You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: .agents/skills/generate-sandbox-policy/SKILL.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -167,10 +167,10 @@ Key sections to reference:
167
167
-**Private IP Access via `allowed_ips`** — CIDR allowlist for private IP space
168
168
-**Validation Rules** — what combinations are valid/invalid
169
169
170
-
Also read the example policy for real-world patterns:
170
+
Also read the example policy for real-world patterns. The default policy is baked into the community base image (`ghcr.io/nvidia/openshell-community/sandboxes/base:latest`). For reference, consult the policy schema documentation:
@@ -355,8 +355,8 @@ The policy needs to go somewhere. Determine which mode applies:
355
355
356
356
| Signal | Mode |
357
357
|--------|------|
358
-
| User names an existing policy file (e.g., "add to deploy/docker/sandbox/dev-sandbox-policy.yaml") |**Update existing file**|
359
-
| User says "update my policy", "add this to my policy file" |**Update existing file** — look for `deploy/docker/sandbox/dev-sandbox-policy.yaml` or ask which file |
358
+
| User names an existing policy file (e.g., "add to my-sandbox-policy.yaml") |**Update existing file**|
359
+
| User says "update my policy", "add this to my policy file" |**Update existing file** — ask which file to update|
360
360
| User asks to modify an existing policy rule by name |**Update existing file** — edit the named policy in place |
361
361
| User says "create a new policy file" or names a file that doesn't exist |**Create new file**|
362
362
| No file context given |**Present only** — show the YAML and ask if the user wants it written to a file |
@@ -414,7 +414,7 @@ network_policies:
414
414
415
415
The `filesystem_policy`, `landlock`, and `process` sections above are sensible defaults. Tell the user these are defaults and may need adjustment for their environment. Cluster inference is configured separately through `openshell cluster inference set/get`. The generated `network_policies` block is the primary output.
416
416
417
-
If the user provides a file path, write to it. Otherwise, suggest `deploy/docker/sandbox/dev-sandbox-policy.yaml` for local development or ask where to place it.
417
+
If the user provides a file path, write to it. Otherwise, ask where to place it. A common convention is a project-local policy file (e.g., `sandbox-policy.yaml`) passed to `openshell sandbox create --policy <path>`or set via the `OPENSHELL_SANDBOX_POLICY` env var.
418
418
419
419
### Mode C: Present Only (no file write)
420
420
@@ -423,7 +423,7 @@ Show the generated policy YAML with:
423
423
1.**Summary** — what the policy allows and denies, in plain language
424
424
2.**The YAML** — the complete `network_policies` block, ready to paste
425
425
3.**Integration guidance**:
426
-
-For local dev: add to `deploy/docker/sandbox/dev-sandbox-policy.yaml` under `network_policies`
426
+
-Save to a local file and pass via `openshell sandbox create --policy <path>` or set `OPENSHELL_SANDBOX_POLICY=<path>`
427
427
- For production: configure via the gateway
428
428
4.**Caveats** — any assumptions made, anything the user should verify
429
429
@@ -541,6 +541,6 @@ private_services:
541
541
## Additional Resources
542
542
543
543
- Full policy schema: [architecture/security-policy.md](../../../architecture/security-policy.md)
544
-
- Example policy file: [dev-sandbox-policy.yaml](../../../deploy/docker/sandbox/dev-sandbox-policy.yaml)
544
+
- Default policy: baked into the community base image (`ghcr.io/nvidia/openshell-community/sandboxes/base:latest`)
3. **Ask the user**: "A policy named `nvidia` already exists. Do you want to replace it, add endpoints to it, or use a different name (e.g., `nvidia_inference_v2`)?"
0 commit comments