blob: 5b609763aa8f3524799fd28b0be8ec99efd2ce13 [file] [log] [blame]
Hyunsun Moon44aac662017-02-18 02:07:01 +09001/*
Brian O'Connora09fe5b2017-08-03 21:12:30 -07002 * Copyright 2016-present Open Networking Foundation
Hyunsun Moon44aac662017-02-18 02:07:01 +09003 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16package org.onosproject.openstacknetworking.impl;
17
18import com.google.common.base.Strings;
Hyunsun Moon44aac662017-02-18 02:07:01 +090019import org.onlab.packet.Ethernet;
20import org.onlab.packet.ICMP;
Jian Li2fa3ded2018-08-10 02:22:47 +000021import org.onlab.packet.ICMPEcho;
Hyunsun Moon44aac662017-02-18 02:07:01 +090022import org.onlab.packet.IPv4;
23import org.onlab.packet.IpAddress;
24import org.onlab.packet.MacAddress;
daniel park576969a2018-03-09 07:07:41 +090025import org.onlab.packet.VlanId;
sangho247232c2017-08-24 17:22:08 +090026import org.onlab.util.KryoNamespace;
Daniel Park6a2d95e2018-11-05 18:50:16 +090027import org.onosproject.cluster.ClusterService;
28import org.onosproject.cluster.LeadershipService;
29import org.onosproject.cluster.NodeId;
Hyunsun Moon44aac662017-02-18 02:07:01 +090030import org.onosproject.core.ApplicationId;
31import org.onosproject.core.CoreService;
Hyunsun Moon44aac662017-02-18 02:07:01 +090032import org.onosproject.net.DeviceId;
Daniel Park6a2d95e2018-11-05 18:50:16 +090033import org.onosproject.net.flow.DefaultTrafficSelector;
Hyunsun Moon44aac662017-02-18 02:07:01 +090034import org.onosproject.net.flow.DefaultTrafficTreatment;
Daniel Park6a2d95e2018-11-05 18:50:16 +090035import org.onosproject.net.flow.TrafficSelector;
Hyunsun Moon44aac662017-02-18 02:07:01 +090036import org.onosproject.net.flow.TrafficTreatment;
37import org.onosproject.net.packet.DefaultOutboundPacket;
38import org.onosproject.net.packet.InboundPacket;
39import org.onosproject.net.packet.OutboundPacket;
40import org.onosproject.net.packet.PacketContext;
Hyunsun Moon44aac662017-02-18 02:07:01 +090041import org.onosproject.net.packet.PacketProcessor;
42import org.onosproject.net.packet.PacketService;
43import org.onosproject.openstacknetworking.api.Constants;
daniel park576969a2018-03-09 07:07:41 +090044import org.onosproject.openstacknetworking.api.ExternalPeerRouter;
Hyunsun Moon44aac662017-02-18 02:07:01 +090045import org.onosproject.openstacknetworking.api.InstancePort;
46import org.onosproject.openstacknetworking.api.InstancePortService;
Daniel Park6a2d95e2018-11-05 18:50:16 +090047import org.onosproject.openstacknetworking.api.OpenstackFlowRuleService;
Hyunsun Moon44aac662017-02-18 02:07:01 +090048import org.onosproject.openstacknetworking.api.OpenstackNetworkService;
sangho36721992017-08-03 11:13:17 +090049import org.onosproject.openstacknetworking.api.OpenstackRouterService;
Hyunsun Moon0d457362017-06-27 17:19:41 +090050import org.onosproject.openstacknode.api.OpenstackNode;
Daniel Park6a2d95e2018-11-05 18:50:16 +090051import org.onosproject.openstacknode.api.OpenstackNodeEvent;
52import org.onosproject.openstacknode.api.OpenstackNodeListener;
Hyunsun Moon0d457362017-06-27 17:19:41 +090053import org.onosproject.openstacknode.api.OpenstackNodeService;
sangho247232c2017-08-24 17:22:08 +090054import org.onosproject.store.serializers.KryoNamespaces;
55import org.onosproject.store.service.ConsistentMap;
56import org.onosproject.store.service.Serializer;
57import org.onosproject.store.service.StorageService;
Hyunsun Moon44aac662017-02-18 02:07:01 +090058import org.openstack4j.model.network.Port;
59import org.openstack4j.model.network.Router;
60import org.openstack4j.model.network.RouterInterface;
61import org.openstack4j.model.network.Subnet;
Jian Li28680442018-11-11 00:35:37 +090062import org.osgi.service.component.annotations.Activate;
63import org.osgi.service.component.annotations.Component;
64import org.osgi.service.component.annotations.Deactivate;
65import org.osgi.service.component.annotations.Reference;
66import org.osgi.service.component.annotations.ReferenceCardinality;
Hyunsun Moon44aac662017-02-18 02:07:01 +090067import org.slf4j.Logger;
68
69import java.nio.ByteBuffer;
Hyunsun Moon44aac662017-02-18 02:07:01 +090070import java.util.Objects;
Hyunsun Moon44aac662017-02-18 02:07:01 +090071import java.util.Set;
72import java.util.concurrent.ExecutorService;
73import java.util.stream.Collectors;
74
sangho247232c2017-08-24 17:22:08 +090075import static com.google.common.base.Preconditions.checkArgument;
Daniel Park4d486842018-07-24 17:06:43 +090076import static com.google.common.base.Preconditions.checkNotNull;
Hyunsun Moon44aac662017-02-18 02:07:01 +090077import static java.util.concurrent.Executors.newSingleThreadExecutor;
Daniel Park4d486842018-07-24 17:06:43 +090078import static org.onlab.packet.ICMP.TYPE_ECHO_REPLY;
79import static org.onlab.packet.ICMP.TYPE_ECHO_REQUEST;
Hyunsun Moon44aac662017-02-18 02:07:01 +090080import static org.onlab.util.Tools.groupedThreads;
sangho36721992017-08-03 11:13:17 +090081import static org.onosproject.openstacknetworking.api.Constants.DEFAULT_GATEWAY_MAC;
Daniel Park6a2d95e2018-11-05 18:50:16 +090082import static org.onosproject.openstacknetworking.api.Constants.GW_COMMON_TABLE;
sangho36721992017-08-03 11:13:17 +090083import static org.onosproject.openstacknetworking.api.Constants.OPENSTACK_NETWORKING_APP_ID;
Daniel Park6a2d95e2018-11-05 18:50:16 +090084import static org.onosproject.openstacknetworking.api.Constants.PRIORITY_INTERNAL_ROUTING_RULE;
Jian Liebde74d2018-11-14 00:18:57 +090085import static org.onosproject.openstacknetworking.util.OpenstackNetworkingUtil.externalIpFromSubnet;
86import static org.onosproject.openstacknetworking.util.OpenstackNetworkingUtil.externalPeerRouterFromSubnet;
Hyunsun Moon0d457362017-06-27 17:19:41 +090087import static org.onosproject.openstacknode.api.OpenstackNode.NodeType.GATEWAY;
Hyunsun Moon44aac662017-02-18 02:07:01 +090088import static org.slf4j.LoggerFactory.getLogger;
89
Hyunsun Moon44aac662017-02-18 02:07:01 +090090/**
91 * Handles ICMP packet received from a gateway node.
92 * For a request for virtual network subnet gateway, it generates fake ICMP reply.
93 * For a request for the external network, it does source NAT with the public IP and
94 * forward the request to the external only if the requested virtual subnet has
95 * external connectivity.
96 */
97@Component(immediate = true)
98public class OpenstackRoutingIcmpHandler {
99
100 protected final Logger log = getLogger(getClass());
101
102 private static final String ERR_REQ = "Failed to handle ICMP request: ";
sangho247232c2017-08-24 17:22:08 +0900103 private static final String ERR_DUPLICATE = " already exists";
Hyunsun Moon44aac662017-02-18 02:07:01 +0900104
Jian Li28ec77f2018-10-31 07:07:25 +0900105 private static final String VXLAN = "VXLAN";
106 private static final String VLAN = "VLAN";
107
Ray Milkeyd84f89b2018-08-17 14:54:17 -0700108 @Reference(cardinality = ReferenceCardinality.MANDATORY)
Hyunsun Moon44aac662017-02-18 02:07:01 +0900109 protected CoreService coreService;
110
Ray Milkeyd84f89b2018-08-17 14:54:17 -0700111 @Reference(cardinality = ReferenceCardinality.MANDATORY)
Hyunsun Moon44aac662017-02-18 02:07:01 +0900112 protected PacketService packetService;
113
Ray Milkeyd84f89b2018-08-17 14:54:17 -0700114 @Reference(cardinality = ReferenceCardinality.MANDATORY)
sangho247232c2017-08-24 17:22:08 +0900115 protected StorageService storageService;
116
Ray Milkeyd84f89b2018-08-17 14:54:17 -0700117 @Reference(cardinality = ReferenceCardinality.MANDATORY)
Hyunsun Moon44aac662017-02-18 02:07:01 +0900118 protected OpenstackNodeService osNodeService;
119
Ray Milkeyd84f89b2018-08-17 14:54:17 -0700120 @Reference(cardinality = ReferenceCardinality.MANDATORY)
Hyunsun Moon44aac662017-02-18 02:07:01 +0900121 protected InstancePortService instancePortService;
122
Ray Milkeyd84f89b2018-08-17 14:54:17 -0700123 @Reference(cardinality = ReferenceCardinality.MANDATORY)
Hyunsun Moon44aac662017-02-18 02:07:01 +0900124 protected OpenstackNetworkService osNetworkService;
125
Ray Milkeyd84f89b2018-08-17 14:54:17 -0700126 @Reference(cardinality = ReferenceCardinality.MANDATORY)
Hyunsun Moon44aac662017-02-18 02:07:01 +0900127 protected OpenstackRouterService osRouterService;
128
Ray Milkey5739b2c2018-11-06 14:04:51 -0800129 @Reference(cardinality = ReferenceCardinality.MANDATORY)
Daniel Park6a2d95e2018-11-05 18:50:16 +0900130 protected LeadershipService leadershipService;
131
Ray Milkey5739b2c2018-11-06 14:04:51 -0800132 @Reference(cardinality = ReferenceCardinality.MANDATORY)
Daniel Park6a2d95e2018-11-05 18:50:16 +0900133 protected OpenstackFlowRuleService osFlowRuleService;
134
Ray Milkey5739b2c2018-11-06 14:04:51 -0800135 @Reference(cardinality = ReferenceCardinality.MANDATORY)
Daniel Park6a2d95e2018-11-05 18:50:16 +0900136 protected ClusterService clusterService;
137
Hyunsun Moon44aac662017-02-18 02:07:01 +0900138 private final ExecutorService eventExecutor = newSingleThreadExecutor(
139 groupedThreads(this.getClass().getSimpleName(), "event-handler", log));
sangho072c4dd2017-05-17 10:45:21 +0900140 private final InternalPacketProcessor packetProcessor = new InternalPacketProcessor();
sangho247232c2017-08-24 17:22:08 +0900141 private ConsistentMap<String, InstancePort> icmpInfoMap;
Daniel Park6a2d95e2018-11-05 18:50:16 +0900142 private final OpenstackNodeListener osNodeListener = new InternalNodeEventListener();
sangho247232c2017-08-24 17:22:08 +0900143
144 private static final KryoNamespace SERIALIZER_ICMP_MAP = KryoNamespace.newBuilder()
145 .register(KryoNamespaces.API)
146 .register(InstancePort.class)
Jian Liec5c32b2018-07-13 14:28:58 +0900147 .register(DefaultInstancePort.class)
148 .register(InstancePort.State.class)
sangho247232c2017-08-24 17:22:08 +0900149 .build();
Hyunsun Moon44aac662017-02-18 02:07:01 +0900150
151 private ApplicationId appId;
Daniel Park6a2d95e2018-11-05 18:50:16 +0900152 private NodeId localNodeId;
Hyunsun Moon44aac662017-02-18 02:07:01 +0900153
154 @Activate
155 protected void activate() {
156 appId = coreService.registerApplication(OPENSTACK_NETWORKING_APP_ID);
157 packetService.addProcessor(packetProcessor, PacketProcessor.director(1));
Daniel Park6a2d95e2018-11-05 18:50:16 +0900158 localNodeId = clusterService.getLocalNode().id();
159 leadershipService.runForLeadership(appId.name());
160 osNodeService.addListener(osNodeListener);
Hyunsun Moon44aac662017-02-18 02:07:01 +0900161
sangho247232c2017-08-24 17:22:08 +0900162 icmpInfoMap = storageService.<String, InstancePort>consistentMapBuilder()
163 .withSerializer(Serializer.using(SERIALIZER_ICMP_MAP))
164 .withName("openstack-icmpmap")
165 .withApplicationId(appId)
166 .build();
167
Hyunsun Moon44aac662017-02-18 02:07:01 +0900168 log.info("Started");
169 }
170
171 @Deactivate
172 protected void deactivate() {
173 packetService.removeProcessor(packetProcessor);
Hyunsun Moon44aac662017-02-18 02:07:01 +0900174 eventExecutor.shutdown();
Daniel Park6a2d95e2018-11-05 18:50:16 +0900175 leadershipService.withdraw(appId.name());
176 osNodeService.removeListener(osNodeListener);
Hyunsun Moon44aac662017-02-18 02:07:01 +0900177
178 log.info("Stopped");
179 }
180
Daniel Park6a2d95e2018-11-05 18:50:16 +0900181 private class InternalNodeEventListener implements OpenstackNodeListener {
182 @Override
183 public boolean isRelevant(OpenstackNodeEvent event) {
Jian Li34220ea2018-11-14 01:30:24 +0900184 return event.subject().type() == GATEWAY;
185 }
186
187 private boolean isRelevantHelper() {
188 return Objects.equals(localNodeId, leadershipService.getLeader(appId.name()));
Daniel Park6a2d95e2018-11-05 18:50:16 +0900189 }
190
191 @Override
192 public void event(OpenstackNodeEvent event) {
193 OpenstackNode osNode = event.subject();
194 switch (event.type()) {
195 case OPENSTACK_NODE_COMPLETE:
Jian Li6a47fd02018-11-27 21:51:03 +0900196 eventExecutor.execute(() -> processNodeCompletion(osNode));
Daniel Park6a2d95e2018-11-05 18:50:16 +0900197 break;
198 case OPENSTACK_NODE_INCOMPLETE:
Jian Li6a47fd02018-11-27 21:51:03 +0900199 eventExecutor.execute(() -> processNodeInCompletion(osNode));
Daniel Park6a2d95e2018-11-05 18:50:16 +0900200 break;
201 default:
202 break;
203 }
204 }
205
Jian Li6a47fd02018-11-27 21:51:03 +0900206 private void processNodeCompletion(OpenstackNode osNode) {
207 if (!isRelevantHelper()) {
208 return;
209 }
210
211 setIcmpReplyRules(osNode.intgBridge(), true);
212 }
213
214 private void processNodeInCompletion(OpenstackNode osNode) {
215 if (!isRelevantHelper()) {
216 return;
217 }
218
219 setIcmpReplyRules(osNode.intgBridge(), false);
220 }
221
Daniel Park6a2d95e2018-11-05 18:50:16 +0900222 private void setIcmpReplyRules(DeviceId deviceId, boolean install) {
223 // Sends ICMP response to controller for SNATing ingress traffic
224 TrafficSelector selector = DefaultTrafficSelector.builder()
225 .matchEthType(Ethernet.TYPE_IPV4)
226 .matchIPProtocol(IPv4.PROTOCOL_ICMP)
227 .matchIcmpType(ICMP.TYPE_ECHO_REPLY)
228 .build();
229
230 TrafficTreatment treatment = DefaultTrafficTreatment.builder()
231 .punt()
232 .build();
233
234 osFlowRuleService.setRule(
235 appId,
236 deviceId,
237 selector,
238 treatment,
239 PRIORITY_INTERNAL_ROUTING_RULE,
240 GW_COMMON_TABLE,
241 install);
242 }
243 }
Jian Li28680442018-11-11 00:35:37 +0900244
245 private class InternalPacketProcessor implements PacketProcessor {
246
247 @Override
248 public void process(PacketContext context) {
249 if (context.isHandled()) {
250 return;
251 }
252
253 eventExecutor.execute(() -> {
Jian Li28680442018-11-11 00:35:37 +0900254
Jian Li34220ea2018-11-14 01:30:24 +0900255 if (!isRelevantHelper(context)) {
Jian Li28680442018-11-11 00:35:37 +0900256 return;
257 }
258
259 InboundPacket pkt = context.inPacket();
260 Ethernet ethernet = pkt.parsed();
261 if (ethernet == null || ethernet.getEtherType() != Ethernet.TYPE_IPV4) {
262 return;
263 }
264
265 IPv4 iPacket = (IPv4) ethernet.getPayload();
266
267 if (iPacket.getProtocol() == IPv4.PROTOCOL_ICMP) {
268 processIcmpPacket(context, ethernet);
269 }
270 });
271 }
272
Jian Li34220ea2018-11-14 01:30:24 +0900273 private boolean isRelevantHelper(PacketContext context) {
274 Set<DeviceId> gateways = osNodeService.completeNodes(GATEWAY)
275 .stream().map(OpenstackNode::intgBridge)
276 .collect(Collectors.toSet());
277
278 return gateways.contains(context.inPacket().receivedFrom().deviceId());
279 }
280
Jian Li28680442018-11-11 00:35:37 +0900281 private void processIcmpPacket(PacketContext context, Ethernet ethernet) {
282 IPv4 ipPacket = (IPv4) ethernet.getPayload();
283 ICMP icmp = (ICMP) ipPacket.getPayload();
284 log.trace("Processing ICMP packet source MAC:{}, source IP:{}," +
285 "dest MAC:{}, dest IP:{}",
286 ethernet.getSourceMAC(),
287 IpAddress.valueOf(ipPacket.getSourceAddress()),
288 ethernet.getDestinationMAC(),
289 IpAddress.valueOf(ipPacket.getDestinationAddress()));
290
291 switch (icmp.getIcmpType()) {
292 case TYPE_ECHO_REQUEST:
293 if (handleEchoRequest(context.inPacket().receivedFrom().deviceId(),
Jian Li6a47fd02018-11-27 21:51:03 +0900294 ethernet.getSourceMAC(), ipPacket, icmp)) {
Jian Li28680442018-11-11 00:35:37 +0900295 context.block();
296 }
297 break;
298 case TYPE_ECHO_REPLY:
299 if (handleEchoReply(ipPacket, icmp)) {
300 context.block();
301 }
302 break;
303 default:
304 break;
305 }
306 }
307
308 private boolean handleEchoRequest(DeviceId srcDevice, MacAddress srcMac, IPv4 ipPacket,
309 ICMP icmp) {
310 //We only handles a request from an instance port
311 //In case of ehco request to SNAT ip address from an external router, we intentionally ignore it
312 InstancePort instPort = instancePortService.instancePort(srcMac);
313 if (instPort == null) {
314 log.warn(ERR_REQ + "unknown source host(MAC:{})", srcMac);
315 return false;
316 }
317
318 IpAddress srcIp = IpAddress.valueOf(ipPacket.getSourceAddress());
319 IpAddress dstIp = IpAddress.valueOf(ipPacket.getDestinationAddress());
320
321 Subnet srcSubnet = getSourceSubnet(instPort);
322 if (srcSubnet == null) {
323 log.warn(ERR_REQ + "unknown source subnet(IP:{})", srcIp);
324 return false;
325 }
326
327 if (Strings.isNullOrEmpty(srcSubnet.getGateway())) {
328 log.warn(ERR_REQ + "source subnet(ID:{}, CIDR:{}) has no gateway",
329 srcSubnet.getId(), srcSubnet.getCidr());
330 return false;
331 }
332
333 if (isForSubnetGateway(IpAddress.valueOf(ipPacket.getDestinationAddress()),
334 srcSubnet)) {
335 // this is a request to a subnet gateway
336 log.trace("Icmp request to gateway {} from {}", dstIp, srcIp);
337 processRequestForGateway(ipPacket, instPort);
338 } else {
339 // this is a request to an external network
340 log.trace("Icmp request to external {} from {}", dstIp, srcIp);
341
Jian Liebde74d2018-11-14 00:18:57 +0900342 IpAddress externalIp = externalIpFromSubnet(srcSubnet, osRouterService, osNetworkService);
Jian Li28680442018-11-11 00:35:37 +0900343 if (externalIp == null) {
344 log.warn(ERR_REQ + "failed to get external ip");
345 return false;
346 }
347
Jian Liebde74d2018-11-14 00:18:57 +0900348 ExternalPeerRouter externalPeerRouter =
349 externalPeerRouterFromSubnet(srcSubnet, osRouterService, osNetworkService);
350 if (externalPeerRouter == null) {
351 log.warn(ERR_REQ + "failed to get external peer router");
352 return false;
353 }
354
Jian Li28680442018-11-11 00:35:37 +0900355 String icmpInfoKey = icmpInfoKey(icmp,
356 externalIp.toString(),
357 IPv4.fromIPv4Address(ipPacket.getDestinationAddress()));
358 log.trace("Created icmpInfo key is {}", icmpInfoKey);
359
360 sendRequestForExternal(ipPacket, srcDevice, externalIp, externalPeerRouter);
361
362 try {
363 icmpInfoMap.compute(icmpInfoKey, (id, existing) -> {
364 checkArgument(existing == null, ERR_DUPLICATE);
365 return instPort;
366 });
367 } catch (IllegalArgumentException e) {
368 log.warn("IllegalArgumentException occurred because of {}", e.toString());
369 return false;
370 }
371 }
372 return true;
373 }
374
375 private String icmpInfoKey(ICMP icmp, String srcIp, String dstIp) {
376 return String.valueOf(getIcmpId(icmp))
377 .concat(srcIp)
378 .concat(dstIp);
379 }
Jian Li28680442018-11-11 00:35:37 +0900380
381 private boolean handleEchoReply(IPv4 ipPacket, ICMP icmp) {
382 String icmpInfoKey = icmpInfoKey(icmp,
383 IPv4.fromIPv4Address(ipPacket.getDestinationAddress()),
384 IPv4.fromIPv4Address(ipPacket.getSourceAddress()));
385 log.trace("Retrieved icmpInfo key is {}", icmpInfoKey);
386
387 if (icmpInfoMap.get(icmpInfoKey) != null) {
388 processReplyFromExternal(ipPacket, icmpInfoMap.get(icmpInfoKey).value());
389 icmpInfoMap.remove(icmpInfoKey);
390 return true;
391 } else {
392 log.debug("No ICMP Info for ICMP packet");
393 return false;
394 }
395 }
396
397 private Subnet getSourceSubnet(InstancePort instance) {
398 checkNotNull(instance);
399
400 Port osPort = osNetworkService.port(instance.portId());
401 return osNetworkService.subnets(osPort.getNetworkId())
402 .stream().findAny().orElse(null);
403 }
404
405 private boolean isForSubnetGateway(IpAddress dstIp, Subnet srcSubnet) {
406 RouterInterface osRouterIface = osRouterService.routerInterfaces().stream()
407 .filter(i -> Objects.equals(i.getSubnetId(), srcSubnet.getId()))
408 .findAny().orElse(null);
409 if (osRouterIface == null) {
410 log.trace(ERR_REQ + "source subnet(ID:{}, CIDR:{}) has no router",
411 srcSubnet.getId(), srcSubnet.getCidr());
412 return false;
413 }
414
415 Router osRouter = osRouterService.router(osRouterIface.getId());
416 Set<IpAddress> routableGateways = osRouterService.routerInterfaces(osRouter.getId())
417 .stream()
418 .map(iface -> osNetworkService.subnet(iface.getSubnetId()).getGateway())
419 .map(IpAddress::valueOf)
420 .collect(Collectors.toSet());
421
422 return routableGateways.contains(dstIp);
423 }
424
Jian Li28680442018-11-11 00:35:37 +0900425 private void processRequestForGateway(IPv4 ipPacket, InstancePort instPort) {
426 ICMP icmpReq = (ICMP) ipPacket.getPayload();
427 icmpReq.setChecksum((short) 0);
428 icmpReq.setIcmpType(TYPE_ECHO_REPLY);
429
430 int destinationAddress = ipPacket.getSourceAddress();
431
432 ipPacket.setSourceAddress(ipPacket.getDestinationAddress())
433 .setDestinationAddress(destinationAddress)
434 .resetChecksum();
435
436 ipPacket.setPayload(icmpReq);
437 Ethernet icmpReply = new Ethernet();
438 icmpReply.setEtherType(Ethernet.TYPE_IPV4)
439 .setSourceMACAddress(Constants.DEFAULT_GATEWAY_MAC)
440 .setDestinationMACAddress(instPort.macAddress())
441 .setPayload(ipPacket);
442
443 sendReply(icmpReply, instPort);
444 }
445
446 private void sendRequestForExternal(IPv4 ipPacket, DeviceId srcDevice,
447 IpAddress srcNatIp, ExternalPeerRouter externalPeerRouter) {
448 ICMP icmpReq = (ICMP) ipPacket.getPayload();
449 icmpReq.resetChecksum();
450 ipPacket.setSourceAddress(srcNatIp.getIp4Address().toInt()).resetChecksum();
451 ipPacket.setPayload(icmpReq);
452
453 Ethernet icmpRequestEth = new Ethernet();
454 icmpRequestEth.setEtherType(Ethernet.TYPE_IPV4)
455 .setSourceMACAddress(DEFAULT_GATEWAY_MAC)
456 .setDestinationMACAddress(externalPeerRouter.macAddress());
457
458 if (!externalPeerRouter.vlanId().equals(VlanId.NONE)) {
459 icmpRequestEth.setVlanID(externalPeerRouter.vlanId().toShort());
460 }
461
462 icmpRequestEth.setPayload(ipPacket);
463
464 OpenstackNode osNode = osNodeService.node(srcDevice);
465 if (osNode == null) {
466 final String error = String.format("Cannot find openstack node for %s",
467 srcDevice);
468 throw new IllegalStateException(error);
469 }
470 TrafficTreatment treatment = DefaultTrafficTreatment.builder()
471 .setOutput(osNode.uplinkPortNum())
472 .build();
473
474 OutboundPacket packet = new DefaultOutboundPacket(
475 srcDevice,
476 treatment,
477 ByteBuffer.wrap(icmpRequestEth.serialize()));
478
479 packetService.emit(packet);
480 }
481
482 private void processReplyFromExternal(IPv4 ipPacket, InstancePort instPort) {
483
484 if (instPort.networkId() == null) {
485 return;
486 }
487
488 ICMP icmpReply = (ICMP) ipPacket.getPayload();
489
490 icmpReply.resetChecksum();
491
492 ipPacket.setDestinationAddress(instPort.ipAddress().getIp4Address().toInt())
493 .resetChecksum();
494 ipPacket.setPayload(icmpReply);
495
496 Ethernet icmpResponseEth = new Ethernet();
497 icmpResponseEth.setEtherType(Ethernet.TYPE_IPV4)
498 .setSourceMACAddress(Constants.DEFAULT_GATEWAY_MAC)
499 .setDestinationMACAddress(instPort.macAddress())
500 .setPayload(ipPacket);
501
502 sendReply(icmpResponseEth, instPort);
503 }
504
505 private void sendReply(Ethernet icmpReply, InstancePort instPort) {
506 TrafficTreatment.Builder tBuilder = DefaultTrafficTreatment.builder()
507 .setOutput(instPort.portNumber());
508
509 String netId = instPort.networkId();
510 String segId = osNetworkService.segmentId(netId);
511
512 switch (osNetworkService.networkType(netId)) {
513 case VXLAN:
514 tBuilder.setTunnelId(Long.valueOf(segId));
515 break;
516 case VLAN:
517 tBuilder.setVlanId(VlanId.vlanId(segId));
518 break;
519 default:
520 break;
521 }
522
523 OutboundPacket packet = new DefaultOutboundPacket(
524 instPort.deviceId(),
525 tBuilder.build(),
526 ByteBuffer.wrap(icmpReply.serialize()));
527
528 packetService.emit(packet);
529 }
530
531 private short getIcmpId(ICMP icmp) {
532 return ((ICMPEcho) icmp.getPayload()).getIdentifier();
533 }
534 }
Hyunsun Moon44aac662017-02-18 02:07:01 +0900535}