blob: 1d76063a2d9e2b9f9bf1133a20be8f7e4775052c [file] [log] [blame]
Hyunsun Moon44aac662017-02-18 02:07:01 +09001/*
Brian O'Connora09fe5b2017-08-03 21:12:30 -07002 * Copyright 2016-present Open Networking Foundation
Hyunsun Moon44aac662017-02-18 02:07:01 +09003 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16package org.onosproject.openstacknetworking.impl;
17
Hyunsun Moon44aac662017-02-18 02:07:01 +090018import org.onlab.packet.Ethernet;
19import org.onlab.packet.IPv4;
20import org.onlab.packet.IpAddress;
21import org.onlab.packet.IpPrefix;
Hyunsun Moon44aac662017-02-18 02:07:01 +090022import org.onlab.packet.TCP;
23import org.onlab.packet.TpPort;
24import org.onlab.packet.UDP;
daniel parkee8700b2017-05-11 15:50:03 +090025import org.onlab.packet.VlanId;
Hyunsun Moon44aac662017-02-18 02:07:01 +090026import org.onlab.util.KryoNamespace;
27import org.onosproject.core.ApplicationId;
28import org.onosproject.core.CoreService;
29import org.onosproject.net.DeviceId;
30import org.onosproject.net.device.DeviceService;
31import org.onosproject.net.flow.DefaultTrafficSelector;
32import org.onosproject.net.flow.DefaultTrafficTreatment;
33import org.onosproject.net.flow.TrafficSelector;
34import org.onosproject.net.flow.TrafficTreatment;
Hyunsun Moon44aac662017-02-18 02:07:01 +090035import org.onosproject.net.packet.DefaultOutboundPacket;
36import org.onosproject.net.packet.InboundPacket;
37import org.onosproject.net.packet.PacketContext;
38import org.onosproject.net.packet.PacketProcessor;
39import org.onosproject.net.packet.PacketService;
daniel park576969a2018-03-09 07:07:41 +090040import org.onosproject.openstacknetworking.api.ExternalPeerRouter;
Hyunsun Moon44aac662017-02-18 02:07:01 +090041import org.onosproject.openstacknetworking.api.InstancePort;
42import org.onosproject.openstacknetworking.api.InstancePortService;
sanghodc375372017-06-08 10:41:30 +090043import org.onosproject.openstacknetworking.api.OpenstackFlowRuleService;
Hyunsun Moon44aac662017-02-18 02:07:01 +090044import org.onosproject.openstacknetworking.api.OpenstackNetworkService;
sanghodc375372017-06-08 10:41:30 +090045import org.onosproject.openstacknetworking.api.OpenstackRouterService;
Jian Li26949762018-03-30 15:46:37 +090046import org.onosproject.openstacknetworking.util.RulePopulatorUtil;
Hyunsun Moon0d457362017-06-27 17:19:41 +090047import org.onosproject.openstacknode.api.OpenstackNode;
48import org.onosproject.openstacknode.api.OpenstackNodeService;
Hyunsun Moon44aac662017-02-18 02:07:01 +090049import org.onosproject.store.serializers.KryoNamespaces;
50import org.onosproject.store.service.ConsistentMap;
daniel park0bc7fdb2017-03-13 14:20:08 +090051import org.onosproject.store.service.DistributedSet;
Hyunsun Moon44aac662017-02-18 02:07:01 +090052import org.onosproject.store.service.Serializer;
53import org.onosproject.store.service.StorageService;
Hyunsun Moon44aac662017-02-18 02:07:01 +090054import org.openstack4j.model.network.IP;
55import org.openstack4j.model.network.Network;
daniel parkee8700b2017-05-11 15:50:03 +090056import org.openstack4j.model.network.NetworkType;
Hyunsun Moon44aac662017-02-18 02:07:01 +090057import org.openstack4j.model.network.Port;
Hyunsun Moon44aac662017-02-18 02:07:01 +090058import org.openstack4j.model.network.Subnet;
Jian Liebde74d2018-11-14 00:18:57 +090059import org.osgi.service.component.annotations.Activate;
60import org.osgi.service.component.annotations.Component;
61import org.osgi.service.component.annotations.Deactivate;
62import org.osgi.service.component.annotations.Reference;
63import org.osgi.service.component.annotations.ReferenceCardinality;
Hyunsun Moon44aac662017-02-18 02:07:01 +090064import org.slf4j.Logger;
65
66import java.nio.ByteBuffer;
Hyunsun Moon0d457362017-06-27 17:19:41 +090067import java.util.Set;
Hyunsun Moon44aac662017-02-18 02:07:01 +090068import java.util.concurrent.ExecutorService;
Hyunsun Moon0d457362017-06-27 17:19:41 +090069import java.util.stream.Collectors;
Hyunsun Moon44aac662017-02-18 02:07:01 +090070
71import static java.util.concurrent.Executors.newSingleThreadExecutor;
72import static org.onlab.util.Tools.groupedThreads;
daniel parkeeb8e042018-02-21 14:06:58 +090073import static org.onosproject.openstacknetworking.api.Constants.DEFAULT_GATEWAY_MAC;
74import static org.onosproject.openstacknetworking.api.Constants.GW_COMMON_TABLE;
75import static org.onosproject.openstacknetworking.api.Constants.OPENSTACK_NETWORKING_APP_ID;
76import static org.onosproject.openstacknetworking.api.Constants.PRIORITY_SNAT_RULE;
Jian Liebde74d2018-11-14 00:18:57 +090077import static org.onosproject.openstacknetworking.util.OpenstackNetworkingUtil.externalIpFromSubnet;
78import static org.onosproject.openstacknetworking.util.OpenstackNetworkingUtil.externalPeerRouterFromSubnet;
Hyunsun Moon0d457362017-06-27 17:19:41 +090079import static org.onosproject.openstacknode.api.OpenstackNode.NodeType.GATEWAY;
Hyunsun Moon44aac662017-02-18 02:07:01 +090080import static org.slf4j.LoggerFactory.getLogger;
81
82/**
83 * Handle packets needs SNAT.
84 */
85@Component(immediate = true)
86public class OpenstackRoutingSnatHandler {
87
88 private final Logger log = getLogger(getClass());
89
90 private static final String ERR_PACKETIN = "Failed to handle packet in: ";
daniel parkee8700b2017-05-11 15:50:03 +090091 private static final String ERR_UNSUPPORTED_NET_TYPE = "Unsupported network type";
Ray Milkey3717e602018-02-01 13:49:47 -080092 private static final long TIME_OUT_SNAT_PORT_MS = 120L * 1000L;
sangho79d6a832017-05-02 14:53:46 +090093 private static final int TP_PORT_MINIMUM_NUM = 65000;
Hyunsun Moon44aac662017-02-18 02:07:01 +090094 private static final int TP_PORT_MAXIMUM_NUM = 65535;
Jian Li6a47fd02018-11-27 21:51:03 +090095 private static final int VM_PREFIX = 32;
Hyunsun Moon44aac662017-02-18 02:07:01 +090096
97 private static final KryoNamespace.Builder NUMBER_SERIALIZER = KryoNamespace.newBuilder()
98 .register(KryoNamespaces.API);
99
Ray Milkeyd84f89b2018-08-17 14:54:17 -0700100 @Reference(cardinality = ReferenceCardinality.MANDATORY)
Hyunsun Moon44aac662017-02-18 02:07:01 +0900101 protected CoreService coreService;
102
Ray Milkeyd84f89b2018-08-17 14:54:17 -0700103 @Reference(cardinality = ReferenceCardinality.MANDATORY)
Hyunsun Moon44aac662017-02-18 02:07:01 +0900104 protected PacketService packetService;
105
Ray Milkeyd84f89b2018-08-17 14:54:17 -0700106 @Reference(cardinality = ReferenceCardinality.MANDATORY)
Hyunsun Moon44aac662017-02-18 02:07:01 +0900107 protected StorageService storageService;
108
Ray Milkeyd84f89b2018-08-17 14:54:17 -0700109 @Reference(cardinality = ReferenceCardinality.MANDATORY)
Hyunsun Moon44aac662017-02-18 02:07:01 +0900110 protected DeviceService deviceService;
111
Ray Milkeyd84f89b2018-08-17 14:54:17 -0700112 @Reference(cardinality = ReferenceCardinality.MANDATORY)
Hyunsun Moon44aac662017-02-18 02:07:01 +0900113 protected InstancePortService instancePortService;
114
Ray Milkeyd84f89b2018-08-17 14:54:17 -0700115 @Reference(cardinality = ReferenceCardinality.MANDATORY)
Hyunsun Moon44aac662017-02-18 02:07:01 +0900116 protected OpenstackNodeService osNodeService;
117
Ray Milkeyd84f89b2018-08-17 14:54:17 -0700118 @Reference(cardinality = ReferenceCardinality.MANDATORY)
Hyunsun Moon44aac662017-02-18 02:07:01 +0900119 protected OpenstackNetworkService osNetworkService;
120
Ray Milkeyd84f89b2018-08-17 14:54:17 -0700121 @Reference(cardinality = ReferenceCardinality.MANDATORY)
Hyunsun Moon44aac662017-02-18 02:07:01 +0900122 protected OpenstackRouterService osRouterService;
123
Ray Milkeyd84f89b2018-08-17 14:54:17 -0700124 @Reference(cardinality = ReferenceCardinality.MANDATORY)
sanghodc375372017-06-08 10:41:30 +0900125 protected OpenstackFlowRuleService osFlowRuleService;
126
Hyunsun Moon44aac662017-02-18 02:07:01 +0900127 private final ExecutorService eventExecutor = newSingleThreadExecutor(
128 groupedThreads(this.getClass().getSimpleName(), "event-handler", log));
Hyunsun Moon0d457362017-06-27 17:19:41 +0900129 private final PacketProcessor packetProcessor = new InternalPacketProcessor();
Hyunsun Moon44aac662017-02-18 02:07:01 +0900130
daniel park0bc7fdb2017-03-13 14:20:08 +0900131 private ConsistentMap<Integer, Long> allocatedPortNumMap;
132 private DistributedSet<Integer> unUsedPortNumSet;
Hyunsun Moon44aac662017-02-18 02:07:01 +0900133 private ApplicationId appId;
134
135 @Activate
136 protected void activate() {
137 appId = coreService.registerApplication(OPENSTACK_NETWORKING_APP_ID);
daniel park0bc7fdb2017-03-13 14:20:08 +0900138
139 allocatedPortNumMap = storageService.<Integer, Long>consistentMapBuilder()
Hyunsun Moon44aac662017-02-18 02:07:01 +0900140 .withSerializer(Serializer.using(NUMBER_SERIALIZER.build()))
daniel park0bc7fdb2017-03-13 14:20:08 +0900141 .withName("openstackrouting-allocatedportnummap")
Hyunsun Moon44aac662017-02-18 02:07:01 +0900142 .withApplicationId(appId)
143 .build();
144
daniel park0bc7fdb2017-03-13 14:20:08 +0900145 unUsedPortNumSet = storageService.<Integer>setBuilder()
146 .withName("openstackrouting-unusedportnumset")
147 .withSerializer(Serializer.using(KryoNamespaces.API))
148 .build()
149 .asDistributedSet();
150
151 initializeUnusedPortNumSet();
152
Hyunsun Moon44aac662017-02-18 02:07:01 +0900153 packetService.addProcessor(packetProcessor, PacketProcessor.director(1));
154 log.info("Started");
155 }
156
daniel park0bc7fdb2017-03-13 14:20:08 +0900157 private void initializeUnusedPortNumSet() {
158 for (int i = TP_PORT_MINIMUM_NUM; i < TP_PORT_MAXIMUM_NUM; i++) {
Hyunsun Moon0e058f22017-04-19 17:00:52 +0900159 if (!allocatedPortNumMap.containsKey(i)) {
160 unUsedPortNumSet.add(i);
daniel park0bc7fdb2017-03-13 14:20:08 +0900161 }
162 }
163
164 clearPortNumMap();
165 }
166
Hyunsun Moon44aac662017-02-18 02:07:01 +0900167 @Deactivate
168 protected void deactivate() {
169 packetService.removeProcessor(packetProcessor);
170 eventExecutor.shutdown();
171 log.info("Stopped");
172 }
173
174 private void processSnatPacket(PacketContext context, Ethernet eth) {
175 IPv4 iPacket = (IPv4) eth.getPayload();
176 InboundPacket packetIn = context.inPacket();
177
Hyunsun Moon0e058f22017-04-19 17:00:52 +0900178 int patPort = getPortNum();
Hyunsun Moon44aac662017-02-18 02:07:01 +0900179
180 InstancePort srcInstPort = instancePortService.instancePort(eth.getSourceMAC());
181 if (srcInstPort == null) {
Hyunsun Moon0e058f22017-04-19 17:00:52 +0900182 log.error(ERR_PACKETIN + "source host(MAC:{}) does not exist",
Hyunsun Moon44aac662017-02-18 02:07:01 +0900183 eth.getSourceMAC());
184 return;
185 }
Hyunsun Moon0e058f22017-04-19 17:00:52 +0900186
Hyunsun Moon44aac662017-02-18 02:07:01 +0900187 IpAddress srcIp = IpAddress.valueOf(iPacket.getSourceAddress());
188 Subnet srcSubnet = getSourceSubnet(srcInstPort, srcIp);
Jian Liebde74d2018-11-14 00:18:57 +0900189 IpAddress externalGatewayIp =
190 externalIpFromSubnet(srcSubnet, osRouterService, osNetworkService);
daniel parkb5817102018-02-15 00:18:51 +0900191
Hyunsun Moon44aac662017-02-18 02:07:01 +0900192 if (externalGatewayIp == null) {
193 return;
194 }
195
Jian Liebde74d2018-11-14 00:18:57 +0900196 ExternalPeerRouter externalPeerRouter =
197 externalPeerRouterFromSubnet(srcSubnet, osRouterService, osNetworkService);
daniel park576969a2018-03-09 07:07:41 +0900198 if (externalPeerRouter == null) {
daniel parkb5817102018-02-15 00:18:51 +0900199 return;
200 }
201
Hyunsun Moon44aac662017-02-18 02:07:01 +0900202 populateSnatFlowRules(context.inPacket(),
203 srcInstPort,
204 TpPort.tpPort(patPort),
daniel park576969a2018-03-09 07:07:41 +0900205 externalGatewayIp, externalPeerRouter);
206
Hyunsun Moon44aac662017-02-18 02:07:01 +0900207
Ray Milkeyf0c47612017-09-28 11:29:38 -0700208 packetOut(eth.duplicate(),
Hyunsun Moon44aac662017-02-18 02:07:01 +0900209 packetIn.receivedFrom().deviceId(),
210 patPort,
daniel park576969a2018-03-09 07:07:41 +0900211 externalGatewayIp, externalPeerRouter);
Hyunsun Moon44aac662017-02-18 02:07:01 +0900212 }
213
214 private Subnet getSourceSubnet(InstancePort instance, IpAddress srcIp) {
215 Port osPort = osNetworkService.port(instance.portId());
216 IP fixedIp = osPort.getFixedIps().stream()
217 .filter(ip -> IpAddress.valueOf(ip.getIpAddress()).equals(srcIp))
218 .findAny().orElse(null);
219 if (fixedIp == null) {
220 return null;
221 }
222 return osNetworkService.subnet(fixedIp.getSubnetId());
223 }
224
Hyunsun Moon44aac662017-02-18 02:07:01 +0900225 private void populateSnatFlowRules(InboundPacket packetIn, InstancePort srcInstPort,
daniel park576969a2018-03-09 07:07:41 +0900226 TpPort patPort, IpAddress externalIp, ExternalPeerRouter externalPeerRouter) {
Hyunsun Moon44aac662017-02-18 02:07:01 +0900227 Network osNet = osNetworkService.network(srcInstPort.networkId());
228 if (osNet == null) {
Jian Li71670d12018-03-02 21:31:07 +0900229 final String error = String.format("%s network %s not found",
230 ERR_PACKETIN, srcInstPort.networkId());
Hyunsun Moon44aac662017-02-18 02:07:01 +0900231 throw new IllegalStateException(error);
232 }
233
234 setDownstreamRules(srcInstPort,
daniel parkee8700b2017-05-11 15:50:03 +0900235 osNet.getProviderSegID(),
236 osNet.getNetworkType(),
Hyunsun Moon44aac662017-02-18 02:07:01 +0900237 externalIp,
daniel park576969a2018-03-09 07:07:41 +0900238 externalPeerRouter,
Hyunsun Moon44aac662017-02-18 02:07:01 +0900239 patPort,
240 packetIn);
241
daniel parkee8700b2017-05-11 15:50:03 +0900242 setUpstreamRules(osNet.getProviderSegID(),
243 osNet.getNetworkType(),
Hyunsun Moon44aac662017-02-18 02:07:01 +0900244 externalIp,
daniel park576969a2018-03-09 07:07:41 +0900245 externalPeerRouter,
Hyunsun Moon44aac662017-02-18 02:07:01 +0900246 patPort,
247 packetIn);
248 }
249
Hyunsun Moon0d457362017-06-27 17:19:41 +0900250 private void setDownstreamRules(InstancePort srcInstPort, String segmentId,
251 NetworkType networkType,
daniel parkb5817102018-02-15 00:18:51 +0900252 IpAddress externalIp,
daniel park576969a2018-03-09 07:07:41 +0900253 ExternalPeerRouter externalPeerRouter,
daniel parkb5817102018-02-15 00:18:51 +0900254 TpPort patPort,
Hyunsun Moon44aac662017-02-18 02:07:01 +0900255 InboundPacket packetIn) {
256 IPv4 iPacket = (IPv4) packetIn.parsed().getPayload();
257 IpAddress internalIp = IpAddress.valueOf(iPacket.getSourceAddress());
258
259 TrafficSelector.Builder sBuilder = DefaultTrafficSelector.builder()
260 .matchEthType(Ethernet.TYPE_IPV4)
261 .matchIPProtocol(iPacket.getProtocol())
Jian Li6a47fd02018-11-27 21:51:03 +0900262 .matchIPDst(IpPrefix.valueOf(externalIp.getIp4Address(), VM_PREFIX))
263 .matchIPSrc(IpPrefix.valueOf(iPacket.getDestinationAddress(), VM_PREFIX));
Hyunsun Moon44aac662017-02-18 02:07:01 +0900264
265 TrafficTreatment.Builder tBuilder = DefaultTrafficTreatment.builder()
Hyunsun Moon44aac662017-02-18 02:07:01 +0900266 .setEthDst(packetIn.parsed().getSourceMAC())
267 .setIpDst(internalIp);
268
Jian Li5e2ad4a2018-07-16 13:40:53 +0900269 if (!externalPeerRouter.vlanId().equals(VlanId.NONE)) {
270 sBuilder.matchVlanId(externalPeerRouter.vlanId());
daniel park576969a2018-03-09 07:07:41 +0900271 tBuilder.popVlan();
272 }
273
daniel parkee8700b2017-05-11 15:50:03 +0900274 switch (networkType) {
275 case VXLAN:
276 tBuilder.setTunnelId(Long.parseLong(segmentId));
277 break;
278 case VLAN:
279 tBuilder.pushVlan()
Daniel Parkc64b4c62018-05-09 18:13:39 +0900280 .setVlanId(VlanId.vlanId(segmentId));
daniel parkee8700b2017-05-11 15:50:03 +0900281 break;
282 default:
Jian Li71670d12018-03-02 21:31:07 +0900283 final String error = String.format("%s %s",
284 ERR_UNSUPPORTED_NET_TYPE, networkType.toString());
daniel parkee8700b2017-05-11 15:50:03 +0900285 throw new IllegalStateException(error);
286 }
287
288
Hyunsun Moon44aac662017-02-18 02:07:01 +0900289 switch (iPacket.getProtocol()) {
290 case IPv4.PROTOCOL_TCP:
291 TCP tcpPacket = (TCP) iPacket.getPayload();
292 sBuilder.matchTcpSrc(TpPort.tpPort(tcpPacket.getDestinationPort()))
293 .matchTcpDst(patPort);
294 tBuilder.setTcpDst(TpPort.tpPort(tcpPacket.getSourcePort()));
295 break;
296 case IPv4.PROTOCOL_UDP:
297 UDP udpPacket = (UDP) iPacket.getPayload();
298 sBuilder.matchUdpSrc(TpPort.tpPort(udpPacket.getDestinationPort()))
299 .matchUdpDst(patPort);
300 tBuilder.setUdpDst(TpPort.tpPort(udpPacket.getSourcePort()));
301 break;
302 default:
303 break;
304 }
305
Hyunsun Moon0d457362017-06-27 17:19:41 +0900306 OpenstackNode srcNode = osNodeService.node(srcInstPort.deviceId());
307 osNodeService.completeNodes(GATEWAY).forEach(gNode -> {
Jian Li6a47fd02018-11-27 21:51:03 +0900308 TrafficTreatment treatment =
309 getDownStreamTreatment(networkType, tBuilder, gNode, srcNode);
sanghodc375372017-06-08 10:41:30 +0900310 osFlowRuleService.setRule(
311 appId,
Hyunsun Moon0d457362017-06-27 17:19:41 +0900312 gNode.intgBridge(),
sanghodc375372017-06-08 10:41:30 +0900313 sBuilder.build(),
Jian Li6a47fd02018-11-27 21:51:03 +0900314 treatment,
sanghodc375372017-06-08 10:41:30 +0900315 PRIORITY_SNAT_RULE,
316 GW_COMMON_TABLE,
317 true);
Hyunsun Moon44aac662017-02-18 02:07:01 +0900318 });
319 }
320
Jian Li6a47fd02018-11-27 21:51:03 +0900321 private TrafficTreatment getDownStreamTreatment(NetworkType networkType,
322 TrafficTreatment.Builder tBuilder,
323 OpenstackNode gNode,
324 OpenstackNode srcNode) {
325 TrafficTreatment.Builder tmpBuilder =
326 DefaultTrafficTreatment.builder(tBuilder.build());
327 switch (networkType) {
328 case VXLAN:
329 tmpBuilder.extension(RulePopulatorUtil.buildExtension(
330 deviceService,
331 gNode.intgBridge(),
332 srcNode.dataIp().getIp4Address()), gNode.intgBridge())
333 .setOutput(gNode.tunnelPortNum());
334 break;
335 case VLAN:
336 tmpBuilder.setOutput(gNode.vlanPortNum());
337 break;
338 default:
339 final String error = String.format("%s %s",
340 ERR_UNSUPPORTED_NET_TYPE, networkType.toString());
341 throw new IllegalStateException(error);
342 }
343
344 return tmpBuilder.build();
345 }
346
Hyunsun Moon0d457362017-06-27 17:19:41 +0900347 private void setUpstreamRules(String segmentId, NetworkType networkType,
daniel park576969a2018-03-09 07:07:41 +0900348 IpAddress externalIp, ExternalPeerRouter externalPeerRouter,
daniel parkb5817102018-02-15 00:18:51 +0900349 TpPort patPort,
Hyunsun Moon44aac662017-02-18 02:07:01 +0900350 InboundPacket packetIn) {
351 IPv4 iPacket = (IPv4) packetIn.parsed().getPayload();
daniel parkee8700b2017-05-11 15:50:03 +0900352
353 TrafficSelector.Builder sBuilder = DefaultTrafficSelector.builder()
Hyunsun Moon44aac662017-02-18 02:07:01 +0900354 .matchEthType(Ethernet.TYPE_IPV4)
355 .matchIPProtocol(iPacket.getProtocol())
Jian Li6a47fd02018-11-27 21:51:03 +0900356 .matchIPSrc(IpPrefix.valueOf(iPacket.getSourceAddress(), VM_PREFIX))
357 .matchIPDst(IpPrefix.valueOf(iPacket.getDestinationAddress(), VM_PREFIX));
Hyunsun Moon44aac662017-02-18 02:07:01 +0900358
359 TrafficTreatment.Builder tBuilder = DefaultTrafficTreatment.builder();
daniel parkee8700b2017-05-11 15:50:03 +0900360
361 switch (networkType) {
362 case VXLAN:
363 sBuilder.matchTunnelId(Long.parseLong(segmentId));
364 break;
365 case VLAN:
366 sBuilder.matchVlanId(VlanId.vlanId(segmentId));
367 tBuilder.popVlan();
368 break;
369 default:
Jian Li71670d12018-03-02 21:31:07 +0900370 final String error = String.format("%s %s",
371 ERR_UNSUPPORTED_NET_TYPE, networkType.toString());
daniel parkee8700b2017-05-11 15:50:03 +0900372 throw new IllegalStateException(error);
373 }
374
Hyunsun Moon44aac662017-02-18 02:07:01 +0900375 switch (iPacket.getProtocol()) {
376 case IPv4.PROTOCOL_TCP:
377 TCP tcpPacket = (TCP) iPacket.getPayload();
378 sBuilder.matchTcpSrc(TpPort.tpPort(tcpPacket.getSourcePort()))
379 .matchTcpDst(TpPort.tpPort(tcpPacket.getDestinationPort()));
Jian Li6a47fd02018-11-27 21:51:03 +0900380 tBuilder.setTcpSrc(patPort).setEthDst(externalPeerRouter.macAddress());
Hyunsun Moon44aac662017-02-18 02:07:01 +0900381 break;
382 case IPv4.PROTOCOL_UDP:
383 UDP udpPacket = (UDP) iPacket.getPayload();
384 sBuilder.matchUdpSrc(TpPort.tpPort(udpPacket.getSourcePort()))
385 .matchUdpDst(TpPort.tpPort(udpPacket.getDestinationPort()));
Jian Li6a47fd02018-11-27 21:51:03 +0900386 tBuilder.setUdpSrc(patPort).setEthDst(externalPeerRouter.macAddress());
Hyunsun Moon44aac662017-02-18 02:07:01 +0900387 break;
388 default:
389 log.debug("Unsupported IPv4 protocol {}");
390 break;
391 }
392
Jian Li5e2ad4a2018-07-16 13:40:53 +0900393 if (!externalPeerRouter.vlanId().equals(VlanId.NONE)) {
394 tBuilder.pushVlan().setVlanId(externalPeerRouter.vlanId());
daniel park576969a2018-03-09 07:07:41 +0900395 }
396
Hyunsun Moon44aac662017-02-18 02:07:01 +0900397 tBuilder.setIpSrc(externalIp);
Hyunsun Moon0d457362017-06-27 17:19:41 +0900398 osNodeService.completeNodes(GATEWAY).forEach(gNode -> {
Hyunsun Moon44aac662017-02-18 02:07:01 +0900399 TrafficTreatment.Builder tmpBuilder =
400 DefaultTrafficTreatment.builder(tBuilder.build());
daniel parkb5817102018-02-15 00:18:51 +0900401 tmpBuilder.setOutput(gNode.uplinkPortNum());
Hyunsun Moon44aac662017-02-18 02:07:01 +0900402
sanghodc375372017-06-08 10:41:30 +0900403 osFlowRuleService.setRule(
404 appId,
Hyunsun Moon0d457362017-06-27 17:19:41 +0900405 gNode.intgBridge(),
sanghodc375372017-06-08 10:41:30 +0900406 sBuilder.build(),
407 tmpBuilder.build(),
408 PRIORITY_SNAT_RULE,
409 GW_COMMON_TABLE,
410 true);
Hyunsun Moon44aac662017-02-18 02:07:01 +0900411 });
412 }
413
414 private void packetOut(Ethernet ethPacketIn, DeviceId srcDevice, int patPort,
daniel park576969a2018-03-09 07:07:41 +0900415 IpAddress externalIp, ExternalPeerRouter externalPeerRouter) {
Hyunsun Moon44aac662017-02-18 02:07:01 +0900416 IPv4 iPacket = (IPv4) ethPacketIn.getPayload();
Hyunsun Moon44aac662017-02-18 02:07:01 +0900417 switch (iPacket.getProtocol()) {
418 case IPv4.PROTOCOL_TCP:
Jian Li6a47fd02018-11-27 21:51:03 +0900419 iPacket.setPayload(buildPacketOutTcp(iPacket, patPort));
Hyunsun Moon44aac662017-02-18 02:07:01 +0900420 break;
421 case IPv4.PROTOCOL_UDP:
Jian Li6a47fd02018-11-27 21:51:03 +0900422 iPacket.setPayload(buildPacketOutUdp(iPacket, patPort));
Hyunsun Moon44aac662017-02-18 02:07:01 +0900423 break;
424 default:
425 log.trace("Temporally, this method can process UDP and TCP protocol.");
426 return;
427 }
428
429 iPacket.setSourceAddress(externalIp.toString());
430 iPacket.resetChecksum();
431 iPacket.setParent(ethPacketIn);
daniel park576969a2018-03-09 07:07:41 +0900432 ethPacketIn.setSourceMACAddress(DEFAULT_GATEWAY_MAC);
Jian Li5e2ad4a2018-07-16 13:40:53 +0900433 ethPacketIn.setDestinationMACAddress(externalPeerRouter.macAddress());
Hyunsun Moon44aac662017-02-18 02:07:01 +0900434 ethPacketIn.setPayload(iPacket);
daniel park576969a2018-03-09 07:07:41 +0900435
Jian Li5e2ad4a2018-07-16 13:40:53 +0900436 if (!externalPeerRouter.vlanId().equals(VlanId.NONE)) {
437 ethPacketIn.setVlanID(externalPeerRouter.vlanId().toShort());
daniel park576969a2018-03-09 07:07:41 +0900438 }
439
daniel parkee8700b2017-05-11 15:50:03 +0900440 ethPacketIn.resetChecksum();
Hyunsun Moon44aac662017-02-18 02:07:01 +0900441
Hyunsun Moon0d457362017-06-27 17:19:41 +0900442 OpenstackNode srcNode = osNodeService.node(srcDevice);
443 if (srcNode == null) {
444 final String error = String.format("Cannot find openstack node for %s",
445 srcDevice);
446 throw new IllegalStateException(error);
447 }
daniel parkee8700b2017-05-11 15:50:03 +0900448
daniel park576969a2018-03-09 07:07:41 +0900449 TrafficTreatment.Builder tBuilder = DefaultTrafficTreatment.builder();
450
Hyunsun Moon44aac662017-02-18 02:07:01 +0900451 packetService.emit(new DefaultOutboundPacket(
452 srcDevice,
daniel park576969a2018-03-09 07:07:41 +0900453 tBuilder.setOutput(srcNode.uplinkPortNum()).build(),
Hyunsun Moon44aac662017-02-18 02:07:01 +0900454 ByteBuffer.wrap(ethPacketIn.serialize())));
455 }
456
Jian Li6a47fd02018-11-27 21:51:03 +0900457 private TCP buildPacketOutTcp(IPv4 iPacket, int patPort) {
458 TCP tcpPacket = (TCP) iPacket.getPayload();
459 tcpPacket.setSourcePort(patPort);
460 tcpPacket.resetChecksum();
461 tcpPacket.setParent(iPacket);
462
463 return tcpPacket;
464 }
465
466 private UDP buildPacketOutUdp(IPv4 iPacket, int patPort) {
467 UDP udpPacket = (UDP) iPacket.getPayload();
468 udpPacket.setSourcePort(patPort);
469 udpPacket.resetChecksum();
470 udpPacket.setParent(iPacket);
471
472 return udpPacket;
473 }
474
Hyunsun Moon0e058f22017-04-19 17:00:52 +0900475 private int getPortNum() {
daniel park0bc7fdb2017-03-13 14:20:08 +0900476 if (unUsedPortNumSet.isEmpty()) {
Hyunsun Moon44aac662017-02-18 02:07:01 +0900477 clearPortNumMap();
Hyunsun Moon44aac662017-02-18 02:07:01 +0900478 }
daniel park0bc7fdb2017-03-13 14:20:08 +0900479 int portNum = findUnusedPortNum();
daniel park0bc7fdb2017-03-13 14:20:08 +0900480 if (portNum != 0) {
Hyunsun Moon0e058f22017-04-19 17:00:52 +0900481 unUsedPortNumSet.remove(portNum);
482 allocatedPortNumMap.put(portNum, System.currentTimeMillis());
daniel park0bc7fdb2017-03-13 14:20:08 +0900483 }
Hyunsun Moon44aac662017-02-18 02:07:01 +0900484 return portNum;
485 }
486
487 private int findUnusedPortNum() {
Hyunsun Moon0e058f22017-04-19 17:00:52 +0900488 return unUsedPortNumSet.stream().findAny().orElse(0);
Hyunsun Moon44aac662017-02-18 02:07:01 +0900489 }
490
491 private void clearPortNumMap() {
daniel park0bc7fdb2017-03-13 14:20:08 +0900492 allocatedPortNumMap.entrySet().forEach(e -> {
Hyunsun Moon0e058f22017-04-19 17:00:52 +0900493 if (System.currentTimeMillis() - e.getValue().value() > TIME_OUT_SNAT_PORT_MS) {
daniel park0bc7fdb2017-03-13 14:20:08 +0900494 allocatedPortNumMap.remove(e.getKey());
495 unUsedPortNumSet.add(e.getKey());
Hyunsun Moon44aac662017-02-18 02:07:01 +0900496 }
497 });
498 }
499
500 private class InternalPacketProcessor implements PacketProcessor {
501
502 @Override
503 public void process(PacketContext context) {
Jian Li34220ea2018-11-14 01:30:24 +0900504
Hyunsun Moon44aac662017-02-18 02:07:01 +0900505 if (context.isHandled()) {
506 return;
Hyunsun Moon44aac662017-02-18 02:07:01 +0900507 }
508
509 InboundPacket pkt = context.inPacket();
510 Ethernet eth = pkt.parsed();
511 if (eth == null || eth.getEtherType() == Ethernet.TYPE_ARP) {
512 return;
513 }
514
515 IPv4 iPacket = (IPv4) eth.getPayload();
516 switch (iPacket.getProtocol()) {
517 case IPv4.PROTOCOL_ICMP:
518 break;
519 case IPv4.PROTOCOL_UDP:
520 UDP udpPacket = (UDP) iPacket.getPayload();
521 if (udpPacket.getDestinationPort() == UDP.DHCP_SERVER_PORT &&
522 udpPacket.getSourcePort() == UDP.DHCP_CLIENT_PORT) {
Jian Li6a47fd02018-11-27 21:51:03 +0900523 break; // don't process DHCP
Hyunsun Moon44aac662017-02-18 02:07:01 +0900524 }
525 default:
Jian Li34220ea2018-11-14 01:30:24 +0900526 eventExecutor.execute(() -> {
Jian Li34220ea2018-11-14 01:30:24 +0900527 if (!isRelevantHelper(context)) {
528 return;
529 }
Jian Li34220ea2018-11-14 01:30:24 +0900530 processSnatPacket(context, eth);
531 });
Hyunsun Moon44aac662017-02-18 02:07:01 +0900532 break;
533 }
534 }
Jian Li34220ea2018-11-14 01:30:24 +0900535
536 private boolean isRelevantHelper(PacketContext context) {
537 Set<DeviceId> gateways = osNodeService.completeNodes(GATEWAY)
538 .stream().map(OpenstackNode::intgBridge)
539 .collect(Collectors.toSet());
540
541 return gateways.contains(context.inPacket().receivedFrom().deviceId());
542 }
Hyunsun Moon44aac662017-02-18 02:07:01 +0900543 }
544}