[pve-devel] [PATCH storage] Fix 2763: Revert "storage_migrate: check if target storage supports content type"

2020-05-25 Thread Fabian Ebner
This reverts commit 95015dbbf24b710011965805e689c03923fb830c. parse_volname always gives 'images' and not 'rootdir'. In most cases the volume name alone does not contain the needed information, e.g. vm-123-disk-0 can be both a VM volume or a container volume. Signed-off-by: Fabian Ebner --- For

[pve-devel] [PATCH widget-toolkit] fix #2758: reject 'tfa' cookies

2020-05-25 Thread Dominik Csapak
return false on authOK when the ticket is a tfa ticket (starts with PVE:tfa!) when a user now loads the page with only a tfa ticket, it shows the login window again Signed-off-by: Dominik Csapak --- Utils.js | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/Utils.js b/Utils.

[pve-devel] applied: Re: [PATCH widget-toolkit] fix #2758: reject 'tfa' cookies

2020-05-25 Thread Thomas Lamprecht
On 5/25/20 10:35 AM, Dominik Csapak wrote: > return false on authOK when the ticket is a tfa ticket > (starts with PVE:tfa!) > > when a user now loads the page with only a tfa ticket, it shows the > login window again > > Signed-off-by: Dominik Csapak > --- > Utils.js | 3 ++- > 1 file changed,

[pve-devel] [PATCH pve-common] network: vlan-aware bridge: fix pvid when trunks is defined

2020-05-25 Thread Alexandre Derumier
Currently, when a trunks is defined, the vlan tag is not used for pvid with vlan-aware bridge. (It's ok with ovs switch) example: net0: e1000=BA:90:68:B8:CF:F5,bridge=vmbr1,tag=2,trunks=2-11 before -- tap100i0 2-11 after - tap100i0 2 PVID Egress Untagged 3-11 N

[pve-devel] [PATCH widget-toolkit] return cookie again in authOK

2020-05-25 Thread Dominik Csapak
the calling code did require that authOK returns the cookie if there is a valid one make it now very explicit that the cookie gets returned instead of using implicit short-circuit behaviour Signed-off-by: Dominik Csapak --- Utils.js | 6 +- 1 file changed, 5 insertions(+), 1 deletion(-) di

[pve-devel] applied: Re: [PATCH widget-toolkit] return cookie again in authOK

2020-05-25 Thread Thomas Lamprecht
On 5/25/20 1:46 PM, Dominik Csapak wrote: > the calling code did require that authOK returns the cookie if > there is a valid one > > make it now very explicit that the cookie gets returned instead > of using implicit short-circuit behaviour > > Signed-off-by: Dominik Csapak > --- > Utils.js |

[pve-devel] [PATCH container] fix #2655: don't forget to setup securetty for centos >= 7

2020-05-25 Thread Oguz Bektas
in template_fixup we only call this method for version < 7, but greater versions also need to allow lxc/tty[N] as secure. Signed-off-by: Oguz Bektas --- src/PVE/LXC/Setup/CentOS.pm | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/src/PVE/LXC/Setup/CentOS.pm b/src/PVE/LXC/Set

Re: [pve-devel] [PATCH container] fix #2655: don't forget to setup securetty for centos >= 7

2020-05-25 Thread Thomas Lamprecht
On 5/25/20 2:15 PM, Oguz Bektas wrote: > in template_fixup we only call this method for version < 7, but greater > versions also need to allow lxc/tty[N] as secure. > > Signed-off-by: Oguz Bektas > --- > src/PVE/LXC/Setup/CentOS.pm | 3 ++- > 1 file changed, 2 insertions(+), 1 deletion(-) > > d

Re: [pve-devel] [PATCH container] fix #2655: don't forget to setup securetty for centos >= 7

2020-05-25 Thread Oguz Bektas
On Mon, May 25, 2020 at 02:24:34PM +0200, Thomas Lamprecht wrote: > On 5/25/20 2:15 PM, Oguz Bektas wrote: > > in template_fixup we only call this method for version < 7, but greater > > versions also need to allow lxc/tty[N] as secure. > > > > Signed-off-by: Oguz Bektas > > --- > > src/PVE/LXC/

[pve-devel] [PATCH v2 container] fix #2655: don't forget to setup securetty for centos >= 7

2020-05-25 Thread Oguz Bektas
in template_fixup we only call this method for version < 7, but greater versions also need to allow lxc/tty[N] as secure. Signed-off-by: Oguz Bektas --- v1->v2: * call setup_securetty unconditionally src/PVE/LXC/Setup/CentOS.pm | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff -

[pve-devel] [PATCH pve-network] add vnet vlan-aware option

2020-05-25 Thread Alexandre Derumier
Some users would like to be able to defined vlans at vm level, or allow trunks, on top of already tagged vnet. (including vlan on top of vxlan tunnel) Allow it on all layer2 plugins, and add a warn for evpn layer3 plugin. Signed-off-by: Alexandre Derumier --- PVE/Network/SDN/VnetPlugin.pm