<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: eriksjolund</title><link>https://news.ycombinator.com/user?id=eriksjolund</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 20 May 2026 02:46:51 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=eriksjolund" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by eriksjolund in "I ditched Docker for Podman"]]></title><description><![CDATA[
<p>Sometimes it's possible to not use the Podman API at all. Convert the compose file to quadlet files with the command-line tool podlet and start the container with "systemctl --user start myapp.service". Due to the fork/exec architecture of podman, the container can then be started without using the Podman API.</p>
]]></description><pubDate>Sat, 06 Sep 2025 06:46:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=45147175</link><dc:creator>eriksjolund</dc:creator><comments>https://news.ycombinator.com/item?id=45147175</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45147175</guid></item><item><title><![CDATA[New comment by eriksjolund in "Replacing Kubernetes with systemd (2024)"]]></title><description><![CDATA[
<p>That workaround is not needed if the web server container supports socket activation. Due to the fork-exec architecture of Podman, the socket-activated socket is inherited by the container process. Network traffic sent over this socket-activated socket has native performance.
<a href="https://github.com/containers/podman/blob/main/docs/tutorials/socket_activation.md#native-network-performance-over-the-socket-activated-socket">https://github.com/containers/podman/blob/main/docs/tutorial...</a></p>
]]></description><pubDate>Tue, 06 May 2025 17:35:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=43907649</link><dc:creator>eriksjolund</dc:creator><comments>https://news.ycombinator.com/item?id=43907649</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43907649</guid></item><item><title><![CDATA[New comment by eriksjolund in "Getting forked by Microsoft"]]></title><description><![CDATA[
<p>The license would no longer be open source if you limit use to only community.<p>See 
"6. No Discrimination Against Fields of Endeavor"
in
The Open Source Definition
<a href="https://opensource.org/osd" rel="nofollow">https://opensource.org/osd</a></p>
]]></description><pubDate>Mon, 21 Apr 2025 12:51:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=43751431</link><dc:creator>eriksjolund</dc:creator><comments>https://news.ycombinator.com/item?id=43751431</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43751431</guid></item><item><title><![CDATA[New comment by eriksjolund in "Podman Quadlets with Podman Desktop"]]></title><description><![CDATA[
<p>I did it out of pure interest, just to explore ways of locking down a web server.</p>
]]></description><pubDate>Tue, 15 Apr 2025 12:36:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=43691838</link><dc:creator>eriksjolund</dc:creator><comments>https://news.ycombinator.com/item?id=43691838</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43691838</guid></item><item><title><![CDATA[New comment by eriksjolund in "Podman Quadlets with Podman Desktop"]]></title><description><![CDATA[
<p>You can use the podman option `--network=none` together with the systemd directive `RestrictAddressFamilies=`<p>I wrote a demo:
<a href="https://www.redhat.com/en/blog/podman-systemd-limit-access" rel="nofollow">https://www.redhat.com/en/blog/podman-systemd-limit-access</a><p>Podman will then not have the privilege to pull the container image, but a web server container can still serve the internet with socket activation.</p>
]]></description><pubDate>Tue, 15 Apr 2025 07:41:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=43690036</link><dc:creator>eriksjolund</dc:creator><comments>https://news.ycombinator.com/item?id=43690036</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43690036</guid></item><item><title><![CDATA[New comment by eriksjolund in "Podman Quadlets with Podman Desktop"]]></title><description><![CDATA[
<p>Podman quadlet supports "Socket activation of containers" <a href="https://github.com/containers/podman/blob/main/docs/tutorials/socket_activation.md#socket-activation-of-containers">https://github.com/containers/podman/blob/main/docs/tutorial...</a>
This allows you to run a network server with `Network=none` (--network=none). If the server would be compromised, the intruder would not have the privileges to use the compromised server as a spam bot. There are other advantages, such as support for preserved source IP address and better performance when running a container with rootless Podman + Pasta in a custom network.</p>
]]></description><pubDate>Mon, 14 Apr 2025 20:32:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=43685992</link><dc:creator>eriksjolund</dc:creator><comments>https://news.ycombinator.com/item?id=43685992</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43685992</guid></item><item><title><![CDATA[New comment by eriksjolund in "Quadlet: Running Podman containers under systemd"]]></title><description><![CDATA[
<p>Socket activation can be used with quadlets but not with docker-compose. That is a big advantage.<p><a href="https://github.com/containers/podman/blob/main/docs/tutorials/socket_activation.md" rel="nofollow">https://github.com/containers/podman/blob/main/docs/tutorial...</a></p>
]]></description><pubDate>Mon, 24 Mar 2025 10:32:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=43459319</link><dc:creator>eriksjolund</dc:creator><comments>https://news.ycombinator.com/item?id=43459319</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43459319</guid></item><item><title><![CDATA[New comment by eriksjolund in "Learning about Bootc"]]></title><description><![CDATA[
<p>If you want to know why bootc is needed check this list of goals: <a href="https://containers.github.io/bootable/" rel="nofollow">https://containers.github.io/bootable/</a><p>I found that URL by following the link in
"bootc is the key component in a broader mission of bootable containers."<p>(<a href="https://bootc-dev.github.io/bootc/intro.html" rel="nofollow">https://bootc-dev.github.io/bootc/intro.html</a>)</p>
]]></description><pubDate>Mon, 24 Mar 2025 09:20:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=43458854</link><dc:creator>eriksjolund</dc:creator><comments>https://news.ycombinator.com/item?id=43458854</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43458854</guid></item><item><title><![CDATA[New comment by eriksjolund in "Httptap: View HTTP/HTTPS requests made by any Linux program"]]></title><description><![CDATA[
<p>Another tool that can be used by an unprivileged user for analysing network traffic is rootless Podman with Pasta.<p>Just add the podman run option<p>--network=pasta:--pcap,myfile.pcap<p>Pasta then records the network traffic into a PCAP file that could later be analysed.<p>I wrote a simple example where I used tshark to analyse the recorded PCAP file <a href="https://github.com/eriksjolund/podman-networking-docs?tab=readme-ov-file#capture-network-traffic">https://github.com/eriksjolund/podman-networking-docs?tab=re...</a></p>
]]></description><pubDate>Mon, 03 Feb 2025 19:25:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=42921785</link><dc:creator>eriksjolund</dc:creator><comments>https://news.ycombinator.com/item?id=42921785</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42921785</guid></item><item><title><![CDATA[New comment by eriksjolund in "Zoomable Circles, a Svelte component for hierarchical data"]]></title><description><![CDATA[
<p>How to display circles on top of zoomable images without getting flickering is an interesting problem. (This comment does not refer specifically to displaying a tree map)<p>I noticed that painting the circles on top of an overlay with OpenSeadragon caused flickering [1]. However, when painting circles on top of the pyramid image tiles that OpenSeadragon loaded, there was no flickering.<p>This was my conclusion in 2016 when I created a web viewer that showed circles on top of a microscope photo [2]. Architecture: single file format containing an index, pyramid image tiles and measurement data for circles.
To make this work, I intercepted the function call that OpenSeadragon usually uses to download an image tile. Instead, I provided OpenSeadragon with an image tile that already had the circle painted on it.<p>[1] <a href="https://openseadragon.github.io/examples/ui-overlays/" rel="nofollow">https://openseadragon.github.io/examples/ui-overlays/</a>
[2] demo: <a href="https://eriksjolund.github.io/osd-spot-viewer-webpack-build/build2/" rel="nofollow">https://eriksjolund.github.io/osd-spot-viewer-webpack-build/...</a> 
(The demo only worked on Linux. I'm not sure if it still works)
source code:
<a href="https://github.com/eriksjolund/osd-spot-viewer">https://github.com/eriksjolund/osd-spot-viewer</a></p>
]]></description><pubDate>Sun, 31 Mar 2024 18:12:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=39886571</link><dc:creator>eriksjolund</dc:creator><comments>https://news.ycombinator.com/item?id=39886571</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39886571</guid></item><item><title><![CDATA[New comment by eriksjolund in "Show HN: Obligator – An OpenID Connect server for self-hosters"]]></title><description><![CDATA[
<p>Here are some documentation and demos from me and others if you're interested:<p><a href="https://github.com/eriksjolund/podman-networking-docs">https://github.com/eriksjolund/podman-networking-docs</a>
<a href="https://github.com/eriksjolund/podman-nginx-socket-activation">https://github.com/eriksjolund/podman-nginx-socket-activatio...</a>
<a href="https://github.com/eriksjolund/socket-activate-httpd">https://github.com/eriksjolund/socket-activate-httpd</a>
<a href="https://github.com/eriksjolund/mariadb-podman-socket-activation/tree/main">https://github.com/eriksjolund/mariadb-podman-socket-activat...</a>
<a href="https://github.com/PhracturedBlue/podman-socket-activated-services">https://github.com/PhracturedBlue/podman-socket-activated-se...</a></p>
]]></description><pubDate>Thu, 12 Oct 2023 21:29:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=37863395</link><dc:creator>eriksjolund</dc:creator><comments>https://news.ycombinator.com/item?id=37863395</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37863395</guid></item><item><title><![CDATA[New comment by eriksjolund in "Show HN: Obligator – An OpenID Connect server for self-hosters"]]></title><description><![CDATA[
<p>Rootless Podman uses slirp4netns by default. The default will soon change to pasta. Pasta has better performance than slirp4netns. For best performance if your container supports it, use systemd socket activation because the traffic over the activated socket will have native network performance.</p>
]]></description><pubDate>Thu, 12 Oct 2023 20:14:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=37862602</link><dc:creator>eriksjolund</dc:creator><comments>https://news.ycombinator.com/item?id=37862602</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37862602</guid></item><item><title><![CDATA[New comment by eriksjolund in "Podman Desktop 1.2 Released: Compose and Kubernetes Support"]]></title><description><![CDATA[
<p>Podman can run a socket-activated network server (such as docker.io/library/nginx) with the "--network=none" option.
This improves security.</p>
]]></description><pubDate>Fri, 14 Jul 2023 17:21:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=36726990</link><dc:creator>eriksjolund</dc:creator><comments>https://news.ycombinator.com/item?id=36726990</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36726990</guid></item><item><title><![CDATA[New comment by eriksjolund in "I can't recommend serious use of an all-in-one local Grafana Loki setup"]]></title><description><![CDATA[
<p>It seems Red Hat believes in Loki<p>Red Hat logging product manager says:
"We made the decision to move to Loki and Vector"
<a href="https://www.youtube.com/watch?v=QZ4Hv85lEJ0&t=938s">https://www.youtube.com/watch?v=QZ4Hv85lEJ0&t=938s</a></p>
]]></description><pubDate>Fri, 28 Apr 2023 15:42:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=35742688</link><dc:creator>eriksjolund</dc:creator><comments>https://news.ycombinator.com/item?id=35742688</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35742688</guid></item><item><title><![CDATA[New comment by eriksjolund in "How to use Podman inside of a container (2021)"]]></title><description><![CDATA[
<p>I just tried this out. 
The new systemd directive OpenFile= 
opens up the possibility to pass the file descriptor
of a file from the host to a container running in a container.
(using rootless Podman running rootless Podman)<p>sudo systemd-run --property User=test --property OpenFile=/etc/secretfile.txt --collect --pipe --wait --quiet   podman run --security-opt label=disable --user podman --device /dev/fuse quay.io/podman/stable podman run -q alpine sh -c "cat <&3"</p>
]]></description><pubDate>Wed, 26 Apr 2023 19:37:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=35718850</link><dc:creator>eriksjolund</dc:creator><comments>https://news.ycombinator.com/item?id=35718850</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35718850</guid></item><item><title><![CDATA[New comment by eriksjolund in "Podman vs. Docker: Comparing the two containerization tools"]]></title><description><![CDATA[
<p>I wrote a mini tutorial (as a Reddit comment) about how to deal with UID/GID mappings when you run rootless podman and you want a specific container user to write to a bind-mounted directory:<p><a href="https://www.reddit.com/r/podman/comments/103ut7z/comment/j31y3vf/?context=3" rel="nofollow">https://www.reddit.com/r/podman/comments/103ut7z/comment/j31...</a><p>Short summary:
My best tip is to see if either "--user $uid:$gid" or "--user 0:0" works together with this command:<p>podman run --rm --user $uid:$gid --volume ./dir:/dir:Z --userns keep-id:uid=$uid,gid=$gid IMAGE<p>(requires podman > 4.3.0)</p>
]]></description><pubDate>Thu, 09 Feb 2023 18:29:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=34728848</link><dc:creator>eriksjolund</dc:creator><comments>https://news.ycombinator.com/item?id=34728848</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=34728848</guid></item><item><title><![CDATA[New comment by eriksjolund in "Show HN: Run Nginx with Podman and socket activation"]]></title><description><![CDATA[
<p>Podman has a feature that Docker does not yet have: Socket activation of containers.
I created a proof-of-concept demo of how to run an nginx container with rootless Podman and socket activation.<p>Using socket activation has some security and performance advantages:<p>- Native network performance over the socket-activated socket<p>- Possibility to restrict the network in the container<p>- Possibility to at the same time restrict the network in Podman and the OCI runtime<p>- The source IP address is preserved<p>- Podman installation size can be reduced</p>
]]></description><pubDate>Thu, 17 Nov 2022 13:07:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=33638339</link><dc:creator>eriksjolund</dc:creator><comments>https://news.ycombinator.com/item?id=33638339</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33638339</guid></item><item><title><![CDATA[Show HN: Run Nginx with Podman and socket activation]]></title><description><![CDATA[
<p>Article URL: <a href="https://github.com/eriksjolund/podman-nginx-socket-activation">https://github.com/eriksjolund/podman-nginx-socket-activation</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=33638326">https://news.ycombinator.com/item?id=33638326</a></p>
<p>Points: 4</p>
<p># Comments: 1</p>
]]></description><pubDate>Thu, 17 Nov 2022 13:06:22 +0000</pubDate><link>https://github.com/eriksjolund/podman-nginx-socket-activation</link><dc:creator>eriksjolund</dc:creator><comments>https://news.ycombinator.com/item?id=33638326</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33638326</guid></item><item><title><![CDATA[New comment by eriksjolund in "Podman 4.2.0"]]></title><description><![CDATA[
<p>Ok, I understand your concern about Slirp.<p>Regarding the other idea:
I've now tested it and verified that it works. The remote address is available when running a socket-activated container with rootless Podman.</p>
]]></description><pubDate>Sun, 14 Aug 2022 09:03:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=32457700</link><dc:creator>eriksjolund</dc:creator><comments>https://news.ycombinator.com/item?id=32457700</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=32457700</guid></item><item><title><![CDATA[New comment by eriksjolund in "Podman 4.2.0"]]></title><description><![CDATA[
<p>The remote address is available when running a socket-activated container with rootless Podman. I verified it in a test.</p>
]]></description><pubDate>Sun, 14 Aug 2022 08:57:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=32457679</link><dc:creator>eriksjolund</dc:creator><comments>https://news.ycombinator.com/item?id=32457679</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=32457679</guid></item></channel></rss>