2025-08-07 01:27:45 -07:00
|
|
|
use base64::Engine;
|
|
|
|
|
use serde::Deserialize;
|
|
|
|
|
use serde::Serialize;
|
|
|
|
|
use thiserror::Error;
|
|
|
|
|
|
2025-09-02 18:36:19 -07:00
|
|
|
use codex_protocol::mcp_protocol::AuthMode;
|
2025-08-18 20:22:48 -07:00
|
|
|
|
2025-08-07 01:27:45 -07:00
|
|
|
#[derive(Deserialize, Serialize, Clone, Debug, PartialEq, Default)]
|
|
|
|
|
pub struct TokenData {
|
|
|
|
|
/// Flat info parsed from the JWT in auth.json.
|
2025-08-14 17:11:26 -07:00
|
|
|
#[serde(
|
|
|
|
|
deserialize_with = "deserialize_id_token",
|
|
|
|
|
serialize_with = "serialize_id_token"
|
|
|
|
|
)]
|
2025-08-07 01:27:45 -07:00
|
|
|
pub id_token: IdTokenInfo,
|
|
|
|
|
|
|
|
|
|
/// This is a JWT.
|
|
|
|
|
pub access_token: String,
|
|
|
|
|
|
|
|
|
|
pub refresh_token: String,
|
|
|
|
|
|
|
|
|
|
pub account_id: Option<String>,
|
|
|
|
|
}
|
|
|
|
|
|
2025-08-07 18:00:31 -07:00
|
|
|
impl TokenData {
|
|
|
|
|
/// Returns true if this is a plan that should use the traditional
|
|
|
|
|
/// "metered" billing via an API key.
|
2025-08-20 14:05:20 -07:00
|
|
|
pub(crate) fn should_use_api_key(
|
|
|
|
|
&self,
|
|
|
|
|
preferred_auth_method: AuthMode,
|
|
|
|
|
is_openai_email: bool,
|
|
|
|
|
) -> bool {
|
2025-08-18 20:22:48 -07:00
|
|
|
if preferred_auth_method == AuthMode::ApiKey {
|
|
|
|
|
return true;
|
|
|
|
|
}
|
2025-08-20 14:05:20 -07:00
|
|
|
// If the email is an OpenAI email, use AuthMode::ChatGPT unless preferred_auth_method is AuthMode::ApiKey.
|
|
|
|
|
if is_openai_email {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
2025-08-18 20:22:48 -07:00
|
|
|
|
2025-08-07 18:00:31 -07:00
|
|
|
self.id_token
|
|
|
|
|
.chatgpt_plan_type
|
|
|
|
|
.as_ref()
|
|
|
|
|
.is_none_or(|plan| plan.is_plan_that_should_use_api_key())
|
|
|
|
|
}
|
2025-08-20 14:05:20 -07:00
|
|
|
|
|
|
|
|
pub fn is_openai_email(&self) -> bool {
|
|
|
|
|
self.id_token
|
|
|
|
|
.email
|
|
|
|
|
.as_deref()
|
|
|
|
|
.is_some_and(|email| email.trim().to_ascii_lowercase().ends_with("@openai.com"))
|
|
|
|
|
}
|
2025-08-07 18:00:31 -07:00
|
|
|
}
|
|
|
|
|
|
2025-08-07 01:27:45 -07:00
|
|
|
/// Flat subset of useful claims in id_token from auth.json.
|
2025-08-14 17:11:26 -07:00
|
|
|
#[derive(Debug, Clone, PartialEq, Eq, Default, Serialize, Deserialize)]
|
2025-08-07 01:27:45 -07:00
|
|
|
pub struct IdTokenInfo {
|
|
|
|
|
pub email: Option<String>,
|
|
|
|
|
/// The ChatGPT subscription plan type
|
|
|
|
|
/// (e.g., "free", "plus", "pro", "business", "enterprise", "edu").
|
2025-09-02 18:36:19 -07:00
|
|
|
/// (Note: values may vary by backend.)
|
2025-08-07 18:00:31 -07:00
|
|
|
pub(crate) chatgpt_plan_type: Option<PlanType>,
|
2025-08-14 17:11:26 -07:00
|
|
|
pub raw_jwt: String,
|
2025-08-07 18:00:31 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
impl IdTokenInfo {
|
|
|
|
|
pub fn get_chatgpt_plan_type(&self) -> Option<String> {
|
|
|
|
|
self.chatgpt_plan_type.as_ref().map(|t| match t {
|
|
|
|
|
PlanType::Known(plan) => format!("{plan:?}"),
|
|
|
|
|
PlanType::Unknown(s) => s.clone(),
|
|
|
|
|
})
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[derive(Debug, Clone, PartialEq, Eq, Serialize, Deserialize)]
|
|
|
|
|
#[serde(untagged)]
|
|
|
|
|
pub(crate) enum PlanType {
|
|
|
|
|
Known(KnownPlan),
|
|
|
|
|
Unknown(String),
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
impl PlanType {
|
|
|
|
|
fn is_plan_that_should_use_api_key(&self) -> bool {
|
|
|
|
|
match self {
|
|
|
|
|
Self::Known(known) => {
|
|
|
|
|
use KnownPlan::*;
|
|
|
|
|
!matches!(known, Free | Plus | Pro | Team)
|
|
|
|
|
}
|
|
|
|
|
Self::Unknown(_) => {
|
|
|
|
|
// Unknown plans should use the API key.
|
|
|
|
|
true
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
2025-08-07 18:24:34 -07:00
|
|
|
|
|
|
|
|
pub fn as_string(&self) -> String {
|
|
|
|
|
match self {
|
|
|
|
|
Self::Known(known) => format!("{known:?}").to_lowercase(),
|
|
|
|
|
Self::Unknown(s) => s.clone(),
|
|
|
|
|
}
|
|
|
|
|
}
|
2025-08-07 18:00:31 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[derive(Debug, Clone, PartialEq, Eq, Serialize, Deserialize)]
|
|
|
|
|
#[serde(rename_all = "lowercase")]
|
|
|
|
|
pub(crate) enum KnownPlan {
|
|
|
|
|
Free,
|
|
|
|
|
Plus,
|
|
|
|
|
Pro,
|
|
|
|
|
Team,
|
|
|
|
|
Business,
|
|
|
|
|
Enterprise,
|
|
|
|
|
Edu,
|
2025-08-07 01:27:45 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[derive(Deserialize)]
|
|
|
|
|
struct IdClaims {
|
|
|
|
|
#[serde(default)]
|
|
|
|
|
email: Option<String>,
|
|
|
|
|
#[serde(rename = "https://api.openai.com/auth", default)]
|
|
|
|
|
auth: Option<AuthClaims>,
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[derive(Deserialize)]
|
|
|
|
|
struct AuthClaims {
|
|
|
|
|
#[serde(default)]
|
2025-08-07 18:00:31 -07:00
|
|
|
chatgpt_plan_type: Option<PlanType>,
|
2025-08-07 01:27:45 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[derive(Debug, Error)]
|
|
|
|
|
pub enum IdTokenInfoError {
|
|
|
|
|
#[error("invalid ID token format")]
|
|
|
|
|
InvalidFormat,
|
|
|
|
|
#[error(transparent)]
|
|
|
|
|
Base64(#[from] base64::DecodeError),
|
|
|
|
|
#[error(transparent)]
|
|
|
|
|
Json(#[from] serde_json::Error),
|
|
|
|
|
}
|
|
|
|
|
|
2025-09-02 18:36:19 -07:00
|
|
|
pub fn parse_id_token(id_token: &str) -> Result<IdTokenInfo, IdTokenInfoError> {
|
2025-08-07 01:27:45 -07:00
|
|
|
// JWT format: header.payload.signature
|
|
|
|
|
let mut parts = id_token.split('.');
|
|
|
|
|
let (_header_b64, payload_b64, _sig_b64) = match (parts.next(), parts.next(), parts.next()) {
|
|
|
|
|
(Some(h), Some(p), Some(s)) if !h.is_empty() && !p.is_empty() && !s.is_empty() => (h, p, s),
|
|
|
|
|
_ => return Err(IdTokenInfoError::InvalidFormat),
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
let payload_bytes = base64::engine::general_purpose::URL_SAFE_NO_PAD.decode(payload_b64)?;
|
|
|
|
|
let claims: IdClaims = serde_json::from_slice(&payload_bytes)?;
|
|
|
|
|
|
|
|
|
|
Ok(IdTokenInfo {
|
|
|
|
|
email: claims.email,
|
|
|
|
|
chatgpt_plan_type: claims.auth.and_then(|a| a.chatgpt_plan_type),
|
2025-08-14 17:11:26 -07:00
|
|
|
raw_jwt: id_token.to_string(),
|
2025-08-07 01:27:45 -07:00
|
|
|
})
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
fn deserialize_id_token<'de, D>(deserializer: D) -> Result<IdTokenInfo, D::Error>
|
|
|
|
|
where
|
|
|
|
|
D: serde::Deserializer<'de>,
|
|
|
|
|
{
|
|
|
|
|
let s = String::deserialize(deserializer)?;
|
|
|
|
|
parse_id_token(&s).map_err(serde::de::Error::custom)
|
|
|
|
|
}
|
|
|
|
|
|
2025-08-14 17:11:26 -07:00
|
|
|
fn serialize_id_token<S>(id_token: &IdTokenInfo, serializer: S) -> Result<S::Ok, S::Error>
|
|
|
|
|
where
|
|
|
|
|
S: serde::Serializer,
|
|
|
|
|
{
|
|
|
|
|
serializer.serialize_str(&id_token.raw_jwt)
|
|
|
|
|
}
|
|
|
|
|
|
2025-08-07 01:27:45 -07:00
|
|
|
#[cfg(test)]
|
|
|
|
|
mod tests {
|
|
|
|
|
use super::*;
|
|
|
|
|
use serde::Serialize;
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn id_token_info_parses_email_and_plan() {
|
|
|
|
|
#[derive(Serialize)]
|
|
|
|
|
struct Header {
|
|
|
|
|
alg: &'static str,
|
|
|
|
|
typ: &'static str,
|
|
|
|
|
}
|
|
|
|
|
let header = Header {
|
|
|
|
|
alg: "none",
|
|
|
|
|
typ: "JWT",
|
|
|
|
|
};
|
|
|
|
|
let payload = serde_json::json!({
|
|
|
|
|
"email": "user@example.com",
|
|
|
|
|
"https://api.openai.com/auth": {
|
|
|
|
|
"chatgpt_plan_type": "pro"
|
|
|
|
|
}
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
fn b64url_no_pad(bytes: &[u8]) -> String {
|
|
|
|
|
base64::engine::general_purpose::URL_SAFE_NO_PAD.encode(bytes)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
let header_b64 = b64url_no_pad(&serde_json::to_vec(&header).unwrap());
|
|
|
|
|
let payload_b64 = b64url_no_pad(&serde_json::to_vec(&payload).unwrap());
|
|
|
|
|
let signature_b64 = b64url_no_pad(b"sig");
|
|
|
|
|
let fake_jwt = format!("{header_b64}.{payload_b64}.{signature_b64}");
|
|
|
|
|
|
|
|
|
|
let info = parse_id_token(&fake_jwt).expect("should parse");
|
|
|
|
|
assert_eq!(info.email.as_deref(), Some("user@example.com"));
|
2025-09-02 18:36:19 -07:00
|
|
|
assert_eq!(info.get_chatgpt_plan_type().as_deref(), Some("Pro"));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn id_token_info_handles_missing_fields() {
|
|
|
|
|
#[derive(Serialize)]
|
|
|
|
|
struct Header {
|
|
|
|
|
alg: &'static str,
|
|
|
|
|
typ: &'static str,
|
|
|
|
|
}
|
|
|
|
|
let header = Header {
|
|
|
|
|
alg: "none",
|
|
|
|
|
typ: "JWT",
|
|
|
|
|
};
|
|
|
|
|
let payload = serde_json::json!({ "sub": "123" });
|
|
|
|
|
|
|
|
|
|
fn b64url_no_pad(bytes: &[u8]) -> String {
|
|
|
|
|
base64::engine::general_purpose::URL_SAFE_NO_PAD.encode(bytes)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
let header_b64 = b64url_no_pad(&serde_json::to_vec(&header).unwrap());
|
|
|
|
|
let payload_b64 = b64url_no_pad(&serde_json::to_vec(&payload).unwrap());
|
|
|
|
|
let signature_b64 = b64url_no_pad(b"sig");
|
|
|
|
|
let fake_jwt = format!("{header_b64}.{payload_b64}.{signature_b64}");
|
|
|
|
|
|
|
|
|
|
let info = parse_id_token(&fake_jwt).expect("should parse");
|
|
|
|
|
assert!(info.email.is_none());
|
|
|
|
|
assert!(info.get_chatgpt_plan_type().is_none());
|
2025-08-07 01:27:45 -07:00
|
|
|
}
|
|
|
|
|
}
|