Fix provider API key validation trimming (#810)

This commit is contained in:
Lingxuan Zuo
2026-04-10 15:15:29 +08:00
committed by GitHub
Unverified
parent 66b2ddb2dc
commit 49518300dc
7 changed files with 155 additions and 12 deletions

View File

@@ -34,6 +34,7 @@ import {
getProviderDocsUrl,
type ProviderType,
getProviderIconUrl,
normalizeProviderApiKeyInput,
resolveProviderApiKeyForSave,
resolveProviderModelForSave,
shouldShowProviderModelId,
@@ -424,10 +425,11 @@ function ProviderCard({
try {
const payload: { newApiKey?: string; updates?: Partial<ProviderConfig> } = {};
const normalizedFallbackModels = normalizeFallbackModels(fallbackModelsText.split('\n'));
const normalizedNewKey = normalizeProviderApiKeyInput(newKey);
if (newKey.trim()) {
if (normalizedNewKey) {
setValidating(true);
const result = await onValidateKey(newKey, {
const result = await onValidateKey(normalizedNewKey, {
baseUrl: baseUrl.trim() || undefined,
apiProtocol: (account.vendorId === 'custom' || account.vendorId === 'ollama') ? apiProtocol : undefined,
});
@@ -437,7 +439,7 @@ function ProviderCard({
setSaving(false);
return;
}
payload.newApiKey = newKey.trim();
payload.newApiKey = normalizedNewKey;
}
{
@@ -1164,13 +1166,14 @@ function AddProviderDialog({
try {
// Validate key first if the provider requires one and a key was entered
const requiresKey = typeInfo?.requiresApiKey ?? false;
if (requiresKey && !apiKey.trim()) {
const normalizedApiKey = normalizeProviderApiKeyInput(apiKey);
if (requiresKey && !normalizedApiKey) {
setValidationError(t('aiProviders.toast.invalidKey')); // reusing invalid key msg or should add 'required' msg? null checks
setSaving(false);
return;
}
if (requiresKey && apiKey) {
const result = await onValidateKey(selectedType, apiKey, {
if (requiresKey && normalizedApiKey) {
const result = await onValidateKey(selectedType, normalizedApiKey, {
baseUrl: baseUrl.trim() || undefined,
apiProtocol: (selectedType === 'custom' || selectedType === 'ollama') ? apiProtocol : undefined,
});
@@ -1191,7 +1194,7 @@ function AddProviderDialog({
await onAdd(
selectedType,
name || (typeInfo?.id === 'custom' ? t('aiProviders.custom') : typeInfo?.name) || selectedType,
apiKey.trim(),
normalizedApiKey,
{
baseUrl: baseUrl.trim() || undefined,
apiProtocol: (selectedType === 'custom' || selectedType === 'ollama') ? apiProtocol : undefined,
@@ -1655,6 +1658,7 @@ function AddProviderDialog({
<div className="flex justify-end gap-3">
<Button
data-testid="add-provider-submit-button"
onClick={handleAdd}
className={cn("rounded-full px-8 h-[42px] text-[13px] font-semibold bg-[#0a84ff] hover:bg-[#007aff] text-white shadow-sm", useOAuthFlow && "hidden")}
disabled={!selectedType || saving || (showModelIdField && modelId.trim().length === 0)}

View File

@@ -246,9 +246,13 @@ export function resolveProviderModelForSave(
return trimmedModelId || provider?.defaultModelId || undefined;
}
export function normalizeProviderApiKeyInput(apiKey: string): string {
return apiKey.trim();
}
/** Normalize provider API key before saving; Ollama uses a local placeholder when blank. */
export function resolveProviderApiKeyForSave(type: ProviderType | string, apiKey: string): string | undefined {
const trimmed = apiKey.trim();
const trimmed = normalizeProviderApiKeyInput(apiKey);
if (type === 'ollama') {
return trimmed || OLLAMA_PLACEHOLDER_API_KEY;
}

View File

@@ -99,6 +99,7 @@ import {
type ProviderTypeInfo,
getProviderDocsUrl,
getProviderIconUrl,
normalizeProviderApiKeyInput,
resolveProviderApiKeyForSave,
resolveProviderModelForSave,
shouldInvertInDark,
@@ -1009,6 +1010,7 @@ function ProviderContent({
const isOAuth = selectedProviderData?.isOAuth ?? false;
const supportsApiKey = selectedProviderData?.supportsApiKey ?? false;
const useOAuthFlow = isOAuth && (!supportsApiKey || authMode === 'oauth');
const normalizedApiKey = normalizeProviderApiKeyInput(apiKey);
const handleValidateAndSave = async () => {
if (!selectedProvider) return;
@@ -1034,11 +1036,19 @@ function ProviderContent({
try {
// Validate key if the provider requires one and a key was entered
const isApiKeyRequired = requiresKey || (supportsApiKey && authMode === 'apikey');
if (isApiKeyRequired && apiKey) {
if (isApiKeyRequired && !normalizedApiKey) {
setKeyValid(false);
onConfiguredChange(false);
toast.error(t('provider.invalid'));
setValidating(false);
return;
}
if (isApiKeyRequired) {
const result = await invokeIpc(
'provider:validateKey',
selectedAccountId || selectedProvider,
apiKey,
normalizedApiKey,
{
baseUrl: baseUrl.trim() || undefined,
apiProtocol: (selectedProvider === 'custom' || selectedProvider === 'ollama')
@@ -1146,7 +1156,7 @@ function ProviderContent({
const isApiKeyRequired = requiresKey || (supportsApiKey && authMode === 'apikey');
const canSubmit =
selectedProvider
&& (isApiKeyRequired ? apiKey.length > 0 : true)
&& (isApiKeyRequired ? normalizedApiKey.length > 0 : true)
&& (showModelIdField ? modelId.trim().length > 0 : true)
&& !useOAuthFlow;

View File

@@ -9,6 +9,7 @@ import type {
ProviderVendorInfo,
ProviderWithKeyInfo,
} from '@/lib/providers';
import { normalizeProviderApiKeyInput } from '@/lib/providers';
import { hostApiFetch } from '@/lib/host-api';
import {
fetchProviderSnapshot,
@@ -326,9 +327,10 @@ export const useProviderStore = create<ProviderState>((set, get) => ({
validateAccountApiKey: async (providerId, apiKey, options) => {
try {
const normalizedApiKey = normalizeProviderApiKeyInput(apiKey);
const result = await hostApiFetch<{ valid: boolean; error?: string }>('/api/providers/validate', {
method: 'POST',
body: JSON.stringify({ providerId, apiKey, options }),
body: JSON.stringify({ providerId, apiKey: normalizedApiKey, options }),
});
return result;
} catch (error) {

View File

@@ -62,4 +62,83 @@ test.describe('ClawX provider lifecycle', () => {
await relaunchedApp.close();
}
});
test('trims whitespace before validating and saving a custom provider key', async ({ electronApp, page }) => {
await completeSetup(page);
await electronApp.evaluate(async ({ app: _app }) => {
const { ipcMain } = process.mainModule!.require('electron') as typeof import('electron');
let accounts: Array<Record<string, unknown>> = [];
let statuses: Array<Record<string, unknown>> = [];
let defaultAccountId: string | null = null;
const respond = (json: unknown, status = 200) => ({
ok: true,
data: {
status,
ok: status >= 200 && status < 300,
json,
},
});
ipcMain.removeHandler('hostapi:fetch');
ipcMain.handle('hostapi:fetch', async (_event: unknown, request: { path?: string; method?: string; body?: string | null }) => {
const path = request?.path ?? '';
const method = request?.method ?? 'GET';
const body = request?.body ? JSON.parse(request.body) : null;
if (path === '/api/provider-accounts' && method === 'GET') return respond(accounts);
if (path === '/api/providers' && method === 'GET') return respond(statuses);
if (path === '/api/provider-vendors' && method === 'GET') return respond([]);
if (path === '/api/provider-accounts/default' && method === 'GET') return respond({ accountId: defaultAccountId });
if (path === '/api/providers/validate' && method === 'POST') {
if (body?.apiKey !== 'sk-lm-test') {
return respond({ valid: false, error: `unexpected key: ${String(body?.apiKey)}` }, 400);
}
return respond({ valid: true });
}
if (path === '/api/provider-accounts' && method === 'POST') {
accounts = [body.account];
statuses = [{
id: body.account.id,
name: body.account.label,
type: body.account.vendorId,
baseUrl: body.account.baseUrl,
model: body.account.model,
enabled: body.account.enabled,
createdAt: body.account.createdAt,
updatedAt: body.account.updatedAt,
hasKey: Boolean(body.apiKey),
keyMasked: body.apiKey ? 'sk-***' : null,
}];
return respond({ success: true });
}
if (path === '/api/provider-accounts/default' && method === 'PUT') {
defaultAccountId = body?.accountId ?? null;
return respond({ success: true });
}
return respond({});
});
});
await page.getByTestId('sidebar-nav-models').click();
await expect(page.getByTestId('providers-settings')).toBeVisible();
await page.getByTestId('providers-add-button').click();
await expect(page.getByTestId('add-provider-dialog')).toBeVisible();
await page.getByTestId('add-provider-type-custom').click();
await page.getByTestId('add-provider-name-input').fill('LM Studio Local');
await page.getByTestId('add-provider-api-key-input').fill(' sk-lm-test \n');
await page.getByTestId('add-provider-base-url-input').fill('http://127.0.0.1:1234/v1');
await page.getByTestId('add-provider-model-id-input').fill('local-model');
await page.getByTestId('add-provider-submit-button').click();
await expect(page.getByTestId('provider-card-custom')).toContainText('LM Studio Local');
});
});

View File

@@ -0,0 +1,42 @@
import { beforeEach, describe, expect, it, vi } from 'vitest';
const mockFetchProviderSnapshot = vi.fn();
const mockHostApiFetch = vi.fn();
vi.mock('@/lib/provider-accounts', () => ({
fetchProviderSnapshot: (...args: unknown[]) => mockFetchProviderSnapshot(...args),
}));
vi.mock('@/lib/host-api', () => ({
hostApiFetch: (...args: unknown[]) => mockHostApiFetch(...args),
}));
import { useProviderStore } from '@/stores/providers';
describe('useProviderStore validateAccountApiKey()', () => {
beforeEach(() => {
vi.clearAllMocks();
});
it('trims API keys before sending provider validation requests', async () => {
mockHostApiFetch.mockResolvedValueOnce({ valid: true });
const result = await useProviderStore.getState().validateAccountApiKey('custom', ' sk-lm-test \n', {
baseUrl: 'http://127.0.0.1:1234/v1',
apiProtocol: 'openai-completions',
});
expect(result).toEqual({ valid: true });
expect(mockHostApiFetch).toHaveBeenCalledWith('/api/providers/validate', {
method: 'POST',
body: JSON.stringify({
providerId: 'custom',
apiKey: 'sk-lm-test',
options: {
baseUrl: 'http://127.0.0.1:1234/v1',
apiProtocol: 'openai-completions',
},
}),
});
});
});

View File

@@ -1,5 +1,6 @@
import { describe, expect, it } from 'vitest';
import {
normalizeProviderApiKeyInput,
PROVIDER_TYPES,
PROVIDER_TYPE_INFO,
getProviderDocsUrl,
@@ -171,6 +172,7 @@ describe('provider metadata', () => {
});
it('normalizes provider API keys for save flow', () => {
expect(normalizeProviderApiKeyInput(' sk-test \n')).toBe('sk-test');
expect(resolveProviderApiKeyForSave('ollama', '')).toBe('ollama-local');
expect(resolveProviderApiKeyForSave('ollama', ' ')).toBe('ollama-local');
expect(resolveProviderApiKeyForSave('ollama', 'real-key')).toBe('real-key');