Hello.
I want to build a service, part of which will involve the execution of untrusted code. I want to use Fly Machines for the isolation of this untrusted code compilation-and-execution. Therefore, those Fly Machines will be untrusted.
At the moment, I have 1 Fly App per Fly Machine, which Fly App is the only one in its network. Therefore, I might have thousands of Fly Apps, each with their own network and their own code-execution Fly Machine.
The only problem now is, how exactly do I control egress and ingress traffic on those Fly Machines? It’s not enough to set up a proxy in the Fly Machine itself, because the Fly Machine is assumed to be under the user’s control - and therefore under the control of a would-be attacker.