Update frigate to version v0.15.0 #1734
Annotations
1 warning and 4 notices
Run sharknoon/umbrel-app-linter-action@d392151f207ab882efc7ddd4a299b6290b6356eb:
frigate/docker-compose.yml#L12
The restart policy of the container "web" should be set to "on-failure".
|
Run sharknoon/umbrel-app-linter-action@d392151f207ab882efc7ddd4a299b6290b6356eb:
frigate/docker-compose.yml#L25
Port mappings may be unnecessary for the app to function correctly. Docker's internal DNS resolves container names to IP addresses within the same network. External access to the web interface is handled by the app_proxy container. Port mappings are only needed if external access is required to a port not proxied by the app_proxy, or if an app needs to expose multiple ports for its functionality (e.g., DHCP, DNS, P2P, etc.).
|
Run sharknoon/umbrel-app-linter-action@d392151f207ab882efc7ddd4a299b6290b6356eb:
frigate/docker-compose.yml#L25
Port mappings may be unnecessary for the app to function correctly. Docker's internal DNS resolves container names to IP addresses within the same network. External access to the web interface is handled by the app_proxy container. Port mappings are only needed if external access is required to a port not proxied by the app_proxy, or if an app needs to expose multiple ports for its functionality (e.g., DHCP, DNS, P2P, etc.).
|
Run sharknoon/umbrel-app-linter-action@d392151f207ab882efc7ddd4a299b6290b6356eb:
frigate/docker-compose.yml#L25
Port mappings may be unnecessary for the app to function correctly. Docker's internal DNS resolves container names to IP addresses within the same network. External access to the web interface is handled by the app_proxy container. Port mappings are only needed if external access is required to a port not proxied by the app_proxy, or if an app needs to expose multiple ports for its functionality (e.g., DHCP, DNS, P2P, etc.).
|
Run sharknoon/umbrel-app-linter-action@d392151f207ab882efc7ddd4a299b6290b6356eb:
frigate/docker-compose.yml#L1
The default container user "root" can lead to security vulnerabilities. If you are using the root user, please try to specify a different user (e.g. "1000:1000") in the compose file or try to set the UID/PUID and GID/PGID environment variables to 1000.
|
Loading