diff --git a/docs/sandboxes/manage-sandboxes.mdx b/docs/sandboxes/manage-sandboxes.mdx index 6d10efbd0..fb24bae9b 100644 --- a/docs/sandboxes/manage-sandboxes.mdx +++ b/docs/sandboxes/manage-sandboxes.mdx @@ -51,6 +51,21 @@ openshell sandbox create --from my-registry.example.com/my-image:latest The CLI resolves community names against the [OpenShell Community](https://github.com/NVIDIA/OpenShell-Community) catalog, pulls the bundled Dockerfile and policy, builds the image locally, and creates the sandbox. For the full catalog and how to contribute your own, refer to [Community Sandboxes](/sandboxes/community-sandboxes). +### Label a Sandbox + +Attach labels when you create a sandbox to track ownership, environment, or workflow grouping: + +```shell +openshell sandbox create --label env=dev --label team=platform -- claude +``` + +List only the sandboxes that match a label selector: + +```shell +openshell sandbox list --selector env=dev +openshell sandbox list --selector env=dev,team=platform +``` + ## Connect to a Sandbox Open an SSH session into a running sandbox: @@ -110,6 +125,12 @@ List all sandboxes: openshell sandbox list ``` +Filter the list by labels when you want a narrower view: + +```shell +openshell sandbox list --selector team=platform +``` + Get detailed information about a specific sandbox. The output lists **Policy source** (`sandbox` or `global`), **Revision** (the active policy’s row version for that source), and the formatted active policy YAML: ```shell @@ -186,6 +207,8 @@ Upload files from your host into the sandbox: openshell sandbox upload my-sandbox ./src /sandbox/src ``` +When the local path is a named directory, OpenShell preserves that basename at the destination, matching `scp -r` and `cp -r`. The example above creates `/sandbox/src/src`. + Download files from the sandbox to your host: ```shell diff --git a/docs/security/best-practices.mdx b/docs/security/best-practices.mdx index 6a618520f..cd7a627bc 100644 --- a/docs/security/best-practices.mdx +++ b/docs/security/best-practices.mdx @@ -106,7 +106,7 @@ This enables credential injection and L7 inspection without explicit configurati | Aspect | Detail | |---|---| -| Default | Auto-detect and terminate. OpenShell generates the sandbox CA at startup and injects it into the process trust stores (`NODE_EXTRA_CA_CERTS`, `SSL_CERT_FILE`, `REQUESTS_CA_BUNDLE`, `CURL_CA_BUNDLE`). | +| Default | Auto-detect and terminate. OpenShell generates the sandbox CA at startup and injects it into the process trust stores (`NODE_EXTRA_CA_CERTS`, `SSL_CERT_FILE`, `REQUESTS_CA_BUNDLE`, `CURL_CA_BUNDLE`, `GIT_SSL_CAINFO`). | | What you can change | Set `tls: skip` on an endpoint to disable TLS detection and termination for that endpoint. Use this for client-certificate mTLS to upstream or non-standard binary protocols. | | Risk if relaxed | `tls: skip` disables credential injection and L7 inspection for that endpoint. The proxy relays encrypted traffic without seeing the contents. | | Recommendation | Use auto-detect (the default) for most endpoints. Use `tls: skip` only when the upstream requires the client's own TLS certificate (mTLS) or uses a non-HTTP protocol. |