Task #65: Grant Claude Full Infrastructure Access (API + SSH) #152

Open
opened 2026-03-21 02:32:28 -05:00 by mkrause612 · 0 comments
Owner

Task #65: Grant Claude Full Infrastructure Access (API + SSH)

Time Estimate: 30-45 minutes

Documentation: docs/tasks/ (see operations manual)


Time: 30-45 minutes
Status: PENDING
Priority: HIGH
Documentation: docs/tasks/claude-infrastructure-access/

Grant Claude (The Chronicler) full API and SSH access to all Firefrost infrastructure for autonomous operations.

Why This Matters:

  • Claude can create Gitea issues directly (no more GITEA-ISSUE.md templates)
  • Claude can add Gitea users, manage repos, create projects
  • Claude can SSH into servers to verify configs, restart services, troubleshoot
  • Claude can execute deployments autonomously
  • Reduces Michael's workload (Claude handles routine operations)
  • Faster response time for issues and changes

Access Needed:

1. Gitea API Access

  • Create Gitea API token for Claude with admin permissions
  • Store in ops manual (secure location or reference Vaultwarden)
  • Grants: User management, issue creation, repo management, project boards

2. SSH Access to All Servers

  • Command Center (63.143.34.217)
  • Ghost VPS (64.50.188.14)
  • Billing VPS (38.68.14.188)
  • Panel VPS (45.94.168.138)
  • TX1 Dallas (38.68.14.26)
  • NC1 Charlotte (216.239.104.130)

SSH Key Setup:

  • Generate SSH key pair for Claude
  • Add public key to ~/.ssh/authorized_keys on all 6 servers
  • Store private key securely (Vaultwarden - Task #6)
  • Document key fingerprint in infrastructure manifest

3. Service API Tokens (Optional but Recommended)

  • Plane API token (tasks.firefrostgaming.com)
  • Mailcow API token (mail.firefrostgaming.com)
  • Pterodactyl Panel API token (panel)
  • Ghost Admin API token (firefrostgaming.com)

Implementation Steps:

Phase 1: Gitea API Token

  1. Log into git.firefrostgaming.com as admin
  2. Settings → Applications → Generate New Token
  3. Name: "Claude - The Chronicler"
  4. Scopes: Select ALL (admin access)
  5. Generate and copy token
  6. Store in ops manual or Vaultwarden
  7. Test: Claude creates a test issue via API

Phase 2: SSH Key Generation

  1. Generate ed25519 key pair:
    ssh-keygen -t ed25519 -C "claude@firefrostgaming.com" -f claude_ed25519
    
  2. Save private key to Vaultwarden (Task #6)
  3. Copy public key for distribution

Phase 3: SSH Key Distribution
For each server:

  1. SSH in as root (or architect for Ghost VPS)
  2. Add Claude's public key:
    echo "ssh-ed25519 AAAA... claude@firefrostgaming.com" >> ~/.ssh/authorized_keys
    
  3. Verify permissions (600 for authorized_keys)
  4. Test: Claude SSHs into server

Phase 4: Service API Tokens (Optional)

  1. Plane: Settings → API Tokens → Generate
  2. Mailcow: System → API → Create API Key
  3. Pterodactyl: Account → API Credentials → Create
  4. Ghost: Settings → Integrations → Add Custom Integration
  5. Store all tokens in Vaultwarden

Security Considerations:

  • SSH key uses ed25519 (modern, secure)
  • API tokens stored in Vaultwarden (not plaintext in ops manual)
  • All access logged and auditable
  • Claude operates under "The Chronicler" identity
  • Keys can be revoked if needed

Expected Benefits:

  • Claude creates Gitea issues directly (no templates)
  • Claude adds users to Gitea on request
  • Claude can verify server configs remotely
  • Claude can restart services when needed
  • Claude can deploy code autonomously
  • Claude can troubleshoot without waiting for Michael

Deliverables:

  • Gitea API token generated and stored
  • SSH key pair generated
  • Private key stored in Vaultwarden
  • Public key added to all 6 servers
  • SSH access tested on all servers
  • Service API tokens generated (optional)
  • All tokens documented in infrastructure manifest
  • Claude successfully creates test Gitea issue

Dependencies:

  • Task #6: Vaultwarden setup (for secure token storage)
  • Admin access to all servers
  • Gitea admin credentials

Blocks:

  • Future autonomous operations tasks
  • Direct Gitea issue creation
  • Server troubleshooting without Michael

Time Breakdown:

  • Gitea API token: 5 minutes
  • SSH key generation: 5 minutes
  • Key distribution (6 servers): 15-20 minutes
  • Testing: 5-10 minutes
  • Documentation: 5 minutes

Priority Justification:
This multiplies Claude's effectiveness. Instead of creating templates that Michael manually copies, Claude executes directly. This is force multiplication for the entire operation.



Source: docs/core/tasks.md (Task #65)

### Task #65: Grant Claude Full Infrastructure Access (API + SSH) **Time Estimate:** 30-45 minutes **Documentation:** `docs/tasks/` (see operations manual) --- **Time:** 30-45 minutes **Status:** PENDING **Priority:** HIGH **Documentation:** `docs/tasks/claude-infrastructure-access/` Grant Claude (The Chronicler) full API and SSH access to all Firefrost infrastructure for autonomous operations. **Why This Matters:** - Claude can create Gitea issues directly (no more GITEA-ISSUE.md templates) - Claude can add Gitea users, manage repos, create projects - Claude can SSH into servers to verify configs, restart services, troubleshoot - Claude can execute deployments autonomously - Reduces Michael's workload (Claude handles routine operations) - Faster response time for issues and changes **Access Needed:** **1. Gitea API Access** - Create Gitea API token for Claude with admin permissions - Store in ops manual (secure location or reference Vaultwarden) - Grants: User management, issue creation, repo management, project boards **2. SSH Access to All Servers** - Command Center (63.143.34.217) - Ghost VPS (64.50.188.14) - Billing VPS (38.68.14.188) - Panel VPS (45.94.168.138) - TX1 Dallas (38.68.14.26) - NC1 Charlotte (216.239.104.130) **SSH Key Setup:** - Generate SSH key pair for Claude - Add public key to `~/.ssh/authorized_keys` on all 6 servers - Store private key securely (Vaultwarden - Task #6) - Document key fingerprint in infrastructure manifest **3. Service API Tokens (Optional but Recommended)** - Plane API token (tasks.firefrostgaming.com) - Mailcow API token (mail.firefrostgaming.com) - Pterodactyl Panel API token (panel) - Ghost Admin API token (firefrostgaming.com) **Implementation Steps:** **Phase 1: Gitea API Token** 1. Log into git.firefrostgaming.com as admin 2. Settings → Applications → Generate New Token 3. Name: "Claude - The Chronicler" 4. Scopes: Select ALL (admin access) 5. Generate and copy token 6. Store in ops manual or Vaultwarden 7. Test: Claude creates a test issue via API **Phase 2: SSH Key Generation** 1. Generate ed25519 key pair: ```bash ssh-keygen -t ed25519 -C "claude@firefrostgaming.com" -f claude_ed25519 ``` 2. Save private key to Vaultwarden (Task #6) 3. Copy public key for distribution **Phase 3: SSH Key Distribution** For each server: 1. SSH in as root (or architect for Ghost VPS) 2. Add Claude's public key: ```bash echo "ssh-ed25519 AAAA... claude@firefrostgaming.com" >> ~/.ssh/authorized_keys ``` 3. Verify permissions (600 for authorized_keys) 4. Test: Claude SSHs into server **Phase 4: Service API Tokens (Optional)** 1. Plane: Settings → API Tokens → Generate 2. Mailcow: System → API → Create API Key 3. Pterodactyl: Account → API Credentials → Create 4. Ghost: Settings → Integrations → Add Custom Integration 5. Store all tokens in Vaultwarden **Security Considerations:** - SSH key uses ed25519 (modern, secure) - API tokens stored in Vaultwarden (not plaintext in ops manual) - All access logged and auditable - Claude operates under "The Chronicler" identity - Keys can be revoked if needed **Expected Benefits:** - Claude creates Gitea issues directly (no templates) - Claude adds users to Gitea on request - Claude can verify server configs remotely - Claude can restart services when needed - Claude can deploy code autonomously - Claude can troubleshoot without waiting for Michael **Deliverables:** - [ ] Gitea API token generated and stored - [ ] SSH key pair generated - [ ] Private key stored in Vaultwarden - [ ] Public key added to all 6 servers - [ ] SSH access tested on all servers - [ ] Service API tokens generated (optional) - [ ] All tokens documented in infrastructure manifest - [ ] Claude successfully creates test Gitea issue **Dependencies:** - Task #6: Vaultwarden setup (for secure token storage) - Admin access to all servers - Gitea admin credentials **Blocks:** - Future autonomous operations tasks - Direct Gitea issue creation - Server troubleshooting without Michael **Time Breakdown:** - Gitea API token: 5 minutes - SSH key generation: 5 minutes - Key distribution (6 servers): 15-20 minutes - Testing: 5-10 minutes - Documentation: 5 minutes **Priority Justification:** This multiplies Claude's effectiveness. Instead of creating templates that Michael manually copies, Claude executes directly. This is force multiplication for the entire operation. --- --- **Source:** `docs/core/tasks.md` (Task #65)
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: firefrost-gaming/firefrost-operations-manual#152