mirror of
https://github.com/QwenLM/qwen-code.git
synced 2025-12-20 08:47:44 +00:00
refactor(auth): enhance useAuthCommand to include history management and improve error handling in QwenOAuth2Client
This commit is contained in:
@@ -353,7 +353,7 @@ export const AppContainer = (props: AppContainerProps) => {
|
|||||||
handleAuthSelect,
|
handleAuthSelect,
|
||||||
openAuthDialog,
|
openAuthDialog,
|
||||||
cancelAuthentication,
|
cancelAuthentication,
|
||||||
} = useAuthCommand(settings, config);
|
} = useAuthCommand(settings, config, historyManager.addItem);
|
||||||
|
|
||||||
const { proQuotaRequest, handleProQuotaChoice } = useQuotaAndFallback({
|
const { proQuotaRequest, handleProQuotaChoice } = useQuotaAndFallback({
|
||||||
config,
|
config,
|
||||||
|
|||||||
@@ -4,23 +4,28 @@
|
|||||||
* SPDX-License-Identifier: Apache-2.0
|
* SPDX-License-Identifier: Apache-2.0
|
||||||
*/
|
*/
|
||||||
|
|
||||||
import { useState, useCallback, useEffect } from 'react';
|
|
||||||
import type { LoadedSettings, SettingScope } from '../../config/settings.js';
|
|
||||||
import type { Config } from '@qwen-code/qwen-code-core';
|
import type { Config } from '@qwen-code/qwen-code-core';
|
||||||
import {
|
import {
|
||||||
|
AuthEvent,
|
||||||
AuthType,
|
AuthType,
|
||||||
clearCachedCredentialFile,
|
clearCachedCredentialFile,
|
||||||
getErrorMessage,
|
getErrorMessage,
|
||||||
logAuth,
|
logAuth,
|
||||||
AuthEvent,
|
|
||||||
} from '@qwen-code/qwen-code-core';
|
} from '@qwen-code/qwen-code-core';
|
||||||
import { AuthState } from '../types.js';
|
import { useCallback, useEffect, useState } from 'react';
|
||||||
import { useQwenAuth } from '../hooks/useQwenAuth.js';
|
import type { LoadedSettings, SettingScope } from '../../config/settings.js';
|
||||||
import type { OpenAICredentials } from '../components/OpenAIKeyPrompt.js';
|
import type { OpenAICredentials } from '../components/OpenAIKeyPrompt.js';
|
||||||
|
import { useQwenAuth } from '../hooks/useQwenAuth.js';
|
||||||
|
import { AuthState, MessageType } from '../types.js';
|
||||||
|
import type { HistoryItem } from '../types.js';
|
||||||
|
|
||||||
export type { QwenAuthState } from '../hooks/useQwenAuth.js';
|
export type { QwenAuthState } from '../hooks/useQwenAuth.js';
|
||||||
|
|
||||||
export const useAuthCommand = (settings: LoadedSettings, config: Config) => {
|
export const useAuthCommand = (
|
||||||
|
settings: LoadedSettings,
|
||||||
|
config: Config,
|
||||||
|
addItem: (item: Omit<HistoryItem, 'id'>, timestamp: number) => void,
|
||||||
|
) => {
|
||||||
const unAuthenticated =
|
const unAuthenticated =
|
||||||
settings.merged.security?.auth?.selectedType === undefined;
|
settings.merged.security?.auth?.selectedType === undefined;
|
||||||
|
|
||||||
@@ -117,8 +122,17 @@ export const useAuthCommand = (settings: LoadedSettings, config: Config) => {
|
|||||||
// Log authentication success
|
// Log authentication success
|
||||||
const authEvent = new AuthEvent(authType, 'manual', 'success');
|
const authEvent = new AuthEvent(authType, 'manual', 'success');
|
||||||
logAuth(config, authEvent);
|
logAuth(config, authEvent);
|
||||||
|
|
||||||
|
// Show success message
|
||||||
|
addItem(
|
||||||
|
{
|
||||||
|
type: MessageType.INFO,
|
||||||
|
text: `Authenticated successfully with ${authType} credentials.`,
|
||||||
|
},
|
||||||
|
Date.now(),
|
||||||
|
);
|
||||||
},
|
},
|
||||||
[settings, handleAuthFailure, config],
|
[settings, handleAuthFailure, config, addItem],
|
||||||
);
|
);
|
||||||
|
|
||||||
const performAuth = useCallback(
|
const performAuth = useCallback(
|
||||||
|
|||||||
@@ -623,14 +623,16 @@ describe('QwenOAuth2Client', () => {
|
|||||||
});
|
});
|
||||||
|
|
||||||
it('should handle authorization_pending with HTTP 400 according to RFC 8628', async () => {
|
it('should handle authorization_pending with HTTP 400 according to RFC 8628', async () => {
|
||||||
|
const errorData = {
|
||||||
|
error: 'authorization_pending',
|
||||||
|
error_description: 'The authorization request is still pending',
|
||||||
|
};
|
||||||
const mockResponse = {
|
const mockResponse = {
|
||||||
ok: false,
|
ok: false,
|
||||||
status: 400,
|
status: 400,
|
||||||
statusText: 'Bad Request',
|
statusText: 'Bad Request',
|
||||||
json: async () => ({
|
text: async () => JSON.stringify(errorData),
|
||||||
error: 'authorization_pending',
|
json: async () => errorData,
|
||||||
error_description: 'The authorization request is still pending',
|
|
||||||
}),
|
|
||||||
};
|
};
|
||||||
|
|
||||||
vi.mocked(global.fetch).mockResolvedValue(mockResponse as Response);
|
vi.mocked(global.fetch).mockResolvedValue(mockResponse as Response);
|
||||||
@@ -646,14 +648,16 @@ describe('QwenOAuth2Client', () => {
|
|||||||
});
|
});
|
||||||
|
|
||||||
it('should handle slow_down with HTTP 429 according to RFC 8628', async () => {
|
it('should handle slow_down with HTTP 429 according to RFC 8628', async () => {
|
||||||
|
const errorData = {
|
||||||
|
error: 'slow_down',
|
||||||
|
error_description: 'The client is polling too frequently',
|
||||||
|
};
|
||||||
const mockResponse = {
|
const mockResponse = {
|
||||||
ok: false,
|
ok: false,
|
||||||
status: 429,
|
status: 429,
|
||||||
statusText: 'Too Many Requests',
|
statusText: 'Too Many Requests',
|
||||||
json: async () => ({
|
text: async () => JSON.stringify(errorData),
|
||||||
error: 'slow_down',
|
json: async () => errorData,
|
||||||
error_description: 'The client is polling too frequently',
|
|
||||||
}),
|
|
||||||
};
|
};
|
||||||
|
|
||||||
vi.mocked(global.fetch).mockResolvedValue(mockResponse as Response);
|
vi.mocked(global.fetch).mockResolvedValue(mockResponse as Response);
|
||||||
@@ -1993,14 +1997,16 @@ describe('Enhanced Error Handling and Edge Cases', () => {
|
|||||||
});
|
});
|
||||||
|
|
||||||
it('should handle authorization_pending with correct status', async () => {
|
it('should handle authorization_pending with correct status', async () => {
|
||||||
|
const errorData = {
|
||||||
|
error: 'authorization_pending',
|
||||||
|
error_description: 'Authorization request is pending',
|
||||||
|
};
|
||||||
const mockResponse = {
|
const mockResponse = {
|
||||||
ok: false,
|
ok: false,
|
||||||
status: 400,
|
status: 400,
|
||||||
statusText: 'Bad Request',
|
statusText: 'Bad Request',
|
||||||
json: vi.fn().mockResolvedValue({
|
text: vi.fn().mockResolvedValue(JSON.stringify(errorData)),
|
||||||
error: 'authorization_pending',
|
json: vi.fn().mockResolvedValue(errorData),
|
||||||
error_description: 'Authorization request is pending',
|
|
||||||
}),
|
|
||||||
};
|
};
|
||||||
|
|
||||||
vi.mocked(global.fetch).mockResolvedValue(
|
vi.mocked(global.fetch).mockResolvedValue(
|
||||||
|
|||||||
@@ -345,44 +345,47 @@ export class QwenOAuth2Client implements IQwenOAuth2Client {
|
|||||||
});
|
});
|
||||||
|
|
||||||
if (!response.ok) {
|
if (!response.ok) {
|
||||||
// Parse the response as JSON to check for OAuth RFC 8628 standard errors
|
// Read response body as text first (can only be read once)
|
||||||
|
const responseText = await response.text();
|
||||||
|
|
||||||
|
// Try to parse as JSON to check for OAuth RFC 8628 standard errors
|
||||||
|
let errorData: ErrorData | null = null;
|
||||||
try {
|
try {
|
||||||
const errorData = (await response.json()) as ErrorData;
|
errorData = JSON.parse(responseText) as ErrorData;
|
||||||
|
|
||||||
// According to OAuth RFC 8628, handle standard polling responses
|
|
||||||
if (
|
|
||||||
response.status === 400 &&
|
|
||||||
errorData.error === 'authorization_pending'
|
|
||||||
) {
|
|
||||||
// User has not yet approved the authorization request. Continue polling.
|
|
||||||
return { status: 'pending' } as DeviceTokenPendingData;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (response.status === 429 && errorData.error === 'slow_down') {
|
|
||||||
// Client is polling too frequently. Return pending with slowDown flag.
|
|
||||||
return {
|
|
||||||
status: 'pending',
|
|
||||||
slowDown: true,
|
|
||||||
} as DeviceTokenPendingData;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Handle other 400 errors (access_denied, expired_token, etc.) as real errors
|
|
||||||
|
|
||||||
// For other errors, throw with proper error information
|
|
||||||
const error = new Error(
|
|
||||||
`Device token poll failed: ${errorData.error || 'Unknown error'} - ${errorData.error_description || 'No details provided'}`,
|
|
||||||
);
|
|
||||||
(error as Error & { status?: number }).status = response.status;
|
|
||||||
throw error;
|
|
||||||
} catch (_parseError) {
|
} catch (_parseError) {
|
||||||
// If JSON parsing fails, fall back to text response
|
// If JSON parsing fails, use text response
|
||||||
const errorData = await response.text();
|
|
||||||
const error = new Error(
|
const error = new Error(
|
||||||
`Device token poll failed: ${response.status} ${response.statusText}. Response: ${errorData}`,
|
`Device token poll failed: ${response.status} ${response.statusText}. Response: ${responseText}`,
|
||||||
);
|
);
|
||||||
(error as Error & { status?: number }).status = response.status;
|
(error as Error & { status?: number }).status = response.status;
|
||||||
throw error;
|
throw error;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// According to OAuth RFC 8628, handle standard polling responses
|
||||||
|
if (
|
||||||
|
response.status === 400 &&
|
||||||
|
errorData.error === 'authorization_pending'
|
||||||
|
) {
|
||||||
|
// User has not yet approved the authorization request. Continue polling.
|
||||||
|
return { status: 'pending' } as DeviceTokenPendingData;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (response.status === 429 && errorData.error === 'slow_down') {
|
||||||
|
// Client is polling too frequently. Return pending with slowDown flag.
|
||||||
|
return {
|
||||||
|
status: 'pending',
|
||||||
|
slowDown: true,
|
||||||
|
} as DeviceTokenPendingData;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Handle other 400 errors (access_denied, expired_token, etc.) as real errors
|
||||||
|
|
||||||
|
// For other errors, throw with proper error information
|
||||||
|
const error = new Error(
|
||||||
|
`Device token poll failed: ${errorData.error || 'Unknown error'} - ${errorData.error_description}`,
|
||||||
|
);
|
||||||
|
(error as Error & { status?: number }).status = response.status;
|
||||||
|
throw error;
|
||||||
}
|
}
|
||||||
|
|
||||||
return (await response.json()) as DeviceTokenResponse;
|
return (await response.json()) as DeviceTokenResponse;
|
||||||
|
|||||||
Reference in New Issue
Block a user