2026-02-01 22:47:44 +01:00
|
|
|
|
---
|
|
|
|
|
|
read_when:
|
2026-02-03 13:23:00 -08:00
|
|
|
|
- 在 localhost 之外暴露 Gateway 网关控制 UI
|
2026-02-01 22:47:44 +01:00
|
|
|
|
- 自动化 tailnet 或公共仪表盘访问
|
2026-02-03 13:23:00 -08:00
|
|
|
|
summary: 为 Gateway 网关仪表盘集成 Tailscale Serve/Funnel
|
2026-02-01 22:47:44 +01:00
|
|
|
|
title: Tailscale
|
|
|
|
|
|
x-i18n:
|
2026-02-03 13:23:00 -08:00
|
|
|
|
generated_at: "2026-02-03T07:49:04Z"
|
2026-02-01 22:47:44 +01:00
|
|
|
|
model: claude-opus-4-5
|
|
|
|
|
|
provider: pi
|
|
|
|
|
|
source_hash: c900c70a9301f2909a3a29a6fb0e6edfc8c18dba443f2e71b9cfadbc58167911
|
|
|
|
|
|
source_path: gateway/tailscale.md
|
2026-02-03 13:23:00 -08:00
|
|
|
|
workflow: 15
|
2026-02-01 22:47:44 +01:00
|
|
|
|
---
|
|
|
|
|
|
|
2026-02-03 13:23:00 -08:00
|
|
|
|
# Tailscale(Gateway 网关仪表盘)
|
2026-02-01 22:47:44 +01:00
|
|
|
|
|
2026-02-03 13:23:00 -08:00
|
|
|
|
OpenClaw 可以为 Gateway 网关仪表盘和 WebSocket 端口自动配置 Tailscale **Serve**(tailnet)或 **Funnel**(公共)。这使 Gateway 网关保持绑定到 loopback,同时 Tailscale 提供 HTTPS、路由和(对于 Serve)身份头。
|
2026-02-01 22:47:44 +01:00
|
|
|
|
|
|
|
|
|
|
## 模式
|
|
|
|
|
|
|
2026-02-03 13:23:00 -08:00
|
|
|
|
- `serve`:仅限 Tailnet 的 Serve,通过 `tailscale serve`。Gateway 网关保持在 `127.0.0.1` 上。
|
|
|
|
|
|
- `funnel`:通过 `tailscale funnel` 的公共 HTTPS。OpenClaw 需要共享密码。
|
|
|
|
|
|
- `off`:默认(无 Tailscale 自动化)。
|
2026-02-01 22:47:44 +01:00
|
|
|
|
|
|
|
|
|
|
## 认证
|
|
|
|
|
|
|
2026-02-03 13:23:00 -08:00
|
|
|
|
设置 `gateway.auth.mode` 来控制握手:
|
2026-02-01 22:47:44 +01:00
|
|
|
|
|
2026-02-03 13:23:00 -08:00
|
|
|
|
- `token`(设置 `OPENCLAW_GATEWAY_TOKEN` 时的默认值)
|
|
|
|
|
|
- `password`(通过 `OPENCLAW_GATEWAY_PASSWORD` 或配置的共享密钥)
|
2026-02-01 22:47:44 +01:00
|
|
|
|
|
2026-02-03 13:23:00 -08:00
|
|
|
|
当 `tailscale.mode = "serve"` 且 `gateway.auth.allowTailscale` 为 `true` 时,
|
|
|
|
|
|
有效的 Serve 代理请求可以通过 Tailscale 身份头(`tailscale-user-login`)进行认证,无需提供令牌/密码。OpenClaw 通过本地 Tailscale 守护进程(`tailscale whois`)解析 `x-forwarded-for` 地址并将其与头匹配来验证身份,然后才接受它。
|
|
|
|
|
|
OpenClaw 仅在请求从 loopback 到达并带有 Tailscale 的 `x-forwarded-for`、`x-forwarded-proto` 和 `x-forwarded-host` 头时才将其视为 Serve 请求。
|
|
|
|
|
|
要要求显式凭证,设置 `gateway.auth.allowTailscale: false` 或强制 `gateway.auth.mode: "password"`。
|
2026-02-01 22:47:44 +01:00
|
|
|
|
|
|
|
|
|
|
## 配置示例
|
|
|
|
|
|
|
|
|
|
|
|
### 仅限 Tailnet(Serve)
|
|
|
|
|
|
|
|
|
|
|
|
```json5
|
|
|
|
|
|
{
|
|
|
|
|
|
gateway: {
|
|
|
|
|
|
bind: "loopback",
|
|
|
|
|
|
tailscale: { mode: "serve" },
|
|
|
|
|
|
},
|
|
|
|
|
|
}
|
|
|
|
|
|
```
|
|
|
|
|
|
|
2026-02-02 15:46:45 +01:00
|
|
|
|
打开:`https://<magicdns>/`(或你配置的 `gateway.controlUi.basePath`)
|
2026-02-01 22:47:44 +01:00
|
|
|
|
|
|
|
|
|
|
### 仅限 Tailnet(绑定到 Tailnet IP)
|
|
|
|
|
|
|
2026-02-03 13:23:00 -08:00
|
|
|
|
当你希望 Gateway 网关直接监听 Tailnet IP 时使用此方式(无 Serve/Funnel)。
|
2026-02-01 22:47:44 +01:00
|
|
|
|
|
|
|
|
|
|
```json5
|
|
|
|
|
|
{
|
|
|
|
|
|
gateway: {
|
|
|
|
|
|
bind: "tailnet",
|
|
|
|
|
|
auth: { mode: "token", token: "your-token" },
|
|
|
|
|
|
},
|
|
|
|
|
|
}
|
|
|
|
|
|
```
|
|
|
|
|
|
|
2026-02-03 13:23:00 -08:00
|
|
|
|
从另一个 Tailnet 设备连接:
|
2026-02-01 22:47:44 +01:00
|
|
|
|
|
2026-02-03 13:23:00 -08:00
|
|
|
|
- 控制 UI:`http://<tailscale-ip>:18789/`
|
2026-02-01 22:47:44 +01:00
|
|
|
|
- WebSocket:`ws://<tailscale-ip>:18789`
|
|
|
|
|
|
|
2026-02-03 13:23:00 -08:00
|
|
|
|
注意:在此模式下 loopback(`http://127.0.0.1:18789`)将**不**工作。
|
2026-02-01 22:47:44 +01:00
|
|
|
|
|
2026-02-03 13:23:00 -08:00
|
|
|
|
### 公共互联网(Funnel + 共享密码)
|
2026-02-01 22:47:44 +01:00
|
|
|
|
|
|
|
|
|
|
```json5
|
|
|
|
|
|
{
|
|
|
|
|
|
gateway: {
|
|
|
|
|
|
bind: "loopback",
|
|
|
|
|
|
tailscale: { mode: "funnel" },
|
|
|
|
|
|
auth: { mode: "password", password: "replace-me" },
|
|
|
|
|
|
},
|
|
|
|
|
|
}
|
|
|
|
|
|
```
|
|
|
|
|
|
|
2026-02-03 13:23:00 -08:00
|
|
|
|
优先使用 `OPENCLAW_GATEWAY_PASSWORD` 而不是将密码提交到磁盘。
|
2026-02-01 22:47:44 +01:00
|
|
|
|
|
|
|
|
|
|
## CLI 示例
|
|
|
|
|
|
|
|
|
|
|
|
```bash
|
|
|
|
|
|
openclaw gateway --tailscale serve
|
|
|
|
|
|
openclaw gateway --tailscale funnel --auth password
|
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
|
|
## 注意事项
|
|
|
|
|
|
|
2026-02-03 13:23:00 -08:00
|
|
|
|
- Tailscale Serve/Funnel 需要安装并登录 `tailscale` CLI。
|
|
|
|
|
|
- `tailscale.mode: "funnel"` 除非认证模式为 `password`,否则拒绝启动,以避免公共暴露。
|
|
|
|
|
|
- 如果你希望 OpenClaw 在关闭时撤销 `tailscale serve` 或 `tailscale funnel` 配置,设置 `gateway.tailscale.resetOnExit`。
|
|
|
|
|
|
- `gateway.bind: "tailnet"` 是直接 Tailnet 绑定(无 HTTPS,无 Serve/Funnel)。
|
|
|
|
|
|
- `gateway.bind: "auto"` 优先 loopback;如果你想要仅 Tailnet,使用 `tailnet`。
|
|
|
|
|
|
- Serve/Funnel 仅暴露 **Gateway 网关控制 UI + WS**。节点通过相同的 Gateway 网关 WS 端点连接,因此 Serve 可以用于节点访问。
|
2026-02-01 22:47:44 +01:00
|
|
|
|
|
2026-02-03 13:23:00 -08:00
|
|
|
|
## 浏览器控制(远程 Gateway 网关 + 本地浏览器)
|
2026-02-01 22:47:44 +01:00
|
|
|
|
|
2026-02-03 13:23:00 -08:00
|
|
|
|
如果你在一台机器上运行 Gateway 网关但想在另一台机器上驱动浏览器,
|
|
|
|
|
|
在浏览器机器上运行一个**节点主机**并让两者保持在同一个 tailnet 上。
|
|
|
|
|
|
Gateway 网关会将浏览器操作代理到节点;不需要单独的控制服务器或 Serve URL。
|
2026-02-01 22:47:44 +01:00
|
|
|
|
|
2026-02-03 13:23:00 -08:00
|
|
|
|
避免将 Funnel 用于浏览器控制;将节点配对视为操作者访问。
|
2026-02-01 22:47:44 +01:00
|
|
|
|
|
2026-02-03 13:23:00 -08:00
|
|
|
|
## Tailscale 前提条件 + 限制
|
2026-02-01 22:47:44 +01:00
|
|
|
|
|
2026-02-03 13:23:00 -08:00
|
|
|
|
- Serve 需要为你的 tailnet 启用 HTTPS;如果缺少,CLI 会提示。
|
|
|
|
|
|
- Serve 注入 Tailscale 身份头;Funnel 不会。
|
|
|
|
|
|
- Funnel 需要 Tailscale v1.38.3+、MagicDNS、启用 HTTPS 和 funnel 节点属性。
|
|
|
|
|
|
- Funnel 仅支持通过 TLS 的端口 `443`、`8443` 和 `10000`。
|
|
|
|
|
|
- macOS 上的 Funnel 需要开源 Tailscale 应用变体。
|
2026-02-01 22:47:44 +01:00
|
|
|
|
|
|
|
|
|
|
## 了解更多
|
|
|
|
|
|
|
2026-02-03 13:23:00 -08:00
|
|
|
|
- Tailscale Serve 概述:https://tailscale.com/kb/1312/serve
|
2026-02-01 22:47:44 +01:00
|
|
|
|
- `tailscale serve` 命令:https://tailscale.com/kb/1242/tailscale-serve
|
2026-02-03 13:23:00 -08:00
|
|
|
|
- Tailscale Funnel 概述:https://tailscale.com/kb/1223/tailscale-funnel
|
2026-02-01 22:47:44 +01:00
|
|
|
|
- `tailscale funnel` 命令:https://tailscale.com/kb/1311/tailscale-funnel
|