agents 0.0.0-fbaa8f7 → 0.0.0-fbf5181
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +2 -6
- package/dist/ai-chat-agent.d.ts +6 -5
- package/dist/ai-chat-agent.js +64 -65
- package/dist/ai-chat-agent.js.map +1 -1
- package/dist/ai-react.d.ts +5 -3
- package/dist/ai-react.js +17 -14
- package/dist/ai-react.js.map +1 -1
- package/dist/{chunk-PDF5WEP4.js → chunk-XG52S6YY.js} +155 -106
- package/dist/chunk-XG52S6YY.js.map +1 -0
- package/dist/client.js +16 -23
- package/dist/client.js.map +1 -1
- package/dist/index.d.ts +10 -14
- package/dist/index.js +5 -5
- package/dist/mcp/client.d.ts +763 -0
- package/dist/mcp/client.js +408 -0
- package/dist/mcp/client.js.map +1 -0
- package/dist/mcp/do-oauth-client-provider.d.ts +41 -0
- package/dist/mcp/do-oauth-client-provider.js +107 -0
- package/dist/mcp/do-oauth-client-provider.js.map +1 -0
- package/dist/mcp/index.d.ts +61 -0
- package/dist/mcp/index.js +778 -0
- package/dist/mcp/index.js.map +1 -0
- package/dist/react.js +34 -27
- package/dist/react.js.map +1 -1
- package/package.json +35 -5
- package/src/index.ts +167 -107
- package/dist/chunk-PDF5WEP4.js.map +0 -1
|
@@ -0,0 +1,408 @@
|
|
|
1
|
+
import "../chunk-HMLY7DHA.js";
|
|
2
|
+
|
|
3
|
+
// src/mcp/sse-edge.ts
|
|
4
|
+
import {
|
|
5
|
+
SSEClientTransport
|
|
6
|
+
} from "@modelcontextprotocol/sdk/client/sse.js";
|
|
7
|
+
var SSEEdgeClientTransport = class extends SSEClientTransport {
|
|
8
|
+
/**
|
|
9
|
+
* Creates a new EdgeSSEClientTransport, which overrides fetch to be compatible with the CF workers environment
|
|
10
|
+
*/
|
|
11
|
+
constructor(url, options) {
|
|
12
|
+
const fetchOverride = async (fetchUrl, fetchInit = {}) => {
|
|
13
|
+
const headers = await this.authHeaders();
|
|
14
|
+
const workerOptions = {
|
|
15
|
+
...fetchInit,
|
|
16
|
+
headers: {
|
|
17
|
+
...fetchInit?.headers,
|
|
18
|
+
...headers
|
|
19
|
+
}
|
|
20
|
+
};
|
|
21
|
+
delete workerOptions.mode;
|
|
22
|
+
return fetch(fetchUrl, workerOptions);
|
|
23
|
+
};
|
|
24
|
+
super(url, {
|
|
25
|
+
...options,
|
|
26
|
+
eventSourceInit: {
|
|
27
|
+
fetch: fetchOverride
|
|
28
|
+
}
|
|
29
|
+
});
|
|
30
|
+
this.authProvider = options.authProvider;
|
|
31
|
+
}
|
|
32
|
+
async authHeaders() {
|
|
33
|
+
if (this.authProvider) {
|
|
34
|
+
const tokens = await this.authProvider.tokens();
|
|
35
|
+
if (tokens) {
|
|
36
|
+
return {
|
|
37
|
+
Authorization: `Bearer ${tokens.access_token}`
|
|
38
|
+
};
|
|
39
|
+
}
|
|
40
|
+
}
|
|
41
|
+
}
|
|
42
|
+
};
|
|
43
|
+
|
|
44
|
+
// src/mcp/client-connection.ts
|
|
45
|
+
import {
|
|
46
|
+
ToolListChangedNotificationSchema,
|
|
47
|
+
ResourceListChangedNotificationSchema,
|
|
48
|
+
PromptListChangedNotificationSchema
|
|
49
|
+
} from "@modelcontextprotocol/sdk/types.js";
|
|
50
|
+
import { Client } from "@modelcontextprotocol/sdk/client/index.js";
|
|
51
|
+
var MCPClientConnection = class {
|
|
52
|
+
constructor(url, info, options = { transport: {}, client: {}, capabilities: {} }) {
|
|
53
|
+
this.url = url;
|
|
54
|
+
this.options = options;
|
|
55
|
+
this.connectionState = "connecting";
|
|
56
|
+
this.tools = [];
|
|
57
|
+
this.prompts = [];
|
|
58
|
+
this.resources = [];
|
|
59
|
+
this.resourceTemplates = [];
|
|
60
|
+
this.client = new Client(info, options.client);
|
|
61
|
+
this.client.registerCapabilities(options.capabilities);
|
|
62
|
+
}
|
|
63
|
+
/**
|
|
64
|
+
* Initialize a client connection
|
|
65
|
+
*
|
|
66
|
+
* @param code Optional OAuth code to initialize the connection with if auth hasn't been initialized
|
|
67
|
+
* @returns
|
|
68
|
+
*/
|
|
69
|
+
async init(code, clientId) {
|
|
70
|
+
try {
|
|
71
|
+
const transport = new SSEEdgeClientTransport(
|
|
72
|
+
this.url,
|
|
73
|
+
this.options.transport
|
|
74
|
+
);
|
|
75
|
+
if (code) {
|
|
76
|
+
await transport.finishAuth(code);
|
|
77
|
+
}
|
|
78
|
+
await this.client.connect(transport);
|
|
79
|
+
} catch (e) {
|
|
80
|
+
if (e.toString().includes("Unauthorized")) {
|
|
81
|
+
this.connectionState = "authenticating";
|
|
82
|
+
return;
|
|
83
|
+
}
|
|
84
|
+
this.connectionState = "failed";
|
|
85
|
+
throw e;
|
|
86
|
+
}
|
|
87
|
+
this.connectionState = "discovering";
|
|
88
|
+
this.serverCapabilities = await this.client.getServerCapabilities();
|
|
89
|
+
if (!this.serverCapabilities) {
|
|
90
|
+
throw new Error("The MCP Server failed to return server capabilities");
|
|
91
|
+
}
|
|
92
|
+
const [instructions, tools, resources, prompts, resourceTemplates] = await Promise.all([
|
|
93
|
+
this.client.getInstructions(),
|
|
94
|
+
this.registerTools(),
|
|
95
|
+
this.registerResources(),
|
|
96
|
+
this.registerPrompts(),
|
|
97
|
+
this.registerResourceTemplates()
|
|
98
|
+
]);
|
|
99
|
+
this.instructions = instructions;
|
|
100
|
+
this.tools = tools;
|
|
101
|
+
this.resources = resources;
|
|
102
|
+
this.prompts = prompts;
|
|
103
|
+
this.resourceTemplates = resourceTemplates;
|
|
104
|
+
this.connectionState = "ready";
|
|
105
|
+
}
|
|
106
|
+
/**
|
|
107
|
+
* Notification handler registration
|
|
108
|
+
*/
|
|
109
|
+
async registerTools() {
|
|
110
|
+
if (!this.serverCapabilities || !this.serverCapabilities.tools) {
|
|
111
|
+
return [];
|
|
112
|
+
}
|
|
113
|
+
if (this.serverCapabilities.tools.listChanged) {
|
|
114
|
+
this.client.setNotificationHandler(
|
|
115
|
+
ToolListChangedNotificationSchema,
|
|
116
|
+
async (_notification) => {
|
|
117
|
+
this.tools = await this.fetchTools();
|
|
118
|
+
}
|
|
119
|
+
);
|
|
120
|
+
}
|
|
121
|
+
return this.fetchTools();
|
|
122
|
+
}
|
|
123
|
+
async registerResources() {
|
|
124
|
+
if (!this.serverCapabilities || !this.serverCapabilities.resources) {
|
|
125
|
+
return [];
|
|
126
|
+
}
|
|
127
|
+
if (this.serverCapabilities.resources.listChanged) {
|
|
128
|
+
this.client.setNotificationHandler(
|
|
129
|
+
ResourceListChangedNotificationSchema,
|
|
130
|
+
async (_notification) => {
|
|
131
|
+
this.resources = await this.fetchResources();
|
|
132
|
+
}
|
|
133
|
+
);
|
|
134
|
+
}
|
|
135
|
+
return this.fetchResources();
|
|
136
|
+
}
|
|
137
|
+
async registerPrompts() {
|
|
138
|
+
if (!this.serverCapabilities || !this.serverCapabilities.prompts) {
|
|
139
|
+
return [];
|
|
140
|
+
}
|
|
141
|
+
if (this.serverCapabilities.prompts.listChanged) {
|
|
142
|
+
this.client.setNotificationHandler(
|
|
143
|
+
PromptListChangedNotificationSchema,
|
|
144
|
+
async (_notification) => {
|
|
145
|
+
this.prompts = await this.fetchPrompts();
|
|
146
|
+
}
|
|
147
|
+
);
|
|
148
|
+
}
|
|
149
|
+
return this.fetchPrompts();
|
|
150
|
+
}
|
|
151
|
+
async registerResourceTemplates() {
|
|
152
|
+
if (!this.serverCapabilities || !this.serverCapabilities.resources) {
|
|
153
|
+
return [];
|
|
154
|
+
}
|
|
155
|
+
return this.fetchResourceTemplates();
|
|
156
|
+
}
|
|
157
|
+
async fetchTools() {
|
|
158
|
+
let toolsAgg = [];
|
|
159
|
+
let toolsResult = { tools: [] };
|
|
160
|
+
do {
|
|
161
|
+
toolsResult = await this.client.listTools({
|
|
162
|
+
cursor: toolsResult.nextCursor
|
|
163
|
+
}).catch(capabilityErrorHandler({ tools: [] }, "tools/list"));
|
|
164
|
+
toolsAgg = toolsAgg.concat(toolsResult.tools);
|
|
165
|
+
} while (toolsResult.nextCursor);
|
|
166
|
+
return toolsAgg;
|
|
167
|
+
}
|
|
168
|
+
async fetchResources() {
|
|
169
|
+
let resourcesAgg = [];
|
|
170
|
+
let resourcesResult = { resources: [] };
|
|
171
|
+
do {
|
|
172
|
+
resourcesResult = await this.client.listResources({
|
|
173
|
+
cursor: resourcesResult.nextCursor
|
|
174
|
+
}).catch(capabilityErrorHandler({ resources: [] }, "resources/list"));
|
|
175
|
+
resourcesAgg = resourcesAgg.concat(resourcesResult.resources);
|
|
176
|
+
} while (resourcesResult.nextCursor);
|
|
177
|
+
return resourcesAgg;
|
|
178
|
+
}
|
|
179
|
+
async fetchPrompts() {
|
|
180
|
+
let promptsAgg = [];
|
|
181
|
+
let promptsResult = { prompts: [] };
|
|
182
|
+
do {
|
|
183
|
+
promptsResult = await this.client.listPrompts({
|
|
184
|
+
cursor: promptsResult.nextCursor
|
|
185
|
+
}).catch(capabilityErrorHandler({ prompts: [] }, "prompts/list"));
|
|
186
|
+
promptsAgg = promptsAgg.concat(promptsResult.prompts);
|
|
187
|
+
} while (promptsResult.nextCursor);
|
|
188
|
+
return promptsAgg;
|
|
189
|
+
}
|
|
190
|
+
async fetchResourceTemplates() {
|
|
191
|
+
let templatesAgg = [];
|
|
192
|
+
let templatesResult = {
|
|
193
|
+
resourceTemplates: []
|
|
194
|
+
};
|
|
195
|
+
do {
|
|
196
|
+
templatesResult = await this.client.listResourceTemplates({
|
|
197
|
+
cursor: templatesResult.nextCursor
|
|
198
|
+
}).catch(
|
|
199
|
+
capabilityErrorHandler(
|
|
200
|
+
{ resourceTemplates: [] },
|
|
201
|
+
"resources/templates/list"
|
|
202
|
+
)
|
|
203
|
+
);
|
|
204
|
+
templatesAgg = templatesAgg.concat(templatesResult.resourceTemplates);
|
|
205
|
+
} while (templatesResult.nextCursor);
|
|
206
|
+
return templatesAgg;
|
|
207
|
+
}
|
|
208
|
+
};
|
|
209
|
+
function capabilityErrorHandler(empty, method) {
|
|
210
|
+
return (e) => {
|
|
211
|
+
if (e.code === -32601) {
|
|
212
|
+
console.error(
|
|
213
|
+
`The server advertised support for the capability ${method.split("/")[0]}, but returned "Method not found" for '${method}'.`
|
|
214
|
+
);
|
|
215
|
+
return empty;
|
|
216
|
+
}
|
|
217
|
+
throw e;
|
|
218
|
+
};
|
|
219
|
+
}
|
|
220
|
+
|
|
221
|
+
// src/mcp/client.ts
|
|
222
|
+
var MCPClientManager = class {
|
|
223
|
+
/**
|
|
224
|
+
* @param name Name of the MCP client
|
|
225
|
+
* @param version Version of the MCP Client
|
|
226
|
+
* @param auth Auth paramters if being used to create a DurableObjectOAuthClientProvider
|
|
227
|
+
*/
|
|
228
|
+
constructor(name, version) {
|
|
229
|
+
this.name = name;
|
|
230
|
+
this.version = version;
|
|
231
|
+
this.mcpConnections = {};
|
|
232
|
+
this.callbackUrls = [];
|
|
233
|
+
}
|
|
234
|
+
/**
|
|
235
|
+
* Connect to and register an MCP server
|
|
236
|
+
*
|
|
237
|
+
* @param transportConfig Transport config
|
|
238
|
+
* @param clientConfig Client config
|
|
239
|
+
* @param capabilities Client capabilities (i.e. if the client supports roots/sampling)
|
|
240
|
+
*/
|
|
241
|
+
async connect(url, options = {}) {
|
|
242
|
+
const id = options.reconnect?.id ?? crypto.randomUUID();
|
|
243
|
+
if (!options.transport?.authProvider) {
|
|
244
|
+
console.warn(
|
|
245
|
+
"No authProvider provided in the transport options. This client will only support unauthenticated remote MCP Servers"
|
|
246
|
+
);
|
|
247
|
+
} else {
|
|
248
|
+
options.transport.authProvider.serverId = id;
|
|
249
|
+
}
|
|
250
|
+
this.mcpConnections[id] = new MCPClientConnection(
|
|
251
|
+
new URL(url),
|
|
252
|
+
{
|
|
253
|
+
name: this.name,
|
|
254
|
+
version: this.version
|
|
255
|
+
},
|
|
256
|
+
{
|
|
257
|
+
transport: options.transport ?? {},
|
|
258
|
+
client: options.client ?? {},
|
|
259
|
+
capabilities: options.client ?? {}
|
|
260
|
+
}
|
|
261
|
+
);
|
|
262
|
+
await this.mcpConnections[id].init(
|
|
263
|
+
options.reconnect?.oauthCode,
|
|
264
|
+
options.reconnect?.oauthClientId
|
|
265
|
+
);
|
|
266
|
+
const authUrl = options.transport?.authProvider?.authUrl;
|
|
267
|
+
if (authUrl && options.transport?.authProvider?.redirectUrl) {
|
|
268
|
+
this.callbackUrls.push(
|
|
269
|
+
options.transport.authProvider.redirectUrl.toString()
|
|
270
|
+
);
|
|
271
|
+
}
|
|
272
|
+
return {
|
|
273
|
+
id,
|
|
274
|
+
authUrl
|
|
275
|
+
};
|
|
276
|
+
}
|
|
277
|
+
isCallbackRequest(req) {
|
|
278
|
+
return req.method === "GET" && !!this.callbackUrls.find((url) => {
|
|
279
|
+
return req.url.startsWith(url);
|
|
280
|
+
});
|
|
281
|
+
}
|
|
282
|
+
async handleCallbackRequest(req) {
|
|
283
|
+
const url = new URL(req.url);
|
|
284
|
+
const urlMatch = this.callbackUrls.find((url2) => {
|
|
285
|
+
return req.url.startsWith(url2);
|
|
286
|
+
});
|
|
287
|
+
if (!urlMatch) {
|
|
288
|
+
throw new Error(
|
|
289
|
+
`No callback URI match found for the request url: ${req.url}. Was the request matched with \`isCallbackRequest()\`?`
|
|
290
|
+
);
|
|
291
|
+
}
|
|
292
|
+
const code = url.searchParams.get("code");
|
|
293
|
+
const clientId = url.searchParams.get("state");
|
|
294
|
+
const urlParams = urlMatch.split("/");
|
|
295
|
+
const serverId = urlParams[urlParams.length - 1];
|
|
296
|
+
if (!code) {
|
|
297
|
+
throw new Error("Unauthorized: no code provided");
|
|
298
|
+
}
|
|
299
|
+
if (!clientId) {
|
|
300
|
+
throw new Error("Unauthorized: no state provided");
|
|
301
|
+
}
|
|
302
|
+
if (this.mcpConnections[serverId] === void 0) {
|
|
303
|
+
throw new Error(`Could not find serverId: ${serverId}`);
|
|
304
|
+
}
|
|
305
|
+
if (this.mcpConnections[serverId].connectionState !== "authenticating") {
|
|
306
|
+
throw new Error(
|
|
307
|
+
"Failed to authenticate: the client isn't in the `authenticating` state"
|
|
308
|
+
);
|
|
309
|
+
}
|
|
310
|
+
const conn = this.mcpConnections[serverId];
|
|
311
|
+
if (!conn.options.transport.authProvider) {
|
|
312
|
+
throw new Error(
|
|
313
|
+
"Trying to finalize authentication for a server connection without an authProvider"
|
|
314
|
+
);
|
|
315
|
+
}
|
|
316
|
+
conn.options.transport.authProvider.clientId = clientId;
|
|
317
|
+
conn.options.transport.authProvider.serverId = serverId;
|
|
318
|
+
const serverUrl = conn.url.toString();
|
|
319
|
+
await this.connect(serverUrl, {
|
|
320
|
+
reconnect: {
|
|
321
|
+
id: serverId,
|
|
322
|
+
oauthClientId: clientId,
|
|
323
|
+
oauthCode: code
|
|
324
|
+
},
|
|
325
|
+
...conn.options
|
|
326
|
+
});
|
|
327
|
+
if (this.mcpConnections[serverId].connectionState === "authenticating") {
|
|
328
|
+
throw new Error("Failed to authenticate: client failed to initialize");
|
|
329
|
+
}
|
|
330
|
+
return { serverId };
|
|
331
|
+
}
|
|
332
|
+
/**
|
|
333
|
+
* @returns namespaced list of tools
|
|
334
|
+
*/
|
|
335
|
+
listTools() {
|
|
336
|
+
return getNamespacedData(this.mcpConnections, "tools");
|
|
337
|
+
}
|
|
338
|
+
/**
|
|
339
|
+
* @returns namespaced list of prompts
|
|
340
|
+
*/
|
|
341
|
+
listPrompts() {
|
|
342
|
+
return getNamespacedData(this.mcpConnections, "prompts");
|
|
343
|
+
}
|
|
344
|
+
/**
|
|
345
|
+
* @returns namespaced list of tools
|
|
346
|
+
*/
|
|
347
|
+
listResources() {
|
|
348
|
+
return getNamespacedData(this.mcpConnections, "resources");
|
|
349
|
+
}
|
|
350
|
+
/**
|
|
351
|
+
* @returns namespaced list of resource templates
|
|
352
|
+
*/
|
|
353
|
+
listResourceTemplates() {
|
|
354
|
+
return getNamespacedData(this.mcpConnections, "resourceTemplates");
|
|
355
|
+
}
|
|
356
|
+
/**
|
|
357
|
+
* Namespaced version of callTool
|
|
358
|
+
*/
|
|
359
|
+
callTool(params, resultSchema, options) {
|
|
360
|
+
const unqualifiedName = params.name.replace(`${params.serverId}.`, "");
|
|
361
|
+
return this.mcpConnections[params.serverId].client.callTool(
|
|
362
|
+
{
|
|
363
|
+
...params,
|
|
364
|
+
name: unqualifiedName
|
|
365
|
+
},
|
|
366
|
+
resultSchema,
|
|
367
|
+
options
|
|
368
|
+
);
|
|
369
|
+
}
|
|
370
|
+
/**
|
|
371
|
+
* Namespaced version of readResource
|
|
372
|
+
*/
|
|
373
|
+
readResource(params, options) {
|
|
374
|
+
return this.mcpConnections[params.serverId].client.readResource(
|
|
375
|
+
params,
|
|
376
|
+
options
|
|
377
|
+
);
|
|
378
|
+
}
|
|
379
|
+
/**
|
|
380
|
+
* Namespaced version of getPrompt
|
|
381
|
+
*/
|
|
382
|
+
getPrompt(params, options) {
|
|
383
|
+
return this.mcpConnections[params.serverId].client.getPrompt(
|
|
384
|
+
params,
|
|
385
|
+
options
|
|
386
|
+
);
|
|
387
|
+
}
|
|
388
|
+
};
|
|
389
|
+
function getNamespacedData(mcpClients, type) {
|
|
390
|
+
const sets = Object.entries(mcpClients).map(([name, conn]) => {
|
|
391
|
+
return { name, data: conn[type] };
|
|
392
|
+
});
|
|
393
|
+
const namespacedData = sets.flatMap(({ name: serverId, data }) => {
|
|
394
|
+
return data.map((item) => {
|
|
395
|
+
return {
|
|
396
|
+
...item,
|
|
397
|
+
// we add a serverId so we can easily pull it out and send the tool call to the right server
|
|
398
|
+
serverId
|
|
399
|
+
};
|
|
400
|
+
});
|
|
401
|
+
});
|
|
402
|
+
return namespacedData;
|
|
403
|
+
}
|
|
404
|
+
export {
|
|
405
|
+
MCPClientManager,
|
|
406
|
+
getNamespacedData
|
|
407
|
+
};
|
|
408
|
+
//# sourceMappingURL=client.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../src/mcp/sse-edge.ts","../../src/mcp/client-connection.ts","../../src/mcp/client.ts"],"sourcesContent":["import {\n SSEClientTransport,\n type SSEClientTransportOptions,\n} from \"@modelcontextprotocol/sdk/client/sse.js\";\nimport type { OAuthClientProvider } from \"@modelcontextprotocol/sdk/client/auth.js\";\n\nexport class SSEEdgeClientTransport extends SSEClientTransport {\n private authProvider: OAuthClientProvider | undefined;\n /**\n * Creates a new EdgeSSEClientTransport, which overrides fetch to be compatible with the CF workers environment\n */\n constructor(url: URL, options: SSEClientTransportOptions) {\n const fetchOverride: typeof fetch = async (\n fetchUrl: RequestInfo | URL,\n fetchInit: RequestInit = {}\n ) => {\n // add auth headers\n const headers = await this.authHeaders();\n const workerOptions = {\n ...fetchInit,\n headers: {\n ...fetchInit?.headers,\n ...headers,\n },\n };\n\n // Remove unsupported properties\n // biome-ignore lint/performance/noDelete: workaround for workers environment\n delete workerOptions.mode;\n\n // Call the original fetch with fixed options\n return fetch(fetchUrl, workerOptions);\n };\n\n super(url, {\n ...options,\n eventSourceInit: {\n fetch: fetchOverride,\n },\n });\n this.authProvider = options.authProvider;\n }\n\n async authHeaders() {\n if (this.authProvider) {\n const tokens = await this.authProvider.tokens();\n if (tokens) {\n return {\n Authorization: `Bearer ${tokens.access_token}`,\n };\n }\n }\n }\n}\n","import { SSEEdgeClientTransport } from \"./sse-edge\";\n\nimport {\n ToolListChangedNotificationSchema,\n type ClientCapabilities,\n type Resource,\n type Tool,\n type Prompt,\n ResourceListChangedNotificationSchema,\n PromptListChangedNotificationSchema,\n type ListToolsResult,\n type ListResourcesResult,\n type ListPromptsResult,\n type ServerCapabilities,\n type ResourceTemplate,\n type ListResourceTemplatesResult,\n} from \"@modelcontextprotocol/sdk/types.js\";\nimport { Client } from \"@modelcontextprotocol/sdk/client/index.js\";\nimport type { SSEClientTransportOptions } from \"@modelcontextprotocol/sdk/client/sse.js\";\nimport type { AgentsOAuthProvider } from \"./do-oauth-client-provider\";\n\nexport class MCPClientConnection {\n client: Client;\n connectionState:\n | \"authenticating\"\n | \"connecting\"\n | \"ready\"\n | \"discovering\"\n | \"failed\" = \"connecting\";\n instructions?: string;\n tools: Tool[] = [];\n prompts: Prompt[] = [];\n resources: Resource[] = [];\n resourceTemplates: ResourceTemplate[] = [];\n serverCapabilities: ServerCapabilities | undefined;\n\n constructor(\n public url: URL,\n info: ConstructorParameters<typeof Client>[0],\n public options: {\n transport: SSEClientTransportOptions & {\n authProvider?: AgentsOAuthProvider;\n };\n client: ConstructorParameters<typeof Client>[1];\n capabilities: ClientCapabilities;\n } = { transport: {}, client: {}, capabilities: {} }\n ) {\n this.client = new Client(info, options.client);\n this.client.registerCapabilities(options.capabilities);\n }\n\n /**\n * Initialize a client connection\n *\n * @param code Optional OAuth code to initialize the connection with if auth hasn't been initialized\n * @returns\n */\n async init(code?: string, clientId?: string) {\n try {\n const transport = new SSEEdgeClientTransport(\n this.url,\n this.options.transport\n );\n if (code) {\n await transport.finishAuth(code);\n }\n\n await this.client.connect(transport);\n // biome-ignore lint/suspicious/noExplicitAny: allow for the error check here\n } catch (e: any) {\n if (e.toString().includes(\"Unauthorized\")) {\n // unauthorized, we should wait for the user to authenticate\n this.connectionState = \"authenticating\";\n return;\n }\n this.connectionState = \"failed\";\n throw e;\n }\n\n this.connectionState = \"discovering\";\n\n this.serverCapabilities = await this.client.getServerCapabilities();\n if (!this.serverCapabilities) {\n throw new Error(\"The MCP Server failed to return server capabilities\");\n }\n\n const [instructions, tools, resources, prompts, resourceTemplates] =\n await Promise.all([\n this.client.getInstructions(),\n this.registerTools(),\n this.registerResources(),\n this.registerPrompts(),\n this.registerResourceTemplates(),\n ]);\n\n this.instructions = instructions;\n this.tools = tools;\n this.resources = resources;\n this.prompts = prompts;\n this.resourceTemplates = resourceTemplates;\n\n this.connectionState = \"ready\";\n }\n\n /**\n * Notification handler registration\n */\n async registerTools(): Promise<Tool[]> {\n if (!this.serverCapabilities || !this.serverCapabilities.tools) {\n return [];\n }\n\n if (this.serverCapabilities.tools.listChanged) {\n this.client.setNotificationHandler(\n ToolListChangedNotificationSchema,\n async (_notification) => {\n this.tools = await this.fetchTools();\n }\n );\n }\n\n return this.fetchTools();\n }\n\n async registerResources(): Promise<Resource[]> {\n if (!this.serverCapabilities || !this.serverCapabilities.resources) {\n return [];\n }\n\n if (this.serverCapabilities.resources.listChanged) {\n this.client.setNotificationHandler(\n ResourceListChangedNotificationSchema,\n async (_notification) => {\n this.resources = await this.fetchResources();\n }\n );\n }\n\n return this.fetchResources();\n }\n\n async registerPrompts(): Promise<Prompt[]> {\n if (!this.serverCapabilities || !this.serverCapabilities.prompts) {\n return [];\n }\n\n if (this.serverCapabilities.prompts.listChanged) {\n this.client.setNotificationHandler(\n PromptListChangedNotificationSchema,\n async (_notification) => {\n this.prompts = await this.fetchPrompts();\n }\n );\n }\n\n return this.fetchPrompts();\n }\n\n async registerResourceTemplates(): Promise<ResourceTemplate[]> {\n if (!this.serverCapabilities || !this.serverCapabilities.resources) {\n return [];\n }\n\n return this.fetchResourceTemplates();\n }\n\n async fetchTools() {\n let toolsAgg: Tool[] = [];\n let toolsResult: ListToolsResult = { tools: [] };\n do {\n toolsResult = await this.client\n .listTools({\n cursor: toolsResult.nextCursor,\n })\n .catch(capabilityErrorHandler({ tools: [] }, \"tools/list\"));\n toolsAgg = toolsAgg.concat(toolsResult.tools);\n } while (toolsResult.nextCursor);\n return toolsAgg;\n }\n\n async fetchResources() {\n let resourcesAgg: Resource[] = [];\n let resourcesResult: ListResourcesResult = { resources: [] };\n do {\n resourcesResult = await this.client\n .listResources({\n cursor: resourcesResult.nextCursor,\n })\n .catch(capabilityErrorHandler({ resources: [] }, \"resources/list\"));\n resourcesAgg = resourcesAgg.concat(resourcesResult.resources);\n } while (resourcesResult.nextCursor);\n return resourcesAgg;\n }\n\n async fetchPrompts() {\n let promptsAgg: Prompt[] = [];\n let promptsResult: ListPromptsResult = { prompts: [] };\n do {\n promptsResult = await this.client\n .listPrompts({\n cursor: promptsResult.nextCursor,\n })\n .catch(capabilityErrorHandler({ prompts: [] }, \"prompts/list\"));\n promptsAgg = promptsAgg.concat(promptsResult.prompts);\n } while (promptsResult.nextCursor);\n return promptsAgg;\n }\n\n async fetchResourceTemplates() {\n let templatesAgg: ResourceTemplate[] = [];\n let templatesResult: ListResourceTemplatesResult = {\n resourceTemplates: [],\n };\n do {\n templatesResult = await this.client\n .listResourceTemplates({\n cursor: templatesResult.nextCursor,\n })\n .catch(\n capabilityErrorHandler(\n { resourceTemplates: [] },\n \"resources/templates/list\"\n )\n );\n templatesAgg = templatesAgg.concat(templatesResult.resourceTemplates);\n } while (templatesResult.nextCursor);\n return templatesAgg;\n }\n}\n\nfunction capabilityErrorHandler<T>(empty: T, method: string) {\n return (e: { code: number }) => {\n // server is badly behaved and returning invalid capabilities. This commonly occurs for resource templates\n if (e.code === -32601) {\n console.error(\n `The server advertised support for the capability ${method.split(\"/\")[0]}, but returned \"Method not found\" for '${method}'.`\n );\n return empty;\n }\n throw e;\n };\n}\n","import { MCPClientConnection } from \"./client-connection\";\n\nimport type {\n ClientCapabilities,\n CallToolRequest,\n CallToolResultSchema,\n CompatibilityCallToolResultSchema,\n ReadResourceRequest,\n GetPromptRequest,\n Tool,\n Resource,\n Prompt,\n ResourceTemplate,\n} from \"@modelcontextprotocol/sdk/types.js\";\nimport type { SSEClientTransportOptions } from \"@modelcontextprotocol/sdk/client/sse.js\";\nimport type { Client } from \"@modelcontextprotocol/sdk/client/index.js\";\nimport type { RequestOptions } from \"@modelcontextprotocol/sdk/shared/protocol.js\";\nimport type { AgentsOAuthProvider } from \"./do-oauth-client-provider\";\n\n/**\n * Utility class that aggregates multiple MCP clients into one\n */\nexport class MCPClientManager {\n public mcpConnections: Record<string, MCPClientConnection> = {};\n private callbackUrls: string[] = [];\n\n /**\n * @param name Name of the MCP client\n * @param version Version of the MCP Client\n * @param auth Auth paramters if being used to create a DurableObjectOAuthClientProvider\n */\n constructor(\n private name: string,\n private version: string\n ) {}\n\n /**\n * Connect to and register an MCP server\n *\n * @param transportConfig Transport config\n * @param clientConfig Client config\n * @param capabilities Client capabilities (i.e. if the client supports roots/sampling)\n */\n async connect(\n url: string,\n options: {\n // Allows you to reconnect to a server (in the case of a auth reconnect)\n // Doesn't handle session reconnection\n reconnect?: {\n id: string;\n oauthClientId?: string;\n oauthCode?: string;\n };\n // we're overriding authProvider here because we want to be able to access the auth URL\n transport?: SSEClientTransportOptions & {\n authProvider?: AgentsOAuthProvider;\n };\n client?: ConstructorParameters<typeof Client>[1];\n capabilities?: ClientCapabilities;\n } = {}\n ): Promise<{ id: string; authUrl: string | undefined }> {\n const id = options.reconnect?.id ?? crypto.randomUUID();\n\n if (!options.transport?.authProvider) {\n console.warn(\n \"No authProvider provided in the transport options. This client will only support unauthenticated remote MCP Servers\"\n );\n } else {\n options.transport.authProvider.serverId = id;\n }\n\n this.mcpConnections[id] = new MCPClientConnection(\n new URL(url),\n {\n name: this.name,\n version: this.version,\n },\n {\n transport: options.transport ?? {},\n client: options.client ?? {},\n capabilities: options.client ?? {},\n }\n );\n\n await this.mcpConnections[id].init(\n options.reconnect?.oauthCode,\n options.reconnect?.oauthClientId\n );\n\n const authUrl = options.transport?.authProvider?.authUrl;\n if (authUrl && options.transport?.authProvider?.redirectUrl) {\n this.callbackUrls.push(\n options.transport.authProvider.redirectUrl.toString()\n );\n }\n\n return {\n id,\n authUrl,\n };\n }\n\n isCallbackRequest(req: Request): boolean {\n return (\n req.method === \"GET\" &&\n !!this.callbackUrls.find((url) => {\n return req.url.startsWith(url);\n })\n );\n }\n\n async handleCallbackRequest(req: Request) {\n const url = new URL(req.url);\n const urlMatch = this.callbackUrls.find((url) => {\n return req.url.startsWith(url);\n });\n if (!urlMatch) {\n throw new Error(\n `No callback URI match found for the request url: ${req.url}. Was the request matched with \\`isCallbackRequest()\\`?`\n );\n }\n const code = url.searchParams.get(\"code\");\n const clientId = url.searchParams.get(\"state\");\n const urlParams = urlMatch.split(\"/\");\n const serverId = urlParams[urlParams.length - 1];\n if (!code) {\n throw new Error(\"Unauthorized: no code provided\");\n }\n if (!clientId) {\n throw new Error(\"Unauthorized: no state provided\");\n }\n\n if (this.mcpConnections[serverId] === undefined) {\n throw new Error(`Could not find serverId: ${serverId}`);\n }\n\n if (this.mcpConnections[serverId].connectionState !== \"authenticating\") {\n throw new Error(\n \"Failed to authenticate: the client isn't in the `authenticating` state\"\n );\n }\n\n const conn = this.mcpConnections[serverId];\n if (!conn.options.transport.authProvider) {\n throw new Error(\n \"Trying to finalize authentication for a server connection without an authProvider\"\n );\n }\n\n conn.options.transport.authProvider.clientId = clientId;\n conn.options.transport.authProvider.serverId = serverId;\n\n // reconnect to server with authorization\n const serverUrl = conn.url.toString();\n await this.connect(serverUrl, {\n reconnect: {\n id: serverId,\n oauthClientId: clientId,\n oauthCode: code,\n },\n ...conn.options,\n });\n\n if (this.mcpConnections[serverId].connectionState === \"authenticating\") {\n throw new Error(\"Failed to authenticate: client failed to initialize\");\n }\n\n return { serverId };\n }\n\n /**\n * @returns namespaced list of tools\n */\n listTools(): NamespacedData[\"tools\"] {\n return getNamespacedData(this.mcpConnections, \"tools\");\n }\n\n /**\n * @returns namespaced list of prompts\n */\n listPrompts(): NamespacedData[\"prompts\"] {\n return getNamespacedData(this.mcpConnections, \"prompts\");\n }\n\n /**\n * @returns namespaced list of tools\n */\n listResources(): NamespacedData[\"resources\"] {\n return getNamespacedData(this.mcpConnections, \"resources\");\n }\n\n /**\n * @returns namespaced list of resource templates\n */\n listResourceTemplates(): NamespacedData[\"resourceTemplates\"] {\n return getNamespacedData(this.mcpConnections, \"resourceTemplates\");\n }\n\n /**\n * Namespaced version of callTool\n */\n callTool(\n params: CallToolRequest[\"params\"] & { serverId: string },\n resultSchema?:\n | typeof CallToolResultSchema\n | typeof CompatibilityCallToolResultSchema,\n options?: RequestOptions\n ) {\n const unqualifiedName = params.name.replace(`${params.serverId}.`, \"\");\n return this.mcpConnections[params.serverId].client.callTool(\n {\n ...params,\n name: unqualifiedName,\n },\n resultSchema,\n options\n );\n }\n\n /**\n * Namespaced version of readResource\n */\n readResource(\n params: ReadResourceRequest[\"params\"] & { serverId: string },\n options: RequestOptions\n ) {\n return this.mcpConnections[params.serverId].client.readResource(\n params,\n options\n );\n }\n\n /**\n * Namespaced version of getPrompt\n */\n getPrompt(\n params: GetPromptRequest[\"params\"] & { serverId: string },\n options: RequestOptions\n ) {\n return this.mcpConnections[params.serverId].client.getPrompt(\n params,\n options\n );\n }\n}\n\ntype NamespacedData = {\n tools: (Tool & { serverId: string })[];\n prompts: (Prompt & { serverId: string })[];\n resources: (Resource & { serverId: string })[];\n resourceTemplates: (ResourceTemplate & { serverId: string })[];\n};\n\nexport function getNamespacedData<T extends keyof NamespacedData>(\n mcpClients: Record<string, MCPClientConnection>,\n type: T\n): NamespacedData[T] {\n const sets = Object.entries(mcpClients).map(([name, conn]) => {\n return { name, data: conn[type] };\n });\n\n const namespacedData = sets.flatMap(({ name: serverId, data }) => {\n return data.map((item) => {\n return {\n ...item,\n // we add a serverId so we can easily pull it out and send the tool call to the right server\n serverId,\n };\n });\n });\n\n return namespacedData as NamespacedData[T]; // Type assertion needed due to TS limitations with conditional return types\n}\n"],"mappings":";;;AAAA;AAAA,EACE;AAAA,OAEK;AAGA,IAAM,yBAAN,cAAqC,mBAAmB;AAAA;AAAA;AAAA;AAAA,EAK7D,YAAY,KAAU,SAAoC;AACxD,UAAM,gBAA8B,OAClC,UACA,YAAyB,CAAC,MACvB;AAEH,YAAM,UAAU,MAAM,KAAK,YAAY;AACvC,YAAM,gBAAgB;AAAA,QACpB,GAAG;AAAA,QACH,SAAS;AAAA,UACP,GAAG,WAAW;AAAA,UACd,GAAG;AAAA,QACL;AAAA,MACF;AAIA,aAAO,cAAc;AAGrB,aAAO,MAAM,UAAU,aAAa;AAAA,IACtC;AAEA,UAAM,KAAK;AAAA,MACT,GAAG;AAAA,MACH,iBAAiB;AAAA,QACf,OAAO;AAAA,MACT;AAAA,IACF,CAAC;AACD,SAAK,eAAe,QAAQ;AAAA,EAC9B;AAAA,EAEA,MAAM,cAAc;AAClB,QAAI,KAAK,cAAc;AACrB,YAAM,SAAS,MAAM,KAAK,aAAa,OAAO;AAC9C,UAAI,QAAQ;AACV,eAAO;AAAA,UACL,eAAe,UAAU,OAAO,YAAY;AAAA,QAC9C;AAAA,MACF;AAAA,IACF;AAAA,EACF;AACF;;;ACnDA;AAAA,EACE;AAAA,EAKA;AAAA,EACA;AAAA,OAOK;AACP,SAAS,cAAc;AAIhB,IAAM,sBAAN,MAA0B;AAAA,EAe/B,YACS,KACP,MACO,UAMH,EAAE,WAAW,CAAC,GAAG,QAAQ,CAAC,GAAG,cAAc,CAAC,EAAE,GAClD;AATO;AAEA;AAhBT,2BAKe;AAEf,iBAAgB,CAAC;AACjB,mBAAoB,CAAC;AACrB,qBAAwB,CAAC;AACzB,6BAAwC,CAAC;AAcvC,SAAK,SAAS,IAAI,OAAO,MAAM,QAAQ,MAAM;AAC7C,SAAK,OAAO,qBAAqB,QAAQ,YAAY;AAAA,EACvD;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAQA,MAAM,KAAK,MAAe,UAAmB;AAC3C,QAAI;AACF,YAAM,YAAY,IAAI;AAAA,QACpB,KAAK;AAAA,QACL,KAAK,QAAQ;AAAA,MACf;AACA,UAAI,MAAM;AACR,cAAM,UAAU,WAAW,IAAI;AAAA,MACjC;AAEA,YAAM,KAAK,OAAO,QAAQ,SAAS;AAAA,IAErC,SAAS,GAAQ;AACf,UAAI,EAAE,SAAS,EAAE,SAAS,cAAc,GAAG;AAEzC,aAAK,kBAAkB;AACvB;AAAA,MACF;AACA,WAAK,kBAAkB;AACvB,YAAM;AAAA,IACR;AAEA,SAAK,kBAAkB;AAEvB,SAAK,qBAAqB,MAAM,KAAK,OAAO,sBAAsB;AAClE,QAAI,CAAC,KAAK,oBAAoB;AAC5B,YAAM,IAAI,MAAM,qDAAqD;AAAA,IACvE;AAEA,UAAM,CAAC,cAAc,OAAO,WAAW,SAAS,iBAAiB,IAC/D,MAAM,QAAQ,IAAI;AAAA,MAChB,KAAK,OAAO,gBAAgB;AAAA,MAC5B,KAAK,cAAc;AAAA,MACnB,KAAK,kBAAkB;AAAA,MACvB,KAAK,gBAAgB;AAAA,MACrB,KAAK,0BAA0B;AAAA,IACjC,CAAC;AAEH,SAAK,eAAe;AACpB,SAAK,QAAQ;AACb,SAAK,YAAY;AACjB,SAAK,UAAU;AACf,SAAK,oBAAoB;AAEzB,SAAK,kBAAkB;AAAA,EACzB;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,gBAAiC;AACrC,QAAI,CAAC,KAAK,sBAAsB,CAAC,KAAK,mBAAmB,OAAO;AAC9D,aAAO,CAAC;AAAA,IACV;AAEA,QAAI,KAAK,mBAAmB,MAAM,aAAa;AAC7C,WAAK,OAAO;AAAA,QACV;AAAA,QACA,OAAO,kBAAkB;AACvB,eAAK,QAAQ,MAAM,KAAK,WAAW;AAAA,QACrC;AAAA,MACF;AAAA,IACF;AAEA,WAAO,KAAK,WAAW;AAAA,EACzB;AAAA,EAEA,MAAM,oBAAyC;AAC7C,QAAI,CAAC,KAAK,sBAAsB,CAAC,KAAK,mBAAmB,WAAW;AAClE,aAAO,CAAC;AAAA,IACV;AAEA,QAAI,KAAK,mBAAmB,UAAU,aAAa;AACjD,WAAK,OAAO;AAAA,QACV;AAAA,QACA,OAAO,kBAAkB;AACvB,eAAK,YAAY,MAAM,KAAK,eAAe;AAAA,QAC7C;AAAA,MACF;AAAA,IACF;AAEA,WAAO,KAAK,eAAe;AAAA,EAC7B;AAAA,EAEA,MAAM,kBAAqC;AACzC,QAAI,CAAC,KAAK,sBAAsB,CAAC,KAAK,mBAAmB,SAAS;AAChE,aAAO,CAAC;AAAA,IACV;AAEA,QAAI,KAAK,mBAAmB,QAAQ,aAAa;AAC/C,WAAK,OAAO;AAAA,QACV;AAAA,QACA,OAAO,kBAAkB;AACvB,eAAK,UAAU,MAAM,KAAK,aAAa;AAAA,QACzC;AAAA,MACF;AAAA,IACF;AAEA,WAAO,KAAK,aAAa;AAAA,EAC3B;AAAA,EAEA,MAAM,4BAAyD;AAC7D,QAAI,CAAC,KAAK,sBAAsB,CAAC,KAAK,mBAAmB,WAAW;AAClE,aAAO,CAAC;AAAA,IACV;AAEA,WAAO,KAAK,uBAAuB;AAAA,EACrC;AAAA,EAEA,MAAM,aAAa;AACjB,QAAI,WAAmB,CAAC;AACxB,QAAI,cAA+B,EAAE,OAAO,CAAC,EAAE;AAC/C,OAAG;AACD,oBAAc,MAAM,KAAK,OACtB,UAAU;AAAA,QACT,QAAQ,YAAY;AAAA,MACtB,CAAC,EACA,MAAM,uBAAuB,EAAE,OAAO,CAAC,EAAE,GAAG,YAAY,CAAC;AAC5D,iBAAW,SAAS,OAAO,YAAY,KAAK;AAAA,IAC9C,SAAS,YAAY;AACrB,WAAO;AAAA,EACT;AAAA,EAEA,MAAM,iBAAiB;AACrB,QAAI,eAA2B,CAAC;AAChC,QAAI,kBAAuC,EAAE,WAAW,CAAC,EAAE;AAC3D,OAAG;AACD,wBAAkB,MAAM,KAAK,OAC1B,cAAc;AAAA,QACb,QAAQ,gBAAgB;AAAA,MAC1B,CAAC,EACA,MAAM,uBAAuB,EAAE,WAAW,CAAC,EAAE,GAAG,gBAAgB,CAAC;AACpE,qBAAe,aAAa,OAAO,gBAAgB,SAAS;AAAA,IAC9D,SAAS,gBAAgB;AACzB,WAAO;AAAA,EACT;AAAA,EAEA,MAAM,eAAe;AACnB,QAAI,aAAuB,CAAC;AAC5B,QAAI,gBAAmC,EAAE,SAAS,CAAC,EAAE;AACrD,OAAG;AACD,sBAAgB,MAAM,KAAK,OACxB,YAAY;AAAA,QACX,QAAQ,cAAc;AAAA,MACxB,CAAC,EACA,MAAM,uBAAuB,EAAE,SAAS,CAAC,EAAE,GAAG,cAAc,CAAC;AAChE,mBAAa,WAAW,OAAO,cAAc,OAAO;AAAA,IACtD,SAAS,cAAc;AACvB,WAAO;AAAA,EACT;AAAA,EAEA,MAAM,yBAAyB;AAC7B,QAAI,eAAmC,CAAC;AACxC,QAAI,kBAA+C;AAAA,MACjD,mBAAmB,CAAC;AAAA,IACtB;AACA,OAAG;AACD,wBAAkB,MAAM,KAAK,OAC1B,sBAAsB;AAAA,QACrB,QAAQ,gBAAgB;AAAA,MAC1B,CAAC,EACA;AAAA,QACC;AAAA,UACE,EAAE,mBAAmB,CAAC,EAAE;AAAA,UACxB;AAAA,QACF;AAAA,MACF;AACF,qBAAe,aAAa,OAAO,gBAAgB,iBAAiB;AAAA,IACtE,SAAS,gBAAgB;AACzB,WAAO;AAAA,EACT;AACF;AAEA,SAAS,uBAA0B,OAAU,QAAgB;AAC3D,SAAO,CAAC,MAAwB;AAE9B,QAAI,EAAE,SAAS,QAAQ;AACrB,cAAQ;AAAA,QACN,oDAAoD,OAAO,MAAM,GAAG,EAAE,CAAC,CAAC,0CAA0C,MAAM;AAAA,MAC1H;AACA,aAAO;AAAA,IACT;AACA,UAAM;AAAA,EACR;AACF;;;AC3NO,IAAM,mBAAN,MAAuB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAS5B,YACU,MACA,SACR;AAFQ;AACA;AAVV,SAAO,iBAAsD,CAAC;AAC9D,SAAQ,eAAyB,CAAC;AAAA,EAU/B;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EASH,MAAM,QACJ,KACA,UAcI,CAAC,GACiD;AACtD,UAAM,KAAK,QAAQ,WAAW,MAAM,OAAO,WAAW;AAEtD,QAAI,CAAC,QAAQ,WAAW,cAAc;AACpC,cAAQ;AAAA,QACN;AAAA,MACF;AAAA,IACF,OAAO;AACL,cAAQ,UAAU,aAAa,WAAW;AAAA,IAC5C;AAEA,SAAK,eAAe,EAAE,IAAI,IAAI;AAAA,MAC5B,IAAI,IAAI,GAAG;AAAA,MACX;AAAA,QACE,MAAM,KAAK;AAAA,QACX,SAAS,KAAK;AAAA,MAChB;AAAA,MACA;AAAA,QACE,WAAW,QAAQ,aAAa,CAAC;AAAA,QACjC,QAAQ,QAAQ,UAAU,CAAC;AAAA,QAC3B,cAAc,QAAQ,UAAU,CAAC;AAAA,MACnC;AAAA,IACF;AAEA,UAAM,KAAK,eAAe,EAAE,EAAE;AAAA,MAC5B,QAAQ,WAAW;AAAA,MACnB,QAAQ,WAAW;AAAA,IACrB;AAEA,UAAM,UAAU,QAAQ,WAAW,cAAc;AACjD,QAAI,WAAW,QAAQ,WAAW,cAAc,aAAa;AAC3D,WAAK,aAAa;AAAA,QAChB,QAAQ,UAAU,aAAa,YAAY,SAAS;AAAA,MACtD;AAAA,IACF;AAEA,WAAO;AAAA,MACL;AAAA,MACA;AAAA,IACF;AAAA,EACF;AAAA,EAEA,kBAAkB,KAAuB;AACvC,WACE,IAAI,WAAW,SACf,CAAC,CAAC,KAAK,aAAa,KAAK,CAAC,QAAQ;AAChC,aAAO,IAAI,IAAI,WAAW,GAAG;AAAA,IAC/B,CAAC;AAAA,EAEL;AAAA,EAEA,MAAM,sBAAsB,KAAc;AACxC,UAAM,MAAM,IAAI,IAAI,IAAI,GAAG;AAC3B,UAAM,WAAW,KAAK,aAAa,KAAK,CAACA,SAAQ;AAC/C,aAAO,IAAI,IAAI,WAAWA,IAAG;AAAA,IAC/B,CAAC;AACD,QAAI,CAAC,UAAU;AACb,YAAM,IAAI;AAAA,QACR,oDAAoD,IAAI,GAAG;AAAA,MAC7D;AAAA,IACF;AACA,UAAM,OAAO,IAAI,aAAa,IAAI,MAAM;AACxC,UAAM,WAAW,IAAI,aAAa,IAAI,OAAO;AAC7C,UAAM,YAAY,SAAS,MAAM,GAAG;AACpC,UAAM,WAAW,UAAU,UAAU,SAAS,CAAC;AAC/C,QAAI,CAAC,MAAM;AACT,YAAM,IAAI,MAAM,gCAAgC;AAAA,IAClD;AACA,QAAI,CAAC,UAAU;AACb,YAAM,IAAI,MAAM,iCAAiC;AAAA,IACnD;AAEA,QAAI,KAAK,eAAe,QAAQ,MAAM,QAAW;AAC/C,YAAM,IAAI,MAAM,4BAA4B,QAAQ,EAAE;AAAA,IACxD;AAEA,QAAI,KAAK,eAAe,QAAQ,EAAE,oBAAoB,kBAAkB;AACtE,YAAM,IAAI;AAAA,QACR;AAAA,MACF;AAAA,IACF;AAEA,UAAM,OAAO,KAAK,eAAe,QAAQ;AACzC,QAAI,CAAC,KAAK,QAAQ,UAAU,cAAc;AACxC,YAAM,IAAI;AAAA,QACR;AAAA,MACF;AAAA,IACF;AAEA,SAAK,QAAQ,UAAU,aAAa,WAAW;AAC/C,SAAK,QAAQ,UAAU,aAAa,WAAW;AAG/C,UAAM,YAAY,KAAK,IAAI,SAAS;AACpC,UAAM,KAAK,QAAQ,WAAW;AAAA,MAC5B,WAAW;AAAA,QACT,IAAI;AAAA,QACJ,eAAe;AAAA,QACf,WAAW;AAAA,MACb;AAAA,MACA,GAAG,KAAK;AAAA,IACV,CAAC;AAED,QAAI,KAAK,eAAe,QAAQ,EAAE,oBAAoB,kBAAkB;AACtE,YAAM,IAAI,MAAM,qDAAqD;AAAA,IACvE;AAEA,WAAO,EAAE,SAAS;AAAA,EACpB;AAAA;AAAA;AAAA;AAAA,EAKA,YAAqC;AACnC,WAAO,kBAAkB,KAAK,gBAAgB,OAAO;AAAA,EACvD;AAAA;AAAA;AAAA;AAAA,EAKA,cAAyC;AACvC,WAAO,kBAAkB,KAAK,gBAAgB,SAAS;AAAA,EACzD;AAAA;AAAA;AAAA;AAAA,EAKA,gBAA6C;AAC3C,WAAO,kBAAkB,KAAK,gBAAgB,WAAW;AAAA,EAC3D;AAAA;AAAA;AAAA;AAAA,EAKA,wBAA6D;AAC3D,WAAO,kBAAkB,KAAK,gBAAgB,mBAAmB;AAAA,EACnE;AAAA;AAAA;AAAA;AAAA,EAKA,SACE,QACA,cAGA,SACA;AACA,UAAM,kBAAkB,OAAO,KAAK,QAAQ,GAAG,OAAO,QAAQ,KAAK,EAAE;AACrE,WAAO,KAAK,eAAe,OAAO,QAAQ,EAAE,OAAO;AAAA,MACjD;AAAA,QACE,GAAG;AAAA,QACH,MAAM;AAAA,MACR;AAAA,MACA;AAAA,MACA;AAAA,IACF;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,aACE,QACA,SACA;AACA,WAAO,KAAK,eAAe,OAAO,QAAQ,EAAE,OAAO;AAAA,MACjD;AAAA,MACA;AAAA,IACF;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,UACE,QACA,SACA;AACA,WAAO,KAAK,eAAe,OAAO,QAAQ,EAAE,OAAO;AAAA,MACjD;AAAA,MACA;AAAA,IACF;AAAA,EACF;AACF;AASO,SAAS,kBACd,YACA,MACmB;AACnB,QAAM,OAAO,OAAO,QAAQ,UAAU,EAAE,IAAI,CAAC,CAAC,MAAM,IAAI,MAAM;AAC5D,WAAO,EAAE,MAAM,MAAM,KAAK,IAAI,EAAE;AAAA,EAClC,CAAC;AAED,QAAM,iBAAiB,KAAK,QAAQ,CAAC,EAAE,MAAM,UAAU,KAAK,MAAM;AAChE,WAAO,KAAK,IAAI,CAAC,SAAS;AACxB,aAAO;AAAA,QACL,GAAG;AAAA;AAAA,QAEH;AAAA,MACF;AAAA,IACF,CAAC;AAAA,EACH,CAAC;AAED,SAAO;AACT;","names":["url"]}
|
|
@@ -0,0 +1,41 @@
|
|
|
1
|
+
import { OAuthClientProvider } from '@modelcontextprotocol/sdk/client/auth.js';
|
|
2
|
+
import { OAuthClientMetadata, OAuthClientInformation, OAuthClientInformationFull, OAuthTokens } from '@modelcontextprotocol/sdk/shared/auth.js';
|
|
3
|
+
|
|
4
|
+
interface AgentsOAuthProvider extends OAuthClientProvider {
|
|
5
|
+
authUrl: string | undefined;
|
|
6
|
+
clientId: string | undefined;
|
|
7
|
+
serverId: string | undefined;
|
|
8
|
+
}
|
|
9
|
+
declare class DurableObjectOAuthClientProvider implements AgentsOAuthProvider {
|
|
10
|
+
storage: DurableObjectStorage;
|
|
11
|
+
clientName: string;
|
|
12
|
+
baseRedirectUrl: string;
|
|
13
|
+
private authUrl_;
|
|
14
|
+
private serverId_;
|
|
15
|
+
private clientId_;
|
|
16
|
+
constructor(storage: DurableObjectStorage, clientName: string, baseRedirectUrl: string);
|
|
17
|
+
get clientMetadata(): OAuthClientMetadata;
|
|
18
|
+
get redirectUrl(): string;
|
|
19
|
+
get clientId(): string;
|
|
20
|
+
set clientId(clientId_: string);
|
|
21
|
+
get serverId(): string;
|
|
22
|
+
set serverId(serverId_: string);
|
|
23
|
+
keyPrefix(clientId: string): string;
|
|
24
|
+
clientInfoKey(clientId: string): string;
|
|
25
|
+
clientInformation(): Promise<OAuthClientInformation | undefined>;
|
|
26
|
+
saveClientInformation(clientInformation: OAuthClientInformationFull): Promise<void>;
|
|
27
|
+
tokenKey(clientId: string): string;
|
|
28
|
+
tokens(): Promise<OAuthTokens | undefined>;
|
|
29
|
+
saveTokens(tokens: OAuthTokens): Promise<void>;
|
|
30
|
+
get authUrl(): string | undefined;
|
|
31
|
+
/**
|
|
32
|
+
* Because this operates on the server side (but we need browser auth), we send this url back to the user
|
|
33
|
+
* and require user interact to initiate the redirect flow
|
|
34
|
+
*/
|
|
35
|
+
redirectToAuthorization(authUrl: URL): Promise<void>;
|
|
36
|
+
codeVerifierKey(clientId: string): string;
|
|
37
|
+
saveCodeVerifier(verifier: string): Promise<void>;
|
|
38
|
+
codeVerifier(): Promise<string>;
|
|
39
|
+
}
|
|
40
|
+
|
|
41
|
+
export { type AgentsOAuthProvider, DurableObjectOAuthClientProvider };
|
|
@@ -0,0 +1,107 @@
|
|
|
1
|
+
import "../chunk-HMLY7DHA.js";
|
|
2
|
+
|
|
3
|
+
// src/mcp/do-oauth-client-provider.ts
|
|
4
|
+
var DurableObjectOAuthClientProvider = class {
|
|
5
|
+
constructor(storage, clientName, baseRedirectUrl) {
|
|
6
|
+
this.storage = storage;
|
|
7
|
+
this.clientName = clientName;
|
|
8
|
+
this.baseRedirectUrl = baseRedirectUrl;
|
|
9
|
+
}
|
|
10
|
+
get clientMetadata() {
|
|
11
|
+
return {
|
|
12
|
+
redirect_uris: [this.redirectUrl],
|
|
13
|
+
token_endpoint_auth_method: "none",
|
|
14
|
+
grant_types: ["authorization_code", "refresh_token"],
|
|
15
|
+
response_types: ["code"],
|
|
16
|
+
client_name: this.clientName,
|
|
17
|
+
client_uri: "example.com"
|
|
18
|
+
};
|
|
19
|
+
}
|
|
20
|
+
get redirectUrl() {
|
|
21
|
+
return `${this.baseRedirectUrl}/${this.serverId}`;
|
|
22
|
+
}
|
|
23
|
+
get clientId() {
|
|
24
|
+
if (!this.clientId_) {
|
|
25
|
+
throw new Error("Trying to access clientId before it was set");
|
|
26
|
+
}
|
|
27
|
+
return this.clientId_;
|
|
28
|
+
}
|
|
29
|
+
set clientId(clientId_) {
|
|
30
|
+
this.clientId_ = clientId_;
|
|
31
|
+
}
|
|
32
|
+
get serverId() {
|
|
33
|
+
if (!this.serverId_) {
|
|
34
|
+
throw new Error("Trying to access serverId before it was set");
|
|
35
|
+
}
|
|
36
|
+
return this.serverId_;
|
|
37
|
+
}
|
|
38
|
+
set serverId(serverId_) {
|
|
39
|
+
this.serverId_ = serverId_;
|
|
40
|
+
}
|
|
41
|
+
keyPrefix(clientId) {
|
|
42
|
+
return `/${this.clientName}/${this.serverId}/${clientId}`;
|
|
43
|
+
}
|
|
44
|
+
clientInfoKey(clientId) {
|
|
45
|
+
return `${this.keyPrefix(clientId)}/client_info/`;
|
|
46
|
+
}
|
|
47
|
+
async clientInformation() {
|
|
48
|
+
if (!this.clientId_) {
|
|
49
|
+
return void 0;
|
|
50
|
+
}
|
|
51
|
+
return await this.storage.get(
|
|
52
|
+
this.clientInfoKey(this.clientId)
|
|
53
|
+
) ?? void 0;
|
|
54
|
+
}
|
|
55
|
+
async saveClientInformation(clientInformation) {
|
|
56
|
+
await this.storage.put(
|
|
57
|
+
this.clientInfoKey(clientInformation.client_id),
|
|
58
|
+
clientInformation
|
|
59
|
+
);
|
|
60
|
+
this.clientId = clientInformation.client_id;
|
|
61
|
+
}
|
|
62
|
+
tokenKey(clientId) {
|
|
63
|
+
return `${this.keyPrefix(clientId)}/token`;
|
|
64
|
+
}
|
|
65
|
+
async tokens() {
|
|
66
|
+
if (!this.clientId_) {
|
|
67
|
+
return void 0;
|
|
68
|
+
}
|
|
69
|
+
return await this.storage.get(this.tokenKey(this.clientId)) ?? void 0;
|
|
70
|
+
}
|
|
71
|
+
async saveTokens(tokens) {
|
|
72
|
+
await this.storage.put(this.tokenKey(this.clientId), tokens);
|
|
73
|
+
}
|
|
74
|
+
get authUrl() {
|
|
75
|
+
return this.authUrl_;
|
|
76
|
+
}
|
|
77
|
+
/**
|
|
78
|
+
* Because this operates on the server side (but we need browser auth), we send this url back to the user
|
|
79
|
+
* and require user interact to initiate the redirect flow
|
|
80
|
+
*/
|
|
81
|
+
async redirectToAuthorization(authUrl) {
|
|
82
|
+
const client_id = authUrl.searchParams.get("client_id");
|
|
83
|
+
if (client_id) {
|
|
84
|
+
authUrl.searchParams.append("state", client_id);
|
|
85
|
+
}
|
|
86
|
+
this.authUrl_ = authUrl.toString();
|
|
87
|
+
}
|
|
88
|
+
codeVerifierKey(clientId) {
|
|
89
|
+
return `${this.keyPrefix(clientId)}/code_verifier`;
|
|
90
|
+
}
|
|
91
|
+
async saveCodeVerifier(verifier) {
|
|
92
|
+
await this.storage.put(this.codeVerifierKey(this.clientId), verifier);
|
|
93
|
+
}
|
|
94
|
+
async codeVerifier() {
|
|
95
|
+
const codeVerifier = await this.storage.get(
|
|
96
|
+
this.codeVerifierKey(this.clientId)
|
|
97
|
+
);
|
|
98
|
+
if (!codeVerifier) {
|
|
99
|
+
throw new Error("No code verifier found");
|
|
100
|
+
}
|
|
101
|
+
return codeVerifier;
|
|
102
|
+
}
|
|
103
|
+
};
|
|
104
|
+
export {
|
|
105
|
+
DurableObjectOAuthClientProvider
|
|
106
|
+
};
|
|
107
|
+
//# sourceMappingURL=do-oauth-client-provider.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../src/mcp/do-oauth-client-provider.ts"],"sourcesContent":["import type { OAuthClientProvider } from \"@modelcontextprotocol/sdk/client/auth.js\";\nimport type {\n OAuthTokens,\n OAuthClientMetadata,\n OAuthClientInformation,\n OAuthClientInformationFull,\n} from \"@modelcontextprotocol/sdk/shared/auth.js\";\n\n// A slight extension to the standard OAuthClientProvider interface because `redirectToAuthorization` doesn't give us the interface we need\n// This allows us to track authentication for a specific server and associated dynamic client registration\nexport interface AgentsOAuthProvider extends OAuthClientProvider {\n authUrl: string | undefined;\n clientId: string | undefined;\n serverId: string | undefined;\n}\n\nexport class DurableObjectOAuthClientProvider implements AgentsOAuthProvider {\n private authUrl_: string | undefined;\n private serverId_: string | undefined;\n private clientId_: string | undefined;\n\n constructor(\n public storage: DurableObjectStorage,\n public clientName: string,\n public baseRedirectUrl: string\n ) {}\n\n get clientMetadata(): OAuthClientMetadata {\n return {\n redirect_uris: [this.redirectUrl],\n token_endpoint_auth_method: \"none\",\n grant_types: [\"authorization_code\", \"refresh_token\"],\n response_types: [\"code\"],\n client_name: this.clientName,\n client_uri: \"example.com\",\n };\n }\n\n get redirectUrl() {\n return `${this.baseRedirectUrl}/${this.serverId}`;\n }\n\n get clientId() {\n if (!this.clientId_) {\n throw new Error(\"Trying to access clientId before it was set\");\n }\n return this.clientId_;\n }\n\n set clientId(clientId_: string) {\n this.clientId_ = clientId_;\n }\n\n get serverId() {\n if (!this.serverId_) {\n throw new Error(\"Trying to access serverId before it was set\");\n }\n return this.serverId_;\n }\n\n set serverId(serverId_: string) {\n this.serverId_ = serverId_;\n }\n\n keyPrefix(clientId: string) {\n return `/${this.clientName}/${this.serverId}/${clientId}`;\n }\n\n clientInfoKey(clientId: string) {\n return `${this.keyPrefix(clientId)}/client_info/`;\n }\n\n async clientInformation(): Promise<OAuthClientInformation | undefined> {\n if (!this.clientId_) {\n return undefined;\n }\n return (\n (await this.storage.get<OAuthClientInformation>(\n this.clientInfoKey(this.clientId)\n )) ?? undefined\n );\n }\n\n async saveClientInformation(\n clientInformation: OAuthClientInformationFull\n ): Promise<void> {\n await this.storage.put(\n this.clientInfoKey(clientInformation.client_id),\n clientInformation\n );\n this.clientId = clientInformation.client_id;\n }\n\n tokenKey(clientId: string) {\n return `${this.keyPrefix(clientId)}/token`;\n }\n\n async tokens(): Promise<OAuthTokens | undefined> {\n if (!this.clientId_) {\n return undefined;\n }\n return (\n (await this.storage.get<OAuthTokens>(this.tokenKey(this.clientId))) ??\n undefined\n );\n }\n\n async saveTokens(tokens: OAuthTokens): Promise<void> {\n await this.storage.put(this.tokenKey(this.clientId), tokens);\n }\n\n get authUrl() {\n return this.authUrl_;\n }\n\n /**\n * Because this operates on the server side (but we need browser auth), we send this url back to the user\n * and require user interact to initiate the redirect flow\n */\n async redirectToAuthorization(authUrl: URL): Promise<void> {\n // We want to track the client ID in state here because the typescript SSE client sometimes does\n // a dynamic client registration AFTER generating this redirect URL.\n const client_id = authUrl.searchParams.get(\"client_id\");\n if (client_id) {\n authUrl.searchParams.append(\"state\", client_id);\n }\n this.authUrl_ = authUrl.toString();\n }\n\n codeVerifierKey(clientId: string) {\n return `${this.keyPrefix(clientId)}/code_verifier`;\n }\n\n async saveCodeVerifier(verifier: string): Promise<void> {\n await this.storage.put(this.codeVerifierKey(this.clientId), verifier);\n }\n\n async codeVerifier(): Promise<string> {\n const codeVerifier = await this.storage.get<string>(\n this.codeVerifierKey(this.clientId)\n );\n if (!codeVerifier) {\n throw new Error(\"No code verifier found\");\n }\n return codeVerifier;\n }\n}\n"],"mappings":";;;AAgBO,IAAM,mCAAN,MAAsE;AAAA,EAK3E,YACS,SACA,YACA,iBACP;AAHO;AACA;AACA;AAAA,EACN;AAAA,EAEH,IAAI,iBAAsC;AACxC,WAAO;AAAA,MACL,eAAe,CAAC,KAAK,WAAW;AAAA,MAChC,4BAA4B;AAAA,MAC5B,aAAa,CAAC,sBAAsB,eAAe;AAAA,MACnD,gBAAgB,CAAC,MAAM;AAAA,MACvB,aAAa,KAAK;AAAA,MAClB,YAAY;AAAA,IACd;AAAA,EACF;AAAA,EAEA,IAAI,cAAc;AAChB,WAAO,GAAG,KAAK,eAAe,IAAI,KAAK,QAAQ;AAAA,EACjD;AAAA,EAEA,IAAI,WAAW;AACb,QAAI,CAAC,KAAK,WAAW;AACnB,YAAM,IAAI,MAAM,6CAA6C;AAAA,IAC/D;AACA,WAAO,KAAK;AAAA,EACd;AAAA,EAEA,IAAI,SAAS,WAAmB;AAC9B,SAAK,YAAY;AAAA,EACnB;AAAA,EAEA,IAAI,WAAW;AACb,QAAI,CAAC,KAAK,WAAW;AACnB,YAAM,IAAI,MAAM,6CAA6C;AAAA,IAC/D;AACA,WAAO,KAAK;AAAA,EACd;AAAA,EAEA,IAAI,SAAS,WAAmB;AAC9B,SAAK,YAAY;AAAA,EACnB;AAAA,EAEA,UAAU,UAAkB;AAC1B,WAAO,IAAI,KAAK,UAAU,IAAI,KAAK,QAAQ,IAAI,QAAQ;AAAA,EACzD;AAAA,EAEA,cAAc,UAAkB;AAC9B,WAAO,GAAG,KAAK,UAAU,QAAQ,CAAC;AAAA,EACpC;AAAA,EAEA,MAAM,oBAAiE;AACrE,QAAI,CAAC,KAAK,WAAW;AACnB,aAAO;AAAA,IACT;AACA,WACG,MAAM,KAAK,QAAQ;AAAA,MAClB,KAAK,cAAc,KAAK,QAAQ;AAAA,IAClC,KAAM;AAAA,EAEV;AAAA,EAEA,MAAM,sBACJ,mBACe;AACf,UAAM,KAAK,QAAQ;AAAA,MACjB,KAAK,cAAc,kBAAkB,SAAS;AAAA,MAC9C;AAAA,IACF;AACA,SAAK,WAAW,kBAAkB;AAAA,EACpC;AAAA,EAEA,SAAS,UAAkB;AACzB,WAAO,GAAG,KAAK,UAAU,QAAQ,CAAC;AAAA,EACpC;AAAA,EAEA,MAAM,SAA2C;AAC/C,QAAI,CAAC,KAAK,WAAW;AACnB,aAAO;AAAA,IACT;AACA,WACG,MAAM,KAAK,QAAQ,IAAiB,KAAK,SAAS,KAAK,QAAQ,CAAC,KACjE;AAAA,EAEJ;AAAA,EAEA,MAAM,WAAW,QAAoC;AACnD,UAAM,KAAK,QAAQ,IAAI,KAAK,SAAS,KAAK,QAAQ,GAAG,MAAM;AAAA,EAC7D;AAAA,EAEA,IAAI,UAAU;AACZ,WAAO,KAAK;AAAA,EACd;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,MAAM,wBAAwB,SAA6B;AAGzD,UAAM,YAAY,QAAQ,aAAa,IAAI,WAAW;AACtD,QAAI,WAAW;AACb,cAAQ,aAAa,OAAO,SAAS,SAAS;AAAA,IAChD;AACA,SAAK,WAAW,QAAQ,SAAS;AAAA,EACnC;AAAA,EAEA,gBAAgB,UAAkB;AAChC,WAAO,GAAG,KAAK,UAAU,QAAQ,CAAC;AAAA,EACpC;AAAA,EAEA,MAAM,iBAAiB,UAAiC;AACtD,UAAM,KAAK,QAAQ,IAAI,KAAK,gBAAgB,KAAK,QAAQ,GAAG,QAAQ;AAAA,EACtE;AAAA,EAEA,MAAM,eAAgC;AACpC,UAAM,eAAe,MAAM,KAAK,QAAQ;AAAA,MACtC,KAAK,gBAAgB,KAAK,QAAQ;AAAA,IACpC;AACA,QAAI,CAAC,cAAc;AACjB,YAAM,IAAI,MAAM,wBAAwB;AAAA,IAC1C;AACA,WAAO;AAAA,EACT;AACF;","names":[]}
|