blob: 5c3ce65f069a5bdf4305a645062bcfd8fd3d0bee [file] [log] [blame]
Dan Talaycob66b1122010-02-10 22:38:49 -08001"""
2OpenFlow message parsing functions
3"""
4
5import sys
Dan Talayco235d7cb2010-03-12 10:03:18 -08006import logging
Rich Laneed1fa2d2013-01-08 13:23:37 -08007import message
8import error
9import action
10import cstruct
Dan Talaycof75360a2010-02-05 22:22:54 -080011from action_list import action_list
Dan Talaycob66b1122010-02-10 22:38:49 -080012try:
Dan Talayco958f3b92010-03-12 21:58:57 -080013 import scapy.all as scapy
Dan Talaycob66b1122010-02-10 22:38:49 -080014except:
Dan Talaycod2ca1032010-03-10 14:40:26 -080015 try:
Dan Talayco958f3b92010-03-12 21:58:57 -080016 import scapy as scapy
Dan Talaycod2ca1032010-03-10 14:40:26 -080017 except:
18 sys.exit("Need to install scapy for packet parsing")
Dan Talaycof75360a2010-02-05 22:22:54 -080019
20"""
21of_message.py
22Contains wrapper functions and classes for the of_message namespace
23that are generated by hand. It includes the rest of the wrapper
24function information into the of_message namespace
25"""
26
Dan Talayco48370102010-03-03 15:17:33 -080027parse_logger = logging.getLogger("parse")
28#parse_logger.setLevel(logging.DEBUG)
Dan Talayco08d9dfe2010-02-12 23:02:11 -080029
Dan Talaycof75360a2010-02-05 22:22:54 -080030# These message types are subclassed
31msg_type_subclassed = [
Rich Laneed1fa2d2013-01-08 13:23:37 -080032 cstruct.OFPT_STATS_REQUEST,
33 cstruct.OFPT_STATS_REPLY,
34 cstruct.OFPT_ERROR
Dan Talaycof75360a2010-02-05 22:22:54 -080035]
36
37# Maps from sub-types to classes
38stats_reply_to_class_map = {
Rich Laneed1fa2d2013-01-08 13:23:37 -080039 cstruct.OFPST_DESC : message.desc_stats_reply,
40 cstruct.OFPST_AGGREGATE : message.aggregate_stats_reply,
41 cstruct.OFPST_FLOW : message.flow_stats_reply,
42 cstruct.OFPST_TABLE : message.table_stats_reply,
43 cstruct.OFPST_PORT : message.port_stats_reply,
44 cstruct.OFPST_QUEUE : message.queue_stats_reply
Dan Talaycof75360a2010-02-05 22:22:54 -080045}
46
47stats_request_to_class_map = {
Rich Laneed1fa2d2013-01-08 13:23:37 -080048 cstruct.OFPST_DESC : message.desc_stats_request,
49 cstruct.OFPST_AGGREGATE : message.aggregate_stats_request,
50 cstruct.OFPST_FLOW : message.flow_stats_request,
51 cstruct.OFPST_TABLE : message.table_stats_request,
52 cstruct.OFPST_PORT : message.port_stats_request,
53 cstruct.OFPST_QUEUE : message.queue_stats_request
Dan Talaycof75360a2010-02-05 22:22:54 -080054}
55
56error_to_class_map = {
Rich Laneed1fa2d2013-01-08 13:23:37 -080057 cstruct.OFPET_HELLO_FAILED : message.hello_failed_error_msg,
58 cstruct.OFPET_BAD_REQUEST : message.bad_request_error_msg,
59 cstruct.OFPET_BAD_ACTION : message.bad_action_error_msg,
60 cstruct.OFPET_FLOW_MOD_FAILED : message.flow_mod_failed_error_msg,
61 cstruct.OFPET_PORT_MOD_FAILED : message.port_mod_failed_error_msg,
62 cstruct.OFPET_QUEUE_OP_FAILED : message.queue_op_failed_error_msg
Dan Talaycof75360a2010-02-05 22:22:54 -080063}
64
65# Map from header type value to the underlieing message class
66msg_type_to_class_map = {
Rich Laneed1fa2d2013-01-08 13:23:37 -080067 cstruct.OFPT_HELLO : message.hello,
68 cstruct.OFPT_ERROR : message.error,
69 cstruct.OFPT_ECHO_REQUEST : message.echo_request,
70 cstruct.OFPT_ECHO_REPLY : message.echo_reply,
71 cstruct.OFPT_VENDOR : message.vendor,
72 cstruct.OFPT_FEATURES_REQUEST : message.features_request,
73 cstruct.OFPT_FEATURES_REPLY : message.features_reply,
74 cstruct.OFPT_GET_CONFIG_REQUEST : message.get_config_request,
75 cstruct.OFPT_GET_CONFIG_REPLY : message.get_config_reply,
76 cstruct.OFPT_SET_CONFIG : message.set_config,
77 cstruct.OFPT_PACKET_IN : message.packet_in,
78 cstruct.OFPT_FLOW_REMOVED : message.flow_removed,
79 cstruct.OFPT_PORT_STATUS : message.port_status,
80 cstruct.OFPT_PACKET_OUT : message.packet_out,
81 cstruct.OFPT_FLOW_MOD : message.flow_mod,
82 cstruct.OFPT_PORT_MOD : message.port_mod,
83 cstruct.OFPT_STATS_REQUEST : message.stats_request,
84 cstruct.OFPT_STATS_REPLY : message.stats_reply,
85 cstruct.OFPT_BARRIER_REQUEST : message.barrier_request,
86 cstruct.OFPT_BARRIER_REPLY : message.barrier_reply,
87 cstruct.OFPT_QUEUE_GET_CONFIG_REQUEST : message.queue_get_config_request,
88 cstruct.OFPT_QUEUE_GET_CONFIG_REPLY : message.queue_get_config_reply
Dan Talaycof75360a2010-02-05 22:22:54 -080089}
90
91def _of_message_to_object(binary_string):
92 """
93 Map a binary string to the corresponding class.
94
95 Appropriately resolves subclasses
96 """
Rich Laneed1fa2d2013-01-08 13:23:37 -080097 hdr = message.ofp_header()
Dan Talaycof75360a2010-02-05 22:22:54 -080098 hdr.unpack(binary_string)
99 # FIXME: Add error detection
100 if not hdr.type in msg_type_subclassed:
101 return msg_type_to_class_map[hdr.type]()
Rich Laneed1fa2d2013-01-08 13:23:37 -0800102 if hdr.type == cstruct.OFPT_STATS_REQUEST:
103 sub_hdr = message.ofp_stats_request()
104 sub_hdr.unpack(binary_string[cstruct.OFP_HEADER_BYTES:])
Dan Talaycob66b1122010-02-10 22:38:49 -0800105 try:
106 obj = stats_request_to_class_map[sub_hdr.type]()
107 except KeyError:
108 obj = None
109 return obj
Rich Laneed1fa2d2013-01-08 13:23:37 -0800110 elif hdr.type == cstruct.OFPT_STATS_REPLY:
111 sub_hdr = message.ofp_stats_reply()
112 sub_hdr.unpack(binary_string[cstruct.OFP_HEADER_BYTES:])
Dan Talaycob66b1122010-02-10 22:38:49 -0800113 try:
114 obj = stats_reply_to_class_map[sub_hdr.type]()
115 except KeyError:
116 obj = None
117 return obj
Rich Laneed1fa2d2013-01-08 13:23:37 -0800118 elif hdr.type == cstruct.OFPT_ERROR:
119 sub_hdr = message.ofp_error_msg()
120 sub_hdr.unpack(binary_string[cstruct.OFP_HEADER_BYTES:])
Dan Talaycob9cb5482010-02-09 15:23:12 -0800121 return error_to_class_map[sub_hdr.type]()
Dan Talaycof75360a2010-02-05 22:22:54 -0800122 else:
Dan Talayco48370102010-03-03 15:17:33 -0800123 parse_logger.error("Cannot parse pkt to message")
Dan Talaycof75360a2010-02-05 22:22:54 -0800124 return None
125
126def of_message_parse(binary_string, raw=False):
127 """
128 Parse an OpenFlow packet
129
130 Parses a raw OpenFlow packet into a Python class, with class
131 members fully populated.
132
133 @param binary_string The packet (string) to be parsed
Dan Talaycof75360a2010-02-05 22:22:54 -0800134 @param raw If true, interpret the packet as an L2 packet. Not
135 yet supported.
Dan Talaycof75360a2010-02-05 22:22:54 -0800136 @return An object of some message class or None if fails
Dan Talayco08d9dfe2010-02-12 23:02:11 -0800137 Note that any data beyond that parsed is not returned
Dan Talaycof75360a2010-02-05 22:22:54 -0800138
139 """
140
141 if raw:
Dan Talayco48370102010-03-03 15:17:33 -0800142 parse_logger.error("raw packet message parsing not supported")
Dan Talaycof75360a2010-02-05 22:22:54 -0800143 return None
144
145 obj = _of_message_to_object(binary_string)
Dan Talaycob66b1122010-02-10 22:38:49 -0800146 if obj:
Dan Talaycof75360a2010-02-05 22:22:54 -0800147 obj.unpack(binary_string)
148 return obj
149
Dan Talaycob9cb5482010-02-09 15:23:12 -0800150
151def of_header_parse(binary_string, raw=False):
152 """
153 Parse only the header from an OpenFlow packet
154
155 Parses the header from a raw OpenFlow packet into a
156 an ofp_header Python class.
157
158 @param binary_string The packet (string) to be parsed
159 @param raw If true, interpret the packet as an L2 packet. Not
160 yet supported.
161 @return An ofp_header object
162
163 """
164
165 if raw:
Dan Talayco48370102010-03-03 15:17:33 -0800166 parse_logger.error("raw packet message parsing not supported")
Dan Talaycob9cb5482010-02-09 15:23:12 -0800167 return None
168
Rich Laneed1fa2d2013-01-08 13:23:37 -0800169 hdr = message.ofp_header()
Dan Talaycob9cb5482010-02-09 15:23:12 -0800170 hdr.unpack(binary_string)
171
172 return hdr
173
Dan Talaycob66b1122010-02-10 22:38:49 -0800174map_wc_field_to_match_member = {
Rich Laned0478ff2013-03-11 12:46:58 -0700175 'OFPFW_DL_VLAN' : 'vlan_vid',
176 'OFPFW_DL_SRC' : 'eth_src',
177 'OFPFW_DL_DST' : 'eth_dst',
178 'OFPFW_DL_TYPE' : 'eth_type',
179 'OFPFW_NW_PROTO' : 'ip_proto',
180 'OFPFW_TP_SRC' : 'tcp_src',
181 'OFPFW_TP_DST' : 'tcp_dst',
Dan Talaycob66b1122010-02-10 22:38:49 -0800182 'OFPFW_NW_SRC_SHIFT' : 'nw_src_shift',
183 'OFPFW_NW_SRC_BITS' : 'nw_src_bits',
184 'OFPFW_NW_SRC_MASK' : 'nw_src_mask',
185 'OFPFW_NW_SRC_ALL' : 'nw_src_all',
186 'OFPFW_NW_DST_SHIFT' : 'nw_dst_shift',
187 'OFPFW_NW_DST_BITS' : 'nw_dst_bits',
188 'OFPFW_NW_DST_MASK' : 'nw_dst_mask',
189 'OFPFW_NW_DST_ALL' : 'nw_dst_all',
Rich Laned0478ff2013-03-11 12:46:58 -0700190 'OFPFW_DL_VLAN_PCP' : 'vlan_pcp',
191 'OFPFW_NW_TOS' : 'ip_dscp'
Dan Talaycob66b1122010-02-10 22:38:49 -0800192}
193
194
195def parse_mac(mac_str):
Dan Talaycob9cb5482010-02-09 15:23:12 -0800196 """
Dan Talaycob66b1122010-02-10 22:38:49 -0800197 Parse a MAC address
198
199 Parse a MAC address ':' separated string of hex digits to an
200 array of integer values. '00:d0:05:5d:24:00' => [0, 208, 5, 93, 36, 0]
201 @param mac_str The string to convert
202 @return Array of 6 integer values
203 """
Rich Lanea92f2522012-10-04 18:11:04 -0700204 return map(lambda val: int(val, 16), mac_str.split(":"))
Dan Talaycob66b1122010-02-10 22:38:49 -0800205
206def parse_ip(ip_str):
207 """
208 Parse an IP address
209
210 Parse an IP address '.' separated string of decimal digits to an
211 host ordered integer. '172.24.74.77' =>
212 @param ip_str The string to convert
213 @return Integer value
214 """
Rich Lanea92f2522012-10-04 18:11:04 -0700215 array = map(lambda val: int(val), ip_str.split("."))
Dan Talaycob66b1122010-02-10 22:38:49 -0800216 val = 0
217 for a in array:
218 val <<= 8
219 val += a
220 return val
221
222def packet_type_classify(ether):
223 try:
Dan Talayco958f3b92010-03-12 21:58:57 -0800224 dot1q = ether[scapy.Dot1Q]
Dan Talaycob66b1122010-02-10 22:38:49 -0800225 except:
226 dot1q = None
Dan Talayco08d9dfe2010-02-12 23:02:11 -0800227
Dan Talaycob66b1122010-02-10 22:38:49 -0800228 try:
Dan Talayco958f3b92010-03-12 21:58:57 -0800229 ip = ether[scapy.IP]
Dan Talaycob66b1122010-02-10 22:38:49 -0800230 except:
231 ip = None
Dan Talayco08d9dfe2010-02-12 23:02:11 -0800232
Dan Talaycob66b1122010-02-10 22:38:49 -0800233 try:
Dan Talayco958f3b92010-03-12 21:58:57 -0800234 tcp = ether[scapy.TCP]
Dan Talaycob66b1122010-02-10 22:38:49 -0800235 except:
236 tcp = None
Dan Talayco08d9dfe2010-02-12 23:02:11 -0800237
Dan Talaycob66b1122010-02-10 22:38:49 -0800238 try:
Dan Talayco958f3b92010-03-12 21:58:57 -0800239 udp = ether[scapy.UDP]
Dan Talaycob66b1122010-02-10 22:38:49 -0800240 except:
241 udp = None
242
Tatsuya Yabeb8fb3c32010-06-14 15:48:36 -0700243 try:
244 icmp = ether[scapy.ICMP]
245 except:
246 icmp = None
247
Christian Dickmann8b59b4b2012-09-23 16:48:30 -0700248 try:
249 arp = ether[scapy.ARP]
250 except:
251 arp = None
Dan Talaycob66b1122010-02-10 22:38:49 -0800252 return (dot1q, ip, tcp, udp, icmp, arp)
253
254def packet_to_flow_match(packet, pkt_format="L2"):
255 """
256 Create a flow match that matches packet with the given wildcards
Dan Talaycob9cb5482010-02-09 15:23:12 -0800257
258 @param packet The packet to use as a flow template
Dan Talaycoa3b20182010-02-10 22:49:34 -0800259 @param pkt_format Currently only L2 is supported. Will indicate the
260 overall packet type for parsing
Dan Talaycob66b1122010-02-10 22:38:49 -0800261 @return An ofp_match object if successful. None if format is not
262 recognized. The wildcards of the match will be cleared for the
263 values extracted from the packet.
264
Dan Talaycoa3b20182010-02-10 22:49:34 -0800265 @todo check min length of packet
266 @todo Check if packet is other than L2 format
267 @todo Implement ICMP and ARP fields
Dan Talaycob9cb5482010-02-09 15:23:12 -0800268 """
269
Dan Talaycob66b1122010-02-10 22:38:49 -0800270 #@todo check min length of packet
Dan Talaycob66b1122010-02-10 22:38:49 -0800271 if pkt_format.upper() != "L2":
Dan Talayco48370102010-03-03 15:17:33 -0800272 parse_logger.error("Only L2 supported for packet_to_flow")
Dan Talaycob66b1122010-02-10 22:38:49 -0800273 return None
274
Dan Talaycocb6b5d72010-03-10 13:59:33 -0800275 if type(packet) == type(""):
Dan Talayco958f3b92010-03-12 21:58:57 -0800276 ether = scapy.Ether(packet)
Dan Talaycocb6b5d72010-03-10 13:59:33 -0800277 else:
278 ether = packet
279
Dan Talaycob66b1122010-02-10 22:38:49 -0800280 # For now, assume ether IP packet and ignore wildcards
Dan Talaycocb6b5d72010-03-10 13:59:33 -0800281 try:
282 (dot1q, ip, tcp, udp, icmp, arp) = packet_type_classify(ether)
283 except:
284 parse_logger.error("packet_to_flow_match: Classify error")
285 return None
Dan Talaycob66b1122010-02-10 22:38:49 -0800286
Rich Laneed1fa2d2013-01-08 13:23:37 -0800287 match = cstruct.ofp_match()
288 match.wildcards = cstruct.OFPFW_ALL
Dan Talaycob66b1122010-02-10 22:38:49 -0800289 #@todo Check if packet is other than L2 format
Rich Laned0478ff2013-03-11 12:46:58 -0700290 match.eth_dst = parse_mac(ether.dst)
Rich Laneed1fa2d2013-01-08 13:23:37 -0800291 match.wildcards &= ~cstruct.OFPFW_DL_DST
Rich Laned0478ff2013-03-11 12:46:58 -0700292 match.eth_src = parse_mac(ether.src)
Rich Laneed1fa2d2013-01-08 13:23:37 -0800293 match.wildcards &= ~cstruct.OFPFW_DL_SRC
Rich Laned0478ff2013-03-11 12:46:58 -0700294 match.eth_type = ether.type
Rich Laneed1fa2d2013-01-08 13:23:37 -0800295 match.wildcards &= ~cstruct.OFPFW_DL_TYPE
Dan Talaycob66b1122010-02-10 22:38:49 -0800296
297 if dot1q:
Rich Laned0478ff2013-03-11 12:46:58 -0700298 match.vlan_vid = dot1q.vlan
299 match.vlan_pcp = dot1q.prio
300 match.eth_type = dot1q.type
Tatsuya Yabeb8fb3c32010-06-14 15:48:36 -0700301 else:
Rich Laned0478ff2013-03-11 12:46:58 -0700302 match.vlan_vid = cstruct.OFP_VLAN_NONE
303 match.vlan_pcp = 0
Rich Laneed1fa2d2013-01-08 13:23:37 -0800304 match.wildcards &= ~cstruct.OFPFW_DL_VLAN
305 match.wildcards &= ~cstruct.OFPFW_DL_VLAN_PCP
Dan Talaycob66b1122010-02-10 22:38:49 -0800306
307 if ip:
Rich Laned0478ff2013-03-11 12:46:58 -0700308 match.ipv4_src = parse_ip(ip.src)
Rich Laneed1fa2d2013-01-08 13:23:37 -0800309 match.wildcards &= ~cstruct.OFPFW_NW_SRC_MASK
Rich Laned0478ff2013-03-11 12:46:58 -0700310 match.ipv4_dst = parse_ip(ip.dst)
Rich Laneed1fa2d2013-01-08 13:23:37 -0800311 match.wildcards &= ~cstruct.OFPFW_NW_DST_MASK
Rich Laned0478ff2013-03-11 12:46:58 -0700312 match.ip_dscp = ip.tos
Rich Laneed1fa2d2013-01-08 13:23:37 -0800313 match.wildcards &= ~cstruct.OFPFW_NW_TOS
Dan Talaycob66b1122010-02-10 22:38:49 -0800314
315 if tcp:
Rich Laned0478ff2013-03-11 12:46:58 -0700316 match.ip_proto = 6
Rich Laneed1fa2d2013-01-08 13:23:37 -0800317 match.wildcards &= ~cstruct.OFPFW_NW_PROTO
Dan Talayco89d57342010-06-07 16:24:59 -0700318 elif not tcp and udp:
319 tcp = udp
Rich Laned0478ff2013-03-11 12:46:58 -0700320 match.ip_proto = 17
Rich Laneed1fa2d2013-01-08 13:23:37 -0800321 match.wildcards &= ~cstruct.OFPFW_NW_PROTO
Dan Talayco89d57342010-06-07 16:24:59 -0700322
323 if tcp:
Rich Laned0478ff2013-03-11 12:46:58 -0700324 match.tcp_src = tcp.sport
Rich Laneed1fa2d2013-01-08 13:23:37 -0800325 match.wildcards &= ~cstruct.OFPFW_TP_SRC
Rich Laned0478ff2013-03-11 12:46:58 -0700326 match.tcp_dst = tcp.dport
Rich Laneed1fa2d2013-01-08 13:23:37 -0800327 match.wildcards &= ~cstruct.OFPFW_TP_DST
Dan Talaycob66b1122010-02-10 22:38:49 -0800328
Tatsuya Yabeb8fb3c32010-06-14 15:48:36 -0700329 if icmp:
Rich Laned0478ff2013-03-11 12:46:58 -0700330 match.ip_proto = 1
331 match.tcp_src = icmp.type
332 match.tcp_dst = icmp.code
Rich Laneed1fa2d2013-01-08 13:23:37 -0800333 match.wildcards &= ~cstruct.OFPFW_NW_PROTO
Tatsuya Yabeb8fb3c32010-06-14 15:48:36 -0700334
Christian Dickmann8b59b4b2012-09-23 16:48:30 -0700335 if arp:
Rich Laned0478ff2013-03-11 12:46:58 -0700336 match.ip_proto = arp.op
Rich Laneed1fa2d2013-01-08 13:23:37 -0800337 match.wildcards &= ~cstruct.OFPFW_NW_PROTO
Rich Laned0478ff2013-03-11 12:46:58 -0700338 match.ipv4_src = parse_ip(arp.psrc)
Rich Laneed1fa2d2013-01-08 13:23:37 -0800339 match.wildcards &= ~cstruct.OFPFW_NW_SRC_MASK
Rich Laned0478ff2013-03-11 12:46:58 -0700340 match.ipv4_dst = parse_ip(arp.pdst)
Rich Laneed1fa2d2013-01-08 13:23:37 -0800341 match.wildcards &= ~cstruct.OFPFW_NW_DST_MASK
Dan Talaycob66b1122010-02-10 22:38:49 -0800342
343 return match