Authentication
Overview
Spuree is an agent-friendly cloud storage. Projects contain folders (nestable) and files at any level. Authenticate with a JWT token or API key to access all V1 endpoints.
Tokens follow OAuth2 conventions and are issued as NextAuth-compatible JWTs.
Use this skill when an agent needs to:
- Set up API access for the first time
- Log in with email and password to get an access token
- Refresh an expired access token using a refresh token
- Exchange an authorization code for tokens (browser SSO flow)
- Create, list, or revoke API keys
Getting Started
First-time setup — three options:
Option A: User creates API key from web UI
- Create a Spuree account at studio.spuree.com
- Go to studio.spuree.com/api-keys and create a key. Save it immediately — the key is only shown once.
- Set the environment variable:
bash
export SPUREE_API_KEY="<your-api-key>"
Option B: Agent logs in with email and password
If the user provides their email and password, the agent can set up its own API key:
- Log in with to get a temporary JWT
- Create an API key with
- Store the key in
Option C: Agent opens browser for SSO login
The agent can authenticate without the user sharing their password:
- Start a local HTTP server on an ephemeral port (49152–65535) to receive the callback.
- Open the user's browser to the Spuree sign-in page with and the port:
https://studio.spuree.com/auth/signin?source=api&port=<port>
The user logs in via Google SSO (or email/password) in the browser.
- After login, Spuree redirects to
http://localhost:<port>/callback?token=<exchange-code>
. The agent receives the exchange code from this callback (valid for 60 seconds).
- Exchange the code for a JWT:
bash
curl -X POST "https://studio.spuree.com/api/auth/token/exchange" \
-H "Content-Type: application/json" \
-d '{"code": "<exchange-code>"}'
- Create an API key with the JWT () and store it in .
Once
is set, the agent authenticates with
X-API-Key: $SPUREE_API_KEY
on all requests. No login or token refresh needed.
Verify it works — ask your agent:
"List my Spuree projects"
The agent should show you which projects you have access to. If it works, your API key is set up correctly.
Try it out — ask your agent something like:
"Upload this file to my Spuree project"
Base URLs
Spuree uses two hosts:
| Host | Purpose | Endpoints |
|---|
https://studio.spuree.com/api
| Authentication (login, refresh, exchange) | , , |
https://data.spuree.com/api
| All V1 data APIs (projects, files, etc.) | , , , ... |
All other skills in this repo use
https://data.spuree.com/api
. Only the token endpoints below use
.
Token Lifecycle
| Token | Lifetime | Format |
|---|
| 1 hour | NextAuth JWT |
| 30 days | Opaque hex string |
| 60 seconds | Opaque string |
The
is what you pass as
Authorization: Bearer <access_token>
to V1 API endpoints.
Alternatively, you can create
API keys for long-lived, non-interactive access. API keys are passed via
header and can be scoped to specific organizations.
Token Response Format
All three endpoints return the same OAuth2-compliant response:
json
{
"access_token": "eyJhbGciOiJkaXIiLCJlbmMiOi...",
"refresh_token": "a1b2c3d4e5f6...",
"expires_in": 3600,
"user": {
"id": "64a7b8c9d1e2f3a4b5c6d7e8",
"email": "user@example.com",
"name": "User Name",
"image": "https://...",
"organizationId": "64a7b8c9d1e2f3a4b5c6d7f0",
"role": "admin",
"workspaces": [
{
"workspaceId": "64a7b8c9d1e2f3a4b5c6d7f1",
"workspaceName": "My Workspace",
"role": "owner"
}
]
}
}
Endpoints
POST /auth/token
Log in with email and password.
Description: Validates credentials and returns an access token and refresh token. Rate limited to 10 requests per minute per IP.
Request Body:
| Field | Type | Required | Description |
|---|
| string | Yes | User's email address |
| string | Yes | User's password |
Status Codes:
| Code | Description |
|---|
| 200 | Login successful, tokens returned |
| 400 | Invalid request body or missing fields |
| 401 | Invalid email or password, or account locked |
| 429 | Rate limit exceeded (10 req/min) |
| 500 | Internal server error |
Error Messages (401):
| Message | Cause |
|---|
Invalid email or password
| Wrong credentials |
Password is not set for this user
| User registered via OAuth only |
Account is temporarily locked...
| Too many failed attempts (5 failures → 15 min lock) |
Example:
bash
curl -X POST "https://studio.spuree.com/api/auth/token" \
-H "Content-Type: application/json" \
-d '{
"email": "user@example.com",
"password": "mypassword"
}'
POST /auth/token/refresh
Refresh an expired access token.
Description: Exchanges a valid refresh token for a new access token and refresh token pair. The old refresh token is atomically revoked to prevent reuse. Rate limited to 10 requests per minute per IP.
Request Body:
| Field | Type | Required | Description |
|---|
| string | Yes | The refresh token from a previous login or refresh |
Status Codes:
| Code | Description |
|---|
| 200 | New tokens issued |
| 400 | Missing refresh token |
| 401 | Invalid or expired refresh token |
| 429 | Rate limit exceeded |
| 500 | Internal server error |
Example:
bash
curl -X POST "https://studio.spuree.com/api/auth/token/refresh" \
-H "Content-Type: application/json" \
-d '{
"refresh_token": "a1b2c3d4e5f6..."
}'
Notes:
- Each refresh token can only be used once. After refresh, use the new for subsequent refreshes.
- If a refresh token is reused (already revoked), it returns 401.
POST /auth/token/exchange
Exchange an authorization code for tokens.
Description: Exchanges a one-time authorization code for an access token and refresh token. Used by agents and desktop apps that authenticate via the browser (see Getting Started Option C). The login flow starts at
studio.spuree.com/auth/signin?source=api
— after the user completes login, the exchange code is delivered to the agent's local callback server. Rate limited to 10 requests per minute per IP.
Request Body:
| Field | Type | Required | Description |
|---|
| string | Yes | The authorization exchange code |
Status Codes:
| Code | Description |
|---|
| 200 | Tokens issued |
| 400 | Missing exchange code |
| 401 | Invalid or expired exchange code |
| 429 | Rate limit exceeded |
| 500 | Internal server error |
Example:
bash
curl -X POST "https://studio.spuree.com/api/auth/token/exchange" \
-H "Content-Type: application/json" \
-d '{
"code": "exchange-code-here"
}'
Notes:
- Exchange codes expire after 60 seconds.
- Each code can only be used once.
API Keys
API keys provide long-lived authentication for automated workflows. They are scoped to a user and optionally restricted to specific organizations.
All V1 endpoints accept either
Authorization: Bearer <jwt>
or
. When both are provided, JWT takes priority.
POST /v1/api-keys
Create a new API key.
Auth: Requires JWT (Bearer token only, not API key).
Request Body:
| Field | Type | Required | Description |
|---|
| string | Yes | Descriptive name for the key |
| object | No | { "organizations": ["orgId1", ...] }
— restrict to specific orgs. Omit for all orgs. |
| datetime | No | Expiration timestamp (ISO 8601). Omit for no expiry. |
Response:
json
{
"id": "550e8400-e29b-41d4-a716-446655440000",
"name": "CI Pipeline Key",
"key": "a1b2c3d4e5f6a1b2c3d4e5f6a1b2c3d4e5f6a1b2c3d4e5f6a1b2c3d4e5f6a1b2",
"createdAt": "2024-01-15T10:00:00Z",
"expiresAt": null,
"lastUsedAt": null,
"scopes": { "organizations": ["64a7b8c9d1e2f3a4b5c6d7f0"] },
"status": "active"
}
Important: The
field is only returned once at creation. Store it securely.
Example:
bash
curl -X POST "https://data.spuree.com/api/v1/api-keys" \
-H "Authorization: Bearer $SPUREE_ACCESS_TOKEN" \
-H "Content-Type: application/json" \
-d '{
"name": "CI Pipeline Key",
"scopes": { "organizations": ["64a7b8c9d1e2f3a4b5c6d7f0"] }
}'
GET /v1/api-keys
List all active API keys for the authenticated user.
Auth: Requires JWT (Bearer token only).
Response:
json
[
{
"id": "550e8400-e29b-41d4-a716-446655440000",
"name": "CI Pipeline Key",
"createdAt": "2024-01-15T10:00:00Z",
"expiresAt": null,
"lastUsedAt": "2024-03-10T14:30:00Z",
"scopes": { "organizations": ["64a7b8c9d1e2f3a4b5c6d7f0"] },
"status": "active"
}
]
Example:
bash
curl "https://data.spuree.com/api/v1/api-keys" \
-H "Authorization: Bearer $SPUREE_ACCESS_TOKEN"
DELETE /v1/api-keys/{key_id}
Revoke an API key (soft delete).
Auth: Requires JWT (Bearer token only).
Response:
Example:
bash
curl -X DELETE "https://data.spuree.com/api/v1/api-keys/550e8400-e29b-41d4-a716-446655440000" \
-H "Authorization: Bearer $SPUREE_ACCESS_TOKEN"
Token Storage
Store tokens in environment variables using these standard names:
SPUREE_ACCESS_TOKEN=eyJhbGci... # JWT access token (1 hour)
SPUREE_REFRESH_TOKEN=a1b2c3d4... # For refreshing access token (30 days)
SPUREE_API_KEY=a1b2c3d4... # API key (64-char hex, long-lived)
All Spuree skills reference these variable names. V1 endpoints accept either
Authorization: Bearer $SPUREE_ACCESS_TOKEN
or
X-API-Key: $SPUREE_API_KEY
.
Common Patterns
Agent Login Flow
-
Obtain tokens with email and password:
POST /auth/token → { access_token, refresh_token, expires_in, user }
-
Use access token for V1 API calls:
Authorization: Bearer {access_token}
-
Refresh before the token expires (every ~55 minutes):
POST /auth/token/refresh → { access_token, refresh_token, ... }
Token Refresh Strategy
- is (1 hour). Refresh proactively at ~55 minutes to avoid failed requests.
- Always store and use the latest — old ones are revoked after use.
- If refresh fails with 401, the user must log in again with email/password.
API Key for Automation
For CI/CD pipelines or long-running agents that can't refresh tokens:
- Log in to get a JWT
- Create an API key scoped to the needed organizations:
POST /v1/api-keys → { key: "a1b2c3d4..." }
- Use the API key for all subsequent requests:
API keys don't expire by default (unless
is set) and don't need refreshing.
Error Handling
| Error | Cause | Resolution |
|---|
| 401 (invalid credentials) | Wrong email or password | Verify credentials |
| 401 (account locked) | 5 failed login attempts | Wait 15 minutes, then retry |
| 401 (invalid refresh token) | Token expired, revoked, or reused | Log in again with email/password |
| 401 (invalid exchange code) | Code expired or already used | Request a new exchange code |
| 429 (rate limit) | More than 10 requests/min from same IP | Wait and retry with backoff |
Rate Limits
All authentication endpoints share the same rate limit: 10 requests per minute per IP. Implement exponential backoff when receiving 429 responses.