You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Describe the bug
The default docker-compose.yaml file for Checkmate exposes ports 6379 (Redis) and 27017 (MongoDB) publicly using the ports: directive. Exposing these ports externally is a serious security risk and considered bad practice, as it may allow unauthorized access to internal services.
Expected behavior
The services should not be exposed to the public. Replace the ports: directive with expose: to limit service accessibility to within the Docker network.
Screenshots
N/A
Desktop (please complete the following information):
N/A
Additional context
Restricting these ports is important for security and to prevent unauthorized access to sensitive services like Redis and MongoDB — especially since Docker's port mappings can bypass firewall rules such as UFW by default.
The text was updated successfully, but these errors were encountered:
Describe the bug
The default
docker-compose.yaml
file for Checkmate exposes ports6379
(Redis) and27017
(MongoDB) publicly using the ports: directive. Exposing these ports externally is a serious security risk and considered bad practice, as it may allow unauthorized access to internal services.To Reproduce
Steps to reproduce the behavior:
Expected behavior
The services should not be exposed to the public. Replace the
ports:
directive withexpose:
to limit service accessibility to within the Docker network.Screenshots
N/A
Desktop (please complete the following information):
N/A
Additional context
Restricting these ports is important for security and to prevent unauthorized access to sensitive services like Redis and MongoDB — especially since Docker's port mappings can bypass firewall rules such as UFW by default.
The text was updated successfully, but these errors were encountered: