-
Notifications
You must be signed in to change notification settings - Fork 16.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Docker for development and sandboxing #1031
Comments
thanks - love this idea |
Since docker will be used for both a development as well as a trusted env for chains/agent I am moving all the comments related to docker to this issue in order to split the work over multiple PRs |
Any progress on creating a dev container: .devcontainer
|
Hi, @blob42! I'm Dosu, and I'm helping the LangChain team manage their backlog. I wanted to let you know that we are marking this issue as stale. From what I understand, the issue you raised proposes creating a Dockerfile/compose for setting up a development and build container. There has been positive feedback from users, with one user expressing their support for the idea. You mentioned that you will be moving all comments related to Docker to this issue in order to split the work over multiple PRs. Another user has asked for an update on the progress of creating a dev container. It seems that progress is being made towards creating a development container, and the issue has been resolved. If this issue is still relevant to the latest version of the LangChain repository, please let the LangChain team know by commenting on the issue. Otherwise, feel free to close the issue yourself, or it will be automatically closed in 7 days. Thank you for your contribution to the LangChain repository! Let us know if you have any further questions or concerns. |
I propose to put together a dockerfile/compose for quickly setting up a dev/build container.
This will also have the benefit of extra security in the scenarios of code executions as mentioned in #1026.
I will make a PR for this.
Update:
This issue will be used to track the progress of PRs related to Docker. Separating development/testing from security/sandboxing will make it easier to manage changes and distribute the work.
Development and testing with docker
The use of docker here is to provide a consistent environment for development and testing. The docker images here are not meant to be used for untrusted code execution by chains/agents.
Docker image for untrusted code execution
This issue aims to create a Docker image that can be used to run untrusted code for chains/agents, with proper sandboxing and output sanitization. The following options will be considered:
The following options will be consider:
Pros: Offers almost the same level of sandboxing as full virtualization
Cons: Potential performance issues
Motivation
The various REPLs and shells than can be used by agents come with a significant risk of running untrusted and potentially malicious code. Docker can add an extra layer of sandboxing to mitigate these risks. Additionally, it is important to ensure proper sanitization of the agent's output to prevent information disclosure or other security vulnerabilities. refer to #1026
The text was updated successfully, but these errors were encountered: