@opencode-cloud/core
Advanced tools
+1
-1
| [package] | ||
| name = "opencode-cloud-core" | ||
| version = "21.0.0" | ||
| version = "21.0.1" | ||
| edition = "2024" | ||
@@ -5,0 +5,0 @@ rust-version = "1.89" |
+1
-1
| { | ||
| "name": "@opencode-cloud/core", | ||
| "version": "21.0.0", | ||
| "version": "21.0.1", | ||
| "description": "Core NAPI bindings for opencode-cloud (internal package)", | ||
@@ -5,0 +5,0 @@ "main": "index.js", |
+21
-7
@@ -22,2 +22,18 @@ # opencode-cloud | ||
| ## Quick Deploy (Docker) | ||
| Deploy opencode-cloud with one command. Installs Docker if needed (Linux), downloads the Docker Compose config, starts the service, and prints the login credentials: | ||
| ```bash | ||
| curl -fsSL https://raw.githubusercontent.com/pRizz/opencode-cloud/main/scripts/quick-deploy.sh | bash | ||
| ``` | ||
| Then open [http://localhost:3000](http://localhost:3000) and enter the Initial One-Time Password (IOTP) to complete setup. | ||
| > **macOS/Windows:** Install [Docker Desktop](https://www.docker.com/products/docker-desktop/) first, then run the command above. | ||
| > **Remote server:** SSH into the server, run the command, then access via SSH tunnel: `ssh -L 3000:localhost:3000 root@<server-ip>` | ||
| > **Interactive mode:** Add `--interactive` to be prompted before each step: `curl -fsSL .../scripts/quick-deploy.sh | bash -s -- --interactive` | ||
| ## Quick install (cargo) | ||
@@ -70,2 +86,4 @@ | ||
| > **Tip:** For a fully automated setup, see [Quick Deploy](#quick-deploy-docker) above. | ||
| The fastest way to run opencode-cloud locally: | ||
@@ -100,12 +118,8 @@ | ||
| ```bash | ||
| curl -O https://raw.githubusercontent.com/pRizz/opencode-cloud/main/docker-compose.yml | ||
| apt-get update -y && apt-get install -y docker.io && systemctl enable --now docker | ||
| docker compose up -d | ||
| curl -fsSL https://raw.githubusercontent.com/pRizz/opencode-cloud/main/scripts/quick-deploy.sh | bash | ||
| ``` | ||
| Retrieve the IOTP and open `http://localhost:3000` via SSH tunnel: | ||
| This installs Docker, downloads the Compose file, starts the service, and prints the IOTP. | ||
| ```bash | ||
| docker compose logs | grep -F "INITIAL ONE-TIME PASSWORD (IOTP): " | tail -n1 | sed 's/.*INITIAL ONE-TIME PASSWORD (IOTP): //' | ||
| ``` | ||
| Access via SSH tunnel: `ssh -L 3000:localhost:3000 root@<droplet-ip>`, then open `http://localhost:3000`. | ||
@@ -112,0 +126,0 @@ Docs: `docs/deploy/digitalocean-droplet.md` |
@@ -243,18 +243,3 @@ #!/bin/bash | ||
| cmd_init_internal() { | ||
| if has_non_protected_configured_user; then | ||
| emit_inactive_and_cleanup | ||
| return 0 | ||
| fi | ||
| if bootstrap_is_completed; then | ||
| emit_status "0" | ||
| return 0 | ||
| fi | ||
| if state_is_active; then | ||
| emit_status "1" | ||
| return 0 | ||
| fi | ||
| generate_fresh_otp() { | ||
| remove_state_files | ||
@@ -278,5 +263,25 @@ | ||
| jq -cn --arg created_at "${created_at}" --arg otp "${otp}" '{ok:true,active:true,created_at:$created_at,otp:$otp}' | ||
| jq -cn --arg created_at "${created_at}" --arg otp "${otp}" \ | ||
| '{ok:true,active:true,created_at:$created_at,otp:$otp}' | ||
| } | ||
| cmd_init_internal() { | ||
| if has_non_protected_configured_user; then | ||
| emit_inactive_and_cleanup | ||
| return 0 | ||
| fi | ||
| if bootstrap_is_completed; then | ||
| emit_status "0" | ||
| return 0 | ||
| fi | ||
| if state_is_active; then | ||
| emit_status "1" | ||
| return 0 | ||
| fi | ||
| generate_fresh_otp | ||
| } | ||
| cmd_init() { | ||
@@ -293,5 +298,3 @@ ensure_state_dir | ||
| rm -f "${COMPLETE_MARKER_FILE}" | ||
| remove_state_files | ||
| cmd_init_internal | ||
| generate_fresh_otp | ||
| } | ||
@@ -298,0 +301,0 @@ |
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
438493
0.2%613
2.34%