsFilterWithAPIOpts{
RPCCDRsFilter: &utils.RPCCDRsFilter{
RunIDs: []string{"*set_balance"},
}}, &cdrs); err != nil {
t.Fatal(err)
}
if len(cdrs) != 1 ||
cdrs[0].Cost != 0 ||
cdrs[0].ExtraFields[utils.BalanceID] != "balance_sms" ||
cdrs[0].ExtraFields["NewFactors"] != "{\"smsFactor\":3}" ||
cdrs[0].RunID != utils.MetaSetBalance ||
cdrs[0].Source != utils.CDRLog ||
cdrs[0].ToR != utils.MetaSMS {
t.Errorf("unexpected cdr received: %v", utils.ToJSON(cdrs))
}
var acnt engine.Account
if err := client.Call(context.Background(), utils.APIerSv2GetAccount,
&utils.AttrGetAccount{
Tenant: "cgrates.org",
Account: "1001",
}, &acnt); err != nil {
t.Error(err)
}
updatedSMSBalance := acnt.BalanceMap[utils.MetaSMS][0]
if updatedSMSBalance.ID != "balance_sms" ||
updatedSMSBalance.Value != 10 ||
updatedSMSBalance.Factors["smsFactor"] != 3 {
t.Fatalf("updated balance_sms: want Value 10 and smsFactor 3, got %v", updatedSMSBalance)
}
})
t.Run("SessionSv1ProcessCDR", func(t *testing.T) {
var reply string
if err := client.Call(context.Background(), utils.SessionSv1ProcessCDR,
&utils.CGREvent{
Tenant: "cgrates.org",
ID: "SessionSv1ProcessCDR",
Event: map[string]any{
utils.RunID: "*default",
utils.Tenant: "cgrates.org",
utils.Category: "sms",
utils.ToR: utils.MetaSMS,
utils.OriginID: "processCDR2",
utils.OriginHost: "127.0.0.1",
utils.RequestType: utils.MetaPostpaid,
utils.AccountField: "1001",
utils.Destination: "1002",
utils.SetupTime: time.Date(2021, time.February, 2, 16, 14, 50, 0, time.UTC),
utils.AnswerTime: time.Date(2021, time.February, 2, 16, 15, 0, 0, time.UTC),
utils.Usage: 6,
utils.BalanceFactorID: "smsFactor",
},
}, &reply); err != nil {
t.Fatal(err)
}
var cdrs []*engine.CDR
if err := client.Call(context.Background(), utils.CDRsV1GetCDRs, &utils.RPCCDRsFilterWithAPIOpts{
RPCCDRsFilter: &utils.RPCCDRsFilter{
OriginIDs: []string{"processCDR2"},
}}, &cdrs); err != nil {
t.Fatal(err)
}
if len(cdrs) != 1 {
t.Fatalf("expected to receive only one CDR: %v", utils.ToJSON(cdrs))
}
smsBalanceValue, err := cdrs[0].CostDetails.FieldAsInterface([]string{"AccountSummary", "BalanceSummaries", "balance_sms", "Value"})
if err != nil {
t.Fatalf("could not retrieve *sms balance current value: %v", err)
}
if smsBalanceValue != 1. {
t.Errorf("balance value: want %v, got %v", 1., smsBalanceValue)
}
monetaryBalanceValue, err := cdrs[0].CostDetails.FieldAsInterface([]string{"AccountSummary", "BalanceSummaries", "balance_monetary", "Value"})
if err != nil {
t.Fatalf("could not retrieve *sms balance current value: %v", err)
}
if monetaryBalanceValue != 2. {
t.Errorf("balance value: want %v, got %v", 2., monetaryBalanceValue)
}
})
t.Run("PrepaidSession", func(t *testing.T) {
/*
Add balance via API. Should be equivalent to the following Actions.csv entry:
ACT_TOPUP,*topup_reset,"{""voiceFactor"":2}",,balance_voice,*voice,call,,,,*unlimited,,100s,20,false,false,20
*/
var replyAddBalance string
if err := client.Call(context.Background(), utils.APIerSv1AddBalance,
&v1.AttrAddBalance{
Tenant: "cgrates.org",
Account: "1001",
BalanceType: utils.MetaVoice,
Value: 100_000_000_000, // 100s
Balance: map[string]any{
utils.ID: "balance_voice",
utils.Categories: "call",
utils.ExpiryTime: utils.MetaUnlimited,
utils.Weight: 20,
utils.Factors: map[string]float64{
"voiceFactor": 2,
},
},
Overwrite: true,
}, &replyAddBalance); err != nil {
t.Error(err)
}
var replyInit sessions.V1InitSessionReply
if err := client.Call(context.Background(), utils.SessionSv1InitiateSession,
&sessions.V1InitSessionArgs{
InitSession: true,
CGREvent: &utils.CGREvent{
Tenant: "cgrates.org",
ID: "SessionSv1InitiateSession",
Event: map[string]any{
utils.OriginID: "prepaidSession",
utils.Tenant: "cgrates.org",
utils.Category: "call",
utils.ToR: utils.MetaVoice,
utils.RequestType: utils.MetaPrepaid,
utils.AccountField: "1001",
utils.Subject: "1001",
utils.Destination: "1002",
utils.SetupTime: time.Date(2023, time.February, 28, 8, 59, 50, 0, time.UTC),
utils.AnswerTime: time.Date(2023, time.February, 28, 9, 0, 0, 0, time.UTC),
utils.Usage: 10 * time.Second,
utils.BalanceFactorID: "voiceFactor",
},
APIOpts: map[string]any{
utils.OptsDebitInterval: 0,
},
},
}, &replyInit); err != nil {
t.Error(err)
}
var replyUpdate sessions.V1UpdateSessionReply
if err := client.Call(context.Background(), utils.SessionSv1UpdateSession,
&sessions.V1UpdateSessionArgs{
UpdateSession: true,
CGREvent: &utils.CGREvent{
Tenant: "cgrates.org",
ID: "SessionSv1UpdateSession1",
Event: map[string]any{
utils.OriginID: "prepaidSession",
utils.Tenant: "cgrates.org",
utils.Category: "call",
utils.ToR: utils.MetaVoice,
utils.RequestType: utils.MetaPrepaid,
utils.AccountField: "1001",
utils.Subject: "1001",
utils.Destination: "1002",
utils.SetupTime: time.Date(2023, time.February, 28, 8, 59, 50, 0, time.UTC),
utils.AnswerTime: time.Date(2023, time.February, 28, 9, 0, 0, 0, time.UTC),
utils.Usage: 5 * time.Second,
utils.BalanceFactorID: "voiceFactor",
},
APIOpts: map[string]any{
utils.OptsDebitInterval: 0,
},
},
}, &replyUpdate); err != nil {
t.Error(err)
}
if err := client.Call(context.Background(), utils.SessionSv1UpdateSession,
&sessions.V1UpdateSessionArgs{
UpdateSession: true,
CGREvent: &utils.CGREvent{
Tenant: "cgrates.org",
ID: "SessionSv1UpdateSession2",
Event: map[string]any{
utils.OriginID: "prepaidSession",
utils.Tenant: "cgrates.org",
utils.Category: "call",
utils.ToR: utils.MetaVoice,
utils.RequestType: utils.MetaPrepaid,
utils.AccountField: "1001",
utils.Subject: "1001",
utils.Destination: "1002",
utils.SetupTime: time.Date(2023, time.February, 28, 8, 59, 50, 0, time.UTC),
utils.AnswerTime: time.Date(2023, time.February, 28, 9, 0, 0, 0, time.UTC),
utils.Usage: 2 * time.Second,
utils.BalanceFactorID: "voiceFactor",
},
APIOpts: map[string]any{
utils.OptsDebitInterval: 0,
},
},
}, &replyUpdate); err != nil {
t.Error(err)
}
var replyTerminate string
if err := client.Call(context.Background(), utils.SessionSv1TerminateSession,
&sessions.V1TerminateSessionArgs{
TerminateSession: true,
CGREvent: &utils.CGREvent{
Tenant: "cgrates.org",
ID: "SessionSv1TerminateSession",
Event: map[string]any{
utils.OriginID: "prepaidSession",
utils.Tenant: "cgrates.org",
utils.Category: "call",
utils.ToR: utils.MetaVoice,
utils.RequestType: utils.MetaPrepaid,
utils.AccountField: "1001",
utils.Subject: "1001",
utils.Destination: "1002",
utils.SetupTime: time.Date(2023, time.February, 28, 8, 59, 50, 0, time.UTC),
utils.AnswerTime: time.Date(2023, time.February, 28, 9, 0, 0, 0, time.UTC),
},
APIOpts: map[string]any{
utils.OptsDebitInterval: 0,
},
},
}, &replyTerminate); err != nil {
t.Error(err)
}
var replyProcessCDR string
if err := client.Call(context.Background(), utils.SessionSv1ProcessCDR,
&utils.CGREvent{
Tenant: "cgrates.org",
ID: "testSesRnd2PrepaidProcessCDR",
Event: map[string]any{
utils.OriginID: "prepaidSession",
utils.Tenant: "cgrates.org",
utils.Category: "call",
utils.ToR: utils.MetaVoice,
utils.RequestType: utils.MetaPrepaid,
utils.AccountField: "1001",
utils.Subject: "1001",
utils.Destination: "1002",
utils.SetupTime: time.Date(2023, time.February, 28, 8, 59, 50, 0, time.UTC),
utils.AnswerTime: time.Date(2023, time.February, 28, 9, 0, 0, 0, time.UTC),
utils.Usage: 0,
},
APIOpts: map[string]any{
utils.OptsDebitInterval: 0,
},
}, &replyProcessCDR); err != nil {
t.Error(err)
}
var cdrs []*engine.CDR
if err := client.Call(context.Background(), utils.CDRsV1GetCDRs, &utils.RPCCDRsFilterWithAPIOpts{
RPCCDRsFilter: &utils.RPCCDRsFilter{
OriginIDs: []string{"prepaidSession"},
}}, &cdrs); err != nil {
t.Fatal(err)
}
if len(cdrs) != 1 {
t.Fatalf("expected to receive only one CDR: %v", utils.ToJSON(cdrs))
}
voiceBalanceValue, err := cdrs[0].CostDetails.FieldAsInterface([]string{"AccountSummary", "BalanceSummaries", "balance_voice", "Value"})
if err != nil {
t.Fatalf("could not retrieve *voice balance current value: %v", err)
}
if voiceBalanceValue != float64(66*time.Second) {
t.Errorf("*voice balance value: want %v, got %v", float64(66*time.Second), voiceBalanceValue)
}
// Attempt refund to check if factor also applies when refunding increments.
//
// Initial *voice balance value (before ProcessCDR): 100s
// CDR Usage: 17s
// Factor: 2
// Current *voice balance value: 66s
var replyProcessEvent string
if err := client.Call(context.Background(), utils.CDRsV1ProcessEvent,
&engine.ArgV1ProcessEvent{
Flags: []string{utils.MetaRefund, "*store:false"},
CGREvent: *cdrs[0].AsCGREvent(),
}, &replyProcessEvent); err != nil {
t.Fatal(err)
}
var acnt engine.Account
if err := client.Call(context.Background(), utils.APIerSv2GetAccount,
&utils.AttrGetAccount{
Tenant: "cgrates.org",
Account: "1001",
}, &acnt); err != nil {
t.Fatal(err)
}
voiceBalance := acnt.BalanceMap[utils.MetaVoice][0]
if voiceBalance.ID != "balance_voice" || voiceBalance.Value != float64(100*time.Second) {
t.Fatalf("*voice balance value: want %v, got %v", 100_000_000_000, voiceBalance)
}
})
}
// TestBalanceCDRLog tests the usage of balance related actions together with a "*cdrlog" action.
//
// The test steps are as follows:
// 1. Create an account with 2 balances of types *sms and *monetary. The topup action for the *monetary one will also include
// the creation of a CDR.
// 2. Set 3 action bundles with "*topup_reset", "*remove_balance" and "*remove_expired" actions, each coupled with a "*cdrlog" action.
// 3. Retrieve the CDRs and check whether the their fields are set correctly.
func TestBalanceCDRLog(t *testing.T) {
switch *utils.DBType {
case utils.MetaInternal:
case utils.MetaMySQL, utils.MetaMongo, utils.MetaPostgres:
t.SkipNow()
default:
t.Fatal("unsupported dbtype value")
}
content := `{
"general": {
"log_level": 7
},
"data_db": {
"db_type": "*internal"
},
"stor_db": {
"db_type": "*internal"
},
"cdrs": {
"enabled": true
},
"rals": {
"remove_expired": false
},
"schedulers": {
"enabled": true,
"cdrs_conns": ["*internal"]
},
"apiers": {
"enabled": true,
"scheduler_conns": ["*internal"]
}
}`
tpFiles := map[string]string{
utils.AccountActionsCsv: `#Tenant,Account,ActionPlanId,ActionTriggersId,AllowNegative,Disabled
cgrates.org,ACC_TEST,PACKAGE_ACC_TEST,,,`,
utils.ActionPlansCsv: `#Id,ActionsId,TimingId,Weight
PACKAGE_ACC_TEST,ACT_TOPUP_MONETARY,*asap,10
PACKAGE_ACC_TEST,ACT_TOPUP_SMS,*asap,10`,
utils.ActionsCsv: `#ActionsId[0],Action[1],ExtraParameters[2],Filter[3],BalanceId[4],BalanceType[5],Categories[6],DestinationIds[7],RatingSubject[8],SharedGroup[9],ExpiryTime[10],TimingIds[11],Units[12],BalanceWeight[13],BalanceBlocker[14],BalanceDisabled[15],Weight[16]
ACT_REMOVE_BALANCE_MONETARY,*remove_balance,,,balance_monetary,*monetary,,,,,,,,,,,
ACT_REMOVE_BALANCE_MONETARY,*cdrlog,,,,,,,,,,,,,,,
ACT_REMOVE_EXPIRED_WITH_CATEGORY,*remove_expired,,,,,category2,,,,,,,,,,
ACT_REMOVE_EXPIRED_WITH_CATEGORY,*cdrlog,,,,,,,,,,,,,,,
ACT_REMOVE_EXPIRED,*remove_expired,,,,,,,,,,,,,,,
ACT_REMOVE_EXPIRED,*cdrlog,,,,,,,,,,,,,,,
ACT_TOPUP_MONETARY,*topup_reset,,,balance_monetary,*monetary,,*any,,,*unlimited,,150,20,false,false,20
ACT_TOPUP_MONETARY,*cdrlog,"{""BalanceID"":""~*acnt.BalanceID""}",,,,,,,,,,,,,,
ACT_TOPUP_SMS,*topup_reset,,,balance_sms,*sms,,*any,,,*unlimited,,1000,10,false,false,10`,
}
ng := engine.TestEngine{
ConfigJSON: content,
TpFiles: tpFiles,
}
client, _ := ng.Run(t)
t.Run("CheckInitialBalances", func(t *testing.T) {
time.Sleep(10 * time.Millisecond) // wait for tps to be loaded
var acnt engine.Account
if err := client.Call(context.Background(), utils.APIerSv2GetAccount,
&utils.AttrGetAccount{
Tenant: "cgrates.org",
Account: "ACC_TEST",
}, &acnt); err != nil {
t.Fatal(err)
}
if len(acnt.BalanceMap) != 2 || len(acnt.BalanceMap[utils.MetaMonetary]) != 1 || len(acnt.BalanceMap[utils.MetaSMS]) != 1 {
t.Errorf("unexpected accont received: %v", utils.ToJSON(acnt))
}
})
t.Run("CheckTopupCDR", func(t *testing.T) {
var cdrs []*engine.CDR
if err := client.Call(context.Background(), utils.CDRsV1GetCDRs, &utils.RPCCDRsFilterWithAPIOpts{
RPCCDRsFilter: &utils.RPCCDRsFilter{}}, &cdrs); err != nil {
t.Fatal(err)
}
if len(cdrs) != 1 ||
cdrs[0].RunID != utils.MetaTopUpReset ||
cdrs[0].Source != utils.CDRLog ||
cdrs[0].ToR != utils.MetaMonetary ||
cdrs[0].ExtraFields["BalanceID"] != "balance_monetary" ||
cdrs[0].Cost != 150 {
t.Errorf("unexpected cdr received: %v", utils.ToJSON(cdrs))
}
})
t.Run("RemoveMonetaryBalance", func(t *testing.T) {
var reply string
attrsEA := &utils.AttrExecuteAction{Tenant: "cgrates.org", Account: "ACC_TEST", ActionsId: "ACT_REMOVE_BALANCE_MONETARY"}
if err := client.Call(context.Background(), utils.APIerSv1ExecuteAction, attrsEA, &reply); err != nil {
t.Error(err)
}
})
t.Run("CheckRemoveBalanceCDR", func(t *testing.T) {
var cdrs []*engine.CDR
if err := client.Call(context.Background(), utils.CDRsV1GetCDRs, &utils.RPCCDRsFilterWithAPIOpts{
RPCCDRsFilter: &utils.RPCCDRsFilter{
RunIDs: []string{"*remove_balance"},
}}, &cdrs); err != nil {
t.Fatal(err)
}
if len(cdrs) != 1 ||
cdrs[0].RunID != utils.MetaRemoveBalance ||
cdrs[0].Source != utils.CDRLog ||
cdrs[0].ToR != utils.MetaMonetary ||
cdrs[0].ExtraFields["BalanceID"] != "balance_monetary" ||
cdrs[0].Cost != 150 {
t.Errorf("unexpected cdr received: %v", utils.ToJSON(cdrs))
}
})
t.Run("CheckFinalBalances", func(t *testing.T) {
var acnt engine.Account
if err := client.Call(context.Background(), utils.APIerSv2GetAccount,
&utils.AttrGetAccount{
Tenant: "cgrates.org",
Account: "ACC_TEST",
}, &acnt); err != nil {
t.Error(err)
}
if len(acnt.BalanceMap) != 2 || len(acnt.BalanceMap[utils.MetaSMS]) != 1 || len(acnt.BalanceMap[utils.MetaMonetary]) != 0 {
t.Errorf("unexpected account received: %v", utils.ToJSON(acnt))
}
})
t.Run("RemoveExpiredBalancesNoFilter", func(t *testing.T) {
expiryTime := time.Now()
attrSetBalance := utils.AttrSetBalances{
Tenant: "cgrates.org",
Account: "ACC_TEST",
Balances: []*utils.AttrBalance{
{
// will not be removed
BalanceType: utils.MetaMonetary,
Value: 10,
Balance: map[string]any{
utils.ID: "ValidBalanceNotMatching",
},
},
{
// will be removed
BalanceType: utils.MetaMonetary,
Value: 11,
Balance: map[string]any{
utils.ID: "ExpiredBalanceNotMatching1",
utils.ExpiryTime: expiryTime,
},
},
{
// will be removed
BalanceType: utils.MetaMonetary,
Value: 12,
Balance: map[string]any{
utils.ID: "ExpiredBalanceNotMatching2",
utils.ExpiryTime: expiryTime,
},
},
{
// will be removed
BalanceType: utils.MetaMonetary,
Value: 13,
Balance: map[string]any{
utils.ID: "ExpiredBalanceNotMatching3",
utils.ExpiryTime: expiryTime,
utils.Categories: "category1;category3",
},
},
{
// will be removed
BalanceType: utils.MetaMonetary,
Value: 14,
Balance: map[string]any{
utils.ID: "MatchingExpiredBalance",
utils.ExpiryTime: expiryTime,
utils.Categories: "category1;category2",
},
},
{
// will not be removed
BalanceType: utils.MetaMonetary,
Value: 15,
Balance: map[string]any{
utils.ID: "MatchingValidBalance",
utils.Categories: "category2",
},
},
{
// will be removed
BalanceType: utils.MetaSMS,
Value: 16,
Balance: map[string]any{
utils.ID: "ExpiredSMSBalance",
utils.ExpiryTime: expiryTime,
},
},
},
}
var reply string
if err := client.Call(context.Background(), utils.APIerSv1SetBalances, &attrSetBalance, &reply); err != nil {
t.Error(err)
}
attrsEA := &utils.AttrExecuteAction{Tenant: "cgrates.org", Account: "ACC_TEST", ActionsId: "ACT_REMOVE_EXPIRED"}
if err := client.Call(context.Background(), utils.APIerSv1ExecuteAction, attrsEA, &reply); err != nil {
t.Error(err)
}
})
t.Run("CheckRemoveExpiredCDRNoFilter", func(t *testing.T) {
var cdrs []*engine.CDR
if err := client.Call(context.Background(), utils.CDRsV1GetCDRs, &utils.RPCCDRsFilterWithAPIOpts{
RPCCDRsFilter: &utils.RPCCDRsFilter{
RunIDs: []string{"*remove_expired"},
OrderBy: utils.Cost,
}}, &cdrs); err != nil {
t.Fatal(err)
}
if len(cdrs) != 5 ||
cdrs[0].Cost != 11 ||
cdrs[0].ExtraFields[utils.BalanceID] != "ExpiredBalanceNotMatching1" ||
cdrs[1].Cost != 12 ||
cdrs[1].ExtraFields[utils.BalanceID] != "ExpiredBalanceNotMatching2" ||
cdrs[2].Cost != 13 ||
cdrs[2].ExtraFields[utils.BalanceID] != "ExpiredBalanceNotMatching3" ||
cdrs[3].Cost != 14 ||
cdrs[3].ExtraFields[utils.BalanceID] != "MatchingExpiredBalance" ||
cdrs[4].Cost != 16 ||
cdrs[4].ExtraFields[utils.BalanceID] != "ExpiredSMSBalance" {
t.Errorf("unexpected cdrs received: %v", utils.ToJSON(cdrs))
}
assertCommonCDRFields := func(t *testing.T, cdr *engine.CDR, expectedType string) {
if cdr.RunID != utils.MetaRemoveExpired ||
cdr.Source != utils.CDRLog ||
cdr.ToR != expectedType {
t.Fatalf("unexpected cdrs received: %v", utils.ToJSON(cdrs))
}
}
expType := utils.MetaMonetary
for i, cdr := range cdrs {
if i == len(cdrs)-1 {
expType = utils.MetaSMS
}
assertCommonCDRFields(t, cdr, expType)
}
})
t.Run("RemoveExpiredBalancesFiltered", func(t *testing.T) {
// Remove cdrs from previous test.
var reply string
if err := client.Call(context.Background(), utils.APIerSv1RemoveCDRs, &utils.RPCCDRsFilter{
RunIDs: []string{"*remove_expired"},
}, &reply); err != nil {
t.Fatal(err)
}
expiryTime := time.Now()
attrSetBalance := utils.AttrSetBalances{
Tenant: "cgrates.org",
Account: "ACC_TEST",
Balances: []*utils.AttrBalance{
{
// will not be removed
BalanceType: utils.MetaMonetary,
Value: 10,
Balance: map[string]any{
utils.ID: "ValidBalanceNotMatching",
},
},
{
// will not be removed
BalanceType: utils.MetaMonetary,
Value: 11,
Balance: map[string]any{
utils.ID: "ExpiredBalanceNotMatching1",
utils.ExpiryTime: expiryTime,
},
},
{
// will not be removed
BalanceType: utils.MetaMonetary,
Value: 12,
Balance: map[string]any{
utils.ID: "ExpiredBalanceNotMatching2",
utils.ExpiryTime: expiryTime,
},
},
{
// will not be removed
BalanceType: utils.MetaMonetary,
Value: 13,
Balance: map[string]any{
utils.ID: "ExpiredBalanceNotMatching3",
utils.ExpiryTime: expiryTime,
utils.Categories: "category1;category3",
},
},
{
// will be removed
BalanceType: utils.MetaMonetary,
Value: 14,
Balance: map[string]any{
utils.ID: "MatchingExpiredBalance",
utils.ExpiryTime: expiryTime,
utils.Categories: "category1;category2",
},
},
{
// will not be removed
BalanceType: utils.MetaMonetary,
Value: 15,
Balance: map[string]any{
utils.ID: "MatchingValidBalance",
utils.Categories: "category2",
},
},
{
// will be removed
BalanceType: utils.MetaSMS,
Value: 16,
Balance: map[string]any{
utils.ID: "ExpiredSMSBalance",
utils.ExpiryTime: expiryTime,
utils.Categories: "category1;category2",
},
},
},
}
if err := client.Call(context.Background(), utils.APIerSv1SetBalances, &attrSetBalance, &reply); err != nil {
t.Error(err)
}
attrsEA := &utils.AttrExecuteAction{Tenant: "cgrates.org", Account: "ACC_TEST", ActionsId: "ACT_REMOVE_EXPIRED_WITH_CATEGORY"}
if err := client.Call(context.Background(), utils.APIerSv1ExecuteAction, attrsEA, &reply); err != nil {
t.Error(err)
}
})
t.Run("CheckRemoveExpiredCDRFiltered", func(t *testing.T) {
var cdrs []*engine.CDR
if err := client.Call(context.Background(), utils.CDRsV1GetCDRs, &utils.RPCCDRsFilterWithAPIOpts{
RPCCDRsFilter: &utils.RPCCDRsFilter{
RunIDs: []string{"*remove_expired"},
OrderBy: utils.Cost,
}}, &cdrs); err != nil {
t.Fatal(err)
}
if len(cdrs) != 2 ||
cdrs[0].Cost != 14 ||
cdrs[0].ExtraFields[utils.BalanceID] != "MatchingExpiredBalance" ||
cdrs[0].RunID != utils.MetaRemoveExpired ||
cdrs[0].Source != utils.CDRLog ||
cdrs[0].ToR != utils.MetaMonetary ||
cdrs[1].Cost != 16 ||
cdrs[1].ExtraFields[utils.BalanceID] != "ExpiredSMSBalance" ||
cdrs[1].RunID != utils.MetaRemoveExpired ||
cdrs[1].Source != utils.CDRLog ||
cdrs[1].ToR != utils.MetaSMS {
t.Errorf("unexpected cdrs received: %v", utils.ToJSON(cdrs))
}
})
}
func TestBalanceBlockerInIncrements(t *testing.T) {
switch *utils.DBType {
case utils.MetaInternal:
case utils.MetaMySQL, utils.MetaMongo, utils.MetaPostgres:
t.SkipNow()
default:
t.Fatal("unsupported dbtype value")
}
content := `{
"general": {
"log_level": 7,
},
"data_db": {
"db_type": "*internal"
},
"stor_db": {
"db_type": "*internal"
},
"rals": {
"enabled": true,
"sessions_conns": ["*internal"],
},
"cdrs": {
"enabled": true,
"rals_conns": ["*internal"]
},
"chargers":{
"enabled": true,
},
"sessions":{
"enabled": true,
"chargers_conns": ["*internal"],
"rals_conns": ["*internal"],
"cdrs_conns": ["*internal"],
},
"schedulers": {
"enabled": true
},
"apiers": {
"enabled": true,
"scheduler_conns": ["*internal"]
}
}`
tpFiles := map[string]string{
utils.AccountActionsCsv: `#Tenant,Account,ActionPlanId,ActionTriggersId,AllowNegative,Disabled,`,
utils.ActionPlansCsv: `#Id,ActionsId,TimingId,Weight`,
utils.ActionsCsv: `#ActionsId[0],Action[1],ExtraParameters[2],Filter[3],BalanceId[4],BalanceType[5],Categories[6],DestinationIds[7],RatingSubject[8],SharedGroup[9],ExpiryTime[10],TimingIds[11],Units[12],BalanceWeight[13],BalanceBlocker[14],BalanceDisabled[15],Weight[16]`,
utils.ChargersCsv: `#Tenant,ID,FilterIDs,ActivationInterval,RunID,AttributeIDs,Weight
cgrates.org,DEFAULT,,,DEFAULT,*none,20`,
utils.DestinationRatesCsv: `#Id,DestinationId,RatesTag,RoundingMethod,RoundingDecimals,MaxCost,MaxCostStrategy
DR_MONETARY,*any,RT_MONETARY,*up,20,0,`,
utils.RatesCsv: `#Id,ConnectFee,Rate,RateUnit,RateIncrement,GroupIntervalStart
RT_MONETARY,0,1,1,1,0`,
utils.RatingPlansCsv: `#Id,DestinationRatesId,TimingTag,Weight
RP_MONETARY,DR_MONETARY,*any,10`,
utils.RatingProfilesCsv: `#Tenant,Category,Subject,ActivationTime,RatingPlanId,RatesFallbackSubject`,
}
ng := engine.TestEngine{
ConfigJSON: content,
TpFiles: tpFiles,
}
client, _ := ng.Run(t)
t.Run("SetAccount", func(t *testing.T) {
time.Sleep(10 * time.Millisecond) // wait for tps to be loaded
var reply string
if err := client.Call(context.Background(), utils.APIerSv2SetAccount,
&utils.AttrSetAccount{Tenant: "cgrates.org", Account: "10_unit_acc"}, &reply); err != nil {
t.Error(err)
} else if reply != utils.OK {
t.Error("Unexpected reply returned", reply)
}
var acnt engine.Account
attrs := &utils.AttrGetAccount{Tenant: "cgrates.org", Account: "10_unit_acc"}
if err := client.Call(context.Background(), utils.APIerSv2GetAccount, attrs, &acnt); err != nil {
t.Fatal(err)
}
expAcnt := &engine.Account{
ID: "cgrates.org:10_unit_acc",
}
if !reflect.DeepEqual(utils.ToJSON(expAcnt), utils.ToJSON(acnt)) {
t.Errorf("expected <%+v>, \nreceived <%+v>", utils.ToJSON(expAcnt), utils.ToJSON(acnt))
}
})
t.Run("SetBalance", func(t *testing.T) {
var replySetBalance string
if err := client.Call(context.Background(), utils.APIerSv1SetBalance,
&utils.AttrSetBalance{
Tenant: "cgrates.org",
Account: "10_unit_acc",
BalanceType: utils.MetaMonetary,
Balance: map[string]any{
utils.ID: "10_unit_bal",
utils.Value: 10,
utils.Blocker: true,
},
}, &replySetBalance); err != nil {
t.Error(err)
}
if err := client.Call(context.Background(), utils.APIerSv1SetBalance,
&utils.AttrSetBalance{
Tenant: "cgrates.org",
Account: "10_unit_acc",
BalanceType: utils.MetaMonetary,
Balance: map[string]any{
utils.ID: "other_bal",
utils.Value: 999999,
},
}, &replySetBalance); err != nil {
t.Error(err)
}
var acnt engine.Account
attrs := &utils.AttrGetAccount{Tenant: "cgrates.org", Account: "10_unit_acc"}
if err := client.Call(context.Background(), utils.APIerSv2GetAccount, attrs, &acnt); err != nil {
t.Fatal(err)
}
expAcnt := &engine.Account{
ID: "cgrates.org:10_unit_acc",
BalanceMap: map[string]engine.Balances{
utils.MetaMonetary: {
{
Uuid: acnt.BalanceMap[utils.MetaMonetary][0].Uuid,
ID: "10_unit_bal",
Value: 10,
Blocker: true,
},
{
Uuid: acnt.BalanceMap[utils.MetaMonetary][1].Uuid,
ID: "other_bal",
Value: 999999,
},
},
},
}
if !reflect.DeepEqual(utils.ToJSON(expAcnt), utils.ToJSON(acnt)) {
t.Errorf("expected <%+v>, \nreceived <%+v>", utils.ToJSON(expAcnt), utils.ToJSON(acnt))
}
})
t.Run("DebitIncrements", func(t *testing.T) {
args := &sessions.V1AuthorizeArgs{
GetMaxUsage: true,
CGREvent: &utils.CGREvent{
Tenant: "cgrates.org",
ID: "TestSSv1ItAuth",
Event: map[string]any{
utils.Tenant: "cgrates.org",
utils.ToR: utils.MetaMonetary,
utils.RequestType: utils.MetaPrepaid,
utils.OriginID: "TestSSv1It1",
utils.AccountField: "10_unit_acc",
utils.AnswerTime: utils.MetaNow,
utils.Usage: 12,
},
},
}
var rply sessions.V1AuthorizeReply
if err := client.Call(context.Background(), utils.SessionSv1AuthorizeEvent, args, &rply); err != nil {
t.Error(err)
}
if rply.MaxUsage == nil || *rply.MaxUsage != 10 {
t.Errorf("Unexpected MaxUsage: %v", rply.MaxUsage)
}
for i := 0; i < 3; i++ {
iStr := strconv.Itoa(i)
var replyUpdate sessions.V1UpdateSessionReply
if err := client.Call(context.Background(), utils.SessionSv1UpdateSession,
&sessions.V1UpdateSessionArgs{
UpdateSession: true,
CGREvent: &utils.CGREvent{
Tenant: "cgrates.org",
ID: "SessionSv1UpdateSession" + iStr,
Event: map[string]any{
utils.Tenant: "cgrates.org",
utils.ToR: utils.MetaMonetary,
utils.RequestType: utils.MetaPrepaid,
utils.OriginID: "TestSSv1Update" + iStr,
utils.AccountField: "10_unit_acc",
utils.Usage: 3,
},
},
}, &replyUpdate); err != nil {
t.Error(err)
}
}
var acnt engine.Account
attrs := &utils.AttrGetAccount{Tenant: "cgrates.org", Account: "10_unit_acc"}
if err := client.Call(context.Background(), utils.APIerSv2GetAccount, attrs, &acnt); err != nil {
t.Fatal(err)
}
expAcnt := &engine.Account{
ID: "cgrates.org:10_unit_acc",
BalanceMap: map[string]engine.Balances{
utils.MetaMonetary: {
{
Uuid: acnt.BalanceMap[utils.MetaMonetary][0].Uuid,
ID: "10_unit_bal",
Value: 1,
Blocker: true,
},
{
Uuid: acnt.BalanceMap[utils.MetaMonetary][1].Uuid,
ID: "other_bal",
Value: 999999,
},
},
},
}
if !reflect.DeepEqual(utils.ToJSON(expAcnt), utils.ToJSON(acnt)) {
t.Errorf("expected <%+v>, \nreceived <%+v>", utils.ToJSON(expAcnt), utils.ToJSON(acnt))
}
var replyProcessCDR string
if err := client.Call(context.Background(), utils.SessionSv1ProcessCDR,
&utils.CGREvent{
Tenant: "cgrates.org",
ID: "testSesRnd2PrepaidProcessCDR",
Event: map[string]any{
utils.OriginID: "TestSSv1ProcessCDR",
utils.Tenant: "cgrates.org",
utils.ToR: utils.MetaMonetary,
utils.RequestType: utils.MetaPrepaid,
utils.AccountField: "10_unit_acc",
utils.Usage: 3,
},
}, &replyProcessCDR); err != nil {
t.Error(err)
}
var cdrs []*engine.CDR
if err := client.Call(context.Background(), utils.CDRsV1GetCDRs, &utils.RPCCDRsFilterWithAPIOpts{
RPCCDRsFilter: &utils.RPCCDRsFilter{
OriginIDs: []string{"TestSSv1ProcessCDR"},
}}, &cdrs); err != nil {
t.Fatal(err)
}
if cdrs[0].ExtraInfo != utils.ErrInsufficientCreditBalanceBlocker.Error() {
t.Errorf("Unexpected ExtraInfo field value: %v", cdrs[0].ExtraInfo)
}
if err := client.Call(context.Background(), utils.APIerSv2GetAccount, attrs, &acnt); err != nil {
t.Error(err)
}
expAcnt = &engine.Account{
ID: "cgrates.org:10_unit_acc",
BalanceMap: map[string]engine.Balances{
utils.MetaMonetary: {
{
Uuid: acnt.BalanceMap[utils.MetaMonetary][0].Uuid,
ID: "10_unit_bal",
Value: 1,
Blocker: true,
},
{
Uuid: acnt.BalanceMap[utils.MetaMonetary][1].Uuid,
ID: "other_bal",
Value: 999999,
},
},
},
}
if !reflect.DeepEqual(utils.ToJSON(expAcnt), utils.ToJSON(acnt)) {
t.Errorf("expected <%+v>, \nreceived <%+v>", utils.ToJSON(expAcnt), utils.ToJSON(acnt))
}
})
}