-
Notifications
You must be signed in to change notification settings - Fork 5
Add permission-bypass claude code container docs and install script #26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Closed
Closed
Changes from all commits
Commits
Show all changes
14 commits
Select commit
Hold shift + click to select a range
d5d4d78
Add Claude Code container setup guide
asmacdo a1bb7a8
Simplify container docs to Podman-only with host user
asmacdo 30679a8
Bump base image to node:22 LTS
asmacdo ae54e50
Add TZ build argument to container build instructions
asmacdo 5a42fa5
Remove Podman Compose section from docs
asmacdo 26443dc
Add missing CMD to start Claude Code
asmacdo 9d63858
Update docs with working --userns=keep-id command
asmacdo c8cbecf
Fix credential persistence with CLAUDE_CONFIG_DIR
asmacdo 80ecc14
Mount git config read-only for better security
asmacdo badfaab
Simplify docs to YOLO mode only with git credentials
asmacdo 684f31e
Add YOLO setup script for easy installation
asmacdo 420de43
Move first-time login info above manual setup
asmacdo 4f78b80
Add provenance for init-firewall.sh and restore exact original
asmacdo 617bece
Remove SSH key mounts and document git push limitation
asmacdo File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,94 @@ | ||
| # Running Claude Code in a Container | ||
|
|
||
| This guide shows how to run claude-code in a Podman container while preserving your configuration and working directory access. | ||
|
|
||
| ## Easy Setup (Recommended) | ||
|
|
||
| Clone the repository and run the setup script to build the container and optionally create a `YOLO` command: | ||
|
|
||
| ```bash | ||
| git clone https://github.com/con/catenate.git | ||
| cd catenate | ||
| ./ai/setup-yolo.sh | ||
| ``` | ||
|
|
||
| This will: | ||
| 1. Build the container image if it doesn't exist | ||
| 2. Optionally create a `YOLO` shell function | ||
| 3. Configure everything for you | ||
|
|
||
| After setup, just run `YOLO` from any directory to start Claude Code in YOLO mode! | ||
|
|
||
| > **TODO**: Add curl-based one-liner setup once this PR is merged | ||
|
|
||
| ## First-Time Login | ||
|
|
||
| On your first run, you'll need to authenticate: | ||
|
|
||
| 1. Claude Code will display a URL like `https://claude.ai/oauth/authorize?...` | ||
| 2. Copy the URL and paste it into a browser on your host machine | ||
| 3. Complete the authentication in your browser | ||
| 4. Copy the code from the browser and paste it back into the container terminal | ||
|
|
||
| Your credentials are stored in `~/.claude` on your host, so you only need to login once. Subsequent runs will use the stored credentials automatically. | ||
|
|
||
| ## Manual Setup | ||
|
|
||
| If you prefer to run commands manually, first build the image from the `ai/images/` directory: | ||
|
|
||
| ```bash | ||
| podman build --build-arg TZ=$(timedatectl show --property=Timezone --value) -t claude-code ai/images/ | ||
| ``` | ||
|
|
||
| Then run: | ||
|
|
||
| ```bash | ||
| podman run -it --rm \ | ||
| --userns=keep-id \ | ||
| -v ~/.claude:/claude:Z \ | ||
| -v ~/.gitconfig:/tmp/.gitconfig:ro,Z \ | ||
| -v "$(pwd):/workspace:Z" \ | ||
| -w /workspace \ | ||
| -e CLAUDE_CONFIG_DIR=/claude \ | ||
| -e GIT_CONFIG_GLOBAL=/tmp/.gitconfig \ | ||
| claude-code \ | ||
| claude --dangerously-skip-permissions | ||
| ``` | ||
|
|
||
| ⚠️ **Note**: This uses `--dangerously-skip-permissions` to bypass all permission prompts. This is safe in containerized environments where the container provides isolation from your host system. | ||
|
|
||
| ## What's Included | ||
|
|
||
| The Dockerfile (based on [Anthropic's official setup](https://github.com/anthropics/claude-code/blob/07e13937b2d6e798ce1880b22ad6bd22115478e4/.devcontainer/Dockerfile)) includes: | ||
|
|
||
| - **Claude Code CLI**: Latest version | ||
| - **Development tools**: git, gh (GitHub CLI), jq, vim, nano, zsh | ||
| - **Git enhancements**: delta (better diffs), fzf (fuzzy finder) | ||
| - **Network tools**: iptables, ipset, dnsutils for container networking | ||
|
|
||
| ## Command Breakdown | ||
|
|
||
| - `--userns=keep-id`: Maps your host user ID inside the container so files are owned correctly | ||
| - `-v ~/.claude:/claude:Z`: Bind mounts your Claude configuration directory with SELinux relabeling | ||
| - `-v ~/.gitconfig:/tmp/.gitconfig:ro,Z`: Mounts git config read-only for commits (push operations not supported) | ||
| - `-v "$(pwd):/workspace:Z"`: Bind mounts your current working directory into `/workspace` | ||
| - `-w /workspace`: Sets the working directory inside the container | ||
| - `-e CLAUDE_CONFIG_DIR=/claude`: Tells Claude Code where to find its configuration | ||
| - `-e GIT_CONFIG_GLOBAL=/tmp/.gitconfig`: Points git to the mounted config | ||
| - `claude --dangerously-skip-permissions`: Skips all permission prompts (safe in containers) | ||
| - `--rm`: Automatically removes the container when it exits | ||
| - `-it`: Interactive terminal | ||
|
|
||
| ## Tips | ||
|
|
||
| 1. **Persist configuration**: The `~/.claude` bind mount ensures your settings, API keys, and session history persist between container runs | ||
|
|
||
| 2. **File ownership**: The `--userns=keep-id` flag ensures files created or modified inside the container will be owned by your host user, regardless of your UID | ||
|
|
||
| 3. **Git operations**: Git config is mounted read-only, so Claude Code can read your identity and make commits. However, **SSH keys are not mounted**, so `git push` operations will fail. You'll need to push from your host after Claude Code commits your changes. | ||
|
|
||
| 4. **Multiple directories**: Mount additional directories as needed: | ||
| ```bash | ||
| -v ~/projects:/projects:Z \ | ||
| -v ~/data:/data:Z | ||
| ``` | ||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,93 @@ | ||
| FROM node:22 | ||
|
|
||
| ARG TZ | ||
| ENV TZ="$TZ" | ||
|
|
||
| ARG CLAUDE_CODE_VERSION=latest | ||
|
|
||
| # Install basic development tools and iptables/ipset | ||
| RUN apt-get update && apt-get install -y --no-install-recommends \ | ||
| less \ | ||
| git \ | ||
| procps \ | ||
| sudo \ | ||
| fzf \ | ||
| zsh \ | ||
| man-db \ | ||
| unzip \ | ||
| gnupg2 \ | ||
| gh \ | ||
| iptables \ | ||
| ipset \ | ||
| iproute2 \ | ||
| dnsutils \ | ||
| aggregate \ | ||
| jq \ | ||
| nano \ | ||
| vim \ | ||
| && apt-get clean && rm -rf /var/lib/apt/lists/* | ||
|
|
||
| # Ensure default node user has access to /usr/local/share | ||
| RUN mkdir -p /usr/local/share/npm-global && \ | ||
| chown -R node:node /usr/local/share | ||
|
|
||
| ARG USERNAME=node | ||
|
|
||
| # Persist bash history. | ||
| RUN SNIPPET="export PROMPT_COMMAND='history -a' && export HISTFILE=/commandhistory/.bash_history" \ | ||
| && mkdir /commandhistory \ | ||
| && touch /commandhistory/.bash_history \ | ||
| && chown -R $USERNAME /commandhistory | ||
|
|
||
| # Set `DEVCONTAINER` environment variable to help with orientation | ||
| ENV DEVCONTAINER=true | ||
|
|
||
| # Create workspace and config directories and set permissions | ||
| RUN mkdir -p /workspace /home/node/.claude && \ | ||
| chown -R node:node /workspace /home/node/.claude | ||
|
|
||
| WORKDIR /workspace | ||
|
|
||
| ARG GIT_DELTA_VERSION=0.18.2 | ||
| RUN ARCH=$(dpkg --print-architecture) && \ | ||
| wget "https://github.com/dandavison/delta/releases/download/${GIT_DELTA_VERSION}/git-delta_${GIT_DELTA_VERSION}_${ARCH}.deb" && \ | ||
| sudo dpkg -i "git-delta_${GIT_DELTA_VERSION}_${ARCH}.deb" && \ | ||
| rm "git-delta_${GIT_DELTA_VERSION}_${ARCH}.deb" | ||
|
|
||
| # Set up non-root user | ||
| USER node | ||
|
|
||
| # Install global packages | ||
| ENV NPM_CONFIG_PREFIX=/usr/local/share/npm-global | ||
| ENV PATH=$PATH:/usr/local/share/npm-global/bin | ||
|
|
||
| # Set the default shell to zsh rather than sh | ||
| ENV SHELL=/bin/zsh | ||
|
|
||
| # Set the default editor and visual | ||
| ENV EDITOR=nano | ||
| ENV VISUAL=nano | ||
|
|
||
| # Default powerline10k theme | ||
| ARG ZSH_IN_DOCKER_VERSION=1.2.0 | ||
| RUN sh -c "$(wget -O- https://github.com/deluan/zsh-in-docker/releases/download/v${ZSH_IN_DOCKER_VERSION}/zsh-in-docker.sh)" -- \ | ||
| -p git \ | ||
| -p fzf \ | ||
| -a "source /usr/share/doc/fzf/examples/key-bindings.zsh" \ | ||
| -a "source /usr/share/doc/fzf/examples/completion.zsh" \ | ||
| -a "export PROMPT_COMMAND='history -a' && export HISTFILE=/commandhistory/.bash_history" \ | ||
| -x | ||
|
|
||
| # Install Claude | ||
| RUN npm install -g @anthropic-ai/claude-code@${CLAUDE_CODE_VERSION} | ||
|
|
||
| # Copy and set up firewall script | ||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. might need extra checking on how to start such a container so it does not mess with the main box firewall but operates only within container's network. |
||
| # Source: https://github.com/anthropics/claude-code/blob/07e13937b2d6e798ce1880b22ad6bd22115478e4/.devcontainer/init-firewall.sh | ||
| COPY init-firewall.sh /usr/local/bin/ | ||
| USER root | ||
| RUN chmod +x /usr/local/bin/init-firewall.sh && \ | ||
| echo "node ALL=(root) NOPASSWD: /usr/local/bin/init-firewall.sh" > /etc/sudoers.d/node-firewall && \ | ||
| chmod 0440 /etc/sudoers.d/node-firewall | ||
| USER node | ||
|
|
||
| CMD ["claude"] | ||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,137 @@ | ||
| #!/bin/bash | ||
| set -euo pipefail # Exit on error, undefined vars, and pipeline failures | ||
| IFS=$'\n\t' # Stricter word splitting | ||
|
|
||
| # 1. Extract Docker DNS info BEFORE any flushing | ||
| DOCKER_DNS_RULES=$(iptables-save -t nat | grep "127\.0\.0\.11" || true) | ||
|
|
||
| # Flush existing rules and delete existing ipsets | ||
| iptables -F | ||
| iptables -X | ||
| iptables -t nat -F | ||
| iptables -t nat -X | ||
| iptables -t mangle -F | ||
| iptables -t mangle -X | ||
| ipset destroy allowed-domains 2>/dev/null || true | ||
|
|
||
| # 2. Selectively restore ONLY internal Docker DNS resolution | ||
| if [ -n "$DOCKER_DNS_RULES" ]; then | ||
| echo "Restoring Docker DNS rules..." | ||
| iptables -t nat -N DOCKER_OUTPUT 2>/dev/null || true | ||
| iptables -t nat -N DOCKER_POSTROUTING 2>/dev/null || true | ||
| echo "$DOCKER_DNS_RULES" | xargs -L 1 iptables -t nat | ||
| else | ||
| echo "No Docker DNS rules to restore" | ||
| fi | ||
|
|
||
| # First allow DNS and localhost before any restrictions | ||
| # Allow outbound DNS | ||
| iptables -A OUTPUT -p udp --dport 53 -j ACCEPT | ||
| # Allow inbound DNS responses | ||
| iptables -A INPUT -p udp --sport 53 -j ACCEPT | ||
| # Allow outbound SSH | ||
| iptables -A OUTPUT -p tcp --dport 22 -j ACCEPT | ||
| # Allow inbound SSH responses | ||
| iptables -A INPUT -p tcp --sport 22 -m state --state ESTABLISHED -j ACCEPT | ||
| # Allow localhost | ||
| iptables -A INPUT -i lo -j ACCEPT | ||
| iptables -A OUTPUT -o lo -j ACCEPT | ||
|
|
||
| # Create ipset with CIDR support | ||
| ipset create allowed-domains hash:net | ||
|
|
||
| # Fetch GitHub meta information and aggregate + add their IP ranges | ||
| echo "Fetching GitHub IP ranges..." | ||
| gh_ranges=$(curl -s https://api.github.com/meta) | ||
| if [ -z "$gh_ranges" ]; then | ||
| echo "ERROR: Failed to fetch GitHub IP ranges" | ||
| exit 1 | ||
| fi | ||
|
|
||
| if ! echo "$gh_ranges" | jq -e '.web and .api and .git' >/dev/null; then | ||
| echo "ERROR: GitHub API response missing required fields" | ||
| exit 1 | ||
| fi | ||
|
|
||
| echo "Processing GitHub IPs..." | ||
| while read -r cidr; do | ||
| if [[ ! "$cidr" =~ ^[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}/[0-9]{1,2}$ ]]; then | ||
| echo "ERROR: Invalid CIDR range from GitHub meta: $cidr" | ||
| exit 1 | ||
| fi | ||
| echo "Adding GitHub range $cidr" | ||
| ipset add allowed-domains "$cidr" | ||
| done < <(echo "$gh_ranges" | jq -r '(.web + .api + .git)[]' | aggregate -q) | ||
|
|
||
| # Resolve and add other allowed domains | ||
| for domain in \ | ||
| "registry.npmjs.org" \ | ||
| "api.anthropic.com" \ | ||
| "sentry.io" \ | ||
| "statsig.anthropic.com" \ | ||
| "statsig.com" \ | ||
| "marketplace.visualstudio.com" \ | ||
| "vscode.blob.core.windows.net" \ | ||
| "update.code.visualstudio.com"; do | ||
| echo "Resolving $domain..." | ||
| ips=$(dig +noall +answer A "$domain" | awk '$4 == "A" {print $5}') | ||
| if [ -z "$ips" ]; then | ||
| echo "ERROR: Failed to resolve $domain" | ||
| exit 1 | ||
| fi | ||
|
|
||
| while read -r ip; do | ||
| if [[ ! "$ip" =~ ^[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}$ ]]; then | ||
| echo "ERROR: Invalid IP from DNS for $domain: $ip" | ||
| exit 1 | ||
| fi | ||
| echo "Adding $ip for $domain" | ||
| ipset add allowed-domains "$ip" | ||
| done < <(echo "$ips") | ||
| done | ||
|
|
||
| # Get host IP from default route | ||
| HOST_IP=$(ip route | grep default | cut -d" " -f3) | ||
| if [ -z "$HOST_IP" ]; then | ||
| echo "ERROR: Failed to detect host IP" | ||
| exit 1 | ||
| fi | ||
|
|
||
| HOST_NETWORK=$(echo "$HOST_IP" | sed "s/\.[0-9]*$/.0\/24/") | ||
| echo "Host network detected as: $HOST_NETWORK" | ||
|
|
||
| # Set up remaining iptables rules | ||
| iptables -A INPUT -s "$HOST_NETWORK" -j ACCEPT | ||
| iptables -A OUTPUT -d "$HOST_NETWORK" -j ACCEPT | ||
|
|
||
| # Set default policies to DROP first | ||
| iptables -P INPUT DROP | ||
| iptables -P FORWARD DROP | ||
| iptables -P OUTPUT DROP | ||
|
|
||
| # First allow established connections for already approved traffic | ||
| iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT | ||
| iptables -A OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPT | ||
|
|
||
| # Then allow only specific outbound traffic to allowed domains | ||
| iptables -A OUTPUT -m set --match-set allowed-domains dst -j ACCEPT | ||
|
|
||
| # Explicitly REJECT all other outbound traffic for immediate feedback | ||
| iptables -A OUTPUT -j REJECT --reject-with icmp-admin-prohibited | ||
|
|
||
| echo "Firewall configuration complete" | ||
| echo "Verifying firewall rules..." | ||
| if curl --connect-timeout 5 https://example.com >/dev/null 2>&1; then | ||
| echo "ERROR: Firewall verification failed - was able to reach https://example.com" | ||
| exit 1 | ||
| else | ||
| echo "Firewall verification passed - unable to reach https://example.com as expected" | ||
| fi | ||
|
|
||
| # Verify GitHub API access | ||
| if ! curl --connect-timeout 5 https://api.github.com/zen >/dev/null 2>&1; then | ||
| echo "ERROR: Firewall verification failed - unable to reach https://api.github.com" | ||
| exit 1 | ||
| else | ||
| echo "Firewall verification passed - able to reach https://api.github.com as expected" | ||
| fi |
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.