@onyxsecurity/mcp-gateway 1.0.59 → 1.0.60
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/bin/mcp-gateway.js +1 -1
- package/dist/index.js +1 -1
- package/dist/main-Ct3dHxDT.js +142 -0
- package/dist/main-Ct3dHxDT.js.map +1 -0
- package/dist/{normalizeUrl-nUb2udZz.js → normalizeUrl-Cni_Rjv3.js} +13 -13
- package/dist/normalizeUrl-Cni_Rjv3.js.map +1 -0
- package/package.json +1 -1
- package/dist/main-Bn1n-fs1.js +0 -141
- package/dist/main-Bn1n-fs1.js.map +0 -1
- package/dist/normalizeUrl-nUb2udZz.js.map +0 -1
package/package.json
CHANGED
package/dist/main-Bn1n-fs1.js
DELETED
|
@@ -1,141 +0,0 @@
|
|
|
1
|
-
import{AccessControlBlockError as e,BUILD_TIME_CONFIG as t,Client as n,ConfigurationError as r,ProxyConnectionError as i,ReadBuffer as a,SSEClientTransport as o,Server as s,StdioServerTransport as c,StreamableHTTPClientTransport as l,UnauthorizedError as u,chownToRealUser as d,compressClientInfo as f,config as p,createParser as m,discoverAuthorizationServerMetadata as h,discoverOAuthProtectedResourceMetadata as g,exchangeAuthorization as _,extractTraceIdFromHeaders as ee,flushLogs as v,getSessionData as y,initializeTrafficMirror as b,logRequestCounts as te,logger as x,normalizeUrl as S,proxyServer as ne,refreshAuthorization as C,registerClient as w,serializeMessage as T,startAuthorization as re,startHTTPServer as ie}from"./normalizeUrl-nUb2udZz.js";import{emitProxySetupLog as ae,hideBin as oe,yargs_default as se}from"./helpers-Cwd-UJrA.js";import"./pkce-ANRIC6ce.js";import{createHash as E}from"node:crypto";import{join as D}from"node:path";import{platform as O}from"node:os";import{chmod as k,mkdir as ce,readFile as le,rm as ue,writeFile as de}from"node:fs/promises";import{createServer as fe}from"node:http";import{setTimeout as pe}from"node:timers";import me from"node:util";import{execFile as he,execSync as ge,spawn as _e,spawnSync as ve}from"node:child_process";import{URL as ye}from"node:url";import{PassThrough as be,Transform as xe}from"node:stream";var Se=class extends Event{constructor(e,t){super(e),this.code=t?.code??void 0,this.message=t?.message??void 0}[Symbol.for(`nodejs.util.inspect.custom`)](e,t,n){return n(we(this),t)}[Symbol.for(`Deno.customInspect`)](e,t){return e(we(this),t)}};function Ce(e){let t=globalThis.DOMException;return typeof t==`function`?new t(e,`SyntaxError`):SyntaxError(e)}function A(e){return e instanceof Error?`errors`in e&&Array.isArray(e.errors)?e.errors.map(A).join(`, `):`cause`in e&&e.cause instanceof Error?`${e}: ${A(e.cause)}`:e.message:`${e}`}function we(e){return{type:e.type,message:e.message,code:e.code,defaultPrevented:e.defaultPrevented,cancelable:e.cancelable,timeStamp:e.timeStamp}}var Te=e=>{throw TypeError(e)},j=(e,t,n)=>t.has(e)||Te(`Cannot `+n),M=(e,t,n)=>(j(e,t,`read from private field`),n?n.call(e):t.get(e)),N=(e,t,n)=>t.has(e)?Te(`Cannot add the same private member more than once`):t instanceof WeakSet?t.add(e):t.set(e,n),P=(e,t,n,r)=>(j(e,t,`write to private field`),t.set(e,n),n),F=(e,t,n)=>(j(e,t,`access private method`),n),I,L,R,z,B,V,H,U,W,G,K,q,J,Y,X,Z,Ee,De,Oe,ke,Q,Ae,je,$=class extends EventTarget{constructor(e,t){super(),N(this,Y),this.CONNECTING=0,this.OPEN=1,this.CLOSED=2,N(this,I),N(this,L),N(this,R),N(this,z),N(this,B),N(this,V),N(this,H),N(this,U,null),N(this,W),N(this,G),N(this,K,null),N(this,q,null),N(this,J,null),N(this,Z,async e=>{var t;M(this,G).reset();let{body:n,redirected:r,status:i,headers:a}=e;if(i===204){F(this,Y,Q).call(this,`Server sent HTTP 204, not reconnecting`,204),this.close();return}if(r?P(this,R,new URL(e.url)):P(this,R,void 0),i!==200){F(this,Y,Q).call(this,`Non-200 status code (${i})`,i);return}if(!(a.get(`content-type`)||``).startsWith(`text/event-stream`)){F(this,Y,Q).call(this,`Invalid content type, expected "text/event-stream"`,i);return}if(M(this,I)===this.CLOSED)return;P(this,I,this.OPEN);let o=new Event(`open`);if((t=M(this,J))==null||t.call(this,o),this.dispatchEvent(o),typeof n!=`object`||!n||!(`getReader`in n)){F(this,Y,Q).call(this,`Invalid response body, expected a web ReadableStream`,i),this.close();return}let s=new TextDecoder,c=n.getReader(),l=!0;do{let{done:e,value:t}=await c.read();t&&M(this,G).feed(s.decode(t,{stream:!e})),e&&(l=!1,M(this,G).reset(),F(this,Y,Ae).call(this))}while(l)}),N(this,Ee,e=>{P(this,W,void 0),!(e.name===`AbortError`||e.type===`aborted`)&&F(this,Y,Ae).call(this,A(e))}),N(this,Oe,e=>{typeof e.id==`string`&&P(this,U,e.id);let t=new MessageEvent(e.event||`message`,{data:e.data,origin:M(this,R)?M(this,R).origin:M(this,L).origin,lastEventId:e.id||``});M(this,q)&&(!e.event||e.event===`message`)&&M(this,q).call(this,t),this.dispatchEvent(t)}),N(this,ke,e=>{P(this,V,e)}),N(this,je,()=>{P(this,H,void 0),M(this,I)===this.CONNECTING&&F(this,Y,X).call(this)});try{if(e instanceof URL)P(this,L,e);else if(typeof e==`string`)P(this,L,new URL(e,Me()));else throw Error(`Invalid URL`)}catch{throw Ce(`An invalid or illegal string was specified`)}P(this,G,m({onEvent:M(this,Oe),onRetry:M(this,ke)})),P(this,I,this.CONNECTING),P(this,V,3e3),P(this,B,t?.fetch??globalThis.fetch),P(this,z,t?.withCredentials??!1),F(this,Y,X).call(this)}get readyState(){return M(this,I)}get url(){return M(this,L).href}get withCredentials(){return M(this,z)}get onerror(){return M(this,K)}set onerror(e){P(this,K,e)}get onmessage(){return M(this,q)}set onmessage(e){P(this,q,e)}get onopen(){return M(this,J)}set onopen(e){P(this,J,e)}addEventListener(e,t,n){let r=t;super.addEventListener(e,r,n)}removeEventListener(e,t,n){let r=t;super.removeEventListener(e,r,n)}close(){M(this,H)&&clearTimeout(M(this,H)),M(this,I)!==this.CLOSED&&(M(this,W)&&M(this,W).abort(),P(this,I,this.CLOSED),P(this,W,void 0))}};I=new WeakMap,L=new WeakMap,R=new WeakMap,z=new WeakMap,B=new WeakMap,V=new WeakMap,H=new WeakMap,U=new WeakMap,W=new WeakMap,G=new WeakMap,K=new WeakMap,q=new WeakMap,J=new WeakMap,Y=new WeakSet,X=function(){P(this,I,this.CONNECTING),P(this,W,new AbortController),M(this,B)(M(this,L),F(this,Y,De).call(this)).then(M(this,Z)).catch(M(this,Ee))},Z=new WeakMap,Ee=new WeakMap,De=function(){let e={mode:`cors`,redirect:`follow`,headers:{Accept:`text/event-stream`,...M(this,U)?{"Last-Event-ID":M(this,U)}:void 0},cache:`no-store`,signal:M(this,W)?.signal};return`window`in globalThis&&(e.credentials=this.withCredentials?`include`:`same-origin`),e},Oe=new WeakMap,ke=new WeakMap,Q=function(e,t){var n;M(this,I)!==this.CLOSED&&P(this,I,this.CLOSED);let r=new Se(`error`,{code:t,message:e});(n=M(this,K))==null||n.call(this,r),this.dispatchEvent(r)},Ae=function(e,t){var n;if(M(this,I)===this.CLOSED)return;P(this,I,this.CONNECTING);let r=new Se(`error`,{code:t,message:e});(n=M(this,K))==null||n.call(this,r),this.dispatchEvent(r),P(this,H,setTimeout(M(this,je),M(this,V)))},je=new WeakMap,$.CONNECTING=0,$.OPEN=1,$.CLOSED=2;function Me(){let e=`document`in globalThis?globalThis.document:void 0;return e&&typeof e==`object`&&`baseURI`in e&&typeof e.baseURI==`string`?e.baseURI:void 0}var Ne=class{client;enabled;lastBlockReason;serverName;constructor(e){this.enabled=e.enabled,this.client=e.client,this.serverName=e.serverName,x.info(`AccessControlAuthorizer initialized`,{enabled:this.enabled,hasClient:!!this.client,serverName:this.serverName})}getBlockReason(){return this.lastBlockReason?this.lastBlockReason:`MCP server${this.serverName?` '${this.serverName}'`:``} is not authorized for use in your organization and has been blocked by Onyx.`}async isAllowed(){if(!this.enabled)return!0;if(this.client)try{let e=await this.client.authorize();return e.action===`block`?(e.reason?this.lastBlockReason=e.reason:this.lastBlockReason=`MCP server${this.serverName?` '${this.serverName}'`:``} is not authorized for use in your organization and has been blocked by Onyx.`,!1):!0}catch(e){return x.error(`Access control authorization failed with unexpected error`,{error:String(e)}),!0}return x.warn(`No access control client configured, allowing by default`),!0}},Pe=class{clientInfoBase64;config;constructor(e){this.config=e,this.clientInfoBase64=this.getClientInfoBase64(),x.info(`AccessControlClient initialized`,{timeoutMs:e.timeoutMs,url:e.url})}async authorize(){try{let e=await this.sendAuthorizeRequest();return x.debug(`Access control check successful`,{action:e.action}),e}catch(e){return x.warn(`Access control check failed, failing open (allowing by default)`,{error:String(e)}),{action:`allow`}}}getClientInfoBase64(){return f(this.config.sessionData)}async sendAuthorizeRequest(){let e=new AbortController,t=setTimeout(()=>e.abort(),this.config.timeoutMs);try{let t=`${this.config.url}/${this.config.apiKey}/mcp/${this.clientInfoBase64}`,n=await fetch(t,{headers:{...this.config.headers},method:`POST`,signal:e.signal});if(!n.ok)throw Error(`Access control service returned ${n.status}: ${n.statusText}`);let r=await n.json();if(!r.action||![`allow`,`block`].includes(r.action))throw Error(`Invalid access control response format: action="${r.action}"`);return r}catch(e){throw e instanceof Error&&e.name===`AbortError`?Error(`Access control check timed out after ${this.config.timeoutMs}ms`):e}finally{clearTimeout(t)}}};async function Fe(e){let t=e.toString(),n=O(),r=ze(t);return new Promise((e,i)=>{let a,o;if(n===`win32`){let e=`Start-Process ${Le(t)}`,n=Ie(e);a=Re(),o=[`-NoProfile`,`-NonInteractive`,`-ExecutionPolicy`,`Bypass`,`-EncodedCommand`,n]}else n===`darwin`?(a=`open`,o=[t]):(a=`xdg-open`,o=[t]);he(a,o,(t,o,s)=>{if(t){let e={command:a,os:n,stderr:s,url:r};x.warn(`Failed to open browser automatically`,{...e,error:t.message});let o=Error(`Failed to open browser: ${t.message} (command: ${a}, os: ${n}, url: ${r})`);o.cause=t,i(o)}else x.debug(`Browser opened successfully`,{url:r}),e()})})}function Ie(e){return Buffer.from(e,`utf16le`).toString(`base64`)}function Le(e){return`'${e.replaceAll(`'`,`''`)}'`}function Re(){return`${process.env.SYSTEMROOT||process.env.windir||`C:\\Windows`}\\System32\\WindowsPowerShell\\v1.0\\powershell.exe`}function ze(e){try{let t=new URL(e);return t.search?`${t.protocol}//${t.host}${t.pathname}?[REDACTED]`:`${t.protocol}//${t.host}${t.pathname}`}catch{return`[INVALID_URL]`}}const Be=49152;function Ve(){return Math.floor(Math.random()*(65535-Be+1))+Be}function He(e,t){return new Promise((n,r)=>{let i=t=>{e.removeListener(`listening`,a),r(t)},a=()=>{e.removeListener(`error`,i),n()};e.once(`error`,i),e.once(`listening`,a),e.listen(t,`127.0.0.1`)})}async function Ue(e={}){let{maxAttempts:t=5,preferredPort:n,timeoutMs:r=3e5}=e,i,a,o={},s=new Promise((e,t)=>{i=e,a=t}),c,l=fe((e,t)=>{if(e.url===`/favicon.ico`){t.writeHead(404),t.end();return}if(!e.url?.startsWith(`/callback`)){t.writeHead(404),t.end(`Not Found`);return}try{let n=new ye(e.url,`http://localhost:${c}`),r=n.searchParams.get(`code`),s=n.searchParams.get(`error`),u=n.searchParams.get(`error_description`),d=n.searchParams.get(`state`);if(s){x.error(`OAuth authorization error`,{error:s,errorDescription:u}),t.writeHead(400,{"Content-Type":`text/html`}),t.end(Ge(s,u||void 0)),clearTimeout(o.id),a(Error(`OAuth authorization failed: ${s}${u?` - ${u}`:``}`));return}if(!r){x.error(`OAuth callback missing authorization code`),t.writeHead(400,{"Content-Type":`text/html`}),t.end(Ge(`missing_code`,`No authorization code was provided`)),clearTimeout(o.id),a(Error(`OAuth callback missing authorization code`));return}x.info(`OAuth authorization code received`,{codePrefix:`${r.substring(0,10)}...`,hasState:!!d}),t.writeHead(200,{"Content-Type":`text/html`}),t.end(`<!DOCTYPE html>
|
|
2
|
-
<html lang="en">
|
|
3
|
-
<head>
|
|
4
|
-
<meta charset="UTF-8">
|
|
5
|
-
<meta name="viewport" content="width=device-width, initial-scale=1.0">
|
|
6
|
-
<title>Authorization Successful</title>
|
|
7
|
-
<style>
|
|
8
|
-
body {
|
|
9
|
-
font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, sans-serif;
|
|
10
|
-
display: flex;
|
|
11
|
-
justify-content: center;
|
|
12
|
-
align-items: center;
|
|
13
|
-
min-height: 100vh;
|
|
14
|
-
margin: 0;
|
|
15
|
-
background: linear-gradient(135deg, #1a1a2e 0%, #16213e 100%);
|
|
16
|
-
color: #fff;
|
|
17
|
-
}
|
|
18
|
-
.container {
|
|
19
|
-
text-align: center;
|
|
20
|
-
padding: 2rem;
|
|
21
|
-
}
|
|
22
|
-
.checkmark {
|
|
23
|
-
width: 80px;
|
|
24
|
-
height: 80px;
|
|
25
|
-
border-radius: 50%;
|
|
26
|
-
background: #10b981;
|
|
27
|
-
display: flex;
|
|
28
|
-
align-items: center;
|
|
29
|
-
justify-content: center;
|
|
30
|
-
margin: 0 auto 1.5rem;
|
|
31
|
-
animation: pop 0.3s ease-out;
|
|
32
|
-
}
|
|
33
|
-
.checkmark svg {
|
|
34
|
-
width: 40px;
|
|
35
|
-
height: 40px;
|
|
36
|
-
stroke: white;
|
|
37
|
-
stroke-width: 3;
|
|
38
|
-
}
|
|
39
|
-
h1 {
|
|
40
|
-
margin: 0 0 0.5rem;
|
|
41
|
-
font-size: 1.75rem;
|
|
42
|
-
font-weight: 600;
|
|
43
|
-
}
|
|
44
|
-
p {
|
|
45
|
-
margin: 0;
|
|
46
|
-
color: #a0aec0;
|
|
47
|
-
font-size: 1rem;
|
|
48
|
-
}
|
|
49
|
-
@keyframes pop {
|
|
50
|
-
0% { transform: scale(0); }
|
|
51
|
-
50% { transform: scale(1.1); }
|
|
52
|
-
100% { transform: scale(1); }
|
|
53
|
-
}
|
|
54
|
-
</style>
|
|
55
|
-
</head>
|
|
56
|
-
<body>
|
|
57
|
-
<div class="container">
|
|
58
|
-
<div class="checkmark">
|
|
59
|
-
<svg viewBox="0 0 24 24" fill="none">
|
|
60
|
-
<path d="M5 13l4 4L19 7" stroke-linecap="round" stroke-linejoin="round"/>
|
|
61
|
-
</svg>
|
|
62
|
-
</div>
|
|
63
|
-
<h1>Authorization Successful</h1>
|
|
64
|
-
<p>You can close this window and return to the terminal.</p>
|
|
65
|
-
</div>
|
|
66
|
-
<script>setTimeout(() => window.close(), 3000);<\/script>
|
|
67
|
-
</body>
|
|
68
|
-
</html>`),clearTimeout(o.id),i({code:r,state:d||void 0}),setTimeout(()=>l.close(),1e3)}catch(e){x.error(`Error processing OAuth callback`,{error:String(e)}),t.writeHead(500),t.end(`Internal Server Error`),clearTimeout(o.id),a(e instanceof Error?e:Error(String(e)))}});o.id=setTimeout(()=>{a(Error(`OAuth callback timeout after ${r}ms`)),l.close()},r);let u=[],d;for(;u.length<t;){let e;if(u.length===0&&n!==void 0)e=n;else for(e=Ve();u.includes(e);)e=Ve();u.push(e);try{await He(l,e),c=e;let t=`http://localhost:${c}/callback`;return x.info(`OAuth callback server started`,{attempt:u.length,callbackUrl:t,port:c}),{callbackUrl:t,close:()=>new Promise(e=>{clearTimeout(o.id),l.close(()=>e())}),port:c,waitForCallback:()=>s}}catch(n){if(n.code===`EADDRINUSE`)x.debug(`Port in use, trying another port`,{attempt:u.length,maxAttempts:t,port:e}),d=Error(`Port ${e} is already in use`);else throw clearTimeout(o.id),l.close(),n}}throw clearTimeout(o.id),l.close(),Error(`Failed to start OAuth callback server after ${t} attempts. Tried ports: ${u.join(`, `)}. Last error: ${d?.message||`unknown`}`)}function We(e){return e.replace(/&/g,`&`).replace(/</g,`<`).replace(/>/g,`>`).replace(/"/g,`"`).replace(/'/g,`'`)}function Ge(e,t){return`<!DOCTYPE html>
|
|
69
|
-
<html lang="en">
|
|
70
|
-
<head>
|
|
71
|
-
<meta charset="UTF-8">
|
|
72
|
-
<meta name="viewport" content="width=device-width, initial-scale=1.0">
|
|
73
|
-
<title>Authorization Failed</title>
|
|
74
|
-
<style>
|
|
75
|
-
body {
|
|
76
|
-
font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, sans-serif;
|
|
77
|
-
display: flex;
|
|
78
|
-
justify-content: center;
|
|
79
|
-
align-items: center;
|
|
80
|
-
min-height: 100vh;
|
|
81
|
-
margin: 0;
|
|
82
|
-
background: linear-gradient(135deg, #1a1a2e 0%, #16213e 100%);
|
|
83
|
-
color: #fff;
|
|
84
|
-
}
|
|
85
|
-
.container {
|
|
86
|
-
text-align: center;
|
|
87
|
-
padding: 2rem;
|
|
88
|
-
max-width: 400px;
|
|
89
|
-
}
|
|
90
|
-
.error-icon {
|
|
91
|
-
width: 80px;
|
|
92
|
-
height: 80px;
|
|
93
|
-
border-radius: 50%;
|
|
94
|
-
background: #ef4444;
|
|
95
|
-
display: flex;
|
|
96
|
-
align-items: center;
|
|
97
|
-
justify-content: center;
|
|
98
|
-
margin: 0 auto 1.5rem;
|
|
99
|
-
}
|
|
100
|
-
.error-icon svg {
|
|
101
|
-
width: 40px;
|
|
102
|
-
height: 40px;
|
|
103
|
-
stroke: white;
|
|
104
|
-
stroke-width: 3;
|
|
105
|
-
}
|
|
106
|
-
h1 {
|
|
107
|
-
margin: 0 0 0.5rem;
|
|
108
|
-
font-size: 1.75rem;
|
|
109
|
-
font-weight: 600;
|
|
110
|
-
}
|
|
111
|
-
.error-code {
|
|
112
|
-
color: #f87171;
|
|
113
|
-
font-family: monospace;
|
|
114
|
-
margin-bottom: 0.5rem;
|
|
115
|
-
}
|
|
116
|
-
p {
|
|
117
|
-
margin: 0;
|
|
118
|
-
color: #a0aec0;
|
|
119
|
-
font-size: 1rem;
|
|
120
|
-
}
|
|
121
|
-
</style>
|
|
122
|
-
</head>
|
|
123
|
-
<body>
|
|
124
|
-
<div class="container">
|
|
125
|
-
<div class="error-icon">
|
|
126
|
-
<svg viewBox="0 0 24 24" fill="none">
|
|
127
|
-
<path d="M6 18L18 6M6 6l12 12" stroke-linecap="round" stroke-linejoin="round"/>
|
|
128
|
-
</svg>
|
|
129
|
-
</div>
|
|
130
|
-
<h1>Authorization Failed</h1>
|
|
131
|
-
<p class="error-code">${We(e)}</p>
|
|
132
|
-
${t?`<p>${We(t)}</p>`:``}
|
|
133
|
-
</div>
|
|
134
|
-
</body>
|
|
135
|
-
</html>`}var Ke=class{storageDir;constructor(e){this.storageDir=e.storageDir}async delete(e){let t=S(e),n=this.getFilePath(t);try{await ue(n),x.debug(`Deleted stored credentials`,{filePath:n,serverUrl:t})}catch(e){e.code!==`ENOENT`&&x.warn(`Failed to delete stored credentials`,{error:String(e),filePath:n,serverUrl:t})}}hasRefreshToken(e){return!!e.tokens?.refresh_token}hasValidAccessToken(e){return!!e.tokens?.access_token&&!this.isAccessTokenExpired(e)}isAccessTokenExpired(e){if(!e.tokens||!e.tokensObtainedAt)return!0;let{expires_in:t}=e.tokens;if(!t)return!1;let n=new Date(e.tokensObtainedAt).getTime()+t*1e3,r=Date.now(),i=r>=n-3e4;return x.debug(`Checked access token expiration`,{expiresAt:new Date(n).toISOString(),expiresIn:t,isExpired:i,now:new Date(r).toISOString(),obtainedAt:e.tokensObtainedAt}),i}async load(e){let t=S(e),n=this.getFilePath(t);try{let e=await le(n,`utf-8`),r=JSON.parse(e);if(S(r.serverUrl)!==t){x.warn(`Credential file server URL mismatch`,{expected:t,filePath:n,found:r.serverUrl});return}return x.debug(`Loaded stored credentials`,{clientId:r.clientInfo?.client_id,hasRefreshToken:!!r.tokens?.refresh_token,hasTokens:!!r.tokens,serverUrl:t}),r}catch(e){if(e.code===`ENOENT`){x.debug(`No stored credentials found`,{serverUrl:t});return}x.warn(`Failed to load stored credentials`,{error:String(e),filePath:n,serverUrl:t});return}}async save(e){await this.ensureStorageDir();let t=this.getFilePath(e.serverUrl),n=JSON.stringify(e,null,2);try{await de(t,n,{encoding:`utf-8`,mode:384}),await k(t,384),x.debug(`Saved credentials to disk`,{clientId:e.clientInfo?.client_id,filePath:t,hasTokens:!!e.tokens,serverUrl:e.serverUrl})}catch(n){throw x.error(`Failed to save credentials`,{error:String(n),filePath:t,serverUrl:e.serverUrl}),n}}async update(e,t){let n=S(e),r=await this.load(n),i=new Date().toISOString(),a=r?{...r,...t,serverUrl:n,updatedAt:i}:{createdAt:i,serverUrl:n,updatedAt:i,...t};return await this.save(a),a}async ensureStorageDir(){try{await ce(this.storageDir,{mode:448,recursive:!0})}catch(e){if(e.code!==`EEXIST`)throw e}try{await d(this.storageDir)}catch(e){x.warn(`Failed to fix OAuth storage directory ownership`,{error:String(e),storageDir:this.storageDir})}}generateKey(e){return E(`sha256`).update(e).digest(`hex`).substring(0,16)}getFilePath(e){let t=this.generateKey(e);return D(this.storageDir,`${t}.json`)}};const qe=t.OAUTH_PROVIDERS;function Je(e){let t=typeof e==`string`?new URL(e):e,n=t.hostname.toLowerCase();for(let e of qe)for(let t of e.urlPatterns){let r=t.toLowerCase();if(Ye(n,r))return x.debug(`Found matching OAuth provider for URL`,{hostname:n,pattern:t,providerId:e.id,providerName:e.name}),e}x.debug(`No pre-configured OAuth provider found for URL`,{hostname:n,serverUrl:t.toString()})}function Ye(e,t){return!!(e===t||e.endsWith(`.${t}`))}async function Xe(e,t={}){let{credentialStore:n,scope:r,timeoutMs:i}=t,a=S(e),o=new URL(a);if(x.info(`Starting OAuth flow`,{serverUrl:a}),n){let e=await $e(o,n);if(e)return x.info(`Using existing OAuth credentials`,{clientId:e.clientInfo.client_id,serverUrl:a}),e}x.debug(`Starting OAuth callback server...`);let s=await Ue({timeoutMs:i}),c=s.callbackUrl;x.info(`OAuth callback server started`,{callbackUrl:c,port:s.port});try{let e=Je(o);if(e)return x.info(`Using pre-configured OAuth provider`,{providerId:e.id,providerName:e.name}),await Qe(o,e,s,n,r);x.debug(`Discovering OAuth protected resource metadata...`);let i;try{i=await g(o),x.info(`Discovered protected resource metadata`,{authorizationServers:i?.authorization_servers,resource:i?.resource,scopesSupported:i?.scopes_supported})}catch(e){x.warn(`Could not discover protected resource metadata, will try direct discovery`,{error:String(e)})}let l;i?.authorization_servers?.length?(l=new URL(i.authorization_servers[0]),x.debug(`Using authorization server from resource metadata`,{authServerUrl:l.toString()})):(l=o,x.debug(`Using server URL as authorization server`,{authServerUrl:l.toString()})),x.debug(`Discovering authorization server metadata...`);let u=await h(l);if(!u)throw Error(`Could not discover OAuth metadata from ${l}. The server may not support OAuth 2.0 or the metadata endpoint is not accessible.`);x.info(`Discovered authorization server metadata`,{authorizationEndpoint:u.authorization_endpoint,issuer:u.issuer,registrationEndpoint:u.registration_endpoint,tokenEndpoint:u.token_endpoint});let d,f=n?await n.load(a):void 0,p=f?.clientInfo?.redirect_uris||[];if(f?.clientInfo&&p.includes(c)&&f?.clientInfo)x.info(`Reusing existing DCR client registration`,{clientId:f.clientInfo.client_id,clientName:f.clientInfo.client_name,redirectUri:c}),d=f.clientInfo;else{f?.clientInfo&&x.info(`Existing DCR client has different redirect_uri, re-registering`,{existingRedirectUris:p,newRedirectUri:c});let e={client_name:t.clientMetadata?.client_name||`MCP Gateway`,grant_types:t.clientMetadata?.grant_types||[`authorization_code`,`refresh_token`],redirect_uris:[c],response_types:t.clientMetadata?.response_types||[`code`],token_endpoint_auth_method:t.clientMetadata?.token_endpoint_auth_method||`none`,...r&&{scope:r}};if(x.debug(`Client metadata for DCR`,{clientMetadata:e}),!u.registration_endpoint)throw Error(`Authorization server does not support Dynamic Client Registration. No registration_endpoint found in metadata.`);x.info(`Registering client via DCR...`,{registrationEndpoint:u.registration_endpoint}),d=await w(l,{clientMetadata:e,metadata:u}),x.info(`Client registered successfully via DCR`,{clientId:d.client_id,clientName:d.client_name,clientSecretExpiresAt:d.client_secret_expires_at}),n&&await n.update(a,{clientInfo:d})}let m=crypto.randomUUID();x.debug(`Starting authorization flow...`);let{authorizationUrl:ee,codeVerifier:v}=await re(l,{clientInformation:d,metadata:u,redirectUrl:c,scope:r,state:m});await Fe(ee),x.debug(`Waiting for OAuth callback...`);let y=await s.waitForCallback();if(y.state!==m)throw Error(`OAuth state mismatch - possible CSRF attack`);x.info(`Authorization code received`,{codePrefix:`${y.code.substring(0,10)}...`}),x.debug(`Exchanging authorization code for tokens...`);let b=await _(l,{authorizationCode:y.code,clientInformation:d,codeVerifier:v,metadata:u,redirectUri:c});if(x.info(`OAuth tokens obtained successfully`,{expiresIn:b.expires_in,hasRefreshToken:!!b.refresh_token,tokenType:b.token_type}),n){let e=new Date().toISOString();await n.update(a,{tokens:b,tokensObtainedAt:e}),x.info(`OAuth credentials persisted to disk`,{serverUrl:a})}return{clientInfo:d,fromCache:!1,tokens:b}}finally{await s.close()}}async function Ze(e,t,n,r){let i=e.tokenEndpoint,a=e.tokenEndpointAuthMethod||(e.clientSecret?`client_secret_post`:`none`),o=new URLSearchParams;o.set(`grant_type`,`authorization_code`),o.set(`code`,t),o.set(`redirect_uri`,n),r&&o.set(`code_verifier`,r);let s={Accept:`application/json`,"Content-Type":`application/x-www-form-urlencoded`};a===`client_secret_basic`&&e.clientSecret?s.Authorization=`Basic ${Buffer.from(`${e.clientId}:${e.clientSecret}`).toString(`base64`)}`:a===`client_secret_post`&&e.clientSecret?(o.set(`client_id`,e.clientId),o.set(`client_secret`,e.clientSecret)):o.set(`client_id`,e.clientId),x.debug(`Sending token request`,{authMethod:a,providerId:e.id,tokenEndpoint:i});let c=await fetch(i,{body:o.toString(),headers:s,method:`POST`});if(!c.ok){let t=await c.text();throw x.error(`Token exchange failed`,{error:t,providerId:e.id,status:c.status}),Error(`Token exchange failed: ${c.status} ${t}`)}let l=c.headers.get(`content-type`)||``,u;if(l.includes(`application/json`))u=await c.json();else if(l.includes(`application/x-www-form-urlencoded`)||l.includes(`text/plain`)){let e=await c.text(),t=new URLSearchParams(e);u=Object.fromEntries(t.entries())}else{let e=await c.text();try{u=JSON.parse(e)}catch{let t=new URLSearchParams(e);u=Object.fromEntries(t.entries())}}return typeof u.expires_in==`string`&&(u.expires_in=parseInt(u.expires_in,10)),{access_token:u.access_token,expires_in:u.expires_in,refresh_token:u.refresh_token,scope:u.scope,token_type:u.token_type||`bearer`}}async function Qe(e,t,n,r,i){let a=e.toString(),o=n.callbackUrl,s={client_id:t.clientId,client_name:t.name,client_secret:t.clientSecret,redirect_uris:[o],token_endpoint_auth_method:t.tokenEndpointAuthMethod||(t.clientSecret?`client_secret_post`:`none`)};x.info(`Using pre-configured OAuth client`,{clientId:t.clientId,hasClientSecret:!!t.clientSecret,providerId:t.id,tokenEndpointAuthMethod:s.token_endpoint_auth_method});let c=i||t.scopes?.join(` `),l=t.usePkce!==!1,u,d,f;if(l){let{generateCodeChallenge:e,generateCodeVerifier:t}=await import(`./pkce-dymop6yt.js`);u=t(),d=await e(u),f=`S256`}let p=new URL(t.authorizationEndpoint);p.searchParams.set(`client_id`,t.clientId),p.searchParams.set(`redirect_uri`,o),p.searchParams.set(`response_type`,`code`),c&&p.searchParams.set(`scope`,c);let m=crypto.randomUUID();p.searchParams.set(`state`,m),d&&f&&(p.searchParams.set(`code_challenge`,d),p.searchParams.set(`code_challenge_method`,f)),await Fe(p),x.debug(`Waiting for OAuth callback...`);let h=await n.waitForCallback();if(h.state!==m)throw Error(`OAuth state mismatch - possible CSRF attack`);x.info(`Authorization code received`,{codePrefix:`${h.code.substring(0,10)}...`,providerId:t.id}),x.debug(`Exchanging authorization code for tokens...`);let g=await Ze(t,h.code,o,u);if(x.info(`OAuth tokens obtained successfully`,{expiresIn:g.expires_in,hasRefreshToken:!!g.refresh_token,providerId:t.id,tokenType:g.token_type}),r){let e=new Date().toISOString();await r.update(a,{clientInfo:s,tokens:g,tokensObtainedAt:e}),x.info(`OAuth credentials persisted to disk`,{providerId:t.id,serverUrl:a})}return{clientInfo:s,fromCache:!1,tokens:g}}async function $e(e,t){let n=await t.load(e.toString());if(!n){x.debug(`No stored credentials found`,{serverUrl:e.toString()});return}if(!n.clientInfo){x.debug(`Stored credentials have no client info`,{serverUrl:e.toString()});return}if(t.hasValidAccessToken(n)&&n.tokens)return x.info(`Using cached OAuth credentials with valid access token`,{clientId:n.clientInfo.client_id,serverUrl:e.toString()}),{clientInfo:n.clientInfo,fromCache:!0,tokens:n.tokens};if(t.hasRefreshToken(n)){let r=await et(e,n,t);if(r)return r}x.debug(`Stored credentials are expired and no valid refresh token`,{serverUrl:e.toString()})}async function et(e,t,n){if(!(!t.clientInfo||!t.tokens?.refresh_token)){x.info(`Attempting to refresh expired access token`,{clientId:t.clientInfo.client_id,serverUrl:e.toString()});try{let r;try{r=await g(e)}catch{}let i;i=r?.authorization_servers?.length?new URL(r.authorization_servers[0]):e;let a=await h(i),o=await C(i,{clientInformation:t.clientInfo,metadata:a,refreshToken:t.tokens.refresh_token});x.info(`Successfully refreshed access token`,{clientId:t.clientInfo.client_id,expiresIn:o.expires_in,hasNewRefreshToken:!!o.refresh_token});let s=new Date().toISOString();return await n.update(e.toString(),{tokens:o,tokensObtainedAt:s}),{clientInfo:t.clientInfo,fromCache:!0,tokens:o}}catch(t){x.warn(`Failed to refresh access token, will require re-authorization`,{error:String(t),serverUrl:e.toString()}),await n.update(e.toString(),{tokens:void 0,tokensObtainedAt:void 0});return}}}const tt=[`streamable-http`,`sse`];async function nt(e,t,n){let r;for(let i of tt){let a=e();try{let e=rt(t,i,n);return await a.connect(e),{client:a,transportType:i}}catch(e){if(r=e,it(e)){x.info(`${i} not supported, trying next transport...`);continue}throw e}}throw r??Error(`No compatible transport found`)}function rt(e,t,n){let r=new URL(e);return t===`streamable-http`?new l(r,{requestInit:n}):new o(r,{requestInit:n})}function it(e){if(!e||typeof e!=`object`)return!1;let t=e.status,n=e.code,r=e.message;return!!(t===404||t===405||n===404||n===405||r&&/404|not found|405|method not allowed/i.test(String(r)))}var at=class extends xe{buffer=``;constructor(){super({objectMode:!1})}_flush(e){this.buffer.trim().startsWith(`{`)?e(null,Buffer.from(this.buffer)):e(null,null)}_transform(e,t,n){this.buffer+=e.toString();let r=this.buffer.split(`
|
|
136
|
-
`);this.buffer=r.pop()||``;let i=r.filter(e=>e.trim().startsWith(`{`));if(i.length>0){let e=`${i.join(`
|
|
137
|
-
`)}\n`;n(null,Buffer.from(e))}else n(null,null)}},ot=class{onclose;onerror;onmessage;get pid(){return this._process?.pid??null}get stderr(){return this._stderrStream?this._stderrStream:this._process?.stderr??null}_abortController=new AbortController;_process;_readBuffer=new a;_serverParams;_stderrStream=null;onEvent;constructor(e){this._serverParams=e,(e.stderr===`pipe`||e.stderr===`overlapped`)&&(this._stderrStream=new be),this.onEvent=e.onEvent}async close(){if(this.onEvent?.({type:`close`}),this._process?.pid)try{if(process.platform===`win32`){let e=ve(`taskkill`,[`/PID`,String(this._process.pid),`/T`,`/F`],{stdio:`ignore`});if(e.error)throw e.error;if(e.status!==0)throw Error(`taskkill exited with status ${e.status}`)}else process.kill(-this._process.pid,`SIGTERM`)}catch(e){x.debug(`Process tree cleanup failed (process may already be dead)`,{error:e.message,pid:this._process.pid})}this._abortController.abort(),this._process=void 0,this._readBuffer.clear()}send(e){return new Promise(t=>{if(!this._process?.stdin)throw Error(`Not connected`);let n=T(e);this._process.stdin.write(n)?t():this._process.stdin.once(`drain`,t)})}async start(){if(this._process)throw Error(`StdioClientTransport already started! If using Client class, note that connect() calls start() automatically.`);return new Promise((e,t)=>{this._process=_e(this._serverParams.command,this._serverParams.args??[],{cwd:this._serverParams.cwd,detached:process.platform!==`win32`,env:this._serverParams.env,shell:this._serverParams.shell??!1,signal:this._abortController.signal,stdio:[`pipe`,`pipe`,this._serverParams.stderr??`inherit`]}),this._process.on(`error`,e=>{if(e.name===`AbortError`){this.onclose?.();return}x.error(`Process spawn error`,{args:this._serverParams.args,command:this._serverParams.command,cwd:this._serverParams.cwd,error:e.message,errorCode:e.code,errorErrno:e.errno,errorSyscall:e.syscall,operation:`spawn`,shell:this._serverParams.shell,transportType:`stdio`}),t(e),this.onerror?.(e)}),this._process.on(`spawn`,()=>{x.debug(`Process spawned successfully`,{argCount:this._serverParams.args?.length,command:this._serverParams.command,pid:this._process?.pid}),e()}),this._process.on(`close`,e=>{this.onEvent?.({type:`close`}),this._process=void 0,this.onclose?.()}),this._process.stdin?.on(`error`,e=>{x.error(`Stdin error`,{command:this._serverParams.command,error:e.message,operation:`write`,pid:this._process?.pid,transportType:`stdio`}),this.onEvent?.({error:e,type:`error`}),this.onerror?.(e)});let n=new at;this._process.stdout?.pipe(n),n.on(`data`,e=>{this.onEvent?.({chunk:e.toString(),type:`data`}),this._readBuffer.append(e),this.processReadBuffer()}),n.on(`error`,e=>{x.error(`JSON filter error`,{command:this._serverParams.command,error:e.message,operation:`parse`,pid:this._process?.pid,transportType:`stdio`}),this.onEvent?.({error:e,type:`error`}),this.onerror?.(e)}),this._stderrStream&&this._process.stderr&&this._process.stderr.pipe(this._stderrStream)})}processReadBuffer(){for(;;)try{let e=this._readBuffer.readMessage();if(e===null)break;this.onEvent?.({message:e,type:`message`}),this.onmessage?.(e)}catch(e){let t=`unknown`;try{let e=this._readBuffer.readMessage();e&&(t=typeof e)}catch{}x.error(`Message processing error`,{command:this._serverParams.command,error:e.message,messageType:t,operation:`process`,pid:this._process?.pid,transportType:`stdio`}),this.onEvent?.({error:e,type:`error`}),this.onerror?.(e)}}};function st(e){let t=e.toLowerCase().split(/[/\\]/).pop()||``;return t===`docker`||t===`docker.exe`?`docker`:t===`podman`||t===`podman.exe`?`podman`:t===`nerdctl`||t===`nerdctl.exe`?`nerdctl`:t===`finch`||t===`finch.exe`?`finch`:`unknown`}function ct(e){let t=e.indexOf(`run`);if(t===-1)return;let n=e.slice(t+1),r=new Set(`--add-host.--annotation.--arch.--attach.--blkio-weight.--blkio-weight-device.--cap-add.--cap-drop.--cgroup-parent.--cgroupns.--cidfile.--cosign-key.--cpu-period.--cpu-quota.--cpu-rt-period.--cpu-rt-runtime.--cpu-shares.--cpus.--cpuset-cpus.--cpuset-mems.--decryption-key.--device.--device-cgroup-rule.--device-read-bps.--device-read-iops.--device-write-bps.--device-write-iops.--dns.--dns-option.--dns-search.--domainname.--entrypoint.--env.--env-file.--env-host.--expose.--gidmap.--gpus.--group-add.--health-cmd.--health-interval.--health-retries.--health-start-period.--health-timeout.--hostname.--image-volume.--ip.--ip6.--ipc.--isolation.--kernel-memory.--label.--label-file.--link.--link-local-ip.--log-driver.--log-opt.--mac-address.--memory.--memory-reservation.--memory-swap.--memory-swappiness.--mount.--name.--network.--network-alias.--oom-kill-disable.--oom-score-adj.--os.--pid.--pidfile.--pids-limit.--platform.--pod.--privileged.--publish.--publish-all.--pull.--requires.--restart.--rootfs.--runtime.--secret.--security-opt.--shm-size.--stop-signal.--stop-timeout.--storage-opt.--subgidname.--subuidname.--sysctl.--systemd.--timeout.--tmpfs.--tz.--uidmap.--ulimit.--user.--userns.--uts.--variant.--volume.--volume-driver.--volumes-from.--workdir.-a.-c.-e.-h.-l.-m.-p.-P.-u.-v.-w`.split(`.`)),i=0;for(;i<n.length;){let e=n[i];if(e.startsWith(`-`)){if(e.includes(`=`)){i++;continue}if(r.has(e)){i+=2;continue}i++;continue}return e}}function lt(e,t){try{let n=ge(`${t===`unknown`?`docker`:t} image inspect --format "{{json .RepoDigests}}" ${JSON.stringify(e)}`,{encoding:`utf-8`,stdio:[`pipe`,`pipe`,`pipe`],timeout:5e3}).trim(),r;try{r=JSON.parse(n)}catch{return x.debug(`Could not parse RepoDigests JSON`,{imageName:e,result:n,runtime:t}),[]}let i=[];for(let e of r){let t=e.match(/sha256:[a-f0-9]{64}/i);t?i.push(t[0]):/^sha256:[a-f0-9]{64}$/i.test(e)&&i.push(e)}return i.length>0?(x.debug(`Container image digests retrieved`,{digests:i,imageName:e,runtime:t}),i):(x.debug(`No digests available for image (may be locally built)`,{imageName:e,runtime:t}),[])}catch(n){return x.debug(`Could not get container image digests`,{error:n instanceof Error?n.message:String(n),imageName:e,runtime:t}),[]}}function ut(e,t){let n=st(e);if(n===`unknown`)return{imageDigests:[],imageName:``,isContainerMCP:!1,runtime:`unknown`};if(!t||!t.includes(`run`))return{imageDigests:[],imageName:``,isContainerMCP:!1,runtime:n};let r=ct(t);return r?{imageDigests:lt(r,n),imageName:r,isContainerMCP:!0,runtime:n}:(x.debug(`Container command detected but could not extract image name`,{args:t,command:e,runtime:n}),{imageDigests:[],imageName:``,isContainerMCP:!0,runtime:n})}me.inspect.defaultOptions.depth=8,`EventSource`in global||(global.EventSource=$);const dt=async()=>{ae(x);let t=await se(oe(process.argv)).scriptName(`mcp-gateway`).command(`stdio [command] [args...]`,`Run a local command with stdio transport (default)`,e=>e.positional(`command`,{describe:`The command to run`,type:`string`}).positional(`args`,{array:!0,describe:`The arguments to pass to the command`,type:`string`})).command(`remote`,`Connect to a remote MCP server`,e=>e.options({"bearer-token-env":{describe:`Environment variable name containing a bearer token for remote authentication`,type:`string`},"env-http-headers":{describe:`HTTP headers resolved from environment variables (format: HeaderName:ENV_VAR_NAME)`,string:!0,type:`array`},headers:{deprecated:`Use --env-http-headers with env var names instead. --headers exposes values in process listings.`,describe:`Legacy: headers with literal values (format: key:value)`,string:!0,type:`array`},"remote-transport":{choices:[`sse`,`stream`],deprecated:`Transport is now auto-detected per MCP spec. This option is ignored.`,describe:`(Deprecated) The transport type - now auto-detected`,type:`string`},url:{demandOption:!0,describe:`The URL of the remote MCP server`,type:`string`}})).command(`$0 [command] [args...]`,`Run a command with MCP arguments (backward compatible)`,e=>e.positional(`command`,{describe:`The command to run`,type:`string`}).positional(`args`,{array:!0,describe:`The arguments to pass to the command`,type:`string`})).env(`MCP_GATEWAY`).parserConfiguration({"populate--":!0,"unknown-options-as-args":!0}).options({"access-control-url":{describe:`URL of the access control service (overrides MCP_GATEWAY_ACCESS_CONTROL_URL)`,type:`string`},debug:{default:!1,describe:`Enable debug logging`,type:`boolean`},env:{describe:`Environment variables to pass to the command (format: KEY=value)`,string:!0,type:`array`},gracefulShutdownTimeout:{default:5e3,describe:`The timeout (in milliseconds) for graceful shutdown`,type:`number`},port:{describe:`Run as HTTP server on the specified port instead of stdio`,type:`number`},"scanner-api-key":{describe:`API key for scanner authentication (overrides MCP_GATEWAY_SCANNER_API_KEY)`,type:`string`},"scanner-fail-open":{describe:`Allow requests when scanner is unavailable (overrides MCP_GATEWAY_SCANNER_FAIL_OPEN)`,type:`boolean`},"scanner-timeout-ms":{describe:`Scanner request timeout in milliseconds (overrides MCP_GATEWAY_SCANNER_TIMEOUT_MS)`,type:`number`},"scanner-url":{describe:`URL of the scanner/evaluator service (overrides MCP_GATEWAY_SCANNER_URL)`,type:`string`},shell:{default:process.platform===`win32`,describe:`Spawn the server via the user's shell (defaults to true on Windows)`,type:`boolean`}}).help().parseAsync(),a,o,l,d,f,m={},h={};if(t.env)for(let e of t.env){let[t,...n]=e.split(`=`);t&&n.length>0&&(h[t.trim()]=n.join(`=`).trim())}let g=e=>{if(e.includes("${")){let t,n=e.replace(/\$\{([A-Za-z_][A-Za-z0-9_]*)\}/g,(e,n)=>process.env[n]||(t=n,``));return t?{missingVar:t,resolved:``}:{resolved:n}}let t=process.env[e];return t?{resolved:t}:{missingVar:e,resolved:``}};if(t.headers)for(let e of t.headers){let[t,...n]=e.split(`:`);t&&n.length>0&&(m[t.trim()]=n.join(`:`).trim())}if(t.bearerTokenEnv){let e=t.bearerTokenEnv,{missingVar:n,resolved:r}=g(e);n&&(x.error(`Bearer token env var specified but not set`,{envVar:n,eventType:`mcp_auth_bearer_env_missing`}),process.exit(1)),m.Authorization=`Bearer ${r}`,x.info(`Bearer token loaded from environment variable`,{authType:`bearer_token`,envVar:e,eventType:`mcp_auth_bearer_env`,remoteUrl:t.url})}if(t.envHttpHeaders)for(let e of t.envHttpHeaders){let[n,...r]=e.split(`:`),i=r.join(`:`).trim();if(n&&i){let e=n.trim(),{missingVar:r,resolved:a}=g(i);r&&(x.error(`Env var for HTTP header not set`,{envVar:r,eventType:`mcp_auth_env_header_missing`,header:e}),process.exit(1)),m[e]=a,x.info(`HTTP header loaded from environment`,{eventType:`mcp_auth_env_header`,header:e,remoteUrl:t.url})}}let _=ee(m);if(_&&x.setTraceId(_),m.Authorization){let e=m.Authorization.startsWith(`Bearer `)?`bearer_token`:m.Authorization.startsWith(`Basic `)?`basic`:`api_key`;x.info(`Authorization header provided`,{authType:e,eventType:`mcp_auth_header_provided`,remoteUrl:t.url})}let C={...p.scanner.headers};if(x.debug(`Initializing traffic scanner`,{failOpen:p.scanner.failOpen,hasApiKey:!!p.scanner.apiKey,scannerEnabled:p.scanner.enabled,scannerUrl:p.scanner.url,timeoutMs:p.scanner.timeoutMs}),t._[0]===`remote`){a=`remote`,t[`remote-transport`]&&x.warn(`The --remote-transport option is deprecated and will be ignored. Transport is now auto-detected per MCP spec (Streamable HTTP with SSE fallback).`,{providedTransport:t[`remote-transport`]});let e=t.url;if(!e)throw new r(`Remote URL is required for remote proxy type`,`url`);d=S(e),d!==e&&x.debug(`Normalized remote URL`,{normalizedUrl:d,originalUrl:e})}else{if(a=`stdio`,t[`--`]&&t[`--`].length>0){let e=t[`--`];o=e[0],l=e.slice(1).map(String)}else o=t.command,l=(t.args||[]).map(String);if(!o)throw new r(`No command specified for stdio proxy`,`command`)}let w;a===`stdio`&&o&&(w=ut(o,l),w.isContainerMCP&&x.info(`Container MCP detected`,{imageDigests:w.imageDigests,imageName:w.imageName,runtime:w.runtime}));let T;if(p.accessControl.url&&p.scanner.apiKey){let e=await y(),t=a===`stdio`?{...e,proxyType:`stdio`,stdioCliArgs:{args:l,command:o,dockerImageDigests:w?.imageDigests,dockerImageName:w?.imageName,proxyType:`stdio`}}:{...e,proxyType:`remote`,remoteCliArgs:{proxyType:`remote`,url:d}};T=new Pe({apiKey:p.scanner.apiKey,headers:p.accessControl.headers,sessionData:t,timeoutMs:p.accessControl.timeoutMs,url:p.accessControl.url})}let re=a===`remote`?d:o,E=new Ne({client:T,enabled:p.accessControl.enabled,serverName:re}),D=new Ke({storageDir:p.oauthDir}),O=()=>new n({name:`mcp-gateway`,version:p.appVersion},{capabilities:{}}),k=async n=>{if(!await E.isAllowed()){let t=E.getBlockReason();throw x.warn(`MCP server blocked by access control`,{proxyType:a,reason:t}),new e(t,`policy_block`)}if(x.info(`MCP server allowed by access control`),a===`stdio`){let e={...process.env,...h},r=new ot({args:l,command:o,env:e,onEvent:e=>{t.debug&&x.debug(`Transport event`,{event:e})},shell:t.shell,stderr:`inherit`});try{return await n.connect(r),n}catch(e){throw x.warn(`Failed original server access`,{command:o,error:e instanceof Error?e.message:String(e),eventType:`mcp_server_access_failed`,proxyType:a}),new i(`Failed to connect to stdio process: ${e}`,void 0,`stdio`,{argCount:l?.length,command:o})}}else if(a===`remote`){let e=d,t=e=>{let t={...m};return e&&(t.Authorization=`Bearer ${e}`),Object.keys(t).length>0?{headers:t}:void 0},n=e=>{if(e instanceof u)return!0;if(e&&typeof e==`object`){let t=e.status,n=e.code,r=e.message;if(t===401||n===401||r&&/unauthorized|401/i.test(String(r)))return!0}return!1},r=async()=>{let t=await Xe(e,{credentialStore:D});return x.info(`Authentication performed`,{authType:`oauth`,eventType:`mcp_auth_performed`,fromCache:t.fromCache,remoteUrl:e}),t.tokens.access_token},o;try{let i=await D.load(e),a=i&&D.hasValidAccessToken(i)?i.tokens?.access_token:void 0,s=!1;try{let n=await nt(O,e,t(a));o=n.client,f=n.transportType,x.info(`Connected to remote server`,{hasAuth:!!a,transport:f})}catch(i){if(n(i)){if(s)throw i;a?(x.info(`Cached OAuth token rejected (possibly revoked), invalidating and re-authorizing...`),await D.update(e,{tokens:void 0,tokensObtainedAt:void 0})):x.info(`Server requires OAuth, starting authentication flow...`),a=await r(),s=!0;let n=await nt(O,e,t(a));o=n.client,f=n.transportType,x.info(`Connected to remote server with OAuth`,{transport:f})}else throw i}return o}catch(t){throw x.warn(`Failed original server access`,{error:t instanceof Error?t.message:String(t),eventType:`mcp_server_access_failed`,proxyType:a,remoteUrl:e}),t instanceof i?t:new i(`Failed to connect to remote server: ${t instanceof Error?t.message:String(t)}`,e,f,{headerCount:Object.keys(m).length})}}return n},ce=async()=>{if(t.port){let e=a===`stdio`?{args:l,command:o,dockerImageDigests:w?.imageDigests,dockerImageName:w?.imageName,proxyType:a}:{proxyType:a,url:d};await b({cliArgs:e,scanApiKey:p.scanner.apiKey,scanEnabled:p.scanner.enabled,scanFailOpen:p.scanner.failOpen,scanHeaders:C,scanTimeoutMs:p.scanner.timeoutMs,scanUrl:p.scanner.url||``});let n,r=await ie({createServer:async()=>{let e=O();n=await k(e);let t=n.getServerVersion(),r=n.getServerCapabilities(),i=new s(t,{capabilities:r});return ne({authorizer:E,client:n,server:i,serverCapabilities:r}),i},onClose:async e=>{n&&await n.close(),await e.close()},port:t.port});return x.info(`MCP gateway started`,{eventType:`mcp_gateway_started`,mode:`http`,port:t.port,proxyType:a}),a===`stdio`?x.info(`MCP server configuration`,{args:l?.join(` `)||``,command:o,eventType:`mcp_server_config`,proxyType:a}):x.info(`MCP server configuration`,{eventType:`mcp_server_config`,proxyType:a,remoteUrl:d}),{close:()=>r.close()}}let e=O(),n=await k(e),r=n.getServerVersion(),i=n.getServerCapabilities(),u=new s(r,{capabilities:i});ne({authorizer:E,client:n,server:u,serverCapabilities:i});let m=new c,h=a===`stdio`?{args:l,command:o,dockerImageDigests:w?.imageDigests,dockerImageName:w?.imageName,proxyType:a}:{proxyType:a,url:d};return await b({cliArgs:h,scanApiKey:p.scanner.apiKey,scanEnabled:p.scanner.enabled,scanFailOpen:p.scanner.failOpen,scanHeaders:C,scanTimeoutMs:p.scanner.timeoutMs,scanUrl:p.scanner.url||``}),await u.connect(m),x.info(`MCP gateway started`,{eventType:`mcp_gateway_started`,mode:`stdio`,proxyType:a}),x.info(`MCP server configuration`,{capabilities:Object.keys(i||{}),eventType:`mcp_server_config`,proxyType:a,serverName:r?.name,serverVersion:r?.version,...a===`stdio`?{args:l?.join(` `)||``,command:o}:{remoteUrl:d,transport:f}}),{close:()=>n.close()}},le=({server:e,timeout:t})=>{let n=!1,r=async r=>{if(!n){n=!0,x.info(`MCP gateway stopping`,{eventType:`mcp_gateway_stopping`,signal:r});try{await e.close(),te(),await v(2e3),process.exit(0)}catch(e){let n=`Error during shutdown: ${e}`;x.error(`Error during shutdown`,{error:n,eventType:`mcp_gateway_stopped`,shutdownTimeout:t}),await v(2e3),process.exit(1)}}},i=e=>async()=>{pe(()=>{x.error(`Graceful shutdown timeout exceeded, forcing exit`),process.exit(1)},t).unref(),await r(e)};return process.once(`SIGTERM`,i(`SIGTERM`)),process.once(`SIGINT`,i(`SIGINT`)),process.stdin.once(`end`,i(`stdin-end`)),()=>e.close()};x.info(`MCP gateway starting`,{command:o,eventType:`mcp_gateway_starting`,proxyType:a,transport:a===`remote`?`auto-detect`:`stdio`,url:d});try{let e=await ce();le({server:e,timeout:t.gracefulShutdownTimeout})}catch(t){t instanceof e&&(console.error(`
|
|
138
|
-
❌ ACCESS DENIED`),console.error(`━`.repeat(60)),console.error(`
|
|
139
|
-
This MCP server has been blocked by Onyx because it is not authorized by your organization's access control policy. Please contact your administrator if you believe this is an error.
|
|
140
|
-
`),x.error(`MCP server blocked by access control policy`,{error:t.message,reason:t.reason}),await v(2e3),process.exit(1));let n=`Could not start the proxy: ${t}`;x.error(`MCP server failed to start`,{args:l,command:o,error:n,eventType:`mcp_server_start_failed`,proxyType:a,remoteUrl:d,transport:f}),await v(2e3),process.exit(1)}};export{dt as main};
|
|
141
|
-
//# sourceMappingURL=main-Bn1n-fs1.js.map
|