blob: f4947f076658f0aaae16ac4a8aa773ec09fa3ec3 [file] [log] [blame]
Hyunsun Moon44aac662017-02-18 02:07:01 +09001/*
Brian O'Connora09fe5b2017-08-03 21:12:30 -07002 * Copyright 2016-present Open Networking Foundation
Hyunsun Moon44aac662017-02-18 02:07:01 +09003 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16package org.onosproject.openstacknetworking.impl;
17
18import com.google.common.base.Strings;
Hyunsun Moon44aac662017-02-18 02:07:01 +090019import org.onlab.packet.Ethernet;
20import org.onlab.packet.ICMP;
Jian Li2fa3ded2018-08-10 02:22:47 +000021import org.onlab.packet.ICMPEcho;
Hyunsun Moon44aac662017-02-18 02:07:01 +090022import org.onlab.packet.IPv4;
23import org.onlab.packet.IpAddress;
24import org.onlab.packet.MacAddress;
daniel park576969a2018-03-09 07:07:41 +090025import org.onlab.packet.VlanId;
sangho247232c2017-08-24 17:22:08 +090026import org.onlab.util.KryoNamespace;
Daniel Park6a2d95e2018-11-05 18:50:16 +090027import org.onosproject.cluster.ClusterService;
28import org.onosproject.cluster.LeadershipService;
29import org.onosproject.cluster.NodeId;
Hyunsun Moon44aac662017-02-18 02:07:01 +090030import org.onosproject.core.ApplicationId;
31import org.onosproject.core.CoreService;
Hyunsun Moon44aac662017-02-18 02:07:01 +090032import org.onosproject.net.DeviceId;
Daniel Park6a2d95e2018-11-05 18:50:16 +090033import org.onosproject.net.flow.DefaultTrafficSelector;
Hyunsun Moon44aac662017-02-18 02:07:01 +090034import org.onosproject.net.flow.DefaultTrafficTreatment;
Daniel Park6a2d95e2018-11-05 18:50:16 +090035import org.onosproject.net.flow.TrafficSelector;
Hyunsun Moon44aac662017-02-18 02:07:01 +090036import org.onosproject.net.flow.TrafficTreatment;
37import org.onosproject.net.packet.DefaultOutboundPacket;
38import org.onosproject.net.packet.InboundPacket;
39import org.onosproject.net.packet.OutboundPacket;
40import org.onosproject.net.packet.PacketContext;
Hyunsun Moon44aac662017-02-18 02:07:01 +090041import org.onosproject.net.packet.PacketProcessor;
42import org.onosproject.net.packet.PacketService;
43import org.onosproject.openstacknetworking.api.Constants;
daniel park576969a2018-03-09 07:07:41 +090044import org.onosproject.openstacknetworking.api.ExternalPeerRouter;
Hyunsun Moon44aac662017-02-18 02:07:01 +090045import org.onosproject.openstacknetworking.api.InstancePort;
46import org.onosproject.openstacknetworking.api.InstancePortService;
Daniel Park6a2d95e2018-11-05 18:50:16 +090047import org.onosproject.openstacknetworking.api.OpenstackFlowRuleService;
Hyunsun Moon44aac662017-02-18 02:07:01 +090048import org.onosproject.openstacknetworking.api.OpenstackNetworkService;
sangho36721992017-08-03 11:13:17 +090049import org.onosproject.openstacknetworking.api.OpenstackRouterService;
Hyunsun Moon0d457362017-06-27 17:19:41 +090050import org.onosproject.openstacknode.api.OpenstackNode;
Daniel Park6a2d95e2018-11-05 18:50:16 +090051import org.onosproject.openstacknode.api.OpenstackNodeEvent;
52import org.onosproject.openstacknode.api.OpenstackNodeListener;
Hyunsun Moon0d457362017-06-27 17:19:41 +090053import org.onosproject.openstacknode.api.OpenstackNodeService;
sangho247232c2017-08-24 17:22:08 +090054import org.onosproject.store.serializers.KryoNamespaces;
55import org.onosproject.store.service.ConsistentMap;
56import org.onosproject.store.service.Serializer;
57import org.onosproject.store.service.StorageService;
Hyunsun Moon44aac662017-02-18 02:07:01 +090058import org.openstack4j.model.network.Port;
59import org.openstack4j.model.network.Router;
60import org.openstack4j.model.network.RouterInterface;
61import org.openstack4j.model.network.Subnet;
Jian Li28680442018-11-11 00:35:37 +090062import org.osgi.service.component.annotations.Activate;
63import org.osgi.service.component.annotations.Component;
64import org.osgi.service.component.annotations.Deactivate;
65import org.osgi.service.component.annotations.Reference;
66import org.osgi.service.component.annotations.ReferenceCardinality;
Hyunsun Moon44aac662017-02-18 02:07:01 +090067import org.slf4j.Logger;
68
69import java.nio.ByteBuffer;
Hyunsun Moon44aac662017-02-18 02:07:01 +090070import java.util.Objects;
Hyunsun Moon44aac662017-02-18 02:07:01 +090071import java.util.Set;
72import java.util.concurrent.ExecutorService;
73import java.util.stream.Collectors;
74
sangho247232c2017-08-24 17:22:08 +090075import static com.google.common.base.Preconditions.checkArgument;
Daniel Park4d486842018-07-24 17:06:43 +090076import static com.google.common.base.Preconditions.checkNotNull;
Hyunsun Moon44aac662017-02-18 02:07:01 +090077import static java.util.concurrent.Executors.newSingleThreadExecutor;
Daniel Park4d486842018-07-24 17:06:43 +090078import static org.onlab.packet.ICMP.TYPE_ECHO_REPLY;
79import static org.onlab.packet.ICMP.TYPE_ECHO_REQUEST;
Hyunsun Moon44aac662017-02-18 02:07:01 +090080import static org.onlab.util.Tools.groupedThreads;
sangho36721992017-08-03 11:13:17 +090081import static org.onosproject.openstacknetworking.api.Constants.DEFAULT_GATEWAY_MAC;
Daniel Park6a2d95e2018-11-05 18:50:16 +090082import static org.onosproject.openstacknetworking.api.Constants.GW_COMMON_TABLE;
sangho36721992017-08-03 11:13:17 +090083import static org.onosproject.openstacknetworking.api.Constants.OPENSTACK_NETWORKING_APP_ID;
Daniel Park6a2d95e2018-11-05 18:50:16 +090084import static org.onosproject.openstacknetworking.api.Constants.PRIORITY_INTERNAL_ROUTING_RULE;
Jian Liebde74d2018-11-14 00:18:57 +090085import static org.onosproject.openstacknetworking.util.OpenstackNetworkingUtil.externalIpFromSubnet;
86import static org.onosproject.openstacknetworking.util.OpenstackNetworkingUtil.externalPeerRouterFromSubnet;
Hyunsun Moon0d457362017-06-27 17:19:41 +090087import static org.onosproject.openstacknode.api.OpenstackNode.NodeType.GATEWAY;
Hyunsun Moon44aac662017-02-18 02:07:01 +090088import static org.slf4j.LoggerFactory.getLogger;
89
Hyunsun Moon44aac662017-02-18 02:07:01 +090090/**
91 * Handles ICMP packet received from a gateway node.
92 * For a request for virtual network subnet gateway, it generates fake ICMP reply.
93 * For a request for the external network, it does source NAT with the public IP and
94 * forward the request to the external only if the requested virtual subnet has
95 * external connectivity.
96 */
97@Component(immediate = true)
98public class OpenstackRoutingIcmpHandler {
99
100 protected final Logger log = getLogger(getClass());
101
102 private static final String ERR_REQ = "Failed to handle ICMP request: ";
sangho247232c2017-08-24 17:22:08 +0900103 private static final String ERR_DUPLICATE = " already exists";
Hyunsun Moon44aac662017-02-18 02:07:01 +0900104
Jian Li28ec77f2018-10-31 07:07:25 +0900105 private static final String VXLAN = "VXLAN";
106 private static final String VLAN = "VLAN";
107
Ray Milkeyd84f89b2018-08-17 14:54:17 -0700108 @Reference(cardinality = ReferenceCardinality.MANDATORY)
Hyunsun Moon44aac662017-02-18 02:07:01 +0900109 protected CoreService coreService;
110
Ray Milkeyd84f89b2018-08-17 14:54:17 -0700111 @Reference(cardinality = ReferenceCardinality.MANDATORY)
Hyunsun Moon44aac662017-02-18 02:07:01 +0900112 protected PacketService packetService;
113
Ray Milkeyd84f89b2018-08-17 14:54:17 -0700114 @Reference(cardinality = ReferenceCardinality.MANDATORY)
sangho247232c2017-08-24 17:22:08 +0900115 protected StorageService storageService;
116
Ray Milkeyd84f89b2018-08-17 14:54:17 -0700117 @Reference(cardinality = ReferenceCardinality.MANDATORY)
Hyunsun Moon44aac662017-02-18 02:07:01 +0900118 protected OpenstackNodeService osNodeService;
119
Ray Milkeyd84f89b2018-08-17 14:54:17 -0700120 @Reference(cardinality = ReferenceCardinality.MANDATORY)
Hyunsun Moon44aac662017-02-18 02:07:01 +0900121 protected InstancePortService instancePortService;
122
Ray Milkeyd84f89b2018-08-17 14:54:17 -0700123 @Reference(cardinality = ReferenceCardinality.MANDATORY)
Hyunsun Moon44aac662017-02-18 02:07:01 +0900124 protected OpenstackNetworkService osNetworkService;
125
Ray Milkeyd84f89b2018-08-17 14:54:17 -0700126 @Reference(cardinality = ReferenceCardinality.MANDATORY)
Hyunsun Moon44aac662017-02-18 02:07:01 +0900127 protected OpenstackRouterService osRouterService;
128
Ray Milkey5739b2c2018-11-06 14:04:51 -0800129 @Reference(cardinality = ReferenceCardinality.MANDATORY)
Daniel Park6a2d95e2018-11-05 18:50:16 +0900130 protected LeadershipService leadershipService;
131
Ray Milkey5739b2c2018-11-06 14:04:51 -0800132 @Reference(cardinality = ReferenceCardinality.MANDATORY)
Daniel Park6a2d95e2018-11-05 18:50:16 +0900133 protected OpenstackFlowRuleService osFlowRuleService;
134
Ray Milkey5739b2c2018-11-06 14:04:51 -0800135 @Reference(cardinality = ReferenceCardinality.MANDATORY)
Daniel Park6a2d95e2018-11-05 18:50:16 +0900136 protected ClusterService clusterService;
137
Hyunsun Moon44aac662017-02-18 02:07:01 +0900138 private final ExecutorService eventExecutor = newSingleThreadExecutor(
139 groupedThreads(this.getClass().getSimpleName(), "event-handler", log));
sangho072c4dd2017-05-17 10:45:21 +0900140 private final InternalPacketProcessor packetProcessor = new InternalPacketProcessor();
sangho247232c2017-08-24 17:22:08 +0900141 private ConsistentMap<String, InstancePort> icmpInfoMap;
Daniel Park6a2d95e2018-11-05 18:50:16 +0900142 private final OpenstackNodeListener osNodeListener = new InternalNodeEventListener();
sangho247232c2017-08-24 17:22:08 +0900143
144 private static final KryoNamespace SERIALIZER_ICMP_MAP = KryoNamespace.newBuilder()
145 .register(KryoNamespaces.API)
146 .register(InstancePort.class)
Jian Liec5c32b2018-07-13 14:28:58 +0900147 .register(DefaultInstancePort.class)
148 .register(InstancePort.State.class)
sangho247232c2017-08-24 17:22:08 +0900149 .build();
Hyunsun Moon44aac662017-02-18 02:07:01 +0900150
151 private ApplicationId appId;
Daniel Park6a2d95e2018-11-05 18:50:16 +0900152 private NodeId localNodeId;
Hyunsun Moon44aac662017-02-18 02:07:01 +0900153
154 @Activate
155 protected void activate() {
156 appId = coreService.registerApplication(OPENSTACK_NETWORKING_APP_ID);
157 packetService.addProcessor(packetProcessor, PacketProcessor.director(1));
Daniel Park6a2d95e2018-11-05 18:50:16 +0900158 localNodeId = clusterService.getLocalNode().id();
159 leadershipService.runForLeadership(appId.name());
160 osNodeService.addListener(osNodeListener);
Hyunsun Moon44aac662017-02-18 02:07:01 +0900161
sangho247232c2017-08-24 17:22:08 +0900162 icmpInfoMap = storageService.<String, InstancePort>consistentMapBuilder()
163 .withSerializer(Serializer.using(SERIALIZER_ICMP_MAP))
164 .withName("openstack-icmpmap")
165 .withApplicationId(appId)
166 .build();
167
Hyunsun Moon44aac662017-02-18 02:07:01 +0900168 log.info("Started");
169 }
170
171 @Deactivate
172 protected void deactivate() {
173 packetService.removeProcessor(packetProcessor);
Hyunsun Moon44aac662017-02-18 02:07:01 +0900174 eventExecutor.shutdown();
Daniel Park6a2d95e2018-11-05 18:50:16 +0900175 leadershipService.withdraw(appId.name());
176 osNodeService.removeListener(osNodeListener);
Hyunsun Moon44aac662017-02-18 02:07:01 +0900177
178 log.info("Stopped");
179 }
180
Daniel Park6a2d95e2018-11-05 18:50:16 +0900181 private class InternalNodeEventListener implements OpenstackNodeListener {
182 @Override
183 public boolean isRelevant(OpenstackNodeEvent event) {
184 // do not allow to proceed without leadership
185 NodeId leader = leadershipService.getLeader(appId.name());
186 return Objects.equals(localNodeId, leader) && event.subject().type() == GATEWAY;
187 }
188
189 @Override
190 public void event(OpenstackNodeEvent event) {
191 OpenstackNode osNode = event.subject();
192 switch (event.type()) {
193 case OPENSTACK_NODE_COMPLETE:
194 eventExecutor.execute(() -> setIcmpReplyRules(osNode.intgBridge(), true));
195 break;
196 case OPENSTACK_NODE_INCOMPLETE:
197 eventExecutor.execute(() -> setIcmpReplyRules(osNode.intgBridge(), false));
198 break;
199 default:
200 break;
201 }
202 }
203
204 private void setIcmpReplyRules(DeviceId deviceId, boolean install) {
205 // Sends ICMP response to controller for SNATing ingress traffic
206 TrafficSelector selector = DefaultTrafficSelector.builder()
207 .matchEthType(Ethernet.TYPE_IPV4)
208 .matchIPProtocol(IPv4.PROTOCOL_ICMP)
209 .matchIcmpType(ICMP.TYPE_ECHO_REPLY)
210 .build();
211
212 TrafficTreatment treatment = DefaultTrafficTreatment.builder()
213 .punt()
214 .build();
215
216 osFlowRuleService.setRule(
217 appId,
218 deviceId,
219 selector,
220 treatment,
221 PRIORITY_INTERNAL_ROUTING_RULE,
222 GW_COMMON_TABLE,
223 install);
224 }
225 }
Jian Li28680442018-11-11 00:35:37 +0900226
227 private class InternalPacketProcessor implements PacketProcessor {
228
229 @Override
230 public void process(PacketContext context) {
231 if (context.isHandled()) {
232 return;
233 }
234
235 eventExecutor.execute(() -> {
236 Set<DeviceId> gateways = osNodeService.completeNodes(GATEWAY)
237 .stream().map(OpenstackNode::intgBridge)
238 .collect(Collectors.toSet());
239
240 if (!gateways.isEmpty() &&
241 !gateways.contains(context.inPacket().receivedFrom().deviceId())) {
242 return;
243 }
244
245 InboundPacket pkt = context.inPacket();
246 Ethernet ethernet = pkt.parsed();
247 if (ethernet == null || ethernet.getEtherType() != Ethernet.TYPE_IPV4) {
248 return;
249 }
250
251 IPv4 iPacket = (IPv4) ethernet.getPayload();
252
253 if (iPacket.getProtocol() == IPv4.PROTOCOL_ICMP) {
254 processIcmpPacket(context, ethernet);
255 }
256 });
257 }
258
259 private void processIcmpPacket(PacketContext context, Ethernet ethernet) {
260 IPv4 ipPacket = (IPv4) ethernet.getPayload();
261 ICMP icmp = (ICMP) ipPacket.getPayload();
262 log.trace("Processing ICMP packet source MAC:{}, source IP:{}," +
263 "dest MAC:{}, dest IP:{}",
264 ethernet.getSourceMAC(),
265 IpAddress.valueOf(ipPacket.getSourceAddress()),
266 ethernet.getDestinationMAC(),
267 IpAddress.valueOf(ipPacket.getDestinationAddress()));
268
269 switch (icmp.getIcmpType()) {
270 case TYPE_ECHO_REQUEST:
271 if (handleEchoRequest(context.inPacket().receivedFrom().deviceId(),
272 ethernet.getSourceMAC(),
273 ipPacket,
274 icmp)) {
275 context.block();
276 }
277 break;
278 case TYPE_ECHO_REPLY:
279 if (handleEchoReply(ipPacket, icmp)) {
280 context.block();
281 }
282 break;
283 default:
284 break;
285 }
286 }
287
288 private boolean handleEchoRequest(DeviceId srcDevice, MacAddress srcMac, IPv4 ipPacket,
289 ICMP icmp) {
290 //We only handles a request from an instance port
291 //In case of ehco request to SNAT ip address from an external router, we intentionally ignore it
292 InstancePort instPort = instancePortService.instancePort(srcMac);
293 if (instPort == null) {
294 log.warn(ERR_REQ + "unknown source host(MAC:{})", srcMac);
295 return false;
296 }
297
298 IpAddress srcIp = IpAddress.valueOf(ipPacket.getSourceAddress());
299 IpAddress dstIp = IpAddress.valueOf(ipPacket.getDestinationAddress());
300
301 Subnet srcSubnet = getSourceSubnet(instPort);
302 if (srcSubnet == null) {
303 log.warn(ERR_REQ + "unknown source subnet(IP:{})", srcIp);
304 return false;
305 }
306
307 if (Strings.isNullOrEmpty(srcSubnet.getGateway())) {
308 log.warn(ERR_REQ + "source subnet(ID:{}, CIDR:{}) has no gateway",
309 srcSubnet.getId(), srcSubnet.getCidr());
310 return false;
311 }
312
313 if (isForSubnetGateway(IpAddress.valueOf(ipPacket.getDestinationAddress()),
314 srcSubnet)) {
315 // this is a request to a subnet gateway
316 log.trace("Icmp request to gateway {} from {}", dstIp, srcIp);
317 processRequestForGateway(ipPacket, instPort);
318 } else {
319 // this is a request to an external network
320 log.trace("Icmp request to external {} from {}", dstIp, srcIp);
321
Jian Liebde74d2018-11-14 00:18:57 +0900322 IpAddress externalIp = externalIpFromSubnet(srcSubnet, osRouterService, osNetworkService);
Jian Li28680442018-11-11 00:35:37 +0900323 if (externalIp == null) {
324 log.warn(ERR_REQ + "failed to get external ip");
325 return false;
326 }
327
Jian Liebde74d2018-11-14 00:18:57 +0900328 ExternalPeerRouter externalPeerRouter =
329 externalPeerRouterFromSubnet(srcSubnet, osRouterService, osNetworkService);
330 if (externalPeerRouter == null) {
331 log.warn(ERR_REQ + "failed to get external peer router");
332 return false;
333 }
334
Jian Li28680442018-11-11 00:35:37 +0900335 String icmpInfoKey = icmpInfoKey(icmp,
336 externalIp.toString(),
337 IPv4.fromIPv4Address(ipPacket.getDestinationAddress()));
338 log.trace("Created icmpInfo key is {}", icmpInfoKey);
339
340 sendRequestForExternal(ipPacket, srcDevice, externalIp, externalPeerRouter);
341
342 try {
343 icmpInfoMap.compute(icmpInfoKey, (id, existing) -> {
344 checkArgument(existing == null, ERR_DUPLICATE);
345 return instPort;
346 });
347 } catch (IllegalArgumentException e) {
348 log.warn("IllegalArgumentException occurred because of {}", e.toString());
349 return false;
350 }
351 }
352 return true;
353 }
354
355 private String icmpInfoKey(ICMP icmp, String srcIp, String dstIp) {
356 return String.valueOf(getIcmpId(icmp))
357 .concat(srcIp)
358 .concat(dstIp);
359 }
Jian Li28680442018-11-11 00:35:37 +0900360
361 private boolean handleEchoReply(IPv4 ipPacket, ICMP icmp) {
362 String icmpInfoKey = icmpInfoKey(icmp,
363 IPv4.fromIPv4Address(ipPacket.getDestinationAddress()),
364 IPv4.fromIPv4Address(ipPacket.getSourceAddress()));
365 log.trace("Retrieved icmpInfo key is {}", icmpInfoKey);
366
367 if (icmpInfoMap.get(icmpInfoKey) != null) {
368 processReplyFromExternal(ipPacket, icmpInfoMap.get(icmpInfoKey).value());
369 icmpInfoMap.remove(icmpInfoKey);
370 return true;
371 } else {
372 log.debug("No ICMP Info for ICMP packet");
373 return false;
374 }
375 }
376
377 private Subnet getSourceSubnet(InstancePort instance) {
378 checkNotNull(instance);
379
380 Port osPort = osNetworkService.port(instance.portId());
381 return osNetworkService.subnets(osPort.getNetworkId())
382 .stream().findAny().orElse(null);
383 }
384
385 private boolean isForSubnetGateway(IpAddress dstIp, Subnet srcSubnet) {
386 RouterInterface osRouterIface = osRouterService.routerInterfaces().stream()
387 .filter(i -> Objects.equals(i.getSubnetId(), srcSubnet.getId()))
388 .findAny().orElse(null);
389 if (osRouterIface == null) {
390 log.trace(ERR_REQ + "source subnet(ID:{}, CIDR:{}) has no router",
391 srcSubnet.getId(), srcSubnet.getCidr());
392 return false;
393 }
394
395 Router osRouter = osRouterService.router(osRouterIface.getId());
396 Set<IpAddress> routableGateways = osRouterService.routerInterfaces(osRouter.getId())
397 .stream()
398 .map(iface -> osNetworkService.subnet(iface.getSubnetId()).getGateway())
399 .map(IpAddress::valueOf)
400 .collect(Collectors.toSet());
401
402 return routableGateways.contains(dstIp);
403 }
404
Jian Li28680442018-11-11 00:35:37 +0900405 private void processRequestForGateway(IPv4 ipPacket, InstancePort instPort) {
406 ICMP icmpReq = (ICMP) ipPacket.getPayload();
407 icmpReq.setChecksum((short) 0);
408 icmpReq.setIcmpType(TYPE_ECHO_REPLY);
409
410 int destinationAddress = ipPacket.getSourceAddress();
411
412 ipPacket.setSourceAddress(ipPacket.getDestinationAddress())
413 .setDestinationAddress(destinationAddress)
414 .resetChecksum();
415
416 ipPacket.setPayload(icmpReq);
417 Ethernet icmpReply = new Ethernet();
418 icmpReply.setEtherType(Ethernet.TYPE_IPV4)
419 .setSourceMACAddress(Constants.DEFAULT_GATEWAY_MAC)
420 .setDestinationMACAddress(instPort.macAddress())
421 .setPayload(ipPacket);
422
423 sendReply(icmpReply, instPort);
424 }
425
426 private void sendRequestForExternal(IPv4 ipPacket, DeviceId srcDevice,
427 IpAddress srcNatIp, ExternalPeerRouter externalPeerRouter) {
428 ICMP icmpReq = (ICMP) ipPacket.getPayload();
429 icmpReq.resetChecksum();
430 ipPacket.setSourceAddress(srcNatIp.getIp4Address().toInt()).resetChecksum();
431 ipPacket.setPayload(icmpReq);
432
433 Ethernet icmpRequestEth = new Ethernet();
434 icmpRequestEth.setEtherType(Ethernet.TYPE_IPV4)
435 .setSourceMACAddress(DEFAULT_GATEWAY_MAC)
436 .setDestinationMACAddress(externalPeerRouter.macAddress());
437
438 if (!externalPeerRouter.vlanId().equals(VlanId.NONE)) {
439 icmpRequestEth.setVlanID(externalPeerRouter.vlanId().toShort());
440 }
441
442 icmpRequestEth.setPayload(ipPacket);
443
444 OpenstackNode osNode = osNodeService.node(srcDevice);
445 if (osNode == null) {
446 final String error = String.format("Cannot find openstack node for %s",
447 srcDevice);
448 throw new IllegalStateException(error);
449 }
450 TrafficTreatment treatment = DefaultTrafficTreatment.builder()
451 .setOutput(osNode.uplinkPortNum())
452 .build();
453
454 OutboundPacket packet = new DefaultOutboundPacket(
455 srcDevice,
456 treatment,
457 ByteBuffer.wrap(icmpRequestEth.serialize()));
458
459 packetService.emit(packet);
460 }
461
462 private void processReplyFromExternal(IPv4 ipPacket, InstancePort instPort) {
463
464 if (instPort.networkId() == null) {
465 return;
466 }
467
468 ICMP icmpReply = (ICMP) ipPacket.getPayload();
469
470 icmpReply.resetChecksum();
471
472 ipPacket.setDestinationAddress(instPort.ipAddress().getIp4Address().toInt())
473 .resetChecksum();
474 ipPacket.setPayload(icmpReply);
475
476 Ethernet icmpResponseEth = new Ethernet();
477 icmpResponseEth.setEtherType(Ethernet.TYPE_IPV4)
478 .setSourceMACAddress(Constants.DEFAULT_GATEWAY_MAC)
479 .setDestinationMACAddress(instPort.macAddress())
480 .setPayload(ipPacket);
481
482 sendReply(icmpResponseEth, instPort);
483 }
484
485 private void sendReply(Ethernet icmpReply, InstancePort instPort) {
486 TrafficTreatment.Builder tBuilder = DefaultTrafficTreatment.builder()
487 .setOutput(instPort.portNumber());
488
489 String netId = instPort.networkId();
490 String segId = osNetworkService.segmentId(netId);
491
492 switch (osNetworkService.networkType(netId)) {
493 case VXLAN:
494 tBuilder.setTunnelId(Long.valueOf(segId));
495 break;
496 case VLAN:
497 tBuilder.setVlanId(VlanId.vlanId(segId));
498 break;
499 default:
500 break;
501 }
502
503 OutboundPacket packet = new DefaultOutboundPacket(
504 instPort.deviceId(),
505 tBuilder.build(),
506 ByteBuffer.wrap(icmpReply.serialize()));
507
508 packetService.emit(packet);
509 }
510
511 private short getIcmpId(ICMP icmp) {
512 return ((ICMPEcho) icmp.getPayload()).getIdentifier();
513 }
514 }
Hyunsun Moon44aac662017-02-18 02:07:01 +0900515}