blob: 45ed92de4cac3dc8ab2cdbbcaea786d0c1c8e8be [file] [log] [blame]
Thomas Vachuska781d18b2014-10-27 10:31:25 -07001/*
Brian O'Connora09fe5b2017-08-03 21:12:30 -07002 * Copyright 2014-present Open Networking Foundation
Thomas Vachuska781d18b2014-10-27 10:31:25 -07003 *
Thomas Vachuska4f1a60c2014-10-28 13:39:07 -07004 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
Thomas Vachuska781d18b2014-10-27 10:31:25 -07007 *
Thomas Vachuska4f1a60c2014-10-28 13:39:07 -07008 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
Thomas Vachuska781d18b2014-10-27 10:31:25 -070015 */
Brian O'Connorabafb502014-12-02 22:26:20 -080016package org.onosproject.provider.host.impl;
alshabibe1cf87d2014-10-17 09:23:50 -070017
Charles Chan35a32322017-08-14 11:42:11 -070018import com.google.common.collect.Sets;
alshabibe1cf87d2014-10-17 09:23:50 -070019import org.apache.felix.scr.annotations.Activate;
20import org.apache.felix.scr.annotations.Component;
21import org.apache.felix.scr.annotations.Deactivate;
Thomas Vachuska33601602014-11-19 03:32:15 -080022import org.apache.felix.scr.annotations.Modified;
23import org.apache.felix.scr.annotations.Property;
alshabibe1cf87d2014-10-17 09:23:50 -070024import org.apache.felix.scr.annotations.Reference;
25import org.apache.felix.scr.annotations.ReferenceCardinality;
Charles Chan47933752017-11-30 15:37:50 -080026import org.apache.felix.scr.annotations.Service;
Jonathan Harte8600eb2015-01-12 10:30:45 -080027import org.onlab.packet.ARP;
Yi Tsengfcf5dce2017-07-26 14:30:41 -070028import org.onlab.packet.BasePacket;
Charles Chane6067892016-11-17 10:23:46 -080029import org.onlab.packet.DHCP;
Yi Tsengfcf5dce2017-07-26 14:30:41 -070030import org.onlab.packet.DHCP6;
Jonghwan Hyun2c95acf2018-03-14 16:47:34 -070031import org.onlab.packet.EthType;
Jonathan Harte8600eb2015-01-12 10:30:45 -080032import org.onlab.packet.Ethernet;
Pavlin Radoslavovd6612f92015-02-23 13:53:32 -080033import org.onlab.packet.ICMP6;
Thomas Vachuskaf845cf62015-03-24 10:13:09 -070034import org.onlab.packet.IPacket;
Charles Chane6067892016-11-17 10:23:46 -080035import org.onlab.packet.IPv4;
Jonathan Harte8600eb2015-01-12 10:30:45 -080036import org.onlab.packet.IPv6;
Charles Chan35a32322017-08-14 11:42:11 -070037import org.onlab.packet.Ip4Address;
Yi Tsengfcf5dce2017-07-26 14:30:41 -070038import org.onlab.packet.Ip6Address;
Jonathan Harte8600eb2015-01-12 10:30:45 -080039import org.onlab.packet.IpAddress;
Charles M.C. Chan956cb692015-04-26 18:49:39 +080040import org.onlab.packet.MacAddress;
Charles Chane6067892016-11-17 10:23:46 -080041import org.onlab.packet.UDP;
Jonathan Harte8600eb2015-01-12 10:30:45 -080042import org.onlab.packet.VlanId;
Yi Tsengfcf5dce2017-07-26 14:30:41 -070043import org.onlab.packet.dhcp.Dhcp6ClientIdOption;
44import org.onlab.packet.dhcp.Dhcp6IaAddressOption;
45import org.onlab.packet.dhcp.Dhcp6IaNaOption;
46import org.onlab.packet.dhcp.Dhcp6IaTaOption;
47import org.onlab.packet.dhcp.Dhcp6RelayOption;
Charles M.C. Chan956cb692015-04-26 18:49:39 +080048import org.onlab.packet.ipv6.IExtensionHeader;
Jonathan Harte8600eb2015-01-12 10:30:45 -080049import org.onlab.packet.ndp.NeighborAdvertisement;
50import org.onlab.packet.ndp.NeighborSolicitation;
Charles M.C. Chan441d7da2015-03-17 21:03:39 +080051import org.onlab.packet.ndp.RouterAdvertisement;
52import org.onlab.packet.ndp.RouterSolicitation;
Jian Lid9b5f552016-03-11 18:15:31 -080053import org.onlab.util.Tools;
Thomas Vachuska6519e6f2015-03-11 02:29:31 -070054import org.onosproject.cfg.ComponentConfigService;
Pavlin Radoslavovd36a74b2015-01-09 11:59:07 -080055import org.onosproject.core.ApplicationId;
56import org.onosproject.core.CoreService;
Charles Chan47933752017-11-30 15:37:50 -080057import org.onosproject.net.host.HostLocationProbingService;
Ray Milkeyfacf2862017-08-03 11:58:29 -070058import org.onosproject.net.intf.InterfaceService;
Brian O'Connorabafb502014-12-02 22:26:20 -080059import org.onosproject.net.ConnectPoint;
Pavlin Radoslavovd36a74b2015-01-09 11:59:07 -080060import org.onosproject.net.Device;
Charles Chan888e20a2017-05-01 15:44:23 -070061import org.onosproject.net.DeviceId;
Brian O'Connorabafb502014-12-02 22:26:20 -080062import org.onosproject.net.Host;
63import org.onosproject.net.HostId;
64import org.onosproject.net.HostLocation;
65import org.onosproject.net.device.DeviceEvent;
66import org.onosproject.net.device.DeviceListener;
67import org.onosproject.net.device.DeviceService;
Pavlin Radoslavovd36a74b2015-01-09 11:59:07 -080068import org.onosproject.net.flow.DefaultTrafficSelector;
sdn94b00152016-08-30 02:12:32 -070069import org.onosproject.net.flow.DefaultTrafficTreatment;
Pavlin Radoslavovd36a74b2015-01-09 11:59:07 -080070import org.onosproject.net.flow.TrafficSelector;
sdn94b00152016-08-30 02:12:32 -070071import org.onosproject.net.flow.TrafficTreatment;
Brian O'Connorabafb502014-12-02 22:26:20 -080072import org.onosproject.net.host.DefaultHostDescription;
73import org.onosproject.net.host.HostDescription;
74import org.onosproject.net.host.HostProvider;
75import org.onosproject.net.host.HostProviderRegistry;
76import org.onosproject.net.host.HostProviderService;
77import org.onosproject.net.host.HostService;
sdn94b00152016-08-30 02:12:32 -070078import org.onosproject.net.packet.DefaultOutboundPacket;
79import org.onosproject.net.packet.OutboundPacket;
Brian O'Connorabafb502014-12-02 22:26:20 -080080import org.onosproject.net.packet.PacketContext;
Jonathan Hart3cfce8e2015-01-14 16:43:27 -080081import org.onosproject.net.packet.PacketPriority;
Brian O'Connorabafb502014-12-02 22:26:20 -080082import org.onosproject.net.packet.PacketProcessor;
83import org.onosproject.net.packet.PacketService;
84import org.onosproject.net.provider.AbstractProvider;
85import org.onosproject.net.provider.ProviderId;
86import org.onosproject.net.topology.Topology;
87import org.onosproject.net.topology.TopologyService;
Thomas Vachuska33601602014-11-19 03:32:15 -080088import org.osgi.service.component.ComponentContext;
alshabibe1cf87d2014-10-17 09:23:50 -070089import org.slf4j.Logger;
90
sdn94b00152016-08-30 02:12:32 -070091import java.nio.ByteBuffer;
Thomas Vachuskaf845cf62015-03-24 10:13:09 -070092import java.util.Dictionary;
Yi Tseng7a38f9a2017-06-09 14:36:40 -070093import java.util.Objects;
94import java.util.Optional;
Madan Jampania3770c32015-12-11 12:07:41 -080095import java.util.concurrent.ExecutorService;
Charles Chanbb86b782017-09-13 16:14:22 -070096import java.util.concurrent.Executors;
97import java.util.concurrent.ScheduledExecutorService;
98import java.util.concurrent.TimeUnit;
Yi Tseng7a38f9a2017-06-09 14:36:40 -070099import java.util.stream.Stream;
Charles Chan35a32322017-08-14 11:42:11 -0700100import java.util.Set;
Thomas Vachuskaf845cf62015-03-24 10:13:09 -0700101
Madan Jampania3770c32015-12-11 12:07:41 -0800102import static java.util.concurrent.Executors.newSingleThreadScheduledExecutor;
103import static org.onlab.util.Tools.groupedThreads;
Thomas Vachuskaf845cf62015-03-24 10:13:09 -0700104import static org.slf4j.LoggerFactory.getLogger;
105
alshabibe1cf87d2014-10-17 09:23:50 -0700106/**
Thomas Vachuskaec9c7dd2015-09-03 18:30:04 -0700107 * Provider which uses an OpenFlow controller to detect network end-station
108 * hosts.
alshabibe1cf87d2014-10-17 09:23:50 -0700109 */
110@Component(immediate = true)
Charles Chan47933752017-11-30 15:37:50 -0800111@Service
112public class HostLocationProvider extends AbstractProvider implements HostProvider, HostLocationProbingService {
alshabibe1cf87d2014-10-17 09:23:50 -0700113 private final Logger log = getLogger(getClass());
114
Pavlin Radoslavovd36a74b2015-01-09 11:59:07 -0800115 @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY)
116 protected CoreService coreService;
117
118 @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY)
alshabibe1cf87d2014-10-17 09:23:50 -0700119 protected HostProviderRegistry providerRegistry;
120
121 @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY)
Pavlin Radoslavovd6612f92015-02-23 13:53:32 -0800122 protected PacketService packetService;
alshabibe1cf87d2014-10-17 09:23:50 -0700123
124 @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY)
125 protected TopologyService topologyService;
126
Thomas Vachuska33601602014-11-19 03:32:15 -0800127 @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY)
128 protected HostService hostService;
129
130 @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY)
131 protected DeviceService deviceService;
132
Thomas Vachuska6519e6f2015-03-11 02:29:31 -0700133 @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY)
134 protected ComponentConfigService cfgService;
135
Yi Tseng7a38f9a2017-06-09 14:36:40 -0700136 @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY)
137 protected InterfaceService interfaceService;
138
alshabibe1cf87d2014-10-17 09:23:50 -0700139 private HostProviderService providerService;
140
141 private final InternalHostProvider processor = new InternalHostProvider();
Thomas Vachuska33601602014-11-19 03:32:15 -0800142 private final DeviceListener deviceListener = new InternalDeviceListener();
143
Pavlin Radoslavovd36a74b2015-01-09 11:59:07 -0800144 private ApplicationId appId;
145
Thomas Vachuska33601602014-11-19 03:32:15 -0800146 @Property(name = "hostRemovalEnabled", boolValue = true,
147 label = "Enable host removal on port/device down events")
148 private boolean hostRemovalEnabled = true;
alshabibe1cf87d2014-10-17 09:23:50 -0700149
Yi Tseng7a38f9a2017-06-09 14:36:40 -0700150 @Property(name = "requestArp", boolValue = true,
151 label = "Request ARP packets for neighbor discovery by the " +
Charles Chane6067892016-11-17 10:23:46 -0800152 "Host Location Provider; default is true")
Yi Tseng7a38f9a2017-06-09 14:36:40 -0700153 private boolean requestArp = true;
Charles Chane6067892016-11-17 10:23:46 -0800154
Yi Tseng7a38f9a2017-06-09 14:36:40 -0700155 @Property(name = "requestIpv6ND", boolValue = false,
156 label = "Requests IPv6 Neighbor Discovery by the " +
Thomas Vachuska27bee092015-06-23 19:03:10 -0700157 "Host Location Provider; default is false")
Yi Tseng7a38f9a2017-06-09 14:36:40 -0700158 private boolean requestIpv6ND = false;
Charles Chane6067892016-11-17 10:23:46 -0800159
160 @Property(name = "useDhcp", boolValue = false,
Yi Tsengaa417a62017-09-08 17:22:51 -0700161 label = "Use DHCP to update IP address of the host; default is false")
Charles Chane6067892016-11-17 10:23:46 -0800162 private boolean useDhcp = false;
alshabibe1cf87d2014-10-17 09:23:50 -0700163
Yi Tsengfcf5dce2017-07-26 14:30:41 -0700164 @Property(name = "useDhcp6", boolValue = false,
Yi Tsengaa417a62017-09-08 17:22:51 -0700165 label = "Use DHCPv6 to update IP address of the host; default is false")
Yi Tsengfcf5dce2017-07-26 14:30:41 -0700166 private boolean useDhcp6 = false;
167
Jonathan Hart9af322d2016-01-06 17:42:04 -0800168 @Property(name = "requestInterceptsEnabled", boolValue = true,
169 label = "Enable requesting packet intercepts")
170 private boolean requestInterceptsEnabled = true;
171
Charles Chan35a32322017-08-14 11:42:11 -0700172 @Property(name = "multihomingEnabled", boolValue = false,
173 label = "Allow hosts to be multihomed")
174 private boolean multihomingEnabled = false;
Madan Jampania3770c32015-12-11 12:07:41 -0800175
Charles Chan47933752017-11-30 15:37:50 -0800176 private int probeInitDelayMs = 1000;
177
Charles Chan35a32322017-08-14 11:42:11 -0700178 protected ExecutorService eventHandler;
sdn94b00152016-08-30 02:12:32 -0700179
Charles Chan8277b6b2017-12-03 13:48:46 -0800180 private int probeDelayMs = 1000;
181
alshabibe1cf87d2014-10-17 09:23:50 -0700182 /**
183 * Creates an OpenFlow host provider.
184 */
185 public HostLocationProvider() {
Brian O'Connorabafb502014-12-02 22:26:20 -0800186 super(new ProviderId("of", "org.onosproject.provider.host"));
alshabibe1cf87d2014-10-17 09:23:50 -0700187 }
188
189 @Activate
Thomas Vachuska33601602014-11-19 03:32:15 -0800190 public void activate(ComponentContext context) {
Thomas Vachuska6519e6f2015-03-11 02:29:31 -0700191 cfgService.registerProperties(getClass());
192 appId = coreService.registerApplication("org.onosproject.provider.host");
Jonathan Hart9af322d2016-01-06 17:42:04 -0800193 eventHandler = newSingleThreadScheduledExecutor(
HIGUCHI Yutad9e01052016-04-14 09:31:42 -0700194 groupedThreads("onos/host-loc-provider", "event-handler", log));
alshabibe1cf87d2014-10-17 09:23:50 -0700195 providerService = providerRegistry.register(this);
Brian O'Connor3b783262015-07-29 17:49:24 -0700196 packetService.addProcessor(processor, PacketProcessor.advisor(1));
Thomas Vachuska33601602014-11-19 03:32:15 -0800197 deviceService.addListener(deviceListener);
Jonathan Hart9af322d2016-01-06 17:42:04 -0800198
199 modified(context);
Jonathan Hart3cfce8e2015-01-14 16:43:27 -0800200
Charles M.C. Chane148de82015-05-06 12:38:21 +0800201 log.info("Started with Application ID {}", appId.id());
202 }
203
204 @Deactivate
205 public void deactivate() {
Charles M.C. Chane148de82015-05-06 12:38:21 +0800206 cfgService.unregisterProperties(getClass(), false);
Thomas Vachuska27bee092015-06-23 19:03:10 -0700207
208 withdrawIntercepts();
209
Charles M.C. Chane148de82015-05-06 12:38:21 +0800210 providerRegistry.unregister(this);
211 packetService.removeProcessor(processor);
212 deviceService.removeListener(deviceListener);
Madan Jampania3770c32015-12-11 12:07:41 -0800213 eventHandler.shutdown();
Charles M.C. Chane148de82015-05-06 12:38:21 +0800214 providerService = null;
215 log.info("Stopped");
216 }
217
218 @Modified
219 public void modified(ComponentContext context) {
Charles M.C. Chane148de82015-05-06 12:38:21 +0800220 readComponentConfiguration(context);
Jonathan Hart9af322d2016-01-06 17:42:04 -0800221
222 if (requestInterceptsEnabled) {
223 requestIntercepts();
224 } else {
225 withdrawIntercepts();
226 }
Charles M.C. Chane148de82015-05-06 12:38:21 +0800227 }
228
229 /**
Thomas Vachuska27bee092015-06-23 19:03:10 -0700230 * Request packet intercepts.
Charles M.C. Chane148de82015-05-06 12:38:21 +0800231 */
Thomas Vachuska27bee092015-06-23 19:03:10 -0700232 private void requestIntercepts() {
Charles Chane6067892016-11-17 10:23:46 -0800233 // Use ARP
234 TrafficSelector arpSelector = DefaultTrafficSelector.builder()
235 .matchEthType(Ethernet.TYPE_ARP)
236 .build();
Yi Tseng7a38f9a2017-06-09 14:36:40 -0700237 if (requestArp) {
Charles Chane6067892016-11-17 10:23:46 -0800238 packetService.requestPackets(arpSelector, PacketPriority.CONTROL, appId);
Thomas Vachuska27bee092015-06-23 19:03:10 -0700239 } else {
Charles Chane6067892016-11-17 10:23:46 -0800240 packetService.cancelPackets(arpSelector, PacketPriority.CONTROL, appId);
Pavlin Radoslavov93b606b2015-02-25 17:28:39 -0800241 }
Thomas Vachuska27bee092015-06-23 19:03:10 -0700242
Charles Chane6067892016-11-17 10:23:46 -0800243 // Use IPv6 Neighbor Discovery
244 TrafficSelector ipv6NsSelector = DefaultTrafficSelector.builder()
245 .matchEthType(Ethernet.TYPE_IPV6)
246 .matchIPProtocol(IPv6.PROTOCOL_ICMP6)
247 .matchIcmpv6Type(ICMP6.NEIGHBOR_SOLICITATION)
248 .build();
249 TrafficSelector ipv6NaSelector = DefaultTrafficSelector.builder()
250 .matchEthType(Ethernet.TYPE_IPV6)
251 .matchIPProtocol(IPv6.PROTOCOL_ICMP6)
252 .matchIcmpv6Type(ICMP6.NEIGHBOR_ADVERTISEMENT)
253 .build();
Yi Tseng7a38f9a2017-06-09 14:36:40 -0700254 if (requestIpv6ND) {
Charles Chane6067892016-11-17 10:23:46 -0800255 packetService.requestPackets(ipv6NsSelector, PacketPriority.CONTROL, appId);
256 packetService.requestPackets(ipv6NaSelector, PacketPriority.CONTROL, appId);
Thomas Vachuska27bee092015-06-23 19:03:10 -0700257 } else {
Charles Chane6067892016-11-17 10:23:46 -0800258 packetService.cancelPackets(ipv6NsSelector, PacketPriority.CONTROL, appId);
259 packetService.cancelPackets(ipv6NaSelector, PacketPriority.CONTROL, appId);
260 }
Thomas Vachuska27bee092015-06-23 19:03:10 -0700261 }
262
263 /**
264 * Withdraw packet intercepts.
265 */
266 private void withdrawIntercepts() {
267 TrafficSelector.Builder selector = DefaultTrafficSelector.builder();
268 selector.matchEthType(Ethernet.TYPE_ARP);
Aaron Kruglikov07a923d2015-07-03 13:30:57 -0700269 packetService.cancelPackets(selector.build(), PacketPriority.CONTROL, appId);
Thomas Vachuska27bee092015-06-23 19:03:10 -0700270
271 // IPv6 Neighbor Solicitation packet.
272 selector.matchEthType(Ethernet.TYPE_IPV6);
273 selector.matchIPProtocol(IPv6.PROTOCOL_ICMP6);
274 selector.matchIcmpv6Type(ICMP6.NEIGHBOR_SOLICITATION);
275 packetService.cancelPackets(selector.build(), PacketPriority.CONTROL, appId);
276
277 // IPv6 Neighbor Advertisement packet.
278 selector.matchIcmpv6Type(ICMP6.NEIGHBOR_ADVERTISEMENT);
279 packetService.cancelPackets(selector.build(), PacketPriority.CONTROL, appId);
Pavlin Radoslavov93b606b2015-02-25 17:28:39 -0800280 }
281
282 /**
283 * Extracts properties from the component configuration context.
284 *
285 * @param context the component context
286 */
287 private void readComponentConfiguration(ComponentContext context) {
288 Dictionary<?, ?> properties = context.getProperties();
289 Boolean flag;
290
Jian Lid9b5f552016-03-11 18:15:31 -0800291 flag = Tools.isPropertyEnabled(properties, "hostRemovalEnabled");
Pavlin Radoslavov93b606b2015-02-25 17:28:39 -0800292 if (flag == null) {
293 log.info("Host removal on port/device down events is not configured, " +
Yi Tseng7a38f9a2017-06-09 14:36:40 -0700294 "using current value of {}", hostRemovalEnabled);
Pavlin Radoslavov93b606b2015-02-25 17:28:39 -0800295 } else {
296 hostRemovalEnabled = flag;
297 log.info("Configured. Host removal on port/device down events is {}",
298 hostRemovalEnabled ? "enabled" : "disabled");
Thomas Vachuska33601602014-11-19 03:32:15 -0800299 }
Pavlin Radoslavov93b606b2015-02-25 17:28:39 -0800300
Yi Tseng7a38f9a2017-06-09 14:36:40 -0700301 flag = Tools.isPropertyEnabled(properties, "requestArp");
Charles Chane6067892016-11-17 10:23:46 -0800302 if (flag == null) {
303 log.info("Using ARP is not configured, " +
Yi Tseng7a38f9a2017-06-09 14:36:40 -0700304 "using current value of {}", requestArp);
Charles Chane6067892016-11-17 10:23:46 -0800305 } else {
Yi Tseng7a38f9a2017-06-09 14:36:40 -0700306 requestArp = flag;
Charles Chane6067892016-11-17 10:23:46 -0800307 log.info("Configured. Using ARP is {}",
Yi Tseng7a38f9a2017-06-09 14:36:40 -0700308 requestArp ? "enabled" : "disabled");
Charles Chane6067892016-11-17 10:23:46 -0800309 }
310
Yi Tseng7a38f9a2017-06-09 14:36:40 -0700311 flag = Tools.isPropertyEnabled(properties, "requestIpv6ND");
Pavlin Radoslavov93b606b2015-02-25 17:28:39 -0800312 if (flag == null) {
313 log.info("Using IPv6 Neighbor Discovery is not configured, " +
Yi Tseng7a38f9a2017-06-09 14:36:40 -0700314 "using current value of {}", requestIpv6ND);
Pavlin Radoslavov93b606b2015-02-25 17:28:39 -0800315 } else {
Yi Tseng7a38f9a2017-06-09 14:36:40 -0700316 requestIpv6ND = flag;
Pavlin Radoslavov93b606b2015-02-25 17:28:39 -0800317 log.info("Configured. Using IPv6 Neighbor Discovery is {}",
Yi Tseng7a38f9a2017-06-09 14:36:40 -0700318 requestIpv6ND ? "enabled" : "disabled");
Charles Chane6067892016-11-17 10:23:46 -0800319 }
320
321 flag = Tools.isPropertyEnabled(properties, "useDhcp");
322 if (flag == null) {
323 log.info("Using DHCP is not configured, " +
Yi Tseng7a38f9a2017-06-09 14:36:40 -0700324 "using current value of {}", useDhcp);
Charles Chane6067892016-11-17 10:23:46 -0800325 } else {
326 useDhcp = flag;
327 log.info("Configured. Using DHCP is {}",
Yi Tseng7a38f9a2017-06-09 14:36:40 -0700328 useDhcp ? "enabled" : "disabled");
Pavlin Radoslavov93b606b2015-02-25 17:28:39 -0800329 }
Jonathan Hart9af322d2016-01-06 17:42:04 -0800330
Jian Lid9b5f552016-03-11 18:15:31 -0800331 flag = Tools.isPropertyEnabled(properties, "requestInterceptsEnabled");
Jonathan Hart9af322d2016-01-06 17:42:04 -0800332 if (flag == null) {
333 log.info("Request intercepts is not configured, " +
Yi Tseng7a38f9a2017-06-09 14:36:40 -0700334 "using current value of {}", requestInterceptsEnabled);
Jonathan Hart9af322d2016-01-06 17:42:04 -0800335 } else {
336 requestInterceptsEnabled = flag;
337 log.info("Configured. Request intercepts is {}",
Yi Tseng7a38f9a2017-06-09 14:36:40 -0700338 requestInterceptsEnabled ? "enabled" : "disabled");
Jonathan Hart9af322d2016-01-06 17:42:04 -0800339 }
Charles Chan35a32322017-08-14 11:42:11 -0700340
341 flag = Tools.isPropertyEnabled(properties, "multihomingEnabled");
342 if (flag == null) {
343 log.info("Multihoming is not configured, " +
344 "using current value of {}", multihomingEnabled);
345 } else {
346 multihomingEnabled = flag;
347 log.info("Configured. Multihoming is {}",
348 multihomingEnabled ? "enabled" : "disabled");
349 }
Charles Chan47933752017-11-30 15:37:50 -0800350 }
Charles Chan35a32322017-08-14 11:42:11 -0700351
Charles Chan47933752017-11-30 15:37:50 -0800352 @Override
353 public void probeHostLocation(Host host, ConnectPoint connectPoint, ProbeMode probeMode) {
354 host.ipAddresses().stream().findFirst().ifPresent(ip -> {
355 MacAddress probeMac = providerService.addPendingHostLocation(host.id(), connectPoint, probeMode);
356 log.debug("Constructing {} probe for host {} with {}", probeMode, host.id(), ip);
357 Ethernet probe;
358 if (ip.isIp4()) {
359 probe = ARP.buildArpRequest(probeMac.toBytes(), Ip4Address.ZERO.toOctets(),
360 host.id().mac().toBytes(), ip.toOctets(),
361 host.id().mac().toBytes(), host.id().vlanId().toShort());
362 } else {
363 probe = NeighborSolicitation.buildNdpSolicit(
364 ip.getIp6Address(),
365 Ip6Address.valueOf(IPv6.getLinkLocalAddress(probeMac.toBytes())),
366 ip.getIp6Address(),
367 probeMac,
368 host.id().mac(),
369 host.id().vlanId());
370 }
371
372 // NOTE: delay the probe a little bit to wait for the store synchronization is done
373 ScheduledExecutorService executorService = Executors.newSingleThreadScheduledExecutor();
374 executorService.schedule(() ->
375 sendLocationProbe(probe, connectPoint), probeInitDelayMs, TimeUnit.MILLISECONDS);
376 });
377 }
378
379 /**
380 * Send the probe packet on given port.
381 *
382 * @param probe the probe packet
383 * @param connectPoint the port we want to probe
384 */
385 private void sendLocationProbe(Ethernet probe, ConnectPoint connectPoint) {
386 log.info("Sending probe for host {} on location {} with probeMac {}",
387 probe.getDestinationMAC(), connectPoint, probe.getSourceMAC());
388 TrafficTreatment treatment = DefaultTrafficTreatment.builder().setOutput(connectPoint.port()).build();
389 OutboundPacket outboundPacket = new DefaultOutboundPacket(connectPoint.deviceId(),
390 treatment, ByteBuffer.wrap(probe.serialize()));
391 packetService.emit(outboundPacket);
Pavlin Radoslavov93b606b2015-02-25 17:28:39 -0800392 }
393
alshabibe1cf87d2014-10-17 09:23:50 -0700394 @Override
395 public void triggerProbe(Host host) {
Saurav Dasb0ae6ee2017-03-04 16:08:47 -0800396 //log.info("Triggering probe on device {} ", host);
Jonathan Hartf353e402016-09-23 09:27:36 -0700397
398 // FIXME Disabling host probing for now, because sending packets from a
399 // broadcast MAC address caused problems when two ONOS networks were
400 // interconnected. Host probing should take into account the interface
401 // configuration when determining which source address to use.
402
403 //MastershipRole role = deviceService.getRole(host.location().deviceId());
404 //if (role.equals(MastershipRole.MASTER)) {
405 // host.ipAddresses().forEach(ip -> {
406 // sendProbe(host, ip);
407 // });
408 //} else {
409 // log.info("not the master, master will probe {}");
410 //}
sdn94b00152016-08-30 02:12:32 -0700411 }
412
413 private void sendProbe(Host host, IpAddress targetIp) {
414 Ethernet probePacket = null;
415 if (targetIp.isIp4()) {
416 // IPv4: Use ARP
417 probePacket = buildArpRequest(targetIp, host);
418 } else {
419 // IPv6: Use Neighbor Discovery
Jonathan Hartf353e402016-09-23 09:27:36 -0700420 //TODO need to implement ndp probe
sdn94b00152016-08-30 02:12:32 -0700421 log.info("Triggering probe on device {} ", host);
Ray Milkey74e59132018-01-17 15:24:52 -0800422 return;
sdn94b00152016-08-30 02:12:32 -0700423 }
424
425 TrafficTreatment treatment = DefaultTrafficTreatment.builder().setOutput(host.location().port()).build();
426
427 OutboundPacket outboundPacket = new DefaultOutboundPacket(host.location().deviceId(), treatment,
428 ByteBuffer.wrap(probePacket.serialize()));
429
430 packetService.emit(outboundPacket);
431 }
432
Charles Chan888e20a2017-05-01 15:44:23 -0700433 // This method is using source ip as 0.0.0.0 , to receive the reply even from the sub net hosts.
sdn94b00152016-08-30 02:12:32 -0700434 private Ethernet buildArpRequest(IpAddress targetIp, Host host) {
Charles Chan35a32322017-08-14 11:42:11 -0700435 return ARP.buildArpRequest(MacAddress.BROADCAST.toBytes(), Ip4Address.ZERO.toOctets(),
436 MacAddress.BROADCAST.toBytes(), targetIp.toOctets(),
437 MacAddress.BROADCAST.toBytes(), VlanId.NONE.toShort());
alshabibe1cf87d2014-10-17 09:23:50 -0700438 }
439
440 private class InternalHostProvider implements PacketProcessor {
Charles M.C. Chan956cb692015-04-26 18:49:39 +0800441 /**
Charles Chan888e20a2017-05-01 15:44:23 -0700442 * Create or update host information.
443 * Will not update IP if IP is null, all zero or self-assigned.
Charles M.C. Chan956cb692015-04-26 18:49:39 +0800444 *
Jonghwan Hyun2c95acf2018-03-14 16:47:34 -0700445 * @param hid host ID
446 * @param mac source Mac address
447 * @param vlan VLAN ID
448 * @param innerVlan inner VLAN ID
449 * @param outerTpid outer TPID
450 * @param hloc host location
451 * @param ip source IP address or null if not updating
Charles M.C. Chan956cb692015-04-26 18:49:39 +0800452 */
Jonghwan Hyun2c95acf2018-03-14 16:47:34 -0700453 private void createOrUpdateHost(HostId hid, MacAddress mac, VlanId vlan,
454 VlanId innerVlan, EthType outerTpid,
455 HostLocation hloc, IpAddress ip) {
Charles Chan35a32322017-08-14 11:42:11 -0700456 Set<HostLocation> newLocations = Sets.newHashSet(hloc);
457
458 if (multihomingEnabled) {
459 Host existingHost = hostService.getHost(hid);
460 if (existingHost != null) {
461 Set<HostLocation> prevLocations = existingHost.locations();
Charles Chan35a32322017-08-14 11:42:11 -0700462
Charles Chan653e2ac2017-11-22 14:49:55 -0800463 if (prevLocations.stream().noneMatch(loc -> loc.deviceId().equals(hloc.deviceId()))) {
464 // New location is on a device that we haven't seen before
465 // Could be a dual-home host. Append new location and send out the probe
466 newLocations.addAll(prevLocations);
Charles Chan47933752017-11-30 15:37:50 -0800467 prevLocations.forEach(prevLocation ->
468 probeHostLocation(existingHost, prevLocation, ProbeMode.VERIFY));
Charles Chan653e2ac2017-11-22 14:49:55 -0800469 } else {
470 // Move within the same switch
471 // Simply replace old location that is on the same device
472 prevLocations.stream().filter(loc -> !loc.deviceId().equals(hloc.deviceId()))
473 .forEach(newLocations::add);
Charles Chan35a32322017-08-14 11:42:11 -0700474 }
475 }
476 }
477
Charles Chan888e20a2017-05-01 15:44:23 -0700478 HostDescription desc = ip == null || ip.isZero() || ip.isSelfAssigned() ?
Jonghwan Hyun2c95acf2018-03-14 16:47:34 -0700479 new DefaultHostDescription(mac, vlan, newLocations, Sets.newHashSet(),
480 innerVlan, outerTpid, false) :
481 new DefaultHostDescription(mac, vlan, newLocations, Sets.newHashSet(ip),
482 innerVlan, outerTpid, false);
Sahil Lele3a0cdd52015-07-21 14:16:31 -0700483 try {
Ray Milkeydc083442016-02-22 11:27:57 -0800484 providerService.hostDetected(hid, desc, false);
Sahil Lele3a0cdd52015-07-21 14:16:31 -0700485 } catch (IllegalStateException e) {
486 log.debug("Host {} suppressed", hid);
487 }
Charles M.C. Chan956cb692015-04-26 18:49:39 +0800488 }
alshabibe1cf87d2014-10-17 09:23:50 -0700489
Charles Chane6067892016-11-17 10:23:46 -0800490 /**
Charles Chan888e20a2017-05-01 15:44:23 -0700491 * Updates IP address for an existing host.
Charles Chane6067892016-11-17 10:23:46 -0800492 *
493 * @param hid host ID
494 * @param ip IP address
495 */
Charles Chan888e20a2017-05-01 15:44:23 -0700496 private void updateHostIp(HostId hid, IpAddress ip) {
Charles Chane6067892016-11-17 10:23:46 -0800497 Host host = hostService.getHost(hid);
498 if (host == null) {
Charles Chan35a32322017-08-14 11:42:11 -0700499 log.warn("Fail to update IP for {}. Host does not exist", hid);
Charles Chane6067892016-11-17 10:23:46 -0800500 return;
501 }
502
Charles Chan888e20a2017-05-01 15:44:23 -0700503 HostDescription desc = new DefaultHostDescription(hid.mac(), hid.vlanId(),
Charles Chan35a32322017-08-14 11:42:11 -0700504 host.locations(), Sets.newHashSet(ip), false);
Charles Chane6067892016-11-17 10:23:46 -0800505 try {
506 providerService.hostDetected(hid, desc, false);
507 } catch (IllegalStateException e) {
508 log.debug("Host {} suppressed", hid);
509 }
510 }
511
alshabibe1cf87d2014-10-17 09:23:50 -0700512 @Override
513 public void process(PacketContext context) {
alshabib4a179dc2014-10-17 17:17:01 -0700514 if (context == null) {
515 return;
516 }
alshabibe1cf87d2014-10-17 09:23:50 -0700517
Thomas Vachuskaf845cf62015-03-24 10:13:09 -0700518 Ethernet eth = context.inPacket().parsed();
Jonathan Harte8600eb2015-01-12 10:30:45 -0800519 if (eth == null) {
520 return;
521 }
Jonathan Hartf353e402016-09-23 09:27:36 -0700522
Charles M.C. Chan956cb692015-04-26 18:49:39 +0800523 MacAddress srcMac = eth.getSourceMAC();
Jonathan Hartf353e402016-09-23 09:27:36 -0700524 if (srcMac.isBroadcast() || srcMac.isMulticast()) {
525 return;
526 }
Jonathan Harte8600eb2015-01-12 10:30:45 -0800527
alshabibe1cf87d2014-10-17 09:23:50 -0700528 VlanId vlan = VlanId.vlanId(eth.getVlanID());
Jonghwan Hyun2c95acf2018-03-14 16:47:34 -0700529 VlanId outerVlan = VlanId.vlanId(eth.getQinQVID());
530 VlanId innerVlan = VlanId.NONE;
531 EthType outerTpid = EthType.EtherType.UNKNOWN.ethType();
532 // Set up values for double-tagged hosts
533 if (outerVlan.toShort() != Ethernet.VLAN_UNTAGGED) {
534 innerVlan = vlan;
535 vlan = outerVlan;
536 outerTpid = EthType.EtherType.lookup(eth.getQinQTPID()).ethType();
537 }
alshabibe1cf87d2014-10-17 09:23:50 -0700538 ConnectPoint heardOn = context.inPacket().receivedFrom();
539
Thomas Vachuskaf845cf62015-03-24 10:13:09 -0700540 // If this arrived on control port, bail out.
541 if (heardOn.port().isLogical()) {
542 return;
543 }
544
alshabibe1cf87d2014-10-17 09:23:50 -0700545 // If this is not an edge port, bail out.
546 Topology topology = topologyService.currentTopology();
547 if (topologyService.isInfrastructure(topology, heardOn)) {
548 return;
549 }
550
Thomas Vachuskaec9c7dd2015-09-03 18:30:04 -0700551 HostLocation hloc = new HostLocation(heardOn, System.currentTimeMillis());
alshabibe1cf87d2014-10-17 09:23:50 -0700552 HostId hid = HostId.hostId(eth.getSourceMAC(), vlan);
Charles Chan35a32322017-08-14 11:42:11 -0700553 MacAddress destMac = eth.getDestinationMAC();
554
555 // Receives a location probe. Invalid entry from the cache
556 if (multihomingEnabled && destMac.isOnos() && !MacAddress.NONE.equals(destMac)) {
557 log.info("Receives probe for {}/{} on {}", srcMac, vlan, heardOn);
558 providerService.removePendingHostLocation(destMac);
559 return;
560 }
alshabibe1cf87d2014-10-17 09:23:50 -0700561
Charles M.C. Chan7fee36a2014-12-31 00:19:59 +0800562 // ARP: possible new hosts, update both location and IP
alshabibe1cf87d2014-10-17 09:23:50 -0700563 if (eth.getEtherType() == Ethernet.TYPE_ARP) {
564 ARP arp = (ARP) eth.getPayload();
Pavlin Radoslavovd6612f92015-02-23 13:53:32 -0800565 IpAddress ip = IpAddress.valueOf(IpAddress.Version.INET,
566 arp.getSenderProtocolAddress());
Jonghwan Hyun2c95acf2018-03-14 16:47:34 -0700567 createOrUpdateHost(hid, srcMac, vlan, innerVlan, outerTpid, hloc, ip);
alshabibe1cf87d2014-10-17 09:23:50 -0700568
Charles Chan5d5e0622015-09-25 13:00:06 -0700569 // IPv4: update location only
alshabibe1cf87d2014-10-17 09:23:50 -0700570 } else if (eth.getEtherType() == Ethernet.TYPE_IPV4) {
Yi Tsengaa417a62017-09-08 17:22:51 -0700571 // Update host location
Jonghwan Hyun2c95acf2018-03-14 16:47:34 -0700572 createOrUpdateHost(hid, srcMac, vlan, innerVlan, outerTpid, hloc, null);
Yi Tsengaa417a62017-09-08 17:22:51 -0700573 if (useDhcp) {
574 DHCP dhcp = findDhcp(eth).orElse(null);
575 // DHCP ACK: additionally update IP of DHCP client
576 if (dhcp != null && dhcp.getPacketType().equals(DHCP.MsgType.DHCPACK)) {
577 MacAddress hostMac = MacAddress.valueOf(dhcp.getClientHardwareAddress());
578 VlanId hostVlan = VlanId.vlanId(eth.getVlanID());
579 HostId hostId = HostId.hostId(hostMac, hostVlan);
580 updateHostIp(hostId, IpAddress.valueOf(dhcp.getYourIPAddress()));
Yi Tsengcfa637a2017-07-26 17:24:10 -0700581 }
Charles Chane6067892016-11-17 10:23:46 -0800582 }
Charles Chan5d5e0622015-09-25 13:00:06 -0700583 // NeighborAdvertisement and NeighborSolicitation: possible
584 // new hosts, update both location and IP.
585 //
586 // IPv6: update location only
Charles M.C. Chan7fee36a2014-12-31 00:19:59 +0800587 } else if (eth.getEtherType() == Ethernet.TYPE_IPV6) {
Charles M.C. Chan7fee36a2014-12-31 00:19:59 +0800588 IPv6 ipv6 = (IPv6) eth.getPayload();
Charles M.C. Chan956cb692015-04-26 18:49:39 +0800589 IpAddress ip = IpAddress.valueOf(IpAddress.Version.INET6,
Thomas Vachuska27bee092015-06-23 19:03:10 -0700590 ipv6.getSourceAddress());
Charles M.C. Chan7fee36a2014-12-31 00:19:59 +0800591
Charles M.C. Chan956cb692015-04-26 18:49:39 +0800592 // skip extension headers
593 IPacket pkt = ipv6;
594 while (pkt.getPayload() != null &&
595 pkt.getPayload() instanceof IExtensionHeader) {
596 pkt = pkt.getPayload();
597 }
Charles M.C. Chan9148d2d2015-04-27 03:36:39 +0800598 pkt = pkt.getPayload();
Yi Tsengfcf5dce2017-07-26 14:30:41 -0700599
600 // DHCPv6 protocol
601 DHCP6 dhcp6 = findDhcp6(pkt).orElse(null);
602 if (dhcp6 != null && useDhcp6) {
Jonghwan Hyun2c95acf2018-03-14 16:47:34 -0700603 createOrUpdateHost(hid, srcMac, vlan, innerVlan, outerTpid, hloc, null);
Yi Tsengfcf5dce2017-07-26 14:30:41 -0700604 handleDhcp6(dhcp6, vlan);
605 return;
606 }
607
Charles M.C. Chan9148d2d2015-04-27 03:36:39 +0800608 if (pkt != null && pkt instanceof ICMP6) {
Yi Tsengfcf5dce2017-07-26 14:30:41 -0700609 // Neighbor Discovery Protocol
Charles M.C. Chan956cb692015-04-26 18:49:39 +0800610 pkt = pkt.getPayload();
Charles Chan178b0f52017-10-08 23:51:22 -0400611 if (pkt != null) {
612 // RouterSolicitation, RouterAdvertisement
613 if (pkt instanceof RouterAdvertisement || pkt instanceof RouterSolicitation) {
Charles M.C. Chan441d7da2015-03-17 21:03:39 +0800614 return;
Charles M.C. Chan7fee36a2014-12-31 00:19:59 +0800615 }
Charles Chan178b0f52017-10-08 23:51:22 -0400616 if (pkt instanceof NeighborSolicitation || pkt instanceof NeighborAdvertisement) {
617 // Duplicate Address Detection
618 if (ip.isZero()) {
619 return;
620 }
621 // NeighborSolicitation, NeighborAdvertisement
Jonghwan Hyun2c95acf2018-03-14 16:47:34 -0700622 createOrUpdateHost(hid, srcMac, vlan, innerVlan, outerTpid, hloc, ip);
Charles Chan178b0f52017-10-08 23:51:22 -0400623
624 // Also learn from the target address of NeighborAdvertisement
625 if (pkt instanceof NeighborAdvertisement) {
626 NeighborAdvertisement na = (NeighborAdvertisement) pkt;
627 Ip6Address targetAddr = Ip6Address.valueOf(na.getTargetAddress());
Jonghwan Hyun2c95acf2018-03-14 16:47:34 -0700628 createOrUpdateHost(hid, srcMac, vlan, innerVlan, outerTpid, hloc, targetAddr);
Charles Chan178b0f52017-10-08 23:51:22 -0400629 }
630 return;
631 }
Charles M.C. Chan7fee36a2014-12-31 00:19:59 +0800632 }
Charles M.C. Chan7fee36a2014-12-31 00:19:59 +0800633 }
Charles M.C. Chan956cb692015-04-26 18:49:39 +0800634
Yi Tsengaa417a62017-09-08 17:22:51 -0700635 // multicast, exclude DHCPv6
636 if (eth.isMulticast() && dhcp6 == null) {
Charles M.C. Chan956cb692015-04-26 18:49:39 +0800637 return;
638 }
639
640 // normal IPv6 packets
Jonghwan Hyun2c95acf2018-03-14 16:47:34 -0700641 createOrUpdateHost(hid, srcMac, vlan, innerVlan, outerTpid, hloc, null);
alshabibe1cf87d2014-10-17 09:23:50 -0700642 }
643 }
Yi Tseng7a38f9a2017-06-09 14:36:40 -0700644
Yi Tsengfcf5dce2017-07-26 14:30:41 -0700645 /**
646 * Handles DHCPv6 packet, if message type is ACK, update IP address
647 * according to DHCPv6 payload (IA Address option).
648 *
649 * @param dhcp6 the DHCPv6 payload
650 * @param vlanId the vlan of this packet
651 */
652 private void handleDhcp6(DHCP6 dhcp6, VlanId vlanId) {
653 // extract the relay message if exist
654 while (dhcp6 != null && DHCP6.RELAY_MSG_TYPES.contains(dhcp6.getMsgType())) {
655 dhcp6 = dhcp6.getOptions().stream()
656 .filter(opt -> opt instanceof Dhcp6RelayOption)
657 .map(BasePacket::getPayload)
658 .map(pld -> (DHCP6) pld)
659 .findFirst()
660 .orElse(null);
661 }
662
663 if (dhcp6 == null) {
664 // Can't find dhcp payload
665 log.warn("Can't find dhcp payload from relay message");
666 return;
667 }
668
669 if (dhcp6.getMsgType() != DHCP6.MsgType.REPLY.value()) {
670 // Update IP address only when we received REPLY message
671 return;
672 }
673 Optional<Dhcp6ClientIdOption> clientIdOption = dhcp6.getOptions()
674 .stream()
675 .filter(opt -> opt instanceof Dhcp6ClientIdOption)
676 .map(opt -> (Dhcp6ClientIdOption) opt)
677 .findFirst();
678
679 if (!clientIdOption.isPresent()) {
680 // invalid DHCPv6 option
681 log.warn("Can't find client ID from DHCPv6 {}", dhcp6);
682 return;
683 }
684
685 byte[] linkLayerAddr = clientIdOption.get().getDuid().getLinkLayerAddress();
686 if (linkLayerAddr == null || linkLayerAddr.length != 6) {
687 // No any mac address found
688 log.warn("Can't find client mac from option {}", clientIdOption);
689 return;
690 }
691 MacAddress clientMac = MacAddress.valueOf(linkLayerAddr);
692
693 // Extract IPv6 address from IA NA ot IA TA option
694 Optional<Dhcp6IaNaOption> iaNaOption = dhcp6.getOptions()
695 .stream()
696 .filter(opt -> opt instanceof Dhcp6IaNaOption)
697 .map(opt -> (Dhcp6IaNaOption) opt)
698 .findFirst();
699 Optional<Dhcp6IaTaOption> iaTaOption = dhcp6.getOptions()
700 .stream()
701 .filter(opt -> opt instanceof Dhcp6IaTaOption)
702 .map(opt -> (Dhcp6IaTaOption) opt)
703 .findFirst();
704 Optional<Dhcp6IaAddressOption> iaAddressOption;
705 if (iaNaOption.isPresent()) {
706 iaAddressOption = iaNaOption.get().getOptions().stream()
707 .filter(opt -> opt instanceof Dhcp6IaAddressOption)
708 .map(opt -> (Dhcp6IaAddressOption) opt)
709 .findFirst();
710 } else if (iaTaOption.isPresent()) {
711 iaAddressOption = iaTaOption.get().getOptions().stream()
712 .filter(opt -> opt instanceof Dhcp6IaAddressOption)
713 .map(opt -> (Dhcp6IaAddressOption) opt)
714 .findFirst();
715 } else {
716 iaAddressOption = Optional.empty();
717 }
718 if (iaAddressOption.isPresent()) {
719 Ip6Address ip = iaAddressOption.get().getIp6Address();
720 HostId hostId = HostId.hostId(clientMac, vlanId);
721 updateHostIp(hostId, ip);
722 } else {
723 log.warn("Can't find IPv6 address from DHCPv6 {}", dhcp6);
724 }
725 }
726
Yi Tseng7a38f9a2017-06-09 14:36:40 -0700727 private Optional<DHCP> findDhcp(Ethernet eth) {
728 IPacket pkt = eth.getPayload();
729 return Stream.of(pkt)
730 .filter(Objects::nonNull)
731 .filter(p -> p instanceof IPv4)
732 .map(IPacket::getPayload)
733 .filter(Objects::nonNull)
734 .filter(p -> p instanceof UDP)
735 .map(IPacket::getPayload)
736 .filter(Objects::nonNull)
737 .filter(p -> p instanceof DHCP)
738 .map(p -> (DHCP) p)
739 .findFirst();
740 }
Yi Tsengfcf5dce2017-07-26 14:30:41 -0700741
742 private Optional<DHCP6> findDhcp6(IPacket pkt) {
743 return Stream.of(pkt)
744 .filter(Objects::nonNull)
745 .filter(p -> p instanceof UDP)
746 .map(IPacket::getPayload)
747 .filter(Objects::nonNull)
748 .filter(p -> p instanceof DHCP6)
749 .map(p -> (DHCP6) p)
750 .findFirst();
751 }
alshabibe1cf87d2014-10-17 09:23:50 -0700752 }
Thomas Vachuska33601602014-11-19 03:32:15 -0800753
754 // Auxiliary listener to device events.
755 private class InternalDeviceListener implements DeviceListener {
756 @Override
757 public void event(DeviceEvent event) {
Madan Jampania3770c32015-12-11 12:07:41 -0800758 eventHandler.execute(() -> handleEvent(event));
759 }
760
761 private void handleEvent(DeviceEvent event) {
Pavlin Radoslavovd36a74b2015-01-09 11:59:07 -0800762 Device device = event.subject();
763 switch (event.type()) {
Thomas Vachuska27bee092015-06-23 19:03:10 -0700764 case DEVICE_ADDED:
765 break;
766 case DEVICE_AVAILABILITY_CHANGED:
Charles Chan888e20a2017-05-01 15:44:23 -0700767 if (hostRemovalEnabled && !deviceService.isAvailable(device.id())) {
768 processDeviceDown(device.id());
Thomas Vachuska27bee092015-06-23 19:03:10 -0700769 }
770 break;
771 case DEVICE_SUSPENDED:
772 case DEVICE_UPDATED:
773 // Nothing to do?
774 break;
775 case DEVICE_REMOVED:
776 if (hostRemovalEnabled) {
Charles Chan888e20a2017-05-01 15:44:23 -0700777 processDeviceDown(device.id());
Thomas Vachuska27bee092015-06-23 19:03:10 -0700778 }
779 break;
780 case PORT_ADDED:
781 break;
782 case PORT_UPDATED:
Charles Chan888e20a2017-05-01 15:44:23 -0700783 if (hostRemovalEnabled && !event.port().isEnabled()) {
784 processPortDown(new ConnectPoint(device.id(), event.port().number()));
Thomas Vachuska27bee092015-06-23 19:03:10 -0700785 }
786 break;
787 case PORT_REMOVED:
788 // Nothing to do?
789 break;
790 default:
791 break;
Thomas Vachuska33601602014-11-19 03:32:15 -0800792 }
793 }
794 }
795
Charles Chan888e20a2017-05-01 15:44:23 -0700796 /**
797 * When a device goes down, update the location of affected hosts.
798 *
799 * @param deviceId the device that goes down
800 */
801 private void processDeviceDown(DeviceId deviceId) {
802 hostService.getConnectedHosts(deviceId).forEach(affectedHost -> affectedHost.locations().stream()
803 .filter(hostLocation -> hostLocation.deviceId().equals(deviceId))
804 .forEach(affectedLocation ->
805 providerService.removeLocationFromHost(affectedHost.id(), affectedLocation))
806 );
807 }
808
809 /**
810 * When a port goes down, update the location of affected hosts.
811 *
812 * @param connectPoint the port that goes down
813 */
814 private void processPortDown(ConnectPoint connectPoint) {
815 hostService.getConnectedHosts(connectPoint).forEach(affectedHost ->
816 providerService.removeLocationFromHost(affectedHost.id(), new HostLocation(connectPoint, 0L))
817 );
Thomas Vachuska33601602014-11-19 03:32:15 -0800818 }
819
alshabibe1cf87d2014-10-17 09:23:50 -0700820}