public inbox for pdm-devel@lists.proxmox.com
 help / color / mirror / Atom feed
From: Stefan Hanreich <s.hanreich@proxmox.com>
To: pdm-devel@lists.proxmox.com
Subject: [pdm-devel] [PATCH proxmox-datacenter-manager 10/16] ui: sdn: add remote tree component
Date: Wed, 27 Aug 2025 13:33:59 +0200	[thread overview]
Message-ID: <20250827113427.199253-27-s.hanreich@proxmox.com> (raw)
In-Reply-To: <20250827113427.199253-1-s.hanreich@proxmox.com>

This component shows the current state of all EVPN zones across all
remotes. It shows which zones are configured on a remote and which
VNets it contains. It also shows which remote VNets get imported via
the 'Import Route Target' setting in the EVPN zone. While the ZoneTree
component shows the contents of an IP-VRF merged across all remotes,
the RemoteTree shows the contents of a specific zone on a specific
remote, including all imported VNets.

Similar to the ZoneTree component, this component operates under the
assumption that ASNs are not reused across different remotes, unless
those zones are actually interconnected. For example: One zone imports
a specific ASN:VNI route target. If two zones with the same ASN:VNI
combination exist, but only one of them is connected to the zone, it
will still show the VNets of *both* zones as imported, since it merges
based on ASN:VNI.

Signed-off-by: Stefan Hanreich <s.hanreich@proxmox.com>
---
 ui/src/sdn/evpn/mod.rs         |   3 +
 ui/src/sdn/evpn/remote_tree.rs | 486 +++++++++++++++++++++++++++++++++
 2 files changed, 489 insertions(+)
 create mode 100644 ui/src/sdn/evpn/remote_tree.rs

diff --git a/ui/src/sdn/evpn/mod.rs b/ui/src/sdn/evpn/mod.rs
index 2515354..c2958f0 100644
--- a/ui/src/sdn/evpn/mod.rs
+++ b/ui/src/sdn/evpn/mod.rs
@@ -1,3 +1,6 @@
+mod remote_tree;
+pub use remote_tree::RemoteTree;
+
 #[derive(Clone, Copy, Debug, PartialEq, Eq, Ord, PartialOrd, Hash)]
 pub struct EvpnRouteTarget {
     asn: u32,
diff --git a/ui/src/sdn/evpn/remote_tree.rs b/ui/src/sdn/evpn/remote_tree.rs
new file mode 100644
index 0000000..25dbbac
--- /dev/null
+++ b/ui/src/sdn/evpn/remote_tree.rs
@@ -0,0 +1,486 @@
+use std::cmp::Ordering;
+use std::collections::HashSet;
+use std::rc::Rc;
+use std::str::FromStr;
+
+use anyhow::{format_err, Error};
+use pwt::widget::{error_message, Column};
+use yew::virtual_dom::{Key, VNode};
+use yew::{Component, Context, Html, Properties};
+
+use pdm_client::types::{ListController, ListVnet, ListZone, SdnObjectState};
+use pwt::css;
+use pwt::props::{ContainerBuilder, ExtractPrimaryKey, WidgetBuilder};
+use pwt::state::{Selection, SlabTree, TreeStore};
+use pwt::tr;
+use pwt::widget::data_table::{
+    DataTable, DataTableColumn, DataTableHeader, DataTableRowRenderArgs,
+};
+use pwt::widget::{Fa, Row};
+use pwt_macros::widget;
+
+use crate::sdn::evpn::EvpnRouteTarget;
+
+#[widget(comp=RemoteTreeComponent)]
+#[derive(Clone, PartialEq, Properties, Default)]
+pub struct RemoteTree {
+    zones: Rc<Vec<ListZone>>,
+    vnets: Rc<Vec<ListVnet>>,
+    controllers: Rc<Vec<ListController>>,
+}
+
+impl RemoteTree {
+    pub fn new(
+        zones: Rc<Vec<ListZone>>,
+        vnets: Rc<Vec<ListVnet>>,
+        controllers: Rc<Vec<ListController>>,
+    ) -> Self {
+        yew::props!(Self {
+            zones,
+            vnets,
+            controllers,
+        })
+    }
+}
+
+pub enum RemoteTreeMsg {
+    SelectionChange,
+}
+
+#[derive(Clone, PartialEq, Debug)]
+struct RemoteData {
+    id: String,
+    asn: u32,
+}
+
+#[derive(Clone, PartialEq, Debug)]
+struct ZoneData {
+    id: String,
+    remote: String,
+    route_target: EvpnRouteTarget,
+    import_targets: HashSet<EvpnRouteTarget>,
+    state: Option<SdnObjectState>,
+    controller_id: String,
+}
+
+#[derive(Clone, PartialEq, Debug)]
+struct VnetData {
+    parent_remote: String,
+    parent_zone: String,
+    id: String,
+    zone: String,
+    remote: String,
+    route_target: EvpnRouteTarget,
+    imported: bool,
+    external: bool,
+    state: Option<SdnObjectState>,
+}
+
+#[derive(Clone, PartialEq, Debug)]
+enum RemoteTreeEntry {
+    Root,
+    Remote(RemoteData),
+    Zone(ZoneData),
+    Vnet(VnetData),
+}
+
+impl ExtractPrimaryKey for RemoteTreeEntry {
+    fn extract_key(&self) -> Key {
+        match self {
+            Self::Root => Key::from("root"),
+            Self::Remote(remote) => Key::from(remote.id.clone()),
+            Self::Zone(zone) => Key::from(format!("{}/{}", zone.remote, zone.id)),
+            Self::Vnet(vnet) => Key::from(format!(
+                "{}/{}/{}/{}/{}",
+                vnet.remote, vnet.parent_remote, vnet.parent_zone, vnet.zone, vnet.id
+            )),
+        }
+    }
+}
+
+impl RemoteTreeEntry {
+    fn name(&self) -> Option<String> {
+        match self {
+            RemoteTreeEntry::Root => None,
+            RemoteTreeEntry::Remote(remote) => {
+                Some(format!("{} (ASN: {})", &remote.id, remote.asn))
+            }
+            RemoteTreeEntry::Zone(zone) => Some(zone.id.to_string()),
+            RemoteTreeEntry::Vnet(vnet) => Some(vnet.id.to_string()),
+        }
+    }
+
+    fn remote(&self) -> Option<&str> {
+        match self {
+            RemoteTreeEntry::Root => None,
+            RemoteTreeEntry::Remote(remote) => Some(&remote.id),
+            RemoteTreeEntry::Zone(zone) => Some(&zone.remote),
+            RemoteTreeEntry::Vnet(vnet) => Some(&vnet.remote),
+        }
+    }
+
+    fn l2vni(&self) -> Option<u32> {
+        match self {
+            RemoteTreeEntry::Vnet(vnet) => Some(vnet.route_target.vni),
+            _ => None,
+        }
+    }
+
+    fn l3vni(&self) -> Option<u32> {
+        match self {
+            RemoteTreeEntry::Zone(zone) => Some(zone.route_target.vni),
+            _ => None,
+        }
+    }
+
+    fn imported(&self) -> Option<bool> {
+        match self {
+            RemoteTreeEntry::Vnet(vnet) => Some(vnet.imported),
+            _ => None,
+        }
+    }
+}
+
+fn zones_to_remote_view(
+    controllers: &[ListController],
+    zones: &[ListZone],
+    vnets: &[ListVnet],
+) -> Result<SlabTree<RemoteTreeEntry>, Error> {
+    let mut tree = SlabTree::new();
+
+    let mut root = tree.set_root(RemoteTreeEntry::Root);
+    root.set_expanded(true);
+
+    for zone in zones {
+        let zone_data = &zone.zone;
+
+        let zone_controller_id = zone_data.controller.as_ref().ok_or_else(|| {
+            format_err!("EVPN zone {} has no controller defined!", zone_data.zone)
+        })?;
+
+        let controller = controllers
+            .iter()
+            .find(|controller| {
+                controller.remote == zone.remote
+                    && zone_controller_id == &controller.controller.controller
+            })
+            .ok_or_else(|| {
+                format_err!("Could not find Controller for EVPN zone {}", zone_data.zone)
+            })?;
+
+        let route_target = EvpnRouteTarget {
+            asn: controller.controller.asn.ok_or_else(|| {
+                format_err!(
+                    "EVPN controller {} has no ASN defined!",
+                    controller.controller.controller
+                )
+            })?,
+            vni: zone.zone.vrf_vxlan.ok_or_else(|| {
+                format_err!("EVPN Zone {} has no VXLAN ID defined!", zone_data.zone)
+            })?,
+        };
+
+        let import_targets = zone_data
+            .rt_import
+            .iter()
+            .flat_map(|rt_import| rt_import.split(',').map(EvpnRouteTarget::from_str))
+            .collect::<Result<_, Error>>()?;
+
+        let remote_entry = root.children_mut().find(|remote_entry| {
+            if let RemoteTreeEntry::Remote(remote) = remote_entry.record() {
+                return remote.id == zone.remote;
+            }
+
+            false
+        });
+
+        let zone_entry = RemoteTreeEntry::Zone(ZoneData {
+            id: zone_data.zone.clone(),
+            remote: zone.remote.clone(),
+            route_target,
+            import_targets,
+            state: zone_data.state,
+            controller_id: controller.controller.controller.clone(),
+        });
+
+        if let Some(mut remote_entry) = remote_entry {
+            remote_entry.append(zone_entry);
+        } else {
+            let mut new_remote_entry = root.append(RemoteTreeEntry::Remote(RemoteData {
+                id: zone.remote.clone(),
+                asn: route_target.asn,
+            }));
+
+            new_remote_entry.set_expanded(true);
+            new_remote_entry.append(zone_entry);
+        };
+    }
+
+    for vnet in vnets {
+        let vnet_data = &vnet.vnet;
+
+        let vnet_zone_id = vnet_data
+            .zone
+            .as_ref()
+            .ok_or_else(|| format_err!("VNet {} has no zone defined!", vnet_data.vnet))?;
+
+        let Some(zone) = zones
+            .iter()
+            .find(|zone| {
+                zone.remote == vnet.remote
+                    && vnet_zone_id == &zone.zone.zone
+        }) else {
+            // this VNet is not part of an EVPN zone, skip it
+            continue;
+        };
+
+        let zone_controller_id = zone.zone.controller.as_ref().ok_or_else(|| {
+            format_err!("EVPN zone {} has no controller defined!", &zone.zone.zone)
+        })?;
+
+        let controller = controllers
+            .iter()
+            .find(|controller| {
+                controller.remote == zone.remote
+                    && zone_controller_id == &controller.controller.controller
+            })
+            .ok_or_else(|| {
+                format_err!("Controller of EVPN zone {} does not exist", zone.zone.zone)
+            })?;
+
+        let controller_asn = controller.controller.asn.ok_or_else(|| {
+            format_err!(
+                "EVPN controller {} has no ASN defined!",
+                controller.controller.controller
+            )
+        })?;
+
+        let zone_target = EvpnRouteTarget {
+            asn: controller_asn,
+            vni: zone
+                .zone
+                .vrf_vxlan
+                .ok_or_else(|| format_err!("EVPN Zone {} has no VRF VNI", zone.zone.zone))?,
+        };
+
+        let vnet_target = EvpnRouteTarget {
+            asn: controller_asn,
+            vni: vnet_data
+                .tag
+                .ok_or_else(|| format_err!("VNet {} has no VNI", vnet_data.vnet))?,
+        };
+
+        for mut remote_entry in root.children_mut() {
+            for mut zone_entry in remote_entry.children_mut() {
+                if let RemoteTreeEntry::Zone(zone) = zone_entry.record() {
+                    let imported = if zone.route_target == zone_target {
+                        false
+                    } else if zone.import_targets.contains(&zone_target)
+                        || zone.import_targets.contains(&vnet_target)
+                    {
+                        true
+                    } else {
+                        continue;
+                    };
+
+                    zone_entry.append(RemoteTreeEntry::Vnet(VnetData {
+                        id: vnet.vnet.vnet.clone(),
+                        remote: vnet.remote.clone(),
+                        zone: vnet.vnet.zone.clone().unwrap(),
+                        route_target: vnet_target,
+                        imported,
+                        external: zone.remote != vnet.remote,
+                        parent_remote: zone.remote.clone(),
+                        parent_zone: zone.id.clone(),
+                        state: vnet.vnet.state,
+                    }));
+                }
+            }
+        }
+    }
+
+    Ok(tree)
+}
+pub struct RemoteTreeComponent {
+    store: TreeStore<RemoteTreeEntry>,
+    selection: Selection,
+    error_msg: Option<String>,
+}
+
+fn name_remote_sorter(a: &RemoteTreeEntry, b: &RemoteTreeEntry) -> Ordering {
+    (a.name(), a.remote()).cmp(&(b.name(), b.remote()))
+}
+
+fn default_sorter(a: &RemoteTreeEntry, b: &RemoteTreeEntry) -> Ordering {
+    (a.imported(), a.name(), a.remote(), a.l3vni(), a.l2vni()).cmp(&(
+        b.imported(),
+        b.name(),
+        b.remote(),
+        b.l3vni(),
+        b.l2vni(),
+    ))
+}
+
+impl RemoteTreeComponent {
+    fn columns(store: TreeStore<RemoteTreeEntry>) -> Rc<Vec<DataTableHeader<RemoteTreeEntry>>> {
+        Rc::new(vec![
+            DataTableColumn::new(tr!("Name"))
+                .tree_column(store)
+                .sorter(name_remote_sorter)
+                .render(|item: &RemoteTreeEntry| {
+                    let name = item.name();
+
+                    name.map(|name| {
+                        let mut row = Row::new().class(css::AlignItems::Baseline).gap(2);
+
+                        row = match item {
+                            RemoteTreeEntry::Remote(_) => row.with_child(Fa::new("server")),
+                            RemoteTreeEntry::Zone(_) => row.with_child(Fa::new("th")),
+                            _ => row,
+                        };
+
+                        row = row.with_child(name);
+
+                        Html::from(row)
+                    })
+                    .unwrap_or_default()
+                })
+                .flex(2)
+                .into(),
+            DataTableColumn::new(tr!("Remote"))
+                .get_property(|item: &RemoteTreeEntry| match item {
+                    RemoteTreeEntry::Zone(zone) => zone.remote.as_str(),
+                    RemoteTreeEntry::Vnet(vnet) => vnet.remote.as_str(),
+                    _ => "",
+                })
+                .flex(1)
+                .into(),
+            DataTableColumn::new(tr!("L3VNI"))
+                .render(|item: &RemoteTreeEntry| item.l3vni().map(VNode::from).unwrap_or_default())
+                .sorter(|a: &RemoteTreeEntry, b: &RemoteTreeEntry| a.l3vni().cmp(&b.l3vni()))
+                .flex(1)
+                .into(),
+            DataTableColumn::new(tr!("L2VNI"))
+                .render(|item: &RemoteTreeEntry| item.l2vni().map(VNode::from).unwrap_or_default())
+                .sorter(|a: &RemoteTreeEntry, b: &RemoteTreeEntry| a.l2vni().cmp(&b.l2vni()))
+                .flex(1)
+                .into(),
+            DataTableColumn::new(tr!("External"))
+                .get_property_owned(|item: &RemoteTreeEntry| match item {
+                    RemoteTreeEntry::Vnet(vnet) if vnet.external => tr!("Yes"),
+                    RemoteTreeEntry::Vnet(vnet) if !vnet.external => tr!("No"),
+                    _ => String::new(),
+                })
+                .flex(1)
+                .into(),
+            DataTableColumn::new(tr!("Imported"))
+                .get_property_owned(|item: &RemoteTreeEntry| match item {
+                    RemoteTreeEntry::Vnet(vnet) if vnet.imported => tr!("Yes"),
+                    RemoteTreeEntry::Vnet(vnet) if !vnet.imported => tr!("No"),
+                    _ => String::new(),
+                })
+                .flex(1)
+                .into(),
+        ])
+    }
+}
+
+impl Component for RemoteTreeComponent {
+    type Properties = RemoteTree;
+    type Message = RemoteTreeMsg;
+
+    fn create(ctx: &Context<Self>) -> Self {
+        let store = TreeStore::new().view_root(false);
+
+        let selection =
+            Selection::new().on_select(ctx.link().callback(|_| Self::Message::SelectionChange));
+
+        let mut error_msg = None;
+
+        match zones_to_remote_view(
+            &ctx.props().controllers,
+            &ctx.props().zones,
+            &ctx.props().vnets,
+        ) {
+            Ok(data) => {
+                store.set_data(data);
+                store.set_sorter(default_sorter);
+            }
+            Err(error) => {
+                error_msg = Some(error.to_string());
+            }
+        }
+
+        Self {
+            store,
+            selection,
+            error_msg,
+        }
+    }
+
+    fn view(&self, _ctx: &Context<Self>) -> Html {
+        let columns = Self::columns(self.store.clone());
+
+        let table = DataTable::new(columns, self.store.clone())
+            .striped(false)
+            .selection(self.selection.clone())
+            .row_render_callback(|args: &mut DataTableRowRenderArgs<RemoteTreeEntry>| {
+                match args.record() {
+                    RemoteTreeEntry::Vnet(vnet) if vnet.external || vnet.imported => {
+                        args.add_class("pwt-opacity-50");
+                    }
+                    RemoteTreeEntry::Remote(_) => args.add_class("pwt-bg-color-surface"),
+                    _ => (),
+                };
+            })
+            .class(css::FlexFit);
+
+        let mut column = Column::new().class(pwt::css::FlexFit).with_child(table);
+
+        if let Some(msg) = &self.error_msg {
+            column.add_child(error_message(msg.as_ref()));
+        }
+
+        column.into()
+    }
+
+    fn changed(&mut self, ctx: &Context<Self>, old_props: &Self::Properties) -> bool {
+        if !Rc::ptr_eq(&ctx.props().zones, &old_props.zones)
+            || !Rc::ptr_eq(&ctx.props().vnets, &old_props.vnets)
+            || !Rc::ptr_eq(&ctx.props().controllers, &old_props.controllers)
+        {
+            match zones_to_remote_view(
+                &ctx.props().controllers,
+                &ctx.props().zones,
+                &ctx.props().vnets,
+            ) {
+                Ok(data) => {
+                    let expanded_state = self
+                        .store
+                        .read()
+                        .root()
+                        .map(|root| root.extract_expanded_state());
+
+                    self.store.set_data(data);
+
+                    if let Some(expanded_state) = expanded_state {
+                        if let Some(mut root) = self.store.write().root_mut() {
+                            root.apply_expanded_state(&expanded_state);
+                        }
+                    }
+
+                    self.store.set_sorter(name_remote_sorter);
+
+                    self.error_msg = None;
+                }
+                Err(error) => {
+                    self.error_msg = Some(error.to_string());
+                }
+            }
+
+            return true;
+        }
+
+        false
+    }
+}
-- 
2.47.2


_______________________________________________
pdm-devel mailing list
pdm-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pdm-devel


  parent reply	other threads:[~2025-08-27 11:34 UTC|newest]

Thread overview: 57+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-08-27 11:33 [pdm-devel] [PATCH network/proxmox{, -backup, -api-types, -datacenter-manager} 00/32] Add initial SDN / EVPN integration Stefan Hanreich
2025-08-27 11:33 ` [pdm-devel] [PATCH proxmox 1/2] schema: use i64 for minimum / maximum / default integer values Stefan Hanreich
2025-08-27 11:33 ` [pdm-devel] [PATCH proxmox 2/2] pbs-api-types: fix values for integer schemas Stefan Hanreich
2025-08-27 11:33 ` [pdm-devel] [PATCH proxmox-backup 1/1] api: change integer schema parameters to i64 Stefan Hanreich
2025-08-27 11:33 ` [pdm-devel] [PATCH pve-network 1/6] sdn: api: return null for rollback / lock endpoints Stefan Hanreich
2025-08-28  7:56   ` Dominik Csapak
2025-08-28  9:22     ` Stefan Hanreich
2025-08-28 19:46       ` Thomas Lamprecht
2025-08-27 11:33 ` [pdm-devel] [PATCH pve-network 2/6] controllers: fix maximum value for ASN Stefan Hanreich
2025-08-27 11:33 ` [pdm-devel] [PATCH pve-network 3/6] api: add state standard option Stefan Hanreich
2025-08-27 11:33 ` [pdm-devel] [PATCH pve-network 4/6] api: controllers: update schema of endpoints Stefan Hanreich
2025-08-27 11:33 ` [pdm-devel] [PATCH pve-network 5/6] api: vnets: " Stefan Hanreich
2025-08-27 11:33 ` [pdm-devel] [PATCH pve-network 6/6] api: zones: " Stefan Hanreich
2025-08-27 11:33 ` [pdm-devel] [PATCH proxmox-api-types 1/7] add QemuMigratePreconditionsNotAllowedNodesBlockingHaResources struct Stefan Hanreich
2025-08-27 11:58   ` Dominik Csapak
2025-08-27 11:33 ` [pdm-devel] [PATCH proxmox-api-types 2/7] sdn: add list/create zone endpoints Stefan Hanreich
2025-08-27 11:33 ` [pdm-devel] [PATCH proxmox-api-types 3/7] sdn: add list/create vnet endpoints Stefan Hanreich
2025-08-27 11:33 ` [pdm-devel] [PATCH proxmox-api-types 4/7] sdn: add list/create controller endpoints Stefan Hanreich
2025-08-27 11:33 ` [pdm-devel] [PATCH proxmox-api-types 5/7] sdn: add sdn configuration locking endpoints Stefan Hanreich
2025-08-27 11:33 ` [pdm-devel] [PATCH proxmox-api-types 6/7] tasks: add helper for querying successfully finished tasks Stefan Hanreich
2025-08-27 11:33 ` [pdm-devel] [PATCH proxmox-api-types 7/7] sdn: add helpers for pending values Stefan Hanreich
2025-08-27 11:33 ` [pdm-devel] [PATCH proxmox-datacenter-manager 01/16] server: add locked sdn client helpers Stefan Hanreich
2025-08-27 12:27   ` Dominik Csapak
2025-08-27 13:04     ` Stefan Hanreich
2025-08-27 13:10       ` Dominik Csapak
2025-08-27 13:22         ` Stefan Hanreich
2025-08-27 13:29           ` Dominik Csapak
2025-08-27 13:34             ` Stefan Hanreich
2025-08-27 11:33 ` [pdm-devel] [PATCH proxmox-datacenter-manager 02/16] ui: tasks: add descriptions for SDN tasks Stefan Hanreich
2025-08-27 11:33 ` [pdm-devel] [PATCH proxmox-datacenter-manager 03/16] api: sdn: add list_zones endpoint Stefan Hanreich
2025-08-27 11:33 ` [pdm-devel] [PATCH proxmox-datacenter-manager 04/16] api: sdn: add create_zone endpoint Stefan Hanreich
2025-08-27 13:44   ` Dominik Csapak
2025-08-27 11:33 ` [pdm-devel] [PATCH proxmox-datacenter-manager 05/16] api: sdn: add list_vnets endpoint Stefan Hanreich
2025-08-27 13:45   ` Dominik Csapak
2025-08-28  9:01     ` Stefan Hanreich
2025-08-27 11:33 ` [pdm-devel] [PATCH proxmox-datacenter-manager 06/16] api: sdn: add create_vnet endpoint Stefan Hanreich
2025-08-27 11:33 ` [pdm-devel] [PATCH proxmox-datacenter-manager 07/16] api: sdn: add list_controllers endpoint Stefan Hanreich
2025-08-27 11:33 ` [pdm-devel] [PATCH proxmox-datacenter-manager 08/16] ui: sdn: add EvpnRouteTarget type Stefan Hanreich
2025-08-27 11:33 ` [pdm-devel] [PATCH proxmox-datacenter-manager 09/16] ui: sdn: add vnet icon Stefan Hanreich
2025-08-27 14:06   ` Dominik Csapak
2025-08-28  9:04     ` Stefan Hanreich
2025-08-28  9:10       ` Dominik Csapak
2025-08-27 11:33 ` Stefan Hanreich [this message]
2025-08-27 14:48   ` [pdm-devel] [PATCH proxmox-datacenter-manager 10/16] ui: sdn: add remote tree component Dominik Csapak
2025-08-27 11:34 ` [pdm-devel] [PATCH proxmox-datacenter-manager 11/16] ui: add view for showing ip vrfs Stefan Hanreich
2025-08-28  7:15   ` Dominik Csapak
2025-08-27 11:34 ` [pdm-devel] [PATCH proxmox-datacenter-manager 12/16] ui: sdn: add AddVnetWindow component Stefan Hanreich
2025-08-28  7:49   ` Dominik Csapak
2025-08-27 11:34 ` [pdm-devel] [PATCH proxmox-datacenter-manager 13/16] ui: sdn: add AddZoneWindow component Stefan Hanreich
2025-08-28  7:50   ` Dominik Csapak
2025-08-27 11:34 ` [pdm-devel] [PATCH proxmox-datacenter-manager 14/16] ui: sdn: add EvpnPanel Stefan Hanreich
2025-08-28  7:54   ` Dominik Csapak
2025-08-27 11:34 ` [pdm-devel] [PATCH proxmox-datacenter-manager 15/16] ui: sdn: add EvpnPanel to main menu Stefan Hanreich
2025-08-27 14:07   ` Dominik Csapak
2025-08-27 11:34 ` [pdm-devel] [PATCH proxmox-datacenter-manager 16/16] pve: sdn: add descriptions for sdn tasks Stefan Hanreich
2025-08-28  8:06 ` [pdm-devel] [PATCH network/proxmox{, -backup, -api-types, -datacenter-manager} 00/32] Add initial SDN / EVPN integration Dominik Csapak
2025-08-29 14:54 ` [pdm-devel] superseded: " Stefan Hanreich

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20250827113427.199253-27-s.hanreich@proxmox.com \
    --to=s.hanreich@proxmox.com \
    --cc=pdm-devel@lists.proxmox.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox
Service provided by Proxmox Server Solutions GmbH | Privacy | Legal