[pve-devel] applied: [PATCH http-server] access control: avoid "uninitialized value" warning if using IP ranges
Fabian Grünbichler
f.gruenbichler at proxmox.com
Tue Jan 30 11:19:46 CET 2024
thanks!
On January 24, 2024 12:38 pm, Friedrich Weber wrote:
> ALLOW_FROM/DENY_FROM accept any syntax understood by Net::IP. However,
> if an IP range like "10.1.1.1-10.1.1.3" is configured, a confusing
> Perl warning is printed to the syslog on a match:
>
> Use of uninitialized value in concatenation (.) or string at [...]
>
> The reason is that we use Net::IP::prefix to prepare a debug message,
> but this returns undef if a range was specified. To avoid the warning,
> use Net::IP::print to obtain a string representation instead.
>
> Signed-off-by: Friedrich Weber <f.weber at proxmox.com>
> ---
> src/PVE/APIServer/AnyEvent.pm | 4 ++--
> 1 file changed, 2 insertions(+), 2 deletions(-)
>
> diff --git a/src/PVE/APIServer/AnyEvent.pm b/src/PVE/APIServer/AnyEvent.pm
> index cebd9ba..b60b825 100644
> --- a/src/PVE/APIServer/AnyEvent.pm
> +++ b/src/PVE/APIServer/AnyEvent.pm
> @@ -1761,7 +1761,7 @@ sub check_host_access {
> foreach my $t (@{$self->{allow_from}}) {
> if ($t->overlaps($cip)) {
> $match_allow = 1;
> - $self->dprint("client IP allowed: ". $t->prefix());
> + $self->dprint("client IP allowed: ". $t->print());
> last;
> }
> }
> @@ -1770,7 +1770,7 @@ sub check_host_access {
> if ($self->{deny_from}) {
> foreach my $t (@{$self->{deny_from}}) {
> if ($t->overlaps($cip)) {
> - $self->dprint("client IP denied: ". $t->prefix());
> + $self->dprint("client IP denied: ". $t->print());
> $match_deny = 1;
> last;
> }
> --
> 2.39.2
>
>
>
> _______________________________________________
> pve-devel mailing list
> pve-devel at lists.proxmox.com
> https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel
>
>
>
More information about the pve-devel
mailing list