mirror of
https://github.com/badlogic/pi-mono.git
synced 2026-05-24 22:15:33 +00:00
137 lines
4.7 KiB
TypeScript
137 lines
4.7 KiB
TypeScript
import { setKeybindings } from "@earendil-works/pi-tui";
|
|
import { afterEach, beforeAll, beforeEach, describe, expect, it } from "vitest";
|
|
import { AuthStorage } from "../src/core/auth-storage.js";
|
|
import { KeybindingsManager } from "../src/core/keybindings.js";
|
|
import { BUILT_IN_PROVIDER_DISPLAY_NAMES } from "../src/core/provider-display-names.js";
|
|
import { OAuthSelectorComponent } from "../src/modes/interactive/components/oauth-selector.js";
|
|
import { isApiKeyLoginProvider } from "../src/modes/interactive/interactive-mode.js";
|
|
import { initTheme } from "../src/modes/interactive/theme/theme.js";
|
|
import { stripAnsi } from "../src/utils/ansi.js";
|
|
|
|
const originalOpenAiApiKey = process.env.OPENAI_API_KEY;
|
|
|
|
describe("OAuthSelectorComponent", () => {
|
|
beforeAll(() => {
|
|
initTheme("dark");
|
|
});
|
|
|
|
beforeEach(() => {
|
|
setKeybindings(new KeybindingsManager());
|
|
});
|
|
|
|
afterEach(() => {
|
|
if (originalOpenAiApiKey === undefined) {
|
|
delete process.env.OPENAI_API_KEY;
|
|
} else {
|
|
process.env.OPENAI_API_KEY = originalOpenAiApiKey;
|
|
}
|
|
});
|
|
|
|
it("keeps built-in API key providers separate from OAuth-only providers", () => {
|
|
const oauthProviderIds = new Set(["anthropic", "github-copilot", "custom-oauth"]);
|
|
const builtInProviderIds = new Set(["anthropic", "github-copilot", "amazon-bedrock", "openai"]);
|
|
|
|
expect(isApiKeyLoginProvider("anthropic", oauthProviderIds, builtInProviderIds)).toBe(true);
|
|
expect(BUILT_IN_PROVIDER_DISPLAY_NAMES.anthropic).toBe("Anthropic");
|
|
expect(isApiKeyLoginProvider("openai", oauthProviderIds, builtInProviderIds)).toBe(true);
|
|
expect(isApiKeyLoginProvider("github-copilot", oauthProviderIds, builtInProviderIds)).toBe(false);
|
|
expect(isApiKeyLoginProvider("amazon-bedrock", oauthProviderIds, builtInProviderIds)).toBe(true);
|
|
expect(isApiKeyLoginProvider("custom-oauth", oauthProviderIds, builtInProviderIds)).toBe(false);
|
|
expect(isApiKeyLoginProvider("custom-api", oauthProviderIds, builtInProviderIds)).toBe(true);
|
|
});
|
|
|
|
it("shows stored OAuth auth distinctly in the API key selector", () => {
|
|
const authStorage = AuthStorage.inMemory({
|
|
anthropic: {
|
|
type: "oauth",
|
|
access: "access-token",
|
|
refresh: "refresh-token",
|
|
expires: Date.now() + 60_000,
|
|
},
|
|
});
|
|
const selector = new OAuthSelectorComponent(
|
|
"login",
|
|
authStorage,
|
|
[{ id: "anthropic", name: "Anthropic", authType: "api_key" }],
|
|
() => {},
|
|
() => {},
|
|
);
|
|
|
|
const output = stripAnsi(selector.render(120).join("\n"));
|
|
|
|
expect(output).toContain("Anthropic");
|
|
expect(output).toContain("subscription configured");
|
|
});
|
|
|
|
it("shows environment API key auth as configured", () => {
|
|
process.env.OPENAI_API_KEY = "test-openai-key";
|
|
const authStorage = AuthStorage.inMemory();
|
|
const selector = new OAuthSelectorComponent(
|
|
"login",
|
|
authStorage,
|
|
[{ id: "openai", name: "OpenAI", authType: "api_key" }],
|
|
() => {},
|
|
() => {},
|
|
);
|
|
|
|
const output = stripAnsi(selector.render(120).join("\n"));
|
|
|
|
expect(output).toContain("OpenAI");
|
|
expect(output).toContain("✓ env: OPENAI_API_KEY");
|
|
expect(output).not.toContain("unconfigured");
|
|
});
|
|
|
|
it("shows custom provider environment API key auth from status resolver", () => {
|
|
const authStorage = AuthStorage.inMemory();
|
|
const selector = new OAuthSelectorComponent(
|
|
"login",
|
|
authStorage,
|
|
[{ id: "ollama", name: "ollama", authType: "api_key" }],
|
|
() => {},
|
|
() => {},
|
|
() => ({ configured: true, source: "environment", label: "OLLAMA_API_KEY" }),
|
|
);
|
|
|
|
const output = stripAnsi(selector.render(120).join("\n"));
|
|
|
|
expect(output).toContain("ollama");
|
|
expect(output).toContain("✓ env: OLLAMA_API_KEY");
|
|
expect(output).not.toContain("unconfigured");
|
|
});
|
|
|
|
it("shows models.json API key auth as configured", () => {
|
|
const authStorage = AuthStorage.inMemory();
|
|
const selector = new OAuthSelectorComponent(
|
|
"login",
|
|
authStorage,
|
|
[{ id: "local-proxy", name: "local-proxy", authType: "api_key" }],
|
|
() => {},
|
|
() => {},
|
|
() => ({ configured: true, source: "models_json_key" }),
|
|
);
|
|
|
|
const output = stripAnsi(selector.render(120).join("\n"));
|
|
|
|
expect(output).toContain("local-proxy");
|
|
expect(output).toContain("✓ key in models.json");
|
|
expect(output).not.toContain("unconfigured");
|
|
});
|
|
|
|
it("shows models.json command auth as configured", () => {
|
|
const authStorage = AuthStorage.inMemory();
|
|
const selector = new OAuthSelectorComponent(
|
|
"login",
|
|
authStorage,
|
|
[{ id: "op-proxy", name: "op-proxy", authType: "api_key" }],
|
|
() => {},
|
|
() => {},
|
|
() => ({ configured: true, source: "models_json_command" }),
|
|
);
|
|
|
|
const output = stripAnsi(selector.render(120).join("\n"));
|
|
|
|
expect(output).toContain("op-proxy");
|
|
expect(output).toContain("✓ command in models.json");
|
|
expect(output).not.toContain("unconfigured");
|
|
});
|
|
});
|