Hello. Yes, the token is privilege seperated.is the token privilege separated? could you check the output ofpveum user permissions FULL_TOKEN_ID
?
Yes, I just double checked that the token is the correct one because it's the only one that exists. Other than that Packer gives this full error:can you double check that this is actually the token used for the request? can you dump the full request and response or extract it from a log somewhere (censor any sensitive parts like the token secret)..
This is what I can see from the interface. I've tried to run a console but it doesn't seem to connect.which version are you on? (pveversion -v)
and yes, for a privilege-separated token the user and the token need to have a privilege on a path for it to be effective (but there was a display bug in older versions)
Hello, I also faced the described issue in this topic with Proxmox Virtual Environment 7.2-11. I created a new PVE web-user using the GUI and added a token to the user. Assigning only ACL "Administrator" to the token resulted in errors as described in this topic and this is shown below.you can try adding the corresponding user ACL - but please note that PVE 6.x is EOL since last week, so an upgrade to the still supported 7.x release series is required to receive both this and any other future bug fixes.
$ https --verify=no -v 172.20.1.2:8006/api2/json/nodes/pve/status authorization:"PVEAPIToken=automation@pve!packer-terraform=random-guid-here"
GET /api2/json/nodes/pve/status HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
Connection: keep-alive
Host: 172.20.1.2:8006
User-Agent: HTTPie/3.2.1
authorization: PVEAPIToken=automation@pve!packer-terraform=random-guid-here
HTTP/1.1 403 Permission check failed (/nodes/pve, Sys.Audit)
Cache-Control: max-age=0
Connection: close
Content-Length: 13
Content-Type: application/json;charset=UTF-8
Date: Fri, 28 Oct 2022 11:38:38 GMT
Expires: Fri, 28 Oct 2022 11:38:38 GMT
Pragma: no-cache
Server: pve-api-daemon/3.0
{
"data": null
}