@onyxsecurity/mcp-gateway 1.0.55 → 1.0.57
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/bin/mcp-gateway.js +1 -1
- package/dist/index.d.ts +2 -1
- package/dist/index.js +1 -1
- package/dist/main-BWU2iaVZ.js +141 -0
- package/dist/main-BWU2iaVZ.js.map +1 -0
- package/dist/{normalizeUrl-BUnsFC9r.js → normalizeUrl-S0KWkvwy.js} +14 -13
- package/dist/normalizeUrl-S0KWkvwy.js.map +1 -0
- package/package.json +5 -2
- package/dist/main-QrfaAtqp.js +0 -141
- package/dist/main-QrfaAtqp.js.map +0 -1
- package/dist/normalizeUrl-BUnsFC9r.js.map +0 -1
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@onyxsecurity/mcp-gateway",
|
|
3
|
-
"version": "1.0.
|
|
3
|
+
"version": "1.0.57",
|
|
4
4
|
"main": "dist/index.js",
|
|
5
5
|
"scripts": {
|
|
6
6
|
"prebuild": "npx tsx scripts/generate-config.ts",
|
|
@@ -68,7 +68,7 @@
|
|
|
68
68
|
"dotenv": "^17.2.2",
|
|
69
69
|
"env-var": "^7.5.0",
|
|
70
70
|
"ps-list": "^8.1.1",
|
|
71
|
-
"systeminformation": "^5.
|
|
71
|
+
"systeminformation": "^5.31.0",
|
|
72
72
|
"winston": "^3.17.0",
|
|
73
73
|
"winston-daily-rotate-file": "^5.0.0"
|
|
74
74
|
},
|
|
@@ -91,5 +91,8 @@
|
|
|
91
91
|
"noExternal": [
|
|
92
92
|
"*"
|
|
93
93
|
]
|
|
94
|
+
},
|
|
95
|
+
"resolutions": {
|
|
96
|
+
"tar": "^7.5.7"
|
|
94
97
|
}
|
|
95
98
|
}
|
package/dist/main-QrfaAtqp.js
DELETED
|
@@ -1,141 +0,0 @@
|
|
|
1
|
-
import{AccessControlBlockError as e,BUILD_TIME_CONFIG as t,Client as n,ConfigurationError as r,ProxyConnectionError as i,ReadBuffer as a,SSEClientTransport as o,Server as s,StdioServerTransport as c,StreamableHTTPClientTransport as l,UnauthorizedError as u,compressClientInfo as d,config as f,createParser as p,discoverAuthorizationServerMetadata as m,discoverOAuthProtectedResourceMetadata as h,exchangeAuthorization as g,extractTraceIdFromHeaders as ee,flushLogs as _,getSessionData as v,initializeTrafficMirror as y,logRequestCounts as te,logger as b,normalizeUrl as x,proxyServer as ne,refreshAuthorization as S,registerClient as C,serializeMessage as re,startAuthorization as w,startHTTPServer as ie}from"./normalizeUrl-BUnsFC9r.js";import{hideBin as ae,yargs_default as oe}from"./helpers-DmSngytV.js";import"./pkce-ANRIC6ce.js";import{createHash as T}from"node:crypto";import{join as E}from"node:path";import{platform as D}from"node:os";import{createServer as se}from"node:http";import{setTimeout as ce}from"node:timers";import le from"node:util";import{execFile as ue,execSync as de,spawn as fe}from"node:child_process";import{URL as pe}from"node:url";import{chmod as me,mkdir as he,readFile as ge,rm as _e,writeFile as ve}from"node:fs/promises";import{PassThrough as ye,Transform as be}from"node:stream";var xe=class extends Event{constructor(e,t){super(e),this.code=t?.code??void 0,this.message=t?.message??void 0}[Symbol.for(`nodejs.util.inspect.custom`)](e,t,n){return n(Ce(this),t)}[Symbol.for(`Deno.customInspect`)](e,t){return e(Ce(this),t)}};function Se(e){let t=globalThis.DOMException;return typeof t==`function`?new t(e,`SyntaxError`):SyntaxError(e)}function O(e){return e instanceof Error?`errors`in e&&Array.isArray(e.errors)?e.errors.map(O).join(`, `):`cause`in e&&e.cause instanceof Error?`${e}: ${O(e.cause)}`:e.message:`${e}`}function Ce(e){return{type:e.type,message:e.message,code:e.code,defaultPrevented:e.defaultPrevented,cancelable:e.cancelable,timeStamp:e.timeStamp}}var we=e=>{throw TypeError(e)},k=(e,t,n)=>t.has(e)||we(`Cannot `+n),A=(e,t,n)=>(k(e,t,`read from private field`),n?n.call(e):t.get(e)),j=(e,t,n)=>t.has(e)?we(`Cannot add the same private member more than once`):t instanceof WeakSet?t.add(e):t.set(e,n),M=(e,t,n,r)=>(k(e,t,`write to private field`),t.set(e,n),n),N=(e,t,n)=>(k(e,t,`access private method`),n),P,F,I,L,R,z,B,V,H,U,W,G,K,q,J,Y,X,Te,Z,Ee,Q,De,Oe,$=class extends EventTarget{constructor(e,t){super(),j(this,q),this.CONNECTING=0,this.OPEN=1,this.CLOSED=2,j(this,P),j(this,F),j(this,I),j(this,L),j(this,R),j(this,z),j(this,B),j(this,V,null),j(this,H),j(this,U),j(this,W,null),j(this,G,null),j(this,K,null),j(this,Y,async e=>{var t;A(this,U).reset();let{body:n,redirected:r,status:i,headers:a}=e;if(i===204){N(this,q,Q).call(this,`Server sent HTTP 204, not reconnecting`,204),this.close();return}if(r?M(this,I,new URL(e.url)):M(this,I,void 0),i!==200){N(this,q,Q).call(this,`Non-200 status code (${i})`,i);return}if(!(a.get(`content-type`)||``).startsWith(`text/event-stream`)){N(this,q,Q).call(this,`Invalid content type, expected "text/event-stream"`,i);return}if(A(this,P)===this.CLOSED)return;M(this,P,this.OPEN);let o=new Event(`open`);if((t=A(this,K))==null||t.call(this,o),this.dispatchEvent(o),typeof n!=`object`||!n||!(`getReader`in n)){N(this,q,Q).call(this,`Invalid response body, expected a web ReadableStream`,i),this.close();return}let s=new TextDecoder,c=n.getReader(),l=!0;do{let{done:e,value:t}=await c.read();t&&A(this,U).feed(s.decode(t,{stream:!e})),e&&(l=!1,A(this,U).reset(),N(this,q,De).call(this))}while(l)}),j(this,X,e=>{M(this,H,void 0),!(e.name===`AbortError`||e.type===`aborted`)&&N(this,q,De).call(this,O(e))}),j(this,Z,e=>{typeof e.id==`string`&&M(this,V,e.id);let t=new MessageEvent(e.event||`message`,{data:e.data,origin:A(this,I)?A(this,I).origin:A(this,F).origin,lastEventId:e.id||``});A(this,G)&&(!e.event||e.event===`message`)&&A(this,G).call(this,t),this.dispatchEvent(t)}),j(this,Ee,e=>{M(this,z,e)}),j(this,Oe,()=>{M(this,B,void 0),A(this,P)===this.CONNECTING&&N(this,q,J).call(this)});try{if(e instanceof URL)M(this,F,e);else if(typeof e==`string`)M(this,F,new URL(e,ke()));else throw Error(`Invalid URL`)}catch{throw Se(`An invalid or illegal string was specified`)}M(this,U,p({onEvent:A(this,Z),onRetry:A(this,Ee)})),M(this,P,this.CONNECTING),M(this,z,3e3),M(this,R,t?.fetch??globalThis.fetch),M(this,L,t?.withCredentials??!1),N(this,q,J).call(this)}get readyState(){return A(this,P)}get url(){return A(this,F).href}get withCredentials(){return A(this,L)}get onerror(){return A(this,W)}set onerror(e){M(this,W,e)}get onmessage(){return A(this,G)}set onmessage(e){M(this,G,e)}get onopen(){return A(this,K)}set onopen(e){M(this,K,e)}addEventListener(e,t,n){let r=t;super.addEventListener(e,r,n)}removeEventListener(e,t,n){let r=t;super.removeEventListener(e,r,n)}close(){A(this,B)&&clearTimeout(A(this,B)),A(this,P)!==this.CLOSED&&(A(this,H)&&A(this,H).abort(),M(this,P,this.CLOSED),M(this,H,void 0))}};P=new WeakMap,F=new WeakMap,I=new WeakMap,L=new WeakMap,R=new WeakMap,z=new WeakMap,B=new WeakMap,V=new WeakMap,H=new WeakMap,U=new WeakMap,W=new WeakMap,G=new WeakMap,K=new WeakMap,q=new WeakSet,J=function(){M(this,P,this.CONNECTING),M(this,H,new AbortController),A(this,R)(A(this,F),N(this,q,Te).call(this)).then(A(this,Y)).catch(A(this,X))},Y=new WeakMap,X=new WeakMap,Te=function(){let e={mode:`cors`,redirect:`follow`,headers:{Accept:`text/event-stream`,...A(this,V)?{"Last-Event-ID":A(this,V)}:void 0},cache:`no-store`,signal:A(this,H)?.signal};return`window`in globalThis&&(e.credentials=this.withCredentials?`include`:`same-origin`),e},Z=new WeakMap,Ee=new WeakMap,Q=function(e,t){var n;A(this,P)!==this.CLOSED&&M(this,P,this.CLOSED);let r=new xe(`error`,{code:t,message:e});(n=A(this,W))==null||n.call(this,r),this.dispatchEvent(r)},De=function(e,t){var n;if(A(this,P)===this.CLOSED)return;M(this,P,this.CONNECTING);let r=new xe(`error`,{code:t,message:e});(n=A(this,W))==null||n.call(this,r),this.dispatchEvent(r),M(this,B,setTimeout(A(this,Oe),A(this,z)))},Oe=new WeakMap,$.CONNECTING=0,$.OPEN=1,$.CLOSED=2;function ke(){let e=`document`in globalThis?globalThis.document:void 0;return e&&typeof e==`object`&&`baseURI`in e&&typeof e.baseURI==`string`?e.baseURI:void 0}var Ae=class{client;enabled;lastBlockReason;serverName;constructor(e){this.enabled=e.enabled,this.client=e.client,this.serverName=e.serverName,b.info(`AccessControlAuthorizer initialized`,{enabled:this.enabled,hasClient:!!this.client,serverName:this.serverName})}getBlockReason(){return this.lastBlockReason?this.lastBlockReason:`MCP server${this.serverName?` '${this.serverName}'`:``} is not authorized for use in your organization and has been blocked by Onyx.`}async isAllowed(){if(!this.enabled)return!0;if(this.client)try{let e=await this.client.authorize();return e.action===`block`?(e.reason?this.lastBlockReason=e.reason:this.lastBlockReason=`MCP server${this.serverName?` '${this.serverName}'`:``} is not authorized for use in your organization and has been blocked by Onyx.`,!1):!0}catch(e){return b.error(`Access control authorization failed with unexpected error`,{error:String(e)}),!0}return b.warn(`No access control client configured, allowing by default`),!0}},je=class{clientInfoBase64;config;constructor(e){this.config=e,this.clientInfoBase64=this.getClientInfoBase64(),b.info(`AccessControlClient initialized`,{timeoutMs:e.timeoutMs,url:e.url})}async authorize(){try{let e=await this.sendAuthorizeRequest();return b.debug(`Access control check successful`,{action:e.action}),e}catch(e){return b.warn(`Access control check failed, failing open (allowing by default)`,{error:String(e)}),{action:`allow`}}}getClientInfoBase64(){return d(this.config.sessionData)}async sendAuthorizeRequest(){let e=new AbortController,t=setTimeout(()=>e.abort(),this.config.timeoutMs);try{let t=`${this.config.url}/${this.config.apiKey}/mcp/${this.clientInfoBase64}`,n=await fetch(t,{headers:{...this.config.headers},method:`POST`,signal:e.signal});if(!n.ok)throw Error(`Access control service returned ${n.status}: ${n.statusText}`);let r=await n.json();if(!r.action||![`allow`,`block`].includes(r.action))throw Error(`Invalid access control response format: action="${r.action}"`);return r}catch(e){throw e instanceof Error&&e.name===`AbortError`?Error(`Access control check timed out after ${this.config.timeoutMs}ms`):e}finally{clearTimeout(t)}}};async function Me(e){let t=e.toString(),n=D(),r=Ie(t);return new Promise((e,i)=>{let a,o;if(n===`win32`){let e=`Start-Process ${Pe(t)}`,n=Ne(e);a=Fe(),o=[`-NoProfile`,`-NonInteractive`,`-ExecutionPolicy`,`Bypass`,`-EncodedCommand`,n]}else n===`darwin`?(a=`open`,o=[t]):(a=`xdg-open`,o=[t]);ue(a,o,(t,o,s)=>{if(t){let e={command:a,os:n,stderr:s,url:r};b.warn(`Failed to open browser automatically`,{...e,error:t.message});let o=Error(`Failed to open browser: ${t.message} (command: ${a}, os: ${n}, url: ${r})`);o.cause=t,i(o)}else b.debug(`Browser opened successfully`,{url:r}),e()})})}function Ne(e){return Buffer.from(e,`utf16le`).toString(`base64`)}function Pe(e){return`'${e.replaceAll(`'`,`''`)}'`}function Fe(){return`${process.env.SYSTEMROOT||process.env.windir||`C:\\Windows`}\\System32\\WindowsPowerShell\\v1.0\\powershell.exe`}function Ie(e){try{let t=new URL(e);return t.search?`${t.protocol}//${t.host}${t.pathname}?[REDACTED]`:`${t.protocol}//${t.host}${t.pathname}`}catch{return`[INVALID_URL]`}}const Le=49152;function Re(){return Math.floor(Math.random()*(65535-Le+1))+Le}function ze(e,t){return new Promise((n,r)=>{let i=t=>{e.removeListener(`listening`,a),r(t)},a=()=>{e.removeListener(`error`,i),n()};e.once(`error`,i),e.once(`listening`,a),e.listen(t,`127.0.0.1`)})}async function Be(e={}){let{maxAttempts:t=5,preferredPort:n,timeoutMs:r=3e5}=e,i,a,o={},s=new Promise((e,t)=>{i=e,a=t}),c,l=se((e,t)=>{if(e.url===`/favicon.ico`){t.writeHead(404),t.end();return}if(!e.url?.startsWith(`/callback`)){t.writeHead(404),t.end(`Not Found`);return}try{let n=new pe(e.url,`http://localhost:${c}`),r=n.searchParams.get(`code`),s=n.searchParams.get(`error`),u=n.searchParams.get(`error_description`),d=n.searchParams.get(`state`);if(s){b.error(`OAuth authorization error`,{error:s,errorDescription:u}),t.writeHead(400,{"Content-Type":`text/html`}),t.end(He(s,u||void 0)),clearTimeout(o.id),a(Error(`OAuth authorization failed: ${s}${u?` - ${u}`:``}`));return}if(!r){b.error(`OAuth callback missing authorization code`),t.writeHead(400,{"Content-Type":`text/html`}),t.end(He(`missing_code`,`No authorization code was provided`)),clearTimeout(o.id),a(Error(`OAuth callback missing authorization code`));return}b.info(`OAuth authorization code received`,{codePrefix:`${r.substring(0,10)}...`,hasState:!!d}),t.writeHead(200,{"Content-Type":`text/html`}),t.end(`<!DOCTYPE html>
|
|
2
|
-
<html lang="en">
|
|
3
|
-
<head>
|
|
4
|
-
<meta charset="UTF-8">
|
|
5
|
-
<meta name="viewport" content="width=device-width, initial-scale=1.0">
|
|
6
|
-
<title>Authorization Successful</title>
|
|
7
|
-
<style>
|
|
8
|
-
body {
|
|
9
|
-
font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, sans-serif;
|
|
10
|
-
display: flex;
|
|
11
|
-
justify-content: center;
|
|
12
|
-
align-items: center;
|
|
13
|
-
min-height: 100vh;
|
|
14
|
-
margin: 0;
|
|
15
|
-
background: linear-gradient(135deg, #1a1a2e 0%, #16213e 100%);
|
|
16
|
-
color: #fff;
|
|
17
|
-
}
|
|
18
|
-
.container {
|
|
19
|
-
text-align: center;
|
|
20
|
-
padding: 2rem;
|
|
21
|
-
}
|
|
22
|
-
.checkmark {
|
|
23
|
-
width: 80px;
|
|
24
|
-
height: 80px;
|
|
25
|
-
border-radius: 50%;
|
|
26
|
-
background: #10b981;
|
|
27
|
-
display: flex;
|
|
28
|
-
align-items: center;
|
|
29
|
-
justify-content: center;
|
|
30
|
-
margin: 0 auto 1.5rem;
|
|
31
|
-
animation: pop 0.3s ease-out;
|
|
32
|
-
}
|
|
33
|
-
.checkmark svg {
|
|
34
|
-
width: 40px;
|
|
35
|
-
height: 40px;
|
|
36
|
-
stroke: white;
|
|
37
|
-
stroke-width: 3;
|
|
38
|
-
}
|
|
39
|
-
h1 {
|
|
40
|
-
margin: 0 0 0.5rem;
|
|
41
|
-
font-size: 1.75rem;
|
|
42
|
-
font-weight: 600;
|
|
43
|
-
}
|
|
44
|
-
p {
|
|
45
|
-
margin: 0;
|
|
46
|
-
color: #a0aec0;
|
|
47
|
-
font-size: 1rem;
|
|
48
|
-
}
|
|
49
|
-
@keyframes pop {
|
|
50
|
-
0% { transform: scale(0); }
|
|
51
|
-
50% { transform: scale(1.1); }
|
|
52
|
-
100% { transform: scale(1); }
|
|
53
|
-
}
|
|
54
|
-
</style>
|
|
55
|
-
</head>
|
|
56
|
-
<body>
|
|
57
|
-
<div class="container">
|
|
58
|
-
<div class="checkmark">
|
|
59
|
-
<svg viewBox="0 0 24 24" fill="none">
|
|
60
|
-
<path d="M5 13l4 4L19 7" stroke-linecap="round" stroke-linejoin="round"/>
|
|
61
|
-
</svg>
|
|
62
|
-
</div>
|
|
63
|
-
<h1>Authorization Successful</h1>
|
|
64
|
-
<p>You can close this window and return to the terminal.</p>
|
|
65
|
-
</div>
|
|
66
|
-
<script>setTimeout(() => window.close(), 3000);<\/script>
|
|
67
|
-
</body>
|
|
68
|
-
</html>`),clearTimeout(o.id),i({code:r,state:d||void 0}),setTimeout(()=>l.close(),1e3)}catch(e){b.error(`Error processing OAuth callback`,{error:String(e)}),t.writeHead(500),t.end(`Internal Server Error`),clearTimeout(o.id),a(e instanceof Error?e:Error(String(e)))}});o.id=setTimeout(()=>{a(Error(`OAuth callback timeout after ${r}ms`)),l.close()},r);let u=[],d;for(;u.length<t;){let e;if(u.length===0&&n!==void 0)e=n;else for(e=Re();u.includes(e);)e=Re();u.push(e);try{await ze(l,e),c=e;let t=`http://localhost:${c}/callback`;return b.info(`OAuth callback server started`,{attempt:u.length,callbackUrl:t,port:c}),{callbackUrl:t,close:()=>new Promise(e=>{clearTimeout(o.id),l.close(()=>e())}),port:c,waitForCallback:()=>s}}catch(n){if(n.code===`EADDRINUSE`)b.debug(`Port in use, trying another port`,{attempt:u.length,maxAttempts:t,port:e}),d=Error(`Port ${e} is already in use`);else throw clearTimeout(o.id),l.close(),n}}throw clearTimeout(o.id),l.close(),Error(`Failed to start OAuth callback server after ${t} attempts. Tried ports: ${u.join(`, `)}. Last error: ${d?.message||`unknown`}`)}function Ve(e){return e.replace(/&/g,`&`).replace(/</g,`<`).replace(/>/g,`>`).replace(/"/g,`"`).replace(/'/g,`'`)}function He(e,t){return`<!DOCTYPE html>
|
|
69
|
-
<html lang="en">
|
|
70
|
-
<head>
|
|
71
|
-
<meta charset="UTF-8">
|
|
72
|
-
<meta name="viewport" content="width=device-width, initial-scale=1.0">
|
|
73
|
-
<title>Authorization Failed</title>
|
|
74
|
-
<style>
|
|
75
|
-
body {
|
|
76
|
-
font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, sans-serif;
|
|
77
|
-
display: flex;
|
|
78
|
-
justify-content: center;
|
|
79
|
-
align-items: center;
|
|
80
|
-
min-height: 100vh;
|
|
81
|
-
margin: 0;
|
|
82
|
-
background: linear-gradient(135deg, #1a1a2e 0%, #16213e 100%);
|
|
83
|
-
color: #fff;
|
|
84
|
-
}
|
|
85
|
-
.container {
|
|
86
|
-
text-align: center;
|
|
87
|
-
padding: 2rem;
|
|
88
|
-
max-width: 400px;
|
|
89
|
-
}
|
|
90
|
-
.error-icon {
|
|
91
|
-
width: 80px;
|
|
92
|
-
height: 80px;
|
|
93
|
-
border-radius: 50%;
|
|
94
|
-
background: #ef4444;
|
|
95
|
-
display: flex;
|
|
96
|
-
align-items: center;
|
|
97
|
-
justify-content: center;
|
|
98
|
-
margin: 0 auto 1.5rem;
|
|
99
|
-
}
|
|
100
|
-
.error-icon svg {
|
|
101
|
-
width: 40px;
|
|
102
|
-
height: 40px;
|
|
103
|
-
stroke: white;
|
|
104
|
-
stroke-width: 3;
|
|
105
|
-
}
|
|
106
|
-
h1 {
|
|
107
|
-
margin: 0 0 0.5rem;
|
|
108
|
-
font-size: 1.75rem;
|
|
109
|
-
font-weight: 600;
|
|
110
|
-
}
|
|
111
|
-
.error-code {
|
|
112
|
-
color: #f87171;
|
|
113
|
-
font-family: monospace;
|
|
114
|
-
margin-bottom: 0.5rem;
|
|
115
|
-
}
|
|
116
|
-
p {
|
|
117
|
-
margin: 0;
|
|
118
|
-
color: #a0aec0;
|
|
119
|
-
font-size: 1rem;
|
|
120
|
-
}
|
|
121
|
-
</style>
|
|
122
|
-
</head>
|
|
123
|
-
<body>
|
|
124
|
-
<div class="container">
|
|
125
|
-
<div class="error-icon">
|
|
126
|
-
<svg viewBox="0 0 24 24" fill="none">
|
|
127
|
-
<path d="M6 18L18 6M6 6l12 12" stroke-linecap="round" stroke-linejoin="round"/>
|
|
128
|
-
</svg>
|
|
129
|
-
</div>
|
|
130
|
-
<h1>Authorization Failed</h1>
|
|
131
|
-
<p class="error-code">${Ve(e)}</p>
|
|
132
|
-
${t?`<p>${Ve(t)}</p>`:``}
|
|
133
|
-
</div>
|
|
134
|
-
</body>
|
|
135
|
-
</html>`}var Ue=class{storageDir;constructor(e){this.storageDir=e.storageDir}async delete(e){let t=x(e),n=this.getFilePath(t);try{await _e(n),b.debug(`Deleted stored credentials`,{filePath:n,serverUrl:t})}catch(e){e.code!==`ENOENT`&&b.warn(`Failed to delete stored credentials`,{error:String(e),filePath:n,serverUrl:t})}}hasRefreshToken(e){return!!e.tokens?.refresh_token}hasValidAccessToken(e){return!!e.tokens?.access_token&&!this.isAccessTokenExpired(e)}isAccessTokenExpired(e){if(!e.tokens||!e.tokensObtainedAt)return!0;let{expires_in:t}=e.tokens;if(!t)return!1;let n=new Date(e.tokensObtainedAt).getTime()+t*1e3,r=Date.now(),i=r>=n-3e4;return b.debug(`Checked access token expiration`,{expiresAt:new Date(n).toISOString(),expiresIn:t,isExpired:i,now:new Date(r).toISOString(),obtainedAt:e.tokensObtainedAt}),i}async load(e){let t=x(e),n=this.getFilePath(t);try{let e=await ge(n,`utf-8`),r=JSON.parse(e);if(x(r.serverUrl)!==t){b.warn(`Credential file server URL mismatch`,{expected:t,filePath:n,found:r.serverUrl});return}return b.debug(`Loaded stored credentials`,{clientId:r.clientInfo?.client_id,hasRefreshToken:!!r.tokens?.refresh_token,hasTokens:!!r.tokens,serverUrl:t}),r}catch(e){if(e.code===`ENOENT`){b.debug(`No stored credentials found`,{serverUrl:t});return}b.warn(`Failed to load stored credentials`,{error:String(e),filePath:n,serverUrl:t});return}}async save(e){await this.ensureStorageDir();let t=this.getFilePath(e.serverUrl),n=JSON.stringify(e,null,2);try{await ve(t,n,{encoding:`utf-8`,mode:384}),await me(t,384),b.debug(`Saved credentials to disk`,{clientId:e.clientInfo?.client_id,filePath:t,hasTokens:!!e.tokens,serverUrl:e.serverUrl})}catch(n){throw b.error(`Failed to save credentials`,{error:String(n),filePath:t,serverUrl:e.serverUrl}),n}}async update(e,t){let n=x(e),r=await this.load(n),i=new Date().toISOString(),a=r?{...r,...t,serverUrl:n,updatedAt:i}:{createdAt:i,serverUrl:n,updatedAt:i,...t};return await this.save(a),a}async ensureStorageDir(){try{await he(this.storageDir,{mode:448,recursive:!0})}catch(e){if(e.code!==`EEXIST`)throw e}}generateKey(e){return T(`sha256`).update(e).digest(`hex`).substring(0,16)}getFilePath(e){let t=this.generateKey(e);return E(this.storageDir,`${t}.json`)}};const We=t.OAUTH_PROVIDERS;function Ge(e){let t=typeof e==`string`?new URL(e):e,n=t.hostname.toLowerCase();for(let e of We)for(let t of e.urlPatterns){let r=t.toLowerCase();if(Ke(n,r))return b.debug(`Found matching OAuth provider for URL`,{hostname:n,pattern:t,providerId:e.id,providerName:e.name}),e}b.debug(`No pre-configured OAuth provider found for URL`,{hostname:n,serverUrl:t.toString()})}function Ke(e,t){return!!(e===t||e.endsWith(`.${t}`))}async function qe(e,t={}){let{credentialStore:n,scope:r,timeoutMs:i}=t,a=x(e),o=new URL(a);if(b.info(`Starting OAuth flow`,{serverUrl:a}),n){let e=await Xe(o,n);if(e)return b.info(`Using existing OAuth credentials`,{clientId:e.clientInfo.client_id,serverUrl:a}),e}b.debug(`Starting OAuth callback server...`);let s=await Be({timeoutMs:i}),c=s.callbackUrl;b.info(`OAuth callback server started`,{callbackUrl:c,port:s.port});try{let e=Ge(o);if(e)return b.info(`Using pre-configured OAuth provider`,{providerId:e.id,providerName:e.name}),await Ye(o,e,s,n,r);b.debug(`Discovering OAuth protected resource metadata...`);let i;try{i=await h(o),b.info(`Discovered protected resource metadata`,{authorizationServers:i?.authorization_servers,resource:i?.resource,scopesSupported:i?.scopes_supported})}catch(e){b.warn(`Could not discover protected resource metadata, will try direct discovery`,{error:String(e)})}let l;i?.authorization_servers?.length?(l=new URL(i.authorization_servers[0]),b.debug(`Using authorization server from resource metadata`,{authServerUrl:l.toString()})):(l=o,b.debug(`Using server URL as authorization server`,{authServerUrl:l.toString()})),b.debug(`Discovering authorization server metadata...`);let u=await m(l);if(!u)throw Error(`Could not discover OAuth metadata from ${l}. The server may not support OAuth 2.0 or the metadata endpoint is not accessible.`);b.info(`Discovered authorization server metadata`,{authorizationEndpoint:u.authorization_endpoint,issuer:u.issuer,registrationEndpoint:u.registration_endpoint,tokenEndpoint:u.token_endpoint});let d,f=n?await n.load(a):void 0,p=f?.clientInfo?.redirect_uris||[];if(f?.clientInfo&&p.includes(c)&&f?.clientInfo)b.info(`Reusing existing DCR client registration`,{clientId:f.clientInfo.client_id,clientName:f.clientInfo.client_name,redirectUri:c}),d=f.clientInfo;else{f?.clientInfo&&b.info(`Existing DCR client has different redirect_uri, re-registering`,{existingRedirectUris:p,newRedirectUri:c});let e={client_name:t.clientMetadata?.client_name||`MCP Gateway`,grant_types:t.clientMetadata?.grant_types||[`authorization_code`,`refresh_token`],redirect_uris:[c],response_types:t.clientMetadata?.response_types||[`code`],token_endpoint_auth_method:t.clientMetadata?.token_endpoint_auth_method||`none`,...r&&{scope:r}};if(b.debug(`Client metadata for DCR`,{clientMetadata:e}),!u.registration_endpoint)throw Error(`Authorization server does not support Dynamic Client Registration. No registration_endpoint found in metadata.`);b.info(`Registering client via DCR...`,{registrationEndpoint:u.registration_endpoint}),d=await C(l,{clientMetadata:e,metadata:u}),b.info(`Client registered successfully via DCR`,{clientId:d.client_id,clientName:d.client_name,clientSecretExpiresAt:d.client_secret_expires_at}),n&&await n.update(a,{clientInfo:d})}b.debug(`Starting authorization flow...`);let{authorizationUrl:ee,codeVerifier:_}=await w(l,{clientInformation:d,metadata:u,redirectUrl:c,scope:r});await Me(ee),b.debug(`Waiting for OAuth callback...`);let v=await s.waitForCallback();b.info(`Authorization code received`,{codePrefix:`${v.code.substring(0,10)}...`,hasState:!!v.state}),b.debug(`Exchanging authorization code for tokens...`);let y=await g(l,{authorizationCode:v.code,clientInformation:d,codeVerifier:_,metadata:u,redirectUri:c});if(b.info(`OAuth tokens obtained successfully`,{expiresIn:y.expires_in,hasRefreshToken:!!y.refresh_token,tokenType:y.token_type}),n){let e=new Date().toISOString();await n.update(a,{tokens:y,tokensObtainedAt:e}),b.info(`OAuth credentials persisted to disk`,{serverUrl:a})}return{clientInfo:d,fromCache:!1,tokens:y}}finally{await s.close()}}async function Je(e,t,n,r){let i=e.tokenEndpoint,a=e.tokenEndpointAuthMethod||(e.clientSecret?`client_secret_post`:`none`),o=new URLSearchParams;o.set(`grant_type`,`authorization_code`),o.set(`code`,t),o.set(`redirect_uri`,n),r&&o.set(`code_verifier`,r);let s={Accept:`application/json`,"Content-Type":`application/x-www-form-urlencoded`};a===`client_secret_basic`&&e.clientSecret?s.Authorization=`Basic ${Buffer.from(`${e.clientId}:${e.clientSecret}`).toString(`base64`)}`:a===`client_secret_post`&&e.clientSecret?(o.set(`client_id`,e.clientId),o.set(`client_secret`,e.clientSecret)):o.set(`client_id`,e.clientId),b.debug(`Sending token request`,{authMethod:a,providerId:e.id,tokenEndpoint:i});let c=await fetch(i,{body:o.toString(),headers:s,method:`POST`});if(!c.ok){let t=await c.text();throw b.error(`Token exchange failed`,{error:t,providerId:e.id,status:c.status}),Error(`Token exchange failed: ${c.status} ${t}`)}let l=c.headers.get(`content-type`)||``,u;if(l.includes(`application/json`))u=await c.json();else if(l.includes(`application/x-www-form-urlencoded`)||l.includes(`text/plain`)){let e=await c.text(),t=new URLSearchParams(e);u=Object.fromEntries(t.entries())}else{let e=await c.text();try{u=JSON.parse(e)}catch{let t=new URLSearchParams(e);u=Object.fromEntries(t.entries())}}return typeof u.expires_in==`string`&&(u.expires_in=parseInt(u.expires_in,10)),{access_token:u.access_token,expires_in:u.expires_in,refresh_token:u.refresh_token,scope:u.scope,token_type:u.token_type||`bearer`}}async function Ye(e,t,n,r,i){let a=e.toString(),o=n.callbackUrl,s={client_id:t.clientId,client_name:t.name,client_secret:t.clientSecret,redirect_uris:[o],token_endpoint_auth_method:t.tokenEndpointAuthMethod||(t.clientSecret?`client_secret_post`:`none`)};b.info(`Using pre-configured OAuth client`,{clientId:t.clientId,hasClientSecret:!!t.clientSecret,providerId:t.id,tokenEndpointAuthMethod:s.token_endpoint_auth_method});let c=i||t.scopes?.join(` `),l=t.usePkce!==!1,u,d,f;if(l){let{generateCodeChallenge:e,generateCodeVerifier:t}=await import(`./pkce-dymop6yt.js`);u=t(),d=await e(u),f=`S256`}let p=new URL(t.authorizationEndpoint);p.searchParams.set(`client_id`,t.clientId),p.searchParams.set(`redirect_uri`,o),p.searchParams.set(`response_type`,`code`),c&&p.searchParams.set(`scope`,c);let m=crypto.randomUUID();p.searchParams.set(`state`,m),d&&f&&(p.searchParams.set(`code_challenge`,d),p.searchParams.set(`code_challenge_method`,f)),await Me(p),b.debug(`Waiting for OAuth callback...`);let h=await n.waitForCallback();if(h.state!==m)throw Error(`OAuth state mismatch - possible CSRF attack`);b.info(`Authorization code received`,{codePrefix:`${h.code.substring(0,10)}...`,providerId:t.id}),b.debug(`Exchanging authorization code for tokens...`);let g=await Je(t,h.code,o,u);if(b.info(`OAuth tokens obtained successfully`,{expiresIn:g.expires_in,hasRefreshToken:!!g.refresh_token,providerId:t.id,tokenType:g.token_type}),r){let e=new Date().toISOString();await r.update(a,{clientInfo:s,tokens:g,tokensObtainedAt:e}),b.info(`OAuth credentials persisted to disk`,{providerId:t.id,serverUrl:a})}return{clientInfo:s,fromCache:!1,tokens:g}}async function Xe(e,t){let n=await t.load(e.toString());if(!n){b.debug(`No stored credentials found`,{serverUrl:e.toString()});return}if(!n.clientInfo){b.debug(`Stored credentials have no client info`,{serverUrl:e.toString()});return}if(t.hasValidAccessToken(n)&&n.tokens)return b.info(`Using cached OAuth credentials with valid access token`,{clientId:n.clientInfo.client_id,serverUrl:e.toString()}),{clientInfo:n.clientInfo,fromCache:!0,tokens:n.tokens};if(t.hasRefreshToken(n)){let r=await Ze(e,n,t);if(r)return r}b.debug(`Stored credentials are expired and no valid refresh token`,{serverUrl:e.toString()})}async function Ze(e,t,n){if(!(!t.clientInfo||!t.tokens?.refresh_token)){b.info(`Attempting to refresh expired access token`,{clientId:t.clientInfo.client_id,serverUrl:e.toString()});try{let r;try{r=await h(e)}catch{}let i;i=r?.authorization_servers?.length?new URL(r.authorization_servers[0]):e;let a=await m(i),o=await S(i,{clientInformation:t.clientInfo,metadata:a,refreshToken:t.tokens.refresh_token});b.info(`Successfully refreshed access token`,{clientId:t.clientInfo.client_id,expiresIn:o.expires_in,hasNewRefreshToken:!!o.refresh_token});let s=new Date().toISOString();return await n.update(e.toString(),{tokens:o,tokensObtainedAt:s}),{clientInfo:t.clientInfo,fromCache:!0,tokens:o}}catch(t){b.warn(`Failed to refresh access token, will require re-authorization`,{error:String(t),serverUrl:e.toString()}),await n.update(e.toString(),{tokens:void 0,tokensObtainedAt:void 0});return}}}const Qe=[`streamable-http`,`sse`];async function $e(e,t,n){let r;for(let i of Qe){let a=e();try{let e=et(t,i,n);return await a.connect(e),{client:a,transportType:i}}catch(e){if(r=e,tt(e)){b.info(`${i} not supported, trying next transport...`);continue}throw e}}throw r??Error(`No compatible transport found`)}function et(e,t,n){let r=new URL(e);return t===`streamable-http`?new l(r,{requestInit:n}):new o(r,{requestInit:n})}function tt(e){if(!e||typeof e!=`object`)return!1;let t=e.status,n=e.code,r=e.message;return!!(t===404||t===405||n===404||n===405||r&&/404|not found|405|method not allowed/i.test(String(r)))}var nt=class extends be{buffer=``;constructor(){super({objectMode:!1})}_flush(e){this.buffer.trim().startsWith(`{`)?e(null,Buffer.from(this.buffer)):e(null,null)}_transform(e,t,n){this.buffer+=e.toString();let r=this.buffer.split(`
|
|
136
|
-
`);this.buffer=r.pop()||``;let i=r.filter(e=>e.trim().startsWith(`{`));if(i.length>0){let e=`${i.join(`
|
|
137
|
-
`)}\n`;n(null,Buffer.from(e))}else n(null,null)}},rt=class{onclose;onerror;onmessage;get pid(){return this._process?.pid??null}get stderr(){return this._stderrStream?this._stderrStream:this._process?.stderr??null}_abortController=new AbortController;_process;_readBuffer=new a;_serverParams;_stderrStream=null;onEvent;constructor(e){this._serverParams=e,(e.stderr===`pipe`||e.stderr===`overlapped`)&&(this._stderrStream=new ye),this.onEvent=e.onEvent}async close(){this.onEvent?.({type:`close`}),this._abortController.abort(),this._process=void 0,this._readBuffer.clear()}send(e){return new Promise(t=>{if(!this._process?.stdin)throw Error(`Not connected`);let n=re(e);this._process.stdin.write(n)?t():this._process.stdin.once(`drain`,t)})}async start(){if(this._process)throw Error(`StdioClientTransport already started! If using Client class, note that connect() calls start() automatically.`);return new Promise((e,t)=>{this._process=fe(this._serverParams.command,this._serverParams.args??[],{cwd:this._serverParams.cwd,env:this._serverParams.env,shell:this._serverParams.shell??!1,signal:this._abortController.signal,stdio:[`pipe`,`pipe`,this._serverParams.stderr??`inherit`]}),this._process.on(`error`,e=>{if(e.name===`AbortError`){this.onclose?.();return}b.error(`Process spawn error`,{args:this._serverParams.args,command:this._serverParams.command,cwd:this._serverParams.cwd,error:e.message,errorCode:e.code,errorErrno:e.errno,errorSyscall:e.syscall,operation:`spawn`,shell:this._serverParams.shell,transportType:`stdio`}),t(e),this.onerror?.(e)}),this._process.on(`spawn`,()=>{b.debug(`Process spawned successfully`,{argCount:this._serverParams.args?.length,command:this._serverParams.command,pid:this._process?.pid}),e()}),this._process.on(`close`,e=>{this.onEvent?.({type:`close`}),this._process=void 0,this.onclose?.()}),this._process.stdin?.on(`error`,e=>{b.error(`Stdin error`,{command:this._serverParams.command,error:e.message,operation:`write`,pid:this._process?.pid,transportType:`stdio`}),this.onEvent?.({error:e,type:`error`}),this.onerror?.(e)});let n=new nt;this._process.stdout?.pipe(n),n.on(`data`,e=>{this.onEvent?.({chunk:e.toString(),type:`data`}),this._readBuffer.append(e),this.processReadBuffer()}),n.on(`error`,e=>{b.error(`JSON filter error`,{command:this._serverParams.command,error:e.message,operation:`parse`,pid:this._process?.pid,transportType:`stdio`}),this.onEvent?.({error:e,type:`error`}),this.onerror?.(e)}),this._stderrStream&&this._process.stderr&&this._process.stderr.pipe(this._stderrStream)})}processReadBuffer(){for(;;)try{let e=this._readBuffer.readMessage();if(e===null)break;this.onEvent?.({message:e,type:`message`}),this.onmessage?.(e)}catch(e){let t=`unknown`;try{let e=this._readBuffer.readMessage();e&&(t=typeof e)}catch{}b.error(`Message processing error`,{command:this._serverParams.command,error:e.message,messageType:t,operation:`process`,pid:this._process?.pid,transportType:`stdio`}),this.onEvent?.({error:e,type:`error`}),this.onerror?.(e)}}};function it(e){let t=e.toLowerCase().split(/[/\\]/).pop()||``;return t===`docker`||t===`docker.exe`?`docker`:t===`podman`||t===`podman.exe`?`podman`:t===`nerdctl`||t===`nerdctl.exe`?`nerdctl`:t===`finch`||t===`finch.exe`?`finch`:`unknown`}function at(e){let t=e.indexOf(`run`);if(t===-1)return;let n=e.slice(t+1),r=new Set(`--add-host.--annotation.--arch.--attach.--blkio-weight.--blkio-weight-device.--cap-add.--cap-drop.--cgroup-parent.--cgroupns.--cidfile.--cosign-key.--cpu-period.--cpu-quota.--cpu-rt-period.--cpu-rt-runtime.--cpu-shares.--cpus.--cpuset-cpus.--cpuset-mems.--decryption-key.--device.--device-cgroup-rule.--device-read-bps.--device-read-iops.--device-write-bps.--device-write-iops.--dns.--dns-option.--dns-search.--domainname.--entrypoint.--env.--env-file.--env-host.--expose.--gidmap.--gpus.--group-add.--health-cmd.--health-interval.--health-retries.--health-start-period.--health-timeout.--hostname.--image-volume.--ip.--ip6.--ipc.--isolation.--kernel-memory.--label.--label-file.--link.--link-local-ip.--log-driver.--log-opt.--mac-address.--memory.--memory-reservation.--memory-swap.--memory-swappiness.--mount.--name.--network.--network-alias.--oom-kill-disable.--oom-score-adj.--os.--pid.--pidfile.--pids-limit.--platform.--pod.--privileged.--publish.--publish-all.--pull.--requires.--restart.--rootfs.--runtime.--secret.--security-opt.--shm-size.--stop-signal.--stop-timeout.--storage-opt.--subgidname.--subuidname.--sysctl.--systemd.--timeout.--tmpfs.--tz.--uidmap.--ulimit.--user.--userns.--uts.--variant.--volume.--volume-driver.--volumes-from.--workdir.-a.-c.-e.-h.-l.-m.-p.-P.-u.-v.-w`.split(`.`)),i=0;for(;i<n.length;){let e=n[i];if(e.startsWith(`-`)){if(e.includes(`=`)){i++;continue}if(r.has(e)){i+=2;continue}i++;continue}return e}}function ot(e,t){try{let n=de(`${t===`unknown`?`docker`:t} image inspect --format "{{json .RepoDigests}}" ${JSON.stringify(e)}`,{encoding:`utf-8`,stdio:[`pipe`,`pipe`,`pipe`],timeout:5e3}).trim(),r;try{r=JSON.parse(n)}catch{return b.debug(`Could not parse RepoDigests JSON`,{imageName:e,result:n,runtime:t}),[]}let i=[];for(let e of r){let t=e.match(/sha256:[a-f0-9]{64}/i);t?i.push(t[0]):/^sha256:[a-f0-9]{64}$/i.test(e)&&i.push(e)}return i.length>0?(b.debug(`Container image digests retrieved`,{digests:i,imageName:e,runtime:t}),i):(b.debug(`No digests available for image (may be locally built)`,{imageName:e,runtime:t}),[])}catch(n){return b.debug(`Could not get container image digests`,{error:n instanceof Error?n.message:String(n),imageName:e,runtime:t}),[]}}function st(e,t){let n=it(e);if(n===`unknown`)return{imageDigests:[],imageName:``,isContainerMCP:!1,runtime:`unknown`};if(!t||!t.includes(`run`))return{imageDigests:[],imageName:``,isContainerMCP:!1,runtime:n};let r=at(t);return r?{imageDigests:ot(r,n),imageName:r,isContainerMCP:!0,runtime:n}:(b.debug(`Container command detected but could not extract image name`,{args:t,command:e,runtime:n}),{imageDigests:[],imageName:``,isContainerMCP:!0,runtime:n})}le.inspect.defaultOptions.depth=8,`EventSource`in global||(global.EventSource=$);const ct=async()=>{let t=await oe(ae(process.argv)).scriptName(`mcp-gateway`).command(`stdio [command] [args...]`,`Run a local command with stdio transport (default)`,e=>e.positional(`command`,{describe:`The command to run`,type:`string`}).positional(`args`,{array:!0,describe:`The arguments to pass to the command`,type:`string`})).command(`remote`,`Connect to a remote MCP server`,e=>e.options({"bearer-token-env":{describe:`Environment variable name containing a bearer token for remote authentication`,type:`string`},"env-http-headers":{describe:`HTTP headers resolved from environment variables (format: HeaderName:ENV_VAR_NAME)`,string:!0,type:`array`},headers:{describe:`Headers for remote authentication (format: key:value)`,string:!0,type:`array`},"remote-transport":{choices:[`sse`,`stream`],deprecated:`Transport is now auto-detected per MCP spec. This option is ignored.`,describe:`(Deprecated) The transport type - now auto-detected`,type:`string`},url:{demandOption:!0,describe:`The URL of the remote MCP server`,type:`string`}})).command(`$0 [command] [args...]`,`Run a command with MCP arguments (backward compatible)`,e=>e.positional(`command`,{describe:`The command to run`,type:`string`}).positional(`args`,{array:!0,describe:`The arguments to pass to the command`,type:`string`})).env(`MCP_GATEWAY`).parserConfiguration({"populate--":!0,"unknown-options-as-args":!0}).options({"access-control-url":{describe:`URL of the access control service (overrides MCP_GATEWAY_ACCESS_CONTROL_URL)`,type:`string`},debug:{default:!1,describe:`Enable debug logging`,type:`boolean`},env:{describe:`Environment variables to pass to the command (format: KEY=value)`,string:!0,type:`array`},gracefulShutdownTimeout:{default:5e3,describe:`The timeout (in milliseconds) for graceful shutdown`,type:`number`},port:{describe:`Run as HTTP server on the specified port instead of stdio`,type:`number`},"scanner-api-key":{describe:`API key for scanner authentication (overrides MCP_GATEWAY_SCANNER_API_KEY)`,type:`string`},"scanner-fail-open":{describe:`Allow requests when scanner is unavailable (overrides MCP_GATEWAY_SCANNER_FAIL_OPEN)`,type:`boolean`},"scanner-timeout-ms":{describe:`Scanner request timeout in milliseconds (overrides MCP_GATEWAY_SCANNER_TIMEOUT_MS)`,type:`number`},"scanner-url":{describe:`URL of the scanner/evaluator service (overrides MCP_GATEWAY_SCANNER_URL)`,type:`string`},shell:{default:process.platform===`win32`,describe:`Spawn the server via the user's shell (defaults to true on Windows)`,type:`boolean`}}).help().parseAsync(),a,o,l,d,p,m={};if(t.headers){for(let e of t.headers){let[t,...n]=e.split(`:`);t&&n.length>0&&(m[t.trim()]=n.join(`:`).trim())}let e=ee(m);if(e&&b.setTraceId(e),m.Authorization){let e=m.Authorization.startsWith(`Bearer `)?`bearer_token`:m.Authorization.startsWith(`Basic `)?`basic`:`api_key`;b.info(`Authorization header provided`,{authType:e,eventType:`mcp_auth_header_provided`,remoteUrl:t.url})}}if(t.bearerTokenEnv){let e=t.bearerTokenEnv,n=process.env[e];n?(m.Authorization=`Bearer ${n}`,b.info(`Bearer token loaded from environment variable`,{authType:`bearer_token`,envVar:e,eventType:`mcp_auth_bearer_env`,remoteUrl:t.url})):(b.error(`Bearer token env var specified but not set`,{envVar:e,eventType:`mcp_auth_bearer_env_missing`}),process.exit(1))}if(t.envHttpHeaders)for(let e of t.envHttpHeaders){let[n,...r]=e.split(`:`),i=r.join(`:`).trim();if(n&&i){let e=process.env[i];e?(m[n.trim()]=e,b.info(`HTTP header loaded from environment variable`,{envVar:i,eventType:`mcp_auth_env_header`,header:n.trim(),remoteUrl:t.url})):(b.error(`Env HTTP header var specified but not set`,{envVar:i,eventType:`mcp_auth_env_header_missing`,header:n.trim()}),process.exit(1))}}let h={...f.scanner.headers};if(b.debug(`Initializing traffic scanner`,{failOpen:f.scanner.failOpen,hasApiKey:!!f.scanner.apiKey,scannerEnabled:f.scanner.enabled,scannerUrl:f.scanner.url,timeoutMs:f.scanner.timeoutMs}),t._[0]===`remote`){a=`remote`,t[`remote-transport`]&&b.warn(`The --remote-transport option is deprecated and will be ignored. Transport is now auto-detected per MCP spec (Streamable HTTP with SSE fallback).`,{providedTransport:t[`remote-transport`]});let e=t.url;if(!e)throw new r(`Remote URL is required for remote proxy type`,`url`);d=x(e),d!==e&&b.debug(`Normalized remote URL`,{normalizedUrl:d,originalUrl:e})}else{if(a=`stdio`,t[`--`]&&t[`--`].length>0){let e=t[`--`];o=e[0],l=e.slice(1).map(String)}else o=t.command,l=(t.args||[]).map(String);if(!o)throw new r(`No command specified for stdio proxy`,`command`)}let g={};if(t.env)for(let e of t.env){let[t,...n]=e.split(`=`);t&&n.length>0&&(g[t.trim()]=n.join(`=`).trim())}let S;a===`stdio`&&o&&(S=st(o,l),S.isContainerMCP&&b.info(`Container MCP detected`,{imageDigests:S.imageDigests,imageName:S.imageName,runtime:S.runtime}));let C;if(f.accessControl.url&&f.scanner.apiKey){let e=await v(),t=a===`stdio`?{...e,proxyType:`stdio`,stdioCliArgs:{args:l,command:o,dockerImageDigests:S?.imageDigests,dockerImageName:S?.imageName,proxyType:`stdio`}}:{...e,proxyType:`remote`,remoteCliArgs:{proxyType:`remote`,url:d}};C=new je({apiKey:f.scanner.apiKey,headers:f.accessControl.headers,sessionData:t,timeoutMs:f.accessControl.timeoutMs,url:f.accessControl.url})}let re=a===`remote`?d:o,w=new Ae({client:C,enabled:f.accessControl.enabled,serverName:re}),T=new Ue({storageDir:f.oauthDir}),E=()=>new n({name:`mcp-gateway`,version:f.appVersion},{capabilities:{}}),D=async n=>{if(!await w.isAllowed()){let t=w.getBlockReason();throw b.warn(`MCP server blocked by access control`,{proxyType:a,reason:t}),new e(t,`policy_block`)}if(b.info(`MCP server allowed by access control`),a===`stdio`){let e={...process.env,...g},r=new rt({args:l,command:o,env:e,onEvent:e=>{t.debug&&b.debug(`Transport event`,{event:e})},shell:t.shell,stderr:`inherit`});try{return await n.connect(r),n}catch(e){throw b.warn(`Failed original server access`,{command:o,error:e instanceof Error?e.message:String(e),eventType:`mcp_server_access_failed`,proxyType:a}),new i(`Failed to connect to stdio process: ${e}`,void 0,`stdio`,{argCount:l?.length,command:o})}}else if(a===`remote`){let e=d,t=e=>{let t={...m};return e&&(t.Authorization=`Bearer ${e}`),Object.keys(t).length>0?{headers:t}:void 0},n=e=>{if(e instanceof u)return!0;if(e&&typeof e==`object`){let t=e.status,n=e.code,r=e.message;if(t===401||n===401||r&&/unauthorized|401/i.test(String(r)))return!0}return!1},r=async()=>{let t=await qe(e,{credentialStore:T});return b.info(`Authentication performed`,{authType:`oauth`,eventType:`mcp_auth_performed`,fromCache:t.fromCache,remoteUrl:e}),t.tokens.access_token},o;try{let i=await T.load(e),a=i&&T.hasValidAccessToken(i)?i.tokens?.access_token:void 0,s=!1;try{let n=await $e(E,e,t(a));o=n.client,p=n.transportType,b.info(`Connected to remote server`,{hasAuth:!!a,transport:p})}catch(i){if(n(i)){if(s)throw i;a?(b.info(`Cached OAuth token rejected (possibly revoked), invalidating and re-authorizing...`),await T.update(e,{tokens:void 0,tokensObtainedAt:void 0})):b.info(`Server requires OAuth, starting authentication flow...`),a=await r(),s=!0;let n=await $e(E,e,t(a));o=n.client,p=n.transportType,b.info(`Connected to remote server with OAuth`,{transport:p})}else throw i}return o}catch(t){throw b.warn(`Failed original server access`,{error:t instanceof Error?t.message:String(t),eventType:`mcp_server_access_failed`,proxyType:a,remoteUrl:e}),t instanceof i?t:new i(`Failed to connect to remote server: ${t instanceof Error?t.message:String(t)}`,e,p,{headerCount:Object.keys(m).length})}}return n},se=async()=>{if(t.port){let e=a===`stdio`?{args:l,command:o,dockerImageDigests:S?.imageDigests,dockerImageName:S?.imageName,proxyType:a}:{proxyType:a,url:d};await y({cliArgs:e,scanApiKey:f.scanner.apiKey,scanEnabled:f.scanner.enabled,scanFailOpen:f.scanner.failOpen,scanHeaders:h,scanTimeoutMs:f.scanner.timeoutMs,scanUrl:f.scanner.url||``});let n,r=await ie({createServer:async()=>{let e=E();n=await D(e);let t=n.getServerVersion(),r=n.getServerCapabilities(),i=new s(t,{capabilities:r});return ne({authorizer:w,client:n,server:i,serverCapabilities:r}),i},onClose:async e=>{n&&await n.close(),await e.close()},port:t.port});return b.info(`MCP gateway started`,{eventType:`mcp_gateway_started`,mode:`http`,port:t.port,proxyType:a}),a===`stdio`?b.info(`MCP server configuration`,{args:l?.join(` `)||``,command:o,eventType:`mcp_server_config`,proxyType:a}):b.info(`MCP server configuration`,{eventType:`mcp_server_config`,proxyType:a,remoteUrl:d}),{close:()=>r.close()}}let e=E(),n=await D(e),r=n.getServerVersion(),i=n.getServerCapabilities(),u=new s(r,{capabilities:i});ne({authorizer:w,client:n,server:u,serverCapabilities:i});let m=new c,g=a===`stdio`?{args:l,command:o,dockerImageDigests:S?.imageDigests,dockerImageName:S?.imageName,proxyType:a}:{proxyType:a,url:d};return await y({cliArgs:g,scanApiKey:f.scanner.apiKey,scanEnabled:f.scanner.enabled,scanFailOpen:f.scanner.failOpen,scanHeaders:h,scanTimeoutMs:f.scanner.timeoutMs,scanUrl:f.scanner.url||``}),await u.connect(m),b.info(`MCP gateway started`,{eventType:`mcp_gateway_started`,mode:`stdio`,proxyType:a}),b.info(`MCP server configuration`,{capabilities:Object.keys(i||{}),eventType:`mcp_server_config`,proxyType:a,serverName:r?.name,serverVersion:r?.version,...a===`stdio`?{args:l?.join(` `)||``,command:o}:{remoteUrl:d,transport:p}}),{close:()=>n.close()}},le=({server:e,timeout:t})=>{let n=async()=>{b.info(`MCP gateway stopping`,{eventType:`mcp_gateway_stopping`,signal:`SIGTERM/SIGINT`});try{await e.close(),te(),await _(2e3),process.exit(0)}catch(e){let n=`Error during shutdown: ${e}`;b.error(`Error during shutdown`,{error:n,eventType:`mcp_gateway_stopped`,shutdownTimeout:t}),await _(2e3),process.exit(1)}},r=async()=>{ce(()=>{b.error(`Graceful shutdown timeout exceeded, forcing exit`),process.exit(1)},t).unref(),await n()};return process.once(`SIGTERM`,r),process.once(`SIGINT`,r),()=>e.close()};b.info(`MCP gateway starting`,{command:o,eventType:`mcp_gateway_starting`,proxyType:a,transport:a===`remote`?`auto-detect`:`stdio`,url:d});try{let e=await se();le({server:e,timeout:t.gracefulShutdownTimeout})}catch(t){t instanceof e&&(console.error(`
|
|
138
|
-
❌ ACCESS DENIED`),console.error(`━`.repeat(60)),console.error(`
|
|
139
|
-
This MCP server has been blocked by Onyx because it is not authorized by your organization's access control policy. Please contact your administrator if you believe this is an error.
|
|
140
|
-
`),b.error(`MCP server blocked by access control policy`,{error:t.message,reason:t.reason}),await _(2e3),process.exit(1));let n=`Could not start the proxy: ${t}`;b.error(`MCP server failed to start`,{args:l,command:o,error:n,eventType:`mcp_server_start_failed`,proxyType:a,remoteUrl:d,transport:p}),await _(2e3),process.exit(1)}};export{ct as main};
|
|
141
|
-
//# sourceMappingURL=main-QrfaAtqp.js.map
|