Remix.run Logo
Lutger an hour ago

Everything runs in the container and cannot escape it. Its like a sandbox.

You have to make sure you're not putting any secrets in the container environment.

roozbeh18 19 minutes ago | parent | next [-]

You are just reducing the blast radius with use of podman; you will likely need secrets for your app to work, which will be exposed regardless of the podman approach.

11 minutes ago | parent [-]
[deleted]
mlnj 33 minutes ago | parent | prev | next [-]

>You have to make sure you're not putting any secrets in the container environment.

How does this work exactly? containers still need env vars and access to databases and cloud environments. Without these the container is just useless isolated pod.

lbhdc 8 minutes ago | parent | next [-]

Not who you asked, but I have a similar setup. I can run everything I need for local development in that image (db, message queue emulator, cache, other services). So, setting things like environment variables or running postgres work the same as they do outside the container.

The image itself isn't the same image that the app gets deployed in, but is a portable dev environment with everything needed to build and run my apps baked in.

This comes with some nice side effects like being able to instantly spin up clean work environments on my laptop, someone elses, or a remote vm.

jack_pp 23 minutes ago | parent | prev [-]

Maybe don't use JavaScript on the backend.

moffkalast 40 minutes ago | parent | prev [-]

All right then, keep your secrets.