bonecode 1.0.0 → 1.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +21 -0
- package/README.md +64 -50
- package/bone/output/agent/.dockerignore +7 -7
- package/bone/output/agent/.env.example +36 -36
- package/bone/output/agent/.github/workflows/ci.yaml +58 -58
- package/bone/output/agent/AgentDomain.bone.map +349 -349
- package/bone/output/agent/AgentDomain.postman_collection.json +957 -957
- package/bone/output/agent/Dockerfile +22 -22
- package/bone/output/agent/README.md +47 -47
- package/bone/output/agent/admin/index.html +739 -739
- package/bone/output/agent/docker-compose.yaml +22 -22
- package/bone/output/agent/k8s/deployment.yaml +75 -75
- package/bone/output/agent/migrations/agent.sql +36 -36
- package/bone/output/agent/migrations/agent_instance.sql +36 -36
- package/bone/output/agent/migrations/audit_log.sql +18 -18
- package/bone/output/agent/migrations/build_step.sql +34 -34
- package/bone/output/agent/migrations/event_outbox.sql +31 -31
- package/bone/output/agent/migrations/plan.sql +30 -30
- package/bone/output/agent/migrations/task.sql +30 -30
- package/bone/output/agent/migrations/tool_call.sql +33 -33
- package/bone/output/agent/openapi.yaml +1116 -1116
- package/bone/output/agent/package.json +35 -35
- package/bone/output/agent/schema.graphql +233 -233
- package/bone/output/agent/sdk/client.ts +231 -231
- package/bone/output/agent/src/algorithms.ts +2 -2
- package/bone/output/agent/src/audit.ts +44 -44
- package/bone/output/agent/src/auth.ts +57 -57
- package/bone/output/agent/src/cron.ts +12 -12
- package/bone/output/agent/src/db.ts +31 -31
- package/bone/output/agent/src/debug.ts +66 -66
- package/bone/output/agent/src/events.ts +243 -243
- package/bone/output/agent/src/extensions.ts +54 -54
- package/bone/output/agent/src/failure_rules.ts +322 -322
- package/bone/output/agent/src/flows.ts +168 -168
- package/bone/output/agent/src/health.ts +43 -43
- package/bone/output/agent/src/index.ts +99 -99
- package/bone/output/agent/src/logger.ts +69 -66
- package/bone/output/agent/src/metrics.ts +75 -75
- package/bone/output/agent/src/migrate.ts +351 -351
- package/bone/output/agent/src/migration_diff.ts +108 -108
- package/bone/output/agent/src/notify.ts +125 -125
- package/bone/output/agent/src/routes/plan.ts +91 -91
- package/bone/output/agent/src/routes/task.ts +105 -105
- package/bone/output/agent/src/routes/tool_call.ts +166 -166
- package/bone/output/agent/src/schemas.ts +384 -384
- package/bone/output/agent/src/state_machines/agent_instance.ts +24 -24
- package/bone/output/agent/src/state_machines/build_step.ts +22 -22
- package/bone/output/agent/src/state_machines/plan.ts +22 -22
- package/bone/output/agent/src/state_machines/task.ts +22 -22
- package/bone/output/agent/src/state_machines/tool_call.ts +22 -22
- package/bone/output/agent/src/tests.ts +361 -361
- package/bone/output/agent/src/websocket.ts +200 -200
- package/bone/output/agent/tsconfig.json +24 -24
- package/bone/output/rag/.dockerignore +7 -7
- package/bone/output/rag/.env.example +36 -36
- package/bone/output/rag/.github/workflows/ci.yaml +58 -58
- package/bone/output/rag/Dockerfile +22 -22
- package/bone/output/rag/RAGDomain.bone.map +286 -286
- package/bone/output/rag/RAGDomain.postman_collection.json +922 -922
- package/bone/output/rag/README.md +47 -47
- package/bone/output/rag/admin/index.html +817 -817
- package/bone/output/rag/docker-compose.yaml +22 -22
- package/bone/output/rag/k8s/deployment.yaml +75 -75
- package/bone/output/rag/migrations/audit_log.sql +18 -18
- package/bone/output/rag/migrations/code_chunk.sql +34 -34
- package/bone/output/rag/migrations/code_file.sql +33 -33
- package/bone/output/rag/migrations/event_outbox.sql +31 -31
- package/bone/output/rag/migrations/indexing_job.sql +33 -33
- package/bone/output/rag/migrations/knowledge_base.sql +35 -35
- package/bone/output/rag/migrations/memory_entry.sql +34 -34
- package/bone/output/rag/openapi.yaml +1097 -1097
- package/bone/output/rag/package.json +35 -35
- package/bone/output/rag/schema.graphql +245 -245
- package/bone/output/rag/sdk/client.ts +234 -234
- package/bone/output/rag/src/algorithms.ts +2 -2
- package/bone/output/rag/src/audit.ts +37 -37
- package/bone/output/rag/src/auth.ts +57 -57
- package/bone/output/rag/src/cron.ts +12 -12
- package/bone/output/rag/src/db.ts +31 -31
- package/bone/output/rag/src/debug.ts +66 -66
- package/bone/output/rag/src/events.ts +243 -243
- package/bone/output/rag/src/extensions.ts +350 -350
- package/bone/output/rag/src/failure_rules.ts +314 -314
- package/bone/output/rag/src/flows.ts +239 -239
- package/bone/output/rag/src/health.ts +43 -43
- package/bone/output/rag/src/index.ts +94 -94
- package/bone/output/rag/src/logger.ts +69 -66
- package/bone/output/rag/src/metrics.ts +75 -75
- package/bone/output/rag/src/migrate.ts +363 -363
- package/bone/output/rag/src/migration_diff.ts +108 -108
- package/bone/output/rag/src/notify.ts +99 -99
- package/bone/output/rag/src/routes/code_chunk.ts +75 -75
- package/bone/output/rag/src/routes/code_file.ts +101 -101
- package/bone/output/rag/src/routes/indexing_job.ts +87 -87
- package/bone/output/rag/src/routes/knowledge_base.ts +230 -230
- package/bone/output/rag/src/routes/memory_entry.ts +87 -87
- package/bone/output/rag/src/schemas.ts +394 -394
- package/bone/output/rag/src/state_machines/code_file.ts +23 -23
- package/bone/output/rag/src/state_machines/indexing_job.ts +22 -22
- package/bone/output/rag/src/state_machines/knowledge_base.ts +23 -23
- package/bone/output/rag/src/state_machines/memory_entry.ts +20 -20
- package/bone/output/rag/src/tests.ts +339 -339
- package/bone/output/rag/tsconfig.json +24 -24
- package/bone/output/session/.dockerignore +7 -7
- package/bone/output/session/.env.example +36 -36
- package/bone/output/session/.github/workflows/ci.yaml +58 -58
- package/bone/output/session/Dockerfile +22 -22
- package/bone/output/session/README.md +47 -47
- package/bone/output/session/SessionDomain.bone.map +349 -349
- package/bone/output/session/SessionDomain.postman_collection.json +957 -957
- package/bone/output/session/admin/index.html +666 -666
- package/bone/output/session/docker-compose.yaml +22 -22
- package/bone/output/session/k8s/deployment.yaml +75 -75
- package/bone/output/session/migrations/audit_log.sql +18 -18
- package/bone/output/session/migrations/event_outbox.sql +31 -31
- package/bone/output/session/migrations/message.sql +31 -31
- package/bone/output/session/migrations/part.sql +28 -28
- package/bone/output/session/migrations/permission.sql +28 -28
- package/bone/output/session/migrations/project.sql +28 -28
- package/bone/output/session/migrations/session.sql +38 -38
- package/bone/output/session/openapi.yaml +1101 -1101
- package/bone/output/session/package.json +35 -35
- package/bone/output/session/schema.graphql +222 -222
- package/bone/output/session/sdk/client.ts +225 -225
- package/bone/output/session/src/algorithms.ts +2 -2
- package/bone/output/session/src/audit.ts +44 -44
- package/bone/output/session/src/auth.ts +57 -57
- package/bone/output/session/src/cron.ts +12 -12
- package/bone/output/session/src/db.ts +31 -31
- package/bone/output/session/src/debug.ts +66 -66
- package/bone/output/session/src/events.ts +270 -270
- package/bone/output/session/src/extensions.ts +215 -215
- package/bone/output/session/src/failure_rules.ts +283 -283
- package/bone/output/session/src/flows.ts +168 -168
- package/bone/output/session/src/health.ts +43 -43
- package/bone/output/session/src/index.ts +99 -99
- package/bone/output/session/src/logger.ts +67 -66
- package/bone/output/session/src/metrics.ts +75 -75
- package/bone/output/session/src/migrate.ts +331 -331
- package/bone/output/session/src/migration_diff.ts +108 -108
- package/bone/output/session/src/notify.ts +112 -112
- package/bone/output/session/src/routes/message.ts +93 -93
- package/bone/output/session/src/routes/part.ts +79 -79
- package/bone/output/session/src/routes/permission.ts +79 -79
- package/bone/output/session/src/routes/project.ts +79 -79
- package/bone/output/session/src/routes/session.ts +294 -294
- package/bone/output/session/src/schemas.ts +357 -357
- package/bone/output/session/src/state_machines/session.ts +23 -23
- package/bone/output/session/src/tests.ts +325 -325
- package/bone/output/session/src/websocket.ts +223 -200
- package/bone/output/session/tsconfig.json +24 -24
- package/bone/output/workspace/.dockerignore +7 -7
- package/bone/output/workspace/.env.example +36 -36
- package/bone/output/workspace/.github/workflows/ci.yaml +58 -58
- package/bone/output/workspace/Dockerfile +22 -22
- package/bone/output/workspace/README.md +45 -45
- package/bone/output/workspace/WorkspaceDomain.bone.map +188 -188
- package/bone/output/workspace/WorkspaceDomain.postman_collection.json +620 -620
- package/bone/output/workspace/admin/index.html +484 -484
- package/bone/output/workspace/docker-compose.yaml +22 -22
- package/bone/output/workspace/k8s/deployment.yaml +75 -75
- package/bone/output/workspace/migrations/audit_log.sql +18 -18
- package/bone/output/workspace/migrations/codebase.sql +34 -34
- package/bone/output/workspace/migrations/event_outbox.sql +31 -31
- package/bone/output/workspace/migrations/snapshot.sql +32 -32
- package/bone/output/workspace/migrations/workspace.sql +33 -33
- package/bone/output/workspace/openapi.yaml +721 -721
- package/bone/output/workspace/package.json +35 -35
- package/bone/output/workspace/schema.graphql +153 -153
- package/bone/output/workspace/sdk/client.ts +155 -155
- package/bone/output/workspace/src/algorithms.ts +2 -2
- package/bone/output/workspace/src/audit.ts +37 -37
- package/bone/output/workspace/src/auth.ts +57 -57
- package/bone/output/workspace/src/cron.ts +12 -12
- package/bone/output/workspace/src/db.ts +31 -31
- package/bone/output/workspace/src/debug.ts +66 -66
- package/bone/output/workspace/src/events.ts +243 -243
- package/bone/output/workspace/src/extensions.ts +44 -44
- package/bone/output/workspace/src/failure_rules.ts +152 -152
- package/bone/output/workspace/src/health.ts +43 -43
- package/bone/output/workspace/src/index.ts +88 -88
- package/bone/output/workspace/src/logger.ts +69 -66
- package/bone/output/workspace/src/metrics.ts +75 -75
- package/bone/output/workspace/src/migrate.ts +219 -219
- package/bone/output/workspace/src/migration_diff.ts +108 -108
- package/bone/output/workspace/src/notify.ts +73 -73
- package/bone/output/workspace/src/routes/codebase.ts +87 -87
- package/bone/output/workspace/src/routes/snapshot.ts +127 -127
- package/bone/output/workspace/src/routes/workspace.ts +190 -190
- package/bone/output/workspace/src/schemas.ts +231 -231
- package/bone/output/workspace/src/state_machines/codebase.ts +21 -21
- package/bone/output/workspace/src/state_machines/snapshot.ts +20 -20
- package/bone/output/workspace/src/state_machines/workspace.ts +21 -21
- package/bone/output/workspace/src/tests.ts +248 -248
- package/bone/output/workspace/tsconfig.json +24 -24
- package/compat/opencode_adapter.ts +94 -17
- package/package.json +15 -2
- package/src/cli.ts +66 -107
- package/src/db_adapter.ts +354 -0
- package/src/engine/account/account.sql.ts +39 -39
- package/src/engine/account/account.ts +456 -456
- package/src/engine/account/repo.ts +166 -166
- package/src/engine/account/schema.ts +99 -99
- package/src/engine/account/url.ts +8 -8
- package/src/engine/acp/README.md +174 -174
- package/src/engine/acp/agent.ts +1968 -1968
- package/src/engine/acp/runtime.ts +22 -22
- package/src/engine/acp/session.ts +122 -122
- package/src/engine/acp/types.ts +24 -24
- package/src/engine/agent/agent.ts +463 -463
- package/src/engine/agent/generate.txt +75 -75
- package/src/engine/agent/prompt/compaction.txt +9 -9
- package/src/engine/agent/prompt/explore.txt +18 -18
- package/src/engine/agent/prompt/scout.txt +36 -36
- package/src/engine/agent/prompt/summary.txt +11 -11
- package/src/engine/agent/prompt/title.txt +44 -44
- package/src/engine/agent/subagent-permissions.ts +34 -34
- package/src/engine/auth/index.ts +96 -96
- package/src/engine/background/background/job.ts +200 -200
- package/src/engine/background/job.ts +200 -200
- package/src/engine/bus/bus-event.ts +45 -45
- package/src/engine/bus/global.ts +22 -22
- package/src/engine/bus/index.ts +203 -203
- package/src/engine/command/command/index.ts +181 -181
- package/src/engine/command/command/template/initialize.txt +66 -66
- package/src/engine/command/command/template/review.txt +101 -101
- package/src/engine/command/index.ts +181 -181
- package/src/engine/command/template/initialize.txt +66 -66
- package/src/engine/command/template/review.txt +101 -101
- package/src/engine/config/agent.ts +172 -172
- package/src/engine/config/attachment.ts +25 -25
- package/src/engine/config/command.ts +62 -62
- package/src/engine/config/config.ts +833 -833
- package/src/engine/config/console-state.ts +14 -14
- package/src/engine/config/entry-name.ts +16 -16
- package/src/engine/config/error.ts +23 -23
- package/src/engine/config/formatter.ts +13 -13
- package/src/engine/config/layout.ts +6 -6
- package/src/engine/config/lsp.ts +43 -43
- package/src/engine/config/managed.ts +71 -71
- package/src/engine/config/markdown.ts +96 -96
- package/src/engine/config/mcp.ts +56 -56
- package/src/engine/config/model-id.ts +5 -5
- package/src/engine/config/parse.ts +79 -79
- package/src/engine/config/paths.ts +45 -45
- package/src/engine/config/permission.ts +58 -58
- package/src/engine/config/plugin.ts +84 -84
- package/src/engine/config/provider.ts +111 -111
- package/src/engine/config/reference.ts +23 -23
- package/src/engine/config/server.ts +19 -19
- package/src/engine/config/skills.ts +14 -14
- package/src/engine/config/variable.ts +90 -90
- package/src/engine/control-plane/adapters/index.ts +41 -41
- package/src/engine/control-plane/adapters/worktree.ts +96 -96
- package/src/engine/control-plane/dev/README.md +19 -19
- package/src/engine/control-plane/dev/debug-workspace-plugin.ts +73 -73
- package/src/engine/control-plane/schema.ts +14 -14
- package/src/engine/control-plane/types.ts +59 -59
- package/src/engine/control-plane/util.ts +39 -39
- package/src/engine/control-plane/workspace-adapter-runtime.ts +51 -51
- package/src/engine/control-plane/workspace-context.ts +26 -26
- package/src/engine/control-plane/workspace.sql.ts +20 -20
- package/src/engine/control-plane/workspace.ts +1072 -1072
- package/src/engine/data-migration.ts +161 -161
- package/src/engine/effect/app-runtime.ts +143 -143
- package/src/engine/effect/bootstrap-runtime.ts +29 -29
- package/src/engine/effect/bridge.ts +84 -84
- package/src/engine/effect/config-service.ts +67 -67
- package/src/engine/effect/instance-ref.ts +11 -11
- package/src/engine/effect/instance-registry.ts +12 -12
- package/src/engine/effect/instance-state.ts +72 -72
- package/src/engine/effect/promise.ts +17 -17
- package/src/engine/effect/run-service.ts +47 -47
- package/src/engine/effect/runner.ts +217 -217
- package/src/engine/effect/runtime-flags.ts +74 -74
- package/src/engine/effect/service-use.ts +38 -38
- package/src/engine/env/index.ts +37 -37
- package/src/engine/event-v2-bridge.ts +89 -89
- package/src/engine/file/file/ignore.ts +81 -81
- package/src/engine/file/file/index.ts +651 -651
- package/src/engine/file/file/protected.ts +59 -59
- package/src/engine/file/file/ripgrep.ts +481 -481
- package/src/engine/file/file/watcher.ts +167 -167
- package/src/engine/file/ignore.ts +81 -81
- package/src/engine/file/index.ts +651 -651
- package/src/engine/file/protected.ts +59 -59
- package/src/engine/file/ripgrep.ts +481 -481
- package/src/engine/file/watcher.ts +167 -167
- package/src/engine/format/format/formatter.ts +404 -404
- package/src/engine/format/format/index.ts +209 -209
- package/src/engine/format/formatter.ts +404 -404
- package/src/engine/format/index.ts +209 -209
- package/src/engine/git/git/index.ts +347 -347
- package/src/engine/git/index.ts +347 -347
- package/src/engine/id/id.ts +80 -80
- package/src/engine/ide/index.ts +70 -70
- package/src/engine/image/image/image.ts +176 -176
- package/src/engine/image/image.ts +176 -176
- package/src/engine/index.ts +251 -251
- package/src/engine/installation/index.ts +327 -327
- package/src/engine/lsp/client.ts +707 -707
- package/src/engine/lsp/diagnostic.ts +29 -29
- package/src/engine/lsp/language.ts +121 -121
- package/src/engine/lsp/launch.ts +21 -21
- package/src/engine/lsp/lsp/client.ts +707 -707
- package/src/engine/lsp/lsp/diagnostic.ts +29 -29
- package/src/engine/lsp/lsp/language.ts +121 -121
- package/src/engine/lsp/lsp/launch.ts +21 -21
- package/src/engine/lsp/lsp/lsp.ts +507 -507
- package/src/engine/lsp/lsp/server.ts +2064 -2064
- package/src/engine/lsp/lsp.ts +507 -507
- package/src/engine/lsp/server.ts +2064 -2064
- package/src/engine/mcp/auth.ts +146 -146
- package/src/engine/mcp/index.ts +958 -958
- package/src/engine/mcp/mcp/auth.ts +146 -146
- package/src/engine/mcp/mcp/index.ts +958 -958
- package/src/engine/mcp/mcp/oauth-callback.ts +232 -232
- package/src/engine/mcp/mcp/oauth-provider.ts +214 -214
- package/src/engine/mcp/oauth-callback.ts +232 -232
- package/src/engine/mcp/oauth-provider.ts +214 -214
- package/src/engine/node.ts +6 -6
- package/src/engine/patch/index.ts +689 -689
- package/src/engine/patch/patch/index.ts +689 -689
- package/src/engine/permission/arity.ts +163 -163
- package/src/engine/permission/evaluate.ts +15 -15
- package/src/engine/permission/index.ts +306 -306
- package/src/engine/permission/permission/arity.ts +163 -163
- package/src/engine/permission/permission/evaluate.ts +15 -15
- package/src/engine/permission/permission/index.ts +306 -306
- package/src/engine/permission/permission/schema.ts +13 -13
- package/src/engine/permission/schema.ts +13 -13
- package/src/engine/plugin/azure.ts +26 -26
- package/src/engine/plugin/cloudflare.ts +76 -76
- package/src/engine/plugin/codex.ts +622 -622
- package/src/engine/plugin/digitalocean.ts +411 -411
- package/src/engine/plugin/github-copilot/copilot.ts +394 -394
- package/src/engine/plugin/github-copilot/models.ts +196 -196
- package/src/engine/plugin/index.ts +295 -295
- package/src/engine/plugin/install.ts +439 -439
- package/src/engine/plugin/loader.ts +216 -216
- package/src/engine/plugin/meta.ts +188 -188
- package/src/engine/plugin/shared.ts +323 -323
- package/src/engine/project/bootstrap-service.ts +9 -9
- package/src/engine/project/bootstrap.ts +75 -75
- package/src/engine/project/instance-context.ts +24 -24
- package/src/engine/project/instance-layer.ts +11 -11
- package/src/engine/project/instance-runtime.ts +16 -16
- package/src/engine/project/instance-store.ts +193 -193
- package/src/engine/project/project.sql.ts +17 -17
- package/src/engine/project/project.ts +537 -537
- package/src/engine/project/schema.ts +13 -13
- package/src/engine/project/vcs.ts +405 -405
- package/src/engine/provider/auth.ts +225 -225
- package/src/engine/provider/error.ts +204 -204
- package/src/engine/provider/model-status.ts +8 -8
- package/src/engine/provider/provider.ts +1843 -1843
- package/src/engine/provider/schema.ts +30 -30
- package/src/engine/provider/transform.ts +1376 -1376
- package/src/engine/pty/index.ts +365 -365
- package/src/engine/pty/input.ts +24 -24
- package/src/engine/pty/pty/index.ts +365 -365
- package/src/engine/pty/pty/input.ts +24 -24
- package/src/engine/pty/pty/pty.bun.ts +26 -26
- package/src/engine/pty/pty/pty.node.ts +27 -27
- package/src/engine/pty/pty/pty.ts +25 -25
- package/src/engine/pty/pty/schema.ts +14 -14
- package/src/engine/pty/pty/ticket.ts +68 -68
- package/src/engine/pty/pty.bun.ts +26 -26
- package/src/engine/pty/pty.node.ts +27 -27
- package/src/engine/pty/pty.ts +25 -25
- package/src/engine/pty/schema.ts +14 -14
- package/src/engine/pty/ticket.ts +68 -68
- package/src/engine/question/index.ts +213 -213
- package/src/engine/question/question/index.ts +213 -213
- package/src/engine/question/question/schema.ts +10 -10
- package/src/engine/question/schema.ts +10 -10
- package/src/engine/reference/reference/reference.ts +241 -241
- package/src/engine/reference/reference/repository-cache.ts +147 -147
- package/src/engine/reference/reference.ts +241 -241
- package/src/engine/reference/repository-cache.ts +147 -147
- package/src/engine/session/compaction.ts +651 -651
- package/src/engine/session/instruction.ts +238 -238
- package/src/engine/session/llm.ts +459 -459
- package/src/engine/session/message-error.ts +14 -14
- package/src/engine/session/message-v2.ts +1202 -1202
- package/src/engine/session/message.ts +146 -146
- package/src/engine/session/overflow.ts +32 -32
- package/src/engine/session/processor.ts +823 -823
- package/src/engine/session/prompt/anthropic.txt +105 -105
- package/src/engine/session/prompt/beast.txt +147 -147
- package/src/engine/session/prompt/build-switch.txt +5 -5
- package/src/engine/session/prompt/codex.txt +79 -79
- package/src/engine/session/prompt/copilot-gpt-5.txt +143 -143
- package/src/engine/session/prompt/default.txt +105 -105
- package/src/engine/session/prompt/gemini.txt +155 -155
- package/src/engine/session/prompt/gpt.txt +107 -107
- package/src/engine/session/prompt/kimi.txt +95 -95
- package/src/engine/session/prompt/max-steps.txt +15 -15
- package/src/engine/session/prompt/plan-reminder-anthropic.txt +67 -67
- package/src/engine/session/prompt/plan.txt +26 -26
- package/src/engine/session/prompt/trinity.txt +97 -97
- package/src/engine/session/prompt.ts +66 -9
- package/src/engine/session/retry.ts +200 -200
- package/src/engine/session/revert.ts +162 -162
- package/src/engine/session/run-state.ts +153 -153
- package/src/engine/session/schema.ts +26 -26
- package/src/engine/session/session.sql.ts +137 -137
- package/src/engine/session/session.ts +1011 -1011
- package/src/engine/session/status.ts +94 -94
- package/src/engine/session/summary.ts +164 -164
- package/src/engine/session/system.ts +84 -84
- package/src/engine/session/todo.ts +81 -81
- package/src/engine/share/session.ts +61 -61
- package/src/engine/share/share-next.ts +376 -376
- package/src/engine/share/share.sql.ts +13 -13
- package/src/engine/shell/shell/shell.ts +215 -215
- package/src/engine/shell/shell.ts +215 -215
- package/src/engine/skill/discovery.ts +116 -116
- package/src/engine/skill/index.ts +336 -336
- package/src/engine/skill/prompt/customize-opencode.md +377 -377
- package/src/engine/skill/skill/discovery.ts +116 -116
- package/src/engine/skill/skill/index.ts +336 -336
- package/src/engine/skill/skill/prompt/customize-opencode.md +377 -377
- package/src/engine/snapshot/index.ts +762 -762
- package/src/engine/snapshot/snapshot/index.ts +762 -762
- package/src/engine/sync/README.md +179 -179
- package/src/engine/sync/event.sql.ts +17 -17
- package/src/engine/sync/index.ts +410 -410
- package/src/engine/sync/schema.ts +11 -11
- package/src/engine/temporary.ts +33 -33
- package/src/engine/tool/apply_patch.ts +313 -313
- package/src/engine/tool/apply_patch.txt +33 -33
- package/src/engine/tool/edit.ts +711 -711
- package/src/engine/tool/edit.txt +10 -10
- package/src/engine/tool/external-directory.ts +49 -49
- package/src/engine/tool/glob.ts +103 -103
- package/src/engine/tool/glob.txt +6 -6
- package/src/engine/tool/grep.ts +156 -156
- package/src/engine/tool/grep.txt +8 -8
- package/src/engine/tool/invalid.ts +21 -21
- package/src/engine/tool/json-schema.ts +164 -164
- package/src/engine/tool/lsp.ts +113 -113
- package/src/engine/tool/lsp.txt +24 -24
- package/src/engine/tool/mcp-websearch.ts +96 -96
- package/src/engine/tool/plan-enter.txt +14 -14
- package/src/engine/tool/plan-exit.txt +13 -13
- package/src/engine/tool/plan.ts +78 -78
- package/src/engine/tool/question.ts +44 -44
- package/src/engine/tool/question.txt +10 -10
- package/src/engine/tool/read.ts +337 -337
- package/src/engine/tool/read.txt +14 -14
- package/src/engine/tool/registry.ts +472 -472
- package/src/engine/tool/repo_clone.ts +80 -80
- package/src/engine/tool/repo_clone.txt +5 -5
- package/src/engine/tool/repo_overview.ts +279 -279
- package/src/engine/tool/repo_overview.txt +4 -4
- package/src/engine/tool/schema.ts +14 -14
- package/src/engine/tool/shell/id.ts +19 -19
- package/src/engine/tool/shell/prompt.ts +295 -295
- package/src/engine/tool/shell/shell.txt +77 -77
- package/src/engine/tool/shell.ts +647 -647
- package/src/engine/tool/skill.ts +75 -75
- package/src/engine/tool/skill.txt +5 -5
- package/src/engine/tool/task.ts +337 -337
- package/src/engine/tool/task.txt +58 -58
- package/src/engine/tool/task_status.ts +179 -179
- package/src/engine/tool/task_status.txt +13 -13
- package/src/engine/tool/todo.ts +57 -57
- package/src/engine/tool/todowrite.txt +167 -167
- package/src/engine/tool/tool/apply_patch.ts +313 -313
- package/src/engine/tool/tool/apply_patch.txt +33 -33
- package/src/engine/tool/tool/edit.ts +711 -711
- package/src/engine/tool/tool/edit.txt +10 -10
- package/src/engine/tool/tool/external-directory.ts +49 -49
- package/src/engine/tool/tool/glob.ts +103 -103
- package/src/engine/tool/tool/glob.txt +6 -6
- package/src/engine/tool/tool/grep.ts +156 -156
- package/src/engine/tool/tool/grep.txt +8 -8
- package/src/engine/tool/tool/invalid.ts +21 -21
- package/src/engine/tool/tool/json-schema.ts +164 -164
- package/src/engine/tool/tool/lsp.ts +113 -113
- package/src/engine/tool/tool/lsp.txt +24 -24
- package/src/engine/tool/tool/mcp-websearch.ts +96 -96
- package/src/engine/tool/tool/plan-enter.txt +14 -14
- package/src/engine/tool/tool/plan-exit.txt +13 -13
- package/src/engine/tool/tool/plan.ts +78 -78
- package/src/engine/tool/tool/question.ts +44 -44
- package/src/engine/tool/tool/question.txt +10 -10
- package/src/engine/tool/tool/read.ts +337 -337
- package/src/engine/tool/tool/read.txt +14 -14
- package/src/engine/tool/tool/registry.ts +472 -472
- package/src/engine/tool/tool/repo_clone.ts +80 -80
- package/src/engine/tool/tool/repo_clone.txt +5 -5
- package/src/engine/tool/tool/repo_overview.ts +279 -279
- package/src/engine/tool/tool/repo_overview.txt +4 -4
- package/src/engine/tool/tool/schema.ts +14 -14
- package/src/engine/tool/tool/shell/id.ts +19 -19
- package/src/engine/tool/tool/shell/prompt.ts +295 -295
- package/src/engine/tool/tool/shell/shell.txt +77 -77
- package/src/engine/tool/tool/shell.ts +647 -647
- package/src/engine/tool/tool/skill.ts +75 -75
- package/src/engine/tool/tool/skill.txt +5 -5
- package/src/engine/tool/tool/task.ts +337 -337
- package/src/engine/tool/tool/task.txt +58 -58
- package/src/engine/tool/tool/task_status.ts +179 -179
- package/src/engine/tool/tool/task_status.txt +13 -13
- package/src/engine/tool/tool/todo.ts +57 -57
- package/src/engine/tool/tool/todowrite.txt +167 -167
- package/src/engine/tool/tool/tool.ts +164 -164
- package/src/engine/tool/tool/truncate.ts +160 -160
- package/src/engine/tool/tool/truncation-dir.ts +4 -4
- package/src/engine/tool/tool/webfetch.ts +192 -192
- package/src/engine/tool/tool/webfetch.txt +13 -13
- package/src/engine/tool/tool/websearch.ts +143 -143
- package/src/engine/tool/tool/websearch.txt +14 -14
- package/src/engine/tool/tool/write.ts +104 -104
- package/src/engine/tool/tool/write.txt +8 -8
- package/src/engine/tool/tool.ts +164 -164
- package/src/engine/tool/truncate.ts +160 -160
- package/src/engine/tool/truncation-dir.ts +4 -4
- package/src/engine/tool/webfetch.ts +192 -192
- package/src/engine/tool/webfetch.txt +13 -13
- package/src/engine/tool/websearch.ts +143 -143
- package/src/engine/tool/websearch.txt +14 -14
- package/src/engine/tool/write.ts +104 -104
- package/src/engine/tool/write.txt +8 -8
- package/src/engine/util/archive.ts +17 -17
- package/src/engine/util/bom.ts +31 -31
- package/src/engine/util/data-url.ts +9 -9
- package/src/engine/util/defer.ts +10 -10
- package/src/engine/util/effect-http-client.ts +11 -11
- package/src/engine/util/error.ts +88 -88
- package/src/engine/util/filesystem.ts +252 -252
- package/src/engine/util/format.ts +20 -20
- package/src/engine/util/iife.ts +3 -3
- package/src/engine/util/lazy.ts +20 -20
- package/src/engine/util/local-context.ts +25 -25
- package/src/engine/util/locale.ts +86 -86
- package/src/engine/util/media.ts +26 -26
- package/src/engine/util/process.ts +176 -176
- package/src/engine/util/queue.ts +32 -32
- package/src/engine/util/record.ts +3 -3
- package/src/engine/util/repository.ts +158 -158
- package/src/engine/util/rpc.ts +66 -66
- package/src/engine/util/signal.ts +12 -12
- package/src/engine/util/timeout.ts +13 -13
- package/src/engine/util/token.ts +7 -7
- package/src/engine/util/util/archive.ts +17 -17
- package/src/engine/util/util/bom.ts +31 -31
- package/src/engine/util/util/data-url.ts +9 -9
- package/src/engine/util/util/defer.ts +10 -10
- package/src/engine/util/util/effect-http-client.ts +11 -11
- package/src/engine/util/util/error.ts +88 -88
- package/src/engine/util/util/filesystem.ts +252 -252
- package/src/engine/util/util/format.ts +20 -20
- package/src/engine/util/util/iife.ts +3 -3
- package/src/engine/util/util/lazy.ts +20 -20
- package/src/engine/util/util/local-context.ts +25 -25
- package/src/engine/util/util/locale.ts +86 -86
- package/src/engine/util/util/media.ts +26 -26
- package/src/engine/util/util/process.ts +176 -176
- package/src/engine/util/util/queue.ts +32 -32
- package/src/engine/util/util/record.ts +3 -3
- package/src/engine/util/util/repository.ts +158 -158
- package/src/engine/util/util/rpc.ts +66 -66
- package/src/engine/util/util/signal.ts +12 -12
- package/src/engine/util/util/timeout.ts +13 -13
- package/src/engine/util/util/token.ts +7 -7
- package/src/engine/util/util/which.ts +14 -14
- package/src/engine/util/util/wildcard.ts +59 -59
- package/src/engine/util/which.ts +14 -14
- package/src/engine/util/wildcard.ts +59 -59
- package/src/engine/worktree/index.ts +621 -621
- package/src/server.ts +121 -158
- package/src/tui.ts +485 -502
package/src/engine/mcp/index.ts
CHANGED
|
@@ -1,958 +1,958 @@
|
|
|
1
|
-
import { dynamicTool, type Tool, jsonSchema, type JSONSchema7 } from "ai"
|
|
2
|
-
import { Client } from "@modelcontextprotocol/sdk/client/index.js"
|
|
3
|
-
import { StreamableHTTPClientTransport } from "@modelcontextprotocol/sdk/client/streamableHttp.js"
|
|
4
|
-
import { SSEClientTransport } from "@modelcontextprotocol/sdk/client/sse.js"
|
|
5
|
-
import { StdioClientTransport } from "@modelcontextprotocol/sdk/client/stdio.js"
|
|
6
|
-
import { UnauthorizedError } from "@modelcontextprotocol/sdk/client/auth.js"
|
|
7
|
-
import {
|
|
8
|
-
CallToolResultSchema,
|
|
9
|
-
ListToolsResultSchema,
|
|
10
|
-
ToolSchema,
|
|
11
|
-
type Tool as MCPToolDef,
|
|
12
|
-
ToolListChangedNotificationSchema,
|
|
13
|
-
} from "@modelcontextprotocol/sdk/types.js"
|
|
14
|
-
import { Config } from "@/config/config"
|
|
15
|
-
import { ConfigMCP } from "../config/mcp"
|
|
16
|
-
import * as Log from "@opencode-ai/core/util/log"
|
|
17
|
-
import { NamedError } from "@opencode-ai/core/util/error"
|
|
18
|
-
import { Installation } from "../installation"
|
|
19
|
-
import { InstallationVersion } from "@opencode-ai/core/installation/version"
|
|
20
|
-
import { withTimeout } from "@/util/timeout"
|
|
21
|
-
import { AppFileSystem } from "@opencode-ai/core/filesystem"
|
|
22
|
-
import { McpOAuthProvider } from "./oauth-provider"
|
|
23
|
-
import { McpOAuthCallback } from "./oauth-callback"
|
|
24
|
-
import { McpAuth } from "./auth"
|
|
25
|
-
import { BusEvent } from "../bus/bus-event"
|
|
26
|
-
import { Bus } from "@/bus"
|
|
27
|
-
import { TuiEvent } from "@/cli/cmd/tui/event"
|
|
28
|
-
import open from "open"
|
|
29
|
-
import { Effect, Exit, Layer, Option, Context, Schema, Stream } from "effect"
|
|
30
|
-
import { EffectBridge } from "@/effect/bridge"
|
|
31
|
-
import { InstanceState } from "@/effect/instance-state"
|
|
32
|
-
import { ChildProcess, ChildProcessSpawner } from "effect/unstable/process"
|
|
33
|
-
import { CrossSpawnSpawner } from "@opencode-ai/core/cross-spawn-spawner"
|
|
34
|
-
|
|
35
|
-
const log = Log.create({ service: "mcp" })
|
|
36
|
-
const DEFAULT_TIMEOUT = 30_000
|
|
37
|
-
|
|
38
|
-
const TolerantListToolsResultSchema = ListToolsResultSchema.extend({
|
|
39
|
-
tools: ToolSchema.omit({ outputSchema: true }).array(),
|
|
40
|
-
})
|
|
41
|
-
|
|
42
|
-
export const Resource = Schema.Struct({
|
|
43
|
-
name: Schema.String,
|
|
44
|
-
uri: Schema.String,
|
|
45
|
-
description: Schema.optional(Schema.String),
|
|
46
|
-
mimeType: Schema.optional(Schema.String),
|
|
47
|
-
client: Schema.String,
|
|
48
|
-
}).annotate({ identifier: "McpResource" })
|
|
49
|
-
export type Resource = Schema.Schema.Type<typeof Resource>
|
|
50
|
-
|
|
51
|
-
export const ToolsChanged = BusEvent.define(
|
|
52
|
-
"mcp.tools.changed",
|
|
53
|
-
Schema.Struct({
|
|
54
|
-
server: Schema.String,
|
|
55
|
-
}),
|
|
56
|
-
)
|
|
57
|
-
|
|
58
|
-
export const BrowserOpenFailed = BusEvent.define(
|
|
59
|
-
"mcp.browser.open.failed",
|
|
60
|
-
Schema.Struct({
|
|
61
|
-
mcpName: Schema.String,
|
|
62
|
-
url: Schema.String,
|
|
63
|
-
}),
|
|
64
|
-
)
|
|
65
|
-
|
|
66
|
-
export const Failed = NamedError.create("MCPFailed", {
|
|
67
|
-
name: Schema.String,
|
|
68
|
-
})
|
|
69
|
-
|
|
70
|
-
type MCPClient = Client
|
|
71
|
-
|
|
72
|
-
const StatusConnected = Schema.Struct({ status: Schema.Literal("connected") }).annotate({
|
|
73
|
-
identifier: "MCPStatusConnected",
|
|
74
|
-
})
|
|
75
|
-
const StatusDisabled = Schema.Struct({ status: Schema.Literal("disabled") }).annotate({
|
|
76
|
-
identifier: "MCPStatusDisabled",
|
|
77
|
-
})
|
|
78
|
-
const StatusFailed = Schema.Struct({ status: Schema.Literal("failed"), error: Schema.String }).annotate({
|
|
79
|
-
identifier: "MCPStatusFailed",
|
|
80
|
-
})
|
|
81
|
-
const StatusNeedsAuth = Schema.Struct({ status: Schema.Literal("needs_auth") }).annotate({
|
|
82
|
-
identifier: "MCPStatusNeedsAuth",
|
|
83
|
-
})
|
|
84
|
-
const StatusNeedsClientRegistration = Schema.Struct({
|
|
85
|
-
status: Schema.Literal("needs_client_registration"),
|
|
86
|
-
error: Schema.String,
|
|
87
|
-
}).annotate({ identifier: "MCPStatusNeedsClientRegistration" })
|
|
88
|
-
|
|
89
|
-
export const Status = Schema.Union([
|
|
90
|
-
StatusConnected,
|
|
91
|
-
StatusDisabled,
|
|
92
|
-
StatusFailed,
|
|
93
|
-
StatusNeedsAuth,
|
|
94
|
-
StatusNeedsClientRegistration,
|
|
95
|
-
]).annotate({ identifier: "MCPStatus", discriminator: "status" })
|
|
96
|
-
export type Status = Schema.Schema.Type<typeof Status>
|
|
97
|
-
|
|
98
|
-
// Store transports for OAuth servers to allow finishing auth
|
|
99
|
-
type TransportWithAuth = StreamableHTTPClientTransport | SSEClientTransport
|
|
100
|
-
const pendingOAuthTransports = new Map<string, TransportWithAuth>()
|
|
101
|
-
|
|
102
|
-
// Prompt cache types
|
|
103
|
-
type PromptInfo = Awaited<ReturnType<MCPClient["listPrompts"]>>["prompts"][number]
|
|
104
|
-
type ResourceInfo = Awaited<ReturnType<MCPClient["listResources"]>>["resources"][number]
|
|
105
|
-
type McpEntry = NonNullable<Config.Info["mcp"]>[string]
|
|
106
|
-
|
|
107
|
-
function isMcpConfigured(entry: McpEntry): entry is ConfigMCP.Info {
|
|
108
|
-
return typeof entry === "object" && entry !== null && "type" in entry
|
|
109
|
-
}
|
|
110
|
-
|
|
111
|
-
const sanitize = (s: string) => s.replace(/[^a-zA-Z0-9_-]/g, "_")
|
|
112
|
-
|
|
113
|
-
function remoteURL(key: string, value: string) {
|
|
114
|
-
if (URL.canParse(value)) return new URL(value)
|
|
115
|
-
log.warn("invalid remote mcp url", { key })
|
|
116
|
-
}
|
|
117
|
-
|
|
118
|
-
function isOutputSchemaValidationError(error: Error) {
|
|
119
|
-
return /can't resolve reference|resolves to more than one schema|outputSchema|schema.*reference|reference.*schema/i.test(
|
|
120
|
-
error.message,
|
|
121
|
-
)
|
|
122
|
-
}
|
|
123
|
-
|
|
124
|
-
function listTools(key: string, client: MCPClient, timeout: number) {
|
|
125
|
-
return Effect.tryPromise({
|
|
126
|
-
try: () => client.listTools(undefined, { timeout }),
|
|
127
|
-
catch: (err) => (err instanceof Error ? err : new Error(String(err))),
|
|
128
|
-
}).pipe(
|
|
129
|
-
Effect.map((result) => result.tools),
|
|
130
|
-
Effect.catch((error) => {
|
|
131
|
-
if (!isOutputSchemaValidationError(error)) return Effect.fail(error)
|
|
132
|
-
|
|
133
|
-
log.warn("failed to validate MCP tool output schemas, retrying without output schema validation", { key, error })
|
|
134
|
-
return Effect.tryPromise({
|
|
135
|
-
try: () =>
|
|
136
|
-
client.request({ method: "tools/list" }, TolerantListToolsResultSchema, {
|
|
137
|
-
timeout,
|
|
138
|
-
}),
|
|
139
|
-
catch: (err) => (err instanceof Error ? err : new Error(String(err))),
|
|
140
|
-
}).pipe(
|
|
141
|
-
Effect.map((result) =>
|
|
142
|
-
result.tools.map((tool) => ({
|
|
143
|
-
name: tool.name,
|
|
144
|
-
description: tool.description,
|
|
145
|
-
inputSchema: tool.inputSchema,
|
|
146
|
-
})),
|
|
147
|
-
),
|
|
148
|
-
)
|
|
149
|
-
}),
|
|
150
|
-
)
|
|
151
|
-
}
|
|
152
|
-
|
|
153
|
-
// Convert MCP tool definition to AI SDK Tool type
|
|
154
|
-
function convertMcpTool(mcpTool: MCPToolDef, client: MCPClient, timeout?: number): Tool {
|
|
155
|
-
const inputSchema = mcpTool.inputSchema
|
|
156
|
-
|
|
157
|
-
// Spread first, then override type to ensure it's always "object"
|
|
158
|
-
const schema: JSONSchema7 = {
|
|
159
|
-
...(inputSchema as JSONSchema7),
|
|
160
|
-
type: "object",
|
|
161
|
-
properties: (inputSchema.properties ?? {}) as JSONSchema7["properties"],
|
|
162
|
-
additionalProperties: false,
|
|
163
|
-
}
|
|
164
|
-
|
|
165
|
-
return dynamicTool({
|
|
166
|
-
description: mcpTool.description ?? "",
|
|
167
|
-
inputSchema: jsonSchema(schema),
|
|
168
|
-
execute: async (args: unknown) => {
|
|
169
|
-
return client.callTool(
|
|
170
|
-
{
|
|
171
|
-
name: mcpTool.name,
|
|
172
|
-
arguments: (args || {}) as Record<string, unknown>,
|
|
173
|
-
},
|
|
174
|
-
CallToolResultSchema,
|
|
175
|
-
{
|
|
176
|
-
resetTimeoutOnProgress: true,
|
|
177
|
-
timeout,
|
|
178
|
-
},
|
|
179
|
-
)
|
|
180
|
-
},
|
|
181
|
-
})
|
|
182
|
-
}
|
|
183
|
-
|
|
184
|
-
function defs(key: string, client: MCPClient, timeout?: number) {
|
|
185
|
-
return listTools(key, client, timeout ?? DEFAULT_TIMEOUT).pipe(
|
|
186
|
-
Effect.catch((err) => {
|
|
187
|
-
log.error("failed to get tools from client", { key, error: err })
|
|
188
|
-
return Effect.succeed(undefined)
|
|
189
|
-
}),
|
|
190
|
-
)
|
|
191
|
-
}
|
|
192
|
-
|
|
193
|
-
function fetchFromClient<T extends { name: string }>(
|
|
194
|
-
clientName: string,
|
|
195
|
-
client: Client,
|
|
196
|
-
listFn: (c: Client) => Promise<T[]>,
|
|
197
|
-
label: string,
|
|
198
|
-
) {
|
|
199
|
-
return Effect.tryPromise({
|
|
200
|
-
try: () => listFn(client),
|
|
201
|
-
catch: (e: any) => {
|
|
202
|
-
log.error(`failed to get ${label}`, { clientName, error: e.message })
|
|
203
|
-
return e
|
|
204
|
-
},
|
|
205
|
-
}).pipe(
|
|
206
|
-
Effect.map((items) => {
|
|
207
|
-
const out: Record<string, T & { client: string }> = {}
|
|
208
|
-
const sanitizedClient = sanitize(clientName)
|
|
209
|
-
for (const item of items) {
|
|
210
|
-
out[sanitizedClient + ":" + sanitize(item.name)] = { ...item, client: clientName }
|
|
211
|
-
}
|
|
212
|
-
return out
|
|
213
|
-
}),
|
|
214
|
-
Effect.orElseSucceed(() => undefined),
|
|
215
|
-
)
|
|
216
|
-
}
|
|
217
|
-
|
|
218
|
-
interface CreateResult {
|
|
219
|
-
mcpClient?: MCPClient
|
|
220
|
-
status: Status
|
|
221
|
-
defs?: MCPToolDef[]
|
|
222
|
-
}
|
|
223
|
-
|
|
224
|
-
interface AuthResult {
|
|
225
|
-
authorizationUrl: string
|
|
226
|
-
oauthState: string
|
|
227
|
-
client?: MCPClient
|
|
228
|
-
}
|
|
229
|
-
|
|
230
|
-
// --- Effect Service ---
|
|
231
|
-
|
|
232
|
-
interface State {
|
|
233
|
-
status: Record<string, Status>
|
|
234
|
-
clients: Record<string, MCPClient>
|
|
235
|
-
defs: Record<string, MCPToolDef[]>
|
|
236
|
-
}
|
|
237
|
-
|
|
238
|
-
export interface Interface {
|
|
239
|
-
readonly status: () => Effect.Effect<Record<string, Status>>
|
|
240
|
-
readonly clients: () => Effect.Effect<Record<string, MCPClient>>
|
|
241
|
-
readonly tools: () => Effect.Effect<Record<string, Tool>>
|
|
242
|
-
readonly prompts: () => Effect.Effect<Record<string, PromptInfo & { client: string }>>
|
|
243
|
-
readonly resources: () => Effect.Effect<Record<string, ResourceInfo & { client: string }>>
|
|
244
|
-
readonly add: (name: string, mcp: ConfigMCP.Info) => Effect.Effect<{ status: Record<string, Status> | Status }>
|
|
245
|
-
readonly connect: (name: string) => Effect.Effect<void>
|
|
246
|
-
readonly disconnect: (name: string) => Effect.Effect<void>
|
|
247
|
-
readonly getPrompt: (
|
|
248
|
-
clientName: string,
|
|
249
|
-
name: string,
|
|
250
|
-
args?: Record<string, string>,
|
|
251
|
-
) => Effect.Effect<Awaited<ReturnType<MCPClient["getPrompt"]>> | undefined>
|
|
252
|
-
readonly readResource: (
|
|
253
|
-
clientName: string,
|
|
254
|
-
resourceUri: string,
|
|
255
|
-
) => Effect.Effect<Awaited<ReturnType<MCPClient["readResource"]>> | undefined>
|
|
256
|
-
readonly startAuth: (mcpName: string) => Effect.Effect<{ authorizationUrl: string; oauthState: string }>
|
|
257
|
-
readonly authenticate: (mcpName: string) => Effect.Effect<Status>
|
|
258
|
-
readonly finishAuth: (mcpName: string, authorizationCode: string) => Effect.Effect<Status>
|
|
259
|
-
readonly removeAuth: (mcpName: string) => Effect.Effect<void>
|
|
260
|
-
readonly supportsOAuth: (mcpName: string) => Effect.Effect<boolean>
|
|
261
|
-
readonly hasStoredTokens: (mcpName: string) => Effect.Effect<boolean>
|
|
262
|
-
readonly getAuthStatus: (mcpName: string) => Effect.Effect<AuthStatus>
|
|
263
|
-
}
|
|
264
|
-
|
|
265
|
-
export class Service extends Context.Service<Service, Interface>()("@opencode/MCP") {}
|
|
266
|
-
|
|
267
|
-
export const layer = Layer.effect(
|
|
268
|
-
Service,
|
|
269
|
-
Effect.gen(function* () {
|
|
270
|
-
const spawner = yield* ChildProcessSpawner.ChildProcessSpawner
|
|
271
|
-
const auth = yield* McpAuth.Service
|
|
272
|
-
const bus = yield* Bus.Service
|
|
273
|
-
|
|
274
|
-
type Transport = StdioClientTransport | StreamableHTTPClientTransport | SSEClientTransport
|
|
275
|
-
|
|
276
|
-
/**
|
|
277
|
-
* Connect a client via the given transport with resource safety:
|
|
278
|
-
* on failure the transport is closed; on success the caller owns it.
|
|
279
|
-
*/
|
|
280
|
-
const connectTransport = (transport: Transport, timeout: number) =>
|
|
281
|
-
Effect.acquireUseRelease(
|
|
282
|
-
Effect.succeed(transport),
|
|
283
|
-
(t) =>
|
|
284
|
-
Effect.tryPromise({
|
|
285
|
-
try: () => {
|
|
286
|
-
const client = new Client({ name: "opencode", version: InstallationVersion })
|
|
287
|
-
return withTimeout(client.connect(t), timeout).then(() => client)
|
|
288
|
-
},
|
|
289
|
-
catch: (e) => (e instanceof Error ? e : new Error(String(e))),
|
|
290
|
-
}),
|
|
291
|
-
(t, exit) => (Exit.isFailure(exit) ? Effect.tryPromise(() => t.close()).pipe(Effect.ignore) : Effect.void),
|
|
292
|
-
)
|
|
293
|
-
|
|
294
|
-
const DISABLED_RESULT: CreateResult = { status: { status: "disabled" } }
|
|
295
|
-
|
|
296
|
-
const connectRemote = Effect.fn("MCP.connectRemote")(function* (
|
|
297
|
-
key: string,
|
|
298
|
-
mcp: ConfigMCP.Info & { type: "remote" },
|
|
299
|
-
) {
|
|
300
|
-
const oauthDisabled = mcp.oauth === false
|
|
301
|
-
const oauthConfig = typeof mcp.oauth === "object" ? mcp.oauth : undefined
|
|
302
|
-
const url = remoteURL(key, mcp.url)
|
|
303
|
-
if (!url) {
|
|
304
|
-
return {
|
|
305
|
-
client: undefined as MCPClient | undefined,
|
|
306
|
-
status: { status: "failed" as const, error: `Invalid MCP URL for "${key}"` },
|
|
307
|
-
}
|
|
308
|
-
}
|
|
309
|
-
let authProvider: McpOAuthProvider | undefined
|
|
310
|
-
|
|
311
|
-
if (!oauthDisabled) {
|
|
312
|
-
authProvider = new McpOAuthProvider(
|
|
313
|
-
key,
|
|
314
|
-
mcp.url,
|
|
315
|
-
{
|
|
316
|
-
clientId: oauthConfig?.clientId,
|
|
317
|
-
clientSecret: oauthConfig?.clientSecret,
|
|
318
|
-
scope: oauthConfig?.scope,
|
|
319
|
-
redirectUri: oauthConfig?.redirectUri,
|
|
320
|
-
},
|
|
321
|
-
{
|
|
322
|
-
onRedirect: async (url) => {
|
|
323
|
-
log.info("oauth redirect requested", { key, url: url.toString() })
|
|
324
|
-
},
|
|
325
|
-
},
|
|
326
|
-
auth,
|
|
327
|
-
)
|
|
328
|
-
}
|
|
329
|
-
|
|
330
|
-
const transports: Array<{ name: string; transport: TransportWithAuth }> = [
|
|
331
|
-
{
|
|
332
|
-
name: "StreamableHTTP",
|
|
333
|
-
transport: new StreamableHTTPClientTransport(url, {
|
|
334
|
-
authProvider,
|
|
335
|
-
requestInit: mcp.headers ? { headers: mcp.headers } : undefined,
|
|
336
|
-
}),
|
|
337
|
-
},
|
|
338
|
-
{
|
|
339
|
-
name: "SSE",
|
|
340
|
-
transport: new SSEClientTransport(url, {
|
|
341
|
-
authProvider,
|
|
342
|
-
requestInit: mcp.headers ? { headers: mcp.headers } : undefined,
|
|
343
|
-
}),
|
|
344
|
-
},
|
|
345
|
-
]
|
|
346
|
-
|
|
347
|
-
const connectTimeout = mcp.timeout ?? DEFAULT_TIMEOUT
|
|
348
|
-
let lastStatus: Status | undefined
|
|
349
|
-
|
|
350
|
-
for (const { name, transport } of transports) {
|
|
351
|
-
const result = yield* connectTransport(transport, connectTimeout).pipe(
|
|
352
|
-
Effect.map((client) => ({ client, transportName: name })),
|
|
353
|
-
Effect.catch((error) => {
|
|
354
|
-
const lastError = error instanceof Error ? error : new Error(String(error))
|
|
355
|
-
const isAuthError =
|
|
356
|
-
error instanceof UnauthorizedError || (authProvider && lastError.message.includes("OAuth"))
|
|
357
|
-
|
|
358
|
-
if (isAuthError) {
|
|
359
|
-
log.info("mcp server requires authentication", { key, transport: name })
|
|
360
|
-
|
|
361
|
-
if (lastError.message.includes("registration") || lastError.message.includes("client_id")) {
|
|
362
|
-
lastStatus = {
|
|
363
|
-
status: "needs_client_registration" as const,
|
|
364
|
-
error: "Server does not support dynamic client registration. Please provide clientId in config.",
|
|
365
|
-
}
|
|
366
|
-
return bus
|
|
367
|
-
.publish(TuiEvent.ToastShow, {
|
|
368
|
-
title: "MCP Authentication Required",
|
|
369
|
-
message: `Server "${key}" requires a pre-registered client ID. Add clientId to your config.`,
|
|
370
|
-
variant: "warning",
|
|
371
|
-
duration: 8000,
|
|
372
|
-
})
|
|
373
|
-
.pipe(Effect.ignore, Effect.as(undefined))
|
|
374
|
-
} else {
|
|
375
|
-
pendingOAuthTransports.set(key, transport)
|
|
376
|
-
lastStatus = { status: "needs_auth" as const }
|
|
377
|
-
return bus
|
|
378
|
-
.publish(TuiEvent.ToastShow, {
|
|
379
|
-
title: "MCP Authentication Required",
|
|
380
|
-
message: `Server "${key}" requires authentication. Run: opencode mcp auth ${key}`,
|
|
381
|
-
variant: "warning",
|
|
382
|
-
duration: 8000,
|
|
383
|
-
})
|
|
384
|
-
.pipe(Effect.ignore, Effect.as(undefined))
|
|
385
|
-
}
|
|
386
|
-
}
|
|
387
|
-
|
|
388
|
-
log.debug("transport connection failed", {
|
|
389
|
-
key,
|
|
390
|
-
transport: name,
|
|
391
|
-
url: mcp.url,
|
|
392
|
-
error: lastError.message,
|
|
393
|
-
})
|
|
394
|
-
lastStatus = { status: "failed" as const, error: lastError.message }
|
|
395
|
-
return Effect.succeed(undefined)
|
|
396
|
-
}),
|
|
397
|
-
)
|
|
398
|
-
if (result) {
|
|
399
|
-
log.info("connected", { key, transport: result.transportName })
|
|
400
|
-
return { client: result.client as MCPClient | undefined, status: { status: "connected" } as Status }
|
|
401
|
-
}
|
|
402
|
-
// If this was an auth error, stop trying other transports
|
|
403
|
-
if (lastStatus?.status === "needs_auth" || lastStatus?.status === "needs_client_registration") break
|
|
404
|
-
}
|
|
405
|
-
|
|
406
|
-
return {
|
|
407
|
-
client: undefined as MCPClient | undefined,
|
|
408
|
-
status: (lastStatus ?? { status: "failed", error: "Unknown error" }) as Status,
|
|
409
|
-
}
|
|
410
|
-
})
|
|
411
|
-
|
|
412
|
-
const connectLocal = Effect.fn("MCP.connectLocal")(function* (
|
|
413
|
-
key: string,
|
|
414
|
-
mcp: ConfigMCP.Info & { type: "local" },
|
|
415
|
-
) {
|
|
416
|
-
const [cmd, ...args] = mcp.command
|
|
417
|
-
const cwd = yield* InstanceState.directory
|
|
418
|
-
const transport = new StdioClientTransport({
|
|
419
|
-
stderr: "pipe",
|
|
420
|
-
command: cmd,
|
|
421
|
-
args,
|
|
422
|
-
cwd,
|
|
423
|
-
env: {
|
|
424
|
-
...process.env,
|
|
425
|
-
...(cmd === "opencode" ? { BUN_BE_BUN: "1" } : {}),
|
|
426
|
-
...mcp.environment,
|
|
427
|
-
},
|
|
428
|
-
})
|
|
429
|
-
transport.stderr?.on("data", (chunk: Buffer) => {
|
|
430
|
-
log.info(`mcp stderr: ${chunk.toString()}`, { key })
|
|
431
|
-
})
|
|
432
|
-
|
|
433
|
-
const connectTimeout = mcp.timeout ?? DEFAULT_TIMEOUT
|
|
434
|
-
return yield* connectTransport(transport, connectTimeout).pipe(
|
|
435
|
-
Effect.map((client): { client: MCPClient | undefined; status: Status } => ({
|
|
436
|
-
client,
|
|
437
|
-
status: { status: "connected" },
|
|
438
|
-
})),
|
|
439
|
-
Effect.catch((error): Effect.Effect<{ client: MCPClient | undefined; status: Status }> => {
|
|
440
|
-
const msg = error instanceof Error ? error.message : String(error)
|
|
441
|
-
log.error("local mcp startup failed", { key, command: mcp.command, cwd, error: msg })
|
|
442
|
-
return Effect.succeed({ client: undefined, status: { status: "failed", error: msg } })
|
|
443
|
-
}),
|
|
444
|
-
)
|
|
445
|
-
})
|
|
446
|
-
|
|
447
|
-
const create = Effect.fn("MCP.create")(function* (key: string, mcp: ConfigMCP.Info) {
|
|
448
|
-
if (mcp.enabled === false) {
|
|
449
|
-
log.info("mcp server disabled", { key })
|
|
450
|
-
return DISABLED_RESULT
|
|
451
|
-
}
|
|
452
|
-
|
|
453
|
-
log.info("found", { key, type: mcp.type })
|
|
454
|
-
|
|
455
|
-
const { client: mcpClient, status } =
|
|
456
|
-
mcp.type === "remote"
|
|
457
|
-
? yield* connectRemote(key, mcp as ConfigMCP.Info & { type: "remote" })
|
|
458
|
-
: yield* connectLocal(key, mcp as ConfigMCP.Info & { type: "local" })
|
|
459
|
-
|
|
460
|
-
if (!mcpClient) {
|
|
461
|
-
return { status } satisfies CreateResult
|
|
462
|
-
}
|
|
463
|
-
|
|
464
|
-
const listed = yield* defs(key, mcpClient, mcp.timeout)
|
|
465
|
-
if (!listed) {
|
|
466
|
-
yield* Effect.tryPromise(() => mcpClient.close()).pipe(Effect.ignore)
|
|
467
|
-
return { status: { status: "failed", error: "Failed to get tools" } } satisfies CreateResult
|
|
468
|
-
}
|
|
469
|
-
|
|
470
|
-
log.info("create() successfully created client", { key, toolCount: listed.length })
|
|
471
|
-
return { mcpClient, status, defs: listed } satisfies CreateResult
|
|
472
|
-
})
|
|
473
|
-
const cfgSvc = yield* Config.Service
|
|
474
|
-
|
|
475
|
-
const descendants = Effect.fnUntraced(
|
|
476
|
-
function* (pid: number) {
|
|
477
|
-
if (process.platform === "win32") return [] as number[]
|
|
478
|
-
const pids: number[] = []
|
|
479
|
-
const queue = [pid]
|
|
480
|
-
while (queue.length > 0) {
|
|
481
|
-
const current = queue.shift()!
|
|
482
|
-
const handle = yield* spawner.spawn(ChildProcess.make("pgrep", ["-P", String(current)], { stdin: "ignore" }))
|
|
483
|
-
const text = yield* Stream.mkString(Stream.decodeText(handle.stdout))
|
|
484
|
-
yield* handle.exitCode
|
|
485
|
-
for (const tok of text.split("\n")) {
|
|
486
|
-
const cpid = parseInt(tok, 10)
|
|
487
|
-
if (!isNaN(cpid) && !pids.includes(cpid)) {
|
|
488
|
-
pids.push(cpid)
|
|
489
|
-
queue.push(cpid)
|
|
490
|
-
}
|
|
491
|
-
}
|
|
492
|
-
}
|
|
493
|
-
return pids
|
|
494
|
-
},
|
|
495
|
-
Effect.scoped,
|
|
496
|
-
Effect.catch(() => Effect.succeed([] as number[])),
|
|
497
|
-
)
|
|
498
|
-
|
|
499
|
-
function watch(s: State, name: string, client: MCPClient, bridge: EffectBridge.Shape, timeout?: number) {
|
|
500
|
-
client.setNotificationHandler(ToolListChangedNotificationSchema, async () => {
|
|
501
|
-
log.info("tools list changed notification received", { server: name })
|
|
502
|
-
if (s.clients[name] !== client || s.status[name]?.status !== "connected") return
|
|
503
|
-
|
|
504
|
-
const listed = await bridge.promise(defs(name, client, timeout))
|
|
505
|
-
if (!listed) return
|
|
506
|
-
if (s.clients[name] !== client || s.status[name]?.status !== "connected") return
|
|
507
|
-
|
|
508
|
-
s.defs[name] = listed
|
|
509
|
-
await bridge.promise(bus.publish(ToolsChanged, { server: name }).pipe(Effect.ignore))
|
|
510
|
-
})
|
|
511
|
-
}
|
|
512
|
-
|
|
513
|
-
const state = yield* InstanceState.make<State>(
|
|
514
|
-
Effect.fn("MCP.state")(function* () {
|
|
515
|
-
const cfg = yield* cfgSvc.get()
|
|
516
|
-
const bridge = yield* EffectBridge.make()
|
|
517
|
-
const config = cfg.mcp ?? {}
|
|
518
|
-
const s: State = {
|
|
519
|
-
status: {},
|
|
520
|
-
clients: {},
|
|
521
|
-
defs: {},
|
|
522
|
-
}
|
|
523
|
-
|
|
524
|
-
yield* Effect.forEach(
|
|
525
|
-
Object.entries(config),
|
|
526
|
-
([key, mcp]) =>
|
|
527
|
-
Effect.gen(function* () {
|
|
528
|
-
if (!isMcpConfigured(mcp)) {
|
|
529
|
-
log.error("Ignoring MCP config entry without type", { key })
|
|
530
|
-
return
|
|
531
|
-
}
|
|
532
|
-
|
|
533
|
-
if (mcp.enabled === false) {
|
|
534
|
-
s.status[key] = { status: "disabled" }
|
|
535
|
-
return
|
|
536
|
-
}
|
|
537
|
-
|
|
538
|
-
const result = yield* create(key, mcp).pipe(Effect.catch(() => Effect.void))
|
|
539
|
-
if (!result) return
|
|
540
|
-
|
|
541
|
-
s.status[key] = result.status
|
|
542
|
-
if (result.mcpClient) {
|
|
543
|
-
s.clients[key] = result.mcpClient
|
|
544
|
-
s.defs[key] = result.defs!
|
|
545
|
-
watch(s, key, result.mcpClient, bridge, mcp.timeout)
|
|
546
|
-
}
|
|
547
|
-
}),
|
|
548
|
-
{ concurrency: "unbounded" },
|
|
549
|
-
)
|
|
550
|
-
|
|
551
|
-
yield* Effect.addFinalizer(() =>
|
|
552
|
-
Effect.gen(function* () {
|
|
553
|
-
yield* Effect.forEach(
|
|
554
|
-
Object.values(s.clients),
|
|
555
|
-
(client) =>
|
|
556
|
-
Effect.gen(function* () {
|
|
557
|
-
const pid = client.transport instanceof StdioClientTransport ? client.transport.pid : null
|
|
558
|
-
if (typeof pid === "number") {
|
|
559
|
-
const pids = yield* descendants(pid)
|
|
560
|
-
for (const dpid of pids) {
|
|
561
|
-
try {
|
|
562
|
-
process.kill(dpid, "SIGTERM")
|
|
563
|
-
} catch {}
|
|
564
|
-
}
|
|
565
|
-
}
|
|
566
|
-
yield* Effect.tryPromise(() => client.close()).pipe(Effect.ignore)
|
|
567
|
-
}),
|
|
568
|
-
{ concurrency: "unbounded" },
|
|
569
|
-
)
|
|
570
|
-
pendingOAuthTransports.clear()
|
|
571
|
-
}),
|
|
572
|
-
)
|
|
573
|
-
|
|
574
|
-
return s
|
|
575
|
-
}),
|
|
576
|
-
)
|
|
577
|
-
|
|
578
|
-
function closeClient(s: State, name: string) {
|
|
579
|
-
const client = s.clients[name]
|
|
580
|
-
delete s.defs[name]
|
|
581
|
-
if (!client) return Effect.void
|
|
582
|
-
return Effect.tryPromise(() => client.close()).pipe(Effect.ignore)
|
|
583
|
-
}
|
|
584
|
-
|
|
585
|
-
const storeClient = Effect.fnUntraced(function* (
|
|
586
|
-
s: State,
|
|
587
|
-
name: string,
|
|
588
|
-
client: MCPClient,
|
|
589
|
-
listed: MCPToolDef[],
|
|
590
|
-
timeout?: number,
|
|
591
|
-
) {
|
|
592
|
-
const bridge = yield* EffectBridge.make()
|
|
593
|
-
yield* closeClient(s, name)
|
|
594
|
-
s.status[name] = { status: "connected" }
|
|
595
|
-
s.clients[name] = client
|
|
596
|
-
s.defs[name] = listed
|
|
597
|
-
watch(s, name, client, bridge, timeout)
|
|
598
|
-
return s.status[name]
|
|
599
|
-
})
|
|
600
|
-
|
|
601
|
-
const status = Effect.fn("MCP.status")(function* () {
|
|
602
|
-
const s = yield* InstanceState.get(state)
|
|
603
|
-
|
|
604
|
-
const cfg = yield* cfgSvc.get()
|
|
605
|
-
const config = cfg.mcp ?? {}
|
|
606
|
-
const result: Record<string, Status> = {}
|
|
607
|
-
|
|
608
|
-
for (const [key, mcp] of Object.entries(config)) {
|
|
609
|
-
if (!isMcpConfigured(mcp)) continue
|
|
610
|
-
result[key] = s.status[key] ?? { status: "disabled" }
|
|
611
|
-
}
|
|
612
|
-
|
|
613
|
-
return result
|
|
614
|
-
})
|
|
615
|
-
|
|
616
|
-
const clients = Effect.fn("MCP.clients")(function* () {
|
|
617
|
-
const s = yield* InstanceState.get(state)
|
|
618
|
-
return s.clients
|
|
619
|
-
})
|
|
620
|
-
|
|
621
|
-
const createAndStore = Effect.fn("MCP.createAndStore")(function* (name: string, mcp: ConfigMCP.Info) {
|
|
622
|
-
const s = yield* InstanceState.get(state)
|
|
623
|
-
const result = yield* create(name, mcp)
|
|
624
|
-
|
|
625
|
-
s.status[name] = result.status
|
|
626
|
-
if (!result.mcpClient) {
|
|
627
|
-
yield* closeClient(s, name)
|
|
628
|
-
delete s.clients[name]
|
|
629
|
-
return result.status
|
|
630
|
-
}
|
|
631
|
-
|
|
632
|
-
return yield* storeClient(s, name, result.mcpClient, result.defs!, mcp.timeout)
|
|
633
|
-
})
|
|
634
|
-
|
|
635
|
-
const add = Effect.fn("MCP.add")(function* (name: string, mcp: ConfigMCP.Info) {
|
|
636
|
-
yield* createAndStore(name, mcp)
|
|
637
|
-
const s = yield* InstanceState.get(state)
|
|
638
|
-
return { status: s.status }
|
|
639
|
-
})
|
|
640
|
-
|
|
641
|
-
const connect = Effect.fn("MCP.connect")(function* (name: string) {
|
|
642
|
-
const mcp = yield* getMcpConfig(name)
|
|
643
|
-
if (!mcp) {
|
|
644
|
-
log.error("MCP config not found or invalid", { name })
|
|
645
|
-
return
|
|
646
|
-
}
|
|
647
|
-
yield* createAndStore(name, { ...mcp, enabled: true })
|
|
648
|
-
})
|
|
649
|
-
|
|
650
|
-
const disconnect = Effect.fn("MCP.disconnect")(function* (name: string) {
|
|
651
|
-
const s = yield* InstanceState.get(state)
|
|
652
|
-
yield* closeClient(s, name)
|
|
653
|
-
delete s.clients[name]
|
|
654
|
-
s.status[name] = { status: "disabled" }
|
|
655
|
-
})
|
|
656
|
-
|
|
657
|
-
const tools = Effect.fn("MCP.tools")(function* () {
|
|
658
|
-
const result: Record<string, Tool> = {}
|
|
659
|
-
const s = yield* InstanceState.get(state)
|
|
660
|
-
|
|
661
|
-
const cfg = yield* cfgSvc.get()
|
|
662
|
-
const config = cfg.mcp ?? {}
|
|
663
|
-
const defaultTimeout = cfg.experimental?.mcp_timeout
|
|
664
|
-
|
|
665
|
-
const connectedClients = Object.entries(s.clients).filter(
|
|
666
|
-
([clientName]) => s.status[clientName]?.status === "connected",
|
|
667
|
-
)
|
|
668
|
-
|
|
669
|
-
yield* Effect.forEach(
|
|
670
|
-
connectedClients,
|
|
671
|
-
([clientName, client]) =>
|
|
672
|
-
Effect.gen(function* () {
|
|
673
|
-
const mcpConfig = config[clientName]
|
|
674
|
-
const entry = mcpConfig && isMcpConfigured(mcpConfig) ? mcpConfig : undefined
|
|
675
|
-
|
|
676
|
-
const listed = s.defs[clientName]
|
|
677
|
-
if (!listed) {
|
|
678
|
-
log.warn("missing cached tools for connected server", { clientName })
|
|
679
|
-
return
|
|
680
|
-
}
|
|
681
|
-
|
|
682
|
-
const timeout = entry?.timeout ?? defaultTimeout
|
|
683
|
-
for (const mcpTool of listed) {
|
|
684
|
-
result[sanitize(clientName) + "_" + sanitize(mcpTool.name)] = convertMcpTool(mcpTool, client, timeout)
|
|
685
|
-
}
|
|
686
|
-
}),
|
|
687
|
-
{ concurrency: "unbounded" },
|
|
688
|
-
)
|
|
689
|
-
return result
|
|
690
|
-
})
|
|
691
|
-
|
|
692
|
-
function collectFromConnected<T extends { name: string }>(
|
|
693
|
-
s: State,
|
|
694
|
-
listFn: (c: Client) => Promise<T[]>,
|
|
695
|
-
label: string,
|
|
696
|
-
) {
|
|
697
|
-
return Effect.forEach(
|
|
698
|
-
Object.entries(s.clients).filter(([name]) => s.status[name]?.status === "connected"),
|
|
699
|
-
([clientName, client]) =>
|
|
700
|
-
fetchFromClient(clientName, client, listFn, label).pipe(Effect.map((items) => Object.entries(items ?? {}))),
|
|
701
|
-
{ concurrency: "unbounded" },
|
|
702
|
-
).pipe(Effect.map((results) => Object.fromEntries<T & { client: string }>(results.flat())))
|
|
703
|
-
}
|
|
704
|
-
|
|
705
|
-
const prompts = Effect.fn("MCP.prompts")(function* () {
|
|
706
|
-
const s = yield* InstanceState.get(state)
|
|
707
|
-
return yield* collectFromConnected(s, (c) => c.listPrompts().then((r) => r.prompts), "prompts")
|
|
708
|
-
})
|
|
709
|
-
|
|
710
|
-
const resources = Effect.fn("MCP.resources")(function* () {
|
|
711
|
-
const s = yield* InstanceState.get(state)
|
|
712
|
-
return yield* collectFromConnected(s, (c) => c.listResources().then((r) => r.resources), "resources")
|
|
713
|
-
})
|
|
714
|
-
|
|
715
|
-
const withClient = Effect.fnUntraced(function* <A>(
|
|
716
|
-
clientName: string,
|
|
717
|
-
fn: (client: MCPClient) => Promise<A>,
|
|
718
|
-
label: string,
|
|
719
|
-
meta?: Record<string, unknown>,
|
|
720
|
-
) {
|
|
721
|
-
const s = yield* InstanceState.get(state)
|
|
722
|
-
const client = s.clients[clientName]
|
|
723
|
-
if (!client) {
|
|
724
|
-
log.warn(`client not found for ${label}`, { clientName })
|
|
725
|
-
return undefined
|
|
726
|
-
}
|
|
727
|
-
return yield* Effect.tryPromise({
|
|
728
|
-
try: () => fn(client),
|
|
729
|
-
catch: (e: any) => {
|
|
730
|
-
log.error(`failed to ${label}`, { clientName, ...meta, error: e?.message })
|
|
731
|
-
return e
|
|
732
|
-
},
|
|
733
|
-
}).pipe(Effect.orElseSucceed(() => undefined))
|
|
734
|
-
})
|
|
735
|
-
|
|
736
|
-
const getPrompt = Effect.fn("MCP.getPrompt")(function* (
|
|
737
|
-
clientName: string,
|
|
738
|
-
name: string,
|
|
739
|
-
args?: Record<string, string>,
|
|
740
|
-
) {
|
|
741
|
-
return yield* withClient(clientName, (client) => client.getPrompt({ name, arguments: args }), "getPrompt", {
|
|
742
|
-
promptName: name,
|
|
743
|
-
})
|
|
744
|
-
})
|
|
745
|
-
|
|
746
|
-
const readResource = Effect.fn("MCP.readResource")(function* (clientName: string, resourceUri: string) {
|
|
747
|
-
return yield* withClient(clientName, (client) => client.readResource({ uri: resourceUri }), "readResource", {
|
|
748
|
-
resourceUri,
|
|
749
|
-
})
|
|
750
|
-
})
|
|
751
|
-
|
|
752
|
-
const getMcpConfig = Effect.fnUntraced(function* (mcpName: string) {
|
|
753
|
-
const cfg = yield* cfgSvc.get()
|
|
754
|
-
const mcpConfig = cfg.mcp?.[mcpName]
|
|
755
|
-
if (!mcpConfig || !isMcpConfigured(mcpConfig)) return undefined
|
|
756
|
-
return mcpConfig
|
|
757
|
-
})
|
|
758
|
-
|
|
759
|
-
const startAuth = Effect.fn("MCP.startAuth")(function* (mcpName: string) {
|
|
760
|
-
const mcpConfig = yield* getMcpConfig(mcpName)
|
|
761
|
-
if (!mcpConfig) throw new Error(`MCP server ${mcpName} not found or disabled`)
|
|
762
|
-
if (mcpConfig.type !== "remote") throw new Error(`MCP server ${mcpName} is not a remote server`)
|
|
763
|
-
if (mcpConfig.oauth === false) throw new Error(`MCP server ${mcpName} has OAuth explicitly disabled`)
|
|
764
|
-
const url = remoteURL(mcpName, mcpConfig.url)
|
|
765
|
-
if (!url) throw new Error(`Invalid MCP URL for "${mcpName}"`)
|
|
766
|
-
|
|
767
|
-
// OAuth config is optional - if not provided, we'll use auto-discovery
|
|
768
|
-
const oauthConfig = typeof mcpConfig.oauth === "object" ? mcpConfig.oauth : undefined
|
|
769
|
-
|
|
770
|
-
// Start the callback server with custom redirectUri if configured
|
|
771
|
-
yield* Effect.promise(() => McpOAuthCallback.ensureRunning(oauthConfig?.redirectUri))
|
|
772
|
-
|
|
773
|
-
const oauthState = Array.from(crypto.getRandomValues(new Uint8Array(32)))
|
|
774
|
-
.map((b) => b.toString(16).padStart(2, "0"))
|
|
775
|
-
.join("")
|
|
776
|
-
yield* auth.updateOAuthState(mcpName, oauthState)
|
|
777
|
-
let capturedUrl: URL | undefined
|
|
778
|
-
const authProvider = new McpOAuthProvider(
|
|
779
|
-
mcpName,
|
|
780
|
-
mcpConfig.url,
|
|
781
|
-
{
|
|
782
|
-
clientId: oauthConfig?.clientId,
|
|
783
|
-
clientSecret: oauthConfig?.clientSecret,
|
|
784
|
-
scope: oauthConfig?.scope,
|
|
785
|
-
redirectUri: oauthConfig?.redirectUri,
|
|
786
|
-
},
|
|
787
|
-
{
|
|
788
|
-
onRedirect: async (url) => {
|
|
789
|
-
capturedUrl = url
|
|
790
|
-
},
|
|
791
|
-
},
|
|
792
|
-
auth,
|
|
793
|
-
)
|
|
794
|
-
|
|
795
|
-
const transport = new StreamableHTTPClientTransport(url, { authProvider })
|
|
796
|
-
|
|
797
|
-
return yield* Effect.tryPromise({
|
|
798
|
-
try: () => {
|
|
799
|
-
const client = new Client({ name: "opencode", version: InstallationVersion })
|
|
800
|
-
return client
|
|
801
|
-
.connect(transport)
|
|
802
|
-
.then(() => ({ authorizationUrl: "", oauthState, client }) satisfies AuthResult)
|
|
803
|
-
},
|
|
804
|
-
catch: (error) => error,
|
|
805
|
-
}).pipe(
|
|
806
|
-
Effect.catch((error) => {
|
|
807
|
-
if (error instanceof UnauthorizedError && capturedUrl) {
|
|
808
|
-
pendingOAuthTransports.set(mcpName, transport)
|
|
809
|
-
return Effect.succeed({ authorizationUrl: capturedUrl.toString(), oauthState } satisfies AuthResult)
|
|
810
|
-
}
|
|
811
|
-
return Effect.die(error)
|
|
812
|
-
}),
|
|
813
|
-
)
|
|
814
|
-
})
|
|
815
|
-
|
|
816
|
-
const authenticate = Effect.fn("MCP.authenticate")(function* (mcpName: string) {
|
|
817
|
-
const result = yield* startAuth(mcpName)
|
|
818
|
-
if (!result.authorizationUrl) {
|
|
819
|
-
const client = "client" in result ? result.client : undefined
|
|
820
|
-
const mcpConfig = yield* getMcpConfig(mcpName)
|
|
821
|
-
if (!mcpConfig) {
|
|
822
|
-
yield* Effect.tryPromise(() => client?.close() ?? Promise.resolve()).pipe(Effect.ignore)
|
|
823
|
-
return { status: "failed", error: "MCP config not found after auth" } as Status
|
|
824
|
-
}
|
|
825
|
-
|
|
826
|
-
const listed = client ? yield* defs(mcpName, client, mcpConfig.timeout) : undefined
|
|
827
|
-
if (!client || !listed) {
|
|
828
|
-
yield* Effect.tryPromise(() => client?.close() ?? Promise.resolve()).pipe(Effect.ignore)
|
|
829
|
-
return { status: "failed", error: "Failed to get tools" } as Status
|
|
830
|
-
}
|
|
831
|
-
|
|
832
|
-
const s = yield* InstanceState.get(state)
|
|
833
|
-
yield* auth.clearOAuthState(mcpName)
|
|
834
|
-
return yield* storeClient(s, mcpName, client, listed, mcpConfig.timeout)
|
|
835
|
-
}
|
|
836
|
-
|
|
837
|
-
log.info("opening browser for oauth", { mcpName, url: result.authorizationUrl, state: result.oauthState })
|
|
838
|
-
|
|
839
|
-
const callbackPromise = McpOAuthCallback.waitForCallback(result.oauthState, mcpName)
|
|
840
|
-
|
|
841
|
-
yield* Effect.tryPromise(() => open(result.authorizationUrl)).pipe(
|
|
842
|
-
Effect.flatMap((subprocess) =>
|
|
843
|
-
Effect.callback<void, Error>((resume) => {
|
|
844
|
-
const timer = setTimeout(() => resume(Effect.void), 500)
|
|
845
|
-
subprocess.on("error", (err) => {
|
|
846
|
-
clearTimeout(timer)
|
|
847
|
-
resume(Effect.fail(err))
|
|
848
|
-
})
|
|
849
|
-
subprocess.on("exit", (code) => {
|
|
850
|
-
if (code !== null && code !== 0) {
|
|
851
|
-
clearTimeout(timer)
|
|
852
|
-
resume(Effect.fail(new Error(`Browser open failed with exit code ${code}`)))
|
|
853
|
-
}
|
|
854
|
-
})
|
|
855
|
-
}),
|
|
856
|
-
),
|
|
857
|
-
Effect.catch(() => {
|
|
858
|
-
log.warn("failed to open browser, user must open URL manually", { mcpName })
|
|
859
|
-
return bus.publish(BrowserOpenFailed, { mcpName, url: result.authorizationUrl }).pipe(Effect.ignore)
|
|
860
|
-
}),
|
|
861
|
-
)
|
|
862
|
-
|
|
863
|
-
const code = yield* Effect.promise(() => callbackPromise)
|
|
864
|
-
|
|
865
|
-
const storedState = yield* auth.getOAuthState(mcpName)
|
|
866
|
-
if (storedState !== result.oauthState) {
|
|
867
|
-
yield* auth.clearOAuthState(mcpName)
|
|
868
|
-
throw new Error("OAuth state mismatch - potential CSRF attack")
|
|
869
|
-
}
|
|
870
|
-
yield* auth.clearOAuthState(mcpName)
|
|
871
|
-
return yield* finishAuth(mcpName, code)
|
|
872
|
-
})
|
|
873
|
-
|
|
874
|
-
const finishAuth = Effect.fn("MCP.finishAuth")(function* (mcpName: string, authorizationCode: string) {
|
|
875
|
-
const transport = pendingOAuthTransports.get(mcpName)
|
|
876
|
-
if (!transport) throw new Error(`No pending OAuth flow for MCP server: ${mcpName}`)
|
|
877
|
-
|
|
878
|
-
const result = yield* Effect.tryPromise({
|
|
879
|
-
try: () => transport.finishAuth(authorizationCode).then(() => true as const),
|
|
880
|
-
catch: (error) => {
|
|
881
|
-
log.error("failed to finish oauth", { mcpName, error })
|
|
882
|
-
return error
|
|
883
|
-
},
|
|
884
|
-
}).pipe(Effect.option)
|
|
885
|
-
|
|
886
|
-
if (Option.isNone(result)) {
|
|
887
|
-
return { status: "failed", error: "OAuth completion failed" } as Status
|
|
888
|
-
}
|
|
889
|
-
|
|
890
|
-
yield* auth.clearCodeVerifier(mcpName)
|
|
891
|
-
pendingOAuthTransports.delete(mcpName)
|
|
892
|
-
|
|
893
|
-
const mcpConfig = yield* getMcpConfig(mcpName)
|
|
894
|
-
if (!mcpConfig) return { status: "failed", error: "MCP config not found after auth" } as Status
|
|
895
|
-
|
|
896
|
-
return yield* createAndStore(mcpName, mcpConfig)
|
|
897
|
-
})
|
|
898
|
-
|
|
899
|
-
const removeAuth = Effect.fn("MCP.removeAuth")(function* (mcpName: string) {
|
|
900
|
-
yield* auth.remove(mcpName)
|
|
901
|
-
McpOAuthCallback.cancelPending(mcpName)
|
|
902
|
-
pendingOAuthTransports.delete(mcpName)
|
|
903
|
-
log.info("removed oauth credentials", { mcpName })
|
|
904
|
-
})
|
|
905
|
-
|
|
906
|
-
const supportsOAuth = Effect.fn("MCP.supportsOAuth")(function* (mcpName: string) {
|
|
907
|
-
const mcpConfig = yield* getMcpConfig(mcpName)
|
|
908
|
-
if (!mcpConfig) return false
|
|
909
|
-
return mcpConfig.type === "remote" && mcpConfig.oauth !== false
|
|
910
|
-
})
|
|
911
|
-
|
|
912
|
-
const hasStoredTokens = Effect.fn("MCP.hasStoredTokens")(function* (mcpName: string) {
|
|
913
|
-
const entry = yield* auth.get(mcpName)
|
|
914
|
-
return !!entry?.tokens
|
|
915
|
-
})
|
|
916
|
-
|
|
917
|
-
const getAuthStatus = Effect.fn("MCP.getAuthStatus")(function* (mcpName: string) {
|
|
918
|
-
const entry = yield* auth.get(mcpName)
|
|
919
|
-
if (!entry?.tokens) return "not_authenticated" as AuthStatus
|
|
920
|
-
const expired = yield* auth.isTokenExpired(mcpName)
|
|
921
|
-
return (expired ? "expired" : "authenticated") as AuthStatus
|
|
922
|
-
})
|
|
923
|
-
|
|
924
|
-
return Service.of({
|
|
925
|
-
status,
|
|
926
|
-
clients,
|
|
927
|
-
tools,
|
|
928
|
-
prompts,
|
|
929
|
-
resources,
|
|
930
|
-
add,
|
|
931
|
-
connect,
|
|
932
|
-
disconnect,
|
|
933
|
-
getPrompt,
|
|
934
|
-
readResource,
|
|
935
|
-
startAuth,
|
|
936
|
-
authenticate,
|
|
937
|
-
finishAuth,
|
|
938
|
-
removeAuth,
|
|
939
|
-
supportsOAuth,
|
|
940
|
-
hasStoredTokens,
|
|
941
|
-
getAuthStatus,
|
|
942
|
-
})
|
|
943
|
-
}),
|
|
944
|
-
)
|
|
945
|
-
|
|
946
|
-
export type AuthStatus = "authenticated" | "expired" | "not_authenticated"
|
|
947
|
-
|
|
948
|
-
// --- Per-service runtime ---
|
|
949
|
-
|
|
950
|
-
export const defaultLayer = layer.pipe(
|
|
951
|
-
Layer.provide(McpAuth.layer),
|
|
952
|
-
Layer.provide(Bus.layer),
|
|
953
|
-
Layer.provide(Config.defaultLayer),
|
|
954
|
-
Layer.provide(CrossSpawnSpawner.defaultLayer),
|
|
955
|
-
Layer.provide(AppFileSystem.defaultLayer),
|
|
956
|
-
)
|
|
957
|
-
|
|
958
|
-
export * as MCP from "."
|
|
1
|
+
import { dynamicTool, type Tool, jsonSchema, type JSONSchema7 } from "ai"
|
|
2
|
+
import { Client } from "@modelcontextprotocol/sdk/client/index.js"
|
|
3
|
+
import { StreamableHTTPClientTransport } from "@modelcontextprotocol/sdk/client/streamableHttp.js"
|
|
4
|
+
import { SSEClientTransport } from "@modelcontextprotocol/sdk/client/sse.js"
|
|
5
|
+
import { StdioClientTransport } from "@modelcontextprotocol/sdk/client/stdio.js"
|
|
6
|
+
import { UnauthorizedError } from "@modelcontextprotocol/sdk/client/auth.js"
|
|
7
|
+
import {
|
|
8
|
+
CallToolResultSchema,
|
|
9
|
+
ListToolsResultSchema,
|
|
10
|
+
ToolSchema,
|
|
11
|
+
type Tool as MCPToolDef,
|
|
12
|
+
ToolListChangedNotificationSchema,
|
|
13
|
+
} from "@modelcontextprotocol/sdk/types.js"
|
|
14
|
+
import { Config } from "@/config/config"
|
|
15
|
+
import { ConfigMCP } from "../config/mcp"
|
|
16
|
+
import * as Log from "@opencode-ai/core/util/log"
|
|
17
|
+
import { NamedError } from "@opencode-ai/core/util/error"
|
|
18
|
+
import { Installation } from "../installation"
|
|
19
|
+
import { InstallationVersion } from "@opencode-ai/core/installation/version"
|
|
20
|
+
import { withTimeout } from "@/util/timeout"
|
|
21
|
+
import { AppFileSystem } from "@opencode-ai/core/filesystem"
|
|
22
|
+
import { McpOAuthProvider } from "./oauth-provider"
|
|
23
|
+
import { McpOAuthCallback } from "./oauth-callback"
|
|
24
|
+
import { McpAuth } from "./auth"
|
|
25
|
+
import { BusEvent } from "../bus/bus-event"
|
|
26
|
+
import { Bus } from "@/bus"
|
|
27
|
+
import { TuiEvent } from "@/cli/cmd/tui/event"
|
|
28
|
+
import open from "open"
|
|
29
|
+
import { Effect, Exit, Layer, Option, Context, Schema, Stream } from "effect"
|
|
30
|
+
import { EffectBridge } from "@/effect/bridge"
|
|
31
|
+
import { InstanceState } from "@/effect/instance-state"
|
|
32
|
+
import { ChildProcess, ChildProcessSpawner } from "effect/unstable/process"
|
|
33
|
+
import { CrossSpawnSpawner } from "@opencode-ai/core/cross-spawn-spawner"
|
|
34
|
+
|
|
35
|
+
const log = Log.create({ service: "mcp" })
|
|
36
|
+
const DEFAULT_TIMEOUT = 30_000
|
|
37
|
+
|
|
38
|
+
const TolerantListToolsResultSchema = ListToolsResultSchema.extend({
|
|
39
|
+
tools: ToolSchema.omit({ outputSchema: true }).array(),
|
|
40
|
+
})
|
|
41
|
+
|
|
42
|
+
export const Resource = Schema.Struct({
|
|
43
|
+
name: Schema.String,
|
|
44
|
+
uri: Schema.String,
|
|
45
|
+
description: Schema.optional(Schema.String),
|
|
46
|
+
mimeType: Schema.optional(Schema.String),
|
|
47
|
+
client: Schema.String,
|
|
48
|
+
}).annotate({ identifier: "McpResource" })
|
|
49
|
+
export type Resource = Schema.Schema.Type<typeof Resource>
|
|
50
|
+
|
|
51
|
+
export const ToolsChanged = BusEvent.define(
|
|
52
|
+
"mcp.tools.changed",
|
|
53
|
+
Schema.Struct({
|
|
54
|
+
server: Schema.String,
|
|
55
|
+
}),
|
|
56
|
+
)
|
|
57
|
+
|
|
58
|
+
export const BrowserOpenFailed = BusEvent.define(
|
|
59
|
+
"mcp.browser.open.failed",
|
|
60
|
+
Schema.Struct({
|
|
61
|
+
mcpName: Schema.String,
|
|
62
|
+
url: Schema.String,
|
|
63
|
+
}),
|
|
64
|
+
)
|
|
65
|
+
|
|
66
|
+
export const Failed = NamedError.create("MCPFailed", {
|
|
67
|
+
name: Schema.String,
|
|
68
|
+
})
|
|
69
|
+
|
|
70
|
+
type MCPClient = Client
|
|
71
|
+
|
|
72
|
+
const StatusConnected = Schema.Struct({ status: Schema.Literal("connected") }).annotate({
|
|
73
|
+
identifier: "MCPStatusConnected",
|
|
74
|
+
})
|
|
75
|
+
const StatusDisabled = Schema.Struct({ status: Schema.Literal("disabled") }).annotate({
|
|
76
|
+
identifier: "MCPStatusDisabled",
|
|
77
|
+
})
|
|
78
|
+
const StatusFailed = Schema.Struct({ status: Schema.Literal("failed"), error: Schema.String }).annotate({
|
|
79
|
+
identifier: "MCPStatusFailed",
|
|
80
|
+
})
|
|
81
|
+
const StatusNeedsAuth = Schema.Struct({ status: Schema.Literal("needs_auth") }).annotate({
|
|
82
|
+
identifier: "MCPStatusNeedsAuth",
|
|
83
|
+
})
|
|
84
|
+
const StatusNeedsClientRegistration = Schema.Struct({
|
|
85
|
+
status: Schema.Literal("needs_client_registration"),
|
|
86
|
+
error: Schema.String,
|
|
87
|
+
}).annotate({ identifier: "MCPStatusNeedsClientRegistration" })
|
|
88
|
+
|
|
89
|
+
export const Status = Schema.Union([
|
|
90
|
+
StatusConnected,
|
|
91
|
+
StatusDisabled,
|
|
92
|
+
StatusFailed,
|
|
93
|
+
StatusNeedsAuth,
|
|
94
|
+
StatusNeedsClientRegistration,
|
|
95
|
+
]).annotate({ identifier: "MCPStatus", discriminator: "status" })
|
|
96
|
+
export type Status = Schema.Schema.Type<typeof Status>
|
|
97
|
+
|
|
98
|
+
// Store transports for OAuth servers to allow finishing auth
|
|
99
|
+
type TransportWithAuth = StreamableHTTPClientTransport | SSEClientTransport
|
|
100
|
+
const pendingOAuthTransports = new Map<string, TransportWithAuth>()
|
|
101
|
+
|
|
102
|
+
// Prompt cache types
|
|
103
|
+
type PromptInfo = Awaited<ReturnType<MCPClient["listPrompts"]>>["prompts"][number]
|
|
104
|
+
type ResourceInfo = Awaited<ReturnType<MCPClient["listResources"]>>["resources"][number]
|
|
105
|
+
type McpEntry = NonNullable<Config.Info["mcp"]>[string]
|
|
106
|
+
|
|
107
|
+
function isMcpConfigured(entry: McpEntry): entry is ConfigMCP.Info {
|
|
108
|
+
return typeof entry === "object" && entry !== null && "type" in entry
|
|
109
|
+
}
|
|
110
|
+
|
|
111
|
+
const sanitize = (s: string) => s.replace(/[^a-zA-Z0-9_-]/g, "_")
|
|
112
|
+
|
|
113
|
+
function remoteURL(key: string, value: string) {
|
|
114
|
+
if (URL.canParse(value)) return new URL(value)
|
|
115
|
+
log.warn("invalid remote mcp url", { key })
|
|
116
|
+
}
|
|
117
|
+
|
|
118
|
+
function isOutputSchemaValidationError(error: Error) {
|
|
119
|
+
return /can't resolve reference|resolves to more than one schema|outputSchema|schema.*reference|reference.*schema/i.test(
|
|
120
|
+
error.message,
|
|
121
|
+
)
|
|
122
|
+
}
|
|
123
|
+
|
|
124
|
+
function listTools(key: string, client: MCPClient, timeout: number) {
|
|
125
|
+
return Effect.tryPromise({
|
|
126
|
+
try: () => client.listTools(undefined, { timeout }),
|
|
127
|
+
catch: (err) => (err instanceof Error ? err : new Error(String(err))),
|
|
128
|
+
}).pipe(
|
|
129
|
+
Effect.map((result) => result.tools),
|
|
130
|
+
Effect.catch((error) => {
|
|
131
|
+
if (!isOutputSchemaValidationError(error)) return Effect.fail(error)
|
|
132
|
+
|
|
133
|
+
log.warn("failed to validate MCP tool output schemas, retrying without output schema validation", { key, error })
|
|
134
|
+
return Effect.tryPromise({
|
|
135
|
+
try: () =>
|
|
136
|
+
client.request({ method: "tools/list" }, TolerantListToolsResultSchema, {
|
|
137
|
+
timeout,
|
|
138
|
+
}),
|
|
139
|
+
catch: (err) => (err instanceof Error ? err : new Error(String(err))),
|
|
140
|
+
}).pipe(
|
|
141
|
+
Effect.map((result) =>
|
|
142
|
+
result.tools.map((tool) => ({
|
|
143
|
+
name: tool.name,
|
|
144
|
+
description: tool.description,
|
|
145
|
+
inputSchema: tool.inputSchema,
|
|
146
|
+
})),
|
|
147
|
+
),
|
|
148
|
+
)
|
|
149
|
+
}),
|
|
150
|
+
)
|
|
151
|
+
}
|
|
152
|
+
|
|
153
|
+
// Convert MCP tool definition to AI SDK Tool type
|
|
154
|
+
function convertMcpTool(mcpTool: MCPToolDef, client: MCPClient, timeout?: number): Tool {
|
|
155
|
+
const inputSchema = mcpTool.inputSchema
|
|
156
|
+
|
|
157
|
+
// Spread first, then override type to ensure it's always "object"
|
|
158
|
+
const schema: JSONSchema7 = {
|
|
159
|
+
...(inputSchema as JSONSchema7),
|
|
160
|
+
type: "object",
|
|
161
|
+
properties: (inputSchema.properties ?? {}) as JSONSchema7["properties"],
|
|
162
|
+
additionalProperties: false,
|
|
163
|
+
}
|
|
164
|
+
|
|
165
|
+
return dynamicTool({
|
|
166
|
+
description: mcpTool.description ?? "",
|
|
167
|
+
inputSchema: jsonSchema(schema),
|
|
168
|
+
execute: async (args: unknown) => {
|
|
169
|
+
return client.callTool(
|
|
170
|
+
{
|
|
171
|
+
name: mcpTool.name,
|
|
172
|
+
arguments: (args || {}) as Record<string, unknown>,
|
|
173
|
+
},
|
|
174
|
+
CallToolResultSchema,
|
|
175
|
+
{
|
|
176
|
+
resetTimeoutOnProgress: true,
|
|
177
|
+
timeout,
|
|
178
|
+
},
|
|
179
|
+
)
|
|
180
|
+
},
|
|
181
|
+
})
|
|
182
|
+
}
|
|
183
|
+
|
|
184
|
+
function defs(key: string, client: MCPClient, timeout?: number) {
|
|
185
|
+
return listTools(key, client, timeout ?? DEFAULT_TIMEOUT).pipe(
|
|
186
|
+
Effect.catch((err) => {
|
|
187
|
+
log.error("failed to get tools from client", { key, error: err })
|
|
188
|
+
return Effect.succeed(undefined)
|
|
189
|
+
}),
|
|
190
|
+
)
|
|
191
|
+
}
|
|
192
|
+
|
|
193
|
+
function fetchFromClient<T extends { name: string }>(
|
|
194
|
+
clientName: string,
|
|
195
|
+
client: Client,
|
|
196
|
+
listFn: (c: Client) => Promise<T[]>,
|
|
197
|
+
label: string,
|
|
198
|
+
) {
|
|
199
|
+
return Effect.tryPromise({
|
|
200
|
+
try: () => listFn(client),
|
|
201
|
+
catch: (e: any) => {
|
|
202
|
+
log.error(`failed to get ${label}`, { clientName, error: e.message })
|
|
203
|
+
return e
|
|
204
|
+
},
|
|
205
|
+
}).pipe(
|
|
206
|
+
Effect.map((items) => {
|
|
207
|
+
const out: Record<string, T & { client: string }> = {}
|
|
208
|
+
const sanitizedClient = sanitize(clientName)
|
|
209
|
+
for (const item of items) {
|
|
210
|
+
out[sanitizedClient + ":" + sanitize(item.name)] = { ...item, client: clientName }
|
|
211
|
+
}
|
|
212
|
+
return out
|
|
213
|
+
}),
|
|
214
|
+
Effect.orElseSucceed(() => undefined),
|
|
215
|
+
)
|
|
216
|
+
}
|
|
217
|
+
|
|
218
|
+
interface CreateResult {
|
|
219
|
+
mcpClient?: MCPClient
|
|
220
|
+
status: Status
|
|
221
|
+
defs?: MCPToolDef[]
|
|
222
|
+
}
|
|
223
|
+
|
|
224
|
+
interface AuthResult {
|
|
225
|
+
authorizationUrl: string
|
|
226
|
+
oauthState: string
|
|
227
|
+
client?: MCPClient
|
|
228
|
+
}
|
|
229
|
+
|
|
230
|
+
// --- Effect Service ---
|
|
231
|
+
|
|
232
|
+
interface State {
|
|
233
|
+
status: Record<string, Status>
|
|
234
|
+
clients: Record<string, MCPClient>
|
|
235
|
+
defs: Record<string, MCPToolDef[]>
|
|
236
|
+
}
|
|
237
|
+
|
|
238
|
+
export interface Interface {
|
|
239
|
+
readonly status: () => Effect.Effect<Record<string, Status>>
|
|
240
|
+
readonly clients: () => Effect.Effect<Record<string, MCPClient>>
|
|
241
|
+
readonly tools: () => Effect.Effect<Record<string, Tool>>
|
|
242
|
+
readonly prompts: () => Effect.Effect<Record<string, PromptInfo & { client: string }>>
|
|
243
|
+
readonly resources: () => Effect.Effect<Record<string, ResourceInfo & { client: string }>>
|
|
244
|
+
readonly add: (name: string, mcp: ConfigMCP.Info) => Effect.Effect<{ status: Record<string, Status> | Status }>
|
|
245
|
+
readonly connect: (name: string) => Effect.Effect<void>
|
|
246
|
+
readonly disconnect: (name: string) => Effect.Effect<void>
|
|
247
|
+
readonly getPrompt: (
|
|
248
|
+
clientName: string,
|
|
249
|
+
name: string,
|
|
250
|
+
args?: Record<string, string>,
|
|
251
|
+
) => Effect.Effect<Awaited<ReturnType<MCPClient["getPrompt"]>> | undefined>
|
|
252
|
+
readonly readResource: (
|
|
253
|
+
clientName: string,
|
|
254
|
+
resourceUri: string,
|
|
255
|
+
) => Effect.Effect<Awaited<ReturnType<MCPClient["readResource"]>> | undefined>
|
|
256
|
+
readonly startAuth: (mcpName: string) => Effect.Effect<{ authorizationUrl: string; oauthState: string }>
|
|
257
|
+
readonly authenticate: (mcpName: string) => Effect.Effect<Status>
|
|
258
|
+
readonly finishAuth: (mcpName: string, authorizationCode: string) => Effect.Effect<Status>
|
|
259
|
+
readonly removeAuth: (mcpName: string) => Effect.Effect<void>
|
|
260
|
+
readonly supportsOAuth: (mcpName: string) => Effect.Effect<boolean>
|
|
261
|
+
readonly hasStoredTokens: (mcpName: string) => Effect.Effect<boolean>
|
|
262
|
+
readonly getAuthStatus: (mcpName: string) => Effect.Effect<AuthStatus>
|
|
263
|
+
}
|
|
264
|
+
|
|
265
|
+
export class Service extends Context.Service<Service, Interface>()("@opencode/MCP") {}
|
|
266
|
+
|
|
267
|
+
export const layer = Layer.effect(
|
|
268
|
+
Service,
|
|
269
|
+
Effect.gen(function* () {
|
|
270
|
+
const spawner = yield* ChildProcessSpawner.ChildProcessSpawner
|
|
271
|
+
const auth = yield* McpAuth.Service
|
|
272
|
+
const bus = yield* Bus.Service
|
|
273
|
+
|
|
274
|
+
type Transport = StdioClientTransport | StreamableHTTPClientTransport | SSEClientTransport
|
|
275
|
+
|
|
276
|
+
/**
|
|
277
|
+
* Connect a client via the given transport with resource safety:
|
|
278
|
+
* on failure the transport is closed; on success the caller owns it.
|
|
279
|
+
*/
|
|
280
|
+
const connectTransport = (transport: Transport, timeout: number) =>
|
|
281
|
+
Effect.acquireUseRelease(
|
|
282
|
+
Effect.succeed(transport),
|
|
283
|
+
(t) =>
|
|
284
|
+
Effect.tryPromise({
|
|
285
|
+
try: () => {
|
|
286
|
+
const client = new Client({ name: "opencode", version: InstallationVersion })
|
|
287
|
+
return withTimeout(client.connect(t), timeout).then(() => client)
|
|
288
|
+
},
|
|
289
|
+
catch: (e) => (e instanceof Error ? e : new Error(String(e))),
|
|
290
|
+
}),
|
|
291
|
+
(t, exit) => (Exit.isFailure(exit) ? Effect.tryPromise(() => t.close()).pipe(Effect.ignore) : Effect.void),
|
|
292
|
+
)
|
|
293
|
+
|
|
294
|
+
const DISABLED_RESULT: CreateResult = { status: { status: "disabled" } }
|
|
295
|
+
|
|
296
|
+
const connectRemote = Effect.fn("MCP.connectRemote")(function* (
|
|
297
|
+
key: string,
|
|
298
|
+
mcp: ConfigMCP.Info & { type: "remote" },
|
|
299
|
+
) {
|
|
300
|
+
const oauthDisabled = mcp.oauth === false
|
|
301
|
+
const oauthConfig = typeof mcp.oauth === "object" ? mcp.oauth : undefined
|
|
302
|
+
const url = remoteURL(key, mcp.url)
|
|
303
|
+
if (!url) {
|
|
304
|
+
return {
|
|
305
|
+
client: undefined as MCPClient | undefined,
|
|
306
|
+
status: { status: "failed" as const, error: `Invalid MCP URL for "${key}"` },
|
|
307
|
+
}
|
|
308
|
+
}
|
|
309
|
+
let authProvider: McpOAuthProvider | undefined
|
|
310
|
+
|
|
311
|
+
if (!oauthDisabled) {
|
|
312
|
+
authProvider = new McpOAuthProvider(
|
|
313
|
+
key,
|
|
314
|
+
mcp.url,
|
|
315
|
+
{
|
|
316
|
+
clientId: oauthConfig?.clientId,
|
|
317
|
+
clientSecret: oauthConfig?.clientSecret,
|
|
318
|
+
scope: oauthConfig?.scope,
|
|
319
|
+
redirectUri: oauthConfig?.redirectUri,
|
|
320
|
+
},
|
|
321
|
+
{
|
|
322
|
+
onRedirect: async (url) => {
|
|
323
|
+
log.info("oauth redirect requested", { key, url: url.toString() })
|
|
324
|
+
},
|
|
325
|
+
},
|
|
326
|
+
auth,
|
|
327
|
+
)
|
|
328
|
+
}
|
|
329
|
+
|
|
330
|
+
const transports: Array<{ name: string; transport: TransportWithAuth }> = [
|
|
331
|
+
{
|
|
332
|
+
name: "StreamableHTTP",
|
|
333
|
+
transport: new StreamableHTTPClientTransport(url, {
|
|
334
|
+
authProvider,
|
|
335
|
+
requestInit: mcp.headers ? { headers: mcp.headers } : undefined,
|
|
336
|
+
}),
|
|
337
|
+
},
|
|
338
|
+
{
|
|
339
|
+
name: "SSE",
|
|
340
|
+
transport: new SSEClientTransport(url, {
|
|
341
|
+
authProvider,
|
|
342
|
+
requestInit: mcp.headers ? { headers: mcp.headers } : undefined,
|
|
343
|
+
}),
|
|
344
|
+
},
|
|
345
|
+
]
|
|
346
|
+
|
|
347
|
+
const connectTimeout = mcp.timeout ?? DEFAULT_TIMEOUT
|
|
348
|
+
let lastStatus: Status | undefined
|
|
349
|
+
|
|
350
|
+
for (const { name, transport } of transports) {
|
|
351
|
+
const result = yield* connectTransport(transport, connectTimeout).pipe(
|
|
352
|
+
Effect.map((client) => ({ client, transportName: name })),
|
|
353
|
+
Effect.catch((error) => {
|
|
354
|
+
const lastError = error instanceof Error ? error : new Error(String(error))
|
|
355
|
+
const isAuthError =
|
|
356
|
+
error instanceof UnauthorizedError || (authProvider && lastError.message.includes("OAuth"))
|
|
357
|
+
|
|
358
|
+
if (isAuthError) {
|
|
359
|
+
log.info("mcp server requires authentication", { key, transport: name })
|
|
360
|
+
|
|
361
|
+
if (lastError.message.includes("registration") || lastError.message.includes("client_id")) {
|
|
362
|
+
lastStatus = {
|
|
363
|
+
status: "needs_client_registration" as const,
|
|
364
|
+
error: "Server does not support dynamic client registration. Please provide clientId in config.",
|
|
365
|
+
}
|
|
366
|
+
return bus
|
|
367
|
+
.publish(TuiEvent.ToastShow, {
|
|
368
|
+
title: "MCP Authentication Required",
|
|
369
|
+
message: `Server "${key}" requires a pre-registered client ID. Add clientId to your config.`,
|
|
370
|
+
variant: "warning",
|
|
371
|
+
duration: 8000,
|
|
372
|
+
})
|
|
373
|
+
.pipe(Effect.ignore, Effect.as(undefined))
|
|
374
|
+
} else {
|
|
375
|
+
pendingOAuthTransports.set(key, transport)
|
|
376
|
+
lastStatus = { status: "needs_auth" as const }
|
|
377
|
+
return bus
|
|
378
|
+
.publish(TuiEvent.ToastShow, {
|
|
379
|
+
title: "MCP Authentication Required",
|
|
380
|
+
message: `Server "${key}" requires authentication. Run: opencode mcp auth ${key}`,
|
|
381
|
+
variant: "warning",
|
|
382
|
+
duration: 8000,
|
|
383
|
+
})
|
|
384
|
+
.pipe(Effect.ignore, Effect.as(undefined))
|
|
385
|
+
}
|
|
386
|
+
}
|
|
387
|
+
|
|
388
|
+
log.debug("transport connection failed", {
|
|
389
|
+
key,
|
|
390
|
+
transport: name,
|
|
391
|
+
url: mcp.url,
|
|
392
|
+
error: lastError.message,
|
|
393
|
+
})
|
|
394
|
+
lastStatus = { status: "failed" as const, error: lastError.message }
|
|
395
|
+
return Effect.succeed(undefined)
|
|
396
|
+
}),
|
|
397
|
+
)
|
|
398
|
+
if (result) {
|
|
399
|
+
log.info("connected", { key, transport: result.transportName })
|
|
400
|
+
return { client: result.client as MCPClient | undefined, status: { status: "connected" } as Status }
|
|
401
|
+
}
|
|
402
|
+
// If this was an auth error, stop trying other transports
|
|
403
|
+
if (lastStatus?.status === "needs_auth" || lastStatus?.status === "needs_client_registration") break
|
|
404
|
+
}
|
|
405
|
+
|
|
406
|
+
return {
|
|
407
|
+
client: undefined as MCPClient | undefined,
|
|
408
|
+
status: (lastStatus ?? { status: "failed", error: "Unknown error" }) as Status,
|
|
409
|
+
}
|
|
410
|
+
})
|
|
411
|
+
|
|
412
|
+
const connectLocal = Effect.fn("MCP.connectLocal")(function* (
|
|
413
|
+
key: string,
|
|
414
|
+
mcp: ConfigMCP.Info & { type: "local" },
|
|
415
|
+
) {
|
|
416
|
+
const [cmd, ...args] = mcp.command
|
|
417
|
+
const cwd = yield* InstanceState.directory
|
|
418
|
+
const transport = new StdioClientTransport({
|
|
419
|
+
stderr: "pipe",
|
|
420
|
+
command: cmd,
|
|
421
|
+
args,
|
|
422
|
+
cwd,
|
|
423
|
+
env: {
|
|
424
|
+
...process.env,
|
|
425
|
+
...(cmd === "opencode" ? { BUN_BE_BUN: "1" } : {}),
|
|
426
|
+
...mcp.environment,
|
|
427
|
+
},
|
|
428
|
+
})
|
|
429
|
+
transport.stderr?.on("data", (chunk: Buffer) => {
|
|
430
|
+
log.info(`mcp stderr: ${chunk.toString()}`, { key })
|
|
431
|
+
})
|
|
432
|
+
|
|
433
|
+
const connectTimeout = mcp.timeout ?? DEFAULT_TIMEOUT
|
|
434
|
+
return yield* connectTransport(transport, connectTimeout).pipe(
|
|
435
|
+
Effect.map((client): { client: MCPClient | undefined; status: Status } => ({
|
|
436
|
+
client,
|
|
437
|
+
status: { status: "connected" },
|
|
438
|
+
})),
|
|
439
|
+
Effect.catch((error): Effect.Effect<{ client: MCPClient | undefined; status: Status }> => {
|
|
440
|
+
const msg = error instanceof Error ? error.message : String(error)
|
|
441
|
+
log.error("local mcp startup failed", { key, command: mcp.command, cwd, error: msg })
|
|
442
|
+
return Effect.succeed({ client: undefined, status: { status: "failed", error: msg } })
|
|
443
|
+
}),
|
|
444
|
+
)
|
|
445
|
+
})
|
|
446
|
+
|
|
447
|
+
const create = Effect.fn("MCP.create")(function* (key: string, mcp: ConfigMCP.Info) {
|
|
448
|
+
if (mcp.enabled === false) {
|
|
449
|
+
log.info("mcp server disabled", { key })
|
|
450
|
+
return DISABLED_RESULT
|
|
451
|
+
}
|
|
452
|
+
|
|
453
|
+
log.info("found", { key, type: mcp.type })
|
|
454
|
+
|
|
455
|
+
const { client: mcpClient, status } =
|
|
456
|
+
mcp.type === "remote"
|
|
457
|
+
? yield* connectRemote(key, mcp as ConfigMCP.Info & { type: "remote" })
|
|
458
|
+
: yield* connectLocal(key, mcp as ConfigMCP.Info & { type: "local" })
|
|
459
|
+
|
|
460
|
+
if (!mcpClient) {
|
|
461
|
+
return { status } satisfies CreateResult
|
|
462
|
+
}
|
|
463
|
+
|
|
464
|
+
const listed = yield* defs(key, mcpClient, mcp.timeout)
|
|
465
|
+
if (!listed) {
|
|
466
|
+
yield* Effect.tryPromise(() => mcpClient.close()).pipe(Effect.ignore)
|
|
467
|
+
return { status: { status: "failed", error: "Failed to get tools" } } satisfies CreateResult
|
|
468
|
+
}
|
|
469
|
+
|
|
470
|
+
log.info("create() successfully created client", { key, toolCount: listed.length })
|
|
471
|
+
return { mcpClient, status, defs: listed } satisfies CreateResult
|
|
472
|
+
})
|
|
473
|
+
const cfgSvc = yield* Config.Service
|
|
474
|
+
|
|
475
|
+
const descendants = Effect.fnUntraced(
|
|
476
|
+
function* (pid: number) {
|
|
477
|
+
if (process.platform === "win32") return [] as number[]
|
|
478
|
+
const pids: number[] = []
|
|
479
|
+
const queue = [pid]
|
|
480
|
+
while (queue.length > 0) {
|
|
481
|
+
const current = queue.shift()!
|
|
482
|
+
const handle = yield* spawner.spawn(ChildProcess.make("pgrep", ["-P", String(current)], { stdin: "ignore" }))
|
|
483
|
+
const text = yield* Stream.mkString(Stream.decodeText(handle.stdout))
|
|
484
|
+
yield* handle.exitCode
|
|
485
|
+
for (const tok of text.split("\n")) {
|
|
486
|
+
const cpid = parseInt(tok, 10)
|
|
487
|
+
if (!isNaN(cpid) && !pids.includes(cpid)) {
|
|
488
|
+
pids.push(cpid)
|
|
489
|
+
queue.push(cpid)
|
|
490
|
+
}
|
|
491
|
+
}
|
|
492
|
+
}
|
|
493
|
+
return pids
|
|
494
|
+
},
|
|
495
|
+
Effect.scoped,
|
|
496
|
+
Effect.catch(() => Effect.succeed([] as number[])),
|
|
497
|
+
)
|
|
498
|
+
|
|
499
|
+
function watch(s: State, name: string, client: MCPClient, bridge: EffectBridge.Shape, timeout?: number) {
|
|
500
|
+
client.setNotificationHandler(ToolListChangedNotificationSchema, async () => {
|
|
501
|
+
log.info("tools list changed notification received", { server: name })
|
|
502
|
+
if (s.clients[name] !== client || s.status[name]?.status !== "connected") return
|
|
503
|
+
|
|
504
|
+
const listed = await bridge.promise(defs(name, client, timeout))
|
|
505
|
+
if (!listed) return
|
|
506
|
+
if (s.clients[name] !== client || s.status[name]?.status !== "connected") return
|
|
507
|
+
|
|
508
|
+
s.defs[name] = listed
|
|
509
|
+
await bridge.promise(bus.publish(ToolsChanged, { server: name }).pipe(Effect.ignore))
|
|
510
|
+
})
|
|
511
|
+
}
|
|
512
|
+
|
|
513
|
+
const state = yield* InstanceState.make<State>(
|
|
514
|
+
Effect.fn("MCP.state")(function* () {
|
|
515
|
+
const cfg = yield* cfgSvc.get()
|
|
516
|
+
const bridge = yield* EffectBridge.make()
|
|
517
|
+
const config = cfg.mcp ?? {}
|
|
518
|
+
const s: State = {
|
|
519
|
+
status: {},
|
|
520
|
+
clients: {},
|
|
521
|
+
defs: {},
|
|
522
|
+
}
|
|
523
|
+
|
|
524
|
+
yield* Effect.forEach(
|
|
525
|
+
Object.entries(config),
|
|
526
|
+
([key, mcp]) =>
|
|
527
|
+
Effect.gen(function* () {
|
|
528
|
+
if (!isMcpConfigured(mcp)) {
|
|
529
|
+
log.error("Ignoring MCP config entry without type", { key })
|
|
530
|
+
return
|
|
531
|
+
}
|
|
532
|
+
|
|
533
|
+
if (mcp.enabled === false) {
|
|
534
|
+
s.status[key] = { status: "disabled" }
|
|
535
|
+
return
|
|
536
|
+
}
|
|
537
|
+
|
|
538
|
+
const result = yield* create(key, mcp).pipe(Effect.catch(() => Effect.void))
|
|
539
|
+
if (!result) return
|
|
540
|
+
|
|
541
|
+
s.status[key] = result.status
|
|
542
|
+
if (result.mcpClient) {
|
|
543
|
+
s.clients[key] = result.mcpClient
|
|
544
|
+
s.defs[key] = result.defs!
|
|
545
|
+
watch(s, key, result.mcpClient, bridge, mcp.timeout)
|
|
546
|
+
}
|
|
547
|
+
}),
|
|
548
|
+
{ concurrency: "unbounded" },
|
|
549
|
+
)
|
|
550
|
+
|
|
551
|
+
yield* Effect.addFinalizer(() =>
|
|
552
|
+
Effect.gen(function* () {
|
|
553
|
+
yield* Effect.forEach(
|
|
554
|
+
Object.values(s.clients),
|
|
555
|
+
(client) =>
|
|
556
|
+
Effect.gen(function* () {
|
|
557
|
+
const pid = client.transport instanceof StdioClientTransport ? client.transport.pid : null
|
|
558
|
+
if (typeof pid === "number") {
|
|
559
|
+
const pids = yield* descendants(pid)
|
|
560
|
+
for (const dpid of pids) {
|
|
561
|
+
try {
|
|
562
|
+
process.kill(dpid, "SIGTERM")
|
|
563
|
+
} catch {}
|
|
564
|
+
}
|
|
565
|
+
}
|
|
566
|
+
yield* Effect.tryPromise(() => client.close()).pipe(Effect.ignore)
|
|
567
|
+
}),
|
|
568
|
+
{ concurrency: "unbounded" },
|
|
569
|
+
)
|
|
570
|
+
pendingOAuthTransports.clear()
|
|
571
|
+
}),
|
|
572
|
+
)
|
|
573
|
+
|
|
574
|
+
return s
|
|
575
|
+
}),
|
|
576
|
+
)
|
|
577
|
+
|
|
578
|
+
function closeClient(s: State, name: string) {
|
|
579
|
+
const client = s.clients[name]
|
|
580
|
+
delete s.defs[name]
|
|
581
|
+
if (!client) return Effect.void
|
|
582
|
+
return Effect.tryPromise(() => client.close()).pipe(Effect.ignore)
|
|
583
|
+
}
|
|
584
|
+
|
|
585
|
+
const storeClient = Effect.fnUntraced(function* (
|
|
586
|
+
s: State,
|
|
587
|
+
name: string,
|
|
588
|
+
client: MCPClient,
|
|
589
|
+
listed: MCPToolDef[],
|
|
590
|
+
timeout?: number,
|
|
591
|
+
) {
|
|
592
|
+
const bridge = yield* EffectBridge.make()
|
|
593
|
+
yield* closeClient(s, name)
|
|
594
|
+
s.status[name] = { status: "connected" }
|
|
595
|
+
s.clients[name] = client
|
|
596
|
+
s.defs[name] = listed
|
|
597
|
+
watch(s, name, client, bridge, timeout)
|
|
598
|
+
return s.status[name]
|
|
599
|
+
})
|
|
600
|
+
|
|
601
|
+
const status = Effect.fn("MCP.status")(function* () {
|
|
602
|
+
const s = yield* InstanceState.get(state)
|
|
603
|
+
|
|
604
|
+
const cfg = yield* cfgSvc.get()
|
|
605
|
+
const config = cfg.mcp ?? {}
|
|
606
|
+
const result: Record<string, Status> = {}
|
|
607
|
+
|
|
608
|
+
for (const [key, mcp] of Object.entries(config)) {
|
|
609
|
+
if (!isMcpConfigured(mcp)) continue
|
|
610
|
+
result[key] = s.status[key] ?? { status: "disabled" }
|
|
611
|
+
}
|
|
612
|
+
|
|
613
|
+
return result
|
|
614
|
+
})
|
|
615
|
+
|
|
616
|
+
const clients = Effect.fn("MCP.clients")(function* () {
|
|
617
|
+
const s = yield* InstanceState.get(state)
|
|
618
|
+
return s.clients
|
|
619
|
+
})
|
|
620
|
+
|
|
621
|
+
const createAndStore = Effect.fn("MCP.createAndStore")(function* (name: string, mcp: ConfigMCP.Info) {
|
|
622
|
+
const s = yield* InstanceState.get(state)
|
|
623
|
+
const result = yield* create(name, mcp)
|
|
624
|
+
|
|
625
|
+
s.status[name] = result.status
|
|
626
|
+
if (!result.mcpClient) {
|
|
627
|
+
yield* closeClient(s, name)
|
|
628
|
+
delete s.clients[name]
|
|
629
|
+
return result.status
|
|
630
|
+
}
|
|
631
|
+
|
|
632
|
+
return yield* storeClient(s, name, result.mcpClient, result.defs!, mcp.timeout)
|
|
633
|
+
})
|
|
634
|
+
|
|
635
|
+
const add = Effect.fn("MCP.add")(function* (name: string, mcp: ConfigMCP.Info) {
|
|
636
|
+
yield* createAndStore(name, mcp)
|
|
637
|
+
const s = yield* InstanceState.get(state)
|
|
638
|
+
return { status: s.status }
|
|
639
|
+
})
|
|
640
|
+
|
|
641
|
+
const connect = Effect.fn("MCP.connect")(function* (name: string) {
|
|
642
|
+
const mcp = yield* getMcpConfig(name)
|
|
643
|
+
if (!mcp) {
|
|
644
|
+
log.error("MCP config not found or invalid", { name })
|
|
645
|
+
return
|
|
646
|
+
}
|
|
647
|
+
yield* createAndStore(name, { ...mcp, enabled: true })
|
|
648
|
+
})
|
|
649
|
+
|
|
650
|
+
const disconnect = Effect.fn("MCP.disconnect")(function* (name: string) {
|
|
651
|
+
const s = yield* InstanceState.get(state)
|
|
652
|
+
yield* closeClient(s, name)
|
|
653
|
+
delete s.clients[name]
|
|
654
|
+
s.status[name] = { status: "disabled" }
|
|
655
|
+
})
|
|
656
|
+
|
|
657
|
+
const tools = Effect.fn("MCP.tools")(function* () {
|
|
658
|
+
const result: Record<string, Tool> = {}
|
|
659
|
+
const s = yield* InstanceState.get(state)
|
|
660
|
+
|
|
661
|
+
const cfg = yield* cfgSvc.get()
|
|
662
|
+
const config = cfg.mcp ?? {}
|
|
663
|
+
const defaultTimeout = cfg.experimental?.mcp_timeout
|
|
664
|
+
|
|
665
|
+
const connectedClients = Object.entries(s.clients).filter(
|
|
666
|
+
([clientName]) => s.status[clientName]?.status === "connected",
|
|
667
|
+
)
|
|
668
|
+
|
|
669
|
+
yield* Effect.forEach(
|
|
670
|
+
connectedClients,
|
|
671
|
+
([clientName, client]) =>
|
|
672
|
+
Effect.gen(function* () {
|
|
673
|
+
const mcpConfig = config[clientName]
|
|
674
|
+
const entry = mcpConfig && isMcpConfigured(mcpConfig) ? mcpConfig : undefined
|
|
675
|
+
|
|
676
|
+
const listed = s.defs[clientName]
|
|
677
|
+
if (!listed) {
|
|
678
|
+
log.warn("missing cached tools for connected server", { clientName })
|
|
679
|
+
return
|
|
680
|
+
}
|
|
681
|
+
|
|
682
|
+
const timeout = entry?.timeout ?? defaultTimeout
|
|
683
|
+
for (const mcpTool of listed) {
|
|
684
|
+
result[sanitize(clientName) + "_" + sanitize(mcpTool.name)] = convertMcpTool(mcpTool, client, timeout)
|
|
685
|
+
}
|
|
686
|
+
}),
|
|
687
|
+
{ concurrency: "unbounded" },
|
|
688
|
+
)
|
|
689
|
+
return result
|
|
690
|
+
})
|
|
691
|
+
|
|
692
|
+
function collectFromConnected<T extends { name: string }>(
|
|
693
|
+
s: State,
|
|
694
|
+
listFn: (c: Client) => Promise<T[]>,
|
|
695
|
+
label: string,
|
|
696
|
+
) {
|
|
697
|
+
return Effect.forEach(
|
|
698
|
+
Object.entries(s.clients).filter(([name]) => s.status[name]?.status === "connected"),
|
|
699
|
+
([clientName, client]) =>
|
|
700
|
+
fetchFromClient(clientName, client, listFn, label).pipe(Effect.map((items) => Object.entries(items ?? {}))),
|
|
701
|
+
{ concurrency: "unbounded" },
|
|
702
|
+
).pipe(Effect.map((results) => Object.fromEntries<T & { client: string }>(results.flat())))
|
|
703
|
+
}
|
|
704
|
+
|
|
705
|
+
const prompts = Effect.fn("MCP.prompts")(function* () {
|
|
706
|
+
const s = yield* InstanceState.get(state)
|
|
707
|
+
return yield* collectFromConnected(s, (c) => c.listPrompts().then((r) => r.prompts), "prompts")
|
|
708
|
+
})
|
|
709
|
+
|
|
710
|
+
const resources = Effect.fn("MCP.resources")(function* () {
|
|
711
|
+
const s = yield* InstanceState.get(state)
|
|
712
|
+
return yield* collectFromConnected(s, (c) => c.listResources().then((r) => r.resources), "resources")
|
|
713
|
+
})
|
|
714
|
+
|
|
715
|
+
const withClient = Effect.fnUntraced(function* <A>(
|
|
716
|
+
clientName: string,
|
|
717
|
+
fn: (client: MCPClient) => Promise<A>,
|
|
718
|
+
label: string,
|
|
719
|
+
meta?: Record<string, unknown>,
|
|
720
|
+
) {
|
|
721
|
+
const s = yield* InstanceState.get(state)
|
|
722
|
+
const client = s.clients[clientName]
|
|
723
|
+
if (!client) {
|
|
724
|
+
log.warn(`client not found for ${label}`, { clientName })
|
|
725
|
+
return undefined
|
|
726
|
+
}
|
|
727
|
+
return yield* Effect.tryPromise({
|
|
728
|
+
try: () => fn(client),
|
|
729
|
+
catch: (e: any) => {
|
|
730
|
+
log.error(`failed to ${label}`, { clientName, ...meta, error: e?.message })
|
|
731
|
+
return e
|
|
732
|
+
},
|
|
733
|
+
}).pipe(Effect.orElseSucceed(() => undefined))
|
|
734
|
+
})
|
|
735
|
+
|
|
736
|
+
const getPrompt = Effect.fn("MCP.getPrompt")(function* (
|
|
737
|
+
clientName: string,
|
|
738
|
+
name: string,
|
|
739
|
+
args?: Record<string, string>,
|
|
740
|
+
) {
|
|
741
|
+
return yield* withClient(clientName, (client) => client.getPrompt({ name, arguments: args }), "getPrompt", {
|
|
742
|
+
promptName: name,
|
|
743
|
+
})
|
|
744
|
+
})
|
|
745
|
+
|
|
746
|
+
const readResource = Effect.fn("MCP.readResource")(function* (clientName: string, resourceUri: string) {
|
|
747
|
+
return yield* withClient(clientName, (client) => client.readResource({ uri: resourceUri }), "readResource", {
|
|
748
|
+
resourceUri,
|
|
749
|
+
})
|
|
750
|
+
})
|
|
751
|
+
|
|
752
|
+
const getMcpConfig = Effect.fnUntraced(function* (mcpName: string) {
|
|
753
|
+
const cfg = yield* cfgSvc.get()
|
|
754
|
+
const mcpConfig = cfg.mcp?.[mcpName]
|
|
755
|
+
if (!mcpConfig || !isMcpConfigured(mcpConfig)) return undefined
|
|
756
|
+
return mcpConfig
|
|
757
|
+
})
|
|
758
|
+
|
|
759
|
+
const startAuth = Effect.fn("MCP.startAuth")(function* (mcpName: string) {
|
|
760
|
+
const mcpConfig = yield* getMcpConfig(mcpName)
|
|
761
|
+
if (!mcpConfig) throw new Error(`MCP server ${mcpName} not found or disabled`)
|
|
762
|
+
if (mcpConfig.type !== "remote") throw new Error(`MCP server ${mcpName} is not a remote server`)
|
|
763
|
+
if (mcpConfig.oauth === false) throw new Error(`MCP server ${mcpName} has OAuth explicitly disabled`)
|
|
764
|
+
const url = remoteURL(mcpName, mcpConfig.url)
|
|
765
|
+
if (!url) throw new Error(`Invalid MCP URL for "${mcpName}"`)
|
|
766
|
+
|
|
767
|
+
// OAuth config is optional - if not provided, we'll use auto-discovery
|
|
768
|
+
const oauthConfig = typeof mcpConfig.oauth === "object" ? mcpConfig.oauth : undefined
|
|
769
|
+
|
|
770
|
+
// Start the callback server with custom redirectUri if configured
|
|
771
|
+
yield* Effect.promise(() => McpOAuthCallback.ensureRunning(oauthConfig?.redirectUri))
|
|
772
|
+
|
|
773
|
+
const oauthState = Array.from(crypto.getRandomValues(new Uint8Array(32)))
|
|
774
|
+
.map((b) => b.toString(16).padStart(2, "0"))
|
|
775
|
+
.join("")
|
|
776
|
+
yield* auth.updateOAuthState(mcpName, oauthState)
|
|
777
|
+
let capturedUrl: URL | undefined
|
|
778
|
+
const authProvider = new McpOAuthProvider(
|
|
779
|
+
mcpName,
|
|
780
|
+
mcpConfig.url,
|
|
781
|
+
{
|
|
782
|
+
clientId: oauthConfig?.clientId,
|
|
783
|
+
clientSecret: oauthConfig?.clientSecret,
|
|
784
|
+
scope: oauthConfig?.scope,
|
|
785
|
+
redirectUri: oauthConfig?.redirectUri,
|
|
786
|
+
},
|
|
787
|
+
{
|
|
788
|
+
onRedirect: async (url) => {
|
|
789
|
+
capturedUrl = url
|
|
790
|
+
},
|
|
791
|
+
},
|
|
792
|
+
auth,
|
|
793
|
+
)
|
|
794
|
+
|
|
795
|
+
const transport = new StreamableHTTPClientTransport(url, { authProvider })
|
|
796
|
+
|
|
797
|
+
return yield* Effect.tryPromise({
|
|
798
|
+
try: () => {
|
|
799
|
+
const client = new Client({ name: "opencode", version: InstallationVersion })
|
|
800
|
+
return client
|
|
801
|
+
.connect(transport)
|
|
802
|
+
.then(() => ({ authorizationUrl: "", oauthState, client }) satisfies AuthResult)
|
|
803
|
+
},
|
|
804
|
+
catch: (error) => error,
|
|
805
|
+
}).pipe(
|
|
806
|
+
Effect.catch((error) => {
|
|
807
|
+
if (error instanceof UnauthorizedError && capturedUrl) {
|
|
808
|
+
pendingOAuthTransports.set(mcpName, transport)
|
|
809
|
+
return Effect.succeed({ authorizationUrl: capturedUrl.toString(), oauthState } satisfies AuthResult)
|
|
810
|
+
}
|
|
811
|
+
return Effect.die(error)
|
|
812
|
+
}),
|
|
813
|
+
)
|
|
814
|
+
})
|
|
815
|
+
|
|
816
|
+
const authenticate = Effect.fn("MCP.authenticate")(function* (mcpName: string) {
|
|
817
|
+
const result = yield* startAuth(mcpName)
|
|
818
|
+
if (!result.authorizationUrl) {
|
|
819
|
+
const client = "client" in result ? result.client : undefined
|
|
820
|
+
const mcpConfig = yield* getMcpConfig(mcpName)
|
|
821
|
+
if (!mcpConfig) {
|
|
822
|
+
yield* Effect.tryPromise(() => client?.close() ?? Promise.resolve()).pipe(Effect.ignore)
|
|
823
|
+
return { status: "failed", error: "MCP config not found after auth" } as Status
|
|
824
|
+
}
|
|
825
|
+
|
|
826
|
+
const listed = client ? yield* defs(mcpName, client, mcpConfig.timeout) : undefined
|
|
827
|
+
if (!client || !listed) {
|
|
828
|
+
yield* Effect.tryPromise(() => client?.close() ?? Promise.resolve()).pipe(Effect.ignore)
|
|
829
|
+
return { status: "failed", error: "Failed to get tools" } as Status
|
|
830
|
+
}
|
|
831
|
+
|
|
832
|
+
const s = yield* InstanceState.get(state)
|
|
833
|
+
yield* auth.clearOAuthState(mcpName)
|
|
834
|
+
return yield* storeClient(s, mcpName, client, listed, mcpConfig.timeout)
|
|
835
|
+
}
|
|
836
|
+
|
|
837
|
+
log.info("opening browser for oauth", { mcpName, url: result.authorizationUrl, state: result.oauthState })
|
|
838
|
+
|
|
839
|
+
const callbackPromise = McpOAuthCallback.waitForCallback(result.oauthState, mcpName)
|
|
840
|
+
|
|
841
|
+
yield* Effect.tryPromise(() => open(result.authorizationUrl)).pipe(
|
|
842
|
+
Effect.flatMap((subprocess) =>
|
|
843
|
+
Effect.callback<void, Error>((resume) => {
|
|
844
|
+
const timer = setTimeout(() => resume(Effect.void), 500)
|
|
845
|
+
subprocess.on("error", (err) => {
|
|
846
|
+
clearTimeout(timer)
|
|
847
|
+
resume(Effect.fail(err))
|
|
848
|
+
})
|
|
849
|
+
subprocess.on("exit", (code) => {
|
|
850
|
+
if (code !== null && code !== 0) {
|
|
851
|
+
clearTimeout(timer)
|
|
852
|
+
resume(Effect.fail(new Error(`Browser open failed with exit code ${code}`)))
|
|
853
|
+
}
|
|
854
|
+
})
|
|
855
|
+
}),
|
|
856
|
+
),
|
|
857
|
+
Effect.catch(() => {
|
|
858
|
+
log.warn("failed to open browser, user must open URL manually", { mcpName })
|
|
859
|
+
return bus.publish(BrowserOpenFailed, { mcpName, url: result.authorizationUrl }).pipe(Effect.ignore)
|
|
860
|
+
}),
|
|
861
|
+
)
|
|
862
|
+
|
|
863
|
+
const code = yield* Effect.promise(() => callbackPromise)
|
|
864
|
+
|
|
865
|
+
const storedState = yield* auth.getOAuthState(mcpName)
|
|
866
|
+
if (storedState !== result.oauthState) {
|
|
867
|
+
yield* auth.clearOAuthState(mcpName)
|
|
868
|
+
throw new Error("OAuth state mismatch - potential CSRF attack")
|
|
869
|
+
}
|
|
870
|
+
yield* auth.clearOAuthState(mcpName)
|
|
871
|
+
return yield* finishAuth(mcpName, code)
|
|
872
|
+
})
|
|
873
|
+
|
|
874
|
+
const finishAuth = Effect.fn("MCP.finishAuth")(function* (mcpName: string, authorizationCode: string) {
|
|
875
|
+
const transport = pendingOAuthTransports.get(mcpName)
|
|
876
|
+
if (!transport) throw new Error(`No pending OAuth flow for MCP server: ${mcpName}`)
|
|
877
|
+
|
|
878
|
+
const result = yield* Effect.tryPromise({
|
|
879
|
+
try: () => transport.finishAuth(authorizationCode).then(() => true as const),
|
|
880
|
+
catch: (error) => {
|
|
881
|
+
log.error("failed to finish oauth", { mcpName, error })
|
|
882
|
+
return error
|
|
883
|
+
},
|
|
884
|
+
}).pipe(Effect.option)
|
|
885
|
+
|
|
886
|
+
if (Option.isNone(result)) {
|
|
887
|
+
return { status: "failed", error: "OAuth completion failed" } as Status
|
|
888
|
+
}
|
|
889
|
+
|
|
890
|
+
yield* auth.clearCodeVerifier(mcpName)
|
|
891
|
+
pendingOAuthTransports.delete(mcpName)
|
|
892
|
+
|
|
893
|
+
const mcpConfig = yield* getMcpConfig(mcpName)
|
|
894
|
+
if (!mcpConfig) return { status: "failed", error: "MCP config not found after auth" } as Status
|
|
895
|
+
|
|
896
|
+
return yield* createAndStore(mcpName, mcpConfig)
|
|
897
|
+
})
|
|
898
|
+
|
|
899
|
+
const removeAuth = Effect.fn("MCP.removeAuth")(function* (mcpName: string) {
|
|
900
|
+
yield* auth.remove(mcpName)
|
|
901
|
+
McpOAuthCallback.cancelPending(mcpName)
|
|
902
|
+
pendingOAuthTransports.delete(mcpName)
|
|
903
|
+
log.info("removed oauth credentials", { mcpName })
|
|
904
|
+
})
|
|
905
|
+
|
|
906
|
+
const supportsOAuth = Effect.fn("MCP.supportsOAuth")(function* (mcpName: string) {
|
|
907
|
+
const mcpConfig = yield* getMcpConfig(mcpName)
|
|
908
|
+
if (!mcpConfig) return false
|
|
909
|
+
return mcpConfig.type === "remote" && mcpConfig.oauth !== false
|
|
910
|
+
})
|
|
911
|
+
|
|
912
|
+
const hasStoredTokens = Effect.fn("MCP.hasStoredTokens")(function* (mcpName: string) {
|
|
913
|
+
const entry = yield* auth.get(mcpName)
|
|
914
|
+
return !!entry?.tokens
|
|
915
|
+
})
|
|
916
|
+
|
|
917
|
+
const getAuthStatus = Effect.fn("MCP.getAuthStatus")(function* (mcpName: string) {
|
|
918
|
+
const entry = yield* auth.get(mcpName)
|
|
919
|
+
if (!entry?.tokens) return "not_authenticated" as AuthStatus
|
|
920
|
+
const expired = yield* auth.isTokenExpired(mcpName)
|
|
921
|
+
return (expired ? "expired" : "authenticated") as AuthStatus
|
|
922
|
+
})
|
|
923
|
+
|
|
924
|
+
return Service.of({
|
|
925
|
+
status,
|
|
926
|
+
clients,
|
|
927
|
+
tools,
|
|
928
|
+
prompts,
|
|
929
|
+
resources,
|
|
930
|
+
add,
|
|
931
|
+
connect,
|
|
932
|
+
disconnect,
|
|
933
|
+
getPrompt,
|
|
934
|
+
readResource,
|
|
935
|
+
startAuth,
|
|
936
|
+
authenticate,
|
|
937
|
+
finishAuth,
|
|
938
|
+
removeAuth,
|
|
939
|
+
supportsOAuth,
|
|
940
|
+
hasStoredTokens,
|
|
941
|
+
getAuthStatus,
|
|
942
|
+
})
|
|
943
|
+
}),
|
|
944
|
+
)
|
|
945
|
+
|
|
946
|
+
export type AuthStatus = "authenticated" | "expired" | "not_authenticated"
|
|
947
|
+
|
|
948
|
+
// --- Per-service runtime ---
|
|
949
|
+
|
|
950
|
+
export const defaultLayer = layer.pipe(
|
|
951
|
+
Layer.provide(McpAuth.layer),
|
|
952
|
+
Layer.provide(Bus.layer),
|
|
953
|
+
Layer.provide(Config.defaultLayer),
|
|
954
|
+
Layer.provide(CrossSpawnSpawner.defaultLayer),
|
|
955
|
+
Layer.provide(AppFileSystem.defaultLayer),
|
|
956
|
+
)
|
|
957
|
+
|
|
958
|
+
export * as MCP from "."
|