Cmdra Documentation
Remote execution docs for the daemon, the CLI, and every supported client surface.
Cmdra exposes argv commands, shell commands, persistent shell sessions, output replay, and file transfer over gRPC with mutual TLS. This site documents installation and usage across Linux, macOS, Windows, the CLI, the TUI, Go, Python, Robot Framework, and Ansible.
./scripts/generate-dev-certs.sh dev/certs
./cmdrad run --config ./dev/cmdrad.json
./cmdractl --address 127.0.0.1:8443 --ca dev/certs/ca.crt --cert dev/certs/client-a.crt --key dev/certs/client-a.key list
./cmdraui --address 127.0.0.1:8443 --ca dev/certs/ca.crt --cert dev/certs/client-a.crt --key dev/certs/client-a.keyCoverage
Operational use notes
Install the daemon
Set up cmdrad in foreground or service mode on Linux, macOS, and Windows, with mTLS and CN-based access control.
Open guideCLIOperate with cmdractl
Run commands, attach to shell sessions, inspect metadata, and move files through the operator CLI.
Open guideTUIOperate with cmdraui
Use the Bubble Tea terminal UI to inspect executions and transfers, launch new work, and attach to live sessions.
Open guideSDKsBuild against the SDKs
Use the Go and Python client libraries for synchronous and asynchronous execution and transfer workflows.
Open guideIntegrationsIntegrate with test and automation tools
Use the Python wrapper layers with Robot Framework and Ansible without building your own transport glue.
Open guide