Fedora Core OS ignition - root@pam API tokens restricted from using qemu args

thecurseofrng

New Member
May 2, 2022
10
0
1
Paris, France
Greetings,

I'm running into an issue with the PVE API. I need to set the args field to feed an ignition file to Fedora CoreOS virtual machines, but can't using an API token attached to the root@pam user, even with separation of privileges turned off. The API returns the following error: 500 Internal Server Error: only root can set 'args' config. Running the same code with the root@pam user and password authentication works.

I understand why args was limited to the root user as this field can be somewhat dangerous, but is the limitation to requests using password authentication a design choice, a technical limitation as Qemu.pm is unable to differentiate if a token uses separation of privileges, or an oversight when API tokens were introduced?

Incidentally, is there any plan for Ignition support in PVE at some point? Or something at a lower level like <sysinfo type='fwcfg'> in libvirt? Anything that could avoid using qemu arguments.
 
I understand why args was limited to the root user as this field can be somewhat dangerous, but is the limitation to requests using password authentication a design choice, a technical limitation as Qemu.pm is unable to differentiate if a token uses separation of privileges, or an oversight when API tokens were introduced?
there is currently some effort done into removing hardcoded 'root only' checks and replacing them with a 'superuser' privilege: https://lists.proxmox.com/pipermail/pve-devel/2022-April/052490.html
though this takes time to be implemented correctly

Incidentally, is there any plan for Ignition support in PVE at some point? Or something at a lower level like <sysinfo type='fwcfg'> in libvirt? Anything that could avoid using qemu arguments.
not really, but i can imagine providing fwcfg values could be useful. would you mind open a feature request for this here: https://bugzilla.proxmox.com
 
Sorry to necro this but is there any recent update? For some reason my Proxmox throws a 401 when trying to authenticate with username and password so I'm relying on using an auth token. Since I intend to use Ansible to create Ubuntu VMs using Ubuntu's own autoinstall system I need the token to be able to access KVM arguments.
 

About

The Proxmox community has been around for many years and offers help and support for Proxmox VE, Proxmox Backup Server, and Proxmox Mail Gateway.
We think our community is one of the best thanks to people like you!

Get your subscription!

The Proxmox team works very hard to make sure you are running the best software and getting stable updates and security enhancements, as well as quick enterprise support. Tens of thousands of happy customers have a Proxmox subscription. Get yours easily in our online shop.

Buy now!