blob: 0946096a58cd59f2f6c2af25ad852fa652588ac1 [file] [log] [blame]
sangho6a9ff0d2017-03-27 11:23:37 +09001/*
Brian O'Connora09fe5b2017-08-03 21:12:30 -07002 * Copyright 2017-present Open Networking Foundation
sangho6a9ff0d2017-03-27 11:23:37 +09003 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16package org.onosproject.openstacknetworking.impl;
17
Hyunsun Moonae51e732017-04-25 17:46:21 +090018import com.google.common.collect.ImmutableSet;
sangho6a9ff0d2017-03-27 11:23:37 +090019import org.onlab.util.KryoNamespace;
20import org.onosproject.core.ApplicationId;
21import org.onosproject.core.CoreService;
22import org.onosproject.openstacknetworking.api.OpenstackSecurityGroupEvent;
23import org.onosproject.openstacknetworking.api.OpenstackSecurityGroupStore;
24import org.onosproject.openstacknetworking.api.OpenstackSecurityGroupStoreDelegate;
25import org.onosproject.store.AbstractStore;
26import org.onosproject.store.serializers.KryoNamespaces;
27import org.onosproject.store.service.ConsistentMap;
28import org.onosproject.store.service.MapEvent;
29import org.onosproject.store.service.MapEventListener;
30import org.onosproject.store.service.Serializer;
31import org.onosproject.store.service.StorageService;
32import org.onosproject.store.service.Versioned;
33import org.openstack4j.model.network.SecurityGroup;
34import org.openstack4j.model.network.SecurityGroupRule;
35import org.openstack4j.openstack.networking.domain.NeutronSecurityGroup;
36import org.openstack4j.openstack.networking.domain.NeutronSecurityGroupRule;
Ray Milkeyd84f89b2018-08-17 14:54:17 -070037import org.osgi.service.component.annotations.Activate;
38import org.osgi.service.component.annotations.Component;
39import org.osgi.service.component.annotations.Deactivate;
40import org.osgi.service.component.annotations.Reference;
41import org.osgi.service.component.annotations.ReferenceCardinality;
sangho6a9ff0d2017-03-27 11:23:37 +090042import org.slf4j.Logger;
43
Hyunsun Moonae51e732017-04-25 17:46:21 +090044import java.util.Set;
sangho6a9ff0d2017-03-27 11:23:37 +090045import java.util.concurrent.ExecutorService;
Hyunsun Moonae51e732017-04-25 17:46:21 +090046import java.util.stream.Collectors;
sangho6a9ff0d2017-03-27 11:23:37 +090047
48import static com.google.common.base.Preconditions.checkArgument;
49import static java.util.concurrent.Executors.newSingleThreadExecutor;
50import static org.onlab.util.Tools.groupedThreads;
51import static org.onosproject.openstacknetworking.api.Constants.OPENSTACK_NETWORKING_APP_ID;
Jian Li78885a22018-03-02 11:33:02 +090052import static org.onosproject.openstacknetworking.api.OpenstackSecurityGroupEvent.Type.OPENSTACK_SECURITY_GROUP_CREATED;
53import static org.onosproject.openstacknetworking.api.OpenstackSecurityGroupEvent.Type.OPENSTACK_SECURITY_GROUP_REMOVED;
54import static org.onosproject.openstacknetworking.api.OpenstackSecurityGroupEvent.Type.OPENSTACK_SECURITY_GROUP_RULE_CREATED;
55import static org.onosproject.openstacknetworking.api.OpenstackSecurityGroupEvent.Type.OPENSTACK_SECURITY_GROUP_RULE_REMOVED;
sangho6a9ff0d2017-03-27 11:23:37 +090056import static org.slf4j.LoggerFactory.getLogger;
57
58/**
59 * Manages the inventory of OpenStack security group using a {@code ConsistentMap}.
60 *
61 */
Ray Milkeyd84f89b2018-08-17 14:54:17 -070062@Component(immediate = true, service = OpenstackSecurityGroupStore.class)
sangho6a9ff0d2017-03-27 11:23:37 +090063public class DistributedSecurityGroupStore
64 extends AbstractStore<OpenstackSecurityGroupEvent, OpenstackSecurityGroupStoreDelegate>
65 implements OpenstackSecurityGroupStore {
66
67 protected final Logger log = getLogger(getClass());
68
69 private static final String ERR_NOT_FOUND = " does not exist";
70 private static final String ERR_DUPLICATE = " already exists";
71
72 private static final KryoNamespace SERIALIZER_SECURITY_GROUP = KryoNamespace.newBuilder()
73 .register(KryoNamespaces.API)
74 .register(SecurityGroup.class)
75 .register(SecurityGroupRule.class)
76 .register(NeutronSecurityGroupRule.class)
77 .register(NeutronSecurityGroup.class)
78 .build();
79
Ray Milkeyd84f89b2018-08-17 14:54:17 -070080 @Reference(cardinality = ReferenceCardinality.MANDATORY)
sangho6a9ff0d2017-03-27 11:23:37 +090081 protected CoreService coreService;
82
Ray Milkeyd84f89b2018-08-17 14:54:17 -070083 @Reference(cardinality = ReferenceCardinality.MANDATORY)
sangho6a9ff0d2017-03-27 11:23:37 +090084 protected StorageService storageService;
85
86 private final ExecutorService eventExecutor = newSingleThreadExecutor(
87 groupedThreads(this.getClass().getSimpleName(), "event-handler", log));
88
89 private final MapEventListener<String, SecurityGroup> securityGroupMapListener =
90 new OpenstackSecurityGroupMapListener();
sangho6a9ff0d2017-03-27 11:23:37 +090091
92 private ConsistentMap<String, SecurityGroup> osSecurityGroupStore;
sangho6a9ff0d2017-03-27 11:23:37 +090093
94 @Activate
95 protected void activate() {
96 ApplicationId appId = coreService.registerApplication(OPENSTACK_NETWORKING_APP_ID);
97
98 osSecurityGroupStore = storageService.<String, SecurityGroup>consistentMapBuilder()
99 .withSerializer(Serializer.using(SERIALIZER_SECURITY_GROUP))
100 .withName("openstack-securitygroupstore")
101 .withApplicationId(appId)
102 .build();
103 osSecurityGroupStore.addListener(securityGroupMapListener);
104
sangho6a9ff0d2017-03-27 11:23:37 +0900105 log.info("Started");
106 }
107
108 @Deactivate
109 protected void deactivate() {
110 osSecurityGroupStore.removeListener(securityGroupMapListener);
sangho6a9ff0d2017-03-27 11:23:37 +0900111 eventExecutor.shutdown();
112
113 log.info("Stopped");
114 }
115
116 @Override
117 public void createSecurityGroup(SecurityGroup sg) {
118 osSecurityGroupStore.compute(sg.getId(), (id, existing) -> {
119 final String error = sg.getName() + ERR_DUPLICATE;
120 checkArgument(existing == null, error);
121 return sg;
122 });
123 }
124
125 @Override
Hyunsun Moonae51e732017-04-25 17:46:21 +0900126 public void updateSecurityGroup(SecurityGroup sg) {
127 osSecurityGroupStore.compute(sg.getId(), (id, existing) -> {
128 final String error = sg.getName() + ERR_NOT_FOUND;
129 checkArgument(existing != null, error);
130 return sg;
131 });
sangho6a9ff0d2017-03-27 11:23:37 +0900132 }
133
134 @Override
135 public SecurityGroup removeSecurityGroup(String sgId) {
136 Versioned<SecurityGroup> sg = osSecurityGroupStore.remove(sgId);
137 return sg == null ? null : sg.value();
138 }
139
140 @Override
sangho6a9ff0d2017-03-27 11:23:37 +0900141 public SecurityGroup securityGroup(String sgId) {
Jian Li78885a22018-03-02 11:33:02 +0900142 return osSecurityGroupStore.asJavaMap().get(sgId);
sangho6a9ff0d2017-03-27 11:23:37 +0900143 }
144
145 @Override
Hyunsun Moonae51e732017-04-25 17:46:21 +0900146 public Set<SecurityGroup> securityGroups() {
Jian Li78885a22018-03-02 11:33:02 +0900147 return ImmutableSet.copyOf(osSecurityGroupStore.asJavaMap().values());
Hyunsun Moonae51e732017-04-25 17:46:21 +0900148 }
149
150 @Override
151 public void clear() {
152 osSecurityGroupStore.clear();
sangho6a9ff0d2017-03-27 11:23:37 +0900153 }
154
Jian Li5ecfd1a2018-12-10 11:41:03 +0900155 private class OpenstackSecurityGroupMapListener
156 implements MapEventListener<String, SecurityGroup> {
sangho6a9ff0d2017-03-27 11:23:37 +0900157
158 @Override
159 public void event(MapEvent<String, SecurityGroup> event) {
160 switch (event.type()) {
161 case INSERT:
Hyunsun Moonae51e732017-04-25 17:46:21 +0900162 log.debug("OpenStack security group created {}", event.newValue());
Jian Li5ecfd1a2018-12-10 11:41:03 +0900163 eventExecutor.execute(() ->
164 notifyDelegate(new OpenstackSecurityGroupEvent(
Hyunsun Moonae51e732017-04-25 17:46:21 +0900165 OPENSTACK_SECURITY_GROUP_CREATED,
166 event.newValue().value())));
sangho6a9ff0d2017-03-27 11:23:37 +0900167 break;
Hyunsun Moonae51e732017-04-25 17:46:21 +0900168 case UPDATE:
169 log.debug("OpenStack security group updated {}", event.newValue());
170 eventExecutor.execute(() -> processUpdate(
Jian Li6a47fd02018-11-27 21:51:03 +0900171 event.oldValue().value(),
172 event.newValue().value()));
Hyunsun Moonae51e732017-04-25 17:46:21 +0900173 break;
sangho6a9ff0d2017-03-27 11:23:37 +0900174 case REMOVE:
Jian Li9d35bd62018-10-13 01:43:24 +0900175 log.debug("OpenStack security group removed {}", event.oldValue());
Jian Li5ecfd1a2018-12-10 11:41:03 +0900176 eventExecutor.execute(() ->
177 notifyDelegate(new OpenstackSecurityGroupEvent(
Hyunsun Moonae51e732017-04-25 17:46:21 +0900178 OPENSTACK_SECURITY_GROUP_REMOVED,
sangho6a9ff0d2017-03-27 11:23:37 +0900179 event.oldValue().value())));
180 break;
181 default:
182 }
183 }
sangho6a9ff0d2017-03-27 11:23:37 +0900184
Hyunsun Moonae51e732017-04-25 17:46:21 +0900185 private void processUpdate(SecurityGroup oldSg, SecurityGroup newSg) {
186 Set<String> oldSgRuleIds = oldSg.getRules().stream()
187 .map(SecurityGroupRule::getId).collect(Collectors.toSet());
188 Set<String> newSgRuleIds = newSg.getRules().stream()
189 .map(SecurityGroupRule::getId).collect(Collectors.toSet());
sangho6a9ff0d2017-03-27 11:23:37 +0900190
Hyunsun Moonae51e732017-04-25 17:46:21 +0900191 oldSg.getRules().stream().filter(sgRule -> !newSgRuleIds.contains(sgRule.getId()))
192 .forEach(sgRule -> notifyDelegate(new OpenstackSecurityGroupEvent(
193 OPENSTACK_SECURITY_GROUP_RULE_REMOVED, newSg, sgRule)
194 ));
195 newSg.getRules().stream().filter(sgRule -> !oldSgRuleIds.contains(sgRule.getId()))
196 .forEach(sgRule -> notifyDelegate(new OpenstackSecurityGroupEvent(
197 OPENSTACK_SECURITY_GROUP_RULE_CREATED, newSg, sgRule)
198 ));
sangho6a9ff0d2017-03-27 11:23:37 +0900199 }
200 }
201}