You are running on a server with shell access. Please set up oqto. Step 1: confirm context - print hostname and current user - verify you are in the correct environment Step 2: clone and enter the repo - git clone https://github.com/byteowlz/oqto.git - cd oqto Step 3: create a config file (oqto.setup.toml) If I already provided a config file, skip this step. Otherwise, create it from the template below and ask me to confirm or edit values. Template (full structure): [deployment] # user_mode: "single" or "multi" # backend_mode: "local" only (container mode needs further testing) # workspace_dir: custom workspace path (optional) user_mode = "multi" backend_mode = "local" # workspace_dir = "/home/{linux_username}/oqto" [network] # caddy: enable https reverse proxy # domain: public domain for https # log_level: error | warn | info | debug | trace caddy = false # domain = "oqto.example.com" log_level = "info" [admin] # password is NOT stored here; prompt me securely during setup username = "admin" email = "admin@example.com" [providers] # enabled providers (choose any) # anthropic, openai, google, openrouter, groq, mistral, xai, plus custom enabled = ["anthropic", "openai"] # Optional custom providers (repeat per provider) # [providers.] # type = "openai" | "openai-responses" | "openai-compatible" | "azure" | "bedrock" | "google-vertex" | "anthropic" # base_url = "http://localhost:8000/v1" # for foundry: https://.services.ai.azure.com/openai/v1 # api_key = "env:MY_PROVIDER_API_KEY" # optional for local servers # deployment = "gpt-4o" # azure only # api_version = "2024-12-01-preview" # azure only # aws_region = "us-east-1" # bedrock only # gcp_project = "my-project" # vertex only # gcp_location = "us-central1" # vertex only # test_model = "model-name" # optional [tools] # install_all = true installs all tools # enabled = ["agntz", "mmry", "hstry", "trx", "sx", "scrpr", "tmpltr", "sldr", "ignr", "ears", "kokoro"] # note: mmry, hstry, trx are required; ears and kokoro are for voice mode (optional) install_all = true # enabled = ["agntz", "mmry", "hstry", "trx", "sx", "scrpr", "ears", "kokoro"] # searxng = true # only used if sx is enabled Tool descriptions: - agntz (Agent Operations CLI): Unified CLI wrapper providing convenient commands for mmry, hstry, trx, and other tools. Offers memory management, history search, transaction tracking, issue management, and file reservations through a single interface. https://github.com/byteowlz/agntz - mmry (Memory Store): Persistent memory system for storing and retrieving reusable knowledge, insights, and patterns https://github.com/byteowlz/mmry - hstry (History Store): Persistent history tracking for sessions and commands with search capabilities https://github.com/byteowlz/hstry - trx (Transaction Store): Transaction management for tracking operations, rollbacks, and state changes https://github.com/byteowlz/trx - sx (Search CLI): Web search integration using SearXNG for privacy-focused search capabilities https://github.com/byteowlz/sx - scrpr (Scraper CLI): Web scraping tools for extracting data from websites and web services https://github.com/byteowlz/scrpr - tmpltr (Templater CLI): Template generation and management for creating consistent file structures and boilerplate https://github.com/byteowlz/tmpltr - sldr (Slider CLI): Interactive TUI slider components and parameter adjustment tools https://github.com/byteowlz/sldr - ignr (Ignore File Generator): Smart .gitignore and ignore file generation based on project type https://github.com/byteowlz/ignr - ears (Speech-to-Text): Streaming STT built on Kyutai's models with server management, client capture, and system-wide dictation support https://github.com/byteowlz/eaRS - kokoro (Text-to-Speech): Fast Kokoro TTS implementation with multi-language support, voice style mixing, OpenAI-compatible API server, and streaming mode https://github.com/byteowlz/kokorox [hardening] # linux server hardening (recommended on public servers) enabled = true # ssh_port = 22 firewall = true fail2ban = true ssh_hardening = true auto_updates = true kernel_security = true Step 4: run setup ./setup.sh --config oqto.setup.toml If no config file is provided, run the interactive setup: ./setup.sh Step 5: prompt me for secrets - admin password - any missing LLM API keys Before proceeding, confirm the final config with me.