Hey Colin,
I’ve set the sandbox.json settings on my machine to access my docker daemon through ./Users/brendand/.docker added to additionalReadwritePaths in my machine’s top level sandbox.json
"additionalReadwritePaths": [
"/Users/brendand/.docker",
"/Users/brendand/.docker/run"
]
but get permission denied while trying to connect to the docker API at unix:////.docker/run/docker.sock
when trying to pull an image from our docker registry domain that we’ve allow listed in our enterprise settings.
This is on MacOS. Any ideas?
Claude is giving me this
”Still failing. The issue may be that on macOS, the sandbox-exec (seatbelt) implementation has specific restrictions on Unix domain sockets that can’t be lifted via file path permissions alone. The sandbox.json file path configuration might work for regular files but not for Unix sockets.
This could be a bug or limitation in Cursor’s sandbox implementation on macOS. The docs example shows “/home/me/.docker” which is a Linux path - it’s possible the Docker socket access via additionalReadwritePaths was only tested/implemented for Linux (which uses Landlock).”