this post was submitted on 18 Apr 2025
15 points (77.8% liked)

Selfhosted

46113 readers
497 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

I'm been listening to the Fedora podcast and it seems like the OCI images are now getting some serious attention.

Anyone using the Fedora base image to make custom containers to deploy Nextcloud, Caddy and other services? My thought is that Fedora focuses on security so in theory software packaged with it will be secure and properly configured by default. Having Fedora in the middle will also theoretically protect against hostile changes upstream. The downside is that the image is a little big but I think it is manageable.

Anyone else use Fedora?

you are viewing a single comment's thread
view the rest of the comments
[–] just_another_person@lemmy.world 13 points 4 days ago (1 children)

Secure how? Containers aren't secure because of their base contents since the majority of everything in the image isn't even executed. It's not like running an OS.

A secure container by definition will be the one with the LEAST amount of contents in its base. This is the point of Distroless.

A container is going to get compromised because of its running code 9/10 times, not because the base was compromised. This of course is not including supply chain attacks.

Any podcast telling you that adding more stuff into the container image will make it secure has an inferior bridge. Come check out my much better bridge over here...

[–] possiblylinux127@lemmy.zip 1 points 4 days ago (2 children)

In the case of Nextcloud it is written in PHP so it is very important to get PHP security fixes. I get the argument for static binaries like Forgejo. I'm mostly looking at more complex things.

Containers get upgrades when they run. They get updates as static projects, then are built into containers. Fedora being said container will help none of this process at all though.

I have no idea why you're even mentioning Foregjo, I'm lost now.

[–] sugar_in_your_tea@sh.itjust.works 2 points 3 days ago* (last edited 3 days ago) (1 children)

PHP isn't complex, you just need a webserver (nginx, Apache, etc) and PHP. That's one process (webserver) that runs a few child processes (PHP scripts). When using PHP fpm, use two containers.

Each container should run one process. Each container can run whatever base you want. If you want a newer PHP on an older image, go for it! Nobody is forcing you to use the repo version of PHP, you can install it separately. More complexity should mean more containers, not more complex containers.

[–] possiblylinux127@lemmy.zip 2 points 3 days ago (1 children)

Yeah, NextCloud doesn't follow ideal containerization style, but they do have an FPM package, so I can co figure PHP FPM separately from the web server, which is separate from my Collabora container. I don't use the AIO image so I can control each piece separately.