Vouch Request: Fix SSH handshake secret persistence across restarts #506
Closed
mak1jk
started this conversation in
Vouch Request
Replies: 1 comment
-
|
Thanks for opening this discussion. We have a ticket for this here, #487, and am I actively working on the item here, #488. We should have this fixed early next week. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
I'd like to fix the SSH handshake secret persistence issue that causes sandbox connectivity to break after container restarts.
Root Cause
deploy/docker/cluster-entrypoint.shgenerates a new randomSSH_HANDSHAKE_SECRETon every start, but the Sandbox CRD retains the old secret in its pod spec. After restart, the gateway's secret doesn't match the sandbox's, causinghandshake verification failederrors.Fix
Persist the generated secret to
/var/lib/rancher/k3s/server/ssh-secret.datand reuse it on subsequent starts. The env var override is preserved for manual overrides. This ensures the gateway always injects the same secret, matching what the Sandbox CRD already has.Verification
I diagnosed this locally on Ubuntu/WSL2 with NemoClaw v0.1.0 + OpenShell v0.0.11:
openshell ssh-proxythrough the gateway to the sandboxOPENSHELL_SSH_HANDSHAKE_SECRETenv vars betweenopenshell-0and the sandbox pod after restart — confirmed they divergeopenshell sandbox connectworks afterdocker restartI can explain every line of the change and how it interacts with the HelmChart template injection, K3s manifest lifecycle, and Sandbox CRD pod spec.
Related
fix/persist-ssh-handshake-secretBeta Was this translation helpful? Give feedback.
All reactions