feat(auth): integrate TinyAuth SSO for NetBox authentication

Deploy TinyAuth v4 as CT 115 (192.168.2.10) to provide centralized
SSO authentication for NetBox via Nginx Proxy Manager.

**New Infrastructure:**
- CT 115: TinyAuth authentication layer
- Domain: tinyauth.apophisnetworking.net
- Integration: NPM auth_request → TinyAuth → NetBox

**Configuration:**
- Docker Compose with bcrypt-hashed credentials
- NPM advanced config for auth_request integration
- HTTPS enforcement via SSL termination

**Issues Resolved:**
- 500 Internal Server Error (Nginx config syntax)
- "IP addresses not allowed" (APP_URL domain requirement)
- Port mapping (8000:3000 for internal port 3000)
- Invalid password (bcrypt hash requirement for v4)

**Documentation:**
- Complete TinyAuth README at services/tinyauth/README.md
- Updated CLAUDE_STATUS.md with CT 115 infrastructure
- Added bug report for scribe agent tool permissions

**Note:** Container restart required on CT 115 to apply bcrypt hash

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
This commit is contained in:
2025-12-18 08:15:05 -07:00
parent 07f9638d8b
commit c4962194e3
70 changed files with 1263 additions and 543 deletions

View File

@@ -0,0 +1,9 @@
-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAw4XzwC3lnZI8bpmEOrjU
56ybC2ZNGx+T/MFJMZDjuzVR1Z3ZzsVQq+fIVQAkb/rb/rpbBqJleWbQo4xf8ra+
lQRfZA6C4R6d9/JTdlAaRG5MdW0VlmVF52dRF3Bmh3fQIRPryaoKBODbxRh290mv
eWKhulOhEqLF7VYsjsDOuPShCfSqRFP7uapYgJDg4zEvZVH+tPsGmjnKajoAWmuj
pkX288RHx4se/FF2H174lrNouWsMBTfVhcr04Y+hbzdqmVuyUGamg98EmFmNHyPw
KQ0e8xrKZejfjnBYRH3KY6Qqyaj4KnRefSFvcqOK8qSqZ2qD/GWOwPXF05bojU5M
bQIDAQAB
-----END PUBLIC KEY-----

View File

@@ -0,0 +1 @@
keyboard: en-us

View File

@@ -0,0 +1,30 @@
dir: local
path /var/lib/vz
content vztmpl,iso,backup
lvmthin: local-lvm
thinpool data
vgname pve
content images,rootdir
zfspool: Vault
pool Vault
content rootdir,images
mountpoint /Vault
nodes serviceslab
pbs: PBS-Backups
datastore backups
server 192.168.2.151
content backup
fingerprint dc:7c:c6:19:f3:79:1c:f0:a9:36:3c:b0:6d:9f:8e:9a:53:c3:70:de:b8:a8:7a:c9:3a:4e:38:fb:60:f9:10:8f
prune-backups keep-all=1
username root@pam
nfs: iso-share
export /mnt/Vauly/iso-vault
path /mnt/pve/iso-share
server 192.168.2.150
content iso
prune-backups keep-all=1

View File

@@ -0,0 +1,19 @@
user:api@pam:1:0::::::
token:api@pam!homepage:0:1::
user:monitoring@pve:1:0::::::
user:root@pam:1:0:::jramosdirect2@gmail.com:::
token:root@pam!packer:0:0::
token:root@pam!tui:0:0::
user:terraform@pam:1:0::::::
token:terraform@pam!terraform:0:0::
group:api-ro:api@pam::
group:terraform:terraform@pam::
role:TerraformProvision:Datastore.AllocateSpace,Datastore.Audit,Pool.Allocate,SDN.Use,Sys.Audit,Sys.Console,Sys.Modify,Sys.PowerMgmt,VM.Allocate,VM.Audit,VM.Clone,VM.Config.CDROM,VM.Config.CPU,VM.Config.Cloudinit,VM.Config.Disk,VM.Config.HWType,VM.Config.Memory,VM.Config.Network,VM.Config.Options,VM.Migrate,VM.Monitor,VM.PowerMgmt:
acl:1:/:root@pam!packer:Administrator:
acl:1:/:monitoring@pve:PVEAdmin:
acl:1:/:@api-ro,api@pam!homepage:PVEAuditor:
acl:1:/:@terraform:TerraformProvision: