Skip to content

Set Up Your Instance

This tutorial walks you through the Oore CI setup wizard — from starting the daemon to having a fully configured instance with either:

  • local-only access
  • remote access through OIDC
  • remote access through a trusted proxy such as Warpgate

What you need

  • Oore CI installed
  • One of:
    • an OIDC provider configured with a client application (see Configure OIDC if you haven't done this yet), or
    • a trusted proxy that forwards user identity as a header (for example Warpgate)
  • If using OIDC: your issuer URL, client ID, and client secret (if required by your provider)

1. Start the daemon

Open a terminal and start oored:

bash
oored run --listen 127.0.0.1:8787

You should see:

INFO oored: using database path="/Users/you/Library/Application Support/oore/oore.db"
INFO oored: database ready instance_id="..." state=BootstrapPending
INFO oored: encryption key ready
INFO oored: starting oored daemon listen=127.0.0.1:8787

Leave this terminal running. The daemon listens on 127.0.0.1:8787 by default.

TIP

Override the listen address with --listen or the OORED_LISTEN_ADDR environment variable.

2. Generate a bootstrap token

In a second terminal, generate a one-time bootstrap token:

bash
oore setup token --ttl 15m

This runs oore setup token --ttl 15m and outputs:

Bootstrap token generated.

Token:   a1b2c3d4e5f6...
Expires: 2026-02-06 14:30:00 (15m from now)
State:   bootstrap_pending
DB:      /Users/you/Library/Application Support/oore/oore.db

To complete setup, either:
  1. Open https://ci.oore.build and add http://127.0.0.1:8787 as an instance, then continue setup
  2. Run: oore setup

Copy the token value. You'll need it in the next step.

WARNING

The bootstrap token is single-use and expires after its TTL (default: 15 minutes). If it expires, run oore setup token --ttl 15m again.

3. Complete setup

Choose one of two methods: the web UI or the interactive CLI.

Option A: Web UI

  1. Open ci.oore.build.

  2. Add your backend instance URL (http://127.0.0.1:8787 for local setup).

  3. Open the setup flow for that instance.

  4. Follow the setup steps:

    StepWhat you do
    1. BootstrapPaste your bootstrap token to authenticate
    2. ModeChoose Local Only, Remote (OIDC), or Remote (Trusted Proxy / Warpgate)
    3. Auth setupConfigure OIDC, or trusted-proxy header settings, or skip directly to owner in local mode
    4. OwnerVerify the owner account through OIDC, trusted proxy, or local owner creation
    5. FinalizeConfirm to lock setup endpoints permanently

Option B: Interactive CLI

Run the setup command:

bash
oore setup

The CLI walks through the same setup flow:

oore setup -- interactive instance configuration

Connected to oored at http://127.0.0.1:8787
Instance:  a1b2c3d4-...
State:     bootstrap_pending

[Step 1/5] Bootstrap token verification
  Generating bootstrap token (TTL: 15m)...
  Verifying token with daemon...
  > Bootstrap verified. Session token acquired.

[Step 2/5] Access mode
  Mode: Remote (OIDC)
  > Access mode saved.

[Step 3/5] OIDC provider configuration
  OIDC Issuer URL: https://accounts.google.com
  Client ID: your-client-id.apps.googleusercontent.com
  Client Secret (optional, press Enter to skip): ****
  > OIDC provider configured.

[Step 4/5] Owner account setup
  Continue with OIDC authentication? [y/N] y
  Waiting for authentication callback...
  > Owner verified: admin@example.com

[Step 5/5] Finalize setup
  Complete setup? This will lock all setup endpoints. [y/N] y
  > Setup complete! Instance ID: a1b2c3d4-...

If you choose Remote (Trusted Proxy / Warpgate), the web UI setup flow asks for:

  • trusted user email header (default: x-warpgate-username)
  • optional trusted proxy CIDRs
  • optional shared secret sent by the proxy as x-oore-trusted-proxy-secret

Then the owner is claimed from the trusted proxy-authenticated request instead of an OIDC redirect.

INFO

The CLI OIDC flow opens your default browser and listens on a random local port for the callback. Make sure your OIDC provider's allowed callback URLs include http://localhost:* or the specific port shown in the CLI output.

4. Verify

Confirm the instance is in ready state:

bash
curl http://127.0.0.1:8787/v1/public/setup-status

Expected response:

json
{
  "instance_id": "550e8400-e29b-41d4-a716-446655440000",
  "state": "ready",
  "setup_mode": false,
  "is_configured": true
}

Once state is ready, setup endpoints are permanently disabled and the instance is ready for normal use.

DANGER

Finalizing setup is irreversible. All setup endpoints (/v1/setup/*) are permanently disabled after this step.

What happens during setup

The instance progresses through four states. Each step requires the previous one to complete:

bootstrap_pending → idp_configured → owner_created → ready
StateWhat happenedWhat's next
bootstrap_pendingDaemon started, waiting for bootstrap tokenVerify token to get a setup session
idp_configuredOIDC or trusted-proxy auth has been configuredVerify or claim the owner account
owner_createdOwner identity verified, account createdFinalize to lock setup
readySetup complete, all setup endpoints disabledInstance ready for normal use

For the full state machine reference, see Setup States.

Troubleshooting

"Cannot reach daemon"

Make sure oored is running. Start it with:

bash
oored run --listen 127.0.0.1:8787

"Setup already complete"

The instance has already been configured. Check with:

bash
curl http://127.0.0.1:8787/v1/public/setup-status

"OIDC discovery failed"

The daemon couldn't fetch the OpenID Connect discovery document from your issuer URL. Verify that:

  • The issuer URL is correct (e.g., https://accounts.google.com, not https://accounts.google.com/)
  • The issuer supports /.well-known/openid-configuration
  • The daemon has internet access

"Session expired"

Setup sessions expire after 30 minutes of inactivity. Restart the setup process from step 2.

Next steps

Your instance is running and authenticated. Continue with:

Self-hosted mobile CI, built for Flutter.