mirror of
https://github.com/openclaw/openclaw.git
synced 2026-05-09 10:27:38 +00:00
refactor(agents): migrate console.warn/error/info to subsystem logger (#22906)
Merged via /review-pr -> /prepare-pr -> /merge-pr.
Prepared head SHA: a806c4cb27
Co-authored-by: Kepler2024 <166882517+Kepler2024@users.noreply.github.com>
Co-authored-by: gumadeiras <5599352+gumadeiras@users.noreply.github.com>
Reviewed-by: @gumadeiras
This commit is contained in:
@@ -1,4 +1,5 @@
|
||||
import { spawn } from "node:child_process";
|
||||
import { createSubsystemLogger } from "../../logging/subsystem.js";
|
||||
import { sanitizeEnvVars } from "./sanitize-env-vars.js";
|
||||
|
||||
type ExecDockerRawOptions = {
|
||||
@@ -114,6 +115,8 @@ import { resolveSandboxAgentId, resolveSandboxScopeKey, slugifySessionKey } from
|
||||
import type { SandboxConfig, SandboxDockerConfig, SandboxWorkspaceAccess } from "./types.js";
|
||||
import { validateSandboxSecurity } from "./validate-sandbox-security.js";
|
||||
|
||||
const log = createSubsystemLogger("docker");
|
||||
|
||||
const HOT_CONTAINER_WINDOW_MS = 5 * 60 * 1000;
|
||||
|
||||
export type ExecDockerOptions = ExecDockerRawOptions;
|
||||
@@ -291,13 +294,10 @@ export function buildSandboxCreateArgs(params: {
|
||||
}
|
||||
const envSanitization = sanitizeEnvVars(params.cfg.env ?? {});
|
||||
if (envSanitization.blocked.length > 0) {
|
||||
console.warn(
|
||||
"[Security] Blocked sensitive environment variables:",
|
||||
envSanitization.blocked.join(", "),
|
||||
);
|
||||
log.warn(`Blocked sensitive environment variables: ${envSanitization.blocked.join(", ")}`);
|
||||
}
|
||||
if (envSanitization.warnings.length > 0) {
|
||||
console.warn("[Security] Suspicious environment variables:", envSanitization.warnings);
|
||||
log.warn(`Suspicious environment variables: ${envSanitization.warnings.join(", ")}`);
|
||||
}
|
||||
for (const [key, value] of Object.entries(envSanitization.allowed)) {
|
||||
args.push("--env", `${key}=${value}`);
|
||||
|
||||
Reference in New Issue
Block a user