You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/advanced/security_isolation/index.mdx
+7-22Lines changed: 7 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ Windmill provides multiple layers of process isolation to protect your infrastru
7
7
Windmill workers execute user-provided code in various languages. To protect the worker process and the underlying infrastructure, Windmill implements multiple isolation strategies:
8
8
9
9
1.**PID Namespace Isolation** - Process memory and environment protection (disabled by default, requires configuration)
10
-
2.**NSJAIL Sandboxing** - Filesystem, network, and resource isolation (optional, requires special image)
10
+
2.**NSJAIL Sandboxing** - Filesystem, network, and resource isolation (optional)
11
11
3.**Agent Workers** - Workers without direct database access, communicating via the API
12
12
4.**Worker Groups** - Logical separation of workers that can be used to run workers on separate clusters with different network/resource access
13
13
@@ -203,7 +203,7 @@ This approach is particularly useful when:
203
203
204
204
Agent workers can be combined with PID namespace isolation or NSJAIL for defense-in-depth.
205
205
206
-
## NSJAIL sandboxing (ee only)
206
+
## NSJAIL sandboxing
207
207
208
208
### What is NSJAIL?
209
209
@@ -216,28 +216,15 @@ Agent workers can be combined with PID namespace isolation or NSJAIL for defense
216
216
217
217
### When is NSJAIL used?
218
218
219
-
NSJAIL is **disabled by default** because:
220
-
221
-
- The default Windmill images do not include the nsjail binary
222
-
- It requires using a special `-nsjail` tagged image
219
+
NSJAIL is **disabled by default**. All Windmill images include the nsjail binary, so no special image is required.
223
220
224
221
### Enabling NSJAIL
225
222
226
-
NSJAIL sandboxing is an EE only feature. If you are on CE, use PID namespace isolation.
227
-
228
-
To use NSJAIL sandboxing, you need both:
229
-
230
-
1. **Use the nsjail image** - Switch to an image with nsjail pre-installed:
231
-
232
-
```yaml
233
-
# In docker-compose.yml or your deployment config
234
-
image: ghcr.io/windmill-labs/windmill-ee-nsjail
235
-
```
223
+
To enable NSJAIL sandboxing, set the environment variable:
236
224
237
-
2. **Enable NSJAIL** - Set the environment variable:
Copy file name to clipboardExpand all lines: docs/core_concepts/47_environment_variables/index.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ You can use them in a Script by clicking on "+Context Var":
25
25
| SLEEP_QUEUE | 50 | The number of ms to sleep in between the last check for new jobs in the DB. It is multiplied by NUM_WORKERS such that in average, for one worker instance, there is one pull every SLEEP_QUEUE ms. | Worker |
26
26
| KEEP_JOB_DIR | false | Keep the job directory after the job is done. Useful for debugging. | Worker |
27
27
| ENABLE_UNSHARE_PID | false (true in docker-compose) | Enable PID namespace isolation to protect process memory and environment variables. Linux only. See [Security and Process Isolation](/docs/advanced/security_isolation)| Worker |
28
-
| DISABLE_NSJAIL | true | NSJAIL sandboxing status. Default `true` means NSJAIL is **disabled**. Set to `false` to enable NSJAIL (requires `-nsjail` image). See [Security and Process Isolation](/docs/advanced/security_isolation)| Worker |
28
+
| DISABLE_NSJAIL | true | NSJAIL sandboxing status. Default `true` means NSJAIL is **disabled**. Set to `false` to enable NSJAIL. See [Security and Process Isolation](/docs/advanced/security_isolation)| Worker |
29
29
| UNSHARE_ISOLATION_FLAGS | --user --map-root-user --pid --fork --mount-proc | Customize unshare isolation flags when ENABLE_UNSHARE_PID is true. See [Security and Process Isolation](/docs/advanced/security_isolation)| Worker |
30
30
| UNSHARE_TINI_PATH | tini | Path to tini binary for PID 1 signal handling in unshare namespaces. Ensures correct OOM exit codes. See [Security and Process Isolation](/docs/advanced/security_isolation)| Worker |
31
31
| LICENSE_KEY (EE only) | None | License key checked at startup for the Enterprise Edition of Windmill | Worker |
Copy file name to clipboardExpand all lines: docs/integrations/teams.mdx
+24Lines changed: 24 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -402,6 +402,30 @@ Instance-wide critical alerts are only visible to users with the [superadmin](..
402
402
/>
403
403
</div>
404
404
405
+
## Troubleshooting
406
+
407
+
### "The bot is not part of the conversation roster" error
408
+
409
+
This error occurs when Windmill tries to send a message to a Teams channel but the Bot Framework rejects the request. Common causes:
410
+
411
+
1.**Channel moderation rules**: If the Teams channel has posting restrictions (channel moderation enabled), the bot may not be allowed to post. Check your Teams channel settings and either:
412
+
- Disable channel moderation
413
+
- Add the Windmill bot to the list of users allowed to post
414
+
415
+
2.**Bot not installed in the team**: The Windmill Teams app must be installed in the team where you want to send messages. Verify the app appears in the team's "Apps" section.
416
+
417
+
3.**Bot ID mismatch** (self-hosted): For self-hosted instances, ensure your Azure AD App Registration client ID matches:
418
+
- The Microsoft App ID in your Azure Bot Service
419
+
- The `botId` in your Teams app manifest
420
+
421
+
### Messages not being delivered
422
+
423
+
If the bot appears to be connected but messages aren't being delivered, check the service URL region. The default service URL is for the Americas region. If your Teams tenant is in a different region, set the `TEAMS_SERVICE_URL` environment variable:
0 commit comments