Added sync and purge security group states

- Added list security groups CLI
- Removed unnecessary security group rule store

Change-Id: I62ac652e0af73c5f771f0caec87acd5dfe4abedd
diff --git a/apps/openstacknetworking/src/main/java/org/onosproject/openstacknetworking/impl/DistributedOpenstackNetworkStore.java b/apps/openstacknetworking/src/main/java/org/onosproject/openstacknetworking/impl/DistributedOpenstackNetworkStore.java
index 453dc01..860f5d0 100644
--- a/apps/openstacknetworking/src/main/java/org/onosproject/openstacknetworking/impl/DistributedOpenstackNetworkStore.java
+++ b/apps/openstacknetworking/src/main/java/org/onosproject/openstacknetworking/impl/DistributedOpenstackNetworkStore.java
@@ -15,8 +15,8 @@
  */
 package org.onosproject.openstacknetworking.impl;
 
+import com.google.common.collect.ImmutableList;
 import com.google.common.collect.ImmutableSet;
-import org.apache.commons.collections.CollectionUtils;
 import org.apache.felix.scr.annotations.Activate;
 import org.apache.felix.scr.annotations.Component;
 import org.apache.felix.scr.annotations.Deactivate;
@@ -53,7 +53,7 @@
 import org.openstack4j.openstack.networking.domain.NeutronSubnet;
 import org.slf4j.Logger;
 
-import java.util.Collection;
+import java.util.List;
 import java.util.Set;
 import java.util.concurrent.ExecutorService;
 import java.util.stream.Collectors;
@@ -358,27 +358,10 @@
                     eventExecutor.execute(() -> {
                         Port oldPort = event.oldValue().value();
                         Port newPort = event.newValue().value();
-
                         notifyDelegate(new OpenstackNetworkEvent(
                                 OPENSTACK_PORT_UPDATED,
                                 network(event.newValue().value().getNetworkId()), newPort));
-
-                        if (!newPort.getSecurityGroups().equals(oldPort.getSecurityGroups())) {
-                            Collection<String> sgToAdd = CollectionUtils.subtract(newPort.getSecurityGroups(),
-                                    oldPort.getSecurityGroups());
-                            if (!sgToAdd.isEmpty()) {
-                                notifyDelegate(new OpenstackNetworkEvent(
-                                        OpenstackNetworkEvent.Type.OPENSTACK_SECURITY_GROUP_ADDED_TO_PORT,
-                                        sgToAdd, newPort));
-                            }
-                            Collection<String> sgToRemove = CollectionUtils.subtract(oldPort.getSecurityGroups(),
-                                    newPort.getSecurityGroups());
-                            if (!sgToRemove.isEmpty()) {
-                                notifyDelegate(new OpenstackNetworkEvent(
-                                        OpenstackNetworkEvent.Type.OPENSTACK_SECURITY_GROUP_REMOVED_FROM_PORT,
-                                        sgToRemove, newPort));
-                            }
-                        }
+                        processSecurityGroupUpdate(oldPort, newPort);
                     });
                     break;
                 case INSERT:
@@ -404,5 +387,24 @@
                     break;
             }
         }
+
+        private void processSecurityGroupUpdate(Port oldPort, Port newPort) {
+            List<String> oldSecurityGroups = oldPort.getSecurityGroups() == null ?
+                    ImmutableList.of() : oldPort.getSecurityGroups();
+            List<String> newSecurityGroups = newPort.getSecurityGroups() == null ?
+                    ImmutableList.of() : newPort.getSecurityGroups();
+
+            oldSecurityGroups.stream()
+                    .filter(sgId -> !newPort.getSecurityGroups().contains(sgId))
+                    .forEach(sgId -> notifyDelegate(new OpenstackNetworkEvent(
+                            OPENSTACK_PORT_SECURITY_GROUP_REMOVED, newPort, sgId
+                    )));
+
+            newSecurityGroups.stream()
+                    .filter(sgId -> !oldPort.getSecurityGroups().contains(sgId))
+                    .forEach(sgId -> notifyDelegate(new OpenstackNetworkEvent(
+                            OPENSTACK_PORT_SECURITY_GROUP_ADDED, newPort, sgId
+                    )));
+        }
     }
 }
diff --git a/apps/openstacknetworking/src/main/java/org/onosproject/openstacknetworking/impl/DistributedSecurityGroupStore.java b/apps/openstacknetworking/src/main/java/org/onosproject/openstacknetworking/impl/DistributedSecurityGroupStore.java
index edbd422..1b83be4 100644
--- a/apps/openstacknetworking/src/main/java/org/onosproject/openstacknetworking/impl/DistributedSecurityGroupStore.java
+++ b/apps/openstacknetworking/src/main/java/org/onosproject/openstacknetworking/impl/DistributedSecurityGroupStore.java
@@ -15,6 +15,7 @@
  */
 package org.onosproject.openstacknetworking.impl;
 
+import com.google.common.collect.ImmutableSet;
 import org.apache.felix.scr.annotations.Activate;
 import org.apache.felix.scr.annotations.Component;
 import org.apache.felix.scr.annotations.Deactivate;
@@ -41,12 +42,15 @@
 import org.openstack4j.openstack.networking.domain.NeutronSecurityGroupRule;
 import org.slf4j.Logger;
 
+import java.util.Set;
 import java.util.concurrent.ExecutorService;
+import java.util.stream.Collectors;
 
 import static com.google.common.base.Preconditions.checkArgument;
 import static java.util.concurrent.Executors.newSingleThreadExecutor;
 import static org.onlab.util.Tools.groupedThreads;
 import static org.onosproject.openstacknetworking.api.Constants.OPENSTACK_NETWORKING_APP_ID;
+import static org.onosproject.openstacknetworking.api.OpenstackSecurityGroupEvent.Type.*;
 import static org.slf4j.LoggerFactory.getLogger;
 
 /**
@@ -83,11 +87,8 @@
 
     private final MapEventListener<String, SecurityGroup> securityGroupMapListener =
             new OpenstackSecurityGroupMapListener();
-    private final MapEventListener<String, SecurityGroupRule> securityGroupRuleMapListener =
-            new OpenstackSecurityGroupRuleMapListener();
 
     private ConsistentMap<String, SecurityGroup> osSecurityGroupStore;
-    private ConsistentMap<String, SecurityGroupRule> osSecurityGroupRuleStore;
 
     @Activate
     protected void activate() {
@@ -100,20 +101,12 @@
                 .build();
         osSecurityGroupStore.addListener(securityGroupMapListener);
 
-        osSecurityGroupRuleStore = storageService.<String, SecurityGroupRule>consistentMapBuilder()
-                .withSerializer(Serializer.using(SERIALIZER_SECURITY_GROUP))
-                .withName("openstack-securitygrouprulestore")
-                .withApplicationId(appId)
-                .build();
-        osSecurityGroupRuleStore.addListener(securityGroupRuleMapListener);
-
         log.info("Started");
     }
 
     @Deactivate
     protected void deactivate() {
         osSecurityGroupStore.removeListener(securityGroupMapListener);
-        osSecurityGroupRuleStore.removeListener(securityGroupRuleMapListener);
         eventExecutor.shutdown();
 
         log.info("Stopped");
@@ -129,9 +122,12 @@
     }
 
     @Override
-    public SecurityGroup updateSecurityGroup(String sgId, SecurityGroup newSg) {
-        Versioned<SecurityGroup> sg = osSecurityGroupStore.replace(sgId, newSg);
-        return sg == null ? null : sg.value();
+    public void updateSecurityGroup(SecurityGroup sg) {
+        osSecurityGroupStore.compute(sg.getId(), (id, existing) -> {
+            final String error = sg.getName() + ERR_NOT_FOUND;
+            checkArgument(existing != null, error);
+            return sg;
+        });
     }
 
     @Override
@@ -141,30 +137,22 @@
     }
 
     @Override
-    public void createSecurityGroupRule(SecurityGroupRule sgRule) {
-        osSecurityGroupRuleStore.compute(sgRule.getId(), (id, existing) -> {
-            final String error = sgRule.getId() + ERR_DUPLICATE;
-            checkArgument(existing == null, error);
-            return sgRule;
-        });
-    }
-
-    @Override
-    public SecurityGroupRule removeSecurityGroupRule(String sgRuleId) {
-        Versioned<SecurityGroupRule> sgRule = osSecurityGroupRuleStore.remove(sgRuleId);
-        return sgRule == null ? null : sgRule.value();
-    }
-
-    @Override
     public SecurityGroup securityGroup(String sgId) {
         Versioned<SecurityGroup> osSg = osSecurityGroupStore.get(sgId);
         return osSg == null ? null : osSg.value();
     }
 
     @Override
-    public SecurityGroupRule securityGroupRule(String sgRuleId) {
-        Versioned<SecurityGroupRule> osSgRule = osSecurityGroupRuleStore.get(sgRuleId);
-        return osSgRule == null ? null : osSgRule.value();
+    public Set<SecurityGroup> securityGroups() {
+        Set<SecurityGroup> osSgs = osSecurityGroupStore.values().stream()
+                .map(Versioned::value)
+                .collect(Collectors.toSet());
+        return ImmutableSet.copyOf(osSgs);
+    }
+
+    @Override
+    public void clear() {
+        osSecurityGroupStore.clear();
     }
 
     private class OpenstackSecurityGroupMapListener implements MapEventListener<String, SecurityGroup> {
@@ -173,47 +161,43 @@
         public void event(MapEvent<String, SecurityGroup> event) {
             switch (event.type()) {
                 case INSERT:
-                    log.debug("Openstack Security Group created {}", event.newValue());
+                    log.debug("OpenStack security group created {}", event.newValue());
                     eventExecutor.execute(() ->
                             notifyDelegate(new OpenstackSecurityGroupEvent(
-                                    OpenstackSecurityGroupEvent.Type.OPENSTACK_SECURITY_GROUP_CREATED,
-                                    securityGroup(event.newValue().value().getId()))));
+                                    OPENSTACK_SECURITY_GROUP_CREATED,
+                                    event.newValue().value())));
                     break;
-
+                case UPDATE:
+                    log.debug("OpenStack security group updated {}", event.newValue());
+                    eventExecutor.execute(() -> processUpdate(
+                            event.oldValue().value(),
+                            event.newValue().value()));
+                    break;
                 case REMOVE:
-                    log.debug("Openstack Security Group removed {}", event.newValue());
+                    log.debug("OpenStack security group removed {}", event.newValue());
                     eventExecutor.execute(() ->
                             notifyDelegate(new OpenstackSecurityGroupEvent(
-                                    OpenstackSecurityGroupEvent.Type.OPENSTACK_SECURITY_GROUP_REMOVED,
+                                    OPENSTACK_SECURITY_GROUP_REMOVED,
                                     event.oldValue().value())));
                     break;
                 default:
             }
         }
-    }
 
-    private class OpenstackSecurityGroupRuleMapListener implements MapEventListener<String, SecurityGroupRule> {
+        private void processUpdate(SecurityGroup oldSg, SecurityGroup newSg) {
+            Set<String> oldSgRuleIds = oldSg.getRules().stream()
+                    .map(SecurityGroupRule::getId).collect(Collectors.toSet());
+            Set<String> newSgRuleIds = newSg.getRules().stream()
+                    .map(SecurityGroupRule::getId).collect(Collectors.toSet());
 
-        @Override
-        public void event(MapEvent<String, SecurityGroupRule> event) {
-            switch (event.type()) {
-                case INSERT:
-                    log.debug("Openstack Security Group Rule created {}", event.newValue());
-                    eventExecutor.execute(() ->
-                            notifyDelegate(new OpenstackSecurityGroupEvent(
-                                    OpenstackSecurityGroupEvent.Type.OPENSTACK_SECURITY_GROUP_RULE_CREATED,
-                                    securityGroupRule(event.newValue().value().getId()))));
-                    break;
-
-                case REMOVE:
-                    log.debug("Openstack Security Group Rule removed {}", event.oldValue());
-                    eventExecutor.execute(() ->
-                            notifyDelegate(new OpenstackSecurityGroupEvent(
-                                    OpenstackSecurityGroupEvent.Type.OPENSTACK_SECURITY_GROUP_RULE_REMOVED,
-                                    event.oldValue().value())));
-                    break;
-                default:
-            }
+            oldSg.getRules().stream().filter(sgRule -> !newSgRuleIds.contains(sgRule.getId()))
+                    .forEach(sgRule -> notifyDelegate(new OpenstackSecurityGroupEvent(
+                            OPENSTACK_SECURITY_GROUP_RULE_REMOVED, newSg, sgRule)
+                    ));
+            newSg.getRules().stream().filter(sgRule -> !oldSgRuleIds.contains(sgRule.getId()))
+                    .forEach(sgRule -> notifyDelegate(new OpenstackSecurityGroupEvent(
+                            OPENSTACK_SECURITY_GROUP_RULE_CREATED, newSg, sgRule)
+                    ));
         }
     }
 }
diff --git a/apps/openstacknetworking/src/main/java/org/onosproject/openstacknetworking/impl/OpenstackSecurityGroupHandler.java b/apps/openstacknetworking/src/main/java/org/onosproject/openstacknetworking/impl/OpenstackSecurityGroupHandler.java
index a3f135b..d6b7492 100644
--- a/apps/openstacknetworking/src/main/java/org/onosproject/openstacknetworking/impl/OpenstackSecurityGroupHandler.java
+++ b/apps/openstacknetworking/src/main/java/org/onosproject/openstacknetworking/impl/OpenstackSecurityGroupHandler.java
@@ -53,7 +53,6 @@
 import org.openstack4j.openstack.networking.domain.NeutronSecurityGroupRule;
 import org.slf4j.Logger;
 
-import java.util.Collection;
 import java.util.Collections;
 import java.util.Objects;
 import java.util.Set;
@@ -84,7 +83,7 @@
     protected MastershipService mastershipService;
 
     @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY)
-    protected OpenstackNetworkService openstackService;
+    protected OpenstackNetworkService osNetService;
 
     @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY)
     protected OpenstackSecurityGroupService securityGroupService;
@@ -113,7 +112,7 @@
         appId = coreService.registerApplication(OPENSTACK_NETWORKING_APP_ID);
         instancePortService.addListener(instancePortListener);
         securityGroupService.addListener(securityGroupListener);
-        openstackService.addListener(portListener);
+        osNetService.addListener(portListener);
 
         log.info("Started");
     }
@@ -122,7 +121,7 @@
     protected void deactivate() {
         instancePortService.removeListener(instancePortListener);
         securityGroupService.removeListener(securityGroupListener);
-        openstackService.removeListener(portListener);
+        osNetService.removeListener(portListener);
         eventExecutor.shutdown();
 
         log.info("Stopped");
@@ -130,13 +129,14 @@
 
     private void setSecurityGroupRules(InstancePort instPort, Port port, boolean install) {
         port.getSecurityGroups().forEach(sgId -> {
-            log.debug("security group rule ID : " + sgId.toString());
             SecurityGroup sg = securityGroupService.securityGroup(sgId);
             if (sg == null) {
                 log.error("Security Group Not Found : {}", sgId);
                 return;
             }
             sg.getRules().forEach(sgRule -> updateSecurityGroupRule(instPort, port, sgRule, install));
+            final String action = install ? "Installed " : "Removed ";
+            log.debug(action + "security group rule ID : " + sgId);
         });
     }
 
@@ -185,7 +185,7 @@
     private Set<InstancePort> getRemoteInstPorts(String tenantId, String sgId) {
         Set<InstancePort> remoteInstPorts;
 
-        remoteInstPorts = openstackService.ports().stream()
+        remoteInstPorts = osNetService.ports().stream()
                 .filter(port -> port.getTenantId().equals(tenantId))
                 .filter(port -> port.getSecurityGroups().contains(sgId))
                 .map(port -> instancePortService.instancePort(port.getId()))
@@ -307,81 +307,78 @@
             switch (event.type()) {
                 case OPENSTACK_INSTANCE_PORT_UPDATED:
                 case OPENSTACK_INSTANCE_PORT_DETECTED:
+                    log.debug("Instance port detected MAC:{} IP:{}",
+                            instPort.macAddress(),
+                            instPort.ipAddress());
                     eventExecutor.execute(() -> {
-                        log.info("Instance port detected MAC:{} IP:{}",
-                                instPort.macAddress(),
-                                instPort.ipAddress());
-                        instPortDetected(event.subject(), openstackService.port(event.subject().portId()));
+                        setSecurityGroupRules(instPort,
+                                osNetService.port(event.subject().portId()),
+                                true);
                     });
                     break;
                 case OPENSTACK_INSTANCE_PORT_VANISHED:
+                    log.debug("Instance port vanished MAC:{} IP:{}",
+                            instPort.macAddress(),
+                            instPort.ipAddress());
                     eventExecutor.execute(() -> {
-                        log.info("Instance port vanished MAC:{} IP:{}",
-                                instPort.macAddress(),
-                                instPort.ipAddress());
-                        instPortRemoved(event.subject(), openstackService.port(event.subject().portId()));
+                        setSecurityGroupRules(instPort,
+                                osNetService.port(event.subject().portId()),
+                                false);
                     });
                     break;
                 default:
                     break;
             }
         }
-
-        private void instPortDetected(InstancePort instPort, Port port) {
-            setSecurityGroupRules(instPort, port, true);
-        }
-
-        private void instPortRemoved(InstancePort instPort, Port port) {
-            setSecurityGroupRules(instPort, port, false);
-        }
     }
 
     private class InternalOpenstackPortListener implements OpenstackNetworkListener {
 
         @Override
         public boolean isRelevant(OpenstackNetworkEvent event) {
-            Port osPort = event.port();
-            if (osPort == null) {
+            if (event.port() == null || !Strings.isNullOrEmpty(event.port().getId())) {
                 return false;
             }
-            return !Strings.isNullOrEmpty(osPort.getId());
+            if (event.securityGroupId() == null ||
+                    securityGroupService.securityGroup(event.securityGroupId()) == null) {
+                return false;
+            }
+            if (instancePortService.instancePort(event.port().getId()) == null) {
+                return false;
+            }
+            return true;
         }
 
         @Override
         public void event(OpenstackNetworkEvent event) {
+            Port osPort = event.port();
+            InstancePort instPort = instancePortService.instancePort(osPort.getId());
+            SecurityGroup osSg = securityGroupService.securityGroup(event.securityGroupId());
+
             switch (event.type()) {
-                case OPENSTACK_SECURITY_GROUP_ADDED_TO_PORT:
-                    securityGroupAddedToPort(event.securityGroupRuleIds(), event.port());
+                case OPENSTACK_PORT_SECURITY_GROUP_ADDED:
+                    eventExecutor.execute(() -> {
+                        osSg.getRules().forEach(sgRule -> {
+                            updateSecurityGroupRule(instPort, osPort, sgRule, true);
+                        });
+                        log.info("Added security group {} to port {}",
+                                event.securityGroupId(), event.port().getId());
+                    });
                     break;
-                case OPENSTACK_SECURITY_GROUP_REMOVED_FROM_PORT:
-                    securityGroupRemovedFromPort(event.securityGroupRuleIds(), event.port());
+                case OPENSTACK_PORT_SECURITY_GROUP_REMOVED:
+                    eventExecutor.execute(() -> {
+                        osSg.getRules().forEach(sgRule -> {
+                            updateSecurityGroupRule(instPort, osPort, sgRule, false);
+                        });
+                        log.info("Removed security group {} from port {}",
+                                event.securityGroupId(), event.port().getId());
+                    });
                     break;
                 default:
+                    // do nothing for the other events
                     break;
             }
         }
-
-        private void securityGroupAddedToPort(Collection<String> sgToAdd, Port osPort) {
-            sgToAdd.forEach(sg -> {
-                InstancePort instPort = instancePortService.instancePort(osPort.getId());
-                if (instPort != null) {
-                    securityGroupService.securityGroup(sg).getRules().stream()
-                            .forEach(sgRule -> updateSecurityGroupRule(instancePortService.instancePort(
-                                    osPort.getId()), osPort, sgRule, true));
-                }
-            });
-        }
-
-        private void securityGroupRemovedFromPort(Collection<String> sgToRemove, Port osPort) {
-            sgToRemove.forEach(sg -> {
-                InstancePort instPort = instancePortService.instancePort(osPort.getId());
-                if (instPort != null) {
-                    securityGroupService.securityGroup(sg).getRules().stream()
-                            .forEach(sgRule -> updateSecurityGroupRule(instancePortService.instancePort(
-                                    osPort.getId()), osPort, sgRule, false));
-                }
-            });
-        }
     }
 
     private class InternalSecurityGroupListener implements OpenstackSecurityGroupListener {
@@ -389,46 +386,53 @@
         @Override
         public void event(OpenstackSecurityGroupEvent event) {
             switch (event.type()) {
-                case OPENSTACK_SECURITY_GROUP_CREATED:
-                case OPENSTACK_SECURITY_GROUP_REMOVED:
-                    break;
                 case OPENSTACK_SECURITY_GROUP_RULE_CREATED:
                     SecurityGroupRule securityGroupRuleToAdd = event.securityGroupRule();
                     eventExecutor.execute(() -> {
-                        log.info("Security group rule detected: ID {}",
-                                securityGroupRuleToAdd.getId());
                         securityGroupRuleAdded(securityGroupRuleToAdd);
+                        log.info("Applied new security group rule {} to ports",
+                                securityGroupRuleToAdd.getId());
                     });
                     break;
 
                 case OPENSTACK_SECURITY_GROUP_RULE_REMOVED:
                     SecurityGroupRule securityGroupRuleToRemove = event.securityGroupRule();
                     eventExecutor.execute(() -> {
-                        log.info("security gorup rule removed: ID {}",
-                                securityGroupRuleToRemove.getId());
                         securityGroupRuleRemoved(securityGroupRuleToRemove);
+                        log.info("Removed security group rule {} from ports",
+                                securityGroupRuleToRemove.getId());
                     });
                     break;
+                case OPENSTACK_SECURITY_GROUP_CREATED:
+                case OPENSTACK_SECURITY_GROUP_REMOVED:
                 default:
+                    // do nothing
+                    break;
             }
         }
 
         private void securityGroupRuleAdded(SecurityGroupRule sgRule) {
-            log.debug("securityGroupRuleAdded : {}" + sgRule);
-
-            openstackService.ports().stream()
+            osNetService.ports().stream()
                     .filter(port -> port.getSecurityGroups().contains(sgRule.getSecurityGroupId()))
-                    .forEach(port -> updateSecurityGroupRule(instancePortService.instancePort(port.getId()),
-                            port, sgRule, true));
+                    .forEach(port -> {
+                        updateSecurityGroupRule(
+                                instancePortService.instancePort(port.getId()),
+                                port, sgRule, true);
+                        log.debug("Applied security group rule {} to port {}",
+                                sgRule.getId(), port.getId());
+                    });
         }
 
         private void securityGroupRuleRemoved(SecurityGroupRule sgRule) {
-            log.debug("securityGroupRuleRemoved : {}" + sgRule);
-
-            openstackService.ports().stream()
+            osNetService.ports().stream()
                     .filter(port -> port.getSecurityGroups().contains(sgRule.getSecurityGroupId()))
-                    .forEach(port -> updateSecurityGroupRule(instancePortService.instancePort(port.getId()),
-                            port, sgRule, false));
+                    .forEach(port -> {
+                        updateSecurityGroupRule(
+                                instancePortService.instancePort(port.getId()),
+                                port, sgRule, false);
+                        log.debug("Removed security group rule {} from port {}",
+                                sgRule.getId(), port.getId());
+                    });
         }
     }
 }
diff --git a/apps/openstacknetworking/src/main/java/org/onosproject/openstacknetworking/impl/OpenstackSecurityGroupManager.java b/apps/openstacknetworking/src/main/java/org/onosproject/openstacknetworking/impl/OpenstackSecurityGroupManager.java
index 678d180..e5d3cda 100644
--- a/apps/openstacknetworking/src/main/java/org/onosproject/openstacknetworking/impl/OpenstackSecurityGroupManager.java
+++ b/apps/openstacknetworking/src/main/java/org/onosproject/openstacknetworking/impl/OpenstackSecurityGroupManager.java
@@ -38,15 +38,16 @@
 import org.slf4j.Logger;
 
 import java.util.List;
+import java.util.Objects;
+import java.util.Set;
 
 import static com.google.common.base.Preconditions.checkArgument;
 import static com.google.common.base.Preconditions.checkNotNull;
 import static org.slf4j.LoggerFactory.getLogger;
 
 /**
- * Provides implementation of administering and interfaceing Openstack security
+ * Provides implementation of administering and interfacing OpenStack security
  * groups.
- *
  */
 @Service
 @Component(immediate = true)
@@ -57,8 +58,7 @@
     protected final Logger log = getLogger(getClass());
 
     private static final String MSG_SG = "OpenStack security group %s %s";
-    private static final String MSG_SG_RULE = "OpenStack security group %s %s";
-
+    private static final String MSG_SG_RULE = "OpenStack security group rule %s %s";
 
     private static final String MSG_CREATED = "created";
     private static final String MSG_REMOVED = "removed";
@@ -67,6 +67,8 @@
     private static final String ERR_NULL_SG_ID = "OpenStack security group ID cannot be null";
     private static final String ERR_NULL_SG_RULE = "OpenStack security group rule cannot be null";
     private static final String ERR_NULL_SG_RULE_ID = "OpenStack security group rule ID cannot be null";
+    private static final String ERR_NOT_FOUND = "not found";
+    private static final String ERR_DUPLICATE = "already exist";
 
     @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY)
     protected CoreService coreService;
@@ -99,6 +101,14 @@
     }
 
     @Override
+    public void updateSecurityGroup(SecurityGroup sg) {
+        checkNotNull(sg, ERR_NULL_SG);
+        checkArgument(!Strings.isNullOrEmpty(sg.getId()), ERR_NULL_SG_ID);
+
+        osSecurityGroupStore.updateSecurityGroup(sg);
+    }
+
+    @Override
     public void removeSecurityGroup(String sgId) {
         checkNotNull(sgId, ERR_NULL_SG_ID);
 
@@ -110,40 +120,84 @@
     public void createSecurityGroupRule(SecurityGroupRule sgRule) {
         checkNotNull(sgRule, ERR_NULL_SG_RULE);
         checkArgument(!Strings.isNullOrEmpty(sgRule.getId()), ERR_NULL_SG_RULE_ID);
+        checkArgument(!Strings.isNullOrEmpty(sgRule.getSecurityGroupId()), ERR_NULL_SG_ID);
 
-        synchronized (osSecurityGroupStore) {
+        synchronized (this) {
             SecurityGroup sg = securityGroup(sgRule.getSecurityGroupId());
-            List sgRules = sg.getRules();
-            sgRules.add(sgRule);
-            SecurityGroup newSg = new NeutronSecurityGroup.SecurityGroupConcreteBuilder().from(sg).build();
-            SecurityGroup oldSg = osSecurityGroupStore.updateSecurityGroup(sgRule.getSecurityGroupId(), newSg);
-            if (oldSg == null) {
-                log.warn("Failed to add the security group rule {} to security group", sgRule.getId());
+            if (sg == null) {
+                final String error = String.format(MSG_SG, sgRule.getSecurityGroupId(), ERR_NOT_FOUND);
+                throw new IllegalStateException(error);
+            }
+            if (sg.getRules().stream().anyMatch(rule -> Objects.equals(rule.getId(), sgRule.getId()))) {
+                final String error = String.format(MSG_SG_RULE,
+                        sgRule.getSecurityGroupId(), ERR_DUPLICATE);
+                throw new IllegalStateException(error);
             }
 
-            osSecurityGroupStore.createSecurityGroupRule(sgRule);
-            log.info(String.format(MSG_SG_RULE, sgRule.getId(), MSG_CREATED));
+            // FIXME we cannot add element to extend list
+            List updatedSgRules = sg.getRules();
+            updatedSgRules.add(sgRule);
+            SecurityGroup updatedSg = NeutronSecurityGroup.builder().from(sg).build();
+            osSecurityGroupStore.updateSecurityGroup(updatedSg);
         }
+
+        log.info(String.format(MSG_SG_RULE, sgRule.getId(), MSG_CREATED));
     }
 
     @Override
     public void removeSecurityGroupRule(String sgRuleId) {
-        checkNotNull(sgRuleId, ERR_NULL_SG_RULE_ID);
+        checkArgument(!Strings.isNullOrEmpty(sgRuleId), ERR_NULL_SG_RULE_ID);
 
-        osSecurityGroupStore.removeSecurityGroupRule(sgRuleId);
+        synchronized (this) {
+            SecurityGroupRule sgRule = securityGroupRule(sgRuleId);
+            if (sgRule == null) {
+                final String error = String.format(MSG_SG_RULE, sgRuleId, ERR_NOT_FOUND);
+                throw new IllegalStateException(error);
+            }
+
+            SecurityGroup sg = securityGroup(sgRule.getSecurityGroupId());
+            if (sg == null) {
+                final String error = String.format(MSG_SG, sgRule.getSecurityGroupId(), ERR_NOT_FOUND);
+                throw new IllegalStateException(error);
+            }
+
+            if (sg.getRules().stream().noneMatch(rule -> Objects.equals(rule.getId(), sgRule.getId()))) {
+                final String error = String.format(MSG_SG_RULE,
+                        sgRule.getSecurityGroupId(), ERR_NOT_FOUND);
+                throw new IllegalStateException(error);
+            }
+
+            // FIXME we cannot handle the element of extend list as a specific class object
+            List updatedSgRules = sg.getRules();
+            updatedSgRules.removeIf(r -> ((SecurityGroupRule) r).getId().equals(sgRuleId));
+            SecurityGroup updatedSg = NeutronSecurityGroup.builder().from(sg).build();
+            osSecurityGroupStore.updateSecurityGroup(updatedSg);
+        }
+
         log.info(String.format(MSG_SG_RULE, sgRuleId, MSG_REMOVED));
     }
 
     @Override
+    public Set<SecurityGroup> securityGroups() {
+        return osSecurityGroupStore.securityGroups();
+    }
+
+    @Override
     public SecurityGroup securityGroup(String sgId) {
         checkArgument(!Strings.isNullOrEmpty(sgId), ERR_NULL_SG_ID);
         return osSecurityGroupStore.securityGroup(sgId);
     }
 
     @Override
-    public SecurityGroupRule securityGroupRule(String sgRuleId) {
-        checkArgument(!Strings.isNullOrEmpty(sgRuleId), ERR_NULL_SG_RULE_ID);
-        return osSecurityGroupStore.securityGroupRule(sgRuleId);
+    public void clear() {
+        osSecurityGroupStore.clear();
+    }
+
+    private SecurityGroupRule securityGroupRule(String sgRuleId) {
+        return osSecurityGroupStore.securityGroups().stream()
+                .flatMap(sg -> sg.getRules().stream())
+                .filter(sgRule -> Objects.equals(sgRule.getId(), sgRuleId))
+                .findFirst().orElse(null);
     }
 
     private class InternalSecurityGroupStoreDelegate implements OpenstackSecurityGroupStoreDelegate {