@mcp-ts/sdk 1.3.1 → 1.3.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (63) hide show
  1. package/README.md +371 -290
  2. package/dist/adapters/agui-adapter.d.mts +3 -3
  3. package/dist/adapters/agui-adapter.d.ts +3 -3
  4. package/dist/adapters/agui-middleware.d.mts +3 -3
  5. package/dist/adapters/agui-middleware.d.ts +3 -3
  6. package/dist/adapters/ai-adapter.d.mts +3 -3
  7. package/dist/adapters/ai-adapter.d.ts +3 -3
  8. package/dist/adapters/langchain-adapter.d.mts +3 -3
  9. package/dist/adapters/langchain-adapter.d.ts +3 -3
  10. package/dist/adapters/mastra-adapter.d.mts +3 -3
  11. package/dist/adapters/mastra-adapter.d.ts +3 -3
  12. package/dist/client/index.d.mts +10 -66
  13. package/dist/client/index.d.ts +10 -66
  14. package/dist/client/index.js +91 -173
  15. package/dist/client/index.js.map +1 -1
  16. package/dist/client/index.mjs +91 -173
  17. package/dist/client/index.mjs.map +1 -1
  18. package/dist/client/react.d.mts +15 -5
  19. package/dist/client/react.d.ts +15 -5
  20. package/dist/client/react.js +130 -182
  21. package/dist/client/react.js.map +1 -1
  22. package/dist/client/react.mjs +130 -182
  23. package/dist/client/react.mjs.map +1 -1
  24. package/dist/client/vue.d.mts +27 -7
  25. package/dist/client/vue.d.ts +27 -7
  26. package/dist/client/vue.js +131 -182
  27. package/dist/client/vue.js.map +1 -1
  28. package/dist/client/vue.mjs +131 -182
  29. package/dist/client/vue.mjs.map +1 -1
  30. package/dist/{events-BgeztGYZ.d.mts → events-CK3N--3g.d.mts} +2 -0
  31. package/dist/{events-BgeztGYZ.d.ts → events-CK3N--3g.d.ts} +2 -0
  32. package/dist/index.d.mts +3 -3
  33. package/dist/index.d.ts +3 -3
  34. package/dist/index.js +224 -258
  35. package/dist/index.js.map +1 -1
  36. package/dist/index.mjs +224 -258
  37. package/dist/index.mjs.map +1 -1
  38. package/dist/{multi-session-client-CxogNckF.d.mts → multi-session-client-DzjmT7FX.d.mts} +4 -10
  39. package/dist/{multi-session-client-cox_WXUj.d.ts → multi-session-client-FAFpUzZ4.d.ts} +4 -10
  40. package/dist/server/index.d.mts +18 -23
  41. package/dist/server/index.d.ts +18 -23
  42. package/dist/server/index.js +133 -85
  43. package/dist/server/index.js.map +1 -1
  44. package/dist/server/index.mjs +133 -85
  45. package/dist/server/index.mjs.map +1 -1
  46. package/dist/shared/index.d.mts +3 -3
  47. package/dist/shared/index.d.ts +3 -3
  48. package/dist/shared/index.js.map +1 -1
  49. package/dist/shared/index.mjs.map +1 -1
  50. package/dist/{types-CLccx9wW.d.mts → types-CW6lghof.d.mts} +6 -0
  51. package/dist/{types-CLccx9wW.d.ts → types-CW6lghof.d.ts} +6 -0
  52. package/package.json +1 -1
  53. package/src/client/core/sse-client.ts +354 -493
  54. package/src/client/react/index.ts +16 -16
  55. package/src/client/react/use-mcp-apps.tsx +214 -214
  56. package/src/client/react/use-mcp.ts +84 -19
  57. package/src/client/vue/use-mcp.ts +119 -44
  58. package/src/server/handlers/nextjs-handler.ts +207 -217
  59. package/src/server/handlers/sse-handler.ts +14 -0
  60. package/src/server/mcp/oauth-client.ts +48 -46
  61. package/src/server/storage/types.ts +12 -5
  62. package/src/shared/events.ts +2 -0
  63. package/src/shared/types.ts +6 -0
@@ -1,217 +1,207 @@
1
- /**
2
- * Next.js App Router Handler for MCP SSE
3
- * Provides a clean, zero-boilerplate API for Next.js applications
4
- */
5
-
6
- import { SSEConnectionManager, type ClientMetadata } from './sse-handler.js';
7
- import type { McpConnectionEvent, McpObservabilityEvent } from '../../shared/events.js';
8
- import type { McpRpcResponse } from '../../shared/types.js';
9
-
10
- export interface NextMcpHandlerOptions {
11
- /**
12
- * Extract identity from request (default: from 'identity' query param)
13
- */
14
- getIdentity?: (request: Request) => string | null;
15
-
16
- /**
17
- * Extract auth token from request (default: from 'token' query param or Authorization header)
18
- */
19
- getAuthToken?: (request: Request) => string | null;
20
-
21
- /**
22
- * Authenticate user and verify access (optional)
23
- * Return true if user is authenticated, false otherwise
24
- */
25
- authenticate?: (identity: string, token: string | null) => Promise<boolean> | boolean;
26
-
27
- /**
28
- * Heartbeat interval in milliseconds (default: 30000)
29
- */
30
- heartbeatInterval?: number;
31
-
32
- /**
33
- * Static OAuth client metadata defaults (for all connections)
34
- * Use this for single-tenant applications with fixed branding
35
- */
36
- clientDefaults?: ClientMetadata;
37
-
38
- /**
39
- * Dynamic OAuth client metadata getter (per-request, useful for multi-tenant)
40
- * Use this when you need different branding based on request (tenant, domain, etc.)
41
- * Takes precedence over clientDefaults
42
- */
43
- getClientMetadata?: (request: Request) => ClientMetadata | Promise<ClientMetadata>;
44
- }
45
-
46
- // Global manager store - shared across requests for the same user
47
- const managers = new Map<string, SSEConnectionManager>();
48
-
49
- /**
50
- * Creates Next.js App Router handlers (GET and POST) for MCP SSE endpoint
51
- *
52
- * @example
53
- * ```typescript
54
- * // app/api/mcp/route.ts
55
- * import { createNextMcpHandler } from '@mcp-ts/core/server';
56
- *
57
- * export const { GET, POST } = createNextMcpHandler();
58
- * ```
59
- */
60
- export function createNextMcpHandler(options: NextMcpHandlerOptions = {}) {
61
- const {
62
- getIdentity = (request: Request) => new URL(request.url).searchParams.get('identity'),
63
- getAuthToken = (request: Request) => {
64
- const url = new URL(request.url);
65
- return url.searchParams.get('token') || request.headers.get('authorization');
66
- },
67
- authenticate = () => true,
68
- heartbeatInterval = 30000,
69
- clientDefaults,
70
- getClientMetadata,
71
- } = options;
72
-
73
- /**
74
- * GET handler - Establishes SSE connection
75
- */
76
- async function GET(request: Request): Promise<Response> {
77
- const identity = getIdentity(request);
78
- const authToken = getAuthToken(request);
79
-
80
- if (!identity) {
81
- return new Response('Missing identity', { status: 400 });
82
- }
83
-
84
- // Validate auth
85
- const isAuthorized = await authenticate(identity, authToken);
86
- if (!isAuthorized) {
87
- return new Response('Unauthorized', { status: 401 });
88
- }
89
-
90
- // Create TransformStream for SSE
91
- const stream = new TransformStream();
92
- const writer = stream.writable.getWriter();
93
- const encoder = new TextEncoder();
94
-
95
- // Helper to send SSE events
96
- const sendSSE = (event: string, data: any) => {
97
- const message = `event: ${event}\ndata: ${JSON.stringify(data)}\n\n`;
98
- writer.write(encoder.encode(message)).catch(() => {
99
- // Client disconnected, ignore write errors
100
- });
101
- };
102
-
103
- // Clean up previous manager if exists (prevents memory leaks on reconnect)
104
- const previousManager = managers.get(identity);
105
- if (previousManager) {
106
- previousManager.dispose();
107
- }
108
-
109
- // Resolve client metadata (dynamic takes precedence over static)
110
- const resolvedClientMetadata = getClientMetadata
111
- ? await getClientMetadata(request)
112
- : clientDefaults;
113
-
114
- // Create new manager
115
- const manager = new SSEConnectionManager(
116
- {
117
- identity,
118
- heartbeatInterval,
119
- clientDefaults: resolvedClientMetadata, // Pass resolved metadata
120
- },
121
- (event: McpConnectionEvent | McpObservabilityEvent | McpRpcResponse) => {
122
- // Determine event type and send via SSE
123
- if ('id' in event) {
124
- // RPC response
125
- sendSSE('rpc-response', event);
126
- } else if ('type' in event && 'sessionId' in event) {
127
- // Connection event
128
- sendSSE('connection', event);
129
- } else {
130
- // Observability event
131
- sendSSE('observability', event);
132
- }
133
- }
134
- );
135
-
136
- managers.set(identity, manager);
137
-
138
- // Send connected event AFTER manager is registered (prevents race condition
139
- // where client sends POST before manager is available)
140
- sendSSE('connected', { timestamp: Date.now() });
141
-
142
- // Handle client disconnect
143
- const abortController = new AbortController();
144
- request.signal?.addEventListener('abort', () => {
145
- manager.dispose();
146
- managers.delete(identity);
147
- writer.close().catch(() => { });
148
- abortController.abort();
149
- });
150
-
151
- // Return SSE response
152
- return new Response(stream.readable, {
153
- status: 200,
154
- headers: {
155
- 'Content-Type': 'text/event-stream',
156
- 'Cache-Control': 'no-cache, no-transform',
157
- 'Connection': 'keep-alive',
158
- 'X-Accel-Buffering': 'no',
159
- },
160
- });
161
- }
162
-
163
- /**
164
- * POST handler - Handles RPC requests
165
- */
166
- async function POST(request: Request): Promise<Response> {
167
- const identity = getIdentity(request);
168
- const authToken = getAuthToken(request);
169
-
170
- if (!identity) {
171
- return Response.json({ error: { code: 'MISSING_IDENTITY', message: 'Missing identity' } }, { status: 400 });
172
- }
173
-
174
- // Validate auth
175
- const isAuthorized = await authenticate(identity, authToken);
176
- if (!isAuthorized) {
177
- return Response.json({ error: { code: 'UNAUTHORIZED', message: 'Unauthorized' } }, { status: 401 });
178
- }
179
-
180
- try {
181
- const body = await request.json();
182
-
183
- // Get existing manager (created by GET endpoint)
184
- const manager = managers.get(identity);
185
-
186
- if (!manager) {
187
- return Response.json(
188
- {
189
- error: {
190
- code: 'NO_CONNECTION',
191
- message: 'No SSE connection found. Please establish SSE connection first.',
192
- },
193
- },
194
- { status: 400 }
195
- );
196
- }
197
-
198
- // Handle the request and return response directly (bypasses SSE latency)
199
- const response = await manager.handleRequest(body);
200
-
201
- // Return the actual RPC response for immediate use by client
202
- return Response.json(response);
203
- } catch (error) {
204
- return Response.json(
205
- {
206
- error: {
207
- code: 'EXECUTION_ERROR',
208
- message: error instanceof Error ? error.message : 'Unknown error',
209
- },
210
- },
211
- { status: 500 }
212
- );
213
- }
214
- }
215
-
216
- return { GET, POST };
217
- }
1
+ /**
2
+ * Next.js App Router Handler for MCP
3
+ * Stateless transport for serverless environments:
4
+ * - POST + `Accept: text/event-stream` streams progress + rpc-response
5
+ * - POST + JSON accepts direct RPC result response
6
+ */
7
+
8
+ import { SSEConnectionManager, type ClientMetadata } from './sse-handler.js';
9
+ import type { McpConnectionEvent, McpObservabilityEvent } from '../../shared/events.js';
10
+ import type { McpRpcResponse } from '../../shared/types.js';
11
+
12
+ function isRpcResponseEvent(event: McpConnectionEvent | McpObservabilityEvent | McpRpcResponse): event is McpRpcResponse {
13
+ return 'id' in event && ('result' in event || 'error' in event);
14
+ }
15
+
16
+ export interface NextMcpHandlerOptions {
17
+ /**
18
+ * Extract identity from request (default: from 'identity' query param)
19
+ */
20
+ getIdentity?: (request: Request) => string | null;
21
+
22
+ /**
23
+ * Extract auth token from request (default: from 'token' query param or Authorization header)
24
+ */
25
+ getAuthToken?: (request: Request) => string | null;
26
+
27
+ /**
28
+ * Authenticate user and verify access (optional)
29
+ * Return true if user is authenticated, false otherwise
30
+ */
31
+ authenticate?: (identity: string, token: string | null) => Promise<boolean> | boolean;
32
+
33
+ /**
34
+ * Heartbeat interval in milliseconds (default: 30000)
35
+ */
36
+ heartbeatInterval?: number;
37
+
38
+ /**
39
+ * Static OAuth client metadata defaults (for all connections)
40
+ */
41
+ clientDefaults?: ClientMetadata;
42
+
43
+ /**
44
+ * Dynamic OAuth client metadata getter (per-request)
45
+ */
46
+ getClientMetadata?: (request: Request) => ClientMetadata | Promise<ClientMetadata>;
47
+ }
48
+
49
+ export function createNextMcpHandler(options: NextMcpHandlerOptions = {}) {
50
+ const {
51
+ getIdentity = (request: Request) => new URL(request.url).searchParams.get('identity'),
52
+ getAuthToken = (request: Request) => {
53
+ const url = new URL(request.url);
54
+ return url.searchParams.get('token') || request.headers.get('authorization');
55
+ },
56
+ authenticate = () => true,
57
+ heartbeatInterval = 30000,
58
+ clientDefaults,
59
+ getClientMetadata,
60
+ } = options;
61
+
62
+ const toManagerOptions = (identity: string, resolvedClientMetadata?: ClientMetadata) => ({
63
+ identity,
64
+ heartbeatInterval,
65
+ clientDefaults: resolvedClientMetadata,
66
+ });
67
+
68
+ async function resolveClientMetadata(request: Request): Promise<ClientMetadata | undefined> {
69
+ return getClientMetadata ? await getClientMetadata(request) : clientDefaults;
70
+ }
71
+
72
+ async function GET(): Promise<Response> {
73
+ return Response.json(
74
+ {
75
+ error: {
76
+ code: 'METHOD_NOT_ALLOWED',
77
+ message: 'Use POST /api/mcp. For streaming use Accept: text/event-stream.',
78
+ },
79
+ },
80
+ { status: 405 }
81
+ );
82
+ }
83
+
84
+ async function POST(request: Request): Promise<Response> {
85
+ const identity = getIdentity(request);
86
+ const authToken = getAuthToken(request);
87
+ const acceptsEventStream = (request.headers.get('accept') || '').toLowerCase().includes('text/event-stream');
88
+
89
+ if (!identity) {
90
+ return Response.json({ error: { code: 'MISSING_IDENTITY', message: 'Missing identity' } }, { status: 400 });
91
+ }
92
+
93
+ const isAuthorized = await authenticate(identity, authToken);
94
+ if (!isAuthorized) {
95
+ return Response.json({ error: { code: 'UNAUTHORIZED', message: 'Unauthorized' } }, { status: 401 });
96
+ }
97
+
98
+ let rawBody = '';
99
+ try {
100
+ rawBody = await request.text();
101
+ const body = rawBody ? JSON.parse(rawBody) : null;
102
+
103
+ if (!body || typeof body !== 'object') {
104
+ return Response.json(
105
+ {
106
+ error: {
107
+ code: 'INVALID_REQUEST',
108
+ message: 'Invalid JSON-RPC request body',
109
+ },
110
+ },
111
+ { status: 400 }
112
+ );
113
+ }
114
+
115
+ const resolvedClientMetadata = await resolveClientMetadata(request);
116
+
117
+ if (!acceptsEventStream) {
118
+ const manager = new SSEConnectionManager(
119
+ toManagerOptions(identity, resolvedClientMetadata),
120
+ () => { }
121
+ );
122
+ try {
123
+ const response = await manager.handleRequest(body as any);
124
+ return Response.json(response);
125
+ } finally {
126
+ manager.dispose();
127
+ }
128
+ }
129
+
130
+ const stream = new TransformStream();
131
+ const writer = stream.writable.getWriter();
132
+ const encoder = new TextEncoder();
133
+ let streamWritable = true;
134
+
135
+ const sendSSE = (event: string, data: unknown) => {
136
+ if (!streamWritable) return;
137
+ const message = `event: ${event}\ndata: ${JSON.stringify(data)}\n\n`;
138
+ writer.write(encoder.encode(message)).catch(() => {
139
+ streamWritable = false;
140
+ });
141
+ };
142
+
143
+ const manager = new SSEConnectionManager(
144
+ toManagerOptions(identity, resolvedClientMetadata),
145
+ (event: McpConnectionEvent | McpObservabilityEvent | McpRpcResponse) => {
146
+ if (isRpcResponseEvent(event)) {
147
+ sendSSE('rpc-response', event);
148
+ } else if ('type' in event && 'sessionId' in event) {
149
+ sendSSE('connection', event);
150
+ } else {
151
+ sendSSE('observability', event);
152
+ }
153
+ }
154
+ );
155
+
156
+ sendSSE('connected', { timestamp: Date.now() });
157
+
158
+ void (async () => {
159
+ try {
160
+ await manager.handleRequest(body as any);
161
+ } catch (error) {
162
+ const err = error instanceof Error ? error : new Error('Unknown error');
163
+ sendSSE('rpc-response', {
164
+ id: (body as any).id || 'unknown',
165
+ error: {
166
+ code: 'EXECUTION_ERROR',
167
+ message: err.message,
168
+ },
169
+ } satisfies McpRpcResponse);
170
+ } finally {
171
+ streamWritable = false;
172
+ manager.dispose();
173
+ writer.close().catch(() => { });
174
+ }
175
+ })();
176
+
177
+ return new Response(stream.readable, {
178
+ status: 200,
179
+ headers: {
180
+ 'Content-Type': 'text/event-stream',
181
+ 'Cache-Control': 'no-cache, no-transform',
182
+ 'Connection': 'keep-alive',
183
+ 'X-Accel-Buffering': 'no',
184
+ },
185
+ });
186
+ } catch (error) {
187
+ const err = error instanceof Error ? error : new Error('Unknown error');
188
+ console.error('[MCP Next Handler] Failed to handle RPC', {
189
+ identity,
190
+ message: err.message,
191
+ stack: err.stack,
192
+ rawBody: rawBody.slice(0, 500),
193
+ });
194
+ return Response.json(
195
+ {
196
+ error: {
197
+ code: 'EXECUTION_ERROR',
198
+ message: err.message,
199
+ },
200
+ },
201
+ { status: 500 }
202
+ );
203
+ }
204
+ }
205
+
206
+ return { GET, POST };
207
+ }
@@ -225,6 +225,8 @@ export class SSEConnectionManager {
225
225
  serverName: s.serverName,
226
226
  serverUrl: s.serverUrl,
227
227
  transport: s.transportType,
228
+ createdAt: s.createdAt,
229
+ active: s.active !== false,
228
230
  })),
229
231
  };
230
232
  }
@@ -248,6 +250,15 @@ export class SSEConnectionManager {
248
250
  );
249
251
 
250
252
  if (duplicate) {
253
+ // If the existing session is still pending OAuth, treat connect as "resume auth"
254
+ // instead of failing with duplicate connection error.
255
+ if (duplicate.active === false) {
256
+ await this.restoreSession({ sessionId: duplicate.sessionId });
257
+ return {
258
+ sessionId: duplicate.sessionId,
259
+ success: true,
260
+ };
261
+ }
251
262
  throw new Error(`Connection already exists for server: ${duplicate.serverUrl || duplicate.serverId} (${duplicate.serverName})`);
252
263
  }
253
264
 
@@ -260,6 +271,7 @@ export class SSEConnectionManager {
260
271
  sessionId,
261
272
  serverId,
262
273
  serverName,
274
+ serverUrl,
263
275
  state: 'CONNECTING',
264
276
  previousState: 'DISCONNECTED',
265
277
  timestamp: Date.now(),
@@ -433,6 +445,7 @@ export class SSEConnectionManager {
433
445
  sessionId,
434
446
  serverId: session.serverId ?? 'unknown',
435
447
  serverName: session.serverName ?? 'Unknown',
448
+ serverUrl: session.serverUrl,
436
449
  state: 'VALIDATING',
437
450
  previousState: 'DISCONNECTED',
438
451
  timestamp: Date.now(),
@@ -495,6 +508,7 @@ export class SSEConnectionManager {
495
508
  sessionId,
496
509
  serverId: session.serverId ?? 'unknown',
497
510
  serverName: session.serverName ?? 'Unknown',
511
+ serverUrl: session.serverUrl,
498
512
  state: 'AUTHENTICATING',
499
513
  previousState: 'DISCONNECTED',
500
514
  timestamp: Date.now(),