Re: [pve-devel] [PATCH qemu-server 1/2] use KillMode 'process' for systemd scope

2021-06-21 Thread Thomas Lamprecht
On 21.06.21 18:35, Stefan Reiter wrote: > KillMode 'none' is deprecated, and systemd loudly complains about that > in the journal. To avoid the warning, but keep the behaviour the same, > use KillMode 'process'. > > This mode does two things differently, which we have to stop it from > doing: > *

[pve-devel] applied: [PATCH common 2/2] systemd: allow SendSIGKILL and TimeoutStopUSec dbus properties

2021-06-21 Thread Thomas Lamprecht
On 21.06.21 18:35, Stefan Reiter wrote: > Used in qemu-server for avoiding KillMode 'none'. SendSIGKILL is a > boolean, so we need to use dbus_boolean to serialize it. > > Signed-off-by: Stefan Reiter > --- > src/PVE/Systemd.pm | 6 -- > 1 file changed, 4 insertions(+), 2 deletions(-) > >

[pve-devel] [PATCH 0/2] Work around systemd warning about KillMode 'none'

2021-06-21 Thread Stefan Reiter
systemd deprecated KillMode 'none', but we still need it, since we manage our VM scopes/slices manually via another service, 'pve-guests.service'. To this extent, replicate the previous behaviour without using the deprecated mode. Example log message: /run/systemd/transient/101.scope:3: Unit confi

[pve-devel] [PATCH qemu-server 1/2] use KillMode 'process' for systemd scope

2021-06-21 Thread Stefan Reiter
KillMode 'none' is deprecated, and systemd loudly complains about that in the journal. To avoid the warning, but keep the behaviour the same, use KillMode 'process'. This mode does two things differently, which we have to stop it from doing: * it sends SIGTERM right when the scope is cancelled (e.

[pve-devel] [PATCH common 2/2] systemd: allow SendSIGKILL and TimeoutStopUSec dbus properties

2021-06-21 Thread Stefan Reiter
Used in qemu-server for avoiding KillMode 'none'. SendSIGKILL is a boolean, so we need to use dbus_boolean to serialize it. Signed-off-by: Stefan Reiter --- src/PVE/Systemd.pm | 6 -- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/src/PVE/Systemd.pm b/src/PVE/Systemd.pm index

Re: [pve-devel] [PATCH v2 qemu-server 2/2] cfg2cmd: make io_uring default

2021-06-21 Thread Stefan Reiter
Note: This does not work when you have the 6.0 QEMU from the staging repo installed, as it is built without io_uring - this patch is banking on us only releasing a QEMU 6.0 to public with io_uring already baked in, i.e. equating QEMU 6.0 with io_uring support enabled. Adding a +pve version or simi

[pve-devel] [PATCH v2 qemu-server 2/2] cfg2cmd: make io_uring default

2021-06-21 Thread Stefan Reiter
The 'aio' setting is not visible to the guest, and so can be changed during migrations or snapshots without issue. It is thus only dependendent on the actual QEMU version being >= 6.0, not machine version. Signed-off-by: Stefan Reiter --- new in v2 tested migration from and to old, both worked

[pve-devel] [PATCH v2 qemu-server 1/2] enable io-uring support

2021-06-21 Thread Stefan Reiter
Note that the value in this enum directly represents the value passed to QEMU, so we need to use the underscore. Signed-off-by: Stefan Reiter --- same as v1, par the commit message PVE/QemuServer/Drive.pm | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/PVE/QemuServer/Drive.

[pve-devel] applied: [PATCH common 2/3] SysFSTools: change 'product' to 'device'

2021-06-21 Thread Thomas Lamprecht
On 21.06.21 15:55, Dominik Csapak wrote: > so it is more consistend with the source (it comes from the file > 'device') as well as the subsytem_device field > > the only place we use that field is in the same file in pci_dev_bind_to_vfio, > which we also change here, so that should not be a breaki

[pve-devel] applied: [PATCH common 1/3] SysFSTools: add verbose flag to pci_device_info

2021-06-21 Thread Thomas Lamprecht
On 21.06.21 15:55, Dominik Csapak wrote: > to also get the subsystem_vendor and device, as well as the > iommu group and mediated device support > > Signed-off-by: Dominik Csapak > --- > src/PVE/SysFSTools.pm | 29 + > 1 file changed, 25 insertions(+), 4 deletions(-)

[pve-devel] applied-series: [PATCH-SERIES v2 manager] stricter storage rules for migration

2021-06-21 Thread Thomas Lamprecht
On 21.06.21 16:31, Fabian Ebner wrote: > Changes from v1: > * dropped already applied patches > * rebased > * adapted/improved messages > > Fabian Ebner (2): > pve6to7: add check for guest images on misconfigured storages > pve6to7: check for misconfigured content type 'none' > >

[pve-devel] [PATCH v2 manager 1/2] pve6to7: add check for guest images on misconfigured storages

2021-06-21 Thread Fabian Ebner
migration and (container) startup will no longer work when the storage's content type is not correct, and unreferenced volumes on such storages will not be scanned for anymore. Signed-off-by: Fabian Ebner --- Changes from v1: * generalized warning and commit message, since (container) startu

[pve-devel] [PATCH v2 manager 2/2] pve6to7: check for misconfigured content type 'none'

2021-06-21 Thread Fabian Ebner
which will be a hard error (i.e. section will be skipped when parsing) in PVE 7.0 Signed-off-by: Fabian Ebner --- Changes from v1: * Also change message for passing the check to match with changed initial log line PVE/CLI/pve6to7.pm | 12 ++-- 1 file changed, 10 insertions(+)

[pve-devel] [PATCH-SERIES v2 manager] stricter storage rules for migration

2021-06-21 Thread Fabian Ebner
Changes from v1: * dropped already applied patches * rebased * adapted/improved messages Fabian Ebner (2): pve6to7: add check for guest images on misconfigured storages pve6to7: check for misconfigured content type 'none' PVE/CLI/pve6to7.pm | 50 ++

[pve-devel] [PATCH manager 6/8] ui: qemu/PCIEdit: rework panel to add a mapped configuration

2021-06-21 Thread Dominik Csapak
reworks the panel to use a controller, so that we can easily add the selector for mapped pci devices shows now a selection between 'raw' and 'mapped' devices, where 'raw' ones work like before, and 'mapped' ones take the values form the hardware map config Signed-off-by: Dominik Csapak --- www/

[pve-devel] [PATCH manager 1/8] PVE/API2/Hardware: add Mapping.pm

2021-06-21 Thread Dominik Csapak
adds the basic api calls to list/get/create/update/delete device mappings for now these api calls are only per node, so it only affects the node specific mapping (thought consistency checks are done for the whole config, e.g if an id exists already on another node with a different type) Signed-of

[pve-devel] [PATCH/RFC cluster/common/... many] add cluster-wide hardware device mapping

2021-06-21 Thread Dominik Csapak
this series aims to add a cluster-wide device mapping for (atm) pci and usb devices. so that an admin can configure a device to be availble for migration and configuring for uses that are non-root built-in are some additional safety checks in contrast to current passthrough, e.g. if pci addresses

[pve-devel] [PATCH common 3/3] add PVE/HardwareMap and Plugins

2021-06-21 Thread Dominik Csapak
adds the Top level package PVE::HardwareMap that registers the Plugins for the config, as well as provides some convenience methods (find_device_on_current_node, lock/write/get config) The Plugins themselves are usual SectionConfigs plugins with (for now) two types: usb, pci each type gets an 'as

[pve-devel] [PATCH manager 8/8] ui: window/Migrate: allow mapped devices

2021-06-21 Thread Dominik Csapak
if the migration is an offline migration and when the mapping on the target node exists, otherwise not this does not change the behaviour for 'raw' devices in the config those can still be forced to be migrated, like before Signed-off-by: Dominik Csapak --- www/manager6/window/Migrate.js | 37 +

[pve-devel] [PATCH manager 3/8] ui: form: add PCIMapSelector

2021-06-21 Thread Dominik Csapak
akin to the PCISelector, but uses the api for mapped devices Signed-off-by: Dominik Csapak --- www/manager6/Makefile | 1 + www/manager6/form/PCIMapSelector.js | 95 + 2 files changed, 96 insertions(+) create mode 100644 www/manager6/form/PCIMapSelecto

[pve-devel] [PATCH qemu-server 3/7] PVE/API2/Qemu: add permission checks for mapped usb devices

2021-06-21 Thread Dominik Csapak
Signed-off-by: Dominik Csapak --- PVE/API2/Qemu.pm | 39 --- 1 file changed, 36 insertions(+), 3 deletions(-) diff --git a/PVE/API2/Qemu.pm b/PVE/API2/Qemu.pm index eeb07d1..98d11bc 100644 --- a/PVE/API2/Qemu.pm +++ b/PVE/API2/Qemu.pm @@ -24,6 +24,7 @@ use PVE

[pve-devel] [PATCH manager 4/8] ui: form: add USBMapSelector

2021-06-21 Thread Dominik Csapak
similar to PCIMapSelector Signed-off-by: Dominik Csapak --- www/manager6/Makefile | 1 + www/manager6/form/USBMapSelector.js | 73 + 2 files changed, 74 insertions(+) create mode 100644 www/manager6/form/USBMapSelector.js diff --git a/www/manager6/Mak

[pve-devel] [PATCH qemu-server 6/7] PVE/API2/Qemu: migrate preconditions: use new check_local_resources info

2021-06-21 Thread Dominik Csapak
restrict the nodes also for mapped devices, and return them in their own property Signed-off-by: Dominik Csapak --- PVE/API2/Qemu.pm | 15 +++ 1 file changed, 11 insertions(+), 4 deletions(-) diff --git a/PVE/API2/Qemu.pm b/PVE/API2/Qemu.pm index 36b8c31..837185f 100644 --- a/PVE/AP

[pve-devel] [PATCH qemu-server 2/7] PVE/QemuServer: allow mapped pci deviced in config

2021-06-21 Thread Dominik Csapak
and get the correct pci device during parsing Signed-off-by: Dominik Csapak --- PVE/QemuServer/PCI.pm | 22 -- 1 file changed, 20 insertions(+), 2 deletions(-) diff --git a/PVE/QemuServer/PCI.pm b/PVE/QemuServer/PCI.pm index 2ee142f..26bad63 100644 --- a/PVE/QemuServer/PCI.p

[pve-devel] [PATCH qemu-server 1/7] PVE/QemuServer: allow mapped usb devices in config

2021-06-21 Thread Dominik Csapak
Signed-off-by: Dominik Csapak --- PVE/QemuServer.pm | 2 ++ PVE/QemuServer/USB.pm | 22 +- 2 files changed, 23 insertions(+), 1 deletion(-) diff --git a/PVE/QemuServer.pm b/PVE/QemuServer.pm index fe31741..5589bc7 100644 --- a/PVE/QemuServer.pm +++ b/PVE/QemuServer.pm @@

[pve-devel] [PATCH qemu-server 7/7] PVE/QemuMigrate: check for mapped resources on migration

2021-06-21 Thread Dominik Csapak
they can only be migrated to nodes where there exists a mapping, and if offline Signed-off-by: Dominik Csapak --- PVE/QemuMigrate.pm | 13 - 1 file changed, 12 insertions(+), 1 deletion(-) diff --git a/PVE/QemuMigrate.pm b/PVE/QemuMigrate.pm index 5f37890..6ae365d 100644 --- a/PVE/Q

[pve-devel] [PATCH manager 5/8] ui: node: add HardwareView and relevant edit windows

2021-06-21 Thread Dominik Csapak
adds a node specific listing of hardware maps, where the user can see if a mapping is wrong (wrong vendor/device etc) and add/edit/delete them Signed-off-by: Dominik Csapak --- www/manager6/Makefile | 1 + www/manager6/node/Config.js | 8 + www/manager6/node/HardwareView.js

[pve-devel] [PATCH manager 7/8] ui: qemu/USBEdit: add 'mapped' device case

2021-06-21 Thread Dominik Csapak
to be able to select 'mapped' usb devices Signed-off-by: Dominik Csapak --- www/manager6/qemu/USBEdit.js | 34 +- 1 file changed, 33 insertions(+), 1 deletion(-) diff --git a/www/manager6/qemu/USBEdit.js b/www/manager6/qemu/USBEdit.js index a2204584..82af78f9 100

[pve-devel] [PATCH qemu-server 4/7] PVE/API2/Qemu: add permission checks for mapped pci devices

2021-06-21 Thread Dominik Csapak
Signed-off-by: Dominik Csapak --- PVE/API2/Qemu.pm | 54 ++-- 1 file changed, 52 insertions(+), 2 deletions(-) diff --git a/PVE/API2/Qemu.pm b/PVE/API2/Qemu.pm index 98d11bc..36b8c31 100644 --- a/PVE/API2/Qemu.pm +++ b/PVE/API2/Qemu.pm @@ -24,6 +24,7 @

[pve-devel] [PATCH manager 2/8] ui: form/USBSelector: make it more flexible with nodename

2021-06-21 Thread Dominik Csapak
similar to the pciselector, make it accept a plain nodename, or no node at all and provide a setNodename function to keep backwards compatibility, also check pveSelNode for the nodename Signed-off-by: Dominik Csapak --- www/manager6/form/USBSelector.js | 32 1 f

[pve-devel] [PATCH qemu-server 5/7] PVE/QemuServer: extend 'check_local_resources' for mapped resources

2021-06-21 Thread Dominik Csapak
by adding them to their own list, saving the nodes where they are not allowed, and return those on 'wantarray' Signed-off-by: Dominik Csapak --- PVE/QemuServer.pm | 36 ++-- 1 file changed, 34 insertions(+), 2 deletions(-) diff --git a/PVE/QemuServer.pm b/PVE/Qem

[pve-devel] [PATCH common 1/3] SysFSTools: add verbose flag to pci_device_info

2021-06-21 Thread Dominik Csapak
to also get the subsystem_vendor and device, as well as the iommu group and mediated device support Signed-off-by: Dominik Csapak --- src/PVE/SysFSTools.pm | 29 + 1 file changed, 25 insertions(+), 4 deletions(-) diff --git a/src/PVE/SysFSTools.pm b/src/PVE/SysFSTool

[pve-devel] [PATCH access-control 1/2] PVE/AccessControl: add Hardware.* privileges and /hardware/ paths

2021-06-21 Thread Dominik Csapak
so that we can assign privileges on hardware level this will generate a new role (PVEHardwareAdmin) Signed-off-by: Dominik Csapak --- src/PVE/API2/AccessControl.pm | 3 ++- src/PVE/AccessControl.pm | 13 + 2 files changed, 15 insertions(+), 1 deletion(-) diff --git a/src/PVE/

[pve-devel] [PATCH access-control 2/2] PVE/RPCEnvironment: add helper for checking hw permissions

2021-06-21 Thread Dominik Csapak
like check_vm_perm, etc. Signed-off-by: Dominik Csapak --- src/PVE/RPCEnvironment.pm | 8 1 file changed, 8 insertions(+) diff --git a/src/PVE/RPCEnvironment.pm b/src/PVE/RPCEnvironment.pm index 2e5a33b..1fac627 100644 --- a/src/PVE/RPCEnvironment.pm +++ b/src/PVE/RPCEnvironment.pm @@

[pve-devel] [PATCH common 2/3] SysFSTools: change 'product' to 'device'

2021-06-21 Thread Dominik Csapak
so it is more consistend with the source (it comes from the file 'device') as well as the subsytem_device field the only place we use that field is in the same file in pci_dev_bind_to_vfio, which we also change here, so that should not be a breaking change (in qemu-server we only really use the ex

[pve-devel] [PATCH cluster 1/1] add nodes/hardware-map.conf

2021-06-21 Thread Dominik Csapak
to PVE/Cluster.pm and status.c Signed-off-by: Dominik Csapak --- data/PVE/Cluster.pm | 1 + data/src/status.c | 1 + 2 files changed, 2 insertions(+) diff --git a/data/PVE/Cluster.pm b/data/PVE/Cluster.pm index 4d09c60..863b90f 100644 --- a/data/PVE/Cluster.pm +++ b/data/PVE/Cluster.pm @@ -75

Re: [pve-devel] [PATCH manager] ui: file-restore: start the file-restore on the selected node

2021-06-21 Thread Stefan Reiter
On 6/18/21 5:17 PM, Thomas Lamprecht wrote: On 10.06.21 13:28, Dominik Csapak wrote: On 6/10/21 11:29, Stefan Reiter wrote: On 6/10/21 10:40 AM, Dominik Csapak wrote: On 6/10/21 10:23, Stefan Reiter wrote: On 6/10/21 9:37 AM, Dominik Csapak wrote: and not the node where the browser connects.

[pve-devel] applied: [PATCH v9 manager 3/5] ui: add HashAlgorithmSelector

2021-06-21 Thread Thomas Lamprecht
On 16.06.21 11:36, Lorenz Stechauner wrote: > Signed-off-by: Lorenz Stechauner > --- > www/manager6/Makefile | 1 + > www/manager6/form/HashAlgorithmSelector.js | 16 > 2 files changed, 17 insertions(+) > create mode 100644 www/manager6/form/HashAlgorithmSe

Re: [pve-devel] [PATCH manager 1/2] pve6to7: add check for guest images on misconfigured storages

2021-06-21 Thread Thomas Lamprecht
On 18.06.21 12:59, Fabian Ebner wrote: > migration will no longer work when the storage's content type is not correct, > and unreferenced volumes on such storages will not be scanned for anymore. > > Signed-off-by: Fabian Ebner > --- > > If Lorenz's patches that enforce the correct content type

[pve-devel] applied: [PATCH storage 2/2] config: prevent empty content list when content type 'none' is not supported

2021-06-21 Thread Thomas Lamprecht
On 18.06.21 12:59, Fabian Ebner wrote: > Signed-off-by: Fabian Ebner > --- > PVE/Storage/Plugin.pm | 4 > 1 file changed, 4 insertions(+) > > applied, thanks! ___ pve-devel mailing list pve-devel@lists.proxmox.com https://lists.proxmox.com/cgi-

[pve-devel] applied: [PATCH storage 1/2] vdisk_list: only scan storages with the correct content type(s)

2021-06-21 Thread Thomas Lamprecht
On 18.06.21 12:59, Fabian Ebner wrote: > The enabled check in the lower loop is now redundant and can be removed. > > If storeid is provided, initialize the result hash accordingly, mainly for > backwards compatibility (needed by a caller in pve-manager's Ceph/Pools.pm and > the migration code in

[pve-devel] applied: [PATCH qemu-server 1/2] prefer storage_check_enabled over storage_check_node

2021-06-21 Thread Thomas Lamprecht
On 18.06.21 12:59, Fabian Ebner wrote: > storage_check_enabled simply checks for the 'disable' option and then calls > storage_check_node. > > While not strictly necessary for a second call where only the storage differs, > e.g. in case of clone, it is more future-proof: if support for a target >

[pve-devel] applied: [PATCH qemu-server 2/2] migrate: enforce that image content type is available

2021-06-21 Thread Thomas Lamprecht
On 18.06.21 12:59, Fabian Ebner wrote: > and use it for the vdisk_list call too. This avoids scanning (and picking up > volumes from!) storages that are not even configured to hold images. > > Previously, the content type was only enforced when a storage map was present. > > Also serves a bit as

Re: [pve-devel] [PATCH v3 qemu-server 1/1] vm_start: check if storages of volumes support content images

2021-06-21 Thread Thomas Lamprecht
On 27.05.21 14:23, Lorenz Stechauner wrote: > it is now necessary for storages to support the 'images' content in > order to start vms on them. all native storage plugins already > report the images content correctly. > > Signed-off-by: Lorenz Stechauner > --- > PVE/QemuServer.pm | 7 +++ >

[pve-devel] applied: [PATCH v3 container 1/1] fix #3421: allow custom storage plugins to support rootfs

2021-06-21 Thread Thomas Lamprecht
On 27.05.21 14:23, Lorenz Stechauner wrote: > it is now necessary for storages to support the 'rootdir' content in > order to start containers on them. all native storage plugins > already report the rootdir content correctly. > > Signed-off-by: Lorenz Stechauner > --- > src/PVE/LXC.pm | 30

[pve-devel] applied: [PATCH container 3/3] migrate: enforce that rootdir content type is available

2021-06-21 Thread Thomas Lamprecht
On 18.06.21 12:59, Fabian Ebner wrote: > and use it for the vdisk_list call too. This avoids scanning (and picking up > volumes from!) storages that are not even configured to hold container images. > > Also serves a bit as a preparation to enforce content type on guest startup, > because now migr

[pve-devel] applied: [PATCH container 1/3] prefer storage_check_enabled over storage_check_node

2021-06-21 Thread Thomas Lamprecht
On 18.06.21 12:59, Fabian Ebner wrote: > storage_check_enabled simply checks for the 'disable' option and then calls > storage_check_node. > > While not strictly necessary for a second call where only the storage differs, > it is more future-proof: if support for a target storage is added at some

[pve-devel] applied: [PATCH container 2/3] migrate: also test unused volumes

2021-06-21 Thread Thomas Lamprecht
On 18.06.21 12:59, Fabian Ebner wrote: > otherwise an unused volume on a disabled storage is silently left on the old > node, even if referenced. > > Signed-off-by: Fabian Ebner > --- > > needs the previous patch to work correctly (otherwise disable is still > ignored) > > src/PVE/LXC/Migrate

Re: [pve-devel] [PATCH container] fix #3367: skip bind mounts when converting to template

2021-06-21 Thread Wolfgang Bumiller
On Tue, Apr 06, 2021 at 08:26:50AM +0200, Fabian Ebner wrote: > It turns out that we do not yet allow cloning from container templates with > bind mounts. So in a sense container templates with bind mounts are > currently misconfigured, and this patch would make it easier to get there... > > Shoul

Re: [pve-devel] [PATCH qemu-server 2/2] enable io-uring support

2021-06-21 Thread Thomas Lamprecht
On 07.06.21 13:48, Stefan Reiter wrote: > Note that the value in this enum directly represents the value passed to > QEMU, so we need to use the underscore. > > Off by default, updated QEMU required, but no compatibility issues, as > this is a new value that wasn't valid before, and setting it is

[pve-devel] applied: [PATCH pve-qemu 1/2] enable io-uring support in QEMU builds

2021-06-21 Thread Thomas Lamprecht
On 07.06.21 13:48, Stefan Reiter wrote: > Signed-off-by: Stefan Reiter > --- > > Oh if only all QEMU changes were this simple... > > debian/control | 1 + > debian/rules | 1 + > 2 files changed, 2 insertions(+) > > applied, thanks! ___ pve-deve

[pve-devel] applied: [PATCH proxmox-i18n 1/1] Full Polish translation

2021-06-21 Thread Thomas Lamprecht
On 23.05.21 09:39, Daniel Koć wrote: > Signed-off-by: Daniel Koć > --- > pl.po | 2806 +++-- > 1 file changed, 1303 insertions(+), 1503 deletions(-) > > applied, much thanks! ___ pve-devel mailing

Re: [pve-devel] [PATCH docs 1/1] pveum: add warning for disabling or deleting users

2021-06-21 Thread Thomas Lamprecht
On 20.05.21 15:53, Lorenz Stechauner wrote: > see #3101 > > Signed-off-by: Lorenz Stechauner > --- > pveum.adoc | 5 + > 1 file changed, 5 insertions(+) > > diff --git a/pveum.adoc b/pveum.adoc > index 7120db7..0bece8a 100644 > --- a/pveum.adoc > +++ b/pveum.adoc > @@ -56,6 +56,11 @@ Each u

Re: [pve-devel] applied: [PATCH v9 manager 2/5] api: nodes: refactor aplinfo to use common download function

2021-06-21 Thread Lorenz Stechauner
On 18.06.21 18:58, Thomas Lamprecht wrote: On 16.06.21 11:36, Lorenz Stechauner wrote: a common function to download arbitrary files from urls has been defined as PVE::Tools::download_file_from_url and is now used. Signed-off-by: Lorenz Stechauner --- PVE/API2/Nodes.pm | 93 +

[pve-devel] applied: [PATCH cluster] pve-cluster.service: remove ceph.service

2021-06-21 Thread Thomas Lamprecht
On 03.05.21 12:00, Aaron Lauterer wrote: > The ceph.service file has been removed in pve-manager commit be244f1. > Therefore, there is no need to reference it anymore. This also avoids > showing the `ceph.service` as a `not found` unit. > > Signed-off-by: Aaron Lauterer > --- > debian/pve-cluste

[pve-devel] applied: [PATCH storage 1/2] pbs: free image: explicitly return undef

2021-06-21 Thread Thomas Lamprecht
On 04.05.21 11:52, Fabian Ebner wrote: > Storage.pm's vdisk_free interprets truthy return values as worker subs, so be > explicit about returning undef here. Not an issue at the moment, because > run_client_command already returns undef, but better be safe than sorry. > > Signed-off-by: Fabian Ebn

[pve-devel] applied: [PATCH storage 2/2] lvm: volume import: handle worker returned by free_image

2021-06-21 Thread Thomas Lamprecht
On 04.05.21 11:52, Fabian Ebner wrote: > only affects LVM storages with 'saferemove 1' where the import fails at a > rather > advanced stage. Previously in such cases, the renamed (by free_image) volume > del-vm-XYZ-disk-N would be left over. > > Signed-off-by: Fabian Ebner > --- > PVE/Storage/

[pve-devel] applied: [PATCH proxmox-acme] fix #3390: standalone: explicitly bind to '::'

2021-06-21 Thread Thomas Lamprecht
On 12.05.21 21:04, Stoiko Ivanov wrote: > This patch follows 2f8be3bfda203065b22e60862e5f98d831a46921 from > pve-common: > Instead of not specifying a listen address, we first try to bind on > '::', which usually accepts connections for both ipv4 and ipv6, > and fall back to '0.0.0.0' if this fails

Re: [pve-devel] [PATCH v9 storage 1/1] status: add download_url method

2021-06-21 Thread Thomas Lamprecht
On 16.06.21 11:35, Lorenz Stechauner wrote: > uses common function PVE::Tools::download_file_from_url to download > iso files. > > Only users with permissions `Sys.Audit` and `Sys.Modify` on `/` are > permitted to perform this action. This restriction is due to the > fact, that the download functi

Re: [pve-devel] [PATCH docs] pvesm: How to remove directory storages

2021-06-21 Thread Dominic Jäger
On Fri, Jun 18, 2021 at 06:31:51PM +0200, Thomas Lamprecht wrote: > On 21.05.21 12:44, Dominic Jäger wrote: > > Users are repeatedly left with entries in Disks->Directory, most recently > > https://forum.proxmox.com/threads/how-to-remove-local-directory-storage-properly.89504/ > > > > Signed-off-b