mirror of
https://github.com/openclaw/openclaw.git
synced 2026-05-20 20:14:47 +00:00
* refactor: remove stale file-backed shims * fix: harden sqlite state ci boundaries * refactor: store matrix idb snapshots in sqlite * fix: satisfy rebased CI guardrails * refactor: store current conversation bindings in sqlite table * refactor: store tui last sessions in sqlite table * refactor: reset sqlite schema history * refactor: drop unshipped sqlite table migration * refactor: remove plugin index file rollback * refactor: drop unshipped sqlite sidecar migrations * refactor: remove runtime commitments kv migration * refactor: preserve kysely sync result types * refactor: drop unshipped sqlite schema migration table * test: keep session usage coverage sqlite-backed * refactor: keep sqlite migration doctor-only * refactor: isolate device legacy imports * refactor: isolate push voicewake legacy imports * refactor: isolate remaining runtime legacy imports * refactor: tighten sqlite migration guardrails * test: cover sqlite persisted enum parsing * refactor: isolate legacy update and tui imports * refactor: tighten sqlite state ownership * refactor: move legacy imports behind doctor * refactor: remove legacy session row lookup * refactor: canonicalize memory transcript locators * refactor: drop transcript path scope fallbacks * refactor: drop runtime legacy session delivery pruning * refactor: store tts prefs only in sqlite * refactor: remove cron store path runtime * refactor: use cron sqlite store keys * refactor: rename telegram message cache scope * refactor: read memory dreaming status from sqlite * refactor: rename cron status store key * refactor: stop remembering transcript file paths * test: use sqlite locators in agent fixtures * refactor: remove file-shaped commitments and cron store surfaces * refactor: keep compaction transcript handles out of session rows * refactor: derive transcript handles from session identity * refactor: derive runtime transcript handles * refactor: remove gateway session locator reads * refactor: remove transcript locator from session rows * refactor: store raw stream diagnostics in sqlite * refactor: remove file-shaped transcript rotation * refactor: hide legacy trajectory paths from runtime * refactor: remove runtime transcript file bridges * refactor: repair database-first rebase fallout * refactor: align tests with database-first state * refactor: remove transcript file handoffs * refactor: sync post-compaction memory by transcript scope * refactor: run codex app-server sessions by id * refactor: bind codex runtime state by session id * refactor: pass memory transcripts by sqlite scope * refactor: remove transcript locator cleanup leftovers * test: remove stale transcript file fixtures * refactor: remove transcript locator test helper * test: make cron sqlite keys explicit * test: remove cron runtime store paths * test: remove stale session file fixtures * test: use sqlite cron keys in diagnostics * refactor: remove runtime delivery queue backfill * test: drop fake export session file mocks * refactor: rename acp session read failure flag * refactor: rename acp row session key * refactor: remove session store test seams * refactor: move legacy session parser tests to doctor * refactor: reindex managed memory in place * refactor: drop stale session store wording * refactor: rename session row helpers * refactor: rename sqlite session entry modules * refactor: remove transcript locator leftovers * refactor: trim file-era audit wording * refactor: clean managed media through sqlite * fix: prefer explicit agent for exports * fix: use prepared agent for session resets * fix: canonicalize legacy codex binding import * test: rename state cleanup helper * docs: align backup docs with sqlite state * refactor: drop legacy Pi usage auth fallback * refactor: move legacy auth profile imports to doctor * refactor: keep Pi model discovery auth in memory * refactor: remove MSTeams legacy learning key fallback * refactor: store model catalog config in sqlite * refactor: use sqlite model catalog at runtime * refactor: remove model json compatibility aliases * refactor: store auth profiles in sqlite * refactor: seed copied auth profiles in sqlite * refactor: make auth profile runtime sqlite-addressed * refactor: migrate hermes secrets into sqlite auth store * refactor: move plugin install config migration to doctor * refactor: rename plugin index audit checks * test: drop auth file assumptions * test: remove legacy transcript file assertions * refactor: drop legacy cli session aliases * refactor: store skill uploads in sqlite * refactor: keep subagent attachments in sqlite vfs * refactor: drop subagent attachment cleanup state * refactor: move legacy session aliases to doctor * refactor: require node 24 for sqlite state runtime * refactor: move provider caches into sqlite state * fix: harden virtual agent filesystem * refactor: enforce database-first runtime state * refactor: rename compaction transcript rotation setting * test: clean sqlite refactor test types * refactor: consolidate sqlite runtime state * refactor: model session conversations in sqlite * refactor: stop deriving cron delivery from session keys * refactor: stop classifying sessions from key shape * refactor: hydrate announce targets from typed delivery * refactor: route heartbeat delivery from typed sqlite context * refactor: tighten typed sqlite session routing * refactor: remove session origin routing shadow * refactor: drop session origin shadow fixtures * perf: query sqlite vfs paths by prefix * refactor: use typed conversation metadata for sessions * refactor: prefer typed session routing metadata * refactor: require typed session routing metadata * refactor: resolve group tool policy from typed sessions * refactor: delete dead session thread info bridge * Show Codex subscription reset times in channel errors (#80456) * feat(plugin-sdk): consolidate session workflow APIs * fix(agents): allow read-only agent mount reads * [codex] refresh plugin regression fixtures * fix(agents): restore compaction gateway logs * test: tighten gateway startup assertions * Redact persisted secret-shaped payloads [AI] (#79006) * test: tighten device pair notify assertions * test: tighten hermes secret assertions * test: assert matrix client error shapes * test: assert config compat warnings * fix(heartbeat): remap cron-run exec events to session keys (#80214) * fix(codex): route btw through native side threads * fix(auth): accept friendly OpenAI order for Codex profiles * fix(codex): rotate auth profiles inside harness * fix: keep browser status page probe within timeout * test: assert agents add outputs * test: pin cron read status * fix(agents): avoid Pi resource discovery stalls Co-authored-by: dataCenter430 <titan032000@gmail.com> * fix: retire timed-out codex app-server clients * test: tighten qa lab runtime assertions * test: check security fix outputs * test: verify extension runtime messages * feat(wake): expose typed sessionKey on wake protocol + system event CLI * fix(gateway): await session_end during shutdown drain and track channel + compaction lifecycle paths (#57790) * test: guard talk consult call helper * fix(codex): scale context engine projection (#80761) * fix(codex): scale context engine projection * fix: document Codex context projection scaling * fix: document Codex context projection scaling * fix: document Codex context projection scaling * fix: document Codex context projection scaling * chore: align Codex projection changelog * chore: realign Codex projection changelog * fix: isolate Codex projection patch --------- Co-authored-by: Eva (agent) <eva+agent-78055@100yen.org> Co-authored-by: Josh Lehman <josh@martian.engineering> * refactor: move agent runtime state toward piless * refactor: remove cron session reaper * refactor: move session management to sqlite * refactor: finish database-first state migration * chore: refresh generated sqlite db types * refactor: remove stale file-backed shims * test: harden kysely type coverage # Conflicts: # .agents/skills/kysely-database-access/SKILL.md # src/infra/kysely-sync.types.test.ts # src/proxy-capture/store.sqlite.test.ts # src/state/openclaw-agent-db.test.ts # src/state/openclaw-state-db.test.ts * refactor: remove cron store path runtime * refactor: keep compaction transcript handles out of session rows * refactor: derive embedded transcripts from sqlite identity * refactor: remove embedded transcript locator handoff * refactor: remove runtime transcript file bridges * refactor: remove transcript file handoffs * refactor: remove MSTeams legacy learning key fallback * refactor: store model catalog config in sqlite * refactor: use sqlite model catalog at runtime # Conflicts: # docs/cli/secrets.md # docs/gateway/authentication.md # docs/gateway/secrets.md * fix: keep oauth sibling sync sqlite-local # Conflicts: # src/commands/onboard-auth.test.ts * refactor: remove task session store maintenance # Conflicts: # src/commands/tasks.ts * refactor: keep diagnostics in state sqlite * refactor: enforce database-first runtime state * refactor: consolidate sqlite runtime state * Show Codex subscription reset times in channel errors (#80456) * fix(codex): refresh subscription limit resets * fix(codex): format reset times for channels * Update CHANGELOG with latest changes and fixes Updated CHANGELOG with recent fixes and improvements. * fix(codex): keep command load failures on codex surface * fix(codex): format account rate limits as rows * fix(codex): summarize account limits as usage status * fix(codex): simplify account limit status * test: tighten subagent announce queue assertion * test: tighten session delete lifecycle assertions * test: tighten cron ops assertions * fix: track cron execution milestones * test: tighten hermes secret assertions * test: assert matrix sync store payloads * test: assert config compat warnings * fix(codex): align btw side thread semantics * fix(codex): honor codex fallback blocking * fix(agents): avoid Pi resource discovery stalls * test: tighten codex event assertions * test: tighten cron assertions * Fix Codex app-server OAuth harness auth * refactor: move agent runtime state toward piless * refactor: move device and push state to sqlite * refactor: move runtime json state imports to doctor * refactor: finish database-first state migration * chore: refresh generated sqlite db types * refactor: clarify cron sqlite store keys * refactor: remove stale file-backed shims * refactor: bind codex runtime state by session id * test: expect sqlite trajectory branch export * refactor: rename session row helpers * fix: keep legacy device identity import in doctor * refactor: enforce database-first runtime state * refactor: consolidate sqlite runtime state * build: align pi contract wrappers * chore: repair database-first rebase * refactor: remove session file test contracts * test: update gateway session expectations * refactor: stop routing from session compatibility shadows * refactor: stop persisting session route shadows * refactor: use typed delivery context in clients * refactor: stop echoing session route shadows * refactor: repair embedded runner rebase imports # Conflicts: # src/agents/pi-embedded-runner/run/attempt.tool-call-argument-repair.ts * refactor: align pi contract imports * refactor: satisfy kysely sync helper guard * refactor: remove file transcript bridge remnants * refactor: remove session locator compatibility * refactor: remove session file test contracts * refactor: keep rebase database-first clean * refactor: remove session file assumptions from e2e * docs: clarify database-first goal state * test: remove legacy store markers from sqlite runtime tests * refactor: remove legacy store assumptions from runtime seams * refactor: align sqlite runtime helper seams * test: update memory recall sqlite audit mock * refactor: align database-first runtime type seams * test: clarify doctor cron legacy store names * fix: preserve sqlite session route projections * test: fix copilot token cache test syntax * docs: update database-first proof status * test: align database-first test fixtures * docs: update database-first proof status * refactor: clean extension database-first drift * test: align agent session route proof * test: clarify doctor legacy path fixtures * chore: clean database-first changed checks * chore: repair database-first rebase markers * build: allow baileys git subdependency * chore: repair exp-vfs rebase drift * chore: finish exp-vfs rebase cleanup * chore: satisfy rebase lint drift * chore: fix qqbot rebase type seam * chore: fix rebase drift leftovers * fix: keep auth profile oauth secrets out of sqlite * fix: repair rebase drift tests * test: stabilize pairing request ordering * test: use source manifests in plugin contract checks * fix: restore gateway session metadata after rebase * fix: repair database-first rebase drift * fix: clean up database-first rebase fallout * test: stabilize line quick reply receipt time * fix: repair extension rebase drift * test: keep transcript redaction tests sqlite-backed * fix: carry injected transcript redaction through sqlite * chore: clean database branch rebase residue * fix: repair database branch CI drift * fix: repair database branch CI guard drift * fix: stabilize oauth tls preflight test * test: align database branch fast guards * test: repair build artifact boundary guards * chore: clean changelog rebase markers --------- Co-authored-by: pashpashpash <nik@vault77.ai> Co-authored-by: Eva <eva@100yen.org> Co-authored-by: stainlu <stainlu@newtype-ai.org> Co-authored-by: Jason Zhou <jason.zhou.design@gmail.com> Co-authored-by: Ruben Cuevas <hi@rubencu.com> Co-authored-by: Pavan Kumar Gondhi <pavangondhi@gmail.com> Co-authored-by: Shakker <shakkerdroid@gmail.com> Co-authored-by: Kaspre <36520309+Kaspre@users.noreply.github.com> Co-authored-by: dataCenter430 <titan032000@gmail.com> Co-authored-by: Kaspre <kaspre@gmail.com> Co-authored-by: pandadev66 <nova.full.stack@outlook.com> Co-authored-by: Eva <admin@100yen.org> Co-authored-by: Eva (agent) <eva+agent-78055@100yen.org> Co-authored-by: Josh Lehman <josh@martian.engineering> Co-authored-by: jeffjhunter <support@aipersonamethod.com>
176 lines
5.9 KiB
Markdown
176 lines
5.9 KiB
Markdown
---
|
|
summary: "CLI reference for `openclaw node` (headless node host)"
|
|
read_when:
|
|
- Running the headless node host
|
|
- Pairing a non-macOS node for system.run
|
|
title: "Node"
|
|
---
|
|
|
|
# `openclaw node`
|
|
|
|
Run a **headless node host** that connects to the Gateway WebSocket and exposes
|
|
`system.run` / `system.which` on this machine.
|
|
|
|
## Why use a node host?
|
|
|
|
Use a node host when you want agents to **run commands on other machines** in your
|
|
network without installing a full macOS companion app there.
|
|
|
|
Common use cases:
|
|
|
|
- Run commands on remote Linux/Windows boxes (build servers, lab machines, NAS).
|
|
- Keep exec **sandboxed** on the gateway, but delegate approved runs to other hosts.
|
|
- Provide a lightweight, headless execution target for automation or CI nodes.
|
|
|
|
Execution is still guarded by **exec approvals** and per-agent allowlists on the
|
|
node host, so you can keep command access scoped and explicit.
|
|
|
|
## Browser proxy (zero-config)
|
|
|
|
Node hosts automatically advertise a browser proxy if `browser.enabled` is not
|
|
disabled on the node. This lets the agent use browser automation on that node
|
|
without extra configuration.
|
|
|
|
By default, the proxy exposes the node's normal browser profile surface. If you
|
|
set `nodeHost.browserProxy.allowProfiles`, the proxy becomes restrictive:
|
|
non-allowlisted profile targeting is rejected, and persistent profile
|
|
create/delete routes are blocked through the proxy.
|
|
|
|
Disable it on the node if needed:
|
|
|
|
```json5
|
|
{
|
|
nodeHost: {
|
|
browserProxy: {
|
|
enabled: false,
|
|
},
|
|
},
|
|
}
|
|
```
|
|
|
|
## Run (foreground)
|
|
|
|
```bash
|
|
openclaw node run --host <gateway-host> --port 18789
|
|
```
|
|
|
|
Options:
|
|
|
|
- `--host <host>`: Gateway WebSocket host (default: `127.0.0.1`)
|
|
- `--port <port>`: Gateway WebSocket port (default: `18789`)
|
|
- `--tls`: Use TLS for the gateway connection
|
|
- `--tls-fingerprint <sha256>`: Expected TLS certificate fingerprint (sha256)
|
|
- `--node-id <id>`: Override node id (clears pairing token)
|
|
- `--display-name <name>`: Override the node display name
|
|
|
|
## Gateway auth for node host
|
|
|
|
`openclaw node run` and `openclaw node install` resolve gateway auth from config/env (no `--token`/`--password` flags on node commands):
|
|
|
|
- `OPENCLAW_GATEWAY_TOKEN` / `OPENCLAW_GATEWAY_PASSWORD` are checked first.
|
|
- Then local config fallback: `gateway.auth.token` / `gateway.auth.password`.
|
|
- In local mode, node host intentionally does not inherit `gateway.remote.token` / `gateway.remote.password`.
|
|
- If `gateway.auth.token` / `gateway.auth.password` is explicitly configured via SecretRef and unresolved, node auth resolution fails closed (no remote fallback masking).
|
|
- In `gateway.mode=remote`, remote client fields (`gateway.remote.token` / `gateway.remote.password`) are also eligible per remote precedence rules.
|
|
- Node host auth resolution only honors `OPENCLAW_GATEWAY_*` env vars.
|
|
|
|
For a node connecting to a non-loopback `ws://` Gateway on a trusted private
|
|
network, set `OPENCLAW_ALLOW_INSECURE_PRIVATE_WS=1`. Without it, node startup
|
|
fails closed and asks you to use `wss://`, an SSH tunnel, or Tailscale.
|
|
This is a process-environment opt-in, not an `openclaw.json` config key.
|
|
`openclaw node install` persists it into the supervised node service when it is
|
|
present in the install command environment.
|
|
|
|
## Service (background)
|
|
|
|
Install a headless node host as a user service.
|
|
|
|
```bash
|
|
openclaw node install --host <gateway-host> --port 18789
|
|
```
|
|
|
|
Options:
|
|
|
|
- `--host <host>`: Gateway WebSocket host (default: `127.0.0.1`)
|
|
- `--port <port>`: Gateway WebSocket port (default: `18789`)
|
|
- `--tls`: Use TLS for the gateway connection
|
|
- `--tls-fingerprint <sha256>`: Expected TLS certificate fingerprint (sha256)
|
|
- `--node-id <id>`: Override node id (clears pairing token)
|
|
- `--display-name <name>`: Override the node display name
|
|
- `--runtime <runtime>`: Service runtime (`node` or `bun`)
|
|
- `--force`: Reinstall/overwrite if already installed
|
|
|
|
Manage the service:
|
|
|
|
```bash
|
|
openclaw node status
|
|
openclaw node start
|
|
openclaw node stop
|
|
openclaw node restart
|
|
openclaw node uninstall
|
|
```
|
|
|
|
Use `openclaw node run` for a foreground node host (no service).
|
|
|
|
Service commands accept `--json` for machine-readable output.
|
|
|
|
The node host retries Gateway restart and network closes in-process. If the
|
|
Gateway reports a terminal token/password/bootstrap auth pause, the node host
|
|
logs the close detail and exits non-zero so launchd/systemd can restart it with
|
|
fresh config and credentials. Pairing-required pauses stay in the foreground
|
|
flow so the pending request can be approved.
|
|
|
|
## Pairing
|
|
|
|
The first connection creates a pending device pairing request (`role: node`) on the Gateway.
|
|
Approve it via:
|
|
|
|
```bash
|
|
openclaw devices list
|
|
openclaw devices approve <requestId>
|
|
```
|
|
|
|
On tightly controlled node networks, the Gateway operator can explicitly opt in
|
|
to auto-approving first-time node pairing from trusted CIDRs:
|
|
|
|
```json5
|
|
{
|
|
gateway: {
|
|
nodes: {
|
|
pairing: {
|
|
autoApproveCidrs: ["192.168.1.0/24"],
|
|
},
|
|
},
|
|
},
|
|
}
|
|
```
|
|
|
|
This is disabled by default. It only applies to fresh `role: node` pairing with
|
|
no requested scopes. Operator/browser clients, Control UI, WebChat, and role,
|
|
scope, metadata, or public-key upgrades still require manual approval.
|
|
|
|
If the node retries pairing with changed auth details (role/scopes/public key),
|
|
the previous pending request is superseded and a new `requestId` is created.
|
|
Run `openclaw devices list` again before approval.
|
|
|
|
The node host stores its node id, token, display name, and gateway connection info in
|
|
the SQLite state database.
|
|
|
|
## Exec approvals
|
|
|
|
`system.run` is gated by local exec approvals:
|
|
|
|
- host-local SQLite approvals state
|
|
- [Exec approvals](/tools/exec-approvals)
|
|
- `openclaw approvals --node <id|name|ip>` (edit from the Gateway)
|
|
|
|
For approved async node exec, OpenClaw prepares a canonical `systemRunPlan`
|
|
before prompting. The later approved `system.run` forward reuses that stored
|
|
plan, so edits to command/cwd/session fields after the approval request was
|
|
created are rejected instead of changing what the node executes.
|
|
|
|
## Related
|
|
|
|
- [CLI reference](/cli)
|
|
- [Nodes](/nodes)
|