Complete guide to using cc-connect features.
- Session Management
- Permission Modes
- API Provider Management
- Model Selection
- Work Directory Switching (
/dir,/cd) - Feishu Setup CLI
- Weixin (personal) Setup CLI
- Claude Code Router Integration
- Voice Messages (STT)
- Voice Reply (TTS)
- Image and File Send-Back
- Scheduled Tasks (Cron)
- Multi-Bot Relay
- Daemon Mode
- Multi-Workspace Mode
- Web Admin Dashboard (Beta)
- Bridge — External Adapter Access (Beta)
- Configuration Reference
Each user gets an independent session with full conversation context. Manage sessions via slash commands:
| Command | Description |
|---|---|
/new [name] |
Start a new session |
/list |
List all agent sessions for this project |
/switch <id> |
Switch to a different session |
/current |
Show current session info |
/history [n] |
Show last n messages (default 10) |
/usage |
Show account/model quota usage (if supported) |
/provider [...] |
Manage API providers |
/model [switch <alias>] |
List available models or switch by alias |
/dir [path] |
Show or switch the agent work directory |
/allow <tool> |
Pre-allow a tool (next session) |
/reasoning [level] |
View or switch reasoning effort (Codex) |
/mode [name] |
View or switch permission mode |
/stop |
Stop current execution |
/help |
Show available commands |
During a session, the agent may request tool permissions. Reply allow / deny / allow all.
cc-connect rotates to a fresh session automatically after long inactivity:
[[projects]]
name = "demo"
reset_on_idle_mins = 30 # default when unset; set to 0 to disableThe next normal message after a long idle period starts in a fresh session automatically, without deleting the old session from /list.
Why this is on by default: without idle rotation, every workspace-pool eviction (~15 min) caused the next message to resume the previous transcript via --continue. Over many cycles this re-ingests stale chat history (failed commands, debugging noise, abandoned tangents) and the model's attention drifts away from the original intent. Rotating after 30 minutes of user inactivity gives a clean slate when you come back to a task, while preserving the old session for /list and /switch.
To restore the previous behavior of always continuing, set reset_on_idle_mins = 0.
/model preserves the current session — the agent resumes the conversation with the new model (no extra token cost). Model switching affects the shared agent instance — if multiple platforms use the same project, the model change applies to all of them.
All agents support permission modes switchable at runtime via /mode.
| Mode | Config Value | Behavior |
|---|---|---|
| Default | default |
Every tool call requires approval |
| Accept Edits | acceptEdits / edit |
File edits auto-approved |
| Auto | auto |
Claude decides when to ask for permission |
| Plan Mode | plan |
Claude only plans, no execution |
| YOLO | bypassPermissions / yolo |
All tools auto-approved |
| Mode | Config Value | Behavior |
|---|---|---|
| Suggest | suggest |
Only trusted commands run without approval |
| Auto Edit | auto-edit |
Model decides when to ask |
| Full Auto | full-auto |
Auto-approve with sandbox |
| YOLO | yolo |
Bypass all approvals and sandbox |
| Mode | Config Value | Behavior |
|---|---|---|
| Default | default |
Trust workspace, ask before tools |
| Force (YOLO) | force / yolo |
Auto-approve all |
| Plan | plan |
Read-only analysis |
| Ask | ask |
Q&A style, read-only |
| Mode | Config Value | Behavior |
|---|---|---|
| Default | default |
Prompt for approval |
| Auto Edit | auto_edit / edit |
Auto-approve edits |
| YOLO | yolo |
Auto-approve all |
| Plan | plan |
Read-only plan mode |
| Mode | Config Value | Behavior |
|---|---|---|
| Default | default |
Standard permissions |
| YOLO | yolo |
Skip all checks |
[projects.agent.options]
mode = "default"
# allowed_tools = ["Read", "Grep", "Glob"]Switch at runtime:
/mode # show current and available modes
/mode yolo # switch to YOLO mode
/mode default # switch back
Switch between API providers at runtime without restart.
[projects.agent.options]
work_dir = "/path/to/project"
provider = "anthropic" # active provider
[[projects.agent.providers]]
name = "anthropic"
api_key = "sk-ant-xxx"
[[projects.agent.providers]]
name = "relay"
api_key = "sk-xxx"
base_url = "https://api.relay-service.com"
model = "claude-sonnet-4-20250514"
[[projects.agent.providers.models]]
model = "claude-sonnet-4-20250514"
alias = "sonnet"
[[projects.agent.providers.models]]
model = "claude-opus-4-20250514"
alias = "opus"
[[projects.agent.providers.models]]
model = "claude-haiku-3-5-20241022"
alias = "haiku"
# MiniMax — OpenAI-compatible, 1M context
[[projects.agent.providers]]
name = "minimax"
api_key = "your-minimax-api-key"
base_url = "https://api.minimax.io/v1"
model = "MiniMax-M2.7"
# For Bedrock, Vertex, etc.
[[projects.agent.providers]]
name = "bedrock"
env = { CLAUDE_CODE_USE_BEDROCK = "1", AWS_PROFILE = "bedrock" }cc-connect provider add --project my-backend --name relay --api-key sk-xxx --base-url https://api.relay.com
cc-connect provider list --project my-backend
cc-connect provider remove --project my-backend --name relay
cc-connect provider import --project my-backend # from cc-switch/provider Show current provider
/provider list List all providers
/provider add <name> <key> [url] [model]
/provider remove <name>
/provider switch <name>
/provider <name> Shortcut for switch
| Agent | api_key → | base_url → |
|---|---|---|
| Claude Code | ANTHROPIC_API_KEY |
ANTHROPIC_BASE_URL |
| Codex | OPENAI_API_KEY |
OPENAI_BASE_URL |
| Gemini CLI | GEMINI_API_KEY |
use env map |
| OpenCode | ANTHROPIC_API_KEY |
use env map |
| iFlow CLI | IFLOW_API_KEY |
IFLOW_BASE_URL |
Pre-configure a list of selectable models per provider using [[providers.models]]. Each entry has a model identifier and an optional alias (short name shown in /model).
[[projects.agent.providers]]
name = "openai"
api_key = "sk-xxx"
[[projects.agent.providers.models]]
model = "gpt-5.3-codex"
alias = "codex"
[[projects.agent.providers.models]]
model = "gpt-5.4"
alias = "gpt"
[[projects.agent.providers.models]]
model = "gpt-5.3-codex-spark"
alias = "spark"/model List available models (format: alias - model)
/model switch <alias> Switch to the model matching the alias
/model switch <name> Switch to the model by its full name
/model <alias> Legacy syntax, still supported
When models is configured, /model shows exactly that list without making an API round-trip. When omitted, models are fetched from the provider API or fall back to a built-in list.
Switch where the next agent session starts, directly from chat.
/dir Show current work directory and recent history
/dir <path> Switch to a path (relative or absolute)
/dir <number> Switch to a directory from history
/dir - Switch back to previous directory
/dir help Show command usage
/cd <path> Backward-compatible alias of /dir <path>
- Directory changes apply to the next session in the current project.
- Relative paths are resolved from the current agent work directory.
- Directory history is project-scoped and can be switched by index.
/cdis kept for compatibility, but/diris the primary command.
Examples:
/dir ../another-repo
/dir 2
/dir -
Platform support: Linux and macOS. Not supported on Windows. Agent support: Claude Code today. Other agents fall back to the supervisor user; see the tracking issue for migration status.
By default, every agent session cc-connect spawns runs as the same Unix
user that runs cc-connect itself. If an agent misbehaves — reads a
secret, overwrites a sibling repo, trashes ~/.ssh/ — it has the
supervisor user's full file-system reach.
run_as_user sets a per-project target Unix user. When it is set,
cc-connect spawns that project's agent command via
sudo -n -iu <target-user> -- claude ...
The target user is a real, unprivileged Unix account that you create. The agent runs under that account's uid/gid, with its own home directory, shell profile, PATH, and tool credentials. File-system isolation is enforced by the kernel, not by hooks or allowlists.
This provides OS-user isolation from any file or process the target
user cannot reach. An agent can no longer read or clobber the
supervisor's ~/.ssh/, another project user's ~/.pgpass, or a repo
whose UNIX permissions don't grant access to the target user.
This does not automatically isolate projects from each other if they
share the same run_as_user. If you want per-project isolation, create
a separate Unix user per project.
This is not a sandbox in the sense of Linux namespaces, seccomp, or container isolation. It is strictly file-system scoping by uid.
The target user needs its own copy of everything the agent touches,
because sudo -i loads the target user's login environment — not the
supervisor's.
sudo useradd -m -s /bin/bash partseeker-coder
sudo -iu partseeker-coder
# Install the agent CLI under the target user's PATH
# (for Claude Code, follow the normal install instructions)
# Set up the target user's ~/.claude/
mkdir -p ~/.claude
# Copy or re-create:
# ~/.claude/settings.json (MCP servers, hooks, model settings)
# ~/.claude.json (Claude Code auth)
# ~/.claude/plugins/ (claude-mem and any other plugin state)
exitAdd a scoped sudoers rule. Do not use NOPASSWD: ALL for the
supervisor — that grants the supervisor root, which is irrelevant here
and dangerous.
# /etc/sudoers.d/cc-connect (install with `sudo visudo -f ...`)
partseeker-orchestrator ALL=(partseeker-coder) NOPASSWD: ALL
Adjust the usernames for your setup. The rule says: "the supervisor user may run any command as this specific target user, without a password."
The whole point of stepping down into a target user is that the target cannot immediately escalate back. Verify:
sudo -n -iu partseeker-coder -- sudo -n true
# must FAIL with "a password is required" or similarIf that command succeeds, cc-connect will refuse to start. Remove any
NOPASSWD sudo grants for the target user first.
The target user needs read AND write on the project's work_dir. If
the directory is owned by the supervisor, either chown it to the
target, add group ownership the target is in, or apply a POSIX ACL:
sudo setfacl -R -m u:partseeker-coder:rwX /home/leigh/workspace/sandboxed-repo
sudo setfacl -R -dm u:partseeker-coder:rwX /home/leigh/workspace/sandboxed-repocc-connect refuses to start if the target user cannot read+write the
work_dir root, and warns (non-fatal) for descendant paths that look
inaccessible.
cc-connect doctor user-isolationThis runs the full preflight (the three go/no-go gates from
#496) and an
isolation probe: it spawns a fixed shell script as the target user
and reports what the target can read, what it's denied, and any
cross-user leaks. Output goes to stdout plus a JSON report in
~/.cc-connect/audits/<timestamp>-<project>.json.
Exit code 0 = clean. Exit code 1 = at least one fatal problem.
You can inspect the probe script itself with:
cc-connect doctor user-isolation --print-script[[projects]]
name = "claude-sandboxed"
run_as_user = "partseeker-coder"
# Optional: extend the default env var allowlist that crosses the sudo
# boundary. The defaults (PATH, LANG, LC_*, TERM) are always included.
# Only list vars the target user cannot reasonably set in their own
# shell profile. Secrets belong in the target user's ~/.claude/settings.json
# env block, NOT here.
run_as_env = ["PGSSLROOTCERT", "PGSSLMODE"]
[projects.agent]
type = "claudecode"
[projects.agent.options]
mode = "default"
model = "sonnet"
work_dir = "/home/leigh/workspace/sandboxed-repo"This is the 2am-debugging section. When you switch a project to
run_as_user, the supervisor's environment is not forwarded across
the sudo boundary — that's the whole point. Everything the agent needs
has to live in the target user's home.
Migration checklist:
-
Agent config —
~/.claude/settings.json(MCP servers, hooks, model settings),~/.claude.json(auth). Copy from the supervisor or re-create from scratch. -
Plugin state —
~/.claude/plugins/— claude-mem, any other Claude Code plugins. -
MCP server binaries — must be on the target user's
PATH, not just the supervisor's. Either install under the target user or reference full paths insettings.json. -
Postgres TLS —
PGSSLROOTCERT,PGSSLCERT,PGSSLKEYbelong in the target user's~/.claude/settings.jsonenvblock. Their referenced cert files must be readable by the target user. -
Claude OAuth credentials — if you authenticate via
claude.ai(OAuth), the token lives in~/.claude/.credentials.json. OAuth access tokens expire after a few hours and are refreshed automatically by whichever Claude CLI session is running. The target user's token will not be refreshed unless the target user has an active session — which it often doesn't between cc-connect spawns. The recommended fix is to symlink the target user's credentials to the supervisor's file so both share one token that stays fresh:```bash # Grant target user read access via ACL (keeps 600 for everyone else) setfacl -m u:<target-user>:rx ~/.claude/ setfacl -m u:<target-user>:r ~/.claude/.credentials.json # Replace the target user's credentials with a symlink sudo -iu <target-user> bash -c \ 'rm -f ~/.claude/.credentials.json && \ ln -s /home/<supervisor>/.claude/.credentials.json \ ~/.claude/.credentials.json' ``` **If you use an API key** (`ANTHROPIC_API_KEY`) instead of OAuth, this is not an issue — set the key in the target user's `~/.claude/settings.json` `env` block and it won't expire. -
Credential files —
~/.pgpass,~/.gitconfig,~/.netrc,~/.aws/,~/.config/gh/,~/.kube/— whichever the agent actually uses. Each needs its own copy or a group-readable shared copy. -
SSH keys —
~/.ssh/id_ed25519etc., if the agent runsgit pushover SSH. Same story: copy or group-share. -
Key material under
~/keys/— custom directories the supervisor uses need an equivalent under the target user's home or a group-readable shared copy. -
Language toolchains — if the agent uses
asdf,mise,nvm,rustup, etc., those live in~. The target user needs either its own install or a system-wide install that both users can run. -
Shell profile —
~/.profile/~/.bashrcon the target user needs to setPATHand any tool init the agent depends on. Test withsudo -iu partseeker-coderbefore wiring cc-connect.
After migration, run cc-connect doctor user-isolation again. The
target home section reports which expected paths are present and
which are missing — missing isn't necessarily wrong, but it's your
checklist.
Remove run_as_user from the project entry, or set it to "". Legacy
behavior (spawn as supervisor) returns on the next restart.
- "passwordless sudo to user X is not configured" — step 2 of setup
is missing or the sudoers rule is scoped to the wrong supervisor. Fix
the rule, run
visudo -cto validate syntax, then restart cc-connect. - "target user X can run passwordless sudo" — step 3 failed. The
error includes the output of
sudo -lfrom the target context; find the offending rule and remove it. - "target user X cannot read AND write work_dir Y" — step 4 failed.
chownthe directory or add an ACL as shown above. - "CROSS_LEAKED" or "SUPERVISOR_LEAKED" in the audit — the
target user can read another user's secrets. Tighten the offending
file's permissions (usually
chmod 600 file; chown user:user file) and re-audit. - "descendant scan timed out" — non-fatal. The
work_diris large enough that the permission walk exceeded its timeout. Runcc-connect doctor user-isolationmanually if you want the full walk, or narrow the project'swork_dir.
Use CLI to create or bind Feishu/Lark bot credentials and write them back to config.toml.
# Recommended: unified entry
cc-connect feishu setup --project my-project
cc-connect feishu setup --project my-project --app cli_xxx:sec_xxx
# Force modes (usually unnecessary)
cc-connect feishu new --project my-project
cc-connect feishu bind --project my-project --app cli_xxx:sec_xxxDifferences:
setup: unified entry. No credentials => behaves likenew; with--app=> behaves likebind.new: force QR onboarding flow; rejects--app.bind: force credential binding flow; requires credentials.
Behavior:
setupuses QR onboarding by default, or bind mode when--appis provided.- If
--projectdoes not exist, it is created automatically. - If project exists but has no
feishu/larkplatform, one is added automatically. - The command writes credentials (
app_id,app_secret); in QR onboarding flow, Feishu usually pre-configures permissions and event subscriptions. - Still verify app publish status and availability scope in Feishu Open Platform.
- Runtime platform config also supports an optional
domainoverride for Feishu/Lark API endpoints; this does not change setup/onboarding URLs.
Weixin personal chat uses the ilink bot HTTP API (long polling + sendMessage, same family as OpenClaw openclaw-weixin). Use the CLI to scan a QR code or bind an existing Bearer token and write config.toml.
Full walkthrough (Chinese): docs/weixin.md.
cc-connect weixin setup --project my-project
cc-connect weixin bind --project my-project --token '<token>'
cc-connect weixin new --project my-projectNotes:
setupwithout--tokenruns QR login; with--tokenbehaves like bind.- Auto-creates the project and/or a
weixinplatform block when missing. - After login, send a message from WeChat once so
context_tokenis cached. - See
cc-connect weixin helpfor flags (--api-url,--cdn-url,--route-tag, etc.).
Claude Code Router routes requests to different model providers.
-
Install:
npm install -g @musistudio/claude-code-router -
Configure
~/.claude-code-router/config.json:
{
"APIKEY": "your-secret-key",
"Providers": [
{
"name": "deepseek",
"api_base_url": "https://api.deepseek.com/chat/completions",
"api_key": "sk-xxx",
"models": ["deepseek-chat", "deepseek-reasoner"],
"transformer": { "use": ["deepseek"] }
}
],
"Router": {
"default": "deepseek,deepseek-chat",
"think": "deepseek,deepseek-reasoner"
}
}-
Start:
ccr start -
Configure cc-connect:
[projects.agent.options]
router_url = "http://127.0.0.1:3456"
router_api_key = "your-secret-key" # optionalSend voice messages — cc-connect transcribes them automatically.
Supported: Feishu, WeChat Work, Telegram, LINE, Discord, Slack
Requirements: OpenAI/Groq API key, ffmpeg
[speech]
enabled = true
provider = "openai" # or "groq"
language = "" # "zh", "en", or auto-detect
[speech.openai]
api_key = "sk-xxx"
# base_url = ""
# model = "whisper-1"
# [speech.groq]
# api_key = "gsk_xxx"
# model = "whisper-large-v3-turbo"# Ubuntu/Debian
sudo apt install ffmpeg
# macOS
brew install ffmpegSynthesize AI replies into voice messages.
Supported: Feishu (Lark)
[tts]
enabled = true
provider = "qwen" # or "openai"
voice = "Cherry"
tts_mode = "voice_only" # "voice_only" | "always"
max_text_len = 0 # 0 = no limit
[tts.qwen]
api_key = "sk-xxx"
# model = "qwen3-tts-flash"| Mode | Behavior |
|---|---|
voice_only |
Reply with voice only when user sends voice |
always |
Always send voice reply |
Switch: /tts always or /tts voice_only
When an agent generates a local image, PDF, report, bundle, or other file and needs to deliver it directly to the current chat, use attachment mode in cc-connect send.
Currently supported platforms:
- Feishu
- Telegram
If the current agent does not natively inject the system prompt, run this once in chat after upgrading:
/bind setup
or:
/cron setup
These two commands write the same cc-connect instructions. Either one is enough. After that, the agent knows:
- normal text replies should be returned normally
- generated attachments should be sent back with
cc-connect send --image/--file
If you have run setup before, run it again after upgrading so the instructions are refreshed to the latest version.
Add this to config.toml if you want to disable agent-driven attachment send-back:
attachment_send = "off"The default is on. This switch is independent from the agent's /mode and only affects cc-connect send --image/--file.
cc-connect send --image /absolute/path/to/chart.png
cc-connect send --file /absolute/path/to/report.pdf
cc-connect send --file /absolute/path/to/report.pdf --image /absolute/path/to/chart.pngNotes:
--imageis for image attachments.--fileis for any file attachment.--messageis optional and sends a text note before the attachments.--imageand--filecan both be repeated.- Absolute paths are recommended so the command does not depend on the agent's current working directory.
- With
attachment_send = "off", image/file send-back is blocked but ordinary text replies still work.
- The agent generates a screenshot or chart and should send it directly to the user.
- The agent generates a PDF, Markdown export, log bundle, or patch file that should be delivered as an attachment.
- The agent wants to send a short status message together with one or more generated files.
- This command is for attachment delivery, not ordinary text replies.
- The files must exist on the local machine where the agent runs.
- There must be an active session; otherwise the command fails because cc-connect has no chat context to deliver to.
- Platform-specific file size and file type limits still apply.
Create scheduled tasks that run automatically.
/cron List all jobs
/cron add <min> <hour> <day> <mon> <wk> <prompt> Create job
/cron del <id> Delete job
/cron enable <id> Enable job
/cron disable <id> Disable job
Example:
/cron add 0 6 * * * Summarize GitHub trending repos
cc-connect cron add --cron "0 6 * * *" --prompt "Summarize GitHub trending" --desc "Daily Trending"
cc-connect cron list
cc-connect cron edit <job-id> <field> <value> # e.g. cron_expr, prompt, enabled, mute, timeout_mins
cc-connect cron del <job-id>Optional: --session-mode new-per-run starts a fresh agent session on each run (default is reuse, same as before). --timeout-mins N sets how long the scheduler waits per run (0 = no limit; omit = 30 minutes).
"Every day at 6am, summarize GitHub trending"
Claude Code auto-creates the cron job. For other agents that rely on memory files, run /cron setup or /bind setup once first; both write the same instructions.
Cross-platform bot communication in group chats.
/bind Show bindings
/bind claudecode Add claudecode project
/bind gemini Add gemini project
/bind -claudecode Remove claudecode
cc-connect relay send --to gemini "What do you think about this architecture?"Run as background service.
cc-connect daemon install --config ~/.cc-connect/config.toml
cc-connect daemon start
cc-connect daemon stop
cc-connect daemon restart
cc-connect daemon status
cc-connect daemon logs [-f]
cc-connect daemon uninstallOne bot serving multiple workspaces per channel.
[[projects]]
name = "my-project"
mode = "multi-workspace"
base_dir = "~/workspaces"
[projects.agent]
type = "claudecode"/workspace Show current binding
/workspace bind <name> Bind local folder
/workspace init <git-url> Clone and bind repo
/workspace unbind Remove binding
/workspace list List all bindings
- Channel name
#project-a→ auto-binds tobase_dir/project-a/ - Each channel has isolated sessions and agent state
Status: Beta. This feature is available since v1.2.2-beta.5. The UI and API may change in future releases.
A full-featured management UI embedded in the binary — project CRUD, session management, cron job editor, global settings, chat interface, and i18n support.
The easiest way to enable web admin:
/web setup
This automatically enables both the Management API and the Bridge in config.toml, generates tokens, and prints the access URL. You may need to run /restart for changes to take effect.
After setup, open the URL shown (default http://localhost:9820) and log in with the token.
/web # or /web status — show current web admin URL and status
Add the following to config.toml:
[management]
enabled = true
port = 9820 # Management UI & API listen port
token = "your-secret-token" # Login token; /web setup generates one automatically
cors_origins = ["*"] # Allowed CORS origins; empty = no CORS headersThen restart cc-connect.
Web assets are compiled into the binary by default. To exclude them (saves ~1MB):
make build-noweb
# or
go build -tags 'no_web' ./cmd/cc-connectWhen built with no_web, the /web command will report that web admin is not available.
The Management API is served on the same port as the UI. Base URL: http://<host>:<port>/api/v1
All API requests require the Authorization: Bearer <token> header.
Key endpoints:
| Method | Path | Description |
|---|---|---|
GET |
/api/v1/status |
System status (version, uptime, platforms) |
POST |
/api/v1/restart |
Restart cc-connect |
POST |
/api/v1/reload |
Reload configuration |
GET |
/api/v1/projects |
List projects |
GET |
/api/v1/sessions?project=<name> |
List sessions for a project |
GET |
/api/v1/cron |
List cron jobs |
GET |
/api/v1/settings |
Get global settings |
PATCH |
/api/v1/settings |
Update global settings |
Full API reference: management-api.md
Status: Beta. This feature is available since v1.2.2-beta.5. The protocol may change in future releases.
The Bridge exposes a WebSocket + REST server so external adapters (custom UIs, bots, scripts) can interact with cc-connect sessions — send messages, receive events, manage sessions.
The /web setup command enables Bridge automatically alongside the Management API.
Add the following to config.toml:
[bridge]
enabled = true
port = 9810 # Bridge listen port (separate from management)
token = "your-bridge-secret" # Auth token for WebSocket and REST
path = "/bridge/ws" # WebSocket endpoint path
cors_origins = ["*"] # Allowed CORS origins; empty = no CORSThen restart cc-connect.
All Bridge connections require a token. Supported methods:
- Query parameter:
?token=<bridge-token> - Header:
Authorization: Bearer <bridge-token> - Header:
X-Bridge-Token: <bridge-token>
Connect to:
ws://<host>:<bridge-port>/bridge/ws?token=<bridge-token>
The WebSocket supports bidirectional messaging — send user messages to the agent and receive agent events (text, tool calls, permission requests, etc.) in real time.
Served on the same port as the WebSocket.
| Method | Path | Description |
|---|---|---|
GET |
/bridge/sessions?session_key=...&project=... |
List sessions |
POST |
/bridge/sessions |
Create a new session |
GET |
/bridge/sessions/{id}?session_key=...&project=... |
Get session detail + history |
DELETE |
/bridge/sessions/{id}?session_key=...&project=... |
Delete a session |
POST |
/bridge/sessions/switch |
Switch active session |
Full protocol reference: bridge-protocol.md
| Service | Default Port | Config Block |
|---|---|---|
| Management (Web UI + API) | 9820 | [management] |
| Bridge (WebSocket + REST) | 9810 | [bridge] |
See config.example.toml for full examples.
[[projects]]
name = "my-project"
[projects.agent]
type = "claudecode" # or codex, cursor, gemini, qoder, opencode, iflow
[projects.agent.options]
work_dir = "/path/to/project"
mode = "default"
provider = "anthropic"
[[projects.platforms]]
type = "feishu" # or dingtalk, telegram, slack, discord, wecom, weixin, line, qq, qqbot
[projects.platforms.options]
# platform-specific options