b8a096389b95d024011a9f2566ca88fb4c593c69
[ovsdb.git] / openstack / net-virt-providers / src / main / java / org / opendaylight / ovsdb / openstack / netvirt / providers / openflow13 / OF13Provider.java
1 /*
2  * Copyright (c) 2013, 2015 Red Hat, Inc. and others. All rights reserved.
3  *
4  * This program and the accompanying materials are made available under the
5  * terms of the Eclipse Public License v1.0 which accompanies this distribution,
6  * and is available at http://www.eclipse.org/legal/epl-v10.html
7  */
8
9 package org.opendaylight.ovsdb.openstack.netvirt.providers.openflow13;
10
11 import java.net.InetAddress;
12 import java.util.List;
13 import java.util.Map;
14 import java.util.concurrent.ExecutionException;
15
16 import org.opendaylight.controller.md.sal.binding.api.DataBroker;
17 import org.opendaylight.controller.md.sal.binding.api.ReadOnlyTransaction;
18 import org.opendaylight.controller.md.sal.binding.api.ReadWriteTransaction;
19 import org.opendaylight.controller.md.sal.binding.api.WriteTransaction;
20 import org.opendaylight.controller.md.sal.common.api.data.LogicalDatastoreType;
21 import org.opendaylight.controller.md.sal.common.api.data.TransactionCommitFailedException;
22 import org.opendaylight.neutron.spi.NeutronNetwork;
23 import org.opendaylight.neutron.spi.NeutronPort;
24 import org.opendaylight.neutron.spi.NeutronSecurityGroup;
25 import org.opendaylight.neutron.spi.Neutron_IPs;
26 import org.opendaylight.ovsdb.openstack.netvirt.MdsalHelper;
27 import org.opendaylight.ovsdb.openstack.netvirt.NetworkHandler;
28 import org.opendaylight.ovsdb.openstack.netvirt.api.BridgeConfigurationManager;
29 import org.opendaylight.ovsdb.openstack.netvirt.api.ClassifierProvider;
30 import org.opendaylight.ovsdb.openstack.netvirt.api.ConfigurationService;
31 import org.opendaylight.ovsdb.openstack.netvirt.api.Constants;
32 import org.opendaylight.ovsdb.openstack.netvirt.api.EgressAclProvider;
33 import org.opendaylight.ovsdb.openstack.netvirt.api.IngressAclProvider;
34 import org.opendaylight.ovsdb.openstack.netvirt.api.L2ForwardingProvider;
35 import org.opendaylight.ovsdb.openstack.netvirt.api.NetworkingProvider;
36 import org.opendaylight.ovsdb.openstack.netvirt.api.NetworkingProviderManager;
37 import org.opendaylight.ovsdb.openstack.netvirt.api.NodeCacheManager;
38 import org.opendaylight.ovsdb.openstack.netvirt.api.SecurityServicesManager;
39 import org.opendaylight.ovsdb.openstack.netvirt.api.Southbound;
40 import org.opendaylight.ovsdb.openstack.netvirt.api.Status;
41 import org.opendaylight.ovsdb.openstack.netvirt.api.StatusCode;
42 import org.opendaylight.ovsdb.openstack.netvirt.api.TenantNetworkManager;
43 import org.opendaylight.ovsdb.openstack.netvirt.providers.ConfigInterface;
44 import org.opendaylight.ovsdb.openstack.netvirt.providers.NetvirtProvidersProvider;
45 import org.opendaylight.ovsdb.utils.mdsal.openflow.InstructionUtils;
46 import org.opendaylight.ovsdb.utils.servicehelper.ServiceHelper;
47 import org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.inet.types.rev100924.Uri;
48 import org.opendaylight.yang.gen.v1.urn.opendaylight.action.types.rev131112.action.action.GroupActionCase;
49 import org.opendaylight.yang.gen.v1.urn.opendaylight.action.types.rev131112.action.action.GroupActionCaseBuilder;
50 import org.opendaylight.yang.gen.v1.urn.opendaylight.action.types.rev131112.action.action.OutputActionCase;
51 import org.opendaylight.yang.gen.v1.urn.opendaylight.action.types.rev131112.action.action.OutputActionCaseBuilder;
52 import org.opendaylight.yang.gen.v1.urn.opendaylight.action.types.rev131112.action.action.group.action._case.GroupActionBuilder;
53 import org.opendaylight.yang.gen.v1.urn.opendaylight.action.types.rev131112.action.action.output.action._case.OutputActionBuilder;
54 import org.opendaylight.yang.gen.v1.urn.opendaylight.action.types.rev131112.action.list.Action;
55 import org.opendaylight.yang.gen.v1.urn.opendaylight.action.types.rev131112.action.list.ActionBuilder;
56 import org.opendaylight.yang.gen.v1.urn.opendaylight.action.types.rev131112.action.list.ActionKey;
57 import org.opendaylight.yang.gen.v1.urn.opendaylight.flow.inventory.rev130819.FlowCapableNode;
58 import org.opendaylight.yang.gen.v1.urn.opendaylight.flow.inventory.rev130819.FlowId;
59 import org.opendaylight.yang.gen.v1.urn.opendaylight.flow.inventory.rev130819.tables.Table;
60 import org.opendaylight.yang.gen.v1.urn.opendaylight.flow.inventory.rev130819.tables.TableKey;
61 import org.opendaylight.yang.gen.v1.urn.opendaylight.flow.inventory.rev130819.tables.table.Flow;
62 import org.opendaylight.yang.gen.v1.urn.opendaylight.flow.inventory.rev130819.tables.table.FlowBuilder;
63 import org.opendaylight.yang.gen.v1.urn.opendaylight.flow.inventory.rev130819.tables.table.FlowKey;
64 import org.opendaylight.yang.gen.v1.urn.opendaylight.flow.types.rev131026.flow.InstructionsBuilder;
65 import org.opendaylight.yang.gen.v1.urn.opendaylight.flow.types.rev131026.flow.MatchBuilder;
66 import org.opendaylight.yang.gen.v1.urn.opendaylight.flow.types.rev131026.instruction.instruction.ApplyActionsCase;
67 import org.opendaylight.yang.gen.v1.urn.opendaylight.flow.types.rev131026.instruction.instruction.ApplyActionsCaseBuilder;
68 import org.opendaylight.yang.gen.v1.urn.opendaylight.flow.types.rev131026.instruction.instruction.apply.actions._case.ApplyActionsBuilder;
69 import org.opendaylight.yang.gen.v1.urn.opendaylight.flow.types.rev131026.instruction.list.Instruction;
70 import org.opendaylight.yang.gen.v1.urn.opendaylight.flow.types.rev131026.instruction.list.InstructionBuilder;
71 import org.opendaylight.yang.gen.v1.urn.opendaylight.flow.types.rev131026.instruction.list.InstructionKey;
72 import org.opendaylight.yang.gen.v1.urn.opendaylight.group.types.rev131018.BucketId;
73 import org.opendaylight.yang.gen.v1.urn.opendaylight.group.types.rev131018.GroupId;
74 import org.opendaylight.yang.gen.v1.urn.opendaylight.group.types.rev131018.GroupTypes;
75 import org.opendaylight.yang.gen.v1.urn.opendaylight.group.types.rev131018.group.Buckets;
76 import org.opendaylight.yang.gen.v1.urn.opendaylight.group.types.rev131018.group.BucketsBuilder;
77 import org.opendaylight.yang.gen.v1.urn.opendaylight.group.types.rev131018.group.buckets.Bucket;
78 import org.opendaylight.yang.gen.v1.urn.opendaylight.group.types.rev131018.group.buckets.BucketBuilder;
79 import org.opendaylight.yang.gen.v1.urn.opendaylight.group.types.rev131018.group.buckets.BucketKey;
80 import org.opendaylight.yang.gen.v1.urn.opendaylight.group.types.rev131018.groups.Group;
81 import org.opendaylight.yang.gen.v1.urn.opendaylight.group.types.rev131018.groups.GroupBuilder;
82 import org.opendaylight.yang.gen.v1.urn.opendaylight.group.types.rev131018.groups.GroupKey;
83 import org.opendaylight.yang.gen.v1.urn.opendaylight.inventory.rev130819.NodeConnectorId;
84 import org.opendaylight.yang.gen.v1.urn.opendaylight.inventory.rev130819.NodeId;
85 import org.opendaylight.yang.gen.v1.urn.opendaylight.inventory.rev130819.Nodes;
86 import org.opendaylight.yang.gen.v1.urn.opendaylight.inventory.rev130819.nodes.NodeBuilder;
87 import org.opendaylight.yang.gen.v1.urn.opendaylight.inventory.rev130819.nodes.NodeKey;
88 import org.opendaylight.yang.gen.v1.urn.opendaylight.params.xml.ns.yang.ovsdb.rev150105.OvsdbTerminationPointAugmentation;
89 import org.opendaylight.yang.gen.v1.urn.tbd.params.xml.ns.yang.network.topology.rev131021.network.topology.topology.Node;
90 import org.opendaylight.yangtools.yang.binding.InstanceIdentifier;
91 import org.osgi.framework.BundleContext;
92 import org.osgi.framework.ServiceReference;
93 import org.slf4j.Logger;
94 import org.slf4j.LoggerFactory;
95
96 import com.google.common.base.Optional;
97 import com.google.common.base.Preconditions;
98 import com.google.common.collect.Lists;
99 import com.google.common.collect.Maps;
100 import com.google.common.util.concurrent.CheckedFuture;
101
102
103 /**
104  * Open vSwitch OpenFlow 1.3 Networking Provider for OpenStack Neutron
105  *
106  * @author Madhu Venugopal
107  * @author Brent Salisbury
108  * @author Dave Tucker
109  * @author Sam Hague
110  */
111 // Methods' parameters in this class follow the same pattern to avoid confusion between same-typed parameters
112 // The patterns need to be preserved even though not all parameters are used in all methods
113 @SuppressWarnings("UnusedParameters")
114 public class OF13Provider implements ConfigInterface, NetworkingProvider {
115     private static final Logger LOG = LoggerFactory.getLogger(OF13Provider.class);
116     private static final short TABLE_0_DEFAULT_INGRESS = 0;
117     private static final short TABLE_1_ISOLATE_TENANT = 10;
118     private static final short TABLE_2_LOCAL_FORWARD = 20;
119     private static Long groupId = 1L;
120     private DataBroker dataBroker = null;
121
122     private volatile ConfigurationService configurationService;
123     private volatile BridgeConfigurationManager bridgeConfigurationManager;
124     private volatile TenantNetworkManager tenantNetworkManager;
125     private volatile SecurityServicesManager securityServicesManager;
126     private volatile ClassifierProvider classifierProvider;
127     private volatile IngressAclProvider ingressAclProvider;
128     private volatile EgressAclProvider egressAclProvider;
129     private volatile NodeCacheManager nodeCacheManager;
130     private volatile L2ForwardingProvider l2ForwardingProvider;
131
132     public static final String NAME = "OF13Provider";
133     private volatile BundleContext bundleContext;
134     private volatile Southbound southbound;
135
136     public OF13Provider() {
137         this.dataBroker = NetvirtProvidersProvider.getDataBroker();
138     }
139
140     @Override
141     public String getName() {
142         return NAME;
143     }
144
145     @Override
146     public boolean supportsServices() {
147         return true;
148     }
149
150     @Override
151     public boolean hasPerTenantTunneling() {
152         return false;
153     }
154
155     // The method is tested for in OF13ProviderTest
156     @SuppressWarnings("unused")
157     private Status getTunnelReadinessStatus (Node node, String tunnelKey) {
158         InetAddress srcTunnelEndPoint = configurationService.getTunnelEndPoint(node);
159         if (srcTunnelEndPoint == null) {
160             LOG.error("Tunnel Endpoint not configured for Node {}", node);
161             return new Status(StatusCode.NOTFOUND, "Tunnel Endpoint not configured for "+ node);
162         }
163
164         if (!bridgeConfigurationManager.isNodeNeutronReady(node)) {
165             LOG.error("{} is not Overlay ready", node);
166             return new Status(StatusCode.NOTACCEPTABLE, node+" is not Overlay ready");
167         }
168
169         if (!tenantNetworkManager.isTenantNetworkPresentInNode(node, tunnelKey)) {
170             LOG.debug("{} has no VM corresponding to segment {}", node, tunnelKey);
171             return new Status(StatusCode.NOTACCEPTABLE, node+" has no VM corresponding to segment "+ tunnelKey);
172         }
173         return new Status(StatusCode.SUCCESS);
174     }
175
176     private String getTunnelName(String tunnelType, InetAddress dst) {
177         return tunnelType+"-"+dst.getHostAddress();
178     }
179
180     private boolean addTunnelPort (Node node, String tunnelType, InetAddress src, InetAddress dst) {
181         String tunnelBridgeName = configurationService.getIntegrationBridgeName();
182         String portName = getTunnelName(tunnelType, dst);
183         LOG.info("addTunnelPort enter: portName: {}", portName);
184         if (southbound.extractTerminationPointAugmentation(node, portName) != null
185                 || southbound.isTunnelTerminationPointExist(node, tunnelBridgeName, portName)) {
186             LOG.info("Tunnel {} is present in {} of {}", portName, tunnelBridgeName, node.getNodeId().getValue());
187             return true;
188         }
189
190         Map<String, String> options = Maps.newHashMap();
191         options.put("key", "flow");
192         options.put("local_ip", src.getHostAddress());
193         options.put("remote_ip", dst.getHostAddress());
194
195         if (!southbound.addTunnelTerminationPoint(node, tunnelBridgeName, portName, tunnelType, options)) {
196             LOG.error("Failed to insert Tunnel port {} in {}", portName, tunnelBridgeName);
197             return false;
198         }
199
200             LOG.info("addTunnelPort exit: portName: {}", portName);
201         return true;
202     }
203
204     /* delete port from ovsdb port table */
205     private boolean deletePort(Node node, String bridgeName, String portName) {
206         // TODO SB_MIGRATION
207         // might need to convert from ovsdb node to bridge node
208         return southbound.deleteTerminationPoint(node, portName);
209     }
210
211     private boolean deleteTunnelPort(Node node, String tunnelType, InetAddress src, InetAddress dst) {
212         String tunnelBridgeName = configurationService.getIntegrationBridgeName();
213         String portName = getTunnelName(tunnelType, dst);
214         return deletePort(node, tunnelBridgeName, portName);
215     }
216
217     private boolean deletePhysicalPort(Node node, String phyIntfName) {
218         String intBridgeName = configurationService.getIntegrationBridgeName();
219         return deletePort(node, intBridgeName, phyIntfName);
220     }
221
222     private void programLocalBridgeRules(Node node, Long dpid, String segmentationId,
223                                          String attachedMac, long localPort) {
224         /*
225          * Table(0) Rule #3
226          * ----------------
227          * Match: VM sMac and Local Ingress Port
228          * Action:Action: Set Tunnel ID and GOTO Local Table (5)
229          */
230
231         handleLocalInPort(dpid, TABLE_0_DEFAULT_INGRESS, TABLE_1_ISOLATE_TENANT,
232                 segmentationId, localPort, attachedMac, true);
233
234         /*
235          * Table(0) Rule #4
236          * ----------------
237          * Match: Drop any remaining Ingress Local VM Packets
238          * Action: Drop w/ a low priority
239          */
240
241         handleDropSrcIface(dpid, localPort, true);
242
243         /*
244          * Table(2) Rule #1
245          * ----------------
246          * Match: Match TunID and Destination DL/dMAC Addr
247          * Action: Output Port
248          * table=2,tun_id=0x5,dl_dst=00:00:00:00:00:01 actions=output:2
249          */
250
251         handleLocalUcastOut(dpid, TABLE_2_LOCAL_FORWARD, segmentationId, localPort, attachedMac, true);
252
253         /*
254          * Table(2) Rule #2
255          * ----------------
256          * Match: Tunnel ID and dMAC (::::FF:FF)
257          * table=2,priority=16384,tun_id=0x5,dl_dst=ff:ff:ff:ff:ff:ff \
258          * actions=output:2,3,4,5
259          */
260
261         handleLocalBcastOut(dpid, TABLE_2_LOCAL_FORWARD, segmentationId, localPort, true);
262         handleTunnelFloodOut(dpid, TABLE_1_ISOLATE_TENANT, TABLE_2_LOCAL_FORWARD, segmentationId, localPort, true);
263
264         /*
265          * TODO : Optimize the following 2 writes to be restricted only for the very first port known in a segment.
266          */
267         /*
268          * Table(1) Rule #3
269          * ----------------
270          * Match:  Any remaining Ingress Local VM Packets
271          * Action: Drop w/ a low priority
272          * -------------------------------------------
273          * table=1,priority=8192,tun_id=0x5 actions=goto_table:2
274          */
275
276         handleTunnelMiss(dpid, TABLE_1_ISOLATE_TENANT, TABLE_2_LOCAL_FORWARD, segmentationId, true);
277
278         /*
279          * Table(2) Rule #3
280          * ----------------
281          * Match: Any Remaining Flows w/a TunID
282          * Action: Drop w/ a low priority
283          * table=2,priority=8192,tun_id=0x5 actions=drop
284          */
285
286         handleLocalTableMiss(dpid, TABLE_2_LOCAL_FORWARD, segmentationId, true);
287     }
288
289     private void removeLocalBridgeRules(Node node, Long dpid, String segmentationId, String attachedMac, long localPort) {
290         /*
291          * Table(0) Rule #3
292          * ----------------
293          * Match: VM sMac and Local Ingress Port
294          * Action:Action: Set Tunnel ID and GOTO Local Table (5)
295          */
296
297         handleLocalInPort(dpid, TABLE_0_DEFAULT_INGRESS, TABLE_1_ISOLATE_TENANT, segmentationId, localPort, attachedMac, false);
298
299         /*
300          * Table(0) Rule #4
301          * ----------------
302          * Match: Drop any remaining Ingress Local VM Packets
303          * Action: Drop w/ a low priority
304          */
305
306         handleDropSrcIface(dpid, localPort, false);
307
308         /*
309          * Table(2) Rule #1
310          * ----------------
311          * Match: Match TunID and Destination DL/dMAC Addr
312          * Action: Output Port
313          * table=2,tun_id=0x5,dl_dst=00:00:00:00:00:01 actions=output:2
314          */
315
316         handleLocalUcastOut(dpid, TABLE_2_LOCAL_FORWARD, segmentationId, localPort, attachedMac, false);
317
318         /*
319          * Table(2) Rule #2
320          * ----------------
321          * Match: Tunnel ID and dMAC (::::FF:FF)
322          * table=2,priority=16384,tun_id=0x5,dl_dst=ff:ff:ff:ff:ff:ff \
323          * actions=output:2,3,4,5
324          */
325
326         handleLocalBcastOut(dpid, TABLE_2_LOCAL_FORWARD, segmentationId, localPort, false);
327         handleTunnelFloodOut(dpid, TABLE_1_ISOLATE_TENANT, TABLE_2_LOCAL_FORWARD, segmentationId, localPort, false);
328     }
329
330     private void programLocalIngressTunnelBridgeRules(Node node, Long dpid, String segmentationId, String attachedMac, long tunnelOFPort, long localPort) {
331         /*
332          * Table(0) Rule #2
333          * ----------------
334          * Match: Ingress Port, Tunnel ID
335          * Action: GOTO Local Table (20)
336          */
337
338         handleTunnelIn(dpid, TABLE_0_DEFAULT_INGRESS, TABLE_2_LOCAL_FORWARD, segmentationId, tunnelOFPort, true);
339
340         /*
341          * Table(1) Rule #2
342          * ----------------
343          * Match: Match Tunnel ID and L2 ::::FF:FF Flooding
344          * Action: Flood to selected destination TEPs
345          * -------------------------------------------
346          * table=1,priority=16384,tun_id=0x5,dl_dst=ff:ff:ff:ff:ff:ff \
347          * actions=output:10,output:11,goto_table:2
348          */
349
350         handleTunnelFloodOut(dpid, TABLE_1_ISOLATE_TENANT, TABLE_2_LOCAL_FORWARD, segmentationId, tunnelOFPort, true);
351
352     }
353
354     private void programRemoteEgressTunnelBridgeRules(Node node, Long dpid, String segmentationId, String attachedMac, long tunnelOFPort, long localPort) {
355         /*
356          * Table(1) Rule #1
357          * ----------------
358          * Match: Drop any remaining Ingress Local VM Packets
359          * Action: Drop w/ a low priority
360          * -------------------------------------------
361          * table=1,tun_id=0x5,dl_dst=00:00:00:00:00:08 \
362          * actions=output:11,goto_table:2
363          */
364
365         handleTunnelOut(dpid, TABLE_1_ISOLATE_TENANT, TABLE_2_LOCAL_FORWARD, segmentationId, tunnelOFPort, attachedMac, true);
366     }
367
368     private void removeRemoteEgressTunnelBridgeRules(Node node, Long dpid, String segmentationId, String attachedMac, long tunnelOFPort, long localPort) {
369         /*
370          * Table(1) Rule #1
371          * ----------------
372          * Match: Drop any remaining Ingress Local VM Packets
373          * Action: Drop w/ a low priority
374          * -------------------------------------------
375          * table=1,tun_id=0x5,dl_dst=00:00:00:00:00:08 \
376          * actions=output:11,goto_table:2
377          */
378
379         handleTunnelOut(dpid, TABLE_1_ISOLATE_TENANT, TABLE_2_LOCAL_FORWARD, segmentationId, tunnelOFPort, attachedMac, false);
380     }
381
382     /* Remove tunnel rules if last node in this tenant network */
383     private void removePerTunnelRules(Node node, Long dpid, String segmentationId, long tunnelOFPort) {
384         /*
385          * TODO : Optimize the following 2 writes to be restricted only for the very first port known in a segment.
386          */
387         /*
388          * Table(1) Rule #3
389          * ----------------
390          * Match:  Any remaining Ingress Local VM Packets
391          * Action: Drop w/ a low priority
392          * -------------------------------------------
393          * table=1,priority=8192,tun_id=0x5 actions=goto_table:2
394          */
395
396         handleTunnelMiss(dpid, TABLE_1_ISOLATE_TENANT, TABLE_2_LOCAL_FORWARD, segmentationId, false);
397
398         /*
399          * Table(2) Rule #3
400          * ----------------
401          * Match: Any Remaining Flows w/a TunID
402          * Action: Drop w/ a low priority
403          * table=2,priority=8192,tun_id=0x5 actions=drop
404          */
405
406         handleLocalTableMiss(dpid, TABLE_2_LOCAL_FORWARD, segmentationId, false);
407
408         /*
409          * Table(0) Rule #2
410          * ----------------
411          * Match: Ingress Port, Tunnel ID
412          * Action: GOTO Local Table (10)
413          */
414
415         handleTunnelIn(dpid, TABLE_0_DEFAULT_INGRESS, TABLE_2_LOCAL_FORWARD, segmentationId, tunnelOFPort, false);
416
417         /*
418          * Table(1) Rule #2
419          * ----------------
420          * Match: Match Tunnel ID and L2 ::::FF:FF Flooding
421          * Action: Flood to selected destination TEPs
422          * -------------------------------------------
423          * table=1,priority=16384,tun_id=0x5,dl_dst=ff:ff:ff:ff:ff:ff \
424          * actions=output:10,output:11,goto_table:2
425          */
426
427         handleTunnelFloodOut(dpid, TABLE_1_ISOLATE_TENANT, TABLE_2_LOCAL_FORWARD, segmentationId, tunnelOFPort, false);
428     }
429
430     private void programLocalVlanRules(Node node, Long dpid, String segmentationId, String attachedMac, long localPort) {
431         /*
432          * Table(0) Rule #1
433          * ----------------
434          * Tag traffic coming from the local port and vm srcmac
435          * Match: VM sMac and Local Ingress Port
436          * Action: Set VLAN ID and GOTO Local Table 1
437          */
438
439         handleLocalInPortSetVlan(dpid, TABLE_0_DEFAULT_INGRESS,
440                 TABLE_1_ISOLATE_TENANT, segmentationId, localPort,
441                 attachedMac, true);
442
443         /*
444          * Table(0) Rule #3
445          * ----------------
446          * Drop all other traffic coming from the local port
447          * Match: Drop any remaining Ingress Local VM Packets
448          * Action: Drop w/ a low priority
449          */
450
451         handleDropSrcIface(dpid, localPort, true);
452
453         /*
454          * Table(2) Rule #1
455          * ----------------
456          * Forward unicast traffic destined to the local port after stripping tag
457          * Match: Match VLAN ID and Destination DL/dMAC Addr
458          * Action: strip vlan, output to local port
459          * Example: table=2,vlan_id=0x5,dl_dst=00:00:00:00:00:01 actions= strip vlan, output:2
460          */
461
462         handleLocalVlanUcastOut(dpid, TABLE_2_LOCAL_FORWARD, segmentationId,
463                 localPort, attachedMac, true);
464
465         /*
466          * Table(2) Rule #2
467          * ----------------
468          * Match: VLAN ID and dMAC (::::FF:FF)
469          * Action: strip vlan, output to all local ports in this vlan
470          * Example: table=2,priority=16384,vlan_id=0x5,dl_dst=ff:ff:ff:ff:ff:ff \
471          * actions= strip_vlan, output:2,3,4,5
472          */
473
474         //handleLocalVlanBcastOut(dpid, TABLE_2_LOCAL_FORWARD, segmentationId,
475         //        localPort, ethPort, true);
476         //handleVlanFloodOut(dpid, TABLE_1_ISOLATE_TENANT, TABLE_2_LOCAL_FORWARD,
477         //        segmentationId, localPort, ethport, true);
478
479         /*
480          * Table(2) Rule #3
481          * ----------------
482          * Match: Any Remaining Flows w/a VLAN ID
483          * Action: Drop w/ a low priority
484          * Example: table=2,priority=8192,vlan_id=0x5 actions=drop
485          */
486
487         //handleLocalVlanTableMiss(dpid, TABLE_2_LOCAL_FORWARD, segmentationId,
488         //        true);
489     }
490
491     private void removeLocalVlanRules(Node node, Long dpid,
492                                       String segmentationId, String attachedMac, long localPort) {
493         /*
494          * Table(0) Rule #1
495          * ----------------
496          * Match: VM sMac and Local Ingress Port
497          * Action: Set VLAN ID and GOTO Local Table 1
498          */
499
500         handleLocalInPortSetVlan(dpid, TABLE_0_DEFAULT_INGRESS,
501                 TABLE_1_ISOLATE_TENANT, segmentationId, localPort,
502                 attachedMac, false);
503
504         /*
505          * Table(0) Rule #3
506          * ----------------
507          * Match: Drop any remaining Ingress Local VM Packets
508          * Action: Drop w/ a low priority
509          */
510
511         handleDropSrcIface(dpid, localPort, false);
512
513         /*
514          * Table(2) Rule #1
515          * ----------------
516          * Match: Match VLAN ID and Destination DL/dMAC Addr
517          * Action: strip vlan, output to local port
518          * Example: table=2,vlan_id=0x5,dl_dst=00:00:00:00:00:01 actions= strip vlan, output:2
519          */
520
521         handleLocalVlanUcastOut(dpid, TABLE_2_LOCAL_FORWARD, segmentationId,
522                 localPort, attachedMac, false);
523
524         /*
525          * Table(2) Rule #2
526          * ----------------
527          * Match: VLAN ID and dMAC (::::FF:FF)
528          * Action: strip vlan, output to all local ports in this vlan
529          * Example: table=2,priority=16384,vlan_id=0x5,dl_dst=ff:ff:ff:ff:ff:ff \
530          * actions= strip_vlan, output:2,3,4,5
531          */
532
533         //handleLocalVlanBcastOut(dpid, TABLE_2_LOCAL_FORWARD, segmentationId,
534         //        localPort, ethPort, false);
535         //handleVlanFloodOut(dpid, TABLE_1_ISOLATE_TENANT, TABLE_2_LOCAL_FORWARD,
536         //        segmentationId, localPort, false);
537
538     }
539
540     private void programLocalIngressVlanRules(Node node, Long dpid, String segmentationId, String attachedMac,
541                                               long localPort, long ethPort) {
542         /*
543          * Table(0) Rule #2
544          * ----------------
545          * Match: Ingress port = physical interface, Vlan ID
546          * Action: GOTO Local Table 2
547          */
548
549         handleVlanIn(dpid, TABLE_0_DEFAULT_INGRESS, TABLE_2_LOCAL_FORWARD,
550                 segmentationId, ethPort, true);
551
552         /*
553          * Table(1) Rule #2
554          * ----------------
555          * Match: Match VLAN ID and L2 ::::FF:FF Flooding
556          * Action: Flood to local and remote VLAN members
557          * -------------------------------------------
558          * Example: table=1,priority=16384,vlan_id=0x5,dl_dst=ff:ff:ff:ff:ff:ff \
559          * actions=output:10 (eth port),goto_table:2
560          * table=110, priority=16384,dl_vlan=2001,dl_dst=01:00:00:00:00:00/01:00:00:00:00:00 actions=output:2,pop_vlan,output:1,output:3,output:4
561          */
562
563         handleLocalVlanBcastOut(dpid, TABLE_2_LOCAL_FORWARD, segmentationId, localPort, ethPort, true);
564
565         /*
566          * Table(1) Rule #2
567          * ----------------
568          * Match: Match VLAN ID and L2 ::::FF:FF Flooding
569          * Action: Flood to local and remote VLAN members
570          * -------------------------------------------
571          * Example: table=1,priority=16384,vlan_id=0x5,dl_dst=ff:ff:ff:ff:ff:ff \
572          * actions=output:10 (eth port),goto_table:2
573          */
574
575         //handleVlanFloodOut(dpid, TABLE_1_ISOLATE_TENANT, TABLE_2_LOCAL_FORWARD,
576         //        segmentationId, ethPort, true);
577     }
578
579     private void programRemoteEgressVlanRules(Node node, Long dpid, String segmentationId,
580                                               String attachedMac, long ethPort) {
581         /*
582          * Table(1) Rule #1
583          * ----------------
584          * Match: Destination MAC is local VM MAC and vlan id
585          * Action: go to table 2
586          * -------------------------------------------
587          * Example: table=1,vlan_id=0x5,dl_dst=00:00:00:00:00:08 \
588          * actions=goto_table:2
589          */
590
591         //handleVlanOut(dpid, TABLE_1_ISOLATE_TENANT, TABLE_2_LOCAL_FORWARD,
592         //        segmentationId, ethPort, attachedMac, true);
593
594         /*
595          * Table(1) Rule #3
596          * ----------------
597          * Match:  VLAN ID
598          * Action: Go to table 2
599          * -------------------------------------------
600          * Example: table=1,priority=8192,vlan_id=0x5 actions=output:1,goto_table:2
601          * table=110,priority=8192,dl_vlan=2001 actions=output:2
602          */
603
604         handleVlanMiss(dpid, TABLE_1_ISOLATE_TENANT, TABLE_2_LOCAL_FORWARD, segmentationId, ethPort, true);
605     }
606
607     private void removeRemoteEgressVlanRules(Node node, Long dpid, String segmentationId,
608                                              String attachedMac, long localPort, long ethPort) {
609         /*
610          * Table(1) Rule #1
611          * ----------------
612          * Match: Destination MAC is local VM MAC and vlan id
613          * Action: go to table 2
614          * -------------------------------------------
615          * Example: table=1,vlan_id=0x5,dl_dst=00:00:00:00:00:08 \
616          * actions=goto_table:2
617          */
618
619         //handleVlanOut(dpid, TABLE_1_ISOLATE_TENANT, TABLE_2_LOCAL_FORWARD,
620         //        segmentationId, ethPort, attachedMac, false);
621
622         /*
623          * Table(1) Rule #2
624          * ----------------
625          * Match: Match VLAN ID and L2 ::::FF:FF Flooding
626          * Action: Flood to local and remote VLAN members
627          * -------------------------------------------
628          * Example: table=1,priority=16384,vlan_id=0x5,dl_dst=ff:ff:ff:ff:ff:ff \
629          * actions=output:10 (eth port),goto_table:2
630          * table=110, priority=16384,dl_vlan=2001,dl_dst=01:00:00:00:00:00/01:00:00:00:00:00 actions=output:2,pop_vlan,output:1,output:3,output:4
631          */
632
633         handleLocalVlanBcastOut(dpid, TABLE_2_LOCAL_FORWARD, segmentationId, localPort, ethPort, false);
634     }
635
636     private void removePerVlanRules(Node node, Long dpid, String segmentationId, long localPort, long ethPort) {
637         /*
638          * Table(2) Rule #3
639          * ----------------
640          * Match: Any Remaining Flows w/a VLAN ID
641          * Action: Drop w/ a low priority
642          * Example: table=2,priority=8192,vlan_id=0x5 actions=drop
643          */
644
645         //handleLocalVlanTableMiss(dpid, TABLE_2_LOCAL_FORWARD, segmentationId, false);
646
647         /*
648          * Table(0) Rule #2
649          * ----------------
650          * Match: Ingress port = physical interface, Vlan ID
651          * Action: GOTO Local Table 2
652          */
653
654         handleVlanIn(dpid, TABLE_0_DEFAULT_INGRESS, TABLE_2_LOCAL_FORWARD, segmentationId, ethPort, false);
655
656         /*
657          * Table(1) Rule #2
658          * ----------------
659          * Match: Match VLAN ID and L2 ::::FF:FF Flooding
660          * Action: Flood to local and remote VLAN members
661          * -------------------------------------------
662          * Example: table=1,priority=16384,vlan_id=0x5,dl_dst=ff:ff:ff:ff:ff:ff \
663          * actions=output:10 (eth port),goto_table:2
664          * table=110, priority=16384,dl_vlan=2001,dl_dst=01:00:00:00:00:00/01:00:00:00:00:00 actions=output:2,pop_vlan,output:1,output:3,output:4
665          */
666
667         //handleLocalVlanBcastOut(dpid, TABLE_2_LOCAL_FORWARD, segmentationId, localPort, ethPort, false);
668
669         /*
670          * Table(1) Rule #2
671          * ----------------
672          * Match: Match VLAN ID and L2 ::::FF:FF Flooding
673          * Action: Flood to local and remote VLAN members
674          * -------------------------------------------
675          * Example: table=1,priority=16384,vlan_id=0x5,dl_dst=ff:ff:ff:ff:ff:ff \
676          * actions=output:10 (eth port),goto_table:2
677          */
678
679         //handleVlanFloodOut(dpid, TABLE_1_ISOLATE_TENANT, TABLE_2_LOCAL_FORWARD,
680         //        segmentationId, ethPort, false);
681
682         /*
683          * Table(1) Rule #3
684          * ----------------
685          * Match:  VLAN ID
686          * Action: Go to table 2
687          * -------------------------------------------
688          * Example: table=1,priority=8192,vlan_id=0x5 actions=output:1,goto_table:2
689          * table=110,priority=8192,dl_vlan=2001 actions=output:2
690          */
691
692         handleVlanMiss(dpid, TABLE_1_ISOLATE_TENANT, TABLE_2_LOCAL_FORWARD, segmentationId, ethPort, false);
693     }
694
695     private long getDpid(Node node) {
696         long dpid = southbound.getDataPathId(node);
697         if (dpid == 0) {
698             LOG.warn("getDpid: dpid not found: {}", node);
699         }
700         return dpid;
701     }
702
703     private long getIntegrationBridgeOFDPID(Node node) {
704         long dpid = 0L;
705         if (southbound.getBridgeName(node).equals(configurationService.getIntegrationBridgeName())) {
706             dpid = getDpid(node);
707         }
708         return dpid;
709     }
710
711     /**
712      * Returns true is the network if of type GRE or VXLAN
713      *
714      * @param networkType The type of the network
715      * @return returns true if the network is a tunnel
716      */
717     private boolean isTunnel(String networkType)
718     {
719         return (networkType.equalsIgnoreCase(NetworkHandler.NETWORK_TYPE_GRE) || networkType.equalsIgnoreCase
720                 (NetworkHandler.NETWORK_TYPE_VXLAN));
721     }
722
723     /**
724      * Returns true if the network is of type vlan.
725      *
726      * @param networkType The type of the network
727      * @return returns true if the network is a vlan
728      */
729     private boolean isVlan(String networkType)
730     {
731         return networkType.equalsIgnoreCase(NetworkHandler.NETWORK_TYPE_VLAN);
732     }
733
734     private void programLocalRules(String networkType, String segmentationId, Node node,
735                                     OvsdbTerminationPointAugmentation intf) {
736         LOG.debug("programLocalRules: node: {}, intf: {}, networkType: {}, segmentationId: {}",
737                 node.getNodeId(), intf.getName(), networkType, segmentationId);
738         try {
739             long dpid = getIntegrationBridgeOFDPID(node);
740             if (dpid == 0L) {
741                 LOG.debug("programLocalRules: Openflow Datapath-ID not set for the integration bridge in {}",
742                         node);
743                 return;
744             }
745
746             long localPort = southbound.getOFPort(intf);
747             if (localPort == 0) {
748                 LOG.info("programLocalRules: could not find ofPort for Port {} on Node {}",
749                          intf.getName(), node.getNodeId());
750                 return;
751             }
752
753             String attachedMac = southbound.getInterfaceExternalIdsValue(intf, Constants.EXTERNAL_ID_VM_MAC);
754             if (attachedMac == null) {
755                 LOG.warn("No AttachedMac seen in {}", intf);
756                 return;
757             }
758
759             /* Program local rules based on network type */
760             if (isVlan(networkType)) {
761                 LOG.debug("Program local vlan rules for interface {}", intf.getName());
762                 programLocalVlanRules(node, dpid, segmentationId, attachedMac, localPort);
763             }
764             if ((isTunnel(networkType) || isVlan(networkType))) {
765                 programLocalSecurityGroupRules(attachedMac, node, intf, dpid, localPort, segmentationId, true);
766             }
767             if (isTunnel(networkType)) {
768                 LOG.debug("Program local bridge rules for interface {}, "
769                                 + "dpid: {}, segmentationId: {}, attachedMac: {}, localPort: {}",
770                         intf.getName(), dpid, segmentationId, attachedMac, localPort);
771                 programLocalBridgeRules(node, dpid, segmentationId, attachedMac, localPort);
772             }
773         } catch (Exception e) {
774             LOG.error("Exception in programming Local Rules for " + intf + " on " + node, e);
775         }
776     }
777
778     private void removeLocalRules(String networkType, String segmentationId, Node node,
779                                    OvsdbTerminationPointAugmentation intf) {
780         LOG.debug("removeLocalRules: node: {}, intf: {}, networkType: {}, segmentationId: {}",
781                 node.getNodeId(), intf.getName(), networkType, segmentationId);
782         try {
783             long dpid = getIntegrationBridgeOFDPID(node);
784             if (dpid == 0L) {
785                 LOG.debug("removeLocalRules: Openflow Datapath-ID not set for the integration bridge in {}", node);
786                 return;
787             }
788
789             long localPort = southbound.getOFPort(intf);
790             if (localPort == 0) {
791                 LOG.info("removeLocalRules: could not find ofPort");
792                 return;
793             }
794
795             String attachedMac = southbound.getInterfaceExternalIdsValue(intf, Constants.EXTERNAL_ID_VM_MAC);
796             if (attachedMac == null) {
797                 LOG.warn("No AttachedMac seen in {}", intf);
798                 return;
799             }
800
801             /* Program local rules based on network type */
802             if (isVlan(networkType)) {
803                 LOG.debug("Remove local vlan rules for interface {}", intf.getName());
804                 removeLocalVlanRules(node, dpid, segmentationId, attachedMac, localPort);
805             } else if (isTunnel(networkType)) {
806                 LOG.debug("Remove local bridge rules for interface {}", intf.getName());
807                 removeLocalBridgeRules(node, dpid, segmentationId, attachedMac, localPort);
808             }
809             if (isTunnel(networkType) || isVlan(networkType)) {
810                 programLocalSecurityGroupRules(attachedMac, node, intf, dpid, localPort, segmentationId, false);
811             }
812         } catch (Exception e) {
813             LOG.error("Exception in removing Local Rules for " + intf + " on " + node, e);
814         }
815     }
816
817     // TODO SB_MIGRATION
818     // Need to handle case where a node comes online after a network and tunnels have
819     // already been created. The interface update is what triggers creating the l2 forwarding flows
820     // so we don't see those updates in this case - we only see the new nodes interface updates.
821     private void programTunnelRules (String tunnelType, String segmentationId, InetAddress dst, Node node,
822                                      OvsdbTerminationPointAugmentation intf, boolean local) {
823         LOG.debug("programTunnelRules: node: {}, intf: {}, local: {}, tunnelType: {}, "
824                         + "segmentationId: {}, dstAddr: {}",
825                 node.getNodeId(), intf.getName(), local, tunnelType, segmentationId, dst.getHostAddress());
826         try {
827             long dpid = getIntegrationBridgeOFDPID(node);
828             if (dpid == 0L) {
829                 LOG.debug("programTunnelRules: Openflow Datapath-ID not set for the integration bridge in {}", node);
830                 return;
831             }
832
833             long localPort = southbound.getOFPort(intf);
834             if (localPort == 0) {
835                 LOG.info("programTunnelRules: could not find ofPort for Port {} on Node{}", intf.getName(), node.getNodeId());
836                 return;
837             }
838
839             String attachedMac = southbound.getInterfaceExternalIdsValue(intf, Constants.EXTERNAL_ID_VM_MAC);
840             if (attachedMac == null) {
841                 LOG.warn("programTunnelRules: No AttachedMac seen in {}", intf);
842                 return;
843             }
844
845             OvsdbTerminationPointAugmentation tunnelPort= southbound.getTerminationPointOfBridge(node, getTunnelName(tunnelType, dst));
846             if(tunnelPort != null){
847                 long tunnelOFPort = southbound.getOFPort(tunnelPort);
848                 if (tunnelOFPort == 0) {
849                     LOG.error("programTunnelRules: Could not Identify Tunnel port {} -> OF ({}) on {}",
850                             tunnelPort.getName(), tunnelOFPort, node);
851                     return;
852                 }
853                 LOG.debug("programTunnelRules: Identified Tunnel port {} -> OF ({}) on {}",
854                         tunnelPort.getName(), tunnelOFPort, node);
855
856                 if (!local) {
857                     LOG.trace("programTunnelRules: program remote egress tunnel rules: node {}, intf {}",
858                             node.getNodeId().getValue(), intf.getName());
859                     programRemoteEgressTunnelBridgeRules(node, dpid, segmentationId, attachedMac,
860                             tunnelOFPort, localPort);
861                 } else {
862                     LOG.trace("programTunnelRules: program local ingress tunnel rules: node {}, intf {}",
863                             node.getNodeId().getValue(), intf.getName());
864                     programLocalIngressTunnelBridgeRules(node, dpid, segmentationId, attachedMac,
865                             tunnelOFPort, localPort);
866                 }
867             }
868         } catch (Exception e) {
869             LOG.trace("", e);
870         }
871     }
872
873     private void removeTunnelRules (String tunnelType, String segmentationId, InetAddress dst, Node node,
874                                     OvsdbTerminationPointAugmentation intf,
875                                     boolean local, boolean isLastInstanceOnNode) {
876         LOG.debug("removeTunnelRules: node: {}, intf: {}, local: {}, tunnelType: {}, "
877                         + "segmentationId: {}, dstAddr: {}, isLastinstanceOnNode: {}",
878                 node.getNodeId(), intf.getName(), local, tunnelType, segmentationId, dst, isLastInstanceOnNode);
879         try {
880             long dpid = getIntegrationBridgeOFDPID(node);
881             if (dpid == 0L) {
882                 LOG.debug("removeTunnelRules: Openflow Datapath-ID not set for the integration bridge in {}", node);
883                 return;
884             }
885
886             long localPort = southbound.getOFPort(intf);
887             if (localPort == 0) {
888                 LOG.info("removeTunnelRules: could not find ofPort");
889                 return;
890             }
891
892             String attachedMac = southbound.getInterfaceExternalIdsValue(intf, Constants.EXTERNAL_ID_VM_MAC);
893             if (attachedMac == null) {
894                 LOG.error("removeTunnelRules: No AttachedMac seen in {}", intf);
895                 return;
896             }
897
898             List<OvsdbTerminationPointAugmentation> intfs = southbound.getTerminationPointsOfBridge(node);
899             for (OvsdbTerminationPointAugmentation tunIntf : intfs) {
900                 if (tunIntf.getName().equals(getTunnelName(tunnelType, dst))) {
901                     long tunnelOFPort = southbound.getOFPort(tunIntf);
902                     if (tunnelOFPort == 0) {
903                         LOG.error("Could not Identify Tunnel port {} -> OF ({}) on {}",
904                                 tunIntf.getName(), tunnelOFPort, node);
905                         return;
906                     }
907                     LOG.debug("Identified Tunnel port {} -> OF ({}) on {}",
908                             tunIntf.getName(), tunnelOFPort, node);
909
910                     if (!local) {
911                         removeRemoteEgressTunnelBridgeRules(node, dpid, segmentationId, attachedMac,
912                                 tunnelOFPort, localPort);
913                     }
914                     if (local && isLastInstanceOnNode) {
915                         removePerTunnelRules(node, dpid, segmentationId, tunnelOFPort);
916                     }
917                     return;
918                 }
919             }
920         } catch (Exception e) {
921             LOG.error("", e);
922         }
923     }
924
925     private void programVlanRules (NeutronNetwork network, Node node, OvsdbTerminationPointAugmentation intf) {
926         LOG.debug("programVlanRules: node: {}, network: {}, intf: {}",
927                 node.getNodeId(), network.getNetworkUUID(), intf.getName());
928         long dpid = getIntegrationBridgeOFDPID(node);
929         if (dpid == 0L) {
930             LOG.debug("programVlanRules: Openflow Datapath-ID not set for the integration bridge in {}", node);
931             return;
932         }
933
934         long localPort = southbound.getOFPort(intf);
935         if (localPort == 0) {
936             LOG.debug("programVlanRules: could not find ofPort for {}", intf.getName());
937             return;
938         }
939
940         String attachedMac = southbound.getInterfaceExternalIdsValue(intf, Constants.EXTERNAL_ID_VM_MAC);
941         if (attachedMac == null) {
942             LOG.debug("programVlanRules: No AttachedMac seen in {}", intf);
943             return;
944         }
945
946         String phyIfName =
947                 bridgeConfigurationManager.getPhysicalInterfaceName(node, network.getProviderPhysicalNetwork());
948         long ethOFPort = southbound.getOFPort(node, phyIfName);
949         if (ethOFPort == 0) {
950             LOG.warn("programVlanRules: could not find ofPort for physical port {}", phyIfName);
951             return;
952         }
953         LOG.debug("programVlanRules: Identified eth port {} -> ofPort ({}) on {}",
954                 phyIfName, ethOFPort, node);
955         // TODO: add logic to only add rule on remote nodes
956         programRemoteEgressVlanRules(node, dpid, network.getProviderSegmentationID(),
957                 attachedMac, ethOFPort);
958         programLocalIngressVlanRules(node, dpid, network.getProviderSegmentationID(),
959                 attachedMac, localPort, ethOFPort);
960     }
961
962     private void removeVlanRules (NeutronNetwork network, Node node, OvsdbTerminationPointAugmentation intf,
963                                   boolean isLastInstanceOnNode) {
964         LOG.debug("removeVlanRules: node: {}, network: {}, intf: {}, isLastInstanceOnNode",
965                 node.getNodeId(), network.getNetworkUUID(), intf.getName(), isLastInstanceOnNode);
966         long dpid = getIntegrationBridgeOFDPID(node);
967         if (dpid == 0L) {
968             LOG.debug("removeVlanRules: Openflow Datapath-ID not set for the integration bridge in {}", node);
969             return;
970         }
971
972         long localPort = southbound.getOFPort(intf);
973         if (localPort == 0) {
974             LOG.debug("removeVlanRules: programVlanRules: could not find ofPort for {}", intf.getName());
975             return;
976         }
977
978         String attachedMac = southbound.getInterfaceExternalIdsValue(intf, Constants.EXTERNAL_ID_VM_MAC);
979         if (attachedMac == null) {
980             LOG.debug("removeVlanRules: No AttachedMac seen in {}", intf);
981             return;
982         }
983
984         String phyIfName =
985                 bridgeConfigurationManager.getPhysicalInterfaceName(node, network.getProviderPhysicalNetwork());
986         long ethOFPort = southbound.getOFPort(node, phyIfName);
987         if (ethOFPort == 0) {
988             LOG.warn("removeVlanRules: could not find ofPort for physical port {}", phyIfName);
989             return;
990         }
991         LOG.debug("removeVlanRules: Identified eth port {} -> ofPort ({}) on {}",
992                 phyIfName, ethOFPort, node);
993
994         removeRemoteEgressVlanRules(node, dpid, network.getProviderSegmentationID(),
995                 attachedMac, localPort, ethOFPort);
996         if (isLastInstanceOnNode) {
997             removePerVlanRules(node, dpid, network.getProviderSegmentationID(), localPort, ethOFPort);
998         }
999     }
1000
1001     private void programLocalSecurityGroupRules(String attachedMac, Node node, OvsdbTerminationPointAugmentation intf,
1002                                  Long dpid,long localPort, String segmentationId,
1003                                  boolean write) {
1004
1005         LOG.debug("programLocalRules: Program fixed security group rules for interface {}", intf.getName());
1006         NeutronPort dhcpPort = securityServicesManager.getDhcpServerPort(intf);
1007         boolean isComputePort = false;
1008         boolean isLastPortinBridge = false;
1009         boolean isLastPortinSubnet = false;
1010         List<Neutron_IPs> srcAddressList = null;
1011         if (null != dhcpPort) {
1012             isComputePort = securityServicesManager.isComputePort(intf);
1013             isLastPortinBridge = securityServicesManager.isLastPortinBridge(node, intf);
1014             isLastPortinSubnet = false;
1015             if (isComputePort) {
1016                 isLastPortinSubnet = securityServicesManager.isLastPortinSubnet(node, intf);
1017                 srcAddressList = securityServicesManager.getIpAddressList(node, intf);
1018                 if (null == srcAddressList) {
1019                     LOG.warn("programLocalRules: No Ip address assigned {}", intf);
1020                     return;
1021                 }
1022             }
1023             ingressAclProvider.programFixedSecurityAcl(dpid, segmentationId, dhcpPort.getMacAddress(), localPort,
1024                                                        isLastPortinSubnet, isComputePort, write);
1025             egressAclProvider.programFixedSecurityAcl(dpid, segmentationId, attachedMac, localPort,
1026                                                       srcAddressList, isLastPortinBridge, isComputePort,write);
1027             /* If the network type is tunnel based (VXLAN/GRRE/etc) with Neutron Port Security ACLs */
1028             /* TODO SB_MIGRATION */
1029
1030             LOG.debug("Neutron port has a Port Security Group");
1031             // Retrieve the security group from the Neutron Port and apply the rules
1032             if (securityServicesManager.isPortSecurityReady(intf)) {
1033                 //Associate the security group flows.
1034                 List<NeutronSecurityGroup> securityGroupListInPort = securityServicesManager
1035                         .getSecurityGroupInPortList(intf);
1036                 for (NeutronSecurityGroup securityGroupInPort:securityGroupListInPort) {
1037                     ingressAclProvider.programPortSecurityAcl(dpid, segmentationId, attachedMac, localPort,
1038                                                               securityGroupInPort,srcAddressList, write);
1039                     egressAclProvider.programPortSecurityAcl(dpid, segmentationId, attachedMac, localPort,
1040                                                              securityGroupInPort,srcAddressList, write);
1041                 }
1042             }
1043         } else {
1044             LOG.warn("programLocalRules: No DCHP port seen in  network of {}", intf);
1045         }
1046     }
1047     @Override
1048     public boolean handleInterfaceUpdate(NeutronNetwork network, Node srcNode,
1049                                          OvsdbTerminationPointAugmentation intf) {
1050         Preconditions.checkNotNull(nodeCacheManager);
1051         Map<org.opendaylight.yang.gen.v1.urn.tbd.params.xml.ns.yang.network.topology.rev131021.NodeId,Node> nodes =
1052                 nodeCacheManager.getOvsdbNodes();
1053         nodes.remove(southbound.extractBridgeOvsdbNodeId(srcNode));
1054         String networkType = network.getProviderNetworkType();
1055         String segmentationId = network.getProviderSegmentationID();
1056         Node srcBridgeNode = southbound.getBridgeNode(srcNode, configurationService.getIntegrationBridgeName());
1057         programLocalRules(networkType, network.getProviderSegmentationID(), srcBridgeNode, intf);
1058
1059         if (isVlan(networkType)) {
1060             programVlanRules(network, srcNode, intf);
1061         } else if (isTunnel(networkType)){
1062
1063             boolean sourceTunnelStatus;
1064             boolean destTunnelStatus = false;
1065             for (Node dstNode : nodes.values()) {
1066                 InetAddress src = configurationService.getTunnelEndPoint(srcNode);
1067                 InetAddress dst = configurationService.getTunnelEndPoint(dstNode);
1068                 if ((src != null) && (dst != null)) {
1069                     sourceTunnelStatus = addTunnelPort(srcBridgeNode, networkType, src, dst);
1070
1071                     Node dstBridgeNode = southbound.getBridgeNode(dstNode,
1072                             configurationService.getIntegrationBridgeName());
1073
1074                     if(dstBridgeNode != null){
1075                         destTunnelStatus = addTunnelPort(dstBridgeNode, networkType, dst, src);
1076                     }
1077
1078                     if (sourceTunnelStatus) {
1079                         programTunnelRules(networkType, segmentationId, dst, srcBridgeNode, intf, true);
1080                     }
1081                     if (destTunnelStatus) {
1082                         programTunnelRules(networkType, segmentationId, src, dstBridgeNode, intf, false);
1083                     }
1084                 } else {
1085                     LOG.warn("Tunnel end-point configuration missing. Please configure it in OpenVSwitch Table. "
1086                                     + "Check source {} or destination {}",
1087                             src != null ? src.getHostAddress() : "null",
1088                             dst != null ? dst.getHostAddress() : "null");
1089                 }
1090             }
1091         }
1092
1093         return true;
1094     }
1095
1096     private void triggerInterfaceUpdates(Node node) {
1097         LOG.debug("enter triggerInterfaceUpdates for {}", node.getNodeId());
1098         List<OvsdbTerminationPointAugmentation> ports = southbound.extractTerminationPointAugmentations(node);
1099         if (ports != null && !ports.isEmpty()) {
1100             for (OvsdbTerminationPointAugmentation port : ports) {
1101                 NeutronNetwork neutronNetwork = tenantNetworkManager.getTenantNetwork(port);
1102                 if (neutronNetwork != null) {
1103                     LOG.warn("Trigger Interface update for {}", port);
1104                     handleInterfaceUpdate(neutronNetwork, node, port);
1105                 }
1106             }
1107         } else {
1108             LOG.warn("triggerInterfaceUpdates: tps are null");
1109         }
1110         LOG.debug("exit triggerInterfaceUpdates for {}", node.getNodeId());
1111     }
1112
1113     @Override
1114     public boolean handleInterfaceDelete(String tunnelType, NeutronNetwork network, Node srcNode,
1115                                          OvsdbTerminationPointAugmentation intf, boolean isLastInstanceOnNode) {
1116         Map<org.opendaylight.yang.gen.v1.urn.tbd.params.xml.ns.yang.network.topology.rev131021.NodeId,Node> nodes =
1117                 nodeCacheManager.getOvsdbNodes();
1118         nodes.remove(southbound.extractBridgeOvsdbNodeId(srcNode));
1119
1120         LOG.info("Delete intf " + intf.getName() + " isLastInstanceOnNode " + isLastInstanceOnNode);
1121         List<String> phyIfName = bridgeConfigurationManager.getAllPhysicalInterfaceNames(srcNode);
1122         if (southbound.isTunnel(intf)) {
1123             // Delete tunnel port
1124             try {
1125                 InetAddress src = InetAddress.getByName(
1126                         southbound.getOptionsValue(intf.getOptions(), "local_ip"));
1127                 InetAddress dst = InetAddress.getByName(
1128                         southbound.getOptionsValue(intf.getOptions(), "remote_ip"));
1129                 deleteTunnelPort(srcNode,
1130                         MdsalHelper.createOvsdbInterfaceType(intf.getInterfaceType()),
1131                         src, dst);
1132             } catch (Exception e) {
1133                 LOG.error(e.getMessage(), e);
1134             }
1135         } else if (phyIfName.contains(intf.getName())) {
1136             deletePhysicalPort(srcNode, intf.getName());
1137         } else {
1138             // delete all other interfaces
1139             removeLocalRules(network.getProviderNetworkType(), network.getProviderSegmentationID(),
1140                     srcNode, intf);
1141
1142             if (isVlan(network.getProviderNetworkType())) {
1143                 removeVlanRules(network, srcNode, intf, isLastInstanceOnNode);
1144             } else if (isTunnel(network.getProviderNetworkType())) {
1145
1146                 for (Node dstNode : nodes.values()) {
1147                     InetAddress src = configurationService.getTunnelEndPoint(srcNode);
1148                     InetAddress dst = configurationService.getTunnelEndPoint(dstNode);
1149                     if ((src != null) && (dst != null)) {
1150                         LOG.info("Remove tunnel rules for interface "
1151                                 + intf.getName() + " on srcNode " + srcNode.getNodeId().getValue());
1152                         removeTunnelRules(tunnelType, network.getProviderSegmentationID(),
1153                                 dst, srcNode, intf, true, isLastInstanceOnNode);
1154                         Node dstBridgeNode = southbound.getBridgeNode(dstNode, Constants.INTEGRATION_BRIDGE);
1155                         if(dstBridgeNode != null){
1156                             LOG.info("Remove tunnel rules for interface "
1157                                     + intf.getName() + " on dstNode " + dstNode.getNodeId().getValue());
1158                             removeTunnelRules(tunnelType, network.getProviderSegmentationID(),
1159                                     src, dstBridgeNode, intf, false, isLastInstanceOnNode);
1160                         }
1161                     } else {
1162                         LOG.warn("Tunnel end-point configuration missing. Please configure it in "
1163                                         + "OpenVSwitch Table. "
1164                                         + "Check source {} or destination {}",
1165                                 src != null ? src.getHostAddress() : "null",
1166                                 dst != null ? dst.getHostAddress() : "null");
1167                     }
1168                 }
1169             }
1170         }
1171         return true;
1172     }
1173
1174     @Override
1175     public void initializeFlowRules(Node node) {
1176         initializeFlowRules(node, configurationService.getIntegrationBridgeName());
1177         initializeFlowRules(node, configurationService.getExternalBridgeName());
1178         triggerInterfaceUpdates(node);
1179     }
1180
1181     private void initializeFlowRules(Node node, String bridgeName) {
1182         Long dpid = southbound.getDataPathId(node);
1183         String datapathId = southbound.getDatapathId(node);
1184         LOG.info("initializeFlowRules: bridgeName: {}, dpid: {} - {}",
1185                 bridgeName, dpid, datapathId);
1186
1187         if (dpid == 0L) {
1188             LOG.debug("Openflow Datapath-ID not set for the integration bridge in {}", node);
1189             return;
1190         }
1191
1192         /*
1193          * Table(0) Rule #1
1194          * ----------------
1195          * Match: LLDP (0x88CCL)
1196          * Action: Packet_In to Controller Reserved Port
1197          */
1198
1199         writeLLDPRule(dpid);
1200
1201         if (bridgeName.equals(configurationService.getExternalBridgeName())) {
1202             writeNormalRule(dpid);
1203         }
1204     }
1205
1206     /*
1207      * Create an LLDP Flow Rule to encapsulate into
1208      * a packet_in that is sent to the controller
1209      * for topology handling.
1210      * Match: Ethertype 0x88CCL
1211      * Action: Punt to Controller in a Packet_In msg
1212      */
1213
1214     private void writeLLDPRule(Long dpidLong) {
1215         classifierProvider.programLLDPPuntRule(dpidLong);
1216     }
1217
1218     /*
1219      * Create a NORMAL Table Miss Flow Rule
1220      * Match: any
1221      * Action: forward to NORMAL pipeline
1222      */
1223
1224     private void writeNormalRule(Long dpidLong) {
1225
1226         String nodeName = Constants.OPENFLOW_NODE_PREFIX + dpidLong;
1227
1228         MatchBuilder matchBuilder = new MatchBuilder();
1229         NodeBuilder nodeBuilder = createNodeBuilder(nodeName);
1230         FlowBuilder flowBuilder = new FlowBuilder();
1231
1232         // Create the OF Actions and Instructions
1233         InstructionBuilder ib = new InstructionBuilder();
1234         InstructionsBuilder isb = new InstructionsBuilder();
1235
1236         // Instructions List Stores Individual Instructions
1237         List<Instruction> instructions = Lists.newArrayList();
1238
1239         // Call the InstructionBuilder Methods Containing Actions
1240         InstructionUtils.createNormalInstructions(nodeName, ib);
1241         ib.setOrder(0);
1242         ib.setKey(new InstructionKey(0));
1243         instructions.add(ib.build());
1244
1245         // Add InstructionBuilder to the Instruction(s)Builder List
1246         isb.setInstruction(instructions);
1247
1248         // Add InstructionsBuilder to FlowBuilder
1249         flowBuilder.setInstructions(isb.build());
1250
1251         String flowId = "NORMAL";
1252         flowBuilder.setId(new FlowId(flowId));
1253         FlowKey key = new FlowKey(new FlowId(flowId));
1254         flowBuilder.setMatch(matchBuilder.build());
1255         flowBuilder.setPriority(0);
1256         flowBuilder.setBarrier(true);
1257         flowBuilder.setTableId((short) 0);
1258         flowBuilder.setKey(key);
1259         flowBuilder.setFlowName(flowId);
1260         flowBuilder.setHardTimeout(0);
1261         flowBuilder.setIdleTimeout(0);
1262         writeFlow(flowBuilder, nodeBuilder);
1263     }
1264
1265     /*
1266      * (Table:0) Ingress Tunnel Traffic
1267      * Match: OpenFlow InPort and Tunnel ID
1268      * Action: GOTO Local Table (10)
1269      * table=0,tun_id=0x5,in_port=10, actions=goto_table:2
1270      */
1271
1272     private void handleTunnelIn(Long dpidLong, Short writeTable,
1273             Short goToTableId, String segmentationId,
1274             Long ofPort, boolean write) {
1275         classifierProvider.programTunnelIn(dpidLong, segmentationId, ofPort, write);
1276     }
1277
1278     /*
1279      * (Table:0) Ingress VLAN Traffic
1280      * Match: OpenFlow InPort and vlan ID
1281      * Action: GOTO Local Table (20)
1282      * table=0,vlan_id=0x5,in_port=10, actions=goto_table:2
1283      */
1284
1285     private void handleVlanIn(Long dpidLong, Short writeTable, Short goToTableId,
1286             String segmentationId,  Long ethPort, boolean write) {
1287         classifierProvider.programVlanIn(dpidLong, segmentationId, ethPort, write);
1288     }
1289
1290     /*
1291      * (Table:0) Egress VM Traffic Towards TEP
1292      * Match: Destination Ethernet Addr and OpenFlow InPort
1293      * Instruction: Set TunnelID and GOTO Table Tunnel Table (n)
1294      * table=0,in_port=2,dl_src=00:00:00:00:00:01 \
1295      * actions=set_field:5->tun_id,goto_table=1"
1296      */
1297
1298     private void handleLocalInPort(Long dpidLong, Short writeTable, Short goToTableId,
1299             String segmentationId, Long inPort, String attachedMac,
1300             boolean write) {
1301         classifierProvider.programLocalInPort(dpidLong, segmentationId, inPort, attachedMac, write);
1302     }
1303
1304     /*
1305      * (Table:0) Egress VM Traffic Towards TEP
1306      * Match: Source Ethernet Addr and OpenFlow InPort
1307      * Instruction: Set VLANID and GOTO Table Egress (n)
1308      * table=0,in_port=2,dl_src=00:00:00:00:00:01 \
1309      * actions=push_vlan, set_field:5->vlan_id,goto_table=1"
1310      */
1311
1312     private void handleLocalInPortSetVlan(Long dpidLong, Short writeTable,
1313             Short goToTableId, String segmentationId,
1314             Long inPort, String attachedMac,
1315             boolean write) {
1316         classifierProvider.programLocalInPortSetVlan(dpidLong, segmentationId, inPort, attachedMac, write);
1317     }
1318
1319     /*
1320      * (Table:0) Drop frames source from a VM that do not
1321      * match the associated MAC address of the local VM.
1322      * Match: Low priority anything not matching the VM SMAC
1323      * Instruction: Drop
1324      * table=0,priority=16384,in_port=1 actions=drop"
1325      */
1326
1327     private void handleDropSrcIface(Long dpidLong, Long inPort, boolean write) {
1328         classifierProvider.programDropSrcIface(dpidLong, inPort, write);
1329     }
1330
1331     /*
1332      * (Table:1) Egress Tunnel Traffic
1333      * Match: Destination Ethernet Addr and Local InPort
1334      * Instruction: Set TunnelID and GOTO Table Tunnel Table (n)
1335      * table=1,tun_id=0x5,dl_dst=00:00:00:00:00:08 \
1336      * actions=output:10,goto_table:2"
1337      */
1338     private void handleTunnelOut(Long dpidLong, Short writeTable,
1339             Short goToTableId, String segmentationId,
1340             Long OFPortOut, String attachedMac,
1341             boolean write) {
1342         l2ForwardingProvider.programTunnelOut(dpidLong, segmentationId, OFPortOut, attachedMac, write);
1343     }
1344
1345     /*
1346      * (Table:1) Egress VLAN Traffic
1347      * Match: Destination Ethernet Addr and VLAN id
1348      * Instruction: GOTO Table Table 2
1349      * table=1,vlan_id=0x5,dl_dst=00:00:00:00:00:08 \
1350      * actions= goto_table:2"
1351      */
1352     // TODO This method is referenced from commented code above (which needs to be checked)
1353     @SuppressWarnings("unused")
1354     private void handleVlanOut(Long dpidLong, Short writeTable,
1355             Short goToTableId, String segmentationId,
1356             Long ethPort, String attachedMac, boolean write) {
1357         l2ForwardingProvider.programVlanOut(dpidLong, segmentationId, ethPort, attachedMac, write);
1358     }
1359
1360     /*
1361      * (Table:1) Egress Tunnel Traffic
1362      * Match: Destination Ethernet Addr and Local InPort
1363      * Instruction: Set TunnelID and GOTO Table Tunnel Table (n)
1364      * table=1,priority=16384,tun_id=0x5,dl_dst=ff:ff:ff:ff:ff:ff \
1365      * actions=output:10,output:11,goto_table:2
1366      */
1367
1368     private void handleTunnelFloodOut(Long dpidLong, Short writeTable,
1369             Short localTable, String segmentationId,
1370             Long OFPortOut, boolean write) {
1371         l2ForwardingProvider.programTunnelFloodOut(dpidLong, segmentationId, OFPortOut, write);
1372     }
1373
1374     /*
1375      * (Table:1) Egress VLAN Traffic
1376      * Match: Destination Ethernet Addr and VLAN id
1377      * Instruction: GOTO table 2 and Output port eth interface
1378      * Example: table=1,priority=16384,vlan_id=0x5,dl_dst=ff:ff:ff:ff:ff:ff \
1379      * actions=output:eth1,goto_table:2
1380      */
1381     // TODO This method is referenced from commented code above (which needs to be checked)
1382     @SuppressWarnings("unused")
1383     private void handleVlanFloodOut(Long dpidLong, Short writeTable,
1384             Short localTable, String segmentationId,
1385             Long localPort, Long ethPort, boolean write) {
1386         //l2ForwardingProvider.programVlanFloodOut(dpidLong, segmentationId, localPort, ethPort, write);
1387     }
1388
1389     /*
1390      * (Table:1) Table Drain w/ Catch All
1391      * Match: Tunnel ID
1392      * Action: GOTO Local Table (10)
1393      * table=2,priority=8192,tun_id=0x5 actions=drop
1394      */
1395
1396     private void handleTunnelMiss(Long dpidLong, Short writeTable,
1397             Short goToTableId, String segmentationId,
1398             boolean write) {
1399         l2ForwardingProvider.programTunnelMiss(dpidLong, segmentationId, write);
1400     }
1401
1402
1403     /*
1404      * (Table:1) Table Drain w/ Catch All
1405      * Match: Vlan ID
1406      * Action: Output port eth interface
1407      * table=1,priority=8192,vlan_id=0x5 actions= output port:eth1
1408      * table=110,priority=8192,dl_vlan=2001 actions=output:2
1409      */
1410
1411     private void handleVlanMiss(Long dpidLong, Short writeTable,
1412             Short goToTableId, String segmentationId,
1413             Long ethPort, boolean write) {
1414         l2ForwardingProvider.programVlanMiss(dpidLong, segmentationId, ethPort, write);
1415     }
1416
1417     /*
1418      * (Table:1) Local Broadcast Flood
1419      * Match: Tunnel ID and dMAC
1420      * Action: Output Port
1421      * table=2,tun_id=0x5,dl_dst=00:00:00:00:00:01 actions=output:2
1422      */
1423
1424     private void handleLocalUcastOut(Long dpidLong, Short writeTable,
1425             String segmentationId, Long localPort,
1426             String attachedMac, boolean write) {
1427         l2ForwardingProvider.programLocalUcastOut(dpidLong, segmentationId, localPort, attachedMac, write);
1428     }
1429
1430     /*
1431      * (Table:2) Local VLAN unicast
1432      * Match: VLAN ID and dMAC
1433      * Action: Output Port
1434      * table=2,vlan_id=0x5,dl_dst=00:00:00:00:00:01 actions=output:2
1435      */
1436
1437     private void handleLocalVlanUcastOut(Long dpidLong, Short writeTable,
1438             String segmentationId, Long localPort,
1439             String attachedMac, boolean write) {
1440         l2ForwardingProvider.programLocalVlanUcastOut(dpidLong, segmentationId, localPort, attachedMac, write);
1441     }
1442
1443     /*
1444      * (Table:2) Local Broadcast Flood
1445      * Match: Tunnel ID and dMAC (::::FF:FF)
1446      * table=2,priority=16384,tun_id=0x5,dl_dst=ff:ff:ff:ff:ff:ff \
1447      * actions=output:2,3,4,5
1448      */
1449
1450     private void handleLocalBcastOut(Long dpidLong, Short writeTable,
1451             String segmentationId, Long localPort,
1452             boolean write) {
1453         l2ForwardingProvider.programLocalBcastOut(dpidLong, segmentationId, localPort, write);
1454     }
1455
1456     /*
1457      * (Table:2) Local VLAN Broadcast Flood
1458      * Match: vlan ID and dMAC (::::FF:FF)
1459      * table=2,priority=16384,vlan_id=0x5,dl_dst=ff:ff:ff:ff:ff:ff \
1460      * actions=strip_vlan, output:2,3,4,5
1461      * table=110,dl_vlan=2001,dl_dst=01:00:00:00:00:00/01:00:00:00:00:00 actions=output:2,pop_vlan,output:1,output:3,output:4
1462      */
1463
1464     private void handleLocalVlanBcastOut(Long dpidLong, Short writeTable, String segmentationId,
1465                                          Long localPort, Long ethPort, boolean write) {
1466         l2ForwardingProvider.programLocalVlanBcastOut(dpidLong, segmentationId, localPort, ethPort, write);
1467     }
1468
1469     /*
1470      * (Table:1) Local Table Miss
1471      * Match: Any Remaining Flows w/a TunID
1472      * Action: Drop w/ a low priority
1473      * table=2,priority=8192,tun_id=0x5 actions=drop
1474      */
1475
1476     private void handleLocalTableMiss(Long dpidLong, Short writeTable,
1477             String segmentationId, boolean write) {
1478         l2ForwardingProvider.programLocalTableMiss(dpidLong, segmentationId, write);
1479     }
1480
1481     /*
1482      * (Table:1) Local Table Miss
1483      * Match: Any Remaining Flows w/a VLAN ID
1484      * Action: Drop w/ a low priority
1485      * table=2,priority=8192,vlan_id=0x5 actions=drop
1486      */
1487     // TODO This method is referenced from commented code above (which needs to be checked)
1488     @SuppressWarnings("unused")
1489     private void handleLocalVlanTableMiss(Long dpidLong, Short writeTable,
1490             String segmentationId, boolean write) {
1491         l2ForwardingProvider.programLocalVlanTableMiss(dpidLong, segmentationId, write);
1492     }
1493
1494     private Group getGroup(GroupBuilder groupBuilder, NodeBuilder nodeBuilder) {
1495         InstanceIdentifier<Group> path1 = InstanceIdentifier.builder(Nodes.class).child(org.opendaylight.yang.gen.v1.urn.opendaylight.inventory
1496                 .rev130819.nodes.Node.class, nodeBuilder.getKey()).augmentation(FlowCapableNode.class).child(Group.class,
1497                         new GroupKey(groupBuilder.getGroupId())).build();
1498         ReadOnlyTransaction readTx = dataBroker.newReadOnlyTransaction();
1499         try {
1500             Optional<Group> data = readTx.read(LogicalDatastoreType.CONFIGURATION, path1).get();
1501             if (data.isPresent()) {
1502                 return data.get();
1503             }
1504         } catch (InterruptedException|ExecutionException e) {
1505             LOG.error(e.getMessage(), e);
1506         }
1507
1508         LOG.debug("Cannot find data for Group " + groupBuilder.getGroupName());
1509         return null;
1510     }
1511
1512     private void writeGroup(GroupBuilder groupBuilder, NodeBuilder nodeBuilder) {
1513         ReadWriteTransaction modification = dataBroker.newReadWriteTransaction();
1514         InstanceIdentifier<Group> path1 = InstanceIdentifier.builder(Nodes.class).child(org.opendaylight.yang.gen.v1.urn.opendaylight.inventory
1515                 .rev130819.nodes.Node.class, nodeBuilder.getKey()).augmentation(FlowCapableNode.class).child(Group.class,
1516                         new GroupKey(groupBuilder.getGroupId())).build();
1517         modification.put(LogicalDatastoreType.CONFIGURATION, path1, groupBuilder.build(), true /*createMissingParents*/);
1518
1519         CheckedFuture<Void, TransactionCommitFailedException> commitFuture = modification.submit();
1520         try {
1521             commitFuture.get();  // TODO: Make it async (See bug 1362)
1522             LOG.debug("Transaction success for write of Group " + groupBuilder.getGroupName());
1523         } catch (InterruptedException|ExecutionException e) {
1524             LOG.error(e.getMessage(), e);
1525         }
1526     }
1527
1528     private void removeGroup(GroupBuilder groupBuilder, NodeBuilder nodeBuilder) {
1529         WriteTransaction modification = dataBroker.newWriteOnlyTransaction();
1530         InstanceIdentifier<Group> path1 = InstanceIdentifier.builder(Nodes.class).child(org.opendaylight.yang.gen.v1.urn.opendaylight.inventory
1531                 .rev130819.nodes.Node.class, nodeBuilder.getKey()).augmentation(FlowCapableNode.class).child(Group.class,
1532                         new GroupKey(groupBuilder.getGroupId())).build();
1533         modification.delete(LogicalDatastoreType.CONFIGURATION, path1);
1534         CheckedFuture<Void, TransactionCommitFailedException> commitFuture = modification.submit();
1535
1536         try {
1537             commitFuture.get();  // TODO: Make it async (See bug 1362)
1538             LOG.debug("Transaction success for deletion of Group " + groupBuilder.getGroupName());
1539         } catch (InterruptedException|ExecutionException e) {
1540             LOG.error(e.getMessage(), e);
1541         }
1542     }
1543
1544     private void writeFlow(FlowBuilder flowBuilder, NodeBuilder nodeBuilder) {
1545         ReadWriteTransaction modification = dataBroker.newReadWriteTransaction();
1546         InstanceIdentifier<Flow> path1 =
1547                 InstanceIdentifier.builder(Nodes.class).child(org.opendaylight.yang.gen.v1.urn.opendaylight.inventory
1548                                 .rev130819.nodes.Node.class,
1549                         nodeBuilder.getKey()).augmentation(FlowCapableNode.class).child(Table.class,
1550                         new TableKey(flowBuilder.getTableId())).child(Flow.class, flowBuilder.getKey()).build();
1551
1552         //modification.put(LogicalDatastoreType.OPERATIONAL, path1, flowBuilder.build());
1553         modification.put(LogicalDatastoreType.CONFIGURATION, path1, flowBuilder.build(),
1554                 true);//createMissingParents
1555
1556
1557         CheckedFuture<Void, TransactionCommitFailedException> commitFuture = modification.submit();
1558         try {
1559             commitFuture.get();  // TODO: Make it async (See bug 1362)
1560             LOG.debug("Transaction success for write of Flow " + flowBuilder.getFlowName());
1561         } catch (InterruptedException|ExecutionException e) {
1562             LOG.error(e.getMessage(), e);
1563         }
1564     }
1565
1566     /**
1567      * Create Output Port Group Instruction
1568      *
1569      * @param ib       Map InstructionBuilder without any instructions
1570      * @param dpidLong Long the datapath ID of a switch/node
1571      * @param port     Long representing a port on a switch/node
1572      * @return ib InstructionBuilder Map with instructions
1573      */
1574     // TODO This method is referenced from commented code in L2ForwardingService (which needs to be checked)
1575     @SuppressWarnings("unused")
1576     protected InstructionBuilder createOutputGroupInstructions(NodeBuilder nodeBuilder,
1577             InstructionBuilder ib,
1578             Long dpidLong, Long port ,
1579             List<Instruction> instructions) {
1580         NodeConnectorId ncid = new NodeConnectorId(Constants.OPENFLOW_NODE_PREFIX + dpidLong + ":" + port);
1581         LOG.debug("createOutputGroupInstructions() Node Connector ID is - Type=openflow: DPID={} port={} existingInstructions={}", dpidLong, port, instructions);
1582
1583         List<Action> actionList = Lists.newArrayList();
1584         ActionBuilder ab = new ActionBuilder();
1585
1586         List<Action> existingActions;
1587         if (instructions != null) {
1588             for (Instruction in : instructions) {
1589                 if (in.getInstruction() instanceof ApplyActionsCase) {
1590                     existingActions = (((ApplyActionsCase) in.getInstruction()).getApplyActions().getAction());
1591                     actionList.addAll(existingActions);
1592                 }
1593             }
1594         }
1595
1596         GroupBuilder groupBuilder = new GroupBuilder();
1597         Group group = null;
1598
1599         /* Create output action for this port*/
1600         OutputActionBuilder oab = new OutputActionBuilder();
1601         oab.setOutputNodeConnector(ncid);
1602         ab.setAction(new OutputActionCaseBuilder().setOutputAction(oab.build()).build());
1603         LOG.debug("createOutputGroupInstructions(): output action {}", ab.build());
1604         boolean addNew = true;
1605         boolean groupActionAdded = false;
1606
1607         /* Find the group action and get the group */
1608         for (Action action : actionList) {
1609             if (action.getAction() instanceof GroupActionCase) {
1610                 groupActionAdded = true;
1611                 GroupActionCase groupAction = (GroupActionCase) action.getAction();
1612                 Long id = groupAction.getGroupAction().getGroupId();
1613                 String groupName = groupAction.getGroupAction().getGroup();
1614                 GroupKey key = new GroupKey(new GroupId(id));
1615
1616                 groupBuilder.setGroupId(new GroupId(id));
1617                 groupBuilder.setGroupName(groupName);
1618                 groupBuilder.setGroupType(GroupTypes.GroupAll);
1619                 groupBuilder.setKey(key);
1620                 group = getGroup(groupBuilder, nodeBuilder);
1621                 LOG.debug("createOutputGroupInstructions: group {}", group);
1622                 break;
1623             }
1624         }
1625
1626         LOG.debug("createOutputGroupInstructions: groupActionAdded {}", groupActionAdded);
1627         if (groupActionAdded) {
1628             /* modify the action bucket in group */
1629             groupBuilder = new GroupBuilder(group);
1630             Buckets buckets = groupBuilder.getBuckets();
1631             for (Bucket bucket : buckets.getBucket()) {
1632                 List<Action> bucketActions = bucket.getAction();
1633                 LOG.debug("createOutputGroupInstructions: bucketActions {}", bucketActions);
1634                 for (Action action : bucketActions) {
1635                     if (action.getAction() instanceof OutputActionCase) {
1636                         OutputActionCase opAction = (OutputActionCase)action.getAction();
1637                         /* If output port action already in the action list of one of the buckets, skip */
1638                         if (opAction.getOutputAction().getOutputNodeConnector().equals(new Uri(ncid))) {
1639                             addNew = false;
1640                             break;
1641                         }
1642                     }
1643                 }
1644             }
1645             LOG.debug("createOutputGroupInstructions: addNew {}", addNew);
1646             if (addNew) {
1647                 /* the new output action is not in the bucket, add to bucket */
1648                 if (!buckets.getBucket().isEmpty()) {
1649                     Bucket bucket = buckets.getBucket().get(0);
1650                     List<Action> bucketActionList = Lists.newArrayList();
1651                     bucketActionList.addAll(bucket.getAction());
1652                     /* set order for new action and add to action list */
1653                     ab.setOrder(bucketActionList.size());
1654                     ab.setKey(new ActionKey(bucketActionList.size()));
1655                     bucketActionList.add(ab.build());
1656
1657                     /* set bucket and buckets list. Reset groupBuilder with new buckets.*/
1658                     BucketsBuilder bucketsBuilder = new BucketsBuilder();
1659                     List<Bucket> bucketList = Lists.newArrayList();
1660                     BucketBuilder bucketBuilder = new BucketBuilder();
1661                     bucketBuilder.setBucketId(new BucketId((long) 1));
1662                     bucketBuilder.setKey(new BucketKey(new BucketId((long) 1)));
1663                     bucketBuilder.setAction(bucketActionList);
1664                     bucketList.add(bucketBuilder.build());
1665                     bucketsBuilder.setBucket(bucketList);
1666                     groupBuilder.setBuckets(bucketsBuilder.build());
1667                     LOG.debug("createOutputGroupInstructions: bucketList {}", bucketList);
1668                 }
1669             }
1670         } else {
1671             /* create group */
1672             groupBuilder = new GroupBuilder();
1673             groupBuilder.setGroupType(GroupTypes.GroupAll);
1674             groupBuilder.setGroupId(new GroupId(groupId));
1675             groupBuilder.setKey(new GroupKey(new GroupId(groupId)));
1676             groupBuilder.setGroupName("Output port group " + groupId);
1677             groupBuilder.setBarrier(false);
1678
1679             BucketsBuilder bucketBuilder = new BucketsBuilder();
1680             List<Bucket> bucketList = Lists.newArrayList();
1681             BucketBuilder bucket = new BucketBuilder();
1682             bucket.setBucketId(new BucketId((long) 1));
1683             bucket.setKey(new BucketKey(new BucketId((long) 1)));
1684
1685             /* put output action to the bucket */
1686             List<Action> bucketActionList = Lists.newArrayList();
1687             /* set order for new action and add to action list */
1688             ab.setOrder(bucketActionList.size());
1689             ab.setKey(new ActionKey(bucketActionList.size()));
1690             bucketActionList.add(ab.build());
1691
1692             bucket.setAction(bucketActionList);
1693             bucketList.add(bucket.build());
1694             bucketBuilder.setBucket(bucketList);
1695             groupBuilder.setBuckets(bucketBuilder.build());
1696
1697             /* Add new group action */
1698             GroupActionBuilder groupActionB = new GroupActionBuilder();
1699             groupActionB.setGroupId(groupId);
1700             groupActionB.setGroup("Output port group " + groupId);
1701             ab = new ActionBuilder();
1702             ab.setAction(new GroupActionCaseBuilder().setGroupAction(groupActionB.build()).build());
1703             ab.setOrder(actionList.size());
1704             ab.setKey(new ActionKey(actionList.size()));
1705             actionList.add(ab.build());
1706
1707             groupId++;
1708         }
1709         LOG.debug("createOutputGroupInstructions: group {}", groupBuilder.build());
1710         LOG.debug("createOutputGroupInstructions: actionList {}", actionList);
1711
1712         if (addNew) {
1713             /* rewrite the group to group table */
1714             writeGroup(groupBuilder, nodeBuilder);
1715         }
1716
1717         // Create an Apply Action
1718         ApplyActionsBuilder aab = new ApplyActionsBuilder();
1719         aab.setAction(actionList);
1720         ib.setInstruction(new ApplyActionsCaseBuilder().setApplyActions(aab.build()).build());
1721
1722         return ib;
1723     }
1724
1725     /**
1726      * Remove Output Port from action list in group bucket
1727      *
1728      * @param ib       Map InstructionBuilder without any instructions
1729      * @param dpidLong Long the datapath ID of a switch/node
1730      * @param port     Long representing a port on a switch/node
1731      * @return ib InstructionBuilder Map with instructions
1732      */
1733     // TODO This method is referenced from commented code in L2ForwardingService (which needs to be checked)
1734     @SuppressWarnings("unused")
1735     protected boolean removeOutputPortFromGroup(NodeBuilder nodeBuilder, InstructionBuilder ib,
1736             Long dpidLong, Long port , List<Instruction> instructions) {
1737
1738         NodeConnectorId ncid = new NodeConnectorId(Constants.OPENFLOW_NODE_PREFIX + dpidLong + ":" + port);
1739         LOG.debug("removeOutputPortFromGroup() Node Connector ID is - Type=openflow: DPID={} port={} existingInstructions={}", dpidLong, port, instructions);
1740
1741         List<Action> actionList = Lists.newArrayList();
1742         ActionBuilder ab;
1743
1744         List<Action> existingActions;
1745         if (instructions != null) {
1746             for (Instruction in : instructions) {
1747                 if (in.getInstruction() instanceof ApplyActionsCase) {
1748                     existingActions = (((ApplyActionsCase) in.getInstruction()).getApplyActions().getAction());
1749                     actionList.addAll(existingActions);
1750                     break;
1751                 }
1752             }
1753         }
1754
1755         GroupBuilder groupBuilder = new GroupBuilder();
1756         Group group = null;
1757         boolean groupActionAdded = false;
1758         /* Find the group action and get the group */
1759         for (Action action : actionList) {
1760             if (action.getAction() instanceof GroupActionCase) {
1761                 groupActionAdded = true;
1762                 GroupActionCase groupAction = (GroupActionCase) action.getAction();
1763                 Long id = groupAction.getGroupAction().getGroupId();
1764                 String groupName = groupAction.getGroupAction().getGroup();
1765                 GroupKey key = new GroupKey(new GroupId(id));
1766
1767                 groupBuilder.setGroupId(new GroupId(id));
1768                 groupBuilder.setGroupName(groupName);
1769                 groupBuilder.setGroupType(GroupTypes.GroupAll);
1770                 groupBuilder.setKey(key);
1771                 group = getGroup(groupBuilder, nodeBuilder);
1772                 break;
1773             }
1774         }
1775
1776         if (groupActionAdded) {
1777             /* modify the action bucket in group */
1778             groupBuilder = new GroupBuilder(group);
1779             Buckets buckets = groupBuilder.getBuckets();
1780             List<Action> bucketActions = Lists.newArrayList();
1781             for (Bucket bucket : buckets.getBucket()) {
1782                 int index = 0;
1783                 boolean isPortDeleted = false;
1784                 bucketActions = bucket.getAction();
1785                 for (Action action : bucketActions) {
1786                     if (action.getAction() instanceof OutputActionCase) {
1787                         OutputActionCase opAction = (OutputActionCase)action.getAction();
1788                         if (opAction.getOutputAction().getOutputNodeConnector().equals(new Uri(ncid))) {
1789                             /* Find the output port in action list and remove */
1790                             index = bucketActions.indexOf(action);
1791                             bucketActions.remove(action);
1792                             isPortDeleted = true;
1793                             break;
1794                         }
1795                     }
1796                 }
1797                 if (isPortDeleted && !bucketActions.isEmpty()) {
1798                     for (int i = index; i< bucketActions.size(); i++) {
1799                         Action action = bucketActions.get(i);
1800                         if (action.getOrder() != i) {
1801                             /* Shift the action order */
1802                             ab = new ActionBuilder();
1803                             ab.setAction(action.getAction());
1804                             ab.setOrder(i);
1805                             ab.setKey(new ActionKey(i));
1806                             Action actionNewOrder = ab.build();
1807                             bucketActions.remove(action);
1808                             bucketActions.add(i, actionNewOrder);
1809                         }
1810                     }
1811
1812                 } else if (bucketActions.isEmpty()) {
1813                     /* remove bucket with empty action list */
1814                     buckets.getBucket().remove(bucket);
1815                     break;
1816                 }
1817             }
1818             if (!buckets.getBucket().isEmpty()) {
1819                 /* rewrite the group to group table */
1820                 /* set bucket and buckets list. Reset groupBuilder with new buckets.*/
1821                 BucketsBuilder bucketsBuilder = new BucketsBuilder();
1822                 List<Bucket> bucketList = Lists.newArrayList();
1823                 BucketBuilder bucketBuilder = new BucketBuilder();
1824                 bucketBuilder.setBucketId(new BucketId((long) 1));
1825                 bucketBuilder.setKey(new BucketKey(new BucketId((long) 1)));
1826                 bucketBuilder.setAction(bucketActions);
1827                 bucketList.add(bucketBuilder.build());
1828                 bucketsBuilder.setBucket(bucketList);
1829                 groupBuilder.setBuckets(bucketsBuilder.build());
1830                 LOG.debug("removeOutputPortFromGroup: bucketList {}", bucketList);
1831
1832                 writeGroup(groupBuilder, nodeBuilder);
1833                 ApplyActionsBuilder aab = new ApplyActionsBuilder();
1834                 aab.setAction(actionList);
1835                 ib.setInstruction(new ApplyActionsCaseBuilder().setApplyActions(aab.build()).build());
1836                 return false;
1837             } else {
1838                 /* remove group with empty bucket. return true to delete flow */
1839                 removeGroup(groupBuilder, nodeBuilder);
1840                 return true;
1841             }
1842         } else {
1843             /* no group for port list. flow can be removed */
1844             return true;
1845         }
1846     }
1847
1848     @Override
1849     public void initializeOFFlowRules(Node openflowNode) {
1850         String bridgeName = southbound.getBridgeName(openflowNode);
1851         LOG.info("initializeOFFlowRules: bridgeName: {}", bridgeName);
1852         if (bridgeName.equals(configurationService.getIntegrationBridgeName())) {
1853             initializeFlowRules(openflowNode, configurationService.getIntegrationBridgeName());
1854             triggerInterfaceUpdates(openflowNode);
1855         } else if (bridgeName.equals(configurationService.getExternalBridgeName())) {
1856             initializeFlowRules(openflowNode, configurationService.getExternalBridgeName());
1857             LOG.info("initializeOFFlowRules after writeFlow: bridgeName: {}", bridgeName);
1858             triggerInterfaceUpdates(openflowNode);
1859             LOG.info("initializeOFFlowRules after triggerUpdates: bridgeName: {}", bridgeName);
1860         }
1861     }
1862
1863     public static NodeBuilder createNodeBuilder(String nodeId) {
1864         NodeBuilder builder = new NodeBuilder();
1865         builder.setId(new NodeId(nodeId));
1866         builder.setKey(new NodeKey(builder.getId()));
1867         return builder;
1868     }
1869
1870     @Override
1871     public void setDependencies(BundleContext bundleContext, ServiceReference serviceReference) {
1872         this.bundleContext = bundleContext;
1873         configurationService =
1874                 (ConfigurationService) ServiceHelper.getGlobalInstance(ConfigurationService.class, this);
1875         tenantNetworkManager =
1876                 (TenantNetworkManager) ServiceHelper.getGlobalInstance(TenantNetworkManager.class, this);
1877         bridgeConfigurationManager =
1878                 (BridgeConfigurationManager) ServiceHelper.getGlobalInstance(BridgeConfigurationManager.class, this);
1879         nodeCacheManager =
1880                 (NodeCacheManager) ServiceHelper.getGlobalInstance(NodeCacheManager.class, this);
1881         classifierProvider =
1882                 (ClassifierProvider) ServiceHelper.getGlobalInstance(ClassifierProvider.class, this);
1883         ingressAclProvider =
1884                 (IngressAclProvider) ServiceHelper.getGlobalInstance(IngressAclProvider.class, this);
1885         egressAclProvider =
1886                 (EgressAclProvider) ServiceHelper.getGlobalInstance(EgressAclProvider.class, this);
1887         l2ForwardingProvider =
1888                 (L2ForwardingProvider) ServiceHelper.getGlobalInstance(L2ForwardingProvider.class, this);
1889         securityServicesManager =
1890                 (SecurityServicesManager) ServiceHelper.getGlobalInstance(SecurityServicesManager.class, this);
1891         southbound =
1892                 (Southbound) ServiceHelper.getGlobalInstance(Southbound.class, this);
1893     }
1894
1895     @Override
1896     public void setDependencies(Object impl) {
1897         if (impl instanceof NetworkingProviderManager) {
1898             NetworkingProviderManager networkingProviderManager = (NetworkingProviderManager) impl;
1899             networkingProviderManager.providerAdded(
1900                     bundleContext.getServiceReference(NetworkingProvider.class.getName()), this);
1901         }
1902     }
1903 }