Skip to content

Personal Access Tokens

Personal access tokens (PATs) let scripts, CI/CD pipelines, and integrations authenticate with WarmHub without interactive login.

PropertyDetail
FormatSigned JWT
Default expiry30 days
Maximum expiry1 year (set via --expires)
ManagementCLI (wh token) or HTTP API (/api/pats)
Management authInteractive login only — PATs cannot create or revoke other PATs
Create → Use → [Expire] → Revoke
  1. Create — Generate a named token via wh token create (requires interactive login). The token value is displayed once — save it immediately.
  2. Use — Set the WH_TOKEN environment variable or pass the token in the Authorization: Bearer header. WarmHub validates the token on every request.
  3. Expire — Tokens expire after 30 days by default. Use --expires to set a custom duration (max 1 year). Expired tokens are rejected immediately.
  4. Revoke — Revoke a token by name via wh token revoke. Takes effect immediately.

Expired and revoked tokens are preserved for audit visibility.

Scopes limit what a token can do. They are optional — a token created without scopes has the full permissions of its owning user.

Each scope entry binds a resource to a set of permissions:

TierResource formatExampleMeaning
Repo-scopedorg/repomyorg/myrepoSpecific repo only
Org-levelorgmyorgAll repos in org, capped by role
Global wildcard(omitted)All resources, capped by role

More specific entries take precedence. Scopes can only narrow access, never escalate beyond the user’s role.

PermissionGrants
repo:readRead repositories, queries, shapes
repo:writeCommits, shape mutations
repo:configureSubscriptions, credentials, repo settings
repo:adminDelete, archive, visibility
org:readRead org profiles
org:configureCreate repos, manage members
org:adminRename, archive org

Scopes are independent — repo:write does not include repo:read. Request the specific permissions your token needs.

All wh token commands require interactive login — you cannot manage tokens using a PAT.

The --scope flag accepts three forms:

FormMeaningExample
org/repo=permsRepo-scoped--scope myorg/myrepo=repo:read,repo:write
org=permsOrg-level (all repos in org)--scope myorg=repo:read
permsGlobal wildcard (all resources)--scope repo:read,repo:write

Separate multiple permissions with commas. Repeat --scope for multiple entries.

Terminal window
# Full user access, default 30-day expiry
wh token create --name ci-bot
# Repo-scoped token
wh token create --name ci-bot --scope myorg/myrepo=repo:read,repo:write
# Org-level wildcard (all repos in org, capped by role)
wh token create --name org-reader --scope myorg=repo:read
# Global wildcard with description and custom expiry
wh token create -n deploy --scope repo:write -d "Deploy pipeline" --expires 90d
# Multiple scopes — repeat --scope for each entry
wh token create --name ci-bot \
--scope myorg/private-repo=repo:read,repo:write \
--scope myorg=repo:read \
--expires 90d

For advanced use cases, the --scopes-json flag accepts a JSON array of scope entries with optional allowedMatches patterns that restrict which thing names the token can access. A thing name is the WarmHub object name portion of a wref, such as Signal/temp-1 or Config/settings.

--scopes-json is mutually exclusive with --scope — you cannot use both in the same command.

Each entry in the JSON array has:

FieldTypeRequiredDescription
resourcestringNoResource name: "org/repo", "org", or omitted (global wildcard)
permissionsstring[]YesPermissions for this resource
allowedMatchesstring[]NoGlob patterns restricting which thing names this entry can access. Repo-scoped entries only ("org/repo"). Ignored on org-level and global entries.

allowedMatches behavior:

  • Repo-scoped entries only. allowedMatches on org-level or global wildcard entries is stripped with a warning — name restrictions require a specific repo target.
  • Patterns use glob syntax, for example Signal/* or Config/**.
  • When present, the token can only read or write thing names that match at least one pattern.
  • Omitting allowedMatches means no name restriction for that entry.
  • An empty array ([]) is valid and means deny-all for that entry.

With --scopes-json, you can assign different allowedMatches to different permissions on the same resource by using multiple entries. Each (resource, permission) pair must be unique — duplicate pairs are rejected with a validation error.

Terminal window
# Read Signal/* and Config/*, but only write Signal/*
wh token create --name scoped-bot --scopes-json '[
{"resource":"myorg/myrepo","permissions":["repo:read"],"allowedMatches":["Signal/*","Config/*"]},
{"resource":"myorg/myrepo","permissions":["repo:write"],"allowedMatches":["Signal/*"]}
]'
# Simple name restriction — read-only for Signal/*
wh token create --name reader --scopes-json '[
{"resource":"myorg/myrepo","permissions":["repo:read"],"allowedMatches":["Signal/*"]}
]'
# No allowedMatches — same as --scope shorthand
wh token create --name full --scopes-json '[
{"resource":"myorg/myrepo","permissions":["repo:read","repo:write"]}
]'

The token is printed once. Save it to a secret store or environment variable immediately.

Terminal window
wh token list
wh token list --json

Shows all your tokens with their status (active, expired, or revoked) and scopes.

Terminal window
wh token get --name ci-bot

Shows token details: name, description, scopes, status, creation date, and expiry.

Terminal window
wh token revoke --name ci-bot

Revocation is immediate. The token is rejected on the next API request.

Pass the token in the Authorization header:

Terminal window
curl -H "Authorization: Bearer eyJhbGciOi..." \
https://api.warmhub.ai/api/repos/myorg/myrepo/head

Or with the CLI via WH_TOKEN:

Terminal window
export WH_TOKEN=eyJhbGciOi...
wh commit create --add cave --shape Location \
--data '{"x":3,"y":7}' -m "Add cave"

MCP clients like Claude and Cursor normally authenticate via OAuth automatically. However, PATs are useful when:

  • Your organization restricts custom MCP connectors
  • You’re on WSL2, where the OAuth callback can’t reach the browser
  • You want to authenticate a dev instance without configuring OAuth

Use mcp-remote as a stdio bridge with your PAT:

{
"mcpServers": {
"warmhub": {
"command": "npx",
"args": [
"-y", "mcp-remote@latest",
"https://api.warmhub.ai/mcp",
"--header", "Authorization:${WH_TOKEN}",
"--transport", "http-only"
],
"env": {
"WH_TOKEN": "Bearer eyJhbGciOi..."
}
}
}
}

This works in both Claude Desktop (claude_desktop_config.json) and Claude Code (.mcp.json). The --transport http-only flag ensures HTTP Streamable transport.

See the MCP Quickstart for standard OAuth-based setup.

  • No escalation. PAT management (create, list, revoke) requires interactive login. A PAT cannot create or manage other tokens.
  • Scope enforcement. Each API endpoint checks the token’s scopes. A repo:read token cannot push commits.
  • Immediate revocation. Revoking a token takes effect on the next request — there is no grace period.
  • Name restrictions. Token names must be alphanumeric, hyphens, and underscores only (URL-safe).
  • No token rotation. To rotate, revoke the old token and create a new one.
  • No web UI. Tokens are managed via the CLI or HTTP API only.
  • No SDK surface. The SDK does not yet have a client.token.* API for token management.