        # Copyright (C) 2011 Nippon Telegraph and Telephone Corporation.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#    http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
# implied.
# See the License for the specific language governing permissions and
# limitations under the License.

from ryu.base import app_manager
from ryu.controller import ofp_event
from ryu.controller.handler import CONFIG_DISPATCHER, MAIN_DISPATCHER
from ryu.controller.handler import set_ev_cls
from ryu.ofproto import ofproto_v1_3
from ryu.lib.packet import packet
from ryu.lib.packet import ethernet
from ryu.lib.packet import ether_types
import ryu.ofproto.ofproto_v1_3 as ofproto
import ryu.ofproto.ofproto_v1_3_parser as parser
import socket 
import threading
import json
import jsonpickle

class SimpleSwitch13(app_manager.RyuApp):
    OFP_VERSIONS = [ofproto_v1_3.OFP_VERSION]
    Data_Path = {}

    def __init__(self, *args, **kwargs):
          super(SimpleSwitch13, self).__init__(*args, **kwargs)
          self.mac_to_port = {}
          #self.Data_Path = {}

    @set_ev_cls(ofp_event.EventOFPSwitchFeatures, CONFIG_DISPATCHER)
    def switch_features_handler(self, ev):
          datapath = ev.msg.datapath
          ofproto = datapath.ofproto
          parser = datapath.ofproto_parser
          dpid = datapath.id
          self.Data_Path[dpid] = datapath
          self.logger.info("packet in %s %s ", dpid, self.Data_Path[dpid])

          # install table-miss flow entry
          #
          # We specify NO BUFFER to max_len of the output action due to
          # OVS bug. At this moment, if we specify a lesser number, e.g.,
          # 128, OVS will send Packet-In with invalid buffer_id and
          # truncated packet data. In that case, we cannot output packets
          # correctly.  The bug has been fixed in OVS v2.1.0.
          #match = parser.OFPMatch(in_port=1)
          match = parser.OFPMatch()
          if dpid == 256:
             #s_lebel= 100
             #match = parser.OFPMatch(in_port= 1)
             #actions = [parser.OFPActionSetField(mpls_label=102),parser.OFPActionOutput(3)]
             #actions = [parser.OFPActionOutput(3)]
             match = parser.OFPMatch(in_port= 1 )
             actions = [parser.OFPActionPushVlan(),parser.OFPActionSetField(vlan_vid=(100 | ofproto.OFPVID_PRESENT)),parser.OFPActionOutput(3)]
             self.add_flow(datapath, 1, match, actions)
             match = parser.OFPMatch(in_port= 2 )
             actions = [parser.OFPActionPushVlan(),parser.OFPActionSetField(vlan_vid=(101 | ofproto.OFPVID_PRESENT)),parser.OFPActionOutput(3)]
             self.add_flow(datapath, 1, match, actions)
          elif dpid == 257:
               match = parser.OFPMatch(in_port= 2)
               actions = [parser.OFPActionPushVlan(),parser.OFPActionSetField(vlan_vid=(102 | ofproto.OFPVID_PRESENT)),parser.OFPActionOutput(4)]
               self.add_flow(datapath, 1, match, actions)
               match = parser.OFPMatch(in_port= 3)
               actions = [parser.OFPActionPushVlan(),parser.OFPActionSetField(vlan_vid=(103 | ofproto.OFPVID_PRESENT)),parser.OFPActionOutput(4)]
               self.add_flow(datapath, 1, match, actions)
               match = parser.OFPMatch()
               actions = [parser.OFPActionOutput(4)]
               self.add_flow(datapath, 1, match, actions)
          elif dpid == 258:
               match = parser.OFPMatch(in_port= 2)
               actions = [parser.OFPActionPushVlan(),parser.OFPActionSetField(vlan_vid=(104 | ofproto.OFPVID_PRESENT)),parser.OFPActionOutput(4)]
               self.add_flow(datapath, 1, match, actions)
               match = parser.OFPMatch(in_port= 3)
               actions = [parser.OFPActionPushVlan(),parser.OFPActionSetField(vlan_vid=(105 | ofproto.OFPVID_PRESENT)),parser.OFPActionOutput(4)]
               self.add_flow(datapath, 1, match, actions)
               match = parser.OFPMatch()
               actions = [parser.OFPActionOutput(4)]
               self.add_flow(datapath, 1, match, actions)
               match = parser.OFPMatch(in_port= 4)
               actions = [parser.OFPActionOutput(ofproto.OFPP_CONTROLLER, ofproto.OFPCML_NO_BUFFER)]
               self.add_flow(datapath, 1, match, actions)
          else:     
               pass

    def get_datapath(self, dpid):
         return self.Data_Path[dpid]    

    def add_flow(self, datapath, priority, match, actions, buffer_id=None):
          ofproto = datapath.ofproto
          parser = datapath.ofproto_parser

          inst = [parser.OFPInstructionActions(ofproto.OFPIT_APPLY_ACTIONS,
                                             actions)]
          if buffer_id:
              mod = parser.OFPFlowMod(datapath=datapath, buffer_id=buffer_id,
                                    priority=priority, match=match,
                                    instructions=inst)
          else:
              mod = parser.OFPFlowMod(datapath=datapath, priority=priority,
                                    match=match, instructions=inst)
          datapath.send_msg(mod)

    @set_ev_cls(ofp_event.EventOFPPacketIn, MAIN_DISPATCHER)
    def _packet_in_handler(self, ev):
         # If you hit this you might want to increase
         # the "miss_send_length" of your switch
         if ev.msg.msg_len < ev.msg.total_len:
             self.logger.debug("packet truncated: only %s of %s bytes",
                              ev.msg.msg_len, ev.msg.total_len)
         msg = ev.msg
         datapath = msg.datapath
         ofproto = datapath.ofproto
         parser = datapath.ofproto_parser
         in_port = msg.match['in_port']

         pkt = packet.Packet(msg.data)
         eth = pkt.get_protocols(ethernet.ethernet)[0]

         if eth.ethertype == ether_types.ETH_TYPE_LLDP:
             # ignore lldp packet
             return
         dst = eth.dst
         src = eth.src

         dpid = datapath.id
         self.mac_to_port.setdefault(dpid, {})
         self.logger.info("packet in  %s %s %s %s", dpid, src, dst, in_port)

         # learn a mac address to avoid FLOOD next time.
         self.mac_to_port[dpid][src] = in_port
         
         if dst in self.mac_to_port[dpid]:
             out_port = self.mac_to_port[dpid][dst]
         else:
             out_port = ofproto.OFPP_FLOOD

         actions = [parser.OFPActionOutput(out_port)]

         # install a flow to avoid packet_in next time
         if out_port != ofproto.OFPP_FLOOD:
            match = parser.OFPMatch(in_port=in_port, eth_dst=dst, eth_src=src)
            # verify if we have a valid buffer_id, if yes avoid to send both
            # flow_mod & packet_out
            if msg.buffer_id != ofproto.OFP_NO_BUFFER:
                self.add_flow(datapath, 1, match, actions, msg.buffer_id)
                return
            else:
                self.add_flow(datapath, 1, match, actions)
         data = None
         if msg.buffer_id == ofproto.OFP_NO_BUFFER:
            data = msg.data

         out = parser.OFPPacketOut(datapath=datapath, buffer_id=msg.buffer_id,
                                  in_port=in_port, actions=actions, data=data)
         datapath.send_msg(out)
         
                                 # Start the executio
class ThreadingExample(SimpleSwitch13):
    """ Threading example class
    The run() method will be started and it will run in the background
    until the application exits.
    """

    def __init__(self):
        """ Constructor
        """
        thread = threading.Thread(target=self.foo, args=())
        thread.daemon = True                            # Daemonize thread
        thread.start()                                  # Start the execution
        self.mac_to_port = {}

    def foo(self):
            #s = socket.socket()         # Create a socket object
            s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
            host = socket.gethostname() # Get local machine name
            port = 12345                # Reserve a port for your service.
            s.bind((host, port))        # Bind to the port
            s.listen(1)                 # Now wait for client connection.
            while True:
                  c, addr = s.accept()     # Establish connection with client.
                  print 'Got connection from', addr
                  #rdata =json.loads(c.recv(2048))
                  rdata = jsonpickle.decode(c.recv(1024))
                  print 'data is', len(rdata)
                  if not rdata:
                      break
                  print 'the pakt is:', rdata
                  #c.send('Thank you for connecting')
                  c.close()
                  src = rdata[0]
                  dst = rdata[1]
                  #buffer_id = rdata[2]
                  #data = rdata[3]

                  in_port = 1
                  dpid = 256
                  datapath = self.get_datapath(256)
                  self.mac_to_port.setdefault(dpid, {})
                  #self.logger.info("packet in %s %s %s %s", dpid, src, dst, in_port)
                  #vlan_vid = rdata[4]
                  # learn a mac address to avoid FLOOD next time.
                  self.mac_to_port[dpid][src] = in_port
                  if dst in self.mac_to_port[dpid]:
                      out_port = self.mac_to_port[dpid][dst]
                  else:
                      out_port = ofproto.OFPP_FLOOD
                  match = parser.OFPMatch(in_port= 1, eth_src = '00:00:00:00:00:01' )
                  actions = [parser.OFPActionOutput(ofproto.OFPP_CONTROLLER,ofproto.OFPCML_NO_BUFFER)]
                  self.add_flow(datapath, 100, match, actions)
		         datapath = self.get_datapath(257)
		         match = parser.OFPMatch(in_port= 3, eth_src ='00:00:00:00:00:04'  )
                  actions = [parser.OFPActionOutput(ofproto.OFPP_CONTROLLER,ofproto.OFPCML_NO_BUFFER)]
                  self.add_flow(datapath, 100, match, actions)
                  #actions = [parser.OFPActionOutput(out_port)]
                  # install a flow to avoid packet_in next time
                  #if out_port != ofproto.OFPP_FLOOD:
                  #   match = parser.OFPMatch(in_port=in_port, eth_dst=dst, eth_src=src)
                      # verify if we have a valid buffer_id, if yes avoid to send both
                      # flow_mod & packet_out
                  #    if buffer_id != ofproto.OFP_NO_BUFFER:
                  #        self.add_flow(datapath, 1, match, actions, buffer_id)
                  #       return
                  #   else:
                  #       self.add_flow(datapath, 1, match, actions)
                  #data = None
                  #if buffer_id == ofproto.OFP_NO_BUFFER:
                  #    data = rdata[3]

                  #out = parser.OFPPacketOut(datapath=datapath, buffer_id=buffer_id,in_port=in_port, actions=actions, data=data)
                  #datapath.send_msg(out)
example = ThreadingExample()