Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
137 changes: 137 additions & 0 deletions deploy/docker/docker-compose.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,137 @@
# SPDX-FileCopyrightText: Copyright (c) 2025-2026 NVIDIA CORPORATION & AFFILIATES. All rights reserved.
# SPDX-License-Identifier: Apache-2.0

# OpenShell gateway — docker-compose setup (Docker compute driver)
#
# Prerequisites:
# - Docker Desktop (Windows / macOS) or Docker Engine + Compose plugin (Linux)
# - The openshell CLI installed on your workstation
#
# Quick start:
#
# 1. Start the gateway:
# docker compose up -d
#
# 2. Register the gateway with the CLI (one-time):
# openshell gateway add openshell-docker \
# --endpoint http://localhost:18080 \
# --no-tls
#
# 3. Configure an AI provider (example: Anthropic):
# ANTHROPIC_API_KEY=sk-ant-... \
# openshell provider create --type anthropic --from-existing
#
# 4. Create a sandboxed agent — Claude Code or OpenClaw:
# openshell sandbox create -- claude
# openshell sandbox create --from openclaw
#
# Sandbox containers are managed by the gateway, not by this Compose file.
# Each `openshell sandbox create` call launches a fresh container; the gateway
# tracks their lifecycle.
#
# Configuration:
# All gateway settings below use OPENSHELL_* environment variables.
# The gateway binary reads these directly, so no separate config file
# is required. See `docker run --rm ghcr.io/nvidia/openshell/gateway:latest
# --help` for the full list of supported variables.
#
# The dev image (ghcr.io/nvidia/openshell/gateway:dev) also supports a
# TOML configuration file via --config / OPENSHELL_GATEWAY_CONFIG.
# See gateway.toml in this directory for an equivalent TOML reference.
#
# Data directory note:
# /var/lib/openshell is bind-mounted at the SAME absolute path in both the
# host and the container. This is required so that the supervisor binary
# extracted from the supervisor image can be passed to Docker as a host-side
# bind-mount source when sandbox containers are created. Named volumes
# cannot be used here because Docker resolves bind-mount sources against the
# host filesystem, not the container filesystem.
#
# Linux note:
# host.docker.internal is not automatically added on Linux Docker.
# Add the following under the gateway service to enable it:
# extra_hosts:
# - "host.docker.internal:host-gateway"

services:
gateway:
image: ghcr.io/nvidia/openshell/gateway:${IMAGE_TAG:-latest}
restart: unless-stopped

# This setup is Docker-outside-of-Docker (DooD), not Docker-in-Docker (DinD).
# The gateway uses the host's Docker socket to create sibling containers on the
# host, rather than running a nested Docker daemon. DooD does NOT require
# --privileged; it only needs read/write access to /var/run/docker.sock.
#
# Run as UID 0 so the gateway can:
# - write the extracted supervisor binary to /var/lib/openshell
# - access /var/run/docker.sock (typically owned by root or the docker group)
# Distroless images have no /etc/passwd, so the numeric UID must be used.
# This is appropriate for local development. Production deployments
# should use a dedicated non-root UID with explicit docker-group membership.
user: "0"

ports:
# gRPC / control-plane API (used by the openshell CLI and sandbox callbacks)
# The Docker driver injects host.openshell.internal:<gateway-port> into sandbox
# containers as the callback endpoint. The gateway's internal port is 8080, so
# host port 8080 must be published at the same number so that
# host.openshell.internal:8080 routes to the gateway container.
- "${OPENSHELL_PORT:-8080}:8080"
# Health endpoint (GET /healthz, GET /readyz)
- "${OPENSHELL_HEALTH_PORT:-8081}:8081"

volumes:
# Docker socket — lets the gateway create and manage sandbox containers.
- /var/run/docker.sock:/var/run/docker.sock
Comment thread
elezar marked this conversation as resolved.

# Data directory — must be a bind-mount with source == target so that
# paths written inside the container are resolvable by Docker when it
# creates sandbox containers (see note above).
# /var/lib/openshell is intentionally not namespaced to a sub-path
# (e.g. /var/lib/openshell/gateway): the path must match exactly on
# both the host and inside the container, and a single gateway per host
# is the expected topology.
- type: bind
source: /var/lib/openshell
target: /var/lib/openshell
Comment thread
ericcurtin marked this conversation as resolved.
bind:
create_host_path: true

environment:
# ── Listener ───────────────────────────────────────────────────────────
# bind-address is already set to 0.0.0.0 by the image's default CMD;
# these vars configure the remaining listener ports.
OPENSHELL_HEALTH_PORT: "8081"

# ── Auth / TLS ──────────────────────────────────────────────────────────
OPENSHELL_DISABLE_TLS: "true"

# ── Compute driver ─────────────────────────────────────────────────────
OPENSHELL_DRIVERS: "docker"

# ── Sandbox defaults ────────────────────────────────────────────────────
# Default image used when --from is not specified.
OPENSHELL_SANDBOX_IMAGE: "ghcr.io/nvidia/openshell-community/sandboxes/base:latest"

# ── Docker driver ───────────────────────────────────────────────────────
# Supervisor image used to extract the openshell-sandbox binary on first
# start. The binary is cached in /var/lib/openshell and reused on
# subsequent starts.
OPENSHELL_DOCKER_SUPERVISOR_IMAGE: "ghcr.io/nvidia/openshell/supervisor:latest"

# Address sandbox containers use to call back to this gateway.
# The Docker driver always substitutes host.openshell.internal and the
# gateway bind port into this URL, so only the scheme (http/https) is
# meaningful here. The gateway must be published on the same port number
# on the Docker host (port 8080 by default — see ports above).
OPENSHELL_GRPC_ENDPOINT: "http://host.openshell.internal:8080"

# ── Persistence ────────────────────────────────────────────────────────
OPENSHELL_DB_URL: "sqlite:/var/lib/openshell/gateway.db?mode=rwc"

# ── XDG paths ──────────────────────────────────────────────────────────
# Point XDG data home at the bind-mounted data directory so the
# extracted supervisor binary lands at a host-resolvable path.
XDG_DATA_HOME: /var/lib/openshell
HOME: /var/lib/openshell
59 changes: 59 additions & 0 deletions deploy/docker/gateway.toml
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
# SPDX-FileCopyrightText: Copyright (c) 2025-2026 NVIDIA CORPORATION & AFFILIATES. All rights reserved.
# SPDX-License-Identifier: Apache-2.0

# OpenShell gateway TOML configuration — Docker compute driver reference.
#
# This file is the TOML equivalent of the OPENSHELL_* environment variables
# set in docker-compose.yml. It requires the dev image or a release that
# includes RFC 0003 config-file support (post-0.0.42).
#
# To use this file with docker-compose, switch the image to the dev tag and
# replace the environment section with a config file mount:
#
# services:
# gateway:
# image: ghcr.io/nvidia/openshell/gateway:dev
# volumes:
# - type: bind
# source: ./gateway.toml
# target: /etc/openshell/gateway.toml
# read_only: true
# environment:
# OPENSHELL_GATEWAY_CONFIG: /etc/openshell/gateway.toml
# XDG_DATA_HOME: /var/lib/openshell
# HOME: /var/lib/openshell
# command: [] # clear the default CMD; config drives everything
#
# grpc_endpoint note:
# host.docker.internal is automatically resolvable from containers on
# Docker Desktop (Windows / macOS). On Linux, replace with the host IP
# or add extra_hosts: ["host.docker.internal:host-gateway"] to compose.

[openshell]
version = 1

[openshell.gateway]
# Bind to loopback only. The Docker driver adds an extra listener on the
# bridge interface automatically so sandbox containers can reach the gateway.
bind_address = "127.0.0.1:8080"
health_bind_address = "127.0.0.1:8081"
log_level = "info"
compute_drivers = ["docker"]
disable_tls = true

[openshell.drivers.docker]
# Default image pulled for `openshell sandbox create` without --from.
default_image = "ghcr.io/nvidia/openshell-community/sandboxes/base:latest"
# Supervisor image from which the openshell-sandbox binary is extracted on
# first start. The binary is cached to XDG_DATA_HOME and reused on restart.
supervisor_image = "ghcr.io/nvidia/openshell/supervisor:latest"
# Only pull images that are not already cached locally.
image_pull_policy = "IfNotPresent"
# Prefix applied to sandbox container names.
sandbox_namespace = "openshell"
# Address sandbox containers use to call back to the gateway.
# The Docker driver replaces the host with host.openshell.internal and the
# port with the gateway's own bind port (8080). Only the scheme survives.
# The gateway must be published on port 8080 on the Docker host so that
# host.openshell.internal:8080 resolves to the gateway container.
grpc_endpoint = "http://host.openshell.internal:8080"
88 changes: 82 additions & 6 deletions docs/about/container-gateway.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -12,37 +12,79 @@ Use this approach when you want to run the OpenShell gateway as a container inst

The gateway image is published at `ghcr.io/nvidia/openshell/gateway`.

## Prerequisites for the Docker Driver

When the gateway runs as a container and creates Docker-backed sandboxes, the gateway container
communicates with the host Docker daemon via the mounted socket. This requires three things beyond
a basic `docker run`:

1. **Docker socket access.** The gateway process must be able to read and write the Docker socket.
Add the `docker` group (or the GID of `/var/run/docker.sock`) so the socket is accessible
without running as root.

2. **gRPC endpoint.** Sandbox containers call back to the gateway over the `OPENSHELL_GRPC_ENDPOINT`
address. Set this to `http://127.0.0.1:8080` so the driver knows the scheme and port. The
docker driver automatically binds the gateway to the bridge network interface so sandbox
containers can reach it — you do not need to expose the port on `0.0.0.0`.

3. **Supervisor binary on the host.** The gateway bind-mounts the `openshell-sandbox` supervisor
binary into each sandbox container. Because bind-mount paths are resolved by the host Docker
daemon (not inside the gateway container), the binary must exist at a path on the host
filesystem. Extract it before starting the gateway and mount it at the same path.

## Quick Start

This example runs the gateway locally with TLS disabled. It is suitable for development on a single machine. Binding to `127.0.0.1` prevents remote access without authentication.
Extract the supervisor binary to the host once, then start the gateway:

```shell
mkdir -p ~/openshell/supervisor
docker create --name tmp-supervisor ghcr.io/nvidia/openshell/supervisor:latest
docker cp tmp-supervisor:/openshell-sandbox ~/openshell/supervisor/openshell-sandbox
docker rm tmp-supervisor
chmod +x ~/openshell/supervisor/openshell-sandbox
```

Start the gateway:

```shell
docker run -d \
--name openshell-gateway \
--restart unless-stopped \
--group-add docker \
-p 127.0.0.1:8080:8080 \
-v openshell-state:/var/openshell \
-v /var/run/docker.sock:/var/run/docker.sock \
-v ~/openshell/supervisor/openshell-sandbox:~/openshell/supervisor/openshell-sandbox:ro \
-e OPENSHELL_DRIVERS=docker \
-e OPENSHELL_GRPC_ENDPOINT=http://127.0.0.1:8080 \
-e OPENSHELL_DOCKER_SUPERVISOR_BIN=~/openshell/supervisor/openshell-sandbox \
-e OPENSHELL_DB_URL=sqlite:/var/openshell/openshell.db \
-e OPENSHELL_DISABLE_TLS=true \
ghcr.io/nvidia/openshell/gateway:latest
```

Register the gateway with the CLI:
Register the gateway with the CLI. If running on the same machine, use `--local`:

```shell
openshell gateway add http://127.0.0.1:8080 --local --name local
```

If registering from a different machine on the same network, use the host IP and `--remote`:

```shell
openshell gateway add http://HOST_IP:8080 --remote --name remote
```

Confirm the CLI can reach the gateway:

```shell
openshell status
```

<Warning>
Disabling TLS removes authentication. Binding to `127.0.0.1` limits access to the local machine. If you expose the port on `0.0.0.0`, enable mTLS to prevent unauthenticated access.
Disabling TLS removes authentication. This example binds to `127.0.0.1` so only local
connections are accepted. To accept remote connections, enable mTLS or restrict access with
a firewall rule.
</Warning>

## Full mTLS Setup
Expand All @@ -58,7 +100,9 @@ docker run --rm \
-v "$HOME/.local/state/openshell:/home/openshell/.local/state/openshell" \
-v "$HOME/.config/openshell:/home/openshell/.config/openshell" \
ghcr.io/nvidia/openshell/gateway:latest \
generate-certs --output-dir /home/openshell/.local/state/openshell/tls
generate-certs \
--output-dir /home/openshell/.local/state/openshell/tls \
--server-san host.openshell.internal
```

This writes the server and client certificates under `~/.local/state/openshell/tls/` and copies the client bundle to `~/.config/openshell/gateways/openshell/mtls/` so the CLI picks it up automatically.
Expand All @@ -69,10 +113,14 @@ Start the gateway with mTLS enabled:
docker run -d \
--name openshell-gateway \
--restart unless-stopped \
--group-add docker \
-p 127.0.0.1:8080:8080 \
-v "$HOME/.local/state/openshell:/home/openshell/.local/state/openshell" \
-v /var/run/docker.sock:/var/run/docker.sock \
-v ~/openshell/supervisor/openshell-sandbox:~/openshell/supervisor/openshell-sandbox:ro \
-e OPENSHELL_DRIVERS=docker \
-e OPENSHELL_GRPC_ENDPOINT=https://127.0.0.1:8080 \
-e OPENSHELL_DOCKER_SUPERVISOR_BIN=~/openshell/supervisor/openshell-sandbox \
-e OPENSHELL_DB_URL=sqlite:/home/openshell/.local/state/openshell/openshell.db \
-e OPENSHELL_TLS_CERT=/home/openshell/.local/state/openshell/tls/server/tls.crt \
-e OPENSHELL_TLS_KEY=/home/openshell/.local/state/openshell/tls/server/tls.key \
Expand All @@ -91,20 +139,41 @@ openshell gateway add https://127.0.0.1:8080 --local --name local

## Docker Compose

Save the following as `compose.yml`. This uses the TLS-disabled configuration bound to localhost, suitable for local development.
The following `compose.yml` runs the gateway with the Docker driver on an immutable OS or any
Docker host. It includes all required configuration for sandbox containers to call back to the
gateway.

Before starting, extract the supervisor binary to a host path. The path must be the same on
both the host and inside the gateway container because the host Docker daemon uses it as a
bind-mount source when creating sandbox containers:

```shell
mkdir -p ~/openshell/supervisor
docker create --name tmp-supervisor ghcr.io/nvidia/openshell/supervisor:latest
docker cp tmp-supervisor:/openshell-sandbox ~/openshell/supervisor/openshell-sandbox
docker rm tmp-supervisor
chmod +x ~/openshell/supervisor/openshell-sandbox
```

Save the following as `~/openshell/compose.yml`, substituting your home directory for `HOME`:

```yaml
services:
gateway:
image: ghcr.io/nvidia/openshell/gateway:latest
restart: unless-stopped
group_add:
- docker
ports:
- "127.0.0.1:8080:8080"
volumes:
- openshell-state:/var/openshell
- /var/run/docker.sock:/var/run/docker.sock
- HOME/openshell/supervisor/openshell-sandbox:HOME/openshell/supervisor/openshell-sandbox:ro
environment:
OPENSHELL_DRIVERS: docker
OPENSHELL_GRPC_ENDPOINT: "http://127.0.0.1:8080"
OPENSHELL_DOCKER_SUPERVISOR_BIN: "HOME/openshell/supervisor/openshell-sandbox"
OPENSHELL_DB_URL: "sqlite:/var/openshell/openshell.db"
OPENSHELL_DISABLE_TLS: "true"

Expand All @@ -118,12 +187,19 @@ Start the gateway:
docker compose up -d
```

Register the gateway with the CLI:
Register the gateway with the CLI. If registering from the same machine:

```shell
openshell gateway add http://127.0.0.1:8080 --local --name local
```

If registering from a different machine on the same network, replace `HOST_IP` with the
machine's LAN address:

```shell
openshell gateway add http://HOST_IP:8080 --remote --name remote
```

## Using Podman

Replace `docker` with `podman` in the commands above. Mount the Podman socket instead of the Docker socket and set the driver to `podman`:
Expand Down
Loading
Loading