Sending this series as RFC for a couple of reasons: 1. We assume support will be added to OVS to expose the availability of the all-zero-IP NAT feature in the datapath [0]. 2. A couple of OVS patches should be merged before this series is accepted to avoid self test failures due to crashes in ovs-vswitchd [1].
For testing, the following hacked OVS tree can be used; it includes Paolo's patches to support all-zero-IP NAT in the userspace datapath [2] and hardcodes the 'ct_all_zero_nat' capability to 'true' for all datapaths: https://github.com/dceara/ovs/tree/all-zero-snat-v2-with-fixes Additional note: the new OVN system test fails when using the userspace datpath tue to a bug in the OVS conntrack implementation, reported at [3]. [0] https://mail.openvswitch.org/pipermail/ovs-dev/2021-May/383322.html [1] https://patchwork.ozlabs.org/project/openvswitch/list/?series=245666&state=* [2] https://patchwork.ozlabs.org/project/openvswitch/list/?series=241223&state=* [3] https://mail.openvswitch.org/pipermail/ovs-dev/2021-May/383321.html Dumitru Ceara (2): ovn-controller: Detect OVS datapath capabilities. ovn-controller: Handle DNAT/no-NAT conntrack tuple collisions. controller/lflow.c | 1 controller/ovn-controller.c | 126 ++++++++++++++++++++++++++++++++--------- include/ovn/actions.h | 4 + include/ovn/features.h | 12 ++++ lib/actions.c | 18 ++++++ lib/automake.mk | 1 lib/features.c | 39 +++++++++++++ tests/ovn-controller.at | 10 ++- tests/ovn.at | 2 - tests/system-common-macros.at | 4 + tests/system-ovn.at | 70 +++++++++++++++++++++++ 11 files changed, 253 insertions(+), 34 deletions(-) create mode 100644 lib/features.c _______________________________________________ dev mailing list [email protected] https://mail.openvswitch.org/mailman/listinfo/ovs-dev
