* feat(auth): add email verification login flow with 401 auto-redirect Replace the old OAuth-based login with email verification codes: - Backend: send-code / verify-code endpoints, verification_codes table (migration 009), rate limiting, Resend email service - Frontend: two-step login UI (email → 6-digit OTP), auth store with sendCode/verifyCode - SDK: ApiClient gains onUnauthorized callback; 401 responses auto-clear token and redirect to /login - Fix login button staying disabled due to global isLoading state Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * fix(auth): add brute-force protection, redirect loop guard, and expired code cleanup - VerifyCode: increment attempts on wrong code, reject after 5 failed tries (migration 010) - onUnauthorized: skip redirect if already on /login to prevent infinite loops - SendCode: best-effort cleanup of expired verification codes older than 1 hour Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * feat(auth): add master verification code for non-production environments Allow code "888888" to bypass email verification in non-production environments to simplify development and testing workflows. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * feat(auth): add personal access tokens for CLI and API authentication Add full-stack PAT support: users create tokens in Settings, CLI authenticates via `multica auth login`. Server stores SHA-256 hashes only. Auth middleware extended to accept both JWTs and PATs (distinguished by `mul_` prefix). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> --------- Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
66 lines
1.5 KiB
TypeScript
66 lines
1.5 KiB
TypeScript
"use client";
|
|
|
|
import { create } from "zustand";
|
|
import type { User } from "@multica/types";
|
|
import { api } from "@/shared/api";
|
|
|
|
interface AuthState {
|
|
user: User | null;
|
|
isLoading: boolean;
|
|
|
|
initialize: () => Promise<void>;
|
|
sendCode: (email: string) => Promise<void>;
|
|
verifyCode: (email: string, code: string) => Promise<User>;
|
|
logout: () => void;
|
|
setUser: (user: User) => void;
|
|
}
|
|
|
|
export const useAuthStore = create<AuthState>((set) => ({
|
|
user: null,
|
|
isLoading: true,
|
|
|
|
initialize: async () => {
|
|
const token = localStorage.getItem("multica_token");
|
|
if (!token) {
|
|
set({ isLoading: false });
|
|
return;
|
|
}
|
|
|
|
api.setToken(token);
|
|
|
|
try {
|
|
const user = await api.getMe();
|
|
set({ user, isLoading: false });
|
|
} catch {
|
|
api.setToken(null);
|
|
api.setWorkspaceId(null);
|
|
localStorage.removeItem("multica_token");
|
|
localStorage.removeItem("multica_workspace_id");
|
|
set({ user: null, isLoading: false });
|
|
}
|
|
},
|
|
|
|
sendCode: async (email: string) => {
|
|
await api.sendCode(email);
|
|
},
|
|
|
|
verifyCode: async (email: string, code: string) => {
|
|
const { token, user } = await api.verifyCode(email, code);
|
|
localStorage.setItem("multica_token", token);
|
|
api.setToken(token);
|
|
set({ user });
|
|
return user;
|
|
},
|
|
|
|
logout: () => {
|
|
localStorage.removeItem("multica_token");
|
|
localStorage.removeItem("multica_workspace_id");
|
|
api.setToken(null);
|
|
api.setWorkspaceId(null);
|
|
set({ user: null });
|
|
},
|
|
|
|
setUser: (user: User) => {
|
|
set({ user });
|
|
},
|
|
}));
|