package auth import ( "context" "net/http" "testing" "ds2api/internal/account" "ds2api/internal/config" ) func newTestResolver(t *testing.T) *Resolver { t.Helper() t.Setenv("DS2API_CONFIG_JSON", `{ "keys":["managed-key"], "accounts":[{"email":"acc@example.com","password":"pwd","token":"account-token"}] }`) store := config.LoadStore() pool := account.NewPool(store) return NewResolver(store, pool, func(_ context.Context, _ config.Account) (string, error) { return "fresh-token", nil }) } func TestDetermineWithXAPIKeyUsesDirectToken(t *testing.T) { r := newTestResolver(t) req, _ := http.NewRequest(http.MethodPost, "/anthropic/v1/messages", nil) req.Header.Set("x-api-key", "direct-token") auth, err := r.Determine(req) if err != nil { t.Fatalf("determine failed: %v", err) } if auth.UseConfigToken { t.Fatalf("expected direct token mode") } if auth.DeepSeekToken != "direct-token" { t.Fatalf("unexpected token: %q", auth.DeepSeekToken) } } func TestDetermineWithXAPIKeyManagedKeyAcquiresAccount(t *testing.T) { r := newTestResolver(t) req, _ := http.NewRequest(http.MethodPost, "/anthropic/v1/messages", nil) req.Header.Set("x-api-key", "managed-key") auth, err := r.Determine(req) if err != nil { t.Fatalf("determine failed: %v", err) } defer r.Release(auth) if !auth.UseConfigToken { t.Fatalf("expected managed key mode") } if auth.AccountID != "acc@example.com" { t.Fatalf("unexpected account id: %q", auth.AccountID) } if auth.DeepSeekToken != "account-token" { t.Fatalf("unexpected account token: %q", auth.DeepSeekToken) } } func TestDetermineMissingToken(t *testing.T) { r := newTestResolver(t) req, _ := http.NewRequest(http.MethodPost, "/v1/chat/completions", nil) _, err := r.Determine(req) if err == nil { t.Fatal("expected unauthorized error") } if err != ErrUnauthorized { t.Fatalf("unexpected error: %v", err) } }