Add CAMELEER_JWT_SECRET to K8s deployment secrets #45
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Context
JWT secret is now configurable via
CAMELEER_JWT_SECRETenv var (a4de2a7). Without it, tokens are invalidated on every server restart causing agent re-registration storms.Steps
openssl rand -base64 32CAMELEER_JWT_SECRETto thecameleer-authK8s Secret indeploy/manifests--dry-run=client | kubectl apply)CAMELEER_JWT_SECRETImpact
Tokens survive server restarts. Agents no longer need to re-register after deployments.
Already present in
deploy/server.yaml—CAMELEER_JWT_SECRETenv var sourced from secretcameleer-auth.Resolved —
CAMELEER_JWT_SECRETis already configured indeploy/server.yaml(lines 57-62), sourced from thecameleer-authK8s secret. Closing.