Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Binary file modified .DS_Store
Binary file not shown.
37 changes: 33 additions & 4 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,16 +1,17 @@
# OpenClaw on DigitalOcean
# OpenClaw on DigitalOcean + Azure

[![Security Checks](https://github.com/PCBZ/OpenClaw_Docker/actions/workflows/security.yml/badge.svg)](https://github.com/PCBZ/OpenClaw_Docker/actions/workflows/security.yml)
[![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](LICENSE)
[![Last Commit](https://img.shields.io/github/last-commit/PCBZ/OpenClaw_Docker)](https://github.com/PCBZ/OpenClaw_Docker/commits/main)
[![Terraform](https://img.shields.io/badge/Terraform-%3E%3D1.5-844fba?logo=terraform&logoColor=white)](https://www.terraform.io)
[![DigitalOcean](https://img.shields.io/badge/DigitalOcean-Droplet-0080ff?logo=digitalocean&logoColor=white)](https://www.digitalocean.com)
[![Azure](https://img.shields.io/badge/Azure-VM-0078d4?logo=microsoft-azure&logoColor=white)](https://azure.microsoft.com)
[![OpenRouter](https://img.shields.io/badge/OpenRouter-Free%20Tier-ff6b35?logoColor=white)](https://openrouter.ai)
[![OpenClaw](https://img.shields.io/badge/OpenClaw-2026-00e5cc?logoColor=white)](https://openclaw.bot)
[![Telegram](https://img.shields.io/badge/Telegram-Bot-26a5e4?logo=telegram&logoColor=white)](https://telegram.org)
[![Slack](https://img.shields.io/badge/Slack-Bot-4a154b?logo=slack&logoColor=white)](https://slack.com)

One-command deployment of an [OpenClaw](https://openclaw.bot) AI agent on DigitalOcean with Telegram support and Slack support. After `terraform apply`, the bot is fully operational with no manual SSH steps required.
One-command deployment of an [OpenClaw](https://openclaw.bot) AI agent on DigitalOcean or Azure VM with Telegram and Slack support. After `terraform apply`, the bot is fully operational with no manual SSH steps required.

## Features

Expand All @@ -25,7 +26,8 @@ One-command deployment of an [OpenClaw](https://openclaw.bot) AI agent on Digita
- Terraform >= 1.5
- direnv (`brew install direnv`)
- SSH key pair
- DigitalOcean account + API token
- DigitalOcean account + API token (for DO path)
- Azure subscription + service principal credentials (for Azure path)
- OpenRouter API key
- Telegram bot token (from [@BotFather](https://t.me/BotFather))
- Slack App-Level token (starts with `xapp-`)
Expand All @@ -51,7 +53,9 @@ Edit `.env` and fill in your values:
| `SLACK_APP_TOKEN` | Slack App-Level token (starts with `xapp-`) |
| `SLACK_BOT_TOKEN` | Slack Bot User OAuth token (starts with `xoxb-`) |

### 2. Configure infrastructure
### 2. Choose deployment target

#### Option A: DigitalOcean

```bash
cd terraform/digitalOcean
Expand All @@ -67,6 +71,31 @@ droplet_size = "s-1vcpu-1gb" # $6/mo — increase if OOM
swap_size = "3G"
```

#### Option B: Azure VM

```bash
cd terraform/azure_vm
```

Create `terraform.tfvars` and set your Azure + VM values:

```hcl
subscription_id = "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
tenant_id = "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
client_id = "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
client_secret = "..."

resource_group_name = "your-existing-rg"
location = "eastus"
ssh_public_key_path = "~/.ssh/id_rsa.pub"

vm_name = "openclaw-b2pts"
vm_size = "Standard_B2pts_v2"
os_disk_size_gb = 30
swap_size = 2
openclaw_memory_limit_mb = 800
```

### 3. Load secrets via direnv

```bash
Expand Down
12 changes: 12 additions & 0 deletions terraform/azure_vm/.envrc
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
# Auto-load secrets from .env into Terraform variables
# Requires: brew install direnv && eval "$(direnv hook zsh)" >> ~/.zshrc

dotenv ../../.env
Copy link

Copilot AI Apr 22, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Using dotenv ../../.env will error when the .env file is absent, which can break direnv allow for new setups/CI checkouts. Use a guarded load (e.g., dotenv_if_exists) or a file-existence check so the environment can still be entered without local secrets.

Copilot uses AI. Check for mistakes.

export TF_VAR_openrouter_api_key="$OPENROUTER_API_KEY"
export TF_VAR_telegram_bot_token="$TELEGRAM_BOT_TOKEN"
export TF_VAR_openclaw_gateway_token="$OPENCLAW_GATEWAY_TOKEN"
export TF_VAR_brave_api_key="${BRAVE_API_KEY:-}"
export TF_VAR_telegram_owner_id="${TELEGRAM_OWNER_ID:-}"
export TF_VAR_slack_app_token="${SLACK_APP_TOKEN:-}"
export TF_VAR_slack_bot_token="${SLACK_BOT_TOKEN:-}"
48 changes: 48 additions & 0 deletions terraform/azure_vm/approve_operator_approvals.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,48 @@
#!/usr/bin/env python3
"""Grant operator.approvals on paired devices; clear processed pending requests."""
import json
import time

PENDING_FILE = "/root/.openclaw/devices/pending.json"
PAIRED_FILE = "/root/.openclaw/devices/paired.json"

pending = {}
for _ in range(12):
try:
with open(PENDING_FILE) as f:
pending = json.load(f)
if pending:
break
except Exception:
pass
time.sleep(5)

# Even if no pending requests, approve operator.approvals for all paired devices.
try:
with open(PAIRED_FILE) as f:
paired = json.load(f)
except Exception:
paired = {}

for request in pending.values():
device_id = request.get("deviceId")
if device_id in paired:
for key in ("scopes", "approvedScopes"):
if "operator.approvals" not in paired[device_id].get(key, []):
paired[device_id].setdefault(key, []).append("operator.approvals")
print(f"Approved via pending: {device_id}")

# Ensure all paired operator devices have operator.approvals regardless of pending state
for device_id, device in paired.items():
if "operator" in device.get("roles", []):
for key in ("scopes", "approvedScopes"):
if "operator.approvals" not in device.get(key, []):
device.setdefault(key, []).append("operator.approvals")
print(f"Granted operator.approvals to {device_id[:16]}...")

if paired:
with open(PAIRED_FILE, "w") as f:
json.dump(paired, f, indent=2)
if pending:
with open(PENDING_FILE, "w") as f:
json.dump({}, f)
185 changes: 185 additions & 0 deletions terraform/azure_vm/bootstrap.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,185 @@
#!/bin/bash
set -e

export HOME=/root
export USER=root
export PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin

# ── 1. System setup ──────────────────────────────────────────
apt-get update -y

# ── Create swap with temp-disk fallback ──────────────────────
swap_size_gb=${swap_size}
swap_size_mb=$((swap_size_gb * 1024))
swap_path="/mnt/resource/swapfile"
if [ ! -d "/mnt/resource" ]; then
swap_path="/swapfile"
fi

echo "Setting up $${swap_size_gb}GB swap at $${swap_path}..."
if dd if=/dev/zero of="$${swap_path}" bs=1M count="$${swap_size_mb}"; then
chmod 600 "$${swap_path}"
mkswap "$${swap_path}"
swapon "$${swap_path}"
if ! grep -q "$${swap_path} none swap" /etc/fstab; then
echo "$${swap_path} none swap sw 0 0" >> /etc/fstab
fi
else
echo "WARNING: Swap creation failed; continuing without swap."
fi

# ── Kernel swappiness tuning ─────────────────────────────────
cat > /etc/sysctl.d/99-swappiness.conf << 'SYSCTLEOF'
vm.swappiness = 20
vm.overcommit_memory = 1
SYSCTLEOF
sysctl -p /etc/sysctl.d/99-swappiness.conf

# ── Install Node.js 24.x ────────────────────────────────────
curl -fsSL https://deb.nodesource.com/setup_24.x | bash -
Comment thread
PCBZ marked this conversation as resolved.
apt-get install -y nodejs

# ── 2. Install OpenClaw ──────────────────────────────────────
export OPENCLAW_ONBOARD_NON_INTERACTIVE=1
export OPENCLAW_INSTALL_METHOD=npm
curl -fsSL https://openclaw.bot/install.sh | bash -s -- --install-method npm --no-onboard
Comment thread
PCBZ marked this conversation as resolved.

npm install -g grammy @grammyjs/runner @grammyjs/transformer-throttler \
@slack/bolt @slack/socket-mode @slack/web-api

# ── 3. Write config ──────────────────────────────────────────
mkdir -p /root/.openclaw

# Write injected openclaw.json (provided by Terraform)
cat > /root/.openclaw/openclaw.json << 'JSONEOF'
${openclaw_json_content}
JSONEOF

mkdir -p /root/.openclaw/workspace
if ! grep -q "ALWAYS_REPLY_IN_DM" /root/.openclaw/workspace/AGENTS.md 2>/dev/null; then
cat >> /root/.openclaw/workspace/AGENTS.md << 'AGENTSEOF'

## Channel Output Rule (OpenClaw)

- ALWAYS_REPLY_IN_DM: For any direct message on Telegram/Slack, always send at least one plain-text assistant message.
- Never end a DM turn with tool calls only, empty payload, or metadata-only output.
- If uncertain, send a brief fallback text: "I can help with that. Could you share a bit more detail?"
AGENTSEOF
fi

# ── 4. Write .env and export secrets ─────────────────────────
cat > /root/.openclaw/.env << 'ENVEOF'
OPENROUTER_API_KEY=${openrouter_api_key}
TELEGRAM_BOT_TOKEN=${telegram_bot_token}
OPENCLAW_GATEWAY_TOKEN=${openclaw_gateway_token}
BRAVE_API_KEY=${brave_api_key}
OPENCLAW_ONBOARD_NON_INTERACTIVE=1
ENVEOF

export OPENROUTER_API_KEY=${openrouter_api_key}
export TELEGRAM_BOT_TOKEN=${telegram_bot_token}
export OPENCLAW_GATEWAY_TOKEN=${openclaw_gateway_token}
export BRAVE_API_KEY=${brave_api_key}

# ── 5. Onboard ───────────────────────────────────────────────
openclaw doctor --fix || true

loginctl enable-linger root
export XDG_RUNTIME_DIR=/run/user/0
mkdir -p "$XDG_RUNTIME_DIR"
systemctl start user@0.service || true

openclaw onboard --non-interactive --accept-risk --install-daemon || true

# Fix models.json baseUrl (onboard may have written wrong /v1 instead of /api/v1)
MODELS_JSON=/root/.openclaw/agents/main/agent/models.json
if [ -f "$MODELS_JSON" ]; then
sed -i 's|https://openrouter.ai/v1|https://openrouter.ai/api/v1|g' "$MODELS_JSON"
echo "Fixed models.json baseUrl: /v1 -> /api/v1"
fi

# ── Write agent auth-profiles (OpenRouter key) ───────────────
mkdir -p /root/.openclaw/agents/main/agent
cat > /root/.openclaw/agents/main/agent/auth-profiles.json << 'AUTHEOF'
{
"openrouter": {
"apiKey": "${openrouter_api_key}"
}
}
AUTHEOF

openclaw gateway install --force

# ── 6. Create systemd service override with memory limits ────
mkdir -p /root/.config/systemd/user/openclaw-gateway.service.d
cat > /root/.config/systemd/user/openclaw-gateway.service.d/override.conf << 'OVERRIDEEOF'
[Service]
TimeoutStartSec=180
TimeoutStopSec=60
RestartSec=5
MemoryLimit=${openclaw_memory_limit_mb}M
OVERRIDEEOF

systemctl --user daemon-reload
systemctl --user restart openclaw-gateway.service

# ── 7. Auto-approve operator.approvals scope ─────────────────
echo "Waiting for approval requests..."
sleep 120

mkdir -p /root/.openclaw/bootstrap
cat > /root/.openclaw/bootstrap/approve_operator_approvals.py << 'APPROVEPYEOF'
${approve_operator_script}
APPROVEPYEOF
chmod 700 /root/.openclaw/bootstrap/approve_operator_approvals.py
python3 /root/.openclaw/bootstrap/approve_operator_approvals.py

# ── 8. Setup unattended security updates ─────────────────────
apt-get install -y unattended-upgrades

cat > /etc/apt/apt.conf.d/50unattended-upgrades << 'UNATTENDEDEOF'
Unattended-Upgrade::Allowed-Origins {
"$${distro_id}:$${distro_codename}-security";
};
Unattended-Upgrade::AutoFixInterruptedDpkg "true";
Unattended-Upgrade::MinimalSteps "true";
Unattended-Upgrade::Remove-Unused-Kernel-Packages "true";
Unattended-Upgrade::Remove-Unused-Dependencies "true";
Unattended-Upgrade::Automatic-Reboot "true";
Unattended-Upgrade::Automatic-Reboot-Time "03:00";
UNATTENDEDEOF

# ── 9. Setup cleanup cron jobs ───────────────────────────────
cat > /etc/cron.d/openclaw-cleanup << 'CRONEOF'
# OpenClaw cleanup and maintenance tasks
SHELL=/bin/bash
PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
CRON_TZ=America/Los_Angeles

# Weekly npm cache cleanup (Sunday 2:00 Pacific)
0 2 * * 0 root npm cache clean --force >> /var/log/openclaw-cleanup.log 2>&1

# Daily disk space logging (2:00 Pacific)
0 2 * * * root df -h > /var/log/openclaw-diskspace.log 2>&1
CRONEOF

# ── 10. Setup logrotate for OpenClaw logs ────────────────────
mkdir -p /var/log/openclaw

cat > /etc/logrotate.d/openclaw << 'LOGROTATEEOF'
/var/log/openclaw-*.log {
daily
rotate 7
compress
delaycompress
notifempty
create 0644 root root
missingok
}
LOGROTATEEOF

echo "=== Azure Bootstrap Complete ==="
echo "Swap: $${swap_size_gb}GB at $${swap_path}"
echo "Memory Limit: ${openclaw_memory_limit_mb}MB (systemd cgroup)"
echo "OpenClaw Web: http://localhost:18789/health (test locally)"
echo "Check systemd: systemctl --user status openclaw-gateway"
36 changes: 36 additions & 0 deletions terraform/azure_vm/compute.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,36 @@
resource "azurerm_linux_virtual_machine" "main" {
name = var.vm_name
location = var.location
resource_group_name = data.azurerm_resource_group.main.name
size = var.vm_size

admin_username = var.admin_username

admin_ssh_key {
username = var.admin_username
public_key = file(var.ssh_public_key_path)
}

network_interface_ids = [
azurerm_network_interface.main.id,
]

os_disk {
caching = "ReadWrite"
storage_account_type = "Standard_LRS"
disk_size_gb = var.os_disk_size_gb
}

source_image_reference {
publisher = "Canonical"
offer = "0001-com-ubuntu-server-jammy"
sku = "22_04-lts-arm64"
version = "latest"
}

# Temp disk is automatically allocated for B1s (4GB at /mnt/resource)
# No explicit configuration needed, but ensure it's not disabled by default
custom_data = base64encode(templatefile("${path.module}/bootstrap.sh", local.bootstrap_vars))

tags = local.common_tags
}
3 changes: 3 additions & 0 deletions terraform/azure_vm/data.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
data "azurerm_resource_group" "main" {
name = var.resource_group_name
}
27 changes: 27 additions & 0 deletions terraform/azure_vm/locals.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
locals {
openclaw_json_content = templatefile("${path.module}/openclaw.json.tpl", {
openclaw_gateway_token = var.openclaw_gateway_token
openrouter_api_key = var.openrouter_api_key
brave_api_key = var.brave_api_key
telegram_bot_token = var.telegram_bot_token
slack_app_token = var.slack_app_token
slack_bot_token = var.slack_bot_token
slack_enabled = var.slack_app_token != "" && var.slack_bot_token != ""
})

bootstrap_vars = {
openrouter_api_key = var.openrouter_api_key
telegram_bot_token = var.telegram_bot_token
openclaw_gateway_token = var.openclaw_gateway_token
brave_api_key = var.brave_api_key
swap_size = var.swap_size
openclaw_memory_limit_mb = var.openclaw_memory_limit_mb
approve_operator_script = file("${path.module}/approve_operator_approvals.py")
openclaw_json_content = local.openclaw_json_content
}

common_tags = {
Environment = "Production"
Application = "OpenClaw"
}
}
7 changes: 7 additions & 0 deletions terraform/azure_vm/main.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
# Terraform automatically loads all *.tf files in this directory.
# Resources are split by concern:
# - data.tf
# - locals.tf
# - network.tf
# - security.tf
# - compute.tf
Loading
Loading