From: Christian Ebner <c.ebner@proxmox.com>
To: Lukas Wagner <l.wagner@proxmox.com>,
Proxmox Backup Server development discussion
<pbs-devel@lists.proxmox.com>
Subject: Re: [pbs-devel] [PATCH proxmox-backup v8 35/45] api/datastore: implement refresh endpoint for stores with s3 backend
Date: Fri, 18 Jul 2025 17:51:29 +0200 [thread overview]
Message-ID: <23ec1079-d48b-4c75-97e4-292ab14cecff@proxmox.com> (raw)
In-Reply-To: <15940f16-08c8-405d-aa87-85ef51cd7fc3@proxmox.com>
On 7/18/25 2:00 PM, Lukas Wagner wrote:
>
>
> On 2025-07-15 14:53, Christian Ebner wrote:
>> Allows to easily refresh the contents on the local cache store for
>> datastores backed by an S3 object store.
>>
>> In order to guarantee that no read or write operations are ongoing,
>> the store is first set into the maintenance mode `S3Refresh`. Objects
>> are then fetched into a temporary directory to avoid loosing contents
>> and consistency in case of an error. Once all objects have been
>> fetched, clears out existing contents and moves the newly fetched
>> contents in place.
>>
>> Signed-off-by: Christian Ebner <c.ebner@proxmox.com>
>> ---
>> changes since version 7:
>> - add more error context
>> - fix clippy warning
>>
>> pbs-datastore/src/datastore.rs | 172 ++++++++++++++++++++++++++++++++-
>> src/api2/admin/datastore.rs | 34 +++++++
>> 2 files changed, 205 insertions(+), 1 deletion(-)
>>
>> diff --git a/pbs-datastore/src/datastore.rs b/pbs-datastore/src/datastore.rs
>> index cab0f5b4d..c63759f9a 100644
>> --- a/pbs-datastore/src/datastore.rs
>> +++ b/pbs-datastore/src/datastore.rs
>> @@ -10,11 +10,13 @@ use anyhow::{bail, format_err, Context, Error};
>> use http_body_util::BodyExt;
>> use nix::unistd::{unlinkat, UnlinkatFlags};
>> use pbs_tools::lru_cache::LruCache;
>> +use proxmox_lang::try_block;
>> +use tokio::io::AsyncWriteExt;
>> use tracing::{info, warn};
>>
>> use proxmox_human_byte::HumanByte;
>> use proxmox_s3_client::{
>> - S3Client, S3ClientConfig, S3ClientOptions, S3ClientSecretsConfig, S3PathPrefix,
>> + S3Client, S3ClientConfig, S3ClientOptions, S3ClientSecretsConfig, S3ObjectKey, S3PathPrefix,
>> };
>> use proxmox_schema::ApiType;
>>
>> @@ -2132,4 +2134,172 @@ impl DataStore {
>> pub fn old_locking(&self) -> bool {
>> *OLD_LOCKING
>> }
>> +
>> + /// Set the datastore's maintenance mode to `S3Refresh`, fetch from S3 object store, clear and
>> + /// replace the local cache store contents. Once finished disable the maintenance mode again.
>> + /// Returns with error for other datastore backends without setting the maintenance mode.
>> + pub async fn s3_refresh(self: &Arc<Self>) -> Result<(), Error> {
>> + match self.backend()? {
>> + DatastoreBackend::Filesystem => bail!("store '{}' not backed by S3", self.name()),
>> + DatastoreBackend::S3(s3_client) => {
>> + try_block!({
>> + let _lock = pbs_config::datastore::lock_config()?;
>> + let (mut section_config, _digest) = pbs_config::datastore::config()?;
>> + let mut datastore: DataStoreConfig =
>> + section_config.lookup("datastore", self.name())?;
>> + datastore.set_maintenance_mode(Some(MaintenanceMode {
>> + ty: MaintenanceType::S3Refresh,
>> + message: None,
>> + }))?;
>> + section_config.set_data(self.name(), "datastore", &datastore)?;
>> + pbs_config::datastore::save_config(§ion_config)?;
>> + drop(_lock);
>
>
> No need to drop the lock, since the block ends anyway, right?'
Agreed, dropping that here.
>
> Also this should be done in a tokio::spawn_blocking, if I'm not mistaken?
> (the try_block! is only a convenience wrapper that wraps the block in a function,
> it doesn't spawn the block on the blocking thread pool)
True, allows me to also get rid of the try_block after adapting that
here ...
>
>> + Ok::<(), Error>(())
>> + })
>> + .context("failed to set maintenance mode")?;
>> +
>> + let store_base = self.base_path();
>> +
>> + let tmp_base = proxmox_sys::fs::make_tmp_dir(&store_base, None)
>> + .context("failed to create temporary content folder in {store_base}")?;
>> +
>> + let backup_user = pbs_config::backup_user().context("failed to get backup user")?;
>> + let mode = nix::sys::stat::Mode::from_bits_truncate(0o0644);
>> + let file_create_options = CreateOptions::new()
>> + .perm(mode)
>> + .owner(backup_user.uid)
>> + .group(backup_user.gid);
>> + let mode = nix::sys::stat::Mode::from_bits_truncate(0o0755);
>> + let dir_create_options = CreateOptions::new()
>> + .perm(mode)
>> + .owner(backup_user.uid)
>> + .group(backup_user.gid);
>> +
>> + let list_prefix = S3PathPrefix::Some(S3_CONTENT_PREFIX.to_string());
>> + let store_prefix = format!("{}/{S3_CONTENT_PREFIX}/", self.name());
>> + let mut next_continuation_token: Option<String> = None;
>> + loop {
>> + let list_objects_result = s3_client
>> + .list_objects_v2(&list_prefix, next_continuation_token.as_deref())
>> + .await
>> + .context("failed to list object")?;
>> +
>> + let objects_to_fetch: Vec<S3ObjectKey> = list_objects_result
>> + .contents
>> + .into_iter()
>> + .map(|item| item.key)
>> + .collect();
>> +
>> + for object_key in objects_to_fetch {
>> + let object_path = format!("{object_key}");
>> + let object_path = object_path.strip_prefix(&store_prefix).with_context(||
>> + format!("failed to strip store context prefix {store_prefix} for {object_key}")
>> + )?;
>> + if object_path.ends_with(NAMESPACE_MARKER_FILENAME) {
>> + continue;
>> + }
>> +
>> + info!("Fetching object {object_path}");
>> +
>> + let file_path = tmp_base.join(object_path);
>> + if let Some(parent) = file_path.parent() {
>> + proxmox_sys::fs::create_path(
>> + parent,
>> + Some(dir_create_options),
>> + Some(dir_create_options),
>> + )?;
>> + }
>> +
>> + let mut target_file = tokio::fs::OpenOptions::new()
>> + .write(true)
>> + .create(true)
>> + .truncate(true)
>> + .read(true)
>> + .open(&file_path)
>> + .await
>> + .with_context(|| {
>> + format!("failed to create target file {file_path:?}")
>> + })?;
>> +
>> + if let Some(response) = s3_client
>> + .get_object(object_key)
>> + .await
>> + .with_context(|| format!("failed to fetch object {object_path}"))?
>> + {
>> + let data = response
>> + .content
>> + .collect()
>> + .await
>> + .context("failed to collect object contents")?;
>> + target_file
>> + .write_all(&data.to_bytes())
>> + .await
>> + .context("failed to write to target file")?;
>> + file_create_options
>> + .apply_to(&mut target_file, &file_path)
>> + .context("failed to set target file create options")?;
>> + target_file
>> + .flush()
>> + .await
>> + .context("failed to flush target file")?;
>> + } else {
>> + bail!("failed to download {object_path}, not found");
>> + }
>> + }
>> +
>> + if list_objects_result.is_truncated {
>> + next_continuation_token = list_objects_result
>> + .next_continuation_token
>> + .as_ref()
>> + .cloned();
>> + continue;
>> + }
>> + break;
>> + }
>> +
>> + for ty in ["vm", "ct", "host", "ns"] {
>> + let store_base_clone = store_base.clone();
>> + let tmp_base_clone = tmp_base.clone();
>> + tokio::task::spawn_blocking(move || {
>> + let type_dir = store_base_clone.join(ty);
>> + if let Err(err) = std::fs::remove_dir_all(&type_dir) {
>> + if err.kind() != io::ErrorKind::NotFound {
>> + return Err(err).with_context(|| {
>> + format!("failed to remove old contents in {type_dir:?}")
>> + });
>> + }
>> + }
>> + let tmp_type_dir = tmp_base_clone.join(ty);
>> + if let Err(err) = std::fs::rename(&tmp_type_dir, &type_dir) {
>> + if err.kind() != io::ErrorKind::NotFound {
>> + return Err(err)
>> + .with_context(|| format!("failed to rename {tmp_type_dir:?}"));
>> + }
>> + }
>> + Ok::<(), Error>(())
>> + })
>> + .await?
>> + .with_context(|| format!("failed to refresh {store_base:?}"))?;
>> + }
>> +
>> + std::fs::remove_dir_all(&tmp_base).with_context(|| {
>> + format!("failed to cleanup temporary content in {tmp_base:?}")
>> + })?;
>> +
>> + try_block!({
>> + let _lock = pbs_config::datastore::lock_config()?;
>> + let (mut section_config, _digest) = pbs_config::datastore::config()?;
>> + let mut datastore: DataStoreConfig =
>> + section_config.lookup("datastore", self.name())?;
>> + datastore.set_maintenance_mode(None)?;
>> + section_config.set_data(self.name(), "datastore", &datastore)?;
>> + pbs_config::datastore::save_config(§ion_config)?;
>> + drop(_lock);
>> + Ok::<(), Error>(())
>> + })
>> + .context("failed to clear maintenance mode")?;
>
> Same thing here.
... and here
>
>> + }
>> + }
>> + Ok(())
>> + }
>
> In general, I think the s3_refresh function is a good candidate to be broken up into multiple smaller functions
> - setting/unsetting maintenance mode
> - creating the new temporary dir
> - retrieving the objects from S3
> - replacing the old contents
> - etc.
Okay, will try to factor out parts of it, although I see not to much
benefit as this is rather self contained at the moment.
>> }
>> diff --git a/src/api2/admin/datastore.rs b/src/api2/admin/datastore.rs
>> index 80740e3fb..41cbee4de 100644
>> --- a/src/api2/admin/datastore.rs
>> +++ b/src/api2/admin/datastore.rs
>> @@ -2707,6 +2707,39 @@ pub async fn unmount(store: String, rpcenv: &mut dyn RpcEnvironment) -> Result<V
>> Ok(json!(upid))
>> }
>>
>> +#[api(
>> + protected: true,
>> + input: {
>> + properties: {
>> + store: {
>> + schema: DATASTORE_SCHEMA,
>> + },
>> + }
>> + },
>> + returns: {
>> + schema: UPID_SCHEMA,
>> + },
>> + access: {
>> + permission: &Permission::Privilege(&["datastore", "{store}"], PRIV_DATASTORE_MODIFY, false),
>> + },
>> +)]
>> +/// Refresh datastore contents from S3 to local cache store.
>> +pub async fn s3_refresh(store: String, rpcenv: &mut dyn RpcEnvironment) -> Result<Value, Error> {
>> + let datastore = DataStore::lookup_datastore(&store, Some(Operation::Lookup))?;
>> + let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
>> + let to_stdout = rpcenv.env_type() == RpcEnvironmentType::CLI;
>> +
>> + let upid = WorkerTask::spawn(
>> + "s3-refresh",
>> + Some(store),
>> + auth_id.to_string(),
>> + to_stdout,
>> + move |_worker| async move { datastore.s3_refresh().await },
>> + )?;
>> +
>> + Ok(json!(upid))
>> +}
>> +
>> #[sortable]
>> const DATASTORE_INFO_SUBDIRS: SubdirMap = &[
>> (
>> @@ -2773,6 +2806,7 @@ const DATASTORE_INFO_SUBDIRS: SubdirMap = &[
>> &Router::new().download(&API_METHOD_PXAR_FILE_DOWNLOAD),
>> ),
>> ("rrd", &Router::new().get(&API_METHOD_GET_RRD_STATS)),
>> + ("s3-refresh", &Router::new().put(&API_METHOD_S3_REFRESH)),
>> (
>> "snapshots",
>> &Router::new()
>
_______________________________________________
pbs-devel mailing list
pbs-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pbs-devel
next prev parent reply other threads:[~2025-07-18 15:50 UTC|newest]
Thread overview: 108+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-07-15 12:52 [pbs-devel] [PATCH proxmox{, -backup} v8 00/54] fix #2943: S3 storage backend for datastores Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox v8 1/9] s3 client: add crate for AWS s3 compatible object store client Christian Ebner
2025-07-15 21:13 ` [pbs-devel] partially-applied-series: " Thomas Lamprecht
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox v8 2/9] s3 client: implement AWS signature v4 request authentication Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox v8 3/9] s3 client: add dedicated type for s3 object keys Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox v8 4/9] s3 client: add type for last modified timestamp in responses Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox v8 5/9] s3 client: add helper to parse http date headers Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox v8 6/9] s3 client: implement methods to operate on s3 objects in bucket Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox v8 7/9] s3 client: add example usage for basic operations Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox v8 8/9] pbs-api-types: extend datastore config by backend config enum Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox v8 9/9] pbs-api-types: maintenance: add new maintenance mode S3 refresh Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox-backup v8 01/45] datastore: add helpers for path/digest to s3 object key conversion Christian Ebner
2025-07-18 7:24 ` Lukas Wagner
2025-07-18 8:34 ` Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox-backup v8 02/45] config: introduce s3 object store client configuration Christian Ebner
2025-07-18 7:22 ` Lukas Wagner
2025-07-18 8:37 ` Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox-backup v8 03/45] api: config: implement endpoints to manipulate and list s3 configs Christian Ebner
2025-07-18 7:32 ` Lukas Wagner
2025-07-18 8:40 ` Christian Ebner
2025-07-18 9:07 ` Lukas Wagner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox-backup v8 04/45] api: datastore: check s3 backend bucket access on datastore create Christian Ebner
2025-07-18 7:40 ` Lukas Wagner
2025-07-18 8:55 ` Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox-backup v8 05/45] api/cli: add endpoint and command to check s3 client connection Christian Ebner
2025-07-18 7:43 ` Lukas Wagner
2025-07-18 9:04 ` Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox-backup v8 06/45] datastore: allow to get the backend for a datastore Christian Ebner
2025-07-18 7:52 ` Lukas Wagner
2025-07-18 9:10 ` Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox-backup v8 07/45] api: backup: store datastore backend in runtime environment Christian Ebner
2025-07-18 7:54 ` Lukas Wagner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox-backup v8 08/45] api: backup: conditionally upload chunks to s3 object store backend Christian Ebner
2025-07-18 8:11 ` Lukas Wagner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox-backup v8 09/45] api: backup: conditionally upload blobs " Christian Ebner
2025-07-18 8:13 ` Lukas Wagner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox-backup v8 10/45] api: backup: conditionally upload indices " Christian Ebner
2025-07-18 8:20 ` Lukas Wagner
2025-07-18 9:24 ` Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox-backup v8 11/45] api: backup: conditionally upload manifest " Christian Ebner
2025-07-18 8:26 ` Lukas Wagner
2025-07-18 9:33 ` Christian Ebner
2025-07-15 12:52 ` [pbs-devel] [PATCH proxmox-backup v8 12/45] api: datastore: conditionally upload client log to s3 backend Christian Ebner
2025-07-18 8:28 ` Lukas Wagner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 13/45] sync: pull: conditionally upload content " Christian Ebner
2025-07-18 8:35 ` Lukas Wagner
2025-07-18 9:43 ` Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 14/45] api: reader: fetch chunks based on datastore backend Christian Ebner
2025-07-18 8:38 ` Lukas Wagner
2025-07-18 9:58 ` Christian Ebner
2025-07-18 10:03 ` Lukas Wagner
2025-07-18 10:10 ` Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 15/45] datastore: local chunk reader: read chunks based on backend Christian Ebner
2025-07-18 8:45 ` Lukas Wagner
2025-07-18 10:11 ` Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 16/45] verify worker: add datastore backed to verify worker Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 17/45] verify: implement chunk verification for stores with s3 backend Christian Ebner
2025-07-18 8:56 ` Lukas Wagner
2025-07-18 11:45 ` Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 18/45] datastore: create namespace marker in " Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 19/45] datastore: create/delete protected marker file on s3 storage backend Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 20/45] datastore: prune groups/snapshots from s3 object store backend Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 21/45] datastore: get and set owner for s3 " Christian Ebner
2025-07-18 9:25 ` Lukas Wagner
2025-07-18 12:12 ` Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 22/45] datastore: implement garbage collection for s3 backend Christian Ebner
2025-07-18 9:47 ` Lukas Wagner
2025-07-18 14:31 ` Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 23/45] ui: add datastore type selector and reorganize component layout Christian Ebner
2025-07-18 9:55 ` Lukas Wagner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 24/45] ui: add s3 client edit window for configuration create/edit Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 25/45] ui: add s3 client view for configuration Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 26/45] ui: expose the s3 client view in the navigation tree Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 27/45] ui: add s3 client selector and bucket field for s3 backend setup Christian Ebner
2025-07-18 10:02 ` Lukas Wagner
2025-07-19 12:28 ` Christian Ebner
2025-07-22 9:25 ` Lukas Wagner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 28/45] tools: lru cache: add removed callback for evicted cache nodes Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 29/45] tools: async lru cache: implement insert, remove and contains methods Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 30/45] datastore: add local datastore cache for network attached storages Christian Ebner
2025-07-18 11:24 ` Lukas Wagner
2025-07-18 14:59 ` Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 31/45] api: backup: use local datastore cache on s3 backend chunk upload Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 32/45] api: reader: use local datastore cache on s3 backend chunk fetching Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 33/45] datastore: local chunk reader: get cached chunk from local cache store Christian Ebner
2025-07-18 11:36 ` Lukas Wagner
2025-07-18 15:04 ` Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 34/45] api: backup: add no-cache flag to bypass local datastore cache Christian Ebner
2025-07-18 11:41 ` Lukas Wagner
2025-07-18 15:37 ` Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 35/45] api/datastore: implement refresh endpoint for stores with s3 backend Christian Ebner
2025-07-18 12:01 ` Lukas Wagner
2025-07-18 15:51 ` Christian Ebner [this message]
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 36/45] cli: add dedicated subcommand for datastore s3 refresh Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 37/45] ui: render s3 refresh as valid maintenance type and task description Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 38/45] ui: expose s3 refresh button for datastores backed by object store Christian Ebner
2025-07-18 12:46 ` Lukas Wagner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 39/45] datastore: conditionally upload atime marker chunk to s3 backend Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 40/45] bin: implement client subcommands for s3 configuration manipulation Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 41/45] bin: expose reuse-datastore flag for proxmox-backup-manager Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 42/45] datastore: mark store as in-use by setting marker on s3 backend Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 43/45] datastore: run s3-refresh when reusing a datastore with " Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 44/45] api/ui: add flag to allow overwriting in-use marker for " Christian Ebner
2025-07-15 12:53 ` [pbs-devel] [PATCH proxmox-backup v8 45/45] docs: Add section describing how to setup s3 backed datastore Christian Ebner
2025-07-18 13:14 ` Maximiliano Sandoval
2025-07-18 14:38 ` Christian Ebner
2025-07-18 13:16 ` [pbs-devel] [PATCH proxmox{, -backup} v8 00/54] fix #2943: S3 storage backend for datastores Lukas Wagner
2025-07-19 12:52 ` [pbs-devel] superseded: " Christian Ebner
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=23ec1079-d48b-4c75-97e4-292ab14cecff@proxmox.com \
--to=c.ebner@proxmox.com \
--cc=l.wagner@proxmox.com \
--cc=pbs-devel@lists.proxmox.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox