-
Hi all, I have been playing with the devcontainers and I believe they add loads of value to the development activity. However, while I appreciate the dynamicity of the code injections, I'd like to have a process to control the security of all the code we bring in. One idea I have in mind, but it might be that I am not seeing the spirit here, is to have devcontainers that point to docker compose which use containers with immutable IDE code file system. The images are built with separate CI pipelines that qualify everything that is packaged in an image. The docker compose file is thus pointing to these qualified images and applies security policies, such as running with read-only root file system. With this approach, I need to be able to:
|
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
Thank you for opening this discussion. From the details provided, I think the devcontainer prebuilds might help address your scenario. Prebuilds allow you to build and publish an image that can be used for creating development containers later on. This should also allow you to keep using devcontainer.json for all customizations including installing vscode extensions. Read more about prebuilds at https://containers.dev/guide/prebuild |
Beta Was this translation helpful? Give feedback.
Thank you for opening this discussion.
From the details provided, I think the devcontainer prebuilds might help address your scenario. Prebuilds allow you to build and publish an image that can be used for creating development containers later on. This should also allow you to keep using devcontainer.json for all customizations including installing vscode extensions.
Read more about prebuilds at https://containers.dev/guide/prebuild