blob: c82c703d255112319578e09865841edd63c4aa27 [file] [log] [blame]
sangho6a9ff0d2017-03-27 11:23:37 +09001/*
Brian O'Connora09fe5b2017-08-03 21:12:30 -07002 * Copyright 2017-present Open Networking Foundation
sangho6a9ff0d2017-03-27 11:23:37 +09003 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16package org.onosproject.openstacknetworking.impl;
17
Hyunsun Moonae51e732017-04-25 17:46:21 +090018import com.google.common.collect.ImmutableSet;
sangho6a9ff0d2017-03-27 11:23:37 +090019import org.apache.felix.scr.annotations.Activate;
20import org.apache.felix.scr.annotations.Component;
21import org.apache.felix.scr.annotations.Deactivate;
22import org.apache.felix.scr.annotations.Reference;
23import org.apache.felix.scr.annotations.ReferenceCardinality;
24import org.apache.felix.scr.annotations.Service;
25import org.onlab.util.KryoNamespace;
26import org.onosproject.core.ApplicationId;
27import org.onosproject.core.CoreService;
28import org.onosproject.openstacknetworking.api.OpenstackSecurityGroupEvent;
29import org.onosproject.openstacknetworking.api.OpenstackSecurityGroupStore;
30import org.onosproject.openstacknetworking.api.OpenstackSecurityGroupStoreDelegate;
31import org.onosproject.store.AbstractStore;
32import org.onosproject.store.serializers.KryoNamespaces;
33import org.onosproject.store.service.ConsistentMap;
34import org.onosproject.store.service.MapEvent;
35import org.onosproject.store.service.MapEventListener;
36import org.onosproject.store.service.Serializer;
37import org.onosproject.store.service.StorageService;
38import org.onosproject.store.service.Versioned;
39import org.openstack4j.model.network.SecurityGroup;
40import org.openstack4j.model.network.SecurityGroupRule;
41import org.openstack4j.openstack.networking.domain.NeutronSecurityGroup;
42import org.openstack4j.openstack.networking.domain.NeutronSecurityGroupRule;
43import org.slf4j.Logger;
44
Hyunsun Moonae51e732017-04-25 17:46:21 +090045import java.util.Set;
sangho6a9ff0d2017-03-27 11:23:37 +090046import java.util.concurrent.ExecutorService;
Hyunsun Moonae51e732017-04-25 17:46:21 +090047import java.util.stream.Collectors;
sangho6a9ff0d2017-03-27 11:23:37 +090048
49import static com.google.common.base.Preconditions.checkArgument;
50import static java.util.concurrent.Executors.newSingleThreadExecutor;
51import static org.onlab.util.Tools.groupedThreads;
52import static org.onosproject.openstacknetworking.api.Constants.OPENSTACK_NETWORKING_APP_ID;
Hyunsun Moonae51e732017-04-25 17:46:21 +090053import static org.onosproject.openstacknetworking.api.OpenstackSecurityGroupEvent.Type.*;
sangho6a9ff0d2017-03-27 11:23:37 +090054import static org.slf4j.LoggerFactory.getLogger;
55
56/**
57 * Manages the inventory of OpenStack security group using a {@code ConsistentMap}.
58 *
59 */
60@Service
61@Component(immediate = true)
62public class DistributedSecurityGroupStore
63 extends AbstractStore<OpenstackSecurityGroupEvent, OpenstackSecurityGroupStoreDelegate>
64 implements OpenstackSecurityGroupStore {
65
66 protected final Logger log = getLogger(getClass());
67
68 private static final String ERR_NOT_FOUND = " does not exist";
69 private static final String ERR_DUPLICATE = " already exists";
70
71 private static final KryoNamespace SERIALIZER_SECURITY_GROUP = KryoNamespace.newBuilder()
72 .register(KryoNamespaces.API)
73 .register(SecurityGroup.class)
74 .register(SecurityGroupRule.class)
75 .register(NeutronSecurityGroupRule.class)
76 .register(NeutronSecurityGroup.class)
77 .build();
78
79 @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY)
80 protected CoreService coreService;
81
82 @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY)
83 protected StorageService storageService;
84
85 private final ExecutorService eventExecutor = newSingleThreadExecutor(
86 groupedThreads(this.getClass().getSimpleName(), "event-handler", log));
87
88 private final MapEventListener<String, SecurityGroup> securityGroupMapListener =
89 new OpenstackSecurityGroupMapListener();
sangho6a9ff0d2017-03-27 11:23:37 +090090
91 private ConsistentMap<String, SecurityGroup> osSecurityGroupStore;
sangho6a9ff0d2017-03-27 11:23:37 +090092
93 @Activate
94 protected void activate() {
95 ApplicationId appId = coreService.registerApplication(OPENSTACK_NETWORKING_APP_ID);
96
97 osSecurityGroupStore = storageService.<String, SecurityGroup>consistentMapBuilder()
98 .withSerializer(Serializer.using(SERIALIZER_SECURITY_GROUP))
99 .withName("openstack-securitygroupstore")
100 .withApplicationId(appId)
101 .build();
102 osSecurityGroupStore.addListener(securityGroupMapListener);
103
sangho6a9ff0d2017-03-27 11:23:37 +0900104 log.info("Started");
105 }
106
107 @Deactivate
108 protected void deactivate() {
109 osSecurityGroupStore.removeListener(securityGroupMapListener);
sangho6a9ff0d2017-03-27 11:23:37 +0900110 eventExecutor.shutdown();
111
112 log.info("Stopped");
113 }
114
115 @Override
116 public void createSecurityGroup(SecurityGroup sg) {
117 osSecurityGroupStore.compute(sg.getId(), (id, existing) -> {
118 final String error = sg.getName() + ERR_DUPLICATE;
119 checkArgument(existing == null, error);
120 return sg;
121 });
122 }
123
124 @Override
Hyunsun Moonae51e732017-04-25 17:46:21 +0900125 public void updateSecurityGroup(SecurityGroup sg) {
126 osSecurityGroupStore.compute(sg.getId(), (id, existing) -> {
127 final String error = sg.getName() + ERR_NOT_FOUND;
128 checkArgument(existing != null, error);
129 return sg;
130 });
sangho6a9ff0d2017-03-27 11:23:37 +0900131 }
132
133 @Override
134 public SecurityGroup removeSecurityGroup(String sgId) {
135 Versioned<SecurityGroup> sg = osSecurityGroupStore.remove(sgId);
136 return sg == null ? null : sg.value();
137 }
138
139 @Override
sangho6a9ff0d2017-03-27 11:23:37 +0900140 public SecurityGroup securityGroup(String sgId) {
141 Versioned<SecurityGroup> osSg = osSecurityGroupStore.get(sgId);
142 return osSg == null ? null : osSg.value();
143 }
144
145 @Override
Hyunsun Moonae51e732017-04-25 17:46:21 +0900146 public Set<SecurityGroup> securityGroups() {
147 Set<SecurityGroup> osSgs = osSecurityGroupStore.values().stream()
148 .map(Versioned::value)
149 .collect(Collectors.toSet());
150 return ImmutableSet.copyOf(osSgs);
151 }
152
153 @Override
154 public void clear() {
155 osSecurityGroupStore.clear();
sangho6a9ff0d2017-03-27 11:23:37 +0900156 }
157
158 private class OpenstackSecurityGroupMapListener implements MapEventListener<String, SecurityGroup> {
159
160 @Override
161 public void event(MapEvent<String, SecurityGroup> event) {
162 switch (event.type()) {
163 case INSERT:
Hyunsun Moonae51e732017-04-25 17:46:21 +0900164 log.debug("OpenStack security group created {}", event.newValue());
sangho6a9ff0d2017-03-27 11:23:37 +0900165 eventExecutor.execute(() ->
166 notifyDelegate(new OpenstackSecurityGroupEvent(
Hyunsun Moonae51e732017-04-25 17:46:21 +0900167 OPENSTACK_SECURITY_GROUP_CREATED,
168 event.newValue().value())));
sangho6a9ff0d2017-03-27 11:23:37 +0900169 break;
Hyunsun Moonae51e732017-04-25 17:46:21 +0900170 case UPDATE:
171 log.debug("OpenStack security group updated {}", event.newValue());
172 eventExecutor.execute(() -> processUpdate(
173 event.oldValue().value(),
174 event.newValue().value()));
175 break;
sangho6a9ff0d2017-03-27 11:23:37 +0900176 case REMOVE:
Hyunsun Moonae51e732017-04-25 17:46:21 +0900177 log.debug("OpenStack security group removed {}", event.newValue());
sangho6a9ff0d2017-03-27 11:23:37 +0900178 eventExecutor.execute(() ->
179 notifyDelegate(new OpenstackSecurityGroupEvent(
Hyunsun Moonae51e732017-04-25 17:46:21 +0900180 OPENSTACK_SECURITY_GROUP_REMOVED,
sangho6a9ff0d2017-03-27 11:23:37 +0900181 event.oldValue().value())));
182 break;
183 default:
184 }
185 }
sangho6a9ff0d2017-03-27 11:23:37 +0900186
Hyunsun Moonae51e732017-04-25 17:46:21 +0900187 private void processUpdate(SecurityGroup oldSg, SecurityGroup newSg) {
188 Set<String> oldSgRuleIds = oldSg.getRules().stream()
189 .map(SecurityGroupRule::getId).collect(Collectors.toSet());
190 Set<String> newSgRuleIds = newSg.getRules().stream()
191 .map(SecurityGroupRule::getId).collect(Collectors.toSet());
sangho6a9ff0d2017-03-27 11:23:37 +0900192
Hyunsun Moonae51e732017-04-25 17:46:21 +0900193 oldSg.getRules().stream().filter(sgRule -> !newSgRuleIds.contains(sgRule.getId()))
194 .forEach(sgRule -> notifyDelegate(new OpenstackSecurityGroupEvent(
195 OPENSTACK_SECURITY_GROUP_RULE_REMOVED, newSg, sgRule)
196 ));
197 newSg.getRules().stream().filter(sgRule -> !oldSgRuleIds.contains(sgRule.getId()))
198 .forEach(sgRule -> notifyDelegate(new OpenstackSecurityGroupEvent(
199 OPENSTACK_SECURITY_GROUP_RULE_CREATED, newSg, sgRule)
200 ));
sangho6a9ff0d2017-03-27 11:23:37 +0900201 }
202 }
203}