zeroclaw/docs/network-deployment.md
ehu shubham shaw de3ec87d16
Ehu shubham shaw contribution --> Hardware support (#306)
* feat: add ZeroClaw firmware for ESP32 and Nucleo

* Introduced new firmware for ZeroClaw on ESP32 and Nucleo-F401RE, enabling JSON-over-serial communication for GPIO control.
* Added `zeroclaw-esp32` with support for commands like `gpio_read` and `gpio_write`, along with capabilities reporting.
* Implemented `zeroclaw-nucleo` firmware with similar functionality for STM32, ensuring compatibility with existing ZeroClaw protocols.
* Updated `.gitignore` to include new firmware targets and added necessary dependencies in `Cargo.toml` for both platforms.
* Created README files for both firmware projects detailing setup, build, and usage instructions.

Co-authored-by: Claude Opus 4.6 <noreply@anthropic.com>

* feat: enhance hardware peripheral support and documentation

- Added `Peripheral` trait implementation in `src/peripherals/` to manage hardware boards (STM32, RPi GPIO).
- Updated `AGENTS.md` to include new extension points for peripherals and their configuration.
- Introduced comprehensive documentation for adding boards and tools, including a quick start guide and supported boards.
- Enhanced `Cargo.toml` to include optional dependencies for PDF extraction and peripheral support.
- Created new datasheets for Arduino Uno, ESP32, and Nucleo-F401RE, detailing pin aliases and GPIO usage.
- Implemented new tools for hardware memory reading and board information retrieval in the agent loop.

This update significantly improves the integration and usability of hardware peripherals within the ZeroClaw framework.

* feat: add ZeroClaw firmware for ESP32 and Nucleo

* Introduced new firmware for ZeroClaw on ESP32 and Nucleo-F401RE, enabling JSON-over-serial communication for GPIO control.
* Added `zeroclaw-esp32` with support for commands like `gpio_read` and `gpio_write`, along with capabilities reporting.
* Implemented `zeroclaw-nucleo` firmware with similar functionality for STM32, ensuring compatibility with existing ZeroClaw protocols.
* Updated `.gitignore` to include new firmware targets and added necessary dependencies in `Cargo.toml` for both platforms.
* Created README files for both firmware projects detailing setup, build, and usage instructions.

Co-authored-by: Claude Opus 4.6 <noreply@anthropic.com>

* feat: enhance hardware peripheral support and documentation

- Added `Peripheral` trait implementation in `src/peripherals/` to manage hardware boards (STM32, RPi GPIO).
- Updated `AGENTS.md` to include new extension points for peripherals and their configuration.
- Introduced comprehensive documentation for adding boards and tools, including a quick start guide and supported boards.
- Enhanced `Cargo.toml` to include optional dependencies for PDF extraction and peripheral support.
- Created new datasheets for Arduino Uno, ESP32, and Nucleo-F401RE, detailing pin aliases and GPIO usage.
- Implemented new tools for hardware memory reading and board information retrieval in the agent loop.

This update significantly improves the integration and usability of hardware peripherals within the ZeroClaw framework.

* feat: Introduce hardware auto-discovery and expanded configuration options for agents, hardware, and security.

* chore: update dependencies and improve probe-rs integration

- Updated `Cargo.lock` to remove specific version constraints for several dependencies, including `zerocopy`, `syn`, and `strsim`, allowing for more flexibility in version resolution.
- Upgraded `bincode` and `bitfield` to their latest versions, enhancing serialization and memory management capabilities.
- Updated `Cargo.toml` to reflect the new version of `probe-rs` from `0.24` to `0.30`, improving hardware probing functionality.
- Refactored code in `src/hardware` and `src/tools` to utilize the new `SessionConfig` for session management in `probe-rs`, ensuring better compatibility and performance.
- Cleaned up documentation in `docs/datasheets/nucleo-f401re.md` by removing unnecessary lines.

* fix: apply cargo fmt

* docs: add hardware architecture diagram.

---------

Co-authored-by: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-16 11:40:10 -05:00

4.3 KiB

Network Deployment — ZeroClaw on Raspberry Pi and Local Network

This document covers deploying ZeroClaw on a Raspberry Pi or other host on your local network, with Telegram and optional webhook channels.


1. Overview

Mode Inbound port needed? Use case
Telegram polling No ZeroClaw polls Telegram API; works from anywhere
Discord/Slack No Same — outbound only
Gateway webhook Yes POST /webhook, WhatsApp, etc. need a public URL
Gateway pairing Yes If you pair clients via the gateway

Key: Telegram, Discord, and Slack use long-polling — ZeroClaw makes outbound requests. No port forwarding or public IP required.


2. ZeroClaw on Raspberry Pi

2.1 Prerequisites

  • Raspberry Pi (3/4/5) with Raspberry Pi OS
  • USB peripherals (Arduino, Nucleo) if using serial transport
  • Optional: rppal for native GPIO (peripheral-rpi feature)

2.2 Install

# Build for RPi (or cross-compile from host)
cargo build --release --features hardware

# Or install via your preferred method

2.3 Config

Edit ~/.zeroclaw/config.toml:

[peripherals]
enabled = true

[[peripherals.boards]]
board = "rpi-gpio"
transport = "native"

# Or Arduino over USB
[[peripherals.boards]]
board = "arduino-uno"
transport = "serial"
path = "/dev/ttyACM0"
baud = 115200

[channels_config.telegram]
bot_token = "YOUR_BOT_TOKEN"
allowed_users = ["*"]

[gateway]
host = "127.0.0.1"
port = 8080
allow_public_bind = false

2.4 Run Daemon (Local Only)

zeroclaw daemon --host 127.0.0.1 --port 8080
  • Gateway binds to 127.0.0.1 — not reachable from other machines
  • Telegram channel works: ZeroClaw polls Telegram API (outbound)
  • No firewall or port forwarding needed

3. Binding to 0.0.0.0 (Local Network)

To allow other devices on your LAN to hit the gateway (e.g. for pairing or webhooks):

3.1 Option A: Explicit Opt-In

[gateway]
host = "0.0.0.0"
port = 8080
allow_public_bind = true
zeroclaw daemon --host 0.0.0.0 --port 8080

Security: allow_public_bind = true exposes the gateway to your local network. Only use on trusted LANs.

If you need a public URL (e.g. WhatsApp webhook, external clients):

  1. Run gateway on localhost:

    zeroclaw daemon --host 127.0.0.1 --port 8080
    
  2. Start a tunnel:

    [tunnel]
    provider = "tailscale"   # or "ngrok", "cloudflare"
    

    Or use zeroclaw tunnel (see tunnel docs).

  3. ZeroClaw will refuse 0.0.0.0 unless allow_public_bind = true or a tunnel is active.


4. Telegram Polling (No Inbound Port)

Telegram uses long-polling by default:

  • ZeroClaw calls https://api.telegram.org/bot{token}/getUpdates
  • No inbound port or public IP needed
  • Works behind NAT, on RPi, in a home lab

Config:

[channels_config.telegram]
bot_token = "YOUR_BOT_TOKEN"
allowed_users = ["*"]   # or specific @usernames / user IDs

Run zeroclaw daemon — Telegram channel starts automatically.


5. Webhook Channels (WhatsApp, Custom)

Webhook-based channels need a public URL so Meta (WhatsApp) or your client can POST events.

5.1 Tailscale Funnel

[tunnel]
provider = "tailscale"

Tailscale Funnel exposes your gateway via a *.ts.net URL. No port forwarding.

5.2 ngrok

[tunnel]
provider = "ngrok"

Or run ngrok manually:

ngrok http 8080
# Use the HTTPS URL for your webhook

5.3 Cloudflare Tunnel

Configure Cloudflare Tunnel to forward to 127.0.0.1:8080, then set your webhook URL to the tunnel's public hostname.


6. Checklist: RPi Deployment

  • Build with --features hardware (and peripheral-rpi if using native GPIO)
  • Configure [peripherals] and [channels_config.telegram]
  • Run zeroclaw daemon --host 127.0.0.1 --port 8080 (Telegram works without 0.0.0.0)
  • For LAN access: --host 0.0.0.0 + allow_public_bind = true in config
  • For webhooks: use Tailscale, ngrok, or Cloudflare tunnel

7. References