- Device labels: lowercase, no whitespace, only a-z 0-9 - _ (enforced at config time) - Session IDs removed: device label is the sole identifier - Routes changed: /sessions/:id → /devices/:label - Removed commands: click, type, find-window, wait-for-window, label, old version, server-version - Renamed: status → version (compares relay/remote.py/client commits) - Unified screenshot: takes 'screen' or a window label as argument - Windows listed with human-readable labels (same format as device labels) - Single instance enforcement via PID lock file - Removed input.rs (click/type functionality) - All docs and code in English - Protocol: Hello.label is now required (String, not Option<String>) - Client auto-migrates invalid labels on startup
25 lines
909 B
PowerShell
25 lines
909 B
PowerShell
# Helios Remote - Install Script
|
|
# Downloads and starts the helios-remote Windows client.
|
|
#
|
|
# IMPORTANT: Windows Defender may block the executable.
|
|
# If the download or launch fails, disable real-time protection first (run as Admin):
|
|
# Set-MpPreference -DisableRealtimeMonitoring $true
|
|
# Re-enable after the client is running:
|
|
# Set-MpPreference -DisableRealtimeMonitoring $false
|
|
|
|
$ErrorActionPreference = "Stop"
|
|
|
|
$url = "https://agent-helios.me/downloads/helios-remote/helios-remote-client-windows.exe"
|
|
$dest = "$env:USERPROFILE\Desktop\Helios Remote.exe"
|
|
|
|
Write-Host "Downloading helios-remote client..."
|
|
|
|
if (Get-Command curl.exe -ErrorAction SilentlyContinue) {
|
|
curl.exe -L -o $dest $url
|
|
} else {
|
|
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
|
|
(New-Object Net.WebClient).DownloadFile($url, $dest)
|
|
}
|
|
|
|
Write-Host "Starting..."
|
|
Start-Process -FilePath $dest
|