mirror of
https://github.com/cgrates/cgrates.git
synced 2026-02-11 18:16:24 +05:00
494 lines
20 KiB
Go
494 lines
20 KiB
Go
/*
|
|
Real-time Online/Offline Charging System (OCS) for Telecom & ISP environments
|
|
Copyright (C) ITsysCOM GmbH
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>
|
|
*/
|
|
|
|
package sessions
|
|
|
|
import (
|
|
"reflect"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/cgrates/birpc/context"
|
|
"github.com/cgrates/cgrates/config"
|
|
|
|
"github.com/cgrates/cgrates/engine"
|
|
"github.com/cgrates/cgrates/utils"
|
|
jwt "github.com/dgrijalva/jwt-go"
|
|
)
|
|
|
|
func TestLibSessionSGetSetCGRID(t *testing.T) {
|
|
sEv := engine.NewMapEvent(map[string]any{
|
|
utils.EventName: "TEST_EVENT",
|
|
utils.ToR: "*voice",
|
|
utils.OriginID: "12345",
|
|
utils.AccountField: "account1",
|
|
utils.Subject: "subject1",
|
|
utils.Destination: "+4986517174963",
|
|
utils.Category: "call",
|
|
utils.Tenant: "cgrates.org",
|
|
utils.RequestType: "*prepaid",
|
|
utils.SetupTime: "2015-11-09 14:21:24",
|
|
utils.AnswerTime: "2015-11-09 14:22:02",
|
|
utils.Usage: "1m23s",
|
|
utils.LastUsed: "21s",
|
|
utils.PDD: "300ms",
|
|
utils.Route: "supplier1",
|
|
utils.DisconnectCause: "NORMAL_DISCONNECT",
|
|
utils.OriginHost: "127.0.0.1",
|
|
})
|
|
//Empty CGRID in event
|
|
cgrID := GetSetCGRID(sEv)
|
|
if len(cgrID) == 0 {
|
|
t.Errorf("Unexpected cgrID: %+v", cgrID)
|
|
}
|
|
//populate CGRID in event
|
|
sEv[utils.CGRID] = "someRandomVal"
|
|
cgrID = GetSetCGRID(sEv)
|
|
if cgrID != "someRandomVal" {
|
|
t.Errorf("Expecting: someRandomVal, received: %+v", cgrID)
|
|
}
|
|
}
|
|
|
|
func TestGetFlagIDs(t *testing.T) {
|
|
//empty check
|
|
rcv := getFlagIDs("")
|
|
var eOut []string
|
|
if !reflect.DeepEqual(eOut, rcv) {
|
|
t.Errorf("Expected %s , received: %s", utils.ToJSON(eOut), utils.ToJSON(rcv))
|
|
}
|
|
//normal check
|
|
rcv = getFlagIDs("*attributes:ATTR1&ATTR2")
|
|
eOut = []string{"ATTR1", "ATTR2"}
|
|
if !reflect.DeepEqual(eOut, rcv) {
|
|
t.Errorf("Expected %s , received: %s", utils.ToJSON(eOut), utils.ToJSON(rcv))
|
|
}
|
|
}
|
|
|
|
func TestNewProcessedIdentity(t *testing.T) {
|
|
if _, err := NewProcessedIdentity(""); err == nil ||
|
|
err.Error() != "missing parts of the message header" {
|
|
t.Errorf("Expected %q received: %v", "missing parts of the message header", err)
|
|
}
|
|
if _, err := NewProcessedIdentity(";"); err == nil ||
|
|
err.Error() != "wrong header format" {
|
|
t.Errorf("Expected %q received: %v", "wrong header format", err)
|
|
}
|
|
|
|
if _, err := NewProcessedIdentity("eyJhbGciOiJFUzI1NiIsInBwdCI6InNoYWtlbiIsInR,5cCI6InBhc3Nwb3J0IiwieDV1IjoiaHR0cHM6Ly93d3cuZXhhbXBsZS5vcmcvY2VydC5jZXIifQ.eyJhdHRlc3QiOiJBIiwiZGVzdCI6eyJ0biI6WyIxMDAyIl19LCJpYXQiOjE1ODcwMTk4MjIsIm9yaWc,iOnsidG4iOiIxMDAxIn0sIm9yaWdpZCI6IjEyMzQ1NiJ9.4ybtWmgqdkNyJLS9Iv3PuJV8ZxR7yZ_NEBhCpKCEu2WBiTchqwoqoWpI17Q_ALm38tbnpay32t95ZY_LhSgwJg;info=<https://www.example.org/cert.cer>;ppt=shaken"); err == nil {
|
|
t.Errorf("Expected error")
|
|
}
|
|
|
|
if _, err := NewProcessedIdentity("eyJhbGciOiJFUzI1NiIsInBwdCI6InNoYWtlbiIsInR5cCI6InBhc3Nwb3J0IiwieDV1IjoiaHR0cHM6Ly93d3cuZXhhbXBsZS5vcmcvY2VydC5jZXIifQ.eyJhdHRlc3QiOiJBIiwiZGVzdCI6eyJ0biI6WyIxMDAyIl19LCJpYXQiOjE1ODcwMTk4MjIsIm9yaWc,iOnsidG4iOiIxMDAxIn0sIm9yaWdpZCI6IjEyMzQ1NiJ9.4ybtWmgqdkNyJLS9Iv3PuJV8ZxR7yZ_NEBhCpKCEu2WBiTchqwoqoWpI17Q_ALm38tbnpay32t95ZY_LhSgwJg;info=<https://www.example.org/cert.cer>;ppt=shaken"); err == nil {
|
|
t.Errorf("Expected error")
|
|
}
|
|
|
|
expected := &ProcessedStirIdentity{
|
|
Tokens: []string{"info=<https://www.example.org/cert.cer>", "ppt=shaken"},
|
|
SigningStr: "eyJhbGciOiJFUzI1NiIsInBwdCI6InNoYWtlbiIsInR5cCI6InBhc3Nwb3J0IiwieDV1IjoiaHR0cHM6Ly93d3cuZXhhbXBsZS5vcmcvY2VydC5jZXIifQ.eyJhdHRlc3QiOiJBIiwiZGVzdCI6eyJ0biI6WyIxMDAyIl19LCJpYXQiOjE1ODcwMTk4MjIsIm9yaWciOnsidG4iOiIxMDAxIn0sIm9yaWdpZCI6IjEyMzQ1NiJ9",
|
|
Signature: "4ybtWmgqdkNyJLS9Iv3PuJV8ZxR7yZ_NEBhCpKCEu2WBiTchqwoqoWpI17Q_ALm38tbnpay32t95ZY_LhSgwJg",
|
|
Header: &utils.PASSporTHeader{
|
|
Typ: utils.STIRTyp,
|
|
Alg: utils.STIRAlg,
|
|
Ppt: utils.STIRPpt,
|
|
X5u: "https://www.example.org/cert.cer",
|
|
},
|
|
Payload: &utils.PASSporTPayload{
|
|
ATTest: "A",
|
|
Dest: utils.PASSporTDestinationsIdentity{
|
|
Tn: []string{"1002"},
|
|
},
|
|
IAT: 1587019822,
|
|
Orig: utils.PASSporTOriginsIdentity{
|
|
Tn: "1001",
|
|
},
|
|
OrigID: "123456",
|
|
},
|
|
}
|
|
if rply, err := NewProcessedIdentity("eyJhbGciOiJFUzI1NiIsInBwdCI6InNoYWtlbiIsInR5cCI6InBhc3Nwb3J0IiwieDV1IjoiaHR0cHM6Ly93d3cuZXhhbXBsZS5vcmcvY2VydC5jZXIifQ.eyJhdHRlc3QiOiJBIiwiZGVzdCI6eyJ0biI6WyIxMDAyIl19LCJpYXQiOjE1ODcwMTk4MjIsIm9yaWciOnsidG4iOiIxMDAxIn0sIm9yaWdpZCI6IjEyMzQ1NiJ9.4ybtWmgqdkNyJLS9Iv3PuJV8ZxR7yZ_NEBhCpKCEu2WBiTchqwoqoWpI17Q_ALm38tbnpay32t95ZY_LhSgwJg;info=<https://www.example.org/cert.cer>;ppt=shaken"); err != nil {
|
|
t.Error(err)
|
|
} else if !reflect.DeepEqual(expected, rply) {
|
|
t.Errorf("Expected: %s, received:%s", utils.ToJSON(expected), utils.ToJSON(rply))
|
|
}
|
|
}
|
|
|
|
func TestProcessedIdentityVerifyHeader(t *testing.T) {
|
|
args := &ProcessedStirIdentity{
|
|
Tokens: []string{"info=<https://www.example.org/cert.cer>", "ppt=shaken", "extra", "alg=ES256"},
|
|
Header: &utils.PASSporTHeader{
|
|
Typ: utils.STIRTyp,
|
|
Alg: utils.STIRAlg,
|
|
Ppt: utils.STIRPpt,
|
|
X5u: "https://www.example.org/cert.cer",
|
|
},
|
|
}
|
|
if !args.VerifyHeader() {
|
|
t.Errorf("Expected the header to be valid")
|
|
}
|
|
args.Header.Typ = "1"
|
|
if args.VerifyHeader() {
|
|
t.Errorf("Expected the header to not be valid")
|
|
}
|
|
|
|
args.Tokens = []string{"info=<https://www.example.org/cert.cer>", "ppt=shaken", "alg=wrongArg"}
|
|
if args.VerifyHeader() {
|
|
t.Errorf("Expected the header to not be valid")
|
|
}
|
|
|
|
args.Tokens = []string{"info=<https://www.example.org/cert.cer>", "ppt=wrongExtension"}
|
|
if args.VerifyHeader() {
|
|
t.Errorf("Expected the header to not be valid")
|
|
}
|
|
args.Tokens = []string{"info=<", "ppt=shaken"}
|
|
if args.VerifyHeader() {
|
|
t.Errorf("Expected the header to not be valid")
|
|
}
|
|
}
|
|
|
|
func TestProcessedIdentityVerifyPayload(t *testing.T) {
|
|
args := &ProcessedStirIdentity{
|
|
Payload: &utils.PASSporTPayload{
|
|
ATTest: "C",
|
|
Dest: utils.PASSporTDestinationsIdentity{
|
|
Tn: []string{"1002"},
|
|
},
|
|
IAT: 1587019822,
|
|
Orig: utils.PASSporTOriginsIdentity{
|
|
Tn: "1001",
|
|
},
|
|
OrigID: "123456",
|
|
},
|
|
}
|
|
if err := args.VerifyPayload("1001", "", "1002", "", -1, utils.NewStringSet([]string{utils.MetaAny})); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := args.VerifyPayload("1001", "", "1003", "", -1, utils.NewStringSet([]string{utils.MetaAny})); err == nil ||
|
|
err.Error() != "wrong destinationTn" {
|
|
t.Errorf("Expected error: %s,receved %v", "wrong destinationTn", err)
|
|
}
|
|
if err := args.VerifyPayload("1001", "", "1003", "1002", -1, utils.NewStringSet([]string{utils.MetaAny})); err == nil ||
|
|
err.Error() != "wrong destinationURI" {
|
|
t.Errorf("Expected error: %s,receved %v", "wrong destinationURI", err)
|
|
}
|
|
if err := args.VerifyPayload("1002", "", "1003", "1002", -1, utils.NewStringSet([]string{utils.MetaAny})); err == nil ||
|
|
err.Error() != "wrong originatorTn" {
|
|
t.Errorf("Expected error: %s,receved %v", "wrong originatorTn", err)
|
|
}
|
|
if err := args.VerifyPayload("1002", "1001", "1003", "1002", -1, utils.NewStringSet([]string{utils.MetaAny})); err == nil ||
|
|
err.Error() != "wrong originatorURI" {
|
|
t.Errorf("Expected error: %s,receved %v", "wrong originatorURI", err)
|
|
}
|
|
if err := args.VerifyPayload("1001", "", "1002", "", time.Second, utils.NewStringSet([]string{utils.MetaAny})); err == nil ||
|
|
err.Error() != "expired payload" {
|
|
t.Errorf("Expected error: %s,receved %v", "expired payload", err)
|
|
}
|
|
if err := args.VerifyPayload("1001", "", "1002", "", time.Second, utils.NewStringSet([]string{"A"})); err == nil ||
|
|
err.Error() != "wrong attest level" {
|
|
t.Errorf("Expected error: %s,receved %v", "wrong attest level", err)
|
|
}
|
|
}
|
|
|
|
func TestVerifySignature(t *testing.T) {
|
|
rply, err := NewProcessedIdentity("eyJhbGciOiJFUzI1NiIsInBwdCI6InNoYWtlbiIsInR5cCI6InBhc3Nwb3J0IiwieDV1IjoiaHR0cHM6Ly93d3cuZXhhbXBsZS5vcmcvY2VydC5jZXIifQ.eyJhdHRlc3QiOiJBIiwiZGVzdCI6eyJ0biI6WyIxMDAyIl19LCJpYXQiOjE1ODcwMTk4MjIsIm9yaWciOnsidG4iOiIxMDAxIn0sIm9yaWdpZCI6IjEyMzQ1NiJ9.4ybtWmgqdkNyJLS9Iv3PuJV8ZxR7yZ_NEBhCpKCEu2WBiTchqwoqoWpI17Q_ALm38tbnpay32t95ZY_LhSgwJg;info=<https://www.example.org/cert.cer>;ppt=shaken")
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
cfg := config.NewDefaultCGRConfig()
|
|
|
|
rply.Header.X5u = "https://raw.githubusercontent.com/cgrates/cgrates/master/data/stir/stir_pubkey.pem"
|
|
expectedErr := "crypto/ecdsa: verification error"
|
|
if err := rply.VerifySignature(cfg.GeneralCfg().ReplyTimeout); err == nil || err.Error() != expectedErr {
|
|
t.Errorf("Expected %+v, received %+v", expectedErr, err)
|
|
}
|
|
|
|
rply.Header.X5u = "Invalid_url"
|
|
expectedErr = "open Invalid_url: no such file or directory"
|
|
if err := rply.VerifySignature(cfg.GeneralCfg().ReplyTimeout); err == nil || err.Error() != expectedErr {
|
|
t.Errorf("Expected %+v, received %+v", expectedErr, err)
|
|
}
|
|
}
|
|
|
|
func TestAuthStirShaken(t *testing.T) {
|
|
if err := AuthStirShaken("", "1001", "", "1002", "", utils.NewStringSet([]string{utils.MetaAny}), -1); err == nil {
|
|
t.Error("Expected invalid identity")
|
|
}
|
|
if err := AuthStirShaken(
|
|
"eyJhbGciOiJFUzI1NiIsInBwdCI6InNoYWtlbiIsInR5cCI6InBhc3Nwb3J0IiwieDV1IjoiaHR0cHM6Ly93d3cuZXhhbXBsZS5vcmcvY2VydC5jZXIifQ.eyJhdHRlc3QiOiJBIiwiZGVzdCI6eyJ0biI6WyIxMDAyIl19LCJpYXQiOjE1ODcwMTk4MjIsIm9yaWciOnsidG4iOiIxMDAxIn0sIm9yaWdpZCI6IjEyMzQ1NiJ9.4ybtWmgqdkNyJLS9Iv3PuJV8ZxR7yZ_NEBhCpKCEu2WBiTchqwoqoWpI17Q_ALm38tbnpay32t95ZY_LhSgwJg;info=<https://www.example.org/cert.cer2>;ppt=shaken",
|
|
"1001", "", "1002", "", utils.NewStringSet([]string{utils.MetaAny}), -1); err == nil {
|
|
t.Error("Expected invalid identity")
|
|
}
|
|
if err := engine.Cache.Set(utils.CacheSTIR, "https://www.example.org/cert.cer", nil,
|
|
nil, true, utils.NonTransactional); err != nil {
|
|
t.Errorf("Expecting: nil, received: %s", err)
|
|
}
|
|
if err := AuthStirShaken(
|
|
"eyJhbGciOiJFUzI1NiIsInBwdCI6InNoYWtlbiIsInR5cCI6InBhc3Nwb3J0IiwieDV1IjoiaHR0cHM6Ly93d3cuZXhhbXBsZS5vcmcvY2VydC5jZXIifQ.eyJhdHRlc3QiOiJBIiwiZGVzdCI6eyJ0biI6WyIxMDAyIl19LCJpYXQiOjE1ODcwMTk4MjIsIm9yaWciOnsidG4iOiIxMDAxIn0sIm9yaWdpZCI6IjEyMzQ1NiJ9.4ybtWmgqdkNyJLS9Iv3PuJV8ZxR7yZ_NEBhCpKCEu2WBiTchqwoqoWpI17Q_ALm38tbnpay32t95ZY_LhSgwJg;info=<https://www.example.org/cert.cer>;ppt=shaken", "1001", "", "1002", "", utils.NewStringSet([]string{utils.MetaAny}), -1); err == nil {
|
|
t.Error("Expected invalid identity")
|
|
}
|
|
|
|
pubkeyBuf := []byte(`-----BEGIN PUBLIC KEY-----
|
|
MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAESt8sEh55Yc579vLHjFRWVQO27p4Y
|
|
aa+jqv4dwkr/FLEcN1zC76Y/IniI65fId55hVJvN3ORuzUqYEtzD3irmsw==
|
|
-----END PUBLIC KEY-----
|
|
`)
|
|
pubKey, err := jwt.ParseECPublicKeyFromPEM(pubkeyBuf)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if err := engine.Cache.Set(utils.CacheSTIR, "https://www.example.org/cert.cer", pubKey,
|
|
nil, true, utils.NonTransactional); err != nil {
|
|
t.Errorf("Expecting: nil, received: %s", err)
|
|
}
|
|
|
|
if err := AuthStirShaken(
|
|
"eyJhbGciOiJFUzI1NiIsInBwdCI6InNoYWtlbiIsInR5cCI6InBhc3Nwb3J0IiwieDV1IjoiaHR0cHM6Ly93d3cuZXhhbXBsZS5vcmcvY2VydC5jZXIifQ.eyJhdHRlc3QiOiJBIiwiZGVzdCI6eyJ0biI6WyIxMDAyIl19LCJpYXQiOjE1ODcwMTk4MjIsIm9yaWciOnsidG4iOiIxMDAxIn0sIm9yaWdpZCI6IjEyMzQ1NiJ9.4ybtWmgqdkNyJLS9Iv3PuJV8ZxR7yZ_NEBhCpKCEu2WBiTchqwoqoWpI17Q_ALm38tbnpay32t95ZY_LhSgwJg;info=<https://www.example.org/cert.cer>;ppt=shaken", "1001", "", "1003", "", utils.NewStringSet([]string{utils.MetaAny}), -1); err == nil {
|
|
t.Error("Expected invalid identity")
|
|
}
|
|
|
|
if err := AuthStirShaken(
|
|
"eyJhbGciOiJFUzI1NiIsInBwdCI6InNoYWtlbiIsInR5cCI6InBhc3Nwb3J0IiwieDV1IjoiaHR0cHM6Ly93d3cuZXhhbXBsZS5vcmcvY2VydC5jZXIifQ.eyJhdHRlc3QiOiJBIiwiZGVzdCI6eyJ0biI6WyIxMDAyIl19LCJpYXQiOjE1ODcwMTk4MjIsIm9yaWciOnsidG4iOiIxMDAxIn0sIm9yaWdpZCI6IjEyMzQ1NiJ9.4ybtWmgqdkNyJLS9Iv3PuJV8ZxR7yZ_NEBhCpKCEu2WBiTchqwoqoWpI17Q_ALm38tbnpay32t95ZY_LhSgwJg;info=<https://www.example.org/cert.cer>;ppt=shaken", "1001", "", "1002", "", utils.NewStringSet([]string{utils.MetaAny}), -1); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
func TestNewSTIRIdentityError(t *testing.T) {
|
|
rply, err := NewProcessedIdentity("eyJhbGciOiJFUzI1NiIsInBwdCI6InNoYWtlbiIsInR5cCI6InBhc3Nwb3J0IiwieDV1IjoiaHR0cHM6Ly93d3cuZXhhbXBsZS5vcmcvY2VydC5jZXIifQ.eyJhdHRlc3QiOiJBIiwiZGVzdCI6eyJ0biI6WyIxMDAyIl19LCJpYXQiOjE1ODcwMTk4MjIsIm9yaWciOnsidG4iOiIxMDAxIn0sIm9yaWdpZCI6IjEyMzQ1NiJ9.4ybtWmgqdkNyJLS9Iv3PuJV8ZxR7yZ_NEBhCpKCEu2WBiTchqwoqoWpI17Q_ALm38tbnpay32t95ZY_LhSgwJg;info=<https://www.example.org/cert.cer>;ppt=shaken")
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
|
|
if _, err := NewSTIRIdentity(rply.Header, rply.Payload, "https://raw.githubusercontent.com/cgrates/cgrates/master/data/stir/stir_privatekey.pem", -1); err != nil {
|
|
t.Error(err)
|
|
}
|
|
|
|
expectedErr := "http status error: 404"
|
|
if _, err := NewSTIRIdentity(rply.Header, rply.Payload, "https://raw.githubusercontent.com/cgrates/cgrates/master/data/stir/stir_privatekey.pe", -1); err == nil || err.Error() != expectedErr {
|
|
t.Errorf("Expected %+v, received %+v", expectedErr, err)
|
|
}
|
|
}
|
|
|
|
func TestNewIdentity(t *testing.T) {
|
|
payload := &utils.PASSporTPayload{
|
|
ATTest: "A",
|
|
Dest: utils.PASSporTDestinationsIdentity{Tn: []string{"1002"}},
|
|
IAT: 1587019822,
|
|
Orig: utils.PASSporTOriginsIdentity{Tn: "1001"},
|
|
OrigID: "123456",
|
|
}
|
|
header := utils.NewPASSporTHeader("https://www.example.org/cert.cer")
|
|
prvkeyBuf := []byte(`-----BEGIN EC PRIVATE KEY-----
|
|
MHcCAQEEIBIx2HW6dYy5S4wlJUY1J8VxO1un8xr4SHQlT7/UFkktoAoGCCqGSM49
|
|
AwEHoUQDQgAESt8sEh55Yc579vLHjFRWVQO27p4Yaa+jqv4dwkr/FLEcN1zC76Y/
|
|
IniI65fId55hVJvN3ORuzUqYEtzD3irmsw==
|
|
-----END EC PRIVATE KEY-----
|
|
`)
|
|
if err := engine.Cache.Set(utils.CacheSTIR, "https://www.example.org/private.pem", nil,
|
|
nil, true, utils.NonTransactional); err != nil {
|
|
t.Errorf("Expecting: nil, received: %s", err)
|
|
}
|
|
|
|
if _, err := NewSTIRIdentity(header, payload, "https://www.example.org/private.pem", time.Second); err == nil {
|
|
t.Error("Expected error when creating new identity")
|
|
}
|
|
|
|
prvKey, err := jwt.ParseECPrivateKeyFromPEM(prvkeyBuf)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
pubkeyBuf := []byte(`-----BEGIN PUBLIC KEY-----
|
|
MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAESt8sEh55Yc579vLHjFRWVQO27p4Y
|
|
aa+jqv4dwkr/FLEcN1zC76Y/IniI65fId55hVJvN3ORuzUqYEtzD3irmsw==
|
|
-----END PUBLIC KEY-----
|
|
`)
|
|
pubKey, err := jwt.ParseECPublicKeyFromPEM(pubkeyBuf)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if err := engine.Cache.Set(utils.CacheSTIR, "https://www.example.org/cert.cer", pubKey,
|
|
nil, true, utils.NonTransactional); err != nil {
|
|
t.Errorf("Expecting: nil, received: %s", err)
|
|
}
|
|
if err := engine.Cache.Set(utils.CacheSTIR, "https://www.example.org/private.pem", prvKey,
|
|
nil, true, utils.NonTransactional); err != nil {
|
|
t.Errorf("Expecting: nil, received: %s", err)
|
|
}
|
|
|
|
if rcv, err := NewSTIRIdentity(header, payload, "https://www.example.org/private.pem", time.Second); err != nil {
|
|
t.Error(err)
|
|
} else if err := AuthStirShaken(rcv, "1001", "", "1002", "", utils.NewStringSet([]string{utils.MetaAny}), -1); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
|
|
func TestGetDerivedEvents(t *testing.T) {
|
|
events := map[string]*utils.CGREvent{
|
|
utils.MetaRaw: {},
|
|
"DEFAULT": {},
|
|
}
|
|
if rply := getDerivedEvents(events, true); !reflect.DeepEqual(events, rply) {
|
|
t.Errorf("Expected %s received %s", utils.ToJSON(events), utils.ToJSON(rply))
|
|
}
|
|
exp := map[string]*utils.CGREvent{
|
|
utils.MetaRaw: events[utils.MetaRaw],
|
|
}
|
|
if rply := getDerivedEvents(events, false); !reflect.DeepEqual(exp, rply) {
|
|
t.Errorf("Expected %s received %s", utils.ToJSON(exp), utils.ToJSON(rply))
|
|
}
|
|
}
|
|
|
|
func TestGetDerivedMaxUsage(t *testing.T) {
|
|
max := map[string]time.Duration{
|
|
utils.MetaDefault: time.Second,
|
|
"CustomRoute": time.Hour,
|
|
}
|
|
|
|
exp := map[string]time.Duration{
|
|
utils.MetaRaw: time.Second,
|
|
utils.MetaDefault: time.Second,
|
|
"CustomRoute": time.Hour,
|
|
}
|
|
|
|
if rply := getDerivedMaxUsage(max, true); !reflect.DeepEqual(exp, rply) {
|
|
t.Errorf("Expected %s received %s", utils.ToJSON(exp), utils.ToJSON(rply))
|
|
}
|
|
|
|
exp = map[string]time.Duration{
|
|
utils.MetaRaw: time.Second,
|
|
}
|
|
if rply := getDerivedMaxUsage(max, false); !reflect.DeepEqual(exp, rply) {
|
|
t.Errorf("Expected %s received %s", utils.ToJSON(exp), utils.ToJSON(rply))
|
|
}
|
|
}
|
|
|
|
func TestBiRPCv1CapsError(t *testing.T) {
|
|
sessS := &SessionS{}
|
|
var ctx context.Context
|
|
var args any
|
|
var identity string
|
|
err := sessS.BiRPCv1CapsError(&ctx, args, &identity)
|
|
if err != utils.ErrMaxConcurrentRPCExceededNoCaps {
|
|
t.Fatalf("expected error %v, got %v", utils.ErrMaxConcurrentRPCExceededNoCaps, err)
|
|
}
|
|
}
|
|
|
|
func TestAsStoredSession(t *testing.T) {
|
|
session := &Session{
|
|
CGRID: "ID",
|
|
Tenant: "cgrates.org",
|
|
ResourceID: "resource",
|
|
ClientConnID: "ClientId",
|
|
DebitInterval: 5 * time.Minute,
|
|
Chargeable: true,
|
|
SRuns: []*SRun{
|
|
{},
|
|
},
|
|
UpdatedAt: time.Now(),
|
|
}
|
|
storedSession := session.asStoredSession()
|
|
if storedSession == nil {
|
|
t.Fatalf("expected StoredSession, got nil")
|
|
}
|
|
if storedSession.CGRID != session.CGRID {
|
|
t.Errorf("expected GRID %s, got %s", session.CGRID, storedSession.CGRID)
|
|
}
|
|
if storedSession.Tenant != session.Tenant {
|
|
t.Errorf("expected Tenant %s, got %s", session.Tenant, storedSession.Tenant)
|
|
}
|
|
if storedSession.ResourceID != session.ResourceID {
|
|
t.Errorf("expected ResourceID %s, got %s", session.ResourceID, storedSession.ResourceID)
|
|
}
|
|
if storedSession.ClientConnID != session.ClientConnID {
|
|
t.Errorf("expected ClientConnID %s, got %s", session.ClientConnID, storedSession.ClientConnID)
|
|
}
|
|
if storedSession.DebitInterval != session.DebitInterval {
|
|
t.Errorf("expected DebitInterval %v, got %v", session.DebitInterval, storedSession.DebitInterval)
|
|
}
|
|
if storedSession.Chargeable != session.Chargeable {
|
|
t.Errorf("expected Chargeable %v, got %v", session.Chargeable, storedSession.Chargeable)
|
|
}
|
|
if len(storedSession.SRuns) != len(session.SRuns) {
|
|
t.Errorf("expected %d SRuns, got %d", len(session.SRuns), len(storedSession.SRuns))
|
|
} else if len(storedSession.SRuns) > 0 {
|
|
sRun := session.SRuns[0]
|
|
storedSRun := storedSession.SRuns[0]
|
|
if storedSRun.CD != sRun.CD {
|
|
t.Errorf("expected CD %s, got %s", sRun.CD, storedSRun.CD)
|
|
}
|
|
if storedSRun.ExtraDuration != sRun.ExtraDuration {
|
|
t.Errorf("expected ExtraDuration %v, got %v", sRun.ExtraDuration, storedSRun.ExtraDuration)
|
|
}
|
|
if storedSRun.TotalUsage != sRun.TotalUsage {
|
|
t.Errorf("expected TotalUsage %d, got %d", sRun.TotalUsage, storedSRun.TotalUsage)
|
|
}
|
|
}
|
|
if !storedSession.UpdatedAt.Equal(session.UpdatedAt) {
|
|
t.Errorf("expected UpdatedAt %v, got %v", session.UpdatedAt, storedSession.UpdatedAt)
|
|
}
|
|
}
|
|
|
|
func TestNewSessionFromStoredSession(t *testing.T) {
|
|
storedSession := &engine.StoredSession{
|
|
CGRID: "ID",
|
|
Tenant: "cgrates.org",
|
|
ResourceID: "resource",
|
|
ClientConnID: "clientID",
|
|
DebitInterval: 5 * time.Minute,
|
|
Chargeable: true,
|
|
}
|
|
session := newSessionFromStoredSession(storedSession)
|
|
if session == nil {
|
|
t.Fatalf("expected Session, got nil")
|
|
}
|
|
if session.CGRID != storedSession.CGRID {
|
|
t.Errorf("expected GRID %s, got %s", storedSession.CGRID, session.CGRID)
|
|
}
|
|
if session.Tenant != storedSession.Tenant {
|
|
t.Errorf("expected Tenant %s, got %s", storedSession.Tenant, session.Tenant)
|
|
}
|
|
if session.ResourceID != storedSession.ResourceID {
|
|
t.Errorf("expected ResourceID %s, got %s", storedSession.ResourceID, session.ResourceID)
|
|
}
|
|
if session.ClientConnID != storedSession.ClientConnID {
|
|
t.Errorf("expected ClientConnID %s, got %s", storedSession.ClientConnID, session.ClientConnID)
|
|
}
|
|
if session.DebitInterval != storedSession.DebitInterval {
|
|
t.Errorf("expected DebitInterval %v, got %v", storedSession.DebitInterval, session.DebitInterval)
|
|
}
|
|
if session.Chargeable != storedSession.Chargeable {
|
|
t.Errorf("expected Chargeable %v, got %v", storedSession.Chargeable, session.Chargeable)
|
|
}
|
|
if len(session.SRuns) != len(storedSession.SRuns) {
|
|
t.Errorf("expected %d SRuns, got %d", len(storedSession.SRuns), len(session.SRuns))
|
|
} else if len(session.SRuns) > 0 {
|
|
storedSRun := storedSession.SRuns[0]
|
|
sRun := session.SRuns[0]
|
|
if sRun.CD != storedSRun.CD {
|
|
t.Errorf("expected CD %s, got %s", storedSRun.CD, sRun.CD)
|
|
}
|
|
if sRun.ExtraDuration != storedSRun.ExtraDuration {
|
|
t.Errorf("expected ExtraDuration %v, got %v", storedSRun.ExtraDuration, sRun.ExtraDuration)
|
|
}
|
|
if sRun.TotalUsage != storedSRun.TotalUsage {
|
|
t.Errorf("expected TotalUsage %d, got %d", storedSRun.TotalUsage, sRun.TotalUsage)
|
|
}
|
|
}
|
|
if !session.UpdatedAt.Equal(storedSession.UpdatedAt) {
|
|
t.Errorf("expected UpdatedAt %v, got %v", storedSession.UpdatedAt, session.UpdatedAt)
|
|
}
|
|
}
|