Skip to content

Quickstart Dockerfile Should Not Expose Redis and MongoDB Ports #2127

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
Titanium2099 opened this issue Apr 25, 2025 · 1 comment
Closed

Comments

@Titanium2099
Copy link

Describe the bug
The default docker-compose.yaml file for Checkmate exposes ports 6379 (Redis) and 27017 (MongoDB) publicly using the ports: directive. Exposing these ports externally is a serious security risk and considered bad practice, as it may allow unauthorized access to internal services.

To Reproduce
Steps to reproduce the behavior:

  1. Go to https://raw.githubusercontent.com/bluewave-labs/Checkmate/refs/heads/master/Docker/dist/docker-compose.yaml
  2. Download it
  3. View contents

Expected behavior
The services should not be exposed to the public. Replace the ports: directive with expose: to limit service accessibility to within the Docker network.

Screenshots
N/A

Desktop (please complete the following information):
N/A

Additional context
Restricting these ports is important for security and to prevent unauthorized access to sensitive services like Redis and MongoDB — especially since Docker's port mappings can bypass firewall rules such as UFW by default.

@ajhollid
Copy link
Collaborator

This has been resolved, thank you!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants