-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
minikube driver check should not call sudo, if sudo fails #11973
Comments
I think this is the driver auto-detection in action... You can select the docker driver explicitly, to avoid it... It assumes that if podman is installed, that it has also been setup for passwordless sudo ( Similarly it assumes that if docker is installed, that the user has been added to the root-equivalent group (no sudo) There is no particular reason why podman couldn't use a group or docker use sudo, other than "historic reasons". |
I suppose we could try parsing the output of
There are a few corner cases like ALL and groups and such, but other than that it should be listed. On Linux there is no client/server, so there is only one version. It could be validated earlier there. $ podman version
Version: 3.2.2
API Version: 3.2.2
Go Version: go1.15.2
Built: Thu Jan 1 01:00:00 1970
OS/Arch: linux/amd64
$ podman-remote version
Client:
Version: 3.2.2
API Version: 3.2.2
Go Version: go1.15.2
Built: Thu Jan 1 01:00:00 1970
OS/Arch: linux/amd64
Server:
Version: 3.2.2
API Version: 3.2.2
Go Version: go1.15.2
Built: Thu Jan 1 01:00:00 1970
OS/Arch: linux/amd64 On Win and Mac the EDIT: Never mind, still need to call "sudo podman version" for the full output (not rootless). Supposedly we could use "podman --version" as an alternative Linux shortcut, if desired |
@bigon the reason minikube is calling podman, it is because when you don't specify the driver with --driver flag, minikube will check all installed tools on your system and automatically select best driver (most healthy one) I am curious, does this mnikube calls to podman cause any harm or annoyance to the user experience? |
/triage needs-information |
The main problem is that it calls sudo, it immediately fails and and sudo failures generate a mail |
@bigon I see ! I agree we should do better job, if we can NOT execute sudo, we should skip it this is a good first issue |
@medyagh I would like to pick this up as a good first issue. Could you please give me some pointers? I am looking at |
@clintonyeb just wanted to check if you were still working on this issue or if I'm okay to pick this up? |
/assign |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close |
@k8s-triage-robot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Steps to reproduce the issue:
--driver
)Full output of
minikube logs
command:It seems that minikube stills calls podman executable (and sudo) even if it tells that it uses docker. I see logs/mails coming from sudo telling me that minikube tried to run podman executable without providing a password
Messages like:
The text was updated successfully, but these errors were encountered: