fix(codex): honor effective stdio env for fallback auth

This commit is contained in:
pashpashpash
2026-04-27 19:16:39 -04:00
committed by Peter Steinberger
parent 401ae38f13
commit a412603bad
4 changed files with 87 additions and 10 deletions

View File

@@ -389,13 +389,15 @@ describe("bridgeCodexAppServerStartOptions", () => {
await applyCodexAppServerAuthProfile({
client: { request } as never,
agentDir,
startOptions: createStartOptions(),
startOptions: createStartOptions({
env: { CODEX_API_KEY: "configured-codex-api-key" },
}),
});
expect(request).toHaveBeenNthCalledWith(1, "account/read", { refreshToken: false });
expect(request).toHaveBeenNthCalledWith(2, "account/login/start", {
type: "apiKey",
apiKey: "codex-env-api-key",
apiKey: "configured-codex-api-key",
});
} finally {
await fs.rm(agentDir, { recursive: true, force: true });
@@ -478,6 +480,31 @@ describe("bridgeCodexAppServerStartOptions", () => {
}
});
it("honors clearEnv before env API-key fallback", async () => {
const agentDir = await fs.mkdtemp(path.join(os.tmpdir(), "openclaw-codex-app-server-"));
const request = vi.fn(async (method: string) => {
if (method === "account/read") {
return { account: null, requiresOpenaiAuth: true };
}
return { type: "apiKey" };
});
vi.stubEnv("CODEX_API_KEY", "codex-env-api-key");
vi.stubEnv("OPENAI_API_KEY", "openai-env-api-key");
try {
await applyCodexAppServerAuthProfile({
client: { request } as never,
agentDir,
startOptions: createStartOptions({
clearEnv: ["CODEX_API_KEY", "OPENAI_API_KEY"],
}),
});
expect(request).not.toHaveBeenCalled();
} finally {
await fs.rm(agentDir, { recursive: true, force: true });
}
});
it("does not send env API-key fallback to websocket app-server connections", async () => {
const agentDir = await fs.mkdtemp(path.join(os.tmpdir(), "openclaw-codex-app-server-"));
const request = vi.fn(async (method: string) => {

View File

@@ -12,6 +12,7 @@ import type { CodexAppServerStartOptions } from "./config.js";
import type { ChatgptAuthTokensRefreshResponse } from "./protocol-generated/typescript/v2/ChatgptAuthTokensRefreshResponse.js";
import type { GetAccountResponse } from "./protocol-generated/typescript/v2/GetAccountResponse.js";
import type { LoginAccountParams } from "./protocol-generated/typescript/v2/LoginAccountParams.js";
import { resolveCodexAppServerSpawnEnv } from "./transport-stdio.js";
const CODEX_APP_SERVER_AUTH_PROVIDER = "openai-codex";
const OPENAI_CODEX_DEFAULT_PROFILE_ID = "openai-codex:default";
@@ -51,9 +52,10 @@ export async function applyCodexAppServerAuthProfile(params: {
if (params.startOptions?.transport !== "stdio") {
return;
}
const env = resolveCodexAppServerSpawnEnv(params.startOptions, process.env);
const fallbackLoginParams = await resolveCodexAppServerEnvApiKeyLoginParams({
client: params.client,
env: process.env,
env,
});
if (fallbackLoginParams) {
await params.client.request("account/login/start", fallbackLoginParams);

View File

@@ -92,8 +92,8 @@ describe("resolveCodexAppServerSpawnInvocation", () => {
describe("resolveCodexAppServerSpawnEnv", () => {
it("applies configured env overrides before clearing denied env vars", () => {
expect(
resolveCodexAppServerSpawnEnv(
expect({
...resolveCodexAppServerSpawnEnv(
{
env: {
OPENAI_API_KEY: "configured-openai-key",
@@ -107,8 +107,43 @@ describe("resolveCodexAppServerSpawnEnv", () => {
KEEP: "parent",
},
),
).toEqual({
}).toEqual({
KEEP: "override",
});
});
it("uses a null-prototype env map and ignores prototype-polluting keys", () => {
const overrides = Object.create(null) as Record<string, string | undefined>;
Object.defineProperty(overrides, "__proto__", {
value: "polluted",
enumerable: true,
});
Object.defineProperty(overrides, "constructor", {
value: "polluted",
enumerable: true,
});
Object.defineProperty(overrides, "prototype", {
value: "polluted",
enumerable: true,
});
overrides.SAFE = "1";
const env = resolveCodexAppServerSpawnEnv(
{
env: overrides as Record<string, string>,
},
{
BASE: "1",
},
);
expect(Object.getPrototypeOf(env)).toBeNull();
expect({ ...env }).toEqual({
BASE: "1",
SAFE: "1",
});
expect(Object.hasOwn(env, "__proto__")).toBe(false);
expect(Object.hasOwn(env, "constructor")).toBe(false);
expect(Object.hasOwn(env, "prototype")).toBe(false);
});
});

View File

@@ -6,6 +6,8 @@ import {
import type { CodexAppServerStartOptions } from "./config.js";
import type { CodexAppServerTransport } from "./transport.js";
const UNSAFE_ENVIRONMENT_KEYS = new Set(["__proto__", "constructor", "prototype"]);
type CodexAppServerSpawnRuntime = {
platform: NodeJS.Platform;
env: NodeJS.ProcessEnv;
@@ -45,16 +47,27 @@ export function resolveCodexAppServerSpawnEnv(
options: Pick<CodexAppServerStartOptions, "env" | "clearEnv">,
baseEnv: NodeJS.ProcessEnv = process.env,
): NodeJS.ProcessEnv {
const env = {
...baseEnv,
...options.env,
};
const env = Object.create(null) as NodeJS.ProcessEnv;
copySafeEnvironmentEntries(env, baseEnv);
copySafeEnvironmentEntries(env, options.env ?? {});
for (const key of options.clearEnv ?? []) {
delete env[key];
}
return env;
}
function copySafeEnvironmentEntries(
target: NodeJS.ProcessEnv,
source: NodeJS.ProcessEnv | Record<string, string | undefined>,
): void {
for (const [key, value] of Object.entries(source)) {
if (UNSAFE_ENVIRONMENT_KEYS.has(key)) {
continue;
}
target[key] = value;
}
}
export function createStdioTransport(options: CodexAppServerStartOptions): CodexAppServerTransport {
const env = resolveCodexAppServerSpawnEnv(options);
const invocation = resolveCodexAppServerSpawnInvocation(options, {