@mtaap/mcp 0.1.1 → 0.1.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1 @@
1
+ {"version":3,"sources":[],"sourcesContent":[],"mappings":"","names":[]}
package/package.json CHANGED
@@ -1,7 +1,8 @@
1
1
  {
2
2
  "name": "@mtaap/mcp",
3
- "version": "0.1.1",
3
+ "version": "0.1.2",
4
4
  "type": "module",
5
+ "mcpName": "mtaap",
5
6
  "main": "./dist/index.js",
6
7
  "bin": {
7
8
  "mtaap-mcp": "./dist/cli.js"
@@ -11,37 +12,45 @@
11
12
  },
12
13
  "exports": {
13
14
  ".": {
14
- "types": "./dist/index.d.ts",
15
15
  "import": "./dist/index.js"
16
16
  }
17
17
  },
18
18
  "files": [
19
19
  "dist"
20
20
  ],
21
- "scripts": {
22
- "build": "tsc",
23
- "dev": "tsc --watch",
24
- "start": "node dist/cli.js",
25
- "lint": "eslint src --ext .ts",
26
- "clean": "rm -rf dist",
27
- "test": "vitest run",
28
- "test:watch": "vitest",
29
- "test:ui": "vitest --ui"
30
- },
31
21
  "dependencies": {
22
+ "@auth/core": "^0.41.1",
32
23
  "@modelcontextprotocol/sdk": "^1.0.0",
33
- "zod": "^4.3.5",
34
- "@mtaap/core": "workspace:*",
35
- "@mtaap/db": "workspace:*",
36
- "@mtaap/git": "workspace:*",
37
- "@mtaap/auth": "workspace:*"
24
+ "@prisma/client": "^7.2.0",
25
+ "@prisma/adapter-pg": "^7.2.0",
26
+ "bcryptjs": "^2.4.3",
27
+ "ldapjs": "^3.0.7",
28
+ "next": "^15.5.9",
29
+ "next-auth": "^5.0.0-beta.19",
30
+ "octokit": "^5.0.5",
31
+ "zod": "^4.3.5"
38
32
  },
39
33
  "devDependencies": {
40
- "@mtaap/config-typescript": "workspace:*",
34
+ "tsup": "^8.0.0",
41
35
  "typescript": "^5.4.0",
42
36
  "eslint": "^9.39.2",
43
37
  "@types/node": "^25.0.9",
44
38
  "vitest": "^4.0.17",
45
- "@vitest/ui": "^4.0.17"
39
+ "@vitest/ui": "^4.0.17",
40
+ "@mtaap/config-typescript": "0.1.0",
41
+ "@mtaap/core": "0.1.0",
42
+ "@mtaap/git": "0.1.0",
43
+ "@mtaap/db": "0.1.0",
44
+ "@mtaap/auth": "0.1.0"
45
+ },
46
+ "scripts": {
47
+ "build": "node scripts/generate-version.cjs && tsup",
48
+ "dev": "tsup --watch",
49
+ "start": "node dist/cli.js",
50
+ "lint": "eslint src --ext .ts",
51
+ "clean": "rm -rf dist",
52
+ "test": "vitest run",
53
+ "test:watch": "vitest",
54
+ "test:ui": "vitest --ui"
46
55
  }
47
- }
56
+ }
package/dist/cli.d.ts DELETED
@@ -1,3 +0,0 @@
1
- #!/usr/bin/env node
2
- export {};
3
- //# sourceMappingURL=cli.d.ts.map
package/dist/cli.d.ts.map DELETED
@@ -1 +0,0 @@
1
- {"version":3,"file":"cli.d.ts","sourceRoot":"","sources":["../src/cli.ts"],"names":[],"mappings":""}
package/dist/index.d.ts DELETED
@@ -1,2 +0,0 @@
1
- export declare function createMCPServer(): Promise<void>;
2
- //# sourceMappingURL=index.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AA+IA,wBAAsB,eAAe,kBAiZpC"}
@@ -1,7 +0,0 @@
1
- import { ApiKeyPermission } from "@mtaap/core";
2
- export interface ApiKeyPermissionContext {
3
- id?: string;
4
- permissions: "READ" | "WRITE" | "ADMIN";
5
- }
6
- export declare function assertApiKeyPermission(apiKey: ApiKeyPermissionContext, required: ApiKeyPermission, toolName: string): void;
7
- //# sourceMappingURL=permissions.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"permissions.d.ts","sourceRoot":"","sources":["../src/permissions.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,gBAAgB,EAAE,MAAM,aAAa,CAAC;AAa/C,MAAM,WAAW,uBAAuB;IACtC,EAAE,CAAC,EAAE,MAAM,CAAC;IACZ,WAAW,EAAE,MAAM,GAAG,OAAO,GAAG,OAAO,CAAC;CACzC;AAED,wBAAgB,sBAAsB,CACpC,MAAM,EAAE,uBAAuB,EAC/B,QAAQ,EAAE,gBAAgB,EAC1B,QAAQ,EAAE,MAAM,GACf,IAAI,CAoBN"}
@@ -1,25 +0,0 @@
1
- /**
2
- * Permission levels ranked by access level.
3
- * Using string values for compatibility between Prisma's enum and @mtaap/core enum.
4
- */
5
- const PERMISSION_RANK = {
6
- READ: 1,
7
- WRITE: 2,
8
- ADMIN: 3,
9
- };
10
- export function assertApiKeyPermission(apiKey, required, toolName) {
11
- const actualRank = PERMISSION_RANK[apiKey.permissions] ?? 0;
12
- const requiredRank = PERMISSION_RANK[required] ?? 0;
13
- if (actualRank >= requiredRank) {
14
- return;
15
- }
16
- console.warn("API key permission violation", {
17
- keyId: apiKey.id,
18
- requiredPermission: required,
19
- actualPermission: apiKey.permissions,
20
- tool: toolName,
21
- });
22
- const error = new Error(`API key lacks required permissions (required: ${required})`);
23
- error.status = 403;
24
- throw error;
25
- }