mirror of
https://github.com/openclaw/openclaw.git
synced 2026-05-08 17:58:28 +00:00
feat(sandbox): block container namespace joins by default
This commit is contained in:
@@ -181,6 +181,12 @@ describe("buildSandboxCreateArgs", () => {
|
||||
cfg: createSandboxConfig({ network: "host" }),
|
||||
expected: /network mode "host" is blocked/,
|
||||
},
|
||||
{
|
||||
name: "network container namespace join",
|
||||
containerName: "openclaw-sbx-container-network",
|
||||
cfg: createSandboxConfig({ network: "container:peer" }),
|
||||
expected: /network mode "container:peer" is blocked by default/,
|
||||
},
|
||||
{
|
||||
name: "seccomp unconfined",
|
||||
containerName: "openclaw-sbx-seccomp",
|
||||
@@ -271,4 +277,18 @@ describe("buildSandboxCreateArgs", () => {
|
||||
});
|
||||
expect(args).toEqual(expect.arrayContaining(["-v", "/tmp/override:/workspace:rw"]));
|
||||
});
|
||||
|
||||
it("allows container namespace join with explicit dangerous override", () => {
|
||||
const cfg = createSandboxConfig({
|
||||
network: "container:peer",
|
||||
dangerouslyAllowContainerNamespaceJoin: true,
|
||||
});
|
||||
const args = buildSandboxCreateArgs({
|
||||
name: "openclaw-sbx-container-network-override",
|
||||
cfg,
|
||||
scopeKey: "main",
|
||||
createdAtMs: 1700000000000,
|
||||
});
|
||||
expect(args).toEqual(expect.arrayContaining(["--network", "container:peer"]));
|
||||
});
|
||||
});
|
||||
|
||||
Reference in New Issue
Block a user