-
Notifications
You must be signed in to change notification settings - Fork 448
DNS resolution fails inside sandbox for policy-allowed domains #727
Copy link
Copy link
Closed as duplicate of#364
Copy link
Description
Agent Diagnostic
- Investigated DNS resolution inside sandbox
- Ran
cat /etc/resolv.conf→ points to CoreDNS at 10.43.0.10 - Ran
nslookup slack.com→ connection refused to 10.43.0.10:53 - Ran
curl https://slack.com→ fails (can't resolve host) - Verified CoreDNS pod is running via kubectl exec and responds correctly
- Concluded: sandboxed processes are blocked from reaching the internal DNS server at the network/firewall level
Description
Sandboxed processes cannot resolve any external domain names. The sandbox’s /etc/resolv.conf points to CoreDNS at 10.43.0.10, but the sandbox network rules block access to it on port 53. This means any tool or plugin that needs to connect to an external service (Slack, Telegram, etc.) fails even when policy.yaml allows the domain.
DNS resolution works fine from kubectl exec into the CoreDNS pod, so the server itself is healthy. The block is between the sandboxed process and the DNS server.
Reproduction Steps
openshell gateway startopenshell sandbox create -- bash- Inside sandbox:
nslookup slack.com→ connection refused - Inside sandbox:
cat /etc/resolv.conf→ shows10.43.0.10 - From host:
kubectl execinto CoreDNS pod,nslookup slack.comworks fine
Environment
- OS: macOS 15.x (Apple Silicon)
- Docker: Docker Desktop 4.x
- OpenShell: latest (installed via
curl -fsSL .../install.sh | bash)
Logs
Agent-First Checklist
- I pointed my agent at the repo and had it investigate this issue
- I loaded relevant skills (e.g.,
debug-openshell-cluster,debug-inference,openshell-cli) - My agent could not resolve this — the diagnostic above explains why
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels