-
-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Support]: Frigate 0.12 does not start in LXC unprivileged enviroment #6075
Comments
This seems like it might be an issue similar to the one listed in the breaking changes of the release notes. Many users are running proxmox without issue so it must be something related to that. |
Thanks for responding, I checked my PATH variable and it appears to be correct:
I think the issue is related to this:
In an unprivileged LXC environment root is not really a root. Since I removed that line of code and everything seems to work just fine, except the log is polluted with:
I'm not really familiar with s6 so I don't know what to fix :) If you can explain why ownership of the file needs to be changed, I probably can fix this problem. Edit: as expected |
Frigate needs to run as root, you can see a similar conversation on the feature request #3108 |
That means it's another breaking change because 0.11.1 runs in an unprivileged LXC just fine. I wonder if there is an option running everything as root within the container without dropping to nobody? This adds no benefit for LXC because the root is already dropped. |
Hmm, maybe I'm misunderstanding, this requirement was the case before in 0.11 as far as I know. |
There is the whole guide to how run in LXC in this repo :) |
That's not official documentation to be clear. In any case, other users have followed that and not had this issue during the beta or full releases. |
I'm running in an LXC but using a privileged container. I'm also using Nvidia passthru... so to each their own, but I've had no issues with doing this. Been using this setup since version 8 with no issues (as far as passthru of storage and hardware). Even transitioned back and forth with a coral TPU and nvidia, both (for decode), and back to nvidia for everything. I understand wanting to keep it unprivileged, but i pass storage and hardware in and its just easier to keep it privileged. I have several LXC's accessing the same hardware and I didn't want to deal with the permission game that you're going to face trying to do this unprivileged. |
Mystery solved. It turns out that when I was messing with lxc.idmap I mapped fewer users than I should have, so the nobody user (uid 65535) was not correctly mapped. After I added:
everything worked. Thanks everyone for help with this non-trivial bug. |
Describe the problem you are having
Frigate cannot start after updating to 0.12. The same setup works perfectly for 0.11.1
Docker compose config:
Version
0.12.0
Frigate config file
NA
Relevant log output
FFprobe output from your camera
Frigate stats
NA
Operating system
Proxmox
Install method
Docker Compose
Coral version
USB
Network connection
Wired
Camera make and model
NA
Any other information that may be helpful
No response
The text was updated successfully, but these errors were encountered: