feat(auth): integrate TinyAuth SSO for NetBox authentication
Deploy TinyAuth v4 as CT 115 (192.168.2.10) to provide centralized SSO authentication for NetBox via Nginx Proxy Manager. **New Infrastructure:** - CT 115: TinyAuth authentication layer - Domain: tinyauth.apophisnetworking.net - Integration: NPM auth_request → TinyAuth → NetBox **Configuration:** - Docker Compose with bcrypt-hashed credentials - NPM advanced config for auth_request integration - HTTPS enforcement via SSL termination **Issues Resolved:** - 500 Internal Server Error (Nginx config syntax) - "IP addresses not allowed" (APP_URL domain requirement) - Port mapping (8000:3000 for internal port 3000) - Invalid password (bcrypt hash requirement for v4) **Documentation:** - Complete TinyAuth README at services/tinyauth/README.md - Updated CLAUDE_STATUS.md with CT 115 infrastructure - Added bug report for scribe agent tool permissions **Note:** Container restart required on CT 115 to apply bcrypt hash 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
This commit is contained in:
@@ -0,0 +1,9 @@
|
||||
-----BEGIN PUBLIC KEY-----
|
||||
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAw4XzwC3lnZI8bpmEOrjU
|
||||
56ybC2ZNGx+T/MFJMZDjuzVR1Z3ZzsVQq+fIVQAkb/rb/rpbBqJleWbQo4xf8ra+
|
||||
lQRfZA6C4R6d9/JTdlAaRG5MdW0VlmVF52dRF3Bmh3fQIRPryaoKBODbxRh290mv
|
||||
eWKhulOhEqLF7VYsjsDOuPShCfSqRFP7uapYgJDg4zEvZVH+tPsGmjnKajoAWmuj
|
||||
pkX288RHx4se/FF2H174lrNouWsMBTfVhcr04Y+hbzdqmVuyUGamg98EmFmNHyPw
|
||||
KQ0e8xrKZejfjnBYRH3KY6Qqyaj4KnRefSFvcqOK8qSqZ2qD/GWOwPXF05bojU5M
|
||||
bQIDAQAB
|
||||
-----END PUBLIC KEY-----
|
||||
@@ -0,0 +1 @@
|
||||
keyboard: en-us
|
||||
@@ -0,0 +1,30 @@
|
||||
dir: local
|
||||
path /var/lib/vz
|
||||
content vztmpl,iso,backup
|
||||
|
||||
lvmthin: local-lvm
|
||||
thinpool data
|
||||
vgname pve
|
||||
content images,rootdir
|
||||
|
||||
zfspool: Vault
|
||||
pool Vault
|
||||
content rootdir,images
|
||||
mountpoint /Vault
|
||||
nodes serviceslab
|
||||
|
||||
pbs: PBS-Backups
|
||||
datastore backups
|
||||
server 192.168.2.151
|
||||
content backup
|
||||
fingerprint dc:7c:c6:19:f3:79:1c:f0:a9:36:3c:b0:6d:9f:8e:9a:53:c3:70:de:b8:a8:7a:c9:3a:4e:38:fb:60:f9:10:8f
|
||||
prune-backups keep-all=1
|
||||
username root@pam
|
||||
|
||||
nfs: iso-share
|
||||
export /mnt/Vauly/iso-vault
|
||||
path /mnt/pve/iso-share
|
||||
server 192.168.2.150
|
||||
content iso
|
||||
prune-backups keep-all=1
|
||||
|
||||
@@ -0,0 +1,19 @@
|
||||
user:api@pam:1:0::::::
|
||||
token:api@pam!homepage:0:1::
|
||||
user:monitoring@pve:1:0::::::
|
||||
user:root@pam:1:0:::jramosdirect2@gmail.com:::
|
||||
token:root@pam!packer:0:0::
|
||||
token:root@pam!tui:0:0::
|
||||
user:terraform@pam:1:0::::::
|
||||
token:terraform@pam!terraform:0:0::
|
||||
|
||||
group:api-ro:api@pam::
|
||||
group:terraform:terraform@pam::
|
||||
|
||||
|
||||
role:TerraformProvision:Datastore.AllocateSpace,Datastore.Audit,Pool.Allocate,SDN.Use,Sys.Audit,Sys.Console,Sys.Modify,Sys.PowerMgmt,VM.Allocate,VM.Audit,VM.Clone,VM.Config.CDROM,VM.Config.CPU,VM.Config.Cloudinit,VM.Config.Disk,VM.Config.HWType,VM.Config.Memory,VM.Config.Network,VM.Config.Options,VM.Migrate,VM.Monitor,VM.PowerMgmt:
|
||||
|
||||
acl:1:/:root@pam!packer:Administrator:
|
||||
acl:1:/:monitoring@pve:PVEAdmin:
|
||||
acl:1:/:@api-ro,api@pam!homepage:PVEAuditor:
|
||||
acl:1:/:@terraform:TerraformProvision:
|
||||
Reference in New Issue
Block a user