Ansible
Ansible Installation
Section titled “Ansible Installation”The recommended way to deploy CoderClaw to production servers is via coderclaw-ansible — an automated installer with security-first architecture.
Quick Start
Section titled “Quick Start”One-command install:
curl -fsSL https://raw.githubusercontent.com/SeanHogg/coderClaw-ansible/main/install.sh | bash📦 Full guide: github.com/SeanHogg/coderClaw-ansible
The coderclaw-ansible repo is the source of truth for Ansible deployment. This page is a quick overview.
What You Get
Section titled “What You Get”- 🔒 Firewall-first security: UFW + Docker isolation (only SSH + Tailscale accessible)
- 🔐 Tailscale VPN: Secure remote access without exposing services publicly
- 🐳 Docker: Isolated sandbox containers, localhost-only bindings
- 🛡️ Defense in depth: 4-layer security architecture
- 🚀 One-command setup: Complete deployment in minutes
- 🔧 Systemd integration: Auto-start on boot with hardening
Requirements
Section titled “Requirements”- OS: Debian 11+ or Ubuntu 20.04+
- Access: Root or sudo privileges
- Network: Internet connection for package installation
- Ansible: 2.14+ (installed automatically by quick-start script)
What Gets Installed
Section titled “What Gets Installed”The Ansible playbook installs and configures:
- Tailscale (mesh VPN for secure remote access)
- UFW firewall (SSH + Tailscale ports only)
- Docker CE + Compose V2 (for agent sandboxes)
- Node.js 22.x + pnpm (runtime dependencies)
- CoderClaw (host-based, not containerized)
- Systemd service (auto-start with security hardening)
Note: The gateway runs directly on the host (not in Docker), but agent sandboxes use Docker for isolation. See Sandboxing for details.
Post-Install Setup
Section titled “Post-Install Setup”After installation completes, switch to the coderclaw user:
sudo -i -u coderclawThe post-install script will guide you through:
- Onboarding wizard: Configure CoderClaw settings
- Provider login: Connect WhatsApp/Telegram/Discord/Signal
- Gateway testing: Verify the installation
- Tailscale setup: Connect to your VPN mesh
Quick commands
Section titled “Quick commands”# Check service statussudo systemctl status coderclaw
# View live logssudo journalctl -u coderclaw -f
# Restart gatewaysudo systemctl restart coderclaw
# Provider login (run as coderclaw user)sudo -i -u coderclawcoderclaw channels loginSecurity Architecture
Section titled “Security Architecture”4-Layer Defense
Section titled “4-Layer Defense”- Firewall (UFW): Only SSH (22) + Tailscale (41641/udp) exposed publicly
- VPN (Tailscale): Gateway accessible only via VPN mesh
- Docker Isolation: DOCKER-USER iptables chain prevents external port exposure
- Systemd Hardening: NoNewPrivileges, PrivateTmp, unprivileged user
Verification
Section titled “Verification”Test external attack surface:
nmap -p- YOUR_SERVER_IPShould show only port 22 (SSH) open. All other services (gateway, Docker) are locked down.
Docker Availability
Section titled “Docker Availability”Docker is installed for agent sandboxes (isolated tool execution), not for running the gateway itself. The gateway binds to localhost only and is accessible via Tailscale VPN.
See Multi-Agent Sandbox & Tools for sandbox configuration.
Manual Installation
Section titled “Manual Installation”If you prefer manual control over the automation:
# 1. Install prerequisitessudo apt update && sudo apt install -y ansible git
# 2. Clone repositorygit clone https://github.com/SeanHogg/coderClaw-ansible.gitcd coderClaw-ansible
# 3. Install Ansible collectionsansible-galaxy collection install -r requirements.yml
# 4. Run playbook./run-playbook.sh
# Or run directly (then manually execute /tmp/coderclaw-setup.sh after)# ansible-playbook playbook.yml --ask-become-passUpdating CoderClaw
Section titled “Updating CoderClaw”The Ansible installer sets up CoderClaw for manual updates. See Updating for the standard update flow.
To re-run the Ansible playbook (e.g., for configuration changes):
cd coderClaw-ansible./run-playbook.shNote: This is idempotent and safe to run multiple times.
Troubleshooting
Section titled “Troubleshooting”Firewall blocks my connection
Section titled “Firewall blocks my connection”If you’re locked out:
- Ensure you can access via Tailscale VPN first
- SSH access (port 22) is always allowed
- The gateway is only accessible via Tailscale by design
Service won’t start
Section titled “Service won’t start”# Check logssudo journalctl -u coderclaw -n 100
# Verify permissionssudo ls -la /opt/coderclaw
# Test manual startsudo -i -u coderclawcd ~/coderclawpnpm startDocker sandbox issues
Section titled “Docker sandbox issues”# Verify Docker is runningsudo systemctl status docker
# Check sandbox imagesudo docker images | grep coderclaw-sandbox
# Build sandbox image if missingcd /opt/coderclaw/coderclawsudo -u coderclaw ./scripts/sandbox-setup.shProvider login fails
Section titled “Provider login fails”Make sure you’re running as the coderclaw user:
sudo -i -u coderclawcoderclaw channels loginAdvanced Configuration
Section titled “Advanced Configuration”For detailed security architecture and troubleshooting:
Related
Section titled “Related”- coderclaw-ansible — full deployment guide
- Docker — containerized gateway setup
- Sandboxing — agent sandbox configuration
- Multi-Agent Sandbox & Tools — per-agent isolation