From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from firstgate.proxmox.com (firstgate.proxmox.com [IPv6:2a01:7e0:0:424::9]) by lore.proxmox.com (Postfix) with ESMTPS id AAE211FF183 for ; Wed, 5 Nov 2025 17:35:44 +0100 (CET) Received: from firstgate.proxmox.com (localhost [127.0.0.1]) by firstgate.proxmox.com (Proxmox) with ESMTP id DD79F2EFB; Wed, 5 Nov 2025 17:36:24 +0100 (CET) From: Hannes Laimer To: pdm-devel@lists.proxmox.com Date: Wed, 5 Nov 2025 17:35:35 +0100 Message-ID: <20251105163546.450094-2-h.laimer@proxmox.com> X-Mailer: git-send-email 2.47.3 In-Reply-To: <20251105163546.450094-1-h.laimer@proxmox.com> References: <20251105163546.450094-1-h.laimer@proxmox.com> MIME-Version: 1.0 X-Bm-Milter-Handled: 55990f41-d878-4baa-be0a-ee34c49e34d2 X-Bm-Transport-Timestamp: 1762360530180 X-SPAM-LEVEL: Spam detection results: 0 AWL 0.042 Adjusted score from AWL reputation of From: address BAYES_00 -1.9 Bayes spam probability is 0 to 1% DMARC_MISSING 0.1 Missing DMARC policy KAM_DMARC_STATUS 0.01 Test Rule for DKIM or SPF Failure with Strict Alignment SPF_HELO_NONE 0.001 SPF: HELO does not publish an SPF Record SPF_PASS -0.001 SPF: sender matches SPF record Subject: [pdm-devel] [PATCH proxmox v2 1/4] pve-api-types: update pve-api.json X-BeenThere: pdm-devel@lists.proxmox.com X-Mailman-Version: 2.1.29 Precedence: list List-Id: Proxmox Datacenter Manager development discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Reply-To: Proxmox Datacenter Manager development discussion Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: pdm-devel-bounces@lists.proxmox.com Sender: "pdm-devel" This reflects the latest changes in pve-storage and pve-firewall. Signed-off-by: Hannes Laimer --- pve-api-types/pve-api.json | 362 +++---------------------------------- 1 file changed, 27 insertions(+), 335 deletions(-) diff --git a/pve-api-types/pve-api.json b/pve-api-types/pve-api.json index 7bde484e..d1e77fdb 100644 --- a/pve-api-types/pve-api.json +++ b/pve-api-types/pve-api.json @@ -4724,33 +4724,41 @@ "returns": { "properties": { "action": { + "description": "Rule action ('ACCEPT', 'DROP', 'REJECT') or security group name", "type": "string" }, "comment": { + "description": "Descriptive comment", "optional": 1, "type": "string" }, "dest": { + "description": "Restrict packet destination address", "optional": 1, "type": "string" }, "dport": { + "description": "Restrict TCP/UDP destination port", "optional": 1, "type": "string" }, "enable": { + "description": "Flag to enable/disable a rule", "optional": 1, "type": "integer" }, "icmp-type": { + "description": "Specify icmp-type. Only valid if proto equals 'icmp' or 'icmpv6'/'ipv6-icmp'", "optional": 1, "type": "string" }, "iface": { + "description": "Network interface name. You have to use network configuration key names for VMs and containers", "optional": 1, "type": "string" }, "ipversion": { + "description": "IP version (4 or 6) - automatically determined from source/dest addresses", "optional": 1, "type": "integer" }, @@ -4771,25 +4779,31 @@ "type": "string" }, "macro": { + "description": "Use predefined standard macro", "optional": 1, "type": "string" }, "pos": { + "description": "Rule position in the ruleset", "type": "integer" }, "proto": { + "description": "IP protocol. You can use protocol names ('tcp'/'udp') or simple numbers, as defined in '/etc/protocols'", "optional": 1, "type": "string" }, "source": { + "description": "Restrict packet source address", "optional": 1, "type": "string" }, "sport": { + "description": "Restrict TCP/UDP source port", "optional": 1, "type": "string" }, "type": { + "description": "Rule type", "type": "string" } }, @@ -4990,11 +5004,7 @@ "proxyto": null, "returns": { "items": { - "properties": { - "pos": { - "type": "integer" - } - }, + "properties": ("Ref")["/root/0/children/4/children/0/children/0/children/0/info/GET/returns/properties"], "type": "object" }, "links": [ @@ -5290,67 +5300,7 @@ }, "proxyto": null, "returns": { - "properties": { - "action": { - "type": "string" - }, - "comment": { - "optional": 1, - "type": "string" - }, - "dest": { - "optional": 1, - "type": "string" - }, - "dport": { - "optional": 1, - "type": "string" - }, - "enable": { - "optional": 1, - "type": "integer" - }, - "icmp-type": { - "optional": 1, - "type": "string" - }, - "iface": { - "optional": 1, - "type": "string" - }, - "ipversion": { - "optional": 1, - "type": "integer" - }, - "log": { - "description": "Log level for firewall rule", - "enum": ("Ref")["/root/0/children/4/children/0/children/0/children/0/info/GET/returns/properties/log/enum"], - "optional": 1, - "type": "string" - }, - "macro": { - "optional": 1, - "type": "string" - }, - "pos": { - "type": "integer" - }, - "proto": { - "optional": 1, - "type": "string" - }, - "source": { - "optional": 1, - "type": "string" - }, - "sport": { - "optional": 1, - "type": "string" - }, - "type": { - "type": "string" - } - }, + "properties": ("Ref")["/root/0/children/4/children/0/children/0/children/0/info/GET/returns/properties"], "type": "object" } }, @@ -5509,11 +5459,7 @@ "proxyto": null, "returns": { "items": { - "properties": { - "pos": { - "type": "integer" - } - }, + "properties": ("Ref")["/root/0/children/4/children/0/children/0/children/0/info/GET/returns/properties"], "type": "object" }, "links": [ @@ -6227,6 +6173,7 @@ "type": "boolean" }, "enable": { + "default": 0, "description": "Enable or disable the firewall cluster wide.", "minimum": 0, "optional": 1, @@ -11029,67 +10976,7 @@ }, "proxyto": null, "returns": { - "properties": { - "action": { - "type": "string" - }, - "comment": { - "optional": 1, - "type": "string" - }, - "dest": { - "optional": 1, - "type": "string" - }, - "dport": { - "optional": 1, - "type": "string" - }, - "enable": { - "optional": 1, - "type": "integer" - }, - "icmp-type": { - "optional": 1, - "type": "string" - }, - "iface": { - "optional": 1, - "type": "string" - }, - "ipversion": { - "optional": 1, - "type": "integer" - }, - "log": { - "description": "Log level for firewall rule", - "enum": ("Ref")["/root/0/children/4/children/0/children/0/children/0/info/GET/returns/properties/log/enum"], - "optional": 1, - "type": "string" - }, - "macro": { - "optional": 1, - "type": "string" - }, - "pos": { - "type": "integer" - }, - "proto": { - "optional": 1, - "type": "string" - }, - "source": { - "optional": 1, - "type": "string" - }, - "sport": { - "optional": 1, - "type": "string" - }, - "type": { - "type": "string" - } - }, + "properties": ("Ref")["/root/0/children/4/children/0/children/0/children/0/info/GET/returns/properties"], "type": "object" } }, @@ -11241,11 +11128,7 @@ "proxyto": null, "returns": { "items": { - "properties": { - "pos": { - "type": "integer" - } - }, + "properties": ("Ref")["/root/0/children/4/children/0/children/0/children/0/info/GET/returns/properties"], "type": "object" }, "links": [ @@ -16634,67 +16517,7 @@ }, "proxyto": null, "returns": { - "properties": { - "action": { - "type": "string" - }, - "comment": { - "optional": 1, - "type": "string" - }, - "dest": { - "optional": 1, - "type": "string" - }, - "dport": { - "optional": 1, - "type": "string" - }, - "enable": { - "optional": 1, - "type": "integer" - }, - "icmp-type": { - "optional": 1, - "type": "string" - }, - "iface": { - "optional": 1, - "type": "string" - }, - "ipversion": { - "optional": 1, - "type": "integer" - }, - "log": { - "description": "Log level for firewall rule", - "enum": ("Ref")["/root/0/children/4/children/0/children/0/children/0/info/GET/returns/properties/log/enum"], - "optional": 1, - "type": "string" - }, - "macro": { - "optional": 1, - "type": "string" - }, - "pos": { - "type": "integer" - }, - "proto": { - "optional": 1, - "type": "string" - }, - "source": { - "optional": 1, - "type": "string" - }, - "sport": { - "optional": 1, - "type": "string" - }, - "type": { - "type": "string" - } - }, + "properties": ("Ref")["/root/0/children/4/children/0/children/0/children/0/info/GET/returns/properties"], "type": "object" } }, @@ -16858,11 +16681,7 @@ "proxyto": null, "returns": { "items": { - "properties": { - "pos": { - "type": "integer" - } - }, + "properties": ("Ref")["/root/0/children/4/children/0/children/0/children/0/info/GET/returns/properties"], "type": "object" }, "links": [ @@ -35315,67 +35134,7 @@ }, "proxyto": null, "returns": { - "properties": { - "action": { - "type": "string" - }, - "comment": { - "optional": 1, - "type": "string" - }, - "dest": { - "optional": 1, - "type": "string" - }, - "dport": { - "optional": 1, - "type": "string" - }, - "enable": { - "optional": 1, - "type": "integer" - }, - "icmp-type": { - "optional": 1, - "type": "string" - }, - "iface": { - "optional": 1, - "type": "string" - }, - "ipversion": { - "optional": 1, - "type": "integer" - }, - "log": { - "description": "Log level for firewall rule", - "enum": ("Ref")["/root/0/children/4/children/0/children/0/children/0/info/GET/returns/properties/log/enum"], - "optional": 1, - "type": "string" - }, - "macro": { - "optional": 1, - "type": "string" - }, - "pos": { - "type": "integer" - }, - "proto": { - "optional": 1, - "type": "string" - }, - "source": { - "optional": 1, - "type": "string" - }, - "sport": { - "optional": 1, - "type": "string" - }, - "type": { - "type": "string" - } - }, + "properties": ("Ref")["/root/0/children/4/children/0/children/0/children/0/info/GET/returns/properties"], "type": "object" } }, @@ -35539,11 +35298,7 @@ "proxyto": null, "returns": { "items": { - "properties": { - "pos": { - "type": "integer" - } - }, + "properties": ("Ref")["/root/0/children/4/children/0/children/0/children/0/info/GET/returns/properties"], "type": "object" }, "links": [ @@ -49109,67 +48864,7 @@ }, "proxyto": "node", "returns": { - "properties": { - "action": { - "type": "string" - }, - "comment": { - "optional": 1, - "type": "string" - }, - "dest": { - "optional": 1, - "type": "string" - }, - "dport": { - "optional": 1, - "type": "string" - }, - "enable": { - "optional": 1, - "type": "integer" - }, - "icmp-type": { - "optional": 1, - "type": "string" - }, - "iface": { - "optional": 1, - "type": "string" - }, - "ipversion": { - "optional": 1, - "type": "integer" - }, - "log": { - "description": "Log level for firewall rule", - "enum": ("Ref")["/root/0/children/4/children/0/children/0/children/0/info/GET/returns/properties/log/enum"], - "optional": 1, - "type": "string" - }, - "macro": { - "optional": 1, - "type": "string" - }, - "pos": { - "type": "integer" - }, - "proto": { - "optional": 1, - "type": "string" - }, - "source": { - "optional": 1, - "type": "string" - }, - "sport": { - "optional": 1, - "type": "string" - }, - "type": { - "type": "string" - } - }, + "properties": ("Ref")["/root/0/children/4/children/0/children/0/children/0/info/GET/returns/properties"], "type": "object" } }, @@ -49331,11 +49026,7 @@ "proxyto": "node", "returns": { "items": { - "properties": { - "pos": { - "type": "integer" - } - }, + "properties": ("Ref")["/root/0/children/4/children/0/children/0/children/0/info/GET/returns/properties"], "type": "object" }, "links": [ @@ -49503,6 +49194,7 @@ "returns": { "properties": { "enable": { + "default": 1, "description": "Enable host firewall rules.", "optional": 1, "type": "boolean" -- 2.47.3 _______________________________________________ pdm-devel mailing list pdm-devel@lists.proxmox.com https://lists.proxmox.com/cgi-bin/mailman/listinfo/pdm-devel