mirror of
https://git.proxmox.com/git/pve-docs
synced 2025-08-04 20:10:04 +00:00
update static/schema information
Signed-off-by: Thomas Lamprecht <t.lamprecht@proxmox.com>
This commit is contained in:
parent
aa42586806
commit
c30bb419ce
@ -7050,6 +7050,13 @@ const apiSchema = [
|
||||
"type" : "boolean",
|
||||
"typetext" : "<boolean>"
|
||||
},
|
||||
"exitnodes-primary" : {
|
||||
"description" : "Force traffic to this exitnode first.",
|
||||
"format" : "pve-node",
|
||||
"optional" : 1,
|
||||
"type" : "string",
|
||||
"typetext" : "<string>"
|
||||
},
|
||||
"ipam" : {
|
||||
"description" : "use a specific ipam",
|
||||
"optional" : 1,
|
||||
@ -7089,6 +7096,13 @@ const apiSchema = [
|
||||
"type" : "string",
|
||||
"typetext" : "<string>"
|
||||
},
|
||||
"rt-import" : {
|
||||
"description" : "Route-Target import",
|
||||
"format" : "pve-sdn-bgp-rt-list",
|
||||
"optional" : 1,
|
||||
"type" : "string",
|
||||
"typetext" : "<string>"
|
||||
},
|
||||
"tag" : {
|
||||
"description" : "Service-VLAN Tag",
|
||||
"minimum" : 0,
|
||||
@ -7295,6 +7309,13 @@ const apiSchema = [
|
||||
"type" : "boolean",
|
||||
"typetext" : "<boolean>"
|
||||
},
|
||||
"exitnodes-primary" : {
|
||||
"description" : "Force traffic to this exitnode first.",
|
||||
"format" : "pve-node",
|
||||
"optional" : 1,
|
||||
"type" : "string",
|
||||
"typetext" : "<string>"
|
||||
},
|
||||
"ipam" : {
|
||||
"description" : "use a specific ipam",
|
||||
"optional" : 1,
|
||||
@ -7334,6 +7355,13 @@ const apiSchema = [
|
||||
"type" : "string",
|
||||
"typetext" : "<string>"
|
||||
},
|
||||
"rt-import" : {
|
||||
"description" : "Route-Target import",
|
||||
"format" : "pve-sdn-bgp-rt-list",
|
||||
"optional" : 1,
|
||||
"type" : "string",
|
||||
"typetext" : "<string>"
|
||||
},
|
||||
"tag" : {
|
||||
"description" : "Service-VLAN Tag",
|
||||
"minimum" : 0,
|
||||
@ -7482,9 +7510,16 @@ const apiSchema = [
|
||||
"properties" : {
|
||||
"asn" : {
|
||||
"description" : "autonomous system number",
|
||||
"maximum" : 4294967296,
|
||||
"minimum" : 0,
|
||||
"optional" : 1,
|
||||
"type" : "integer",
|
||||
"typetext" : "<integer>"
|
||||
"typetext" : "<integer> (0 - 4294967296)"
|
||||
},
|
||||
"bgp-multipath-as-path-relax" : {
|
||||
"optional" : 1,
|
||||
"type" : "boolean",
|
||||
"typetext" : "<boolean>"
|
||||
},
|
||||
"controller" : {
|
||||
"description" : "The SDN controller object identifier.",
|
||||
@ -7636,9 +7671,16 @@ const apiSchema = [
|
||||
"properties" : {
|
||||
"asn" : {
|
||||
"description" : "autonomous system number",
|
||||
"maximum" : 4294967296,
|
||||
"minimum" : 0,
|
||||
"optional" : 1,
|
||||
"type" : "integer",
|
||||
"typetext" : "<integer>"
|
||||
"typetext" : "<integer> (0 - 4294967296)"
|
||||
},
|
||||
"bgp-multipath-as-path-relax" : {
|
||||
"optional" : 1,
|
||||
"type" : "boolean",
|
||||
"typetext" : "<boolean>"
|
||||
},
|
||||
"controller" : {
|
||||
"description" : "The SDN controller object identifier.",
|
||||
@ -8874,7 +8916,7 @@ const apiSchema = [
|
||||
"info" : {
|
||||
"GET" : {
|
||||
"allowtoken" : 1,
|
||||
"description" : "Get next free VMID. If you pass an VMID it will raise an error if the ID is already used.",
|
||||
"description" : "Get next free VMID. Pass a VMID to assert that its free (at time of check).",
|
||||
"method" : "GET",
|
||||
"name" : "nextid",
|
||||
"parameters" : {
|
||||
@ -25147,7 +25189,7 @@ const apiSchema = [
|
||||
"description" : "Extra mount options for rootfs/mps.",
|
||||
"format_description" : "opt[;opt...]",
|
||||
"optional" : 1,
|
||||
"pattern" : "(?^:(?^:(noatime|nodev|nosuid|noexec))(;(?^:(noatime|nodev|nosuid|noexec)))*)",
|
||||
"pattern" : "(?^:(?^:(noatime|lazytime|nodev|nosuid|noexec))(;(?^:(noatime|lazytime|nodev|nosuid|noexec)))*)",
|
||||
"type" : "string"
|
||||
},
|
||||
"mp" : {
|
||||
@ -25340,7 +25382,7 @@ const apiSchema = [
|
||||
"description" : "Extra mount options for rootfs/mps.",
|
||||
"format_description" : "opt[;opt...]",
|
||||
"optional" : 1,
|
||||
"pattern" : "(?^:(?^:(noatime|nodev|nosuid|noexec))(;(?^:(noatime|nodev|nosuid|noexec)))*)",
|
||||
"pattern" : "(?^:(?^:(noatime|lazytime|nodev|nosuid|noexec))(;(?^:(noatime|lazytime|nodev|nosuid|noexec)))*)",
|
||||
"type" : "string"
|
||||
},
|
||||
"quota" : {
|
||||
@ -25649,7 +25691,7 @@ const apiSchema = [
|
||||
"description" : "Extra mount options for rootfs/mps.",
|
||||
"format_description" : "opt[;opt...]",
|
||||
"optional" : 1,
|
||||
"pattern" : "(?^:(?^:(noatime|nodev|nosuid|noexec))(;(?^:(noatime|nodev|nosuid|noexec)))*)",
|
||||
"pattern" : "(?^:(?^:(noatime|lazytime|nodev|nosuid|noexec))(;(?^:(noatime|lazytime|nodev|nosuid|noexec)))*)",
|
||||
"type" : "string"
|
||||
},
|
||||
"mp" : {
|
||||
@ -25860,7 +25902,7 @@ const apiSchema = [
|
||||
"description" : "Extra mount options for rootfs/mps.",
|
||||
"format_description" : "opt[;opt...]",
|
||||
"optional" : 1,
|
||||
"pattern" : "(?^:(?^:(noatime|nodev|nosuid|noexec))(;(?^:(noatime|nodev|nosuid|noexec)))*)",
|
||||
"pattern" : "(?^:(?^:(noatime|lazytime|nodev|nosuid|noexec))(;(?^:(noatime|lazytime|nodev|nosuid|noexec)))*)",
|
||||
"type" : "string"
|
||||
},
|
||||
"quota" : {
|
||||
@ -29178,6 +29220,13 @@ const apiSchema = [
|
||||
"type" : "string",
|
||||
"typetext" : "<string>"
|
||||
},
|
||||
"target-storage" : {
|
||||
"description" : "Mapping from source to target storages. Providing only a single storage ID maps all source storages to that storage. Providing the special value '1' will map each source storage to itself.",
|
||||
"format" : "storage-pair-list",
|
||||
"optional" : 1,
|
||||
"type" : "string",
|
||||
"typetext" : "<string>"
|
||||
},
|
||||
"timeout" : {
|
||||
"default" : 180,
|
||||
"description" : "Timeout in seconds for shutdown for restart migration",
|
||||
@ -31389,7 +31438,7 @@ const apiSchema = [
|
||||
"description" : "Extra mount options for rootfs/mps.",
|
||||
"format_description" : "opt[;opt...]",
|
||||
"optional" : 1,
|
||||
"pattern" : "(?^:(?^:(noatime|nodev|nosuid|noexec))(;(?^:(noatime|nodev|nosuid|noexec)))*)",
|
||||
"pattern" : "(?^:(?^:(noatime|lazytime|nodev|nosuid|noexec))(;(?^:(noatime|lazytime|nodev|nosuid|noexec)))*)",
|
||||
"type" : "string"
|
||||
},
|
||||
"mp" : {
|
||||
@ -31619,7 +31668,7 @@ const apiSchema = [
|
||||
"description" : "Extra mount options for rootfs/mps.",
|
||||
"format_description" : "opt[;opt...]",
|
||||
"optional" : 1,
|
||||
"pattern" : "(?^:(?^:(noatime|nodev|nosuid|noexec))(;(?^:(noatime|nodev|nosuid|noexec)))*)",
|
||||
"pattern" : "(?^:(?^:(noatime|lazytime|nodev|nosuid|noexec))(;(?^:(noatime|lazytime|nodev|nosuid|noexec)))*)",
|
||||
"type" : "string"
|
||||
},
|
||||
"quota" : {
|
||||
@ -41905,6 +41954,85 @@ const apiSchema = [
|
||||
},
|
||||
"proxyto" : "node",
|
||||
"returns" : {
|
||||
"properties" : {
|
||||
"acme" : {
|
||||
"description" : "Node specific ACME settings.",
|
||||
"format" : {
|
||||
"account" : {
|
||||
"default" : "default",
|
||||
"description" : "ACME account config file name.",
|
||||
"format" : "pve-configid",
|
||||
"format_description" : "name",
|
||||
"optional" : 1,
|
||||
"type" : "string"
|
||||
},
|
||||
"domains" : {
|
||||
"description" : "List of domains for this node's ACME certificate",
|
||||
"format" : "pve-acme-domain-list",
|
||||
"format_description" : "domain[;domain;...]",
|
||||
"optional" : 1,
|
||||
"type" : "string"
|
||||
}
|
||||
},
|
||||
"optional" : 1,
|
||||
"type" : "string"
|
||||
},
|
||||
"acmedomain[n]" : {
|
||||
"description" : "ACME domain and validation plugin",
|
||||
"format" : {
|
||||
"alias" : {
|
||||
"description" : "Alias for the Domain to verify ACME Challenge over DNS",
|
||||
"format" : "pve-acme-alias",
|
||||
"format_description" : "domain",
|
||||
"optional" : 1,
|
||||
"type" : "string"
|
||||
},
|
||||
"domain" : {
|
||||
"default_key" : 1,
|
||||
"description" : "domain for this node's ACME certificate",
|
||||
"format" : "pve-acme-domain",
|
||||
"format_description" : "domain",
|
||||
"type" : "string"
|
||||
},
|
||||
"plugin" : {
|
||||
"default" : "standalone",
|
||||
"description" : "The ACME plugin ID",
|
||||
"format" : "pve-configid",
|
||||
"format_description" : "name of the plugin configuration",
|
||||
"optional" : 1,
|
||||
"type" : "string"
|
||||
}
|
||||
},
|
||||
"optional" : 1,
|
||||
"type" : "string"
|
||||
},
|
||||
"description" : {
|
||||
"description" : "Description for the Node. Shown in the web-interface node notes panel. This is saved as comment inside the configuration file.",
|
||||
"maxLength" : 65536,
|
||||
"optional" : 1,
|
||||
"type" : "string"
|
||||
},
|
||||
"digest" : {
|
||||
"description" : "Prevent changes if current configuration file has different SHA1 digest. This can be used to prevent concurrent modifications.",
|
||||
"maxLength" : 40,
|
||||
"optional" : 1,
|
||||
"type" : "string"
|
||||
},
|
||||
"startall-onboot-delay" : {
|
||||
"default" : 0,
|
||||
"description" : "Initial delay in seconds, before starting all the Virtual Guests with on-boot enabled.",
|
||||
"maximum" : 300,
|
||||
"minimum" : 0,
|
||||
"optional" : 1,
|
||||
"type" : "integer"
|
||||
},
|
||||
"wakeonlan" : {
|
||||
"description" : "MAC address for wake on LAN",
|
||||
"format" : "mac-addr",
|
||||
"optional" : 1,
|
||||
"type" : "string"
|
||||
}
|
||||
},
|
||||
"type" : "object"
|
||||
}
|
||||
},
|
||||
@ -42810,8 +42938,8 @@ const apiSchema = [
|
||||
"default" : "login",
|
||||
"description" : "Run specific command or default to login.",
|
||||
"enum" : [
|
||||
"ceph_install",
|
||||
"upgrade",
|
||||
"ceph_install",
|
||||
"login"
|
||||
],
|
||||
"optional" : 1,
|
||||
@ -42906,8 +43034,8 @@ const apiSchema = [
|
||||
"default" : "login",
|
||||
"description" : "Run specific command or default to login.",
|
||||
"enum" : [
|
||||
"ceph_install",
|
||||
"upgrade",
|
||||
"ceph_install",
|
||||
"login"
|
||||
],
|
||||
"optional" : 1,
|
||||
@ -43032,8 +43160,8 @@ const apiSchema = [
|
||||
"default" : "login",
|
||||
"description" : "Run specific command or default to login.",
|
||||
"enum" : [
|
||||
"ceph_install",
|
||||
"upgrade",
|
||||
"ceph_install",
|
||||
"login"
|
||||
],
|
||||
"optional" : 1,
|
||||
@ -44010,6 +44138,12 @@ const apiSchema = [
|
||||
"type" : "string",
|
||||
"typetext" : "<string>"
|
||||
},
|
||||
"data-pool" : {
|
||||
"description" : "Data Pool (for erasure coding only)",
|
||||
"optional" : 1,
|
||||
"type" : "string",
|
||||
"typetext" : "<string>"
|
||||
},
|
||||
"delete" : {
|
||||
"description" : "A list of settings you want to delete.",
|
||||
"format" : "pve-configid-list",
|
||||
@ -44496,6 +44630,12 @@ const apiSchema = [
|
||||
"type" : "string",
|
||||
"typetext" : "<string>"
|
||||
},
|
||||
"data-pool" : {
|
||||
"description" : "Data Pool (for erasure coding only)",
|
||||
"optional" : 1,
|
||||
"type" : "string",
|
||||
"typetext" : "<string>"
|
||||
},
|
||||
"datastore" : {
|
||||
"description" : "Proxmox Backup Server datastore name.",
|
||||
"optional" : 1,
|
||||
@ -45484,6 +45624,28 @@ const apiSchema = [
|
||||
"type" : "string"
|
||||
},
|
||||
"tokens" : {
|
||||
"additionalProperties" : {
|
||||
"properties" : {
|
||||
"comment" : {
|
||||
"optional" : 1,
|
||||
"type" : "string"
|
||||
},
|
||||
"expire" : {
|
||||
"default" : "same as user",
|
||||
"description" : "API token expiration date (seconds since epoch). '0' means no expiration date.",
|
||||
"minimum" : 0,
|
||||
"optional" : 1,
|
||||
"type" : "integer"
|
||||
},
|
||||
"privsep" : {
|
||||
"default" : 1,
|
||||
"description" : "Restrict API token privileges with separate ACLs (default), or give full privileges of corresponding user.",
|
||||
"optional" : 1,
|
||||
"type" : "boolean"
|
||||
}
|
||||
},
|
||||
"type" : "object"
|
||||
},
|
||||
"optional" : 1,
|
||||
"type" : "object"
|
||||
}
|
||||
@ -45568,7 +45730,7 @@ const apiSchema = [
|
||||
"User.Modify"
|
||||
],
|
||||
"groups_param",
|
||||
1
|
||||
"update"
|
||||
]
|
||||
},
|
||||
"protected" : 1,
|
||||
@ -45792,7 +45954,7 @@ const apiSchema = [
|
||||
"User.Modify"
|
||||
],
|
||||
"groups_param",
|
||||
1
|
||||
"create"
|
||||
]
|
||||
],
|
||||
"description" : "You need 'Realm.AllocateUser' on '/access/realm/<realm>' on the realm of user <userid>, and 'User.Modify' permissions to '/access/groups/<group>' for any group specified (or 'User.Modify' on '/access/groups' if you pass no groups."
|
||||
@ -46520,11 +46682,15 @@ const apiSchema = [
|
||||
"check" : [
|
||||
"and",
|
||||
[
|
||||
"userid-param",
|
||||
"Realm.AllocateUser"
|
||||
"perm",
|
||||
"/access/realm/{realm}",
|
||||
[
|
||||
"Realm.AllocateUser"
|
||||
]
|
||||
],
|
||||
[
|
||||
"userid-group",
|
||||
"perm",
|
||||
"/access/groups",
|
||||
[
|
||||
"User.Modify"
|
||||
]
|
||||
@ -46615,6 +46781,12 @@ const apiSchema = [
|
||||
"parameters" : {
|
||||
"additionalProperties" : 0,
|
||||
"properties" : {
|
||||
"acr-values" : {
|
||||
"description" : "Specifies the Authentication Context Class Reference values that theAuthorization Server is being requested to use for the Auth Request.",
|
||||
"optional" : 1,
|
||||
"type" : "string",
|
||||
"typetext" : "<string>"
|
||||
},
|
||||
"autocreate" : {
|
||||
"default" : 0,
|
||||
"description" : "Automatically create users if they do not exist.",
|
||||
@ -46780,6 +46952,12 @@ const apiSchema = [
|
||||
"type" : "integer",
|
||||
"typetext" : "<integer> (1 - 65535)"
|
||||
},
|
||||
"prompt" : {
|
||||
"description" : "Specifies whether the Authorization Server prompts the End-User for reauthentication and consent.",
|
||||
"optional" : 1,
|
||||
"pattern" : "(?:none|login|consent|select_account|\\S+)",
|
||||
"type" : "string"
|
||||
},
|
||||
"realm" : {
|
||||
"description" : "Authentication domain ID",
|
||||
"format" : "pve-realm",
|
||||
@ -46787,6 +46965,13 @@ const apiSchema = [
|
||||
"type" : "string",
|
||||
"typetext" : "<string>"
|
||||
},
|
||||
"scopes" : {
|
||||
"default" : "email profile",
|
||||
"description" : "Specifies the scopes (user details) that should be authorized and returned, for example 'email' or 'profile'.",
|
||||
"optional" : 1,
|
||||
"type" : "string",
|
||||
"typetext" : "<string>"
|
||||
},
|
||||
"secure" : {
|
||||
"description" : "Use secure LDAPS protocol. DEPRECATED: use 'mode' instead.",
|
||||
"optional" : 1,
|
||||
@ -46942,6 +47127,12 @@ const apiSchema = [
|
||||
"parameters" : {
|
||||
"additionalProperties" : 0,
|
||||
"properties" : {
|
||||
"acr-values" : {
|
||||
"description" : "Specifies the Authentication Context Class Reference values that theAuthorization Server is being requested to use for the Auth Request.",
|
||||
"optional" : 1,
|
||||
"type" : "string",
|
||||
"typetext" : "<string>"
|
||||
},
|
||||
"autocreate" : {
|
||||
"default" : 0,
|
||||
"description" : "Automatically create users if they do not exist.",
|
||||
@ -47092,6 +47283,12 @@ const apiSchema = [
|
||||
"type" : "integer",
|
||||
"typetext" : "<integer> (1 - 65535)"
|
||||
},
|
||||
"prompt" : {
|
||||
"description" : "Specifies whether the Authorization Server prompts the End-User for reauthentication and consent.",
|
||||
"optional" : 1,
|
||||
"pattern" : "(?:none|login|consent|select_account|\\S+)",
|
||||
"type" : "string"
|
||||
},
|
||||
"realm" : {
|
||||
"description" : "Authentication domain ID",
|
||||
"format" : "pve-realm",
|
||||
@ -47099,6 +47296,13 @@ const apiSchema = [
|
||||
"type" : "string",
|
||||
"typetext" : "<string>"
|
||||
},
|
||||
"scopes" : {
|
||||
"default" : "email profile",
|
||||
"description" : "Specifies the scopes (user details) that should be authorized and returned, for example 'email' or 'profile'.",
|
||||
"optional" : 1,
|
||||
"type" : "string",
|
||||
"typetext" : "<string>"
|
||||
},
|
||||
"secure" : {
|
||||
"description" : "Use secure LDAPS protocol. DEPRECATED: use 'mode' instead.",
|
||||
"optional" : 1,
|
||||
@ -47181,13 +47385,9 @@ const apiSchema = [
|
||||
},
|
||||
"username-claim" : {
|
||||
"description" : "OpenID claim used to generate the unique username.",
|
||||
"enum" : [
|
||||
"subject",
|
||||
"username",
|
||||
"email"
|
||||
],
|
||||
"optional" : 1,
|
||||
"type" : "string"
|
||||
"type" : "string",
|
||||
"typetext" : "<string>"
|
||||
},
|
||||
"verify" : {
|
||||
"default" : 0,
|
||||
@ -48128,6 +48328,15 @@ const apiSchema = [
|
||||
"format" : "pve-poolid",
|
||||
"type" : "string",
|
||||
"typetext" : "<string>"
|
||||
},
|
||||
"type" : {
|
||||
"enum" : [
|
||||
"qemu",
|
||||
"lxc",
|
||||
"storage"
|
||||
],
|
||||
"optional" : 1,
|
||||
"type" : "string"
|
||||
}
|
||||
}
|
||||
},
|
||||
|
@ -390,6 +390,10 @@ Use online/live migration.
|
||||
|
||||
Use restart migration
|
||||
|
||||
`--target-storage` `<string>` ::
|
||||
|
||||
Mapping from source to target storages. Providing only a single storage ID maps all source storages to that storage. Providing the special value '1' will map each source storage to itself.
|
||||
|
||||
`--timeout` `<integer>` ('default =' `180`)::
|
||||
|
||||
Timeout in seconds for shutdown for restart migration
|
||||
|
@ -1,29 +1,18 @@
|
||||
`--dest` `<string>` ::
|
||||
|
||||
Restrict packet destination address. This can refer to a single IP address, an
|
||||
IP set ('+ipsetname') or an IP alias definition. You can also specify an
|
||||
address range like '20.34.101.207-201.3.9.99', or a list of IP addresses and
|
||||
networks (entries are separated by comma). Please do not mix IPv4 and IPv6
|
||||
addresses inside such lists.
|
||||
Restrict packet destination address. This can refer to a single IP address, an IP set ('+ipsetname') or an IP alias definition. You can also specify an address range like '20.34.101.207-201.3.9.99', or a list of IP addresses and networks (entries are separated by comma). Please do not mix IPv4 and IPv6 addresses inside such lists.
|
||||
|
||||
`--dport` `<string>` ::
|
||||
|
||||
Restrict TCP/UDP destination port. You can use service names or simple numbers
|
||||
(0-65535), as defined in '/etc/services'. Port ranges can be specified with
|
||||
'\d+:\d+', for example '80:85', and you can use comma separated list to match
|
||||
several ports or ranges.
|
||||
Restrict TCP/UDP destination port. You can use service names or simple numbers (0-65535), as defined in '/etc/services'. Port ranges can be specified with '\d+:\d+', for example '80:85', and you can use comma separated list to match several ports or ranges.
|
||||
|
||||
`--icmp-type` `<string>` ::
|
||||
|
||||
Restrict ICMP packets to specific types. You can either use the names as
|
||||
ip[6]tables ('ip[6]tables -p icmp[v6] -h') provides them, or use the
|
||||
Type[/Code] value, for example 'network-unreachable' which corresponds to
|
||||
'3/0'.
|
||||
Specify icmp-type. Only valid if proto equals 'icmp'.
|
||||
|
||||
`--iface` `<string>` ::
|
||||
|
||||
Network interface name. You have to use network configuration key names for VMs
|
||||
and containers ('net\d+'). Host related rules can use arbitrary strings.
|
||||
Network interface name. You have to use network configuration key names for VMs and containers ('net\d+'). Host related rules can use arbitrary strings.
|
||||
|
||||
`--log` `<alert | crit | debug | emerg | err | info | nolog | notice | warning>` ::
|
||||
|
||||
@ -31,21 +20,13 @@ Log level for firewall rule.
|
||||
|
||||
`--proto` `<string>` ::
|
||||
|
||||
IP protocol. You can use protocol names ('tcp'/'udp') or simple numbers, as
|
||||
defined in '/etc/protocols'.
|
||||
IP protocol. You can use protocol names ('tcp'/'udp') or simple numbers, as defined in '/etc/protocols'.
|
||||
|
||||
`--source` `<string>` ::
|
||||
|
||||
Restrict packet source address. This can refer to a single IP address, an IP
|
||||
set ('+ipsetname') or an IP alias definition. You can also specify an address
|
||||
range like '20.34.101.207-201.3.9.99', or a list of IP addresses and networks
|
||||
(entries are separated by comma). Please do not mix IPv4 and IPv6 addresses
|
||||
inside such lists.
|
||||
Restrict packet source address. This can refer to a single IP address, an IP set ('+ipsetname') or an IP alias definition. You can also specify an address range like '20.34.101.207-201.3.9.99', or a list of IP addresses and networks (entries are separated by comma). Please do not mix IPv4 and IPv6 addresses inside such lists.
|
||||
|
||||
`--sport` `<string>` ::
|
||||
|
||||
Restrict TCP/UDP source port. You can use service names or simple numbers
|
||||
(0-65535), as defined in '/etc/services'. Port ranges can be specified with
|
||||
'\d+:\d+', for example '80:85', and you can use comma separated list to match
|
||||
several ports or ranges.
|
||||
Restrict TCP/UDP source port. You can use service names or simple numbers (0-65535), as defined in '/etc/services'. Port ranges can be specified with '\d+:\d+', for example '80:85', and you can use comma separated list to match several ports or ranges.
|
||||
|
||||
|
@ -42,6 +42,10 @@ Allowed content types.
|
||||
+
|
||||
NOTE: the value 'rootdir' is used for Containers, and value 'images' for VMs.
|
||||
|
||||
`--data-pool` `<string>` ::
|
||||
|
||||
Data Pool (for erasure coding only)
|
||||
|
||||
`--datastore` `<string>` ::
|
||||
|
||||
Proxmox Backup Server datastore name.
|
||||
@ -586,6 +590,10 @@ Allowed content types.
|
||||
+
|
||||
NOTE: the value 'rootdir' is used for Containers, and value 'images' for VMs.
|
||||
|
||||
`--data-pool` `<string>` ::
|
||||
|
||||
Data Pool (for erasure coding only)
|
||||
|
||||
`--delete` `<string>` ::
|
||||
|
||||
A list of settings you want to delete.
|
||||
|
@ -192,6 +192,10 @@ Add an authentication server.
|
||||
|
||||
Authentication domain ID
|
||||
|
||||
`--acr-values` `<string>` ::
|
||||
|
||||
Specifies the Authentication Context Class Reference values that theAuthorization Server is being requested to use for the Auth Request.
|
||||
|
||||
`--autocreate` `<boolean>` ('default =' `0`)::
|
||||
|
||||
Automatically create users if they do not exist.
|
||||
@ -276,6 +280,14 @@ LDAP bind password. Will be stored in '/etc/pve/priv/realm/<REALM>.pw'.
|
||||
|
||||
Server port.
|
||||
|
||||
`--prompt` `(?:none|login|consent|select_account|\S+)` ::
|
||||
|
||||
Specifies whether the Authorization Server prompts the End-User for reauthentication and consent.
|
||||
|
||||
`--scopes` `<string>` ('default =' `email profile`)::
|
||||
|
||||
Specifies the scopes (user details) that should be authorized and returned, for example 'email' or 'profile'.
|
||||
|
||||
`--secure` `<boolean>` ::
|
||||
|
||||
Use secure LDAPS protocol. DEPRECATED: use 'mode' instead.
|
||||
@ -316,7 +328,7 @@ LDAP user attribute name
|
||||
|
||||
The objectclasses for users.
|
||||
|
||||
`--username-claim` `<email | subject | username>` ::
|
||||
`--username-claim` `<string>` ::
|
||||
|
||||
OpenID claim used to generate the unique username.
|
||||
|
||||
@ -344,6 +356,10 @@ Update authentication server settings.
|
||||
|
||||
Authentication domain ID
|
||||
|
||||
`--acr-values` `<string>` ::
|
||||
|
||||
Specifies the Authentication Context Class Reference values that theAuthorization Server is being requested to use for the Auth Request.
|
||||
|
||||
`--autocreate` `<boolean>` ('default =' `0`)::
|
||||
|
||||
Automatically create users if they do not exist.
|
||||
@ -436,6 +452,14 @@ LDAP bind password. Will be stored in '/etc/pve/priv/realm/<REALM>.pw'.
|
||||
|
||||
Server port.
|
||||
|
||||
`--prompt` `(?:none|login|consent|select_account|\S+)` ::
|
||||
|
||||
Specifies whether the Authorization Server prompts the End-User for reauthentication and consent.
|
||||
|
||||
`--scopes` `<string>` ('default =' `email profile`)::
|
||||
|
||||
Specifies the scopes (user details) that should be authorized and returned, for example 'email' or 'profile'.
|
||||
|
||||
`--secure` `<boolean>` ::
|
||||
|
||||
Use secure LDAPS protocol. DEPRECATED: use 'mode' instead.
|
||||
|
Loading…
Reference in New Issue
Block a user