Topolo Quro
Public overview of the QR creation, redirect, analytics, and authenticated UI surface in the Topolo portfolio.
What It Is
Topolo Quro is the QR creation, redirect, and scan-tracking application in the Topolo portfolio.
Architecture
The current repo shape includes an API worker, a redirect worker, a canonical modern UI, and a retained legacy UI used only for reference and parity checks.
Runtime Surfaces
Use /systems/topolo-quro for the current deployment inventory and service metadata.
API Reference
The active contract centers on QR creation, templates, analytics, redirect resolution, and org-scoped authenticated browser flows.
Auth and Permissions
The canonical current UI uses the first-party Topolo auth pattern with authenticated routes, branded embedded password login on quro.topolo.app, and callback flows. The legacy UI should not be treated as the active auth model.
Protected Quro API bearer-token requests validate through Auth and do not accept locally decoded JWT claims from a Worker secret.
Browser SSO callbacks delegate one-time sso_code redemption to the shared @topolo/auth-client package, so callback URLs carry short-lived codes rather than bearer tokens or /sso?token= bridge payloads.
The canonical browser UI keeps a same-tab Auth token restore by default after sign-in and refresh, so a normal reload should reopen the authenticated dashboard rather than appearing signed out.
Quro now also normalizes any missing Auth role claim to member in both the canonical browser UI and API worker bootstrap.
Data Ownership
Quro owns QR assets, redirect mappings, analytics, and related org-scoped settings and dashboards.
Deployments
Deploy Quro as a cluster of API, redirect, and authenticated UI surfaces. Treat the legacy UI as reference-only.
Failure Modes
- legacy UI behavior is mistaken for the live product contract
- redirect and analytics behavior drifts from the authenticated create/manage surface
- auth flows are documented from the wrong UI generation
Debugging
Start with /systems/topolo-quro, then confirm whether the failing behavior belongs to the canonical UI, redirect worker, or API worker.
Change Log / Verification
- Enabled same-tab browser session restore by default on 2026-04-23 so Quro reloads remain signed in after successful Auth handoff or refresh.
- Corrected Quro role normalization on 2026-04-24 so missing Auth role claims resolve to
memberin both the canonical UI and API worker bootstrap. - Verified the canonical Quro branded password-login completion path on 2026-04-21 so first-party sign-in remains on the app origin after shared Auth persists the session.
- Removed the Quro API worker’s residual local
JWT_SECREThandoff on 2026-04-18 so protected bearer-token requests validate through Auth. - Removed the canonical Quro
/sso?token=browser bridge on 2026-04-18 so/auth/callbacknow relies on the shared Topolo browser auth client for code redemption - Added canonical Topolo Quro coverage and retired repo-local Quro docs on 2026-03-30
- Promoted canonical Quro browser SSO callbacks to Auth
/sso/exchangeon 2026-04-17 so callback URLs require a one-timesso_codeinstead of bearer tokens