Skip to content

fix: Docker security hardening#232

Open
0xNyk wants to merge 1 commit into666ghj:mainfrom
0xNyk:fix/docker-hardening
Open

fix: Docker security hardening#232
0xNyk wants to merge 1 commit into666ghj:mainfrom
0xNyk:fix/docker-hardening

Conversation

@0xNyk
Copy link

@0xNyk 0xNyk commented Mar 17, 2026

Summary

  • Multi-stage Dockerfile: separate build and runtime stages
  • Run as non-root mirofish user
  • Serve frontend with serve static server instead of Vite dev server
  • Add HEALTHCHECK instruction to Dockerfile
  • Add healthcheck config to docker-compose.yml
  • Update .dockerignore with additional exclusions

Test plan

  • docker compose build succeeds
  • Container starts and healthcheck passes
  • Frontend is served correctly on port 3000
  • Backend API responds on port 5001

- Use multi-stage build to separate build and runtime
- Add non-root user (mirofish)
- Serve frontend with static server instead of dev server
- Add HEALTHCHECK instruction
- Add healthcheck to docker-compose.yml
- Update .dockerignore with additional exclusions
@0xNyk
Copy link
Author

0xNyk commented Mar 17, 2026

Verification

All checks pass on merged code:

Test Result
HEALTHCHECK in Dockerfile ✅ PASS
Non-root USER mirofish in Dockerfile ✅ PASS
Static serve replaces dev server ✅ PASS
Healthcheck in docker-compose.yml ✅ PASS
Multi-stage build (3 stages) ✅ PASS

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant