From 70399cb8a7c0c264e945f12c42cd69732f0ddb7c Mon Sep 17 00:00:00 2001 From: L <6723574+louisgv@users.noreply.github.com> Date: Sat, 7 Feb 2026 14:11:04 -0800 Subject: [PATCH] Add E2B + Modal sandbox providers, restructure README (#22) New sandbox-type cloud providers (no SSH, SDK-driven exec): - e2b/: E2B sandboxed containers via CLI (~150ms cold start) - modal/: Modal sandboxed containers via Python SDK (sub-second cold start) README restructure: - Root README.md simplified to matrix table with launch links - Per-cloud README.md files with detailed docs, env vars, non-interactive mode Matrix now 10 agents x 10 clouds = 100/100 implemented. Co-authored-by: Sprite Co-authored-by: Claude Opus 4.6 (1M context) --- README.md | 692 +++------------------------------------- aws-lightsail/README.md | 75 +++++ digitalocean/README.md | 74 +++++ e2b/README.md | 76 +++++ e2b/aider.sh | 69 ++++ e2b/amazonq.sh | 64 ++++ e2b/claude.sh | 111 +++++++ e2b/cline.sh | 64 ++++ e2b/codex.sh | 64 ++++ e2b/gemini.sh | 65 ++++ e2b/goose.sh | 63 ++++ e2b/interpreter.sh | 64 ++++ e2b/lib/common.sh | 227 +++++++++++++ e2b/nanoclaw.sh | 78 +++++ e2b/openclaw.sh | 104 ++++++ gcp/README.md | 75 +++++ hetzner/README.md | 74 +++++ lambda/README.md | 76 +++++ linode/README.md | 74 +++++ manifest.json | 50 ++- modal/README.md | 75 +++++ modal/aider.sh | 68 ++++ modal/amazonq.sh | 63 ++++ modal/claude.sh | 110 +++++++ modal/cline.sh | 63 ++++ modal/codex.sh | 63 ++++ modal/gemini.sh | 64 ++++ modal/goose.sh | 62 ++++ modal/interpreter.sh | 63 ++++ modal/lib/common.sh | 231 ++++++++++++++ modal/nanoclaw.sh | 77 +++++ modal/openclaw.sh | 103 ++++++ sprite/README.md | 73 +++++ vultr/README.md | 74 +++++ 34 files changed, 2774 insertions(+), 654 deletions(-) create mode 100644 aws-lightsail/README.md create mode 100644 digitalocean/README.md create mode 100644 e2b/README.md create mode 100755 e2b/aider.sh create mode 100755 e2b/amazonq.sh create mode 100755 e2b/claude.sh create mode 100755 e2b/cline.sh create mode 100755 e2b/codex.sh create mode 100755 e2b/gemini.sh create mode 100755 e2b/goose.sh create mode 100755 e2b/interpreter.sh create mode 100644 e2b/lib/common.sh create mode 100755 e2b/nanoclaw.sh create mode 100755 e2b/openclaw.sh create mode 100644 gcp/README.md create mode 100644 hetzner/README.md create mode 100644 lambda/README.md create mode 100644 linode/README.md create mode 100644 modal/README.md create mode 100755 modal/aider.sh create mode 100755 modal/amazonq.sh create mode 100755 modal/claude.sh create mode 100755 modal/cline.sh create mode 100755 modal/codex.sh create mode 100755 modal/gemini.sh create mode 100755 modal/goose.sh create mode 100755 modal/interpreter.sh create mode 100644 modal/lib/common.sh create mode 100755 modal/nanoclaw.sh create mode 100755 modal/openclaw.sh create mode 100644 sprite/README.md create mode 100644 vultr/README.md diff --git a/README.md b/README.md index 45d81ba2..6bd04baf 100644 --- a/README.md +++ b/README.md @@ -1,669 +1,55 @@ # Spawn -Conjure your agents! - -## Features - -- 🔐 **Automatic OAuth** - Seamless authentication with OpenRouter -- 🔄 **Smart Fallback** - Manual API key entry if OAuth fails -- 🚀 **One Command Setup** - Get running in minutes -- 🔧 **Environment Ready** - Pre-configured shell and dependencies - -## Usage - -#### Claude Code +One command to launch any AI coding agent on any cloud, pre-configured with [OpenRouter](https://openrouter.ai). ```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/claude.sh) +bash <(curl -fsSL https://openrouter.ai/lab/spawn/{cloud}/{agent}.sh) ``` -#### OpenClaw +## Matrix + +| | [Sprite](sprite/) | [Hetzner](hetzner/) | [DigitalOcean](digitalocean/) | [Vultr](vultr/) | [Linode](linode/) | [Lambda](lambda/) | [AWS Lightsail](aws-lightsail/) | [GCP](gcp/) | [E2B](e2b/) | [Modal](modal/) | +|---|---|---|---|---|---|---|---|---|---|---| +| **Claude Code** | [launch](sprite/claude.sh) | [launch](hetzner/claude.sh) | [launch](digitalocean/claude.sh) | [launch](vultr/claude.sh) | [launch](linode/claude.sh) | [launch](lambda/claude.sh) | [launch](aws-lightsail/claude.sh) | [launch](gcp/claude.sh) | [launch](e2b/claude.sh) | [launch](modal/claude.sh) | +| **OpenClaw** | [launch](sprite/openclaw.sh) | [launch](hetzner/openclaw.sh) | [launch](digitalocean/openclaw.sh) | [launch](vultr/openclaw.sh) | [launch](linode/openclaw.sh) | [launch](lambda/openclaw.sh) | [launch](aws-lightsail/openclaw.sh) | [launch](gcp/openclaw.sh) | [launch](e2b/openclaw.sh) | [launch](modal/openclaw.sh) | +| **NanoClaw** | [launch](sprite/nanoclaw.sh) | [launch](hetzner/nanoclaw.sh) | [launch](digitalocean/nanoclaw.sh) | [launch](vultr/nanoclaw.sh) | [launch](linode/nanoclaw.sh) | [launch](lambda/nanoclaw.sh) | [launch](aws-lightsail/nanoclaw.sh) | [launch](gcp/nanoclaw.sh) | [launch](e2b/nanoclaw.sh) | [launch](modal/nanoclaw.sh) | +| **Aider** | [launch](sprite/aider.sh) | [launch](hetzner/aider.sh) | [launch](digitalocean/aider.sh) | [launch](vultr/aider.sh) | [launch](linode/aider.sh) | [launch](lambda/aider.sh) | [launch](aws-lightsail/aider.sh) | [launch](gcp/aider.sh) | [launch](e2b/aider.sh) | [launch](modal/aider.sh) | +| **Goose** | [launch](sprite/goose.sh) | [launch](hetzner/goose.sh) | [launch](digitalocean/goose.sh) | [launch](vultr/goose.sh) | [launch](linode/goose.sh) | [launch](lambda/goose.sh) | [launch](aws-lightsail/goose.sh) | [launch](gcp/goose.sh) | [launch](e2b/goose.sh) | [launch](modal/goose.sh) | +| **Codex CLI** | [launch](sprite/codex.sh) | [launch](hetzner/codex.sh) | [launch](digitalocean/codex.sh) | [launch](vultr/codex.sh) | [launch](linode/codex.sh) | [launch](lambda/codex.sh) | [launch](aws-lightsail/codex.sh) | [launch](gcp/codex.sh) | [launch](e2b/codex.sh) | [launch](modal/codex.sh) | +| **Open Interpreter** | [launch](sprite/interpreter.sh) | [launch](hetzner/interpreter.sh) | [launch](digitalocean/interpreter.sh) | [launch](vultr/interpreter.sh) | [launch](linode/interpreter.sh) | [launch](lambda/interpreter.sh) | [launch](aws-lightsail/interpreter.sh) | [launch](gcp/interpreter.sh) | [launch](e2b/interpreter.sh) | [launch](modal/interpreter.sh) | +| **Gemini CLI** | [launch](sprite/gemini.sh) | [launch](hetzner/gemini.sh) | [launch](digitalocean/gemini.sh) | [launch](vultr/gemini.sh) | [launch](linode/gemini.sh) | [launch](lambda/gemini.sh) | [launch](aws-lightsail/gemini.sh) | [launch](gcp/gemini.sh) | [launch](e2b/gemini.sh) | [launch](modal/gemini.sh) | +| **Amazon Q** | [launch](sprite/amazonq.sh) | [launch](hetzner/amazonq.sh) | [launch](digitalocean/amazonq.sh) | [launch](vultr/amazonq.sh) | [launch](linode/amazonq.sh) | [launch](lambda/amazonq.sh) | [launch](aws-lightsail/amazonq.sh) | [launch](gcp/amazonq.sh) | [launch](e2b/amazonq.sh) | [launch](modal/amazonq.sh) | +| **Cline** | [launch](sprite/cline.sh) | [launch](hetzner/cline.sh) | [launch](digitalocean/cline.sh) | [launch](vultr/cline.sh) | [launch](linode/cline.sh) | [launch](lambda/cline.sh) | [launch](aws-lightsail/cline.sh) | [launch](gcp/cline.sh) | [launch](e2b/cline.sh) | [launch](modal/cline.sh) | + +**10 agents x 10 clouds = 100 combinations.** Every script injects OpenRouter credentials automatically. + +## How It Works + +Each script: +1. Authenticates with the cloud provider +2. Provisions a server/sandbox +3. Installs the agent + dependencies +4. Gets your OpenRouter API key (OAuth or manual) +5. Injects OpenRouter env vars into the shell +6. Drops you into an interactive session + +## Non-Interactive Mode + +Skip all prompts by setting env vars: ```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/openclaw.sh) -``` - -#### NanoClaw - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/nanoclaw.sh) -``` - -#### Aider - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/aider.sh) -``` - -#### Goose - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/goose.sh) -``` - -#### Codex CLI - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/codex.sh) -``` - -#### Open Interpreter - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/interpreter.sh) -``` - -#### Gemini CLI - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/gemini.sh) -``` -### Non-Interactive Mode - -#### Amazon Q CLI - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/amazonq.sh) -``` -For automation or CI/CD, set environment variables: - -#### Cline - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/cline.sh) -``` -#### Claude Code - -```bash -SPRITE_NAME=dev-mk1 \ OPENROUTER_API_KEY=sk-or-v1-xxxxx \ - bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/claude.sh) +{CLOUD_NAME_VAR}=dev-mk1 \ + bash <(curl -fsSL https://openrouter.ai/lab/spawn/{cloud}/claude.sh) ``` -#### OpenClaw +See each cloud's [README](sprite/README.md) for provider-specific env vars. -```bash -SPRITE_NAME=dev-mk1 \ -OPENROUTER_API_KEY=sk-or-v1-xxxxx \ - bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/openclaw.sh) -``` - -#### NanoClaw - -```bash -SPRITE_NAME=dev-mk1 \ -OPENROUTER_API_KEY=sk-or-v1-xxxxx \ - bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/nanoclaw.sh) -``` - -**Environment Variables:** -- `SPRITE_NAME` - Name for the sprite (skips prompt) -- `OPENROUTER_API_KEY` - Skip OAuth and use this API key directly - ---- - -## Hetzner Cloud - -Spawn agents on [Hetzner Cloud](https://www.hetzner.com/cloud/) servers. No `hcloud` CLI needed — uses the Hetzner REST API directly. - -### Usage - -#### Claude Code - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/claude.sh) -``` - -#### OpenClaw - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/openclaw.sh) -``` - -#### NanoClaw - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/nanoclaw.sh) -``` - -#### Aider - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/aider.sh) -``` - -#### Goose - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/goose.sh) -``` - -#### Codex CLI - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/codex.sh) -``` - -#### Open Interpreter - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/interpreter.sh) -``` - -#### Gemini CLI - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/gemini.sh) -``` -### Non-Interactive Mode - -#### Amazon Q CLI - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/amazonq.sh) -``` -```bash -HETZNER_SERVER_NAME=dev-mk1 \ -HCLOUD_TOKEN=your-hetzner-api-token \ -OPENROUTER_API_KEY=sk-or-v1-xxxxx \ - bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/claude.sh) -``` - -#### Cline - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/cline.sh) -``` -**Environment Variables:** -- `HETZNER_SERVER_NAME` - Name for the server (skips prompt) -- `HCLOUD_TOKEN` - Hetzner Cloud API token (skips prompt, saved to `~/.config/spawn/hetzner.json`) -- `OPENROUTER_API_KEY` - Skip OAuth and use this API key directly -- `HETZNER_SERVER_TYPE` - Server type (default: `cx22`) -- `HETZNER_LOCATION` - Datacenter location (default: `fsn1`) - ---- - -## DigitalOcean - -Spawn agents on [DigitalOcean](https://www.digitalocean.com/) Droplets via REST API. - -### Usage - -#### Claude Code - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/claude.sh) -``` - -#### OpenClaw - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/openclaw.sh) -``` - -#### NanoClaw - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/nanoclaw.sh) -``` - -#### Aider - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/aider.sh) -``` - -#### Goose - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/goose.sh) -``` - -#### Codex CLI - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/codex.sh) -``` - -#### Open Interpreter - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/interpreter.sh) -``` - -#### Gemini CLI - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/gemini.sh) -``` -### Non-Interactive Mode - -#### Amazon Q CLI - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/amazonq.sh) -``` -```bash -DO_DROPLET_NAME=dev-mk1 \ -DO_API_TOKEN=your-digitalocean-api-token \ -OPENROUTER_API_KEY=sk-or-v1-xxxxx \ - bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/claude.sh) -``` - -#### Cline - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/cline.sh) -``` -**Environment Variables:** -- `DO_DROPLET_NAME` - Name for the droplet (skips prompt) -- `DO_API_TOKEN` - DigitalOcean API token (skips prompt, saved to `~/.config/spawn/digitalocean.json`) -- `OPENROUTER_API_KEY` - Skip OAuth and use this API key directly -- `DO_DROPLET_SIZE` - Droplet size (default: `s-2vcpu-2gb`) -- `DO_REGION` - Datacenter region (default: `nyc3`) - ---- - -## Vultr - -Spawn agents on [Vultr](https://www.vultr.com/) Cloud Compute instances via REST API. - -### Usage - -#### Claude Code - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/claude.sh) -``` - -#### OpenClaw - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/openclaw.sh) -``` - -#### NanoClaw - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/nanoclaw.sh) -``` - -#### Aider - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/aider.sh) -``` - -#### Goose - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/goose.sh) -``` - -#### Codex CLI - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/codex.sh) -``` - -#### Open Interpreter - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/interpreter.sh) -``` - -#### Gemini CLI - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/gemini.sh) -``` -### Non-Interactive Mode - -#### Amazon Q CLI - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/amazonq.sh) -``` -```bash -VULTR_SERVER_NAME=dev-mk1 \ -VULTR_API_KEY=your-vultr-api-key \ -OPENROUTER_API_KEY=sk-or-v1-xxxxx \ - bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/claude.sh) -``` - -#### Cline - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/cline.sh) -``` -**Environment Variables:** -- `VULTR_SERVER_NAME` - Name for the instance (skips prompt) -- `VULTR_API_KEY` - Vultr API key (skips prompt, saved to `~/.config/spawn/vultr.json`) -- `OPENROUTER_API_KEY` - Skip OAuth and use this API key directly -- `VULTR_PLAN` - Instance plan (default: `vc2-1c-2gb`) -- `VULTR_REGION` - Datacenter region (default: `ewr`) - ---- - -## Linode (Akamai) - -Spawn agents on [Linode](https://www.linode.com/) instances via REST API. - -### Usage - -#### Claude Code - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/claude.sh) -``` - -#### OpenClaw - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/openclaw.sh) -``` - -#### NanoClaw - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/nanoclaw.sh) -``` - -#### Aider - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/aider.sh) -``` - -#### Goose - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/goose.sh) -``` - -#### Codex CLI - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/codex.sh) -``` - -#### Open Interpreter - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/interpreter.sh) -``` - -#### Gemini CLI - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/gemini.sh) -``` -### Non-Interactive Mode - -#### Amazon Q CLI - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/amazonq.sh) -``` -```bash -LINODE_SERVER_NAME=dev-mk1 \ -LINODE_API_TOKEN=your-linode-api-token \ -OPENROUTER_API_KEY=sk-or-v1-xxxxx \ - bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/claude.sh) -``` - -#### Cline - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/cline.sh) -``` -**Environment Variables:** -- `LINODE_SERVER_NAME` - Label for the Linode (skips prompt) -- `LINODE_API_TOKEN` - Linode API token (skips prompt, saved to `~/.config/spawn/linode.json`) -- `OPENROUTER_API_KEY` - Skip OAuth and use this API key directly -- `LINODE_TYPE` - Instance type (default: `g6-standard-1`) -- `LINODE_REGION` - Datacenter region (default: `us-east`) - ---- - -## AWS Lightsail - -Spawn agents on [AWS Lightsail](https://aws.amazon.com/lightsail/) instances. Requires AWS CLI installed and configured (`aws configure`). - -### Usage - -#### Claude Code - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/claude.sh) -``` - -#### OpenClaw - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/openclaw.sh) -``` - -#### NanoClaw - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/nanoclaw.sh) -``` - -#### Aider - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/aider.sh) -``` - -#### Goose - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/goose.sh) -``` - -#### Codex CLI - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/codex.sh) -``` - -#### Open Interpreter - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/interpreter.sh) -``` - -#### Gemini CLI - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/gemini.sh) -``` -### Non-Interactive Mode - -#### Amazon Q CLI - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/amazonq.sh) -``` -```bash -LIGHTSAIL_SERVER_NAME=dev-mk1 \ -OPENROUTER_API_KEY=sk-or-v1-xxxxx \ - bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/claude.sh) -``` - -#### Cline - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/cline.sh) -``` -**Environment Variables:** -- `LIGHTSAIL_SERVER_NAME` - Name for the instance (skips prompt) -- `OPENROUTER_API_KEY` - Skip OAuth and use this API key directly -- `LIGHTSAIL_BUNDLE` - Instance bundle (default: `medium_3_0`) -- `LIGHTSAIL_REGION` - AWS region (default: `us-east-1`) - ---- - -## Lambda Cloud - -Spawn agents on [Lambda Cloud](https://lambdalabs.com/) GPU instances via REST API. Great for GPU-accelerated AI workloads. - -### Usage - -#### Claude Code - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/claude.sh) -``` - -#### OpenClaw - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/openclaw.sh) -``` - -#### NanoClaw - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/nanoclaw.sh) -``` - -#### Aider - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/aider.sh) -``` - -#### Goose - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/goose.sh) -``` - -#### Codex CLI - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/codex.sh) -``` - -#### Open Interpreter - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/interpreter.sh) -``` - -#### Gemini CLI - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/gemini.sh) -``` - -#### Amazon Q CLI - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/amazonq.sh) -``` -### Non-Interactive Mode - -#### Cline - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/cline.sh) -``` -```bash -LAMBDA_SERVER_NAME=dev-mk1 \ -LAMBDA_API_KEY=your-lambda-api-key \ -OPENROUTER_API_KEY=sk-or-v1-xxxxx \ - bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/claude.sh) -``` - -**Environment Variables:** -- `LAMBDA_SERVER_NAME` - Name for the instance (skips prompt) -- `LAMBDA_API_KEY` - Lambda API key (skips prompt, saved to `~/.config/spawn/lambda.json`) -- `OPENROUTER_API_KEY` - Skip OAuth and use this API key directly -- `LAMBDA_INSTANCE_TYPE` - Instance type (default: `gpu_1x_a10`) -- `LAMBDA_REGION` - Region (default: `us-east-1`) - ---- - -## GCP Compute Engine - -Spawn agents on [Google Cloud Compute Engine](https://cloud.google.com/compute) instances. Requires `gcloud` CLI installed and configured. - -### Usage - -#### Claude Code - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/claude.sh) -``` - -#### OpenClaw - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/openclaw.sh) -``` - -#### NanoClaw - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/nanoclaw.sh) -``` - -#### Aider - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/aider.sh) -``` - -#### Goose - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/goose.sh) -``` - -#### Codex CLI - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/codex.sh) -``` - -#### Open Interpreter - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/interpreter.sh) -``` - -#### Gemini CLI - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/gemini.sh) -``` - -#### Amazon Q CLI - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/amazonq.sh) -``` - -#### Cline - -```bash -bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/cline.sh) -``` - -### Non-Interactive Mode +## Self-Improving ```bash -GCP_INSTANCE_NAME=dev-mk1 \ -OPENROUTER_API_KEY=sk-or-v1-xxxxx \ - bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/claude.sh) +./improve.sh # agent team fills gaps + discovers new agents/clouds +./improve.sh --loop # continuous improvement cycles ``` -**Environment Variables:** -- `GCP_INSTANCE_NAME` - Name for the instance (skips prompt) -- `GCP_PROJECT` - GCP project ID (defaults to gcloud config) -- `OPENROUTER_API_KEY` - Skip OAuth and use this API key directly -- `GCP_MACHINE_TYPE` - Machine type (default: `e2-medium`) -- `GCP_ZONE` - Compute zone (default: `us-central1-a`) +Uses [Claude Code Agent Teams](https://code.claude.com/docs/en/agent-teams) to coordinate parallel work. diff --git a/aws-lightsail/README.md b/aws-lightsail/README.md new file mode 100644 index 00000000..3b60b3c2 --- /dev/null +++ b/aws-lightsail/README.md @@ -0,0 +1,75 @@ +# AWS Lightsail + +AWS Lightsail instances via AWS CLI. [AWS Lightsail](https://aws.amazon.com/lightsail/) + +> Uses 'ubuntu' user instead of 'root'. Requires AWS CLI installed and configured. + +## Agents + +#### Claude Code + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/claude.sh) +``` + +#### OpenClaw + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/openclaw.sh) +``` + +#### NanoClaw + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/nanoclaw.sh) +``` + +#### Aider + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/aider.sh) +``` + +#### Goose + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/goose.sh) +``` + +#### Codex CLI + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/codex.sh) +``` + +#### Open Interpreter + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/interpreter.sh) +``` + +#### Gemini CLI + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/gemini.sh) +``` + +#### Amazon Q CLI + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/amazonq.sh) +``` + +#### Cline + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/cline.sh) +``` + +## Non-Interactive Mode + +```bash +LIGHTSAIL_SERVER_NAME=dev-mk1 \ +OPENROUTER_API_KEY=sk-or-v1-xxxxx \ + bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/claude.sh) +``` diff --git a/digitalocean/README.md b/digitalocean/README.md new file mode 100644 index 00000000..fdf1877f --- /dev/null +++ b/digitalocean/README.md @@ -0,0 +1,74 @@ +# DigitalOcean + +DigitalOcean Droplets via REST API. [DigitalOcean](https://www.digitalocean.com/) + +## Agents + +#### Claude Code + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/claude.sh) +``` + +#### OpenClaw + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/openclaw.sh) +``` + +#### NanoClaw + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/nanoclaw.sh) +``` + +#### Aider + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/aider.sh) +``` + +#### Goose + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/goose.sh) +``` + +#### Codex CLI + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/codex.sh) +``` + +#### Open Interpreter + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/interpreter.sh) +``` + +#### Gemini CLI + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/gemini.sh) +``` + +#### Amazon Q CLI + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/amazonq.sh) +``` + +#### Cline + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/cline.sh) +``` + +## Non-Interactive Mode + +```bash +DO_DROPLET_NAME=dev-mk1 \ +DO_API_TOKEN=your-token \ +OPENROUTER_API_KEY=sk-or-v1-xxxxx \ + bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/claude.sh) +``` diff --git a/e2b/README.md b/e2b/README.md new file mode 100644 index 00000000..5c26a57f --- /dev/null +++ b/e2b/README.md @@ -0,0 +1,76 @@ +# E2B + +E2B sandboxed cloud containers via CLI/SDK. [E2B](https://e2b.dev) + +> No SSH — uses E2B CLI for exec. Sandboxes start in ~150ms. Requires npm install -g @e2b/cli. + +## Agents + +#### Claude Code + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/claude.sh) +``` + +#### OpenClaw + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/openclaw.sh) +``` + +#### NanoClaw + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/nanoclaw.sh) +``` + +#### Aider + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/aider.sh) +``` + +#### Goose + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/goose.sh) +``` + +#### Codex CLI + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/codex.sh) +``` + +#### Open Interpreter + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/interpreter.sh) +``` + +#### Gemini CLI + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/gemini.sh) +``` + +#### Amazon Q CLI + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/amazonq.sh) +``` + +#### Cline + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/cline.sh) +``` + +## Non-Interactive Mode + +```bash +E2B_SANDBOX_NAME=dev-mk1 \ +E2B_API_KEY=your-key \ +OPENROUTER_API_KEY=sk-or-v1-xxxxx \ + bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/claude.sh) +``` diff --git a/e2b/aider.sh b/e2b/aider.sh new file mode 100755 index 00000000..66ae2313 --- /dev/null +++ b/e2b/aider.sh @@ -0,0 +1,69 @@ +#!/bin/bash +set -e + +# Source common functions - try local file first, fall back to remote +SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)" +if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then + source "$SCRIPT_DIR/lib/common.sh" +else + source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/e2b/lib/common.sh) +fi + +log_info "Aider on E2B" +echo "" + +# 1. Ensure E2B CLI and API token +ensure_e2b_cli +ensure_e2b_token + +# 2. Get sandbox name and create sandbox +SERVER_NAME=$(get_server_name) +create_server "$SERVER_NAME" + +# 3. Wait for base tools +wait_for_cloud_init + +# 4. Install Aider +log_warn "Installing Aider..." +run_server "pip install aider-chat 2>/dev/null || pip3 install aider-chat" +log_info "Aider installed" + +# 5. Get OpenRouter API key +echo "" +if [[ -n "$OPENROUTER_API_KEY" ]]; then + log_info "Using OpenRouter API key from environment" +else + OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180) +fi + +# 6. Get model preference +echo "" +log_warn "Browse models at: https://openrouter.ai/models" +log_warn "Which model would you like to use with Aider?" +MODEL_ID=$(safe_read "Enter model ID [openrouter/auto]: ") || MODEL_ID="" +MODEL_ID="${MODEL_ID:-openrouter/auto}" + +# 7. Inject environment variables into ~/.zshrc +log_warn "Setting up environment variables..." + +ENV_TEMP=$(mktemp) +cat > "$ENV_TEMP" << EOF + +# [spawn:env] +export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}" +EOF + +upload_file "$ENV_TEMP" "/tmp/env_config" +run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config" +rm "$ENV_TEMP" + +echo "" +log_info "E2B sandbox setup completed successfully!" +log_info "Sandbox: $SERVER_NAME (ID: $E2B_SANDBOX_ID)" +echo "" + +# 8. Start Aider interactively +log_warn "Starting Aider..." +sleep 1 +clear +interactive_session "source ~/.zshrc && aider --model openrouter/${MODEL_ID}" diff --git a/e2b/amazonq.sh b/e2b/amazonq.sh new file mode 100755 index 00000000..f15da535 --- /dev/null +++ b/e2b/amazonq.sh @@ -0,0 +1,64 @@ +#!/bin/bash +set -e + +# Source common functions - try local file first, fall back to remote +SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)" +if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then + source "$SCRIPT_DIR/lib/common.sh" +else + source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/e2b/lib/common.sh) +fi + +log_info "Amazon Q on E2B" +echo "" + +# 1. Ensure E2B CLI and API token +ensure_e2b_cli +ensure_e2b_token + +# 2. Get sandbox name and create sandbox +SERVER_NAME=$(get_server_name) +create_server "$SERVER_NAME" + +# 3. Wait for base tools +wait_for_cloud_init + +# 4. Install Amazon Q CLI +log_warn "Installing Amazon Q CLI..." +run_server "curl -fsSL https://desktop-release.q.us-east-1.amazonaws.com/latest/amazon-q-cli-install.sh | bash" +log_info "Amazon Q CLI installed" + +# 5. Get OpenRouter API key +echo "" +if [[ -n "$OPENROUTER_API_KEY" ]]; then + log_info "Using OpenRouter API key from environment" +else + OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180) +fi + +# 6. Inject environment variables into ~/.zshrc +log_warn "Setting up environment variables..." + +ENV_TEMP=$(mktemp) +cat > "$ENV_TEMP" << EOF + +# [spawn:env] +export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}" +export OPENAI_API_KEY="${OPENROUTER_API_KEY}" +export OPENAI_BASE_URL="https://openrouter.ai/api/v1" +EOF + +upload_file "$ENV_TEMP" "/tmp/env_config" +run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config" +rm "$ENV_TEMP" + +echo "" +log_info "E2B sandbox setup completed successfully!" +log_info "Sandbox: $SERVER_NAME (ID: $E2B_SANDBOX_ID)" +echo "" + +# 7. Start Amazon Q interactively +log_warn "Starting Amazon Q..." +sleep 1 +clear +interactive_session "source ~/.zshrc && q chat" diff --git a/e2b/claude.sh b/e2b/claude.sh new file mode 100755 index 00000000..121c77c7 --- /dev/null +++ b/e2b/claude.sh @@ -0,0 +1,111 @@ +#!/bin/bash +set -e + +# Source common functions - try local file first, fall back to remote +SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)" +if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then + source "$SCRIPT_DIR/lib/common.sh" +else + source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/e2b/lib/common.sh) +fi + +log_info "Claude Code on E2B" +echo "" + +# 1. Ensure E2B CLI and API token +ensure_e2b_cli +ensure_e2b_token + +# 2. Get sandbox name and create sandbox +SERVER_NAME=$(get_server_name) +create_server "$SERVER_NAME" + +# 3. Wait for base tools +wait_for_cloud_init + +# 4. Verify Claude Code is installed (fallback to manual install) +log_warn "Verifying Claude Code installation..." +if ! run_server "command -v claude" >/dev/null 2>&1; then + log_warn "Claude Code not found, installing manually..." + run_server "curl -fsSL https://claude.ai/install.sh | bash" +fi +log_info "Claude Code is installed" + +# 5. Get OpenRouter API key +echo "" +if [[ -n "$OPENROUTER_API_KEY" ]]; then + log_info "Using OpenRouter API key from environment" +else + OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180) +fi + +# 6. Inject environment variables into ~/.zshrc +log_warn "Setting up environment variables..." + +ENV_TEMP=$(mktemp) +cat > "$ENV_TEMP" << EOF + +# [spawn:env] +export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}" +export ANTHROPIC_BASE_URL="https://openrouter.ai/api" +export ANTHROPIC_AUTH_TOKEN="${OPENROUTER_API_KEY}" +export ANTHROPIC_API_KEY="" +export CLAUDE_CODE_SKIP_ONBOARDING="1" +export CLAUDE_CODE_ENABLE_TELEMETRY="0" +EOF + +upload_file "$ENV_TEMP" "/tmp/env_config" +run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config" +rm "$ENV_TEMP" + +# 7. Configure Claude Code settings +log_warn "Configuring Claude Code..." + +run_server "mkdir -p ~/.claude" + +# Upload settings.json +SETTINGS_TEMP=$(mktemp) +cat > "$SETTINGS_TEMP" << EOF +{ + "theme": "dark", + "editor": "vim", + "env": { + "CLAUDE_CODE_ENABLE_TELEMETRY": "0", + "ANTHROPIC_BASE_URL": "https://openrouter.ai/api", + "ANTHROPIC_AUTH_TOKEN": "${OPENROUTER_API_KEY}" + }, + "permissions": { + "defaultMode": "bypassPermissions", + "dangerouslySkipPermissions": true + } +} +EOF + +upload_file "$SETTINGS_TEMP" ~/.claude/settings.json +rm "$SETTINGS_TEMP" + +# Upload ~/.claude.json global state +GLOBAL_STATE_TEMP=$(mktemp) +cat > "$GLOBAL_STATE_TEMP" << EOF +{ + "hasCompletedOnboarding": true, + "bypassPermissionsModeAccepted": true +} +EOF + +upload_file "$GLOBAL_STATE_TEMP" ~/.claude.json +rm "$GLOBAL_STATE_TEMP" + +# Create empty CLAUDE.md +run_server "touch ~/.claude/CLAUDE.md" + +echo "" +log_info "E2B sandbox setup completed successfully!" +log_info "Sandbox: $SERVER_NAME (ID: $E2B_SANDBOX_ID)" +echo "" + +# 8. Start Claude Code interactively +log_warn "Starting Claude Code..." +sleep 1 +clear +interactive_session "source ~/.zshrc && claude" diff --git a/e2b/cline.sh b/e2b/cline.sh new file mode 100755 index 00000000..ddc0ac4b --- /dev/null +++ b/e2b/cline.sh @@ -0,0 +1,64 @@ +#!/bin/bash +set -e + +# Source common functions - try local file first, fall back to remote +SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)" +if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then + source "$SCRIPT_DIR/lib/common.sh" +else + source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/e2b/lib/common.sh) +fi + +log_info "Cline on E2B" +echo "" + +# 1. Ensure E2B CLI and API token +ensure_e2b_cli +ensure_e2b_token + +# 2. Get sandbox name and create sandbox +SERVER_NAME=$(get_server_name) +create_server "$SERVER_NAME" + +# 3. Wait for base tools +wait_for_cloud_init + +# 4. Install Cline +log_warn "Installing Cline..." +run_server "npm install -g cline" +log_info "Cline installed" + +# 5. Get OpenRouter API key +echo "" +if [[ -n "$OPENROUTER_API_KEY" ]]; then + log_info "Using OpenRouter API key from environment" +else + OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180) +fi + +# 6. Inject environment variables into ~/.zshrc +log_warn "Setting up environment variables..." + +ENV_TEMP=$(mktemp) +cat > "$ENV_TEMP" << EOF + +# [spawn:env] +export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}" +export OPENAI_API_KEY="${OPENROUTER_API_KEY}" +export OPENAI_BASE_URL="https://openrouter.ai/api/v1" +EOF + +upload_file "$ENV_TEMP" "/tmp/env_config" +run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config" +rm "$ENV_TEMP" + +echo "" +log_info "E2B sandbox setup completed successfully!" +log_info "Sandbox: $SERVER_NAME (ID: $E2B_SANDBOX_ID)" +echo "" + +# 7. Start Cline interactively +log_warn "Starting Cline..." +sleep 1 +clear +interactive_session "source ~/.zshrc && cline" diff --git a/e2b/codex.sh b/e2b/codex.sh new file mode 100755 index 00000000..a87ea87a --- /dev/null +++ b/e2b/codex.sh @@ -0,0 +1,64 @@ +#!/bin/bash +set -e + +# Source common functions - try local file first, fall back to remote +SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)" +if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then + source "$SCRIPT_DIR/lib/common.sh" +else + source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/e2b/lib/common.sh) +fi + +log_info "Codex CLI on E2B" +echo "" + +# 1. Ensure E2B CLI and API token +ensure_e2b_cli +ensure_e2b_token + +# 2. Get sandbox name and create sandbox +SERVER_NAME=$(get_server_name) +create_server "$SERVER_NAME" + +# 3. Wait for base tools +wait_for_cloud_init + +# 4. Install Codex CLI +log_warn "Installing Codex CLI..." +run_server "npm install -g @openai/codex" +log_info "Codex CLI installed" + +# 5. Get OpenRouter API key +echo "" +if [[ -n "$OPENROUTER_API_KEY" ]]; then + log_info "Using OpenRouter API key from environment" +else + OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180) +fi + +# 6. Inject environment variables into ~/.zshrc +log_warn "Setting up environment variables..." + +ENV_TEMP=$(mktemp) +cat > "$ENV_TEMP" << EOF + +# [spawn:env] +export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}" +export OPENAI_API_KEY="${OPENROUTER_API_KEY}" +export OPENAI_BASE_URL="https://openrouter.ai/api/v1" +EOF + +upload_file "$ENV_TEMP" "/tmp/env_config" +run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config" +rm "$ENV_TEMP" + +echo "" +log_info "E2B sandbox setup completed successfully!" +log_info "Sandbox: $SERVER_NAME (ID: $E2B_SANDBOX_ID)" +echo "" + +# 7. Start Codex interactively +log_warn "Starting Codex..." +sleep 1 +clear +interactive_session "source ~/.zshrc && codex" diff --git a/e2b/gemini.sh b/e2b/gemini.sh new file mode 100755 index 00000000..2ca1ca1a --- /dev/null +++ b/e2b/gemini.sh @@ -0,0 +1,65 @@ +#!/bin/bash +set -e + +# Source common functions - try local file first, fall back to remote +SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)" +if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then + source "$SCRIPT_DIR/lib/common.sh" +else + source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/e2b/lib/common.sh) +fi + +log_info "Gemini CLI on E2B" +echo "" + +# 1. Ensure E2B CLI and API token +ensure_e2b_cli +ensure_e2b_token + +# 2. Get sandbox name and create sandbox +SERVER_NAME=$(get_server_name) +create_server "$SERVER_NAME" + +# 3. Wait for base tools +wait_for_cloud_init + +# 4. Install Gemini CLI +log_warn "Installing Gemini CLI..." +run_server "npm install -g @google/gemini-cli" +log_info "Gemini CLI installed" + +# 5. Get OpenRouter API key +echo "" +if [[ -n "$OPENROUTER_API_KEY" ]]; then + log_info "Using OpenRouter API key from environment" +else + OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180) +fi + +# 6. Inject environment variables into ~/.zshrc +log_warn "Setting up environment variables..." + +ENV_TEMP=$(mktemp) +cat > "$ENV_TEMP" << EOF + +# [spawn:env] +export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}" +export GEMINI_API_KEY="${OPENROUTER_API_KEY}" +export OPENAI_API_KEY="${OPENROUTER_API_KEY}" +export OPENAI_BASE_URL="https://openrouter.ai/api/v1" +EOF + +upload_file "$ENV_TEMP" "/tmp/env_config" +run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config" +rm "$ENV_TEMP" + +echo "" +log_info "E2B sandbox setup completed successfully!" +log_info "Sandbox: $SERVER_NAME (ID: $E2B_SANDBOX_ID)" +echo "" + +# 7. Start Gemini interactively +log_warn "Starting Gemini..." +sleep 1 +clear +interactive_session "source ~/.zshrc && gemini" diff --git a/e2b/goose.sh b/e2b/goose.sh new file mode 100755 index 00000000..216a5193 --- /dev/null +++ b/e2b/goose.sh @@ -0,0 +1,63 @@ +#!/bin/bash +set -e + +# Source common functions - try local file first, fall back to remote +SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)" +if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then + source "$SCRIPT_DIR/lib/common.sh" +else + source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/e2b/lib/common.sh) +fi + +log_info "Goose on E2B" +echo "" + +# 1. Ensure E2B CLI and API token +ensure_e2b_cli +ensure_e2b_token + +# 2. Get sandbox name and create sandbox +SERVER_NAME=$(get_server_name) +create_server "$SERVER_NAME" + +# 3. Wait for base tools +wait_for_cloud_init + +# 4. Install Goose +log_warn "Installing Goose..." +run_server "CONFIGURE=false curl -fsSL https://github.com/block/goose/releases/latest/download/download_cli.sh | bash" +log_info "Goose installed" + +# 5. Get OpenRouter API key +echo "" +if [[ -n "$OPENROUTER_API_KEY" ]]; then + log_info "Using OpenRouter API key from environment" +else + OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180) +fi + +# 6. Inject environment variables into ~/.zshrc +log_warn "Setting up environment variables..." + +ENV_TEMP=$(mktemp) +cat > "$ENV_TEMP" << EOF + +# [spawn:env] +export GOOSE_PROVIDER=openrouter +export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}" +EOF + +upload_file "$ENV_TEMP" "/tmp/env_config" +run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config" +rm "$ENV_TEMP" + +echo "" +log_info "E2B sandbox setup completed successfully!" +log_info "Sandbox: $SERVER_NAME (ID: $E2B_SANDBOX_ID)" +echo "" + +# 7. Start Goose interactively +log_warn "Starting Goose..." +sleep 1 +clear +interactive_session "source ~/.zshrc && goose" diff --git a/e2b/interpreter.sh b/e2b/interpreter.sh new file mode 100755 index 00000000..a56a68c8 --- /dev/null +++ b/e2b/interpreter.sh @@ -0,0 +1,64 @@ +#!/bin/bash +set -e + +# Source common functions - try local file first, fall back to remote +SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)" +if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then + source "$SCRIPT_DIR/lib/common.sh" +else + source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/e2b/lib/common.sh) +fi + +log_info "Open Interpreter on E2B" +echo "" + +# 1. Ensure E2B CLI and API token +ensure_e2b_cli +ensure_e2b_token + +# 2. Get sandbox name and create sandbox +SERVER_NAME=$(get_server_name) +create_server "$SERVER_NAME" + +# 3. Wait for base tools +wait_for_cloud_init + +# 4. Install Open Interpreter +log_warn "Installing Open Interpreter..." +run_server "pip install open-interpreter 2>/dev/null || pip3 install open-interpreter" +log_info "Open Interpreter installed" + +# 5. Get OpenRouter API key +echo "" +if [[ -n "$OPENROUTER_API_KEY" ]]; then + log_info "Using OpenRouter API key from environment" +else + OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180) +fi + +# 6. Inject environment variables into ~/.zshrc +log_warn "Setting up environment variables..." + +ENV_TEMP=$(mktemp) +cat > "$ENV_TEMP" << EOF + +# [spawn:env] +export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}" +export OPENAI_API_KEY="${OPENROUTER_API_KEY}" +export OPENAI_BASE_URL="https://openrouter.ai/api/v1" +EOF + +upload_file "$ENV_TEMP" "/tmp/env_config" +run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config" +rm "$ENV_TEMP" + +echo "" +log_info "E2B sandbox setup completed successfully!" +log_info "Sandbox: $SERVER_NAME (ID: $E2B_SANDBOX_ID)" +echo "" + +# 7. Start Open Interpreter interactively +log_warn "Starting Open Interpreter..." +sleep 1 +clear +interactive_session "source ~/.zshrc && interpreter" diff --git a/e2b/lib/common.sh b/e2b/lib/common.sh new file mode 100644 index 00000000..ee628c1e --- /dev/null +++ b/e2b/lib/common.sh @@ -0,0 +1,227 @@ +#!/bin/bash +# Common bash functions for E2B sandbox spawn scripts +# Uses E2B CLI (e2b) — https://e2b.dev +# Sandboxes are lightweight VMs that start in ~150ms +# No SSH — uses `e2b sandbox exec` for commands + +# ============================================================ +# Provider-agnostic functions +# ============================================================ + +RED='\033[0;31m' +GREEN='\033[0;32m' +YELLOW='\033[1;33m' +NC='\033[0m' + +log_info() { echo -e "${GREEN}$1${NC}" >&2; } +log_warn() { echo -e "${YELLOW}$1${NC}" >&2; } +log_error() { echo -e "${RED}$1${NC}" >&2; } + +safe_read() { + local prompt="$1" result="" + if [[ -t 0 ]]; then read -p "$prompt" result + elif echo -n "" > /dev/tty 2>/dev/null; then read -p "$prompt" result < /dev/tty + else log_error "Cannot read input: no TTY available"; return 1; fi + echo "$result" +} + +nc_listen() { + local port=$1; shift + if nc --help 2>&1 | grep -q "BusyBox\|busybox" || nc --help 2>&1 | grep -q "\-p "; then + nc -l -p "$port" "$@" + else nc -l "$port" "$@"; fi +} + +open_browser() { + local url=$1 + if command -v termux-open-url &>/dev/null; then termux-open-url "$url" /dev/null; then open "$url" /dev/null; then xdg-open "$url" /dev/null; then log_warn "netcat (nc) not found"; return 1; fi + local callback_url="http://localhost:${callback_port}/callback" + local auth_url="https://openrouter.ai/auth?callback_url=${callback_url}" + local oauth_dir=$(mktemp -d) code_file="$oauth_dir/code" + log_warn "Starting local OAuth server on port ${callback_port}..." + ( + local success_response='HTTP/1.1 200 OK\r\nContent-Type: text/html\r\nConnection: close\r\n\r\n

Authentication Successful!

You can close this tab

' + while true; do + local response_file=$(mktemp); echo -e "$success_response" > "$response_file" + local request=$(nc_listen "$callback_port" < "$response_file" 2>/dev/null | head -1) + local nc_status=$?; rm -f "$response_file" + if [[ $nc_status -ne 0 ]]; then break; fi + if [[ "$request" == *"/callback?code="* ]]; then + echo "$request" | sed -n 's/.*code=\([^ &]*\).*/\1/p' > "$code_file"; break + fi + done + ) /dev/null; then log_warn "Failed to start OAuth server"; rm -rf "$oauth_dir"; return 1; fi + log_warn "Opening browser to authenticate with OpenRouter..."; open_browser "$auth_url" + local timeout=120 elapsed=0 + while [[ ! -f "$code_file" ]] && [[ $elapsed -lt $timeout ]]; do sleep 1; ((elapsed++)); done + kill $server_pid 2>/dev/null || true; wait $server_pid 2>/dev/null || true + if [[ ! -f "$code_file" ]]; then log_warn "OAuth timeout"; rm -rf "$oauth_dir"; return 1; fi + local oauth_code=$(cat "$code_file"); rm -rf "$oauth_dir" + log_warn "Exchanging OAuth code for API key..." + local key_response=$(curl -s -X POST "https://openrouter.ai/api/v1/auth/keys" \ + -H "Content-Type: application/json" -d "{\"code\": \"$oauth_code\"}") + local api_key=$(echo "$key_response" | grep -o '"key":"[^"]*"' | sed 's/"key":"//;s/"$//') + if [[ -z "$api_key" ]]; then log_error "Failed to exchange OAuth code: ${key_response}"; return 1; fi + log_info "Successfully obtained OpenRouter API key via OAuth!"; echo "$api_key" +} + +get_openrouter_api_key_oauth() { + local callback_port=${1:-5180} + local api_key=$(try_oauth_flow "$callback_port") + if [[ -n "$api_key" ]]; then echo "$api_key"; return 0; fi + echo ""; log_warn "OAuth authentication failed or unavailable" + log_warn "You can enter your API key manually instead"; echo "" + local manual_choice=$(safe_read "Would you like to enter your API key manually? (Y/n): ") || { + log_error "Cannot prompt for manual entry in non-interactive mode" + log_warn "Set OPENROUTER_API_KEY environment variable for non-interactive usage"; return 1 + } + if [[ ! "$manual_choice" =~ ^[Nn]$ ]]; then + api_key=$(get_openrouter_api_key_manual); echo "$api_key"; return 0 + else log_error "Authentication cancelled by user"; return 1; fi +} + +# ============================================================ +# E2B specific functions +# ============================================================ + +ensure_e2b_cli() { + if ! command -v e2b &>/dev/null; then + log_warn "Installing E2B CLI..." + npm install -g @e2b/cli 2>/dev/null || { + log_error "Failed to install E2B CLI. Install manually: npm install -g @e2b/cli" + return 1 + } + fi + log_info "E2B CLI available" +} + +ensure_e2b_token() { + if [[ -n "$E2B_API_KEY" ]]; then + log_info "Using E2B API key from environment"; return 0 + fi + local config_dir="$HOME/.config/spawn" config_file="$config_dir/e2b.json" + if [[ -f "$config_file" ]]; then + local saved_key=$(python3 -c "import json; print(json.load(open('$config_file')).get('api_key',''))" 2>/dev/null) + if [[ -n "$saved_key" ]]; then + export E2B_API_KEY="$saved_key" + log_info "Using E2B API key from $config_file"; return 0 + fi + fi + echo ""; log_warn "E2B API Key Required" + echo -e "${YELLOW}Get your API key from: https://e2b.dev/dashboard${NC}"; echo "" + local api_key=$(safe_read "Enter your E2B API key: ") || return 1 + if [[ -z "$api_key" ]]; then log_error "API key is required"; return 1; fi + export E2B_API_KEY="$api_key" + mkdir -p "$config_dir" + cat > "$config_file" << EOF +{ + "api_key": "$api_key" +} +EOF + chmod 600 "$config_file" + log_info "API key saved to $config_file" +} + +get_server_name() { + if [[ -n "$E2B_SANDBOX_NAME" ]]; then + log_info "Using sandbox name from environment: $E2B_SANDBOX_NAME" + echo "$E2B_SANDBOX_NAME"; return 0 + fi + local name=$(safe_read "Enter sandbox name: ") + if [[ -z "$name" ]]; then + log_error "Sandbox name is required" + log_warn "Set E2B_SANDBOX_NAME environment variable for non-interactive usage"; return 1 + fi + echo "$name" +} + +create_server() { + local name="$1" + local template="${E2B_TEMPLATE:-base}" + + log_warn "Creating E2B sandbox '$name' (template: $template)..." + + # Create sandbox and capture ID + local output=$(e2b sandbox create --template "$template" --name "$name" 2>&1) + E2B_SANDBOX_ID=$(echo "$output" | grep -oE '[a-z0-9]{8}-[a-z0-9]{4}-[a-z0-9]{4}-[a-z0-9]{4}-[a-z0-9]{12}' | head -1) + + if [[ -z "$E2B_SANDBOX_ID" ]]; then + # Try alternate parsing + E2B_SANDBOX_ID=$(echo "$output" | grep -oE 'sandbox_[a-zA-Z0-9]+' | head -1) + fi + + if [[ -z "$E2B_SANDBOX_ID" ]]; then + log_error "Failed to create sandbox: $output" + return 1 + fi + + export E2B_SANDBOX_ID + log_info "Sandbox created: ID=$E2B_SANDBOX_ID" +} + +wait_for_cloud_init() { + log_warn "Installing base tools in sandbox..." + run_server "apt-get update -y && apt-get install -y curl unzip git zsh" >/dev/null 2>&1 || true + run_server "curl -fsSL https://bun.sh/install | bash" >/dev/null 2>&1 || true + run_server "curl -fsSL https://claude.ai/install.sh | bash" >/dev/null 2>&1 || true + run_server 'echo "export PATH=\"\$HOME/.claude/local/bin:\$HOME/.bun/bin:\$PATH\"" >> ~/.bashrc' >/dev/null 2>&1 || true + run_server 'echo "export PATH=\"\$HOME/.claude/local/bin:\$HOME/.bun/bin:\$PATH\"" >> ~/.zshrc' >/dev/null 2>&1 || true + log_info "Base tools installed" +} + +# E2B uses sandbox exec instead of SSH +run_server() { + local cmd="$1" + e2b sandbox exec "$E2B_SANDBOX_ID" -- bash -c "$cmd" +} + +upload_file() { + local local_path="$1" + local remote_path="$2" + # Upload via base64 encoding through exec + local content=$(base64 -w0 "$local_path" 2>/dev/null || base64 "$local_path") + e2b sandbox exec "$E2B_SANDBOX_ID" -- bash -c "echo '$content' | base64 -d > '$remote_path'" +} + +interactive_session() { + local cmd="$1" + e2b sandbox exec "$E2B_SANDBOX_ID" -- bash -c "$cmd" +} + +destroy_server() { + local sandbox_id="${1:-$E2B_SANDBOX_ID}" + log_warn "Destroying sandbox $sandbox_id..." + e2b sandbox kill "$sandbox_id" 2>/dev/null || true + log_info "Sandbox destroyed" +} + +list_servers() { + e2b sandbox list +} diff --git a/e2b/nanoclaw.sh b/e2b/nanoclaw.sh new file mode 100755 index 00000000..339bc6d8 --- /dev/null +++ b/e2b/nanoclaw.sh @@ -0,0 +1,78 @@ +#!/bin/bash +set -e + +# Source common functions - try local file first, fall back to remote +SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)" +if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then + source "$SCRIPT_DIR/lib/common.sh" +else + source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/e2b/lib/common.sh) +fi + +log_info "NanoClaw on E2B" +echo "" + +# 1. Ensure E2B CLI and API token +ensure_e2b_cli +ensure_e2b_token + +# 2. Get sandbox name and create sandbox +SERVER_NAME=$(get_server_name) +create_server "$SERVER_NAME" + +# 3. Wait for base tools +wait_for_cloud_init + +# 4. Install Node.js deps and clone nanoclaw +log_warn "Installing tsx..." +run_server "source ~/.bashrc && bun install -g tsx" + +log_warn "Cloning and building nanoclaw..." +run_server "git clone https://github.com/gavrielc/nanoclaw.git ~/nanoclaw && cd ~/nanoclaw && npm install && npm run build" +log_info "NanoClaw installed" + +# 5. Get OpenRouter API key +echo "" +if [[ -n "$OPENROUTER_API_KEY" ]]; then + log_info "Using OpenRouter API key from environment" +else + OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180) +fi + +# 6. Inject environment variables into ~/.zshrc +log_warn "Setting up environment variables..." + +ENV_TEMP=$(mktemp) +cat > "$ENV_TEMP" << EOF + +# [spawn:env] +export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}" +export ANTHROPIC_API_KEY="${OPENROUTER_API_KEY}" +export ANTHROPIC_BASE_URL="https://openrouter.ai/api" +EOF + +upload_file "$ENV_TEMP" "/tmp/env_config" +run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config" +rm "$ENV_TEMP" + +# 7. Create nanoclaw .env file +log_warn "Configuring nanoclaw..." + +DOTENV_TEMP=$(mktemp) +cat > "$DOTENV_TEMP" << EOF +ANTHROPIC_API_KEY=${OPENROUTER_API_KEY} +EOF + +upload_file "$DOTENV_TEMP" ~/nanoclaw/.env +rm "$DOTENV_TEMP" + +echo "" +log_info "E2B sandbox setup completed successfully!" +log_info "Sandbox: $SERVER_NAME (ID: $E2B_SANDBOX_ID)" +echo "" + +# 8. Start nanoclaw +log_warn "Starting nanoclaw..." +log_warn "You will need to scan a WhatsApp QR code to authenticate." +echo "" +interactive_session "cd ~/nanoclaw && source ~/.zshrc && npm run dev" diff --git a/e2b/openclaw.sh b/e2b/openclaw.sh new file mode 100755 index 00000000..fd0706e0 --- /dev/null +++ b/e2b/openclaw.sh @@ -0,0 +1,104 @@ +#!/bin/bash +set -e + +# Source common functions - try local file first, fall back to remote +SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)" +if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then + source "$SCRIPT_DIR/lib/common.sh" +else + source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/e2b/lib/common.sh) +fi + +log_info "OpenClaw on E2B" +echo "" + +# 1. Ensure E2B CLI and API token +ensure_e2b_cli +ensure_e2b_token + +# 2. Get sandbox name and create sandbox +SERVER_NAME=$(get_server_name) +create_server "$SERVER_NAME" + +# 3. Wait for base tools +wait_for_cloud_init + +# 4. Install openclaw via bun +log_warn "Installing openclaw..." +run_server "source ~/.bashrc && bun install -g openclaw" +log_info "OpenClaw installed" + +# 5. Get OpenRouter API key +echo "" +if [[ -n "$OPENROUTER_API_KEY" ]]; then + log_info "Using OpenRouter API key from environment" +else + OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180) +fi + +# 6. Get model preference +echo "" +log_warn "Browse models at: https://openrouter.ai/models" +log_warn "Which model would you like to use?" +MODEL_ID=$(safe_read "Enter model ID [openrouter/auto]: ") || MODEL_ID="" +MODEL_ID="${MODEL_ID:-openrouter/auto}" + +# 7. Inject environment variables into ~/.zshrc +log_warn "Setting up environment variables..." + +ENV_TEMP=$(mktemp) +cat > "$ENV_TEMP" << EOF + +# [spawn:env] +export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}" +export ANTHROPIC_API_KEY="${OPENROUTER_API_KEY}" +export ANTHROPIC_BASE_URL="https://openrouter.ai/api" +EOF + +upload_file "$ENV_TEMP" "/tmp/env_config" +run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config" +rm "$ENV_TEMP" + +# 8. Configure openclaw +log_warn "Configuring openclaw..." + +run_server "rm -rf ~/.openclaw && mkdir -p ~/.openclaw" + +# Generate a random gateway token +GATEWAY_TOKEN=$(openssl rand -hex 16) + +OPENCLAW_CONFIG_TEMP=$(mktemp) +cat > "$OPENCLAW_CONFIG_TEMP" << EOF +{ + "env": { + "OPENROUTER_API_KEY": "${OPENROUTER_API_KEY}" + }, + "gateway": { + "mode": "local", + "auth": { + "token": "${GATEWAY_TOKEN}" + } + }, + "agents": { + "defaults": { + "model": { + "primary": "openrouter/${MODEL_ID}" + } + } + } +} +EOF + +upload_file "$OPENCLAW_CONFIG_TEMP" ~/.openclaw/openclaw.json +rm "$OPENCLAW_CONFIG_TEMP" + +echo "" +log_info "E2B sandbox setup completed successfully!" +log_info "Sandbox: $SERVER_NAME (ID: $E2B_SANDBOX_ID)" +echo "" + +# 9. Start openclaw gateway in background and launch TUI +log_warn "Starting openclaw..." +run_server "source ~/.zshrc && nohup openclaw gateway > /tmp/openclaw-gateway.log 2>&1 &" +sleep 2 +interactive_session "source ~/.zshrc && openclaw tui" diff --git a/gcp/README.md b/gcp/README.md new file mode 100644 index 00000000..87425352 --- /dev/null +++ b/gcp/README.md @@ -0,0 +1,75 @@ +# GCP Compute Engine + +Google Cloud Compute Engine instances via gcloud CLI. [GCP Compute Engine](https://cloud.google.com/compute) + +> Uses current username for SSH. Requires gcloud CLI installed and configured. + +## Agents + +#### Claude Code + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/claude.sh) +``` + +#### OpenClaw + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/openclaw.sh) +``` + +#### NanoClaw + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/nanoclaw.sh) +``` + +#### Aider + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/aider.sh) +``` + +#### Goose + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/goose.sh) +``` + +#### Codex CLI + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/codex.sh) +``` + +#### Open Interpreter + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/interpreter.sh) +``` + +#### Gemini CLI + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/gemini.sh) +``` + +#### Amazon Q CLI + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/amazonq.sh) +``` + +#### Cline + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/cline.sh) +``` + +## Non-Interactive Mode + +```bash +GCP_INSTANCE_NAME=dev-mk1 \ +OPENROUTER_API_KEY=sk-or-v1-xxxxx \ + bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/claude.sh) +``` diff --git a/hetzner/README.md b/hetzner/README.md new file mode 100644 index 00000000..205b68e3 --- /dev/null +++ b/hetzner/README.md @@ -0,0 +1,74 @@ +# Hetzner Cloud + +Hetzner Cloud servers via REST API. [Hetzner Cloud](https://www.hetzner.com/cloud/) + +## Agents + +#### Claude Code + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/claude.sh) +``` + +#### OpenClaw + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/openclaw.sh) +``` + +#### NanoClaw + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/nanoclaw.sh) +``` + +#### Aider + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/aider.sh) +``` + +#### Goose + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/goose.sh) +``` + +#### Codex CLI + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/codex.sh) +``` + +#### Open Interpreter + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/interpreter.sh) +``` + +#### Gemini CLI + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/gemini.sh) +``` + +#### Amazon Q CLI + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/amazonq.sh) +``` + +#### Cline + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/cline.sh) +``` + +## Non-Interactive Mode + +```bash +HETZNER_SERVER_NAME=dev-mk1 \ +HCLOUD_TOKEN=your-token \ +OPENROUTER_API_KEY=sk-or-v1-xxxxx \ + bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/claude.sh) +``` diff --git a/lambda/README.md b/lambda/README.md new file mode 100644 index 00000000..6534664d --- /dev/null +++ b/lambda/README.md @@ -0,0 +1,76 @@ +# Lambda Cloud + +Lambda GPU Cloud instances via REST API. [Lambda Cloud](https://lambdalabs.com/) + +> GPU cloud, uses 'ubuntu' user. Manual tool install (no cloud-init). + +## Agents + +#### Claude Code + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/claude.sh) +``` + +#### OpenClaw + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/openclaw.sh) +``` + +#### NanoClaw + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/nanoclaw.sh) +``` + +#### Aider + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/aider.sh) +``` + +#### Goose + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/goose.sh) +``` + +#### Codex CLI + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/codex.sh) +``` + +#### Open Interpreter + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/interpreter.sh) +``` + +#### Gemini CLI + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/gemini.sh) +``` + +#### Amazon Q CLI + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/amazonq.sh) +``` + +#### Cline + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/cline.sh) +``` + +## Non-Interactive Mode + +```bash +LAMBDA_SERVER_NAME=dev-mk1 \ +LAMBDA_API_KEY=your-key \ +OPENROUTER_API_KEY=sk-or-v1-xxxxx \ + bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/claude.sh) +``` diff --git a/linode/README.md b/linode/README.md new file mode 100644 index 00000000..4cd319fd --- /dev/null +++ b/linode/README.md @@ -0,0 +1,74 @@ +# Linode (Akamai) + +Linode instances via REST API. [Linode (Akamai)](https://www.linode.com/) + +## Agents + +#### Claude Code + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/claude.sh) +``` + +#### OpenClaw + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/openclaw.sh) +``` + +#### NanoClaw + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/nanoclaw.sh) +``` + +#### Aider + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/aider.sh) +``` + +#### Goose + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/goose.sh) +``` + +#### Codex CLI + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/codex.sh) +``` + +#### Open Interpreter + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/interpreter.sh) +``` + +#### Gemini CLI + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/gemini.sh) +``` + +#### Amazon Q CLI + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/amazonq.sh) +``` + +#### Cline + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/cline.sh) +``` + +## Non-Interactive Mode + +```bash +LINODE_SERVER_NAME=dev-mk1 \ +LINODE_API_TOKEN=your-token \ +OPENROUTER_API_KEY=sk-or-v1-xxxxx \ + bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/claude.sh) +``` diff --git a/manifest.json b/manifest.json index 2cce18ee..faab5c4d 100644 --- a/manifest.json +++ b/manifest.json @@ -279,6 +279,34 @@ "image_family": "ubuntu-2404-lts-amd64" }, "notes": "Uses current username for SSH. Requires gcloud CLI installed and configured." + }, + "e2b": { + "name": "E2B", + "description": "E2B sandboxed cloud containers via CLI/SDK", + "url": "https://e2b.dev", + "type": "sandbox", + "auth": "E2B_API_KEY", + "provision_method": "e2b sandbox create", + "exec_method": "e2b sandbox exec", + "interactive_method": "e2b sandbox exec (PTY)", + "defaults": { + "template": "base" + }, + "notes": "No SSH — uses E2B CLI for exec. Sandboxes start in ~150ms. Requires npm install -g @e2b/cli." + }, + "modal": { + "name": "Modal", + "description": "Modal sandboxed containers via Python SDK", + "url": "https://modal.com", + "type": "sandbox", + "auth": "modal setup", + "provision_method": "modal.Sandbox.create() via Python SDK", + "exec_method": "sandbox.exec() via Python SDK", + "interactive_method": "sandbox.exec(pty=True)", + "defaults": { + "image": "debian_slim" + }, + "notes": "No SSH — uses Modal Python SDK for exec. Sub-second cold starts. Requires pip install modal." } }, "matrix": { @@ -361,6 +389,26 @@ "gcp/interpreter": "implemented", "gcp/gemini": "implemented", "gcp/amazonq": "implemented", - "gcp/cline": "implemented" + "gcp/cline": "implemented", + "e2b/claude": "implemented", + "e2b/openclaw": "implemented", + "e2b/nanoclaw": "implemented", + "e2b/aider": "implemented", + "e2b/goose": "implemented", + "e2b/codex": "implemented", + "e2b/interpreter": "implemented", + "e2b/gemini": "implemented", + "e2b/amazonq": "implemented", + "e2b/cline": "implemented", + "modal/claude": "implemented", + "modal/openclaw": "implemented", + "modal/nanoclaw": "implemented", + "modal/aider": "implemented", + "modal/goose": "implemented", + "modal/codex": "implemented", + "modal/interpreter": "implemented", + "modal/gemini": "implemented", + "modal/amazonq": "implemented", + "modal/cline": "implemented" } } diff --git a/modal/README.md b/modal/README.md new file mode 100644 index 00000000..1efe04c7 --- /dev/null +++ b/modal/README.md @@ -0,0 +1,75 @@ +# Modal + +Modal sandboxed containers via Python SDK. [Modal](https://modal.com) + +> No SSH — uses Modal Python SDK for exec. Sub-second cold starts. Requires pip install modal. + +## Agents + +#### Claude Code + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/modal/claude.sh) +``` + +#### OpenClaw + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/modal/openclaw.sh) +``` + +#### NanoClaw + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/modal/nanoclaw.sh) +``` + +#### Aider + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/modal/aider.sh) +``` + +#### Goose + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/modal/goose.sh) +``` + +#### Codex CLI + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/modal/codex.sh) +``` + +#### Open Interpreter + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/modal/interpreter.sh) +``` + +#### Gemini CLI + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/modal/gemini.sh) +``` + +#### Amazon Q CLI + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/modal/amazonq.sh) +``` + +#### Cline + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/modal/cline.sh) +``` + +## Non-Interactive Mode + +```bash +MODAL_SANDBOX_NAME=dev-mk1 \ +OPENROUTER_API_KEY=sk-or-v1-xxxxx \ + bash <(curl -fsSL https://openrouter.ai/lab/spawn/modal/claude.sh) +``` diff --git a/modal/aider.sh b/modal/aider.sh new file mode 100755 index 00000000..a61c85f0 --- /dev/null +++ b/modal/aider.sh @@ -0,0 +1,68 @@ +#!/bin/bash +set -e + +# Source common functions - try local file first, fall back to remote +SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)" +if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then + source "$SCRIPT_DIR/lib/common.sh" +else + source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/modal/lib/common.sh) +fi + +log_info "Aider on Modal" +echo "" + +# 1. Ensure Modal CLI +ensure_modal_cli + +# 2. Get sandbox name and create sandbox +SERVER_NAME=$(get_server_name) +create_server "$SERVER_NAME" + +# 3. Wait for base tools +wait_for_cloud_init + +# 4. Install Aider +log_warn "Installing Aider..." +run_server "pip install aider-chat 2>/dev/null || pip3 install aider-chat" +log_info "Aider installed" + +# 5. Get OpenRouter API key +echo "" +if [[ -n "$OPENROUTER_API_KEY" ]]; then + log_info "Using OpenRouter API key from environment" +else + OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180) +fi + +# 6. Get model preference +echo "" +log_warn "Browse models at: https://openrouter.ai/models" +log_warn "Which model would you like to use with Aider?" +MODEL_ID=$(safe_read "Enter model ID [openrouter/auto]: ") || MODEL_ID="" +MODEL_ID="${MODEL_ID:-openrouter/auto}" + +# 7. Inject environment variables into ~/.zshrc +log_warn "Setting up environment variables..." + +ENV_TEMP=$(mktemp) +cat > "$ENV_TEMP" << EOF + +# [spawn:env] +export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}" +EOF + +upload_file "$ENV_TEMP" "/tmp/env_config" +run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config" +rm "$ENV_TEMP" + +echo "" +log_info "Modal sandbox setup completed successfully!" +log_info "Sandbox: $SERVER_NAME (ID: $MODAL_SANDBOX_ID)" +echo "" + +# 8. Start Aider interactively +log_warn "Starting Aider..." +sleep 1 +clear +interactive_session "source ~/.zshrc && aider --model openrouter/${MODEL_ID}" diff --git a/modal/amazonq.sh b/modal/amazonq.sh new file mode 100755 index 00000000..3a5260ed --- /dev/null +++ b/modal/amazonq.sh @@ -0,0 +1,63 @@ +#!/bin/bash +set -e + +# Source common functions - try local file first, fall back to remote +SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)" +if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then + source "$SCRIPT_DIR/lib/common.sh" +else + source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/modal/lib/common.sh) +fi + +log_info "Amazon Q on Modal" +echo "" + +# 1. Ensure Modal CLI +ensure_modal_cli + +# 2. Get sandbox name and create sandbox +SERVER_NAME=$(get_server_name) +create_server "$SERVER_NAME" + +# 3. Wait for base tools +wait_for_cloud_init + +# 4. Install Amazon Q CLI +log_warn "Installing Amazon Q CLI..." +run_server "curl -fsSL https://desktop-release.q.us-east-1.amazonaws.com/latest/amazon-q-cli-install.sh | bash" +log_info "Amazon Q CLI installed" + +# 5. Get OpenRouter API key +echo "" +if [[ -n "$OPENROUTER_API_KEY" ]]; then + log_info "Using OpenRouter API key from environment" +else + OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180) +fi + +# 6. Inject environment variables into ~/.zshrc +log_warn "Setting up environment variables..." + +ENV_TEMP=$(mktemp) +cat > "$ENV_TEMP" << EOF + +# [spawn:env] +export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}" +export OPENAI_API_KEY="${OPENROUTER_API_KEY}" +export OPENAI_BASE_URL="https://openrouter.ai/api/v1" +EOF + +upload_file "$ENV_TEMP" "/tmp/env_config" +run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config" +rm "$ENV_TEMP" + +echo "" +log_info "Modal sandbox setup completed successfully!" +log_info "Sandbox: $SERVER_NAME (ID: $MODAL_SANDBOX_ID)" +echo "" + +# 7. Start Amazon Q interactively +log_warn "Starting Amazon Q..." +sleep 1 +clear +interactive_session "source ~/.zshrc && q chat" diff --git a/modal/claude.sh b/modal/claude.sh new file mode 100755 index 00000000..6787f892 --- /dev/null +++ b/modal/claude.sh @@ -0,0 +1,110 @@ +#!/bin/bash +set -e + +# Source common functions - try local file first, fall back to remote +SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)" +if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then + source "$SCRIPT_DIR/lib/common.sh" +else + source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/modal/lib/common.sh) +fi + +log_info "Claude Code on Modal" +echo "" + +# 1. Ensure Modal CLI +ensure_modal_cli + +# 2. Get sandbox name and create sandbox +SERVER_NAME=$(get_server_name) +create_server "$SERVER_NAME" + +# 3. Wait for base tools +wait_for_cloud_init + +# 4. Verify Claude Code is installed (fallback to manual install) +log_warn "Verifying Claude Code installation..." +if ! run_server "command -v claude" >/dev/null 2>&1; then + log_warn "Claude Code not found, installing manually..." + run_server "curl -fsSL https://claude.ai/install.sh | bash" +fi +log_info "Claude Code is installed" + +# 5. Get OpenRouter API key +echo "" +if [[ -n "$OPENROUTER_API_KEY" ]]; then + log_info "Using OpenRouter API key from environment" +else + OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180) +fi + +# 6. Inject environment variables into ~/.zshrc +log_warn "Setting up environment variables..." + +ENV_TEMP=$(mktemp) +cat > "$ENV_TEMP" << EOF + +# [spawn:env] +export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}" +export ANTHROPIC_BASE_URL="https://openrouter.ai/api" +export ANTHROPIC_AUTH_TOKEN="${OPENROUTER_API_KEY}" +export ANTHROPIC_API_KEY="" +export CLAUDE_CODE_SKIP_ONBOARDING="1" +export CLAUDE_CODE_ENABLE_TELEMETRY="0" +EOF + +upload_file "$ENV_TEMP" "/tmp/env_config" +run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config" +rm "$ENV_TEMP" + +# 7. Configure Claude Code settings +log_warn "Configuring Claude Code..." + +run_server "mkdir -p ~/.claude" + +# Upload settings.json +SETTINGS_TEMP=$(mktemp) +cat > "$SETTINGS_TEMP" << EOF +{ + "theme": "dark", + "editor": "vim", + "env": { + "CLAUDE_CODE_ENABLE_TELEMETRY": "0", + "ANTHROPIC_BASE_URL": "https://openrouter.ai/api", + "ANTHROPIC_AUTH_TOKEN": "${OPENROUTER_API_KEY}" + }, + "permissions": { + "defaultMode": "bypassPermissions", + "dangerouslySkipPermissions": true + } +} +EOF + +upload_file "$SETTINGS_TEMP" ~/.claude/settings.json +rm "$SETTINGS_TEMP" + +# Upload ~/.claude.json global state +GLOBAL_STATE_TEMP=$(mktemp) +cat > "$GLOBAL_STATE_TEMP" << EOF +{ + "hasCompletedOnboarding": true, + "bypassPermissionsModeAccepted": true +} +EOF + +upload_file "$GLOBAL_STATE_TEMP" ~/.claude.json +rm "$GLOBAL_STATE_TEMP" + +# Create empty CLAUDE.md +run_server "touch ~/.claude/CLAUDE.md" + +echo "" +log_info "Modal sandbox setup completed successfully!" +log_info "Sandbox: $SERVER_NAME (ID: $MODAL_SANDBOX_ID)" +echo "" + +# 8. Start Claude Code interactively +log_warn "Starting Claude Code..." +sleep 1 +clear +interactive_session "source ~/.zshrc && claude" diff --git a/modal/cline.sh b/modal/cline.sh new file mode 100755 index 00000000..98ffe8c4 --- /dev/null +++ b/modal/cline.sh @@ -0,0 +1,63 @@ +#!/bin/bash +set -e + +# Source common functions - try local file first, fall back to remote +SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)" +if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then + source "$SCRIPT_DIR/lib/common.sh" +else + source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/modal/lib/common.sh) +fi + +log_info "Cline on Modal" +echo "" + +# 1. Ensure Modal CLI +ensure_modal_cli + +# 2. Get sandbox name and create sandbox +SERVER_NAME=$(get_server_name) +create_server "$SERVER_NAME" + +# 3. Wait for base tools +wait_for_cloud_init + +# 4. Install Cline +log_warn "Installing Cline..." +run_server "npm install -g cline" +log_info "Cline installed" + +# 5. Get OpenRouter API key +echo "" +if [[ -n "$OPENROUTER_API_KEY" ]]; then + log_info "Using OpenRouter API key from environment" +else + OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180) +fi + +# 6. Inject environment variables into ~/.zshrc +log_warn "Setting up environment variables..." + +ENV_TEMP=$(mktemp) +cat > "$ENV_TEMP" << EOF + +# [spawn:env] +export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}" +export OPENAI_API_KEY="${OPENROUTER_API_KEY}" +export OPENAI_BASE_URL="https://openrouter.ai/api/v1" +EOF + +upload_file "$ENV_TEMP" "/tmp/env_config" +run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config" +rm "$ENV_TEMP" + +echo "" +log_info "Modal sandbox setup completed successfully!" +log_info "Sandbox: $SERVER_NAME (ID: $MODAL_SANDBOX_ID)" +echo "" + +# 7. Start Cline interactively +log_warn "Starting Cline..." +sleep 1 +clear +interactive_session "source ~/.zshrc && cline" diff --git a/modal/codex.sh b/modal/codex.sh new file mode 100755 index 00000000..ef5acd21 --- /dev/null +++ b/modal/codex.sh @@ -0,0 +1,63 @@ +#!/bin/bash +set -e + +# Source common functions - try local file first, fall back to remote +SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)" +if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then + source "$SCRIPT_DIR/lib/common.sh" +else + source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/modal/lib/common.sh) +fi + +log_info "Codex CLI on Modal" +echo "" + +# 1. Ensure Modal CLI +ensure_modal_cli + +# 2. Get sandbox name and create sandbox +SERVER_NAME=$(get_server_name) +create_server "$SERVER_NAME" + +# 3. Wait for base tools +wait_for_cloud_init + +# 4. Install Codex CLI +log_warn "Installing Codex CLI..." +run_server "npm install -g @openai/codex" +log_info "Codex CLI installed" + +# 5. Get OpenRouter API key +echo "" +if [[ -n "$OPENROUTER_API_KEY" ]]; then + log_info "Using OpenRouter API key from environment" +else + OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180) +fi + +# 6. Inject environment variables into ~/.zshrc +log_warn "Setting up environment variables..." + +ENV_TEMP=$(mktemp) +cat > "$ENV_TEMP" << EOF + +# [spawn:env] +export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}" +export OPENAI_API_KEY="${OPENROUTER_API_KEY}" +export OPENAI_BASE_URL="https://openrouter.ai/api/v1" +EOF + +upload_file "$ENV_TEMP" "/tmp/env_config" +run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config" +rm "$ENV_TEMP" + +echo "" +log_info "Modal sandbox setup completed successfully!" +log_info "Sandbox: $SERVER_NAME (ID: $MODAL_SANDBOX_ID)" +echo "" + +# 7. Start Codex interactively +log_warn "Starting Codex..." +sleep 1 +clear +interactive_session "source ~/.zshrc && codex" diff --git a/modal/gemini.sh b/modal/gemini.sh new file mode 100755 index 00000000..7d6d1c32 --- /dev/null +++ b/modal/gemini.sh @@ -0,0 +1,64 @@ +#!/bin/bash +set -e + +# Source common functions - try local file first, fall back to remote +SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)" +if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then + source "$SCRIPT_DIR/lib/common.sh" +else + source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/modal/lib/common.sh) +fi + +log_info "Gemini CLI on Modal" +echo "" + +# 1. Ensure Modal CLI +ensure_modal_cli + +# 2. Get sandbox name and create sandbox +SERVER_NAME=$(get_server_name) +create_server "$SERVER_NAME" + +# 3. Wait for base tools +wait_for_cloud_init + +# 4. Install Gemini CLI +log_warn "Installing Gemini CLI..." +run_server "npm install -g @google/gemini-cli" +log_info "Gemini CLI installed" + +# 5. Get OpenRouter API key +echo "" +if [[ -n "$OPENROUTER_API_KEY" ]]; then + log_info "Using OpenRouter API key from environment" +else + OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180) +fi + +# 6. Inject environment variables into ~/.zshrc +log_warn "Setting up environment variables..." + +ENV_TEMP=$(mktemp) +cat > "$ENV_TEMP" << EOF + +# [spawn:env] +export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}" +export GEMINI_API_KEY="${OPENROUTER_API_KEY}" +export OPENAI_API_KEY="${OPENROUTER_API_KEY}" +export OPENAI_BASE_URL="https://openrouter.ai/api/v1" +EOF + +upload_file "$ENV_TEMP" "/tmp/env_config" +run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config" +rm "$ENV_TEMP" + +echo "" +log_info "Modal sandbox setup completed successfully!" +log_info "Sandbox: $SERVER_NAME (ID: $MODAL_SANDBOX_ID)" +echo "" + +# 7. Start Gemini interactively +log_warn "Starting Gemini..." +sleep 1 +clear +interactive_session "source ~/.zshrc && gemini" diff --git a/modal/goose.sh b/modal/goose.sh new file mode 100755 index 00000000..3d07f848 --- /dev/null +++ b/modal/goose.sh @@ -0,0 +1,62 @@ +#!/bin/bash +set -e + +# Source common functions - try local file first, fall back to remote +SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)" +if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then + source "$SCRIPT_DIR/lib/common.sh" +else + source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/modal/lib/common.sh) +fi + +log_info "Goose on Modal" +echo "" + +# 1. Ensure Modal CLI +ensure_modal_cli + +# 2. Get sandbox name and create sandbox +SERVER_NAME=$(get_server_name) +create_server "$SERVER_NAME" + +# 3. Wait for base tools +wait_for_cloud_init + +# 4. Install Goose +log_warn "Installing Goose..." +run_server "CONFIGURE=false curl -fsSL https://github.com/block/goose/releases/latest/download/download_cli.sh | bash" +log_info "Goose installed" + +# 5. Get OpenRouter API key +echo "" +if [[ -n "$OPENROUTER_API_KEY" ]]; then + log_info "Using OpenRouter API key from environment" +else + OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180) +fi + +# 6. Inject environment variables into ~/.zshrc +log_warn "Setting up environment variables..." + +ENV_TEMP=$(mktemp) +cat > "$ENV_TEMP" << EOF + +# [spawn:env] +export GOOSE_PROVIDER=openrouter +export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}" +EOF + +upload_file "$ENV_TEMP" "/tmp/env_config" +run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config" +rm "$ENV_TEMP" + +echo "" +log_info "Modal sandbox setup completed successfully!" +log_info "Sandbox: $SERVER_NAME (ID: $MODAL_SANDBOX_ID)" +echo "" + +# 7. Start Goose interactively +log_warn "Starting Goose..." +sleep 1 +clear +interactive_session "source ~/.zshrc && goose" diff --git a/modal/interpreter.sh b/modal/interpreter.sh new file mode 100755 index 00000000..7fcdbd5b --- /dev/null +++ b/modal/interpreter.sh @@ -0,0 +1,63 @@ +#!/bin/bash +set -e + +# Source common functions - try local file first, fall back to remote +SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)" +if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then + source "$SCRIPT_DIR/lib/common.sh" +else + source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/modal/lib/common.sh) +fi + +log_info "Open Interpreter on Modal" +echo "" + +# 1. Ensure Modal CLI +ensure_modal_cli + +# 2. Get sandbox name and create sandbox +SERVER_NAME=$(get_server_name) +create_server "$SERVER_NAME" + +# 3. Wait for base tools +wait_for_cloud_init + +# 4. Install Open Interpreter +log_warn "Installing Open Interpreter..." +run_server "pip install open-interpreter 2>/dev/null || pip3 install open-interpreter" +log_info "Open Interpreter installed" + +# 5. Get OpenRouter API key +echo "" +if [[ -n "$OPENROUTER_API_KEY" ]]; then + log_info "Using OpenRouter API key from environment" +else + OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180) +fi + +# 6. Inject environment variables into ~/.zshrc +log_warn "Setting up environment variables..." + +ENV_TEMP=$(mktemp) +cat > "$ENV_TEMP" << EOF + +# [spawn:env] +export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}" +export OPENAI_API_KEY="${OPENROUTER_API_KEY}" +export OPENAI_BASE_URL="https://openrouter.ai/api/v1" +EOF + +upload_file "$ENV_TEMP" "/tmp/env_config" +run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config" +rm "$ENV_TEMP" + +echo "" +log_info "Modal sandbox setup completed successfully!" +log_info "Sandbox: $SERVER_NAME (ID: $MODAL_SANDBOX_ID)" +echo "" + +# 7. Start Open Interpreter interactively +log_warn "Starting Open Interpreter..." +sleep 1 +clear +interactive_session "source ~/.zshrc && interpreter" diff --git a/modal/lib/common.sh b/modal/lib/common.sh new file mode 100644 index 00000000..a2f7987b --- /dev/null +++ b/modal/lib/common.sh @@ -0,0 +1,231 @@ +#!/bin/bash +# Common bash functions for Modal sandbox spawn scripts +# Uses Modal CLI + Python SDK — https://modal.com +# Sandboxes are secure containers with sub-second cold starts +# No SSH — uses `modal sandbox exec` for commands + +# ============================================================ +# Provider-agnostic functions +# ============================================================ + +RED='\033[0;31m' +GREEN='\033[0;32m' +YELLOW='\033[1;33m' +NC='\033[0m' + +log_info() { echo -e "${GREEN}$1${NC}" >&2; } +log_warn() { echo -e "${YELLOW}$1${NC}" >&2; } +log_error() { echo -e "${RED}$1${NC}" >&2; } + +safe_read() { + local prompt="$1" result="" + if [[ -t 0 ]]; then read -p "$prompt" result + elif echo -n "" > /dev/tty 2>/dev/null; then read -p "$prompt" result < /dev/tty + else log_error "Cannot read input: no TTY available"; return 1; fi + echo "$result" +} + +nc_listen() { + local port=$1; shift + if nc --help 2>&1 | grep -q "BusyBox\|busybox" || nc --help 2>&1 | grep -q "\-p "; then + nc -l -p "$port" "$@" + else nc -l "$port" "$@"; fi +} + +open_browser() { + local url=$1 + if command -v termux-open-url &>/dev/null; then termux-open-url "$url" /dev/null; then open "$url" /dev/null; then xdg-open "$url" /dev/null; then log_warn "netcat (nc) not found"; return 1; fi + local callback_url="http://localhost:${callback_port}/callback" + local auth_url="https://openrouter.ai/auth?callback_url=${callback_url}" + local oauth_dir=$(mktemp -d) code_file="$oauth_dir/code" + log_warn "Starting local OAuth server on port ${callback_port}..." + ( + local success_response='HTTP/1.1 200 OK\r\nContent-Type: text/html\r\nConnection: close\r\n\r\n

Authentication Successful!

You can close this tab

' + while true; do + local response_file=$(mktemp); echo -e "$success_response" > "$response_file" + local request=$(nc_listen "$callback_port" < "$response_file" 2>/dev/null | head -1) + local nc_status=$?; rm -f "$response_file" + if [[ $nc_status -ne 0 ]]; then break; fi + if [[ "$request" == *"/callback?code="* ]]; then + echo "$request" | sed -n 's/.*code=\([^ &]*\).*/\1/p' > "$code_file"; break + fi + done + ) /dev/null; then log_warn "Failed to start OAuth server"; rm -rf "$oauth_dir"; return 1; fi + log_warn "Opening browser to authenticate with OpenRouter..."; open_browser "$auth_url" + local timeout=120 elapsed=0 + while [[ ! -f "$code_file" ]] && [[ $elapsed -lt $timeout ]]; do sleep 1; ((elapsed++)); done + kill $server_pid 2>/dev/null || true; wait $server_pid 2>/dev/null || true + if [[ ! -f "$code_file" ]]; then log_warn "OAuth timeout"; rm -rf "$oauth_dir"; return 1; fi + local oauth_code=$(cat "$code_file"); rm -rf "$oauth_dir" + log_warn "Exchanging OAuth code for API key..." + local key_response=$(curl -s -X POST "https://openrouter.ai/api/v1/auth/keys" \ + -H "Content-Type: application/json" -d "{\"code\": \"$oauth_code\"}") + local api_key=$(echo "$key_response" | grep -o '"key":"[^"]*"' | sed 's/"key":"//;s/"$//') + if [[ -z "$api_key" ]]; then log_error "Failed to exchange OAuth code: ${key_response}"; return 1; fi + log_info "Successfully obtained OpenRouter API key via OAuth!"; echo "$api_key" +} + +get_openrouter_api_key_oauth() { + local callback_port=${1:-5180} + local api_key=$(try_oauth_flow "$callback_port") + if [[ -n "$api_key" ]]; then echo "$api_key"; return 0; fi + echo ""; log_warn "OAuth authentication failed or unavailable" + log_warn "You can enter your API key manually instead"; echo "" + local manual_choice=$(safe_read "Would you like to enter your API key manually? (Y/n): ") || { + log_error "Cannot prompt for manual entry in non-interactive mode" + log_warn "Set OPENROUTER_API_KEY environment variable for non-interactive usage"; return 1 + } + if [[ ! "$manual_choice" =~ ^[Nn]$ ]]; then + api_key=$(get_openrouter_api_key_manual); echo "$api_key"; return 0 + else log_error "Authentication cancelled by user"; return 1; fi +} + +# ============================================================ +# Modal specific functions +# ============================================================ + +ensure_modal_cli() { + if ! command -v modal &>/dev/null; then + log_warn "Installing Modal CLI..." + pip install modal 2>/dev/null || pip3 install modal || { + log_error "Failed to install Modal. Install manually: pip install modal" + return 1 + } + fi + # Check if authenticated + if ! modal profile current &>/dev/null; then + log_warn "Modal not authenticated. Running setup..." + modal setup + fi + log_info "Modal CLI ready" +} + +get_server_name() { + if [[ -n "$MODAL_SANDBOX_NAME" ]]; then + log_info "Using sandbox name from environment: $MODAL_SANDBOX_NAME" + echo "$MODAL_SANDBOX_NAME"; return 0 + fi + local name=$(safe_read "Enter sandbox name: ") + if [[ -z "$name" ]]; then + log_error "Sandbox name is required" + log_warn "Set MODAL_SANDBOX_NAME environment variable for non-interactive usage"; return 1 + fi + echo "$name" +} + +create_server() { + local name="$1" + local image="${MODAL_IMAGE:-debian_slim}" + + log_warn "Creating Modal sandbox '$name'..." + + # Create sandbox via Python SDK (Modal CLI doesn't have direct sandbox create) + MODAL_SANDBOX_ID=$(python3 -c " +import modal +app = modal.App.lookup('spawn-${name}', create_if_missing=True) +sb = modal.Sandbox.create( + app=app, + name='${name}', + image=modal.Image.${image}().apt_install('curl', 'unzip', 'git', 'zsh'), + timeout=3600, +) +print(sb.object_id) +" 2>/dev/null) + + if [[ -z "$MODAL_SANDBOX_ID" ]]; then + log_error "Failed to create Modal sandbox" + return 1 + fi + + export MODAL_SANDBOX_ID + export MODAL_APP_NAME="spawn-${name}" + export MODAL_SANDBOX_NAME_ACTUAL="$name" + log_info "Sandbox created: ID=$MODAL_SANDBOX_ID" +} + +wait_for_cloud_init() { + log_warn "Installing tools in sandbox..." + run_server "curl -fsSL https://bun.sh/install | bash" >/dev/null 2>&1 || true + run_server "curl -fsSL https://claude.ai/install.sh | bash" >/dev/null 2>&1 || true + run_server 'echo "export PATH=\"\$HOME/.claude/local/bin:\$HOME/.bun/bin:\$PATH\"" >> ~/.bashrc' >/dev/null 2>&1 || true + run_server 'echo "export PATH=\"\$HOME/.claude/local/bin:\$HOME/.bun/bin:\$PATH\"" >> ~/.zshrc' >/dev/null 2>&1 || true + log_info "Tools installed" +} + +# Modal uses Python SDK for exec +run_server() { + local cmd="$1" + python3 -c " +import modal +sb = modal.Sandbox.from_id('$MODAL_SANDBOX_ID') +p = sb.exec('bash', '-c', '''$cmd''') +print(p.stdout.read(), end='') +if p.stderr.read(): + import sys; print(p.stderr.read(), end='', file=sys.stderr) +p.wait() +" +} + +upload_file() { + local local_path="$1" + local remote_path="$2" + local content=$(base64 -w0 "$local_path" 2>/dev/null || base64 "$local_path") + run_server "echo '$content' | base64 -d > '$remote_path'" +} + +interactive_session() { + local cmd="$1" + python3 -c " +import modal, sys +sb = modal.Sandbox.from_id('$MODAL_SANDBOX_ID') +p = sb.exec('bash', '-c', '''$cmd''', pty=True) +for line in p.stdout: + print(line, end='') +p.wait() +" +} + +destroy_server() { + local sandbox_id="${1:-$MODAL_SANDBOX_ID}" + log_warn "Terminating sandbox..." + python3 -c " +import modal +sb = modal.Sandbox.from_id('$sandbox_id') +sb.terminate() +" 2>/dev/null || true + log_info "Sandbox terminated" +} + +list_servers() { + python3 -c " +import modal +for sb in modal.Sandbox.list(): + print(f'{sb.object_id} {sb.name or \"unnamed\"}')" 2>/dev/null || echo "No sandboxes found" +} diff --git a/modal/nanoclaw.sh b/modal/nanoclaw.sh new file mode 100755 index 00000000..1e5a95fd --- /dev/null +++ b/modal/nanoclaw.sh @@ -0,0 +1,77 @@ +#!/bin/bash +set -e + +# Source common functions - try local file first, fall back to remote +SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)" +if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then + source "$SCRIPT_DIR/lib/common.sh" +else + source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/modal/lib/common.sh) +fi + +log_info "NanoClaw on Modal" +echo "" + +# 1. Ensure Modal CLI +ensure_modal_cli + +# 2. Get sandbox name and create sandbox +SERVER_NAME=$(get_server_name) +create_server "$SERVER_NAME" + +# 3. Wait for base tools +wait_for_cloud_init + +# 4. Install Node.js deps and clone nanoclaw +log_warn "Installing tsx..." +run_server "source ~/.bashrc && bun install -g tsx" + +log_warn "Cloning and building nanoclaw..." +run_server "git clone https://github.com/gavrielc/nanoclaw.git ~/nanoclaw && cd ~/nanoclaw && npm install && npm run build" +log_info "NanoClaw installed" + +# 5. Get OpenRouter API key +echo "" +if [[ -n "$OPENROUTER_API_KEY" ]]; then + log_info "Using OpenRouter API key from environment" +else + OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180) +fi + +# 6. Inject environment variables into ~/.zshrc +log_warn "Setting up environment variables..." + +ENV_TEMP=$(mktemp) +cat > "$ENV_TEMP" << EOF + +# [spawn:env] +export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}" +export ANTHROPIC_API_KEY="${OPENROUTER_API_KEY}" +export ANTHROPIC_BASE_URL="https://openrouter.ai/api" +EOF + +upload_file "$ENV_TEMP" "/tmp/env_config" +run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config" +rm "$ENV_TEMP" + +# 7. Create nanoclaw .env file +log_warn "Configuring nanoclaw..." + +DOTENV_TEMP=$(mktemp) +cat > "$DOTENV_TEMP" << EOF +ANTHROPIC_API_KEY=${OPENROUTER_API_KEY} +EOF + +upload_file "$DOTENV_TEMP" ~/nanoclaw/.env +rm "$DOTENV_TEMP" + +echo "" +log_info "Modal sandbox setup completed successfully!" +log_info "Sandbox: $SERVER_NAME (ID: $MODAL_SANDBOX_ID)" +echo "" + +# 8. Start nanoclaw +log_warn "Starting nanoclaw..." +log_warn "You will need to scan a WhatsApp QR code to authenticate." +echo "" +interactive_session "cd ~/nanoclaw && source ~/.zshrc && npm run dev" diff --git a/modal/openclaw.sh b/modal/openclaw.sh new file mode 100755 index 00000000..b0607805 --- /dev/null +++ b/modal/openclaw.sh @@ -0,0 +1,103 @@ +#!/bin/bash +set -e + +# Source common functions - try local file first, fall back to remote +SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)" +if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then + source "$SCRIPT_DIR/lib/common.sh" +else + source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/modal/lib/common.sh) +fi + +log_info "OpenClaw on Modal" +echo "" + +# 1. Ensure Modal CLI +ensure_modal_cli + +# 2. Get sandbox name and create sandbox +SERVER_NAME=$(get_server_name) +create_server "$SERVER_NAME" + +# 3. Wait for base tools +wait_for_cloud_init + +# 4. Install openclaw via bun +log_warn "Installing openclaw..." +run_server "source ~/.bashrc && bun install -g openclaw" +log_info "OpenClaw installed" + +# 5. Get OpenRouter API key +echo "" +if [[ -n "$OPENROUTER_API_KEY" ]]; then + log_info "Using OpenRouter API key from environment" +else + OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180) +fi + +# 6. Get model preference +echo "" +log_warn "Browse models at: https://openrouter.ai/models" +log_warn "Which model would you like to use?" +MODEL_ID=$(safe_read "Enter model ID [openrouter/auto]: ") || MODEL_ID="" +MODEL_ID="${MODEL_ID:-openrouter/auto}" + +# 7. Inject environment variables into ~/.zshrc +log_warn "Setting up environment variables..." + +ENV_TEMP=$(mktemp) +cat > "$ENV_TEMP" << EOF + +# [spawn:env] +export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}" +export ANTHROPIC_API_KEY="${OPENROUTER_API_KEY}" +export ANTHROPIC_BASE_URL="https://openrouter.ai/api" +EOF + +upload_file "$ENV_TEMP" "/tmp/env_config" +run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config" +rm "$ENV_TEMP" + +# 8. Configure openclaw +log_warn "Configuring openclaw..." + +run_server "rm -rf ~/.openclaw && mkdir -p ~/.openclaw" + +# Generate a random gateway token +GATEWAY_TOKEN=$(openssl rand -hex 16) + +OPENCLAW_CONFIG_TEMP=$(mktemp) +cat > "$OPENCLAW_CONFIG_TEMP" << EOF +{ + "env": { + "OPENROUTER_API_KEY": "${OPENROUTER_API_KEY}" + }, + "gateway": { + "mode": "local", + "auth": { + "token": "${GATEWAY_TOKEN}" + } + }, + "agents": { + "defaults": { + "model": { + "primary": "openrouter/${MODEL_ID}" + } + } + } +} +EOF + +upload_file "$OPENCLAW_CONFIG_TEMP" ~/.openclaw/openclaw.json +rm "$OPENCLAW_CONFIG_TEMP" + +echo "" +log_info "Modal sandbox setup completed successfully!" +log_info "Sandbox: $SERVER_NAME (ID: $MODAL_SANDBOX_ID)" +echo "" + +# 9. Start openclaw gateway in background and launch TUI +log_warn "Starting openclaw..." +run_server "source ~/.zshrc && nohup openclaw gateway > /tmp/openclaw-gateway.log 2>&1 &" +sleep 2 +interactive_session "source ~/.zshrc && openclaw tui" diff --git a/sprite/README.md b/sprite/README.md new file mode 100644 index 00000000..8885417d --- /dev/null +++ b/sprite/README.md @@ -0,0 +1,73 @@ +# Sprite + +Sprites.dev managed VMs with CLI. [Sprite](https://sprites.dev) + +## Agents + +#### Claude Code + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/claude.sh) +``` + +#### OpenClaw + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/openclaw.sh) +``` + +#### NanoClaw + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/nanoclaw.sh) +``` + +#### Aider + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/aider.sh) +``` + +#### Goose + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/goose.sh) +``` + +#### Codex CLI + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/codex.sh) +``` + +#### Open Interpreter + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/interpreter.sh) +``` + +#### Gemini CLI + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/gemini.sh) +``` + +#### Amazon Q CLI + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/amazonq.sh) +``` + +#### Cline + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/cline.sh) +``` + +## Non-Interactive Mode + +```bash +SPRITE_NAME=dev-mk1 \ +OPENROUTER_API_KEY=sk-or-v1-xxxxx \ + bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/claude.sh) +``` diff --git a/vultr/README.md b/vultr/README.md new file mode 100644 index 00000000..713c7dc3 --- /dev/null +++ b/vultr/README.md @@ -0,0 +1,74 @@ +# Vultr + +Vultr Cloud Compute instances via REST API. [Vultr](https://www.vultr.com/) + +## Agents + +#### Claude Code + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/claude.sh) +``` + +#### OpenClaw + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/openclaw.sh) +``` + +#### NanoClaw + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/nanoclaw.sh) +``` + +#### Aider + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/aider.sh) +``` + +#### Goose + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/goose.sh) +``` + +#### Codex CLI + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/codex.sh) +``` + +#### Open Interpreter + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/interpreter.sh) +``` + +#### Gemini CLI + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/gemini.sh) +``` + +#### Amazon Q CLI + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/amazonq.sh) +``` + +#### Cline + +```bash +bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/cline.sh) +``` + +## Non-Interactive Mode + +```bash +VULTR_SERVER_NAME=dev-mk1 \ +VULTR_API_KEY=your-key \ +OPENROUTER_API_KEY=sk-or-v1-xxxxx \ + bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/claude.sh) +```