Skip to content

Worker bindings & secrets

ADMINISTRATOR ::: danger Restricted

:::

The Worker pms-system-builder is configured in wrangler.jsonc. Account 9dac569398e062114feee83bf22f9636, email getsov75@gmail.com.

Bindings

TypeVariableResource
D1DBpms-db (4e00e088-b574-4f81-9b0c-bd41c6264034)
D1RAG_DBrag-corpus
R2BACKUPSbucket pms
VectorizeVEC(account-scoped)
Queue producerCHAIN_C_STEPS_QUEUEchain-c-steps
Queue consumer(binding)chain-c-steps (DLQ chain-c-steps-dlq)
AIAIWorkers AI
Asset bucketASSETSstatic SPA

Vars (non-secret)

VarValue
EMBEDDING_MODEL(per wrangler.jsonc)
GITHUB_REPO_OWNERgetsov75-maker (added v2.30.0)

Secrets

Already set — do NOT re-set without reason

Re-setting a secret invalidates every running edge worker until propagation finishes (~30 s). Only rotate when explicitly required.

SecretPurpose
CLAUDE_API_KEYAnthropic API
GOOGLE_AI_KEYGemini
PERPLEXITY_API_KEYPerplexity Sonar
MOONSHOT_API_KEYKimi (rotated 2026-04-23)
Z_API_*DEAD — instance suspended, kept only because removal triggers a redeploy
GITHUB_REPO_TOKENFor internal one-off workflows
POSTMARK_TOKENEmail mirror (Postmark Send Email API)

GitHub repo secrets

SecretPurpose
MOONSHOT_API_KEYKimi remap workflow (rotated 2026-04-23)
CF_API_TOKENWrangler deploy in CI (rotated 2026-04-23)
CF_ACCOUNT_ID9dac569398e062114feee83bf22f9636
D1_DATABASE_ID4e00e088-b574-4f81-9b0c-bd41c6264034

Cron triggers

*/10 * * * *   classifier sweep + watchdogs
0   3 * * *    R2 daily backup
0   4 * * *    R2 retention sweep (30-day)
0   2 * * *    RAG eval cron
0   * * * *    session GC

How to rotate a secret

bash
# from repo root, with wrangler authed to the right account
wrangler secret put CLAUDE_API_KEY
# paste new value, hit Enter

# verify the worker is healthy
curl https://pmsplanner.com/api/health | jq .version

If the new key is wrong, the next AI-routed call will fail. Watch /api/ai-status for the failure spike, then re-rotate.

RAPAX PMS Help · v2.31.0.26 · released 2026-04-28