2012-09-12 11:18:42 +02:00
|
|
|
/**
|
2013-01-09 01:47:48 +01:00
|
|
|
* Copyright (C) 2009-2013 Typesafe Inc. <http://www.typesafe.com>
|
2012-09-12 11:18:42 +02:00
|
|
|
*/
|
|
|
|
|
package akka.remote
|
|
|
|
|
|
|
|
|
|
import akka.actor._
|
|
|
|
|
import akka.pattern.ask
|
|
|
|
|
import akka.testkit._
|
|
|
|
|
import com.typesafe.config._
|
|
|
|
|
import scala.concurrent.Await
|
|
|
|
|
import scala.concurrent.Future
|
|
|
|
|
import scala.concurrent.duration._
|
|
|
|
|
import akka.remote.transport.AssociationRegistry
|
|
|
|
|
|
|
|
|
|
object RemotingSpec {
|
2013-01-25 15:03:52 +01:00
|
|
|
class Echo1 extends Actor {
|
2012-09-12 11:18:42 +02:00
|
|
|
var target: ActorRef = context.system.deadLetters
|
|
|
|
|
|
|
|
|
|
def receive = {
|
2013-01-25 15:03:52 +01:00
|
|
|
case (p: Props, n: String) ⇒ sender ! context.actorOf(Props[Echo1], n)
|
2012-09-12 11:18:42 +02:00
|
|
|
case ex: Exception ⇒ throw ex
|
|
|
|
|
case s: String ⇒ sender ! context.actorFor(s)
|
|
|
|
|
case x ⇒ target = sender; sender ! x
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
override def preStart() {}
|
|
|
|
|
override def preRestart(cause: Throwable, msg: Option[Any]) {
|
|
|
|
|
target ! "preRestart"
|
|
|
|
|
}
|
|
|
|
|
override def postRestart(cause: Throwable) {}
|
|
|
|
|
override def postStop() {
|
|
|
|
|
target ! "postStop"
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2013-01-25 15:03:52 +01:00
|
|
|
class Echo2 extends Actor {
|
|
|
|
|
def receive = {
|
|
|
|
|
case "ping" ⇒ sender ! (("pong", sender))
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2012-09-12 11:18:42 +02:00
|
|
|
val cfg: Config = ConfigFactory parseString ("""
|
|
|
|
|
common-ssl-settings {
|
|
|
|
|
key-store = "%s"
|
|
|
|
|
trust-store = "%s"
|
|
|
|
|
key-store-password = "changeme"
|
|
|
|
|
trust-store-password = "changeme"
|
|
|
|
|
protocol = "TLSv1"
|
|
|
|
|
random-number-generator = "AES128CounterSecureRNG"
|
|
|
|
|
enabled-algorithms = [TLS_RSA_WITH_AES_128_CBC_SHA]
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
akka {
|
|
|
|
|
actor.provider = "akka.remote.RemoteActorRefProvider"
|
|
|
|
|
remote.transport = "akka.remote.Remoting"
|
|
|
|
|
|
2013-01-17 16:19:31 +01:00
|
|
|
remote.retry-latch-closed-for = 1 s
|
|
|
|
|
remote.log-remote-lifecycle-events = on
|
2013-01-24 14:30:37 +01:00
|
|
|
|
2013-01-17 16:19:31 +01:00
|
|
|
remote.enabled-transports = [
|
|
|
|
|
"akka.remote.test",
|
|
|
|
|
"akka.remote.netty.tcp",
|
|
|
|
|
"akka.remote.netty.udp",
|
|
|
|
|
"akka.remote.netty.ssl"
|
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
remote.netty.tcp.port = 0
|
2013-01-24 14:30:37 +01:00
|
|
|
remote.netty.tcp.hostname = "localhost"
|
2013-01-17 16:19:31 +01:00
|
|
|
remote.netty.udp.port = 0
|
2013-01-24 14:30:37 +01:00
|
|
|
remote.netty.udp.hostname = "localhost"
|
2013-01-17 16:19:31 +01:00
|
|
|
remote.netty.ssl.port = 0
|
2013-01-24 14:30:37 +01:00
|
|
|
remote.netty.ssl.hostname = "localhost"
|
2013-02-11 13:33:21 +01:00
|
|
|
remote.netty.ssl.security = ${common-ssl-settings}
|
2013-01-17 16:19:31 +01:00
|
|
|
|
|
|
|
|
remote.test {
|
2012-09-12 11:18:42 +02:00
|
|
|
transport-class = "akka.remote.transport.TestTransport"
|
2012-11-23 10:15:19 +01:00
|
|
|
applied-adapters = []
|
|
|
|
|
registry-key = aX33k0jWKg
|
|
|
|
|
local-address = "test://RemotingSpec@localhost:12345"
|
|
|
|
|
maximum-payload-bytes = 32000 bytes
|
|
|
|
|
scheme-identifier = test
|
|
|
|
|
}
|
2012-09-12 11:18:42 +02:00
|
|
|
|
|
|
|
|
actor.deployment {
|
2013-01-24 04:28:21 -08:00
|
|
|
/blub.remote = "akka.test://remote-sys@localhost:12346"
|
|
|
|
|
/looker/child.remote = "akka.test://remote-sys@localhost:12346"
|
|
|
|
|
/looker/child/grandchild.remote = "akka.test://RemotingSpec@localhost:12345"
|
2012-09-12 11:18:42 +02:00
|
|
|
}
|
|
|
|
|
}
|
2013-01-17 16:19:31 +01:00
|
|
|
""".format(
|
2012-09-12 11:18:42 +02:00
|
|
|
getClass.getClassLoader.getResource("keystore").getPath,
|
|
|
|
|
getClass.getClassLoader.getResource("truststore").getPath))
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@org.junit.runner.RunWith(classOf[org.scalatest.junit.JUnitRunner])
|
|
|
|
|
class RemotingSpec extends AkkaSpec(RemotingSpec.cfg) with ImplicitSender with DefaultTimeout {
|
|
|
|
|
|
|
|
|
|
import RemotingSpec._
|
|
|
|
|
|
|
|
|
|
val conf = ConfigFactory.parseString(
|
|
|
|
|
"""
|
2013-01-17 16:19:31 +01:00
|
|
|
akka.remote {
|
2012-11-23 10:15:19 +01:00
|
|
|
test.local-address = "test://remote-sys@localhost:12346"
|
|
|
|
|
}
|
2012-09-12 11:18:42 +02:00
|
|
|
""").withFallback(system.settings.config).resolve()
|
|
|
|
|
val other = ActorSystem("remote-sys", conf)
|
|
|
|
|
|
2013-01-03 12:29:30 +01:00
|
|
|
for (
|
|
|
|
|
(name, proto) ← Seq(
|
|
|
|
|
"/gonk" -> "tcp",
|
|
|
|
|
"/zagzag" -> "udp",
|
2013-01-24 04:28:21 -08:00
|
|
|
"/roghtaar" -> "ssl.tcp")
|
2013-01-03 12:29:30 +01:00
|
|
|
) deploy(system, Deploy(name, scope = RemoteScope(addr(other, proto))))
|
|
|
|
|
|
|
|
|
|
def addr(sys: ActorSystem, proto: String) =
|
2013-01-24 04:28:21 -08:00
|
|
|
sys.asInstanceOf[ExtendedActorSystem].provider.getExternalAddressFor(Address(s"akka.$proto", "", "", 0)).get
|
2013-01-03 12:29:30 +01:00
|
|
|
def port(sys: ActorSystem, proto: String) = addr(sys, proto).port.get
|
|
|
|
|
def deploy(sys: ActorSystem, d: Deploy) {
|
|
|
|
|
sys.asInstanceOf[ExtendedActorSystem].provider.asInstanceOf[RemoteActorRefProvider].deployer.deploy(d)
|
|
|
|
|
}
|
|
|
|
|
|
2013-01-25 15:03:52 +01:00
|
|
|
val remote = other.actorOf(Props[Echo2], "echo")
|
2012-09-12 11:18:42 +02:00
|
|
|
|
2013-01-24 04:28:21 -08:00
|
|
|
val here = system.actorFor("akka.test://remote-sys@localhost:12346/user/echo")
|
2012-09-12 11:18:42 +02:00
|
|
|
|
2013-01-03 17:17:12 +01:00
|
|
|
override def afterTermination() {
|
2012-09-12 11:18:42 +02:00
|
|
|
other.shutdown()
|
|
|
|
|
AssociationRegistry.clear()
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
"Remoting" must {
|
|
|
|
|
|
|
|
|
|
"support remote look-ups" in {
|
|
|
|
|
here ! "ping"
|
2012-11-23 10:15:19 +01:00
|
|
|
expectMsg(("pong", testActor))
|
2012-09-12 11:18:42 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
"send error message for wrong address" in {
|
2013-01-03 12:29:30 +01:00
|
|
|
filterEvents(EventFilter[EndpointException](occurrences = 6), EventFilter.error(start = "Association", occurrences = 6)) {
|
2013-01-24 04:28:21 -08:00
|
|
|
system.actorFor("akka.test://nonexistingsystem@localhost:12346/user/echo") ! "ping"
|
2012-09-12 11:18:42 +02:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
"support ask" in {
|
|
|
|
|
Await.result(here ? "ping", timeout.duration) match {
|
|
|
|
|
case ("pong", s: akka.pattern.PromiseActorRef) ⇒ // good
|
|
|
|
|
case m ⇒ fail(m + " was not (pong, AskActorRef)")
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
"send dead letters on remote if actor does not exist" in {
|
|
|
|
|
EventFilter.warning(pattern = "dead.*buh", occurrences = 1).intercept {
|
2013-01-24 04:28:21 -08:00
|
|
|
system.actorFor("akka.test://remote-sys@localhost:12346/does/not/exist") ! "buh"
|
2012-09-12 11:18:42 +02:00
|
|
|
}(other)
|
|
|
|
|
}
|
|
|
|
|
|
2013-01-25 15:03:52 +01:00
|
|
|
"not be exhausted by sending to broken connections" in {
|
|
|
|
|
val moreSystems = Vector.fill(10)(ActorSystem(other.name, other.settings.config))
|
|
|
|
|
moreSystems foreach (_.actorOf(Props[Echo2], name = "echo"))
|
|
|
|
|
val moreRefs = moreSystems map (sys ⇒ system.actorFor(RootActorPath(addr(sys, "tcp")) / "user" / "echo"))
|
|
|
|
|
val aliveEcho = system.actorFor(RootActorPath(addr(other, "tcp")) / "user" / "echo")
|
|
|
|
|
val n = 100
|
|
|
|
|
|
|
|
|
|
// first everything is up and running
|
|
|
|
|
1 to n foreach { x ⇒
|
|
|
|
|
aliveEcho ! "ping"
|
|
|
|
|
moreRefs(x % moreSystems.size) ! "ping"
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
within(5.seconds) {
|
|
|
|
|
receiveN(n * 2) foreach { reply ⇒ reply must be(("pong", testActor)) }
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// then we shutdown all but one system to simulate broken connections
|
|
|
|
|
moreSystems foreach { sys ⇒
|
|
|
|
|
sys.shutdown()
|
|
|
|
|
sys.awaitTermination(5.seconds.dilated)
|
|
|
|
|
sys.isTerminated must be(true)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
1 to n foreach { x ⇒
|
|
|
|
|
aliveEcho ! "ping"
|
|
|
|
|
moreRefs(x % moreSystems.size) ! "ping"
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// ping messages to aliveEcho should go through even though we use many different broken connections
|
|
|
|
|
within(5.seconds) {
|
|
|
|
|
receiveN(n) foreach { reply ⇒ reply must be(("pong", testActor)) }
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2012-09-12 11:18:42 +02:00
|
|
|
"create and supervise children on remote node" in {
|
2013-01-25 15:03:52 +01:00
|
|
|
val r = system.actorOf(Props[Echo1], "blub")
|
2013-01-24 04:28:21 -08:00
|
|
|
r.path.toString must be === "akka.test://remote-sys@localhost:12346/remote/akka.test/RemotingSpec@localhost:12345/user/blub"
|
2012-09-12 11:18:42 +02:00
|
|
|
r ! 42
|
|
|
|
|
expectMsg(42)
|
|
|
|
|
EventFilter[Exception]("crash", occurrences = 1).intercept {
|
|
|
|
|
r ! new Exception("crash")
|
|
|
|
|
}(other)
|
|
|
|
|
expectMsg("preRestart")
|
|
|
|
|
r ! 42
|
|
|
|
|
expectMsg(42)
|
|
|
|
|
system.stop(r)
|
|
|
|
|
expectMsg("postStop")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
"look-up actors across node boundaries" in {
|
|
|
|
|
val l = system.actorOf(Props(new Actor {
|
|
|
|
|
def receive = {
|
|
|
|
|
case (p: Props, n: String) ⇒ sender ! context.actorOf(p, n)
|
|
|
|
|
case s: String ⇒ sender ! context.actorFor(s)
|
|
|
|
|
}
|
|
|
|
|
}), "looker")
|
2013-01-25 15:03:52 +01:00
|
|
|
l ! (Props[Echo1], "child")
|
2012-09-12 11:18:42 +02:00
|
|
|
val r = expectMsgType[ActorRef]
|
2013-01-25 15:03:52 +01:00
|
|
|
r ! (Props[Echo1], "grandchild")
|
2012-09-12 11:18:42 +02:00
|
|
|
val remref = expectMsgType[ActorRef]
|
|
|
|
|
remref.asInstanceOf[ActorRefScope].isLocal must be(true)
|
|
|
|
|
val myref = system.actorFor(system / "looker" / "child" / "grandchild")
|
|
|
|
|
myref.isInstanceOf[RemoteActorRef] must be(true)
|
|
|
|
|
myref ! 43
|
|
|
|
|
expectMsg(43)
|
|
|
|
|
lastSender must be theSameInstanceAs remref
|
|
|
|
|
r.asInstanceOf[RemoteActorRef].getParent must be(l)
|
|
|
|
|
system.actorFor("/user/looker/child") must be theSameInstanceAs r
|
|
|
|
|
Await.result(l ? "child/..", timeout.duration).asInstanceOf[AnyRef] must be theSameInstanceAs l
|
|
|
|
|
Await.result(system.actorFor(system / "looker" / "child") ? "..", timeout.duration).asInstanceOf[AnyRef] must be theSameInstanceAs l
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
"not fail ask across node boundaries" in {
|
|
|
|
|
import system.dispatcher
|
|
|
|
|
val f = for (_ ← 1 to 1000) yield here ? "ping" mapTo manifest[(String, ActorRef)]
|
|
|
|
|
Await.result(Future.sequence(f), remaining).map(_._1).toSet must be(Set("pong"))
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
"be able to use multiple transports and use the appropriate one (TCP)" in {
|
2013-01-25 15:03:52 +01:00
|
|
|
val r = system.actorOf(Props[Echo1], "gonk")
|
2013-01-03 12:29:30 +01:00
|
|
|
r.path.toString must be ===
|
2013-01-24 04:28:21 -08:00
|
|
|
s"akka.tcp://remote-sys@localhost:${port(other, "tcp")}/remote/akka.tcp/RemotingSpec@localhost:${port(system, "tcp")}/user/gonk"
|
2012-09-12 11:18:42 +02:00
|
|
|
r ! 42
|
|
|
|
|
expectMsg(42)
|
|
|
|
|
EventFilter[Exception]("crash", occurrences = 1).intercept {
|
|
|
|
|
r ! new Exception("crash")
|
|
|
|
|
}(other)
|
|
|
|
|
expectMsg("preRestart")
|
|
|
|
|
r ! 42
|
|
|
|
|
expectMsg(42)
|
|
|
|
|
system.stop(r)
|
|
|
|
|
expectMsg("postStop")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
"be able to use multiple transports and use the appropriate one (UDP)" in {
|
2013-01-25 15:03:52 +01:00
|
|
|
val r = system.actorOf(Props[Echo1], "zagzag")
|
2013-01-03 12:29:30 +01:00
|
|
|
r.path.toString must be ===
|
2013-01-24 04:28:21 -08:00
|
|
|
s"akka.udp://remote-sys@localhost:${port(other, "udp")}/remote/akka.udp/RemotingSpec@localhost:${port(system, "udp")}/user/zagzag"
|
2012-09-12 11:18:42 +02:00
|
|
|
r ! 42
|
2013-01-03 12:33:09 +01:00
|
|
|
expectMsg(10.seconds, 42)
|
2012-09-12 11:18:42 +02:00
|
|
|
EventFilter[Exception]("crash", occurrences = 1).intercept {
|
|
|
|
|
r ! new Exception("crash")
|
|
|
|
|
}(other)
|
|
|
|
|
expectMsg("preRestart")
|
|
|
|
|
r ! 42
|
|
|
|
|
expectMsg(42)
|
|
|
|
|
system.stop(r)
|
|
|
|
|
expectMsg("postStop")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
"be able to use multiple transports and use the appropriate one (SSL)" in {
|
2013-01-25 15:03:52 +01:00
|
|
|
val r = system.actorOf(Props[Echo1], "roghtaar")
|
2013-01-03 12:29:30 +01:00
|
|
|
r.path.toString must be ===
|
2013-01-24 04:28:21 -08:00
|
|
|
s"akka.ssl.tcp://remote-sys@localhost:${port(other, "ssl.tcp")}/remote/akka.ssl.tcp/RemotingSpec@localhost:${port(system, "ssl.tcp")}/user/roghtaar"
|
2012-09-12 11:18:42 +02:00
|
|
|
r ! 42
|
2013-01-03 12:33:09 +01:00
|
|
|
expectMsg(10.seconds, 42)
|
2012-09-12 11:18:42 +02:00
|
|
|
EventFilter[Exception]("crash", occurrences = 1).intercept {
|
|
|
|
|
r ! new Exception("crash")
|
|
|
|
|
}(other)
|
|
|
|
|
expectMsg("preRestart")
|
|
|
|
|
r ! 42
|
|
|
|
|
expectMsg(42)
|
|
|
|
|
system.stop(r)
|
|
|
|
|
expectMsg("postStop")
|
|
|
|
|
}
|
|
|
|
|
|
2013-01-03 16:38:18 +01:00
|
|
|
}
|
2013-01-03 12:29:30 +01:00
|
|
|
|
2013-01-03 16:38:18 +01:00
|
|
|
override def beforeTermination() {
|
|
|
|
|
system.eventStream.publish(TestEvent.Mute(
|
|
|
|
|
EventFilter.warning(pattern = "received dead letter.*(InboundPayload|Disassociate)")))
|
|
|
|
|
other.eventStream.publish(TestEvent.Mute(
|
|
|
|
|
EventFilter[EndpointException](),
|
|
|
|
|
EventFilter.error(start = "AssociationError"),
|
|
|
|
|
EventFilter.warning(pattern = "received dead letter.*(InboundPayload|Disassociate|HandleListener)")))
|
2012-09-12 11:18:42 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
}
|