[pve-devel] Proposal For Podman Container Support

2025-03-13 Thread Raven King via pve-devel
--- Begin Message --- Hello, This is my first time writing to this mailing list. I have never contributed to proxmox but I would like to try and write a feature that allows native container support (not inside an LXC or VM). My goal would be that you could manage those containers much like LXC

[pve-devel] [PATCH proxmox-firewall v2 4/4] tests: add network device without firewall key

2025-03-13 Thread Stefan Hanreich
A bug in proxmox-ve-config caused the key to be defaulted to on, if it didn't exist in the configuration. Add this scenario to the integration tests, so we can potentially catch problems with the missing firewall key via the integration tests. Signed-off-by: Stefan Hanreich --- proxmox-firewall/

[pve-devel] superseded: [PATCH zfsonlinux] patches: fix for zvol sync/flush regression

2025-03-13 Thread Fabian Grünbichler
v2 with slightly updated patch from upstream master: https://lore.proxmox.com/pve-devel/20250313113214.23456-1-f.gruenbich...@proxmox.com/T/#u On March 11, 2025 9:44 am, Fabian Grünbichler wrote: > this broke with 2.2.7, and can potentially cause data loss or > inconsistency. the patch basically

Re: [pve-devel] [PATCH proxmox-ve-rs v2 1/1] partially fix #6176: config: guest: change default for firewall key

2025-03-13 Thread Hannes Laimer
a comment and small nit inline, other than that LGMT! Consider this and the following three patches: Tested-by: Hannes Laimer Reviewed-by: Hannes Laimer On 13.03.25 14:22, Stefan Hanreich wrote: When the firewall key wasn't present in the network device configuration of a guest, the firewall

[pve-devel] applied-series: [PATCH proxmox-firewall v2 1/2] fix: firewall: apply `nt_conntrack_allow_invalid` to all chains

2025-03-13 Thread Wolfgang Bumiller
applied and s/nt_/nf_/ (except where referencing existing commit, to not mess up copy&paste sesarches) On Wed, Mar 12, 2025 at 02:20:24PM +0100, Hannes Laimer wrote: > ... on the guest table. There is no reason to not repect that option > on those two chains. These two were missed in the reference

Re: [pve-devel] [PATCH] dns: powerdns: correctly handle different records types (A / AAAA)

2025-03-13 Thread Stefan Hanreich
Thanks for contributing to Proxmox VE! Have you already signed a CLA [1] with us? Otherwise we cannot accept your contribution Gave this patch a quick spin on my shiny new dual-stack Simple Zone with DHCP enabled. Could reproduce the issue and the patch fixed it, so consider this: Tested-by: Stef

Re: [pve-devel] [PATCH frr] frr: fix bit flag collision in patch

2025-03-13 Thread Gabriel Goller
On 13.03.2025 16:16, Thomas Lamprecht wrote: On 13/03/2025 13:49, Gabriel Goller wrote: Resolve conflict between F_ISIS_UNIT_TEST and ISIS_OPT_DUMMY_AS_LOOPBACK which were both using the same bit value (0x01). This collision caused unit test mode to be unintentionally enabled when DUMMY_AS_LOOPB

Re: [pve-devel] [PATCH proxmox-firewall 3/3] tests: add Ping macro to tests

2025-03-13 Thread Hannes Laimer
Tested these changes, I could reproduce the described problem, and after applying the patches the macros only matches the correct ICMP packets, not all. so consider this: Tested-by: Hannes Laimer On 04.02.25 10:57, Stefan Hanreich wrote: Rules using the Ping macro were wrongly generated due to

[pve-devel] [RFC proxmox] fix #6143: notify: allow overriding notification templates

2025-03-13 Thread Alexander Zeidler
Previously, notification templates could be modified by the user, but these were overwritten again with installing newer package versions of pve-manager and proxmox-backup. Now override templates can be created cluster-wide in the path “/etc/{pve,proxmox-backup}/notification-templates/{namespace}”

Re: [pve-devel] [PATCH frr] frr: fix bit flag collision in patch

2025-03-13 Thread Thomas Lamprecht
On 13/03/2025 13:49, Gabriel Goller wrote: > Resolve conflict between F_ISIS_UNIT_TEST and ISIS_OPT_DUMMY_AS_LOOPBACK > which were both using the same bit value (0x01). This collision caused > unit test mode to be unintentionally enabled when DUMMY_AS_LOOPBACK was set. > This is also wrong at ups

[pve-devel] [PATCH proxmox-firewall v2 2/4] partially fix #6176: ipfilter: honor firewall setting from guest cfg

2025-03-13 Thread Stefan Hanreich
ipfilter ipsets and rules were still generated, even if the firewall was disabled for the network device. Signed-off-by: Stefan Hanreich --- proxmox-firewall/src/firewall.rs | 4 1 file changed, 4 insertions(+) diff --git a/proxmox-firewall/src/firewall.rs b/proxmox-firewall/src/firewall.r

[pve-devel] [PATCH proxmox-firewall v2 3/4] partially fix #6176: do not generate mac filter if firewall disabled

2025-03-13 Thread Stefan Hanreich
The firewall generated mac filters for outgoing packets even if the firewall was disabled for a specific interface. This was applicable to ARP packets as well. Signed-off-by: Stefan Hanreich --- proxmox-firewall/src/firewall.rs | 1 + 1 file changed, 1 insertion(+) diff --git a/proxmox-firewall

Re: [pve-devel] [PATCH proxmox-firewall v2 1/2] fix: firewall: apply `nt_conntrack_allow_invalid` to all chains

2025-03-13 Thread Stefan Hanreich
gave this a test on my machine: * tested outgoing/incoming connectivity for guests * tested DHCP in a simple zone * checked generated firewall rulesets with setting on/off small nit: settings is called nf_conntrack_allow_invalid, not nt_conntrack_allow_invalid - maybe we could change that on commi

[pve-devel] superseded: [PATCH proxmox-ve-rs 1/1] partially fix #6176: config: guest: change default for firewall key

2025-03-13 Thread Stefan Hanreich
https://lore.proxmox.com/pve-devel/20250313132231.166477-1-s.hanre...@proxmox.com/T/ On 2/19/25 11:09, Stefan Hanreich wrote: > When the firewall key wasn't present in the network device > configuration of a guest, the firewall defaulted to on instead of off. > Since the UI omitted the firewall se

[pve-devel] [PATCH proxmox-ve-rs v2 1/1] partially fix #6176: config: guest: change default for firewall key

2025-03-13 Thread Stefan Hanreich
When the firewall key wasn't present in the network device configuration of a guest, the firewall defaulted to on instead of off. Since the UI omitted the firewall setting in the API calls when it is unchecked, there was no way for the firewall to be turned off for a specific network device of a gu

[pve-devel] [PATCH proxmox-firewall v2 1/4] ipsets: remove dereference

2025-03-13 Thread Stefan Hanreich
The network device configuration doesn't return a reference anymore, so we do not need to dereference here anymore. Signed-off-by: Stefan Hanreich --- Notes: This and the subsequent tests patch require a bump of proxmox-ve-config to work proxmox-firewall/src/firewall.rs | 4 ++-- 1 file c

[pve-devel] applied: [PATCH proxmox-firewall v2 1/1] cargo: update proxmox-ve-config

2025-03-13 Thread Wolfgang Bumiller
applied - but also generally updated d/control to fit the current dependencies On Thu, Mar 13, 2025 at 01:46:08PM +0100, Stefan Hanreich wrote: > Signed-off-by: Stefan Hanreich > --- > > Notes: > Changes from v1: > * split from > https://lore.proxmox.com/pve-devel/20250123101300.72647-1

[pve-devel] applied-series: [PATCH proxmox-firewall v2 1/2] security groups: skip in forward chain when interface is specified

2025-03-13 Thread Wolfgang Bumiller
applied series, thanks ___ pve-devel mailing list pve-devel@lists.proxmox.com https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel

[pve-devel] superseded: [PATCH proxmox-firewall 1/4] cargo: bump dependencies

2025-03-13 Thread Stefan Hanreich
split into two series and rebased on top of master: https://lore.proxmox.com/pve-devel/20250313124608.136789-1-s.hanre...@proxmox.com/T/#u https://lore.proxmox.com/pve-devel/20250313124920.138960-1-s.hanre...@proxmox.com/T/#u On 1/23/25 11:12, Stefan Hanreich wrote: > Signed-off-by: Stefan Hanre

[pve-devel] [PATCH proxmox-firewall v2 1/2] security groups: skip in forward chain when interface is specified

2025-03-13 Thread Stefan Hanreich
Security groups can be bound to a specific interface. The notion of this breaks down when considering the forward direction, since there are two interfaces involved: incoming and outgoing, which can be different depending on the kind of traffic. With the current implementation, the firewall refuse

[pve-devel] [PATCH frr] frr: fix bit flag collision in patch

2025-03-13 Thread Gabriel Goller
Resolve conflict between F_ISIS_UNIT_TEST and ISIS_OPT_DUMMY_AS_LOOPBACK which were both using the same bit value (0x01). This collision caused unit test mode to be unintentionally enabled when DUMMY_AS_LOOPBACK was set. Signed-off-by: Gabriel Goller --- * I'm not sure about the debian version n

[pve-devel] [PATCH proxmox-firewall v2 2/2] tests: add test for security groups in cluster config

2025-03-13 Thread Stefan Hanreich
There was a bug where rulesets with security groups bound to a specific interface would cause the firewall to fail to create a new ruleset. Catch this by adding a security group bound to an interface to the ruleset. Signed-off-by: Stefan Hanreich --- proxmox-firewall/tests/input/cluster.fw

[pve-devel] [PATCH proxmox-firewall v2 1/1] cargo: update proxmox-ve-config

2025-03-13 Thread Stefan Hanreich
Signed-off-by: Stefan Hanreich --- Notes: Changes from v1: * split from https://lore.proxmox.com/pve-devel/20250123101300.72647-1-s.hanre...@proxmox.com/ * update d/control Cargo.toml | 2 +- debian/control | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/

[pve-devel] [PATCH storage/manager] allow upload & import of qcow2 in the web UI

2025-03-13 Thread Dominik Csapak
most of the building blocks are already there: * we can have qcow2 files in an import storage * we can import qcow2 files via the api from such a storage this series fills in the missing bits & pieces: * allow uploading qcow2 files into an import storage via the webgui * adding the possibility to

[pve-devel] [PATCH zfsonlinux v2] patches: fix for zvol sync/flush regression

2025-03-13 Thread Fabian Grünbichler
this broke with 2.2.7, and can potentially cause data loss or inconsistency. the patch basically reverts to pre-2.2.7 behaviour, verified via a fio benchmark. reported on our forum: https://forum.proxmox.com/threads/163066 cherry-picked from upstream master Signed-off-by: Fabian Grünbichler Tes

[pve-devel] [PATCH manager 2/3] ui: form: file selector: allow optional filter

2025-03-13 Thread Dominik Csapak
this sometimes comes in handy when we only want to show specific files. Signed-off-by: Dominik Csapak --- www/manager6/form/FileSelector.js | 10 ++ 1 file changed, 10 insertions(+) diff --git a/www/manager6/form/FileSelector.js b/www/manager6/form/FileSelector.js index ef2bedf9..9db20

[pve-devel] [PATCH manager 1/3] ui: storage content: allow upload of qcow2 for import type

2025-03-13 Thread Dominik Csapak
partially fixes #2424 Signed-off-by: Dominik Csapak --- www/manager6/window/UploadToStorage.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/www/manager6/window/UploadToStorage.js b/www/manager6/window/UploadToStorage.js index cdf548a8..3ce2d1f5 100644 --- a/www/manager6/w

[pve-devel] [PATCH manager 3/3] ui: qemu hd edit: allow importing a disk from the import storage

2025-03-13 Thread Dominik Csapak
adds a checkbox 'import image' above the storage selector which: * hides the original storage selector * shows a 'source storage' selector * shows a 'import file' selector * shows a 'target storage' selector Since the wizard and the hd edit share this panel, this also works in the wizard. Signed-

[pve-devel] [PATCH storage 1/1] import: allow upload of qcow2 files into import storage

2025-03-13 Thread Dominik Csapak
so users can upload qcow2 files directly in the ui Signed-off-by: Dominik Csapak --- src/PVE/API2/Storage/Status.pm | 17 - src/PVE/Storage.pm | 2 +- 2 files changed, 17 insertions(+), 2 deletions(-) diff --git a/src/PVE/API2/Storage/Status.pm b/src/PVE/API2/Storag

[pve-devel] applied: [PATCH qemu-server] api: create disks: only log cleanup if it's actually done

2025-03-13 Thread Wolfgang Bumiller
applied, thanks On Thu, Mar 13, 2025 at 09:30:26AM +0100, Dominik Csapak wrote: > we cleaned up extracted images, but logged it even for non extracted > ones. Only log this when we actually cleaned anything up. > > Signed-off-by: Dominik Csapak > --- > PVE/API2/Qemu.pm | 6 -- > 1 file chan

Re: [pve-devel] [PATCH pve_flutter_frontend] Fix #6231: Removed whitespace-trimming from password entry field

2025-03-13 Thread Friedrich Weber
Hi, thanks for the patch! I can't comment on the change itself, but have some remarks on the commit message: On 11/03/2025 12:52, Alexander Abraham wrote: > A user reported a bug where they were attempting to login into our > app for PVE and they used a password with two spaces at the end. > The l

[pve-devel] [PATCH qemu-server] api: create disks: only log cleanup if it's actually done

2025-03-13 Thread Dominik Csapak
we cleaned up extracted images, but logged it even for non extracted ones. Only log this when we actually cleaned anything up. Signed-off-by: Dominik Csapak --- PVE/API2/Qemu.pm | 6 -- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/PVE/API2/Qemu.pm b/PVE/API2/Qemu.pm index dc

Re: [pve-devel] [PATCH pve_flutter_frontend] Fix #6231: Removed whitespace-trimming from password entry field

2025-03-13 Thread Laurențiu Leahu-Vlăducu
I can confirm that logging in with passwords containing leading or trailing whitespaces did not work previously, and your patch fixes the issue. However, please note that pve_flutter_frontend is the wrong repository, as this patch is meant to be applied on the proxmox_login_manager repository