We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
3.9.0
Yes
Windows
x86
8.0.303
Client: Podman Engine Version: 5.1.1 API Version: 5.1.1 Go Version: go1.22.3 Git Commit: bda6eb03dcbcf12a5b7ae004c1240e38dd056d24 Built: Tue Jun 4 16:40:05 2024 OS/Arch: windows/amd64 Server: Podman Engine Version: 5.0.3 API Version: 5.0.3 Go Version: go1.22.2 Built: Thu May 9 19:00:00 2024 OS/Arch: linux/amd64
host: arch: amd64 buildahVersion: 1.35.4 cgroupControllers: - cpuset - cpu - cpuacct - blkio - memory - devices - freezer - net_cls - perf_event - net_prio - hugetlb - pids - rdma cgroupManager: cgroupfs cgroupVersion: v1 conmon: package: conmon-2.1.10-1.fc40.x86_64 path: /usr/bin/conmon version: 'conmon version 2.1.10, commit: ' cpuUtilization: idlePercent: 99.61 systemPercent: 0.15 userPercent: 0.24 cpus: 8 databaseBackend: sqlite distribution: distribution: fedora variant: container version: "40" eventLogger: journald freeLocks: 2044 hostname: AYUSAUSAD391643 idMappings: gidmap: null uidmap: null kernel: 5.10.102.1-microsoft-standard-WSL2 linkmode: dynamic logDriver: journald memFree: 32627798016 memTotal: 33498894336 networkBackend: netavark networkBackendInfo: backend: netavark dns: package: aardvark-dns-1.10.0-1.fc40.x86_64 path: /usr/libexec/podman/aardvark-dns version: aardvark-dns 1.10.0 package: netavark-1.10.3-3.fc40.x86_64 path: /usr/libexec/podman/netavark version: netavark 1.10.3 ociRuntime: name: crun package: crun-1.15-1.fc40.x86_64 path: /usr/bin/crun version: |- crun version 1.15 commit: e6eacaf4034e84185fd8780ac9262bbf57082278 rundir: /run/crun spec: 1.0.0 +SYSTEMD +SELINUX +APPARMOR +CAP +SECCOMP +EBPF +CRIU +LIBKRUN +WASM:wasmedge +YAJL os: linux pasta: executable: /usr/bin/pasta package: passt-0^20240510.g7288448-1.fc40.x86_64 version: | pasta 0^20240510.g7288448-1.fc40.x86_64 Copyright Red Hat GNU General Public License, version 2 or later <https://www.gnu.org/licenses/old-licenses/gpl-2.0.html> This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. remoteSocket: exists: true path: /run/podman/podman.sock rootlessNetworkCmd: "" security: apparmorEnabled: false capabilities: CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FOWNER,CAP_FSETID,CAP_KILL,CAP_NET_BIND_SERVICE,CAP_SETFCAP,CAP_SETGID,CAP_SETPCAP,CAP_SETUID,CAP_SYS_CHROOT rootless: false seccompEnabled: true seccompProfilePath: /usr/share/containers/seccomp.json selinuxEnabled: false serviceIsRemote: true slirp4netns: executable: "" package: "" version: "" swapFree: 8589934592 swapTotal: 8589934592 uptime: 40h 55m 39.00s (Approximately 1.67 days) variant: "" plugins: authorization: null log: - k8s-file - none - passthrough - journald network: - bridge - macvlan - ipvlan volume: - local registries: search: - docker.io store: configFile: /usr/share/containers/storage.conf containerStore: number: 1 paused: 0 running: 1 stopped: 0 graphDriverName: overlay graphOptions: overlay.imagestore: /usr/lib/containers/storage overlay.mountopt: nodev,metacopy=on graphRoot: /var/lib/containers/storage graphRootAllocated: 269490393088 graphRootUsed: 30118424576 graphStatus: Backing Filesystem: extfs Native Overlay Diff: "false" Supports d_type: "true" Supports shifting: "false" Supports volatile: "true" Using metacopy: "true" imageCopyTmpDir: /var/tmp imageStore: number: 65 runRoot: /run/containers/storage transientStore: false volumePath: /var/lib/containers/storage/volumes version: APIVersion: 5.0.3 Built: 1715299200 BuiltTime: Thu May 9 19:00:00 2024 GitCommit: "" GoVersion: go1.22.2 Os: linux OsArch: linux/amd64 Version: 5.0.3
_container.GetMappedPublicPort("161/udp"); This call currently causes an error.
_container.GetMappedPublicPort("161/udp");
However, UDP is supported when configuring the container:
_container = new ContainerBuilder() .WithName($"{Guid.NewGuid().ToString("D")}") .WithImage(...) .WithPortBinding("161/udp", true);
The problem is this hard-coded line
testcontainers-dotnet/src/Testcontainers/Containers/DockerContainer.cs
Line 239 in a0f1f76
public ushort GetMappedPublicPort(string containerPort)
No response
A possible solution would be to allow protocol suffixes and only append /tcp if no suffix is set.
/tcp
The text was updated successfully, but these errors were encountered:
bug: fix UDP port mapping testcontainers#1218
2c7c3d1
Successfully merging a pull request may close this issue.
Testcontainers version
3.9.0
Using the latest Testcontainers version?
Yes
Host OS
Windows
Host arch
x86
.NET version
8.0.303
Docker version
Docker info
What happened?
_container.GetMappedPublicPort("161/udp");
This call currently causes an error.However, UDP is supported when configuring the container:
The problem is this hard-coded line
testcontainers-dotnet/src/Testcontainers/Containers/DockerContainer.cs
Line 239 in a0f1f76
in the implementation of
public ushort GetMappedPublicPort(string containerPort)
Relevant log output
No response
Additional information
A possible solution would be to allow protocol suffixes and only append
/tcp
if no suffix is set.The text was updated successfully, but these errors were encountered: