New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Docker daemon doesn't respect no_proxy IP range in CIDR notation (regression?) #9145
Comments
I believe that this is way how NO_PROXY works in Linux. |
@LK4D4 I'm sorry, I must have been quite tired to write this nice issue for non-standard usage of the Feel free to close the issue. |
Thanks! |
My service info: Server: I change no_proxy to |
@hpejustin documentation for setting proxy environment variables on the daemon can be found here; https://docs.docker.com/engine/admin/systemd/#httphttps-proxy. I see you're not running an official build of Docker, but the Red Hat fork, so it's possible things work a bit different for that Please keep in mind that the GitHub issue tracker is not intended as a general support forum,
|
Unlike what has been said in #4214, docker (as of version 1.3.1) does not respect no_proxy IP range in CIDR notation. It was supposedly fixed in #4836.
How to reproduce (assuming ubuntu 14.04 host with an internal IP of 192.168.33.10):
socat TCP4-LISTEN:8080,fork,reuseaddr TCP4:index.docker.io:80'
/etc/default/docker
:sudo service docker restart
sudo docker pull 192.168.33.10:8080/busybox:ubuntu-14.04
# fails because NO_PROXY CIDR range is not interpreted and the inexistent proxy is then used.To prove that NO_PROXY is used, change the
export NO_PROXY=192.168.33.0/24
line toexport NO_PROXY=192.168.33.10
andsudo service docker restart
then attempt thedocker pull
above again. It will work (or at least fail without contacting the inexistent proxy) which means that NO_PROXY is respected but only for ip address, not for CIDR ranges.The text was updated successfully, but these errors were encountered: