2 * Copyright (c) 2016, 2017 Ericsson India Global Services Pvt Ltd. and others. All rights reserved.
4 * This program and the accompanying materials are made available under the
5 * terms of the Eclipse Public License v1.0 which accompanies this distribution,
6 * and is available at http://www.eclipse.org/legal/epl-v10.html
9 package org.opendaylight.netvirt.neutronvpn;
11 import com.google.common.base.Optional;
12 import com.google.common.collect.ImmutableBiMap;
13 import com.google.common.collect.Sets;
14 import java.math.BigInteger;
15 import java.net.Inet4Address;
16 import java.net.Inet6Address;
17 import java.net.InetAddress;
18 import java.net.UnknownHostException;
19 import java.util.ArrayList;
20 import java.util.Collection;
21 import java.util.Collections;
22 import java.util.HashMap;
23 import java.util.HashSet;
24 import java.util.Iterator;
25 import java.util.List;
28 import java.util.concurrent.ConcurrentHashMap;
29 import java.util.concurrent.ConcurrentMap;
30 import java.util.concurrent.ExecutionException;
31 import java.util.concurrent.Future;
32 import javax.annotation.Nonnull;
33 import javax.inject.Inject;
34 import javax.inject.Singleton;
35 import org.apache.commons.lang3.StringUtils;
36 import org.opendaylight.controller.md.sal.binding.api.DataBroker;
37 import org.opendaylight.controller.md.sal.binding.api.WriteTransaction;
38 import org.opendaylight.controller.md.sal.common.api.data.LogicalDatastoreType;
39 import org.opendaylight.controller.md.sal.common.api.data.ReadFailedException;
40 import org.opendaylight.genius.datastoreutils.SingleTransactionDataBroker;
41 import org.opendaylight.genius.mdsalutil.MDSALUtil;
42 import org.opendaylight.infrautils.jobcoordinator.JobCoordinator;
43 import org.opendaylight.netvirt.neutronvpn.api.enums.IpVersionChoice;
44 import org.opendaylight.netvirt.neutronvpn.api.utils.NeutronUtils;
45 import org.opendaylight.yang.gen.v1.urn.huawei.params.xml.ns.yang.l3vpn.rev140815.VpnInstances;
46 import org.opendaylight.yang.gen.v1.urn.huawei.params.xml.ns.yang.l3vpn.rev140815.VpnInterfaces;
47 import org.opendaylight.yang.gen.v1.urn.huawei.params.xml.ns.yang.l3vpn.rev140815.vpn.instances.VpnInstance;
48 import org.opendaylight.yang.gen.v1.urn.huawei.params.xml.ns.yang.l3vpn.rev140815.vpn.instances.VpnInstanceKey;
49 import org.opendaylight.yang.gen.v1.urn.huawei.params.xml.ns.yang.l3vpn.rev140815.vpn.interfaces.VpnInterface;
50 import org.opendaylight.yang.gen.v1.urn.huawei.params.xml.ns.yang.l3vpn.rev140815.vpn.interfaces.VpnInterfaceKey;
51 import org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.inet.types.rev130715.IpAddress;
52 import org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.inet.types.rev130715.Ipv6Address;
53 import org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.interfaces.rev140508.Interfaces;
54 import org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.interfaces.rev140508.interfaces.Interface;
55 import org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.interfaces.rev140508.interfaces.InterfaceKey;
56 import org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.yang.types.rev130715.MacAddress;
57 import org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.yang.types.rev130715.PhysAddress;
58 import org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.yang.types.rev130715.Uuid;
59 import org.opendaylight.yang.gen.v1.urn.opendaylight.genius.idmanager.rev160406.AllocateIdInput;
60 import org.opendaylight.yang.gen.v1.urn.opendaylight.genius.idmanager.rev160406.AllocateIdInputBuilder;
61 import org.opendaylight.yang.gen.v1.urn.opendaylight.genius.idmanager.rev160406.AllocateIdOutput;
62 import org.opendaylight.yang.gen.v1.urn.opendaylight.genius.idmanager.rev160406.IdManagerService;
63 import org.opendaylight.yang.gen.v1.urn.opendaylight.genius.idmanager.rev160406.ReleaseIdInput;
64 import org.opendaylight.yang.gen.v1.urn.opendaylight.genius.idmanager.rev160406.ReleaseIdInputBuilder;
65 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.aclservice.rev160608.InterfaceAclBuilder;
66 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.aclservice.rev160608.IpPrefixOrAddress;
67 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.aclservice.rev160608.PortsSubnetIpPrefixes;
68 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.aclservice.rev160608.interfaces._interface.AllowedAddressPairs;
69 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.aclservice.rev160608.interfaces._interface.AllowedAddressPairsBuilder;
70 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.aclservice.rev160608.ports.subnet.ip.prefixes.PortSubnetIpPrefixes;
71 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.aclservice.rev160608.ports.subnet.ip.prefixes.PortSubnetIpPrefixesBuilder;
72 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.aclservice.rev160608.ports.subnet.ip.prefixes.PortSubnetIpPrefixesKey;
73 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.elan.rev150602.SegmentTypeBase;
74 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.elan.rev150602.SegmentTypeFlat;
75 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.elan.rev150602.SegmentTypeGre;
76 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.elan.rev150602.SegmentTypeVlan;
77 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.elan.rev150602.SegmentTypeVxlan;
78 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.elan.rev150602.elan.interfaces.elan._interface.StaticMacEntries;
79 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.elan.rev150602.elan.interfaces.elan._interface.StaticMacEntriesBuilder;
80 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.LearntVpnVipToPortData;
81 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.NeutronRouterDpns;
82 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.VpnInstanceOpData;
83 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.VpnInstanceToVpnId;
84 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.learnt.vpn.vip.to.port.data.LearntVpnVipToPort;
85 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.learnt.vpn.vip.to.port.data.LearntVpnVipToPortKey;
86 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.neutron.router.dpns.RouterDpnList;
87 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.neutron.router.dpns.RouterDpnListKey;
88 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.neutron.router.dpns.router.dpn.list.DpnVpninterfacesList;
89 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.vpn.instance.op.data.VpnInstanceOpDataEntry;
90 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.vpn.instance.op.data.VpnInstanceOpDataEntryBuilder;
91 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.vpn.instance.op.data.VpnInstanceOpDataEntryKey;
92 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.natservice.rev160111.ExtRouters;
93 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.natservice.rev160111.ExternalSubnets;
94 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.natservice.rev160111.FloatingIpPortInfo;
95 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.natservice.rev160111.ProviderTypes;
96 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.natservice.rev160111.ext.routers.RoutersKey;
97 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.natservice.rev160111.external.subnets.SubnetsKey;
98 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.natservice.rev160111.floating.ip.port.info.FloatingIpIdToPortMapping;
99 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.natservice.rev160111.floating.ip.port.info.FloatingIpIdToPortMappingKey;
100 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.neutronvpn.rev150602.NetworkMaps;
101 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.neutronvpn.rev150602.NeutronVpnPortipPortData;
102 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.neutronvpn.rev150602.Subnetmaps;
103 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.neutronvpn.rev150602.VpnMaps;
104 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.neutronvpn.rev150602.networkmaps.NetworkMap;
105 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.neutronvpn.rev150602.networkmaps.NetworkMapKey;
106 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.neutronvpn.rev150602.neutron.vpn.portip.port.data.VpnPortipToPort;
107 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.neutronvpn.rev150602.neutron.vpn.portip.port.data.VpnPortipToPortBuilder;
108 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.neutronvpn.rev150602.neutron.vpn.portip.port.data.VpnPortipToPortKey;
109 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.neutronvpn.rev150602.subnetmaps.Subnetmap;
110 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.neutronvpn.rev150602.subnetmaps.SubnetmapKey;
111 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.neutronvpn.rev150602.vpnmaps.VpnMap;
112 import org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.neutronvpn.rev150602.vpnmaps.VpnMapKey;
113 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.l3.ext.rev150712.NetworkL3Extension;
114 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.l3.rev150712.routers.attributes.Routers;
115 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.l3.rev150712.routers.attributes.routers.Router;
116 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.l3.rev150712.routers.attributes.routers.RouterKey;
117 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.networks.rev150712.NetworkTypeBase;
118 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.networks.rev150712.NetworkTypeFlat;
119 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.networks.rev150712.NetworkTypeGre;
120 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.networks.rev150712.NetworkTypeVlan;
121 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.networks.rev150712.NetworkTypeVxlan;
122 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.networks.rev150712.networks.attributes.Networks;
123 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.networks.rev150712.networks.attributes.networks.Network;
124 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.networks.rev150712.networks.attributes.networks.NetworkKey;
125 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.port.attributes.FixedIps;
126 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.ports.attributes.Ports;
127 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.ports.attributes.ports.Port;
128 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.ports.attributes.ports.PortKey;
129 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.portsecurity.rev150712.PortSecurityExtension;
130 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.provider.ext.rev150712.NetworkProviderExtension;
131 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.qos.rev160613.qos.attributes.qos.policies.QosPolicy;
132 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.rev150712.Neutron;
133 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.subnets.rev150712.subnets.attributes.Subnets;
134 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.subnets.rev150712.subnets.attributes.subnets.Subnet;
135 import org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.subnets.rev150712.subnets.attributes.subnets.SubnetKey;
136 import org.opendaylight.yang.gen.v1.urn.opendaylight.params.xml.ns.yang.netvirt.inter.vpn.link.rev160311.InterVpnLinkStates;
137 import org.opendaylight.yang.gen.v1.urn.opendaylight.params.xml.ns.yang.netvirt.inter.vpn.link.rev160311.InterVpnLinks;
138 import org.opendaylight.yang.gen.v1.urn.opendaylight.params.xml.ns.yang.netvirt.inter.vpn.link.rev160311.inter.vpn.link.states.InterVpnLinkState;
139 import org.opendaylight.yang.gen.v1.urn.opendaylight.params.xml.ns.yang.netvirt.inter.vpn.link.rev160311.inter.vpn.link.states.InterVpnLinkStateKey;
140 import org.opendaylight.yang.gen.v1.urn.opendaylight.params.xml.ns.yang.netvirt.inter.vpn.link.rev160311.inter.vpn.links.InterVpnLink;
141 import org.opendaylight.yangtools.yang.binding.DataObject;
142 import org.opendaylight.yangtools.yang.binding.InstanceIdentifier;
143 import org.opendaylight.yangtools.yang.common.RpcResult;
144 import org.slf4j.Logger;
145 import org.slf4j.LoggerFactory;
148 public class NeutronvpnUtils {
150 private static final Logger LOG = LoggerFactory.getLogger(NeutronvpnUtils.class);
151 private static final ImmutableBiMap<Class<? extends NetworkTypeBase>, Class<? extends SegmentTypeBase>>
153 new ImmutableBiMap.Builder<Class<? extends NetworkTypeBase>, Class<? extends SegmentTypeBase>>()
154 .put(NetworkTypeFlat.class, SegmentTypeFlat.class)
155 .put(NetworkTypeGre.class, SegmentTypeGre.class)
156 .put(NetworkTypeVlan.class, SegmentTypeVlan.class)
157 .put(NetworkTypeVxlan.class, SegmentTypeVxlan.class)
160 private static final Set<Class<? extends NetworkTypeBase>> SUPPORTED_NETWORK_TYPES = new HashSet<>();
163 SUPPORTED_NETWORK_TYPES.add(NetworkTypeFlat.class);
164 SUPPORTED_NETWORK_TYPES.add(NetworkTypeVlan.class);
165 SUPPORTED_NETWORK_TYPES.add(NetworkTypeVxlan.class);
166 SUPPORTED_NETWORK_TYPES.add(NetworkTypeGre.class);
169 private final ConcurrentMap<Uuid, Network> networkMap = new ConcurrentHashMap<>();
170 private final ConcurrentMap<Uuid, Router> routerMap = new ConcurrentHashMap<>();
171 private final ConcurrentMap<Uuid, Port> portMap = new ConcurrentHashMap<>();
172 private final ConcurrentMap<Uuid, Subnet> subnetMap = new ConcurrentHashMap<>();
173 private final Map<IpAddress, Set<Uuid>> subnetGwIpMap = new ConcurrentHashMap<>();
174 private final ConcurrentMap<Uuid, QosPolicy> qosPolicyMap = new ConcurrentHashMap<>();
175 private final ConcurrentMap<Uuid, HashMap<Uuid, Port>> qosPortsMap = new ConcurrentHashMap<>();
176 private final ConcurrentMap<Uuid, HashMap<Uuid, Network>> qosNetworksMap = new ConcurrentHashMap<>();
178 private final DataBroker dataBroker;
179 private final IdManagerService idManager;
180 private final JobCoordinator jobCoordinator;
181 private IPV6InternetDefaultRouteProgrammer ipV6InternetDefRt;
184 public NeutronvpnUtils(final DataBroker dataBroker, final IdManagerService idManager,
185 final JobCoordinator jobCoordinator, final IPV6InternetDefaultRouteProgrammer ipV6InternetDefRt) {
186 this.dataBroker = dataBroker;
187 this.idManager = idManager;
188 this.jobCoordinator = jobCoordinator;
189 this.ipV6InternetDefRt = ipV6InternetDefRt;
192 protected Subnetmap getSubnetmap(Uuid subnetId) {
193 InstanceIdentifier<Subnetmap> id = buildSubnetMapIdentifier(subnetId);
194 Optional<Subnetmap> sn = read(LogicalDatastoreType.CONFIGURATION, id);
196 if (sn.isPresent()) {
199 LOG.error("getSubnetmap failed, subnet {} is not present", subnetId.getValue());
203 public VpnMap getVpnMap(Uuid id) {
204 InstanceIdentifier<VpnMap> vpnMapIdentifier = InstanceIdentifier.builder(VpnMaps.class).child(VpnMap.class,
205 new VpnMapKey(id)).build();
206 Optional<VpnMap> optionalVpnMap = read(LogicalDatastoreType.CONFIGURATION, vpnMapIdentifier);
207 if (optionalVpnMap.isPresent()) {
208 return optionalVpnMap.get();
210 LOG.error("getVpnMap failed, VPN {} not present", id.getValue());
214 protected Uuid getVpnForNetwork(Uuid network) {
215 InstanceIdentifier<VpnMaps> vpnMapsIdentifier = InstanceIdentifier.builder(VpnMaps.class).build();
216 Optional<VpnMaps> optionalVpnMaps = read(LogicalDatastoreType.CONFIGURATION, vpnMapsIdentifier);
217 if (optionalVpnMaps.isPresent() && optionalVpnMaps.get().getVpnMap() != null) {
218 List<VpnMap> allMaps = optionalVpnMaps.get().getVpnMap();
219 for (VpnMap vpnMap : allMaps) {
220 List<Uuid> netIds = vpnMap.getNetworkIds();
221 if (netIds != null && netIds.contains(network)) {
222 return vpnMap.getVpnId();
226 LOG.debug("getVpnForNetwork: Failed for network {} as no VPN present in VPNMaps DS", network.getValue());
230 protected Uuid getVpnForSubnet(Uuid subnetId) {
231 InstanceIdentifier<Subnetmap> subnetmapIdentifier = buildSubnetMapIdentifier(subnetId);
232 Optional<Subnetmap> optionalSubnetMap = read(LogicalDatastoreType.CONFIGURATION,
233 subnetmapIdentifier);
234 if (optionalSubnetMap.isPresent()) {
235 return optionalSubnetMap.get().getVpnId();
237 LOG.error("getVpnForSubnet: Failed as subnetMap DS is absent for subnet {}", subnetId.getValue());
241 protected Uuid getNetworkForSubnet(Uuid subnetId) {
242 InstanceIdentifier<Subnetmap> subnetmapIdentifier = buildSubnetMapIdentifier(subnetId);
243 Optional<Subnetmap> optionalSubnetMap = read(LogicalDatastoreType.CONFIGURATION,
244 subnetmapIdentifier);
245 if (optionalSubnetMap.isPresent()) {
246 return optionalSubnetMap.get().getNetworkId();
248 LOG.error("getNetworkForSubnet: Failed as subnetMap DS is absent for subnet {}", subnetId.getValue());
252 // @param external vpn - true if external vpn being fetched, false for internal vpn
253 protected Uuid getVpnForRouter(Uuid routerId, Boolean externalVpn) {
254 if (routerId == null) {
258 InstanceIdentifier<VpnMaps> vpnMapsIdentifier = InstanceIdentifier.builder(VpnMaps.class).build();
259 Optional<VpnMaps> optionalVpnMaps = read(LogicalDatastoreType.CONFIGURATION, vpnMapsIdentifier);
260 if (optionalVpnMaps.isPresent() && optionalVpnMaps.get().getVpnMap() != null) {
261 List<VpnMap> allMaps = optionalVpnMaps.get().getVpnMap();
262 for (VpnMap vpnMap : allMaps) {
263 if (routerId.equals(vpnMap.getRouterId())) {
265 if (!routerId.equals(vpnMap.getVpnId())) {
266 return vpnMap.getVpnId();
269 if (routerId.equals(vpnMap.getVpnId())) {
270 return vpnMap.getVpnId();
276 LOG.debug("getVpnForRouter: Failed for router {} as no VPN present in VPNMaps DS", routerId.getValue());
280 protected Uuid getRouterforVpn(Uuid vpnId) {
281 InstanceIdentifier<VpnMap> vpnMapIdentifier = InstanceIdentifier.builder(VpnMaps.class).child(VpnMap.class,
282 new VpnMapKey(vpnId)).build();
283 Optional<VpnMap> optionalVpnMap = read(LogicalDatastoreType.CONFIGURATION, vpnMapIdentifier);
284 if (optionalVpnMap.isPresent()) {
285 VpnMap vpnMap = optionalVpnMap.get();
286 return vpnMap.getRouterId();
288 LOG.error("getRouterforVpn: Failed as VPNMaps DS is absent for VPN {}", vpnId.getValue());
292 protected List<Uuid> getNetworksForVpn(Uuid vpnId) {
293 InstanceIdentifier<VpnMap> vpnMapIdentifier = InstanceIdentifier.builder(VpnMaps.class).child(VpnMap.class,
294 new VpnMapKey(vpnId)).build();
295 Optional<VpnMap> optionalVpnMap = read(LogicalDatastoreType.CONFIGURATION, vpnMapIdentifier);
296 if (optionalVpnMap.isPresent()) {
297 VpnMap vpnMap = optionalVpnMap.get();
298 return vpnMap.getNetworkIds();
300 LOG.error("getNetworksforVpn: Failed as VPNMaps DS is absent for VPN {}", vpnId.getValue());
304 protected List<Uuid> getSubnetsforVpn(Uuid vpnid) {
305 List<Uuid> subnets = new ArrayList<>();
307 InstanceIdentifier<Subnetmaps> subnetmapsid = InstanceIdentifier.builder(Subnetmaps.class).build();
308 Optional<Subnetmaps> subnetmaps = read(LogicalDatastoreType.CONFIGURATION, subnetmapsid);
309 if (subnetmaps.isPresent() && subnetmaps.get().getSubnetmap() != null) {
310 List<Subnetmap> subnetMapList = subnetmaps.get().getSubnetmap();
311 for (Subnetmap candidateSubnetMap : subnetMapList) {
312 if (candidateSubnetMap.getVpnId() != null && candidateSubnetMap.getVpnId().equals(vpnid)) {
313 subnets.add(candidateSubnetMap.getId());
320 protected String getNeutronPortNameFromVpnPortFixedIp(String vpnName, String fixedIp) {
321 InstanceIdentifier<VpnPortipToPort> id = buildVpnPortipToPortIdentifier(vpnName, fixedIp);
322 Optional<VpnPortipToPort> vpnPortipToPortData = read(LogicalDatastoreType.CONFIGURATION, id);
323 if (vpnPortipToPortData.isPresent()) {
324 return vpnPortipToPortData.get().getPortName();
326 LOG.error("getNeutronPortNameFromVpnPortFixedIp: Failed as vpnPortipToPortData DS is absent for VPN {} and"
327 + " fixed IP {}", vpnName, fixedIp);
331 protected List<Uuid> getSubnetIdsFromNetworkId(Uuid networkId) {
332 InstanceIdentifier<NetworkMap> id = buildNetworkMapIdentifier(networkId);
333 Optional<NetworkMap> optionalNetworkMap = read(LogicalDatastoreType.CONFIGURATION, id);
334 if (optionalNetworkMap.isPresent()) {
335 return optionalNetworkMap.get().getSubnetIdList();
337 LOG.error("getSubnetIdsFromNetworkId: Failed as networkmap DS is absent for network {}", networkId.getValue());
341 protected List<Uuid> getPortIdsFromSubnetId(Uuid subnetId) {
342 InstanceIdentifier<Subnetmap> id = buildSubnetMapIdentifier(subnetId);
343 Optional<Subnetmap> optionalSubnetmap = read(LogicalDatastoreType.CONFIGURATION, id);
344 if (optionalSubnetmap.isPresent()) {
345 return optionalSubnetmap.get().getPortList();
350 protected Router getNeutronRouter(Uuid routerId) {
351 Router router = routerMap.get(routerId);
352 if (router != null) {
355 InstanceIdentifier<Router> inst = InstanceIdentifier.create(Neutron.class).child(Routers.class).child(Router
356 .class, new RouterKey(routerId));
357 Optional<Router> rtr = read(LogicalDatastoreType.CONFIGURATION, inst);
358 if (rtr.isPresent()) {
364 protected Network getNeutronNetwork(Uuid networkId) {
365 Network network = null;
366 network = networkMap.get(networkId);
367 if (network != null) {
370 LOG.debug("getNeutronNetwork for {}", networkId.getValue());
371 InstanceIdentifier<Network> inst = InstanceIdentifier.create(Neutron.class).child(Networks.class)
372 .child(Network.class, new NetworkKey(networkId));
373 Optional<Network> net = read(LogicalDatastoreType.CONFIGURATION, inst);
374 if (net.isPresent()) {
380 protected Port getNeutronPort(Uuid portId) {
381 Port prt = portMap.get(portId);
385 LOG.debug("getNeutronPort for {}", portId.getValue());
386 InstanceIdentifier<Port> inst = InstanceIdentifier.create(Neutron.class).child(Ports.class).child(Port.class,
387 new PortKey(portId));
388 Optional<Port> port = read(LogicalDatastoreType.CONFIGURATION, inst);
389 if (port.isPresent()) {
396 * Returns port_security_enabled status with the port.
398 * @param port the port
399 * @return port_security_enabled status
401 protected static boolean getPortSecurityEnabled(Port port) {
402 String deviceOwner = port.getDeviceOwner();
403 if (deviceOwner != null && deviceOwner.startsWith("network:")) {
404 // port with device owner of network:xxx is created by
405 // neutorn for its internal use. So security group doesn't apply.
406 // router interface, dhcp port and floating ip.
409 PortSecurityExtension portSecurity = port.getAugmentation(PortSecurityExtension.class);
410 if (portSecurity != null) {
411 return portSecurity.isPortSecurityEnabled();
417 * Gets security group UUIDs delta .
419 * @param port1SecurityGroups the port 1 security groups
420 * @param port2SecurityGroups the port 2 security groups
421 * @return the security groups delta
423 protected static List<Uuid> getSecurityGroupsDelta(List<Uuid> port1SecurityGroups,
424 List<Uuid> port2SecurityGroups) {
425 if (port1SecurityGroups == null) {
429 if (port2SecurityGroups == null) {
430 return port1SecurityGroups;
433 List<Uuid> list1 = new ArrayList<>(port1SecurityGroups);
434 List<Uuid> list2 = new ArrayList<>(port2SecurityGroups);
435 for (Iterator<Uuid> iterator = list1.iterator(); iterator.hasNext();) {
436 Uuid securityGroup1 = iterator.next();
437 for (Uuid securityGroup2 : list2) {
438 if (securityGroup1.getValue().equals(securityGroup2.getValue())) {
448 * Gets the fixed ips delta.
450 * @param port1FixedIps the port 1 fixed ips
451 * @param port2FixedIps the port 2 fixed ips
452 * @return the fixed ips delta
454 protected static List<FixedIps> getFixedIpsDelta(List<FixedIps> port1FixedIps, List<FixedIps> port2FixedIps) {
455 if (port1FixedIps == null) {
459 if (port2FixedIps == null) {
460 return port1FixedIps;
463 List<FixedIps> list1 = new ArrayList<>(port1FixedIps);
464 List<FixedIps> list2 = new ArrayList<>(port2FixedIps);
465 for (Iterator<FixedIps> iterator = list1.iterator(); iterator.hasNext();) {
466 FixedIps fixedIps1 = iterator.next();
467 for (FixedIps fixedIps2 : list2) {
468 if (fixedIps1.getIpAddress().equals(fixedIps2.getIpAddress())) {
478 * Gets the allowed address pairs delta.
480 * @param port1AllowedAddressPairs the port 1 allowed address pairs
481 * @param port2AllowedAddressPairs the port 2 allowed address pairs
482 * @return the allowed address pairs delta
484 protected static List<AllowedAddressPairs> getAllowedAddressPairsDelta(
485 List<org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.port.attributes
486 .AllowedAddressPairs> port1AllowedAddressPairs,
487 List<org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.port.attributes
488 .AllowedAddressPairs> port2AllowedAddressPairs) {
489 if (port1AllowedAddressPairs == null) {
493 if (port2AllowedAddressPairs == null) {
494 return getAllowedAddressPairsForAclService(port1AllowedAddressPairs);
497 List<org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.port.attributes
498 .AllowedAddressPairs> list1 =
499 new ArrayList<>(port1AllowedAddressPairs);
500 List<org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.port.attributes
501 .AllowedAddressPairs> list2 =
502 new ArrayList<>(port2AllowedAddressPairs);
503 for (Iterator<org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.port.attributes
504 .AllowedAddressPairs> iterator =
505 list1.iterator(); iterator.hasNext();) {
506 org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.port.attributes
507 .AllowedAddressPairs allowedAddressPair1 = iterator.next();
508 for (org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.port.attributes
509 .AllowedAddressPairs allowedAddressPair2 : list2) {
510 if (allowedAddressPair1.getKey().equals(allowedAddressPair2.getKey())) {
516 return getAllowedAddressPairsForAclService(list1);
520 * Gets the acl allowed address pairs.
522 * @param macAddress the mac address
523 * @param ipAddress the ip address
524 * @return the acl allowed address pairs
526 protected static AllowedAddressPairs getAclAllowedAddressPairs(MacAddress macAddress,
527 org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.types.rev160517.IpPrefixOrAddress ipAddress) {
528 AllowedAddressPairsBuilder aclAllowedAdressPairBuilder = new AllowedAddressPairsBuilder();
529 aclAllowedAdressPairBuilder.setMacAddress(macAddress);
530 if (ipAddress != null && ipAddress.getValue() != null) {
531 if (ipAddress.getIpPrefix() != null) {
532 aclAllowedAdressPairBuilder.setIpAddress(new IpPrefixOrAddress(ipAddress.getIpPrefix()));
534 aclAllowedAdressPairBuilder.setIpAddress(new IpPrefixOrAddress(ipAddress.getIpAddress()));
537 return aclAllowedAdressPairBuilder.build();
541 * Gets the allowed address pairs for acl service.
543 * @param macAddress the mac address
544 * @param fixedIps the fixed ips
545 * @return the allowed address pairs for acl service
547 protected static List<AllowedAddressPairs> getAllowedAddressPairsForAclService(MacAddress macAddress,
548 List<FixedIps> fixedIps) {
549 List<AllowedAddressPairs> aclAllowedAddressPairs = new ArrayList<>();
550 for (FixedIps fixedIp : fixedIps) {
551 aclAllowedAddressPairs.add(getAclAllowedAddressPairs(macAddress,
552 new org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.types.rev160517.IpPrefixOrAddress(
553 fixedIp.getIpAddress().getValue())));
555 return aclAllowedAddressPairs;
559 * Gets the allowed address pairs for acl service.
561 * @param portAllowedAddressPairs the port allowed address pairs
562 * @return the allowed address pairs for acl service
564 protected static List<AllowedAddressPairs> getAllowedAddressPairsForAclService(
565 List<org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.port.attributes
566 .AllowedAddressPairs> portAllowedAddressPairs) {
567 List<AllowedAddressPairs> aclAllowedAddressPairs = new ArrayList<>();
568 for (org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.port.attributes.AllowedAddressPairs
569 portAllowedAddressPair : portAllowedAddressPairs) {
570 aclAllowedAddressPairs.add(getAclAllowedAddressPairs(portAllowedAddressPair.getMacAddress(),
571 portAllowedAddressPair.getIpAddress()));
573 return aclAllowedAddressPairs;
577 * Gets the IPv6 Link Local Address corresponding to the MAC Address.
579 * @param macAddress the mac address
580 * @return the allowed address pairs for acl service which includes the MAC + IPv6LLA
582 protected static AllowedAddressPairs updateIPv6LinkLocalAddressForAclService(MacAddress macAddress) {
583 IpAddress ipv6LinkLocalAddress = getIpv6LinkLocalAddressFromMac(macAddress);
584 return getAclAllowedAddressPairs(macAddress,
585 new org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.types.rev160517.IpPrefixOrAddress(
586 ipv6LinkLocalAddress.getValue()));
590 * Gets the updated security groups.
592 * @param aclInterfaceSecurityGroups the acl interface security groups
593 * @param origSecurityGroups the orig security groups
594 * @param newSecurityGroups the new security groups
595 * @return the updated security groups
597 protected static List<Uuid> getUpdatedSecurityGroups(List<Uuid> aclInterfaceSecurityGroups,
598 List<Uuid> origSecurityGroups, List<Uuid> newSecurityGroups) {
599 List<Uuid> addedGroups = getSecurityGroupsDelta(newSecurityGroups, origSecurityGroups);
600 List<Uuid> deletedGroups = getSecurityGroupsDelta(origSecurityGroups, newSecurityGroups);
601 List<Uuid> updatedSecurityGroups =
602 aclInterfaceSecurityGroups != null ? new ArrayList<>(aclInterfaceSecurityGroups) : new ArrayList<>();
603 if (addedGroups != null) {
604 updatedSecurityGroups.addAll(addedGroups);
606 if (deletedGroups != null) {
607 updatedSecurityGroups.removeAll(deletedGroups);
609 return updatedSecurityGroups;
613 * Gets the allowed address pairs for fixed ips.
615 * @param aclInterfaceAllowedAddressPairs the acl interface allowed address pairs
616 * @param portMacAddress the port mac address
617 * @param origFixedIps the orig fixed ips
618 * @param newFixedIps the new fixed ips
619 * @return the allowed address pairs for fixed ips
621 protected static List<AllowedAddressPairs> getAllowedAddressPairsForFixedIps(
622 List<AllowedAddressPairs> aclInterfaceAllowedAddressPairs, MacAddress portMacAddress,
623 List<FixedIps> origFixedIps, List<FixedIps> newFixedIps) {
624 List<FixedIps> addedFixedIps = getFixedIpsDelta(newFixedIps, origFixedIps);
625 List<FixedIps> deletedFixedIps = getFixedIpsDelta(origFixedIps, newFixedIps);
626 List<AllowedAddressPairs> updatedAllowedAddressPairs =
627 aclInterfaceAllowedAddressPairs != null
628 ? new ArrayList<>(aclInterfaceAllowedAddressPairs) : new ArrayList<>();
629 if (deletedFixedIps != null) {
630 updatedAllowedAddressPairs.removeAll(getAllowedAddressPairsForAclService(portMacAddress, deletedFixedIps));
632 if (addedFixedIps != null) {
633 updatedAllowedAddressPairs.addAll(getAllowedAddressPairsForAclService(portMacAddress, addedFixedIps));
635 return updatedAllowedAddressPairs;
639 * Gets the updated allowed address pairs.
641 * @param aclInterfaceAllowedAddressPairs the acl interface allowed address pairs
642 * @param origAllowedAddressPairs the orig allowed address pairs
643 * @param newAllowedAddressPairs the new allowed address pairs
644 * @return the updated allowed address pairs
646 protected static List<AllowedAddressPairs> getUpdatedAllowedAddressPairs(
647 List<AllowedAddressPairs> aclInterfaceAllowedAddressPairs,
648 List<org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.port.attributes
649 .AllowedAddressPairs> origAllowedAddressPairs,
650 List<org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.port.attributes
651 .AllowedAddressPairs> newAllowedAddressPairs) {
652 List<AllowedAddressPairs> addedAllowedAddressPairs =
653 getAllowedAddressPairsDelta(newAllowedAddressPairs,origAllowedAddressPairs);
654 List<AllowedAddressPairs> deletedAllowedAddressPairs =
655 getAllowedAddressPairsDelta(origAllowedAddressPairs, newAllowedAddressPairs);
656 List<AllowedAddressPairs> updatedAllowedAddressPairs =
657 aclInterfaceAllowedAddressPairs != null
658 ? new ArrayList<>(aclInterfaceAllowedAddressPairs) : new ArrayList<>();
659 if (addedAllowedAddressPairs != null) {
660 updatedAllowedAddressPairs.addAll(addedAllowedAddressPairs);
662 if (deletedAllowedAddressPairs != null) {
663 updatedAllowedAddressPairs.removeAll(deletedAllowedAddressPairs);
665 return updatedAllowedAddressPairs;
669 * Populate interface acl builder.
671 * @param interfaceAclBuilder the interface acl builder
672 * @param port the port
674 protected static void populateInterfaceAclBuilder(InterfaceAclBuilder interfaceAclBuilder, Port port) {
675 // Handle security group enabled
676 List<Uuid> securityGroups = port.getSecurityGroups();
677 if (securityGroups != null) {
678 interfaceAclBuilder.setSecurityGroups(securityGroups);
680 List<AllowedAddressPairs> aclAllowedAddressPairs = NeutronvpnUtils.getAllowedAddressPairsForAclService(
681 port.getMacAddress(), port.getFixedIps());
682 // Update the allowed address pair with the IPv6 LLA that is auto configured on the port.
683 aclAllowedAddressPairs.add(NeutronvpnUtils.updateIPv6LinkLocalAddressForAclService(port.getMacAddress()));
684 List<org.opendaylight.yang.gen.v1.urn.opendaylight.neutron.ports.rev150712.port.attributes.AllowedAddressPairs>
685 portAllowedAddressPairs = port.getAllowedAddressPairs();
686 if (portAllowedAddressPairs != null) {
687 aclAllowedAddressPairs.addAll(NeutronvpnUtils.getAllowedAddressPairsForAclService(portAllowedAddressPairs));
689 interfaceAclBuilder.setAllowedAddressPairs(aclAllowedAddressPairs);
692 protected void populateSubnetIpPrefixes(Port port) {
693 List<IpPrefixOrAddress> subnetIpPrefixes = getSubnetIpPrefixes(port);
694 if (subnetIpPrefixes != null) {
695 String portId = port.getUuid().getValue();
696 InstanceIdentifier<PortSubnetIpPrefixes> portSubnetIpPrefixIdentifier =
697 NeutronvpnUtils.buildPortSubnetIpPrefixIdentifier(portId);
698 PortSubnetIpPrefixesBuilder subnetIpPrefixesBuilder = new PortSubnetIpPrefixesBuilder()
699 .setKey(new PortSubnetIpPrefixesKey(portId)).setPortId(portId)
700 .setSubnetIpPrefixes(subnetIpPrefixes);
701 MDSALUtil.syncWrite(dataBroker, LogicalDatastoreType.OPERATIONAL, portSubnetIpPrefixIdentifier,
702 subnetIpPrefixesBuilder.build());
703 LOG.debug("Created Subnet IP Prefixes for port {}", port.getUuid().getValue());
707 protected List<IpPrefixOrAddress> getSubnetIpPrefixes(Port port) {
708 List<Uuid> subnetIds = getSubnetIdsFromNetworkId(port.getNetworkId());
709 if (subnetIds == null) {
710 LOG.error("Failed to get Subnet Ids for the Network {}", port.getNetworkId());
713 List<IpPrefixOrAddress> subnetIpPrefixes = new ArrayList<>();
714 for (Uuid subnetId : subnetIds) {
715 Subnet subnet = getNeutronSubnet(subnetId);
716 if (subnet != null) {
717 subnetIpPrefixes.add(new IpPrefixOrAddress(subnet.getCidr()));
720 return subnetIpPrefixes;
723 protected Subnet getNeutronSubnet(Uuid subnetId) {
724 Subnet subnet = subnetMap.get(subnetId);
725 if (subnet != null) {
728 InstanceIdentifier<Subnet> inst = InstanceIdentifier.create(Neutron.class).child(Subnets.class).child(Subnet
729 .class, new SubnetKey(subnetId));
730 Optional<Subnet> sn = read(LogicalDatastoreType.CONFIGURATION, inst);
732 if (sn.isPresent()) {
739 protected List<Uuid> getNeutronRouterSubnetIds(Uuid routerId) {
740 LOG.debug("getNeutronRouterSubnetIds for {}", routerId.getValue());
741 List<Uuid> subnetIdList = new ArrayList<>();
742 Optional<Subnetmaps> subnetMaps = read(LogicalDatastoreType.CONFIGURATION,
743 InstanceIdentifier.builder(Subnetmaps.class).build());
744 if (subnetMaps.isPresent() && subnetMaps.get().getSubnetmap() != null) {
745 for (Subnetmap subnetmap : subnetMaps.get().getSubnetmap()) {
746 if (routerId.equals(subnetmap.getRouterId())) {
747 subnetIdList.add(subnetmap.getId());
751 LOG.debug("getNeutronRouterSubnetIds returns {}", subnetIdList);
755 // TODO Clean up the exception handling and the console output
756 @SuppressWarnings({"checkstyle:IllegalCatch", "checkstyle:RegexpSinglelineJava"})
757 protected Short getIPPrefixFromPort(Port port) {
759 Uuid subnetUUID = port.getFixedIps().get(0).getSubnetId();
760 SubnetKey subnetkey = new SubnetKey(subnetUUID);
761 InstanceIdentifier<Subnet> subnetidentifier = InstanceIdentifier.create(Neutron.class).child(Subnets
762 .class).child(Subnet.class, subnetkey);
763 Optional<Subnet> subnet = read(LogicalDatastoreType.CONFIGURATION, subnetidentifier);
764 if (subnet.isPresent()) {
765 String cidr = String.valueOf(subnet.get().getCidr().getValue());
766 // Extract the prefix length from cidr
767 String[] parts = cidr.split("/");
768 if (parts.length == 2) {
769 return Short.valueOf(parts[1]);
771 LOG.trace("Could not retrieve prefix from subnet CIDR");
774 LOG.trace("Unable to read on subnet datastore");
776 } catch (Exception e) {
777 LOG.error("Failed to retrieve IP prefix from port for port {}", port.getUuid().getValue(), e);
779 LOG.error("Failed for port {}", port.getUuid().getValue());
783 // TODO Clean up the exception handling
784 @SuppressWarnings("checkstyle:IllegalCatch")
785 protected void createVpnPortFixedIpToPort(String vpnName, String fixedIp, String portName, String macAddress,
786 boolean isSubnetIp, WriteTransaction writeConfigTxn) {
787 InstanceIdentifier<VpnPortipToPort> id = NeutronvpnUtils.buildVpnPortipToPortIdentifier(vpnName, fixedIp);
788 VpnPortipToPortBuilder builder = new VpnPortipToPortBuilder()
789 .setKey(new VpnPortipToPortKey(fixedIp, vpnName))
790 .setVpnName(vpnName).setPortFixedip(fixedIp)
791 .setPortName(portName).setMacAddress(macAddress).setSubnetIp(isSubnetIp);
793 if (writeConfigTxn != null) {
794 writeConfigTxn.put(LogicalDatastoreType.CONFIGURATION, id, builder.build());
796 MDSALUtil.syncWrite(dataBroker, LogicalDatastoreType.CONFIGURATION, id, builder.build());
798 LOG.trace("Neutron port with fixedIp: {}, vpn {}, interface {}, mac {}, isSubnetIp {} added to "
799 + "VpnPortipToPort DS", fixedIp, vpnName, portName, macAddress, isSubnetIp);
800 } catch (Exception e) {
801 LOG.error("Failure while creating VPNPortFixedIpToPort map for vpn {} - fixedIP {}", vpnName, fixedIp,
806 // TODO Clean up the exception handling
807 @SuppressWarnings("checkstyle:IllegalCatch")
808 protected void removeVpnPortFixedIpToPort(String vpnName, String fixedIp, WriteTransaction writeConfigTxn) {
809 InstanceIdentifier<VpnPortipToPort> id = NeutronvpnUtils.buildVpnPortipToPortIdentifier(vpnName, fixedIp);
811 if (writeConfigTxn != null) {
812 writeConfigTxn.delete(LogicalDatastoreType.CONFIGURATION, id);
814 MDSALUtil.syncDelete(dataBroker, LogicalDatastoreType.CONFIGURATION, id);
816 LOG.trace("Neutron router port with fixedIp: {}, vpn {} removed from LearntVpnPortipToPort DS", fixedIp,
818 } catch (Exception e) {
819 LOG.error("Failure while removing VPNPortFixedIpToPort map for vpn {} - fixedIP {}", vpnName, fixedIp,
824 // TODO Clean up the exception handling
825 @SuppressWarnings("checkstyle:IllegalCatch")
826 protected void removeLearntVpnVipToPort(String vpnName, String fixedIp) {
827 InstanceIdentifier<LearntVpnVipToPort> id = NeutronvpnUtils.buildLearntVpnVipToPortIdentifier(vpnName, fixedIp);
829 synchronized ((vpnName + fixedIp).intern()) {
830 MDSALUtil.syncDelete(dataBroker, LogicalDatastoreType.OPERATIONAL, id);
832 LOG.trace("Neutron router port with fixedIp: {}, vpn {} removed from LearntVpnPortipToPort DS", fixedIp,
834 } catch (Exception e) {
835 LOG.error("Failure while removing LearntVpnPortFixedIpToPort map for vpn {} - fixedIP {}",
836 vpnName, fixedIp, e);
840 public void addToNetworkCache(Network network) {
841 networkMap.put(network.getUuid(), network);
844 public void removeFromNetworkCache(Network network) {
845 networkMap.remove(network.getUuid());
848 public void addToRouterCache(Router router) {
849 routerMap.put(router.getUuid(), router);
852 public void removeFromRouterCache(Router router) {
853 routerMap.remove(router.getUuid());
856 public Collection<Router> getAllRouters() {
857 return routerMap.values();
860 public void addToPortCache(Port port) {
861 portMap.put(port.getUuid(), port);
864 public void removeFromPortCache(Port port) {
865 portMap.remove(port.getUuid());
868 public void addToSubnetCache(Subnet subnet) {
869 subnetMap.put(subnet.getUuid(), subnet);
870 IpAddress gatewayIp = subnet.getGatewayIp();
871 if (gatewayIp != null) {
872 subnetGwIpMap.computeIfAbsent(gatewayIp, k -> Sets.newConcurrentHashSet()).add(subnet.getUuid());
876 public void removeFromSubnetCache(Subnet subnet) {
877 subnetMap.remove(subnet.getUuid());
878 IpAddress gatewayIp = subnet.getGatewayIp();
879 if (gatewayIp != null) {
880 Set<Uuid> gwIps = subnetGwIpMap.get(gatewayIp);
882 gwIps.remove(subnet.getUuid());
887 public static String getSegmentationIdFromNeutronNetwork(Network network) {
888 String segmentationId = null;
889 NetworkProviderExtension providerExtension = network.getAugmentation(NetworkProviderExtension.class);
890 if (providerExtension != null) {
891 Class<? extends NetworkTypeBase> networkType = providerExtension.getNetworkType();
892 segmentationId = NeutronUtils.getSegmentationIdFromNeutronNetwork(network, networkType);
895 return segmentationId;
898 public static Class<? extends SegmentTypeBase> getSegmentTypeFromNeutronNetwork(Network network) {
899 NetworkProviderExtension providerExtension = network.getAugmentation(NetworkProviderExtension.class);
900 return providerExtension != null ? NETWORK_MAP.get(providerExtension.getNetworkType()) : null;
903 public static String getPhysicalNetworkName(Network network) {
904 NetworkProviderExtension providerExtension = network.getAugmentation(NetworkProviderExtension.class);
905 return providerExtension != null ? providerExtension.getPhysicalNetwork() : null;
908 public Collection<Uuid> getSubnetIdsForGatewayIp(IpAddress ipAddress) {
909 return subnetGwIpMap.getOrDefault(ipAddress, Collections.emptySet());
912 static InstanceIdentifier<VpnPortipToPort> buildVpnPortipToPortIdentifier(String vpnName, String fixedIp) {
913 InstanceIdentifier<VpnPortipToPort> id =
914 InstanceIdentifier.builder(NeutronVpnPortipPortData.class)
915 .child(VpnPortipToPort.class, new VpnPortipToPortKey(fixedIp, vpnName)).build();
919 static InstanceIdentifier<LearntVpnVipToPort> buildLearntVpnVipToPortIdentifier(String vpnName, String fixedIp) {
920 InstanceIdentifier<LearntVpnVipToPort> id =
921 InstanceIdentifier.builder(LearntVpnVipToPortData.class)
922 .child(LearntVpnVipToPort.class, new LearntVpnVipToPortKey(fixedIp, vpnName)).build();
926 static Boolean getIsExternal(Network network) {
927 return network.getAugmentation(NetworkL3Extension.class) != null
928 && network.getAugmentation(NetworkL3Extension.class).isExternal();
931 public void addToQosPolicyCache(QosPolicy qosPolicy) {
932 qosPolicyMap.put(qosPolicy.getUuid(),qosPolicy);
935 public void removeFromQosPolicyCache(QosPolicy qosPolicy) {
936 qosPolicyMap.remove(qosPolicy.getUuid());
939 public void addToQosPortsCache(Uuid qosUuid, Port port) {
940 if (qosPortsMap.containsKey(qosUuid)) {
941 if (!qosPortsMap.get(qosUuid).containsKey(port.getUuid())) {
942 qosPortsMap.get(qosUuid).put(port.getUuid(), port);
945 HashMap<Uuid, Port> newPortMap = new HashMap<>();
946 newPortMap.put(port.getUuid(), port);
947 qosPortsMap.put(qosUuid, newPortMap);
951 public void removeFromQosPortsCache(Uuid qosUuid, Port port) {
952 if (qosPortsMap.containsKey(qosUuid) && qosPortsMap.get(qosUuid).containsKey(port.getUuid())) {
953 qosPortsMap.get(qosUuid).remove(port.getUuid(), port);
957 public void addToQosNetworksCache(Uuid qosUuid, Network network) {
958 if (qosNetworksMap.containsKey(qosUuid)) {
959 if (!qosNetworksMap.get(qosUuid).containsKey(network.getUuid())) {
960 qosNetworksMap.get(qosUuid).put(network.getUuid(), network);
963 HashMap<Uuid, Network> newNetworkMap = new HashMap<>();
964 newNetworkMap.put(network.getUuid(), network);
965 qosNetworksMap.put(qosUuid, newNetworkMap);
969 public void removeFromQosNetworksCache(Uuid qosUuid, Network network) {
970 if (qosNetworksMap.containsKey(qosUuid) && qosNetworksMap.get(qosUuid).containsKey(network.getUuid())) {
971 qosNetworksMap.get(qosUuid).remove(network.getUuid(), network);
975 static InstanceIdentifier<NetworkMap> buildNetworkMapIdentifier(Uuid networkId) {
976 InstanceIdentifier<NetworkMap> id = InstanceIdentifier.builder(NetworkMaps.class).child(NetworkMap.class, new
977 NetworkMapKey(networkId)).build();
981 static InstanceIdentifier<VpnInterface> buildVpnInterfaceIdentifier(String ifName) {
982 InstanceIdentifier<VpnInterface> id = InstanceIdentifier.builder(VpnInterfaces.class).child(VpnInterface
983 .class, new VpnInterfaceKey(ifName)).build();
987 static InstanceIdentifier<Subnetmap> buildSubnetMapIdentifier(Uuid subnetId) {
988 InstanceIdentifier<Subnetmap> id = InstanceIdentifier.builder(Subnetmaps.class).child(Subnetmap.class, new
989 SubnetmapKey(subnetId)).build();
993 static InstanceIdentifier<Interface> buildVlanInterfaceIdentifier(String interfaceName) {
994 InstanceIdentifier<Interface> id = InstanceIdentifier.builder(Interfaces.class).child(Interface.class, new
995 InterfaceKey(interfaceName)).build();
999 static InstanceIdentifier<org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.natservice.rev160111.ext
1000 .routers.Routers> buildExtRoutersIdentifier(Uuid routerId) {
1001 InstanceIdentifier<org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.natservice.rev160111.ext.routers
1002 .Routers> id = InstanceIdentifier.builder(ExtRouters.class).child(org.opendaylight.yang.gen.v1.urn
1003 .opendaylight.netvirt.natservice.rev160111.ext.routers.Routers.class, new RoutersKey(routerId
1004 .getValue())).build();
1008 static InstanceIdentifier<FloatingIpIdToPortMapping> buildfloatingIpIdToPortMappingIdentifier(Uuid floatingIpId) {
1009 return InstanceIdentifier.builder(FloatingIpPortInfo.class).child(FloatingIpIdToPortMapping.class, new
1010 FloatingIpIdToPortMappingKey(floatingIpId)).build();
1013 static InstanceIdentifier<PortSubnetIpPrefixes> buildPortSubnetIpPrefixIdentifier(String portId) {
1014 InstanceIdentifier<PortSubnetIpPrefixes> id = InstanceIdentifier.builder(PortsSubnetIpPrefixes.class)
1015 .child(PortSubnetIpPrefixes.class, new PortSubnetIpPrefixesKey(portId)).build();
1019 // TODO Remove this method entirely
1020 @SuppressWarnings("checkstyle:IllegalCatch")
1021 private <T extends DataObject> Optional<T> read(LogicalDatastoreType datastoreType, InstanceIdentifier<T> path) {
1023 return SingleTransactionDataBroker.syncReadOptional(dataBroker, datastoreType, path);
1024 } catch (ReadFailedException e) {
1025 throw new RuntimeException(e);
1029 public static Class<? extends NetworkTypeBase> getNetworkType(Network network) {
1030 NetworkProviderExtension providerExtension = network.getAugmentation(NetworkProviderExtension.class);
1031 return providerExtension != null ? providerExtension.getNetworkType() : null;
1034 static ProviderTypes getProviderNetworkType(Network network) {
1035 if (network == null) {
1036 LOG.error("Error in getting provider network type since network is null");
1039 NetworkProviderExtension npe = network.getAugmentation(NetworkProviderExtension.class);
1041 Class<? extends NetworkTypeBase> networkTypeBase = npe.getNetworkType();
1042 if (networkTypeBase != null) {
1043 if (networkTypeBase.isAssignableFrom(NetworkTypeFlat.class)) {
1044 return ProviderTypes.FLAT;
1045 } else if (networkTypeBase.isAssignableFrom(NetworkTypeVlan.class)) {
1046 return ProviderTypes.VLAN;
1047 } else if (networkTypeBase.isAssignableFrom(NetworkTypeVxlan.class)) {
1048 return ProviderTypes.VXLAN;
1049 } else if (networkTypeBase.isAssignableFrom(NetworkTypeGre.class)) {
1050 return ProviderTypes.GRE;
1054 LOG.error("Error in getting provider network type since network provider extension is null for network "
1055 + "{}", network.getUuid().getValue());
1059 static boolean isNetworkTypeSupported(Network network) {
1060 NetworkProviderExtension npe = network.getAugmentation(NetworkProviderExtension.class);
1061 return npe != null && npe.getNetworkType() != null && SUPPORTED_NETWORK_TYPES.contains(npe.getNetworkType());
1064 static boolean isNetworkOfType(Network network, Class<? extends NetworkTypeBase> type) {
1065 NetworkProviderExtension npe = network.getAugmentation(NetworkProviderExtension.class);
1066 if (npe != null && npe.getNetworkType() != null) {
1067 return type.isAssignableFrom(npe.getNetworkType());
1072 static boolean isFlatOrVlanNetwork(Network network) {
1073 return network != null
1074 && (isNetworkOfType(network, NetworkTypeVlan.class) || isNetworkOfType(network, NetworkTypeFlat.class));
1077 static boolean isVlanOrVxlanNetwork(Class<? extends NetworkTypeBase> type) {
1078 return type.isAssignableFrom(NetworkTypeVxlan.class) || type.isAssignableFrom(NetworkTypeVlan.class);
1082 * Get inter-VPN link state.
1084 * @param vpnLinkName VPN link name
1085 * @return Optional of InterVpnLinkState
1087 public Optional<InterVpnLinkState> getInterVpnLinkState(String vpnLinkName) {
1088 InstanceIdentifier<InterVpnLinkState> vpnLinkStateIid = InstanceIdentifier.builder(InterVpnLinkStates.class)
1089 .child(InterVpnLinkState.class, new InterVpnLinkStateKey(vpnLinkName)).build();
1090 return read(LogicalDatastoreType.CONFIGURATION, vpnLinkStateIid);
1094 * Returns an InterVpnLink by searching by one of its endpoint's IP.
1096 * @param endpointIp IP to search for
1097 * @return a InterVpnLink
1099 public Optional<InterVpnLink> getInterVpnLinkByEndpointIp(String endpointIp) {
1100 InstanceIdentifier<InterVpnLinks> interVpnLinksIid = InstanceIdentifier.builder(InterVpnLinks.class).build();
1101 Optional<InterVpnLinks> interVpnLinksOpData = MDSALUtil.read(dataBroker, LogicalDatastoreType.CONFIGURATION,
1103 if (interVpnLinksOpData.isPresent()) {
1104 List<InterVpnLink> allInterVpnLinks = interVpnLinksOpData.get().getInterVpnLink();
1105 for (InterVpnLink interVpnLink : allInterVpnLinks) {
1106 if (interVpnLink.getFirstEndpoint().getIpAddress().getValue().equals(endpointIp)
1107 || interVpnLink.getSecondEndpoint().getIpAddress().getValue().equals(endpointIp)) {
1108 return Optional.of(interVpnLink);
1112 return Optional.absent();
1116 public Set<RouterDpnList> getAllRouterDpnList(BigInteger dpid) {
1117 Set<RouterDpnList> ret = new HashSet<>();
1118 InstanceIdentifier<NeutronRouterDpns> routerDpnId =
1119 InstanceIdentifier.create(NeutronRouterDpns.class);
1120 Optional<NeutronRouterDpns> neutronRouterDpnsOpt =
1121 MDSALUtil.read(dataBroker, LogicalDatastoreType.OPERATIONAL, routerDpnId);
1122 if (neutronRouterDpnsOpt.isPresent()) {
1123 NeutronRouterDpns neutronRouterDpns = neutronRouterDpnsOpt.get();
1124 List<RouterDpnList> routerDpnLists = neutronRouterDpns.getRouterDpnList();
1125 for (RouterDpnList routerDpnList : routerDpnLists) {
1126 if (routerDpnList.getDpnVpninterfacesList() != null) {
1127 for (DpnVpninterfacesList dpnInterfaceList : routerDpnList.getDpnVpninterfacesList()) {
1128 if (dpnInterfaceList.getDpnId().equals(dpid)) {
1129 ret.add(routerDpnList);
1138 protected Integer getUniqueRDId(String poolName, String idKey) {
1139 AllocateIdInput getIdInput = new AllocateIdInputBuilder().setPoolName(poolName).setIdKey(idKey).build();
1141 Future<RpcResult<AllocateIdOutput>> result = idManager.allocateId(getIdInput);
1142 RpcResult<AllocateIdOutput> rpcResult = result.get();
1143 if (rpcResult.isSuccessful()) {
1144 return rpcResult.getResult().getIdValue().intValue();
1146 LOG.error("RPC call to get unique ID for pool name {} with ID key {} returned with errors {}",
1147 poolName, idKey, rpcResult.getErrors());
1149 } catch (InterruptedException | ExecutionException e) {
1150 LOG.error("Exception when getting Unique Id for poolname {} and ID Key {}", poolName, idKey, e);
1152 LOG.error("getUniqueRdId: Failed to return ID for poolname {} and ID Key {}", poolName, idKey);
1156 protected void releaseRDId(String poolName, String idKey) {
1157 ReleaseIdInput idInput = new ReleaseIdInputBuilder().setPoolName(poolName).setIdKey(idKey).build();
1159 Future<RpcResult<Void>> result = idManager.releaseId(idInput);
1160 RpcResult<Void> rpcResult = result.get();
1161 if (!rpcResult.isSuccessful()) {
1162 LOG.error("RPC Call to Get Unique Id returned with errors for poolname {} and ID Key {}: {}",
1163 poolName, idKey, rpcResult.getErrors());
1165 LOG.info("ID {} for RD released successfully", idKey);
1167 } catch (InterruptedException | ExecutionException e) {
1168 LOG.error("Exception when trying to release ID for poolname {} and ID Key {}", poolName, idKey, e);
1172 protected static IpAddress getIpv6LinkLocalAddressFromMac(MacAddress mac) {
1173 byte[] octets = bytesFromHexString(mac.getValue());
1175 /* As per the RFC2373, steps involved to generate a LLA include
1176 1. Convert the 48 bit MAC address to 64 bit value by inserting 0xFFFE
1177 between OUI and NIC Specific part.
1178 2. Invert the Universal/Local flag in the OUI portion of the address.
1179 3. Use the prefix "FE80::/10" along with the above 64 bit Interface
1180 identifier to generate the IPv6 LLA. */
1182 StringBuffer interfaceID = new StringBuffer();
1183 short u8byte = (short) (octets[0] & 0xff);
1185 interfaceID.append(Integer.toHexString(0xFF & u8byte));
1186 interfaceID.append(StringUtils.leftPad(Integer.toHexString(0xFF & octets[1]), 2, "0"));
1187 interfaceID.append(":");
1188 interfaceID.append(Integer.toHexString(0xFF & octets[2]));
1189 interfaceID.append("ff:fe");
1190 interfaceID.append(StringUtils.leftPad(Integer.toHexString(0xFF & octets[3]), 2, "0"));
1191 interfaceID.append(":");
1192 interfaceID.append(Integer.toHexString(0xFF & octets[4]));
1193 interfaceID.append(StringUtils.leftPad(Integer.toHexString(0xFF & octets[5]), 2, "0"));
1195 Ipv6Address ipv6LLA = new Ipv6Address("fe80:0:0:0:" + interfaceID.toString());
1196 IpAddress ipAddress = new IpAddress(ipv6LLA.getValue().toCharArray());
1200 protected static byte[] bytesFromHexString(String values) {
1202 if (values != null) {
1205 String[] octets = target.split(":");
1207 byte[] ret = new byte[octets.length];
1208 for (int i = 0; i < octets.length; i++) {
1209 ret[i] = Integer.valueOf(octets[i], 16).byteValue();
1214 public List<String> getExistingRDs() {
1215 List<String> existingRDs = new ArrayList<>();
1216 InstanceIdentifier<VpnInstances> path = InstanceIdentifier.builder(VpnInstances.class).build();
1217 Optional<VpnInstances> vpnInstancesOptional = read(LogicalDatastoreType.CONFIGURATION, path);
1218 if (vpnInstancesOptional.isPresent() && vpnInstancesOptional.get().getVpnInstance() != null) {
1219 for (VpnInstance vpnInstance : vpnInstancesOptional.get().getVpnInstance()) {
1220 if (vpnInstance.getIpv4Family() == null) {
1223 List<String> rds = vpnInstance.getIpv4Family().getRouteDistinguisher();
1225 existingRDs.addAll(rds);
1232 protected boolean doesVpnExist(Uuid vpnId) {
1233 InstanceIdentifier<VpnMap> vpnMapIdentifier = InstanceIdentifier.builder(VpnMaps.class).child(VpnMap.class,
1234 new VpnMapKey(vpnId)).build();
1235 return read(LogicalDatastoreType.CONFIGURATION, vpnMapIdentifier).isPresent();
1238 protected Optional<org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.natservice.rev160111.external
1239 .subnets.Subnets> getOptionalExternalSubnets(Uuid subnetId) {
1240 InstanceIdentifier<org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.natservice
1241 .rev160111.external.subnets.Subnets> subnetsIdentifier =
1242 InstanceIdentifier.builder(ExternalSubnets.class)
1243 .child(org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.natservice
1244 .rev160111.external.subnets.Subnets.class, new SubnetsKey(subnetId)).build();
1245 return read(LogicalDatastoreType.CONFIGURATION, subnetsIdentifier);
1248 public static List<StaticMacEntries> buildStaticMacEntry(Port port) {
1249 PhysAddress physAddress = new PhysAddress(port.getMacAddress().getValue());
1250 List<FixedIps> fixedIps = port.getFixedIps();
1251 IpAddress ipAddress = null;
1252 if (isNotEmpty(fixedIps)) {
1253 ipAddress = port.getFixedIps().get(0).getIpAddress();
1255 StaticMacEntriesBuilder staticMacEntriesBuilder = new StaticMacEntriesBuilder();
1256 List<StaticMacEntries> staticMacEntries = new ArrayList<>();
1257 if (ipAddress != null) {
1258 staticMacEntries.add(staticMacEntriesBuilder.setMacAddress(physAddress).setIpPrefix(ipAddress).build());
1260 staticMacEntries.add(staticMacEntriesBuilder.setMacAddress(physAddress).build());
1262 return staticMacEntries;
1265 public static boolean isEmpty(Collection<?> collection) {
1266 return collection == null || collection.isEmpty();
1269 public static boolean isNotEmpty(Collection<?> collection) {
1270 return !isEmpty(collection);
1274 * Method to get an ipVersionChosen as IPV4 and/or IPV6 or undefined from the subnetmaps of the router.
1275 * @param routerUuid the Uuid for which find out the IP version associated
1276 * @return an IpVersionChoice used by the router from its attached subnetmaps. IpVersionChoice.UNDEFINED if any
1278 public IpVersionChoice getIpVersionChoicesFromRouterUuid(Uuid routerUuid) {
1279 IpVersionChoice rep = IpVersionChoice.UNDEFINED;
1280 if (routerUuid == null) {
1283 List<Subnetmap> subnetmapList = getNeutronRouterSubnetMaps(routerUuid);
1284 if (subnetmapList.isEmpty()) {
1287 for (Subnetmap sn : subnetmapList) {
1288 if (sn.getSubnetIp() != null) {
1289 IpVersionChoice ipVers = getIpVersionFromString(sn.getSubnetIp());
1290 if (rep.choice != ipVers.choice) {
1291 rep = rep.addVersion(ipVers);
1293 if (rep.choice == IpVersionChoice.IPV4AND6.choice) {
1301 /**This method return the list of Subnetmap associated to the router or a empty list if any.
1302 * @param routerId the Uuid of router for which subnetmap is find out
1303 * @return a list of Subnetmap associated to the router. it could be empty if any
1305 protected List<Subnetmap> getNeutronRouterSubnetMaps(Uuid routerId) {
1306 List<Subnetmap> subnetIdList = new ArrayList<>();
1307 Optional<Subnetmaps> subnetMaps = read(LogicalDatastoreType.CONFIGURATION,
1308 InstanceIdentifier.builder(Subnetmaps.class).build());
1309 if (subnetMaps.isPresent() && subnetMaps.get().getSubnetmap() != null) {
1310 for (Subnetmap subnetmap : subnetMaps.get().getSubnetmap()) {
1311 if (routerId.equals(subnetmap.getRouterId())) {
1312 subnetIdList.add(subnetmap);
1316 return subnetIdList;
1319 static InstanceIdentifier<org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.vpn
1320 .instance.to.vpn.id.VpnInstance> getVpnInstanceToVpnIdIdentifier(String vpnName) {
1321 return InstanceIdentifier.builder(VpnInstanceToVpnId.class)
1322 .child(org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.vpn
1323 .instance.to.vpn.id.VpnInstance.class,
1324 new org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.vpn
1325 .instance.to.vpn.id.VpnInstanceKey(vpnName)).build();
1329 * Retrieves the VPN Route Distinguisher searching by its Vpn instance name.
1330 * @param vpnName Name of the VPN
1332 * @return the route-distinguisher of the VPN
1334 public String getVpnRd(String vpnName) {
1335 InstanceIdentifier<org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.vpn
1336 .instance.to.vpn.id.VpnInstance> id = getVpnInstanceToVpnIdIdentifier(vpnName);
1337 return SingleTransactionDataBroker.syncReadOptionalAndTreatReadFailedExceptionAsAbsentOptional(dataBroker,
1338 LogicalDatastoreType.CONFIGURATION, id).toJavaUtil().map(
1339 org.opendaylight.yang.gen.v1.urn.opendaylight.netvirt.l3vpn.rev130911.vpn.instance.to.vpn.id
1340 .VpnInstance::getVrfId).orElse(null);
1343 /**Get IpVersionChoice from String IP like x.x.x.x or an representation IPv6.
1344 * @param ipAddress String of an representation IP address V4 or V6
1345 * @return the IpVersionChoice of the version or IpVersionChoice.UNDEFINED otherwise
1347 public static IpVersionChoice getIpVersionFromString(String ipAddress) {
1348 IpVersionChoice ipchoice = IpVersionChoice.UNDEFINED;
1349 if (ipAddress.indexOf("/") >= 0) {
1350 ipAddress = ipAddress.substring(0, ipAddress.indexOf("/"));
1353 InetAddress address = InetAddress.getByName(ipAddress);
1354 if (address instanceof Inet4Address) {
1355 return IpVersionChoice.IPV4;
1356 } else if (address instanceof Inet6Address) {
1357 return IpVersionChoice.IPV6;
1359 } catch (UnknownHostException | SecurityException e) {
1360 LOG.error("getIpVersionFromString: could not find version for {}", ipAddress);
1365 /**Get IpVersionChoice from Uuid Subnet.
1366 * @param sm Subnetmap structure
1367 * @return the IpVersionChoice of the version or IpVersionChoice.UNDEFINED otherwise
1369 public static IpVersionChoice getIpVersionFromSubnet(Subnetmap sm) {
1370 if (sm != null && sm.getSubnetIp() != null) {
1371 return getIpVersionFromString(sm.getSubnetIp());
1373 return IpVersionChoice.UNDEFINED;
1376 public VpnInstanceOpDataEntry getVpnInstanceOpDataEntryFromVpnId(String vpnName) {
1377 String primaryRd = getVpnRd(vpnName);
1378 if (primaryRd == null) {
1379 LOG.error("getVpnInstanceOpDataEntryFromVpnId: Vpn Instance {} "
1380 + "Primary RD not found", vpnName);
1383 InstanceIdentifier<VpnInstanceOpDataEntry> id = getVpnOpDataIdentifier(primaryRd);
1384 Optional<VpnInstanceOpDataEntry> vpnInstanceOpDataEntryOptional = read(LogicalDatastoreType.OPERATIONAL, id);
1385 if (!vpnInstanceOpDataEntryOptional.isPresent()) {
1386 LOG.error("getVpnInstanceOpDataEntryFromVpnId: VpnInstance {} not found", primaryRd);
1389 return vpnInstanceOpDataEntryOptional.get();
1392 protected InstanceIdentifier<VpnInstanceOpDataEntry> getVpnOpDataIdentifier(String primaryRd) {
1393 return InstanceIdentifier.builder(VpnInstanceOpData.class)
1394 .child(VpnInstanceOpDataEntry.class, new VpnInstanceOpDataEntryKey(primaryRd)).build();
1397 public boolean shouldVpnHandleIpVersionChangeToAdd(Subnetmap sm, Uuid vpnId) {
1401 IpVersionChoice ipVersion = getIpVersionFromString(sm.getSubnetIp());
1402 return shouldVpnHandleIpVersionChoiceChangeToAdd(ipVersion, vpnId);
1405 public boolean shouldVpnHandleIpVersionChoiceChangeToAdd(IpVersionChoice ipVersion, Uuid vpnId) {
1406 VpnInstanceOpDataEntry vpnInstanceOpDataEntry = getVpnInstanceOpDataEntryFromVpnId(vpnId.getValue());
1407 if (vpnInstanceOpDataEntry == null) {
1410 if (vpnInstanceOpDataEntry.getType() == VpnInstanceOpDataEntry.Type.L2) {
1411 LOG.error("shouldVpnHandleIpVersionChangeToAdd: {} "
1412 + "VpnInstanceOpDataEntry is L2 instance. Do nothing.", vpnId.getValue());
1415 boolean isIpv4Configured = vpnInstanceOpDataEntry.isIpv4Configured();
1416 boolean isVpnInstanceIpv4Changed = false;
1417 if (ipVersion.isIpVersionChosen(IpVersionChoice.IPV4) && !isIpv4Configured) {
1418 isVpnInstanceIpv4Changed = true;
1420 boolean isIpv6Configured = vpnInstanceOpDataEntry.isIpv6Configured();
1421 boolean isVpnInstanceIpv6Changed = false;
1422 if (ipVersion.isIpVersionChosen(IpVersionChoice.IPV6) && !isIpv6Configured) {
1423 isVpnInstanceIpv6Changed = true;
1425 if (!isVpnInstanceIpv4Changed && !isVpnInstanceIpv6Changed) {
1426 LOG.debug("shouldVpnHandleIpVersionChangeToAdd: VPN {} did not change with IpFamily {}",
1427 vpnId.getValue(), ipVersion.toString());
1433 public boolean shouldVpnHandleIpVersionChangeToRemove(Subnetmap sm, Uuid vpnId) {
1437 InstanceIdentifier<Subnetmaps> subnetMapsId = InstanceIdentifier.builder(Subnetmaps.class).build();
1438 Optional<Subnetmaps> allSubnetMaps = read(LogicalDatastoreType.CONFIGURATION, subnetMapsId);
1439 // calculate and store in list IpVersion for each subnetMap, belonging to current VpnInstance
1440 List<IpVersionChoice> snIpVersions = new ArrayList<>();
1441 for (Subnetmap snMap: allSubnetMaps.get().getSubnetmap()) {
1442 if (snMap.getId().equals(sm.getId())) {
1445 if (snMap.getVpnId() != null && snMap.getVpnId().equals(vpnId)) {
1446 snIpVersions.add(getIpVersionFromString(snMap.getSubnetIp()));
1448 if (snMap.getInternetVpnId() != null && snMap.getInternetVpnId().equals(vpnId)) {
1449 snIpVersions.add(getIpVersionFromString(snMap.getSubnetIp()));
1452 IpVersionChoice ipVersion = getIpVersionFromString(sm.getSubnetIp());
1453 if (!snIpVersions.contains(ipVersion)) {
1459 public void updateVpnInstanceWithIpFamily(String vpnName, IpVersionChoice ipVersion, boolean add) {
1460 VpnInstanceOpDataEntry vpnInstanceOpDataEntry = getVpnInstanceOpDataEntryFromVpnId(vpnName);
1461 if (vpnInstanceOpDataEntry == null) {
1464 if (vpnInstanceOpDataEntry.getType() == VpnInstanceOpDataEntry.Type.L2) {
1465 LOG.debug("updateVpnInstanceWithIpFamily: Update VpnInstance {} with ipFamily {}."
1466 + "VpnInstanceOpDataEntry is L2 instance. Do nothing.", vpnName,
1467 ipVersion.toString());
1470 final boolean isFinalVpnInstanceIpv6Changed = ipVersion
1471 .isIpVersionChosen(IpVersionChoice.IPV6) ? true : false;
1472 final boolean isFinalVpnInstanceIpv4Changed = ipVersion
1473 .isIpVersionChosen(IpVersionChoice.IPV4) ? true : false;
1474 final boolean finalIsIpv4Configured = ipVersion.isIpVersionChosen(IpVersionChoice.IPV4) ? add : false;
1475 final boolean finalIsIpv6Configured = ipVersion.isIpVersionChosen(IpVersionChoice.IPV6) ? add : false;
1476 jobCoordinator.enqueueJob("VPN-" + vpnName, () -> {
1477 VpnInstanceOpDataEntryBuilder builder = new VpnInstanceOpDataEntryBuilder(vpnInstanceOpDataEntry);
1478 if (isFinalVpnInstanceIpv4Changed) {
1479 builder.setIpv4Configured(finalIsIpv4Configured);
1481 if (isFinalVpnInstanceIpv6Changed) {
1482 builder.setIpv6Configured(finalIsIpv6Configured);
1484 WriteTransaction writeTxn = dataBroker.newWriteOnlyTransaction();
1485 InstanceIdentifier<VpnInstanceOpDataEntry> id = InstanceIdentifier.builder(VpnInstanceOpData.class)
1486 .child(VpnInstanceOpDataEntry.class,
1487 new VpnInstanceOpDataEntryKey(vpnInstanceOpDataEntry.getVrfId())).build();
1488 writeTxn.merge(LogicalDatastoreType.OPERATIONAL, id, builder.build(), false);
1489 LOG.info("updateVpnInstanceWithIpFamily: Successfully {} {} to Vpn {}",
1490 add ? "added" : "removed",
1491 ipVersion.toString(), vpnName);
1492 return Collections.singletonList(writeTxn.submit());
1498 * Get the vpnInstance from its Uuid.
1500 * @param broker to get informations from ds
1501 * @param vpnId the Uuid of the VPN
1502 * @return the VpnInstance or null if unfindable
1504 public VpnInstance getVpnInstance(DataBroker broker, Uuid vpnId) {
1505 if (broker == null || vpnId == null) {
1508 InstanceIdentifier<VpnInstance> id = InstanceIdentifier.builder(VpnInstances.class).child(VpnInstance.class,
1509 new VpnInstanceKey(vpnId.getValue())).build();
1510 Optional<VpnInstance> vpnInstance = read(LogicalDatastoreType.CONFIGURATION, id);
1511 return (vpnInstance.isPresent()) ? vpnInstance.get() : null;
1515 *Get the Uuid of external network of the router (remember you that one router have only one external network).
1516 * @param routerId the Uuid of the router which you try to reach the external network
1517 * @return Uuid of externalNetwork or null if is not exist
1519 protected Uuid getExternalNetworkUuidAttachedFromRouterUuid(@Nonnull Uuid routerId) {
1520 LOG.debug("getExternalNetworkUuidAttachedFromRouterUuid for {}", routerId.getValue());
1521 Uuid externalNetworkUuid = null;
1522 Router router = getNeutronRouter(routerId);
1523 if (router != null && router.getExternalGatewayInfo() != null) {
1524 externalNetworkUuid = router.getExternalGatewayInfo().getExternalNetworkId();
1526 return externalNetworkUuid;
1529 public Uuid getInternetvpnUuidBoundToRouterId(@Nonnull Uuid routerId) {
1530 Uuid netId = getExternalNetworkUuidAttachedFromRouterUuid(routerId);
1531 if (netId == null) {
1534 return getVpnForNetwork(netId);
1538 * This method get Uuid of internet vpn if existing one bound to the same router of the subnetUuid arg.
1539 * Explanation: If the subnet (of arg subnetUuid) have a router bound and this router have an
1540 * externalVpn (vpn on externalProvider network) then <b>its Uuid</b> will be returned.
1541 * @param subnetUuid Uuid of subnet where you are finding a link to an external network
1542 * @return Uuid of externalVpn or null if it is not found
1544 public Uuid getInternetvpnUuidBoundToSubnetRouter(@Nonnull Uuid subnetUuid) {
1545 Subnetmap subnetmap = getSubnetmap(subnetUuid);
1546 Uuid routerUuid = subnetmap.getRouterId();
1547 LOG.debug("getInternetvpnUuidBoundToSubnetRouter for subnetUuid {}", subnetUuid.getValue());
1548 if (routerUuid == null) {
1551 Uuid externalNetworkUuid = getExternalNetworkUuidAttachedFromRouterUuid(routerUuid);
1552 return externalNetworkUuid != null ? getVpnForNetwork(externalNetworkUuid) : null;
1556 * Get all subnetmap associate to the belonging router of network.
1557 * @param network the network which have router bound
1558 * @return a list of Subnetmap of the router (which the network is associated)
1560 public @Nonnull List<Subnetmap> getSubnetMapsforNetworkRoute(@Nonnull Network network) {
1561 List<Subnetmap> subList = new ArrayList<>();
1562 LOG.debug("getSubnetMapsforNetworkRoute for network {}", network.getUuid());
1563 Uuid vpnUuid = getVpnForNetwork(network.getUuid());
1564 InstanceIdentifier<Subnetmaps> subnetmapsid = InstanceIdentifier.builder(Subnetmaps.class).build();
1565 Optional<Subnetmaps> optionalSubnetmaps = read(LogicalDatastoreType.CONFIGURATION,
1567 if (!optionalSubnetmaps.isPresent()) {
1568 LOG.debug("getSubnetMapsforNetworkRoute: no subnetmaps");
1569 return Collections.emptyList();
1571 List<Subnetmap> subnetmapList = optionalSubnetmaps.get().getSubnetmap();
1572 if (vpnUuid != null) {
1573 for (Subnetmap subnetmap : subnetmapList) {
1574 if ((subnetmap.getInternetVpnId() != null)
1575 && subnetmap.getInternetVpnId().getValue().equals(vpnUuid.getValue())) {
1576 subList.add(subnetmap);
1580 Uuid routerId = null;
1581 for (Subnetmap subnetmap : subnetmapList) {
1582 if (subnetmap.getRouterId() != null) {
1583 Uuid externalNetworkUuid = getExternalNetworkUuidAttachedFromRouterUuid(subnetmap.getRouterId());
1584 if (externalNetworkUuid != null && externalNetworkUuid.getValue()
1585 .equals(network.getUuid().getValue())) {
1586 routerId = subnetmap.getRouterId();
1591 if (routerId == null) {
1592 LOG.debug("getSubnetMapsforNetworkRoute: no subnet in routers using {}", network.getUuid());
1593 return Collections.emptyList();
1595 for (Subnetmap subnetmap : subnetmapList) {
1596 if (subnetmap.getRouterId() != null
1597 && subnetmap.getRouterId().getValue().matches(routerId.getValue())) {
1598 subList.add(subnetmap);
1605 public void updateVpnInstanceWithFallback(String vpnName, boolean add) {
1606 VpnInstanceOpDataEntry vpnInstanceOpDataEntry = getVpnInstanceOpDataEntryFromVpnId(vpnName);
1607 if (vpnInstanceOpDataEntry == null) {
1608 // BGPVPN context not found
1611 String routerIdUuid = getRouterIdfromVpnInstance(vpnInstanceOpDataEntry.getVrfId());
1612 if (routerIdUuid != null) {
1613 List<BigInteger> dpnIds = getDpnsForRouter(routerIdUuid);
1614 if (!dpnIds.isEmpty()) {
1615 Long vpnId = vpnInstanceOpDataEntry.getVpnId();
1616 VpnInstanceOpDataEntry vpnOpDataEntry = getVpnInstanceOpDataEntryFromVpnId(routerIdUuid);
1617 Long routerIdAsLong = vpnOpDataEntry.getVpnId();
1618 if (routerIdAsLong == null) {
1621 for (BigInteger dpnId : dpnIds) {
1623 ipV6InternetDefRt.installDefaultRoute(dpnId, vpnId, routerIdAsLong);
1625 ipV6InternetDefRt.removeDefaultRoute(dpnId, vpnId, routerIdAsLong);
1632 public void updateVpnInstanceOpWithType(VpnInstanceOpDataEntry.BgpvpnType choice, @Nonnull Uuid vpn) {
1633 String primaryRd = getVpnRd(vpn.getValue());
1634 if (primaryRd == null) {
1635 LOG.debug("updateVpnInstanceOpWithType: Update BgpvpnType {} for {}."
1636 + "Primary RD not found", choice, vpn.getValue());
1639 InstanceIdentifier<VpnInstanceOpDataEntry> id = InstanceIdentifier.builder(VpnInstanceOpData.class)
1640 .child(VpnInstanceOpDataEntry.class, new VpnInstanceOpDataEntryKey(primaryRd)).build();
1642 Optional<VpnInstanceOpDataEntry> vpnInstanceOpDataEntryOptional =
1643 read(LogicalDatastoreType.OPERATIONAL, id);
1644 if (!vpnInstanceOpDataEntryOptional.isPresent()) {
1645 LOG.debug("updateVpnInstanceOpWithType: Update BgpvpnType {} for {}."
1646 + "VpnInstanceOpDataEntry not found", choice, vpn.getValue());
1649 VpnInstanceOpDataEntry vpnInstanceOpDataEntry = vpnInstanceOpDataEntryOptional.get();
1650 if (vpnInstanceOpDataEntry.getBgpvpnType().equals(choice)) {
1651 LOG.debug("updateVpnInstanceOpWithType: Update BgpvpnType {} for {}."
1652 + "VpnInstanceOpDataEntry already set", choice, vpn.getValue());
1655 VpnInstanceOpDataEntryBuilder builder = new VpnInstanceOpDataEntryBuilder(vpnInstanceOpDataEntry);
1656 builder.setBgpvpnType(choice);
1657 WriteTransaction writeTxn = dataBroker.newWriteOnlyTransaction();
1658 writeTxn.merge(LogicalDatastoreType.OPERATIONAL, id, builder.build(), false);
1659 LOG.debug("updateVpnInstanceOpWithType: sent merge to operDS BgpvpnType {} for {}", choice, vpn.getValue());
1661 writeTxn.submit().get();
1662 } catch (InterruptedException | ExecutionException e) {
1663 LOG.error("updateVpnInstanceOpWithType: on merge execution, error: {}", e);
1669 public List<BigInteger> getDpnsForRouter(String routerUuid) {
1670 InstanceIdentifier id = InstanceIdentifier.builder(NeutronRouterDpns.class)
1671 .child(RouterDpnList.class, new RouterDpnListKey(routerUuid)).build();
1672 Optional<RouterDpnList> routerDpnListData =
1673 SingleTransactionDataBroker.syncReadOptionalAndTreatReadFailedExceptionAsAbsentOptional(dataBroker,
1674 LogicalDatastoreType.OPERATIONAL, id);
1675 List<BigInteger> dpns = new ArrayList<>();
1676 if (routerDpnListData.isPresent()) {
1677 List<DpnVpninterfacesList> dpnVpninterfacesList = routerDpnListData.get().getDpnVpninterfacesList();
1678 for (DpnVpninterfacesList dpnVpnInterface : dpnVpninterfacesList) {
1679 dpns.add(dpnVpnInterface.getDpnId());
1685 public String getRouterIdfromVpnInstance(String vpnName) {
1686 // returns only router, attached to IPv4 networks
1687 InstanceIdentifier<VpnMap> vpnMapIdentifier = InstanceIdentifier.builder(VpnMaps.class)
1688 .child(VpnMap.class, new VpnMapKey(new Uuid(vpnName))).build();
1689 Optional<VpnMap> optionalVpnMap = SingleTransactionDataBroker
1690 .syncReadOptionalAndTreatReadFailedExceptionAsAbsentOptional(dataBroker,
1691 LogicalDatastoreType.CONFIGURATION, vpnMapIdentifier);
1692 if (!optionalVpnMap.isPresent()) {
1693 LOG.error("getRouterIdfromVpnInstance : Router not found for vpn : {}", vpnName);
1696 Uuid routerId = optionalVpnMap.get().getRouterId();
1697 if (routerId != null) {
1698 return routerId.getValue();
1700 LOG.info("getRouterIdfromVpnInstance : Router not found for vpn : {}", vpnName);
1704 public InstanceIdentifier<Router> buildNeutronRouterIdentifier(Uuid routerUuid) {
1705 InstanceIdentifier<Router> routerInstanceIdentifier = InstanceIdentifier.create(Neutron.class)
1706 .child(Routers.class).child(Router.class, new RouterKey(routerUuid));
1707 return routerInstanceIdentifier;