OpenClaw dashboard命令后,无法登录web控制面板(在systemd服务无法启动的一些虚拟机里会碰到)

OpenClaw dashboard命令后,无法登录web控制面板(在systemd服务无法启动的一些虚拟机里会碰到)

先上结论

执行OpenClaw dashboard命令后,无法登录web控制面板,是因为OpenClaw的gateway服务没有起来。原来小龙虾OpenClaw 的命令没有学明白,先弄清楚命令:

openclaw onboard 是配置

openclaw dashboard是显示web控制面板登录信息

openclaw gateway --verbose 是启动网关

openclaw gateway start是启动网关服务

问题就是因为这台系统的systemd没有起作用,导致openclaw的gateway服务没有起来,所以控制面板无法登录。

OpenClaw status Overview ┌─────────────────┬───────────────────────────────────────────────────────────────────────────────────────────────────┐ │ Item │ Value │ ├─────────────────┼───────────────────────────────────────────────────────────────────────────────────────────────────┤ │ Dashboard │ http://192.168.1.12:18789/ │ │ OS │ linux 5.15.0 (x64) · node 24.12.0 │ │ Tailscale │ off │ │ Channel │ stable (default) │ │ Update │ pnpm · npm latest 2026.3.2 │ │ Gateway │ local · ws://127.0.0.1:18789 (local loopback) · unreachable (connect failed: connect │ │ │ ECONNREFUSED 127.0.0.1:18789) │ │ Gateway service │ systemd not installed │ │ Node service │ systemd not installed │ │ Agents │ 1 · 1 bootstrap file present · sessions 1 · default main active 43h ago │ │ Memory │ 0 files · 0 chunks · dirty · sources memory · plugin memory-core · vector unknown · fts ready · │ │ │ cache on (0) │ │ Probes │ skipped (use --deep) │ │ Events │ none │ │ Heartbeat │ 30m (main) │ │ Sessions │ 1 active · default default (16k ctx) · ~/.openclaw/agents/main/sessions/sessions.json │ └─────────────────┴───────────────────────────────────────────────────────────────────────────────────────────────────┘ 

解决方法就是手工启动gateway

openclaw gateway

问题:openclaw dashboard启动后,控制面板无法登录

(现在明白了,这个就是不管登录的,就是输出登录url的)

启动

openclaw dashboard 🦞 OpenClaw 2026.3.2 (85377a2) — I don't sleep, I just enter low-power mode and dream of clean diffs. Dashboard URL: http://127.0.0.1:18789/#token=020470d43987e733c26f50ab353bacdd7a09a98f115802f8 Copy to clipboard unavailable.

本地测试

curl http://localhost:18789/ curl: (7) Failed to connect to localhost port 18789 after 0 ms: Connection refused

尝试手动启动网关

openclaw gateway start

显示

openclaw gateway start 🦞 OpenClaw 2026.3.2 (85377a2) — Making 'I'll automate that later' happen now. Gateway service disabled. Start with: openclaw gateway install Start with: openclaw gateway Start with: systemctl --user start openclaw-gateway.service Start with: systemd user services are unavailable; install/enable systemd or run the gateway under your supervisor. Start with: If you're in a container, run the gateway in the foreground instead of `openclaw gateway`. skywalk@ubjail1:~$

因为这台机器在FreeBSD jail里,没有systemd,所以这里碰到了问题。

后来用这句话启动成功了

openclaw gateway --port 18789 --verbose

显示:

openclaw gateway --port 18789 --verbose 🦞 OpenClaw 2026.3.2 (85377a2) — I speak fluent bash, mild sarcasm, and aggressive tab-completion energy. 09:00:17 Registered plugin command: /pair (plugin: device-pair) 09:00:17 Registered plugin command: /phone (plugin: phone-control) 09:00:17 Registered plugin command: /voice (plugin: talk-voice) 01:00:17 [canvas] host mounted at http://0.0.0.0:18789/__openclaw__/canvas/ (root /home/skywalk/.openclaw/canvas) 01:00:17 [gateway] ⚠️ Gateway is binding to a non-loopback address. Ensure authentication is configured before exposing to public networks. 09:00:17 bonjour: starting (hostname=openclaw, instance="ubjail1 (OpenClaw)", gatewayPort=18789, minimal=true) 01:00:17 [heartbeat] started 01:00:17 [health-monitor] started (interval: 300s, startup-grace: 60s, channel-connect-grace: 120s) 01:00:17 [gateway] agent model: custom-api-p9mak7fap5m7vd53-aistudio-app-com/default 01:00:17 [gateway] listening on ws://0.0.0.0:18789 (PID 98100) 01:00:17 [gateway] log file: /tmp/openclaw/openclaw-2026-03-06.log 01:00:17 [browser/server] Browser control listening on http://127.0.0.1:18791/ (auth=token) 01:00:17 [ws] ← open remoteAddr=192.168.1.2 conn=4ebe1965…8b6a 01:00:18 [reload] config watcher error: Error: ENOSYS: function not implemented, watch '/home/skywalk/.openclaw/openclaw.json' 01:00:18 [ws] closed before connect conn=4ebe1965…8b6a remote=192.168.1.2 fwd=n/a origin=http://192.168.1.12:18789 host=192.168.1.12:18789 ua=Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/144.0.0.0 Safari/537.36 code=1008 reason=control ui requires device identity (use HTTPS or localhost secure context) 01:00:18 [ws] → close code=1008 reason=control ui requires device identity (use HTTPS or localhost secure context) durationMs=284 cause=control-ui-insecure-auth handshake=failed lastFrameType=req lastFrameMethod=connect lastFrameId=2357e83d-02f6-4cbf-8594-750dedd48ef7

Gateway is binding to a non-loopback address.

启动gateway

openclaw gateway --port 18789 --verbose

看到这个提示:

01:00:17 [gateway] ⚠️  Gateway is binding to a non-loopback address. Ensure authentication is configured before exposing to public networks.

这是因为前段时间为了让它网络可用,配置了非本地地址访问,但是没配全。当时配置了文件,在里面加入了"http://192.168.1.12:18789" 这句:

 "gateway": { "port": 18789, "mode": "local", "bind": "lan", "controlUi": { "allowedOrigins": [ "http://localhost:18789", "http://127.0.0.1:18789", "http://192.168.1.12:18789" ] }, 

现在把这句去掉:"http://192.168.1.12:18789"

但是启动后还是可以登录到192.168.1.12 

估计是以前放开了gateway的lan功能。

启动onboard(其实是配置)

openclaw onboard

启动onboard提示

┌  OpenClaw onboarding

◇  Security ─────────────────────────────────────────────────────────────────────────────────╮
│                                                                                            │
│  Security warning — please read.                                                           │
│                                                                                            │
│  OpenClaw is a hobby project and still in beta. Expect sharp edges.                        │
│  By default, OpenClaw is a personal agent: one trusted operator boundary.                  │
│  This bot can read files and run actions if tools are enabled.                             │
│  A bad prompt can trick it into doing unsafe things.                                       │
│                                                                                            │
│  OpenClaw is not a hostile multi-tenant boundary by default.                               │
│  If multiple users can message one tool-enabled agent, they share that delegated tool      │
│  authority.                                                                                │
│                                                                                            │
│  If you’re not comfortable with security hardening and access control, don’t run           │
│  OpenClaw.                                                                                 │
│  Ask someone experienced to help before enabling tools or exposing it to the internet.     │
│                                                                                            │
│  Recommended baseline:                                                                     │
│  - Pairing/allowlists + mention gating.                                                    │
│  - Multi-user/shared inbox: split trust boundaries (separate gateway/credentials, ideally  │
│    separate OS users/hosts).                                                               │
│  - Sandbox + least-privilege tools.                                                        │
│  - Shared inboxes: isolate DM sessions (`session.dmScope: per-channel-peer`) and keep      │
│    tool access minimal.                                                                    │
│  - Keep secrets out of the agent’s reachable filesystem.                                   │
│  - Use the strongest available model for any bot with tools or untrusted inboxes.          │
│                                                                                            │
│  Run regularly:                                                                            │
│  openclaw security audit --deep                                                            │
│  openclaw security audit --fix                                                             │
│                                                                                            │
│  Must read: https://docs.openclaw.ai/gateway/security

配置ai模型

  ● Custom Provider (Any OpenAI or Anthropic compatible endpoint)

配置了星河社区的免费模型

配置skill

先Skip

Install missing skill dependencies
│  ◻ Skip for now (Continue without installing dependencies)
│  ◻ 🔐 1password
│  ◻ 📰 blogwatcher
│  ◻ 🫐 blucli
│  ◻ 📸 camsnap
│  ◻ 🧩 clawhub
│  ◻ 🎛️ eightctl
│  ◻ ♊️ gemini
│  ◻ 🧲 gifgrep
│  ◻ 🐙 github
│  ◻ 🎮 gog
│  ◻ 📍 goplaces
│  ◻ 📧 himalaya
│  ◻ 📦 mcporter
│  ◻ 📄 nano-pdf
│  ◻ 💎 obsidian
│  ◻ 🎙️ openai-whisper
│  ◻ 💡 openhue
│  ◻ 🧿 oracle
│  ◻ 🛵 ordercli
│  ◻ 🗣️ sag
│  ◻ 🌊 songsee
│  ◻ 🔊 sonoscli
│  ◻ 🧾 summarize

后面的很多key,也先忽略

配置自动执行

新手用户‌:建议启用所有四个 hooks,以获得完整的自动化体验

◇  Hooks ──────────────────────────────────────────────────────────────────╮
│                                                                          │
│  Hooks let you automate actions when agent commands are issued.          │
│  Example: Save session context to memory when you issue /new or /reset.  │
│                                                                          │
│  Learn more: https://docs.openclaw.ai/automation/hooks                   │
│                                                                          │
├──────────────────────────────────────────────────────────────────────────╯

◆  Enable hooks?
│  ◻ Skip for now
│  ◻ 🚀 boot-md
│  ◻ 📎 bootstrap-extra-files
│  ◻ 📝 command-logger
│  ◻ 💾 session-memory

配置完毕显示:└  Onboarding complete. Use the dashboard link above to control OpenClaw.

最终手工启动gateway

openclaw gateway

可以正常浏览啦!

Read more

Clawdbot(Moltbot)源码部署全实测:从环境搭建到 WebChat 验证,避坑指南收好

Clawdbot(Moltbot)源码部署全实测:从环境搭建到 WebChat 验证,避坑指南收好

一、为啥折腾 Clawdbot? 最近刷技术圈总刷到 Clawdbot(后来也叫 Moltbot),说是能搭私人 AI 助手,支持 WhatsApp、Telegram 这些常用通道,还能跑在自己设备上,不用依赖第三方服务 —— 想着拉下来测试一下功能,顺便研究一下其源码的实现。 于是拉上 GitHub 仓库https://github.com/openclaw/openclaw,打算从源码部署试试,过程里踩了不少坑,干脆整理成记录,给同样想折腾的朋友避避坑。 二、源码部署前的准备:Windows 环境优先选 WSL2 一开始想直接用 Windows CMD 部署,结果装依赖时各种报错,查仓库文档才发现 Windows 推荐用 WSL2(Ubuntu/Debian 镜像就行),后续操作全在 WSL2 里完成: 1.

【测试理论与实践】(十)Web 项目自动化测试实战:从 0 到 1 搭建博客系统 UI 自动化框架

【测试理论与实践】(十)Web 项目自动化测试实战:从 0 到 1 搭建博客系统 UI 自动化框架

目录 前言 一、项目背景与测试规划:先明确 "测什么" 和 "怎么测" 1.1 项目介绍 1.2 测试目标 1.3 测试范围与用例设计 编辑 二、环境搭建:3 步搞定自动化测试前置准备 2.1 安装核心依赖包 2.2 浏览器配置 2.3 项目目录结构设计 三、核心模块开发:封装公共工具,提高代码复用性 3.1 驱动管理与截图工具封装(common/Utils.py) 3.2 代码说明与优化点 四、测试用例开发:

【前端实战】Axios 错误处理的设计与进阶封装,实现网络层面的数据与状态解耦

【前端实战】Axios 错误处理的设计与进阶封装,实现网络层面的数据与状态解耦

目录 【前端实战】Axios 错误处理的设计与进阶封装,实现网络层面的数据与状态解耦 一、为什么网络错误处理一定要下沉到 Axios 层 二、Axios 拦截器 interceptors 1、拦截器的基础应用 2、错误分级和策略映射的设计 3、错误对象标准化 三、结语         作者:watermelo37         ZEEKLOG优质创作者、华为云云享专家、阿里云专家博主、腾讯云“创作之星”特邀作者、火山KOL、支付宝合作作者,全平台博客昵称watermelo37。         一个假装是giser的coder,做不只专注于业务逻辑的前端工程师,Java、Docker、Python、LLM均有涉猎。 --------------------------------------------------------------------- 温柔地对待温柔的人,包容的三观就是最大的温柔。 --------------------------------------------------------------------- 【前