mirror of
https://github.com/harivansh-afk/sandbox-agent.git
synced 2026-04-15 09:01:17 +00:00
* SDK sandbox provisioning: built-in providers, docs restructure, and quickstart overhaul - Add built-in sandbox providers (local, docker, e2b, daytona, vercel, cloudflare) to the TypeScript SDK so users import directly instead of passing client instances - Restructure docs: rename architecture to orchestration-architecture, add new architecture page for server overview, improve getting started flow - Rewrite quickstart to be TypeScript-first with provider CodeGroup and custom provider accordion - Update all examples to use new provider APIs - Update persist drivers and foundry for new SDK surface Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> * Fix SDK typecheck errors and update persist drivers for insertEvent signature - Fix insertEvent call in client.ts to pass sessionId as first argument - Update Daytona provider create options to use Partial type (image has default) - Update StrictUniqueSessionPersistDriver in tests to match new insertEvent signature - Sync persist packages, openapi spec, and docs with upstream changes Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> * Add Modal and ComputeSDK built-in providers, update examples and docs - Add `sandbox-agent/modal` provider using Modal SDK with node:22-slim image - Add `sandbox-agent/computesdk` provider using ComputeSDK's unified sandbox API - Update Modal and ComputeSDK examples to use new SDK providers - Update Modal and ComputeSDK deploy docs with provider-based examples - Add Modal to quickstart CodeGroup and docs.json navigation - Add provider test entries for Modal and ComputeSDK - Remove old standalone example files (modal.ts, computesdk.ts) Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> * Fix Modal provider: pre-install agents in image, fire-and-forget exec for server - Pre-install agents in Dockerfile commands so they are cached across creates - Use fire-and-forget exec (no wait) to keep server alive in Modal sandbox - Add memoryMiB option (default 2GB) to avoid OOM during agent install Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> * Sync upstream changes: multiplayer docs, logos, openapi spec, foundry config Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> * SDK: Add ensureServer() for automatic server recovery Add ensureServer() to SandboxProvider interface to handle cases where the sandbox-agent server stops or goes to sleep. The SDK now calls this method after 3 consecutive health-check failures, allowing providers to restart the server if needed. Most built-in providers (E2B, Daytona, Vercel, Modal, ComputeSDK) implement this. Docker and Cloudflare manage server lifecycle differently, and Local uses managed child processes. Also update docs for quickstart, architecture, multiplayer, and session persistence; mark persist-* packages as deprecated; and add ensureServer implementations to all applicable providers. Co-Authored-By: Claude Haiku 4.5 <noreply@anthropic.com> * wip --------- Co-authored-by: Claude Opus 4.6 <noreply@anthropic.com>
173 lines
5.5 KiB
TypeScript
173 lines
5.5 KiB
TypeScript
import { createInterface } from "node:readline/promises";
|
|
import { stdin as input, stdout as output } from "node:process";
|
|
import { Command } from "commander";
|
|
import { SandboxAgent, type PermissionReply, type SessionPermissionRequest } from "sandbox-agent";
|
|
import { local } from "sandbox-agent/local";
|
|
|
|
const options = parseOptions();
|
|
const agent = options.agent.trim().toLowerCase();
|
|
const autoReply = parsePermissionReply(options.reply);
|
|
const promptText = options.prompt?.trim() || `Create ./permission-example.txt with the text 'hello from the ${agent} permissions example'.`;
|
|
|
|
const sdk = await SandboxAgent.start({
|
|
sandbox: local({ log: "inherit" }),
|
|
});
|
|
|
|
try {
|
|
await sdk.installAgent(agent);
|
|
|
|
const agents = await sdk.listAgents({ config: true });
|
|
const selectedAgent = agents.agents.find((entry) => entry.id === agent);
|
|
const configOptions = Array.isArray(selectedAgent?.configOptions)
|
|
? (selectedAgent.configOptions as Array<{ category?: string; currentValue?: string; options?: unknown[] }>)
|
|
: [];
|
|
const modeOption = configOptions.find((option) => option.category === "mode");
|
|
const availableModes = extractOptionValues(modeOption);
|
|
const mode = options.mode?.trim() || (typeof modeOption?.currentValue === "string" ? modeOption.currentValue : "") || availableModes[0] || "";
|
|
|
|
console.log(`Agent: ${agent}`);
|
|
console.log(`Mode: ${mode || "(default)"}`);
|
|
if (availableModes.length > 0) {
|
|
console.log(`Available modes: ${availableModes.join(", ")}`);
|
|
}
|
|
console.log(`Working directory: ${process.cwd()}`);
|
|
console.log(`Prompt: ${promptText}`);
|
|
if (autoReply) {
|
|
console.log(`Automatic permission reply: ${autoReply}`);
|
|
} else {
|
|
console.log("Interactive permission replies enabled.");
|
|
}
|
|
|
|
const session = await sdk.createSession({
|
|
agent,
|
|
...(mode ? { mode } : {}),
|
|
cwd: process.cwd(),
|
|
});
|
|
|
|
const rl = autoReply
|
|
? null
|
|
: createInterface({
|
|
input,
|
|
output,
|
|
});
|
|
|
|
session.onPermissionRequest((request: SessionPermissionRequest) => {
|
|
void handlePermissionRequest(session, request, autoReply, rl);
|
|
});
|
|
|
|
const response = await session.prompt([{ type: "text", text: promptText }]);
|
|
console.log(`Prompt finished with stopReason=${response.stopReason}`);
|
|
|
|
await rl?.close();
|
|
} finally {
|
|
await sdk.dispose();
|
|
}
|
|
|
|
async function handlePermissionRequest(
|
|
session: {
|
|
respondPermission(permissionId: string, reply: PermissionReply): Promise<void>;
|
|
},
|
|
request: SessionPermissionRequest,
|
|
auto: PermissionReply | null,
|
|
rl: ReturnType<typeof createInterface> | null,
|
|
): Promise<void> {
|
|
const reply = auto ?? (await promptForReply(request, rl));
|
|
console.log(`Permission ${reply}: ${request.toolCall.title ?? request.toolCall.toolCallId}`);
|
|
await session.respondPermission(request.id, reply);
|
|
}
|
|
|
|
async function promptForReply(request: SessionPermissionRequest, rl: ReturnType<typeof createInterface> | null): Promise<PermissionReply> {
|
|
if (!rl) {
|
|
return "reject";
|
|
}
|
|
|
|
const title = request.toolCall.title ?? request.toolCall.toolCallId;
|
|
const available = request.availableReplies;
|
|
console.log("");
|
|
console.log(`Permission request: ${title}`);
|
|
console.log(`Available replies: ${available.join(", ")}`);
|
|
const answer = (await rl.question("Reply [once|always|reject]: ")).trim().toLowerCase();
|
|
const parsed = parsePermissionReply(answer);
|
|
if (parsed && available.includes(parsed)) {
|
|
return parsed;
|
|
}
|
|
|
|
console.log("Invalid reply, defaulting to reject.");
|
|
return "reject";
|
|
}
|
|
|
|
function extractOptionValues(option: { options?: unknown[] } | undefined): string[] {
|
|
if (!option?.options) {
|
|
return [];
|
|
}
|
|
|
|
const values: string[] = [];
|
|
for (const entry of option.options) {
|
|
if (!entry || typeof entry !== "object") {
|
|
continue;
|
|
}
|
|
const value = "value" in entry && typeof entry.value === "string" ? entry.value : null;
|
|
if (value) {
|
|
values.push(value);
|
|
continue;
|
|
}
|
|
if (!("options" in entry) || !Array.isArray(entry.options)) {
|
|
continue;
|
|
}
|
|
for (const nested of entry.options) {
|
|
if (!nested || typeof nested !== "object") {
|
|
continue;
|
|
}
|
|
const nestedValue = "value" in nested && typeof nested.value === "string" ? nested.value : null;
|
|
if (nestedValue) {
|
|
values.push(nestedValue);
|
|
}
|
|
}
|
|
}
|
|
|
|
return [...new Set(values)];
|
|
}
|
|
|
|
function parsePermissionReply(value: string | undefined): PermissionReply | null {
|
|
if (!value) {
|
|
return null;
|
|
}
|
|
|
|
switch (value.trim().toLowerCase()) {
|
|
case "once":
|
|
return "once";
|
|
case "always":
|
|
return "always";
|
|
case "reject":
|
|
case "deny":
|
|
return "reject";
|
|
default:
|
|
return null;
|
|
}
|
|
}
|
|
|
|
function parseOptions(): {
|
|
agent: string;
|
|
mode?: string;
|
|
prompt?: string;
|
|
reply?: string;
|
|
} {
|
|
const argv = process.argv.slice(2);
|
|
const normalizedArgv = argv[0] === "--" ? argv.slice(1) : argv;
|
|
const program = new Command();
|
|
program
|
|
.name("permissions")
|
|
.description("Run a permissions example against an agent session.")
|
|
.requiredOption("--agent <agent>", "Agent to run, for example 'claude' or 'codex'")
|
|
.option("--mode <mode>", "Mode to configure for the session (uses agent default if omitted)")
|
|
.option("--prompt <text>", "Prompt to send after the session starts")
|
|
.option("--reply <reply>", "Automatically answer permission prompts with once, always, or reject");
|
|
|
|
program.parse(normalizedArgv, { from: "user" });
|
|
return program.opts<{
|
|
agent: string;
|
|
mode?: string;
|
|
prompt?: string;
|
|
reply?: string;
|
|
}>();
|
|
}
|