Cloudflare Wrangler & Pages
Manage Cloudflare Workers, KV, D1, R2, and secrets using the Wrangler CLI. Use when deploying workers, managing databases, storing objects, or configuring Cl...
Description
name: cloudflare description: Manage Cloudflare Workers, KV, D1, R2, and secrets using the Wrangler CLI. Use when deploying workers, managing databases, storing objects, or configuring Cloudflare resources. Covers worker deployment, KV namespaces, D1 SQL databases, R2 object storage, secrets management, and tailing logs.
Cloudflare (Wrangler CLI)
Manage Cloudflare Workers and associated services via the wrangler CLI.
R2 Configuration
Credentials stored in ~/.openclaw/secrets.json under cloudflare.r2:
{
"cloudflare": {
"apiToken": "<main API token>",
"r2": {
"accessKeyId": "<R2 access key>",
"secretAccessKey": "<R2 secret key>",
"endpoint": "https://<accountId>.r2.cloudflarestorage.com",
"bucket": "openclaw"
}
}
}
Lifecycle Rules (auto-delete)
R2 lifecycle rules auto-delete objects after N days. Minimum granularity is 1 day (no hours/minutes).
import boto3
from botocore.config import Config
client = boto3.client("s3", endpoint_url=r2["endpoint"],
aws_access_key_id=r2["accessKeyId"],
aws_secret_access_key=r2["secretAccessKey"],
region_name="auto", config=Config(signature_version="s3v4"))
client.put_bucket_lifecycle_configuration(
Bucket="openclaw",
LifecycleConfiguration={
"Rules": [{
"ID": "auto-delete-uploads",
"Status": "Enabled",
"Filter": {"Prefix": "uploads/"},
"Expiration": {"Days": 1},
}]
}
)
Active rule on
openclawbucket:uploads/*→ deleted after 1 day. Presigned URLs expire in 1 min (no access), objects cleaned up within 24h.
Generate presigned URL (Node.js)
import { S3Client, GetObjectCommand } from "@aws-sdk/client-s3";
import { getSignedUrl } from "@aws-sdk/s3-request-presigner";
import { readFileSync } from "fs";
const { cloudflare: { r2 } } = JSON.parse(readFileSync(`${process.env.HOME}/.openclaw/secrets.json`));
const client = new S3Client({
region: "auto",
endpoint: r2.endpoint,
credentials: { accessKeyId: r2.accessKeyId, secretAccessKey: r2.secretAccessKey },
});
const url = await getSignedUrl(
client,
new GetObjectCommand({ Bucket: r2.bucket, Key: "my-file.txt" }),
{ expiresIn: 600 } // 10 minutes
);
Prerequisites
- Node.js v20+ required
- Install:
npm install -g wrangleror use project-localnpx wrangler - Auth: Token stored in
~/.openclaw/secrets.jsonundercloudflare.apiToken - To use with curl/API calls:
TOKEN=$(jq -r '.cloudflare.apiToken' ~/.openclaw/secrets.json) - To use with wrangler CLI:
export CLOUDFLARE_API_TOKEN=$(jq -r '.cloudflare.apiToken' ~/.openclaw/secrets.json) - Verify:
wrangler whoami
Quick Reference
Workers
# Initialize new worker
wrangler init <name>
# Local development
wrangler dev [script]
# Deploy
wrangler deploy [script]
# List deployments
wrangler deployments list
# View deployment
wrangler deployments view [deployment-id]
# Rollback
wrangler rollback [version-id]
# Delete worker
wrangler delete [name]
# Tail logs (live)
wrangler tail [worker]
Secrets
# Add/update secret (interactive)
wrangler secret put <key>
# Add secret from stdin
echo "value" | wrangler secret put <key>
# List secrets
wrangler secret list
# Delete secret
wrangler secret delete <key>
# Bulk upload from JSON file
wrangler secret bulk secrets.json
KV (Key-Value Store)
# Create namespace
wrangler kv namespace create <name>
# List namespaces
wrangler kv namespace list
# Delete namespace
wrangler kv namespace delete --namespace-id <id>
# Put key
wrangler kv key put <key> <value> --namespace-id <id>
# Get key
wrangler kv key get <key> --namespace-id <id>
# Delete key
wrangler kv key delete <key> --namespace-id <id>
# List keys
wrangler kv key list --namespace-id <id>
# Bulk operations (JSON file)
wrangler kv bulk put <file> --namespace-id <id>
wrangler kv bulk delete <file> --namespace-id <id>
D1 (SQL Database)
# Create database
wrangler d1 create <name>
# List databases
wrangler d1 list
# Database info
wrangler d1 info <name>
# Execute SQL
wrangler d1 execute <database> --command "SELECT * FROM users"
# Execute SQL file
wrangler d1 execute <database> --file schema.sql
# Local execution (for dev)
wrangler d1 execute <database> --local --command "..."
# Export database
wrangler d1 export <name> --output backup.sql
# Delete database
wrangler d1 delete <name>
# Migrations
wrangler d1 migrations create <database> <name>
wrangler d1 migrations apply <database>
wrangler d1 migrations list <database>
R2 (Object Storage)
# Create bucket
wrangler r2 bucket create <name>
# List buckets
wrangler r2 bucket list
# Delete bucket
wrangler r2 bucket delete <name>
# Upload object
wrangler r2 object put <bucket>/<key> --file <path>
# Download object
wrangler r2 object get <bucket>/<key> --file <path>
# Delete object
wrangler r2 object delete <bucket>/<key>
Queues
# Create queue
wrangler queues create <name>
# List queues
wrangler queues list
# Delete queue
wrangler queues delete <name>
Configuration Files
Wrangler supports both TOML and JSON/JSONC config formats:
wrangler.toml— traditional formatwrangler.jsonorwrangler.jsonc— newer, with JSON schema support
⚠️ Important: If both exist, JSON takes precedence. Pick one format to avoid confusion where edits to TOML are ignored.
JSONC format (with schema autocomplete)
{
"$schema": "./node_modules/wrangler/config-schema.json",
"name": "my-worker",
"main": "src/index.ts",
"compatibility_date": "2024-12-30"
}
TOML format
name = "my-worker"
main = "src/index.ts"
compatibility_date = "2024-12-30"
With bindings:
name = "my-worker"
main = "src/index.ts"
compatibility_date = "2024-12-30"
# KV binding
[[kv_namespaces]]
binding = "MY_KV"
id = "xxx"
# D1 binding
[[d1_databases]]
binding = "DB"
database_name = "my-db"
database_id = "xxx"
# R2 binding
[[r2_buckets]]
binding = "BUCKET"
bucket_name = "my-bucket"
# Environment variables
[vars]
API_URL = "https://api.example.com"
# Secrets (set via `wrangler secret put`)
# Referenced as env.SECRET_NAME in worker code
Static assets (for frameworks like Next.js):
name = "my-site"
main = ".open-next/worker.js"
compatibility_date = "2024-12-30"
compatibility_flags = ["nodejs_compat"]
[assets]
directory = ".open-next/assets"
binding = "ASSETS"
Common Patterns
Deploy with environment
wrangler deploy -e production
wrangler deploy -e staging
Custom domain (via dashboard or API)
Custom domains must be configured in the Cloudflare dashboard under Worker Settings > Domains & Routes, or via the Cloudflare API. Wrangler doesn't directly manage custom domains.
Local development with bindings
# Creates local D1/KV/R2 for dev
wrangler dev --local
Checking deployment status
wrangler deployments list
wrangler deployments view
Pages (Static Sites)
Deploy via Wrangler CLI
# IMPORTANT: wrangler pages deploy requires BOTH env vars
export CLOUDFLARE_API_TOKEN=$(jq -r '.cloudflare.apiToken' ~/.openclaw/secrets.json)
export CLOUDFLARE_ACCOUNT_ID=b4c7ead049e93e5c5d1c4f4415864c8a
npx wrangler pages deploy dist --project-name=my-project
⚠️
--account-idflag does NOT exist forwrangler pages deploy— you must use theCLOUDFLARE_ACCOUNT_IDenv var. The--project-nameflag is enough alongside env vars.
Create Pages project via API
TOKEN=$(jq -r '.cloudflare.apiToken' ~/.openclaw/secrets.json)
curl -s -X POST "https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/pages/projects" \
-H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{"name":"my-project","production_branch":"main"}'
Add custom domain to Pages project
curl -s -X POST "https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/pages/projects/my-project/domains" \
-H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{"name":"example.com"}'
Set production deployment
curl -s -X PATCH "https://api.cloudflare.com/client/v4/accounts/$ACCOUNT_ID/pages/projects/my-project" \
-H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{"production_deployment": "<deploy-id>"}'
DNS for custom domain
- Root domain must be a CNAME pointing to
<project>.pages.devwith proxied: true - If the zone is already on Cloudflare, Pages auto-validates ownership via HTTP
- Common gotcha: stale NS records from old registrar (e.g. GoDaddy) may appear in zone but don't affect routing — they can be safely deleted
- Check actual nameservers with
dig NS example.com +short— should show*.ns.cloudflare.com
Pages API — Direct Upload (without wrangler)
If wrangler auth fails (e.g. zone-scoped token), use multipart form upload directly:
import hashlib, json, mimetypes, requests
from pathlib import Path
TOKEN = "..."
ACCOUNT_ID = "..."
PROJECT = "my-project"
DIST = Path("./dist")
headers = {"Authorization": f"Bearer {TOKEN}"}
files_list = sorted([f for f in DIST.rglob("*") if f.is_file()])
manifest = {}
file_map = {}
for f in files_list:
rel = "/" + str(f.relative_to(DIST))
content = f.read_bytes()
h = hashlib.sha256(content).hexdigest()
manifest[rel] = h
file_map[h] = (f, content)
# Part names = file SHA256 hashes; manifest is a separate JSON part
multipart = [("manifest", (None, json.dumps(manifest), "application/json"))]
for h, (f, content) in file_map.items():
mime = mimetypes.guess_type(str(f))[0] or "application/octet-stream"
multipart.append((h, (f.name, content, mime)))
resp = requests.post(
f"https://api.cloudflare.com/client/v4/accounts/{ACCOUNT_ID}/pages/projects/{PROJECT}/deployments",
headers=headers,
files=multipart,
)
print(resp.json()["result"]["url"])
What Wrangler Does NOT Do
- DNS management — Use the Cloudflare dashboard or API for DNS records
- Custom domains — Configure via dashboard (Worker Settings > Domains & Routes) or API
- SSL certificates — Managed automatically by Cloudflare when custom domains are added
- Firewall/WAF rules — Use dashboard or API
For DNS/domain management, see the cloudflare skill (uses Cloudflare API directly).
Troubleshooting
| Issue | Solution |
|---|---|
| "Not authenticated" | Run wrangler login |
| Node version error | Requires Node.js v20+ |
| "No config found" | Ensure config file exists (wrangler.toml or wrangler.jsonc) or use -c path/to/config |
| Config changes ignored | Check for wrangler.json/wrangler.jsonc — JSON takes precedence over TOML |
| Binding not found | Check wrangler.toml bindings match code references |
Resources
Reviews (0)
No reviews yet. Be the first to review!
Comments (0)
No comments yet. Be the first to share your thoughts!