blob: 0e1a88013532716cc1418ae9c0ec3615bd3baa93 [file] [log] [blame]
sangho6a9ff0d2017-03-27 11:23:37 +09001/*
Brian O'Connora09fe5b2017-08-03 21:12:30 -07002 * Copyright 2017-present Open Networking Foundation
sangho6a9ff0d2017-03-27 11:23:37 +09003 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16package org.onosproject.openstacknetworking.impl;
17
Hyunsun Moonae51e732017-04-25 17:46:21 +090018import com.google.common.collect.ImmutableSet;
sangho6a9ff0d2017-03-27 11:23:37 +090019import org.apache.felix.scr.annotations.Activate;
20import org.apache.felix.scr.annotations.Component;
21import org.apache.felix.scr.annotations.Deactivate;
22import org.apache.felix.scr.annotations.Reference;
23import org.apache.felix.scr.annotations.ReferenceCardinality;
24import org.apache.felix.scr.annotations.Service;
25import org.onlab.util.KryoNamespace;
26import org.onosproject.core.ApplicationId;
27import org.onosproject.core.CoreService;
28import org.onosproject.openstacknetworking.api.OpenstackSecurityGroupEvent;
29import org.onosproject.openstacknetworking.api.OpenstackSecurityGroupStore;
30import org.onosproject.openstacknetworking.api.OpenstackSecurityGroupStoreDelegate;
31import org.onosproject.store.AbstractStore;
32import org.onosproject.store.serializers.KryoNamespaces;
33import org.onosproject.store.service.ConsistentMap;
34import org.onosproject.store.service.MapEvent;
35import org.onosproject.store.service.MapEventListener;
36import org.onosproject.store.service.Serializer;
37import org.onosproject.store.service.StorageService;
38import org.onosproject.store.service.Versioned;
39import org.openstack4j.model.network.SecurityGroup;
40import org.openstack4j.model.network.SecurityGroupRule;
41import org.openstack4j.openstack.networking.domain.NeutronSecurityGroup;
42import org.openstack4j.openstack.networking.domain.NeutronSecurityGroupRule;
43import org.slf4j.Logger;
44
Hyunsun Moonae51e732017-04-25 17:46:21 +090045import java.util.Set;
sangho6a9ff0d2017-03-27 11:23:37 +090046import java.util.concurrent.ExecutorService;
Hyunsun Moonae51e732017-04-25 17:46:21 +090047import java.util.stream.Collectors;
sangho6a9ff0d2017-03-27 11:23:37 +090048
49import static com.google.common.base.Preconditions.checkArgument;
50import static java.util.concurrent.Executors.newSingleThreadExecutor;
51import static org.onlab.util.Tools.groupedThreads;
52import static org.onosproject.openstacknetworking.api.Constants.OPENSTACK_NETWORKING_APP_ID;
Jian Li78885a22018-03-02 11:33:02 +090053import static org.onosproject.openstacknetworking.api.OpenstackSecurityGroupEvent.Type.OPENSTACK_SECURITY_GROUP_CREATED;
54import static org.onosproject.openstacknetworking.api.OpenstackSecurityGroupEvent.Type.OPENSTACK_SECURITY_GROUP_REMOVED;
55import static org.onosproject.openstacknetworking.api.OpenstackSecurityGroupEvent.Type.OPENSTACK_SECURITY_GROUP_RULE_CREATED;
56import static org.onosproject.openstacknetworking.api.OpenstackSecurityGroupEvent.Type.OPENSTACK_SECURITY_GROUP_RULE_REMOVED;
sangho6a9ff0d2017-03-27 11:23:37 +090057import static org.slf4j.LoggerFactory.getLogger;
58
59/**
60 * Manages the inventory of OpenStack security group using a {@code ConsistentMap}.
61 *
62 */
63@Service
64@Component(immediate = true)
65public class DistributedSecurityGroupStore
66 extends AbstractStore<OpenstackSecurityGroupEvent, OpenstackSecurityGroupStoreDelegate>
67 implements OpenstackSecurityGroupStore {
68
69 protected final Logger log = getLogger(getClass());
70
71 private static final String ERR_NOT_FOUND = " does not exist";
72 private static final String ERR_DUPLICATE = " already exists";
73
74 private static final KryoNamespace SERIALIZER_SECURITY_GROUP = KryoNamespace.newBuilder()
75 .register(KryoNamespaces.API)
76 .register(SecurityGroup.class)
77 .register(SecurityGroupRule.class)
78 .register(NeutronSecurityGroupRule.class)
79 .register(NeutronSecurityGroup.class)
80 .build();
81
82 @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY)
83 protected CoreService coreService;
84
85 @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY)
86 protected StorageService storageService;
87
88 private final ExecutorService eventExecutor = newSingleThreadExecutor(
89 groupedThreads(this.getClass().getSimpleName(), "event-handler", log));
90
91 private final MapEventListener<String, SecurityGroup> securityGroupMapListener =
92 new OpenstackSecurityGroupMapListener();
sangho6a9ff0d2017-03-27 11:23:37 +090093
94 private ConsistentMap<String, SecurityGroup> osSecurityGroupStore;
sangho6a9ff0d2017-03-27 11:23:37 +090095
96 @Activate
97 protected void activate() {
98 ApplicationId appId = coreService.registerApplication(OPENSTACK_NETWORKING_APP_ID);
99
100 osSecurityGroupStore = storageService.<String, SecurityGroup>consistentMapBuilder()
101 .withSerializer(Serializer.using(SERIALIZER_SECURITY_GROUP))
102 .withName("openstack-securitygroupstore")
103 .withApplicationId(appId)
104 .build();
105 osSecurityGroupStore.addListener(securityGroupMapListener);
106
sangho6a9ff0d2017-03-27 11:23:37 +0900107 log.info("Started");
108 }
109
110 @Deactivate
111 protected void deactivate() {
112 osSecurityGroupStore.removeListener(securityGroupMapListener);
sangho6a9ff0d2017-03-27 11:23:37 +0900113 eventExecutor.shutdown();
114
115 log.info("Stopped");
116 }
117
118 @Override
119 public void createSecurityGroup(SecurityGroup sg) {
120 osSecurityGroupStore.compute(sg.getId(), (id, existing) -> {
121 final String error = sg.getName() + ERR_DUPLICATE;
122 checkArgument(existing == null, error);
123 return sg;
124 });
125 }
126
127 @Override
Hyunsun Moonae51e732017-04-25 17:46:21 +0900128 public void updateSecurityGroup(SecurityGroup sg) {
129 osSecurityGroupStore.compute(sg.getId(), (id, existing) -> {
130 final String error = sg.getName() + ERR_NOT_FOUND;
131 checkArgument(existing != null, error);
132 return sg;
133 });
sangho6a9ff0d2017-03-27 11:23:37 +0900134 }
135
136 @Override
137 public SecurityGroup removeSecurityGroup(String sgId) {
138 Versioned<SecurityGroup> sg = osSecurityGroupStore.remove(sgId);
139 return sg == null ? null : sg.value();
140 }
141
142 @Override
sangho6a9ff0d2017-03-27 11:23:37 +0900143 public SecurityGroup securityGroup(String sgId) {
Jian Li78885a22018-03-02 11:33:02 +0900144 return osSecurityGroupStore.asJavaMap().get(sgId);
sangho6a9ff0d2017-03-27 11:23:37 +0900145 }
146
147 @Override
Hyunsun Moonae51e732017-04-25 17:46:21 +0900148 public Set<SecurityGroup> securityGroups() {
Jian Li78885a22018-03-02 11:33:02 +0900149 return ImmutableSet.copyOf(osSecurityGroupStore.asJavaMap().values());
Hyunsun Moonae51e732017-04-25 17:46:21 +0900150 }
151
152 @Override
153 public void clear() {
154 osSecurityGroupStore.clear();
sangho6a9ff0d2017-03-27 11:23:37 +0900155 }
156
157 private class OpenstackSecurityGroupMapListener implements MapEventListener<String, SecurityGroup> {
158
159 @Override
160 public void event(MapEvent<String, SecurityGroup> event) {
161 switch (event.type()) {
162 case INSERT:
Hyunsun Moonae51e732017-04-25 17:46:21 +0900163 log.debug("OpenStack security group created {}", event.newValue());
sangho6a9ff0d2017-03-27 11:23:37 +0900164 eventExecutor.execute(() ->
165 notifyDelegate(new OpenstackSecurityGroupEvent(
Hyunsun Moonae51e732017-04-25 17:46:21 +0900166 OPENSTACK_SECURITY_GROUP_CREATED,
167 event.newValue().value())));
sangho6a9ff0d2017-03-27 11:23:37 +0900168 break;
Hyunsun Moonae51e732017-04-25 17:46:21 +0900169 case UPDATE:
170 log.debug("OpenStack security group updated {}", event.newValue());
171 eventExecutor.execute(() -> processUpdate(
172 event.oldValue().value(),
173 event.newValue().value()));
174 break;
sangho6a9ff0d2017-03-27 11:23:37 +0900175 case REMOVE:
Hyunsun Moonae51e732017-04-25 17:46:21 +0900176 log.debug("OpenStack security group removed {}", event.newValue());
sangho6a9ff0d2017-03-27 11:23:37 +0900177 eventExecutor.execute(() ->
178 notifyDelegate(new OpenstackSecurityGroupEvent(
Hyunsun Moonae51e732017-04-25 17:46:21 +0900179 OPENSTACK_SECURITY_GROUP_REMOVED,
sangho6a9ff0d2017-03-27 11:23:37 +0900180 event.oldValue().value())));
181 break;
182 default:
183 }
184 }
sangho6a9ff0d2017-03-27 11:23:37 +0900185
Hyunsun Moonae51e732017-04-25 17:46:21 +0900186 private void processUpdate(SecurityGroup oldSg, SecurityGroup newSg) {
187 Set<String> oldSgRuleIds = oldSg.getRules().stream()
188 .map(SecurityGroupRule::getId).collect(Collectors.toSet());
189 Set<String> newSgRuleIds = newSg.getRules().stream()
190 .map(SecurityGroupRule::getId).collect(Collectors.toSet());
sangho6a9ff0d2017-03-27 11:23:37 +0900191
Hyunsun Moonae51e732017-04-25 17:46:21 +0900192 oldSg.getRules().stream().filter(sgRule -> !newSgRuleIds.contains(sgRule.getId()))
193 .forEach(sgRule -> notifyDelegate(new OpenstackSecurityGroupEvent(
194 OPENSTACK_SECURITY_GROUP_RULE_REMOVED, newSg, sgRule)
195 ));
196 newSg.getRules().stream().filter(sgRule -> !oldSgRuleIds.contains(sgRule.getId()))
197 .forEach(sgRule -> notifyDelegate(new OpenstackSecurityGroupEvent(
198 OPENSTACK_SECURITY_GROUP_RULE_CREATED, newSg, sgRule)
199 ));
sangho6a9ff0d2017-03-27 11:23:37 +0900200 }
201 }
202}