Add CAMELEER_JWT_SECRET to K8s deployment secrets #45

Closed
opened 2026-03-14 12:39:07 +01:00 by claude · 2 comments
Owner

Context

JWT secret is now configurable via CAMELEER_JWT_SECRET env var (a4de2a7). Without it, tokens are invalidated on every server restart causing agent re-registration storms.

Steps

  1. Generate a stable secret: openssl rand -base64 32
  2. Add CAMELEER_JWT_SECRET to the cameleer-auth K8s Secret in deploy/ manifests
  3. Add it to the CI deploy step where secrets are created (--dry-run=client | kubectl apply)
  4. Add to Gitea org secrets: CAMELEER_JWT_SECRET
  5. Update the server Deployment to mount the secret as an env var

Impact

Tokens survive server restarts. Agents no longer need to re-register after deployments.

## Context JWT secret is now configurable via `CAMELEER_JWT_SECRET` env var (a4de2a7). Without it, tokens are invalidated on every server restart causing agent re-registration storms. ## Steps 1. Generate a stable secret: `openssl rand -base64 32` 2. Add `CAMELEER_JWT_SECRET` to the `cameleer-auth` K8s Secret in `deploy/` manifests 3. Add it to the CI deploy step where secrets are created (`--dry-run=client | kubectl apply`) 4. Add to Gitea org secrets: `CAMELEER_JWT_SECRET` 5. Update the server Deployment to mount the secret as an env var ## Impact Tokens survive server restarts. Agents no longer need to re-register after deployments.
Author
Owner

Already present in deploy/server.yamlCAMELEER_JWT_SECRET env var sourced from secret cameleer-auth.

Already present in `deploy/server.yaml` — `CAMELEER_JWT_SECRET` env var sourced from secret `cameleer-auth`.
Author
Owner

Resolved — CAMELEER_JWT_SECRET is already configured in deploy/server.yaml (lines 57-62), sourced from the cameleer-auth K8s secret. Closing.

Resolved — `CAMELEER_JWT_SECRET` is already configured in `deploy/server.yaml` (lines 57-62), sourced from the `cameleer-auth` K8s secret. Closing.
Sign in to join this conversation.