@mcp-ts/sdk 1.3.7 → 1.3.10

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (66) hide show
  1. package/LICENSE +21 -21
  2. package/README.md +397 -404
  3. package/dist/adapters/agui-middleware.js.map +1 -1
  4. package/dist/adapters/agui-middleware.mjs.map +1 -1
  5. package/dist/bin/mcp-ts.js +0 -0
  6. package/dist/bin/mcp-ts.js.map +1 -1
  7. package/dist/bin/mcp-ts.mjs +0 -0
  8. package/dist/bin/mcp-ts.mjs.map +1 -1
  9. package/dist/client/index.js.map +1 -1
  10. package/dist/client/index.mjs.map +1 -1
  11. package/dist/client/react.d.mts +10 -28
  12. package/dist/client/react.d.ts +10 -28
  13. package/dist/client/react.js +101 -52
  14. package/dist/client/react.js.map +1 -1
  15. package/dist/client/react.mjs +102 -53
  16. package/dist/client/react.mjs.map +1 -1
  17. package/dist/client/vue.js.map +1 -1
  18. package/dist/client/vue.mjs.map +1 -1
  19. package/dist/index.js +78 -6
  20. package/dist/index.js.map +1 -1
  21. package/dist/index.mjs +73 -6
  22. package/dist/index.mjs.map +1 -1
  23. package/dist/server/index.js +78 -6
  24. package/dist/server/index.js.map +1 -1
  25. package/dist/server/index.mjs +73 -6
  26. package/dist/server/index.mjs.map +1 -1
  27. package/dist/shared/index.js.map +1 -1
  28. package/dist/shared/index.mjs.map +1 -1
  29. package/package.json +185 -185
  30. package/src/adapters/agui-middleware.ts +382 -382
  31. package/src/bin/mcp-ts.ts +102 -102
  32. package/src/client/core/app-host.ts +417 -417
  33. package/src/client/core/sse-client.ts +371 -371
  34. package/src/client/core/types.ts +31 -31
  35. package/src/client/index.ts +27 -27
  36. package/src/client/react/index.ts +20 -16
  37. package/src/client/react/use-app-host.ts +74 -73
  38. package/src/client/react/use-mcp-apps.tsx +224 -214
  39. package/src/client/react/use-mcp.ts +669 -641
  40. package/src/client/vue/index.ts +10 -10
  41. package/src/client/vue/use-mcp.ts +617 -617
  42. package/src/index.ts +11 -11
  43. package/src/server/handlers/nextjs-handler.ts +204 -204
  44. package/src/server/handlers/sse-handler.ts +631 -631
  45. package/src/server/index.ts +57 -57
  46. package/src/server/mcp/multi-session-client.ts +228 -228
  47. package/src/server/mcp/oauth-client.ts +1188 -1188
  48. package/src/server/mcp/storage-oauth-provider.ts +272 -272
  49. package/src/server/storage/crypto.ts +92 -0
  50. package/src/server/storage/file-backend.ts +157 -157
  51. package/src/server/storage/index.ts +176 -176
  52. package/src/server/storage/memory-backend.ts +123 -123
  53. package/src/server/storage/redis-backend.ts +276 -276
  54. package/src/server/storage/redis.ts +160 -160
  55. package/src/server/storage/sqlite-backend.ts +182 -182
  56. package/src/server/storage/supabase-backend.ts +229 -228
  57. package/src/server/storage/types.ts +116 -116
  58. package/src/shared/constants.ts +29 -29
  59. package/src/shared/errors.ts +133 -133
  60. package/src/shared/event-routing.ts +28 -28
  61. package/src/shared/events.ts +180 -180
  62. package/src/shared/index.ts +75 -75
  63. package/src/shared/tool-utils.ts +61 -61
  64. package/src/shared/types.ts +282 -282
  65. package/src/shared/utils.ts +38 -38
  66. package/supabase/migrations/20260330195700_install_mcp_sessions.sql +84 -84
@@ -1,228 +1,229 @@
1
- import type { SupabaseClient } from '@supabase/supabase-js';
2
- import { StorageBackend, SessionData } from './types.js';
3
- import { SESSION_TTL_SECONDS } from '../../shared/constants.js';
4
- import { generateSessionId } from '../../shared/utils.js';
5
-
6
- export class SupabaseStorageBackend implements StorageBackend {
7
- private readonly DEFAULT_TTL = SESSION_TTL_SECONDS;
8
-
9
- constructor(private supabase: SupabaseClient) {}
10
-
11
- async init(): Promise<void> {
12
- // Validate that the table exists
13
- const { error } = await this.supabase
14
- .from('mcp_sessions')
15
- .select('session_id')
16
- .limit(0);
17
-
18
- if (error) {
19
- // Postgres error code 42P01 is "relation does not exist"
20
- if (error.code === '42P01') {
21
- throw new Error(
22
- '[SupabaseStorage] Table "mcp_sessions" not found in your database. ' +
23
- 'Please run "npx mcp-ts supabase-init" in your project to set up the required table and RLS policies.'
24
- );
25
- }
26
- throw new Error(`[SupabaseStorage] Initialization check failed: ${error.message}`);
27
- }
28
-
29
- console.log('[mcp-ts][Storage] Supabase: ✓ "mcp_sessions" table verified.');
30
- }
31
-
32
- generateSessionId(): string {
33
- return generateSessionId();
34
- }
35
-
36
- private mapRowToSessionData(row: any): SessionData {
37
- return {
38
- sessionId: row.session_id,
39
- serverId: row.server_id,
40
- serverName: row.server_name,
41
- serverUrl: row.server_url,
42
- transportType: row.transport_type,
43
- callbackUrl: row.callback_url,
44
- createdAt: new Date(row.created_at).getTime(),
45
- identity: row.identity,
46
- headers: row.headers,
47
- active: row.active,
48
- clientInformation: row.client_information,
49
- tokens: row.tokens,
50
- codeVerifier: row.code_verifier,
51
- clientId: row.client_id,
52
- };
53
- }
54
-
55
- async createSession(session: SessionData, ttl?: number): Promise<void> {
56
- const { sessionId, identity } = session;
57
- if (!sessionId || !identity) throw new Error('identity and sessionId required');
58
-
59
- const effectiveTtl = ttl ?? this.DEFAULT_TTL;
60
- const expiresAt = new Date(Date.now() + effectiveTtl * 1000).toISOString();
61
-
62
- const { error } = await this.supabase
63
- .from('mcp_sessions')
64
- .insert({
65
- session_id: sessionId,
66
- user_id: identity, // Maps user_id to identity to support RLS using auth.uid()
67
- server_id: session.serverId,
68
- server_name: session.serverName,
69
- server_url: session.serverUrl,
70
- transport_type: session.transportType,
71
- callback_url: session.callbackUrl,
72
- created_at: new Date(session.createdAt || Date.now()).toISOString(),
73
- identity: identity,
74
- headers: session.headers,
75
- active: session.active ?? false,
76
- client_information: session.clientInformation,
77
- tokens: session.tokens,
78
- code_verifier: session.codeVerifier,
79
- client_id: session.clientId,
80
- expires_at: expiresAt
81
- });
82
-
83
- if (error) {
84
- // Postgres error code 23505 is unique violation
85
- if (error.code === '23505') {
86
- throw new Error(`Session ${sessionId} already exists`);
87
- }
88
- throw new Error(`Failed to create session in Supabase: ${error.message}`);
89
- }
90
- }
91
-
92
- async updateSession(identity: string, sessionId: string, data: Partial<SessionData>, ttl?: number): Promise<void> {
93
- const effectiveTtl = ttl ?? this.DEFAULT_TTL;
94
- const expiresAt = new Date(Date.now() + effectiveTtl * 1000).toISOString();
95
-
96
- // Convert the camelCase keys to snake_case for Supabase
97
- const updateData: any = {
98
- expires_at: expiresAt,
99
- updated_at: new Date().toISOString()
100
- };
101
-
102
- if ('serverId' in data) updateData.server_id = data.serverId;
103
- if ('serverName' in data) updateData.server_name = data.serverName;
104
- if ('serverUrl' in data) updateData.server_url = data.serverUrl;
105
- if ('transportType' in data) updateData.transport_type = data.transportType;
106
- if ('callbackUrl' in data) updateData.callback_url = data.callbackUrl;
107
- if ('active' in data) updateData.active = data.active;
108
- if ('headers' in data) updateData.headers = data.headers;
109
- if ('clientInformation' in data) updateData.client_information = data.clientInformation;
110
- if ('tokens' in data) updateData.tokens = data.tokens;
111
- if ('codeVerifier' in data) updateData.code_verifier = data.codeVerifier;
112
- if ('clientId' in data) updateData.client_id = data.clientId;
113
-
114
- const { data: updatedRows, error } = await this.supabase
115
- .from('mcp_sessions')
116
- .update(updateData)
117
- .eq('identity', identity)
118
- .eq('session_id', sessionId)
119
- .select('id');
120
-
121
- if (error) {
122
- throw new Error(`Failed to update session: ${error.message}`);
123
- }
124
-
125
- if (!updatedRows || updatedRows.length === 0) {
126
- throw new Error(`Session ${sessionId} not found for identity ${identity}`);
127
- }
128
- }
129
-
130
- async getSession(identity: string, sessionId: string): Promise<SessionData | null> {
131
- const { data, error } = await this.supabase
132
- .from('mcp_sessions')
133
- .select('*')
134
- .eq('identity', identity)
135
- .eq('session_id', sessionId)
136
- .maybeSingle();
137
-
138
- if (error) {
139
- console.error('[SupabaseStorage] Failed to get session:', error);
140
- return null;
141
- }
142
-
143
- if (!data) return null;
144
-
145
- return this.mapRowToSessionData(data);
146
- }
147
-
148
- async getIdentitySessionsData(identity: string): Promise<SessionData[]> {
149
- const { data, error } = await this.supabase
150
- .from('mcp_sessions')
151
- .select('*')
152
- .eq('identity', identity);
153
-
154
- if (error) {
155
- console.error(`[SupabaseStorage] Failed to get session data for ${identity}:`, error);
156
- return [];
157
- }
158
-
159
- return data.map(row => this.mapRowToSessionData(row));
160
- }
161
-
162
- async removeSession(identity: string, sessionId: string): Promise<void> {
163
- const { error } = await this.supabase
164
- .from('mcp_sessions')
165
- .delete()
166
- .eq('identity', identity)
167
- .eq('session_id', sessionId);
168
-
169
- if (error) {
170
- console.error('[SupabaseStorage] Failed to remove session:', error);
171
- }
172
- }
173
-
174
- async getIdentityMcpSessions(identity: string): Promise<string[]> {
175
- const { data, error } = await this.supabase
176
- .from('mcp_sessions')
177
- .select('session_id')
178
- .eq('identity', identity);
179
-
180
- if (error) {
181
- console.error(`[SupabaseStorage] Failed to get sessions for ${identity}:`, error);
182
- return [];
183
- }
184
-
185
- return data.map(row => row.session_id);
186
- }
187
-
188
- async getAllSessionIds(): Promise<string[]> {
189
- const { data, error } = await this.supabase
190
- .from('mcp_sessions')
191
- .select('session_id');
192
-
193
- if (error) {
194
- console.error('[SupabaseStorage] Failed to get all sessions:', error);
195
- return [];
196
- }
197
-
198
- return data.map(row => row.session_id);
199
- }
200
-
201
- async clearAll(): Promise<void> {
202
- // Warning: This deletes everything. Typically only used in testing.
203
- const { error } = await this.supabase
204
- .from('mcp_sessions')
205
- .delete()
206
- .neq('session_id', ''); // Delete all rows trick
207
-
208
- if (error) {
209
- console.error('[SupabaseStorage] Failed to clear sessions:', error);
210
- }
211
- }
212
-
213
- async cleanupExpiredSessions(): Promise<void> {
214
- const { error } = await this.supabase
215
- .from('mcp_sessions')
216
- .delete()
217
- .lt('expires_at', new Date().toISOString());
218
-
219
- if (error) {
220
- console.error('[SupabaseStorage] Failed to cleanup expired sessions:', error);
221
- }
222
- }
223
-
224
- async disconnect(): Promise<void> {
225
- // Supabase client handles its own connection pooling over HTTP,
226
- // there is no explicit disconnect method.
227
- }
228
- }
1
+ import type { SupabaseClient } from '@supabase/supabase-js';
2
+ import { StorageBackend, SessionData } from './types.js';
3
+ import { SESSION_TTL_SECONDS } from '../../shared/constants.js';
4
+ import { generateSessionId } from '../../shared/utils.js';
5
+ import { encryptObject, decryptObject } from './crypto.js';
6
+
7
+ export class SupabaseStorageBackend implements StorageBackend {
8
+ private readonly DEFAULT_TTL = SESSION_TTL_SECONDS;
9
+
10
+ constructor(private supabase: SupabaseClient) {}
11
+
12
+ async init(): Promise<void> {
13
+ // Validate that the table exists
14
+ const { error } = await this.supabase
15
+ .from('mcp_sessions')
16
+ .select('session_id')
17
+ .limit(0);
18
+
19
+ if (error) {
20
+ // Postgres error code 42P01 is "relation does not exist"
21
+ if (error.code === '42P01') {
22
+ throw new Error(
23
+ '[SupabaseStorage] Table "mcp_sessions" not found in your database. ' +
24
+ 'Please run "npx mcp-ts supabase-init" in your project to set up the required table and RLS policies.'
25
+ );
26
+ }
27
+ throw new Error(`[SupabaseStorage] Initialization check failed: ${error.message}`);
28
+ }
29
+
30
+ console.log('[mcp-ts][Storage] Supabase: ✓ "mcp_sessions" table verified.');
31
+ }
32
+
33
+ generateSessionId(): string {
34
+ return generateSessionId();
35
+ }
36
+
37
+ private mapRowToSessionData(row: any): SessionData {
38
+ return {
39
+ sessionId: row.session_id,
40
+ serverId: row.server_id,
41
+ serverName: row.server_name,
42
+ serverUrl: row.server_url,
43
+ transportType: row.transport_type,
44
+ callbackUrl: row.callback_url,
45
+ createdAt: new Date(row.created_at).getTime(),
46
+ identity: row.identity,
47
+ headers: decryptObject(row.headers),
48
+ active: row.active,
49
+ clientInformation: row.client_information,
50
+ tokens: decryptObject(row.tokens),
51
+ codeVerifier: row.code_verifier,
52
+ clientId: row.client_id,
53
+ };
54
+ }
55
+
56
+ async createSession(session: SessionData, ttl?: number): Promise<void> {
57
+ const { sessionId, identity } = session;
58
+ if (!sessionId || !identity) throw new Error('identity and sessionId required');
59
+
60
+ const effectiveTtl = ttl ?? this.DEFAULT_TTL;
61
+ const expiresAt = new Date(Date.now() + effectiveTtl * 1000).toISOString();
62
+
63
+ const { error } = await this.supabase
64
+ .from('mcp_sessions')
65
+ .insert({
66
+ session_id: sessionId,
67
+ user_id: identity, // Maps user_id to identity to support RLS using auth.uid()
68
+ server_id: session.serverId,
69
+ server_name: session.serverName,
70
+ server_url: session.serverUrl,
71
+ transport_type: session.transportType,
72
+ callback_url: session.callbackUrl,
73
+ created_at: new Date(session.createdAt || Date.now()).toISOString(),
74
+ identity: identity,
75
+ headers: encryptObject(session.headers),
76
+ active: session.active ?? false,
77
+ client_information: session.clientInformation,
78
+ tokens: encryptObject(session.tokens),
79
+ code_verifier: session.codeVerifier,
80
+ client_id: session.clientId,
81
+ expires_at: expiresAt
82
+ });
83
+
84
+ if (error) {
85
+ // Postgres error code 23505 is unique violation
86
+ if (error.code === '23505') {
87
+ throw new Error(`Session ${sessionId} already exists`);
88
+ }
89
+ throw new Error(`Failed to create session in Supabase: ${error.message}`);
90
+ }
91
+ }
92
+
93
+ async updateSession(identity: string, sessionId: string, data: Partial<SessionData>, ttl?: number): Promise<void> {
94
+ const effectiveTtl = ttl ?? this.DEFAULT_TTL;
95
+ const expiresAt = new Date(Date.now() + effectiveTtl * 1000).toISOString();
96
+
97
+ // Convert the camelCase keys to snake_case for Supabase
98
+ const updateData: any = {
99
+ expires_at: expiresAt,
100
+ updated_at: new Date().toISOString()
101
+ };
102
+
103
+ if ('serverId' in data) updateData.server_id = data.serverId;
104
+ if ('serverName' in data) updateData.server_name = data.serverName;
105
+ if ('serverUrl' in data) updateData.server_url = data.serverUrl;
106
+ if ('transportType' in data) updateData.transport_type = data.transportType;
107
+ if ('callbackUrl' in data) updateData.callback_url = data.callbackUrl;
108
+ if ('active' in data) updateData.active = data.active;
109
+ if ('headers' in data) updateData.headers = encryptObject(data.headers);
110
+ if ('clientInformation' in data) updateData.client_information = data.clientInformation;
111
+ if ('tokens' in data) updateData.tokens = encryptObject(data.tokens);
112
+ if ('codeVerifier' in data) updateData.code_verifier = data.codeVerifier;
113
+ if ('clientId' in data) updateData.client_id = data.clientId;
114
+
115
+ const { data: updatedRows, error } = await this.supabase
116
+ .from('mcp_sessions')
117
+ .update(updateData)
118
+ .eq('identity', identity)
119
+ .eq('session_id', sessionId)
120
+ .select('id');
121
+
122
+ if (error) {
123
+ throw new Error(`Failed to update session: ${error.message}`);
124
+ }
125
+
126
+ if (!updatedRows || updatedRows.length === 0) {
127
+ throw new Error(`Session ${sessionId} not found for identity ${identity}`);
128
+ }
129
+ }
130
+
131
+ async getSession(identity: string, sessionId: string): Promise<SessionData | null> {
132
+ const { data, error } = await this.supabase
133
+ .from('mcp_sessions')
134
+ .select('*')
135
+ .eq('identity', identity)
136
+ .eq('session_id', sessionId)
137
+ .maybeSingle();
138
+
139
+ if (error) {
140
+ console.error('[SupabaseStorage] Failed to get session:', error);
141
+ return null;
142
+ }
143
+
144
+ if (!data) return null;
145
+
146
+ return this.mapRowToSessionData(data);
147
+ }
148
+
149
+ async getIdentitySessionsData(identity: string): Promise<SessionData[]> {
150
+ const { data, error } = await this.supabase
151
+ .from('mcp_sessions')
152
+ .select('*')
153
+ .eq('identity', identity);
154
+
155
+ if (error) {
156
+ console.error(`[SupabaseStorage] Failed to get session data for ${identity}:`, error);
157
+ return [];
158
+ }
159
+
160
+ return data.map(row => this.mapRowToSessionData(row));
161
+ }
162
+
163
+ async removeSession(identity: string, sessionId: string): Promise<void> {
164
+ const { error } = await this.supabase
165
+ .from('mcp_sessions')
166
+ .delete()
167
+ .eq('identity', identity)
168
+ .eq('session_id', sessionId);
169
+
170
+ if (error) {
171
+ console.error('[SupabaseStorage] Failed to remove session:', error);
172
+ }
173
+ }
174
+
175
+ async getIdentityMcpSessions(identity: string): Promise<string[]> {
176
+ const { data, error } = await this.supabase
177
+ .from('mcp_sessions')
178
+ .select('session_id')
179
+ .eq('identity', identity);
180
+
181
+ if (error) {
182
+ console.error(`[SupabaseStorage] Failed to get sessions for ${identity}:`, error);
183
+ return [];
184
+ }
185
+
186
+ return data.map(row => row.session_id);
187
+ }
188
+
189
+ async getAllSessionIds(): Promise<string[]> {
190
+ const { data, error } = await this.supabase
191
+ .from('mcp_sessions')
192
+ .select('session_id');
193
+
194
+ if (error) {
195
+ console.error('[SupabaseStorage] Failed to get all sessions:', error);
196
+ return [];
197
+ }
198
+
199
+ return data.map(row => row.session_id);
200
+ }
201
+
202
+ async clearAll(): Promise<void> {
203
+ // Warning: This deletes everything. Typically only used in testing.
204
+ const { error } = await this.supabase
205
+ .from('mcp_sessions')
206
+ .delete()
207
+ .neq('session_id', ''); // Delete all rows trick
208
+
209
+ if (error) {
210
+ console.error('[SupabaseStorage] Failed to clear sessions:', error);
211
+ }
212
+ }
213
+
214
+ async cleanupExpiredSessions(): Promise<void> {
215
+ const { error } = await this.supabase
216
+ .from('mcp_sessions')
217
+ .delete()
218
+ .lt('expires_at', new Date().toISOString());
219
+
220
+ if (error) {
221
+ console.error('[SupabaseStorage] Failed to cleanup expired sessions:', error);
222
+ }
223
+ }
224
+
225
+ async disconnect(): Promise<void> {
226
+ // Supabase client handles its own connection pooling over HTTP,
227
+ // there is no explicit disconnect method.
228
+ }
229
+ }