diff --git a/internal/runtime/executor/logging_helpers.go b/internal/runtime/executor/logging_helpers.go index 26931f53..90532772 100644 --- a/internal/runtime/executor/logging_helpers.go +++ b/internal/runtime/executor/logging_helpers.go @@ -304,11 +304,7 @@ func formatAuthInfo(info upstreamRequestLog) string { parts = append(parts, "type=api_key") } case "oauth": - if authValue != "" { - parts = append(parts, fmt.Sprintf("type=oauth account=%s", authValue)) - } else { - parts = append(parts, "type=oauth") - } + parts = append(parts, "type=oauth") default: if authType != "" { if authValue != "" { diff --git a/internal/translator/antigravity/claude/antigravity_claude_request.go b/internal/translator/antigravity/claude/antigravity_claude_request.go index 2287bccc..d5064c3c 100644 --- a/internal/translator/antigravity/claude/antigravity_claude_request.go +++ b/internal/translator/antigravity/claude/antigravity_claude_request.go @@ -14,7 +14,6 @@ import ( "github.com/router-for-me/CLIProxyAPI/v6/internal/cache" "github.com/router-for-me/CLIProxyAPI/v6/internal/translator/gemini/common" "github.com/router-for-me/CLIProxyAPI/v6/internal/util" - log "github.com/sirupsen/logrus" "github.com/tidwall/gjson" "github.com/tidwall/sjson" ) @@ -136,14 +135,14 @@ func ConvertClaudeRequestToAntigravity(modelName string, inputRawJSON []byte, _ if sessionID != "" && thinkingText != "" { if cachedSig := cache.GetCachedSignature(sessionID, thinkingText); cachedSig != "" { signature = cachedSig - log.Debugf("Using cached signature for thinking block") + // log.Debugf("Using cached signature for thinking block") } } // Fallback to client signature only if cache miss and client signature is valid if signature == "" && cache.HasValidSignature(clientSignature) { signature = clientSignature - log.Debugf("Using client-provided signature for thinking block") + // log.Debugf("Using client-provided signature for thinking block") } // Store for subsequent tool_use in the same message @@ -158,8 +157,7 @@ func ConvertClaudeRequestToAntigravity(modelName string, inputRawJSON []byte, _ // Claude requires assistant messages to start with thinking blocks when thinking is enabled // Converting to text would break this requirement if isUnsigned { - // TypeScript plugin approach: drop unsigned thinking blocks entirely - log.Debugf("Dropping unsigned thinking block (no valid signature)") + // log.Debugf("Dropping unsigned thinking block (no valid signature)") continue } @@ -183,7 +181,6 @@ func ConvertClaudeRequestToAntigravity(modelName string, inputRawJSON []byte, _ } else if contentTypeResult.Type == gjson.String && contentTypeResult.String() == "tool_use" { // NOTE: Do NOT inject dummy thinking blocks here. // Antigravity API validates signatures, so dummy values are rejected. - // The TypeScript plugin removes unsigned thinking blocks instead of injecting dummies. functionName := contentResult.Get("name").String() argsResult := contentResult.Get("input") diff --git a/internal/translator/antigravity/claude/antigravity_claude_response.go b/internal/translator/antigravity/claude/antigravity_claude_response.go index 875e54a7..1672a835 100644 --- a/internal/translator/antigravity/claude/antigravity_claude_response.go +++ b/internal/translator/antigravity/claude/antigravity_claude_response.go @@ -136,11 +136,11 @@ func ConvertAntigravityResponseToClaude(_ context.Context, _ string, originalReq // Process thinking content (internal reasoning) if partResult.Get("thought").Bool() { if thoughtSignature := partResult.Get("thoughtSignature"); thoughtSignature.Exists() && thoughtSignature.String() != "" { - log.Debug("Branch: signature_delta") + // log.Debug("Branch: signature_delta") if params.SessionID != "" && params.CurrentThinkingText.Len() > 0 { cache.CacheSignature(params.SessionID, params.CurrentThinkingText.String(), thoughtSignature.String()) - log.Debugf("Cached signature for thinking block (sessionID=%s, textLen=%d)", params.SessionID, params.CurrentThinkingText.Len()) + // log.Debugf("Cached signature for thinking block (sessionID=%s, textLen=%d)", params.SessionID, params.CurrentThinkingText.Len()) params.CurrentThinkingText.Reset() } diff --git a/sdk/cliproxy/auth/conductor.go b/sdk/cliproxy/auth/conductor.go index f35cc416..689d3a21 100644 --- a/sdk/cliproxy/auth/conductor.go +++ b/sdk/cliproxy/auth/conductor.go @@ -1609,7 +1609,6 @@ func formatOauthIdentity(auth *Auth, provider string, accountInfo string) string if auth == nil { return "" } - authIndex := auth.EnsureIndex() // Prefer the auth's provider when available. providerName := strings.TrimSpace(auth.Provider) if providerName == "" { @@ -1631,16 +1630,10 @@ func formatOauthIdentity(auth *Auth, provider string, accountInfo string) string if authFile != "" { parts = append(parts, "auth_file="+authFile) } - if authIndex != "" { - parts = append(parts, "auth_index="+authIndex) - } if len(parts) == 0 { return accountInfo } - if accountInfo == "" { - return strings.Join(parts, " ") - } - return strings.Join(parts, " ") + " account=" + strconv.Quote(accountInfo) + return strings.Join(parts, " ") } // InjectCredentials delegates per-provider HTTP request preparation when supported.