47f62d0f876f6b9ca78fd696048e153ece230220
[netvirt.git] / neutronvpn / impl / src / main / java / org / opendaylight / netvirt / neutronvpn / NeutronvpnUtils.java
1 /*
2  * Copyright (c) 2016, 2018 Ericsson India Global Services Pvt Ltd. and others.  All rights reserved.
3  *
4  * This program and the accompanying materials are made available under the
5  * terms of the Eclipse Public License v1.0 which accompanies this distribution,
6  * and is available at http://www.eclipse.org/legal/epl-v10.html
7  */
8
9 package org.opendaylight.netvirt.neutronvpn;
10
11 import static org.opendaylight.genius.infra.Datastore.OPERATIONAL;
12
13 import com.google.common.base.Function;
14 import com.google.common.base.Optional;
15 import com.google.common.collect.ImmutableBiMap;
16 import com.google.common.collect.Sets;
17 import com.google.common.util.concurrent.FutureCallback;
18 import com.google.common.util.concurrent.Futures;
19 import com.google.common.util.concurrent.MoreExecutors;
20 import com.google.common.util.concurrent.SettableFuture;
21
22 import java.math.BigInteger;
23 import java.net.Inet4Address;
24 import java.net.Inet6Address;
25 import java.net.InetAddress;
26 import java.net.UnknownHostException;
27 import java.util.ArrayList;
28 import java.util.Collection;
29 import java.util.Collections;
30 import java.util.HashMap;
31 import java.util.HashSet;
32 import java.util.Iterator;
33 import java.util.List;
34 import java.util.Map;
35 import java.util.Set;
36 import java.util.concurrent.ConcurrentHashMap;
37 import java.util.concurrent.ConcurrentMap;
38 import java.util.concurrent.ExecutionException;
39 import java.util.concurrent.Future;
40 import java.util.concurrent.locks.ReentrantLock;
41 import java.util.stream.Collectors;
42 import javax.annotation.Nonnull;
43 import javax.annotation.Nullable;
44 import javax.inject.Inject;
45 import javax.inject.Singleton;
46
47 import org.apache.commons.lang3.StringUtils;
48 import org.opendaylight.controller.md.sal.binding.api.DataBroker;
49 import org.opendaylight.controller.md.sal.binding.api.ReadOnlyTransaction;
50 import org.opendaylight.controller.md.sal.common.api.data.LogicalDatastoreType;
51 import org.opendaylight.controller.md.sal.common.api.data.ReadFailedException;
52 import org.opendaylight.genius.datastoreutils.SingleTransactionDataBroker;
53 import org.opendaylight.genius.infra.Datastore;
54 import org.opendaylight.genius.infra.ManagedNewTransactionRunner;
55 import org.opendaylight.genius.infra.ManagedNewTransactionRunnerImpl;
56 import org.opendaylight.genius.infra.TypedWriteTransaction;
57 import org.opendaylight.genius.mdsalutil.MDSALUtil;
58 import org.opendaylight.genius.utils.JvmGlobalLocks;
59 import org.opendaylight.infrautils.jobcoordinator.JobCoordinator;
60 import org.opendaylight.infrautils.utils.concurrent.ListenableFutures;
61 import org.opendaylight.netvirt.neutronvpn.api.enums.IpVersionChoice;
62 import org.opendaylight.netvirt.neutronvpn.api.utils.NeutronUtils;
63 import org.opendaylight.yang.gen.v1.urn.huawei.params.xml.ns.yang.l3vpn.rev140815.VpnInstances;
64 import org.opendaylight.yang.gen.v1.urn.huawei.params.xml.ns.yang.l3vpn.rev140815.VpnInterfaces;
65 import org.opendaylight.yang.gen.v1.urn.huawei.params.xml.ns.yang.l3vpn.rev140815.vpn.instances.VpnInstance;
66 import org.opendaylight.yang.gen.v1.urn.huawei.params.xml.ns.yang.l3vpn.rev140815.vpn.instances.VpnInstanceKey;
67 import org.opendaylight.yang.gen.v1.urn.huawei.params.xml.ns.yang.l3vpn.rev140815.vpn.interfaces.VpnInterface;
68 import org.opendaylight.yang.gen.v1.urn.huawei.params.xml.ns.yang.l3vpn.rev140815.vpn.interfaces.VpnInterfaceKey;
69 import org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.inet.types.rev130715.IpAddress;
70 import org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.inet.types.rev130715.Ipv6Address;
71 import org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.interfaces.rev140508.Interfaces;
72 import org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.interfaces.rev140508.interfaces.Interface;
73 import org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.interfaces.rev140508.interfaces.InterfaceKey;
74 import org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.yang.types.rev130715.MacAddress;
75 import org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.yang.types.rev130715.PhysAddress;
76 import org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.yang.types.rev130715.Uuid;
77 import org.opendaylight.yang.gen.v1.urn.opendaylight.genius.idmanager.rev160406.AllocateIdInput;
78 import org.opendaylight.yang.gen.v1.urn.opendaylight.genius.idmanager.rev160406.AllocateIdInputBuilder;
79 import org.opendaylight.yang.gen.v1.urn.opendaylight.genius.idmanager.rev160406.AllocateIdOutput;
80 import org.opendaylight.yang.gen.v1.urn.opendaylight.genius.idmanager.rev160406.IdManagerService;
81 import org.opendaylight.yang.gen.v1.urn.opendaylight.genius.idmanager.rev160406.ReleaseIdInput;
82 import org.opendaylight.yang.gen.v1.urn.opendaylight.genius.idmanager.rev160406.ReleaseIdInputBuilder;
83 import org.opendaylight.yang.gen.v1.urn.opendaylight.genius.idmanager.rev160406.ReleaseIdOutput;
84 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.aclservice.rev160608.Dhcpv6Base;
85 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.aclservice.rev160608.InterfaceAclBuilder;
86 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.aclservice.rev160608.IpPrefixOrAddress;
87 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.aclservice.rev160608.IpVersionBase;
88 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.aclservice.rev160608.interfaces._interface.AllowedAddressPairs;
89 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.aclservice.rev160608.interfaces._interface.AllowedAddressPairsBuilder;
90 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.aclservice.rev160608.interfaces._interface.SubnetInfo;
91 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.aclservice.rev160608.interfaces._interface.SubnetInfoBuilder;
92 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.aclservice.rev160608.interfaces._interface.SubnetInfoKey;
93 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.elan.rev150602.SegmentTypeBase;
94 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.elan.rev150602.SegmentTypeFlat;
95 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.elan.rev150602.SegmentTypeGre;
96 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.elan.rev150602.SegmentTypeVlan;
97 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.elan.rev150602.SegmentTypeVxlan;
98 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.elan.rev150602.elan.interfaces.elan._interface.StaticMacEntries;
99 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.elan.rev150602.elan.interfaces.elan._interface.StaticMacEntriesBuilder;
100 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.LearntVpnVipToPortData;
101 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.NeutronRouterDpns;
102 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.VpnInstanceOpData;
103 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.VpnInstanceToVpnId;
104 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.learnt.vpn.vip.to.port.data.LearntVpnVipToPort;
105 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.learnt.vpn.vip.to.port.data.LearntVpnVipToPortKey;
106 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.neutron.router.dpns.RouterDpnList;
107 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.neutron.router.dpns.RouterDpnListKey;
108 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.neutron.router.dpns.router.dpn.list.DpnVpninterfacesList;
109 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.vpn.instance.op.data.VpnInstanceOpDataEntry;
110 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.vpn.instance.op.data.VpnInstanceOpDataEntryBuilder;
111 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.vpn.instance.op.data.VpnInstanceOpDataEntryKey;
112 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.natservice.rev160111.ExtRouters;
113 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.natservice.rev160111.ExternalSubnets;
114 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.natservice.rev160111.FloatingIpPortInfo;
115 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.natservice.rev160111.ProviderTypes;
116 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.natservice.rev160111.ext.routers.RoutersKey;
117 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.natservice.rev160111.external.subnets.SubnetsKey;
118 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.natservice.rev160111.floating.ip.port.info.FloatingIpIdToPortMapping;
119 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.natservice.rev160111.floating.ip.port.info.FloatingIpIdToPortMappingKey;
120 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.neutronvpn.rev150602.NetworkMaps;
121 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.neutronvpn.rev150602.NeutronVpnPortipPortData;
122 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.neutronvpn.rev150602.Subnetmaps;
123 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.neutronvpn.rev150602.VpnMaps;
124 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.neutronvpn.rev150602.networkmaps.NetworkMap;
125 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.neutronvpn.rev150602.networkmaps.NetworkMapKey;
126 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.neutronvpn.rev150602.neutron.vpn.portip.port.data.VpnPortipToPort;
127 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.neutronvpn.rev150602.neutron.vpn.portip.port.data.VpnPortipToPortBuilder;
128 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.neutronvpn.rev150602.neutron.vpn.portip.port.data.VpnPortipToPortKey;
129 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.neutronvpn.rev150602.subnetmaps.Subnetmap;
130 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.neutronvpn.rev150602.subnetmaps.SubnetmapKey;
131 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.neutronvpn.rev150602.vpn.instance.RouterIds;
132 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.neutronvpn.rev150602.vpn.instance.RouterIdsBuilder;
133 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.neutronvpn.rev150602.vpnmaps.VpnMap;
134 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.neutronvpn.rev150602.vpnmaps.VpnMapKey;
135 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.l3.ext.rev150712.NetworkL3Extension;
136 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.l3.rev150712.routers.attributes.Routers;
137 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.l3.rev150712.routers.attributes.routers.Router;
138 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.l3.rev150712.routers.attributes.routers.RouterKey;
139 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.l3.rev150712.routers.attributes.routers.router.ExternalGatewayInfo;
140 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.networks.rev150712.NetworkTypeBase;
141 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.networks.rev150712.NetworkTypeFlat;
142 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.networks.rev150712.NetworkTypeGre;
143 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.networks.rev150712.NetworkTypeVlan;
144 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.networks.rev150712.NetworkTypeVxlan;
145 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.networks.rev150712.networks.attributes.Networks;
146 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.networks.rev150712.networks.attributes.networks.Network;
147 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.networks.rev150712.networks.attributes.networks.NetworkKey;
148 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.port.attributes.FixedIps;
149 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.ports.attributes.Ports;
150 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.ports.attributes.ports.Port;
151 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.ports.attributes.ports.PortKey;
152 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.portsecurity.rev150712.PortSecurityExtension;
153 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.provider.ext.rev150712.NetworkProviderExtension;
154 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.qos.rev160613.qos.attributes.qos.policies.QosPolicy;
155 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.rev150712.Neutron;
156 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.subnets.rev150712.subnets.attributes.Subnets;
157 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.subnets.rev150712.subnets.attributes.subnets.Subnet;
158 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.subnets.rev150712.subnets.attributes.subnets.SubnetKey;
159 import org.opendaylight.yang.gen.v1.urn.opendaylight.params.xml.ns.yang.netvirt.inter.vpn.link.rev160311.InterVpnLinkStates;
160 import org.opendaylight.yang.gen.v1.urn.opendaylight.params.xml.ns.yang.netvirt.inter.vpn.link.rev160311.InterVpnLinks;
161 import org.opendaylight.yang.gen.v1.urn.opendaylight.params.xml.ns.yang.netvirt.inter.vpn.link.rev160311.inter.vpn.link.states.InterVpnLinkState;
162 import org.opendaylight.yang.gen.v1.urn.opendaylight.params.xml.ns.yang.netvirt.inter.vpn.link.rev160311.inter.vpn.link.states.InterVpnLinkStateKey;
163 import org.opendaylight.yang.gen.v1.urn.opendaylight.params.xml.ns.yang.netvirt.inter.vpn.link.rev160311.inter.vpn.links.InterVpnLink;
164 import org.opendaylight.yangtools.yang.binding.DataObject;
165 import org.opendaylight.yangtools.yang.binding.InstanceIdentifier;
166 import org.opendaylight.yangtools.yang.common.RpcResult;
167 import org.slf4j.Logger;
168 import org.slf4j.LoggerFactory;
169
170 @Singleton
171 public class NeutronvpnUtils {
172
173     private static final Logger LOG = LoggerFactory.getLogger(NeutronvpnUtils.class);
174     private static final ImmutableBiMap<Class<? extends NetworkTypeBase>, Class<? extends SegmentTypeBase>>
175         NETWORK_MAP =
176         new ImmutableBiMap.Builder<Class<? extends NetworkTypeBase>, Class<? extends SegmentTypeBase>>()
177             .put(NetworkTypeFlat.class, SegmentTypeFlat.class)
178             .put(NetworkTypeGre.class, SegmentTypeGre.class)
179             .put(NetworkTypeVlan.class, SegmentTypeVlan.class)
180             .put(NetworkTypeVxlan.class, SegmentTypeVxlan.class)
181             .build();
182
183     private static final Set<Class<? extends NetworkTypeBase>> SUPPORTED_NETWORK_TYPES = new HashSet<>();
184
185     static {
186         SUPPORTED_NETWORK_TYPES.add(NetworkTypeFlat.class);
187         SUPPORTED_NETWORK_TYPES.add(NetworkTypeVlan.class);
188         SUPPORTED_NETWORK_TYPES.add(NetworkTypeVxlan.class);
189         SUPPORTED_NETWORK_TYPES.add(NetworkTypeGre.class);
190     }
191
192     private final ConcurrentMap<Uuid, Network> networkMap = new ConcurrentHashMap<>();
193     private final ConcurrentMap<Uuid, Router> routerMap = new ConcurrentHashMap<>();
194     private final ConcurrentMap<Uuid, Port> portMap = new ConcurrentHashMap<>();
195     private final ConcurrentMap<Uuid, Subnet> subnetMap = new ConcurrentHashMap<>();
196     private final Map<IpAddress, Set<Uuid>> subnetGwIpMap = new ConcurrentHashMap<>();
197     private final ConcurrentMap<Uuid, QosPolicy> qosPolicyMap = new ConcurrentHashMap<>();
198     private final ConcurrentMap<Uuid, HashMap<Uuid, Port>> qosPortsMap = new ConcurrentHashMap<>();
199     private final ConcurrentMap<Uuid, HashMap<Uuid, Network>> qosNetworksMap = new ConcurrentHashMap<>();
200
201     private final DataBroker dataBroker;
202     private final ManagedNewTransactionRunner txRunner;
203     private final IdManagerService idManager;
204     private final JobCoordinator jobCoordinator;
205     private final IPV6InternetDefaultRouteProgrammer ipV6InternetDefRt;
206     private static final int JOB_MAX_RETRIES = 3;
207
208     @Inject
209     public NeutronvpnUtils(final DataBroker dataBroker, final IdManagerService idManager,
210             final JobCoordinator jobCoordinator, final IPV6InternetDefaultRouteProgrammer ipV6InternetDefRt) {
211         this.dataBroker = dataBroker;
212         this.txRunner = new ManagedNewTransactionRunnerImpl(dataBroker);
213         this.idManager = idManager;
214         this.jobCoordinator = jobCoordinator;
215         this.ipV6InternetDefRt = ipV6InternetDefRt;
216     }
217
218     @Nullable
219     protected Subnetmap getSubnetmap(Uuid subnetId) {
220         InstanceIdentifier<Subnetmap> id = buildSubnetMapIdentifier(subnetId);
221         Optional<Subnetmap> sn = read(LogicalDatastoreType.CONFIGURATION, id);
222
223         if (sn.isPresent()) {
224             return sn.get();
225         }
226         LOG.error("getSubnetmap failed, subnet {} is not present", subnetId.getValue());
227         return null;
228     }
229
230     @Nullable
231     public VpnMap getVpnMap(Uuid id) {
232         InstanceIdentifier<VpnMap> vpnMapIdentifier = InstanceIdentifier.builder(VpnMaps.class).child(VpnMap.class,
233                 new VpnMapKey(id)).build();
234         Optional<VpnMap> optionalVpnMap = read(LogicalDatastoreType.CONFIGURATION, vpnMapIdentifier);
235         if (optionalVpnMap.isPresent()) {
236             return optionalVpnMap.get();
237         }
238         LOG.error("getVpnMap failed, VPN {} not present", id.getValue());
239         return null;
240     }
241
242     @Nullable
243     protected Uuid getVpnForNetwork(Uuid network) {
244         InstanceIdentifier<VpnMaps> vpnMapsIdentifier = InstanceIdentifier.builder(VpnMaps.class).build();
245         Optional<VpnMaps> optionalVpnMaps = read(LogicalDatastoreType.CONFIGURATION, vpnMapsIdentifier);
246         if (optionalVpnMaps.isPresent() && optionalVpnMaps.get().getVpnMap() != null) {
247             for (VpnMap vpnMap : optionalVpnMaps.get().nonnullVpnMap()) {
248                 List<Uuid> netIds = vpnMap.getNetworkIds();
249                 if (netIds != null && netIds.contains(network)) {
250                     return vpnMap.getVpnId();
251                 }
252             }
253         }
254         LOG.debug("getVpnForNetwork: Failed for network {} as no VPN present in VPNMaps DS", network.getValue());
255         return null;
256     }
257
258     @Nullable
259     protected Uuid getVpnForSubnet(Uuid subnetId) {
260         InstanceIdentifier<Subnetmap> subnetmapIdentifier = buildSubnetMapIdentifier(subnetId);
261         Optional<Subnetmap> optionalSubnetMap = read(LogicalDatastoreType.CONFIGURATION,
262                 subnetmapIdentifier);
263         if (optionalSubnetMap.isPresent()) {
264             return optionalSubnetMap.get().getVpnId();
265         }
266         LOG.error("getVpnForSubnet: Failed as subnetMap DS is absent for subnet {}", subnetId.getValue());
267         return null;
268     }
269
270     @Nullable
271     protected Uuid getNetworkForSubnet(Uuid subnetId) {
272         InstanceIdentifier<Subnetmap> subnetmapIdentifier = buildSubnetMapIdentifier(subnetId);
273         Optional<Subnetmap> optionalSubnetMap = read(LogicalDatastoreType.CONFIGURATION,
274                 subnetmapIdentifier);
275         if (optionalSubnetMap.isPresent()) {
276             return optionalSubnetMap.get().getNetworkId();
277         }
278         LOG.error("getNetworkForSubnet: Failed as subnetMap DS is absent for subnet {}", subnetId.getValue());
279         return null;
280     }
281
282     // @param external vpn - true if external vpn being fetched, false for internal vpn
283     @Nullable
284     protected Uuid getVpnForRouter(@Nullable Uuid routerId, boolean externalVpn) {
285         if (routerId == null) {
286             return null;
287         }
288
289         InstanceIdentifier<VpnMaps> vpnMapsIdentifier = InstanceIdentifier.builder(VpnMaps.class).build();
290         Optional<VpnMaps> optionalVpnMaps = read(LogicalDatastoreType.CONFIGURATION, vpnMapsIdentifier);
291         if (optionalVpnMaps.isPresent() && optionalVpnMaps.get().getVpnMap() != null) {
292             for (VpnMap vpnMap : optionalVpnMaps.get().nonnullVpnMap()) {
293                 List<org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.neutronvpn.rev150602.vpnmaps.vpnmap
294                     .RouterIds> routerIdsList = vpnMap.getRouterIds();
295                 if (routerIdsList == null || routerIdsList.isEmpty()) {
296                     continue;
297                 }
298                 // Skip router vpnId fetching from internet BGP-VPN
299                 if (vpnMap.getNetworkIds() != null && !vpnMap.getNetworkIds().isEmpty()) {
300                     // We only need to check the first network; if it’s not an external network there’s no
301                     // need to check the rest of the VPN’s network list
302                     if (getIsExternal(getNeutronNetwork(vpnMap.getNetworkIds().iterator().next()))) {
303                         continue;
304                     }
305                 }
306                 // FIXME: NETVIRT-1503: this check can be replaced by a ReadOnlyTransaction.exists()
307                 if (routerIdsList.stream().anyMatch(routerIds -> routerId.equals(routerIds.getRouterId()))) {
308                     if (externalVpn) {
309                         if (!routerId.equals(vpnMap.getVpnId())) {
310                             return vpnMap.getVpnId();
311                         }
312                     } else {
313                         if (routerId.equals(vpnMap.getVpnId())) {
314                             return vpnMap.getVpnId();
315                         }
316                     }
317                 }
318             }
319         }
320         LOG.debug("getVpnForRouter: Failed for router {} as no VPN present in VPNMaps DS", routerId.getValue());
321         return null;
322     }
323
324     @Nullable
325     protected List<Uuid> getRouterIdListforVpn(Uuid vpnId) {
326         InstanceIdentifier<VpnMap> vpnMapIdentifier = InstanceIdentifier.builder(VpnMaps.class).child(VpnMap.class,
327                 new VpnMapKey(vpnId)).build();
328         Optional<VpnMap> optionalVpnMap = read(LogicalDatastoreType.CONFIGURATION, vpnMapIdentifier);
329         if (optionalVpnMap.isPresent()) {
330             VpnMap vpnMap = optionalVpnMap.get();
331             return NeutronUtils.getVpnMapRouterIdsListUuid(vpnMap.getRouterIds());
332         }
333         LOG.error("getRouterIdListforVpn: Failed as VPNMaps DS is absent for VPN {}", vpnId.getValue());
334         return null;
335     }
336
337     @Nullable
338     protected List<Uuid> getNetworksForVpn(Uuid vpnId) {
339         InstanceIdentifier<VpnMap> vpnMapIdentifier = InstanceIdentifier.builder(VpnMaps.class).child(VpnMap.class,
340                 new VpnMapKey(vpnId)).build();
341         Optional<VpnMap> optionalVpnMap = read(LogicalDatastoreType.CONFIGURATION, vpnMapIdentifier);
342         if (optionalVpnMap.isPresent()) {
343             VpnMap vpnMap = optionalVpnMap.get();
344             return vpnMap.getNetworkIds();
345         }
346         LOG.error("getNetworksforVpn: Failed as VPNMaps DS is absent for VPN {}", vpnId.getValue());
347         return null;
348     }
349
350     protected List<Uuid> getSubnetsforVpn(Uuid vpnid) {
351         List<Uuid> subnets = new ArrayList<>();
352         // read subnetmaps
353         InstanceIdentifier<Subnetmaps> subnetmapsid = InstanceIdentifier.builder(Subnetmaps.class).build();
354         Optional<Subnetmaps> subnetmaps = read(LogicalDatastoreType.CONFIGURATION, subnetmapsid);
355         if (subnetmaps.isPresent() && subnetmaps.get().getSubnetmap() != null) {
356             List<Subnetmap> subnetMapList = subnetmaps.get().getSubnetmap();
357             for (Subnetmap candidateSubnetMap : subnetMapList) {
358                 if (candidateSubnetMap.getVpnId() != null && candidateSubnetMap.getVpnId().equals(vpnid)) {
359                     subnets.add(candidateSubnetMap.getId());
360                 }
361             }
362         }
363         return subnets;
364     }
365
366     @Nullable
367     protected String getNeutronPortNameFromVpnPortFixedIp(String vpnName, String fixedIp) {
368         InstanceIdentifier<VpnPortipToPort> id = buildVpnPortipToPortIdentifier(vpnName, fixedIp);
369         Optional<VpnPortipToPort> vpnPortipToPortData = read(LogicalDatastoreType.CONFIGURATION, id);
370         if (vpnPortipToPortData.isPresent()) {
371             return vpnPortipToPortData.get().getPortName();
372         }
373         LOG.error("getNeutronPortNameFromVpnPortFixedIp: Failed as vpnPortipToPortData DS is absent for VPN {} and"
374                 + " fixed IP {}", vpnName, fixedIp);
375         return null;
376     }
377
378     @Nullable
379     protected List<Uuid> getSubnetIdsFromNetworkId(Uuid networkId) {
380         InstanceIdentifier<NetworkMap> id = buildNetworkMapIdentifier(networkId);
381         Optional<NetworkMap> optionalNetworkMap = read(LogicalDatastoreType.CONFIGURATION, id);
382         if (optionalNetworkMap.isPresent()) {
383             return optionalNetworkMap.get().getSubnetIdList();
384         }
385         LOG.error("getSubnetIdsFromNetworkId: Failed as networkmap DS is absent for network {}", networkId.getValue());
386         return null;
387     }
388
389     @Nullable
390     protected List<Uuid> getPortIdsFromSubnetId(Uuid subnetId) {
391         InstanceIdentifier<Subnetmap> id = buildSubnetMapIdentifier(subnetId);
392         Optional<Subnetmap> optionalSubnetmap = read(LogicalDatastoreType.CONFIGURATION, id);
393         if (optionalSubnetmap.isPresent()) {
394             return optionalSubnetmap.get().getPortList();
395         }
396         return null;
397     }
398
399     protected Router getNeutronRouter(Uuid routerId) {
400         Router router = routerMap.get(routerId);
401         if (router != null) {
402             return router;
403         }
404         InstanceIdentifier<Router> inst = InstanceIdentifier.create(Neutron.class).child(Routers.class).child(Router
405                 .class, new RouterKey(routerId));
406         Optional<Router> rtr = read(LogicalDatastoreType.CONFIGURATION, inst);
407         if (rtr.isPresent()) {
408             router = rtr.get();
409         }
410         return router;
411     }
412
413     public InstanceIdentifier<Router> getNeutronRouterIid(Uuid routerId) {
414         return InstanceIdentifier.create(Neutron.class).child(Routers.class).child(Router
415                 .class, new RouterKey(routerId));
416
417     }
418
419     protected Network getNeutronNetwork(Uuid networkId) {
420         Network network = null;
421         network = networkMap.get(networkId);
422         if (network != null) {
423             return network;
424         }
425         LOG.debug("getNeutronNetwork for {}", networkId.getValue());
426         InstanceIdentifier<Network> inst = InstanceIdentifier.create(Neutron.class).child(Networks.class)
427             .child(Network.class, new NetworkKey(networkId));
428         Optional<Network> net = read(LogicalDatastoreType.CONFIGURATION, inst);
429         if (net.isPresent()) {
430             network = net.get();
431         }
432         return network;
433     }
434
435     protected Port getNeutronPort(Uuid portId) {
436         Port prt = portMap.get(portId);
437         if (prt != null) {
438             return prt;
439         }
440         LOG.debug("getNeutronPort for {}", portId.getValue());
441         InstanceIdentifier<Port> inst = InstanceIdentifier.create(Neutron.class).child(Ports.class).child(Port.class,
442                 new PortKey(portId));
443         Optional<Port> port = read(LogicalDatastoreType.CONFIGURATION, inst);
444         if (port.isPresent()) {
445             prt = port.get();
446         }
447         return prt;
448     }
449
450     /**
451      * Returns port_security_enabled status with the port.
452      *
453      * @param port the port
454      * @return port_security_enabled status
455      */
456     protected static boolean getPortSecurityEnabled(Port port) {
457         String deviceOwner = port.getDeviceOwner();
458         if (deviceOwner != null && deviceOwner.startsWith("network:")) {
459             // port with device owner of network:xxx is created by
460             // neutorn for its internal use. So security group doesn't apply.
461             // router interface, dhcp port and floating ip.
462             return false;
463         }
464         PortSecurityExtension portSecurity = port.augmentation(PortSecurityExtension.class);
465         if (portSecurity != null) {
466             return portSecurity.isPortSecurityEnabled();
467         }
468         return false;
469     }
470
471     /**
472      * Gets security group UUIDs delta   .
473      *
474      * @param port1SecurityGroups the port 1 security groups
475      * @param port2SecurityGroups the port 2 security groups
476      * @return the security groups delta
477      */
478     @Nullable
479     protected static List<Uuid> getSecurityGroupsDelta(@Nullable List<Uuid> port1SecurityGroups,
480             @Nullable List<Uuid> port2SecurityGroups) {
481         if (port1SecurityGroups == null) {
482             return null;
483         }
484
485         if (port2SecurityGroups == null) {
486             return port1SecurityGroups;
487         }
488
489         List<Uuid> list1 = new ArrayList<>(port1SecurityGroups);
490         List<Uuid> list2 = new ArrayList<>(port2SecurityGroups);
491         for (Iterator<Uuid> iterator = list1.iterator(); iterator.hasNext();) {
492             Uuid securityGroup1 = iterator.next();
493             for (Uuid securityGroup2 : list2) {
494                 if (securityGroup1.getValue().equals(securityGroup2.getValue())) {
495                     iterator.remove();
496                     break;
497                 }
498             }
499         }
500         return list1;
501     }
502
503     /**
504      * Gets the fixed ips delta.
505      *
506      * @param port1FixedIps the port 1 fixed ips
507      * @param port2FixedIps the port 2 fixed ips
508      * @return the fixed ips delta
509      */
510     protected static List<FixedIps> getFixedIpsDelta(List<FixedIps> port1FixedIps, List<FixedIps> port2FixedIps) {
511         if (port1FixedIps == null) {
512             return null;
513         }
514
515         if (port2FixedIps == null) {
516             return port1FixedIps;
517         }
518
519         List<FixedIps> list1 = new ArrayList<>(port1FixedIps);
520         List<FixedIps> list2 = new ArrayList<>(port2FixedIps);
521         for (Iterator<FixedIps> iterator = list1.iterator(); iterator.hasNext();) {
522             FixedIps fixedIps1 = iterator.next();
523             for (FixedIps fixedIps2 : list2) {
524                 if (fixedIps1.getIpAddress().equals(fixedIps2.getIpAddress())) {
525                     iterator.remove();
526                     break;
527                 }
528             }
529         }
530         return list1;
531     }
532
533     /**
534      * Gets the allowed address pairs delta.
535      *
536      * @param port1AllowedAddressPairs the port 1 allowed address pairs
537      * @param port2AllowedAddressPairs the port 2 allowed address pairs
538      * @return the allowed address pairs delta
539      */
540     @Nullable
541     protected static List<AllowedAddressPairs> getAllowedAddressPairsDelta(
542         @Nullable List<org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.port.attributes
543             .AllowedAddressPairs> port1AllowedAddressPairs,
544         @Nullable List<org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.port.attributes
545             .AllowedAddressPairs> port2AllowedAddressPairs) {
546         if (port1AllowedAddressPairs == null) {
547             return null;
548         }
549
550         if (port2AllowedAddressPairs == null) {
551             return getAllowedAddressPairsForAclService(port1AllowedAddressPairs);
552         }
553
554         List<org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.port.attributes
555             .AllowedAddressPairs> list1 =
556                 new ArrayList<>(port1AllowedAddressPairs);
557         List<org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.port.attributes
558             .AllowedAddressPairs> list2 =
559                 new ArrayList<>(port2AllowedAddressPairs);
560         for (Iterator<org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.port.attributes
561             .AllowedAddressPairs> iterator =
562              list1.iterator(); iterator.hasNext();) {
563             org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.port.attributes
564                 .AllowedAddressPairs allowedAddressPair1 = iterator.next();
565             for (org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.port.attributes
566                      .AllowedAddressPairs allowedAddressPair2 : list2) {
567                 if (allowedAddressPair1.key().equals(allowedAddressPair2.key())) {
568                     iterator.remove();
569                     break;
570                 }
571             }
572         }
573         return getAllowedAddressPairsForAclService(list1);
574     }
575
576     /**
577      * Gets the acl allowed address pairs.
578      *
579      * @param macAddress the mac address
580      * @param ipAddress the ip address
581      * @return the acl allowed address pairs
582      */
583     protected static AllowedAddressPairs getAclAllowedAddressPairs(MacAddress macAddress,
584             org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.types.rev160517.IpPrefixOrAddress ipAddress) {
585         AllowedAddressPairsBuilder aclAllowedAdressPairBuilder = new AllowedAddressPairsBuilder();
586         aclAllowedAdressPairBuilder.setMacAddress(macAddress);
587         if (ipAddress != null && ipAddress.stringValue() != null) {
588             if (ipAddress.getIpPrefix() != null) {
589                 aclAllowedAdressPairBuilder.setIpAddress(new IpPrefixOrAddress(ipAddress.getIpPrefix()));
590             } else {
591                 aclAllowedAdressPairBuilder.setIpAddress(new IpPrefixOrAddress(ipAddress.getIpAddress()));
592             }
593         }
594         return aclAllowedAdressPairBuilder.build();
595     }
596
597     /**
598      * Gets the allowed address pairs for acl service.
599      *
600      * @param macAddress the mac address
601      * @param fixedIps the fixed ips
602      * @return the allowed address pairs for acl service
603      */
604     protected static List<AllowedAddressPairs> getAllowedAddressPairsForAclService(MacAddress macAddress,
605             List<FixedIps> fixedIps) {
606         List<AllowedAddressPairs> aclAllowedAddressPairs = new ArrayList<>();
607         for (FixedIps fixedIp : fixedIps) {
608             aclAllowedAddressPairs.add(getAclAllowedAddressPairs(macAddress,
609                     org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.types.rev160517.IpPrefixOrAddressBuilder
610                     .getDefaultInstance(fixedIp.getIpAddress().stringValue())));
611         }
612         return aclAllowedAddressPairs;
613     }
614
615     /**
616      * Gets the allowed address pairs for acl service.
617      *
618      * @param portAllowedAddressPairs the port allowed address pairs
619      * @return the allowed address pairs for acl service
620      */
621     protected static List<AllowedAddressPairs> getAllowedAddressPairsForAclService(
622         List<org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.port.attributes
623             .AllowedAddressPairs> portAllowedAddressPairs) {
624         List<AllowedAddressPairs> aclAllowedAddressPairs = new ArrayList<>();
625         for (org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.port.attributes.AllowedAddressPairs
626                  portAllowedAddressPair : portAllowedAddressPairs) {
627             aclAllowedAddressPairs.add(getAclAllowedAddressPairs(portAllowedAddressPair.getMacAddress(),
628                 portAllowedAddressPair.getIpAddress()));
629         }
630         return aclAllowedAddressPairs;
631     }
632
633     /**
634      * Gets the IPv6 Link Local Address corresponding to the MAC Address.
635      *
636      * @param macAddress the mac address
637      * @return the allowed address pairs for acl service which includes the MAC + IPv6LLA
638      */
639     protected static AllowedAddressPairs updateIPv6LinkLocalAddressForAclService(MacAddress macAddress) {
640         IpAddress ipv6LinkLocalAddress = getIpv6LinkLocalAddressFromMac(macAddress);
641         return getAclAllowedAddressPairs(macAddress,
642                 org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.types.rev160517.IpPrefixOrAddressBuilder
643                 .getDefaultInstance(
644                         ipv6LinkLocalAddress.stringValue()));
645     }
646
647     /**
648      * Gets the updated security groups.
649      *
650      * @param aclInterfaceSecurityGroups the acl interface security groups
651      * @param origSecurityGroups the orig security groups
652      * @param newSecurityGroups the new security groups
653      * @return the updated security groups
654      */
655     protected static List<Uuid> getUpdatedSecurityGroups(List<Uuid> aclInterfaceSecurityGroups,
656             List<Uuid> origSecurityGroups, List<Uuid> newSecurityGroups) {
657         List<Uuid> addedGroups = getSecurityGroupsDelta(newSecurityGroups, origSecurityGroups);
658         List<Uuid> deletedGroups = getSecurityGroupsDelta(origSecurityGroups, newSecurityGroups);
659         List<Uuid> updatedSecurityGroups =
660                 aclInterfaceSecurityGroups != null ? new ArrayList<>(aclInterfaceSecurityGroups) : new ArrayList<>();
661         if (addedGroups != null) {
662             updatedSecurityGroups.addAll(addedGroups);
663         }
664         if (deletedGroups != null) {
665             updatedSecurityGroups.removeAll(deletedGroups);
666         }
667         return updatedSecurityGroups;
668     }
669
670     /**
671      * Gets the allowed address pairs for fixed ips.
672      *
673      * @param aclInterfaceAllowedAddressPairs the acl interface allowed address pairs
674      * @param portMacAddress the port mac address
675      * @param origFixedIps the orig fixed ips
676      * @param newFixedIps the new fixed ips
677      * @return the allowed address pairs for fixed ips
678      */
679     protected static List<AllowedAddressPairs> getAllowedAddressPairsForFixedIps(
680             List<AllowedAddressPairs> aclInterfaceAllowedAddressPairs, MacAddress portMacAddress,
681             List<FixedIps> origFixedIps, List<FixedIps> newFixedIps) {
682         List<FixedIps> addedFixedIps = getFixedIpsDelta(newFixedIps, origFixedIps);
683         List<FixedIps> deletedFixedIps = getFixedIpsDelta(origFixedIps, newFixedIps);
684         List<AllowedAddressPairs> updatedAllowedAddressPairs =
685             aclInterfaceAllowedAddressPairs != null
686                 ? new ArrayList<>(aclInterfaceAllowedAddressPairs) : new ArrayList<>();
687         if (deletedFixedIps != null) {
688             updatedAllowedAddressPairs.removeAll(getAllowedAddressPairsForAclService(portMacAddress, deletedFixedIps));
689         }
690         if (addedFixedIps != null) {
691             updatedAllowedAddressPairs.addAll(getAllowedAddressPairsForAclService(portMacAddress, addedFixedIps));
692         }
693         return updatedAllowedAddressPairs;
694     }
695
696     /**
697      * Gets the updated allowed address pairs.
698      *
699      * @param aclInterfaceAllowedAddressPairs the acl interface allowed address pairs
700      * @param origAllowedAddressPairs the orig allowed address pairs
701      * @param newAllowedAddressPairs the new allowed address pairs
702      * @return the updated allowed address pairs
703      */
704     protected static List<AllowedAddressPairs> getUpdatedAllowedAddressPairs(
705             List<AllowedAddressPairs> aclInterfaceAllowedAddressPairs,
706             List<org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.port.attributes
707                 .AllowedAddressPairs> origAllowedAddressPairs,
708             List<org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.port.attributes
709                 .AllowedAddressPairs> newAllowedAddressPairs) {
710         List<AllowedAddressPairs> addedAllowedAddressPairs =
711             getAllowedAddressPairsDelta(newAllowedAddressPairs,origAllowedAddressPairs);
712         List<AllowedAddressPairs> deletedAllowedAddressPairs =
713             getAllowedAddressPairsDelta(origAllowedAddressPairs, newAllowedAddressPairs);
714         List<AllowedAddressPairs> updatedAllowedAddressPairs =
715             aclInterfaceAllowedAddressPairs != null
716                 ? new ArrayList<>(aclInterfaceAllowedAddressPairs) : new ArrayList<>();
717         if (addedAllowedAddressPairs != null) {
718             updatedAllowedAddressPairs.addAll(addedAllowedAddressPairs);
719         }
720         if (deletedAllowedAddressPairs != null) {
721             updatedAllowedAddressPairs.removeAll(deletedAllowedAddressPairs);
722         }
723         return updatedAllowedAddressPairs;
724     }
725
726     /**
727      * Populate interface acl builder.
728      *
729      * @param interfaceAclBuilder the interface acl builder
730      * @param port the port
731      */
732     protected void populateInterfaceAclBuilder(InterfaceAclBuilder interfaceAclBuilder, Port port) {
733         // Handle security group enabled
734         List<Uuid> securityGroups = port.getSecurityGroups();
735         if (securityGroups != null) {
736             interfaceAclBuilder.setSecurityGroups(securityGroups);
737         }
738         List<AllowedAddressPairs> aclAllowedAddressPairs = NeutronvpnUtils.getAllowedAddressPairsForAclService(
739                 port.getMacAddress(), port.getFixedIps());
740         // Update the allowed address pair with the IPv6 LLA that is auto configured on the port.
741         aclAllowedAddressPairs.add(NeutronvpnUtils.updateIPv6LinkLocalAddressForAclService(port.getMacAddress()));
742         List<org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.port.attributes.AllowedAddressPairs>
743             portAllowedAddressPairs = port.getAllowedAddressPairs();
744         if (portAllowedAddressPairs != null) {
745             aclAllowedAddressPairs.addAll(NeutronvpnUtils.getAllowedAddressPairsForAclService(portAllowedAddressPairs));
746         }
747         interfaceAclBuilder.setAllowedAddressPairs(aclAllowedAddressPairs);
748
749         populateSubnetInfo(interfaceAclBuilder, port);
750     }
751
752     protected void populateSubnetInfo(InterfaceAclBuilder interfaceAclBuilder, Port port) {
753         List<SubnetInfo> portSubnetInfo = getSubnetInfo(port);
754         if (portSubnetInfo != null) {
755             interfaceAclBuilder.setSubnetInfo(portSubnetInfo);
756         }
757     }
758
759     @Nullable
760     protected List<SubnetInfo> getSubnetInfo(Port port) {
761         List<FixedIps> portFixedIps = port.getFixedIps();
762         if (portFixedIps == null) {
763             LOG.error("Failed to get Fixed IPs for the port {}", port.getName());
764             return null;
765         }
766         List<SubnetInfo> subnetInfoList = new ArrayList<>();
767         for (FixedIps portFixedIp : portFixedIps) {
768             Uuid subnetId = portFixedIp.getSubnetId();
769             Subnet subnet = getNeutronSubnet(subnetId);
770             if (subnet != null) {
771                 Class<? extends IpVersionBase> ipVersion =
772                         NeutronSecurityRuleConstants.IP_VERSION_MAP.get(subnet.getIpVersion());
773                 Class<? extends Dhcpv6Base> raMode = subnet.getIpv6RaMode() == null ? null
774                         : NeutronSecurityRuleConstants.RA_MODE_MAP.get(subnet.getIpv6RaMode());
775                 SubnetInfo subnetInfo = new SubnetInfoBuilder().withKey(new SubnetInfoKey(subnetId))
776                         .setIpVersion(ipVersion).setIpPrefix(new IpPrefixOrAddress(subnet.getCidr()))
777                         .setIpv6RaMode(raMode).setGatewayIp(subnet.getGatewayIp()).build();
778                 subnetInfoList.add(subnetInfo);
779             }
780         }
781         return subnetInfoList;
782     }
783
784     protected Subnet getNeutronSubnet(Uuid subnetId) {
785         Subnet subnet = subnetMap.get(subnetId);
786         if (subnet != null) {
787             return subnet;
788         }
789         InstanceIdentifier<Subnet> inst = InstanceIdentifier.create(Neutron.class).child(Subnets.class).child(Subnet
790                 .class, new SubnetKey(subnetId));
791         Optional<Subnet> sn = read(LogicalDatastoreType.CONFIGURATION, inst);
792
793         if (sn.isPresent()) {
794             subnet = sn.get();
795             addToSubnetCache(subnet);
796         }
797         return subnet;
798     }
799
800     protected List<Subnetmap> getNeutronRouterSubnetMapList(Uuid routerId) {
801         List<Subnetmap> subnetMapList = new ArrayList<>();
802         Optional<Subnetmaps> subnetMaps = read(LogicalDatastoreType.CONFIGURATION,
803                 InstanceIdentifier.builder(Subnetmaps.class).build());
804         if (subnetMaps.isPresent() && subnetMaps.get().getSubnetmap() != null) {
805             for (Subnetmap subnetmap : subnetMaps.get().getSubnetmap()) {
806                 if (routerId.equals(subnetmap.getRouterId())) {
807                     subnetMapList.add(subnetmap);
808                 }
809             }
810         }
811         LOG.debug("getNeutronRouterSubnetMapList returns {}", subnetMapList);
812         return subnetMapList;
813     }
814
815     @Nonnull
816     protected List<Uuid> getNeutronRouterSubnetIds(Uuid routerId) {
817         LOG.debug("getNeutronRouterSubnetIds for {}", routerId.getValue());
818         List<Uuid> subnetIdList = new ArrayList<>();
819         Optional<Subnetmaps> subnetMaps = read(LogicalDatastoreType.CONFIGURATION,
820             InstanceIdentifier.builder(Subnetmaps.class).build());
821         if (subnetMaps.isPresent() && subnetMaps.get().getSubnetmap() != null) {
822             for (Subnetmap subnetmap : subnetMaps.get().getSubnetmap()) {
823                 if (routerId.equals(subnetmap.getRouterId())) {
824                     subnetIdList.add(subnetmap.getId());
825                 }
826             }
827         }
828         LOG.debug("getNeutronRouterSubnetIds returns {}", subnetIdList);
829         return subnetIdList;
830     }
831
832     // TODO Clean up the exception handling and the console output
833     @SuppressWarnings({"checkstyle:IllegalCatch", "checkstyle:RegexpSinglelineJava"})
834     @Nullable
835     protected Short getIPPrefixFromPort(Port port) {
836         try {
837             Uuid subnetUUID = port.getFixedIps().get(0).getSubnetId();
838             SubnetKey subnetkey = new SubnetKey(subnetUUID);
839             InstanceIdentifier<Subnet> subnetidentifier = InstanceIdentifier.create(Neutron.class).child(Subnets
840                     .class).child(Subnet.class, subnetkey);
841             Optional<Subnet> subnet = read(LogicalDatastoreType.CONFIGURATION, subnetidentifier);
842             if (subnet.isPresent()) {
843                 String cidr = subnet.get().getCidr().stringValue();
844                 // Extract the prefix length from cidr
845                 String[] parts = cidr.split("/");
846                 if (parts.length == 2) {
847                     return Short.valueOf(parts[1]);
848                 } else {
849                     LOG.trace("Could not retrieve prefix from subnet CIDR");
850                 }
851             } else {
852                 LOG.trace("Unable to read on subnet datastore");
853             }
854         } catch (Exception e) {
855             LOG.error("Failed to retrieve IP prefix from port for port {}", port.getUuid().getValue(), e);
856         }
857         LOG.error("Failed for port {}", port.getUuid().getValue());
858         return null;
859     }
860
861     // TODO Clean up the exception handling
862     @SuppressWarnings("checkstyle:IllegalCatch")
863     protected void createVpnPortFixedIpToPort(String vpnName, String fixedIp, String portName, String macAddress,
864             boolean isSubnetIp, TypedWriteTransaction<Datastore.Configuration> writeConfigTxn) {
865         InstanceIdentifier<VpnPortipToPort> id = NeutronvpnUtils.buildVpnPortipToPortIdentifier(vpnName, fixedIp);
866         VpnPortipToPortBuilder builder = new VpnPortipToPortBuilder()
867             .withKey(new VpnPortipToPortKey(fixedIp, vpnName))
868             .setVpnName(vpnName).setPortFixedip(fixedIp)
869             .setPortName(portName).setMacAddress(macAddress).setSubnetIp(isSubnetIp);
870         try {
871             if (writeConfigTxn != null) {
872                 writeConfigTxn.put(id, builder.build());
873             } else {
874                 MDSALUtil.syncWrite(dataBroker, LogicalDatastoreType.CONFIGURATION, id, builder.build());
875             }
876             LOG.trace("Neutron port with fixedIp: {}, vpn {}, interface {}, mac {}, isSubnetIp {} added to "
877                 + "VpnPortipToPort DS", fixedIp, vpnName, portName, macAddress, isSubnetIp);
878         } catch (Exception e) {
879             LOG.error("Failure while creating VPNPortFixedIpToPort map for vpn {} - fixedIP {}", vpnName, fixedIp,
880                     e);
881         }
882     }
883
884     // TODO Clean up the exception handling
885     @SuppressWarnings("checkstyle:IllegalCatch")
886     protected void removeVpnPortFixedIpToPort(String vpnName, String fixedIp,
887                                               TypedWriteTransaction<Datastore.Configuration> writeConfigTxn) {
888         InstanceIdentifier<VpnPortipToPort> id = NeutronvpnUtils.buildVpnPortipToPortIdentifier(vpnName, fixedIp);
889         try {
890             if (writeConfigTxn != null) {
891                 writeConfigTxn.delete(id);
892             } else {
893                 MDSALUtil.syncDelete(dataBroker, LogicalDatastoreType.CONFIGURATION, id);
894             }
895             LOG.trace("Neutron router port with fixedIp: {}, vpn {} removed from VpnPortipToPort DS", fixedIp,
896                     vpnName);
897         } catch (Exception e) {
898             LOG.error("Failure while removing VPNPortFixedIpToPort map for vpn {} - fixedIP {}", vpnName, fixedIp,
899                     e);
900         }
901     }
902
903     // TODO Clean up the exception handling
904     @SuppressWarnings("checkstyle:IllegalCatch")
905     protected void removeLearntVpnVipToPort(String vpnName, String fixedIp) {
906         InstanceIdentifier<LearntVpnVipToPort> id = NeutronvpnUtils.buildLearntVpnVipToPortIdentifier(vpnName, fixedIp);
907         // FIXME: can we use 'id' as the lock name?
908         final ReentrantLock lock = JvmGlobalLocks.getLockForString(vpnName + fixedIp);
909         lock.lock();
910         try {
911             MDSALUtil.syncDelete(dataBroker, LogicalDatastoreType.OPERATIONAL, id);
912             LOG.trace("Neutron router port with fixedIp: {}, vpn {} removed from LearntVpnPortipToPort DS", fixedIp,
913                     vpnName);
914         } catch (Exception e) {
915             LOG.error("Failure while removing LearntVpnPortFixedIpToPort map for vpn {} - fixedIP {}",
916                 vpnName, fixedIp, e);
917         } finally {
918             lock.unlock();
919         }
920     }
921
922     public void addToNetworkCache(Network network) {
923         networkMap.put(network.getUuid(), network);
924     }
925
926     public void removeFromNetworkCache(Network network) {
927         networkMap.remove(network.getUuid());
928     }
929
930     public void addToRouterCache(Router router) {
931         routerMap.put(router.getUuid(), router);
932     }
933
934     public void removeFromRouterCache(Router router) {
935         routerMap.remove(router.getUuid());
936     }
937
938     public Collection<Router> getAllRouters() {
939         return routerMap.values();
940     }
941
942     public void addToPortCache(Port port) {
943         portMap.put(port.getUuid(), port);
944     }
945
946     public void removeFromPortCache(Port port) {
947         portMap.remove(port.getUuid());
948     }
949
950     public void addToSubnetCache(Subnet subnet) {
951         subnetMap.put(subnet.getUuid(), subnet);
952         IpAddress gatewayIp = subnet.getGatewayIp();
953         if (gatewayIp != null) {
954             subnetGwIpMap.computeIfAbsent(gatewayIp, k -> Sets.newConcurrentHashSet()).add(subnet.getUuid());
955         }
956     }
957
958     public void removeFromSubnetCache(Subnet subnet) {
959         subnetMap.remove(subnet.getUuid());
960         IpAddress gatewayIp = subnet.getGatewayIp();
961         if (gatewayIp != null) {
962             Set<Uuid> gwIps = subnetGwIpMap.get(gatewayIp);
963             if (gwIps != null) {
964                 gwIps.remove(subnet.getUuid());
965             }
966         }
967     }
968
969     public static String getSegmentationIdFromNeutronNetwork(Network network) {
970         String segmentationId = null;
971         NetworkProviderExtension providerExtension = network.augmentation(NetworkProviderExtension.class);
972         if (providerExtension != null) {
973             Class<? extends NetworkTypeBase> networkType = providerExtension.getNetworkType();
974             segmentationId = NeutronUtils.getSegmentationIdFromNeutronNetwork(network, networkType);
975         }
976
977         return segmentationId;
978     }
979
980     public static Class<? extends SegmentTypeBase> getSegmentTypeFromNeutronNetwork(Network network) {
981         NetworkProviderExtension providerExtension = network.augmentation(NetworkProviderExtension.class);
982         return providerExtension != null ? NETWORK_MAP.get(providerExtension.getNetworkType()) : null;
983     }
984
985     public static String getPhysicalNetworkName(Network network) {
986         NetworkProviderExtension providerExtension = network.augmentation(NetworkProviderExtension.class);
987         return providerExtension != null ? providerExtension.getPhysicalNetwork() : null;
988     }
989
990     public Collection<Uuid> getSubnetIdsForGatewayIp(IpAddress ipAddress) {
991         return subnetGwIpMap.getOrDefault(ipAddress, Collections.emptySet());
992     }
993
994     static InstanceIdentifier<VpnPortipToPort> buildVpnPortipToPortIdentifier(String vpnName, String fixedIp) {
995         InstanceIdentifier<VpnPortipToPort> id =
996             InstanceIdentifier.builder(NeutronVpnPortipPortData.class)
997                 .child(VpnPortipToPort.class, new VpnPortipToPortKey(fixedIp, vpnName)).build();
998         return id;
999     }
1000
1001     static InstanceIdentifier<LearntVpnVipToPort> buildLearntVpnVipToPortIdentifier(String vpnName, String fixedIp) {
1002         InstanceIdentifier<LearntVpnVipToPort> id =
1003             InstanceIdentifier.builder(LearntVpnVipToPortData.class)
1004                 .child(LearntVpnVipToPort.class, new LearntVpnVipToPortKey(fixedIp, vpnName)).build();
1005         return id;
1006     }
1007
1008     static Boolean getIsExternal(Network network) {
1009         return network.augmentation(NetworkL3Extension.class) != null
1010                 && network.augmentation(NetworkL3Extension.class).isExternal();
1011     }
1012
1013     public void addToQosPolicyCache(QosPolicy qosPolicy) {
1014         qosPolicyMap.put(qosPolicy.getUuid(),qosPolicy);
1015     }
1016
1017     public void removeFromQosPolicyCache(QosPolicy qosPolicy) {
1018         qosPolicyMap.remove(qosPolicy.getUuid());
1019     }
1020
1021     public void addToQosPortsCache(Uuid qosUuid, Port port) {
1022         if (qosPortsMap.containsKey(qosUuid)) {
1023             if (!qosPortsMap.get(qosUuid).containsKey(port.getUuid())) {
1024                 qosPortsMap.get(qosUuid).put(port.getUuid(), port);
1025             }
1026         } else {
1027             HashMap<Uuid, Port> newPortMap = new HashMap<>();
1028             newPortMap.put(port.getUuid(), port);
1029             qosPortsMap.put(qosUuid, newPortMap);
1030         }
1031     }
1032
1033     public void removeFromQosPortsCache(Uuid qosUuid, Port port) {
1034         if (qosPortsMap.containsKey(qosUuid) && qosPortsMap.get(qosUuid).containsKey(port.getUuid())) {
1035             qosPortsMap.get(qosUuid).remove(port.getUuid(), port);
1036         }
1037     }
1038
1039     public void addToQosNetworksCache(Uuid qosUuid, Network network) {
1040         if (qosNetworksMap.containsKey(qosUuid)) {
1041             if (!qosNetworksMap.get(qosUuid).containsKey(network.getUuid())) {
1042                 qosNetworksMap.get(qosUuid).put(network.getUuid(), network);
1043             }
1044         } else {
1045             HashMap<Uuid, Network> newNetworkMap = new HashMap<>();
1046             newNetworkMap.put(network.getUuid(), network);
1047             qosNetworksMap.put(qosUuid, newNetworkMap);
1048         }
1049     }
1050
1051     public void removeFromQosNetworksCache(Uuid qosUuid, Network network) {
1052         if (qosNetworksMap.containsKey(qosUuid) && qosNetworksMap.get(qosUuid).containsKey(network.getUuid())) {
1053             qosNetworksMap.get(qosUuid).remove(network.getUuid(), network);
1054         }
1055     }
1056
1057     static InstanceIdentifier<NetworkMap> buildNetworkMapIdentifier(Uuid networkId) {
1058         InstanceIdentifier<NetworkMap> id = InstanceIdentifier.builder(NetworkMaps.class).child(NetworkMap.class, new
1059                 NetworkMapKey(networkId)).build();
1060         return id;
1061     }
1062
1063     static InstanceIdentifier<VpnInterface> buildVpnInterfaceIdentifier(String ifName) {
1064         InstanceIdentifier<VpnInterface> id = InstanceIdentifier.builder(VpnInterfaces.class).child(VpnInterface
1065                 .class, new VpnInterfaceKey(ifName)).build();
1066         return id;
1067     }
1068
1069     static InstanceIdentifier<Subnetmap> buildSubnetMapIdentifier(Uuid subnetId) {
1070         InstanceIdentifier<Subnetmap> id = InstanceIdentifier.builder(Subnetmaps.class).child(Subnetmap.class, new
1071                 SubnetmapKey(subnetId)).build();
1072         return id;
1073     }
1074
1075     static InstanceIdentifier<Interface> buildVlanInterfaceIdentifier(String interfaceName) {
1076         InstanceIdentifier<Interface> id = InstanceIdentifier.builder(Interfaces.class).child(Interface.class, new
1077                 InterfaceKey(interfaceName)).build();
1078         return id;
1079     }
1080
1081     static InstanceIdentifier<org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.natservice.rev160111.ext
1082             .routers.Routers> buildExtRoutersIdentifier(Uuid routerId) {
1083         InstanceIdentifier<org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.natservice.rev160111.ext.routers
1084                 .Routers> id = InstanceIdentifier.builder(ExtRouters.class).child(org.opendaylight.yang.gen.v1.urn
1085                 .opendaylight.netvirt.natservice.rev160111.ext.routers.Routers.class, new RoutersKey(routerId
1086                 .getValue())).build();
1087         return id;
1088     }
1089
1090     static InstanceIdentifier<FloatingIpIdToPortMapping> buildfloatingIpIdToPortMappingIdentifier(Uuid floatingIpId) {
1091         return InstanceIdentifier.builder(FloatingIpPortInfo.class).child(FloatingIpIdToPortMapping.class, new
1092                 FloatingIpIdToPortMappingKey(floatingIpId)).build();
1093     }
1094
1095     // TODO Remove this method entirely
1096     @SuppressWarnings("checkstyle:IllegalCatch")
1097     private <T extends DataObject> Optional<T> read(LogicalDatastoreType datastoreType, InstanceIdentifier<T> path) {
1098         try {
1099             return SingleTransactionDataBroker.syncReadOptional(dataBroker, datastoreType, path);
1100         } catch (ReadFailedException e) {
1101             throw new RuntimeException(e);
1102         }
1103     }
1104
1105     public static Class<? extends NetworkTypeBase> getNetworkType(Network network) {
1106         NetworkProviderExtension providerExtension = network.augmentation(NetworkProviderExtension.class);
1107         return providerExtension != null ? providerExtension.getNetworkType() : null;
1108     }
1109
1110     @Nullable
1111     static ProviderTypes getProviderNetworkType(Network network) {
1112         if (network == null) {
1113             LOG.error("Error in getting provider network type since network is null");
1114             return null;
1115         }
1116         NetworkProviderExtension npe = network.augmentation(NetworkProviderExtension.class);
1117         if (npe != null) {
1118             Class<? extends NetworkTypeBase> networkTypeBase = npe.getNetworkType();
1119             if (networkTypeBase != null) {
1120                 if (networkTypeBase.isAssignableFrom(NetworkTypeFlat.class)) {
1121                     return ProviderTypes.FLAT;
1122                 } else if (networkTypeBase.isAssignableFrom(NetworkTypeVlan.class)) {
1123                     return ProviderTypes.VLAN;
1124                 } else if (networkTypeBase.isAssignableFrom(NetworkTypeVxlan.class)) {
1125                     return ProviderTypes.VXLAN;
1126                 } else if (networkTypeBase.isAssignableFrom(NetworkTypeGre.class)) {
1127                     return ProviderTypes.GRE;
1128                 }
1129             }
1130         }
1131         LOG.error("Error in getting provider network type since network provider extension is null for network "
1132                 + "{}", network.getUuid().getValue());
1133         return null;
1134     }
1135
1136     static boolean isNetworkTypeSupported(Network network) {
1137         NetworkProviderExtension npe = network.augmentation(NetworkProviderExtension.class);
1138         return npe != null && npe.getNetworkType() != null && SUPPORTED_NETWORK_TYPES.contains(npe.getNetworkType());
1139     }
1140
1141     static boolean isNetworkOfType(Network network, Class<? extends NetworkTypeBase> type) {
1142         NetworkProviderExtension npe = network.augmentation(NetworkProviderExtension.class);
1143         if (npe != null && npe.getNetworkType() != null) {
1144             return type.isAssignableFrom(npe.getNetworkType());
1145         }
1146         return false;
1147     }
1148
1149     static boolean isFlatOrVlanNetwork(Network network) {
1150         return network != null
1151                 && (isNetworkOfType(network, NetworkTypeVlan.class) || isNetworkOfType(network, NetworkTypeFlat.class));
1152     }
1153
1154     static boolean isVlanOrVxlanNetwork(Class<? extends NetworkTypeBase> type) {
1155         return type.isAssignableFrom(NetworkTypeVxlan.class) || type.isAssignableFrom(NetworkTypeVlan.class);
1156     }
1157
1158     /**
1159      * Get inter-VPN link state.
1160      *
1161      * @param vpnLinkName VPN link name
1162      * @return Optional of InterVpnLinkState
1163      */
1164     public Optional<InterVpnLinkState> getInterVpnLinkState(String vpnLinkName) {
1165         InstanceIdentifier<InterVpnLinkState> vpnLinkStateIid = InstanceIdentifier.builder(InterVpnLinkStates.class)
1166                 .child(InterVpnLinkState.class, new InterVpnLinkStateKey(vpnLinkName)).build();
1167         return read(LogicalDatastoreType.CONFIGURATION, vpnLinkStateIid);
1168     }
1169
1170     /**
1171      * Returns an InterVpnLink by searching by one of its endpoint's IP.
1172      *
1173      * @param endpointIp IP to search for
1174      * @return a InterVpnLink
1175      */
1176     public Optional<InterVpnLink> getInterVpnLinkByEndpointIp(String endpointIp) {
1177         InstanceIdentifier<InterVpnLinks> interVpnLinksIid = InstanceIdentifier.builder(InterVpnLinks.class).build();
1178         Optional<InterVpnLinks> interVpnLinksOpData = MDSALUtil.read(dataBroker, LogicalDatastoreType.CONFIGURATION,
1179                 interVpnLinksIid);
1180         if (interVpnLinksOpData.isPresent()) {
1181             for (InterVpnLink interVpnLink : interVpnLinksOpData.get().nonnullInterVpnLink()) {
1182                 if (interVpnLink.getFirstEndpoint().getIpAddress().getValue().equals(endpointIp)
1183                         || interVpnLink.getSecondEndpoint().getIpAddress().getValue().equals(endpointIp)) {
1184                     return Optional.of(interVpnLink);
1185                 }
1186             }
1187         }
1188         return Optional.absent();
1189     }
1190
1191     public Set<RouterDpnList> getAllRouterDpnList(BigInteger dpid) {
1192         Set<RouterDpnList> ret = new HashSet<>();
1193         InstanceIdentifier<NeutronRouterDpns> routerDpnId =
1194                 InstanceIdentifier.create(NeutronRouterDpns.class);
1195         Optional<NeutronRouterDpns> neutronRouterDpnsOpt =
1196             MDSALUtil.read(dataBroker, LogicalDatastoreType.OPERATIONAL, routerDpnId);
1197         if (neutronRouterDpnsOpt.isPresent()) {
1198             NeutronRouterDpns neutronRouterDpns = neutronRouterDpnsOpt.get();
1199             for (RouterDpnList routerDpnList : neutronRouterDpns.nonnullRouterDpnList()) {
1200                 if (routerDpnList.getDpnVpninterfacesList() != null) {
1201                     for (DpnVpninterfacesList dpnInterfaceList : routerDpnList.getDpnVpninterfacesList()) {
1202                         if (dpnInterfaceList.getDpnId().equals(dpid)) {
1203                             ret.add(routerDpnList);
1204                         }
1205                     }
1206                 }
1207             }
1208         }
1209         return ret;
1210     }
1211
1212     @Nullable
1213     protected Integer getUniqueRDId(String poolName, String idKey) {
1214         AllocateIdInput getIdInput = new AllocateIdInputBuilder().setPoolName(poolName).setIdKey(idKey).build();
1215         try {
1216             Future<RpcResult<AllocateIdOutput>> result = idManager.allocateId(getIdInput);
1217             RpcResult<AllocateIdOutput> rpcResult = result.get();
1218             if (rpcResult.isSuccessful()) {
1219                 return rpcResult.getResult().getIdValue().intValue();
1220             } else {
1221                 LOG.error("RPC call to get unique ID for pool name {} with ID key {} returned with errors {}",
1222                         poolName, idKey, rpcResult.getErrors());
1223             }
1224         } catch (InterruptedException | ExecutionException e) {
1225             LOG.error("Exception when getting Unique Id for poolname {} and ID Key {}", poolName, idKey, e);
1226         }
1227         LOG.error("getUniqueRdId: Failed to return ID for poolname {} and ID Key {}", poolName, idKey);
1228         return null;
1229     }
1230
1231     protected void releaseRDId(String poolName, String idKey) {
1232         ReleaseIdInput idInput = new ReleaseIdInputBuilder().setPoolName(poolName).setIdKey(idKey).build();
1233         try {
1234             RpcResult<ReleaseIdOutput> rpcResult = idManager.releaseId(idInput).get();
1235             if (!rpcResult.isSuccessful()) {
1236                 LOG.error("RPC Call to Get Unique Id returned with errors for poolname {} and ID Key {}: {}",
1237                         poolName, idKey, rpcResult.getErrors());
1238             } else {
1239                 LOG.info("ID {} for RD released successfully", idKey);
1240             }
1241         } catch (InterruptedException | ExecutionException e) {
1242             LOG.error("Exception when trying to release ID for poolname {} and ID Key {}", poolName, idKey, e);
1243         }
1244     }
1245
1246     protected static IpAddress getIpv6LinkLocalAddressFromMac(MacAddress mac) {
1247         byte[] octets = bytesFromHexString(mac.getValue());
1248
1249         /* As per the RFC2373, steps involved to generate a LLA include
1250            1. Convert the 48 bit MAC address to 64 bit value by inserting 0xFFFE
1251               between OUI and NIC Specific part.
1252            2. Invert the Universal/Local flag in the OUI portion of the address.
1253            3. Use the prefix "FE80::/10" along with the above 64 bit Interface
1254               identifier to generate the IPv6 LLA. */
1255
1256         StringBuilder interfaceID = new StringBuilder();
1257         short u8byte = (short) (octets[0] & 0xff);
1258         u8byte ^= 1 << 1;
1259         interfaceID.append(Integer.toHexString(0xFF & u8byte));
1260         interfaceID.append(StringUtils.leftPad(Integer.toHexString(0xFF & octets[1]), 2, "0"));
1261         interfaceID.append(":");
1262         interfaceID.append(Integer.toHexString(0xFF & octets[2]));
1263         interfaceID.append("ff:fe");
1264         interfaceID.append(StringUtils.leftPad(Integer.toHexString(0xFF & octets[3]), 2, "0"));
1265         interfaceID.append(":");
1266         interfaceID.append(Integer.toHexString(0xFF & octets[4]));
1267         interfaceID.append(StringUtils.leftPad(Integer.toHexString(0xFF & octets[5]), 2, "0"));
1268
1269         Ipv6Address ipv6LLA = new Ipv6Address("fe80:0:0:0:" + interfaceID.toString());
1270         IpAddress ipAddress = new IpAddress(ipv6LLA);
1271         return ipAddress;
1272     }
1273
1274     protected static byte[] bytesFromHexString(String values) {
1275         String target = "";
1276         if (values != null) {
1277             target = values;
1278         }
1279         String[] octets = target.split(":");
1280
1281         byte[] ret = new byte[octets.length];
1282         for (int i = 0; i < octets.length; i++) {
1283             ret[i] = Integer.valueOf(octets[i], 16).byteValue();
1284         }
1285         return ret;
1286     }
1287
1288     public List<String> getExistingRDs() {
1289         List<String> existingRDs = new ArrayList<>();
1290         InstanceIdentifier<VpnInstances> path = InstanceIdentifier.builder(VpnInstances.class).build();
1291         Optional<VpnInstances> vpnInstancesOptional = read(LogicalDatastoreType.CONFIGURATION, path);
1292         if (vpnInstancesOptional.isPresent() && vpnInstancesOptional.get().getVpnInstance() != null) {
1293             for (VpnInstance vpnInstance : vpnInstancesOptional.get().getVpnInstance()) {
1294                 if (vpnInstance.getIpv4Family() == null) {
1295                     continue;
1296                 }
1297                 List<String> rds = vpnInstance.getIpv4Family().getRouteDistinguisher();
1298                 if (rds != null) {
1299                     existingRDs.addAll(rds);
1300                 }
1301             }
1302         }
1303         return existingRDs;
1304     }
1305
1306     protected boolean doesVpnExist(Uuid vpnId) {
1307         InstanceIdentifier<VpnMap> vpnMapIdentifier = InstanceIdentifier.builder(VpnMaps.class).child(VpnMap.class,
1308                 new VpnMapKey(vpnId)).build();
1309         return read(LogicalDatastoreType.CONFIGURATION, vpnMapIdentifier).isPresent();
1310     }
1311
1312     protected Optional<org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.natservice.rev160111.external
1313         .subnets.Subnets> getOptionalExternalSubnets(Uuid subnetId) {
1314         InstanceIdentifier<org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.natservice
1315             .rev160111.external.subnets.Subnets> subnetsIdentifier =
1316                 InstanceIdentifier.builder(ExternalSubnets.class)
1317                 .child(org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.natservice
1318                         .rev160111.external.subnets.Subnets.class, new SubnetsKey(subnetId)).build();
1319         return read(LogicalDatastoreType.CONFIGURATION, subnetsIdentifier);
1320     }
1321
1322     public static List<StaticMacEntries> buildStaticMacEntry(Port port) {
1323         PhysAddress physAddress = new PhysAddress(port.getMacAddress().getValue());
1324         List<FixedIps> fixedIps = port.getFixedIps();
1325         IpAddress ipAddress = null;
1326         if (isNotEmpty(fixedIps)) {
1327             ipAddress = port.getFixedIps().get(0).getIpAddress();
1328         }
1329         StaticMacEntriesBuilder staticMacEntriesBuilder = new StaticMacEntriesBuilder();
1330         List<StaticMacEntries> staticMacEntries = new ArrayList<>();
1331         if (ipAddress != null) {
1332             staticMacEntries.add(staticMacEntriesBuilder.setMacAddress(physAddress).setIpPrefix(ipAddress).build());
1333         } else {
1334             staticMacEntries.add(staticMacEntriesBuilder.setMacAddress(physAddress).build());
1335         }
1336         return staticMacEntries;
1337     }
1338
1339     public static boolean isEmpty(Collection<?> collection) {
1340         return collection == null || collection.isEmpty();
1341     }
1342
1343     public static boolean isNotEmpty(Collection<?> collection) {
1344         return !isEmpty(collection);
1345     }
1346
1347     /**
1348      * Method to get an ipVersionChosen as IPV4 and/or IPV6 or undefined from the subnetmaps of the router.
1349      * @param routerUuid the Uuid for which find out the IP version associated
1350      * @return an IpVersionChoice used by the router from its attached subnetmaps. IpVersionChoice.UNDEFINED if any
1351      */
1352     public IpVersionChoice getIpVersionChoicesFromRouterUuid(Uuid routerUuid) {
1353         IpVersionChoice rep = IpVersionChoice.UNDEFINED;
1354         if (routerUuid == null) {
1355             return rep;
1356         }
1357         List<Subnetmap> subnetmapList = getNeutronRouterSubnetMaps(routerUuid);
1358         if (subnetmapList.isEmpty()) {
1359             return rep;
1360         }
1361         for (Subnetmap sn : subnetmapList) {
1362             if (sn.getSubnetIp() != null) {
1363                 IpVersionChoice ipVers = getIpVersionFromString(sn.getSubnetIp());
1364                 if (rep.choice != ipVers.choice) {
1365                     rep = rep.addVersion(ipVers);
1366                 }
1367                 if (rep.choice == IpVersionChoice.IPV4AND6.choice) {
1368                     return rep;
1369                 }
1370             }
1371         }
1372         return rep;
1373     }
1374
1375     /**This method return the list of Subnetmap associated to the router or a empty list if any.
1376      * @param routerId the Uuid of router for which subnetmap is find out
1377      * @return a list of Subnetmap associated to the router. it could be empty if any
1378      */
1379     protected List<Subnetmap> getNeutronRouterSubnetMaps(Uuid routerId) {
1380         List<Subnetmap> subnetIdList = new ArrayList<>();
1381         Optional<Subnetmaps> subnetMaps = read(LogicalDatastoreType.CONFIGURATION,
1382             InstanceIdentifier.builder(Subnetmaps.class).build());
1383         if (subnetMaps.isPresent() && subnetMaps.get().getSubnetmap() != null) {
1384             for (Subnetmap subnetmap : subnetMaps.get().getSubnetmap()) {
1385                 if (routerId.equals(subnetmap.getRouterId())) {
1386                     subnetIdList.add(subnetmap);
1387                 }
1388             }
1389         }
1390         return subnetIdList;
1391     }
1392
1393     static InstanceIdentifier<org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.vpn
1394         .instance.to.vpn.id.VpnInstance> getVpnInstanceToVpnIdIdentifier(String vpnName) {
1395         return InstanceIdentifier.builder(VpnInstanceToVpnId.class)
1396             .child(org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.vpn
1397                     .instance.to.vpn.id.VpnInstance.class,
1398                 new org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.vpn
1399                     .instance.to.vpn.id.VpnInstanceKey(vpnName)).build();
1400     }
1401
1402     /**
1403      * Retrieves the VPN Route Distinguisher searching by its Vpn instance name.
1404      * @param vpnName Name of the VPN
1405      *
1406      * @return the route-distinguisher of the VPN
1407      */
1408     @Nullable
1409     public String getVpnRd(String vpnName) {
1410         InstanceIdentifier<org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.vpn
1411             .instance.to.vpn.id.VpnInstance> id = getVpnInstanceToVpnIdIdentifier(vpnName);
1412         return SingleTransactionDataBroker.syncReadOptionalAndTreatReadFailedExceptionAsAbsentOptional(dataBroker,
1413                 LogicalDatastoreType.CONFIGURATION, id).toJavaUtil().map(
1414                 org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.vpn.instance.to.vpn.id
1415                         .VpnInstance::getVrfId).orElse(null);
1416     }
1417
1418     /**Get IpVersionChoice from String IP like x.x.x.x or an representation IPv6.
1419      * @param ipAddress String of an representation IP address V4 or V6
1420      * @return the IpVersionChoice of the version or IpVersionChoice.UNDEFINED otherwise
1421      */
1422     public static IpVersionChoice getIpVersionFromString(String ipAddress) {
1423         IpVersionChoice ipchoice = IpVersionChoice.UNDEFINED;
1424         if (ipAddress.contains("/")) {
1425             ipAddress = ipAddress.substring(0, ipAddress.indexOf("/"));
1426         }
1427         try {
1428             InetAddress address = InetAddress.getByName(ipAddress);
1429             if (address instanceof Inet4Address) {
1430                 return IpVersionChoice.IPV4;
1431             } else if (address instanceof Inet6Address) {
1432                 return IpVersionChoice.IPV6;
1433             }
1434         } catch (UnknownHostException | SecurityException e) {
1435             LOG.error("getIpVersionFromString: could not  find version for {}", ipAddress);
1436         }
1437         return ipchoice;
1438     }
1439
1440     /**Get IpVersionChoice from Uuid Subnet.
1441      * @param sm Subnetmap structure
1442      * @return the IpVersionChoice of the version or IpVersionChoice.UNDEFINED otherwise
1443      */
1444     public static IpVersionChoice getIpVersionFromSubnet(Subnetmap sm) {
1445         if (sm != null && sm.getSubnetIp() != null) {
1446             return getIpVersionFromString(sm.getSubnetIp());
1447         }
1448         return IpVersionChoice.UNDEFINED;
1449     }
1450
1451     @Nullable
1452     public VpnInstanceOpDataEntry getVpnInstanceOpDataEntryFromVpnId(String vpnName) {
1453         String primaryRd = getVpnRd(vpnName);
1454         if (primaryRd == null) {
1455             LOG.error("getVpnInstanceOpDataEntryFromVpnId: Vpn Instance {} "
1456                      + "Primary RD not found", vpnName);
1457             return null;
1458         }
1459         InstanceIdentifier<VpnInstanceOpDataEntry> id = getVpnOpDataIdentifier(primaryRd);
1460         Optional<VpnInstanceOpDataEntry> vpnInstanceOpDataEntryOptional = read(LogicalDatastoreType.OPERATIONAL, id);
1461         if (!vpnInstanceOpDataEntryOptional.isPresent()) {
1462             LOG.error("getVpnInstanceOpDataEntryFromVpnId: VpnInstance {} not found", primaryRd);
1463             return null;
1464         }
1465         return vpnInstanceOpDataEntryOptional.get();
1466     }
1467
1468     protected InstanceIdentifier<VpnInstanceOpDataEntry> getVpnOpDataIdentifier(String primaryRd) {
1469         return InstanceIdentifier.builder(VpnInstanceOpData.class)
1470                 .child(VpnInstanceOpDataEntry.class, new VpnInstanceOpDataEntryKey(primaryRd)).build();
1471     }
1472
1473     public boolean shouldVpnHandleIpVersionChoiceChange(IpVersionChoice ipVersion, Uuid routerId, boolean add) {
1474         int subnetCount = -1;
1475         if (ipVersion.isIpVersionChosen(IpVersionChoice.IPV4)) {
1476             subnetCount = getSubnetCountFromRouter(routerId, ipVersion);
1477         } else if (ipVersion.isIpVersionChosen(IpVersionChoice.IPV6)) {
1478             subnetCount = getSubnetCountFromRouter(routerId, ipVersion);
1479         } else {
1480             //Possible value of ipversion choice is either V4 or V6 only. Not accepted V4andV6 and Undefined
1481             return false;
1482         }
1483         /* ADD: Update vpnInstanceOpDataEntry with address family only on first IPv4/IPv6 subnet
1484          * for the VPN Instance.
1485          *
1486          * REMOVE: Update vpnInstanceOpDataEntry with address family only on last IPv4/IPv6 subnet
1487          * for the VPN Instance.
1488          */
1489         if (add && subnetCount == 1) {
1490             return true;
1491         } else if (!add && subnetCount == 0) {
1492             return true;
1493         } else {
1494             return false;
1495         }
1496     }
1497
1498     public boolean shouldVpnHandleIpVersionChangeToRemove(Subnetmap sm, Uuid vpnId) {
1499         if (sm == null) {
1500             return false;
1501         }
1502         InstanceIdentifier<Subnetmaps> subnetMapsId = InstanceIdentifier.builder(Subnetmaps.class).build();
1503         Optional<Subnetmaps> allSubnetMaps = read(LogicalDatastoreType.CONFIGURATION, subnetMapsId);
1504         // calculate and store in list IpVersion for each subnetMap, belonging to current VpnInstance
1505         List<IpVersionChoice> snIpVersions = new ArrayList<>();
1506         for (Subnetmap snMap : allSubnetMaps.get().nonnullSubnetmap()) {
1507             if (snMap.getId().equals(sm.getId())) {
1508                 continue;
1509             }
1510             if (snMap.getVpnId() != null && snMap.getVpnId().equals(vpnId)) {
1511                 snIpVersions.add(getIpVersionFromString(snMap.getSubnetIp()));
1512             }
1513             if (snMap.getInternetVpnId() != null && snMap.getInternetVpnId().equals(vpnId)) {
1514                 snIpVersions.add(getIpVersionFromString(snMap.getSubnetIp()));
1515             }
1516         }
1517         IpVersionChoice ipVersion = getIpVersionFromString(sm.getSubnetIp());
1518         if (!snIpVersions.contains(ipVersion)) {
1519             return true;
1520         }
1521         return false;
1522     }
1523
1524     public int getSubnetCountFromRouter(Uuid routerId, IpVersionChoice ipVer) {
1525         List<Subnetmap> subnetMapList = getNeutronRouterSubnetMapList(routerId);
1526         int subnetCount = 0;
1527         for (Subnetmap subMap : subnetMapList) {
1528             IpVersionChoice ipVersion = getIpVersionFromString(subMap.getSubnetIp());
1529             if (ipVersion.isIpVersionChosen(ipVer)) {
1530                 subnetCount++;
1531             }
1532             if (subnetCount > 1) {
1533                 break;
1534             }
1535         }
1536         return subnetCount;
1537     }
1538
1539     public void updateVpnInstanceWithIpFamily(String vpnName, IpVersionChoice ipVersion, boolean add) {
1540         jobCoordinator.enqueueJob("VPN-" + vpnName, () -> {
1541             VpnInstanceOpDataEntry vpnInstanceOpDataEntry = getVpnInstanceOpDataEntryFromVpnId(vpnName);
1542             if (vpnInstanceOpDataEntry == null) {
1543                 return Collections.emptyList();
1544             }
1545             if (vpnInstanceOpDataEntry.getType() == VpnInstanceOpDataEntry.Type.L2) {
1546                 LOG.debug("updateVpnInstanceWithIpFamily: Update VpnInstance {} with ipFamily {}."
1547                         + "VpnInstanceOpDataEntry is L2 instance. Do nothing.", vpnName, ipVersion);
1548                 return Collections.emptyList();
1549             }
1550             if (ipVersion == IpVersionChoice.UNDEFINED) {
1551                 LOG.debug("updateVpnInstanceWithIpFamily: Update VpnInstance {} with Undefined address family"
1552                         + "is not allowed. Do nothing", vpnName);
1553                 return Collections.emptyList();
1554             }
1555             VpnInstanceOpDataEntryBuilder builder = new VpnInstanceOpDataEntryBuilder(vpnInstanceOpDataEntry);
1556             boolean ipConfigured = add;
1557             if (ipVersion.isIpVersionChosen(IpVersionChoice.IPV4AND6)) {
1558                 builder.setIpv4Configured(ipConfigured);
1559                 builder.setIpv6Configured(ipConfigured);
1560             } else if (ipVersion.isIpVersionChosen(IpVersionChoice.IPV4)) {
1561                 builder.setIpv4Configured(ipConfigured);
1562             } else if (ipVersion.isIpVersionChosen(IpVersionChoice.IPV6)) {
1563                 builder.setIpv6Configured(ipConfigured);
1564             }
1565             return Collections.singletonList(txRunner.callWithNewWriteOnlyTransactionAndSubmit(
1566                     OPERATIONAL, tx -> {
1567                     InstanceIdentifier<VpnInstanceOpDataEntry> id = InstanceIdentifier
1568                             .builder(VpnInstanceOpData.class).child(VpnInstanceOpDataEntry.class,
1569                                         new VpnInstanceOpDataEntryKey(vpnInstanceOpDataEntry.getVrfId())).build();
1570                     tx.merge(id, builder.build(), false);
1571                     LOG.info("updateVpnInstanceWithIpFamily: Successfully {} {} to Vpn {}",
1572                             add == true ? "added" : "removed", ipVersion, vpnName);
1573                 }));
1574         });
1575     }
1576
1577     /**
1578      * Get the vpnInstance from its Uuid.
1579      *
1580      * @param broker to get informations from ds
1581      * @param vpnId the Uuid of the VPN
1582      * @return the VpnInstance or null if unfindable
1583      */
1584     @Nullable
1585     public VpnInstance getVpnInstance(DataBroker broker, Uuid vpnId) {
1586         if (broker == null || vpnId == null) {
1587             return null;
1588         }
1589         InstanceIdentifier<VpnInstance> id = InstanceIdentifier.builder(VpnInstances.class).child(VpnInstance.class,
1590                 new VpnInstanceKey(vpnId.getValue())).build();
1591         Optional<VpnInstance> vpnInstance = read(LogicalDatastoreType.CONFIGURATION, id);
1592         return vpnInstance.isPresent() ? vpnInstance.get() : null;
1593     }
1594
1595     /**
1596      *Get the Uuid of external network of the router (remember you that one router have only one external network).
1597      * @param routerId the Uuid of the router which you try to reach the external network
1598      * @return Uuid of externalNetwork or null if is not exist
1599      */
1600     protected Uuid getExternalNetworkUuidAttachedFromRouterUuid(@Nonnull Uuid routerId) {
1601         LOG.debug("getExternalNetworkUuidAttachedFromRouterUuid for {}", routerId.getValue());
1602         Uuid externalNetworkUuid = null;
1603         Router router = getNeutronRouter(routerId);
1604         if (router != null && router.getExternalGatewayInfo() != null) {
1605             externalNetworkUuid = router.getExternalGatewayInfo().getExternalNetworkId();
1606         }
1607         return externalNetworkUuid;
1608     }
1609
1610     public Uuid getInternetvpnUuidBoundToRouterId(@Nonnull Uuid routerId) {
1611         Uuid netId = getExternalNetworkUuidAttachedFromRouterUuid(routerId);
1612         if (netId == null) {
1613             return netId;
1614         }
1615         return getVpnForNetwork(netId);
1616     }
1617
1618     /**
1619      * This method get Uuid of internet vpn if existing one bound to the same router of the subnetUuid arg.
1620      * Explanation: If the subnet (of arg subnetUuid) have a router bound and this router have an
1621      * externalVpn (vpn on externalProvider network) then <b>its Uuid</b> will be returned.
1622      * @param subnetUuid Uuid of subnet where you are finding a link to an external network
1623      * @return Uuid of externalVpn or null if it is not found
1624      */
1625     @Nullable
1626     public Uuid getInternetvpnUuidBoundToSubnetRouter(@Nonnull Uuid subnetUuid) {
1627         Subnetmap subnetmap = getSubnetmap(subnetUuid);
1628         Uuid routerUuid = subnetmap.getRouterId();
1629         LOG.debug("getInternetvpnUuidBoundToSubnetRouter for subnetUuid {}", subnetUuid.getValue());
1630         if (routerUuid == null) {
1631             return null;
1632         }
1633         Uuid externalNetworkUuid = getExternalNetworkUuidAttachedFromRouterUuid(routerUuid);
1634         return externalNetworkUuid != null ? getVpnForNetwork(externalNetworkUuid) : null;
1635     }
1636
1637     /**
1638      * Get a list of Private Subnetmap Ids from router to export then its prefixes in Internet VPN.
1639      * @param extNet Provider Network, which has a port attached as external network gateway to router
1640      * @return a list of Private Subnetmap Ids of the router with external network gateway
1641      */
1642     public @Nonnull List<Uuid> getPrivateSubnetsToExport(@Nonnull Network extNet, Uuid internetVpnId) {
1643         List<Uuid> subList = new ArrayList<>();
1644         List<Uuid> rtrList = new ArrayList<>();
1645         if (internetVpnId != null) {
1646             rtrList.addAll(getRouterIdListforVpn(internetVpnId));
1647         } else {
1648             Uuid extNwVpnId = getVpnForNetwork(extNet.getUuid());
1649             rtrList.addAll(getRouterIdListforVpn(extNwVpnId));
1650         }
1651         if (rtrList.isEmpty()) {
1652             return subList;
1653         }
1654         for (Uuid rtrId: rtrList) {
1655             Router router = getNeutronRouter(rtrId);
1656             ExternalGatewayInfo info = router.getExternalGatewayInfo();
1657             if (info == null) {
1658                 LOG.error("getPrivateSubnetsToExport: can not get info about external gateway for router {}",
1659                           router.getUuid().getValue());
1660                 continue;
1661             }
1662             // check that router really has given provider network as its external gateway port
1663             if (!extNet.getUuid().equals(info.getExternalNetworkId())) {
1664                 LOG.error("getPrivateSubnetsToExport: router {} is not attached to given provider network {}",
1665                           router.getUuid().getValue(), extNet.getUuid().getValue());
1666                 continue;
1667             }
1668             subList.addAll(getNeutronRouterSubnetIds(rtrId));
1669         }
1670         return subList;
1671     }
1672
1673     public void updateVpnInstanceWithFallback(Uuid routerId, Uuid vpnName, boolean add) {
1674         VpnInstanceOpDataEntry vpnInstanceOpDataEntry = getVpnInstanceOpDataEntryFromVpnId(vpnName.getValue());
1675         if (vpnInstanceOpDataEntry == null) {
1676             LOG.error("updateVpnInstanceWithFallback: vpnInstanceOpDataEntry not found for vpn {}", vpnName);
1677             return;
1678         }
1679         Long internetBgpVpnId = vpnInstanceOpDataEntry.getVpnId();
1680         List<Uuid> routerIds = new ArrayList<>();
1681         //Handle router specific V6 internet fallback flow else handle all V6 external routers
1682         if (routerId != null) {
1683             routerIds.add(routerId);
1684         } else {
1685             //This block will execute for ext-nw to Internet VPN association/disassociation event.
1686             routerIds = getRouterIdListforVpn(vpnName);
1687         }
1688         if (routerIds == null || routerIds.isEmpty()) {
1689             LOG.error("updateVpnInstanceWithFallback: router not found for vpn {}", vpnName);
1690             return;
1691         }
1692         for (Uuid rtrId: routerIds) {
1693             if (rtrId == null) {
1694                 continue;
1695             }
1696             List<BigInteger> dpnIds = getDpnsForRouter(rtrId.getValue());
1697             if (dpnIds.isEmpty()) {
1698                 continue;
1699             }
1700             VpnInstanceOpDataEntry vpnOpDataEntry = getVpnInstanceOpDataEntryFromVpnId(rtrId.getValue());
1701             Long routerIdAsLong = vpnOpDataEntry.getVpnId();
1702             long vpnId;
1703             Uuid rtrVpnId = getVpnForRouter(rtrId, true);
1704             if (rtrVpnId == null) {
1705                 //If external BGP-VPN is not associated with router then routerId is same as routerVpnId
1706                 vpnId = routerIdAsLong;
1707             } else {
1708                 vpnId = getVpnId(rtrVpnId.getValue());
1709             }
1710             for (BigInteger dpnId : dpnIds) {
1711                 if (add) {
1712                     ipV6InternetDefRt.installDefaultRoute(dpnId, rtrId.getValue(), internetBgpVpnId, vpnId);
1713                 } else {
1714                     ipV6InternetDefRt.removeDefaultRoute(dpnId, rtrId.getValue(), internetBgpVpnId, vpnId);
1715                 }
1716             }
1717         }
1718     }
1719
1720     public void updateVpnInstanceOpWithType(VpnInstanceOpDataEntry.BgpvpnType choice, @Nonnull Uuid vpn) {
1721         String primaryRd = getVpnRd(vpn.getValue());
1722         if (primaryRd == null) {
1723             LOG.debug("updateVpnInstanceOpWithType: Update BgpvpnType {} for {}."
1724                     + "Primary RD not found", choice, vpn.getValue());
1725             return;
1726         }
1727         InstanceIdentifier<VpnInstanceOpDataEntry> id = InstanceIdentifier.builder(VpnInstanceOpData.class)
1728               .child(VpnInstanceOpDataEntry.class, new VpnInstanceOpDataEntryKey(primaryRd)).build();
1729
1730         Optional<VpnInstanceOpDataEntry> vpnInstanceOpDataEntryOptional =
1731             read(LogicalDatastoreType.OPERATIONAL, id);
1732         if (!vpnInstanceOpDataEntryOptional.isPresent()) {
1733             LOG.debug("updateVpnInstanceOpWithType: Update BgpvpnType {} for {}."
1734                     + "VpnInstanceOpDataEntry not found", choice, vpn.getValue());
1735             return;
1736         }
1737         VpnInstanceOpDataEntry vpnInstanceOpDataEntry = vpnInstanceOpDataEntryOptional.get();
1738         if (vpnInstanceOpDataEntry.getBgpvpnType().equals(choice)) {
1739             LOG.debug("updateVpnInstanceOpWithType: Update BgpvpnType {} for {}."
1740                     + "VpnInstanceOpDataEntry already set", choice, vpn.getValue());
1741             return;
1742         }
1743         VpnInstanceOpDataEntryBuilder builder = new VpnInstanceOpDataEntryBuilder(vpnInstanceOpDataEntry);
1744         builder.setBgpvpnType(choice);
1745         ListenableFutures.addErrorLogging(txRunner.callWithNewWriteOnlyTransactionAndSubmit(OPERATIONAL, tx -> {
1746             tx.merge(id, builder.build(), false);
1747             LOG.debug("updateVpnInstanceOpWithType: sent merge to operDS BgpvpnType {} for {}", choice, vpn.getValue());
1748         }), LOG, "Error updating VPN instance op {} with type {}", vpn, choice);
1749     }
1750
1751     public List<Uuid> getAssociateRouterInputRouterIdsListUuid(List<RouterIds> routerIds) {
1752         if (routerIds == null) {
1753             return Collections.emptyList();
1754         }
1755         return routerIds.stream().map(
1756             routerId -> routerId.getRouterId()).collect(Collectors.toList());
1757     }
1758
1759     public List<Uuid> getDisassociateRouterInputRouterIdsListUuid(List<RouterIds> routerIds) {
1760         if (routerIds == null) {
1761             return Collections.emptyList();
1762         }
1763         return routerIds.stream().map(
1764             routerId -> routerId.getRouterId()).collect(Collectors.toList());
1765     }
1766
1767     public RouterIds getvpnMapRouterIds(Uuid routerId) {
1768         return new RouterIdsBuilder().setRouterId(routerId).build();
1769     }
1770
1771     public void removeVpnMapRouterIdsFromList(Uuid routerId, List<RouterIds> vpnRouterIds) {
1772         Iterator<RouterIds> vpnRouterIdIter = vpnRouterIds.iterator();
1773         while (vpnRouterIdIter.hasNext()) {
1774             RouterIds vpnRouterId = vpnRouterIdIter.next();
1775             if (vpnRouterId.getRouterId().getValue().equals(routerId.getValue())) {
1776                 vpnRouterIdIter.remove();
1777                 return;
1778             }
1779         }
1780         return;
1781     }
1782
1783     public boolean vpnMapRouterIdsContainsRouterId(Uuid routerId, List<RouterIds> vpnRouterIds) {
1784         if (routerId == null) {
1785             return false;
1786         }
1787         return vpnRouterIds.stream().anyMatch(vpnRouterId ->
1788               vpnRouterId.getRouterId().getValue().equals(routerId.getValue()));
1789     }
1790
1791     public List<Uuid> getVpnInstanceRouterIdsListUuid(List<RouterIds> routerIds) {
1792         if (routerIds == null) {
1793             return Collections.emptyList();
1794         }
1795         return routerIds.stream().map(
1796             routerId -> routerId.getRouterId()).collect(Collectors.toList());
1797     }
1798
1799     public static RouterIds getvpnInstanceRouterIds(Uuid routerId) {
1800         return new RouterIdsBuilder().setRouterId(routerId).build();
1801     }
1802
1803     public static List<RouterIds> getVpnInstanceRouterIdsList(List<Uuid> routerIds) {
1804         List<RouterIds> listRouterIds = new ArrayList<>();
1805         for (Uuid routerId : routerIds) {
1806             final RouterIds routerIdInstance = getvpnInstanceRouterIds(routerId);
1807             listRouterIds.add(routerIdInstance);
1808         }
1809         return listRouterIds;
1810     }
1811
1812     @Nonnull
1813     public List<BigInteger> getDpnsForRouter(String routerUuid) {
1814         InstanceIdentifier id = InstanceIdentifier.builder(NeutronRouterDpns.class)
1815             .child(RouterDpnList.class, new RouterDpnListKey(routerUuid)).build();
1816         Optional<RouterDpnList> routerDpnListData =
1817                 SingleTransactionDataBroker.syncReadOptionalAndTreatReadFailedExceptionAsAbsentOptional(dataBroker,
1818                         LogicalDatastoreType.OPERATIONAL, id);
1819         List<BigInteger> dpns = new ArrayList<>();
1820         if (routerDpnListData.isPresent()) {
1821             for (DpnVpninterfacesList dpnVpnInterface : routerDpnListData.get().nonnullDpnVpninterfacesList()) {
1822                 dpns.add(dpnVpnInterface.getDpnId());
1823             }
1824         }
1825         return dpns;
1826     }
1827
1828     @Nullable
1829     public List<Uuid> getRouterIdsfromVpnInstance(String vpnName) {
1830         // returns only router, attached to IPv4 networks
1831         InstanceIdentifier<VpnMap> vpnMapIdentifier = InstanceIdentifier.builder(VpnMaps.class)
1832             .child(VpnMap.class, new VpnMapKey(new Uuid(vpnName))).build();
1833         Optional<VpnMap> optionalVpnMap = SingleTransactionDataBroker
1834                 .syncReadOptionalAndTreatReadFailedExceptionAsAbsentOptional(dataBroker,
1835                         LogicalDatastoreType.CONFIGURATION, vpnMapIdentifier);
1836         if (!optionalVpnMap.isPresent()) {
1837             LOG.error("getRouterIdsfromVpnInstance : Router not found for vpn : {}", vpnName);
1838             return null;
1839         }
1840         List<Uuid> rtrIds = optionalVpnMap.get().getRouterIds().stream().map(routerIds -> routerIds.getRouterId())
1841                 .collect(Collectors.toList());
1842         return rtrIds;
1843
1844     }
1845
1846     public InstanceIdentifier<Router> buildNeutronRouterIdentifier(Uuid routerUuid) {
1847         InstanceIdentifier<Router> routerInstanceIdentifier = InstanceIdentifier.create(Neutron.class)
1848              .child(Routers.class).child(Router.class, new RouterKey(routerUuid));
1849         return routerInstanceIdentifier;
1850     }
1851
1852     @Nullable
1853     List<Subnetmap> getSubnetmapListFromNetworkId(Uuid networkId) {
1854         List<Uuid> subnetIdList = getSubnetIdsFromNetworkId(networkId);
1855         if (subnetIdList != null) {
1856             List<Subnetmap> subnetmapList = new ArrayList<>();
1857             for (Uuid subnetId : subnetIdList) {
1858                 Subnetmap subnetmap = getSubnetmap(subnetId);
1859                 if (subnetmap != null) {
1860                     subnetmapList.add(subnetmap);
1861                 } else {
1862                     LOG.error("getSubnetmapListFromNetworkId: subnetmap is null for subnet {} belonging to network {}",
1863                             subnetId.getValue(), networkId.getValue());
1864                 }
1865             }
1866             return subnetmapList;
1867         }
1868         LOG.error("getSubnetmapListFromNetworkId: Failed as subnetIdList is null for network {}",
1869                 networkId.getValue());
1870         return null;
1871     }
1872
1873     @Nullable
1874     public long getVpnId(String vpnName) {
1875         InstanceIdentifier<org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.vpn
1876                 .instance.to.vpn.id.VpnInstance> id = getVpnInstanceToVpnIdIdentifier(vpnName);
1877         return SingleTransactionDataBroker.syncReadOptionalAndTreatReadFailedExceptionAsAbsentOptional(dataBroker,
1878                 LogicalDatastoreType.CONFIGURATION, id).toJavaUtil().map(
1879                 org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.vpn.instance.to.vpn.id
1880                         .VpnInstance::getVpnId).orElse(null);
1881     }
1882
1883     protected boolean isV6SubnetPartOfRouter(Uuid routerId) {
1884         List<Subnetmap> subnetList = getNeutronRouterSubnetMapList(routerId);
1885         for (Subnetmap sm : subnetList) {
1886             if (sm == null) {
1887                 continue;
1888             }
1889             IpVersionChoice ipVers = getIpVersionFromString(sm.getSubnetIp());
1890             //skip further subnet processing once found first V6 subnet for the router
1891             if (ipVers.isIpVersionChosen(IpVersionChoice.IPV6)) {
1892                 return true;
1893             }
1894         }
1895         return false;
1896     }
1897
1898     @SuppressWarnings({ "unchecked", "rawtypes" })
1899     public <T extends DataObject> void asyncReadAndExecute(final LogicalDatastoreType datastoreType,
1900                                                            final InstanceIdentifier<T> iid, final String jobKey,
1901                                                            final Function<Optional<T>, Void> function) {
1902         jobCoordinator.enqueueJob(jobKey, () -> {
1903             SettableFuture<Optional<T>> settableFuture = SettableFuture.create();
1904             List futures = Collections.singletonList(settableFuture);
1905             try (ReadOnlyTransaction tx = dataBroker.newReadOnlyTransaction()) {
1906                 Futures.addCallback(tx.read(datastoreType, iid),
1907                         new SettableFutureCallback<Optional<T>>(settableFuture) {
1908                             @Override
1909                             public void onSuccess(Optional<T> data) {
1910                                 function.apply(data);
1911                                 super.onSuccess(data);
1912                             }
1913                         }, MoreExecutors.directExecutor());
1914
1915                 return futures;
1916             }
1917         }, JOB_MAX_RETRIES);
1918     }
1919
1920     private class SettableFutureCallback<T> implements FutureCallback<T> {
1921
1922         private final SettableFuture<T> settableFuture;
1923
1924         SettableFutureCallback(SettableFuture<T> settableFuture) {
1925             this.settableFuture = settableFuture;
1926         }
1927
1928         @Override
1929         public void onSuccess(T objT) {
1930             settableFuture.set(objT);
1931         }
1932
1933         @Override
1934         public void onFailure(Throwable throwable) {
1935             settableFuture.setException(throwable);
1936         }
1937     }
1938 }
1939