@google/gemini-cli-core 0.1.13 → 0.1.15

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (234) hide show
  1. package/README.md +22 -1
  2. package/dist/google-gemini-cli-core-0.1.13.tgz +0 -0
  3. package/dist/src/code_assist/codeAssist.js +2 -2
  4. package/dist/src/code_assist/codeAssist.js.map +1 -1
  5. package/dist/src/code_assist/oauth2.js +9 -2
  6. package/dist/src/code_assist/oauth2.js.map +1 -1
  7. package/dist/src/code_assist/oauth2.test.js +99 -7
  8. package/dist/src/code_assist/oauth2.test.js.map +1 -1
  9. package/dist/src/code_assist/server.d.ts +4 -6
  10. package/dist/src/code_assist/server.js +4 -69
  11. package/dist/src/code_assist/server.js.map +1 -1
  12. package/dist/src/code_assist/setup.d.ts +6 -1
  13. package/dist/src/code_assist/setup.js +4 -1
  14. package/dist/src/code_assist/setup.js.map +1 -1
  15. package/dist/src/code_assist/setup.test.js +4 -1
  16. package/dist/src/code_assist/setup.test.js.map +1 -1
  17. package/dist/src/code_assist/types.d.ts +2 -2
  18. package/dist/src/config/config.d.ts +28 -7
  19. package/dist/src/config/config.js +52 -16
  20. package/dist/src/config/config.js.map +1 -1
  21. package/dist/src/config/config.test.js +1 -23
  22. package/dist/src/config/config.test.js.map +1 -1
  23. package/dist/src/config/flashFallback.test.js +1 -1
  24. package/dist/src/config/flashFallback.test.js.map +1 -1
  25. package/dist/src/core/client.d.ts +5 -2
  26. package/dist/src/core/client.js +39 -17
  27. package/dist/src/core/client.js.map +1 -1
  28. package/dist/src/core/client.test.js +51 -0
  29. package/dist/src/core/client.test.js.map +1 -1
  30. package/dist/src/core/contentGenerator.d.ts +1 -1
  31. package/dist/src/core/contentGenerator.js +1 -1
  32. package/dist/src/core/contentGenerator.js.map +1 -1
  33. package/dist/src/core/geminiChat.d.ts +4 -3
  34. package/dist/src/core/geminiChat.js +8 -11
  35. package/dist/src/core/geminiChat.js.map +1 -1
  36. package/dist/src/core/geminiRequest.js +2 -37
  37. package/dist/src/core/geminiRequest.js.map +1 -1
  38. package/dist/src/core/logger.js +6 -0
  39. package/dist/src/core/logger.js.map +1 -1
  40. package/dist/src/core/logger.test.js +1 -1
  41. package/dist/src/core/logger.test.js.map +1 -1
  42. package/dist/src/core/nonInteractiveToolExecutor.test.js +5 -5
  43. package/dist/src/core/prompts.js +42 -18
  44. package/dist/src/core/prompts.js.map +1 -1
  45. package/dist/src/core/prompts.test.js +121 -4
  46. package/dist/src/core/prompts.test.js.map +1 -1
  47. package/dist/src/core/turn.d.ts +7 -2
  48. package/dist/src/core/turn.js +9 -0
  49. package/dist/src/core/turn.js.map +1 -1
  50. package/dist/src/core/turn.test.js +129 -0
  51. package/dist/src/core/turn.test.js.map +1 -1
  52. package/dist/src/ide/ide-client.d.ts +28 -0
  53. package/dist/src/ide/ide-client.js +88 -0
  54. package/dist/src/ide/ide-client.js.map +1 -0
  55. package/dist/src/ide/ideContext.d.ts +174 -0
  56. package/dist/src/{services → ide}/ideContext.js +28 -25
  57. package/dist/src/ide/ideContext.js.map +1 -0
  58. package/dist/src/{services → ide}/ideContext.test.js +39 -39
  59. package/dist/src/ide/ideContext.test.js.map +1 -0
  60. package/dist/src/index.d.ts +8 -1
  61. package/dist/src/index.js +11 -1
  62. package/dist/src/index.js.map +1 -1
  63. package/dist/src/mcp/google-auth-provider.d.ts +23 -0
  64. package/dist/src/mcp/google-auth-provider.js +63 -0
  65. package/dist/src/mcp/google-auth-provider.js.map +1 -0
  66. package/dist/src/mcp/google-auth-provider.test.js +54 -0
  67. package/dist/src/mcp/google-auth-provider.test.js.map +1 -0
  68. package/dist/src/mcp/oauth-provider.d.ts +5 -1
  69. package/dist/src/mcp/oauth-provider.js +36 -11
  70. package/dist/src/mcp/oauth-provider.js.map +1 -1
  71. package/dist/src/mcp/oauth-provider.test.js +2 -2
  72. package/dist/src/mcp/oauth-provider.test.js.map +1 -1
  73. package/dist/src/mcp/oauth-token-storage.d.ts +3 -1
  74. package/dist/src/mcp/oauth-token-storage.js +3 -1
  75. package/dist/src/mcp/oauth-token-storage.js.map +1 -1
  76. package/dist/src/prompts/mcp-prompts.d.ts +8 -0
  77. package/dist/src/prompts/mcp-prompts.js +13 -0
  78. package/dist/src/prompts/mcp-prompts.js.map +1 -0
  79. package/dist/src/prompts/prompt-registry.d.ts +26 -0
  80. package/dist/src/prompts/prompt-registry.js +47 -0
  81. package/dist/src/prompts/prompt-registry.js.map +1 -0
  82. package/dist/src/services/fileDiscoveryService.test.js +101 -60
  83. package/dist/src/services/fileDiscoveryService.test.js.map +1 -1
  84. package/dist/src/services/gitService.test.js +67 -86
  85. package/dist/src/services/gitService.test.js.map +1 -1
  86. package/dist/src/services/loopDetectionService.d.ts +48 -5
  87. package/dist/src/services/loopDetectionService.js +124 -38
  88. package/dist/src/services/loopDetectionService.js.map +1 -1
  89. package/dist/src/services/loopDetectionService.test.js +39 -112
  90. package/dist/src/services/loopDetectionService.test.js.map +1 -1
  91. package/dist/src/services/shellExecutionService.d.ts +70 -0
  92. package/dist/src/services/shellExecutionService.js +152 -0
  93. package/dist/src/services/shellExecutionService.js.map +1 -0
  94. package/dist/src/services/shellExecutionService.test.d.ts +6 -0
  95. package/dist/src/services/shellExecutionService.test.js +258 -0
  96. package/dist/src/services/shellExecutionService.test.js.map +1 -0
  97. package/dist/src/telemetry/clearcut-logger/clearcut-logger.d.ts +2 -1
  98. package/dist/src/telemetry/clearcut-logger/clearcut-logger.js +17 -2
  99. package/dist/src/telemetry/clearcut-logger/clearcut-logger.js.map +1 -1
  100. package/dist/src/telemetry/constants.d.ts +1 -0
  101. package/dist/src/telemetry/constants.js +1 -0
  102. package/dist/src/telemetry/constants.js.map +1 -1
  103. package/dist/src/telemetry/file-exporters.d.ts +28 -0
  104. package/dist/src/telemetry/file-exporters.js +62 -0
  105. package/dist/src/telemetry/file-exporters.js.map +1 -0
  106. package/dist/src/telemetry/loggers.d.ts +2 -1
  107. package/dist/src/telemetry/loggers.js +17 -1
  108. package/dist/src/telemetry/loggers.js.map +1 -1
  109. package/dist/src/telemetry/sdk.js +17 -6
  110. package/dist/src/telemetry/sdk.js.map +1 -1
  111. package/dist/src/telemetry/types.d.ts +9 -2
  112. package/dist/src/telemetry/types.js +13 -1
  113. package/dist/src/telemetry/types.js.map +1 -1
  114. package/dist/src/tools/edit.js +10 -4
  115. package/dist/src/tools/edit.js.map +1 -1
  116. package/dist/src/tools/edit.test.js +12 -0
  117. package/dist/src/tools/edit.test.js.map +1 -1
  118. package/dist/src/tools/glob.test.js +7 -4
  119. package/dist/src/tools/glob.test.js.map +1 -1
  120. package/dist/src/tools/grep.test.js +5 -5
  121. package/dist/src/tools/grep.test.js.map +1 -1
  122. package/dist/src/tools/ls.d.ts +5 -2
  123. package/dist/src/tools/ls.js +39 -10
  124. package/dist/src/tools/ls.js.map +1 -1
  125. package/dist/src/tools/mcp-client.d.ts +31 -3
  126. package/dist/src/tools/mcp-client.js +478 -38
  127. package/dist/src/tools/mcp-client.js.map +1 -1
  128. package/dist/src/tools/mcp-client.test.js +99 -7
  129. package/dist/src/tools/mcp-client.test.js.map +1 -1
  130. package/dist/src/tools/mcp-tool.js +1 -1
  131. package/dist/src/tools/mcp-tool.js.map +1 -1
  132. package/dist/src/tools/mcp-tool.test.js +34 -0
  133. package/dist/src/tools/mcp-tool.test.js.map +1 -1
  134. package/dist/src/tools/modifiable-tool.test.js +51 -62
  135. package/dist/src/tools/modifiable-tool.test.js.map +1 -1
  136. package/dist/src/tools/read-file.test.js +98 -69
  137. package/dist/src/tools/read-file.test.js.map +1 -1
  138. package/dist/src/tools/read-many-files.d.ts +5 -3
  139. package/dist/src/tools/read-many-files.js +62 -22
  140. package/dist/src/tools/read-many-files.js.map +1 -1
  141. package/dist/src/tools/read-many-files.test.js +5 -2
  142. package/dist/src/tools/read-many-files.test.js.map +1 -1
  143. package/dist/src/tools/shell.d.ts +3 -23
  144. package/dist/src/tools/shell.js +165 -296
  145. package/dist/src/tools/shell.js.map +1 -1
  146. package/dist/src/tools/shell.test.js +254 -392
  147. package/dist/src/tools/shell.test.js.map +1 -1
  148. package/dist/src/tools/tool-registry.d.ts +13 -1
  149. package/dist/src/tools/tool-registry.js +46 -2
  150. package/dist/src/tools/tool-registry.js.map +1 -1
  151. package/dist/src/tools/tool-registry.test.js +5 -5
  152. package/dist/src/tools/tool-registry.test.js.map +1 -1
  153. package/dist/src/utils/bfsFileSearch.d.ts +2 -0
  154. package/dist/src/utils/bfsFileSearch.js +4 -1
  155. package/dist/src/utils/bfsFileSearch.js.map +1 -1
  156. package/dist/src/utils/bfsFileSearch.test.js +108 -105
  157. package/dist/src/utils/bfsFileSearch.test.js.map +1 -1
  158. package/dist/src/utils/editCorrector.js +4 -4
  159. package/dist/src/utils/editCorrector.js.map +1 -1
  160. package/dist/src/utils/editCorrector.test.js +1 -1
  161. package/dist/src/utils/editor.js +16 -10
  162. package/dist/src/utils/editor.js.map +1 -1
  163. package/dist/src/utils/editor.test.js +128 -28
  164. package/dist/src/utils/editor.test.js.map +1 -1
  165. package/dist/src/utils/errorReporting.d.ts +1 -1
  166. package/dist/src/utils/errorReporting.js +2 -2
  167. package/dist/src/utils/errorReporting.js.map +1 -1
  168. package/dist/src/utils/errorReporting.test.js +44 -38
  169. package/dist/src/utils/errorReporting.test.js.map +1 -1
  170. package/dist/src/utils/fileUtils.d.ts +4 -4
  171. package/dist/src/utils/fileUtils.js +31 -15
  172. package/dist/src/utils/fileUtils.js.map +1 -1
  173. package/dist/src/utils/fileUtils.test.js +37 -37
  174. package/dist/src/utils/fileUtils.test.js.map +1 -1
  175. package/dist/src/utils/formatters.d.ts +6 -0
  176. package/dist/src/utils/formatters.js +16 -0
  177. package/dist/src/utils/formatters.js.map +1 -0
  178. package/dist/src/utils/getFolderStructure.d.ts +3 -2
  179. package/dist/src/utils/getFolderStructure.js +27 -28
  180. package/dist/src/utils/getFolderStructure.js.map +1 -1
  181. package/dist/src/utils/getFolderStructure.test.js +169 -187
  182. package/dist/src/utils/getFolderStructure.test.js.map +1 -1
  183. package/dist/src/utils/gitIgnoreParser.js +4 -7
  184. package/dist/src/utils/gitIgnoreParser.js.map +1 -1
  185. package/dist/src/utils/gitIgnoreParser.test.js +70 -61
  186. package/dist/src/utils/gitIgnoreParser.test.js.map +1 -1
  187. package/dist/src/utils/memoryDiscovery.d.ts +2 -1
  188. package/dist/src/utils/memoryDiscovery.js +11 -5
  189. package/dist/src/utils/memoryDiscovery.js.map +1 -1
  190. package/dist/src/utils/memoryDiscovery.test.js +160 -371
  191. package/dist/src/utils/memoryDiscovery.test.js.map +1 -1
  192. package/dist/src/utils/partUtils.d.ts +14 -0
  193. package/dist/src/utils/partUtils.js +65 -0
  194. package/dist/src/utils/partUtils.js.map +1 -0
  195. package/dist/src/utils/partUtils.test.d.ts +6 -0
  196. package/dist/src/utils/partUtils.test.js +130 -0
  197. package/dist/src/utils/partUtils.test.js.map +1 -0
  198. package/dist/src/utils/paths.d.ts +11 -0
  199. package/dist/src/utils/paths.js +17 -1
  200. package/dist/src/utils/paths.js.map +1 -1
  201. package/dist/src/utils/quotaErrorDetection.js +0 -2
  202. package/dist/src/utils/quotaErrorDetection.js.map +1 -1
  203. package/dist/src/utils/retry.js +1 -1
  204. package/dist/src/utils/retry.js.map +1 -1
  205. package/dist/src/utils/schemaValidator.d.ts +1 -1
  206. package/dist/src/utils/schemaValidator.js +6 -3
  207. package/dist/src/utils/schemaValidator.js.map +1 -1
  208. package/dist/src/utils/shell-utils.d.ts +78 -0
  209. package/dist/src/utils/shell-utils.js +306 -0
  210. package/dist/src/utils/shell-utils.js.map +1 -0
  211. package/dist/src/utils/shell-utils.test.d.ts +6 -0
  212. package/dist/src/utils/shell-utils.test.js +200 -0
  213. package/dist/src/utils/shell-utils.test.js.map +1 -0
  214. package/dist/src/utils/summarizer.js +1 -30
  215. package/dist/src/utils/summarizer.js.map +1 -1
  216. package/dist/src/utils/systemEncoding.d.ts +40 -0
  217. package/dist/src/utils/systemEncoding.js +149 -0
  218. package/dist/src/utils/systemEncoding.js.map +1 -0
  219. package/dist/src/utils/systemEncoding.test.d.ts +6 -0
  220. package/dist/src/utils/systemEncoding.test.js +368 -0
  221. package/dist/src/utils/systemEncoding.test.js.map +1 -0
  222. package/dist/src/utils/textUtils.d.ts +13 -0
  223. package/dist/src/utils/textUtils.js +28 -0
  224. package/dist/src/utils/textUtils.js.map +1 -0
  225. package/dist/tsconfig.tsbuildinfo +1 -1
  226. package/package.json +2 -1
  227. package/dist/google-gemini-cli-core-0.1.12.tgz +0 -0
  228. package/dist/src/core/geminiRequest.test.js +0 -72
  229. package/dist/src/core/geminiRequest.test.js.map +0 -1
  230. package/dist/src/services/ideContext.d.ts +0 -126
  231. package/dist/src/services/ideContext.js.map +0 -1
  232. package/dist/src/services/ideContext.test.js.map +0 -1
  233. /package/dist/src/{services → ide}/ideContext.test.d.ts +0 -0
  234. /package/dist/src/{core/geminiRequest.test.d.ts → mcp/google-auth-provider.test.d.ts} +0 -0
@@ -7,10 +7,15 @@ import { Client } from '@modelcontextprotocol/sdk/client/index.js';
7
7
  import { StdioClientTransport } from '@modelcontextprotocol/sdk/client/stdio.js';
8
8
  import { SSEClientTransport, } from '@modelcontextprotocol/sdk/client/sse.js';
9
9
  import { StreamableHTTPClientTransport, } from '@modelcontextprotocol/sdk/client/streamableHttp.js';
10
+ import { ListPromptsResultSchema, GetPromptResultSchema, } from '@modelcontextprotocol/sdk/types.js';
10
11
  import { parse } from 'shell-quote';
12
+ import { AuthProviderType } from '../config/config.js';
13
+ import { GoogleCredentialProvider } from '../mcp/google-auth-provider.js';
11
14
  import { DiscoveredMCPTool } from './mcp-tool.js';
12
15
  import { mcpToTool } from '@google/genai';
13
- import { ActiveFileNotificationSchema, IDE_SERVER_NAME, ideContext, } from '../services/ideContext.js';
16
+ import { MCPOAuthProvider } from '../mcp/oauth-provider.js';
17
+ import { OAuthUtils } from '../mcp/oauth-utils.js';
18
+ import { MCPOAuthTokenStorage } from '../mcp/oauth-token-storage.js';
14
19
  import { getErrorMessage } from '../utils/errors.js';
15
20
  export const MCP_DEFAULT_TIMEOUT_MSEC = 10 * 60 * 1000; // default to 10 minutes
16
21
  /**
@@ -40,11 +45,15 @@ export var MCPDiscoveryState;
40
45
  /**
41
46
  * Map to track the status of each MCP server within the core package
42
47
  */
43
- const mcpServerStatusesInternal = new Map();
48
+ const serverStatuses = new Map();
44
49
  /**
45
50
  * Track the overall MCP discovery state
46
51
  */
47
52
  let mcpDiscoveryState = MCPDiscoveryState.NOT_STARTED;
53
+ /**
54
+ * Map to track which MCP servers have been discovered to require OAuth
55
+ */
56
+ export const mcpServerRequiresOAuth = new Map();
48
57
  const statusChangeListeners = [];
49
58
  /**
50
59
  * Add a listener for MCP server status changes
@@ -65,7 +74,7 @@ export function removeMCPStatusChangeListener(listener) {
65
74
  * Update the status of an MCP server
66
75
  */
67
76
  function updateMCPServerStatus(serverName, status) {
68
- mcpServerStatusesInternal.set(serverName, status);
77
+ serverStatuses.set(serverName, status);
69
78
  // Notify all listeners
70
79
  for (const listener of statusChangeListeners) {
71
80
  listener(serverName, status);
@@ -75,13 +84,13 @@ function updateMCPServerStatus(serverName, status) {
75
84
  * Get the current status of an MCP server
76
85
  */
77
86
  export function getMCPServerStatus(serverName) {
78
- return (mcpServerStatusesInternal.get(serverName) || MCPServerStatus.DISCONNECTED);
87
+ return serverStatuses.get(serverName) || MCPServerStatus.DISCONNECTED;
79
88
  }
80
89
  /**
81
90
  * Get all MCP server statuses
82
91
  */
83
92
  export function getAllMCPServerStatuses() {
84
- return new Map(mcpServerStatusesInternal);
93
+ return new Map(serverStatuses);
85
94
  }
86
95
  /**
87
96
  * Get the current MCP discovery state
@@ -89,6 +98,132 @@ export function getAllMCPServerStatuses() {
89
98
  export function getMCPDiscoveryState() {
90
99
  return mcpDiscoveryState;
91
100
  }
101
+ /**
102
+ * Parse www-authenticate header to extract OAuth metadata URI.
103
+ *
104
+ * @param wwwAuthenticate The www-authenticate header value
105
+ * @returns The resource metadata URI if found, null otherwise
106
+ */
107
+ function _parseWWWAuthenticate(wwwAuthenticate) {
108
+ // Parse header like: Bearer realm="MCP Server", resource_metadata_uri="https://..."
109
+ const resourceMetadataMatch = wwwAuthenticate.match(/resource_metadata_uri="([^"]+)"/);
110
+ return resourceMetadataMatch ? resourceMetadataMatch[1] : null;
111
+ }
112
+ /**
113
+ * Extract WWW-Authenticate header from error message string.
114
+ * This is a more robust approach than regex matching.
115
+ *
116
+ * @param errorString The error message string
117
+ * @returns The www-authenticate header value if found, null otherwise
118
+ */
119
+ function extractWWWAuthenticateHeader(errorString) {
120
+ // Try multiple patterns to extract the header
121
+ const patterns = [
122
+ /www-authenticate:\s*([^\n\r]+)/i,
123
+ /WWW-Authenticate:\s*([^\n\r]+)/i,
124
+ /"www-authenticate":\s*"([^"]+)"/i,
125
+ /'www-authenticate':\s*'([^']+)'/i,
126
+ ];
127
+ for (const pattern of patterns) {
128
+ const match = errorString.match(pattern);
129
+ if (match) {
130
+ return match[1].trim();
131
+ }
132
+ }
133
+ return null;
134
+ }
135
+ /**
136
+ * Handle automatic OAuth discovery and authentication for a server.
137
+ *
138
+ * @param mcpServerName The name of the MCP server
139
+ * @param mcpServerConfig The MCP server configuration
140
+ * @param wwwAuthenticate The www-authenticate header value
141
+ * @returns True if OAuth was successfully configured and authenticated, false otherwise
142
+ */
143
+ async function handleAutomaticOAuth(mcpServerName, mcpServerConfig, wwwAuthenticate) {
144
+ try {
145
+ console.log(`🔐 '${mcpServerName}' requires OAuth authentication`);
146
+ // Always try to parse the resource metadata URI from the www-authenticate header
147
+ let oauthConfig;
148
+ const resourceMetadataUri = OAuthUtils.parseWWWAuthenticateHeader(wwwAuthenticate);
149
+ if (resourceMetadataUri) {
150
+ oauthConfig = await OAuthUtils.discoverOAuthConfig(resourceMetadataUri);
151
+ }
152
+ else if (mcpServerConfig.url) {
153
+ // Fallback: try to discover OAuth config from the base URL for SSE
154
+ const sseUrl = new URL(mcpServerConfig.url);
155
+ const baseUrl = `${sseUrl.protocol}//${sseUrl.host}`;
156
+ oauthConfig = await OAuthUtils.discoverOAuthConfig(baseUrl);
157
+ }
158
+ else if (mcpServerConfig.httpUrl) {
159
+ // Fallback: try to discover OAuth config from the base URL for HTTP
160
+ const httpUrl = new URL(mcpServerConfig.httpUrl);
161
+ const baseUrl = `${httpUrl.protocol}//${httpUrl.host}`;
162
+ oauthConfig = await OAuthUtils.discoverOAuthConfig(baseUrl);
163
+ }
164
+ if (!oauthConfig) {
165
+ console.error(`❌ Could not configure OAuth for '${mcpServerName}' - please authenticate manually with /mcp auth ${mcpServerName}`);
166
+ return false;
167
+ }
168
+ // OAuth configuration discovered - proceed with authentication
169
+ // Create OAuth configuration for authentication
170
+ const oauthAuthConfig = {
171
+ enabled: true,
172
+ authorizationUrl: oauthConfig.authorizationUrl,
173
+ tokenUrl: oauthConfig.tokenUrl,
174
+ scopes: oauthConfig.scopes || [],
175
+ };
176
+ // Perform OAuth authentication
177
+ console.log(`Starting OAuth authentication for server '${mcpServerName}'...`);
178
+ await MCPOAuthProvider.authenticate(mcpServerName, oauthAuthConfig);
179
+ console.log(`OAuth authentication successful for server '${mcpServerName}'`);
180
+ return true;
181
+ }
182
+ catch (error) {
183
+ console.error(`Failed to handle automatic OAuth for server '${mcpServerName}': ${getErrorMessage(error)}`);
184
+ return false;
185
+ }
186
+ }
187
+ /**
188
+ * Create a transport with OAuth token for the given server configuration.
189
+ *
190
+ * @param mcpServerName The name of the MCP server
191
+ * @param mcpServerConfig The MCP server configuration
192
+ * @param accessToken The OAuth access token
193
+ * @returns The transport with OAuth token, or null if creation fails
194
+ */
195
+ async function createTransportWithOAuth(mcpServerName, mcpServerConfig, accessToken) {
196
+ try {
197
+ if (mcpServerConfig.httpUrl) {
198
+ // Create HTTP transport with OAuth token
199
+ const oauthTransportOptions = {
200
+ requestInit: {
201
+ headers: {
202
+ ...mcpServerConfig.headers,
203
+ Authorization: `Bearer ${accessToken}`,
204
+ },
205
+ },
206
+ };
207
+ return new StreamableHTTPClientTransport(new URL(mcpServerConfig.httpUrl), oauthTransportOptions);
208
+ }
209
+ else if (mcpServerConfig.url) {
210
+ // Create SSE transport with OAuth token in Authorization header
211
+ return new SSEClientTransport(new URL(mcpServerConfig.url), {
212
+ requestInit: {
213
+ headers: {
214
+ ...mcpServerConfig.headers,
215
+ Authorization: `Bearer ${accessToken}`,
216
+ },
217
+ },
218
+ });
219
+ }
220
+ return null;
221
+ }
222
+ catch (error) {
223
+ console.error(`Failed to create OAuth transport for server '${mcpServerName}': ${getErrorMessage(error)}`);
224
+ return null;
225
+ }
226
+ }
92
227
  /**
93
228
  * Discovers tools from all configured MCP servers and registers them with the tool registry.
94
229
  * It orchestrates the connection and discovery process for each server defined in the
@@ -99,11 +234,11 @@ export function getMCPDiscoveryState() {
99
234
  * @param toolRegistry The central registry where discovered tools will be registered.
100
235
  * @returns A promise that resolves when the discovery process has been attempted for all servers.
101
236
  */
102
- export async function discoverMcpTools(mcpServers, mcpServerCommand, toolRegistry, debugMode) {
237
+ export async function discoverMcpTools(mcpServers, mcpServerCommand, toolRegistry, promptRegistry, debugMode) {
103
238
  mcpDiscoveryState = MCPDiscoveryState.IN_PROGRESS;
104
239
  try {
105
240
  mcpServers = populateMcpServerCommand(mcpServers, mcpServerCommand);
106
- const discoveryPromises = Object.entries(mcpServers).map(([mcpServerName, mcpServerConfig]) => connectAndDiscover(mcpServerName, mcpServerConfig, toolRegistry, debugMode));
241
+ const discoveryPromises = Object.entries(mcpServers).map(([mcpServerName, mcpServerConfig]) => connectAndDiscover(mcpServerName, mcpServerConfig, toolRegistry, promptRegistry, debugMode));
107
242
  await Promise.all(discoveryPromises);
108
243
  }
109
244
  finally {
@@ -136,7 +271,7 @@ export function populateMcpServerCommand(mcpServers, mcpServerCommand) {
136
271
  * @param toolRegistry The registry to register discovered tools with
137
272
  * @returns Promise that resolves when discovery is complete
138
273
  */
139
- export async function connectAndDiscover(mcpServerName, mcpServerConfig, toolRegistry, debugMode) {
274
+ export async function connectAndDiscover(mcpServerName, mcpServerConfig, toolRegistry, promptRegistry, debugMode) {
140
275
  updateMCPServerStatus(mcpServerName, MCPServerStatus.CONNECTING);
141
276
  try {
142
277
  const mcpClient = await connectToMcpServer(mcpServerName, mcpServerConfig, debugMode);
@@ -145,15 +280,8 @@ export async function connectAndDiscover(mcpServerName, mcpServerConfig, toolReg
145
280
  mcpClient.onerror = (error) => {
146
281
  console.error(`MCP ERROR (${mcpServerName}):`, error.toString());
147
282
  updateMCPServerStatus(mcpServerName, MCPServerStatus.DISCONNECTED);
148
- if (mcpServerName === IDE_SERVER_NAME) {
149
- ideContext.clearActiveFileContext();
150
- }
151
283
  };
152
- if (mcpServerName === IDE_SERVER_NAME) {
153
- mcpClient.setNotificationHandler(ActiveFileNotificationSchema, (notification) => {
154
- ideContext.setActiveFileContext(notification.params);
155
- });
156
- }
284
+ await discoverPrompts(mcpServerName, mcpClient, promptRegistry);
157
285
  const tools = await discoverTools(mcpServerName, mcpServerConfig, mcpClient);
158
286
  for (const tool of tools) {
159
287
  toolRegistry.registerTool(tool);
@@ -194,15 +322,67 @@ export async function discoverTools(mcpServerName, mcpServerConfig, mcpClient) {
194
322
  }
195
323
  discoveredTools.push(new DiscoveredMCPTool(mcpCallableTool, mcpServerName, funcDecl.name, funcDecl.description ?? '', funcDecl.parametersJsonSchema ?? { type: 'object', properties: {} }, mcpServerConfig.timeout ?? MCP_DEFAULT_TIMEOUT_MSEC, mcpServerConfig.trust));
196
324
  }
197
- if (discoveredTools.length === 0) {
198
- throw Error('No enabled tools found');
199
- }
200
325
  return discoveredTools;
201
326
  }
202
327
  catch (error) {
203
328
  throw new Error(`Error discovering tools: ${error}`);
204
329
  }
205
330
  }
331
+ /**
332
+ * Discovers and logs prompts from a connected MCP client.
333
+ * It retrieves prompt declarations from the client and logs their names.
334
+ *
335
+ * @param mcpServerName The name of the MCP server.
336
+ * @param mcpClient The active MCP client instance.
337
+ */
338
+ export async function discoverPrompts(mcpServerName, mcpClient, promptRegistry) {
339
+ try {
340
+ const response = await mcpClient.request({ method: 'prompts/list', params: {} }, ListPromptsResultSchema);
341
+ for (const prompt of response.prompts) {
342
+ promptRegistry.registerPrompt({
343
+ ...prompt,
344
+ serverName: mcpServerName,
345
+ invoke: (params) => invokeMcpPrompt(mcpServerName, mcpClient, prompt.name, params),
346
+ });
347
+ }
348
+ }
349
+ catch (error) {
350
+ // It's okay if this fails, not all servers will have prompts.
351
+ // Don't log an error if the method is not found, which is a common case.
352
+ if (error instanceof Error &&
353
+ !error.message?.includes('Method not found')) {
354
+ console.error(`Error discovering prompts from ${mcpServerName}: ${getErrorMessage(error)}`);
355
+ }
356
+ }
357
+ }
358
+ /**
359
+ * Invokes a prompt on a connected MCP client.
360
+ *
361
+ * @param mcpServerName The name of the MCP server.
362
+ * @param mcpClient The active MCP client instance.
363
+ * @param promptName The name of the prompt to invoke.
364
+ * @param promptParams The parameters to pass to the prompt.
365
+ * @returns A promise that resolves to the result of the prompt invocation.
366
+ */
367
+ export async function invokeMcpPrompt(mcpServerName, mcpClient, promptName, promptParams) {
368
+ try {
369
+ const response = await mcpClient.request({
370
+ method: 'prompts/get',
371
+ params: {
372
+ name: promptName,
373
+ arguments: promptParams,
374
+ },
375
+ }, GetPromptResultSchema);
376
+ return response;
377
+ }
378
+ catch (error) {
379
+ if (error instanceof Error &&
380
+ !error.message?.includes('Method not found')) {
381
+ console.error(`Error invoking prompt '${promptName}' from ${mcpServerName} ${promptParams}: ${getErrorMessage(error)}`);
382
+ }
383
+ throw error;
384
+ }
385
+ }
206
386
  /**
207
387
  * Creates and connects an MCP client to a server based on the provided configuration.
208
388
  * It determines the appropriate transport (Stdio, SSE, or Streamable HTTP) and
@@ -230,7 +410,7 @@ export async function connectToMcpServer(mcpServerName, mcpServerConfig, debugMo
230
410
  };
231
411
  }
232
412
  try {
233
- const transport = createTransport(mcpServerName, mcpServerConfig, debugMode);
413
+ const transport = await createTransport(mcpServerName, mcpServerConfig, debugMode);
234
414
  try {
235
415
  await mcpClient.connect(transport, {
236
416
  timeout: mcpServerConfig.timeout ?? MCP_DEFAULT_TIMEOUT_MSEC,
@@ -243,29 +423,280 @@ export async function connectToMcpServer(mcpServerName, mcpServerConfig, debugMo
243
423
  }
244
424
  }
245
425
  catch (error) {
246
- // Create a safe config object that excludes sensitive information
247
- const safeConfig = {
248
- command: mcpServerConfig.command,
249
- url: mcpServerConfig.url,
250
- httpUrl: mcpServerConfig.httpUrl,
251
- cwd: mcpServerConfig.cwd,
252
- timeout: mcpServerConfig.timeout,
253
- trust: mcpServerConfig.trust,
254
- // Exclude args, env, and headers which may contain sensitive data
255
- };
256
- let errorString = `failed to start or connect to MCP server '${mcpServerName}' ` +
257
- `${JSON.stringify(safeConfig)}; \n${error}`;
258
- if (process.env.SANDBOX) {
259
- errorString += `\nMake sure it is available in the sandbox`;
426
+ // Check if this is a 401 error that might indicate OAuth is required
427
+ const errorString = String(error);
428
+ if (errorString.includes('401') &&
429
+ (mcpServerConfig.httpUrl || mcpServerConfig.url)) {
430
+ mcpServerRequiresOAuth.set(mcpServerName, true);
431
+ // Only trigger automatic OAuth discovery for HTTP servers or when OAuth is explicitly configured
432
+ // For SSE servers, we should not trigger new OAuth flows automatically
433
+ const shouldTriggerOAuth = mcpServerConfig.httpUrl || mcpServerConfig.oauth?.enabled;
434
+ if (!shouldTriggerOAuth) {
435
+ // For SSE servers without explicit OAuth config, if a token was found but rejected, report it accurately.
436
+ const credentials = await MCPOAuthTokenStorage.getToken(mcpServerName);
437
+ if (credentials) {
438
+ const hasStoredTokens = await MCPOAuthProvider.getValidToken(mcpServerName, {
439
+ // Pass client ID if available
440
+ clientId: credentials.clientId,
441
+ });
442
+ if (hasStoredTokens) {
443
+ console.log(`Stored OAuth token for SSE server '${mcpServerName}' was rejected. ` +
444
+ `Please re-authenticate using: /mcp auth ${mcpServerName}`);
445
+ }
446
+ else {
447
+ console.log(`401 error received for SSE server '${mcpServerName}' without OAuth configuration. ` +
448
+ `Please authenticate using: /mcp auth ${mcpServerName}`);
449
+ }
450
+ }
451
+ throw new Error(`401 error received for SSE server '${mcpServerName}' without OAuth configuration. ` +
452
+ `Please authenticate using: /mcp auth ${mcpServerName}`);
453
+ }
454
+ // Try to extract www-authenticate header from the error
455
+ let wwwAuthenticate = extractWWWAuthenticateHeader(errorString);
456
+ // If we didn't get the header from the error string, try to get it from the server
457
+ if (!wwwAuthenticate && mcpServerConfig.url) {
458
+ console.log(`No www-authenticate header in error, trying to fetch it from server...`);
459
+ try {
460
+ const response = await fetch(mcpServerConfig.url, {
461
+ method: 'HEAD',
462
+ headers: {
463
+ Accept: 'text/event-stream',
464
+ },
465
+ signal: AbortSignal.timeout(5000),
466
+ });
467
+ if (response.status === 401) {
468
+ wwwAuthenticate = response.headers.get('www-authenticate');
469
+ if (wwwAuthenticate) {
470
+ console.log(`Found www-authenticate header from server: ${wwwAuthenticate}`);
471
+ }
472
+ }
473
+ }
474
+ catch (fetchError) {
475
+ console.debug(`Failed to fetch www-authenticate header: ${getErrorMessage(fetchError)}`);
476
+ }
477
+ }
478
+ if (wwwAuthenticate) {
479
+ console.log(`Received 401 with www-authenticate header: ${wwwAuthenticate}`);
480
+ // Try automatic OAuth discovery and authentication
481
+ const oauthSuccess = await handleAutomaticOAuth(mcpServerName, mcpServerConfig, wwwAuthenticate);
482
+ if (oauthSuccess) {
483
+ // Retry connection with OAuth token
484
+ console.log(`Retrying connection to '${mcpServerName}' with OAuth token...`);
485
+ // Get the valid token - we need to create a proper OAuth config
486
+ // The token should already be available from the authentication process
487
+ const credentials = await MCPOAuthTokenStorage.getToken(mcpServerName);
488
+ if (credentials) {
489
+ const accessToken = await MCPOAuthProvider.getValidToken(mcpServerName, {
490
+ // Pass client ID if available
491
+ clientId: credentials.clientId,
492
+ });
493
+ if (accessToken) {
494
+ // Create transport with OAuth token
495
+ const oauthTransport = await createTransportWithOAuth(mcpServerName, mcpServerConfig, accessToken);
496
+ if (oauthTransport) {
497
+ try {
498
+ await mcpClient.connect(oauthTransport, {
499
+ timeout: mcpServerConfig.timeout ?? MCP_DEFAULT_TIMEOUT_MSEC,
500
+ });
501
+ // Connection successful with OAuth
502
+ return mcpClient;
503
+ }
504
+ catch (retryError) {
505
+ console.error(`Failed to connect with OAuth token: ${getErrorMessage(retryError)}`);
506
+ throw retryError;
507
+ }
508
+ }
509
+ else {
510
+ console.error(`Failed to create OAuth transport for server '${mcpServerName}'`);
511
+ throw new Error(`Failed to create OAuth transport for server '${mcpServerName}'`);
512
+ }
513
+ }
514
+ else {
515
+ console.error(`Failed to get OAuth token for server '${mcpServerName}'`);
516
+ throw new Error(`Failed to get OAuth token for server '${mcpServerName}'`);
517
+ }
518
+ }
519
+ else {
520
+ console.error(`Failed to get credentials for server '${mcpServerName}' after successful OAuth authentication`);
521
+ throw new Error(`Failed to get credentials for server '${mcpServerName}' after successful OAuth authentication`);
522
+ }
523
+ }
524
+ else {
525
+ console.error(`Failed to handle automatic OAuth for server '${mcpServerName}'`);
526
+ throw new Error(`Failed to handle automatic OAuth for server '${mcpServerName}'`);
527
+ }
528
+ }
529
+ else {
530
+ // No www-authenticate header found, but we got a 401
531
+ // Only try OAuth discovery for HTTP servers or when OAuth is explicitly configured
532
+ // For SSE servers, we should not trigger new OAuth flows automatically
533
+ const shouldTryDiscovery = mcpServerConfig.httpUrl || mcpServerConfig.oauth?.enabled;
534
+ if (!shouldTryDiscovery) {
535
+ const credentials = await MCPOAuthTokenStorage.getToken(mcpServerName);
536
+ if (credentials) {
537
+ const hasStoredTokens = await MCPOAuthProvider.getValidToken(mcpServerName, {
538
+ // Pass client ID if available
539
+ clientId: credentials.clientId,
540
+ });
541
+ if (hasStoredTokens) {
542
+ console.log(`Stored OAuth token for SSE server '${mcpServerName}' was rejected. ` +
543
+ `Please re-authenticate using: /mcp auth ${mcpServerName}`);
544
+ }
545
+ else {
546
+ console.log(`401 error received for SSE server '${mcpServerName}' without OAuth configuration. ` +
547
+ `Please authenticate using: /mcp auth ${mcpServerName}`);
548
+ }
549
+ }
550
+ throw new Error(`401 error received for SSE server '${mcpServerName}' without OAuth configuration. ` +
551
+ `Please authenticate using: /mcp auth ${mcpServerName}`);
552
+ }
553
+ // For SSE servers, try to discover OAuth configuration from the base URL
554
+ console.log(`🔍 Attempting OAuth discovery for '${mcpServerName}'...`);
555
+ if (mcpServerConfig.url) {
556
+ const sseUrl = new URL(mcpServerConfig.url);
557
+ const baseUrl = `${sseUrl.protocol}//${sseUrl.host}`;
558
+ try {
559
+ // Try to discover OAuth configuration from the base URL
560
+ const oauthConfig = await OAuthUtils.discoverOAuthConfig(baseUrl);
561
+ if (oauthConfig) {
562
+ console.log(`Discovered OAuth configuration from base URL for server '${mcpServerName}'`);
563
+ // Create OAuth configuration for authentication
564
+ const oauthAuthConfig = {
565
+ enabled: true,
566
+ authorizationUrl: oauthConfig.authorizationUrl,
567
+ tokenUrl: oauthConfig.tokenUrl,
568
+ scopes: oauthConfig.scopes || [],
569
+ };
570
+ // Perform OAuth authentication
571
+ console.log(`Starting OAuth authentication for server '${mcpServerName}'...`);
572
+ await MCPOAuthProvider.authenticate(mcpServerName, oauthAuthConfig);
573
+ // Retry connection with OAuth token
574
+ const credentials = await MCPOAuthTokenStorage.getToken(mcpServerName);
575
+ if (credentials) {
576
+ const accessToken = await MCPOAuthProvider.getValidToken(mcpServerName, {
577
+ // Pass client ID if available
578
+ clientId: credentials.clientId,
579
+ });
580
+ if (accessToken) {
581
+ // Create transport with OAuth token
582
+ const oauthTransport = await createTransportWithOAuth(mcpServerName, mcpServerConfig, accessToken);
583
+ if (oauthTransport) {
584
+ try {
585
+ await mcpClient.connect(oauthTransport, {
586
+ timeout: mcpServerConfig.timeout ?? MCP_DEFAULT_TIMEOUT_MSEC,
587
+ });
588
+ // Connection successful with OAuth
589
+ return mcpClient;
590
+ }
591
+ catch (retryError) {
592
+ console.error(`Failed to connect with OAuth token: ${getErrorMessage(retryError)}`);
593
+ throw retryError;
594
+ }
595
+ }
596
+ else {
597
+ console.error(`Failed to create OAuth transport for server '${mcpServerName}'`);
598
+ throw new Error(`Failed to create OAuth transport for server '${mcpServerName}'`);
599
+ }
600
+ }
601
+ else {
602
+ console.error(`Failed to get OAuth token for server '${mcpServerName}'`);
603
+ throw new Error(`Failed to get OAuth token for server '${mcpServerName}'`);
604
+ }
605
+ }
606
+ else {
607
+ console.error(`Failed to get stored credentials for server '${mcpServerName}'`);
608
+ throw new Error(`Failed to get stored credentials for server '${mcpServerName}'`);
609
+ }
610
+ }
611
+ else {
612
+ console.error(`❌ Could not configure OAuth for '${mcpServerName}' - please authenticate manually with /mcp auth ${mcpServerName}`);
613
+ throw new Error(`OAuth configuration failed for '${mcpServerName}'. Please authenticate manually with /mcp auth ${mcpServerName}`);
614
+ }
615
+ }
616
+ catch (discoveryError) {
617
+ console.error(`❌ OAuth discovery failed for '${mcpServerName}' - please authenticate manually with /mcp auth ${mcpServerName}`);
618
+ throw discoveryError;
619
+ }
620
+ }
621
+ else {
622
+ console.error(`❌ '${mcpServerName}' requires authentication but no OAuth configuration found`);
623
+ throw new Error(`MCP server '${mcpServerName}' requires authentication. Please configure OAuth or check server settings.`);
624
+ }
625
+ }
626
+ }
627
+ else {
628
+ // Handle other connection errors
629
+ // Create a concise error message
630
+ const errorMessage = error.message || String(error);
631
+ const isNetworkError = errorMessage.includes('ENOTFOUND') ||
632
+ errorMessage.includes('ECONNREFUSED');
633
+ let conciseError;
634
+ if (isNetworkError) {
635
+ conciseError = `Cannot connect to '${mcpServerName}' - server may be down or URL incorrect`;
636
+ }
637
+ else {
638
+ conciseError = `Connection failed for '${mcpServerName}': ${errorMessage}`;
639
+ }
640
+ if (process.env.SANDBOX) {
641
+ conciseError += ` (check sandbox availability)`;
642
+ }
643
+ throw new Error(conciseError);
260
644
  }
261
- throw new Error(errorString);
262
645
  }
263
646
  }
264
647
  /** Visible for Testing */
265
- export function createTransport(mcpServerName, mcpServerConfig, debugMode) {
648
+ export async function createTransport(mcpServerName, mcpServerConfig, debugMode) {
649
+ if (mcpServerConfig.authProviderType === AuthProviderType.GOOGLE_CREDENTIALS) {
650
+ const provider = new GoogleCredentialProvider(mcpServerConfig);
651
+ const transportOptions = {
652
+ authProvider: provider,
653
+ };
654
+ if (mcpServerConfig.httpUrl) {
655
+ return new StreamableHTTPClientTransport(new URL(mcpServerConfig.httpUrl), transportOptions);
656
+ }
657
+ else if (mcpServerConfig.url) {
658
+ return new SSEClientTransport(new URL(mcpServerConfig.url), transportOptions);
659
+ }
660
+ throw new Error('No URL configured for Google Credentials MCP server');
661
+ }
662
+ // Check if we have OAuth configuration or stored tokens
663
+ let accessToken = null;
664
+ let hasOAuthConfig = mcpServerConfig.oauth?.enabled;
665
+ if (hasOAuthConfig && mcpServerConfig.oauth) {
666
+ accessToken = await MCPOAuthProvider.getValidToken(mcpServerName, mcpServerConfig.oauth);
667
+ if (!accessToken) {
668
+ console.error(`MCP server '${mcpServerName}' requires OAuth authentication. ` +
669
+ `Please authenticate using the /mcp auth command.`);
670
+ throw new Error(`MCP server '${mcpServerName}' requires OAuth authentication. ` +
671
+ `Please authenticate using the /mcp auth command.`);
672
+ }
673
+ }
674
+ else {
675
+ // Check if we have stored OAuth tokens for this server (from previous authentication)
676
+ const credentials = await MCPOAuthTokenStorage.getToken(mcpServerName);
677
+ if (credentials) {
678
+ accessToken = await MCPOAuthProvider.getValidToken(mcpServerName, {
679
+ // Pass client ID if available
680
+ clientId: credentials.clientId,
681
+ });
682
+ if (accessToken) {
683
+ hasOAuthConfig = true;
684
+ console.log(`Found stored OAuth token for server '${mcpServerName}'`);
685
+ }
686
+ }
687
+ }
266
688
  if (mcpServerConfig.httpUrl) {
267
689
  const transportOptions = {};
268
- if (mcpServerConfig.headers) {
690
+ // Set up headers with OAuth token if available
691
+ if (hasOAuthConfig && accessToken) {
692
+ transportOptions.requestInit = {
693
+ headers: {
694
+ ...mcpServerConfig.headers,
695
+ Authorization: `Bearer ${accessToken}`,
696
+ },
697
+ };
698
+ }
699
+ else if (mcpServerConfig.headers) {
269
700
  transportOptions.requestInit = {
270
701
  headers: mcpServerConfig.headers,
271
702
  };
@@ -274,7 +705,16 @@ export function createTransport(mcpServerName, mcpServerConfig, debugMode) {
274
705
  }
275
706
  if (mcpServerConfig.url) {
276
707
  const transportOptions = {};
277
- if (mcpServerConfig.headers) {
708
+ // Set up headers with OAuth token if available
709
+ if (hasOAuthConfig && accessToken) {
710
+ transportOptions.requestInit = {
711
+ headers: {
712
+ ...mcpServerConfig.headers,
713
+ Authorization: `Bearer ${accessToken}`,
714
+ },
715
+ };
716
+ }
717
+ else if (mcpServerConfig.headers) {
278
718
  transportOptions.requestInit = {
279
719
  headers: mcpServerConfig.headers,
280
720
  };