9.2 KiB
summary, read_when, title
| summary | read_when | title | |||
|---|---|---|---|---|---|
| Where OpenClaw loads environment variables and the precedence order |
|
Environment variables |
OpenClaw pulls environment variables from multiple sources. The rule is never override existing values.
Precedence (highest → lowest)
- Process environment (what the Gateway process already has from the parent shell/daemon).
.envin the current working directory (dotenv default; does not override).- Global
.envat~/.openclaw/.env(aka$OPENCLAW_STATE_DIR/.env; does not override). - Config
envblock in~/.openclaw/openclaw.json(applied only if missing). - Optional login-shell import (
env.shellEnv.enabledorOPENCLAW_LOAD_SHELL_ENV=1), applied only for missing expected keys.
On Ubuntu fresh installs that use the default state dir, OpenClaw also treats ~/.config/openclaw/gateway.env as a compatibility fallback after the global .env. If both files exist and disagree, OpenClaw keeps ~/.openclaw/.env and prints a warning.
If the config file is missing entirely, step 4 is skipped; shell import still runs if enabled.
Config env block
Two equivalent ways to set inline env vars (both are non-overriding):
{
env: {
OPENROUTER_API_KEY: "sk-or-...",
vars: {
GROQ_API_KEY: "gsk-...",
},
},
}
The config env block accepts literal string values only. It does not expand
file:... values; for example, XAI_API_KEY: "file:secrets/xai-api-key.txt"
is passed to providers as that exact string.
For file-backed provider keys, use a SecretRef on the credential field that supports it:
{
secrets: {
providers: {
xai_key_file: {
source: "file",
path: "~/.openclaw/secrets/xai-api-key.txt",
mode: "singleValue",
},
},
},
models: {
providers: {
xai: {
apiKey: { source: "file", provider: "xai_key_file", id: "value" },
},
},
},
}
See Secrets Management and the SecretRef credential surface for supported fields.
Shell env import
env.shellEnv runs your login shell and imports only missing expected keys:
{
env: {
shellEnv: {
enabled: true,
timeoutMs: 15000,
},
},
}
Env var equivalents:
OPENCLAW_LOAD_SHELL_ENV=1OPENCLAW_SHELL_ENV_TIMEOUT_MS=15000
Runtime-injected env vars
OpenClaw also injects context markers into spawned child processes:
OPENCLAW_SHELL=exec: set for commands run through theexectool.OPENCLAW_SHELL=acp: set for ACP runtime backend process spawns (for exampleacpx).OPENCLAW_SHELL=acp-client: set foropenclaw acp clientwhen it spawns the ACP bridge process.OPENCLAW_SHELL=tui-local: set for local TUI!shell commands.
These are runtime markers (not required user config). They can be used in shell/profile logic to apply context-specific rules.
UI env vars
OPENCLAW_THEME=light: force the light TUI palette when your terminal has a light background.OPENCLAW_THEME=dark: force the dark TUI palette.COLORFGBG: if your terminal exports it, OpenClaw uses the background color hint to auto-pick the TUI palette.
Env var substitution in config
You can reference env vars directly in config string values using ${VAR_NAME} syntax:
{
models: {
providers: {
"vercel-gateway": {
apiKey: "${VERCEL_GATEWAY_API_KEY}",
},
},
},
}
See Configuration: Env var substitution for full details.
Secret refs vs ${ENV} strings
OpenClaw supports two env-driven patterns:
${VAR}string substitution in config values.- SecretRef objects (
{ source: "env", provider: "default", id: "VAR" }) for fields that support secrets references.
Both resolve from process env at activation time. SecretRef details are documented in Secrets Management.
The config env block itself does not resolve SecretRefs or file:...
shorthand values.
Path-related env vars
| Variable | Purpose |
|---|---|
OPENCLAW_HOME |
Override the home directory used for all internal path resolution (~/.openclaw/, agent dirs, sessions, credentials). Useful when running OpenClaw as a dedicated service user. |
OPENCLAW_STATE_DIR |
Override the state directory (default ~/.openclaw). |
OPENCLAW_CONFIG_PATH |
Override the config file path (default ~/.openclaw/openclaw.json). |
OPENCLAW_INCLUDE_ROOTS |
Path-list of directories where $include directives may resolve files outside the config directory (default: none — $include is confined to the config dir). Tilde-expanded. |
Logging
| Variable | Purpose |
|---|---|
OPENCLAW_LOG_LEVEL |
Override log level for both file and console (e.g. debug, trace). Takes precedence over logging.level and logging.consoleLevel in config. Invalid values are ignored with a warning. |
OPENCLAW_DEBUG_MODEL_TRANSPORT |
Emit targeted model request/response timing diagnostics at info level without enabling global debug logs. |
OPENCLAW_DEBUG_MODEL_PAYLOAD |
Model payload diagnostics: summary, tools, or full-redacted. full-redacted is capped and redacted but may include prompt/message text. |
OPENCLAW_DEBUG_SSE |
Streaming diagnostics: events for first/done timing, peek to include the first five redacted SSE events. |
OPENCLAW_DEBUG_CODE_MODE |
Code-mode model-surface diagnostics, including provider-tool hiding and exec/wait-only enforcement. |
OPENCLAW_HOME
When set, OPENCLAW_HOME replaces the system home directory ($HOME / os.homedir()) for all internal path resolution. This enables full filesystem isolation for headless service accounts.
Precedence: OPENCLAW_HOME > $HOME > USERPROFILE > os.homedir()
Example (macOS LaunchDaemon):
<key>EnvironmentVariables</key>
<dict>
<key>OPENCLAW_HOME</key>
<string>/Users/user</string>
</dict>
OPENCLAW_HOME can also be set to a tilde path (e.g. ~/svc), which gets expanded using $HOME before use.
nvm users: web_fetch TLS failures
If Node.js was installed via nvm (not the system package manager), the built-in fetch() uses
nvm's bundled CA store, which may be missing modern root CAs (ISRG Root X1/X2 for Let's Encrypt,
DigiCert Global Root G2, etc.). This causes web_fetch to fail with "fetch failed" on most HTTPS sites.
On Linux, OpenClaw automatically detects nvm and applies the fix in the actual startup environment:
openclaw gateway installwritesNODE_EXTRA_CA_CERTSinto the systemd service environment- the
openclawCLI entrypoint re-execs itself withNODE_EXTRA_CA_CERTSset before Node startup
Manual fix (for older versions or direct node ... launches):
Export the variable before starting OpenClaw:
export NODE_EXTRA_CA_CERTS=/etc/ssl/certs/ca-certificates.crt
openclaw gateway run
Do not rely on writing only to ~/.openclaw/.env for this variable; Node reads
NODE_EXTRA_CA_CERTS at process startup.
Legacy environment variables
OpenClaw only reads OPENCLAW_* environment variables. The legacy
CLAWDBOT_* and MOLTBOT_* prefixes from earlier releases are silently
ignored.
If any are still set on the Gateway process at startup, OpenClaw emits a
single Node deprecation warning (OPENCLAW_LEGACY_ENV_VARS) listing the
detected prefixes and the total count. Rename each value by replacing the
legacy prefix with OPENCLAW_ (for example CLAWDBOT_GATEWAY_TOKEN →
OPENCLAW_GATEWAY_TOKEN); the old names take no effect.