@forestadmin/mcp-server 0.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +128 -0
- package/dist/__mocks__/version.d.ts +3 -0
- package/dist/__mocks__/version.js +7 -0
- package/dist/cli.d.ts +3 -0
- package/dist/cli.js +14 -0
- package/dist/factory.d.ts +51 -0
- package/dist/factory.js +40 -0
- package/dist/forest-oauth-provider.d.ts +44 -0
- package/dist/forest-oauth-provider.js +253 -0
- package/dist/forest-oauth-provider.test.d.ts +2 -0
- package/dist/forest-oauth-provider.test.js +590 -0
- package/dist/index.d.ts +4 -0
- package/dist/index.js +13 -0
- package/dist/mcp-paths.d.ts +5 -0
- package/dist/mcp-paths.js +11 -0
- package/dist/polyfills.d.ts +12 -0
- package/dist/polyfills.js +27 -0
- package/dist/schemas/filter.d.ts +4 -0
- package/dist/schemas/filter.js +70 -0
- package/dist/schemas/filter.test.d.ts +2 -0
- package/dist/schemas/filter.test.js +234 -0
- package/dist/server.d.ts +87 -0
- package/dist/server.js +341 -0
- package/dist/server.test.d.ts +2 -0
- package/dist/server.test.js +901 -0
- package/dist/test-utils/mock-server.d.ts +62 -0
- package/dist/test-utils/mock-server.js +187 -0
- package/dist/tools/list.d.ts +4 -0
- package/dist/tools/list.js +98 -0
- package/dist/tools/list.test.d.ts +2 -0
- package/dist/tools/list.test.js +385 -0
- package/dist/utils/activity-logs-creator.d.ts +9 -0
- package/dist/utils/activity-logs-creator.js +65 -0
- package/dist/utils/activity-logs-creator.test.d.ts +2 -0
- package/dist/utils/activity-logs-creator.test.js +239 -0
- package/dist/utils/agent-caller.d.ts +13 -0
- package/dist/utils/agent-caller.js +24 -0
- package/dist/utils/agent-caller.test.d.ts +2 -0
- package/dist/utils/agent-caller.test.js +102 -0
- package/dist/utils/error-parser.d.ts +10 -0
- package/dist/utils/error-parser.js +56 -0
- package/dist/utils/error-parser.test.d.ts +2 -0
- package/dist/utils/error-parser.test.js +124 -0
- package/dist/utils/schema-fetcher.d.ts +53 -0
- package/dist/utils/schema-fetcher.js +85 -0
- package/dist/utils/schema-fetcher.test.d.ts +2 -0
- package/dist/utils/schema-fetcher.test.js +212 -0
- package/dist/utils/sse-error-logger.d.ts +14 -0
- package/dist/utils/sse-error-logger.js +112 -0
- package/dist/utils/tool-with-logging.d.ts +44 -0
- package/dist/utils/tool-with-logging.js +66 -0
- package/dist/version.d.ts +3 -0
- package/dist/version.js +43 -0
- package/package.json +49 -0
package/README.md
ADDED
|
@@ -0,0 +1,128 @@
|
|
|
1
|
+
# @forestadmin/mcp-server
|
|
2
|
+
|
|
3
|
+
Model Context Protocol (MCP) server for Forest Admin with OAuth authentication support.
|
|
4
|
+
|
|
5
|
+
## Overview
|
|
6
|
+
|
|
7
|
+
This MCP server provides HTTP REST API access to Forest Admin operations, enabling AI assistants and other MCP clients to interact with your Forest Admin data through a standardized protocol.
|
|
8
|
+
|
|
9
|
+
## Usage
|
|
10
|
+
|
|
11
|
+
### With Forest Admin Agent
|
|
12
|
+
|
|
13
|
+
The MCP server is included with the Forest Admin agent. Simply call `mountAiMcpServer()`:
|
|
14
|
+
|
|
15
|
+
```typescript
|
|
16
|
+
import { createAgent } from '@forestadmin/agent';
|
|
17
|
+
|
|
18
|
+
const agent = createAgent(options)
|
|
19
|
+
.addDataSource(myDataSource)
|
|
20
|
+
.mountAiMcpServer();
|
|
21
|
+
|
|
22
|
+
agent.mountOnExpress(app);
|
|
23
|
+
agent.start();
|
|
24
|
+
```
|
|
25
|
+
|
|
26
|
+
The MCP server will be automatically initialized and mounted on your application.
|
|
27
|
+
|
|
28
|
+
### Standalone Server
|
|
29
|
+
|
|
30
|
+
You can also run the MCP server standalone using the CLI:
|
|
31
|
+
|
|
32
|
+
```bash
|
|
33
|
+
npx forest-mcp-server
|
|
34
|
+
```
|
|
35
|
+
|
|
36
|
+
Or programmatically:
|
|
37
|
+
|
|
38
|
+
```bash
|
|
39
|
+
node dist/index.js
|
|
40
|
+
```
|
|
41
|
+
|
|
42
|
+
### Environment Variables
|
|
43
|
+
|
|
44
|
+
The following environment variables are required to run the server:
|
|
45
|
+
|
|
46
|
+
| Variable | Required | Default | Description |
|
|
47
|
+
|----------|----------|---------|-------------|
|
|
48
|
+
| `FOREST_ENV_SECRET` | **Yes** | - | Your Forest Admin environment secret |
|
|
49
|
+
| `FOREST_AUTH_SECRET` | **Yes** | - | Your Forest Admin authentication secret (must match your agent) |
|
|
50
|
+
| `MCP_SERVER_PORT` | No | `3931` | Port for the HTTP server |
|
|
51
|
+
|
|
52
|
+
### Example Configuration
|
|
53
|
+
|
|
54
|
+
```bash
|
|
55
|
+
export FOREST_ENV_SECRET="your-env-secret"
|
|
56
|
+
export FOREST_AUTH_SECRET="your-auth-secret"
|
|
57
|
+
export MCP_SERVER_PORT=3931
|
|
58
|
+
|
|
59
|
+
npx forest-mcp-server
|
|
60
|
+
```
|
|
61
|
+
|
|
62
|
+
## API Endpoint
|
|
63
|
+
|
|
64
|
+
Once running, the MCP server exposes a single endpoint:
|
|
65
|
+
|
|
66
|
+
- **POST** `/mcp` - Main MCP protocol endpoint
|
|
67
|
+
|
|
68
|
+
The server expects MCP protocol messages in the request body and returns MCP-formatted responses.
|
|
69
|
+
|
|
70
|
+
## Features
|
|
71
|
+
|
|
72
|
+
- **HTTP Transport**: Uses streamable HTTP transport for MCP communication
|
|
73
|
+
- **OAuth Authentication**: Built-in support for Forest Admin OAuth
|
|
74
|
+
- **CORS Enabled**: Allows cross-origin requests
|
|
75
|
+
- **Express-based**: Built on top of Express.js for reliability and extensibility
|
|
76
|
+
|
|
77
|
+
## Development
|
|
78
|
+
|
|
79
|
+
### Building
|
|
80
|
+
|
|
81
|
+
```bash
|
|
82
|
+
npm run build
|
|
83
|
+
```
|
|
84
|
+
|
|
85
|
+
### Watch Mode
|
|
86
|
+
|
|
87
|
+
```bash
|
|
88
|
+
npm run build:watch
|
|
89
|
+
```
|
|
90
|
+
|
|
91
|
+
### Linting
|
|
92
|
+
|
|
93
|
+
```bash
|
|
94
|
+
npm run lint
|
|
95
|
+
```
|
|
96
|
+
|
|
97
|
+
### Testing
|
|
98
|
+
|
|
99
|
+
```bash
|
|
100
|
+
npm test
|
|
101
|
+
```
|
|
102
|
+
|
|
103
|
+
### Cleaning
|
|
104
|
+
|
|
105
|
+
```bash
|
|
106
|
+
npm run clean
|
|
107
|
+
```
|
|
108
|
+
|
|
109
|
+
## Architecture
|
|
110
|
+
|
|
111
|
+
The server consists of:
|
|
112
|
+
|
|
113
|
+
- **ForestMCPServer**: Main server class managing the MCP server lifecycle
|
|
114
|
+
- **McpServer**: Core MCP protocol implementation
|
|
115
|
+
- **StreamableHTTPServerTransport**: HTTP transport layer for MCP
|
|
116
|
+
- **Express App**: HTTP server handling incoming requests
|
|
117
|
+
|
|
118
|
+
## License
|
|
119
|
+
|
|
120
|
+
GPL-3.0
|
|
121
|
+
|
|
122
|
+
## Repository
|
|
123
|
+
|
|
124
|
+
[https://github.com/ForestAdmin/agent-nodejs](https://github.com/ForestAdmin/agent-nodejs)
|
|
125
|
+
|
|
126
|
+
## Support
|
|
127
|
+
|
|
128
|
+
For issues and feature requests, please visit the [GitHub repository](https://github.com/ForestAdmin/agent-nodejs/tree/main/packages/mcp-server).
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.NAME = exports.VERSION = void 0;
|
|
4
|
+
// Mock version module for Jest (avoids import.meta.url issues in CommonJS)
|
|
5
|
+
exports.VERSION = '0.1.0';
|
|
6
|
+
exports.NAME = '@forestadmin/mcp-server';
|
|
7
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoidmVyc2lvbi5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uL3NyYy9fX21vY2tzX18vdmVyc2lvbi50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiOzs7QUFBQSwyRUFBMkU7QUFDOUQsUUFBQSxPQUFPLEdBQUcsT0FBTyxDQUFDO0FBQ2xCLFFBQUEsSUFBSSxHQUFHLHlCQUF5QixDQUFDIn0=
|
package/dist/cli.d.ts
ADDED
package/dist/cli.js
ADDED
|
@@ -0,0 +1,14 @@
|
|
|
1
|
+
#!/usr/bin/env node
|
|
2
|
+
"use strict";
|
|
3
|
+
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
4
|
+
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
5
|
+
};
|
|
6
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
7
|
+
const server_1 = __importDefault(require("./server"));
|
|
8
|
+
// Start the server when run directly as CLI
|
|
9
|
+
const server = new server_1.default();
|
|
10
|
+
server.run().catch(error => {
|
|
11
|
+
console.error('[FATAL] Server crashed:', error);
|
|
12
|
+
process.exit(1);
|
|
13
|
+
});
|
|
14
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiY2xpLmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vc3JjL2NsaS50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiOzs7Ozs7QUFFQSxzREFBdUM7QUFFdkMsNENBQTRDO0FBQzVDLE1BQU0sTUFBTSxHQUFHLElBQUksZ0JBQWUsRUFBRSxDQUFDO0FBRXJDLE1BQU0sQ0FBQyxHQUFHLEVBQUUsQ0FBQyxLQUFLLENBQUMsS0FBSyxDQUFDLEVBQUU7SUFDekIsT0FBTyxDQUFDLEtBQUssQ0FBQyx5QkFBeUIsRUFBRSxLQUFLLENBQUMsQ0FBQztJQUNoRCxPQUFPLENBQUMsSUFBSSxDQUFDLENBQUMsQ0FBQyxDQUFDO0FBQ2xCLENBQUMsQ0FBQyxDQUFDIn0=
|
|
@@ -0,0 +1,51 @@
|
|
|
1
|
+
import type { HttpCallback } from './server';
|
|
2
|
+
import { Logger } from './server';
|
|
3
|
+
/**
|
|
4
|
+
* Context passed from the Forest Admin agent to the MCP factory.
|
|
5
|
+
*/
|
|
6
|
+
export interface McpFactoryContext {
|
|
7
|
+
/** Forest Admin server URL */
|
|
8
|
+
forestServerUrl: string;
|
|
9
|
+
/** Environment secret */
|
|
10
|
+
envSecret: string;
|
|
11
|
+
/** Authentication secret */
|
|
12
|
+
authSecret: string;
|
|
13
|
+
/** Logger function */
|
|
14
|
+
logger: Logger;
|
|
15
|
+
}
|
|
16
|
+
/**
|
|
17
|
+
* Options for the MCP factory function.
|
|
18
|
+
*/
|
|
19
|
+
export interface McpFactoryOptions {
|
|
20
|
+
/**
|
|
21
|
+
* Optional override for the base URL where the agent is publicly accessible.
|
|
22
|
+
* If not provided, it will be automatically fetched from Forest Admin API
|
|
23
|
+
* (the environment's api_endpoint configuration).
|
|
24
|
+
* Example: 'https://my-app.example.com' or 'http://localhost:3000'
|
|
25
|
+
*/
|
|
26
|
+
baseUrl?: string;
|
|
27
|
+
}
|
|
28
|
+
/**
|
|
29
|
+
* Factory function to create an MCP HTTP callback for use with the Forest Admin agent.
|
|
30
|
+
*
|
|
31
|
+
* This function is designed to be used with the `agent.useMcp()` method:
|
|
32
|
+
*
|
|
33
|
+
* @example
|
|
34
|
+
* ```typescript
|
|
35
|
+
* import { createAgent } from '@forestadmin/agent';
|
|
36
|
+
* import { createMcpServer } from '@forestadmin/mcp-server';
|
|
37
|
+
*
|
|
38
|
+
* const agent = createAgent(options)
|
|
39
|
+
* .addDataSource(myDataSource)
|
|
40
|
+
* .useMcp(createMcpServer, { baseUrl: 'https://my-app.example.com' });
|
|
41
|
+
*
|
|
42
|
+
* agent.mountOnExpress(app);
|
|
43
|
+
* agent.start();
|
|
44
|
+
* ```
|
|
45
|
+
*
|
|
46
|
+
* @param context - Context containing Forest Admin configuration (provided by the agent)
|
|
47
|
+
* @param options - Optional configuration for the MCP server
|
|
48
|
+
* @returns An HTTP callback that handles MCP routes
|
|
49
|
+
*/
|
|
50
|
+
export declare function createMcpServer(context: McpFactoryContext, options?: McpFactoryOptions): Promise<HttpCallback>;
|
|
51
|
+
//# sourceMappingURL=factory.d.ts.map
|
package/dist/factory.js
ADDED
|
@@ -0,0 +1,40 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
3
|
+
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
4
|
+
};
|
|
5
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
+
exports.createMcpServer = createMcpServer;
|
|
7
|
+
const server_1 = __importDefault(require("./server"));
|
|
8
|
+
/**
|
|
9
|
+
* Factory function to create an MCP HTTP callback for use with the Forest Admin agent.
|
|
10
|
+
*
|
|
11
|
+
* This function is designed to be used with the `agent.useMcp()` method:
|
|
12
|
+
*
|
|
13
|
+
* @example
|
|
14
|
+
* ```typescript
|
|
15
|
+
* import { createAgent } from '@forestadmin/agent';
|
|
16
|
+
* import { createMcpServer } from '@forestadmin/mcp-server';
|
|
17
|
+
*
|
|
18
|
+
* const agent = createAgent(options)
|
|
19
|
+
* .addDataSource(myDataSource)
|
|
20
|
+
* .useMcp(createMcpServer, { baseUrl: 'https://my-app.example.com' });
|
|
21
|
+
*
|
|
22
|
+
* agent.mountOnExpress(app);
|
|
23
|
+
* agent.start();
|
|
24
|
+
* ```
|
|
25
|
+
*
|
|
26
|
+
* @param context - Context containing Forest Admin configuration (provided by the agent)
|
|
27
|
+
* @param options - Optional configuration for the MCP server
|
|
28
|
+
* @returns An HTTP callback that handles MCP routes
|
|
29
|
+
*/
|
|
30
|
+
async function createMcpServer(context, options) {
|
|
31
|
+
const mcpServer = new server_1.default({
|
|
32
|
+
forestServerUrl: context.forestServerUrl,
|
|
33
|
+
envSecret: context.envSecret,
|
|
34
|
+
authSecret: context.authSecret,
|
|
35
|
+
logger: context.logger,
|
|
36
|
+
});
|
|
37
|
+
const baseUrl = options?.baseUrl ? new URL('/', options.baseUrl) : undefined;
|
|
38
|
+
return mcpServer.getHttpCallback(baseUrl);
|
|
39
|
+
}
|
|
40
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiZmFjdG9yeS5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uL3NyYy9mYWN0b3J5LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7Ozs7O0FBcURBLDBDQWNDO0FBakVELHNEQUFtRDtBQTZCbkQ7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7OztHQXFCRztBQUNJLEtBQUssVUFBVSxlQUFlLENBQ25DLE9BQTBCLEVBQzFCLE9BQTJCO0lBRTNCLE1BQU0sU0FBUyxHQUFHLElBQUksZ0JBQWUsQ0FBQztRQUNwQyxlQUFlLEVBQUUsT0FBTyxDQUFDLGVBQWU7UUFDeEMsU0FBUyxFQUFFLE9BQU8sQ0FBQyxTQUFTO1FBQzVCLFVBQVUsRUFBRSxPQUFPLENBQUMsVUFBVTtRQUM5QixNQUFNLEVBQUUsT0FBTyxDQUFDLE1BQU07S0FDdkIsQ0FBQyxDQUFDO0lBRUgsTUFBTSxPQUFPLEdBQUcsT0FBTyxFQUFFLE9BQU8sQ0FBQyxDQUFDLENBQUMsSUFBSSxHQUFHLENBQUMsR0FBRyxFQUFFLE9BQU8sQ0FBQyxPQUFPLENBQUMsQ0FBQyxDQUFDLENBQUMsU0FBUyxDQUFDO0lBRTdFLE9BQU8sU0FBUyxDQUFDLGVBQWUsQ0FBQyxPQUFPLENBQUMsQ0FBQztBQUM1QyxDQUFDIn0=
|
|
@@ -0,0 +1,44 @@
|
|
|
1
|
+
import type { Logger } from './server';
|
|
2
|
+
import type { OAuthRegisteredClientsStore } from '@modelcontextprotocol/sdk/server/auth/clients.js';
|
|
3
|
+
import type { AuthorizationParams, OAuthServerProvider } from '@modelcontextprotocol/sdk/server/auth/provider.js';
|
|
4
|
+
import type { AuthInfo } from '@modelcontextprotocol/sdk/server/auth/types.js';
|
|
5
|
+
import type { OAuthClientInformationFull, OAuthTokenRevocationRequest, OAuthTokens } from '@modelcontextprotocol/sdk/shared/auth.js';
|
|
6
|
+
import type { Response } from 'express';
|
|
7
|
+
export interface ForestOAuthProviderOptions {
|
|
8
|
+
forestServerUrl: string;
|
|
9
|
+
forestAppUrl: string;
|
|
10
|
+
envSecret: string;
|
|
11
|
+
authSecret: string;
|
|
12
|
+
logger: Logger;
|
|
13
|
+
}
|
|
14
|
+
/**
|
|
15
|
+
* OAuth Server Provider that integrates with Forest Admin authentication
|
|
16
|
+
*/
|
|
17
|
+
export default class ForestOAuthProvider implements OAuthServerProvider {
|
|
18
|
+
private forestServerUrl;
|
|
19
|
+
private forestAppUrl;
|
|
20
|
+
private envSecret;
|
|
21
|
+
private authSecret;
|
|
22
|
+
private forestClient;
|
|
23
|
+
private environmentId?;
|
|
24
|
+
private environmentApiEndpoint?;
|
|
25
|
+
private logger;
|
|
26
|
+
constructor({ forestServerUrl, forestAppUrl, envSecret, authSecret, logger, }: ForestOAuthProviderOptions);
|
|
27
|
+
initialize(): Promise<void>;
|
|
28
|
+
private fetchEnvironmentId;
|
|
29
|
+
/**
|
|
30
|
+
* Get the base URL for the MCP server from the environment's api_endpoint.
|
|
31
|
+
* Returns undefined if the environment info hasn't been fetched yet.
|
|
32
|
+
*/
|
|
33
|
+
getBaseUrl(): URL | undefined;
|
|
34
|
+
get clientsStore(): OAuthRegisteredClientsStore;
|
|
35
|
+
authorize(client: OAuthClientInformationFull, params: AuthorizationParams, res: Response): Promise<void>;
|
|
36
|
+
challengeForAuthorizationCode(client: OAuthClientInformationFull, authorizationCode: string): Promise<string>;
|
|
37
|
+
exchangeAuthorizationCode(client: OAuthClientInformationFull, authorizationCode: string, codeVerifier?: string, redirectUri?: string): Promise<OAuthTokens>;
|
|
38
|
+
exchangeRefreshToken(client: OAuthClientInformationFull, refreshToken: string, scopes?: string[]): Promise<OAuthTokens>;
|
|
39
|
+
private generateAccessToken;
|
|
40
|
+
verifyAccessToken(token: string): Promise<AuthInfo>;
|
|
41
|
+
revokeToken(_client: OAuthClientInformationFull, _request: OAuthTokenRevocationRequest): Promise<void>;
|
|
42
|
+
skipLocalPkceValidation: boolean;
|
|
43
|
+
}
|
|
44
|
+
//# sourceMappingURL=forest-oauth-provider.d.ts.map
|
|
@@ -0,0 +1,253 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
3
|
+
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
4
|
+
};
|
|
5
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
+
const forestadmin_client_1 = __importDefault(require("@forestadmin/forestadmin-client"));
|
|
7
|
+
const errors_js_1 = require("@modelcontextprotocol/sdk/server/auth/errors.js");
|
|
8
|
+
const jsonwebtoken_1 = __importDefault(require("jsonwebtoken"));
|
|
9
|
+
/**
|
|
10
|
+
* OAuth Server Provider that integrates with Forest Admin authentication
|
|
11
|
+
*/
|
|
12
|
+
class ForestOAuthProvider {
|
|
13
|
+
constructor({ forestServerUrl, forestAppUrl, envSecret, authSecret, logger, }) {
|
|
14
|
+
// Skip PKCE validation to match original implementation
|
|
15
|
+
this.skipLocalPkceValidation = true;
|
|
16
|
+
this.forestServerUrl = forestServerUrl;
|
|
17
|
+
this.forestAppUrl = forestAppUrl;
|
|
18
|
+
this.envSecret = envSecret;
|
|
19
|
+
this.authSecret = authSecret;
|
|
20
|
+
this.logger = logger;
|
|
21
|
+
this.forestClient = (0, forestadmin_client_1.default)({
|
|
22
|
+
forestServerUrl: this.forestServerUrl,
|
|
23
|
+
envSecret: this.envSecret,
|
|
24
|
+
});
|
|
25
|
+
}
|
|
26
|
+
async initialize() {
|
|
27
|
+
try {
|
|
28
|
+
await this.fetchEnvironmentId();
|
|
29
|
+
}
|
|
30
|
+
catch (error) {
|
|
31
|
+
// Log warning but don't throw - the MCP server can still partially function
|
|
32
|
+
// The authorize method will return an appropriate error when environmentId is missing
|
|
33
|
+
this.logger('Warn', `Failed to fetch environmentId from Forest Admin API: ${error}`);
|
|
34
|
+
}
|
|
35
|
+
}
|
|
36
|
+
async fetchEnvironmentId() {
|
|
37
|
+
if (!this.envSecret) {
|
|
38
|
+
throw new Error('FOREST_ENV_SECRET is required to fetch environment ID');
|
|
39
|
+
}
|
|
40
|
+
// Call Forest Admin API to get environment information
|
|
41
|
+
const response = await fetch(`${this.forestServerUrl}/liana/environment`, {
|
|
42
|
+
method: 'GET',
|
|
43
|
+
headers: {
|
|
44
|
+
'forest-secret-key': this.envSecret,
|
|
45
|
+
'Content-Type': 'application/json',
|
|
46
|
+
},
|
|
47
|
+
});
|
|
48
|
+
if (!response.ok) {
|
|
49
|
+
const errorText = await response.text();
|
|
50
|
+
throw new Error(`Failed to fetch environment from Forest Admin API: ${response.status} ${response.statusText}. ${errorText}`);
|
|
51
|
+
}
|
|
52
|
+
const data = (await response.json());
|
|
53
|
+
this.environmentId = parseInt(data.data.id, 10);
|
|
54
|
+
this.environmentApiEndpoint = data.data.attributes.api_endpoint;
|
|
55
|
+
}
|
|
56
|
+
/**
|
|
57
|
+
* Get the base URL for the MCP server from the environment's api_endpoint.
|
|
58
|
+
* Returns undefined if the environment info hasn't been fetched yet.
|
|
59
|
+
*/
|
|
60
|
+
getBaseUrl() {
|
|
61
|
+
if (!this.environmentApiEndpoint) {
|
|
62
|
+
return undefined;
|
|
63
|
+
}
|
|
64
|
+
return new URL(this.environmentApiEndpoint);
|
|
65
|
+
}
|
|
66
|
+
get clientsStore() {
|
|
67
|
+
return {
|
|
68
|
+
getClient: async (clientId) => {
|
|
69
|
+
// Call Forest Admin API to get client information
|
|
70
|
+
const response = await fetch(`${this.forestServerUrl}/oauth/register/${clientId}`, {
|
|
71
|
+
method: 'GET',
|
|
72
|
+
headers: {
|
|
73
|
+
'Content-Type': 'application/json',
|
|
74
|
+
},
|
|
75
|
+
});
|
|
76
|
+
// Log and return undefined for other errors (don't expose internal errors)
|
|
77
|
+
if (!response.ok) {
|
|
78
|
+
console.error(`[ForestOAuthProvider] Failed to fetch client ${clientId}: ${response.status} ${response.statusText}`);
|
|
79
|
+
return undefined;
|
|
80
|
+
}
|
|
81
|
+
// Return registered client if exists
|
|
82
|
+
return response.json();
|
|
83
|
+
},
|
|
84
|
+
};
|
|
85
|
+
}
|
|
86
|
+
async authorize(client, params, res) {
|
|
87
|
+
try {
|
|
88
|
+
// Ensure environmentId is available
|
|
89
|
+
if (!this.environmentId) {
|
|
90
|
+
throw new Error('Environment ID not available. Make sure initialize() was called and the Forest Admin API is reachable.');
|
|
91
|
+
}
|
|
92
|
+
// Redirect to Forest Admin agent for actual authentication
|
|
93
|
+
const agentAuthUrl = new URL('/oauth/authorize', this.forestAppUrl);
|
|
94
|
+
agentAuthUrl.searchParams.set('redirect_uri', params.redirectUri);
|
|
95
|
+
agentAuthUrl.searchParams.set('code_challenge', params.codeChallenge);
|
|
96
|
+
agentAuthUrl.searchParams.set('code_challenge_method', 'S256');
|
|
97
|
+
agentAuthUrl.searchParams.set('response_type', 'code');
|
|
98
|
+
agentAuthUrl.searchParams.set('client_id', client.client_id);
|
|
99
|
+
agentAuthUrl.searchParams.set('state', params.state);
|
|
100
|
+
agentAuthUrl.searchParams.set('scope', params.scopes.join('+'));
|
|
101
|
+
if (params.resource?.href) {
|
|
102
|
+
agentAuthUrl.searchParams.set('resource', params.resource.href);
|
|
103
|
+
}
|
|
104
|
+
agentAuthUrl.searchParams.set('environmentId', this.environmentId.toString());
|
|
105
|
+
res.redirect(agentAuthUrl.toString());
|
|
106
|
+
}
|
|
107
|
+
catch (error) {
|
|
108
|
+
const errorMessage = error instanceof Error ? error.message : String(error);
|
|
109
|
+
this.logger('Error', `[ForestOAuthProvider] Authorization error:: ${errorMessage}`);
|
|
110
|
+
// Don't expose internal error details to the client - use a generic message
|
|
111
|
+
// The actual error is logged above for debugging
|
|
112
|
+
res.redirect(`${params.redirectUri}?error=server_error&error_description=${encodeURIComponent('Authorization failed. Please try again or contact support.')}`);
|
|
113
|
+
}
|
|
114
|
+
}
|
|
115
|
+
async challengeForAuthorizationCode(client, authorizationCode) {
|
|
116
|
+
// This is never called but required by TS !
|
|
117
|
+
return authorizationCode;
|
|
118
|
+
}
|
|
119
|
+
async exchangeAuthorizationCode(client, authorizationCode, codeVerifier, redirectUri) {
|
|
120
|
+
try {
|
|
121
|
+
return await this.generateAccessToken(client, {
|
|
122
|
+
grant_type: 'authorization_code',
|
|
123
|
+
code: authorizationCode,
|
|
124
|
+
redirect_uri: redirectUri,
|
|
125
|
+
client_id: client.client_id,
|
|
126
|
+
code_verifier: codeVerifier,
|
|
127
|
+
});
|
|
128
|
+
}
|
|
129
|
+
catch (error) {
|
|
130
|
+
const message = error instanceof Error ? error.message : String(error);
|
|
131
|
+
throw new errors_js_1.InvalidRequestError(`Failed to exchange authorization code: ${message}`);
|
|
132
|
+
}
|
|
133
|
+
}
|
|
134
|
+
async exchangeRefreshToken(client, refreshToken, scopes) {
|
|
135
|
+
// Verify and decode the refresh token
|
|
136
|
+
let decoded;
|
|
137
|
+
try {
|
|
138
|
+
decoded = jsonwebtoken_1.default.verify(refreshToken, this.authSecret);
|
|
139
|
+
}
|
|
140
|
+
catch (error) {
|
|
141
|
+
throw new errors_js_1.InvalidTokenError('Invalid or expired refresh token');
|
|
142
|
+
}
|
|
143
|
+
// Validate token type
|
|
144
|
+
if (decoded.type !== 'refresh') {
|
|
145
|
+
throw new errors_js_1.UnsupportedTokenTypeError('Invalid token type');
|
|
146
|
+
}
|
|
147
|
+
// Validate client_id matches
|
|
148
|
+
if (decoded.clientId !== client.client_id) {
|
|
149
|
+
throw new errors_js_1.InvalidClientError('Token was not issued to this client');
|
|
150
|
+
}
|
|
151
|
+
// Exchange the Forest refresh token for new tokens
|
|
152
|
+
try {
|
|
153
|
+
return await this.generateAccessToken(client, {
|
|
154
|
+
grant_type: 'refresh_token',
|
|
155
|
+
refresh_token: decoded.serverRefreshToken,
|
|
156
|
+
client_id: client.client_id,
|
|
157
|
+
scopes,
|
|
158
|
+
});
|
|
159
|
+
}
|
|
160
|
+
catch (error) {
|
|
161
|
+
const message = error instanceof Error ? error.message : String(error);
|
|
162
|
+
throw new errors_js_1.InvalidRequestError(`Failed to refresh token: ${message}`);
|
|
163
|
+
}
|
|
164
|
+
}
|
|
165
|
+
async generateAccessToken(client, tokenPayload) {
|
|
166
|
+
const response = await fetch(`${this.forestServerUrl}/oauth/token`, {
|
|
167
|
+
method: 'POST',
|
|
168
|
+
headers: {
|
|
169
|
+
'forest-secret-key': this.envSecret,
|
|
170
|
+
'Content-Type': 'application/json',
|
|
171
|
+
},
|
|
172
|
+
body: JSON.stringify(tokenPayload),
|
|
173
|
+
});
|
|
174
|
+
if (!response.ok) {
|
|
175
|
+
const errorBody = await response.json();
|
|
176
|
+
throw new errors_js_1.CustomOAuthError(errorBody.error || 'server_error', errorBody.error_description || 'Failed to exchange authorization code');
|
|
177
|
+
}
|
|
178
|
+
const { access_token: forestServerAccessToken, refresh_token: forestServerRefreshToken } = (await response.json());
|
|
179
|
+
// Get updated user info
|
|
180
|
+
const decodedAccessToken = jsonwebtoken_1.default.decode(forestServerAccessToken);
|
|
181
|
+
if (!decodedAccessToken) {
|
|
182
|
+
throw new Error('Failed to decode access token from Forest Admin server');
|
|
183
|
+
}
|
|
184
|
+
const { meta: { renderingId }, exp: expirationDate, scope, } = decodedAccessToken;
|
|
185
|
+
const decodedRefreshToken = jsonwebtoken_1.default.decode(forestServerRefreshToken);
|
|
186
|
+
if (!decodedRefreshToken) {
|
|
187
|
+
throw new Error('Failed to decode refresh token from Forest Admin server');
|
|
188
|
+
}
|
|
189
|
+
const { exp: refreshTokenExpirationDate } = decodedRefreshToken;
|
|
190
|
+
const user = await this.forestClient.authService.getUserInfo(renderingId, forestServerAccessToken);
|
|
191
|
+
// Create new access token
|
|
192
|
+
const expiresIn = expirationDate - Math.floor(Date.now() / 1000);
|
|
193
|
+
const tokenScopes = scope ? scope.split(' ') : ['mcp:read', 'mcp:write', 'mcp:action'];
|
|
194
|
+
const accessToken = jsonwebtoken_1.default.sign({ ...user, serverToken: forestServerAccessToken, scopes: tokenScopes }, this.authSecret, { expiresIn });
|
|
195
|
+
// Create new refresh token (token rotation for security)
|
|
196
|
+
const refreshToken = jsonwebtoken_1.default.sign({
|
|
197
|
+
type: 'refresh',
|
|
198
|
+
clientId: client.client_id,
|
|
199
|
+
userId: user.id,
|
|
200
|
+
renderingId,
|
|
201
|
+
serverRefreshToken: forestServerRefreshToken,
|
|
202
|
+
}, this.authSecret, { expiresIn: refreshTokenExpirationDate - Math.floor(Date.now() / 1000) });
|
|
203
|
+
return {
|
|
204
|
+
access_token: accessToken,
|
|
205
|
+
token_type: 'Bearer',
|
|
206
|
+
expires_in: expiresIn > 0 ? expiresIn : 3600,
|
|
207
|
+
refresh_token: refreshToken,
|
|
208
|
+
scope: scope || client.scope,
|
|
209
|
+
};
|
|
210
|
+
}
|
|
211
|
+
async verifyAccessToken(token) {
|
|
212
|
+
try {
|
|
213
|
+
const decoded = jsonwebtoken_1.default.verify(token, this.authSecret);
|
|
214
|
+
// Ensure this is an access token (not a refresh token)
|
|
215
|
+
if ('type' in decoded && decoded.type === 'refresh') {
|
|
216
|
+
throw new errors_js_1.UnsupportedTokenTypeError('Cannot use refresh token as access token');
|
|
217
|
+
}
|
|
218
|
+
// Use scopes from token if available, otherwise fall back to defaults
|
|
219
|
+
const scopes = decoded.scopes || ['mcp:read', 'mcp:write', 'mcp:action'];
|
|
220
|
+
return {
|
|
221
|
+
token,
|
|
222
|
+
clientId: decoded.id.toString(),
|
|
223
|
+
expiresAt: decoded.exp,
|
|
224
|
+
scopes,
|
|
225
|
+
extra: {
|
|
226
|
+
userId: decoded.id,
|
|
227
|
+
email: decoded.email,
|
|
228
|
+
renderingId: decoded.renderingId,
|
|
229
|
+
environmentApiEndpoint: this.environmentApiEndpoint,
|
|
230
|
+
forestServerToken: decoded.serverToken,
|
|
231
|
+
},
|
|
232
|
+
};
|
|
233
|
+
}
|
|
234
|
+
catch (error) {
|
|
235
|
+
this.logger('Error', `Error verifying token: ${error}`);
|
|
236
|
+
if (error instanceof jsonwebtoken_1.default.TokenExpiredError) {
|
|
237
|
+
throw new errors_js_1.InvalidTokenError('Access token has expired');
|
|
238
|
+
}
|
|
239
|
+
if (error instanceof jsonwebtoken_1.default.JsonWebTokenError) {
|
|
240
|
+
throw new errors_js_1.InvalidTokenError('Invalid access token');
|
|
241
|
+
}
|
|
242
|
+
throw error;
|
|
243
|
+
}
|
|
244
|
+
}
|
|
245
|
+
async revokeToken(_client, _request) {
|
|
246
|
+
// Token revocation is not currently implemented.
|
|
247
|
+
// Per RFC 7009, the revocation endpoint should return success even if the token
|
|
248
|
+
// is already invalid or unknown, so we silently succeed here.
|
|
249
|
+
// TODO: Implement actual token revocation with Forest Admin server when supported.
|
|
250
|
+
}
|
|
251
|
+
}
|
|
252
|
+
exports.default = ForestOAuthProvider;
|
|
253
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"forest-oauth-provider.js","sourceRoot":"","sources":["../src/forest-oauth-provider.ts"],"names":[],"mappings":";;;;;AAeA,yFAAsE;AACtE,+EAMyD;AACzD,gEAAwC;AAUxC;;GAEG;AACH,MAAqB,mBAAmB;IAUtC,YAAY,EACV,eAAe,EACf,YAAY,EACZ,SAAS,EACT,UAAU,EACV,MAAM,GACqB;QAsW7B,wDAAwD;QACxD,4BAAuB,GAAG,IAAI,CAAC;QAtW7B,IAAI,CAAC,eAAe,GAAG,eAAe,CAAC;QACvC,IAAI,CAAC,YAAY,GAAG,YAAY,CAAC;QACjC,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;QAC3B,IAAI,CAAC,UAAU,GAAG,UAAU,CAAC;QAC7B,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC;QACrB,IAAI,CAAC,YAAY,GAAG,IAAA,4BAAuB,EAAC;YAC1C,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,SAAS,EAAE,IAAI,CAAC,SAAS;SAC1B,CAAC,CAAC;IACL,CAAC;IAED,KAAK,CAAC,UAAU;QACd,IAAI,CAAC;YACH,MAAM,IAAI,CAAC,kBAAkB,EAAE,CAAC;QAClC,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,4EAA4E;YAC5E,sFAAsF;YACtF,IAAI,CAAC,MAAM,CAAC,MAAM,EAAE,wDAAwD,KAAK,EAAE,CAAC,CAAC;QACvF,CAAC;IACH,CAAC;IAEO,KAAK,CAAC,kBAAkB;QAC9B,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,CAAC;YACpB,MAAM,IAAI,KAAK,CAAC,uDAAuD,CAAC,CAAC;QAC3E,CAAC;QAED,uDAAuD;QACvD,MAAM,QAAQ,GAAG,MAAM,KAAK,CAAC,GAAG,IAAI,CAAC,eAAe,oBAAoB,EAAE;YACxE,MAAM,EAAE,KAAK;YACb,OAAO,EAAE;gBACP,mBAAmB,EAAE,IAAI,CAAC,SAAS;gBACnC,cAAc,EAAE,kBAAkB;aACnC;SACF,CAAC,CAAC;QAEH,IAAI,CAAC,QAAQ,CAAC,EAAE,EAAE,CAAC;YACjB,MAAM,SAAS,GAAG,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAC;YACxC,MAAM,IAAI,KAAK,CACb,sDAAsD,QAAQ,CAAC,MAAM,IAAI,QAAQ,CAAC,UAAU,KAAK,SAAS,EAAE,CAC7G,CAAC;QACJ,CAAC;QAED,MAAM,IAAI,GAAG,CAAC,MAAM,QAAQ,CAAC,IAAI,EAAE,CAElC,CAAC;QAEF,IAAI,CAAC,aAAa,GAAG,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,EAAE,EAAE,CAAC,CAAC;QAChD,IAAI,CAAC,sBAAsB,GAAG,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC,YAAY,CAAC;IAClE,CAAC;IAED;;;OAGG;IACH,UAAU;QACR,IAAI,CAAC,IAAI,CAAC,sBAAsB,EAAE,CAAC;YACjC,OAAO,SAAS,CAAC;QACnB,CAAC;QAED,OAAO,IAAI,GAAG,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC;IAC9C,CAAC;IAED,IAAI,YAAY;QACd,OAAO;YACL,SAAS,EAAE,KAAK,EAAE,QAAgB,EAAE,EAAE;gBACpC,kDAAkD;gBAClD,MAAM,QAAQ,GAAG,MAAM,KAAK,CAAC,GAAG,IAAI,CAAC,eAAe,mBAAmB,QAAQ,EAAE,EAAE;oBACjF,MAAM,EAAE,KAAK;oBACb,OAAO,EAAE;wBACP,cAAc,EAAE,kBAAkB;qBACnC;iBACF,CAAC,CAAC;gBAEH,2EAA2E;gBAC3E,IAAI,CAAC,QAAQ,CAAC,EAAE,EAAE,CAAC;oBACjB,OAAO,CAAC,KAAK,CACX,gDAAgD,QAAQ,KAAK,QAAQ,CAAC,MAAM,IAAI,QAAQ,CAAC,UAAU,EAAE,CACtG,CAAC;oBAEF,OAAO,SAAS,CAAC;gBACnB,CAAC;gBAED,qCAAqC;gBACrC,OAAO,QAAQ,CAAC,IAAI,EAAE,CAAC;YACzB,CAAC;SACF,CAAC;IACJ,CAAC;IAED,KAAK,CAAC,SAAS,CACb,MAAkC,EAClC,MAA2B,EAC3B,GAAa;QAEb,IAAI,CAAC;YACH,oCAAoC;YACpC,IAAI,CAAC,IAAI,CAAC,aAAa,EAAE,CAAC;gBACxB,MAAM,IAAI,KAAK,CACb,wGAAwG,CACzG,CAAC;YACJ,CAAC;YAED,2DAA2D;YAC3D,MAAM,YAAY,GAAG,IAAI,GAAG,CAAC,kBAAkB,EAAE,IAAI,CAAC,YAAY,CAAC,CAAC;YAEpE,YAAY,CAAC,YAAY,CAAC,GAAG,CAAC,cAAc,EAAE,MAAM,CAAC,WAAW,CAAC,CAAC;YAClE,YAAY,CAAC,YAAY,CAAC,GAAG,CAAC,gBAAgB,EAAE,MAAM,CAAC,aAAa,CAAC,CAAC;YACtE,YAAY,CAAC,YAAY,CAAC,GAAG,CAAC,uBAAuB,EAAE,MAAM,CAAC,CAAC;YAC/D,YAAY,CAAC,YAAY,CAAC,GAAG,CAAC,eAAe,EAAE,MAAM,CAAC,CAAC;YACvD,YAAY,CAAC,YAAY,CAAC,GAAG,CAAC,WAAW,EAAE,MAAM,CAAC,SAAS,CAAC,CAAC;YAC7D,YAAY,CAAC,YAAY,CAAC,GAAG,CAAC,OAAO,EAAE,MAAM,CAAC,KAAK,CAAC,CAAC;YACrD,YAAY,CAAC,YAAY,CAAC,GAAG,CAAC,OAAO,EAAE,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC;YAEhE,IAAI,MAAM,CAAC,QAAQ,EAAE,IAAI,EAAE,CAAC;gBAC1B,YAAY,CAAC,YAAY,CAAC,GAAG,CAAC,UAAU,EAAE,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC;YAClE,CAAC;YAED,YAAY,CAAC,YAAY,CAAC,GAAG,CAAC,eAAe,EAAE,IAAI,CAAC,aAAa,CAAC,QAAQ,EAAE,CAAC,CAAC;YAE9E,GAAG,CAAC,QAAQ,CAAC,YAAY,CAAC,QAAQ,EAAE,CAAC,CAAC;QACxC,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,YAAY,GAAG,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;YAC5E,IAAI,CAAC,MAAM,CAAC,OAAO,EAAE,+CAA+C,YAAY,EAAE,CAAC,CAAC;YAEpF,4EAA4E;YAC5E,iDAAiD;YACjD,GAAG,CAAC,QAAQ,CACV,GAAG,MAAM,CAAC,WAAW,yCAAyC,kBAAkB,CAC9E,4DAA4D,CAC7D,EAAE,CACJ,CAAC;QACJ,CAAC;IACH,CAAC;IAED,KAAK,CAAC,6BAA6B,CACjC,MAAkC,EAClC,iBAAyB;QAEzB,4CAA4C;QAC5C,OAAO,iBAAiB,CAAC;IAC3B,CAAC;IAED,KAAK,CAAC,yBAAyB,CAC7B,MAAkC,EAClC,iBAAyB,EACzB,YAAqB,EACrB,WAAoB;QAEpB,IAAI,CAAC;YACH,OAAO,MAAM,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE;gBAC5C,UAAU,EAAE,oBAAoB;gBAChC,IAAI,EAAE,iBAAiB;gBACvB,YAAY,EAAE,WAAW;gBACzB,SAAS,EAAE,MAAM,CAAC,SAAS;gBAC3B,aAAa,EAAE,YAAY;aAC5B,CAAC,CAAC;QACL,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,OAAO,GAAG,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;YACvE,MAAM,IAAI,+BAAmB,CAAC,0CAA0C,OAAO,EAAE,CAAC,CAAC;QACrF,CAAC;IACH,CAAC;IAED,KAAK,CAAC,oBAAoB,CACxB,MAAkC,EAClC,YAAoB,EACpB,MAAiB;QAEjB,sCAAsC;QACtC,IAAI,OAMH,CAAC;QAEF,IAAI,CAAC;YACH,OAAO,GAAG,sBAAY,CAAC,MAAM,CAAC,YAAY,EAAE,IAAI,CAAC,UAAU,CAAmB,CAAC;QACjF,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,IAAI,6BAAiB,CAAC,kCAAkC,CAAC,CAAC;QAClE,CAAC;QAED,sBAAsB;QACtB,IAAI,OAAO,CAAC,IAAI,KAAK,SAAS,EAAE,CAAC;YAC/B,MAAM,IAAI,qCAAyB,CAAC,oBAAoB,CAAC,CAAC;QAC5D,CAAC;QAED,6BAA6B;QAC7B,IAAI,OAAO,CAAC,QAAQ,KAAK,MAAM,CAAC,SAAS,EAAE,CAAC;YAC1C,MAAM,IAAI,8BAAkB,CAAC,qCAAqC,CAAC,CAAC;QACtE,CAAC;QAED,mDAAmD;QACnD,IAAI,CAAC;YACH,OAAO,MAAM,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE;gBAC5C,UAAU,EAAE,eAAe;gBAC3B,aAAa,EAAE,OAAO,CAAC,kBAAkB;gBACzC,SAAS,EAAE,MAAM,CAAC,SAAS;gBAC3B,MAAM;aACP,CAAC,CAAC;QACL,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,OAAO,GAAG,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;YACvE,MAAM,IAAI,+BAAmB,CAAC,4BAA4B,OAAO,EAAE,CAAC,CAAC;QACvE,CAAC;IACH,CAAC;IAEO,KAAK,CAAC,mBAAmB,CAC/B,MAAkC,EAClC,YAAqC;QAErC,MAAM,QAAQ,GAAG,MAAM,KAAK,CAAC,GAAG,IAAI,CAAC,eAAe,cAAc,EAAE;YAClE,MAAM,EAAE,MAAM;YACd,OAAO,EAAE;gBACP,mBAAmB,EAAE,IAAI,CAAC,SAAS;gBACnC,cAAc,EAAE,kBAAkB;aACnC;YACD,IAAI,EAAE,IAAI,CAAC,SAAS,CAAC,YAAY,CAAC;SACnC,CAAC,CAAC;QAEH,IAAI,CAAC,QAAQ,CAAC,EAAE,EAAE,CAAC;YACjB,MAAM,SAAS,GAAG,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAC;YACxC,MAAM,IAAI,4BAAgB,CACxB,SAAS,CAAC,KAAK,IAAI,cAAc,EACjC,SAAS,CAAC,iBAAiB,IAAI,uCAAuC,CACvE,CAAC;QACJ,CAAC;QAED,MAAM,EAAE,YAAY,EAAE,uBAAuB,EAAE,aAAa,EAAE,wBAAwB,EAAE,GACtF,CAAC,MAAM,QAAQ,CAAC,IAAI,EAAE,CAMrB,CAAC;QAEJ,wBAAwB;QACxB,MAAM,kBAAkB,GAAG,sBAAY,CAAC,MAAM,CAAC,uBAAuB,CAK9D,CAAC;QAET,IAAI,CAAC,kBAAkB,EAAE,CAAC;YACxB,MAAM,IAAI,KAAK,CAAC,wDAAwD,CAAC,CAAC;QAC5E,CAAC;QAED,MAAM,EACJ,IAAI,EAAE,EAAE,WAAW,EAAE,EACrB,GAAG,EAAE,cAAc,EACnB,KAAK,GACN,GAAG,kBAAkB,CAAC;QAEvB,MAAM,mBAAmB,GAAG,sBAAY,CAAC,MAAM,CAAC,wBAAwB,CAGhE,CAAC;QAET,IAAI,CAAC,mBAAmB,EAAE,CAAC;YACzB,MAAM,IAAI,KAAK,CAAC,yDAAyD,CAAC,CAAC;QAC7E,CAAC;QAED,MAAM,EAAE,GAAG,EAAE,0BAA0B,EAAE,GAAG,mBAAmB,CAAC;QAChE,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC,WAAW,CAC1D,WAAW,EACX,uBAAuB,CACxB,CAAC;QAEF,0BAA0B;QAC1B,MAAM,SAAS,GAAG,cAAc,GAAG,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC;QACjE,MAAM,WAAW,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,UAAU,EAAE,WAAW,EAAE,YAAY,CAAC,CAAC;QACvF,MAAM,WAAW,GAAG,sBAAY,CAAC,IAAI,CACnC,EAAE,GAAG,IAAI,EAAE,WAAW,EAAE,uBAAuB,EAAE,MAAM,EAAE,WAAW,EAAE,EACtE,IAAI,CAAC,UAAU,EACf,EAAE,SAAS,EAAE,CACd,CAAC;QAEF,yDAAyD;QACzD,MAAM,YAAY,GAAG,sBAAY,CAAC,IAAI,CACpC;YACE,IAAI,EAAE,SAAS;YACf,QAAQ,EAAE,MAAM,CAAC,SAAS;YAC1B,MAAM,EAAE,IAAI,CAAC,EAAE;YACf,WAAW;YACX,kBAAkB,EAAE,wBAAwB;SAC7C,EACD,IAAI,CAAC,UAAU,EACf,EAAE,SAAS,EAAE,0BAA0B,GAAG,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC,EAAE,CAC1E,CAAC;QAEF,OAAO;YACL,YAAY,EAAE,WAAW;YACzB,UAAU,EAAE,QAAQ;YACpB,UAAU,EAAE,SAAS,GAAG,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,IAAI;YAC5C,aAAa,EAAE,YAAY;YAC3B,KAAK,EAAE,KAAK,IAAI,MAAM,CAAC,KAAK;SAC7B,CAAC;IACJ,CAAC;IAED,KAAK,CAAC,iBAAiB,CAAC,KAAa;QACnC,IAAI,CAAC;YACH,MAAM,OAAO,GAAG,sBAAY,CAAC,MAAM,CAAC,KAAK,EAAE,IAAI,CAAC,UAAU,CAQzD,CAAC;YAEF,uDAAuD;YACvD,IAAI,MAAM,IAAI,OAAO,IAAK,OAA6B,CAAC,IAAI,KAAK,SAAS,EAAE,CAAC;gBAC3E,MAAM,IAAI,qCAAyB,CAAC,0CAA0C,CAAC,CAAC;YAClF,CAAC;YAED,sEAAsE;YACtE,MAAM,MAAM,GAAG,OAAO,CAAC,MAAM,IAAI,CAAC,UAAU,EAAE,WAAW,EAAE,YAAY,CAAC,CAAC;YAEzE,OAAO;gBACL,KAAK;gBACL,QAAQ,EAAE,OAAO,CAAC,EAAE,CAAC,QAAQ,EAAE;gBAC/B,SAAS,EAAE,OAAO,CAAC,GAAG;gBACtB,MAAM;gBACN,KAAK,EAAE;oBACL,MAAM,EAAE,OAAO,CAAC,EAAE;oBAClB,KAAK,EAAE,OAAO,CAAC,KAAK;oBACpB,WAAW,EAAE,OAAO,CAAC,WAAW;oBAChC,sBAAsB,EAAE,IAAI,CAAC,sBAAsB;oBACnD,iBAAiB,EAAE,OAAO,CAAC,WAAW;iBACvC;aACF,CAAC;QACJ,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,IAAI,CAAC,MAAM,CAAC,OAAO,EAAE,0BAA0B,KAAK,EAAE,CAAC,CAAC;YAExD,IAAI,KAAK,YAAY,sBAAY,CAAC,iBAAiB,EAAE,CAAC;gBACpD,MAAM,IAAI,6BAAiB,CAAC,0BAA0B,CAAC,CAAC;YAC1D,CAAC;YAED,IAAI,KAAK,YAAY,sBAAY,CAAC,iBAAiB,EAAE,CAAC;gBACpD,MAAM,IAAI,6BAAiB,CAAC,sBAAsB,CAAC,CAAC;YACtD,CAAC;YAED,MAAM,KAAK,CAAC;QACd,CAAC;IACH,CAAC;IAED,KAAK,CAAC,WAAW,CACf,OAAmC,EACnC,QAAqC;QAErC,iDAAiD;QACjD,gFAAgF;QAChF,8DAA8D;QAC9D,mFAAmF;IACrF,CAAC;CAIF;AAxXD,sCAwXC"}
|