public inbox for pve-devel@lists.proxmox.com
 help / color / mirror / Atom feed
* [pve-devel] is the next pve version 8.0 with debian 12 ? (any planning on patches merge ?)
@ 2023-04-28  7:15 DERUMIER, Alexandre
  2023-04-28  9:33 ` Thomas Lamprecht
  0 siblings, 1 reply; 5+ messages in thread
From: DERUMIER, Alexandre @ 2023-04-28  7:15 UTC (permalink / raw)
  To: pve-devel

Hi,
I would like to known if the next pve version will be 8.0 on debian12 ?

and if they are any planning for patches merging ? (I would like to
schedule time on my agenda if my patches need to be rework).


We had discussed about it last year, but I would like to implement
permissions on vmbrX && sdn vnets, as it a breaking change.
https://git.proxmox.com/?p=pve-manager.git;a=commit;h=a37ff602ff742403f01d6682bf9948183f87eadb

  

Also, I have a bunch of patches waiting for review or merge. (sorry for
the flood ^_^)

Here the list to be sure that they will not be lost.


[pve-devel] [PATCH v4 qemu-server 00/16] rework memory hotplug +
virtiomem
https://lists.proxmox.com/pipermail/pve-devel/2023-February/055746.html
(waiting for HA to support the new memory format)

[pve-devel] [PATCH pve-manager 0/2] ui: add support for new memory
format
https://lists.proxmox.com/pipermail/pve-devel/2023-February/055834.html



[pve-devel] bump default kvm64 cpumodel to a new x86-64-v2 model ?
https://lists.proxmox.com/pipermail/pve-devel/2023-March/056014.html
(Not a patch yes, just a question, but maybe it could be great to bump
the default cpu model for proxmox 8 ?)



https://lists.proxmox.com/pipermail/pve-devel/2023-March/056107.html
[pve-devel] [PATCH qemu-server 0/6] improve virtio drive multiqueues
(I need to rework this, as it seem buggy when you have a lot of disk,
but add support for virtio disk, and expose the queues option in the
gui should be enough. This is mainly usefull to improve local nvme
speed)


https://lists.proxmox.com/pipermail/pve-devel/2023-March/056366.html
[pve-devel] [PATCH-SERIES qemu, qemu-server, manager 0/1] add tcmalloc
support
(could be really great for ceph users. I'm running it in production
since 2 months without problem)


https://lists.proxmox.com/pipermail/pve-devel/2023-March/056425.html
[pve-devel] [PATCH-SERIES pve-access-control/pve-manager] Add firewall
caps
(I really need this for a customer with audit access only)




some other network fixes:

https://lists.proxmox.com/pipermail/pve-devel/2023-April/056533.html
[pve-devel] [PATCH pve-container] fix #4457: use bridge mtu if no mtu
is defined

https://lists.proxmox.com/pipermail/pve-devel/2023-April/056557.html
[pve-devel] [PATCH frr] fix #4040 : patch : ospf6d: fix infinite loop
when adding ASBR route

https://lists.proxmox.com/pipermail/pve-devel/2023-April/056619.html
[pve-devel] [PATCH pve-network 0/6] sdn multiples fixes

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [pve-devel] is the next pve version 8.0 with debian 12 ? (any planning on patches merge ?)
  2023-04-28  7:15 [pve-devel] is the next pve version 8.0 with debian 12 ? (any planning on patches merge ?) DERUMIER, Alexandre
@ 2023-04-28  9:33 ` Thomas Lamprecht
  2023-04-28 10:09   ` Fabian Grünbichler
  2023-04-28 12:15   ` DERUMIER, Alexandre
  0 siblings, 2 replies; 5+ messages in thread
From: Thomas Lamprecht @ 2023-04-28  9:33 UTC (permalink / raw)
  To: Proxmox VE development discussion, DERUMIER, Alexandre

Am 28/04/2023 um 09:15 schrieb DERUMIER, Alexandre:
> I would like to known if the next pve version will be 8.0 on debian12 ?

yes.

> and if they are any planning for patches merging ? (I would like to
> schedule time on my agenda if my patches need to be rework).

Debian Bookworkm release is planned for June 10th, we have no hard
planned timeline to make public, but if I would need to guess from
top of my mind I'd say a beta a bit before that and a release a bit
after that, where "bit" here means roughly one to two weeks.

And we probably won't accept bigger breaking change after the beta
is made public. So, continuing the strong guess of mine, I'd say
if you get anything bigger submitted before ~ mid-may, we got still
some time for patches rework until ~ end of may.

> 
> 
> We had discussed about it last year, but I would like to implement
> permissions on vmbrX && sdn vnets, as it a breaking change.
> https://git.proxmox.com/?p=pve-manager.git;a=commit;h=a37ff602ff742403f01d6682bf9948183f87eadb
> 

yes, here the questions is more if we want to map in below some more
general resource-mapping ACL path as slightly/peripherally hinted in
a reply[0] to Dominik's HW mapping series. Or if we want to keep netdevs
in the /sdn path, which might be fine too as network devices is a big
and important enough class to be kept all in their own "access category"

[0]: https://lists.proxmox.com/pipermail/pve-devel/2022-November/054557.html

Fabian has some more spelled out questions/ideas IIRC.

>   
> 
> Also, I have a bunch of patches waiting for review or merge. (sorry for
> the flood ^_^)
> 

I'll probably jump start the final bootstrapping (we did some internal
ones already) soon, afterwards we can apply more stuff (would like to only
do bug fixes in 7.x from now on).

- Thomas




^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [pve-devel] is the next pve version 8.0 with debian 12 ? (any planning on patches merge ?)
  2023-04-28  9:33 ` Thomas Lamprecht
@ 2023-04-28 10:09   ` Fabian Grünbichler
  2023-04-28 12:04     ` DERUMIER, Alexandre
  2023-04-28 12:15   ` DERUMIER, Alexandre
  1 sibling, 1 reply; 5+ messages in thread
From: Fabian Grünbichler @ 2023-04-28 10:09 UTC (permalink / raw)
  To: DERUMIER, Alexandre, Proxmox VE development discussion

On April 28, 2023 11:33 am, Thomas Lamprecht wrote:
> Am 28/04/2023 um 09:15 schrieb DERUMIER, Alexandre:
>> We had discussed about it last year, but I would like to implement
>> permissions on vmbrX && sdn vnets, as it a breaking change.
>> https://git.proxmox.com/?p=pve-manager.git;a=commit;h=a37ff602ff742403f01d6682bf9948183f87eadb
>> 
> 
> yes, here the questions is more if we want to map in below some more
> general resource-mapping ACL path as slightly/peripherally hinted in
> a reply[0] to Dominik's HW mapping series. Or if we want to keep netdevs
> in the /sdn path, which might be fine too as network devices is a big
> and important enough class to be kept all in their own "access category"
> 
> [0]: https://lists.proxmox.com/pipermail/pve-devel/2022-November/054557.html
> 
> Fabian has some more spelled out questions/ideas IIRC.

not so much spelled out, but yeah, this came up recently again because
of a forum question :)

I would really like to have the ability to restrict access to bridges
and bridge-like entities from SDN in 8.0. right now it's only possible
to limit the configuration itself, but not the "usage". for SDN there is
a cosmetic filter in place, but that is only cosmetic, as long as a
user/token has VM.Config.Network they can use *any* bridge or *any*
vnet via the API.

these are the basic parts I've thought of:

1.) decide on the ACLs/privs for regular bridges

- ACL path and privileges shared with SDN
- OR: ACL path and privileges shared with other per-node hardware
  entities, like those used for pass-through

the former is probably more easy, since it means we don't need special
helpers or complicated code when checking access in places where either
a regular bridge or SDN is used.. the advantage of the map would be that
we'd have a single mechanism for defining and giving access to per-node
resources. so not really clear cut (yet)

- which privilege levels do we need?
- See (Audit), Use, Configure (Admin)?

2.) implement access control checks in all the places

- mostly guest-related: create/restore/update/remote-migrate/clone
- firewall (rules referencing bridges/vnets? maybe it doesn't matter,
  since if I can change the host firewall I can already mess stuff up,
  and for the guest firewall I can probably use whatever I want?)
- SDN (e.g., to configure a zone to use a certain bridge?)
- node network config (switch from Sys.Modify to SDN.Admin?)

once the decision on the privileges has been made, we need to backport
any new privileges to the last 7.x version, so that admins can setup the
new ACLs before (partially!) upgrading their clusters, and also to avoid
breaking not-yet-updated nodes when ACLs are modified on already
upgraded ones.




^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [pve-devel] is the next pve version 8.0 with debian 12 ? (any planning on patches merge ?)
  2023-04-28 10:09   ` Fabian Grünbichler
@ 2023-04-28 12:04     ` DERUMIER, Alexandre
  0 siblings, 0 replies; 5+ messages in thread
From: DERUMIER, Alexandre @ 2023-04-28 12:04 UTC (permalink / raw)
  To: pve-devel, f.gruenbichler


> 
> not so much spelled out, but yeah, this came up recently again
> because
> of a forum question :)
> 
> I would really like to have the ability to restrict access to bridges
> and bridge-like entities from SDN in 8.0. right now it's only
> possible
> to limit the configuration itself, but not the "usage". for SDN there
> is
> a cosmetic filter in place, but that is only cosmetic, as long as a
> user/token has VM.Config.Network they can use *any* bridge or *any*
> vnet via the API.
Oh yes, you are right, I totally miss that.


> 
> these are the basic parts I've thought of:
> 
> 1.) decide on the ACLs/privs for regular bridges
> 
> - ACL path and privileges shared with SDN
> - OR: ACL path and privileges shared with other per-node hardware
>   entities, like those used for pass-through
> 
> the former is probably more easy, since it means we don't need
> special
> helpers or complicated code when checking access in places where
> either
> a regular bridge or SDN is used.. the advantage of the map would be
> that
> we'd have a single mechanism for defining and giving access to per-
> node
> resources. so not really clear cut (yet)
> 

Personnaly, I think this should be strange to give access to a bridge
on a specific node only.
(Same vmbr name should be same physical network..so if user have access
on the vmbr on a node, you can flood traffic to all nodes where the
vmbr is present).
Also if HA migrate the vm, and user don't have access the vmbr on other
node, that's really stange.


> - which privilege levels do we need?
> - See (Audit), Use, Configure (Admin)?
> 
I think:

- "Use" permission  on vmbr, on vnet, or a whole zone (all vnets)
- "Admin" on a specific zone. (Be able to create/modify vnets  +
(reload sdn????)
- "Admin" on a node to configure local vmbr
- "Audit" for read config on a specific zone


Another thing is vlan tag on vm nic. I really don't known how to handle
permissions. (with sdn, it's 1vnet=1tag).
But it could great to be able to restrict vlans list too.


> 2.) implement access control checks in all the places
> 
> - mostly guest-related: create/restore/update/remote-migrate/clone
> - firewall (rules referencing bridges/vnets? maybe it doesn't matter,
>   since if I can change the host firewall I can already mess stuff
> up,
>   and for the guest firewall I can probably use whatever I want?)
> - SDN (e.g., to configure a zone to use a certain bridge?)
> - node network config (switch from Sys.Modify to SDN.Admin?)
> 
> once the decision on the privileges has been made, we need to
> backport
> any new privileges to the last 7.x version, so that admins can setup
> the
> new ACLs before (partially!) upgrading their clusters, and also to
> avoid
> breaking not-yet-updated nodes when ACLs are modified on already
> upgraded ones.
> 


^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [pve-devel] is the next pve version 8.0 with debian 12 ? (any planning on patches merge ?)
  2023-04-28  9:33 ` Thomas Lamprecht
  2023-04-28 10:09   ` Fabian Grünbichler
@ 2023-04-28 12:15   ` DERUMIER, Alexandre
  1 sibling, 0 replies; 5+ messages in thread
From: DERUMIER, Alexandre @ 2023-04-28 12:15 UTC (permalink / raw)
  To: pve-devel, t.lamprecht

Le vendredi 28 avril 2023 à 11:33 +0200, Thomas Lamprecht a écrit :
> And we probably won't accept bigger breaking change after the beta
> is made public. So, continuing the strong guess of mine, I'd say
> if you get anything bigger submitted before ~ mid-may, we got still
> some time for patches rework until ~ end of may.

Ok thanks! 

I don't have nothing big in my pipe. 

(I only have a patch series for ifupdown2 for ipv6 slaac support, I'm
waiting for ifupdown2 dev review before submiting it to pve-devel)
https://github.com/CumulusNetworks/ifupdown2/pull/259

I'm going on holiday tomorrow for 2 weeks, so Mid-may --> end may,
no problem, I should have time to rebase/rework my previous patches if
needed. (or help to implement network permissions)


for proxmox8, I'll also look to bump frr && ifupdown2 to last versions.


Alexandre



^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2023-04-28 12:15 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-04-28  7:15 [pve-devel] is the next pve version 8.0 with debian 12 ? (any planning on patches merge ?) DERUMIER, Alexandre
2023-04-28  9:33 ` Thomas Lamprecht
2023-04-28 10:09   ` Fabian Grünbichler
2023-04-28 12:04     ` DERUMIER, Alexandre
2023-04-28 12:15   ` DERUMIER, Alexandre

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox
Service provided by Proxmox Server Solutions GmbH | Privacy | Legal