blob: 15d16df6aa424519b16a027ad35647f8c61f2159 [file] [log] [blame]
Takahiro Suzuki241c10e2020-12-17 20:17:57 +09001/*
2 * Copyright 2020-present Open Networking Foundation
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17//Package adaptercoreonu provides the utility for onu devices, flows and statistics
18package adaptercoreonu
19
20import (
21 "context"
22 "encoding/binary"
23 "errors"
24 "strconv"
25 "time"
26
27 "github.com/looplab/fsm"
28 "github.com/opencord/omci-lib-go"
29 me "github.com/opencord/omci-lib-go/generated"
30 "github.com/opencord/voltha-lib-go/v3/pkg/log"
31 of "github.com/opencord/voltha-protos/v3/go/openflow_13"
32)
33
34const (
35 cDefaultDownstreamMode = 0
36 cDefaultTpid = 0x8100
37)
38
39const (
40 cFilterPrioOffset = 28
41 cFilterVidOffset = 15
42 cFilterTpidOffset = 12
43 cFilterEtherTypeOffset = 0
44 cTreatTTROffset = 30
45 cTreatPrioOffset = 16
46 cTreatVidOffset = 3
47 cTreatTpidOffset = 0
48)
49const (
50 cFilterOuterOffset = 0
51 cFilterInnerOffset = 4
52 cTreatOuterOffset = 8
53 cTreatInnerOffset = 12
54)
55const (
56 cPrioIgnoreTag uint32 = 15
57 cPrioDefaultFilter uint32 = 14
58 cPrioDoNotFilter uint32 = 8
59 cDoNotFilterVid uint32 = 4096
60 cDoNotFilterTPID uint32 = 0
61 cDoNotFilterEtherType uint32 = 0
62 cDoNotAddPrio uint32 = 15
63 cCopyPrioFromInner uint32 = 8
64 cDontCareVid uint32 = 0
65 cDontCareTpid uint32 = 0
66 cSetOutputTpidCopyDei uint32 = 4
67)
68
69const (
70 vlanEvStart = "vlanEvStart"
71 vlanEvWaitTechProf = "vlanEvWaitTechProf"
72 vlanEvContinueConfig = "vlanEvContinueConfig"
73 vlanEvStartConfig = "vlanEvStartConfig"
74 vlanEvRxConfigVtfd = "vlanEvRxConfigVtfd"
75 vlanEvRxConfigEvtocd = "vlanEvRxConfigEvtocd"
76 vlanEvReset = "vlanEvReset"
77 vlanEvRestart = "vlanEvRestart"
78)
79const (
80 vlanStDisabled = "vlanStDisabled"
81 vlanStStarting = "vlanStStarting"
82 vlanStWaitingTechProf = "vlanStWaitingTechProf"
83 vlanStConfigVtfd = "vlanStConfigVtfd"
84 vlanStConfigEvtocd = "vlanStConfigEvtocd"
85 vlanStConfigDone = "vlanStConfigDone"
86 vlanStCleanEvtocd = "vlanStCleanEvtocd"
87 vlanStCleanVtfd = "vlanStCleanVtfd"
88 vlanStCleanupDone = "vlanStCleanupDone"
89 vlanStResetting = "vlanStResetting"
90)
91
92//UniVlanConfigFsm defines the structure for the state machine to config the PON ANI ports of ONU UNI ports via OMCI
93type UniVlanConfigFsm struct {
94 pDeviceHandler *deviceHandler
95 pOmciCC *omciCC
96 pOnuUniPort *onuUniPort
97 pUniTechProf *onuUniTechProf
98 pOnuDB *onuDeviceDB
99 techProfileID uint16
100 requestEvent OnuDeviceEvent
101 omciMIdsResponseReceived chan bool //seperate channel needed for checking multiInstance OMCI message responses
102 pAdaptFsm *AdapterFsm
103 acceptIncrementalEvtoOption bool
104 matchVid uint32
105 matchPcp uint32
106 tagsToRemove uint32
107 setVid uint32
108 setPcp uint32
109 vtfdID uint16
110 evtocdID uint16
111}
112
113//NewUniVlanConfigFsm is the 'constructor' for the state machine to config the PON ANI ports of ONU UNI ports via OMCI
114func NewUniVlanConfigFsm(apDeviceHandler *deviceHandler, apDevOmciCC *omciCC, apUniPort *onuUniPort, apUniTechProf *onuUniTechProf,
115 apOnuDB *onuDeviceDB, aTechProfileID uint16, aRequestEvent OnuDeviceEvent, aName string,
116 aDeviceID string, aCommChannel chan Message,
117 aAcceptIncrementalEvto bool, aMatchVlan uint16, aSetVlan uint16, aSetPcp uint8) *UniVlanConfigFsm {
118 instFsm := &UniVlanConfigFsm{
119 pDeviceHandler: apDeviceHandler,
120 pOmciCC: apDevOmciCC,
121 pOnuUniPort: apUniPort,
122 pUniTechProf: apUniTechProf,
123 pOnuDB: apOnuDB,
124 techProfileID: aTechProfileID,
125 requestEvent: aRequestEvent,
126 acceptIncrementalEvtoOption: aAcceptIncrementalEvto,
127 matchVid: uint32(aMatchVlan),
128 setVid: uint32(aSetVlan),
129 setPcp: uint32(aSetPcp),
130 }
131 instFsm.tagsToRemove = 1 //one tag to remove as default setting
132 instFsm.matchPcp = cPrioDoNotFilter // do not Filter on prio as default
133 if instFsm.matchVid == uint32(of.OfpVlanId_OFPVID_PRESENT) {
134 // no prio/vid filtering requested
135 instFsm.tagsToRemove = 0 //no tag pop action
136 instFsm.matchPcp = cPrioIgnoreTag // no vlan tag filtering
137 if instFsm.setPcp == cCopyPrioFromInner {
138 //in case of no filtering and configured PrioCopy ensure default prio setting to 0
139 // which is required for stacking of untagged, but obviously also ensures prio setting for prio/singletagged
140 // might collide with NoMatchVid/CopyPrio(/setVid) setting
141 // this was some precondition setting taken over from py adapter ..
142 instFsm.setPcp = 0
143 }
144 }
145
146 instFsm.pAdaptFsm = NewAdapterFsm(aName, aDeviceID, aCommChannel)
147 if instFsm.pAdaptFsm == nil {
148 logger.Errorw("UniVlanConfigFsm's AdapterFsm could not be instantiated!!", log.Fields{
149 "device-id": aDeviceID})
150 return nil
151 }
152
153 instFsm.pAdaptFsm.pFsm = fsm.NewFSM(
154 vlanStDisabled,
155 fsm.Events{
156 {Name: vlanEvStart, Src: []string{vlanStDisabled}, Dst: vlanStStarting},
157 {Name: vlanEvWaitTechProf, Src: []string{vlanStStarting}, Dst: vlanStWaitingTechProf},
158 {Name: vlanEvContinueConfig, Src: []string{vlanStWaitingTechProf}, Dst: vlanStConfigVtfd},
159 {Name: vlanEvStartConfig, Src: []string{vlanStStarting}, Dst: vlanStConfigVtfd},
160 {Name: vlanEvRxConfigVtfd, Src: []string{vlanStConfigVtfd}, Dst: vlanStConfigEvtocd},
161 {Name: vlanEvRxConfigEvtocd, Src: []string{vlanStConfigEvtocd}, Dst: vlanStConfigDone},
162 //TODO:!!! Also define state transitions for cleanup states and timeouts
163 /*
164 {Name: vlanEvTimeoutSimple, Src: []string{
165 vlanStCreatingDot1PMapper, vlanStCreatingMBPCD, vlanStSettingTconts, vlanStSettingDot1PMapper}, Dst: vlanStStarting},
166 {Name: vlanEvTimeoutMids, Src: []string{
167 vlanStCreatingGemNCTPs, vlanStCreatingGemIWs, vlanStSettingPQs}, Dst: vlanStStarting},
168 */
169 // exceptional treatment for all states except vlanStResetting
170 {Name: vlanEvReset, Src: []string{vlanStStarting, vlanStWaitingTechProf,
171 vlanStConfigVtfd, vlanStConfigEvtocd, vlanStConfigDone,
172 vlanStCleanEvtocd, vlanStCleanVtfd, vlanStCleanupDone},
173 Dst: vlanStResetting},
174 // the only way to get to resource-cleared disabled state again is via "resseting"
175 {Name: vlanEvRestart, Src: []string{vlanStResetting}, Dst: vlanStDisabled},
176 },
177
178 fsm.Callbacks{
179 "enter_state": func(e *fsm.Event) { instFsm.pAdaptFsm.logFsmStateChange(e) },
180 ("enter_" + vlanStStarting): func(e *fsm.Event) { instFsm.enterConfigStarting(e) },
181 ("enter_" + vlanStConfigVtfd): func(e *fsm.Event) { instFsm.enterConfigVtfd(e) },
182 ("enter_" + vlanStConfigEvtocd): func(e *fsm.Event) { instFsm.enterConfigEvtocd(e) },
183 ("enter_" + vlanStConfigDone): func(e *fsm.Event) { instFsm.enterVlanConfigDone(e) },
184 ("enter_" + vlanStCleanVtfd): func(e *fsm.Event) { instFsm.enterCleanVtfd(e) },
185 ("enter_" + vlanStCleanEvtocd): func(e *fsm.Event) { instFsm.enterCleanEvtocd(e) },
186 ("enter_" + vlanStCleanupDone): func(e *fsm.Event) { instFsm.enterVlanCleanupDone(e) },
187 ("enter_" + vlanStResetting): func(e *fsm.Event) { instFsm.enterResetting(e) },
188 ("enter_" + vlanStDisabled): func(e *fsm.Event) { instFsm.enterDisabled(e) },
189 },
190 )
191 if instFsm.pAdaptFsm.pFsm == nil {
192 logger.Errorw("UniVlanConfigFsm's Base FSM could not be instantiated!!", log.Fields{
193 "device-id": aDeviceID})
194 return nil
195 }
196
197 logger.Infow("UniVlanConfigFsm created", log.Fields{"device-id": aDeviceID,
198 "accIncrEvto": instFsm.acceptIncrementalEvtoOption,
199 "matchVid": strconv.FormatInt(int64(instFsm.matchVid), 16),
200 "setVid": strconv.FormatInt(int64(instFsm.setVid), 16),
201 "setPcp": instFsm.setPcp})
202 return instFsm
203}
204
205func (oFsm *UniVlanConfigFsm) enterConfigStarting(e *fsm.Event) {
206 logger.Debugw("UniVlanConfigFsm start", log.Fields{"in state": e.FSM.Current(),
207 "device-id": oFsm.pAdaptFsm.deviceID})
208
209 oFsm.omciMIdsResponseReceived = make(chan bool)
210 go oFsm.processOmciVlanMessages()
211 pConfigVlanStateAFsm := oFsm.pAdaptFsm
212 if pConfigVlanStateAFsm != nil {
213 // obviously calling some FSM event here directly does not work - so trying to decouple it ...
214 go func(a_pAFsm *AdapterFsm) {
215 if a_pAFsm != nil && a_pAFsm.pFsm != nil {
216 //stick to pythonAdapter numbering scheme
217 oFsm.vtfdID = macBridgePortAniEID + oFsm.pOnuUniPort.entityID + oFsm.techProfileID
218 //cmp also usage in EVTOCDE create in omci_cc
219 oFsm.evtocdID = macBridgeServiceProfileEID + uint16(oFsm.pOnuUniPort.macBpNo)
220
221 if oFsm.pUniTechProf.getTechProfileDone(oFsm.pOnuUniPort.uniID, oFsm.techProfileID) {
222 // let the vlan processing begin
223 _ = a_pAFsm.pFsm.Event(vlanEvStartConfig)
224 } else {
225 // set to waiting for Techprofile
226 _ = a_pAFsm.pFsm.Event(vlanEvWaitTechProf)
227 }
228 }
229 }(pConfigVlanStateAFsm)
230 }
231}
232
233func (oFsm *UniVlanConfigFsm) enterConfigVtfd(e *fsm.Event) {
234 if oFsm.setVid == uint32(of.OfpVlanId_OFPVID_PRESENT) {
235 // meaning transparent setup - no specific VTFD setting required
236 logger.Debugw("UniVlanConfigFsm: no VTFD config required", log.Fields{
237 "in state": e.FSM.Current(), "device-id": oFsm.pAdaptFsm.deviceID})
238 // let the FSM proceed ... (from within this state all internal pointers may be expected to be correct)
239 // obviously calling some FSM event here directly does not work - so trying to decouple it ...
240 pConfigVlanStateAFsm := oFsm.pAdaptFsm
241 go func(a_pAFsm *AdapterFsm) {
242 _ = a_pAFsm.pFsm.Event(vlanEvRxConfigVtfd)
243 }(pConfigVlanStateAFsm)
244 } else {
245 logger.Debugw("UniVlanConfigFsm create VTFD", log.Fields{
246 "EntitytId": strconv.FormatInt(int64(oFsm.vtfdID), 16),
247 "in state": e.FSM.Current(), "device-id": oFsm.pAdaptFsm.deviceID})
248 vlanFilterList := make([]uint16, 12)
249 vlanFilterList[0] = uint16(oFsm.setVid) // setVid is assumed to be masked already by the caller to 12 bit
250 meParams := me.ParamData{
251 EntityID: oFsm.vtfdID,
252 Attributes: me.AttributeValueMap{
253 "VlanFilterList": vlanFilterList,
254 "ForwardOperation": uint8(0x10), //VID investigation
255 "NumberOfEntries": uint8(1),
256 },
257 }
258 meInstance := oFsm.pOmciCC.sendCreateVtfdVar(context.TODO(), ConstDefaultOmciTimeout, true,
259 oFsm.pAdaptFsm.commChan, meParams)
260 //accept also nil as (error) return value for writing to LastTx
261 // - this avoids misinterpretation of new received OMCI messages
262 //TODO!!: refactoring improvement requested, here as an example for [VOL-3457]:
263 // send shall return (dual format) error code that can be used here for immediate error treatment
264 // (relevant to all used sendXX() methods in this (and other) FSM's)
265 oFsm.pOmciCC.pLastTxMeInstance = meInstance
266 }
267}
268
269func (oFsm *UniVlanConfigFsm) enterConfigEvtocd(e *fsm.Event) {
270 logger.Debugw("UniVlanConfigFsm - start config EVTOCD loop", log.Fields{
271 "in state": e.FSM.Current(), "device-id": oFsm.pAdaptFsm.deviceID})
272 go oFsm.performConfigEvtocdEntries()
273}
274
275func (oFsm *UniVlanConfigFsm) enterVlanConfigDone(e *fsm.Event) {
276 logger.Debugw("UniVlanConfigFsm - VLAN config done: send dh event notification", log.Fields{
277 "in state": e.FSM.Current(), "device-id": oFsm.pAdaptFsm.deviceID})
278 if oFsm.pDeviceHandler != nil {
279 oFsm.pDeviceHandler.deviceProcStatusUpdate(oFsm.requestEvent)
280 }
281}
282
283func (oFsm *UniVlanConfigFsm) enterCleanVtfd(e *fsm.Event) {
284 logger.Debugw("UniVlanConfigFsm Tx Delete::VTFD", log.Fields{
285 /*"EntitytId": strconv.FormatInt(int64(oFsm.mapperSP0ID), 16),*/
286 "in state": e.FSM.Current(), "device-id": oFsm.pAdaptFsm.deviceID})
287}
288
289func (oFsm *UniVlanConfigFsm) enterCleanEvtocd(e *fsm.Event) {
290 logger.Debugw("UniVlanConfigFsm cleanup EVTOCD", log.Fields{
291 /*"EntitytId": strconv.FormatInt(int64(oFsm.macBPCD0ID), 16),
292 "TPPtr": strconv.FormatInt(int64(oFsm.mapperSP0ID), 16),*/
293 "in state": e.FSM.Current(), "device-id": oFsm.pAdaptFsm.deviceID})
294}
295
296func (oFsm *UniVlanConfigFsm) enterVlanCleanupDone(e *fsm.Event) {
297 logger.Debugw("UniVlanConfigFsm - VLAN cleanup done", log.Fields{
298 "in state": e.FSM.Current(), "device-id": oFsm.pAdaptFsm.deviceID})
299
300 pConfigVlanStateAFsm := oFsm.pAdaptFsm
301 if pConfigVlanStateAFsm != nil {
302 // obviously calling some FSM event here directly does not work - so trying to decouple it ...
303 go func(a_pAFsm *AdapterFsm) {
304 if a_pAFsm != nil && a_pAFsm.pFsm != nil {
305 _ = a_pAFsm.pFsm.Event(vlanEvReset)
306 }
307 }(pConfigVlanStateAFsm)
308 }
309}
310
311func (oFsm *UniVlanConfigFsm) enterResetting(e *fsm.Event) {
312 logger.Debugw("UniVlanConfigFsm resetting", log.Fields{"device-id": oFsm.pAdaptFsm.deviceID})
313
314 pConfigVlanStateAFsm := oFsm.pAdaptFsm
315 if pConfigVlanStateAFsm != nil {
316 // abort running message processing
317 fsmAbortMsg := Message{
318 Type: TestMsg,
319 Data: TestMessage{
320 TestMessageVal: AbortMessageProcessing,
321 },
322 }
323 pConfigVlanStateAFsm.commChan <- fsmAbortMsg
324
325 //try to restart the FSM to 'disabled', decouple event transfer
326 go func(a_pAFsm *AdapterFsm) {
327 if a_pAFsm != nil && a_pAFsm.pFsm != nil {
328 _ = a_pAFsm.pFsm.Event(vlanEvRestart)
329 }
330 }(pConfigVlanStateAFsm)
331 }
332}
333
334func (oFsm *UniVlanConfigFsm) enterDisabled(e *fsm.Event) {
335 logger.Debugw("UniVlanConfigFsm enters disabled state", log.Fields{"device-id": oFsm.pAdaptFsm.deviceID})
336 if oFsm.pDeviceHandler != nil {
337 //request removal of 'reference' in the Handler (completely clear the FSM)
338 go oFsm.pDeviceHandler.RemoveVlanFilterFsm(oFsm.pOnuUniPort)
339 }
340}
341
342func (oFsm *UniVlanConfigFsm) processOmciVlanMessages() { //ctx context.Context?
343 logger.Debugw("Start UniVlanConfigFsm Msg processing", log.Fields{"for device-id": oFsm.pAdaptFsm.deviceID})
344loop:
345 for {
346 // case <-ctx.Done():
347 // logger.Info("MibSync Msg", log.Fields{"Message handling canceled via context for device-id": oFsm.pAdaptFsm.deviceID})
348 // break loop
349 message, ok := <-oFsm.pAdaptFsm.commChan
350 if !ok {
351 logger.Info("UniVlanConfigFsm Rx Msg - could not read from channel", log.Fields{"device-id": oFsm.pAdaptFsm.deviceID})
352 // but then we have to ensure a restart of the FSM as well - as exceptional procedure
353 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvReset)
354 break loop
355 }
356 logger.Debugw("UniVlanConfigFsm Rx Msg", log.Fields{"device-id": oFsm.pAdaptFsm.deviceID})
357
358 switch message.Type {
359 case TestMsg:
360 msg, _ := message.Data.(TestMessage)
361 if msg.TestMessageVal == AbortMessageProcessing {
362 logger.Infow("UniVlanConfigFsm abort ProcessMsg", log.Fields{"for device-id": oFsm.pAdaptFsm.deviceID})
363 break loop
364 }
365 logger.Warnw("UniVlanConfigFsm unknown TestMessage", log.Fields{"device-id": oFsm.pAdaptFsm.deviceID, "MessageVal": msg.TestMessageVal})
366 case OMCI:
367 msg, _ := message.Data.(OmciMessage)
368 oFsm.handleOmciVlanConfigMessage(msg)
369 default:
370 logger.Warn("UniVlanConfigFsm Rx unknown message", log.Fields{"device-id": oFsm.pAdaptFsm.deviceID,
371 "message.Type": message.Type})
372 }
373 }
374 logger.Infow("End UniVlanConfigFsm Msg processing", log.Fields{"device-id": oFsm.pAdaptFsm.deviceID})
375}
376
377func (oFsm *UniVlanConfigFsm) handleOmciVlanConfigMessage(msg OmciMessage) {
378 logger.Debugw("Rx OMCI UniVlanConfigFsm Msg", log.Fields{"device-id": oFsm.pAdaptFsm.deviceID,
379 "msgType": msg.OmciMsg.MessageType})
380
381 switch msg.OmciMsg.MessageType {
382 case omci.CreateResponseType:
383 {
384 msgLayer := (*msg.OmciPacket).Layer(omci.LayerTypeCreateResponse)
385 if msgLayer == nil {
386 logger.Error("Omci Msg layer could not be detected for CreateResponse")
387 return
388 }
389 msgObj, msgOk := msgLayer.(*omci.CreateResponse)
390 if !msgOk {
391 logger.Error("Omci Msg layer could not be assigned for CreateResponse")
392 return
393 }
394 logger.Debugw("CreateResponse Data", log.Fields{"device-id": oFsm.pAdaptFsm.deviceID, "data-fields": msgObj})
395 if msgObj.Result != me.Success {
396 logger.Errorw("Omci CreateResponse Error - later: drive FSM to abort state ?", log.Fields{"Error": msgObj.Result})
397 // possibly force FSM into abort or ignore some errors for some messages? store error for mgmt display?
398 return
399 }
400 if msgObj.EntityClass == oFsm.pOmciCC.pLastTxMeInstance.GetClassID() &&
401 msgObj.EntityInstance == oFsm.pOmciCC.pLastTxMeInstance.GetEntityID() {
402 // maybe we can use just the same eventName for different state transitions like "forward"
403 // - might be checked, but so far I go for sure and have to inspect the concrete state events ...
404 switch oFsm.pOmciCC.pLastTxMeInstance.GetName() {
405 case "VlanTaggingFilterData":
406 { // let the FSM proceed ...
407 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvRxConfigVtfd)
408 }
409 }
410 }
411 } //CreateResponseType
412 case omci.SetResponseType:
413 {
414 msgLayer := (*msg.OmciPacket).Layer(omci.LayerTypeSetResponse)
415 if msgLayer == nil {
416 logger.Error("UniVlanConfigFsm - Omci Msg layer could not be detected for SetResponse")
417 return
418 }
419 msgObj, msgOk := msgLayer.(*omci.SetResponse)
420 if !msgOk {
421 logger.Error("UniVlanConfigFsm - Omci Msg layer could not be assigned for SetResponse")
422 return
423 }
424 logger.Debugw("UniVlanConfigFsm SetResponse Data", log.Fields{"deviceId": oFsm.pAdaptFsm.deviceID, "data-fields": msgObj})
425 if msgObj.Result != me.Success {
426 logger.Errorw("UniVlanConfigFsm - Omci SetResponse Error - later: drive FSM to abort state ?", log.Fields{"Error": msgObj.Result})
427 // possibly force FSM into abort or ignore some errors for some messages? store error for mgmt display?
428 return
429 }
430 if msgObj.EntityClass == oFsm.pOmciCC.pLastTxMeInstance.GetClassID() &&
431 msgObj.EntityInstance == oFsm.pOmciCC.pLastTxMeInstance.GetEntityID() {
432 switch oFsm.pOmciCC.pLastTxMeInstance.GetName() {
433 case "ExtendedVlanTaggingOperationConfigurationData":
434 { // let the EVTO config proceed by stopping the wait function
435 oFsm.omciMIdsResponseReceived <- true
436 }
437 }
438 }
439 } //SetResponseType
440 default:
441 {
442 logger.Errorw("UniVlanConfigFsm - Rx OMCI unhandled MsgType", log.Fields{"omciMsgType": msg.OmciMsg.MessageType})
443 return
444 }
445 }
446}
447
448func (oFsm *UniVlanConfigFsm) performConfigEvtocdEntries() {
449 { // for local var
450 // EVTOCD ME is expected to exist at this point already from MIB-Download (with AssociationType/Pointer)
451 // we need to extend the configuration by EthType definition and, to be sure, downstream 'inverse' mode
452 logger.Debugw("UniVlanConfigFsm Tx Set::EVTOCD", log.Fields{
453 "EntitytId": strconv.FormatInt(int64(oFsm.evtocdID), 16),
454 "i/oEthType": strconv.FormatInt(int64(cDefaultTpid), 16),
455 "device-id": oFsm.pAdaptFsm.deviceID})
456 meParams := me.ParamData{
457 EntityID: oFsm.evtocdID,
458 Attributes: me.AttributeValueMap{
459 "InputTpid": uint16(cDefaultTpid), //could be possibly retrieved from flow config one day, by now just like py-code base
460 "OutputTpid": uint16(cDefaultTpid), //could be possibly retrieved from flow config one day, by now just like py-code base
461 "DownstreamMode": uint8(cDefaultDownstreamMode),
462 },
463 }
464 meInstance := oFsm.pOmciCC.sendSetEvtocdVar(context.TODO(), ConstDefaultOmciTimeout, true,
465 oFsm.pAdaptFsm.commChan, meParams)
466 //accept also nil as (error) return value for writing to LastTx
467 // - this avoids misinterpretation of new received OMCI messages
468 oFsm.pOmciCC.pLastTxMeInstance = meInstance
469
470 //verify response
471 err := oFsm.waitforOmciResponse()
472 if err != nil {
473 logger.Errorw("Evtocd set TPID failed, aborting VlanConfig FSM!",
474 log.Fields{"device-id": oFsm.pAdaptFsm.deviceID})
475 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvReset)
476 return
477 }
478 } //for local var
479
480 if oFsm.setVid == uint32(of.OfpVlanId_OFPVID_PRESENT) {
481 //transparent transmission required
482 logger.Debugw("UniVlanConfigFsm Tx Set::EVTOCD single tagged transparent rule", log.Fields{
483 "device-id": oFsm.pAdaptFsm.deviceID})
484 sliceEvtocdRule := make([]uint8, 16)
485 // fill vlan tagging operation table bit fields using network=bigEndian order and using slice offset 0 as highest 'word'
486 binary.BigEndian.PutUint32(sliceEvtocdRule[cFilterOuterOffset:],
487 cPrioIgnoreTag<<cFilterPrioOffset| // Not an outer-tag rule
488 cDoNotFilterVid<<cFilterVidOffset| // Do not filter on outer vid
489 cDoNotFilterTPID<<cFilterTpidOffset) // Do not filter on outer TPID field
490
491 binary.BigEndian.PutUint32(sliceEvtocdRule[cFilterInnerOffset:],
492 cPrioDefaultFilter<<cFilterPrioOffset| // default inner-tag rule
493 cDoNotFilterVid<<cFilterVidOffset| // Do not filter on inner vid
494 cDoNotFilterTPID<<cFilterTpidOffset| // Do not filter on inner TPID field
495 cDoNotFilterEtherType<<cFilterEtherTypeOffset) // Do not filter of EtherType
496
497 binary.BigEndian.PutUint32(sliceEvtocdRule[cTreatOuterOffset:],
498 0<<cTreatTTROffset| // Do not pop any tags
499 cDoNotAddPrio<<cTreatPrioOffset| // do not add outer tag
500 cDontCareVid<<cTreatVidOffset| // Outer VID don't care
501 cDontCareTpid<<cTreatTpidOffset) // Outer TPID field don't care
502
503 binary.BigEndian.PutUint32(sliceEvtocdRule[cTreatInnerOffset:],
504 cDoNotAddPrio<<cTreatPrioOffset| // do not add inner tag
505 cDontCareVid<<cTreatVidOffset| // Outer VID don't care
506 cSetOutputTpidCopyDei<<cTreatTpidOffset) // Set TPID = 0x8100
507
508 meParams := me.ParamData{
509 EntityID: oFsm.evtocdID,
510 Attributes: me.AttributeValueMap{
511 "ReceivedFrameVlanTaggingOperationTable": sliceEvtocdRule,
512 },
513 }
514 meInstance := oFsm.pOmciCC.sendSetEvtocdVar(context.TODO(), ConstDefaultOmciTimeout, true,
515 oFsm.pAdaptFsm.commChan, meParams)
516 //accept also nil as (error) return value for writing to LastTx
517 // - this avoids misinterpretation of new received OMCI messages
518 oFsm.pOmciCC.pLastTxMeInstance = meInstance
519
520 //verify response
521 err := oFsm.waitforOmciResponse()
522 if err != nil {
523 logger.Errorw("Evtocd set transparent singletagged rule failed, aborting VlanConfig FSM!",
524 log.Fields{"device-id": oFsm.pAdaptFsm.deviceID})
525 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvReset)
526 return
527 }
528 } else {
529 // according to py-code acceptIncrementalEvto program option decides upon stacking or translation scenario
530 if oFsm.acceptIncrementalEvtoOption {
531 // this defines VID translation scenario: singletagged->singletagged (if not transparent)
532 logger.Debugw("UniVlanConfigFsm Tx Set::EVTOCD single tagged translation rule", log.Fields{
533 "device-id": oFsm.pAdaptFsm.deviceID})
534 sliceEvtocdRule := make([]uint8, 16)
535 // fill vlan tagging operation table bit fields using network=bigEndian order and using slice offset 0 as highest 'word'
536 binary.BigEndian.PutUint32(sliceEvtocdRule[cFilterOuterOffset:],
537 cPrioIgnoreTag<<cFilterPrioOffset| // Not an outer-tag rule
538 cDoNotFilterVid<<cFilterVidOffset| // Do not filter on outer vid
539 cDoNotFilterTPID<<cFilterTpidOffset) // Do not filter on outer TPID field
540
541 binary.BigEndian.PutUint32(sliceEvtocdRule[cFilterInnerOffset:],
542 oFsm.matchPcp<<cFilterPrioOffset| // either DNFonPrio or ignore tag (default) on innerVLAN
543 oFsm.matchVid<<cFilterVidOffset| // either DNFonVid or real filter VID
544 cDoNotFilterTPID<<cFilterTpidOffset| // Do not filter on inner TPID field
545 cDoNotFilterEtherType<<cFilterEtherTypeOffset) // Do not filter of EtherType
546
547 binary.BigEndian.PutUint32(sliceEvtocdRule[cTreatOuterOffset:],
548 oFsm.tagsToRemove<<cTreatTTROffset| // either 1 or 0
549 cDoNotAddPrio<<cTreatPrioOffset| // do not add outer tag
550 cDontCareVid<<cTreatVidOffset| // Outer VID don't care
551 cDontCareTpid<<cTreatTpidOffset) // Outer TPID field don't care
552
553 binary.BigEndian.PutUint32(sliceEvtocdRule[cTreatInnerOffset:],
554 oFsm.setPcp<<cTreatPrioOffset| // as configured in flow
555 oFsm.setVid<<cTreatVidOffset| //as configured in flow
556 cSetOutputTpidCopyDei<<cTreatTpidOffset) // Set TPID = 0x8100
557
558 meParams := me.ParamData{
559 EntityID: oFsm.evtocdID,
560 Attributes: me.AttributeValueMap{
561 "ReceivedFrameVlanTaggingOperationTable": sliceEvtocdRule,
562 },
563 }
564 meInstance := oFsm.pOmciCC.sendSetEvtocdVar(context.TODO(), ConstDefaultOmciTimeout, true,
565 oFsm.pAdaptFsm.commChan, meParams)
566 //accept also nil as (error) return value for writing to LastTx
567 // - this avoids misinterpretation of new received OMCI messages
568 oFsm.pOmciCC.pLastTxMeInstance = meInstance
569
570 //verify response
571 err := oFsm.waitforOmciResponse()
572 if err != nil {
573 logger.Errorw("Evtocd set singletagged translation rule failed, aborting VlanConfig FSM!",
574 log.Fields{"device-id": oFsm.pAdaptFsm.deviceID})
575 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvReset)
576 return
577 }
578 } else {
579 //not transparent and not acceptIncrementalEvtoOption untagged/priotagged->singletagged
580 { // just for local var's
581 // this defines stacking scenario: untagged->singletagged
582 logger.Debugw("UniVlanConfigFsm Tx Set::EVTOCD untagged->singletagged rule", log.Fields{
583 "device-id": oFsm.pAdaptFsm.deviceID})
584 sliceEvtocdRule := make([]uint8, 16)
585 // fill vlan tagging operation table bit fields using network=bigEndian order and using slice offset 0 as highest 'word'
586 binary.BigEndian.PutUint32(sliceEvtocdRule[cFilterOuterOffset:],
587 cPrioIgnoreTag<<cFilterPrioOffset| // Not an outer-tag rule
588 cDoNotFilterVid<<cFilterVidOffset| // Do not filter on outer vid
589 cDoNotFilterTPID<<cFilterTpidOffset) // Do not filter on outer TPID field
590
591 binary.BigEndian.PutUint32(sliceEvtocdRule[cFilterInnerOffset:],
592 cPrioIgnoreTag<<cFilterPrioOffset| // Not an inner-tag rule
593 cDoNotFilterVid<<cFilterVidOffset| // Do not filter on inner vid
594 cDoNotFilterTPID<<cFilterTpidOffset| // Do not filter on inner TPID field
595 cDoNotFilterEtherType<<cFilterEtherTypeOffset) // Do not filter of EtherType
596
597 binary.BigEndian.PutUint32(sliceEvtocdRule[cTreatOuterOffset:],
598 0<<cTreatTTROffset| // Do not pop any tags
599 cDoNotAddPrio<<cTreatPrioOffset| // do not add outer tag
600 cDontCareVid<<cTreatVidOffset| // Outer VID don't care
601 cDontCareTpid<<cTreatTpidOffset) // Outer TPID field don't care
602
603 binary.BigEndian.PutUint32(sliceEvtocdRule[cTreatInnerOffset:],
604 0<<cTreatPrioOffset| // vlan prio set to 0
605 // (as done in Py code, maybe better option would be setPcp here, which still could be 0?)
606 oFsm.setVid<<cTreatVidOffset| // Outer VID don't care
607 cSetOutputTpidCopyDei<<cTreatTpidOffset) // Set TPID = 0x8100
608
609 meParams := me.ParamData{
610 EntityID: oFsm.evtocdID,
611 Attributes: me.AttributeValueMap{
612 "ReceivedFrameVlanTaggingOperationTable": sliceEvtocdRule,
613 },
614 }
615 meInstance := oFsm.pOmciCC.sendSetEvtocdVar(context.TODO(), ConstDefaultOmciTimeout, true,
616 oFsm.pAdaptFsm.commChan, meParams)
617 //accept also nil as (error) return value for writing to LastTx
618 // - this avoids misinterpretation of new received OMCI messages
619 oFsm.pOmciCC.pLastTxMeInstance = meInstance
620
621 //verify response
622 err := oFsm.waitforOmciResponse()
623 if err != nil {
624 logger.Errorw("Evtocd set untagged->singletagged rule failed, aborting VlanConfig FSM!",
625 log.Fields{"device-id": oFsm.pAdaptFsm.deviceID})
626 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvReset)
627 return
628 }
629 } //just for local var's
630 { // just for local var's
631 // this defines 'stacking' scenario: priotagged->singletagged
632 logger.Debugw("UniVlanConfigFsm Tx Set::EVTOCD priotagged->singletagged rule", log.Fields{
633 "device-id": oFsm.pAdaptFsm.deviceID})
634 sliceEvtocdRule := make([]uint8, 16)
635 // fill vlan tagging operation table bit fields using network=bigEndian order and using slice offset 0 as highest 'word'
636 binary.BigEndian.PutUint32(sliceEvtocdRule[cFilterOuterOffset:],
637 cPrioIgnoreTag<<cFilterPrioOffset| // Not an outer-tag rule
638 cDoNotFilterVid<<cFilterVidOffset| // Do not filter on outer vid
639 cDoNotFilterTPID<<cFilterTpidOffset) // Do not filter on outer TPID field
640
641 binary.BigEndian.PutUint32(sliceEvtocdRule[cFilterInnerOffset:],
642 cPrioDoNotFilter<<cFilterPrioOffset| // Do not Filter on innerprio
643 0<<cFilterVidOffset| // filter on inner vid 0 (prioTagged)
644 cDoNotFilterTPID<<cFilterTpidOffset| // Do not filter on inner TPID field
645 cDoNotFilterEtherType<<cFilterEtherTypeOffset) // Do not filter of EtherType
646
647 binary.BigEndian.PutUint32(sliceEvtocdRule[cTreatOuterOffset:],
648 1<<cTreatTTROffset| // pop the prio-tag
649 cDoNotAddPrio<<cTreatPrioOffset| // do not add outer tag
650 cDontCareVid<<cTreatVidOffset| // Outer VID don't care
651 cDontCareTpid<<cTreatTpidOffset) // Outer TPID field don't care
652
653 binary.BigEndian.PutUint32(sliceEvtocdRule[cTreatInnerOffset:],
654 cCopyPrioFromInner<<cTreatPrioOffset| // vlan copy from PrioTag
655 // (as done in Py code, maybe better option would be setPcp here, which still could be PrioCopy?)
656 oFsm.setVid<<cTreatVidOffset| // Outer VID as configured
657 cSetOutputTpidCopyDei<<cTreatTpidOffset) // Set TPID = 0x8100
658
659 meParams := me.ParamData{
660 EntityID: oFsm.evtocdID,
661 Attributes: me.AttributeValueMap{
662 "ReceivedFrameVlanTaggingOperationTable": sliceEvtocdRule,
663 },
664 }
665 meInstance := oFsm.pOmciCC.sendSetEvtocdVar(context.TODO(), ConstDefaultOmciTimeout, true,
666 oFsm.pAdaptFsm.commChan, meParams)
667 //accept also nil as (error) return value for writing to LastTx
668 // - this avoids misinterpretation of new received OMCI messages
669 oFsm.pOmciCC.pLastTxMeInstance = meInstance
670
671 //verify response
672 err := oFsm.waitforOmciResponse()
673 if err != nil {
674 logger.Errorw("Evtocd set priotagged->singletagged rule failed, aborting VlanConfig FSM!",
675 log.Fields{"device-id": oFsm.pAdaptFsm.deviceID})
676 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvReset)
677 return
678 }
679 } //just for local var's
680 }
681 }
682
683 logger.Debugw("EVTOCD set loop finished", log.Fields{"device-id": oFsm.pAdaptFsm.deviceID})
684 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvRxConfigEvtocd)
685}
686
687func (oFsm *UniVlanConfigFsm) waitforOmciResponse() error {
688 select {
689 case <-time.After(30 * time.Second): //AS FOR THE OTHER OMCI FSM's
690 logger.Warnw("UniVlanConfigFsm multi entity timeout", log.Fields{"for device-id": oFsm.pAdaptFsm.deviceID})
691 return errors.New("uniVlanConfigFsm multi entity timeout")
692 case success := <-oFsm.omciMIdsResponseReceived:
693 if success {
694 logger.Debug("UniVlanConfigFsm multi entity response received")
695 return nil
696 }
697 // should not happen so far
698 logger.Warnw("UniVlanConfigFsm multi entity response error", log.Fields{"for device-id": oFsm.pAdaptFsm.deviceID})
699 return errors.New("uniVlanConfigFsm multi entity responseError")
700 }
701}