feat(providers): add JWT Bearer Authorization provider#152
Open
TarasSpashchenko wants to merge 4 commits intomainfrom
Open
feat(providers): add JWT Bearer Authorization provider#152TarasSpashchenko wants to merge 4 commits intomainfrom
TarasSpashchenko wants to merge 4 commits intomainfrom
Conversation
…tion - Add new JWT Bearer Authorization provider (bearer-auth) - Implement setup flow asking only for API URL (token provided at runtime) - Add URL normalization utility (ensureApiBase) to handle /code-assistant-api suffix - Update agent plugins to support bearer-auth provider (Claude, Gemini, OpenCode, CodeMie Code) - Skip apiKey validation for JWT and SSO authentication methods in AgentCLI - Add codeMieUrl field to JWT config following SSO pattern - Remove redundant apiUrl from jwtConfig (uses baseUrl instead) - Add jwtConfig support to LegacyConfig type Users can now configure JWT authentication with: codemie setup -> Bearer Authorization codemie-claude --jwt-token <token> --base-url <url> Generated with AI Co-Authored-By: codemie-ai <codemie.ai@gmail.com>
- Add comprehensive JWT authentication section to AUTHENTICATION.md - Document JWT setup flow, token provision methods, and validation - Include CI/CD pipeline examples and troubleshooting guide - Add JWT vs SSO comparison table - Update README.md to mention JWT Bearer Auth in provider list Generated with AI Co-Authored-By: codemie-ai <codemie.ai@gmail.com>
f5c9926 to
695e21d
Compare
8nevil8
approved these changes
Feb 18, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
Adds JWT Bearer Authorization as a new authentication provider for CodeMie CLI. Users can now configure JWT-based authentication where tokens are provided at
runtime via CLI or environment variables, rather than during setup. This is ideal for environments with external token management systems, CI/CD pipelines, or
testing scenarios.
Changes
bearer-authprovider with simplified setup (only asks for API URL, token provided later)--jwt-tokenCLI option added to all agent commands for runtime token provisioncodemie doctorfor token validation and expiration monitoringbearer-authproviderensureApiBase) for consistent/code-assistant-apisuffix handlingcodeMieUrl(user input) andbaseUrl(full API URL)docs/AUTHENTICATION.mdwith setup, usage examples, and troubleshootingImpact
Before:
After:
Provide token at runtime
export CODEMIE_JWT_TOKEN="eyJhbG..."
codemie-claude "analyze code"
Or via CLI
codemie-claude --jwt-token "eyJhbG..." "analyze code"
Users benefit from simplified setup for JWT environments and flexible token management at runtime.
Checklist