Files
openclaw/docs/nodes/index.md

385 lines
14 KiB
Markdown
Raw Normal View History

2025-12-19 00:29:42 +01:00
---
summary: "Nodes: pairing, capabilities, permissions, and CLI helpers for canvas/camera/screen/device/notifications/system"
2025-12-19 00:29:42 +01:00
read_when:
- Pairing iOS/Android nodes to a gateway
- Using node canvas/camera for agent context
- Adding new node commands or CLI helpers
title: "Nodes"
2025-12-19 00:29:42 +01:00
---
# Nodes
A **node** is a companion device (macOS/iOS/Android/headless) that connects to the Gateway **WebSocket** (same port as operators) with `role: "node"` and exposes a command surface (e.g. `canvas.*`, `camera.*`, `device.*`, `notifications.*`, `system.*`) via `node.invoke`. Protocol details: [Gateway protocol](/gateway/protocol).
2025-12-19 00:29:42 +01:00
Legacy transport: [Bridge protocol](/gateway/bridge-protocol) (TCP JSONL; deprecated/removed for current nodes).
2026-01-22 22:02:00 +00:00
2026-01-30 03:15:10 +01:00
macOS can also run in **node mode**: the menubar app connects to the Gateways WS server and exposes its local canvas/camera commands as a node (so `openclaw nodes …` works against this Mac).
2026-01-11 03:17:06 +01:00
Notes:
2026-01-31 21:13:13 +09:00
2026-01-21 17:45:12 +00:00
- Nodes are **peripherals**, not gateways. They dont run the gateway service.
2026-01-11 03:17:06 +01:00
- Telegram/WhatsApp/etc. messages land on the **gateway**, not on nodes.
- Troubleshooting runbook: [/nodes/troubleshooting](/nodes/troubleshooting)
2026-01-11 03:17:06 +01:00
2025-12-19 00:29:42 +01:00
## Pairing + status
2026-01-22 22:02:00 +00:00
**WS nodes use device pairing.** Nodes present a device identity during `connect`; the Gateway
creates a device pairing request for `role: node`. Approve via the devices CLI (or UI).
2025-12-19 00:29:42 +01:00
Quick CLI:
```bash
2026-01-30 03:15:10 +01:00
openclaw devices list
openclaw devices approve <requestId>
openclaw devices reject <requestId>
openclaw nodes status
openclaw nodes describe --node <idOrNameOrIp>
2025-12-19 00:29:42 +01:00
```
Notes:
2026-01-31 21:13:13 +09:00
2026-01-22 22:02:00 +00:00
- `nodes status` marks a node as **paired** when its device pairing role includes `node`.
2026-01-30 03:15:10 +01:00
- `node.pair.*` (CLI: `openclaw nodes pending/approve/reject`) is a separate gateway-owned
2026-01-22 22:02:00 +00:00
node pairing store; it does **not** gate the WS `connect` handshake.
2026-01-21 04:14:34 +00:00
## Remote node host (system.run)
Use a **node host** when your Gateway runs on one machine and you want commands
to execute on another. The model still talks to the **gateway**; the gateway
forwards `exec` calls to the **node host** when `host=node` is selected.
### What runs where
2026-01-31 21:13:13 +09:00
2026-01-21 04:14:34 +00:00
- **Gateway host**: receives messages, runs the model, routes tool calls.
- **Node host**: executes `system.run`/`system.which` on the node machine.
2026-01-30 03:15:10 +01:00
- **Approvals**: enforced on the node host via `~/.openclaw/exec-approvals.json`.
2026-01-21 04:14:34 +00:00
Approval note:
- Approval-backed node runs bind exact request context.
- For direct shell/runtime file executions, OpenClaw also best-effort binds one concrete local
file operand and denies the run if that file changes before execution.
- If OpenClaw cannot identify exactly one concrete local file for an interpreter/runtime command,
approval-backed execution is denied instead of pretending full runtime coverage. Use sandboxing,
separate hosts, or an explicit trusted allowlist/full workflow for broader interpreter semantics.
2026-01-21 04:14:34 +00:00
### Start a node host (foreground)
On the node machine:
```bash
2026-01-30 03:15:10 +01:00
openclaw node run --host <gateway-host> --port 18789 --display-name "Build Node"
2026-01-21 04:14:34 +00:00
```
### Remote gateway via SSH tunnel (loopback bind)
If the Gateway binds to loopback (`gateway.bind=loopback`, default in local mode),
remote node hosts cannot connect directly. Create an SSH tunnel and point the
node host at the local end of the tunnel.
Example (node host -> gateway host):
```bash
# Terminal A (keep running): forward local 18790 -> gateway 127.0.0.1:18789
ssh -N -L 18790:127.0.0.1:18789 user@gateway-host
# Terminal B: export the gateway token and connect through the tunnel
export OPENCLAW_GATEWAY_TOKEN="<gateway-token>"
openclaw node run --host 127.0.0.1 --port 18790 --display-name "Build Node"
```
Notes:
- `openclaw node run` supports token or password auth.
- Env vars are preferred: `OPENCLAW_GATEWAY_TOKEN` / `OPENCLAW_GATEWAY_PASSWORD`.
- Config fallback is `gateway.auth.token` / `gateway.auth.password`.
- In local mode, node host intentionally ignores `gateway.remote.token` / `gateway.remote.password`.
- In remote mode, `gateway.remote.token` / `gateway.remote.password` are eligible per remote precedence rules.
- If active local `gateway.auth.*` SecretRefs are configured but unresolved, node-host auth fails closed.
- Legacy `CLAWDBOT_GATEWAY_*` env vars are intentionally ignored by node-host auth resolution.
2026-01-21 04:14:34 +00:00
### Start a node host (service)
```bash
2026-01-30 03:15:10 +01:00
openclaw node install --host <gateway-host> --port 18789 --display-name "Build Node"
openclaw node restart
2026-01-21 04:14:34 +00:00
```
### Pair + name
On the gateway host:
```bash
openclaw devices list
openclaw devices approve <requestId>
openclaw nodes status
2026-01-21 04:14:34 +00:00
```
Naming options:
2026-01-31 21:13:13 +09:00
2026-01-30 03:15:10 +01:00
- `--display-name` on `openclaw node run` / `openclaw node install` (persists in `~/.openclaw/node.json` on the node).
- `openclaw nodes rename --node <id|name|ip> --name "Build Node"` (gateway override).
2026-01-21 04:14:34 +00:00
### Allowlist the commands
Exec approvals are **per node host**. Add allowlist entries from the gateway:
```bash
2026-01-30 03:15:10 +01:00
openclaw approvals allowlist add --node <id|name|ip> "/usr/bin/uname"
openclaw approvals allowlist add --node <id|name|ip> "/usr/bin/sw_vers"
2026-01-21 04:14:34 +00:00
```
2026-01-30 03:15:10 +01:00
Approvals live on the node host at `~/.openclaw/exec-approvals.json`.
2026-01-21 04:14:34 +00:00
### Point exec at the node
Configure defaults (gateway config):
```bash
2026-01-30 03:15:10 +01:00
openclaw config set tools.exec.host node
openclaw config set tools.exec.security allowlist
openclaw config set tools.exec.node "<id-or-name>"
2026-01-21 04:14:34 +00:00
```
Or per session:
```
/exec host=node security=allowlist node=<id-or-name>
```
Once set, any `exec` call with `host=node` runs on the node host (subject to the
node allowlist/approvals).
Related:
2026-01-31 21:13:13 +09:00
2026-01-21 04:14:34 +00:00
- [Node host CLI](/cli/node)
- [Exec tool](/tools/exec)
- [Exec approvals](/tools/exec-approvals)
2025-12-19 00:29:42 +01:00
## Invoking commands
Low-level (raw RPC):
```bash
2026-01-30 03:15:10 +01:00
openclaw nodes invoke --node <idOrNameOrIp> --command canvas.eval --params '{"javaScript":"location.href"}'
2025-12-19 00:29:42 +01:00
```
Higher-level helpers exist for the common “give the agent a MEDIA attachment” workflows.
## Screenshots (canvas snapshots)
If the node is showing the Canvas (WebView), `canvas.snapshot` returns `{ format, base64 }`.
CLI helper (writes to a temp file and prints `MEDIA:<path>`):
```bash
2026-01-30 03:15:10 +01:00
openclaw nodes canvas snapshot --node <idOrNameOrIp> --format png
openclaw nodes canvas snapshot --node <idOrNameOrIp> --format jpg --max-width 1200 --quality 0.9
2025-12-19 00:29:42 +01:00
```
2026-01-11 02:44:32 +00:00
### Canvas controls
```bash
2026-01-30 03:15:10 +01:00
openclaw nodes canvas present --node <idOrNameOrIp> --target https://example.com
openclaw nodes canvas hide --node <idOrNameOrIp>
openclaw nodes canvas navigate https://example.com --node <idOrNameOrIp>
openclaw nodes canvas eval --node <idOrNameOrIp> --js "document.title"
2026-01-11 02:44:32 +00:00
```
Notes:
2026-01-31 21:13:13 +09:00
2026-01-11 02:44:32 +00:00
- `canvas present` accepts URLs or local file paths (`--target`), plus optional `--x/--y/--width/--height` for positioning.
- `canvas eval` accepts inline JS (`--js`) or a positional arg.
### A2UI (Canvas)
```bash
2026-01-30 03:15:10 +01:00
openclaw nodes canvas a2ui push --node <idOrNameOrIp> --text "Hello"
openclaw nodes canvas a2ui push --node <idOrNameOrIp> --jsonl ./payload.jsonl
openclaw nodes canvas a2ui reset --node <idOrNameOrIp>
2026-01-11 02:44:32 +00:00
```
Notes:
2026-01-31 21:13:13 +09:00
2026-01-11 02:44:32 +00:00
- Only A2UI v0.8 JSONL is supported (v0.9/createSurface is rejected).
2025-12-19 00:29:42 +01:00
## Photos + videos (node camera)
Photos (`jpg`):
```bash
2026-01-30 03:15:10 +01:00
openclaw nodes camera list --node <idOrNameOrIp>
openclaw nodes camera snap --node <idOrNameOrIp> # default: both facings (2 MEDIA lines)
openclaw nodes camera snap --node <idOrNameOrIp> --facing front
2025-12-19 00:29:42 +01:00
```
Video clips (`mp4`):
```bash
2026-01-30 03:15:10 +01:00
openclaw nodes camera clip --node <idOrNameOrIp> --duration 10s
openclaw nodes camera clip --node <idOrNameOrIp> --duration 3000 --no-audio
2025-12-19 00:29:42 +01:00
```
Notes:
2026-01-31 21:13:13 +09:00
2025-12-19 00:29:42 +01:00
- The node must be **foregrounded** for `canvas.*` and `camera.*` (background calls return `NODE_BACKGROUND_UNAVAILABLE`).
- Clip duration is clamped (currently `<= 60s`) to avoid oversized base64 payloads.
- Android will prompt for `CAMERA`/`RECORD_AUDIO` permissions when possible; denied permissions fail with `*_PERMISSION_REQUIRED`.
## Screen recordings (nodes)
Supported nodes expose `screen.record` (mp4). Example:
```bash
2026-01-30 03:15:10 +01:00
openclaw nodes screen record --node <idOrNameOrIp> --duration 10s --fps 10
openclaw nodes screen record --node <idOrNameOrIp> --duration 10s --fps 10 --no-audio
```
Notes:
2026-01-31 21:13:13 +09:00
- `screen.record` availability depends on node platform.
- Screen recordings are clamped to `<= 60s`.
- `--no-audio` disables microphone capture on supported platforms.
2026-01-11 02:44:32 +00:00
- Use `--screen <index>` to select a display when multiple screens are available.
2026-01-04 00:54:44 +01:00
## Location (nodes)
Nodes expose `location.get` when Location is enabled in settings.
CLI helper:
```bash
2026-01-30 03:15:10 +01:00
openclaw nodes location get --node <idOrNameOrIp>
openclaw nodes location get --node <idOrNameOrIp> --accuracy precise --max-age 15000 --location-timeout 10000
2026-01-04 00:54:44 +01:00
```
Notes:
2026-01-31 21:13:13 +09:00
2026-01-04 00:54:44 +01:00
- Location is **off by default**.
- “Always” requires system permission; background fetch is best-effort.
- The response includes lat/lon, accuracy (meters), and timestamp.
## SMS (Android nodes)
Android nodes can expose `sms.send` when the user grants **SMS** permission and the device supports telephony.
Low-level invoke:
```bash
2026-01-30 03:15:10 +01:00
openclaw nodes invoke --node <idOrNameOrIp> --command sms.send --params '{"to":"+15555550123","message":"Hello from OpenClaw"}'
```
Notes:
2026-01-31 21:13:13 +09:00
- The permission prompt must be accepted on the Android device before the capability is advertised.
- Wi-Fi-only devices without telephony will not advertise `sms.send`.
## Android device + personal data commands
Android nodes can advertise additional command families when the corresponding capabilities are enabled.
Available families:
- `device.status`, `device.info`, `device.permissions`, `device.health`
- `notifications.list`, `notifications.actions`
- `photos.latest`
- `contacts.search`, `contacts.add`
- `calendar.events`, `calendar.add`
- `motion.activity`, `motion.pedometer`
Example invokes:
```bash
openclaw nodes invoke --node <idOrNameOrIp> --command device.status --params '{}'
openclaw nodes invoke --node <idOrNameOrIp> --command notifications.list --params '{}'
openclaw nodes invoke --node <idOrNameOrIp> --command photos.latest --params '{"limit":1}'
```
Notes:
- Motion commands are capability-gated by available sensors.
## System commands (node host / mac node)
The macOS node exposes `system.run`, `system.notify`, and `system.execApprovals.get/set`.
The headless node host exposes `system.run`, `system.which`, and `system.execApprovals.get/set`.
Examples:
```bash
2026-01-30 03:15:10 +01:00
openclaw nodes run --node <idOrNameOrIp> -- echo "Hello from mac node"
openclaw nodes notify --node <idOrNameOrIp> --title "Ping" --body "Gateway ready"
```
Notes:
2026-01-31 21:13:13 +09:00
- `system.run` returns stdout/stderr/exit code in the payload.
- `system.notify` respects notification permission state on the macOS app.
- Unrecognized node `platform` / `deviceFamily` metadata uses a conservative default allowlist that excludes `system.run` and `system.which`. If you intentionally need those commands for an unknown platform, add them explicitly via `gateway.nodes.allowCommands`.
2026-01-11 02:44:32 +00:00
- `system.run` supports `--cwd`, `--env KEY=VAL`, `--command-timeout`, and `--needs-screen-recording`.
- For shell wrappers (`bash|sh|zsh ... -c/-lc`), request-scoped `--env` values are reduced to an explicit allowlist (`TERM`, `LANG`, `LC_*`, `COLORTERM`, `NO_COLOR`, `FORCE_COLOR`).
- For allow-always decisions in allowlist mode, known dispatch wrappers (`env`, `nice`, `nohup`, `stdbuf`, `timeout`) persist inner executable paths instead of wrapper paths. If unwrapping is not safe, no allowlist entry is persisted automatically.
- On Windows node hosts in allowlist mode, shell-wrapper runs via `cmd.exe /c` require approval (allowlist entry alone does not auto-allow the wrapper form).
2026-01-11 02:44:32 +00:00
- `system.notify` supports `--priority <passive|active|timeSensitive>` and `--delivery <system|overlay|auto>`.
- Node hosts ignore `PATH` overrides and strip dangerous startup/shell keys (`DYLD_*`, `LD_*`, `NODE_OPTIONS`, `PYTHON*`, `PERL*`, `RUBYOPT`, `SHELLOPTS`, `PS4`). If you need extra PATH entries, configure the node host service environment (or install tools in standard locations) instead of passing `PATH` via `--env`.
- On macOS node mode, `system.run` is gated by exec approvals in the macOS app (Settings → Exec approvals).
Ask/allowlist/full behave the same as the headless node host; denied prompts return `SYSTEM_RUN_DENIED`.
2026-01-30 03:15:10 +01:00
- On headless node host, `system.run` is gated by exec approvals (`~/.openclaw/exec-approvals.json`).
## Exec node binding
When multiple nodes are available, you can bind exec to a specific node.
This sets the default node for `exec host=node` (and can be overridden per agent).
Global default:
```bash
2026-01-30 03:15:10 +01:00
openclaw config set tools.exec.node "node-id-or-name"
```
Per-agent override:
```bash
2026-01-30 03:15:10 +01:00
openclaw config get agents.list
openclaw config set agents.list[0].tools.exec.node "node-id-or-name"
```
Unset to allow any node:
```bash
2026-01-30 03:15:10 +01:00
openclaw config unset tools.exec.node
openclaw config unset agents.list[0].tools.exec.node
```
## Permissions map
Nodes may include a `permissions` map in `node.list` / `node.describe`, keyed by permission name (e.g. `screenRecording`, `accessibility`) with boolean values (`true` = granted).
## Headless node host (cross-platform)
2026-01-30 03:15:10 +01:00
OpenClaw can run a **headless node host** (no UI) that connects to the Gateway
2026-01-22 22:02:00 +00:00
WebSocket and exposes `system.run` / `system.which`. This is useful on Linux/Windows
or for running a minimal node alongside a server.
Start it:
```bash
2026-01-30 03:15:10 +01:00
openclaw node run --host <gateway-host> --port 18789
```
Notes:
2026-01-31 21:13:13 +09:00
- Pairing is still required (the Gateway will show a device pairing prompt).
2026-01-30 03:15:10 +01:00
- The node host stores its node id, token, display name, and gateway connection info in `~/.openclaw/node.json`.
- Exec approvals are enforced locally via `~/.openclaw/exec-approvals.json`
(see [Exec approvals](/tools/exec-approvals)).
- On macOS, the headless node host executes `system.run` locally by default. Set
`OPENCLAW_NODE_EXEC_HOST=app` to route `system.run` through the companion app exec host; add
`OPENCLAW_NODE_EXEC_FALLBACK=0` to require the app host and fail closed if it is unavailable.
2026-01-22 22:02:00 +00:00
- Add `--tls` / `--tls-fingerprint` when the Gateway WS uses TLS.
## Mac node mode
2026-01-30 03:15:10 +01:00
- The macOS menubar app connects to the Gateway WS server as a node (so `openclaw nodes …` works against this Mac).
- In remote mode, the app opens an SSH tunnel for the Gateway port and connects to `localhost`.