Skip to content

Conversation

@AndyBoWu
Copy link
Member

Summary

This PR enhances the Docker container security and CI/CD pipeline following security best practices.

Changes

Docker Security Improvements

  • Run container as non-root user (story with UID 1000) for better security
  • Add build arguments (VERSION, COMMIT, BUILDNUM) for proper metadata tracking
  • Add OCI standard labels for improved container management
  • Set explicit ENTRYPOINT for better container usability
  • Optimize .dockerignore to reduce build context size

CI/CD Enhancements

  • Pin all GitHub Actions to specific SHA hashes for supply chain security
  • Add Trivy vulnerability scanner with SARIF upload to GitHub Security tab
  • Switch from local cache to GitHub Actions cache for better performance
  • Add explicit permissions following principle of least privilege
  • Add Dependabot configuration for automated dependency updates

AndyBoWu added 3 commits July 10, 2025 13:29
- Run container as non-root 'story' user (UID 1000)
- Add build arguments for version metadata
- Add OCI standard labels for container management
- Optimize .dockerignore for smaller build context
- Add explicit ENTRYPOINT for better usability
- Pin all GitHub Actions to SHA for supply chain security
- Add Trivy vulnerability scanner with SARIF upload
- Switch from local to GitHub Actions cache
- Add explicit permissions for least privilege
- Add Dependabot for automated dependency updates
@stevemilk stevemilk changed the title Chore/docker security improvements [wip] Chore/docker security improvements Jul 17, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants