Skip to main content

Run coding agents in isolated Docker containers

Project description

clankr

Run Claude Code in isolated Docker containers. --dangerously-skip-permissions without the danger.

install

uv tool install clankr

setup

clankr init
# prompts for: github username, bot username, PAT

Create a classic PAT on the bot account with repo scope.

per-repo setup (recommended)

clankr setup-repo user/project
# then accept the invitation (log in as bot → github.com/notifications)

This adds the bot as a collaborator and configures the repo with:

  • Branch protection: PRs required for main, owner bypasses
  • Squash merge only, auto-delete branch on merge

This step is optional — agents work without it, but branch protection prevents them from pushing directly to main.

usage

clankr launch user/project                        # interactive, bare profile
clankr launch -p gsd user/project                 # GSD workflow
clankr launch -d -p gsd user/project              # detached (tmux)
clankr launch -d -p gsd -s auth-fix user/project  # named slot
clankr launch /path/to/local/repo                 # local repo

clankr run user/project -- -p "prompt"                # non-interactive, stdout capture
clankr run /path/to/repo -p ./profile -- -p "prompt"  # local repo, custom profile path

clankr attach project-1                           # reattach to detached agent
clankr save project-1 /path/to/host/repo          # export sessions to host ~/.claude/
clankr ls                                         # list slots
clankr rm project-1                               # remove (warns if unpushed)
clankr clean                                      # remove all stopped clean slots
$ clankr ls
SLOT                 PROFILE  STATUS       REPO
hello-world-1        gsd      detached     /home/max/.local/share/clankr/repos/hello-world-1
project-2            gsd      running      /home/max/.local/share/clankr/repos/project-2
project-1            bare     stopped      /home/max/.local/share/clankr/repos/project-1

profiles

Each profile is an isolated claude code config — system prompt, settings, hooks, extensions.

  • bare — claude code, skip permissions, no extras
  • gsdget shit done workflow framework

-p takes a profile name (looked up in ~/.config/clankr/profiles/) or a path to a profile directory. Each profile is a directory with any of:

  • CLAUDE.md — system prompt
  • settings.json — claude code settings
  • init — executable script that runs inside the container before claude starts (install plugins, extensions, etc.)
clankr profiles                                   # list available profiles
cp -r ~/.config/clankr/profiles/gsd ~/.config/clankr/profiles/my-custom
vim ~/.config/clankr/profiles/my-custom/CLAUDE.md

how it works

  • each slot gets its own repo clone and claude config
  • credentials copied fresh from host ~/.claude/.credentials.json on each launch (tokens expire ~8h)
  • --dangerously-skip-permissions baked into the container
  • -d wraps the container in a tmux session — survives SSH disconnects
  • git identity: configurable bot account with scoped PAT
  • branch protection via setup-repo: require PR + approval for main, owner bypasses, squash-only merges

commands

Command Description
clankr init First-time setup: config + default profiles
clankr launch Launch an agent (-p profile, -s slot, -d detach)
clankr run Run claude non-interactively (-p profile, -s slot, -- claude args)
clankr ls List all slots
clankr attach <slot> Attach to detached agent's tmux session
clankr save <slot> <path> Export sessions to host ~/.claude/ for claude --resume
clankr rm <slot> Remove slot (warns if unpushed work)
clankr clean Remove all stopped clean slots
clankr logs <slot> Show container logs
clankr setup-repo <repo> Add bot collaborator + branch protection + squash merge
clankr profiles List available profiles
clankr version Print clankr version

paths

What Where
Config ~/.config/clankr/config.toml
Profiles ~/.config/clankr/profiles/
Dockerfile override ~/.config/clankr/Dockerfile
Repo clones ~/.local/share/clankr/repos/
Slot state ~/.local/share/clankr/run/

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

clankr-1.2.2.tar.gz (10.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

clankr-1.2.2-py3-none-any.whl (14.0 kB view details)

Uploaded Python 3

File details

Details for the file clankr-1.2.2.tar.gz.

File metadata

  • Download URL: clankr-1.2.2.tar.gz
  • Upload date:
  • Size: 10.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.10.10 {"installer":{"name":"uv","version":"0.10.10","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"26.04","id":"resolute","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for clankr-1.2.2.tar.gz
Algorithm Hash digest
SHA256 67ef36a4bc2d08748c6da08eb8721add3989a6911cb0d5ad827a20000b317d38
MD5 ca8f06ed089fa44aa87e099aa78f65cb
BLAKE2b-256 7f369cb26ca4a04f067af1dd88eb6829502f83aa7fe2b44c342d758403edb48e

See more details on using hashes here.

File details

Details for the file clankr-1.2.2-py3-none-any.whl.

File metadata

  • Download URL: clankr-1.2.2-py3-none-any.whl
  • Upload date:
  • Size: 14.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.10.10 {"installer":{"name":"uv","version":"0.10.10","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"26.04","id":"resolute","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for clankr-1.2.2-py3-none-any.whl
Algorithm Hash digest
SHA256 1e0f188d88d983782f74cf51687c2c3bbb058214dc310465a082e7a82e1f79d4
MD5 a37500afc942fcf8c21c8f721ad38c66
BLAKE2b-256 694198d2621a10cbfa9d2d49d8a30fc356ea66d4e679634b2ab3cee15ed29f9c

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page