You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When using podman on macos, and using a corporate VPN, internal domains are not resolved from inside the vm, podman build will fail if any step in a dockerfile tries to reach to an internal domain
Tested multiple versions (installing from nixpkgs and from homebrew), on 5.2.2 this works as expected, but from 5.2.3 all versions show the same problem
Steps to reproduce the issue
Steps to reproduce the issue
# install podman and
> podman machine init --now
> podman machine ssh "ping -c 2 some.internal.domain"
ping: some.internal.domain: No address associated with hostname
Describe the results you received
fails to resolve internal domains
Describe the results you expected
Internal domains to be correctly resolved from inside the VM, using macos DNS
podman info output
host:
arch: arm64buildahVersion: 1.38.1cgroupControllers:
- cpu
- io
- memory
- pidscgroupManager: systemdcgroupVersion: v2conmon:
package: conmon-2.1.12-3.fc41.aarch64path: /usr/bin/conmonversion: 'conmon version 2.1.12, commit: 'cpuUtilization:
idlePercent: 99.49systemPercent: 0.28userPercent: 0.23cpus: 5databaseBackend: sqlitedistribution:
distribution: fedoravariant: coreosversion: "41"eventLogger: journaldfreeLocks: 2048hostname: localhost.localdomainidMappings:
gidmap:
- container_id: 0host_id: 1000size: 1
- container_id: 1host_id: 100000size: 1000000uidmap:
- container_id: 0host_id: 502size: 1
- container_id: 1host_id: 100000size: 1000000kernel: 6.12.7-200.fc41.aarch64linkmode: dynamiclogDriver: journaldmemFree: 1551015936memTotal: 2042306560networkBackend: netavarknetworkBackendInfo:
backend: netavarkdns:
package: aardvark-dns-1.13.1-1.fc41.aarch64path: /usr/libexec/podman/aardvark-dnsversion: aardvark-dns 1.13.1package: netavark-1.13.1-1.fc41.aarch64path: /usr/libexec/podman/netavarkversion: netavark 1.13.1ociRuntime:
name: crunpackage: crun-1.19.1-1.fc41.aarch64path: /usr/bin/crunversion: |- crun version 1.19.1 commit: 3e32a70c93f5aa5fea69b50256cca7fd4aa23c80 rundir: /run/user/502/crun spec: 1.0.0 +SYSTEMD +SELINUX +APPARMOR +CAP +SECCOMP +EBPF +CRIU +LIBKRUN +WASM:wasmedge +YAJLos: linuxpasta:
executable: /usr/bin/pastapackage: passt-0^20241211.g09478d5-1.fc41.aarch64version: | pasta 0^20241211.g09478d5-1.fc41.aarch64-pasta Copyright Red Hat GNU General Public License, version 2 or later <https://www.gnu.org/licenses/old-licenses/gpl-2.0.html> This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law.remoteSocket:
exists: truepath: unix:///run/user/502/podman/podman.sockrootlessNetworkCmd: pastasecurity:
apparmorEnabled: falsecapabilities: CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FOWNER,CAP_FSETID,CAP_KILL,CAP_NET_BIND_SERVICE,CAP_SETFCAP,CAP_SETGID,CAP_SETPCAP,CAP_SETUID,CAP_SYS_CHROOTrootless: trueseccompEnabled: trueseccompProfilePath: /usr/share/containers/seccomp.jsonselinuxEnabled: trueserviceIsRemote: trueslirp4netns:
executable: /usr/bin/slirp4netnspackage: slirp4netns-1.3.1-1.fc41.aarch64version: |- slirp4netns version 1.3.1 commit: e5e368c4f5db6ae75c2fce786e31eef9da6bf236 libslirp: 4.8.0 SLIRP_CONFIG_VERSION_MAX: 5 libseccomp: 2.5.5swapFree: 0swapTotal: 0uptime: 0h 4m 40.00svariant: v8plugins:
authorization: nulllog:
- k8s-file
- none
- passthrough
- journaldnetwork:
- bridge
- macvlan
- ipvlanvolume:
- localregistries:
search:
- docker.iostore:
configFile: /var/home/core/.config/containers/storage.confcontainerStore:
number: 0paused: 0running: 0stopped: 0graphDriverName: overlaygraphOptions: {}graphRoot: /var/home/core/.local/share/containers/storagegraphRootAllocated: 106415992832graphRootUsed: 4207779840graphStatus:
Backing Filesystem: xfsNative Overlay Diff: "true"Supports d_type: "true"Supports shifting: "false"Supports volatile: "true"Using metacopy: "false"imageCopyTmpDir: /var/tmpimageStore:
number: 0runRoot: /run/user/502/containerstransientStore: falsevolumePath: /var/home/core/.local/share/containers/storage/volumesversion:
APIVersion: 5.3.2Built: 1737504000BuiltTime: Wed Jan 22 01:00:00 2025GitCommit: ""GoVersion: go1.23.4Os: linuxOsArch: linux/arm64Version: 5.3.2
Podman in a container
No
Privileged Or Rootless
None
Upstream Latest Release
No
Additional environment details
Tested most versions installing from nixpkgs, but also the most recent version from homebrew & the standalone installer - all same problem
Additional information
No response
The text was updated successfully, but these errors were encountered:
saucoide
changed the title
podman machine in osx in podman > 5.2.2 can't resolve internal domains behind a VPN
podman machine in osx with podman > 5.2.2 can't resolve internal domains behind a VPN
Feb 2, 2025
i had tried but an older version, looks like the most recent ones (5.3.2, 5.3.1) do work with the official installer, possibly bad timing with nixpkgs & brew picking up a bad version of gvproxy
Issue Description
When using podman on macos, and using a corporate VPN, internal domains are not resolved from inside the vm,
podman build
will fail if any step in a dockerfile tries to reach to an internal domainTested multiple versions (installing from nixpkgs and from homebrew), on 5.2.2 this works as expected, but from 5.2.3 all versions show the same problem
Steps to reproduce the issue
Steps to reproduce the issue
Describe the results you received
fails to resolve internal domains
Describe the results you expected
Internal domains to be correctly resolved from inside the VM, using macos DNS
podman info output
Podman in a container
No
Privileged Or Rootless
None
Upstream Latest Release
No
Additional environment details
Tested most versions installing from nixpkgs, but also the most recent version from homebrew & the standalone installer - all same problem
Additional information
No response
The text was updated successfully, but these errors were encountered: