@kya-os/mcp-i-cloudflare 1.6.17 → 1.6.18-canary.clientinfo.20251126121218

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,215 @@
1
+ /**
2
+ * OAuth Identity Utilities
3
+ *
4
+ * Handles OAuth identity extraction and validation from HTTP requests.
5
+ * This module consolidates OAuth-related logic that was previously in the adapter.
6
+ */
7
+ /**
8
+ * Extract OAuth identity from request cookies
9
+ *
10
+ * @param request - HTTP Request object
11
+ * @returns OAuthIdentity or null if not found/invalid
12
+ */
13
+ export function extractOAuthIdentityFromRequest(request) {
14
+ try {
15
+ const cookieHeader = request.headers.get("Cookie");
16
+ if (!cookieHeader)
17
+ return null;
18
+ const cookies = cookieHeader.split("; ").map((c) => c.trim());
19
+ const oauthCookie = cookies.find((c) => c.startsWith("oauth_identity="));
20
+ if (!oauthCookie)
21
+ return null;
22
+ // Extract cookie value properly handling cases where value contains '='
23
+ // Find the first '=' which separates key from value, then take everything after it
24
+ const equalsIndex = oauthCookie.indexOf("=");
25
+ if (equalsIndex === -1)
26
+ return null;
27
+ const cookieValue = oauthCookie.substring(equalsIndex + 1);
28
+ const parsed = JSON.parse(decodeURIComponent(cookieValue));
29
+ // ✅ SECURITY: Validate OAuth identity format and content
30
+ const validationResult = validateOAuthIdentity(parsed);
31
+ if (!validationResult.valid) {
32
+ console.warn("[OAuth] ⚠️ OAuth identity validation failed:", validationResult.reason, { parsed });
33
+ return null;
34
+ }
35
+ return parsed;
36
+ }
37
+ catch (error) {
38
+ console.warn("[OAuth] Failed to extract OAuth identity from cookies:", error);
39
+ }
40
+ return null;
41
+ }
42
+ /**
43
+ * Validate OAuth identity format and content
44
+ *
45
+ * Ensures:
46
+ * - Provider is non-empty string (1-50 chars)
47
+ * - Subject is non-empty string (1-255 chars)
48
+ * - Provider matches expected format (alphanumeric, hyphens, underscores)
49
+ * - Subject matches expected format (non-empty, reasonable length)
50
+ *
51
+ * @param identity - Parsed OAuth identity object
52
+ * @returns Validation result
53
+ */
54
+ export function validateOAuthIdentity(identity) {
55
+ // Check if identity is an object
56
+ if (!identity || typeof identity !== "object") {
57
+ return { valid: false, reason: "OAuth identity must be an object" };
58
+ }
59
+ const oauth = identity;
60
+ // Validate provider
61
+ if (!oauth.provider || typeof oauth.provider !== "string") {
62
+ return {
63
+ valid: false,
64
+ reason: "OAuth provider is required and must be a string",
65
+ };
66
+ }
67
+ const provider = oauth.provider.trim();
68
+ if (provider.length === 0) {
69
+ return { valid: false, reason: "OAuth provider cannot be empty" };
70
+ }
71
+ if (provider.length > 50) {
72
+ return {
73
+ valid: false,
74
+ reason: "OAuth provider must be 50 characters or less",
75
+ };
76
+ }
77
+ // Provider format: alphanumeric, hyphens, underscores, dots (e.g., "google", "microsoft", "github", "custom-provider")
78
+ const providerPattern = /^[a-zA-Z0-9._-]+$/;
79
+ if (!providerPattern.test(provider)) {
80
+ return {
81
+ valid: false,
82
+ reason: `OAuth provider must match pattern [a-zA-Z0-9._-]: "${provider}"`,
83
+ };
84
+ }
85
+ // Validate subject
86
+ if (!oauth.subject || typeof oauth.subject !== "string") {
87
+ return {
88
+ valid: false,
89
+ reason: "OAuth subject is required and must be a string",
90
+ };
91
+ }
92
+ const subject = oauth.subject.trim();
93
+ if (subject.length === 0) {
94
+ return { valid: false, reason: "OAuth subject cannot be empty" };
95
+ }
96
+ if (subject.length > 255) {
97
+ return {
98
+ valid: false,
99
+ reason: "OAuth subject must be 255 characters or less",
100
+ };
101
+ }
102
+ // Subject format: non-empty, reasonable characters (allows most Unicode, but prevents control chars)
103
+ // OAuth subjects can be numeric IDs, email-like strings, or other identifiers
104
+ const subjectPattern = /^[\S]+$/; // At least one non-whitespace character
105
+ if (!subjectPattern.test(subject)) {
106
+ return {
107
+ valid: false,
108
+ reason: `OAuth subject contains invalid characters: "${subject.substring(0, 20)}..."`,
109
+ };
110
+ }
111
+ // Validate optional email if present
112
+ if (oauth.email !== undefined) {
113
+ if (typeof oauth.email !== "string") {
114
+ return {
115
+ valid: false,
116
+ reason: "OAuth email must be a string if provided",
117
+ };
118
+ }
119
+ const email = oauth.email.trim();
120
+ if (email.length > 0) {
121
+ // Basic email format validation
122
+ const emailPattern = /^[^\s@]+@[^\s@]+\.[^\s@]+$/;
123
+ if (!emailPattern.test(email)) {
124
+ return {
125
+ valid: false,
126
+ reason: `OAuth email format invalid: "${email}"`,
127
+ };
128
+ }
129
+ if (email.length > 255) {
130
+ return {
131
+ valid: false,
132
+ reason: "OAuth email must be 255 characters or less",
133
+ };
134
+ }
135
+ }
136
+ }
137
+ // Validate optional name if present
138
+ if (oauth.name !== undefined) {
139
+ if (typeof oauth.name !== "string") {
140
+ return {
141
+ valid: false,
142
+ reason: "OAuth name must be a string if provided",
143
+ };
144
+ }
145
+ if (oauth.name.length > 255) {
146
+ return {
147
+ valid: false,
148
+ reason: "OAuth name must be 255 characters or less",
149
+ };
150
+ }
151
+ }
152
+ return { valid: true };
153
+ }
154
+ /**
155
+ * Lookup User DID from OAuth identity mapping
156
+ *
157
+ * @param oauthIdentity OAuth identity to lookup
158
+ * @param delegationStorage KV namespace for storage
159
+ * @returns User DID or null if not found
160
+ */
161
+ export async function lookupUserDidFromOAuth(oauthIdentity, delegationStorage) {
162
+ if (!delegationStorage || !oauthIdentity?.provider || !oauthIdentity?.subject) {
163
+ return null;
164
+ }
165
+ try {
166
+ const { STORAGE_KEYS } = await import("../constants/storage-keys");
167
+ const oauthKey = STORAGE_KEYS.oauthIdentity(oauthIdentity.provider, oauthIdentity.subject);
168
+ const userDid = await delegationStorage.get(oauthKey, "text");
169
+ if (userDid) {
170
+ console.log("[OAuth] ✅ Retrieved persistent userDid from OAuth mapping:", {
171
+ provider: oauthIdentity.provider,
172
+ userDid: userDid.slice(0, 20) + "...",
173
+ });
174
+ }
175
+ return userDid;
176
+ }
177
+ catch (error) {
178
+ console.warn("[OAuth] Failed to lookup userDid from OAuth mapping:", error);
179
+ return null;
180
+ }
181
+ }
182
+ /**
183
+ * Create a redacted OAuth identity for storage (PII protection)
184
+ *
185
+ * @param oauthIdentity Original OAuth identity
186
+ * @returns Redacted identity safe for storage
187
+ */
188
+ export function redactOAuthIdentityForStorage(oauthIdentity) {
189
+ if (!oauthIdentity) {
190
+ return undefined;
191
+ }
192
+ return {
193
+ provider: oauthIdentity.provider,
194
+ subjectHash: oauthIdentity.subject.substring(0, 8), // Redact full subject
195
+ // Don't store email, name, or full subject for PII protection
196
+ };
197
+ }
198
+ /**
199
+ * Test if an OAuth cookie value is valid
200
+ * Helper function for testing and debugging
201
+ *
202
+ * @param cookieValue Encoded cookie value
203
+ * @returns true if valid OAuth identity, false otherwise
204
+ */
205
+ export function isValidOAuthCookie(cookieValue) {
206
+ try {
207
+ const parsed = JSON.parse(decodeURIComponent(cookieValue));
208
+ const result = validateOAuthIdentity(parsed);
209
+ return result.valid;
210
+ }
211
+ catch {
212
+ return false;
213
+ }
214
+ }
215
+ //# sourceMappingURL=oauth-identity.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"oauth-identity.js","sourceRoot":"","sources":["../../src/utils/oauth-identity.ts"],"names":[],"mappings":"AAAA;;;;;GAKG;AAYH;;;;;GAKG;AACH,MAAM,UAAU,+BAA+B,CAAC,OAAgB;IAC9D,IAAI,CAAC;QACH,MAAM,YAAY,GAAG,OAAO,CAAC,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;QACnD,IAAI,CAAC,YAAY;YAAE,OAAO,IAAI,CAAC;QAE/B,MAAM,OAAO,GAAG,YAAY,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,IAAI,EAAE,CAAC,CAAC;QAC9D,MAAM,WAAW,GAAG,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,UAAU,CAAC,iBAAiB,CAAC,CAAC,CAAC;QACzE,IAAI,CAAC,WAAW;YAAE,OAAO,IAAI,CAAC;QAE9B,wEAAwE;QACxE,mFAAmF;QACnF,MAAM,WAAW,GAAG,WAAW,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC;QAC7C,IAAI,WAAW,KAAK,CAAC,CAAC;YAAE,OAAO,IAAI,CAAC;QACpC,MAAM,WAAW,GAAG,WAAW,CAAC,SAAS,CAAC,WAAW,GAAG,CAAC,CAAC,CAAC;QAC3D,MAAM,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,kBAAkB,CAAC,WAAW,CAAC,CAAC,CAAC;QAE3D,yDAAyD;QACzD,MAAM,gBAAgB,GAAG,qBAAqB,CAAC,MAAM,CAAC,CAAC;QACvD,IAAI,CAAC,gBAAgB,CAAC,KAAK,EAAE,CAAC;YAC5B,OAAO,CAAC,IAAI,CACV,8CAA8C,EAC9C,gBAAgB,CAAC,MAAM,EACvB,EAAE,MAAM,EAAE,CACX,CAAC;YACF,OAAO,IAAI,CAAC;QACd,CAAC;QAED,OAAO,MAAuB,CAAC;IACjC,CAAC;IAAC,OAAO,KAAK,EAAE,CAAC;QACf,OAAO,CAAC,IAAI,CACV,wDAAwD,EACxD,KAAK,CACN,CAAC;IACJ,CAAC;IAED,OAAO,IAAI,CAAC;AACd,CAAC;AAED;;;;;;;;;;;GAWG;AACH,MAAM,UAAU,qBAAqB,CAAC,QAAiB;IACrD,iCAAiC;IACjC,IAAI,CAAC,QAAQ,IAAI,OAAO,QAAQ,KAAK,QAAQ,EAAE,CAAC;QAC9C,OAAO,EAAE,KAAK,EAAE,KAAK,EAAE,MAAM,EAAE,kCAAkC,EAAE,CAAC;IACtE,CAAC;IAED,MAAM,KAAK,GAAG,QAAmC,CAAC;IAElD,oBAAoB;IACpB,IAAI,CAAC,KAAK,CAAC,QAAQ,IAAI,OAAO,KAAK,CAAC,QAAQ,KAAK,QAAQ,EAAE,CAAC;QAC1D,OAAO;YACL,KAAK,EAAE,KAAK;YACZ,MAAM,EAAE,iDAAiD;SAC1D,CAAC;IACJ,CAAC;IAED,MAAM,QAAQ,GAAG,KAAK,CAAC,QAAQ,CAAC,IAAI,EAAE,CAAC;IACvC,IAAI,QAAQ,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;QAC1B,OAAO,EAAE,KAAK,EAAE,KAAK,EAAE,MAAM,EAAE,gCAAgC,EAAE,CAAC;IACpE,CAAC;IAED,IAAI,QAAQ,CAAC,MAAM,GAAG,EAAE,EAAE,CAAC;QACzB,OAAO;YACL,KAAK,EAAE,KAAK;YACZ,MAAM,EAAE,8CAA8C;SACvD,CAAC;IACJ,CAAC;IAED,uHAAuH;IACvH,MAAM,eAAe,GAAG,mBAAmB,CAAC;IAC5C,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,QAAQ,CAAC,EAAE,CAAC;QACpC,OAAO;YACL,KAAK,EAAE,KAAK;YACZ,MAAM,EAAE,sDAAsD,QAAQ,GAAG;SAC1E,CAAC;IACJ,CAAC;IAED,mBAAmB;IACnB,IAAI,CAAC,KAAK,CAAC,OAAO,IAAI,OAAO,KAAK,CAAC,OAAO,KAAK,QAAQ,EAAE,CAAC;QACxD,OAAO;YACL,KAAK,EAAE,KAAK;YACZ,MAAM,EAAE,gDAAgD;SACzD,CAAC;IACJ,CAAC;IAED,MAAM,OAAO,GAAG,KAAK,CAAC,OAAO,CAAC,IAAI,EAAE,CAAC;IACrC,IAAI,OAAO,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;QACzB,OAAO,EAAE,KAAK,EAAE,KAAK,EAAE,MAAM,EAAE,+BAA+B,EAAE,CAAC;IACnE,CAAC;IAED,IAAI,OAAO,CAAC,MAAM,GAAG,GAAG,EAAE,CAAC;QACzB,OAAO;YACL,KAAK,EAAE,KAAK;YACZ,MAAM,EAAE,8CAA8C;SACvD,CAAC;IACJ,CAAC;IAED,qGAAqG;IACrG,8EAA8E;IAC9E,MAAM,cAAc,GAAG,SAAS,CAAC,CAAC,wCAAwC;IAC1E,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,OAAO,CAAC,EAAE,CAAC;QAClC,OAAO;YACL,KAAK,EAAE,KAAK;YACZ,MAAM,EAAE,+CAA+C,OAAO,CAAC,SAAS,CAAC,CAAC,EAAE,EAAE,CAAC,MAAM;SACtF,CAAC;IACJ,CAAC;IAED,qCAAqC;IACrC,IAAI,KAAK,CAAC,KAAK,KAAK,SAAS,EAAE,CAAC;QAC9B,IAAI,OAAO,KAAK,CAAC,KAAK,KAAK,QAAQ,EAAE,CAAC;YACpC,OAAO;gBACL,KAAK,EAAE,KAAK;gBACZ,MAAM,EAAE,0CAA0C;aACnD,CAAC;QACJ,CAAC;QAED,MAAM,KAAK,GAAG,KAAK,CAAC,KAAK,CAAC,IAAI,EAAE,CAAC;QACjC,IAAI,KAAK,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACrB,gCAAgC;YAChC,MAAM,YAAY,GAAG,4BAA4B,CAAC;YAClD,IAAI,CAAC,YAAY,CAAC,IAAI,CAAC,KAAK,CAAC,EAAE,CAAC;gBAC9B,OAAO;oBACL,KAAK,EAAE,KAAK;oBACZ,MAAM,EAAE,gCAAgC,KAAK,GAAG;iBACjD,CAAC;YACJ,CAAC;YAED,IAAI,KAAK,CAAC,MAAM,GAAG,GAAG,EAAE,CAAC;gBACvB,OAAO;oBACL,KAAK,EAAE,KAAK;oBACZ,MAAM,EAAE,4CAA4C;iBACrD,CAAC;YACJ,CAAC;QACH,CAAC;IACH,CAAC;IAED,oCAAoC;IACpC,IAAI,KAAK,CAAC,IAAI,KAAK,SAAS,EAAE,CAAC;QAC7B,IAAI,OAAO,KAAK,CAAC,IAAI,KAAK,QAAQ,EAAE,CAAC;YACnC,OAAO;gBACL,KAAK,EAAE,KAAK;gBACZ,MAAM,EAAE,yCAAyC;aAClD,CAAC;QACJ,CAAC;QAED,IAAI,KAAK,CAAC,IAAI,CAAC,MAAM,GAAG,GAAG,EAAE,CAAC;YAC5B,OAAO;gBACL,KAAK,EAAE,KAAK;gBACZ,MAAM,EAAE,2CAA2C;aACpD,CAAC;QACJ,CAAC;IACH,CAAC;IAED,OAAO,EAAE,KAAK,EAAE,IAAI,EAAE,CAAC;AACzB,CAAC;AAED;;;;;;GAMG;AACH,MAAM,CAAC,KAAK,UAAU,sBAAsB,CAC1C,aAA4B,EAC5B,iBAAsB;IAEtB,IAAI,CAAC,iBAAiB,IAAI,CAAC,aAAa,EAAE,QAAQ,IAAI,CAAC,aAAa,EAAE,OAAO,EAAE,CAAC;QAC9E,OAAO,IAAI,CAAC;IACd,CAAC;IAED,IAAI,CAAC;QACH,MAAM,EAAE,YAAY,EAAE,GAAG,MAAM,MAAM,CAAC,2BAA2B,CAAC,CAAC;QACnE,MAAM,QAAQ,GAAG,YAAY,CAAC,aAAa,CACzC,aAAa,CAAC,QAAQ,EACtB,aAAa,CAAC,OAAO,CACtB,CAAC;QACF,MAAM,OAAO,GAAG,MAAM,iBAAiB,CAAC,GAAG,CAAC,QAAQ,EAAE,MAAM,CAAC,CAAC;QAE9D,IAAI,OAAO,EAAE,CAAC;YACZ,OAAO,CAAC,GAAG,CACT,4DAA4D,EAC5D;gBACE,QAAQ,EAAE,aAAa,CAAC,QAAQ;gBAChC,OAAO,EAAE,OAAO,CAAC,KAAK,CAAC,CAAC,EAAE,EAAE,CAAC,GAAG,KAAK;aACtC,CACF,CAAC;QACJ,CAAC;QAED,OAAO,OAAO,CAAC;IACjB,CAAC;IAAC,OAAO,KAAK,EAAE,CAAC;QACf,OAAO,CAAC,IAAI,CACV,sDAAsD,EACtD,KAAK,CACN,CAAC;QACF,OAAO,IAAI,CAAC;IACd,CAAC;AACH,CAAC;AAED;;;;;GAKG;AACH,MAAM,UAAU,6BAA6B,CAAC,aAAmC;IAC/E,IAAI,CAAC,aAAa,EAAE,CAAC;QACnB,OAAO,SAAS,CAAC;IACnB,CAAC;IAED,OAAO;QACL,QAAQ,EAAE,aAAa,CAAC,QAAQ;QAChC,WAAW,EAAE,aAAa,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,sBAAsB;QAC1E,8DAA8D;KAC/D,CAAC;AACJ,CAAC;AAED;;;;;;GAMG;AACH,MAAM,UAAU,kBAAkB,CAAC,WAAmB;IACpD,IAAI,CAAC;QACH,MAAM,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,kBAAkB,CAAC,WAAW,CAAC,CAAC,CAAC;QAC3D,MAAM,MAAM,GAAG,qBAAqB,CAAC,MAAM,CAAC,CAAC;QAC7C,OAAO,MAAM,CAAC,KAAK,CAAC;IACtB,CAAC;IAAC,MAAM,CAAC;QACP,OAAO,KAAK,CAAC;IACf,CAAC;AACH,CAAC"}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@kya-os/mcp-i-cloudflare",
3
- "version": "1.6.17",
3
+ "version": "1.6.18-canary.clientinfo.20251126121218",
4
4
  "description": "Cloudflare Workers adapter for MCP-I framework",
5
5
  "main": "dist/index.js",
6
6
  "types": "dist/index.d.ts",
@@ -18,7 +18,7 @@
18
18
  },
19
19
  "dependencies": {
20
20
  "@kya-os/contracts": "^1.6.1",
21
- "@kya-os/mcp-i-core": "^1.3.6",
21
+ "@kya-os/mcp-i-core": "^1.3.7",
22
22
  "@modelcontextprotocol/sdk": "^1.19.1",
23
23
  "agents": "^0.2.21",
24
24
  "base-x": "^5.0.0",