* feat: add ZeroClaw firmware for ESP32 and Nucleo * Introduced new firmware for ZeroClaw on ESP32 and Nucleo-F401RE, enabling JSON-over-serial communication for GPIO control. * Added `zeroclaw-esp32` with support for commands like `gpio_read` and `gpio_write`, along with capabilities reporting. * Implemented `zeroclaw-nucleo` firmware with similar functionality for STM32, ensuring compatibility with existing ZeroClaw protocols. * Updated `.gitignore` to include new firmware targets and added necessary dependencies in `Cargo.toml` for both platforms. * Created README files for both firmware projects detailing setup, build, and usage instructions. Co-authored-by: Claude Opus 4.6 <noreply@anthropic.com> * feat: enhance hardware peripheral support and documentation - Added `Peripheral` trait implementation in `src/peripherals/` to manage hardware boards (STM32, RPi GPIO). - Updated `AGENTS.md` to include new extension points for peripherals and their configuration. - Introduced comprehensive documentation for adding boards and tools, including a quick start guide and supported boards. - Enhanced `Cargo.toml` to include optional dependencies for PDF extraction and peripheral support. - Created new datasheets for Arduino Uno, ESP32, and Nucleo-F401RE, detailing pin aliases and GPIO usage. - Implemented new tools for hardware memory reading and board information retrieval in the agent loop. This update significantly improves the integration and usability of hardware peripherals within the ZeroClaw framework. * feat: add ZeroClaw firmware for ESP32 and Nucleo * Introduced new firmware for ZeroClaw on ESP32 and Nucleo-F401RE, enabling JSON-over-serial communication for GPIO control. * Added `zeroclaw-esp32` with support for commands like `gpio_read` and `gpio_write`, along with capabilities reporting. * Implemented `zeroclaw-nucleo` firmware with similar functionality for STM32, ensuring compatibility with existing ZeroClaw protocols. * Updated `.gitignore` to include new firmware targets and added necessary dependencies in `Cargo.toml` for both platforms. * Created README files for both firmware projects detailing setup, build, and usage instructions. Co-authored-by: Claude Opus 4.6 <noreply@anthropic.com> * feat: enhance hardware peripheral support and documentation - Added `Peripheral` trait implementation in `src/peripherals/` to manage hardware boards (STM32, RPi GPIO). - Updated `AGENTS.md` to include new extension points for peripherals and their configuration. - Introduced comprehensive documentation for adding boards and tools, including a quick start guide and supported boards. - Enhanced `Cargo.toml` to include optional dependencies for PDF extraction and peripheral support. - Created new datasheets for Arduino Uno, ESP32, and Nucleo-F401RE, detailing pin aliases and GPIO usage. - Implemented new tools for hardware memory reading and board information retrieval in the agent loop. This update significantly improves the integration and usability of hardware peripherals within the ZeroClaw framework. * feat: Introduce hardware auto-discovery and expanded configuration options for agents, hardware, and security. * chore: update dependencies and improve probe-rs integration - Updated `Cargo.lock` to remove specific version constraints for several dependencies, including `zerocopy`, `syn`, and `strsim`, allowing for more flexibility in version resolution. - Upgraded `bincode` and `bitfield` to their latest versions, enhancing serialization and memory management capabilities. - Updated `Cargo.toml` to reflect the new version of `probe-rs` from `0.24` to `0.30`, improving hardware probing functionality. - Refactored code in `src/hardware` and `src/tools` to utilize the new `SessionConfig` for session management in `probe-rs`, ensuring better compatibility and performance. - Cleaned up documentation in `docs/datasheets/nucleo-f401re.md` by removing unnecessary lines. * fix: apply cargo fmt * docs: add hardware architecture diagram. --------- Co-authored-by: Claude Opus 4.6 <noreply@anthropic.com>
4.3 KiB
Network Deployment — ZeroClaw on Raspberry Pi and Local Network
This document covers deploying ZeroClaw on a Raspberry Pi or other host on your local network, with Telegram and optional webhook channels.
1. Overview
| Mode | Inbound port needed? | Use case |
|---|---|---|
| Telegram polling | No | ZeroClaw polls Telegram API; works from anywhere |
| Discord/Slack | No | Same — outbound only |
| Gateway webhook | Yes | POST /webhook, WhatsApp, etc. need a public URL |
| Gateway pairing | Yes | If you pair clients via the gateway |
Key: Telegram, Discord, and Slack use long-polling — ZeroClaw makes outbound requests. No port forwarding or public IP required.
2. ZeroClaw on Raspberry Pi
2.1 Prerequisites
- Raspberry Pi (3/4/5) with Raspberry Pi OS
- USB peripherals (Arduino, Nucleo) if using serial transport
- Optional:
rppalfor native GPIO (peripheral-rpifeature)
2.2 Install
# Build for RPi (or cross-compile from host)
cargo build --release --features hardware
# Or install via your preferred method
2.3 Config
Edit ~/.zeroclaw/config.toml:
[peripherals]
enabled = true
[[peripherals.boards]]
board = "rpi-gpio"
transport = "native"
# Or Arduino over USB
[[peripherals.boards]]
board = "arduino-uno"
transport = "serial"
path = "/dev/ttyACM0"
baud = 115200
[channels_config.telegram]
bot_token = "YOUR_BOT_TOKEN"
allowed_users = ["*"]
[gateway]
host = "127.0.0.1"
port = 8080
allow_public_bind = false
2.4 Run Daemon (Local Only)
zeroclaw daemon --host 127.0.0.1 --port 8080
- Gateway binds to
127.0.0.1— not reachable from other machines - Telegram channel works: ZeroClaw polls Telegram API (outbound)
- No firewall or port forwarding needed
3. Binding to 0.0.0.0 (Local Network)
To allow other devices on your LAN to hit the gateway (e.g. for pairing or webhooks):
3.1 Option A: Explicit Opt-In
[gateway]
host = "0.0.0.0"
port = 8080
allow_public_bind = true
zeroclaw daemon --host 0.0.0.0 --port 8080
Security: allow_public_bind = true exposes the gateway to your local network. Only use on trusted LANs.
3.2 Option B: Tunnel (Recommended for Webhooks)
If you need a public URL (e.g. WhatsApp webhook, external clients):
-
Run gateway on localhost:
zeroclaw daemon --host 127.0.0.1 --port 8080 -
Start a tunnel:
[tunnel] provider = "tailscale" # or "ngrok", "cloudflare"Or use
zeroclaw tunnel(see tunnel docs). -
ZeroClaw will refuse
0.0.0.0unlessallow_public_bind = trueor a tunnel is active.
4. Telegram Polling (No Inbound Port)
Telegram uses long-polling by default:
- ZeroClaw calls
https://api.telegram.org/bot{token}/getUpdates - No inbound port or public IP needed
- Works behind NAT, on RPi, in a home lab
Config:
[channels_config.telegram]
bot_token = "YOUR_BOT_TOKEN"
allowed_users = ["*"] # or specific @usernames / user IDs
Run zeroclaw daemon — Telegram channel starts automatically.
5. Webhook Channels (WhatsApp, Custom)
Webhook-based channels need a public URL so Meta (WhatsApp) or your client can POST events.
5.1 Tailscale Funnel
[tunnel]
provider = "tailscale"
Tailscale Funnel exposes your gateway via a *.ts.net URL. No port forwarding.
5.2 ngrok
[tunnel]
provider = "ngrok"
Or run ngrok manually:
ngrok http 8080
# Use the HTTPS URL for your webhook
5.3 Cloudflare Tunnel
Configure Cloudflare Tunnel to forward to 127.0.0.1:8080, then set your webhook URL to the tunnel's public hostname.
6. Checklist: RPi Deployment
- Build with
--features hardware(andperipheral-rpiif using native GPIO) - Configure
[peripherals]and[channels_config.telegram] - Run
zeroclaw daemon --host 127.0.0.1 --port 8080(Telegram works without 0.0.0.0) - For LAN access:
--host 0.0.0.0+allow_public_bind = truein config - For webhooks: use Tailscale, ngrok, or Cloudflare tunnel
7. References
- hardware-peripherals-design.md — Peripherals design
- adding-boards-and-tools.md — Hardware setup and adding boards