mcp-proxy-adapter 2.0.1__py3-none-any.whl → 6.9.50__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of mcp-proxy-adapter might be problematic. Click here for more details.
- mcp_proxy_adapter/__init__.py +47 -0
- mcp_proxy_adapter/__main__.py +13 -0
- mcp_proxy_adapter/api/__init__.py +0 -0
- mcp_proxy_adapter/api/app.py +66 -0
- mcp_proxy_adapter/api/core/__init__.py +18 -0
- mcp_proxy_adapter/api/core/app_factory.py +400 -0
- mcp_proxy_adapter/api/core/lifespan_manager.py +55 -0
- mcp_proxy_adapter/api/core/registration_context.py +356 -0
- mcp_proxy_adapter/api/core/registration_manager.py +307 -0
- mcp_proxy_adapter/api/core/registration_tasks.py +84 -0
- mcp_proxy_adapter/api/core/ssl_context_factory.py +88 -0
- mcp_proxy_adapter/api/handlers.py +181 -0
- mcp_proxy_adapter/api/middleware/__init__.py +21 -0
- mcp_proxy_adapter/api/middleware/base.py +54 -0
- mcp_proxy_adapter/api/middleware/command_permission_middleware.py +73 -0
- mcp_proxy_adapter/api/middleware/error_handling.py +76 -0
- mcp_proxy_adapter/api/middleware/factory.py +147 -0
- mcp_proxy_adapter/api/middleware/logging.py +31 -0
- mcp_proxy_adapter/api/middleware/performance.py +51 -0
- mcp_proxy_adapter/api/middleware/protocol_middleware.py +140 -0
- mcp_proxy_adapter/api/middleware/transport_middleware.py +87 -0
- mcp_proxy_adapter/api/middleware/unified_security.py +223 -0
- mcp_proxy_adapter/api/middleware/user_info_middleware.py +132 -0
- mcp_proxy_adapter/api/openapi/__init__.py +21 -0
- mcp_proxy_adapter/api/openapi/command_integration.py +105 -0
- mcp_proxy_adapter/api/openapi/openapi_generator.py +40 -0
- mcp_proxy_adapter/api/openapi/openapi_registry.py +62 -0
- mcp_proxy_adapter/api/openapi/schema_loader.py +116 -0
- mcp_proxy_adapter/api/schemas.py +270 -0
- mcp_proxy_adapter/api/tool_integration.py +131 -0
- mcp_proxy_adapter/api/tools.py +163 -0
- mcp_proxy_adapter/cli/__init__.py +12 -0
- mcp_proxy_adapter/cli/commands/__init__.py +15 -0
- mcp_proxy_adapter/cli/commands/client.py +100 -0
- mcp_proxy_adapter/cli/commands/config_generate.py +105 -0
- mcp_proxy_adapter/cli/commands/config_validate.py +94 -0
- mcp_proxy_adapter/cli/commands/generate.py +259 -0
- mcp_proxy_adapter/cli/commands/server.py +174 -0
- mcp_proxy_adapter/cli/commands/sets.py +132 -0
- mcp_proxy_adapter/cli/commands/testconfig.py +177 -0
- mcp_proxy_adapter/cli/examples/__init__.py +8 -0
- mcp_proxy_adapter/cli/examples/http_basic.py +82 -0
- mcp_proxy_adapter/cli/examples/https_token.py +96 -0
- mcp_proxy_adapter/cli/examples/mtls_roles.py +103 -0
- mcp_proxy_adapter/cli/main.py +63 -0
- mcp_proxy_adapter/cli/parser.py +338 -0
- mcp_proxy_adapter/cli/validators.py +231 -0
- mcp_proxy_adapter/client/jsonrpc_client/__init__.py +9 -0
- mcp_proxy_adapter/client/jsonrpc_client/client.py +42 -0
- mcp_proxy_adapter/client/jsonrpc_client/command_api.py +45 -0
- mcp_proxy_adapter/client/jsonrpc_client/proxy_api.py +224 -0
- mcp_proxy_adapter/client/jsonrpc_client/queue_api.py +60 -0
- mcp_proxy_adapter/client/jsonrpc_client/transport.py +108 -0
- mcp_proxy_adapter/client/proxy.py +123 -0
- mcp_proxy_adapter/commands/__init__.py +66 -0
- mcp_proxy_adapter/commands/auth_validation_command.py +69 -0
- mcp_proxy_adapter/commands/base.py +389 -0
- mcp_proxy_adapter/commands/builtin_commands.py +30 -0
- mcp_proxy_adapter/commands/catalog/__init__.py +20 -0
- mcp_proxy_adapter/commands/catalog/catalog_loader.py +34 -0
- mcp_proxy_adapter/commands/catalog/catalog_manager.py +122 -0
- mcp_proxy_adapter/commands/catalog/catalog_syncer.py +149 -0
- mcp_proxy_adapter/commands/catalog/command_catalog.py +43 -0
- mcp_proxy_adapter/commands/catalog/dependency_manager.py +37 -0
- mcp_proxy_adapter/commands/catalog_manager.py +97 -0
- mcp_proxy_adapter/commands/cert_monitor_command.py +552 -0
- mcp_proxy_adapter/commands/certificate_management_command.py +562 -0
- mcp_proxy_adapter/commands/command_registry.py +298 -0
- mcp_proxy_adapter/commands/config_command.py +102 -0
- mcp_proxy_adapter/commands/dependency_container.py +40 -0
- mcp_proxy_adapter/commands/dependency_manager.py +143 -0
- mcp_proxy_adapter/commands/echo_command.py +48 -0
- mcp_proxy_adapter/commands/health_command.py +142 -0
- mcp_proxy_adapter/commands/help_command.py +175 -0
- mcp_proxy_adapter/commands/hooks.py +172 -0
- mcp_proxy_adapter/commands/key_management_command.py +484 -0
- mcp_proxy_adapter/commands/load_command.py +123 -0
- mcp_proxy_adapter/commands/plugins_command.py +246 -0
- mcp_proxy_adapter/commands/protocol_management_command.py +216 -0
- mcp_proxy_adapter/commands/proxy_registration_command.py +319 -0
- mcp_proxy_adapter/commands/queue_commands.py +750 -0
- mcp_proxy_adapter/commands/registration_status_command.py +76 -0
- mcp_proxy_adapter/commands/registry/__init__.py +18 -0
- mcp_proxy_adapter/commands/registry/command_info.py +103 -0
- mcp_proxy_adapter/commands/registry/command_loader.py +207 -0
- mcp_proxy_adapter/commands/registry/command_manager.py +119 -0
- mcp_proxy_adapter/commands/registry/command_registry.py +217 -0
- mcp_proxy_adapter/commands/reload_command.py +136 -0
- mcp_proxy_adapter/commands/result.py +157 -0
- mcp_proxy_adapter/commands/role_test_command.py +99 -0
- mcp_proxy_adapter/commands/roles_management_command.py +502 -0
- mcp_proxy_adapter/commands/security_command.py +472 -0
- mcp_proxy_adapter/commands/settings_command.py +113 -0
- mcp_proxy_adapter/commands/ssl_setup_command.py +306 -0
- mcp_proxy_adapter/commands/token_management_command.py +500 -0
- mcp_proxy_adapter/commands/transport_management_command.py +129 -0
- mcp_proxy_adapter/commands/unload_command.py +92 -0
- mcp_proxy_adapter/config.py +32 -0
- mcp_proxy_adapter/core/__init__.py +8 -0
- mcp_proxy_adapter/core/app_factory.py +560 -0
- mcp_proxy_adapter/core/app_runner.py +318 -0
- mcp_proxy_adapter/core/auth_validator.py +508 -0
- mcp_proxy_adapter/core/certificate/__init__.py +20 -0
- mcp_proxy_adapter/core/certificate/certificate_creator.py +372 -0
- mcp_proxy_adapter/core/certificate/certificate_extractor.py +185 -0
- mcp_proxy_adapter/core/certificate/certificate_utils.py +249 -0
- mcp_proxy_adapter/core/certificate/certificate_validator.py +481 -0
- mcp_proxy_adapter/core/certificate/ssl_context_manager.py +65 -0
- mcp_proxy_adapter/core/certificate_utils.py +249 -0
- mcp_proxy_adapter/core/client.py +608 -0
- mcp_proxy_adapter/core/client_manager.py +271 -0
- mcp_proxy_adapter/core/client_security.py +411 -0
- mcp_proxy_adapter/core/config/__init__.py +18 -0
- mcp_proxy_adapter/core/config/config.py +237 -0
- mcp_proxy_adapter/core/config/config_factory.py +22 -0
- mcp_proxy_adapter/core/config/config_loader.py +66 -0
- mcp_proxy_adapter/core/config/feature_manager.py +31 -0
- mcp_proxy_adapter/core/config/simple_config.py +204 -0
- mcp_proxy_adapter/core/config/simple_config_generator.py +131 -0
- mcp_proxy_adapter/core/config/simple_config_validator.py +476 -0
- mcp_proxy_adapter/core/config_converter.py +252 -0
- mcp_proxy_adapter/core/config_validator.py +211 -0
- mcp_proxy_adapter/core/crl_utils.py +362 -0
- mcp_proxy_adapter/core/errors.py +276 -0
- mcp_proxy_adapter/core/job_manager.py +54 -0
- mcp_proxy_adapter/core/logging.py +250 -0
- mcp_proxy_adapter/core/mtls_asgi.py +140 -0
- mcp_proxy_adapter/core/mtls_asgi_app.py +187 -0
- mcp_proxy_adapter/core/mtls_proxy.py +229 -0
- mcp_proxy_adapter/core/mtls_server.py +154 -0
- mcp_proxy_adapter/core/protocol_manager.py +232 -0
- mcp_proxy_adapter/core/proxy/__init__.py +19 -0
- mcp_proxy_adapter/core/proxy/auth_manager.py +26 -0
- mcp_proxy_adapter/core/proxy/proxy_registration_manager.py +160 -0
- mcp_proxy_adapter/core/proxy/registration_client.py +186 -0
- mcp_proxy_adapter/core/proxy/ssl_manager.py +101 -0
- mcp_proxy_adapter/core/proxy_client.py +184 -0
- mcp_proxy_adapter/core/proxy_registration.py +80 -0
- mcp_proxy_adapter/core/role_utils.py +103 -0
- mcp_proxy_adapter/core/security_adapter.py +343 -0
- mcp_proxy_adapter/core/security_factory.py +96 -0
- mcp_proxy_adapter/core/security_integration.py +342 -0
- mcp_proxy_adapter/core/server_adapter.py +251 -0
- mcp_proxy_adapter/core/server_engine.py +217 -0
- mcp_proxy_adapter/core/settings.py +260 -0
- mcp_proxy_adapter/core/signal_handler.py +107 -0
- mcp_proxy_adapter/core/ssl_utils.py +161 -0
- mcp_proxy_adapter/core/transport_manager.py +153 -0
- mcp_proxy_adapter/core/unified_config_adapter.py +471 -0
- mcp_proxy_adapter/core/utils.py +101 -0
- mcp_proxy_adapter/core/validation/__init__.py +21 -0
- mcp_proxy_adapter/core/validation/config_validator.py +219 -0
- mcp_proxy_adapter/core/validation/file_validator.py +131 -0
- mcp_proxy_adapter/core/validation/protocol_validator.py +205 -0
- mcp_proxy_adapter/core/validation/security_validator.py +140 -0
- mcp_proxy_adapter/core/validation/validation_result.py +27 -0
- mcp_proxy_adapter/custom_openapi.py +58 -0
- mcp_proxy_adapter/examples/__init__.py +16 -0
- mcp_proxy_adapter/examples/basic_framework/__init__.py +9 -0
- mcp_proxy_adapter/examples/basic_framework/commands/__init__.py +4 -0
- mcp_proxy_adapter/examples/basic_framework/hooks/__init__.py +4 -0
- mcp_proxy_adapter/examples/basic_framework/main.py +52 -0
- mcp_proxy_adapter/examples/bugfix_certificate_config.py +261 -0
- mcp_proxy_adapter/examples/cert_manager_bugfix.py +203 -0
- mcp_proxy_adapter/examples/check_config.py +413 -0
- mcp_proxy_adapter/examples/client_usage_example.py +164 -0
- mcp_proxy_adapter/examples/commands/__init__.py +5 -0
- mcp_proxy_adapter/examples/config_builder.py +234 -0
- mcp_proxy_adapter/examples/config_cli.py +282 -0
- mcp_proxy_adapter/examples/create_test_configs.py +174 -0
- mcp_proxy_adapter/examples/debug_request_state.py +130 -0
- mcp_proxy_adapter/examples/debug_role_chain.py +191 -0
- mcp_proxy_adapter/examples/demo_client.py +287 -0
- mcp_proxy_adapter/examples/full_application/__init__.py +12 -0
- mcp_proxy_adapter/examples/full_application/commands/__init__.py +8 -0
- mcp_proxy_adapter/examples/full_application/commands/custom_echo_command.py +45 -0
- mcp_proxy_adapter/examples/full_application/commands/dynamic_calculator_command.py +52 -0
- mcp_proxy_adapter/examples/full_application/commands/echo_command.py +32 -0
- mcp_proxy_adapter/examples/full_application/commands/help_command.py +54 -0
- mcp_proxy_adapter/examples/full_application/commands/list_command.py +57 -0
- mcp_proxy_adapter/examples/full_application/hooks/__init__.py +5 -0
- mcp_proxy_adapter/examples/full_application/hooks/application_hooks.py +29 -0
- mcp_proxy_adapter/examples/full_application/hooks/builtin_command_hooks.py +27 -0
- mcp_proxy_adapter/examples/full_application/main.py +311 -0
- mcp_proxy_adapter/examples/full_application/proxy_endpoints.py +161 -0
- mcp_proxy_adapter/examples/full_application/run_mtls.py +252 -0
- mcp_proxy_adapter/examples/full_application/run_simple.py +152 -0
- mcp_proxy_adapter/examples/full_application/test_minimal_server.py +45 -0
- mcp_proxy_adapter/examples/full_application/test_server.py +163 -0
- mcp_proxy_adapter/examples/full_application/test_simple_server.py +62 -0
- mcp_proxy_adapter/examples/generate_config.py +502 -0
- mcp_proxy_adapter/examples/proxy_registration_example.py +335 -0
- mcp_proxy_adapter/examples/queue_demo_simple.py +632 -0
- mcp_proxy_adapter/examples/queue_integration_example.py +578 -0
- mcp_proxy_adapter/examples/queue_server_demo.py +82 -0
- mcp_proxy_adapter/examples/queue_server_example.py +85 -0
- mcp_proxy_adapter/examples/queue_server_simple.py +173 -0
- mcp_proxy_adapter/examples/required_certificates.py +208 -0
- mcp_proxy_adapter/examples/run_example.py +77 -0
- mcp_proxy_adapter/examples/run_full_test_suite.py +619 -0
- mcp_proxy_adapter/examples/run_proxy_server.py +153 -0
- mcp_proxy_adapter/examples/run_security_tests_fixed.py +435 -0
- mcp_proxy_adapter/examples/security_test/__init__.py +18 -0
- mcp_proxy_adapter/examples/security_test/auth_manager.py +14 -0
- mcp_proxy_adapter/examples/security_test/ssl_context_manager.py +28 -0
- mcp_proxy_adapter/examples/security_test/test_client.py +159 -0
- mcp_proxy_adapter/examples/security_test/test_result.py +22 -0
- mcp_proxy_adapter/examples/security_test_client.py +72 -0
- mcp_proxy_adapter/examples/setup/__init__.py +24 -0
- mcp_proxy_adapter/examples/setup/certificate_manager.py +215 -0
- mcp_proxy_adapter/examples/setup/config_generator.py +12 -0
- mcp_proxy_adapter/examples/setup/config_validator.py +118 -0
- mcp_proxy_adapter/examples/setup/environment_setup.py +62 -0
- mcp_proxy_adapter/examples/setup/test_files_generator.py +10 -0
- mcp_proxy_adapter/examples/setup/test_runner.py +89 -0
- mcp_proxy_adapter/examples/setup_test_environment.py +235 -0
- mcp_proxy_adapter/examples/simple_protocol_test.py +125 -0
- mcp_proxy_adapter/examples/test_chk_hostname_automated.py +211 -0
- mcp_proxy_adapter/examples/test_config.py +205 -0
- mcp_proxy_adapter/examples/test_config_builder.py +110 -0
- mcp_proxy_adapter/examples/test_examples.py +308 -0
- mcp_proxy_adapter/examples/test_framework_complete.py +267 -0
- mcp_proxy_adapter/examples/test_mcp_server.py +187 -0
- mcp_proxy_adapter/examples/test_protocol_examples.py +337 -0
- mcp_proxy_adapter/examples/universal_client.py +674 -0
- mcp_proxy_adapter/examples/update_config_certificates.py +135 -0
- mcp_proxy_adapter/examples/validate_generator_compatibility.py +385 -0
- mcp_proxy_adapter/examples/validate_generator_compatibility_simple.py +61 -0
- mcp_proxy_adapter/integrations/__init__.py +25 -0
- mcp_proxy_adapter/integrations/queuemgr_integration.py +462 -0
- mcp_proxy_adapter/main.py +311 -0
- mcp_proxy_adapter/openapi.py +375 -0
- mcp_proxy_adapter/schemas/base_schema.json +114 -0
- mcp_proxy_adapter/schemas/openapi_schema.json +314 -0
- mcp_proxy_adapter/schemas/roles.json +37 -0
- mcp_proxy_adapter/schemas/roles_schema.json +162 -0
- mcp_proxy_adapter/version.py +5 -0
- mcp_proxy_adapter-6.9.50.dist-info/METADATA +1088 -0
- mcp_proxy_adapter-6.9.50.dist-info/RECORD +242 -0
- {mcp_proxy_adapter-2.0.1.dist-info → mcp_proxy_adapter-6.9.50.dist-info}/WHEEL +1 -1
- mcp_proxy_adapter-6.9.50.dist-info/entry_points.txt +14 -0
- mcp_proxy_adapter-6.9.50.dist-info/top_level.txt +1 -0
- adapters/__init__.py +0 -16
- analyzers/__init__.py +0 -14
- analyzers/docstring_analyzer.py +0 -199
- analyzers/type_analyzer.py +0 -151
- cli/__init__.py +0 -12
- cli/__main__.py +0 -79
- cli/command_runner.py +0 -233
- dispatchers/__init__.py +0 -14
- dispatchers/base_dispatcher.py +0 -85
- dispatchers/json_rpc_dispatcher.py +0 -198
- generators/__init__.py +0 -14
- generators/endpoint_generator.py +0 -172
- generators/openapi_generator.py +0 -254
- generators/rest_api_generator.py +0 -207
- mcp_proxy_adapter-2.0.1.dist-info/METADATA +0 -272
- mcp_proxy_adapter-2.0.1.dist-info/RECORD +0 -28
- mcp_proxy_adapter-2.0.1.dist-info/licenses/LICENSE +0 -21
- mcp_proxy_adapter-2.0.1.dist-info/top_level.txt +0 -7
- openapi_schema/__init__.py +0 -38
- openapi_schema/command_registry.py +0 -312
- openapi_schema/rest_schema.py +0 -510
- openapi_schema/rpc_generator.py +0 -307
- openapi_schema/rpc_schema.py +0 -416
- validators/__init__.py +0 -14
- validators/base_validator.py +0 -23
- validators/docstring_validator.py +0 -75
- validators/metadata_validator.py +0 -76
|
@@ -0,0 +1,80 @@
|
|
|
1
|
+
"""
|
|
2
|
+
Module for proxy registration functionality with security framework integration.
|
|
3
|
+
|
|
4
|
+
This module handles automatic registration and unregistration of the server
|
|
5
|
+
with the MCP proxy server during startup and shutdown, using mcp_security_framework
|
|
6
|
+
for secure connections and authentication.
|
|
7
|
+
|
|
8
|
+
Author: Vasiliy Zdanovskiy
|
|
9
|
+
email: vasilyvz@gmail.com
|
|
10
|
+
"""
|
|
11
|
+
|
|
12
|
+
from typing import Dict, Any, Optional
|
|
13
|
+
|
|
14
|
+
from mcp_proxy_adapter.core.proxy.proxy_registration_manager import (
|
|
15
|
+
ProxyRegistrationManager,
|
|
16
|
+
)
|
|
17
|
+
|
|
18
|
+
# Global registration manager instance
|
|
19
|
+
_registration_manager: Optional[ProxyRegistrationManager] = None
|
|
20
|
+
|
|
21
|
+
|
|
22
|
+
def initialize_proxy_registration(config: Dict[str, Any]) -> None:
|
|
23
|
+
"""
|
|
24
|
+
Initialize proxy registration with configuration.
|
|
25
|
+
|
|
26
|
+
Args:
|
|
27
|
+
config: Application configuration
|
|
28
|
+
"""
|
|
29
|
+
global _registration_manager
|
|
30
|
+
_registration_manager = ProxyRegistrationManager(config)
|
|
31
|
+
|
|
32
|
+
|
|
33
|
+
async def register_with_proxy(server_url: str) -> bool:
|
|
34
|
+
"""
|
|
35
|
+
Register server with proxy.
|
|
36
|
+
|
|
37
|
+
Args:
|
|
38
|
+
server_url: Server URL to register
|
|
39
|
+
|
|
40
|
+
Returns:
|
|
41
|
+
True if registration successful, False otherwise
|
|
42
|
+
"""
|
|
43
|
+
if not _registration_manager:
|
|
44
|
+
return False
|
|
45
|
+
|
|
46
|
+
_registration_manager.set_server_url(server_url)
|
|
47
|
+
return await _registration_manager.register()
|
|
48
|
+
|
|
49
|
+
|
|
50
|
+
async def unregister_from_proxy() -> bool:
|
|
51
|
+
"""
|
|
52
|
+
Unregister server from proxy.
|
|
53
|
+
|
|
54
|
+
Returns:
|
|
55
|
+
True if unregistration successful, False otherwise
|
|
56
|
+
"""
|
|
57
|
+
if not _registration_manager:
|
|
58
|
+
return True
|
|
59
|
+
|
|
60
|
+
return await _registration_manager.unregister()
|
|
61
|
+
|
|
62
|
+
|
|
63
|
+
def get_proxy_registration_status() -> Dict[str, Any]:
|
|
64
|
+
"""
|
|
65
|
+
Get current proxy registration status.
|
|
66
|
+
|
|
67
|
+
Returns:
|
|
68
|
+
Dictionary with registration status information
|
|
69
|
+
"""
|
|
70
|
+
if not _registration_manager:
|
|
71
|
+
return {
|
|
72
|
+
"enabled": False,
|
|
73
|
+
"registered": False,
|
|
74
|
+
"proxy_url": None,
|
|
75
|
+
"server_url": None,
|
|
76
|
+
"registration_time": None,
|
|
77
|
+
"client_security_available": False,
|
|
78
|
+
}
|
|
79
|
+
|
|
80
|
+
return _registration_manager.get_registration_status()
|
|
@@ -0,0 +1,103 @@
|
|
|
1
|
+
"""
|
|
2
|
+
Role Utilities
|
|
3
|
+
|
|
4
|
+
This module provides utilities for working with roles extracted from certificates.
|
|
5
|
+
Includes functions for role extraction, comparison, validation, and normalization.
|
|
6
|
+
|
|
7
|
+
Author: MCP Proxy Adapter Team
|
|
8
|
+
Version: 1.0.0
|
|
9
|
+
"""
|
|
10
|
+
|
|
11
|
+
import logging
|
|
12
|
+
from typing import List
|
|
13
|
+
|
|
14
|
+
|
|
15
|
+
class RoleUtils:
|
|
16
|
+
"""
|
|
17
|
+
Utilities for working with roles from certificates.
|
|
18
|
+
|
|
19
|
+
Provides methods for extracting, comparing, validating, and normalizing roles.
|
|
20
|
+
"""
|
|
21
|
+
|
|
22
|
+
# Custom OID for roles in certificates
|
|
23
|
+
ROLE_EXTENSION_OID = "1.3.6.1.4.1.99999.1"
|
|
24
|
+
|
|
25
|
+
@staticmethod
|
|
26
|
+
def validate_single_role(role: str) -> bool:
|
|
27
|
+
"""
|
|
28
|
+
Validate a single role.
|
|
29
|
+
|
|
30
|
+
Args:
|
|
31
|
+
role: Role string to validate
|
|
32
|
+
|
|
33
|
+
Returns:
|
|
34
|
+
True if role is valid, False otherwise
|
|
35
|
+
"""
|
|
36
|
+
if not isinstance(role, str):
|
|
37
|
+
return False
|
|
38
|
+
|
|
39
|
+
# Check if role is not empty after trimming
|
|
40
|
+
if not role.strip():
|
|
41
|
+
return False
|
|
42
|
+
|
|
43
|
+
# Check for valid characters (alphanumeric, hyphens, underscores)
|
|
44
|
+
valid_chars = set(
|
|
45
|
+
"abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789-_"
|
|
46
|
+
)
|
|
47
|
+
role_chars = set(role.lower())
|
|
48
|
+
|
|
49
|
+
if not role_chars.issubset(valid_chars):
|
|
50
|
+
return False
|
|
51
|
+
|
|
52
|
+
# Check length (1-50 characters)
|
|
53
|
+
if len(role) < 1 or len(role) > 50:
|
|
54
|
+
return False
|
|
55
|
+
|
|
56
|
+
return True
|
|
57
|
+
|
|
58
|
+
@staticmethod
|
|
59
|
+
def normalize_role(role: str) -> str:
|
|
60
|
+
"""
|
|
61
|
+
Normalize role string.
|
|
62
|
+
|
|
63
|
+
Args:
|
|
64
|
+
role: Role string to normalize
|
|
65
|
+
|
|
66
|
+
Returns:
|
|
67
|
+
Normalized role string
|
|
68
|
+
"""
|
|
69
|
+
if not role:
|
|
70
|
+
return ""
|
|
71
|
+
|
|
72
|
+
# Convert to lowercase and trim whitespace
|
|
73
|
+
normalized = role.lower().strip()
|
|
74
|
+
|
|
75
|
+
# Replace multiple spaces with single space
|
|
76
|
+
normalized = " ".join(normalized.split())
|
|
77
|
+
|
|
78
|
+
# Replace spaces with hyphens
|
|
79
|
+
normalized = normalized.replace(" ", "-")
|
|
80
|
+
|
|
81
|
+
return normalized
|
|
82
|
+
|
|
83
|
+
@staticmethod
|
|
84
|
+
def normalize_roles(roles: List[str]) -> List[str]:
|
|
85
|
+
"""
|
|
86
|
+
Normalize list of roles.
|
|
87
|
+
|
|
88
|
+
Args:
|
|
89
|
+
roles: List of roles to normalize
|
|
90
|
+
|
|
91
|
+
Returns:
|
|
92
|
+
List of normalized roles
|
|
93
|
+
"""
|
|
94
|
+
if not roles:
|
|
95
|
+
return []
|
|
96
|
+
|
|
97
|
+
normalized = []
|
|
98
|
+
for role in roles:
|
|
99
|
+
normalized_role = RoleUtils.normalize_role(role)
|
|
100
|
+
if normalized_role and normalized_role not in normalized:
|
|
101
|
+
normalized.append(normalized_role)
|
|
102
|
+
|
|
103
|
+
return normalized
|
|
@@ -0,0 +1,343 @@
|
|
|
1
|
+
"""
|
|
2
|
+
Security Adapter for mcp_security_framework integration.
|
|
3
|
+
|
|
4
|
+
This module provides an adapter layer between mcp_proxy_adapter and mcp_security_framework,
|
|
5
|
+
handling configuration conversion and request validation.
|
|
6
|
+
"""
|
|
7
|
+
|
|
8
|
+
import json
|
|
9
|
+
import logging
|
|
10
|
+
from typing import Dict, Any, Optional
|
|
11
|
+
|
|
12
|
+
# Import mcp_security_framework components
|
|
13
|
+
try:
|
|
14
|
+
from mcp_security_framework import SecurityManager, SecurityConfig
|
|
15
|
+
from mcp_security_framework.schemas.config import (
|
|
16
|
+
AuthConfig,
|
|
17
|
+
SSLConfig,
|
|
18
|
+
PermissionConfig,
|
|
19
|
+
RateLimitConfig,
|
|
20
|
+
)
|
|
21
|
+
|
|
22
|
+
# Note: SecurityRequest and SecurityResult are not available in current version
|
|
23
|
+
SECURITY_FRAMEWORK_AVAILABLE = True
|
|
24
|
+
except ImportError as e:
|
|
25
|
+
# NO FALLBACK! mcp_security_framework is REQUIRED
|
|
26
|
+
raise RuntimeError(
|
|
27
|
+
f"CRITICAL: mcp_security_framework is required but not available: {e}. "
|
|
28
|
+
"Install it with: pip install mcp_security_framework>=1.2.8"
|
|
29
|
+
) from e
|
|
30
|
+
|
|
31
|
+
from mcp_proxy_adapter.core.logging import get_global_logger
|
|
32
|
+
|
|
33
|
+
|
|
34
|
+
class SecurityAdapter:
|
|
35
|
+
"""
|
|
36
|
+
Adapter for integrating with mcp_security_framework.
|
|
37
|
+
|
|
38
|
+
Provides methods to convert mcp_proxy_adapter configuration to SecurityConfig
|
|
39
|
+
and handle request validation through the security framework.
|
|
40
|
+
"""
|
|
41
|
+
|
|
42
|
+
def __init__(self, config: Dict[str, Any]):
|
|
43
|
+
"""
|
|
44
|
+
Initialize security adapter.
|
|
45
|
+
|
|
46
|
+
Args:
|
|
47
|
+
config: mcp_proxy_adapter configuration dictionary
|
|
48
|
+
"""
|
|
49
|
+
self.config = config
|
|
50
|
+
self.security_manager = None
|
|
51
|
+
|
|
52
|
+
if SECURITY_FRAMEWORK_AVAILABLE:
|
|
53
|
+
self.security_manager = self._create_security_manager()
|
|
54
|
+
get_global_logger().info("Security adapter initialized with mcp_security_framework")
|
|
55
|
+
else:
|
|
56
|
+
get_global_logger().warning("mcp_security_framework not available, using fallback mode")
|
|
57
|
+
|
|
58
|
+
def _create_security_manager(self) -> Optional[SecurityManager]:
|
|
59
|
+
"""
|
|
60
|
+
Create SecurityManager from mcp_proxy_adapter configuration.
|
|
61
|
+
|
|
62
|
+
Returns:
|
|
63
|
+
SecurityManager instance or None if framework not available
|
|
64
|
+
"""
|
|
65
|
+
if not SECURITY_FRAMEWORK_AVAILABLE:
|
|
66
|
+
return None
|
|
67
|
+
|
|
68
|
+
try:
|
|
69
|
+
security_config = self._convert_config()
|
|
70
|
+
return SecurityManager(security_config)
|
|
71
|
+
except Exception as e:
|
|
72
|
+
get_global_logger().error(f"Failed to create SecurityManager: {e}")
|
|
73
|
+
return None
|
|
74
|
+
|
|
75
|
+
def _convert_config(self) -> SecurityConfig:
|
|
76
|
+
"""
|
|
77
|
+
Convert mcp_proxy_adapter configuration to SecurityConfig.
|
|
78
|
+
|
|
79
|
+
Returns:
|
|
80
|
+
SecurityConfig instance
|
|
81
|
+
"""
|
|
82
|
+
# Get security configuration section
|
|
83
|
+
security_config = self.config.get("security", {})
|
|
84
|
+
|
|
85
|
+
# Convert auth configuration
|
|
86
|
+
auth_config = self._convert_auth_config(security_config)
|
|
87
|
+
|
|
88
|
+
# Convert SSL configuration
|
|
89
|
+
ssl_config = self._convert_ssl_config(security_config)
|
|
90
|
+
|
|
91
|
+
# Convert permissions configuration
|
|
92
|
+
permission_config = self._convert_permission_config(security_config)
|
|
93
|
+
|
|
94
|
+
# Convert rate limit configuration
|
|
95
|
+
rate_limit_config = self._convert_rate_limit_config(security_config)
|
|
96
|
+
|
|
97
|
+
return SecurityConfig(
|
|
98
|
+
auth=auth_config,
|
|
99
|
+
ssl=ssl_config,
|
|
100
|
+
permissions=permission_config,
|
|
101
|
+
rate_limit=rate_limit_config,
|
|
102
|
+
)
|
|
103
|
+
|
|
104
|
+
def _convert_auth_config(self, security_config: Dict[str, Any]) -> AuthConfig:
|
|
105
|
+
"""
|
|
106
|
+
Convert authentication configuration.
|
|
107
|
+
|
|
108
|
+
Args:
|
|
109
|
+
security_config: Security configuration section
|
|
110
|
+
|
|
111
|
+
Returns:
|
|
112
|
+
AuthConfig instance
|
|
113
|
+
"""
|
|
114
|
+
auth_config = security_config.get("auth", {})
|
|
115
|
+
|
|
116
|
+
# Get authentication methods
|
|
117
|
+
methods = auth_config.get("methods", ["api_key"])
|
|
118
|
+
|
|
119
|
+
# Get API keys from legacy config if not in security section
|
|
120
|
+
api_keys = auth_config.get("api_keys", {})
|
|
121
|
+
if not api_keys:
|
|
122
|
+
# Try to get from legacy SSL config
|
|
123
|
+
legacy_ssl = self.config.get("ssl", {})
|
|
124
|
+
if "api_keys" in legacy_ssl:
|
|
125
|
+
api_keys = legacy_ssl["api_keys"]
|
|
126
|
+
|
|
127
|
+
return AuthConfig(
|
|
128
|
+
enabled=auth_config.get("enabled", True),
|
|
129
|
+
methods=methods,
|
|
130
|
+
api_keys=api_keys,
|
|
131
|
+
jwt_secret=auth_config.get("jwt_secret", ""),
|
|
132
|
+
jwt_algorithm=auth_config.get("jwt_algorithm", "HS256"),
|
|
133
|
+
)
|
|
134
|
+
|
|
135
|
+
def _convert_ssl_config(self, security_config: Dict[str, Any]) -> SSLConfig:
|
|
136
|
+
"""
|
|
137
|
+
Convert SSL configuration.
|
|
138
|
+
|
|
139
|
+
Args:
|
|
140
|
+
security_config: Security configuration section
|
|
141
|
+
|
|
142
|
+
Returns:
|
|
143
|
+
SSLConfig instance
|
|
144
|
+
"""
|
|
145
|
+
ssl_config = security_config.get("ssl", {})
|
|
146
|
+
|
|
147
|
+
# Fallback to legacy SSL config if not in security section
|
|
148
|
+
if not ssl_config:
|
|
149
|
+
ssl_config = self.config.get("ssl", {})
|
|
150
|
+
|
|
151
|
+
return SSLConfig(
|
|
152
|
+
enabled=ssl_config.get("enabled", False),
|
|
153
|
+
cert_file=ssl_config.get("cert_file"),
|
|
154
|
+
key_file=ssl_config.get("key_file"),
|
|
155
|
+
ca_cert=ssl_config.get("ca_cert"),
|
|
156
|
+
min_tls_version=ssl_config.get("min_tls_version", "TLSv1.2"),
|
|
157
|
+
verify_client=ssl_config.get("verify_client", False),
|
|
158
|
+
client_cert_required=ssl_config.get("client_cert_required", False),
|
|
159
|
+
)
|
|
160
|
+
|
|
161
|
+
def _convert_permission_config(
|
|
162
|
+
self, security_config: Dict[str, Any]
|
|
163
|
+
) -> PermissionConfig:
|
|
164
|
+
"""
|
|
165
|
+
Convert permissions configuration.
|
|
166
|
+
|
|
167
|
+
Args:
|
|
168
|
+
security_config: Security configuration section
|
|
169
|
+
|
|
170
|
+
Returns:
|
|
171
|
+
PermissionConfig instance
|
|
172
|
+
"""
|
|
173
|
+
permission_config = security_config.get("permissions", {})
|
|
174
|
+
|
|
175
|
+
# Fallback to legacy roles config if not in security section
|
|
176
|
+
if not permission_config:
|
|
177
|
+
roles_config = self.config.get("roles", {})
|
|
178
|
+
permission_config = {
|
|
179
|
+
"enabled": roles_config.get("enabled", True),
|
|
180
|
+
"roles_file": roles_config.get("config_file", "roles.json"),
|
|
181
|
+
"default_role": "user",
|
|
182
|
+
}
|
|
183
|
+
|
|
184
|
+
return PermissionConfig(
|
|
185
|
+
enabled=permission_config.get("enabled", True),
|
|
186
|
+
roles_file=permission_config.get("roles_file", "roles.json"),
|
|
187
|
+
default_role=permission_config.get("default_role", "user"),
|
|
188
|
+
deny_by_default=permission_config.get("deny_by_default", True),
|
|
189
|
+
)
|
|
190
|
+
|
|
191
|
+
def _convert_rate_limit_config(
|
|
192
|
+
self, security_config: Dict[str, Any]
|
|
193
|
+
) -> RateLimitConfig:
|
|
194
|
+
"""
|
|
195
|
+
Convert rate limit configuration.
|
|
196
|
+
|
|
197
|
+
Args:
|
|
198
|
+
security_config: Security configuration section
|
|
199
|
+
|
|
200
|
+
Returns:
|
|
201
|
+
RateLimitConfig instance
|
|
202
|
+
"""
|
|
203
|
+
rate_limit_config = security_config.get("rate_limit", {})
|
|
204
|
+
|
|
205
|
+
return RateLimitConfig(
|
|
206
|
+
enabled=rate_limit_config.get("enabled", True),
|
|
207
|
+
requests_per_minute=rate_limit_config.get("requests_per_minute", 60),
|
|
208
|
+
requests_per_hour=rate_limit_config.get("requests_per_hour", 1000),
|
|
209
|
+
burst_limit=rate_limit_config.get("burst_limit", 10),
|
|
210
|
+
by_ip=rate_limit_config.get("by_ip", True),
|
|
211
|
+
by_user=rate_limit_config.get("by_user", True),
|
|
212
|
+
)
|
|
213
|
+
|
|
214
|
+
def validate_request(self, request_data: Dict[str, Any]) -> Dict[str, Any]:
|
|
215
|
+
"""
|
|
216
|
+
Validate request through mcp_security_framework.
|
|
217
|
+
|
|
218
|
+
Args:
|
|
219
|
+
request_data: Request data dictionary
|
|
220
|
+
|
|
221
|
+
Returns:
|
|
222
|
+
Validation result dictionary
|
|
223
|
+
"""
|
|
224
|
+
get_global_logger().debug(f"Security manager available: {self.security_manager is not None}")
|
|
225
|
+
if not self.security_manager:
|
|
226
|
+
# Fallback validation when framework is not available
|
|
227
|
+
get_global_logger().debug("Using fallback validation")
|
|
228
|
+
return self._fallback_validation(request_data)
|
|
229
|
+
|
|
230
|
+
try:
|
|
231
|
+
# Convert request data to SecurityRequest
|
|
232
|
+
security_request = self._create_security_request(request_data)
|
|
233
|
+
|
|
234
|
+
# Validate through security framework
|
|
235
|
+
result = self.security_manager.validate_request(security_request)
|
|
236
|
+
|
|
237
|
+
return result.to_dict()
|
|
238
|
+
|
|
239
|
+
except Exception as e:
|
|
240
|
+
get_global_logger().error(f"Security validation failed: {e}")
|
|
241
|
+
return {
|
|
242
|
+
"is_valid": False,
|
|
243
|
+
"error_code": -32603,
|
|
244
|
+
"error_message": f"Security validation error: {str(e)}",
|
|
245
|
+
"roles": [],
|
|
246
|
+
"user_id": None,
|
|
247
|
+
}
|
|
248
|
+
|
|
249
|
+
def _create_security_request(self, request_data: Dict[str, Any]) -> Dict[str, Any]:
|
|
250
|
+
"""
|
|
251
|
+
Create request data for security validation.
|
|
252
|
+
|
|
253
|
+
Args:
|
|
254
|
+
request_data: Request data dictionary
|
|
255
|
+
|
|
256
|
+
Returns:
|
|
257
|
+
Request data dictionary for security validation
|
|
258
|
+
"""
|
|
259
|
+
return {
|
|
260
|
+
"method": request_data.get("method", "GET"),
|
|
261
|
+
"path": request_data.get("path", "/"),
|
|
262
|
+
"headers": request_data.get("headers", {}),
|
|
263
|
+
"query_params": request_data.get("query_params", {}),
|
|
264
|
+
"client_ip": request_data.get("client_ip", "unknown"),
|
|
265
|
+
"body": request_data.get("body", {}),
|
|
266
|
+
}
|
|
267
|
+
|
|
268
|
+
def _fallback_validation(self, request_data: Dict[str, Any]) -> Dict[str, Any]:
|
|
269
|
+
"""
|
|
270
|
+
Fallback validation when mcp_security_framework is not available.
|
|
271
|
+
|
|
272
|
+
Args:
|
|
273
|
+
request_data: Request data dictionary
|
|
274
|
+
|
|
275
|
+
Returns:
|
|
276
|
+
Validation result dictionary
|
|
277
|
+
"""
|
|
278
|
+
# Simple API key validation as fallback
|
|
279
|
+
headers = request_data.get("headers", {})
|
|
280
|
+
query_params = request_data.get("query_params", {})
|
|
281
|
+
body = request_data.get("body", {})
|
|
282
|
+
|
|
283
|
+
# Check for API key in headers (FastAPI converts headers to lowercase)
|
|
284
|
+
api_key = headers.get("x-api-key") or headers.get("X-API-Key")
|
|
285
|
+
get_global_logger().debug(f"API key from headers: {api_key}")
|
|
286
|
+
|
|
287
|
+
# Check for API key in query parameters
|
|
288
|
+
if not api_key:
|
|
289
|
+
api_key = query_params.get("api_key")
|
|
290
|
+
get_global_logger().debug(f"API key from query params: {api_key}")
|
|
291
|
+
|
|
292
|
+
# Check for API key in JSON-RPC body
|
|
293
|
+
if not api_key and isinstance(body, dict):
|
|
294
|
+
api_key = body.get("params", {}).get("api_key")
|
|
295
|
+
get_global_logger().debug(f"API key from body: {api_key}")
|
|
296
|
+
|
|
297
|
+
# Get API keys from config
|
|
298
|
+
api_keys = self._get_api_keys()
|
|
299
|
+
get_global_logger().debug(f"Available API keys: {list(api_keys.keys())}")
|
|
300
|
+
|
|
301
|
+
if api_key and api_key in api_keys:
|
|
302
|
+
return {
|
|
303
|
+
"is_valid": True,
|
|
304
|
+
"error_code": None,
|
|
305
|
+
"error_message": None,
|
|
306
|
+
"roles": ["user"],
|
|
307
|
+
"user_id": api_keys[api_key],
|
|
308
|
+
}
|
|
309
|
+
else:
|
|
310
|
+
return {
|
|
311
|
+
"is_valid": False,
|
|
312
|
+
"error_code": -32000,
|
|
313
|
+
"error_message": "API key not provided or invalid",
|
|
314
|
+
"roles": [],
|
|
315
|
+
"user_id": None,
|
|
316
|
+
}
|
|
317
|
+
|
|
318
|
+
def _get_api_keys(self) -> Dict[str, str]:
|
|
319
|
+
"""
|
|
320
|
+
Get API keys from configuration.
|
|
321
|
+
|
|
322
|
+
Returns:
|
|
323
|
+
Dictionary mapping API keys to usernames
|
|
324
|
+
"""
|
|
325
|
+
# Try security config first
|
|
326
|
+
security_config = self.config.get("security", {})
|
|
327
|
+
auth_config = security_config.get("auth", {})
|
|
328
|
+
api_keys = auth_config.get("api_keys", {})
|
|
329
|
+
|
|
330
|
+
get_global_logger().debug(f"Security config: {security_config}")
|
|
331
|
+
get_global_logger().debug(f"Auth config: {auth_config}")
|
|
332
|
+
get_global_logger().debug(f"API keys from security config: {api_keys}")
|
|
333
|
+
|
|
334
|
+
# Fallback to legacy SSL config
|
|
335
|
+
if not api_keys:
|
|
336
|
+
ssl_config = self.config.get("ssl", {})
|
|
337
|
+
api_keys = ssl_config.get("api_keys", {})
|
|
338
|
+
get_global_logger().debug(f"API keys from SSL config: {api_keys}")
|
|
339
|
+
|
|
340
|
+
get_global_logger().info(f"Total API keys loaded: {len(api_keys)}")
|
|
341
|
+
return api_keys
|
|
342
|
+
|
|
343
|
+
|
|
@@ -0,0 +1,96 @@
|
|
|
1
|
+
"""
|
|
2
|
+
Security Factory for creating security components.
|
|
3
|
+
|
|
4
|
+
This module provides factory methods for creating security adapters, managers,
|
|
5
|
+
and middleware components with proper configuration and error handling.
|
|
6
|
+
"""
|
|
7
|
+
|
|
8
|
+
import logging
|
|
9
|
+
from typing import Dict, Any
|
|
10
|
+
|
|
11
|
+
from mcp_proxy_adapter.core.logging import get_global_logger
|
|
12
|
+
from .security_adapter import SecurityAdapter
|
|
13
|
+
|
|
14
|
+
|
|
15
|
+
class SecurityFactory:
|
|
16
|
+
"""
|
|
17
|
+
Factory for creating security components.
|
|
18
|
+
|
|
19
|
+
Provides static methods to create security adapters, managers,
|
|
20
|
+
and middleware components with proper configuration handling.
|
|
21
|
+
"""
|
|
22
|
+
|
|
23
|
+
@staticmethod
|
|
24
|
+
def create_security_adapter(config: Dict[str, Any]) -> SecurityAdapter:
|
|
25
|
+
"""
|
|
26
|
+
Create SecurityAdapter from configuration.
|
|
27
|
+
|
|
28
|
+
Args:
|
|
29
|
+
config: mcp_proxy_adapter configuration dictionary
|
|
30
|
+
|
|
31
|
+
Returns:
|
|
32
|
+
SecurityAdapter instance
|
|
33
|
+
"""
|
|
34
|
+
try:
|
|
35
|
+
adapter = SecurityAdapter(config)
|
|
36
|
+
get_global_logger().info("Security adapter created successfully")
|
|
37
|
+
return adapter
|
|
38
|
+
except Exception as e:
|
|
39
|
+
get_global_logger().error(f"Failed to create security adapter: {e}")
|
|
40
|
+
raise
|
|
41
|
+
|
|
42
|
+
@staticmethod
|
|
43
|
+
|
|
44
|
+
@staticmethod
|
|
45
|
+
def create_middleware(config: Dict[str, Any], framework: str = "fastapi"):
|
|
46
|
+
"""
|
|
47
|
+
Create framework-specific security middleware.
|
|
48
|
+
|
|
49
|
+
Args:
|
|
50
|
+
config: mcp_proxy_adapter configuration dictionary
|
|
51
|
+
framework: Framework type (fastapi, flask, etc.)
|
|
52
|
+
|
|
53
|
+
Returns:
|
|
54
|
+
Middleware instance or None if creation failed
|
|
55
|
+
"""
|
|
56
|
+
try:
|
|
57
|
+
adapter = SecurityFactory.create_security_adapter(config)
|
|
58
|
+
middleware = adapter.create_middleware(framework)
|
|
59
|
+
|
|
60
|
+
if middleware:
|
|
61
|
+
get_global_logger().info(f"Security middleware created for {framework}")
|
|
62
|
+
else:
|
|
63
|
+
get_global_logger().warning(f"Failed to create security middleware for {framework}")
|
|
64
|
+
|
|
65
|
+
return middleware
|
|
66
|
+
|
|
67
|
+
except Exception as e:
|
|
68
|
+
get_global_logger().error(f"Failed to create security middleware: {e}")
|
|
69
|
+
return None
|
|
70
|
+
|
|
71
|
+
@staticmethod
|
|
72
|
+
|
|
73
|
+
@staticmethod
|
|
74
|
+
|
|
75
|
+
@staticmethod
|
|
76
|
+
|
|
77
|
+
@staticmethod
|
|
78
|
+
|
|
79
|
+
@staticmethod
|
|
80
|
+
def _deep_merge(base_dict: Dict[str, Any], update_dict: Dict[str, Any]) -> None:
|
|
81
|
+
"""
|
|
82
|
+
Deep merge two dictionaries.
|
|
83
|
+
|
|
84
|
+
Args:
|
|
85
|
+
base_dict: Base dictionary to update
|
|
86
|
+
update_dict: Dictionary with updates
|
|
87
|
+
"""
|
|
88
|
+
for key, value in update_dict.items():
|
|
89
|
+
if (
|
|
90
|
+
key in base_dict
|
|
91
|
+
and isinstance(base_dict[key], dict)
|
|
92
|
+
and isinstance(value, dict)
|
|
93
|
+
):
|
|
94
|
+
SecurityFactory._deep_merge(base_dict[key], value)
|
|
95
|
+
else:
|
|
96
|
+
base_dict[key] = value
|