9.1. Container Execution Guide¶
This guide walks you through setting up the container runtime, building the agent runner image, and configuring mount security before running agents in containers.
Step 1: Install a Container Runtime¶
Backend.AI GO supports two container runtimes:
- Apple Container — preferred on Apple Silicon Macs, lighter-weight than Docker
- Docker — supported on all platforms (macOS, Windows, Linux)
Apple Container (macOS Apple Silicon only)¶
-
Download the Apple Container installer from the Apple Container GitHub releases page.
-
Open the downloaded
.pkgfile and follow the installation wizard. -
After installation, verify it works:
-
Start the container system service:
Platform Support
Apple Container is only available on macOS 15 (Sequoia) or later running on Apple Silicon. On Intel Macs, Backend.AI GO automatically uses Docker instead.
Docker¶
-
Download Docker Desktop for Mac and install it.
-
Start Docker Desktop from your Applications folder.
-
Verify Docker is running:
-
Download Docker Desktop for Windows and install it.
-
During installation, choose WSL 2 as the backend.
-
Start Docker Desktop from the Start menu.
-
Verify Docker is running in PowerShell:
Step 2: Verify Runtime Detection¶
Backend.AI GO automatically detects the best available container runtime on startup.
-
Open Settings > Container.
-
The Runtime field shows the detected backend:
Apple Container— Apple Container detected and preferredDocker— Docker is availableNot available— No runtime found (re-check installation)
You can also query the Management API directly:
Example response:
{
"available": true,
"backend": "apple_container",
"version": "0.2.0",
"networking": {
"hostGateway": "192.168.64.1",
"extraRunArgs": []
},
"message": "Apple Container runtime detected"
}
Step 3: Build the Agent Runner Image¶
The agent runner image (aigo-agent-runner:latest) is a pre-configured container image that includes the Claude Code SDK and supporting tools needed by squad agents.
Build from the App¶
-
Go to Settings > Container.
-
Click Build Agent Image.
-
The build process runs in the background. Progress is shown in the build log panel.
-
When the status shows Image ready, the build is complete.
Build via CLI¶
Build via Management API¶
curl -X POST http://localhost:55765/api/v1/container/image/build \
-H "Content-Type: application/json" \
-d '{"imageTag": "aigo-agent-runner:latest"}'
Check Image Status¶
Response:
Custom Images
You can specify a custom image tag for specialized agents. The default tag is aigo-agent-runner:latest. Custom images must be pre-built and available locally.
Step 4: Configure the Mount Allowlist¶
The mount allowlist controls which host directories containers are permitted to access. Only paths under an allowed root can be mounted — all other paths are rejected.
Default Blocked Patterns¶
The following path component patterns are always blocked, regardless of allowlist settings:
| Pattern | Reason |
|---|---|
.ssh | SSH keys |
.gnupg | GPG keys |
.env | Environment files |
.aws | AWS credentials |
.azure | Azure credentials |
.gcloud | Google Cloud credentials |
.docker | Docker credentials |
.kube | Kubernetes config |
Adding Allowed Roots¶
-
Go to Settings > Container > Mount Security.
-
Click Add Allowed Root.
-
Select a host directory (e.g.,
/Users/you/projects). -
Click Save.
Only subdirectories of the added roots can be mounted into containers.
Via Management API¶
# Get current allowlist
curl http://localhost:55765/api/v1/container/mount/allowlist
# Set allowlist
curl -X PUT http://localhost:55765/api/v1/container/mount/allowlist \
-H "Content-Type: application/json" \
-d '{
"allowedRoots": ["/Users/you/projects", "/Users/you/data"],
"blockedPatterns": [".ssh", ".gnupg", ".env", ".aws", ".azure", ".gcloud", ".docker", ".kube"]
}'
Validate a Mount Path¶
Before running containers, you can validate whether a specific path would be allowed:
curl -X POST http://localhost:55765/api/v1/container/mount/validate \
-H "Content-Type: application/json" \
-d '{"hostPath": "/Users/you/projects/myapp", "containerPath": "/workspace/extra/myapp", "readOnly": true}'
Step 5: Configure the Credential Proxy¶
The credential proxy ensures API keys never enter containers. Containers receive a placeholder token and communicate with the proxy at http://host-gateway:3001, which substitutes real credentials before forwarding requests to the upstream API.
Start the Proxy¶
-
Go to Settings > Container > Credential Proxy.
-
Toggle Enable Credential Proxy to on.
-
The proxy starts automatically on port
3001(configurable).
Add a Credential Mapping¶
-
Click Add Mapping in the Credential Proxy settings.
-
Fill in:
- Name: A human-readable label (e.g., "Anthropic API")
- Upstream URL: The real API endpoint (e.g.,
https://api.anthropic.com) - Credential Type: API Key or OAuth Bearer
- Real Credential: Your actual API key (stored encrypted on-host)
-
Click Save.
The proxy generates a unique placeholder for each mapping. Containers use the placeholder in their API calls — the proxy substitutes the real key automatically.
Security Note
Real credentials are stored in the app's encrypted keystore and never written to disk in plaintext. Containers only ever see the placeholder string CREDENTIAL_PROXY_PLACEHOLDER.
Next Steps¶
- Squad Container Mode — Enable container execution for squad agents
- Task Scheduling — Schedule container tasks to run automatically
- Security Model — Deep dive into security layers