mirror of
https://github.com/sickcodes/Docker-OSX.git
synced 2026-01-12 05:20:27 +01:00
Yet another gtk initialization failed issue
#440
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @ghost on GitHub (Dec 10, 2022).
I'm sure you're tired of these by now!
Terminal output:
Command used:
Uname:
Linux fedora 6.0.11-300.fc37.x86_64 #1 SMP PREEMPT_DYNAMIC Fri Dec 2 20:47:45 UTC 2022 x86_64 x86_64 x86_64 GNU/LinuxNeofetch:
Thanks in advance!
@dancvv commented on GitHub (Dec 11, 2022):
I have the same problem
@grimaldello commented on GitHub (Dec 11, 2022):
Disabling SELinux (temporarily) with the following command (as root):
echo 0 > /sys/fs/selinux/enforceit works for me.
My system:
Linux fedora 6.0.12-300.fc37.x86_64 #1 SMP PREEMPT_DYNAMIC Thu Dec 8 16:58:47 UTC 2022 x86_64 x86_64 x86_64 GNU/LinuxAh and I'm using Podman and not Docker.
Not a great solution, but it could be a starting point to get a better solution.
@nachovizzo commented on GitHub (Dec 14, 2022):
Same problem here! Ubuntu 22.04
@aral commented on GitHub (Dec 23, 2022):
Just a note that @grimaldello’s solution didn’t work for me on Fedora Silverblue 37 (using podman). Still getting the same error as in the error report…
even though
System details:
@crojack commented on GitHub (Dec 24, 2022):
Add
--privileged
after run. That will fix it.
The command should be:
sudo docker run --privileged -it
--device /dev/kvm
-p 50922:10022
-v /tmp/.X11-unix:/tmp/.X11-unix
-e "DISPLAY=${DISPLAY:-:0.0}"
-e GENERATE_UNIQUE=true
-e MASTER_PLIST_URL='https://raw.githubusercontent.com/sickcodes/osx-serial-generator/master/config-custom.plist'
sickcodes/docker-osx:monterey
Right now I am installing Monterey, and I had the same error as you guys but adding --privileged after run in the command solved the issue. Fedora 37, Mate Desktop here, HP Z420, Intel Xeon E-1620, 40 Gb ECC RAM, AMD Radeon RX570 4 Gb GPU, Samsung EVO 500 Gb SSD, AOC 32" 2K monitor.
@aral commented on GitHub (Dec 24, 2022):
@crojack Thanks, but on Fedora Silverblue 37 with podman, at least, when I run:
It still errors with:
Update: The very first issue I see in the output is a warning that might be relevant (since Fedora Silverblue is an immutable distribution):
@aral commented on GitHub (Dec 24, 2022):
I’m able to get the QEMU window to launch on Fedora Silverblue 37 with
When I’ve also set permissions with:
But the initial launch still fails.
@liukliukliuk commented on GitHub (Jan 11, 2023):
same here with fedora 37
@bphd commented on GitHub (Jan 15, 2023):
Running all as root is not a solution. Solution would be to identify what needs privileges and think about how to satisfy the need
@geakstr commented on GitHub (Jan 16, 2023):
Same for me on Arch
@pfcdx commented on GitHub (Mar 12, 2023):
Same on Arch.
@bphd commented on GitHub (Mar 12, 2023):
I was thinking about this project today and the fact that I wait since months to use this solution. But nobody want to come to my issue
@elijah629 commented on GitHub (Jun 27, 2023):
Did anyone try?
xhost +@bphd commented on GitHub (Jun 28, 2023):
To mitigate these security risks, follow these best practices for X server access control:
Identify and Whitelist Trusted Hosts: Take the time to identify the specific hosts that require access to your X server. Consider the purpose and requirements of each host in your network. This could include trusted workstations, servers, or other devices that need to run X applications or access the graphical interface. By carefully evaluating and identifying these hosts, you can create a list of authorized entities.
Whitelist Only Authorized Hosts: Once you have identified the trusted hosts, whitelist them by configuring the access control settings of the X server. Use commands such as "xhost +hostname" or "xhost +SI:localuser:username@hostname" to allow only these authorized hosts to connect to the X server. This effectively restricts access to the X server to the specified entities, preventing unauthorized connections.