Files
clawdbot/docs/web.md
2025-12-24 14:33:05 +00:00

2.5 KiB

summary, read_when
summary read_when
Gateway web surfaces: Control UI, bind modes, and security
You want to access the Gateway over Tailscale
You want the browser Control UI and config editing

Web (Gateway)

The Gateway serves a small browser Control UI (Vite + Lit) from the same port as the Gateway WebSocket:

  • http://<host>:18789/ui/

The UI talks directly to the Gateway WS and supports:

  • Chat (chat.history, chat.send, chat.abort)
  • Connections (provider status, WhatsApp QR, Telegram config)
  • Instances (system-presence)
  • Sessions (sessions.list, sessions.patch)
  • Cron (cron.*)
  • Skills (skills.status, skills.update, skills.install)
  • Nodes (node.list, node.describe, node.invoke)
  • Config (config.get, config.set) for ~/.clawdis/clawdis.json
  • Debug (status/health/models snapshots + manual calls)

Webhooks

When hooks.enabled=true, the Gateway also exposes a small webhook surface on the same HTTP server. See docs/configuration.mdhooks for auth + payloads.

Config (default-on)

The Control UI is enabled by default when assets are present (dist/control-ui). You can control it via config:

{
  gateway: {
    controlUi: { enabled: true } // set false to disable /ui/
  }
}

Tailscale access

Keep the Gateway on loopback and let Tailscale Serve proxy it:

{
  gateway: {
    bind: "loopback",
    tailscale: { mode: "serve" }
  }
}

Then start the gateway:

clawdis gateway

Open:

  • https://<magicdns>/ui/

Tailnet bind + token (legacy)

{
  gateway: {
    bind: "tailnet",
    controlUi: { enabled: true }
  }
}

Then start the gateway (token required for non-loopback binds):

export CLAWDIS_GATEWAY_TOKEN="…your token…"
clawdis gateway

Open:

  • http://<tailscale-ip>:18789/ui/

Public internet (Funnel)

{
  gateway: {
    bind: "loopback",
    tailscale: { mode: "funnel" },
    auth: { mode: "password" } // or CLAWDIS_GATEWAY_PASSWORD
  }
}

Security notes

  • Binding the Gateway to a non-loopback address requires auth (CLAWDIS_GATEWAY_TOKEN or gateway.auth).
  • The UI sends connect.params.auth.token or connect.params.auth.password.
  • Use gateway.auth.allowTailscale: false to require explicit credentials even in Serve mode.
  • gateway.tailscale.mode: "funnel" requires gateway.auth.mode: "password" (shared password).

Building the UI

The Gateway serves static files from dist/control-ui. Build them with:

pnpm ui:install
pnpm ui:build