mirror of
https://github.com/openai/codex.git
synced 2026-04-29 02:41:12 +03:00
This lets users/companies explicitly choose whether to force/disallow the keyring/fallback file storage for mcp credentials. People who develop with Codex will want to use this until we sign binaries or else each ad-hoc debug builds will require keychain access on every build. I don't love this and am open to other ideas for how to handle that. ```toml mcp_oauth_credentials_store = "auto" mcp_oauth_credentials_store = "file" mcp_oauth_credentials_store = "keyrung" ``` Defaults to `auto`
16 lines
426 B
Rust
16 lines
426 B
Rust
mod find_codex_home;
|
|
mod logging_client_handler;
|
|
mod oauth;
|
|
mod perform_oauth_login;
|
|
mod rmcp_client;
|
|
mod utils;
|
|
|
|
pub use oauth::OAuthCredentialsStoreMode;
|
|
pub use oauth::StoredOAuthTokens;
|
|
pub use oauth::WrappedOAuthTokenResponse;
|
|
pub use oauth::delete_oauth_tokens;
|
|
pub(crate) use oauth::load_oauth_tokens;
|
|
pub use oauth::save_oauth_tokens;
|
|
pub use perform_oauth_login::perform_oauth_login;
|
|
pub use rmcp_client::RmcpClient;
|