Skip to content

fix(security): harden Dockerfiles - secure defaults, signal handling, healthcheck#576

Merged
lakhansamani merged 1 commit intomainfrom
fix/dockerfile-security
Apr 5, 2026
Merged

fix(security): harden Dockerfiles - secure defaults, signal handling, healthcheck#576
lakhansamani merged 1 commit intomainfrom
fix/dockerfile-security

Conversation

@lakhansamani
Copy link
Copy Markdown
Contributor

Summary

  • Signal handling (HIGH): Added exec before ./authorizer in all deployment Dockerfiles so the binary receives SIGTERM directly instead of being SIGKILLed after timeout
  • Public demo defaults (CRITICAL): Changed ENABLE_PLAYGROUND, ENABLE_GRAPHQL_INTROSPECTION to false and DISABLE_ADMIN_HEADER_AUTH to false by default
  • HEALTHCHECK (MEDIUM): Added HEALTHCHECK directive to main Dockerfile for container orchestrator health monitoring

Files Changed

  • Dockerfile — HEALTHCHECK added
  • Deployment Dockerfiles updated in their respective repos

Test plan

  • Verify docker build succeeds
  • Verify container responds to SIGTERM gracefully
  • Verify healthcheck reports healthy when app is running

@lakhansamani lakhansamani merged commit 3817ee7 into main Apr 5, 2026
@lakhansamani lakhansamani deleted the fix/dockerfile-security branch April 5, 2026 02:00
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant