-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. Weβll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ChromeOS compatability (mount: /sys: permission denied.: container exited unexpectedly) #6411
Comments
NOTE: This issue means that minikube effectively will not work on ChromeOS at this time. |
@tstromberg
see the code bellow. that is in kic.go
@tstromberg so I belive on chrome os, the user doesnt have access to to that folder |
@medyagh : This is more of a platform issue, when running on Crostini (the Debian "Linux (Beta)") https://bugs.chromium.org/p/chromium/issues/detail?id=878034 It comes from the kindbase, that the kicbase inherits. It is the |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
I've just switched my work machine to a Pixelbook Go, so I felt I should update this issue with the latest output on the current kernel release:
|
I did some playing around, and found that disabling the apparently unnecessary remount gets minikube a bit farther: at least into kubeadm, and starting the kubelet. Unfortunately, it fails eventually, for a reason which I have not been able to root cause yet:
To get this far, I'm applying the following diff:
and running the following command:
The resulting image still works on regular Debian host, but not yet on ChromeOS. |
My work machine is a Pixelbook too, and just ran into this issue when starting a new project. I assume the number of people using Minikube while working on Pixelbooks is fairly small, but will this be looked into soon? |
Hey @eddyjlhaigh this is on our roadmap, but we are waiting for the |
@priyawadhwa Thanks for the update! :) |
This is fairly necessary and why it is necessary is commented in the original source:
See also: kubernetes-sigs/kind#763 |
any news on this? |
I don't think minikube will work on ChromeOS before it does with kind, and as far as I know there is not anyone actively looking into it. So I think it is blocked on upstream, but if there is anything that we can do in minikube to move it along then please update. |
Need more eyes on this. |
Supporting ChromeOS is not a top priority at the moment, I suppose one could use the "ssh" driver with remote nodes. |
Even if this isn't a priority, is it still on the roadmap? |
Our maintainers don't currently have any bandwidth to work on this, so it's not on the roadmap as such, but if someone were to add a PR to attempt to support ChromeOS, we'd be happy to review. |
Just another waiting for fix; I assumed I'd be able to use Google hardware to build Google cloud |
This is not something we can fix in KIND or minikube. The chromeOS crostini Linux sandbox is too restrictive to run Kubernetes (which is essential a highly privileged tool to manage distributed Linux) for security reasons. If you install the latest KIND into a free GCP cloud shell environment you could use it remotely, or GKE. Or you could run another Linux distro on chrome book hardware in developer mode. |
kvm mode can work, see discussion kubernetes-sigs/kind#763 (comment) |
At master:
Looking at the container logs:
The text was updated successfully, but these errors were encountered: