You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I have a very useful intranet, which can access the container's IP by using the internal IPv6 address.
However, I have encountered problems in creating a network during use. I hope to add instructions to skip the detection of address segment conflicts.
When I use this command, an error will be reported. I hope to skip the error and bypass the detection.
podman network create --label io.podman.compose.project=app --label com.docker.compose.project=app --ipv6 --subnet fc6a:795e:392:20:2ac1:464c:a2cf::/112 app_in-net2
Error: subnet fc6a:795e:392:20:2ac1:464c:a2cf:0/112 is already used on the host or by another config
But in fact, this route is only included in fc6a:795e::/32 and does not conflict
ip -6 r|grep fc6a
fc6a:795e:392:20:9a11:464c:ea1f:0/112 dev podman1 proto kernel metric 256 pref medium
fc6a:795e:528::/48 via fe80::ff:fe30:334 dev tinc0 proto bird metric 32 pref medium
fc6a:795e:702::/48 via fe80::ff:fe30:334 dev tinc0 proto bird metric 32 pref medium
fc6a:795e::/32 dev tinc0 proto kernel metric 256 pref medium
We do not check check routes, we do check the ip addresses and subnets assigned to the interfaces. I guess this just doesn't make sense for ipv6 as this kind of subnetting seems like normal thing there.
I would not like to maintain a option to skip such a check, if it doesn't work on "common" ipv6 networks we should fix it so it does work and not require extra options. I am not sure what the right fix is, should we skip the check entirely for ipv6 or parse the routing rules to figure out if there will be conflicts?
I have a very useful intranet, which can access the container's IP by using the internal IPv6 address.
However, I have encountered problems in creating a network during use. I hope to add instructions to skip the detection of address segment conflicts.
When I use this command, an error will be reported. I hope to skip the error and bypass the detection.
But in fact, this route is only included in
fc6a:795e::/32
and does not conflictcommon/libnetwork/internal/util/validate.go
Lines 31 to 36 in bbb5c4a
common/libnetwork/internal/util/ip.go
Lines 45 to 56 in bbb5c4a
The text was updated successfully, but these errors were encountered: