• 4 Posts
  • 194 Comments
Joined 1 year ago
cake
Cake day: June 9th, 2023

help-circle
  • Does anyone know if dockge allows you to directly connect to a git repo to pull compose files?

    This is what I like most about portainer. I work in the compose files from an IDE and the check them into my self hosted git repo.

    Then on portainer, the stack is connected to the repo so only press a button to pull the latest compose and there is a check box to decide if I want the docker image to update or not.

    Works really well and makes it very easy to roll back if needed.





  • I don’t remember all the details. They never went closed source, there was a difference in opinion between primary devs on the direction the project should take.

    Its possible that was related to corporate funding but I don’t know that.

    Regardless it was a fork where some devs stayed with owncloud and most went with NextCloud. I moved to NextCloud at this time as well.

    OwnCloud now seems to have the resources to completely rewrite it from the ground up which seems like a great thing.

    If the devs have a disagreement again then the code can just be forked again AFAIK just like any other open source project.


  • If I understand it correctly, layering an application is no more dangerous than a regular install on a non atomic os. In other words, every piece of software you have installed on normal fedora desktop is not containerized, if it’s software you were going to install anyways, layering it is the same as before (albeit significantly slower than install and update).

    But that means that you get great benefits because 99% of your software packages are properly containerized
















  • When I was starting out I almost went down the same pathway. In the end, docker secrets are mainly useful when the same key needs to be distributed around multiple nodes.

    Storing the keys locally in an env file that is only accessible to the docker user is close enough to the same thing for home use and greatly simplifies your setup.

    I would suggest using a folder for each stack that contains 1 docker compose file and one env file. The env file contains passwords, the rest of the env variables are defined in the docker compose itself. Exclude the env files from your git repo (if you use this for version control) so you never check in a secret to your git repo (in practice I have one folder for compose files that is on git and my env files are stored in a different folder not in git).

    I do this all via portainer, it will setup the above folder structure for you. Each stack is a compose file that portainer pulls from my self hosted gitea (on another machine). Portainer creates an env file itself when you add the env variables from the gui.

    If someone gets access to your system and is able to access the env file, they already have high level access and your system is compromised regardless of if you have the secrets encrypted via swarm or not.