-
Notifications
You must be signed in to change notification settings - Fork 9
fix(shell): restart browser sidecar reliably via healthcheck + DinD isolation #140
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Changes from all commits
924b7fa
9dda672
c9531d0
d91380a
c0cef75
a7d99b6
ccb578e
48e563e
35fd964
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,4 +1,14 @@ | ||
| services: | ||
| dind: | ||
| image: docker:27-dind | ||
| container_name: docker-git-dind | ||
| privileged: true | ||
| environment: | ||
| DOCKER_TLS_CERTDIR: "" | ||
| volumes: | ||
| - docker-git-dind-storage:/var/lib/docker | ||
| restart: unless-stopped | ||
|
Comment on lines
+2
to
+10
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Don't replace the host socket with an unauthenticated privileged Docker daemon. This removes As per coding guidelines, "Reject PRs with unsafe Docker/GitHub Actions configuration such as privileged containers, broad host mounts, unbounded Docker socket access, unsafe pull_request_target, or unnecessary write permissions". Also applies to: 22-22 🤖 Prompt for AI Agents |
||
|
|
||
| api: | ||
| build: | ||
| context: . | ||
|
|
@@ -9,9 +19,14 @@ services: | |
| DOCKER_GIT_PROJECTS_ROOT: ${DOCKER_GIT_PROJECTS_ROOT:-/home/dev/.docker-git} | ||
| DOCKER_GIT_FEDERATION_PUBLIC_ORIGIN: ${DOCKER_GIT_FEDERATION_PUBLIC_ORIGIN:-} | ||
| DOCKER_GIT_FEDERATION_ACTOR: ${DOCKER_GIT_FEDERATION_ACTOR:-docker-git} | ||
| DOCKER_HOST: tcp://dind:2375 | ||
| ports: | ||
| - "${DOCKER_GIT_API_BIND_HOST:-127.0.0.1}:${DOCKER_GIT_API_PORT:-3334}:${DOCKER_GIT_API_PORT:-3334}" | ||
| volumes: | ||
| - /var/run/docker.sock:/var/run/docker.sock | ||
| - ${DOCKER_GIT_PROJECTS_ROOT_HOST:-/home/dev/.docker-git}:${DOCKER_GIT_PROJECTS_ROOT:-/home/dev/.docker-git} | ||
| depends_on: | ||
| - dind | ||
| restart: unless-stopped | ||
|
|
||
| volumes: | ||
| docker-git-dind-storage: | ||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Security risk: SSH exposed with hardcoded weak credentials.
Lines 20 and 27 enable SSH password authentication with a hardcoded password (
dev:dev). Combined with line 35 exposing port 22, this creates a container that can be accessed by anyone who knows or guesses the credentials.Security implications:
Recommendation:
docker logs.🧰 Tools
🪛 Checkov (3.2.528)
[medium] 27-27: Ensure that 'chpasswd' is not used to set or remove passwords
(CKV2_DOCKER_17)
🤖 Prompt for AI Agents