-
Notifications
You must be signed in to change notification settings - Fork 565
vmm: warn about deprecation of default IP address + mask #7179
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
vmm: warn about deprecation of default IP address + mask #7179
Conversation
Issue: cloud-hypervisor#7083 Signed-off-by: Maximilian Güntner <[email protected]>
|
When adding a new net device using Should I add a corresponding logger? This may be unexpected behavior for users as currently no logs are printed at all besides the result of the command. |
I think that's a good idea. Would you please open a follow-up PR for that? Thank you. |
This change enables easier integration with third-party tools by removing the requirement for a dummy IP address when configuring tap devices. The modification applies to both CLI and API interactions. Previously, cloud-hypervisor would automatically set a default static IP address (192.168.249.1) if none was provided. This could lead to: * multiple devices without explicit IP configurations would end up with the same default IP * unnecessary inclusion of this IP in firewall rules * the IP address could clash with host networking and routing Removes warnings introduced in cloud-hypervisor#7179. Closes issue cloud-hypervisor#7083. Signed-off-by: Maximilian Güntner <[email protected]>
This change enables easier integration with third-party tools by removing the requirement for a dummy IP address when configuring tap devices. The modification applies to both CLI and API interactions. Previously, cloud-hypervisor would automatically set a default static IP address (192.168.249.1) if none was provided. This could lead to: * multiple devices without explicit IP configurations would end up with the same default IP * unnecessary inclusion of this IP in firewall rules * the IP address could clash with host networking and routing Removes warnings introduced in cloud-hypervisor#7179. Closes issue cloud-hypervisor#7083. Signed-off-by: Maximilian Güntner <[email protected]>
This change enables easier integration with third-party tools by removing the requirement for a dummy IP address when configuring tap devices. The modification applies to both CLI and API interactions. Previously, cloud-hypervisor would automatically set a default static IP address (192.168.249.1) if none was provided. This could lead to: * multiple devices without explicit IP configurations would end up with the same default IP * unnecessary inclusion of this IP in firewall rules * the IP address could clash with host networking and routing This introduces a new constraint: When providing an IP, the mask must also be provided. Removes warnings introduced in cloud-hypervisor#7179. Closes issue cloud-hypervisor#7083. Signed-off-by: Maximilian Güntner <[email protected]>
This change enables easier integration with third-party tools by removing the requirement for a dummy IP address when configuring tap devices. The modification applies to both CLI and API interactions. Previously, cloud-hypervisor would automatically set a default static IP address (192.168.249.1) if none was provided. This could lead to: * multiple devices without explicit IP configurations would end up with the same default IP * unnecessary inclusion of this IP in firewall rules * the IP address could clash with host networking and routing This introduces a new constraint: When providing an IP, the mask must also be provided. Removes warnings introduced in cloud-hypervisor#7179. Closes issue cloud-hypervisor#7083. Signed-off-by: Maximilian Güntner <[email protected]>
This change enables easier integration with third-party tools by removing the requirement for a dummy IP address when configuring tap devices. The modification applies to both CLI and API interactions. Previously, cloud-hypervisor would automatically set a default static IP address (192.168.249.1) if none was provided. This could lead to: * multiple devices without explicit IP configurations would end up with the same default IP * unnecessary inclusion of this IP in firewall rules * the IP address could clash with host networking and routing This introduces a new constraint: When providing an IP, the mask must also be provided. Removes warnings introduced in cloud-hypervisor#7179. Closes issue cloud-hypervisor#7083. Signed-off-by: Maximilian Güntner <[email protected]>
This change enables easier integration with third-party tools by removing the requirement for a dummy IP address when configuring tap devices. The modification applies to both CLI and API interactions. Previously, cloud-hypervisor would automatically set a default static IP address (192.168.249.1) if none was provided. This could lead to: * multiple devices without explicit IP configurations would end up with the same default IP * unnecessary inclusion of this IP in firewall rules * the IP address could clash with host networking and routing This introduces a new constraint: When providing an IP, the mask must also be provided. Removes warnings introduced in cloud-hypervisor#7179. Closes issue cloud-hypervisor#7083. Signed-off-by: Maximilian Güntner <[email protected]>
This change enables easier integration with third-party tools by removing the requirement for a dummy IP address when configuring tap devices. The modification applies to both CLI and API interactions. Previously, cloud-hypervisor would automatically set a default static IP address (192.168.249.1) if none was provided. This could lead to: * multiple devices without explicit IP configurations would end up with the same default IP * unnecessary inclusion of this IP in firewall rules * the IP address could clash with host networking and routing This introduces a new constraint: When providing an IP, the mask must also be provided. Removes warnings introduced in #7179. Closes issue #7083. Signed-off-by: Maximilian Güntner <[email protected]>
Issue: #7083
The location of the
warn!statements cover bothNetConfig::parseandNetConfigcreation via deserialization usingserde.Preparation for a PR like #7076 in a few releases.