Skip to content

docs(guide): add remote-orchestration page (SSH/frpc reverse tunnel)#1337

Merged
jackwener merged 1 commit intomainfrom
docs/remote-orchestration
May 5, 2026
Merged

docs(guide): add remote-orchestration page (SSH/frpc reverse tunnel)#1337
jackwener merged 1 commit intomainfrom
docs/remote-orchestration

Conversation

@jackwener
Copy link
Copy Markdown
Owner

@jackwener jackwener commented May 5, 2026

Summary

  • Adds docs/guide/remote-orchestration.md documenting how to run opencli from a remote machine while keeping the browser, extension, and daemon on the local laptop. Uses SSH -R (recommended) or frp reverse TCP proxy to expose the local daemon to the remote's loopback — the daemon itself never leaves localhost.
  • Adds the new page to the VitePress sidebar between Browser Bridge and Troubleshooting.
  • Adds a one-line cross-link from browser-bridge.md so users discovering the bridge can find the remote story.

Why

This is the conclusion of the #636 review. #636 proposed letting the extension popup connect to a remote daemon — that pushes the daemon's WebSocket protocol (which has no auth) onto an external network. The reverse-tunnel pattern reaches the same outcome (remote orchestration + local browser session + local IP) with zero code changes and without weakening the daemon's localhost-only security model.

This doc gives users that path explicitly so we can close #636 with a meaningful redirect, and it captures the rationale (defer extension-side remote support until daemon auth exists) so future contributors don't re-litigate the same design.

Test plan

Document the pattern for running opencli on a remote machine while keeping
the daemon and Chrome on the local machine. Reverse-tunnel local 19825
back to the remote (via SSH -R or frp) so the remote opencli still talks
to its own loopback and the daemon never leaves localhost.

Captures the rationale we landed on after reviewing #636: native
extension-to-remote-daemon support is deferred until the daemon protocol
gains authentication; in the meantime this is the safe, zero-code path
that achieves the same outcome.
@jackwener jackwener merged commit bb12081 into main May 5, 2026
11 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant