From patchwork Fri Jan 15 14:29:09 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mark Gray X-Patchwork-Id: 1427081 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=openvswitch.org (client-ip=140.211.166.136; helo=silver.osuosl.org; envelope-from=ovs-dev-bounces@openvswitch.org; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=redhat.com Authentication-Results: ozlabs.org; dkim=fail reason="signature verification failed" (1024-bit key; unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=hlpXu9uq; dkim-atps=neutral Received: from silver.osuosl.org (smtp3.osuosl.org [140.211.166.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4DHNq70LBNz9sVS for ; Sat, 16 Jan 2021 01:29:23 +1100 (AEDT) Received: from localhost (localhost [127.0.0.1]) by silver.osuosl.org (Postfix) with ESMTP id 8EF3B20518; Fri, 15 Jan 2021 14:29:20 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from silver.osuosl.org ([127.0.0.1]) by localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hANYxcjqt4nH; Fri, 15 Jan 2021 14:29:19 +0000 (UTC) Received: from lists.linuxfoundation.org (lf-lists.osuosl.org [140.211.9.56]) by silver.osuosl.org (Postfix) with ESMTP id 4ED952051D; Fri, 15 Jan 2021 14:29:19 +0000 (UTC) Received: from lf-lists.osuosl.org (localhost [127.0.0.1]) by lists.linuxfoundation.org (Postfix) with ESMTP id 1B60AC0893; Fri, 15 Jan 2021 14:29:19 +0000 (UTC) X-Original-To: dev@openvswitch.org Delivered-To: ovs-dev@lists.linuxfoundation.org Received: from silver.osuosl.org (smtp3.osuosl.org [140.211.166.136]) by lists.linuxfoundation.org (Postfix) with ESMTP id CADE9C013A for ; Fri, 15 Jan 2021 14:29:17 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by silver.osuosl.org (Postfix) with ESMTP id ABECE2051D for ; Fri, 15 Jan 2021 14:29:17 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from silver.osuosl.org ([127.0.0.1]) by localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kbendzrPMJac for ; Fri, 15 Jan 2021 14:29:17 +0000 (UTC) X-Greylist: domain auto-whitelisted by SQLgrey-1.7.6 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [216.205.24.124]) by silver.osuosl.org (Postfix) with ESMTPS id F401B20518 for ; Fri, 15 Jan 2021 14:29:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1610720956; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=CLJwPk5cUmF8pQxDU8Nt9N4ZSSYyeXu3jGo2gPHIGCw=; b=hlpXu9uqVsjp1rRiZwBluXKcDCpCPUDx82nz54VtNAC62nbFBOdJZXnjsIYYQ2NpGrKIxC 8eB8cq/WU55EzslaYn0Ru0t20Ro4Gk97p3aXRF9v1ZuGHmxNe8sJx9tPkisrKh3Mvi3saa v3qQk2IW6wd5CLjejcLM/mhpPb5hkBU= Received: from mail-wr1-f69.google.com (mail-wr1-f69.google.com [209.85.221.69]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-23-_I92T-c7NaCkNpHPr-o2Tg-1; Fri, 15 Jan 2021 09:29:14 -0500 X-MC-Unique: _I92T-c7NaCkNpHPr-o2Tg-1 Received: by mail-wr1-f69.google.com with SMTP id b8so4229461wrv.14 for ; Fri, 15 Jan 2021 06:29:13 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=CLJwPk5cUmF8pQxDU8Nt9N4ZSSYyeXu3jGo2gPHIGCw=; b=GkqcgWqzsnFmu9HMXQ8/9vOxp+ET3HO8HXmjs37pY/C3wNy7u3nR1+mmaC5462oV7k hdzq5BplJS+iTGyuD6EYvnfpM+BPBYyQaRqxRMffQLEWznENHIQ9o6YVi3/znmokwqnc peStJYftwJV7pZ0uT+iCL44kdtaPwLrtGvn0KpBlim3NNxRcOLHJelhJNgZA4hJLDmat CWldgLxZlB8gKh6kab+qViHLZGuKomE9fkuxvHbb4B6a9fa76u8c9kymQ2pd6IdQMbGq fXT/ASUKOo5AfCasq7uEedq7ellAHIJhgr59xxaJr9J5U1zHY7wCcznGTkXeAUCytUjE YTsg== X-Gm-Message-State: AOAM533C6paMemiy3OEzpvh8s6uhBZHsDW3XkXYPPepgeVlHpkXeujQg VXGiRLwhbyAop/1r3LgPZ9IL7rDV6NCag5qTYJGOMLvZkjIcA1lbJa3qZ9ap6xz/5/vP6cleBKn 8o1LlJYv7wSIJqYV9ZGCCHJt7t2Pz6BKpfi8YRZuFHGM+ZRhPsC/fg1ujpbtOyKYNsiWP X-Received: by 2002:adf:f6cc:: with SMTP id y12mr13452951wrp.35.1610720952554; Fri, 15 Jan 2021 06:29:12 -0800 (PST) X-Google-Smtp-Source: ABdhPJxcprUJLv8H36svUOH3Aot5RlSO9MEP2xdQFa3AY1smbSmkz1DSEzZsuZ85N/ZfHfwI+kXAAw== X-Received: by 2002:adf:f6cc:: with SMTP id y12mr13452931wrp.35.1610720952366; Fri, 15 Jan 2021 06:29:12 -0800 (PST) Received: from wsfd-netdev77.ntdv.lab.eng.bos.redhat.com (nat-pool-bos-t.redhat.com. [66.187.233.206]) by smtp.gmail.com with ESMTPSA id a12sm16582408wrh.71.2021.01.15.06.29.10 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 15 Jan 2021 06:29:11 -0800 (PST) From: Mark Gray To: dev@openvswitch.org Date: Fri, 15 Jan 2021 09:29:09 -0500 Message-Id: <20210115142909.2643080-1-mark.d.gray@redhat.com> X-Mailer: git-send-email 2.26.2 MIME-Version: 1.0 Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=mark.d.gray@redhat.com X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Subject: [ovs-dev] [PATCH] vswitchd.conf.db.5: Fix supported IPsec tunnels X-BeenThere: ovs-dev@openvswitch.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: ovs-dev-bounces@openvswitch.org Sender: "dev" 'ovs-monitor-ipsec' does not support 'ip6gre' tunnels. Fixes: 22c5eafb6efa ("ipsec: reintroduce IPsec support for tunneling") Signed-off-by: Mark Gray --- vswitchd/vswitch.xml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/vswitchd/vswitch.xml b/vswitchd/vswitch.xml index fee54b0fa058..28f89e4052b3 100644 --- a/vswitchd/vswitch.xml +++ b/vswitchd/vswitch.xml @@ -3049,8 +3049,8 @@

Setting any of these options enables IPsec support for a given - tunnel. gre, ip6gre, - geneve, vxlan and stt + tunnel. gre, geneve, + vxlan and stt interfaces support these options. See the IPsec section in the table for a description of each mode.