Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

rootless: podman run --net=<CNI> -p <PORT> is broken on master #9065

Closed
AkihiroSuda opened this issue Jan 22, 2021 · 2 comments · Fixed by #9066
Closed

rootless: podman run --net=<CNI> -p <PORT> is broken on master #9065

AkihiroSuda opened this issue Jan 22, 2021 · 2 comments · Fixed by #9066
Labels
CNI Bug with CNI networking for root containers kind/bug Categorizes issue or PR as related to a bug. locked - please file new issue/PR Assist humans wanting to comment on an old issue or PR with locked comments. rootless

Comments

@AkihiroSuda
Copy link
Collaborator

Is this a BUG REPORT or FEATURE REQUEST? (leave only one on its own line)

/kind bug

Description

podman run --net=<CNI> -p <PORT> with rootless is broken on master, due to regression in #9052

Steps to reproduce the issue:

  1. podman network create foo

  2. podman run -d --name nginx --network foo -p 8080:80 nginx:alpine

  3. curl localhost:8080

Describe the results you received:
curl: (56) Recv failure: Connection reset by peer

Describe the results you expected:
...<title>Welcome to nginx!</title>...

Additional information you deem important (e.g. issue happens only occasionally):

Output of podman version:

f02aba6 is broken.
6fd83de works.
regression in #9052

@openshift-ci-robot openshift-ci-robot added the kind/bug Categorizes issue or PR as related to a bug. label Jan 22, 2021
@AkihiroSuda AkihiroSuda added CNI Bug with CNI networking for root containers rootless labels Jan 22, 2021
@rhatdan
Copy link
Member

rhatdan commented Jan 22, 2021

@giuseppe @AkihiroSuda Could one of you open a PR to fix

@giuseppe
Copy link
Member

PR here: #9066

giuseppe added a commit to giuseppe/libpod that referenced this issue Jan 23, 2021
if a CNI network is added to the container, use the IP address in that
network instead of hard-coding the slirp4netns default.

commit 5e65f0b introduced this
regression.

Closes: containers#9065

Signed-off-by: Giuseppe Scrivano <gscrivan@redhat.com>
iwita pushed a commit to iwita/podman that referenced this issue Jan 26, 2021
if a CNI network is added to the container, use the IP address in that
network instead of hard-coding the slirp4netns default.

commit 5e65f0b introduced this
regression.

Closes: containers#9065

Signed-off-by: Giuseppe Scrivano <gscrivan@redhat.com>
@github-actions github-actions bot added the locked - please file new issue/PR Assist humans wanting to comment on an old issue or PR with locked comments. label Sep 22, 2023
@github-actions github-actions bot locked as resolved and limited conversation to collaborators Sep 22, 2023
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
CNI Bug with CNI networking for root containers kind/bug Categorizes issue or PR as related to a bug. locked - please file new issue/PR Assist humans wanting to comment on an old issue or PR with locked comments. rootless
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants