docker/compose: keep auth secrets root-only in cert fixer #3041
No reviewers
Labels
No labels
1week
2weeks
Failed compliance check
IP cameras
NATS
Possible security concern
Review effort 1/5
Review effort 2/5
Review effort 3/5
Review effort 4/5
Review effort 5/5
UI
aardvark
accessibility
amd64
api
arm64
auth
back-end
bgp
blog
bug
build
checkers
ci-cd
cleanup
cnpg
codex
core
dependencies
device-management
documentation
duplicate
dusk
ebpf
enhancement
eta 1d
eta 1hr
eta 3d
eta 3hr
feature
fieldsurvey
github_actions
go
good first issue
help wanted
invalid
javascript
k8s
log-collector
mapper
mtr
needs-triage
netflow
network-sweep
observability
oracle
otel
plug-in
proton
python
question
reddit
redhat
research
rperf
rperf-checker
rust
sdk
security
serviceradar-agent
serviceradar-agent-gateway
serviceradar-web
serviceradar-web-ng
siem
snmp
sysmon
topology
ubiquiti
wasm
wontfix
zen-engine
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
carverauto/serviceradar!3041
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "refs/pull/3041/head"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Imported from GitHub pull request.
Original GitHub pull request: #3030
Original author: @mfreeman451
Original URL: https://github.com/carverauto/serviceradar/pull/3030
Original created: 2026-03-12T20:32:18Z
Original updated: 2026-03-12T20:40:20Z
Original head: carverauto/serviceradar:codex/propose-fix-for-cert-permissions-vulnerability
Original base: main
Motivation
docker/compose/fix-cert-permissions.shrecursivelychownthe shared cert volume to the runtime UID/GID, which together withdocker/compose/update-config.shwritingjwt-secret/api-key/admin password files into the same directory exposed authentication secrets to poller/agent containers mounting the volume read-only.Description
docker/compose/fix-cert-permissions.shthat, after normalizing cert/key permissions, explicitly resets high-value non-certificate secret files (jwt-secret,api-key,admin-password,admin-password-hash,password.txt,edge-onboarding.key) toroot:rootandchmod 600, preserving certificate sharing for mTLS while preventing runtime service UIDs from reading bootstrap/auth secrets.Testing
sh -n docker/compose/fix-cert-permissions.sh, which completed without errors.Codex Task
Imported GitHub PR comment.
Original author: @mfreeman451
Original URL: https://github.com/carverauto/serviceradar/pull/3030#issuecomment-4049891634
Original created: 2026-03-12T20:40:14Z
closing, we have a better fix in another branch
Pull request closed