blob: cb010c9b4cb994ac29afaa1efa335a8bf3b587f0 [file] [log] [blame]
mpagenkodff5dda2020-08-28 11:52:01 +00001/*
2 * Copyright 2020-present Open Networking Foundation
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17//Package adaptercoreonu provides the utility for onu devices, flows and statistics
18package adaptercoreonu
19
20import (
21 "context"
22 "encoding/binary"
Andrea Campanella6515c582020-10-05 11:25:00 +020023 "fmt"
ozgecanetsiab5000ef2020-11-27 14:38:20 +030024 "net"
mpagenkodff5dda2020-08-28 11:52:01 +000025 "strconv"
Holger Hildebrandt394c5522020-09-11 11:23:01 +000026 "sync"
mpagenkodff5dda2020-08-28 11:52:01 +000027 "time"
28
mpagenko01e726e2020-10-23 09:45:29 +000029 gp "github.com/google/gopacket"
mpagenkodff5dda2020-08-28 11:52:01 +000030 "github.com/looplab/fsm"
31 "github.com/opencord/omci-lib-go"
32 me "github.com/opencord/omci-lib-go/generated"
dbainbri4d3a0dc2020-12-02 00:33:42 +000033 "github.com/opencord/voltha-lib-go/v4/pkg/log"
34 of "github.com/opencord/voltha-protos/v4/go/openflow_13"
mpagenkodff5dda2020-08-28 11:52:01 +000035)
36
37const (
38 // internal predefined values
mpagenkof1fc3862021-02-16 10:09:52 +000039 cWaitForCookieDeletion = 3 //seconds
mpagenkodff5dda2020-08-28 11:52:01 +000040 cDefaultDownstreamMode = 0
41 cDefaultTpid = 0x8100
mpagenko01e726e2020-10-23 09:45:29 +000042 cVtfdTableSize = 12 //as per G.988
43 cMaxAllowedFlows = cVtfdTableSize //which might be under discussion, for the moment connected to limit of VLAN's within VTFD
mpagenkodff5dda2020-08-28 11:52:01 +000044)
45
46const (
mpagenkof1fc3862021-02-16 10:09:52 +000047 // internal offsets for requestEvent according to definition in onu_device_entry::OnuDeviceEvent
48 cDeviceEventOffsetAddWithKvStore = 0 //OmciVlanFilterAddDone - OmciVlanFilterAddDone cannot use because of lint
49 cDeviceEventOffsetAddNoKvStore = OmciVlanFilterAddDoneNoKvStore - OmciVlanFilterAddDone
50 cDeviceEventOffsetRemoveWithKvStore = OmciVlanFilterRemDone - OmciVlanFilterAddDone
51 cDeviceEventOffsetRemoveNoKvStore = OmciVlanFilterRemDoneNoKvStore - OmciVlanFilterAddDone
52)
53
54const (
mpagenkodff5dda2020-08-28 11:52:01 +000055 // bit mask offsets for EVTOCD VlanTaggingOperationTable related to 32 bits (4 bytes)
56 cFilterPrioOffset = 28
57 cFilterVidOffset = 15
58 cFilterTpidOffset = 12
59 cFilterEtherTypeOffset = 0
60 cTreatTTROffset = 30
61 cTreatPrioOffset = 16
62 cTreatVidOffset = 3
63 cTreatTpidOffset = 0
64)
65const (
66 // byte offsets for EVTOCD VlanTaggingOperationTable related to overall 16 byte size with slice byte 0 as first Byte (MSB)
67 cFilterOuterOffset = 0
68 cFilterInnerOffset = 4
69 cTreatOuterOffset = 8
70 cTreatInnerOffset = 12
71)
72const (
73 // basic values used within EVTOCD VlanTaggingOperationTable in respect to their bitfields
74 cPrioIgnoreTag uint32 = 15
75 cPrioDefaultFilter uint32 = 14
76 cPrioDoNotFilter uint32 = 8
77 cDoNotFilterVid uint32 = 4096
78 cDoNotFilterTPID uint32 = 0
79 cDoNotFilterEtherType uint32 = 0
80 cDoNotAddPrio uint32 = 15
81 cCopyPrioFromInner uint32 = 8
Himani Chawla4d908332020-08-31 12:30:20 +053082 //cDontCarePrio uint32 = 0
mpagenkodff5dda2020-08-28 11:52:01 +000083 cDontCareVid uint32 = 0
84 cDontCareTpid uint32 = 0
85 cSetOutputTpidCopyDei uint32 = 4
86)
87
88const (
Holger Hildebrandt10d98192021-01-27 15:29:31 +000089 // events of config UNI port VLAN FSM
mpagenko535d6ef2021-02-26 13:15:34 +000090 vlanEvStart = "vlanEvStart"
91 vlanEvWaitTechProf = "vlanEvWaitTechProf"
92 vlanEvCancelOutstandingConfig = "vlanEvCancelOutstandingConfig"
93 vlanEvContinueConfig = "vlanEvContinueConfig"
94 vlanEvStartConfig = "vlanEvStartConfig"
95 vlanEvRxConfigVtfd = "vlanEvRxConfigVtfd"
96 vlanEvRxConfigEvtocd = "vlanEvRxConfigEvtocd"
97 vlanEvWaitTPIncr = "vlanEvWaitTPIncr"
98 vlanEvIncrFlowConfig = "vlanEvIncrFlowConfig"
99 vlanEvRenew = "vlanEvRenew"
100 vlanEvRemFlowConfig = "vlanEvRemFlowConfig"
101 vlanEvRemFlowDone = "vlanEvRemFlowDone"
102 vlanEvFlowDataRemoved = "vlanEvFlowDataRemoved"
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000103 //vlanEvTimeoutSimple = "vlanEvTimeoutSimple"
104 //vlanEvTimeoutMids = "vlanEvTimeoutMids"
Holger Hildebrandtbe523842021-03-10 10:47:18 +0000105 vlanEvReset = "vlanEvReset"
106 vlanEvRestart = "vlanEvRestart"
107 vlanEvSkipOmciConfig = "vlanEvSkipOmciConfig"
108 vlanEvSkipIncFlowConfig = "vlanEvSkipIncFlowConfig"
mpagenkodff5dda2020-08-28 11:52:01 +0000109)
mpagenko01e726e2020-10-23 09:45:29 +0000110
mpagenkodff5dda2020-08-28 11:52:01 +0000111const (
Holger Hildebrandt10d98192021-01-27 15:29:31 +0000112 // states of config UNI port VLAN FSM
mpagenkodff5dda2020-08-28 11:52:01 +0000113 vlanStDisabled = "vlanStDisabled"
114 vlanStStarting = "vlanStStarting"
115 vlanStWaitingTechProf = "vlanStWaitingTechProf"
116 vlanStConfigVtfd = "vlanStConfigVtfd"
117 vlanStConfigEvtocd = "vlanStConfigEvtocd"
118 vlanStConfigDone = "vlanStConfigDone"
mpagenko551a4d42020-12-08 18:09:20 +0000119 vlanStIncrFlowWaitTP = "vlanStIncrFlowWaitTP"
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000120 vlanStConfigIncrFlow = "vlanStConfigIncrFlow"
mpagenko01e726e2020-10-23 09:45:29 +0000121 vlanStRemoveFlow = "vlanStRemoveFlow"
mpagenkodff5dda2020-08-28 11:52:01 +0000122 vlanStCleanupDone = "vlanStCleanupDone"
123 vlanStResetting = "vlanStResetting"
124)
mpagenkof1fc3862021-02-16 10:09:52 +0000125const cVlanFsmIdleState = vlanStConfigDone // state where no OMCI activity is done (for a longer time)
126const cVlanFsmConfiguredState = vlanStConfigDone // state that indicates that at least some valid user related VLAN configuration should exist
mpagenkodff5dda2020-08-28 11:52:01 +0000127
mpagenko01e726e2020-10-23 09:45:29 +0000128type uniVlanRuleParams struct {
mpagenko551a4d42020-12-08 18:09:20 +0000129 TpID uint8 `json:"tp_id"`
mpagenko01e726e2020-10-23 09:45:29 +0000130 MatchVid uint32 `json:"match_vid"` //use uint32 types for allowing immediate bitshifting
131 MatchPcp uint32 `json:"match_pcp"`
132 TagsToRemove uint32 `json:"tags_to_remove"`
133 SetVid uint32 `json:"set_vid"`
134 SetPcp uint32 `json:"set_pcp"`
135}
136
137type uniVlanFlowParams struct {
138 CookieSlice []uint64 `json:"cookie_slice"`
139 VlanRuleParams uniVlanRuleParams `json:"vlan_rule_params"`
140}
141
142type uniRemoveVlanFlowParams struct {
143 cookie uint64 //just the last cookie valid for removal
144 vlanRuleParams uniVlanRuleParams
145}
146
mpagenkobb47bc22021-04-20 13:29:09 +0000147//UniVlanConfigFsm defines the structure for the state machine for configuration of the VLAN related setting via OMCI
148// builds upon 'VLAN rules' that are derived from multiple flows
mpagenkodff5dda2020-08-28 11:52:01 +0000149type UniVlanConfigFsm struct {
Himani Chawla6d2ae152020-09-02 13:11:20 +0530150 pDeviceHandler *deviceHandler
mpagenko01e726e2020-10-23 09:45:29 +0000151 deviceID string
Himani Chawla6d2ae152020-09-02 13:11:20 +0530152 pOmciCC *omciCC
153 pOnuUniPort *onuUniPort
154 pUniTechProf *onuUniTechProf
155 pOnuDB *onuDeviceDB
mpagenkodff5dda2020-08-28 11:52:01 +0000156 requestEvent OnuDeviceEvent
157 omciMIdsResponseReceived chan bool //seperate channel needed for checking multiInstance OMCI message responses
158 pAdaptFsm *AdapterFsm
159 acceptIncrementalEvtoOption bool
mpagenko2418ab02020-11-12 12:58:06 +0000160 clearPersistency bool
mpagenkocf48e452021-04-23 09:23:00 +0000161 isCanceled bool
mpagenko7d6bb022021-03-11 15:07:55 +0000162 isAwaitingResponse bool
163 mutexIsAwaitingResponse sync.RWMutex
mpagenko551a4d42020-12-08 18:09:20 +0000164 mutexFlowParams sync.RWMutex
mpagenkobb47bc22021-04-20 13:29:09 +0000165 chCookieDeleted chan bool //channel to indicate that a specific cookie (related to the active rule) was deleted
mpagenko9a304ea2020-12-16 15:54:01 +0000166 actualUniVlanConfigRule uniVlanRuleParams
mpagenko01e726e2020-10-23 09:45:29 +0000167 uniVlanFlowParamsSlice []uniVlanFlowParams
168 uniRemoveFlowsSlice []uniRemoveVlanFlowParams
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000169 numUniFlows uint8 // expected number of flows should be less than 12
170 configuredUniFlow uint8
mpagenko01e726e2020-10-23 09:45:29 +0000171 numRemoveFlows uint8
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000172 numVlanFilterEntries uint8
mpagenko01e726e2020-10-23 09:45:29 +0000173 vlanFilterList [cVtfdTableSize]uint16
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000174 evtocdID uint16
mpagenko01e726e2020-10-23 09:45:29 +0000175 pLastTxMeInstance *me.ManagedEntity
mpagenkofc4f56e2020-11-04 17:17:49 +0000176 requestEventOffset uint8
mpagenko551a4d42020-12-08 18:09:20 +0000177 TpIDWaitingFor uint8
mpagenkobb47bc22021-04-20 13:29:09 +0000178 signalOnFlowDelete bool
179 flowDeleteChannel chan<- bool
mpagenkof1fc3862021-02-16 10:09:52 +0000180 //cookie value that indicates that a rule to add is delayed by waiting for deletion of some other existing rule with the same cookie
181 delayNewRuleCookie uint64
mpagenkodff5dda2020-08-28 11:52:01 +0000182}
183
mpagenko01e726e2020-10-23 09:45:29 +0000184//NewUniVlanConfigFsm is the 'constructor' for the state machine to config the PON ANI ports
185// of ONU UNI ports via OMCI
dbainbri4d3a0dc2020-12-02 00:33:42 +0000186func NewUniVlanConfigFsm(ctx context.Context, apDeviceHandler *deviceHandler, apDevOmciCC *omciCC, apUniPort *onuUniPort,
mpagenko551a4d42020-12-08 18:09:20 +0000187 apUniTechProf *onuUniTechProf, apOnuDB *onuDeviceDB, aTechProfileID uint8,
mpagenko01e726e2020-10-23 09:45:29 +0000188 aRequestEvent OnuDeviceEvent, aName string, aCommChannel chan Message, aAcceptIncrementalEvto bool,
189 aCookieSlice []uint64, aMatchVlan uint16, aSetVlan uint16, aSetPcp uint8) *UniVlanConfigFsm {
mpagenkodff5dda2020-08-28 11:52:01 +0000190 instFsm := &UniVlanConfigFsm{
191 pDeviceHandler: apDeviceHandler,
mpagenko01e726e2020-10-23 09:45:29 +0000192 deviceID: apDeviceHandler.deviceID,
mpagenkodff5dda2020-08-28 11:52:01 +0000193 pOmciCC: apDevOmciCC,
194 pOnuUniPort: apUniPort,
195 pUniTechProf: apUniTechProf,
196 pOnuDB: apOnuDB,
mpagenkodff5dda2020-08-28 11:52:01 +0000197 requestEvent: aRequestEvent,
198 acceptIncrementalEvtoOption: aAcceptIncrementalEvto,
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000199 numUniFlows: 0,
200 configuredUniFlow: 0,
mpagenko01e726e2020-10-23 09:45:29 +0000201 numRemoveFlows: 0,
mpagenko2418ab02020-11-12 12:58:06 +0000202 clearPersistency: true,
mpagenkodff5dda2020-08-28 11:52:01 +0000203 }
204
mpagenko01e726e2020-10-23 09:45:29 +0000205 instFsm.pAdaptFsm = NewAdapterFsm(aName, instFsm.deviceID, aCommChannel)
mpagenkodff5dda2020-08-28 11:52:01 +0000206 if instFsm.pAdaptFsm == nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +0000207 logger.Errorw(ctx, "UniVlanConfigFsm's AdapterFsm could not be instantiated!!", log.Fields{
mpagenko01e726e2020-10-23 09:45:29 +0000208 "device-id": instFsm.deviceID})
mpagenkodff5dda2020-08-28 11:52:01 +0000209 return nil
210 }
mpagenkodff5dda2020-08-28 11:52:01 +0000211 instFsm.pAdaptFsm.pFsm = fsm.NewFSM(
212 vlanStDisabled,
213 fsm.Events{
214 {Name: vlanEvStart, Src: []string{vlanStDisabled}, Dst: vlanStStarting},
215 {Name: vlanEvWaitTechProf, Src: []string{vlanStStarting}, Dst: vlanStWaitingTechProf},
mpagenko535d6ef2021-02-26 13:15:34 +0000216 {Name: vlanEvCancelOutstandingConfig, Src: []string{vlanStWaitingTechProf}, Dst: vlanStConfigDone},
mpagenkodff5dda2020-08-28 11:52:01 +0000217 {Name: vlanEvContinueConfig, Src: []string{vlanStWaitingTechProf}, Dst: vlanStConfigVtfd},
218 {Name: vlanEvStartConfig, Src: []string{vlanStStarting}, Dst: vlanStConfigVtfd},
219 {Name: vlanEvRxConfigVtfd, Src: []string{vlanStConfigVtfd}, Dst: vlanStConfigEvtocd},
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000220 {Name: vlanEvRxConfigEvtocd, Src: []string{vlanStConfigEvtocd, vlanStConfigIncrFlow},
221 Dst: vlanStConfigDone},
mpagenko551a4d42020-12-08 18:09:20 +0000222 {Name: vlanEvRenew, Src: []string{vlanStConfigDone}, Dst: vlanStStarting},
223 {Name: vlanEvWaitTPIncr, Src: []string{vlanStConfigDone}, Dst: vlanStIncrFlowWaitTP},
224 {Name: vlanEvIncrFlowConfig, Src: []string{vlanStConfigDone, vlanStIncrFlowWaitTP},
225 Dst: vlanStConfigIncrFlow},
mpagenko01e726e2020-10-23 09:45:29 +0000226 {Name: vlanEvRemFlowConfig, Src: []string{vlanStConfigDone}, Dst: vlanStRemoveFlow},
227 {Name: vlanEvRemFlowDone, Src: []string{vlanStRemoveFlow}, Dst: vlanStCleanupDone},
228 {Name: vlanEvFlowDataRemoved, Src: []string{vlanStCleanupDone}, Dst: vlanStConfigDone},
mpagenkodff5dda2020-08-28 11:52:01 +0000229 /*
230 {Name: vlanEvTimeoutSimple, Src: []string{
231 vlanStCreatingDot1PMapper, vlanStCreatingMBPCD, vlanStSettingTconts, vlanStSettingDot1PMapper}, Dst: vlanStStarting},
232 {Name: vlanEvTimeoutMids, Src: []string{
233 vlanStCreatingGemNCTPs, vlanStCreatingGemIWs, vlanStSettingPQs}, Dst: vlanStStarting},
234 */
235 // exceptional treatment for all states except vlanStResetting
236 {Name: vlanEvReset, Src: []string{vlanStStarting, vlanStWaitingTechProf,
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000237 vlanStConfigVtfd, vlanStConfigEvtocd, vlanStConfigDone, vlanStConfigIncrFlow,
mpagenko01e726e2020-10-23 09:45:29 +0000238 vlanStRemoveFlow, vlanStCleanupDone},
mpagenkodff5dda2020-08-28 11:52:01 +0000239 Dst: vlanStResetting},
240 // the only way to get to resource-cleared disabled state again is via "resseting"
241 {Name: vlanEvRestart, Src: []string{vlanStResetting}, Dst: vlanStDisabled},
Holger Hildebrandtbe523842021-03-10 10:47:18 +0000242 // transitions for reconcile handling according to VOL-3834
243 {Name: vlanEvSkipOmciConfig, Src: []string{vlanStStarting}, Dst: vlanStConfigDone},
244 {Name: vlanEvSkipOmciConfig, Src: []string{vlanStConfigDone}, Dst: vlanStConfigIncrFlow},
245 {Name: vlanEvSkipIncFlowConfig, Src: []string{vlanStConfigIncrFlow}, Dst: vlanStConfigDone},
mpagenkodff5dda2020-08-28 11:52:01 +0000246 },
mpagenkodff5dda2020-08-28 11:52:01 +0000247 fsm.Callbacks{
dbainbri4d3a0dc2020-12-02 00:33:42 +0000248 "enter_state": func(e *fsm.Event) { instFsm.pAdaptFsm.logFsmStateChange(ctx, e) },
249 "enter_" + vlanStStarting: func(e *fsm.Event) { instFsm.enterConfigStarting(ctx, e) },
250 "enter_" + vlanStConfigVtfd: func(e *fsm.Event) { instFsm.enterConfigVtfd(ctx, e) },
251 "enter_" + vlanStConfigEvtocd: func(e *fsm.Event) { instFsm.enterConfigEvtocd(ctx, e) },
252 "enter_" + vlanStConfigDone: func(e *fsm.Event) { instFsm.enterVlanConfigDone(ctx, e) },
253 "enter_" + vlanStConfigIncrFlow: func(e *fsm.Event) { instFsm.enterConfigIncrFlow(ctx, e) },
254 "enter_" + vlanStRemoveFlow: func(e *fsm.Event) { instFsm.enterRemoveFlow(ctx, e) },
255 "enter_" + vlanStCleanupDone: func(e *fsm.Event) { instFsm.enterVlanCleanupDone(ctx, e) },
256 "enter_" + vlanStResetting: func(e *fsm.Event) { instFsm.enterResetting(ctx, e) },
257 "enter_" + vlanStDisabled: func(e *fsm.Event) { instFsm.enterDisabled(ctx, e) },
mpagenkodff5dda2020-08-28 11:52:01 +0000258 },
259 )
260 if instFsm.pAdaptFsm.pFsm == nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +0000261 logger.Errorw(ctx, "UniVlanConfigFsm's Base FSM could not be instantiated!!", log.Fields{
mpagenko01e726e2020-10-23 09:45:29 +0000262 "device-id": instFsm.deviceID})
mpagenkodff5dda2020-08-28 11:52:01 +0000263 return nil
264 }
265
dbainbri4d3a0dc2020-12-02 00:33:42 +0000266 _ = instFsm.initUniFlowParams(ctx, aTechProfileID, aCookieSlice, aMatchVlan, aSetVlan, aSetPcp)
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000267
dbainbri4d3a0dc2020-12-02 00:33:42 +0000268 logger.Debugw(ctx, "UniVlanConfigFsm created", log.Fields{"device-id": instFsm.deviceID,
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000269 "accIncrEvto": instFsm.acceptIncrementalEvtoOption})
mpagenkodff5dda2020-08-28 11:52:01 +0000270 return instFsm
271}
272
mpagenko01e726e2020-10-23 09:45:29 +0000273//initUniFlowParams is a simplified form of SetUniFlowParams() used for first flow parameters configuration
mpagenko551a4d42020-12-08 18:09:20 +0000274func (oFsm *UniVlanConfigFsm) initUniFlowParams(ctx context.Context, aTpID uint8, aCookieSlice []uint64,
mpagenko01e726e2020-10-23 09:45:29 +0000275 aMatchVlan uint16, aSetVlan uint16, aSetPcp uint8) error {
276 loRuleParams := uniVlanRuleParams{
Holger Hildebrandt47555e72020-09-21 11:07:24 +0000277 TpID: aTpID,
278 MatchVid: uint32(aMatchVlan),
279 SetVid: uint32(aSetVlan),
280 SetPcp: uint32(aSetPcp),
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000281 }
282 // some automatic adjustments on the filter/treat parameters as not specifically configured/ensured by flow configuration parameters
mpagenko01e726e2020-10-23 09:45:29 +0000283 loRuleParams.TagsToRemove = 1 //one tag to remove as default setting
284 loRuleParams.MatchPcp = cPrioDoNotFilter // do not Filter on prio as default
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000285
mpagenko01e726e2020-10-23 09:45:29 +0000286 if loRuleParams.SetVid == uint32(of.OfpVlanId_OFPVID_PRESENT) {
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000287 //then matchVlan is don't care and should be overwritten to 'transparent' here to avoid unneeded multiple flow entries
mpagenko01e726e2020-10-23 09:45:29 +0000288 loRuleParams.MatchVid = uint32(of.OfpVlanId_OFPVID_PRESENT)
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000289 //TODO!!: maybe be needed to be re-checked at flow deletion (but assume all flows are always deleted togehther)
290 } else {
291 if !oFsm.acceptIncrementalEvtoOption {
292 //then matchVlan is don't care and should be overwritten to 'transparent' here to avoid unneeded multiple flow entries
mpagenko01e726e2020-10-23 09:45:29 +0000293 loRuleParams.MatchVid = uint32(of.OfpVlanId_OFPVID_PRESENT)
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000294 }
295 }
296
mpagenko01e726e2020-10-23 09:45:29 +0000297 if loRuleParams.MatchVid == uint32(of.OfpVlanId_OFPVID_PRESENT) {
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000298 // no prio/vid filtering requested
mpagenko01e726e2020-10-23 09:45:29 +0000299 loRuleParams.TagsToRemove = 0 //no tag pop action
300 loRuleParams.MatchPcp = cPrioIgnoreTag // no vlan tag filtering
301 if loRuleParams.SetPcp == cCopyPrioFromInner {
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000302 //in case of no filtering and configured PrioCopy ensure default prio setting to 0
303 // which is required for stacking of untagged, but obviously also ensures prio setting for prio/singletagged
304 // might collide with NoMatchVid/CopyPrio(/setVid) setting
305 // this was some precondition setting taken over from py adapter ..
mpagenko01e726e2020-10-23 09:45:29 +0000306 loRuleParams.SetPcp = 0
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000307 }
308 }
mpagenko01e726e2020-10-23 09:45:29 +0000309
310 loFlowParams := uniVlanFlowParams{VlanRuleParams: loRuleParams}
311 loFlowParams.CookieSlice = make([]uint64, 0)
312 loFlowParams.CookieSlice = append(loFlowParams.CookieSlice, aCookieSlice...)
313
314 //no mutex protection is required for initial access and adding the first flow is always possible
315 oFsm.uniVlanFlowParamsSlice = make([]uniVlanFlowParams, 0)
316 oFsm.uniVlanFlowParamsSlice = append(oFsm.uniVlanFlowParamsSlice, loFlowParams)
dbainbri4d3a0dc2020-12-02 00:33:42 +0000317 logger.Debugw(ctx, "first UniVlanConfigFsm flow added", log.Fields{
mpagenko01e726e2020-10-23 09:45:29 +0000318 "Cookies": oFsm.uniVlanFlowParamsSlice[0].CookieSlice,
319 "MatchVid": strconv.FormatInt(int64(loRuleParams.MatchVid), 16),
320 "SetVid": strconv.FormatInt(int64(loRuleParams.SetVid), 16),
321 "SetPcp": loRuleParams.SetPcp,
322 "device-id": oFsm.deviceID})
323 oFsm.numUniFlows = 1
324 oFsm.uniRemoveFlowsSlice = make([]uniRemoveVlanFlowParams, 0) //initially nothing to remove
325
326 //permanently store flow config for reconcile case
dbainbri4d3a0dc2020-12-02 00:33:42 +0000327 if err := oFsm.pDeviceHandler.storePersUniFlowConfig(ctx, oFsm.pOnuUniPort.uniID,
mpagenkof1fc3862021-02-16 10:09:52 +0000328 &oFsm.uniVlanFlowParamsSlice, true); err != nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +0000329 logger.Errorw(ctx, err.Error(), log.Fields{"device-id": oFsm.deviceID})
mpagenko01e726e2020-10-23 09:45:29 +0000330 return err
331 }
332
333 return nil
334}
335
mpagenko7d6bb022021-03-11 15:07:55 +0000336//CancelProcessing ensures that suspended processing at waiting on some response is aborted and reset of FSM
mpagenko73143992021-04-09 15:17:10 +0000337func (oFsm *UniVlanConfigFsm) CancelProcessing(ctx context.Context) {
mpagenko7d6bb022021-03-11 15:07:55 +0000338 //mutex protection is required for possible concurrent access to FSM members
mpagenkocf48e452021-04-23 09:23:00 +0000339 oFsm.mutexIsAwaitingResponse.Lock()
340 oFsm.isCanceled = true
mpagenko7d6bb022021-03-11 15:07:55 +0000341 if oFsm.isAwaitingResponse {
mpagenkocf48e452021-04-23 09:23:00 +0000342 //attention: for an unbuffered channel the sender is blocked until the value is received (processed)!
343 // accordingly the mutex must be released before sending to channel here (mutex acquired in receiver)
344 oFsm.mutexIsAwaitingResponse.Unlock()
mpagenko7d6bb022021-03-11 15:07:55 +0000345 //use channel to indicate that the response waiting shall be aborted
346 oFsm.omciMIdsResponseReceived <- false
mpagenkocf48e452021-04-23 09:23:00 +0000347 } else {
348 oFsm.mutexIsAwaitingResponse.Unlock()
mpagenko7d6bb022021-03-11 15:07:55 +0000349 }
mpagenkocf48e452021-04-23 09:23:00 +0000350
mpagenko7d6bb022021-03-11 15:07:55 +0000351 // in any case (even if it might be automatically requested by above cancellation of waiting) ensure resetting the FSM
352 pAdaptFsm := oFsm.pAdaptFsm
353 if pAdaptFsm != nil {
mpagenkobb47bc22021-04-20 13:29:09 +0000354 if fsmErr := pAdaptFsm.pFsm.Event(vlanEvReset); fsmErr != nil {
mpagenkocf48e452021-04-23 09:23:00 +0000355 logger.Errorw(ctx, "reset-event failed in UniVlanConfigFsm!",
mpagenkobb47bc22021-04-20 13:29:09 +0000356 log.Fields{"fsmState": oFsm.pAdaptFsm.pFsm.Current(), "error": fsmErr, "device-id": oFsm.deviceID})
Holger Hildebrandtb4563ab2021-04-14 10:27:20 +0000357 }
mpagenko7d6bb022021-03-11 15:07:55 +0000358 }
359}
360
mpagenko551a4d42020-12-08 18:09:20 +0000361//GetWaitingTpID returns the TpId that the FSM might be waiting for continuation (0 if none)
362func (oFsm *UniVlanConfigFsm) GetWaitingTpID() uint8 {
363 //mutex protection is required for possible concurrent access to FSM members
364 oFsm.mutexFlowParams.RLock()
365 defer oFsm.mutexFlowParams.RUnlock()
366 return oFsm.TpIDWaitingFor
367}
368
mpagenko2418ab02020-11-12 12:58:06 +0000369//RequestClearPersistency sets the internal flag to not clear persistency data (false=NoClear)
370func (oFsm *UniVlanConfigFsm) RequestClearPersistency(aClear bool) {
371 //mutex protection is required for possible concurrent access to FSM members
mpagenko15ff4a52021-03-02 10:09:20 +0000372 oFsm.mutexFlowParams.Lock()
373 defer oFsm.mutexFlowParams.Unlock()
mpagenko2418ab02020-11-12 12:58:06 +0000374 oFsm.clearPersistency = aClear
375}
376
mpagenko01e726e2020-10-23 09:45:29 +0000377//SetUniFlowParams verifies on existence of flow parameters to be configured,
378// optionally udates the cookie list or appends a new flow if there is space
379// if possible the FSM is trigggerd to start with the processing
mpagenko551a4d42020-12-08 18:09:20 +0000380// ignore complexity by now
381// nolint: gocyclo
382func (oFsm *UniVlanConfigFsm) SetUniFlowParams(ctx context.Context, aTpID uint8, aCookieSlice []uint64,
mpagenko01e726e2020-10-23 09:45:29 +0000383 aMatchVlan uint16, aSetVlan uint16, aSetPcp uint8) error {
384 loRuleParams := uniVlanRuleParams{
385 TpID: aTpID,
386 MatchVid: uint32(aMatchVlan),
387 SetVid: uint32(aSetVlan),
388 SetPcp: uint32(aSetPcp),
389 }
390 // some automatic adjustments on the filter/treat parameters as not specifically configured/ensured by flow configuration parameters
391 loRuleParams.TagsToRemove = 1 //one tag to remove as default setting
392 loRuleParams.MatchPcp = cPrioDoNotFilter // do not Filter on prio as default
393
394 if loRuleParams.SetVid == uint32(of.OfpVlanId_OFPVID_PRESENT) {
395 //then matchVlan is don't care and should be overwritten to 'transparent' here to avoid unneeded multiple flow entries
396 loRuleParams.MatchVid = uint32(of.OfpVlanId_OFPVID_PRESENT)
397 //TODO!!: maybe be needed to be re-checked at flow deletion (but assume all flows are always deleted togehther)
398 } else {
399 if !oFsm.acceptIncrementalEvtoOption {
400 //then matchVlan is don't care and should be overwritten to 'transparent' here to avoid unneeded multiple flow entries
401 loRuleParams.MatchVid = uint32(of.OfpVlanId_OFPVID_PRESENT)
402 }
403 }
404
405 if loRuleParams.MatchVid == uint32(of.OfpVlanId_OFPVID_PRESENT) {
406 // no prio/vid filtering requested
407 loRuleParams.TagsToRemove = 0 //no tag pop action
408 loRuleParams.MatchPcp = cPrioIgnoreTag // no vlan tag filtering
409 if loRuleParams.SetPcp == cCopyPrioFromInner {
410 //in case of no filtering and configured PrioCopy ensure default prio setting to 0
411 // which is required for stacking of untagged, but obviously also ensures prio setting for prio/singletagged
412 // might collide with NoMatchVid/CopyPrio(/setVid) setting
413 // this was some precondition setting taken over from py adapter ..
414 loRuleParams.SetPcp = 0
415 }
416 }
417
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000418 flowEntryMatch := false
mpagenko01e726e2020-10-23 09:45:29 +0000419 flowCookieModify := false
mpagenkof1fc3862021-02-16 10:09:52 +0000420 requestAppendRule := false
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000421 //mutex protection is required for possible concurrent access to FSM members
422 oFsm.mutexFlowParams.Lock()
mpagenko01e726e2020-10-23 09:45:29 +0000423 for flow, storedUniFlowParams := range oFsm.uniVlanFlowParamsSlice {
424 //TODO: Verify if using e.g. hashes for the structures here for comparison may generate
425 // countable run time optimization (perhaps with including the hash in kvStore storage?)
426 if storedUniFlowParams.VlanRuleParams == loRuleParams {
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000427 flowEntryMatch = true
dbainbri4d3a0dc2020-12-02 00:33:42 +0000428 logger.Debugw(ctx, "UniVlanConfigFsm flow setting - rule already exists", log.Fields{
mpagenko01e726e2020-10-23 09:45:29 +0000429 "device-id": oFsm.deviceID})
430 var cookieMatch bool
431 for _, newCookie := range aCookieSlice { // for all cookies available in the arguments
432 cookieMatch = false
433 for _, cookie := range storedUniFlowParams.CookieSlice {
434 if cookie == newCookie {
dbainbri4d3a0dc2020-12-02 00:33:42 +0000435 logger.Debugw(ctx, "UniVlanConfigFsm flow setting - and cookie already exists", log.Fields{
mpagenko01e726e2020-10-23 09:45:29 +0000436 "device-id": oFsm.deviceID, "cookie": cookie})
437 cookieMatch = true
438 break //found new cookie - no further search for this requested cookie
439 }
440 }
441 if !cookieMatch {
mpagenkof1fc3862021-02-16 10:09:52 +0000442 delayedCookie := oFsm.delayNewRuleForCookie(ctx, aCookieSlice)
443 if delayedCookie != 0 {
444 //a delay for adding the cookie to this rule is requested
445 // take care of the mutex which is already locked here, need to unlock/lock accordingly to prevent deadlock in suspension
446 oFsm.mutexFlowParams.Unlock()
447 oFsm.suspendNewRule(ctx)
448 flowCookieModify, requestAppendRule = oFsm.reviseFlowConstellation(ctx, delayedCookie, loRuleParams)
449 oFsm.mutexFlowParams.Lock()
450 } else {
451 logger.Debugw(ctx, "UniVlanConfigFsm flow setting -adding new cookie", log.Fields{
452 "device-id": oFsm.deviceID, "cookie": newCookie})
453 //as range works with copies of the slice we have to write to the original slice!!
454 oFsm.uniVlanFlowParamsSlice[flow].CookieSlice = append(oFsm.uniVlanFlowParamsSlice[flow].CookieSlice,
455 newCookie)
456 flowCookieModify = true
457 }
mpagenko01e726e2020-10-23 09:45:29 +0000458 }
459 } //for all new cookies
460 break // found rule - no further rule search
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000461 }
462 }
mpagenkof1fc3862021-02-16 10:09:52 +0000463 oFsm.mutexFlowParams.Unlock()
464
465 if !flowEntryMatch { //it is (was) a new rule
466 delayedCookie := oFsm.suspendIfRequiredNewRule(ctx, aCookieSlice)
467 requestAppendRule = true //default assumption here is that rule is to be appended
468 flowCookieModify = true //and that the the flow data base is to be updated
469 if delayedCookie != 0 { //it was suspended
470 flowCookieModify, requestAppendRule = oFsm.reviseFlowConstellation(ctx, delayedCookie, loRuleParams)
471 }
472 }
473 kvStoreWrite := false //default setting is to not write to kvStore immediately - will be done on FSM execution finally
474 if requestAppendRule {
475 oFsm.mutexFlowParams.Lock()
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000476 if oFsm.numUniFlows < cMaxAllowedFlows {
mpagenko01e726e2020-10-23 09:45:29 +0000477 loFlowParams := uniVlanFlowParams{VlanRuleParams: loRuleParams}
478 loFlowParams.CookieSlice = make([]uint64, 0)
479 loFlowParams.CookieSlice = append(loFlowParams.CookieSlice, aCookieSlice...)
480 oFsm.uniVlanFlowParamsSlice = append(oFsm.uniVlanFlowParamsSlice, loFlowParams)
dbainbri4d3a0dc2020-12-02 00:33:42 +0000481 logger.Debugw(ctx, "UniVlanConfigFsm flow add", log.Fields{
mpagenko01e726e2020-10-23 09:45:29 +0000482 "Cookies": oFsm.uniVlanFlowParamsSlice[oFsm.numUniFlows].CookieSlice,
483 "MatchVid": strconv.FormatInt(int64(loRuleParams.MatchVid), 16),
484 "SetVid": strconv.FormatInt(int64(loRuleParams.SetVid), 16),
Girish Gowdra041dcb32020-11-16 16:54:30 -0800485 "SetPcp": loRuleParams.SetPcp, "numberofFlows": oFsm.numUniFlows + 1,
mpagenko01e726e2020-10-23 09:45:29 +0000486 "device-id": oFsm.deviceID})
487
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000488 oFsm.numUniFlows++
Holger Hildebrandtbe523842021-03-10 10:47:18 +0000489 pConfigVlanStateBaseFsm := oFsm.pAdaptFsm.pFsm
490
491 if oFsm.pDeviceHandler.isSkipOnuConfigReconciling() {
492 logger.Debugw(ctx, "reconciling - skip omci-config of additional vlan rule",
493 log.Fields{"fsmState": oFsm.pAdaptFsm.pFsm.Current(), "device-id": oFsm.deviceID})
mpagenkobb47bc22021-04-20 13:29:09 +0000494 //attention: take care to release the mutexFlowParams when calling the FSM directly -
495 // synchronous FSM 'event/state' functions may rely on this mutex
Holger Hildebrandtbe523842021-03-10 10:47:18 +0000496 oFsm.mutexFlowParams.Unlock()
497 if pConfigVlanStateBaseFsm.Is(vlanStConfigDone) {
mpagenkobb47bc22021-04-20 13:29:09 +0000498 if fsmErr := pConfigVlanStateBaseFsm.Event(vlanEvSkipOmciConfig); fsmErr != nil {
499 logger.Errorw(ctx, "error in FsmEvent handling UniVlanConfigFsm!",
500 log.Fields{"fsmState": oFsm.pAdaptFsm.pFsm.Current(), "error": fsmErr, "device-id": oFsm.deviceID})
501 }
Holger Hildebrandtbe523842021-03-10 10:47:18 +0000502 }
503 return nil
504 }
mpagenko01e726e2020-10-23 09:45:29 +0000505 // note: theoretical it would be possible to clear the same rule from the remove slice
506 // (for entries that have not yet been started with removal)
507 // but that is getting quite complicated - maybe a future optimization in case it should prove reasonable
508 // anyway the precondition here is that the FSM checks for rules to delete first and adds new rules afterwards
Holger Hildebrandt47555e72020-09-21 11:07:24 +0000509
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000510 if pConfigVlanStateBaseFsm.Is(vlanStConfigDone) {
511 //have to re-trigger the FSM to proceed with outstanding incremental flow configuration
mpagenko551a4d42020-12-08 18:09:20 +0000512 if oFsm.configuredUniFlow == 0 {
513 // this is a restart with a complete new flow, we can re-use the initial flow config control
514 // including the check, if the related techProfile is (still) available (probably also removed in between)
mpagenkobb47bc22021-04-20 13:29:09 +0000515 //attention: take care to release the mutexFlowParams when calling the FSM directly -
516 // synchronous FSM 'event/state' functions may rely on this mutex
517 oFsm.mutexFlowParams.Unlock()
518 if fsmErr := pConfigVlanStateBaseFsm.Event(vlanEvRenew); fsmErr != nil {
519 logger.Errorw(ctx, "error in FsmEvent handling UniVlanConfigFsm!",
520 log.Fields{"fsmState": pConfigVlanStateBaseFsm.Current(), "error": fsmErr, "device-id": oFsm.deviceID})
521 }
mpagenko551a4d42020-12-08 18:09:20 +0000522 } else {
523 //some further flows are to be configured
mpagenko9a304ea2020-12-16 15:54:01 +0000524 //store the actual rule that shall be worked upon in the following transient states
525 oFsm.actualUniVlanConfigRule = oFsm.uniVlanFlowParamsSlice[oFsm.configuredUniFlow].VlanRuleParams
mpagenko551a4d42020-12-08 18:09:20 +0000526 //tpId of the next rule to be configured
mpagenko9a304ea2020-12-16 15:54:01 +0000527 tpID := oFsm.actualUniVlanConfigRule.TpID
mpagenko551a4d42020-12-08 18:09:20 +0000528 loTechProfDone := oFsm.pUniTechProf.getTechProfileDone(ctx, oFsm.pOnuUniPort.uniID, tpID)
529 oFsm.TpIDWaitingFor = tpID
mpagenko9a304ea2020-12-16 15:54:01 +0000530 logger.Debugw(ctx, "UniVlanConfigFsm - incremental config request (on setConfig)", log.Fields{
531 "device-id": oFsm.deviceID, "uni-id": oFsm.pOnuUniPort.uniID,
532 "set-Vlan": oFsm.actualUniVlanConfigRule.SetVid, "tp-id": tpID, "ProfDone": loTechProfDone})
mpagenkobb47bc22021-04-20 13:29:09 +0000533
534 //attention: take care to release the mutexFlowParams when calling the FSM directly -
535 // synchronous FSM 'event/state' functions may rely on this mutex
536 oFsm.mutexFlowParams.Unlock()
537 var fsmErr error
538 if loTechProfDone {
539 // let the vlan processing continue with next rule
540 fsmErr = pConfigVlanStateBaseFsm.Event(vlanEvIncrFlowConfig)
541 } else {
542 // set to waiting for Techprofile
543 fsmErr = pConfigVlanStateBaseFsm.Event(vlanEvWaitTPIncr)
544 }
545 if fsmErr != nil {
546 logger.Errorw(ctx, "error in FsmEvent handling UniVlanConfigFsm!",
547 log.Fields{"fsmState": pConfigVlanStateBaseFsm.Current(), "error": fsmErr, "device-id": oFsm.deviceID})
548 }
mpagenko551a4d42020-12-08 18:09:20 +0000549 }
mpagenkobb47bc22021-04-20 13:29:09 +0000550 } else {
551 // if not in the appropriate state a new entry will be automatically considered later
552 // when the configDone state is reached
553 oFsm.mutexFlowParams.Unlock()
554 }
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000555 } else {
dbainbri4d3a0dc2020-12-02 00:33:42 +0000556 logger.Errorw(ctx, "UniVlanConfigFsm flow limit exceeded", log.Fields{
mpagenko01e726e2020-10-23 09:45:29 +0000557 "device-id": oFsm.deviceID, "flow-number": oFsm.numUniFlows})
mpagenko15ff4a52021-03-02 10:09:20 +0000558 oFsm.mutexFlowParams.Unlock()
mpagenko01e726e2020-10-23 09:45:29 +0000559 return fmt.Errorf(" UniVlanConfigFsm flow limit exceeded %s", oFsm.deviceID)
560 }
mpagenkofc4f56e2020-11-04 17:17:49 +0000561 } else {
562 // no activity within the FSM for OMCI processing, the deviceReason may be updated immediately
mpagenkof1fc3862021-02-16 10:09:52 +0000563 kvStoreWrite = true // ensure actual data write to kvStore immediately (no FSM activity)
mpagenko15ff4a52021-03-02 10:09:20 +0000564 oFsm.mutexFlowParams.RLock()
mpagenkofc4f56e2020-11-04 17:17:49 +0000565 if oFsm.numUniFlows == oFsm.configuredUniFlow {
566 //all requested rules really have been configured
567 // state transition notification is checked in deviceHandler
mpagenko15ff4a52021-03-02 10:09:20 +0000568 oFsm.mutexFlowParams.RUnlock()
mpagenkofc4f56e2020-11-04 17:17:49 +0000569 if oFsm.pDeviceHandler != nil {
570 //also the related TechProfile was already configured
dbainbri4d3a0dc2020-12-02 00:33:42 +0000571 logger.Debugw(ctx, "UniVlanConfigFsm rule already set - send immediate add-success event for reason update", log.Fields{
mpagenkofc4f56e2020-11-04 17:17:49 +0000572 "device-id": oFsm.deviceID})
mpagenkof1fc3862021-02-16 10:09:52 +0000573 // success indication without the need to write to kvStore (done already below with updated data from storePersUniFlowConfig())
574 go oFsm.pDeviceHandler.deviceProcStatusUpdate(ctx, OnuDeviceEvent(oFsm.requestEvent+cDeviceEventOffsetAddNoKvStore))
mpagenkofc4f56e2020-11-04 17:17:49 +0000575 }
576 } else {
577 // avoid device reason update as the rule config connected to this flow may still be in progress
578 // and the device reason should only be updated on success of rule config
dbainbri4d3a0dc2020-12-02 00:33:42 +0000579 logger.Debugw(ctx, "UniVlanConfigFsm rule already set but configuration ongoing, suppress early add-success event for reason update",
mpagenkofc4f56e2020-11-04 17:17:49 +0000580 log.Fields{"device-id": oFsm.deviceID,
581 "NumberofRules": oFsm.numUniFlows, "Configured rules": oFsm.configuredUniFlow})
mpagenko15ff4a52021-03-02 10:09:20 +0000582 oFsm.mutexFlowParams.RUnlock()
mpagenkofc4f56e2020-11-04 17:17:49 +0000583 }
584 }
mpagenko01e726e2020-10-23 09:45:29 +0000585
mpagenkof1fc3862021-02-16 10:09:52 +0000586 if flowCookieModify { // some change was done to the flow entries
mpagenko01e726e2020-10-23 09:45:29 +0000587 //permanently store flow config for reconcile case
mpagenko15ff4a52021-03-02 10:09:20 +0000588 oFsm.mutexFlowParams.RLock()
mpagenkof1fc3862021-02-16 10:09:52 +0000589 if err := oFsm.pDeviceHandler.storePersUniFlowConfig(ctx, oFsm.pOnuUniPort.uniID,
590 &oFsm.uniVlanFlowParamsSlice, kvStoreWrite); err != nil {
mpagenko15ff4a52021-03-02 10:09:20 +0000591 oFsm.mutexFlowParams.RUnlock()
dbainbri4d3a0dc2020-12-02 00:33:42 +0000592 logger.Errorw(ctx, err.Error(), log.Fields{"device-id": oFsm.deviceID})
mpagenko01e726e2020-10-23 09:45:29 +0000593 return err
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000594 }
mpagenko15ff4a52021-03-02 10:09:20 +0000595 oFsm.mutexFlowParams.RUnlock()
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000596 }
597 return nil
598}
599
mpagenkof1fc3862021-02-16 10:09:52 +0000600// VOL-3828 flow config sequence workaround ########### start ##########
601func (oFsm *UniVlanConfigFsm) delayNewRuleForCookie(ctx context.Context, aCookieSlice []uint64) uint64 {
602 //assumes mutexFlowParams.Lock() protection from caller!
603 if oFsm.delayNewRuleCookie == 0 && len(aCookieSlice) == 1 {
604 // if not already waiting, limitation for this workaround is to just have one overlapping cookie/rule
605 // suspend check is done only of there is only one cookie in the request
606 // background: more elements only expected in reconcile use case, where no conflicting sequence is to be expected
607 newCookie := aCookieSlice[0]
608 for _, storedUniFlowParams := range oFsm.uniVlanFlowParamsSlice {
609 for _, cookie := range storedUniFlowParams.CookieSlice {
610 if cookie == newCookie {
611 logger.Debugw(ctx, "UniVlanConfigFsm flow setting - new cookie still exists for some rule", log.Fields{
612 "device-id": oFsm.deviceID, "cookie": cookie, "exists with SetVlan": storedUniFlowParams.VlanRuleParams.SetVid})
613 oFsm.delayNewRuleCookie = newCookie
614 return newCookie //found new cookie in some existing rule
615 }
616 } // for all stored cookies of the actual inspected rule
617 } //for all rules
618 }
619 return 0 //no delay requested
620}
621func (oFsm *UniVlanConfigFsm) suspendNewRule(ctx context.Context) {
622 oFsm.mutexFlowParams.RLock()
623 logger.Infow(ctx, "Need to suspend adding this rule as long as the cookie is still connected to some other rule", log.Fields{
624 "device-id": oFsm.deviceID, "cookie": oFsm.delayNewRuleCookie})
625 oFsm.mutexFlowParams.RUnlock()
626 select {
627 case <-oFsm.chCookieDeleted:
628 logger.Infow(ctx, "resume adding this rule after having deleted cookie in some other rule", log.Fields{
629 "device-id": oFsm.deviceID, "cookie": oFsm.delayNewRuleCookie})
630 case <-time.After(time.Duration(cWaitForCookieDeletion) * time.Second):
631 logger.Errorw(ctx, "timeout waiting for deletion of cookie in some other rule, just try to continue", log.Fields{
632 "device-id": oFsm.deviceID, "cookie": oFsm.delayNewRuleCookie})
633 }
634 oFsm.mutexFlowParams.Lock()
635 oFsm.delayNewRuleCookie = 0
636 oFsm.mutexFlowParams.Unlock()
637}
638func (oFsm *UniVlanConfigFsm) suspendIfRequiredNewRule(ctx context.Context, aCookieSlice []uint64) uint64 {
639 oFsm.mutexFlowParams.Lock()
640 delayedCookie := oFsm.delayNewRuleForCookie(ctx, aCookieSlice)
641 oFsm.mutexFlowParams.Unlock()
642
643 if delayedCookie != 0 {
644 oFsm.suspendNewRule(ctx)
645 }
646 return delayedCookie
647}
648
649//returns flowModified, RuleAppendRequest
650func (oFsm *UniVlanConfigFsm) reviseFlowConstellation(ctx context.Context, aCookie uint64, aUniVlanRuleParams uniVlanRuleParams) (bool, bool) {
651 flowEntryMatch := false
652 oFsm.mutexFlowParams.Lock()
653 defer oFsm.mutexFlowParams.Unlock()
654 for flow, storedUniFlowParams := range oFsm.uniVlanFlowParamsSlice {
655 if storedUniFlowParams.VlanRuleParams == aUniVlanRuleParams {
656 flowEntryMatch = true
657 logger.Debugw(ctx, "UniVlanConfigFsm flow revise - rule already exists", log.Fields{
658 "device-id": oFsm.deviceID})
659 cookieMatch := false
660 for _, cookie := range storedUniFlowParams.CookieSlice {
661 if cookie == aCookie {
662 logger.Debugw(ctx, "UniVlanConfigFsm flow revise - and cookie already exists", log.Fields{
663 "device-id": oFsm.deviceID, "cookie": cookie})
664 cookieMatch = true
665 break //found new cookie - no further search for this requested cookie
666 }
667 }
668 if !cookieMatch {
669 logger.Debugw(ctx, "UniVlanConfigFsm flow revise -adding new cookie", log.Fields{
670 "device-id": oFsm.deviceID, "cookie": aCookie})
671 //as range works with copies of the slice we have to write to the original slice!!
672 oFsm.uniVlanFlowParamsSlice[flow].CookieSlice = append(oFsm.uniVlanFlowParamsSlice[flow].CookieSlice,
673 aCookie)
674 return true, false //flowModified, NoRuleAppend
675 }
676 break // found rule - no further rule search
677 }
678 }
679 if !flowEntryMatch { //it is a new rule
680 return true, true //flowModified, RuleAppend
681 }
682 return false, false //flowNotModified, NoRuleAppend
683}
684
685// VOL-3828 flow config sequence workaround ########### end ##########
686
mpagenko01e726e2020-10-23 09:45:29 +0000687//RemoveUniFlowParams verifies on existence of flow cookie,
688// if found removes cookie from flow cookie list and if this is empty
689// initiates removal of the flow related configuration from the ONU (via OMCI)
dbainbri4d3a0dc2020-12-02 00:33:42 +0000690func (oFsm *UniVlanConfigFsm) RemoveUniFlowParams(ctx context.Context, aCookie uint64) error {
mpagenkof1fc3862021-02-16 10:09:52 +0000691 var deletedCookie uint64
mpagenko01e726e2020-10-23 09:45:29 +0000692 flowCookieMatch := false
693 //mutex protection is required for possible concurrent access to FSM members
694 oFsm.mutexFlowParams.Lock()
695 defer oFsm.mutexFlowParams.Unlock()
mpagenkof1fc3862021-02-16 10:09:52 +0000696remove_loop:
mpagenko01e726e2020-10-23 09:45:29 +0000697 for flow, storedUniFlowParams := range oFsm.uniVlanFlowParamsSlice {
698 for i, cookie := range storedUniFlowParams.CookieSlice {
699 if cookie == aCookie {
dbainbri4d3a0dc2020-12-02 00:33:42 +0000700 logger.Debugw(ctx, "UniVlanConfigFsm flow removal - cookie found", log.Fields{
mpagenko01e726e2020-10-23 09:45:29 +0000701 "device-id": oFsm.deviceID, "cookie": cookie})
702 flowCookieMatch = true
mpagenkof1fc3862021-02-16 10:09:52 +0000703 deletedCookie = aCookie
704 kvStoreWrite := false //default setting is to not write to kvStore immediately - will be done on FSM execution finally
mpagenko01e726e2020-10-23 09:45:29 +0000705 //remove the cookie from the cookie slice and verify it is getting empty
706 if len(storedUniFlowParams.CookieSlice) == 1 {
mpagenko535d6ef2021-02-26 13:15:34 +0000707 pConfigVlanStateBaseFsm := oFsm.pAdaptFsm.pFsm
708 var cancelPendingConfig bool = false
709 var loRemoveParams uniRemoveVlanFlowParams = uniRemoveVlanFlowParams{}
dbainbri4d3a0dc2020-12-02 00:33:42 +0000710 logger.Debugw(ctx, "UniVlanConfigFsm flow removal - full flow removal", log.Fields{
mpagenko01e726e2020-10-23 09:45:29 +0000711 "device-id": oFsm.deviceID})
mpagenko15ff4a52021-03-02 10:09:20 +0000712 //rwCore flow recovery may be the reason for this delete, in which case the flowToBeDeleted may be the same
mpagenko535d6ef2021-02-26 13:15:34 +0000713 // as the one still waiting in the FSM as toAdd but waiting for TechProfileConfig
mpagenko15ff4a52021-03-02 10:09:20 +0000714 // so we have to check if we have to abort the outstanding AddRequest and regard the current DelRequest as done
mpagenko535d6ef2021-02-26 13:15:34 +0000715 // if the Fsm is in some other transient (config) state, we will reach the DelRequest later and correctly process it then
716 if pConfigVlanStateBaseFsm.Is(vlanStWaitingTechProf) {
717 logger.Debugw(ctx, "UniVlanConfigFsm was waiting for TechProf config with this rule, aborting the outstanding config",
718 log.Fields{"device-id": oFsm.deviceID})
719 cancelPendingConfig = true
720 } else {
721 //create a new element for the removeVlanFlow slice
722 loRemoveParams = uniRemoveVlanFlowParams{
723 vlanRuleParams: storedUniFlowParams.VlanRuleParams,
724 cookie: aCookie,
725 }
726 oFsm.uniRemoveFlowsSlice = append(oFsm.uniRemoveFlowsSlice, loRemoveParams)
mpagenko01e726e2020-10-23 09:45:29 +0000727 }
mpagenko01e726e2020-10-23 09:45:29 +0000728
729 //and remove the actual element from the addVlanFlow slice
730 // oFsm.uniVlanFlowParamsSlice[flow].CookieSlice = nil //automatically done by garbage collector
731 if len(oFsm.uniVlanFlowParamsSlice) <= 1 {
732 oFsm.numUniFlows = 0 //no more flows
733 oFsm.configuredUniFlow = 0 //no more flows configured
734 oFsm.uniVlanFlowParamsSlice = nil //reset the slice
mpagenko2418ab02020-11-12 12:58:06 +0000735 //at this point it is evident that no flow anymore refers to a still possibly active Techprofile
mpagenko535d6ef2021-02-26 13:15:34 +0000736 //request that this profile gets deleted before a new flow add is allowed (except for some aborted add)
737 if !cancelPendingConfig {
738 oFsm.pUniTechProf.setProfileToDelete(oFsm.pOnuUniPort.uniID, loRemoveParams.vlanRuleParams.TpID, true)
739 }
dbainbri4d3a0dc2020-12-02 00:33:42 +0000740 logger.Debugw(ctx, "UniVlanConfigFsm flow removal - no more flows", log.Fields{
mpagenko01e726e2020-10-23 09:45:29 +0000741 "device-id": oFsm.deviceID})
742 } else {
743 oFsm.numUniFlows--
744 if oFsm.configuredUniFlow > 0 {
745 oFsm.configuredUniFlow--
746 //TODO!! might be needed to consider still outstanding configure requests ..
747 // so a flow at removal might still not be configured !?!
748 }
mpagenko2418ab02020-11-12 12:58:06 +0000749 usedTpID := storedUniFlowParams.VlanRuleParams.TpID
mpagenko01e726e2020-10-23 09:45:29 +0000750 //cut off the requested flow by slicing out this element
751 oFsm.uniVlanFlowParamsSlice = append(
752 oFsm.uniVlanFlowParamsSlice[:flow], oFsm.uniVlanFlowParamsSlice[flow+1:]...)
mpagenko2418ab02020-11-12 12:58:06 +0000753 //here we have to check, if there are still other flows referencing to the actual ProfileId
754 // before we can request that this profile gets deleted before a new flow add is allowed
mpagenkof1fc3862021-02-16 10:09:52 +0000755 // (needed to extract to function due to lint complexity)
mpagenko535d6ef2021-02-26 13:15:34 +0000756 if !cancelPendingConfig {
757 oFsm.updateTechProfileToDelete(ctx, usedTpID)
758 }
dbainbri4d3a0dc2020-12-02 00:33:42 +0000759 logger.Debugw(ctx, "UniVlanConfigFsm flow removal - specific flow removed from data", log.Fields{
mpagenko01e726e2020-10-23 09:45:29 +0000760 "device-id": oFsm.deviceID})
761 }
762 //trigger the FSM to remove the relevant rule
mpagenko535d6ef2021-02-26 13:15:34 +0000763 if cancelPendingConfig {
764 oFsm.requestEventOffset = uint8(cDeviceEventOffsetRemoveWithKvStore) //offset for last flow-remove activity (with kvStore request)
mpagenkobb47bc22021-04-20 13:29:09 +0000765 //attention: take care to release and re-take the mutexFlowParams when calling the FSM directly -
766 // synchronous FSM 'event/state' functions may rely on this mutex
767 oFsm.mutexFlowParams.Unlock()
768 if fsmErr := pConfigVlanStateBaseFsm.Event(vlanEvCancelOutstandingConfig); fsmErr != nil {
769 logger.Errorw(ctx, "error in FsmEvent handling UniVlanConfigFsm!",
770 log.Fields{"fsmState": pConfigVlanStateBaseFsm.Current(), "error": fsmErr, "device-id": oFsm.deviceID})
771 }
772 oFsm.mutexFlowParams.Lock()
mpagenko535d6ef2021-02-26 13:15:34 +0000773 } else {
774 if pConfigVlanStateBaseFsm.Is(vlanStConfigDone) {
775 logger.Debugw(ctx, "UniVlanConfigFsm rule removal request", log.Fields{
776 "device-id": oFsm.deviceID, "uni-id": oFsm.pOnuUniPort.uniID,
777 "tp-id": loRemoveParams.vlanRuleParams.TpID,
778 "set-Vlan": loRemoveParams.vlanRuleParams.SetVid})
779 //have to re-trigger the FSM to proceed with outstanding incremental flow configuration
mpagenkobb47bc22021-04-20 13:29:09 +0000780 //attention: take care to release and re-take the mutexFlowParams when calling the FSM directly -
781 // synchronous FSM 'event/state' functions may rely on this mutex
782 oFsm.mutexFlowParams.Unlock()
783 if fsmErr := pConfigVlanStateBaseFsm.Event(vlanEvRemFlowConfig); fsmErr != nil {
784 logger.Errorw(ctx, "error in FsmEvent handling UniVlanConfigFsm!",
785 log.Fields{"fsmState": pConfigVlanStateBaseFsm.Current(), "error": fsmErr, "device-id": oFsm.deviceID})
786 }
787 oFsm.mutexFlowParams.Lock()
mpagenko535d6ef2021-02-26 13:15:34 +0000788 } // if not in the appropriate state a new entry will be automatically considered later
789 // when the configDone state is reached
790 }
mpagenko01e726e2020-10-23 09:45:29 +0000791 } else {
mpagenko01e726e2020-10-23 09:45:29 +0000792 //cut off the requested cookie by slicing out this element
793 oFsm.uniVlanFlowParamsSlice[flow].CookieSlice = append(
794 oFsm.uniVlanFlowParamsSlice[flow].CookieSlice[:i],
795 oFsm.uniVlanFlowParamsSlice[flow].CookieSlice[i+1:]...)
mpagenkofc4f56e2020-11-04 17:17:49 +0000796 // no activity within the FSM for OMCI processing, the deviceReason may be updated immediately
mpagenkof1fc3862021-02-16 10:09:52 +0000797 kvStoreWrite = true // ensure actual data write to kvStore immediately (no FSM activity)
mpagenkofc4f56e2020-11-04 17:17:49 +0000798 // state transition notification is checked in deviceHandler
799 if oFsm.pDeviceHandler != nil {
mpagenkof1fc3862021-02-16 10:09:52 +0000800 // success indication without the need to write to kvStore (done already below with updated data from storePersUniFlowConfig())
801 go oFsm.pDeviceHandler.deviceProcStatusUpdate(ctx, OnuDeviceEvent(oFsm.requestEvent+cDeviceEventOffsetRemoveNoKvStore))
mpagenkofc4f56e2020-11-04 17:17:49 +0000802 }
dbainbri4d3a0dc2020-12-02 00:33:42 +0000803 logger.Debugw(ctx, "UniVlanConfigFsm flow removal - rule persists with still valid cookies", log.Fields{
mpagenko01e726e2020-10-23 09:45:29 +0000804 "device-id": oFsm.deviceID, "cookies": oFsm.uniVlanFlowParamsSlice[flow].CookieSlice})
mpagenkof1fc3862021-02-16 10:09:52 +0000805 if deletedCookie == oFsm.delayNewRuleCookie {
806 //the delayedNewCookie is the one that is currently deleted, but the rule still exist with other cookies
807 //as long as there are further cookies for this rule indicate there is still some cookie to be deleted
808 //simply use the first one
809 oFsm.delayNewRuleCookie = oFsm.uniVlanFlowParamsSlice[flow].CookieSlice[0]
810 logger.Debugw(ctx, "UniVlanConfigFsm remaining cookie awaited for deletion before new rule add", log.Fields{
811 "device-id": oFsm.deviceID, "cookie": oFsm.delayNewRuleCookie})
812 }
mpagenko01e726e2020-10-23 09:45:29 +0000813 }
mpagenko01e726e2020-10-23 09:45:29 +0000814 //permanently store the modified flow config for reconcile case
mpagenkofc4f56e2020-11-04 17:17:49 +0000815 if oFsm.pDeviceHandler != nil {
mpagenkof1fc3862021-02-16 10:09:52 +0000816 if err := oFsm.pDeviceHandler.storePersUniFlowConfig(ctx, oFsm.pOnuUniPort.uniID,
817 &oFsm.uniVlanFlowParamsSlice, kvStoreWrite); err != nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +0000818 logger.Errorw(ctx, err.Error(), log.Fields{"device-id": oFsm.deviceID})
mpagenkofc4f56e2020-11-04 17:17:49 +0000819 return err
820 }
mpagenko01e726e2020-10-23 09:45:29 +0000821 }
mpagenkof1fc3862021-02-16 10:09:52 +0000822 break remove_loop //found the cookie - no further search for this requested cookie
mpagenko01e726e2020-10-23 09:45:29 +0000823 }
824 }
mpagenko01e726e2020-10-23 09:45:29 +0000825 } //search all flows
826 if !flowCookieMatch { //some cookie remove-request for a cookie that does not exist in the FSM data
dbainbri4d3a0dc2020-12-02 00:33:42 +0000827 logger.Warnw(ctx, "UniVlanConfigFsm flow removal - remove-cookie not found", log.Fields{
mpagenko01e726e2020-10-23 09:45:29 +0000828 "device-id": oFsm.deviceID, "remove-cookie": aCookie})
829 // but accept the request with success as no such cookie (flow) does exist
mpagenkofc4f56e2020-11-04 17:17:49 +0000830 // no activity within the FSM for OMCI processing, the deviceReason may be updated immediately
831 // state transition notification is checked in deviceHandler
832 if oFsm.pDeviceHandler != nil {
mpagenkof1fc3862021-02-16 10:09:52 +0000833 // success indication without the need to write to kvStore (no change)
834 go oFsm.pDeviceHandler.deviceProcStatusUpdate(ctx, OnuDeviceEvent(oFsm.requestEvent+cDeviceEventOffsetRemoveNoKvStore))
mpagenkofc4f56e2020-11-04 17:17:49 +0000835 }
mpagenko01e726e2020-10-23 09:45:29 +0000836 return nil
837 } //unknown cookie
838
839 return nil
840}
841
mpagenkof1fc3862021-02-16 10:09:52 +0000842func (oFsm *UniVlanConfigFsm) updateTechProfileToDelete(ctx context.Context, usedTpID uint8) {
843 //here we have to check, if there are still other flows referencing to the actual ProfileId
844 // before we can request that this profile gets deleted before a new flow add is allowed
845 tpIDInOtherFlows := false
846 for _, tpUniFlowParams := range oFsm.uniVlanFlowParamsSlice {
847 if tpUniFlowParams.VlanRuleParams.TpID == usedTpID {
848 tpIDInOtherFlows = true
849 break // search loop can be left
850 }
851 }
852 if tpIDInOtherFlows {
853 logger.Debugw(ctx, "UniVlanConfigFsm tp-id used in deleted flow is still used in other flows", log.Fields{
854 "device-id": oFsm.deviceID, "tp-id": usedTpID})
855 } else {
856 logger.Debugw(ctx, "UniVlanConfigFsm tp-id used in deleted flow is not used anymore", log.Fields{
857 "device-id": oFsm.deviceID, "tp-id": usedTpID})
858 //request that this profile gets deleted before a new flow add is allowed
859 oFsm.pUniTechProf.setProfileToDelete(oFsm.pOnuUniPort.uniID, usedTpID, true)
860 }
861}
862
dbainbri4d3a0dc2020-12-02 00:33:42 +0000863func (oFsm *UniVlanConfigFsm) enterConfigStarting(ctx context.Context, e *fsm.Event) {
864 logger.Debugw(ctx, "UniVlanConfigFsm start", log.Fields{"in state": e.FSM.Current(),
mpagenko01e726e2020-10-23 09:45:29 +0000865 "device-id": oFsm.deviceID})
mpagenkodff5dda2020-08-28 11:52:01 +0000866
867 // this FSM is not intended for re-start, needs always new creation for a new run
mpagenko01e726e2020-10-23 09:45:29 +0000868 // (self-destroying - compare enterDisabled())
mpagenkodff5dda2020-08-28 11:52:01 +0000869 oFsm.omciMIdsResponseReceived = make(chan bool)
mpagenkof1fc3862021-02-16 10:09:52 +0000870 oFsm.chCookieDeleted = make(chan bool)
mpagenkodff5dda2020-08-28 11:52:01 +0000871 // start go routine for processing of LockState messages
dbainbri4d3a0dc2020-12-02 00:33:42 +0000872 go oFsm.processOmciVlanMessages(ctx)
mpagenkodff5dda2020-08-28 11:52:01 +0000873 //let the state machine run forward from here directly
874 pConfigVlanStateAFsm := oFsm.pAdaptFsm
875 if pConfigVlanStateAFsm != nil {
mpagenko9a304ea2020-12-16 15:54:01 +0000876
Holger Hildebrandtbe523842021-03-10 10:47:18 +0000877 if oFsm.pDeviceHandler.isSkipOnuConfigReconciling() {
878 logger.Debugw(ctx, "reconciling - skip omci-config of vlan rule",
879 log.Fields{"fsmState": oFsm.pAdaptFsm.pFsm.Current(), "device-id": oFsm.deviceID})
880 go func(a_pAFsm *AdapterFsm) {
881 _ = a_pAFsm.pFsm.Event(vlanEvSkipOmciConfig)
882 }(pConfigVlanStateAFsm)
883 return
884 }
885 oFsm.mutexFlowParams.Lock()
mpagenko9a304ea2020-12-16 15:54:01 +0000886 //possibly the entry is not valid anymore based on intermediate delete requests
887 //just a basic protection ...
888 if len(oFsm.uniVlanFlowParamsSlice) == 0 {
889 oFsm.mutexFlowParams.Unlock()
890 logger.Debugw(ctx, "UniVlanConfigFsm start: no rule entry anymore available", log.Fields{
891 "device-id": oFsm.deviceID})
892 // Can't call FSM Event directly, decoupling it
893 go func(a_pAFsm *AdapterFsm) {
894 _ = a_pAFsm.pFsm.Event(vlanEvReset)
895 }(pConfigVlanStateAFsm)
896 return
897 }
mpagenko9a304ea2020-12-16 15:54:01 +0000898 //access to uniVlanFlowParamsSlice is done on first element only here per definition
899 //store the actual rule that shall be worked upon in the following transient states
900 oFsm.actualUniVlanConfigRule = oFsm.uniVlanFlowParamsSlice[0].VlanRuleParams
mpagenko9a304ea2020-12-16 15:54:01 +0000901 tpID := oFsm.actualUniVlanConfigRule.TpID
902 oFsm.TpIDWaitingFor = tpID
mpagenko551a4d42020-12-08 18:09:20 +0000903 loTechProfDone := oFsm.pUniTechProf.getTechProfileDone(ctx, oFsm.pOnuUniPort.uniID, uint8(tpID))
mpagenko9a304ea2020-12-16 15:54:01 +0000904 logger.Debugw(ctx, "UniVlanConfigFsm - start with first rule", log.Fields{
905 "device-id": oFsm.deviceID, "uni-id": oFsm.pOnuUniPort.uniID,
906 "set-Vlan": oFsm.actualUniVlanConfigRule.SetVid, "tp-id": tpID, "ProfDone": loTechProfDone})
mpagenko551a4d42020-12-08 18:09:20 +0000907 //cmp also usage in EVTOCDE create in omci_cc
908 oFsm.evtocdID = macBridgeServiceProfileEID + uint16(oFsm.pOnuUniPort.macBpNo)
mpagenko535d6ef2021-02-26 13:15:34 +0000909 oFsm.mutexFlowParams.Unlock()
mpagenko9a304ea2020-12-16 15:54:01 +0000910 // Can't call FSM Event directly, decoupling it
mpagenko551a4d42020-12-08 18:09:20 +0000911 go func(aPAFsm *AdapterFsm, aTechProfDone bool) {
912 if aPAFsm != nil && aPAFsm.pFsm != nil {
913 if aTechProfDone {
mpagenkodff5dda2020-08-28 11:52:01 +0000914 // let the vlan processing begin
mpagenko551a4d42020-12-08 18:09:20 +0000915 _ = aPAFsm.pFsm.Event(vlanEvStartConfig)
mpagenkodff5dda2020-08-28 11:52:01 +0000916 } else {
917 // set to waiting for Techprofile
mpagenko551a4d42020-12-08 18:09:20 +0000918 _ = aPAFsm.pFsm.Event(vlanEvWaitTechProf)
mpagenkodff5dda2020-08-28 11:52:01 +0000919 }
920 }
mpagenko551a4d42020-12-08 18:09:20 +0000921 }(pConfigVlanStateAFsm, loTechProfDone)
922 } else {
923 logger.Errorw(ctx, "UniVlanConfigFsm abort: invalid FSM pointer", log.Fields{
924 "in state": e.FSM.Current(), "device-id": oFsm.deviceID})
925 //should never happen, else: recovery would be needed from outside the FSM
926 return
mpagenkodff5dda2020-08-28 11:52:01 +0000927 }
928}
929
dbainbri4d3a0dc2020-12-02 00:33:42 +0000930func (oFsm *UniVlanConfigFsm) enterConfigVtfd(ctx context.Context, e *fsm.Event) {
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000931 //mutex protection is required for possible concurrent access to FSM members
932 oFsm.mutexFlowParams.Lock()
mpagenko551a4d42020-12-08 18:09:20 +0000933 oFsm.TpIDWaitingFor = 0 //reset indication to avoid misinterpretation
mpagenko9a304ea2020-12-16 15:54:01 +0000934 if oFsm.actualUniVlanConfigRule.SetVid == uint32(of.OfpVlanId_OFPVID_PRESENT) {
mpagenkodff5dda2020-08-28 11:52:01 +0000935 // meaning transparent setup - no specific VTFD setting required
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000936 oFsm.mutexFlowParams.Unlock()
dbainbri4d3a0dc2020-12-02 00:33:42 +0000937 logger.Debugw(ctx, "UniVlanConfigFsm: no VTFD config required", log.Fields{
mpagenko01e726e2020-10-23 09:45:29 +0000938 "in state": e.FSM.Current(), "device-id": oFsm.deviceID})
mpagenkodff5dda2020-08-28 11:52:01 +0000939 // let the FSM proceed ... (from within this state all internal pointers may be expected to be correct)
mpagenkodff5dda2020-08-28 11:52:01 +0000940 pConfigVlanStateAFsm := oFsm.pAdaptFsm
mpagenko9a304ea2020-12-16 15:54:01 +0000941 // Can't call FSM Event directly, decoupling it
mpagenkodff5dda2020-08-28 11:52:01 +0000942 go func(a_pAFsm *AdapterFsm) {
Himani Chawla4d908332020-08-31 12:30:20 +0530943 _ = a_pAFsm.pFsm.Event(vlanEvRxConfigVtfd)
mpagenkodff5dda2020-08-28 11:52:01 +0000944 }(pConfigVlanStateAFsm)
945 } else {
ozgecanetsiab5000ef2020-11-27 14:38:20 +0300946 // This attribute uniquely identifies each instance of this managed entity. Through an identical ID,
947 // this managed entity is implicitly linked to an instance of the MAC bridge port configuration data ME.
mpagenko9a304ea2020-12-16 15:54:01 +0000948 vtfdID := macBridgePortAniEID + oFsm.pOnuUniPort.entityID + uint16(oFsm.actualUniVlanConfigRule.TpID)
dbainbri4d3a0dc2020-12-02 00:33:42 +0000949 logger.Debugw(ctx, "UniVlanConfigFsm create VTFD", log.Fields{
ozgecanetsiab5000ef2020-11-27 14:38:20 +0300950 "EntitytId": strconv.FormatInt(int64(vtfdID), 16),
mpagenko01e726e2020-10-23 09:45:29 +0000951 "in state": e.FSM.Current(), "device-id": oFsm.deviceID})
952 // setVid is assumed to be masked already by the caller to 12 bit
mpagenko9a304ea2020-12-16 15:54:01 +0000953 oFsm.vlanFilterList[0] = uint16(oFsm.actualUniVlanConfigRule.SetVid)
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000954 oFsm.mutexFlowParams.Unlock()
mpagenko01e726e2020-10-23 09:45:29 +0000955 vtfdFilterList := make([]uint16, cVtfdTableSize) //needed for parameter serialization
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000956 vtfdFilterList[0] = oFsm.vlanFilterList[0]
957 oFsm.numVlanFilterEntries = 1
mpagenkodff5dda2020-08-28 11:52:01 +0000958 meParams := me.ParamData{
ozgecanetsiab5000ef2020-11-27 14:38:20 +0300959 EntityID: vtfdID,
mpagenkodff5dda2020-08-28 11:52:01 +0000960 Attributes: me.AttributeValueMap{
Holger Hildebrandt394c5522020-09-11 11:23:01 +0000961 "VlanFilterList": vtfdFilterList, //omci lib wants a slice for serialization
962 "ForwardOperation": uint8(0x10), //VID investigation
963 "NumberOfEntries": oFsm.numVlanFilterEntries,
mpagenkodff5dda2020-08-28 11:52:01 +0000964 },
965 }
dbainbri4d3a0dc2020-12-02 00:33:42 +0000966 logger.Debugw(ctx, "UniVlanConfigFsm sendcreate VTFD", log.Fields{
mpagenko01e726e2020-10-23 09:45:29 +0000967 "in state": e.FSM.Current(), "device-id": oFsm.deviceID})
Girish Gowdra0b235842021-03-09 13:06:46 -0800968 meInstance := oFsm.pOmciCC.sendCreateVtfdVar(log.WithSpanFromContext(context.TODO(), ctx), oFsm.pDeviceHandler.pOpenOnuAc.omciTimeout, true,
mpagenkodff5dda2020-08-28 11:52:01 +0000969 oFsm.pAdaptFsm.commChan, meParams)
970 //accept also nil as (error) return value for writing to LastTx
971 // - this avoids misinterpretation of new received OMCI messages
972 //TODO!!: refactoring improvement requested, here as an example for [VOL-3457]:
973 // send shall return (dual format) error code that can be used here for immediate error treatment
974 // (relevant to all used sendXX() methods in this (and other) FSM's)
mpagenko01e726e2020-10-23 09:45:29 +0000975 oFsm.pLastTxMeInstance = meInstance
mpagenkodff5dda2020-08-28 11:52:01 +0000976 }
977}
978
dbainbri4d3a0dc2020-12-02 00:33:42 +0000979func (oFsm *UniVlanConfigFsm) enterConfigEvtocd(ctx context.Context, e *fsm.Event) {
980 logger.Debugw(ctx, "UniVlanConfigFsm - start config EVTOCD loop", log.Fields{
mpagenko01e726e2020-10-23 09:45:29 +0000981 "in state": e.FSM.Current(), "device-id": oFsm.deviceID})
mpagenkof1fc3862021-02-16 10:09:52 +0000982 oFsm.requestEventOffset = uint8(cDeviceEventOffsetAddWithKvStore) //0 offset for last flow-add activity
ozgecanetsiab5000ef2020-11-27 14:38:20 +0300983 go func() {
mpagenko9a304ea2020-12-16 15:54:01 +0000984 //using the first element in the slice because it's the first flow per definition here
985 errEvto := oFsm.performConfigEvtocdEntries(ctx, 0)
ozgecanetsiab5000ef2020-11-27 14:38:20 +0300986 //This is correct passing scenario
987 if errEvto == nil {
mpagenko9a304ea2020-12-16 15:54:01 +0000988 tpID := oFsm.actualUniVlanConfigRule.TpID
989 vlanID := oFsm.actualUniVlanConfigRule.SetVid
dbainbri4d3a0dc2020-12-02 00:33:42 +0000990 for _, gemPort := range oFsm.pUniTechProf.getMulticastGemPorts(ctx, oFsm.pOnuUniPort.uniID, uint8(tpID)) {
991 logger.Infow(ctx, "Setting multicast MEs, with first flow", log.Fields{"deviceID": oFsm.deviceID,
ozgecanetsiab5000ef2020-11-27 14:38:20 +0300992 "techProfile": tpID, "gemPort": gemPort, "vlanID": vlanID, "configuredUniFlow": oFsm.configuredUniFlow})
dbainbri4d3a0dc2020-12-02 00:33:42 +0000993 errCreateAllMulticastME := oFsm.performSettingMulticastME(ctx, tpID, gemPort,
ozgecanetsiab5000ef2020-11-27 14:38:20 +0300994 vlanID)
995 if errCreateAllMulticastME != nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +0000996 logger.Errorw(ctx, "Multicast ME create failed, aborting AniConfig FSM!",
ozgecanetsiab5000ef2020-11-27 14:38:20 +0300997 log.Fields{"device-id": oFsm.deviceID})
998 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvReset)
999 }
1000 }
1001 //TODO Possibly insert new state for multicast --> possibly another jira/later time.
1002 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvRxConfigEvtocd)
1003 }
1004 }()
mpagenkodff5dda2020-08-28 11:52:01 +00001005}
1006
dbainbri4d3a0dc2020-12-02 00:33:42 +00001007func (oFsm *UniVlanConfigFsm) enterVlanConfigDone(ctx context.Context, e *fsm.Event) {
Holger Hildebrandtbe523842021-03-10 10:47:18 +00001008
mpagenko9a304ea2020-12-16 15:54:01 +00001009 oFsm.mutexFlowParams.RLock()
1010 defer oFsm.mutexFlowParams.RUnlock()
1011
mpagenkof1fc3862021-02-16 10:09:52 +00001012 logger.Infow(ctx, "UniVlanConfigFsm config done - checking on more flows", log.Fields{
mpagenko551a4d42020-12-08 18:09:20 +00001013 "in state": e.FSM.Current(), "device-id": oFsm.deviceID,
1014 "overall-uni-rules": oFsm.numUniFlows, "configured-uni-rules": oFsm.configuredUniFlow})
1015 pConfigVlanStateAFsm := oFsm.pAdaptFsm
1016 if pConfigVlanStateAFsm == nil {
mpagenko551a4d42020-12-08 18:09:20 +00001017 logger.Errorw(ctx, "UniVlanConfigFsm abort: invalid FSM pointer", log.Fields{
1018 "in state": e.FSM.Current(), "device-id": oFsm.deviceID})
1019 //should never happen, else: recovery would be needed from outside the FSM
1020 return
1021 }
1022 pConfigVlanStateBaseFsm := pConfigVlanStateAFsm.pFsm
mpagenko01e726e2020-10-23 09:45:29 +00001023 if len(oFsm.uniRemoveFlowsSlice) > 0 {
1024 //some further flows are to be removed, removal always starts with the first element
mpagenko9a304ea2020-12-16 15:54:01 +00001025 logger.Debugw(ctx, "UniVlanConfigFsm rule removal from ConfigDone", log.Fields{
1026 "device-id": oFsm.deviceID, "uni-id": oFsm.pOnuUniPort.uniID,
1027 "tp-id": oFsm.uniRemoveFlowsSlice[0].vlanRuleParams.TpID,
1028 "set-Vlan": oFsm.uniRemoveFlowsSlice[0].vlanRuleParams.SetVid})
1029 // Can't call FSM Event directly, decoupling it
mpagenko01e726e2020-10-23 09:45:29 +00001030 go func(a_pBaseFsm *fsm.FSM) {
1031 _ = a_pBaseFsm.Event(vlanEvRemFlowConfig)
1032 }(pConfigVlanStateBaseFsm)
1033 return
1034 }
Holger Hildebrandt1b8f4ad2021-03-25 15:53:51 +00001035 if oFsm.pDeviceHandler.isSkipOnuConfigReconciling() {
1036 oFsm.configuredUniFlow = oFsm.numUniFlows
Holger Hildebrandtb4563ab2021-04-14 10:27:20 +00001037 if !oFsm.pDeviceHandler.isReconcilingFlows() {
1038 logger.Debugw(ctx, "reconciling - flow processing finished", log.Fields{"device-id": oFsm.deviceID})
1039 oFsm.pDeviceHandler.chReconcilingFlowsFinished <- true
1040 }
Holger Hildebrandt1b8f4ad2021-03-25 15:53:51 +00001041 logger.Debugw(ctx, "reconciling - skip enterVlanConfigDone processing",
1042 log.Fields{"numUniFlows": oFsm.numUniFlows, "configuredUniFlow": oFsm.configuredUniFlow, "device-id": oFsm.deviceID})
1043 return
1044 }
Holger Hildebrandt394c5522020-09-11 11:23:01 +00001045 if oFsm.numUniFlows > oFsm.configuredUniFlow {
mpagenko551a4d42020-12-08 18:09:20 +00001046 if oFsm.configuredUniFlow == 0 {
mpagenko551a4d42020-12-08 18:09:20 +00001047 // this is a restart with a complete new flow, we can re-use the initial flow config control
1048 // including the check, if the related techProfile is (still) available (probably also removed in between)
mpagenko9a304ea2020-12-16 15:54:01 +00001049 // Can't call FSM Event directly, decoupling it
mpagenko551a4d42020-12-08 18:09:20 +00001050 go func(a_pBaseFsm *fsm.FSM) {
1051 _ = a_pBaseFsm.Event(vlanEvRenew)
1052 }(pConfigVlanStateBaseFsm)
1053 return
1054 }
1055
Holger Hildebrandt394c5522020-09-11 11:23:01 +00001056 //some further flows are to be configured
mpagenko9a304ea2020-12-16 15:54:01 +00001057 //store the actual rule that shall be worked upon in the following transient states
1058 oFsm.actualUniVlanConfigRule = oFsm.uniVlanFlowParamsSlice[oFsm.configuredUniFlow].VlanRuleParams
mpagenko551a4d42020-12-08 18:09:20 +00001059 //tpId of the next rule to be configured
mpagenko9a304ea2020-12-16 15:54:01 +00001060 tpID := oFsm.actualUniVlanConfigRule.TpID
mpagenko551a4d42020-12-08 18:09:20 +00001061 oFsm.TpIDWaitingFor = tpID
mpagenko551a4d42020-12-08 18:09:20 +00001062 loTechProfDone := oFsm.pUniTechProf.getTechProfileDone(ctx, oFsm.pOnuUniPort.uniID, tpID)
mpagenko9a304ea2020-12-16 15:54:01 +00001063 logger.Debugw(ctx, "UniVlanConfigFsm - incremental config request", log.Fields{
1064 "device-id": oFsm.deviceID, "uni-id": oFsm.pOnuUniPort.uniID,
1065 "set-Vlan": oFsm.actualUniVlanConfigRule.SetVid, "tp-id": tpID, "ProfDone": loTechProfDone})
1066 // Can't call FSM Event directly, decoupling it
mpagenko551a4d42020-12-08 18:09:20 +00001067 go func(aPBaseFsm *fsm.FSM, aTechProfDone bool) {
1068 if aTechProfDone {
1069 // let the vlan processing continue with next rule
1070 _ = aPBaseFsm.Event(vlanEvIncrFlowConfig)
1071 } else {
1072 // set to waiting for Techprofile
1073 _ = aPBaseFsm.Event(vlanEvWaitTPIncr)
1074 }
1075 }(pConfigVlanStateBaseFsm, loTechProfDone)
Holger Hildebrandt394c5522020-09-11 11:23:01 +00001076 return
1077 }
dbainbri4d3a0dc2020-12-02 00:33:42 +00001078 logger.Debugw(ctx, "UniVlanConfigFsm - VLAN config done: send dh event notification", log.Fields{
mpagenko01e726e2020-10-23 09:45:29 +00001079 "device-id": oFsm.deviceID})
Holger Hildebrandt394c5522020-09-11 11:23:01 +00001080 // it might appear that some flows are requested also after 'flowPushed' event has been generated ...
1081 // state transition notification is checked in deviceHandler
mpagenko551a4d42020-12-08 18:09:20 +00001082 // note: 'flowPushed' event is only generated if all 'pending' rules are configured
mpagenkodff5dda2020-08-28 11:52:01 +00001083 if oFsm.pDeviceHandler != nil {
mpagenkofc4f56e2020-11-04 17:17:49 +00001084 //making use of the add->remove successor enum assumption/definition
dbainbri4d3a0dc2020-12-02 00:33:42 +00001085 go oFsm.pDeviceHandler.deviceProcStatusUpdate(ctx, OnuDeviceEvent(uint8(oFsm.requestEvent)+oFsm.requestEventOffset))
mpagenkodff5dda2020-08-28 11:52:01 +00001086 }
1087}
1088
dbainbri4d3a0dc2020-12-02 00:33:42 +00001089func (oFsm *UniVlanConfigFsm) enterConfigIncrFlow(ctx context.Context, e *fsm.Event) {
Holger Hildebrandtbe523842021-03-10 10:47:18 +00001090
1091 if oFsm.pDeviceHandler.isSkipOnuConfigReconciling() {
1092 logger.Debugw(ctx, "reconciling - skip further processing for incremental flow",
1093 log.Fields{"fsmState": oFsm.pAdaptFsm.pFsm.Current(), "device-id": oFsm.deviceID})
1094 go func(a_pBaseFsm *fsm.FSM) {
1095 _ = a_pBaseFsm.Event(vlanEvSkipIncFlowConfig)
1096 }(oFsm.pAdaptFsm.pFsm)
1097 return
1098 }
mpagenko15ff4a52021-03-02 10:09:20 +00001099 oFsm.mutexFlowParams.Lock()
dbainbri4d3a0dc2020-12-02 00:33:42 +00001100 logger.Debugw(ctx, "UniVlanConfigFsm - start config further incremental flow", log.Fields{
Girish Gowdra041dcb32020-11-16 16:54:30 -08001101 "in state": e.FSM.Current(), "recent flow-number": oFsm.configuredUniFlow,
mpagenko01e726e2020-10-23 09:45:29 +00001102 "device-id": oFsm.deviceID})
mpagenko551a4d42020-12-08 18:09:20 +00001103 oFsm.TpIDWaitingFor = 0 //reset indication to avoid misinterpretation
Holger Hildebrandt394c5522020-09-11 11:23:01 +00001104
mpagenko9a304ea2020-12-16 15:54:01 +00001105 if oFsm.actualUniVlanConfigRule.SetVid == uint32(of.OfpVlanId_OFPVID_PRESENT) {
Holger Hildebrandt394c5522020-09-11 11:23:01 +00001106 // meaning transparent setup - no specific VTFD setting required
1107 oFsm.mutexFlowParams.Unlock()
dbainbri4d3a0dc2020-12-02 00:33:42 +00001108 logger.Debugw(ctx, "UniVlanConfigFsm: no VTFD config required", log.Fields{
mpagenko01e726e2020-10-23 09:45:29 +00001109 "in state": e.FSM.Current(), "device-id": oFsm.deviceID})
Holger Hildebrandt394c5522020-09-11 11:23:01 +00001110 } else {
mpagenkocf48e452021-04-23 09:23:00 +00001111 //TODO!!!: it was not really intended to keep this enter* FSM method waiting on OMCI response (preventing other state transitions)
1112 // so it would be conceptually better to wait for the response in background like for the other multi-entity processing
1113 // but as the OMCI sequence must be ensured, a separate new state would be required - perhaps later
1114 // in practice should have no influence by now as no other state transition is currently accepted (while cancel() is ensured)
Holger Hildebrandt394c5522020-09-11 11:23:01 +00001115 if oFsm.numVlanFilterEntries == 0 {
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001116 // This attribute uniquely identifies each instance of this managed entity. Through an identical ID,
1117 // this managed entity is implicitly linked to an instance of the MAC bridge port configuration data ME.
mpagenko9a304ea2020-12-16 15:54:01 +00001118 vtfdID := macBridgePortAniEID + oFsm.pOnuUniPort.entityID + uint16(oFsm.actualUniVlanConfigRule.TpID)
Holger Hildebrandt394c5522020-09-11 11:23:01 +00001119 //no VTFD yet created
dbainbri4d3a0dc2020-12-02 00:33:42 +00001120 logger.Debugw(ctx, "UniVlanConfigFsm create VTFD", log.Fields{
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001121 "EntitytId": strconv.FormatInt(int64(vtfdID), 16),
mpagenko01e726e2020-10-23 09:45:29 +00001122 "in state": e.FSM.Current(), "device-id": oFsm.deviceID})
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001123 // 'SetVid' below is assumed to be masked already by the caller to 12 bit
mpagenko9a304ea2020-12-16 15:54:01 +00001124 oFsm.vlanFilterList[0] = uint16(oFsm.actualUniVlanConfigRule.SetVid)
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001125
mpagenko01e726e2020-10-23 09:45:29 +00001126 vtfdFilterList := make([]uint16, cVtfdTableSize) //needed for parameter serialization
Holger Hildebrandt394c5522020-09-11 11:23:01 +00001127 vtfdFilterList[0] = oFsm.vlanFilterList[0]
1128 oFsm.numVlanFilterEntries = 1
1129 meParams := me.ParamData{
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001130 EntityID: vtfdID,
Holger Hildebrandt394c5522020-09-11 11:23:01 +00001131 Attributes: me.AttributeValueMap{
1132 "VlanFilterList": vtfdFilterList,
1133 "ForwardOperation": uint8(0x10), //VID investigation
1134 "NumberOfEntries": oFsm.numVlanFilterEntries,
1135 },
1136 }
Girish Gowdra0b235842021-03-09 13:06:46 -08001137 meInstance := oFsm.pOmciCC.sendCreateVtfdVar(log.WithSpanFromContext(context.TODO(), ctx), oFsm.pDeviceHandler.pOpenOnuAc.omciTimeout, true,
Holger Hildebrandt394c5522020-09-11 11:23:01 +00001138 oFsm.pAdaptFsm.commChan, meParams)
1139 //accept also nil as (error) return value for writing to LastTx
1140 // - this avoids misinterpretation of new received OMCI messages
1141 //TODO!!: refactoring improvement requested, here as an example for [VOL-3457]:
1142 // send shall return (dual format) error code that can be used here for immediate error treatment
1143 // (relevant to all used sendXX() methods in this (and other) FSM's)
mpagenko01e726e2020-10-23 09:45:29 +00001144 oFsm.pLastTxMeInstance = meInstance
Holger Hildebrandt394c5522020-09-11 11:23:01 +00001145 } else {
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001146 // This attribute uniquely identifies each instance of this managed entity. Through an identical ID,
1147 // this managed entity is implicitly linked to an instance of the MAC bridge port configuration data ME.
mpagenko551a4d42020-12-08 18:09:20 +00001148 vtfdID := macBridgePortAniEID + oFsm.pOnuUniPort.entityID +
mpagenko9a304ea2020-12-16 15:54:01 +00001149 uint16(oFsm.actualUniVlanConfigRule.TpID)
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001150
dbainbri4d3a0dc2020-12-02 00:33:42 +00001151 logger.Debugw(ctx, "UniVlanConfigFsm set VTFD", log.Fields{
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001152 "EntitytId": strconv.FormatInt(int64(vtfdID), 16),
mpagenko01e726e2020-10-23 09:45:29 +00001153 "in state": e.FSM.Current(), "device-id": oFsm.deviceID})
Holger Hildebrandt394c5522020-09-11 11:23:01 +00001154 // setVid is assumed to be masked already by the caller to 12 bit
1155 oFsm.vlanFilterList[oFsm.numVlanFilterEntries] =
mpagenko9a304ea2020-12-16 15:54:01 +00001156 uint16(oFsm.actualUniVlanConfigRule.SetVid)
mpagenko01e726e2020-10-23 09:45:29 +00001157 vtfdFilterList := make([]uint16, cVtfdTableSize) //needed for parameter serialization
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001158
1159 // FIXME: VOL-3685: Issues with resetting a table entry in EVTOCD ME
1160 // VTFD has to be created afresh with a new entity ID that has the same entity ID as the MBPCD ME for every
1161 // new vlan associated with a different TP.
mpagenko9a304ea2020-12-16 15:54:01 +00001162 vtfdFilterList[0] = uint16(oFsm.actualUniVlanConfigRule.SetVid)
Holger Hildebrandt394c5522020-09-11 11:23:01 +00001163
1164 oFsm.numVlanFilterEntries++
1165 meParams := me.ParamData{
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001166 EntityID: vtfdID,
Holger Hildebrandt394c5522020-09-11 11:23:01 +00001167 Attributes: me.AttributeValueMap{
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001168 "VlanFilterList": vtfdFilterList,
1169 "ForwardOperation": uint8(0x10), //VID investigation
1170 "NumberOfEntries": oFsm.numVlanFilterEntries,
Holger Hildebrandt394c5522020-09-11 11:23:01 +00001171 },
1172 }
Girish Gowdra0b235842021-03-09 13:06:46 -08001173 meInstance := oFsm.pOmciCC.sendCreateVtfdVar(log.WithSpanFromContext(context.TODO(), ctx), oFsm.pDeviceHandler.pOpenOnuAc.omciTimeout, true,
Holger Hildebrandt394c5522020-09-11 11:23:01 +00001174 oFsm.pAdaptFsm.commChan, meParams)
1175 //accept also nil as (error) return value for writing to LastTx
1176 // - this avoids misinterpretation of new received OMCI messages
1177 //TODO!!: refactoring improvement requested, here as an example for [VOL-3457]:
1178 // send shall return (dual format) error code that can be used here for immediate error treatment
1179 // (relevant to all used sendXX() methods in this (and other) FSM's)
mpagenko01e726e2020-10-23 09:45:29 +00001180 oFsm.pLastTxMeInstance = meInstance
Holger Hildebrandt394c5522020-09-11 11:23:01 +00001181 }
mpagenko15ff4a52021-03-02 10:09:20 +00001182 oFsm.mutexFlowParams.Unlock()
Holger Hildebrandt394c5522020-09-11 11:23:01 +00001183 //verify response
dbainbri4d3a0dc2020-12-02 00:33:42 +00001184 err := oFsm.waitforOmciResponse(ctx)
Holger Hildebrandt394c5522020-09-11 11:23:01 +00001185 if err != nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +00001186 logger.Errorw(ctx, "VTFD create/set failed, aborting VlanConfig FSM!",
mpagenko01e726e2020-10-23 09:45:29 +00001187 log.Fields{"device-id": oFsm.deviceID})
mpagenkofc4f56e2020-11-04 17:17:49 +00001188 pConfigVlanStateBaseFsm := oFsm.pAdaptFsm.pFsm
mpagenko9a304ea2020-12-16 15:54:01 +00001189 // Can't call FSM Event directly, decoupling it
mpagenkofc4f56e2020-11-04 17:17:49 +00001190 go func(a_pBaseFsm *fsm.FSM) {
1191 _ = a_pBaseFsm.Event(vlanEvReset)
1192 }(pConfigVlanStateBaseFsm)
Holger Hildebrandt394c5522020-09-11 11:23:01 +00001193 return
1194 }
1195 }
mpagenko15ff4a52021-03-02 10:09:20 +00001196 oFsm.mutexFlowParams.Lock()
mpagenkof1fc3862021-02-16 10:09:52 +00001197 oFsm.requestEventOffset = uint8(cDeviceEventOffsetAddWithKvStore) //0 offset for last flow-add activity
mpagenko15ff4a52021-03-02 10:09:20 +00001198 oFsm.mutexFlowParams.Unlock()
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001199 go func() {
mpagenko15ff4a52021-03-02 10:09:20 +00001200 oFsm.mutexFlowParams.RLock()
mpagenko9a304ea2020-12-16 15:54:01 +00001201 tpID := oFsm.actualUniVlanConfigRule.TpID
mpagenko15ff4a52021-03-02 10:09:20 +00001202 configuredUniFlow := oFsm.configuredUniFlow
1203 oFsm.mutexFlowParams.RUnlock()
1204 errEvto := oFsm.performConfigEvtocdEntries(ctx, configuredUniFlow)
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001205 //This is correct passing scenario
1206 if errEvto == nil {
1207 //TODO Possibly insert new state for multicast --> possibly another jira/later time.
dbainbri4d3a0dc2020-12-02 00:33:42 +00001208 for _, gemPort := range oFsm.pUniTechProf.getMulticastGemPorts(ctx, oFsm.pOnuUniPort.uniID, uint8(tpID)) {
mpagenko15ff4a52021-03-02 10:09:20 +00001209 oFsm.mutexFlowParams.RLock()
mpagenko9a304ea2020-12-16 15:54:01 +00001210 vlanID := oFsm.actualUniVlanConfigRule.SetVid
dbainbri4d3a0dc2020-12-02 00:33:42 +00001211 logger.Infow(ctx, "Setting multicast MEs for additional flows", log.Fields{"deviceID": oFsm.deviceID,
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001212 "techProfile": tpID, "gemPort": gemPort,
1213 "vlanID": vlanID, "configuredUniFlow": oFsm.configuredUniFlow})
mpagenko15ff4a52021-03-02 10:09:20 +00001214 oFsm.mutexFlowParams.RUnlock()
dbainbri4d3a0dc2020-12-02 00:33:42 +00001215 errCreateAllMulticastME := oFsm.performSettingMulticastME(ctx, tpID, gemPort, vlanID)
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001216 if errCreateAllMulticastME != nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +00001217 logger.Errorw(ctx, "Multicast ME create failed, aborting AniConfig FSM!",
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001218 log.Fields{"device-id": oFsm.deviceID})
1219 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvReset)
1220 }
1221 }
1222 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvRxConfigEvtocd)
1223 }
1224 }()
Holger Hildebrandt394c5522020-09-11 11:23:01 +00001225}
1226
dbainbri4d3a0dc2020-12-02 00:33:42 +00001227func (oFsm *UniVlanConfigFsm) enterRemoveFlow(ctx context.Context, e *fsm.Event) {
mpagenko551a4d42020-12-08 18:09:20 +00001228 oFsm.mutexFlowParams.RLock()
dbainbri4d3a0dc2020-12-02 00:33:42 +00001229 logger.Debugw(ctx, "UniVlanConfigFsm - start removing the top remove-flow", log.Fields{
mpagenko01e726e2020-10-23 09:45:29 +00001230 "in state": e.FSM.Current(), "with last cookie": oFsm.uniRemoveFlowsSlice[0].cookie,
1231 "device-id": oFsm.deviceID})
mpagenkodff5dda2020-08-28 11:52:01 +00001232
mpagenkofc4f56e2020-11-04 17:17:49 +00001233 pConfigVlanStateBaseFsm := oFsm.pAdaptFsm.pFsm
1234 loAllowSpecificOmciConfig := oFsm.pDeviceHandler.ReadyForSpecificOmciConfig
mpagenko01e726e2020-10-23 09:45:29 +00001235 loVlanEntryClear := uint8(0)
1236 loVlanEntryRmPos := uint8(0x80) //with indication 'invalid' in bit 7
1237 //shallow copy is sufficient as no reference variables are used within struct
1238 loRuleParams := oFsm.uniRemoveFlowsSlice[0].vlanRuleParams
mpagenko551a4d42020-12-08 18:09:20 +00001239 oFsm.mutexFlowParams.RUnlock()
dbainbri4d3a0dc2020-12-02 00:33:42 +00001240 logger.Debugw(ctx, "UniVlanConfigFsm - remove-flow parameters are", log.Fields{
mpagenko01e726e2020-10-23 09:45:29 +00001241 "match vid": loRuleParams.MatchVid, "match Pcp": loRuleParams.MatchPcp,
1242 "set vid": strconv.FormatInt(int64(loRuleParams.SetVid), 16),
1243 "device-id": oFsm.deviceID})
1244
1245 if loRuleParams.SetVid == uint32(of.OfpVlanId_OFPVID_PRESENT) {
1246 // meaning transparent setup - no specific VTFD setting required
dbainbri4d3a0dc2020-12-02 00:33:42 +00001247 logger.Debugw(ctx, "UniVlanConfigFsm: no VTFD removal required for transparent flow", log.Fields{
mpagenko01e726e2020-10-23 09:45:29 +00001248 "in state": e.FSM.Current(), "device-id": oFsm.deviceID})
1249 } else {
1250 vtfdFilterList := make([]uint16, cVtfdTableSize) //needed for parameter serialization and 're-copy'
1251 if oFsm.numVlanFilterEntries == 1 {
mpagenko551a4d42020-12-08 18:09:20 +00001252 vtfdID := macBridgePortAniEID + oFsm.pOnuUniPort.entityID + uint16(loRuleParams.TpID)
mpagenko01e726e2020-10-23 09:45:29 +00001253 //only one active VLAN entry (hopefully the SetVID we want to remove - should be, but not verified ..)
1254 // so we can just delete the VTFD entry
dbainbri4d3a0dc2020-12-02 00:33:42 +00001255 logger.Debugw(ctx, "UniVlanConfigFsm: VTFD delete (no more vlan filters)",
mpagenko01e726e2020-10-23 09:45:29 +00001256 log.Fields{"current vlan list": oFsm.vlanFilterList,
1257 "in state": e.FSM.Current(), "device-id": oFsm.deviceID})
mpagenkofc4f56e2020-11-04 17:17:49 +00001258 loVlanEntryClear = 1 //full VlanFilter clear request
1259 if loAllowSpecificOmciConfig { //specific OMCI config is expected to work acc. to the device state
Girish Gowdra0b235842021-03-09 13:06:46 -08001260 meInstance := oFsm.pOmciCC.sendDeleteVtfd(log.WithSpanFromContext(context.TODO(), ctx), oFsm.pDeviceHandler.pOpenOnuAc.omciTimeout, true,
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001261 oFsm.pAdaptFsm.commChan, vtfdID)
mpagenkofc4f56e2020-11-04 17:17:49 +00001262 oFsm.pLastTxMeInstance = meInstance
1263 } else {
dbainbri4d3a0dc2020-12-02 00:33:42 +00001264 logger.Debugw(ctx, "UniVlanConfigFsm delete VTFD OMCI handling skipped based on device state", log.Fields{
Holger Hildebrandtbe523842021-03-10 10:47:18 +00001265 "device-id": oFsm.deviceID, "device-state": oFsm.pDeviceHandler.getDeviceReasonString()})
mpagenkofc4f56e2020-11-04 17:17:49 +00001266 }
mpagenko01e726e2020-10-23 09:45:29 +00001267 } else {
1268 //many VTFD already should exists - find and remove the one concerned by the actual remove rule
1269 // by updating the VTFD per set command with new valid list
dbainbri4d3a0dc2020-12-02 00:33:42 +00001270 logger.Debugw(ctx, "UniVlanConfigFsm: VTFD removal of requested VLAN from the list on OMCI",
mpagenko01e726e2020-10-23 09:45:29 +00001271 log.Fields{"current vlan list": oFsm.vlanFilterList,
1272 "set-vlan": loRuleParams.SetVid, "device-id": oFsm.deviceID})
1273 for i := uint8(0); i < oFsm.numVlanFilterEntries; i++ {
1274 if loRuleParams.SetVid == uint32(oFsm.vlanFilterList[i]) {
1275 loVlanEntryRmPos = i
1276 break //abort search
1277 }
1278 }
1279 if loVlanEntryRmPos < cVtfdTableSize {
mpagenko551a4d42020-12-08 18:09:20 +00001280 vtfdID := macBridgePortAniEID + oFsm.pOnuUniPort.entityID + uint16(loRuleParams.TpID)
mpagenko01e726e2020-10-23 09:45:29 +00001281 //valid entry was found - to be eclipsed
1282 loVlanEntryClear = 2 //VlanFilter remove request for a specific entry
1283 for i := uint8(0); i < oFsm.numVlanFilterEntries; i++ {
1284 if i < loVlanEntryRmPos {
1285 vtfdFilterList[i] = oFsm.vlanFilterList[i] //copy original
1286 } else if i < (cVtfdTableSize - 1) {
1287 vtfdFilterList[i] = oFsm.vlanFilterList[i+1] //copy successor (including 0 elements)
1288 } else {
1289 vtfdFilterList[i] = 0 //set last byte if needed
1290 }
1291 }
dbainbri4d3a0dc2020-12-02 00:33:42 +00001292 logger.Debugw(ctx, "UniVlanConfigFsm set VTFD", log.Fields{
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001293 "EntitytId": strconv.FormatInt(int64(vtfdID), 16),
mpagenko01e726e2020-10-23 09:45:29 +00001294 "new vlan list": vtfdFilterList, "device-id": oFsm.deviceID})
1295
mpagenkofc4f56e2020-11-04 17:17:49 +00001296 if loAllowSpecificOmciConfig { //specific OMCI config is expected to work acc. to the device state
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001297 // FIXME: VOL-3685: Issues with resetting a table entry in EVTOCD ME
Girish Gowdra0b235842021-03-09 13:06:46 -08001298 meInstance := oFsm.pOmciCC.sendDeleteVtfd(log.WithSpanFromContext(context.TODO(), ctx), oFsm.pDeviceHandler.pOpenOnuAc.omciTimeout, true,
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001299 oFsm.pAdaptFsm.commChan, vtfdID)
mpagenkofc4f56e2020-11-04 17:17:49 +00001300 oFsm.pLastTxMeInstance = meInstance
1301 } else {
dbainbri4d3a0dc2020-12-02 00:33:42 +00001302 logger.Debugw(ctx, "UniVlanConfigFsm set VTFD OMCI handling skipped based on device state", log.Fields{
Holger Hildebrandtbe523842021-03-10 10:47:18 +00001303 "device-id": oFsm.deviceID, "device-state": oFsm.pDeviceHandler.getDeviceReasonString()})
mpagenko01e726e2020-10-23 09:45:29 +00001304 }
mpagenko01e726e2020-10-23 09:45:29 +00001305 } else {
dbainbri4d3a0dc2020-12-02 00:33:42 +00001306 logger.Warnw(ctx, "UniVlanConfigFsm: requested VLAN for removal not found in list - ignore and continue (no VTFD set)",
mpagenko01e726e2020-10-23 09:45:29 +00001307 log.Fields{"device-id": oFsm.deviceID})
1308 }
1309 }
1310 if loVlanEntryClear > 0 {
mpagenkofc4f56e2020-11-04 17:17:49 +00001311 if loAllowSpecificOmciConfig { //specific OMCI config is expected to work acc. to the device state
1312 //waiting on response
dbainbri4d3a0dc2020-12-02 00:33:42 +00001313 err := oFsm.waitforOmciResponse(ctx)
mpagenkofc4f56e2020-11-04 17:17:49 +00001314 if err != nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +00001315 logger.Errorw(ctx, "VTFD delete/reset failed, aborting VlanConfig FSM!",
mpagenkofc4f56e2020-11-04 17:17:49 +00001316 log.Fields{"device-id": oFsm.deviceID})
mpagenko9a304ea2020-12-16 15:54:01 +00001317 // Can't call FSM Event directly, decoupling it
mpagenkofc4f56e2020-11-04 17:17:49 +00001318 go func(a_pBaseFsm *fsm.FSM) {
1319 _ = a_pBaseFsm.Event(vlanEvReset)
1320 }(pConfigVlanStateBaseFsm)
1321 return
1322 }
mpagenko01e726e2020-10-23 09:45:29 +00001323 }
1324
mpagenko15ff4a52021-03-02 10:09:20 +00001325 oFsm.mutexFlowParams.Lock()
mpagenko01e726e2020-10-23 09:45:29 +00001326 if loVlanEntryClear == 1 {
1327 oFsm.vlanFilterList[0] = 0 //first entry is the only that can contain the previous only-one element
1328 oFsm.numVlanFilterEntries = 0
1329 } else if loVlanEntryClear == 2 {
1330 // new VlanFilterList should be one entry smaller now - copy from last configured entry
1331 // this loop now includes the 0 element on previous last valid entry
1332 for i := uint8(0); i <= oFsm.numVlanFilterEntries; i++ {
1333 oFsm.vlanFilterList[i] = vtfdFilterList[i]
1334 }
1335 oFsm.numVlanFilterEntries--
1336 }
mpagenko15ff4a52021-03-02 10:09:20 +00001337 oFsm.mutexFlowParams.Unlock()
mpagenko01e726e2020-10-23 09:45:29 +00001338 }
1339 }
1340
mpagenkofc4f56e2020-11-04 17:17:49 +00001341 if loAllowSpecificOmciConfig { //specific OMCI config is expected to work acc. to the device state
dbainbri4d3a0dc2020-12-02 00:33:42 +00001342 go oFsm.removeEvtocdEntries(ctx, loRuleParams)
mpagenkofc4f56e2020-11-04 17:17:49 +00001343 } else {
1344 // OMCI processing is not done, expectation is to have the ONU in some basic config state accordingly
dbainbri4d3a0dc2020-12-02 00:33:42 +00001345 logger.Debugw(ctx, "UniVlanConfigFsm remove EVTOCD OMCI handling skipped based on device state", log.Fields{
mpagenkofc4f56e2020-11-04 17:17:49 +00001346 "device-id": oFsm.deviceID})
mpagenko9a304ea2020-12-16 15:54:01 +00001347 // Can't call FSM Event directly, decoupling it
mpagenkofc4f56e2020-11-04 17:17:49 +00001348 go func(a_pBaseFsm *fsm.FSM) {
Girish Gowdra26a40922021-01-29 17:14:34 -08001349 _ = a_pBaseFsm.Event(vlanEvRemFlowDone, loRuleParams.TpID)
mpagenkofc4f56e2020-11-04 17:17:49 +00001350 }(pConfigVlanStateBaseFsm)
1351 }
mpagenkodff5dda2020-08-28 11:52:01 +00001352}
1353
dbainbri4d3a0dc2020-12-02 00:33:42 +00001354func (oFsm *UniVlanConfigFsm) enterVlanCleanupDone(ctx context.Context, e *fsm.Event) {
Girish Gowdra26a40922021-01-29 17:14:34 -08001355 var tpID uint8
1356 // Extract the tpID
1357 if len(e.Args) > 0 {
1358 tpID = e.Args[0].(uint8)
1359 logger.Debugw(ctx, "UniVlanConfigFsm - flow removed for tp id", log.Fields{"device-id": oFsm.deviceID, "tpID": e.Args[0].(uint8)})
1360 } else {
1361 logger.Warnw(ctx, "UniVlanConfigFsm - tp id not available", log.Fields{"device-id": oFsm.deviceID})
1362 }
mpagenko01e726e2020-10-23 09:45:29 +00001363 oFsm.mutexFlowParams.Lock()
mpagenkof1fc3862021-02-16 10:09:52 +00001364 deletedCookie := oFsm.uniRemoveFlowsSlice[0].cookie
1365 logger.Debugw(ctx, "UniVlanConfigFsm - removing the removal data", log.Fields{
1366 "in state": e.FSM.Current(), "device-id": oFsm.deviceID,
1367 "removed cookie": deletedCookie, "waitForDeleteCookie": oFsm.delayNewRuleCookie})
1368
mpagenko01e726e2020-10-23 09:45:29 +00001369 if len(oFsm.uniRemoveFlowsSlice) <= 1 {
1370 oFsm.uniRemoveFlowsSlice = nil //reset the slice
dbainbri4d3a0dc2020-12-02 00:33:42 +00001371 logger.Debugw(ctx, "UniVlanConfigFsm flow removal - last remove-flow deleted", log.Fields{
mpagenko01e726e2020-10-23 09:45:29 +00001372 "device-id": oFsm.deviceID})
1373 } else {
1374 //cut off the actual flow by slicing out the first element
1375 oFsm.uniRemoveFlowsSlice = append(
1376 oFsm.uniRemoveFlowsSlice[:0],
1377 oFsm.uniRemoveFlowsSlice[1:]...)
dbainbri4d3a0dc2020-12-02 00:33:42 +00001378 logger.Debugw(ctx, "UniVlanConfigFsm flow removal - specific flow deleted from data", log.Fields{
mpagenko01e726e2020-10-23 09:45:29 +00001379 "device-id": oFsm.deviceID})
1380 }
1381 oFsm.mutexFlowParams.Unlock()
1382
mpagenkof1fc3862021-02-16 10:09:52 +00001383 oFsm.requestEventOffset = uint8(cDeviceEventOffsetRemoveWithKvStore) //offset for last flow-remove activity (with kvStore request)
mpagenko01e726e2020-10-23 09:45:29 +00001384 //return to the basic config verification state
mpagenkodff5dda2020-08-28 11:52:01 +00001385 pConfigVlanStateAFsm := oFsm.pAdaptFsm
1386 if pConfigVlanStateAFsm != nil {
mpagenko9a304ea2020-12-16 15:54:01 +00001387 // Can't call FSM Event directly, decoupling it
mpagenkodff5dda2020-08-28 11:52:01 +00001388 go func(a_pAFsm *AdapterFsm) {
1389 if a_pAFsm != nil && a_pAFsm.pFsm != nil {
mpagenko01e726e2020-10-23 09:45:29 +00001390 _ = a_pAFsm.pFsm.Event(vlanEvFlowDataRemoved)
mpagenkodff5dda2020-08-28 11:52:01 +00001391 }
1392 }(pConfigVlanStateAFsm)
1393 }
Girish Gowdra26a40922021-01-29 17:14:34 -08001394
mpagenkobb47bc22021-04-20 13:29:09 +00001395 oFsm.mutexFlowParams.Lock()
Girish Gowdra26a40922021-01-29 17:14:34 -08001396 noOfFlowRem := len(oFsm.uniRemoveFlowsSlice)
mpagenkof1fc3862021-02-16 10:09:52 +00001397 if deletedCookie == oFsm.delayNewRuleCookie {
1398 // flush the channel CookieDeleted to ensure it is not lingering from some previous (aborted) activity
1399 select {
1400 case <-oFsm.chCookieDeleted:
1401 logger.Debug(ctx, "flushed CookieDeleted")
1402 default:
1403 }
1404 oFsm.chCookieDeleted <- true // let the waiting AddFlow thread continue
1405 }
mpagenkobb47bc22021-04-20 13:29:09 +00001406 // If all pending flow-removes are completed and TP ID is valid go on processing any pending TP delete
1407 if oFsm.signalOnFlowDelete && noOfFlowRem == 0 && tpID > 0 {
1408 logger.Debugw(ctx, "signal flow removal for pending TP delete", log.Fields{"device-id": oFsm.deviceID, "tpID": tpID})
Girish Gowdra26a40922021-01-29 17:14:34 -08001409 // If we are here then all flows are removed.
mpagenkobb47bc22021-04-20 13:29:09 +00001410 if len(oFsm.flowDeleteChannel) == 0 { //channel not yet in use
1411 oFsm.flowDeleteChannel <- true
1412 oFsm.signalOnFlowDelete = false
1413 }
Girish Gowdra26a40922021-01-29 17:14:34 -08001414 }
mpagenkobb47bc22021-04-20 13:29:09 +00001415 oFsm.mutexFlowParams.Unlock()
mpagenkodff5dda2020-08-28 11:52:01 +00001416}
1417
dbainbri4d3a0dc2020-12-02 00:33:42 +00001418func (oFsm *UniVlanConfigFsm) enterResetting(ctx context.Context, e *fsm.Event) {
1419 logger.Debugw(ctx, "UniVlanConfigFsm resetting", log.Fields{"device-id": oFsm.deviceID})
mpagenkodff5dda2020-08-28 11:52:01 +00001420
1421 pConfigVlanStateAFsm := oFsm.pAdaptFsm
1422 if pConfigVlanStateAFsm != nil {
1423 // abort running message processing
1424 fsmAbortMsg := Message{
1425 Type: TestMsg,
1426 Data: TestMessage{
1427 TestMessageVal: AbortMessageProcessing,
1428 },
1429 }
1430 pConfigVlanStateAFsm.commChan <- fsmAbortMsg
1431
mpagenko9a304ea2020-12-16 15:54:01 +00001432 //try to restart the FSM to 'disabled'
1433 // Can't call FSM Event directly, decoupling it
mpagenkodff5dda2020-08-28 11:52:01 +00001434 go func(a_pAFsm *AdapterFsm) {
1435 if a_pAFsm != nil && a_pAFsm.pFsm != nil {
Himani Chawla4d908332020-08-31 12:30:20 +05301436 _ = a_pAFsm.pFsm.Event(vlanEvRestart)
mpagenkodff5dda2020-08-28 11:52:01 +00001437 }
1438 }(pConfigVlanStateAFsm)
1439 }
1440}
1441
dbainbri4d3a0dc2020-12-02 00:33:42 +00001442func (oFsm *UniVlanConfigFsm) enterDisabled(ctx context.Context, e *fsm.Event) {
1443 logger.Debugw(ctx, "UniVlanConfigFsm enters disabled state", log.Fields{"device-id": oFsm.deviceID})
mpagenko01e726e2020-10-23 09:45:29 +00001444 oFsm.pLastTxMeInstance = nil
mpagenkodff5dda2020-08-28 11:52:01 +00001445 if oFsm.pDeviceHandler != nil {
mpagenko2418ab02020-11-12 12:58:06 +00001446 //TODO: to clarify with improved error treatment for VlanConfigFsm (timeout,reception) errors
1447 // current code removes the complete FSM including all flow/rule configuration done so far
1448 // this might be a bit to much, it would require fully new flow config from rwCore (at least on OnuDown/up)
1449 // maybe a more sophisticated approach is possible without clearing the data
mpagenko9a304ea2020-12-16 15:54:01 +00001450 oFsm.mutexFlowParams.RLock()
mpagenko2418ab02020-11-12 12:58:06 +00001451 if oFsm.clearPersistency {
1452 //permanently remove possibly stored persistent data
1453 if len(oFsm.uniVlanFlowParamsSlice) > 0 {
1454 var emptySlice = make([]uniVlanFlowParams, 0)
mpagenkof1fc3862021-02-16 10:09:52 +00001455 _ = oFsm.pDeviceHandler.storePersUniFlowConfig(ctx, oFsm.pOnuUniPort.uniID, &emptySlice, true) //ignore errors
mpagenko2418ab02020-11-12 12:58:06 +00001456 }
1457 } else {
dbainbri4d3a0dc2020-12-02 00:33:42 +00001458 logger.Debugw(ctx, "UniVlanConfigFsm persistency data not cleared", log.Fields{"device-id": oFsm.deviceID})
mpagenko2418ab02020-11-12 12:58:06 +00001459 }
mpagenkof1fc3862021-02-16 10:09:52 +00001460 if oFsm.delayNewRuleCookie != 0 {
1461 // looks like the waiting AddFlow is stuck
1462 oFsm.chCookieDeleted <- true // let the waiting AddFlow thread continue/treminate
1463 }
mpagenko9a304ea2020-12-16 15:54:01 +00001464 oFsm.mutexFlowParams.RUnlock()
mpagenko2418ab02020-11-12 12:58:06 +00001465 //request removal of 'reference' in the Handler (completely clear the FSM and its data)
dbainbri4d3a0dc2020-12-02 00:33:42 +00001466 go oFsm.pDeviceHandler.RemoveVlanFilterFsm(ctx, oFsm.pOnuUniPort)
mpagenkodff5dda2020-08-28 11:52:01 +00001467 }
1468}
1469
dbainbri4d3a0dc2020-12-02 00:33:42 +00001470func (oFsm *UniVlanConfigFsm) processOmciVlanMessages(ctx context.Context) { //ctx context.Context?
1471 logger.Debugw(ctx, "Start UniVlanConfigFsm Msg processing", log.Fields{"for device-id": oFsm.deviceID})
mpagenkodff5dda2020-08-28 11:52:01 +00001472loop:
1473 for {
mpagenkodff5dda2020-08-28 11:52:01 +00001474 // case <-ctx.Done():
dbainbri4d3a0dc2020-12-02 00:33:42 +00001475 // logger.Info(ctx,"MibSync Msg", log.Fields{"Message handling canceled via context for device-id": oFsm.deviceID})
mpagenkodff5dda2020-08-28 11:52:01 +00001476 // break loop
Himani Chawla4d908332020-08-31 12:30:20 +05301477 message, ok := <-oFsm.pAdaptFsm.commChan
1478 if !ok {
dbainbri4d3a0dc2020-12-02 00:33:42 +00001479 logger.Info(ctx, "UniVlanConfigFsm Rx Msg - could not read from channel", log.Fields{"device-id": oFsm.deviceID})
Himani Chawla4d908332020-08-31 12:30:20 +05301480 // but then we have to ensure a restart of the FSM as well - as exceptional procedure
1481 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvReset)
1482 break loop
1483 }
dbainbri4d3a0dc2020-12-02 00:33:42 +00001484 logger.Debugw(ctx, "UniVlanConfigFsm Rx Msg", log.Fields{"device-id": oFsm.deviceID})
Himani Chawla4d908332020-08-31 12:30:20 +05301485
1486 switch message.Type {
1487 case TestMsg:
1488 msg, _ := message.Data.(TestMessage)
1489 if msg.TestMessageVal == AbortMessageProcessing {
dbainbri4d3a0dc2020-12-02 00:33:42 +00001490 logger.Infow(ctx, "UniVlanConfigFsm abort ProcessMsg", log.Fields{"for device-id": oFsm.deviceID})
mpagenkodff5dda2020-08-28 11:52:01 +00001491 break loop
1492 }
dbainbri4d3a0dc2020-12-02 00:33:42 +00001493 logger.Warnw(ctx, "UniVlanConfigFsm unknown TestMessage", log.Fields{"device-id": oFsm.deviceID, "MessageVal": msg.TestMessageVal})
Himani Chawla4d908332020-08-31 12:30:20 +05301494 case OMCI:
1495 msg, _ := message.Data.(OmciMessage)
dbainbri4d3a0dc2020-12-02 00:33:42 +00001496 oFsm.handleOmciVlanConfigMessage(ctx, msg)
Himani Chawla4d908332020-08-31 12:30:20 +05301497 default:
dbainbri4d3a0dc2020-12-02 00:33:42 +00001498 logger.Warn(ctx, "UniVlanConfigFsm Rx unknown message", log.Fields{"device-id": oFsm.deviceID,
Himani Chawla4d908332020-08-31 12:30:20 +05301499 "message.Type": message.Type})
mpagenkodff5dda2020-08-28 11:52:01 +00001500 }
1501 }
dbainbri4d3a0dc2020-12-02 00:33:42 +00001502 logger.Infow(ctx, "End UniVlanConfigFsm Msg processing", log.Fields{"device-id": oFsm.deviceID})
mpagenkodff5dda2020-08-28 11:52:01 +00001503}
1504
dbainbri4d3a0dc2020-12-02 00:33:42 +00001505func (oFsm *UniVlanConfigFsm) handleOmciVlanConfigMessage(ctx context.Context, msg OmciMessage) {
1506 logger.Debugw(ctx, "Rx OMCI UniVlanConfigFsm Msg", log.Fields{"device-id": oFsm.deviceID,
mpagenkodff5dda2020-08-28 11:52:01 +00001507 "msgType": msg.OmciMsg.MessageType})
1508
1509 switch msg.OmciMsg.MessageType {
1510 case omci.CreateResponseType:
mpagenko01e726e2020-10-23 09:45:29 +00001511 { // had to shift that to a method to cope with StaticCodeAnalysis restrictions :-(
dbainbri4d3a0dc2020-12-02 00:33:42 +00001512 if err := oFsm.handleOmciCreateResponseMessage(ctx, msg.OmciPacket); err != nil {
1513 logger.Warnw(ctx, "CreateResponse handling aborted", log.Fields{"err": err})
mpagenkodff5dda2020-08-28 11:52:01 +00001514 return
1515 }
mpagenkodff5dda2020-08-28 11:52:01 +00001516 } //CreateResponseType
1517 case omci.SetResponseType:
mpagenko01e726e2020-10-23 09:45:29 +00001518 { //leave that here as direct code as most often used
mpagenkodff5dda2020-08-28 11:52:01 +00001519 msgLayer := (*msg.OmciPacket).Layer(omci.LayerTypeSetResponse)
1520 if msgLayer == nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +00001521 logger.Errorw(ctx, "Omci Msg layer could not be detected for SetResponse",
mpagenko01e726e2020-10-23 09:45:29 +00001522 log.Fields{"device-id": oFsm.deviceID})
mpagenkodff5dda2020-08-28 11:52:01 +00001523 return
1524 }
1525 msgObj, msgOk := msgLayer.(*omci.SetResponse)
1526 if !msgOk {
dbainbri4d3a0dc2020-12-02 00:33:42 +00001527 logger.Errorw(ctx, "Omci Msg layer could not be assigned for SetResponse",
mpagenko01e726e2020-10-23 09:45:29 +00001528 log.Fields{"device-id": oFsm.deviceID})
mpagenkodff5dda2020-08-28 11:52:01 +00001529 return
1530 }
dbainbri4d3a0dc2020-12-02 00:33:42 +00001531 logger.Debugw(ctx, "UniVlanConfigFsm SetResponse Data", log.Fields{"device-id": oFsm.deviceID, "data-fields": msgObj})
mpagenkodff5dda2020-08-28 11:52:01 +00001532 if msgObj.Result != me.Success {
dbainbri4d3a0dc2020-12-02 00:33:42 +00001533 logger.Errorw(ctx, "UniVlanConfigFsm Omci SetResponse Error - later: drive FSM to abort state ?",
mpagenko01e726e2020-10-23 09:45:29 +00001534 log.Fields{"device-id": oFsm.deviceID, "Error": msgObj.Result})
mpagenkodff5dda2020-08-28 11:52:01 +00001535 // possibly force FSM into abort or ignore some errors for some messages? store error for mgmt display?
1536 return
1537 }
mpagenko01e726e2020-10-23 09:45:29 +00001538 if msgObj.EntityClass == oFsm.pLastTxMeInstance.GetClassID() &&
1539 msgObj.EntityInstance == oFsm.pLastTxMeInstance.GetEntityID() {
1540 switch oFsm.pLastTxMeInstance.GetName() {
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001541 case "VlanTaggingFilterData", "ExtendedVlanTaggingOperationConfigurationData", "MulticastOperationsProfile":
Holger Hildebrandt394c5522020-09-11 11:23:01 +00001542 { // let the MultiEntity config proceed by stopping the wait function
mpagenkodff5dda2020-08-28 11:52:01 +00001543 oFsm.omciMIdsResponseReceived <- true
1544 }
1545 }
1546 }
1547 } //SetResponseType
mpagenko01e726e2020-10-23 09:45:29 +00001548 case omci.DeleteResponseType:
1549 { // had to shift that to a method to cope with StaticCodeAnalysis restrictions :-(
dbainbri4d3a0dc2020-12-02 00:33:42 +00001550 if err := oFsm.handleOmciDeleteResponseMessage(ctx, msg.OmciPacket); err != nil {
1551 logger.Warnw(ctx, "DeleteResponse handling aborted", log.Fields{"err": err})
mpagenko01e726e2020-10-23 09:45:29 +00001552 return
1553 }
1554 } //DeleteResponseType
mpagenkodff5dda2020-08-28 11:52:01 +00001555 default:
1556 {
dbainbri4d3a0dc2020-12-02 00:33:42 +00001557 logger.Errorw(ctx, "Rx OMCI unhandled MsgType",
mpagenko01e726e2020-10-23 09:45:29 +00001558 log.Fields{"omciMsgType": msg.OmciMsg.MessageType, "device-id": oFsm.deviceID})
mpagenkodff5dda2020-08-28 11:52:01 +00001559 return
1560 }
1561 }
1562}
1563
dbainbri4d3a0dc2020-12-02 00:33:42 +00001564func (oFsm *UniVlanConfigFsm) handleOmciCreateResponseMessage(ctx context.Context, apOmciPacket *gp.Packet) error {
mpagenko01e726e2020-10-23 09:45:29 +00001565 msgLayer := (*apOmciPacket).Layer(omci.LayerTypeCreateResponse)
1566 if msgLayer == nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +00001567 logger.Errorw(ctx, "Omci Msg layer could not be detected for CreateResponse",
mpagenko01e726e2020-10-23 09:45:29 +00001568 log.Fields{"device-id": oFsm.deviceID})
1569 return fmt.Errorf("omci msg layer could not be detected for CreateResponse for device-id %x",
1570 oFsm.deviceID)
1571 }
1572 msgObj, msgOk := msgLayer.(*omci.CreateResponse)
1573 if !msgOk {
dbainbri4d3a0dc2020-12-02 00:33:42 +00001574 logger.Errorw(ctx, "Omci Msg layer could not be assigned for CreateResponse",
mpagenko01e726e2020-10-23 09:45:29 +00001575 log.Fields{"device-id": oFsm.deviceID})
1576 return fmt.Errorf("omci msg layer could not be assigned for CreateResponse for device-id %x",
1577 oFsm.deviceID)
1578 }
dbainbri4d3a0dc2020-12-02 00:33:42 +00001579 logger.Debugw(ctx, "UniVlanConfigFsm CreateResponse Data", log.Fields{"device-id": oFsm.deviceID, "data-fields": msgObj})
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001580 if msgObj.Result != me.Success && msgObj.Result != me.InstanceExists {
dbainbri4d3a0dc2020-12-02 00:33:42 +00001581 logger.Errorw(ctx, "Omci CreateResponse Error - later: drive FSM to abort state ?", log.Fields{"device-id": oFsm.deviceID,
mpagenko01e726e2020-10-23 09:45:29 +00001582 "Error": msgObj.Result})
1583 // possibly force FSM into abort or ignore some errors for some messages? store error for mgmt display?
1584 return fmt.Errorf("omci CreateResponse Error for device-id %x",
1585 oFsm.deviceID)
1586 }
1587 if msgObj.EntityClass == oFsm.pLastTxMeInstance.GetClassID() &&
1588 msgObj.EntityInstance == oFsm.pLastTxMeInstance.GetEntityID() {
1589 // to satisfy StaticCodeAnalysis I had to move the small processing into a separate method :-(
1590 switch oFsm.pLastTxMeInstance.GetName() {
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001591 case "VlanTaggingFilterData", "MulticastOperationsProfile",
1592 "MulticastSubscriberConfigInfo", "MacBridgePortConfigurationData",
1593 "ExtendedVlanTaggingOperationConfigurationData":
mpagenko01e726e2020-10-23 09:45:29 +00001594 {
1595 if oFsm.pAdaptFsm.pFsm.Current() == vlanStConfigVtfd {
1596 // Only if CreateResponse is received from first flow entry - let the FSM proceed ...
1597 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvRxConfigVtfd)
1598 } else { // let the MultiEntity config proceed by stopping the wait function
1599 oFsm.omciMIdsResponseReceived <- true
1600 }
1601 }
1602 }
1603 }
1604 return nil
1605}
1606
dbainbri4d3a0dc2020-12-02 00:33:42 +00001607func (oFsm *UniVlanConfigFsm) handleOmciDeleteResponseMessage(ctx context.Context, apOmciPacket *gp.Packet) error {
mpagenko01e726e2020-10-23 09:45:29 +00001608 msgLayer := (*apOmciPacket).Layer(omci.LayerTypeDeleteResponse)
1609 if msgLayer == nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +00001610 logger.Errorw(ctx, "UniVlanConfigFsm - Omci Msg layer could not be detected for DeleteResponse",
mpagenko01e726e2020-10-23 09:45:29 +00001611 log.Fields{"device-id": oFsm.deviceID})
1612 return fmt.Errorf("omci msg layer could not be detected for DeleteResponse for device-id %x",
1613 oFsm.deviceID)
1614 }
1615 msgObj, msgOk := msgLayer.(*omci.DeleteResponse)
1616 if !msgOk {
dbainbri4d3a0dc2020-12-02 00:33:42 +00001617 logger.Errorw(ctx, "UniVlanConfigFsm - Omci Msg layer could not be assigned for DeleteResponse",
mpagenko01e726e2020-10-23 09:45:29 +00001618 log.Fields{"device-id": oFsm.deviceID})
1619 return fmt.Errorf("omci msg layer could not be assigned for DeleteResponse for device-id %x",
1620 oFsm.deviceID)
1621 }
dbainbri4d3a0dc2020-12-02 00:33:42 +00001622 logger.Debugw(ctx, "UniVlanConfigFsm DeleteResponse Data", log.Fields{"device-id": oFsm.deviceID, "data-fields": msgObj})
mpagenko01e726e2020-10-23 09:45:29 +00001623 if msgObj.Result != me.Success {
dbainbri4d3a0dc2020-12-02 00:33:42 +00001624 logger.Errorw(ctx, "UniVlanConfigFsm - Omci DeleteResponse Error - later: drive FSM to abort state ?",
mpagenko01e726e2020-10-23 09:45:29 +00001625 log.Fields{"device-id": oFsm.deviceID, "Error": msgObj.Result})
1626 // possibly force FSM into abort or ignore some errors for some messages? store error for mgmt display?
1627 return fmt.Errorf("omci DeleteResponse Error for device-id %x",
1628 oFsm.deviceID)
1629 }
1630 if msgObj.EntityClass == oFsm.pLastTxMeInstance.GetClassID() &&
1631 msgObj.EntityInstance == oFsm.pLastTxMeInstance.GetEntityID() {
1632 switch oFsm.pLastTxMeInstance.GetName() {
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001633 case "VlanTaggingFilterData", "ExtendedVlanTaggingOperationConfigurationData":
mpagenko01e726e2020-10-23 09:45:29 +00001634 { // let the MultiEntity config proceed by stopping the wait function
1635 oFsm.omciMIdsResponseReceived <- true
1636 }
1637 }
1638 }
1639 return nil
1640}
1641
dbainbri4d3a0dc2020-12-02 00:33:42 +00001642func (oFsm *UniVlanConfigFsm) performConfigEvtocdEntries(ctx context.Context, aFlowEntryNo uint8) error {
Holger Hildebrandt394c5522020-09-11 11:23:01 +00001643 if aFlowEntryNo == 0 {
1644 // EthType set only at first flow element
mpagenkodff5dda2020-08-28 11:52:01 +00001645 // EVTOCD ME is expected to exist at this point already from MIB-Download (with AssociationType/Pointer)
1646 // we need to extend the configuration by EthType definition and, to be sure, downstream 'inverse' mode
dbainbri4d3a0dc2020-12-02 00:33:42 +00001647 logger.Debugw(ctx, "UniVlanConfigFsm Tx Create::EVTOCD", log.Fields{
mpagenkodff5dda2020-08-28 11:52:01 +00001648 "EntitytId": strconv.FormatInt(int64(oFsm.evtocdID), 16),
1649 "i/oEthType": strconv.FormatInt(int64(cDefaultTpid), 16),
mpagenko01e726e2020-10-23 09:45:29 +00001650 "device-id": oFsm.deviceID})
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001651 associationType := 2 // default to uniPPTP
1652 if oFsm.pOnuUniPort.portType == uniVEIP {
1653 associationType = 10
1654 }
1655 // Create the EVTOCD ME
mpagenkodff5dda2020-08-28 11:52:01 +00001656 meParams := me.ParamData{
1657 EntityID: oFsm.evtocdID,
1658 Attributes: me.AttributeValueMap{
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001659 "AssociationType": uint8(associationType),
1660 "AssociatedMePointer": oFsm.pOnuUniPort.entityID,
mpagenkodff5dda2020-08-28 11:52:01 +00001661 },
1662 }
Girish Gowdra0b235842021-03-09 13:06:46 -08001663 meInstance := oFsm.pOmciCC.sendCreateEvtocdVar(context.TODO(), oFsm.pDeviceHandler.pOpenOnuAc.omciTimeout, true,
mpagenkodff5dda2020-08-28 11:52:01 +00001664 oFsm.pAdaptFsm.commChan, meParams)
1665 //accept also nil as (error) return value for writing to LastTx
1666 // - this avoids misinterpretation of new received OMCI messages
mpagenko01e726e2020-10-23 09:45:29 +00001667 oFsm.pLastTxMeInstance = meInstance
mpagenkodff5dda2020-08-28 11:52:01 +00001668
1669 //verify response
dbainbri4d3a0dc2020-12-02 00:33:42 +00001670 err := oFsm.waitforOmciResponse(ctx)
mpagenkodff5dda2020-08-28 11:52:01 +00001671 if err != nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +00001672 logger.Errorw(ctx, "Evtocd create failed, aborting VlanConfig FSM!",
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001673 log.Fields{"device-id": oFsm.deviceID})
1674 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvReset)
1675 return fmt.Errorf("evtocd create failed %s, error %s", oFsm.deviceID, err)
1676 }
1677
1678 // Set the EVTOCD ME default params
1679 meParams = me.ParamData{
1680 EntityID: oFsm.evtocdID,
1681 Attributes: me.AttributeValueMap{
1682 "InputTpid": uint16(cDefaultTpid), //could be possibly retrieved from flow config one day, by now just like py-code base
1683 "OutputTpid": uint16(cDefaultTpid), //could be possibly retrieved from flow config one day, by now just like py-code base
1684 "DownstreamMode": uint8(cDefaultDownstreamMode),
1685 },
1686 }
Girish Gowdra0b235842021-03-09 13:06:46 -08001687 meInstance = oFsm.pOmciCC.sendSetEvtocdVar(log.WithSpanFromContext(context.TODO(), ctx), oFsm.pDeviceHandler.pOpenOnuAc.omciTimeout, true,
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001688 oFsm.pAdaptFsm.commChan, meParams)
1689 //accept also nil as (error) return value for writing to LastTx
1690 // - this avoids misinterpretation of new received OMCI messages
1691 oFsm.pLastTxMeInstance = meInstance
1692
1693 //verify response
dbainbri4d3a0dc2020-12-02 00:33:42 +00001694 err = oFsm.waitforOmciResponse(ctx)
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001695 if err != nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +00001696 logger.Errorw(ctx, "Evtocd set TPID failed, aborting VlanConfig FSM!",
mpagenko01e726e2020-10-23 09:45:29 +00001697 log.Fields{"device-id": oFsm.deviceID})
Himani Chawla4d908332020-08-31 12:30:20 +05301698 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvReset)
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001699 return fmt.Errorf("evtocd set TPID failed %s, error %s", oFsm.deviceID, err)
mpagenkodff5dda2020-08-28 11:52:01 +00001700 }
Holger Hildebrandt394c5522020-09-11 11:23:01 +00001701 } //first flow element
mpagenkodff5dda2020-08-28 11:52:01 +00001702
mpagenko551a4d42020-12-08 18:09:20 +00001703 oFsm.mutexFlowParams.RLock()
mpagenko9a304ea2020-12-16 15:54:01 +00001704 if oFsm.actualUniVlanConfigRule.SetVid == uint32(of.OfpVlanId_OFPVID_PRESENT) {
mpagenkodff5dda2020-08-28 11:52:01 +00001705 //transparent transmission required
mpagenko551a4d42020-12-08 18:09:20 +00001706 oFsm.mutexFlowParams.RUnlock()
dbainbri4d3a0dc2020-12-02 00:33:42 +00001707 logger.Debugw(ctx, "UniVlanConfigFsm Tx Set::EVTOCD single tagged transparent rule", log.Fields{
mpagenko01e726e2020-10-23 09:45:29 +00001708 "device-id": oFsm.deviceID})
mpagenkodff5dda2020-08-28 11:52:01 +00001709 sliceEvtocdRule := make([]uint8, 16)
1710 // fill vlan tagging operation table bit fields using network=bigEndian order and using slice offset 0 as highest 'word'
1711 binary.BigEndian.PutUint32(sliceEvtocdRule[cFilterOuterOffset:],
1712 cPrioIgnoreTag<<cFilterPrioOffset| // Not an outer-tag rule
1713 cDoNotFilterVid<<cFilterVidOffset| // Do not filter on outer vid
1714 cDoNotFilterTPID<<cFilterTpidOffset) // Do not filter on outer TPID field
1715
1716 binary.BigEndian.PutUint32(sliceEvtocdRule[cFilterInnerOffset:],
1717 cPrioDefaultFilter<<cFilterPrioOffset| // default inner-tag rule
1718 cDoNotFilterVid<<cFilterVidOffset| // Do not filter on inner vid
1719 cDoNotFilterTPID<<cFilterTpidOffset| // Do not filter on inner TPID field
1720 cDoNotFilterEtherType<<cFilterEtherTypeOffset) // Do not filter of EtherType
1721
1722 binary.BigEndian.PutUint32(sliceEvtocdRule[cTreatOuterOffset:],
1723 0<<cTreatTTROffset| // Do not pop any tags
1724 cDoNotAddPrio<<cTreatPrioOffset| // do not add outer tag
1725 cDontCareVid<<cTreatVidOffset| // Outer VID don't care
1726 cDontCareTpid<<cTreatTpidOffset) // Outer TPID field don't care
1727
1728 binary.BigEndian.PutUint32(sliceEvtocdRule[cTreatInnerOffset:],
1729 cDoNotAddPrio<<cTreatPrioOffset| // do not add inner tag
1730 cDontCareVid<<cTreatVidOffset| // Outer VID don't care
1731 cSetOutputTpidCopyDei<<cTreatTpidOffset) // Set TPID = 0x8100
1732
1733 meParams := me.ParamData{
1734 EntityID: oFsm.evtocdID,
1735 Attributes: me.AttributeValueMap{
1736 "ReceivedFrameVlanTaggingOperationTable": sliceEvtocdRule,
1737 },
1738 }
Girish Gowdra0b235842021-03-09 13:06:46 -08001739 meInstance := oFsm.pOmciCC.sendSetEvtocdVar(log.WithSpanFromContext(context.TODO(), ctx), oFsm.pDeviceHandler.pOpenOnuAc.omciTimeout, true,
mpagenkodff5dda2020-08-28 11:52:01 +00001740 oFsm.pAdaptFsm.commChan, meParams)
1741 //accept also nil as (error) return value for writing to LastTx
1742 // - this avoids misinterpretation of new received OMCI messages
mpagenko01e726e2020-10-23 09:45:29 +00001743 oFsm.pLastTxMeInstance = meInstance
mpagenkodff5dda2020-08-28 11:52:01 +00001744
1745 //verify response
dbainbri4d3a0dc2020-12-02 00:33:42 +00001746 err := oFsm.waitforOmciResponse(ctx)
mpagenkodff5dda2020-08-28 11:52:01 +00001747 if err != nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +00001748 logger.Errorw(ctx, "Evtocd set transparent singletagged rule failed, aborting VlanConfig FSM!",
mpagenko01e726e2020-10-23 09:45:29 +00001749 log.Fields{"device-id": oFsm.deviceID})
Himani Chawla4d908332020-08-31 12:30:20 +05301750 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvReset)
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001751 return fmt.Errorf("evtocd set transparent singletagged rule failed %s, error %s", oFsm.deviceID, err)
1752
mpagenkodff5dda2020-08-28 11:52:01 +00001753 }
1754 } else {
1755 // according to py-code acceptIncrementalEvto program option decides upon stacking or translation scenario
1756 if oFsm.acceptIncrementalEvtoOption {
mpagenko9a304ea2020-12-16 15:54:01 +00001757 matchPcp := oFsm.actualUniVlanConfigRule.MatchPcp
1758 matchVid := oFsm.actualUniVlanConfigRule.MatchVid
1759 setPcp := oFsm.actualUniVlanConfigRule.SetPcp
1760 setVid := oFsm.actualUniVlanConfigRule.SetVid
mpagenkodff5dda2020-08-28 11:52:01 +00001761 // this defines VID translation scenario: singletagged->singletagged (if not transparent)
dbainbri4d3a0dc2020-12-02 00:33:42 +00001762 logger.Debugw(ctx, "UniVlanConfigFsm Tx Set::EVTOCD single tagged translation rule", log.Fields{
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001763 "match-pcp": matchPcp, "match-vid": matchVid, "set-pcp": setPcp, "set-vid:": setVid, "device-id": oFsm.deviceID})
mpagenkodff5dda2020-08-28 11:52:01 +00001764 sliceEvtocdRule := make([]uint8, 16)
1765 // fill vlan tagging operation table bit fields using network=bigEndian order and using slice offset 0 as highest 'word'
1766 binary.BigEndian.PutUint32(sliceEvtocdRule[cFilterOuterOffset:],
1767 cPrioIgnoreTag<<cFilterPrioOffset| // Not an outer-tag rule
1768 cDoNotFilterVid<<cFilterVidOffset| // Do not filter on outer vid
1769 cDoNotFilterTPID<<cFilterTpidOffset) // Do not filter on outer TPID field
1770
1771 binary.BigEndian.PutUint32(sliceEvtocdRule[cFilterInnerOffset:],
mpagenko9a304ea2020-12-16 15:54:01 +00001772 oFsm.actualUniVlanConfigRule.MatchPcp<<cFilterPrioOffset| // either DNFonPrio or ignore tag (default) on innerVLAN
1773 oFsm.actualUniVlanConfigRule.MatchVid<<cFilterVidOffset| // either DNFonVid or real filter VID
mpagenkodff5dda2020-08-28 11:52:01 +00001774 cDoNotFilterTPID<<cFilterTpidOffset| // Do not filter on inner TPID field
1775 cDoNotFilterEtherType<<cFilterEtherTypeOffset) // Do not filter of EtherType
1776
1777 binary.BigEndian.PutUint32(sliceEvtocdRule[cTreatOuterOffset:],
mpagenko9a304ea2020-12-16 15:54:01 +00001778 oFsm.actualUniVlanConfigRule.TagsToRemove<<cTreatTTROffset| // either 1 or 0
mpagenkodff5dda2020-08-28 11:52:01 +00001779 cDoNotAddPrio<<cTreatPrioOffset| // do not add outer tag
1780 cDontCareVid<<cTreatVidOffset| // Outer VID don't care
1781 cDontCareTpid<<cTreatTpidOffset) // Outer TPID field don't care
1782
1783 binary.BigEndian.PutUint32(sliceEvtocdRule[cTreatInnerOffset:],
mpagenko9a304ea2020-12-16 15:54:01 +00001784 oFsm.actualUniVlanConfigRule.SetPcp<<cTreatPrioOffset| // as configured in flow
1785 oFsm.actualUniVlanConfigRule.SetVid<<cTreatVidOffset| //as configured in flow
mpagenkodff5dda2020-08-28 11:52:01 +00001786 cSetOutputTpidCopyDei<<cTreatTpidOffset) // Set TPID = 0x8100
mpagenko551a4d42020-12-08 18:09:20 +00001787 oFsm.mutexFlowParams.RUnlock()
mpagenkodff5dda2020-08-28 11:52:01 +00001788
1789 meParams := me.ParamData{
1790 EntityID: oFsm.evtocdID,
1791 Attributes: me.AttributeValueMap{
1792 "ReceivedFrameVlanTaggingOperationTable": sliceEvtocdRule,
1793 },
1794 }
Girish Gowdra0b235842021-03-09 13:06:46 -08001795 meInstance := oFsm.pOmciCC.sendSetEvtocdVar(log.WithSpanFromContext(context.TODO(), ctx), oFsm.pDeviceHandler.pOpenOnuAc.omciTimeout, true,
mpagenkodff5dda2020-08-28 11:52:01 +00001796 oFsm.pAdaptFsm.commChan, meParams)
1797 //accept also nil as (error) return value for writing to LastTx
1798 // - this avoids misinterpretation of new received OMCI messages
mpagenko01e726e2020-10-23 09:45:29 +00001799 oFsm.pLastTxMeInstance = meInstance
mpagenkodff5dda2020-08-28 11:52:01 +00001800
1801 //verify response
dbainbri4d3a0dc2020-12-02 00:33:42 +00001802 err := oFsm.waitforOmciResponse(ctx)
mpagenkodff5dda2020-08-28 11:52:01 +00001803 if err != nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +00001804 logger.Errorw(ctx, "Evtocd set singletagged translation rule failed, aborting VlanConfig FSM!",
mpagenko01e726e2020-10-23 09:45:29 +00001805 log.Fields{"device-id": oFsm.deviceID})
Himani Chawla4d908332020-08-31 12:30:20 +05301806 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvReset)
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001807 return fmt.Errorf("evtocd set singletagged translation rule failed %s, error %s", oFsm.deviceID, err)
mpagenkodff5dda2020-08-28 11:52:01 +00001808 }
1809 } else {
1810 //not transparent and not acceptIncrementalEvtoOption untagged/priotagged->singletagged
1811 { // just for local var's
1812 // this defines stacking scenario: untagged->singletagged
dbainbri4d3a0dc2020-12-02 00:33:42 +00001813 logger.Debugw(ctx, "UniVlanConfigFsm Tx Set::EVTOCD untagged->singletagged rule", log.Fields{
mpagenko01e726e2020-10-23 09:45:29 +00001814 "device-id": oFsm.deviceID})
mpagenkodff5dda2020-08-28 11:52:01 +00001815 sliceEvtocdRule := make([]uint8, 16)
1816 // fill vlan tagging operation table bit fields using network=bigEndian order and using slice offset 0 as highest 'word'
1817 binary.BigEndian.PutUint32(sliceEvtocdRule[cFilterOuterOffset:],
1818 cPrioIgnoreTag<<cFilterPrioOffset| // Not an outer-tag rule
1819 cDoNotFilterVid<<cFilterVidOffset| // Do not filter on outer vid
1820 cDoNotFilterTPID<<cFilterTpidOffset) // Do not filter on outer TPID field
1821
1822 binary.BigEndian.PutUint32(sliceEvtocdRule[cFilterInnerOffset:],
1823 cPrioIgnoreTag<<cFilterPrioOffset| // Not an inner-tag rule
1824 cDoNotFilterVid<<cFilterVidOffset| // Do not filter on inner vid
1825 cDoNotFilterTPID<<cFilterTpidOffset| // Do not filter on inner TPID field
1826 cDoNotFilterEtherType<<cFilterEtherTypeOffset) // Do not filter of EtherType
1827
1828 binary.BigEndian.PutUint32(sliceEvtocdRule[cTreatOuterOffset:],
1829 0<<cTreatTTROffset| // Do not pop any tags
1830 cDoNotAddPrio<<cTreatPrioOffset| // do not add outer tag
1831 cDontCareVid<<cTreatVidOffset| // Outer VID don't care
1832 cDontCareTpid<<cTreatTpidOffset) // Outer TPID field don't care
1833
1834 binary.BigEndian.PutUint32(sliceEvtocdRule[cTreatInnerOffset:],
1835 0<<cTreatPrioOffset| // vlan prio set to 0
1836 // (as done in Py code, maybe better option would be setPcp here, which still could be 0?)
mpagenko9a304ea2020-12-16 15:54:01 +00001837 oFsm.actualUniVlanConfigRule.SetVid<<cTreatVidOffset| // Outer VID don't care
mpagenkodff5dda2020-08-28 11:52:01 +00001838 cSetOutputTpidCopyDei<<cTreatTpidOffset) // Set TPID = 0x8100
1839
mpagenko551a4d42020-12-08 18:09:20 +00001840 oFsm.mutexFlowParams.RUnlock()
mpagenkodff5dda2020-08-28 11:52:01 +00001841 meParams := me.ParamData{
1842 EntityID: oFsm.evtocdID,
1843 Attributes: me.AttributeValueMap{
1844 "ReceivedFrameVlanTaggingOperationTable": sliceEvtocdRule,
1845 },
1846 }
Girish Gowdra0b235842021-03-09 13:06:46 -08001847 meInstance := oFsm.pOmciCC.sendSetEvtocdVar(log.WithSpanFromContext(context.TODO(), ctx), oFsm.pDeviceHandler.pOpenOnuAc.omciTimeout, true,
mpagenkodff5dda2020-08-28 11:52:01 +00001848 oFsm.pAdaptFsm.commChan, meParams)
1849 //accept also nil as (error) return value for writing to LastTx
1850 // - this avoids misinterpretation of new received OMCI messages
mpagenko01e726e2020-10-23 09:45:29 +00001851 oFsm.pLastTxMeInstance = meInstance
mpagenkodff5dda2020-08-28 11:52:01 +00001852
1853 //verify response
dbainbri4d3a0dc2020-12-02 00:33:42 +00001854 err := oFsm.waitforOmciResponse(ctx)
mpagenkodff5dda2020-08-28 11:52:01 +00001855 if err != nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +00001856 logger.Errorw(ctx, "Evtocd set untagged->singletagged rule failed, aborting VlanConfig FSM!",
mpagenko01e726e2020-10-23 09:45:29 +00001857 log.Fields{"device-id": oFsm.deviceID})
Himani Chawla4d908332020-08-31 12:30:20 +05301858 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvReset)
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001859 return fmt.Errorf("evtocd set untagged->singletagged rule failed %s, error %s", oFsm.deviceID, err)
1860
mpagenkodff5dda2020-08-28 11:52:01 +00001861 }
Holger Hildebrandt394c5522020-09-11 11:23:01 +00001862 } // just for local var's
mpagenkodff5dda2020-08-28 11:52:01 +00001863 { // just for local var's
1864 // this defines 'stacking' scenario: priotagged->singletagged
dbainbri4d3a0dc2020-12-02 00:33:42 +00001865 logger.Debugw(ctx, "UniVlanConfigFsm Tx Set::EVTOCD priotagged->singletagged rule", log.Fields{
mpagenko01e726e2020-10-23 09:45:29 +00001866 "device-id": oFsm.deviceID})
mpagenkodff5dda2020-08-28 11:52:01 +00001867 sliceEvtocdRule := make([]uint8, 16)
1868 // fill vlan tagging operation table bit fields using network=bigEndian order and using slice offset 0 as highest 'word'
1869 binary.BigEndian.PutUint32(sliceEvtocdRule[cFilterOuterOffset:],
1870 cPrioIgnoreTag<<cFilterPrioOffset| // Not an outer-tag rule
1871 cDoNotFilterVid<<cFilterVidOffset| // Do not filter on outer vid
1872 cDoNotFilterTPID<<cFilterTpidOffset) // Do not filter on outer TPID field
1873
1874 binary.BigEndian.PutUint32(sliceEvtocdRule[cFilterInnerOffset:],
1875 cPrioDoNotFilter<<cFilterPrioOffset| // Do not Filter on innerprio
1876 0<<cFilterVidOffset| // filter on inner vid 0 (prioTagged)
1877 cDoNotFilterTPID<<cFilterTpidOffset| // Do not filter on inner TPID field
1878 cDoNotFilterEtherType<<cFilterEtherTypeOffset) // Do not filter of EtherType
1879
1880 binary.BigEndian.PutUint32(sliceEvtocdRule[cTreatOuterOffset:],
1881 1<<cTreatTTROffset| // pop the prio-tag
1882 cDoNotAddPrio<<cTreatPrioOffset| // do not add outer tag
1883 cDontCareVid<<cTreatVidOffset| // Outer VID don't care
1884 cDontCareTpid<<cTreatTpidOffset) // Outer TPID field don't care
1885
mpagenko551a4d42020-12-08 18:09:20 +00001886 oFsm.mutexFlowParams.RLock()
mpagenkodff5dda2020-08-28 11:52:01 +00001887 binary.BigEndian.PutUint32(sliceEvtocdRule[cTreatInnerOffset:],
1888 cCopyPrioFromInner<<cTreatPrioOffset| // vlan copy from PrioTag
1889 // (as done in Py code, maybe better option would be setPcp here, which still could be PrioCopy?)
mpagenko9a304ea2020-12-16 15:54:01 +00001890 oFsm.actualUniVlanConfigRule.SetVid<<cTreatVidOffset| // Outer VID as configured
mpagenkodff5dda2020-08-28 11:52:01 +00001891 cSetOutputTpidCopyDei<<cTreatTpidOffset) // Set TPID = 0x8100
mpagenko551a4d42020-12-08 18:09:20 +00001892 oFsm.mutexFlowParams.RUnlock()
mpagenkodff5dda2020-08-28 11:52:01 +00001893
1894 meParams := me.ParamData{
1895 EntityID: oFsm.evtocdID,
1896 Attributes: me.AttributeValueMap{
1897 "ReceivedFrameVlanTaggingOperationTable": sliceEvtocdRule,
1898 },
1899 }
Girish Gowdra0b235842021-03-09 13:06:46 -08001900 meInstance := oFsm.pOmciCC.sendSetEvtocdVar(log.WithSpanFromContext(context.TODO(), ctx), oFsm.pDeviceHandler.pOpenOnuAc.omciTimeout, true,
mpagenkodff5dda2020-08-28 11:52:01 +00001901 oFsm.pAdaptFsm.commChan, meParams)
1902 //accept also nil as (error) return value for writing to LastTx
1903 // - this avoids misinterpretation of new received OMCI messages
mpagenko01e726e2020-10-23 09:45:29 +00001904 oFsm.pLastTxMeInstance = meInstance
mpagenkodff5dda2020-08-28 11:52:01 +00001905
1906 //verify response
dbainbri4d3a0dc2020-12-02 00:33:42 +00001907 err := oFsm.waitforOmciResponse(ctx)
mpagenkodff5dda2020-08-28 11:52:01 +00001908 if err != nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +00001909 logger.Errorw(ctx, "Evtocd set priotagged->singletagged rule failed, aborting VlanConfig FSM!",
mpagenko01e726e2020-10-23 09:45:29 +00001910 log.Fields{"device-id": oFsm.deviceID})
Himani Chawla4d908332020-08-31 12:30:20 +05301911 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvReset)
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001912 return fmt.Errorf("evtocd set priotagged->singletagged rule failed %s, error %s", oFsm.deviceID, err)
1913
mpagenkodff5dda2020-08-28 11:52:01 +00001914 }
1915 } //just for local var's
1916 }
1917 }
1918
mpagenkofc4f56e2020-11-04 17:17:49 +00001919 // if Config has been done for all EVTOCD entries let the FSM proceed
dbainbri4d3a0dc2020-12-02 00:33:42 +00001920 logger.Debugw(ctx, "EVTOCD set loop finished", log.Fields{"device-id": oFsm.deviceID})
mpagenko01e726e2020-10-23 09:45:29 +00001921 oFsm.configuredUniFlow++ // one (more) flow configured
ozgecanetsiab5000ef2020-11-27 14:38:20 +03001922 return nil
mpagenkodff5dda2020-08-28 11:52:01 +00001923}
1924
dbainbri4d3a0dc2020-12-02 00:33:42 +00001925func (oFsm *UniVlanConfigFsm) removeEvtocdEntries(ctx context.Context, aRuleParams uniVlanRuleParams) {
mpagenko01e726e2020-10-23 09:45:29 +00001926 // configured Input/Output TPID is not modified again - no influence if no filter is applied
1927 if aRuleParams.SetVid == uint32(of.OfpVlanId_OFPVID_PRESENT) {
1928 //transparent transmission was set
1929 //perhaps the config is not needed for removal,
1930 // but the specific InnerTpid setting is removed in favor of the real default forwarding rule
dbainbri4d3a0dc2020-12-02 00:33:42 +00001931 logger.Debugw(ctx, "UniVlanConfigFsm Tx Set::EVTOCD reset to default single tagged rule", log.Fields{
mpagenko01e726e2020-10-23 09:45:29 +00001932 "device-id": oFsm.deviceID})
1933 sliceEvtocdRule := make([]uint8, 16)
1934 // fill vlan tagging operation table bit fields using network=bigEndian order and using slice offset 0 as highest 'word'
1935 binary.BigEndian.PutUint32(sliceEvtocdRule[cFilterOuterOffset:],
1936 cPrioIgnoreTag<<cFilterPrioOffset| // Not an outer-tag rule
1937 cDoNotFilterVid<<cFilterVidOffset| // Do not filter on outer vid
1938 cDoNotFilterTPID<<cFilterTpidOffset) // Do not filter on outer TPID field
1939
1940 binary.BigEndian.PutUint32(sliceEvtocdRule[cFilterInnerOffset:],
1941 cPrioDefaultFilter<<cFilterPrioOffset| // default inner-tag rule
1942 cDoNotFilterVid<<cFilterVidOffset| // Do not filter on inner vid
1943 cDoNotFilterTPID<<cFilterTpidOffset| // Do not filter on inner TPID field
1944 cDoNotFilterEtherType<<cFilterEtherTypeOffset) // Do not filter of EtherType
1945
1946 binary.BigEndian.PutUint32(sliceEvtocdRule[cTreatOuterOffset:],
1947 0<<cTreatTTROffset| // Do not pop any tags
1948 cDoNotAddPrio<<cTreatPrioOffset| // do not add outer tag
1949 cDontCareVid<<cTreatVidOffset| // Outer VID don't care
1950 cDontCareTpid<<cTreatTpidOffset) // Outer TPID field don't care
1951
1952 binary.BigEndian.PutUint32(sliceEvtocdRule[cTreatInnerOffset:],
1953 cDoNotAddPrio<<cTreatPrioOffset| // do not add inner tag
1954 cDontCareVid<<cTreatVidOffset| // Outer VID don't care
1955 cDontCareTpid<<cTreatTpidOffset) // copy TPID and DEI
1956
1957 meParams := me.ParamData{
1958 EntityID: oFsm.evtocdID,
1959 Attributes: me.AttributeValueMap{
1960 "ReceivedFrameVlanTaggingOperationTable": sliceEvtocdRule,
1961 },
1962 }
Girish Gowdra0b235842021-03-09 13:06:46 -08001963 meInstance := oFsm.pOmciCC.sendSetEvtocdVar(log.WithSpanFromContext(context.TODO(), ctx), oFsm.pDeviceHandler.pOpenOnuAc.omciTimeout, true,
mpagenko01e726e2020-10-23 09:45:29 +00001964 oFsm.pAdaptFsm.commChan, meParams)
1965 //accept also nil as (error) return value for writing to LastTx
1966 // - this avoids misinterpretation of new received OMCI messages
1967 oFsm.pLastTxMeInstance = meInstance
1968
1969 //verify response
dbainbri4d3a0dc2020-12-02 00:33:42 +00001970 err := oFsm.waitforOmciResponse(ctx)
mpagenko01e726e2020-10-23 09:45:29 +00001971 if err != nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +00001972 logger.Errorw(ctx, "Evtocd reset singletagged rule failed, aborting VlanConfig FSM!",
mpagenko01e726e2020-10-23 09:45:29 +00001973 log.Fields{"device-id": oFsm.deviceID})
1974 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvReset)
1975 return
1976 }
1977 } else {
1978 // according to py-code acceptIncrementalEvto program option decides upon stacking or translation scenario
1979 if oFsm.acceptIncrementalEvtoOption {
1980 // this defines VID translation scenario: singletagged->singletagged (if not transparent)
dbainbri4d3a0dc2020-12-02 00:33:42 +00001981 logger.Debugw(ctx, "UniVlanConfigFsm Tx Set::EVTOCD clear single tagged translation rule", log.Fields{
mpagenko01e726e2020-10-23 09:45:29 +00001982 "device-id": oFsm.deviceID, "match-vlan": aRuleParams.MatchVid})
1983 sliceEvtocdRule := make([]uint8, 16)
1984 // fill vlan tagging operation table bit fields using network=bigEndian order and using slice offset 0 as highest 'word'
1985 binary.BigEndian.PutUint32(sliceEvtocdRule[cFilterOuterOffset:],
1986 cPrioIgnoreTag<<cFilterPrioOffset| // Not an outer-tag rule
1987 cDoNotFilterVid<<cFilterVidOffset| // Do not filter on outer vid
1988 cDoNotFilterTPID<<cFilterTpidOffset) // Do not filter on outer TPID field
1989
1990 binary.BigEndian.PutUint32(sliceEvtocdRule[cFilterInnerOffset:],
1991 aRuleParams.MatchPcp<<cFilterPrioOffset| // either DNFonPrio or ignore tag (default) on innerVLAN
1992 aRuleParams.MatchVid<<cFilterVidOffset| // either DNFonVid or real filter VID
1993 cDoNotFilterTPID<<cFilterTpidOffset| // Do not filter on inner TPID field
1994 cDoNotFilterEtherType<<cFilterEtherTypeOffset) // Do not filter of EtherType
1995
1996 // delete indication for the indicated Filter
1997 binary.BigEndian.PutUint32(sliceEvtocdRule[cTreatOuterOffset:], 0xFFFFFFFF)
1998 binary.BigEndian.PutUint32(sliceEvtocdRule[cTreatInnerOffset:], 0xFFFFFFFF)
1999
2000 meParams := me.ParamData{
2001 EntityID: oFsm.evtocdID,
2002 Attributes: me.AttributeValueMap{
2003 "ReceivedFrameVlanTaggingOperationTable": sliceEvtocdRule,
2004 },
2005 }
Girish Gowdra0b235842021-03-09 13:06:46 -08002006 meInstance := oFsm.pOmciCC.sendSetEvtocdVar(log.WithSpanFromContext(context.TODO(), ctx), oFsm.pDeviceHandler.pOpenOnuAc.omciTimeout, true,
mpagenko01e726e2020-10-23 09:45:29 +00002007 oFsm.pAdaptFsm.commChan, meParams)
2008 //accept also nil as (error) return value for writing to LastTx
2009 // - this avoids misinterpretation of new received OMCI messages
2010 oFsm.pLastTxMeInstance = meInstance
2011
2012 //verify response
dbainbri4d3a0dc2020-12-02 00:33:42 +00002013 err := oFsm.waitforOmciResponse(ctx)
mpagenko01e726e2020-10-23 09:45:29 +00002014 if err != nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +00002015 logger.Errorw(ctx, "Evtocd clear singletagged translation rule failed, aborting VlanConfig FSM!",
mpagenko01e726e2020-10-23 09:45:29 +00002016 log.Fields{"device-id": oFsm.deviceID, "match-vlan": aRuleParams.MatchVid})
2017 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvReset)
2018 return
2019 }
2020 } else {
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002021 // VOL-3685
2022 // NOTE: With ALPHA ONUs it was seen that just resetting a particular entry in the EVTOCD table
2023 // and re-configuring a new entry would not work. The old entry is removed and new entry is created
2024 // indeed, but the traffic landing upstream would carry old vlan sometimes.
2025 // This is only a WORKAROUND which basically deletes the entire EVTOCD ME and re-creates it again
2026 // later when the flow is being re-installed.
2027 // Of course this is applicable to case only where single service (or single tcont) is in use and
2028 // there is only one service vlan (oFsm.acceptIncrementalEvtoOption is false in this case).
2029 // Interstingly this problem has not been observed in multi-tcont (or multi-service) scenario (in
2030 // which case the oFsm.acceptIncrementalEvtoOption is set to true).
2031 if oFsm.configuredUniFlow == 0 && !oFsm.acceptIncrementalEvtoOption {
dbainbri4d3a0dc2020-12-02 00:33:42 +00002032 logger.Debugw(ctx, "UniVlanConfigFsm Tx Remove::EVTOCD", log.Fields{"device-id": oFsm.deviceID})
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002033 // When there are no more EVTOCD vlan configurations on the ONU and acceptIncrementalEvtoOption
2034 // is not enabled, delete the EVTOCD ME.
mpagenko01e726e2020-10-23 09:45:29 +00002035 meParams := me.ParamData{
2036 EntityID: oFsm.evtocdID,
mpagenko01e726e2020-10-23 09:45:29 +00002037 }
Girish Gowdra0b235842021-03-09 13:06:46 -08002038 meInstance := oFsm.pOmciCC.sendDeleteEvtocd(log.WithSpanFromContext(context.TODO(), ctx), oFsm.pDeviceHandler.pOpenOnuAc.omciTimeout, true,
mpagenko01e726e2020-10-23 09:45:29 +00002039 oFsm.pAdaptFsm.commChan, meParams)
2040 //accept also nil as (error) return value for writing to LastTx
2041 // - this avoids misinterpretation of new received OMCI messages
2042 oFsm.pLastTxMeInstance = meInstance
2043
2044 //verify response
dbainbri4d3a0dc2020-12-02 00:33:42 +00002045 err := oFsm.waitforOmciResponse(ctx)
mpagenko01e726e2020-10-23 09:45:29 +00002046 if err != nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +00002047 logger.Errorw(ctx, "Evtocd delete rule failed, aborting VlanConfig FSM!",
mpagenko01e726e2020-10-23 09:45:29 +00002048 log.Fields{"device-id": oFsm.deviceID})
2049 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvReset)
2050 return
2051 }
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002052 } else {
2053 // NOTE : We should ideally never ether this section when oFsm.acceptIncrementalEvtoOption is set to false
2054 // This is true for only ATT/DT workflow
dbainbri4d3a0dc2020-12-02 00:33:42 +00002055 logger.Debugw(ctx, "UniVlanConfigFsm: Remove EVTOCD set operation",
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002056 log.Fields{"configured-flow": oFsm.configuredUniFlow, "incremental-evto": oFsm.acceptIncrementalEvtoOption})
2057 //not transparent and not acceptIncrementalEvtoOption: untagged/priotagged->singletagged
2058 { // just for local var's
2059 // this defines stacking scenario: untagged->singletagged
2060 //TODO!! in theory there could be different rules running in setting different PCP/VID'S
2061 // for untagged/priotagged, last rule wins (and remains the only one), maybe that should be
2062 // checked already at flow-add (and rejected) - to be observed if such is possible in Voltha
2063 // delete now assumes there is only one such rule!
dbainbri4d3a0dc2020-12-02 00:33:42 +00002064 logger.Debugw(ctx, "UniVlanConfigFsm Tx Set::EVTOCD reset untagged rule to default", log.Fields{
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002065 "device-id": oFsm.deviceID})
2066 sliceEvtocdRule := make([]uint8, 16)
2067 // fill vlan tagging operation table bit fields using network=bigEndian order and using slice offset 0 as highest 'word'
2068 binary.BigEndian.PutUint32(sliceEvtocdRule[cFilterOuterOffset:],
2069 cPrioIgnoreTag<<cFilterPrioOffset| // Not an outer-tag rule
2070 cDoNotFilterVid<<cFilterVidOffset| // Do not filter on outer vid
2071 cDoNotFilterTPID<<cFilterTpidOffset) // Do not filter on outer TPID field
mpagenko01e726e2020-10-23 09:45:29 +00002072
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002073 binary.BigEndian.PutUint32(sliceEvtocdRule[cFilterInnerOffset:],
2074 cPrioIgnoreTag<<cFilterPrioOffset| // Not an inner-tag rule
2075 cDoNotFilterVid<<cFilterVidOffset| // Do not filter on inner vid
2076 cDoNotFilterTPID<<cFilterTpidOffset| // Do not filter on inner TPID field
2077 cDoNotFilterEtherType<<cFilterEtherTypeOffset) // Do not filter of EtherType
mpagenko01e726e2020-10-23 09:45:29 +00002078
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002079 binary.BigEndian.PutUint32(sliceEvtocdRule[cTreatOuterOffset:],
2080 0<<cTreatTTROffset| // Do not pop any tags
2081 cDoNotAddPrio<<cTreatPrioOffset| // do not add outer tag
2082 cDontCareVid<<cTreatVidOffset| // Outer VID don't care
2083 cDontCareTpid<<cTreatTpidOffset) // Outer TPID field don't care
mpagenko01e726e2020-10-23 09:45:29 +00002084
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002085 binary.BigEndian.PutUint32(sliceEvtocdRule[cTreatInnerOffset:],
2086 cDoNotAddPrio<<cTreatPrioOffset| // do not add inner tag
2087 cDontCareVid<<cTreatVidOffset| // Outer VID don't care
2088 cDontCareTpid<<cTreatTpidOffset) // copy TPID and DEI
mpagenko01e726e2020-10-23 09:45:29 +00002089
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002090 meParams := me.ParamData{
2091 EntityID: oFsm.evtocdID,
2092 Attributes: me.AttributeValueMap{
2093 "ReceivedFrameVlanTaggingOperationTable": sliceEvtocdRule,
2094 },
2095 }
Girish Gowdra0b235842021-03-09 13:06:46 -08002096 meInstance := oFsm.pOmciCC.sendSetEvtocdVar(context.TODO(), oFsm.pDeviceHandler.pOpenOnuAc.omciTimeout, true,
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002097 oFsm.pAdaptFsm.commChan, meParams)
2098 //accept also nil as (error) return value for writing to LastTx
2099 // - this avoids misinterpretation of new received OMCI messages
2100 oFsm.pLastTxMeInstance = meInstance
2101
2102 //verify response
dbainbri4d3a0dc2020-12-02 00:33:42 +00002103 err := oFsm.waitforOmciResponse(ctx)
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002104 if err != nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +00002105 logger.Errorw(ctx, "Evtocd reset untagged rule to default failed, aborting VlanConfig FSM!",
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002106 log.Fields{"device-id": oFsm.deviceID})
2107 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvReset)
2108 return
2109 }
2110 } // just for local var's
2111 { // just for local var's
2112 // this defines 'stacking' scenario: priotagged->singletagged
dbainbri4d3a0dc2020-12-02 00:33:42 +00002113 logger.Debugw(ctx, "UniVlanConfigFsm Tx Set::EVTOCD delete priotagged rule", log.Fields{
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002114 "device-id": oFsm.deviceID})
2115 sliceEvtocdRule := make([]uint8, 16)
2116 // fill vlan tagging operation table bit fields using network=bigEndian order and using slice offset 0 as highest 'word'
2117 binary.BigEndian.PutUint32(sliceEvtocdRule[cFilterOuterOffset:],
2118 cPrioIgnoreTag<<cFilterPrioOffset| // Not an outer-tag rule
2119 cDoNotFilterVid<<cFilterVidOffset| // Do not filter on outer vid
2120 cDoNotFilterTPID<<cFilterTpidOffset) // Do not filter on outer TPID field
2121
2122 binary.BigEndian.PutUint32(sliceEvtocdRule[cFilterInnerOffset:],
2123 cPrioDoNotFilter<<cFilterPrioOffset| // Do not Filter on innerprio
2124 0<<cFilterVidOffset| // filter on inner vid 0 (prioTagged)
2125 cDoNotFilterTPID<<cFilterTpidOffset| // Do not filter on inner TPID field
2126 cDoNotFilterEtherType<<cFilterEtherTypeOffset) // Do not filter of EtherType
2127
2128 // delete indication for the indicated Filter
2129 binary.BigEndian.PutUint32(sliceEvtocdRule[cTreatOuterOffset:], 0xFFFFFFFF)
2130 binary.BigEndian.PutUint32(sliceEvtocdRule[cTreatInnerOffset:], 0xFFFFFFFF)
2131
2132 meParams := me.ParamData{
2133 EntityID: oFsm.evtocdID,
2134 Attributes: me.AttributeValueMap{
2135 "ReceivedFrameVlanTaggingOperationTable": sliceEvtocdRule,
2136 },
2137 }
Girish Gowdra0b235842021-03-09 13:06:46 -08002138 meInstance := oFsm.pOmciCC.sendSetEvtocdVar(log.WithSpanFromContext(context.TODO(), ctx), oFsm.pDeviceHandler.pOpenOnuAc.omciTimeout, true,
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002139 oFsm.pAdaptFsm.commChan, meParams)
2140 //accept also nil as (error) return value for writing to LastTx
2141 // - this avoids misinterpretation of new received OMCI messages
2142 oFsm.pLastTxMeInstance = meInstance
2143
2144 //verify response
dbainbri4d3a0dc2020-12-02 00:33:42 +00002145 err := oFsm.waitforOmciResponse(ctx)
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002146 if err != nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +00002147 logger.Errorw(ctx, "Evtocd delete priotagged rule failed, aborting VlanConfig FSM!",
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002148 log.Fields{"device-id": oFsm.deviceID})
2149 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvReset)
2150 return
2151 }
mpagenko01e726e2020-10-23 09:45:29 +00002152 }
2153 } //just for local var's
2154 }
2155 }
2156
mpagenkofc4f56e2020-11-04 17:17:49 +00002157 // if Config has been done for all EVTOCD entries let the FSM proceed
dbainbri4d3a0dc2020-12-02 00:33:42 +00002158 logger.Debugw(ctx, "EVTOCD filter remove loop finished", log.Fields{"device-id": oFsm.deviceID})
Girish Gowdra26a40922021-01-29 17:14:34 -08002159 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvRemFlowDone, aRuleParams.TpID)
mpagenko01e726e2020-10-23 09:45:29 +00002160}
2161
dbainbri4d3a0dc2020-12-02 00:33:42 +00002162func (oFsm *UniVlanConfigFsm) waitforOmciResponse(ctx context.Context) error {
mpagenko7d6bb022021-03-11 15:07:55 +00002163 oFsm.mutexIsAwaitingResponse.Lock()
mpagenkocf48e452021-04-23 09:23:00 +00002164 if oFsm.isCanceled {
2165 // FSM already canceled before entering wait
2166 logger.Debugw(ctx, "UniVlanConfigFsm wait-for-multi-entity-response aborted (on enter)", log.Fields{"for device-id": oFsm.deviceID})
2167 oFsm.mutexIsAwaitingResponse.Unlock()
2168 return fmt.Errorf(cErrWaitAborted)
2169 }
mpagenko7d6bb022021-03-11 15:07:55 +00002170 oFsm.isAwaitingResponse = true
2171 oFsm.mutexIsAwaitingResponse.Unlock()
mpagenkodff5dda2020-08-28 11:52:01 +00002172 select {
Himani Chawla26e555c2020-08-31 12:30:20 +05302173 // maybe be also some outside cancel (but no context modeled for the moment ...)
mpagenkodff5dda2020-08-28 11:52:01 +00002174 // case <-ctx.Done():
dbainbri4d3a0dc2020-12-02 00:33:42 +00002175 // logger.Infow(ctx,"LockState-bridge-init message reception canceled", log.Fields{"for device-id": oFsm.deviceID})
mpagenkodff5dda2020-08-28 11:52:01 +00002176 case <-time.After(30 * time.Second): //AS FOR THE OTHER OMCI FSM's
dbainbri4d3a0dc2020-12-02 00:33:42 +00002177 logger.Warnw(ctx, "UniVlanConfigFsm multi entity timeout", log.Fields{"for device-id": oFsm.deviceID})
mpagenko7d6bb022021-03-11 15:07:55 +00002178 oFsm.mutexIsAwaitingResponse.Lock()
2179 oFsm.isAwaitingResponse = false
2180 oFsm.mutexIsAwaitingResponse.Unlock()
mpagenko01e726e2020-10-23 09:45:29 +00002181 return fmt.Errorf("uniVlanConfigFsm multi entity timeout %s", oFsm.deviceID)
mpagenkodff5dda2020-08-28 11:52:01 +00002182 case success := <-oFsm.omciMIdsResponseReceived:
Himani Chawla4d908332020-08-31 12:30:20 +05302183 if success {
mpagenkocf48e452021-04-23 09:23:00 +00002184 logger.Debugw(ctx, "UniVlanConfigFsm multi entity response received", log.Fields{"for device-id": oFsm.deviceID})
mpagenko7d6bb022021-03-11 15:07:55 +00002185 oFsm.mutexIsAwaitingResponse.Lock()
2186 oFsm.isAwaitingResponse = false
2187 oFsm.mutexIsAwaitingResponse.Unlock()
mpagenkodff5dda2020-08-28 11:52:01 +00002188 return nil
2189 }
mpagenko7d6bb022021-03-11 15:07:55 +00002190 // waiting was aborted (probably on external request)
mpagenkocf48e452021-04-23 09:23:00 +00002191 logger.Debugw(ctx, "UniVlanConfigFsm wait-for-multi-entity-response aborted", log.Fields{"for device-id": oFsm.deviceID})
mpagenko7d6bb022021-03-11 15:07:55 +00002192 oFsm.mutexIsAwaitingResponse.Lock()
2193 oFsm.isAwaitingResponse = false
2194 oFsm.mutexIsAwaitingResponse.Unlock()
2195 return fmt.Errorf(cErrWaitAborted)
mpagenkodff5dda2020-08-28 11:52:01 +00002196 }
2197}
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002198
mpagenko551a4d42020-12-08 18:09:20 +00002199func (oFsm *UniVlanConfigFsm) performSettingMulticastME(ctx context.Context, tpID uint8, multicastGemPortID uint16, vlanID uint32) error {
dbainbri4d3a0dc2020-12-02 00:33:42 +00002200 logger.Debugw(ctx, "Setting Multicast MEs", log.Fields{"device-id": oFsm.deviceID, "tpID": tpID,
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002201 "multicastGemPortID": multicastGemPortID, "vlanID": vlanID})
dbainbri4d3a0dc2020-12-02 00:33:42 +00002202 errCreateMOP := oFsm.performCreatingMulticastOperationProfile(ctx)
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002203 if errCreateMOP != nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +00002204 logger.Errorw(ctx, "MulticastOperationProfile create failed, aborting AniConfig FSM!",
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002205 log.Fields{"device-id": oFsm.deviceID})
mpagenko9a304ea2020-12-16 15:54:01 +00002206 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvReset)
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002207 return fmt.Errorf("creatingMulticastSubscriberConfigInfo responseError %s, error %s", oFsm.deviceID, errCreateMOP)
2208 }
2209
dbainbri4d3a0dc2020-12-02 00:33:42 +00002210 errSettingMOP := oFsm.performSettingMulticastOperationProfile(ctx, multicastGemPortID, vlanID)
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002211 if errSettingMOP != nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +00002212 logger.Errorw(ctx, "MulticastOperationProfile setting failed, aborting AniConfig FSM!",
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002213 log.Fields{"device-id": oFsm.deviceID})
mpagenko9a304ea2020-12-16 15:54:01 +00002214 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvReset)
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002215 return fmt.Errorf("creatingMulticastSubscriberConfigInfo responseError %s, error %s", oFsm.deviceID, errSettingMOP)
2216 }
2217
dbainbri4d3a0dc2020-12-02 00:33:42 +00002218 errCreateMSCI := oFsm.performCreatingMulticastSubscriberConfigInfo(ctx)
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002219 if errCreateMSCI != nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +00002220 logger.Errorw(ctx, "MulticastOperationProfile setting failed, aborting AniConfig FSM!",
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002221 log.Fields{"device-id": oFsm.deviceID})
mpagenko9a304ea2020-12-16 15:54:01 +00002222 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvReset)
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002223 return fmt.Errorf("creatingMulticastSubscriberConfigInfo responseError %s, error %s", oFsm.deviceID, errCreateMSCI)
2224 }
2225
2226 meParams := me.ParamData{
2227 EntityID: macBridgeServiceProfileEID + uint16(oFsm.pOnuUniPort.macBpNo),
2228 Attributes: me.AttributeValueMap{
2229 "BridgeIdPointer": macBridgeServiceProfileEID + uint16(oFsm.pOnuUniPort.macBpNo),
2230 "PortNum": 0xf0, //fixed unique ANI side indication
2231 "TpType": 6, //MCGemIWTP
2232 "TpPointer": multicastGemPortID,
2233 },
2234 }
Girish Gowdra0b235842021-03-09 13:06:46 -08002235 meInstance := oFsm.pOmciCC.sendCreateMBPConfigDataVar(context.TODO(), oFsm.pDeviceHandler.pOpenOnuAc.omciTimeout, true,
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002236 oFsm.pAdaptFsm.commChan, meParams)
2237 //accept also nil as (error) return value for writing to LastTx
2238 // - this avoids misinterpretation of new received OMCI messages
2239 oFsm.pLastTxMeInstance = meInstance
dbainbri4d3a0dc2020-12-02 00:33:42 +00002240 err := oFsm.waitforOmciResponse(ctx)
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002241 if err != nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +00002242 logger.Errorw(ctx, "CreateMBPConfigData failed, aborting AniConfig FSM!",
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002243 log.Fields{"device-id": oFsm.deviceID, "MBPConfigDataID": macBridgeServiceProfileEID})
mpagenko9a304ea2020-12-16 15:54:01 +00002244 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvReset)
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002245 return fmt.Errorf("creatingMulticastSubscriberConfigInfo responseError %s, error %s", oFsm.deviceID, err)
2246 }
2247
2248 // ==> Start creating VTFD for mcast vlan
2249
2250 // This attribute uniquely identifies each instance of this managed entity. Through an identical ID,
2251 // this managed entity is implicitly linked to an instance of the MAC bridge port configuration data ME.
2252 mcastVtfdID := macBridgeServiceProfileEID + uint16(oFsm.pOnuUniPort.macBpNo)
2253
dbainbri4d3a0dc2020-12-02 00:33:42 +00002254 logger.Debugw(ctx, "UniVlanConfigFsm set VTFD for mcast", log.Fields{
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002255 "EntitytId": strconv.FormatInt(int64(mcastVtfdID), 16), "mcastVlanID": vlanID,
2256 "in state": oFsm.pAdaptFsm.pFsm.Current(), "device-id": oFsm.deviceID})
2257 vtfdFilterList := make([]uint16, cVtfdTableSize) //needed for parameter serialization
2258
2259 // FIXME: VOL-3685: Issues with resetting a table entry in EVTOCD ME
2260 // VTFD has to be created afresh with a new entity ID that has the same entity ID as the MBPCD ME for every
2261 // new vlan associated with a different TP.
2262 vtfdFilterList[0] = uint16(vlanID)
2263
2264 meParams = me.ParamData{
2265 EntityID: mcastVtfdID,
2266 Attributes: me.AttributeValueMap{
2267 "VlanFilterList": vtfdFilterList,
2268 "ForwardOperation": uint8(0x10), //VID investigation
2269 "NumberOfEntries": oFsm.numVlanFilterEntries,
2270 },
2271 }
Girish Gowdra0b235842021-03-09 13:06:46 -08002272 meInstance = oFsm.pOmciCC.sendCreateVtfdVar(context.TODO(), oFsm.pDeviceHandler.pOpenOnuAc.omciTimeout, true,
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002273 oFsm.pAdaptFsm.commChan, meParams)
2274 oFsm.pLastTxMeInstance = meInstance
dbainbri4d3a0dc2020-12-02 00:33:42 +00002275 err = oFsm.waitforOmciResponse(ctx)
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002276 if err != nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +00002277 logger.Errorw(ctx, "CreateMcastVlanFilterData failed, aborting AniConfig FSM!",
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002278 log.Fields{"device-id": oFsm.deviceID, "mcastVtfdID": mcastVtfdID})
mpagenko9a304ea2020-12-16 15:54:01 +00002279 _ = oFsm.pAdaptFsm.pFsm.Event(vlanEvReset)
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002280 return fmt.Errorf("createMcastVlanFilterData responseError %s, error %s", oFsm.deviceID, err)
2281 }
2282
2283 return nil
2284}
2285
dbainbri4d3a0dc2020-12-02 00:33:42 +00002286func (oFsm *UniVlanConfigFsm) performCreatingMulticastSubscriberConfigInfo(ctx context.Context) error {
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002287 instID, err := oFsm.pDeviceHandler.getUniPortMEEntityID(oFsm.pOnuUniPort.portNo)
2288 if err != nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +00002289 logger.Errorw(ctx, "error fetching uni port me instance",
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002290 log.Fields{"device-id": oFsm.deviceID, "portNo": oFsm.pOnuUniPort.portNo})
2291 return err
2292 }
ozgecanetsia5c88b762021-03-23 10:27:15 +03002293 instID += macBridgePortAniEID
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002294 meParams := me.ParamData{
2295 EntityID: instID,
2296 Attributes: me.AttributeValueMap{
2297 "MeType": 0,
2298 //Direct reference to the Operation profile
2299 //TODO ANI side used on UNI side, not the clearest option.
ozgecanetsia5c88b762021-03-23 10:27:15 +03002300 "MulticastOperationsProfilePointer": instID,
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002301 },
2302 }
Girish Gowdra0b235842021-03-09 13:06:46 -08002303 meInstance := oFsm.pOmciCC.sendCreateMulticastSubConfigInfoVar(context.TODO(), oFsm.pDeviceHandler.pOpenOnuAc.omciTimeout, true,
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002304 oFsm.pAdaptFsm.commChan, meParams)
2305 //accept also nil as (error) return value for writing to LastTx
2306 // - this avoids misinterpretation of new received OMCI messages
2307 oFsm.pLastTxMeInstance = meInstance
2308 //verify response
dbainbri4d3a0dc2020-12-02 00:33:42 +00002309 err = oFsm.waitforOmciResponse(ctx)
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002310 if err != nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +00002311 logger.Errorw(ctx, "CreateMulticastSubConfigInfo create failed, aborting AniConfig FSM!",
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002312 log.Fields{"device-id": oFsm.deviceID, "MulticastSubConfigInfo": instID})
2313 return fmt.Errorf("creatingMulticastSubscriberConfigInfo responseError %s", oFsm.deviceID)
2314 }
2315 return nil
2316}
2317
dbainbri4d3a0dc2020-12-02 00:33:42 +00002318func (oFsm *UniVlanConfigFsm) performCreatingMulticastOperationProfile(ctx context.Context) error {
ozgecanetsia5c88b762021-03-23 10:27:15 +03002319 instID, err := oFsm.pDeviceHandler.getUniPortMEEntityID(oFsm.pOnuUniPort.portNo)
2320 if err != nil {
2321 logger.Errorw(ctx, "error fetching uni port me instance",
2322 log.Fields{"device-id": oFsm.deviceID, "portNo": oFsm.pOnuUniPort.portNo})
2323 return err
2324 }
2325 instID += macBridgePortAniEID
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002326 meParams := me.ParamData{
2327 EntityID: instID,
2328 Attributes: me.AttributeValueMap{
2329 "IgmpVersion": 2,
2330 "IgmpFunction": 0,
2331 //0 means false
2332 "ImmediateLeave": 0,
2333 "Robustness": 2,
2334 "QuerierIp": 0,
2335 "QueryInterval": 125,
2336 "QuerierMaxResponseTime": 100,
2337 "LastMemberResponseTime": 10,
2338 //0 means false
2339 "UnauthorizedJoinBehaviour": 0,
2340 },
2341 }
Girish Gowdra0b235842021-03-09 13:06:46 -08002342 meInstance := oFsm.pOmciCC.sendCreateMulticastOperationProfileVar(context.TODO(), oFsm.pDeviceHandler.pOpenOnuAc.omciTimeout, true,
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002343 oFsm.pAdaptFsm.commChan, meParams)
2344 //accept also nil as (error) return value for writing to LastTx
2345 // - this avoids misinterpretation of new received OMCI messages
2346 oFsm.pLastTxMeInstance = meInstance
2347 //verify response
ozgecanetsia5c88b762021-03-23 10:27:15 +03002348 err = oFsm.waitforOmciResponse(ctx)
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002349 if err != nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +00002350 logger.Errorw(ctx, "CreateMulticastOperationProfile create failed, aborting AniConfig FSM!",
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002351 log.Fields{"device-id": oFsm.deviceID, "MulticastOperationProfileID": instID})
2352 return fmt.Errorf("createMulticastOperationProfile responseError %s", oFsm.deviceID)
2353 }
2354 return nil
2355}
2356
dbainbri4d3a0dc2020-12-02 00:33:42 +00002357func (oFsm *UniVlanConfigFsm) performSettingMulticastOperationProfile(ctx context.Context, multicastGemPortID uint16, vlanID uint32) error {
ozgecanetsia5c88b762021-03-23 10:27:15 +03002358 instID, err := oFsm.pDeviceHandler.getUniPortMEEntityID(oFsm.pOnuUniPort.portNo)
2359 if err != nil {
2360 logger.Errorw(ctx, "error fetching uni port me instance",
2361 log.Fields{"device-id": oFsm.deviceID, "portNo": oFsm.pOnuUniPort.portNo})
2362 return err
2363 }
2364 instID += macBridgePortAniEID
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002365 //TODO check that this is correct
2366 // Table control
2367 //setCtrl = 1
2368 //rowPartId = 0
2369 //test = 0
2370 //rowKey = 0
2371 tableCtrlStr := "0100000000000000"
2372 tableCtrl := AsByteSlice(tableCtrlStr)
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002373 dynamicAccessCL := make([]uint8, 24)
2374 copy(dynamicAccessCL, tableCtrl)
2375 //Multicast GemPortId
2376 binary.BigEndian.PutUint16(dynamicAccessCL[2:], multicastGemPortID)
2377 // python version waits for installation of flows, see line 723 onward of
2378 // brcm_openomci_onu_handler.py
2379 binary.BigEndian.PutUint16(dynamicAccessCL[4:], uint16(vlanID))
2380 //Source IP all to 0
2381 binary.BigEndian.PutUint32(dynamicAccessCL[6:], IPToInt32(net.IPv4(0, 0, 0, 0)))
2382 //TODO start and end are hardcoded, get from TP
2383 // Destination IP address start of range
2384 binary.BigEndian.PutUint32(dynamicAccessCL[10:], IPToInt32(net.IPv4(225, 0, 0, 0)))
2385 // Destination IP address end of range
2386 binary.BigEndian.PutUint32(dynamicAccessCL[14:], IPToInt32(net.IPv4(239, 255, 255, 255)))
2387 //imputed group bandwidth
2388 binary.BigEndian.PutUint16(dynamicAccessCL[18:], 0)
2389
2390 meParams := me.ParamData{
2391 EntityID: instID,
2392 Attributes: me.AttributeValueMap{
2393 "DynamicAccessControlListTable": dynamicAccessCL,
2394 },
2395 }
Girish Gowdra0b235842021-03-09 13:06:46 -08002396 meInstance := oFsm.pOmciCC.sendSetMulticastOperationProfileVar(context.TODO(), oFsm.pDeviceHandler.pOpenOnuAc.omciTimeout, true,
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002397 oFsm.pAdaptFsm.commChan, meParams)
2398 //accept also nil as (error) return value for writing to LastTx
2399 // - this avoids misinterpretation of new received OMCI messages
2400 oFsm.pLastTxMeInstance = meInstance
2401 //verify response
ozgecanetsia5c88b762021-03-23 10:27:15 +03002402 err = oFsm.waitforOmciResponse(ctx)
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002403 if err != nil {
dbainbri4d3a0dc2020-12-02 00:33:42 +00002404 logger.Errorw(ctx, "CreateMulticastOperationProfile create failed, aborting AniConfig FSM!",
ozgecanetsiab5000ef2020-11-27 14:38:20 +03002405 log.Fields{"device-id": oFsm.deviceID, "MulticastOperationProfileID": instID})
2406 return fmt.Errorf("createMulticastOperationProfile responseError %s", oFsm.deviceID)
2407 }
2408 return nil
2409}
Girish Gowdra26a40922021-01-29 17:14:34 -08002410
2411// IsFlowRemovePending returns true if there are pending flows to remove, else false.
mpagenkobb47bc22021-04-20 13:29:09 +00002412func (oFsm *UniVlanConfigFsm) IsFlowRemovePending(aFlowDeleteChannel chan<- bool) bool {
2413 oFsm.mutexFlowParams.Lock()
2414 defer oFsm.mutexFlowParams.Unlock()
2415 if len(oFsm.uniRemoveFlowsSlice) > 0 {
2416 //flow removal is still ongoing/pending
2417 oFsm.signalOnFlowDelete = true
2418 oFsm.flowDeleteChannel = aFlowDeleteChannel
2419 return true
2420 }
2421 return false
Girish Gowdra26a40922021-01-29 17:14:34 -08002422}