What this is for
ClawKitchen can be protected by HTTP Basic auth when it is bound to a non-localhost host such as a Tailscale or LAN-accessible address. That is sensible for remote access, but it can make automated QA and browser tooling awkward. To make testing easier, ClawKitchen supports an optional QA-only bootstrap token flow that seeds a short-lived session cookie.How it works
IfqaToken is configured:
- visit any Kitchen URL with
?qaToken=<token>once - Kitchen sets an HttpOnly cookie named
kitchenQaToken - Kitchen redirects back to the same URL with
qaTokenremoved - subsequent requests use the cookie instead of triggering the normal Basic auth prompt
Important notes
- this is disabled by default
- the cookie lifetime is short-lived (about 15 minutes)
- it is intended for dev and QA, not broad production exposure
Example config
SetqaToken in the Kitchen plugin config alongside authToken:
Example usage
Open a page once like this:Why this matters
This is especially useful for:- screenshot capture
- Playwright/browser automation
- headless testing
- temporary QA access without fighting a Basic auth prompt on every run
Troubleshooting
If you still get401 Unauthorized and a Basic auth challenge:
- verify
qaTokenis actually configured in the running Kitchen instance - make sure you are hitting Kitchen directly, not a separate proxy applying auth before Kitchen sees the request
- verify you are using the same host/path scope that the cookie is expected to cover
