Changelog
All notable changes to this project will be documented in this file.
All notable changes to this project will be documented in this file.
The format is based on Keep a Changelog, and this project adheres to Semantic Versioning.
Fork point: upstream post-8.1.1 (2025-11-27) Upstream baseline: WUD 8.1.1 + 65 merged PRs on
main(Vue 3 migration, Alpine base image, Rocket.Chat trigger, threshold system, semver improvements, request→axios migration, and more)
Unreleased
Added
- Update-operations pagination —
GET /api/containers/:id/update-operationsnow supportslimitandoffsetquery parameters with_linksnavigation, matching the existing container list pagination pattern. - Periodic audit log pruning — Audit store now runs a background timer (hourly, unref'd) to prune stale entries even with low insert volume, in addition to the existing insert-count-based pruning.
Changed
- Extract maturity-policy module — Consolidated scattered day-to-millisecond conversions and maturity policy constants into
app/model/maturity-policy.ts, shared by backend, UI, and demo app. - Extract security-overview module — Moved security vulnerability aggregation and pagination logic from
crud.tsinto dedicatedapp/api/container/security-overview.tsfor improved readability and testability. - Refactor Docker Compose trigger — Extracted YAML parsing/editing into
ComposeFileParserand post-start hook execution intoPostStartExecutor, reducing the monolithicDockercompose.tsby ~400 lines. - Decompose useContainerActions — Split the 1200-line composable into focused modules:
useContainerBackups,useContainerPolicy,useContainerPreview, anduseContainerTriggers. - Registry error handling — Replaced
catch (e: any)withcatch (e: unknown)andgetErrorMessage(e)in component registration and trigger/watcher startup. - E2E test resilience — Container row count assertions now use
toBeGreaterThan(0)instead of hardcoded counts, preventing false failures when the QA environment has a different number of containers. - Extract runtime config evaluation context type — Consolidated scattered runtime field evaluation parameters into a typed
ClonedRuntimeFieldEvaluationContextinterface for trigger providers. - Argon2 hash parsing type safety — Extracted
Argon2Parametersinterface, parameter key type guard, and PHC parameter parsing into a reusable function for improved type safety. - Extract agent client initialization methods — Extracted URL parsing, HTTPS detection, protocol validation, and TLS configuration from monolithic constructor into focused private methods.
- Extract shared self-hosted registry config schema — Deduplicated the registry configuration schema (url, login, password, auth, cafile, insecure, clientcert, clientkey) into a reusable helper shared by Custom and SelfHostedBasic registry providers.
Fixed
- CSRF validation behind reverse proxies — Same-origin mutation checks now honor
X-Forwarded-ProtoandX-Forwarded-Hostwhen present before falling back to direct request protocol/host, preventing false403 CSRF validation failedresponses in TLS-terminating proxy setups. (#146) - Hosts page missing env-var-configured watchers — The Hosts page hardcoded a single "Local" entry and only added agent-based hosts. Watchers configured via
DD_WATCHER_*environment variables (e.g. remote Docker hosts) were never displayed, even though their containers appeared correctly on the Containers page. The page now fetches all watchers from the API and displays each local watcher with its actual name and connection address. (#151) - Docker events reconnect with malformed errors — Reconnect failure logging no longer crashes when the error object has no
messageproperty. - Security overview container count — The security vulnerability overview now uses the lightweight store count instead of loading all container objects just to count them.
- Compose path deduplication — Replaced
indexOf-based dedup withSetfor compose file path detection in container security view. - Build provenance attestation — CI attestation step now runs with
if: always()so provenance is attested even when prior optional steps are skipped. - Container recreate alias duplicates in triggers — When containers were recreated externally (via Portainer or
docker compose up), Docker's transient<id-prefix>_<name>aliases were treated as new containers, producing duplicate entries in MQTT Home Assistant discovery sensors and Telegram notifications. Added alias deduplication filtering and force-removal of stale container IDs on recreate detection. (#156) - DNS resolution failures on Alpine (EAI_AGAIN) — Node.js 24 defaults to
verbatimDNS ordering, which on Alpine's musl libc can causegetaddrinfo EAI_AGAINerrors when IPv6 records are returned first on dual-stack networks. Drydock now defaults to IPv4-first DNS ordering at startup, configurable viaDD_DNS_MODE(ipv4first|ipv6first|verbatim, default:ipv4first). (#161) - Stale store data after external container recreation — Watch-at-start scan was suppressed when the store already had container data, leaving stale records from the previous run after external container recreation. Removed the suppression so every startup runs a full scan with alias filtering. (#157)
- Watcher container counts on Hosts page — Per-watcher container counts on the Hosts page used
watcher.id(e.g.docker.esk83) as the lookup key instead ofwatcher.name(e.g.esk83), causing counts to display as zero for env-var-configured watchers. (#155) - Docker images tagged
:mainwith no version — CI release workflow triggered on both main branch pushes and version tags, producing Docker images tagged:mainthat showedDD_VERSION=maininstead of a real version number. Release workflow now only triggers on version tags (v*). (#154) - Maturity badge sizing and tooltip clipping — Fixed maturity badge height mismatch with other text badges and removed
overflow-hiddenfrom DataListAccordion that clipped tooltips in list view.
Security
- Agent secret over plaintext HTTP warning — Agent clients now log a warning when a shared secret is configured over unencrypted HTTP, advising HTTPS configuration.
- Auth audit log injection — Login identity values are now sanitized with
sanitizeLogParam()before inclusion in audit log details, preventing log injection via crafted usernames. - SSE self-update ack hardening — Added validation for empty
clientId/clientToken, non-ack broadcast mode, and client-not-bound-to-operation rejection. - FAQ: removed insecure seccomp advice — Removed the "Core dumped on Raspberry PI" FAQ entry that recommended
--security-opt seccomp=unconfined, which completely disables the kernel's syscall sandbox. The underlying libseccomp2 bug was fixed in all supported OS versions since 2021.
Documentation
- Docker socket security guide — Expanded watcher docs with comprehensive security section: comparison table of all access methods, socket proxy setup (recommended), remote Docker over TLS with cert generation walkthrough, rootless Docker guide, full Docker API endpoint reference showing exactly which endpoints Drydock uses for read-only monitoring vs write operations (updates).
Dependencies
- biome — Bumped to 2.4.7 with import ordering fixes for new lint rules.
- vitest — Bumped to 4.1.0 in app workspace with fast-check/vitest 0.3.0 and knip 5.86.0.
- UI packages — Bumped vue, vitest, storybook, and icon packages.
- CI actions — Bumped zizmor-action to v0.5.2 and cosign-installer to v4.1.0.
1.4.1
Added
- Headless mode (
DD_SERVER_UI_ENABLED) — Run drydock as an API-only service by settingDD_SERVER_UI_ENABLED=false. The REST API, SSE, and healthcheck endpoints remain fully functional while the UI is not served. Useful for controller nodes that only manage agents. - Maturity-based update policy — Per-container update maturity policy via
dd.updatePolicy.maturityMode(allormature) anddd.updatePolicy.maturityMinAgeDays(default 7). When set tomature, containers with updates detected less than the configured age threshold are blocked from triggering until the update has settled. UI shows NEW/MATURE badges with flame/clock icons on containers with available updates. (#120) ?groupByStack=trueURL parameter — Bookmarkable URL parameter to enable stack grouping on the containers page. Also accepts?groupByStack=1. (#145)
Changed
- Connection-lost overlay animation — The connection-lost and reconnecting overlays now use a bounce animation for improved visual feedback.
- Watch target resolution refactored to discriminated union — Internal refactor of the watch target resolution logic for improved type safety and maintainability.
Fixed
- Agent handshake and SSE validation failure — Fixed agent API returning redacted container data (with
sensitivefield on env entries) instead of raw data, causing controller-side Joi validation to reject the handshake and crash on real-time SSE container events. SSE payloads now prefer canonical raw store data with sanitization fallback. (#141) - Mangled argon2 hash detection — Docker Compose
$interpolation can strip$delimiters from argon2 PHC hashes, producing an invalid hash that silently failed registration. Drydock now detects mangled hashes at startup and surfaces an actionable error message. (#147) - Anonymous auth fallback — When all configured auth providers fail to register (e.g. due to a mangled hash), Drydock now falls back to anonymous mode if
DD_ANONYMOUS_AUTH_CONFIRM=trueis set, instead of leaving the user with no way to log in. (#147) - Auth registration errors on login page — Registration warnings (e.g. invalid hash format) are now surfaced on the login page so users can see exactly what went wrong instead of a generic "No authentication methods configured" message. (#147)
- CSP inline style violations — Replaced runtime
element.stylemutations (DataTable column resize, tooltip directive, theme transitions, preference restore) with CSS custom properties and class-based styling. Relaxedstyle-srcto include'unsafe-inline'for vendor libraries (iconify-icon, Vue Transition) that setelement.styleprogrammatically. - Compose trigger affinity across remapped roots — Compose trigger file-path matching now uses suffix-based comparison as a fallback when the container's compose label path (host mount) differs from the trigger's configured path (container-internal), preventing missed trigger associations in bind-mount setups.
- Compose trigger association — Enforce compose-file affinity when associating triggers with containers, preventing incorrect trigger-container matching. (#139)
- Update All button icon centering — Fixed icon-text alignment in the Update All group header button to match the split button pattern used elsewhere.
- Selected card border clipping — Fixed card border clipping on the first grid column in card view.
Security
- Username enumeration timing side-channel — Eliminated timing difference between valid and invalid usernames during authentication.
- LokiJS metadata exposure — Stripped internal LokiJS fields (
$loki,meta) from settings API responses, agent API container responses, and/appendpoint. - Permissions-Policy header — Added
Permissions-Policyheader to restrict browser feature access (camera, microphone, geolocation, etc.). - CSP and Cross-Origin-Embedder-Policy — Tightened Content Security Policy and added COEP header.
- Production image hardening — Removed
wget,nc, andnpmfrom the production Docker image; upgraded zlib.
Dependencies
- undici — Bumped to 7.24.1 (fixes 12 CVEs including WebSocket memory consumption, CRLF injection, and request smuggling).
1.4.0 — 2026-02-28
Breaking Changes
- MQTT
HASS_ATTRIBUTESdefault changed fromfulltoshort— This changes Home Assistant entity payloads by default, excluding large SBOM documents, scan vulnerabilities, details, and labels. To retain the previous payload behavior, setDD_TRIGGER_MQTT_{name}_HASS_ATTRIBUTES=fullexplicitly.
Added
- Audit log for container state changes — External container lifecycle events (start, stop, restart via Portainer or CLI) now generate
container-updateaudit entries with the new status, so the audit log reflects all state changes, not just Drydock-initiated actions. (#120) - mTLS client certificate support — Registry providers now accept
CLIENTCERTandCLIENTKEYoptions for mutual TLS authentication with private registries that require client certificates.
Backend / Core
- Container recent-status API —
GET /api/containers/recent-statusreturns pre-computed update status (updated/pending/failed) per container, replacing the client-side audit log scan and reducing dashboard fetch payload size. - Dual-slot security scanning — "Scan Now" automatically scans both the current running image and the available update image when an update exists. Results are stored in separate slots (
scan/updateScan) and the Security page shows a delta comparison badge (+N fixed, -N new) next to each image that has both scans. DD_LOG_BUFFER_ENABLEDtoggle — Disable the in-memory log ring buffer viaDD_LOG_BUFFER_ENABLED=falseto reduce per-log processing overhead. When disabled,/api/log/entriesreturns an empty array. Defaults totrue.- Scheduled security scanning — Set
DD_SECURITY_SCAN_CRONto automatically scan all watched containers on a cron schedule.DD_SECURITY_SCAN_JITTER(default 60s) spreads load with random delay before each cycle. - Security scheduler shutdown on exit — Security scan scheduler is now explicitly shut down during graceful exit, preventing orphan timers from delaying process termination.
- On-demand sensitive env value reveal — Container environment variables are redacted by default in API responses. Individual values can be revealed on-demand via
/api/containers/:id/env/revealwith audit logging. - On-demand scans populate digest cache — Manual container scans now populate the digest-based dedup cache, preventing redundant rescans of the same image digest.
- Per-container webhook opt-out — New
dd.webhook.enabled=falsecontainer label to exclude individual containers from webhook triggers without disabling the webhook API globally. - Scan cancellation and mobile scan progress — Security batch scans can now be cancelled mid-flight. Mobile scan progress UI improved with responsive layout.
- Security scan coverage counts — Security view header shows scanned/total container counts for at-a-glance scan coverage.
- Notification rule management API and persistence —
/api/notificationsCRUD endpoints backed by LokiJS-persisted notification rules forupdate-available,update-applied,update-failed,security-alert, andagent-disconnectevent types. - Rule-aware runtime dispatch — Trigger event dispatch resolves notification rules at runtime so per-event enable/disable and trigger assignments actively control which triggers fire.
- Security-alert and agent-disconnect events — New event types with audit logging and configurable deduplication windows. Security alerts fire automatically on critical/high vulnerability scan results.
- Compose-native container updates — Compose-managed containers now update via
docker compose up -dlifecycle instead of Docker API recreate, preserving compose ownership and YAML formatting. - Rename-first rollback with health gates — Non-self container updates use a rename-first strategy (rename old → create new → health-gate → remove old) with crash-recoverable state persisted in a new
update-operationstore collection. Rollback telemetry viadd_trigger_rollback_total{type,name,outcome,reason}counter. - Tag-family aware semver selection — Docker watcher infers the current tag family (prefix/suffix/segment style) and keeps semver updates within that family by default, preventing cross-family downgrades like
5.1.4→20.04.1. Addeddd.tag.familylabel (strictdefault,looseopt-out) and imgset support. (#104) - Entrypoint/cmd drift detection — Docker trigger detects whether entrypoint/cmd were inherited from the source image vs user-set, replacing inherited values with target image defaults during update. Adds
dd.runtime.entrypoint.originanddd.runtime.cmd.originlabels. - Self-update controller with SSE ack flow — Dedicated controller container for self-update replaces the shell helper pattern. UI acknowledgment via SSE with operation ID tracking.
- Server-issued SSE client identity — Replaced client-generated UUIDs with server-issued
clientId/clientTokenpairs for self-update ack validation, preventing spoofed acknowledgments. config migrateCLI —node dist/index.js config migrateconverts legacyWUD_*and Watchtower env vars/labels toDD_*/dd.*format across.envand compose files. Supports--dry-runpreview and--source/--fileselection.- Legacy compatibility usage metric — Prometheus counter
dd_legacy_input_total{source,key}tracks local runtime consumption of legacy inputs (WUD_*env vars,wud.*labels) without external telemetry. Startup warns when legacy env vars are detected; watcher/trigger paths emit one-time deprecation warnings onwud.*label fallback. - Bundled selfhst icons for offline startup — Common container icons (Docker, Grafana, Nextcloud, etc.) bundled in the image so the UI works without internet on first boot.
- Runtime tool status endpoint —
/api/server/security/runtimereports Trivy/Cosign availability for the Security view. - Gzip response compression — Configurable via
DD_SERVER_COMPRESSION_ENABLEDandDD_SERVER_COMPRESSION_THRESHOLD(default 1024 bytes), with automatic SSE exclusion. - Container runtime details — Ports, volumes, and environment exposed in the container model and API for the detail panel.
- Update detected timestamp —
updateDetectedAtfield tracks when an update was first seen, preserved across refresh cycles. - No-update reason tracking —
result.noUpdateReasonfield surfaces why tag-family or semver filtering suppressed an available update. - Remove individual skip entries —
remove-skippolicy action allows removing a single skipped tag or digest without clearing all skips. - Update-operation history API —
GET /api/containers/:id/update-operationsreturns persisted update/rollback history for a container. - Settings backend —
/api/settingsendpoints with LokiJS collection for persistent UI preferences (internetless mode). Icon proxy cache with atomic file writes and manual cache clear. - SSE real-time updates — Server-Sent Events push container state changes to the UI without polling.
- Remember-me authentication — Persistent login sessions via remember-me checkbox on the login form.
- Docker Compose trigger — Refresh compose services via Docker Compose CLI when updates are detected.
- Advisory-only security scanning —
DD_SECURITY_BLOCK_SEVERITY=NONEruns vulnerability scans without blocking updates. Scan results remain visible in the Security view and audit log. - OpenAPI 3.1.0 specification and endpoint — Machine-readable API documentation available at
GET /api/openapi.json, covering all v1.4 endpoints with request/response schemas. - Watcher agent support initialization — Watchers now initialize agent support on startup for distributed monitoring readiness.
- Security vulnerability overview endpoint — New
GET /api/containers/security/vulnerabilitiesreturns pre-aggregated vulnerability data grouped by image with severity summaries, so the Security view no longer needs to load all containers. - MQTT attribute filtering for Home Assistant — MQTT trigger supports attribute-based filtering for Home Assistant integration, allowing selective publishing based on container attributes.
- Docker Compose post_start env validation — Docker Compose trigger validates environment variables in
post_starthooks before execution, preventing runtime errors from missing or invalid env var references. - MQTT HASS entity_picture from container icons — When Home Assistant HASS discovery is enabled,
entity_pictureis now automatically resolved from the container'sdd.display.iconlabel. Icons withsh:,hl:, orsi:prefixes map to jsDelivr CDN URLs for selfhst, homarr-labs, and simple-icons respectively. Direct HTTP/HTTPS URLs pass through unchanged. (#138) dd.display.picturecontainer label — New label to override the MQTT HASSentity_pictureURL directly. Takes precedence over icon-derived pictures when set to an HTTP/HTTPS URL.
UI / Dashboard
- Tailwind CSS 4 UI stack — Complete frontend migration from Vuetify 3 to Tailwind CSS 4 with custom shared components. All 13 views rebuilt with Composition API.
- Shared data components — Reusable DataTable, DataCardGrid, DataListAccordion, DataFilterBar, DetailPanel, DataViewLayout, and EmptyState components used consistently across all views with table/cards/list view modes.
- 6 color themes — One Dark (clean/balanced), GitHub (clean/familiar), Dracula (bold purple), Catppuccin (warm pastels), Gruvbox (retro earthy warmth), and Ayu (soft golden tones). Each with dark and light variants. Circle-reveal transition animation between themes.
- 7 icon libraries — Phosphor Duotone (default), Phosphor, Lucide, Tabler, Heroicons, Iconoir, and Font Awesome. Switchable in Config > Appearance with icon size slider.
- 6 font families — IBM Plex Mono (default/bundled), JetBrains Mono, Source Code Pro, Inconsolata, Commit Mono, and Comic Mono. Lazy-loaded from local
/fonts/directory with internetless fallback. - Command palette — Global Cmd/Ctrl+K search with scope filtering (
/pages,@runtime,#config), keyboard navigation, grouped sections, and recent history. - Notification rules management view — View, toggle, and assign triggers to notification rules with direct save through
/api/notifications. - Audit history view — Paginated audit log with filtering by container, event text, and action type. Includes security-alert and agent-disconnect event type icons.
- Container grouping by stack — Collapsible sections grouping containers by compose stack with count and update badges.
- Container actions tab — Detail panel tab with update preview, trigger list, backup/rollback management, and update policy controls (skip tags, skip digests, snooze).
- Container delete action — Remove a container from tracking via table row or detail panel.
- Container ghost state during updates — When a container is updated, stopped, or restarted, its position is held in the UI with a spinner overlay while polling for the recreated container, preventing the "disappearing container" UX issue. (#80)
- Skip update action — Containers with pending updates can be individually skipped, hiding the update badge for the current session without requiring a backend endpoint.
- Slide-in detail panels on all views — Row-click detail panels for Watchers, Auth, Triggers, Registries, Agents, and Security views.
- Interactive column resizing — Drag-to-resize column handles on all DataTable instances.
- Dashboard live data and drag-reorder — Stat cards (containers, updates, security, registries) computed from real container data with drag-reorderable layout and localStorage persistence. Security donut chart, host status, and update breakdown widgets.
- Log viewer auto-fetch and scroll lock — Configurable auto-fetch intervals (2s/5s/10s/30s) with scroll lock detection and resume for both ConfigView logs and container logs.
- Keyboard shortcuts — Enter/Escape for confirm dialogs, Escape to close detail panels.
- SSE connectivity overlay — Connection-lost overlay with self-update awareness and auto-recovery.
- Login page connectivity monitor — Polls server availability and shows connection status on the login screen.
- Server name badge for remote watchers — Shows the watcher name instead of "Local" for multi-host setups.
- Dynamic dashboard stat colors — Color-coded update and security stats based on severity ratio.
- About Drydock modal — Version info and links accessible from sidebar.
- View wiring — Watcher container counts, trigger Test buttons with success/failure feedback, host images count, and registry self-hosted port matching all wired to live API data.
- Font size preference — Adjustable font size slider in Config > Appearance for UI-wide text scaling.
- Announcement banner — Dismissible banner component for surfacing release notes and important notices in the dashboard.
- Dashboard vulnerability sort by severity — Top-5 vulnerability list on the dashboard now sorted by total count descending with critical count as tiebreaker, so the most severe containers appear first.
- Rollback confirmation dialog — Container rollback actions now require explicit confirmation through a danger-severity dialog before restoring from backup.
- Update confirmation dialog — Container update actions now require explicit confirmation through a dialog before triggering an update.
- SHA-1 hash deprecation banner — Dashboard shows a dismissible deprecation banner when legacy SHA-1 password hashes are detected, prompting migration to argon2id.
- Config tab URL deep-linking — Config view tab selection syncs to the URL query parameter, enabling shareable direct links to specific config tabs.
Changed
- Compose trigger uses Docker Engine API — Compose-managed container updates now use the Docker Engine API directly (pull, stop, recreate) instead of shelling out to
docker compose/docker-composeCLI. Eliminatesspawn docker ENOENTerrors in environments without Docker CLI binaries installed. - Compose self-update delegates to parent orchestrator — Self-update for compose-managed Drydock containers now uses the parent Docker trigger's helper-container transition with health gates and rollback, instead of direct stop/recreate.
- Compose runtime refresh extracted — Shared
refreshComposeServiceWithDockerApi()helper eliminates the recursiverecreateContainer→updateContainerWithComposecall chain. Both code paths now converge on the same explicit, non-recursive method. - Compose-file-once batch mode re-enabled —
COMPOSEFILEONCE=truenow works with the Docker Engine API runtime. First container per service gets a full runtime refresh; subsequent containers sharing the same service skip the refresh. - Self-update controller testable entrypoint — Extracted process-level entry logic to a separate entrypoint module, making the controller independently testable without triggering process-exit side effects.
- Dockercompose YAML patching simplified — Removed redundant type guards and dead-code branches from compose file patching helpers, reducing code paths and improving maintainability.
- Dashboard fetches recent-status from backend — Dashboard now fetches pre-computed container statuses from
/api/containers/recent-statusinstead of scanning the raw audit log client-side. - Prometheus collect() callback pattern — Switched container gauge from interval-based polling to the Prometheus
collect()callback, letting Prometheus control collection timing and eliminating the background 5s timer. - Container security API refactored — Container security routes refactored into a dedicated module with type-safe SecurityGate integration, concurrent scan limiting (max 1), and trivy DB status-based cache invalidation.
- DashboardView composable extraction — Extracted 700+ line monolith into
useDashboardData,useDashboardComputed,useDashboardWidgetOrder, and shareddashboardTypesfor better testability and separation of concerns. - Event-driven connectivity polling — AppLayout SSE connectivity monitoring now starts on disconnect and stops on reconnect instead of running a fixed interval, reducing unnecessary network requests.
- Vulnerability loading optimized — Vulnerability data loaded from the container list API payload (
includeVulnerabilitiesflag) instead of separate per-container fetches, reducing API calls on the Security view. - Default log format is JSON — Official Docker image now defaults to
DD_LOG_FORMAT=jsonfor structured production logs. Override withDD_LOG_FORMAT=textfor pretty logs. - Scan endpoint rate limit reduced —
POST /api/containers/:id/scanrate limit lowered from 100 to 30 requests/min to prevent resource exhaustion during aggressive scanning. - Single Docker image — Removed thin/heavy image variants; all images now bundle Trivy and Cosign.
- Removed Vuetify dependency — All Vuetify imports, components, and archived test files removed. Zero Vuetify references remain.
- Fail-closed auth enforcement — Registry bearer-token flows error on token endpoint failures instead of falling through to anonymous. HTTP trigger auth errors on unsupported types. Docker entrypoint requires explicit
DD_RUN_AS_ROOT+DD_ALLOW_INSECURE_ROOTfor root mode. - Fail-closed anonymous auth on fresh installs — New installs with no authentication configured and no
DD_ANONYMOUS_AUTH_CONFIRM=truefail closed at startup (all API calls return 401). Users upgrading from a previous version are allowed anonymous access with a startup warning. SetDD_AUTH_BASIC_<name>_USER/DD_AUTH_BASIC_<name>_HASHto configure authentication, or setDD_ANONYMOUS_AUTH_CONFIRM=trueto explicitly allow anonymous access. - Dashboard streamlined — Stat cards reduced from 7 to 4 (Containers, Updates, Security, Registries). Recent Activity widget removed to fit on single viewport. Background refresh prevents loading flicker on SSE events.
- Notifications view is full rule management — Editable notification rules (enable/disable and trigger assignments) that save directly through
/api/notifications. - Standardized API responses with collection pattern — All collection endpoints (
/api/containers,/api/registries,/api/watchers,/api/authentications,/api/audit) now return{ data: [...], total }instead of raw arrays. Supports pagination viaoffset/limitquery parameters. - Paginated API discoverability links — Paginated collection responses now include
_links.selfand_links.nextwhere applicable (for example/api/containersand/api/audit) to make page traversal explicit for API consumers. - Versioned API base path with transition alias —
/api/v1/*is now the canonical API path for integrations./api/*remains as a backward-compatible alias during migration and is planned for removal in a future major release (target: v2.0.0). - Agent-scoped path order normalized — Agent-qualified component and trigger routes now use
/:type/:name/:agent(for example/api/triggers/:type/:name/:agentand/api/containers/:id/triggers/:triggerType/:triggerName/:triggerAgent) instead of the old agent-first order. This is a breaking change for external API clients using the old path shape. - Machine-readable API error contract — All error responses return a consistent
{ "error": "..." }JSON structure with an optionaldetailsobject for contextual metadata. - 6 color themes — Replaced original Drydock theme with popular editor palettes: One Dark, GitHub, Dracula, Catppuccin, Gruvbox, and Ayu. Each with dark and light variants.
- Argon2id password hashing — Basic auth now uses argon2id (OWASP recommended) via Node.js built-in
crypto.argon2Sync()instead of scrypt for password hashing. Default parameters: 64 MiB memory, 3 passes, parallelism 4. - PUT
/api/settingsdeprecated —PUT /api/settingsnow returns RFC 9745Deprecationand RFC 8594Sunsetheaders. UsePATCH /api/settingsfor partial updates. PUT alias removal targeted for v1.5.0. - Basic auth argon2id PHC compatibility — Basic authentication now accepts PHC-format argon2id hashes (
$argon2id$v=19$m=...,t=...,p=...$salt$hash) in addition to the existing Drydockargon2id$memory$passes$parallelism$salt$hashformat. Hash-generation guidance now recommends the standardargon2CLI command first, with Node.js as a secondary option. - Borderless UI redesign — Removed borders from all views, config tabs, detail panels, and shared data components for a cleaner visual appearance.
- Dashboard version column alignment — Version column in the dashboard updates table is now left-aligned for better readability.
- Detail panel expand button redesigned — Full-page expand button in the detail panel now uses a frame-corners icon instead of the previous maximize icon.
- Sidebar active indicator removed — Removed the blue active indicator bar from sidebar navigation items for a cleaner look.
Fixed
-
Log level setting had no effect —
DD_LOG_LEVEL=debugwas correctly parsed but debug messages were silently dropped because pino's multistream destinations defaulted toinfolevel. Stream destinations now inherit the configured log level. (#134) -
Server feature flags not loaded after login — Feature flags (
containeractions,delete) were permanently stuck as disabled when authentication was required, because the pre-login bootstrap fetch failure marked the flags as "loaded" and never retried. Now failed fetches allow automatic retry after login. (#120) -
Compose trigger silently skips containers — Multiple failure paths in the compose trigger were logged at
debuglevel, making it nearly impossible to diagnose why a trigger reports success but containers don't update. Key diagnostic messages (compose file mismatch, label inspect failure, no containers matched) promoted towarnlevel, and the "already up to date" message now includes container names. (#84) -
Fallback icon cached permanently — The Docker placeholder icon was served with
immutablecache headers, causing browsers to cache it permanently even after the real provider icon becomes available. Fallback responses now useno-store. -
Basic auth upgrade compatibility restored — Basic auth now accepts legacy v1.3.9 Basic auth hashes (
{SHA},$apr1$/$1$,crypt, and plain fallback) to preserve smooth upgrades. Legacy formats remain deprecated and continue showing a migration banner, with removal still planned for v1.6.0. -
Compose trigger rejects lowercase env var keys — Configuration keys like
COMPOSEFILEONCE,DIGESTPINNING, andRECONCILIATIONMODEwere lowercased by the env parser but the Joi schema expected camelCase. Schema now maps lowercase keys to their camelCase equivalents. (#120) -
Compose trigger strips docker.io prefix — When a compose file uses an explicit
docker.io/registry prefix, compose mutations now preserve it instead of stripping it to a bare library path. (#120) -
Compose trigger fails when FILE points to directory —
DD_TRIGGER_DOCKERCOMPOSE_{name}_FILEnow accepts directories, automatically probing forcompose.yaml,compose.yml,docker-compose.yaml, ordocker-compose.ymlinside the directory. (#84) -
Container healthcheck fails with TLS backend — The Dockerfile healthcheck now detects
DD_SERVER_TLS_ENABLED=trueand switches tocurl --insecure https://for self-signed certificates. Also skips the healthcheck entirely whenDD_SERVER_ENABLED=false. (#120) -
Agent CAFILE ignored without CERTFILE — The agent subsystem now loads the CA certificate from
CAFILEeven whenCERTFILEis not provided, fixing TLS verification for agents behind reverse proxies with custom CA chains. -
Service worker accepts cross-origin postMessage — The demo service worker now validates
postMessageorigins against the current host, preventing potential cross-origin message injection. -
Action buttons disable and show spinner during in-progress actions — Container action buttons (Stop, Start, Restart, Update, Delete) now show a disabled state with a spinner while the action runs in the background, providing clear visual feedback. The confirm dialog closes immediately on accept instead of blocking the UI.
-
Command palette clears stale filter on navigation — Navigating to a container via Ctrl+K search now clears the active
filterKind, preventing stale filter state from hiding the navigated container. -
Manual update button works with compose triggers — The update container endpoint now searches for both
dockeranddockercomposetrigger types, matching the existing preview endpoint behavior. Previously, users with only a compose trigger saw "No docker trigger found for this container". -
CI: qlty retry on timeout — Changed
retry_onfromerrortoanyso qlty timeouts trigger retries. Increased timeout from 5 to 8 minutes. -
OIDC docs clarified
DD_PUBLIC_URLrequirement — OIDC documentation now explicitly marksDD_PUBLIC_URLas required and includes it in all provider example configurations (Authelia, Auth0, Authentik, Dex). Without this variable, the OIDC provider fails to register at startup. -
Compose trigger docs updated for Engine API — Removed stale references to
docker compose config --quietCLI validation anddocker compose pull/upcommands. Docs now reflect in-process YAML validation and Docker Engine API runtime. Added callout that Docker Compose CLI is not required. -
Container actions docs updated for compose triggers — Update action documentation now mentions both Docker and Docker Compose trigger support.
-
Compose trigger rejects compose files mounted outside app directory — Removed overly strict working-directory boundary enforcement from
runComposeCommandthat rejected compose files bind-mounted outside/home/node/app, breaking documented mount patterns like/drydock/docker-compose.yml. Compose file paths are operator-configured and already validated during resolution. -
Compose trigger uses host paths instead of container paths — Docker label auto-detection (
com.docker.compose.project.config_files) now remaps host-side paths to container-internal paths using Drydock's own bind mount information. Previously, host paths like/mnt/volume1/docker/stacks/monitoring/compose.yamlwere used directly inside the container where they don't exist, causing "does not exist" errors even when the file was properly mounted. -
Compose trigger logs spurious warnings for unrelated containers — When multiple compose triggers are configured, each trigger now silently skips containers whose resolved compose files don't match the trigger's configured
FILEpath, eliminating noisy cross-stack "does not exist" warnings. -
Silent error on recheck failure — "Recheck for Updates" button now displays an error banner when the backend request fails instead of silently stopping the spinner with no feedback.
-
Silent error on env reveal failure — Environment variable reveal in the container detail panel now shows an inline error message when the API call fails instead of silently failing.
-
Security scans persist across navigation — Navigating away from the Security view no longer cancels in-flight batch scans. Module-scoped scan state survives unmount and the progress banner reappears on return.
-
SSE stale sweep timer on re-initialization — Stale client sweep interval now starts even when
init()is called after a hot reload, preventing leaked SSE connections. -
About modal documentation icon — Documentation link in the about modal now shows a book icon instead of the expand/maximize icon.
-
Log auto-fetch pauses in background tabs —
useAutoFetchLogsnow stops polling when the browser tab is hidden and automatically resumes when it becomes visible again. -
SBOM download DOM isolation — Isolated DOM element creation and
URL.createObjectURLreferences in the SBOM download composable, fixing potential memory leaks and test failures from uncleared object URLs. JSON serialization skipped when SBOM panel is hidden. -
Dashboard resource fetch error propagation — Dashboard API fetch errors are now propagated consistently to the UI error state instead of being silently swallowed.
-
Docker image "latest" tag restricted to stable releases — CI release workflow no longer tags prerelease versions as
latest, preventing unstable images from being pulled by default. -
Security table refreshes progressively during batch scan — Security view table updates incrementally as each container scan completes instead of waiting for the entire batch to finish.
-
Vulnerability data fetched from per-container endpoint — Security view now fetches vulnerability data from the correct per-container endpoint instead of a missing bulk endpoint.
-
OIDC callback session loss with cross-site IdPs — Session cookies now default to
SameSite=Laxfor auth compatibility, fixing callback flows that could fail underSameSite=Strict. AddedDD_SERVER_COOKIE_SAMESITE(strict|lax|none) for explicit control. (#52) -
Compose trigger handles unknown update kinds — Containers with
updateKind.kind === 'unknown'now triggerdocker compose pullinstead of silently skipping. (#91) -
Compose image patching uses structured YAML edits — Replaced regex/indent heuristics with YAML parser targeting only
services.<name>.image, preserving comments and formatting. -
Hub/DHI public registries preserved with legacy token envs — Public registry fallback no longer lost when a private token is configured. Fail-closed behavior remains for private registry auth and runtime token exchange failures.
-
GHCR retries anonymously on credential rejection — Public image checks continue when configured credentials are rejected by GHCR/LSCR.
-
Partial registry registration failures isolated —
Promise.allSettledprevents a single bad registry from taking down all registries including the public fallback. -
Auth-blocked remote watchers stay registered — Remote watchers that fail auth now show as degraded instead of crashing watcher init.
-
Docker event stream reconnects with exponential backoff — Watcher reconnects automatically (1s doubling to 30s max) instead of staying disconnected after Docker socket interruption.
-
SSE frames flushed immediately — Added
X-Accel-Buffering: noand explicitflush()to prevent nginx/traefik from buffering real-time events. -
Store flushed on graceful shutdown — Explicit
save()call on SIGTERM/SIGINT prevents data loss between autosave intervals. -
Digest value populated on registration and refresh — Digest-watch containers no longer show undefined digest in the UI.
-
Icon fallback for missing upstream — Icon proxy returns bundled Docker fallback instead of 404 when upstream providers return 403/404. Fixes registry port parsing in icon URLs.
-
Container groups route no longer shadowed —
/containers/groupsmounted before/containers/:idto prevent Express treating group requests as container ID lookups. -
Runtime env values redacted in API responses — Container environment variable values no longer exposed through the API.
-
Logger init failure produces structured stderr — Falls back to structured JSON on stderr instead of silent no-op when logger init fails.
-
Mobile sidebar closes on route change — Safety-net watcher ensures mobile menu closes on any navigation.
-
Security badge counts only scan vulnerabilities — No longer inflated by major version updates.
-
Trigger test failure shows parsed error message — Actionable error reason displayed below trigger card on test failure.
-
Viewport scrollbar eliminated — Fixed double-nested scroll contexts; long tags truncated with tooltips.
-
Self-hosted registries ignore port when matching — Registry matching now respects port numbers in self-hosted registry URLs, preventing mismatches between registries on different ports of the same host.
-
Socket proxy ECONNREFUSED with
:romount — Removed:roflag from Docker socket mount in all socket proxy compose examples. The read-only flag can prevent the proxy from connecting to the Docker daemon on some Linux kernels; the proxy's environment variable filtering (CONTAINERS=1,EVENTS=1, etc.) is the actual security boundary. Added health check anddepends_on: condition: service_healthyto all socket proxy examples for proper startup ordering. Added FAQ entry for troubleshooting ECONNREFUSED with socket proxies. -
Apprise trigger missing Content-Type header — Apprise notify requests now set explicit
Content-Type: application/jsonheader, fixing failures with Apprise servers that require it. -
Toggle switch contrast — Improved toggle thumb contrast across all themes for better visibility.
-
Empty env var values rejected during container validation — Joi schema on
details.env[].valueused.string().required()which implicitly disallows empty strings. Containers with empty environment variable values (e.g.FOO=) were silently skipped during watch cycles. Fixed with.allow(''). (#120) -
OIDC login broken by same-origin redirect check —
LoginView.vuerestricted OIDC redirects to same-origin URLs, but OIDC Identity Provider URLs are always cross-origin (Authentik, Keycloak, etc.). Removed the same-origin check, keeping only HTTP/HTTPS protocol validation. -
Blank white screen on plain HTTP deployments — Helmet.js defaults enabled HSTS and
upgrade-insecure-requestsCSP even when TLS was not configured, causing browsers to block sub-resource loads on plain HTTP. Now conditionally omitsupgrade-insecure-requestsand HSTS when TLS is off. Strict boolean check ontls.enabledprevents string coercion. (#120) -
Stale theme preferences after upgrade from v1.3 — Preferences migration
deepMergeoverwrote defaults with persisted values unconditionally, so invalid enum values (e.g. removeddrydocktheme family) survived migration and caused rendering failures. Addedsanitize()pass that strips invalid theme families, variants, font families, icon libraries, scales, radius presets, view modes, and table actions before merge. -
OIDC discovery fails on HTTP IdP URLs — openid-client v6 enforces HTTPS by default for all OIDC requests. Users running IdPs behind reverse proxies or on private networks with HTTP discovery URLs got "only requests to HTTPS are allowed" errors. Now passes
allowInsecureRequestswhen the discovery URL protocol ishttp:. -
Docker Compose trigger fails with EBUSY on bind-mounted stacks —
writeComposeFileAtomic()used a singlefs.rename()call that failed permanently when another process (e.g. Dockge) held the file or when Docker bind-mount overlay contention blocked the rename. Now retries up to 5 times with 200ms backoff, then falls back to a directwriteFileif rename remains blocked. (#84) -
Drydock container display name hardcoded — The Docker watcher hardcoded
drydockas the display name for drydock's own container instead of using the actual container name like every other container. -
Non-existent DD_OIDC_ALLOW_HTTP env var referenced in UI — The UI OIDC HTTP banner referenced a
DD_OIDC_ALLOW_HTTPenv var that does not exist — the backend auto-detectshttp://discovery URLs and passesallowInsecureRequestsautomatically. Removed the misleading reference. -
Load test and start scripts broken by standardized API responses —
jqqueries inrun-load-test.shandstart-drydock.shused raw array syntax instead of.data[]to match the new collection response pattern. -
Container status not reconciled on cron poll — Containers that changed state between Docker event stream updates (e.g. stopped externally) were not reconciled during periodic cron polls. Now reconciles container status on each poll cycle.
-
DD_AUTH_ANONYMOUS_CONFIRM env var alias rejected —
DD_AUTH_ANONYMOUS_CONFIRMwas not accepted as an alias for the canonicalDD_ANONYMOUS_AUTH_CONFIRMenv var, forcing users to use only the non-prefixed form. -
LSCR cross-host auth failure — LinuxServer Container Registry (lscr.io) token exchange failed because the auth flow required cross-host authentication via the ghcr.io token endpoint. Now allows cross-host auth for lscr.io.
-
iPad sidebar clipping — Used
dvh(dynamic viewport height) instead ofvhfor sidebar height to fix clipping on iPad and other mobile browsers where the toolbar reduces available viewport height. -
Mobile dashboard scroll clipping — Dashboard content was clipped on mobile viewports when scrolling, preventing users from reaching all content.
-
Lockout counter reset on failed login — Brute-force lockout counter could reset prematurely, and strategy IDs were not protected from enumeration. Fixed counter persistence and added strategy ID protection.
-
Stale vulnerability data on fetch error — Security view retained stale vulnerability data when a fetch error occurred instead of clearing it, showing outdated information.
-
Audit service missing limit parameter — Audit service requests did not always send the
limitquery parameter, causing inconsistent pagination behavior. -
Backup retention on failed updates — Backup entries are now pruned on the failure path, not just after successful updates, preventing indefinite accumulation of stale backups.
-
Backup pruning with undefined maxCount —
pruneOldBackups()no longer deletes all backups whenmaxCountisundefined(e.g. whenDD_BACKUPCOUNTis not configured). Now correctly no-ops on invalid or non-finite values. -
Auto-rollback audit fromVersion accuracy — Rollback audit entries now correctly record
fromVersionas the failing new image tag (viaupdateKind.remoteValue) instead of the pre-update old tag. -
HASS entity_picture URL broken after logo rename — MQTT HASS discovery payload referenced a renamed logo file (
drydock.pnginstead ofwhale-logo.png), causing missing entity pictures in Home Assistant. (#138) -
Watcher crashes on containers with empty names — Docker watcher's same-name deduplication filter threw errors when containers had empty or missing names. Now skips deduplication for unnamed containers.
-
Container names not reconciled after external recreate — Containers recreated externally (via Portainer or
docker compose up) retained stale names in the store until the next full poll cycle. Now reconciles container names immediately on detection. -
Nested icon prefixes fail proxy request — Icon proxy rejected icons with doubled prefixes like
mdi:mdi-docker. Now normalizes nested prefixes before proxying. -
Colon-separated icon prefixes rejected —
dd.display.iconlabels using colon separators (e.g.,sh:nextcloud) were rejected by the API validation pattern. Validation now accepts colon-prefixed icon identifiers. -
Bouncer-blocked state missing from container details — Container detail views didn't reflect bouncer-blocked status. Now correctly wires the blocked state into detail panel display.
Security
- Security API error sanitization — SBOM and scan error responses now return generic messages (
Error generating SBOM,Security scan failed) instead of leaking internal error details. Detailed errors logged server-side only. - Agent log query parameter validation — Agent log level and component query parameters are validated against an allowlist and safe-character pattern, returning 400 for invalid values.
- TLS key/cert paths stripped from config response — Server configuration API response no longer includes filesystem paths for TLS private key and certificate files.
- Type-safe store and auth modules — Settings, notification, and auth store modules upgraded from
anyto explicit typed interfaces, preventing implicit type coercion vulnerabilities. - Fail-closed auth enforcement across registries and triggers — Bearer token, OIDC, and credential flows use
failClosedAuthwith typedRequestOptions, rejecting requests when required credentials are missing. - Input validation hardened — Additional input validation and error redaction across auth, API, and configuration modules.
- Mutation-only JSON body parser — Express JSON body parsing restricted to mutation methods (POST/PUT/PATCH) only on both API and auth routers, reducing attack surface on read requests.
- CSRF Sec-Fetch-Site validation — CSRF middleware now rejects requests with
Sec-Fetch-Site: cross-siteheader, blocking cross-site state-changing requests even when the Origin header is absent. - HTTPS enforcement for SameSite=none cookies —
DD_SERVER_COOKIE_SAMESITE=nonenow requires HTTPS configuration (DD_SERVER_TLS_ENABLED=trueorDD_SERVER_TRUSTPROXY) and throws at startup if neither is set. - Remember-me endpoint requires authentication —
/auth/rememberPOST moved afterrequireAuthenticationmiddleware, preventing unauthenticated access. - Env reveal rate limit tightened —
/api/containers/:id/envrate limit reduced from 100/min to 10/min to prevent credential enumeration. Server error responses return generic messages instead of internal details. - Trivy command path validation — Trivy binary paths are validated against shell metacharacters and path traversal before execution.
- Digest scan cache LRU eviction — Scan result cache uses LRU eviction (max 500 entries, configurable via
DD_SECURITY_SCAN_DIGEST_CACHE_MAX_ENTRIES) to prevent unbounded memory growth. Trivy DB status lookups are deduplicated across concurrent calls. - CSP configured for Iconify CDN — Content-Security-Policy updated to allow
connect-srcfor the Iconify CDN origin, preventing blocked icon fetches in the browser. - CSP connect-src restricted in internetless mode — Content-Security-Policy
connect-srcdirective tightened to'self'when running in internetless mode, blocking outbound connections from the browser. - Legacy auth methods endpoint rate-limited —
/api/auth/methodsrate-limited to prevent enumeration of available authentication providers. - Removed plaintext credentials from login request body — The Basic auth login was redundantly sending username and password in both the Authorization header and the JSON body. The backend only reads the Authorization header via Passport, so the body credentials were unnecessary exposure.
- Server-issued SSE client identity — Self-update ack requests validated against server-issued tokens, preventing spoofed acknowledgments.
- Fail-closed auth across watchers, registries, and triggers — Token exchange failures no longer fall through to anonymous access.
- Runtime env values redacted — Container environment variable values stripped from API responses to prevent credential leakage.
- OIDC authorization redirect URL validation — Added allowlist-based validation for OIDC authorization redirect URLs, preventing open redirect attacks through crafted callback parameters.
- Auth, registry token, and log sanitization hardening — Consolidated security pass hardening authentication flows, registry token validation, and log output sanitization.
- Command trigger shell execution warning — Command trigger now logs a one-time security warning on first execution, reminding operators that commands run with drydock process privileges.
- Login brute-force lockout — Per-account and per-IP lockout after configurable failed login attempts (
DD_AUTH_ACCOUNT_LOCKOUT_MAX_ATTEMPTS,DD_AUTH_IP_LOCKOUT_MAX_ATTEMPTS) with configurable window and duration. - Concurrent session limits — Maximum authenticated sessions per user (default 5, configurable via
DD_SERVER_SESSION_MAXCONCURRENTSESSIONS). Oldest sessions are revoked first when the limit is reached. - Destructive action confirmation header — Dangerous operations (delete container, restore backup, delete all containers) now require an
X-DD-Confirm-Actionheader, returning 428 when missing. - Native argon2id password hashing — Replaced abandoned
passpackage withnode:cryptoargon2Sync for Basic auth. OWASP-aligned parameters with timing-safe comparison. Legacy{SHA}hashes accepted with deprecation warnings. - Full credential redaction —
Component.mask()now returns[REDACTED]instead of leaking prefix/suffix characters in logs and API responses. - Trigger infrastructure config redaction — Webhook URLs, hostnames, channels, and usernames are redacted from trigger configuration in API responses.
- Website SRI integrity hashes — Post-build script injects subresource integrity hashes for static assets on the documentation website.
- Fail-closed webhook token enforcement — Per-endpoint webhook tokens now fail closed when a token is configured but the request provides no token or a mismatched token, preventing bypass through missing headers.
- API error message sanitization — API routes no longer expose raw Joi validation or exception messages to clients. New
sanitizeApiError()helper returns generic messages while logging real details server-side. - Trigger request body schema validation —
POST /api/triggers/:type/:nameand remote trigger endpoints now validate request bodies with Joi (requireidstring, reject type coercion viaconvert: false). - HTTP trigger auth schema enforcement at startup — HTTP trigger Joi schema now conditionally requires
user+passwordfor BASIC auth andbearerfor BEARER auth at registration time, catching misconfigurations before first trigger execution. - CORS implicit wildcard origin deprecation warning — Startup warning when
DD_SERVER_CORS_ENABLED=truewithout explicitDD_SERVER_CORS_ORIGIN. Default wildcard will require explicit opt-in in v1.5.0. - Identity-aware rate limit keying — Opt-in
DD_SERVER_RATELIMIT_IDENTITYKEYING=truekeys authenticated route rate limits by session/username instead of IP, preventing collisions for multiple users behind shared proxies. Unauthenticated routes remain IP-keyed. Disabled by default. - Reactive server feature flags in UI — Container action buttons (update, rollback, scan, triggers) are now gated by server-side feature flags via a
useServerFeaturescomposable. When features likeDD_SERVER_FEATURE_CONTAINERACTIONSare disabled, buttons show a disabled state with tooltip explaining why instead of silently failing at runtime. - Compose trigger hardening — Auto compose file detection from container labels (
com.docker.compose.project.config_files) with Docker inspect fallback, pre-commitdocker compose config --quietvalidation before writes, compose file reconciliation (warn/block modes for runtime vs compose image drift), optional digest pinning (DIGESTPINNINGtrigger config), compose-file-once batch mode for multi-service stacks, multi-file compose chain awareness with deterministic writable target selection, compose metadata in update preview API, and compose file path display in container detail UI. - Unsupported hash formats fail closed — Basic auth now rejects unsupported hash formats instead of falling through to plaintext comparison, preventing accidental plaintext password acceptance.
Performance
- Production source maps disabled — UI production builds now exclude source maps, reducing bundle size and improving deployment efficiency.
- Audit store indexed date-range queries — Audit entries now store a pre-parsed
timestampMsindex for numeric comparisons. Date-range queries use the LokiJS chain API with indexed filtering instead of full-collection scans. Automatic 30-day retention with periodic pruning. - Backup store indexed lookups — Backup collection adds indices on
data.containerNameanddata.id, usingfindOne()for single-document lookups and indexedfind()for name-filtered queries instead of full scans. - LokiJS autosave interval set to 60 seconds — Fixed autosave interval at 60s instead of the LokiJS default, reducing disk I/O while maintaining acceptable data durability.
- SSE shared heartbeat interval — Deduplicated per-client SSE heartbeat timers into a single shared interval that starts on first connection and stops when all clients disconnect.
- LoginView exponential backoff — Login page connectivity retry uses exponential backoff (5s doubling to 30s max) instead of fixed intervals, reducing server load during outages.
- Gzip response compression — API responses compressed above configurable threshold with automatic SSE exclusion.
- Skip connectivity polling when SSE connection is active — Eliminates unnecessary
/auth/userfetches every 10s during normal operation. - Set-based lookups replace linear scans — Repeated array lookups converted to Set operations in core paths.
- Vite chunk splitting — Production build now splits vendor code into
framework,icons, andvendorchunks for better browser cache efficiency across deployments. - Session index cache with atomic login locks — Auth session lookups use an indexed cache for O(1) access. Login operations use atomic locks to prevent race conditions during concurrent authentication attempts.
- Proactive store cache eviction — LokiJS store proactively evicts stale cache entries before insertion, reducing memory pressure during high-throughput container watch cycles.
- Async secret file loading — Secret file loading (
DD_*__FILEenv vars) usesfs/promisesfor non-blocking reads during startup configuration, improving initialization time with many secret files.
Dependencies
- cron-parser v2 to v5 — Upgraded
cron-parserfrom v2 to v5 (CronExpressionParserAPI). Note:joi-cron-expressionstill uses cron-parser v2 internally as its own dependency. - Removed
passpackage — Replaced abandonedpasspassword hashing with nativenode:crypto(covered under Security below). - Trivy upgraded to 0.69.3 — Bumped Trivy version in qlty configuration for latest vulnerability database and scanner improvements.
Deprecated
- SHA-1 basic auth password hashes — Legacy
{SHA}<base64>password hashes are accepted with deprecation warnings. SHA-1 support will be removed in v1.6.0. Migrate to argon2id hashing.
1.3.9 — 2026-02-22
Fixed
- Release signing broken by cosign v3 API change —
cosign sign-blobv3 silently ignores--output-signatureand--output-certificatein keyless OIDC mode, producing an empty.sigfile that fails upload. Release workflow now extracts signature and certificate from the cosign.bundleJSON as a fallback, handling both old (base64Signature/cert) and new (messageSignature.signature/verificationMaterial.certificate.rawBytes) bundle formats. - Shellcheck SC2086 in release signing step — Unquoted
${TAGS}expansion in container image signing replaced withread-loop into array to eliminate word-splitting/globbing risk.
Changed
- CI and lefthook now run identical lint checks — CI lint job previously ran
qlty check --filter biome(1 plugin) while lefthook ranqlty check(17 plugins). Both now runqlty check --allfrom the repo root, ensuring local pre-push catches exactly what CI catches. - Pre-commit hook auto-fixes lint issues —
qlty check --fixruns on staged files at commit time, followed by a verify step. Lint drift no longer accumulates until push time. - Lefthook pre-push is sequential fail-fast — Switched from
piped: false(parallel) topiped: truewith priority ordering so failures surface immediately with clear output.
1.3.8 — 2026-02-22
Fixed
- Docker Compose trigger silently no-ops for
updateKind: unknown— When the update model classifies a change asunknown(e.g. created-date-only updates, unrecognized tag formats),getNewImageFullNameresolved the update image identically to the current image, causing both compose-update and runtime-update filters to return empty arrays and log "All containers already up to date". The runtime-update filter now also triggers whencontainer.updateAvailable === true, ensuring containers with confirmed updates are recreated regardless ofupdateKindclassification. Compose file rewrites remain gated on explicit tag deltas. (#91) - Digest watch masks tag updates, pulling old image — When digest watch was enabled on a container with both a tag change and a digest change (e.g.
v2.59.0-s6→v2.60.0-s6), the update model gave digest unconditional priority, returningkind: 'digest'instead ofkind: 'tag'. The trigger then resolved the image to the current tag (correct for digest-only updates) instead of the new tag, pulling the old image. Tag updates now take priority over digest when both are present. This bug was inherited from the upstream project (WUD). (#91) - Database not persisted on container shutdown — LokiJS relies on its autosave interval to flush data to disk, but the graceful shutdown handler called
process.exit()before the next autosave tick could fire, causing any in-memory changes since the last autosave to be lost. This manifested as stale version numbers, lost update policies, and missing audit log entries after restarting the drydock container. Now explicitly saves the database during shutdown before exiting. This bug was inherited from the upstream project (WUD) but made deterministic by our graceful shutdown changes. (#96)
1.3.7 — 2026-02-21
Fixed
- Tag regex OOM crash with re2-wasm — Replaced
re2-wasmwithre2js(pure JavaScript RE2 port). The WASM binary had a hard 16 MB memory ceiling with no growth allowed, causingabort()crashes on valid regex patterns like^v(\d+\.\d+\.\d+)-ls\d+$. Sincere2-wasmis abandoned (last npm publish Sep 2021) with no path to a fix,re2jsprovides the same linear-time ReDoS protection without WASM memory limits or native compilation requirements. (#89) - Self-signed/private CA support for self-hosted registries — Added optional
CAFILEandINSECURETLS options for self-hosted registry providers (Custom, Gitea, Forgejo, Harbor, Artifactory, Nexus). This allows private registries with internal or self-signed certificates to pass TLS validation via a mounted CA bundle, or to explicitly disable verification for trusted internal networks. (#88) - Docker Compose trigger silently no-ops on digest updates — Digest-only updates (same tag, new image hash) were filtered out entirely because the compose image string didn't change, causing the trigger to report success without recreating the container. Now digest updates skip the compose file write (correct — tag hasn't changed) but still trigger container recreation to pull the new image. (#91)
Changed
- Gitea refactored to shared base class — Gitea now extends
SelfHostedBasicdirectly instead of duplicating its logic fromCustom, reducing code and ensuring consistent behavior with Harbor, Nexus, and Artifactory. - Lint tooling migrated from biome CLI to qlty — Removed
@biomejs/biomeas a direct devDependency from all workspaces; biome is now managed centrally via qlty. Lint and format scripts updated to useqlty check/qlty fmt. - Dependabot replaced with Renovate — Switched dependency update bot for better monorepo grouping, auto-merge of patch updates, and pinned GitHub Actions digests.
- Socket Firewall switched to free mode — The CI supply chain scan now uses
firewall-free(blocks known malware, no token required) instead offirewall-enterprise. - CI pipeline improvements — Added npm and Docker layer caching, parallelized e2e/load-test jobs, reordered job dependencies for faster feedback, added harden-runner to all workflow jobs.
- CI credential hardening — Bumped
harden-runnerv2.11.1 → v2.14.2 (fixes GHSA-cpmj-h4f6-r6pq) and addedpersist-credentials: falseto allactions/checkoutsteps across all workflows to prevent credential leakage through artifacts. - Zizmor added to local pre-push checks — GitHub Actions security linter now runs via qlty alongside biome, catching workflow misconfigurations before push.
- Lefthook pre-push runs piped — Commands now run sequentially with fail-fast instead of parallel, so failures surface immediately instead of hanging while other commands complete.
1.3.6 — 2026-02-20
Fixed
- GHCR anonymous auth returns 401 on public repos — The v1.3.3 fix for anonymous bearer tokens (
Og==) removed the auth header entirely, but GHCR requires a token exchange even for unauthenticated pulls. Replaced direct bearer auth with proper token exchange viahttps://ghcr.io/token, matching the Hub/Quay pattern. Authenticated requests add Basic credentials to the token request; anonymous requests omit them. LSCR inherits the fix automatically. (#85, #86)
1.3.5 — 2026-02-19
Fixed
- Container exits immediately when socket GID has no named group —
Docker.entrypoint.shtreatedgetent group <gid>failures as fatal underset -e -o pipefail, so mounts where/var/run/docker.sockhad a numeric GID not present in/etc/groupcaused an immediate exit (status=exited,exit=2) before app startup. The group lookup is now tolerant and falls back to creating a matching group as intended. (#82) - Log pretty-printing no longer depends on shell pipes — Moved human-readable formatting from the entrypoint pipeline (
node | pino-pretty) into the app logger configuration. This preserves properexec/signal behavior undertiniwhile keepingDD_LOG_FORMAT=jsonsupport.
1.3.4 — 2026-02-19
Fixed
- Backup lookup broken after container update — Backups were keyed by Docker container ID, which changes on every recreate (e.g. after an update). Switched all backup queries to use the stable container name, so backups are always found regardless of container ID changes. (#79)
- Image prune deletes backup image —
cleanupOldImagesremoved the previous image tag after updates, making rollback impossible. Now checks retained backup tags before pruning and skips images that are needed for rollback. - Auto-rollback monitor uses stale container ID — After an update recreates the container,
maybeStartAutoRollbackMonitorpassed the old (now-deleted) container ID to the health monitor. Now looks up the new container by name and passes the correct ID. - Backup stores internal registry name instead of Docker-pullable name — Backup
imageNamewas stored as the internal registry-prefixed name (e.g.hub.public/library/nginx) which is not a valid Docker image reference. Rollback would fail with DNS lookup errors. Now stores the Docker-pullable base name (e.g.nginx) using the registry'sgetImageFullNamemethod. - Rollback API docs incorrect endpoint — Fixed documentation showing
/api/backup/:id/rollbackinstead of the correct/api/containers/:id/rollback.
1.3.3 — 2026-02-18
Fixed
- Self-update leaves container stopped — When drydock updated its own container, stopping the old container killed the Node process before the new one could be created, leaving the UI stuck on "Restarting..." indefinitely. Now uses a helper container pattern: renames old container, creates new container, then spawns a short-lived helper that curls the Docker socket to stop old → start new → remove old. (#76)
- Stale digest after container updates — After a container was updated (new image pulled, container recreated), the next watch cycle still showed the old digest because the early-return path in
addImageDetailsToContainerskipped re-inspecting the Docker image. Now re-inspects the local image on each watch cycle to refresh digest, image ID, and created date. (#76) - express-rate-limit IPv6 key generation warning — Removed custom
keyGeneratorfrom the container scan rate-limiter that bypassed built-in IPv6 normalization, causingERR_ERL_KEY_GEN_IPV6validation errors. - express-rate-limit X-Forwarded-For warning — Added
validate: { xForwardedForHeader: false }to all 6 rate-limiters to suppress noisyERR_ERL_UNEXPECTED_X_FORWARDED_FORwarnings when running withouttrust proxy(e.g. direct Docker port mapping). - Quay auth token extraction broken — Fixed
authenticate()readingresponse.tokeninstead ofresponse.data.token, causing authenticated pulls to silently run unauthenticated. Also affects Trueforge via inheritance. - GHCR anonymous bearer token — Fixed anonymous configurations sending
Authorization: Bearer Og==(base64 of:) instead of no auth header, which could break public image access. - Created-date-only updates crash trigger execution — Fixed
getNewImageFullName()crashing on.includes()ofundefinedwhen a container had only a created-date change (no tag change). Now rejectsunknownupdate kind in threshold logic. - Compose write failure allows container updates — Fixed
writeComposeFile()swallowing errors, allowingprocessComposeFile()to proceed with container updates even when the file write failed, causing runtime/file state desynchronization. - Self-update fallback removes running old container — Fixed helper script running
removeOldafter the fallback path (startOld), which would delete the running old container. Now only removes old after successful new container start. - Registry calls have no timeout — Added 30-second timeout to all registry API calls via Axios. Previously a hung registry could stall the entire watch cycle indefinitely.
- HTTP trigger providers have no timeout — Added 30-second timeout to all outbound HTTP trigger calls (Http, Apprise, Discord, Teams, Telegram). Previously a slow upstream could block trigger execution indefinitely.
- Kafka producer connection leak — Fixed producer connections never being disconnected after send, leaking TCP connections to the broker over time. Now wraps send in try/finally with disconnect.
- Rollback timer labels not validated — Invalid
dd.rollback.windowordd.rollback.intervallabel values (NaN, negative, zero) could causesetIntervalto fire continuously. Now validates withNumber.isFinite()and falls back to defaults. - Health monitor overlapping async checks — Added in-flight guard to prevent overlapping health checks from triggering duplicate rollback executions when inspections take longer than the poll interval.
- Anonymous login double navigation guard — Fixed
beforeRouteEntercallingnext()twice when anonymous auth was enabled, causing Vue Router errors and nondeterministic redirects. - Container API response not validated — Fixed
getAllContainers()not checkingresponse.okbefore parsing, allowing error payloads to be treated as container arrays and crash computed properties.
Security
- fast-xml-parser DoS via entity expansion — Override
fast-xml-parser5.3.4→5.3.6 to fix CVE GHSA-jmr7-xgp7-cmfj (transitive dep via@aws-sdk/client-ecr, upstream hasn't released a fix yet). - tar arbitrary file read/write — Removed
tarfrom dependency graph entirely by replacing nativere2(which pulled innode-gyp→tar) withre2-wasm(v1.3.3), later replaced byre2js(v1.3.7) due to WASM memory limits. Previously affected by CVE GHSA-83g3-92jg-28cx. - Unauthenticated SSE endpoint — Moved
/api/events/uibehindrequireAuthenticationmiddleware and added per-IP connection limits (max 10) to prevent connection exhaustion. - Session cookie missing sameSite — Set
sameSite: 'strict'on session cookie to mitigate CSRF attacks. - Predictable session secret — Added
DD_SESSION_SECRETenvironment variable override so deployments can provide proper entropy instead of the default deterministic UUIDv5. - Global error handler leaks internal details — Replaced
err.messagewith generic'Internal server error'in the global error handler to prevent leaking hostnames, paths, and Docker socket info to unauthenticated callers. - Entrypoint masks crash exit codes — Enabled
pipefailinDocker.entrypoint.shsonode | pino-prettycorrectly propagates non-zero exit codes for restart policies.
1.3.2 — 2026-02-16
Added
- Log viewer auto-fetch polling — Configurable auto-fetch interval (Off / 2s / 5s / 10s / 30s) for both application and container log viewers, replacing manual-only refresh. Defaults to 5 seconds for a near-real-time tail experience. (#57)
- Log viewer scroll lock — Scrolling away from the bottom pauses auto-scroll, showing a "Scroll locked" indicator and "Resume" button. New log data continues to load in the background without yanking the user's scroll position. (#57)
- Log viewer auto-scroll — New log entries automatically scroll the view to the bottom when the user is near the end, providing a tail-like experience. (#57)
- Shared log viewer composable — Extracted
useLogViewerBehaviorcomposable withuseLogViewport(scroll management) anduseAutoFetchLogs(interval timer lifecycle) to eliminate duplication between application and container log views. - 7 new registry providers — Added OCIR (Oracle Cloud), IBMCR (IBM Cloud), ALICR (Alibaba Cloud), GAR (Google Artifact Registry), Harbor, JFrog Artifactory, and Sonatype Nexus. Includes a shared
SelfHostedBasicbase class for self-hosted registries with basic auth. - 4 new trigger providers — Added Mattermost, Microsoft Teams (Adaptive Cards), Matrix, and Google Chat notification triggers.
Fixed
- v1 manifest digest watch using image ID instead of repo digest — Fixed
handleDigestWatch()incorrectly readingConfig.Image(the local image ID) as the digest for v1 manifest images, causing perpetual false "update available" notifications. Now uses the repo digest fromRepoDigestsinstead. (getwud/wud#934) - Discord trigger broken after request→axios migration — Fixed
sendMessage()usingrequest-style properties (uri,body) instead of axios properties (url,data), causing "Invalid URL" errors on all Discord webhook calls. (getwud/wud#933)
1.3.1 — 2026-02-15
Fixed
- Release SBOM generation for multi-arch images — Replaced
anchore/sbom-action(which fails on manifest list digests from multi-platform builds) with Docker buildx native SBOM generation (sbom: true), producing per-platform SBOMs embedded in image attestations.
Security
- Pin Trivy install script by commit hash — Replaced mutable
mainbranch reference in Dockerfilecurl | shwith a pinned commit SHA to satisfy OpenSSF Scorecard pinned-dependencies check and prevent supply-chain risk from upstream changes.
1.3.0 — 2026-02-15
Fixed
- OIDC session resilience for WUD migrations — Corrupt or incompatible session data (e.g. from WUD's connect-loki store) no longer causes 500 errors. Sessions that fail to reload are automatically regenerated. All OIDC error responses now return JSON instead of plain text, preventing frontend parse errors. Added a global Express error handler to ensure unhandled exceptions return JSON.
- Disabled X-Powered-By header — Removed the default Express
X-Powered-Byheader from both the main API and agent API servers to reduce information exposure. - Trivy scan queue — Serialized concurrent Trivy invocations to prevent
"cache may be in use by another process"errors when multiple containers are scanned simultaneously (batch triggers, on-demand scans, SBOM generation). - Login error on wrong password —
loginBasic()attempted to parse the response body as JSON even on 401 failures, causingUnexpected token 'U', "Unauthorized" is not valid JSONerrors instead of the friendly "Username or password error" message. - Snackbar notification colors ignoring level — The SnackBar component had a hardcoded
color="primary"instead of binding to thelevelprop, causing error and warning notifications to display as blue instead of red/amber. - SBOM format key mismatch — Fixed container model schema validating SBOM formats against
cyclonedxinstead of the correctcyclonedx-jsonkey.
Added
- Snyk vulnerability monitoring — Integrated Snyk for continuous dependency scanning of
app/package.jsonandui/package.json. Added Snyk badge to README withtargetFileparameter for monorepo support. - Update Bouncer (Trivy safe-pull gate) — Added pre-update vulnerability scanning for Docker-triggered updates. Candidate images are scanned before pull/restart, updates are blocked when vulnerabilities match configured blocking severities, and latest scan data is persisted on
container.security.scan. AddedGET /api/containers/:id/vulnerabilitiesendpoint for retrieving scan results. - Update Bouncer signature verification (cosign) — Added optional pre-update image signature verification. When enabled, Docker-triggered updates are blocked if candidate image signatures are missing/invalid or verification fails.
- Update Bouncer SBOM generation — Added Trivy SBOM generation (
spdx-json,cyclonedx-json) for candidate images with persistence incontainer.security.sbomand a newGET /api/containers/:id/sbomAPI endpoint (withformatquery support). - Container card security status chip — Added a vulnerability chip on container cards showing Update Bouncer scan status (
safe,blocked,scan error) with severity summary tooltip data fromcontainer.security.scan. - On-demand security scan — Added
POST /api/containers/:id/scanendpoint for triggering vulnerability scan, signature verification, and SBOM generation on demand. Broadcastsdd:scan-startedanddd:scan-completedSSE events for real-time UI feedback. Added shield button to container card actions and mobile overflow menu. - Direct container update from UI — Added
POST /api/containers/:id/updateendpoint that triggers a Docker update directly without requiring trigger configuration. The "Update now" button in the UI now calls this single endpoint instead of looping through configured triggers. - Trivy and cosign in official image — The official drydock image now includes both
trivyandcosignbinaries, removing the need for custom images in local CLI mode.
Changed
- README badge layout — Added line breaks to badge rows for a cleaner two-line layout across all three badge sections.
- Grafana dashboard overhaul — Updated overview dashboard with standard datasource naming (
DS_PROMETHEUS), added bar chart and pie chart panels, and restructured panel layout for better monitoring coverage. - Mobile responsive dashboard — Stat cards now stack full-width on small screens with tighter vertical spacing for a cleaner mobile layout.
- Self-update overlay rendering — Switched logo images from
v-iftov-showto avoid re-mount flicker during self-update phase transitions. - Container sort simplification — Simplified null-group sorting in ContainersView using sentinel value instead of multi-branch conditionals.
- Test coverage improvements — Expanded app test coverage for API routes (backup, container-actions, preview, webhook), OIDC authentication, registry component resolution, tag parsing, and log sanitization. Expanded UI test coverage across 38 spec files with improved Vuetify stub fidelity (v-tooltip activator slot, v-list-item slots, app-bar-nav-icon events).
- Vitest coverage config — Narrowed coverage to
.js/.tsfiles only (excluding.vueSFCs) to avoid non-actionable template branch noise. - Prometheus counter deduplication — Extracted shared
createCounterfactory inapp/prometheus/counter-factory.ts, reducing boilerplate across audit, webhook, trigger, and container-actions counter modules. - API error handler deduplication — Extracted shared
handleContainerActionErrorhelper inapp/api/helpers.ts, consolidating duplicate catch-block logic across backup, preview, and container-actions routes. - Lint and code quality fixes — Fixed biome
noPrototypeBuiltinswarning in OIDC tests, addedidattributes to README HTML headings to resolve markdownlint MD051, and tuned qlty smell thresholds.
Security
- CodeQL alert fixes — Fixed log injection vulnerabilities by sanitizing user-controlled input before logging. Removed unused variables flagged by static analysis. Added rate limiting to the on-demand scan endpoint.
- Build provenance and SBOM attestations — Added supply chain attestations to release workflow for verifiable build provenance.
1.2.0
Added
- Grafana dashboard template — Importable Grafana JSON dashboard with panels for overview stats, watcher activity, trigger execution, registry response times, and audit entries. Uses datasource templating for portable Prometheus configuration.
- Audit log backend —
AuditEntrymodel, LokiJS-backed store with pagination and pruning,GET /api/auditendpoint with filtering,dd_audit_entries_totalPrometheus counter, and automatic logging of container lifecycle events (update-available, update-applied, update-failed, rollback, preview, container-added, container-removed). - Font Awesome 6 migration — Replaced all Material Design Icons (
mdi-*) with Font Awesome 6 equivalents. Configured Vuetify FA icon set, updated all service icon getters, component templates, and 54 test files. - Dry-run preview API —
POST /api/containers/:id/previewreturns what an update would do (current/new image, update kind, running state, networks) without performing it. - Pre-update image backup and rollback — LokiJS-backed backup store records container image state before each Docker trigger update.
GET /api/backups,GET /api/:id/backups, andPOST /api/:id/rollbackendpoints. Configurable retention viaDD_TRIGGER_DOCKER_{name}_BACKUP_COUNT(default 3). - Frontend wiring — Preview dialog with loading/error/success states wired to dry-run API. Full audit log table with filtering, pagination, and responsive column hiding replacing the MonitoringHistory placeholder. Recent Activity dashboard card showing latest 5 audit entries.
- Container action bar refactor — Replaced 3-column text button layout with compact icon-button toolbar and tooltips (desktop) or overflow menu (mobile).
- Dashboard second row — Added Recent Activity and stats cards as a second row on the dashboard.
- UI modernization — Consistent
pa-4padding, outlined/rounded cards, tonal chips, styled empty states, and Font Awesome icons across all views and components. - Container actions (start/stop/restart) — New API endpoints and UI buttons to start, stop, and restart Docker containers directly from the dashboard. Gated by
DD_SERVER_FEATURE_CONTAINERACTIONS(default: enabled). Includes audit logging, Prometheus counter (dd_container_actions_total), desktop toolbar buttons with disabled-state awareness, and mobile overflow menu integration. - Webhook API for on-demand triggers — Token-authenticated HTTP endpoints (
POST /api/webhook/watch,/watch/:name,/update/:name) for CI/CD integration. Gated byDD_SERVER_WEBHOOK_ENABLEDandDD_SERVER_WEBHOOK_TOKEN. Includes rate limiting (30 req/15min), audit logging, Prometheus counter (dd_webhook_total), and a configuration info panel on the Server settings page. - Container grouping / stack views — New
GET /api/containers/groupsendpoint returns containers grouped by stack. Supports explicit group assignment viadd.group/wud.grouplabels with automatic fallback tocom.docker.compose.project. CollapsibleContainerGroupcomponent with group header showing name, container count, and update badges. "Smart group" filter option for automatic stack detection (dd.group>wud.group> compose project). "Update all in group" action to batch-update all containers in a group. - Graceful self-update UI — Self-update detection when drydock updates its own container. Server-Sent Events (SSE) endpoint at
/api/events/uifor real-time browser push. Full-screen DVD-style bouncing whale logo overlay during self-updates with smooth phase transitions (updating, restarting, reconnecting, ready). Automatic health polling and page reload after restart. - Lifecycle hooks (pre/post-update commands) — Execute shell commands before and after container updates via
dd.hook.preanddd.hook.postlabels. Pre-hook failures abort the update by default (dd.hook.pre.abort=true). Configurable timeout viadd.hook.timeout(default 60s). Environment variables exposed:DD_CONTAINER_NAME,DD_IMAGE_NAME,DD_TAG_OLD,DD_TAG_NEW, etc. Includes audit logging for hook success/failure and UI display in ContainerDetail panel. - Automatic rollback on health check failure — Monitors container health after updates and automatically rolls back to the previous image if the container becomes unhealthy. Configured via
dd.rollback.auto=true,dd.rollback.window(default 300s), anddd.rollback.interval(default 10s). Requires Docker HEALTHCHECK on the container. Uses existing backup store for rollback images. Includes audit logging and UI display in ContainerDetail panel. - selfhst/icons as primary icon CDN — Switched to selfhst/icons as the primary icon CDN with homarr-labs as fallback, improving icon availability and coverage.
Fixed
- Navigation drawer not visible — Used computed model for permanent/temporary modes; passing
model-value=undefinedcaused Vuetify to treat the drawer as closed. - Dark theme missing colors — Added
info,success, andwarningcolor definitions to the dark theme. - ContainerPreview updateKind display — Fixed structured
updateKindobject rendering with semver-diff color coding. - Invalid
text-body-3CSS class — Replaced with validtext-body-2in ConfigurationItem and TriggerDetail. - 404 catch-all route — Added catch-all redirect to home for unknown routes.
- False downgrade suggestion for multi-segment tags — Fixed semver parsing/comparison for numeric tags like
25.04.2.1.1so newer major tags are no longer suggested as downgrades. (#47) - Configured path hardening for filesystem reads — Added validated path resolution helpers and applied them to store paths, watcher TLS files, and MQTT TLS files before filesystem access.
Changed
- Audit event wiring — Wired audit log entries and Prometheus counter increments for rollback, preview, container-added, container-removed, update-applied, and update-failed events. Registered
ContainerUpdateFailedevent with try/catch in Docker trigger. - Test updates — 20+ test files updated for v1.2.0 icon changes, CSS selectors, HomeView data model, theme toggle relocation, and audit module wiring. Removed obsolete specs.
- Updated doc icon examples — Switched icon examples to prefer
hl:andsi:prefixes over deprecatedmdi:. - Code quality tooling consolidation — Replaced Codacy + SonarCloud with Qlty + Snyk. Rewrote
lefthook.ymlpre-push hooks to runqlty check,snyk test,snyk code test(informational), builds, and tests. Addedscripts/snyk-code-gate.shwrapper. - Biome formatting — Applied
biome formatacross entire codebase for consistent code style. - README badges — Replaced Codacy/SonarCloud badges with CI status, Qlty maintainability, and Snyk badges.
- ConfigurationItem redesign — Icon moved to the left with name as prominent text and type as subtitle, replacing the old badge/chip pattern across all configuration pages.
- TriggerDetail redesign — Same modern layout treatment as ConfigurationItem (icon left, name prominent, type subtitle).
- Registry page brand colors — Added brand-colored icon backgrounds for each registry provider (Docker blue, GitHub purple, AWS orange, Google blue, etc.) via
getRegistryProviderColor()helper and newiconColorprop on ConfigurationItem. - Consistent card styling — Unified
variant="outlined" rounded="lg"across ContainerItem, ContainerGroup, ContainerTrigger, and WebhookInfo cards for a cohesive look. - Home page severity badges removed — Removed redundant MAJOR/MINOR severity badges from the container updates list; version chip color already indicates severity.
- History page filter bar — Removed redundant "Update History" heading (already in app bar) and added a collapsible filter bar with active filter chips.
- Logs page spacing — Fixed spacing between the config item and logs card.
- Self-update overlay responsive — Mobile-responsive self-update overlay uses static top-center positioning with fade-in animation on small screens instead of DVD bounce.
- QA compose enhancements — Added HTTP trigger, basic auth, and webhook configuration to
test/qa-compose.ymlfor integration testing. - Login page redesign — Redesigned login page with new font, icon colors, and layout polish.
- Docker Hub and Quay.io multi-registry publishing — Container images now published to Docker Hub and Quay.io alongside GHCR for broader registry availability.
- Mobile responsive dashboard — Per-type colored update badges (major=red, minor=warning, patch=success, digest=info) and icon-only tabs on mobile viewports.
- Dark mode app bar logo inversion — App bar logo now inverts correctly in dark mode for improved visibility.
- History page mobile improvements — Shorter timestamps, hidden status column, and truncated container names on mobile viewports.
- Container filter mobile labels — Short labels ("Updates", "Time") on mobile breakpoint for compact filter display.
- Biome and Qlty config alignment — Aligned Biome and Qlty configurations for consistent code quality enforcement.
Security
- RE2 regex engine — Replaced native
RegExpwith Google's RE2 (re2npm package) for all user-supplied regex patterns (includeTags, excludeTags, transformTags). RE2 uses a linear-time matching algorithm that is inherently immune to ReDoS catastrophic backtracking. - Docs dependency vulnerability fixes — Fixed 9 CVEs in docs/ transitive dependencies via npm overrides (dompurify 2→3, marked 1→4, got 9→11).
Removed
- Dead code removal — Deleted unused
AppFooterandConfigurationStateViewcomponents, dead computed props (filteredUpdates,upToDateCount), duplicateisTriggeringreset, deadmdi:prefix replacement in IconRenderer, deadcontainer-deletedlistener, and Maintenance Windows placeholder. - Removed
@mdi/fontdependency — Dropped unused Material Design Icons package. - Removed Codacy and SonarCloud — Replaced with Qlty (local code quality) and Snyk (dependency + SAST scanning) for a unified local-first quality gate.
- Removed stale tracking docs — Deleted
SONARQUBE-ISSUES.md,docs/sonar-smells-tracking.md, anddocs/codacy-high-findings-tracking.md.
Documentation
- Popular imgset presets — Added a curated preset guide at
docs/configuration/watchers/popular-imgsets.mdand linked it from watcher docs.
1.1.3
Fixed
- ERR_ERL_PERMISSIVE_TRUST_PROXY on startup — Express
trust proxywas hard-coded totrue, which triggers a validation error inexpress-rate-limitv8+ when the default key generator infers client IP fromX-Forwarded-For. Replaced with a configurableDD_SERVER_TRUSTPROXYenv var (default:false). Set to1(hop count) when behind a single reverse proxy, or a specific IP/CIDR for tighter control. (#43)
1.1.2
Fixed
- Misleading docker-compose file error messages — When a compose file had a permission error (EACCES), the log incorrectly reported "does not exist" instead of "permission denied". Now distinguishes between missing files and permission issues with actionable guidance. (#42)
- Agent watcher registration fails on startup — Agent component path resolved outside the runtime root (
../agent/componentsinstead ofagent/components), causing "Unknown watcher provider: 'docker'" errors and preventing agent watchers/triggers from registering. (#42)
Changed
- Debug logging for component registration — Added debug-level logging showing resolved module paths during component registration and agent component registration attempts, making path resolution issues easier to diagnose.
1.1.1 - 2026-02-11
Fixed
- Read-only Docker socket support — Drydock's privilege drop prevented non-root users from connecting to
:rosocket mounts. AddedDD_RUN_AS_ROOT=trueenv var to skip the drop, improved EACCES error messages with actionable guidance, and documented socket proxy as the recommended secure alternative. (#38) - Prometheus container gauge crash with agent containers — The container gauge used a blacklist filter that let unknown properties (like
agent) slip through and crash prom-client. Switched to a whitelist of known label names so unknown properties are silently ignored. (#39) - Snackbar toast transparency — Used
flatvariant for solid background on toast notifications. - Container filter layout broken on narrow viewports — Filter columns rendered text vertically when the nav drawer was open because all 8
v-colelements had no width constraints. Added responsive breakpoints (cols/sm/md) so filters wrap properly across screen sizes. (#40)
1.1.0 - 2026-02-10
Added
- Application log viewer — New Configuration > Logs page with a terminal-style viewer for drydock's own runtime logs (startup, polling, registry checks, trigger events, errors). Backed by an in-memory ring buffer (last 1,000 entries) exposed via
GET /api/log/entries. Supports level filtering (debug/info/warn/error), configurable tail count (50/100/500/1,000), color-coded output, and auto-scroll to newest entries. An info tooltip shows the configured server log level. - Agent log source selector — When agents are configured, a "Source" dropdown appears in the log viewer to switch between the controller's own logs and any connected agent's logs. Disconnected agents are shown but disabled. Agent logs are proxied via
GET /api/agents/:name/log/entries. - Container log viewer — New "Logs" tab in the container detail expansion panel to view container stdout/stderr output directly in the UI with tail control and refresh.
1.0.2 - 2026-02-10
Fixed
- Registry and trigger crashes in agent mode —
getSummaryTags()andgetTriggerCounter()also returnundefinedin agent mode. Added optional chaining to all remaining Prometheus call sites so agent mode doesn't crash when processing containers or firing triggers. (Fixes #33)
1.0.1 - 2026-02-10
Fixed
- Prometheus gauge crash in agent mode —
getWatchContainerGauge()returnsundefinedin agent mode since Prometheus is not initialized. Added optional chaining so the.set()call is safely skipped. This was the root cause of containers not being discovered in agent mode. (Fixes #23, #31)
Changed
- su-exec privilege dropping — Entrypoint detects the docker socket GID and drops from root to the
nodeuser viasu-execwhen possible. Stays root only for GID 0 sockets (Docker Desktop / OrbStack). (Refs #25) - tini init system — Added
tinias PID 1 for proper signal forwarding to the Node process. - Graceful shutdown —
SIGINT/SIGTERMhandlers now callprocess.exit()after cleanup so the container actually stops.
1.0.0 - 2026-02-10
First semver release. Drydock adopts semantic versioning starting with this release, replacing the previous CalVer (YYYY.MM.PATCH) scheme.
Security
- ReDoS prevention — Replaced vulnerable regexes in trigger template evaluation (
Trigger.ts) with linear-time string parsing (parseMethodCall,isValidPropertyPath). AddedMAX_PATTERN_LENGTHguards in tag transform (tag/index.ts) and Docker watcher (Docker.ts) to reject oversized user-supplied regex patterns. - XSS prevention — Added
escapeHtml()sanitizer to Telegram triggerbold()method, preventing HTML injection via container names or tag values. - Workflow hardening — Set top-level
permissions: read-allinrelease.ymlandcodeql.yml. Pinned all CodeQL action refs to commit hashes. Added CodeQL config to excludejs/clear-text-loggingfalse positives. - CVE-2026-24001 — Updated
diffdependency in e2e tests (4.0.2 → 4.0.4).
Changed
- +285 UI tests — 15 new spec files and 7 expanded existing specs covering configuration views, container components, trigger detail, services, router, and app shell. UI test count: 163 → 285.
- +59 app tests — New edge-case tests for ReDoS guard branches,
parseMethodCallparsing, and Docker watcher label resolution. App test count: 1,254 → 1,313. - Complexity refactors — Extracted helpers from high-complexity functions:
parseTriggerList/applyPolicyAction(container.ts),resolveLabelsFromContainer/mergeConfigWithImgset(Docker.ts). - Biome lint fixes —
import typecorrections and unused variable cleanup across 17 files. - Fixed doc links — Corrected broken fragment links in
docs/_coverpage.md.
Removed
- Removed legacy
vue.config.js— Dead Vue CLI config file; project uses Vite.
2026.2.3 - 2026-02-10
Fixed
- NTFY trigger auth 401 — Bearer token auth used unsupported
axios.auth.bearerproperty; now sendsAuthorization: Bearer <token>header. Basic auth property names corrected tousername/password. (#27) - Agent mode missing /health — Added unauthenticated
/healthendpoint to the agent server, mounted before the auth middleware so Docker healthchecks work without the agent secret. (#27)
Changed
- Lefthook pre-push hooks — Added
lefthook.ymlwith pre-push checks (lint + build + test). - Removed startup warning — Removed "Known Issue" notice from README now that container startup issues are resolved.
2026.2.2 - 2026-02-10
Security
- Cosign keyless signing — Container image releases are now signed with Sigstore cosign keyless signing for supply chain integrity.
- Least-privilege workflow permissions — Replaced overly broad
read-allwith minimum specific permissions across all CI/CD workflows. - CodeQL and Scorecard fixes — Resolved all high-severity CodeQL and OpenSSF Scorecard security alerts.
- Pinned CI actions — All CI action references pinned to commit hashes with Dockerfile base image digest.
Added
- Auto-dismiss notifications after container update — New
resolvenotificationsoption for triggers (default:false). When enabled, notification triggers automatically delete the sent message after the Docker trigger successfully updates the container. Implemented for Gotify via itsdeleteMessageAPI. Other providers (Slack, Discord, ntfy) can add support by overriding the newdismiss()method on the base Trigger class. NewcontainerUpdateAppliedevent emitted by the Docker trigger on successful update.
Fixed
- Agent mode Prometheus crash — Guard
getWatchContainerGauge().set()against undefined in Agent mode where Prometheus is not initialized, fixing "Cannot read properties of undefined (reading 'set')" crash (#23) - Sanitize version logging — Sanitize version strings from env vars before logging to resolve CodeQL clear-text-logging alerts in
index.tsandstore/migrate.ts - Broken event test assertion — Fix
expect()without matcher in event test
Changed
- 97% test coverage — Boosted from 76% to 97% with 449 new tests (1,254 total across 95 test files).
- Fuzz testing — Added property-based fuzz tests with fast-check for Docker image name parsing.
- Static analysis fixes — Optional chaining,
String#replaceAll(),readonlymodifiers,Number.NaN, concise regex syntax, removed unused imports, moved functions to outer scope. - Reduced code duplication — Refactored duplicated code in registries, triggers, and store test files flagged by SonarCloud.
- Pino logging — Replaced bunyan with pino to eliminate vulnerable transitive dependencies. Added pino-pretty for human-readable log output.
- Renamed wud to drydock — Project references updated from upstream naming across Dockerfile, entrypoint, package files, scripts, and test fixtures.
- CONTRIBUTING.md — Added contributor guidelines.
- OpenSSF Best Practices badge — Added to README.
- SonarCloud integration — Added project configuration.
- Multi-arch container images — Docker images now built for both
linux/amd64andlinux/arm64architectures, published to GHCR. - Lefthook pre-push hooks — Added lefthook config with pre-push checks (lint + build + test) and
npm run checkconvenience script. - CodeQL query exclusion — Exclude
js/clear-text-loggingquery (false positives on DD_VERSION env var).
2026.1.0
Added
- Agent mode — Distributed monitoring with remote agent architecture. Agent components, SSE-based communication, dedicated API routes.
- OIDC token lifecycle — Remote watcher HTTPS auth with
Basic+Bearertoken support. TLS/mTLS compatibility forDD_WATCHER_{name}_HOST. - OIDC device-flow (Phase 2) — RFC 8628 Device Authorization Grant for headless remote watcher auth. Auto-detection, polling with backoff, and refresh token rotation.
- Per-image config presets —
imgsetdefaults for per-image configuration. AddedwatchDigestandinspectTagPathimgset properties. - Hybrid triggers — Trigger group defaults (
DD_TRIGGER_{name}_THRESHOLD) shared across providers. Name-only include/exclude for multi-provider trigger management. - Container update policy — Skip/snooze specific update versions. Per-container policy stored in DB, exposed via API and UI.
- Metrics auth toggle —
DD_SERVER_METRICS_AUTHenv var to disable auth on/metricsendpoint. - Trigger thresholds — Digest and no-digest thresholds for triggers.
- NTFY provider-level threshold — Provider-level threshold support for ntfy trigger.
- Docker pull progress logging — Rate-limited pull progress output during docker-compose updates.
- Registry lookup image override —
lookupImagefield on registry config to override the image used for tag lookups. - Docker inspect tag path — Support custom tag path in Docker inspect output.
- Anonymous LSCR and TrueForge registries — Allow anonymous access to LSCR (LinuxServer) and Quay-backed TrueForge.
- DHI registry — New
dhi.ioregistry provider with matcher, auth flow, and docs. - Custom URL icons — Support URL-based icons via
dd.display.iconlabel. - Version skip — Skip specific versions in the UI.
- Log viewer — In-app container log viewer. View Docker container stdout/stderr output directly in the UI via a new "Logs" tab on each container. Supports configurable tail line count (50/100/500), manual refresh, and Docker stream demultiplexing. Works for both local and remote agent containers.
- Semver tag recovery — Recover include-filter mismatched semver tags from watchers. Extended to advise best semver tag when current tag is non-semver (e.g.,
latest). - Dashboard update chips — Replaced verbose update status text with compact colored chips: green "up to date" or warning "N update(s)" (clickable).
Fixed
- eval() code injection — Replaced
eval()in trigger template rendering with safe expression evaluator supporting property paths, method allowlist, ternaries, and string concatenation. - Digest-only update prune crash — Docker trigger prune logic now correctly excludes current image during digest-only updates and handles post-prune errors gracefully.
- Swarm deploy-label debug logging — Added warn-level logging when Swarm service inspect fails, and debug logging showing which label sources contain
dd.*labels. - OIDC session state races — Serialized redirect session checks, multiple pending callback states per session.
- semverDiff undefined — Normalized
semverDifffor non-tag (digest-only/created-date-only) updates. - Docker event stream crash — Buffered and parsed split Docker event stream payloads.
- Multi-network container recreate — Reconnects additional networks after container recreation.
- Remote watcher delayed first scan —
watchatstartnow checks watcher-local store for new remote watchers. - docker-compose post_start hooks — Hooks now execute after updates.
- docker-compose image-only triggers — Only trigger on compose services with actual image changes.
- docker-compose imageless services — Skip compose services without an
imagefield. - docker-compose implicit latest tag — Normalize
image: nginxtoimage: nginx:latestso compose triggers don't treat implicit latest as a version mismatch. - Express 5 wildcard routes — Named wildcard route params for express 5 compatibility.
- Semver filtering — Fixed semver part filtering and prefix handling.
- SMTP TLS_VERIFY inverted —
rejectUnauthorizedwas inverted;TLS_VERIFY=falsenow correctly allows self-signed certificates. - HA MQTT deprecated object_id — Replaced
object_idwithdefault_entity_idfor Home Assistant 2025.10+ compatibility. - Open redirect on authenticated pages — Validate
nextquery parameter to only allow internal routes. - Trigger test updateKind crash — Test-button triggers no longer crash with "Cannot read properties of undefined (reading 'updateKind')" on unvalidated containers.
- Docker rename event not captured — Added
renameto Docker event listener so container name updates are captured after compose recreates. - UI duplicate drawer logo — Removed duplicate logo in navigation drawer.
Changed
- TypeScript migration (app) — Entire backend converted from JavaScript to TypeScript with ES Modules (
NodeNext). 232.tsfiles added/renamed, all.jssource files removed. - TypeScript migration (UI) — Vue 3 frontend migrated from JS to TS. 29
.vuefiles updated, component props/emits typed. - Jest → Vitest (app) — All 64 app test files (664 tests) migrated from Jest to Vitest. Test runner unified across app and UI.
- Jest → Vitest (UI) — UI unit tests migrated from Jest to Vitest with improved coverage.
- Vitest 4 + modern deps — Upgraded vitest 3→4, uuid 11→13, flat 5→6, snake-case 3→4. Fixed vitest 4 mock constructor breaking change.
- ESM baseline — Cut over to
NodeNextmodule resolution. Removed Babel, addedtsconfig.json. - Biome linter — Replaced ESLint with Biome for formatting and linting.
- CI cleanup — Removed Code Climate config, renamed Travis config to
ci.config.yml.
Dependencies
| Package | Upstream (8.1.1) | drydock |
|---|---|---|
| vitest | 3.x (Jest) | 4.x |
| uuid | 9.x | 13.x |
| flat | 5.x | 6.x |
| snake-case | 3.x | 4.x |
| express | 4.x | 5.x |
| typescript | — | 5.9 |
| biome | — | 2.3 |
Stats: 392 files changed, +25,725 insertions, -25,995 deletions, 872 total tests (709 app + 163 UI).
Upstream Backports
The following changes from upstream/main (post-fork) have been ported to drydock:
| Description | Status |
|---|---|
| Add Codeberg to default registries | Ported (new TS provider) |
Increase maxAliasCount in YAML parsing | Ported |
Fix authentication for private ECR registry (async getAuthPull) | Ported across all registries |
Prometheus: add DD_PROMETHEUS_ENABLED config | Ported |
| Fix Authelia OIDC docs (field names) | Ported |
| Buffer Docker event stream before JSON parse | Already fixed independently |
| SMTP trigger: allow display name in from address (#908) | Ported |
Remaining upstream-only changes (not ported — not applicable to drydock):
| Description | Reason |
|---|---|
| Fix e2e tests (x2) | JS-based, drydock tests are TS |
| Fix prettier | drydock uses Biome |
| Fix codeberg tests | Covered by drydock's own tests |
| Update changelog | Upstream-specific |