English | 中文
This directory contains OpenAPI specification documents for the OpenSandbox project, defining the complete API interfaces and data models. Use the server base URLs defined in each spec (for example, http://localhost:8080/v1 for the lifecycle API, http://localhost:44772 for execd, and http://localhost:18080 for egress) when constructing requests.
Sandbox Lifecycle Management API
Defines the complete lifecycle interfaces for creating, managing, and destroying sandbox environments directly from container images.
Core Features:
- Sandbox Management: Create, list, query, and delete sandbox instances with metadata filters and pagination
- State Control: Pause and resume sandbox execution
- Lifecycle States: Supports transitions across Pending → Running → Pausing → Paused → Stopping → Terminated, and error handling with
Failed - Resource & Runtime Configuration: Specify CPU/memory/GPU resource limits, required
entrypoint, environment variables, and opaqueextensions - Image Support: Create sandboxes from public or private registries, including registry auth
- Timeout Management: Mandatory
timeouton creation with explicit renewal via API - Endpoint Access: Retrieve public access endpoints for services running inside sandboxes
Main Endpoints (base path /v1):
POST /sandboxes- Create a sandbox from an image with timeout and resource limitsGET /sandboxes- List sandboxes with state/metadata filters and paginationGET /sandboxes/{sandboxId}- Get full sandbox details (including image and entrypoint)DELETE /sandboxes/{sandboxId}- Delete a sandboxPOST /sandboxes/{sandboxId}/pause- Pause a sandbox (asynchronous)POST /sandboxes/{sandboxId}/resume- Resume a paused sandboxPOST /sandboxes/{sandboxId}/renew-expiration- Renew sandbox expiration (TTL)GET /sandboxes/{sandboxId}/endpoints/{port}- Get an access endpoint for a service port
Authentication:
- HTTP Header:
OPEN-SANDBOX-API-KEY: your-api-key - Environment Variable:
OPEN_SANDBOX_API_KEY(for SDK clients)
Sandbox Diagnostics API
Defines best-effort troubleshooting descriptors for sandbox diagnostic logs and events. The descriptors either embed plain-text diagnostic content inline or return a download URL for the content. This spec does not define a structured audit or observability model.
Main Endpoints (base path /v1):
GET /sandboxes/{sandboxId}/diagnostics/logs- Retrieve a diagnostic log content descriptor for an optional scopeGET /sandboxes/{sandboxId}/diagnostics/events- Retrieve a diagnostic event content descriptor for an optional scope
Authentication:
- HTTP Header:
OPEN-SANDBOX-API-KEY: your-api-key - Environment Variable:
OPEN_SANDBOX_API_KEY(for SDK clients)
Code Execution API Inside Sandbox
Defines interfaces for executing code, commands, and file operations within sandbox environments, providing complete code interpreter and filesystem management capabilities. All endpoints require the X-EXECD-ACCESS-TOKEN header.
Core Features:
- Code Execution: Stateful code execution supporting Python, JavaScript, and other languages with context lifecycle management
- Command Execution: Shell command execution with foreground/background modes and polling endpoints for status/output
- File Operations: Complete CRUD operations for files and directories
- Real-time Streaming: Real-time output streaming via SSE (Server-Sent Events)
- System Monitoring: Real-time monitoring of CPU and memory metrics
- Access Control: Token-based API authentication via
X-EXECD-ACCESS-TOKEN
Main Endpoint Categories:
Health Check:
GET /ping- Service health check
Code Interpreter:
GET /code/contexts- List active code execution contexts (filterable by language)DELETE /code/contexts- Delete all contexts for a languageDELETE /code/contexts/{context_id}- Delete a specific contextPOST /code/context- Create a code execution contextPOST /code- Execute code in a context (streaming output)DELETE /code- Interrupt code execution
Command Execution:
POST /command- Execute shell command (streaming output)DELETE /command- Interrupt command executionGET /command/status/{session}- Get foreground/background command statusGET /command/output/{session}- Fetch accumulated stdout/stderr for a command
Filesystem:
GET /files/info- Get metadata for filesDELETE /files- Delete files (not directories)POST /files/permissions- Change file permissionsPOST /files/mv- Move/rename filesGET /files/search- Search files (supports glob patterns)POST /files/replace- Batch replace file contentPOST /files/upload- Upload files (multipart)GET /files/download- Download files (supports range requests)
Directory Operations:
POST /directories- Create directories with permissions (mkdir -p semantics)DELETE /directories- Recursively delete directories
System Metrics:
GET /metrics- Get system resource metricsGET /metrics/watch- Watch system metrics in real-time (SSE stream)
Sandbox Egress Runtime API
Defines the runtime egress policy interface exposed directly by the egress sidecar inside a sandbox. Unlike lifecycle operations, this API is reached by first resolving the sandbox endpoint for the egress port and then calling the sidecar endpoint directly.
Core Features:
- Policy Inspection: Retrieve the currently enforced egress policy and derived runtime mode
- Policy Mutation: Patch egress rules at runtime using sidecar merge semantics
- Direct Sidecar Access: Access via sandbox endpoint resolution instead of server-side lifecycle forwarding
- Optional Sidecar Auth: Supports endpoint-specific headers when the egress sidecar requires auth
Main Endpoints:
GET /policy- Get the current egress policyPATCH /policy- Merge new egress rules into the current policy
Code execution and command execution interfaces use SSE for real-time streaming output, supporting the following event types:
init- Initialization eventstatus- Status updatestdout/stderr- Standard output/error streamsresult- Execution resultexecution_complete- Execution completedexecution_count- Execution counterror- Error information
Supports flexible resource configuration (similar to Kubernetes):
{
"cpu": "500m",
"memory": "512Mi",
"gpu": "1"
}Supports Unix-style file permission management:
- Owner
- Group
- Permission mode values such as 644 or 755