feat: refresh web console theme

This commit is contained in:
Nathan Flurry 2026-01-25 03:33:34 -08:00
parent 0fbf6272b1
commit 1fcae6ed76
34 changed files with 5037 additions and 748 deletions

View file

@ -8,7 +8,7 @@ The `sandbox-agent` CLI mirrors the HTTP API so you can script everything withou
## Server flags
```bash
sandbox-agent --token "$SANDBOX_TOKEN" --host 127.0.0.1 --port 8787
sandbox-agent --token "$SANDBOX_TOKEN" --host 127.0.0.1 --port 2468
```
- `--token`: global token for all requests.
@ -22,7 +22,7 @@ sandbox-agent --token "$SANDBOX_TOKEN" --host 127.0.0.1 --port 8787
<summary><strong>agents list</strong></summary>
```bash
sandbox-agent agents list --endpoint http://127.0.0.1:8787
sandbox-agent agents list --endpoint http://127.0.0.1:2468
```
</details>
@ -30,7 +30,7 @@ sandbox-agent agents list --endpoint http://127.0.0.1:8787
<summary><strong>agents install</strong></summary>
```bash
sandbox-agent agents install claude --reinstall --endpoint http://127.0.0.1:8787
sandbox-agent agents install claude --reinstall --endpoint http://127.0.0.1:2468
```
</details>
@ -38,7 +38,7 @@ sandbox-agent agents install claude --reinstall --endpoint http://127.0.0.1:8787
<summary><strong>agents modes</strong></summary>
```bash
sandbox-agent agents modes claude --endpoint http://127.0.0.1:8787
sandbox-agent agents modes claude --endpoint http://127.0.0.1:2468
```
</details>
@ -52,7 +52,7 @@ sandbox-agent sessions create my-session \
--agent claude \
--agent-mode build \
--permission-mode default \
--endpoint http://127.0.0.1:8787
--endpoint http://127.0.0.1:2468
```
</details>
@ -62,7 +62,7 @@ sandbox-agent sessions create my-session \
```bash
sandbox-agent sessions send-message my-session \
--message "Summarize the repository" \
--endpoint http://127.0.0.1:8787
--endpoint http://127.0.0.1:2468
```
</details>
@ -70,7 +70,7 @@ sandbox-agent sessions send-message my-session \
<summary><strong>sessions events</strong></summary>
```bash
sandbox-agent sessions events my-session --offset 0 --limit 50 --endpoint http://127.0.0.1:8787
sandbox-agent sessions events my-session --offset 0 --limit 50 --endpoint http://127.0.0.1:2468
```
</details>
@ -78,7 +78,7 @@ sandbox-agent sessions events my-session --offset 0 --limit 50 --endpoint http:/
<summary><strong>sessions events-sse</strong></summary>
```bash
sandbox-agent sessions events-sse my-session --offset 0 --endpoint http://127.0.0.1:8787
sandbox-agent sessions events-sse my-session --offset 0 --endpoint http://127.0.0.1:2468
```
</details>
@ -88,7 +88,7 @@ sandbox-agent sessions events-sse my-session --offset 0 --endpoint http://127.0.
```bash
sandbox-agent sessions reply-question my-session QUESTION_ID \
--answers "yes" \
--endpoint http://127.0.0.1:8787
--endpoint http://127.0.0.1:2468
```
</details>
@ -96,7 +96,7 @@ sandbox-agent sessions reply-question my-session QUESTION_ID \
<summary><strong>sessions reject-question</strong></summary>
```bash
sandbox-agent sessions reject-question my-session QUESTION_ID --endpoint http://127.0.0.1:8787
sandbox-agent sessions reject-question my-session QUESTION_ID --endpoint http://127.0.0.1:2468
```
</details>
@ -106,6 +106,6 @@ sandbox-agent sessions reject-question my-session QUESTION_ID --endpoint http://
```bash
sandbox-agent sessions reply-permission my-session PERMISSION_ID \
--reply once \
--endpoint http://127.0.0.1:8787
--endpoint http://127.0.0.1:2468
```
</details>

View file

@ -15,7 +15,7 @@ export SANDBOX_TOKEN="..."
cargo run -p sandbox-agent -- \
--token "$SANDBOX_TOKEN" \
--host 0.0.0.0 \
--port 8787
--port 2468
```
4. Connect your client to the sandbox endpoint.

View file

@ -7,7 +7,7 @@ description: "Run the daemon in a Daytona workspace."
1. Create a Daytona workspace with Rust and curl available.
2. Install or build the sandbox-agent binary.
3. Start the daemon and expose port `8787` (or your preferred port).
3. Start the daemon and expose port `2468` (or your preferred port).
```bash
export SANDBOX_TOKEN="..."
@ -15,7 +15,7 @@ export SANDBOX_TOKEN="..."
cargo run -p sandbox-agent -- \
--token "$SANDBOX_TOKEN" \
--host 0.0.0.0 \
--port 8787
--port 2468
```
4. Use your Daytona port forwarding to reach the daemon from your client.

View file

@ -18,10 +18,10 @@ The binary will be written to `./artifacts/sandbox-agent-x86_64-unknown-linux-mu
## Run the daemon
```bash
docker run --rm -p 8787:8787 \
docker run --rm -p 2468:2468 \
-v "$PWD/artifacts:/artifacts" \
debian:bookworm-slim \
/artifacts/sandbox-agent-x86_64-unknown-linux-musl --token "$SANDBOX_TOKEN" --host 0.0.0.0 --port 8787
/artifacts/sandbox-agent-x86_64-unknown-linux-musl --token "$SANDBOX_TOKEN" --host 0.0.0.0 --port 2468
```
You can now access the API at `http://localhost:8787`.
You can now access the API at `http://localhost:2468`.

View file

@ -19,7 +19,7 @@ export SANDBOX_TOKEN="..."
cargo run -p sandbox-agent -- \
--token "$SANDBOX_TOKEN" \
--host 0.0.0.0 \
--port 8787
--port 2468
```
4. Configure your client to connect to the sandbox endpoint.

View file

@ -15,7 +15,7 @@ export SANDBOX_TOKEN="..."
cargo run -p sandbox-agent -- \
--token "$SANDBOX_TOKEN" \
--host 0.0.0.0 \
--port 8787
--port 2468
```
4. Configure your client to use the sandbox URL.

View file

@ -14,7 +14,7 @@ pnpm --filter @sandbox-agent/web dev
The UI expects:
- Endpoint (e.g. `http://127.0.0.1:8787`)
- Endpoint (e.g. `http://127.0.0.1:2468`)
- Optional token
If you see CORS errors, enable CORS on the daemon with `--cors-allow-origin` and related flags.

View file

@ -5,6 +5,18 @@ description: "Endpoint reference for the sandbox agent daemon."
All endpoints are under `/v1`. Authentication uses the daemon-level token via `Authorization: Bearer <token>` or `x-sandbox-token`.
## Health
<details>
<summary><strong>GET /v1/health</strong> - Connectivity check</summary>
Response:
```json
{ "status": "ok" }
```
</details>
## Sessions
<details>

View file

@ -18,18 +18,18 @@ Sandbox Agent SDK is a universal API and daemon for running coding agents inside
Run the daemon locally:
```bash
sandbox-agent --token "$SANDBOX_TOKEN" --host 127.0.0.1 --port 8787
sandbox-agent --token "$SANDBOX_TOKEN" --host 127.0.0.1 --port 2468
```
Send a message:
```bash
curl -X POST "http://127.0.0.1:8787/v1/sessions/my-session" \
curl -X POST "http://127.0.0.1:2468/v1/sessions/my-session" \
-H "Authorization: Bearer $SANDBOX_TOKEN" \
-H "Content-Type: application/json" \
-d '{"agent":"claude"}'
curl -X POST "http://127.0.0.1:8787/v1/sessions/my-session/messages" \
curl -X POST "http://127.0.0.1:2468/v1/sessions/my-session/messages" \
-H "Authorization: Bearer $SANDBOX_TOKEN" \
-H "Content-Type: application/json" \
-d '{"message":"Explain the repo structure."}'

View file

@ -8,13 +8,13 @@ description: "Start the daemon and send your first message."
Use the installed binary, or `cargo run` in development.
```bash
sandbox-agent --token "$SANDBOX_TOKEN" --host 127.0.0.1 --port 8787
sandbox-agent --token "$SANDBOX_TOKEN" --host 127.0.0.1 --port 2468
```
If you want to run without auth (local dev only):
```bash
sandbox-agent --no-token --host 127.0.0.1 --port 8787
sandbox-agent --no-token --host 127.0.0.1 --port 2468
```
### CORS (frontend usage)
@ -35,7 +35,7 @@ sandbox-agent \
## 2. Create a session
```bash
curl -X POST "http://127.0.0.1:8787/v1/sessions/my-session" \
curl -X POST "http://127.0.0.1:2468/v1/sessions/my-session" \
-H "Authorization: Bearer $SANDBOX_TOKEN" \
-H "Content-Type: application/json" \
-d '{"agent":"claude","agentMode":"build","permissionMode":"default"}'
@ -44,7 +44,7 @@ curl -X POST "http://127.0.0.1:8787/v1/sessions/my-session" \
## 3. Send a message
```bash
curl -X POST "http://127.0.0.1:8787/v1/sessions/my-session/messages" \
curl -X POST "http://127.0.0.1:2468/v1/sessions/my-session/messages" \
-H "Authorization: Bearer $SANDBOX_TOKEN" \
-H "Content-Type: application/json" \
-d '{"message":"Summarize the repository and suggest next steps."}'
@ -53,14 +53,14 @@ curl -X POST "http://127.0.0.1:8787/v1/sessions/my-session/messages" \
## 4. Read events
```bash
curl "http://127.0.0.1:8787/v1/sessions/my-session/events?offset=0&limit=50" \
curl "http://127.0.0.1:2468/v1/sessions/my-session/events?offset=0&limit=50" \
-H "Authorization: Bearer $SANDBOX_TOKEN"
```
For streaming output, use SSE:
```bash
curl "http://127.0.0.1:8787/v1/sessions/my-session/events/sse?offset=0" \
curl "http://127.0.0.1:2468/v1/sessions/my-session/events/sse?offset=0" \
-H "Authorization: Bearer $SANDBOX_TOKEN"
```
@ -69,7 +69,7 @@ curl "http://127.0.0.1:8787/v1/sessions/my-session/events/sse?offset=0" \
The CLI mirrors the HTTP API:
```bash
sandbox-agent sessions create my-session --agent claude --endpoint http://127.0.0.1:8787 --token "$SANDBOX_TOKEN"
sandbox-agent sessions create my-session --agent claude --endpoint http://127.0.0.1:2468 --token "$SANDBOX_TOKEN"
sandbox-agent sessions send-message my-session --message "Hello" --endpoint http://127.0.0.1:8787 --token "$SANDBOX_TOKEN"
sandbox-agent sessions send-message my-session --message "Hello" --endpoint http://127.0.0.1:2468 --token "$SANDBOX_TOKEN"
```

View file

@ -8,7 +8,7 @@ The TypeScript SDK is generated from the OpenAPI spec produced by the Rust serve
## Generate types
```bash
pnpm --filter @sandbox-agent/typescript-sdk generate
pnpm --filter sandbox-agent generate
```
This runs:
@ -19,10 +19,10 @@ This runs:
## Usage
```ts
import { SandboxDaemonClient } from "@sandbox-agent/typescript-sdk";
import { SandboxDaemonClient } from "sandbox-agent";
const client = new SandboxDaemonClient({
baseUrl: "http://127.0.0.1:8787",
baseUrl: "http://127.0.0.1:2468",
token: process.env.SANDBOX_TOKEN,
});