WARNING: THIS SITE IS A MIRROR OF GITHUB.COM / IT CANNOT LOGIN OR REGISTER ACCOUNTS / THE CONTENTS ARE PROVIDED AS-IS / THIS SITE ASSUMES NO RESPONSIBILITY FOR ANY DISPLAYED CONTENT OR LINKS / IF YOU FOUND SOMETHING MAY NOT GOOD FOR EVERYONE, CONTACT ADMIN AT ilovescratch@foxmail.com
Skip to content

Commit 4a98703

Browse files
kaovilaiclaude
andcommitted
feat: add Claude Code devcontainer configuration with network security
Add comprehensive development container setup for Claude Code: - Claude Code permissions configuration with npm workflow allowances - Dockerfile with Node.20, development tools, and network utilities - Network firewall initialization script restricting outbound access to approved domains (GitHub, npm, Anthropic, VS Code) - Custom ZSH configuration with Claude Code alias - Persistent command history and Claude config via Docker volumes 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <[email protected]>
1 parent cfadb9b commit 4a98703

File tree

5 files changed

+310
-0
lines changed

5 files changed

+310
-0
lines changed

.claude/settings.local.json

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
{
2+
"permissions": {
3+
"allow": [
4+
"Bash(npm cache clean:*)",
5+
"Bash(rm:*)",
6+
"Bash(npm install)",
7+
"Bash(npm run build:*)",
8+
"Bash(npm run lint)",
9+
"Bash(node:*)",
10+
"Bash(npm outdated)",
11+
"Bash(npm install:*)",
12+
"Bash(npm uninstall:*)",
13+
"Bash(mv:*)"
14+
],
15+
"defaultMode": "acceptEdits"
16+
}
17+
}

.devcontainer/.zshrc

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
# Custom aliases for devcontainer
2+
3+
# Claude Code alias to skip permission checks
4+
alias claude='claude --dangerously-skip-permissions'

.devcontainer/Dockerfile

Lines changed: 95 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,95 @@
1+
FROM node:20
2+
3+
ARG TZ
4+
ENV TZ="$TZ"
5+
6+
ARG CLAUDE_CODE_VERSION=latest
7+
8+
# Install basic development tools and iptables/ipset
9+
RUN apt-get update && apt-get install -y --no-install-recommends \
10+
less \
11+
git \
12+
procps \
13+
sudo \
14+
fzf \
15+
zsh \
16+
man-db \
17+
unzip \
18+
gnupg2 \
19+
gh \
20+
iptables \
21+
ipset \
22+
iproute2 \
23+
dnsutils \
24+
aggregate \
25+
jq \
26+
nano \
27+
vim \
28+
&& apt-get clean && rm -rf /var/lib/apt/lists/*
29+
30+
# Ensure default node user has access to /usr/local/share
31+
RUN mkdir -p /usr/local/share/npm-global && \
32+
chown -R node:node /usr/local/share
33+
34+
ARG USERNAME=node
35+
36+
# Persist bash history.
37+
RUN SNIPPET="export PROMPT_COMMAND='history -a' && export HISTFILE=/commandhistory/.bash_history" \
38+
&& mkdir /commandhistory \
39+
&& touch /commandhistory/.bash_history \
40+
&& chown -R $USERNAME /commandhistory
41+
42+
# Set `DEVCONTAINER` environment variable to help with orientation
43+
ENV DEVCONTAINER=true
44+
45+
# Create workspace and config directories and set permissions
46+
RUN mkdir -p /workspace /home/node/.claude && \
47+
chown -R node:node /workspace /home/node/.claude
48+
49+
WORKDIR /workspace
50+
51+
ARG GIT_DELTA_VERSION=0.18.2
52+
RUN ARCH=$(dpkg --print-architecture) && \
53+
wget "https://github.com/dandavison/delta/releases/download/${GIT_DELTA_VERSION}/git-delta_${GIT_DELTA_VERSION}_${ARCH}.deb" && \
54+
sudo dpkg -i "git-delta_${GIT_DELTA_VERSION}_${ARCH}.deb" && \
55+
rm "git-delta_${GIT_DELTA_VERSION}_${ARCH}.deb"
56+
57+
# Set up non-root user
58+
USER node
59+
60+
# Install global packages
61+
ENV NPM_CONFIG_PREFIX=/usr/local/share/npm-global
62+
ENV PATH=$PATH:/usr/local/share/npm-global/bin
63+
64+
# Set the default shell to zsh rather than sh
65+
ENV SHELL=/bin/zsh
66+
67+
# Set the default editor and visual
68+
ENV EDITOR=nano
69+
ENV VISUAL=nano
70+
71+
# Default powerline10k theme
72+
ARG ZSH_IN_DOCKER_VERSION=1.2.0
73+
RUN sh -c "$(wget -O- https://github.com/deluan/zsh-in-docker/releases/download/v${ZSH_IN_DOCKER_VERSION}/zsh-in-docker.sh)" -- \
74+
-p git \
75+
-p fzf \
76+
-a "source /usr/share/doc/fzf/examples/key-bindings.zsh" \
77+
-a "source /usr/share/doc/fzf/examples/completion.zsh" \
78+
-a "export PROMPT_COMMAND='history -a' && export HISTFILE=/commandhistory/.bash_history" \
79+
-x
80+
81+
# Copy custom ZSH configuration with aliases
82+
COPY --chown=node:node .zshrc /home/node/.zshrc.devcontainer
83+
RUN echo "source /home/node/.zshrc.devcontainer" >> /home/node/.zshrc
84+
85+
# Install Claude
86+
RUN npm install -g @anthropic-ai/claude-code@${CLAUDE_CODE_VERSION}
87+
88+
89+
# Copy and set up firewall script
90+
COPY init-firewall.sh /usr/local/bin/
91+
USER root
92+
RUN chmod +x /usr/local/bin/init-firewall.sh && \
93+
echo "node ALL=(root) NOPASSWD: /usr/local/bin/init-firewall.sh" > /etc/sudoers.d/node-firewall && \
94+
chmod 0440 /etc/sudoers.d/node-firewall
95+
USER node

.devcontainer/devcontainer.json

Lines changed: 57 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
{
2+
"name": "Claude Code Sandbox",
3+
"build": {
4+
"dockerfile": "Dockerfile",
5+
"args": {
6+
"TZ": "${localEnv:TZ:America/Los_Angeles}",
7+
"CLAUDE_CODE_VERSION": "latest",
8+
"GIT_DELTA_VERSION": "0.18.2",
9+
"ZSH_IN_DOCKER_VERSION": "1.2.0"
10+
}
11+
},
12+
"runArgs": [
13+
"--cap-add=NET_ADMIN",
14+
"--cap-add=NET_RAW"
15+
],
16+
"customizations": {
17+
"vscode": {
18+
"extensions": [
19+
"anthropic.claude-code",
20+
"dbaeumer.vscode-eslint",
21+
"esbenp.prettier-vscode",
22+
"eamodio.gitlens"
23+
],
24+
"settings": {
25+
"editor.formatOnSave": true,
26+
"editor.defaultFormatter": "esbenp.prettier-vscode",
27+
"editor.codeActionsOnSave": {
28+
"source.fixAll.eslint": "explicit"
29+
},
30+
"terminal.integrated.defaultProfile.linux": "zsh",
31+
"terminal.integrated.profiles.linux": {
32+
"bash": {
33+
"path": "bash",
34+
"icon": "terminal-bash"
35+
},
36+
"zsh": {
37+
"path": "zsh"
38+
}
39+
}
40+
}
41+
}
42+
},
43+
"remoteUser": "node",
44+
"mounts": [
45+
"source=claude-code-bashhistory-${devcontainerId},target=/commandhistory,type=volume",
46+
"source=claude-code-config-${devcontainerId},target=/home/node/.claude,type=volume"
47+
],
48+
"containerEnv": {
49+
"NODE_OPTIONS": "--max-old-space-size=4096",
50+
"CLAUDE_CONFIG_DIR": "/home/node/.claude",
51+
"POWERLEVEL9K_DISABLE_GITSTATUS": "true"
52+
},
53+
"workspaceMount": "source=${localWorkspaceFolder},target=/workspace,type=bind,consistency=delegated",
54+
"workspaceFolder": "/workspace",
55+
"postStartCommand": "sudo /usr/local/bin/init-firewall.sh",
56+
"waitFor": "postStartCommand"
57+
}

.devcontainer/init-firewall.sh

Lines changed: 137 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,137 @@
1+
#!/bin/bash
2+
set -euo pipefail # Exit on error, undefined vars, and pipeline failures
3+
IFS=$'\n\t' # Stricter word splitting
4+
5+
# 1. Extract Docker DNS info BEFORE any flushing
6+
DOCKER_DNS_RULES=$(iptables-save -t nat | grep "127\.0\.0\.11" || true)
7+
8+
# Flush existing rules and delete existing ipsets
9+
iptables -F
10+
iptables -X
11+
iptables -t nat -F
12+
iptables -t nat -X
13+
iptables -t mangle -F
14+
iptables -t mangle -X
15+
ipset destroy allowed-domains 2>/dev/null || true
16+
17+
# 2. Selectively restore ONLY internal Docker DNS resolution
18+
if [ -n "$DOCKER_DNS_RULES" ]; then
19+
echo "Restoring Docker DNS rules..."
20+
iptables -t nat -N DOCKER_OUTPUT 2>/dev/null || true
21+
iptables -t nat -N DOCKER_POSTROUTING 2>/dev/null || true
22+
echo "$DOCKER_DNS_RULES" | xargs -L 1 iptables -t nat
23+
else
24+
echo "No Docker DNS rules to restore"
25+
fi
26+
27+
# First allow DNS and localhost before any restrictions
28+
# Allow outbound DNS
29+
iptables -A OUTPUT -p udp --dport 53 -j ACCEPT
30+
# Allow inbound DNS responses
31+
iptables -A INPUT -p udp --sport 53 -j ACCEPT
32+
# Allow outbound SSH
33+
iptables -A OUTPUT -p tcp --dport 22 -j ACCEPT
34+
# Allow inbound SSH responses
35+
iptables -A INPUT -p tcp --sport 22 -m state --state ESTABLISHED -j ACCEPT
36+
# Allow localhost
37+
iptables -A INPUT -i lo -j ACCEPT
38+
iptables -A OUTPUT -o lo -j ACCEPT
39+
40+
# Create ipset with CIDR support
41+
ipset create allowed-domains hash:net
42+
43+
# Fetch GitHub meta information and aggregate + add their IP ranges
44+
echo "Fetching GitHub IP ranges..."
45+
gh_ranges=$(curl -s https://api.github.com/meta)
46+
if [ -z "$gh_ranges" ]; then
47+
echo "ERROR: Failed to fetch GitHub IP ranges"
48+
exit 1
49+
fi
50+
51+
if ! echo "$gh_ranges" | jq -e '.web and .api and .git' >/dev/null; then
52+
echo "ERROR: GitHub API response missing required fields"
53+
exit 1
54+
fi
55+
56+
echo "Processing GitHub IPs..."
57+
while read -r cidr; do
58+
if [[ ! "$cidr" =~ ^[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}/[0-9]{1,2}$ ]]; then
59+
echo "ERROR: Invalid CIDR range from GitHub meta: $cidr"
60+
exit 1
61+
fi
62+
echo "Adding GitHub range $cidr"
63+
ipset add allowed-domains "$cidr"
64+
done < <(echo "$gh_ranges" | jq -r '(.web + .api + .git)[]' | aggregate -q)
65+
66+
# Resolve and add other allowed domains
67+
for domain in \
68+
"registry.npmjs.org" \
69+
"api.anthropic.com" \
70+
"sentry.io" \
71+
"statsig.anthropic.com" \
72+
"statsig.com" \
73+
"marketplace.visualstudio.com" \
74+
"vscode.blob.core.windows.net" \
75+
"update.code.visualstudio.com"; do
76+
echo "Resolving $domain..."
77+
ips=$(dig +noall +answer A "$domain" | awk '$4 == "A" {print $5}')
78+
if [ -z "$ips" ]; then
79+
echo "ERROR: Failed to resolve $domain"
80+
exit 1
81+
fi
82+
83+
while read -r ip; do
84+
if [[ ! "$ip" =~ ^[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}$ ]]; then
85+
echo "ERROR: Invalid IP from DNS for $domain: $ip"
86+
exit 1
87+
fi
88+
echo "Adding $ip for $domain"
89+
ipset add allowed-domains "$ip"
90+
done < <(echo "$ips")
91+
done
92+
93+
# Get host IP from default route
94+
HOST_IP=$(ip route | grep default | cut -d" " -f3)
95+
if [ -z "$HOST_IP" ]; then
96+
echo "ERROR: Failed to detect host IP"
97+
exit 1
98+
fi
99+
100+
HOST_NETWORK=$(echo "$HOST_IP" | sed "s/\.[0-9]*$/.0\/24/")
101+
echo "Host network detected as: $HOST_NETWORK"
102+
103+
# Set up remaining iptables rules
104+
iptables -A INPUT -s "$HOST_NETWORK" -j ACCEPT
105+
iptables -A OUTPUT -d "$HOST_NETWORK" -j ACCEPT
106+
107+
# Set default policies to DROP first
108+
iptables -P INPUT DROP
109+
iptables -P FORWARD DROP
110+
iptables -P OUTPUT DROP
111+
112+
# First allow established connections for already approved traffic
113+
iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
114+
iptables -A OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
115+
116+
# Then allow only specific outbound traffic to allowed domains
117+
iptables -A OUTPUT -m set --match-set allowed-domains dst -j ACCEPT
118+
119+
# Explicitly REJECT all other outbound traffic for immediate feedback
120+
iptables -A OUTPUT -j REJECT --reject-with icmp-admin-prohibited
121+
122+
echo "Firewall configuration complete"
123+
echo "Verifying firewall rules..."
124+
if curl --connect-timeout 5 https://example.com >/dev/null 2>&1; then
125+
echo "ERROR: Firewall verification failed - was able to reach https://example.com"
126+
exit 1
127+
else
128+
echo "Firewall verification passed - unable to reach https://example.com as expected"
129+
fi
130+
131+
# Verify GitHub API access
132+
if ! curl --connect-timeout 5 https://api.github.com/zen >/dev/null 2>&1; then
133+
echo "ERROR: Firewall verification failed - unable to reach https://api.github.com"
134+
exit 1
135+
else
136+
echo "Firewall verification passed - able to reach https://api.github.com as expected"
137+
fi

0 commit comments

Comments
 (0)