hsiegeln 67df61e044 docs: scrub siegeln.net and LAN IPs from customer-facing docs
Replace personal-infra references with brand-aligned placeholders so
the public-facing setup docs no longer leak the user's home lab.

- HOWTO.md: cameleer.siegeln.net OIDC example → cameleer.example.com;
  loader-image default in env-var table → registry.cameleer.io (matches
  the production default flipped in the previous commit); k3s service-URL
  table 192.168.50.86 → <your-cluster-host>
- ui/README.md: dev-server VITE_API_TARGET example LAN IP → host placeholder
- ui/vite.config.ts: api.cameleer.siegeln.net comment → api.cameleer.example.com

Out of scope (intentionally kept on internal infra):
- ui/package.json dev:remote and generate-api:live LAN IPs (dev-team
  convenience scripts)
- pom.xml, .npmrc, ui/Dockerfile (buildtime registry)
- deploy/* manifests (internal k3s)
- CLAUDE.md and .claude/rules/cicd.md (handled in the next commit, which
  also adds the buildtime/public split clarification)

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-28 16:49:34 +02:00
2026-04-15 15:28:42 +02:00
Description
Observability server for Cameleer agents
27 MiB
Languages
Java 64.3%
TypeScript 28.1%
HTML 4.8%
CSS 2.7%