Architecture overview
Connecting agents
There are two ways to route agent traffic through the gateway:| Path | How it works | Best for |
|---|---|---|
onecli run | CLI wraps a local process with proxy env vars and CA certs | Coding agents on your machine (Claude Code, Cursor, Codex) |
| SDK / Docker | SDK injects proxy config into Docker container args | Container-based orchestrators (NanoClaw, custom) |
Rust gateway
The gateway (apps/proxy) is an HTTP gateway built in Rust that intercepts outbound requests, enforces rules, and injects credentials. Agents authenticate with access tokens via Proxy-Authorization headers.
How it works:
- Your agent makes a normal HTTP request (e.g.,
GET https://www.googleapis.com/calendar/v3/events) - The request goes through the gateway instead of directly to the internet
- The gateway evaluates rules. If a rule blocks or rate-limits the request, the agent receives a 403 or 429 response immediately
- If allowed, the gateway matches the target host and path against stored secrets, decrypts the matching credentials, and injects the appropriate auth headers (Bearer token, API key, etc.)
- The request is forwarded to the service with credentials attached
- The response passes back through to your agent unchanged
- Runs on port 10255
- Agents authenticate with access tokens (each agent gets its own scoped token)
- Rules are evaluated before credential injection, so blocked requests never touch your secrets
- Host and path pattern matching routes secrets to the right API endpoints
- MITM interception for HTTPS traffic
- Built in Rust for low-latency proxying
Rules engine
The rules engine enforces policies on every request that passes through the gateway. Rules match requests by host, path, HTTP method, and agent, then apply an action:- Block: Deny the request entirely (403)
- Rate Limit: Allow up to N requests per time window, then block (429)
Secret store
The secret store uses AES-256-GCM encryption at rest. Secrets are decrypted only at request time, matched by host and path patterns, and injected by the gateway as headers. Credentials are never stored in plain text. The encryption key is auto-generated on first run or can be set via theSECRET_ENCRYPTION_KEY environment variable.
Web dashboard
The dashboard (apps/web) runs on port 10254 and is where you manage everything:
- Create agents with scoped access tokens
- Add, rotate, and revoke secrets for any service
- Configure host and path patterns for credential matching
- Create rules to block or rate-limit specific operations
- See which agent accessed which service and when (audit logs)
Auth modes
OneCLI supports two authentication modes:| Mode | When to use | Configuration |
|---|---|---|
| Single-user (default) | Local development, personal use | No config needed |
| Google OAuth | Teams, shared instances | Set NEXTAUTH_SECRET, GOOGLE_CLIENT_ID, GOOGLE_CLIENT_SECRET |
Stack
| Component | Technology |
|---|---|
| Gateway | Rust (port 10255) |
| Web dashboard | Next.js (port 10254) |
| Database | PostgreSQL (bundled via Docker Compose) |
| Secret storage | AES-256-GCM encrypted |
| ORM | Prisma |