mirror of
https://github.com/harivansh-afk/sandbox-agent.git
synced 2026-04-17 03:03:48 +00:00
chore: simplify examples and print UI URL in runPrompt
- Remove logInspectorUrl calls from all examples - Remove isMainModule checks from e2b, docker, vercel examples - Simplify e2b, docker, vercel to match daytona's direct execution style - Print UI URL at start of runPrompt in shared module
This commit is contained in:
parent
daffabf74c
commit
36c4dde9d2
7 changed files with 120 additions and 207 deletions
|
|
@ -1,5 +1,5 @@
|
||||||
import { Daytona, Image } from "@daytonaio/sdk";
|
import { Daytona, Image } from "@daytonaio/sdk";
|
||||||
import { logInspectorUrl, runPrompt } from "@sandbox-agent/example-shared";
|
import { runPrompt } from "@sandbox-agent/example-shared";
|
||||||
|
|
||||||
const daytona = new Daytona();
|
const daytona = new Daytona();
|
||||||
|
|
||||||
|
|
@ -23,7 +23,6 @@ await sandbox.process.executeCommand(
|
||||||
);
|
);
|
||||||
|
|
||||||
const baseUrl = (await sandbox.getSignedPreviewUrl(3000, 4 * 60 * 60)).url;
|
const baseUrl = (await sandbox.getSignedPreviewUrl(3000, 4 * 60 * 60)).url;
|
||||||
logInspectorUrl({ baseUrl });
|
|
||||||
|
|
||||||
const cleanup = async () => {
|
const cleanup = async () => {
|
||||||
await sandbox.delete(60);
|
await sandbox.delete(60);
|
||||||
|
|
|
||||||
|
|
@ -1,5 +1,5 @@
|
||||||
import { Daytona } from "@daytonaio/sdk";
|
import { Daytona } from "@daytonaio/sdk";
|
||||||
import { logInspectorUrl, runPrompt } from "@sandbox-agent/example-shared";
|
import { runPrompt } from "@sandbox-agent/example-shared";
|
||||||
|
|
||||||
const daytona = new Daytona();
|
const daytona = new Daytona();
|
||||||
|
|
||||||
|
|
@ -24,7 +24,6 @@ await sandbox.process.executeCommand(
|
||||||
);
|
);
|
||||||
|
|
||||||
const baseUrl = (await sandbox.getSignedPreviewUrl(3000, 4 * 60 * 60)).url;
|
const baseUrl = (await sandbox.getSignedPreviewUrl(3000, 4 * 60 * 60)).url;
|
||||||
logInspectorUrl({ baseUrl });
|
|
||||||
|
|
||||||
const cleanup = async () => {
|
const cleanup = async () => {
|
||||||
await sandbox.delete(60);
|
await sandbox.delete(60);
|
||||||
|
|
|
||||||
|
|
@ -1,84 +1,56 @@
|
||||||
import Docker from "dockerode";
|
import Docker from "dockerode";
|
||||||
import { logInspectorUrl, runPrompt, waitForHealth } from "@sandbox-agent/example-shared";
|
import { runPrompt, waitForHealth } from "@sandbox-agent/example-shared";
|
||||||
|
|
||||||
// Alpine is required because Claude Code binary is built for musl libc
|
|
||||||
const IMAGE = "alpine:latest";
|
const IMAGE = "alpine:latest";
|
||||||
const PORT = 3000;
|
const PORT = 3000;
|
||||||
|
|
||||||
export async function setupDockerSandboxAgent(): Promise<{
|
const docker = new Docker({ socketPath: "/var/run/docker.sock" });
|
||||||
baseUrl: string;
|
|
||||||
token?: string;
|
|
||||||
cleanup: () => Promise<void>;
|
|
||||||
}> {
|
|
||||||
const docker = new Docker({ socketPath: "/var/run/docker.sock" });
|
|
||||||
|
|
||||||
// Pull image if needed
|
// Pull image if needed
|
||||||
try {
|
try {
|
||||||
await docker.getImage(IMAGE).inspect();
|
await docker.getImage(IMAGE).inspect();
|
||||||
} catch {
|
} catch {
|
||||||
console.log(`Pulling ${IMAGE}...`);
|
console.log(`Pulling ${IMAGE}...`);
|
||||||
await new Promise<void>((resolve, reject) => {
|
await new Promise<void>((resolve, reject) => {
|
||||||
docker.pull(IMAGE, (err: Error | null, stream: NodeJS.ReadableStream) => {
|
docker.pull(IMAGE, (err: Error | null, stream: NodeJS.ReadableStream) => {
|
||||||
if (err) return reject(err);
|
if (err) return reject(err);
|
||||||
docker.modem.followProgress(stream, (err: Error | null) => err ? reject(err) : resolve());
|
docker.modem.followProgress(stream, (err: Error | null) => err ? reject(err) : resolve());
|
||||||
});
|
|
||||||
});
|
});
|
||||||
}
|
|
||||||
|
|
||||||
console.log("Starting container...");
|
|
||||||
const container = await docker.createContainer({
|
|
||||||
Image: IMAGE,
|
|
||||||
Cmd: ["sh", "-c", [
|
|
||||||
// Install dependencies (Alpine uses apk, not apt-get)
|
|
||||||
"apk add --no-cache curl ca-certificates libstdc++ libgcc bash",
|
|
||||||
"curl -fsSL https://releases.rivet.dev/sandbox-agent/latest/install.sh | sh",
|
|
||||||
"sandbox-agent install-agent claude",
|
|
||||||
"sandbox-agent install-agent codex",
|
|
||||||
`sandbox-agent server --no-token --host 0.0.0.0 --port ${PORT}`,
|
|
||||||
].join(" && ")],
|
|
||||||
Env: [
|
|
||||||
process.env.ANTHROPIC_API_KEY ? `ANTHROPIC_API_KEY=${process.env.ANTHROPIC_API_KEY}` : "",
|
|
||||||
process.env.OPENAI_API_KEY ? `OPENAI_API_KEY=${process.env.OPENAI_API_KEY}` : "",
|
|
||||||
].filter(Boolean),
|
|
||||||
ExposedPorts: { [`${PORT}/tcp`]: {} },
|
|
||||||
HostConfig: {
|
|
||||||
AutoRemove: true,
|
|
||||||
PortBindings: { [`${PORT}/tcp`]: [{ HostPort: `${PORT}` }] },
|
|
||||||
},
|
|
||||||
});
|
});
|
||||||
await container.start();
|
|
||||||
|
|
||||||
const baseUrl = `http://127.0.0.1:${PORT}`;
|
|
||||||
await waitForHealth({ baseUrl });
|
|
||||||
|
|
||||||
const cleanup = async () => {
|
|
||||||
console.log("Cleaning up...");
|
|
||||||
try { await container.stop({ t: 5 }); } catch {}
|
|
||||||
try { await container.remove({ force: true }); } catch {}
|
|
||||||
};
|
|
||||||
|
|
||||||
return { baseUrl, cleanup };
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Run interactively if executed directly
|
console.log("Starting container...");
|
||||||
const isMainModule = import.meta.url === `file://${process.argv[1]}`;
|
const container = await docker.createContainer({
|
||||||
if (isMainModule) {
|
Image: IMAGE,
|
||||||
if (!process.env.OPENAI_API_KEY && !process.env.ANTHROPIC_API_KEY) {
|
Cmd: ["sh", "-c", [
|
||||||
throw new Error("OPENAI_API_KEY or ANTHROPIC_API_KEY required");
|
"apk add --no-cache curl ca-certificates libstdc++ libgcc bash",
|
||||||
}
|
"curl -fsSL https://releases.rivet.dev/sandbox-agent/latest/install.sh | sh",
|
||||||
|
"sandbox-agent install-agent claude",
|
||||||
|
"sandbox-agent install-agent codex",
|
||||||
|
`sandbox-agent server --no-token --host 0.0.0.0 --port ${PORT}`,
|
||||||
|
].join(" && ")],
|
||||||
|
Env: [
|
||||||
|
process.env.ANTHROPIC_API_KEY ? `ANTHROPIC_API_KEY=${process.env.ANTHROPIC_API_KEY}` : "",
|
||||||
|
process.env.OPENAI_API_KEY ? `OPENAI_API_KEY=${process.env.OPENAI_API_KEY}` : "",
|
||||||
|
].filter(Boolean),
|
||||||
|
ExposedPorts: { [`${PORT}/tcp`]: {} },
|
||||||
|
HostConfig: {
|
||||||
|
AutoRemove: true,
|
||||||
|
PortBindings: { [`${PORT}/tcp`]: [{ HostPort: `${PORT}` }] },
|
||||||
|
},
|
||||||
|
});
|
||||||
|
await container.start();
|
||||||
|
|
||||||
const { baseUrl, cleanup } = await setupDockerSandboxAgent();
|
const baseUrl = `http://127.0.0.1:${PORT}`;
|
||||||
logInspectorUrl({ baseUrl });
|
await waitForHealth({ baseUrl });
|
||||||
|
|
||||||
process.once("SIGINT", async () => {
|
const cleanup = async () => {
|
||||||
await cleanup();
|
try { await container.stop({ t: 5 }); } catch {}
|
||||||
process.exit(0);
|
try { await container.remove({ force: true }); } catch {}
|
||||||
});
|
process.exit(0);
|
||||||
process.once("SIGTERM", async () => {
|
};
|
||||||
await cleanup();
|
process.once("SIGINT", cleanup);
|
||||||
process.exit(0);
|
process.once("SIGTERM", cleanup);
|
||||||
});
|
|
||||||
|
|
||||||
await runPrompt(baseUrl);
|
await runPrompt(baseUrl);
|
||||||
await cleanup();
|
await cleanup();
|
||||||
}
|
|
||||||
|
|
|
||||||
|
|
@ -1,65 +1,40 @@
|
||||||
import { Sandbox } from "@e2b/code-interpreter";
|
import { Sandbox } from "@e2b/code-interpreter";
|
||||||
import { logInspectorUrl, runPrompt, waitForHealth } from "@sandbox-agent/example-shared";
|
import { runPrompt, waitForHealth } from "@sandbox-agent/example-shared";
|
||||||
|
|
||||||
export async function setupE2BSandboxAgent(): Promise<{
|
const envs: Record<string, string> = {};
|
||||||
baseUrl: string;
|
if (process.env.ANTHROPIC_API_KEY) envs.ANTHROPIC_API_KEY = process.env.ANTHROPIC_API_KEY;
|
||||||
token?: string;
|
if (process.env.OPENAI_API_KEY) envs.OPENAI_API_KEY = process.env.OPENAI_API_KEY;
|
||||||
cleanup: () => Promise<void>;
|
|
||||||
}> {
|
|
||||||
const envs: Record<string, string> = {};
|
|
||||||
if (process.env.ANTHROPIC_API_KEY) envs.ANTHROPIC_API_KEY = process.env.ANTHROPIC_API_KEY;
|
|
||||||
if (process.env.OPENAI_API_KEY) envs.OPENAI_API_KEY = process.env.OPENAI_API_KEY;
|
|
||||||
|
|
||||||
const sandbox = await Sandbox.create({ allowInternetAccess: true, envs });
|
console.log("Creating E2B sandbox...");
|
||||||
const run = async (cmd: string) => {
|
const sandbox = await Sandbox.create({ allowInternetAccess: true, envs });
|
||||||
const result = await sandbox.commands.run(cmd);
|
|
||||||
if (result.exitCode !== 0) throw new Error(`Command failed: ${cmd}\n${result.stderr}`);
|
|
||||||
return result;
|
|
||||||
};
|
|
||||||
|
|
||||||
console.log("Installing sandbox-agent...");
|
const run = async (cmd: string) => {
|
||||||
await run("curl -fsSL https://releases.rivet.dev/sandbox-agent/latest/install.sh | sh");
|
const result = await sandbox.commands.run(cmd);
|
||||||
|
if (result.exitCode !== 0) throw new Error(`Command failed: ${cmd}\n${result.stderr}`);
|
||||||
|
return result;
|
||||||
|
};
|
||||||
|
|
||||||
console.log("Installing agents...");
|
console.log("Installing sandbox-agent...");
|
||||||
await run("sandbox-agent install-agent claude");
|
await run("curl -fsSL https://releases.rivet.dev/sandbox-agent/latest/install.sh | sh");
|
||||||
await run("sandbox-agent install-agent codex");
|
|
||||||
|
|
||||||
console.log("Starting server...");
|
console.log("Installing agents...");
|
||||||
await sandbox.commands.run("sandbox-agent server --no-token --host 0.0.0.0 --port 3000", { background: true });
|
await run("sandbox-agent install-agent claude");
|
||||||
|
await run("sandbox-agent install-agent codex");
|
||||||
|
|
||||||
const baseUrl = `https://${sandbox.getHost(3000)}`;
|
console.log("Starting server...");
|
||||||
|
await sandbox.commands.run("sandbox-agent server --no-token --host 0.0.0.0 --port 3000", { background: true });
|
||||||
|
|
||||||
// Wait for server to be ready
|
const baseUrl = `https://${sandbox.getHost(3000)}`;
|
||||||
console.log("Waiting for server...");
|
|
||||||
await waitForHealth({ baseUrl });
|
|
||||||
|
|
||||||
const cleanup = async () => {
|
console.log("Waiting for server...");
|
||||||
console.log("Cleaning up...");
|
await waitForHealth({ baseUrl });
|
||||||
await sandbox.kill();
|
|
||||||
};
|
|
||||||
|
|
||||||
return { baseUrl, cleanup };
|
const cleanup = async () => {
|
||||||
}
|
await sandbox.kill();
|
||||||
|
process.exit(0);
|
||||||
|
};
|
||||||
|
process.once("SIGINT", cleanup);
|
||||||
|
process.once("SIGTERM", cleanup);
|
||||||
|
|
||||||
// Run interactively if executed directly
|
await runPrompt(baseUrl);
|
||||||
const isMainModule = import.meta.url === `file://${process.argv[1]}`;
|
await cleanup();
|
||||||
if (isMainModule) {
|
|
||||||
if (!process.env.OPENAI_API_KEY && !process.env.ANTHROPIC_API_KEY) {
|
|
||||||
throw new Error("E2B_API_KEY and (OPENAI_API_KEY or ANTHROPIC_API_KEY) required");
|
|
||||||
}
|
|
||||||
|
|
||||||
const { baseUrl, cleanup } = await setupE2BSandboxAgent();
|
|
||||||
logInspectorUrl({ baseUrl });
|
|
||||||
|
|
||||||
process.once("SIGINT", async () => {
|
|
||||||
await cleanup();
|
|
||||||
process.exit(0);
|
|
||||||
});
|
|
||||||
process.once("SIGTERM", async () => {
|
|
||||||
await cleanup();
|
|
||||||
process.exit(0);
|
|
||||||
});
|
|
||||||
|
|
||||||
await runPrompt(baseUrl);
|
|
||||||
await cleanup();
|
|
||||||
}
|
|
||||||
|
|
|
||||||
|
|
@ -118,6 +118,8 @@ function detectAgent(): string {
|
||||||
}
|
}
|
||||||
|
|
||||||
export async function runPrompt(baseUrl: string): Promise<void> {
|
export async function runPrompt(baseUrl: string): Promise<void> {
|
||||||
|
console.log(`UI: ${buildInspectorUrl({ baseUrl })}`);
|
||||||
|
|
||||||
const client = await SandboxAgent.connect({ baseUrl });
|
const client = await SandboxAgent.connect({ baseUrl });
|
||||||
|
|
||||||
const agent = detectAgent();
|
const agent = detectAgent();
|
||||||
|
|
|
||||||
2
examples/vercel/.gitignore
vendored
Normal file
2
examples/vercel/.gitignore
vendored
Normal file
|
|
@ -0,0 +1,2 @@
|
||||||
|
.vercel
|
||||||
|
.env*.local
|
||||||
|
|
@ -1,87 +1,51 @@
|
||||||
import { Sandbox } from "@vercel/sandbox";
|
import { Sandbox } from "@vercel/sandbox";
|
||||||
import { logInspectorUrl, runPrompt, waitForHealth } from "@sandbox-agent/example-shared";
|
import { runPrompt, waitForHealth } from "@sandbox-agent/example-shared";
|
||||||
|
|
||||||
export async function setupVercelSandboxAgent(): Promise<{
|
const envs: Record<string, string> = {};
|
||||||
baseUrl: string;
|
if (process.env.ANTHROPIC_API_KEY) envs.ANTHROPIC_API_KEY = process.env.ANTHROPIC_API_KEY;
|
||||||
token?: string;
|
if (process.env.OPENAI_API_KEY) envs.OPENAI_API_KEY = process.env.OPENAI_API_KEY;
|
||||||
cleanup: () => Promise<void>;
|
|
||||||
}> {
|
|
||||||
// Build env vars for agent API keys
|
|
||||||
const envs: Record<string, string> = {};
|
|
||||||
if (process.env.ANTHROPIC_API_KEY) envs.ANTHROPIC_API_KEY = process.env.ANTHROPIC_API_KEY;
|
|
||||||
if (process.env.OPENAI_API_KEY) envs.OPENAI_API_KEY = process.env.OPENAI_API_KEY;
|
|
||||||
|
|
||||||
// Create sandbox with port 3000 exposed
|
console.log("Creating Vercel sandbox...");
|
||||||
const sandbox = await Sandbox.create({
|
const sandbox = await Sandbox.create({
|
||||||
runtime: "node24",
|
runtime: "node24",
|
||||||
ports: [3000],
|
ports: [3000],
|
||||||
});
|
});
|
||||||
|
|
||||||
// Helper to run commands and check exit code
|
const run = async (cmd: string, args: string[] = []) => {
|
||||||
const run = async (cmd: string, args: string[] = []) => {
|
const result = await sandbox.runCommand({ cmd, args, env: envs });
|
||||||
const result = await sandbox.runCommand({ cmd, args, env: envs });
|
if (result.exitCode !== 0) {
|
||||||
if (result.exitCode !== 0) {
|
const stderr = await result.stderr();
|
||||||
const stderr = await result.stderr();
|
throw new Error(`Command failed: ${cmd} ${args.join(" ")}\n${stderr}`);
|
||||||
throw new Error(`Command failed: ${cmd} ${args.join(" ")}\n${stderr}`);
|
|
||||||
}
|
|
||||||
return result;
|
|
||||||
};
|
|
||||||
|
|
||||||
console.log("Installing sandbox-agent...");
|
|
||||||
await run("sh", ["-c", "curl -fsSL https://releases.rivet.dev/sandbox-agent/latest/install.sh | sh"]);
|
|
||||||
|
|
||||||
console.log("Installing agents...");
|
|
||||||
await run("sandbox-agent", ["install-agent", "claude"]);
|
|
||||||
await run("sandbox-agent", ["install-agent", "codex"]);
|
|
||||||
|
|
||||||
console.log("Starting server...");
|
|
||||||
await sandbox.runCommand({
|
|
||||||
cmd: "sandbox-agent",
|
|
||||||
args: ["server", "--no-token", "--host", "0.0.0.0", "--port", "3000"],
|
|
||||||
env: envs,
|
|
||||||
detached: true,
|
|
||||||
});
|
|
||||||
|
|
||||||
const baseUrl = sandbox.domain(3000);
|
|
||||||
|
|
||||||
console.log("Waiting for server...");
|
|
||||||
await waitForHealth({ baseUrl });
|
|
||||||
|
|
||||||
const cleanup = async () => {
|
|
||||||
console.log("Cleaning up...");
|
|
||||||
await sandbox.stop();
|
|
||||||
};
|
|
||||||
|
|
||||||
return { baseUrl, cleanup };
|
|
||||||
}
|
|
||||||
|
|
||||||
// Run interactively if executed directly
|
|
||||||
const isMainModule = import.meta.url === `file://${process.argv[1]}`;
|
|
||||||
if (isMainModule) {
|
|
||||||
// Check for Vercel auth
|
|
||||||
if (!process.env.VERCEL_OIDC_TOKEN && !process.env.VERCEL_ACCESS_TOKEN) {
|
|
||||||
throw new Error("Vercel authentication required. Run 'vercel env pull' or set VERCEL_ACCESS_TOKEN");
|
|
||||||
}
|
}
|
||||||
|
return result;
|
||||||
|
};
|
||||||
|
|
||||||
if (!process.env.OPENAI_API_KEY && !process.env.ANTHROPIC_API_KEY) {
|
console.log("Installing sandbox-agent...");
|
||||||
throw new Error("OPENAI_API_KEY or ANTHROPIC_API_KEY required");
|
await run("sh", ["-c", "curl -fsSL https://releases.rivet.dev/sandbox-agent/latest/install.sh | sh"]);
|
||||||
}
|
|
||||||
|
|
||||||
const { baseUrl, cleanup } = await setupVercelSandboxAgent();
|
console.log("Installing agents...");
|
||||||
logInspectorUrl({ baseUrl });
|
await run("sandbox-agent", ["install-agent", "claude"]);
|
||||||
|
await run("sandbox-agent", ["install-agent", "codex"]);
|
||||||
|
|
||||||
process.once("SIGINT", async () => {
|
console.log("Starting server...");
|
||||||
await cleanup();
|
await sandbox.runCommand({
|
||||||
process.exit(0);
|
cmd: "sandbox-agent",
|
||||||
});
|
args: ["server", "--no-token", "--host", "0.0.0.0", "--port", "3000"],
|
||||||
process.once("SIGTERM", async () => {
|
env: envs,
|
||||||
await cleanup();
|
detached: true,
|
||||||
process.exit(0);
|
});
|
||||||
});
|
|
||||||
|
|
||||||
await runPrompt({
|
const baseUrl = sandbox.domain(3000);
|
||||||
baseUrl,
|
|
||||||
autoApprovePermissions: process.env.AUTO_APPROVE_PERMISSIONS === "true",
|
console.log("Waiting for server...");
|
||||||
});
|
await waitForHealth({ baseUrl });
|
||||||
await cleanup();
|
|
||||||
}
|
const cleanup = async () => {
|
||||||
|
await sandbox.stop();
|
||||||
|
process.exit(0);
|
||||||
|
};
|
||||||
|
process.once("SIGINT", cleanup);
|
||||||
|
process.once("SIGTERM", cleanup);
|
||||||
|
|
||||||
|
await runPrompt(baseUrl);
|
||||||
|
await cleanup();
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue