fix: default to credits from ChatGPT auth, when possible (#1971)

Uses this rough strategy for authentication:

```
if auth.json
	if auth.json.API_KEY is NULL # new auth
		CHAT
	else # old auth
		if plus or pro or team
			CHAT
		else 
			API_KEY
		
else OPENAI_API_KEY
```

---
[//]: # (BEGIN SAPLING FOOTER)
Stack created with [Sapling](https://sapling-scm.com). Best reviewed
with [ReviewStack](https://reviewstack.dev/openai/codex/pull/1970).
* __->__ #1971
* #1970
* #1966
* #1965
* #1962
This commit is contained in:
Michael Bolin
2025-08-07 18:00:31 -07:00
committed by GitHub
parent 295abf3e51
commit cd06b28d84
3 changed files with 268 additions and 97 deletions

View File

@@ -159,47 +159,77 @@ impl CodexAuth {
} }
fn load_auth(codex_home: &Path, include_env_var: bool) -> std::io::Result<Option<CodexAuth>> { fn load_auth(codex_home: &Path, include_env_var: bool) -> std::io::Result<Option<CodexAuth>> {
// First, check to see if there is a valid auth.json file. If not, we fall
// back to AuthMode::ApiKey using the OPENAI_API_KEY environment variable
// (if it is set).
let auth_file = get_auth_file(codex_home); let auth_file = get_auth_file(codex_home);
let auth_dot_json = match try_read_auth_json(&auth_file) {
let auth_dot_json = try_read_auth_json(&auth_file).ok(); Ok(auth) => auth,
// If auth.json does not exist, try to read the OPENAI_API_KEY from the
let auth_json_api_key = auth_dot_json // environment variable.
.as_ref() Err(e) if e.kind() == std::io::ErrorKind::NotFound && include_env_var => {
.and_then(|a| a.openai_api_key.clone()) return match read_openai_api_key_from_env() {
.filter(|s| !s.is_empty()); Some(api_key) => Ok(Some(CodexAuth::from_api_key(&api_key))),
None => Ok(None),
let openai_api_key = if include_env_var { };
env::var(OPENAI_API_KEY_ENV_VAR) }
.ok() // Though if auth.json exists but is malformed, do not fall back to the
.filter(|s| !s.is_empty()) // env var because the user may be expecting to use AuthMode::ChatGPT.
.or(auth_json_api_key) Err(e) => {
} else { return Err(e);
auth_json_api_key }
}; };
let has_tokens = auth_dot_json let AuthDotJson {
.as_ref() openai_api_key: auth_json_api_key,
.and_then(|a| a.tokens.as_ref()) tokens,
.is_some(); last_refresh,
} = auth_dot_json;
if openai_api_key.is_none() && !has_tokens { // If the auth.json has an API key AND does not appear to be on a plan that
return Ok(None); // should prefer AuthMode::ChatGPT, use AuthMode::ApiKey.
if let Some(api_key) = &auth_json_api_key {
// Should any of these be AuthMode::ChatGPT with the api_key set?
// Does AuthMode::ChatGPT indicate that there is an auth.json that is
// "refreshable" even if we are using the API key for auth?
match &tokens {
Some(tokens) => {
if tokens.is_plan_that_should_use_api_key() {
return Ok(Some(CodexAuth::from_api_key(api_key)));
} else {
// Ignore the API key and fall through to ChatGPT auth.
}
}
None => {
// We have an API key but no tokens in the auth.json file.
// Perhaps the user ran `codex login --api-key <KEY>` or updated
// auth.json by hand. Either way, let's assume they are trying
// to use their API key.
return Ok(Some(CodexAuth::from_api_key(api_key)));
}
}
} }
let mode = if openai_api_key.is_some() { // For the AuthMode::ChatGPT variant, perhaps neither api_key nor
AuthMode::ApiKey // openai_api_key should exist?
} else {
AuthMode::ChatGPT
};
Ok(Some(CodexAuth { Ok(Some(CodexAuth {
api_key: openai_api_key, api_key: None,
mode, mode: AuthMode::ChatGPT,
auth_file, auth_file,
auth_dot_json: Arc::new(Mutex::new(auth_dot_json)), auth_dot_json: Arc::new(Mutex::new(Some(AuthDotJson {
openai_api_key: None,
tokens,
last_refresh,
}))),
})) }))
} }
fn read_openai_api_key_from_env() -> Option<String> {
env::var(OPENAI_API_KEY_ENV_VAR)
.ok()
.filter(|s| !s.is_empty())
}
pub fn get_auth_file(codex_home: &Path) -> PathBuf { pub fn get_auth_file(codex_home: &Path) -> PathBuf {
codex_home.join("auth.json") codex_home.join("auth.json")
} }
@@ -423,14 +453,19 @@ pub struct AuthDotJson {
#[cfg(test)] #[cfg(test)]
mod tests { mod tests {
#![expect(clippy::expect_used, clippy::unwrap_used)]
use super::*; use super::*;
use crate::token_data::IdTokenInfo; use crate::token_data::IdTokenInfo;
use crate::token_data::KnownPlan;
use crate::token_data::PlanType;
use base64::Engine; use base64::Engine;
use pretty_assertions::assert_eq; use pretty_assertions::assert_eq;
use serde_json::json;
use tempfile::tempdir; use tempfile::tempdir;
const LAST_REFRESH: &str = "2025-08-06T20:41:36.232376Z";
#[test] #[test]
#[expect(clippy::unwrap_used)]
fn writes_api_key_and_loads_auth() { fn writes_api_key_and_loads_auth() {
let dir = tempdir().unwrap(); let dir = tempdir().unwrap();
login_with_api_key(dir.path(), "sk-test-key").unwrap(); login_with_api_key(dir.path(), "sk-test-key").unwrap();
@@ -440,7 +475,6 @@ mod tests {
} }
#[test] #[test]
#[expect(clippy::unwrap_used)]
fn loads_from_env_var_if_env_var_exists() { fn loads_from_env_var_if_env_var_exists() {
let dir = tempdir().unwrap(); let dir = tempdir().unwrap();
@@ -454,10 +488,132 @@ mod tests {
} }
#[tokio::test] #[tokio::test]
#[expect(clippy::expect_used, clippy::unwrap_used)] async fn pro_account_with_no_api_key_uses_chatgpt_auth() {
async fn loads_token_data_from_auth_json() { let codex_home = tempdir().unwrap();
let dir = tempdir().unwrap(); write_auth_file(
let auth_file = dir.path().join("auth.json"); AuthFileParams {
openai_api_key: None,
chatgpt_plan_type: "pro".to_string(),
},
codex_home.path(),
)
.expect("failed to write auth file");
let CodexAuth {
api_key,
mode,
auth_dot_json,
auth_file: _,
} = load_auth(codex_home.path(), false).unwrap().unwrap();
assert_eq!(None, api_key);
assert_eq!(AuthMode::ChatGPT, mode);
let guard = auth_dot_json.lock().unwrap();
let auth_dot_json = guard.as_ref().expect("AuthDotJson should exist");
assert_eq!(
&AuthDotJson {
openai_api_key: None,
tokens: Some(TokenData {
id_token: IdTokenInfo {
email: Some("user@example.com".to_string()),
chatgpt_plan_type: Some(PlanType::Known(KnownPlan::Pro)),
},
access_token: "test-access-token".to_string(),
refresh_token: "test-refresh-token".to_string(),
account_id: None,
}),
last_refresh: Some(
DateTime::parse_from_rfc3339(LAST_REFRESH)
.unwrap()
.with_timezone(&Utc)
),
},
auth_dot_json
)
}
/// Even if the OPENAI_API_KEY is set in auth.json, if the plan is not in
/// [`TokenData::is_plan_that_should_use_api_key`], it should use
/// [`AuthMode::ChatGPT`].
#[tokio::test]
async fn pro_account_with_api_key_still_uses_chatgpt_auth() {
let codex_home = tempdir().unwrap();
write_auth_file(
AuthFileParams {
openai_api_key: Some("sk-test-key".to_string()),
chatgpt_plan_type: "pro".to_string(),
},
codex_home.path(),
)
.expect("failed to write auth file");
let CodexAuth {
api_key,
mode,
auth_dot_json,
auth_file: _,
} = load_auth(codex_home.path(), false).unwrap().unwrap();
assert_eq!(None, api_key);
assert_eq!(AuthMode::ChatGPT, mode);
let guard = auth_dot_json.lock().unwrap();
let auth_dot_json = guard.as_ref().expect("AuthDotJson should exist");
assert_eq!(
&AuthDotJson {
openai_api_key: None,
tokens: Some(TokenData {
id_token: IdTokenInfo {
email: Some("user@example.com".to_string()),
chatgpt_plan_type: Some(PlanType::Known(KnownPlan::Pro)),
},
access_token: "test-access-token".to_string(),
refresh_token: "test-refresh-token".to_string(),
account_id: None,
}),
last_refresh: Some(
DateTime::parse_from_rfc3339(LAST_REFRESH)
.unwrap()
.with_timezone(&Utc)
),
},
auth_dot_json
)
}
/// If the OPENAI_API_KEY is set in auth.json and it is an enterprise
/// account, then it should use [`AuthMode::ApiKey`].
#[tokio::test]
async fn enterprise_account_with_api_key_uses_chatgpt_auth() {
let codex_home = tempdir().unwrap();
write_auth_file(
AuthFileParams {
openai_api_key: Some("sk-test-key".to_string()),
chatgpt_plan_type: "enterprise".to_string(),
},
codex_home.path(),
)
.expect("failed to write auth file");
let CodexAuth {
api_key,
mode,
auth_dot_json,
auth_file: _,
} = load_auth(codex_home.path(), false).unwrap().unwrap();
assert_eq!(Some("sk-test-key".to_string()), api_key);
assert_eq!(AuthMode::ApiKey, mode);
let guard = auth_dot_json.lock().expect("should unwrap");
assert!(guard.is_none(), "auth_dot_json should be None");
}
struct AuthFileParams {
openai_api_key: Option<String>,
chatgpt_plan_type: String,
}
fn write_auth_file(params: AuthFileParams, codex_home: &Path) -> std::io::Result<()> {
let auth_file = get_auth_file(codex_home);
// Create a minimal valid JWT for the id_token field. // Create a minimal valid JWT for the id_token field.
#[derive(Serialize)] #[derive(Serialize)]
struct Header { struct Header {
@@ -473,71 +629,31 @@ mod tests {
"email_verified": true, "email_verified": true,
"https://api.openai.com/auth": { "https://api.openai.com/auth": {
"chatgpt_account_id": "bc3618e3-489d-4d49-9362-1561dc53ba53", "chatgpt_account_id": "bc3618e3-489d-4d49-9362-1561dc53ba53",
"chatgpt_plan_type": "pro", "chatgpt_plan_type": params.chatgpt_plan_type,
"chatgpt_user_id": "user-12345", "chatgpt_user_id": "user-12345",
"user_id": "user-12345", "user_id": "user-12345",
} }
}); });
let b64 = |b: &[u8]| base64::engine::general_purpose::URL_SAFE_NO_PAD.encode(b); let b64 = |b: &[u8]| base64::engine::general_purpose::URL_SAFE_NO_PAD.encode(b);
let header_b64 = b64(&serde_json::to_vec(&header).unwrap()); let header_b64 = b64(&serde_json::to_vec(&header)?);
let payload_b64 = b64(&serde_json::to_vec(&payload).unwrap()); let payload_b64 = b64(&serde_json::to_vec(&payload)?);
let signature_b64 = b64(b"sig"); let signature_b64 = b64(b"sig");
let fake_jwt = format!("{header_b64}.{payload_b64}.{signature_b64}"); let fake_jwt = format!("{header_b64}.{payload_b64}.{signature_b64}");
std::fs::write(
auth_file, let auth_json_data = json!({
format!( "OPENAI_API_KEY": params.openai_api_key,
r#" "tokens": {
{{ "id_token": fake_jwt,
"OPENAI_API_KEY": null,
"tokens": {{
"id_token": "{fake_jwt}",
"access_token": "test-access-token", "access_token": "test-access-token",
"refresh_token": "test-refresh-token" "refresh_token": "test-refresh-token"
}},
"last_refresh": "2025-08-06T20:41:36.232376Z"
}}
"#,
),
)
.unwrap();
let CodexAuth {
api_key,
mode,
auth_dot_json,
auth_file,
} = load_auth(dir.path(), false).unwrap().unwrap();
assert_eq!(None, api_key);
assert_eq!(AuthMode::ChatGPT, mode);
assert_eq!(dir.path().join("auth.json"), auth_file);
let guard = auth_dot_json.lock().unwrap();
let auth_dot_json = guard.as_ref().expect("AuthDotJson should exist");
assert_eq!(
&AuthDotJson {
openai_api_key: None,
tokens: Some(TokenData {
id_token: IdTokenInfo {
email: Some("user@example.com".to_string()),
chatgpt_plan_type: Some("pro".to_string()),
},
access_token: "test-access-token".to_string(),
refresh_token: "test-refresh-token".to_string(),
account_id: None,
}),
last_refresh: Some(
DateTime::parse_from_rfc3339("2025-08-06T20:41:36.232376Z")
.unwrap()
.with_timezone(&Utc)
),
}, },
auth_dot_json "last_refresh": LAST_REFRESH,
) });
let auth_json = serde_json::to_string_pretty(&auth_json_data)?;
std::fs::write(auth_file, auth_json)
} }
#[test] #[test]
#[expect(clippy::expect_used, clippy::unwrap_used)]
fn id_token_info_handles_missing_fields() { fn id_token_info_handles_missing_fields() {
// Payload without email or plan should yield None values. // Payload without email or plan should yield None values.
let header = serde_json::json!({"alg": "none", "typ": "JWT"}); let header = serde_json::json!({"alg": "none", "typ": "JWT"});
@@ -555,7 +671,6 @@ mod tests {
} }
#[tokio::test] #[tokio::test]
#[expect(clippy::unwrap_used)]
async fn loads_api_key_from_auth_json() { async fn loads_api_key_from_auth_json() {
let dir = tempdir().unwrap(); let dir = tempdir().unwrap();
let auth_file = dir.path().join("auth.json"); let auth_file = dir.path().join("auth.json");

View File

@@ -17,6 +17,17 @@ pub struct TokenData {
pub account_id: Option<String>, pub account_id: Option<String>,
} }
impl TokenData {
/// Returns true if this is a plan that should use the traditional
/// "metered" billing via an API key.
pub(crate) fn is_plan_that_should_use_api_key(&self) -> bool {
self.id_token
.chatgpt_plan_type
.as_ref()
.is_none_or(|plan| plan.is_plan_that_should_use_api_key())
}
}
/// Flat subset of useful claims in id_token from auth.json. /// Flat subset of useful claims in id_token from auth.json.
#[derive(Debug, Clone, PartialEq, Eq, Default, Serialize)] #[derive(Debug, Clone, PartialEq, Eq, Default, Serialize)]
pub struct IdTokenInfo { pub struct IdTokenInfo {
@@ -24,7 +35,50 @@ pub struct IdTokenInfo {
/// The ChatGPT subscription plan type /// The ChatGPT subscription plan type
/// (e.g., "free", "plus", "pro", "business", "enterprise", "edu"). /// (e.g., "free", "plus", "pro", "business", "enterprise", "edu").
/// (Note: ae has not verified that those are the exact values.) /// (Note: ae has not verified that those are the exact values.)
pub chatgpt_plan_type: Option<String>, pub(crate) chatgpt_plan_type: Option<PlanType>,
}
impl IdTokenInfo {
pub fn get_chatgpt_plan_type(&self) -> Option<String> {
self.chatgpt_plan_type.as_ref().map(|t| match t {
PlanType::Known(plan) => format!("{plan:?}"),
PlanType::Unknown(s) => s.clone(),
})
}
}
#[derive(Debug, Clone, PartialEq, Eq, Serialize, Deserialize)]
#[serde(untagged)]
pub(crate) enum PlanType {
Known(KnownPlan),
Unknown(String),
}
impl PlanType {
fn is_plan_that_should_use_api_key(&self) -> bool {
match self {
Self::Known(known) => {
use KnownPlan::*;
!matches!(known, Free | Plus | Pro | Team)
}
Self::Unknown(_) => {
// Unknown plans should use the API key.
true
}
}
}
}
#[derive(Debug, Clone, PartialEq, Eq, Serialize, Deserialize)]
#[serde(rename_all = "lowercase")]
pub(crate) enum KnownPlan {
Free,
Plus,
Pro,
Team,
Business,
Enterprise,
Edu,
} }
#[derive(Deserialize)] #[derive(Deserialize)]
@@ -38,7 +92,7 @@ struct IdClaims {
#[derive(Deserialize)] #[derive(Deserialize)]
struct AuthClaims { struct AuthClaims {
#[serde(default)] #[serde(default)]
chatgpt_plan_type: Option<String>, chatgpt_plan_type: Option<PlanType>,
} }
#[derive(Debug, Error)] #[derive(Debug, Error)]
@@ -112,6 +166,9 @@ mod tests {
let info = parse_id_token(&fake_jwt).expect("should parse"); let info = parse_id_token(&fake_jwt).expect("should parse");
assert_eq!(info.email.as_deref(), Some("user@example.com")); assert_eq!(info.email.as_deref(), Some("user@example.com"));
assert_eq!(info.chatgpt_plan_type.as_deref(), Some("pro")); assert_eq!(
info.chatgpt_plan_type,
Some(PlanType::Known(KnownPlan::Pro))
);
} }
} }

View File

@@ -537,8 +537,8 @@ impl HistoryCell {
lines.push(Line::from(" • Signed in with ChatGPT")); lines.push(Line::from(" • Signed in with ChatGPT"));
let info = tokens.id_token; let info = tokens.id_token;
if let Some(email) = info.email { if let Some(email) = &info.email {
lines.push(Line::from(vec![" • Login: ".into(), email.into()])); lines.push(Line::from(vec![" • Login: ".into(), email.clone().into()]));
} }
match auth.openai_api_key.as_deref() { match auth.openai_api_key.as_deref() {
@@ -549,9 +549,8 @@ impl HistoryCell {
} }
_ => { _ => {
let plan_text = info let plan_text = info
.chatgpt_plan_type .get_chatgpt_plan_type()
.as_deref() .map(|s| title_case(&s))
.map(title_case)
.unwrap_or_else(|| "Unknown".to_string()); .unwrap_or_else(|| "Unknown".to_string());
lines.push(Line::from(vec![" • Plan: ".into(), plan_text.into()])); lines.push(Line::from(vec![" • Plan: ".into(), plan_text.into()]));
} }