package config import "testing" func TestSanitizeOAuthModelAlias_PreservesForkFlag(t *testing.T) { cfg := &Config{ OAuthModelAlias: map[string][]OAuthModelAlias{ " CoDeX ": { {Name: " gpt-5 ", Alias: " g5 ", Fork: true}, {Name: "gpt-6", Alias: "g6"}, }, }, } cfg.SanitizeOAuthModelAlias() aliases := cfg.OAuthModelAlias["codex"] if len(aliases) != 2 { t.Fatalf("expected 2 sanitized aliases, got %d", len(aliases)) } if aliases[0].Name != "gpt-5" || aliases[0].Alias != "g5" || !aliases[0].Fork { t.Fatalf("expected first alias to be gpt-5->g5 fork=true, got name=%q alias=%q fork=%v", aliases[0].Name, aliases[0].Alias, aliases[0].Fork) } if aliases[1].Name != "gpt-6" || aliases[1].Alias != "g6" || aliases[1].Fork { t.Fatalf("expected second alias to be gpt-6->g6 fork=false, got name=%q alias=%q fork=%v", aliases[1].Name, aliases[1].Alias, aliases[1].Fork) } } func TestSanitizeOAuthModelAlias_AllowsMultipleAliasesForSameName(t *testing.T) { cfg := &Config{ OAuthModelAlias: map[string][]OAuthModelAlias{ "antigravity": { {Name: "gemini-claude-opus-4-5-thinking", Alias: "claude-opus-4-5-20251101", Fork: true}, {Name: "gemini-claude-opus-4-5-thinking", Alias: "claude-opus-4-5-20251101-thinking", Fork: true}, {Name: "gemini-claude-opus-4-5-thinking", Alias: "claude-opus-4-5", Fork: true}, }, }, } cfg.SanitizeOAuthModelAlias() aliases := cfg.OAuthModelAlias["antigravity"] expected := []OAuthModelAlias{ {Name: "gemini-claude-opus-4-5-thinking", Alias: "claude-opus-4-5-20251101", Fork: true}, {Name: "gemini-claude-opus-4-5-thinking", Alias: "claude-opus-4-5-20251101-thinking", Fork: true}, {Name: "gemini-claude-opus-4-5-thinking", Alias: "claude-opus-4-5", Fork: true}, } if len(aliases) != len(expected) { t.Fatalf("expected %d sanitized aliases, got %d", len(expected), len(aliases)) } for i, exp := range expected { if aliases[i].Name != exp.Name || aliases[i].Alias != exp.Alias || aliases[i].Fork != exp.Fork { t.Fatalf("expected alias %d to be name=%q alias=%q fork=%v, got name=%q alias=%q fork=%v", i, exp.Name, exp.Alias, exp.Fork, aliases[i].Name, aliases[i].Alias, aliases[i].Fork) } } } func TestSanitizeOAuthModelAlias_InjectsDefaultKiroAliases(t *testing.T) { // When no kiro aliases are configured, defaults should be injected cfg := &Config{ OAuthModelAlias: map[string][]OAuthModelAlias{ "codex": { {Name: "gpt-5", Alias: "g5"}, }, }, } cfg.SanitizeOAuthModelAlias() kiroAliases := cfg.OAuthModelAlias["kiro"] if len(kiroAliases) == 0 { t.Fatal("expected default kiro aliases to be injected") } // Check that standard Claude model names are present aliasSet := make(map[string]bool) for _, a := range kiroAliases { aliasSet[a.Alias] = true } expectedAliases := []string{ "claude-sonnet-4-5-20250929", "claude-sonnet-4-5", "claude-sonnet-4-20250514", "claude-sonnet-4", "claude-opus-4-6", "claude-opus-4-5-20251101", "claude-opus-4-5", "claude-haiku-4-5-20251001", "claude-haiku-4-5", } for _, expected := range expectedAliases { if !aliasSet[expected] { t.Fatalf("expected default kiro alias %q to be present", expected) } } // All should have fork=true for _, a := range kiroAliases { if !a.Fork { t.Fatalf("expected all default kiro aliases to have fork=true, got fork=false for %q", a.Alias) } } // Codex aliases should still be preserved if len(cfg.OAuthModelAlias["codex"]) != 1 { t.Fatal("expected codex aliases to be preserved") } } func TestSanitizeOAuthModelAlias_DoesNotOverrideUserKiroAliases(t *testing.T) { // When user has configured kiro aliases, defaults should NOT be injected cfg := &Config{ OAuthModelAlias: map[string][]OAuthModelAlias{ "kiro": { {Name: "kiro-claude-sonnet-4", Alias: "my-custom-sonnet", Fork: true}, }, }, } cfg.SanitizeOAuthModelAlias() kiroAliases := cfg.OAuthModelAlias["kiro"] if len(kiroAliases) != 1 { t.Fatalf("expected 1 user-configured kiro alias, got %d", len(kiroAliases)) } if kiroAliases[0].Alias != "my-custom-sonnet" { t.Fatalf("expected user alias to be preserved, got %q", kiroAliases[0].Alias) } } func TestSanitizeOAuthModelAlias_InjectsDefaultKiroWhenEmpty(t *testing.T) { // When OAuthModelAlias is nil, kiro defaults should still be injected cfg := &Config{} cfg.SanitizeOAuthModelAlias() kiroAliases := cfg.OAuthModelAlias["kiro"] if len(kiroAliases) == 0 { t.Fatal("expected default kiro aliases to be injected when OAuthModelAlias is nil") } }