-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
minikube should not ask for the (sudo) password more than once #8278
Comments
This is especially frustrating since it is not possible to run minicube as root (see length discussion over at #8257) |
This is usually the case when you haven't added your user to the |
@afbjorklund which I for security reasons don't intend to do. I thought it might be possible to ask once for the password and keep the connection to libvirtd open? |
I'm not sure what other options that libvirt provides, but you might want to check there ? We discussed the user sessions at one time, but it didn't really work out... Basically there are issues with the networking, when trying to run minikube as a regular user. So we defer that endeavor to other projects, such as "usernetes". And require root/sudo/admin/etc. |
We are supposed to check for this, to give a better solution message: #5617 And also improve the documentation in general, about the requirements #7963 Not sure the exact security model that VirtualBox uses, but it's more when installing ? |
I think we have a misunderstanding: I am fine running a VM and that my user is not allowed to access it. 99% of the time I interact with my local cluster I do so via kubectl - which I execute as normal user. But to start/stop/delete/etc. the local cluster I have to use Summary: Exception (if user is not in libvirt group):Variant A:
Variant B:
Current situation
|
There are lots of different ways to run docker and libvirt, we just settled on the groups since they seemed to be the most common setups and recommended by the distributions (such as Ubuntu). Some other security frameworks (other than pkexec or whatever libvirt uses) have the possibility to cache credentials in some daemon or whatever, but not something that we have actively looked into. |
I just came up with a workaround:
|
If that workaround is OK for you, then we'll leave this at that. I assume you did the same for kubeconfig ? Basically: |
I merged the |
Steps to reproduce the issue:
System:
The text was updated successfully, but these errors were encountered: