-
NexaPG 0.2.2 - NGINX unprivileged security update
StableAll checks were successfulMigration Safety / Alembic upgrade/downgrade safety (push) Successful in 21sPostgreSQL Compatibility Matrix / PG14 smoke (push) Successful in 8sPostgreSQL Compatibility Matrix / PG15 smoke (push) Successful in 7sPostgreSQL Compatibility Matrix / PG16 smoke (push) Successful in 7sPostgreSQL Compatibility Matrix / PG17 smoke (push) Successful in 8sPostgreSQL Compatibility Matrix / PG18 smoke (push) Successful in 8sDocker Publish (Release) / Build and Push Docker Images (release) Successful in 1m33sreleased this
2026-02-14 16:20:45 +00:00 | 5 commits to main since this releaseChanged
Frontend Runtime Security Hardening
- Switched frontend runtime image to an unprivileged NGINX variant:
- from
nginx:1.29-alpine-slim - to
nginxinc/nginx-unprivileged:stable-alpine
- from
- Set explicit non-root runtime user in frontend container:
USER 101
Frontend Runtime Port Alignment
- Updated NGINX listener in frontend runtime config:
listen 8080;
- Updated frontend container port exposure:
EXPOSE 8080
- Updated Docker Compose frontend mapping:
- from
${FRONTEND_PORT}:80 - to
${FRONTEND_PORT}:8080
- from
Why This Release
- Improves container runtime security posture by running frontend as non-root by default.
- Aligns deployment with Docker Scout best-practice checks (
default non-root user). - Keeps external access unchanged (still via
FRONTEND_PORTon host), while hardening internal container behavior.
Notes
- No database migration required.
- Rebuild and republish frontend image, then redeploy to apply changes.
- If using custom reverse-proxy/container configs, ensure upstream points to frontend container port
8080.
Downloads
- Switched frontend runtime image to an unprivileged NGINX variant: