/** * Copyright (C) 2009-2012 Typesafe Inc. */ /*package akka.remote import akka.testkit._ import akka.actor._ import com.typesafe.config._ import akka.dispatch.{ Await, Future } import akka.pattern.ask import java.io.File import java.security.{ SecureRandom, PrivilegedAction, AccessController } import netty.NettySSLSupport import akka.event.{ NoLogging, LoggingAdapter } object Configuration { // set this in your JAVA_OPTS to see all ssl debug info: "-Djavax.net.debug=ssl,keymanager" // The certificate will expire in 2109 private val trustStore = getPath("truststore") private val keyStore = getPath("keystore") private def getPath(name: String): String = (new File("akka-remote/src/test/resources/" + name)).getAbsolutePath.replace("\\", "\\\\") private val conf = """ akka { actor.provider = "akka.remote.RemoteActorRefProvider" remote.netty { hostname = localhost port = 12345 ssl { enable = on trust-store = "%s" key-store = "%s" random-number-generator = "%s" supported-algorithms = [%s] } } actor.deployment { /blub.remote = "akka://remote-sys@localhost:12346" /looker/child.remote = "akka://remote-sys@localhost:12346" /looker/child/grandchild.remote = "akka://Ticket1978CommunicationSpec@localhost:12345" } } """ def getCipherConfig(cipher: String, enabled: String*): (String, Boolean, Config) = if (try { NettySSLSupport.initialiseCustomSecureRandom(Some(cipher), None, NoLogging) ne null } catch { case _: IllegalArgumentException ⇒ false // Cannot match against the message since the message might be localized :S case _: java.security.NoSuchAlgorithmException ⇒ false }) (cipher, true, ConfigFactory.parseString(conf.format(trustStore, keyStore, cipher, enabled.mkString(", ")))) else (cipher, false, AkkaSpec.testConf) } import Configuration.getCipherConfig @org.junit.runner.RunWith(classOf[org.scalatest.junit.JUnitRunner]) class Ticket1978SHA1PRNGSpec extends Ticket1978CommunicationSpec(getCipherConfig("SHA1PRNG", "TLS_RSA_WITH_AES_128_CBC_SHA")) @org.junit.runner.RunWith(classOf[org.scalatest.junit.JUnitRunner]) class Ticket1978AES128CounterRNGFastSpec extends Ticket1978CommunicationSpec(getCipherConfig("AES128CounterRNGFast", "TLS_RSA_WITH_AES_128_CBC_SHA", "TLS_RSA_WITH_AES_256_CBC_SHA")) /** * Both of the Secure variants require access to the Internet to access random.org. */ @org.junit.runner.RunWith(classOf[org.scalatest.junit.JUnitRunner]) class Ticket1978AES128CounterRNGSecureSpec extends Ticket1978CommunicationSpec(getCipherConfig("AES128CounterRNGSecure", "TLS_RSA_WITH_AES_128_CBC_SHA")) /** * Both of the Secure variants require access to the Internet to access random.org. */ @org.junit.runner.RunWith(classOf[org.scalatest.junit.JUnitRunner]) class Ticket1978AES256CounterRNGSecureSpec extends Ticket1978CommunicationSpec(getCipherConfig("AES256CounterRNGSecure", "TLS_RSA_WITH_AES_256_CBC_SHA")) @org.junit.runner.RunWith(classOf[org.scalatest.junit.JUnitRunner]) class Ticket1978DefaultRNGSecureSpec extends Ticket1978CommunicationSpec(getCipherConfig("", "TLS_RSA_WITH_AES_128_CBC_SHA")) @org.junit.runner.RunWith(classOf[org.scalatest.junit.JUnitRunner]) class Ticket1978NonExistingRNGSecureSpec extends Ticket1978CommunicationSpec(("NonExistingRNG", false, AkkaSpec.testConf)) abstract class Ticket1978CommunicationSpec(val cipherEnabledconfig: (String, Boolean, Config)) extends AkkaSpec(cipherEnabledconfig._3) with ImplicitSender with DefaultTimeout { import RemoteCommunicationSpec._ val conf = ConfigFactory.parseString("akka.remote.netty.port=12346").withFallback(system.settings.config) val other = ActorSystem("remote-sys", conf) val remote = other.actorOf(Props(new Actor { def receive = { case "ping" ⇒ sender ! (("pong", sender)) } }), "echo") val here = system.actorFor("akka://remote-sys@localhost:12346/user/echo") override def atTermination() { other.shutdown() } "SSL Remoting" must { if (cipherEnabledconfig._2) { "support remote look-ups" in { here ! "ping" expectMsgPF() { case ("pong", s: AnyRef) if s eq testActor ⇒ true } } "send error message for wrong address" in { EventFilter.error(start = "dropping", occurrences = 1).intercept { system.actorFor("akka://remotesys@localhost:12346/user/echo") ! "ping" }(other) } "support ask" in { Await.result(here ? "ping", timeout.duration) match { case ("pong", s: akka.pattern.PromiseActorRef) ⇒ // good case m ⇒ fail(m + " was not (pong, AskActorRef)") } } "send dead letters on remote if actor does not exist" in { EventFilter.warning(pattern = "dead.*buh", occurrences = 1).intercept { system.actorFor("akka://remote-sys@localhost:12346/does/not/exist") ! "buh" }(other) } "create and supervise children on remote node" in { val r = system.actorOf(Props[Echo], "blub") r.path.toString must be === "akka://remote-sys@localhost:12346/remote/Ticket1978CommunicationSpec@localhost:12345/user/blub" r ! 42 expectMsg(42) EventFilter[Exception]("crash", occurrences = 1).intercept { r ! new Exception("crash") }(other) expectMsg("preRestart") r ! 42 expectMsg(42) system.stop(r) expectMsg("postStop") } "look-up actors across node boundaries" in { val l = system.actorOf(Props(new Actor { def receive = { case (p: Props, n: String) ⇒ sender ! context.actorOf(p, n) case s: String ⇒ sender ! context.actorFor(s) } }), "looker") l ! (Props[Echo], "child") val r = expectMsgType[ActorRef] r ! (Props[Echo], "grandchild") val remref = expectMsgType[ActorRef] remref.isInstanceOf[LocalActorRef] must be(true) val myref = system.actorFor(system / "looker" / "child" / "grandchild") myref.isInstanceOf[RemoteActorRef] must be(true) myref ! 43 expectMsg(43) lastSender must be theSameInstanceAs remref r.asInstanceOf[RemoteActorRef].getParent must be(l) system.actorFor("/user/looker/child") must be theSameInstanceAs r Await.result(l ? "child/..", timeout.duration).asInstanceOf[AnyRef] must be theSameInstanceAs l Await.result(system.actorFor(system / "looker" / "child") ? "..", timeout.duration).asInstanceOf[AnyRef] must be theSameInstanceAs l } "not fail ask across node boundaries" in { val f = for (_ ← 1 to 1000) yield here ? "ping" mapTo manifest[(String, ActorRef)] Await.result(Future.sequence(f), remaining).map(_._1).toSet must be(Set("pong")) } } else { "not be run when the cipher is not supported by the platform this test is currently being executed on" ignore { } } } }*/