From: Stefan Hanreich <s.hanreich@proxmox.com>
To: Proxmox VE development discussion <pve-devel@lists.proxmox.com>,
Thomas Lamprecht <t.lamprecht@proxmox.com>,
Gabriel Goller <g.goller@proxmox.com>
Subject: Re: [pve-devel] [PATCH network v2 1/5] sdn: add global lock for configuration
Date: Tue, 29 Jul 2025 09:59:35 +0200 [thread overview]
Message-ID: <067c88b2-330a-49a2-96d9-064ed550d0ff@proxmox.com> (raw)
In-Reply-To: <a5210183-87fa-4150-becf-a28af14cf92f@proxmox.com>
On 7/29/25 9:28 AM, Thomas Lamprecht wrote:
[snip]
>> +my $LOCK_SECRET_FILE = "/etc/pve/sdn/.lock";
>> +
>> # improve me : move status code inside plugins ?
>>
>> sub ifquery_check {
>> @@ -197,14 +199,57 @@ sub commit_config {
>> cfs_write_file($running_cfg, $cfg);
>> }
>>
>> +sub generate_lock_secret {
>
> nit: might be better to avoid the "secret" terminology here? As this is not really
> a secret but rather something like a token, handle or maybe even cookie.
>
> I.e., this hasn't to stay secret, as it does not provide access on it's own, it's
> just for ensuring orderly locking by identifying the locker.
>
> I'm mostly mentioning this as such method and variable names tend to leak into
> docs and other communications, and especially secrets are a bit delicate topic,
> for me that's the biggest reason why it would be better to avoid the term here.
>
> Could be fixed up though, if you agree with changing this and have an opinion
> on what variant (handle, token, cookie, ...?) would be best.
Makes sense, I'm gravitating towards token then - although handle would
be fine by me as well. Cookie has the same issues with pre-existing
sentiment / connotations imo?
>> + my $min = ord('!'); # first printable ascii
>> +
>> + my $rand_bytes = Crypt::OpenSSL::Random::random_bytes(32);
>> + die "failed to generate lock secret!\n" if !$rand_bytes;
>> +
>> + my $str = join('', map { chr((ord($_) & 0x3F) + $min) } split('', $rand_bytes));
>
> hmm, might have overlooked when checking the v1, but would it be a better option
> to decode the $rand_bytes as base64? That keeps the full entropy and ensures we
> got an easy to handle character-set.
>
> Another option might be to use a UUIDv7 [0], as that version includes the
> milliseconds since the unix expoch in the first 48 bits, that would also give
> some hints for when the handle was created, that info could be even used for
> expiring a lock handle.
>
> [0]: https://www.rfc-editor.org/rfc/rfc9562.html#name-uuid-version-7
>
> As the users of this should not really expect any specific format, we could still
> change that after applying though, so just tell me what you think/prefer.
Gabriel mentioned something similar about the used characters, because
the current character set is also inconvenient for running CLI commands.
UUIDv7 sounds sensible for this use-case and since we already use the
UUID module in our stack we could just opt for that?
[snip]
_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel
next prev parent reply other threads:[~2025-07-29 7:58 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-07-24 14:17 [pve-devel] [PATCH network v2 0/5] Add global locking and configuration rollback to SDN configuration Gabriel Goller
2025-07-24 14:17 ` [pve-devel] [PATCH network v2 1/5] sdn: add global lock for configuration Gabriel Goller
2025-07-29 7:27 ` Thomas Lamprecht
2025-07-29 7:59 ` Stefan Hanreich [this message]
2025-07-29 8:21 ` Thomas Lamprecht
2025-07-24 14:17 ` [pve-devel] [PATCH network v2 2/5] api: add lock-secret parameter to all api calls Gabriel Goller
2025-07-24 14:17 ` [pve-devel] [PATCH network v2 3/5] api: add lock secret parameter to apply endpoint Gabriel Goller
2025-07-24 14:17 ` [pve-devel] [PATCH network v2 4/5] api: add lock and release endpoints for global configuration lock Gabriel Goller
2025-07-24 14:17 ` [pve-devel] [PATCH network v2 5/5] api: add rollback endpoint Gabriel Goller
2025-07-29 9:30 ` [pve-devel] [PATCH network v2 0/5] Add global locking and configuration rollback to SDN configuration Gabriel Goller
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=067c88b2-330a-49a2-96d9-064ed550d0ff@proxmox.com \
--to=s.hanreich@proxmox.com \
--cc=g.goller@proxmox.com \
--cc=pve-devel@lists.proxmox.com \
--cc=t.lamprecht@proxmox.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox