pub struct SandboxConfig {
pub enabled: bool,
pub strategy: String,
pub allowed_write_paths: Vec<String>,
pub forbidden_paths: Vec<String>,
pub allow_network: bool,
}Expand description
Process-level sandbox configuration.
When enabled is true, subprocess-spawning tools (currently the Bash
tool) wrap their child process with an OS-level isolation mechanism:
sandbox-exec on macOS, future strategies on Linux/Windows. Defaults
ship the sandbox disabled while Linux and Windows strategies land,
so that opt-in users on macOS can exercise the integration without
asymmetric platform security.
Fields§
§enabled: boolWhether process-level sandboxing is enabled for subprocess tools.
strategy: StringStrategy selector: "auto", "seatbelt", or "none".
"auto" picks the best available strategy for the host OS and
falls back to "none" with a warning when no strategy is available.
allowed_write_paths: Vec<String>Absolute or ~-prefixed paths that the sandbox may write to in
addition to the project directory. Relative paths are resolved
against the project directory.
forbidden_paths: Vec<String>Paths the sandbox must never read. Overrides the default broad-read allow rule so credentials stay masked.
allow_network: boolWhether subprocesses in the sandbox can open network sockets.
Trait Implementations§
Source§impl Clone for SandboxConfig
impl Clone for SandboxConfig
Source§fn clone(&self) -> SandboxConfig
fn clone(&self) -> SandboxConfig
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source. Read more