Caricamento in corso...
Caricamento in corso...
Last synced: Today, 22:00
Technical reference for the OpenClaw framework. Real-time synchronization with the official documentation engine.
Use this file to discover all available pages before exploring further.
openclaw nodeRun a headless node host that connects to the Gateway WebSocket and exposes
system.runsystem.whichUse a node host when you want agents to run commands on other machines in your network without installing a full macOS companion app there.
Common use cases:
Execution is still guarded by exec approvals and per‑agent allowlists on the node host, so you can keep command access scoped and explicit.
Node hosts automatically advertise a browser proxy if
browser.enabledBy default, the proxy exposes the node's normal browser profile surface. If you set
nodeHost.browserProxy.allowProfilesDisable it on the node if needed:
json5{ nodeHost: { browserProxy: { enabled: false, }, }, }
bashopenclaw node run --host <gateway-host> --port 18789
Options:
--host <host>127.0.0.1--port <port>18789--tls--tls-fingerprint <sha256>--node-id <id>--display-name <name>openclaw node runopenclaw node install--token--passwordOPENCLAW_GATEWAY_TOKENOPENCLAW_GATEWAY_PASSWORDgateway.auth.tokengateway.auth.passwordgateway.remote.tokengateway.remote.passwordgateway.auth.tokengateway.auth.passwordgateway.mode=remotegateway.remote.tokengateway.remote.passwordOPENCLAW_GATEWAY_*For a node connecting to a non-loopback
ws://OPENCLAW_ALLOW_INSECURE_PRIVATE_WS=1wss://openclaw.jsonopenclaw node installInstall a headless node host as a user service.
bashopenclaw node install --host <gateway-host> --port 18789
Options:
--host <host>127.0.0.1--port <port>18789--tls--tls-fingerprint <sha256>--node-id <id>--display-name <name>--runtime <runtime>nodebun--forceManage the service:
bashopenclaw node status openclaw node start openclaw node stop openclaw node restart openclaw node uninstall
Use
openclaw node runService commands accept
--jsonThe node host retries Gateway restart and network closes in-process. If the Gateway reports a terminal token/password/bootstrap auth pause, the node host logs the close detail and exits non-zero so launchd/systemd can restart it with fresh config and credentials. Pairing-required pauses stay in the foreground flow so the pending request can be approved.
The first connection creates a pending device pairing request (
role: nodebashopenclaw devices list openclaw devices approve <requestId>
On tightly controlled node networks, the Gateway operator can explicitly opt in to auto-approving first-time node pairing from trusted CIDRs:
json5{ gateway: { nodes: { pairing: { autoApproveCidrs: ["192.168.1.0/24"], }, }, }, }
This is disabled by default. It only applies to fresh
role: nodeIf the node retries pairing with changed auth details (role/scopes/public key), the previous pending request is superseded and a new
requestIdopenclaw devices listThe node host stores its node id, token, display name, and gateway connection info in
~/.openclaw/node.jsonsystem.run~/.openclaw/exec-approvals.jsonopenclaw approvals --node <id|name|ip>For approved async node exec, OpenClaw prepares a canonical
systemRunPlansystem.run© 2024 TaskFlow Mirror
Powered by TaskFlow Sync Engine