hi,
debug like a PRO :-D
created a stunnel ... and removed https ;-)
E.....@.@.....2"..2".i"...|j.2L.P..V.>..POST /api2/json/nodes/pmox01/lxc HTTP/1.1
Accept: */*; q=0.5, application/xml
Accept-Encoding: gzip, deflate
Csrfpreventiontoken: 57176E25:SZDUtTe4PRV7gPLt5O1uUGttaDA
Cookie: PVEAuthCookie=PVE:vagrant@pve<secret>
Content-Length: 191
Content-Type: application/x-www-form-urlencoded
User-Agent: Ruby
Host: 172.25.50.34:8888
13:55:21.279062 IP devpc.8888 > devpc.34409: Flags [.], ack 686, win 353, length 0
E..(..@.@.....2"..2""..i.2L.....P..a....
13:55:21.279081 IP devpc.34409 > devpc21.8888: Flags [P.], seq 686:877, ack 1, win 342, length 191
E.....@.@.....2"..2".i"......2L.P..V.P..vmid=9000&ostemplate=&hostname=box&password=vagrant&rootfs=pve-container%3A1&memory=512&description=vagrant_box&net0=name%3Deth0%2Cip%3D192.168.15.61%2F24%2Cgw%3D192.168.15.1%2Cbridge%3Dvmbr1
13:55:21.279085 IP devpc.8888 > devpc.34409: Flags [.], ack 877, win 363, length 0
E..(..@.@.....2"..2""..i.2L.....P..k....
13:55:21.288477 IP devp.8888 > devpc.34409: Flags [P.], seq 1:363, ack 877, win 363, length 362
E.....@.@..[..2"..2""..i.2L.....P..k....HTTP/1.1 500 Only root can pass arbitrary filesystem paths. at /usr/share/perl5/PVE/RPCEnvironment.pm line 304.
Cache-Control: max-age=0
Connection: close
Date: Wed, 20 Apr 2016 11:55:21 GMT
Pragma: no-cache
Server: pve-api-daemon/3.0
Content-Length: 13
Content-Type: application/json;charset=UTF-8
Expires: Wed, 20 Apr 2016 11:55:21 GMT
Debug from pveproxy:
172.25.50.34 - vagrant@pve [20/Apr/2016:14:04:40 +0200] "GET /api2/json/cluster/resources?type=vm HTTP/1.1" 200 1542
172.25.50.34 - vagrant@pve [20/Apr/2016:14:04:40 +0200] "POST /api2/json/nodes/pmox01/lxc HTTP/1.1" 500 13
$VAR1 = {
'log' => {
'code' => 500,
'userid' => 'vagrant@pve',
'requestline' => 'POST /api2/json/nodes/pmox01/lxc HTTP/1.1',
'content_length' => 13,
'written' => 1
},
'request' => bless( {
'_content' => 'vmid=9000&ostemplate=&hostname=box&password=vagrant&rootfs=pve-container%3A1&memory=512&description=vagrant_box&net0=name%3Deth0%2Cip%3D192.168.15.61%2F24%2Cgw%3D192.168.15.1%2Cbridge%3Dvmbr1',
'_method' => 'POST',
'_headers' => bless( {
'accept-encoding' => 'gzip, deflate',
'content-type' => 'application/x-www-form-urlencoded',
'user-agent' => 'Ruby',
'host' => '172.25.50.34:8888',
'csrfpreventiontoken' => '57177055:flKnXTawRCPJdLE5SJndRKok4Rk',
'cookie' => 'PVEAuthCookie=PVE:vagrant@pve:57177055::<secret>',
'pveclientip' => '172.25.50.34',
'content-length' => '191',
'accept' => '*/*; q=0.5, application/xml',
'::std_case' => {
'cookie' => 'Cookie',
'pveclientip' => 'PVEClientIP',
'csrfpreventiontoken' => 'Csrfpreventiontoken',
'pvedisableproxy' => 'PVEDisableProxy'
}
}, 'HTTP::Headers' ),
'_uri' => bless( do{\(my $o = '/api2/json/nodes/pmox01/lxc')}, 'URI::_generic' )
}, 'HTTP::Request' ),
'peer_host' => '172.25.50.34',
'keep_alive' => 0,
'hdl' => bless( {
'tls_ctx' => bless( {
'verify_mode' => 0,
'ctx' => 112252432
}, 'AnyEvent::TLS' ),
'_tw' => bless( do{\(my $o = 'H�A��Ep�K�\\j<y��d9A')}, 'EV::Timer' ),
'rbuf' => '',
'_rw' => bless( do{\(my $o = 'H�A�.���N��E�\\j
')}, 'EV::IO' ),
'_wbio' => 122591184,
'fh' => bless( \*Symbol::GEN17, 'IO::Socket::IP' ),
'timeout' => 5,
'_activity' => '1461153880.15852',
'on_error' => sub { "DUMMY" },
'_ractivity' => '1461153880.11188',
'_wactivity' => '1461153880.11135',
'tls' => 122627248,
'on_eof' => sub { "DUMMY" },
'read_size' => 2048,
'wbuf' => '',
'_rbio' => 122418816,
'linger' => 0,
'oobinline' => 1,
'_queue' => [],
'rbuf_max' => 65536
}, 'AnyEvent::Handle' ),
'starttime' => [
1461153880,
111963
],
'peer_port' => 52485,
'proto' => {
'min' => '1',
'ver' => 1001,
'maj' => 1,
'str' => 'HTTP/1.1'
},
'accept_gzip' => 1
};