Install
openclaw skills install dyagil-magic-link-bridgeGenerate Supabase magic-links that land directly on a custom portal subpath (e.g. `/portal/`) instead of being silently rewritten to the project Site URL by Supabase's redirect whitelist. Use whenever a customer reports the login link sent them to the homepage instead of their personal area, or when designing a new magic-link flow on a subpath, or to work around in-app browser bugs (WhatsApp/Instagram WebView) that drop URL hash fragments.
openclaw skills install dyagil-magic-link-bridgeSupabase's standard magic-link flow:
auth.admin.generate_link({ type: 'magiclink', email, options: { redirect_to: 'https://site/portal/' } }).https://<ref>.supabase.co/auth/v1/verify?... URL.redirect_to with #access_token=<jwt>&type=magiclink in the URL fragment.This breaks in two real-world scenarios:
https://site/portal/ is not in the project's Redirect URL allow-list, Supabase silently rewrites the redirect to the Site URL (https://site/). The customer lands on the marketing homepage with a hash full of tokens — and your portal code never sees them.Don't go through Supabase's /auth/v1/verify endpoint at all. Generate the link manually so it lands directly on the portal page, then have the portal exchange the token via auth.verifyOtp({ token_hash, type }).
The final link looks like:
https://site/portal/?token_hash=<hashed_token>&type=magiclink
hashed_token comes from the same admin/generate_link response — Supabase returns it alongside action_link.
// POST /api/send-portal-link (Vercel serverless or any backend)
const gen = await fetch(
`${SUPABASE_URL}/auth/v1/admin/generate_link`,
{
method: 'POST',
headers: {
apikey: SUPABASE_SERVICE_ROLE_KEY,
Authorization: 'Bearer ' + SUPABASE_SERVICE_ROLE_KEY,
'Content-Type': 'application/json',
},
body: JSON.stringify({ type: 'magiclink', email: customer.email }),
}
).then(r => r.json());
const u = new URL('https://site/portal/');
u.searchParams.set('token_hash', gen.hashed_token);
u.searchParams.set('type', gen.verification_type || 'magiclink');
const magicLink = u.toString();
// Send magicLink via WhatsApp / SMS / email. The portal page handles the rest.
Keep a fallback to gen.action_link if hashed_token is missing — some older Supabase auth versions don't return it.
The portal page must:
?token_hash=...&type=... on load.verifyOtp({ token_hash, type }).?error=... / ?error_description=... with a friendly alert.See scripts/portal-bridge.js for a drop-in snippet.
The Supabase client itself should be configured with:
window.supabase.createClient(URL, ANON_KEY, {
auth: {
persistSession: true,
autoRefreshToken: true,
detectSessionInUrl: true, // picks up hash-fragment flows automatically
flowType: 'pkce', // ?code=... flow as well
storageKey: 'site-portal-auth',
},
});
/index.html?Even after deploying this skill, an older email/SMS may still hold a Supabase-style verify URL that was minted before the fix. Add a safety net at the site root that detects either #access_token= (hash flow) or ?code=/?error= (PKCE / error redirects) and forwards to /portal/. See scripts/index-redirect.js.
service_role)./portal/ with the user logged in (Supabase session present in localStorage).#access_token=... on the homepage instead — the bridge in index.html is missing or stale, not this server-side fix.verifyOtp succeeds, with history.replaceState. Otherwise refreshing the page tries to verify a now-expired token and shows an error.flowType: 'pkce' requires the same browser to generate and consume the code — so ?code= flows only work when the link is opened in the same browser that initiated the auth. Magic links opened in a different browser must use the token_hash path (default).index.html, concatenate as '/portal/' + window.location.search + window.location.hash so neither half is lost.