mirror of
https://github.com/openclaw/openclaw.git
synced 2026-05-06 12:00:44 +00:00
docs: clarify optional Docker sandboxing
This commit is contained in:
@@ -47,13 +47,15 @@ The Ansible playbook installs and configures:
|
||||
|
||||
1. **Tailscale** -- mesh VPN for secure remote access
|
||||
2. **UFW firewall** -- SSH + Tailscale ports only
|
||||
3. **Docker CE + Compose V2** -- for agent sandboxes
|
||||
3. **Docker CE + Compose V2** -- for the default agent sandbox backend
|
||||
4. **Node.js 24 + pnpm** -- runtime dependencies (Node 22 LTS, currently `22.14+`, remains supported)
|
||||
5. **OpenClaw** -- host-based, not containerized
|
||||
6. **Systemd service** -- auto-start with security hardening
|
||||
|
||||
<Note>
|
||||
The gateway runs directly on the host (not in Docker), but agent sandboxes use Docker for isolation. See [Sandboxing](/gateway/sandboxing) for details.
|
||||
The gateway runs directly on the host (not in Docker). Agent sandboxing is
|
||||
optional; this playbook installs Docker because it is the default sandbox
|
||||
backend. See [Sandboxing](/gateway/sandboxing) for details and other backends.
|
||||
</Note>
|
||||
|
||||
## Post-Install Setup
|
||||
|
||||
@@ -14,7 +14,7 @@ Docker is **optional**. Use it only if you want a containerized gateway or to va
|
||||
|
||||
- **Yes**: you want an isolated, throwaway gateway environment or to run OpenClaw on a host without local installs.
|
||||
- **No**: you are running on your own machine and just want the fastest dev loop. Use the normal install flow instead.
|
||||
- **Sandboxing note**: agent sandboxing uses Docker too, but it does **not** require the full gateway to run in Docker. See [Sandboxing](/gateway/sandboxing).
|
||||
- **Sandboxing note**: the default sandbox backend uses Docker when sandboxing is enabled, but sandboxing is off by default and does **not** require the full gateway to run in Docker. SSH and OpenShell sandbox backends are also available. See [Sandboxing](/gateway/sandboxing).
|
||||
|
||||
## Prerequisites
|
||||
|
||||
@@ -311,10 +311,11 @@ including binary baking, persistence, and updates.
|
||||
|
||||
## Agent Sandbox
|
||||
|
||||
When `agents.defaults.sandbox` is enabled, the gateway runs agent tool execution
|
||||
(shell, file read/write, etc.) inside isolated Docker containers while the
|
||||
gateway itself stays on the host. This gives you a hard wall around untrusted or
|
||||
multi-tenant agent sessions without containerizing the entire gateway.
|
||||
When `agents.defaults.sandbox` is enabled with the Docker backend, the gateway
|
||||
runs agent tool execution (shell, file read/write, etc.) inside isolated Docker
|
||||
containers while the gateway itself stays on the host. This gives you a hard wall
|
||||
around untrusted or multi-tenant agent sessions without containerizing the entire
|
||||
gateway.
|
||||
|
||||
Sandbox scope can be per-agent (default), per-session, or shared. Each scope
|
||||
gets its own workspace mounted at `/workspace`. You can also configure
|
||||
|
||||
Reference in New Issue
Block a user