Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commite019af8

Browse files
committed
more format stuff
1 parent9377904 commite019af8

File tree

1 file changed

+34
-30
lines changed

1 file changed

+34
-30
lines changed

‎docs/ai-coder/agent-boundary.md‎

Lines changed: 34 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,17 @@
11
#Agent Boundary
22

3-
Agent Boundaries are process-level firewalls that restrict and audit what autonomous programs, such as AI agents, can access and use.
4-
5-
6-
![Screenshot of Agent Boundaries blocking a process](image.png)
3+
Agent Boundaries are process-level firewalls that restrict and audit what autonomous programs, such as AI agents, can access and use.
74

5+
![Screenshot of Agent Boundaries blocking a process](image.png)Example of Agent Boundaries blocking a process.
86

97
The easiest way to use Agent Boundaries is through existing Coder modules, such as the[Claude Code module](https://registry.coder.com/modules/coder/claude-code). It can also be ran directly in the terminal by installing the[CLI](https://github.com/coder/boundary).
108

119
>[!NOTE]
1210
>The Coder Boundary CLI is free and open source. Integrations with the core product, such as through modules, offers strong isolation and is available to Coder Premium customers.
1311
14-
##Supported Agents
12+
##Supported Agents
1513

16-
Coder Boundary supports the securing of any terminal-based agent, including your own custom agents.
14+
Coder Boundary supports the securing of any terminal-based agent, including your own custom agents.
1715

1816
##Features
1917

@@ -26,57 +24,60 @@ Boundaries extend Coder's trusted workspaces with a defense-in-depth model that
2624
##Architecture
2725

2826
Agent Boundary runs in two locations:
27+
2928
- Workspace: Boundary runs alongside your agent or tool, wrapping its process and enforcing outbound network policy at runtime
3029
- Control place (Premium): Module-level config toggles enforcement and routes audit logs to centralized governance
3130

3231
[More detail to be added here]
3332

3433
##Getting Started with Boundary
3534

36-
There are two ways to use Agent Boundaries in your project.
35+
There are two ways to use Agent Boundaries in your project.
3736

3837
Users of Coder Premium can enable Agent Boundaries simply by updating to the latest versions of their preferred coding agent modules, which integrate with Coder with just a few lines of Terraform. Once configured by platform admins, developers get agent-ready environments automatically - no extra setup required.
3938

40-
All other users can use Agent Boundaries through its[open source CLI](https://github.com/coder/boundary), which can be run to wrap any process or invoked through rules in a YAML file.
39+
All other users can use Agent Boundaries through its[open source CLI](https://github.com/coder/boundary), which can be run to wrap any process or invoked through rules in a YAML file.
4140

4241
###Option 1) Apply Boundary through Coder modules
4342

44-
This option is available to Coder Premium users. It is the easiest way to use Agent Boundaries and offers centralized policy management with strong isolation.
43+
This option is available to Coder Premium users. It is the easiest way to use Agent Boundaries and offers centralized policy management with strong isolation.
4544

4645
This integration offers:
46+
4747
- A built-in`coder boundary` subcommand
4848
- Module authors do not need to ship or manage a separate binary
49-
5049
- A clean module interface
5150
- Template admins toggle policy per template by using variables
5251
- Stronger isolation and centralized governance hooks
5352
- Protection beyond what is offered by the CLI path
5453

55-
To apply Agent Boundaries through Coder modules, follow the instructions below.
54+
To apply Agent Boundaries through Coder modules, follow the instructions below:
5655

57-
1. Ensure that you have installed or updated to the latest version of the[Claude Code module](https://registry.coder.com/modules/coder/claude-code).
58-
2. In the template that calls the module, set`module.boundary_configuration.enabled = true`.
59-
3. Choose a policy expression.
56+
1. Ensure that you have installed or updated to the latest version of the[Claude Code module](https://registry.coder.com/modules/coder/claude-code)
57+
1. In the template that calls the module, set`module.boundary_configuration.enabled = true`
58+
1. Choose a policy expression
6059
- For simple rules, you can insert a variation of this example:`provide allow = ["domain=github.com path=/api/*", "method=GET,HEAD domain=github.com"]`
61-
- For complexrules, you can package a YAML file into the workspace image or mount a path and set`config_path`.
60+
- For complexrules, you can package a YAML file into the workspace image or mount a path and set`config_path`
6261

6362
[More detail to be added here]
6463

6564
###Option 2) Wrap the agent process with the Boundary CLI
6665

67-
Users can also run Boundary directly in your workspace and configure it per template or per script. While free tier users won't get centralized policy management or the deeper, "strong isolation," they can still enforce per workspace network rules and log decisions locally.
66+
Users can also run Boundary directly in your workspace and configure it per template or per script. While free tier users won't get centralized policy management or the deeper, "strong isolation," they can still enforce per workspace network rules and log decisions locally.
6867

6968
There are two ways to integrate the open source Boundary CLI into a workspace.
7069

7170
####Wrap a command inline with flags
7271

7372
1. Install the[binary](https://github.com/coder/boundary) into the workspace image or at start-up. You can do so with the following command:
7473

75-
`curl -fsSL https://raw.githubusercontent.com/coder/boundary/main/install.sh | bash`
74+
```hcl
75+
curl -fsSL https://raw.githubusercontent.com/coder/boundary/main/install.sh | bash
76+
```
7677
77-
2. Use the included`Makefile` to build your project. Here are a few example commands:
78+
1. Use the included `Makefile` to build your project. Here are a few example commands:
7879
79-
```
80+
```hcl
8081
make build # Build for current platform
8182
make build-all # Build for all platforms
8283
make test # Run tests
@@ -85,10 +86,9 @@ There are two ways to integrate the open source Boundary CLI into a workspace.
8586
make fmt # Format code
8687
make lint # Lint code
8788
```
89+
1. Wrap the tool you want to guard. Below are some examples of usage:
8890
89-
3. Wrap the tool you want to guard. Below are some examples of usage:
90-
91-
```
91+
```hcl
9292
# Allow only requests to github.com
9393
boundary --allow "github.com" -- curl https://github.com
9494
@@ -110,11 +110,12 @@ Another option is to define rules in a YAML file, which only needs to be invoked
110110
111111
1. Similarly to the previous method, install the [binary](https://github.com/coder/boundary) into the workspace image or at start-up. You can do so with the following command:
112112
113-
`curl -fsSL https://raw.githubusercontent.com/coder/boundary/main/install.sh | bash`
114-
115-
2. Use the included `Makefile` to build your project. Here are a few example commands:
116-
113+
```hcl
114+
curl -fsSL https://raw.githubusercontent.com/coder/boundary/main/install.sh | bash
117115
```
116+
1. Use the included `Makefile` to build your project. Here are a few example commands:
117+
118+
```hcl
118119
make build # Build for current platform
119120
make build-all # Build for all platforms
120121
make test # Run tests
@@ -123,11 +124,11 @@ Another option is to define rules in a YAML file, which only needs to be invoked
123124
make fmt # Format code
124125
make lint # Lint code
125126
```
126-
3. Create a YAML file to store rules that will be applied to all `boundary` commands run in the Workspace. In this example, we call it `boundary.yaml`.
127+
1. Create a YAML file to store rules that will be applied to all `boundary` commands run in the Workspace. In this example, we call it `boundary.yaml`.
127128
128129
A config example can be seen below:
129130
130-
```
131+
```hcl
131132
allow:
132133
133134
- domain: [github.com](http://github.com)
@@ -138,8 +139,11 @@ Another option is to define rules in a YAML file, which only needs to be invoked
138139
139140
methods: [GET, HEAD]
140141
```
141-
4. Run a `boundary` command. For example:
142-
`boundary run --config ./boundary.yaml -- claude`
142+
1. Run a `boundary` command. For example:
143+
144+
```hcl
145+
boundary run --config ./boundary.yaml -- claude
146+
```
143147
144148
You will notice that the rules are automatically applied without any need for additional customization.
145149

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp