Skip to content

fix: update remaining occurrences of old package name#15

Merged
ndycode merged 1 commit into
ndycode:mainfrom
rainmeter33-jpg:fix/rename-remnants
Jan 27, 2026
Merged

fix: update remaining occurrences of old package name#15
ndycode merged 1 commit into
ndycode:mainfrom
rainmeter33-jpg:fix/rename-remnants

Conversation

@rainmeter33-jpg
Copy link
Copy Markdown
Contributor

Summary

  • Updated PLUGIN_NAME in scripts/install-opencode-codex-auth.js to ensure npx installs correctly.
  • Updated local testing script scripts/test-all-models.sh to use the new package name.
  • Updated the terminal title in the OAuth success page.

These changes ensure that the renome from opencode-openai-codex-auth-multi to oc-chatgpt-multi-auth is complete and functional across all scripts and UI.

@ndycode ndycode merged commit f3901b5 into ndycode:main Jan 27, 2026
ndycode added a commit that referenced this pull request Apr 6, 2026
fix: update remaining occurrences of old package name
ndycode added a commit that referenced this pull request Apr 6, 2026
fix: update remaining occurrences of old package name
ndycode added a commit that referenced this pull request Apr 17, 2026
…redaction

Phase-1 security hardening (audit d92a8ee).

- lib/auth/login-runner.ts: extract mergeStoredAccountPair and switch credential fallback from || to ?? so an explicit empty-string token does not silently resurrect stale tokens (top-20 #10).

- lib/auth/auth.ts: redirect URI uses the 127.0.0.1 loopback literal (OAUTH_CALLBACK_LOOPBACK_HOST) to match the server bind host per RFC 8252 sec 7.3.

- lib/accounts.ts + lib/schemas.ts: validate the Codex CLI accounts file through CodexCliAccountsSchema (Zod) at the cross-process trust boundary; failures warn+skip instead of trusting ad-hoc typeof checks (top-20 #11).

- lib/logger.ts: extend TOKEN_PATTERNS with keyed-extraction regexes for opaque OpenAI refresh/access/id tokens embedded in JSON response bodies (top-20 #15).

Tests cover merge empty-token regression, 127.0.0.1 redirect URI, Codex CLI schema happy+malformed paths, and JSON token redaction.
ndycode added a commit that referenced this pull request Apr 17, 2026
…redaction

Phase-1 security hardening (audit d92a8ee).

- lib/auth/login-runner.ts: extract mergeStoredAccountPair and switch credential fallback from || to ?? so an explicit empty-string token does not silently resurrect stale tokens (top-20 #10).

- lib/auth/auth.ts: redirect URI uses the 127.0.0.1 loopback literal (OAUTH_CALLBACK_LOOPBACK_HOST) to match the server bind host per RFC 8252 sec 7.3.

- lib/accounts.ts + lib/schemas.ts: validate the Codex CLI accounts file through CodexCliAccountsSchema (Zod) at the cross-process trust boundary; failures warn+skip instead of trusting ad-hoc typeof checks (top-20 #11).

- lib/logger.ts: extend TOKEN_PATTERNS with keyed-extraction regexes for opaque OpenAI refresh/access/id tokens embedded in JSON response bodies (top-20 #15).

Tests cover merge empty-token regression, 127.0.0.1 redirect URI, Codex CLI schema happy+malformed paths, and JSON token redaction.
ndycode added a commit that referenced this pull request Apr 17, 2026
…redaction (#112)

* fix(security): strict nullish merge + loopback URI + CLI zod + token redaction

Phase-1 security hardening (audit d92a8ee).

- lib/auth/login-runner.ts: extract mergeStoredAccountPair and switch credential fallback from || to ?? so an explicit empty-string token does not silently resurrect stale tokens (top-20 #10).

- lib/auth/auth.ts: redirect URI uses the 127.0.0.1 loopback literal (OAUTH_CALLBACK_LOOPBACK_HOST) to match the server bind host per RFC 8252 sec 7.3.

- lib/accounts.ts + lib/schemas.ts: validate the Codex CLI accounts file through CodexCliAccountsSchema (Zod) at the cross-process trust boundary; failures warn+skip instead of trusting ad-hoc typeof checks (top-20 #11).

- lib/logger.ts: extend TOKEN_PATTERNS with keyed-extraction regexes for opaque OpenAI refresh/access/id tokens embedded in JSON response bodies (top-20 #15).

Tests cover merge empty-token regression, 127.0.0.1 redirect URI, Codex CLI schema happy+malformed paths, and JSON token redaction.

* fix(logger): use lastIndexOf to avoid masking key name instead of token value

String.prototype.replace(string, string) only swaps the first occurrence. When a captured token value is a substring of the preceding key name (e.g. value �ccess inside �ccess_token), the first-occurrence replace corrupts the key and leaks the real value. Slice around lastIndexOf instead so the trailing captured value is always the target.

Addresses Greptile P2 review on PR #112.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants