func sendCEA(w io.Writer, m *diam.Message, OriginStateID, AcctApplicationID *diam.AVP) (n int64, err error) { m.NewAVP(avp.OriginHost, avp.Mbit, 0, datatype.OctetString("srv")) m.NewAVP(avp.OriginRealm, avp.Mbit, 0, datatype.OctetString("localhost")) m.NewAVP(avp.HostIPAddress, avp.Mbit, 0, datatype.Address(net.ParseIP("127.0.0.1"))) m.NewAVP(avp.VendorID, avp.Mbit, 0, datatype.Unsigned32(99)) m.NewAVP(avp.ProductName, avp.Mbit, 0, datatype.UTF8String("go-diameter")) m.AddAVP(OriginStateID) m.AddAVP(AcctApplicationID) return m.WriteTo(w) }
// AsBareDiameterMessage converts CCA into a bare DiameterMessage func (self *CCA) AsBareDiameterMessage() *diam.Message { var m diam.Message utils.Clone(self.diamMessage, &m) m.NewAVP(avp.SessionID, avp.Mbit, 0, datatype.UTF8String(self.SessionId)) m.NewAVP(avp.OriginHost, avp.Mbit, 0, datatype.DiameterIdentity(self.OriginHost)) m.NewAVP(avp.OriginRealm, avp.Mbit, 0, datatype.DiameterIdentity(self.OriginRealm)) m.NewAVP(avp.AuthApplicationID, avp.Mbit, 0, datatype.Unsigned32(self.AuthApplicationId)) m.NewAVP(avp.CCRequestType, avp.Mbit, 0, datatype.Enumerated(self.CCRequestType)) m.NewAVP(avp.CCRequestNumber, avp.Mbit, 0, datatype.Enumerated(self.CCRequestNumber)) m.NewAVP(avp.ResultCode, avp.Mbit, 0, datatype.Unsigned32(self.ResultCode)) return &m }
// errorCEA sends an error answer indicating that the CER failed due to // an unsupported (acct/auth) application, and includes the AVP that // caused the failure in the message. func errorCEA(sm *StateMachine, c diam.Conn, m *diam.Message, cer *smparser.CER, failedAVP *diam.AVP) error { hostIP, _, err := net.SplitHostPort(c.LocalAddr().String()) if err != nil { return fmt.Errorf("failed to parse own ip %q: %s", c.LocalAddr(), err) } var a *diam.Message if failedAVP == cer.InbandSecurityID { a = m.Answer(diam.NoCommonSecurity) } else { a = m.Answer(diam.NoCommonApplication) } a.Header.CommandFlags |= diam.ErrorFlag a.NewAVP(avp.OriginHost, avp.Mbit, 0, sm.cfg.OriginHost) a.NewAVP(avp.OriginRealm, avp.Mbit, 0, sm.cfg.OriginRealm) a.NewAVP(avp.HostIPAddress, avp.Mbit, 0, datatype.Address(net.ParseIP(hostIP))) a.NewAVP(avp.VendorID, avp.Mbit, 0, sm.cfg.VendorID) a.NewAVP(avp.ProductName, 0, 0, sm.cfg.ProductName) if cer.OriginStateID != nil { a.AddAVP(cer.OriginStateID) } a.NewAVP(avp.FailedAVP, avp.Mbit, 0, &diam.GroupedAVP{ AVP: []*diam.AVP{failedAVP}, }) if sm.cfg.FirmwareRevision != 0 { a.NewAVP(avp.FirmwareRevision, avp.Mbit, 0, sm.cfg.FirmwareRevision) } _, err = a.WriteTo(c) return err }
func sendACR(c diam.Conn, cfg *sm.Settings, n int) { // Get this client's metadata from the connection object, // which is set by the state machine after the handshake. // It contains the peer's Origin-Host and Realm from the // CER/CEA handshake. We use it to populate the AVPs below. meta, ok := smpeer.FromContext(c.Context()) if !ok { log.Fatal("Client connection does not contain metadata") } var err error var m *diam.Message for i := 0; i < n; i++ { m = diam.NewRequest(diam.Accounting, 0, c.Dictionary()) m.NewAVP(avp.SessionID, avp.Mbit, 0, datatype.UTF8String(strconv.Itoa(i))) m.NewAVP(avp.OriginHost, avp.Mbit, 0, cfg.OriginHost) m.NewAVP(avp.OriginRealm, avp.Mbit, 0, cfg.OriginRealm) m.NewAVP(avp.DestinationRealm, avp.Mbit, 0, meta.OriginRealm) m.NewAVP(avp.AccountingRecordType, avp.Mbit, 0, eventRecord) m.NewAVP(avp.AccountingRecordNumber, avp.Mbit, 0, datatype.Unsigned32(i)) m.NewAVP(avp.DestinationHost, avp.Mbit, 0, meta.OriginHost) if _, err = m.WriteTo(c); err != nil { log.Fatal(err) } } }