When `gsd --web` is opened without the #token= hash fragment (manual URL entry, bookmark, new tab), `authenticatedFetch` previously fell through to a naked `fetch()` that always returned 401, flooding the console with cascading errors and leaving the UI in a broken state with no recovery path. Three changes: 1. `web/lib/auth.ts` — `authFetch()` now returns a synthetic 401 Response when `getAuthToken()` returns null instead of delegating to bare fetch. This makes missing-token failures consistent and immediately catchable by all callers without a network round-trip. 2. `web/lib/gsd-workspace-store.tsx` — Added `"unauthenticated"` to `WorkspaceStatus`. `refreshBoot()` now detects a 401 response from /api/boot and patches `bootStatus` to `"unauthenticated"` instead of throwing a generic error. This is a distinct state — not an error worth retrying, but a configuration problem the user must resolve. 3. `web/components/gsd/app-shell.tsx` — Added an early-return guard that renders a minimal "Authentication Required" screen when `bootStatus === "unauthenticated"`. The screen explains the problem and tells users to copy the full terminal URL (including `#token=…`) or restart with `gsd --web`. Fixes #2731
117 lines
4 KiB
TypeScript
117 lines
4 KiB
TypeScript
/**
|
|
* Client-side auth token management.
|
|
*
|
|
* The web server generates a random bearer token at launch and passes it to
|
|
* the browser via the URL fragment (e.g. `http://127.0.0.1:3000/#token=<hex>`).
|
|
* Fragments are never sent in HTTP requests or logged by servers/proxies,
|
|
* keeping the token local to the machine.
|
|
*
|
|
* On first load this module extracts the token from the fragment, persists
|
|
* it to sessionStorage (so it survives page refreshes), and clears the
|
|
* fragment from the address bar. All subsequent API calls attach the token
|
|
* via the `Authorization: Bearer` header.
|
|
*
|
|
* For EventSource (SSE), which cannot send custom headers, the token is
|
|
* appended as a `?_token=` query parameter instead.
|
|
*/
|
|
|
|
const SESSION_STORAGE_KEY = "gsd-auth-token"
|
|
|
|
let cachedToken: string | null = null
|
|
|
|
/**
|
|
* Extract the auth token from the URL fragment on first call, then return
|
|
* the cached value. Falls back to sessionStorage so the token survives
|
|
* page refreshes (which clear the in-memory cache and the URL fragment).
|
|
* Clears the fragment from the address bar after extraction.
|
|
*/
|
|
export function getAuthToken(): string | null {
|
|
if (cachedToken !== null) return cachedToken
|
|
|
|
if (typeof window === "undefined") return null
|
|
|
|
// 1. Try the URL fragment (initial page load from gsd --web)
|
|
const hash = window.location.hash
|
|
if (hash) {
|
|
const match = hash.match(/token=([a-fA-F0-9]+)/)
|
|
if (match) {
|
|
cachedToken = match[1]
|
|
// Persist to sessionStorage so the token survives page refreshes.
|
|
// sessionStorage is scoped to this browser tab — it does not leak
|
|
// to other tabs or persist after the tab is closed.
|
|
try {
|
|
sessionStorage.setItem(SESSION_STORAGE_KEY, cachedToken)
|
|
} catch {
|
|
// Storage unavailable (e.g. private browsing quota exceeded) — the
|
|
// in-memory cache still works for the current page lifecycle.
|
|
}
|
|
// Clear the fragment so the token isn't visible in the address bar
|
|
// or leaked via the Referer header on external navigations.
|
|
window.history.replaceState(null, "", window.location.pathname + window.location.search)
|
|
return cachedToken
|
|
}
|
|
}
|
|
|
|
// 2. Fall back to sessionStorage (page refresh, bookmark without hash)
|
|
try {
|
|
const stored = sessionStorage.getItem(SESSION_STORAGE_KEY)
|
|
if (stored) {
|
|
cachedToken = stored
|
|
return cachedToken
|
|
}
|
|
} catch {
|
|
// Storage unavailable — fall through to null
|
|
}
|
|
|
|
return null
|
|
}
|
|
|
|
/**
|
|
* Returns an object with the `Authorization` header for use with `fetch()`.
|
|
* Merges with any additional headers provided.
|
|
*/
|
|
export function authHeaders(extra?: Record<string, string>): Record<string, string> {
|
|
const token = getAuthToken()
|
|
const headers: Record<string, string> = { ...extra }
|
|
if (token) {
|
|
headers["Authorization"] = `Bearer ${token}`
|
|
}
|
|
return headers
|
|
}
|
|
|
|
/**
|
|
* Wrapper around `fetch()` that automatically injects the auth token.
|
|
*
|
|
* When no token is available (missing `#token=` fragment and no sessionStorage
|
|
* entry), returns a synthetic 401 Response instead of making an unauthenticated
|
|
* request that will fail server-side anyway. This lets callers handle the
|
|
* missing-token case uniformly rather than silently cascading 401s.
|
|
*/
|
|
export async function authFetch(input: RequestInfo | URL, init?: RequestInit): Promise<Response> {
|
|
const token = getAuthToken()
|
|
if (!token) {
|
|
return new Response(JSON.stringify({ error: "No auth token available" }), {
|
|
status: 401,
|
|
headers: { "Content-Type": "application/json" },
|
|
})
|
|
}
|
|
|
|
const headers = new Headers(init?.headers)
|
|
if (!headers.has("Authorization")) {
|
|
headers.set("Authorization", `Bearer ${token}`)
|
|
}
|
|
|
|
return fetch(input, { ...init, headers })
|
|
}
|
|
|
|
/**
|
|
* Append the auth token as a `_token` query parameter to a URL string.
|
|
* Used for EventSource connections which cannot send custom headers.
|
|
*/
|
|
export function appendAuthParam(url: string): string {
|
|
const token = getAuthToken()
|
|
if (!token) return url
|
|
|
|
const separator = url.includes("?") ? "&" : "?"
|
|
return `${url}${separator}_token=${token}`
|
|
}
|