Template Routing

Not every chat with Coder Agents requires a workspace. A workspace is only provisioned when the agent decides it needs compute — to read files, write code, run commands, or execute builds.

When a workspace is needed, the agent reads the available templates, selects the appropriate one based on its name and description, and provisions a workspace automatically.

This guide covers best practices for creating templates that are discoverable and useful to Coder Agents.

Write discoverable template descriptions

The agent selects templates by reading their names and descriptions — the same metadata shown on the templates page in the Coder dashboard, sorted by number of active developers. It does not inspect the template's Terraform to understand what infrastructure is inside.

This means the template description is the single most important factor in whether the agent picks the right template for a given task.

What to include

A good template description tells the agent:

  • What language, framework, or stack the template is for.
  • Which repository or service it targets, if applicable.
  • What type of work it supports (e.g., backend services, frontend apps, data pipelines).

Examples

DescriptionWhy it works
Python backend services for the payments repo. Includes Poetry, Python 3.12, and PostgreSQLSpecific language, repo, and toolchain
React frontend development for the customer portal. Node 20, pnpm, Storybook pre-installedClear stack, named project, key tools listed
General-purpose Go development environment with Go 1.23, Docker, and common CLI toolsBroad but descriptive — the agent can match it to Go-related tasks
Java microservices for the order-processing pipeline. Maven, JDK 21, Kafka client librariesNames the service domain and build tool
DescriptionWhy it fails
Team A template v2No information about what the template is for
Dev environmentToo generic — the agent cannot distinguish this from any other template
k8s-prod-2024Internal shorthand that carries no meaning for the agent
DefaultTells the agent nothing

Tip

If many developers already use a template, the agent is more likely to select it because templates are sorted by active developer count. A well-written description on a popular template is the strongest routing signal you can provide.

Template display names

Display names appear in the template selector and in the agent's tool output. Use readable, descriptive names rather than slugs or internal codes. A display name like "Python Backend (Payments)" is more useful to both humans and the agent than py-be-pay-v3.

Create dedicated agent templates

Rather than reusing your standard interactive developer templates for agent workloads, consider creating dedicated templates with configurations appropriate for unattended, agent-driven work.

Agent templates differ from developer templates in several ways:

  • No IDE tooling needed. The agent connects via the workspace daemon's HTTP API, not through VS Code or JetBrains. You can omit IDE-specific configuration, extensions, and desktop tools.
  • Stricter network policies. Agent workspaces typically need access to only the control plane and your git provider. You can apply tighter egress rules than you would for a developer who needs to browse documentation or access additional services.
  • Reduced permissions. Agent workspaces can use scoped credentials with fewer permissions than a developer's interactive session.

See Creating templates for step-by-step instructions on creating templates via the UI, CLI, or CI/CD.

Configure network boundaries

The workspace is the network boundary for the agent. If you want to control what the agent can access, control what the workspace can access.

This is a deliberate architectural advantage of running the agent loop in the control plane. Because all AI functionality — LLM inference, tool dispatch, chat state — lives in the control plane, agent workspaces do not need outbound access to any LLM provider. The workspace only needs to reach:

  • The Coder control plane — required for the workspace daemon to function.
  • Your git provider — required for push and pull operations.

Everything else can be blocked at the network level.

Why network boundaries are more effective than process-level controls

Traditional approaches to restricting agent behavior — such as blocking specific commands at the process level — are difficult to enforce reliably. An agent executing arbitrary shell commands can find alternative paths to achieve the same result (aliasing commands, writing scripts, using different tools).

Network-level boundaries are more robust because they operate below the process layer. If the workspace cannot reach an external service, it does not matter what command the agent runs — the connection simply fails. This provides a firmer security guarantee than trying to restrict individual process behaviors.

See Architecture for more detail on the security model.

Scope permissions and credentials

The agent operates with the same identity and permissions as the user who submitted the prompt. There is no privilege escalation — if a developer cannot access a resource through the Coder dashboard, the agent cannot access it either.

External service credentials

When agent workspaces need access to external services (git providers, package registries, artifact stores), configure credentials with the minimum scope required:

  • Use separate tokens for agent templates. Rather than sharing the same broad-scope token used by developer workspaces, create a dedicated token with only the permissions the agent needs (e.g., read/write access to specific repositories, no admin access).
  • Configure external auth at the template level. Use Coder's external authentication to provide scoped git credentials. The agent uses the same external auth flow as any other workspace, so credentials are managed centrally.
  • Avoid injecting long-lived secrets. Prefer short-lived tokens or credential helpers over static API keys baked into the template image.

Git identity

Every git operation the agent performs — commits, pushes, pull requests — is attributed to the user who submitted the prompt. This happens through the existing git authentication configured in your Coder deployment. There is no shared bot account.

Ensure your templates configure git with the appropriate author information so that commits are properly attributed. The agent does not override git configuration — it uses whatever is set in the workspace environment.

Design template parameters for automation

The agent can read template parameters — including their names, descriptions, and defaults — and fill them in when creating a workspace. Well-designed parameters help the agent provision the right infrastructure without human intervention.

Keep parameters simple

  • Use sensible defaults. The agent performs best when most parameters have reasonable defaults and only a few require explicit selection. A template with ten required parameters and no defaults forces the agent to guess.
  • Minimize required parameters. If a parameter is not essential for the agent's use case, give it a default value or make it optional.

Write descriptive parameter metadata

The agent reads display_name and description fields to understand what a parameter controls. Treat these the same way you treat template descriptions — be specific and use natural language.

data "coder_parameter" "region" { name = "region" display_name = "Deployment Region" type = "string" description = "AWS region for the workspace. Use us-east-1 for the payments service or eu-west-1 for GDPR-regulated workloads." default = "us-east-1" }

A description like "AWS region" is less useful to the agent than one that explains when to use each option.

Avoid opaque identifiers

Parameters with values like ami-0abcdef1234567890 or subnet-12345 are difficult for the agent to reason about. Where possible, use human-readable option labels or map opaque IDs to descriptive names using Terraform locals.

For full parameter reference — including types, validation, mutability, and workspace presets — see Parameters. Dynamic parameters add conditional form controls and identity-aware defaults for more advanced use cases.

Pre-install tools and dependencies

Agent workspaces should be ready to work immediately after provisioning. The agent does not know how to install your organization's specific toolchain, and time spent installing dependencies is time not spent on the task.

What to pre-install

  • Language runtimes and build tools for the target stack (e.g., Go, Node, Python, Maven).
  • Common CLI tools the agent is likely to use: git, curl, jq, make, docker (if applicable).
  • Project-specific dependencies. If the template targets a specific repository, consider pre-installing the project's dependencies or running the setup script as part of workspace startup.
  • Git configuration. Ensure git is configured with credentials and author information so the agent can commit and push without additional setup.

For guidance on building and maintaining workspace images, see Image management.

Set a meaningful working directory

If the template targets a specific repository, pre-clone it and set the working directory so the agent starts in the right place:

resource "coder_agent" "main" { os = "linux" arch = "amd64" dir = "/home/coder/payments-service" }

This avoids a round trip where the agent needs to figure out where the code lives before it can begin working.

Use prebuilt workspaces to reduce provisioning time

Workspace provisioning is the primary source of latency when the agent begins a task. Templates with complex infrastructure, large images, or lengthy startup scripts can take minutes to provision — time where the developer is waiting and the agent is idle.

Prebuilt workspaces eliminate this delay by maintaining a pool of ready-to-use workspaces for specific parameter presets. When the agent creates a workspace that matches a preset, Coder assigns an already-running prebuilt workspace instead of provisioning from scratch. The agent can begin working immediately.

Checklist

Use this as a quick reference when creating or updating templates for Coder Agents:

  • Template has a specific, natural-language description that includes language, framework, and target project or service.
  • Display name is readable and descriptive.
  • Network egress is restricted to the control plane and git provider.
  • External service credentials use minimal-scope tokens.
  • Template parameters have sensible defaults and descriptive metadata.
  • Language runtimes, build tools, and git are pre-installed.
  • Prebuilt workspaces are configured for high-traffic presets (Premium).
  • Working directory is set to the target repository (if applicable).