@google/gemini-cli-a2a-server 0.31.0-preview.0 → 0.31.0-preview.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/a2a-server.mjs +35 -15
- package/dist/tsconfig.tsbuildinfo +1 -1
- package/package.json +2 -2
package/dist/a2a-server.mjs
CHANGED
|
@@ -141950,7 +141950,7 @@ function getVersion() {
|
|
|
141950
141950
|
}
|
|
141951
141951
|
versionPromise = (async () => {
|
|
141952
141952
|
const pkgJson = await getPackageJson(__dirname3);
|
|
141953
|
-
return "0.31.0-preview.
|
|
141953
|
+
return "0.31.0-preview.1";
|
|
141954
141954
|
})();
|
|
141955
141955
|
return versionPromise;
|
|
141956
141956
|
}
|
|
@@ -219396,8 +219396,8 @@ var GIT_COMMIT_INFO, CLI_VERSION;
|
|
|
219396
219396
|
var init_git_commit = __esm({
|
|
219397
219397
|
"packages/core/dist/src/generated/git-commit.js"() {
|
|
219398
219398
|
"use strict";
|
|
219399
|
-
GIT_COMMIT_INFO = "
|
|
219400
|
-
CLI_VERSION = "0.31.0-preview.
|
|
219399
|
+
GIT_COMMIT_INFO = "b15330140";
|
|
219400
|
+
CLI_VERSION = "0.31.0-preview.1";
|
|
219401
219401
|
}
|
|
219402
219402
|
});
|
|
219403
219403
|
|
|
@@ -415385,11 +415385,17 @@ async function handleAutomaticOAuth(mcpServerName, mcpServerConfig, wwwAuthentic
|
|
|
415385
415385
|
return false;
|
|
415386
415386
|
}
|
|
415387
415387
|
}
|
|
415388
|
-
function createTransportRequestInit(mcpServerConfig, headers) {
|
|
415388
|
+
function createTransportRequestInit(mcpServerConfig, headers, sanitizationConfig) {
|
|
415389
|
+
const extensionEnv = getExtensionEnvironment(mcpServerConfig.extension);
|
|
415390
|
+
const expansionEnv = { ...process.env, ...extensionEnv };
|
|
415391
|
+
const sanitizedEnv = sanitizeEnvironment(expansionEnv, {
|
|
415392
|
+
...sanitizationConfig,
|
|
415393
|
+
enableEnvironmentVariableRedaction: true
|
|
415394
|
+
});
|
|
415389
415395
|
const expandedHeaders = {};
|
|
415390
415396
|
if (mcpServerConfig.headers) {
|
|
415391
415397
|
for (const [key, value] of Object.entries(mcpServerConfig.headers)) {
|
|
415392
|
-
expandedHeaders[key] = expandEnvVars(value,
|
|
415398
|
+
expandedHeaders[key] = expandEnvVars(value, sanitizedEnv);
|
|
415393
415399
|
}
|
|
415394
415400
|
}
|
|
415395
415401
|
return {
|
|
@@ -415408,13 +415414,13 @@ function createAuthProvider(mcpServerConfig) {
|
|
|
415408
415414
|
}
|
|
415409
415415
|
return void 0;
|
|
415410
415416
|
}
|
|
415411
|
-
async function createTransportWithOAuth(mcpServerName, mcpServerConfig, accessToken) {
|
|
415417
|
+
async function createTransportWithOAuth(mcpServerName, mcpServerConfig, accessToken, sanitizationConfig) {
|
|
415412
415418
|
try {
|
|
415413
415419
|
const headers = {
|
|
415414
415420
|
Authorization: `Bearer ${accessToken}`
|
|
415415
415421
|
};
|
|
415416
415422
|
const transportOptions = {
|
|
415417
|
-
requestInit: createTransportRequestInit(mcpServerConfig, headers)
|
|
415423
|
+
requestInit: createTransportRequestInit(mcpServerConfig, headers, sanitizationConfig)
|
|
415418
415424
|
};
|
|
415419
415425
|
return createUrlTransport(mcpServerName, mcpServerConfig, transportOptions);
|
|
415420
415426
|
} catch (error2) {
|
|
@@ -415567,7 +415573,7 @@ async function showAuthRequiredMessage(serverName) {
|
|
|
415567
415573
|
coreEvents.emitFeedback("info", message);
|
|
415568
415574
|
throw new UnauthorizedError(message);
|
|
415569
415575
|
}
|
|
415570
|
-
async function retryWithOAuth(client, serverName, config3, accessToken, httpReturned404) {
|
|
415576
|
+
async function retryWithOAuth(client, serverName, config3, accessToken, httpReturned404, sanitizationConfig) {
|
|
415571
415577
|
if (httpReturned404) {
|
|
415572
415578
|
debugLogger.log(`Retrying SSE connection to '${serverName}' with OAuth token...`);
|
|
415573
415579
|
await connectWithSSETransport(client, config3, accessToken);
|
|
@@ -415575,7 +415581,7 @@ async function retryWithOAuth(client, serverName, config3, accessToken, httpRetu
|
|
|
415575
415581
|
return;
|
|
415576
415582
|
}
|
|
415577
415583
|
debugLogger.log(`Retrying connection to '${serverName}' with OAuth token...`);
|
|
415578
|
-
const httpTransport = await createTransportWithOAuth(serverName, config3, accessToken);
|
|
415584
|
+
const httpTransport = await createTransportWithOAuth(serverName, config3, accessToken, sanitizationConfig);
|
|
415579
415585
|
if (!httpTransport) {
|
|
415580
415586
|
throw new Error(`Failed to create OAuth transport for server '${serverName}'`);
|
|
415581
415587
|
}
|
|
@@ -415725,7 +415731,7 @@ async function connectToMcpServer(clientVersion, mcpServerName, mcpServerConfig,
|
|
|
415725
415731
|
if (!accessToken) {
|
|
415726
415732
|
throw new Error(`Failed to get OAuth token for server '${mcpServerName}'`);
|
|
415727
415733
|
}
|
|
415728
|
-
await retryWithOAuth(mcpClient, mcpServerName, mcpServerConfig, accessToken, httpReturned404);
|
|
415734
|
+
await retryWithOAuth(mcpClient, mcpServerName, mcpServerConfig, accessToken, httpReturned404, sanitizationConfig);
|
|
415729
415735
|
return mcpClient;
|
|
415730
415736
|
} else {
|
|
415731
415737
|
throw new Error(`Failed to handle automatic OAuth for server '${mcpServerName}'`);
|
|
@@ -415757,7 +415763,7 @@ async function connectToMcpServer(clientVersion, mcpServerName, mcpServerConfig,
|
|
|
415757
415763
|
if (!accessToken) {
|
|
415758
415764
|
throw new Error(`Failed to get OAuth token for server '${mcpServerName}'`);
|
|
415759
415765
|
}
|
|
415760
|
-
const oauthTransport = await createTransportWithOAuth(mcpServerName, mcpServerConfig, accessToken);
|
|
415766
|
+
const oauthTransport = await createTransportWithOAuth(mcpServerName, mcpServerConfig, accessToken, sanitizationConfig);
|
|
415761
415767
|
if (!oauthTransport) {
|
|
415762
415768
|
throw new Error(`Failed to create OAuth transport for server '${mcpServerName}'`);
|
|
415763
415769
|
}
|
|
@@ -415829,18 +415835,21 @@ async function createTransport(mcpServerName, mcpServerConfig, debugMode, saniti
|
|
|
415829
415835
|
}
|
|
415830
415836
|
}
|
|
415831
415837
|
const transportOptions = {
|
|
415832
|
-
requestInit: createTransportRequestInit(mcpServerConfig, headers),
|
|
415838
|
+
requestInit: createTransportRequestInit(mcpServerConfig, headers, sanitizationConfig),
|
|
415833
415839
|
authProvider
|
|
415834
415840
|
};
|
|
415835
415841
|
return createUrlTransport(mcpServerName, mcpServerConfig, transportOptions);
|
|
415836
415842
|
}
|
|
415837
415843
|
if (mcpServerConfig.command) {
|
|
415838
|
-
const
|
|
415844
|
+
const extensionEnv = getExtensionEnvironment(mcpServerConfig.extension);
|
|
415845
|
+
const expansionEnv = { ...process.env, ...extensionEnv };
|
|
415846
|
+
const sanitizedEnv = sanitizeEnvironment(expansionEnv, {
|
|
415839
415847
|
...sanitizationConfig,
|
|
415840
415848
|
enableEnvironmentVariableRedaction: true
|
|
415841
415849
|
});
|
|
415842
415850
|
const finalEnv = {
|
|
415843
|
-
[GEMINI_CLI_IDENTIFICATION_ENV_VAR]: GEMINI_CLI_IDENTIFICATION_ENV_VAR_VALUE
|
|
415851
|
+
[GEMINI_CLI_IDENTIFICATION_ENV_VAR]: GEMINI_CLI_IDENTIFICATION_ENV_VAR_VALUE,
|
|
415852
|
+
...extensionEnv
|
|
415844
415853
|
};
|
|
415845
415854
|
for (const [key, value] of Object.entries(sanitizedEnv)) {
|
|
415846
415855
|
if (value !== void 0) {
|
|
@@ -415849,7 +415858,7 @@ async function createTransport(mcpServerName, mcpServerConfig, debugMode, saniti
|
|
|
415849
415858
|
}
|
|
415850
415859
|
if (mcpServerConfig.env) {
|
|
415851
415860
|
for (const [key, value] of Object.entries(mcpServerConfig.env)) {
|
|
415852
|
-
finalEnv[key] = expandEnvVars(value,
|
|
415861
|
+
finalEnv[key] = expandEnvVars(value, expansionEnv);
|
|
415853
415862
|
}
|
|
415854
415863
|
}
|
|
415855
415864
|
let transport = new StdioClientTransport({
|
|
@@ -415878,6 +415887,17 @@ async function createTransport(mcpServerName, mcpServerConfig, debugMode, saniti
|
|
|
415878
415887
|
}
|
|
415879
415888
|
throw new Error(`Invalid configuration: missing httpUrl (for Streamable HTTP), url (for SSE), and command (for stdio).`);
|
|
415880
415889
|
}
|
|
415890
|
+
function getExtensionEnvironment(extension) {
|
|
415891
|
+
const env2 = {};
|
|
415892
|
+
if (extension?.resolvedSettings) {
|
|
415893
|
+
for (const setting of extension.resolvedSettings) {
|
|
415894
|
+
if (setting.value !== void 0) {
|
|
415895
|
+
env2[setting.envVar] = setting.value;
|
|
415896
|
+
}
|
|
415897
|
+
}
|
|
415898
|
+
}
|
|
415899
|
+
return env2;
|
|
415900
|
+
}
|
|
415881
415901
|
function isEnabled(funcDecl, mcpServerName, mcpServerConfig) {
|
|
415882
415902
|
if (!funcDecl.name) {
|
|
415883
415903
|
debugLogger.warn(`Discovered a function declaration without a name from MCP server '${mcpServerName}'. Skipping.`);
|