The citadel CLI is the on-premise agent and administrator's toolkit for the AceTeam Sovereign Compute Fabric. It allows you to securely connect your own hardware to your AceTeam account, making your resources available to your private workflows.
Full documentation is available at aceteam-ai.github.io/citadel-cli -- including architecture guides, tutorials, command reference, and development docs.
- AceTeam: The cloud-based control plane where you design and manage workflows.
- Citadel: The on-premise agent you run on your own hardware (the "node").
- Nexus: The secure coordination server (e.g.,
nexus.aceteam.ai) that manages the network. citadel.yaml: The manifest file that declares a node's identity and the services it provides. This file is automatically generated by theinitcommand.
curl -fsSL https://get.aceteam.ai/citadel.sh | bashThis installs to ~/.local/bin and automatically configures your PATH. For system-wide install, use sudo bash instead.
brew tap aceteam-ai/tap
brew install citadelOr as a one-liner:
brew install aceteam-ai/tap/citadelIf you have Go 1.21+ installed:
go install github.com/aceteam-ai/citadel-cli/cmd/citadel@latestThis installs the citadel binary to your $GOPATH/bin or $GOBIN.
-
Go to the Releases Page.
-
Download the latest
.tar.gzarchive for your architecture (e.g.,citadel_vX.Y.Z_linux_amd64.tar.gz). -
Extract the archive and place the
citadelbinary in yourPATH.tar -xvf citadel_vX.Y.Z_linux_amd64.tar.gz mv citadel ~/.local/bin/ # User-local (no sudo) # or: sudo mv citadel /usr/local/bin/ # System-wide
-
(Optional) Install the man page for
man citadelsupport:# User-local mkdir -p ~/.local/share/man/man1 mv citadel.1 ~/.local/share/man/man1/ # System-wide (requires sudo) sudo mv citadel.1 /usr/local/share/man/man1/
Homebrew installations include the man page automatically.
Option 1: One-Line Installer (Recommended)
Open PowerShell and run:
iwr -useb https://raw.githubusercontent.com/aceteam-ai/citadel-cli/main/install.ps1 | iexThis will automatically download, install, and add Citadel to your PATH.
Option 2: Windows Package Manager (winget)
Once published to winget (coming soon):
winget install AceTeam.CitadelOption 3: Manual Installation
-
Go to the Releases Page.
-
Download the latest
.ziparchive for Windows (e.g.,citadel_vX.Y.Z_windows_amd64.zip). -
Extract the archive and place
citadel.exein yourPATH.# Extract the zip file Expand-Archive citadel_vX.Y.Z_windows_amd64.zip -DestinationPath C:\Tools\citadel # Add to PATH (PowerShell as Administrator) $env:Path += ";C:\Tools\citadel" [Environment]::SetEnvironmentVariable("Path", $env:Path, [System.EnvironmentVariableTarget]::Machine)
If you need to build from the latest source code:
# This will create binaries for your platform in the ./build directory
./build.sh
# Build for all platforms (requires cross-compilation tools)
./build.sh --allQuick Setup (Automated):
# One-command setup: installs Go/Git, clones repo, builds, tests
iwr -useb https://raw.githubusercontent.com/aceteam-ai/citadel-cli/main/setup-dev-windows.ps1 | iexSee WINDOWS_QUICKSTART.md for a 5-minute getting started guide.
Manual Build:
# Build for Windows (native PowerShell)
.\build.ps1
# Build for all platforms (requires tar for cross-platform packages)
.\build.ps1 -All
# Quick development build
go build -o citadel.exe ./cmd/citadelSee WINDOWS_DEVELOPMENT.md for detailed Windows development setup instructions.
Citadel includes built-in auto-update detection. When running citadel work, it checks for updates once per day and notifies you if a new version is available.
| Installation Method | Update Command |
|---|---|
| One-line installer | citadel update install |
| Homebrew | brew upgrade citadel |
| Go install | go install github.com/aceteam-ai/citadel-cli/cmd/citadel@latest |
| Manual download | Download new release from GitHub |
# Check for updates
citadel update check
# Download and install the latest version
citadel update install
# Show update status and versions
citadel update status
# Restore previous version if update fails
citadel update rollback
# Enable/disable auto-update checks
citadel update enable
citadel update disableThe built-in updater:
- Downloads from GitHub releases
- Verifies SHA256 checksum before installing
- Backs up the current version for rollback
- Validates the new binary before completing
- Auto-rolls back if the new binary fails to start
Always use release.sh to create releases. Do not manually create tags or GitHub releases.
# Interactive mode - prompts for version
./release.sh
# Non-interactive mode - specify version
./release.sh -v v1.2.0 -y
# Dry run to preview what will happen
./release.sh --dry-run -v v1.2.0The script will:
-
Validate Environment
- Check for uncommitted changes (working directory must be clean)
- Verify GitHub CLI (
gh) is installed - Validate version format (must be
vX.Y.ZorvX.Y.Z-rc1)
-
Create and Push Tag
- Create a git tag with the specified version
- Push the tag to the remote repository
-
Build Artifacts
- Run
build.shto create binaries for all platforms (linux/darwin/windows, amd64/arm64) - Generate SHA256 checksums
- Run
-
Create GitHub Release
- Generate release notes from commits since the last tag
- Upload binaries and checksums to GitHub Releases
- Display the release URL
-
Update Homebrew Tap
- Automatically updates the
aceteam-ai/homebrew-tapformula - Commits new version and SHA256 checksums
- Automatically updates the
Follow semantic versioning (semver):
- Major version (
v2.0.0): Breaking changes - Minor version (
v1.1.0): New features, backwards compatible - Patch version (
v1.0.1): Bug fixes, backwards compatible - Pre-release (
v1.1.0-rc1): Release candidates for testing
Note: Manual releases will NOT update the Homebrew tap. Always prefer
release.sh.
If you absolutely must release manually:
# 1. Create and push tag
git tag -a v1.2.0 -m "v1.2.0"
git push origin v1.2.0
# 2. Build artifacts for all platforms
./build.sh --all
# 3. Create GitHub release
gh release create v1.2.0 \
--title "v1.2.0" \
--notes "Release notes here" \
release/citadel_v1.2.0_*.tar.gz \
release/citadel_v1.2.0_*.zip \
release/checksums.txt
# 4. Manually update Homebrew tap (aceteam-ai/homebrew-tap)| Command | Description |
|---|---|
citadel |
(Recommended) Launch the interactive control center. Handles login, network, services, and job processing in one place. |
| Command | Description |
|---|---|
citadel init |
Join the AceTeam Network (no sudo required). Use --provision for full system provisioning (requires sudo). |
citadel init --authkey <key> --service <name> --node-name <name> --test |
The non-interactive version of init, perfect for automation. Allows you to specify the service (vllm, ollama, llamacpp, none), set the node name, and run a diagnostic test upon completion. |
citadel work |
(Primary command) Starts services from manifest AND runs the job worker (Redis Streams). Includes auto-update checks. |
citadel run [service] |
Starts services only. With no arguments, starts all manifest services. With a service name, adds it to the manifest and starts it. |
citadel stop [service] |
Stops services. With no arguments, stops all manifest services. With a service name, stops that specific service. |
citadel login |
Connects the machine to the network. Interactive prompts by default, or use --authkey <key> for non-interactive automation. |
| Command | Description |
|---|---|
citadel status |
Provides a comprehensive health check dashboard, showing the CLI version, system vitals (CPU, RAM, Disk), GPU status, network, and services. |
citadel test --service <name> |
Runs a diagnostic test for a specific service to verify its functionality. |
citadel logs <service-name> |
Streams the logs for a specific service defined in citadel.yaml. Supports -f to follow the log output. |
citadel nodes |
Connects to the Nexus API and lists all nodes in your compute fabric. |
citadel run --restart |
Restarts all services defined in citadel.yaml. |
citadel version |
Prints the current version of the CLI. |
citadel update check |
Check for available updates. |
citadel update install |
Download and install the latest version. |
citadel update rollback |
Restore the previous version if an update fails. |
citadel terminal-server |
Starts a WebSocket terminal server for remote browser-based terminal access. |
The Citadel Terminal Service provides WebSocket-based terminal access to nodes, enabling browser-based terminal sessions through the AceTeam web application.
# Start the terminal server (requires org-id)
citadel terminal-server --org-id my-org-id
# Start on a custom port with 1-hour idle timeout
citadel terminal-server --org-id my-org-id --port 8080 --idle-timeout 60| Flag | Description | Default |
|---|---|---|
--org-id |
Organization ID for token validation (required) | - |
--port |
WebSocket server port | 7860 |
--idle-timeout |
Session idle timeout in minutes | 30 |
--shell |
Shell to use for sessions | Platform default |
--max-connections |
Maximum concurrent sessions | 10 |
For detailed documentation, see docs/terminal-service.md.
Citadel nodes expose HTTP endpoints for health monitoring. Since ICMP ping doesn't work with userspace networking, use HTTP health checks instead.
# Lightweight ping check (minimal overhead)
curl http://<node-ip>:8080/ping
# Returns: {"status":"pong","timestamp":"2024-01-15T10:30:00Z"}
# Full health status
curl http://<node-ip>:8080/health
# Returns: {"status":"ok","version":"1.3.0"}
# Complete node status (system metrics, GPU, services)
curl http://<node-ip>:8080/statusThe status server runs when using citadel work --status-port=8080.
This workflow shows how to take a fresh server and turn it into a fully operational Citadel node.
# Launch the interactive control center
./citadelThat's it! The control center handles login, network connection, service startup, and job processing -- all interactively.
For fresh servers that need Docker and dependencies installed:
# Interactive setup with full provisioning
sudo ./citadel init --provision
# Then start the worker
./citadel workFor scripted deployments, provide all options as flags:
# Provision and configure in one command
sudo ./citadel init --provision \
--authkey tskey-auth-k1A2b3C4d5E6f... \
--service vllm \
--node-name gpu-node-01
# Start the node
./citadel work --status-port=8080Check the node's health at any time:
./citadel statusYou should see π’ ONLINE for the network connection and π’ RUNNING for your configured service.
A remote E2E test script validates the full first-time user experience on a Windows machine via WinRM (clean β install β init β verify).
# Prerequisites: pip install pywinrm (or use a venv)
# WinRM must be enabled on the target Windows machine
# Full test (all phases)
PYTHON=~/.venvs/winrm/bin/python3 ./scripts/windows-e2e-test.sh \
--host 192.168.2.207 --user acewin --password 'P@ssword' \
--authkey tskey-auth-xxx
# Dry run (show commands without executing)
./scripts/windows-e2e-test.sh --dry-run --host 192.168.2.207 ...
# Run a single phase: clean, install, provision, or verify
./scripts/windows-e2e-test.sh verify --host 192.168.2.207 ...See scripts/windows-e2e-test.sh for all options and WinRM setup instructions.
The init command generates this file for you. It defines the node's identity and the service it runs.
Example citadel.yaml (generated for a vLLM node):
node:
name: gpu-node-01
tags:
- gpu
- provisioned-by-citadel
services:
- name: vllm
compose_file: ./services/vllm.yml