Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 1 | /* |
Brian O'Connor | a09fe5b | 2017-08-03 21:12:30 -0700 | [diff] [blame] | 2 | * Copyright 2016-present Open Networking Foundation |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | package org.onosproject.openstacknetworking.impl; |
| 17 | |
| 18 | import org.apache.felix.scr.annotations.Activate; |
| 19 | import org.apache.felix.scr.annotations.Component; |
| 20 | import org.apache.felix.scr.annotations.Deactivate; |
| 21 | import org.apache.felix.scr.annotations.Reference; |
| 22 | import org.apache.felix.scr.annotations.ReferenceCardinality; |
| 23 | import org.onlab.packet.Ethernet; |
| 24 | import org.onlab.packet.IPv4; |
| 25 | import org.onlab.packet.IpAddress; |
| 26 | import org.onlab.packet.IpPrefix; |
daniel park | b581710 | 2018-02-15 00:18:51 +0900 | [diff] [blame^] | 27 | import org.onlab.packet.MacAddress; |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 28 | import org.onlab.packet.TCP; |
| 29 | import org.onlab.packet.TpPort; |
| 30 | import org.onlab.packet.UDP; |
daniel park | ee8700b | 2017-05-11 15:50:03 +0900 | [diff] [blame] | 31 | import org.onlab.packet.VlanId; |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 32 | import org.onlab.util.KryoNamespace; |
| 33 | import org.onosproject.core.ApplicationId; |
| 34 | import org.onosproject.core.CoreService; |
| 35 | import org.onosproject.net.DeviceId; |
| 36 | import org.onosproject.net.device.DeviceService; |
| 37 | import org.onosproject.net.flow.DefaultTrafficSelector; |
| 38 | import org.onosproject.net.flow.DefaultTrafficTreatment; |
| 39 | import org.onosproject.net.flow.TrafficSelector; |
| 40 | import org.onosproject.net.flow.TrafficTreatment; |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 41 | import org.onosproject.net.packet.DefaultOutboundPacket; |
| 42 | import org.onosproject.net.packet.InboundPacket; |
| 43 | import org.onosproject.net.packet.PacketContext; |
| 44 | import org.onosproject.net.packet.PacketProcessor; |
| 45 | import org.onosproject.net.packet.PacketService; |
| 46 | import org.onosproject.openstacknetworking.api.InstancePort; |
| 47 | import org.onosproject.openstacknetworking.api.InstancePortService; |
sangho | dc37537 | 2017-06-08 10:41:30 +0900 | [diff] [blame] | 48 | import org.onosproject.openstacknetworking.api.OpenstackFlowRuleService; |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 49 | import org.onosproject.openstacknetworking.api.OpenstackNetworkService; |
sangho | dc37537 | 2017-06-08 10:41:30 +0900 | [diff] [blame] | 50 | import org.onosproject.openstacknetworking.api.OpenstackRouterService; |
Hyunsun Moon | 0d45736 | 2017-06-27 17:19:41 +0900 | [diff] [blame] | 51 | import org.onosproject.openstacknode.api.OpenstackNode; |
| 52 | import org.onosproject.openstacknode.api.OpenstackNodeService; |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 53 | import org.onosproject.store.serializers.KryoNamespaces; |
| 54 | import org.onosproject.store.service.ConsistentMap; |
daniel park | 0bc7fdb | 2017-03-13 14:20:08 +0900 | [diff] [blame] | 55 | import org.onosproject.store.service.DistributedSet; |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 56 | import org.onosproject.store.service.Serializer; |
| 57 | import org.onosproject.store.service.StorageService; |
| 58 | import org.openstack4j.model.network.ExternalGateway; |
| 59 | import org.openstack4j.model.network.IP; |
| 60 | import org.openstack4j.model.network.Network; |
daniel park | ee8700b | 2017-05-11 15:50:03 +0900 | [diff] [blame] | 61 | import org.openstack4j.model.network.NetworkType; |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 62 | import org.openstack4j.model.network.Port; |
| 63 | import org.openstack4j.model.network.Router; |
| 64 | import org.openstack4j.model.network.RouterInterface; |
| 65 | import org.openstack4j.model.network.Subnet; |
| 66 | import org.slf4j.Logger; |
| 67 | |
| 68 | import java.nio.ByteBuffer; |
| 69 | import java.util.Objects; |
Hyunsun Moon | 0d45736 | 2017-06-27 17:19:41 +0900 | [diff] [blame] | 70 | import java.util.Set; |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 71 | import java.util.concurrent.ExecutorService; |
Hyunsun Moon | 0d45736 | 2017-06-27 17:19:41 +0900 | [diff] [blame] | 72 | import java.util.stream.Collectors; |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 73 | |
| 74 | import static java.util.concurrent.Executors.newSingleThreadExecutor; |
| 75 | import static org.onlab.util.Tools.groupedThreads; |
Hyunsun Moon | 0d45736 | 2017-06-27 17:19:41 +0900 | [diff] [blame] | 76 | import static org.onosproject.openstacknetworking.api.Constants.*; |
| 77 | import static org.onosproject.openstacknode.api.OpenstackNode.NodeType.GATEWAY; |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 78 | import static org.slf4j.LoggerFactory.getLogger; |
| 79 | |
| 80 | /** |
| 81 | * Handle packets needs SNAT. |
| 82 | */ |
| 83 | @Component(immediate = true) |
| 84 | public class OpenstackRoutingSnatHandler { |
| 85 | |
| 86 | private final Logger log = getLogger(getClass()); |
| 87 | |
| 88 | private static final String ERR_PACKETIN = "Failed to handle packet in: "; |
daniel park | ee8700b | 2017-05-11 15:50:03 +0900 | [diff] [blame] | 89 | private static final String ERR_UNSUPPORTED_NET_TYPE = "Unsupported network type"; |
Ray Milkey | 3717e60 | 2018-02-01 13:49:47 -0800 | [diff] [blame] | 90 | private static final long TIME_OUT_SNAT_PORT_MS = 120L * 1000L; |
sangho | 79d6a83 | 2017-05-02 14:53:46 +0900 | [diff] [blame] | 91 | private static final int TP_PORT_MINIMUM_NUM = 65000; |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 92 | private static final int TP_PORT_MAXIMUM_NUM = 65535; |
| 93 | |
| 94 | private static final KryoNamespace.Builder NUMBER_SERIALIZER = KryoNamespace.newBuilder() |
| 95 | .register(KryoNamespaces.API); |
| 96 | |
| 97 | @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY) |
| 98 | protected CoreService coreService; |
| 99 | |
| 100 | @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY) |
| 101 | protected PacketService packetService; |
| 102 | |
| 103 | @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY) |
| 104 | protected StorageService storageService; |
| 105 | |
| 106 | @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY) |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 107 | protected DeviceService deviceService; |
| 108 | |
| 109 | @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY) |
| 110 | protected InstancePortService instancePortService; |
| 111 | |
| 112 | @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY) |
| 113 | protected OpenstackNodeService osNodeService; |
| 114 | |
| 115 | @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY) |
| 116 | protected OpenstackNetworkService osNetworkService; |
| 117 | |
| 118 | @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY) |
| 119 | protected OpenstackRouterService osRouterService; |
| 120 | |
sangho | dc37537 | 2017-06-08 10:41:30 +0900 | [diff] [blame] | 121 | @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY) |
| 122 | protected OpenstackFlowRuleService osFlowRuleService; |
| 123 | |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 124 | private final ExecutorService eventExecutor = newSingleThreadExecutor( |
| 125 | groupedThreads(this.getClass().getSimpleName(), "event-handler", log)); |
Hyunsun Moon | 0d45736 | 2017-06-27 17:19:41 +0900 | [diff] [blame] | 126 | private final PacketProcessor packetProcessor = new InternalPacketProcessor(); |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 127 | |
daniel park | 0bc7fdb | 2017-03-13 14:20:08 +0900 | [diff] [blame] | 128 | private ConsistentMap<Integer, Long> allocatedPortNumMap; |
| 129 | private DistributedSet<Integer> unUsedPortNumSet; |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 130 | private ApplicationId appId; |
| 131 | |
| 132 | @Activate |
| 133 | protected void activate() { |
| 134 | appId = coreService.registerApplication(OPENSTACK_NETWORKING_APP_ID); |
daniel park | 0bc7fdb | 2017-03-13 14:20:08 +0900 | [diff] [blame] | 135 | |
| 136 | allocatedPortNumMap = storageService.<Integer, Long>consistentMapBuilder() |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 137 | .withSerializer(Serializer.using(NUMBER_SERIALIZER.build())) |
daniel park | 0bc7fdb | 2017-03-13 14:20:08 +0900 | [diff] [blame] | 138 | .withName("openstackrouting-allocatedportnummap") |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 139 | .withApplicationId(appId) |
| 140 | .build(); |
| 141 | |
daniel park | 0bc7fdb | 2017-03-13 14:20:08 +0900 | [diff] [blame] | 142 | unUsedPortNumSet = storageService.<Integer>setBuilder() |
| 143 | .withName("openstackrouting-unusedportnumset") |
| 144 | .withSerializer(Serializer.using(KryoNamespaces.API)) |
| 145 | .build() |
| 146 | .asDistributedSet(); |
| 147 | |
| 148 | initializeUnusedPortNumSet(); |
| 149 | |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 150 | packetService.addProcessor(packetProcessor, PacketProcessor.director(1)); |
| 151 | log.info("Started"); |
| 152 | } |
| 153 | |
daniel park | 0bc7fdb | 2017-03-13 14:20:08 +0900 | [diff] [blame] | 154 | private void initializeUnusedPortNumSet() { |
| 155 | for (int i = TP_PORT_MINIMUM_NUM; i < TP_PORT_MAXIMUM_NUM; i++) { |
Hyunsun Moon | 0e058f2 | 2017-04-19 17:00:52 +0900 | [diff] [blame] | 156 | if (!allocatedPortNumMap.containsKey(i)) { |
| 157 | unUsedPortNumSet.add(i); |
daniel park | 0bc7fdb | 2017-03-13 14:20:08 +0900 | [diff] [blame] | 158 | } |
| 159 | } |
| 160 | |
| 161 | clearPortNumMap(); |
| 162 | } |
| 163 | |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 164 | @Deactivate |
| 165 | protected void deactivate() { |
| 166 | packetService.removeProcessor(packetProcessor); |
| 167 | eventExecutor.shutdown(); |
| 168 | log.info("Stopped"); |
| 169 | } |
| 170 | |
| 171 | private void processSnatPacket(PacketContext context, Ethernet eth) { |
| 172 | IPv4 iPacket = (IPv4) eth.getPayload(); |
| 173 | InboundPacket packetIn = context.inPacket(); |
| 174 | |
Hyunsun Moon | 0e058f2 | 2017-04-19 17:00:52 +0900 | [diff] [blame] | 175 | int patPort = getPortNum(); |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 176 | |
| 177 | InstancePort srcInstPort = instancePortService.instancePort(eth.getSourceMAC()); |
| 178 | if (srcInstPort == null) { |
Hyunsun Moon | 0e058f2 | 2017-04-19 17:00:52 +0900 | [diff] [blame] | 179 | log.error(ERR_PACKETIN + "source host(MAC:{}) does not exist", |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 180 | eth.getSourceMAC()); |
| 181 | return; |
| 182 | } |
Hyunsun Moon | 0e058f2 | 2017-04-19 17:00:52 +0900 | [diff] [blame] | 183 | |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 184 | IpAddress srcIp = IpAddress.valueOf(iPacket.getSourceAddress()); |
| 185 | Subnet srcSubnet = getSourceSubnet(srcInstPort, srcIp); |
| 186 | IpAddress externalGatewayIp = getExternalIp(srcSubnet); |
daniel park | b581710 | 2018-02-15 00:18:51 +0900 | [diff] [blame^] | 187 | |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 188 | if (externalGatewayIp == null) { |
| 189 | return; |
| 190 | } |
| 191 | |
daniel park | b581710 | 2018-02-15 00:18:51 +0900 | [diff] [blame^] | 192 | MacAddress externalPeerRouterMac = getExternalPeerRouterMac(srcSubnet); |
| 193 | if (externalPeerRouterMac == null) { |
| 194 | return; |
| 195 | } |
| 196 | |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 197 | populateSnatFlowRules(context.inPacket(), |
| 198 | srcInstPort, |
| 199 | TpPort.tpPort(patPort), |
daniel park | b581710 | 2018-02-15 00:18:51 +0900 | [diff] [blame^] | 200 | externalGatewayIp, externalPeerRouterMac); |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 201 | |
Ray Milkey | f0c4761 | 2017-09-28 11:29:38 -0700 | [diff] [blame] | 202 | packetOut(eth.duplicate(), |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 203 | packetIn.receivedFrom().deviceId(), |
| 204 | patPort, |
daniel park | b581710 | 2018-02-15 00:18:51 +0900 | [diff] [blame^] | 205 | externalGatewayIp, externalPeerRouterMac); |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 206 | } |
| 207 | |
| 208 | private Subnet getSourceSubnet(InstancePort instance, IpAddress srcIp) { |
| 209 | Port osPort = osNetworkService.port(instance.portId()); |
| 210 | IP fixedIp = osPort.getFixedIps().stream() |
| 211 | .filter(ip -> IpAddress.valueOf(ip.getIpAddress()).equals(srcIp)) |
| 212 | .findAny().orElse(null); |
| 213 | if (fixedIp == null) { |
| 214 | return null; |
| 215 | } |
| 216 | return osNetworkService.subnet(fixedIp.getSubnetId()); |
| 217 | } |
| 218 | |
daniel park | b581710 | 2018-02-15 00:18:51 +0900 | [diff] [blame^] | 219 | private MacAddress getExternalPeerRouterMac(Subnet srcSubnet) { |
| 220 | RouterInterface osRouterIface = osRouterService.routerInterfaces().stream() |
| 221 | .filter(i -> Objects.equals(i.getSubnetId(), srcSubnet.getId())) |
| 222 | .findAny().orElse(null); |
| 223 | if (osRouterIface == null) { |
| 224 | // this subnet is not connected to the router |
| 225 | log.trace(ERR_PACKETIN + "source subnet(ID:{}, CIDR:{}) has no router", |
| 226 | srcSubnet.getId(), srcSubnet.getCidr()); |
| 227 | return null; |
| 228 | } |
| 229 | |
| 230 | Router osRouter = osRouterService.router(osRouterIface.getId()); |
| 231 | if (osRouter == null) { |
| 232 | return null; |
| 233 | } |
| 234 | if (osRouter.getExternalGatewayInfo() == null) { |
| 235 | // this router does not have external connectivity |
| 236 | log.trace(ERR_PACKETIN + "router({}) has no external gateway", |
| 237 | osRouter.getName()); |
| 238 | return null; |
| 239 | } |
| 240 | |
| 241 | ExternalGateway exGatewayInfo = osRouter.getExternalGatewayInfo(); |
| 242 | |
| 243 | return osNetworkService.externalPeerRouterMac(exGatewayInfo); |
| 244 | } |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 245 | private IpAddress getExternalIp(Subnet srcSubnet) { |
| 246 | RouterInterface osRouterIface = osRouterService.routerInterfaces().stream() |
| 247 | .filter(i -> Objects.equals(i.getSubnetId(), srcSubnet.getId())) |
| 248 | .findAny().orElse(null); |
| 249 | if (osRouterIface == null) { |
| 250 | // this subnet is not connected to the router |
| 251 | log.trace(ERR_PACKETIN + "source subnet(ID:{}, CIDR:{}) has no router", |
| 252 | srcSubnet.getId(), srcSubnet.getCidr()); |
| 253 | return null; |
| 254 | } |
| 255 | |
| 256 | Router osRouter = osRouterService.router(osRouterIface.getId()); |
| 257 | if (osRouter.getExternalGatewayInfo() == null) { |
| 258 | // this router does not have external connectivity |
| 259 | log.trace(ERR_PACKETIN + "router({}) has no external gateway", |
| 260 | osRouter.getName()); |
| 261 | return null; |
| 262 | } |
| 263 | |
| 264 | ExternalGateway exGatewayInfo = osRouter.getExternalGatewayInfo(); |
| 265 | if (!exGatewayInfo.isEnableSnat()) { |
| 266 | // SNAT is disabled in this router |
| 267 | log.trace(ERR_PACKETIN + "router({}) SNAT is disabled", osRouter.getName()); |
| 268 | return null; |
| 269 | } |
| 270 | |
| 271 | // TODO fix openstack4j for ExternalGateway provides external fixed IP list |
| 272 | Port exGatewayPort = osNetworkService.ports(exGatewayInfo.getNetworkId()) |
| 273 | .stream() |
| 274 | .filter(port -> Objects.equals(port.getDeviceId(), osRouter.getId())) |
| 275 | .findAny().orElse(null); |
| 276 | if (exGatewayPort == null) { |
| 277 | log.trace(ERR_PACKETIN + "no external gateway port for router({})", |
| 278 | osRouter.getName()); |
| 279 | return null; |
| 280 | } |
| 281 | |
| 282 | return IpAddress.valueOf(exGatewayPort.getFixedIps().stream() |
| 283 | .findFirst().get().getIpAddress()); |
| 284 | } |
| 285 | |
| 286 | private void populateSnatFlowRules(InboundPacket packetIn, InstancePort srcInstPort, |
daniel park | b581710 | 2018-02-15 00:18:51 +0900 | [diff] [blame^] | 287 | TpPort patPort, IpAddress externalIp, MacAddress externalPeerRouterMac) { |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 288 | Network osNet = osNetworkService.network(srcInstPort.networkId()); |
| 289 | if (osNet == null) { |
| 290 | final String error = String.format(ERR_PACKETIN + "network %s not found", |
| 291 | srcInstPort.networkId()); |
| 292 | throw new IllegalStateException(error); |
| 293 | } |
| 294 | |
| 295 | setDownstreamRules(srcInstPort, |
daniel park | ee8700b | 2017-05-11 15:50:03 +0900 | [diff] [blame] | 296 | osNet.getProviderSegID(), |
| 297 | osNet.getNetworkType(), |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 298 | externalIp, |
| 299 | patPort, |
| 300 | packetIn); |
| 301 | |
daniel park | ee8700b | 2017-05-11 15:50:03 +0900 | [diff] [blame] | 302 | setUpstreamRules(osNet.getProviderSegID(), |
| 303 | osNet.getNetworkType(), |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 304 | externalIp, |
daniel park | b581710 | 2018-02-15 00:18:51 +0900 | [diff] [blame^] | 305 | externalPeerRouterMac, |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 306 | patPort, |
| 307 | packetIn); |
| 308 | } |
| 309 | |
Hyunsun Moon | 0d45736 | 2017-06-27 17:19:41 +0900 | [diff] [blame] | 310 | private void setDownstreamRules(InstancePort srcInstPort, String segmentId, |
| 311 | NetworkType networkType, |
daniel park | b581710 | 2018-02-15 00:18:51 +0900 | [diff] [blame^] | 312 | IpAddress externalIp, |
| 313 | TpPort patPort, |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 314 | InboundPacket packetIn) { |
| 315 | IPv4 iPacket = (IPv4) packetIn.parsed().getPayload(); |
| 316 | IpAddress internalIp = IpAddress.valueOf(iPacket.getSourceAddress()); |
| 317 | |
| 318 | TrafficSelector.Builder sBuilder = DefaultTrafficSelector.builder() |
| 319 | .matchEthType(Ethernet.TYPE_IPV4) |
| 320 | .matchIPProtocol(iPacket.getProtocol()) |
Hyunsun Moon | 0d45736 | 2017-06-27 17:19:41 +0900 | [diff] [blame] | 321 | .matchIPDst(IpPrefix.valueOf(externalIp.getIp4Address(), 32)) |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 322 | .matchIPSrc(IpPrefix.valueOf(iPacket.getDestinationAddress(), 32)); |
| 323 | |
| 324 | TrafficTreatment.Builder tBuilder = DefaultTrafficTreatment.builder() |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 325 | .setEthDst(packetIn.parsed().getSourceMAC()) |
| 326 | .setIpDst(internalIp); |
| 327 | |
daniel park | ee8700b | 2017-05-11 15:50:03 +0900 | [diff] [blame] | 328 | switch (networkType) { |
| 329 | case VXLAN: |
| 330 | tBuilder.setTunnelId(Long.parseLong(segmentId)); |
| 331 | break; |
| 332 | case VLAN: |
| 333 | tBuilder.pushVlan() |
| 334 | .setVlanId(VlanId.vlanId(segmentId)) |
| 335 | .setEthSrc(DEFAULT_GATEWAY_MAC); |
| 336 | break; |
| 337 | default: |
| 338 | final String error = String.format( |
| 339 | ERR_UNSUPPORTED_NET_TYPE + "%s", |
| 340 | networkType.toString()); |
| 341 | throw new IllegalStateException(error); |
| 342 | } |
| 343 | |
| 344 | |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 345 | switch (iPacket.getProtocol()) { |
| 346 | case IPv4.PROTOCOL_TCP: |
| 347 | TCP tcpPacket = (TCP) iPacket.getPayload(); |
| 348 | sBuilder.matchTcpSrc(TpPort.tpPort(tcpPacket.getDestinationPort())) |
| 349 | .matchTcpDst(patPort); |
| 350 | tBuilder.setTcpDst(TpPort.tpPort(tcpPacket.getSourcePort())); |
| 351 | break; |
| 352 | case IPv4.PROTOCOL_UDP: |
| 353 | UDP udpPacket = (UDP) iPacket.getPayload(); |
| 354 | sBuilder.matchUdpSrc(TpPort.tpPort(udpPacket.getDestinationPort())) |
| 355 | .matchUdpDst(patPort); |
| 356 | tBuilder.setUdpDst(TpPort.tpPort(udpPacket.getSourcePort())); |
| 357 | break; |
| 358 | default: |
| 359 | break; |
| 360 | } |
| 361 | |
Hyunsun Moon | 0d45736 | 2017-06-27 17:19:41 +0900 | [diff] [blame] | 362 | OpenstackNode srcNode = osNodeService.node(srcInstPort.deviceId()); |
| 363 | osNodeService.completeNodes(GATEWAY).forEach(gNode -> { |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 364 | TrafficTreatment.Builder tmpBuilder = |
| 365 | DefaultTrafficTreatment.builder(tBuilder.build()); |
daniel park | ee8700b | 2017-05-11 15:50:03 +0900 | [diff] [blame] | 366 | switch (networkType) { |
| 367 | case VXLAN: |
| 368 | tmpBuilder.extension(RulePopulatorUtil.buildExtension( |
| 369 | deviceService, |
Hyunsun Moon | 0d45736 | 2017-06-27 17:19:41 +0900 | [diff] [blame] | 370 | gNode.intgBridge(), |
| 371 | srcNode.dataIp().getIp4Address()), gNode.intgBridge()) |
| 372 | .setOutput(gNode.tunnelPortNum()); |
daniel park | ee8700b | 2017-05-11 15:50:03 +0900 | [diff] [blame] | 373 | break; |
| 374 | case VLAN: |
Hyunsun Moon | 0d45736 | 2017-06-27 17:19:41 +0900 | [diff] [blame] | 375 | tmpBuilder.setOutput(gNode.vlanPortNum()); |
daniel park | ee8700b | 2017-05-11 15:50:03 +0900 | [diff] [blame] | 376 | break; |
| 377 | default: |
Hyunsun Moon | 0d45736 | 2017-06-27 17:19:41 +0900 | [diff] [blame] | 378 | final String error = String.format(ERR_UNSUPPORTED_NET_TYPE + "%s", |
daniel park | ee8700b | 2017-05-11 15:50:03 +0900 | [diff] [blame] | 379 | networkType.toString()); |
| 380 | throw new IllegalStateException(error); |
| 381 | } |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 382 | |
sangho | dc37537 | 2017-06-08 10:41:30 +0900 | [diff] [blame] | 383 | osFlowRuleService.setRule( |
| 384 | appId, |
Hyunsun Moon | 0d45736 | 2017-06-27 17:19:41 +0900 | [diff] [blame] | 385 | gNode.intgBridge(), |
sangho | dc37537 | 2017-06-08 10:41:30 +0900 | [diff] [blame] | 386 | sBuilder.build(), |
| 387 | tmpBuilder.build(), |
| 388 | PRIORITY_SNAT_RULE, |
| 389 | GW_COMMON_TABLE, |
| 390 | true); |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 391 | }); |
| 392 | } |
| 393 | |
Hyunsun Moon | 0d45736 | 2017-06-27 17:19:41 +0900 | [diff] [blame] | 394 | private void setUpstreamRules(String segmentId, NetworkType networkType, |
daniel park | b581710 | 2018-02-15 00:18:51 +0900 | [diff] [blame^] | 395 | IpAddress externalIp, MacAddress externalPeerRouterMac, |
| 396 | TpPort patPort, |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 397 | InboundPacket packetIn) { |
| 398 | IPv4 iPacket = (IPv4) packetIn.parsed().getPayload(); |
daniel park | ee8700b | 2017-05-11 15:50:03 +0900 | [diff] [blame] | 399 | |
| 400 | TrafficSelector.Builder sBuilder = DefaultTrafficSelector.builder() |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 401 | .matchEthType(Ethernet.TYPE_IPV4) |
| 402 | .matchIPProtocol(iPacket.getProtocol()) |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 403 | .matchIPSrc(IpPrefix.valueOf(iPacket.getSourceAddress(), 32)) |
| 404 | .matchIPDst(IpPrefix.valueOf(iPacket.getDestinationAddress(), 32)); |
| 405 | |
| 406 | TrafficTreatment.Builder tBuilder = DefaultTrafficTreatment.builder(); |
daniel park | ee8700b | 2017-05-11 15:50:03 +0900 | [diff] [blame] | 407 | |
| 408 | switch (networkType) { |
| 409 | case VXLAN: |
| 410 | sBuilder.matchTunnelId(Long.parseLong(segmentId)); |
| 411 | break; |
| 412 | case VLAN: |
| 413 | sBuilder.matchVlanId(VlanId.vlanId(segmentId)); |
| 414 | tBuilder.popVlan(); |
| 415 | break; |
| 416 | default: |
Hyunsun Moon | 0d45736 | 2017-06-27 17:19:41 +0900 | [diff] [blame] | 417 | final String error = String.format(ERR_UNSUPPORTED_NET_TYPE + "%s", |
daniel park | ee8700b | 2017-05-11 15:50:03 +0900 | [diff] [blame] | 418 | networkType.toString()); |
| 419 | throw new IllegalStateException(error); |
| 420 | } |
| 421 | |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 422 | switch (iPacket.getProtocol()) { |
| 423 | case IPv4.PROTOCOL_TCP: |
| 424 | TCP tcpPacket = (TCP) iPacket.getPayload(); |
| 425 | sBuilder.matchTcpSrc(TpPort.tpPort(tcpPacket.getSourcePort())) |
| 426 | .matchTcpDst(TpPort.tpPort(tcpPacket.getDestinationPort())); |
| 427 | tBuilder.setTcpSrc(patPort) |
daniel park | b581710 | 2018-02-15 00:18:51 +0900 | [diff] [blame^] | 428 | .setEthDst(externalPeerRouterMac); |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 429 | break; |
| 430 | case IPv4.PROTOCOL_UDP: |
| 431 | UDP udpPacket = (UDP) iPacket.getPayload(); |
| 432 | sBuilder.matchUdpSrc(TpPort.tpPort(udpPacket.getSourcePort())) |
| 433 | .matchUdpDst(TpPort.tpPort(udpPacket.getDestinationPort())); |
| 434 | tBuilder.setUdpSrc(patPort) |
daniel park | b581710 | 2018-02-15 00:18:51 +0900 | [diff] [blame^] | 435 | .setEthDst(externalPeerRouterMac); |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 436 | break; |
| 437 | default: |
| 438 | log.debug("Unsupported IPv4 protocol {}"); |
| 439 | break; |
| 440 | } |
| 441 | |
| 442 | tBuilder.setIpSrc(externalIp); |
Hyunsun Moon | 0d45736 | 2017-06-27 17:19:41 +0900 | [diff] [blame] | 443 | osNodeService.completeNodes(GATEWAY).forEach(gNode -> { |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 444 | TrafficTreatment.Builder tmpBuilder = |
| 445 | DefaultTrafficTreatment.builder(tBuilder.build()); |
daniel park | b581710 | 2018-02-15 00:18:51 +0900 | [diff] [blame^] | 446 | tmpBuilder.setOutput(gNode.uplinkPortNum()); |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 447 | |
sangho | dc37537 | 2017-06-08 10:41:30 +0900 | [diff] [blame] | 448 | osFlowRuleService.setRule( |
| 449 | appId, |
Hyunsun Moon | 0d45736 | 2017-06-27 17:19:41 +0900 | [diff] [blame] | 450 | gNode.intgBridge(), |
sangho | dc37537 | 2017-06-08 10:41:30 +0900 | [diff] [blame] | 451 | sBuilder.build(), |
| 452 | tmpBuilder.build(), |
| 453 | PRIORITY_SNAT_RULE, |
| 454 | GW_COMMON_TABLE, |
| 455 | true); |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 456 | }); |
| 457 | } |
| 458 | |
| 459 | private void packetOut(Ethernet ethPacketIn, DeviceId srcDevice, int patPort, |
daniel park | b581710 | 2018-02-15 00:18:51 +0900 | [diff] [blame^] | 460 | IpAddress externalIp, MacAddress externalPeerRouterMac) { |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 461 | IPv4 iPacket = (IPv4) ethPacketIn.getPayload(); |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 462 | switch (iPacket.getProtocol()) { |
| 463 | case IPv4.PROTOCOL_TCP: |
| 464 | TCP tcpPacket = (TCP) iPacket.getPayload(); |
| 465 | tcpPacket.setSourcePort(patPort); |
| 466 | tcpPacket.resetChecksum(); |
| 467 | tcpPacket.setParent(iPacket); |
| 468 | iPacket.setPayload(tcpPacket); |
| 469 | break; |
| 470 | case IPv4.PROTOCOL_UDP: |
| 471 | UDP udpPacket = (UDP) iPacket.getPayload(); |
| 472 | udpPacket.setSourcePort(patPort); |
| 473 | udpPacket.resetChecksum(); |
| 474 | udpPacket.setParent(iPacket); |
| 475 | iPacket.setPayload(udpPacket); |
| 476 | break; |
| 477 | default: |
| 478 | log.trace("Temporally, this method can process UDP and TCP protocol."); |
| 479 | return; |
| 480 | } |
| 481 | |
| 482 | iPacket.setSourceAddress(externalIp.toString()); |
| 483 | iPacket.resetChecksum(); |
| 484 | iPacket.setParent(ethPacketIn); |
daniel park | b581710 | 2018-02-15 00:18:51 +0900 | [diff] [blame^] | 485 | ethPacketIn.setDestinationMACAddress(externalPeerRouterMac); |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 486 | ethPacketIn.setPayload(iPacket); |
daniel park | ee8700b | 2017-05-11 15:50:03 +0900 | [diff] [blame] | 487 | ethPacketIn.resetChecksum(); |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 488 | |
Hyunsun Moon | 0d45736 | 2017-06-27 17:19:41 +0900 | [diff] [blame] | 489 | OpenstackNode srcNode = osNodeService.node(srcDevice); |
| 490 | if (srcNode == null) { |
| 491 | final String error = String.format("Cannot find openstack node for %s", |
| 492 | srcDevice); |
| 493 | throw new IllegalStateException(error); |
| 494 | } |
daniel park | ee8700b | 2017-05-11 15:50:03 +0900 | [diff] [blame] | 495 | |
Hyunsun Moon | 0d45736 | 2017-06-27 17:19:41 +0900 | [diff] [blame] | 496 | TrafficTreatment treatment = DefaultTrafficTreatment.builder() |
daniel park | b581710 | 2018-02-15 00:18:51 +0900 | [diff] [blame^] | 497 | .setOutput(srcNode.uplinkPortNum()).build(); |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 498 | packetService.emit(new DefaultOutboundPacket( |
| 499 | srcDevice, |
| 500 | treatment, |
| 501 | ByteBuffer.wrap(ethPacketIn.serialize()))); |
| 502 | } |
| 503 | |
Hyunsun Moon | 0e058f2 | 2017-04-19 17:00:52 +0900 | [diff] [blame] | 504 | private int getPortNum() { |
daniel park | 0bc7fdb | 2017-03-13 14:20:08 +0900 | [diff] [blame] | 505 | if (unUsedPortNumSet.isEmpty()) { |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 506 | clearPortNumMap(); |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 507 | } |
daniel park | 0bc7fdb | 2017-03-13 14:20:08 +0900 | [diff] [blame] | 508 | int portNum = findUnusedPortNum(); |
daniel park | 0bc7fdb | 2017-03-13 14:20:08 +0900 | [diff] [blame] | 509 | if (portNum != 0) { |
Hyunsun Moon | 0e058f2 | 2017-04-19 17:00:52 +0900 | [diff] [blame] | 510 | unUsedPortNumSet.remove(portNum); |
| 511 | allocatedPortNumMap.put(portNum, System.currentTimeMillis()); |
daniel park | 0bc7fdb | 2017-03-13 14:20:08 +0900 | [diff] [blame] | 512 | } |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 513 | return portNum; |
| 514 | } |
| 515 | |
| 516 | private int findUnusedPortNum() { |
Hyunsun Moon | 0e058f2 | 2017-04-19 17:00:52 +0900 | [diff] [blame] | 517 | return unUsedPortNumSet.stream().findAny().orElse(0); |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 518 | } |
| 519 | |
| 520 | private void clearPortNumMap() { |
daniel park | 0bc7fdb | 2017-03-13 14:20:08 +0900 | [diff] [blame] | 521 | allocatedPortNumMap.entrySet().forEach(e -> { |
Hyunsun Moon | 0e058f2 | 2017-04-19 17:00:52 +0900 | [diff] [blame] | 522 | if (System.currentTimeMillis() - e.getValue().value() > TIME_OUT_SNAT_PORT_MS) { |
daniel park | 0bc7fdb | 2017-03-13 14:20:08 +0900 | [diff] [blame] | 523 | allocatedPortNumMap.remove(e.getKey()); |
| 524 | unUsedPortNumSet.add(e.getKey()); |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 525 | } |
| 526 | }); |
| 527 | } |
| 528 | |
| 529 | private class InternalPacketProcessor implements PacketProcessor { |
| 530 | |
| 531 | @Override |
| 532 | public void process(PacketContext context) { |
Hyunsun Moon | 0d45736 | 2017-06-27 17:19:41 +0900 | [diff] [blame] | 533 | Set<DeviceId> gateways = osNodeService.completeNodes(OpenstackNode.NodeType.GATEWAY) |
| 534 | .stream().map(OpenstackNode::intgBridge) |
| 535 | .collect(Collectors.toSet()); |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 536 | if (context.isHandled()) { |
| 537 | return; |
Hyunsun Moon | 0d45736 | 2017-06-27 17:19:41 +0900 | [diff] [blame] | 538 | } else if (!gateways.contains(context.inPacket().receivedFrom().deviceId())) { |
Hyunsun Moon | 44aac66 | 2017-02-18 02:07:01 +0900 | [diff] [blame] | 539 | // return if the packet is not from gateway nodes |
| 540 | return; |
| 541 | } |
| 542 | |
| 543 | InboundPacket pkt = context.inPacket(); |
| 544 | Ethernet eth = pkt.parsed(); |
| 545 | if (eth == null || eth.getEtherType() == Ethernet.TYPE_ARP) { |
| 546 | return; |
| 547 | } |
| 548 | |
| 549 | IPv4 iPacket = (IPv4) eth.getPayload(); |
| 550 | switch (iPacket.getProtocol()) { |
| 551 | case IPv4.PROTOCOL_ICMP: |
| 552 | break; |
| 553 | case IPv4.PROTOCOL_UDP: |
| 554 | UDP udpPacket = (UDP) iPacket.getPayload(); |
| 555 | if (udpPacket.getDestinationPort() == UDP.DHCP_SERVER_PORT && |
| 556 | udpPacket.getSourcePort() == UDP.DHCP_CLIENT_PORT) { |
| 557 | // don't process DHCP |
| 558 | break; |
| 559 | } |
| 560 | default: |
| 561 | eventExecutor.execute(() -> processSnatPacket(context, eth)); |
| 562 | break; |
| 563 | } |
| 564 | } |
| 565 | } |
| 566 | } |