Skip to content

Environment Variables

clauderon uses environment variables for configuration, feature flags, and credential management.

Daemon Configuration

Core Settings

VariableDescriptionDefault
RUST_LOGLog level filterclauderon=info
CLAUDERON_BIND_ADDRHTTP bind address127.0.0.1
CLAUDERON_DEVEnable development mode0

WebAuthn

VariableDescriptionDefault
CLAUDERON_ORIGINWebAuthn origin URLAuto-detected

Feature Flags

Enable features via environment variables (set to 1 or true):

VariableDescription
CLAUDERON_FEATURE_ENABLE_WEBAUTHN_AUTHPasswordless authentication
CLAUDERON_FEATURE_ENABLE_AI_METADATAAI-generated session titles
CLAUDERON_FEATURE_ENABLE_AUTO_RECONCILEAuto-reconcile on startup
CLAUDERON_FEATURE_ENABLE_USAGE_TRACKINGClaude usage tracking
CLAUDERON_FEATURE_ENABLE_KUBERNETES_BACKENDKubernetes backend
CLAUDERON_FEATURE_ENABLE_PROXY_PORT_REUSEProxy port reuse

Example

Terminal window
export CLAUDERON_FEATURE_ENABLE_AI_METADATA=1
export CLAUDERON_FEATURE_ENABLE_AUTO_RECONCILE=true
clauderon daemon

Credentials

Store credentials as environment variables (highest priority):

VariableServiceUsed For
GITHUB_TOKENGitHubAPI access, git operations
CLAUDE_CODE_OAUTH_TOKENAnthropicClaude Code agent
OPENAI_API_KEYOpenAICodex agent
CODEX_API_KEYOpenAICodex agent (alternative)
GOOGLE_API_KEYGoogleGemini agent
PAGERDUTY_TOKENPagerDutyIncident management
SENTRY_AUTH_TOKENSentryError tracking
GRAFANA_API_KEYGrafanaMonitoring
NPM_TOKENnpmPackage registry
DOCKER_TOKENDocker HubContainer registry
SPRITES_API_KEYsprites.devSprites backend
K8S_TOKENKubernetesCluster access
TALOS_TOKENTalosTalos cluster access

Example

Terminal window
export GITHUB_TOKEN="ghp_xxxxxxxxxxxx"
export CLAUDE_CODE_OAUTH_TOKEN="your-oauth-token"
clauderon daemon

Session Environment

These variables are set inside sessions:

Proxy Configuration

VariableValuePurpose
HTTP_PROXYhttp://<host>:<port>HTTP proxy address
HTTPS_PROXYhttp://<host>:<port>HTTPS proxy address
NO_PROXYlocalhost,127.0.0.1Proxy bypass list

TLS Configuration

VariableValuePurpose
SSL_CERT_FILE/etc/clauderon/proxy-ca.pemCA certificate
NODE_EXTRA_CA_CERTS/etc/clauderon/proxy-ca.pemNode.js CA
REQUESTS_CA_BUNDLE/etc/clauderon/proxy-ca.pemPython requests CA
CURL_CA_BUNDLE/etc/clauderon/proxy-ca.pemcurl CA

Session Metadata

VariableValuePurpose
CLAUDERON_SESSION_IDSession UUIDSession identifier
CLAUDERON_SESSION_NAMESession nameHuman-readable name
CLAUDERON_BACKENDBackend typezellij, docker, etc.
CLAUDERON_AGENTAgent typeclaude, codex, gemini
CLAUDERON_ACCESS_MODEAccess moderead-only, read-write

1Password Integration

VariableDescription
OP_SERVICE_ACCOUNT_TOKEN1Password service account token

Required for headless 1Password access.

Priority

Credential resolution priority (highest to lowest):

  1. Environment variables
  2. 1Password references
  3. Secret files (~/.clauderon/secrets/)

Docker-Specific

When using Docker backend:

VariableValue
DOCKER_HOSTUses system default

Kubernetes-Specific

When using Kubernetes backend:

VariableDescription
KUBECONFIGPath to kubeconfig file

Debugging

Verbose Logging

Terminal window
RUST_LOG=clauderon=debug clauderon daemon

Trace Logging

Terminal window
RUST_LOG=clauderon=trace clauderon daemon

Module-Specific Logging

Terminal window
RUST_LOG=clauderon::proxy=debug,clauderon::session=trace clauderon daemon

Shell Configuration

Bash/Zsh

Add to ~/.bashrc or ~/.zshrc:

Terminal window
export GITHUB_TOKEN="ghp_xxxx"
export CLAUDE_CODE_OAUTH_TOKEN="your-token"
export CLAUDERON_FEATURE_ENABLE_AI_METADATA=1

Fish

Add to ~/.config/fish/config.fish:

set -gx GITHUB_TOKEN "ghp_xxxx"
set -gx CLAUDE_CODE_OAUTH_TOKEN "your-token"
set -gx CLAUDERON_FEATURE_ENABLE_AI_METADATA 1

systemd Service

Create /etc/systemd/system/clauderon.service:

[Unit]
Description=clauderon daemon
After=network.target
[Service]
Type=simple
User=youruser
Environment="RUST_LOG=clauderon=info"
Environment="CLAUDERON_FEATURE_ENABLE_AI_METADATA=1"
ExecStart=/usr/local/bin/clauderon daemon
Restart=on-failure
[Install]
WantedBy=multi-user.target

See Also