UNPKG

@modelcontextprotocol/sdk

Version:

Model Context Protocol implementation for TypeScript

136 lines 6.79 kB
"use strict"; var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { if (k2 === undefined) k2 = k; var desc = Object.getOwnPropertyDescriptor(m, k); if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) { desc = { enumerable: true, get: function() { return m[k]; } }; } Object.defineProperty(o, k2, desc); }) : (function(o, m, k, k2) { if (k2 === undefined) k2 = k; o[k2] = m[k]; })); var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { Object.defineProperty(o, "default", { enumerable: true, value: v }); }) : function(o, v) { o["default"] = v; }); var __importStar = (this && this.__importStar) || function (mod) { if (mod && mod.__esModule) return mod; var result = {}; if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); __setModuleDefault(result, mod); return result; }; var __importDefault = (this && this.__importDefault) || function (mod) { return (mod && mod.__esModule) ? mod : { "default": mod }; }; Object.defineProperty(exports, "__esModule", { value: true }); exports.tokenHandler = tokenHandler; const z = __importStar(require("zod/v4")); const express_1 = __importDefault(require("express")); const cors_1 = __importDefault(require("cors")); const pkce_challenge_1 = require("pkce-challenge"); const clientAuth_js_1 = require("../middleware/clientAuth.js"); const express_rate_limit_1 = require("express-rate-limit"); const allowedMethods_js_1 = require("../middleware/allowedMethods.js"); const errors_js_1 = require("../errors.js"); const TokenRequestSchema = z.object({ grant_type: z.string() }); const AuthorizationCodeGrantSchema = z.object({ code: z.string(), code_verifier: z.string(), redirect_uri: z.string().optional(), resource: z.string().url().optional() }); const RefreshTokenGrantSchema = z.object({ refresh_token: z.string(), scope: z.string().optional(), resource: z.string().url().optional() }); function tokenHandler({ provider, rateLimit: rateLimitConfig }) { // Nested router so we can configure middleware and restrict HTTP method const router = express_1.default.Router(); // Configure CORS to allow any origin, to make accessible to web-based MCP clients router.use((0, cors_1.default)()); router.use((0, allowedMethods_js_1.allowedMethods)(['POST'])); router.use(express_1.default.urlencoded({ extended: false })); // Apply rate limiting unless explicitly disabled if (rateLimitConfig !== false) { router.use((0, express_rate_limit_1.rateLimit)({ windowMs: 15 * 60 * 1000, // 15 minutes max: 50, // 50 requests per windowMs standardHeaders: true, legacyHeaders: false, message: new errors_js_1.TooManyRequestsError('You have exceeded the rate limit for token requests').toResponseObject(), ...rateLimitConfig })); } // Authenticate and extract client details router.use((0, clientAuth_js_1.authenticateClient)({ clientsStore: provider.clientsStore })); router.post('/', async (req, res) => { res.setHeader('Cache-Control', 'no-store'); try { const parseResult = TokenRequestSchema.safeParse(req.body); if (!parseResult.success) { throw new errors_js_1.InvalidRequestError(parseResult.error.message); } const { grant_type } = parseResult.data; const client = req.client; if (!client) { // This should never happen throw new errors_js_1.ServerError('Internal Server Error'); } switch (grant_type) { case 'authorization_code': { const parseResult = AuthorizationCodeGrantSchema.safeParse(req.body); if (!parseResult.success) { throw new errors_js_1.InvalidRequestError(parseResult.error.message); } const { code, code_verifier, redirect_uri, resource } = parseResult.data; const skipLocalPkceValidation = provider.skipLocalPkceValidation; // Perform local PKCE validation unless explicitly skipped // (e.g. to validate code_verifier in upstream server) if (!skipLocalPkceValidation) { const codeChallenge = await provider.challengeForAuthorizationCode(client, code); if (!(await (0, pkce_challenge_1.verifyChallenge)(code_verifier, codeChallenge))) { throw new errors_js_1.InvalidGrantError('code_verifier does not match the challenge'); } } // Passes the code_verifier to the provider if PKCE validation didn't occur locally const tokens = await provider.exchangeAuthorizationCode(client, code, skipLocalPkceValidation ? code_verifier : undefined, redirect_uri, resource ? new URL(resource) : undefined); res.status(200).json(tokens); break; } case 'refresh_token': { const parseResult = RefreshTokenGrantSchema.safeParse(req.body); if (!parseResult.success) { throw new errors_js_1.InvalidRequestError(parseResult.error.message); } const { refresh_token, scope, resource } = parseResult.data; const scopes = scope?.split(' '); const tokens = await provider.exchangeRefreshToken(client, refresh_token, scopes, resource ? new URL(resource) : undefined); res.status(200).json(tokens); break; } // Additional auth methods will not be added on the server side of the SDK. case 'client_credentials': default: throw new errors_js_1.UnsupportedGrantTypeError('The grant type is not supported by this authorization server.'); } } catch (error) { if (error instanceof errors_js_1.OAuthError) { const status = error instanceof errors_js_1.ServerError ? 500 : 400; res.status(status).json(error.toResponseObject()); } else { const serverError = new errors_js_1.ServerError('Internal Server Error'); res.status(500).json(serverError.toResponseObject()); } } }); return router; } //# sourceMappingURL=token.js.map