Signed-off-by: Fabian Grünbichler
---
Makefile | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Makefile b/Makefile
index 5c42aed..ad2a695 100644
--- a/Makefile
+++ b/Makefile
@@ -79,4 +79,4 @@ distclean: clean
.PHONY: upload
upload: ${DEBS}
- tar -cf - ${DEBS} | ssh
suggesting the new -dbgsym packages without having a strict dependency
on a specific version of the library packages, like the old no longer
built zfs-dbg package had.
this commit can be reverted after the package has been uploaded once, or
kept for one release cycle if we might do the -dbgsym mig
On 21.07.21 10:12, Fabian Grünbichler wrote:
> Signed-off-by: Fabian Grünbichler
> ---
> Makefile | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
>
applied, with the followup of adding pbs here like you mentioned off-list,
thanks!
___
pve
On 21.07.21 10:12, Fabian Grünbichler wrote:
> suggesting the new -dbgsym packages without having a strict dependency
> on a specific version of the library packages, like the old no longer
> built zfs-dbg package had.
>
> this commit can be reverted after the package has been uploaded once, or
>
Dots are allow in PVE VM names, so they should not be dropped during import.
Signed-off-by: Dominic Jäger
---
PVE/QemuServer/OVF.pm | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/PVE/QemuServer/OVF.pm b/PVE/QemuServer/OVF.pm
index c76c199..0376cbf 100644
--- a/PVE/QemuServ
Signed-off-by: Fabian Grünbichler
---
README | 12
1 file changed, 12 insertions(+)
diff --git a/README b/README
index 042db01..6c426c0 100644
--- a/README
+++ b/README
@@ -98,6 +98,18 @@ which device is actually used for /dev/watchdog.
We ship this list in /lib/modprobe.d/blacklis
via a new, namespaced build profile.
Signed-off-by: Fabian Grünbichler
---
test-built with and without build-profile enabled, no content difference
in the other debs.
debian/control.in | 1 +
debian/rules | 6 +-
2 files changed, 6 insertions(+), 1 deletion(-)
diff --git a/debian/cont
this is the first step in which not the http server removes the
temporary file, but the worker itself. for now, this `unlink`
statement won't unlink anything existing. but after changes to
the http server have been made, the endpoint will be able to
clean up for itself afterwards.
Signed-off-by: L
the addition of this enum does not change API behaviour, because
it is checked for 'iso' or 'vztmpl' aftwerwards anyway.
Signed-off-by: Lorenz Stechauner
---
PVE/API2/Storage/Status.pm | 1 +
1 file changed, 1 insertion(+)
diff --git a/PVE/API2/Storage/Status.pm b/PVE/API2/Storage/Status.pm
ind
Signed-off-by: Lorenz Stechauner
---
PVE/API2/Storage/Status.pm | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/PVE/API2/Storage/Status.pm b/PVE/API2/Storage/Status.pm
index d16636b..1f44574 100644
--- a/PVE/API2/Storage/Status.pm
+++ b/PVE/API2/Storage/Status.pm
@@ -381,7 +
On 21.07.21 14:52, Lorenz Stechauner wrote:
> Signed-off-by: Lorenz Stechauner
> ---
> PVE/API2/Storage/Status.pm | 3 ++-
> 1 file changed, 2 insertions(+), 1 deletion(-)
>
>
applied, thanks!
___
pve-devel mailing list
pve-devel@lists.proxmox.com
h
On 21.07.21 14:51, Lorenz Stechauner wrote:
> the addition of this enum does not change API behaviour, because
> it is checked for 'iso' or 'vztmpl' aftwerwards anyway.
>
> Signed-off-by: Lorenz Stechauner
> ---
> PVE/API2/Storage/Status.pm | 1 +
> 1 file changed, 1 insertion(+)
>
>
applied,
On 21.07.21 14:52, Lorenz Stechauner wrote:
> this is the first step in which not the http server removes the
> temporary file, but the worker itself. for now, this `unlink`
> statement won't unlink anything existing. but after changes to
> the http server have been made, the endpoint will be able
This new parameter allows to set the RBD keyring or CephFS secret for an
external Ceph Cluster right when creating the storage.
Up until now, they had to be manually placed in
/etc/pve/priv/ceph/$file.
In order to reuse as much code as possible, I had to adjust the
PVE::CephConfig::ceph_create_key
By adding the keyring for RBD storage or the secret for CephFS ones, it
is possible to add an external Ceph cluster with only one API call.
Previously the keyring / secret file needed to be placed in
/etc/pve/priv/ceph/$storeID.{keyring,secret} manually.
Signed-off-by: Aaron Lauterer
---
PVE/AP
This allows us to manually pass the used RBD keyring or CephFS secret.
Useful mostly when adding external Ceph clusters where we have no other
means to fetch them.
I renamed the previous $secret to $cephfs_secret to be able to use
$secret as parameter.
Signed-off-by: Aaron Lauterer
---
PVE/Ceph
Changes the example given in section "3.3.5. Routed Configuration" so
that it's more in line with the accompanying network diagram.
Signed-off-by: Dylan Whyte
---
images/default-network-setup-routed.svg | 126 +---
images/default-network-setup-routed.tt | 2 +-
pve-network
17 matches
Mail list logo