You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The recommended way to run `boundary` is using the `boundary-run` shortcut, which handles privilege escalation automatically. The `boundary-run` wrapper is installed automatically when you use the installation script:
50
+
When using the default nsjail backend, boundary escalates privileges automatically (via `sudo` and `setpriv`) to acquire the necessary capabilities:
@@ -142,7 +119,7 @@ When running inside a Coder workspace, boundary can forward audit logs to the wo
142
119
agent, which then sends them to coderd for centralized logging. The intention is for
143
120
these logs to work out of the box when an AI agent runs in a workspace using a module
144
121
that has boundary enabled (e.g. the [Claude Code](https://registry.coder.com/modules/coder/claude-code)
145
-
module), and when `boundary-run` is used directly.
122
+
module).
146
123
147
124
**How it works:**
148
125
@@ -172,14 +149,12 @@ module), and when `boundary-run` is used directly.
172
149
-**boundary-child**: The child process created within the network namespace
173
150
-**target/agent process**: The command you're running (e.g., `curl`, `npm`, `bash`)
174
151
175
-
The `boundary-run` wrapper script handles privilege escalation automatically using `setpriv` to drop privileges before launching boundary. This ensures all processes run with the minimum required capabilities (`CAP_NET_ADMIN` and optionally `CAP_SYS_ADMIN` for restricted environments) while executing as your regular user account.
176
-
177
-
If you run `boundary` directly with `sudo` (without `setpriv`), all processes will run as root, which is **not recommended** for security reasons. Always use `boundary-run` or the equivalent `setpriv` command shown in the [Direct Usage](#direct-usage) section.
152
+
When using the nsjail backend (default), boundary escalates privileges itself: it re-executes via `sudo` and `setpriv` so that it runs with the minimum required capabilities (`CAP_NET_ADMIN` and optionally `CAP_SYS_ADMIN` for restricted environments) while still executing as your regular user.
178
153
179
154
## Command-Line Options
180
155
181
156
```text
182
-
boundary-run [flags] -- command [args...]
157
+
boundary [flags] -- command [args...]
183
158
184
159
--config <PATH> Path to YAML config file (default: ~/.config/coder_boundary/config.yaml)
185
160
--allow <SPEC> Allow rule (repeatable). Merged with allowlist from config file
0 commit comments