blob: d0dbd5f5d4fbde0b6993bfdcd6c886e448fde6f8 [file] [log] [blame]
/*
* Copyright 2014-present Open Networking Foundation
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.onosproject.provider.host.impl;
import com.google.common.collect.Sets;
import org.apache.felix.scr.annotations.Activate;
import org.apache.felix.scr.annotations.Component;
import org.apache.felix.scr.annotations.Deactivate;
import org.apache.felix.scr.annotations.Modified;
import org.apache.felix.scr.annotations.Property;
import org.apache.felix.scr.annotations.Reference;
import org.apache.felix.scr.annotations.ReferenceCardinality;
import org.apache.felix.scr.annotations.Service;
import org.onlab.packet.ARP;
import org.onlab.packet.BasePacket;
import org.onlab.packet.DHCP;
import org.onlab.packet.DHCP6;
import org.onlab.packet.EthType;
import org.onlab.packet.Ethernet;
import org.onlab.packet.ICMP6;
import org.onlab.packet.IPacket;
import org.onlab.packet.IPv4;
import org.onlab.packet.IPv6;
import org.onlab.packet.Ip4Address;
import org.onlab.packet.Ip6Address;
import org.onlab.packet.IpAddress;
import org.onlab.packet.MacAddress;
import org.onlab.packet.UDP;
import org.onlab.packet.VlanId;
import org.onlab.packet.dhcp.Dhcp6ClientIdOption;
import org.onlab.packet.dhcp.Dhcp6IaAddressOption;
import org.onlab.packet.dhcp.Dhcp6IaNaOption;
import org.onlab.packet.dhcp.Dhcp6IaTaOption;
import org.onlab.packet.dhcp.Dhcp6RelayOption;
import org.onlab.packet.ipv6.IExtensionHeader;
import org.onlab.packet.ndp.NeighborAdvertisement;
import org.onlab.packet.ndp.NeighborSolicitation;
import org.onlab.packet.ndp.RouterAdvertisement;
import org.onlab.packet.ndp.RouterSolicitation;
import org.onlab.util.Tools;
import org.onosproject.cfg.ComponentConfigService;
import org.onosproject.core.ApplicationId;
import org.onosproject.core.CoreService;
import org.onosproject.net.host.HostLocationProbingService;
import org.onosproject.net.intf.InterfaceService;
import org.onosproject.net.ConnectPoint;
import org.onosproject.net.Device;
import org.onosproject.net.DeviceId;
import org.onosproject.net.Host;
import org.onosproject.net.HostId;
import org.onosproject.net.HostLocation;
import org.onosproject.net.device.DeviceEvent;
import org.onosproject.net.device.DeviceListener;
import org.onosproject.net.device.DeviceService;
import org.onosproject.net.flow.DefaultTrafficSelector;
import org.onosproject.net.flow.DefaultTrafficTreatment;
import org.onosproject.net.flow.TrafficSelector;
import org.onosproject.net.flow.TrafficTreatment;
import org.onosproject.net.host.DefaultHostDescription;
import org.onosproject.net.host.HostDescription;
import org.onosproject.net.host.HostProvider;
import org.onosproject.net.host.HostProviderRegistry;
import org.onosproject.net.host.HostProviderService;
import org.onosproject.net.host.HostService;
import org.onosproject.net.packet.DefaultOutboundPacket;
import org.onosproject.net.packet.OutboundPacket;
import org.onosproject.net.packet.PacketContext;
import org.onosproject.net.packet.PacketPriority;
import org.onosproject.net.packet.PacketProcessor;
import org.onosproject.net.packet.PacketService;
import org.onosproject.net.provider.AbstractProvider;
import org.onosproject.net.provider.ProviderId;
import org.onosproject.net.topology.Topology;
import org.onosproject.net.topology.TopologyService;
import org.osgi.service.component.ComponentContext;
import org.slf4j.Logger;
import java.nio.ByteBuffer;
import java.util.Dictionary;
import java.util.Objects;
import java.util.Optional;
import java.util.concurrent.ExecutorService;
import java.util.concurrent.ScheduledExecutorService;
import java.util.concurrent.TimeUnit;
import java.util.stream.Stream;
import java.util.Set;
import static java.util.concurrent.Executors.newScheduledThreadPool;
import static java.util.concurrent.Executors.newSingleThreadScheduledExecutor;
import static org.onlab.util.Tools.groupedThreads;
import static org.slf4j.LoggerFactory.getLogger;
/**
* Provider which uses an OpenFlow controller to detect network end-station
* hosts.
*/
@Component(immediate = true)
@Service
public class HostLocationProvider extends AbstractProvider implements HostProvider, HostLocationProbingService {
private final Logger log = getLogger(getClass());
@Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY)
protected CoreService coreService;
@Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY)
protected HostProviderRegistry providerRegistry;
@Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY)
protected PacketService packetService;
@Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY)
protected TopologyService topologyService;
@Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY)
protected HostService hostService;
@Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY)
protected DeviceService deviceService;
@Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY)
protected ComponentConfigService cfgService;
@Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY)
protected InterfaceService interfaceService;
private HostProviderService providerService;
private final InternalHostProvider processor = new InternalHostProvider();
private final DeviceListener deviceListener = new InternalDeviceListener();
private ApplicationId appId;
@Property(name = "hostRemovalEnabled", boolValue = true,
label = "Enable host removal on port/device down events")
private boolean hostRemovalEnabled = true;
@Property(name = "requestArp", boolValue = true,
label = "Request ARP packets for neighbor discovery by the " +
"Host Location Provider; default is true")
private boolean requestArp = true;
@Property(name = "requestIpv6ND", boolValue = false,
label = "Requests IPv6 Neighbor Discovery by the " +
"Host Location Provider; default is false")
private boolean requestIpv6ND = false;
@Property(name = "useDhcp", boolValue = false,
label = "Use DHCP to update IP address of the host; default is false")
private boolean useDhcp = false;
@Property(name = "useDhcp6", boolValue = false,
label = "Use DHCPv6 to update IP address of the host; default is false")
private boolean useDhcp6 = false;
@Property(name = "requestInterceptsEnabled", boolValue = true,
label = "Enable requesting packet intercepts")
private boolean requestInterceptsEnabled = true;
@Property(name = "multihomingEnabled", boolValue = false,
label = "Allow hosts to be multihomed")
private boolean multihomingEnabled = false;
private int probeInitDelayMs = 1000;
ExecutorService eventHandler;
private ScheduledExecutorService hostProber;
/**
* Creates an OpenFlow host provider.
*/
public HostLocationProvider() {
super(new ProviderId("of", "org.onosproject.provider.host"));
}
@Activate
public void activate(ComponentContext context) {
cfgService.registerProperties(getClass());
appId = coreService.registerApplication("org.onosproject.provider.host");
eventHandler = newSingleThreadScheduledExecutor(groupedThreads("onos/host-loc-provider", "event-handler", log));
hostProber = newScheduledThreadPool(32, groupedThreads("onos/host-loc-probe", "%d", log));
providerService = providerRegistry.register(this);
packetService.addProcessor(processor, PacketProcessor.advisor(1));
deviceService.addListener(deviceListener);
modified(context);
log.info("Started with Application ID {}", appId.id());
}
@Deactivate
public void deactivate() {
cfgService.unregisterProperties(getClass(), false);
withdrawIntercepts();
providerRegistry.unregister(this);
packetService.removeProcessor(processor);
deviceService.removeListener(deviceListener);
eventHandler.shutdown();
hostProber.shutdown();
providerService = null;
log.info("Stopped");
}
@Modified
public void modified(ComponentContext context) {
readComponentConfiguration(context);
if (requestInterceptsEnabled) {
requestIntercepts();
} else {
withdrawIntercepts();
}
}
/**
* Request packet intercepts.
*/
private void requestIntercepts() {
// Use ARP
TrafficSelector arpSelector = DefaultTrafficSelector.builder()
.matchEthType(Ethernet.TYPE_ARP)
.build();
if (requestArp) {
packetService.requestPackets(arpSelector, PacketPriority.CONTROL, appId);
} else {
packetService.cancelPackets(arpSelector, PacketPriority.CONTROL, appId);
}
// Use IPv6 Neighbor Discovery
TrafficSelector ipv6NsSelector = DefaultTrafficSelector.builder()
.matchEthType(Ethernet.TYPE_IPV6)
.matchIPProtocol(IPv6.PROTOCOL_ICMP6)
.matchIcmpv6Type(ICMP6.NEIGHBOR_SOLICITATION)
.build();
TrafficSelector ipv6NaSelector = DefaultTrafficSelector.builder()
.matchEthType(Ethernet.TYPE_IPV6)
.matchIPProtocol(IPv6.PROTOCOL_ICMP6)
.matchIcmpv6Type(ICMP6.NEIGHBOR_ADVERTISEMENT)
.build();
if (requestIpv6ND) {
packetService.requestPackets(ipv6NsSelector, PacketPriority.CONTROL, appId);
packetService.requestPackets(ipv6NaSelector, PacketPriority.CONTROL, appId);
} else {
packetService.cancelPackets(ipv6NsSelector, PacketPriority.CONTROL, appId);
packetService.cancelPackets(ipv6NaSelector, PacketPriority.CONTROL, appId);
}
}
/**
* Withdraw packet intercepts.
*/
private void withdrawIntercepts() {
TrafficSelector.Builder selector = DefaultTrafficSelector.builder();
selector.matchEthType(Ethernet.TYPE_ARP);
packetService.cancelPackets(selector.build(), PacketPriority.CONTROL, appId);
// IPv6 Neighbor Solicitation packet.
selector.matchEthType(Ethernet.TYPE_IPV6);
selector.matchIPProtocol(IPv6.PROTOCOL_ICMP6);
selector.matchIcmpv6Type(ICMP6.NEIGHBOR_SOLICITATION);
packetService.cancelPackets(selector.build(), PacketPriority.CONTROL, appId);
// IPv6 Neighbor Advertisement packet.
selector.matchIcmpv6Type(ICMP6.NEIGHBOR_ADVERTISEMENT);
packetService.cancelPackets(selector.build(), PacketPriority.CONTROL, appId);
}
/**
* Extracts properties from the component configuration context.
*
* @param context the component context
*/
private void readComponentConfiguration(ComponentContext context) {
Dictionary<?, ?> properties = context.getProperties();
Boolean flag;
flag = Tools.isPropertyEnabled(properties, "hostRemovalEnabled");
if (flag == null) {
log.info("Host removal on port/device down events is not configured, " +
"using current value of {}", hostRemovalEnabled);
} else {
hostRemovalEnabled = flag;
log.info("Configured. Host removal on port/device down events is {}",
hostRemovalEnabled ? "enabled" : "disabled");
}
flag = Tools.isPropertyEnabled(properties, "requestArp");
if (flag == null) {
log.info("Using ARP is not configured, " +
"using current value of {}", requestArp);
} else {
requestArp = flag;
log.info("Configured. Using ARP is {}",
requestArp ? "enabled" : "disabled");
}
flag = Tools.isPropertyEnabled(properties, "requestIpv6ND");
if (flag == null) {
log.info("Using IPv6 Neighbor Discovery is not configured, " +
"using current value of {}", requestIpv6ND);
} else {
requestIpv6ND = flag;
log.info("Configured. Using IPv6 Neighbor Discovery is {}",
requestIpv6ND ? "enabled" : "disabled");
}
flag = Tools.isPropertyEnabled(properties, "useDhcp");
if (flag == null) {
log.info("Using DHCP is not configured, " +
"using current value of {}", useDhcp);
} else {
useDhcp = flag;
log.info("Configured. Using DHCP is {}",
useDhcp ? "enabled" : "disabled");
}
flag = Tools.isPropertyEnabled(properties, "requestInterceptsEnabled");
if (flag == null) {
log.info("Request intercepts is not configured, " +
"using current value of {}", requestInterceptsEnabled);
} else {
requestInterceptsEnabled = flag;
log.info("Configured. Request intercepts is {}",
requestInterceptsEnabled ? "enabled" : "disabled");
}
flag = Tools.isPropertyEnabled(properties, "multihomingEnabled");
if (flag == null) {
log.info("Multihoming is not configured, " +
"using current value of {}", multihomingEnabled);
} else {
multihomingEnabled = flag;
log.info("Configured. Multihoming is {}",
multihomingEnabled ? "enabled" : "disabled");
}
}
@Override
public void probeHostLocation(Host host, ConnectPoint connectPoint, ProbeMode probeMode) {
host.ipAddresses().stream().findFirst().ifPresent(ip -> {
MacAddress probeMac = providerService.addPendingHostLocation(host.id(), connectPoint, probeMode);
log.debug("Constructing {} probe for host {} with {}", probeMode, host.id(), ip);
Ethernet probe;
if (ip.isIp4()) {
probe = ARP.buildArpRequest(probeMac.toBytes(), Ip4Address.ZERO.toOctets(),
host.id().mac().toBytes(), ip.toOctets(),
host.id().mac().toBytes(), host.id().vlanId().toShort());
} else {
probe = NeighborSolicitation.buildNdpSolicit(
ip.getIp6Address(),
Ip6Address.valueOf(IPv6.getLinkLocalAddress(probeMac.toBytes())),
ip.getIp6Address(),
probeMac,
host.id().mac(),
host.id().vlanId());
}
// NOTE: delay the probe a little bit to wait for the store synchronization is done
hostProber.schedule(() ->
sendLocationProbe(probe, connectPoint), probeInitDelayMs, TimeUnit.MILLISECONDS);
});
}
/**
* Send the probe packet on given port.
*
* @param probe the probe packet
* @param connectPoint the port we want to probe
*/
private void sendLocationProbe(Ethernet probe, ConnectPoint connectPoint) {
log.info("Sending probe for host {} on location {} with probeMac {}",
probe.getDestinationMAC(), connectPoint, probe.getSourceMAC());
TrafficTreatment treatment = DefaultTrafficTreatment.builder().setOutput(connectPoint.port()).build();
OutboundPacket outboundPacket = new DefaultOutboundPacket(connectPoint.deviceId(),
treatment, ByteBuffer.wrap(probe.serialize()));
packetService.emit(outboundPacket);
}
@Override
public void triggerProbe(Host host) {
//log.info("Triggering probe on device {} ", host);
// FIXME Disabling host probing for now, because sending packets from a
// broadcast MAC address caused problems when two ONOS networks were
// interconnected. Host probing should take into account the interface
// configuration when determining which source address to use.
//MastershipRole role = deviceService.getRole(host.location().deviceId());
//if (role.equals(MastershipRole.MASTER)) {
// host.ipAddresses().forEach(ip -> {
// sendProbe(host, ip);
// });
//} else {
// log.info("not the master, master will probe {}");
//}
}
private void sendProbe(Host host, IpAddress targetIp) {
Ethernet probePacket = null;
if (targetIp.isIp4()) {
// IPv4: Use ARP
probePacket = buildArpRequest(targetIp, host);
} else {
// IPv6: Use Neighbor Discovery
//TODO need to implement ndp probe
log.info("Triggering probe on device {} ", host);
return;
}
TrafficTreatment treatment = DefaultTrafficTreatment.builder().setOutput(host.location().port()).build();
OutboundPacket outboundPacket = new DefaultOutboundPacket(host.location().deviceId(), treatment,
ByteBuffer.wrap(probePacket.serialize()));
packetService.emit(outboundPacket);
}
// This method is using source ip as 0.0.0.0 , to receive the reply even from the sub net hosts.
private Ethernet buildArpRequest(IpAddress targetIp, Host host) {
return ARP.buildArpRequest(MacAddress.BROADCAST.toBytes(), Ip4Address.ZERO.toOctets(),
MacAddress.BROADCAST.toBytes(), targetIp.toOctets(),
MacAddress.BROADCAST.toBytes(), VlanId.NONE.toShort());
}
private class InternalHostProvider implements PacketProcessor {
/**
* Create or update host information.
* Will not update IP if IP is null, all zero or self-assigned.
*
* @param hid host ID
* @param mac source Mac address
* @param vlan VLAN ID
* @param innerVlan inner VLAN ID
* @param outerTpid outer TPID
* @param hloc host location
* @param ip source IP address or null if not updating
*/
private void createOrUpdateHost(HostId hid, MacAddress mac, VlanId vlan,
VlanId innerVlan, EthType outerTpid,
HostLocation hloc, IpAddress ip) {
Set<HostLocation> newLocations = Sets.newHashSet(hloc);
if (multihomingEnabled) {
Host existingHost = hostService.getHost(hid);
if (existingHost != null) {
Set<HostLocation> prevLocations = existingHost.locations();
if (prevLocations.stream().noneMatch(loc -> loc.deviceId().equals(hloc.deviceId()))) {
// New location is on a device that we haven't seen before
// Could be a dual-home host. Append new location and send out the probe
newLocations.addAll(prevLocations);
prevLocations.forEach(prevLocation ->
probeHostLocation(existingHost, prevLocation, ProbeMode.VERIFY));
} else {
// Move within the same switch
// Simply replace old location that is on the same device
prevLocations.stream().filter(loc -> !loc.deviceId().equals(hloc.deviceId()))
.forEach(newLocations::add);
}
}
}
HostDescription desc = ip == null || ip.isZero() || ip.isSelfAssigned() ?
new DefaultHostDescription(mac, vlan, newLocations, Sets.newHashSet(),
innerVlan, outerTpid, false) :
new DefaultHostDescription(mac, vlan, newLocations, Sets.newHashSet(ip),
innerVlan, outerTpid, false);
try {
providerService.hostDetected(hid, desc, false);
} catch (IllegalStateException e) {
log.debug("Host {} suppressed", hid);
}
}
/**
* Updates IP address for an existing host.
*
* @param hid host ID
* @param ip IP address
*/
private void updateHostIp(HostId hid, IpAddress ip) {
Host host = hostService.getHost(hid);
if (host == null) {
log.warn("Fail to update IP for {}. Host does not exist", hid);
return;
}
HostDescription desc = new DefaultHostDescription(hid.mac(), hid.vlanId(),
host.locations(), Sets.newHashSet(ip), false);
try {
providerService.hostDetected(hid, desc, false);
} catch (IllegalStateException e) {
log.debug("Host {} suppressed", hid);
}
}
@Override
public void process(PacketContext context) {
if (context == null) {
return;
}
Ethernet eth = context.inPacket().parsed();
if (eth == null) {
return;
}
MacAddress srcMac = eth.getSourceMAC();
if (srcMac.isBroadcast() || srcMac.isMulticast()) {
return;
}
VlanId vlan = VlanId.vlanId(eth.getVlanID());
VlanId outerVlan = VlanId.vlanId(eth.getQinQVID());
VlanId innerVlan = VlanId.NONE;
EthType outerTpid = EthType.EtherType.UNKNOWN.ethType();
// Set up values for double-tagged hosts
if (outerVlan.toShort() != Ethernet.VLAN_UNTAGGED) {
innerVlan = vlan;
vlan = outerVlan;
outerTpid = EthType.EtherType.lookup(eth.getQinQTPID()).ethType();
}
ConnectPoint heardOn = context.inPacket().receivedFrom();
// If this arrived on control port, bail out.
if (heardOn.port().isLogical()) {
return;
}
// If this is not an edge port, bail out.
Topology topology = topologyService.currentTopology();
if (topologyService.isInfrastructure(topology, heardOn)) {
return;
}
HostLocation hloc = new HostLocation(heardOn, System.currentTimeMillis());
HostId hid = HostId.hostId(eth.getSourceMAC(), vlan);
MacAddress destMac = eth.getDestinationMAC();
// Receives a location probe. Invalid entry from the cache
if (multihomingEnabled && destMac.isOnos() && !MacAddress.NONE.equals(destMac)) {
log.info("Receives probe for {}/{} on {}", srcMac, vlan, heardOn);
providerService.removePendingHostLocation(destMac);
return;
}
// ARP: possible new hosts, update both location and IP
if (eth.getEtherType() == Ethernet.TYPE_ARP) {
ARP arp = (ARP) eth.getPayload();
IpAddress ip = IpAddress.valueOf(IpAddress.Version.INET,
arp.getSenderProtocolAddress());
createOrUpdateHost(hid, srcMac, vlan, innerVlan, outerTpid, hloc, ip);
// IPv4: update location only
} else if (eth.getEtherType() == Ethernet.TYPE_IPV4) {
// Update host location
createOrUpdateHost(hid, srcMac, vlan, innerVlan, outerTpid, hloc, null);
if (useDhcp) {
DHCP dhcp = findDhcp(eth).orElse(null);
// DHCP ACK: additionally update IP of DHCP client
if (dhcp != null && dhcp.getPacketType().equals(DHCP.MsgType.DHCPACK)) {
MacAddress hostMac = MacAddress.valueOf(dhcp.getClientHardwareAddress());
VlanId hostVlan = VlanId.vlanId(eth.getVlanID());
HostId hostId = HostId.hostId(hostMac, hostVlan);
updateHostIp(hostId, IpAddress.valueOf(dhcp.getYourIPAddress()));
}
}
// NeighborAdvertisement and NeighborSolicitation: possible
// new hosts, update both location and IP.
//
// IPv6: update location only
} else if (eth.getEtherType() == Ethernet.TYPE_IPV6) {
IPv6 ipv6 = (IPv6) eth.getPayload();
IpAddress ip = IpAddress.valueOf(IpAddress.Version.INET6,
ipv6.getSourceAddress());
// skip extension headers
IPacket pkt = ipv6;
while (pkt.getPayload() != null &&
pkt.getPayload() instanceof IExtensionHeader) {
pkt = pkt.getPayload();
}
pkt = pkt.getPayload();
// DHCPv6 protocol
DHCP6 dhcp6 = findDhcp6(pkt).orElse(null);
if (dhcp6 != null && useDhcp6) {
createOrUpdateHost(hid, srcMac, vlan, innerVlan, outerTpid, hloc, null);
handleDhcp6(dhcp6, vlan);
return;
}
if (pkt != null && pkt instanceof ICMP6) {
// Neighbor Discovery Protocol
pkt = pkt.getPayload();
if (pkt != null) {
// RouterSolicitation, RouterAdvertisement
if (pkt instanceof RouterAdvertisement || pkt instanceof RouterSolicitation) {
return;
}
if (pkt instanceof NeighborSolicitation || pkt instanceof NeighborAdvertisement) {
// Duplicate Address Detection
if (ip.isZero()) {
return;
}
// NeighborSolicitation, NeighborAdvertisement
createOrUpdateHost(hid, srcMac, vlan, innerVlan, outerTpid, hloc, ip);
// Also learn from the target address of NeighborAdvertisement
if (pkt instanceof NeighborAdvertisement) {
NeighborAdvertisement na = (NeighborAdvertisement) pkt;
Ip6Address targetAddr = Ip6Address.valueOf(na.getTargetAddress());
createOrUpdateHost(hid, srcMac, vlan, innerVlan, outerTpid, hloc, targetAddr);
}
return;
}
}
}
// multicast, exclude DHCPv6
if (eth.isMulticast() && dhcp6 == null) {
return;
}
// normal IPv6 packets
createOrUpdateHost(hid, srcMac, vlan, innerVlan, outerTpid, hloc, null);
}
}
/**
* Handles DHCPv6 packet, if message type is ACK, update IP address
* according to DHCPv6 payload (IA Address option).
*
* @param dhcp6 the DHCPv6 payload
* @param vlanId the vlan of this packet
*/
private void handleDhcp6(DHCP6 dhcp6, VlanId vlanId) {
// extract the relay message if exist
while (dhcp6 != null && DHCP6.RELAY_MSG_TYPES.contains(dhcp6.getMsgType())) {
dhcp6 = dhcp6.getOptions().stream()
.filter(opt -> opt instanceof Dhcp6RelayOption)
.map(BasePacket::getPayload)
.map(pld -> (DHCP6) pld)
.findFirst()
.orElse(null);
}
if (dhcp6 == null) {
// Can't find dhcp payload
log.warn("Can't find dhcp payload from relay message");
return;
}
if (dhcp6.getMsgType() != DHCP6.MsgType.REPLY.value()) {
// Update IP address only when we received REPLY message
return;
}
Optional<Dhcp6ClientIdOption> clientIdOption = dhcp6.getOptions()
.stream()
.filter(opt -> opt instanceof Dhcp6ClientIdOption)
.map(opt -> (Dhcp6ClientIdOption) opt)
.findFirst();
if (!clientIdOption.isPresent()) {
// invalid DHCPv6 option
log.warn("Can't find client ID from DHCPv6 {}", dhcp6);
return;
}
byte[] linkLayerAddr = clientIdOption.get().getDuid().getLinkLayerAddress();
if (linkLayerAddr == null || linkLayerAddr.length != 6) {
// No any mac address found
log.warn("Can't find client mac from option {}", clientIdOption);
return;
}
MacAddress clientMac = MacAddress.valueOf(linkLayerAddr);
// Extract IPv6 address from IA NA ot IA TA option
Optional<Dhcp6IaNaOption> iaNaOption = dhcp6.getOptions()
.stream()
.filter(opt -> opt instanceof Dhcp6IaNaOption)
.map(opt -> (Dhcp6IaNaOption) opt)
.findFirst();
Optional<Dhcp6IaTaOption> iaTaOption = dhcp6.getOptions()
.stream()
.filter(opt -> opt instanceof Dhcp6IaTaOption)
.map(opt -> (Dhcp6IaTaOption) opt)
.findFirst();
Optional<Dhcp6IaAddressOption> iaAddressOption;
if (iaNaOption.isPresent()) {
iaAddressOption = iaNaOption.get().getOptions().stream()
.filter(opt -> opt instanceof Dhcp6IaAddressOption)
.map(opt -> (Dhcp6IaAddressOption) opt)
.findFirst();
} else if (iaTaOption.isPresent()) {
iaAddressOption = iaTaOption.get().getOptions().stream()
.filter(opt -> opt instanceof Dhcp6IaAddressOption)
.map(opt -> (Dhcp6IaAddressOption) opt)
.findFirst();
} else {
iaAddressOption = Optional.empty();
}
if (iaAddressOption.isPresent()) {
Ip6Address ip = iaAddressOption.get().getIp6Address();
HostId hostId = HostId.hostId(clientMac, vlanId);
updateHostIp(hostId, ip);
} else {
log.warn("Can't find IPv6 address from DHCPv6 {}", dhcp6);
}
}
private Optional<DHCP> findDhcp(Ethernet eth) {
IPacket pkt = eth.getPayload();
return Stream.of(pkt)
.filter(Objects::nonNull)
.filter(p -> p instanceof IPv4)
.map(IPacket::getPayload)
.filter(Objects::nonNull)
.filter(p -> p instanceof UDP)
.map(IPacket::getPayload)
.filter(Objects::nonNull)
.filter(p -> p instanceof DHCP)
.map(p -> (DHCP) p)
.findFirst();
}
private Optional<DHCP6> findDhcp6(IPacket pkt) {
return Stream.of(pkt)
.filter(Objects::nonNull)
.filter(p -> p instanceof UDP)
.map(IPacket::getPayload)
.filter(Objects::nonNull)
.filter(p -> p instanceof DHCP6)
.map(p -> (DHCP6) p)
.findFirst();
}
}
// Auxiliary listener to device events.
private class InternalDeviceListener implements DeviceListener {
@Override
public void event(DeviceEvent event) {
eventHandler.execute(() -> handleEvent(event));
}
private void handleEvent(DeviceEvent event) {
Device device = event.subject();
switch (event.type()) {
case DEVICE_ADDED:
break;
case DEVICE_AVAILABILITY_CHANGED:
if (hostRemovalEnabled && !deviceService.isAvailable(device.id())) {
processDeviceDown(device.id());
}
break;
case DEVICE_SUSPENDED:
case DEVICE_UPDATED:
// Nothing to do?
break;
case DEVICE_REMOVED:
if (hostRemovalEnabled) {
processDeviceDown(device.id());
}
break;
case PORT_ADDED:
break;
case PORT_UPDATED:
if (hostRemovalEnabled && !event.port().isEnabled()) {
processPortDown(new ConnectPoint(device.id(), event.port().number()));
}
break;
case PORT_REMOVED:
// Nothing to do?
break;
default:
break;
}
}
}
/**
* When a device goes down, update the location of affected hosts.
*
* @param deviceId the device that goes down
*/
private void processDeviceDown(DeviceId deviceId) {
hostService.getConnectedHosts(deviceId).forEach(affectedHost -> affectedHost.locations().stream()
.filter(hostLocation -> hostLocation.deviceId().equals(deviceId))
.forEach(affectedLocation ->
providerService.removeLocationFromHost(affectedHost.id(), affectedLocation))
);
}
/**
* When a port goes down, update the location of affected hosts.
*
* @param connectPoint the port that goes down
*/
private void processPortDown(ConnectPoint connectPoint) {
hostService.getConnectedHosts(connectPoint).forEach(affectedHost ->
providerService.removeLocationFromHost(affectedHost.id(), new HostLocation(connectPoint, 0L))
);
}
}