codex_oauth.go 7.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288
  1. package service
  2. import (
  3. "context"
  4. "crypto/rand"
  5. "crypto/sha256"
  6. "encoding/base64"
  7. "encoding/json"
  8. "errors"
  9. "fmt"
  10. "net/http"
  11. "net/url"
  12. "strings"
  13. "time"
  14. )
  15. const (
  16. codexOAuthClientID = "app_EMoamEEZ73f0CkXaXp7hrann"
  17. codexOAuthAuthorizeURL = "https://auth.openai.com/oauth/authorize"
  18. codexOAuthTokenURL = "https://auth.openai.com/oauth/token"
  19. codexOAuthRedirectURI = "http://localhost:1455/auth/callback"
  20. codexOAuthScope = "openid profile email offline_access"
  21. codexJWTClaimPath = "https://api.openai.com/auth"
  22. defaultHTTPTimeout = 20 * time.Second
  23. )
  24. type CodexOAuthTokenResult struct {
  25. AccessToken string
  26. RefreshToken string
  27. ExpiresAt time.Time
  28. }
  29. type CodexOAuthAuthorizationFlow struct {
  30. State string
  31. Verifier string
  32. Challenge string
  33. AuthorizeURL string
  34. }
  35. func RefreshCodexOAuthToken(ctx context.Context, refreshToken string) (*CodexOAuthTokenResult, error) {
  36. client := &http.Client{Timeout: defaultHTTPTimeout}
  37. return refreshCodexOAuthToken(ctx, client, codexOAuthTokenURL, codexOAuthClientID, refreshToken)
  38. }
  39. func ExchangeCodexAuthorizationCode(ctx context.Context, code string, verifier string) (*CodexOAuthTokenResult, error) {
  40. client := &http.Client{Timeout: defaultHTTPTimeout}
  41. return exchangeCodexAuthorizationCode(ctx, client, codexOAuthTokenURL, codexOAuthClientID, code, verifier, codexOAuthRedirectURI)
  42. }
  43. func CreateCodexOAuthAuthorizationFlow() (*CodexOAuthAuthorizationFlow, error) {
  44. state, err := createStateHex(16)
  45. if err != nil {
  46. return nil, err
  47. }
  48. verifier, challenge, err := generatePKCEPair()
  49. if err != nil {
  50. return nil, err
  51. }
  52. u, err := buildCodexAuthorizeURL(state, challenge)
  53. if err != nil {
  54. return nil, err
  55. }
  56. return &CodexOAuthAuthorizationFlow{
  57. State: state,
  58. Verifier: verifier,
  59. Challenge: challenge,
  60. AuthorizeURL: u,
  61. }, nil
  62. }
  63. func refreshCodexOAuthToken(
  64. ctx context.Context,
  65. client *http.Client,
  66. tokenURL string,
  67. clientID string,
  68. refreshToken string,
  69. ) (*CodexOAuthTokenResult, error) {
  70. rt := strings.TrimSpace(refreshToken)
  71. if rt == "" {
  72. return nil, errors.New("empty refresh_token")
  73. }
  74. form := url.Values{}
  75. form.Set("grant_type", "refresh_token")
  76. form.Set("refresh_token", rt)
  77. form.Set("client_id", clientID)
  78. req, err := http.NewRequestWithContext(ctx, http.MethodPost, tokenURL, strings.NewReader(form.Encode()))
  79. if err != nil {
  80. return nil, err
  81. }
  82. req.Header.Set("Content-Type", "application/x-www-form-urlencoded")
  83. req.Header.Set("Accept", "application/json")
  84. resp, err := client.Do(req)
  85. if err != nil {
  86. return nil, err
  87. }
  88. defer resp.Body.Close()
  89. var payload struct {
  90. AccessToken string `json:"access_token"`
  91. RefreshToken string `json:"refresh_token"`
  92. ExpiresIn int `json:"expires_in"`
  93. }
  94. if err := json.NewDecoder(resp.Body).Decode(&payload); err != nil {
  95. return nil, err
  96. }
  97. if resp.StatusCode < 200 || resp.StatusCode >= 300 {
  98. return nil, fmt.Errorf("codex oauth refresh failed: status=%d", resp.StatusCode)
  99. }
  100. if strings.TrimSpace(payload.AccessToken) == "" || strings.TrimSpace(payload.RefreshToken) == "" || payload.ExpiresIn <= 0 {
  101. return nil, errors.New("codex oauth refresh response missing fields")
  102. }
  103. return &CodexOAuthTokenResult{
  104. AccessToken: strings.TrimSpace(payload.AccessToken),
  105. RefreshToken: strings.TrimSpace(payload.RefreshToken),
  106. ExpiresAt: time.Now().Add(time.Duration(payload.ExpiresIn) * time.Second),
  107. }, nil
  108. }
  109. func exchangeCodexAuthorizationCode(
  110. ctx context.Context,
  111. client *http.Client,
  112. tokenURL string,
  113. clientID string,
  114. code string,
  115. verifier string,
  116. redirectURI string,
  117. ) (*CodexOAuthTokenResult, error) {
  118. c := strings.TrimSpace(code)
  119. v := strings.TrimSpace(verifier)
  120. if c == "" {
  121. return nil, errors.New("empty authorization code")
  122. }
  123. if v == "" {
  124. return nil, errors.New("empty code_verifier")
  125. }
  126. form := url.Values{}
  127. form.Set("grant_type", "authorization_code")
  128. form.Set("client_id", clientID)
  129. form.Set("code", c)
  130. form.Set("code_verifier", v)
  131. form.Set("redirect_uri", redirectURI)
  132. req, err := http.NewRequestWithContext(ctx, http.MethodPost, tokenURL, strings.NewReader(form.Encode()))
  133. if err != nil {
  134. return nil, err
  135. }
  136. req.Header.Set("Content-Type", "application/x-www-form-urlencoded")
  137. req.Header.Set("Accept", "application/json")
  138. resp, err := client.Do(req)
  139. if err != nil {
  140. return nil, err
  141. }
  142. defer resp.Body.Close()
  143. var payload struct {
  144. AccessToken string `json:"access_token"`
  145. RefreshToken string `json:"refresh_token"`
  146. ExpiresIn int `json:"expires_in"`
  147. }
  148. if err := json.NewDecoder(resp.Body).Decode(&payload); err != nil {
  149. return nil, err
  150. }
  151. if resp.StatusCode < 200 || resp.StatusCode >= 300 {
  152. return nil, fmt.Errorf("codex oauth code exchange failed: status=%d", resp.StatusCode)
  153. }
  154. if strings.TrimSpace(payload.AccessToken) == "" || strings.TrimSpace(payload.RefreshToken) == "" || payload.ExpiresIn <= 0 {
  155. return nil, errors.New("codex oauth token response missing fields")
  156. }
  157. return &CodexOAuthTokenResult{
  158. AccessToken: strings.TrimSpace(payload.AccessToken),
  159. RefreshToken: strings.TrimSpace(payload.RefreshToken),
  160. ExpiresAt: time.Now().Add(time.Duration(payload.ExpiresIn) * time.Second),
  161. }, nil
  162. }
  163. func buildCodexAuthorizeURL(state string, challenge string) (string, error) {
  164. u, err := url.Parse(codexOAuthAuthorizeURL)
  165. if err != nil {
  166. return "", err
  167. }
  168. q := u.Query()
  169. q.Set("response_type", "code")
  170. q.Set("client_id", codexOAuthClientID)
  171. q.Set("redirect_uri", codexOAuthRedirectURI)
  172. q.Set("scope", codexOAuthScope)
  173. q.Set("code_challenge", challenge)
  174. q.Set("code_challenge_method", "S256")
  175. q.Set("state", state)
  176. q.Set("id_token_add_organizations", "true")
  177. q.Set("codex_cli_simplified_flow", "true")
  178. q.Set("originator", "codex_cli_rs")
  179. u.RawQuery = q.Encode()
  180. return u.String(), nil
  181. }
  182. func createStateHex(nBytes int) (string, error) {
  183. if nBytes <= 0 {
  184. return "", errors.New("invalid state bytes length")
  185. }
  186. b := make([]byte, nBytes)
  187. if _, err := rand.Read(b); err != nil {
  188. return "", err
  189. }
  190. return fmt.Sprintf("%x", b), nil
  191. }
  192. func generatePKCEPair() (verifier string, challenge string, err error) {
  193. b := make([]byte, 32)
  194. if _, err := rand.Read(b); err != nil {
  195. return "", "", err
  196. }
  197. verifier = base64.RawURLEncoding.EncodeToString(b)
  198. sum := sha256.Sum256([]byte(verifier))
  199. challenge = base64.RawURLEncoding.EncodeToString(sum[:])
  200. return verifier, challenge, nil
  201. }
  202. func ExtractCodexAccountIDFromJWT(token string) (string, bool) {
  203. claims, ok := decodeJWTClaims(token)
  204. if !ok {
  205. return "", false
  206. }
  207. raw, ok := claims[codexJWTClaimPath]
  208. if !ok {
  209. return "", false
  210. }
  211. obj, ok := raw.(map[string]any)
  212. if !ok {
  213. return "", false
  214. }
  215. v, ok := obj["chatgpt_account_id"]
  216. if !ok {
  217. return "", false
  218. }
  219. s, ok := v.(string)
  220. if !ok {
  221. return "", false
  222. }
  223. s = strings.TrimSpace(s)
  224. if s == "" {
  225. return "", false
  226. }
  227. return s, true
  228. }
  229. func ExtractEmailFromJWT(token string) (string, bool) {
  230. claims, ok := decodeJWTClaims(token)
  231. if !ok {
  232. return "", false
  233. }
  234. v, ok := claims["email"]
  235. if !ok {
  236. return "", false
  237. }
  238. s, ok := v.(string)
  239. if !ok {
  240. return "", false
  241. }
  242. s = strings.TrimSpace(s)
  243. if s == "" {
  244. return "", false
  245. }
  246. return s, true
  247. }
  248. func decodeJWTClaims(token string) (map[string]any, bool) {
  249. parts := strings.Split(token, ".")
  250. if len(parts) != 3 {
  251. return nil, false
  252. }
  253. payloadRaw, err := base64.RawURLEncoding.DecodeString(parts[1])
  254. if err != nil {
  255. return nil, false
  256. }
  257. var claims map[string]any
  258. if err := json.Unmarshal(payloadRaw, &claims); err != nil {
  259. return nil, false
  260. }
  261. return claims, true
  262. }