craftclose-vision
v0.2.0
Published
AI-powered Minecraft server operations — monitoring, crash diagnosis, backups, incidents, plugins, config optimization
Maintainers
Readme
CraftClose
AI-powered Minecraft server operations — monitoring, crash diagnosis, health tracking, backups, incidents, plugin management, config optimization, and audit trails.
Editions
Two products, one codebase:
| Feature | CraftClose Skill (Free) | CraftClose Platform ($20/mo) | |---|---|---| | Health Monitoring | ✅ | ✅ | | Crash Diagnosis | ✅ | ✅ | | Backup & Restore | ✅ | ✅ | | Incident Detection | ✅ | ✅ | | Plugin Scanning | ✅ | ✅ | | Config Review | ✅ | ✅ | | AI Analysis (BYOK) | ✅ | ✅ | | Audit Trail | ✅ | ✅ | | Maintenance Windows | ✅ | ✅ | | Alerts (Telegram/Discord) | ✅ | ✅ | | Web Console | ❌ | ✅ | | SSO (Google/GitHub/OIDC) | ❌ | ✅ | | RBAC + Approvals | ❌ | ✅ | | PostgreSQL | ❌ | ✅ | | Fleet Management | ❌ | ✅ | | Docker Production Stack | ❌ | ✅ |
Quick Start — Skill Edition (Free)
npm install -g craftclose
craftclose setup
craftclose monitorOr with Docker:
docker run -v ./data:/data ghcr.io/launchday-studio-inc/craftclose-vision-skill:latestQuick Start — Platform Edition
# Production stack with PostgreSQL
docker compose up -dOr:
npm install -g craftclose-platform
craftclose init
craftclosedOpen http://localhost:7600 and log in with the admin credentials you set during init.
Commands (Skill Edition)
craftclose setup Interactive first-run configuration
craftclose status [server] Check server health
craftclose monitor Start continuous monitoring
craftclose test Test connectivity
craftclose health <server> Detailed health with threshold indicators
craftclose health history <server> Health trend (last 24h)
craftclose incidents [server] List open incidents
craftclose incidents ack <id> Acknowledge incident
craftclose backup <server> Trigger backup
craftclose backup list <server> List backups
craftclose restore <server> <id> Restore from backup (with confirmation)
craftclose maintenance create <server> Create maintenance window
craftclose maintenance list List maintenance windows
craftclose maintenance cancel <id> Cancel maintenance window
craftclose analyze <logfile> AI crash analysis
craftclose optimize <server> AI config optimization
craftclose plugins scan <server> Plugin conflict scan
craftclose plugins updates <server> Check for plugin updates
craftclose audit [server] Show audit log
craftclose doctor Self-diagnostic
craftclose version Version info
craftclose --help HelpConfiguration
Copy craftclose.example.yml to craftclose.yml and edit:
servers:
my-server:
name: "My Minecraft Server"
connectors:
rcon:
host: "127.0.0.1"
port: 25575
password: "changeme"
thresholds:
tps_warning: 15
tps_critical: 10
ai:
enabled: true
provider: gemini
api_key_env: GEMINI_API_KEY
alerts:
telegram:
enabled: true
bot_token_env: TELEGRAM_BOT_TOKEN
chat_id: "-1001234567890"
discord:
enabled: true
webhook_url_env: DISCORD_WEBHOOK_URLAll secrets use the _env suffix pattern — they reference environment variable names, never stored in the config file.
See craftclose.example.yml for the full configuration reference.
Architecture
CraftClose shares core modules between both editions:
src/core/— Shared modules: connectors, AI, health, incidents, patterns, backups, maintenance, actions, audit, plugins, config analysis, historyskill/— Skill edition: CLI entry point, OpenClaw skill entry, config loader, alerts, SQLitesrc/daemon/— Platform only: HTTP server, middleware, WebSocketsrc/api/— Platform only: REST API routessrc/auth/— Platform only: RBAC, SSO, JWTweb/— Platform only: React web console
Security
CraftClose enforces strict security invariants across both editions:
- No raw shell execution — typed actions only
- No raw RCON passthrough — all commands go through typed adapters
- All secrets via environment variables (
_envsuffix), never stored in config files - Connector worker sandboxing with allowlists and path jails
- Append-only, tamper-evident audit trail
- Platform adds: RBAC, SSO, approval workflows, encrypted credentials
See docs/security-spec.md for the full threat model.
Development
git clone https://github.com/LaunchDay-Studio-Inc/craftclose-vision.git
cd craftclose-vision
npm ci
npm run build
npm testBuilding
# Build platform (default)
npm run build
# Build skill edition
npm run build:skillRunning Tests
# All tests
npm test
# Skill tests only
npm run test:skill
# PostgreSQL tests (requires DATABASE_URL)
DATABASE_URL=postgresql://user:pass@localhost:5432/craftclose_test npm testDocumentation
| Document | Description | |----------|-------------| | Vision | Product definition, core thesis, capability set | | Editions Overview | Platform vs. Skill edition comparison | | Platform Architecture | Components, data plane, request lifecycle | | Security Spec | Threat model, invariants, identity baseline | | Deployment Model | Install paths: macOS, Linux, OCI, air-gapped |
License
- CraftClose Skill: MIT — see LICENSE-SKILL
- CraftClose Platform: BSL 1.1 — see LICENSE
Built by LaunchDay Studio
