Skip to content
Merged
26 changes: 24 additions & 2 deletions .agents/skills/check-pr/SKILL.md
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,9 @@ action.

## 2. If merged

Report the final state. No further action needed.
Report the final state. Then check for any unanswered review comments (both
top-level and inline) and reply to each one explaining what was done or that
the issue was addressed in a follow-up. Skip to step 6 after.

## 3. If closed without merge

Expand Down Expand Up @@ -75,7 +77,27 @@ another PR, closed by automation.
--field in_reply_to=<comment-id> \
--field body="<response>"
```
- End every comment with a `Generated by [Claude Code](https://claude.com/claude-code)` footer
- End every comment reply with a `Generated by [Claude Code](https://claude.com/claude-code)` footer
- Resolve each thread via GraphQL after replying:
```bash
# Get thread IDs
gh api graphql -f query='
query($owner:String!, $repo:String!, $pr:Int!) {
repository(owner:$owner, name:$repo) {
pullRequest(number:$pr) {
reviewThreads(first:50) {
nodes { id isResolved comments(first:1) { nodes { path } } }
}
}
}
}' -f owner=docker -f repo=docs -F pr=$ARGUMENTS \
--jq '.data.repository.pullRequest.reviewThreads.nodes[] | select(.isResolved == false) | {id, path: .comments.nodes[0].path}'

# Resolve a thread
gh api graphql -f query='
mutation($id:ID!) { resolveReviewThread(input:{threadId:$id}) { thread { isResolved } } }
' -f id=<thread-id>
```
- Re-request review if changes were requested

## 6. Report
Expand Down
8 changes: 5 additions & 3 deletions content/manuals/ai/sandboxes/agents/custom-environments.md
Original file line number Diff line number Diff line change
Expand Up @@ -86,9 +86,11 @@ CLI, and common development tools like Node.js, Python, Go, and Java.

Each variant also has a `-docker` version (for example,
`claude-code-docker`) that includes a full Docker Engine running inside the
sandbox. The `-docker` variants are the defaults used by `sbx run` on macOS
and Linux. They run in privileged mode with a dedicated block volume at
`/var/lib/docker`, and `dockerd` starts automatically.
sandbox — no local Docker daemon required. The `-docker` variants are the
defaults used by `sbx run` on macOS and Linux. These variants run in
privileged mode inside the microVM (not on your host), with a dedicated block
volume at `/var/lib/docker`, and `dockerd` starts automatically inside the
sandbox.

The block volume defaults to 50 GB and uses a sparse file, so it only
consumes disk space as Docker writes to it. On Windows, the volume is not
Expand Down
9 changes: 3 additions & 6 deletions content/manuals/ai/sandboxes/docker-desktop.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,8 +9,8 @@ weight: 80

Docker Desktop includes a built-in sandbox feature for running AI coding
agents in isolated microVMs using the `docker sandbox` command. This is a
convenience integration with limited features compared to the standalone
sandbox CLI.
convenience integration. For full functionality, use the standalone `sbx`
CLI instead.

> [!NOTE]
> The standalone `sbx` CLI provides more features, more flexibility, and doesn't
Expand Down Expand Up @@ -112,10 +112,7 @@ $ docker sandbox run <name> -- --continue
Each sandbox is a lightweight microVM with its own kernel, using your system's
native virtualization (macOS virtualization.framework, Windows Hyper-V). The
default agent templates include a private Docker daemon, so `docker build` and
`docker compose up` run inside the sandbox without affecting your host. On
Windows, the Docker daemon is not included by default. See
[Troubleshooting](troubleshooting.md#docker-not-available-inside-the-sandbox-on-windows)
for a workaround.
`docker compose up` run inside the sandbox without affecting your host.

```plaintext
Host system
Expand Down
4 changes: 2 additions & 2 deletions content/manuals/ai/sandboxes/get-started.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,8 +15,8 @@ system.
## Prerequisites

- macOS (Apple silicon) or Windows (x86_64, Windows 11 required)
- If you're on Windows, enable Windows Hypervisor Platform (requires
elevated permissions):
- If you're on Windows, enable Windows Hypervisor Platform. Open an elevated
PowerShell prompt (Run as Administrator) and run:
```powershell
Enable-WindowsOptionalFeature -Online -FeatureName HypervisorPlatform -All
```
Expand Down
3 changes: 2 additions & 1 deletion content/manuals/ai/sandboxes/troubleshooting.md
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,7 @@ If credentials are configured correctly but API calls still fail, check
the `transparent` proxy don't get credential injection. This can happen when a
client inside the sandbox (such as a process in a Docker container) isn't
configured to use the forward proxy. See
[Monitoring network activity](security/policy.md#monitoring-network-activity)
[Monitoring network activity](security/policy.md#monitoring)
for details.

## Docker not available inside the sandbox on Windows
Expand All @@ -83,6 +83,7 @@ an unprivileged user without `CAP_CHOWN`, so the operation is denied.
Use the tar exporter and extract the archive instead:

```console
$ mkdir -p ./result
$ docker build --output type=tar,dest=- . | tar xf - -C ./result
```

Expand Down