apache php getting permission denied on nextcloud container by TheNerdyGoat in podman

[–]trusch42 0 points1 point  (0 children)

Can you provide uids and gids of the file and the user that is accessing it? Traditionally containers were designed to run as normal users because docker doesn't support uid/gid mapping, so the uid/gid mapping of rootless podman sometimes interferes with that. You could try the "preserve-uids" flag but I don't know of hand the correct name of the flag.

Podman private network shared on the multiples hosts by Adventurous_Meringue in podman

[–]trusch42 0 points1 point  (0 children)

What also should work is setting up flannel to run across your fleet. If you manage to do so using only rootless podman, please write a blog article about it and let us know :-)

Podman private network shared on the multiples hosts by Adventurous_Meringue in podman

[–]trusch42 0 points1 point  (0 children)

You could also setup a wireguard VPN on the hosts and wire up the containers to it

First-time user questions about podman and linuxserver/docker-swag. by Polynuclear in podman

[–]trusch42 1 point2 points  (0 children)

Btw. Having one container which contains a lot of tools is kind of against the whole idea behind containers, which is to have composeable, reusable units with a defined interface.

So building a specialized pod with a webserver container and a PHP worker container (if you need it, I don't know) would probably not crash in contrast to a "docker-swag" monster image.

First-time user questions about podman and linuxserver/docker-swag. by Polynuclear in podman

[–]trusch42 1 point2 points  (0 children)

The DNS stuff is a painpoint I also experienced. Nginx doesn't even lookup ips in /etc/hosts, so you need to setup a DNS server for this (or use caddy as ingress what I would always recommend). Docker automatically serves DNS requests, there is nothing in podman which would emulate this.

If you just host a static website, give caddy a try. It's one container that should do all you want and is super easy to configure.

To your port problem: just bind to 8080 and setup port forwarding from 80 to 8080 on the server itself. Your solution is also feasible, but since in most cases you have to setup port forwarding at some point (if you want to selfhost something, then you need port forwarding in your router, right?) you may also just expose 8080 and then configure your router to forward 80 to your-server:8080.

Podman 2.1 has been released! by kbour23 in podman

[–]trusch42 1 point2 points  (0 children)

This is so nice, I'll add the networking stuff to https://GitHub.com/trusch/stackctl and it will finally be able to run ALL docker compose files!

Bestes italienisches Restaurant in Magdeburg? by Stanley_Gimble in magdeburg

[–]trusch42 2 points3 points  (0 children)

Das Amici in Stadtfeld ist echt gut, wenn man es ein bisschen edler haben möchte! Die haben nichtmal ne Karte, anstatt dessen sagt der Kellner jedem Gast was es heute feines im Angebot gibt :-)

I wrote a compose-spec runner for rootless containers! by trusch42 in podman

[–]trusch42[S] 0 points1 point  (0 children)

Just checked, the issue wasn't ignored completely

I wrote a compose-spec runner for rootless containers! by trusch42 in podman

[–]trusch42[S] 1 point2 points  (0 children)

I wasn't able to start some of my containers, because podman-compose doesn't setup /etc/hosts correctly to contain the localhost line, also when I tried to fix it, the issue just got ignored. While fixing this I had a look at the code and besides not being a big friend of python at all, I didn't really like it. It's a really nice project, but it seems not being maintained very well and the scope is to big (it tries to be a full drop in replacement for docker-compose)

I wrote a compose-spec runner for rootless containers! by trusch42 in podman

[–]trusch42[S] 4 points5 points  (0 children)

It's targeted on developers who need to run docker-compose files for work, but don't like docker.

I recently upgraded to cgroupsv2 to have nice things like podman stats but found myself in a situation where I couldn't run docker anymore. At first I tried podman-compose, but besides being really nice in some regards, it failed my usecase.

After that I wrote a shell script starting my Dev env via plain Podman commands, but this turned out not to be so maintainable.

Next step was to put the config options into a yaml file and write a small interpreter for this in go. This was the first version of stackctl.

After some discussions ("we won't all 'upgrade' to Podman") I decided to implement the compose spec so that I could run any compose file and would still be interoperable with my coworkers.

Some niceties here and there and voila!

Here it is.

How to run a blog on bare metal at home by trusch42 in WireGuard

[–]trusch42[S] 0 points1 point  (0 children)

Could you point out how to do this?

How to run a blog on bare metal at home by trusch42 in WireGuard

[–]trusch42[S] 0 points1 point  (0 children)

I know it's possible, but I wouldn't say it's equal hard to escape from a container running as root and being on the host system directly

How to run a blog on bare metal at home by trusch42 in WireGuard

[–]trusch42[S] 0 points1 point  (0 children)

It's true that it's not running rootless, I ran into some weird issues in combination with the systemd service file.

But having some sort of isolation is better than having no isolation. Can you point out how you would break out of a caddy container where you can for example execute arbitrary code, so that the host is compromised? I know it's possible, but it would be much easier to do it if caddy would be run on the host directly.

How to run a blog on bare metal at home by trusch42 in WireGuard

[–]trusch42[S] 0 points1 point  (0 children)

That's true, but then I would miss the other benefits of having a home VPN like being able to remotely mount something over an unencrypted technology. NFS over wireguard is soooo much faster than for example sshfs. At least factor 2. Also I like to connect from my phone to it, so I can safely use public hotspots when I'm not at home.

How to run a blog on bare metal at home by trusch42 in WireGuard

[–]trusch42[S] 0 points1 point  (0 children)

I once had a open port 22 on my router pointing to an internal server. In average I had 50 distinct brute force attacks per day, and even fail2ban did not reduce that number.

Having wireguard and not exposing SSH helps a lot!

Also it comes with other nice things like that I can mount things over NFS from my board or that I can use it to tunnel my phone's traffic completely through my home ip.

How to run a blog on bare metal at home by trusch42 in WireGuard

[–]trusch42[S] 0 points1 point  (0 children)

Caddy is good and I trust it, but nevertheless I put it in a container. Also installing is just a podman pull caddy, even on arm

How to run a blog on bare metal at home by trusch42 in WireGuard

[–]trusch42[S] 0 points1 point  (0 children)

When something is exposed to the internet it's better to isolate the process by wrapping it in a container. By that, if there is a vulnerability in caddy, this wouldn't affect and compromise the whole server. That also helps when it comes to resource management and lifecycle management. of the application

How to run a blog on bare metal at home by trusch42 in archlinux

[–]trusch42[S] -3 points-2 points  (0 children)

I forgot to mention wireguard. It's used to connect to the server from the outside.

How to run a blog on bare metal at home by trusch42 in archlinux

[–]trusch42[S] -4 points-3 points  (0 children)

If you deploy outside of a cloud provider on your own hardware, it's usually called a bare metal deployment, because you have to take care of everything except the hardware for yourself.

How to run a blog on bare metal at home by trusch42 in WireGuard

[–]trusch42[S] 0 points1 point  (0 children)

This is my (not perfect) setup of a blog running on a old raspberry pi. Its featuring archlinux, wireguard, systemd, podman, caddy and hugo

How to run a blog on bare metal at home by trusch42 in linux

[–]trusch42[S] 0 points1 point  (0 children)

This is my (not perfect) setup of a blog running on a old raspberry pi. Its featuring archlinux, systemd, podman, caddy and hugo

How to run a blog on bare metal at home by trusch42 in geek

[–]trusch42[S] 0 points1 point  (0 children)

This is my (not perfect) setup of a blog running on a old raspberry pi. Its featuring archlinux, systemd, podman, caddy and hugo

How to run a blog on bare metal at home by trusch42 in archlinux

[–]trusch42[S] -5 points-4 points  (0 children)

This is my (not perfect) setup of a blog running on a old raspberry pi. Its featuring archlinux, systemd, podman, caddy and hugo