Sending this series as RFC for a couple of reasons:

1. We assume support will be added to OVS to expose the availability of
   the all-zero-IP NAT feature in the datapath [0].
2. A couple of OVS patches should be merged before this series is
   accepted to avoid self test failures due to crashes in ovs-vswitchd
   [1].

For testing, the following hacked OVS tree can be used; it includes
Paolo's patches to support all-zero-IP NAT in the userspace datapath
[2] and hardcodes the 'ct_all_zero_nat' capability to 'true' for all
datapaths:
https://github.com/dceara/ovs/tree/all-zero-snat-v2-with-fixes

Additional note: the new OVN system test fails when using the userspace
datpath tue to a bug in the OVS conntrack implementation, reported
at [3].

[0] https://mail.openvswitch.org/pipermail/ovs-dev/2021-May/383322.html
[1] https://patchwork.ozlabs.org/project/openvswitch/list/?series=245666&state=*
[2] https://patchwork.ozlabs.org/project/openvswitch/list/?series=241223&state=*
[3] https://mail.openvswitch.org/pipermail/ovs-dev/2021-May/383321.html

Dumitru Ceara (2):
      ovn-controller: Detect OVS datapath capabilities.
      ovn-controller: Handle DNAT/no-NAT conntrack tuple collisions.


 controller/lflow.c            |    1 
 controller/ovn-controller.c   |  126 ++++++++++++++++++++++++++++++++---------
 include/ovn/actions.h         |    4 +
 include/ovn/features.h        |   12 ++++
 lib/actions.c                 |   18 ++++++
 lib/automake.mk               |    1 
 lib/features.c                |   39 +++++++++++++
 tests/ovn-controller.at       |   10 ++-
 tests/ovn.at                  |    2 -
 tests/system-common-macros.at |    4 +
 tests/system-ovn.at           |   70 +++++++++++++++++++++++
 11 files changed, 253 insertions(+), 34 deletions(-)
 create mode 100644 lib/features.c

_______________________________________________
dev mailing list
[email protected]
https://mail.openvswitch.org/mailman/listinfo/ovs-dev

Reply via email to