feat(providers): add JWT Bearer Authorization provider#152
Merged
TarasSpashchenko merged 7 commits intomainfrom Feb 26, 2026
Merged
feat(providers): add JWT Bearer Authorization provider#152TarasSpashchenko merged 7 commits intomainfrom
TarasSpashchenko merged 7 commits intomainfrom
Conversation
f5c9926 to
695e21d
Compare
8nevil8
approved these changes
Feb 18, 2026
…tion - Add new JWT Bearer Authorization provider (bearer-auth) - Implement setup flow asking only for API URL (token provided at runtime) - Add URL normalization utility (ensureApiBase) to handle /code-assistant-api suffix - Update agent plugins to support bearer-auth provider (Claude, Gemini, OpenCode, CodeMie Code) - Skip apiKey validation for JWT and SSO authentication methods in AgentCLI - Add codeMieUrl field to JWT config following SSO pattern - Remove redundant apiUrl from jwtConfig (uses baseUrl instead) - Add jwtConfig support to LegacyConfig type Users can now configure JWT authentication with: codemie setup -> Bearer Authorization codemie-claude --jwt-token <token> --base-url <url> Generated with AI Co-Authored-By: codemie-ai <codemie.ai@gmail.com>
- Add comprehensive JWT authentication section to AUTHENTICATION.md - Document JWT setup flow, token provision methods, and validation - Include CI/CD pipeline examples and troubleshooting guide - Add JWT vs SSO comparison table - Update README.md to mention JWT Bearer Auth in provider list Generated with AI Co-Authored-By: codemie-ai <codemie.ai@gmail.com>
- Add max pages limit (20) and ID-based deduplication in fetchCodeMieIntegrations to prevent infinite pagination loop when the API ignores page/per_page params - Add ora spinner around integration fetch so users see progress instead of a silent hang - Filter integrations strictly by credential_type === 'LiteLLM' instead of just checking the field is non-empty - Hide JWT Bearer provider from interactive setup (hidden: true) - Add hidden field to ProviderTemplate interface Generated with AI Co-Authored-By: codemie-ai <codemie.ai@gmail.com>
… plugin Adds chalk, CodeMieCode, loadCodeMieConfig, renderProfileInfo, getRandomWelcomeMessage and getRandomGoodbyeMessage imports that are used by the customRunHandler introduced in the Bearer Auth commit. Generated with AI Co-Authored-By: codemie-ai <codemie.ai@gmail.com>
5f1f93d to
30be686
Compare
…t subcommand Add ownedSubcommands metadata field so agents can declare which subcommands their binary owns. AgentCLI now skips registering the framework init command for any agent that lists 'init' in ownedSubcommands, fixing the shadowing bug for codemie-opencode (and codemie-code) whose binaries have a native init. Generated with AI Co-Authored-By: codemie-ai <codemie.ai@gmail.com>
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
Adds JWT Bearer Authorization as a new authentication provider for CodeMie CLI. Users can now configure JWT-based authentication where tokens are provided at
runtime via CLI or environment variables, rather than during setup. This is ideal for environments with external token management systems, CI/CD pipelines, or
testing scenarios.
Changes
bearer-authprovider with simplified setup (only asks for API URL, token provided later)--jwt-tokenCLI option added to all agent commands for runtime token provisioncodemie doctorfor token validation and expiration monitoringbearer-authproviderensureApiBase) for consistent/code-assistant-apisuffix handlingcodeMieUrl(user input) andbaseUrl(full API URL)docs/AUTHENTICATION.mdwith setup, usage examples, and troubleshootingImpact
Before:
After:
Provide token at runtime
export CODEMIE_JWT_TOKEN="eyJhbG..."
codemie-claude "analyze code"
Or via CLI
codemie-claude --jwt-token "eyJhbG..." "analyze code"
Users benefit from simplified setup for JWT environments and flexible token management at runtime.
Checklist