@mcp-z/mcp-drive 1.0.0 → 1.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +32 -3
- package/bin/server.js +1 -1
- package/dist/cjs/constants.js.map +1 -1
- package/dist/cjs/index.js +13 -13
- package/dist/cjs/index.js.map +1 -1
- package/dist/cjs/lib/create-store.js.map +1 -1
- package/dist/cjs/lib/query-builder.js.map +1 -1
- package/dist/cjs/mcp/index.js +6 -6
- package/dist/cjs/mcp/index.js.map +1 -1
- package/dist/cjs/mcp/prompts/index.js +4 -4
- package/dist/cjs/mcp/prompts/index.js.map +1 -1
- package/dist/cjs/mcp/prompts/organize-files.js.map +1 -1
- package/dist/cjs/mcp/prompts/query-syntax.js.map +1 -1
- package/dist/cjs/mcp/resources/file.js.map +1 -1
- package/dist/cjs/mcp/resources/index.js +2 -2
- package/dist/cjs/mcp/resources/index.js.map +1 -1
- package/dist/cjs/mcp/tools/file-move-to-trash.js.map +1 -1
- package/dist/cjs/mcp/tools/file-move.js.map +1 -1
- package/dist/cjs/mcp/tools/files-search.js +10 -10
- package/dist/cjs/mcp/tools/files-search.js.map +1 -1
- package/dist/cjs/mcp/tools/folder-contents.js +7 -7
- package/dist/cjs/mcp/tools/folder-contents.js.map +1 -1
- package/dist/cjs/mcp/tools/folder-create.js.map +1 -1
- package/dist/cjs/mcp/tools/folder-path.js.map +1 -1
- package/dist/cjs/mcp/tools/folder-search.js +10 -10
- package/dist/cjs/mcp/tools/folder-search.js.map +1 -1
- package/dist/cjs/mcp/tools/index.js +14 -14
- package/dist/cjs/mcp/tools/index.js.map +1 -1
- package/dist/cjs/schemas/drive-query-schema.js.map +1 -1
- package/dist/cjs/schemas/drive-validation.js.map +1 -1
- package/dist/cjs/schemas/index.js.map +1 -1
- package/dist/cjs/setup/config.js +11 -1
- package/dist/cjs/setup/config.js.map +1 -1
- package/dist/cjs/setup/http.js +6 -2
- package/dist/cjs/setup/http.js.map +1 -1
- package/dist/cjs/setup/index.js +9 -9
- package/dist/cjs/setup/index.js.map +1 -1
- package/dist/cjs/setup/oauth-google.d.cts +3 -2
- package/dist/cjs/setup/oauth-google.d.ts +3 -2
- package/dist/cjs/setup/oauth-google.js +15 -12
- package/dist/cjs/setup/oauth-google.js.map +1 -1
- package/dist/cjs/setup/runtime.js +9 -9
- package/dist/cjs/setup/runtime.js.map +1 -1
- package/dist/cjs/setup/stdio.js +2 -2
- package/dist/cjs/setup/stdio.js.map +1 -1
- package/dist/esm/constants.js.map +1 -1
- package/dist/esm/index.js.map +1 -1
- package/dist/esm/lib/create-store.js.map +1 -1
- package/dist/esm/lib/query-builder.js.map +1 -1
- package/dist/esm/mcp/index.js.map +1 -1
- package/dist/esm/mcp/prompts/index.js.map +1 -1
- package/dist/esm/mcp/prompts/organize-files.js.map +1 -1
- package/dist/esm/mcp/prompts/query-syntax.js.map +1 -1
- package/dist/esm/mcp/resources/file.js.map +1 -1
- package/dist/esm/mcp/resources/index.js.map +1 -1
- package/dist/esm/mcp/tools/file-move-to-trash.js.map +1 -1
- package/dist/esm/mcp/tools/file-move.js.map +1 -1
- package/dist/esm/mcp/tools/files-search.js.map +1 -1
- package/dist/esm/mcp/tools/folder-contents.js.map +1 -1
- package/dist/esm/mcp/tools/folder-create.js.map +1 -1
- package/dist/esm/mcp/tools/folder-path.js.map +1 -1
- package/dist/esm/mcp/tools/folder-search.js.map +1 -1
- package/dist/esm/mcp/tools/index.js.map +1 -1
- package/dist/esm/schemas/drive-query-schema.js.map +1 -1
- package/dist/esm/schemas/drive-validation.js.map +1 -1
- package/dist/esm/schemas/index.js.map +1 -1
- package/dist/esm/setup/config.js +12 -2
- package/dist/esm/setup/config.js.map +1 -1
- package/dist/esm/setup/http.js +4 -0
- package/dist/esm/setup/http.js.map +1 -1
- package/dist/esm/setup/index.js.map +1 -1
- package/dist/esm/setup/oauth-google.d.ts +3 -2
- package/dist/esm/setup/oauth-google.js +8 -11
- package/dist/esm/setup/oauth-google.js.map +1 -1
- package/dist/esm/setup/runtime.js.map +1 -1
- package/dist/esm/setup/stdio.js.map +1 -1
- package/dist/esm/types.js.map +1 -1
- package/package.json +1 -1
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["/Users/kevin/Dev/Projects/
|
|
1
|
+
{"version":3,"sources":["/Users/kevin/Dev/Projects/mcp-z/mcp-drive/src/mcp/tools/index.ts"],"sourcesContent":["export { default as fileMove } from './file-move.ts';\nexport { default as fileMoveToTrash } from './file-move-to-trash.ts';\nexport { default as filesSearch } from './files-search.ts';\nexport { default as folderContents } from './folder-contents.ts';\nexport { default as folderCreate } from './folder-create.ts';\nexport { default as folderPath } from './folder-path.ts';\nexport { default as folderSearch } from './folder-search.ts';\n"],"names":["fileMove","fileMoveToTrash","filesSearch","folderContents","folderCreate","folderPath","folderSearch"],"mappings":";;;;;;;;;;;QAAoBA;eAAAA,mBAAQ;;QACRC;eAAAA,0BAAe;;QACfC;eAAAA,sBAAW;;QACXC;eAAAA,yBAAc;;QACdC;eAAAA,uBAAY;;QACZC;eAAAA,qBAAU;;QACVC;eAAAA,uBAAY;;;iEANI;wEACO;oEACJ;uEACG;qEACF;mEACF;qEACE"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["/Users/kevin/Dev/Projects/
|
|
1
|
+
{"version":3,"sources":["/Users/kevin/Dev/Projects/mcp-z/mcp-drive/src/schemas/drive-query-schema.ts"],"sourcesContent":["import { z } from 'zod';\n\n/**\n * Field operator schema for Drive query fields that support multiple values\n * Supports OR ($any), AND ($all), and NOT ($none) operations\n */\nconst FieldOperatorSchema = z\n .object({\n $any: z.array(z.string()).optional().describe('OR within field - matches if ANY value matches'),\n $all: z.array(z.string()).optional().describe('AND within field - matches if ALL values match'),\n $none: z.array(z.string()).optional().describe('NOT within field - matches if NONE match'),\n })\n .strict();\n\nexport type FieldOperator = z.infer<typeof FieldOperatorSchema>;\n\n/**\n * Drive query object schema with recursive operators and Drive features.\n *\n * Includes Drive-specific features:\n * - name: Search by file/folder name (supports string or field operators)\n * - mimeType: Filter by MIME type (e.g., \"application/pdf\", \"application/vnd.google-apps.folder\")\n * - fullText: Search file content and metadata\n * - parentId: Search within specific folder (supports string or field operators)\n * - starred: Filter by starred status\n * - shared: Filter by shared status\n * - modifiedTime: Date range filtering with $gte and $lt\n * - owner: Filter by owner email (supports string or field operators)\n * - rawDriveQuery: Escape hatch for advanced Drive query syntax\n *\n * Logical operators:\n * - $and: Array of conditions that must ALL match (recursive)\n * - $or: Array of conditions where ANY must match (recursive)\n * - $not: Nested condition that must NOT match (recursive)\n *\n * Note: Cast through unknown to work around Zod's lazy schema type inference issue\n * with exactOptionalPropertyTypes. The runtime schema is correct; this cast ensures\n * TypeScript sees the strict DriveQueryObject type everywhere the schema is used.\n */\nconst DriveQueryObjectSchema = z.lazy(() =>\n z\n .object({\n // Logical operators for combining conditions (recursive)\n $and: z.array(DriveQueryObjectSchema).optional().describe('Array of conditions that must ALL match'),\n $or: z.array(DriveQueryObjectSchema).optional().describe('Array of conditions where ANY must match'),\n $not: DriveQueryObjectSchema.optional().describe('Nested condition that must NOT match'),\n\n // File/folder name search\n name: z\n .union([z.string().min(1), FieldOperatorSchema])\n .optional()\n .describe('Search by file or folder name (partial match, case-insensitive)'),\n\n // MIME type filtering\n mimeType: z\n .union([z.string().min(1), FieldOperatorSchema])\n .optional()\n .describe('Filter by MIME type (e.g., \"application/pdf\", \"application/vnd.google-apps.folder\", \"image/jpeg\")'),\n\n // Full-text search across content and metadata\n fullText: z\n .union([z.string().min(1), FieldOperatorSchema])\n .optional()\n .describe('Search file content and metadata (full-text search)'),\n\n // Parent folder filtering\n parentId: z\n .union([z.string().min(1), FieldOperatorSchema])\n .optional()\n .describe('Search within specific folder by folder ID (use \"root\" for My Drive root)'),\n\n // Boolean flags\n starred: z.boolean().optional().describe('Filter by starred status (true = starred, false = not starred)'),\n sharedWithMe: z.boolean().optional().describe('Filter by \"shared with me\" collection (true = in shared collection, false = not shared)'),\n trashed: z.boolean().optional().describe('Filter by trash status (true = in trash, false = not in trash). Note: Drive tools automatically filter out trashed files unless explicitly requested.'),\n\n // Date range filtering\n modifiedTime: z\n .object({\n $gte: z\n .string()\n .regex(/^\\d{4}-\\d{2}-\\d{2}(T\\d{2}:\\d{2}:\\d{2}(\\.\\d{3})?Z)?$/)\n .optional()\n .describe('Files modified on or after this date (ISO 8601: YYYY-MM-DD or YYYY-MM-DDTHH:mm:ss.sssZ)'),\n $lt: z\n .string()\n .regex(/^\\d{4}-\\d{2}-\\d{2}(T\\d{2}:\\d{2}:\\d{2}(\\.\\d{3})?Z)?$/)\n .optional()\n .describe('Files modified before this date (ISO 8601: YYYY-MM-DD or YYYY-MM-DDTHH:mm:ss.sssZ)'),\n })\n .optional()\n .describe('Filter by modification date range'),\n\n // Owner filtering\n owner: z\n .union([z.string().min(1), FieldOperatorSchema])\n .optional()\n .describe('Filter by owner email address (partial match)'),\n\n // Raw Drive query string - escape hatch for advanced syntax\n rawDriveQuery: z.string().min(1).optional().describe(\"Raw Google Drive query syntax for advanced use cases. Bypasses schema validation - use sparingly. Example: \\\"name contains 'budget' and mimeType = 'application/pdf'\\\"\"),\n })\n .strict()\n) as unknown as z.ZodType<DriveQueryObject>;\n\nexport type DriveQueryObject = {\n $and?: DriveQueryObject[];\n $or?: DriveQueryObject[];\n $not?: DriveQueryObject;\n name?: string | FieldOperator;\n mimeType?: string | FieldOperator;\n fullText?: string | FieldOperator;\n parentId?: string | FieldOperator;\n starred?: boolean;\n sharedWithMe?: boolean;\n trashed?: boolean;\n modifiedTime?: {\n $gte?: string;\n $lt?: string;\n };\n owner?: string | FieldOperator;\n rawDriveQuery?: string;\n};\n\n/**\n * Drive query schema that accepts either:\n * - A structured DriveQueryObject with typed fields\n * - A raw Drive query string for advanced use cases\n *\n * This provides type safety for common queries while allowing\n * direct Google Drive query syntax when needed.\n */\nexport const DriveQuerySchema = z.union([z.string().min(1), DriveQueryObjectSchema]);\n\nexport type DriveQuery = string | DriveQueryObject;\n"],"names":["DriveQuerySchema","FieldOperatorSchema","z","object","$any","array","string","optional","describe","$all","$none","strict","DriveQueryObjectSchema","lazy","$and","$or","$not","name","union","min","mimeType","fullText","parentId","starred","boolean","sharedWithMe","trashed","modifiedTime","$gte","regex","$lt","owner","rawDriveQuery"],"mappings":";;;;+BAoIaA;;;eAAAA;;;mBApIK;AAElB;;;CAGC,GACD,IAAMC,sBAAsBC,MAAC,CAC1BC,MAAM,CAAC;IACNC,MAAMF,MAAC,CAACG,KAAK,CAACH,MAAC,CAACI,MAAM,IAAIC,QAAQ,GAAGC,QAAQ,CAAC;IAC9CC,MAAMP,MAAC,CAACG,KAAK,CAACH,MAAC,CAACI,MAAM,IAAIC,QAAQ,GAAGC,QAAQ,CAAC;IAC9CE,OAAOR,MAAC,CAACG,KAAK,CAACH,MAAC,CAACI,MAAM,IAAIC,QAAQ,GAAGC,QAAQ,CAAC;AACjD,GACCG,MAAM;AAIT;;;;;;;;;;;;;;;;;;;;;;CAsBC,GACD,IAAMC,yBAAyBV,MAAC,CAACW,IAAI,CAAC;WACpCX,MAAC,CACEC,MAAM,CAAC;QACN,yDAAyD;QACzDW,MAAMZ,MAAC,CAACG,KAAK,CAACO,wBAAwBL,QAAQ,GAAGC,QAAQ,CAAC;QAC1DO,KAAKb,MAAC,CAACG,KAAK,CAACO,wBAAwBL,QAAQ,GAAGC,QAAQ,CAAC;QACzDQ,MAAMJ,uBAAuBL,QAAQ,GAAGC,QAAQ,CAAC;QAEjD,0BAA0B;QAC1BS,MAAMf,MAAC,CACJgB,KAAK,CAAC;YAAChB,MAAC,CAACI,MAAM,GAAGa,GAAG,CAAC;YAAIlB;SAAoB,EAC9CM,QAAQ,GACRC,QAAQ,CAAC;QAEZ,sBAAsB;QACtBY,UAAUlB,MAAC,CACRgB,KAAK,CAAC;YAAChB,MAAC,CAACI,MAAM,GAAGa,GAAG,CAAC;YAAIlB;SAAoB,EAC9CM,QAAQ,GACRC,QAAQ,CAAC;QAEZ,+CAA+C;QAC/Ca,UAAUnB,MAAC,CACRgB,KAAK,CAAC;YAAChB,MAAC,CAACI,MAAM,GAAGa,GAAG,CAAC;YAAIlB;SAAoB,EAC9CM,QAAQ,GACRC,QAAQ,CAAC;QAEZ,0BAA0B;QAC1Bc,UAAUpB,MAAC,CACRgB,KAAK,CAAC;YAAChB,MAAC,CAACI,MAAM,GAAGa,GAAG,CAAC;YAAIlB;SAAoB,EAC9CM,QAAQ,GACRC,QAAQ,CAAC;QAEZ,gBAAgB;QAChBe,SAASrB,MAAC,CAACsB,OAAO,GAAGjB,QAAQ,GAAGC,QAAQ,CAAC;QACzCiB,cAAcvB,MAAC,CAACsB,OAAO,GAAGjB,QAAQ,GAAGC,QAAQ,CAAC;QAC9CkB,SAASxB,MAAC,CAACsB,OAAO,GAAGjB,QAAQ,GAAGC,QAAQ,CAAC;QAEzC,uBAAuB;QACvBmB,cAAczB,MAAC,CACZC,MAAM,CAAC;YACNyB,MAAM1B,MAAC,CACJI,MAAM,GACNuB,KAAK,CAAC,uDACNtB,QAAQ,GACRC,QAAQ,CAAC;YACZsB,KAAK5B,MAAC,CACHI,MAAM,GACNuB,KAAK,CAAC,uDACNtB,QAAQ,GACRC,QAAQ,CAAC;QACd,GACCD,QAAQ,GACRC,QAAQ,CAAC;QAEZ,kBAAkB;QAClBuB,OAAO7B,MAAC,CACLgB,KAAK,CAAC;YAAChB,MAAC,CAACI,MAAM,GAAGa,GAAG,CAAC;YAAIlB;SAAoB,EAC9CM,QAAQ,GACRC,QAAQ,CAAC;QAEZ,4DAA4D;QAC5DwB,eAAe9B,MAAC,CAACI,MAAM,GAAGa,GAAG,CAAC,GAAGZ,QAAQ,GAAGC,QAAQ,CAAC;IACvD,GACCG,MAAM;;AA8BJ,IAAMX,mBAAmBE,MAAC,CAACgB,KAAK,CAAC;IAAChB,MAAC,CAACI,MAAM,GAAGa,GAAG,CAAC;IAAIP;CAAuB"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["/Users/kevin/Dev/Projects/
|
|
1
|
+
{"version":3,"sources":["/Users/kevin/Dev/Projects/mcp-z/mcp-drive/src/schemas/drive-validation.ts"],"sourcesContent":["import { z } from 'zod';\n\n// Drive file schema\nexport const DriveFileSchema = z.object({\n id: z.string().optional(),\n name: z.string().optional(),\n mimeType: z.string().optional().describe('MIME type of the file (e.g., application/pdf, image/png)'),\n webViewLink: z.string().optional().describe('URL to view the file in Google Drive'),\n webContentLink: z.string().optional().describe('Direct download link for the file'),\n modifiedTime: z.string().optional().describe('ISO datetime when file was last modified'),\n createdTime: z.string().optional().describe('ISO datetime when file was created'),\n size: z.string().optional().describe('File size in bytes as string'),\n version: z.string().optional().describe('Version number of the file'),\n shared: z.boolean().optional().describe('Whether the file is shared with others'),\n starred: z.boolean().optional().describe('Whether the file is starred by the user'),\n trashed: z.boolean().optional().describe('Whether the file is in trash'),\n parents: z\n .array(\n z.object({\n id: z.string().describe('Parent folder ID'),\n name: z.string().describe('Parent folder name'),\n })\n )\n .optional()\n .describe('Parent folders with ID and name'),\n owners: z\n .array(\n z.object({\n displayName: z.string().optional(),\n emailAddress: z.string().optional(),\n kind: z.string().optional().describe('Resource type identifier (e.g., \"drive#user\")'),\n me: z.boolean().optional().describe('Whether this owner is the current user'),\n permissionId: z.string().optional().describe('Permission ID for this user'),\n photoLink: z.string().optional().describe('URL to user profile photo'),\n })\n )\n .optional(),\n permissions: z\n .object({\n canEdit: z.boolean().optional(),\n canComment: z.boolean().optional(),\n canShare: z.boolean().optional(),\n })\n .optional()\n .describe(\"Current user's permissions on this file\"),\n});\n\nexport type DriveFile = z.infer<typeof DriveFileSchema>;\n\n// Drive file field definitions for field selection\nexport const DRIVE_FILE_FIELDS = ['id', 'name', 'mimeType', 'webViewLink', 'modifiedTime', 'parents', 'shared', 'starred', 'owners'] as const;\n\nexport const DRIVE_FILE_FIELD_DESCRIPTIONS: Record<(typeof DRIVE_FILE_FIELDS)[number], string> = {\n id: 'Unique file/folder identifier',\n name: 'File or folder name',\n mimeType: 'MIME type (e.g., application/pdf, application/vnd.google-apps.folder)',\n webViewLink: 'URL to view the file in Google Drive',\n modifiedTime: 'Last modification timestamp',\n parents: 'Parent folder IDs',\n shared: 'Whether the file is shared',\n starred: 'Whether the file is starred',\n owners: 'File owner information (displayName, emailAddress, etc.)',\n};\n\nexport const DRIVE_FILE_COMMON_PATTERNS = [\n {\n name: 'Bulk operations (delete/move)',\n fields: 'id,name',\n tokens: '~20 tokens/file',\n },\n {\n name: 'Browsing/filtering',\n fields: 'id,name,mimeType,modifiedTime',\n tokens: '~40 tokens/file',\n },\n {\n name: 'Full metadata',\n fields: 'id,name,mimeType,webViewLink,modifiedTime,owners',\n tokens: '~80 tokens/file',\n },\n] as const;\n"],"names":["DRIVE_FILE_COMMON_PATTERNS","DRIVE_FILE_FIELDS","DRIVE_FILE_FIELD_DESCRIPTIONS","DriveFileSchema","z","object","id","string","optional","name","mimeType","describe","webViewLink","webContentLink","modifiedTime","createdTime","size","version","shared","boolean","starred","trashed","parents","array","owners","displayName","emailAddress","kind","me","permissionId","photoLink","permissions","canEdit","canComment","canShare","fields","tokens"],"mappings":";;;;;;;;;;;QAgEaA;eAAAA;;QAdAC;eAAAA;;QAEAC;eAAAA;;QAjDAC;eAAAA;;;mBAHK;AAGX,IAAMA,kBAAkBC,MAAC,CAACC,MAAM,CAAC;IACtCC,IAAIF,MAAC,CAACG,MAAM,GAAGC,QAAQ;IACvBC,MAAML,MAAC,CAACG,MAAM,GAAGC,QAAQ;IACzBE,UAAUN,MAAC,CAACG,MAAM,GAAGC,QAAQ,GAAGG,QAAQ,CAAC;IACzCC,aAAaR,MAAC,CAACG,MAAM,GAAGC,QAAQ,GAAGG,QAAQ,CAAC;IAC5CE,gBAAgBT,MAAC,CAACG,MAAM,GAAGC,QAAQ,GAAGG,QAAQ,CAAC;IAC/CG,cAAcV,MAAC,CAACG,MAAM,GAAGC,QAAQ,GAAGG,QAAQ,CAAC;IAC7CI,aAAaX,MAAC,CAACG,MAAM,GAAGC,QAAQ,GAAGG,QAAQ,CAAC;IAC5CK,MAAMZ,MAAC,CAACG,MAAM,GAAGC,QAAQ,GAAGG,QAAQ,CAAC;IACrCM,SAASb,MAAC,CAACG,MAAM,GAAGC,QAAQ,GAAGG,QAAQ,CAAC;IACxCO,QAAQd,MAAC,CAACe,OAAO,GAAGX,QAAQ,GAAGG,QAAQ,CAAC;IACxCS,SAAShB,MAAC,CAACe,OAAO,GAAGX,QAAQ,GAAGG,QAAQ,CAAC;IACzCU,SAASjB,MAAC,CAACe,OAAO,GAAGX,QAAQ,GAAGG,QAAQ,CAAC;IACzCW,SAASlB,MAAC,CACPmB,KAAK,CACJnB,MAAC,CAACC,MAAM,CAAC;QACPC,IAAIF,MAAC,CAACG,MAAM,GAAGI,QAAQ,CAAC;QACxBF,MAAML,MAAC,CAACG,MAAM,GAAGI,QAAQ,CAAC;IAC5B,IAEDH,QAAQ,GACRG,QAAQ,CAAC;IACZa,QAAQpB,MAAC,CACNmB,KAAK,CACJnB,MAAC,CAACC,MAAM,CAAC;QACPoB,aAAarB,MAAC,CAACG,MAAM,GAAGC,QAAQ;QAChCkB,cAActB,MAAC,CAACG,MAAM,GAAGC,QAAQ;QACjCmB,MAAMvB,MAAC,CAACG,MAAM,GAAGC,QAAQ,GAAGG,QAAQ,CAAC;QACrCiB,IAAIxB,MAAC,CAACe,OAAO,GAAGX,QAAQ,GAAGG,QAAQ,CAAC;QACpCkB,cAAczB,MAAC,CAACG,MAAM,GAAGC,QAAQ,GAAGG,QAAQ,CAAC;QAC7CmB,WAAW1B,MAAC,CAACG,MAAM,GAAGC,QAAQ,GAAGG,QAAQ,CAAC;IAC5C,IAEDH,QAAQ;IACXuB,aAAa3B,MAAC,CACXC,MAAM,CAAC;QACN2B,SAAS5B,MAAC,CAACe,OAAO,GAAGX,QAAQ;QAC7ByB,YAAY7B,MAAC,CAACe,OAAO,GAAGX,QAAQ;QAChC0B,UAAU9B,MAAC,CAACe,OAAO,GAAGX,QAAQ;IAChC,GACCA,QAAQ,GACRG,QAAQ,CAAC;AACd;AAKO,IAAMV,oBAAoB;IAAC;IAAM;IAAQ;IAAY;IAAe;IAAgB;IAAW;IAAU;IAAW;CAAS;AAE7H,IAAMC,gCAAoF;IAC/FI,IAAI;IACJG,MAAM;IACNC,UAAU;IACVE,aAAa;IACbE,cAAc;IACdQ,SAAS;IACTJ,QAAQ;IACRE,SAAS;IACTI,QAAQ;AACV;AAEO,IAAMxB,6BAA6B;IACxC;QACES,MAAM;QACN0B,QAAQ;QACRC,QAAQ;IACV;IACA;QACE3B,MAAM;QACN0B,QAAQ;QACRC,QAAQ;IACV;IACA;QACE3B,MAAM;QACN0B,QAAQ;QACRC,QAAQ;IACV;CACD"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["/Users/kevin/Dev/Projects/
|
|
1
|
+
{"version":3,"sources":["/Users/kevin/Dev/Projects/mcp-z/mcp-drive/src/schemas/index.ts"],"sourcesContent":["export * from './drive-query-schema.ts';\nexport * from './drive-validation.ts';\n"],"names":[],"mappings":";;;;qBAAc;qBACA"}
|
package/dist/cjs/setup/config.js
CHANGED
|
@@ -178,7 +178,17 @@ function parseConfig(args, env) {
|
|
|
178
178
|
// Parse repository URL from package.json, stripping git+ prefix and .git suffix
|
|
179
179
|
var rawRepoUrl = _type_of(pkg.repository) === 'object' ? pkg.repository.url : pkg.repository;
|
|
180
180
|
var repositoryUrl = (_ref = rawRepoUrl === null || rawRepoUrl === void 0 ? void 0 : rawRepoUrl.replace(/^git\+/, '').replace(/\.git$/, '')) !== null && _ref !== void 0 ? _ref : "https://github.com/mcp-z/".concat(name);
|
|
181
|
-
var rootDir =
|
|
181
|
+
var rootDir = (0, _os.homedir)();
|
|
182
|
+
try {
|
|
183
|
+
var configPath = (0, _server.findConfigPath)({
|
|
184
|
+
config: '.mcp.json',
|
|
185
|
+
cwd: process.cwd(),
|
|
186
|
+
stopDir: (0, _os.homedir)()
|
|
187
|
+
});
|
|
188
|
+
rootDir = _path.dirname(configPath);
|
|
189
|
+
} catch (unused) {
|
|
190
|
+
rootDir = (0, _os.homedir)();
|
|
191
|
+
}
|
|
182
192
|
var baseDir = _path.join(rootDir, '.mcp-z');
|
|
183
193
|
var cliLogLevel = typeof values['log-level'] === 'string' ? values['log-level'] : undefined;
|
|
184
194
|
var envLogLevel = env.LOG_LEVEL;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["/Users/kevin/Dev/Projects/
|
|
1
|
+
{"version":3,"sources":["/Users/kevin/Dev/Projects/mcp-z/mcp-drive/src/setup/config.ts"],"sourcesContent":["import { parseDcrConfig, parseConfig as parseOAuthConfig } from '@mcp-z/oauth-google';\nimport { findConfigPath, parseConfig as parseTransportConfig } from '@mcp-z/server';\nimport * as fs from 'fs';\nimport moduleRoot from 'module-root-sync';\nimport { homedir } from 'os';\nimport * as path from 'path';\nimport * as url from 'url';\nimport { parseArgs } from 'util';\nimport { GOOGLE_SCOPE } from '../constants.ts';\nimport type { ServerConfig } from '../types.ts';\n\nconst pkg = JSON.parse(fs.readFileSync(path.join(moduleRoot(url.fileURLToPath(import.meta.url)), 'package.json'), 'utf-8'));\n\nconst HELP_TEXT = `\nUsage: mcp-drive [options]\n\nMCP server for Google Drive file management with OAuth authentication.\n\nOptions:\n --version Show version number\n --help Show this help message\n --auth=<mode> Authentication mode (default: loopback-oauth)\n Modes: loopback-oauth, service-account, dcr\n --headless Disable browser auto-open, return auth URL instead\n --redirect-uri=<uri> OAuth redirect URI (default: ephemeral loopback)\n --dcr-mode=<mode> DCR mode (self-hosted or external, default: self-hosted)\n --dcr-verify-url=<url> External verification endpoint (required for external mode)\n --dcr-store-uri=<uri> DCR client storage URI (required for self-hosted mode)\n --port=<port> Enable HTTP transport on specified port\n --stdio Enable stdio transport (default if no port)\n --log-level=<level> Logging level (default: info)\n\nEnvironment Variables:\n GOOGLE_CLIENT_ID OAuth client ID (REQUIRED)\n GOOGLE_CLIENT_SECRET OAuth client secret (optional)\n AUTH_MODE Default authentication mode (optional)\n HEADLESS Disable browser auto-open (optional)\n DCR_MODE DCR mode (optional, same format as --dcr-mode)\n DCR_VERIFY_URL External verification URL (optional, same as --dcr-verify-url)\n DCR_STORE_URI DCR storage URI (optional, same as --dcr-store-uri)\n PORT Default HTTP port (optional)\n LOG_LEVEL Default logging level (optional)\n\nOAuth Scopes:\n openid https://www.googleapis.com/auth/userinfo.profile https://www.googleapis.com/auth/userinfo.email https://www.googleapis.com/auth/drive\n\nExamples:\n mcp-drive # Use default settings\n mcp-drive --auth=service-account # Use service account auth\n mcp-drive --port=3000 # HTTP transport on port 3000\n GOOGLE_CLIENT_ID=xxx mcp-drive # Set client ID via env var\n`.trim();\n\n/**\n * Handle --version and --help flags before config parsing.\n * These should work without requiring any configuration.\n */\nexport function handleVersionHelp(args: string[]): { handled: boolean; output?: string } {\n const { values } = parseArgs({\n args,\n options: {\n version: { type: 'boolean' },\n help: { type: 'boolean' },\n },\n strict: false,\n });\n\n if (values.version) return { handled: true, output: pkg.version };\n if (values.help) return { handled: true, output: HELP_TEXT };\n return { handled: false };\n}\n\n/**\n * Parse Drive server configuration from CLI arguments and environment.\n *\n * CLI Arguments (all optional):\n * - --auth=<mode> Authentication mode (default: loopback-oauth)\n * Modes: loopback-oauth, service-account, dcr\n * - --headless Disable browser auto-open, return auth URL instead\n * - --redirect-uri=<uri> OAuth redirect URI (default: ephemeral loopback)\n * - --dcr-mode=<mode> DCR mode (self-hosted or external, default: self-hosted)\n * - --dcr-verify-url=<url> External verification endpoint (required for external mode)\n * - --dcr-store-uri=<uri> DCR client storage URI (required for self-hosted mode)\n * - --port=<port> Enable HTTP transport on specified port\n * - --stdio Enable stdio transport (default if no port)\n * - --log-level=<level> Logging level (default: info)\n *\n * Environment Variables:\n * - GOOGLE_CLIENT_ID OAuth client ID (REQUIRED)\n * - GOOGLE_CLIENT_SECRET OAuth client secret (optional)\n * - AUTH_MODE Default authentication mode (optional)\n * - HEADLESS Disable browser auto-open (optional)\n * - DCR_MODE DCR mode (optional, same format as --dcr-mode)\n * - DCR_VERIFY_URL External verification URL (optional, same as --dcr-verify-url)\n * - DCR_STORE_URI DCR storage URI (optional, same as --dcr-store-uri)\n * - PORT Default HTTP port (optional)\n * - LOG_LEVEL Default logging level (optional)\n *\n * OAuth Scopes (from constants.ts):\n * openid https://www.googleapis.com/auth/userinfo.profile https://www.googleapis.com/auth/userinfo.email https://www.googleapis.com/auth/drive\n */\nexport function parseConfig(args: string[], env: Record<string, string | undefined>): ServerConfig {\n const transportConfig = parseTransportConfig(args, env);\n const oauthConfig = parseOAuthConfig(args, env);\n\n // Parse DCR configuration if DCR mode is enabled\n const dcrConfig = oauthConfig.auth === 'dcr' ? parseDcrConfig(args, env, GOOGLE_SCOPE) : undefined;\n\n // Parse application-level config (LOG_LEVEL)\n const { values } = parseArgs({\n args,\n options: {\n 'log-level': { type: 'string' },\n },\n strict: false, // Allow other arguments\n allowPositionals: true,\n });\n\n const name = pkg.name.replace(/^@[^/]+\\//, '');\n // Parse repository URL from package.json, stripping git+ prefix and .git suffix\n const rawRepoUrl = typeof pkg.repository === 'object' ? pkg.repository.url : pkg.repository;\n const repositoryUrl = rawRepoUrl?.replace(/^git\\+/, '').replace(/\\.git$/, '') ?? `https://github.com/mcp-z/${name}`;\n let rootDir = homedir();\n try {\n const configPath = findConfigPath({ config: '.mcp.json', cwd: process.cwd(), stopDir: homedir() });\n rootDir = path.dirname(configPath);\n } catch {\n rootDir = homedir();\n }\n const baseDir = path.join(rootDir, '.mcp-z');\n const cliLogLevel = typeof values['log-level'] === 'string' ? values['log-level'] : undefined;\n const envLogLevel = env.LOG_LEVEL;\n const logLevel = cliLogLevel ?? envLogLevel ?? 'info';\n\n // Combine configs\n return {\n ...oauthConfig, // Includes clientId, auth, headless, redirectUri\n transport: transportConfig.transport,\n logLevel,\n baseDir,\n name,\n version: pkg.version,\n repositoryUrl,\n ...(dcrConfig && { dcrConfig }),\n };\n}\n\n/**\n * Build production configuration from process globals.\n * Entry point for production server.\n */\nexport function createConfig(): ServerConfig {\n return parseConfig(process.argv, process.env);\n}\n"],"names":["createConfig","handleVersionHelp","parseConfig","pkg","JSON","parse","fs","readFileSync","path","join","moduleRoot","url","fileURLToPath","HELP_TEXT","trim","args","values","parseArgs","options","version","type","help","strict","handled","output","env","cliLogLevel","transportConfig","parseTransportConfig","oauthConfig","parseOAuthConfig","dcrConfig","auth","parseDcrConfig","GOOGLE_SCOPE","undefined","allowPositionals","name","replace","rawRepoUrl","repository","repositoryUrl","rootDir","homedir","configPath","findConfigPath","config","cwd","process","stopDir","dirname","baseDir","envLogLevel","LOG_LEVEL","logLevel","transport","argv"],"mappings":";;;;;;;;;;;QAuJgBA;eAAAA;;QA9FAC;eAAAA;;QA4CAC;eAAAA;;;2BArGgD;sBACI;0DAChD;qEACG;kBACC;4DACF;2DACD;oBACK;2BACG;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAG7B,IAAMC,MAAMC,KAAKC,KAAK,CAACC,IAAGC,YAAY,CAACC,MAAKC,IAAI,CAACC,IAAAA,uBAAU,EAACC,KAAIC,aAAa,CAAC,uDAAmB,iBAAiB;AAElH,IAAMC,YAAY,s9DAsChBC,IAAI;AAMC,SAASb,kBAAkBc,IAAc;IAC9C,IAAM,AAAEC,SAAWC,IAAAA,eAAS,EAAC;QAC3BF,MAAAA;QACAG,SAAS;YACPC,SAAS;gBAAEC,MAAM;YAAU;YAC3BC,MAAM;gBAAED,MAAM;YAAU;QAC1B;QACAE,QAAQ;IACV,GAPQN;IASR,IAAIA,OAAOG,OAAO,EAAE,OAAO;QAAEI,SAAS;QAAMC,QAAQrB,IAAIgB,OAAO;IAAC;IAChE,IAAIH,OAAOK,IAAI,EAAE,OAAO;QAAEE,SAAS;QAAMC,QAAQX;IAAU;IAC3D,OAAO;QAAEU,SAAS;IAAM;AAC1B;AA+BO,SAASrB,YAAYa,IAAc,EAAEU,GAAuC;cA+BhEC;IA9BjB,IAAMC,kBAAkBC,IAAAA,mBAAoB,EAACb,MAAMU;IACnD,IAAMI,cAAcC,IAAAA,wBAAgB,EAACf,MAAMU;IAE3C,iDAAiD;IACjD,IAAMM,YAAYF,YAAYG,IAAI,KAAK,QAAQC,IAAAA,2BAAc,EAAClB,MAAMU,KAAKS,yBAAY,IAAIC;IAEzF,6CAA6C;IAC7C,IAAM,AAAEnB,SAAWC,IAAAA,eAAS,EAAC;QAC3BF,MAAAA;QACAG,SAAS;YACP,aAAa;gBAAEE,MAAM;YAAS;QAChC;QACAE,QAAQ;QACRc,kBAAkB;IACpB,GAPQpB;IASR,IAAMqB,OAAOlC,IAAIkC,IAAI,CAACC,OAAO,CAAC,aAAa;IAC3C,gFAAgF;IAChF,IAAMC,aAAa,SAAOpC,IAAIqC,UAAU,MAAK,WAAWrC,IAAIqC,UAAU,CAAC7B,GAAG,GAAGR,IAAIqC,UAAU;IAC3F,IAAMC,wBAAgBF,uBAAAA,iCAAAA,WAAYD,OAAO,CAAC,UAAU,IAAIA,OAAO,CAAC,UAAU,0CAAO,AAAC,4BAAgC,OAALD;IAC7G,IAAIK,UAAUC,IAAAA,WAAO;IACrB,IAAI;QACF,IAAMC,aAAaC,IAAAA,sBAAc,EAAC;YAAEC,QAAQ;YAAaC,KAAKC,QAAQD,GAAG;YAAIE,SAASN,IAAAA,WAAO;QAAG;QAChGD,UAAUlC,MAAK0C,OAAO,CAACN;IACzB,EAAE,eAAM;QACNF,UAAUC,IAAAA,WAAO;IACnB;IACA,IAAMQ,UAAU3C,MAAKC,IAAI,CAACiC,SAAS;IACnC,IAAMhB,cAAc,OAAOV,MAAM,CAAC,YAAY,KAAK,WAAWA,MAAM,CAAC,YAAY,GAAGmB;IACpF,IAAMiB,cAAc3B,IAAI4B,SAAS;IACjC,IAAMC,YAAW5B,QAAAA,wBAAAA,yBAAAA,cAAe0B,yBAAf1B,mBAAAA,QAA8B;IAE/C,kBAAkB;IAClB,OAAO,uDACFG;QACH0B,WAAW5B,gBAAgB4B,SAAS;QACpCD,UAAAA;QACAH,SAAAA;QACAd,MAAAA;QACAlB,SAAShB,IAAIgB,OAAO;QACpBsB,eAAAA;QACIV,aAAa;QAAEA,WAAAA;IAAU;AAEjC;AAMO,SAAS/B;IACd,OAAOE,YAAY8C,QAAQQ,IAAI,EAAER,QAAQvB,GAAG;AAC9C"}
|
package/dist/cjs/setup/http.js
CHANGED
|
@@ -12,7 +12,7 @@ var _server = require("@mcp-z/server");
|
|
|
12
12
|
var _mcp = require("@modelcontextprotocol/sdk/server/mcp.js");
|
|
13
13
|
var _cors = /*#__PURE__*/ _interop_require_default(require("cors"));
|
|
14
14
|
var _express = /*#__PURE__*/ _interop_require_default(require("express"));
|
|
15
|
-
var
|
|
15
|
+
var _runtimets = require("./runtime.js");
|
|
16
16
|
function _array_like_to_array(arr, len) {
|
|
17
17
|
if (len == null || len > arr.length) len = arr.length;
|
|
18
18
|
for(var i = 0, arr2 = new Array(len); i < len; i++)arr2[i] = arr[i];
|
|
@@ -179,7 +179,7 @@ function createHTTPServer(config, overrides) {
|
|
|
179
179
|
case 0:
|
|
180
180
|
return [
|
|
181
181
|
4,
|
|
182
|
-
(0,
|
|
182
|
+
(0, _runtimets.createDefaultRuntime)(config, overrides)
|
|
183
183
|
];
|
|
184
184
|
case 1:
|
|
185
185
|
runtime = _state.sent();
|
|
@@ -205,6 +205,10 @@ function createHTTPServer(config, overrides) {
|
|
|
205
205
|
app.use(_express.default.json({
|
|
206
206
|
limit: '10mb'
|
|
207
207
|
}));
|
|
208
|
+
if (runtime.deps.oauthAdapters.loopbackRouter) {
|
|
209
|
+
app.use('/', runtime.deps.oauthAdapters.loopbackRouter);
|
|
210
|
+
logger.info('Mounted loopback OAuth callback router');
|
|
211
|
+
}
|
|
208
212
|
if (runtime.deps.oauthAdapters.dcrRouter) {
|
|
209
213
|
app.use('/', runtime.deps.oauthAdapters.dcrRouter);
|
|
210
214
|
logger.info('Mounted DCR router with OAuth endpoints');
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["/Users/kevin/Dev/Projects/
|
|
1
|
+
{"version":3,"sources":["/Users/kevin/Dev/Projects/mcp-z/mcp-drive/src/setup/http.ts"],"sourcesContent":["import { composeMiddleware, connectHttp, registerPrompts, registerResources, registerTools } from '@mcp-z/server';\nimport { McpServer } from '@modelcontextprotocol/sdk/server/mcp.js';\nimport cors from 'cors';\nimport express from 'express';\nimport type { RuntimeOverrides, ServerConfig } from '../types.ts';\nimport { createDefaultRuntime } from './runtime.ts';\n\nexport async function createHTTPServer(config: ServerConfig, overrides?: RuntimeOverrides) {\n const runtime = await createDefaultRuntime(config, overrides);\n const modules = runtime.createDomainModules();\n const layers = runtime.middlewareFactories.map((factory) => factory(runtime.deps));\n const composed = composeMiddleware(modules, layers);\n const logger = runtime.deps.logger;\n const port = config.transport.port;\n if (!port) throw new Error('Port is required for HTTP transport');\n\n const tools = [...composed.tools, ...runtime.deps.oauthAdapters.accountTools];\n const prompts = [...composed.prompts, ...runtime.deps.oauthAdapters.accountPrompts];\n\n const mcpServer = new McpServer({ name: config.name, version: config.version });\n registerTools(mcpServer, tools);\n registerResources(mcpServer, composed.resources);\n registerPrompts(mcpServer, prompts);\n\n const app = express();\n app.use(cors());\n app.use(express.json({ limit: '10mb' }));\n\n if (runtime.deps.oauthAdapters.loopbackRouter) {\n app.use('/', runtime.deps.oauthAdapters.loopbackRouter);\n logger.info('Mounted loopback OAuth callback router');\n }\n\n if (runtime.deps.oauthAdapters.dcrRouter) {\n app.use('/', runtime.deps.oauthAdapters.dcrRouter);\n logger.info('Mounted DCR router with OAuth endpoints');\n }\n\n logger.info(`Starting ${config.name} MCP server (http)`);\n const { close, httpServer } = await connectHttp(mcpServer, { logger, app, port });\n logger.info('http transport ready');\n\n return {\n httpServer,\n mcpServer,\n logger,\n close: async () => {\n await close();\n await runtime.close();\n },\n };\n}\n"],"names":["createHTTPServer","config","overrides","runtime","modules","layers","composed","logger","port","tools","prompts","mcpServer","app","close","httpServer","createDefaultRuntime","createDomainModules","middlewareFactories","map","factory","deps","composeMiddleware","transport","Error","oauthAdapters","accountTools","accountPrompts","McpServer","name","version","registerTools","registerResources","resources","registerPrompts","express","use","cors","json","limit","loopbackRouter","info","dcrRouter","connectHttp"],"mappings":";;;;+BAOsBA;;;eAAAA;;;sBAP4E;mBACxE;2DACT;8DACG;yBAEiB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAE9B,SAAeA,iBAAiBC,MAAoB,EAAEC,SAA4B;;YACjFC,SACAC,SACAC,QACAC,UACAC,QACAC,MAGAC,OACAC,SAEAC,WAKAC,KAewB,MAAtBC,OAAOC;;;;oBA/BC;;wBAAMC,IAAAA,+BAAoB,EAACd,QAAQC;;;oBAA7CC,UAAU;oBACVC,UAAUD,QAAQa,mBAAmB;oBACrCX,SAASF,QAAQc,mBAAmB,CAACC,GAAG,CAAC,SAACC;+BAAYA,QAAQhB,QAAQiB,IAAI;;oBAC1Ed,WAAWe,IAAAA,yBAAiB,EAACjB,SAASC;oBACtCE,SAASJ,QAAQiB,IAAI,CAACb,MAAM;oBAC5BC,OAAOP,OAAOqB,SAAS,CAACd,IAAI;oBAClC,IAAI,CAACA,MAAM,MAAM,IAAIe,MAAM;oBAErBd,QAAQ,AAAC,qBAAGH,SAASG,KAAK,SAAE,qBAAGN,QAAQiB,IAAI,CAACI,aAAa,CAACC,YAAY;oBACtEf,UAAU,AAAC,qBAAGJ,SAASI,OAAO,SAAE,qBAAGP,QAAQiB,IAAI,CAACI,aAAa,CAACE,cAAc;oBAE5Ef,YAAY,IAAIgB,cAAS,CAAC;wBAAEC,MAAM3B,OAAO2B,IAAI;wBAAEC,SAAS5B,OAAO4B,OAAO;oBAAC;oBAC7EC,IAAAA,qBAAa,EAACnB,WAAWF;oBACzBsB,IAAAA,yBAAiB,EAACpB,WAAWL,SAAS0B,SAAS;oBAC/CC,IAAAA,uBAAe,EAACtB,WAAWD;oBAErBE,MAAMsB,IAAAA,gBAAO;oBACnBtB,IAAIuB,GAAG,CAACC,IAAAA,aAAI;oBACZxB,IAAIuB,GAAG,CAACD,gBAAO,CAACG,IAAI,CAAC;wBAAEC,OAAO;oBAAO;oBAErC,IAAInC,QAAQiB,IAAI,CAACI,aAAa,CAACe,cAAc,EAAE;wBAC7C3B,IAAIuB,GAAG,CAAC,KAAKhC,QAAQiB,IAAI,CAACI,aAAa,CAACe,cAAc;wBACtDhC,OAAOiC,IAAI,CAAC;oBACd;oBAEA,IAAIrC,QAAQiB,IAAI,CAACI,aAAa,CAACiB,SAAS,EAAE;wBACxC7B,IAAIuB,GAAG,CAAC,KAAKhC,QAAQiB,IAAI,CAACI,aAAa,CAACiB,SAAS;wBACjDlC,OAAOiC,IAAI,CAAC;oBACd;oBAEAjC,OAAOiC,IAAI,CAAC,AAAC,YAAuB,OAAZvC,OAAO2B,IAAI,EAAC;oBACN;;wBAAMc,IAAAA,mBAAW,EAAC/B,WAAW;4BAAEJ,QAAAA;4BAAQK,KAAAA;4BAAKJ,MAAAA;wBAAK;;;oBAAjD,OAAA,eAAtBK,QAAsB,KAAtBA,OAAOC,aAAe,KAAfA;oBACfP,OAAOiC,IAAI,CAAC;oBAEZ;;wBAAO;4BACL1B,YAAAA;4BACAH,WAAAA;4BACAJ,QAAAA;4BACAM,OAAO;;;;;gDACL;;oDAAMA;;;gDAAN;gDACA;;oDAAMV,QAAQU,KAAK;;;gDAAnB;;;;;;gCACF;;wBACF;;;;IACF"}
|
package/dist/cjs/setup/index.js
CHANGED
|
@@ -10,26 +10,26 @@ function _export(target, all) {
|
|
|
10
10
|
}
|
|
11
11
|
_export(exports, {
|
|
12
12
|
get createConfig () {
|
|
13
|
-
return
|
|
13
|
+
return _configts.createConfig;
|
|
14
14
|
},
|
|
15
15
|
get createHTTPServer () {
|
|
16
|
-
return
|
|
16
|
+
return _httpts.createHTTPServer;
|
|
17
17
|
},
|
|
18
18
|
get createOAuthAdapters () {
|
|
19
|
-
return
|
|
19
|
+
return _oauthgooglets.createOAuthAdapters;
|
|
20
20
|
},
|
|
21
21
|
get createStdioServer () {
|
|
22
|
-
return
|
|
22
|
+
return _stdiots.createStdioServer;
|
|
23
23
|
},
|
|
24
24
|
get parseConfig () {
|
|
25
|
-
return
|
|
25
|
+
return _configts.parseConfig;
|
|
26
26
|
}
|
|
27
27
|
});
|
|
28
|
-
var
|
|
29
|
-
var
|
|
30
|
-
var
|
|
28
|
+
var _configts = require("./config.js");
|
|
29
|
+
var _httpts = require("./http.js");
|
|
30
|
+
var _oauthgooglets = require("./oauth-google.js");
|
|
31
31
|
_export_star(require("./runtime.js"), exports);
|
|
32
|
-
var
|
|
32
|
+
var _stdiots = require("./stdio.js");
|
|
33
33
|
function _export_star(from, to) {
|
|
34
34
|
Object.keys(from).forEach(function(k) {
|
|
35
35
|
if (k !== "default" && !Object.prototype.hasOwnProperty.call(to, k)) {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["/Users/kevin/Dev/Projects/
|
|
1
|
+
{"version":3,"sources":["/Users/kevin/Dev/Projects/mcp-z/mcp-drive/src/setup/index.ts"],"sourcesContent":["export { createConfig, parseConfig } from './config.ts';\nexport { createHTTPServer } from './http.ts';\nexport { createOAuthAdapters } from './oauth-google.ts';\nexport * from './runtime.ts';\nexport { createStdioServer } from './stdio.ts';\n"],"names":["createConfig","createHTTPServer","createOAuthAdapters","createStdioServer","parseConfig"],"mappings":";;;;;;;;;;;QAASA;eAAAA,sBAAY;;QACZC;eAAAA,wBAAgB;;QAChBC;eAAAA,kCAAmB;;QAEnBC;eAAAA,0BAAiB;;QAJHC;eAAAA,qBAAW;;;wBAAQ;sBACT;6BACG;qBACtB;uBACoB"}
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import { type
|
|
1
|
+
import { type AccountAuthProvider } from '@mcp-z/oauth';
|
|
2
2
|
import type { CachedToken } from '@mcp-z/oauth-google';
|
|
3
3
|
import { DcrOAuthProvider, LoopbackOAuthProvider, ServiceAccountProvider } from '@mcp-z/oauth-google';
|
|
4
4
|
import type { Logger, PromptModule, ToolModule } from '@mcp-z/server';
|
|
@@ -41,10 +41,11 @@ export interface AuthMiddleware {
|
|
|
41
41
|
export interface OAuthAdapters {
|
|
42
42
|
primary: LoopbackOAuthProvider | ServiceAccountProvider | DcrOAuthProvider;
|
|
43
43
|
middleware: AuthMiddleware;
|
|
44
|
-
authAdapter:
|
|
44
|
+
authAdapter: AccountAuthProvider;
|
|
45
45
|
accountTools: ToolModule[];
|
|
46
46
|
accountPrompts: PromptModule[];
|
|
47
47
|
dcrRouter?: Router;
|
|
48
|
+
loopbackRouter?: Router;
|
|
48
49
|
}
|
|
49
50
|
/**
|
|
50
51
|
* Create Drive OAuth adapters based on transport configuration
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import { type
|
|
1
|
+
import { type AccountAuthProvider } from '@mcp-z/oauth';
|
|
2
2
|
import type { CachedToken } from '@mcp-z/oauth-google';
|
|
3
3
|
import { DcrOAuthProvider, LoopbackOAuthProvider, ServiceAccountProvider } from '@mcp-z/oauth-google';
|
|
4
4
|
import type { Logger, PromptModule, ToolModule } from '@mcp-z/server';
|
|
@@ -41,10 +41,11 @@ export interface AuthMiddleware {
|
|
|
41
41
|
export interface OAuthAdapters {
|
|
42
42
|
primary: LoopbackOAuthProvider | ServiceAccountProvider | DcrOAuthProvider;
|
|
43
43
|
middleware: AuthMiddleware;
|
|
44
|
-
authAdapter:
|
|
44
|
+
authAdapter: AccountAuthProvider;
|
|
45
45
|
accountTools: ToolModule[];
|
|
46
46
|
accountPrompts: PromptModule[];
|
|
47
47
|
dcrRouter?: Router;
|
|
48
|
+
loopbackRouter?: Router;
|
|
48
49
|
}
|
|
49
50
|
/**
|
|
50
51
|
* Create Drive OAuth adapters based on transport configuration
|
|
@@ -53,6 +53,13 @@ function _define_property(obj, key, value) {
|
|
|
53
53
|
}
|
|
54
54
|
return obj;
|
|
55
55
|
}
|
|
56
|
+
function _instanceof(left, right) {
|
|
57
|
+
if (right != null && typeof Symbol !== "undefined" && right[Symbol.hasInstance]) {
|
|
58
|
+
return !!right[Symbol.hasInstance](left);
|
|
59
|
+
} else {
|
|
60
|
+
return left instanceof right;
|
|
61
|
+
}
|
|
62
|
+
}
|
|
56
63
|
function _object_spread(target) {
|
|
57
64
|
for(var i = 1; i < arguments.length; i++){
|
|
58
65
|
var source = arguments[i] != null ? arguments[i] : {};
|
|
@@ -193,7 +200,7 @@ function _ts_generator(thisArg, body) {
|
|
|
193
200
|
}
|
|
194
201
|
function createOAuthAdapters(config, deps, baseUrl) {
|
|
195
202
|
return _async_to_generator(function() {
|
|
196
|
-
var logger, tokenStore, dcrStore, resolvedBaseUrl, oauthStaticConfig, primary, dcrRouter, middleware, authAdapter, accountTools, accountPrompts, authAdapter1, middleware1, accountTools1, accountPrompts1, result;
|
|
203
|
+
var logger, tokenStore, dcrStore, resolvedBaseUrl, oauthStaticConfig, primary, dcrRouter, middleware, authAdapter, accountTools, accountPrompts, authAdapter1, middleware1, accountTools1, accountPrompts1, result, loopbackRouter;
|
|
197
204
|
return _ts_generator(this, function(_state) {
|
|
198
205
|
logger = deps.logger, tokenStore = deps.tokenStore, dcrStore = deps.dcrStore;
|
|
199
206
|
resolvedBaseUrl = baseUrl !== null && baseUrl !== void 0 ? baseUrl : config.baseUrl;
|
|
@@ -248,6 +255,9 @@ function createOAuthAdapters(config, deps, baseUrl) {
|
|
|
248
255
|
middleware = primary.authMiddleware();
|
|
249
256
|
// Create auth email provider (stateless)
|
|
250
257
|
authAdapter = {
|
|
258
|
+
getAccessToken: function() {
|
|
259
|
+
throw new Error('DCR mode does not support getAccessToken - tokens are provided via bearer auth');
|
|
260
|
+
},
|
|
251
261
|
getUserEmail: function() {
|
|
252
262
|
throw new Error('DCR mode does not support getUserEmail - tokens are provided via bearer auth');
|
|
253
263
|
}
|
|
@@ -298,16 +308,7 @@ function createOAuthAdapters(config, deps, baseUrl) {
|
|
|
298
308
|
}));
|
|
299
309
|
}
|
|
300
310
|
// Create auth email provider (used by account management tools)
|
|
301
|
-
authAdapter1 =
|
|
302
|
-
getUserEmail: function(accountId) {
|
|
303
|
-
return primary.getUserEmail(accountId);
|
|
304
|
-
}
|
|
305
|
-
}, 'authenticateNewAccount' in primary && primary.authenticateNewAccount ? {
|
|
306
|
-
authenticateNewAccount: function() {
|
|
307
|
-
var _primary_authenticateNewAccount;
|
|
308
|
-
return (_primary_authenticateNewAccount = primary.authenticateNewAccount) === null || _primary_authenticateNewAccount === void 0 ? void 0 : _primary_authenticateNewAccount.call(primary);
|
|
309
|
-
}
|
|
310
|
-
} : {});
|
|
311
|
+
authAdapter1 = primary;
|
|
311
312
|
if (oauthStaticConfig.auth === 'service-account') {
|
|
312
313
|
// Service account mode - no account management tools needed (single identity)
|
|
313
314
|
middleware1 = primary.authMiddleware();
|
|
@@ -331,6 +332,7 @@ function createOAuthAdapters(config, deps, baseUrl) {
|
|
|
331
332
|
service: oauthStaticConfig.service
|
|
332
333
|
});
|
|
333
334
|
}
|
|
335
|
+
loopbackRouter = _instanceof(primary, _oauthgoogle.LoopbackOAuthProvider) && oauthStaticConfig.redirectUri ? (0, _oauthgoogle.createLoopbackCallbackRouter)(primary) : undefined;
|
|
334
336
|
return [
|
|
335
337
|
2,
|
|
336
338
|
{
|
|
@@ -338,7 +340,8 @@ function createOAuthAdapters(config, deps, baseUrl) {
|
|
|
338
340
|
middleware: middleware1,
|
|
339
341
|
authAdapter: authAdapter1,
|
|
340
342
|
accountTools: accountTools1,
|
|
341
|
-
accountPrompts: accountPrompts1
|
|
343
|
+
accountPrompts: accountPrompts1,
|
|
344
|
+
loopbackRouter: loopbackRouter
|
|
342
345
|
}
|
|
343
346
|
];
|
|
344
347
|
});
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["/Users/kevin/Dev/Projects/ai/mcp-z/servers/mcp-drive/src/setup/oauth-google.ts"],"sourcesContent":["import { AccountServer, type AuthEmailProvider } from '@mcp-z/oauth';\nimport type { CachedToken } from '@mcp-z/oauth-google';\nimport { createDcrRouter, DcrOAuthProvider, LoopbackOAuthProvider, ServiceAccountProvider } from '@mcp-z/oauth-google';\nimport type { Logger, PromptModule, ToolModule } from '@mcp-z/server';\nimport type { Router } from 'express';\nimport type { Keyv } from 'keyv';\nimport { GOOGLE_SCOPE } from '../constants.ts';\nimport type { ServerConfig } from '../types.js';\n\n/**\n * Drive OAuth runtime dependencies\n */\nexport interface OAuthRuntimeDeps {\n logger: Logger;\n tokenStore: Keyv<CachedToken>;\n dcrStore?: Keyv<unknown>;\n}\n\n/**\n * Auth middleware wrapper with withToolAuth/withResourceAuth/withPromptAuth methods\n * Uses structural constraints to avoid contravariance issues with handler types.\n */\nexport interface AuthMiddleware {\n withToolAuth<T extends { name: string; config: unknown; handler: unknown }>(module: T): T;\n withResourceAuth<T extends { name: string; template?: unknown; config?: unknown; handler: unknown }>(module: T): T;\n withPromptAuth<T extends { name: string; config: unknown; handler: unknown }>(module: T): T;\n}\n\n/**\n * Result of OAuth adapter creation\n */\nexport interface OAuthAdapters {\n primary: LoopbackOAuthProvider | ServiceAccountProvider | DcrOAuthProvider;\n middleware: AuthMiddleware;\n authAdapter: AuthEmailProvider;\n accountTools: ToolModule[];\n accountPrompts: PromptModule[];\n dcrRouter?: Router;\n}\n\n/**\n * Create Drive OAuth adapters based on transport configuration\n *\n * Returns primary adapter (loopback or service account), pre-configured middleware,\n * auth email provider, and pre-selected account tools based on auth mode.\n *\n * Primary adapter selection is based on auth mode:\n * - 'loopback-oauth': LoopbackOAuthProvider (interactive OAuth with token storage)\n * - 'service-account': ServiceAccountProvider (JWT-based authentication)\n *\n * @param config - Server configuration (transport + auth settings)\n * @param deps - Runtime dependencies (logger, tokenStore, etc.)\n * @returns OAuth adapters with pre-configured middleware and account tools\n * @throws Error if service account mode but no key file provided\n */\nexport async function createOAuthAdapters(config: ServerConfig, deps: OAuthRuntimeDeps, baseUrl?: string): Promise<OAuthAdapters> {\n const { logger, tokenStore, dcrStore } = deps;\n const resolvedBaseUrl = baseUrl ?? config.baseUrl;\n const oauthStaticConfig = {\n service: config.name,\n clientId: config.clientId,\n clientSecret: config.clientSecret,\n scope: GOOGLE_SCOPE,\n auth: config.auth,\n headless: config.headless,\n redirectUri: config.transport.type === 'stdio' ? undefined : config.redirectUri,\n ...(config.serviceAccountKeyFile && { serviceAccountKeyFile: config.serviceAccountKeyFile }),\n ...(resolvedBaseUrl && { baseUrl: resolvedBaseUrl }),\n };\n\n // Create primary adapter based on auth mode\n let primary: LoopbackOAuthProvider | ServiceAccountProvider | DcrOAuthProvider;\n\n // DCR mode - Dynamic Client Registration with HTTP-only support\n if (oauthStaticConfig.auth === 'dcr') {\n logger.debug('Creating DCR provider', { service: oauthStaticConfig.service });\n\n // DCR requires dcrStore and baseUrl\n if (!dcrStore) {\n throw new Error('DCR mode requires dcrStore to be configured');\n }\n if (!oauthStaticConfig.baseUrl) {\n throw new Error('DCR mode requires baseUrl to be configured');\n }\n\n // Create DcrOAuthProvider (stateless provider that receives tokens from verification context)\n primary = new DcrOAuthProvider({\n clientId: oauthStaticConfig.clientId,\n ...(oauthStaticConfig.clientSecret && { clientSecret: oauthStaticConfig.clientSecret }),\n scope: oauthStaticConfig.scope,\n verifyEndpoint: `${oauthStaticConfig.baseUrl}/oauth/verify`,\n logger,\n });\n\n // Create DCR OAuth router with authorization server endpoints\n const dcrRouter = createDcrRouter({\n store: dcrStore,\n issuerUrl: oauthStaticConfig.baseUrl,\n baseUrl: oauthStaticConfig.baseUrl,\n scopesSupported: oauthStaticConfig.scope.split(' '),\n clientConfig: {\n clientId: oauthStaticConfig.clientId,\n ...(oauthStaticConfig.clientSecret && { clientSecret: oauthStaticConfig.clientSecret }),\n },\n });\n\n // DCR uses bearer token authentication with middleware validation\n const middleware = primary.authMiddleware();\n\n // Create auth email provider (stateless)\n const authAdapter: AuthEmailProvider = {\n getUserEmail: () => {\n throw new Error('DCR mode does not support getUserEmail - tokens are provided via bearer auth');\n },\n };\n\n // No account management tools for DCR\n const accountTools: ToolModule[] = [];\n const accountPrompts: PromptModule[] = [];\n\n return { primary, middleware: middleware as unknown as AuthMiddleware, authAdapter, accountTools, accountPrompts, dcrRouter };\n }\n\n if (config.auth === 'service-account') {\n // Service account mode - JWT-based authentication\n if (!oauthStaticConfig.serviceAccountKeyFile) {\n throw new Error('Service account key file is required when auth mode is \"service-account\". ' + 'Set GOOGLE_SERVICE_ACCOUNT_KEY_FILE environment variable or use --service-account-key-file flag.');\n }\n\n logger.debug('Creating service account provider', { service: oauthStaticConfig.service });\n primary = new ServiceAccountProvider({\n keyFilePath: oauthStaticConfig.serviceAccountKeyFile,\n scopes: oauthStaticConfig.scope.split(' '),\n logger,\n });\n } else {\n // Loopback mode - interactive OAuth with token storage\n logger.debug('Creating loopback OAuth provider', { service: oauthStaticConfig.service });\n primary = new LoopbackOAuthProvider({\n service: oauthStaticConfig.service,\n clientId: oauthStaticConfig.clientId,\n clientSecret: oauthStaticConfig.clientSecret,\n scope: oauthStaticConfig.scope,\n headless: oauthStaticConfig.headless,\n logger,\n tokenStore,\n ...(oauthStaticConfig.redirectUri !== undefined && {\n redirectUri: oauthStaticConfig.redirectUri,\n }),\n });\n }\n\n // Create auth email provider (used by account management tools)\n const authAdapter: AuthEmailProvider = {\n getUserEmail: (accountId) => primary.getUserEmail(accountId),\n ...('authenticateNewAccount' in primary && primary.authenticateNewAccount\n ? {\n authenticateNewAccount: () => primary.authenticateNewAccount?.(),\n }\n : {}),\n };\n\n // Select middleware AND account tools based on auth mode\n let middleware: ReturnType<LoopbackOAuthProvider['authMiddleware']>;\n let accountTools: ToolModule[];\n let accountPrompts: PromptModule[];\n\n if (oauthStaticConfig.auth === 'service-account') {\n // Service account mode - no account management tools needed (single identity)\n middleware = primary.authMiddleware();\n accountTools = [];\n accountPrompts = [];\n logger.debug('Service account mode - no account tools', { service: oauthStaticConfig.service });\n } else {\n // Loopback OAuth - multi-account mode\n middleware = primary.authMiddleware();\n\n const result = AccountServer.createLoopback({\n service: oauthStaticConfig.service,\n store: tokenStore,\n logger,\n auth: authAdapter,\n });\n accountTools = result.tools as ToolModule[];\n accountPrompts = result.prompts as PromptModule[];\n logger.debug('Loopback OAuth (multi-account mode)', { service: oauthStaticConfig.service });\n }\n\n return { primary, middleware: middleware as unknown as AuthMiddleware, authAdapter, accountTools, accountPrompts };\n}\n"],"names":["createOAuthAdapters","config","deps","baseUrl","logger","tokenStore","dcrStore","resolvedBaseUrl","oauthStaticConfig","primary","dcrRouter","middleware","authAdapter","accountTools","accountPrompts","result","service","name","clientId","clientSecret","scope","GOOGLE_SCOPE","auth","headless","redirectUri","transport","type","undefined","serviceAccountKeyFile","debug","Error","DcrOAuthProvider","verifyEndpoint","createDcrRouter","store","issuerUrl","scopesSupported","split","clientConfig","authMiddleware","getUserEmail","ServiceAccountProvider","keyFilePath","scopes","LoopbackOAuthProvider","accountId","authenticateNewAccount","AccountServer","createLoopback","tools","prompts"],"mappings":";;;;+BAuDsBA;;;eAAAA;;;qBAvDgC;2BAE2C;2BAIpE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAiDtB,SAAeA,oBAAoBC,MAAoB,EAAEC,IAAsB,EAAEC,OAAgB;;YAC9FC,QAAQC,YAAYC,UACtBC,iBACAC,mBAaFC,SAwBIC,WAYAC,YAGAC,aAOAC,cACAC,gBAmCFF,cAUFD,aACAE,eACAC,iBAYIC;;YAzHAX,SAAiCF,KAAjCE,QAAQC,aAAyBH,KAAzBG,YAAYC,WAAaJ,KAAbI;YACtBC,kBAAkBJ,oBAAAA,qBAAAA,UAAWF,OAAOE,OAAO;YAC3CK,oBAAoB;gBACxBQ,SAASf,OAAOgB,IAAI;gBACpBC,UAAUjB,OAAOiB,QAAQ;gBACzBC,cAAclB,OAAOkB,YAAY;gBACjCC,OAAOC,yBAAY;gBACnBC,MAAMrB,OAAOqB,IAAI;gBACjBC,UAAUtB,OAAOsB,QAAQ;gBACzBC,aAAavB,OAAOwB,SAAS,CAACC,IAAI,KAAK,UAAUC,YAAY1B,OAAOuB,WAAW;eAC3EvB,OAAO2B,qBAAqB,IAAI;gBAAEA,uBAAuB3B,OAAO2B,qBAAqB;YAAC,GACtFrB,mBAAmB;gBAAEJ,SAASI;YAAgB;YAMpD,gEAAgE;YAChE,IAAIC,kBAAkBc,IAAI,KAAK,OAAO;gBACpClB,OAAOyB,KAAK,CAAC,yBAAyB;oBAAEb,SAASR,kBAAkBQ,OAAO;gBAAC;gBAE3E,oCAAoC;gBACpC,IAAI,CAACV,UAAU;oBACb,MAAM,IAAIwB,MAAM;gBAClB;gBACA,IAAI,CAACtB,kBAAkBL,OAAO,EAAE;oBAC9B,MAAM,IAAI2B,MAAM;gBAClB;gBAEA,8FAA8F;gBAC9FrB,UAAU,IAAIsB,6BAAgB,CAAC;oBAC7Bb,UAAUV,kBAAkBU,QAAQ;mBAChCV,kBAAkBW,YAAY,IAAI;oBAAEA,cAAcX,kBAAkBW,YAAY;gBAAC;oBACrFC,OAAOZ,kBAAkBY,KAAK;oBAC9BY,gBAAgB,AAAC,GAA4B,OAA1BxB,kBAAkBL,OAAO,EAAC;oBAC7CC,QAAAA;;gBAGF,8DAA8D;gBACxDM,YAAYuB,IAAAA,4BAAe,EAAC;oBAChCC,OAAO5B;oBACP6B,WAAW3B,kBAAkBL,OAAO;oBACpCA,SAASK,kBAAkBL,OAAO;oBAClCiC,iBAAiB5B,kBAAkBY,KAAK,CAACiB,KAAK,CAAC;oBAC/CC,cAAc;wBACZpB,UAAUV,kBAAkBU,QAAQ;uBAChCV,kBAAkBW,YAAY,IAAI;wBAAEA,cAAcX,kBAAkBW,YAAY;oBAAC;gBAEzF;gBAEA,kEAAkE;gBAC5DR,aAAaF,QAAQ8B,cAAc;gBAEzC,yCAAyC;gBACnC3B,cAAiC;oBACrC4B,cAAc;wBACZ,MAAM,IAAIV,MAAM;oBAClB;gBACF;gBAEA,sCAAsC;gBAChCjB;gBACAC;gBAEN;;oBAAO;wBAAEL,SAAAA;wBAASE,YAAYA;wBAAyCC,aAAAA;wBAAaC,cAAAA;wBAAcC,gBAAAA;wBAAgBJ,WAAAA;oBAAU;;YAC9H;YAEA,IAAIT,OAAOqB,IAAI,KAAK,mBAAmB;gBACrC,kDAAkD;gBAClD,IAAI,CAACd,kBAAkBoB,qBAAqB,EAAE;oBAC5C,MAAM,IAAIE,MAAM,+EAA+E;gBACjG;gBAEA1B,OAAOyB,KAAK,CAAC,qCAAqC;oBAAEb,SAASR,kBAAkBQ,OAAO;gBAAC;gBACvFP,UAAU,IAAIgC,mCAAsB,CAAC;oBACnCC,aAAalC,kBAAkBoB,qBAAqB;oBACpDe,QAAQnC,kBAAkBY,KAAK,CAACiB,KAAK,CAAC;oBACtCjC,QAAAA;gBACF;YACF,OAAO;gBACL,uDAAuD;gBACvDA,OAAOyB,KAAK,CAAC,oCAAoC;oBAAEb,SAASR,kBAAkBQ,OAAO;gBAAC;gBACtFP,UAAU,IAAImC,kCAAqB,CAAC;oBAClC5B,SAASR,kBAAkBQ,OAAO;oBAClCE,UAAUV,kBAAkBU,QAAQ;oBACpCC,cAAcX,kBAAkBW,YAAY;oBAC5CC,OAAOZ,kBAAkBY,KAAK;oBAC9BG,UAAUf,kBAAkBe,QAAQ;oBACpCnB,QAAAA;oBACAC,YAAAA;mBACIG,kBAAkBgB,WAAW,KAAKG,aAAa;oBACjDH,aAAahB,kBAAkBgB,WAAW;gBAC5C;YAEJ;YAEA,gEAAgE;YAC1DZ,eAAiC;gBACrC4B,cAAc,SAACK;2BAAcpC,QAAQ+B,YAAY,CAACK;;eAC9C,4BAA4BpC,WAAWA,QAAQqC,sBAAsB,GACrE;gBACEA,wBAAwB;wBAAMrC;4BAAAA,kCAAAA,QAAQqC,sBAAsB,cAA9BrC,sDAAAA,qCAAAA;;YAChC,IACA,CAAC;YAQP,IAAID,kBAAkBc,IAAI,KAAK,mBAAmB;gBAChD,8EAA8E;gBAC9EX,cAAaF,QAAQ8B,cAAc;gBACnC1B;gBACAC;gBACAV,OAAOyB,KAAK,CAAC,2CAA2C;oBAAEb,SAASR,kBAAkBQ,OAAO;gBAAC;YAC/F,OAAO;gBACL,sCAAsC;gBACtCL,cAAaF,QAAQ8B,cAAc;gBAE7BxB,SAASgC,oBAAa,CAACC,cAAc,CAAC;oBAC1ChC,SAASR,kBAAkBQ,OAAO;oBAClCkB,OAAO7B;oBACPD,QAAAA;oBACAkB,MAAMV;gBACR;gBACAC,gBAAeE,OAAOkC,KAAK;gBAC3BnC,kBAAiBC,OAAOmC,OAAO;gBAC/B9C,OAAOyB,KAAK,CAAC,uCAAuC;oBAAEb,SAASR,kBAAkBQ,OAAO;gBAAC;YAC3F;YAEA;;gBAAO;oBAAEP,SAAAA;oBAASE,YAAYA;oBAAyCC,aAAAA;oBAAaC,cAAAA;oBAAcC,gBAAAA;gBAAe;;;IACnH"}
|
|
1
|
+
{"version":3,"sources":["/Users/kevin/Dev/Projects/mcp-z/mcp-drive/src/setup/oauth-google.ts"],"sourcesContent":["import { type AccountAuthProvider, AccountServer } from '@mcp-z/oauth';\nimport type { CachedToken } from '@mcp-z/oauth-google';\nimport { createDcrRouter, createLoopbackCallbackRouter, DcrOAuthProvider, LoopbackOAuthProvider, ServiceAccountProvider } from '@mcp-z/oauth-google';\nimport type { Logger, PromptModule, ToolModule } from '@mcp-z/server';\nimport type { Router } from 'express';\nimport type { Keyv } from 'keyv';\nimport { GOOGLE_SCOPE } from '../constants.ts';\nimport type { ServerConfig } from '../types.ts';\n\n/**\n * Drive OAuth runtime dependencies\n */\nexport interface OAuthRuntimeDeps {\n logger: Logger;\n tokenStore: Keyv<CachedToken>;\n dcrStore?: Keyv<unknown>;\n}\n\n/**\n * Auth middleware wrapper with withToolAuth/withResourceAuth/withPromptAuth methods\n * Uses structural constraints to avoid contravariance issues with handler types.\n */\nexport interface AuthMiddleware {\n withToolAuth<T extends { name: string; config: unknown; handler: unknown }>(module: T): T;\n withResourceAuth<T extends { name: string; template?: unknown; config?: unknown; handler: unknown }>(module: T): T;\n withPromptAuth<T extends { name: string; config: unknown; handler: unknown }>(module: T): T;\n}\n\n/**\n * Result of OAuth adapter creation\n */\nexport interface OAuthAdapters {\n primary: LoopbackOAuthProvider | ServiceAccountProvider | DcrOAuthProvider;\n middleware: AuthMiddleware;\n authAdapter: AccountAuthProvider;\n accountTools: ToolModule[];\n accountPrompts: PromptModule[];\n dcrRouter?: Router;\n loopbackRouter?: Router;\n}\n\n/**\n * Create Drive OAuth adapters based on transport configuration\n *\n * Returns primary adapter (loopback or service account), pre-configured middleware,\n * auth email provider, and pre-selected account tools based on auth mode.\n *\n * Primary adapter selection is based on auth mode:\n * - 'loopback-oauth': LoopbackOAuthProvider (interactive OAuth with token storage)\n * - 'service-account': ServiceAccountProvider (JWT-based authentication)\n *\n * @param config - Server configuration (transport + auth settings)\n * @param deps - Runtime dependencies (logger, tokenStore, etc.)\n * @returns OAuth adapters with pre-configured middleware and account tools\n * @throws Error if service account mode but no key file provided\n */\nexport async function createOAuthAdapters(config: ServerConfig, deps: OAuthRuntimeDeps, baseUrl?: string): Promise<OAuthAdapters> {\n const { logger, tokenStore, dcrStore } = deps;\n const resolvedBaseUrl = baseUrl ?? config.baseUrl;\n const oauthStaticConfig = {\n service: config.name,\n clientId: config.clientId,\n clientSecret: config.clientSecret,\n scope: GOOGLE_SCOPE,\n auth: config.auth,\n headless: config.headless,\n redirectUri: config.transport.type === 'stdio' ? undefined : config.redirectUri,\n ...(config.serviceAccountKeyFile && { serviceAccountKeyFile: config.serviceAccountKeyFile }),\n ...(resolvedBaseUrl && { baseUrl: resolvedBaseUrl }),\n };\n\n // Create primary adapter based on auth mode\n let primary: LoopbackOAuthProvider | ServiceAccountProvider | DcrOAuthProvider;\n\n // DCR mode - Dynamic Client Registration with HTTP-only support\n if (oauthStaticConfig.auth === 'dcr') {\n logger.debug('Creating DCR provider', { service: oauthStaticConfig.service });\n\n // DCR requires dcrStore and baseUrl\n if (!dcrStore) {\n throw new Error('DCR mode requires dcrStore to be configured');\n }\n if (!oauthStaticConfig.baseUrl) {\n throw new Error('DCR mode requires baseUrl to be configured');\n }\n\n // Create DcrOAuthProvider (stateless provider that receives tokens from verification context)\n primary = new DcrOAuthProvider({\n clientId: oauthStaticConfig.clientId,\n ...(oauthStaticConfig.clientSecret && { clientSecret: oauthStaticConfig.clientSecret }),\n scope: oauthStaticConfig.scope,\n verifyEndpoint: `${oauthStaticConfig.baseUrl}/oauth/verify`,\n logger,\n });\n\n // Create DCR OAuth router with authorization server endpoints\n const dcrRouter = createDcrRouter({\n store: dcrStore,\n issuerUrl: oauthStaticConfig.baseUrl,\n baseUrl: oauthStaticConfig.baseUrl,\n scopesSupported: oauthStaticConfig.scope.split(' '),\n clientConfig: {\n clientId: oauthStaticConfig.clientId,\n ...(oauthStaticConfig.clientSecret && { clientSecret: oauthStaticConfig.clientSecret }),\n },\n });\n\n // DCR uses bearer token authentication with middleware validation\n const middleware = primary.authMiddleware();\n\n // Create auth email provider (stateless)\n const authAdapter: AccountAuthProvider = {\n getAccessToken: () => {\n throw new Error('DCR mode does not support getAccessToken - tokens are provided via bearer auth');\n },\n getUserEmail: () => {\n throw new Error('DCR mode does not support getUserEmail - tokens are provided via bearer auth');\n },\n };\n\n // No account management tools for DCR\n const accountTools: ToolModule[] = [];\n const accountPrompts: PromptModule[] = [];\n\n return { primary, middleware: middleware as unknown as AuthMiddleware, authAdapter, accountTools, accountPrompts, dcrRouter };\n }\n\n if (config.auth === 'service-account') {\n // Service account mode - JWT-based authentication\n if (!oauthStaticConfig.serviceAccountKeyFile) {\n throw new Error('Service account key file is required when auth mode is \"service-account\". ' + 'Set GOOGLE_SERVICE_ACCOUNT_KEY_FILE environment variable or use --service-account-key-file flag.');\n }\n\n logger.debug('Creating service account provider', { service: oauthStaticConfig.service });\n primary = new ServiceAccountProvider({\n keyFilePath: oauthStaticConfig.serviceAccountKeyFile,\n scopes: oauthStaticConfig.scope.split(' '),\n logger,\n });\n } else {\n // Loopback mode - interactive OAuth with token storage\n logger.debug('Creating loopback OAuth provider', { service: oauthStaticConfig.service });\n primary = new LoopbackOAuthProvider({\n service: oauthStaticConfig.service,\n clientId: oauthStaticConfig.clientId,\n clientSecret: oauthStaticConfig.clientSecret,\n scope: oauthStaticConfig.scope,\n headless: oauthStaticConfig.headless,\n logger,\n tokenStore,\n ...(oauthStaticConfig.redirectUri !== undefined && {\n redirectUri: oauthStaticConfig.redirectUri,\n }),\n });\n }\n\n // Create auth email provider (used by account management tools)\n const authAdapter: AccountAuthProvider = primary;\n\n // Select middleware AND account tools based on auth mode\n let middleware: ReturnType<LoopbackOAuthProvider['authMiddleware']>;\n let accountTools: ToolModule[];\n let accountPrompts: PromptModule[];\n\n if (oauthStaticConfig.auth === 'service-account') {\n // Service account mode - no account management tools needed (single identity)\n middleware = primary.authMiddleware();\n accountTools = [];\n accountPrompts = [];\n logger.debug('Service account mode - no account tools', { service: oauthStaticConfig.service });\n } else {\n // Loopback OAuth - multi-account mode\n middleware = primary.authMiddleware();\n\n const result = AccountServer.createLoopback({\n service: oauthStaticConfig.service,\n store: tokenStore,\n logger,\n auth: authAdapter,\n });\n accountTools = result.tools as ToolModule[];\n accountPrompts = result.prompts as PromptModule[];\n logger.debug('Loopback OAuth (multi-account mode)', { service: oauthStaticConfig.service });\n }\n\n const loopbackRouter = primary instanceof LoopbackOAuthProvider && oauthStaticConfig.redirectUri ? createLoopbackCallbackRouter(primary) : undefined;\n\n return { primary, middleware: middleware as unknown as AuthMiddleware, authAdapter, accountTools, accountPrompts, loopbackRouter };\n}\n"],"names":["createOAuthAdapters","config","deps","baseUrl","logger","tokenStore","dcrStore","resolvedBaseUrl","oauthStaticConfig","primary","dcrRouter","middleware","authAdapter","accountTools","accountPrompts","result","loopbackRouter","service","name","clientId","clientSecret","scope","GOOGLE_SCOPE","auth","headless","redirectUri","transport","type","undefined","serviceAccountKeyFile","debug","Error","DcrOAuthProvider","verifyEndpoint","createDcrRouter","store","issuerUrl","scopesSupported","split","clientConfig","authMiddleware","getAccessToken","getUserEmail","ServiceAccountProvider","keyFilePath","scopes","LoopbackOAuthProvider","AccountServer","createLoopback","tools","prompts","createLoopbackCallbackRouter"],"mappings":";;;;+BAwDsBA;;;eAAAA;;;qBAxDkC;2BAEuE;2BAIlG;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAkDtB,SAAeA,oBAAoBC,MAAoB,EAAEC,IAAsB,EAAEC,OAAgB;;YAC9FC,QAAQC,YAAYC,UACtBC,iBACAC,mBAaFC,SAwBIC,WAYAC,YAGAC,aAUAC,cACAC,gBAmCFF,cAGFD,aACAE,eACAC,iBAYIC,QAWFC;;YAhIEZ,SAAiCF,KAAjCE,QAAQC,aAAyBH,KAAzBG,YAAYC,WAAaJ,KAAbI;YACtBC,kBAAkBJ,oBAAAA,qBAAAA,UAAWF,OAAOE,OAAO;YAC3CK,oBAAoB;gBACxBS,SAAShB,OAAOiB,IAAI;gBACpBC,UAAUlB,OAAOkB,QAAQ;gBACzBC,cAAcnB,OAAOmB,YAAY;gBACjCC,OAAOC,yBAAY;gBACnBC,MAAMtB,OAAOsB,IAAI;gBACjBC,UAAUvB,OAAOuB,QAAQ;gBACzBC,aAAaxB,OAAOyB,SAAS,CAACC,IAAI,KAAK,UAAUC,YAAY3B,OAAOwB,WAAW;eAC3ExB,OAAO4B,qBAAqB,IAAI;gBAAEA,uBAAuB5B,OAAO4B,qBAAqB;YAAC,GACtFtB,mBAAmB;gBAAEJ,SAASI;YAAgB;YAMpD,gEAAgE;YAChE,IAAIC,kBAAkBe,IAAI,KAAK,OAAO;gBACpCnB,OAAO0B,KAAK,CAAC,yBAAyB;oBAAEb,SAAST,kBAAkBS,OAAO;gBAAC;gBAE3E,oCAAoC;gBACpC,IAAI,CAACX,UAAU;oBACb,MAAM,IAAIyB,MAAM;gBAClB;gBACA,IAAI,CAACvB,kBAAkBL,OAAO,EAAE;oBAC9B,MAAM,IAAI4B,MAAM;gBAClB;gBAEA,8FAA8F;gBAC9FtB,UAAU,IAAIuB,6BAAgB,CAAC;oBAC7Bb,UAAUX,kBAAkBW,QAAQ;mBAChCX,kBAAkBY,YAAY,IAAI;oBAAEA,cAAcZ,kBAAkBY,YAAY;gBAAC;oBACrFC,OAAOb,kBAAkBa,KAAK;oBAC9BY,gBAAgB,AAAC,GAA4B,OAA1BzB,kBAAkBL,OAAO,EAAC;oBAC7CC,QAAAA;;gBAGF,8DAA8D;gBACxDM,YAAYwB,IAAAA,4BAAe,EAAC;oBAChCC,OAAO7B;oBACP8B,WAAW5B,kBAAkBL,OAAO;oBACpCA,SAASK,kBAAkBL,OAAO;oBAClCkC,iBAAiB7B,kBAAkBa,KAAK,CAACiB,KAAK,CAAC;oBAC/CC,cAAc;wBACZpB,UAAUX,kBAAkBW,QAAQ;uBAChCX,kBAAkBY,YAAY,IAAI;wBAAEA,cAAcZ,kBAAkBY,YAAY;oBAAC;gBAEzF;gBAEA,kEAAkE;gBAC5DT,aAAaF,QAAQ+B,cAAc;gBAEzC,yCAAyC;gBACnC5B,cAAmC;oBACvC6B,gBAAgB;wBACd,MAAM,IAAIV,MAAM;oBAClB;oBACAW,cAAc;wBACZ,MAAM,IAAIX,MAAM;oBAClB;gBACF;gBAEA,sCAAsC;gBAChClB;gBACAC;gBAEN;;oBAAO;wBAAEL,SAAAA;wBAASE,YAAYA;wBAAyCC,aAAAA;wBAAaC,cAAAA;wBAAcC,gBAAAA;wBAAgBJ,WAAAA;oBAAU;;YAC9H;YAEA,IAAIT,OAAOsB,IAAI,KAAK,mBAAmB;gBACrC,kDAAkD;gBAClD,IAAI,CAACf,kBAAkBqB,qBAAqB,EAAE;oBAC5C,MAAM,IAAIE,MAAM,+EAA+E;gBACjG;gBAEA3B,OAAO0B,KAAK,CAAC,qCAAqC;oBAAEb,SAAST,kBAAkBS,OAAO;gBAAC;gBACvFR,UAAU,IAAIkC,mCAAsB,CAAC;oBACnCC,aAAapC,kBAAkBqB,qBAAqB;oBACpDgB,QAAQrC,kBAAkBa,KAAK,CAACiB,KAAK,CAAC;oBACtClC,QAAAA;gBACF;YACF,OAAO;gBACL,uDAAuD;gBACvDA,OAAO0B,KAAK,CAAC,oCAAoC;oBAAEb,SAAST,kBAAkBS,OAAO;gBAAC;gBACtFR,UAAU,IAAIqC,kCAAqB,CAAC;oBAClC7B,SAAST,kBAAkBS,OAAO;oBAClCE,UAAUX,kBAAkBW,QAAQ;oBACpCC,cAAcZ,kBAAkBY,YAAY;oBAC5CC,OAAOb,kBAAkBa,KAAK;oBAC9BG,UAAUhB,kBAAkBgB,QAAQ;oBACpCpB,QAAAA;oBACAC,YAAAA;mBACIG,kBAAkBiB,WAAW,KAAKG,aAAa;oBACjDH,aAAajB,kBAAkBiB,WAAW;gBAC5C;YAEJ;YAEA,gEAAgE;YAC1Db,eAAmCH;YAOzC,IAAID,kBAAkBe,IAAI,KAAK,mBAAmB;gBAChD,8EAA8E;gBAC9EZ,cAAaF,QAAQ+B,cAAc;gBACnC3B;gBACAC;gBACAV,OAAO0B,KAAK,CAAC,2CAA2C;oBAAEb,SAAST,kBAAkBS,OAAO;gBAAC;YAC/F,OAAO;gBACL,sCAAsC;gBACtCN,cAAaF,QAAQ+B,cAAc;gBAE7BzB,SAASgC,oBAAa,CAACC,cAAc,CAAC;oBAC1C/B,SAAST,kBAAkBS,OAAO;oBAClCkB,OAAO9B;oBACPD,QAAAA;oBACAmB,MAAMX;gBACR;gBACAC,gBAAeE,OAAOkC,KAAK;gBAC3BnC,kBAAiBC,OAAOmC,OAAO;gBAC/B9C,OAAO0B,KAAK,CAAC,uCAAuC;oBAAEb,SAAST,kBAAkBS,OAAO;gBAAC;YAC3F;YAEMD,iBAAiBP,AAAO,YAAPA,SAAmBqC,kCAAqB,KAAItC,kBAAkBiB,WAAW,GAAG0B,IAAAA,yCAA4B,EAAC1C,WAAWmB;YAE3I;;gBAAO;oBAAEnB,SAAAA;oBAASE,YAAYA;oBAAyCC,aAAAA;oBAAaC,cAAAA;oBAAcC,gBAAAA;oBAAgBE,gBAAAA;gBAAe;;;IACnI"}
|
|
@@ -33,9 +33,9 @@ var _server = require("@mcp-z/server");
|
|
|
33
33
|
var _fs = /*#__PURE__*/ _interop_require_wildcard(require("fs"));
|
|
34
34
|
var _path = /*#__PURE__*/ _interop_require_wildcard(require("path"));
|
|
35
35
|
var _pino = /*#__PURE__*/ _interop_require_default(require("pino"));
|
|
36
|
-
var
|
|
37
|
-
var
|
|
38
|
-
var
|
|
36
|
+
var _createstorets = /*#__PURE__*/ _interop_require_default(require("../lib/create-store.js"));
|
|
37
|
+
var _indexts = /*#__PURE__*/ _interop_require_wildcard(require("../mcp/index.js"));
|
|
38
|
+
var _oauthgooglets = require("./oauth-google.js");
|
|
39
39
|
function asyncGeneratorStep(gen, resolve, reject, _next, _throw, key, arg) {
|
|
40
40
|
try {
|
|
41
41
|
var info = gen[key](arg);
|
|
@@ -232,7 +232,7 @@ function createTokenStore(baseDir) {
|
|
|
232
232
|
storeUri = process.env.STORE_URI || "file://".concat(_path.join(baseDir, 'tokens.json'));
|
|
233
233
|
return [
|
|
234
234
|
2,
|
|
235
|
-
(0,
|
|
235
|
+
(0, _createstorets.default)(storeUri)
|
|
236
236
|
];
|
|
237
237
|
});
|
|
238
238
|
})();
|
|
@@ -248,7 +248,7 @@ function createDcrStore(baseDir, required) {
|
|
|
248
248
|
dcrStoreUri = process.env.DCR_STORE_URI || "file://".concat(_path.join(baseDir, 'dcr.json'));
|
|
249
249
|
return [
|
|
250
250
|
2,
|
|
251
|
-
(0,
|
|
251
|
+
(0, _createstorets.default)(dcrStoreUri)
|
|
252
252
|
];
|
|
253
253
|
});
|
|
254
254
|
})();
|
|
@@ -293,7 +293,7 @@ function createDefaultRuntime(config, overrides) {
|
|
|
293
293
|
dcrStore = _state.sent();
|
|
294
294
|
return [
|
|
295
295
|
4,
|
|
296
|
-
(0,
|
|
296
|
+
(0, _oauthgooglets.createOAuthAdapters)(config, {
|
|
297
297
|
logger: logger,
|
|
298
298
|
tokenStore: tokenStore,
|
|
299
299
|
dcrStore: dcrStore
|
|
@@ -310,13 +310,13 @@ function createDefaultRuntime(config, overrides) {
|
|
|
310
310
|
};
|
|
311
311
|
createDomainModules = (_ref = overrides === null || overrides === void 0 ? void 0 : overrides.createDomainModules) !== null && _ref !== void 0 ? _ref : function() {
|
|
312
312
|
return {
|
|
313
|
-
tools: Object.values(
|
|
313
|
+
tools: Object.values(_indexts.toolFactories).map(function(factory) {
|
|
314
314
|
return factory();
|
|
315
315
|
}),
|
|
316
|
-
resources: Object.values(
|
|
316
|
+
resources: Object.values(_indexts.resourceFactories).map(function(factory) {
|
|
317
317
|
return factory();
|
|
318
318
|
}),
|
|
319
|
-
prompts: Object.values(
|
|
319
|
+
prompts: Object.values(_indexts.promptFactories).map(function(factory) {
|
|
320
320
|
return factory();
|
|
321
321
|
})
|
|
322
322
|
};
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["/Users/kevin/Dev/Projects/
|
|
1
|
+
{"version":3,"sources":["/Users/kevin/Dev/Projects/mcp-z/mcp-drive/src/setup/runtime.ts"],"sourcesContent":["import { sanitizeForLoggingFormatter } from '@mcp-z/oauth';\nimport type { CachedToken } from '@mcp-z/oauth-google';\nimport type { Logger, MiddlewareLayer } from '@mcp-z/server';\nimport { createLoggingMiddleware } from '@mcp-z/server';\nimport * as fs from 'fs';\nimport * as path from 'path';\nimport pino from 'pino';\nimport createStore from '../lib/create-store.ts';\nimport * as mcp from '../mcp/index.ts';\nimport type { CommonRuntime, RuntimeDeps, RuntimeOverrides, ServerConfig } from '../types.ts';\nimport { type AuthMiddleware, createOAuthAdapters } from './oauth-google.ts';\n\nexport function createLogger(config: ServerConfig): Logger {\n const hasStdio = config.transport.type === 'stdio';\n const logsPath = path.join(config.baseDir, 'logs', `${config.name}.log`);\n if (hasStdio) fs.mkdirSync(path.dirname(logsPath), { recursive: true });\n return pino({ level: config.logLevel ?? 'info', formatters: sanitizeForLoggingFormatter() }, hasStdio ? pino.destination({ dest: logsPath, sync: false }) : pino.destination(1));\n}\n\nexport async function createTokenStore(baseDir: string) {\n const storeUri = process.env.STORE_URI || `file://${path.join(baseDir, 'tokens.json')}`;\n return createStore<CachedToken>(storeUri);\n}\n\nexport async function createDcrStore(baseDir: string, required: boolean) {\n if (!required) return undefined;\n const dcrStoreUri = process.env.DCR_STORE_URI || `file://${path.join(baseDir, 'dcr.json')}`;\n return createStore<unknown>(dcrStoreUri);\n}\n\nexport function createAuthLayer(authMiddleware: AuthMiddleware): MiddlewareLayer {\n return {\n withTool: authMiddleware.withToolAuth,\n withResource: authMiddleware.withResourceAuth,\n withPrompt: authMiddleware.withPromptAuth,\n };\n}\n\nexport function createLoggingLayer(logger: Logger): MiddlewareLayer {\n const logging = createLoggingMiddleware({ logger });\n return {\n withTool: logging.withToolLogging,\n withResource: logging.withResourceLogging,\n withPrompt: logging.withPromptLogging,\n };\n}\n\nexport async function createDefaultRuntime(config: ServerConfig, overrides?: RuntimeOverrides): Promise<CommonRuntime> {\n if (config.auth === 'dcr' && config.transport.type !== 'http') throw new Error('DCR mode requires an HTTP transport');\n\n const logger = createLogger(config);\n const tokenStore = await createTokenStore(config.baseDir);\n const baseUrl = config.baseUrl ?? (config.transport.type === 'http' && config.transport.port ? `http://localhost:${config.transport.port}` : undefined);\n const dcrStore = await createDcrStore(config.baseDir, config.auth === 'dcr');\n const oauthAdapters = await createOAuthAdapters(config, { logger, tokenStore, dcrStore }, baseUrl);\n const deps: RuntimeDeps = { config, logger, tokenStore, oauthAdapters, baseUrl };\n const createDomainModules =\n overrides?.createDomainModules ??\n (() => ({\n tools: Object.values(mcp.toolFactories).map((factory) => factory()),\n resources: Object.values(mcp.resourceFactories).map((factory) => factory()),\n prompts: Object.values(mcp.promptFactories).map((factory) => factory()),\n }));\n const middlewareFactories = overrides?.middlewareFactories ?? [() => createAuthLayer(oauthAdapters.middleware), () => createLoggingLayer(logger)];\n\n return {\n deps,\n middlewareFactories,\n createDomainModules,\n close: async () => {},\n };\n}\n"],"names":["createAuthLayer","createDcrStore","createDefaultRuntime","createLogger","createLoggingLayer","createTokenStore","config","hasStdio","transport","type","logsPath","path","join","baseDir","name","fs","mkdirSync","dirname","recursive","pino","level","logLevel","formatters","sanitizeForLoggingFormatter","destination","dest","sync","storeUri","process","env","STORE_URI","createStore","required","dcrStoreUri","undefined","DCR_STORE_URI","authMiddleware","withTool","withToolAuth","withResource","withResourceAuth","withPrompt","withPromptAuth","logger","logging","createLoggingMiddleware","withToolLogging","withResourceLogging","withPromptLogging","overrides","tokenStore","baseUrl","dcrStore","oauthAdapters","deps","createDomainModules","middlewareFactories","auth","Error","port","createOAuthAdapters","tools","Object","values","mcp","toolFactories","map","factory","resources","resourceFactories","prompts","promptFactories","middleware","close"],"mappings":";;;;;;;;;;;QA8BgBA;eAAAA;;QANMC;eAAAA;;QAuBAC;eAAAA;;QAnCNC;eAAAA;;QA0BAC;eAAAA;;QAnBMC;eAAAA;;;qBAnBsB;sBAGJ;0DACpB;4DACE;2DACL;oEACO;+DACH;6BAEoC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAElD,SAASF,aAAaG,MAAoB;QAI1BA;IAHrB,IAAMC,WAAWD,OAAOE,SAAS,CAACC,IAAI,KAAK;IAC3C,IAAMC,WAAWC,MAAKC,IAAI,CAACN,OAAOO,OAAO,EAAE,QAAQ,AAAC,GAAc,OAAZP,OAAOQ,IAAI,EAAC;IAClE,IAAIP,UAAUQ,IAAGC,SAAS,CAACL,MAAKM,OAAO,CAACP,WAAW;QAAEQ,WAAW;IAAK;IACrE,OAAOC,IAAAA,aAAI,EAAC;QAAEC,KAAK,GAAEd,mBAAAA,OAAOe,QAAQ,cAAff,8BAAAA,mBAAmB;QAAQgB,YAAYC,IAAAA,kCAA2B;IAAG,GAAGhB,WAAWY,aAAI,CAACK,WAAW,CAAC;QAAEC,MAAMf;QAAUgB,MAAM;IAAM,KAAKP,aAAI,CAACK,WAAW,CAAC;AAC/K;AAEO,SAAenB,iBAAiBQ,OAAe;;YAC9Cc;;YAAAA,WAAWC,QAAQC,GAAG,CAACC,SAAS,IAAI,AAAC,UAA2C,OAAlCnB,MAAKC,IAAI,CAACC,SAAS;YACvE;;gBAAOkB,IAAAA,sBAAW,EAAcJ;;;IAClC;;AAEO,SAAe1B,eAAeY,OAAe,EAAEmB,QAAiB;;YAE/DC;;YADN,IAAI,CAACD,UAAU;;gBAAOE;;YAChBD,cAAcL,QAAQC,GAAG,CAACM,aAAa,IAAI,AAAC,UAAwC,OAA/BxB,MAAKC,IAAI,CAACC,SAAS;YAC9E;;gBAAOkB,IAAAA,sBAAW,EAAUE;;;IAC9B;;AAEO,SAASjC,gBAAgBoC,cAA8B;IAC5D,OAAO;QACLC,UAAUD,eAAeE,YAAY;QACrCC,cAAcH,eAAeI,gBAAgB;QAC7CC,YAAYL,eAAeM,cAAc;IAC3C;AACF;AAEO,SAAStC,mBAAmBuC,MAAc;IAC/C,IAAMC,UAAUC,IAAAA,+BAAuB,EAAC;QAAEF,QAAAA;IAAO;IACjD,OAAO;QACLN,UAAUO,QAAQE,eAAe;QACjCP,cAAcK,QAAQG,mBAAmB;QACzCN,YAAYG,QAAQI,iBAAiB;IACvC;AACF;AAEO,SAAe9C,qBAAqBI,MAAoB,EAAE2C,SAA4B;;YAK3E3C,8BAFVqC,QACAO,YACAC,SACAC,UACAC,eACAC,MACAC,qBAOAC;;;;oBAfN,IAAIlD,OAAOmD,IAAI,KAAK,SAASnD,OAAOE,SAAS,CAACC,IAAI,KAAK,QAAQ,MAAM,IAAIiD,MAAM;oBAEzEf,SAASxC,aAAaG;oBACT;;wBAAMD,iBAAiBC,OAAOO,OAAO;;;oBAAlDqC,aAAa;oBACbC,WAAU7C,kBAAAA,OAAO6C,OAAO,cAAd7C,6BAAAA,kBAAmBA,OAAOE,SAAS,CAACC,IAAI,KAAK,UAAUH,OAAOE,SAAS,CAACmD,IAAI,GAAG,AAAC,oBAAyC,OAAtBrD,OAAOE,SAAS,CAACmD,IAAI,IAAKzB;oBAC5H;;wBAAMjC,eAAeK,OAAOO,OAAO,EAAEP,OAAOmD,IAAI,KAAK;;;oBAAhEL,WAAW;oBACK;;wBAAMQ,IAAAA,kCAAmB,EAACtD,QAAQ;4BAAEqC,QAAAA;4BAAQO,YAAAA;4BAAYE,UAAAA;wBAAS,GAAGD;;;oBAApFE,gBAAgB;oBAChBC,OAAoB;wBAAEhD,QAAAA;wBAAQqC,QAAAA;wBAAQO,YAAAA;wBAAYG,eAAAA;wBAAeF,SAAAA;oBAAQ;oBACzEI,8BACJN,sBAAAA,gCAAAA,UAAWM,mBAAmB,uCAC7B;+BAAO;4BACNM,OAAOC,OAAOC,MAAM,CAACC,SAAIC,aAAa,EAAEC,GAAG,CAAC,SAACC;uCAAYA;;4BACzDC,WAAWN,OAAOC,MAAM,CAACC,SAAIK,iBAAiB,EAAEH,GAAG,CAAC,SAACC;uCAAYA;;4BACjEG,SAASR,OAAOC,MAAM,CAACC,SAAIO,eAAe,EAAEL,GAAG,CAAC,SAACC;uCAAYA;;wBAC/D;;oBACIX,+BAAsBP,sBAAAA,gCAAAA,UAAWO,mBAAmB;wBAAK;mCAAMxD,gBAAgBqD,cAAcmB,UAAU;;wBAAG;mCAAMpE,mBAAmBuC;;;oBAEzI;;wBAAO;4BACLW,MAAAA;4BACAE,qBAAAA;4BACAD,qBAAAA;4BACAkB,OAAO;;;;;;;gCAAa;;wBACtB;;;;IACF"}
|
package/dist/cjs/setup/stdio.js
CHANGED
|
@@ -10,7 +10,7 @@ Object.defineProperty(exports, "createStdioServer", {
|
|
|
10
10
|
});
|
|
11
11
|
var _server = require("@mcp-z/server");
|
|
12
12
|
var _mcp = require("@modelcontextprotocol/sdk/server/mcp.js");
|
|
13
|
-
var
|
|
13
|
+
var _runtimets = require("./runtime.js");
|
|
14
14
|
function _array_like_to_array(arr, len) {
|
|
15
15
|
if (len == null || len > arr.length) len = arr.length;
|
|
16
16
|
for(var i = 0, arr2 = new Array(len); i < len; i++)arr2[i] = arr[i];
|
|
@@ -172,7 +172,7 @@ function createStdioServer(config, overrides) {
|
|
|
172
172
|
case 0:
|
|
173
173
|
return [
|
|
174
174
|
4,
|
|
175
|
-
(0,
|
|
175
|
+
(0, _runtimets.createDefaultRuntime)(config, overrides)
|
|
176
176
|
];
|
|
177
177
|
case 1:
|
|
178
178
|
runtime = _state.sent();
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["/Users/kevin/Dev/Projects/
|
|
1
|
+
{"version":3,"sources":["/Users/kevin/Dev/Projects/mcp-z/mcp-drive/src/setup/stdio.ts"],"sourcesContent":["import { composeMiddleware, connectStdio, registerPrompts, registerResources, registerTools } from '@mcp-z/server';\nimport { McpServer } from '@modelcontextprotocol/sdk/server/mcp.js';\nimport type { RuntimeOverrides, ServerConfig } from '../types.ts';\nimport { createDefaultRuntime } from './runtime.ts';\n\nexport async function createStdioServer(config: ServerConfig, overrides?: RuntimeOverrides) {\n const runtime = await createDefaultRuntime(config, overrides);\n const modules = runtime.createDomainModules();\n const layers = runtime.middlewareFactories.map((factory) => factory(runtime.deps));\n const composed = composeMiddleware(modules, layers);\n const logger = runtime.deps.logger;\n\n const tools = [...composed.tools, ...runtime.deps.oauthAdapters.accountTools];\n const prompts = [...composed.prompts, ...runtime.deps.oauthAdapters.accountPrompts];\n\n const mcpServer = new McpServer({ name: config.name, version: config.version });\n registerTools(mcpServer, tools);\n registerResources(mcpServer, composed.resources);\n registerPrompts(mcpServer, prompts);\n\n logger.info(`Starting ${config.name} MCP server (stdio)`);\n const { close } = await connectStdio(mcpServer, { logger });\n logger.info('stdio transport ready');\n\n return {\n mcpServer,\n logger,\n close: async () => {\n await close();\n await runtime.close();\n },\n };\n}\n"],"names":["createStdioServer","config","overrides","runtime","modules","layers","composed","logger","tools","prompts","mcpServer","close","createDefaultRuntime","createDomainModules","middlewareFactories","map","factory","deps","composeMiddleware","oauthAdapters","accountTools","accountPrompts","McpServer","name","version","registerTools","registerResources","resources","registerPrompts","info","connectStdio"],"mappings":";;;;+BAKsBA;;;eAAAA;;;sBAL6E;mBACzE;yBAEW;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAE9B,SAAeA,kBAAkBC,MAAoB,EAAEC,SAA4B;;YAClFC,SACAC,SACAC,QACAC,UACAC,QAEAC,OACAC,SAEAC,WAMEC;;;;oBAfQ;;wBAAMC,IAAAA,+BAAoB,EAACX,QAAQC;;;oBAA7CC,UAAU;oBACVC,UAAUD,QAAQU,mBAAmB;oBACrCR,SAASF,QAAQW,mBAAmB,CAACC,GAAG,CAAC,SAACC;+BAAYA,QAAQb,QAAQc,IAAI;;oBAC1EX,WAAWY,IAAAA,yBAAiB,EAACd,SAASC;oBACtCE,SAASJ,QAAQc,IAAI,CAACV,MAAM;oBAE5BC,QAAQ,AAAC,qBAAGF,SAASE,KAAK,SAAE,qBAAGL,QAAQc,IAAI,CAACE,aAAa,CAACC,YAAY;oBACtEX,UAAU,AAAC,qBAAGH,SAASG,OAAO,SAAE,qBAAGN,QAAQc,IAAI,CAACE,aAAa,CAACE,cAAc;oBAE5EX,YAAY,IAAIY,cAAS,CAAC;wBAAEC,MAAMtB,OAAOsB,IAAI;wBAAEC,SAASvB,OAAOuB,OAAO;oBAAC;oBAC7EC,IAAAA,qBAAa,EAACf,WAAWF;oBACzBkB,IAAAA,yBAAiB,EAAChB,WAAWJ,SAASqB,SAAS;oBAC/CC,IAAAA,uBAAe,EAAClB,WAAWD;oBAE3BF,OAAOsB,IAAI,CAAC,AAAC,YAAuB,OAAZ5B,OAAOsB,IAAI,EAAC;oBAClB;;wBAAMO,IAAAA,oBAAY,EAACpB,WAAW;4BAAEH,QAAAA;wBAAO;;;oBAAjDI,QAAU,cAAVA;oBACRJ,OAAOsB,IAAI,CAAC;oBAEZ;;wBAAO;4BACLnB,WAAAA;4BACAH,QAAAA;4BACAI,OAAO;;;;;gDACL;;oDAAMA;;;gDAAN;gDACA;;oDAAMR,QAAQQ,KAAK;;;gDAAnB;;;;;;gCACF;;wBACF;;;;IACF"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["/Users/kevin/Dev/Projects/
|
|
1
|
+
{"version":3,"sources":["/Users/kevin/Dev/Projects/mcp-z/mcp-drive/src/constants.ts"],"sourcesContent":["/**\n * Drive MCP Server Constants\n *\n * These scopes are required for Google Drive functionality and are hardcoded\n * rather than externally configured since this server knows its own requirements.\n */\n\n// Google OAuth scopes required for Drive operations\nexport const GOOGLE_SCOPE = 'openid https://www.googleapis.com/auth/userinfo.profile https://www.googleapis.com/auth/userinfo.email https://www.googleapis.com/auth/drive';\n"],"names":["GOOGLE_SCOPE"],"mappings":"AAAA;;;;;CAKC,GAED,oDAAoD;AACpD,OAAO,MAAMA,eAAe,+IAA+I"}
|
package/dist/esm/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["/Users/kevin/Dev/Projects/
|
|
1
|
+
{"version":3,"sources":["/Users/kevin/Dev/Projects/mcp-z/mcp-drive/src/index.ts"],"sourcesContent":["import { createConfig, handleVersionHelp } from './setup/config.ts';\nimport { createHTTPServer } from './setup/http.ts';\nimport { createStdioServer } from './setup/stdio.ts';\nimport type { ServerConfig } from './types.ts';\n\nexport { GOOGLE_SCOPE } from './constants.ts';\nexport * as mcp from './mcp/index.ts';\nexport * as schemas from './schemas/index.ts';\nexport * as setup from './setup/index.ts';\nexport * from './types.ts';\n\nexport async function startServer(config: ServerConfig): Promise<void> {\n const { logger, close } = config.transport.type === 'stdio' ? await createStdioServer(config) : await createHTTPServer(config);\n\n process.on('SIGINT', async () => {\n await close();\n process.exit(0);\n });\n\n logger.info(`Server started with ${config.transport.type} transport`);\n await new Promise(() => {});\n}\n\nexport default async function main(): Promise<void> {\n // Check for help/version flags FIRST, before config parsing\n const versionHelpResult = handleVersionHelp(process.argv);\n if (versionHelpResult.handled) {\n console.log(versionHelpResult.output);\n process.exit(0);\n }\n\n // Only parse config if no help/version flags\n const config = createConfig();\n await startServer(config);\n}\n\nif (process.argv[1] === new URL(import.meta.url).pathname) {\n main();\n}\n"],"names":["createConfig","handleVersionHelp","createHTTPServer","createStdioServer","GOOGLE_SCOPE","mcp","schemas","setup","startServer","config","logger","close","transport","type","process","on","exit","info","Promise","main","versionHelpResult","argv","handled","console","log","output","URL","url","pathname"],"mappings":"AAAA,SAASA,YAAY,EAAEC,iBAAiB,QAAQ,oBAAoB;AACpE,SAASC,gBAAgB,QAAQ,kBAAkB;AACnD,SAASC,iBAAiB,QAAQ,mBAAmB;AAGrD,SAASC,YAAY,QAAQ,iBAAiB;AAC9C,sBAAqB,iBAAiB;AAAtC,SAAO,QAAKC,GAAG,GAAuB;AACtC,0BAAyB,qBAAqB;AAA9C,SAAO,YAAKC,OAAO,GAA2B;AAC9C,wBAAuB,mBAAmB;AAA1C,SAAO,UAAKC,KAAK,GAAyB;AAC1C,cAAc,aAAa;AAE3B,OAAO,eAAeC,YAAYC,MAAoB;IACpD,MAAM,EAAEC,MAAM,EAAEC,KAAK,EAAE,GAAGF,OAAOG,SAAS,CAACC,IAAI,KAAK,UAAU,MAAMV,kBAAkBM,UAAU,MAAMP,iBAAiBO;IAEvHK,QAAQC,EAAE,CAAC,UAAU;QACnB,MAAMJ;QACNG,QAAQE,IAAI,CAAC;IACf;IAEAN,OAAOO,IAAI,CAAC,CAAC,oBAAoB,EAAER,OAAOG,SAAS,CAACC,IAAI,CAAC,UAAU,CAAC;IACpE,MAAM,IAAIK,QAAQ,KAAO;AAC3B;AAEA,eAAe,eAAeC;IAC5B,4DAA4D;IAC5D,MAAMC,oBAAoBnB,kBAAkBa,QAAQO,IAAI;IACxD,IAAID,kBAAkBE,OAAO,EAAE;QAC7BC,QAAQC,GAAG,CAACJ,kBAAkBK,MAAM;QACpCX,QAAQE,IAAI,CAAC;IACf;IAEA,6CAA6C;IAC7C,MAAMP,SAAST;IACf,MAAMQ,YAAYC;AACpB;AAEA,IAAIK,QAAQO,IAAI,CAAC,EAAE,KAAK,IAAIK,IAAI,YAAYC,GAAG,EAAEC,QAAQ,EAAE;IACzDT;AACF"}
|