Files
openclaw/extensions/openai/openai-codex-auth-identity.test.ts
2026-03-25 04:24:46 -07:00

57 lines
1.7 KiB
TypeScript

import { describe, expect, it } from "vitest";
import { resolveCodexAuthIdentity } from "./openai-codex-auth-identity.js";
function createJwt(payload: Record<string, unknown>): string {
const header = Buffer.from(JSON.stringify({ alg: "none", typ: "JWT" })).toString("base64url");
const body = Buffer.from(JSON.stringify(payload)).toString("base64url");
return `${header}.${body}.signature`;
}
describe("resolveCodexAuthIdentity", () => {
it("prefers JWT profile email when present", () => {
const identity = resolveCodexAuthIdentity({
accessToken: createJwt({
"https://api.openai.com/profile": {
email: "jwt-user@example.com",
},
}),
email: "credential@example.com",
});
expect(identity).toEqual({
email: "jwt-user@example.com",
profileName: "jwt-user@example.com",
});
});
it("falls back to credential email before synthetic ids", () => {
const identity = resolveCodexAuthIdentity({
accessToken: createJwt({}),
email: "credential@example.com",
});
expect(identity).toEqual({
email: "credential@example.com",
profileName: "credential@example.com",
});
});
it("derives a stable profile id when email is missing", () => {
const identity = resolveCodexAuthIdentity({
accessToken: createJwt({
"https://api.openai.com/auth": {
chatgpt_account_user_id: "user-123__acct-456",
},
}),
});
expect(identity).toEqual({
profileName: `id-${Buffer.from("user-123__acct-456").toString("base64url")}`,
});
});
it("returns no metadata when token parsing yields no identity", () => {
expect(resolveCodexAuthIdentity({ accessToken: "not-a-jwt-token" })).toEqual({});
});
});