Podman
Run the OpenClaw gateway in a rootless Podman container. Uses the same image as Docker (build from the repo Dockerfile).Requirements
- Podman (rootless)
- Sudo for one-time setup (create user, build image)
Quick start
1. One-time setup (from repo root; creates user, builds image, installs launch script):~openclaw/.openclaw/openclaw.json (sets gateway.mode="local") so the gateway can start without running the wizard.
By default the container is not installed as a systemd service, you start it manually (see below). For a production-style setup with auto-start and restarts, install it as a systemd Quadlet user service instead:
OPENCLAW_PODMAN_QUADLET=1; use --container to install only the container and launch script.)
2. Start gateway (manual, for quick smoke testing):
http://127.0.0.1:18789/ and use the token from ~openclaw/.openclaw/.env (or the value printed by setup).
Systemd (Quadlet, optional)
If you ran./setup-podman.sh --quadlet (or OPENCLAW_PODMAN_QUADLET=1), a Podman Quadlet unit is installed so the gateway runs as a systemd user service for the openclaw user. The service is enabled and started at the end of setup.
- Start:
sudo systemctl --machine openclaw@ --user start openclaw.service - Stop:
sudo systemctl --machine openclaw@ --user stop openclaw.service - Status:
sudo systemctl --machine openclaw@ --user status openclaw.service - Logs:
sudo journalctl --machine openclaw@ --user -u openclaw.service -f
~openclaw/.config/containers/systemd/openclaw.container. To change ports or env, edit that file (or the .env it sources), then sudo systemctl --machine openclaw@ --user daemon-reload and restart the service. On boot, the service starts automatically if lingering is enabled for openclaw (setup does this when loginctl is available).
To add quadlet after an initial setup that did not use it, re-run: ./setup-podman.sh --quadlet.
The openclaw user (non-login)
setup-podman.sh creates a dedicated system user openclaw:
-
Shell:
nologin— no interactive login; reduces attack surface. -
Home: e.g.
/home/openclaw— holds~/.openclaw(config, workspace) and the launch scriptrun-openclaw-podman.sh. -
Rootless Podman: The user must have a subuid and subgid range. Many distros assign these automatically when the user is created. If setup prints a warning, add lines to
/etc/subuidand/etc/subgid:Then start the gateway as that user (e.g. from cron or systemd): -
Config: Only
openclawand root can access/home/openclaw/.openclaw. To edit config: use the Control UI once the gateway is running, orsudo -u openclaw $EDITOR /home/openclaw/.openclaw/openclaw.json.
Environment and config
- Token: Stored in
~openclaw/.openclaw/.envasOPENCLAW_GATEWAY_TOKEN.setup-podman.shandrun-openclaw-podman.shgenerate it if missing (usesopenssl,python3, orod). - Optional: In that
.envyou can set provider keys (e.g.GROQ_API_KEY,OLLAMA_API_KEY) and other OpenClaw env vars. - Host ports: By default the script maps
18789(gateway) and18790(bridge). Override the host port mapping withOPENCLAW_PODMAN_GATEWAY_HOST_PORTandOPENCLAW_PODMAN_BRIDGE_HOST_PORTwhen launching. - Paths: Host config and workspace default to
~openclaw/.openclawand~openclaw/.openclaw/workspace. Override the host paths used by the launch script withOPENCLAW_CONFIG_DIRandOPENCLAW_WORKSPACE_DIR.
Useful commands
- Logs: With quadlet:
sudo journalctl --machine openclaw@ --user -u openclaw.service -f. With script:sudo -u openclaw podman logs -f openclaw - Stop: With quadlet:
sudo systemctl --machine openclaw@ --user stop openclaw.service. With script:sudo -u openclaw podman stop openclaw - Start again: With quadlet:
sudo systemctl --machine openclaw@ --user start openclaw.service. With script: re-run the launch script orpodman start openclaw - Remove container:
sudo -u openclaw podman rm -f openclaw— config and workspace on the host are kept
Troubleshooting
- Permission denied (EACCES) on config or auth-profiles: The container defaults to
--userns=keep-idand runs as the same uid/gid as the host user running the script. Ensure your hostOPENCLAW_CONFIG_DIRandOPENCLAW_WORKSPACE_DIRare owned by that user. - Gateway start blocked (missing
gateway.mode=local): Ensure~openclaw/.openclaw/openclaw.jsonexists and setsgateway.mode="local".setup-podman.shcreates this file if missing. - Rootless Podman fails for user openclaw: Check
/etc/subuidand/etc/subgidcontain a line foropenclaw(e.g.openclaw:100000:65536). Add it if missing and restart. - Container name in use: The launch script uses
podman run --replace, so the existing container is replaced when you start again. To clean up manually:podman rm -f openclaw. - Script not found when running as openclaw: Ensure
setup-podman.shwas run so thatrun-openclaw-podman.shis copied to openclaw’s home (e.g./home/openclaw/run-openclaw-podman.sh). - Quadlet service not found or fails to start: Run
sudo systemctl --machine openclaw@ --user daemon-reloadafter editing the.containerfile. Quadlet requires cgroups v2:podman info --format '{{.Host.CgroupsVersion}}'should show2.
Optional: run as your own user
To run the gateway as your normal user (no dedicated openclaw user): build the image, create~/.openclaw/.env with OPENCLAW_GATEWAY_TOKEN, and run the container with --userns=keep-id and mounts to your ~/.openclaw. The launch script is designed for the openclaw-user flow; for a single-user setup you can instead run the podman run command from the script manually, pointing config and workspace to your home. Recommended for most users: use setup-podman.sh and run as the openclaw user so config and process are isolated.