Bob zhou

[ONOS-4426] Upgrade Vtn Module when access same network segment

Change-Id: Id0d00e9d0e93d1baf4ff20560469316fee5a3186
...@@ -18,6 +18,7 @@ package org.onosproject.vtn.manager.impl; ...@@ -18,6 +18,7 @@ package org.onosproject.vtn.manager.impl;
18 import static org.onosproject.net.flow.instructions.ExtensionTreatmentType.ExtensionTreatmentTypes.NICIRA_SET_TUNNEL_DST; 18 import static org.onosproject.net.flow.instructions.ExtensionTreatmentType.ExtensionTreatmentTypes.NICIRA_SET_TUNNEL_DST;
19 import static org.slf4j.LoggerFactory.getLogger; 19 import static org.slf4j.LoggerFactory.getLogger;
20 20
21 +import java.nio.ByteBuffer;
21 import java.util.ArrayList; 22 import java.util.ArrayList;
22 import java.util.Arrays; 23 import java.util.Arrays;
23 import java.util.Collection; 24 import java.util.Collection;
...@@ -27,6 +28,7 @@ import java.util.Iterator; ...@@ -27,6 +28,7 @@ import java.util.Iterator;
27 import java.util.List; 28 import java.util.List;
28 import java.util.Map; 29 import java.util.Map;
29 import java.util.Set; 30 import java.util.Set;
31 +import java.util.UUID;
30 import java.util.concurrent.ConcurrentHashMap; 32 import java.util.concurrent.ConcurrentHashMap;
31 import java.util.stream.Collectors; 33 import java.util.stream.Collectors;
32 34
...@@ -36,14 +38,19 @@ import org.apache.felix.scr.annotations.Deactivate; ...@@ -36,14 +38,19 @@ import org.apache.felix.scr.annotations.Deactivate;
36 import org.apache.felix.scr.annotations.Reference; 38 import org.apache.felix.scr.annotations.Reference;
37 import org.apache.felix.scr.annotations.ReferenceCardinality; 39 import org.apache.felix.scr.annotations.ReferenceCardinality;
38 import org.apache.felix.scr.annotations.Service; 40 import org.apache.felix.scr.annotations.Service;
41 +import org.onlab.packet.ARP;
42 +import org.onlab.packet.Ethernet;
43 +import org.onlab.packet.IPv4;
39 import org.onlab.packet.Ip4Address; 44 import org.onlab.packet.Ip4Address;
40 import org.onlab.packet.IpAddress; 45 import org.onlab.packet.IpAddress;
46 +import org.onlab.packet.IpPrefix;
41 import org.onlab.packet.MacAddress; 47 import org.onlab.packet.MacAddress;
42 import org.onlab.util.KryoNamespace; 48 import org.onlab.util.KryoNamespace;
43 import org.onosproject.core.ApplicationId; 49 import org.onosproject.core.ApplicationId;
44 import org.onosproject.core.CoreService; 50 import org.onosproject.core.CoreService;
45 import org.onosproject.mastership.MastershipService; 51 import org.onosproject.mastership.MastershipService;
46 import org.onosproject.net.AnnotationKeys; 52 import org.onosproject.net.AnnotationKeys;
53 +import org.onosproject.net.ConnectPoint;
47 import org.onosproject.net.Device; 54 import org.onosproject.net.Device;
48 import org.onosproject.net.DeviceId; 55 import org.onosproject.net.DeviceId;
49 import org.onosproject.net.Host; 56 import org.onosproject.net.Host;
...@@ -61,7 +68,12 @@ import org.onosproject.net.device.DeviceService; ...@@ -61,7 +68,12 @@ import org.onosproject.net.device.DeviceService;
61 import org.onosproject.net.driver.DriverHandler; 68 import org.onosproject.net.driver.DriverHandler;
62 import org.onosproject.net.driver.DriverService; 69 import org.onosproject.net.driver.DriverService;
63 import org.onosproject.net.flow.DefaultTrafficTreatment; 70 import org.onosproject.net.flow.DefaultTrafficTreatment;
71 +import org.onosproject.net.flow.FlowEntry;
72 +import org.onosproject.net.flow.FlowRuleService;
73 +import org.onosproject.net.flow.TrafficSelector;
74 +import org.onosproject.net.flow.TrafficTreatment;
64 import org.onosproject.net.flow.TrafficTreatment.Builder; 75 import org.onosproject.net.flow.TrafficTreatment.Builder;
76 +import org.onosproject.net.flow.criteria.Criterion;
65 import org.onosproject.net.flow.instructions.ExtensionTreatment; 77 import org.onosproject.net.flow.instructions.ExtensionTreatment;
66 import org.onosproject.net.flowobjective.Objective; 78 import org.onosproject.net.flowobjective.Objective;
67 import org.onosproject.net.group.DefaultGroupBucket; 79 import org.onosproject.net.group.DefaultGroupBucket;
...@@ -75,6 +87,12 @@ import org.onosproject.net.group.GroupService; ...@@ -75,6 +87,12 @@ import org.onosproject.net.group.GroupService;
75 import org.onosproject.net.host.HostEvent; 87 import org.onosproject.net.host.HostEvent;
76 import org.onosproject.net.host.HostListener; 88 import org.onosproject.net.host.HostListener;
77 import org.onosproject.net.host.HostService; 89 import org.onosproject.net.host.HostService;
90 +import org.onosproject.net.packet.DefaultOutboundPacket;
91 +import org.onosproject.net.packet.InboundPacket;
92 +import org.onosproject.net.packet.OutboundPacket;
93 +import org.onosproject.net.packet.PacketContext;
94 +import org.onosproject.net.packet.PacketProcessor;
95 +import org.onosproject.net.packet.PacketService;
78 import org.onosproject.store.serializers.KryoNamespaces; 96 import org.onosproject.store.serializers.KryoNamespaces;
79 import org.onosproject.store.service.ConsistentMap; 97 import org.onosproject.store.service.ConsistentMap;
80 import org.onosproject.store.service.EventuallyConsistentMap; 98 import org.onosproject.store.service.EventuallyConsistentMap;
...@@ -96,13 +114,16 @@ import org.onosproject.vtn.table.impl.L2ForwardServiceImpl; ...@@ -96,13 +114,16 @@ import org.onosproject.vtn.table.impl.L2ForwardServiceImpl;
96 import org.onosproject.vtn.table.impl.L3ForwardServiceImpl; 114 import org.onosproject.vtn.table.impl.L3ForwardServiceImpl;
97 import org.onosproject.vtn.table.impl.SnatServiceImpl; 115 import org.onosproject.vtn.table.impl.SnatServiceImpl;
98 import org.onosproject.vtn.util.DataPathIdGenerator; 116 import org.onosproject.vtn.util.DataPathIdGenerator;
117 +import org.onosproject.vtn.util.IpUtil;
99 import org.onosproject.vtn.util.VtnConfig; 118 import org.onosproject.vtn.util.VtnConfig;
100 import org.onosproject.vtn.util.VtnData; 119 import org.onosproject.vtn.util.VtnData;
101 import org.onosproject.vtnrsc.AllowedAddressPair; 120 import org.onosproject.vtnrsc.AllowedAddressPair;
102 import org.onosproject.vtnrsc.BindingHostId; 121 import org.onosproject.vtnrsc.BindingHostId;
122 +import org.onosproject.vtnrsc.DefaultFloatingIp;
103 import org.onosproject.vtnrsc.DefaultVirtualPort; 123 import org.onosproject.vtnrsc.DefaultVirtualPort;
104 import org.onosproject.vtnrsc.FixedIp; 124 import org.onosproject.vtnrsc.FixedIp;
105 import org.onosproject.vtnrsc.FloatingIp; 125 import org.onosproject.vtnrsc.FloatingIp;
126 +import org.onosproject.vtnrsc.FloatingIpId;
106 import org.onosproject.vtnrsc.RouterId; 127 import org.onosproject.vtnrsc.RouterId;
107 import org.onosproject.vtnrsc.RouterInterface; 128 import org.onosproject.vtnrsc.RouterInterface;
108 import org.onosproject.vtnrsc.SecurityGroup; 129 import org.onosproject.vtnrsc.SecurityGroup;
...@@ -183,6 +204,9 @@ public class VtnManager implements VtnService { ...@@ -183,6 +204,9 @@ public class VtnManager implements VtnService {
183 @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY) 204 @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY)
184 protected RouterInterfaceService routerInterfaceService; 205 protected RouterInterfaceService routerInterfaceService;
185 206
207 + @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY)
208 + protected FlowRuleService flowRuleService;
209 +
186 private ApplicationId appId; 210 private ApplicationId appId;
187 private ClassifierService classifierService; 211 private ClassifierService classifierService;
188 private L2ForwardService l2ForwardService; 212 private L2ForwardService l2ForwardService;
...@@ -207,8 +231,12 @@ public class VtnManager implements VtnService { ...@@ -207,8 +231,12 @@ public class VtnManager implements VtnService {
207 private static final String EX_PORT_OF_DEVICE = "exPortOfDevice"; 231 private static final String EX_PORT_OF_DEVICE = "exPortOfDevice";
208 private static final String EX_PORT_MAP = "exPortMap"; 232 private static final String EX_PORT_MAP = "exPortMap";
209 private static final String DEFAULT_IP = "0.0.0.0"; 233 private static final String DEFAULT_IP = "0.0.0.0";
234 + private static final String FLOATINGSTORE = "vtn-floatingIp";
210 private static final String USERDATA_IP = "169.254.169.254"; 235 private static final String USERDATA_IP = "169.254.169.254";
211 private static final int SUBNET_NUM = 2; 236 private static final int SUBNET_NUM = 2;
237 + private static final int SNAT_TABLE = 40;
238 + private static final int SNAT_DEFAULT_RULE_PRIORITY = 0;
239 + private static final byte[] ZERO_MAC_ADDRESS = MacAddress.ZERO.toBytes();
212 240
213 private EventuallyConsistentMap<VirtualPortId, VirtualPort> vPortStore; 241 private EventuallyConsistentMap<VirtualPortId, VirtualPort> vPortStore;
214 private EventuallyConsistentMap<IpAddress, Boolean> switchesOfController; 242 private EventuallyConsistentMap<IpAddress, Boolean> switchesOfController;
...@@ -216,8 +244,13 @@ public class VtnManager implements VtnService { ...@@ -216,8 +244,13 @@ public class VtnManager implements VtnService {
216 private EventuallyConsistentMap<SubnetId, Map<HostId, Host>> hostsOfSubnet; 244 private EventuallyConsistentMap<SubnetId, Map<HostId, Host>> hostsOfSubnet;
217 private EventuallyConsistentMap<TenantRouter, Boolean> routerInfFlagOfTenantRouter; 245 private EventuallyConsistentMap<TenantRouter, Boolean> routerInfFlagOfTenantRouter;
218 private EventuallyConsistentMap<DeviceId, Port> exPortOfDevice; 246 private EventuallyConsistentMap<DeviceId, Port> exPortOfDevice;
247 + private EventuallyConsistentMap<IpAddress, FloatingIp> floatingIpStore;
219 private static ConsistentMap<String, String> exPortMap; 248 private static ConsistentMap<String, String> exPortMap;
220 249
250 + private VtnL3PacketProcessor l3PacketProcessor = new VtnL3PacketProcessor();
251 + @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY)
252 + protected PacketService packetService;
253 +
221 @Activate 254 @Activate
222 public void activate() { 255 public void activate() {
223 appId = coreService.registerApplication(APP_ID); 256 appId = coreService.registerApplication(APP_ID);
...@@ -238,18 +271,29 @@ public class VtnManager implements VtnService { ...@@ -238,18 +271,29 @@ public class VtnManager implements VtnService {
238 .register(TenantNetworkId.class) 271 .register(TenantNetworkId.class)
239 .register(Host.class) 272 .register(Host.class)
240 .register(TenantNetwork.class) 273 .register(TenantNetwork.class)
274 + .register(TenantNetworkId.class)
241 .register(TenantId.class) 275 .register(TenantId.class)
242 .register(SubnetId.class) 276 .register(SubnetId.class)
243 .register(VirtualPortId.class) 277 .register(VirtualPortId.class)
244 .register(VirtualPort.State.class) 278 .register(VirtualPort.State.class)
245 .register(AllowedAddressPair.class) 279 .register(AllowedAddressPair.class)
246 .register(FixedIp.class) 280 .register(FixedIp.class)
281 + .register(FloatingIp.class)
282 + .register(FloatingIpId.class)
283 + .register(FloatingIp.Status.class)
284 + .register(UUID.class)
285 + .register(DefaultFloatingIp.class)
247 .register(BindingHostId.class) 286 .register(BindingHostId.class)
248 .register(SecurityGroup.class) 287 .register(SecurityGroup.class)
249 .register(IpAddress.class) 288 .register(IpAddress.class)
250 .register(DefaultVirtualPort.class) 289 .register(DefaultVirtualPort.class)
251 .register(RouterId.class) 290 .register(RouterId.class)
252 .register(TenantRouter.class); 291 .register(TenantRouter.class);
292 + floatingIpStore = storageService
293 + .<IpAddress, FloatingIp>eventuallyConsistentMapBuilder()
294 + .withName(FLOATINGSTORE).withSerializer(serializer)
295 + .withTimestampProvider((k, v) -> clockService.getTimestamp())
296 + .build();
253 297
254 vPortStore = storageService 298 vPortStore = storageService
255 .<VirtualPortId, VirtualPort>eventuallyConsistentMapBuilder() 299 .<VirtualPortId, VirtualPort>eventuallyConsistentMapBuilder()
...@@ -295,6 +339,7 @@ public class VtnManager implements VtnService { ...@@ -295,6 +339,7 @@ public class VtnManager implements VtnService {
295 .withSerializer(Serializer.using(Arrays.asList(KryoNamespaces.API))) 339 .withSerializer(Serializer.using(Arrays.asList(KryoNamespaces.API)))
296 .build(); 340 .build();
297 341
342 + packetService.addProcessor(l3PacketProcessor, PacketProcessor.director(0));
298 log.info("Started"); 343 log.info("Started");
299 } 344 }
300 345
...@@ -464,6 +509,9 @@ public class VtnManager implements VtnService { ...@@ -464,6 +509,9 @@ public class VtnManager implements VtnService {
464 // Save external port 509 // Save external port
465 Port export = getExPort(device.id()); 510 Port export = getExPort(device.id());
466 if (export != null) { 511 if (export != null) {
512 + classifierService.programExportPortArpClassifierRules(export,
513 + device.id(),
514 + type);
467 exPortOfDevice.put(device.id(), export); 515 exPortOfDevice.put(device.id(), export);
468 } 516 }
469 switchOfLocalHostPorts.put(device.id(), new NetworkOfLocalHostPorts()); 517 switchOfLocalHostPorts.put(device.id(), new NetworkOfLocalHostPorts());
...@@ -867,11 +915,14 @@ public class VtnManager implements VtnService { ...@@ -867,11 +915,14 @@ public class VtnManager implements VtnService {
867 915
868 @Override 916 @Override
869 public void onFloatingIpDetected(VtnRscEventFeedback l3Feedback) { 917 public void onFloatingIpDetected(VtnRscEventFeedback l3Feedback) {
918 + floatingIpStore.put(l3Feedback.floatingIp().floatingIp(),
919 + l3Feedback.floatingIp());
870 programFloatingIpEvent(l3Feedback, VtnRscEvent.Type.FLOATINGIP_BIND); 920 programFloatingIpEvent(l3Feedback, VtnRscEvent.Type.FLOATINGIP_BIND);
871 } 921 }
872 922
873 @Override 923 @Override
874 public void onFloatingIpVanished(VtnRscEventFeedback l3Feedback) { 924 public void onFloatingIpVanished(VtnRscEventFeedback l3Feedback) {
925 + floatingIpStore.remove(l3Feedback.floatingIp().floatingIp());
875 programFloatingIpEvent(l3Feedback, VtnRscEvent.Type.FLOATINGIP_UNBIND); 926 programFloatingIpEvent(l3Feedback, VtnRscEvent.Type.FLOATINGIP_UNBIND);
876 } 927 }
877 928
...@@ -1100,8 +1151,6 @@ public class VtnManager implements VtnService { ...@@ -1100,8 +1151,6 @@ public class VtnManager implements VtnService {
1100 List gwIpMac = getGwIpAndMac(vmPort); 1151 List gwIpMac = getGwIpAndMac(vmPort);
1101 IpAddress dstVmGwIp = (IpAddress) gwIpMac.get(0); 1152 IpAddress dstVmGwIp = (IpAddress) gwIpMac.get(0);
1102 MacAddress dstVmGwMac = (MacAddress) gwIpMac.get(1); 1153 MacAddress dstVmGwMac = (MacAddress) gwIpMac.get(1);
1103 - List fGwIpMac = getGwIpAndMac(fipPort);
1104 - MacAddress fGwMac = (MacAddress) fGwIpMac.get(1);
1105 TenantNetwork vmNetwork = tenantNetworkService 1154 TenantNetwork vmNetwork = tenantNetworkService
1106 .getNetwork(vmPort.networkId()); 1155 .getNetwork(vmPort.networkId());
1107 TenantNetwork fipNetwork = tenantNetworkService 1156 TenantNetwork fipNetwork = tenantNetworkService
...@@ -1109,26 +1158,26 @@ public class VtnManager implements VtnService { ...@@ -1109,26 +1158,26 @@ public class VtnManager implements VtnService {
1109 // L3 downlink traffic flow 1158 // L3 downlink traffic flow
1110 MacAddress exPortMac = MacAddress.valueOf(exPort.annotations() 1159 MacAddress exPortMac = MacAddress.valueOf(exPort.annotations()
1111 .value(AnnotationKeys.PORT_MAC)); 1160 .value(AnnotationKeys.PORT_MAC));
1112 - classifierService.programArpClassifierRules(deviceId, floatingIp.floatingIp(),
1113 - fipNetwork.segmentationId(),
1114 - operation);
1115 classifierService.programL3ExPortClassifierRules(deviceId, exPort.number(), 1161 classifierService.programL3ExPortClassifierRules(deviceId, exPort.number(),
1116 floatingIp.floatingIp(), operation); 1162 floatingIp.floatingIp(), operation);
1117 - DriverHandler handler = driverService.createHandler(deviceId);
1118 - arpService.programArpRules(handler, deviceId, floatingIp.floatingIp(),
1119 - fipNetwork.segmentationId(), exPortMac,
1120 - operation);
1121 dnatService.programRules(deviceId, floatingIp.floatingIp(), 1163 dnatService.programRules(deviceId, floatingIp.floatingIp(),
1122 - fGwMac, floatingIp.fixedIp(), 1164 + exPortMac, floatingIp.fixedIp(),
1123 l3vni, operation); 1165 l3vni, operation);
1124 1166
1167 + Subnet subnet = getSubnetOfFloatingIP(floatingIp);
1168 + IpPrefix ipPrefix = subnet.cidr();
1169 + snatService.programSnatSameSegmentUploadControllerRules(deviceId, l3vni,
1170 + floatingIp.fixedIp(),
1171 + floatingIp.floatingIp(),
1172 + ipPrefix,
1173 + operation);
1125 // L3 uplink traffic flow 1174 // L3 uplink traffic flow
1126 if (operation == Objective.Operation.ADD) { 1175 if (operation == Objective.Operation.ADD) {
1127 sendNorthSouthL3Flows(deviceId, floatingIp, dstVmGwIp, dstVmGwMac, 1176 sendNorthSouthL3Flows(deviceId, floatingIp, dstVmGwIp, dstVmGwMac,
1128 l3vni, vmNetwork, vmPort, host, operation); 1177 l3vni, vmNetwork, vmPort, host, operation);
1129 - l2ForwardService.programLocalOut(deviceId, 1178 + l2ForwardService
1130 - fipNetwork.segmentationId(), 1179 + .programExternalOut(deviceId, fipNetwork.segmentationId(),
1131 - exPort.number(), fGwMac, operation); 1180 + exPort.number(), exPortMac, operation);
1132 } else if (operation == Objective.Operation.REMOVE) { 1181 } else if (operation == Objective.Operation.REMOVE) {
1133 if (hostFlag || (!hostFlag 1182 if (hostFlag || (!hostFlag
1134 && routerInfFlagOfTenantRouter.get(tenantRouter) == null)) { 1183 && routerInfFlagOfTenantRouter.get(tenantRouter) == null)) {
...@@ -1147,15 +1196,13 @@ public class VtnManager implements VtnService { ...@@ -1147,15 +1196,13 @@ public class VtnManager implements VtnService {
1147 } 1196 }
1148 } 1197 }
1149 if (exPortFlag) { 1198 if (exPortFlag) {
1150 - l2ForwardService.programLocalOut(deviceId, 1199 + l2ForwardService.programExternalOut(deviceId,
1151 - fipNetwork.segmentationId(), 1200 + fipNetwork.segmentationId(),
1152 - exPort.number(), fGwMac, operation); 1201 + exPort.number(), exPortMac,
1202 + operation);
1153 } 1203 }
1204 + removeRulesInSnat(deviceId, floatingIp.fixedIp());
1154 } 1205 }
1155 - snatService.programRules(deviceId, l3vni, floatingIp.fixedIp(),
1156 - fGwMac, exPortMac,
1157 - floatingIp.floatingIp(),
1158 - fipNetwork.segmentationId(), operation);
1159 } 1206 }
1160 1207
1161 private Port getExPort(DeviceId deviceId) { 1208 private Port getExPort(DeviceId deviceId) {
...@@ -1280,4 +1327,306 @@ public class VtnManager implements VtnService { ...@@ -1280,4 +1327,306 @@ public class VtnManager implements VtnService {
1280 public static void setExPortName(String name) { 1327 public static void setExPortName(String name) {
1281 exPortMap.put(EX_PORT_KEY, name); 1328 exPortMap.put(EX_PORT_KEY, name);
1282 } 1329 }
1330 +
1331 + /**
1332 + * Packet processor responsible for forwarding packets along their paths.
1333 + */
1334 + private class VtnL3PacketProcessor implements PacketProcessor {
1335 +
1336 + @Override
1337 + public void process(PacketContext context) {
1338 + InboundPacket pkt = context.inPacket();
1339 + ConnectPoint connectPoint = pkt.receivedFrom();
1340 + DeviceId deviceId = connectPoint.deviceId();
1341 + Ethernet ethPkt = pkt.parsed();
1342 + if (ethPkt == null) {
1343 + return;
1344 + }
1345 + if (ethPkt.getEtherType() == Ethernet.TYPE_ARP) {
1346 + ARP arpPacket = (ARP) ethPkt.getPayload();
1347 + if ((arpPacket.getOpCode() == ARP.OP_REQUEST)) {
1348 + arprequestProcess(arpPacket, deviceId);
1349 + } else if (arpPacket.getOpCode() == ARP.OP_REPLY) {
1350 + arpresponceProcess(arpPacket, deviceId);
1351 + }
1352 + } else if (ethPkt.getEtherType() == Ethernet.TYPE_IPV4) {
1353 + if (ethPkt.getDestinationMAC().isMulticast()) {
1354 + return;
1355 + }
1356 + IPv4 ip = (IPv4) ethPkt.getPayload();
1357 + upStreamPacketProcessor(ip, deviceId);
1358 +
1359 + } else {
1360 + return;
1361 + }
1362 + }
1363 +
1364 + private void arprequestProcess(ARP arpPacket, DeviceId deviceId) {
1365 + MacAddress dstMac = MacAddress
1366 + .valueOf(arpPacket.getSenderHardwareAddress());
1367 + IpAddress srcIp = IpAddress.valueOf(IPv4
1368 + .toIPv4Address(arpPacket.getTargetProtocolAddress()));
1369 + IpAddress dstIp = IpAddress.valueOf(IPv4
1370 + .toIPv4Address(arpPacket.getSenderProtocolAddress()));
1371 + FloatingIp floatingIp = floatingIpStore.get(srcIp);
1372 + if (floatingIp == null) {
1373 + return;
1374 + }
1375 + DeviceId deviceIdOfFloatingIp = getDeviceIdOfFloatingIP(floatingIp);
1376 + if (!deviceId.equals(deviceIdOfFloatingIp)) {
1377 + return;
1378 + }
1379 + Port exPort = exPortOfDevice.get(deviceId);
1380 + MacAddress srcMac = MacAddress.valueOf(exPort.annotations()
1381 + .value(AnnotationKeys.PORT_MAC));
1382 + if (!downloadSnatRules(deviceId, srcMac, srcIp, dstMac, dstIp,
1383 + floatingIp)) {
1384 + return;
1385 + }
1386 + Ethernet ethernet = buildArpResponse(dstIp, dstMac, srcIp, srcMac);
1387 + if (ethernet != null) {
1388 + sendPacketOut(deviceId, exPort.number(), ethernet);
1389 + }
1390 + }
1391 +
1392 + private void arpresponceProcess(ARP arpPacket, DeviceId deviceId) {
1393 + MacAddress srcMac = MacAddress
1394 + .valueOf(arpPacket.getTargetHardwareAddress());
1395 + MacAddress dstMac = MacAddress
1396 + .valueOf(arpPacket.getSenderHardwareAddress());
1397 + IpAddress srcIp = IpAddress.valueOf(IPv4
1398 + .toIPv4Address(arpPacket.getTargetProtocolAddress()));
1399 + IpAddress dstIp = IpAddress.valueOf(IPv4
1400 + .toIPv4Address(arpPacket.getSenderProtocolAddress()));
1401 + FloatingIp floatingIp = floatingIpStore.get(srcIp);
1402 + if (floatingIp == null) {
1403 + return;
1404 + }
1405 + DeviceId deviceIdOfFloatingIp = getDeviceIdOfFloatingIP(floatingIp);
1406 + if (!deviceId.equals(deviceIdOfFloatingIp)) {
1407 + return;
1408 + }
1409 + if (!downloadSnatRules(deviceId, srcMac, srcIp, dstMac, dstIp,
1410 + floatingIp)) {
1411 + return;
1412 + }
1413 + }
1414 +
1415 + private void upStreamPacketProcessor(IPv4 ipPacket, DeviceId deviceId) {
1416 + IpAddress srcIp = IpAddress.valueOf(ipPacket.getSourceAddress());
1417 + IpAddress dstIp = IpAddress.valueOf(ipPacket.getDestinationAddress());
1418 + FloatingIp floatingIp = null;
1419 + Collection<FloatingIp> floatingIps = floatingIpService
1420 + .getFloatingIps();
1421 + Set<FloatingIp> floatingIpSet = Sets.newHashSet(floatingIps)
1422 + .stream().collect(Collectors.toSet());
1423 + for (FloatingIp f : floatingIpSet) {
1424 + IpAddress fixIp = f.fixedIp();
1425 + if (fixIp != null && fixIp.equals(srcIp)) {
1426 + floatingIp = f;
1427 + break;
1428 + }
1429 + }
1430 + if (floatingIp == null) {
1431 + return;
1432 + }
1433 + Subnet subnet = getSubnetOfFloatingIP(floatingIp);
1434 + IpAddress gwIp = subnet.gatewayIp();
1435 + Port exportPort = exPortOfDevice.get(deviceId);
1436 + MacAddress exPortMac = MacAddress.valueOf(exportPort.annotations()
1437 + .value(AnnotationKeys.PORT_MAC));
1438 + IpPrefix ipPrefix = subnet.cidr();
1439 + if (ipPrefix == null) {
1440 + return;
1441 + }
1442 + int mask = ipPrefix.prefixLength();
1443 + if (mask <= 0) {
1444 + return;
1445 + }
1446 + Ethernet ethernet = null;
1447 + // if the same ip segment
1448 + if (IpUtil.checkSameSegment(floatingIp.floatingIp(), dstIp, mask)) {
1449 + ethernet = buildArpRequest(dstIp, floatingIp.floatingIp(),
1450 + exPortMac);
1451 + } else {
1452 + ethernet = buildArpRequest(gwIp, floatingIp.floatingIp(),
1453 + exPortMac);
1454 + }
1455 + if (ethernet != null) {
1456 + sendPacketOut(deviceId, exportPort.number(), ethernet);
1457 + }
1458 + }
1459 + }
1460 +
1461 + private Ethernet buildArpRequest(IpAddress targetIp, IpAddress sourceIp,
1462 + MacAddress sourceMac) {
1463 + ARP arp = new ARP();
1464 + arp.setHardwareType(ARP.HW_TYPE_ETHERNET)
1465 + .setHardwareAddressLength((byte) Ethernet.DATALAYER_ADDRESS_LENGTH)
1466 + .setProtocolType(ARP.PROTO_TYPE_IP)
1467 + .setProtocolAddressLength((byte) Ip4Address.BYTE_LENGTH)
1468 + .setOpCode(ARP.OP_REQUEST);
1469 +
1470 + arp.setSenderHardwareAddress(sourceMac.toBytes())
1471 + .setSenderProtocolAddress(sourceIp.getIp4Address().toInt())
1472 + .setTargetHardwareAddress(ZERO_MAC_ADDRESS)
1473 + .setTargetProtocolAddress(targetIp.getIp4Address().toInt());
1474 +
1475 + Ethernet ethernet = new Ethernet();
1476 + ethernet.setEtherType(Ethernet.TYPE_ARP)
1477 + .setDestinationMACAddress(MacAddress.BROADCAST)
1478 + .setSourceMACAddress(sourceMac)
1479 + .setPayload(arp);
1480 +
1481 + ethernet.setPad(true);
1482 + return ethernet;
1483 + }
1484 +
1485 + private Ethernet buildArpResponse(IpAddress targetIp, MacAddress targetMac,
1486 + IpAddress sourceIp, MacAddress sourceMac) {
1487 + ARP arp = new ARP();
1488 + arp.setHardwareType(ARP.HW_TYPE_ETHERNET)
1489 + .setHardwareAddressLength((byte) Ethernet.DATALAYER_ADDRESS_LENGTH)
1490 + .setProtocolType(ARP.PROTO_TYPE_IP)
1491 + .setProtocolAddressLength((byte) Ip4Address.BYTE_LENGTH)
1492 + .setOpCode(ARP.OP_REPLY);
1493 +
1494 + arp.setSenderHardwareAddress(sourceMac.toBytes())
1495 + .setSenderProtocolAddress(sourceIp.getIp4Address().toInt())
1496 + .setTargetHardwareAddress(targetMac.toBytes())
1497 + .setTargetProtocolAddress(targetIp.getIp4Address().toInt());
1498 +
1499 + Ethernet ethernet = new Ethernet();
1500 + ethernet.setEtherType(Ethernet.TYPE_ARP)
1501 + .setDestinationMACAddress(targetMac)
1502 + .setSourceMACAddress(sourceMac)
1503 + .setPayload(arp);
1504 +
1505 + ethernet.setPad(true);
1506 +
1507 + return ethernet;
1508 + }
1509 +
1510 + private void sendPacketOut(DeviceId deviceId, PortNumber portNumber,
1511 + Ethernet payload) {
1512 + TrafficTreatment treatment = DefaultTrafficTreatment.builder()
1513 + .setOutput(portNumber).build();
1514 + OutboundPacket packet = new DefaultOutboundPacket(deviceId, treatment,
1515 + ByteBuffer
1516 + .wrap(payload
1517 + .serialize()));
1518 + packetService.emit(packet);
1519 + }
1520 +
1521 + private Subnet getSubnetOfFloatingIP(FloatingIp floatingIp) {
1522 + DeviceId exVmPortId = DeviceId
1523 + .deviceId(floatingIp.id().floatingIpId().toString());
1524 + Collection<VirtualPort> exVmPortList = virtualPortService
1525 + .getPorts(exVmPortId);
1526 + VirtualPort exVmPort = null;
1527 + if (exVmPortList != null) {
1528 + exVmPort = exVmPortList.iterator().next();
1529 + }
1530 + if (exVmPort == null) {
1531 + return null;
1532 + }
1533 + Set<FixedIp> fixedIps = exVmPort.fixedIps();
1534 + SubnetId subnetId = null;
1535 + for (FixedIp f : fixedIps) {
1536 + IpAddress fp = f.ip();
1537 + if (fp.equals(floatingIp.floatingIp())) {
1538 + subnetId = f.subnetId();
1539 + break;
1540 + }
1541 + }
1542 + if (subnetId == null) {
1543 + return null;
1544 + }
1545 + Subnet subnet = subnetService.getSubnet(subnetId);
1546 + return subnet;
1547 + }
1548 +
1549 + private DeviceId getDeviceIdOfFloatingIP(FloatingIp floatingIp) {
1550 + VirtualPortId vmPortId = floatingIp.portId();
1551 + VirtualPort vmPort = virtualPortService.getPort(vmPortId);
1552 + if (vmPort == null) {
1553 + vmPort = VtnData.getPort(vPortStore, vmPortId);
1554 + }
1555 + Set<Host> hostSet = hostService.getHostsByMac(vmPort.macAddress());
1556 + Host host = null;
1557 + for (Host h : hostSet) {
1558 + String ifaceid = h.annotations().value(IFACEID);
1559 + if (ifaceid != null && ifaceid.equals(vmPortId.portId())) {
1560 + host = h;
1561 + break;
1562 + }
1563 + }
1564 + if (host == null) {
1565 + return null;
1566 + } else {
1567 + return host.location().deviceId();
1568 + }
1569 + }
1570 +
1571 + private boolean downloadSnatRules(DeviceId deviceId, MacAddress srcMac,
1572 + IpAddress srcIp, MacAddress dstMac,
1573 + IpAddress dstIp, FloatingIp floatingIp) {
1574 + TenantNetwork exNetwork = tenantNetworkService
1575 + .getNetwork(floatingIp.networkId());
1576 + IpAddress fixedIp = floatingIp.fixedIp();
1577 + VirtualPortId vmPortId = floatingIp.portId();
1578 + VirtualPort vmPort = virtualPortService.getPort(vmPortId);
1579 + if (vmPort == null) {
1580 + vmPort = VtnData.getPort(vPortStore, vmPortId);
1581 + }
1582 + Subnet subnet = getSubnetOfFloatingIP(floatingIp);
1583 + IpPrefix ipPrefix = subnet.cidr();
1584 + IpAddress gwIp = subnet.gatewayIp();
1585 + if (ipPrefix == null) {
1586 + return false;
1587 + }
1588 + int mask = ipPrefix.prefixLength();
1589 + if (mask <= 0) {
1590 + return false;
1591 + }
1592 + TenantRouter tenantRouter = TenantRouter
1593 + .tenantRouter(floatingIp.tenantId(), floatingIp.routerId());
1594 + SegmentationId l3vni = vtnRscService.getL3vni(tenantRouter);
1595 + // if the same ip segment
1596 + if (IpUtil.checkSameSegment(srcIp, dstIp, mask)) {
1597 + snatService.programSnatSameSegmentRules(deviceId, l3vni, fixedIp,
1598 + dstIp, dstMac, srcMac,
1599 + srcIp,
1600 + exNetwork.segmentationId(),
1601 + Objective.Operation.ADD);
1602 + if (dstIp.equals(gwIp)) {
1603 + snatService
1604 + .programSnatDiffSegmentRules(deviceId, l3vni, fixedIp,
1605 + dstMac, srcMac, srcIp,
1606 + exNetwork.segmentationId(),
1607 + Objective.Operation.ADD);
1608 + }
1609 + }
1610 + return true;
1611 + }
1612 +
1613 + private void removeRulesInSnat(DeviceId deviceId, IpAddress fixedIp) {
1614 + for (FlowEntry f : flowRuleService.getFlowEntries(deviceId)) {
1615 + if (f.tableId() == SNAT_TABLE
1616 + && f.priority() > SNAT_DEFAULT_RULE_PRIORITY) {
1617 + String srcIp = f.selector()
1618 + .getCriterion(Criterion.Type.IPV4_SRC).toString();
1619 + int priority = f.priority();
1620 + if (srcIp != null && srcIp.contains(fixedIp.toString())) {
1621 + log.info("Match snat rules bob");
1622 + TrafficSelector selector = f.selector();
1623 + TrafficTreatment treatment = f.treatment();
1624 + snatService.removeSnatRules(deviceId, selector, treatment,
1625 + priority,
1626 + Objective.Operation.REMOVE);
1627 +
1628 + }
1629 + }
1630 + }
1631 + }
1283 } 1632 }
......
...@@ -20,8 +20,10 @@ import org.onlab.packet.IpPrefix; ...@@ -20,8 +20,10 @@ import org.onlab.packet.IpPrefix;
20 import org.onlab.packet.MacAddress; 20 import org.onlab.packet.MacAddress;
21 import org.onosproject.core.ApplicationId; 21 import org.onosproject.core.ApplicationId;
22 import org.onosproject.net.DeviceId; 22 import org.onosproject.net.DeviceId;
23 +import org.onosproject.net.Port;
23 import org.onosproject.net.PortNumber; 24 import org.onosproject.net.PortNumber;
24 import org.onosproject.net.flowobjective.Objective; 25 import org.onosproject.net.flowobjective.Objective;
26 +import org.onosproject.net.flowobjective.Objective.Operation;
25 import org.onosproject.vtnrsc.SegmentationId; 27 import org.onosproject.vtnrsc.SegmentationId;
26 28
27 /** 29 /**
...@@ -134,4 +136,16 @@ public interface ClassifierService { ...@@ -134,4 +136,16 @@ public interface ClassifierService {
134 IpAddress dstIp, MacAddress dstmac, 136 IpAddress dstIp, MacAddress dstmac,
135 SegmentationId actionVni, 137 SegmentationId actionVni,
136 Objective.Operation type); 138 Objective.Operation type);
139 +
140 + /**
141 + * Assemble the export port Arp Classifier table rules.
142 + * Match: export port.
143 + * Action: upload packet to controller.
144 + *
145 + * @param exportPort export port of ovs
146 + * @param deviceId Device Id
147 + * @param type the operation type of the flow rules
148 + */
149 + void programExportPortArpClassifierRules(Port exportPort, DeviceId deviceId,
150 + Operation type);
137 } 151 }
......
...@@ -79,6 +79,21 @@ public interface L2ForwardService { ...@@ -79,6 +79,21 @@ public interface L2ForwardService {
79 Objective.Operation type); 79 Objective.Operation type);
80 80
81 /** 81 /**
82 + * The external out rule that message matches Table(50).
83 + * Match: external port mac and vnid.
84 + * Action: output external port.
85 + *
86 + * @param deviceId Device Id
87 + * @param segmentationId the vnid of the host belong to
88 + * @param outPort the ingress port of the external port
89 + * @param sourceMac the mac of the external port
90 + * @param type the operation of the flow
91 + */
92 + void programExternalOut(DeviceId deviceId, SegmentationId segmentationId,
93 + PortNumber outPort, MacAddress sourceMac,
94 + Objective.Operation type);
95 +
96 + /**
82 * The tunnel out rule that message matches Table(50). 97 * The tunnel out rule that message matches Table(50).
83 * Match: host mac and vnid. 98 * Match: host mac and vnid.
84 * Action: output tunnel port. 99 * Action: output tunnel port.
......
...@@ -16,8 +16,11 @@ ...@@ -16,8 +16,11 @@
16 package org.onosproject.vtn.table; 16 package org.onosproject.vtn.table;
17 17
18 import org.onlab.packet.IpAddress; 18 import org.onlab.packet.IpAddress;
19 +import org.onlab.packet.IpPrefix;
19 import org.onlab.packet.MacAddress; 20 import org.onlab.packet.MacAddress;
20 import org.onosproject.net.DeviceId; 21 import org.onosproject.net.DeviceId;
22 +import org.onosproject.net.flow.TrafficSelector;
23 +import org.onosproject.net.flow.TrafficTreatment;
21 import org.onosproject.net.flowobjective.Objective; 24 import org.onosproject.net.flowobjective.Objective;
22 import org.onosproject.vtnrsc.SegmentationId; 25 import org.onosproject.vtnrsc.SegmentationId;
23 26
...@@ -30,6 +33,25 @@ public interface SnatService { ...@@ -30,6 +33,25 @@ public interface SnatService {
30 33
31 /** 34 /**
32 * Assemble the SNAT table rules. 35 * Assemble the SNAT table rules.
36 + * Match: ipv4 type, vnid, destination ip and source ip.
37 + * Action: set eth_src, set eth_dst, set ip_src, set vnid and goto L2Forward Table(50).
38 + *
39 + * @param deviceId Device Id
40 + * @param matchVni the vni of L3 network
41 + * @param srcIP source ip
42 + * @param dstIP destination ip
43 + * @param ethDst external gateway mac
44 + * @param ethSrc external port mac
45 + * @param ipSrc floating ip
46 + * @param actionVni external network VNI
47 + * @param type the operation type of the flow rules
48 + */
49 + void programSnatSameSegmentRules(DeviceId deviceId, SegmentationId matchVni,
50 + IpAddress srcIP, IpAddress dstIP, MacAddress ethDst,
51 + MacAddress ethSrc, IpAddress ipSrc,
52 + SegmentationId actionVni, Objective.Operation type);
53 + /**
54 + * Assemble the SNAT table rules.
33 * Match: ipv4 type, vnid and source ip. 55 * Match: ipv4 type, vnid and source ip.
34 * Action: set eth_src, set eth_dst, set ip_src, set vnid and goto L2Forward Table(50). 56 * Action: set eth_src, set eth_dst, set ip_src, set vnid and goto L2Forward Table(50).
35 * 57 *
...@@ -42,8 +64,39 @@ public interface SnatService { ...@@ -42,8 +64,39 @@ public interface SnatService {
42 * @param actionVni external network VNI 64 * @param actionVni external network VNI
43 * @param type the operation type of the flow rules 65 * @param type the operation type of the flow rules
44 */ 66 */
45 - void programRules(DeviceId deviceId, SegmentationId matchVni, 67 + void programSnatDiffSegmentRules(DeviceId deviceId, SegmentationId matchVni,
46 IpAddress srcIP, MacAddress ethDst, 68 IpAddress srcIP, MacAddress ethDst,
47 MacAddress ethSrc, IpAddress ipSrc, 69 MacAddress ethSrc, IpAddress ipSrc,
48 SegmentationId actionVni, Objective.Operation type); 70 SegmentationId actionVni, Objective.Operation type);
71 +
72 + /**
73 + * Assemble the SNAT table rules.
74 + * Match: ipv4 type, vnid, destination ip and source ip.
75 + * Action: upload to controller.
76 + *
77 + * @param deviceId Device Id
78 + * @param matchVni the vni of L3 network
79 + * @param srcIP source ip
80 + * @param dstIP destination ip
81 + * @param type the operation type of the flow rules
82 + */
83 + void programSnatSameSegmentUploadControllerRules(DeviceId deviceId,
84 + SegmentationId matchVni,
85 + IpAddress srcIP,
86 + IpAddress dstIP,
87 + IpPrefix prefix,
88 + Objective.Operation type);
89 +
90 + /**
91 + * Remove the SNAT table rules.
92 + *
93 + * @param deviceId Device Id
94 + * @param selector selector of rules
95 + * @param treatment treatment of rules
96 + * @param priority priority of rules
97 + * @param type the operation type of the flow rules
98 + */
99 + void removeSnatRules(DeviceId deviceId, TrafficSelector selector,
100 + TrafficTreatment treatment, int priority,
101 + Objective.Operation type);
49 } 102 }
......
...@@ -28,6 +28,7 @@ import org.onlab.packet.IpPrefix; ...@@ -28,6 +28,7 @@ import org.onlab.packet.IpPrefix;
28 import org.onlab.packet.MacAddress; 28 import org.onlab.packet.MacAddress;
29 import org.onosproject.core.ApplicationId; 29 import org.onosproject.core.ApplicationId;
30 import org.onosproject.net.DeviceId; 30 import org.onosproject.net.DeviceId;
31 +import org.onosproject.net.Port;
31 import org.onosproject.net.PortNumber; 32 import org.onosproject.net.PortNumber;
32 import org.onosproject.net.flow.DefaultTrafficSelector; 33 import org.onosproject.net.flow.DefaultTrafficSelector;
33 import org.onosproject.net.flow.DefaultTrafficTreatment; 34 import org.onosproject.net.flow.DefaultTrafficTreatment;
...@@ -40,6 +41,7 @@ import org.onosproject.net.flowobjective.FlowObjectiveService; ...@@ -40,6 +41,7 @@ import org.onosproject.net.flowobjective.FlowObjectiveService;
40 import org.onosproject.net.flowobjective.ForwardingObjective; 41 import org.onosproject.net.flowobjective.ForwardingObjective;
41 import org.onosproject.net.flowobjective.ForwardingObjective.Flag; 42 import org.onosproject.net.flowobjective.ForwardingObjective.Flag;
42 import org.onosproject.net.flowobjective.Objective; 43 import org.onosproject.net.flowobjective.Objective;
44 +import org.onosproject.net.flowobjective.Objective.Operation;
43 import org.onosproject.vtn.table.ClassifierService; 45 import org.onosproject.vtn.table.ClassifierService;
44 import org.onosproject.vtnrsc.SegmentationId; 46 import org.onosproject.vtnrsc.SegmentationId;
45 import org.slf4j.Logger; 47 import org.slf4j.Logger;
...@@ -242,4 +244,24 @@ public class ClassifierServiceImpl implements ClassifierService { ...@@ -242,4 +244,24 @@ public class ClassifierServiceImpl implements ClassifierService {
242 flowObjectiveService.forward(deviceId, objective.remove()); 244 flowObjectiveService.forward(deviceId, objective.remove());
243 } 245 }
244 } 246 }
247 +
248 + @Override
249 + public void programExportPortArpClassifierRules(Port exportPort,
250 + DeviceId deviceId,
251 + Operation type) {
252 + TrafficSelector selector = DefaultTrafficSelector.builder()
253 + .matchEthType(EtherType.ARP.ethType().toShort())
254 + .matchInPort(exportPort.number()).build();
255 + TrafficTreatment.Builder treatment = DefaultTrafficTreatment.builder();
256 + treatment.add(Instructions.createOutput(PortNumber.CONTROLLER));
257 + ForwardingObjective.Builder objective = DefaultForwardingObjective
258 + .builder().withTreatment(treatment.build())
259 + .withSelector(selector).fromApp(appId).withFlag(Flag.SPECIFIC)
260 + .withPriority(L3_CLASSIFIER_PRIORITY);
261 + if (type.equals(Objective.Operation.ADD)) {
262 + flowObjectiveService.forward(deviceId, objective.add());
263 + } else {
264 + flowObjectiveService.forward(deviceId, objective.remove());
265 + }
266 + }
245 } 267 }
......
...@@ -176,6 +176,28 @@ public final class L2ForwardServiceImpl implements L2ForwardService { ...@@ -176,6 +176,28 @@ public final class L2ForwardServiceImpl implements L2ForwardService {
176 } 176 }
177 177
178 @Override 178 @Override
179 + public void programExternalOut(DeviceId deviceId,
180 + SegmentationId segmentationId,
181 + PortNumber outPort, MacAddress sourceMac,
182 + Objective.Operation type) {
183 + TrafficSelector selector = DefaultTrafficSelector.builder()
184 + .matchTunnelId(Long.parseLong(segmentationId.toString()))
185 + .matchEthSrc(sourceMac).build();
186 + TrafficTreatment treatment = DefaultTrafficTreatment.builder()
187 + .setOutput(outPort).build();
188 + ForwardingObjective.Builder objective = DefaultForwardingObjective
189 + .builder().withTreatment(treatment).withSelector(selector)
190 + .fromApp(appId).withFlag(Flag.SPECIFIC)
191 + .withPriority(MAC_PRIORITY);
192 + if (type.equals(Objective.Operation.ADD)) {
193 + flowObjectiveService.forward(deviceId, objective.add());
194 + } else {
195 + flowObjectiveService.forward(deviceId, objective.remove());
196 + }
197 +
198 + }
199 +
200 + @Override
179 public void programTunnelOut(DeviceId deviceId, 201 public void programTunnelOut(DeviceId deviceId,
180 SegmentationId segmentationId, 202 SegmentationId segmentationId,
181 PortNumber tunnelOutPort, MacAddress dstMac, 203 PortNumber tunnelOutPort, MacAddress dstMac,
......
...@@ -16,7 +16,6 @@ ...@@ -16,7 +16,6 @@
16 package org.onosproject.vtn.table.impl; 16 package org.onosproject.vtn.table.impl;
17 17
18 import static com.google.common.base.Preconditions.checkNotNull; 18 import static com.google.common.base.Preconditions.checkNotNull;
19 -import static org.slf4j.LoggerFactory.getLogger;
20 19
21 import org.onlab.osgi.DefaultServiceDirectory; 20 import org.onlab.osgi.DefaultServiceDirectory;
22 import org.onlab.osgi.ServiceDirectory; 21 import org.onlab.osgi.ServiceDirectory;
...@@ -26,26 +25,29 @@ import org.onlab.packet.IpPrefix; ...@@ -26,26 +25,29 @@ import org.onlab.packet.IpPrefix;
26 import org.onlab.packet.MacAddress; 25 import org.onlab.packet.MacAddress;
27 import org.onosproject.core.ApplicationId; 26 import org.onosproject.core.ApplicationId;
28 import org.onosproject.net.DeviceId; 27 import org.onosproject.net.DeviceId;
28 +import org.onosproject.net.PortNumber;
29 import org.onosproject.net.flow.DefaultTrafficSelector; 29 import org.onosproject.net.flow.DefaultTrafficSelector;
30 import org.onosproject.net.flow.DefaultTrafficTreatment; 30 import org.onosproject.net.flow.DefaultTrafficTreatment;
31 import org.onosproject.net.flow.TrafficSelector; 31 import org.onosproject.net.flow.TrafficSelector;
32 import org.onosproject.net.flow.TrafficTreatment; 32 import org.onosproject.net.flow.TrafficTreatment;
33 +import org.onosproject.net.flow.instructions.Instructions;
33 import org.onosproject.net.flowobjective.DefaultForwardingObjective; 34 import org.onosproject.net.flowobjective.DefaultForwardingObjective;
34 import org.onosproject.net.flowobjective.FlowObjectiveService; 35 import org.onosproject.net.flowobjective.FlowObjectiveService;
35 import org.onosproject.net.flowobjective.ForwardingObjective; 36 import org.onosproject.net.flowobjective.ForwardingObjective;
36 import org.onosproject.net.flowobjective.ForwardingObjective.Flag; 37 import org.onosproject.net.flowobjective.ForwardingObjective.Flag;
37 import org.onosproject.net.flowobjective.Objective; 38 import org.onosproject.net.flowobjective.Objective;
39 +import org.onosproject.net.flowobjective.Objective.Operation;
38 import org.onosproject.vtn.table.SnatService; 40 import org.onosproject.vtn.table.SnatService;
39 import org.onosproject.vtnrsc.SegmentationId; 41 import org.onosproject.vtnrsc.SegmentationId;
40 -import org.slf4j.Logger;
41 42
42 /** 43 /**
43 * Provides implementation of SnatService. 44 * Provides implementation of SnatService.
44 */ 45 */
45 public class SnatServiceImpl implements SnatService { 46 public class SnatServiceImpl implements SnatService {
46 - private final Logger log = getLogger(getClass());
47 47
48 - private static final int SNAT_PRIORITY = 0xffff; 48 + private static final int SNAT_SAME_SEG_PRIORITY = 0xffff;
49 + private static final int SNAT_SAME_SEG_CON_PRIORITY = 0xfff0;
50 + private static final int SNAT_DIFF_SEG_PRIORITY = 0xffe0;
49 private static final int PREFIC_LENGTH = 32; 51 private static final int PREFIC_LENGTH = 32;
50 52
51 private final FlowObjectiveService flowObjectiveService; 53 private final FlowObjectiveService flowObjectiveService;
...@@ -63,7 +65,32 @@ public class SnatServiceImpl implements SnatService { ...@@ -63,7 +65,32 @@ public class SnatServiceImpl implements SnatService {
63 } 65 }
64 66
65 @Override 67 @Override
66 - public void programRules(DeviceId deviceId, SegmentationId matchVni, 68 + public void programSnatSameSegmentRules(DeviceId deviceId, SegmentationId matchVni,
69 + IpAddress srcIP, IpAddress dstIP, MacAddress ethDst,
70 + MacAddress ethSrc, IpAddress ipSrc,
71 + SegmentationId actionVni, Objective.Operation type) {
72 + TrafficSelector selector = DefaultTrafficSelector.builder()
73 + .matchEthType(Ethernet.TYPE_IPV4)
74 + .matchTunnelId(Long.parseLong(matchVni.segmentationId()))
75 + .matchIPSrc(IpPrefix.valueOf(srcIP, PREFIC_LENGTH))
76 + .matchIPDst(IpPrefix.valueOf(dstIP, PREFIC_LENGTH)).build();
77 +
78 + TrafficTreatment.Builder treatment = DefaultTrafficTreatment.builder();
79 + treatment.setEthDst(ethDst).setEthSrc(ethSrc).setIpSrc(ipSrc)
80 + .setTunnelId(Long.parseLong(actionVni.segmentationId()));
81 + ForwardingObjective.Builder objective = DefaultForwardingObjective
82 + .builder().withTreatment(treatment.build())
83 + .withSelector(selector).fromApp(appId).withFlag(Flag.SPECIFIC)
84 + .withPriority(SNAT_SAME_SEG_PRIORITY);
85 + if (type.equals(Objective.Operation.ADD)) {
86 + flowObjectiveService.forward(deviceId, objective.add());
87 + } else {
88 + flowObjectiveService.forward(deviceId, objective.remove());
89 + }
90 + }
91 +
92 + @Override
93 + public void programSnatDiffSegmentRules(DeviceId deviceId, SegmentationId matchVni,
67 IpAddress srcIP, MacAddress ethDst, 94 IpAddress srcIP, MacAddress ethDst,
68 MacAddress ethSrc, IpAddress ipSrc, 95 MacAddress ethSrc, IpAddress ipSrc,
69 SegmentationId actionVni, Objective.Operation type) { 96 SegmentationId actionVni, Objective.Operation type) {
...@@ -78,12 +105,51 @@ public class SnatServiceImpl implements SnatService { ...@@ -78,12 +105,51 @@ public class SnatServiceImpl implements SnatService {
78 ForwardingObjective.Builder objective = DefaultForwardingObjective 105 ForwardingObjective.Builder objective = DefaultForwardingObjective
79 .builder().withTreatment(treatment.build()) 106 .builder().withTreatment(treatment.build())
80 .withSelector(selector).fromApp(appId).withFlag(Flag.SPECIFIC) 107 .withSelector(selector).fromApp(appId).withFlag(Flag.SPECIFIC)
81 - .withPriority(SNAT_PRIORITY); 108 + .withPriority(SNAT_DIFF_SEG_PRIORITY);
109 + if (type.equals(Objective.Operation.ADD)) {
110 + flowObjectiveService.forward(deviceId, objective.add());
111 + } else {
112 + flowObjectiveService.forward(deviceId, objective.remove());
113 + }
114 + }
115 +
116 + @Override
117 + public void programSnatSameSegmentUploadControllerRules(DeviceId deviceId,
118 + SegmentationId matchVni,
119 + IpAddress srcIP,
120 + IpAddress dstIP,
121 + IpPrefix prefix,
122 + Operation type) {
123 +
124 + TrafficSelector selector = DefaultTrafficSelector.builder()
125 + .matchEthType(Ethernet.TYPE_IPV4)
126 + .matchTunnelId(Long.parseLong(matchVni.segmentationId()))
127 + .matchIPSrc(IpPrefix.valueOf(srcIP, PREFIC_LENGTH))
128 + .matchIPDst(IpPrefix.valueOf(dstIP, prefix.prefixLength()))
129 + .build();
130 + TrafficTreatment.Builder treatment = DefaultTrafficTreatment.builder();
131 + treatment.add(Instructions.createOutput(PortNumber.CONTROLLER));
132 + ForwardingObjective.Builder objective = DefaultForwardingObjective
133 + .builder().withTreatment(treatment.build())
134 + .withSelector(selector).fromApp(appId).withFlag(Flag.SPECIFIC)
135 + .withPriority(SNAT_SAME_SEG_CON_PRIORITY);
136 + if (type.equals(Objective.Operation.ADD)) {
137 + flowObjectiveService.forward(deviceId, objective.add());
138 + } else {
139 + flowObjectiveService.forward(deviceId, objective.remove());
140 + }
141 + }
142 +
143 + @Override
144 + public void removeSnatRules(DeviceId deviceId, TrafficSelector selector,
145 + TrafficTreatment treatment, int priority,
146 + Objective.Operation type) {
147 + ForwardingObjective.Builder objective = DefaultForwardingObjective
148 + .builder().withTreatment(treatment).withSelector(selector)
149 + .fromApp(appId).withFlag(Flag.SPECIFIC).withPriority(priority);
82 if (type.equals(Objective.Operation.ADD)) { 150 if (type.equals(Objective.Operation.ADD)) {
83 - log.debug("RouteRules-->ADD");
84 flowObjectiveService.forward(deviceId, objective.add()); 151 flowObjectiveService.forward(deviceId, objective.add());
85 } else { 152 } else {
86 - log.debug("RouteRules-->REMOVE");
87 flowObjectiveService.forward(deviceId, objective.remove()); 153 flowObjectiveService.forward(deviceId, objective.remove());
88 } 154 }
89 } 155 }
......
1 +/*
2 + * Copyright 2016-present Open Networking Laboratory
3 + *
4 + * Licensed under the Apache License, Version 2.0 (the "License");
5 + * you may not use this file except in compliance with the License.
6 + * You may obtain a copy of the License at
7 + *
8 + * http://www.apache.org/licenses/LICENSE-2.0
9 + *
10 + * Unless required by applicable law or agreed to in writing, software
11 + * distributed under the License is distributed on an "AS IS" BASIS,
12 + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 + * See the License for the specific language governing permissions and
14 + * limitations under the License.
15 + */
16 +package org.onosproject.vtn.util;
17 +
18 +import org.onlab.packet.IpAddress;
19 +
20 +/**
21 + * IpUtil utility class.
22 + */
23 +public final class IpUtil {
24 +
25 + private IpUtil() {
26 + }
27 +
28 + /**
29 + * check source Ip and destination Ip in same Subnet.
30 + *
31 + * @param srcIp source Ip
32 + * @param dstIp destination
33 + * @param masks netmask length
34 + * @return boolean
35 + */
36 + public static boolean checkSameSegment(IpAddress srcIp, IpAddress dstIp,
37 + int mask) {
38 + String[] ips = srcIp.toString().split("\\.");
39 + int ipAddr = (Integer.parseInt(ips[0]) << 24)
40 + | (Integer.parseInt(ips[1]) << 16)
41 + | (Integer.parseInt(ips[2]) << 8)
42 + | Integer.parseInt(ips[3]);
43 + int netmask = 0xFFFFFFFF << (32 - mask);
44 + String[] cidrIps = dstIp.toString().split("\\.");
45 + int cidrIpAddr = (Integer.parseInt(cidrIps[0]) << 24)
46 + | (Integer.parseInt(cidrIps[1]) << 16)
47 + | (Integer.parseInt(cidrIps[2]) << 8)
48 + | Integer.parseInt(cidrIps[3]);
49 +
50 + return (ipAddr & netmask) == (cidrIpAddr & netmask);
51 + }
52 +}