From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from firstgate.proxmox.com (firstgate.proxmox.com [212.224.123.68]) by lore.proxmox.com (Postfix) with ESMTPS id 80A691FF163 for ; Thu, 24 Oct 2024 16:35:23 +0200 (CEST) Received: from firstgate.proxmox.com (localhost [127.0.0.1]) by firstgate.proxmox.com (Proxmox) with ESMTP id 6DC4C10168; Thu, 24 Oct 2024 16:35:21 +0200 (CEST) To: Fiona Ebner , Proxmox VE development discussion Date: Thu, 24 Oct 2024 14:27:43 +0000 References: In-Reply-To: MIME-Version: 1.0 Message-ID: List-Id: Proxmox VE development discussion List-Post: From: Pavel Tide via pve-devel Precedence: list Cc: Pavel Tide X-Mailman-Version: 2.1.29 X-BeenThere: pve-devel@lists.proxmox.com List-Subscribe: , List-Unsubscribe: , List-Archive: Reply-To: Proxmox VE development discussion List-Help: Subject: Re: [pve-devel] Bug 2582 roadmap Content-Type: multipart/mixed; boundary="===============4862401652210352047==" Errors-To: pve-devel-bounces@lists.proxmox.com Sender: "pve-devel" --===============4862401652210352047== Content-Type: message/rfc822 Content-Disposition: inline Return-Path: X-Original-To: pve-devel@lists.proxmox.com Delivered-To: pve-devel@lists.proxmox.com Received: from firstgate.proxmox.com (firstgate.proxmox.com [212.224.123.68]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by lists.proxmox.com (Postfix) with ESMTPS id 47201C8258 for ; Thu, 24 Oct 2024 16:35:20 +0200 (CEST) Received: from firstgate.proxmox.com (localhost [127.0.0.1]) by firstgate.proxmox.com (Proxmox) with ESMTP id 2FAFA10128 for ; Thu, 24 Oct 2024 16:35:20 +0200 (CEST) Received: from mx1.veeam.com (mx1.veeam.com [216.253.77.21]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by firstgate.proxmox.com (Proxmox) with ESMTPS for ; Thu, 24 Oct 2024 16:35:18 +0200 (CEST) Received: from NAM12-BN8-obe.outbound.protection.outlook.com (mail-bn8nam12lp2172.outbound.protection.outlook.com [104.47.55.172]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx1.veeam.com (Postfix) with ESMTPS id 5514281846; Thu, 24 Oct 2024 10:27:49 -0400 (EDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=veeam.com; s=mx24; t=1729780071; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=/BGicQ5FSkxlVZ6P42HJsd9nJwgIFiQtKGBJxeeYakg=; b=wY9wJQn3WFxuhyWtnNV6Z4m4facRMMq837Buby831KzGb/0TmSlJR9azyGQt4DuOL0mH/N xHQG1W8p/hxCLN8P9CzqnnsLb/6i6M4j01TejEakudpWFS2AyZTJkSNh1SmuvbwI0/0fvf G7m6rtAyndW4cQD4d1t5e58P8Bc5Kdz/vJ19UOcCX0XTIl7hKK2tPP3/1HJBfWf0lt3KZC nMne2byGf4rTTZrVrtnfihs1xGhK/81AL/rxmlZJ+68Aw5cIwtiYXtKLUniCYTnUsPf6R7 26FlZe36+SdVcmTtcfq8S92nWZ7zQWXYFLUJZGTeszjMeL2PH+UALf2F20CvAA== ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=ms9hB3NhNah+ihPcC9ERC2/6HVIhoWR+R+MaL1eMUb7pP9uVozKFs8ZKsCerDaPN3k39Gd3/YEkoZzaLWVmTSMe6ZkF5eexCitLANmix0bGTaF5YDkHnWbhD0uo0ZaXYR1OHetukM0uv7doVndRgR4FlKGLACUqoFtP+pLvXFX5eK7vot6yxlG88HbrDQyPT/bBKtnYB6ZmJayXStc7dEhDJkyN8aBjo8Ms7X6pDJzz2Qu9e/tUTruqI3fRqPlH9HauWFEwRpvXD8qcVRugJLjPHgrzZysYMYitA8mtj1T7LnZY5Nx2+u8u/f/A8OPf7Do6UXykqmF7o//ETE1BlxA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=/BGicQ5FSkxlVZ6P42HJsd9nJwgIFiQtKGBJxeeYakg=; b=D+yp1SDFepEbZmGbJl5riitz8w+nPJNGipjq7P3QWTZ22bItYYhOOhT80Z1NPsiiueHfFDtsNNUDK8V+ceETao62Eg29Ut92zo+KZUu8IQEwJs7g5pNE6//0uyfaSXbQDZJlVlyknpn2HIaSxIRIwL6OULJDO4ocXHz5mUihMwEZcHyIxWnjo0r1vBMUfEaruQQLlxpM4vC9N6uqj3sYhvsgnkh9YlJ7hIPx97Qxcx5qJVXTUThaQzvMmDnOqKr8+yToZBMCQZqVAlAm88aIayx7oBPOvzqcH9rtuA14GxKWEVXbQ35vCJaxZia6lLNV8MLM8m2xhdYA8DVZPaoALQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=veeam.com; dmarc=pass action=none header.from=veeam.com; dkim=pass header.d=veeam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=veeam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=/BGicQ5FSkxlVZ6P42HJsd9nJwgIFiQtKGBJxeeYakg=; b=h3SswQfaqPVqQL6uRuYTzcag/iDfwJH75sPLF2giUmB3waQRbXCQJIEto4mCu+KqVMLb91xAs058G8tp5ameBXpp5jf6RMStZ6HoXuMbFlazYkxSymVneDAH/vq5LQLgFiBAvQH1BO6YVBUG2zQfGU15NALcwlLesIzi7XmfQ83lC333HLUQkTC7qyjsrdDWKH7lJiROTcLETL0S9+u2acUjCqKl6TFPfGFR/NE64htIFYRhckS/I23RNzjUnp/7JZj+37gz7cPI8dpjZbD6o3Ic23RXAre09TVcq3x5THqF5lBenzDerxxcw/C9CD3BHnUsY+jiUyiycw4etx5ttw== Received: from IA0PR14MB6767.namprd14.prod.outlook.com (2603:10b6:208:401::16) by SJ0PR14MB5273.namprd14.prod.outlook.com (2603:10b6:a03:424::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8093.16; Thu, 24 Oct 2024 14:27:44 +0000 Received: from IA0PR14MB6767.namprd14.prod.outlook.com ([fe80::31ce:2281:ab9d:d718]) by IA0PR14MB6767.namprd14.prod.outlook.com ([fe80::31ce:2281:ab9d:d718%6]) with mapi id 15.20.8093.018; Thu, 24 Oct 2024 14:27:44 +0000 From: Pavel Tide To: Fiona Ebner , Proxmox VE development discussion Subject: RE: [pve-devel] Bug 2582 roadmap Thread-Topic: [pve-devel] Bug 2582 roadmap Thread-Index: AQHbA2rVjmqMSqATy0+DXAvUlefA/rJVXsyAgAtKFqCANZEYcA== Date: Thu, 24 Oct 2024 14:27:43 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=veeam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: IA0PR14MB6767:EE_|SJ0PR14MB5273:EE_ x-ms-office365-filtering-correlation-id: d46904a5-dccc-42a6-34d5-08dcf4380644 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|376014|366016|38070700018; x-microsoft-antispam-message-info: =?us-ascii?Q?j6Av+ve0f2izxrkRpNpFxE4fFCQXnBJkzJjZn7Z+ullUhBB4zRKLhosdWFmN?= =?us-ascii?Q?s/Ync4cJpMzzQ01RzlJ/dDcFWqnwECDN3idi7whB64Wf3Zlkl6CTmFkmgtCc?= =?us-ascii?Q?470pEuQlUXq1rW18HkoFq8hOEMfiveZzqLMOq1yqYg0uEFf6MhilG17nnbY4?= =?us-ascii?Q?SFeBnSfyCAhnE0NyUGhs24vbIR+SwoJ2Db87C1hLk2ZPRluM+r5xt3zHiopV?= =?us-ascii?Q?fW7METTiRlrToiXQRLDzT2HYQMTKgEG1vIPCM1hqjH4F+6ZZeMIWeUVpwlki?= =?us-ascii?Q?ZD3icxOhRKOT089md6eCDfCX9Gyp0J97jqfTdiWtaRuPfpmp7+pU6PhTNJQv?= =?us-ascii?Q?I6g1RDSHlA0kYvjVwGQtW4QKvH1mRC+X8ya7lGQJ+ZMiR+aKLLAe+Va0kOPY?= =?us-ascii?Q?y8F66GNLFDvFAoZ07s2Pb0842dhJPYhE0eQmm3SDx2uAJIp+AR2snOeXukzu?= =?us-ascii?Q?82HJ2kL1UAI7dJXUABFO9n5e5fb+jJt2wFSL5wyY5S7aWgLh+nre9iKGijEJ?= =?us-ascii?Q?CVMr09D/hV/Krg7LdHKkP2sl0AM9dg6A5/7n3+p8u3JCG839Y/ugK61LW871?= =?us-ascii?Q?VtDSP7ro8Ubj33BfMRs7OEF3BtLzgTyVURhn8LWcD4j4H1LD8Utt9Hpy/GmO?= =?us-ascii?Q?I1v5RNhXNbzL+QcQND4Y8ZAidK5sP1brPHcs+cOrV+vB6f4VYjFlejDl6qJm?= =?us-ascii?Q?iVTur4qvaL8su6NuDLQX42zZiZoi166qXlVlXlNUek1z/VxH+syngIygAwhW?= =?us-ascii?Q?I+7xipdwwRYETYk4Yxcj3hEcWjLkNeMs0VbTzlwe/kKFI7LW2GC+8mDNoI5y?= =?us-ascii?Q?dsh3m4jVfss3PxmJ5HJTSMK90SSCRh9a8uY6NQ2R5kLAoiIq4jCnJpjmhMQ4?= =?us-ascii?Q?n83i3iPj0RIXOVdkO5fmp86HgNtqstyy3VAW7qHAYiFBox9F04x/FWtu+l6U?= =?us-ascii?Q?2uScGAd8mRPyX+GpGEg5WcrTM25eb5RepLFKe+i37KZqbz6H7ioSh9NGftwm?= =?us-ascii?Q?Qc7oOSXJsQHdu92hZP7O5C5Y5bOHi9cqdDmqyhwaB9MiVpaAKTRcmeY9A9+m?= =?us-ascii?Q?MqJc2bDN0wtD6IdE7xES0vspqQpHftXjAyD0lBYDwSCS2H/x7eeiXXNgHMk1?= =?us-ascii?Q?syq9PSEcC1vcy6II0SQyrNOKQVZZxmVuqXfKsGlEuTf1bgbQcaqmO+b9MlKp?= =?us-ascii?Q?oh4NRcudlTtuy9r2W0kdNQzQDNYNRkW4WeRT0PTEQR/gi5jEYztrQBgAmq8p?= =?us-ascii?Q?2cEFSMLkoHAtpzLwXQphSn+hzlkN5kEP8a+y+VYrE4DQ5o0Ov6PHwlOQ+LpA?= =?us-ascii?Q?GpHg/8cQCvuzeLqyqOGz75k02AJzfr0kK71SXFB0r6PRNAAZTRjqe3xbJVEh?= =?us-ascii?Q?RWiWJ6H/4O2/w7MgxIlQ1nzzaiNu?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:IA0PR14MB6767.namprd14.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(366016)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?6PmGZdbVFYwpypVZfytG7MGMXMwNLbmANe7+7HoU2bvBvUtYvTR0kvMVZUo+?= =?us-ascii?Q?B1AWjJPDHfVLGJ5xEYPv4kA9cd92nWc2ZwpCO9rpmVZTh0OWf+S83MzVBO0L?= =?us-ascii?Q?fULGSm1oKOmS4BHygfZ0TnW2Mwy7Rr2SsON/3sMsdVmMyYpiy8Oa6KELSpvp?= =?us-ascii?Q?aP2WB6nRWQQdE+rSNoFAYYQsL/P7CGUIPYM7CXTs0X0uoeltmXFWSCv7KD9I?= =?us-ascii?Q?ZN/IqSr6SBoG1g0DXf9nJvhUNun0Pj0w9HVUaIOMYndYXl+yR6Xxw5QP9pQg?= =?us-ascii?Q?44bn+QI9AEDn67U6qkIkqBiaiMqA3N8n530LHuKSWzhyeeCE/Wp8/63+ijC1?= =?us-ascii?Q?u4XAZVVbJn3bjtbgJaa2utC2SKraoaiUI9+te/FikYOknopiGFfpK2s9+IXI?= =?us-ascii?Q?beji3hQeaCjJ2ZQF/IvSeTOMQpZRtjgA9VbdpxcejiQb6AJl6u+Q1geW6CMu?= =?us-ascii?Q?rKwlub6rszvFs7CND40fFaXdzYIpJSjDnMi5BQ9Ta1eHdxvsRIqcSgxn385U?= =?us-ascii?Q?eXvVfJe4T+w1EXQS83KnG3VF2eXlwncvlcNj+NHPO9hk9K8/kpz3zJ8iRVD4?= =?us-ascii?Q?NQ37E9QH7SrAud6vEVLP3adJsw/b47NiLjktTMU7y/p1wyB1QLO17DY+bcdo?= =?us-ascii?Q?F5/meKiiHoDbbdT3LMBoQ54PCmCRYMs2pTCnrWx0fXPG0Z8A0odyhT5kvysm?= =?us-ascii?Q?HbgORn6T/Ld72cS+R7O5fSO3FKhjGmZfOWsyYdqCDZKnYEJeAPNVmiwvDE0L?= =?us-ascii?Q?oRCQyV0XdSphBG2TPrd3IZiP0FSDNfImnDHgzSKOE/OrfaloWv2WlasPfQIN?= =?us-ascii?Q?MZyhnRZA7+ZKs+WHVh7nTcy9ynJCRPBfOmkl1iDQq//IzLqXZlIpnzTUYhtL?= =?us-ascii?Q?wb0RdqOlSkC7bUCXBJHHw/CnuGSVxJAP8dSXbQ9N5fud9ALila8afBFTTj5u?= =?us-ascii?Q?xis1k4SoIxtPrnoKNGRGzLMP3RHgVf6HpAIESGc/7yENQ60C6KODje78lObD?= =?us-ascii?Q?3JE9qBXHrukVkg87UrEygOt2ql+iQ9jxvpWUoBa+29khdmZP+YlIE9maNqIe?= =?us-ascii?Q?X3Dr2Fq2oHYf06Y8O00bRtDp8fj5f92VRx844mP68Ti3JxUe1pindu+naPRP?= =?us-ascii?Q?CcIErEWLnhdxmTlH5Yvg6qTjylMrAA6z4W/h+TjKbjBhA4wrXKhHtLZikqq3?= =?us-ascii?Q?65kOpASntcC75X4wpBVNJWjY9TrRvDw+FE7LfO0hsY1MkaCgCWBKrn5ubKBa?= =?us-ascii?Q?PHjWKZA0tsmuLzN7ZfTLihzrEnF3/4E+l88V+HWn7r/NentbNkKXCBKu4OHD?= =?us-ascii?Q?Ov/vwNfVacIp9tNpTva122V0oq9sRkYYUxfbWr+mrr43DlYQ8qhm+z1qJc/f?= =?us-ascii?Q?3EEPEsZhumTQy/TMBEce8X1Ykm53CJMKabGE/aRay3ZbZjfRYT2qEVM/VARG?= =?us-ascii?Q?XFuMhrNCnwegE7Ebc3maBKHsWPdlDYj9VpoGGz1h4Zw0TE6apOlEIUPWsq/G?= =?us-ascii?Q?VpSeh2Nsc9TjDRpjHlG3aTP2ulxkzzXdreWEwb6+O7s5n/BFQvho3ygfAhEX?= =?us-ascii?Q?pkv9KPkCztUQzl9EpgU=3D?= Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: veeam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: IA0PR14MB6767.namprd14.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: d46904a5-dccc-42a6-34d5-08dcf4380644 X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Oct 2024 14:27:44.0129 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: ba07baab-431b-49ed-add7-cbc3542f5140 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: vG9m4RzHEWtGR8pv5uvFbjgm8QuSbf3tgf/UgpGoOF/Hi+oNDa2nGvcRTg/EUsE5 X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR14MB5273 X-SPAM-LEVEL: Spam detection results: 0 ARC_SIGNED 0.001 Message has a ARC signature ARC_VALID 0.001 Message has a valid ARC signature AWL 0.138 Adjusted score from AWL reputation of From: address BAYES_00 -1.9 Bayes spam probability is 0 to 1% DKIMWL_WL_HIGH -0.263 DKIMwl.org - High trust sender DKIM_SIGNED 0.1 Message has a DKIM or DK signature, not necessarily valid DKIM_VALID -0.1 Message has at least one valid DKIM or DK signature DKIM_VALID_AU -0.1 Message has a valid DKIM or DK signature from author's domain DKIM_VALID_EF -0.1 Message has a valid DKIM or DK signature from envelope-from domain DMARC_PASS -0.1 DMARC pass policy RCVD_IN_MSPIKE_H3 0.001 Good reputation (+3) RCVD_IN_MSPIKE_WL 0.001 Mailspike good senders RCVD_IN_VALIDITY_CERTIFIED_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to Validity was blocked. See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information. RCVD_IN_VALIDITY_RPBL_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to Validity was blocked. See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information. RCVD_IN_VALIDITY_SAFE_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to Validity was blocked. See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information. SPF_HELO_NONE 0.001 SPF: HELO does not publish an SPF Record SPF_PASS -0.001 SPF: sender matches SPF record URIBL_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [veeam.com,proxmox.com] Hi Fiona et al, Just wanted to follow up on the subject. I think I need some guidance from you and your team members on how we at Ve= eam could facilitate development of this and some other features in Proxmox= VE. Is there any standard protocol for that established, or we should simply su= bmit a request/proposal in the mailing list and wait for someone to see it = and respond? Thanks! -----Original Message----- From: Pavel Tide Sent: Friday, September 20, 2024 14:32 To: Fiona Ebner; Proxmox VE development discussion Subject: RE: [pve-devel] Bug 2582 roadmap Hi Fiona, Thank you for helping me out and sorry for my late response. The issue is that right now to work with PVE we have to do the following: 1) Connect via SSH to the PVE node and deploy a helper virtual machine (so = that users don't have to do it manually) 2) Access the Proxmox VE API to perform other backup-related tasks (those t= hat cannot be done via SSH) In item #1 - the new VM deployment involved usage of root/sudo. In item #2 - certain tasks that are performed via API also require root/sud= o. We have managed to move those to the SSH part of the workflow, so now us= ers can use one non-root account to perform all necessary operations (inste= ad of using root or having to use two separate accounts). We think that in future there might be a situation where we might need a su= peruser level of privileges while accessing the API, and there will be no w= orkaround to move the operation to the SSH part of the workflow. This will = result in forcing our joint users to use 'root' account again, which they h= ate to do and also deem as an not secure practice. I hope that helps. If there is anything else what we could do from out side= please let me know. Thanks! -----Original Message----- From: Fiona Ebner Sent: Friday, September 13, 2024 09:59 To: Proxmox VE development discussion Cc: Pavel Tide Subject: Re: [pve-devel] Bug 2582 roadmap Hi Pavel, Am 10.09.24 um 12:18 schrieb Pavel Tide via pve-devel: > Hi Proxmox team, > > Would you provide any delivery estimates on this item? > https://bugz/ > illa.proxmox.com%2Fshow_bug.cgi%3Fid%3D2582&data=3D05%7C02%7CPavel.TIde% > 40veeam.com%7C9fbe3a27cdb746e4522e08dcd3c9f802%7Cba07baab431b49edadd7c > bc3542f5140%7C1%7C0%7C638618111644860239%7CUnknown%7CTWFpbGZsb3d8eyJWI > joiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7 > C%7C&sdata=3DrnV7UTTM7GUpysGbgpLRfGDOA7xtwoACZXoq7N9anNg%3D&reserved=3D0 > > As far as I understand it's been implemented already, but currently stays= in the development branch - our lab is up to date and yet we don't see how= we can create a separate non-root account to work with PVE cluster. > a patch series had been proposed, but the implementation was not finished A= FAIK, see Fabian's review[0]. Since Oguz left the company, nobody else has = picked up work on the series yet. Maybe you can describe what exactly your = use case is, which privileges you'd need in particular. Of course, proposin= g patches for what you need (or a rebased version of Oguz's full series) is= welcome too :) [0]: https://lore.proxmox.com/pve-devel/1658908014.zeyifvlr1o.astroid@nora.none/ Best Regards, Fiona --===============4862401652210352047== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline _______________________________________________ pve-devel mailing list pve-devel@lists.proxmox.com https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel --===============4862401652210352047==--