spawn/ovh
A bcb59eb925
fix: stop sourcing rc files in launch command — fnm env destroys PATH (#1261)
Root cause: the launch command did `source ~/.bashrc; source ~/.zshrc; claude`.
The .zshrc contains `eval "$(fnm env)"` which outputs PATH with literal
"$PATH" in quotes instead of expanding it, destroying the entire PATH.

Confirmed via debugging:
- `ssh -t ... 'export PATH=...; which claude'` → works (/root/.bun/bin/claude)
- `ssh -t ... 'export PATH=...; source ~/.zshrc; which claude'` → "command not found"
- `source ~/.zshrc; echo $PATH` → `"/run/user/0/fnm_multishells/...":"$PATH"` (broken)

Fix:
- Remove `source ~/.bashrc` and `source ~/.zshrc` from ALL launch commands
- ssh -t creates a pseudo-terminal, so bash auto-sources .bashrc for env vars
- Explicit PATH export is all we need for finding the claude binary
- Remove fnm eval snippet from _finalize_claude_install (it poisoned rc files)
- Also: clean up stale ~/.bash_profile, fix cloud-init PATH, move node
  install after bun attempt

Co-authored-by: lab <6723574+louisgv@users.noreply.github.com>
Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-02-16 01:06:55 -08:00
..
lib fix: inject env vars into both .bashrc and .zshrc, fix PATH across all clouds (#1213) 2026-02-15 17:30:40 -08:00
aider.sh fix: add actionable guidance to agent installation failures across 126 scripts (#966) 2026-02-13 10:14:03 -08:00
amazonq.sh fix: use log_step (cyan) for progress messages instead of log_warn (yellow) (#534) 2026-02-11 14:37:43 -08:00
claude.sh fix: stop sourcing rc files in launch command — fnm env destroys PATH (#1261) 2026-02-16 01:06:55 -08:00
cline.sh fix: use log_step (cyan) for progress messages instead of log_warn (yellow) (#534) 2026-02-11 14:37:43 -08:00
codex.sh fix: use log_step (cyan) for progress messages instead of log_warn (yellow) (#534) 2026-02-11 14:37:43 -08:00
continue.sh fix: use log_step (cyan) for progress messages instead of log_warn (yellow) (#534) 2026-02-11 14:37:43 -08:00
gemini.sh fix: use log_step (cyan) for progress messages instead of log_warn (yellow) (#534) 2026-02-11 14:37:43 -08:00
goose.sh fix: add actionable guidance to agent installation failures across 126 scripts (#966) 2026-02-13 10:14:03 -08:00
gptme.sh fix: add actionable guidance to agent installation failures across 126 scripts (#966) 2026-02-13 10:14:03 -08:00
interpreter.sh fix: use log_step (cyan) for progress messages instead of log_warn (yellow) (#534) 2026-02-11 14:37:43 -08:00
kilocode.sh fix: use log_step (cyan) for progress messages instead of log_warn (yellow) (#534) 2026-02-11 14:37:43 -08:00
nanoclaw.sh fix(security): replace unquoted heredocs with printf to prevent shell expansion in API keys (#1031) 2026-02-13 19:41:10 -05:00
openclaw.sh fix: use log_step (cyan) for progress messages instead of log_warn (yellow) (#534) 2026-02-11 14:37:43 -08:00
opencode.sh fix: use log_step (cyan) for progress messages instead of log_warn (yellow) (#534) 2026-02-11 14:37:43 -08:00
plandex.sh fix: add actionable guidance to agent installation failures across 126 scripts (#966) 2026-02-13 10:14:03 -08:00
README.md refactor: replace Python with jq in Hetzner lib, fix /lab → /labs URLs (#827) 2026-02-12 23:14:11 -08:00

OVHcloud

OVHcloud Public Cloud instances via REST API. OVHcloud

Setup

OVHcloud uses signature-based API authentication. You need:

  1. Application Key and Application Secret - Create at https://api.ovh.com/createToken/
  2. Consumer Key - Generated during token creation
  3. Project ID - Find at OVH Manager (select project -> Project ID)

Required API permissions:

  • GET /cloud/project/*
  • POST /cloud/project/*
  • DELETE /cloud/project/*
  • GET /me

Environment Variables

Variable Description
OVH_APPLICATION_KEY OVH Application Key
OVH_APPLICATION_SECRET OVH Application Secret
OVH_CONSUMER_KEY OVH Consumer Key
OVH_PROJECT_ID OVH Public Cloud Project ID
OVH_SERVER_NAME Instance name (optional, prompted if not set)
OVH_FLAVOR Instance flavor (default: d2-2)
OVH_REGION Region (default: GRA7)
OVH_SSH_USER SSH user (default: ubuntu)

Agents

Claude Code

bash <(curl -fsSL https://openrouter.ai/labs/spawn/ovh/claude.sh)

Aider

bash <(curl -fsSL https://openrouter.ai/labs/spawn/ovh/aider.sh)

OpenClaw

bash <(curl -fsSL https://openrouter.ai/labs/spawn/ovh/openclaw.sh)

NanoClaw

bash <(curl -fsSL https://openrouter.ai/labs/spawn/ovh/nanoclaw.sh)

Cline

bash <(curl -fsSL https://openrouter.ai/labs/spawn/ovh/cline.sh)

Codex CLI

bash <(curl -fsSL https://openrouter.ai/labs/spawn/ovh/codex.sh)

Goose

bash <(curl -fsSL https://openrouter.ai/labs/spawn/ovh/goose.sh)

Open Interpreter

bash <(curl -fsSL https://openrouter.ai/labs/spawn/ovh/interpreter.sh)

Gemini CLI

bash <(curl -fsSL https://openrouter.ai/labs/spawn/ovh/gemini.sh)

Amazon Q CLI

bash <(curl -fsSL https://openrouter.ai/labs/spawn/ovh/amazonq.sh)

OpenCode

bash <(curl -fsSL https://openrouter.ai/labs/spawn/ovh/opencode.sh)

Plandex

bash <(curl -fsSL https://openrouter.ai/labs/spawn/ovh/plandex.sh)

gptme

bash <(curl -fsSL https://openrouter.ai/labs/spawn/ovh/gptme.sh)

Non-Interactive Mode

OVH_SERVER_NAME=dev-mk1 \
OVH_APPLICATION_KEY=your-app-key \
OVH_APPLICATION_SECRET=your-app-secret \
OVH_CONSUMER_KEY=your-consumer-key \
OVH_PROJECT_ID=your-project-id \
OPENROUTER_API_KEY=sk-or-v1-xxxxx \
  bash <(curl -fsSL https://openrouter.ai/labs/spawn/ovh/claude.sh)