EasyRunner can host the OpenClaw Gateway as a small containerized app behind its Caddy proxy. This guide assumes an EasyRunner host that runs Podman-compatible Compose apps and exposes HTTPS through Caddy.Documentation Index
Fetch the complete documentation index at: https://docs2.openclaw.ai/llms.txt
Use this file to discover all available pages before exploring further.
Before you begin
- An EasyRunner server with a domain routed to it.
- A built or published OpenClaw container image.
- A persistent config volume for
/home/node/.openclaw. - A persistent workspace volume for
/workspace. - A strong Gateway token or password.
Compose app
Create an EasyRunner app with a Compose file shaped like this:openclaw.example.com with your Gateway hostname. Store
OPENCLAW_GATEWAY_TOKEN in EasyRunner’s secret/environment manager instead of
committing it to the app definition.
Configure OpenClaw
Inside the persistent config volume, keep the Gateway reachable only through the proxy and require auth:Verify
From your workstation:Updates and backups
- Pull or build the new OpenClaw image, then redeploy the EasyRunner app.
- Back up the
openclaw-configvolume before updates. - Back up
openclaw-workspaceif agents write durable project data there. - Run
openclaw doctorafter major updates to catch config migrations and service warnings.
Troubleshooting
gateway probecannot connect: confirm the Caddy hostname points at the app and that the container listens on0.0.0.0:1455.- Auth fails: rotate the token in EasyRunner secrets and the local client command together.
- Files are root-owned after restore: repair the mounted volumes so the
container user can write
/home/node/.openclawand/workspace. - Browser or channel plugins fail: check whether the required external binaries, network egress, and mounted credentials are available inside the container.