Migration Guide: v6 → v7
Complete migration guide covering all features introduced in v6 and v7, including customizable auth, variant-specific configuration, remote CLIProxy support, new OAuth providers, and token refresh improvements.Version Overview
| Version | Release | Key Features |
|---|---|---|
| v7.2 | 2026-01 | Kiro OAuth support, GHCP Device Code flow |
| v7.1 | 2025-12 | Remote CLIProxy support, proactive token refresh |
| v6 | 2025-11 | Customizable auth tokens, variant-specific auth, port isolation |
| v5 | 2025-10 | Remote proxy configuration (deprecated in v7.1) |
Breaking Changes Summary
v7.2 Breaking Changes
None - Fully backward compatible with v7.1v7.1 Breaking Changes
None - Fully backward compatible with v6v6 Breaking Changes
Config Schema:config.json→config.yaml(automatic migration)- New required field:
version: 6 cliproxy.authstructure changed (automatic migration)
--proxy-serverdeprecated → use--proxy-host--proxy-authdeprecated → use--proxy-auth-token
Migration Checklist
New Features in v7.2
1. Kiro OAuth Support (HIGH PRIORITY)
What’s New:- Full OAuth support for Kiro provider (AWS Bedrock Claude)
- Browser-based authentication flow
- Token import from Kiro IDE
- Fresh Setup
- Import from IDE
- Incognito Mode
| Flag | Purpose |
|---|---|
--auth | Authenticate via browser OAuth |
--import | Import token from Kiro IDE |
--no-incognito | Use normal browser mode (saves session) |
--use <account> | Switch Kiro account |
--accounts | List all Kiro accounts |
- Access AWS Bedrock Claude via Kiro
- Use Claude via AWS SSO with MFA
- Persistent AWS session (no re-auth)
2. GHCP Device Code Flow (HIGH PRIORITY)
What’s New:- GitHub Copilot (GHCP) provider now uses Device Code flow
- No headless browser required
- Better support for SSH/remote environments
- Works in SSH sessions
- No browser automation
- More reliable auth flow
- Better UX for remote development
New Features in v7.1
3. Remote CLIProxy Support (HIGH PRIORITY)
What’s New:- Connect to remote CLIProxyAPI server
- Share proxy across multiple machines
- Fallback to local proxy if remote unreachable
CLI Flags:
| Flag | Purpose | Priority |
|---|---|---|
--proxy-host <host> | Remote proxy hostname | HIGH |
--proxy-port <port> | Remote proxy port | HIGH |
--proxy-auth-token <token> | Remote auth token | HIGH |
--proxy-protocol <http|https> | Protocol (default: http) | MEDIUM |
--local-proxy | Force local mode | MEDIUM |
--remote-only | Fail if remote unreachable | MEDIUM |
--proxy-timeout <ms> | Health check timeout | LOW |
--allow-self-signed | Accept self-signed certs | LOW |
- Centralized proxy for teams
- Share OAuth credentials across machines
- Reduce per-machine setup
- Better security (credentials on server only)
- Use HTTPS for production
- Separate
management_keyfor admin endpoints - Rotate tokens regularly
- Use firewall rules for access control
4. Proactive Token Refresh (HIGH PRIORITY)
What’s New:- Automatic token refresh 5 minutes before expiration
- Prevents mid-session auth failures
- Supports Gemini, Codex, Antigravity, Qwen, iFlow
Configuration:
- No mid-session auth failures
- Better user experience
- Reduced support tickets
New Features in v6
5. Customizable Management Key (HIGH PRIORITY)
What’s New:- Separate
management_keyfromapi_key - Enhanced security for admin endpoints
- Per-variant auth override
- Separate API vs admin credentials
- Different auth per environment (dev/prod)
- Enhanced security for production
6. Variant-Specific Auth (HIGH PRIORITY)
What’s New:- Per-variant auth override
- Different credentials per variant
- Isolate dev/prod environments
- Global Auth
# Before v6 - Single auth for all variants cliproxy: auth:
- Separate dev/prod credentials
- Per-team auth keys
- Testing with different API keys
- Security isolation
7. Port Isolation for Variants (MEDIUM PRIORITY)
What’s New:- Assign unique ports to variants (8318-8417)
- Run multiple variants concurrently
- Avoid port conflicts
- 8317: Default local proxy (reserved)
- 8318-8417: Available for variants (100 ports)
- Run dev and prod simultaneously
- Multi-user environments
- Isolated testing
Configuration Priority Resolution
CCS resolves configuration values in this priority order:Multi-Account OAuth Workflow
New in v6+: Multi-account support for all OAuth providersAdd First Account
| Flag | Purpose |
|---|---|
--accounts | List all accounts |
--use <account> | Switch default account |
--auth | Authenticate (current account) |
--auth --add | Add new account |
--nickname <name> | Rename current account |
--logout | Clear tokens for current account |
Troubleshooting Migration Issues
Issue: Migration Failed
- Symptom
- Solution
Issue: Remote Proxy Connection Failed
- Symptom
- Solution
Issue: Token Refresh Failed
- Symptom
- Solution
Issue: Port Conflict
- Symptom
- Solution
Rollback Guide
If migration fails, rollback to previous version:Feature Adoption Roadmap
Recommended adoption order for v6/v7 features:Week 1: Core Migration
- Update to v7.2 - Verify automatic migration - Test existing profiles - Run
ccs doctor --fix
Week 2: New Providers
- Set up Kiro OAuth - Migrate GHCP to Device Code flow - Test multi-account workflows
Week 3: Remote Proxy
- Deploy remote CLIProxy (if team) - Configure fallback - Test connection stability
Week 4: Advanced Features
- Implement port isolation - Configure variant-specific auth - Set up monitoring/analytics
Environment Variables Reference
New environment variables in v6/v7:| Variable | Version | Purpose | Priority |
|---|---|---|---|
CCS_PROXY_HOST | v7.1 | Remote proxy hostname | HIGH |
CCS_PROXY_PORT | v7.1 | Remote proxy port | HIGH |
CCS_PROXY_AUTH_TOKEN | v7.1 | Remote proxy auth token | HIGH |
CCS_PROXY_PROTOCOL | v7.1 | Remote proxy protocol (http/https) | MEDIUM |
CCS_PROXY_FALLBACK_ENABLED | v7.1 | Fallback to local proxy | MEDIUM |
CCS_PROXY_TIMEOUT | v7.1 | Remote health check timeout | LOW |
CCS_ALLOW_SELF_SIGNED | v7.1 | Accept self-signed certs | LOW |
CCS_UNIFIED_CONFIG | v6 | Enable unified config mode | MEDIUM |
CCS_MIGRATE | v6 | Trigger auto-migration | MEDIUM |
CCS_DEBUG | All | Verbose logging | HIGH |
API Endpoints (New in v7)
Dashboard API endpoints for remote proxy management:CLIProxy Control
| Endpoint | Method | Purpose |
|---|---|---|
/api/cliproxy/proxy-status | GET | Get proxy status |
/api/cliproxy/proxy-start | POST | Start proxy |
/api/cliproxy/proxy-stop | POST | Stop proxy |
/api/cliproxy/update-check | GET | Check for updates |
/api/cliproxy/models | GET | List available models |
/api/cliproxy/error-logs | GET | Get error logs |
Usage Analytics
| Endpoint | Method | Purpose |
|---|---|---|
/api/usage/summary | GET | Usage summary |
/api/usage/daily | GET | Daily breakdown |
/api/usage/hourly | GET | Hourly breakdown |
/api/usage/models | GET | Model distribution |
/api/usage/insights | GET | AI insights |
Next Steps
Configuration Schema
Complete config.yaml v6 reference
File Locations
Where CCS stores data
CLI Flags
All CLI flags and options
Troubleshooting
Common issues and solutions
