span
Built for humans, CI, and AI agents, containers, and multi-repo workspaces.
DOCTOR FIRST. CONTRACT SECOND.
Get Started · Docs · Reference · Website
Install · Quickstart · Examples by Goal · Examples · Governance · Releases
Most repos fail the same way:
- setup is split across README prose, shell scripts, manifests, and tribal knowledge
- contributors guess which runtimes, tools, versions, and task order the repo actually needs
- local, CI, and container workflows drift apart
- AI agents see partial guidance and make unsafe assumptions
- diagnosis starts after the repo already feels broken
ota is not another task runner or package manager. It gives every repo one explicit contract for what it needs, how it is diagnosed, how it is prepared, and how tasks run, so humans and AI agents can answer why a repo is or is not runnable without guesswork.
ota fixes that by making readiness explicit and machine-readable:
ota doctorshows what is missing and the next safe stepota validatekeeps the contract honest before humans, CI, or agents rely on itota initwrites a starter contract when the repo needs oneota upprepares the repo from the contract instead of from guessworkota runexecutes declared work through the same contract every timeota detectturns repo signals into a contract you can review when you are authoring or refining the file
The result is a repo that is easier to trust, easier to onboard, and easier to operate across humans, CI, containers, and AI agents.
Install the latest release binary:
curl -fsSL https://dist.ota.run/install.sh | shPersist the install directory on PATH explicitly:
curl -fsSL https://dist.ota.run/install.sh | sh -s -- --setup-pathWindows PowerShell:
irm https://dist.ota.run/install.ps1 | iexPersist the Windows install directory on PATH explicitly:
& ([scriptblock]::Create((irm https://dist.ota.run/install.ps1))) -SetupPathInstall the optional Ota skill after ota is installed:
ota skills install --agent codex
ota skills install --agent claudeWindows Git Bash, MSYS, MinGW, or Cygwin:
curl -fsSL https://dist.ota.run/install.sh | shIf the existing ota.exe is locked, the shell installer stages the replacement and reports it as pending instead of leaking a file-in-use error.
Prebuilt release binaries are published for:
- Linux
x86_64-unknown-linux-gnu,aarch64-unknown-linux-gnu - macOS
x86_64-apple-darwin,aarch64-apple-darwin - Windows
x86_64-pc-windows-msvc,aarch64-pc-windows-msvc
Pin a release:
curl -fsSL https://dist.ota.run/install.sh | OTA_VERSION=vX.Y.Z shWindows PowerShell:
$env:OTA_VERSION = "vX.Y.Z"
irm https://dist.ota.run/install.ps1 | iexUpdate an existing install:
ota upgradeInstall from a local checkout:
./scripts/install.sh --from-sourcePersist the source-install binary directory on PATH explicitly:
./scripts/install.sh --from-source --setup-pathWindows PowerShell:
powershell -ExecutionPolicy Bypass -File .\scripts\install.ps1 -FromSourcePersist the source-install binary directory on PATH explicitly:
powershell -ExecutionPolicy Bypass -File .\scripts\install.ps1 -FromSource -SetupPathSee Install for the public install path and docs/installation.md for repo-local mirror/CDN and source fallback details.
Choose the path that matches the repo.
Start with the read path:
ota doctor
ota explain
ota up
ota run <task>
ota receiptThis path tells you what is wrong, turns the findings into an ordered plan, prepares the repo, gives you one declared task path without guessing, and captures the resulting repo state as a reviewable artifact.
If the repo is meant to run inside a container, use:
ota doctor --mode containerIf you are not sure which task to run after ota up, use:
ota tasks --useIf you want repo-local agent guidance from the same contract after the core loop is working, use:
ota agentsUse the authoring path first:
ota doctor
ota detect --dry-run .
ota detect --contract .
ota init --dry-runThen choose one explicit write path:
ota initThen continue into preparation preview:
ota up --dry-runUse ota detect --write . when you want the detector-led authoring path instead of the starter contract path.
If you want an explicit conventional starter instead of detector-led init, use a pack:
ota init --packs
# or:
ota init --pack node
# or:
ota init --pack node --package-manager npm --dry-run
# or:
ota init --pack python --dry-run
# or:
ota init --pack python --test-runner unittest --dry-run
# or:
ota init --pack go --dry-run
# or:
ota init --pack rust --dry-run
# or:
ota init --pack dotnet --dry-run
# or:
ota init --pack php-composer --dry-run
# or:
ota init --pack java-maven --dry-run
# or:
ota init --pack java-gradle --dry-runThe Java packs prefer ./mvnw or ./gradlew when the repo already ships those wrappers. When no
wrapper is present, they seed the global Maven or Gradle prerequisite explicitly.
The Node pack accepts --package-manager npm|pnpm|yarn|bun, and the Python pack accepts
--test-runner pytest|unittest.
The php-composer pack stays on the explicit Composer boundary and does not pretend to infer
framework-specific entrypoints or whether the repo uses phpunit, pest, artisan, or another test
wrapper unless the repo already declares scripts.test in composer.json.
If you choose the wrong explicit pack, ota can surface an advisory note and JSON pack_advisory
field, but it keeps the selected pack authoritative and does not auto-switch starters.
Review the delta before writing:
ota detect --merge --dry-run .
ota detect --rewrite --dry-run .Use the conservative policy scaffold first when a team needs a starter org policy pack:
ota policy init --dry-run
ota policy init
ota policy init --preset required-sections --dry-run
ota policy init --preset provisioning --dry-run
ota policy init --preset agent --dry-runFor one repo, the repeatable local path is:
ota doctor
ota up
ota run ci
ota receiptFor CI, keep the same contract boundary and archive the read-only receipt:
ota validate
ota doctor --json
ota receipt --json --archiveThat keeps the local path and the CI artifact story on the same surface instead of inventing a second readiness workflow.
When you want a repo-owned baseline for later compare gates:
ota receipt --json --archive --promote-baseline
ota receipt --json --baseline promotedUse promoted when a team wants an explicit accepted repo state, and use latest when the newest
archived receipt is enough for a local drift check.
Use policy review when the contract and approved policy need to be reconciled:
ota policy reviewIf you want repo-local agent guidance from the same contract:
ota agents
ota agents --writeIf you are setting up multiple repos together:
ota workspace detect --dry-run .
ota workspace init --dry-run .
ota workspace init .
ota workspace validate .
ota workspace up --dry-run .
ota workspace up .If the contract declares agent guidance, ota doctor --json and ota explain --json surface the
same safe-task, verification, and writable-path hints that humans can review in ota.yaml.
If you want the fastest path to the right example by repo shape, use Examples by Goal.
Example contracts:
- basic-node - Node / TypeScript starter
- basic-dotnet - C# / .NET starter
- basic-java - Maven starter
- basic-rust - Rustup-backed Cargo starter
- basic-script - Script-only starter
- basic-services - Service-backed repo starter
- shared-local-topology - Shared local backend topology
- shared-remote-topology - Shared remote topology dogfood
- full-contract - Full contract surface
- workspace-acquire - Workspace acquisition flow
- ota-run/examples - advanced, production-adjacent examples and templates
Repo setup truth is usually fragmented across:
- language manifests
- runtime version files
- task scripts
- container config
- CI config
- README setup notes
- tribal knowledge
ota consolidates that into one canonical contract:
ota.yamlThe goal is not hidden automation. The goal is deterministic, inspectable repo readiness.
ota is maintainer-led open infrastructure for repo readiness. The core CLI, contracts, JSON output, and docs are public under Apache 2.0, while roadmap stewardship and future enterprise offerings stay operated by Ota.
ota is open source, but it is not positioned as a community-governed codebase.
- governance is maintainer-led by Ota so the contract, diagnosis model, and machine-readable surfaces stay coherent
- issues, bug reports, docs feedback, and real-repo examples are welcome
- external code contributions are not currently accepted
See docs/policy/governance.md for the governance model and CONTRIBUTING.md for the current contribution policy.
The public command surface is in docs/spec/command-reference.md.
Start with ota doctor, then ota validate, ota up, and ota run <task>.
Near-term policy and provisioning direction:
Global flag:
ota --debug <command>
ota --plain <command>--debug emits command-phase tracing to stderr without changing normal stdout.
--plain emits ASCII-first output without emoji, icons, or ANSI color.
Use --debug when you want command traces for ota up, ota run <task>, ota workspace up,
ota workspace refresh, ota workspace diff, ota workspace status, ota workspace run <task>, ota doctor, ota detect, ota diff, and
ota explain.
Commands like ota validate, ota tasks, ota workspace validate, ota workspace tasks, and
ota workspace list should usually stay quiet unless you are actively debugging.
Current behavior:
ota validateparses and semantically validatesota.yamlota taskslists validated tasks and their execution formota run <task>resolves dependencies, executes the requested task deterministically, and honors declaredafter_success,after_failure, andafter_alwayshooks as part of the task's final resultota diffcompares two contracts semantically and reports added, missing, and changed fields in deterministic orderota explainturns readiness findings into an ordered remediation planota doctorreports readiness findings for env, runtimes, tools, services, and checks with severity, explanation, and next action, still gives a useful repo/host diagnosis when noota.yamlexists yet, leads with the highest-priority blocker first, and supportsota doctor --mode containerfor container-targeted readinessota initcreates a starter contract for repos that do not yet haveota.yaml, both detector-led starters plus starter packs can seed short taskdescriptionfields so users can see and refine that authoring pattern immediately, detector-led starters can also carry existing repo-root dotenv sources such as.env.localand.envintoenv.sources, explicit--packmode can emit an advisory note when strong repo signals disagree without auto-switching packs while still staying on the conventional starter boundary, the Node/Python starter packs expose explicit knobs for package-manager and test-runner selection, and the built-in pack catalog now spansnode,python,go,rust,dotnet,php-composer,java-maven, andjava-gradleota agentsexports or syncs a repo-localAGENTS.mdfrom the contract’s agent guidance, preserves existing user-authored content by appending an ota-managed block, skips the write when the generated content is already present, and shows aManaged block:label in text output so the ota-owned section is explicit, including theota run ...command form for each listed taskota checkruns configured checks without runtime, tool, env, or task executionota upvalidates, targets the default workflow when one is declared, runs its setup phase early when preconditions fail, starts the selected workflow service graph in dependency order, activates the workflow run task when it has a service runtime, and re-checks readinessota detect(default) infers a candidate contract and prints provenance/confidence without writingota completion --setupauto-installs shell completion for the current shell,ota completion --removeremoves the managed hook and zsh support file,ota completion checkverifies the managed hook, current binary path, and any managed zsh completion file,ota completion zshnow prints both the_otacompletion file and the.zshrcloader for self-contained manual setup, andota completion <shell> --scriptprints the raw generated registration script; once sourced,ota <TAB>completes commands first and keeps global--flagsafter them in zsh,ota run <TAB>completes task names only when one shared invocation can satisfy the selected repo/member target set and now includes task descriptions when the contract declares them,ota run <task> <TAB>completes shared task input flags plus constrained values,ota env --task <TAB>completes task names,ota extensions --run/--publish <TAB>completes declared extension names,ota receipt --baseline <TAB>completeslatest,promoted, and archived receipt files from the active repo,--member <TAB>completes monorepo member names, and workspace completion suggests workspace-wide task names only when one shared invocation can satisfy the available repos, shared workspace task inputs, and declared repo namesota detect --writewrites a contract conservatively fromhighconfidence fields onlyota detect --merge --dry-runcompares detected repo signals against an existingota.yamlwithout writing and surfaces stale contract fields that no longer match repo realityota detect --mergeapplies only additivehighconfidence missing fields to an existingota.yaml- there is no standalone
ota driftcommand yet; drift review stays onota detect --merge --dry-runand trust/readiness drift stays onota doctor ota workspace validatevalidatesota.workspace.yamlseparately from repo contractsota workspace taskslists workspace repo tasks in dependency order without executing them, including declared post-outcome hook relationships when repo contracts define themota workspace run <task>executes one task across workspace repos in dependency order with deterministic reportingota workspace explainturns workspace readiness findings into ordered remediation stepsota workspace checkruns configured checks across workspace repos with deterministic reporting and honorsrepos.<name>.workflowwhen the workspace contract pins a non-default repo workflowota workspace doctoraggregates repo readiness across a workspace contract without merging repo and workspace truth, including repos that are not acquired yet, and usesrepos.<name>.workflowwhen the workspace declares a canonical repo pathota workspace upcan acquire missing repos from git sources and then orchestrates repo-levelupacross the workspace contract without inventing a second bootstrap model, including per-repo workflow selection fromrepos.<name>.workflowota workspace refreshre-syncs repos that already exist locally without cloning missing onesota workspace refresh --dry-runpreviews the refresh commands without changing repo stateota workspace refresh --forcehard-resets refreshed repos to the declared source or--refoverrideota workspace refresh --prunedrops stale remote-tracking refs during refreshota workspace refresh --ref <branch|tag|sha>overrides the source ref used for refreshota workspace diffcompares local workspace repo state against the declared source without mutating anythingota workspace statuscombines readiness and drift into one read-only workspace summary and evaluates readiness through the workspace-selected repo workflow when one is declaredota workspace receiptcaptures the same workspace state as a read-only receipt artifact for CI and archiving- editor and CI consumers should prefer
--jsonsurfaces such asota doctor --json,ota workspace doctor --json,ota workspace list --json, andota up --jsoninstead of scraping text output
Use the managed shell hook first:
ota completion --setup
ota completion --remove
ota completion checkIf auto-detection is not available or you want one explicit shell:
ota completion zsh --setup
ota completion zsh --remove
ota completion bash --setup
ota completion fish --setup
ota completion powershell --setup
ota completion elvish --setupOnce the shell has sourced that hook, ota keeps completion contract-aware instead of static: repo commands complete member names, task names, and task inputs from the active contract, while workspace commands complete declared repo names and only suggest workspace task names that remain runnable across the selected repo set.
Receipt compare flows also complete latest, promoted, and archived receipt JSON files from .ota/receipts so baseline selection stays discoverable at the shell.
ota supports three execution backends for task-oriented commands:
nativeruns tasks on the host machine.containerruns tasks in an OCI-compatible container using the image defined by the repo contract.remoteruns tasks on a separate machine or workspace through a remote provider.
nativeis the simplest path when the host already has the right toolchain and you want to debug against the real machine.containeris the reproducible path when you want a fixed toolchain, deterministic setup, and CI-like behavior.remoteis the off-host path when execution needs to happen somewhere else entirely, such as a dev box, cluster, or managed workspace.
ota runandota upcan execute through the configured backend path.ota upcan run thesetuptask through the same backend selection asota run.- policy-backed provisioning adapters follow the same backend selection, so container-backed
ota upprovisions inside the container instead of on the host and stops before host provisioning when the selected container engine is unavailable. ota doctorchecks the prerequisites for the preferred backend and reports missing tools or suspicious remote target shape early.ota cleancan remove persistent container state for container-backed repos.ota clean --stalecan remove exited ota-managed containers across repos without requiring anota.yaml, and it surfaces container-engine query failures instead of silently treating them as empty.
- ota does not automatically install every missing host tool or language runtime.
- ota does not turn a laptop into a fully managed workstation.
- ota does not invent remote provisioning or remote workspace selection beyond the configured provider path.
Container execution is useful when you want ota to run repo tasks in a known environment instead of relying on whatever happens to be installed locally.
Benefits:
- removes drift in Java, Maven, shell, and other repo tool versions
- makes local execution closer to CI
- gives agents a stable execution surface
- supports persistent or ephemeral lifecycle behavior where the contract and command support it
Requirements:
- at least one supported container engine CLI must be installed and running
- the contract must declare
execution.backends.container.image - the image must be pullable and runnable by the selected engine
In this repository, the container image is:
execution:
preferred: container
lifecycle: persistent
supported:
- native
- container
backends:
container:
image: rust:1.94-bookwormNative execution is useful when:
- you want to debug against the exact host environment
- the repo already has the required toolchain installed
- you want the fewest moving parts and no container boundary
Native execution does not require a container engine, but it does require the host tools that the task depends on.
Remote execution is useful when the work should happen outside the local machine:
sshfor a team dev box or dedicated hostkubectlfor execution inside a Kubernetes-backed environmenttshfor Teleport-managed infrastructuredaytonafor a managed remote development workspace
Remote execution is only available when the contract declares the provider and target fields required by the backend.
These commands execute repo tasks and therefore respect the backend selection:
ota run <task>ota up
These commands do not run repo tasks and therefore do not use the execution backend:
ota validateota doctorota detectota initota tasks
Use --mode to force one invocation to use a specific execution mode:
ota run test --mode native
ota run test --mode container
ota up --mode native
ota up --mode containerUse --lifecycle when you need to override container reuse for one invocation:
ota run test --mode container --lifecycle persistent
ota run test --mode container --ephemeralUse ota tasks --use to see the exact runnable task commands for the current contract:
ota tasks --useIn CI, the runner still owns the job. ota owns the repo contract and can provision declared
services such as Postgres through ota up, so the workflow stays thin and the service intent lives
with the repo instead of being duplicated in pipeline YAML.
If the runner is GitHub Actions and you want the official wrapper for step summaries, annotations,
pull-request comments, and receipt artifacts, use
ota-run/action and see
docs/spec/github-action-workflow.md.
If you need a repo-local summary renderer outside that wrapper, ota annotations --format markdown
emits a compact step-summary or PR-comment block from the same canonical doctor JSON, and
ota annotations --mode receipt-diff --format markdown does the same for
ota receipt --json --baseline ... compare output.
That is different from host provisioning. ota can provision declared services and run tasks in a container or remote backend, but it does not replace the OS package manager, language installer, or workstation bootstrap process.
name: ci
on:
push:
pull_request:
jobs:
ci:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- name: Install ota
run: curl -fsSL https://dist.ota.run/install.sh | sh
- name: Validate contract
run: ota validate
- name: Prepare repo
run: ota up
- name: Run lint
run: ota run lint
- name: Run tests
run: ota run testota treats detection as trust-sensitive.
ota detect --dry-runis the review pathota detect --contractis the exact detected starter text pathota detect --merge --dry-runis the review path for existing contracts- every inferred field includes provenance
- every inferred field includes confidence
- write mode uses only
highconfidence fields - write mode validates before writing
- write mode refuses to overwrite an existing
ota.yaml - merge write is additive only in the current implementation
- lower-confidence or conflicting changes stay review-only
This is intentional. The project prefers conservative correctness over aggressive generation.
ota is being built as open infrastructure, not as a vendor-specific workflow.
The long-term aim is:
- one canonical readiness contract per repo
- one canonical bootstrap contract per workspace
- deterministic behavior without LLM dependency in the core path
- human and agent symmetry
- interoperability with the existing tool ecosystem
V1 is complete and the release gate is green.
The current shipped foundation includes:
- contract validation
- task listing
- deterministic task execution
- readiness diagnosis
- onboarding via
up - detection with dry-run, conservative first write, and conservative additive merge
- separate workspace contract validation, diagnosis, and bootstrap
- generic git-based workspace acquisition for missing repos
- monorepo root/member loading for repo commands via
--member - fixture-backed coverage for Java detection, container-heavy, container-only, conflict-heavy Node, mixed Node/Python, legacy Python, and ugly/polyglot mixed-reality repo shapes
Current planning state:
- V1 archive: docs/planning/v1/phases.md
- V1 release gate: docs/planning/v1/release-gate.md
- V2 archive: docs/planning/v2/plan.md
- V2.1 archive: docs/planning/v2.1/plan.md
- V6 archive: docs/planning/v6/plan.md
- Active version: docs/planning/v7/plan.md
- Archived local UX hardening slice: docs/planning/v5-ux-hardening.md
- V5 mutation controls and caching: docs/spec/mutation-controls-and-caching.md
Enterprise work is planned as a layer around the open core, not as a different contract truth.
- the open core remains the public CLI, repo/workspace schemas, JSON output, and documentation
- enterprise value should come from hosted policy, audit, fleet coordination, private adapters, onboarding, and support
- the public contract should stay usable on its own and should not become a thin wrapper around a paid control plane
See docs/policy/support-and-enterprise.md for the current enterprise boundary and likely future commercial surfaces.
ota is maintainer-led. External code contributions are not currently accepted.
Use the GitHub issue templates for bug reports, feature requests, docs feedback, and real-repo reproductions.
Read:
- CONTRIBUTING.md for the current contribution workflow
- docs/policy/governance.md for project governance
- docs/policy/commercial-policy.md for the open-core and commercial boundary
- docs/policy/support-and-enterprise.md for support and enterprise direction
Repo-level support entry point: SUPPORT.md
- One-team rollout
- Worked example: existing repo
- Command reference
- GitHub Action workflow
- Contract reference
- Workflow model
- Workspace reference
- Shell semantics
- Service behavior
- JSON output reference
- Audit and provenance
- Policy packs
- Exit codes
- Docs clarity spec
- Security posture
- Performance budget
- Doctor quality bar
- UX review loop
- Adoption readiness gate
- Detect write gate
- V1 phases
- V1 release gate
- V2 plan
- V2.1 plan
- V3 plan
- V4 plan
- V5 plan
- V6 plan
- V7 plan
- V8 plan
- V9 plan
- V5 UX hardening completion slice
- Hosted validation workflow
- Fixture repo plan
- Roadmap
Choose by goal:
- first repo contract: Basic Node, Basic Python, Basic Rust
- existing app with services: Basic Services, Mixed Node + Python
- shared topology: Shared Local Topology, Shared Remote Topology
- multi-repo bootstrap: Basic Workspace, Acquisition Workspace
- realistic reference shape: Fullstack Node + Go, Full contract example, ota-run/examples
If you want the shortest “which example proves what?” guide, use Examples by Goal.
- Basic Node - Node / TypeScript starter
- Basic .NET - C# / .NET starter
- Basic Java - Maven starter
- Basic Python - Python starter
- Basic Go - Go module starter
- Basic Rust - Rustup-backed Cargo starter
- Basic Script - Script-only starter
- Mixed Node + Python - Polyglot app example
- Fullstack Node + Go - Frontend/backend split example
- Full contract example - Exhaustive contract reference
- ota-run/examples - advanced, production-adjacent examples and templates
- Basic Workspace - Multi-repo starter; compare
ota workspace detect --dry-runwithota workspace init --dry-run, then useota workspace up --dry-runbefore preparing the stack. - Acquisition Workspace - Workspace acquisition flow; compare
ota workspace detect --dry-runwithota workspace init --dry-run, then useota workspace up --dry-runandota workspace upto acquire and prepare repos.
