Tested on Ubuntu 18.04.
You will want to allow non-root users to capture packets. These users must be part of the wireshark group.
$ sudo apt update
| #!/bin/bash | |
| export WANDB_API_KEY=<your key> | |
| export WANDB_PROJECT=<org/project> | |
| litellm --port 4000 --debug --config cc-proxy.yaml |
| { | |
| "transformers": [ | |
| { | |
| "path": "$HOME/.claude-code-router/plugins/rovo-cli.js", | |
| "options": { | |
| "email": "ROVO_DEV_EMAIL", | |
| "api_token": "ROVO_DEV_API_TOKEN" | |
| } | |
| } | |
| ], |
| class ChutesGLMTransformer { | |
| constructor(options = {}) { | |
| this.name = "chutes-glm"; | |
| this.endPoint = "/v1/chat/completions"; | |
| this.enable = options.enable ?? true; | |
| } | |
| async auth(request, provider) { | |
| return { | |
| body: request, |
This guide documents how to use Factory's Droid CLI with your Claude Code Max subscription (OAuth authentication) instead of pay-per-token API keys. The solution leverages CLIProxyAPI as a transparent authentication proxy that converts API key requests from Factory CLI into OAuth-authenticated requests for Anthropic's API.
Factory CLI → [Anthropic Format + API Key] → CLIProxyAPI → [Anthropic Format + OAuth] → Anthropic API
↓
(Auth Header Swap)