* [pve-devel] [PATCH pve-network 0/5] sdn fixes and improvements
@ 2021-11-05 8:06 Alexandre Derumier
2021-11-05 8:06 ` [pve-devel] [PATCH pve-network 1/5] vnet/subnet : add skipdns option Alexandre Derumier
` (5 more replies)
0 siblings, 6 replies; 7+ messages in thread
From: Alexandre Derumier @ 2021-11-05 8:06 UTC (permalink / raw)
To: pve-devel
This is a resubmit of last months patches
+ some new fix && features for evpn.
Alexandre Derumier (5):
vnet/subnet : add skipdns option
get_local_vnets: add permissions on /sdn/vnets/*
api2: zones: fix update
zones: evpn: add disable-arp-nd-suppression option
vnets: alias: fix regex
PVE/API2/Network/SDN/Zones.pm | 4 +-
PVE/Network/SDN.pm | 2 +-
PVE/Network/SDN/Subnets.pm | 70 +++++++++++--------
PVE/Network/SDN/VnetPlugin.pm | 2 +-
PVE/Network/SDN/Vnets.pm | 16 ++---
PVE/Network/SDN/Zones/EvpnPlugin.pm | 10 ++-
.../expected_controller_config | 31 ++++++++
.../expected_sdn_interfaces | 40 +++++++++++
.../disable_arp_nd_suppression/interfaces | 7 ++
.../disable_arp_nd_suppression/sdn_config | 26 +++++++
10 files changed, 164 insertions(+), 44 deletions(-)
create mode 100644 test/zones/evpn/disable_arp_nd_suppression/expected_controller_config
create mode 100644 test/zones/evpn/disable_arp_nd_suppression/expected_sdn_interfaces
create mode 100644 test/zones/evpn/disable_arp_nd_suppression/interfaces
create mode 100644 test/zones/evpn/disable_arp_nd_suppression/sdn_config
--
2.30.2
^ permalink raw reply [flat|nested] 7+ messages in thread
* [pve-devel] [PATCH pve-network 1/5] vnet/subnet : add skipdns option
2021-11-05 8:06 [pve-devel] [PATCH pve-network 0/5] sdn fixes and improvements Alexandre Derumier
@ 2021-11-05 8:06 ` Alexandre Derumier
2021-11-05 8:06 ` [pve-devel] [PATCH pve-network 2/5] get_local_vnets: add permissions on /sdn/vnets/* Alexandre Derumier
` (4 subsequent siblings)
5 siblings, 0 replies; 7+ messages in thread
From: Alexandre Derumier @ 2021-11-05 8:06 UTC (permalink / raw)
To: pve-devel
allow to register ip to ipam without dns registration.
can be used for temp/pending ip for example
---
PVE/Network/SDN/Subnets.pm | 70 ++++++++++++++++++++++----------------
PVE/Network/SDN/Vnets.pm | 16 ++++-----
2 files changed, 49 insertions(+), 37 deletions(-)
diff --git a/PVE/Network/SDN/Subnets.pm b/PVE/Network/SDN/Subnets.pm
index 0231822..6bb42e5 100644
--- a/PVE/Network/SDN/Subnets.pm
+++ b/PVE/Network/SDN/Subnets.pm
@@ -184,7 +184,7 @@ sub del_subnet {
}
sub next_free_ip {
- my ($zone, $subnetid, $subnet, $hostname, $mac, $description) = @_;
+ my ($zone, $subnetid, $subnet, $hostname, $mac, $description, $skipdns) = @_;
my $cidr = undef;
my $ip = undef;
@@ -199,7 +199,7 @@ sub next_free_ip {
$hostname .= ".$dnszoneprefix" if $dnszoneprefix;
#verify dns zones before ipam
- verify_dns_zone($dnszone, $dns);
+ verify_dns_zone($dnszone, $dns) if !$skipdns;
if($ipamid) {
my $ipam_cfg = PVE::Network::SDN::Ipams::config();
@@ -215,10 +215,12 @@ sub next_free_ip {
eval {
my $reversednszone = get_reversedns_zone($subnetid, $subnet, $reversedns, $ip);
- #add dns
- add_dns_record($dnszone, $dns, $hostname, $ip);
- #add reverse dns
- add_dns_ptr_record($reversednszone, $dnszone, $reversedns, $hostname, $ip);
+ if(!$skipdns) {
+ #add dns
+ add_dns_record($dnszone, $dns, $hostname, $ip);
+ #add reverse dns
+ add_dns_ptr_record($reversednszone, $dnszone, $reversedns, $hostname, $ip);
+ }
};
if ($@) {
#rollback
@@ -232,7 +234,7 @@ sub next_free_ip {
}
sub add_ip {
- my ($zone, $subnetid, $subnet, $ip, $hostname, $mac, $description, $is_gateway) = @_;
+ my ($zone, $subnetid, $subnet, $ip, $hostname, $mac, $description, $is_gateway, $skipdns) = @_;
return if !$subnet || !$ip;
@@ -249,8 +251,10 @@ sub add_ip {
$hostname .= ".$dnszoneprefix" if $dnszoneprefix;
#verify dns zones before ipam
- verify_dns_zone($dnszone, $dns);
- verify_dns_zone($reversednszone, $reversedns);
+ if(!$skipdns) {
+ verify_dns_zone($dnszone, $dns);
+ verify_dns_zone($reversednszone, $reversedns);
+ }
if ($ipamid) {
@@ -265,10 +269,12 @@ sub add_ip {
}
eval {
- #add dns
- add_dns_record($dnszone, $dns, $hostname, $ip);
- #add reverse dns
- add_dns_ptr_record($reversednszone, $dnszone, $reversedns, $hostname, $ip);
+ if(!$skipdns) {
+ #add dns
+ add_dns_record($dnszone, $dns, $hostname, $ip);
+ #add reverse dns
+ add_dns_ptr_record($reversednszone, $dnszone, $reversedns, $hostname, $ip);
+ }
};
if ($@) {
#rollback
@@ -281,7 +287,7 @@ sub add_ip {
}
sub update_ip {
- my ($zone, $subnetid, $subnet, $ip, $hostname, $oldhostname, $mac, $description) = @_;
+ my ($zone, $subnetid, $subnet, $ip, $hostname, $oldhostname, $mac, $description, $skipdns) = @_;
return if !$subnet || !$ip;
@@ -298,8 +304,10 @@ sub update_ip {
$hostname .= ".$dnszoneprefix" if $dnszoneprefix;
#verify dns zones before ipam
- verify_dns_zone($dnszone, $dns);
- verify_dns_zone($reversednszone, $reversedns);
+ if(!$skipdns) {
+ verify_dns_zone($dnszone, $dns);
+ verify_dns_zone($reversednszone, $reversedns);
+ }
if ($ipamid) {
my $ipam_cfg = PVE::Network::SDN::Ipams::config();
@@ -314,18 +322,19 @@ sub update_ip {
return if $hostname eq $oldhostname;
eval {
- #add dns
-
- del_dns_record($dnszone, $dns, $oldhostname, $ip);
- add_dns_record($dnszone, $dns, $hostname, $ip);
- #add reverse dns
- del_dns_ptr_record($reversednszone, $reversedns, $ip);
- add_dns_ptr_record($reversednszone, $dnszone, $reversedns, $hostname, $ip);
+ if(!$skipdns) {
+ #add dns
+ del_dns_record($dnszone, $dns, $oldhostname, $ip);
+ add_dns_record($dnszone, $dns, $hostname, $ip);
+ #add reverse dns
+ del_dns_ptr_record($reversednszone, $reversedns, $ip);
+ add_dns_ptr_record($reversednszone, $dnszone, $reversedns, $hostname, $ip);
+ }
};
}
sub del_ip {
- my ($zone, $subnetid, $subnet, $ip, $hostname) = @_;
+ my ($zone, $subnetid, $subnet, $ip, $hostname, $skipdns) = @_;
return if !$subnet || !$ip;
@@ -340,9 +349,10 @@ sub del_ip {
my $dnszoneprefix = $subnet->{dnszoneprefix};
$hostname .= ".$dnszoneprefix" if $dnszoneprefix;
-
- verify_dns_zone($dnszone, $dns);
- verify_dns_zone($reversednszone, $reversedns);
+ if(!$skipdns) {
+ verify_dns_zone($dnszone, $dns);
+ verify_dns_zone($reversednszone, $reversedns);
+ }
if ($ipamid) {
my $ipam_cfg = PVE::Network::SDN::Ipams::config();
@@ -352,8 +362,10 @@ sub del_ip {
}
eval {
- del_dns_record($dnszone, $dns, $hostname, $ip);
- del_dns_ptr_record($reversednszone, $reversedns, $ip);
+ if(!$skipdns) {
+ del_dns_record($dnszone, $dns, $hostname, $ip);
+ del_dns_ptr_record($reversednszone, $reversedns, $ip);
+ }
};
if ($@) {
warn $@;
diff --git a/PVE/Network/SDN/Vnets.pm b/PVE/Network/SDN/Vnets.pm
index 86967a3..caa6bfc 100644
--- a/PVE/Network/SDN/Vnets.pm
+++ b/PVE/Network/SDN/Vnets.pm
@@ -100,7 +100,7 @@ sub get_subnet_from_vnet_cidr {
}
sub get_next_free_cidr {
- my ($vnetid, $hostname, $mac, $description, $ipversion) = @_;
+ my ($vnetid, $hostname, $mac, $description, $ipversion, $skipdns) = @_;
my $vnet = PVE::Network::SDN::Vnets::get_vnet($vnetid);
my $zoneid = $vnet->{zone};
@@ -121,7 +121,7 @@ sub get_next_free_cidr {
$subnetcount++;
eval {
- $ip = PVE::Network::SDN::Subnets::next_free_ip($zone, $subnetid, $subnet, $hostname, $mac, $description);
+ $ip = PVE::Network::SDN::Subnets::next_free_ip($zone, $subnetid, $subnet, $hostname, $mac, $description, $skipdns);
};
warn $@ if $@;
last if $ip;
@@ -132,30 +132,30 @@ sub get_next_free_cidr {
}
sub add_cidr {
- my ($vnetid, $cidr, $hostname, $mac, $description) = @_;
+ my ($vnetid, $cidr, $hostname, $mac, $description, $skipdns) = @_;
return if !$vnetid;
my ($zone, $subnetid, $subnet, $ip) = PVE::Network::SDN::Vnets::get_subnet_from_vnet_cidr($vnetid, $cidr);
- PVE::Network::SDN::Subnets::add_ip($zone, $subnetid, $subnet, $ip, $hostname, $mac, $description);
+ PVE::Network::SDN::Subnets::add_ip($zone, $subnetid, $subnet, $ip, $hostname, $mac, $description, undef, $skipdns);
}
sub update_cidr {
- my ($vnetid, $cidr, $hostname, $oldhostname, $mac, $description) = @_;
+ my ($vnetid, $cidr, $hostname, $oldhostname, $mac, $description, $skipdns) = @_;
return if !$vnetid;
my ($zone, $subnetid, $subnet, $ip) = PVE::Network::SDN::Vnets::get_subnet_from_vnet_cidr($vnetid, $cidr);
- PVE::Network::SDN::Subnets::update_ip($zone, $subnetid, $subnet, $ip, $hostname, $oldhostname, $mac, $description);
+ PVE::Network::SDN::Subnets::update_ip($zone, $subnetid, $subnet, $ip, $hostname, $oldhostname, $mac, $description, $skipdns);
}
sub del_cidr {
- my ($vnetid, $cidr, $hostname) = @_;
+ my ($vnetid, $cidr, $hostname, $skipdns) = @_;
return if !$vnetid;
my ($zone, $subnetid, $subnet, $ip) = PVE::Network::SDN::Vnets::get_subnet_from_vnet_cidr($vnetid, $cidr);
- PVE::Network::SDN::Subnets::del_ip($zone, $subnetid, $subnet, $ip, $hostname);
+ PVE::Network::SDN::Subnets::del_ip($zone, $subnetid, $subnet, $ip, $hostname, $skipdns);
}
--
2.30.2
^ permalink raw reply [flat|nested] 7+ messages in thread
* [pve-devel] [PATCH pve-network 2/5] get_local_vnets: add permissions on /sdn/vnets/*
2021-11-05 8:06 [pve-devel] [PATCH pve-network 0/5] sdn fixes and improvements Alexandre Derumier
2021-11-05 8:06 ` [pve-devel] [PATCH pve-network 1/5] vnet/subnet : add skipdns option Alexandre Derumier
@ 2021-11-05 8:06 ` Alexandre Derumier
2021-11-05 8:06 ` [pve-devel] [PATCH pve-network 3/5] api2: zones: fix update Alexandre Derumier
` (3 subsequent siblings)
5 siblings, 0 replies; 7+ messages in thread
From: Alexandre Derumier @ 2021-11-05 8:06 UTC (permalink / raw)
To: pve-devel
---
PVE/Network/SDN.pm | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/PVE/Network/SDN.pm b/PVE/Network/SDN.pm
index d3399ce..b95dd5b 100644
--- a/PVE/Network/SDN.pm
+++ b/PVE/Network/SDN.pm
@@ -193,7 +193,7 @@ sub get_local_vnets {
my $privs = [ 'SDN.Audit', 'SDN.Allocate' ];
next if !$zoneid;
- next if !$rpcenv->check_any($authuser, "/sdn/zones/$zoneid", $privs, 1);
+ next if !$rpcenv->check_any($authuser, "/sdn/zones/$zoneid", $privs, 1) && !$rpcenv->check_any($authuser, "/sdn/vnets/$vnetid", $privs, 1);
my $zone_config = PVE::Network::SDN::Zones::sdn_zones_config($zones_cfg, $zoneid);
--
2.30.2
^ permalink raw reply [flat|nested] 7+ messages in thread
* [pve-devel] [PATCH pve-network 3/5] api2: zones: fix update
2021-11-05 8:06 [pve-devel] [PATCH pve-network 0/5] sdn fixes and improvements Alexandre Derumier
2021-11-05 8:06 ` [pve-devel] [PATCH pve-network 1/5] vnet/subnet : add skipdns option Alexandre Derumier
2021-11-05 8:06 ` [pve-devel] [PATCH pve-network 2/5] get_local_vnets: add permissions on /sdn/vnets/* Alexandre Derumier
@ 2021-11-05 8:06 ` Alexandre Derumier
2021-11-05 8:06 ` [pve-devel] [PATCH pve-network 4/5] zones: evpn: add disable-arp-nd-suppression option Alexandre Derumier
` (2 subsequent siblings)
5 siblings, 0 replies; 7+ messages in thread
From: Alexandre Derumier @ 2021-11-05 8:06 UTC (permalink / raw)
To: pve-devel
---
PVE/API2/Network/SDN/Zones.pm | 4 +---
1 file changed, 1 insertion(+), 3 deletions(-)
diff --git a/PVE/API2/Network/SDN/Zones.pm b/PVE/API2/Network/SDN/Zones.pm
index 9485590..6e53240 100644
--- a/PVE/API2/Network/SDN/Zones.pm
+++ b/PVE/API2/Network/SDN/Zones.pm
@@ -284,9 +284,7 @@ __PACKAGE__->register_method ({
}
}
- for my $k (%$opts) {
- $scfg->{$k} = $opts->{$k};
- }
+ $zone_cfg->{ids}->{$id} = $opts;
my $dnsserver = $opts->{dns};
raise_param_exc({ dns => "$dnsserver don't exist"}) if $dnsserver && !$dns_cfg->{ids}->{$dnsserver};
--
2.30.2
^ permalink raw reply [flat|nested] 7+ messages in thread
* [pve-devel] [PATCH pve-network 4/5] zones: evpn: add disable-arp-nd-suppression option
2021-11-05 8:06 [pve-devel] [PATCH pve-network 0/5] sdn fixes and improvements Alexandre Derumier
` (2 preceding siblings ...)
2021-11-05 8:06 ` [pve-devel] [PATCH pve-network 3/5] api2: zones: fix update Alexandre Derumier
@ 2021-11-05 8:06 ` Alexandre Derumier
2021-11-05 8:06 ` [pve-devel] [PATCH pve-network 5/5] vnets: alias: fix regex Alexandre Derumier
2021-11-09 18:01 ` [pve-devel] applied-series: [PATCH pve-network 0/5] sdn fixes and improvements Thomas Lamprecht
5 siblings, 0 replies; 7+ messages in thread
From: Alexandre Derumier @ 2021-11-05 8:06 UTC (permalink / raw)
To: pve-devel
arp-nd-suppression can break ip mobility,
when an ip from a vm is moved to another vm, with different mac.
For example, with a keepalived vip, the garp is filtered.
---
PVE/Network/SDN/Zones/EvpnPlugin.pm | 10 ++++-
.../expected_controller_config | 31 ++++++++++++++
.../expected_sdn_interfaces | 40 +++++++++++++++++++
.../disable_arp_nd_suppression/interfaces | 7 ++++
.../disable_arp_nd_suppression/sdn_config | 26 ++++++++++++
5 files changed, 112 insertions(+), 2 deletions(-)
create mode 100644 test/zones/evpn/disable_arp_nd_suppression/expected_controller_config
create mode 100644 test/zones/evpn/disable_arp_nd_suppression/expected_sdn_interfaces
create mode 100644 test/zones/evpn/disable_arp_nd_suppression/interfaces
create mode 100644 test/zones/evpn/disable_arp_nd_suppression/sdn_config
diff --git a/PVE/Network/SDN/Zones/EvpnPlugin.pm b/PVE/Network/SDN/Zones/EvpnPlugin.pm
index 648f7c7..50ea619 100644
--- a/PVE/Network/SDN/Zones/EvpnPlugin.pm
+++ b/PVE/Network/SDN/Zones/EvpnPlugin.pm
@@ -44,6 +44,11 @@ sub properties {
type => 'boolean',
description => "Advertise evpn subnets if you have silent hosts",
optional => 1
+ },
+ 'disable-arp-nd-suppression' => {
+ type => 'boolean',
+ description => "Disable ipv4 arp && ipv6 neighbour discovery suppression",
+ optional => 1
}
};
}
@@ -56,6 +61,7 @@ sub options {
exitnodes => { optional => 1 },
'exitnodes-local-routing' => { optional => 1 },
'advertise-subnets' => { optional => 1 },
+ 'disable-arp-nd-suppression' => { optional => 1 },
mtu => { optional => 1 },
mac => { optional => 1 },
dns => { optional => 1 },
@@ -99,7 +105,7 @@ sub generate_sdn_config {
push @iface_config, "vxlan-id $tag";
push @iface_config, "vxlan-local-tunnelip $ifaceip" if $ifaceip;
push @iface_config, "bridge-learning off";
- push @iface_config, "bridge-arp-nd-suppress on";
+ push @iface_config, "bridge-arp-nd-suppress on" if !$plugin_config->{'disable-arp-nd-suppression'};
push @iface_config, "mtu $mtu" if $mtu;
push(@{$config->{$vxlan_iface}}, @iface_config) if !$config->{$vxlan_iface};
@@ -186,7 +192,7 @@ sub generate_sdn_config {
push @iface_config, "vxlan-id $vrfvxlan";
push @iface_config, "vxlan-local-tunnelip $ifaceip" if $ifaceip;
push @iface_config, "bridge-learning off";
- push @iface_config, "bridge-arp-nd-suppress on";
+ push @iface_config, "bridge-arp-nd-suppress on" if !$plugin_config->{'disable-arp-nd-suppression'};
push @iface_config, "mtu $mtu" if $mtu;
push(@{$config->{$iface_vrf_vxlan}}, @iface_config) if !$config->{$iface_vrf_vxlan};
diff --git a/test/zones/evpn/disable_arp_nd_suppression/expected_controller_config b/test/zones/evpn/disable_arp_nd_suppression/expected_controller_config
new file mode 100644
index 0000000..c0ca898
--- /dev/null
+++ b/test/zones/evpn/disable_arp_nd_suppression/expected_controller_config
@@ -0,0 +1,31 @@
+log syslog informational
+ip forwarding
+ipv6 forwarding
+frr defaults datacenter
+service integrated-vtysh-config
+hostname localhost
+!
+!
+vrf vrf_myzone
+ vni 1000
+exit-vrf
+!
+router bgp 65000
+ bgp router-id 192.168.0.1
+ no bgp default ipv4-unicast
+ coalesce-time 1000
+ neighbor VTEP peer-group
+ neighbor VTEP remote-as 65000
+ neighbor VTEP bfd
+ neighbor 192.168.0.2 peer-group VTEP
+ neighbor 192.168.0.3 peer-group VTEP
+ !
+ address-family l2vpn evpn
+ neighbor VTEP activate
+ advertise-all-vni
+ exit-address-family
+!
+router bgp 65000 vrf vrf_myzone
+!
+line vty
+!
\ No newline at end of file
diff --git a/test/zones/evpn/disable_arp_nd_suppression/expected_sdn_interfaces b/test/zones/evpn/disable_arp_nd_suppression/expected_sdn_interfaces
new file mode 100644
index 0000000..bbde906
--- /dev/null
+++ b/test/zones/evpn/disable_arp_nd_suppression/expected_sdn_interfaces
@@ -0,0 +1,40 @@
+#version:1
+
+auto myvnet
+iface myvnet
+ address 10.0.0.1/24
+ hwaddress A2:1D:CB:1A:C0:8B
+ bridge_ports vxlan_myvnet
+ bridge_stp off
+ bridge_fd 0
+ mtu 1450
+ ip-forward on
+ arp-accept on
+ vrf vrf_myzone
+
+auto vrf_myzone
+iface vrf_myzone
+ vrf-table auto
+ post-up ip route add vrf vrf_myzone unreachable default metric 4278198272
+
+auto vrfbr_myzone
+iface vrfbr_myzone
+ bridge-ports vrfvx_myzone
+ bridge_stp off
+ bridge_fd 0
+ mtu 1450
+ vrf vrf_myzone
+
+auto vrfvx_myzone
+iface vrfvx_myzone
+ vxlan-id 1000
+ vxlan-local-tunnelip 192.168.0.1
+ bridge-learning off
+ mtu 1450
+
+auto vxlan_myvnet
+iface vxlan_myvnet
+ vxlan-id 100
+ vxlan-local-tunnelip 192.168.0.1
+ bridge-learning off
+ mtu 1450
diff --git a/test/zones/evpn/disable_arp_nd_suppression/interfaces b/test/zones/evpn/disable_arp_nd_suppression/interfaces
new file mode 100644
index 0000000..66bb826
--- /dev/null
+++ b/test/zones/evpn/disable_arp_nd_suppression/interfaces
@@ -0,0 +1,7 @@
+auto vmbr0
+iface vmbr0 inet static
+ address 192.168.0.1/24
+ gateway 192.168.0.254
+ bridge-ports eth0
+ bridge-stp off
+ bridge-fd 0
diff --git a/test/zones/evpn/disable_arp_nd_suppression/sdn_config b/test/zones/evpn/disable_arp_nd_suppression/sdn_config
new file mode 100644
index 0000000..199596b
--- /dev/null
+++ b/test/zones/evpn/disable_arp_nd_suppression/sdn_config
@@ -0,0 +1,26 @@
+{
+ version => 1,
+ vnets => {
+ ids => {
+ myvnet => { tag => "100", type => "vnet", zone => "myzone" },
+ },
+ },
+
+ zones => {
+ ids => { myzone => { ipam => "pve", type => "evpn", controller => "evpnctl", 'vrf-vxlan' => 1000, 'mac' => 'A2:1D:CB:1A:C0:8B', 'disable-arp-nd-suppression' => 1 } },
+ },
+ controllers => {
+ ids => { evpnctl => { type => "evpn", 'peers' => '192.168.0.1,192.168.0.2,192.168.0.3', asn => "65000" } },
+ },
+
+ subnets => {
+ ids => { 'myzone-10.0.0.0-24' => {
+ 'type' => 'subnet',
+ 'vnet' => 'myvnet',
+ 'gateway' => '10.0.0.1',
+ }
+ }
+ }
+}
+
+
--
2.30.2
^ permalink raw reply [flat|nested] 7+ messages in thread
* [pve-devel] [PATCH pve-network 5/5] vnets: alias: fix regex
2021-11-05 8:06 [pve-devel] [PATCH pve-network 0/5] sdn fixes and improvements Alexandre Derumier
` (3 preceding siblings ...)
2021-11-05 8:06 ` [pve-devel] [PATCH pve-network 4/5] zones: evpn: add disable-arp-nd-suppression option Alexandre Derumier
@ 2021-11-05 8:06 ` Alexandre Derumier
2021-11-09 18:01 ` [pve-devel] applied-series: [PATCH pve-network 0/5] sdn fixes and improvements Thomas Lamprecht
5 siblings, 0 replies; 7+ messages in thread
From: Alexandre Derumier @ 2021-11-05 8:06 UTC (permalink / raw)
To: pve-devel
---
PVE/Network/SDN/VnetPlugin.pm | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/PVE/Network/SDN/VnetPlugin.pm b/PVE/Network/SDN/VnetPlugin.pm
index 121fb7f..062904c 100644
--- a/PVE/Network/SDN/VnetPlugin.pm
+++ b/PVE/Network/SDN/VnetPlugin.pm
@@ -68,7 +68,7 @@ sub properties {
alias => {
type => 'string',
description => "alias name of the vnet",
- pattern => qr/[a-z0-9\._\-\+\s]{1,256}/i,
+ pattern => qr/[\(\)-_.\w\d\s]{0,256}/i,
maxLength => 256,
optional => 1,
},
--
2.30.2
^ permalink raw reply [flat|nested] 7+ messages in thread
* [pve-devel] applied-series: [PATCH pve-network 0/5] sdn fixes and improvements
2021-11-05 8:06 [pve-devel] [PATCH pve-network 0/5] sdn fixes and improvements Alexandre Derumier
` (4 preceding siblings ...)
2021-11-05 8:06 ` [pve-devel] [PATCH pve-network 5/5] vnets: alias: fix regex Alexandre Derumier
@ 2021-11-09 18:01 ` Thomas Lamprecht
5 siblings, 0 replies; 7+ messages in thread
From: Thomas Lamprecht @ 2021-11-09 18:01 UTC (permalink / raw)
To: Proxmox VE development discussion, Alexandre Derumier
On 05.11.21 09:06, Alexandre Derumier wrote:
> This is a resubmit of last months patches
> + some new fix && features for evpn.
>
>
>
> Alexandre Derumier (5):
> vnet/subnet : add skipdns option
> get_local_vnets: add permissions on /sdn/vnets/*
> api2: zones: fix update
> zones: evpn: add disable-arp-nd-suppression option
> vnets: alias: fix regex
>
> PVE/API2/Network/SDN/Zones.pm | 4 +-
> PVE/Network/SDN.pm | 2 +-
> PVE/Network/SDN/Subnets.pm | 70 +++++++++++--------
> PVE/Network/SDN/VnetPlugin.pm | 2 +-
> PVE/Network/SDN/Vnets.pm | 16 ++---
> PVE/Network/SDN/Zones/EvpnPlugin.pm | 10 ++-
> .../expected_controller_config | 31 ++++++++
> .../expected_sdn_interfaces | 40 +++++++++++
> .../disable_arp_nd_suppression/interfaces | 7 ++
> .../disable_arp_nd_suppression/sdn_config | 26 +++++++
> 10 files changed, 164 insertions(+), 44 deletions(-)
> create mode 100644 test/zones/evpn/disable_arp_nd_suppression/expected_controller_config
> create mode 100644 test/zones/evpn/disable_arp_nd_suppression/expected_sdn_interfaces
> create mode 100644 test/zones/evpn/disable_arp_nd_suppression/interfaces
> create mode 100644 test/zones/evpn/disable_arp_nd_suppression/sdn_config
>
applied series (albeit the "add permissions on /sdn/vnets/*" was already applied), thanks!
^ permalink raw reply [flat|nested] 7+ messages in thread
end of thread, other threads:[~2021-11-09 18:01 UTC | newest]
Thread overview: 7+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-11-05 8:06 [pve-devel] [PATCH pve-network 0/5] sdn fixes and improvements Alexandre Derumier
2021-11-05 8:06 ` [pve-devel] [PATCH pve-network 1/5] vnet/subnet : add skipdns option Alexandre Derumier
2021-11-05 8:06 ` [pve-devel] [PATCH pve-network 2/5] get_local_vnets: add permissions on /sdn/vnets/* Alexandre Derumier
2021-11-05 8:06 ` [pve-devel] [PATCH pve-network 3/5] api2: zones: fix update Alexandre Derumier
2021-11-05 8:06 ` [pve-devel] [PATCH pve-network 4/5] zones: evpn: add disable-arp-nd-suppression option Alexandre Derumier
2021-11-05 8:06 ` [pve-devel] [PATCH pve-network 5/5] vnets: alias: fix regex Alexandre Derumier
2021-11-09 18:01 ` [pve-devel] applied-series: [PATCH pve-network 0/5] sdn fixes and improvements Thomas Lamprecht
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.
Service provided by Proxmox Server Solutions GmbH | Privacy | Legal