Advertisement
Advertisement
⚡ Community Insights
Discussion Sentiment
50% Positive
Analyzed from 318 words in the discussion.
Trending Topics
#docker#linux#desktop#https#docs#support#podman#container#instance#com
Discussion Sentiment
Analyzed from 318 words in the discussion.
Trending Topics
Discussion (6 Comments)Read Original on HackerNews
https://docs.docker.com/ai/sandboxes/
Not sure how well their work maps to sbx, but there has been multiple releases with features and improvements since then
Podman can transparently start microVMs instead of local containers via libkrun as well, which does support Linux: https://josecastillolema.github.io/podman-wasm-libkrun/
Docker can launch machines (linux vms) on Linux too, that is all they are doing here is launching a container instance separate Linux VM, vs the typical shared VM instance.
By default they don't do so on Linux because it has performance costs and consumes resources, but they fully support KVM[0].
I am not sure if it is a more optimized docker machine VM image or not, but it looks they are just recycling the old model with support for instance specific docker sockets.
I encourage people to try podman on windows/MacOS just because they will allow you to SSH into the machine `podman ssh` and let you pull back the covers on the black box.
But Docker/Podman/Rancher Desktop use the same methods.
[0]https://docs.docker.com/desktop/setup/install/linux/
This (MicroVMs) is also kind of what apple's container[1] tools do.
[1]: https://github.com/apple/container
I just followed Docker’s docs [0] to get Docker Desktop installed on Ubuntu.
Maybe I’m missing some specific point you’re making about some lower level detail, but they support and have instructions for Docker Desktop on Linux in their own docs.
[0] https://docs.docker.com/desktop/setup/install/linux/
Even sandboxed agents usually have a lot of capabilities. Adding backdoors to code by installing breached packages, abusing some access tokens to cause harm, and much more.