blob: 4c351af2540550ac2ddad7c13a2a9b835dc56f95 [file] [log] [blame]
Jian Li4aa17642019-01-30 00:01:11 +09001/*
2 * Copyright 2019-present Open Networking Foundation
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16package org.onosproject.k8snetworking.impl;
17
18import org.onlab.packet.ARP;
19import org.onlab.packet.EthType;
20import org.onlab.packet.Ethernet;
21import org.onlab.packet.Ip4Address;
22import org.onlab.packet.IpAddress;
23import org.onlab.packet.MacAddress;
Jian Li44c2b122019-05-03 14:46:34 +090024import org.onlab.packet.VlanId;
25import org.onlab.util.KryoNamespace;
Jian Li4aa17642019-01-30 00:01:11 +090026import org.onlab.util.Tools;
27import org.onosproject.cfg.ComponentConfigService;
28import org.onosproject.cfg.ConfigProperty;
29import org.onosproject.cluster.ClusterService;
30import org.onosproject.cluster.LeadershipService;
31import org.onosproject.cluster.NodeId;
32import org.onosproject.core.ApplicationId;
33import org.onosproject.core.CoreService;
34import org.onosproject.k8snetworking.api.K8sFlowRuleService;
Jian Li140d8a22019-04-24 23:41:44 +090035import org.onosproject.k8snetworking.api.K8sNetwork;
Jian Li4aa17642019-01-30 00:01:11 +090036import org.onosproject.k8snetworking.api.K8sNetworkService;
37import org.onosproject.k8snetworking.api.K8sPort;
Jian Li7d111d72019-04-12 13:58:44 +090038import org.onosproject.k8snetworking.api.K8sServiceService;
Jian Li4aa17642019-01-30 00:01:11 +090039import org.onosproject.k8snode.api.K8sNode;
40import org.onosproject.k8snode.api.K8sNodeEvent;
41import org.onosproject.k8snode.api.K8sNodeListener;
42import org.onosproject.k8snode.api.K8sNodeService;
43import org.onosproject.mastership.MastershipService;
Jian Li44c2b122019-05-03 14:46:34 +090044import org.onosproject.net.ConnectPoint;
Jian Li4aa17642019-01-30 00:01:11 +090045import org.onosproject.net.PortNumber;
46import org.onosproject.net.device.DeviceService;
47import org.onosproject.net.flow.DefaultTrafficSelector;
48import org.onosproject.net.flow.DefaultTrafficTreatment;
49import org.onosproject.net.flow.TrafficSelector;
50import org.onosproject.net.flow.TrafficTreatment;
51import org.onosproject.net.packet.DefaultOutboundPacket;
52import org.onosproject.net.packet.PacketContext;
53import org.onosproject.net.packet.PacketProcessor;
54import org.onosproject.net.packet.PacketService;
Jian Li44c2b122019-05-03 14:46:34 +090055import org.onosproject.store.serializers.KryoNamespaces;
56import org.onosproject.store.service.ConsistentMap;
57import org.onosproject.store.service.Serializer;
58import org.onosproject.store.service.StorageService;
Jian Li4aa17642019-01-30 00:01:11 +090059import org.osgi.service.component.ComponentContext;
60import org.osgi.service.component.annotations.Activate;
61import org.osgi.service.component.annotations.Component;
62import org.osgi.service.component.annotations.Deactivate;
63import org.osgi.service.component.annotations.Modified;
64import org.osgi.service.component.annotations.Reference;
65import org.osgi.service.component.annotations.ReferenceCardinality;
66import org.slf4j.Logger;
67import org.slf4j.LoggerFactory;
68
69import java.nio.ByteBuffer;
70import java.util.Dictionary;
71import java.util.Objects;
72import java.util.Set;
73import java.util.concurrent.ExecutorService;
Jian Li7d111d72019-04-12 13:58:44 +090074import java.util.stream.Collectors;
Jian Li4aa17642019-01-30 00:01:11 +090075
76import static java.util.concurrent.Executors.newSingleThreadExecutor;
77import static org.onlab.util.Tools.groupedThreads;
78import static org.onosproject.k8snetworking.api.Constants.ARP_BROADCAST_MODE;
79import static org.onosproject.k8snetworking.api.Constants.ARP_PROXY_MODE;
80import static org.onosproject.k8snetworking.api.Constants.ARP_TABLE;
81import static org.onosproject.k8snetworking.api.Constants.K8S_NETWORKING_APP_ID;
Jian Li140d8a22019-04-24 23:41:44 +090082import static org.onosproject.k8snetworking.api.Constants.NODE_IP_PREFIX;
Jian Li4aa17642019-01-30 00:01:11 +090083import static org.onosproject.k8snetworking.api.Constants.PRIORITY_ARP_CONTROL_RULE;
Jian Li7d111d72019-04-12 13:58:44 +090084import static org.onosproject.k8snetworking.api.Constants.SERVICE_FAKE_MAC_STR;
Jian Li4aa17642019-01-30 00:01:11 +090085import static org.onosproject.k8snetworking.impl.OsgiPropertyConstants.ARP_MODE;
86import static org.onosproject.k8snetworking.impl.OsgiPropertyConstants.ARP_MODE_DEFAULT;
87import static org.onosproject.k8snetworking.impl.OsgiPropertyConstants.GATEWAY_MAC;
88import static org.onosproject.k8snetworking.impl.OsgiPropertyConstants.GATEWAY_MAC_DEFAULT;
Jian Li140d8a22019-04-24 23:41:44 +090089import static org.onosproject.k8snetworking.api.Constants.SHIFTED_IP_PREFIX;
Jian Li4aa17642019-01-30 00:01:11 +090090import static org.onosproject.k8snetworking.util.K8sNetworkingUtil.getPropertyValue;
Jian Li004526d2019-02-25 16:26:27 +090091import static org.onosproject.k8snetworking.util.K8sNetworkingUtil.unshiftIpDomain;
Jian Li4aa17642019-01-30 00:01:11 +090092
93/**
94 * Handles ARP packet from containers.
95 */
96@Component(
97 immediate = true,
98 property = {
99 GATEWAY_MAC + "=" + GATEWAY_MAC_DEFAULT,
100 ARP_MODE + "=" + ARP_MODE_DEFAULT
101 }
102)
103public class K8sSwitchingArpHandler {
104
105 private final Logger log = LoggerFactory.getLogger(getClass());
106
Jian Li7d111d72019-04-12 13:58:44 +0900107 private static final String GATEWAY_MAC = "gatewayMac";
108 private static final String ARP_MODE = "arpMode";
109
Jian Li44c2b122019-05-03 14:46:34 +0900110 private static final KryoNamespace SERIALIZER_HOST_MAC = KryoNamespace.newBuilder()
111 .register(KryoNamespaces.API)
112 .build();
113
Jian Li4aa17642019-01-30 00:01:11 +0900114 @Reference(cardinality = ReferenceCardinality.MANDATORY)
115 protected CoreService coreService;
116
117 @Reference(cardinality = ReferenceCardinality.MANDATORY)
118 protected PacketService packetService;
119
120 @Reference(cardinality = ReferenceCardinality.MANDATORY)
121 protected ComponentConfigService configService;
122
123 @Reference(cardinality = ReferenceCardinality.MANDATORY)
124 protected ClusterService clusterService;
125
126 @Reference(cardinality = ReferenceCardinality.MANDATORY)
127 protected LeadershipService leadershipService;
128
129 @Reference(cardinality = ReferenceCardinality.MANDATORY)
130 protected DeviceService deviceService;
131
132 @Reference(cardinality = ReferenceCardinality.MANDATORY)
133 protected MastershipService mastershipService;
134
135 @Reference(cardinality = ReferenceCardinality.MANDATORY)
Jian Li44c2b122019-05-03 14:46:34 +0900136 protected StorageService storageService;
137
138 @Reference(cardinality = ReferenceCardinality.MANDATORY)
Jian Li4aa17642019-01-30 00:01:11 +0900139 protected K8sNodeService k8sNodeService;
140
141 @Reference(cardinality = ReferenceCardinality.MANDATORY)
142 protected K8sNetworkService k8sNetworkService;
143
144 @Reference(cardinality = ReferenceCardinality.MANDATORY)
145 protected K8sFlowRuleService k8sFlowRuleService;
146
Jian Li7d111d72019-04-12 13:58:44 +0900147 @Reference(cardinality = ReferenceCardinality.MANDATORY)
148 protected K8sServiceService k8sServiceService;
149
Jian Li4aa17642019-01-30 00:01:11 +0900150 /** Fake MAC address for virtual network subnet gateway. */
151 private String gatewayMac = GATEWAY_MAC_DEFAULT;
152
153 /** ARP processing mode, broadcast | proxy (default). */
154 protected String arpMode = ARP_MODE_DEFAULT;
155
156 private MacAddress gwMacAddress;
157
Jian Li44c2b122019-05-03 14:46:34 +0900158 private ConsistentMap<IpAddress, MacAddress> extHostMacStore;
159
Jian Li4aa17642019-01-30 00:01:11 +0900160 private final ExecutorService eventExecutor = newSingleThreadExecutor(
161 groupedThreads(this.getClass().getSimpleName(), "event-handler", log));
162
163 private final InternalPacketProcessor packetProcessor = new InternalPacketProcessor();
164 private final InternalNodeEventListener k8sNodeListener = new InternalNodeEventListener();
165
166 private ApplicationId appId;
167 private NodeId localNodeId;
168
169 @Activate
170 void activate() {
171 appId = coreService.registerApplication(K8S_NETWORKING_APP_ID);
172 configService.registerProperties(getClass());
173 localNodeId = clusterService.getLocalNode().id();
174 leadershipService.runForLeadership(appId.name());
175 k8sNodeService.addListener(k8sNodeListener);
176 packetService.addProcessor(packetProcessor, PacketProcessor.director(0));
177
Jian Li44c2b122019-05-03 14:46:34 +0900178 extHostMacStore = storageService.<IpAddress, MacAddress>consistentMapBuilder()
179 .withSerializer(Serializer.using(SERIALIZER_HOST_MAC))
180 .withName("k8s-host-mac-store")
181 .withApplicationId(appId)
182 .build();
183
Jian Li4aa17642019-01-30 00:01:11 +0900184 log.info("Started");
185 }
186
187 @Deactivate
188 void deactivate() {
189 packetService.removeProcessor(packetProcessor);
190 k8sNodeService.removeListener(k8sNodeListener);
191 leadershipService.withdraw(appId.name());
192 configService.unregisterProperties(getClass(), false);
193 eventExecutor.shutdown();
194
195 log.info("Stopped");
196 }
197
198 @Modified
199 void modified(ComponentContext context) {
200 readComponentConfiguration(context);
201
202 log.info("Modified");
203 }
204
205 /**
206 * Processes ARP request packets.
207 *
208 * @param context packet context
209 * @param ethPacket ethernet packet
210 */
211 private void processPacketIn(PacketContext context, Ethernet ethPacket) {
212 // if the ARP mode is configured as broadcast mode, we simply ignore ARP packet_in
213 if (ARP_BROADCAST_MODE.equals(getArpMode())) {
214 return;
215 }
216
217 ARP arpPacket = (ARP) ethPacket.getPayload();
Jian Li44c2b122019-05-03 14:46:34 +0900218 if (arpPacket.getOpCode() == ARP.OP_REQUEST) {
219 processArpRequest(context, ethPacket);
220 } else if (arpPacket.getOpCode() == ARP.OP_REPLY) {
221 processArpReply(context, ethPacket);
Jian Li4aa17642019-01-30 00:01:11 +0900222 }
Jian Li44c2b122019-05-03 14:46:34 +0900223 }
Jian Li4aa17642019-01-30 00:01:11 +0900224
Jian Li44c2b122019-05-03 14:46:34 +0900225 private void processArpRequest(PacketContext context, Ethernet ethPacket) {
226 ARP arpPacket = (ARP) ethPacket.getPayload();
Jian Li4aa17642019-01-30 00:01:11 +0900227 K8sPort srcPort = k8sNetworkService.ports().stream()
228 .filter(p -> p.macAddress().equals(ethPacket.getSourceMAC()))
229 .findAny().orElse(null);
230
231 if (srcPort == null && !context.inPacket().receivedFrom().port()
232 .equals(PortNumber.LOCAL)) {
233 log.warn("Failed to find source port(MAC:{})", ethPacket.getSourceMAC());
234 return;
235 }
236
237 // FIXME: this is a workaround for storing host GW MAC address,
238 // need to find a way to store the MAC address in persistent way
239 if (context.inPacket().receivedFrom().port().equals(PortNumber.LOCAL)) {
240 gwMacAddress = ethPacket.getSourceMAC();
241 }
242
243 IpAddress targetIp = Ip4Address.valueOf(arpPacket.getTargetProtocolAddress());
244
245 MacAddress replyMac = k8sNetworkService.ports().stream()
Jian Li44c2b122019-05-03 14:46:34 +0900246 // .filter(p -> p.networkId().equals(srcPort.networkId()))
Jian Li4aa17642019-01-30 00:01:11 +0900247 .filter(p -> p.ipAddress().equals(targetIp))
248 .map(K8sPort::macAddress)
249 .findAny().orElse(null);
250
251 long gwIpCnt = k8sNetworkService.networks().stream()
252 .filter(n -> n.gatewayIp().equals(targetIp))
253 .count();
254
Jian Li7d111d72019-04-12 13:58:44 +0900255 if (gwIpCnt > 0) {
Jian Li4aa17642019-01-30 00:01:11 +0900256 replyMac = gwMacAddress;
257 }
258
259 if (replyMac == null) {
Jian Li140d8a22019-04-24 23:41:44 +0900260 String cidr = k8sNetworkService.networks().stream()
261 .map(K8sNetwork::cidr).findAny().orElse(null);
262
263 if (cidr != null) {
264 String unshiftedIp = unshiftIpDomain(targetIp.toString(),
265 SHIFTED_IP_PREFIX, cidr);
266
Jian Li004526d2019-02-25 16:26:27 +0900267 replyMac = k8sNetworkService.ports().stream()
Jian Li140d8a22019-04-24 23:41:44 +0900268 .filter(p -> p.ipAddress().equals(IpAddress.valueOf(unshiftedIp)))
Jian Li004526d2019-02-25 16:26:27 +0900269 .map(K8sPort::macAddress)
270 .findAny().orElse(null);
Jian Li004526d2019-02-25 16:26:27 +0900271 }
272 }
273
274 if (replyMac == null) {
Jian Li7d111d72019-04-12 13:58:44 +0900275 Set<String> serviceIps = k8sServiceService.services().stream()
276 .map(s -> s.getSpec().getClusterIP())
277 .collect(Collectors.toSet());
278 if (serviceIps.contains(targetIp.toString())) {
279 replyMac = MacAddress.valueOf(SERVICE_FAKE_MAC_STR);
280 }
281 }
282
283 if (replyMac == null) {
Jian Li140d8a22019-04-24 23:41:44 +0900284
Jian Li44c2b122019-05-03 14:46:34 +0900285 if (targetIp.toString().startsWith(NODE_IP_PREFIX)) {
286 String targetIpPrefix = targetIp.toString().split("\\.")[1];
287 String nodePrefix = NODE_IP_PREFIX + "." + targetIpPrefix;
Jian Li140d8a22019-04-24 23:41:44 +0900288
Jian Li44c2b122019-05-03 14:46:34 +0900289 String exBridgeCidr = k8sNodeService.completeNodes().stream()
290 .map(n -> n.extBridgeIp().toString()).findAny().orElse(null);
Jian Li140d8a22019-04-24 23:41:44 +0900291
Jian Li44c2b122019-05-03 14:46:34 +0900292 if (exBridgeCidr != null) {
293 String extBridgeIp = unshiftIpDomain(targetIp.toString(),
294 nodePrefix, exBridgeCidr);
295
296 replyMac = k8sNodeService.completeNodes().stream()
297 .filter(n -> extBridgeIp.equals(n.extBridgeIp().toString()))
298 .map(K8sNode::extBridgeMac).findAny().orElse(null);
299
300 if (replyMac == null) {
301 replyMac = extHostMacStore.asJavaMap().get(
302 IpAddress.valueOf(extBridgeIp));
303 }
304
305 // if the source hosts are not in k8s cluster range,
306 // we need to manually learn their MAC addresses
307 if (replyMac == null) {
308 ConnectPoint cp = context.inPacket().receivedFrom();
309 K8sNode k8sNode = k8sNodeService.node(cp.deviceId());
310
311 if (k8sNode != null) {
312 setArpRequest(k8sNode.extBridgeMac().toBytes(),
313 k8sNode.extBridgeIp().toOctets(),
314 IpAddress.valueOf(extBridgeIp).toOctets(),
315 k8sNode);
316 context.block();
317 return;
318 }
319 }
320 }
Jian Li140d8a22019-04-24 23:41:44 +0900321 }
322 }
323
324 if (replyMac == null) {
Jian Lieb488ea2019-04-16 01:50:02 +0900325 replyMac = MacAddress.valueOf(gatewayMac);
326 }
327
328 if (replyMac == null) {
Jian Li4aa17642019-01-30 00:01:11 +0900329 log.debug("Failed to find MAC address for {}", targetIp);
330 return;
331 }
332
333 Ethernet ethReply = ARP.buildArpReply(
334 targetIp.getIp4Address(),
335 replyMac,
336 ethPacket);
337
338 TrafficTreatment treatment = DefaultTrafficTreatment.builder()
339 .setOutput(context.inPacket().receivedFrom().port())
340 .build();
341
342 packetService.emit(new DefaultOutboundPacket(
343 context.inPacket().receivedFrom().deviceId(),
344 treatment,
345 ByteBuffer.wrap(ethReply.serialize())));
Jian Li1b08d652019-05-02 17:28:09 +0900346
347 context.block();
Jian Li4aa17642019-01-30 00:01:11 +0900348 }
349
Jian Li44c2b122019-05-03 14:46:34 +0900350 private void processArpReply(PacketContext context, Ethernet ethPacket) {
351 ARP arpPacket = (ARP) ethPacket.getPayload();
352 ConnectPoint cp = context.inPacket().receivedFrom();
353 K8sNode k8sNode = k8sNodeService.node(cp.deviceId());
354
355 if (k8sNode != null &&
356 ethPacket.getDestinationMAC().equals(k8sNode.extBridgeMac())) {
357 IpAddress srcIp = IpAddress.valueOf(IpAddress.Version.INET,
358 arpPacket.getSenderProtocolAddress());
359 MacAddress srcMac = MacAddress.valueOf(arpPacket.getSenderHardwareAddress());
360
361 // we only add the host IP - MAC map store once,
362 // mutable MAP scenario is not considered for now
363 if (!extHostMacStore.containsKey(srcIp)) {
364 extHostMacStore.put(srcIp, srcMac);
365 }
366 }
367 }
368
369 private void setArpRequest(byte[] senderMac, byte[] senderIp,
370 byte[] targetIp, K8sNode k8sNode) {
371 Ethernet ethRequest = ARP.buildArpRequest(senderMac,
372 senderIp, targetIp, VlanId.NO_VID);
373
374 TrafficTreatment treatment = DefaultTrafficTreatment.builder()
375 .setOutput(k8sNode.intgToExtPatchPortNum())
376 .build();
377
378 packetService.emit(new DefaultOutboundPacket(
379 k8sNode.intgBridge(),
380 treatment,
381 ByteBuffer.wrap(ethRequest.serialize())));
382 }
383
Jian Li4aa17642019-01-30 00:01:11 +0900384 private String getArpMode() {
385 Set<ConfigProperty> properties = configService.getProperties(this.getClass().getName());
386 return getPropertyValue(properties, ARP_MODE);
387 }
388
389 /**
390 * Extracts properties from the component configuration context.
391 *
392 * @param context the component context
393 */
394 private void readComponentConfiguration(ComponentContext context) {
395 Dictionary<?, ?> properties = context.getProperties();
396
397 String updatedMac = Tools.get(properties, GATEWAY_MAC);
398 gatewayMac = updatedMac != null ? updatedMac : GATEWAY_MAC_DEFAULT;
399 log.info("Configured. Gateway MAC is {}", gatewayMac);
400 }
401
402 /**
403 * An internal packet processor which processes ARP request, and results in
404 * packet-out ARP reply.
405 */
406 private class InternalPacketProcessor implements PacketProcessor {
407
408 @Override
409 public void process(PacketContext context) {
410 if (context.isHandled()) {
411 return;
412 }
413
414 Ethernet ethPacket = context.inPacket().parsed();
415 if (ethPacket == null || ethPacket.getEtherType() != Ethernet.TYPE_ARP) {
416 return;
417 }
418
419 eventExecutor.execute(() -> processPacketIn(context, ethPacket));
420 }
421 }
422
423 /**
424 * An internal kubernetes node listener which is used for listening kubernetes
425 * node activity. As long as a node is in complete state, we will install
426 * default ARP rule to handle ARP request.
427 */
428 private class InternalNodeEventListener implements K8sNodeListener {
429
430 private boolean isRelevantHelper() {
431 return Objects.equals(localNodeId, leadershipService.getLeader(appId.name()));
432 }
433
434 @Override
435 public void event(K8sNodeEvent event) {
436 K8sNode k8sNode = event.subject();
437 switch (event.type()) {
438 case K8S_NODE_COMPLETE:
439 eventExecutor.execute(() -> processNodeCompletion(k8sNode));
440 break;
441 case K8S_NODE_INCOMPLETE:
442 eventExecutor.execute(() -> processNodeIncompletion(k8sNode));
443 break;
444 default:
445 break;
446 }
447 }
448
449 private void processNodeCompletion(K8sNode node) {
450 if (!isRelevantHelper()) {
451 return;
452 }
453
454 setDefaultArpRule(node, true);
455 }
456
457 private void processNodeIncompletion(K8sNode node) {
458 if (!isRelevantHelper()) {
459 return;
460 }
461
462 setDefaultArpRule(node, false);
463 }
464
465 private void setDefaultArpRule(K8sNode node, boolean install) {
466
467 if (getArpMode() == null) {
468 return;
469 }
470
471 switch (getArpMode()) {
472 case ARP_PROXY_MODE:
473 setDefaultArpRuleForProxyMode(node, install);
474 break;
475 case ARP_BROADCAST_MODE:
476 // TODO: need to implement broadcast mode
477 log.warn("Not implemented yet.");
478 break;
479 default:
480 log.warn("Invalid ARP mode {}. Please use either " +
481 "broadcast or proxy mode.", getArpMode());
482 break;
483 }
484 }
485
486 private void setDefaultArpRuleForProxyMode(K8sNode node, boolean install) {
487 TrafficSelector selector = DefaultTrafficSelector.builder()
488 .matchEthType(EthType.EtherType.ARP.ethType().toShort())
489 .build();
490
491 TrafficTreatment treatment = DefaultTrafficTreatment.builder()
492 .punt()
493 .build();
494
495 k8sFlowRuleService.setRule(
496 appId,
497 node.intgBridge(),
498 selector,
499 treatment,
500 PRIORITY_ARP_CONTROL_RULE,
501 ARP_TABLE,
502 install
503 );
504 }
505 }
506}