- ansible/: VM provisioning playbooks and roles - provision-vm.yml: create KVM VM from Ubuntu cloud image - install.yml: install OpenClaw on guest (upstream) - customize.yml: swappiness, virtiofs fstab, linger - roles/vm/: libvirt domain XML, cloud-init templates - inventory.yml + host_vars/zap.yml: zap instance config - backup-openclaw-vm.sh: daily rsync + MinIO upload - restore-openclaw-vm.sh: full redeploy from scratch - README.md: full operational documentation Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
4.1 KiB
4.1 KiB
title, description
| title | description |
|---|---|
| Architecture | Technical implementation details |
Architecture
Component Overview
┌─────────────────────────────────────────┐
│ UFW Firewall (SSH only) │
└──────────────┬──────────────────────────┘
│
┌──────────────┴──────────────────────────┐
│ DOCKER-USER Chain (iptables) │
│ Blocks all external container access │
└──────────────┬──────────────────────────┘
│
┌──────────────┴──────────────────────────┐
│ Docker Daemon │
│ - Non-root containers │
│ - Localhost-only binding │
└──────────────┬──────────────────────────┘
│
┌──────────────┴──────────────────────────┐
│ OpenClaw Container │
│ User: openclaw │
│ Port: 127.0.0.1:3000 │
└──────────────────────────────────────────┘
File Structure
/opt/openclaw/
├── Dockerfile
├── docker-compose.yml
/home/openclaw/.openclaw/
├── config.yml
├── sessions/
└── credentials/
/etc/systemd/system/
└── openclaw.service
/etc/docker/
└── daemon.json
/etc/ufw/
└── after.rules (DOCKER-USER chain)
Service Management
OpenClaw runs as a systemd service that manages the Docker container:
# Systemd controls Docker Compose
systemd → docker compose → openclaw container
Installation Flow
-
Tailscale Setup (
tailscale.yml)- Add Tailscale repository
- Install Tailscale package
- Display connection instructions
-
User Creation (
user.yml)- Create
openclawsystem user
- Create
-
Docker Installation (
docker.yml)- Install Docker CE + Compose V2
- Add user to docker group
- Create
/etc/dockerdirectory
-
Firewall Setup (
firewall.yml)- Install UFW
- Configure DOCKER-USER chain
- Configure Docker daemon (
/etc/docker/daemon.json) - Allow SSH (22/tcp) and Tailscale (41641/udp)
-
Node.js Installation (
nodejs.yml)- Add NodeSource repository
- Install Node.js 22.x
- Install pnpm globally
-
OpenClaw Setup (
openclaw.yml)- Create directories
- Generate configs from templates
- Build Docker image
- Start container via Compose
- Install systemd service
Key Design Decisions
Why UFW + DOCKER-USER?
Docker manipulates iptables directly, bypassing UFW. The DOCKER-USER chain is evaluated before Docker's FORWARD chain, allowing us to block traffic before Docker sees it.
Why Localhost Binding?
Defense in depth. Even if DOCKER-USER fails, localhost binding prevents external access.
Why Systemd Service?
- Auto-start on boot
- Clean lifecycle management
- Integration with system logs
- Dependency management (after Docker)
Why Non-Root Container?
Principle of least privilege. If container is compromised, attacker has limited privileges.
Ansible Task Order
main.yml
├── tailscale.yml (VPN setup)
├── user.yml (create openclaw user)
├── docker.yml (install Docker, create /etc/docker)
├── firewall.yml (configure UFW + Docker daemon)
├── nodejs.yml (Node.js + pnpm)
└── openclaw.yml (container setup)
Order matters: Docker must be installed before firewall configuration because:
/etc/dockerdirectory must exist fordaemon.json- Docker service must exist to be restarted after config changes