mirror of
https://github.com/samanhappy/mcphub.git
synced 2025-12-31 20:00:00 -05:00
Compare commits
41 Commits
copilot/fi
...
copilot/im
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
b67111219d | ||
|
|
f280cd593d | ||
|
|
d25a85a1bf | ||
|
|
1b752827a5 | ||
|
|
8ae542bdab | ||
|
|
88ce94b988 | ||
|
|
7cc330e721 | ||
|
|
ab338e80a7 | ||
|
|
b00e1c81fc | ||
|
|
33eae50bd3 | ||
|
|
eb1a965e45 | ||
|
|
97114dcabb | ||
|
|
350a022ea3 | ||
|
|
292876a991 | ||
|
|
d6a9146e27 | ||
|
|
1f3a6794ea | ||
|
|
c673afb97e | ||
|
|
01855ca2ca | ||
|
|
88efad9d60 | ||
|
|
2028233b53 | ||
|
|
1dfa0a990b | ||
|
|
ab7c210281 | ||
|
|
6bd28ec89b | ||
|
|
41a42f82d0 | ||
|
|
7aa3ff3bb1 | ||
|
|
71667dab2c | ||
|
|
1921a0363b | ||
|
|
f9fe2e444b | ||
|
|
8d420a927b | ||
|
|
cb77593fd7 | ||
|
|
dbcebecf40 | ||
|
|
54e877cbd8 | ||
|
|
61b748151f | ||
|
|
4f05815210 | ||
|
|
691d91f207 | ||
|
|
3d58042ce5 | ||
|
|
81486b09df | ||
|
|
a41707c228 | ||
|
|
7391e57f35 | ||
|
|
9d8f5ba370 | ||
|
|
764959eaca |
272
.github/copilot-instructions.md
vendored
272
.github/copilot-instructions.md
vendored
@@ -1,272 +0,0 @@
|
|||||||
# MCPHub Coding Instructions
|
|
||||||
|
|
||||||
**ALWAYS follow these instructions first and only fallback to additional search and context gathering if the information here is incomplete or found to be in error.**
|
|
||||||
|
|
||||||
## Project Overview
|
|
||||||
|
|
||||||
MCPHub is a TypeScript/Node.js MCP (Model Context Protocol) server management hub that provides unified access through HTTP endpoints. It serves as a centralized dashboard for managing multiple MCP servers with real-time monitoring, authentication, and flexible routing.
|
|
||||||
|
|
||||||
**Core Components:**
|
|
||||||
|
|
||||||
- **Backend**: Express.js + TypeScript + ESM (`src/server.ts`)
|
|
||||||
- **Frontend**: React/Vite + Tailwind CSS (`frontend/`)
|
|
||||||
- **MCP Integration**: Connects multiple MCP servers (`src/services/mcpService.ts`)
|
|
||||||
- **Authentication**: JWT-based with bcrypt password hashing
|
|
||||||
- **Configuration**: JSON-based MCP server definitions (`mcp_settings.json`)
|
|
||||||
- **Documentation**: API docs and usage instructions(`docs/`)
|
|
||||||
|
|
||||||
## Working Effectively
|
|
||||||
|
|
||||||
### Bootstrap and Setup (CRITICAL - Follow Exact Steps)
|
|
||||||
|
|
||||||
```bash
|
|
||||||
# Install pnpm if not available
|
|
||||||
npm install -g pnpm
|
|
||||||
|
|
||||||
# Install dependencies - takes ~30 seconds
|
|
||||||
pnpm install
|
|
||||||
|
|
||||||
# Setup environment (optional)
|
|
||||||
cp .env.example .env
|
|
||||||
|
|
||||||
# Build and test to verify setup
|
|
||||||
pnpm lint # ~3 seconds - NEVER CANCEL
|
|
||||||
pnpm backend:build # ~5 seconds - NEVER CANCEL
|
|
||||||
pnpm test:ci # ~16 seconds - NEVER CANCEL. Set timeout to 60+ seconds
|
|
||||||
pnpm frontend:build # ~5 seconds - NEVER CANCEL
|
|
||||||
pnpm build # ~10 seconds total - NEVER CANCEL. Set timeout to 60+ seconds
|
|
||||||
```
|
|
||||||
|
|
||||||
**CRITICAL TIMING**: These commands are fast but NEVER CANCEL them. Always wait for completion.
|
|
||||||
|
|
||||||
### Development Environment
|
|
||||||
|
|
||||||
```bash
|
|
||||||
# Start both backend and frontend (recommended for most development)
|
|
||||||
pnpm dev # Backend on :3001, Frontend on :5173
|
|
||||||
|
|
||||||
# OR start separately (required on Windows, optional on Linux/macOS)
|
|
||||||
# Terminal 1: Backend only
|
|
||||||
pnpm backend:dev # Runs on port 3000 (or PORT env var)
|
|
||||||
|
|
||||||
# Terminal 2: Frontend only
|
|
||||||
pnpm frontend:dev # Runs on port 5173, proxies API to backend
|
|
||||||
```
|
|
||||||
|
|
||||||
**NEVER CANCEL**: Development servers may take 10-15 seconds to fully initialize all MCP servers.
|
|
||||||
|
|
||||||
### Build Commands (Production)
|
|
||||||
|
|
||||||
```bash
|
|
||||||
# Full production build - takes ~10 seconds total
|
|
||||||
pnpm build # NEVER CANCEL - Set timeout to 60+ seconds
|
|
||||||
|
|
||||||
# Individual builds
|
|
||||||
pnpm backend:build # TypeScript compilation - ~5 seconds
|
|
||||||
pnpm frontend:build # Vite build - ~5 seconds
|
|
||||||
|
|
||||||
# Start production server
|
|
||||||
pnpm start # Requires dist/ and frontend/dist/ to exist
|
|
||||||
```
|
|
||||||
|
|
||||||
### Testing and Validation
|
|
||||||
|
|
||||||
```bash
|
|
||||||
# Run all tests - takes ~16 seconds with 73 tests
|
|
||||||
pnpm test:ci # NEVER CANCEL - Set timeout to 60+ seconds
|
|
||||||
|
|
||||||
# Development testing
|
|
||||||
pnpm test # Interactive mode
|
|
||||||
pnpm test:watch # Watch mode for development
|
|
||||||
pnpm test:coverage # With coverage report
|
|
||||||
|
|
||||||
# Code quality
|
|
||||||
pnpm lint # ESLint - ~3 seconds
|
|
||||||
pnpm format # Prettier formatting - ~3 seconds
|
|
||||||
```
|
|
||||||
|
|
||||||
**CRITICAL**: All tests MUST pass before committing. Do not modify tests to make them pass unless specifically required for your changes.
|
|
||||||
|
|
||||||
## Manual Validation Requirements
|
|
||||||
|
|
||||||
**ALWAYS perform these validation steps after making changes:**
|
|
||||||
|
|
||||||
### 1. Basic Application Functionality
|
|
||||||
|
|
||||||
```bash
|
|
||||||
# Start the application
|
|
||||||
pnpm dev
|
|
||||||
|
|
||||||
# Verify backend responds (in another terminal)
|
|
||||||
curl http://localhost:3000/api/health
|
|
||||||
# Expected: Should return health status
|
|
||||||
|
|
||||||
# Verify frontend serves
|
|
||||||
curl -I http://localhost:3000/
|
|
||||||
# Expected: HTTP 200 OK with HTML content
|
|
||||||
```
|
|
||||||
|
|
||||||
### 2. MCP Server Integration Test
|
|
||||||
|
|
||||||
```bash
|
|
||||||
# Check MCP servers are loading (look for log messages)
|
|
||||||
# Expected log output should include:
|
|
||||||
# - "Successfully connected client for server: [name]"
|
|
||||||
# - "Successfully listed [N] tools for server: [name]"
|
|
||||||
# - Some servers may fail due to missing API keys (normal in dev)
|
|
||||||
```
|
|
||||||
|
|
||||||
### 3. Build Verification
|
|
||||||
|
|
||||||
```bash
|
|
||||||
# Verify production build works
|
|
||||||
pnpm build
|
|
||||||
node scripts/verify-dist.js
|
|
||||||
# Expected: "✅ Verification passed! Frontend and backend dist files are present."
|
|
||||||
```
|
|
||||||
|
|
||||||
**NEVER skip these validation steps**. If any fail, debug and fix before proceeding.
|
|
||||||
|
|
||||||
## Project Structure and Key Files
|
|
||||||
|
|
||||||
### Critical Backend Files
|
|
||||||
|
|
||||||
- `src/index.ts` - Application entry point
|
|
||||||
- `src/server.ts` - Express server setup and middleware
|
|
||||||
- `src/services/mcpService.ts` - **Core MCP server management logic**
|
|
||||||
- `src/config/index.ts` - Configuration management
|
|
||||||
- `src/routes/` - HTTP route definitions
|
|
||||||
- `src/controllers/` - HTTP request handlers
|
|
||||||
- `src/dao/` - Data access layer (supports JSON file & PostgreSQL)
|
|
||||||
- `src/db/` - TypeORM entities & repositories (for PostgreSQL mode)
|
|
||||||
- `src/types/index.ts` - TypeScript type definitions
|
|
||||||
|
|
||||||
### DAO Layer (Dual Data Source)
|
|
||||||
|
|
||||||
MCPHub supports **JSON file** (default) and **PostgreSQL** storage:
|
|
||||||
|
|
||||||
- Set `USE_DB=true` + `DB_URL=postgresql://...` to use database
|
|
||||||
- When modifying data structures, update: `src/types/`, `src/dao/`, `src/db/entities/`, `src/db/repositories/`, `src/utils/migration.ts`
|
|
||||||
- See `AGENTS.md` for detailed DAO modification checklist
|
|
||||||
|
|
||||||
### Critical Frontend Files
|
|
||||||
|
|
||||||
- `frontend/src/` - React application source
|
|
||||||
- `frontend/src/pages/` - Page components (development entry point)
|
|
||||||
- `frontend/src/components/` - Reusable UI components
|
|
||||||
- `frontend/src/utils/fetchInterceptor.js` - Backend API interaction
|
|
||||||
|
|
||||||
### Configuration Files
|
|
||||||
|
|
||||||
- `mcp_settings.json` - **MCP server definitions and user accounts**
|
|
||||||
- `package.json` - Dependencies and scripts
|
|
||||||
- `tsconfig.json` - TypeScript configuration
|
|
||||||
- `jest.config.cjs` - Test configuration
|
|
||||||
- `.eslintrc.json` - Linting rules
|
|
||||||
|
|
||||||
### Docker and Deployment
|
|
||||||
|
|
||||||
- `Dockerfile` - Multi-stage build with Python base + Node.js
|
|
||||||
- `entrypoint.sh` - Docker startup script
|
|
||||||
- `bin/cli.js` - NPM package CLI entry point
|
|
||||||
|
|
||||||
## Development Process and Conventions
|
|
||||||
|
|
||||||
### Code Style Requirements
|
|
||||||
|
|
||||||
- **ESM modules**: Always use `.js` extensions in imports, not `.ts`
|
|
||||||
- **English only**: All code comments must be written in English
|
|
||||||
- **TypeScript strict**: Follow strict type checking rules
|
|
||||||
- **Import style**: `import { something } from './file.js'` (note .js extension)
|
|
||||||
|
|
||||||
### Key Configuration Notes
|
|
||||||
|
|
||||||
- **MCP servers**: Defined in `mcp_settings.json` with command/args
|
|
||||||
- **Endpoints**: `/mcp/{group|server}` and `/mcp/$smart` for routing
|
|
||||||
- **i18n**: Frontend uses react-i18next with files in `locales/` folder
|
|
||||||
- **Authentication**: JWT tokens with bcrypt password hashing
|
|
||||||
- **Default credentials**: admin/admin123 (configured in mcp_settings.json)
|
|
||||||
|
|
||||||
### Development Entry Points
|
|
||||||
|
|
||||||
- **Add MCP server**: Modify `mcp_settings.json` and restart
|
|
||||||
- **New API endpoint**: Add route in `src/routes/`, controller in `src/controllers/`
|
|
||||||
- **Frontend feature**: Start from `frontend/src/pages/` or `frontend/src/components/`
|
|
||||||
- **Add tests**: Follow patterns in `tests/` directory
|
|
||||||
|
|
||||||
### Common Development Tasks
|
|
||||||
|
|
||||||
#### Adding a new MCP server:
|
|
||||||
|
|
||||||
1. Add server definition to `mcp_settings.json`
|
|
||||||
2. Restart backend to load new server
|
|
||||||
3. Check logs for successful connection
|
|
||||||
4. Test via dashboard or API endpoints
|
|
||||||
|
|
||||||
#### API development:
|
|
||||||
|
|
||||||
1. Define route in `src/routes/`
|
|
||||||
2. Implement controller in `src/controllers/`
|
|
||||||
3. Add types in `src/types/index.ts` if needed
|
|
||||||
4. Write tests in `tests/controllers/`
|
|
||||||
|
|
||||||
#### Frontend development:
|
|
||||||
|
|
||||||
1. Create/modify components in `frontend/src/components/`
|
|
||||||
2. Add pages in `frontend/src/pages/`
|
|
||||||
3. Update routing if needed
|
|
||||||
4. Test in development mode with `pnpm frontend:dev`
|
|
||||||
|
|
||||||
#### Documentation:
|
|
||||||
|
|
||||||
1. Update or add docs in `docs/` folder
|
|
||||||
2. Ensure README.md reflects any major changes
|
|
||||||
|
|
||||||
## Validation and CI Requirements
|
|
||||||
|
|
||||||
### Before Committing - ALWAYS Run:
|
|
||||||
|
|
||||||
```bash
|
|
||||||
pnpm lint # Must pass - ~3 seconds
|
|
||||||
pnpm backend:build # Must compile - ~5 seconds
|
|
||||||
pnpm test:ci # All tests must pass - ~16 seconds
|
|
||||||
pnpm build # Full build must work - ~10 seconds
|
|
||||||
```
|
|
||||||
|
|
||||||
**CRITICAL**: CI will fail if any of these commands fail. Fix issues locally first.
|
|
||||||
|
|
||||||
### CI Pipeline (.github/workflows/ci.yml)
|
|
||||||
|
|
||||||
- Runs on Node.js 20.x
|
|
||||||
- Tests: linting, type checking, unit tests with coverage
|
|
||||||
- **NEVER CANCEL**: CI builds may take 2-3 minutes total
|
|
||||||
|
|
||||||
## Troubleshooting
|
|
||||||
|
|
||||||
### Common Issues
|
|
||||||
|
|
||||||
- **"uvx command not found"**: Some MCP servers require `uvx` (Python package manager) - this is expected in development
|
|
||||||
- **Port already in use**: Change PORT environment variable or kill existing processes
|
|
||||||
- **Frontend not loading**: Ensure frontend was built with `pnpm frontend:build`
|
|
||||||
- **MCP server connection failed**: Check server command/args in `mcp_settings.json`
|
|
||||||
|
|
||||||
### Build Failures
|
|
||||||
|
|
||||||
- **TypeScript errors**: Run `pnpm backend:build` to see compilation errors
|
|
||||||
- **Test failures**: Run `pnpm test:verbose` for detailed test output
|
|
||||||
- **Lint errors**: Run `pnpm lint` and fix reported issues
|
|
||||||
|
|
||||||
### Development Issues
|
|
||||||
|
|
||||||
- **Backend not starting**: Check for port conflicts, verify `mcp_settings.json` syntax
|
|
||||||
- **Frontend proxy errors**: Ensure backend is running before starting frontend
|
|
||||||
- **Hot reload not working**: Restart development server
|
|
||||||
|
|
||||||
## Performance Notes
|
|
||||||
|
|
||||||
- **Install time**: pnpm install takes ~30 seconds
|
|
||||||
- **Build time**: Full build takes ~10 seconds
|
|
||||||
- **Test time**: Complete test suite takes ~16 seconds
|
|
||||||
- **Startup time**: Backend initialization takes 10-15 seconds (MCP server connections)
|
|
||||||
|
|
||||||
**Remember**: NEVER CANCEL any build or test commands. Always wait for completion even if they seem slow.
|
|
||||||
2
.github/workflows/ci.yml
vendored
2
.github/workflows/ci.yml
vendored
@@ -76,7 +76,7 @@ jobs:
|
|||||||
|
|
||||||
# services:
|
# services:
|
||||||
# postgres:
|
# postgres:
|
||||||
# image: postgres:15
|
# image: pgvector/pgvector:pg17
|
||||||
# env:
|
# env:
|
||||||
# POSTGRES_PASSWORD: postgres
|
# POSTGRES_PASSWORD: postgres
|
||||||
# POSTGRES_DB: mcphub_test
|
# POSTGRES_DB: mcphub_test
|
||||||
|
|||||||
386
AGENTS.md
386
AGENTS.md
@@ -1,26 +1,214 @@
|
|||||||
# Repository Guidelines
|
# MCPHub Development Guide & Agent Instructions
|
||||||
|
|
||||||
These notes align current contributors around the code layout, daily commands, and collaboration habits that keep `@samanhappy/mcphub` moving quickly.
|
**ALWAYS follow these instructions first and only fallback to additional search and context gathering if the information here is incomplete or found to be in error.**
|
||||||
|
|
||||||
|
This document serves as the primary reference for all contributors and AI agents working on `@samanhappy/mcphub`. It provides comprehensive guidance on code organization, development workflow, and project conventions.
|
||||||
|
|
||||||
|
## Project Overview
|
||||||
|
|
||||||
|
MCPHub is a TypeScript/Node.js MCP (Model Context Protocol) server management hub that provides unified access through HTTP endpoints. It serves as a centralized dashboard for managing multiple MCP servers with real-time monitoring, authentication, and flexible routing.
|
||||||
|
|
||||||
|
**Core Components:**
|
||||||
|
|
||||||
|
- **Backend**: Express.js + TypeScript + ESM (`src/server.ts`)
|
||||||
|
- **Frontend**: React/Vite + Tailwind CSS (`frontend/`)
|
||||||
|
- **MCP Integration**: Connects multiple MCP servers (`src/services/mcpService.ts`)
|
||||||
|
- **Authentication**: JWT-based with bcrypt password hashing
|
||||||
|
- **Configuration**: JSON-based MCP server definitions (`mcp_settings.json`)
|
||||||
|
- **Documentation**: API docs and usage instructions(`docs/`)
|
||||||
|
|
||||||
|
## Bootstrap and Setup (CRITICAL - Follow Exact Steps)
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# Install pnpm if not available
|
||||||
|
npm install -g pnpm
|
||||||
|
|
||||||
|
# Install dependencies - takes ~30 seconds
|
||||||
|
pnpm install
|
||||||
|
|
||||||
|
# Setup environment (optional)
|
||||||
|
cp .env.example .env
|
||||||
|
|
||||||
|
# Build and test to verify setup
|
||||||
|
pnpm lint # ~3 seconds - NEVER CANCEL
|
||||||
|
pnpm backend:build # ~5 seconds - NEVER CANCEL
|
||||||
|
pnpm test:ci # ~16 seconds - NEVER CANCEL. Set timeout to 60+ seconds
|
||||||
|
pnpm frontend:build # ~5 seconds - NEVER CANCEL
|
||||||
|
pnpm build # ~10 seconds total - NEVER CANCEL. Set timeout to 60+ seconds
|
||||||
|
```
|
||||||
|
|
||||||
|
**CRITICAL TIMING**: These commands are fast but NEVER CANCEL them. Always wait for completion.
|
||||||
|
|
||||||
|
## Manual Validation Requirements
|
||||||
|
|
||||||
|
**ALWAYS perform these validation steps after making changes:**
|
||||||
|
|
||||||
|
### 1. Basic Application Functionality
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# Start the application
|
||||||
|
pnpm dev
|
||||||
|
|
||||||
|
# Verify backend responds (in another terminal)
|
||||||
|
curl http://localhost:3000/api/health
|
||||||
|
# Expected: Should return health status
|
||||||
|
|
||||||
|
# Verify frontend serves
|
||||||
|
curl -I http://localhost:3000/
|
||||||
|
# Expected: HTTP 200 OK with HTML content
|
||||||
|
```
|
||||||
|
|
||||||
|
### 2. MCP Server Integration Test
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# Check MCP servers are loading (look for log messages)
|
||||||
|
# Expected log output should include:
|
||||||
|
# - "Successfully connected client for server: [name]"
|
||||||
|
# - "Successfully listed [N] tools for server: [name]"
|
||||||
|
# - Some servers may fail due to missing API keys (normal in dev)
|
||||||
|
```
|
||||||
|
|
||||||
|
### 3. Build Verification
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# Verify production build works
|
||||||
|
pnpm build
|
||||||
|
node scripts/verify-dist.js
|
||||||
|
# Expected: "✅ Verification passed! Frontend and backend dist files are present."
|
||||||
|
```
|
||||||
|
|
||||||
|
**NEVER skip these validation steps**. If any fail, debug and fix before proceeding.
|
||||||
|
|
||||||
## Project Structure & Module Organization
|
## Project Structure & Module Organization
|
||||||
|
|
||||||
- Backend services live in `src`, grouped by responsibility (`controllers/`, `services/`, `dao/`, `routes/`, `utils/`), with `server.ts` orchestrating HTTP bootstrap.
|
### Critical Backend Files
|
||||||
- `frontend/src` contains the Vite + React dashboard; `frontend/public` hosts static assets and translations sit in `locales/`.
|
|
||||||
- Jest-aware test code is split between colocated specs (`src/**/*.{test,spec}.ts`) and higher-level suites in `tests/`; use `tests/utils/` helpers when exercising the CLI or SSE flows.
|
- `src/index.ts` - Application entry point
|
||||||
- Build artifacts and bundles are generated into `dist/`, `frontend/dist/`, and `coverage/`; never edit these manually.
|
- `src/server.ts` - Express server setup and middleware (orchestrating HTTP bootstrap)
|
||||||
|
- `src/services/mcpService.ts` - **Core MCP server management logic**
|
||||||
|
- `src/config/index.ts` - Configuration management
|
||||||
|
- `src/routes/` - HTTP route definitions
|
||||||
|
- `src/controllers/` - HTTP request handlers
|
||||||
|
- `src/dao/` - Data access layer (supports JSON file & PostgreSQL)
|
||||||
|
- `src/db/` - TypeORM entities & repositories (for PostgreSQL mode)
|
||||||
|
- `src/types/index.ts` - TypeScript type definitions and shared DTOs
|
||||||
|
- `src/utils/` - Utility functions and helpers
|
||||||
|
|
||||||
|
### Critical Frontend Files
|
||||||
|
|
||||||
|
- `frontend/src/` - React application source (Vite + React dashboard)
|
||||||
|
- `frontend/src/pages/` - Page components (development entry point)
|
||||||
|
- `frontend/src/components/` - Reusable UI components
|
||||||
|
- `frontend/src/utils/fetchInterceptor.js` - Backend API interaction
|
||||||
|
- `frontend/public/` - Static assets
|
||||||
|
|
||||||
|
### Configuration Files
|
||||||
|
|
||||||
|
- `mcp_settings.json` - **MCP server definitions and user accounts**
|
||||||
|
- `package.json` - Dependencies and scripts
|
||||||
|
- `tsconfig.json` - TypeScript configuration
|
||||||
|
- `jest.config.cjs` - Test configuration
|
||||||
|
- `.eslintrc.json` - Linting rules
|
||||||
|
|
||||||
|
### Test Organization
|
||||||
|
|
||||||
|
- Jest-aware test code is split between colocated specs (`src/**/*.{test,spec}.ts`) and higher-level suites in `tests/`
|
||||||
|
- Use `tests/utils/` helpers when exercising the CLI or SSE flows
|
||||||
|
- Mirror production directory names when adding new suites
|
||||||
|
- End filenames with `.test.ts` or `.spec.ts` for automatic discovery
|
||||||
|
|
||||||
|
### Build Artifacts
|
||||||
|
|
||||||
|
- `dist/` - Backend build output (TypeScript compilation)
|
||||||
|
- `frontend/dist/` - Frontend build output (Vite bundle)
|
||||||
|
- `coverage/` - Test coverage reports
|
||||||
|
- **Never edit these manually**
|
||||||
|
|
||||||
|
### Localization
|
||||||
|
|
||||||
|
- Translations sit in `locales/` (en.json, fr.json, tr.json, zh.json)
|
||||||
|
- Frontend uses react-i18next
|
||||||
|
|
||||||
|
### Docker and Deployment
|
||||||
|
|
||||||
|
- `Dockerfile` - Multi-stage build with Python base + Node.js
|
||||||
|
- `entrypoint.sh` - Docker startup script
|
||||||
|
- `bin/cli.js` - NPM package CLI entry point
|
||||||
|
|
||||||
## Build, Test, and Development Commands
|
## Build, Test, and Development Commands
|
||||||
|
|
||||||
- `pnpm dev` runs backend (`tsx watch src/index.ts`) and frontend (`vite`) together for local iteration.
|
### Development Environment
|
||||||
- `pnpm backend:dev`, `pnpm frontend:dev`, and `pnpm frontend:preview` target each surface independently; prefer them when debugging one stack.
|
|
||||||
- `pnpm build` executes `pnpm backend:build` (TypeScript to `dist/`) and `pnpm frontend:build`; run before release or publishing.
|
```bash
|
||||||
- `pnpm test`, `pnpm test:watch`, and `pnpm test:coverage` drive Jest; `pnpm lint` and `pnpm format` enforce style via ESLint and Prettier.
|
# Start both backend and frontend (recommended for most development)
|
||||||
|
pnpm dev # Backend on :3001, Frontend on :5173
|
||||||
|
|
||||||
|
# OR start separately (required on Windows, optional on Linux/macOS)
|
||||||
|
# Terminal 1: Backend only
|
||||||
|
pnpm backend:dev # Runs on port 3000 (or PORT env var)
|
||||||
|
|
||||||
|
# Terminal 2: Frontend only
|
||||||
|
pnpm frontend:dev # Runs on port 5173, proxies API to backend
|
||||||
|
|
||||||
|
# Frontend preview (production build)
|
||||||
|
pnpm frontend:preview # Preview production build
|
||||||
|
```
|
||||||
|
|
||||||
|
**NEVER CANCEL**: Development servers may take 10-15 seconds to fully initialize all MCP servers.
|
||||||
|
|
||||||
|
### Production Build
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# Full production build - takes ~10 seconds total
|
||||||
|
pnpm build # NEVER CANCEL - Set timeout to 60+ seconds
|
||||||
|
|
||||||
|
# Individual builds
|
||||||
|
pnpm backend:build # TypeScript compilation to dist/ - ~5 seconds
|
||||||
|
pnpm frontend:build # Vite build to frontend/dist/ - ~5 seconds
|
||||||
|
|
||||||
|
# Start production server
|
||||||
|
pnpm start # Requires dist/ and frontend/dist/ to exist
|
||||||
|
```
|
||||||
|
|
||||||
|
Run `pnpm build` before release or publishing.
|
||||||
|
|
||||||
|
### Testing and Validation
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# Run all tests - takes ~16 seconds with 73 tests
|
||||||
|
pnpm test:ci # NEVER CANCEL - Set timeout to 60+ seconds
|
||||||
|
|
||||||
|
# Development testing
|
||||||
|
pnpm test # Interactive mode
|
||||||
|
pnpm test:watch # Watch mode for development
|
||||||
|
pnpm test:coverage # With coverage report
|
||||||
|
|
||||||
|
# Code quality
|
||||||
|
pnpm lint # ESLint - ~3 seconds
|
||||||
|
pnpm format # Prettier formatting - ~3 seconds
|
||||||
|
```
|
||||||
|
|
||||||
|
**CRITICAL**: All tests MUST pass before committing. Do not modify tests to make them pass unless specifically required for your changes.
|
||||||
|
|
||||||
|
### Performance Notes
|
||||||
|
|
||||||
|
- **Install time**: pnpm install takes ~30 seconds
|
||||||
|
- **Build time**: Full build takes ~10 seconds
|
||||||
|
- **Test time**: Complete test suite takes ~16 seconds
|
||||||
|
- **Startup time**: Backend initialization takes 10-15 seconds (MCP server connections)
|
||||||
|
|
||||||
## Coding Style & Naming Conventions
|
## Coding Style & Naming Conventions
|
||||||
|
|
||||||
- TypeScript everywhere; default to 2-space indentation and single quotes, letting Prettier settle formatting. ESLint configuration assumes ES modules.
|
- **TypeScript everywhere**: Default to 2-space indentation and single quotes, letting Prettier settle formatting
|
||||||
- Name services and data access layers with suffixes (`UserService`, `AuthDao`), React components and files in `PascalCase`, and utility modules in `camelCase`.
|
- **ESM modules**: Always use `.js` extensions in imports, not `.ts` (e.g., `import { something } from './file.js'`)
|
||||||
- Keep DTOs and shared types in `src/types` to avoid duplication; re-export through index files only when it clarifies imports.
|
- **English only**: All code comments must be written in English
|
||||||
|
- **TypeScript strict**: Follow strict type checking rules
|
||||||
|
- **Naming conventions**:
|
||||||
|
- Services and data access layers: Use suffixes (`UserService`, `AuthDao`)
|
||||||
|
- React components and files: `PascalCase`
|
||||||
|
- Utility modules: `camelCase`
|
||||||
|
- **Types and DTOs**: Keep in `src/types` to avoid duplication; re-export through index files only when it clarifies imports
|
||||||
|
- **ESLint configuration**: Assumes ES modules
|
||||||
|
|
||||||
## Testing Guidelines
|
## Testing Guidelines
|
||||||
|
|
||||||
@@ -28,12 +216,86 @@ These notes align current contributors around the code layout, daily commands, a
|
|||||||
- Mirror production directory names when adding new suites and end filenames with `.test.ts` or `.spec.ts` for automatic discovery.
|
- Mirror production directory names when adding new suites and end filenames with `.test.ts` or `.spec.ts` for automatic discovery.
|
||||||
- Aim to maintain or raise coverage when touching critical flows (auth, OAuth, SSE); add integration tests under `tests/integration/` when touching cross-service logic.
|
- Aim to maintain or raise coverage when touching critical flows (auth, OAuth, SSE); add integration tests under `tests/integration/` when touching cross-service logic.
|
||||||
|
|
||||||
|
## Key Configuration Notes
|
||||||
|
|
||||||
|
- **MCP servers**: Defined in `mcp_settings.json` with command/args
|
||||||
|
- **Endpoints**: `/mcp/{group|server}` and `/mcp/$smart` for routing
|
||||||
|
- **i18n**: Frontend uses react-i18next with files in `locales/` folder
|
||||||
|
- **Authentication**: JWT tokens with bcrypt password hashing
|
||||||
|
- **Default credentials**: admin/admin123 (configured in mcp_settings.json)
|
||||||
|
|
||||||
|
## Development Entry Points
|
||||||
|
|
||||||
|
### Adding a new MCP server
|
||||||
|
|
||||||
|
1. Add server definition to `mcp_settings.json`
|
||||||
|
2. Restart backend to load new server
|
||||||
|
3. Check logs for successful connection
|
||||||
|
4. Test via dashboard or API endpoints
|
||||||
|
|
||||||
|
### API development
|
||||||
|
|
||||||
|
1. Define route in `src/routes/`
|
||||||
|
2. Implement controller in `src/controllers/`
|
||||||
|
3. Add types in `src/types/index.ts` if needed
|
||||||
|
4. Write tests in `tests/controllers/`
|
||||||
|
|
||||||
|
### Frontend development
|
||||||
|
|
||||||
|
1. Create/modify components in `frontend/src/components/`
|
||||||
|
2. Add pages in `frontend/src/pages/`
|
||||||
|
3. Update routing if needed
|
||||||
|
4. Test in development mode with `pnpm frontend:dev`
|
||||||
|
|
||||||
|
### Documentation
|
||||||
|
|
||||||
|
1. Update or add docs in `docs/` folder
|
||||||
|
2. Ensure README.md reflects any major changes
|
||||||
|
|
||||||
## Commit & Pull Request Guidelines
|
## Commit & Pull Request Guidelines
|
||||||
|
|
||||||
- Follow the existing Conventional Commit pattern (`feat:`, `fix:`, `chore:`, etc.) with imperative, present-tense summaries and optional multi-line context.
|
- Follow the existing Conventional Commit pattern (`feat:`, `fix:`, `chore:`, etc.) with imperative, present-tense summaries and optional multi-line context.
|
||||||
- Each PR should describe the behavior change, list testing performed, and link issues; include before/after screenshots or GIFs for frontend tweaks.
|
- Each PR should describe the behavior change, list testing performed, and link issues; include before/after screenshots or GIFs for frontend tweaks.
|
||||||
- Re-run `pnpm build` and `pnpm test` before requesting review, and ensure generated artifacts stay out of the diff.
|
- Re-run `pnpm build` and `pnpm test` before requesting review, and ensure generated artifacts stay out of the diff.
|
||||||
|
|
||||||
|
### Before Committing - ALWAYS Run
|
||||||
|
|
||||||
|
```bash
|
||||||
|
pnpm lint # Must pass - ~3 seconds
|
||||||
|
pnpm backend:build # Must compile - ~5 seconds
|
||||||
|
pnpm test:ci # All tests must pass - ~16 seconds
|
||||||
|
pnpm build # Full build must work - ~10 seconds
|
||||||
|
```
|
||||||
|
|
||||||
|
**CRITICAL**: CI will fail if any of these commands fail. Fix issues locally first.
|
||||||
|
|
||||||
|
### CI Pipeline (.github/workflows/ci.yml)
|
||||||
|
|
||||||
|
- Runs on Node.js 20.x
|
||||||
|
- Tests: linting, type checking, unit tests with coverage
|
||||||
|
- **NEVER CANCEL**: CI builds may take 2-3 minutes total
|
||||||
|
|
||||||
|
## Troubleshooting
|
||||||
|
|
||||||
|
### Common Issues
|
||||||
|
|
||||||
|
- **"uvx command not found"**: Some MCP servers require `uvx` (Python package manager) - this is expected in development
|
||||||
|
- **Port already in use**: Change PORT environment variable or kill existing processes
|
||||||
|
- **Frontend not loading**: Ensure frontend was built with `pnpm frontend:build`
|
||||||
|
- **MCP server connection failed**: Check server command/args in `mcp_settings.json`
|
||||||
|
|
||||||
|
### Build Failures
|
||||||
|
|
||||||
|
- **TypeScript errors**: Run `pnpm backend:build` to see compilation errors
|
||||||
|
- **Test failures**: Run `pnpm test:verbose` for detailed test output
|
||||||
|
- **Lint errors**: Run `pnpm lint` and fix reported issues
|
||||||
|
|
||||||
|
### Development Issues
|
||||||
|
|
||||||
|
- **Backend not starting**: Check for port conflicts, verify `mcp_settings.json` syntax
|
||||||
|
- **Frontend proxy errors**: Ensure backend is running before starting frontend
|
||||||
|
- **Hot reload not working**: Restart development server
|
||||||
|
|
||||||
## DAO Layer & Dual Data Source
|
## DAO Layer & Dual Data Source
|
||||||
|
|
||||||
MCPHub supports **JSON file** (default) and **PostgreSQL** storage. Set `USE_DB=true` + `DB_URL` to switch.
|
MCPHub supports **JSON file** (default) and **PostgreSQL** storage. Set `USE_DB=true` + `DB_URL` to switch.
|
||||||
@@ -63,16 +325,100 @@ When adding/changing fields, update **ALL** these files:
|
|||||||
|
|
||||||
### Data Type Mapping
|
### Data Type Mapping
|
||||||
|
|
||||||
| Model | DAO | DB Entity | JSON Path |
|
| Model | DAO | DB Entity | JSON Path |
|
||||||
| -------------- | ----------------- | -------------- | ------------------------ |
|
| -------------- | ----------------- | -------------- | ------------------------- |
|
||||||
| `IUser` | `UserDao` | `User` | `settings.users[]` |
|
| `IUser` | `UserDao` | `User` | `settings.users[]` |
|
||||||
| `ServerConfig` | `ServerDao` | `Server` | `settings.mcpServers{}` |
|
| `ServerConfig` | `ServerDao` | `Server` | `settings.mcpServers{}` |
|
||||||
| `IGroup` | `GroupDao` | `Group` | `settings.groups[]` |
|
| `IGroup` | `GroupDao` | `Group` | `settings.groups[]` |
|
||||||
| `SystemConfig` | `SystemConfigDao` | `SystemConfig` | `settings.systemConfig` |
|
| `SystemConfig` | `SystemConfigDao` | `SystemConfig` | `settings.systemConfig` |
|
||||||
| `UserConfig` | `UserConfigDao` | `UserConfig` | `settings.userConfigs{}` |
|
| `UserConfig` | `UserConfigDao` | `UserConfig` | `settings.userConfigs{}` |
|
||||||
|
| `BearerKey` | `BearerKeyDao` | `BearerKey` | `settings.bearerKeys[]` |
|
||||||
|
| `IOAuthClient` | `OAuthClientDao` | `OAuthClient` | `settings.oauthClients[]` |
|
||||||
|
| `IOAuthToken` | `OAuthTokenDao` | `OAuthToken` | `settings.oauthTokens[]` |
|
||||||
|
|
||||||
### Common Pitfalls
|
### Common Pitfalls
|
||||||
|
|
||||||
- Forgetting migration script → fields won't migrate to DB
|
- Forgetting migration script → fields won't migrate to DB
|
||||||
- Optional fields need `nullable: true` in entity
|
- Optional fields need `nullable: true` in entity
|
||||||
- Complex objects need `simple-json` column type
|
- Complex objects need `simple-json` column type
|
||||||
|
|
||||||
|
## Auto-Evolution Guidelines for AI Agents
|
||||||
|
|
||||||
|
**This section provides guidelines for AI agents to automatically maintain and improve this document.**
|
||||||
|
|
||||||
|
### When to Update AGENTS.md
|
||||||
|
|
||||||
|
AI agents MUST update this document in the following situations:
|
||||||
|
|
||||||
|
#### 1. Code-Documentation Mismatch Detected
|
||||||
|
|
||||||
|
When executing tasks, if you discover that:
|
||||||
|
|
||||||
|
- The actual code structure differs from descriptions in this document
|
||||||
|
- File paths, imports, or module organization has changed
|
||||||
|
- New critical files or directories exist that aren't documented
|
||||||
|
- Documented files or patterns no longer exist
|
||||||
|
|
||||||
|
**Action**: Immediately update the relevant section to reflect the current codebase state.
|
||||||
|
|
||||||
|
**Example scenarios**:
|
||||||
|
|
||||||
|
- A controller is now in `src/api/controllers/` instead of `src/controllers/`
|
||||||
|
- New middleware files exist that should be documented
|
||||||
|
- The DAO implementation has been refactored with a different structure
|
||||||
|
- Build output directories have changed
|
||||||
|
|
||||||
|
#### 2. User Preferences and Requirements
|
||||||
|
|
||||||
|
During conversation, if the user expresses:
|
||||||
|
|
||||||
|
- **Coding preferences**: Indentation style, naming conventions, code organization patterns
|
||||||
|
- **Workflow requirements**: Required validation steps, commit procedures, testing expectations
|
||||||
|
- **Tool preferences**: Preferred libraries, frameworks, or development tools
|
||||||
|
- **Quality standards**: Code review criteria, documentation requirements, error handling patterns
|
||||||
|
- **Development principles**: Architecture decisions, design patterns, best practices
|
||||||
|
|
||||||
|
**Action**: Add or update the relevant section to capture these preferences for future reference.
|
||||||
|
|
||||||
|
**Example scenarios**:
|
||||||
|
|
||||||
|
- User prefers async/await over promises → Update coding style section
|
||||||
|
- User requires specific test coverage thresholds → Update testing guidelines
|
||||||
|
- User has strong opinions about error handling → Add to development process section
|
||||||
|
- User establishes new deployment procedures → Update deployment section
|
||||||
|
|
||||||
|
### How to Update AGENTS.md
|
||||||
|
|
||||||
|
1. **Identify the Section**: Determine which section needs updating based on the type of change
|
||||||
|
2. **Make Precise Changes**: Update only the relevant content, maintaining the document structure
|
||||||
|
3. **Preserve Format**: Keep the existing markdown formatting and organization
|
||||||
|
4. **Add Context**: If adding new content, ensure it fits logically within existing sections
|
||||||
|
5. **Verify Accuracy**: After updating, ensure the new information is accurate and complete
|
||||||
|
|
||||||
|
### Update Principles
|
||||||
|
|
||||||
|
- **Accuracy First**: Documentation must reflect the actual current state
|
||||||
|
- **Clarity**: Use clear, concise language; avoid ambiguity
|
||||||
|
- **Completeness**: Include sufficient detail for agents to work effectively
|
||||||
|
- **Consistency**: Maintain consistent terminology and formatting throughout
|
||||||
|
- **Actionability**: Focus on concrete, actionable guidance rather than vague descriptions
|
||||||
|
|
||||||
|
### Self-Correction Process
|
||||||
|
|
||||||
|
Before completing any task:
|
||||||
|
|
||||||
|
1. Review relevant sections of AGENTS.md
|
||||||
|
2. During execution, note any discrepancies between documentation and reality
|
||||||
|
3. Update AGENTS.md to correct discrepancies
|
||||||
|
4. Verify the update doesn't conflict with other sections
|
||||||
|
5. Proceed with the original task using the updated information
|
||||||
|
|
||||||
|
### Meta-Update Rule
|
||||||
|
|
||||||
|
If this auto-evolution section itself needs improvement based on experience:
|
||||||
|
|
||||||
|
- Update it to better serve future agents
|
||||||
|
- Add new scenarios or principles as they emerge
|
||||||
|
- Refine the update process based on what works well
|
||||||
|
|
||||||
|
**Remember**: This document is a living guide. Keeping it accurate and current is as important as following it.
|
||||||
|
|||||||
@@ -2,7 +2,7 @@ FROM python:3.13-slim-bookworm AS base
|
|||||||
|
|
||||||
COPY --from=ghcr.io/astral-sh/uv:latest /uv /uvx /bin/
|
COPY --from=ghcr.io/astral-sh/uv:latest /uv /uvx /bin/
|
||||||
|
|
||||||
RUN apt-get update && apt-get install -y curl gnupg git \
|
RUN apt-get update && apt-get install -y curl gnupg git build-essential \
|
||||||
&& curl -fsSL https://deb.nodesource.com/setup_22.x | bash - \
|
&& curl -fsSL https://deb.nodesource.com/setup_22.x | bash - \
|
||||||
&& apt-get install -y nodejs \
|
&& apt-get install -y nodejs \
|
||||||
&& apt-get clean && rm -rf /var/lib/apt/lists/*
|
&& apt-get clean && rm -rf /var/lib/apt/lists/*
|
||||||
|
|||||||
@@ -3,7 +3,7 @@ version: "3.8"
|
|||||||
services:
|
services:
|
||||||
# PostgreSQL database for MCPHub configuration
|
# PostgreSQL database for MCPHub configuration
|
||||||
postgres:
|
postgres:
|
||||||
image: postgres:16-alpine
|
image: pgvector/pgvector:pg17-alpine
|
||||||
container_name: mcphub-postgres
|
container_name: mcphub-postgres
|
||||||
environment:
|
environment:
|
||||||
POSTGRES_DB: mcphub
|
POSTGRES_DB: mcphub
|
||||||
|
|||||||
@@ -59,7 +59,7 @@ version: '3.8'
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
postgres:
|
postgres:
|
||||||
image: postgres:16
|
image: pgvector/pgvector:pg17
|
||||||
environment:
|
environment:
|
||||||
POSTGRES_DB: mcphub
|
POSTGRES_DB: mcphub
|
||||||
POSTGRES_USER: mcphub
|
POSTGRES_USER: mcphub
|
||||||
|
|||||||
@@ -119,7 +119,7 @@ services:
|
|||||||
- mcphub-network
|
- mcphub-network
|
||||||
|
|
||||||
postgres:
|
postgres:
|
||||||
image: postgres:15-alpine
|
image: pgvector/pgvector:pg17
|
||||||
container_name: mcphub-postgres
|
container_name: mcphub-postgres
|
||||||
environment:
|
environment:
|
||||||
- POSTGRES_DB=mcphub
|
- POSTGRES_DB=mcphub
|
||||||
@@ -203,7 +203,7 @@ services:
|
|||||||
retries: 3
|
retries: 3
|
||||||
|
|
||||||
postgres:
|
postgres:
|
||||||
image: postgres:15-alpine
|
image: pgvector/pgvector:pg17
|
||||||
container_name: mcphub-postgres
|
container_name: mcphub-postgres
|
||||||
environment:
|
environment:
|
||||||
- POSTGRES_DB=mcphub
|
- POSTGRES_DB=mcphub
|
||||||
@@ -305,7 +305,7 @@ services:
|
|||||||
- mcphub-dev
|
- mcphub-dev
|
||||||
|
|
||||||
postgres:
|
postgres:
|
||||||
image: postgres:15-alpine
|
image: pgvector/pgvector:pg17
|
||||||
container_name: mcphub-postgres-dev
|
container_name: mcphub-postgres-dev
|
||||||
environment:
|
environment:
|
||||||
- POSTGRES_DB=mcphub
|
- POSTGRES_DB=mcphub
|
||||||
@@ -445,7 +445,7 @@ Add backup service to your `docker-compose.yml`:
|
|||||||
```yaml
|
```yaml
|
||||||
services:
|
services:
|
||||||
backup:
|
backup:
|
||||||
image: postgres:15-alpine
|
image: pgvector/pgvector:pg17
|
||||||
container_name: mcphub-backup
|
container_name: mcphub-backup
|
||||||
environment:
|
environment:
|
||||||
- PGPASSWORD=${POSTGRES_PASSWORD}
|
- PGPASSWORD=${POSTGRES_PASSWORD}
|
||||||
|
|||||||
@@ -28,7 +28,8 @@
|
|||||||
"features/server-management",
|
"features/server-management",
|
||||||
"features/group-management",
|
"features/group-management",
|
||||||
"features/smart-routing",
|
"features/smart-routing",
|
||||||
"features/oauth"
|
"features/oauth",
|
||||||
|
"features/output-compression"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|||||||
109
docs/features/output-compression.mdx
Normal file
109
docs/features/output-compression.mdx
Normal file
@@ -0,0 +1,109 @@
|
|||||||
|
---
|
||||||
|
title: 'Output Compression'
|
||||||
|
description: 'Reduce token consumption by compressing MCP tool outputs'
|
||||||
|
---
|
||||||
|
|
||||||
|
# Output Compression
|
||||||
|
|
||||||
|
MCPHub provides an AI-powered compression mechanism to reduce token consumption from MCP tool outputs. This feature is particularly useful when dealing with large outputs that can significantly impact system efficiency and scalability.
|
||||||
|
|
||||||
|
## Overview
|
||||||
|
|
||||||
|
The compression feature uses a lightweight AI model (by default, `gpt-4o-mini`) to intelligently compress MCP tool outputs while preserving all essential information. This can help:
|
||||||
|
|
||||||
|
- **Reduce token overhead** by compressing verbose tool information
|
||||||
|
- **Lower operational costs** associated with token consumption
|
||||||
|
- **Improve performance** for downstream processing
|
||||||
|
- **Better resource utilization** in resource-constrained environments
|
||||||
|
|
||||||
|
## Configuration
|
||||||
|
|
||||||
|
Add the compression configuration to your `systemConfig` section in `mcp_settings.json`:
|
||||||
|
|
||||||
|
```json
|
||||||
|
{
|
||||||
|
"systemConfig": {
|
||||||
|
"compression": {
|
||||||
|
"enabled": true,
|
||||||
|
"model": "gpt-4o-mini",
|
||||||
|
"maxInputTokens": 100000,
|
||||||
|
"targetReductionRatio": 0.5
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
### Configuration Options
|
||||||
|
|
||||||
|
| Option | Type | Default | Description |
|
||||||
|
|--------|------|---------|-------------|
|
||||||
|
| `enabled` | boolean | `false` | Enable or disable output compression |
|
||||||
|
| `model` | string | `"gpt-4o-mini"` | AI model to use for compression |
|
||||||
|
| `maxInputTokens` | number | `100000` | Maximum input tokens for compression |
|
||||||
|
| `targetReductionRatio` | number | `0.5` | Target size reduction ratio (0.0-1.0) |
|
||||||
|
|
||||||
|
## Requirements
|
||||||
|
|
||||||
|
Output compression requires:
|
||||||
|
|
||||||
|
1. An OpenAI API key configured in the smart routing settings
|
||||||
|
2. The compression feature must be explicitly enabled
|
||||||
|
|
||||||
|
### Setting up OpenAI API Key
|
||||||
|
|
||||||
|
Configure your OpenAI API key using environment variables or system configuration:
|
||||||
|
|
||||||
|
**Environment Variable:**
|
||||||
|
```bash
|
||||||
|
export OPENAI_API_KEY=your-api-key
|
||||||
|
```
|
||||||
|
|
||||||
|
**Or in systemConfig:**
|
||||||
|
```json
|
||||||
|
{
|
||||||
|
"systemConfig": {
|
||||||
|
"smartRouting": {
|
||||||
|
"openaiApiKey": "your-api-key",
|
||||||
|
"openaiApiBaseUrl": "https://api.openai.com/v1"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
## How It Works
|
||||||
|
|
||||||
|
1. **Content Size Check**: When a tool call completes, the compression service checks if the output is large enough to benefit from compression (threshold is 10% of `maxInputTokens` or 1000 tokens, whichever is smaller)
|
||||||
|
|
||||||
|
2. **AI Compression**: If the content exceeds the threshold, it's sent to the configured AI model with instructions to compress while preserving essential information
|
||||||
|
|
||||||
|
3. **Size Validation**: The compressed result is compared with the original; if compression didn't reduce the size, the original content is used
|
||||||
|
|
||||||
|
4. **Error Handling**: If compression fails for any reason, the original content is returned unchanged
|
||||||
|
|
||||||
|
## Fallback Mechanism
|
||||||
|
|
||||||
|
The compression feature includes graceful degradation for several scenarios:
|
||||||
|
|
||||||
|
- **Compression disabled**: Original content is returned
|
||||||
|
- **No API key**: Original content is returned with a warning
|
||||||
|
- **Small content**: Content below threshold is not compressed
|
||||||
|
- **API errors**: Original content is returned on any API failure
|
||||||
|
- **Error responses**: Tool error responses are never compressed
|
||||||
|
- **Non-text content**: Images and other media types are preserved as-is
|
||||||
|
|
||||||
|
## Best Practices
|
||||||
|
|
||||||
|
1. **Start with defaults**: The default configuration provides a good balance between compression and quality
|
||||||
|
|
||||||
|
2. **Monitor results**: Review compressed outputs to ensure important information isn't lost
|
||||||
|
|
||||||
|
3. **Adjust threshold**: If you have consistently large outputs, consider lowering `targetReductionRatio` for more aggressive compression
|
||||||
|
|
||||||
|
4. **Use efficient models**: The default `gpt-4o-mini` provides a good balance of cost and quality; switch to `gpt-4o` if you need higher quality compression
|
||||||
|
|
||||||
|
## Limitations
|
||||||
|
|
||||||
|
- Compression adds latency due to the AI API call
|
||||||
|
- API costs apply for each compression operation
|
||||||
|
- Very short outputs won't be compressed (below threshold)
|
||||||
|
- Binary/non-text content is not compressed
|
||||||
@@ -78,7 +78,7 @@ Smart Routing requires additional setup compared to basic MCPHub usage:
|
|||||||
- ./mcp_settings.json:/app/mcp_settings.json
|
- ./mcp_settings.json:/app/mcp_settings.json
|
||||||
|
|
||||||
postgres:
|
postgres:
|
||||||
image: pgvector/pgvector:pg16
|
image: pgvector/pgvector:pg17
|
||||||
environment:
|
environment:
|
||||||
- POSTGRES_DB=mcphub
|
- POSTGRES_DB=mcphub
|
||||||
- POSTGRES_USER=mcphub
|
- POSTGRES_USER=mcphub
|
||||||
@@ -146,7 +146,7 @@ Smart Routing requires additional setup compared to basic MCPHub usage:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: postgres
|
- name: postgres
|
||||||
image: pgvector/pgvector:pg16
|
image: pgvector/pgvector:pg17
|
||||||
env:
|
env:
|
||||||
- name: POSTGRES_DB
|
- name: POSTGRES_DB
|
||||||
value: mcphub
|
value: mcphub
|
||||||
|
|||||||
@@ -96,7 +96,7 @@ Optional for Smart Routing:
|
|||||||
|
|
||||||
# Optional: PostgreSQL for Smart Routing
|
# Optional: PostgreSQL for Smart Routing
|
||||||
postgres:
|
postgres:
|
||||||
image: pgvector/pgvector:pg16
|
image: pgvector/pgvector:pg17
|
||||||
environment:
|
environment:
|
||||||
POSTGRES_DB: mcphub
|
POSTGRES_DB: mcphub
|
||||||
POSTGRES_USER: mcphub
|
POSTGRES_USER: mcphub
|
||||||
|
|||||||
@@ -59,7 +59,7 @@ version: '3.8'
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
postgres:
|
postgres:
|
||||||
image: postgres:16
|
image: pgvector/pgvector:pg17
|
||||||
environment:
|
environment:
|
||||||
POSTGRES_DB: mcphub
|
POSTGRES_DB: mcphub
|
||||||
POSTGRES_USER: mcphub
|
POSTGRES_USER: mcphub
|
||||||
|
|||||||
@@ -119,7 +119,7 @@ services:
|
|||||||
- mcphub-network
|
- mcphub-network
|
||||||
|
|
||||||
postgres:
|
postgres:
|
||||||
image: postgres:15-alpine
|
image: pgvector/pgvector:pg17
|
||||||
container_name: mcphub-postgres
|
container_name: mcphub-postgres
|
||||||
environment:
|
environment:
|
||||||
- POSTGRES_DB=mcphub
|
- POSTGRES_DB=mcphub
|
||||||
@@ -203,7 +203,7 @@ services:
|
|||||||
retries: 3
|
retries: 3
|
||||||
|
|
||||||
postgres:
|
postgres:
|
||||||
image: postgres:15-alpine
|
image: pgvector/pgvector:pg17
|
||||||
container_name: mcphub-postgres
|
container_name: mcphub-postgres
|
||||||
environment:
|
environment:
|
||||||
- POSTGRES_DB=mcphub
|
- POSTGRES_DB=mcphub
|
||||||
@@ -305,7 +305,7 @@ services:
|
|||||||
- mcphub-dev
|
- mcphub-dev
|
||||||
|
|
||||||
postgres:
|
postgres:
|
||||||
image: postgres:15-alpine
|
image: pgvector/pgvector:pg17
|
||||||
container_name: mcphub-postgres-dev
|
container_name: mcphub-postgres-dev
|
||||||
environment:
|
environment:
|
||||||
- POSTGRES_DB=mcphub
|
- POSTGRES_DB=mcphub
|
||||||
@@ -445,7 +445,7 @@ secrets:
|
|||||||
```yaml
|
```yaml
|
||||||
services:
|
services:
|
||||||
backup:
|
backup:
|
||||||
image: postgres:15-alpine
|
image: pgvector/pgvector:pg17
|
||||||
container_name: mcphub-backup
|
container_name: mcphub-backup
|
||||||
environment:
|
environment:
|
||||||
- PGPASSWORD=${POSTGRES_PASSWORD}
|
- PGPASSWORD=${POSTGRES_PASSWORD}
|
||||||
|
|||||||
@@ -96,7 +96,7 @@ description: '各种平台的详细安装说明'
|
|||||||
|
|
||||||
# 可选:用于智能路由的 PostgreSQL
|
# 可选:用于智能路由的 PostgreSQL
|
||||||
postgres:
|
postgres:
|
||||||
image: pgvector/pgvector:pg16
|
image: pgvector/pgvector:pg17
|
||||||
environment:
|
environment:
|
||||||
POSTGRES_DB: mcphub
|
POSTGRES_DB: mcphub
|
||||||
POSTGRES_USER: mcphub
|
POSTGRES_USER: mcphub
|
||||||
|
|||||||
@@ -4,6 +4,7 @@ import { AuthProvider } from './contexts/AuthContext';
|
|||||||
import { ToastProvider } from './contexts/ToastContext';
|
import { ToastProvider } from './contexts/ToastContext';
|
||||||
import { ThemeProvider } from './contexts/ThemeContext';
|
import { ThemeProvider } from './contexts/ThemeContext';
|
||||||
import { ServerProvider } from './contexts/ServerContext';
|
import { ServerProvider } from './contexts/ServerContext';
|
||||||
|
import { SettingsProvider } from './contexts/SettingsContext';
|
||||||
import MainLayout from './layouts/MainLayout';
|
import MainLayout from './layouts/MainLayout';
|
||||||
import ProtectedRoute from './components/ProtectedRoute';
|
import ProtectedRoute from './components/ProtectedRoute';
|
||||||
import LoginPage from './pages/LoginPage';
|
import LoginPage from './pages/LoginPage';
|
||||||
@@ -27,42 +28,41 @@ function App() {
|
|||||||
return (
|
return (
|
||||||
<ThemeProvider>
|
<ThemeProvider>
|
||||||
<AuthProvider>
|
<AuthProvider>
|
||||||
<ServerProvider>
|
<ServerProvider>
|
||||||
<ToastProvider>
|
<ToastProvider>
|
||||||
<Router basename={basename}>
|
<SettingsProvider>
|
||||||
<Routes>
|
<Router basename={basename}>
|
||||||
{/* 公共路由 */}
|
<Routes>
|
||||||
<Route path="/login" element={<LoginPage />} />
|
{/* 公共路由 */}
|
||||||
|
<Route path="/login" element={<LoginPage />} />
|
||||||
|
|
||||||
{/* 受保护的路由,使用 MainLayout 作为布局容器 */}
|
{/* 受保护的路由,使用 MainLayout 作为布局容器 */}
|
||||||
<Route element={<ProtectedRoute />}>
|
<Route element={<ProtectedRoute />}>
|
||||||
<Route element={<MainLayout />}>
|
<Route element={<MainLayout />}>
|
||||||
<Route path="/" element={<DashboardPage />} />
|
<Route path="/" element={<DashboardPage />} />
|
||||||
<Route path="/servers" element={<ServersPage />} />
|
<Route path="/servers" element={<ServersPage />} />
|
||||||
<Route path="/groups" element={<GroupsPage />} />
|
<Route path="/groups" element={<GroupsPage />} />
|
||||||
<Route path="/users" element={<UsersPage />} />
|
<Route path="/users" element={<UsersPage />} />
|
||||||
<Route path="/market" element={<MarketPage />} />
|
<Route path="/market" element={<MarketPage />} />
|
||||||
<Route path="/market/:serverName" element={<MarketPage />} />
|
<Route path="/market/:serverName" element={<MarketPage />} />
|
||||||
{/* Legacy cloud routes redirect to market with cloud tab */}
|
{/* Legacy cloud routes redirect to market with cloud tab */}
|
||||||
<Route path="/cloud" element={<Navigate to="/market?tab=cloud" replace />} />
|
<Route path="/cloud" element={<Navigate to="/market?tab=cloud" replace />} />
|
||||||
<Route
|
<Route path="/cloud/:serverName" element={<CloudRedirect />} />
|
||||||
path="/cloud/:serverName"
|
<Route path="/logs" element={<LogsPage />} />
|
||||||
element={<CloudRedirect />}
|
<Route path="/settings" element={<SettingsPage />} />
|
||||||
/>
|
</Route>
|
||||||
<Route path="/logs" element={<LogsPage />} />
|
</Route>
|
||||||
<Route path="/settings" element={<SettingsPage />} />
|
|
||||||
</Route>
|
|
||||||
</Route>
|
|
||||||
|
|
||||||
{/* 未匹配的路由重定向到首页 */}
|
{/* 未匹配的路由重定向到首页 */}
|
||||||
<Route path="*" element={<Navigate to="/" />} />
|
<Route path="*" element={<Navigate to="/" />} />
|
||||||
</Routes>
|
</Routes>
|
||||||
</Router>
|
</Router>
|
||||||
</ToastProvider>
|
</SettingsProvider>
|
||||||
|
</ToastProvider>
|
||||||
</ServerProvider>
|
</ServerProvider>
|
||||||
</AuthProvider>
|
</AuthProvider>
|
||||||
</ThemeProvider>
|
</ThemeProvider>
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
|
|
||||||
export default App;
|
export default App;
|
||||||
|
|||||||
@@ -18,7 +18,17 @@ const EditServerForm = ({ server, onEdit, onCancel }: EditServerFormProps) => {
|
|||||||
try {
|
try {
|
||||||
setError(null);
|
setError(null);
|
||||||
const encodedServerName = encodeURIComponent(server.name);
|
const encodedServerName = encodeURIComponent(server.name);
|
||||||
const result = await apiPut(`/servers/${encodedServerName}`, payload);
|
|
||||||
|
// Check if name is being changed
|
||||||
|
const isRenaming = payload.name && payload.name !== server.name;
|
||||||
|
|
||||||
|
// Build the request body
|
||||||
|
const requestBody = {
|
||||||
|
config: payload.config,
|
||||||
|
...(isRenaming ? { newName: payload.name } : {}),
|
||||||
|
};
|
||||||
|
|
||||||
|
const result = await apiPut(`/servers/${encodedServerName}`, requestBody);
|
||||||
|
|
||||||
if (!result.success) {
|
if (!result.success) {
|
||||||
// Use specific error message from the response if available
|
// Use specific error message from the response if available
|
||||||
|
|||||||
284
frontend/src/components/GroupImportForm.tsx
Normal file
284
frontend/src/components/GroupImportForm.tsx
Normal file
@@ -0,0 +1,284 @@
|
|||||||
|
import React, { useState } from 'react';
|
||||||
|
import { useTranslation } from 'react-i18next';
|
||||||
|
import { apiPost } from '@/utils/fetchInterceptor';
|
||||||
|
|
||||||
|
interface GroupImportFormProps {
|
||||||
|
onSuccess: () => void;
|
||||||
|
onCancel: () => void;
|
||||||
|
}
|
||||||
|
|
||||||
|
interface ImportGroupConfig {
|
||||||
|
name: string;
|
||||||
|
description?: string;
|
||||||
|
servers?: string[] | Array<{ name: string; tools?: string[] | 'all' }>;
|
||||||
|
}
|
||||||
|
|
||||||
|
interface ImportJsonFormat {
|
||||||
|
groups: ImportGroupConfig[];
|
||||||
|
}
|
||||||
|
|
||||||
|
const GroupImportForm: React.FC<GroupImportFormProps> = ({ onSuccess, onCancel }) => {
|
||||||
|
const { t } = useTranslation();
|
||||||
|
const [jsonInput, setJsonInput] = useState('');
|
||||||
|
const [error, setError] = useState<string | null>(null);
|
||||||
|
const [isImporting, setIsImporting] = useState(false);
|
||||||
|
const [previewGroups, setPreviewGroups] = useState<ImportGroupConfig[] | null>(null);
|
||||||
|
|
||||||
|
const examplePlaceholder = `{
|
||||||
|
"groups": [
|
||||||
|
{
|
||||||
|
"name": "AI Assistants",
|
||||||
|
"servers": ["openai-server", "anthropic-server"]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "Development Tools",
|
||||||
|
"servers": [
|
||||||
|
{
|
||||||
|
"name": "github-server",
|
||||||
|
"tools": ["create_issue", "list_repos"]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "gitlab-server",
|
||||||
|
"tools": "all"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
|
||||||
|
Supports:
|
||||||
|
- Simple server list: ["server1", "server2"]
|
||||||
|
- Advanced server config: [{"name": "server1", "tools": ["tool1", "tool2"]}]
|
||||||
|
- All groups will be imported in a single efficient batch operation.`;
|
||||||
|
|
||||||
|
const parseAndValidateJson = (input: string): ImportJsonFormat | null => {
|
||||||
|
try {
|
||||||
|
const parsed = JSON.parse(input.trim());
|
||||||
|
|
||||||
|
// Validate structure
|
||||||
|
if (!parsed.groups || !Array.isArray(parsed.groups)) {
|
||||||
|
setError(t('groupImport.invalidFormat'));
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Validate each group
|
||||||
|
for (const group of parsed.groups) {
|
||||||
|
if (!group.name || typeof group.name !== 'string') {
|
||||||
|
setError(t('groupImport.missingName'));
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return parsed as ImportJsonFormat;
|
||||||
|
} catch (e) {
|
||||||
|
setError(t('groupImport.parseError'));
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
const handlePreview = () => {
|
||||||
|
setError(null);
|
||||||
|
const parsed = parseAndValidateJson(jsonInput);
|
||||||
|
if (!parsed) return;
|
||||||
|
|
||||||
|
setPreviewGroups(parsed.groups);
|
||||||
|
};
|
||||||
|
|
||||||
|
const handleImport = async () => {
|
||||||
|
if (!previewGroups) return;
|
||||||
|
|
||||||
|
setIsImporting(true);
|
||||||
|
setError(null);
|
||||||
|
|
||||||
|
try {
|
||||||
|
// Use batch import API for better performance
|
||||||
|
const result = await apiPost('/groups/batch', {
|
||||||
|
groups: previewGroups,
|
||||||
|
});
|
||||||
|
|
||||||
|
if (result.success) {
|
||||||
|
const { successCount, failureCount, results } = result;
|
||||||
|
|
||||||
|
if (failureCount > 0) {
|
||||||
|
const errors = results
|
||||||
|
.filter((r: any) => !r.success)
|
||||||
|
.map((r: any) => `${r.name}: ${r.message || t('groupImport.addFailed')}`);
|
||||||
|
|
||||||
|
setError(
|
||||||
|
t('groupImport.partialSuccess', { count: successCount, total: previewGroups.length }) +
|
||||||
|
'\n' +
|
||||||
|
errors.join('\n'),
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (successCount > 0) {
|
||||||
|
onSuccess();
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
setError(result.message || t('groupImport.importFailed'));
|
||||||
|
}
|
||||||
|
} catch (err) {
|
||||||
|
console.error('Import error:', err);
|
||||||
|
setError(t('groupImport.importFailed'));
|
||||||
|
} finally {
|
||||||
|
setIsImporting(false);
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
const renderServerList = (
|
||||||
|
servers?: string[] | Array<{ name: string; tools?: string[] | 'all' }>,
|
||||||
|
) => {
|
||||||
|
if (!servers || servers.length === 0) {
|
||||||
|
return <span className="text-gray-500">{t('groups.noServers')}</span>;
|
||||||
|
}
|
||||||
|
|
||||||
|
return (
|
||||||
|
<div className="space-y-1">
|
||||||
|
{servers.map((server, idx) => {
|
||||||
|
if (typeof server === 'string') {
|
||||||
|
return (
|
||||||
|
<div key={idx} className="text-sm">
|
||||||
|
• {server}
|
||||||
|
</div>
|
||||||
|
);
|
||||||
|
} else {
|
||||||
|
return (
|
||||||
|
<div key={idx} className="text-sm">
|
||||||
|
• {server.name}
|
||||||
|
{server.tools && server.tools !== 'all' && (
|
||||||
|
<span className="text-gray-500 ml-2">
|
||||||
|
({Array.isArray(server.tools) ? server.tools.join(', ') : server.tools})
|
||||||
|
</span>
|
||||||
|
)}
|
||||||
|
{server.tools === 'all' && <span className="text-gray-500 ml-2">(all tools)</span>}
|
||||||
|
</div>
|
||||||
|
);
|
||||||
|
}
|
||||||
|
})}
|
||||||
|
</div>
|
||||||
|
);
|
||||||
|
};
|
||||||
|
|
||||||
|
return (
|
||||||
|
<div className="fixed inset-0 bg-black/50 z-50 flex items-center justify-center p-4">
|
||||||
|
<div className="bg-white shadow rounded-lg p-6 w-full max-w-4xl max-h-[90vh] overflow-y-auto">
|
||||||
|
<div className="flex justify-between items-center mb-6">
|
||||||
|
<h2 className="text-xl font-semibold text-gray-900">{t('groupImport.title')}</h2>
|
||||||
|
<button onClick={onCancel} className="text-gray-500 hover:text-gray-700">
|
||||||
|
✕
|
||||||
|
</button>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
{error && (
|
||||||
|
<div className="mb-4 bg-red-50 border-l-4 border-red-500 p-4 rounded">
|
||||||
|
<p className="text-red-700 whitespace-pre-wrap">{error}</p>
|
||||||
|
</div>
|
||||||
|
)}
|
||||||
|
|
||||||
|
{!previewGroups ? (
|
||||||
|
<div>
|
||||||
|
<div className="mb-4">
|
||||||
|
<label className="block text-sm font-medium text-gray-700 mb-2">
|
||||||
|
{t('groupImport.inputLabel')}
|
||||||
|
</label>
|
||||||
|
<textarea
|
||||||
|
value={jsonInput}
|
||||||
|
onChange={(e) => setJsonInput(e.target.value)}
|
||||||
|
className="w-full h-96 px-3 py-2 border border-gray-300 rounded-md focus:outline-none focus:ring-2 focus:ring-blue-500 font-mono text-sm"
|
||||||
|
placeholder={examplePlaceholder}
|
||||||
|
/>
|
||||||
|
<p className="text-xs text-gray-500 mt-2">{t('groupImport.inputHelp')}</p>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<div className="flex justify-end space-x-4">
|
||||||
|
<button
|
||||||
|
onClick={onCancel}
|
||||||
|
className="px-4 py-2 text-gray-700 bg-gray-200 rounded hover:bg-gray-300 btn-secondary"
|
||||||
|
>
|
||||||
|
{t('common.cancel')}
|
||||||
|
</button>
|
||||||
|
<button
|
||||||
|
onClick={handlePreview}
|
||||||
|
disabled={!jsonInput.trim()}
|
||||||
|
className="px-4 py-2 bg-blue-600 text-white rounded hover:bg-blue-700 disabled:opacity-50 btn-primary"
|
||||||
|
>
|
||||||
|
{t('groupImport.preview')}
|
||||||
|
</button>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
) : (
|
||||||
|
<div>
|
||||||
|
<div className="mb-4">
|
||||||
|
<h3 className="text-lg font-medium text-gray-900 mb-3">
|
||||||
|
{t('groupImport.previewTitle')}
|
||||||
|
</h3>
|
||||||
|
<div className="space-y-3">
|
||||||
|
{previewGroups.map((group, index) => (
|
||||||
|
<div key={index} className="bg-gray-50 p-4 rounded-lg border border-gray-200">
|
||||||
|
<div className="flex items-start justify-between">
|
||||||
|
<div className="flex-1">
|
||||||
|
<h4 className="font-medium text-gray-900">{group.name}</h4>
|
||||||
|
{group.description && (
|
||||||
|
<p className="text-sm text-gray-600 mt-1">{group.description}</p>
|
||||||
|
)}
|
||||||
|
<div className="mt-2 text-sm text-gray-600">
|
||||||
|
<strong>{t('groups.servers')}:</strong>
|
||||||
|
<div className="mt-1">{renderServerList(group.servers)}</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
))}
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<div className="flex justify-end space-x-4">
|
||||||
|
<button
|
||||||
|
onClick={() => setPreviewGroups(null)}
|
||||||
|
disabled={isImporting}
|
||||||
|
className="px-4 py-2 text-gray-700 bg-gray-200 rounded hover:bg-gray-300 disabled:opacity-50 btn-secondary"
|
||||||
|
>
|
||||||
|
{t('common.back')}
|
||||||
|
</button>
|
||||||
|
<button
|
||||||
|
onClick={handleImport}
|
||||||
|
disabled={isImporting}
|
||||||
|
className="px-4 py-2 bg-blue-600 text-white rounded hover:bg-blue-700 disabled:opacity-50 flex items-center btn-primary"
|
||||||
|
>
|
||||||
|
{isImporting ? (
|
||||||
|
<>
|
||||||
|
<svg
|
||||||
|
className="animate-spin h-4 w-4 mr-2"
|
||||||
|
xmlns="http://www.w3.org/2000/svg"
|
||||||
|
fill="none"
|
||||||
|
viewBox="0 0 24 24"
|
||||||
|
>
|
||||||
|
<circle
|
||||||
|
className="opacity-25"
|
||||||
|
cx="12"
|
||||||
|
cy="12"
|
||||||
|
r="10"
|
||||||
|
stroke="currentColor"
|
||||||
|
strokeWidth="4"
|
||||||
|
></circle>
|
||||||
|
<path
|
||||||
|
className="opacity-75"
|
||||||
|
fill="currentColor"
|
||||||
|
d="M4 12a8 8 0 018-8V0C5.373 0 0 5.373 0 12h4zm2 5.291A7.962 7.962 0 014 12H0c0 3.042 1.135 5.824 3 7.938l3-2.647z"
|
||||||
|
></path>
|
||||||
|
</svg>
|
||||||
|
{t('groupImport.importing')}
|
||||||
|
</>
|
||||||
|
) : (
|
||||||
|
t('groupImport.import')
|
||||||
|
)}
|
||||||
|
</button>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
)}
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
);
|
||||||
|
};
|
||||||
|
|
||||||
|
export default GroupImportForm;
|
||||||
@@ -14,6 +14,10 @@ interface McpServerConfig {
|
|||||||
type?: string;
|
type?: string;
|
||||||
url?: string;
|
url?: string;
|
||||||
headers?: Record<string, string>;
|
headers?: Record<string, string>;
|
||||||
|
openapi?: {
|
||||||
|
version: string;
|
||||||
|
url: string;
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
interface ImportJsonFormat {
|
interface ImportJsonFormat {
|
||||||
@@ -29,29 +33,16 @@ const JSONImportForm: React.FC<JSONImportFormProps> = ({ onSuccess, onCancel })
|
|||||||
null,
|
null,
|
||||||
);
|
);
|
||||||
|
|
||||||
const examplePlaceholder = `STDIO example:
|
const examplePlaceholder = `{
|
||||||
{
|
|
||||||
"mcpServers": {
|
"mcpServers": {
|
||||||
"stdio-server-example": {
|
"stdio-server-example": {
|
||||||
"command": "npx",
|
"command": "npx",
|
||||||
"args": ["-y", "mcp-server-example"]
|
"args": ["-y", "mcp-server-example"]
|
||||||
}
|
},
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
SSE example:
|
|
||||||
{
|
|
||||||
"mcpServers": {
|
|
||||||
"sse-server-example": {
|
"sse-server-example": {
|
||||||
"type": "sse",
|
"type": "sse",
|
||||||
"url": "http://localhost:3000"
|
"url": "http://localhost:3000"
|
||||||
}
|
},
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
HTTP example:
|
|
||||||
{
|
|
||||||
"mcpServers": {
|
|
||||||
"http-server-example": {
|
"http-server-example": {
|
||||||
"type": "streamable-http",
|
"type": "streamable-http",
|
||||||
"url": "http://localhost:3001",
|
"url": "http://localhost:3001",
|
||||||
@@ -59,9 +50,18 @@ HTTP example:
|
|||||||
"Content-Type": "application/json",
|
"Content-Type": "application/json",
|
||||||
"Authorization": "Bearer your-token"
|
"Authorization": "Bearer your-token"
|
||||||
}
|
}
|
||||||
|
},
|
||||||
|
"openapi-server-example": {
|
||||||
|
"type": "openapi",
|
||||||
|
"openapi": {
|
||||||
|
"url": "https://petstore.swagger.io/v2/swagger.json"
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}`;
|
}
|
||||||
|
|
||||||
|
Supports: STDIO, SSE, HTTP (streamable-http), OpenAPI
|
||||||
|
All servers will be imported in a single efficient batch operation.`;
|
||||||
|
|
||||||
const parseAndValidateJson = (input: string): ImportJsonFormat | null => {
|
const parseAndValidateJson = (input: string): ImportJsonFormat | null => {
|
||||||
try {
|
try {
|
||||||
@@ -95,6 +95,9 @@ HTTP example:
|
|||||||
if (config.headers) {
|
if (config.headers) {
|
||||||
normalizedConfig.headers = config.headers;
|
normalizedConfig.headers = config.headers;
|
||||||
}
|
}
|
||||||
|
} else if (config.type === 'openapi') {
|
||||||
|
normalizedConfig.type = 'openapi';
|
||||||
|
normalizedConfig.openapi = config.openapi;
|
||||||
} else {
|
} else {
|
||||||
// Default to stdio
|
// Default to stdio
|
||||||
normalizedConfig.type = 'stdio';
|
normalizedConfig.type = 'stdio';
|
||||||
@@ -118,38 +121,31 @@ HTTP example:
|
|||||||
setError(null);
|
setError(null);
|
||||||
|
|
||||||
try {
|
try {
|
||||||
let successCount = 0;
|
// Use batch import API for better performance
|
||||||
const errors: string[] = [];
|
const result = await apiPost('/servers/batch', {
|
||||||
|
servers: previewServers,
|
||||||
|
});
|
||||||
|
|
||||||
for (const server of previewServers) {
|
if (result.success && result.data) {
|
||||||
try {
|
const { successCount, failureCount, results } = result.data;
|
||||||
const result = await apiPost('/servers', {
|
|
||||||
name: server.name,
|
|
||||||
config: server.config,
|
|
||||||
});
|
|
||||||
|
|
||||||
if (result.success) {
|
if (failureCount > 0) {
|
||||||
successCount++;
|
const errors = results
|
||||||
} else {
|
.filter((r: any) => !r.success)
|
||||||
errors.push(`${server.name}: ${result.message || t('jsonImport.addFailed')}`);
|
.map((r: any) => `${r.name}: ${r.message || t('jsonImport.addFailed')}`);
|
||||||
}
|
|
||||||
} catch (err) {
|
setError(
|
||||||
errors.push(
|
t('jsonImport.partialSuccess', { count: successCount, total: previewServers.length }) +
|
||||||
`${server.name}: ${err instanceof Error ? err.message : t('jsonImport.addFailed')}`,
|
'\n' +
|
||||||
|
errors.join('\n'),
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if (errors.length > 0) {
|
if (successCount > 0) {
|
||||||
setError(
|
onSuccess();
|
||||||
t('jsonImport.partialSuccess', { count: successCount, total: previewServers.length }) +
|
}
|
||||||
'\n' +
|
} else {
|
||||||
errors.join('\n'),
|
setError(result.message || t('jsonImport.importFailed'));
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (successCount > 0) {
|
|
||||||
onSuccess();
|
|
||||||
}
|
}
|
||||||
} catch (err) {
|
} catch (err) {
|
||||||
console.error('Import error:', err);
|
console.error('Import error:', err);
|
||||||
|
|||||||
@@ -15,14 +15,16 @@ interface ServerCardProps {
|
|||||||
onEdit: (server: Server) => void;
|
onEdit: (server: Server) => void;
|
||||||
onToggle?: (server: Server, enabled: boolean) => Promise<boolean>;
|
onToggle?: (server: Server, enabled: boolean) => Promise<boolean>;
|
||||||
onRefresh?: () => void;
|
onRefresh?: () => void;
|
||||||
|
onReload?: (server: Server) => Promise<boolean>;
|
||||||
}
|
}
|
||||||
|
|
||||||
const ServerCard = ({ server, onRemove, onEdit, onToggle, onRefresh }: ServerCardProps) => {
|
const ServerCard = ({ server, onRemove, onEdit, onToggle, onRefresh, onReload }: ServerCardProps) => {
|
||||||
const { t } = useTranslation();
|
const { t } = useTranslation();
|
||||||
const { showToast } = useToast();
|
const { showToast } = useToast();
|
||||||
const [isExpanded, setIsExpanded] = useState(false);
|
const [isExpanded, setIsExpanded] = useState(false);
|
||||||
const [showDeleteDialog, setShowDeleteDialog] = useState(false);
|
const [showDeleteDialog, setShowDeleteDialog] = useState(false);
|
||||||
const [isToggling, setIsToggling] = useState(false);
|
const [isToggling, setIsToggling] = useState(false);
|
||||||
|
const [isReloading, setIsReloading] = useState(false);
|
||||||
const [showErrorPopover, setShowErrorPopover] = useState(false);
|
const [showErrorPopover, setShowErrorPopover] = useState(false);
|
||||||
const [copied, setCopied] = useState(false);
|
const [copied, setCopied] = useState(false);
|
||||||
const errorPopoverRef = useRef<HTMLDivElement>(null);
|
const errorPopoverRef = useRef<HTMLDivElement>(null);
|
||||||
@@ -64,6 +66,26 @@ const ServerCard = ({ server, onRemove, onEdit, onToggle, onRefresh }: ServerCar
|
|||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
|
const handleReload = async (e: React.MouseEvent) => {
|
||||||
|
e.stopPropagation();
|
||||||
|
if (isReloading || !onReload) return;
|
||||||
|
|
||||||
|
setIsReloading(true);
|
||||||
|
try {
|
||||||
|
const success = await onReload(server);
|
||||||
|
if (success) {
|
||||||
|
showToast(t('server.reloadSuccess') || 'Server reloaded successfully', 'success');
|
||||||
|
} else {
|
||||||
|
showToast(
|
||||||
|
t('server.reloadError', { serverName: server.name }) || 'Failed to reload server',
|
||||||
|
'error',
|
||||||
|
);
|
||||||
|
}
|
||||||
|
} finally {
|
||||||
|
setIsReloading(false);
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
const handleErrorIconClick = (e: React.MouseEvent) => {
|
const handleErrorIconClick = (e: React.MouseEvent) => {
|
||||||
e.stopPropagation();
|
e.stopPropagation();
|
||||||
setShowErrorPopover(!showErrorPopover);
|
setShowErrorPopover(!showErrorPopover);
|
||||||
@@ -106,6 +128,10 @@ const ServerCard = ({ server, onRemove, onEdit, onToggle, onRefresh }: ServerCar
|
|||||||
e.stopPropagation();
|
e.stopPropagation();
|
||||||
try {
|
try {
|
||||||
const result = await exportMCPSettings(server.name);
|
const result = await exportMCPSettings(server.name);
|
||||||
|
if (!result || !result.success || !result.data) {
|
||||||
|
showToast(result?.message || t('common.copyFailed') || 'Copy failed', 'error');
|
||||||
|
return;
|
||||||
|
}
|
||||||
const configJson = JSON.stringify(result.data, null, 2);
|
const configJson = JSON.stringify(result.data, null, 2);
|
||||||
|
|
||||||
if (navigator.clipboard && window.isSecureContext) {
|
if (navigator.clipboard && window.isSecureContext) {
|
||||||
@@ -326,7 +352,7 @@ const ServerCard = ({ server, onRemove, onEdit, onToggle, onRefresh }: ServerCar
|
|||||||
? 'bg-green-100 text-green-800 hover:bg-green-200 btn-secondary'
|
? 'bg-green-100 text-green-800 hover:bg-green-200 btn-secondary'
|
||||||
: 'bg-gray-100 text-gray-800 hover:bg-gray-200 btn-primary'
|
: 'bg-gray-100 text-gray-800 hover:bg-gray-200 btn-primary'
|
||||||
}`}
|
}`}
|
||||||
disabled={isToggling}
|
disabled={isToggling || isReloading}
|
||||||
>
|
>
|
||||||
{isToggling
|
{isToggling
|
||||||
? t('common.processing')
|
? t('common.processing')
|
||||||
@@ -335,6 +361,15 @@ const ServerCard = ({ server, onRemove, onEdit, onToggle, onRefresh }: ServerCar
|
|||||||
: t('server.enable')}
|
: t('server.enable')}
|
||||||
</button>
|
</button>
|
||||||
</div>
|
</div>
|
||||||
|
{server.enabled !== false && onReload && (
|
||||||
|
<button
|
||||||
|
onClick={handleReload}
|
||||||
|
className="px-3 py-1 bg-purple-100 text-purple-800 rounded hover:bg-purple-200 text-sm btn-secondary disabled:opacity-70 disabled:cursor-not-allowed"
|
||||||
|
disabled={isReloading || isToggling}
|
||||||
|
>
|
||||||
|
{isReloading ? t('common.processing') : t('server.reload')}
|
||||||
|
</button>
|
||||||
|
)}
|
||||||
<button
|
<button
|
||||||
onClick={handleRemove}
|
onClick={handleRemove}
|
||||||
className="px-3 py-1 bg-red-100 text-red-800 rounded hover:bg-red-200 text-sm btn-danger"
|
className="px-3 py-1 bg-red-100 text-red-800 rounded hover:bg-red-200 text-sm btn-danger"
|
||||||
|
|||||||
@@ -375,6 +375,7 @@ const ServerForm = ({
|
|||||||
? {
|
? {
|
||||||
url: formData.url,
|
url: formData.url,
|
||||||
...(Object.keys(headers).length > 0 ? { headers } : {}),
|
...(Object.keys(headers).length > 0 ? { headers } : {}),
|
||||||
|
...(Object.keys(env).length > 0 ? { env } : {}),
|
||||||
...(oauthConfig ? { oauth: oauthConfig } : {}),
|
...(oauthConfig ? { oauth: oauthConfig } : {}),
|
||||||
}
|
}
|
||||||
: {
|
: {
|
||||||
@@ -428,7 +429,6 @@ const ServerForm = ({
|
|||||||
className="shadow appearance-none border rounded w-full py-2 px-3 text-gray-700 leading-tight focus:outline-none focus:shadow-outline form-input"
|
className="shadow appearance-none border rounded w-full py-2 px-3 text-gray-700 leading-tight focus:outline-none focus:shadow-outline form-input"
|
||||||
placeholder="e.g.: time-mcp"
|
placeholder="e.g.: time-mcp"
|
||||||
required
|
required
|
||||||
disabled={isEdit}
|
|
||||||
/>
|
/>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
@@ -978,6 +978,49 @@ const ServerForm = ({
|
|||||||
))}
|
))}
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
|
<div className="mb-4">
|
||||||
|
<div className="flex justify-between items-center mb-2">
|
||||||
|
<label className="block text-gray-700 text-sm font-bold">
|
||||||
|
{t('server.envVars')}
|
||||||
|
</label>
|
||||||
|
<button
|
||||||
|
type="button"
|
||||||
|
onClick={addEnvVar}
|
||||||
|
className="bg-gray-200 hover:bg-gray-300 text-gray-700 font-medium py-1 px-2 rounded text-sm flex items-center justify-center min-w-[30px] min-h-[30px] btn-primary"
|
||||||
|
>
|
||||||
|
+
|
||||||
|
</button>
|
||||||
|
</div>
|
||||||
|
{envVars.map((envVar, index) => (
|
||||||
|
<div key={index} className="flex items-center mb-2">
|
||||||
|
<div className="flex items-center space-x-2 flex-grow">
|
||||||
|
<input
|
||||||
|
type="text"
|
||||||
|
value={envVar.key}
|
||||||
|
onChange={(e) => handleEnvVarChange(index, 'key', e.target.value)}
|
||||||
|
className="shadow appearance-none border rounded py-2 px-3 text-gray-700 leading-tight focus:outline-none focus:shadow-outline w-1/2 form-input"
|
||||||
|
placeholder={t('server.key')}
|
||||||
|
/>
|
||||||
|
<span className="flex items-center">:</span>
|
||||||
|
<input
|
||||||
|
type="text"
|
||||||
|
value={envVar.value}
|
||||||
|
onChange={(e) => handleEnvVarChange(index, 'value', e.target.value)}
|
||||||
|
className="shadow appearance-none border rounded py-2 px-3 text-gray-700 leading-tight focus:outline-none focus:shadow-outline w-1/2 form-input"
|
||||||
|
placeholder={t('server.value')}
|
||||||
|
/>
|
||||||
|
</div>
|
||||||
|
<button
|
||||||
|
type="button"
|
||||||
|
onClick={() => removeEnvVar(index)}
|
||||||
|
className="bg-gray-200 hover:bg-gray-300 text-gray-700 font-medium py-1 px-2 rounded text-sm flex items-center justify-center min-w-[30px] min-h-[30px] ml-2 btn-danger"
|
||||||
|
>
|
||||||
|
-
|
||||||
|
</button>
|
||||||
|
</div>
|
||||||
|
))}
|
||||||
|
</div>
|
||||||
|
|
||||||
<div className="mb-4">
|
<div className="mb-4">
|
||||||
<div
|
<div
|
||||||
className="flex items-center justify-between cursor-pointer bg-gray-50 hover:bg-gray-100 p-3 rounded border border-gray-200"
|
className="flex items-center justify-between cursor-pointer bg-gray-50 hover:bg-gray-100 p-3 rounded border border-gray-200"
|
||||||
|
|||||||
@@ -21,7 +21,14 @@ interface DynamicFormProps {
|
|||||||
title?: string; // Optional title to display instead of default parameters title
|
title?: string; // Optional title to display instead of default parameters title
|
||||||
}
|
}
|
||||||
|
|
||||||
const DynamicForm: React.FC<DynamicFormProps> = ({ schema, onSubmit, onCancel, loading = false, storageKey, title }) => {
|
const DynamicForm: React.FC<DynamicFormProps> = ({
|
||||||
|
schema,
|
||||||
|
onSubmit,
|
||||||
|
onCancel,
|
||||||
|
loading = false,
|
||||||
|
storageKey,
|
||||||
|
title,
|
||||||
|
}) => {
|
||||||
const { t } = useTranslation();
|
const { t } = useTranslation();
|
||||||
const [formValues, setFormValues] = useState<Record<string, any>>({});
|
const [formValues, setFormValues] = useState<Record<string, any>>({});
|
||||||
const [errors, setErrors] = useState<Record<string, string>>({});
|
const [errors, setErrors] = useState<Record<string, string>>({});
|
||||||
@@ -40,9 +47,14 @@ const DynamicForm: React.FC<DynamicFormProps> = ({ schema, onSubmit, onCancel, l
|
|||||||
description: obj.description,
|
description: obj.description,
|
||||||
enum: obj.enum,
|
enum: obj.enum,
|
||||||
default: obj.default,
|
default: obj.default,
|
||||||
properties: obj.properties ? Object.fromEntries(
|
properties: obj.properties
|
||||||
Object.entries(obj.properties).map(([key, value]) => [key, convertProperty(value)])
|
? Object.fromEntries(
|
||||||
) : undefined,
|
Object.entries(obj.properties).map(([key, value]) => [
|
||||||
|
key,
|
||||||
|
convertProperty(value),
|
||||||
|
]),
|
||||||
|
)
|
||||||
|
: undefined,
|
||||||
required: obj.required,
|
required: obj.required,
|
||||||
items: obj.items ? convertProperty(obj.items) : undefined,
|
items: obj.items ? convertProperty(obj.items) : undefined,
|
||||||
};
|
};
|
||||||
@@ -52,9 +64,14 @@ const DynamicForm: React.FC<DynamicFormProps> = ({ schema, onSubmit, onCancel, l
|
|||||||
|
|
||||||
return {
|
return {
|
||||||
type: schema.type,
|
type: schema.type,
|
||||||
properties: schema.properties ? Object.fromEntries(
|
properties: schema.properties
|
||||||
Object.entries(schema.properties).map(([key, value]) => [key, convertProperty(value)])
|
? Object.fromEntries(
|
||||||
) : undefined,
|
Object.entries(schema.properties).map(([key, value]) => [
|
||||||
|
key,
|
||||||
|
convertProperty(value),
|
||||||
|
]),
|
||||||
|
)
|
||||||
|
: undefined,
|
||||||
required: schema.required,
|
required: schema.required,
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
@@ -167,7 +184,7 @@ const DynamicForm: React.FC<DynamicFormProps> = ({ schema, onSubmit, onCancel, l
|
|||||||
};
|
};
|
||||||
|
|
||||||
const handleInputChange = (path: string, value: any) => {
|
const handleInputChange = (path: string, value: any) => {
|
||||||
setFormValues(prev => {
|
setFormValues((prev) => {
|
||||||
const newValues = { ...prev };
|
const newValues = { ...prev };
|
||||||
const keys = path.split('.');
|
const keys = path.split('.');
|
||||||
let current = newValues;
|
let current = newValues;
|
||||||
@@ -195,7 +212,7 @@ const DynamicForm: React.FC<DynamicFormProps> = ({ schema, onSubmit, onCancel, l
|
|||||||
|
|
||||||
// Clear error for this field
|
// Clear error for this field
|
||||||
if (errors[path]) {
|
if (errors[path]) {
|
||||||
setErrors(prev => {
|
setErrors((prev) => {
|
||||||
const newErrors = { ...prev };
|
const newErrors = { ...prev };
|
||||||
delete newErrors[path];
|
delete newErrors[path];
|
||||||
return newErrors;
|
return newErrors;
|
||||||
@@ -209,10 +226,16 @@ const DynamicForm: React.FC<DynamicFormProps> = ({ schema, onSubmit, onCancel, l
|
|||||||
if (schema.type === 'object' && schema.properties) {
|
if (schema.type === 'object' && schema.properties) {
|
||||||
Object.entries(schema.properties).forEach(([key, propSchema]) => {
|
Object.entries(schema.properties).forEach(([key, propSchema]) => {
|
||||||
const fullPath = path ? `${path}.${key}` : key;
|
const fullPath = path ? `${path}.${key}` : key;
|
||||||
const value = getNestedValue(values, fullPath);
|
const value = values?.[key];
|
||||||
|
|
||||||
// Check required fields
|
// Check required fields
|
||||||
if (schema.required?.includes(key) && (value === undefined || value === null || value === '')) {
|
if (
|
||||||
|
schema.required?.includes(key) &&
|
||||||
|
(value === undefined ||
|
||||||
|
value === null ||
|
||||||
|
value === '' ||
|
||||||
|
(Array.isArray(value) && value.length === 0))
|
||||||
|
) {
|
||||||
newErrors[fullPath] = `${key} is required`;
|
newErrors[fullPath] = `${key} is required`;
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
@@ -223,7 +246,10 @@ const DynamicForm: React.FC<DynamicFormProps> = ({ schema, onSubmit, onCancel, l
|
|||||||
newErrors[fullPath] = `${key} must be a string`;
|
newErrors[fullPath] = `${key} must be a string`;
|
||||||
} else if (propSchema.type === 'number' && typeof value !== 'number') {
|
} else if (propSchema.type === 'number' && typeof value !== 'number') {
|
||||||
newErrors[fullPath] = `${key} must be a number`;
|
newErrors[fullPath] = `${key} must be a number`;
|
||||||
} else if (propSchema.type === 'integer' && (!Number.isInteger(value) || typeof value !== 'number')) {
|
} else if (
|
||||||
|
propSchema.type === 'integer' &&
|
||||||
|
(!Number.isInteger(value) || typeof value !== 'number')
|
||||||
|
) {
|
||||||
newErrors[fullPath] = `${key} must be an integer`;
|
newErrors[fullPath] = `${key} must be an integer`;
|
||||||
} else if (propSchema.type === 'boolean' && typeof value !== 'boolean') {
|
} else if (propSchema.type === 'boolean' && typeof value !== 'boolean') {
|
||||||
newErrors[fullPath] = `${key} must be a boolean`;
|
newErrors[fullPath] = `${key} must be a boolean`;
|
||||||
@@ -260,7 +286,12 @@ const DynamicForm: React.FC<DynamicFormProps> = ({ schema, onSubmit, onCancel, l
|
|||||||
return path.split('.').reduce((current, key) => current?.[key], obj);
|
return path.split('.').reduce((current, key) => current?.[key], obj);
|
||||||
};
|
};
|
||||||
|
|
||||||
const renderObjectField = (key: string, schema: JsonSchema, currentValue: any, onChange: (value: any) => void): React.ReactNode => {
|
const renderObjectField = (
|
||||||
|
key: string,
|
||||||
|
schema: JsonSchema,
|
||||||
|
currentValue: any,
|
||||||
|
onChange: (value: any) => void,
|
||||||
|
): React.ReactNode => {
|
||||||
const value = currentValue?.[key];
|
const value = currentValue?.[key];
|
||||||
|
|
||||||
if (schema.type === 'string') {
|
if (schema.type === 'string') {
|
||||||
@@ -299,7 +330,12 @@ const DynamicForm: React.FC<DynamicFormProps> = ({ schema, onSubmit, onCancel, l
|
|||||||
step={schema.type === 'integer' ? '1' : 'any'}
|
step={schema.type === 'integer' ? '1' : 'any'}
|
||||||
value={value ?? ''}
|
value={value ?? ''}
|
||||||
onChange={(e) => {
|
onChange={(e) => {
|
||||||
const val = e.target.value === '' ? '' : schema.type === 'integer' ? parseInt(e.target.value) : parseFloat(e.target.value);
|
const val =
|
||||||
|
e.target.value === ''
|
||||||
|
? ''
|
||||||
|
: schema.type === 'integer'
|
||||||
|
? parseInt(e.target.value)
|
||||||
|
: parseFloat(e.target.value);
|
||||||
onChange(val);
|
onChange(val);
|
||||||
}}
|
}}
|
||||||
className="w-full border rounded-md px-2 py-1 text-sm border-gray-300 focus:outline-none focus:ring-1 focus:ring-blue-500 form-input"
|
className="w-full border rounded-md px-2 py-1 text-sm border-gray-300 focus:outline-none focus:ring-1 focus:ring-blue-500 form-input"
|
||||||
@@ -333,7 +369,7 @@ const DynamicForm: React.FC<DynamicFormProps> = ({ schema, onSubmit, onCancel, l
|
|||||||
const renderField = (key: string, propSchema: JsonSchema, path: string = ''): React.ReactNode => {
|
const renderField = (key: string, propSchema: JsonSchema, path: string = ''): React.ReactNode => {
|
||||||
const fullPath = path ? `${path}.${key}` : key;
|
const fullPath = path ? `${path}.${key}` : key;
|
||||||
const value = getNestedValue(formValues, fullPath);
|
const value = getNestedValue(formValues, fullPath);
|
||||||
const error = errors[fullPath]; // Handle array type
|
const error = errors[fullPath]; // Handle array type
|
||||||
if (propSchema.type === 'array') {
|
if (propSchema.type === 'array') {
|
||||||
const arrayValue = getNestedValue(formValues, fullPath) || [];
|
const arrayValue = getNestedValue(formValues, fullPath) || [];
|
||||||
|
|
||||||
@@ -341,7 +377,11 @@ const DynamicForm: React.FC<DynamicFormProps> = ({ schema, onSubmit, onCancel, l
|
|||||||
<div key={fullPath} className="mb-6">
|
<div key={fullPath} className="mb-6">
|
||||||
<label className="block text-sm font-medium text-gray-700 mb-1">
|
<label className="block text-sm font-medium text-gray-700 mb-1">
|
||||||
{key}
|
{key}
|
||||||
{(path ? getNestedValue(jsonSchema, path)?.required?.includes(key) : jsonSchema.required?.includes(key)) && <span className="text-status-red ml-1">*</span>}
|
{(path
|
||||||
|
? getNestedValue(jsonSchema, path)?.required?.includes(key)
|
||||||
|
: jsonSchema.required?.includes(key)) && (
|
||||||
|
<span className="text-status-red ml-1">*</span>
|
||||||
|
)}
|
||||||
</label>
|
</label>
|
||||||
{propSchema.description && (
|
{propSchema.description && (
|
||||||
<p className="text-xs text-gray-500 mb-2">{propSchema.description}</p>
|
<p className="text-xs text-gray-500 mb-2">{propSchema.description}</p>
|
||||||
@@ -349,9 +389,11 @@ const DynamicForm: React.FC<DynamicFormProps> = ({ schema, onSubmit, onCancel, l
|
|||||||
|
|
||||||
<div className="border border-gray-200 rounded-md p-3 bg-gray-50">
|
<div className="border border-gray-200 rounded-md p-3 bg-gray-50">
|
||||||
{arrayValue.map((item: any, index: number) => (
|
{arrayValue.map((item: any, index: number) => (
|
||||||
<div key={index} className="mb-3 p-3 bg-white border rounded-md">
|
<div key={index} className="mb-3 p-3 bg-white border border-gray-200 rounded-md">
|
||||||
<div className="flex justify-between items-center mb-2">
|
<div className="flex justify-between items-center mb-2">
|
||||||
<span className="text-sm font-medium text-gray-600">{t('tool.item', { index: index + 1 })}</span>
|
<span className="text-sm font-medium text-gray-600">
|
||||||
|
{t('tool.item', { index: index + 1 })}
|
||||||
|
</span>
|
||||||
<button
|
<button
|
||||||
type="button"
|
type="button"
|
||||||
onClick={() => {
|
onClick={() => {
|
||||||
@@ -388,7 +430,9 @@ const DynamicForm: React.FC<DynamicFormProps> = ({ schema, onSubmit, onCancel, l
|
|||||||
<div key={objKey}>
|
<div key={objKey}>
|
||||||
<label className="block text-xs font-medium text-gray-600 mb-1">
|
<label className="block text-xs font-medium text-gray-600 mb-1">
|
||||||
{objKey}
|
{objKey}
|
||||||
{propSchema.items?.required?.includes(objKey) && <span className="text-status-red ml-1">*</span>}
|
{propSchema.items?.required?.includes(objKey) && (
|
||||||
|
<span className="text-status-red ml-1">*</span>
|
||||||
|
)}
|
||||||
</label>
|
</label>
|
||||||
{renderObjectField(objKey, objSchema as JsonSchema, item, (newValue) => {
|
{renderObjectField(objKey, objSchema as JsonSchema, item, (newValue) => {
|
||||||
const newArray = [...arrayValue];
|
const newArray = [...arrayValue];
|
||||||
@@ -429,7 +473,7 @@ const DynamicForm: React.FC<DynamicFormProps> = ({ schema, onSubmit, onCancel, l
|
|||||||
{error && <p className="text-status-red text-xs mt-1">{error}</p>}
|
{error && <p className="text-status-red text-xs mt-1">{error}</p>}
|
||||||
</div>
|
</div>
|
||||||
);
|
);
|
||||||
} // Handle object type
|
} // Handle object type
|
||||||
if (propSchema.type === 'object') {
|
if (propSchema.type === 'object') {
|
||||||
if (propSchema.properties) {
|
if (propSchema.properties) {
|
||||||
// Object with defined properties - render as nested form
|
// Object with defined properties - render as nested form
|
||||||
@@ -437,16 +481,20 @@ const DynamicForm: React.FC<DynamicFormProps> = ({ schema, onSubmit, onCancel, l
|
|||||||
<div key={fullPath} className="mb-6">
|
<div key={fullPath} className="mb-6">
|
||||||
<label className="block text-sm font-medium text-gray-700 mb-1">
|
<label className="block text-sm font-medium text-gray-700 mb-1">
|
||||||
{key}
|
{key}
|
||||||
{(path ? getNestedValue(jsonSchema, path)?.required?.includes(key) : jsonSchema.required?.includes(key)) && <span className="text-status-red ml-1">*</span>}
|
{(path
|
||||||
|
? getNestedValue(jsonSchema, path)?.required?.includes(key)
|
||||||
|
: jsonSchema.required?.includes(key)) && (
|
||||||
|
<span className="text-status-red ml-1">*</span>
|
||||||
|
)}
|
||||||
</label>
|
</label>
|
||||||
{propSchema.description && (
|
{propSchema.description && (
|
||||||
<p className="text-xs text-gray-500 mb-2">{propSchema.description}</p>
|
<p className="text-xs text-gray-500 mb-2">{propSchema.description}</p>
|
||||||
)}
|
)}
|
||||||
|
|
||||||
<div className="border border-gray-200 rounded-md p-4 bg-gray-50">
|
<div className="border border-gray-200 rounded-md p-4 bg-gray-50">
|
||||||
{Object.entries(propSchema.properties).map(([objKey, objSchema]) => (
|
{Object.entries(propSchema.properties).map(([objKey, objSchema]) =>
|
||||||
renderField(objKey, objSchema as JsonSchema, fullPath)
|
renderField(objKey, objSchema as JsonSchema, fullPath),
|
||||||
))}
|
)}
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
{error && <p className="text-status-red text-xs mt-1">{error}</p>}
|
{error && <p className="text-status-red text-xs mt-1">{error}</p>}
|
||||||
@@ -458,7 +506,11 @@ const DynamicForm: React.FC<DynamicFormProps> = ({ schema, onSubmit, onCancel, l
|
|||||||
<div key={fullPath} className="mb-4">
|
<div key={fullPath} className="mb-4">
|
||||||
<label className="block text-sm font-medium text-gray-700 mb-1">
|
<label className="block text-sm font-medium text-gray-700 mb-1">
|
||||||
{key}
|
{key}
|
||||||
{(path ? getNestedValue(jsonSchema, path)?.required?.includes(key) : jsonSchema.required?.includes(key)) && <span className="text-status-red ml-1">*</span>}
|
{(path
|
||||||
|
? getNestedValue(jsonSchema, path)?.required?.includes(key)
|
||||||
|
: jsonSchema.required?.includes(key)) && (
|
||||||
|
<span className="text-status-red ml-1">*</span>
|
||||||
|
)}
|
||||||
<span className="text-xs text-gray-500 ml-1">(JSON object)</span>
|
<span className="text-xs text-gray-500 ml-1">(JSON object)</span>
|
||||||
</label>
|
</label>
|
||||||
{propSchema.description && (
|
{propSchema.description && (
|
||||||
@@ -483,13 +535,16 @@ const DynamicForm: React.FC<DynamicFormProps> = ({ schema, onSubmit, onCancel, l
|
|||||||
</div>
|
</div>
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
} if (propSchema.type === 'string') {
|
}
|
||||||
|
if (propSchema.type === 'string') {
|
||||||
if (propSchema.enum) {
|
if (propSchema.enum) {
|
||||||
return (
|
return (
|
||||||
<div key={fullPath} className="mb-4">
|
<div key={fullPath} className="mb-4">
|
||||||
<label className="block text-sm font-medium text-gray-700 mb-1">
|
<label className="block text-sm font-medium text-gray-700 mb-1">
|
||||||
{key}
|
{key}
|
||||||
{(path ? false : jsonSchema.required?.includes(key)) && <span className="text-status-red ml-1">*</span>}
|
{(path ? false : jsonSchema.required?.includes(key)) && (
|
||||||
|
<span className="text-status-red ml-1">*</span>
|
||||||
|
)}
|
||||||
</label>
|
</label>
|
||||||
{propSchema.description && (
|
{propSchema.description && (
|
||||||
<p className="text-xs text-gray-500 mb-2">{propSchema.description}</p>
|
<p className="text-xs text-gray-500 mb-2">{propSchema.description}</p>
|
||||||
@@ -514,7 +569,9 @@ const DynamicForm: React.FC<DynamicFormProps> = ({ schema, onSubmit, onCancel, l
|
|||||||
<div key={fullPath} className="mb-4">
|
<div key={fullPath} className="mb-4">
|
||||||
<label className="block text-sm font-medium text-gray-700 mb-1">
|
<label className="block text-sm font-medium text-gray-700 mb-1">
|
||||||
{key}
|
{key}
|
||||||
{(path ? false : jsonSchema.required?.includes(key)) && <span className="text-status-red ml-1">*</span>}
|
{(path ? false : jsonSchema.required?.includes(key)) && (
|
||||||
|
<span className="text-status-red ml-1">*</span>
|
||||||
|
)}
|
||||||
</label>
|
</label>
|
||||||
{propSchema.description && (
|
{propSchema.description && (
|
||||||
<p className="text-xs text-gray-500 mb-2">{propSchema.description}</p>
|
<p className="text-xs text-gray-500 mb-2">{propSchema.description}</p>
|
||||||
@@ -529,12 +586,15 @@ const DynamicForm: React.FC<DynamicFormProps> = ({ schema, onSubmit, onCancel, l
|
|||||||
</div>
|
</div>
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
} if (propSchema.type === 'number' || propSchema.type === 'integer') {
|
}
|
||||||
|
if (propSchema.type === 'number' || propSchema.type === 'integer') {
|
||||||
return (
|
return (
|
||||||
<div key={fullPath} className="mb-4">
|
<div key={fullPath} className="mb-4">
|
||||||
<label className="block text-sm font-medium text-gray-700 mb-1">
|
<label className="block text-sm font-medium text-gray-700 mb-1">
|
||||||
{key}
|
{key}
|
||||||
{(path ? false : jsonSchema.required?.includes(key)) && <span className="text-status-red ml-1">*</span>}
|
{(path ? false : jsonSchema.required?.includes(key)) && (
|
||||||
|
<span className="text-status-red ml-1">*</span>
|
||||||
|
)}
|
||||||
</label>
|
</label>
|
||||||
{propSchema.description && (
|
{propSchema.description && (
|
||||||
<p className="text-xs text-gray-500 mb-2">{propSchema.description}</p>
|
<p className="text-xs text-gray-500 mb-2">{propSchema.description}</p>
|
||||||
@@ -544,7 +604,12 @@ const DynamicForm: React.FC<DynamicFormProps> = ({ schema, onSubmit, onCancel, l
|
|||||||
step={propSchema.type === 'integer' ? '1' : 'any'}
|
step={propSchema.type === 'integer' ? '1' : 'any'}
|
||||||
value={value !== undefined && value !== null ? value : ''}
|
value={value !== undefined && value !== null ? value : ''}
|
||||||
onChange={(e) => {
|
onChange={(e) => {
|
||||||
const val = e.target.value === '' ? '' : propSchema.type === 'integer' ? parseInt(e.target.value) : parseFloat(e.target.value);
|
const val =
|
||||||
|
e.target.value === ''
|
||||||
|
? ''
|
||||||
|
: propSchema.type === 'integer'
|
||||||
|
? parseInt(e.target.value)
|
||||||
|
: parseFloat(e.target.value);
|
||||||
handleInputChange(fullPath, val);
|
handleInputChange(fullPath, val);
|
||||||
}}
|
}}
|
||||||
className={`w-full border rounded-md px-3 py-2 form-input ${error ? 'border-red-500' : 'border-gray-300'} focus:outline-none focus:ring-2 focus:ring-blue-500`}
|
className={`w-full border rounded-md px-3 py-2 form-input ${error ? 'border-red-500' : 'border-gray-300'} focus:outline-none focus:ring-2 focus:ring-blue-500`}
|
||||||
@@ -566,7 +631,9 @@ const DynamicForm: React.FC<DynamicFormProps> = ({ schema, onSubmit, onCancel, l
|
|||||||
/>
|
/>
|
||||||
<label className="ml-2 block text-sm text-gray-700">
|
<label className="ml-2 block text-sm text-gray-700">
|
||||||
{key}
|
{key}
|
||||||
{(path ? false : jsonSchema.required?.includes(key)) && <span className="text-status-red ml-1">*</span>}
|
{(path ? false : jsonSchema.required?.includes(key)) && (
|
||||||
|
<span className="text-status-red ml-1">*</span>
|
||||||
|
)}
|
||||||
</label>
|
</label>
|
||||||
</div>
|
</div>
|
||||||
{propSchema.description && (
|
{propSchema.description && (
|
||||||
@@ -575,12 +642,14 @@ const DynamicForm: React.FC<DynamicFormProps> = ({ schema, onSubmit, onCancel, l
|
|||||||
{error && <p className="text-status-red text-xs mt-1">{error}</p>}
|
{error && <p className="text-status-red text-xs mt-1">{error}</p>}
|
||||||
</div>
|
</div>
|
||||||
);
|
);
|
||||||
} // For other types, show as text input with description
|
} // For other types, show as text input with description
|
||||||
return (
|
return (
|
||||||
<div key={fullPath} className="mb-4">
|
<div key={fullPath} className="mb-4">
|
||||||
<label className="block text-sm font-medium text-gray-700 mb-1">
|
<label className="block text-sm font-medium text-gray-700 mb-1">
|
||||||
{key}
|
{key}
|
||||||
{(path ? false : jsonSchema.required?.includes(key)) && <span className="text-status-red ml-1">*</span>}
|
{(path ? false : jsonSchema.required?.includes(key)) && (
|
||||||
|
<span className="text-status-red ml-1">*</span>
|
||||||
|
)}
|
||||||
<span className="text-xs text-gray-500 ml-1">({propSchema.type})</span>
|
<span className="text-xs text-gray-500 ml-1">({propSchema.type})</span>
|
||||||
</label>
|
</label>
|
||||||
{propSchema.description && (
|
{propSchema.description && (
|
||||||
@@ -631,20 +700,22 @@ const DynamicForm: React.FC<DynamicFormProps> = ({ schema, onSubmit, onCancel, l
|
|||||||
<button
|
<button
|
||||||
type="button"
|
type="button"
|
||||||
onClick={switchToFormMode}
|
onClick={switchToFormMode}
|
||||||
className={`px-3 py-1 text-sm rounded-md transition-colors ${!isJsonMode
|
className={`px-3 py-1 text-sm rounded-md transition-colors ${
|
||||||
? 'bg-blue-100 text-blue-800 rounded hover:bg-blue-200 text-sm btn-primary'
|
!isJsonMode
|
||||||
: 'text-sm text-gray-600 bg-gray-200 rounded hover:bg-gray-300 btn-secondary'
|
? 'bg-blue-100 text-blue-800 rounded hover:bg-blue-200 text-sm btn-primary'
|
||||||
}`}
|
: 'text-sm text-gray-600 bg-gray-200 rounded hover:bg-gray-300 btn-secondary'
|
||||||
|
}`}
|
||||||
>
|
>
|
||||||
{t('tool.formMode')}
|
{t('tool.formMode')}
|
||||||
</button>
|
</button>
|
||||||
<button
|
<button
|
||||||
type="button"
|
type="button"
|
||||||
onClick={switchToJsonMode}
|
onClick={switchToJsonMode}
|
||||||
className={`px-3 py-1 text-sm rounded-md transition-colors ${isJsonMode
|
className={`px-3 py-1 text-sm rounded-md transition-colors ${
|
||||||
? 'px-4 py-1 bg-blue-100 text-blue-800 rounded hover:bg-blue-200 text-sm btn-primary'
|
isJsonMode
|
||||||
: 'text-sm text-gray-600 bg-gray-200 rounded hover:bg-gray-300 btn-secondary'
|
? 'px-4 py-1 bg-blue-100 text-blue-800 rounded hover:bg-blue-200 text-sm btn-primary'
|
||||||
}`}
|
: 'text-sm text-gray-600 bg-gray-200 rounded hover:bg-gray-300 btn-secondary'
|
||||||
|
}`}
|
||||||
>
|
>
|
||||||
{t('tool.jsonMode')}
|
{t('tool.jsonMode')}
|
||||||
</button>
|
</button>
|
||||||
@@ -662,8 +733,9 @@ const DynamicForm: React.FC<DynamicFormProps> = ({ schema, onSubmit, onCancel, l
|
|||||||
value={jsonText}
|
value={jsonText}
|
||||||
onChange={(e) => handleJsonTextChange(e.target.value)}
|
onChange={(e) => handleJsonTextChange(e.target.value)}
|
||||||
placeholder={`{\n "key": "value"\n}`}
|
placeholder={`{\n "key": "value"\n}`}
|
||||||
className={`w-full h-64 border rounded-md px-3 py-2 font-mono text-sm resize-y form-input ${jsonError ? 'border-red-500' : 'border-gray-300'
|
className={`w-full h-64 border rounded-md px-3 py-2 font-mono text-sm resize-y form-input ${
|
||||||
} focus:outline-none focus:ring-2 focus:ring-blue-500`}
|
jsonError ? 'border-red-500' : 'border-gray-300'
|
||||||
|
} focus:outline-none focus:ring-2 focus:ring-blue-500`}
|
||||||
/>
|
/>
|
||||||
{jsonError && <p className="text-status-red text-xs mt-1">{jsonError}</p>}
|
{jsonError && <p className="text-status-red text-xs mt-1">{jsonError}</p>}
|
||||||
</div>
|
</div>
|
||||||
@@ -696,7 +768,7 @@ const DynamicForm: React.FC<DynamicFormProps> = ({ schema, onSubmit, onCancel, l
|
|||||||
/* Form Mode */
|
/* Form Mode */
|
||||||
<form onSubmit={handleSubmit} className="space-y-4">
|
<form onSubmit={handleSubmit} className="space-y-4">
|
||||||
{Object.entries(jsonSchema.properties || {}).map(([key, propSchema]) =>
|
{Object.entries(jsonSchema.properties || {}).map(([key, propSchema]) =>
|
||||||
renderField(key, propSchema)
|
renderField(key, propSchema),
|
||||||
)}
|
)}
|
||||||
|
|
||||||
<div className="flex justify-end space-x-2 pt-4">
|
<div className="flex justify-end space-x-2 pt-4">
|
||||||
|
|||||||
161
frontend/src/components/ui/MultiSelect.tsx
Normal file
161
frontend/src/components/ui/MultiSelect.tsx
Normal file
@@ -0,0 +1,161 @@
|
|||||||
|
import React, { useState, useRef, useEffect } from 'react';
|
||||||
|
import { Check, ChevronDown, X } from 'lucide-react';
|
||||||
|
|
||||||
|
interface MultiSelectProps {
|
||||||
|
options: { value: string; label: string }[];
|
||||||
|
selected: string[];
|
||||||
|
onChange: (selected: string[]) => void;
|
||||||
|
placeholder?: string;
|
||||||
|
disabled?: boolean;
|
||||||
|
className?: string;
|
||||||
|
}
|
||||||
|
|
||||||
|
export const MultiSelect: React.FC<MultiSelectProps> = ({
|
||||||
|
options,
|
||||||
|
selected,
|
||||||
|
onChange,
|
||||||
|
placeholder = 'Select items...',
|
||||||
|
disabled = false,
|
||||||
|
className = '',
|
||||||
|
}) => {
|
||||||
|
const [isOpen, setIsOpen] = useState(false);
|
||||||
|
const [searchTerm, setSearchTerm] = useState('');
|
||||||
|
const dropdownRef = useRef<HTMLDivElement>(null);
|
||||||
|
const inputRef = useRef<HTMLInputElement>(null);
|
||||||
|
|
||||||
|
// Close dropdown when clicking outside
|
||||||
|
useEffect(() => {
|
||||||
|
const handleClickOutside = (event: MouseEvent) => {
|
||||||
|
if (dropdownRef.current && !dropdownRef.current.contains(event.target as Node)) {
|
||||||
|
setIsOpen(false);
|
||||||
|
setSearchTerm('');
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
document.addEventListener('mousedown', handleClickOutside);
|
||||||
|
return () => document.removeEventListener('mousedown', handleClickOutside);
|
||||||
|
}, []);
|
||||||
|
|
||||||
|
const filteredOptions = options.filter((option) =>
|
||||||
|
option.label.toLowerCase().includes(searchTerm.toLowerCase()),
|
||||||
|
);
|
||||||
|
|
||||||
|
const handleToggleOption = (value: string) => {
|
||||||
|
if (disabled) return;
|
||||||
|
|
||||||
|
const newSelected = selected.includes(value)
|
||||||
|
? selected.filter((item) => item !== value)
|
||||||
|
: [...selected, value];
|
||||||
|
|
||||||
|
onChange(newSelected);
|
||||||
|
};
|
||||||
|
|
||||||
|
const handleRemoveItem = (value: string, e: React.MouseEvent) => {
|
||||||
|
e.stopPropagation();
|
||||||
|
if (disabled) return;
|
||||||
|
onChange(selected.filter((item) => item !== value));
|
||||||
|
};
|
||||||
|
|
||||||
|
const handleToggleDropdown = () => {
|
||||||
|
if (disabled) return;
|
||||||
|
setIsOpen(!isOpen);
|
||||||
|
if (!isOpen) {
|
||||||
|
setTimeout(() => inputRef.current?.focus(), 0);
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
const getSelectedLabels = () => {
|
||||||
|
return selected
|
||||||
|
.map((value) => options.find((opt) => opt.value === value)?.label || value)
|
||||||
|
.filter(Boolean);
|
||||||
|
};
|
||||||
|
|
||||||
|
return (
|
||||||
|
<div ref={dropdownRef} className={`relative ${className}`}>
|
||||||
|
{/* Selected items display */}
|
||||||
|
<div
|
||||||
|
onClick={handleToggleDropdown}
|
||||||
|
className={`
|
||||||
|
min-h-[38px] w-full px-3 py-1.5 border rounded-md shadow-sm
|
||||||
|
flex flex-wrap items-center gap-1.5 cursor-pointer
|
||||||
|
transition-all duration-200
|
||||||
|
${disabled ? 'bg-gray-100 cursor-not-allowed' : 'bg-white hover:border-blue-400'}
|
||||||
|
${isOpen ? 'border-blue-500 ring-1 ring-blue-500' : 'border-gray-300'}
|
||||||
|
`}
|
||||||
|
>
|
||||||
|
{selected.length > 0 ? (
|
||||||
|
<>
|
||||||
|
{getSelectedLabels().map((label, index) => (
|
||||||
|
<span
|
||||||
|
key={selected[index]}
|
||||||
|
className="inline-flex items-center px-2 py-0.5 rounded text-xs font-medium bg-blue-100 text-blue-800"
|
||||||
|
>
|
||||||
|
{label}
|
||||||
|
{!disabled && (
|
||||||
|
<button
|
||||||
|
type="button"
|
||||||
|
onClick={(e) => handleRemoveItem(selected[index], e)}
|
||||||
|
className="ml-1 hover:bg-blue-200 rounded-full p-0.5 transition-colors"
|
||||||
|
>
|
||||||
|
<X className="h-3 w-3" />
|
||||||
|
</button>
|
||||||
|
)}
|
||||||
|
</span>
|
||||||
|
))}
|
||||||
|
</>
|
||||||
|
) : (
|
||||||
|
<span className="text-gray-400 text-sm">{placeholder}</span>
|
||||||
|
)}
|
||||||
|
<div className="flex-1"></div>
|
||||||
|
<ChevronDown
|
||||||
|
className={`h-4 w-4 text-gray-400 transition-transform duration-200 ${isOpen ? 'transform rotate-180' : ''}`}
|
||||||
|
/>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
{/* Dropdown menu */}
|
||||||
|
{isOpen && !disabled && (
|
||||||
|
<div className="absolute z-50 w-full mt-1 bg-white border border-gray-300 rounded-md shadow-lg max-h-60 overflow-hidden">
|
||||||
|
{/* Search input */}
|
||||||
|
<div className="p-2 border-b border-gray-200">
|
||||||
|
<input
|
||||||
|
ref={inputRef}
|
||||||
|
type="text"
|
||||||
|
value={searchTerm}
|
||||||
|
onChange={(e) => setSearchTerm(e.target.value)}
|
||||||
|
placeholder="Search..."
|
||||||
|
className="w-full px-3 py-1.5 text-sm border border-gray-300 rounded focus:outline-none focus:ring-1 focus:ring-blue-500 focus:border-blue-500"
|
||||||
|
onClick={(e) => e.stopPropagation()}
|
||||||
|
/>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
{/* Options list */}
|
||||||
|
<div className="max-h-48 overflow-y-auto">
|
||||||
|
{filteredOptions.length > 0 ? (
|
||||||
|
filteredOptions.map((option) => {
|
||||||
|
const isSelected = selected.includes(option.value);
|
||||||
|
return (
|
||||||
|
<div
|
||||||
|
key={option.value}
|
||||||
|
onClick={() => handleToggleOption(option.value)}
|
||||||
|
className={`
|
||||||
|
px-3 py-2 cursor-pointer flex items-center justify-between
|
||||||
|
transition-colors duration-150
|
||||||
|
${isSelected ? 'bg-blue-50 text-blue-700' : 'hover:bg-gray-100'}
|
||||||
|
`}
|
||||||
|
>
|
||||||
|
<span className="text-sm">{option.label}</span>
|
||||||
|
{isSelected && <Check className="h-4 w-4 text-blue-600" />}
|
||||||
|
</div>
|
||||||
|
);
|
||||||
|
})
|
||||||
|
) : (
|
||||||
|
<div className="px-3 py-2 text-sm text-gray-500 text-center">
|
||||||
|
{searchTerm ? 'No results found' : 'No options available'}
|
||||||
|
</div>
|
||||||
|
)}
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
)}
|
||||||
|
</div>
|
||||||
|
);
|
||||||
|
};
|
||||||
@@ -1,152 +1,174 @@
|
|||||||
import { useState, useCallback, useRef, useEffect } from 'react'
|
import { useState, useCallback, useRef, useEffect } from 'react';
|
||||||
import { useTranslation } from 'react-i18next'
|
import { useTranslation } from 'react-i18next';
|
||||||
import { Prompt } from '@/types'
|
import { Prompt } from '@/types';
|
||||||
import { ChevronDown, ChevronRight, Play, Loader, Edit, Check } from '@/components/icons/LucideIcons'
|
import {
|
||||||
import { Switch } from './ToggleGroup'
|
ChevronDown,
|
||||||
import { getPrompt, PromptCallResult } from '@/services/promptService'
|
ChevronRight,
|
||||||
import { useSettingsData } from '@/hooks/useSettingsData'
|
Play,
|
||||||
import DynamicForm from './DynamicForm'
|
Loader,
|
||||||
import PromptResult from './PromptResult'
|
Edit,
|
||||||
|
Check,
|
||||||
|
} from '@/components/icons/LucideIcons';
|
||||||
|
import { Switch } from './ToggleGroup';
|
||||||
|
import { getPrompt, updatePromptDescription, PromptCallResult } from '@/services/promptService';
|
||||||
|
import { useSettingsData } from '@/hooks/useSettingsData';
|
||||||
|
import DynamicForm from './DynamicForm';
|
||||||
|
import PromptResult from './PromptResult';
|
||||||
|
import { useToast } from '@/contexts/ToastContext';
|
||||||
|
|
||||||
interface PromptCardProps {
|
interface PromptCardProps {
|
||||||
server: string
|
server: string;
|
||||||
prompt: Prompt
|
prompt: Prompt;
|
||||||
onToggle?: (promptName: string, enabled: boolean) => void
|
onToggle?: (promptName: string, enabled: boolean) => void;
|
||||||
onDescriptionUpdate?: (promptName: string, description: string) => void
|
onDescriptionUpdate?: (promptName: string, description: string) => void;
|
||||||
}
|
}
|
||||||
|
|
||||||
const PromptCard = ({ prompt, server, onToggle, onDescriptionUpdate }: PromptCardProps) => {
|
const PromptCard = ({ prompt, server, onToggle, onDescriptionUpdate }: PromptCardProps) => {
|
||||||
const { t } = useTranslation()
|
const { t } = useTranslation();
|
||||||
const { nameSeparator } = useSettingsData()
|
const { showToast } = useToast();
|
||||||
const [isExpanded, setIsExpanded] = useState(false)
|
const { nameSeparator } = useSettingsData();
|
||||||
const [showRunForm, setShowRunForm] = useState(false)
|
const [isExpanded, setIsExpanded] = useState(false);
|
||||||
const [isRunning, setIsRunning] = useState(false)
|
const [showRunForm, setShowRunForm] = useState(false);
|
||||||
const [result, setResult] = useState<PromptCallResult | null>(null)
|
const [isRunning, setIsRunning] = useState(false);
|
||||||
const [isEditingDescription, setIsEditingDescription] = useState(false)
|
const [result, setResult] = useState<PromptCallResult | null>(null);
|
||||||
const [customDescription, setCustomDescription] = useState(prompt.description || '')
|
const [isEditingDescription, setIsEditingDescription] = useState(false);
|
||||||
const descriptionInputRef = useRef<HTMLInputElement>(null)
|
const [customDescription, setCustomDescription] = useState(prompt.description || '');
|
||||||
const descriptionTextRef = useRef<HTMLSpanElement>(null)
|
const descriptionInputRef = useRef<HTMLInputElement>(null);
|
||||||
const [textWidth, setTextWidth] = useState<number>(0)
|
const descriptionTextRef = useRef<HTMLSpanElement>(null);
|
||||||
|
const [textWidth, setTextWidth] = useState<number>(0);
|
||||||
|
|
||||||
// Focus the input when editing mode is activated
|
// Focus the input when editing mode is activated
|
||||||
useEffect(() => {
|
useEffect(() => {
|
||||||
if (isEditingDescription && descriptionInputRef.current) {
|
if (isEditingDescription && descriptionInputRef.current) {
|
||||||
descriptionInputRef.current.focus()
|
descriptionInputRef.current.focus();
|
||||||
// Set input width to match text width
|
// Set input width to match text width
|
||||||
if (textWidth > 0) {
|
if (textWidth > 0) {
|
||||||
descriptionInputRef.current.style.width = `${textWidth + 20}px` // Add some padding
|
descriptionInputRef.current.style.width = `${textWidth + 20}px`; // Add some padding
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}, [isEditingDescription, textWidth])
|
}, [isEditingDescription, textWidth]);
|
||||||
|
|
||||||
// Measure text width when not editing
|
// Measure text width when not editing
|
||||||
useEffect(() => {
|
useEffect(() => {
|
||||||
if (!isEditingDescription && descriptionTextRef.current) {
|
if (!isEditingDescription && descriptionTextRef.current) {
|
||||||
setTextWidth(descriptionTextRef.current.offsetWidth)
|
setTextWidth(descriptionTextRef.current.offsetWidth);
|
||||||
}
|
}
|
||||||
}, [isEditingDescription, customDescription])
|
}, [isEditingDescription, customDescription]);
|
||||||
|
|
||||||
// Generate a unique key for localStorage based on prompt name and server
|
// Generate a unique key for localStorage based on prompt name and server
|
||||||
const getStorageKey = useCallback(() => {
|
const getStorageKey = useCallback(() => {
|
||||||
return `mcphub_prompt_form_${server ? `${server}_` : ''}${prompt.name}`
|
return `mcphub_prompt_form_${server ? `${server}_` : ''}${prompt.name}`;
|
||||||
}, [prompt.name, server])
|
}, [prompt.name, server]);
|
||||||
|
|
||||||
// Clear form data from localStorage
|
// Clear form data from localStorage
|
||||||
const clearStoredFormData = useCallback(() => {
|
const clearStoredFormData = useCallback(() => {
|
||||||
localStorage.removeItem(getStorageKey())
|
localStorage.removeItem(getStorageKey());
|
||||||
}, [getStorageKey])
|
}, [getStorageKey]);
|
||||||
|
|
||||||
const handleToggle = (enabled: boolean) => {
|
const handleToggle = (enabled: boolean) => {
|
||||||
if (onToggle) {
|
if (onToggle) {
|
||||||
onToggle(prompt.name, enabled)
|
onToggle(prompt.name, enabled);
|
||||||
}
|
}
|
||||||
}
|
};
|
||||||
|
|
||||||
const handleDescriptionEdit = () => {
|
const handleDescriptionEdit = () => {
|
||||||
setIsEditingDescription(true)
|
setIsEditingDescription(true);
|
||||||
}
|
};
|
||||||
|
|
||||||
const handleDescriptionSave = async () => {
|
const handleDescriptionSave = async () => {
|
||||||
// For now, we'll just update the local state
|
setIsEditingDescription(false);
|
||||||
// In a real implementation, you would call an API to update the description
|
try {
|
||||||
setIsEditingDescription(false)
|
const result = await updatePromptDescription(server, prompt.name, customDescription);
|
||||||
if (onDescriptionUpdate) {
|
if (result.success) {
|
||||||
onDescriptionUpdate(prompt.name, customDescription)
|
showToast(t('prompt.descriptionUpdateSuccess'), 'success');
|
||||||
|
if (onDescriptionUpdate) {
|
||||||
|
onDescriptionUpdate(prompt.name, customDescription);
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
showToast(result.error || t('prompt.descriptionUpdateFailed'), 'error');
|
||||||
|
// Revert to original description on failure
|
||||||
|
setCustomDescription(prompt.description || '');
|
||||||
|
}
|
||||||
|
} catch (error) {
|
||||||
|
console.error('Error updating prompt description:', error);
|
||||||
|
showToast(t('prompt.descriptionUpdateFailed'), 'error');
|
||||||
|
// Revert to original description on failure
|
||||||
|
setCustomDescription(prompt.description || '');
|
||||||
}
|
}
|
||||||
}
|
};
|
||||||
|
|
||||||
const handleDescriptionChange = (e: React.ChangeEvent<HTMLInputElement>) => {
|
const handleDescriptionChange = (e: React.ChangeEvent<HTMLInputElement>) => {
|
||||||
setCustomDescription(e.target.value)
|
setCustomDescription(e.target.value);
|
||||||
}
|
};
|
||||||
|
|
||||||
const handleDescriptionKeyDown = (e: React.KeyboardEvent<HTMLInputElement>) => {
|
const handleDescriptionKeyDown = (e: React.KeyboardEvent<HTMLInputElement>) => {
|
||||||
if (e.key === 'Enter') {
|
if (e.key === 'Enter') {
|
||||||
handleDescriptionSave()
|
handleDescriptionSave();
|
||||||
} else if (e.key === 'Escape') {
|
} else if (e.key === 'Escape') {
|
||||||
setCustomDescription(prompt.description || '')
|
setCustomDescription(prompt.description || '');
|
||||||
setIsEditingDescription(false)
|
setIsEditingDescription(false);
|
||||||
}
|
}
|
||||||
}
|
};
|
||||||
|
|
||||||
const handleGetPrompt = async (arguments_: Record<string, any>) => {
|
const handleGetPrompt = async (arguments_: Record<string, any>) => {
|
||||||
setIsRunning(true)
|
setIsRunning(true);
|
||||||
try {
|
try {
|
||||||
const result = await getPrompt({ promptName: prompt.name, arguments: arguments_ }, server)
|
const result = await getPrompt({ promptName: prompt.name, arguments: arguments_ }, server);
|
||||||
console.log('GetPrompt result:', result)
|
console.log('GetPrompt result:', result);
|
||||||
setResult({
|
setResult({
|
||||||
success: result.success,
|
success: result.success,
|
||||||
data: result.data,
|
data: result.data,
|
||||||
error: result.error
|
error: result.error,
|
||||||
})
|
});
|
||||||
// Clear form data on successful submission
|
// Clear form data on successful submission
|
||||||
// clearStoredFormData()
|
// clearStoredFormData()
|
||||||
} catch (error) {
|
} catch (error) {
|
||||||
setResult({
|
setResult({
|
||||||
success: false,
|
success: false,
|
||||||
error: error instanceof Error ? error.message : 'Unknown error occurred',
|
error: error instanceof Error ? error.message : 'Unknown error occurred',
|
||||||
})
|
});
|
||||||
} finally {
|
} finally {
|
||||||
setIsRunning(false)
|
setIsRunning(false);
|
||||||
}
|
}
|
||||||
}
|
};
|
||||||
|
|
||||||
const handleCancelRun = () => {
|
const handleCancelRun = () => {
|
||||||
setShowRunForm(false)
|
setShowRunForm(false);
|
||||||
// Clear form data when cancelled
|
// Clear form data when cancelled
|
||||||
clearStoredFormData()
|
clearStoredFormData();
|
||||||
setResult(null)
|
setResult(null);
|
||||||
}
|
};
|
||||||
|
|
||||||
const handleCloseResult = () => {
|
const handleCloseResult = () => {
|
||||||
setResult(null)
|
setResult(null);
|
||||||
}
|
};
|
||||||
|
|
||||||
// Convert prompt arguments to ToolInputSchema format for DynamicForm
|
// Convert prompt arguments to ToolInputSchema format for DynamicForm
|
||||||
const convertToSchema = () => {
|
const convertToSchema = () => {
|
||||||
if (!prompt.arguments || prompt.arguments.length === 0) {
|
if (!prompt.arguments || prompt.arguments.length === 0) {
|
||||||
return { type: 'object', properties: {}, required: [] }
|
return { type: 'object', properties: {}, required: [] };
|
||||||
}
|
}
|
||||||
|
|
||||||
const properties: Record<string, any> = {}
|
const properties: Record<string, any> = {};
|
||||||
const required: string[] = []
|
const required: string[] = [];
|
||||||
|
|
||||||
prompt.arguments.forEach(arg => {
|
prompt.arguments.forEach((arg) => {
|
||||||
properties[arg.name] = {
|
properties[arg.name] = {
|
||||||
type: 'string', // Default to string for prompts
|
type: 'string', // Default to string for prompts
|
||||||
description: arg.description || ''
|
description: arg.description || '',
|
||||||
}
|
};
|
||||||
|
|
||||||
if (arg.required) {
|
if (arg.required) {
|
||||||
required.push(arg.name)
|
required.push(arg.name);
|
||||||
}
|
}
|
||||||
})
|
});
|
||||||
|
|
||||||
return {
|
return {
|
||||||
type: 'object',
|
type: 'object',
|
||||||
properties,
|
properties,
|
||||||
required
|
required,
|
||||||
}
|
};
|
||||||
}
|
};
|
||||||
|
|
||||||
return (
|
return (
|
||||||
<div className="bg-white border border-gray-200 shadow rounded-lg p-4 mb-4">
|
<div className="bg-white border border-gray-200 shadow rounded-lg p-4 mb-4">
|
||||||
@@ -158,9 +180,7 @@ const PromptCard = ({ prompt, server, onToggle, onDescriptionUpdate }: PromptCar
|
|||||||
<h3 className="text-lg font-medium text-gray-900">
|
<h3 className="text-lg font-medium text-gray-900">
|
||||||
{prompt.name.replace(server + nameSeparator, '')}
|
{prompt.name.replace(server + nameSeparator, '')}
|
||||||
{prompt.title && (
|
{prompt.title && (
|
||||||
<span className="ml-2 text-sm font-normal text-gray-600">
|
<span className="ml-2 text-sm font-normal text-gray-600">{prompt.title}</span>
|
||||||
{prompt.title}
|
|
||||||
</span>
|
|
||||||
)}
|
)}
|
||||||
<span className="ml-2 text-sm font-normal text-gray-500 inline-flex items-center">
|
<span className="ml-2 text-sm font-normal text-gray-500 inline-flex items-center">
|
||||||
{isEditingDescription ? (
|
{isEditingDescription ? (
|
||||||
@@ -175,14 +195,14 @@ const PromptCard = ({ prompt, server, onToggle, onDescriptionUpdate }: PromptCar
|
|||||||
onClick={(e) => e.stopPropagation()}
|
onClick={(e) => e.stopPropagation()}
|
||||||
style={{
|
style={{
|
||||||
minWidth: '100px',
|
minWidth: '100px',
|
||||||
width: textWidth > 0 ? `${textWidth + 20}px` : 'auto'
|
width: textWidth > 0 ? `${textWidth + 20}px` : 'auto',
|
||||||
}}
|
}}
|
||||||
/>
|
/>
|
||||||
<button
|
<button
|
||||||
className="ml-2 p-1 text-green-600 hover:text-green-800 cursor-pointer transition-colors"
|
className="ml-2 p-1 text-green-600 hover:text-green-800 cursor-pointer transition-colors"
|
||||||
onClick={(e) => {
|
onClick={(e) => {
|
||||||
e.stopPropagation()
|
e.stopPropagation();
|
||||||
handleDescriptionSave()
|
handleDescriptionSave();
|
||||||
}}
|
}}
|
||||||
>
|
>
|
||||||
<Check size={16} />
|
<Check size={16} />
|
||||||
@@ -190,12 +210,14 @@ const PromptCard = ({ prompt, server, onToggle, onDescriptionUpdate }: PromptCar
|
|||||||
</>
|
</>
|
||||||
) : (
|
) : (
|
||||||
<>
|
<>
|
||||||
<span ref={descriptionTextRef}>{customDescription || t('tool.noDescription')}</span>
|
<span ref={descriptionTextRef}>
|
||||||
|
{customDescription || t('tool.noDescription')}
|
||||||
|
</span>
|
||||||
<button
|
<button
|
||||||
className="ml-2 p-1 text-gray-500 hover:text-blue-600 cursor-pointer transition-colors"
|
className="ml-2 p-1 text-gray-500 hover:text-blue-600 cursor-pointer transition-colors"
|
||||||
onClick={(e) => {
|
onClick={(e) => {
|
||||||
e.stopPropagation()
|
e.stopPropagation();
|
||||||
handleDescriptionEdit()
|
handleDescriptionEdit();
|
||||||
}}
|
}}
|
||||||
>
|
>
|
||||||
<Edit size={14} />
|
<Edit size={14} />
|
||||||
@@ -206,10 +228,7 @@ const PromptCard = ({ prompt, server, onToggle, onDescriptionUpdate }: PromptCar
|
|||||||
</h3>
|
</h3>
|
||||||
</div>
|
</div>
|
||||||
<div className="flex items-center space-x-2">
|
<div className="flex items-center space-x-2">
|
||||||
<div
|
<div className="flex items-center space-x-2" onClick={(e) => e.stopPropagation()}>
|
||||||
className="flex items-center space-x-2"
|
|
||||||
onClick={(e) => e.stopPropagation()}
|
|
||||||
>
|
|
||||||
{prompt.enabled !== undefined && (
|
{prompt.enabled !== undefined && (
|
||||||
<Switch
|
<Switch
|
||||||
checked={prompt.enabled}
|
checked={prompt.enabled}
|
||||||
@@ -220,18 +239,14 @@ const PromptCard = ({ prompt, server, onToggle, onDescriptionUpdate }: PromptCar
|
|||||||
</div>
|
</div>
|
||||||
<button
|
<button
|
||||||
onClick={(e) => {
|
onClick={(e) => {
|
||||||
e.stopPropagation()
|
e.stopPropagation();
|
||||||
setIsExpanded(true) // Ensure card is expanded when showing run form
|
setIsExpanded(true); // Ensure card is expanded when showing run form
|
||||||
setShowRunForm(true)
|
setShowRunForm(true);
|
||||||
}}
|
}}
|
||||||
className="flex items-center space-x-1 px-3 py-1 text-sm text-blue-600 bg-blue-50 hover:bg-blue-100 rounded-md transition-colors btn-primary"
|
className="flex items-center space-x-1 px-3 py-1 text-sm text-blue-600 bg-blue-50 hover:bg-blue-100 rounded-md transition-colors btn-primary"
|
||||||
disabled={isRunning || !prompt.enabled}
|
disabled={isRunning || !prompt.enabled}
|
||||||
>
|
>
|
||||||
{isRunning ? (
|
{isRunning ? <Loader size={14} className="animate-spin" /> : <Play size={14} />}
|
||||||
<Loader size={14} className="animate-spin" />
|
|
||||||
) : (
|
|
||||||
<Play size={14} />
|
|
||||||
)}
|
|
||||||
<span>{isRunning ? t('tool.running') : t('tool.run')}</span>
|
<span>{isRunning ? t('tool.running') : t('tool.run')}</span>
|
||||||
</button>
|
</button>
|
||||||
<button className="text-gray-400 hover:text-gray-600">
|
<button className="text-gray-400 hover:text-gray-600">
|
||||||
@@ -251,7 +266,9 @@ const PromptCard = ({ prompt, server, onToggle, onDescriptionUpdate }: PromptCar
|
|||||||
onCancel={handleCancelRun}
|
onCancel={handleCancelRun}
|
||||||
loading={isRunning}
|
loading={isRunning}
|
||||||
storageKey={getStorageKey()}
|
storageKey={getStorageKey()}
|
||||||
title={t('prompt.runPromptWithName', { name: prompt.name.replace(server + nameSeparator, '') })}
|
title={t('prompt.runPromptWithName', {
|
||||||
|
name: prompt.name.replace(server + nameSeparator, ''),
|
||||||
|
})}
|
||||||
/>
|
/>
|
||||||
{/* Prompt Result */}
|
{/* Prompt Result */}
|
||||||
{result && (
|
{result && (
|
||||||
@@ -278,9 +295,7 @@ const PromptCard = ({ prompt, server, onToggle, onDescriptionUpdate }: PromptCar
|
|||||||
<p className="text-sm text-gray-600 mt-1">{arg.description}</p>
|
<p className="text-sm text-gray-600 mt-1">{arg.description}</p>
|
||||||
)}
|
)}
|
||||||
</div>
|
</div>
|
||||||
<div className="text-xs text-gray-500 ml-2">
|
<div className="text-xs text-gray-500 ml-2">{arg.title || ''}</div>
|
||||||
{arg.title || ''}
|
|
||||||
</div>
|
|
||||||
</div>
|
</div>
|
||||||
))}
|
))}
|
||||||
</div>
|
</div>
|
||||||
@@ -296,7 +311,7 @@ const PromptCard = ({ prompt, server, onToggle, onDescriptionUpdate }: PromptCar
|
|||||||
</div>
|
</div>
|
||||||
)}
|
)}
|
||||||
</div>
|
</div>
|
||||||
)
|
);
|
||||||
}
|
};
|
||||||
|
|
||||||
export default PromptCard
|
export default PromptCard;
|
||||||
|
|||||||
@@ -14,14 +14,17 @@ const initialState: AuthState = {
|
|||||||
// Create auth context
|
// Create auth context
|
||||||
const AuthContext = createContext<{
|
const AuthContext = createContext<{
|
||||||
auth: AuthState;
|
auth: AuthState;
|
||||||
login: (username: string, password: string) => Promise<{ success: boolean; isUsingDefaultPassword?: boolean }>;
|
login: (
|
||||||
|
username: string,
|
||||||
|
password: string,
|
||||||
|
) => Promise<{ success: boolean; isUsingDefaultPassword?: boolean; message?: string }>;
|
||||||
register: (username: string, password: string, isAdmin?: boolean) => Promise<boolean>;
|
register: (username: string, password: string, isAdmin?: boolean) => Promise<boolean>;
|
||||||
logout: () => void;
|
logout: () => void;
|
||||||
}>({
|
}>({
|
||||||
auth: initialState,
|
auth: initialState,
|
||||||
login: async () => ({ success: false }),
|
login: async () => ({ success: false }),
|
||||||
register: async () => false,
|
register: async () => false,
|
||||||
logout: () => { },
|
logout: () => {},
|
||||||
});
|
});
|
||||||
|
|
||||||
// Auth provider component
|
// Auth provider component
|
||||||
@@ -90,7 +93,10 @@ export const AuthProvider: React.FC<{ children: ReactNode }> = ({ children }) =>
|
|||||||
}, []);
|
}, []);
|
||||||
|
|
||||||
// Login function
|
// Login function
|
||||||
const login = async (username: string, password: string): Promise<{ success: boolean; isUsingDefaultPassword?: boolean }> => {
|
const login = async (
|
||||||
|
username: string,
|
||||||
|
password: string,
|
||||||
|
): Promise<{ success: boolean; isUsingDefaultPassword?: boolean; message?: string }> => {
|
||||||
try {
|
try {
|
||||||
const response = await authService.login({ username, password });
|
const response = await authService.login({ username, password });
|
||||||
|
|
||||||
@@ -111,7 +117,7 @@ export const AuthProvider: React.FC<{ children: ReactNode }> = ({ children }) =>
|
|||||||
loading: false,
|
loading: false,
|
||||||
error: response.message || 'Authentication failed',
|
error: response.message || 'Authentication failed',
|
||||||
});
|
});
|
||||||
return { success: false };
|
return { success: false, message: response.message };
|
||||||
}
|
}
|
||||||
} catch (error) {
|
} catch (error) {
|
||||||
setAuth({
|
setAuth({
|
||||||
@@ -119,7 +125,7 @@ export const AuthProvider: React.FC<{ children: ReactNode }> = ({ children }) =>
|
|||||||
loading: false,
|
loading: false,
|
||||||
error: 'Authentication failed',
|
error: 'Authentication failed',
|
||||||
});
|
});
|
||||||
return { success: false };
|
return { success: false, message: error instanceof Error ? error.message : undefined };
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
@@ -127,7 +133,7 @@ export const AuthProvider: React.FC<{ children: ReactNode }> = ({ children }) =>
|
|||||||
const register = async (
|
const register = async (
|
||||||
username: string,
|
username: string,
|
||||||
password: string,
|
password: string,
|
||||||
isAdmin = false
|
isAdmin = false,
|
||||||
): Promise<boolean> => {
|
): Promise<boolean> => {
|
||||||
try {
|
try {
|
||||||
const response = await authService.register({ username, password, isAdmin });
|
const response = await authService.register({ username, password, isAdmin });
|
||||||
@@ -175,4 +181,4 @@ export const AuthProvider: React.FC<{ children: ReactNode }> = ({ children }) =>
|
|||||||
};
|
};
|
||||||
|
|
||||||
// Custom hook to use auth context
|
// Custom hook to use auth context
|
||||||
export const useAuth = () => useContext(AuthContext);
|
export const useAuth = () => useContext(AuthContext);
|
||||||
|
|||||||
@@ -30,6 +30,7 @@ interface ServerContextType {
|
|||||||
handleServerEdit: (server: Server) => Promise<any>;
|
handleServerEdit: (server: Server) => Promise<any>;
|
||||||
handleServerRemove: (serverName: string) => Promise<boolean>;
|
handleServerRemove: (serverName: string) => Promise<boolean>;
|
||||||
handleServerToggle: (server: Server, enabled: boolean) => Promise<boolean>;
|
handleServerToggle: (server: Server, enabled: boolean) => Promise<boolean>;
|
||||||
|
handleServerReload: (server: Server) => Promise<boolean>;
|
||||||
}
|
}
|
||||||
|
|
||||||
// Create Context
|
// Create Context
|
||||||
@@ -358,6 +359,30 @@ export const ServerProvider: React.FC<{ children: React.ReactNode }> = ({ childr
|
|||||||
[t],
|
[t],
|
||||||
);
|
);
|
||||||
|
|
||||||
|
const handleServerReload = useCallback(
|
||||||
|
async (server: Server) => {
|
||||||
|
try {
|
||||||
|
const encodedServerName = encodeURIComponent(server.name);
|
||||||
|
const result = await apiPost(`/servers/${encodedServerName}/reload`, {});
|
||||||
|
|
||||||
|
if (!result || !result.success) {
|
||||||
|
console.error('Failed to reload server:', result);
|
||||||
|
setError(t('server.reloadError', { serverName: server.name }));
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Refresh server list after successful reload
|
||||||
|
triggerRefresh();
|
||||||
|
return true;
|
||||||
|
} catch (err) {
|
||||||
|
console.error('Error reloading server:', err);
|
||||||
|
setError(err instanceof Error ? err.message : String(err));
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
},
|
||||||
|
[t, triggerRefresh],
|
||||||
|
);
|
||||||
|
|
||||||
const value: ServerContextType = {
|
const value: ServerContextType = {
|
||||||
servers,
|
servers,
|
||||||
error,
|
error,
|
||||||
@@ -370,6 +395,7 @@ export const ServerProvider: React.FC<{ children: React.ReactNode }> = ({ childr
|
|||||||
handleServerEdit,
|
handleServerEdit,
|
||||||
handleServerRemove,
|
handleServerRemove,
|
||||||
handleServerToggle,
|
handleServerToggle,
|
||||||
|
handleServerReload,
|
||||||
};
|
};
|
||||||
|
|
||||||
return <ServerContext.Provider value={value}>{children}</ServerContext.Provider>;
|
return <ServerContext.Provider value={value}>{children}</ServerContext.Provider>;
|
||||||
|
|||||||
803
frontend/src/contexts/SettingsContext.tsx
Normal file
803
frontend/src/contexts/SettingsContext.tsx
Normal file
@@ -0,0 +1,803 @@
|
|||||||
|
import React, {
|
||||||
|
createContext,
|
||||||
|
useContext,
|
||||||
|
useState,
|
||||||
|
useCallback,
|
||||||
|
useEffect,
|
||||||
|
ReactNode,
|
||||||
|
} from 'react';
|
||||||
|
import { useTranslation } from 'react-i18next';
|
||||||
|
import { ApiResponse, BearerKey } from '@/types';
|
||||||
|
import { useToast } from '@/contexts/ToastContext';
|
||||||
|
import { useAuth } from '@/contexts/AuthContext';
|
||||||
|
import { apiGet, apiPut, apiPost, apiDelete } from '@/utils/fetchInterceptor';
|
||||||
|
|
||||||
|
// Define types for the settings data
|
||||||
|
interface RoutingConfig {
|
||||||
|
enableGlobalRoute: boolean;
|
||||||
|
enableGroupNameRoute: boolean;
|
||||||
|
enableBearerAuth: boolean;
|
||||||
|
bearerAuthKey: string;
|
||||||
|
skipAuth: boolean;
|
||||||
|
}
|
||||||
|
|
||||||
|
interface InstallConfig {
|
||||||
|
pythonIndexUrl: string;
|
||||||
|
npmRegistry: string;
|
||||||
|
baseUrl: string;
|
||||||
|
}
|
||||||
|
|
||||||
|
interface SmartRoutingConfig {
|
||||||
|
enabled: boolean;
|
||||||
|
dbUrl: string;
|
||||||
|
openaiApiBaseUrl: string;
|
||||||
|
openaiApiKey: string;
|
||||||
|
openaiApiEmbeddingModel: string;
|
||||||
|
}
|
||||||
|
|
||||||
|
interface MCPRouterConfig {
|
||||||
|
apiKey: string;
|
||||||
|
referer: string;
|
||||||
|
title: string;
|
||||||
|
baseUrl: string;
|
||||||
|
}
|
||||||
|
|
||||||
|
interface OAuthServerConfig {
|
||||||
|
enabled: boolean;
|
||||||
|
accessTokenLifetime: number;
|
||||||
|
refreshTokenLifetime: number;
|
||||||
|
authorizationCodeLifetime: number;
|
||||||
|
requireClientSecret: boolean;
|
||||||
|
allowedScopes: string[];
|
||||||
|
requireState: boolean;
|
||||||
|
dynamicRegistration: {
|
||||||
|
enabled: boolean;
|
||||||
|
allowedGrantTypes: string[];
|
||||||
|
requiresAuthentication: boolean;
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
interface SystemSettings {
|
||||||
|
systemConfig?: {
|
||||||
|
routing?: RoutingConfig;
|
||||||
|
install?: InstallConfig;
|
||||||
|
smartRouting?: SmartRoutingConfig;
|
||||||
|
mcpRouter?: MCPRouterConfig;
|
||||||
|
nameSeparator?: string;
|
||||||
|
oauthServer?: OAuthServerConfig;
|
||||||
|
enableSessionRebuild?: boolean;
|
||||||
|
};
|
||||||
|
bearerKeys?: BearerKey[];
|
||||||
|
}
|
||||||
|
|
||||||
|
interface TempRoutingConfig {
|
||||||
|
bearerAuthKey: string;
|
||||||
|
}
|
||||||
|
|
||||||
|
interface SettingsContextValue {
|
||||||
|
routingConfig: RoutingConfig;
|
||||||
|
tempRoutingConfig: TempRoutingConfig;
|
||||||
|
setTempRoutingConfig: React.Dispatch<React.SetStateAction<TempRoutingConfig>>;
|
||||||
|
installConfig: InstallConfig;
|
||||||
|
smartRoutingConfig: SmartRoutingConfig;
|
||||||
|
mcpRouterConfig: MCPRouterConfig;
|
||||||
|
oauthServerConfig: OAuthServerConfig;
|
||||||
|
nameSeparator: string;
|
||||||
|
enableSessionRebuild: boolean;
|
||||||
|
bearerKeys: BearerKey[];
|
||||||
|
loading: boolean;
|
||||||
|
error: string | null;
|
||||||
|
setError: React.Dispatch<React.SetStateAction<string | null>>;
|
||||||
|
triggerRefresh: () => void;
|
||||||
|
fetchSettings: () => Promise<void>;
|
||||||
|
updateRoutingConfig: (key: keyof RoutingConfig, value: any) => Promise<boolean | undefined>;
|
||||||
|
updateInstallConfig: (key: keyof InstallConfig, value: any) => Promise<boolean | undefined>;
|
||||||
|
updateSmartRoutingConfig: (
|
||||||
|
key: keyof SmartRoutingConfig,
|
||||||
|
value: any,
|
||||||
|
) => Promise<boolean | undefined>;
|
||||||
|
updateSmartRoutingConfigBatch: (
|
||||||
|
updates: Partial<SmartRoutingConfig>,
|
||||||
|
) => Promise<boolean | undefined>;
|
||||||
|
updateRoutingConfigBatch: (updates: Partial<RoutingConfig>) => Promise<boolean | undefined>;
|
||||||
|
updateMCPRouterConfig: (key: keyof MCPRouterConfig, value: any) => Promise<boolean | undefined>;
|
||||||
|
updateMCPRouterConfigBatch: (updates: Partial<MCPRouterConfig>) => Promise<boolean | undefined>;
|
||||||
|
updateOAuthServerConfig: (
|
||||||
|
key: keyof OAuthServerConfig,
|
||||||
|
value: any,
|
||||||
|
) => Promise<boolean | undefined>;
|
||||||
|
updateOAuthServerConfigBatch: (
|
||||||
|
updates: Partial<OAuthServerConfig>,
|
||||||
|
) => Promise<boolean | undefined>;
|
||||||
|
updateNameSeparator: (value: string) => Promise<boolean | undefined>;
|
||||||
|
updateSessionRebuild: (value: boolean) => Promise<boolean | undefined>;
|
||||||
|
exportMCPSettings: (serverName?: string) => Promise<any>;
|
||||||
|
// Bearer key management
|
||||||
|
refreshBearerKeys: () => Promise<void>;
|
||||||
|
createBearerKey: (payload: Omit<BearerKey, 'id'>) => Promise<BearerKey | null>;
|
||||||
|
updateBearerKey: (
|
||||||
|
id: string,
|
||||||
|
updates: Partial<Omit<BearerKey, 'id'>>,
|
||||||
|
) => Promise<BearerKey | null>;
|
||||||
|
deleteBearerKey: (id: string) => Promise<boolean>;
|
||||||
|
}
|
||||||
|
|
||||||
|
const getDefaultOAuthServerConfig = (): OAuthServerConfig => ({
|
||||||
|
enabled: true,
|
||||||
|
accessTokenLifetime: 3600,
|
||||||
|
refreshTokenLifetime: 1209600,
|
||||||
|
authorizationCodeLifetime: 300,
|
||||||
|
requireClientSecret: false,
|
||||||
|
allowedScopes: ['read', 'write'],
|
||||||
|
requireState: false,
|
||||||
|
dynamicRegistration: {
|
||||||
|
enabled: true,
|
||||||
|
allowedGrantTypes: ['authorization_code', 'refresh_token'],
|
||||||
|
requiresAuthentication: false,
|
||||||
|
},
|
||||||
|
});
|
||||||
|
|
||||||
|
const SettingsContext = createContext<SettingsContextValue | undefined>(undefined);
|
||||||
|
|
||||||
|
export const useSettings = () => {
|
||||||
|
const context = useContext(SettingsContext);
|
||||||
|
if (!context) {
|
||||||
|
throw new Error('useSettings must be used within a SettingsProvider');
|
||||||
|
}
|
||||||
|
return context;
|
||||||
|
};
|
||||||
|
|
||||||
|
interface SettingsProviderProps {
|
||||||
|
children: ReactNode;
|
||||||
|
}
|
||||||
|
|
||||||
|
export const SettingsProvider: React.FC<SettingsProviderProps> = ({ children }) => {
|
||||||
|
const { t } = useTranslation();
|
||||||
|
const { showToast } = useToast();
|
||||||
|
const { auth } = useAuth();
|
||||||
|
|
||||||
|
const [routingConfig, setRoutingConfig] = useState<RoutingConfig>({
|
||||||
|
enableGlobalRoute: true,
|
||||||
|
enableGroupNameRoute: true,
|
||||||
|
enableBearerAuth: false,
|
||||||
|
bearerAuthKey: '',
|
||||||
|
skipAuth: false,
|
||||||
|
});
|
||||||
|
|
||||||
|
const [tempRoutingConfig, setTempRoutingConfig] = useState<TempRoutingConfig>({
|
||||||
|
bearerAuthKey: '',
|
||||||
|
});
|
||||||
|
|
||||||
|
const [installConfig, setInstallConfig] = useState<InstallConfig>({
|
||||||
|
pythonIndexUrl: '',
|
||||||
|
npmRegistry: '',
|
||||||
|
baseUrl: 'http://localhost:3000',
|
||||||
|
});
|
||||||
|
|
||||||
|
const [smartRoutingConfig, setSmartRoutingConfig] = useState<SmartRoutingConfig>({
|
||||||
|
enabled: false,
|
||||||
|
dbUrl: '',
|
||||||
|
openaiApiBaseUrl: '',
|
||||||
|
openaiApiKey: '',
|
||||||
|
openaiApiEmbeddingModel: '',
|
||||||
|
});
|
||||||
|
|
||||||
|
const [mcpRouterConfig, setMCPRouterConfig] = useState<MCPRouterConfig>({
|
||||||
|
apiKey: '',
|
||||||
|
referer: 'https://www.mcphubx.com',
|
||||||
|
title: 'MCPHub',
|
||||||
|
baseUrl: 'https://api.mcprouter.to/v1',
|
||||||
|
});
|
||||||
|
|
||||||
|
const [oauthServerConfig, setOAuthServerConfig] = useState<OAuthServerConfig>(
|
||||||
|
getDefaultOAuthServerConfig(),
|
||||||
|
);
|
||||||
|
|
||||||
|
const [nameSeparator, setNameSeparator] = useState<string>('-');
|
||||||
|
const [enableSessionRebuild, setEnableSessionRebuild] = useState<boolean>(false);
|
||||||
|
const [bearerKeys, setBearerKeys] = useState<BearerKey[]>([]);
|
||||||
|
|
||||||
|
const [loading, setLoading] = useState(false);
|
||||||
|
const [error, setError] = useState<string | null>(null);
|
||||||
|
const [refreshKey, setRefreshKey] = useState(0);
|
||||||
|
|
||||||
|
// Trigger a refresh of the settings data
|
||||||
|
const triggerRefresh = useCallback(() => {
|
||||||
|
setRefreshKey((prev) => prev + 1);
|
||||||
|
}, []);
|
||||||
|
|
||||||
|
// Fetch current settings
|
||||||
|
const fetchSettings = useCallback(async () => {
|
||||||
|
setLoading(true);
|
||||||
|
setError(null);
|
||||||
|
|
||||||
|
try {
|
||||||
|
const data: ApiResponse<SystemSettings> = await apiGet('/settings');
|
||||||
|
|
||||||
|
if (data.success && data.data?.systemConfig?.routing) {
|
||||||
|
setRoutingConfig({
|
||||||
|
enableGlobalRoute: data.data.systemConfig.routing.enableGlobalRoute ?? true,
|
||||||
|
enableGroupNameRoute: data.data.systemConfig.routing.enableGroupNameRoute ?? true,
|
||||||
|
enableBearerAuth: data.data.systemConfig.routing.enableBearerAuth ?? false,
|
||||||
|
bearerAuthKey: data.data.systemConfig.routing.bearerAuthKey || '',
|
||||||
|
skipAuth: data.data.systemConfig.routing.skipAuth ?? false,
|
||||||
|
});
|
||||||
|
}
|
||||||
|
if (data.success && data.data?.systemConfig?.install) {
|
||||||
|
setInstallConfig({
|
||||||
|
pythonIndexUrl: data.data.systemConfig.install.pythonIndexUrl || '',
|
||||||
|
npmRegistry: data.data.systemConfig.install.npmRegistry || '',
|
||||||
|
baseUrl: data.data.systemConfig.install.baseUrl || 'http://localhost:3000',
|
||||||
|
});
|
||||||
|
}
|
||||||
|
if (data.success && data.data?.systemConfig?.smartRouting) {
|
||||||
|
setSmartRoutingConfig({
|
||||||
|
enabled: data.data.systemConfig.smartRouting.enabled ?? false,
|
||||||
|
dbUrl: data.data.systemConfig.smartRouting.dbUrl || '',
|
||||||
|
openaiApiBaseUrl: data.data.systemConfig.smartRouting.openaiApiBaseUrl || '',
|
||||||
|
openaiApiKey: data.data.systemConfig.smartRouting.openaiApiKey || '',
|
||||||
|
openaiApiEmbeddingModel:
|
||||||
|
data.data.systemConfig.smartRouting.openaiApiEmbeddingModel || '',
|
||||||
|
});
|
||||||
|
}
|
||||||
|
if (data.success && data.data?.systemConfig?.mcpRouter) {
|
||||||
|
setMCPRouterConfig({
|
||||||
|
apiKey: data.data.systemConfig.mcpRouter.apiKey || '',
|
||||||
|
referer: data.data.systemConfig.mcpRouter.referer || 'https://www.mcphubx.com',
|
||||||
|
title: data.data.systemConfig.mcpRouter.title || 'MCPHub',
|
||||||
|
baseUrl: data.data.systemConfig.mcpRouter.baseUrl || 'https://api.mcprouter.to/v1',
|
||||||
|
});
|
||||||
|
}
|
||||||
|
if (data.success) {
|
||||||
|
if (data.data?.systemConfig?.oauthServer) {
|
||||||
|
const oauth = data.data.systemConfig.oauthServer;
|
||||||
|
const defaultOauthConfig = getDefaultOAuthServerConfig();
|
||||||
|
const defaultDynamic = defaultOauthConfig.dynamicRegistration;
|
||||||
|
const allowedScopes = Array.isArray(oauth.allowedScopes)
|
||||||
|
? [...oauth.allowedScopes]
|
||||||
|
: [...defaultOauthConfig.allowedScopes];
|
||||||
|
const dynamicAllowedGrantTypes = Array.isArray(
|
||||||
|
oauth.dynamicRegistration?.allowedGrantTypes,
|
||||||
|
)
|
||||||
|
? [...oauth.dynamicRegistration!.allowedGrantTypes!]
|
||||||
|
: [...defaultDynamic.allowedGrantTypes];
|
||||||
|
|
||||||
|
setOAuthServerConfig({
|
||||||
|
enabled: oauth.enabled ?? defaultOauthConfig.enabled,
|
||||||
|
accessTokenLifetime:
|
||||||
|
oauth.accessTokenLifetime ?? defaultOauthConfig.accessTokenLifetime,
|
||||||
|
refreshTokenLifetime:
|
||||||
|
oauth.refreshTokenLifetime ?? defaultOauthConfig.refreshTokenLifetime,
|
||||||
|
authorizationCodeLifetime:
|
||||||
|
oauth.authorizationCodeLifetime ?? defaultOauthConfig.authorizationCodeLifetime,
|
||||||
|
requireClientSecret:
|
||||||
|
oauth.requireClientSecret ?? defaultOauthConfig.requireClientSecret,
|
||||||
|
requireState: oauth.requireState ?? defaultOauthConfig.requireState,
|
||||||
|
allowedScopes,
|
||||||
|
dynamicRegistration: {
|
||||||
|
enabled: oauth.dynamicRegistration?.enabled ?? defaultDynamic.enabled,
|
||||||
|
allowedGrantTypes: dynamicAllowedGrantTypes,
|
||||||
|
requiresAuthentication:
|
||||||
|
oauth.dynamicRegistration?.requiresAuthentication ??
|
||||||
|
defaultDynamic.requiresAuthentication,
|
||||||
|
},
|
||||||
|
});
|
||||||
|
} else {
|
||||||
|
setOAuthServerConfig(getDefaultOAuthServerConfig());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (data.success && data.data?.systemConfig?.nameSeparator !== undefined) {
|
||||||
|
setNameSeparator(data.data.systemConfig.nameSeparator);
|
||||||
|
}
|
||||||
|
if (data.success && data.data?.systemConfig?.enableSessionRebuild !== undefined) {
|
||||||
|
setEnableSessionRebuild(data.data.systemConfig.enableSessionRebuild);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (data.success && Array.isArray(data.data?.bearerKeys)) {
|
||||||
|
setBearerKeys(data.data.bearerKeys);
|
||||||
|
}
|
||||||
|
} catch (error) {
|
||||||
|
console.error('Failed to fetch settings:', error);
|
||||||
|
setError(error instanceof Error ? error.message : 'Failed to fetch settings');
|
||||||
|
showToast(t('errors.failedToFetchSettings'));
|
||||||
|
} finally {
|
||||||
|
setLoading(false);
|
||||||
|
}
|
||||||
|
}, [t, showToast]);
|
||||||
|
|
||||||
|
// Update routing configuration
|
||||||
|
const updateRoutingConfig = async (key: keyof RoutingConfig, value: any) => {
|
||||||
|
setLoading(true);
|
||||||
|
setError(null);
|
||||||
|
|
||||||
|
try {
|
||||||
|
const data = await apiPut('/system-config', {
|
||||||
|
routing: {
|
||||||
|
[key]: value,
|
||||||
|
},
|
||||||
|
});
|
||||||
|
|
||||||
|
if (data.success) {
|
||||||
|
setRoutingConfig({
|
||||||
|
...routingConfig,
|
||||||
|
[key]: value,
|
||||||
|
});
|
||||||
|
showToast(t('settings.systemConfigUpdated'));
|
||||||
|
return true;
|
||||||
|
} else {
|
||||||
|
setError(data.error || 'Failed to update routing config');
|
||||||
|
showToast(data.error || t('errors.failedToUpdateRoutingConfig'));
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
} catch (error) {
|
||||||
|
console.error('Failed to update routing config:', error);
|
||||||
|
setError(error instanceof Error ? error.message : 'Failed to update routing config');
|
||||||
|
showToast(t('errors.failedToUpdateRoutingConfig'));
|
||||||
|
return false;
|
||||||
|
} finally {
|
||||||
|
setLoading(false);
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
// Update install configuration
|
||||||
|
const updateInstallConfig = async (key: keyof InstallConfig, value: any) => {
|
||||||
|
setLoading(true);
|
||||||
|
setError(null);
|
||||||
|
|
||||||
|
try {
|
||||||
|
const data = await apiPut('/system-config', {
|
||||||
|
install: {
|
||||||
|
[key]: value,
|
||||||
|
},
|
||||||
|
});
|
||||||
|
|
||||||
|
if (data.success) {
|
||||||
|
setInstallConfig({
|
||||||
|
...installConfig,
|
||||||
|
[key]: value,
|
||||||
|
});
|
||||||
|
showToast(t('settings.systemConfigUpdated'));
|
||||||
|
return true;
|
||||||
|
} else {
|
||||||
|
setError(data.error || 'Failed to update install config');
|
||||||
|
showToast(data.error || t('errors.failedToUpdateInstallConfig'));
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
} catch (error) {
|
||||||
|
console.error('Failed to update install config:', error);
|
||||||
|
setError(error instanceof Error ? error.message : 'Failed to update install config');
|
||||||
|
showToast(t('errors.failedToUpdateInstallConfig'));
|
||||||
|
return false;
|
||||||
|
} finally {
|
||||||
|
setLoading(false);
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
// Update smart routing configuration
|
||||||
|
const updateSmartRoutingConfig = async (key: keyof SmartRoutingConfig, value: any) => {
|
||||||
|
setLoading(true);
|
||||||
|
setError(null);
|
||||||
|
|
||||||
|
try {
|
||||||
|
const data = await apiPut('/system-config', {
|
||||||
|
smartRouting: {
|
||||||
|
[key]: value,
|
||||||
|
},
|
||||||
|
});
|
||||||
|
|
||||||
|
if (data.success) {
|
||||||
|
setSmartRoutingConfig({
|
||||||
|
...smartRoutingConfig,
|
||||||
|
[key]: value,
|
||||||
|
});
|
||||||
|
showToast(t('settings.systemConfigUpdated'));
|
||||||
|
return true;
|
||||||
|
} else {
|
||||||
|
setError(data.error || 'Failed to update smart routing config');
|
||||||
|
showToast(data.error || t('errors.failedToUpdateSmartRoutingConfig'));
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
} catch (error) {
|
||||||
|
console.error('Failed to update smart routing config:', error);
|
||||||
|
setError(error instanceof Error ? error.message : 'Failed to update smart routing config');
|
||||||
|
showToast(t('errors.failedToUpdateSmartRoutingConfig'));
|
||||||
|
return false;
|
||||||
|
} finally {
|
||||||
|
setLoading(false);
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
// Batch update smart routing configuration
|
||||||
|
const updateSmartRoutingConfigBatch = async (updates: Partial<SmartRoutingConfig>) => {
|
||||||
|
setLoading(true);
|
||||||
|
setError(null);
|
||||||
|
|
||||||
|
try {
|
||||||
|
const data = await apiPut('/system-config', {
|
||||||
|
smartRouting: updates,
|
||||||
|
});
|
||||||
|
|
||||||
|
if (data.success) {
|
||||||
|
setSmartRoutingConfig({
|
||||||
|
...smartRoutingConfig,
|
||||||
|
...updates,
|
||||||
|
});
|
||||||
|
showToast(t('settings.systemConfigUpdated'));
|
||||||
|
return true;
|
||||||
|
} else {
|
||||||
|
setError(data.error || 'Failed to update smart routing config');
|
||||||
|
showToast(data.error || t('errors.failedToUpdateSmartRoutingConfig'));
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
} catch (error) {
|
||||||
|
console.error('Failed to update smart routing config:', error);
|
||||||
|
setError(error instanceof Error ? error.message : 'Failed to update smart routing config');
|
||||||
|
showToast(t('errors.failedToUpdateSmartRoutingConfig'));
|
||||||
|
return false;
|
||||||
|
} finally {
|
||||||
|
setLoading(false);
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
// Batch update routing configuration
|
||||||
|
const updateRoutingConfigBatch = async (updates: Partial<RoutingConfig>) => {
|
||||||
|
setLoading(true);
|
||||||
|
setError(null);
|
||||||
|
|
||||||
|
try {
|
||||||
|
const data = await apiPut('/system-config', {
|
||||||
|
routing: updates,
|
||||||
|
});
|
||||||
|
|
||||||
|
if (data.success) {
|
||||||
|
setRoutingConfig({
|
||||||
|
...routingConfig,
|
||||||
|
...updates,
|
||||||
|
});
|
||||||
|
showToast(t('settings.systemConfigUpdated'));
|
||||||
|
return true;
|
||||||
|
} else {
|
||||||
|
setError(data.error || 'Failed to update routing config');
|
||||||
|
showToast(data.error || t('errors.failedToUpdateRoutingConfig'));
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
} catch (error) {
|
||||||
|
console.error('Failed to update routing config:', error);
|
||||||
|
setError(error instanceof Error ? error.message : 'Failed to update routing config');
|
||||||
|
showToast(t('errors.failedToUpdateRoutingConfig'));
|
||||||
|
return false;
|
||||||
|
} finally {
|
||||||
|
setLoading(false);
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
// Update MCP Router configuration
|
||||||
|
const updateMCPRouterConfig = async (key: keyof MCPRouterConfig, value: any) => {
|
||||||
|
setLoading(true);
|
||||||
|
setError(null);
|
||||||
|
|
||||||
|
try {
|
||||||
|
const data = await apiPut('/system-config', {
|
||||||
|
mcpRouter: {
|
||||||
|
[key]: value,
|
||||||
|
},
|
||||||
|
});
|
||||||
|
|
||||||
|
if (data.success) {
|
||||||
|
setMCPRouterConfig({
|
||||||
|
...mcpRouterConfig,
|
||||||
|
[key]: value,
|
||||||
|
});
|
||||||
|
showToast(t('settings.systemConfigUpdated'));
|
||||||
|
return true;
|
||||||
|
} else {
|
||||||
|
setError(data.error || 'Failed to update MCP Router config');
|
||||||
|
showToast(data.error || t('errors.failedToUpdateMCPRouterConfig'));
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
} catch (error) {
|
||||||
|
console.error('Failed to update MCP Router config:', error);
|
||||||
|
setError(error instanceof Error ? error.message : 'Failed to update MCP Router config');
|
||||||
|
showToast(t('errors.failedToUpdateMCPRouterConfig'));
|
||||||
|
return false;
|
||||||
|
} finally {
|
||||||
|
setLoading(false);
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
// Batch update MCP Router configuration
|
||||||
|
const updateMCPRouterConfigBatch = async (updates: Partial<MCPRouterConfig>) => {
|
||||||
|
setLoading(true);
|
||||||
|
setError(null);
|
||||||
|
|
||||||
|
try {
|
||||||
|
const data = await apiPut('/system-config', {
|
||||||
|
mcpRouter: updates,
|
||||||
|
});
|
||||||
|
|
||||||
|
if (data.success) {
|
||||||
|
setMCPRouterConfig({
|
||||||
|
...mcpRouterConfig,
|
||||||
|
...updates,
|
||||||
|
});
|
||||||
|
showToast(t('settings.systemConfigUpdated'));
|
||||||
|
return true;
|
||||||
|
} else {
|
||||||
|
setError(data.error || 'Failed to update MCP Router config');
|
||||||
|
showToast(data.error || t('errors.failedToUpdateMCPRouterConfig'));
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
} catch (error) {
|
||||||
|
console.error('Failed to update MCP Router config:', error);
|
||||||
|
setError(error instanceof Error ? error.message : 'Failed to update MCP Router config');
|
||||||
|
showToast(t('errors.failedToUpdateMCPRouterConfig'));
|
||||||
|
return false;
|
||||||
|
} finally {
|
||||||
|
setLoading(false);
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
// Update OAuth server configuration
|
||||||
|
const updateOAuthServerConfig = async (key: keyof OAuthServerConfig, value: any) => {
|
||||||
|
setLoading(true);
|
||||||
|
setError(null);
|
||||||
|
|
||||||
|
try {
|
||||||
|
const data = await apiPut('/system-config', {
|
||||||
|
oauthServer: {
|
||||||
|
[key]: value,
|
||||||
|
},
|
||||||
|
});
|
||||||
|
|
||||||
|
if (data.success) {
|
||||||
|
setOAuthServerConfig({
|
||||||
|
...oauthServerConfig,
|
||||||
|
[key]: value,
|
||||||
|
});
|
||||||
|
showToast(t('settings.systemConfigUpdated'));
|
||||||
|
return true;
|
||||||
|
} else {
|
||||||
|
setError(data.error || 'Failed to update OAuth server config');
|
||||||
|
showToast(data.error || t('errors.failedToUpdateOAuthServerConfig'));
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
} catch (error) {
|
||||||
|
console.error('Failed to update OAuth server config:', error);
|
||||||
|
setError(error instanceof Error ? error.message : 'Failed to update OAuth server config');
|
||||||
|
showToast(t('errors.failedToUpdateOAuthServerConfig'));
|
||||||
|
return false;
|
||||||
|
} finally {
|
||||||
|
setLoading(false);
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
// Batch update OAuth server configuration
|
||||||
|
const updateOAuthServerConfigBatch = async (updates: Partial<OAuthServerConfig>) => {
|
||||||
|
setLoading(true);
|
||||||
|
setError(null);
|
||||||
|
|
||||||
|
try {
|
||||||
|
const data = await apiPut('/system-config', {
|
||||||
|
oauthServer: updates,
|
||||||
|
});
|
||||||
|
|
||||||
|
if (data.success) {
|
||||||
|
setOAuthServerConfig({
|
||||||
|
...oauthServerConfig,
|
||||||
|
...updates,
|
||||||
|
});
|
||||||
|
showToast(t('settings.systemConfigUpdated'));
|
||||||
|
return true;
|
||||||
|
} else {
|
||||||
|
setError(data.error || 'Failed to update OAuth server config');
|
||||||
|
showToast(data.error || t('errors.failedToUpdateOAuthServerConfig'));
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
} catch (error) {
|
||||||
|
console.error('Failed to update OAuth server config:', error);
|
||||||
|
setError(error instanceof Error ? error.message : 'Failed to update OAuth server config');
|
||||||
|
showToast(t('errors.failedToUpdateOAuthServerConfig'));
|
||||||
|
return false;
|
||||||
|
} finally {
|
||||||
|
setLoading(false);
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
// Update name separator
|
||||||
|
const updateNameSeparator = async (value: string) => {
|
||||||
|
setLoading(true);
|
||||||
|
setError(null);
|
||||||
|
|
||||||
|
try {
|
||||||
|
const data = await apiPut('/system-config', {
|
||||||
|
nameSeparator: value,
|
||||||
|
});
|
||||||
|
|
||||||
|
if (data.success) {
|
||||||
|
setNameSeparator(value);
|
||||||
|
showToast(t('settings.systemConfigUpdated'));
|
||||||
|
return true;
|
||||||
|
} else {
|
||||||
|
setError(data.error || 'Failed to update name separator');
|
||||||
|
showToast(data.error || t('errors.failedToUpdateNameSeparator'));
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
} catch (error) {
|
||||||
|
console.error('Failed to update name separator:', error);
|
||||||
|
setError(error instanceof Error ? error.message : 'Failed to update name separator');
|
||||||
|
showToast(t('errors.failedToUpdateNameSeparator'));
|
||||||
|
return false;
|
||||||
|
} finally {
|
||||||
|
setLoading(false);
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
// Update session rebuild flag
|
||||||
|
const updateSessionRebuild = async (value: boolean) => {
|
||||||
|
setLoading(true);
|
||||||
|
setError(null);
|
||||||
|
|
||||||
|
try {
|
||||||
|
const data = await apiPut('/system-config', {
|
||||||
|
enableSessionRebuild: value,
|
||||||
|
});
|
||||||
|
|
||||||
|
if (data.success) {
|
||||||
|
setEnableSessionRebuild(value);
|
||||||
|
showToast(t('settings.systemConfigUpdated'));
|
||||||
|
return true;
|
||||||
|
} else {
|
||||||
|
setError(data.error || 'Failed to update session rebuild setting');
|
||||||
|
showToast(data.error || t('errors.failedToUpdateSessionRebuild'));
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
} catch (error) {
|
||||||
|
console.error('Failed to update session rebuild setting:', error);
|
||||||
|
setError(error instanceof Error ? error.message : 'Failed to update session rebuild setting');
|
||||||
|
showToast(t('errors.failedToUpdateSessionRebuild'));
|
||||||
|
return false;
|
||||||
|
} finally {
|
||||||
|
setLoading(false);
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
const exportMCPSettings = async (serverName?: string) => {
|
||||||
|
setLoading(true);
|
||||||
|
setError(null);
|
||||||
|
try {
|
||||||
|
return await apiGet(`/mcp-settings/export?serverName=${serverName ? serverName : ''}`);
|
||||||
|
} catch (error) {
|
||||||
|
console.error('Failed to export MCP settings:', error);
|
||||||
|
const errorMessage = error instanceof Error ? error.message : 'Failed to export MCP settings';
|
||||||
|
setError(errorMessage);
|
||||||
|
showToast(errorMessage);
|
||||||
|
} finally {
|
||||||
|
setLoading(false);
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
// Bearer key management helpers
|
||||||
|
const refreshBearerKeys = async () => {
|
||||||
|
try {
|
||||||
|
const data: ApiResponse<BearerKey[]> = await apiGet('/auth/keys');
|
||||||
|
if (data.success && Array.isArray(data.data)) {
|
||||||
|
setBearerKeys(data.data);
|
||||||
|
}
|
||||||
|
} catch (error) {
|
||||||
|
console.error('Failed to refresh bearer keys:', error);
|
||||||
|
showToast(t('errors.failedToFetchSettings'));
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
const createBearerKey = async (payload: Omit<BearerKey, 'id'>): Promise<BearerKey | null> => {
|
||||||
|
try {
|
||||||
|
const data: ApiResponse<BearerKey> = await apiPost('/auth/keys', payload as any);
|
||||||
|
if (data.success && data.data) {
|
||||||
|
await refreshBearerKeys();
|
||||||
|
showToast(t('settings.systemConfigUpdated'));
|
||||||
|
return data.data;
|
||||||
|
}
|
||||||
|
showToast(data.message || t('errors.failedToUpdateRoutingConfig'));
|
||||||
|
return null;
|
||||||
|
} catch (error) {
|
||||||
|
console.error('Failed to create bearer key:', error);
|
||||||
|
showToast(t('errors.failedToUpdateRoutingConfig'));
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
const updateBearerKey = async (
|
||||||
|
id: string,
|
||||||
|
updates: Partial<Omit<BearerKey, 'id'>>,
|
||||||
|
): Promise<BearerKey | null> => {
|
||||||
|
try {
|
||||||
|
const data: ApiResponse<BearerKey> = await apiPut(`/auth/keys/${id}`, updates as any);
|
||||||
|
if (data.success && data.data) {
|
||||||
|
await refreshBearerKeys();
|
||||||
|
showToast(t('settings.systemConfigUpdated'));
|
||||||
|
return data.data;
|
||||||
|
}
|
||||||
|
showToast(data.message || t('errors.failedToUpdateRoutingConfig'));
|
||||||
|
return null;
|
||||||
|
} catch (error) {
|
||||||
|
console.error('Failed to update bearer key:', error);
|
||||||
|
showToast(t('errors.failedToUpdateRoutingConfig'));
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
const deleteBearerKey = async (id: string): Promise<boolean> => {
|
||||||
|
try {
|
||||||
|
const data: ApiResponse = await apiDelete(`/auth/keys/${id}`);
|
||||||
|
if (data.success) {
|
||||||
|
await refreshBearerKeys();
|
||||||
|
showToast(t('settings.systemConfigUpdated'));
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
showToast(data.message || t('errors.failedToUpdateRoutingConfig'));
|
||||||
|
return false;
|
||||||
|
} catch (error) {
|
||||||
|
console.error('Failed to delete bearer key:', error);
|
||||||
|
showToast(t('errors.failedToUpdateRoutingConfig'));
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
// Fetch settings when the component mounts or refreshKey changes
|
||||||
|
useEffect(() => {
|
||||||
|
fetchSettings();
|
||||||
|
}, [fetchSettings, refreshKey]);
|
||||||
|
|
||||||
|
// Watch for authentication status changes - refetch settings after login
|
||||||
|
useEffect(() => {
|
||||||
|
if (auth.isAuthenticated) {
|
||||||
|
console.log('[SettingsContext] User authenticated, triggering settings refresh');
|
||||||
|
// When user logs in, trigger a refresh to load settings
|
||||||
|
triggerRefresh();
|
||||||
|
}
|
||||||
|
}, [auth.isAuthenticated, triggerRefresh]);
|
||||||
|
|
||||||
|
useEffect(() => {
|
||||||
|
if (routingConfig) {
|
||||||
|
setTempRoutingConfig({
|
||||||
|
bearerAuthKey: routingConfig.bearerAuthKey,
|
||||||
|
});
|
||||||
|
}
|
||||||
|
}, [routingConfig]);
|
||||||
|
|
||||||
|
const value: SettingsContextValue = {
|
||||||
|
routingConfig,
|
||||||
|
tempRoutingConfig,
|
||||||
|
setTempRoutingConfig,
|
||||||
|
installConfig,
|
||||||
|
smartRoutingConfig,
|
||||||
|
mcpRouterConfig,
|
||||||
|
oauthServerConfig,
|
||||||
|
nameSeparator,
|
||||||
|
enableSessionRebuild,
|
||||||
|
bearerKeys,
|
||||||
|
loading,
|
||||||
|
error,
|
||||||
|
setError,
|
||||||
|
triggerRefresh,
|
||||||
|
fetchSettings,
|
||||||
|
updateRoutingConfig,
|
||||||
|
updateInstallConfig,
|
||||||
|
updateSmartRoutingConfig,
|
||||||
|
updateSmartRoutingConfigBatch,
|
||||||
|
updateRoutingConfigBatch,
|
||||||
|
updateMCPRouterConfig,
|
||||||
|
updateMCPRouterConfigBatch,
|
||||||
|
updateOAuthServerConfig,
|
||||||
|
updateOAuthServerConfigBatch,
|
||||||
|
updateNameSeparator,
|
||||||
|
updateSessionRebuild,
|
||||||
|
exportMCPSettings,
|
||||||
|
refreshBearerKeys,
|
||||||
|
createBearerKey,
|
||||||
|
updateBearerKey,
|
||||||
|
deleteBearerKey,
|
||||||
|
};
|
||||||
|
|
||||||
|
return <SettingsContext.Provider value={value}>{children}</SettingsContext.Provider>;
|
||||||
|
};
|
||||||
@@ -1,658 +1,10 @@
|
|||||||
import { useState, useCallback, useEffect } from 'react';
|
import { useSettings } from '@/contexts/SettingsContext';
|
||||||
import { useTranslation } from 'react-i18next';
|
|
||||||
import { ApiResponse } from '@/types';
|
|
||||||
import { useToast } from '@/contexts/ToastContext';
|
|
||||||
import { apiGet, apiPut } from '../utils/fetchInterceptor';
|
|
||||||
|
|
||||||
// Define types for the settings data
|
|
||||||
interface RoutingConfig {
|
|
||||||
enableGlobalRoute: boolean;
|
|
||||||
enableGroupNameRoute: boolean;
|
|
||||||
enableBearerAuth: boolean;
|
|
||||||
bearerAuthKey: string;
|
|
||||||
skipAuth: boolean;
|
|
||||||
}
|
|
||||||
|
|
||||||
interface InstallConfig {
|
|
||||||
pythonIndexUrl: string;
|
|
||||||
npmRegistry: string;
|
|
||||||
baseUrl: string;
|
|
||||||
}
|
|
||||||
|
|
||||||
interface SmartRoutingConfig {
|
|
||||||
enabled: boolean;
|
|
||||||
dbUrl: string;
|
|
||||||
openaiApiBaseUrl: string;
|
|
||||||
openaiApiKey: string;
|
|
||||||
openaiApiEmbeddingModel: string;
|
|
||||||
}
|
|
||||||
|
|
||||||
interface MCPRouterConfig {
|
|
||||||
apiKey: string;
|
|
||||||
referer: string;
|
|
||||||
title: string;
|
|
||||||
baseUrl: string;
|
|
||||||
}
|
|
||||||
|
|
||||||
interface OAuthServerConfig {
|
|
||||||
enabled: boolean;
|
|
||||||
accessTokenLifetime: number;
|
|
||||||
refreshTokenLifetime: number;
|
|
||||||
authorizationCodeLifetime: number;
|
|
||||||
requireClientSecret: boolean;
|
|
||||||
allowedScopes: string[];
|
|
||||||
requireState: boolean;
|
|
||||||
dynamicRegistration: {
|
|
||||||
enabled: boolean;
|
|
||||||
allowedGrantTypes: string[];
|
|
||||||
requiresAuthentication: boolean;
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
interface SystemSettings {
|
|
||||||
systemConfig?: {
|
|
||||||
routing?: RoutingConfig;
|
|
||||||
install?: InstallConfig;
|
|
||||||
smartRouting?: SmartRoutingConfig;
|
|
||||||
mcpRouter?: MCPRouterConfig;
|
|
||||||
nameSeparator?: string;
|
|
||||||
oauthServer?: OAuthServerConfig;
|
|
||||||
enableSessionRebuild?: boolean;
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
interface TempRoutingConfig {
|
|
||||||
bearerAuthKey: string;
|
|
||||||
}
|
|
||||||
|
|
||||||
const getDefaultOAuthServerConfig = (): OAuthServerConfig => ({
|
|
||||||
enabled: true,
|
|
||||||
accessTokenLifetime: 3600,
|
|
||||||
refreshTokenLifetime: 1209600,
|
|
||||||
authorizationCodeLifetime: 300,
|
|
||||||
requireClientSecret: false,
|
|
||||||
allowedScopes: ['read', 'write'],
|
|
||||||
requireState: false,
|
|
||||||
dynamicRegistration: {
|
|
||||||
enabled: true,
|
|
||||||
allowedGrantTypes: ['authorization_code', 'refresh_token'],
|
|
||||||
requiresAuthentication: false,
|
|
||||||
},
|
|
||||||
});
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Hook that provides access to settings data via SettingsContext.
|
||||||
|
* This hook is a thin wrapper around useSettings to maintain backward compatibility.
|
||||||
|
* The actual data fetching happens once in SettingsProvider, avoiding duplicate API calls.
|
||||||
|
*/
|
||||||
export const useSettingsData = () => {
|
export const useSettingsData = () => {
|
||||||
const { t } = useTranslation();
|
return useSettings();
|
||||||
const { showToast } = useToast();
|
|
||||||
|
|
||||||
const [routingConfig, setRoutingConfig] = useState<RoutingConfig>({
|
|
||||||
enableGlobalRoute: true,
|
|
||||||
enableGroupNameRoute: true,
|
|
||||||
enableBearerAuth: false,
|
|
||||||
bearerAuthKey: '',
|
|
||||||
skipAuth: false,
|
|
||||||
});
|
|
||||||
|
|
||||||
const [tempRoutingConfig, setTempRoutingConfig] = useState<TempRoutingConfig>({
|
|
||||||
bearerAuthKey: '',
|
|
||||||
});
|
|
||||||
|
|
||||||
const [installConfig, setInstallConfig] = useState<InstallConfig>({
|
|
||||||
pythonIndexUrl: '',
|
|
||||||
npmRegistry: '',
|
|
||||||
baseUrl: 'http://localhost:3000',
|
|
||||||
});
|
|
||||||
|
|
||||||
const [smartRoutingConfig, setSmartRoutingConfig] = useState<SmartRoutingConfig>({
|
|
||||||
enabled: false,
|
|
||||||
dbUrl: '',
|
|
||||||
openaiApiBaseUrl: '',
|
|
||||||
openaiApiKey: '',
|
|
||||||
openaiApiEmbeddingModel: '',
|
|
||||||
});
|
|
||||||
|
|
||||||
const [mcpRouterConfig, setMCPRouterConfig] = useState<MCPRouterConfig>({
|
|
||||||
apiKey: '',
|
|
||||||
referer: 'https://www.mcphubx.com',
|
|
||||||
title: 'MCPHub',
|
|
||||||
baseUrl: 'https://api.mcprouter.to/v1',
|
|
||||||
});
|
|
||||||
|
|
||||||
const [oauthServerConfig, setOAuthServerConfig] = useState<OAuthServerConfig>(
|
|
||||||
getDefaultOAuthServerConfig(),
|
|
||||||
);
|
|
||||||
|
|
||||||
const [nameSeparator, setNameSeparator] = useState<string>('-');
|
|
||||||
const [enableSessionRebuild, setEnableSessionRebuild] = useState<boolean>(false);
|
|
||||||
|
|
||||||
const [loading, setLoading] = useState(false);
|
|
||||||
const [error, setError] = useState<string | null>(null);
|
|
||||||
const [refreshKey, setRefreshKey] = useState(0);
|
|
||||||
|
|
||||||
// Trigger a refresh of the settings data
|
|
||||||
const triggerRefresh = useCallback(() => {
|
|
||||||
setRefreshKey((prev) => prev + 1);
|
|
||||||
}, []);
|
|
||||||
|
|
||||||
// Fetch current settings
|
|
||||||
const fetchSettings = useCallback(async () => {
|
|
||||||
setLoading(true);
|
|
||||||
setError(null);
|
|
||||||
|
|
||||||
try {
|
|
||||||
const data: ApiResponse<SystemSettings> = await apiGet('/settings');
|
|
||||||
|
|
||||||
if (data.success && data.data?.systemConfig?.routing) {
|
|
||||||
setRoutingConfig({
|
|
||||||
enableGlobalRoute: data.data.systemConfig.routing.enableGlobalRoute ?? true,
|
|
||||||
enableGroupNameRoute: data.data.systemConfig.routing.enableGroupNameRoute ?? true,
|
|
||||||
enableBearerAuth: data.data.systemConfig.routing.enableBearerAuth ?? false,
|
|
||||||
bearerAuthKey: data.data.systemConfig.routing.bearerAuthKey || '',
|
|
||||||
skipAuth: data.data.systemConfig.routing.skipAuth ?? false,
|
|
||||||
});
|
|
||||||
}
|
|
||||||
if (data.success && data.data?.systemConfig?.install) {
|
|
||||||
setInstallConfig({
|
|
||||||
pythonIndexUrl: data.data.systemConfig.install.pythonIndexUrl || '',
|
|
||||||
npmRegistry: data.data.systemConfig.install.npmRegistry || '',
|
|
||||||
baseUrl: data.data.systemConfig.install.baseUrl || 'http://localhost:3000',
|
|
||||||
});
|
|
||||||
}
|
|
||||||
if (data.success && data.data?.systemConfig?.smartRouting) {
|
|
||||||
setSmartRoutingConfig({
|
|
||||||
enabled: data.data.systemConfig.smartRouting.enabled ?? false,
|
|
||||||
dbUrl: data.data.systemConfig.smartRouting.dbUrl || '',
|
|
||||||
openaiApiBaseUrl: data.data.systemConfig.smartRouting.openaiApiBaseUrl || '',
|
|
||||||
openaiApiKey: data.data.systemConfig.smartRouting.openaiApiKey || '',
|
|
||||||
openaiApiEmbeddingModel:
|
|
||||||
data.data.systemConfig.smartRouting.openaiApiEmbeddingModel || '',
|
|
||||||
});
|
|
||||||
}
|
|
||||||
if (data.success && data.data?.systemConfig?.mcpRouter) {
|
|
||||||
setMCPRouterConfig({
|
|
||||||
apiKey: data.data.systemConfig.mcpRouter.apiKey || '',
|
|
||||||
referer: data.data.systemConfig.mcpRouter.referer || 'https://www.mcphubx.com',
|
|
||||||
title: data.data.systemConfig.mcpRouter.title || 'MCPHub',
|
|
||||||
baseUrl: data.data.systemConfig.mcpRouter.baseUrl || 'https://api.mcprouter.to/v1',
|
|
||||||
});
|
|
||||||
}
|
|
||||||
if (data.success) {
|
|
||||||
if (data.data?.systemConfig?.oauthServer) {
|
|
||||||
const oauth = data.data.systemConfig.oauthServer;
|
|
||||||
const defaultOauthConfig = getDefaultOAuthServerConfig();
|
|
||||||
const defaultDynamic = defaultOauthConfig.dynamicRegistration;
|
|
||||||
const allowedScopes = Array.isArray(oauth.allowedScopes)
|
|
||||||
? [...oauth.allowedScopes]
|
|
||||||
: [...defaultOauthConfig.allowedScopes];
|
|
||||||
const dynamicAllowedGrantTypes = Array.isArray(
|
|
||||||
oauth.dynamicRegistration?.allowedGrantTypes,
|
|
||||||
)
|
|
||||||
? [...oauth.dynamicRegistration!.allowedGrantTypes!]
|
|
||||||
: [...defaultDynamic.allowedGrantTypes];
|
|
||||||
|
|
||||||
setOAuthServerConfig({
|
|
||||||
enabled: oauth.enabled ?? defaultOauthConfig.enabled,
|
|
||||||
accessTokenLifetime:
|
|
||||||
oauth.accessTokenLifetime ?? defaultOauthConfig.accessTokenLifetime,
|
|
||||||
refreshTokenLifetime:
|
|
||||||
oauth.refreshTokenLifetime ?? defaultOauthConfig.refreshTokenLifetime,
|
|
||||||
authorizationCodeLifetime:
|
|
||||||
oauth.authorizationCodeLifetime ?? defaultOauthConfig.authorizationCodeLifetime,
|
|
||||||
requireClientSecret:
|
|
||||||
oauth.requireClientSecret ?? defaultOauthConfig.requireClientSecret,
|
|
||||||
requireState: oauth.requireState ?? defaultOauthConfig.requireState,
|
|
||||||
allowedScopes,
|
|
||||||
dynamicRegistration: {
|
|
||||||
enabled: oauth.dynamicRegistration?.enabled ?? defaultDynamic.enabled,
|
|
||||||
allowedGrantTypes: dynamicAllowedGrantTypes,
|
|
||||||
requiresAuthentication:
|
|
||||||
oauth.dynamicRegistration?.requiresAuthentication ??
|
|
||||||
defaultDynamic.requiresAuthentication,
|
|
||||||
},
|
|
||||||
});
|
|
||||||
} else {
|
|
||||||
setOAuthServerConfig(getDefaultOAuthServerConfig());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if (data.success && data.data?.systemConfig?.nameSeparator !== undefined) {
|
|
||||||
setNameSeparator(data.data.systemConfig.nameSeparator);
|
|
||||||
}
|
|
||||||
if (data.success && data.data?.systemConfig?.enableSessionRebuild !== undefined) {
|
|
||||||
setEnableSessionRebuild(data.data.systemConfig.enableSessionRebuild);
|
|
||||||
}
|
|
||||||
} catch (error) {
|
|
||||||
console.error('Failed to fetch settings:', error);
|
|
||||||
setError(error instanceof Error ? error.message : 'Failed to fetch settings');
|
|
||||||
// 使用一个稳定的 showToast 引用,避免将其加入依赖数组
|
|
||||||
showToast(t('errors.failedToFetchSettings'));
|
|
||||||
} finally {
|
|
||||||
setLoading(false);
|
|
||||||
}
|
|
||||||
}, [t]); // 移除 showToast 依赖
|
|
||||||
|
|
||||||
// Update routing configuration
|
|
||||||
const updateRoutingConfig = async (key: keyof RoutingConfig, value: any) => {
|
|
||||||
setLoading(true);
|
|
||||||
setError(null);
|
|
||||||
|
|
||||||
try {
|
|
||||||
const data = await apiPut('/system-config', {
|
|
||||||
routing: {
|
|
||||||
[key]: value,
|
|
||||||
},
|
|
||||||
});
|
|
||||||
|
|
||||||
if (data.success) {
|
|
||||||
setRoutingConfig({
|
|
||||||
...routingConfig,
|
|
||||||
[key]: value,
|
|
||||||
});
|
|
||||||
showToast(t('settings.systemConfigUpdated'));
|
|
||||||
return true;
|
|
||||||
} else {
|
|
||||||
showToast(data.message || t('errors.failedToUpdateRouteConfig'));
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
} catch (error) {
|
|
||||||
console.error('Failed to update routing config:', error);
|
|
||||||
setError(error instanceof Error ? error.message : 'Failed to update routing config');
|
|
||||||
showToast(t('errors.failedToUpdateRouteConfig'));
|
|
||||||
return false;
|
|
||||||
} finally {
|
|
||||||
setLoading(false);
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
// Update install configuration
|
|
||||||
const updateInstallConfig = async (key: keyof InstallConfig, value: string) => {
|
|
||||||
setLoading(true);
|
|
||||||
setError(null);
|
|
||||||
|
|
||||||
try {
|
|
||||||
const data = await apiPut('/system-config', {
|
|
||||||
install: {
|
|
||||||
[key]: value,
|
|
||||||
},
|
|
||||||
});
|
|
||||||
|
|
||||||
if (data.success) {
|
|
||||||
setInstallConfig({
|
|
||||||
...installConfig,
|
|
||||||
[key]: value,
|
|
||||||
});
|
|
||||||
showToast(t('settings.systemConfigUpdated'));
|
|
||||||
return true;
|
|
||||||
} else {
|
|
||||||
showToast(data.message || t('errors.failedToUpdateSystemConfig'));
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
} catch (error) {
|
|
||||||
console.error('Failed to update system config:', error);
|
|
||||||
setError(error instanceof Error ? error.message : 'Failed to update system config');
|
|
||||||
showToast(t('errors.failedToUpdateSystemConfig'));
|
|
||||||
return false;
|
|
||||||
} finally {
|
|
||||||
setLoading(false);
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
// Update smart routing configuration
|
|
||||||
const updateSmartRoutingConfig = async <T extends keyof SmartRoutingConfig>(
|
|
||||||
key: T,
|
|
||||||
value: SmartRoutingConfig[T],
|
|
||||||
) => {
|
|
||||||
setLoading(true);
|
|
||||||
setError(null);
|
|
||||||
|
|
||||||
try {
|
|
||||||
const data = await apiPut('/system-config', {
|
|
||||||
smartRouting: {
|
|
||||||
[key]: value,
|
|
||||||
},
|
|
||||||
});
|
|
||||||
|
|
||||||
if (data.success) {
|
|
||||||
setSmartRoutingConfig({
|
|
||||||
...smartRoutingConfig,
|
|
||||||
[key]: value,
|
|
||||||
});
|
|
||||||
showToast(t('settings.systemConfigUpdated'));
|
|
||||||
return true;
|
|
||||||
} else {
|
|
||||||
showToast(data.message || t('errors.failedToUpdateSmartRoutingConfig'));
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
} catch (error) {
|
|
||||||
console.error('Failed to update smart routing config:', error);
|
|
||||||
const errorMessage =
|
|
||||||
error instanceof Error ? error.message : 'Failed to update smart routing config';
|
|
||||||
setError(errorMessage);
|
|
||||||
showToast(errorMessage);
|
|
||||||
return false;
|
|
||||||
} finally {
|
|
||||||
setLoading(false);
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
// Update multiple smart routing configuration fields at once
|
|
||||||
const updateSmartRoutingConfigBatch = async (updates: Partial<SmartRoutingConfig>) => {
|
|
||||||
setLoading(true);
|
|
||||||
setError(null);
|
|
||||||
|
|
||||||
try {
|
|
||||||
const data = await apiPut('/system-config', {
|
|
||||||
smartRouting: updates,
|
|
||||||
});
|
|
||||||
|
|
||||||
if (data.success) {
|
|
||||||
setSmartRoutingConfig({
|
|
||||||
...smartRoutingConfig,
|
|
||||||
...updates,
|
|
||||||
});
|
|
||||||
showToast(t('settings.systemConfigUpdated'));
|
|
||||||
return true;
|
|
||||||
} else {
|
|
||||||
showToast(data.message || t('errors.failedToUpdateSmartRoutingConfig'));
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
} catch (error) {
|
|
||||||
console.error('Failed to update smart routing config:', error);
|
|
||||||
const errorMessage =
|
|
||||||
error instanceof Error ? error.message : 'Failed to update smart routing config';
|
|
||||||
setError(errorMessage);
|
|
||||||
showToast(errorMessage);
|
|
||||||
return false;
|
|
||||||
} finally {
|
|
||||||
setLoading(false);
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
// Update multiple routing configuration fields at once
|
|
||||||
const updateRoutingConfigBatch = async (updates: Partial<RoutingConfig>) => {
|
|
||||||
setLoading(true);
|
|
||||||
setError(null);
|
|
||||||
|
|
||||||
try {
|
|
||||||
const data = await apiPut('/system-config', {
|
|
||||||
routing: updates,
|
|
||||||
});
|
|
||||||
|
|
||||||
if (data.success) {
|
|
||||||
setRoutingConfig({
|
|
||||||
...routingConfig,
|
|
||||||
...updates,
|
|
||||||
});
|
|
||||||
showToast(t('settings.systemConfigUpdated'));
|
|
||||||
return true;
|
|
||||||
} else {
|
|
||||||
showToast(data.message || t('errors.failedToUpdateRouteConfig'));
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
} catch (error) {
|
|
||||||
console.error('Failed to update routing config:', error);
|
|
||||||
setError(error instanceof Error ? error.message : 'Failed to update routing config');
|
|
||||||
showToast(t('errors.failedToUpdateRouteConfig'));
|
|
||||||
return false;
|
|
||||||
} finally {
|
|
||||||
setLoading(false);
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
// Update MCPRouter configuration
|
|
||||||
const updateMCPRouterConfig = async <T extends keyof MCPRouterConfig>(
|
|
||||||
key: T,
|
|
||||||
value: MCPRouterConfig[T],
|
|
||||||
) => {
|
|
||||||
setLoading(true);
|
|
||||||
setError(null);
|
|
||||||
|
|
||||||
try {
|
|
||||||
const data = await apiPut('/system-config', {
|
|
||||||
mcpRouter: {
|
|
||||||
[key]: value,
|
|
||||||
},
|
|
||||||
});
|
|
||||||
|
|
||||||
if (data.success) {
|
|
||||||
setMCPRouterConfig({
|
|
||||||
...mcpRouterConfig,
|
|
||||||
[key]: value,
|
|
||||||
});
|
|
||||||
showToast(t('settings.systemConfigUpdated'));
|
|
||||||
return true;
|
|
||||||
} else {
|
|
||||||
showToast(data.message || t('errors.failedToUpdateSystemConfig'));
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
} catch (error) {
|
|
||||||
console.error('Failed to update MCPRouter config:', error);
|
|
||||||
const errorMessage =
|
|
||||||
error instanceof Error ? error.message : 'Failed to update MCPRouter config';
|
|
||||||
setError(errorMessage);
|
|
||||||
showToast(errorMessage);
|
|
||||||
return false;
|
|
||||||
} finally {
|
|
||||||
setLoading(false);
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
// Update multiple MCPRouter configuration fields at once
|
|
||||||
const updateMCPRouterConfigBatch = async (updates: Partial<MCPRouterConfig>) => {
|
|
||||||
setLoading(true);
|
|
||||||
setError(null);
|
|
||||||
|
|
||||||
try {
|
|
||||||
const data = await apiPut('/system-config', {
|
|
||||||
mcpRouter: updates,
|
|
||||||
});
|
|
||||||
|
|
||||||
if (data.success) {
|
|
||||||
setMCPRouterConfig({
|
|
||||||
...mcpRouterConfig,
|
|
||||||
...updates,
|
|
||||||
});
|
|
||||||
showToast(t('settings.systemConfigUpdated'));
|
|
||||||
return true;
|
|
||||||
} else {
|
|
||||||
showToast(data.message || t('errors.failedToUpdateSystemConfig'));
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
} catch (error) {
|
|
||||||
console.error('Failed to update MCPRouter config:', error);
|
|
||||||
const errorMessage =
|
|
||||||
error instanceof Error ? error.message : 'Failed to update MCPRouter config';
|
|
||||||
setError(errorMessage);
|
|
||||||
showToast(errorMessage);
|
|
||||||
return false;
|
|
||||||
} finally {
|
|
||||||
setLoading(false);
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
// Update OAuth server configuration
|
|
||||||
const updateOAuthServerConfig = async <T extends keyof OAuthServerConfig>(
|
|
||||||
key: T,
|
|
||||||
value: OAuthServerConfig[T],
|
|
||||||
) => {
|
|
||||||
setLoading(true);
|
|
||||||
setError(null);
|
|
||||||
|
|
||||||
try {
|
|
||||||
const data = await apiPut('/system-config', {
|
|
||||||
oauthServer: {
|
|
||||||
[key]: value,
|
|
||||||
},
|
|
||||||
});
|
|
||||||
|
|
||||||
if (data.success) {
|
|
||||||
setOAuthServerConfig((prev) => ({
|
|
||||||
...prev,
|
|
||||||
[key]: value,
|
|
||||||
}));
|
|
||||||
showToast(t('settings.systemConfigUpdated'));
|
|
||||||
return true;
|
|
||||||
} else {
|
|
||||||
showToast(data.message || t('errors.failedToUpdateSystemConfig'));
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
} catch (error) {
|
|
||||||
console.error('Failed to update OAuth server config:', error);
|
|
||||||
const errorMessage =
|
|
||||||
error instanceof Error ? error.message : 'Failed to update OAuth server config';
|
|
||||||
setError(errorMessage);
|
|
||||||
showToast(errorMessage);
|
|
||||||
return false;
|
|
||||||
} finally {
|
|
||||||
setLoading(false);
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
// Update multiple OAuth server config fields
|
|
||||||
const updateOAuthServerConfigBatch = async (updates: Partial<OAuthServerConfig>) => {
|
|
||||||
setLoading(true);
|
|
||||||
setError(null);
|
|
||||||
|
|
||||||
try {
|
|
||||||
const data = await apiPut('/system-config', {
|
|
||||||
oauthServer: updates,
|
|
||||||
});
|
|
||||||
|
|
||||||
if (data.success) {
|
|
||||||
setOAuthServerConfig((prev) => ({
|
|
||||||
...prev,
|
|
||||||
...updates,
|
|
||||||
}));
|
|
||||||
showToast(t('settings.systemConfigUpdated'));
|
|
||||||
return true;
|
|
||||||
} else {
|
|
||||||
showToast(data.message || t('errors.failedToUpdateSystemConfig'));
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
} catch (error) {
|
|
||||||
console.error('Failed to update OAuth server config:', error);
|
|
||||||
const errorMessage =
|
|
||||||
error instanceof Error ? error.message : 'Failed to update OAuth server config';
|
|
||||||
setError(errorMessage);
|
|
||||||
showToast(errorMessage);
|
|
||||||
return false;
|
|
||||||
} finally {
|
|
||||||
setLoading(false);
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
// Update name separator
|
|
||||||
const updateNameSeparator = async (value: string) => {
|
|
||||||
setLoading(true);
|
|
||||||
setError(null);
|
|
||||||
|
|
||||||
try {
|
|
||||||
const data = await apiPut('/system-config', {
|
|
||||||
nameSeparator: value,
|
|
||||||
});
|
|
||||||
|
|
||||||
if (data.success) {
|
|
||||||
setNameSeparator(value);
|
|
||||||
showToast(t('settings.restartRequired'), 'info');
|
|
||||||
return true;
|
|
||||||
} else {
|
|
||||||
showToast(data.message || t('errors.failedToUpdateSystemConfig'));
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
} catch (error) {
|
|
||||||
console.error('Failed to update name separator:', error);
|
|
||||||
const errorMessage =
|
|
||||||
error instanceof Error ? error.message : 'Failed to update name separator';
|
|
||||||
setError(errorMessage);
|
|
||||||
showToast(errorMessage);
|
|
||||||
return false;
|
|
||||||
} finally {
|
|
||||||
setLoading(false);
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
// Update session rebuild setting
|
|
||||||
const updateSessionRebuild = async (value: boolean) => {
|
|
||||||
setLoading(true);
|
|
||||||
setError(null);
|
|
||||||
|
|
||||||
try {
|
|
||||||
const data = await apiPut('/system-config', {
|
|
||||||
enableSessionRebuild: value,
|
|
||||||
});
|
|
||||||
|
|
||||||
if (data.success) {
|
|
||||||
setEnableSessionRebuild(value);
|
|
||||||
showToast(t('settings.restartRequired'), 'info');
|
|
||||||
return true;
|
|
||||||
} else {
|
|
||||||
showToast(data.message || t('errors.failedToUpdateSystemConfig'));
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
} catch (error) {
|
|
||||||
console.error('Failed to update session rebuild setting:', error);
|
|
||||||
const errorMessage =
|
|
||||||
error instanceof Error ? error.message : 'Failed to update session rebuild setting';
|
|
||||||
setError(errorMessage);
|
|
||||||
showToast(errorMessage);
|
|
||||||
return false;
|
|
||||||
} finally {
|
|
||||||
setLoading(false);
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
const exportMCPSettings = async (serverName?: string) => {
|
|
||||||
setLoading(true);
|
|
||||||
setError(null);
|
|
||||||
try {
|
|
||||||
return await apiGet(`/mcp-settings/export?serverName=${serverName ? serverName : ''}`);
|
|
||||||
} catch (error) {
|
|
||||||
console.error('Failed to export MCP settings:', error);
|
|
||||||
const errorMessage = error instanceof Error ? error.message : 'Failed to export MCP settings';
|
|
||||||
setError(errorMessage);
|
|
||||||
showToast(errorMessage);
|
|
||||||
} finally {
|
|
||||||
setLoading(false);
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
// Fetch settings when the component mounts or refreshKey changes
|
|
||||||
useEffect(() => {
|
|
||||||
fetchSettings();
|
|
||||||
}, [fetchSettings, refreshKey]);
|
|
||||||
|
|
||||||
useEffect(() => {
|
|
||||||
if (routingConfig) {
|
|
||||||
setTempRoutingConfig({
|
|
||||||
bearerAuthKey: routingConfig.bearerAuthKey,
|
|
||||||
});
|
|
||||||
}
|
|
||||||
}, [routingConfig]);
|
|
||||||
|
|
||||||
return {
|
|
||||||
routingConfig,
|
|
||||||
tempRoutingConfig,
|
|
||||||
setTempRoutingConfig,
|
|
||||||
installConfig,
|
|
||||||
smartRoutingConfig,
|
|
||||||
mcpRouterConfig,
|
|
||||||
oauthServerConfig,
|
|
||||||
nameSeparator,
|
|
||||||
enableSessionRebuild,
|
|
||||||
loading,
|
|
||||||
error,
|
|
||||||
setError,
|
|
||||||
triggerRefresh,
|
|
||||||
fetchSettings,
|
|
||||||
updateRoutingConfig,
|
|
||||||
updateInstallConfig,
|
|
||||||
updateSmartRoutingConfig,
|
|
||||||
updateSmartRoutingConfigBatch,
|
|
||||||
updateRoutingConfigBatch,
|
|
||||||
updateMCPRouterConfig,
|
|
||||||
updateMCPRouterConfigBatch,
|
|
||||||
updateOAuthServerConfig,
|
|
||||||
updateOAuthServerConfigBatch,
|
|
||||||
updateNameSeparator,
|
|
||||||
updateSessionRebuild,
|
|
||||||
exportMCPSettings,
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -6,6 +6,7 @@ import { useServerData } from '@/hooks/useServerData';
|
|||||||
import AddGroupForm from '@/components/AddGroupForm';
|
import AddGroupForm from '@/components/AddGroupForm';
|
||||||
import EditGroupForm from '@/components/EditGroupForm';
|
import EditGroupForm from '@/components/EditGroupForm';
|
||||||
import GroupCard from '@/components/GroupCard';
|
import GroupCard from '@/components/GroupCard';
|
||||||
|
import GroupImportForm from '@/components/GroupImportForm';
|
||||||
|
|
||||||
const GroupsPage: React.FC = () => {
|
const GroupsPage: React.FC = () => {
|
||||||
const { t } = useTranslation();
|
const { t } = useTranslation();
|
||||||
@@ -15,12 +16,13 @@ const GroupsPage: React.FC = () => {
|
|||||||
error: groupError,
|
error: groupError,
|
||||||
setError: setGroupError,
|
setError: setGroupError,
|
||||||
deleteGroup,
|
deleteGroup,
|
||||||
triggerRefresh
|
triggerRefresh,
|
||||||
} = useGroupData();
|
} = useGroupData();
|
||||||
const { servers } = useServerData({ refreshOnMount: true });
|
const { servers } = useServerData({ refreshOnMount: true });
|
||||||
|
|
||||||
const [editingGroup, setEditingGroup] = useState<Group | null>(null);
|
const [editingGroup, setEditingGroup] = useState<Group | null>(null);
|
||||||
const [showAddForm, setShowAddForm] = useState(false);
|
const [showAddForm, setShowAddForm] = useState(false);
|
||||||
|
const [showImportForm, setShowImportForm] = useState(false);
|
||||||
|
|
||||||
const handleEditClick = (group: Group) => {
|
const handleEditClick = (group: Group) => {
|
||||||
setEditingGroup(group);
|
setEditingGroup(group);
|
||||||
@@ -47,6 +49,11 @@ const GroupsPage: React.FC = () => {
|
|||||||
triggerRefresh(); // Refresh the groups list after adding
|
triggerRefresh(); // Refresh the groups list after adding
|
||||||
};
|
};
|
||||||
|
|
||||||
|
const handleImportSuccess = () => {
|
||||||
|
setShowImportForm(false);
|
||||||
|
triggerRefresh(); // Refresh the groups list after import
|
||||||
|
};
|
||||||
|
|
||||||
return (
|
return (
|
||||||
<div>
|
<div>
|
||||||
<div className="flex justify-between items-center mb-8">
|
<div className="flex justify-between items-center mb-8">
|
||||||
@@ -56,11 +63,38 @@ const GroupsPage: React.FC = () => {
|
|||||||
onClick={handleAddGroup}
|
onClick={handleAddGroup}
|
||||||
className="px-4 py-2 bg-blue-100 text-blue-800 rounded hover:bg-blue-200 flex items-center btn-primary transition-all duration-200"
|
className="px-4 py-2 bg-blue-100 text-blue-800 rounded hover:bg-blue-200 flex items-center btn-primary transition-all duration-200"
|
||||||
>
|
>
|
||||||
<svg xmlns="http://www.w3.org/2000/svg" className="h-4 w-4 mr-2" viewBox="0 0 20 20" fill="currentColor">
|
<svg
|
||||||
<path fillRule="evenodd" d="M10 3a1 1 0 00-1 1v5H4a1 1 0 100 2h5v5a1 1 0 102 0v-5h5a1 1 0 100-2h-5V4a1 1 0 00-1-1z" clipRule="evenodd" />
|
xmlns="http://www.w3.org/2000/svg"
|
||||||
|
className="h-4 w-4 mr-2"
|
||||||
|
viewBox="0 0 20 20"
|
||||||
|
fill="currentColor"
|
||||||
|
>
|
||||||
|
<path
|
||||||
|
fillRule="evenodd"
|
||||||
|
d="M10 3a1 1 0 00-1 1v5H4a1 1 0 100 2h5v5a1 1 0 102 0v-5h5a1 1 0 100-2h-5V4a1 1 0 00-1-1z"
|
||||||
|
clipRule="evenodd"
|
||||||
|
/>
|
||||||
</svg>
|
</svg>
|
||||||
{t('groups.add')}
|
{t('groups.add')}
|
||||||
</button>
|
</button>
|
||||||
|
<button
|
||||||
|
onClick={() => setShowImportForm(true)}
|
||||||
|
className="px-4 py-2 bg-blue-100 text-blue-800 rounded hover:bg-blue-200 flex items-center btn-primary transition-all duration-200"
|
||||||
|
>
|
||||||
|
<svg
|
||||||
|
xmlns="http://www.w3.org/2000/svg"
|
||||||
|
className="h-4 w-4 mr-2"
|
||||||
|
viewBox="0 0 20 20"
|
||||||
|
fill="currentColor"
|
||||||
|
>
|
||||||
|
<path
|
||||||
|
fillRule="evenodd"
|
||||||
|
d="M3 17a1 1 0 011-1h12a1 1 0 110 2H4a1 1 0 01-1-1zm3.293-7.707a1 1 0 011.414 0L9 10.586V3a1 1 0 112 0v7.586l1.293-1.293a1 1 0 111.414 1.414l-3 3a1 1 0 01-1.414 0l-3-3a1 1 0 010-1.414z"
|
||||||
|
clipRule="evenodd"
|
||||||
|
/>
|
||||||
|
</svg>
|
||||||
|
{t('groupImport.button')}
|
||||||
|
</button>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
@@ -73,9 +107,25 @@ const GroupsPage: React.FC = () => {
|
|||||||
{groupsLoading ? (
|
{groupsLoading ? (
|
||||||
<div className="bg-white shadow rounded-lg p-6 loading-container">
|
<div className="bg-white shadow rounded-lg p-6 loading-container">
|
||||||
<div className="flex flex-col items-center justify-center">
|
<div className="flex flex-col items-center justify-center">
|
||||||
<svg className="animate-spin h-10 w-10 text-blue-500 mb-4" xmlns="http://www.w3.org/2000/svg" fill="none" viewBox="0 0 24 24">
|
<svg
|
||||||
<circle className="opacity-25" cx="12" cy="12" r="10" stroke="currentColor" strokeWidth="4"></circle>
|
className="animate-spin h-10 w-10 text-blue-500 mb-4"
|
||||||
<path className="opacity-75" fill="currentColor" d="M4 12a8 8 0 018-8V0C5.373 0 0 5.373 0 12h4zm2 5.291A7.962 7.962 0 014 12H0c0 3.042 1.135 5.824 3 7.938l3-2.647z"></path>
|
xmlns="http://www.w3.org/2000/svg"
|
||||||
|
fill="none"
|
||||||
|
viewBox="0 0 24 24"
|
||||||
|
>
|
||||||
|
<circle
|
||||||
|
className="opacity-25"
|
||||||
|
cx="12"
|
||||||
|
cy="12"
|
||||||
|
r="10"
|
||||||
|
stroke="currentColor"
|
||||||
|
strokeWidth="4"
|
||||||
|
></circle>
|
||||||
|
<path
|
||||||
|
className="opacity-75"
|
||||||
|
fill="currentColor"
|
||||||
|
d="M4 12a8 8 0 018-8V0C5.373 0 0 5.373 0 12h4zm2 5.291A7.962 7.962 0 014 12H0c0 3.042 1.135 5.824 3 7.938l3-2.647z"
|
||||||
|
></path>
|
||||||
</svg>
|
</svg>
|
||||||
<p className="text-gray-600">{t('app.loading')}</p>
|
<p className="text-gray-600">{t('app.loading')}</p>
|
||||||
</div>
|
</div>
|
||||||
@@ -98,8 +148,13 @@ const GroupsPage: React.FC = () => {
|
|||||||
</div>
|
</div>
|
||||||
)}
|
)}
|
||||||
|
|
||||||
{showAddForm && (
|
{showAddForm && <AddGroupForm onAdd={handleAddComplete} onCancel={handleAddComplete} />}
|
||||||
<AddGroupForm onAdd={handleAddComplete} onCancel={handleAddComplete} />
|
|
||||||
|
{showImportForm && (
|
||||||
|
<GroupImportForm
|
||||||
|
onSuccess={handleImportSuccess}
|
||||||
|
onCancel={() => setShowImportForm(false)}
|
||||||
|
/>
|
||||||
)}
|
)}
|
||||||
|
|
||||||
{editingGroup && (
|
{editingGroup && (
|
||||||
@@ -113,4 +168,4 @@ const GroupsPage: React.FC = () => {
|
|||||||
);
|
);
|
||||||
};
|
};
|
||||||
|
|
||||||
export default GroupsPage;
|
export default GroupsPage;
|
||||||
|
|||||||
@@ -44,6 +44,24 @@ const LoginPage: React.FC = () => {
|
|||||||
return sanitizeReturnUrl(params.get('returnUrl'));
|
return sanitizeReturnUrl(params.get('returnUrl'));
|
||||||
}, [location.search]);
|
}, [location.search]);
|
||||||
|
|
||||||
|
const isServerUnavailableError = useCallback((message?: string) => {
|
||||||
|
if (!message) return false;
|
||||||
|
const normalized = message.toLowerCase();
|
||||||
|
|
||||||
|
return (
|
||||||
|
normalized.includes('failed to fetch') ||
|
||||||
|
normalized.includes('networkerror') ||
|
||||||
|
normalized.includes('network error') ||
|
||||||
|
normalized.includes('connection refused') ||
|
||||||
|
normalized.includes('unable to connect') ||
|
||||||
|
normalized.includes('fetch error') ||
|
||||||
|
normalized.includes('econnrefused') ||
|
||||||
|
normalized.includes('http 500') ||
|
||||||
|
normalized.includes('internal server error') ||
|
||||||
|
normalized.includes('proxy error')
|
||||||
|
);
|
||||||
|
}, []);
|
||||||
|
|
||||||
const buildRedirectTarget = useCallback(() => {
|
const buildRedirectTarget = useCallback(() => {
|
||||||
if (!returnUrl) {
|
if (!returnUrl) {
|
||||||
return '/';
|
return '/';
|
||||||
@@ -100,10 +118,20 @@ const LoginPage: React.FC = () => {
|
|||||||
redirectAfterLogin();
|
redirectAfterLogin();
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
setError(t('auth.loginFailed'));
|
const message = result.message;
|
||||||
|
if (isServerUnavailableError(message)) {
|
||||||
|
setError(t('auth.serverUnavailable'));
|
||||||
|
} else {
|
||||||
|
setError(t('auth.loginFailed'));
|
||||||
|
}
|
||||||
}
|
}
|
||||||
} catch (err) {
|
} catch (err) {
|
||||||
setError(t('auth.loginError'));
|
const message = err instanceof Error ? err.message : undefined;
|
||||||
|
if (isServerUnavailableError(message)) {
|
||||||
|
setError(t('auth.serverUnavailable'));
|
||||||
|
} else {
|
||||||
|
setError(t('auth.loginError'));
|
||||||
|
}
|
||||||
} finally {
|
} finally {
|
||||||
setLoading(false);
|
setLoading(false);
|
||||||
}
|
}
|
||||||
@@ -131,13 +159,21 @@ const LoginPage: React.FC = () => {
|
|||||||
}}
|
}}
|
||||||
/>
|
/>
|
||||||
<div className="pointer-events-none absolute inset-0 -z-10">
|
<div className="pointer-events-none absolute inset-0 -z-10">
|
||||||
<svg className="h-full w-full opacity-[0.08] dark:opacity-[0.12]" xmlns="http://www.w3.org/2000/svg">
|
<svg
|
||||||
|
className="h-full w-full opacity-[0.08] dark:opacity-[0.12]"
|
||||||
|
xmlns="http://www.w3.org/2000/svg"
|
||||||
|
>
|
||||||
<defs>
|
<defs>
|
||||||
<pattern id="grid" width="32" height="32" patternUnits="userSpaceOnUse">
|
<pattern id="grid" width="32" height="32" patternUnits="userSpaceOnUse">
|
||||||
<path d="M 32 0 L 0 0 0 32" fill="none" stroke="currentColor" strokeWidth="0.5" />
|
<path d="M 32 0 L 0 0 0 32" fill="none" stroke="currentColor" strokeWidth="0.5" />
|
||||||
</pattern>
|
</pattern>
|
||||||
</defs>
|
</defs>
|
||||||
<rect width="100%" height="100%" fill="url(#grid)" className="text-gray-400 dark:text-gray-300" />
|
<rect
|
||||||
|
width="100%"
|
||||||
|
height="100%"
|
||||||
|
fill="url(#grid)"
|
||||||
|
className="text-gray-400 dark:text-gray-300"
|
||||||
|
/>
|
||||||
</svg>
|
</svg>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
|
|||||||
@@ -21,6 +21,7 @@ const ServersPage: React.FC = () => {
|
|||||||
handleServerEdit,
|
handleServerEdit,
|
||||||
handleServerRemove,
|
handleServerRemove,
|
||||||
handleServerToggle,
|
handleServerToggle,
|
||||||
|
handleServerReload,
|
||||||
triggerRefresh
|
triggerRefresh
|
||||||
} = useServerData({ refreshOnMount: true });
|
} = useServerData({ refreshOnMount: true });
|
||||||
const [editingServer, setEditingServer] = useState<Server | null>(null);
|
const [editingServer, setEditingServer] = useState<Server | null>(null);
|
||||||
@@ -159,6 +160,7 @@ const ServersPage: React.FC = () => {
|
|||||||
onEdit={handleEditClick}
|
onEdit={handleEditClick}
|
||||||
onToggle={handleServerToggle}
|
onToggle={handleServerToggle}
|
||||||
onRefresh={triggerRefresh}
|
onRefresh={triggerRefresh}
|
||||||
|
onReload={handleServerReload}
|
||||||
/>
|
/>
|
||||||
))}
|
))}
|
||||||
</div>
|
</div>
|
||||||
@@ -189,4 +191,4 @@ const ServersPage: React.FC = () => {
|
|||||||
);
|
);
|
||||||
};
|
};
|
||||||
|
|
||||||
export default ServersPage;
|
export default ServersPage;
|
||||||
|
|||||||
File diff suppressed because it is too large
Load Diff
@@ -29,7 +29,7 @@ export const login = async (credentials: LoginCredentials): Promise<AuthResponse
|
|||||||
console.error('Login error:', error);
|
console.error('Login error:', error);
|
||||||
return {
|
return {
|
||||||
success: false,
|
success: false,
|
||||||
message: 'An error occurred during login',
|
message: error instanceof Error ? error.message : 'An error occurred during login',
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -309,6 +309,19 @@ export interface ApiResponse<T = any> {
|
|||||||
data?: T;
|
data?: T;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Bearer authentication key configuration (frontend view model)
|
||||||
|
export type BearerKeyAccessType = 'all' | 'groups' | 'servers' | 'custom';
|
||||||
|
|
||||||
|
export interface BearerKey {
|
||||||
|
id: string;
|
||||||
|
name: string;
|
||||||
|
token: string;
|
||||||
|
enabled: boolean;
|
||||||
|
accessType: BearerKeyAccessType;
|
||||||
|
allowedGroups?: string[];
|
||||||
|
allowedServers?: string[];
|
||||||
|
}
|
||||||
|
|
||||||
// Auth types
|
// Auth types
|
||||||
export interface IUser {
|
export interface IUser {
|
||||||
username: string;
|
username: string;
|
||||||
|
|||||||
@@ -61,6 +61,7 @@
|
|||||||
"emptyFields": "Username and password cannot be empty",
|
"emptyFields": "Username and password cannot be empty",
|
||||||
"loginFailed": "Login failed, please check your username and password",
|
"loginFailed": "Login failed, please check your username and password",
|
||||||
"loginError": "An error occurred during login",
|
"loginError": "An error occurred during login",
|
||||||
|
"serverUnavailable": "Unable to connect to the server. Please check your network connection or try again later",
|
||||||
"currentPassword": "Current Password",
|
"currentPassword": "Current Password",
|
||||||
"newPassword": "New Password",
|
"newPassword": "New Password",
|
||||||
"confirmPassword": "Confirm Password",
|
"confirmPassword": "Confirm Password",
|
||||||
@@ -116,6 +117,9 @@
|
|||||||
"enabled": "Enabled",
|
"enabled": "Enabled",
|
||||||
"enable": "Enable",
|
"enable": "Enable",
|
||||||
"disable": "Disable",
|
"disable": "Disable",
|
||||||
|
"reload": "Reload",
|
||||||
|
"reloadSuccess": "Server reloaded successfully",
|
||||||
|
"reloadError": "Failed to reload server {{serverName}}",
|
||||||
"requestOptions": "Connection Configuration",
|
"requestOptions": "Connection Configuration",
|
||||||
"timeout": "Request Timeout",
|
"timeout": "Request Timeout",
|
||||||
"timeoutDescription": "Timeout for requests to the MCP server (ms)",
|
"timeoutDescription": "Timeout for requests to the MCP server (ms)",
|
||||||
@@ -250,7 +254,11 @@
|
|||||||
"type": "Type",
|
"type": "Type",
|
||||||
"repeated": "Repeated",
|
"repeated": "Repeated",
|
||||||
"valueHint": "Value Hint",
|
"valueHint": "Value Hint",
|
||||||
"choices": "Choices"
|
"choices": "Choices",
|
||||||
|
"actions": "Actions",
|
||||||
|
"saving": "Saving...",
|
||||||
|
"active": "Active",
|
||||||
|
"inactive": "Inactive"
|
||||||
},
|
},
|
||||||
"nav": {
|
"nav": {
|
||||||
"dashboard": "Dashboard",
|
"dashboard": "Dashboard",
|
||||||
@@ -273,7 +281,7 @@
|
|||||||
"recentServers": "Recent Servers"
|
"recentServers": "Recent Servers"
|
||||||
},
|
},
|
||||||
"servers": {
|
"servers": {
|
||||||
"title": "Servers Management"
|
"title": "Server Management"
|
||||||
},
|
},
|
||||||
"groups": {
|
"groups": {
|
||||||
"title": "Group Management"
|
"title": "Group Management"
|
||||||
@@ -536,7 +544,9 @@
|
|||||||
"description": "Description",
|
"description": "Description",
|
||||||
"messages": "Messages",
|
"messages": "Messages",
|
||||||
"noDescription": "No description available",
|
"noDescription": "No description available",
|
||||||
"runPromptWithName": "Get Prompt: {{name}}"
|
"runPromptWithName": "Get Prompt: {{name}}",
|
||||||
|
"descriptionUpdateSuccess": "Prompt description updated successfully",
|
||||||
|
"descriptionUpdateFailed": "Failed to update prompt description"
|
||||||
},
|
},
|
||||||
"settings": {
|
"settings": {
|
||||||
"enableGlobalRoute": "Enable Global Route",
|
"enableGlobalRoute": "Enable Global Route",
|
||||||
@@ -548,6 +558,28 @@
|
|||||||
"bearerAuthKey": "Bearer Authentication Key",
|
"bearerAuthKey": "Bearer Authentication Key",
|
||||||
"bearerAuthKeyDescription": "The authentication key that will be required in the Bearer token",
|
"bearerAuthKeyDescription": "The authentication key that will be required in the Bearer token",
|
||||||
"bearerAuthKeyPlaceholder": "Enter bearer authentication key",
|
"bearerAuthKeyPlaceholder": "Enter bearer authentication key",
|
||||||
|
"bearerKeysSectionTitle": "Keys",
|
||||||
|
"bearerKeysSectionDescription": "Manage multiple keys with different access scopes.",
|
||||||
|
"noBearerKeys": "No keys configured yet.",
|
||||||
|
"bearerKeyName": "Name",
|
||||||
|
"bearerKeyToken": "Token",
|
||||||
|
"bearerKeyEnabled": "Enabled",
|
||||||
|
"bearerKeyAccessType": "Access scope",
|
||||||
|
"bearerKeyAccessAll": "All",
|
||||||
|
"bearerKeyAccessGroups": "Groups",
|
||||||
|
"bearerKeyAccessServers": "Servers",
|
||||||
|
"bearerKeyAccessCustom": "Custom",
|
||||||
|
"bearerKeyAllowedGroups": "Allowed groups",
|
||||||
|
"bearerKeyAllowedServers": "Allowed servers",
|
||||||
|
"addBearerKey": "Add key",
|
||||||
|
"addBearerKeyButton": "Create",
|
||||||
|
"bearerKeyRequired": "Name and token are required",
|
||||||
|
"deleteBearerKeyConfirm": "Are you sure you want to delete this key?",
|
||||||
|
"generate": "Generate",
|
||||||
|
"selectGroups": "Select Groups",
|
||||||
|
"selectServers": "Select Servers",
|
||||||
|
"selectAtLeastOneGroup": "Please select at least one group",
|
||||||
|
"selectAtLeastOneServer": "Please select at least one server",
|
||||||
"skipAuth": "Skip Authentication",
|
"skipAuth": "Skip Authentication",
|
||||||
"skipAuthDescription": "Bypass login requirement for frontend and API access (DEFAULT OFF for security)",
|
"skipAuthDescription": "Bypass login requirement for frontend and API access (DEFAULT OFF for security)",
|
||||||
"pythonIndexUrl": "Python Package Repository URL",
|
"pythonIndexUrl": "Python Package Repository URL",
|
||||||
@@ -667,6 +699,22 @@
|
|||||||
"importFailed": "Failed to import servers",
|
"importFailed": "Failed to import servers",
|
||||||
"partialSuccess": "Imported {{count}} of {{total}} servers successfully. Some servers failed:"
|
"partialSuccess": "Imported {{count}} of {{total}} servers successfully. Some servers failed:"
|
||||||
},
|
},
|
||||||
|
"groupImport": {
|
||||||
|
"button": "Import",
|
||||||
|
"title": "Import Groups from JSON",
|
||||||
|
"inputLabel": "Group Configuration JSON",
|
||||||
|
"inputHelp": "Paste your group configuration JSON. Each group can contain a list of servers.",
|
||||||
|
"preview": "Preview",
|
||||||
|
"previewTitle": "Preview Groups to Import",
|
||||||
|
"import": "Import",
|
||||||
|
"importing": "Importing...",
|
||||||
|
"invalidFormat": "Invalid JSON format. The JSON must contain a 'groups' array.",
|
||||||
|
"missingName": "Each group must have a 'name' field.",
|
||||||
|
"parseError": "Failed to parse JSON. Please check the format and try again.",
|
||||||
|
"addFailed": "Failed to add group",
|
||||||
|
"importFailed": "Failed to import groups",
|
||||||
|
"partialSuccess": "Imported {{count}} of {{total}} groups successfully. Some groups failed:"
|
||||||
|
},
|
||||||
"users": {
|
"users": {
|
||||||
"add": "Add User",
|
"add": "Add User",
|
||||||
"addNew": "Add New User",
|
"addNew": "Add New User",
|
||||||
@@ -723,6 +771,7 @@
|
|||||||
"failedToRemoveServer": "Server not found or failed to remove",
|
"failedToRemoveServer": "Server not found or failed to remove",
|
||||||
"internalServerError": "Internal server error",
|
"internalServerError": "Internal server error",
|
||||||
"failedToGetServers": "Failed to get servers information",
|
"failedToGetServers": "Failed to get servers information",
|
||||||
|
"failedToReloadServer": "Failed to reload server",
|
||||||
"failedToGetServerSettings": "Failed to get server settings",
|
"failedToGetServerSettings": "Failed to get server settings",
|
||||||
"failedToGetServerConfig": "Failed to get server configuration",
|
"failedToGetServerConfig": "Failed to get server configuration",
|
||||||
"failedToSaveSettings": "Failed to save settings",
|
"failedToSaveSettings": "Failed to save settings",
|
||||||
|
|||||||
@@ -61,6 +61,7 @@
|
|||||||
"emptyFields": "Le nom d'utilisateur et le mot de passe ne peuvent pas être vides",
|
"emptyFields": "Le nom d'utilisateur et le mot de passe ne peuvent pas être vides",
|
||||||
"loginFailed": "Échec de la connexion, veuillez vérifier votre nom d'utilisateur et votre mot de passe",
|
"loginFailed": "Échec de la connexion, veuillez vérifier votre nom d'utilisateur et votre mot de passe",
|
||||||
"loginError": "Une erreur est survenue lors de la connexion",
|
"loginError": "Une erreur est survenue lors de la connexion",
|
||||||
|
"serverUnavailable": "Impossible de se connecter au serveur. Veuillez vérifier votre connexion réseau ou réessayer plus tard",
|
||||||
"currentPassword": "Mot de passe actuel",
|
"currentPassword": "Mot de passe actuel",
|
||||||
"newPassword": "Nouveau mot de passe",
|
"newPassword": "Nouveau mot de passe",
|
||||||
"confirmPassword": "Confirmer le mot de passe",
|
"confirmPassword": "Confirmer le mot de passe",
|
||||||
@@ -116,6 +117,9 @@
|
|||||||
"enabled": "Activé",
|
"enabled": "Activé",
|
||||||
"enable": "Activer",
|
"enable": "Activer",
|
||||||
"disable": "Désactiver",
|
"disable": "Désactiver",
|
||||||
|
"reload": "Recharger",
|
||||||
|
"reloadSuccess": "Serveur rechargé avec succès",
|
||||||
|
"reloadError": "Échec du rechargement du serveur {{serverName}}",
|
||||||
"requestOptions": "Configuration de la connexion",
|
"requestOptions": "Configuration de la connexion",
|
||||||
"timeout": "Délai d'attente de la requête",
|
"timeout": "Délai d'attente de la requête",
|
||||||
"timeoutDescription": "Délai d'attente pour les requêtes vers le serveur MCP (ms)",
|
"timeoutDescription": "Délai d'attente pour les requêtes vers le serveur MCP (ms)",
|
||||||
@@ -208,6 +212,7 @@
|
|||||||
"serverAdd": "Échec de l'ajout du serveur. Veuillez vérifier l'état du serveur",
|
"serverAdd": "Échec de l'ajout du serveur. Veuillez vérifier l'état du serveur",
|
||||||
"serverUpdate": "Échec de la modification du serveur {{serverName}}. Veuillez vérifier l'état du serveur",
|
"serverUpdate": "Échec de la modification du serveur {{serverName}}. Veuillez vérifier l'état du serveur",
|
||||||
"serverFetch": "Échec de la récupération des données du serveur. Veuillez réessayer plus tard",
|
"serverFetch": "Échec de la récupération des données du serveur. Veuillez réessayer plus tard",
|
||||||
|
"failedToReloadServer": "Échec du rechargement du serveur",
|
||||||
"initialStartup": "Le serveur est peut-être en cours de démarrage. Veuillez patienter un instant car ce processus peut prendre du temps au premier lancement...",
|
"initialStartup": "Le serveur est peut-être en cours de démarrage. Veuillez patienter un instant car ce processus peut prendre du temps au premier lancement...",
|
||||||
"serverInstall": "Échec de l'installation du serveur",
|
"serverInstall": "Échec de l'installation du serveur",
|
||||||
"failedToFetchSettings": "Échec de la récupération des paramètres",
|
"failedToFetchSettings": "Échec de la récupération des paramètres",
|
||||||
@@ -250,7 +255,11 @@
|
|||||||
"type": "Type",
|
"type": "Type",
|
||||||
"repeated": "Répété",
|
"repeated": "Répété",
|
||||||
"valueHint": "Indice de valeur",
|
"valueHint": "Indice de valeur",
|
||||||
"choices": "Choix"
|
"choices": "Choix",
|
||||||
|
"actions": "Actions",
|
||||||
|
"saving": "Enregistrement...",
|
||||||
|
"active": "Actif",
|
||||||
|
"inactive": "Inactif"
|
||||||
},
|
},
|
||||||
"nav": {
|
"nav": {
|
||||||
"dashboard": "Tableau de bord",
|
"dashboard": "Tableau de bord",
|
||||||
@@ -536,7 +545,9 @@
|
|||||||
"description": "Description",
|
"description": "Description",
|
||||||
"messages": "Messages",
|
"messages": "Messages",
|
||||||
"noDescription": "Aucune description disponible",
|
"noDescription": "Aucune description disponible",
|
||||||
"runPromptWithName": "Obtenir l'invite : {{name}}"
|
"runPromptWithName": "Obtenir l'invite : {{name}}",
|
||||||
|
"descriptionUpdateSuccess": "Description de l'invite mise à jour avec succès",
|
||||||
|
"descriptionUpdateFailed": "Échec de la mise à jour de la description de l'invite"
|
||||||
},
|
},
|
||||||
"settings": {
|
"settings": {
|
||||||
"enableGlobalRoute": "Activer la route globale",
|
"enableGlobalRoute": "Activer la route globale",
|
||||||
@@ -548,6 +559,28 @@
|
|||||||
"bearerAuthKey": "Clé d'authentification Bearer",
|
"bearerAuthKey": "Clé d'authentification Bearer",
|
||||||
"bearerAuthKeyDescription": "La clé d'authentification qui sera requise dans le jeton Bearer",
|
"bearerAuthKeyDescription": "La clé d'authentification qui sera requise dans le jeton Bearer",
|
||||||
"bearerAuthKeyPlaceholder": "Entrez la clé d'authentification Bearer",
|
"bearerAuthKeyPlaceholder": "Entrez la clé d'authentification Bearer",
|
||||||
|
"bearerKeysSectionTitle": "Clés",
|
||||||
|
"bearerKeysSectionDescription": "Gérez plusieurs clés avec différentes portées d’accès.",
|
||||||
|
"noBearerKeys": "Aucune clé configurée pour le moment.",
|
||||||
|
"bearerKeyName": "Nom",
|
||||||
|
"bearerKeyToken": "Jeton",
|
||||||
|
"bearerKeyEnabled": "Activée",
|
||||||
|
"bearerKeyAccessType": "Portée d’accès",
|
||||||
|
"bearerKeyAccessAll": "Toutes",
|
||||||
|
"bearerKeyAccessGroups": "Groupes",
|
||||||
|
"bearerKeyAccessServers": "Serveurs",
|
||||||
|
"bearerKeyAccessCustom": "Personnalisée",
|
||||||
|
"bearerKeyAllowedGroups": "Groupes autorisés",
|
||||||
|
"bearerKeyAllowedServers": "Serveurs autorisés",
|
||||||
|
"addBearerKey": "Ajouter une clé",
|
||||||
|
"addBearerKeyButton": "Créer",
|
||||||
|
"bearerKeyRequired": "Le nom et le jeton sont obligatoires",
|
||||||
|
"deleteBearerKeyConfirm": "Voulez-vous vraiment supprimer cette clé ?",
|
||||||
|
"generate": "Générer",
|
||||||
|
"selectGroups": "Sélectionner des groupes",
|
||||||
|
"selectServers": "Sélectionner des serveurs",
|
||||||
|
"selectAtLeastOneGroup": "Veuillez sélectionner au moins un groupe",
|
||||||
|
"selectAtLeastOneServer": "Veuillez sélectionner au moins un serveur",
|
||||||
"skipAuth": "Ignorer l'authentification",
|
"skipAuth": "Ignorer l'authentification",
|
||||||
"skipAuthDescription": "Contourner l'exigence de connexion pour l'accès au frontend et à l'API (DÉSACTIVÉ PAR DÉFAUT pour des raisons de sécurité)",
|
"skipAuthDescription": "Contourner l'exigence de connexion pour l'accès au frontend et à l'API (DÉSACTIVÉ PAR DÉFAUT pour des raisons de sécurité)",
|
||||||
"pythonIndexUrl": "URL du dépôt de paquets Python",
|
"pythonIndexUrl": "URL du dépôt de paquets Python",
|
||||||
@@ -667,6 +700,22 @@
|
|||||||
"importFailed": "Échec de l'importation des serveurs",
|
"importFailed": "Échec de l'importation des serveurs",
|
||||||
"partialSuccess": "{{count}} serveur(s) sur {{total}} importé(s) avec succès. Certains serveurs ont échoué :"
|
"partialSuccess": "{{count}} serveur(s) sur {{total}} importé(s) avec succès. Certains serveurs ont échoué :"
|
||||||
},
|
},
|
||||||
|
"groupImport": {
|
||||||
|
"button": "Importer",
|
||||||
|
"title": "Importer des groupes depuis JSON",
|
||||||
|
"inputLabel": "Configuration JSON des groupes",
|
||||||
|
"inputHelp": "Collez votre configuration JSON de groupes. Chaque groupe peut contenir une liste de serveurs.",
|
||||||
|
"preview": "Aperçu",
|
||||||
|
"previewTitle": "Aperçu des groupes à importer",
|
||||||
|
"import": "Importer",
|
||||||
|
"importing": "Importation en cours...",
|
||||||
|
"invalidFormat": "Format JSON invalide. Le JSON doit contenir un tableau 'groups'.",
|
||||||
|
"missingName": "Chaque groupe doit avoir un champ 'name'.",
|
||||||
|
"parseError": "Échec de l'analyse du JSON. Veuillez vérifier le format et réessayer.",
|
||||||
|
"addFailed": "Échec de l'ajout du groupe",
|
||||||
|
"importFailed": "Échec de l'importation des groupes",
|
||||||
|
"partialSuccess": "{{count}} groupe(s) sur {{total}} importé(s) avec succès. Certains groupes ont échoué :"
|
||||||
|
},
|
||||||
"users": {
|
"users": {
|
||||||
"add": "Ajouter un utilisateur",
|
"add": "Ajouter un utilisateur",
|
||||||
"addNew": "Ajouter un nouvel utilisateur",
|
"addNew": "Ajouter un nouvel utilisateur",
|
||||||
|
|||||||
@@ -61,6 +61,7 @@
|
|||||||
"emptyFields": "Kullanıcı adı ve şifre boş olamaz",
|
"emptyFields": "Kullanıcı adı ve şifre boş olamaz",
|
||||||
"loginFailed": "Giriş başarısız, lütfen kullanıcı adınızı ve şifrenizi kontrol edin",
|
"loginFailed": "Giriş başarısız, lütfen kullanıcı adınızı ve şifrenizi kontrol edin",
|
||||||
"loginError": "Giriş sırasında bir hata oluştu",
|
"loginError": "Giriş sırasında bir hata oluştu",
|
||||||
|
"serverUnavailable": "Sunucuya bağlanılamıyor. Lütfen ağ bağlantınızı kontrol edin veya daha sonra tekrar deneyin",
|
||||||
"currentPassword": "Mevcut Şifre",
|
"currentPassword": "Mevcut Şifre",
|
||||||
"newPassword": "Yeni Şifre",
|
"newPassword": "Yeni Şifre",
|
||||||
"confirmPassword": "Şifreyi Onayla",
|
"confirmPassword": "Şifreyi Onayla",
|
||||||
@@ -116,6 +117,9 @@
|
|||||||
"enabled": "Etkin",
|
"enabled": "Etkin",
|
||||||
"enable": "Etkinleştir",
|
"enable": "Etkinleştir",
|
||||||
"disable": "Devre Dışı Bırak",
|
"disable": "Devre Dışı Bırak",
|
||||||
|
"reload": "Yeniden Yükle",
|
||||||
|
"reloadSuccess": "Sunucu başarıyla yeniden yüklendi",
|
||||||
|
"reloadError": "Sunucu {{serverName}} yeniden yüklenemedi",
|
||||||
"requestOptions": "Bağlantı Yapılandırması",
|
"requestOptions": "Bağlantı Yapılandırması",
|
||||||
"timeout": "İstek Zaman Aşımı",
|
"timeout": "İstek Zaman Aşımı",
|
||||||
"timeoutDescription": "MCP sunucusuna yapılan istekler için zaman aşımı (ms)",
|
"timeoutDescription": "MCP sunucusuna yapılan istekler için zaman aşımı (ms)",
|
||||||
@@ -208,6 +212,7 @@
|
|||||||
"serverAdd": "Sunucu eklenemedi. Lütfen sunucu durumunu kontrol edin",
|
"serverAdd": "Sunucu eklenemedi. Lütfen sunucu durumunu kontrol edin",
|
||||||
"serverUpdate": "{{serverName}} sunucusu düzenlenemedi. Lütfen sunucu durumunu kontrol edin",
|
"serverUpdate": "{{serverName}} sunucusu düzenlenemedi. Lütfen sunucu durumunu kontrol edin",
|
||||||
"serverFetch": "Sunucu verileri alınamadı. Lütfen daha sonra tekrar deneyin",
|
"serverFetch": "Sunucu verileri alınamadı. Lütfen daha sonra tekrar deneyin",
|
||||||
|
"failedToReloadServer": "Sunucu yeniden yüklenemedi",
|
||||||
"initialStartup": "Sunucu başlatılıyor olabilir. İlk başlatmada bu işlem biraz zaman alabileceğinden lütfen bekleyin...",
|
"initialStartup": "Sunucu başlatılıyor olabilir. İlk başlatmada bu işlem biraz zaman alabileceğinden lütfen bekleyin...",
|
||||||
"serverInstall": "Sunucu yüklenemedi",
|
"serverInstall": "Sunucu yüklenemedi",
|
||||||
"failedToFetchSettings": "Ayarlar getirilemedi",
|
"failedToFetchSettings": "Ayarlar getirilemedi",
|
||||||
@@ -250,7 +255,11 @@
|
|||||||
"type": "Tür",
|
"type": "Tür",
|
||||||
"repeated": "Tekrarlanan",
|
"repeated": "Tekrarlanan",
|
||||||
"valueHint": "Değer İpucu",
|
"valueHint": "Değer İpucu",
|
||||||
"choices": "Seçenekler"
|
"choices": "Seçenekler",
|
||||||
|
"actions": "Eylemler",
|
||||||
|
"saving": "Kaydediliyor...",
|
||||||
|
"active": "Aktif",
|
||||||
|
"inactive": "Pasif"
|
||||||
},
|
},
|
||||||
"nav": {
|
"nav": {
|
||||||
"dashboard": "Kontrol Paneli",
|
"dashboard": "Kontrol Paneli",
|
||||||
@@ -536,7 +545,9 @@
|
|||||||
"description": "Açıklama",
|
"description": "Açıklama",
|
||||||
"messages": "Mesajlar",
|
"messages": "Mesajlar",
|
||||||
"noDescription": "Kullanılabilir açıklama yok",
|
"noDescription": "Kullanılabilir açıklama yok",
|
||||||
"runPromptWithName": "İsteği Getir: {{name}}"
|
"runPromptWithName": "İsteği Getir: {{name}}",
|
||||||
|
"descriptionUpdateSuccess": "İstek açıklaması başarıyla güncellendi",
|
||||||
|
"descriptionUpdateFailed": "İstek açıklaması güncellenemedi"
|
||||||
},
|
},
|
||||||
"settings": {
|
"settings": {
|
||||||
"enableGlobalRoute": "Global Yönlendirmeyi Etkinleştir",
|
"enableGlobalRoute": "Global Yönlendirmeyi Etkinleştir",
|
||||||
@@ -548,6 +559,28 @@
|
|||||||
"bearerAuthKey": "Bearer Kimlik Doğrulama Anahtarı",
|
"bearerAuthKey": "Bearer Kimlik Doğrulama Anahtarı",
|
||||||
"bearerAuthKeyDescription": "Bearer token'da gerekli olacak kimlik doğrulama anahtarı",
|
"bearerAuthKeyDescription": "Bearer token'da gerekli olacak kimlik doğrulama anahtarı",
|
||||||
"bearerAuthKeyPlaceholder": "Bearer kimlik doğrulama anahtarını girin",
|
"bearerAuthKeyPlaceholder": "Bearer kimlik doğrulama anahtarını girin",
|
||||||
|
"bearerKeysSectionTitle": "Anahtarlar",
|
||||||
|
"bearerKeysSectionDescription": "Farklı erişim kapsamlarına sahip birden fazla anahtarı yönetin.",
|
||||||
|
"noBearerKeys": "Henüz yapılandırılmış herhangi bir anahtar yok.",
|
||||||
|
"bearerKeyName": "Ad",
|
||||||
|
"bearerKeyToken": "Token",
|
||||||
|
"bearerKeyEnabled": "Etkin",
|
||||||
|
"bearerKeyAccessType": "Erişim kapsamı",
|
||||||
|
"bearerKeyAccessAll": "Tümü",
|
||||||
|
"bearerKeyAccessGroups": "Gruplar",
|
||||||
|
"bearerKeyAccessServers": "Sunucular",
|
||||||
|
"bearerKeyAccessCustom": "Özel",
|
||||||
|
"bearerKeyAllowedGroups": "İzin verilen gruplar",
|
||||||
|
"bearerKeyAllowedServers": "İzin verilen sunucular",
|
||||||
|
"addBearerKey": "Anahtar ekle",
|
||||||
|
"addBearerKeyButton": "Oluştur",
|
||||||
|
"bearerKeyRequired": "Ad ve token zorunludur",
|
||||||
|
"deleteBearerKeyConfirm": "Bu anahtarı silmek istediğinizden emin misiniz?",
|
||||||
|
"generate": "Oluştur",
|
||||||
|
"selectGroups": "Grupları Seç",
|
||||||
|
"selectServers": "Sunucuları Seç",
|
||||||
|
"selectAtLeastOneGroup": "Lütfen en az bir grup seçin",
|
||||||
|
"selectAtLeastOneServer": "Lütfen en az bir sunucu seçin",
|
||||||
"skipAuth": "Kimlik Doğrulamayı Atla",
|
"skipAuth": "Kimlik Doğrulamayı Atla",
|
||||||
"skipAuthDescription": "Arayüz ve API erişimi için giriş gereksinimini atla (Güvenlik için VARSAYILAN KAPALI)",
|
"skipAuthDescription": "Arayüz ve API erişimi için giriş gereksinimini atla (Güvenlik için VARSAYILAN KAPALI)",
|
||||||
"pythonIndexUrl": "Python Paket Deposu URL'si",
|
"pythonIndexUrl": "Python Paket Deposu URL'si",
|
||||||
@@ -667,6 +700,22 @@
|
|||||||
"importFailed": "Sunucular içe aktarılamadı",
|
"importFailed": "Sunucular içe aktarılamadı",
|
||||||
"partialSuccess": "{{total}} sunucudan {{count}} tanesi başarıyla içe aktarıldı. Bazı sunucular başarısız oldu:"
|
"partialSuccess": "{{total}} sunucudan {{count}} tanesi başarıyla içe aktarıldı. Bazı sunucular başarısız oldu:"
|
||||||
},
|
},
|
||||||
|
"groupImport": {
|
||||||
|
"button": "İçe Aktar",
|
||||||
|
"title": "JSON'dan Grupları İçe Aktar",
|
||||||
|
"inputLabel": "Grup Yapılandırma JSON",
|
||||||
|
"inputHelp": "Grup yapılandırma JSON'unuzu yapıştırın. Her grup bir sunucu listesi içerebilir.",
|
||||||
|
"preview": "Önizle",
|
||||||
|
"previewTitle": "İçe Aktarılacak Grupları Önizle",
|
||||||
|
"import": "İçe Aktar",
|
||||||
|
"importing": "İçe aktarılıyor...",
|
||||||
|
"invalidFormat": "Geçersiz JSON formatı. JSON bir 'groups' dizisi içermelidir.",
|
||||||
|
"missingName": "Her grubun bir 'name' alanı olmalıdır.",
|
||||||
|
"parseError": "JSON ayrıştırılamadı. Lütfen formatı kontrol edip tekrar deneyin.",
|
||||||
|
"addFailed": "Grup eklenemedi",
|
||||||
|
"importFailed": "Gruplar içe aktarılamadı",
|
||||||
|
"partialSuccess": "{{total}} gruptan {{count}} tanesi başarıyla içe aktarıldı. Bazı gruplar başarısız oldu:"
|
||||||
|
},
|
||||||
"users": {
|
"users": {
|
||||||
"add": "Kullanıcı Ekle",
|
"add": "Kullanıcı Ekle",
|
||||||
"addNew": "Yeni Kullanıcı Ekle",
|
"addNew": "Yeni Kullanıcı Ekle",
|
||||||
|
|||||||
@@ -61,6 +61,7 @@
|
|||||||
"emptyFields": "用户名和密码不能为空",
|
"emptyFields": "用户名和密码不能为空",
|
||||||
"loginFailed": "登录失败,请检查用户名和密码",
|
"loginFailed": "登录失败,请检查用户名和密码",
|
||||||
"loginError": "登录过程中出现错误",
|
"loginError": "登录过程中出现错误",
|
||||||
|
"serverUnavailable": "无法连接到服务器,请检查网络连接或稍后再试",
|
||||||
"currentPassword": "当前密码",
|
"currentPassword": "当前密码",
|
||||||
"newPassword": "新密码",
|
"newPassword": "新密码",
|
||||||
"confirmPassword": "确认密码",
|
"confirmPassword": "确认密码",
|
||||||
@@ -116,6 +117,9 @@
|
|||||||
"enabled": "已启用",
|
"enabled": "已启用",
|
||||||
"enable": "启用",
|
"enable": "启用",
|
||||||
"disable": "禁用",
|
"disable": "禁用",
|
||||||
|
"reload": "重载",
|
||||||
|
"reloadSuccess": "服务器重载成功",
|
||||||
|
"reloadError": "重载服务器 {{serverName}} 失败",
|
||||||
"requestOptions": "连接配置",
|
"requestOptions": "连接配置",
|
||||||
"timeout": "请求超时",
|
"timeout": "请求超时",
|
||||||
"timeoutDescription": "请求超时时间(毫秒)",
|
"timeoutDescription": "请求超时时间(毫秒)",
|
||||||
@@ -208,6 +212,7 @@
|
|||||||
"serverAdd": "添加服务器失败,请检查服务器状态",
|
"serverAdd": "添加服务器失败,请检查服务器状态",
|
||||||
"serverUpdate": "编辑服务器 {{serverName}} 失败,请检查服务器状态",
|
"serverUpdate": "编辑服务器 {{serverName}} 失败,请检查服务器状态",
|
||||||
"serverFetch": "获取服务器数据失败,请稍后重试",
|
"serverFetch": "获取服务器数据失败,请稍后重试",
|
||||||
|
"failedToReloadServer": "重载服务器失败",
|
||||||
"initialStartup": "服务器可能正在启动中。首次启动可能需要一些时间,请耐心等候...",
|
"initialStartup": "服务器可能正在启动中。首次启动可能需要一些时间,请耐心等候...",
|
||||||
"serverInstall": "安装服务器失败",
|
"serverInstall": "安装服务器失败",
|
||||||
"failedToFetchSettings": "获取设置失败",
|
"failedToFetchSettings": "获取设置失败",
|
||||||
@@ -251,7 +256,11 @@
|
|||||||
"type": "类型",
|
"type": "类型",
|
||||||
"repeated": "可重复",
|
"repeated": "可重复",
|
||||||
"valueHint": "值提示",
|
"valueHint": "值提示",
|
||||||
"choices": "可选值"
|
"choices": "可选值",
|
||||||
|
"actions": "操作",
|
||||||
|
"saving": "保存中...",
|
||||||
|
"active": "已激活",
|
||||||
|
"inactive": "未激活"
|
||||||
},
|
},
|
||||||
"nav": {
|
"nav": {
|
||||||
"dashboard": "仪表盘",
|
"dashboard": "仪表盘",
|
||||||
@@ -285,7 +294,7 @@
|
|||||||
"routeConfig": "安全配置",
|
"routeConfig": "安全配置",
|
||||||
"installConfig": "安装",
|
"installConfig": "安装",
|
||||||
"smartRouting": "智能路由",
|
"smartRouting": "智能路由",
|
||||||
"oauthServer": "OAuth 服务器"
|
"oauthServer": "OAuth"
|
||||||
},
|
},
|
||||||
"groups": {
|
"groups": {
|
||||||
"title": "分组管理"
|
"title": "分组管理"
|
||||||
@@ -537,7 +546,9 @@
|
|||||||
"description": "描述",
|
"description": "描述",
|
||||||
"messages": "消息",
|
"messages": "消息",
|
||||||
"noDescription": "无描述信息",
|
"noDescription": "无描述信息",
|
||||||
"runPromptWithName": "获取提示词: {{name}}"
|
"runPromptWithName": "获取提示词: {{name}}",
|
||||||
|
"descriptionUpdateSuccess": "提示词描述更新成功",
|
||||||
|
"descriptionUpdateFailed": "更新提示词描述失败"
|
||||||
},
|
},
|
||||||
"settings": {
|
"settings": {
|
||||||
"enableGlobalRoute": "启用全局路由",
|
"enableGlobalRoute": "启用全局路由",
|
||||||
@@ -549,6 +560,28 @@
|
|||||||
"bearerAuthKey": "Bearer 认证密钥",
|
"bearerAuthKey": "Bearer 认证密钥",
|
||||||
"bearerAuthKeyDescription": "Bearer 令牌中需要携带的认证密钥",
|
"bearerAuthKeyDescription": "Bearer 令牌中需要携带的认证密钥",
|
||||||
"bearerAuthKeyPlaceholder": "请输入 Bearer 认证密钥",
|
"bearerAuthKeyPlaceholder": "请输入 Bearer 认证密钥",
|
||||||
|
"bearerKeysSectionTitle": "密钥",
|
||||||
|
"bearerKeysSectionDescription": "管理多条密钥,并为不同密钥配置不同的访问范围。",
|
||||||
|
"noBearerKeys": "当前还没有配置任何密钥。",
|
||||||
|
"bearerKeyName": "名称",
|
||||||
|
"bearerKeyToken": "密钥值",
|
||||||
|
"bearerKeyEnabled": "启用",
|
||||||
|
"bearerKeyAccessType": "访问范围",
|
||||||
|
"bearerKeyAccessAll": "全部",
|
||||||
|
"bearerKeyAccessGroups": "指定分组",
|
||||||
|
"bearerKeyAccessServers": "指定服务器",
|
||||||
|
"bearerKeyAccessCustom": "自定义",
|
||||||
|
"bearerKeyAllowedGroups": "允许访问的分组",
|
||||||
|
"bearerKeyAllowedServers": "允许访问的服务器",
|
||||||
|
"addBearerKey": "新增密钥",
|
||||||
|
"addBearerKeyButton": "创建",
|
||||||
|
"bearerKeyRequired": "名称和密钥值为必填项",
|
||||||
|
"deleteBearerKeyConfirm": "确定要删除这条密钥吗?",
|
||||||
|
"generate": "生成",
|
||||||
|
"selectGroups": "选择分组",
|
||||||
|
"selectServers": "选择服务器",
|
||||||
|
"selectAtLeastOneGroup": "请至少选择一个分组",
|
||||||
|
"selectAtLeastOneServer": "请至少选择一个服务",
|
||||||
"skipAuth": "免登录开关",
|
"skipAuth": "免登录开关",
|
||||||
"skipAuthDescription": "跳过前端和 API 访问的登录要求(默认关闭确保安全性)",
|
"skipAuthDescription": "跳过前端和 API 访问的登录要求(默认关闭确保安全性)",
|
||||||
"pythonIndexUrl": "Python 包仓库地址",
|
"pythonIndexUrl": "Python 包仓库地址",
|
||||||
@@ -669,6 +702,22 @@
|
|||||||
"importFailed": "导入服务器失败",
|
"importFailed": "导入服务器失败",
|
||||||
"partialSuccess": "成功导入 {{count}} / {{total}} 个服务器。部分服务器失败:"
|
"partialSuccess": "成功导入 {{count}} / {{total}} 个服务器。部分服务器失败:"
|
||||||
},
|
},
|
||||||
|
"groupImport": {
|
||||||
|
"button": "导入",
|
||||||
|
"title": "从 JSON 导入分组",
|
||||||
|
"inputLabel": "分组配置 JSON",
|
||||||
|
"inputHelp": "粘贴您的分组配置 JSON。每个分组可以包含一个服务器列表。",
|
||||||
|
"preview": "预览",
|
||||||
|
"previewTitle": "预览要导入的分组",
|
||||||
|
"import": "导入",
|
||||||
|
"importing": "导入中...",
|
||||||
|
"invalidFormat": "无效的 JSON 格式。JSON 必须包含 'groups' 数组。",
|
||||||
|
"missingName": "每个分组必须有 'name' 字段。",
|
||||||
|
"parseError": "解析 JSON 失败。请检查格式后重试。",
|
||||||
|
"addFailed": "添加分组失败",
|
||||||
|
"importFailed": "导入分组失败",
|
||||||
|
"partialSuccess": "成功导入 {{count}} / {{total}} 个分组。部分分组失败:"
|
||||||
|
},
|
||||||
"users": {
|
"users": {
|
||||||
"add": "添加",
|
"add": "添加",
|
||||||
"addNew": "添加新用户",
|
"addNew": "添加新用户",
|
||||||
|
|||||||
@@ -63,5 +63,6 @@
|
|||||||
"requiresAuthentication": false
|
"requiresAuthentication": false
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
},
|
||||||
|
"bearerKeys": []
|
||||||
}
|
}
|
||||||
14
package.json
14
package.json
@@ -60,7 +60,7 @@
|
|||||||
"dotenv": "^16.6.1",
|
"dotenv": "^16.6.1",
|
||||||
"dotenv-expand": "^12.0.2",
|
"dotenv-expand": "^12.0.2",
|
||||||
"express": "^4.21.2",
|
"express": "^4.21.2",
|
||||||
"express-validator": "^7.2.1",
|
"express-validator": "^7.3.1",
|
||||||
"i18next": "^25.5.0",
|
"i18next": "^25.5.0",
|
||||||
"i18next-fs-backend": "^2.6.0",
|
"i18next-fs-backend": "^2.6.0",
|
||||||
"jsonwebtoken": "^9.0.2",
|
"jsonwebtoken": "^9.0.2",
|
||||||
@@ -73,6 +73,7 @@
|
|||||||
"postgres": "^3.4.7",
|
"postgres": "^3.4.7",
|
||||||
"reflect-metadata": "^0.2.2",
|
"reflect-metadata": "^0.2.2",
|
||||||
"typeorm": "^0.3.26",
|
"typeorm": "^0.3.26",
|
||||||
|
"undici": "^7.16.0",
|
||||||
"uuid": "^11.1.0"
|
"uuid": "^11.1.0"
|
||||||
},
|
},
|
||||||
"devDependencies": {
|
"devDependencies": {
|
||||||
@@ -110,8 +111,8 @@
|
|||||||
"next": "^15.5.0",
|
"next": "^15.5.0",
|
||||||
"postcss": "^8.5.6",
|
"postcss": "^8.5.6",
|
||||||
"prettier": "^3.6.2",
|
"prettier": "^3.6.2",
|
||||||
"react": "19.1.1",
|
"react": "19.2.1",
|
||||||
"react-dom": "19.1.1",
|
"react-dom": "19.2.1",
|
||||||
"react-i18next": "^15.7.2",
|
"react-i18next": "^15.7.2",
|
||||||
"react-router-dom": "^7.8.2",
|
"react-router-dom": "^7.8.2",
|
||||||
"supertest": "^7.1.4",
|
"supertest": "^7.1.4",
|
||||||
@@ -132,7 +133,10 @@
|
|||||||
"pnpm": {
|
"pnpm": {
|
||||||
"overrides": {
|
"overrides": {
|
||||||
"brace-expansion@1.1.11": "1.1.12",
|
"brace-expansion@1.1.11": "1.1.12",
|
||||||
"brace-expansion@2.0.1": "2.0.2"
|
"brace-expansion@2.0.1": "2.0.2",
|
||||||
|
"glob@10.4.5": "10.5.0",
|
||||||
|
"js-yaml": "4.1.1",
|
||||||
|
"jws@3.2.2": "4.0.1"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
1690
pnpm-lock.yaml
generated
1690
pnpm-lock.yaml
generated
File diff suppressed because it is too large
Load Diff
169
src/controllers/bearerKeyController.ts
Normal file
169
src/controllers/bearerKeyController.ts
Normal file
@@ -0,0 +1,169 @@
|
|||||||
|
import { Request, Response } from 'express';
|
||||||
|
import { ApiResponse, BearerKey } from '../types/index.js';
|
||||||
|
import { getBearerKeyDao, getSystemConfigDao } from '../dao/index.js';
|
||||||
|
|
||||||
|
const requireAdmin = async (req: Request, res: Response): Promise<boolean> => {
|
||||||
|
const systemConfigDao = getSystemConfigDao();
|
||||||
|
const systemConfig = await systemConfigDao.get();
|
||||||
|
if (systemConfig?.routing?.skipAuth) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
const user = (req as any).user;
|
||||||
|
if (!user || !user.isAdmin) {
|
||||||
|
res.status(403).json({
|
||||||
|
success: false,
|
||||||
|
message: 'Admin privileges required',
|
||||||
|
});
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
return true;
|
||||||
|
};
|
||||||
|
|
||||||
|
export const getBearerKeys = async (req: Request, res: Response): Promise<void> => {
|
||||||
|
if (!(await requireAdmin(req, res))) return;
|
||||||
|
|
||||||
|
try {
|
||||||
|
const dao = getBearerKeyDao();
|
||||||
|
const keys = await dao.findAll();
|
||||||
|
const response: ApiResponse = {
|
||||||
|
success: true,
|
||||||
|
data: keys,
|
||||||
|
};
|
||||||
|
res.json(response);
|
||||||
|
} catch (error) {
|
||||||
|
console.error('Failed to get bearer keys:', error);
|
||||||
|
res.status(500).json({
|
||||||
|
success: false,
|
||||||
|
message: 'Failed to get bearer keys',
|
||||||
|
});
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
export const createBearerKey = async (req: Request, res: Response): Promise<void> => {
|
||||||
|
if (!(await requireAdmin(req, res))) return;
|
||||||
|
|
||||||
|
try {
|
||||||
|
const { name, token, enabled, accessType, allowedGroups, allowedServers } =
|
||||||
|
req.body as Partial<BearerKey>;
|
||||||
|
|
||||||
|
if (!name || typeof name !== 'string') {
|
||||||
|
res.status(400).json({ success: false, message: 'Key name is required' });
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!token || typeof token !== 'string') {
|
||||||
|
res.status(400).json({ success: false, message: 'Token value is required' });
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!accessType || !['all', 'groups', 'servers', 'custom'].includes(accessType)) {
|
||||||
|
res.status(400).json({ success: false, message: 'Invalid accessType' });
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
const dao = getBearerKeyDao();
|
||||||
|
const key = await dao.create({
|
||||||
|
name,
|
||||||
|
token,
|
||||||
|
enabled: enabled ?? true,
|
||||||
|
accessType,
|
||||||
|
allowedGroups: Array.isArray(allowedGroups) ? allowedGroups : [],
|
||||||
|
allowedServers: Array.isArray(allowedServers) ? allowedServers : [],
|
||||||
|
});
|
||||||
|
|
||||||
|
const response: ApiResponse = {
|
||||||
|
success: true,
|
||||||
|
data: key,
|
||||||
|
};
|
||||||
|
res.status(201).json(response);
|
||||||
|
} catch (error) {
|
||||||
|
console.error('Failed to create bearer key:', error);
|
||||||
|
res.status(500).json({
|
||||||
|
success: false,
|
||||||
|
message: 'Failed to create bearer key',
|
||||||
|
});
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
export const updateBearerKey = async (req: Request, res: Response): Promise<void> => {
|
||||||
|
if (!(await requireAdmin(req, res))) return;
|
||||||
|
|
||||||
|
try {
|
||||||
|
const { id } = req.params;
|
||||||
|
if (!id) {
|
||||||
|
res.status(400).json({ success: false, message: 'Key id is required' });
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
const { name, token, enabled, accessType, allowedGroups, allowedServers } =
|
||||||
|
req.body as Partial<BearerKey>;
|
||||||
|
|
||||||
|
const updates: Partial<BearerKey> = {};
|
||||||
|
if (name !== undefined) updates.name = name;
|
||||||
|
if (token !== undefined) updates.token = token;
|
||||||
|
if (enabled !== undefined) updates.enabled = enabled;
|
||||||
|
if (accessType !== undefined) {
|
||||||
|
if (!['all', 'groups', 'servers', 'custom'].includes(accessType)) {
|
||||||
|
res.status(400).json({ success: false, message: 'Invalid accessType' });
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
updates.accessType = accessType as BearerKey['accessType'];
|
||||||
|
}
|
||||||
|
if (allowedGroups !== undefined) {
|
||||||
|
updates.allowedGroups = Array.isArray(allowedGroups) ? allowedGroups : [];
|
||||||
|
}
|
||||||
|
if (allowedServers !== undefined) {
|
||||||
|
updates.allowedServers = Array.isArray(allowedServers) ? allowedServers : [];
|
||||||
|
}
|
||||||
|
|
||||||
|
const dao = getBearerKeyDao();
|
||||||
|
const updated = await dao.update(id, updates);
|
||||||
|
if (!updated) {
|
||||||
|
res.status(404).json({ success: false, message: 'Bearer key not found' });
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
const response: ApiResponse = {
|
||||||
|
success: true,
|
||||||
|
data: updated,
|
||||||
|
};
|
||||||
|
res.json(response);
|
||||||
|
} catch (error) {
|
||||||
|
console.error('Failed to update bearer key:', error);
|
||||||
|
res.status(500).json({
|
||||||
|
success: false,
|
||||||
|
message: 'Failed to update bearer key',
|
||||||
|
});
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
export const deleteBearerKey = async (req: Request, res: Response): Promise<void> => {
|
||||||
|
if (!(await requireAdmin(req, res))) return;
|
||||||
|
|
||||||
|
try {
|
||||||
|
const { id } = req.params;
|
||||||
|
if (!id) {
|
||||||
|
res.status(400).json({ success: false, message: 'Key id is required' });
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
const dao = getBearerKeyDao();
|
||||||
|
const deleted = await dao.delete(id);
|
||||||
|
if (!deleted) {
|
||||||
|
res.status(404).json({ success: false, message: 'Bearer key not found' });
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
const response: ApiResponse = {
|
||||||
|
success: true,
|
||||||
|
};
|
||||||
|
res.json(response);
|
||||||
|
} catch (error) {
|
||||||
|
console.error('Failed to delete bearer key:', error);
|
||||||
|
res.status(500).json({
|
||||||
|
success: false,
|
||||||
|
message: 'Failed to delete bearer key',
|
||||||
|
});
|
||||||
|
}
|
||||||
|
};
|
||||||
@@ -1,9 +1,19 @@
|
|||||||
import { Request, Response } from 'express';
|
import { Request, Response } from 'express';
|
||||||
import config from '../config/index.js';
|
import config from '../config/index.js';
|
||||||
import { loadSettings, loadOriginalSettings } from '../config/index.js';
|
import { loadSettings } from '../config/index.js';
|
||||||
import { getDataService } from '../services/services.js';
|
import { getDataService } from '../services/services.js';
|
||||||
import { DataService } from '../services/dataService.js';
|
import { DataService } from '../services/dataService.js';
|
||||||
import { IUser } from '../types/index.js';
|
import { IUser } from '../types/index.js';
|
||||||
|
import {
|
||||||
|
getGroupDao,
|
||||||
|
getOAuthClientDao,
|
||||||
|
getOAuthTokenDao,
|
||||||
|
getServerDao,
|
||||||
|
getSystemConfigDao,
|
||||||
|
getUserConfigDao,
|
||||||
|
getUserDao,
|
||||||
|
getBearerKeyDao,
|
||||||
|
} from '../dao/DaoFactory.js';
|
||||||
|
|
||||||
const dataService: DataService = getDataService();
|
const dataService: DataService = getDataService();
|
||||||
|
|
||||||
@@ -73,17 +83,39 @@ export const getPublicConfig = (req: Request, res: Response): void => {
|
|||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Recursively remove null values from an object
|
||||||
|
*/
|
||||||
|
const removeNullValues = <T>(obj: T): T => {
|
||||||
|
if (obj === null || obj === undefined) {
|
||||||
|
return obj;
|
||||||
|
}
|
||||||
|
if (Array.isArray(obj)) {
|
||||||
|
return obj.map((item) => removeNullValues(item)) as T;
|
||||||
|
}
|
||||||
|
if (typeof obj === 'object') {
|
||||||
|
const result: Record<string, unknown> = {};
|
||||||
|
for (const [key, value] of Object.entries(obj)) {
|
||||||
|
if (value !== null) {
|
||||||
|
result[key] = removeNullValues(value);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return result as T;
|
||||||
|
}
|
||||||
|
return obj;
|
||||||
|
};
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Get MCP settings in JSON format for export/copy
|
* Get MCP settings in JSON format for export/copy
|
||||||
* Supports both full settings and individual server configuration
|
* Supports both full settings and individual server configuration
|
||||||
*/
|
*/
|
||||||
export const getMcpSettingsJson = (req: Request, res: Response): void => {
|
export const getMcpSettingsJson = async (req: Request, res: Response): Promise<void> => {
|
||||||
try {
|
try {
|
||||||
const { serverName } = req.query;
|
const { serverName } = req.query;
|
||||||
const settings = loadOriginalSettings();
|
|
||||||
if (serverName && typeof serverName === 'string') {
|
if (serverName && typeof serverName === 'string') {
|
||||||
// Return individual server configuration
|
// Return individual server configuration using DAO
|
||||||
const serverConfig = settings.mcpServers[serverName];
|
const serverDao = getServerDao();
|
||||||
|
const serverConfig = await serverDao.findById(serverName);
|
||||||
if (!serverConfig) {
|
if (!serverConfig) {
|
||||||
res.status(404).json({
|
res.status(404).json({
|
||||||
success: false,
|
success: false,
|
||||||
@@ -92,16 +124,56 @@ export const getMcpSettingsJson = (req: Request, res: Response): void => {
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Remove the 'name' field from config as it's used as the key
|
||||||
|
const { name, ...configWithoutName } = serverConfig;
|
||||||
|
// Remove null values from the config
|
||||||
|
const cleanedConfig = removeNullValues(configWithoutName);
|
||||||
res.json({
|
res.json({
|
||||||
success: true,
|
success: true,
|
||||||
data: {
|
data: {
|
||||||
mcpServers: {
|
mcpServers: {
|
||||||
[serverName]: serverConfig,
|
[name]: cleanedConfig,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
});
|
});
|
||||||
} else {
|
} else {
|
||||||
// Return full settings
|
// Return full settings via DAO layer (supports both file and database modes)
|
||||||
|
const [
|
||||||
|
servers,
|
||||||
|
users,
|
||||||
|
groups,
|
||||||
|
systemConfig,
|
||||||
|
userConfigs,
|
||||||
|
oauthClients,
|
||||||
|
oauthTokens,
|
||||||
|
bearerKeys,
|
||||||
|
] = await Promise.all([
|
||||||
|
getServerDao().findAll(),
|
||||||
|
getUserDao().findAll(),
|
||||||
|
getGroupDao().findAll(),
|
||||||
|
getSystemConfigDao().get(),
|
||||||
|
getUserConfigDao().getAll(),
|
||||||
|
getOAuthClientDao().findAll(),
|
||||||
|
getOAuthTokenDao().findAll(),
|
||||||
|
getBearerKeyDao().findAll(),
|
||||||
|
]);
|
||||||
|
|
||||||
|
const mcpServers: Record<string, any> = {};
|
||||||
|
for (const { name: serverConfigName, ...config } of servers) {
|
||||||
|
mcpServers[serverConfigName] = removeNullValues(config);
|
||||||
|
}
|
||||||
|
|
||||||
|
const settings = {
|
||||||
|
mcpServers,
|
||||||
|
users,
|
||||||
|
groups,
|
||||||
|
systemConfig,
|
||||||
|
userConfigs,
|
||||||
|
oauthClients,
|
||||||
|
oauthTokens,
|
||||||
|
bearerKeys,
|
||||||
|
};
|
||||||
|
|
||||||
res.json({
|
res.json({
|
||||||
success: true,
|
success: true,
|
||||||
data: settings,
|
data: settings,
|
||||||
|
|||||||
@@ -1,5 +1,11 @@
|
|||||||
import { Request, Response } from 'express';
|
import { Request, Response } from 'express';
|
||||||
import { ApiResponse } from '../types/index.js';
|
import {
|
||||||
|
ApiResponse,
|
||||||
|
AddGroupRequest,
|
||||||
|
BatchCreateGroupsRequest,
|
||||||
|
BatchCreateGroupsResponse,
|
||||||
|
BatchGroupResult,
|
||||||
|
} from '../types/index.js';
|
||||||
import {
|
import {
|
||||||
getAllGroups,
|
getAllGroups,
|
||||||
getGroupByIdOrName,
|
getGroupByIdOrName,
|
||||||
@@ -106,6 +112,143 @@ export const createNewGroup = async (req: Request, res: Response): Promise<void>
|
|||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
|
// Batch create groups - validates and creates multiple groups in one request
|
||||||
|
export const batchCreateGroups = async (req: Request, res: Response): Promise<void> => {
|
||||||
|
try {
|
||||||
|
const { groups } = req.body as BatchCreateGroupsRequest;
|
||||||
|
|
||||||
|
// Validate request body
|
||||||
|
if (!groups || !Array.isArray(groups)) {
|
||||||
|
res.status(400).json({
|
||||||
|
success: false,
|
||||||
|
message: 'Request body must contain a "groups" array',
|
||||||
|
});
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (groups.length === 0) {
|
||||||
|
res.status(400).json({
|
||||||
|
success: false,
|
||||||
|
message: 'Groups array cannot be empty',
|
||||||
|
});
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Helper function to validate a single group configuration
|
||||||
|
const validateGroupConfig = (group: AddGroupRequest): { valid: boolean; message?: string } => {
|
||||||
|
if (!group.name || typeof group.name !== 'string') {
|
||||||
|
return { valid: false, message: 'Group name is required and must be a string' };
|
||||||
|
}
|
||||||
|
|
||||||
|
if (group.description !== undefined && typeof group.description !== 'string') {
|
||||||
|
return { valid: false, message: 'Group description must be a string' };
|
||||||
|
}
|
||||||
|
|
||||||
|
if (group.servers !== undefined && !Array.isArray(group.servers)) {
|
||||||
|
return { valid: false, message: 'Group servers must be an array' };
|
||||||
|
}
|
||||||
|
|
||||||
|
// Validate server configurations if provided in new format
|
||||||
|
if (group.servers) {
|
||||||
|
for (const server of group.servers) {
|
||||||
|
if (typeof server === 'object' && server !== null) {
|
||||||
|
if (!server.name || typeof server.name !== 'string') {
|
||||||
|
return {
|
||||||
|
valid: false,
|
||||||
|
message: 'Server configuration must have a name property',
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
if (
|
||||||
|
server.tools !== undefined &&
|
||||||
|
server.tools !== 'all' &&
|
||||||
|
!Array.isArray(server.tools)
|
||||||
|
) {
|
||||||
|
return {
|
||||||
|
valid: false,
|
||||||
|
message: 'Server tools must be "all" or an array of tool names',
|
||||||
|
};
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return { valid: true };
|
||||||
|
};
|
||||||
|
|
||||||
|
// Process each group
|
||||||
|
const results: BatchGroupResult[] = [];
|
||||||
|
let successCount = 0;
|
||||||
|
let failureCount = 0;
|
||||||
|
|
||||||
|
// Get current user for owner field
|
||||||
|
const currentUser = (req as any).user;
|
||||||
|
const defaultOwner = currentUser?.username || 'admin';
|
||||||
|
|
||||||
|
for (const groupData of groups) {
|
||||||
|
const { name, description, servers } = groupData;
|
||||||
|
|
||||||
|
// Validate group configuration
|
||||||
|
const validation = validateGroupConfig(groupData);
|
||||||
|
if (!validation.valid) {
|
||||||
|
results.push({
|
||||||
|
name: name || 'unknown',
|
||||||
|
success: false,
|
||||||
|
message: validation.message,
|
||||||
|
});
|
||||||
|
failureCount++;
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
const serverList = Array.isArray(servers) ? servers : [];
|
||||||
|
const newGroup = await createGroup(name, description, serverList, defaultOwner);
|
||||||
|
|
||||||
|
if (newGroup) {
|
||||||
|
results.push({
|
||||||
|
name,
|
||||||
|
success: true,
|
||||||
|
message: 'Group created successfully',
|
||||||
|
});
|
||||||
|
successCount++;
|
||||||
|
} else {
|
||||||
|
results.push({
|
||||||
|
name,
|
||||||
|
success: false,
|
||||||
|
message: 'Failed to create group or group name already exists',
|
||||||
|
});
|
||||||
|
failureCount++;
|
||||||
|
}
|
||||||
|
} catch (error) {
|
||||||
|
results.push({
|
||||||
|
name,
|
||||||
|
success: false,
|
||||||
|
message: error instanceof Error ? error.message : 'Failed to create group',
|
||||||
|
});
|
||||||
|
failureCount++;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Return response
|
||||||
|
const response: BatchCreateGroupsResponse = {
|
||||||
|
success: successCount > 0,
|
||||||
|
successCount,
|
||||||
|
failureCount,
|
||||||
|
results,
|
||||||
|
};
|
||||||
|
|
||||||
|
// Use 207 Multi-Status if there were partial failures, 200 if all succeeded
|
||||||
|
const statusCode = failureCount > 0 && successCount > 0 ? 207 : successCount > 0 ? 200 : 400;
|
||||||
|
res.status(statusCode).json(response);
|
||||||
|
} catch (error) {
|
||||||
|
console.error('Batch create groups error:', error);
|
||||||
|
res.status(500).json({
|
||||||
|
success: false,
|
||||||
|
message: 'Internal server error',
|
||||||
|
});
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
// Update an existing group
|
// Update an existing group
|
||||||
export const updateExistingGroup = async (req: Request, res: Response): Promise<void> => {
|
export const updateExistingGroup = async (req: Request, res: Response): Promise<void> => {
|
||||||
try {
|
try {
|
||||||
|
|||||||
@@ -14,10 +14,10 @@ import { IOAuthClient } from '../types/index.js';
|
|||||||
* GET /api/oauth/clients
|
* GET /api/oauth/clients
|
||||||
* Get all OAuth clients
|
* Get all OAuth clients
|
||||||
*/
|
*/
|
||||||
export const getAllClients = (req: Request, res: Response): void => {
|
export const getAllClients = async (req: Request, res: Response): Promise<void> => {
|
||||||
try {
|
try {
|
||||||
const clients = getOAuthClients();
|
const clients = await getOAuthClients();
|
||||||
|
|
||||||
// Don't expose client secrets in the list
|
// Don't expose client secrets in the list
|
||||||
const sanitizedClients = clients.map((client) => ({
|
const sanitizedClients = clients.map((client) => ({
|
||||||
clientId: client.clientId,
|
clientId: client.clientId,
|
||||||
@@ -45,10 +45,10 @@ export const getAllClients = (req: Request, res: Response): void => {
|
|||||||
* GET /api/oauth/clients/:clientId
|
* GET /api/oauth/clients/:clientId
|
||||||
* Get a specific OAuth client
|
* Get a specific OAuth client
|
||||||
*/
|
*/
|
||||||
export const getClient = (req: Request, res: Response): void => {
|
export const getClient = async (req: Request, res: Response): Promise<void> => {
|
||||||
try {
|
try {
|
||||||
const { clientId } = req.params;
|
const { clientId } = req.params;
|
||||||
const client = findOAuthClientById(clientId);
|
const client = await findOAuthClientById(clientId);
|
||||||
|
|
||||||
if (!client) {
|
if (!client) {
|
||||||
res.status(404).json({
|
res.status(404).json({
|
||||||
@@ -85,7 +85,7 @@ export const getClient = (req: Request, res: Response): void => {
|
|||||||
* POST /api/oauth/clients
|
* POST /api/oauth/clients
|
||||||
* Create a new OAuth client
|
* Create a new OAuth client
|
||||||
*/
|
*/
|
||||||
export const createClient = (req: Request, res: Response): void => {
|
export const createClient = async (req: Request, res: Response): Promise<void> => {
|
||||||
try {
|
try {
|
||||||
// Validate request
|
// Validate request
|
||||||
const errors = validationResult(req);
|
const errors = validationResult(req);
|
||||||
@@ -105,7 +105,8 @@ export const createClient = (req: Request, res: Response): void => {
|
|||||||
const clientId = crypto.randomBytes(16).toString('hex');
|
const clientId = crypto.randomBytes(16).toString('hex');
|
||||||
|
|
||||||
// Generate client secret if required
|
// Generate client secret if required
|
||||||
const clientSecret = requireSecret !== false ? crypto.randomBytes(32).toString('hex') : undefined;
|
const clientSecret =
|
||||||
|
requireSecret !== false ? crypto.randomBytes(32).toString('hex') : undefined;
|
||||||
|
|
||||||
// Create client
|
// Create client
|
||||||
const client: IOAuthClient = {
|
const client: IOAuthClient = {
|
||||||
@@ -118,7 +119,7 @@ export const createClient = (req: Request, res: Response): void => {
|
|||||||
owner: user?.username || 'admin',
|
owner: user?.username || 'admin',
|
||||||
};
|
};
|
||||||
|
|
||||||
const createdClient = createOAuthClient(client);
|
const createdClient = await createOAuthClient(client);
|
||||||
|
|
||||||
// Return client with secret (only shown once)
|
// Return client with secret (only shown once)
|
||||||
res.status(201).json({
|
res.status(201).json({
|
||||||
@@ -139,7 +140,7 @@ export const createClient = (req: Request, res: Response): void => {
|
|||||||
});
|
});
|
||||||
} catch (error) {
|
} catch (error) {
|
||||||
console.error('Create OAuth client error:', error);
|
console.error('Create OAuth client error:', error);
|
||||||
|
|
||||||
if (error instanceof Error && error.message.includes('already exists')) {
|
if (error instanceof Error && error.message.includes('already exists')) {
|
||||||
res.status(409).json({
|
res.status(409).json({
|
||||||
success: false,
|
success: false,
|
||||||
@@ -158,18 +159,19 @@ export const createClient = (req: Request, res: Response): void => {
|
|||||||
* PUT /api/oauth/clients/:clientId
|
* PUT /api/oauth/clients/:clientId
|
||||||
* Update an OAuth client
|
* Update an OAuth client
|
||||||
*/
|
*/
|
||||||
export const updateClient = (req: Request, res: Response): void => {
|
export const updateClient = async (req: Request, res: Response): Promise<void> => {
|
||||||
try {
|
try {
|
||||||
const { clientId } = req.params;
|
const { clientId } = req.params;
|
||||||
const { name, redirectUris, grants, scopes } = req.body;
|
const { name, redirectUris, grants, scopes } = req.body;
|
||||||
|
|
||||||
const updates: Partial<IOAuthClient> = {};
|
const updates: Partial<IOAuthClient> = {};
|
||||||
if (name) updates.name = name;
|
if (name) updates.name = name;
|
||||||
if (redirectUris) updates.redirectUris = Array.isArray(redirectUris) ? redirectUris : [redirectUris];
|
if (redirectUris)
|
||||||
|
updates.redirectUris = Array.isArray(redirectUris) ? redirectUris : [redirectUris];
|
||||||
if (grants) updates.grants = grants;
|
if (grants) updates.grants = grants;
|
||||||
if (scopes) updates.scopes = scopes;
|
if (scopes) updates.scopes = scopes;
|
||||||
|
|
||||||
const updatedClient = updateOAuthClient(clientId, updates);
|
const updatedClient = await updateOAuthClient(clientId, updates);
|
||||||
|
|
||||||
if (!updatedClient) {
|
if (!updatedClient) {
|
||||||
res.status(404).json({
|
res.status(404).json({
|
||||||
@@ -205,10 +207,10 @@ export const updateClient = (req: Request, res: Response): void => {
|
|||||||
* DELETE /api/oauth/clients/:clientId
|
* DELETE /api/oauth/clients/:clientId
|
||||||
* Delete an OAuth client
|
* Delete an OAuth client
|
||||||
*/
|
*/
|
||||||
export const deleteClient = (req: Request, res: Response): void => {
|
export const deleteClient = async (req: Request, res: Response): Promise<void> => {
|
||||||
try {
|
try {
|
||||||
const { clientId } = req.params;
|
const { clientId } = req.params;
|
||||||
const deleted = deleteOAuthClient(clientId);
|
const deleted = await deleteOAuthClient(clientId);
|
||||||
|
|
||||||
if (!deleted) {
|
if (!deleted) {
|
||||||
res.status(404).json({
|
res.status(404).json({
|
||||||
@@ -235,10 +237,10 @@ export const deleteClient = (req: Request, res: Response): void => {
|
|||||||
* POST /api/oauth/clients/:clientId/regenerate-secret
|
* POST /api/oauth/clients/:clientId/regenerate-secret
|
||||||
* Regenerate client secret
|
* Regenerate client secret
|
||||||
*/
|
*/
|
||||||
export const regenerateSecret = (req: Request, res: Response): void => {
|
export const regenerateSecret = async (req: Request, res: Response): Promise<void> => {
|
||||||
try {
|
try {
|
||||||
const { clientId } = req.params;
|
const { clientId } = req.params;
|
||||||
const client = findOAuthClientById(clientId);
|
const client = await findOAuthClientById(clientId);
|
||||||
|
|
||||||
if (!client) {
|
if (!client) {
|
||||||
res.status(404).json({
|
res.status(404).json({
|
||||||
@@ -250,7 +252,7 @@ export const regenerateSecret = (req: Request, res: Response): void => {
|
|||||||
|
|
||||||
// Generate new secret
|
// Generate new secret
|
||||||
const newSecret = crypto.randomBytes(32).toString('hex');
|
const newSecret = crypto.randomBytes(32).toString('hex');
|
||||||
const updatedClient = updateOAuthClient(clientId, { clientSecret: newSecret });
|
const updatedClient = await updateOAuthClient(clientId, { clientSecret: newSecret });
|
||||||
|
|
||||||
if (!updatedClient) {
|
if (!updatedClient) {
|
||||||
res.status(500).json({
|
res.status(500).json({
|
||||||
|
|||||||
@@ -48,7 +48,7 @@ const verifyRegistrationToken = (token: string): string | null => {
|
|||||||
* RFC 7591 Dynamic Client Registration
|
* RFC 7591 Dynamic Client Registration
|
||||||
* Public endpoint for registering new OAuth clients
|
* Public endpoint for registering new OAuth clients
|
||||||
*/
|
*/
|
||||||
export const registerClient = (req: Request, res: Response): void => {
|
export const registerClient = async (req: Request, res: Response): Promise<void> => {
|
||||||
try {
|
try {
|
||||||
const settings = loadSettings();
|
const settings = loadSettings();
|
||||||
const oauthConfig = settings.systemConfig?.oauthServer;
|
const oauthConfig = settings.systemConfig?.oauthServer;
|
||||||
@@ -183,7 +183,7 @@ export const registerClient = (req: Request, res: Response): void => {
|
|||||||
},
|
},
|
||||||
};
|
};
|
||||||
|
|
||||||
const createdClient = createOAuthClient(client);
|
const createdClient = await createOAuthClient(client);
|
||||||
|
|
||||||
// Build response according to RFC 7591
|
// Build response according to RFC 7591
|
||||||
const response: any = {
|
const response: any = {
|
||||||
@@ -238,7 +238,7 @@ export const registerClient = (req: Request, res: Response): void => {
|
|||||||
* RFC 7591 Client Configuration Endpoint
|
* RFC 7591 Client Configuration Endpoint
|
||||||
* Read client configuration
|
* Read client configuration
|
||||||
*/
|
*/
|
||||||
export const getClientConfiguration = (req: Request, res: Response): void => {
|
export const getClientConfiguration = async (req: Request, res: Response): Promise<void> => {
|
||||||
try {
|
try {
|
||||||
const { clientId } = req.params;
|
const { clientId } = req.params;
|
||||||
const authHeader = req.headers.authorization;
|
const authHeader = req.headers.authorization;
|
||||||
@@ -262,7 +262,7 @@ export const getClientConfiguration = (req: Request, res: Response): void => {
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
const client = findOAuthClientById(clientId);
|
const client = await findOAuthClientById(clientId);
|
||||||
if (!client) {
|
if (!client) {
|
||||||
res.status(404).json({
|
res.status(404).json({
|
||||||
error: 'invalid_client',
|
error: 'invalid_client',
|
||||||
@@ -311,7 +311,7 @@ export const getClientConfiguration = (req: Request, res: Response): void => {
|
|||||||
* RFC 7591 Client Update Endpoint
|
* RFC 7591 Client Update Endpoint
|
||||||
* Update client configuration
|
* Update client configuration
|
||||||
*/
|
*/
|
||||||
export const updateClientConfiguration = (req: Request, res: Response): void => {
|
export const updateClientConfiguration = async (req: Request, res: Response): Promise<void> => {
|
||||||
try {
|
try {
|
||||||
const { clientId } = req.params;
|
const { clientId } = req.params;
|
||||||
const authHeader = req.headers.authorization;
|
const authHeader = req.headers.authorization;
|
||||||
@@ -335,7 +335,7 @@ export const updateClientConfiguration = (req: Request, res: Response): void =>
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
const client = findOAuthClientById(clientId);
|
const client = await findOAuthClientById(clientId);
|
||||||
if (!client) {
|
if (!client) {
|
||||||
res.status(404).json({
|
res.status(404).json({
|
||||||
error: 'invalid_client',
|
error: 'invalid_client',
|
||||||
@@ -443,7 +443,7 @@ export const updateClientConfiguration = (req: Request, res: Response): void =>
|
|||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
const updatedClient = updateOAuthClient(clientId, updates);
|
const updatedClient = await updateOAuthClient(clientId, updates);
|
||||||
|
|
||||||
if (!updatedClient) {
|
if (!updatedClient) {
|
||||||
res.status(500).json({
|
res.status(500).json({
|
||||||
@@ -495,7 +495,7 @@ export const updateClientConfiguration = (req: Request, res: Response): void =>
|
|||||||
* RFC 7591 Client Delete Endpoint
|
* RFC 7591 Client Delete Endpoint
|
||||||
* Delete client registration
|
* Delete client registration
|
||||||
*/
|
*/
|
||||||
export const deleteClientRegistration = (req: Request, res: Response): void => {
|
export const deleteClientRegistration = async (req: Request, res: Response): Promise<void> => {
|
||||||
try {
|
try {
|
||||||
const { clientId } = req.params;
|
const { clientId } = req.params;
|
||||||
const authHeader = req.headers.authorization;
|
const authHeader = req.headers.authorization;
|
||||||
@@ -519,7 +519,7 @@ export const deleteClientRegistration = (req: Request, res: Response): void => {
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
const deleted = deleteOAuthClient(clientId);
|
const deleted = await deleteOAuthClient(clientId);
|
||||||
|
|
||||||
if (!deleted) {
|
if (!deleted) {
|
||||||
res.status(404).json({
|
res.status(404).json({
|
||||||
|
|||||||
@@ -212,7 +212,7 @@ export const getAuthorize = async (req: Request, res: Response): Promise<void> =
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Verify client
|
// Verify client
|
||||||
const client = findOAuthClientById(client_id as string);
|
const client = await findOAuthClientById(client_id as string);
|
||||||
if (!client) {
|
if (!client) {
|
||||||
res.status(400).json({ error: 'invalid_client', error_description: 'Client not found' });
|
res.status(400).json({ error: 'invalid_client', error_description: 'Client not found' });
|
||||||
return;
|
return;
|
||||||
|
|||||||
@@ -1,5 +1,13 @@
|
|||||||
import { Request, Response } from 'express';
|
import { Request, Response } from 'express';
|
||||||
import { ApiResponse, AddServerRequest, McpSettings } from '../types/index.js';
|
import {
|
||||||
|
ApiResponse,
|
||||||
|
AddServerRequest,
|
||||||
|
McpSettings,
|
||||||
|
BatchCreateServersRequest,
|
||||||
|
BatchCreateServersResponse,
|
||||||
|
BatchServerResult,
|
||||||
|
ServerConfig,
|
||||||
|
} from '../types/index.js';
|
||||||
import {
|
import {
|
||||||
getServersInfo,
|
getServersInfo,
|
||||||
addServer,
|
addServer,
|
||||||
@@ -8,12 +16,14 @@ import {
|
|||||||
notifyToolChanged,
|
notifyToolChanged,
|
||||||
syncToolEmbedding,
|
syncToolEmbedding,
|
||||||
toggleServerStatus,
|
toggleServerStatus,
|
||||||
|
reconnectServer,
|
||||||
} from '../services/mcpService.js';
|
} from '../services/mcpService.js';
|
||||||
import { loadSettings, saveSettings } from '../config/index.js';
|
import { loadSettings } from '../config/index.js';
|
||||||
import { syncAllServerToolsEmbeddings } from '../services/vectorSearchService.js';
|
import { syncAllServerToolsEmbeddings } from '../services/vectorSearchService.js';
|
||||||
import { createSafeJSON } from '../utils/serialization.js';
|
import { createSafeJSON } from '../utils/serialization.js';
|
||||||
import { cloneDefaultOAuthServerConfig } from '../constants/oauthServerDefaults.js';
|
import { cloneDefaultOAuthServerConfig } from '../constants/oauthServerDefaults.js';
|
||||||
import { getServerDao, getGroupDao, getSystemConfigDao } from '../dao/DaoFactory.js';
|
import { getServerDao, getGroupDao, getSystemConfigDao } from '../dao/DaoFactory.js';
|
||||||
|
import { getBearerKeyDao } from '../dao/DaoFactory.js';
|
||||||
|
|
||||||
export const getAllServers = async (_: Request, res: Response): Promise<void> => {
|
export const getAllServers = async (_: Request, res: Response): Promise<void> => {
|
||||||
try {
|
try {
|
||||||
@@ -56,12 +66,31 @@ export const getAllSettings = async (_: Request, res: Response): Promise<void> =
|
|||||||
const systemConfigDao = getSystemConfigDao();
|
const systemConfigDao = getSystemConfigDao();
|
||||||
const systemConfig = await systemConfigDao.get();
|
const systemConfig = await systemConfigDao.get();
|
||||||
|
|
||||||
|
// Ensure smart routing config has DB URL set if environment variable is present
|
||||||
|
const dbUrlEnv = process.env.DB_URL || '';
|
||||||
|
if (!systemConfig.smartRouting) {
|
||||||
|
systemConfig.smartRouting = {
|
||||||
|
enabled: false,
|
||||||
|
dbUrl: dbUrlEnv ? '${DB_URL}' : '',
|
||||||
|
openaiApiBaseUrl: '',
|
||||||
|
openaiApiKey: '',
|
||||||
|
openaiApiEmbeddingModel: '',
|
||||||
|
};
|
||||||
|
} else if (!systemConfig.smartRouting.dbUrl) {
|
||||||
|
systemConfig.smartRouting.dbUrl = dbUrlEnv ? '${DB_URL}' : '';
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get bearer auth keys from DAO
|
||||||
|
const bearerKeyDao = getBearerKeyDao();
|
||||||
|
const bearerKeys = await bearerKeyDao.findAll();
|
||||||
|
|
||||||
// Merge all data into settings object
|
// Merge all data into settings object
|
||||||
const settings: McpSettings = {
|
const settings: McpSettings = {
|
||||||
...fileSettings,
|
...fileSettings,
|
||||||
mcpServers,
|
mcpServers,
|
||||||
groups,
|
groups,
|
||||||
systemConfig,
|
systemConfig,
|
||||||
|
bearerKeys,
|
||||||
};
|
};
|
||||||
|
|
||||||
const response: ApiResponse = {
|
const response: ApiResponse = {
|
||||||
@@ -188,6 +217,177 @@ export const createServer = async (req: Request, res: Response): Promise<void> =
|
|||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
|
// Batch create servers - validates and creates multiple servers in one request
|
||||||
|
export const batchCreateServers = async (req: Request, res: Response): Promise<void> => {
|
||||||
|
try {
|
||||||
|
const { servers } = req.body as BatchCreateServersRequest;
|
||||||
|
|
||||||
|
// Validate request body
|
||||||
|
if (!servers || !Array.isArray(servers)) {
|
||||||
|
res.status(400).json({
|
||||||
|
success: false,
|
||||||
|
message: 'Request body must contain a "servers" array',
|
||||||
|
});
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (servers.length === 0) {
|
||||||
|
res.status(400).json({
|
||||||
|
success: false,
|
||||||
|
message: 'Servers array cannot be empty',
|
||||||
|
});
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Helper function to validate a single server configuration
|
||||||
|
const validateServerConfig = (
|
||||||
|
name: string,
|
||||||
|
config: ServerConfig,
|
||||||
|
): { valid: boolean; message?: string } => {
|
||||||
|
if (!name || typeof name !== 'string') {
|
||||||
|
return { valid: false, message: 'Server name is required and must be a string' };
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!config || typeof config !== 'object') {
|
||||||
|
return { valid: false, message: 'Server configuration is required and must be an object' };
|
||||||
|
}
|
||||||
|
|
||||||
|
if (
|
||||||
|
!config.url &&
|
||||||
|
!config.openapi?.url &&
|
||||||
|
!config.openapi?.schema &&
|
||||||
|
(!config.command || !config.args)
|
||||||
|
) {
|
||||||
|
return {
|
||||||
|
valid: false,
|
||||||
|
message:
|
||||||
|
'Server configuration must include either a URL, OpenAPI specification URL or schema, or command with arguments',
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
// Validate server type if specified
|
||||||
|
if (config.type && !['stdio', 'sse', 'streamable-http', 'openapi'].includes(config.type)) {
|
||||||
|
return {
|
||||||
|
valid: false,
|
||||||
|
message: 'Server type must be one of: stdio, sse, streamable-http, openapi',
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
// Validate URL is provided for sse and streamable-http types
|
||||||
|
if ((config.type === 'sse' || config.type === 'streamable-http') && !config.url) {
|
||||||
|
return { valid: false, message: `URL is required for ${config.type} server type` };
|
||||||
|
}
|
||||||
|
|
||||||
|
// Validate OpenAPI specification URL or schema is provided for openapi type
|
||||||
|
if (config.type === 'openapi' && !config.openapi?.url && !config.openapi?.schema) {
|
||||||
|
return {
|
||||||
|
valid: false,
|
||||||
|
message: 'OpenAPI specification URL or schema is required for openapi server type',
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
// Validate headers if provided
|
||||||
|
if (config.headers && typeof config.headers !== 'object') {
|
||||||
|
return { valid: false, message: 'Headers must be an object' };
|
||||||
|
}
|
||||||
|
|
||||||
|
// Validate that headers are only used with sse, streamable-http, and openapi types
|
||||||
|
if (config.headers && config.type === 'stdio') {
|
||||||
|
return { valid: false, message: 'Headers are not supported for stdio server type' };
|
||||||
|
}
|
||||||
|
|
||||||
|
return { valid: true };
|
||||||
|
};
|
||||||
|
|
||||||
|
// Process each server
|
||||||
|
const results: BatchServerResult[] = [];
|
||||||
|
let successCount = 0;
|
||||||
|
let failureCount = 0;
|
||||||
|
|
||||||
|
// Get current user for owner field
|
||||||
|
const currentUser = (req as any).user;
|
||||||
|
const defaultOwner = currentUser?.username || 'admin';
|
||||||
|
|
||||||
|
for (const server of servers) {
|
||||||
|
const { name, config } = server;
|
||||||
|
|
||||||
|
// Validate server configuration
|
||||||
|
const validation = validateServerConfig(name, config);
|
||||||
|
if (!validation.valid) {
|
||||||
|
results.push({
|
||||||
|
name: name || 'unknown',
|
||||||
|
success: false,
|
||||||
|
message: validation.message,
|
||||||
|
});
|
||||||
|
failureCount++;
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
// Set default keep-alive interval for SSE servers if not specified
|
||||||
|
if ((config.type === 'sse' || (!config.type && config.url)) && !config.keepAliveInterval) {
|
||||||
|
config.keepAliveInterval = 60000; // Default 60 seconds for SSE servers
|
||||||
|
}
|
||||||
|
|
||||||
|
// Set owner property if not provided
|
||||||
|
if (!config.owner) {
|
||||||
|
config.owner = defaultOwner;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Attempt to add server
|
||||||
|
const result = await addServer(name, config);
|
||||||
|
if (result.success) {
|
||||||
|
results.push({
|
||||||
|
name,
|
||||||
|
success: true,
|
||||||
|
});
|
||||||
|
successCount++;
|
||||||
|
} else {
|
||||||
|
results.push({
|
||||||
|
name,
|
||||||
|
success: false,
|
||||||
|
message: result.message || 'Failed to add server',
|
||||||
|
});
|
||||||
|
failureCount++;
|
||||||
|
}
|
||||||
|
} catch (error) {
|
||||||
|
results.push({
|
||||||
|
name,
|
||||||
|
success: false,
|
||||||
|
message: error instanceof Error ? error.message : 'Internal server error',
|
||||||
|
});
|
||||||
|
failureCount++;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Notify tool changes if any server was added successfully
|
||||||
|
if (successCount > 0) {
|
||||||
|
notifyToolChanged();
|
||||||
|
}
|
||||||
|
|
||||||
|
// Prepare response
|
||||||
|
const response: ApiResponse<BatchCreateServersResponse> = {
|
||||||
|
success: successCount > 0, // Success if at least one server was created
|
||||||
|
data: {
|
||||||
|
success: successCount > 0,
|
||||||
|
successCount,
|
||||||
|
failureCount,
|
||||||
|
results,
|
||||||
|
},
|
||||||
|
};
|
||||||
|
|
||||||
|
// Return 207 Multi-Status if there were partial failures, 200 if all succeeded, 400 if all failed
|
||||||
|
const statusCode = failureCount === 0 ? 200 : successCount === 0 ? 400 : 207;
|
||||||
|
res.status(statusCode).json(response);
|
||||||
|
} catch (error) {
|
||||||
|
console.error('Batch create servers error:', error);
|
||||||
|
res.status(500).json({
|
||||||
|
success: false,
|
||||||
|
message: 'Internal server error',
|
||||||
|
});
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
export const deleteServer = async (req: Request, res: Response): Promise<void> => {
|
export const deleteServer = async (req: Request, res: Response): Promise<void> => {
|
||||||
try {
|
try {
|
||||||
const { name } = req.params;
|
const { name } = req.params;
|
||||||
@@ -223,7 +423,7 @@ export const deleteServer = async (req: Request, res: Response): Promise<void> =
|
|||||||
export const updateServer = async (req: Request, res: Response): Promise<void> => {
|
export const updateServer = async (req: Request, res: Response): Promise<void> => {
|
||||||
try {
|
try {
|
||||||
const { name } = req.params;
|
const { name } = req.params;
|
||||||
const { config } = req.body;
|
const { config, newName } = req.body;
|
||||||
if (!name) {
|
if (!name) {
|
||||||
res.status(400).json({
|
res.status(400).json({
|
||||||
success: false,
|
success: false,
|
||||||
@@ -310,12 +510,52 @@ export const updateServer = async (req: Request, res: Response): Promise<void> =
|
|||||||
config.owner = currentUser?.username || 'admin';
|
config.owner = currentUser?.username || 'admin';
|
||||||
}
|
}
|
||||||
|
|
||||||
const result = await addOrUpdateServer(name, config, true); // Allow override for updates
|
// Check if server name is being changed
|
||||||
|
const isRenaming = newName && newName !== name;
|
||||||
|
|
||||||
|
// If renaming, validate the new name and update references
|
||||||
|
if (isRenaming) {
|
||||||
|
const serverDao = getServerDao();
|
||||||
|
|
||||||
|
// Check if new name already exists
|
||||||
|
if (await serverDao.exists(newName)) {
|
||||||
|
res.status(400).json({
|
||||||
|
success: false,
|
||||||
|
message: `Server name '${newName}' already exists`,
|
||||||
|
});
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Rename the server
|
||||||
|
const renamed = await serverDao.rename(name, newName);
|
||||||
|
if (!renamed) {
|
||||||
|
res.status(404).json({
|
||||||
|
success: false,
|
||||||
|
message: 'Server not found',
|
||||||
|
});
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Update references in groups
|
||||||
|
const groupDao = getGroupDao();
|
||||||
|
await groupDao.updateServerName(name, newName);
|
||||||
|
|
||||||
|
// Update references in bearer keys
|
||||||
|
const bearerKeyDao = getBearerKeyDao();
|
||||||
|
await bearerKeyDao.updateServerName(name, newName);
|
||||||
|
}
|
||||||
|
|
||||||
|
// Use the final server name (new name if renaming, otherwise original name)
|
||||||
|
const finalName = isRenaming ? newName : name;
|
||||||
|
|
||||||
|
const result = await addOrUpdateServer(finalName, config, true); // Allow override for updates
|
||||||
if (result.success) {
|
if (result.success) {
|
||||||
notifyToolChanged(name);
|
notifyToolChanged(finalName);
|
||||||
res.json({
|
res.json({
|
||||||
success: true,
|
success: true,
|
||||||
message: 'Server updated successfully',
|
message: isRenaming
|
||||||
|
? `Server renamed and updated successfully`
|
||||||
|
: 'Server updated successfully',
|
||||||
});
|
});
|
||||||
} else {
|
} else {
|
||||||
res.status(404).json({
|
res.status(404).json({
|
||||||
@@ -324,9 +564,10 @@ export const updateServer = async (req: Request, res: Response): Promise<void> =
|
|||||||
});
|
});
|
||||||
}
|
}
|
||||||
} catch (error) {
|
} catch (error) {
|
||||||
|
console.error('Failed to update server:', error);
|
||||||
res.status(500).json({
|
res.status(500).json({
|
||||||
success: false,
|
success: false,
|
||||||
message: 'Internal server error',
|
message: error instanceof Error ? error.message : 'Internal server error',
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
@@ -415,6 +656,32 @@ export const toggleServer = async (req: Request, res: Response): Promise<void> =
|
|||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
|
export const reloadServer = async (req: Request, res: Response): Promise<void> => {
|
||||||
|
try {
|
||||||
|
const { name } = req.params;
|
||||||
|
if (!name) {
|
||||||
|
res.status(400).json({
|
||||||
|
success: false,
|
||||||
|
message: 'Server name is required',
|
||||||
|
});
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
await reconnectServer(name);
|
||||||
|
|
||||||
|
res.json({
|
||||||
|
success: true,
|
||||||
|
message: `Server ${name} reloaded successfully`,
|
||||||
|
});
|
||||||
|
} catch (error) {
|
||||||
|
console.error('Failed to reload server:', error);
|
||||||
|
res.status(500).json({
|
||||||
|
success: false,
|
||||||
|
message: 'Failed to reload server',
|
||||||
|
});
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
// Toggle tool status for a specific server
|
// Toggle tool status for a specific server
|
||||||
export const toggleTool = async (req: Request, res: Response): Promise<void> => {
|
export const toggleTool = async (req: Request, res: Response): Promise<void> => {
|
||||||
try {
|
try {
|
||||||
@@ -439,8 +706,10 @@ export const toggleTool = async (req: Request, res: Response): Promise<void> =>
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
const settings = loadSettings();
|
const serverDao = getServerDao();
|
||||||
if (!settings.mcpServers[serverName]) {
|
const server = await serverDao.findById(serverName);
|
||||||
|
|
||||||
|
if (!server) {
|
||||||
res.status(404).json({
|
res.status(404).json({
|
||||||
success: false,
|
success: false,
|
||||||
message: 'Server not found',
|
message: 'Server not found',
|
||||||
@@ -449,14 +718,15 @@ export const toggleTool = async (req: Request, res: Response): Promise<void> =>
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Initialize tools config if it doesn't exist
|
// Initialize tools config if it doesn't exist
|
||||||
if (!settings.mcpServers[serverName].tools) {
|
const tools = server.tools || {};
|
||||||
settings.mcpServers[serverName].tools = {};
|
|
||||||
}
|
|
||||||
|
|
||||||
// Set the tool's enabled state
|
// Set the tool's enabled state (preserve existing description if any)
|
||||||
settings.mcpServers[serverName].tools![toolName] = { enabled };
|
tools[toolName] = { ...tools[toolName], enabled };
|
||||||
|
|
||||||
if (!saveSettings(settings)) {
|
// Update via DAO (supports both file and database modes)
|
||||||
|
const result = await serverDao.updateTools(serverName, tools);
|
||||||
|
|
||||||
|
if (!result) {
|
||||||
res.status(500).json({
|
res.status(500).json({
|
||||||
success: false,
|
success: false,
|
||||||
message: 'Failed to save settings',
|
message: 'Failed to save settings',
|
||||||
@@ -503,8 +773,10 @@ export const updateToolDescription = async (req: Request, res: Response): Promis
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
const settings = loadSettings();
|
const serverDao = getServerDao();
|
||||||
if (!settings.mcpServers[serverName]) {
|
const server = await serverDao.findById(serverName);
|
||||||
|
|
||||||
|
if (!server) {
|
||||||
res.status(404).json({
|
res.status(404).json({
|
||||||
success: false,
|
success: false,
|
||||||
message: 'Server not found',
|
message: 'Server not found',
|
||||||
@@ -513,18 +785,18 @@ export const updateToolDescription = async (req: Request, res: Response): Promis
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Initialize tools config if it doesn't exist
|
// Initialize tools config if it doesn't exist
|
||||||
if (!settings.mcpServers[serverName].tools) {
|
const tools = server.tools || {};
|
||||||
settings.mcpServers[serverName].tools = {};
|
|
||||||
}
|
|
||||||
|
|
||||||
// Set the tool's description
|
// Set the tool's description
|
||||||
if (!settings.mcpServers[serverName].tools![toolName]) {
|
if (!tools[toolName]) {
|
||||||
settings.mcpServers[serverName].tools![toolName] = { enabled: true };
|
tools[toolName] = { enabled: true };
|
||||||
}
|
}
|
||||||
|
tools[toolName].description = description;
|
||||||
|
|
||||||
settings.mcpServers[serverName].tools![toolName].description = description;
|
// Update via DAO (supports both file and database modes)
|
||||||
|
const result = await serverDao.updateTools(serverName, tools);
|
||||||
|
|
||||||
if (!saveSettings(settings)) {
|
if (!result) {
|
||||||
res.status(500).json({
|
res.status(500).json({
|
||||||
success: false,
|
success: false,
|
||||||
message: 'Failed to save settings',
|
message: 'Failed to save settings',
|
||||||
@@ -761,7 +1033,8 @@ export const updateSystemConfig = async (req: Request, res: Response): Promise<v
|
|||||||
if (typeof smartRouting.enabled === 'boolean') {
|
if (typeof smartRouting.enabled === 'boolean') {
|
||||||
// If enabling Smart Routing, validate required fields
|
// If enabling Smart Routing, validate required fields
|
||||||
if (smartRouting.enabled) {
|
if (smartRouting.enabled) {
|
||||||
const currentDbUrl = smartRouting.dbUrl || systemConfig.smartRouting.dbUrl;
|
const currentDbUrl =
|
||||||
|
process.env.DB_URL || smartRouting.dbUrl || systemConfig.smartRouting.dbUrl;
|
||||||
const currentOpenaiApiKey =
|
const currentOpenaiApiKey =
|
||||||
smartRouting.openaiApiKey || systemConfig.smartRouting.openaiApiKey;
|
smartRouting.openaiApiKey || systemConfig.smartRouting.openaiApiKey;
|
||||||
|
|
||||||
@@ -939,8 +1212,10 @@ export const togglePrompt = async (req: Request, res: Response): Promise<void> =
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
const settings = loadSettings();
|
const serverDao = getServerDao();
|
||||||
if (!settings.mcpServers[serverName]) {
|
const server = await serverDao.findById(serverName);
|
||||||
|
|
||||||
|
if (!server) {
|
||||||
res.status(404).json({
|
res.status(404).json({
|
||||||
success: false,
|
success: false,
|
||||||
message: 'Server not found',
|
message: 'Server not found',
|
||||||
@@ -949,14 +1224,15 @@ export const togglePrompt = async (req: Request, res: Response): Promise<void> =
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Initialize prompts config if it doesn't exist
|
// Initialize prompts config if it doesn't exist
|
||||||
if (!settings.mcpServers[serverName].prompts) {
|
const prompts = server.prompts || {};
|
||||||
settings.mcpServers[serverName].prompts = {};
|
|
||||||
}
|
|
||||||
|
|
||||||
// Set the prompt's enabled state
|
// Set the prompt's enabled state (preserve existing description if any)
|
||||||
settings.mcpServers[serverName].prompts![promptName] = { enabled };
|
prompts[promptName] = { ...prompts[promptName], enabled };
|
||||||
|
|
||||||
if (!saveSettings(settings)) {
|
// Update via DAO (supports both file and database modes)
|
||||||
|
const result = await serverDao.updatePrompts(serverName, prompts);
|
||||||
|
|
||||||
|
if (!result) {
|
||||||
res.status(500).json({
|
res.status(500).json({
|
||||||
success: false,
|
success: false,
|
||||||
message: 'Failed to save settings',
|
message: 'Failed to save settings',
|
||||||
@@ -1003,8 +1279,10 @@ export const updatePromptDescription = async (req: Request, res: Response): Prom
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
const settings = loadSettings();
|
const serverDao = getServerDao();
|
||||||
if (!settings.mcpServers[serverName]) {
|
const server = await serverDao.findById(serverName);
|
||||||
|
|
||||||
|
if (!server) {
|
||||||
res.status(404).json({
|
res.status(404).json({
|
||||||
success: false,
|
success: false,
|
||||||
message: 'Server not found',
|
message: 'Server not found',
|
||||||
@@ -1013,18 +1291,18 @@ export const updatePromptDescription = async (req: Request, res: Response): Prom
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Initialize prompts config if it doesn't exist
|
// Initialize prompts config if it doesn't exist
|
||||||
if (!settings.mcpServers[serverName].prompts) {
|
const prompts = server.prompts || {};
|
||||||
settings.mcpServers[serverName].prompts = {};
|
|
||||||
}
|
|
||||||
|
|
||||||
// Set the prompt's description
|
// Set the prompt's description
|
||||||
if (!settings.mcpServers[serverName].prompts![promptName]) {
|
if (!prompts[promptName]) {
|
||||||
settings.mcpServers[serverName].prompts![promptName] = { enabled: true };
|
prompts[promptName] = { enabled: true };
|
||||||
}
|
}
|
||||||
|
prompts[promptName].description = description;
|
||||||
|
|
||||||
settings.mcpServers[serverName].prompts![promptName].description = description;
|
// Update via DAO (supports both file and database modes)
|
||||||
|
const result = await serverDao.updatePrompts(serverName, prompts);
|
||||||
|
|
||||||
if (!saveSettings(settings)) {
|
if (!result) {
|
||||||
res.status(500).json({
|
res.status(500).json({
|
||||||
success: false,
|
success: false,
|
||||||
message: 'Failed to save settings',
|
message: 'Failed to save settings',
|
||||||
|
|||||||
159
src/dao/BearerKeyDao.ts
Normal file
159
src/dao/BearerKeyDao.ts
Normal file
@@ -0,0 +1,159 @@
|
|||||||
|
import { randomUUID } from 'node:crypto';
|
||||||
|
import { BearerKey } from '../types/index.js';
|
||||||
|
import { JsonFileBaseDao } from './base/JsonFileBaseDao.js';
|
||||||
|
|
||||||
|
/**
|
||||||
|
* DAO interface for bearer authentication keys
|
||||||
|
*/
|
||||||
|
export interface BearerKeyDao {
|
||||||
|
findAll(): Promise<BearerKey[]>;
|
||||||
|
findEnabled(): Promise<BearerKey[]>;
|
||||||
|
findById(id: string): Promise<BearerKey | undefined>;
|
||||||
|
findByToken(token: string): Promise<BearerKey | undefined>;
|
||||||
|
create(data: Omit<BearerKey, 'id'>): Promise<BearerKey>;
|
||||||
|
update(id: string, data: Partial<Omit<BearerKey, 'id'>>): Promise<BearerKey | null>;
|
||||||
|
delete(id: string): Promise<boolean>;
|
||||||
|
/**
|
||||||
|
* Update server name in all bearer keys (when server is renamed)
|
||||||
|
*/
|
||||||
|
updateServerName(oldName: string, newName: string): Promise<number>;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* JSON file-based BearerKey DAO implementation
|
||||||
|
* Stores keys under the top-level `bearerKeys` field in mcp_settings.json
|
||||||
|
* and performs one-time migration from legacy routing.enableBearerAuth/bearerAuthKey.
|
||||||
|
*/
|
||||||
|
export class BearerKeyDaoImpl extends JsonFileBaseDao implements BearerKeyDao {
|
||||||
|
private async loadKeysWithMigration(): Promise<BearerKey[]> {
|
||||||
|
const settings = await this.loadSettings();
|
||||||
|
|
||||||
|
// Treat an existing array (including an empty array) as already migrated.
|
||||||
|
// Otherwise, when there are no configured keys, we'd rewrite mcp_settings.json
|
||||||
|
// on every request, which also clears the global settings cache.
|
||||||
|
if (Array.isArray(settings.bearerKeys)) {
|
||||||
|
return settings.bearerKeys;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Perform one-time migration from legacy routing config if present
|
||||||
|
const routing = settings.systemConfig?.routing || {};
|
||||||
|
const enableBearerAuth: boolean = !!routing.enableBearerAuth;
|
||||||
|
const rawKey: string = (routing.bearerAuthKey || '').trim();
|
||||||
|
|
||||||
|
let migrated: BearerKey[] = [];
|
||||||
|
|
||||||
|
if (rawKey) {
|
||||||
|
// Cases 2 and 3 in migration rules
|
||||||
|
migrated = [
|
||||||
|
{
|
||||||
|
id: randomUUID(),
|
||||||
|
name: 'default',
|
||||||
|
token: rawKey,
|
||||||
|
enabled: enableBearerAuth,
|
||||||
|
accessType: 'all',
|
||||||
|
allowedGroups: [],
|
||||||
|
allowedServers: [],
|
||||||
|
},
|
||||||
|
];
|
||||||
|
}
|
||||||
|
|
||||||
|
// Cases 1 and 4 both result in empty keys list
|
||||||
|
settings.bearerKeys = migrated;
|
||||||
|
await this.saveSettings(settings);
|
||||||
|
|
||||||
|
return migrated;
|
||||||
|
}
|
||||||
|
|
||||||
|
private async saveKeys(keys: BearerKey[]): Promise<void> {
|
||||||
|
const settings = await this.loadSettings();
|
||||||
|
settings.bearerKeys = keys;
|
||||||
|
await this.saveSettings(settings);
|
||||||
|
}
|
||||||
|
|
||||||
|
async findAll(): Promise<BearerKey[]> {
|
||||||
|
return await this.loadKeysWithMigration();
|
||||||
|
}
|
||||||
|
|
||||||
|
async findEnabled(): Promise<BearerKey[]> {
|
||||||
|
const keys = await this.loadKeysWithMigration();
|
||||||
|
return keys.filter((key) => key.enabled);
|
||||||
|
}
|
||||||
|
|
||||||
|
async findById(id: string): Promise<BearerKey | undefined> {
|
||||||
|
const keys = await this.loadKeysWithMigration();
|
||||||
|
return keys.find((key) => key.id === id);
|
||||||
|
}
|
||||||
|
|
||||||
|
async findByToken(token: string): Promise<BearerKey | undefined> {
|
||||||
|
const keys = await this.loadKeysWithMigration();
|
||||||
|
return keys.find((key) => key.token === token);
|
||||||
|
}
|
||||||
|
|
||||||
|
async create(data: Omit<BearerKey, 'id'>): Promise<BearerKey> {
|
||||||
|
const keys = await this.loadKeysWithMigration();
|
||||||
|
const newKey: BearerKey = {
|
||||||
|
id: randomUUID(),
|
||||||
|
...data,
|
||||||
|
};
|
||||||
|
keys.push(newKey);
|
||||||
|
await this.saveKeys(keys);
|
||||||
|
return newKey;
|
||||||
|
}
|
||||||
|
|
||||||
|
async update(id: string, data: Partial<Omit<BearerKey, 'id'>>): Promise<BearerKey | null> {
|
||||||
|
const keys = await this.loadKeysWithMigration();
|
||||||
|
const index = keys.findIndex((key) => key.id === id);
|
||||||
|
if (index === -1) {
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
const updated: BearerKey = {
|
||||||
|
...keys[index],
|
||||||
|
...data,
|
||||||
|
id: keys[index].id,
|
||||||
|
};
|
||||||
|
keys[index] = updated;
|
||||||
|
await this.saveKeys(keys);
|
||||||
|
return updated;
|
||||||
|
}
|
||||||
|
|
||||||
|
async delete(id: string): Promise<boolean> {
|
||||||
|
const keys = await this.loadKeysWithMigration();
|
||||||
|
const next = keys.filter((key) => key.id !== id);
|
||||||
|
if (next.length === keys.length) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
await this.saveKeys(next);
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
async updateServerName(oldName: string, newName: string): Promise<number> {
|
||||||
|
const keys = await this.loadKeysWithMigration();
|
||||||
|
let updatedCount = 0;
|
||||||
|
|
||||||
|
for (const key of keys) {
|
||||||
|
let updated = false;
|
||||||
|
|
||||||
|
if (key.allowedServers && key.allowedServers.length > 0) {
|
||||||
|
const newServers = key.allowedServers.map((server) => {
|
||||||
|
if (server === oldName) {
|
||||||
|
updated = true;
|
||||||
|
return newName;
|
||||||
|
}
|
||||||
|
return server;
|
||||||
|
});
|
||||||
|
|
||||||
|
if (updated) {
|
||||||
|
key.allowedServers = newServers;
|
||||||
|
updatedCount++;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (updatedCount > 0) {
|
||||||
|
await this.saveKeys(keys);
|
||||||
|
}
|
||||||
|
|
||||||
|
return updatedCount;
|
||||||
|
}
|
||||||
|
}
|
||||||
103
src/dao/BearerKeyDaoDbImpl.ts
Normal file
103
src/dao/BearerKeyDaoDbImpl.ts
Normal file
@@ -0,0 +1,103 @@
|
|||||||
|
import { BearerKeyDao } from './BearerKeyDao.js';
|
||||||
|
import { BearerKey as BearerKeyModel } from '../types/index.js';
|
||||||
|
import { BearerKeyRepository } from '../db/repositories/BearerKeyRepository.js';
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Database-backed implementation of BearerKeyDao
|
||||||
|
*/
|
||||||
|
export class BearerKeyDaoDbImpl implements BearerKeyDao {
|
||||||
|
private repository: BearerKeyRepository;
|
||||||
|
|
||||||
|
constructor() {
|
||||||
|
this.repository = new BearerKeyRepository();
|
||||||
|
}
|
||||||
|
|
||||||
|
private toModel(entity: import('../db/entities/BearerKey.js').BearerKey): BearerKeyModel {
|
||||||
|
return {
|
||||||
|
id: entity.id,
|
||||||
|
name: entity.name,
|
||||||
|
token: entity.token,
|
||||||
|
enabled: entity.enabled,
|
||||||
|
accessType: entity.accessType,
|
||||||
|
allowedGroups: entity.allowedGroups ?? [],
|
||||||
|
allowedServers: entity.allowedServers ?? [],
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
async findAll(): Promise<BearerKeyModel[]> {
|
||||||
|
const entities = await this.repository.findAll();
|
||||||
|
return entities.map((e) => this.toModel(e));
|
||||||
|
}
|
||||||
|
|
||||||
|
async findEnabled(): Promise<BearerKeyModel[]> {
|
||||||
|
const entities = await this.repository.findAll();
|
||||||
|
return entities.filter((e) => e.enabled).map((e) => this.toModel(e));
|
||||||
|
}
|
||||||
|
|
||||||
|
async findById(id: string): Promise<BearerKeyModel | undefined> {
|
||||||
|
const entity = await this.repository.findById(id);
|
||||||
|
return entity ? this.toModel(entity) : undefined;
|
||||||
|
}
|
||||||
|
|
||||||
|
async findByToken(token: string): Promise<BearerKeyModel | undefined> {
|
||||||
|
const entity = await this.repository.findByToken(token);
|
||||||
|
return entity ? this.toModel(entity) : undefined;
|
||||||
|
}
|
||||||
|
|
||||||
|
async create(data: Omit<BearerKeyModel, 'id'>): Promise<BearerKeyModel> {
|
||||||
|
const entity = await this.repository.create({
|
||||||
|
name: data.name,
|
||||||
|
token: data.token,
|
||||||
|
enabled: data.enabled,
|
||||||
|
accessType: data.accessType,
|
||||||
|
allowedGroups: data.allowedGroups ?? [],
|
||||||
|
allowedServers: data.allowedServers ?? [],
|
||||||
|
} as any);
|
||||||
|
return this.toModel(entity as any);
|
||||||
|
}
|
||||||
|
|
||||||
|
async update(
|
||||||
|
id: string,
|
||||||
|
data: Partial<Omit<BearerKeyModel, 'id'>>,
|
||||||
|
): Promise<BearerKeyModel | null> {
|
||||||
|
const entity = await this.repository.update(id, {
|
||||||
|
name: data.name,
|
||||||
|
token: data.token,
|
||||||
|
enabled: data.enabled,
|
||||||
|
accessType: data.accessType,
|
||||||
|
allowedGroups: data.allowedGroups,
|
||||||
|
allowedServers: data.allowedServers,
|
||||||
|
} as any);
|
||||||
|
return entity ? this.toModel(entity as any) : null;
|
||||||
|
}
|
||||||
|
|
||||||
|
async delete(id: string): Promise<boolean> {
|
||||||
|
return await this.repository.delete(id);
|
||||||
|
}
|
||||||
|
|
||||||
|
async updateServerName(oldName: string, newName: string): Promise<number> {
|
||||||
|
const allKeys = await this.repository.findAll();
|
||||||
|
let updatedCount = 0;
|
||||||
|
|
||||||
|
for (const key of allKeys) {
|
||||||
|
let updated = false;
|
||||||
|
|
||||||
|
if (key.allowedServers && key.allowedServers.length > 0) {
|
||||||
|
const newServers = key.allowedServers.map((server) => {
|
||||||
|
if (server === oldName) {
|
||||||
|
updated = true;
|
||||||
|
return newName;
|
||||||
|
}
|
||||||
|
return server;
|
||||||
|
});
|
||||||
|
|
||||||
|
if (updated) {
|
||||||
|
await this.repository.update(key.id, { allowedServers: newServers });
|
||||||
|
updatedCount++;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return updatedCount;
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -3,6 +3,9 @@ import { ServerDao, ServerDaoImpl } from './ServerDao.js';
|
|||||||
import { GroupDao, GroupDaoImpl } from './GroupDao.js';
|
import { GroupDao, GroupDaoImpl } from './GroupDao.js';
|
||||||
import { SystemConfigDao, SystemConfigDaoImpl } from './SystemConfigDao.js';
|
import { SystemConfigDao, SystemConfigDaoImpl } from './SystemConfigDao.js';
|
||||||
import { UserConfigDao, UserConfigDaoImpl } from './UserConfigDao.js';
|
import { UserConfigDao, UserConfigDaoImpl } from './UserConfigDao.js';
|
||||||
|
import { OAuthClientDao, OAuthClientDaoImpl } from './OAuthClientDao.js';
|
||||||
|
import { OAuthTokenDao, OAuthTokenDaoImpl } from './OAuthTokenDao.js';
|
||||||
|
import { BearerKeyDao, BearerKeyDaoImpl } from './BearerKeyDao.js';
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* DAO Factory interface for creating DAO instances
|
* DAO Factory interface for creating DAO instances
|
||||||
@@ -13,6 +16,9 @@ export interface DaoFactory {
|
|||||||
getGroupDao(): GroupDao;
|
getGroupDao(): GroupDao;
|
||||||
getSystemConfigDao(): SystemConfigDao;
|
getSystemConfigDao(): SystemConfigDao;
|
||||||
getUserConfigDao(): UserConfigDao;
|
getUserConfigDao(): UserConfigDao;
|
||||||
|
getOAuthClientDao(): OAuthClientDao;
|
||||||
|
getOAuthTokenDao(): OAuthTokenDao;
|
||||||
|
getBearerKeyDao(): BearerKeyDao;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -26,6 +32,9 @@ export class JsonFileDaoFactory implements DaoFactory {
|
|||||||
private groupDao: GroupDao | null = null;
|
private groupDao: GroupDao | null = null;
|
||||||
private systemConfigDao: SystemConfigDao | null = null;
|
private systemConfigDao: SystemConfigDao | null = null;
|
||||||
private userConfigDao: UserConfigDao | null = null;
|
private userConfigDao: UserConfigDao | null = null;
|
||||||
|
private oauthClientDao: OAuthClientDao | null = null;
|
||||||
|
private oauthTokenDao: OAuthTokenDao | null = null;
|
||||||
|
private bearerKeyDao: BearerKeyDao | null = null;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Get singleton instance
|
* Get singleton instance
|
||||||
@@ -76,6 +85,27 @@ export class JsonFileDaoFactory implements DaoFactory {
|
|||||||
return this.userConfigDao;
|
return this.userConfigDao;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
getOAuthClientDao(): OAuthClientDao {
|
||||||
|
if (!this.oauthClientDao) {
|
||||||
|
this.oauthClientDao = new OAuthClientDaoImpl();
|
||||||
|
}
|
||||||
|
return this.oauthClientDao;
|
||||||
|
}
|
||||||
|
|
||||||
|
getOAuthTokenDao(): OAuthTokenDao {
|
||||||
|
if (!this.oauthTokenDao) {
|
||||||
|
this.oauthTokenDao = new OAuthTokenDaoImpl();
|
||||||
|
}
|
||||||
|
return this.oauthTokenDao;
|
||||||
|
}
|
||||||
|
|
||||||
|
getBearerKeyDao(): BearerKeyDao {
|
||||||
|
if (!this.bearerKeyDao) {
|
||||||
|
this.bearerKeyDao = new BearerKeyDaoImpl();
|
||||||
|
}
|
||||||
|
return this.bearerKeyDao;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Reset all cached DAO instances (useful for testing)
|
* Reset all cached DAO instances (useful for testing)
|
||||||
*/
|
*/
|
||||||
@@ -85,6 +115,9 @@ export class JsonFileDaoFactory implements DaoFactory {
|
|||||||
this.groupDao = null;
|
this.groupDao = null;
|
||||||
this.systemConfigDao = null;
|
this.systemConfigDao = null;
|
||||||
this.userConfigDao = null;
|
this.userConfigDao = null;
|
||||||
|
this.oauthClientDao = null;
|
||||||
|
this.oauthTokenDao = null;
|
||||||
|
this.bearerKeyDao = null;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -149,3 +182,15 @@ export function getSystemConfigDao(): SystemConfigDao {
|
|||||||
export function getUserConfigDao(): UserConfigDao {
|
export function getUserConfigDao(): UserConfigDao {
|
||||||
return getDaoFactory().getUserConfigDao();
|
return getDaoFactory().getUserConfigDao();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
export function getOAuthClientDao(): OAuthClientDao {
|
||||||
|
return getDaoFactory().getOAuthClientDao();
|
||||||
|
}
|
||||||
|
|
||||||
|
export function getOAuthTokenDao(): OAuthTokenDao {
|
||||||
|
return getDaoFactory().getOAuthTokenDao();
|
||||||
|
}
|
||||||
|
|
||||||
|
export function getBearerKeyDao(): BearerKeyDao {
|
||||||
|
return getDaoFactory().getBearerKeyDao();
|
||||||
|
}
|
||||||
|
|||||||
@@ -1,9 +1,22 @@
|
|||||||
import { DaoFactory, UserDao, ServerDao, GroupDao, SystemConfigDao, UserConfigDao } from './index.js';
|
import {
|
||||||
|
DaoFactory,
|
||||||
|
UserDao,
|
||||||
|
ServerDao,
|
||||||
|
GroupDao,
|
||||||
|
SystemConfigDao,
|
||||||
|
UserConfigDao,
|
||||||
|
OAuthClientDao,
|
||||||
|
OAuthTokenDao,
|
||||||
|
BearerKeyDao,
|
||||||
|
} from './index.js';
|
||||||
import { UserDaoDbImpl } from './UserDaoDbImpl.js';
|
import { UserDaoDbImpl } from './UserDaoDbImpl.js';
|
||||||
import { ServerDaoDbImpl } from './ServerDaoDbImpl.js';
|
import { ServerDaoDbImpl } from './ServerDaoDbImpl.js';
|
||||||
import { GroupDaoDbImpl } from './GroupDaoDbImpl.js';
|
import { GroupDaoDbImpl } from './GroupDaoDbImpl.js';
|
||||||
import { SystemConfigDaoDbImpl } from './SystemConfigDaoDbImpl.js';
|
import { SystemConfigDaoDbImpl } from './SystemConfigDaoDbImpl.js';
|
||||||
import { UserConfigDaoDbImpl } from './UserConfigDaoDbImpl.js';
|
import { UserConfigDaoDbImpl } from './UserConfigDaoDbImpl.js';
|
||||||
|
import { OAuthClientDaoDbImpl } from './OAuthClientDaoDbImpl.js';
|
||||||
|
import { OAuthTokenDaoDbImpl } from './OAuthTokenDaoDbImpl.js';
|
||||||
|
import { BearerKeyDaoDbImpl } from './BearerKeyDaoDbImpl.js';
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Database-backed DAO factory implementation
|
* Database-backed DAO factory implementation
|
||||||
@@ -16,6 +29,9 @@ export class DatabaseDaoFactory implements DaoFactory {
|
|||||||
private groupDao: GroupDao | null = null;
|
private groupDao: GroupDao | null = null;
|
||||||
private systemConfigDao: SystemConfigDao | null = null;
|
private systemConfigDao: SystemConfigDao | null = null;
|
||||||
private userConfigDao: UserConfigDao | null = null;
|
private userConfigDao: UserConfigDao | null = null;
|
||||||
|
private oauthClientDao: OAuthClientDao | null = null;
|
||||||
|
private oauthTokenDao: OAuthTokenDao | null = null;
|
||||||
|
private bearerKeyDao: BearerKeyDao | null = null;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Get singleton instance
|
* Get singleton instance
|
||||||
@@ -66,6 +82,27 @@ export class DatabaseDaoFactory implements DaoFactory {
|
|||||||
return this.userConfigDao!;
|
return this.userConfigDao!;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
getOAuthClientDao(): OAuthClientDao {
|
||||||
|
if (!this.oauthClientDao) {
|
||||||
|
this.oauthClientDao = new OAuthClientDaoDbImpl();
|
||||||
|
}
|
||||||
|
return this.oauthClientDao!;
|
||||||
|
}
|
||||||
|
|
||||||
|
getOAuthTokenDao(): OAuthTokenDao {
|
||||||
|
if (!this.oauthTokenDao) {
|
||||||
|
this.oauthTokenDao = new OAuthTokenDaoDbImpl();
|
||||||
|
}
|
||||||
|
return this.oauthTokenDao!;
|
||||||
|
}
|
||||||
|
|
||||||
|
getBearerKeyDao(): BearerKeyDao {
|
||||||
|
if (!this.bearerKeyDao) {
|
||||||
|
this.bearerKeyDao = new BearerKeyDaoDbImpl();
|
||||||
|
}
|
||||||
|
return this.bearerKeyDao!;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Reset all cached DAO instances (useful for testing)
|
* Reset all cached DAO instances (useful for testing)
|
||||||
*/
|
*/
|
||||||
@@ -75,5 +112,8 @@ export class DatabaseDaoFactory implements DaoFactory {
|
|||||||
this.groupDao = null;
|
this.groupDao = null;
|
||||||
this.systemConfigDao = null;
|
this.systemConfigDao = null;
|
||||||
this.userConfigDao = null;
|
this.userConfigDao = null;
|
||||||
|
this.oauthClientDao = null;
|
||||||
|
this.oauthTokenDao = null;
|
||||||
|
this.bearerKeyDao = null;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -36,6 +36,11 @@ export interface GroupDao extends BaseDao<IGroup, string> {
|
|||||||
* Find group by name
|
* Find group by name
|
||||||
*/
|
*/
|
||||||
findByName(name: string): Promise<IGroup | null>;
|
findByName(name: string): Promise<IGroup | null>;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Update server name in all groups (when server is renamed)
|
||||||
|
*/
|
||||||
|
updateServerName(oldName: string, newName: string): Promise<number>;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -218,4 +223,39 @@ export class GroupDaoImpl extends JsonFileBaseDao implements GroupDao {
|
|||||||
const groups = await this.getAll();
|
const groups = await this.getAll();
|
||||||
return groups.find((group) => group.name === name) || null;
|
return groups.find((group) => group.name === name) || null;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
async updateServerName(oldName: string, newName: string): Promise<number> {
|
||||||
|
const groups = await this.getAll();
|
||||||
|
let updatedCount = 0;
|
||||||
|
|
||||||
|
for (const group of groups) {
|
||||||
|
let updated = false;
|
||||||
|
const newServers = group.servers.map((server) => {
|
||||||
|
if (typeof server === 'string') {
|
||||||
|
if (server === oldName) {
|
||||||
|
updated = true;
|
||||||
|
return newName;
|
||||||
|
}
|
||||||
|
return server;
|
||||||
|
} else {
|
||||||
|
if (server.name === oldName) {
|
||||||
|
updated = true;
|
||||||
|
return { ...server, name: newName };
|
||||||
|
}
|
||||||
|
return server;
|
||||||
|
}
|
||||||
|
}) as IGroup['servers'];
|
||||||
|
|
||||||
|
if (updated) {
|
||||||
|
group.servers = newServers;
|
||||||
|
updatedCount++;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (updatedCount > 0) {
|
||||||
|
await this.saveAll(groups);
|
||||||
|
}
|
||||||
|
|
||||||
|
return updatedCount;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -151,4 +151,35 @@ export class GroupDaoDbImpl implements GroupDao {
|
|||||||
owner: group.owner,
|
owner: group.owner,
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
|
async updateServerName(oldName: string, newName: string): Promise<number> {
|
||||||
|
const allGroups = await this.repository.findAll();
|
||||||
|
let updatedCount = 0;
|
||||||
|
|
||||||
|
for (const group of allGroups) {
|
||||||
|
let updated = false;
|
||||||
|
const newServers = group.servers.map((server) => {
|
||||||
|
if (typeof server === 'string') {
|
||||||
|
if (server === oldName) {
|
||||||
|
updated = true;
|
||||||
|
return newName;
|
||||||
|
}
|
||||||
|
return server;
|
||||||
|
} else {
|
||||||
|
if (server.name === oldName) {
|
||||||
|
updated = true;
|
||||||
|
return { ...server, name: newName };
|
||||||
|
}
|
||||||
|
return server;
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
if (updated) {
|
||||||
|
await this.update(group.id, { servers: newServers as any });
|
||||||
|
updatedCount++;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return updatedCount;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
146
src/dao/OAuthClientDao.ts
Normal file
146
src/dao/OAuthClientDao.ts
Normal file
@@ -0,0 +1,146 @@
|
|||||||
|
import { IOAuthClient } from '../types/index.js';
|
||||||
|
import { BaseDao } from './base/BaseDao.js';
|
||||||
|
import { JsonFileBaseDao } from './base/JsonFileBaseDao.js';
|
||||||
|
|
||||||
|
/**
|
||||||
|
* OAuth Client DAO interface with OAuth client-specific operations
|
||||||
|
*/
|
||||||
|
export interface OAuthClientDao extends BaseDao<IOAuthClient, string> {
|
||||||
|
/**
|
||||||
|
* Find OAuth client by client ID
|
||||||
|
*/
|
||||||
|
findByClientId(clientId: string): Promise<IOAuthClient | null>;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Find OAuth clients by owner
|
||||||
|
*/
|
||||||
|
findByOwner(owner: string): Promise<IOAuthClient[]>;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Validate client credentials
|
||||||
|
*/
|
||||||
|
validateCredentials(clientId: string, clientSecret?: string): Promise<boolean>;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* JSON file-based OAuth Client DAO implementation
|
||||||
|
*/
|
||||||
|
export class OAuthClientDaoImpl extends JsonFileBaseDao implements OAuthClientDao {
|
||||||
|
protected async getAll(): Promise<IOAuthClient[]> {
|
||||||
|
const settings = await this.loadSettings();
|
||||||
|
return settings.oauthClients || [];
|
||||||
|
}
|
||||||
|
|
||||||
|
protected async saveAll(clients: IOAuthClient[]): Promise<void> {
|
||||||
|
const settings = await this.loadSettings();
|
||||||
|
settings.oauthClients = clients;
|
||||||
|
await this.saveSettings(settings);
|
||||||
|
}
|
||||||
|
|
||||||
|
protected getEntityId(client: IOAuthClient): string {
|
||||||
|
return client.clientId;
|
||||||
|
}
|
||||||
|
|
||||||
|
protected createEntity(_data: Omit<IOAuthClient, 'clientId'>): IOAuthClient {
|
||||||
|
throw new Error('clientId must be provided');
|
||||||
|
}
|
||||||
|
|
||||||
|
protected updateEntity(existing: IOAuthClient, updates: Partial<IOAuthClient>): IOAuthClient {
|
||||||
|
return {
|
||||||
|
...existing,
|
||||||
|
...updates,
|
||||||
|
clientId: existing.clientId, // clientId should not be updated
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
async findAll(): Promise<IOAuthClient[]> {
|
||||||
|
return this.getAll();
|
||||||
|
}
|
||||||
|
|
||||||
|
async findById(clientId: string): Promise<IOAuthClient | null> {
|
||||||
|
return this.findByClientId(clientId);
|
||||||
|
}
|
||||||
|
|
||||||
|
async findByClientId(clientId: string): Promise<IOAuthClient | null> {
|
||||||
|
const clients = await this.getAll();
|
||||||
|
return clients.find((client) => client.clientId === clientId) || null;
|
||||||
|
}
|
||||||
|
|
||||||
|
async findByOwner(owner: string): Promise<IOAuthClient[]> {
|
||||||
|
const clients = await this.getAll();
|
||||||
|
return clients.filter((client) => client.owner === owner);
|
||||||
|
}
|
||||||
|
|
||||||
|
async create(data: IOAuthClient): Promise<IOAuthClient> {
|
||||||
|
const clients = await this.getAll();
|
||||||
|
|
||||||
|
// Check if client already exists
|
||||||
|
if (clients.find((client) => client.clientId === data.clientId)) {
|
||||||
|
throw new Error(`OAuth client ${data.clientId} already exists`);
|
||||||
|
}
|
||||||
|
|
||||||
|
const newClient: IOAuthClient = {
|
||||||
|
...data,
|
||||||
|
owner: data.owner || 'admin',
|
||||||
|
};
|
||||||
|
|
||||||
|
clients.push(newClient);
|
||||||
|
await this.saveAll(clients);
|
||||||
|
|
||||||
|
return newClient;
|
||||||
|
}
|
||||||
|
|
||||||
|
async update(clientId: string, updates: Partial<IOAuthClient>): Promise<IOAuthClient | null> {
|
||||||
|
const clients = await this.getAll();
|
||||||
|
const index = clients.findIndex((client) => client.clientId === clientId);
|
||||||
|
|
||||||
|
if (index === -1) {
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Don't allow clientId changes
|
||||||
|
const { clientId: _, ...allowedUpdates } = updates;
|
||||||
|
const updatedClient = this.updateEntity(clients[index], allowedUpdates);
|
||||||
|
clients[index] = updatedClient;
|
||||||
|
|
||||||
|
await this.saveAll(clients);
|
||||||
|
return updatedClient;
|
||||||
|
}
|
||||||
|
|
||||||
|
async delete(clientId: string): Promise<boolean> {
|
||||||
|
const clients = await this.getAll();
|
||||||
|
const index = clients.findIndex((client) => client.clientId === clientId);
|
||||||
|
if (index === -1) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
clients.splice(index, 1);
|
||||||
|
await this.saveAll(clients);
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
async exists(clientId: string): Promise<boolean> {
|
||||||
|
const client = await this.findByClientId(clientId);
|
||||||
|
return client !== null;
|
||||||
|
}
|
||||||
|
|
||||||
|
async count(): Promise<number> {
|
||||||
|
const clients = await this.getAll();
|
||||||
|
return clients.length;
|
||||||
|
}
|
||||||
|
|
||||||
|
async validateCredentials(clientId: string, clientSecret?: string): Promise<boolean> {
|
||||||
|
const client = await this.findByClientId(clientId);
|
||||||
|
if (!client) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
// If client has no secret (public client), accept if no secret provided
|
||||||
|
if (!client.clientSecret) {
|
||||||
|
return !clientSecret;
|
||||||
|
}
|
||||||
|
|
||||||
|
// If client has a secret, it must match
|
||||||
|
return client.clientSecret === clientSecret;
|
||||||
|
}
|
||||||
|
}
|
||||||
109
src/dao/OAuthClientDaoDbImpl.ts
Normal file
109
src/dao/OAuthClientDaoDbImpl.ts
Normal file
@@ -0,0 +1,109 @@
|
|||||||
|
import { OAuthClientDao } from './OAuthClientDao.js';
|
||||||
|
import { OAuthClientRepository } from '../db/repositories/OAuthClientRepository.js';
|
||||||
|
import { IOAuthClient } from '../types/index.js';
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Database-backed implementation of OAuthClientDao
|
||||||
|
*/
|
||||||
|
export class OAuthClientDaoDbImpl implements OAuthClientDao {
|
||||||
|
private repository: OAuthClientRepository;
|
||||||
|
|
||||||
|
constructor() {
|
||||||
|
this.repository = new OAuthClientRepository();
|
||||||
|
}
|
||||||
|
|
||||||
|
async findAll(): Promise<IOAuthClient[]> {
|
||||||
|
const clients = await this.repository.findAll();
|
||||||
|
return clients.map((c) => this.mapToOAuthClient(c));
|
||||||
|
}
|
||||||
|
|
||||||
|
async findById(clientId: string): Promise<IOAuthClient | null> {
|
||||||
|
const client = await this.repository.findByClientId(clientId);
|
||||||
|
return client ? this.mapToOAuthClient(client) : null;
|
||||||
|
}
|
||||||
|
|
||||||
|
async findByClientId(clientId: string): Promise<IOAuthClient | null> {
|
||||||
|
return this.findById(clientId);
|
||||||
|
}
|
||||||
|
|
||||||
|
async findByOwner(owner: string): Promise<IOAuthClient[]> {
|
||||||
|
const clients = await this.repository.findByOwner(owner);
|
||||||
|
return clients.map((c) => this.mapToOAuthClient(c));
|
||||||
|
}
|
||||||
|
|
||||||
|
async create(entity: IOAuthClient): Promise<IOAuthClient> {
|
||||||
|
const client = await this.repository.create({
|
||||||
|
clientId: entity.clientId,
|
||||||
|
clientSecret: entity.clientSecret,
|
||||||
|
name: entity.name,
|
||||||
|
redirectUris: entity.redirectUris,
|
||||||
|
grants: entity.grants,
|
||||||
|
scopes: entity.scopes,
|
||||||
|
owner: entity.owner || 'admin',
|
||||||
|
metadata: entity.metadata,
|
||||||
|
});
|
||||||
|
return this.mapToOAuthClient(client);
|
||||||
|
}
|
||||||
|
|
||||||
|
async update(clientId: string, entity: Partial<IOAuthClient>): Promise<IOAuthClient | null> {
|
||||||
|
const client = await this.repository.update(clientId, {
|
||||||
|
clientSecret: entity.clientSecret,
|
||||||
|
name: entity.name,
|
||||||
|
redirectUris: entity.redirectUris,
|
||||||
|
grants: entity.grants,
|
||||||
|
scopes: entity.scopes,
|
||||||
|
owner: entity.owner,
|
||||||
|
metadata: entity.metadata,
|
||||||
|
});
|
||||||
|
return client ? this.mapToOAuthClient(client) : null;
|
||||||
|
}
|
||||||
|
|
||||||
|
async delete(clientId: string): Promise<boolean> {
|
||||||
|
return await this.repository.delete(clientId);
|
||||||
|
}
|
||||||
|
|
||||||
|
async exists(clientId: string): Promise<boolean> {
|
||||||
|
return await this.repository.exists(clientId);
|
||||||
|
}
|
||||||
|
|
||||||
|
async count(): Promise<number> {
|
||||||
|
return await this.repository.count();
|
||||||
|
}
|
||||||
|
|
||||||
|
async validateCredentials(clientId: string, clientSecret?: string): Promise<boolean> {
|
||||||
|
const client = await this.findByClientId(clientId);
|
||||||
|
if (!client) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
// If client has no secret (public client), accept if no secret provided
|
||||||
|
if (!client.clientSecret) {
|
||||||
|
return !clientSecret;
|
||||||
|
}
|
||||||
|
|
||||||
|
// If client has a secret, it must match
|
||||||
|
return client.clientSecret === clientSecret;
|
||||||
|
}
|
||||||
|
|
||||||
|
private mapToOAuthClient(client: {
|
||||||
|
clientId: string;
|
||||||
|
clientSecret?: string;
|
||||||
|
name: string;
|
||||||
|
redirectUris: string[];
|
||||||
|
grants: string[];
|
||||||
|
scopes?: string[];
|
||||||
|
owner?: string;
|
||||||
|
metadata?: Record<string, any>;
|
||||||
|
}): IOAuthClient {
|
||||||
|
return {
|
||||||
|
clientId: client.clientId,
|
||||||
|
clientSecret: client.clientSecret,
|
||||||
|
name: client.name,
|
||||||
|
redirectUris: client.redirectUris,
|
||||||
|
grants: client.grants,
|
||||||
|
scopes: client.scopes,
|
||||||
|
owner: client.owner,
|
||||||
|
metadata: client.metadata as IOAuthClient['metadata'],
|
||||||
|
};
|
||||||
|
}
|
||||||
|
}
|
||||||
259
src/dao/OAuthTokenDao.ts
Normal file
259
src/dao/OAuthTokenDao.ts
Normal file
@@ -0,0 +1,259 @@
|
|||||||
|
import { IOAuthToken } from '../types/index.js';
|
||||||
|
import { BaseDao } from './base/BaseDao.js';
|
||||||
|
import { JsonFileBaseDao } from './base/JsonFileBaseDao.js';
|
||||||
|
|
||||||
|
/**
|
||||||
|
* OAuth Token DAO interface with OAuth token-specific operations
|
||||||
|
*/
|
||||||
|
export interface OAuthTokenDao extends BaseDao<IOAuthToken, string> {
|
||||||
|
/**
|
||||||
|
* Find token by access token
|
||||||
|
*/
|
||||||
|
findByAccessToken(accessToken: string): Promise<IOAuthToken | null>;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Find token by refresh token
|
||||||
|
*/
|
||||||
|
findByRefreshToken(refreshToken: string): Promise<IOAuthToken | null>;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Find tokens by client ID
|
||||||
|
*/
|
||||||
|
findByClientId(clientId: string): Promise<IOAuthToken[]>;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Find tokens by username
|
||||||
|
*/
|
||||||
|
findByUsername(username: string): Promise<IOAuthToken[]>;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Revoke token (delete by access token or refresh token)
|
||||||
|
*/
|
||||||
|
revokeToken(token: string): Promise<boolean>;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Revoke all tokens for a user
|
||||||
|
*/
|
||||||
|
revokeUserTokens(username: string): Promise<number>;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Revoke all tokens for a client
|
||||||
|
*/
|
||||||
|
revokeClientTokens(clientId: string): Promise<number>;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Clean up expired tokens
|
||||||
|
*/
|
||||||
|
cleanupExpired(): Promise<number>;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Check if access token is valid (exists and not expired)
|
||||||
|
*/
|
||||||
|
isAccessTokenValid(accessToken: string): Promise<boolean>;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Check if refresh token is valid (exists and not expired)
|
||||||
|
*/
|
||||||
|
isRefreshTokenValid(refreshToken: string): Promise<boolean>;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* JSON file-based OAuth Token DAO implementation
|
||||||
|
*/
|
||||||
|
export class OAuthTokenDaoImpl extends JsonFileBaseDao implements OAuthTokenDao {
|
||||||
|
protected async getAll(): Promise<IOAuthToken[]> {
|
||||||
|
const settings = await this.loadSettings();
|
||||||
|
// Convert stored dates back to Date objects
|
||||||
|
return (settings.oauthTokens || []).map((token) => ({
|
||||||
|
...token,
|
||||||
|
accessTokenExpiresAt: new Date(token.accessTokenExpiresAt),
|
||||||
|
refreshTokenExpiresAt: token.refreshTokenExpiresAt
|
||||||
|
? new Date(token.refreshTokenExpiresAt)
|
||||||
|
: undefined,
|
||||||
|
}));
|
||||||
|
}
|
||||||
|
|
||||||
|
protected async saveAll(tokens: IOAuthToken[]): Promise<void> {
|
||||||
|
const settings = await this.loadSettings();
|
||||||
|
settings.oauthTokens = tokens;
|
||||||
|
await this.saveSettings(settings);
|
||||||
|
}
|
||||||
|
|
||||||
|
protected getEntityId(token: IOAuthToken): string {
|
||||||
|
return token.accessToken;
|
||||||
|
}
|
||||||
|
|
||||||
|
protected createEntity(_data: Omit<IOAuthToken, 'accessToken'>): IOAuthToken {
|
||||||
|
throw new Error('accessToken must be provided');
|
||||||
|
}
|
||||||
|
|
||||||
|
protected updateEntity(existing: IOAuthToken, updates: Partial<IOAuthToken>): IOAuthToken {
|
||||||
|
return {
|
||||||
|
...existing,
|
||||||
|
...updates,
|
||||||
|
accessToken: existing.accessToken, // accessToken should not be updated
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
async findAll(): Promise<IOAuthToken[]> {
|
||||||
|
return this.getAll();
|
||||||
|
}
|
||||||
|
|
||||||
|
async findById(accessToken: string): Promise<IOAuthToken | null> {
|
||||||
|
return this.findByAccessToken(accessToken);
|
||||||
|
}
|
||||||
|
|
||||||
|
async findByAccessToken(accessToken: string): Promise<IOAuthToken | null> {
|
||||||
|
const tokens = await this.getAll();
|
||||||
|
return tokens.find((token) => token.accessToken === accessToken) || null;
|
||||||
|
}
|
||||||
|
|
||||||
|
async findByRefreshToken(refreshToken: string): Promise<IOAuthToken | null> {
|
||||||
|
const tokens = await this.getAll();
|
||||||
|
return tokens.find((token) => token.refreshToken === refreshToken) || null;
|
||||||
|
}
|
||||||
|
|
||||||
|
async findByClientId(clientId: string): Promise<IOAuthToken[]> {
|
||||||
|
const tokens = await this.getAll();
|
||||||
|
return tokens.filter((token) => token.clientId === clientId);
|
||||||
|
}
|
||||||
|
|
||||||
|
async findByUsername(username: string): Promise<IOAuthToken[]> {
|
||||||
|
const tokens = await this.getAll();
|
||||||
|
return tokens.filter((token) => token.username === username);
|
||||||
|
}
|
||||||
|
|
||||||
|
async create(data: IOAuthToken): Promise<IOAuthToken> {
|
||||||
|
const tokens = await this.getAll();
|
||||||
|
|
||||||
|
// Remove any existing tokens with the same access token or refresh token
|
||||||
|
const filteredTokens = tokens.filter(
|
||||||
|
(t) => t.accessToken !== data.accessToken && t.refreshToken !== data.refreshToken,
|
||||||
|
);
|
||||||
|
|
||||||
|
const newToken: IOAuthToken = {
|
||||||
|
...data,
|
||||||
|
};
|
||||||
|
|
||||||
|
filteredTokens.push(newToken);
|
||||||
|
await this.saveAll(filteredTokens);
|
||||||
|
|
||||||
|
return newToken;
|
||||||
|
}
|
||||||
|
|
||||||
|
async update(accessToken: string, updates: Partial<IOAuthToken>): Promise<IOAuthToken | null> {
|
||||||
|
const tokens = await this.getAll();
|
||||||
|
const index = tokens.findIndex((token) => token.accessToken === accessToken);
|
||||||
|
|
||||||
|
if (index === -1) {
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Don't allow accessToken changes
|
||||||
|
const { accessToken: _, ...allowedUpdates } = updates;
|
||||||
|
const updatedToken = this.updateEntity(tokens[index], allowedUpdates);
|
||||||
|
tokens[index] = updatedToken;
|
||||||
|
|
||||||
|
await this.saveAll(tokens);
|
||||||
|
return updatedToken;
|
||||||
|
}
|
||||||
|
|
||||||
|
async delete(accessToken: string): Promise<boolean> {
|
||||||
|
const tokens = await this.getAll();
|
||||||
|
const index = tokens.findIndex((token) => token.accessToken === accessToken);
|
||||||
|
if (index === -1) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
tokens.splice(index, 1);
|
||||||
|
await this.saveAll(tokens);
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
async exists(accessToken: string): Promise<boolean> {
|
||||||
|
const token = await this.findByAccessToken(accessToken);
|
||||||
|
return token !== null;
|
||||||
|
}
|
||||||
|
|
||||||
|
async count(): Promise<number> {
|
||||||
|
const tokens = await this.getAll();
|
||||||
|
return tokens.length;
|
||||||
|
}
|
||||||
|
|
||||||
|
async revokeToken(token: string): Promise<boolean> {
|
||||||
|
const tokens = await this.getAll();
|
||||||
|
const tokenData = tokens.find((t) => t.accessToken === token || t.refreshToken === token);
|
||||||
|
|
||||||
|
if (!tokenData) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
const filteredTokens = tokens.filter(
|
||||||
|
(t) => t.accessToken !== tokenData.accessToken && t.refreshToken !== tokenData.refreshToken,
|
||||||
|
);
|
||||||
|
|
||||||
|
await this.saveAll(filteredTokens);
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
async revokeUserTokens(username: string): Promise<number> {
|
||||||
|
const tokens = await this.getAll();
|
||||||
|
const userTokens = tokens.filter((token) => token.username === username);
|
||||||
|
const remainingTokens = tokens.filter((token) => token.username !== username);
|
||||||
|
|
||||||
|
await this.saveAll(remainingTokens);
|
||||||
|
return userTokens.length;
|
||||||
|
}
|
||||||
|
|
||||||
|
async revokeClientTokens(clientId: string): Promise<number> {
|
||||||
|
const tokens = await this.getAll();
|
||||||
|
const clientTokens = tokens.filter((token) => token.clientId === clientId);
|
||||||
|
const remainingTokens = tokens.filter((token) => token.clientId !== clientId);
|
||||||
|
|
||||||
|
await this.saveAll(remainingTokens);
|
||||||
|
return clientTokens.length;
|
||||||
|
}
|
||||||
|
|
||||||
|
async cleanupExpired(): Promise<number> {
|
||||||
|
const tokens = await this.getAll();
|
||||||
|
const now = new Date();
|
||||||
|
|
||||||
|
const validTokens = tokens.filter((token) => {
|
||||||
|
// Keep if access token is still valid
|
||||||
|
if (token.accessTokenExpiresAt > now) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
// Or if refresh token exists and is still valid
|
||||||
|
if (token.refreshToken && token.refreshTokenExpiresAt && token.refreshTokenExpiresAt > now) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
return false;
|
||||||
|
});
|
||||||
|
|
||||||
|
const expiredCount = tokens.length - validTokens.length;
|
||||||
|
if (expiredCount > 0) {
|
||||||
|
await this.saveAll(validTokens);
|
||||||
|
}
|
||||||
|
|
||||||
|
return expiredCount;
|
||||||
|
}
|
||||||
|
|
||||||
|
async isAccessTokenValid(accessToken: string): Promise<boolean> {
|
||||||
|
const token = await this.findByAccessToken(accessToken);
|
||||||
|
if (!token) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
return token.accessTokenExpiresAt > new Date();
|
||||||
|
}
|
||||||
|
|
||||||
|
async isRefreshTokenValid(refreshToken: string): Promise<boolean> {
|
||||||
|
const token = await this.findByRefreshToken(refreshToken);
|
||||||
|
if (!token) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
if (!token.refreshTokenExpiresAt) {
|
||||||
|
return true; // No expiration means always valid
|
||||||
|
}
|
||||||
|
return token.refreshTokenExpiresAt > new Date();
|
||||||
|
}
|
||||||
|
}
|
||||||
122
src/dao/OAuthTokenDaoDbImpl.ts
Normal file
122
src/dao/OAuthTokenDaoDbImpl.ts
Normal file
@@ -0,0 +1,122 @@
|
|||||||
|
import { OAuthTokenDao } from './OAuthTokenDao.js';
|
||||||
|
import { OAuthTokenRepository } from '../db/repositories/OAuthTokenRepository.js';
|
||||||
|
import { IOAuthToken } from '../types/index.js';
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Database-backed implementation of OAuthTokenDao
|
||||||
|
*/
|
||||||
|
export class OAuthTokenDaoDbImpl implements OAuthTokenDao {
|
||||||
|
private repository: OAuthTokenRepository;
|
||||||
|
|
||||||
|
constructor() {
|
||||||
|
this.repository = new OAuthTokenRepository();
|
||||||
|
}
|
||||||
|
|
||||||
|
async findAll(): Promise<IOAuthToken[]> {
|
||||||
|
const tokens = await this.repository.findAll();
|
||||||
|
return tokens.map((t) => this.mapToOAuthToken(t));
|
||||||
|
}
|
||||||
|
|
||||||
|
async findById(accessToken: string): Promise<IOAuthToken | null> {
|
||||||
|
const token = await this.repository.findByAccessToken(accessToken);
|
||||||
|
return token ? this.mapToOAuthToken(token) : null;
|
||||||
|
}
|
||||||
|
|
||||||
|
async findByAccessToken(accessToken: string): Promise<IOAuthToken | null> {
|
||||||
|
return this.findById(accessToken);
|
||||||
|
}
|
||||||
|
|
||||||
|
async findByRefreshToken(refreshToken: string): Promise<IOAuthToken | null> {
|
||||||
|
const token = await this.repository.findByRefreshToken(refreshToken);
|
||||||
|
return token ? this.mapToOAuthToken(token) : null;
|
||||||
|
}
|
||||||
|
|
||||||
|
async findByClientId(clientId: string): Promise<IOAuthToken[]> {
|
||||||
|
const tokens = await this.repository.findByClientId(clientId);
|
||||||
|
return tokens.map((t) => this.mapToOAuthToken(t));
|
||||||
|
}
|
||||||
|
|
||||||
|
async findByUsername(username: string): Promise<IOAuthToken[]> {
|
||||||
|
const tokens = await this.repository.findByUsername(username);
|
||||||
|
return tokens.map((t) => this.mapToOAuthToken(t));
|
||||||
|
}
|
||||||
|
|
||||||
|
async create(entity: IOAuthToken): Promise<IOAuthToken> {
|
||||||
|
const token = await this.repository.create({
|
||||||
|
accessToken: entity.accessToken,
|
||||||
|
accessTokenExpiresAt: entity.accessTokenExpiresAt,
|
||||||
|
refreshToken: entity.refreshToken,
|
||||||
|
refreshTokenExpiresAt: entity.refreshTokenExpiresAt,
|
||||||
|
scope: entity.scope,
|
||||||
|
clientId: entity.clientId,
|
||||||
|
username: entity.username,
|
||||||
|
});
|
||||||
|
return this.mapToOAuthToken(token);
|
||||||
|
}
|
||||||
|
|
||||||
|
async update(accessToken: string, entity: Partial<IOAuthToken>): Promise<IOAuthToken | null> {
|
||||||
|
const token = await this.repository.update(accessToken, {
|
||||||
|
accessTokenExpiresAt: entity.accessTokenExpiresAt,
|
||||||
|
refreshToken: entity.refreshToken,
|
||||||
|
refreshTokenExpiresAt: entity.refreshTokenExpiresAt,
|
||||||
|
scope: entity.scope,
|
||||||
|
});
|
||||||
|
return token ? this.mapToOAuthToken(token) : null;
|
||||||
|
}
|
||||||
|
|
||||||
|
async delete(accessToken: string): Promise<boolean> {
|
||||||
|
return await this.repository.delete(accessToken);
|
||||||
|
}
|
||||||
|
|
||||||
|
async exists(accessToken: string): Promise<boolean> {
|
||||||
|
return await this.repository.exists(accessToken);
|
||||||
|
}
|
||||||
|
|
||||||
|
async count(): Promise<number> {
|
||||||
|
return await this.repository.count();
|
||||||
|
}
|
||||||
|
|
||||||
|
async revokeToken(token: string): Promise<boolean> {
|
||||||
|
return await this.repository.revokeToken(token);
|
||||||
|
}
|
||||||
|
|
||||||
|
async revokeUserTokens(username: string): Promise<number> {
|
||||||
|
return await this.repository.revokeUserTokens(username);
|
||||||
|
}
|
||||||
|
|
||||||
|
async revokeClientTokens(clientId: string): Promise<number> {
|
||||||
|
return await this.repository.revokeClientTokens(clientId);
|
||||||
|
}
|
||||||
|
|
||||||
|
async cleanupExpired(): Promise<number> {
|
||||||
|
return await this.repository.cleanupExpired();
|
||||||
|
}
|
||||||
|
|
||||||
|
async isAccessTokenValid(accessToken: string): Promise<boolean> {
|
||||||
|
return await this.repository.isAccessTokenValid(accessToken);
|
||||||
|
}
|
||||||
|
|
||||||
|
async isRefreshTokenValid(refreshToken: string): Promise<boolean> {
|
||||||
|
return await this.repository.isRefreshTokenValid(refreshToken);
|
||||||
|
}
|
||||||
|
|
||||||
|
private mapToOAuthToken(token: {
|
||||||
|
accessToken: string;
|
||||||
|
accessTokenExpiresAt: Date;
|
||||||
|
refreshToken?: string;
|
||||||
|
refreshTokenExpiresAt?: Date;
|
||||||
|
scope?: string;
|
||||||
|
clientId: string;
|
||||||
|
username: string;
|
||||||
|
}): IOAuthToken {
|
||||||
|
return {
|
||||||
|
accessToken: token.accessToken,
|
||||||
|
accessTokenExpiresAt: token.accessTokenExpiresAt,
|
||||||
|
refreshToken: token.refreshToken,
|
||||||
|
refreshTokenExpiresAt: token.refreshTokenExpiresAt,
|
||||||
|
scope: token.scope,
|
||||||
|
clientId: token.clientId,
|
||||||
|
username: token.username,
|
||||||
|
};
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -41,6 +41,11 @@ export interface ServerDao extends BaseDao<ServerConfigWithName, string> {
|
|||||||
name: string,
|
name: string,
|
||||||
prompts: Record<string, { enabled: boolean; description?: string }>,
|
prompts: Record<string, { enabled: boolean; description?: string }>,
|
||||||
): Promise<boolean>;
|
): Promise<boolean>;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Rename a server (change its name/key)
|
||||||
|
*/
|
||||||
|
rename(oldName: string, newName: string): Promise<boolean>;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -95,7 +100,8 @@ export class ServerDaoImpl extends JsonFileBaseDao implements ServerDao {
|
|||||||
return {
|
return {
|
||||||
...existing,
|
...existing,
|
||||||
...updates,
|
...updates,
|
||||||
name: existing.name, // Name should not be updated
|
// Keep the existing name unless explicitly updating via rename
|
||||||
|
name: updates.name ?? existing.name,
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -141,9 +147,7 @@ export class ServerDaoImpl extends JsonFileBaseDao implements ServerDao {
|
|||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
|
||||||
// Don't allow name changes
|
const updatedServer = this.updateEntity(servers[index], updates);
|
||||||
const { name: _, ...allowedUpdates } = updates;
|
|
||||||
const updatedServer = this.updateEntity(servers[index], allowedUpdates);
|
|
||||||
servers[index] = updatedServer;
|
servers[index] = updatedServer;
|
||||||
|
|
||||||
await this.saveAll(servers);
|
await this.saveAll(servers);
|
||||||
@@ -207,4 +211,22 @@ export class ServerDaoImpl extends JsonFileBaseDao implements ServerDao {
|
|||||||
const result = await this.update(name, { prompts });
|
const result = await this.update(name, { prompts });
|
||||||
return result !== null;
|
return result !== null;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
async rename(oldName: string, newName: string): Promise<boolean> {
|
||||||
|
const servers = await this.getAll();
|
||||||
|
const index = servers.findIndex((server) => server.name === oldName);
|
||||||
|
|
||||||
|
if (index === -1) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check if newName already exists
|
||||||
|
if (servers.find((server) => server.name === newName)) {
|
||||||
|
throw new Error(`Server ${newName} already exists`);
|
||||||
|
}
|
||||||
|
|
||||||
|
servers[index] = { ...servers[index], name: newName };
|
||||||
|
await this.saveAll(servers);
|
||||||
|
return true;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -38,6 +38,7 @@ export class ServerDaoDbImpl implements ServerDao {
|
|||||||
prompts: entity.prompts,
|
prompts: entity.prompts,
|
||||||
options: entity.options,
|
options: entity.options,
|
||||||
oauth: entity.oauth,
|
oauth: entity.oauth,
|
||||||
|
openapi: entity.openapi,
|
||||||
});
|
});
|
||||||
return this.mapToServerConfig(server);
|
return this.mapToServerConfig(server);
|
||||||
}
|
}
|
||||||
@@ -61,6 +62,7 @@ export class ServerDaoDbImpl implements ServerDao {
|
|||||||
prompts: entity.prompts,
|
prompts: entity.prompts,
|
||||||
options: entity.options,
|
options: entity.options,
|
||||||
oauth: entity.oauth,
|
oauth: entity.oauth,
|
||||||
|
openapi: entity.openapi,
|
||||||
});
|
});
|
||||||
return server ? this.mapToServerConfig(server) : null;
|
return server ? this.mapToServerConfig(server) : null;
|
||||||
}
|
}
|
||||||
@@ -113,6 +115,15 @@ export class ServerDaoDbImpl implements ServerDao {
|
|||||||
return result !== null;
|
return result !== null;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
async rename(oldName: string, newName: string): Promise<boolean> {
|
||||||
|
// Check if newName already exists
|
||||||
|
if (await this.repository.exists(newName)) {
|
||||||
|
throw new Error(`Server ${newName} already exists`);
|
||||||
|
}
|
||||||
|
|
||||||
|
return await this.repository.rename(oldName, newName);
|
||||||
|
}
|
||||||
|
|
||||||
private mapToServerConfig(server: {
|
private mapToServerConfig(server: {
|
||||||
name: string;
|
name: string;
|
||||||
type?: string;
|
type?: string;
|
||||||
@@ -129,6 +140,7 @@ export class ServerDaoDbImpl implements ServerDao {
|
|||||||
prompts?: Record<string, { enabled: boolean; description?: string }>;
|
prompts?: Record<string, { enabled: boolean; description?: string }>;
|
||||||
options?: Record<string, any>;
|
options?: Record<string, any>;
|
||||||
oauth?: Record<string, any>;
|
oauth?: Record<string, any>;
|
||||||
|
openapi?: Record<string, any>;
|
||||||
}): ServerConfigWithName {
|
}): ServerConfigWithName {
|
||||||
return {
|
return {
|
||||||
name: server.name,
|
name: server.name,
|
||||||
@@ -146,6 +158,7 @@ export class ServerDaoDbImpl implements ServerDao {
|
|||||||
prompts: server.prompts,
|
prompts: server.prompts,
|
||||||
options: server.options,
|
options: server.options,
|
||||||
oauth: server.oauth,
|
oauth: server.oauth,
|
||||||
|
openapi: server.openapi,
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -6,6 +6,9 @@ export * from './ServerDao.js';
|
|||||||
export * from './GroupDao.js';
|
export * from './GroupDao.js';
|
||||||
export * from './SystemConfigDao.js';
|
export * from './SystemConfigDao.js';
|
||||||
export * from './UserConfigDao.js';
|
export * from './UserConfigDao.js';
|
||||||
|
export * from './OAuthClientDao.js';
|
||||||
|
export * from './OAuthTokenDao.js';
|
||||||
|
export * from './BearerKeyDao.js';
|
||||||
|
|
||||||
// Export database implementations
|
// Export database implementations
|
||||||
export * from './UserDaoDbImpl.js';
|
export * from './UserDaoDbImpl.js';
|
||||||
@@ -13,6 +16,9 @@ export * from './ServerDaoDbImpl.js';
|
|||||||
export * from './GroupDaoDbImpl.js';
|
export * from './GroupDaoDbImpl.js';
|
||||||
export * from './SystemConfigDaoDbImpl.js';
|
export * from './SystemConfigDaoDbImpl.js';
|
||||||
export * from './UserConfigDaoDbImpl.js';
|
export * from './UserConfigDaoDbImpl.js';
|
||||||
|
export * from './OAuthClientDaoDbImpl.js';
|
||||||
|
export * from './OAuthTokenDaoDbImpl.js';
|
||||||
|
export * from './BearerKeyDaoDbImpl.js';
|
||||||
|
|
||||||
// Export the DAO factory and convenience functions
|
// Export the DAO factory and convenience functions
|
||||||
export * from './DaoFactory.js';
|
export * from './DaoFactory.js';
|
||||||
|
|||||||
@@ -25,39 +25,44 @@ const createRequiredExtensions = async (dataSource: DataSource): Promise<void> =
|
|||||||
};
|
};
|
||||||
|
|
||||||
// Get database URL from smart routing config or fallback to environment variable
|
// Get database URL from smart routing config or fallback to environment variable
|
||||||
const getDatabaseUrl = (): string => {
|
const getDatabaseUrl = async (): Promise<string> => {
|
||||||
return getSmartRoutingConfig().dbUrl;
|
return (await getSmartRoutingConfig()).dbUrl;
|
||||||
};
|
};
|
||||||
|
|
||||||
// Default database configuration
|
// Default database configuration (without URL - will be set during initialization)
|
||||||
const defaultConfig: DataSourceOptions = {
|
const getDefaultConfig = async (): Promise<DataSourceOptions> => {
|
||||||
type: 'postgres',
|
return {
|
||||||
url: getDatabaseUrl(),
|
type: 'postgres',
|
||||||
synchronize: true,
|
url: await getDatabaseUrl(),
|
||||||
entities: entities,
|
synchronize: true,
|
||||||
subscribers: [VectorEmbeddingSubscriber],
|
entities: entities,
|
||||||
|
subscribers: [VectorEmbeddingSubscriber],
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
// AppDataSource is the TypeORM data source
|
// AppDataSource is the TypeORM data source (initialized with empty config, will be updated)
|
||||||
let appDataSource = new DataSource(defaultConfig);
|
let appDataSource: DataSource | null = null;
|
||||||
|
|
||||||
// Global promise to track initialization status
|
// Global promise to track initialization status
|
||||||
let initializationPromise: Promise<DataSource> | null = null;
|
let initializationPromise: Promise<DataSource> | null = null;
|
||||||
|
|
||||||
// Function to create a new DataSource with updated configuration
|
// Function to create a new DataSource with updated configuration
|
||||||
export const updateDataSourceConfig = (): DataSource => {
|
export const updateDataSourceConfig = async (): Promise<DataSource> => {
|
||||||
const newConfig: DataSourceOptions = {
|
const newConfig = await getDefaultConfig();
|
||||||
...defaultConfig,
|
|
||||||
url: getDatabaseUrl(),
|
|
||||||
};
|
|
||||||
|
|
||||||
// If the configuration has changed, we need to create a new DataSource
|
// If the configuration has changed, we need to create a new DataSource
|
||||||
const currentUrl = (appDataSource.options as any).url;
|
if (appDataSource) {
|
||||||
if (currentUrl !== newConfig.url) {
|
const currentUrl = (appDataSource.options as any).url;
|
||||||
console.log('Database URL configuration changed, updating DataSource...');
|
const newUrl = (newConfig as any).url;
|
||||||
|
if (currentUrl !== newUrl) {
|
||||||
|
console.log('Database URL configuration changed, updating DataSource...');
|
||||||
|
appDataSource = new DataSource(newConfig);
|
||||||
|
// Reset initialization promise when configuration changes
|
||||||
|
initializationPromise = null;
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
// First time initialization
|
||||||
appDataSource = new DataSource(newConfig);
|
appDataSource = new DataSource(newConfig);
|
||||||
// Reset initialization promise when configuration changes
|
|
||||||
initializationPromise = null;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return appDataSource;
|
return appDataSource;
|
||||||
@@ -65,6 +70,9 @@ export const updateDataSourceConfig = (): DataSource => {
|
|||||||
|
|
||||||
// Get the current AppDataSource instance
|
// Get the current AppDataSource instance
|
||||||
export const getAppDataSource = (): DataSource => {
|
export const getAppDataSource = (): DataSource => {
|
||||||
|
if (!appDataSource) {
|
||||||
|
throw new Error('Database not initialized. Call initializeDatabase() first.');
|
||||||
|
}
|
||||||
return appDataSource;
|
return appDataSource;
|
||||||
};
|
};
|
||||||
|
|
||||||
@@ -72,7 +80,7 @@ export const getAppDataSource = (): DataSource => {
|
|||||||
export const reconnectDatabase = async (): Promise<DataSource> => {
|
export const reconnectDatabase = async (): Promise<DataSource> => {
|
||||||
try {
|
try {
|
||||||
// Close existing connection if it exists
|
// Close existing connection if it exists
|
||||||
if (appDataSource.isInitialized) {
|
if (appDataSource && appDataSource.isInitialized) {
|
||||||
console.log('Closing existing database connection...');
|
console.log('Closing existing database connection...');
|
||||||
await appDataSource.destroy();
|
await appDataSource.destroy();
|
||||||
}
|
}
|
||||||
@@ -81,7 +89,7 @@ export const reconnectDatabase = async (): Promise<DataSource> => {
|
|||||||
initializationPromise = null;
|
initializationPromise = null;
|
||||||
|
|
||||||
// Update configuration and reconnect
|
// Update configuration and reconnect
|
||||||
appDataSource = updateDataSourceConfig();
|
appDataSource = await updateDataSourceConfig();
|
||||||
return await initializeDatabase();
|
return await initializeDatabase();
|
||||||
} catch (error) {
|
} catch (error) {
|
||||||
console.error('Error during database reconnection:', error);
|
console.error('Error during database reconnection:', error);
|
||||||
@@ -98,7 +106,7 @@ export const initializeDatabase = async (): Promise<DataSource> => {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// If already initialized, return the existing instance
|
// If already initialized, return the existing instance
|
||||||
if (appDataSource.isInitialized) {
|
if (appDataSource && appDataSource.isInitialized) {
|
||||||
console.log('Database already initialized, returning existing instance');
|
console.log('Database already initialized, returning existing instance');
|
||||||
return Promise.resolve(appDataSource);
|
return Promise.resolve(appDataSource);
|
||||||
}
|
}
|
||||||
@@ -122,7 +130,7 @@ export const initializeDatabase = async (): Promise<DataSource> => {
|
|||||||
const performDatabaseInitialization = async (): Promise<DataSource> => {
|
const performDatabaseInitialization = async (): Promise<DataSource> => {
|
||||||
try {
|
try {
|
||||||
// Update configuration before initializing
|
// Update configuration before initializing
|
||||||
appDataSource = updateDataSourceConfig();
|
appDataSource = await updateDataSourceConfig();
|
||||||
|
|
||||||
if (!appDataSource.isInitialized) {
|
if (!appDataSource.isInitialized) {
|
||||||
console.log('Initializing database connection...');
|
console.log('Initializing database connection...');
|
||||||
@@ -250,7 +258,8 @@ const performDatabaseInitialization = async (): Promise<DataSource> => {
|
|||||||
console.log('Database connection established successfully.');
|
console.log('Database connection established successfully.');
|
||||||
|
|
||||||
// Run one final setup check after schema synchronization is done
|
// Run one final setup check after schema synchronization is done
|
||||||
if (defaultConfig.synchronize) {
|
const config = await getDefaultConfig();
|
||||||
|
if (config.synchronize) {
|
||||||
try {
|
try {
|
||||||
console.log('Running final vector configuration check...');
|
console.log('Running final vector configuration check...');
|
||||||
|
|
||||||
@@ -325,12 +334,12 @@ const performDatabaseInitialization = async (): Promise<DataSource> => {
|
|||||||
|
|
||||||
// Get database connection status
|
// Get database connection status
|
||||||
export const isDatabaseConnected = (): boolean => {
|
export const isDatabaseConnected = (): boolean => {
|
||||||
return appDataSource.isInitialized;
|
return appDataSource ? appDataSource.isInitialized : false;
|
||||||
};
|
};
|
||||||
|
|
||||||
// Close database connection
|
// Close database connection
|
||||||
export const closeDatabase = async (): Promise<void> => {
|
export const closeDatabase = async (): Promise<void> => {
|
||||||
if (appDataSource.isInitialized) {
|
if (appDataSource && appDataSource.isInitialized) {
|
||||||
await appDataSource.destroy();
|
await appDataSource.destroy();
|
||||||
console.log('Database connection closed.');
|
console.log('Database connection closed.');
|
||||||
}
|
}
|
||||||
|
|||||||
43
src/db/entities/BearerKey.ts
Normal file
43
src/db/entities/BearerKey.ts
Normal file
@@ -0,0 +1,43 @@
|
|||||||
|
import {
|
||||||
|
Entity,
|
||||||
|
Column,
|
||||||
|
PrimaryGeneratedColumn,
|
||||||
|
CreateDateColumn,
|
||||||
|
UpdateDateColumn,
|
||||||
|
} from 'typeorm';
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Bearer authentication key entity
|
||||||
|
* Stores multiple bearer keys with per-key enable/disable and scoped access control
|
||||||
|
*/
|
||||||
|
@Entity({ name: 'bearer_keys' })
|
||||||
|
export class BearerKey {
|
||||||
|
@PrimaryGeneratedColumn('uuid')
|
||||||
|
id: string;
|
||||||
|
|
||||||
|
@Column({ type: 'varchar', length: 100 })
|
||||||
|
name: string;
|
||||||
|
|
||||||
|
@Column({ type: 'varchar', length: 512 })
|
||||||
|
token: string;
|
||||||
|
|
||||||
|
@Column({ type: 'boolean', default: true })
|
||||||
|
enabled: boolean;
|
||||||
|
|
||||||
|
@Column({ type: 'varchar', length: 20, default: 'all' })
|
||||||
|
accessType: 'all' | 'groups' | 'servers' | 'custom';
|
||||||
|
|
||||||
|
@Column({ type: 'simple-json', nullable: true })
|
||||||
|
allowedGroups?: string[];
|
||||||
|
|
||||||
|
@Column({ type: 'simple-json', nullable: true })
|
||||||
|
allowedServers?: string[];
|
||||||
|
|
||||||
|
@CreateDateColumn({ name: 'created_at', type: 'timestamp' })
|
||||||
|
createdAt: Date;
|
||||||
|
|
||||||
|
@UpdateDateColumn({ name: 'updated_at', type: 'timestamp' })
|
||||||
|
updatedAt: Date;
|
||||||
|
}
|
||||||
|
|
||||||
|
export default BearerKey;
|
||||||
60
src/db/entities/OAuthClient.ts
Normal file
60
src/db/entities/OAuthClient.ts
Normal file
@@ -0,0 +1,60 @@
|
|||||||
|
import {
|
||||||
|
Entity,
|
||||||
|
Column,
|
||||||
|
PrimaryGeneratedColumn,
|
||||||
|
CreateDateColumn,
|
||||||
|
UpdateDateColumn,
|
||||||
|
} from 'typeorm';
|
||||||
|
|
||||||
|
/**
|
||||||
|
* OAuth Client entity for database storage
|
||||||
|
* Represents OAuth clients registered with MCPHub's authorization server
|
||||||
|
*/
|
||||||
|
@Entity({ name: 'oauth_clients' })
|
||||||
|
export class OAuthClient {
|
||||||
|
@PrimaryGeneratedColumn('uuid')
|
||||||
|
id: string;
|
||||||
|
|
||||||
|
@Column({ name: 'client_id', type: 'varchar', length: 255, unique: true })
|
||||||
|
clientId: string;
|
||||||
|
|
||||||
|
@Column({ name: 'client_secret', type: 'varchar', length: 255, nullable: true })
|
||||||
|
clientSecret?: string;
|
||||||
|
|
||||||
|
@Column({ type: 'varchar', length: 255 })
|
||||||
|
name: string;
|
||||||
|
|
||||||
|
@Column({ name: 'redirect_uris', type: 'simple-json' })
|
||||||
|
redirectUris: string[];
|
||||||
|
|
||||||
|
@Column({ type: 'simple-json' })
|
||||||
|
grants: string[];
|
||||||
|
|
||||||
|
@Column({ type: 'simple-json', nullable: true })
|
||||||
|
scopes?: string[];
|
||||||
|
|
||||||
|
@Column({ type: 'varchar', length: 255, nullable: true })
|
||||||
|
owner?: string;
|
||||||
|
|
||||||
|
@Column({ type: 'simple-json', nullable: true })
|
||||||
|
metadata?: {
|
||||||
|
application_type?: 'web' | 'native';
|
||||||
|
response_types?: string[];
|
||||||
|
token_endpoint_auth_method?: string;
|
||||||
|
contacts?: string[];
|
||||||
|
logo_uri?: string;
|
||||||
|
client_uri?: string;
|
||||||
|
policy_uri?: string;
|
||||||
|
tos_uri?: string;
|
||||||
|
jwks_uri?: string;
|
||||||
|
jwks?: object;
|
||||||
|
};
|
||||||
|
|
||||||
|
@CreateDateColumn({ name: 'created_at', type: 'timestamp' })
|
||||||
|
createdAt: Date;
|
||||||
|
|
||||||
|
@UpdateDateColumn({ name: 'updated_at', type: 'timestamp' })
|
||||||
|
updatedAt: Date;
|
||||||
|
}
|
||||||
|
|
||||||
|
export default OAuthClient;
|
||||||
51
src/db/entities/OAuthToken.ts
Normal file
51
src/db/entities/OAuthToken.ts
Normal file
@@ -0,0 +1,51 @@
|
|||||||
|
import {
|
||||||
|
Entity,
|
||||||
|
Column,
|
||||||
|
PrimaryGeneratedColumn,
|
||||||
|
CreateDateColumn,
|
||||||
|
UpdateDateColumn,
|
||||||
|
Index,
|
||||||
|
} from 'typeorm';
|
||||||
|
|
||||||
|
/**
|
||||||
|
* OAuth Token entity for database storage
|
||||||
|
* Represents OAuth tokens issued by MCPHub's authorization server
|
||||||
|
*/
|
||||||
|
@Entity({ name: 'oauth_tokens' })
|
||||||
|
export class OAuthToken {
|
||||||
|
@PrimaryGeneratedColumn('uuid')
|
||||||
|
id: string;
|
||||||
|
|
||||||
|
@Index()
|
||||||
|
@Column({ name: 'access_token', type: 'varchar', length: 512, unique: true })
|
||||||
|
accessToken: string;
|
||||||
|
|
||||||
|
@Column({ name: 'access_token_expires_at', type: 'timestamp' })
|
||||||
|
accessTokenExpiresAt: Date;
|
||||||
|
|
||||||
|
@Index()
|
||||||
|
@Column({ name: 'refresh_token', type: 'varchar', length: 512, nullable: true, unique: true })
|
||||||
|
refreshToken?: string;
|
||||||
|
|
||||||
|
@Column({ name: 'refresh_token_expires_at', type: 'timestamp', nullable: true })
|
||||||
|
refreshTokenExpiresAt?: Date;
|
||||||
|
|
||||||
|
@Column({ type: 'varchar', length: 512, nullable: true })
|
||||||
|
scope?: string;
|
||||||
|
|
||||||
|
@Index()
|
||||||
|
@Column({ name: 'client_id', type: 'varchar', length: 255 })
|
||||||
|
clientId: string;
|
||||||
|
|
||||||
|
@Index()
|
||||||
|
@Column({ type: 'varchar', length: 255 })
|
||||||
|
username: string;
|
||||||
|
|
||||||
|
@CreateDateColumn({ name: 'created_at', type: 'timestamp' })
|
||||||
|
createdAt: Date;
|
||||||
|
|
||||||
|
@UpdateDateColumn({ name: 'updated_at', type: 'timestamp' })
|
||||||
|
updatedAt: Date;
|
||||||
|
}
|
||||||
|
|
||||||
|
export default OAuthToken;
|
||||||
@@ -59,6 +59,9 @@ export class Server {
|
|||||||
@Column({ type: 'simple-json', nullable: true })
|
@Column({ type: 'simple-json', nullable: true })
|
||||||
oauth?: Record<string, any>;
|
oauth?: Record<string, any>;
|
||||||
|
|
||||||
|
@Column({ type: 'simple-json', nullable: true })
|
||||||
|
openapi?: Record<string, any>;
|
||||||
|
|
||||||
@CreateDateColumn({ name: 'created_at', type: 'timestamp' })
|
@CreateDateColumn({ name: 'created_at', type: 'timestamp' })
|
||||||
createdAt: Date;
|
createdAt: Date;
|
||||||
|
|
||||||
|
|||||||
@@ -33,6 +33,9 @@ export class SystemConfig {
|
|||||||
@Column({ type: 'boolean', nullable: true })
|
@Column({ type: 'boolean', nullable: true })
|
||||||
enableSessionRebuild?: boolean;
|
enableSessionRebuild?: boolean;
|
||||||
|
|
||||||
|
@Column({ type: 'simple-json', nullable: true })
|
||||||
|
compression?: Record<string, any>;
|
||||||
|
|
||||||
@CreateDateColumn({ name: 'created_at', type: 'timestamp' })
|
@CreateDateColumn({ name: 'created_at', type: 'timestamp' })
|
||||||
createdAt: Date;
|
createdAt: Date;
|
||||||
|
|
||||||
|
|||||||
@@ -4,9 +4,32 @@ import Server from './Server.js';
|
|||||||
import Group from './Group.js';
|
import Group from './Group.js';
|
||||||
import SystemConfig from './SystemConfig.js';
|
import SystemConfig from './SystemConfig.js';
|
||||||
import UserConfig from './UserConfig.js';
|
import UserConfig from './UserConfig.js';
|
||||||
|
import OAuthClient from './OAuthClient.js';
|
||||||
|
import OAuthToken from './OAuthToken.js';
|
||||||
|
import BearerKey from './BearerKey.js';
|
||||||
|
|
||||||
// Export all entities
|
// Export all entities
|
||||||
export default [VectorEmbedding, User, Server, Group, SystemConfig, UserConfig];
|
export default [
|
||||||
|
VectorEmbedding,
|
||||||
|
User,
|
||||||
|
Server,
|
||||||
|
Group,
|
||||||
|
SystemConfig,
|
||||||
|
UserConfig,
|
||||||
|
OAuthClient,
|
||||||
|
OAuthToken,
|
||||||
|
BearerKey,
|
||||||
|
];
|
||||||
|
|
||||||
// Export individual entities for direct use
|
// Export individual entities for direct use
|
||||||
export { VectorEmbedding, User, Server, Group, SystemConfig, UserConfig };
|
export {
|
||||||
|
VectorEmbedding,
|
||||||
|
User,
|
||||||
|
Server,
|
||||||
|
Group,
|
||||||
|
SystemConfig,
|
||||||
|
UserConfig,
|
||||||
|
OAuthClient,
|
||||||
|
OAuthToken,
|
||||||
|
BearerKey,
|
||||||
|
};
|
||||||
|
|||||||
75
src/db/repositories/BearerKeyRepository.ts
Normal file
75
src/db/repositories/BearerKeyRepository.ts
Normal file
@@ -0,0 +1,75 @@
|
|||||||
|
import { Repository } from 'typeorm';
|
||||||
|
import { BearerKey } from '../entities/BearerKey.js';
|
||||||
|
import { getAppDataSource } from '../connection.js';
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Repository for BearerKey entity
|
||||||
|
*/
|
||||||
|
export class BearerKeyRepository {
|
||||||
|
private repository: Repository<BearerKey>;
|
||||||
|
|
||||||
|
constructor() {
|
||||||
|
this.repository = getAppDataSource().getRepository(BearerKey);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Find all bearer keys
|
||||||
|
*/
|
||||||
|
async findAll(): Promise<BearerKey[]> {
|
||||||
|
return await this.repository.find({ order: { createdAt: 'ASC' } });
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Count bearer keys
|
||||||
|
*/
|
||||||
|
async count(): Promise<number> {
|
||||||
|
return await this.repository.count();
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Find bearer key by id
|
||||||
|
*/
|
||||||
|
async findById(id: string): Promise<BearerKey | null> {
|
||||||
|
return await this.repository.findOne({ where: { id } });
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Find bearer key by token value
|
||||||
|
*/
|
||||||
|
async findByToken(token: string): Promise<BearerKey | null> {
|
||||||
|
return await this.repository.findOne({ where: { token } });
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Create a new bearer key
|
||||||
|
*/
|
||||||
|
async create(data: Omit<BearerKey, 'id' | 'createdAt' | 'updatedAt'>): Promise<BearerKey> {
|
||||||
|
const entity = this.repository.create(data);
|
||||||
|
return await this.repository.save(entity);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Update an existing bearer key
|
||||||
|
*/
|
||||||
|
async update(
|
||||||
|
id: string,
|
||||||
|
updates: Partial<Omit<BearerKey, 'id' | 'createdAt' | 'updatedAt'>>,
|
||||||
|
): Promise<BearerKey | null> {
|
||||||
|
const existing = await this.findById(id);
|
||||||
|
if (!existing) {
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
const merged = this.repository.merge(existing, updates);
|
||||||
|
return await this.repository.save(merged);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Delete a bearer key
|
||||||
|
*/
|
||||||
|
async delete(id: string): Promise<boolean> {
|
||||||
|
const result = await this.repository.delete({ id });
|
||||||
|
return (result.affected ?? 0) > 0;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
export default BearerKeyRepository;
|
||||||
@@ -16,7 +16,7 @@ export class GroupRepository {
|
|||||||
* Find all groups
|
* Find all groups
|
||||||
*/
|
*/
|
||||||
async findAll(): Promise<Group[]> {
|
async findAll(): Promise<Group[]> {
|
||||||
return await this.repository.find();
|
return await this.repository.find({ order: { createdAt: 'ASC' } });
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -88,7 +88,7 @@ export class GroupRepository {
|
|||||||
* Find groups by owner
|
* Find groups by owner
|
||||||
*/
|
*/
|
||||||
async findByOwner(owner: string): Promise<Group[]> {
|
async findByOwner(owner: string): Promise<Group[]> {
|
||||||
return await this.repository.find({ where: { owner } });
|
return await this.repository.find({ where: { owner }, order: { createdAt: 'ASC' } });
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
80
src/db/repositories/OAuthClientRepository.ts
Normal file
80
src/db/repositories/OAuthClientRepository.ts
Normal file
@@ -0,0 +1,80 @@
|
|||||||
|
import { Repository } from 'typeorm';
|
||||||
|
import { OAuthClient } from '../entities/OAuthClient.js';
|
||||||
|
import { getAppDataSource } from '../connection.js';
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Repository for OAuthClient entity
|
||||||
|
*/
|
||||||
|
export class OAuthClientRepository {
|
||||||
|
private repository: Repository<OAuthClient>;
|
||||||
|
|
||||||
|
constructor() {
|
||||||
|
this.repository = getAppDataSource().getRepository(OAuthClient);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Find all OAuth clients
|
||||||
|
*/
|
||||||
|
async findAll(): Promise<OAuthClient[]> {
|
||||||
|
return await this.repository.find();
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Find OAuth client by client ID
|
||||||
|
*/
|
||||||
|
async findByClientId(clientId: string): Promise<OAuthClient | null> {
|
||||||
|
return await this.repository.findOne({ where: { clientId } });
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Find OAuth clients by owner
|
||||||
|
*/
|
||||||
|
async findByOwner(owner: string): Promise<OAuthClient[]> {
|
||||||
|
return await this.repository.find({ where: { owner } });
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Create a new OAuth client
|
||||||
|
*/
|
||||||
|
async create(client: Omit<OAuthClient, 'id' | 'createdAt' | 'updatedAt'>): Promise<OAuthClient> {
|
||||||
|
const newClient = this.repository.create(client);
|
||||||
|
return await this.repository.save(newClient);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Update an existing OAuth client
|
||||||
|
*/
|
||||||
|
async update(clientId: string, clientData: Partial<OAuthClient>): Promise<OAuthClient | null> {
|
||||||
|
const client = await this.findByClientId(clientId);
|
||||||
|
if (!client) {
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
const updated = this.repository.merge(client, clientData);
|
||||||
|
return await this.repository.save(updated);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Delete an OAuth client
|
||||||
|
*/
|
||||||
|
async delete(clientId: string): Promise<boolean> {
|
||||||
|
const result = await this.repository.delete({ clientId });
|
||||||
|
return (result.affected ?? 0) > 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Check if OAuth client exists
|
||||||
|
*/
|
||||||
|
async exists(clientId: string): Promise<boolean> {
|
||||||
|
const count = await this.repository.count({ where: { clientId } });
|
||||||
|
return count > 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Count total OAuth clients
|
||||||
|
*/
|
||||||
|
async count(): Promise<number> {
|
||||||
|
return await this.repository.count();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
export default OAuthClientRepository;
|
||||||
183
src/db/repositories/OAuthTokenRepository.ts
Normal file
183
src/db/repositories/OAuthTokenRepository.ts
Normal file
@@ -0,0 +1,183 @@
|
|||||||
|
import { Repository, MoreThan } from 'typeorm';
|
||||||
|
import { OAuthToken } from '../entities/OAuthToken.js';
|
||||||
|
import { getAppDataSource } from '../connection.js';
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Repository for OAuthToken entity
|
||||||
|
*/
|
||||||
|
export class OAuthTokenRepository {
|
||||||
|
private repository: Repository<OAuthToken>;
|
||||||
|
|
||||||
|
constructor() {
|
||||||
|
this.repository = getAppDataSource().getRepository(OAuthToken);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Find all OAuth tokens
|
||||||
|
*/
|
||||||
|
async findAll(): Promise<OAuthToken[]> {
|
||||||
|
return await this.repository.find();
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Find OAuth token by access token
|
||||||
|
*/
|
||||||
|
async findByAccessToken(accessToken: string): Promise<OAuthToken | null> {
|
||||||
|
return await this.repository.findOne({ where: { accessToken } });
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Find OAuth token by refresh token
|
||||||
|
*/
|
||||||
|
async findByRefreshToken(refreshToken: string): Promise<OAuthToken | null> {
|
||||||
|
return await this.repository.findOne({ where: { refreshToken } });
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Find OAuth tokens by client ID
|
||||||
|
*/
|
||||||
|
async findByClientId(clientId: string): Promise<OAuthToken[]> {
|
||||||
|
return await this.repository.find({ where: { clientId } });
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Find OAuth tokens by username
|
||||||
|
*/
|
||||||
|
async findByUsername(username: string): Promise<OAuthToken[]> {
|
||||||
|
return await this.repository.find({ where: { username } });
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Create a new OAuth token
|
||||||
|
*/
|
||||||
|
async create(token: Omit<OAuthToken, 'id' | 'createdAt' | 'updatedAt'>): Promise<OAuthToken> {
|
||||||
|
// Remove any existing tokens with the same access token or refresh token
|
||||||
|
if (token.accessToken) {
|
||||||
|
await this.repository.delete({ accessToken: token.accessToken });
|
||||||
|
}
|
||||||
|
if (token.refreshToken) {
|
||||||
|
await this.repository.delete({ refreshToken: token.refreshToken });
|
||||||
|
}
|
||||||
|
|
||||||
|
const newToken = this.repository.create(token);
|
||||||
|
return await this.repository.save(newToken);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Update an existing OAuth token
|
||||||
|
*/
|
||||||
|
async update(accessToken: string, tokenData: Partial<OAuthToken>): Promise<OAuthToken | null> {
|
||||||
|
const token = await this.findByAccessToken(accessToken);
|
||||||
|
if (!token) {
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
const updated = this.repository.merge(token, tokenData);
|
||||||
|
return await this.repository.save(updated);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Delete an OAuth token by access token
|
||||||
|
*/
|
||||||
|
async delete(accessToken: string): Promise<boolean> {
|
||||||
|
const result = await this.repository.delete({ accessToken });
|
||||||
|
return (result.affected ?? 0) > 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Check if OAuth token exists by access token
|
||||||
|
*/
|
||||||
|
async exists(accessToken: string): Promise<boolean> {
|
||||||
|
const count = await this.repository.count({ where: { accessToken } });
|
||||||
|
return count > 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Count total OAuth tokens
|
||||||
|
*/
|
||||||
|
async count(): Promise<number> {
|
||||||
|
return await this.repository.count();
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Revoke token by access token or refresh token
|
||||||
|
*/
|
||||||
|
async revokeToken(token: string): Promise<boolean> {
|
||||||
|
// Try to find by access token first
|
||||||
|
let tokenEntity = await this.findByAccessToken(token);
|
||||||
|
if (!tokenEntity) {
|
||||||
|
// Try to find by refresh token
|
||||||
|
tokenEntity = await this.findByRefreshToken(token);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!tokenEntity) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
const result = await this.repository.delete({ id: tokenEntity.id });
|
||||||
|
return (result.affected ?? 0) > 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Revoke all tokens for a user
|
||||||
|
*/
|
||||||
|
async revokeUserTokens(username: string): Promise<number> {
|
||||||
|
const result = await this.repository.delete({ username });
|
||||||
|
return result.affected ?? 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Revoke all tokens for a client
|
||||||
|
*/
|
||||||
|
async revokeClientTokens(clientId: string): Promise<number> {
|
||||||
|
const result = await this.repository.delete({ clientId });
|
||||||
|
return result.affected ?? 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Clean up expired tokens
|
||||||
|
*/
|
||||||
|
async cleanupExpired(): Promise<number> {
|
||||||
|
const now = new Date();
|
||||||
|
|
||||||
|
// Delete tokens where both access token and refresh token are expired
|
||||||
|
// (or refresh token doesn't exist)
|
||||||
|
const result = await this.repository
|
||||||
|
.createQueryBuilder()
|
||||||
|
.delete()
|
||||||
|
.from(OAuthToken)
|
||||||
|
.where('access_token_expires_at < :now', { now })
|
||||||
|
.andWhere('(refresh_token_expires_at IS NULL OR refresh_token_expires_at < :now)', { now })
|
||||||
|
.execute();
|
||||||
|
|
||||||
|
return result.affected ?? 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Check if access token is valid (exists and not expired)
|
||||||
|
*/
|
||||||
|
async isAccessTokenValid(accessToken: string): Promise<boolean> {
|
||||||
|
const count = await this.repository.count({
|
||||||
|
where: {
|
||||||
|
accessToken,
|
||||||
|
accessTokenExpiresAt: MoreThan(new Date()),
|
||||||
|
},
|
||||||
|
});
|
||||||
|
return count > 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Check if refresh token is valid (exists and not expired)
|
||||||
|
*/
|
||||||
|
async isRefreshTokenValid(refreshToken: string): Promise<boolean> {
|
||||||
|
const token = await this.findByRefreshToken(refreshToken);
|
||||||
|
if (!token) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
if (!token.refreshTokenExpiresAt) {
|
||||||
|
return true; // No expiration means always valid
|
||||||
|
}
|
||||||
|
return token.refreshTokenExpiresAt > new Date();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
export default OAuthTokenRepository;
|
||||||
@@ -16,7 +16,7 @@ export class ServerRepository {
|
|||||||
* Find all servers
|
* Find all servers
|
||||||
*/
|
*/
|
||||||
async findAll(): Promise<Server[]> {
|
async findAll(): Promise<Server[]> {
|
||||||
return await this.repository.find();
|
return await this.repository.find({ order: { createdAt: 'ASC' } });
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -73,14 +73,14 @@ export class ServerRepository {
|
|||||||
* Find servers by owner
|
* Find servers by owner
|
||||||
*/
|
*/
|
||||||
async findByOwner(owner: string): Promise<Server[]> {
|
async findByOwner(owner: string): Promise<Server[]> {
|
||||||
return await this.repository.find({ where: { owner } });
|
return await this.repository.find({ where: { owner }, order: { createdAt: 'ASC' } });
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Find enabled servers
|
* Find enabled servers
|
||||||
*/
|
*/
|
||||||
async findEnabled(): Promise<Server[]> {
|
async findEnabled(): Promise<Server[]> {
|
||||||
return await this.repository.find({ where: { enabled: true } });
|
return await this.repository.find({ where: { enabled: true }, order: { createdAt: 'ASC' } });
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -89,6 +89,19 @@ export class ServerRepository {
|
|||||||
async setEnabled(name: string, enabled: boolean): Promise<Server | null> {
|
async setEnabled(name: string, enabled: boolean): Promise<Server | null> {
|
||||||
return await this.update(name, { enabled });
|
return await this.update(name, { enabled });
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Rename a server
|
||||||
|
*/
|
||||||
|
async rename(oldName: string, newName: string): Promise<boolean> {
|
||||||
|
const server = await this.findByName(oldName);
|
||||||
|
if (!server) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
server.name = newName;
|
||||||
|
await this.repository.save(server);
|
||||||
|
return true;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
export default ServerRepository;
|
export default ServerRepository;
|
||||||
|
|||||||
@@ -32,6 +32,7 @@ export class SystemConfigRepository {
|
|||||||
oauth: {},
|
oauth: {},
|
||||||
oauthServer: {},
|
oauthServer: {},
|
||||||
enableSessionRebuild: false,
|
enableSessionRebuild: false,
|
||||||
|
compression: {},
|
||||||
});
|
});
|
||||||
config = await this.repository.save(config);
|
config = await this.repository.save(config);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -16,7 +16,7 @@ export class UserRepository {
|
|||||||
* Find all users
|
* Find all users
|
||||||
*/
|
*/
|
||||||
async findAll(): Promise<User[]> {
|
async findAll(): Promise<User[]> {
|
||||||
return await this.repository.find();
|
return await this.repository.find({ order: { createdAt: 'ASC' } });
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -73,7 +73,7 @@ export class UserRepository {
|
|||||||
* Find all admin users
|
* Find all admin users
|
||||||
*/
|
*/
|
||||||
async findAdmins(): Promise<User[]> {
|
async findAdmins(): Promise<User[]> {
|
||||||
return await this.repository.find({ where: { isAdmin: true } });
|
return await this.repository.find({ where: { isAdmin: true }, order: { createdAt: 'ASC' } });
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -4,6 +4,9 @@ import { ServerRepository } from './ServerRepository.js';
|
|||||||
import { GroupRepository } from './GroupRepository.js';
|
import { GroupRepository } from './GroupRepository.js';
|
||||||
import { SystemConfigRepository } from './SystemConfigRepository.js';
|
import { SystemConfigRepository } from './SystemConfigRepository.js';
|
||||||
import { UserConfigRepository } from './UserConfigRepository.js';
|
import { UserConfigRepository } from './UserConfigRepository.js';
|
||||||
|
import { OAuthClientRepository } from './OAuthClientRepository.js';
|
||||||
|
import { OAuthTokenRepository } from './OAuthTokenRepository.js';
|
||||||
|
import { BearerKeyRepository } from './BearerKeyRepository.js';
|
||||||
|
|
||||||
// Export all repositories
|
// Export all repositories
|
||||||
export {
|
export {
|
||||||
@@ -13,4 +16,7 @@ export {
|
|||||||
GroupRepository,
|
GroupRepository,
|
||||||
SystemConfigRepository,
|
SystemConfigRepository,
|
||||||
UserConfigRepository,
|
UserConfigRepository,
|
||||||
|
OAuthClientRepository,
|
||||||
|
OAuthTokenRepository,
|
||||||
|
BearerKeyRepository,
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -5,9 +5,15 @@ import defaultConfig from '../config/index.js';
|
|||||||
import { JWT_SECRET } from '../config/jwt.js';
|
import { JWT_SECRET } from '../config/jwt.js';
|
||||||
import { getToken } from '../models/OAuth.js';
|
import { getToken } from '../models/OAuth.js';
|
||||||
import { isOAuthServerEnabled } from '../services/oauthServerService.js';
|
import { isOAuthServerEnabled } from '../services/oauthServerService.js';
|
||||||
|
import { getBearerKeyDao } from '../dao/index.js';
|
||||||
|
import { BearerKey } from '../types/index.js';
|
||||||
|
|
||||||
const validateBearerAuth = (req: Request, routingConfig: any): boolean => {
|
const validateBearerAuth = async (req: Request): Promise<boolean> => {
|
||||||
if (!routingConfig.enableBearerAuth) {
|
const bearerKeyDao = getBearerKeyDao();
|
||||||
|
const enabledKeys = await bearerKeyDao.findEnabled();
|
||||||
|
|
||||||
|
// If there are no enabled keys, bearer auth via static keys is disabled
|
||||||
|
if (enabledKeys.length === 0) {
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -16,7 +22,21 @@ const validateBearerAuth = (req: Request, routingConfig: any): boolean => {
|
|||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
return authHeader.substring(7) === routingConfig.bearerAuthKey;
|
const token = authHeader.substring(7).trim();
|
||||||
|
if (!token) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
const matchingKey: BearerKey | undefined = enabledKeys.find((key) => key.token === token);
|
||||||
|
if (!matchingKey) {
|
||||||
|
console.warn('Bearer auth failed: token did not match any configured bearer key');
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
console.log(
|
||||||
|
`Bearer auth succeeded with key id=${matchingKey.id}, name=${matchingKey.name}, accessType=${matchingKey.accessType}`,
|
||||||
|
);
|
||||||
|
return true;
|
||||||
};
|
};
|
||||||
|
|
||||||
const readonlyAllowPaths = ['/tools/call/'];
|
const readonlyAllowPaths = ['/tools/call/'];
|
||||||
@@ -47,8 +67,6 @@ export const auth = async (req: Request, res: Response, next: NextFunction): Pro
|
|||||||
const routingConfig = loadSettings().systemConfig?.routing || {
|
const routingConfig = loadSettings().systemConfig?.routing || {
|
||||||
enableGlobalRoute: true,
|
enableGlobalRoute: true,
|
||||||
enableGroupNameRoute: true,
|
enableGroupNameRoute: true,
|
||||||
enableBearerAuth: false,
|
|
||||||
bearerAuthKey: '',
|
|
||||||
skipAuth: false,
|
skipAuth: false,
|
||||||
};
|
};
|
||||||
|
|
||||||
@@ -57,8 +75,8 @@ export const auth = async (req: Request, res: Response, next: NextFunction): Pro
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check if bearer auth is enabled and validate it
|
// Check if bearer auth via configured keys can validate this request
|
||||||
if (validateBearerAuth(req, routingConfig)) {
|
if (await validateBearerAuth(req)) {
|
||||||
next();
|
next();
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
@@ -67,7 +85,7 @@ export const auth = async (req: Request, res: Response, next: NextFunction): Pro
|
|||||||
const authHeader = req.headers.authorization;
|
const authHeader = req.headers.authorization;
|
||||||
if (authHeader && authHeader.startsWith('Bearer ') && isOAuthServerEnabled()) {
|
if (authHeader && authHeader.startsWith('Bearer ') && isOAuthServerEnabled()) {
|
||||||
const accessToken = authHeader.substring(7);
|
const accessToken = authHeader.substring(7);
|
||||||
const oauthToken = getToken(accessToken);
|
const oauthToken = await getToken(accessToken);
|
||||||
|
|
||||||
if (oauthToken && oauthToken.accessToken === accessToken) {
|
if (oauthToken && oauthToken.accessToken === accessToken) {
|
||||||
// Valid OAuth token - look up user to get admin status
|
// Valid OAuth token - look up user to get admin status
|
||||||
|
|||||||
@@ -1,112 +1,89 @@
|
|||||||
import crypto from 'crypto';
|
import crypto from 'crypto';
|
||||||
import { loadSettings, saveSettings } from '../config/index.js';
|
import { getOAuthClientDao, getOAuthTokenDao } from '../dao/index.js';
|
||||||
import { IOAuthClient, IOAuthAuthorizationCode, IOAuthToken } from '../types/index.js';
|
import { IOAuthClient, IOAuthAuthorizationCode, IOAuthToken } from '../types/index.js';
|
||||||
|
|
||||||
// In-memory storage for authorization codes and tokens
|
// In-memory storage for authorization codes (short-lived, no persistence needed)
|
||||||
// Authorization codes are short-lived and kept in memory only.
|
|
||||||
// Tokens are mirrored to settings (mcp_settings.json) for persistence.
|
|
||||||
const authorizationCodes = new Map<string, IOAuthAuthorizationCode>();
|
const authorizationCodes = new Map<string, IOAuthAuthorizationCode>();
|
||||||
const tokens = new Map<string, IOAuthToken>();
|
|
||||||
|
|
||||||
// Initialize token store from settings on first import
|
// In-memory cache for tokens (also persisted via DAO)
|
||||||
(() => {
|
const tokensCache = new Map<string, IOAuthToken>();
|
||||||
|
|
||||||
|
// Flag to track if we've initialized from DAO
|
||||||
|
let initialized = false;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Initialize token cache from DAO (async)
|
||||||
|
*/
|
||||||
|
const initializeTokenCache = async (): Promise<void> => {
|
||||||
|
if (initialized) return;
|
||||||
|
initialized = true;
|
||||||
|
|
||||||
try {
|
try {
|
||||||
const settings = loadSettings();
|
const tokenDao = getOAuthTokenDao();
|
||||||
if (Array.isArray(settings.oauthTokens)) {
|
const allTokens = await tokenDao.findAll();
|
||||||
for (const stored of settings.oauthTokens) {
|
for (const token of allTokens) {
|
||||||
const token: IOAuthToken = {
|
tokensCache.set(token.accessToken, token);
|
||||||
...stored,
|
if (token.refreshToken) {
|
||||||
accessTokenExpiresAt: new Date(stored.accessTokenExpiresAt),
|
tokensCache.set(token.refreshToken, token);
|
||||||
refreshTokenExpiresAt: stored.refreshTokenExpiresAt
|
|
||||||
? new Date(stored.refreshTokenExpiresAt)
|
|
||||||
: undefined,
|
|
||||||
};
|
|
||||||
tokens.set(token.accessToken, token);
|
|
||||||
if (token.refreshToken) {
|
|
||||||
tokens.set(token.refreshToken, token);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
} catch (error) {
|
} catch (error) {
|
||||||
console.error('Failed to initialize OAuth tokens from settings:', error);
|
console.error('Failed to initialize OAuth tokens from DAO:', error);
|
||||||
}
|
}
|
||||||
})();
|
};
|
||||||
|
|
||||||
|
// Initialize on module load (fire and forget for backward compatibility)
|
||||||
|
initializeTokenCache().catch(console.error);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Get all OAuth clients from configuration
|
* Get all OAuth clients from configuration
|
||||||
*/
|
*/
|
||||||
export const getOAuthClients = (): IOAuthClient[] => {
|
export const getOAuthClients = async (): Promise<IOAuthClient[]> => {
|
||||||
const settings = loadSettings();
|
const clientDao = getOAuthClientDao();
|
||||||
return settings.oauthClients || [];
|
return clientDao.findAll();
|
||||||
};
|
};
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Find OAuth client by client ID
|
* Find OAuth client by client ID
|
||||||
*/
|
*/
|
||||||
export const findOAuthClientById = (clientId: string): IOAuthClient | undefined => {
|
export const findOAuthClientById = async (clientId: string): Promise<IOAuthClient | undefined> => {
|
||||||
const clients = getOAuthClients();
|
const clientDao = getOAuthClientDao();
|
||||||
return clients.find((c) => c.clientId === clientId);
|
const client = await clientDao.findByClientId(clientId);
|
||||||
|
return client || undefined;
|
||||||
};
|
};
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Create a new OAuth client
|
* Create a new OAuth client
|
||||||
*/
|
*/
|
||||||
export const createOAuthClient = (client: IOAuthClient): IOAuthClient => {
|
export const createOAuthClient = async (client: IOAuthClient): Promise<IOAuthClient> => {
|
||||||
const settings = loadSettings();
|
const clientDao = getOAuthClientDao();
|
||||||
if (!settings.oauthClients) {
|
|
||||||
settings.oauthClients = [];
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check if client already exists
|
// Check if client already exists
|
||||||
const existing = settings.oauthClients.find((c) => c.clientId === client.clientId);
|
const existing = await clientDao.findByClientId(client.clientId);
|
||||||
if (existing) {
|
if (existing) {
|
||||||
throw new Error(`OAuth client with ID ${client.clientId} already exists`);
|
throw new Error(`OAuth client with ID ${client.clientId} already exists`);
|
||||||
}
|
}
|
||||||
|
|
||||||
settings.oauthClients.push(client);
|
return clientDao.create(client);
|
||||||
saveSettings(settings);
|
|
||||||
return client;
|
|
||||||
};
|
};
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Update an existing OAuth client
|
* Update an existing OAuth client
|
||||||
*/
|
*/
|
||||||
export const updateOAuthClient = (
|
export const updateOAuthClient = async (
|
||||||
clientId: string,
|
clientId: string,
|
||||||
updates: Partial<IOAuthClient>,
|
updates: Partial<IOAuthClient>,
|
||||||
): IOAuthClient | null => {
|
): Promise<IOAuthClient | null> => {
|
||||||
const settings = loadSettings();
|
const clientDao = getOAuthClientDao();
|
||||||
if (!settings.oauthClients) {
|
return clientDao.update(clientId, updates);
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
const index = settings.oauthClients.findIndex((c) => c.clientId === clientId);
|
|
||||||
if (index === -1) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
settings.oauthClients[index] = { ...settings.oauthClients[index], ...updates };
|
|
||||||
saveSettings(settings);
|
|
||||||
return settings.oauthClients[index];
|
|
||||||
};
|
};
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Delete an OAuth client
|
* Delete an OAuth client
|
||||||
*/
|
*/
|
||||||
export const deleteOAuthClient = (clientId: string): boolean => {
|
export const deleteOAuthClient = async (clientId: string): Promise<boolean> => {
|
||||||
const settings = loadSettings();
|
const clientDao = getOAuthClientDao();
|
||||||
if (!settings.oauthClients) {
|
return clientDao.delete(clientId);
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
const index = settings.oauthClients.findIndex((c) => c.clientId === clientId);
|
|
||||||
if (index === -1) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
settings.oauthClients.splice(index, 1);
|
|
||||||
saveSettings(settings);
|
|
||||||
return true;
|
|
||||||
};
|
};
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -163,11 +140,11 @@ export const revokeAuthorizationCode = (code: string): void => {
|
|||||||
/**
|
/**
|
||||||
* Save access token and optionally refresh token
|
* Save access token and optionally refresh token
|
||||||
*/
|
*/
|
||||||
export const saveToken = (
|
export const saveToken = async (
|
||||||
tokenData: Omit<IOAuthToken, 'accessToken' | 'accessTokenExpiresAt'>,
|
tokenData: Omit<IOAuthToken, 'accessToken' | 'accessTokenExpiresAt'>,
|
||||||
accessTokenLifetime: number = 3600,
|
accessTokenLifetime: number = 3600,
|
||||||
refreshTokenLifetime?: number,
|
refreshTokenLifetime?: number,
|
||||||
): IOAuthToken => {
|
): Promise<IOAuthToken> => {
|
||||||
const accessToken = generateToken();
|
const accessToken = generateToken();
|
||||||
const accessTokenExpiresAt = new Date(Date.now() + accessTokenLifetime * 1000);
|
const accessTokenExpiresAt = new Date(Date.now() + accessTokenLifetime * 1000);
|
||||||
|
|
||||||
@@ -187,30 +164,18 @@ export const saveToken = (
|
|||||||
...tokenData,
|
...tokenData,
|
||||||
};
|
};
|
||||||
|
|
||||||
tokens.set(accessToken, token);
|
// Update cache
|
||||||
|
tokensCache.set(accessToken, token);
|
||||||
if (refreshToken) {
|
if (refreshToken) {
|
||||||
tokens.set(refreshToken, token);
|
tokensCache.set(refreshToken, token);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Persist tokens to settings
|
// Persist to DAO
|
||||||
try {
|
try {
|
||||||
const settings = loadSettings();
|
const tokenDao = getOAuthTokenDao();
|
||||||
const existing = settings.oauthTokens || [];
|
await tokenDao.create(token);
|
||||||
const filtered = existing.filter(
|
|
||||||
(t) => t.accessToken !== token.accessToken && t.refreshToken !== token.refreshToken,
|
|
||||||
);
|
|
||||||
const updated = [
|
|
||||||
...filtered,
|
|
||||||
{
|
|
||||||
...token,
|
|
||||||
accessTokenExpiresAt: token.accessTokenExpiresAt,
|
|
||||||
refreshTokenExpiresAt: token.refreshTokenExpiresAt,
|
|
||||||
},
|
|
||||||
];
|
|
||||||
settings.oauthTokens = updated;
|
|
||||||
saveSettings(settings);
|
|
||||||
} catch (error) {
|
} catch (error) {
|
||||||
console.error('Failed to persist OAuth token to settings:', error);
|
console.error('Failed to persist OAuth token to DAO:', error);
|
||||||
}
|
}
|
||||||
|
|
||||||
return token;
|
return token;
|
||||||
@@ -219,8 +184,27 @@ export const saveToken = (
|
|||||||
/**
|
/**
|
||||||
* Get token by access token or refresh token
|
* Get token by access token or refresh token
|
||||||
*/
|
*/
|
||||||
export const getToken = (token: string): IOAuthToken | undefined => {
|
export const getToken = async (token: string): Promise<IOAuthToken | undefined> => {
|
||||||
const tokenData = tokens.get(token);
|
// First check cache
|
||||||
|
let tokenData = tokensCache.get(token);
|
||||||
|
|
||||||
|
// If not in cache, try DAO
|
||||||
|
if (!tokenData) {
|
||||||
|
const tokenDao = getOAuthTokenDao();
|
||||||
|
tokenData =
|
||||||
|
(await tokenDao.findByAccessToken(token)) ||
|
||||||
|
(await tokenDao.findByRefreshToken(token)) ||
|
||||||
|
undefined;
|
||||||
|
|
||||||
|
// Update cache if found
|
||||||
|
if (tokenData) {
|
||||||
|
tokensCache.set(tokenData.accessToken, tokenData);
|
||||||
|
if (tokenData.refreshToken) {
|
||||||
|
tokensCache.set(tokenData.refreshToken, tokenData);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if (!tokenData) {
|
if (!tokenData) {
|
||||||
return undefined;
|
return undefined;
|
||||||
}
|
}
|
||||||
@@ -245,34 +229,28 @@ export const getToken = (token: string): IOAuthToken | undefined => {
|
|||||||
/**
|
/**
|
||||||
* Revoke token (both access and refresh tokens)
|
* Revoke token (both access and refresh tokens)
|
||||||
*/
|
*/
|
||||||
export const revokeToken = (token: string): void => {
|
export const revokeToken = async (token: string): Promise<void> => {
|
||||||
const tokenData = tokens.get(token);
|
const tokenData = tokensCache.get(token);
|
||||||
if (tokenData) {
|
if (tokenData) {
|
||||||
tokens.delete(tokenData.accessToken);
|
tokensCache.delete(tokenData.accessToken);
|
||||||
if (tokenData.refreshToken) {
|
if (tokenData.refreshToken) {
|
||||||
tokens.delete(tokenData.refreshToken);
|
tokensCache.delete(tokenData.refreshToken);
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// Also remove from persisted settings
|
// Also remove from DAO
|
||||||
try {
|
try {
|
||||||
const settings = loadSettings();
|
const tokenDao = getOAuthTokenDao();
|
||||||
if (Array.isArray(settings.oauthTokens)) {
|
await tokenDao.revokeToken(token);
|
||||||
settings.oauthTokens = settings.oauthTokens.filter(
|
} catch (error) {
|
||||||
(t) =>
|
console.error('Failed to remove OAuth token from DAO:', error);
|
||||||
t.accessToken !== tokenData.accessToken && t.refreshToken !== tokenData.refreshToken,
|
|
||||||
);
|
|
||||||
saveSettings(settings);
|
|
||||||
}
|
|
||||||
} catch (error) {
|
|
||||||
console.error('Failed to remove OAuth token from settings:', error);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Clean up expired codes and tokens (should be called periodically)
|
* Clean up expired codes and tokens (should be called periodically)
|
||||||
*/
|
*/
|
||||||
export const cleanupExpired = (): void => {
|
export const cleanupExpired = async (): Promise<void> => {
|
||||||
const now = new Date();
|
const now = new Date();
|
||||||
|
|
||||||
// Clean up expired authorization codes
|
// Clean up expired authorization codes
|
||||||
@@ -282,9 +260,9 @@ export const cleanupExpired = (): void => {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Clean up expired tokens
|
// Clean up expired tokens from cache
|
||||||
const processedTokens = new Set<string>();
|
const processedTokens = new Set<string>();
|
||||||
for (const [_key, token] of tokens.entries()) {
|
for (const [_key, token] of tokensCache.entries()) {
|
||||||
// Skip if we've already processed this token
|
// Skip if we've already processed this token
|
||||||
if (processedTokens.has(token.accessToken)) {
|
if (processedTokens.has(token.accessToken)) {
|
||||||
continue;
|
continue;
|
||||||
@@ -294,35 +272,19 @@ export const cleanupExpired = (): void => {
|
|||||||
const accessExpired = token.accessTokenExpiresAt < now;
|
const accessExpired = token.accessTokenExpiresAt < now;
|
||||||
const refreshExpired = token.refreshTokenExpiresAt && token.refreshTokenExpiresAt < now;
|
const refreshExpired = token.refreshTokenExpiresAt && token.refreshTokenExpiresAt < now;
|
||||||
|
|
||||||
// If both are expired, remove the token
|
// If both are expired, remove from cache
|
||||||
if (accessExpired && (!token.refreshToken || refreshExpired)) {
|
if (accessExpired && (!token.refreshToken || refreshExpired)) {
|
||||||
tokens.delete(token.accessToken);
|
tokensCache.delete(token.accessToken);
|
||||||
if (token.refreshToken) {
|
if (token.refreshToken) {
|
||||||
tokens.delete(token.refreshToken);
|
tokensCache.delete(token.refreshToken);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Sync persisted tokens: keep only non-expired ones
|
// Clean up expired tokens from DAO
|
||||||
try {
|
try {
|
||||||
const settings = loadSettings();
|
const tokenDao = getOAuthTokenDao();
|
||||||
if (Array.isArray(settings.oauthTokens)) {
|
await tokenDao.cleanupExpired();
|
||||||
const validTokens: IOAuthToken[] = [];
|
|
||||||
for (const stored of settings.oauthTokens) {
|
|
||||||
const accessExpiresAt = new Date(stored.accessTokenExpiresAt);
|
|
||||||
const refreshExpiresAt = stored.refreshTokenExpiresAt
|
|
||||||
? new Date(stored.refreshTokenExpiresAt)
|
|
||||||
: undefined;
|
|
||||||
const accessExpired = accessExpiresAt < now;
|
|
||||||
const refreshExpired = refreshExpiresAt && refreshExpiresAt < now;
|
|
||||||
|
|
||||||
if (!accessExpired || (stored.refreshToken && !refreshExpired)) {
|
|
||||||
validTokens.push(stored);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
settings.oauthTokens = validTokens;
|
|
||||||
saveSettings(settings);
|
|
||||||
}
|
|
||||||
} catch (error) {
|
} catch (error) {
|
||||||
console.error('Failed to cleanup persisted OAuth tokens:', error);
|
console.error('Failed to cleanup persisted OAuth tokens:', error);
|
||||||
}
|
}
|
||||||
@@ -331,7 +293,12 @@ export const cleanupExpired = (): void => {
|
|||||||
// Run cleanup every 5 minutes in production
|
// Run cleanup every 5 minutes in production
|
||||||
let cleanupIntervalId: NodeJS.Timeout | null = null;
|
let cleanupIntervalId: NodeJS.Timeout | null = null;
|
||||||
if (process.env.NODE_ENV !== 'test') {
|
if (process.env.NODE_ENV !== 'test') {
|
||||||
cleanupIntervalId = setInterval(cleanupExpired, 5 * 60 * 1000);
|
cleanupIntervalId = setInterval(
|
||||||
|
() => {
|
||||||
|
cleanupExpired().catch(console.error);
|
||||||
|
},
|
||||||
|
5 * 60 * 1000,
|
||||||
|
);
|
||||||
// Allow the interval to not keep the process alive
|
// Allow the interval to not keep the process alive
|
||||||
cleanupIntervalId.unref();
|
cleanupIntervalId.unref();
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -6,9 +6,11 @@ import {
|
|||||||
getAllSettings,
|
getAllSettings,
|
||||||
getServerConfig,
|
getServerConfig,
|
||||||
createServer,
|
createServer,
|
||||||
|
batchCreateServers,
|
||||||
updateServer,
|
updateServer,
|
||||||
deleteServer,
|
deleteServer,
|
||||||
toggleServer,
|
toggleServer,
|
||||||
|
reloadServer,
|
||||||
toggleTool,
|
toggleTool,
|
||||||
updateToolDescription,
|
updateToolDescription,
|
||||||
togglePrompt,
|
togglePrompt,
|
||||||
@@ -19,6 +21,7 @@ import {
|
|||||||
getGroups,
|
getGroups,
|
||||||
getGroup,
|
getGroup,
|
||||||
createNewGroup,
|
createNewGroup,
|
||||||
|
batchCreateGroups,
|
||||||
updateExistingGroup,
|
updateExistingGroup,
|
||||||
deleteExistingGroup,
|
deleteExistingGroup,
|
||||||
addServerToExistingGroup,
|
addServerToExistingGroup,
|
||||||
@@ -103,6 +106,12 @@ import {
|
|||||||
updateClientConfiguration,
|
updateClientConfiguration,
|
||||||
deleteClientRegistration,
|
deleteClientRegistration,
|
||||||
} from '../controllers/oauthDynamicRegistrationController.js';
|
} from '../controllers/oauthDynamicRegistrationController.js';
|
||||||
|
import {
|
||||||
|
getBearerKeys,
|
||||||
|
createBearerKey,
|
||||||
|
updateBearerKey,
|
||||||
|
deleteBearerKey,
|
||||||
|
} from '../controllers/bearerKeyController.js';
|
||||||
import { auth } from '../middlewares/auth.js';
|
import { auth } from '../middlewares/auth.js';
|
||||||
|
|
||||||
const router = express.Router();
|
const router = express.Router();
|
||||||
@@ -133,9 +142,11 @@ export const initRoutes = (app: express.Application): void => {
|
|||||||
router.get('/servers/:name', getServerConfig);
|
router.get('/servers/:name', getServerConfig);
|
||||||
router.get('/settings', getAllSettings);
|
router.get('/settings', getAllSettings);
|
||||||
router.post('/servers', createServer);
|
router.post('/servers', createServer);
|
||||||
|
router.post('/servers/batch', batchCreateServers);
|
||||||
router.put('/servers/:name', updateServer);
|
router.put('/servers/:name', updateServer);
|
||||||
router.delete('/servers/:name', deleteServer);
|
router.delete('/servers/:name', deleteServer);
|
||||||
router.post('/servers/:name/toggle', toggleServer);
|
router.post('/servers/:name/toggle', toggleServer);
|
||||||
|
router.post('/servers/:name/reload', reloadServer);
|
||||||
router.post('/servers/:serverName/tools/:toolName/toggle', toggleTool);
|
router.post('/servers/:serverName/tools/:toolName/toggle', toggleTool);
|
||||||
router.put('/servers/:serverName/tools/:toolName/description', updateToolDescription);
|
router.put('/servers/:serverName/tools/:toolName/description', updateToolDescription);
|
||||||
router.post('/servers/:serverName/prompts/:promptName/toggle', togglePrompt);
|
router.post('/servers/:serverName/prompts/:promptName/toggle', togglePrompt);
|
||||||
@@ -146,6 +157,7 @@ export const initRoutes = (app: express.Application): void => {
|
|||||||
router.get('/groups', getGroups);
|
router.get('/groups', getGroups);
|
||||||
router.get('/groups/:id', getGroup);
|
router.get('/groups/:id', getGroup);
|
||||||
router.post('/groups', createNewGroup);
|
router.post('/groups', createNewGroup);
|
||||||
|
router.post('/groups/batch', batchCreateGroups);
|
||||||
router.put('/groups/:id', updateExistingGroup);
|
router.put('/groups/:id', updateExistingGroup);
|
||||||
router.delete('/groups/:id', deleteExistingGroup);
|
router.delete('/groups/:id', deleteExistingGroup);
|
||||||
router.post('/groups/:id/servers', addServerToExistingGroup);
|
router.post('/groups/:id/servers', addServerToExistingGroup);
|
||||||
@@ -181,6 +193,12 @@ export const initRoutes = (app: express.Application): void => {
|
|||||||
router.delete('/oauth/clients/:clientId', deleteClient);
|
router.delete('/oauth/clients/:clientId', deleteClient);
|
||||||
router.post('/oauth/clients/:clientId/regenerate-secret', regenerateSecret);
|
router.post('/oauth/clients/:clientId/regenerate-secret', regenerateSecret);
|
||||||
|
|
||||||
|
// Bearer authentication key management (admin only)
|
||||||
|
router.get('/auth/keys', getBearerKeys);
|
||||||
|
router.post('/auth/keys', createBearerKey);
|
||||||
|
router.put('/auth/keys/:id', updateBearerKey);
|
||||||
|
router.delete('/auth/keys/:id', deleteBearerKey);
|
||||||
|
|
||||||
// Tool management routes
|
// Tool management routes
|
||||||
router.post('/tools/call/:server', callTool);
|
router.post('/tools/call/:server', callTool);
|
||||||
|
|
||||||
|
|||||||
266
src/services/compressionService.ts
Normal file
266
src/services/compressionService.ts
Normal file
@@ -0,0 +1,266 @@
|
|||||||
|
import OpenAI from 'openai';
|
||||||
|
import { getSmartRoutingConfig, SmartRoutingConfig } from '../utils/smartRouting.js';
|
||||||
|
import { getSystemConfigDao } from '../dao/index.js';
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Compression configuration interface
|
||||||
|
*/
|
||||||
|
export interface CompressionConfig {
|
||||||
|
enabled: boolean;
|
||||||
|
model?: string;
|
||||||
|
maxInputTokens?: number;
|
||||||
|
targetReductionRatio?: number;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Default compression configuration
|
||||||
|
*/
|
||||||
|
const DEFAULT_COMPRESSION_CONFIG: CompressionConfig = {
|
||||||
|
enabled: false,
|
||||||
|
model: 'gpt-4o-mini',
|
||||||
|
maxInputTokens: 100000,
|
||||||
|
targetReductionRatio: 0.5,
|
||||||
|
};
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get compression configuration from system settings
|
||||||
|
*/
|
||||||
|
export async function getCompressionConfig(): Promise<CompressionConfig> {
|
||||||
|
try {
|
||||||
|
const systemConfigDao = getSystemConfigDao();
|
||||||
|
const systemConfig = await systemConfigDao.get();
|
||||||
|
const compressionSettings = systemConfig?.compression || {};
|
||||||
|
|
||||||
|
return {
|
||||||
|
enabled: compressionSettings.enabled ?? DEFAULT_COMPRESSION_CONFIG.enabled,
|
||||||
|
model: compressionSettings.model ?? DEFAULT_COMPRESSION_CONFIG.model,
|
||||||
|
maxInputTokens: compressionSettings.maxInputTokens ?? DEFAULT_COMPRESSION_CONFIG.maxInputTokens,
|
||||||
|
targetReductionRatio:
|
||||||
|
compressionSettings.targetReductionRatio ?? DEFAULT_COMPRESSION_CONFIG.targetReductionRatio,
|
||||||
|
};
|
||||||
|
} catch (error) {
|
||||||
|
console.warn('Failed to get compression config, using defaults:', error);
|
||||||
|
return DEFAULT_COMPRESSION_CONFIG;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Check if compression is available and enabled
|
||||||
|
*/
|
||||||
|
export async function isCompressionEnabled(): Promise<boolean> {
|
||||||
|
const config = await getCompressionConfig();
|
||||||
|
if (!config.enabled) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check if we have OpenAI API key configured (via smart routing config)
|
||||||
|
const smartRoutingConfig = await getSmartRoutingConfig();
|
||||||
|
return !!smartRoutingConfig.openaiApiKey;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get OpenAI client for compression
|
||||||
|
*/
|
||||||
|
async function getOpenAIClient(smartRoutingConfig: SmartRoutingConfig): Promise<OpenAI | null> {
|
||||||
|
if (!smartRoutingConfig.openaiApiKey) {
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
return new OpenAI({
|
||||||
|
apiKey: smartRoutingConfig.openaiApiKey,
|
||||||
|
baseURL: smartRoutingConfig.openaiApiBaseUrl || 'https://api.openai.com/v1',
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Estimate token count for a string (rough approximation)
|
||||||
|
* Uses ~4 characters per token as a rough estimate
|
||||||
|
*/
|
||||||
|
export function estimateTokenCount(text: string): number {
|
||||||
|
return Math.ceil(text.length / 4);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Check if content should be compressed based on token count
|
||||||
|
*/
|
||||||
|
export function shouldCompress(content: string, maxInputTokens: number): boolean {
|
||||||
|
const estimatedTokens = estimateTokenCount(content);
|
||||||
|
// Only compress if content is larger than a reasonable threshold
|
||||||
|
const compressionThreshold = Math.min(maxInputTokens * 0.1, 1000);
|
||||||
|
return estimatedTokens > compressionThreshold;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Compress MCP tool output using AI
|
||||||
|
*
|
||||||
|
* @param content The MCP tool output content to compress
|
||||||
|
* @param context Optional context about the tool that generated this output
|
||||||
|
* @returns Compressed content or original content if compression fails/is disabled
|
||||||
|
*/
|
||||||
|
export async function compressOutput(
|
||||||
|
content: string,
|
||||||
|
context?: {
|
||||||
|
toolName?: string;
|
||||||
|
serverName?: string;
|
||||||
|
},
|
||||||
|
): Promise<{ compressed: string; originalLength: number; compressedLength: number; wasCompressed: boolean }> {
|
||||||
|
const originalLength = content.length;
|
||||||
|
|
||||||
|
// Check if compression is enabled
|
||||||
|
const compressionConfig = await getCompressionConfig();
|
||||||
|
if (!compressionConfig.enabled) {
|
||||||
|
return {
|
||||||
|
compressed: content,
|
||||||
|
originalLength,
|
||||||
|
compressedLength: originalLength,
|
||||||
|
wasCompressed: false,
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check if content should be compressed
|
||||||
|
if (!shouldCompress(content, compressionConfig.maxInputTokens || 100000)) {
|
||||||
|
return {
|
||||||
|
compressed: content,
|
||||||
|
originalLength,
|
||||||
|
compressedLength: originalLength,
|
||||||
|
wasCompressed: false,
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
const smartRoutingConfig = await getSmartRoutingConfig();
|
||||||
|
const openai = await getOpenAIClient(smartRoutingConfig);
|
||||||
|
|
||||||
|
if (!openai) {
|
||||||
|
console.warn('Compression enabled but OpenAI API key not configured');
|
||||||
|
return {
|
||||||
|
compressed: content,
|
||||||
|
originalLength,
|
||||||
|
compressedLength: originalLength,
|
||||||
|
wasCompressed: false,
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
const targetRatio = compressionConfig.targetReductionRatio || 0.5;
|
||||||
|
const toolContext = context?.toolName ? `from tool "${context.toolName}"` : '';
|
||||||
|
const serverContext = context?.serverName ? `on server "${context.serverName}"` : '';
|
||||||
|
|
||||||
|
const systemPrompt = `You are a data compression assistant. Your task is to compress MCP (Model Context Protocol) tool outputs while preserving all essential information.
|
||||||
|
|
||||||
|
Guidelines:
|
||||||
|
- Remove redundant information, formatting, and verbose descriptions
|
||||||
|
- Preserve all data values, identifiers, and critical information
|
||||||
|
- Keep error messages and status information intact
|
||||||
|
- Maintain structured data (JSON, arrays) in a compact but readable format
|
||||||
|
- Target approximately ${Math.round(targetRatio * 100)}% reduction in size
|
||||||
|
- If the content cannot be meaningfully compressed, return it as-is
|
||||||
|
|
||||||
|
The output is ${toolContext} ${serverContext}.`;
|
||||||
|
|
||||||
|
const userPrompt = `Compress the following MCP tool output while preserving all essential information:
|
||||||
|
|
||||||
|
${content}`;
|
||||||
|
|
||||||
|
const response = await openai.chat.completions.create({
|
||||||
|
model: compressionConfig.model || 'gpt-4o-mini',
|
||||||
|
messages: [
|
||||||
|
{ role: 'system', content: systemPrompt },
|
||||||
|
{ role: 'user', content: userPrompt },
|
||||||
|
],
|
||||||
|
temperature: 0.1,
|
||||||
|
max_tokens: Math.ceil(estimateTokenCount(content) * targetRatio * 1.5),
|
||||||
|
});
|
||||||
|
|
||||||
|
const compressedContent = response.choices[0]?.message?.content;
|
||||||
|
|
||||||
|
if (!compressedContent) {
|
||||||
|
console.warn('Compression returned empty result, using original content');
|
||||||
|
return {
|
||||||
|
compressed: content,
|
||||||
|
originalLength,
|
||||||
|
compressedLength: originalLength,
|
||||||
|
wasCompressed: false,
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
const compressedLength = compressedContent.length;
|
||||||
|
|
||||||
|
// Only use compressed version if it's actually smaller
|
||||||
|
if (compressedLength >= originalLength) {
|
||||||
|
console.log('Compression did not reduce size, using original content');
|
||||||
|
return {
|
||||||
|
compressed: content,
|
||||||
|
originalLength,
|
||||||
|
compressedLength: originalLength,
|
||||||
|
wasCompressed: false,
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
const reductionPercent = (((originalLength - compressedLength) / originalLength) * 100).toFixed(1);
|
||||||
|
console.log(`Compressed output: ${originalLength} -> ${compressedLength} chars (${reductionPercent}% reduction)`);
|
||||||
|
|
||||||
|
return {
|
||||||
|
compressed: compressedContent,
|
||||||
|
originalLength,
|
||||||
|
compressedLength,
|
||||||
|
wasCompressed: true,
|
||||||
|
};
|
||||||
|
} catch (error) {
|
||||||
|
console.error('Compression failed, using original content:', error);
|
||||||
|
return {
|
||||||
|
compressed: content,
|
||||||
|
originalLength,
|
||||||
|
compressedLength: originalLength,
|
||||||
|
wasCompressed: false,
|
||||||
|
};
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Compress tool call result content
|
||||||
|
* This handles the MCP tool result format with content array
|
||||||
|
*/
|
||||||
|
export async function compressToolResult(
|
||||||
|
result: any,
|
||||||
|
context?: {
|
||||||
|
toolName?: string;
|
||||||
|
serverName?: string;
|
||||||
|
},
|
||||||
|
): Promise<any> {
|
||||||
|
// Check if compression is enabled first
|
||||||
|
const compressionEnabled = await isCompressionEnabled();
|
||||||
|
if (!compressionEnabled) {
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Handle error results - don't compress error messages
|
||||||
|
if (result?.isError) {
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Handle content array format
|
||||||
|
if (!result?.content || !Array.isArray(result.content)) {
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
const compressedContent = await Promise.all(
|
||||||
|
result.content.map(async (item: any) => {
|
||||||
|
// Only compress text content
|
||||||
|
if (item?.type !== 'text' || !item?.text) {
|
||||||
|
return item;
|
||||||
|
}
|
||||||
|
|
||||||
|
const compressionResult = await compressOutput(item.text, context);
|
||||||
|
|
||||||
|
return {
|
||||||
|
...item,
|
||||||
|
text: compressionResult.compressed,
|
||||||
|
};
|
||||||
|
}),
|
||||||
|
);
|
||||||
|
|
||||||
|
return {
|
||||||
|
...result,
|
||||||
|
content: compressedContent,
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -29,9 +29,9 @@ export const getGroupByIdOrName = async (key: string): Promise<IGroup | undefine
|
|||||||
const systemConfigDao = getSystemConfigDao();
|
const systemConfigDao = getSystemConfigDao();
|
||||||
|
|
||||||
const systemConfig = await systemConfigDao.get();
|
const systemConfig = await systemConfigDao.get();
|
||||||
const routingConfig = systemConfig?.routing || {
|
const routingConfig = {
|
||||||
enableGlobalRoute: true,
|
enableGlobalRoute: systemConfig?.routing?.enableGlobalRoute ?? true,
|
||||||
enableGroupNameRoute: true,
|
enableGroupNameRoute: systemConfig?.routing?.enableGroupNameRoute ?? true,
|
||||||
};
|
};
|
||||||
|
|
||||||
const groups = await getAllGroups();
|
const groups = await getAllGroups();
|
||||||
|
|||||||
@@ -48,7 +48,9 @@ export const setupClientKeepAlive = async (
|
|||||||
await (serverInfo.client as any).ping();
|
await (serverInfo.client as any).ping();
|
||||||
console.log(`Keep-alive ping successful for server: ${serverInfo.name}`);
|
console.log(`Keep-alive ping successful for server: ${serverInfo.name}`);
|
||||||
} else {
|
} else {
|
||||||
await serverInfo.client.listTools({ timeout: 5000 }).catch(() => void 0);
|
await serverInfo.client
|
||||||
|
.listTools({}, { ...(serverInfo.options || {}), timeout: 5000 })
|
||||||
|
.catch(() => void 0);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
} catch (error) {
|
} catch (error) {
|
||||||
|
|||||||
@@ -325,7 +325,7 @@ export class MCPHubOAuthProvider implements OAuthClientProvider {
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
console.log(`Saving OAuth tokens for server: ${this.serverName}`);
|
console.log(`Saving OAuth tokens: ${JSON.stringify(tokens)} for server: ${this.serverName}`);
|
||||||
|
|
||||||
const updatedConfig = await persistTokens(this.serverName, {
|
const updatedConfig = await persistTokens(this.serverName, {
|
||||||
accessToken: tokens.access_token,
|
accessToken: tokens.access_token,
|
||||||
|
|||||||
@@ -14,6 +14,7 @@ import {
|
|||||||
StreamableHTTPClientTransport,
|
StreamableHTTPClientTransport,
|
||||||
StreamableHTTPClientTransportOptions,
|
StreamableHTTPClientTransportOptions,
|
||||||
} from '@modelcontextprotocol/sdk/client/streamableHttp.js';
|
} from '@modelcontextprotocol/sdk/client/streamableHttp.js';
|
||||||
|
import { createFetchWithProxy, getProxyConfigFromEnv } from './proxy.js';
|
||||||
import { ServerInfo, ServerConfig, Tool } from '../types/index.js';
|
import { ServerInfo, ServerConfig, Tool } from '../types/index.js';
|
||||||
import { expandEnvVars, replaceEnvVars, getNameSeparator } from '../config/index.js';
|
import { expandEnvVars, replaceEnvVars, getNameSeparator } from '../config/index.js';
|
||||||
import config from '../config/index.js';
|
import config from '../config/index.js';
|
||||||
@@ -26,6 +27,7 @@ import { getDataService } from './services.js';
|
|||||||
import { getServerDao, getSystemConfigDao, ServerConfigWithName } from '../dao/index.js';
|
import { getServerDao, getSystemConfigDao, ServerConfigWithName } from '../dao/index.js';
|
||||||
import { initializeAllOAuthClients } from './oauthService.js';
|
import { initializeAllOAuthClients } from './oauthService.js';
|
||||||
import { createOAuthProvider } from './mcpOAuthProvider.js';
|
import { createOAuthProvider } from './mcpOAuthProvider.js';
|
||||||
|
import { compressToolResult } from './compressionService.js';
|
||||||
|
|
||||||
const servers: { [sessionId: string]: Server } = {};
|
const servers: { [sessionId: string]: Server } = {};
|
||||||
|
|
||||||
@@ -134,6 +136,10 @@ export const cleanupAllServers = (): void => {
|
|||||||
// Helper function to create transport based on server configuration
|
// Helper function to create transport based on server configuration
|
||||||
export const createTransportFromConfig = async (name: string, conf: ServerConfig): Promise<any> => {
|
export const createTransportFromConfig = async (name: string, conf: ServerConfig): Promise<any> => {
|
||||||
let transport;
|
let transport;
|
||||||
|
const env: Record<string, string> = {
|
||||||
|
...(process.env as Record<string, string>),
|
||||||
|
...replaceEnvVars(conf.env || {}),
|
||||||
|
};
|
||||||
|
|
||||||
if (conf.type === 'streamable-http') {
|
if (conf.type === 'streamable-http') {
|
||||||
const options: StreamableHTTPClientTransportOptions = {};
|
const options: StreamableHTTPClientTransportOptions = {};
|
||||||
@@ -152,6 +158,8 @@ export const createTransportFromConfig = async (name: string, conf: ServerConfig
|
|||||||
console.log(`OAuth provider configured for server: ${name}`);
|
console.log(`OAuth provider configured for server: ${name}`);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
options.fetch = createFetchWithProxy(getProxyConfigFromEnv(env));
|
||||||
|
|
||||||
transport = new StreamableHTTPClientTransport(new URL(conf.url || ''), options);
|
transport = new StreamableHTTPClientTransport(new URL(conf.url || ''), options);
|
||||||
} else if (conf.url) {
|
} else if (conf.url) {
|
||||||
// SSE transport
|
// SSE transport
|
||||||
@@ -174,13 +182,11 @@ export const createTransportFromConfig = async (name: string, conf: ServerConfig
|
|||||||
console.log(`OAuth provider configured for server: ${name}`);
|
console.log(`OAuth provider configured for server: ${name}`);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
options.fetch = createFetchWithProxy(getProxyConfigFromEnv(env));
|
||||||
|
|
||||||
transport = new SSEClientTransport(new URL(conf.url), options);
|
transport = new SSEClientTransport(new URL(conf.url), options);
|
||||||
} else if (conf.command && conf.args) {
|
} else if (conf.command && conf.args) {
|
||||||
// Stdio transport
|
// Stdio transport
|
||||||
const env: Record<string, string> = {
|
|
||||||
...(process.env as Record<string, string>),
|
|
||||||
...replaceEnvVars(conf.env || {}),
|
|
||||||
};
|
|
||||||
env['PATH'] = expandEnvVars(process.env.PATH as string) || '';
|
env['PATH'] = expandEnvVars(process.env.PATH as string) || '';
|
||||||
|
|
||||||
const systemConfigDao = getSystemConfigDao();
|
const systemConfigDao = getSystemConfigDao();
|
||||||
@@ -236,6 +242,8 @@ const callToolWithReconnect = async (
|
|||||||
for (let attempt = 0; attempt <= maxRetries; attempt++) {
|
for (let attempt = 0; attempt <= maxRetries; attempt++) {
|
||||||
try {
|
try {
|
||||||
const result = await serverInfo.client.callTool(toolParams, undefined, options || {});
|
const result = await serverInfo.client.callTool(toolParams, undefined, options || {});
|
||||||
|
// Check auth error
|
||||||
|
checkAuthError(result);
|
||||||
return result;
|
return result;
|
||||||
} catch (error: any) {
|
} catch (error: any) {
|
||||||
// Check if error message starts with "Error POSTing to endpoint (HTTP 40"
|
// Check if error message starts with "Error POSTing to endpoint (HTTP 40"
|
||||||
@@ -277,11 +285,7 @@ const callToolWithReconnect = async (
|
|||||||
version: '1.0.0',
|
version: '1.0.0',
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
capabilities: {
|
capabilities: {},
|
||||||
prompts: {},
|
|
||||||
resources: {},
|
|
||||||
tools: {},
|
|
||||||
},
|
|
||||||
},
|
},
|
||||||
);
|
);
|
||||||
|
|
||||||
@@ -463,11 +467,7 @@ export const initializeClientsFromSettings = async (
|
|||||||
version: '1.0.0',
|
version: '1.0.0',
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
capabilities: {
|
capabilities: {},
|
||||||
prompts: {},
|
|
||||||
resources: {},
|
|
||||||
tools: {},
|
|
||||||
},
|
|
||||||
},
|
},
|
||||||
);
|
);
|
||||||
|
|
||||||
@@ -622,9 +622,37 @@ export const registerAllTools = async (isInit: boolean, serverName?: string): Pr
|
|||||||
export const getServersInfo = async (): Promise<Omit<ServerInfo, 'client' | 'transport'>[]> => {
|
export const getServersInfo = async (): Promise<Omit<ServerInfo, 'client' | 'transport'>[]> => {
|
||||||
const allServers: ServerConfigWithName[] = await getServerDao().findAll();
|
const allServers: ServerConfigWithName[] = await getServerDao().findAll();
|
||||||
const dataService = getDataService();
|
const dataService = getDataService();
|
||||||
|
|
||||||
|
// Ensure that servers recently added via DAO but not yet initialized in serverInfos
|
||||||
|
// are still visible in the servers list. This avoids a race condition where
|
||||||
|
// a POST /api/servers immediately followed by GET /api/servers would not
|
||||||
|
// return the newly created server until background initialization completes.
|
||||||
|
const combinedServerInfos: ServerInfo[] = [...serverInfos];
|
||||||
|
const existingNames = new Set(combinedServerInfos.map((s) => s.name));
|
||||||
|
|
||||||
|
for (const server of allServers) {
|
||||||
|
if (!existingNames.has(server.name)) {
|
||||||
|
const isEnabled = server.enabled === undefined ? true : server.enabled;
|
||||||
|
combinedServerInfos.push({
|
||||||
|
name: server.name,
|
||||||
|
owner: server.owner,
|
||||||
|
// Newly created servers that are enabled should appear as "connecting"
|
||||||
|
// until the MCP client initialization completes. Disabled servers remain
|
||||||
|
// in the "disconnected" state.
|
||||||
|
status: isEnabled ? 'connecting' : 'disconnected',
|
||||||
|
error: null,
|
||||||
|
tools: [],
|
||||||
|
prompts: [],
|
||||||
|
createTime: Date.now(),
|
||||||
|
enabled: isEnabled,
|
||||||
|
});
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
const filterServerInfos: ServerInfo[] = dataService.filterData
|
const filterServerInfos: ServerInfo[] = dataService.filterData
|
||||||
? dataService.filterData(serverInfos)
|
? dataService.filterData(combinedServerInfos)
|
||||||
: serverInfos;
|
: combinedServerInfos;
|
||||||
|
|
||||||
const infos = filterServerInfos.map(
|
const infos = filterServerInfos.map(
|
||||||
({ name, status, tools, prompts, createTime, error, oauth }) => {
|
({ name, status, tools, prompts, createTime, error, oauth }) => {
|
||||||
const serverConfig = allServers.find((server) => server.name === name);
|
const serverConfig = allServers.find((server) => server.name === name);
|
||||||
@@ -805,6 +833,25 @@ export const addOrUpdateServer = async (
|
|||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
|
// Check for authentication error in tool call result
|
||||||
|
function checkAuthError(result: any) {
|
||||||
|
if (Array.isArray(result.content) && result.content.length > 0) {
|
||||||
|
const text = result.content[0]?.text;
|
||||||
|
if (typeof text === 'string') {
|
||||||
|
let errorContent;
|
||||||
|
try {
|
||||||
|
errorContent = JSON.parse(text);
|
||||||
|
} catch (e) {
|
||||||
|
// Ignore JSON parse errors and continue
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
if (errorContent.code === 401) {
|
||||||
|
throw new Error('Error POSTing to endpoint (HTTP 401 Unauthorized)');
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// Close server client and transport
|
// Close server client and transport
|
||||||
function closeServer(name: string) {
|
function closeServer(name: string) {
|
||||||
const serverInfo = serverInfos.find((serverInfo) => serverInfo.name === name);
|
const serverInfo = serverInfos.find((serverInfo) => serverInfo.name === name);
|
||||||
@@ -964,23 +1011,14 @@ Available servers: ${serversList}`,
|
|||||||
for (const serverInfo of filteredServerInfos) {
|
for (const serverInfo of filteredServerInfos) {
|
||||||
if (serverInfo.tools && serverInfo.tools.length > 0) {
|
if (serverInfo.tools && serverInfo.tools.length > 0) {
|
||||||
// Filter tools based on server configuration
|
// Filter tools based on server configuration
|
||||||
let enabledTools = await filterToolsByConfig(serverInfo.name, serverInfo.tools);
|
let tools = await filterToolsByConfig(serverInfo.name, serverInfo.tools);
|
||||||
|
|
||||||
// If this is a group request, apply group-level tool filtering
|
// If this is a group request, apply group-level tool filtering
|
||||||
if (group) {
|
tools = await filterToolsByGroup(group, serverInfo.name, tools);
|
||||||
const serverConfig = await getServerConfigInGroup(group, serverInfo.name);
|
|
||||||
if (serverConfig && serverConfig.tools !== 'all' && Array.isArray(serverConfig.tools)) {
|
|
||||||
// Filter tools based on group configuration
|
|
||||||
const allowedToolNames = serverConfig.tools.map(
|
|
||||||
(toolName: string) => `${serverInfo.name}${getNameSeparator()}${toolName}`,
|
|
||||||
);
|
|
||||||
enabledTools = enabledTools.filter((tool) => allowedToolNames.includes(tool.name));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Apply custom descriptions from server configuration
|
// Apply custom descriptions from server configuration
|
||||||
const serverConfig = await getServerDao().findById(serverInfo.name);
|
const serverConfig = await getServerDao().findById(serverInfo.name);
|
||||||
const toolsWithCustomDescriptions = enabledTools.map((tool) => {
|
const toolsWithCustomDescriptions = tools.map((tool) => {
|
||||||
const toolConfig = serverConfig?.tools?.[tool.name];
|
const toolConfig = serverConfig?.tools?.[tool.name];
|
||||||
return {
|
return {
|
||||||
...tool,
|
...tool,
|
||||||
@@ -1027,12 +1065,15 @@ export const handleCallToolRequest = async (request: any, extra: any) => {
|
|||||||
|
|
||||||
// Determine server filtering based on group
|
// Determine server filtering based on group
|
||||||
const sessionId = extra.sessionId || '';
|
const sessionId = extra.sessionId || '';
|
||||||
const group = getGroup(sessionId);
|
let group = getGroup(sessionId);
|
||||||
let servers: string[] | undefined = undefined; // No server filtering by default
|
let servers: string[] | undefined = undefined; // No server filtering by default
|
||||||
|
|
||||||
// If group is in format $smart/{group}, filter servers to that group
|
// If group is in format $smart/{group}, filter servers to that group
|
||||||
if (group?.startsWith('$smart/')) {
|
if (group?.startsWith('$smart/')) {
|
||||||
const targetGroup = group.substring(7);
|
const targetGroup = group.substring(7);
|
||||||
|
if (targetGroup) {
|
||||||
|
group = targetGroup;
|
||||||
|
}
|
||||||
const serversInGroup = await getServersInGroup(targetGroup);
|
const serversInGroup = await getServersInGroup(targetGroup);
|
||||||
if (serversInGroup !== undefined && serversInGroup !== null) {
|
if (serversInGroup !== undefined && serversInGroup !== null) {
|
||||||
servers = serversInGroup;
|
servers = serversInGroup;
|
||||||
@@ -1064,8 +1105,8 @@ export const handleCallToolRequest = async (request: any, extra: any) => {
|
|||||||
const actualTool = server.tools.find((tool) => tool.name === result.toolName);
|
const actualTool = server.tools.find((tool) => tool.name === result.toolName);
|
||||||
if (actualTool) {
|
if (actualTool) {
|
||||||
// Check if the tool is enabled in configuration
|
// Check if the tool is enabled in configuration
|
||||||
const enabledTools = await filterToolsByConfig(server.name, [actualTool]);
|
const tools = await filterToolsByConfig(server.name, [actualTool]);
|
||||||
if (enabledTools.length > 0) {
|
if (tools.length > 0) {
|
||||||
// Apply custom description from configuration
|
// Apply custom description from configuration
|
||||||
const serverConfig = await getServerDao().findById(server.name);
|
const serverConfig = await getServerDao().findById(server.name);
|
||||||
const toolConfig = serverConfig?.tools?.[actualTool.name];
|
const toolConfig = serverConfig?.tools?.[actualTool.name];
|
||||||
@@ -1091,19 +1132,24 @@ export const handleCallToolRequest = async (request: any, extra: any) => {
|
|||||||
);
|
);
|
||||||
|
|
||||||
// Now filter the resolved tools
|
// Now filter the resolved tools
|
||||||
const tools = await Promise.all(
|
const filterResults = await Promise.all(
|
||||||
resolvedTools.filter(async (tool) => {
|
resolvedTools.map(async (tool) => {
|
||||||
// Additional filter to remove tools that are disabled
|
|
||||||
if (tool.name) {
|
if (tool.name) {
|
||||||
const serverName = tool.serverName;
|
const serverName = tool.serverName;
|
||||||
if (serverName) {
|
if (serverName) {
|
||||||
const enabledTools = await filterToolsByConfig(serverName, [tool as Tool]);
|
let tools = await filterToolsByConfig(serverName, [tool as Tool]);
|
||||||
return enabledTools.length > 0;
|
if (tools.length === 0) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
tools = await filterToolsByGroup(group, serverName, tools);
|
||||||
|
return tools.length > 0;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
return true; // Keep fallback results
|
return true;
|
||||||
}),
|
}),
|
||||||
);
|
);
|
||||||
|
const tools = resolvedTools.filter((_, i) => filterResults[i]);
|
||||||
|
|
||||||
// Add usage guidance to the response
|
// Add usage guidance to the response
|
||||||
const response = {
|
const response = {
|
||||||
@@ -1215,7 +1261,7 @@ export const handleCallToolRequest = async (request: any, extra: any) => {
|
|||||||
const result = await openApiClient.callTool(cleanToolName, finalArgs, passthroughHeaders);
|
const result = await openApiClient.callTool(cleanToolName, finalArgs, passthroughHeaders);
|
||||||
|
|
||||||
console.log(`OpenAPI tool invocation result: ${JSON.stringify(result)}`);
|
console.log(`OpenAPI tool invocation result: ${JSON.stringify(result)}`);
|
||||||
return {
|
const openApiResult = {
|
||||||
content: [
|
content: [
|
||||||
{
|
{
|
||||||
type: 'text',
|
type: 'text',
|
||||||
@@ -1223,6 +1269,10 @@ export const handleCallToolRequest = async (request: any, extra: any) => {
|
|||||||
},
|
},
|
||||||
],
|
],
|
||||||
};
|
};
|
||||||
|
return compressToolResult(openApiResult, {
|
||||||
|
toolName: cleanToolName,
|
||||||
|
serverName: targetServerInfo.name,
|
||||||
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
// Call the tool on the target server (MCP servers)
|
// Call the tool on the target server (MCP servers)
|
||||||
@@ -1252,7 +1302,10 @@ export const handleCallToolRequest = async (request: any, extra: any) => {
|
|||||||
);
|
);
|
||||||
|
|
||||||
console.log(`Tool invocation result: ${JSON.stringify(result)}`);
|
console.log(`Tool invocation result: ${JSON.stringify(result)}`);
|
||||||
return result;
|
return compressToolResult(result, {
|
||||||
|
toolName,
|
||||||
|
serverName: targetServerInfo.name,
|
||||||
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
// Regular tool handling
|
// Regular tool handling
|
||||||
@@ -1311,7 +1364,7 @@ export const handleCallToolRequest = async (request: any, extra: any) => {
|
|||||||
);
|
);
|
||||||
|
|
||||||
console.log(`OpenAPI tool invocation result: ${JSON.stringify(result)}`);
|
console.log(`OpenAPI tool invocation result: ${JSON.stringify(result)}`);
|
||||||
return {
|
const openApiResult = {
|
||||||
content: [
|
content: [
|
||||||
{
|
{
|
||||||
type: 'text',
|
type: 'text',
|
||||||
@@ -1319,6 +1372,10 @@ export const handleCallToolRequest = async (request: any, extra: any) => {
|
|||||||
},
|
},
|
||||||
],
|
],
|
||||||
};
|
};
|
||||||
|
return compressToolResult(openApiResult, {
|
||||||
|
toolName: cleanToolName,
|
||||||
|
serverName: serverInfo.name,
|
||||||
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
// Handle MCP servers
|
// Handle MCP servers
|
||||||
@@ -1329,6 +1386,7 @@ export const handleCallToolRequest = async (request: any, extra: any) => {
|
|||||||
|
|
||||||
const separator = getNameSeparator();
|
const separator = getNameSeparator();
|
||||||
const prefix = `${serverInfo.name}${separator}`;
|
const prefix = `${serverInfo.name}${separator}`;
|
||||||
|
const originalToolName = request.params.name;
|
||||||
request.params.name = request.params.name.startsWith(prefix)
|
request.params.name = request.params.name.startsWith(prefix)
|
||||||
? request.params.name.substring(prefix.length)
|
? request.params.name.substring(prefix.length)
|
||||||
: request.params.name;
|
: request.params.name;
|
||||||
@@ -1338,7 +1396,10 @@ export const handleCallToolRequest = async (request: any, extra: any) => {
|
|||||||
serverInfo.options || {},
|
serverInfo.options || {},
|
||||||
);
|
);
|
||||||
console.log(`Tool call result: ${JSON.stringify(result)}`);
|
console.log(`Tool call result: ${JSON.stringify(result)}`);
|
||||||
return result;
|
return compressToolResult(result, {
|
||||||
|
toolName: originalToolName,
|
||||||
|
serverName: serverInfo.name,
|
||||||
|
});
|
||||||
} catch (error) {
|
} catch (error) {
|
||||||
console.error(`Error handling CallToolRequest: ${error}`);
|
console.error(`Error handling CallToolRequest: ${error}`);
|
||||||
return {
|
return {
|
||||||
@@ -1495,3 +1556,18 @@ export const createMcpServer = (name: string, version: string, group?: string):
|
|||||||
server.setRequestHandler(ListPromptsRequestSchema, handleListPromptsRequest);
|
server.setRequestHandler(ListPromptsRequestSchema, handleListPromptsRequest);
|
||||||
return server;
|
return server;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
// Filter tools based on group configuration
|
||||||
|
async function filterToolsByGroup(group: string | undefined, serverName: string, tools: Tool[]) {
|
||||||
|
if (group) {
|
||||||
|
const serverConfig = await getServerConfigInGroup(group, serverName);
|
||||||
|
if (serverConfig && serverConfig.tools !== 'all' && Array.isArray(serverConfig.tools)) {
|
||||||
|
// Filter tools based on group configuration
|
||||||
|
const allowedToolNames = serverConfig.tools.map(
|
||||||
|
(toolName: string) => `${serverName}${getNameSeparator()}${toolName}`,
|
||||||
|
);
|
||||||
|
tools = tools.filter((tool) => allowedToolNames.includes(tool.name));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return tools;
|
||||||
|
}
|
||||||
|
|||||||
@@ -21,7 +21,7 @@ const oauthModel: OAuth2Server.AuthorizationCodeModel & OAuth2Server.RefreshToke
|
|||||||
* Get client by client ID
|
* Get client by client ID
|
||||||
*/
|
*/
|
||||||
getClient: async (clientId: string, clientSecret?: string) => {
|
getClient: async (clientId: string, clientSecret?: string) => {
|
||||||
const client = findOAuthClientById(clientId);
|
const client = await findOAuthClientById(clientId);
|
||||||
if (!client) {
|
if (!client) {
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
@@ -92,7 +92,7 @@ const oauthModel: OAuth2Server.AuthorizationCodeModel & OAuth2Server.RefreshToke
|
|||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
const client = findOAuthClientById(code.clientId);
|
const client = await findOAuthClientById(code.clientId);
|
||||||
if (!client) {
|
if (!client) {
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
@@ -143,7 +143,7 @@ const oauthModel: OAuth2Server.AuthorizationCodeModel & OAuth2Server.RefreshToke
|
|||||||
|
|
||||||
const scopeString = Array.isArray(token.scope) ? token.scope.join(' ') : token.scope;
|
const scopeString = Array.isArray(token.scope) ? token.scope.join(' ') : token.scope;
|
||||||
|
|
||||||
const savedToken = saveToken(
|
const savedToken = await saveToken(
|
||||||
{
|
{
|
||||||
scope: scopeString,
|
scope: scopeString,
|
||||||
clientId: client.id,
|
clientId: client.id,
|
||||||
@@ -172,12 +172,12 @@ const oauthModel: OAuth2Server.AuthorizationCodeModel & OAuth2Server.RefreshToke
|
|||||||
* Get access token
|
* Get access token
|
||||||
*/
|
*/
|
||||||
getAccessToken: async (accessToken: string) => {
|
getAccessToken: async (accessToken: string) => {
|
||||||
const token = getToken(accessToken);
|
const token = await getToken(accessToken);
|
||||||
if (!token) {
|
if (!token) {
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
const client = findOAuthClientById(token.clientId);
|
const client = await findOAuthClientById(token.clientId);
|
||||||
if (!client) {
|
if (!client) {
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
@@ -205,12 +205,12 @@ const oauthModel: OAuth2Server.AuthorizationCodeModel & OAuth2Server.RefreshToke
|
|||||||
* Get refresh token
|
* Get refresh token
|
||||||
*/
|
*/
|
||||||
getRefreshToken: async (refreshToken: string) => {
|
getRefreshToken: async (refreshToken: string) => {
|
||||||
const token = getToken(refreshToken);
|
const token = await getToken(refreshToken);
|
||||||
if (!token || token.refreshToken !== refreshToken) {
|
if (!token || token.refreshToken !== refreshToken) {
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
const client = findOAuthClientById(token.clientId);
|
const client = await findOAuthClientById(token.clientId);
|
||||||
if (!client) {
|
if (!client) {
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
@@ -240,7 +240,7 @@ const oauthModel: OAuth2Server.AuthorizationCodeModel & OAuth2Server.RefreshToke
|
|||||||
revokeToken: async (token: OAuth2Server.Token | OAuth2Server.RefreshToken) => {
|
revokeToken: async (token: OAuth2Server.Token | OAuth2Server.RefreshToken) => {
|
||||||
const refreshToken = 'refreshToken' in token ? token.refreshToken : undefined;
|
const refreshToken = 'refreshToken' in token ? token.refreshToken : undefined;
|
||||||
if (refreshToken) {
|
if (refreshToken) {
|
||||||
revokeToken(refreshToken);
|
await revokeToken(refreshToken);
|
||||||
}
|
}
|
||||||
return true;
|
return true;
|
||||||
},
|
},
|
||||||
|
|||||||
@@ -42,7 +42,7 @@ function convertToolSchemaToOpenAPI(tool: Tool): {
|
|||||||
(prop: any) =>
|
(prop: any) =>
|
||||||
prop.type === 'object' ||
|
prop.type === 'object' ||
|
||||||
prop.type === 'array' ||
|
prop.type === 'array' ||
|
||||||
(prop.type === 'string' && prop.enum && prop.enum.length > 10),
|
prop.type === 'string',
|
||||||
);
|
);
|
||||||
|
|
||||||
if (!hasComplexTypes && Object.keys(properties).length <= 10) {
|
if (!hasComplexTypes && Object.keys(properties).length <= 10) {
|
||||||
@@ -93,7 +93,7 @@ function generateOperationFromTool(tool: Tool, serverName: string): OpenAPIV3.Op
|
|||||||
const operation: OpenAPIV3.OperationObject = {
|
const operation: OpenAPIV3.OperationObject = {
|
||||||
summary: tool.description || `Execute ${tool.name} tool`,
|
summary: tool.description || `Execute ${tool.name} tool`,
|
||||||
description: tool.description || `Execute the ${tool.name} tool from ${serverName} server`,
|
description: tool.description || `Execute the ${tool.name} tool from ${serverName} server`,
|
||||||
operationId: `${serverName}_${tool.name}`,
|
operationId: `${tool.name}`,
|
||||||
tags: [serverName],
|
tags: [serverName],
|
||||||
...(parameters && parameters.length > 0 && { parameters }),
|
...(parameters && parameters.length > 0 && { parameters }),
|
||||||
...(requestBody && { requestBody }),
|
...(requestBody && { requestBody }),
|
||||||
|
|||||||
167
src/services/proxy.ts
Normal file
167
src/services/proxy.ts
Normal file
@@ -0,0 +1,167 @@
|
|||||||
|
/**
|
||||||
|
* HTTP/HTTPS proxy configuration utilities for MCP client transports.
|
||||||
|
*
|
||||||
|
* This module provides utilities to configure HTTP and HTTPS proxies when
|
||||||
|
* connecting to MCP servers. Proxies are configured by providing a custom
|
||||||
|
* fetch implementation that uses Node.js http/https agents with proxy support.
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
|
||||||
|
import { FetchLike } from '@modelcontextprotocol/sdk/shared/transport.js';
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Configuration options for HTTP/HTTPS proxy settings.
|
||||||
|
*/
|
||||||
|
export interface ProxyConfig {
|
||||||
|
/**
|
||||||
|
* HTTP proxy URL (e.g., 'http://proxy.example.com:8080')
|
||||||
|
* Can include authentication: 'http://user:pass@proxy.example.com:8080'
|
||||||
|
*/
|
||||||
|
httpProxy?: string;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* HTTPS proxy URL (e.g., 'https://proxy.example.com:8443')
|
||||||
|
* Can include authentication: 'https://user:pass@proxy.example.com:8443'
|
||||||
|
*/
|
||||||
|
httpsProxy?: string;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Comma-separated list of hosts that should bypass the proxy
|
||||||
|
* (e.g., 'localhost,127.0.0.1,.example.com')
|
||||||
|
*/
|
||||||
|
noProxy?: string;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Creates a fetch function that uses the specified proxy configuration.
|
||||||
|
*
|
||||||
|
* This function returns a fetch implementation that routes requests through
|
||||||
|
* the configured HTTP/HTTPS proxies using undici's ProxyAgent.
|
||||||
|
*
|
||||||
|
* Note: This function requires the 'undici' package to be installed.
|
||||||
|
* Install it with: npm install undici
|
||||||
|
*
|
||||||
|
* @param config - Proxy configuration options
|
||||||
|
* @returns A fetch-compatible function configured to use the specified proxies
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
export function createFetchWithProxy(config: ProxyConfig): FetchLike {
|
||||||
|
// If no proxy is configured, return the default fetch
|
||||||
|
if (!config.httpProxy && !config.httpsProxy) {
|
||||||
|
return fetch;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Parse no_proxy list
|
||||||
|
const noProxyList = parseNoProxy(config.noProxy);
|
||||||
|
|
||||||
|
return async (url: string | URL, init?: RequestInit): Promise<Response> => {
|
||||||
|
const targetUrl = typeof url === 'string' ? new URL(url) : url;
|
||||||
|
|
||||||
|
// Check if host should bypass proxy
|
||||||
|
if (shouldBypassProxy(targetUrl.hostname, noProxyList)) {
|
||||||
|
return fetch(url, init);
|
||||||
|
}
|
||||||
|
|
||||||
|
// Determine which proxy to use based on protocol
|
||||||
|
const proxyUrl = targetUrl.protocol === 'https:' ? config.httpsProxy : config.httpProxy;
|
||||||
|
|
||||||
|
if (!proxyUrl) {
|
||||||
|
// No proxy configured for this protocol
|
||||||
|
return fetch(url, init);
|
||||||
|
}
|
||||||
|
|
||||||
|
// Use undici for proxy support if available
|
||||||
|
try {
|
||||||
|
// Dynamic import - undici is an optional peer dependency
|
||||||
|
// eslint-disable-next-line @typescript-eslint/no-explicit-any
|
||||||
|
const undici = await import('undici' as any);
|
||||||
|
// eslint-disable-next-line @typescript-eslint/no-explicit-any
|
||||||
|
const ProxyAgent = (undici as any).ProxyAgent;
|
||||||
|
const dispatcher = new ProxyAgent(proxyUrl);
|
||||||
|
|
||||||
|
return fetch(url, {
|
||||||
|
...init,
|
||||||
|
// @ts-expect-error - dispatcher is undici-specific
|
||||||
|
dispatcher,
|
||||||
|
});
|
||||||
|
} catch (error) {
|
||||||
|
// undici not available - throw error requiring installation
|
||||||
|
throw new Error(
|
||||||
|
'Proxy support requires the "undici" package. ' +
|
||||||
|
'Install it with: npm install undici\n' +
|
||||||
|
`Original error: ${error instanceof Error ? error.message : String(error)}`,
|
||||||
|
);
|
||||||
|
}
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Parses a NO_PROXY environment variable value into a list of patterns.
|
||||||
|
*/
|
||||||
|
function parseNoProxy(noProxy?: string): string[] {
|
||||||
|
if (!noProxy) {
|
||||||
|
return [];
|
||||||
|
}
|
||||||
|
|
||||||
|
return noProxy
|
||||||
|
.split(',')
|
||||||
|
.map((item) => item.trim())
|
||||||
|
.filter((item) => item.length > 0);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Checks if a hostname should bypass the proxy based on NO_PROXY patterns.
|
||||||
|
*/
|
||||||
|
function shouldBypassProxy(hostname: string, noProxyList: string[]): boolean {
|
||||||
|
if (noProxyList.length === 0) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
const hostnameLower = hostname.toLowerCase();
|
||||||
|
|
||||||
|
for (const pattern of noProxyList) {
|
||||||
|
const patternLower = pattern.toLowerCase();
|
||||||
|
|
||||||
|
// Exact match
|
||||||
|
if (hostnameLower === patternLower) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Domain suffix match (e.g., .example.com matches sub.example.com)
|
||||||
|
if (patternLower.startsWith('.') && hostnameLower.endsWith(patternLower)) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Domain suffix match without leading dot
|
||||||
|
if (!patternLower.startsWith('.') && hostnameLower.endsWith('.' + patternLower)) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Special case: "*" matches everything
|
||||||
|
if (patternLower === '*') {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Creates a ProxyConfig from environment variables.
|
||||||
|
*
|
||||||
|
* This function reads standard proxy environment variables:
|
||||||
|
* - HTTP_PROXY, http_proxy
|
||||||
|
* - HTTPS_PROXY, https_proxy
|
||||||
|
* - NO_PROXY, no_proxy
|
||||||
|
*
|
||||||
|
* Lowercase versions take precedence over uppercase versions.
|
||||||
|
*
|
||||||
|
* @returns A ProxyConfig object populated from environment variables
|
||||||
|
*/
|
||||||
|
export function getProxyConfigFromEnv(env: Record<string, string>): ProxyConfig {
|
||||||
|
return {
|
||||||
|
httpProxy: env.http_proxy || env.HTTP_PROXY,
|
||||||
|
httpsProxy: env.https_proxy || env.HTTPS_PROXY,
|
||||||
|
noProxy: env.no_proxy || env.NO_PROXY,
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -47,6 +47,30 @@ jest.mock('../dao/index.js', () => ({
|
|||||||
getSystemConfigDao: jest.fn(() => ({
|
getSystemConfigDao: jest.fn(() => ({
|
||||||
get: jest.fn().mockImplementation(() => Promise.resolve(currentSystemConfig)),
|
get: jest.fn().mockImplementation(() => Promise.resolve(currentSystemConfig)),
|
||||||
})),
|
})),
|
||||||
|
getBearerKeyDao: jest.fn(() => ({
|
||||||
|
// Keep these unit tests aligned with legacy routing semantics:
|
||||||
|
// enableBearerAuth + bearerAuthKey -> one enabled key (token=bearerAuthKey)
|
||||||
|
// otherwise -> no enabled keys (bearer auth effectively disabled)
|
||||||
|
findEnabled: jest.fn().mockImplementation(async () => {
|
||||||
|
const routing = (currentSystemConfig as any)?.routing || {};
|
||||||
|
const enabled = !!routing.enableBearerAuth;
|
||||||
|
const token = String(routing.bearerAuthKey || '').trim();
|
||||||
|
if (!enabled || !token) {
|
||||||
|
return [];
|
||||||
|
}
|
||||||
|
return [
|
||||||
|
{
|
||||||
|
id: 'test-key-id',
|
||||||
|
name: 'default',
|
||||||
|
token,
|
||||||
|
enabled: true,
|
||||||
|
accessType: 'all',
|
||||||
|
allowedGroups: [],
|
||||||
|
allowedServers: [],
|
||||||
|
},
|
||||||
|
];
|
||||||
|
}),
|
||||||
|
})),
|
||||||
}));
|
}));
|
||||||
|
|
||||||
// Mock oauthBearer
|
// Mock oauthBearer
|
||||||
|
|||||||
@@ -6,10 +6,10 @@ import { StreamableHTTPServerTransport } from '@modelcontextprotocol/sdk/server/
|
|||||||
import { isInitializeRequest } from '@modelcontextprotocol/sdk/types.js';
|
import { isInitializeRequest } from '@modelcontextprotocol/sdk/types.js';
|
||||||
import { deleteMcpServer, getMcpServer } from './mcpService.js';
|
import { deleteMcpServer, getMcpServer } from './mcpService.js';
|
||||||
import config from '../config/index.js';
|
import config from '../config/index.js';
|
||||||
import { getSystemConfigDao } from '../dao/index.js';
|
import { getBearerKeyDao, getGroupDao, getServerDao, getSystemConfigDao } from '../dao/index.js';
|
||||||
import { UserContextService } from './userContextService.js';
|
import { UserContextService } from './userContextService.js';
|
||||||
import { RequestContextService } from './requestContextService.js';
|
import { RequestContextService } from './requestContextService.js';
|
||||||
import { IUser } from '../types/index.js';
|
import { IUser, BearerKey } from '../types/index.js';
|
||||||
import { resolveOAuthUserFromToken } from '../utils/oauthBearer.js';
|
import { resolveOAuthUserFromToken } from '../utils/oauthBearer.js';
|
||||||
|
|
||||||
export const transports: {
|
export const transports: {
|
||||||
@@ -30,40 +30,187 @@ type BearerAuthResult =
|
|||||||
reason: 'missing' | 'invalid';
|
reason: 'missing' | 'invalid';
|
||||||
};
|
};
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Check if a string is a valid UUID v4 format
|
||||||
|
*/
|
||||||
|
const isValidUUID = (str: string): boolean => {
|
||||||
|
const uuidRegex = /^[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}$/i;
|
||||||
|
return uuidRegex.test(str);
|
||||||
|
};
|
||||||
|
|
||||||
|
const isBearerKeyAllowedForRequest = async (req: Request, key: BearerKey): Promise<boolean> => {
|
||||||
|
const paramValue = (req.params as any)?.group as string | undefined;
|
||||||
|
|
||||||
|
// accessType 'all' allows all requests
|
||||||
|
if (key.accessType === 'all') {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
// No parameter value means global route
|
||||||
|
if (!paramValue) {
|
||||||
|
// Only accessType 'all' allows global routes
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
const groupDao = getGroupDao();
|
||||||
|
const serverDao = getServerDao();
|
||||||
|
|
||||||
|
// Step 1: Try to match as a group (by name or id), since group has higher priority
|
||||||
|
let matchedGroup = await groupDao.findByName(paramValue);
|
||||||
|
if (!matchedGroup && isValidUUID(paramValue)) {
|
||||||
|
// Only try findById if the parameter is a valid UUID
|
||||||
|
matchedGroup = await groupDao.findById(paramValue);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (matchedGroup) {
|
||||||
|
// Matched as a group
|
||||||
|
if (key.accessType === 'groups') {
|
||||||
|
// For group-scoped keys, check if the matched group is in allowedGroups
|
||||||
|
const allowedGroups = key.allowedGroups || [];
|
||||||
|
return allowedGroups.includes(matchedGroup.name) || allowedGroups.includes(matchedGroup.id);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (key.accessType === 'servers') {
|
||||||
|
// For server-scoped keys, check if any server in the group is allowed
|
||||||
|
const allowedServers = key.allowedServers || [];
|
||||||
|
if (allowedServers.length === 0) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!Array.isArray(matchedGroup.servers)) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
const groupServerNames = matchedGroup.servers.map((server) =>
|
||||||
|
typeof server === 'string' ? server : server.name,
|
||||||
|
);
|
||||||
|
return groupServerNames.some((name) => allowedServers.includes(name));
|
||||||
|
}
|
||||||
|
|
||||||
|
if (key.accessType === 'custom') {
|
||||||
|
// For custom-scoped keys, check if the group is allowed OR if any server in the group is allowed
|
||||||
|
const allowedGroups = key.allowedGroups || [];
|
||||||
|
const allowedServers = key.allowedServers || [];
|
||||||
|
|
||||||
|
// Check if the group itself is allowed
|
||||||
|
const groupAllowed =
|
||||||
|
allowedGroups.includes(matchedGroup.name) || allowedGroups.includes(matchedGroup.id);
|
||||||
|
if (groupAllowed) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check if any server in the group is allowed
|
||||||
|
if (allowedServers.length > 0 && Array.isArray(matchedGroup.servers)) {
|
||||||
|
const groupServerNames = matchedGroup.servers.map((server) =>
|
||||||
|
typeof server === 'string' ? server : server.name,
|
||||||
|
);
|
||||||
|
return groupServerNames.some((name) => allowedServers.includes(name));
|
||||||
|
}
|
||||||
|
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Unknown accessType with matched group
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Step 2: Not a group, try to match as a server name
|
||||||
|
const matchedServer = await serverDao.findById(paramValue);
|
||||||
|
|
||||||
|
if (matchedServer) {
|
||||||
|
// Matched as a server
|
||||||
|
if (key.accessType === 'groups') {
|
||||||
|
// For group-scoped keys, server access is not allowed
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (key.accessType === 'servers' || key.accessType === 'custom') {
|
||||||
|
// For server-scoped or custom-scoped keys, check if the server is in allowedServers
|
||||||
|
const allowedServers = key.allowedServers || [];
|
||||||
|
return allowedServers.includes(matchedServer.name);
|
||||||
|
}
|
||||||
|
|
||||||
|
// Unknown accessType with matched server
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Step 3: Not a valid group or server, deny access
|
||||||
|
console.warn(
|
||||||
|
`Bearer key access denied: parameter '${paramValue}' does not match any group or server`,
|
||||||
|
);
|
||||||
|
return false;
|
||||||
|
} catch (error) {
|
||||||
|
console.error('Error checking bearer key request access:', error);
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
const validateBearerAuth = async (req: Request): Promise<BearerAuthResult> => {
|
const validateBearerAuth = async (req: Request): Promise<BearerAuthResult> => {
|
||||||
const systemConfigDao = getSystemConfigDao();
|
const bearerKeyDao = getBearerKeyDao();
|
||||||
const systemConfig = await systemConfigDao.get();
|
const enabledKeys = await bearerKeyDao.findEnabled();
|
||||||
const routingConfig = systemConfig?.routing || {
|
|
||||||
enableGlobalRoute: true,
|
|
||||||
enableGroupNameRoute: true,
|
|
||||||
enableBearerAuth: false,
|
|
||||||
bearerAuthKey: '',
|
|
||||||
};
|
|
||||||
|
|
||||||
if (routingConfig.enableBearerAuth) {
|
const authHeader = req.headers.authorization;
|
||||||
const authHeader = req.headers.authorization;
|
const hasBearerHeader = !!authHeader && authHeader.startsWith('Bearer ');
|
||||||
if (!authHeader || !authHeader.startsWith('Bearer ')) {
|
|
||||||
return { valid: false, reason: 'missing' };
|
// If no enabled keys are configured, bearer auth is effectively disabled.
|
||||||
|
// We still allow OAuth bearer tokens to attach user context in this case.
|
||||||
|
if (enabledKeys.length === 0) {
|
||||||
|
if (!hasBearerHeader) {
|
||||||
|
return { valid: true };
|
||||||
}
|
}
|
||||||
|
|
||||||
const token = authHeader.substring(7); // Remove "Bearer " prefix
|
const token = authHeader!.substring(7).trim();
|
||||||
if (token.trim().length === 0) {
|
if (!token) {
|
||||||
return { valid: false, reason: 'missing' };
|
|
||||||
}
|
|
||||||
|
|
||||||
if (token === routingConfig.bearerAuthKey) {
|
|
||||||
return { valid: true };
|
return { valid: true };
|
||||||
}
|
}
|
||||||
|
|
||||||
const oauthUser = await resolveOAuthUserFromToken(token);
|
const oauthUser = await resolveOAuthUserFromToken(token);
|
||||||
if (oauthUser) {
|
if (oauthUser) {
|
||||||
|
console.log('Authenticated request using OAuth bearer token without configured keys');
|
||||||
return { valid: true, user: oauthUser };
|
return { valid: true, user: oauthUser };
|
||||||
}
|
}
|
||||||
|
|
||||||
return { valid: false, reason: 'invalid' };
|
// When there are no keys, a non-OAuth bearer token should not block access
|
||||||
|
return { valid: true };
|
||||||
}
|
}
|
||||||
|
|
||||||
return { valid: true };
|
// When keys exist, bearer header is required
|
||||||
|
if (!hasBearerHeader) {
|
||||||
|
return { valid: false, reason: 'missing' };
|
||||||
|
}
|
||||||
|
|
||||||
|
const token = authHeader!.substring(7).trim();
|
||||||
|
if (!token) {
|
||||||
|
return { valid: false, reason: 'missing' };
|
||||||
|
}
|
||||||
|
|
||||||
|
// First, try to match a configured bearer key
|
||||||
|
const matchingKey = enabledKeys.find((key) => key.token === token);
|
||||||
|
if (matchingKey) {
|
||||||
|
const allowed = await isBearerKeyAllowedForRequest(req, matchingKey);
|
||||||
|
if (!allowed) {
|
||||||
|
console.warn(
|
||||||
|
`Bearer key rejected due to scope restrictions: id=${matchingKey.id}, name=${matchingKey.name}, accessType=${matchingKey.accessType}`,
|
||||||
|
);
|
||||||
|
return { valid: false, reason: 'invalid' };
|
||||||
|
}
|
||||||
|
|
||||||
|
console.log(
|
||||||
|
`Bearer key authenticated: id=${matchingKey.id}, name=${matchingKey.name}, accessType=${matchingKey.accessType}`,
|
||||||
|
);
|
||||||
|
return { valid: true };
|
||||||
|
}
|
||||||
|
|
||||||
|
// Fallback: treat token as potential OAuth access token
|
||||||
|
const oauthUser = await resolveOAuthUserFromToken(token);
|
||||||
|
if (oauthUser) {
|
||||||
|
console.log('Authenticated request using OAuth bearer token (no matching static key)');
|
||||||
|
return { valid: true, user: oauthUser };
|
||||||
|
}
|
||||||
|
|
||||||
|
console.warn('Bearer authentication failed: token did not match any key or OAuth user');
|
||||||
|
return { valid: false, reason: 'invalid' };
|
||||||
};
|
};
|
||||||
|
|
||||||
const attachUserContextFromBearer = (result: BearerAuthResult, res: Response): void => {
|
const attachUserContextFromBearer = (result: BearerAuthResult, res: Response): void => {
|
||||||
@@ -398,9 +545,9 @@ export const handleMcpPostRequest = async (req: Request, res: Response): Promise
|
|||||||
// Get filtered settings based on user context (after setting user context)
|
// Get filtered settings based on user context (after setting user context)
|
||||||
const systemConfigDao = getSystemConfigDao();
|
const systemConfigDao = getSystemConfigDao();
|
||||||
const systemConfig = await systemConfigDao.get();
|
const systemConfig = await systemConfigDao.get();
|
||||||
const routingConfig = systemConfig?.routing || {
|
const routingConfig = {
|
||||||
enableGlobalRoute: true,
|
enableGlobalRoute: systemConfig?.routing?.enableGlobalRoute ?? true,
|
||||||
enableGroupNameRoute: true,
|
enableGroupNameRoute: systemConfig?.routing?.enableGroupNameRoute ?? true,
|
||||||
};
|
};
|
||||||
if (!group && !routingConfig.enableGlobalRoute) {
|
if (!group && !routingConfig.enableGlobalRoute) {
|
||||||
res.status(403).send('Global routes are disabled. Please specify a group ID.');
|
res.status(403).send('Global routes are disabled. Please specify a group ID.');
|
||||||
|
|||||||
@@ -1,13 +1,13 @@
|
|||||||
import { getRepositoryFactory } from '../db/index.js';
|
import { getRepositoryFactory } from '../db/index.js';
|
||||||
import { VectorEmbeddingRepository } from '../db/repositories/index.js';
|
import { VectorEmbeddingRepository } from '../db/repositories/index.js';
|
||||||
import { Tool } from '../types/index.js';
|
import { Tool } from '../types/index.js';
|
||||||
import { getAppDataSource, initializeDatabase } from '../db/connection.js';
|
import { getAppDataSource, isDatabaseConnected, initializeDatabase } from '../db/connection.js';
|
||||||
import { getSmartRoutingConfig } from '../utils/smartRouting.js';
|
import { getSmartRoutingConfig } from '../utils/smartRouting.js';
|
||||||
import OpenAI from 'openai';
|
import OpenAI from 'openai';
|
||||||
|
|
||||||
// Get OpenAI configuration from smartRouting settings or fallback to environment variables
|
// Get OpenAI configuration from smartRouting settings or fallback to environment variables
|
||||||
const getOpenAIConfig = () => {
|
const getOpenAIConfig = async () => {
|
||||||
const smartRoutingConfig = getSmartRoutingConfig();
|
const smartRoutingConfig = await getSmartRoutingConfig();
|
||||||
return {
|
return {
|
||||||
apiKey: smartRoutingConfig.openaiApiKey,
|
apiKey: smartRoutingConfig.openaiApiKey,
|
||||||
baseURL: smartRoutingConfig.openaiApiBaseUrl,
|
baseURL: smartRoutingConfig.openaiApiBaseUrl,
|
||||||
@@ -34,8 +34,8 @@ const getDimensionsForModel = (model: string): number => {
|
|||||||
};
|
};
|
||||||
|
|
||||||
// Initialize the OpenAI client with smartRouting configuration
|
// Initialize the OpenAI client with smartRouting configuration
|
||||||
const getOpenAIClient = () => {
|
const getOpenAIClient = async () => {
|
||||||
const config = getOpenAIConfig();
|
const config = await getOpenAIConfig();
|
||||||
return new OpenAI({
|
return new OpenAI({
|
||||||
apiKey: config.apiKey, // Get API key from smartRouting settings or environment variables
|
apiKey: config.apiKey, // Get API key from smartRouting settings or environment variables
|
||||||
baseURL: config.baseURL, // Get base URL from smartRouting settings or fallback to default
|
baseURL: config.baseURL, // Get base URL from smartRouting settings or fallback to default
|
||||||
@@ -53,32 +53,26 @@ const getOpenAIClient = () => {
|
|||||||
* @returns Promise with vector embedding as number array
|
* @returns Promise with vector embedding as number array
|
||||||
*/
|
*/
|
||||||
async function generateEmbedding(text: string): Promise<number[]> {
|
async function generateEmbedding(text: string): Promise<number[]> {
|
||||||
try {
|
const config = await getOpenAIConfig();
|
||||||
const config = getOpenAIConfig();
|
const openai = await getOpenAIClient();
|
||||||
const openai = getOpenAIClient();
|
|
||||||
|
|
||||||
// Check if API key is configured
|
// Check if API key is configured
|
||||||
if (!openai.apiKey) {
|
if (!openai.apiKey) {
|
||||||
console.warn('OpenAI API key is not configured. Using fallback embedding method.');
|
console.warn('OpenAI API key is not configured. Using fallback embedding method.');
|
||||||
return generateFallbackEmbedding(text);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Truncate text if it's too long (OpenAI has token limits)
|
|
||||||
const truncatedText = text.length > 8000 ? text.substring(0, 8000) : text;
|
|
||||||
|
|
||||||
// Call OpenAI's embeddings API
|
|
||||||
const response = await openai.embeddings.create({
|
|
||||||
model: config.embeddingModel, // Modern model with better performance
|
|
||||||
input: truncatedText,
|
|
||||||
});
|
|
||||||
|
|
||||||
// Return the embedding
|
|
||||||
return response.data[0].embedding;
|
|
||||||
} catch (error) {
|
|
||||||
console.error('Error generating embedding:', error);
|
|
||||||
console.warn('Falling back to simple embedding method');
|
|
||||||
return generateFallbackEmbedding(text);
|
return generateFallbackEmbedding(text);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Truncate text if it's too long (OpenAI has token limits)
|
||||||
|
const truncatedText = text.length > 8000 ? text.substring(0, 8000) : text;
|
||||||
|
|
||||||
|
// Call OpenAI's embeddings API
|
||||||
|
const response = await openai.embeddings.create({
|
||||||
|
model: config.embeddingModel, // Modern model with better performance
|
||||||
|
input: truncatedText,
|
||||||
|
});
|
||||||
|
|
||||||
|
// Return the embedding
|
||||||
|
return response.data[0].embedding;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -198,12 +192,18 @@ export const saveToolsAsVectorEmbeddings = async (
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
const smartRoutingConfig = getSmartRoutingConfig();
|
const smartRoutingConfig = await getSmartRoutingConfig();
|
||||||
if (!smartRoutingConfig.enabled) {
|
if (!smartRoutingConfig.enabled) {
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
const config = getOpenAIConfig();
|
// Ensure database is initialized before using repository
|
||||||
|
if (!isDatabaseConnected()) {
|
||||||
|
console.info('Database not initialized, initializing...');
|
||||||
|
await initializeDatabase();
|
||||||
|
}
|
||||||
|
|
||||||
|
const config = await getOpenAIConfig();
|
||||||
const vectorRepository = getRepositoryFactory(
|
const vectorRepository = getRepositoryFactory(
|
||||||
'vectorEmbeddings',
|
'vectorEmbeddings',
|
||||||
)() as VectorEmbeddingRepository;
|
)() as VectorEmbeddingRepository;
|
||||||
@@ -227,36 +227,31 @@ export const saveToolsAsVectorEmbeddings = async (
|
|||||||
.filter(Boolean)
|
.filter(Boolean)
|
||||||
.join(' ');
|
.join(' ');
|
||||||
|
|
||||||
try {
|
// Generate embedding
|
||||||
// Generate embedding
|
const embedding = await generateEmbedding(searchableText);
|
||||||
const embedding = await generateEmbedding(searchableText);
|
|
||||||
|
|
||||||
// Check database compatibility before saving
|
// Check database compatibility before saving
|
||||||
await checkDatabaseVectorDimensions(embedding.length);
|
await checkDatabaseVectorDimensions(embedding.length);
|
||||||
|
|
||||||
// Save embedding
|
// Save embedding
|
||||||
await vectorRepository.saveEmbedding(
|
await vectorRepository.saveEmbedding(
|
||||||
'tool',
|
'tool',
|
||||||
`${serverName}:${tool.name}`,
|
`${serverName}:${tool.name}`,
|
||||||
searchableText,
|
searchableText,
|
||||||
embedding,
|
embedding,
|
||||||
{
|
{
|
||||||
serverName,
|
serverName,
|
||||||
toolName: tool.name,
|
toolName: tool.name,
|
||||||
description: tool.description,
|
description: tool.description,
|
||||||
inputSchema: tool.inputSchema,
|
inputSchema: tool.inputSchema,
|
||||||
},
|
},
|
||||||
config.embeddingModel, // Store the model used for this embedding
|
config.embeddingModel, // Store the model used for this embedding
|
||||||
);
|
);
|
||||||
} catch (toolError) {
|
|
||||||
console.error(`Error processing tool ${tool.name} for server ${serverName}:`, toolError);
|
|
||||||
// Continue with the next tool rather than failing the whole batch
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
console.log(`Saved ${tools.length} tool embeddings for server: ${serverName}`);
|
console.log(`Saved ${tools.length} tool embeddings for server: ${serverName}`);
|
||||||
} catch (error) {
|
} catch (error) {
|
||||||
console.error(`Error saving tool embeddings for server ${serverName}:`, error);
|
console.error(`Error saving tool embeddings for server ${serverName}:${error}`);
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
@@ -381,7 +376,7 @@ export const getAllVectorizedTools = async (
|
|||||||
}>
|
}>
|
||||||
> => {
|
> => {
|
||||||
try {
|
try {
|
||||||
const config = getOpenAIConfig();
|
const config = await getOpenAIConfig();
|
||||||
const vectorRepository = getRepositoryFactory(
|
const vectorRepository = getRepositoryFactory(
|
||||||
'vectorEmbeddings',
|
'vectorEmbeddings',
|
||||||
)() as VectorEmbeddingRepository;
|
)() as VectorEmbeddingRepository;
|
||||||
|
|||||||
@@ -173,6 +173,12 @@ export interface SystemConfig {
|
|||||||
oauth?: OAuthProviderConfig; // OAuth provider configuration for upstream MCP servers
|
oauth?: OAuthProviderConfig; // OAuth provider configuration for upstream MCP servers
|
||||||
oauthServer?: OAuthServerConfig; // OAuth authorization server configuration for MCPHub itself
|
oauthServer?: OAuthServerConfig; // OAuth authorization server configuration for MCPHub itself
|
||||||
enableSessionRebuild?: boolean; // Controls whether server session rebuild is enabled
|
enableSessionRebuild?: boolean; // Controls whether server session rebuild is enabled
|
||||||
|
compression?: {
|
||||||
|
enabled?: boolean; // Enable/disable AI compression of MCP tool outputs
|
||||||
|
model?: string; // AI model to use for compression (default: 'gpt-4o-mini')
|
||||||
|
maxInputTokens?: number; // Maximum input tokens for compression (default: 100000)
|
||||||
|
targetReductionRatio?: number; // Target reduction ratio, 0.0-1.0 (default: 0.5)
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
export interface UserConfig {
|
export interface UserConfig {
|
||||||
@@ -243,6 +249,19 @@ export interface OAuthServerConfig {
|
|||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Bearer authentication key configuration
|
||||||
|
export type BearerKeyAccessType = 'all' | 'groups' | 'servers' | 'custom';
|
||||||
|
|
||||||
|
export interface BearerKey {
|
||||||
|
id: string; // Unique identifier for the key
|
||||||
|
name: string; // Human readable key name
|
||||||
|
token: string; // Bearer token value
|
||||||
|
enabled: boolean; // Whether this key is enabled
|
||||||
|
accessType: BearerKeyAccessType; // Access scope type
|
||||||
|
allowedGroups?: string[]; // Allowed group names when accessType === 'groups' or 'custom'
|
||||||
|
allowedServers?: string[]; // Allowed server names when accessType === 'servers' or 'custom'
|
||||||
|
}
|
||||||
|
|
||||||
// Represents the settings for MCP servers
|
// Represents the settings for MCP servers
|
||||||
export interface McpSettings {
|
export interface McpSettings {
|
||||||
users?: IUser[]; // Array of user credentials and permissions
|
users?: IUser[]; // Array of user credentials and permissions
|
||||||
@@ -254,6 +273,7 @@ export interface McpSettings {
|
|||||||
userConfigs?: Record<string, UserConfig>; // User-specific configurations
|
userConfigs?: Record<string, UserConfig>; // User-specific configurations
|
||||||
oauthClients?: IOAuthClient[]; // OAuth clients for MCPHub's authorization server
|
oauthClients?: IOAuthClient[]; // OAuth clients for MCPHub's authorization server
|
||||||
oauthTokens?: IOAuthToken[]; // Persisted OAuth tokens (access + refresh) for authorization server
|
oauthTokens?: IOAuthToken[]; // Persisted OAuth tokens (access + refresh) for authorization server
|
||||||
|
bearerKeys?: BearerKey[]; // Bearer authentication keys (multi-key configuration)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Configuration details for an individual server
|
// Configuration details for an individual server
|
||||||
@@ -420,3 +440,50 @@ export interface AddServerRequest {
|
|||||||
name: string; // Name of the server to add
|
name: string; // Name of the server to add
|
||||||
config: ServerConfig; // Configuration details for the server
|
config: ServerConfig; // Configuration details for the server
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Request payload for batch creating servers
|
||||||
|
export interface BatchCreateServersRequest {
|
||||||
|
servers: AddServerRequest[]; // Array of servers to create
|
||||||
|
}
|
||||||
|
|
||||||
|
// Result for a single server in batch operation
|
||||||
|
export interface BatchServerResult {
|
||||||
|
name: string; // Server name
|
||||||
|
success: boolean; // Whether the operation succeeded
|
||||||
|
message?: string; // Error message if failed
|
||||||
|
}
|
||||||
|
|
||||||
|
// Response for batch create servers operation
|
||||||
|
export interface BatchCreateServersResponse {
|
||||||
|
success: boolean; // Overall operation success (true if at least one server succeeded)
|
||||||
|
successCount: number; // Number of servers successfully created
|
||||||
|
failureCount: number; // Number of servers that failed
|
||||||
|
results: BatchServerResult[]; // Detailed results for each server
|
||||||
|
}
|
||||||
|
|
||||||
|
// Request payload for adding a new group
|
||||||
|
export interface AddGroupRequest {
|
||||||
|
name: string; // Name of the group to add
|
||||||
|
description?: string; // Optional description of the group
|
||||||
|
servers?: string[] | IGroupServerConfig[]; // Array of server names or server configurations
|
||||||
|
}
|
||||||
|
|
||||||
|
// Request payload for batch creating groups
|
||||||
|
export interface BatchCreateGroupsRequest {
|
||||||
|
groups: AddGroupRequest[]; // Array of groups to create
|
||||||
|
}
|
||||||
|
|
||||||
|
// Result for a single group in batch operation
|
||||||
|
export interface BatchGroupResult {
|
||||||
|
name: string; // Group name
|
||||||
|
success: boolean; // Whether the operation succeeded
|
||||||
|
message?: string; // Error message if failed
|
||||||
|
}
|
||||||
|
|
||||||
|
// Response for batch create groups operation
|
||||||
|
export interface BatchCreateGroupsResponse {
|
||||||
|
success: boolean; // Overall operation success (true if at least one group succeeded)
|
||||||
|
successCount: number; // Number of groups successfully created
|
||||||
|
failureCount: number; // Number of groups that failed
|
||||||
|
results: BatchGroupResult[]; // Detailed results for each group
|
||||||
|
}
|
||||||
|
|||||||
122
src/utils/migration.test.ts
Normal file
122
src/utils/migration.test.ts
Normal file
@@ -0,0 +1,122 @@
|
|||||||
|
import { jest } from '@jest/globals';
|
||||||
|
|
||||||
|
// Mocks must be defined before importing the module under test.
|
||||||
|
|
||||||
|
const initializeDatabaseMock = jest.fn(async () => undefined);
|
||||||
|
jest.mock('../db/connection.js', () => ({
|
||||||
|
initializeDatabase: initializeDatabaseMock,
|
||||||
|
}));
|
||||||
|
|
||||||
|
const setDaoFactoryMock = jest.fn();
|
||||||
|
jest.mock('../dao/DaoFactory.js', () => ({
|
||||||
|
setDaoFactory: setDaoFactoryMock,
|
||||||
|
}));
|
||||||
|
|
||||||
|
jest.mock('../dao/DatabaseDaoFactory.js', () => ({
|
||||||
|
DatabaseDaoFactory: {
|
||||||
|
getInstance: jest.fn(() => ({
|
||||||
|
/* noop */
|
||||||
|
})),
|
||||||
|
},
|
||||||
|
}));
|
||||||
|
|
||||||
|
const loadOriginalSettingsMock = jest.fn(() => ({ users: [] }));
|
||||||
|
jest.mock('../config/index.js', () => ({
|
||||||
|
loadOriginalSettings: loadOriginalSettingsMock,
|
||||||
|
}));
|
||||||
|
|
||||||
|
const userRepoCountMock = jest.fn<() => Promise<number>>();
|
||||||
|
jest.mock('../db/repositories/UserRepository.js', () => ({
|
||||||
|
UserRepository: jest.fn().mockImplementation(() => ({
|
||||||
|
count: userRepoCountMock,
|
||||||
|
})),
|
||||||
|
}));
|
||||||
|
|
||||||
|
const bearerKeyCountMock = jest.fn<() => Promise<number>>();
|
||||||
|
const bearerKeyCreateMock =
|
||||||
|
jest.fn<
|
||||||
|
(data: {
|
||||||
|
name: string;
|
||||||
|
token: string;
|
||||||
|
enabled: boolean;
|
||||||
|
accessType: string;
|
||||||
|
allowedGroups: string[];
|
||||||
|
allowedServers: string[];
|
||||||
|
}) => Promise<unknown>
|
||||||
|
>();
|
||||||
|
jest.mock('../db/repositories/BearerKeyRepository.js', () => ({
|
||||||
|
BearerKeyRepository: jest.fn().mockImplementation(() => ({
|
||||||
|
count: bearerKeyCountMock,
|
||||||
|
create: bearerKeyCreateMock,
|
||||||
|
})),
|
||||||
|
}));
|
||||||
|
|
||||||
|
const systemConfigGetMock = jest.fn<() => Promise<any>>();
|
||||||
|
jest.mock('../db/repositories/SystemConfigRepository.js', () => ({
|
||||||
|
SystemConfigRepository: jest.fn().mockImplementation(() => ({
|
||||||
|
get: systemConfigGetMock,
|
||||||
|
})),
|
||||||
|
}));
|
||||||
|
|
||||||
|
describe('initializeDatabaseMode legacy bearer auth migration', () => {
|
||||||
|
beforeEach(() => {
|
||||||
|
jest.clearAllMocks();
|
||||||
|
});
|
||||||
|
|
||||||
|
it('skips legacy migration when bearerKeys table already has data', async () => {
|
||||||
|
userRepoCountMock.mockResolvedValue(1);
|
||||||
|
bearerKeyCountMock.mockResolvedValue(2);
|
||||||
|
systemConfigGetMock.mockResolvedValue({
|
||||||
|
routing: { enableBearerAuth: true, bearerAuthKey: 'db-key' },
|
||||||
|
});
|
||||||
|
|
||||||
|
const { initializeDatabaseMode } = await import('./migration.js');
|
||||||
|
const ok = await initializeDatabaseMode();
|
||||||
|
|
||||||
|
expect(ok).toBe(true);
|
||||||
|
expect(initializeDatabaseMock).toHaveBeenCalled();
|
||||||
|
expect(loadOriginalSettingsMock).not.toHaveBeenCalled();
|
||||||
|
expect(systemConfigGetMock).not.toHaveBeenCalled();
|
||||||
|
expect(bearerKeyCreateMock).not.toHaveBeenCalled();
|
||||||
|
});
|
||||||
|
|
||||||
|
it('migrates legacy routing bearerAuthKey into bearerKeys when users exist and keys table is empty', async () => {
|
||||||
|
userRepoCountMock.mockResolvedValue(3);
|
||||||
|
bearerKeyCountMock.mockResolvedValue(0);
|
||||||
|
systemConfigGetMock.mockResolvedValue({
|
||||||
|
routing: { enableBearerAuth: true, bearerAuthKey: 'db-key' },
|
||||||
|
});
|
||||||
|
|
||||||
|
const { initializeDatabaseMode } = await import('./migration.js');
|
||||||
|
const ok = await initializeDatabaseMode();
|
||||||
|
|
||||||
|
expect(ok).toBe(true);
|
||||||
|
expect(loadOriginalSettingsMock).not.toHaveBeenCalled();
|
||||||
|
expect(systemConfigGetMock).toHaveBeenCalledTimes(1);
|
||||||
|
expect(bearerKeyCreateMock).toHaveBeenCalledTimes(1);
|
||||||
|
expect(bearerKeyCreateMock).toHaveBeenCalledWith({
|
||||||
|
name: 'default',
|
||||||
|
token: 'db-key',
|
||||||
|
enabled: true,
|
||||||
|
accessType: 'all',
|
||||||
|
allowedGroups: [],
|
||||||
|
allowedServers: [],
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
it('does not migrate when routing has no bearerAuthKey', async () => {
|
||||||
|
userRepoCountMock.mockResolvedValue(1);
|
||||||
|
bearerKeyCountMock.mockResolvedValue(0);
|
||||||
|
systemConfigGetMock.mockResolvedValue({
|
||||||
|
routing: { enableBearerAuth: true, bearerAuthKey: ' ' },
|
||||||
|
});
|
||||||
|
|
||||||
|
const { initializeDatabaseMode } = await import('./migration.js');
|
||||||
|
const ok = await initializeDatabaseMode();
|
||||||
|
|
||||||
|
expect(ok).toBe(true);
|
||||||
|
expect(loadOriginalSettingsMock).not.toHaveBeenCalled();
|
||||||
|
expect(systemConfigGetMock).toHaveBeenCalledTimes(1);
|
||||||
|
expect(bearerKeyCreateMock).not.toHaveBeenCalled();
|
||||||
|
});
|
||||||
|
});
|
||||||
@@ -7,6 +7,9 @@ import { ServerRepository } from '../db/repositories/ServerRepository.js';
|
|||||||
import { GroupRepository } from '../db/repositories/GroupRepository.js';
|
import { GroupRepository } from '../db/repositories/GroupRepository.js';
|
||||||
import { SystemConfigRepository } from '../db/repositories/SystemConfigRepository.js';
|
import { SystemConfigRepository } from '../db/repositories/SystemConfigRepository.js';
|
||||||
import { UserConfigRepository } from '../db/repositories/UserConfigRepository.js';
|
import { UserConfigRepository } from '../db/repositories/UserConfigRepository.js';
|
||||||
|
import { OAuthClientRepository } from '../db/repositories/OAuthClientRepository.js';
|
||||||
|
import { OAuthTokenRepository } from '../db/repositories/OAuthTokenRepository.js';
|
||||||
|
import { BearerKeyRepository } from '../db/repositories/BearerKeyRepository.js';
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Migrate from file-based configuration to database
|
* Migrate from file-based configuration to database
|
||||||
@@ -29,6 +32,9 @@ export async function migrateToDatabase(): Promise<boolean> {
|
|||||||
const groupRepo = new GroupRepository();
|
const groupRepo = new GroupRepository();
|
||||||
const systemConfigRepo = new SystemConfigRepository();
|
const systemConfigRepo = new SystemConfigRepository();
|
||||||
const userConfigRepo = new UserConfigRepository();
|
const userConfigRepo = new UserConfigRepository();
|
||||||
|
const oauthClientRepo = new OAuthClientRepository();
|
||||||
|
const oauthTokenRepo = new OAuthTokenRepository();
|
||||||
|
const bearerKeyRepo = new BearerKeyRepository();
|
||||||
|
|
||||||
// Migrate users
|
// Migrate users
|
||||||
if (settings.users && settings.users.length > 0) {
|
if (settings.users && settings.users.length > 0) {
|
||||||
@@ -71,6 +77,7 @@ export async function migrateToDatabase(): Promise<boolean> {
|
|||||||
prompts: config.prompts,
|
prompts: config.prompts,
|
||||||
options: config.options,
|
options: config.options,
|
||||||
oauth: config.oauth,
|
oauth: config.oauth,
|
||||||
|
openapi: config.openapi,
|
||||||
});
|
});
|
||||||
console.log(` - Created server: ${name}`);
|
console.log(` - Created server: ${name}`);
|
||||||
} else {
|
} else {
|
||||||
@@ -110,11 +117,58 @@ export async function migrateToDatabase(): Promise<boolean> {
|
|||||||
oauth: settings.systemConfig.oauth || {},
|
oauth: settings.systemConfig.oauth || {},
|
||||||
oauthServer: settings.systemConfig.oauthServer || {},
|
oauthServer: settings.systemConfig.oauthServer || {},
|
||||||
enableSessionRebuild: settings.systemConfig.enableSessionRebuild,
|
enableSessionRebuild: settings.systemConfig.enableSessionRebuild,
|
||||||
|
compression: settings.systemConfig.compression || {},
|
||||||
};
|
};
|
||||||
await systemConfigRepo.update(systemConfig);
|
await systemConfigRepo.update(systemConfig);
|
||||||
console.log(' - System configuration updated');
|
console.log(' - System configuration updated');
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Migrate bearer auth keys
|
||||||
|
console.log('Migrating bearer authentication keys...');
|
||||||
|
|
||||||
|
// Prefer explicit bearerKeys if present in settings
|
||||||
|
if (Array.isArray(settings.bearerKeys) && settings.bearerKeys.length > 0) {
|
||||||
|
for (const key of settings.bearerKeys) {
|
||||||
|
await bearerKeyRepo.create({
|
||||||
|
name: key.name,
|
||||||
|
token: key.token,
|
||||||
|
enabled: key.enabled,
|
||||||
|
accessType: key.accessType,
|
||||||
|
allowedGroups: key.allowedGroups ?? [],
|
||||||
|
allowedServers: key.allowedServers ?? [],
|
||||||
|
} as any);
|
||||||
|
console.log(` - Migrated bearer key: ${key.name} (${key.id ?? 'no-id'})`);
|
||||||
|
}
|
||||||
|
} else if (settings.systemConfig?.routing) {
|
||||||
|
// Fallback to legacy routing.enableBearerAuth / bearerAuthKey
|
||||||
|
const routing = settings.systemConfig.routing as any;
|
||||||
|
const enableBearerAuth: boolean = !!routing.enableBearerAuth;
|
||||||
|
const rawKey: string = (routing.bearerAuthKey || '').trim();
|
||||||
|
|
||||||
|
// Migration rules:
|
||||||
|
// 1) enable=false, key empty -> no keys
|
||||||
|
// 2) enable=false, key present -> one disabled key (name=default)
|
||||||
|
// 3) enable=true, key present -> one enabled key (name=default)
|
||||||
|
// 4) enable=true, key empty -> no keys
|
||||||
|
if (rawKey) {
|
||||||
|
await bearerKeyRepo.create({
|
||||||
|
name: 'default',
|
||||||
|
token: rawKey,
|
||||||
|
enabled: enableBearerAuth,
|
||||||
|
accessType: 'all',
|
||||||
|
allowedGroups: [],
|
||||||
|
allowedServers: [],
|
||||||
|
} as any);
|
||||||
|
console.log(
|
||||||
|
` - Migrated legacy bearer auth config to key: default (enabled=${enableBearerAuth})`,
|
||||||
|
);
|
||||||
|
} else {
|
||||||
|
console.log(' - No legacy bearer auth key found, skipping bearer key migration');
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
console.log(' - No bearer auth configuration found, skipping bearer key migration');
|
||||||
|
}
|
||||||
|
|
||||||
// Migrate user configs
|
// Migrate user configs
|
||||||
if (settings.userConfigs) {
|
if (settings.userConfigs) {
|
||||||
const usernames = Object.keys(settings.userConfigs);
|
const usernames = Object.keys(settings.userConfigs);
|
||||||
@@ -129,6 +183,53 @@ export async function migrateToDatabase(): Promise<boolean> {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Migrate OAuth clients
|
||||||
|
if (settings.oauthClients && settings.oauthClients.length > 0) {
|
||||||
|
console.log(`Migrating ${settings.oauthClients.length} OAuth clients...`);
|
||||||
|
for (const client of settings.oauthClients) {
|
||||||
|
const exists = await oauthClientRepo.exists(client.clientId);
|
||||||
|
if (!exists) {
|
||||||
|
await oauthClientRepo.create({
|
||||||
|
clientId: client.clientId,
|
||||||
|
clientSecret: client.clientSecret,
|
||||||
|
name: client.name,
|
||||||
|
redirectUris: client.redirectUris,
|
||||||
|
grants: client.grants,
|
||||||
|
scopes: client.scopes,
|
||||||
|
owner: client.owner,
|
||||||
|
metadata: client.metadata,
|
||||||
|
});
|
||||||
|
console.log(` - Created OAuth client: ${client.clientId}`);
|
||||||
|
} else {
|
||||||
|
console.log(` - OAuth client already exists: ${client.clientId}`);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Migrate OAuth tokens
|
||||||
|
if (settings.oauthTokens && settings.oauthTokens.length > 0) {
|
||||||
|
console.log(`Migrating ${settings.oauthTokens.length} OAuth tokens...`);
|
||||||
|
for (const token of settings.oauthTokens) {
|
||||||
|
const exists = await oauthTokenRepo.exists(token.accessToken);
|
||||||
|
if (!exists) {
|
||||||
|
await oauthTokenRepo.create({
|
||||||
|
accessToken: token.accessToken,
|
||||||
|
refreshToken: token.refreshToken,
|
||||||
|
accessTokenExpiresAt: new Date(token.accessTokenExpiresAt),
|
||||||
|
refreshTokenExpiresAt: token.refreshTokenExpiresAt
|
||||||
|
? new Date(token.refreshTokenExpiresAt)
|
||||||
|
: undefined,
|
||||||
|
scope: token.scope,
|
||||||
|
clientId: token.clientId,
|
||||||
|
username: token.username,
|
||||||
|
});
|
||||||
|
console.log(` - Created OAuth token for client: ${token.clientId}`);
|
||||||
|
} else {
|
||||||
|
console.log(` - OAuth token already exists: ${token.accessToken.substring(0, 8)}...`);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
console.log('✅ Migration completed successfully');
|
console.log('✅ Migration completed successfully');
|
||||||
return true;
|
return true;
|
||||||
} catch (error) {
|
} catch (error) {
|
||||||
@@ -155,6 +256,9 @@ export async function initializeDatabaseMode(): Promise<boolean> {
|
|||||||
|
|
||||||
// Check if migration is needed
|
// Check if migration is needed
|
||||||
const userRepo = new UserRepository();
|
const userRepo = new UserRepository();
|
||||||
|
const bearerKeyRepo = new BearerKeyRepository();
|
||||||
|
const systemConfigRepo = new SystemConfigRepository();
|
||||||
|
|
||||||
const userCount = await userRepo.count();
|
const userCount = await userRepo.count();
|
||||||
|
|
||||||
if (userCount === 0) {
|
if (userCount === 0) {
|
||||||
@@ -165,6 +269,36 @@ export async function initializeDatabaseMode(): Promise<boolean> {
|
|||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
console.log(`Database already contains ${userCount} users, skipping migration`);
|
console.log(`Database already contains ${userCount} users, skipping migration`);
|
||||||
|
|
||||||
|
// One-time migration for legacy bearer auth config stored inside DB routing settings.
|
||||||
|
// If bearerKeys table already has data, do nothing.
|
||||||
|
const bearerKeyCount = await bearerKeyRepo.count();
|
||||||
|
if (bearerKeyCount > 0) {
|
||||||
|
console.log(
|
||||||
|
`Bearer keys table already contains ${bearerKeyCount} keys, skipping legacy bearer auth migration`,
|
||||||
|
);
|
||||||
|
} else {
|
||||||
|
const systemConfig = await systemConfigRepo.get();
|
||||||
|
const routing = (systemConfig as any)?.routing || {};
|
||||||
|
const enableBearerAuth: boolean = !!routing.enableBearerAuth;
|
||||||
|
const rawKey: string = (routing.bearerAuthKey || '').trim();
|
||||||
|
|
||||||
|
if (rawKey) {
|
||||||
|
await bearerKeyRepo.create({
|
||||||
|
name: 'default',
|
||||||
|
token: rawKey,
|
||||||
|
enabled: enableBearerAuth,
|
||||||
|
accessType: 'all',
|
||||||
|
allowedGroups: [],
|
||||||
|
allowedServers: [],
|
||||||
|
} as any);
|
||||||
|
console.log(
|
||||||
|
` - Migrated legacy DB routing bearer auth config to key: default (enabled=${enableBearerAuth})`,
|
||||||
|
);
|
||||||
|
} else {
|
||||||
|
console.log('No legacy DB routing bearer auth key found, skipping bearer key migration');
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
console.log('✅ Database mode initialized successfully');
|
console.log('✅ Database mode initialized successfully');
|
||||||
|
|||||||
@@ -11,7 +11,7 @@ export const resolveOAuthUserFromToken = async (token?: string): Promise<IUser |
|
|||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
|
||||||
const oauthToken = getOAuthStoredToken(token);
|
const oauthToken = await getOAuthStoredToken(token);
|
||||||
if (!oauthToken || oauthToken.accessToken !== token) {
|
if (!oauthToken || oauthToken.accessToken !== token) {
|
||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,4 +1,5 @@
|
|||||||
import { loadSettings, expandEnvVars } from '../config/index.js';
|
import { expandEnvVars } from '../config/index.js';
|
||||||
|
import { getSystemConfigDao } from '../dao/DaoFactory.js';
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Smart routing configuration interface
|
* Smart routing configuration interface
|
||||||
@@ -22,10 +23,11 @@ export interface SmartRoutingConfig {
|
|||||||
*
|
*
|
||||||
* @returns {SmartRoutingConfig} Complete smart routing configuration
|
* @returns {SmartRoutingConfig} Complete smart routing configuration
|
||||||
*/
|
*/
|
||||||
export function getSmartRoutingConfig(): SmartRoutingConfig {
|
export async function getSmartRoutingConfig(): Promise<SmartRoutingConfig> {
|
||||||
const settings = loadSettings();
|
// Get system config from DAO
|
||||||
const smartRoutingSettings: Partial<SmartRoutingConfig> =
|
const systemConfigDao = getSystemConfigDao();
|
||||||
settings.systemConfig?.smartRouting || {};
|
const systemConfig = await systemConfigDao.get();
|
||||||
|
const smartRoutingSettings: Partial<SmartRoutingConfig> = systemConfig.smartRouting || {};
|
||||||
|
|
||||||
return {
|
return {
|
||||||
// Enabled status - check multiple environment variables
|
// Enabled status - check multiple environment variables
|
||||||
|
|||||||
@@ -1,86 +1,76 @@
|
|||||||
import { getMcpSettingsJson } from '../../src/controllers/configController.js'
|
import { getMcpSettingsJson } from '../../src/controllers/configController.js';
|
||||||
import * as config from '../../src/config/index.js'
|
import * as DaoFactory from '../../src/dao/DaoFactory.js';
|
||||||
import { Request, Response } from 'express'
|
import { Request, Response } from 'express';
|
||||||
|
|
||||||
// Mock the config module
|
jest.mock('../../src/dao/DaoFactory.js');
|
||||||
jest.mock('../../src/config/index.js')
|
|
||||||
|
|
||||||
describe('ConfigController - getMcpSettingsJson', () => {
|
describe('ConfigController - getMcpSettingsJson', () => {
|
||||||
let mockRequest: Partial<Request>
|
let mockRequest: Partial<Request>;
|
||||||
let mockResponse: Partial<Response>
|
let mockResponse: Partial<Response>;
|
||||||
let mockJson: jest.Mock
|
let mockJson: jest.Mock;
|
||||||
let mockStatus: jest.Mock
|
let mockStatus: jest.Mock;
|
||||||
|
let mockServerDao: { findById: jest.Mock; findAll: jest.Mock };
|
||||||
|
let mockUserDao: { findAll: jest.Mock };
|
||||||
|
let mockGroupDao: { findAll: jest.Mock };
|
||||||
|
let mockSystemConfigDao: { get: jest.Mock };
|
||||||
|
let mockUserConfigDao: { getAll: jest.Mock };
|
||||||
|
let mockOAuthClientDao: { findAll: jest.Mock };
|
||||||
|
let mockOAuthTokenDao: { findAll: jest.Mock };
|
||||||
|
let mockBearerKeyDao: { findAll: jest.Mock };
|
||||||
|
|
||||||
beforeEach(() => {
|
beforeEach(() => {
|
||||||
mockJson = jest.fn()
|
jest.clearAllMocks();
|
||||||
mockStatus = jest.fn().mockReturnThis()
|
|
||||||
|
mockJson = jest.fn();
|
||||||
|
mockStatus = jest.fn().mockReturnThis();
|
||||||
mockRequest = {
|
mockRequest = {
|
||||||
query: {},
|
query: {},
|
||||||
}
|
};
|
||||||
mockResponse = {
|
mockResponse = {
|
||||||
json: mockJson,
|
json: mockJson,
|
||||||
status: mockStatus,
|
status: mockStatus,
|
||||||
}
|
};
|
||||||
|
|
||||||
// Reset mocks
|
mockServerDao = {
|
||||||
jest.clearAllMocks()
|
findById: jest.fn(),
|
||||||
})
|
findAll: jest.fn(),
|
||||||
|
};
|
||||||
|
mockUserDao = { findAll: jest.fn() };
|
||||||
|
mockGroupDao = { findAll: jest.fn() };
|
||||||
|
mockSystemConfigDao = { get: jest.fn() };
|
||||||
|
mockUserConfigDao = { getAll: jest.fn() };
|
||||||
|
mockOAuthClientDao = { findAll: jest.fn() };
|
||||||
|
mockOAuthTokenDao = { findAll: jest.fn() };
|
||||||
|
mockBearerKeyDao = { findAll: jest.fn() };
|
||||||
|
|
||||||
describe('Full Settings Export', () => {
|
// Wire DaoFactory convenience functions to our mocks
|
||||||
it('should handle settings without users array', () => {
|
(DaoFactory.getServerDao as unknown as jest.Mock).mockReturnValue(mockServerDao);
|
||||||
const mockSettings = {
|
(DaoFactory.getUserDao as unknown as jest.Mock).mockReturnValue(mockUserDao);
|
||||||
mcpServers: {
|
(DaoFactory.getGroupDao as unknown as jest.Mock).mockReturnValue(mockGroupDao);
|
||||||
'test-server': {
|
(DaoFactory.getSystemConfigDao as unknown as jest.Mock).mockReturnValue(mockSystemConfigDao);
|
||||||
command: 'test',
|
(DaoFactory.getUserConfigDao as unknown as jest.Mock).mockReturnValue(mockUserConfigDao);
|
||||||
args: ['--test'],
|
(DaoFactory.getOAuthClientDao as unknown as jest.Mock).mockReturnValue(mockOAuthClientDao);
|
||||||
},
|
(DaoFactory.getOAuthTokenDao as unknown as jest.Mock).mockReturnValue(mockOAuthTokenDao);
|
||||||
},
|
(DaoFactory.getBearerKeyDao as unknown as jest.Mock).mockReturnValue(mockBearerKeyDao);
|
||||||
}
|
});
|
||||||
|
|
||||||
;(config.loadOriginalSettings as jest.Mock).mockReturnValue(mockSettings)
|
|
||||||
|
|
||||||
getMcpSettingsJson(mockRequest as Request, mockResponse as Response)
|
|
||||||
|
|
||||||
expect(mockJson).toHaveBeenCalledWith({
|
|
||||||
success: true,
|
|
||||||
data: {
|
|
||||||
mcpServers: mockSettings.mcpServers,
|
|
||||||
users: undefined,
|
|
||||||
},
|
|
||||||
})
|
|
||||||
})
|
|
||||||
})
|
|
||||||
|
|
||||||
describe('Individual Server Export', () => {
|
describe('Individual Server Export', () => {
|
||||||
it('should return individual server configuration when serverName is specified', () => {
|
it('should return individual server configuration when serverName is specified', async () => {
|
||||||
const mockSettings = {
|
const serverConfig = {
|
||||||
mcpServers: {
|
name: 'test-server',
|
||||||
'test-server': {
|
command: 'test',
|
||||||
command: 'test',
|
args: ['--test'],
|
||||||
args: ['--test'],
|
env: {
|
||||||
env: {
|
TEST_VAR: 'test-value',
|
||||||
TEST_VAR: 'test-value',
|
|
||||||
},
|
|
||||||
},
|
|
||||||
'another-server': {
|
|
||||||
command: 'another',
|
|
||||||
args: ['--another'],
|
|
||||||
},
|
|
||||||
},
|
},
|
||||||
users: [
|
};
|
||||||
{
|
|
||||||
username: 'admin',
|
|
||||||
password: '$2b$10$hashedpassword',
|
|
||||||
isAdmin: true,
|
|
||||||
},
|
|
||||||
],
|
|
||||||
}
|
|
||||||
|
|
||||||
mockRequest.query = { serverName: 'test-server' }
|
mockRequest.query = { serverName: 'test-server' };
|
||||||
;(config.loadOriginalSettings as jest.Mock).mockReturnValue(mockSettings)
|
mockServerDao.findById.mockResolvedValue(serverConfig);
|
||||||
|
|
||||||
getMcpSettingsJson(mockRequest as Request, mockResponse as Response)
|
await getMcpSettingsJson(mockRequest as Request, mockResponse as Response);
|
||||||
|
|
||||||
|
expect(mockServerDao.findById).toHaveBeenCalledWith('test-server');
|
||||||
expect(mockJson).toHaveBeenCalledWith({
|
expect(mockJson).toHaveBeenCalledWith({
|
||||||
success: true,
|
success: true,
|
||||||
data: {
|
data: {
|
||||||
@@ -94,46 +84,77 @@ describe('ConfigController - getMcpSettingsJson', () => {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
})
|
});
|
||||||
})
|
});
|
||||||
|
|
||||||
it('should return 404 when server does not exist', () => {
|
it('should return 404 when server does not exist', async () => {
|
||||||
const mockSettings = {
|
mockRequest.query = { serverName: 'non-existent-server' };
|
||||||
mcpServers: {
|
mockServerDao.findById.mockResolvedValue(null);
|
||||||
'test-server': {
|
|
||||||
command: 'test',
|
|
||||||
args: ['--test'],
|
|
||||||
},
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
mockRequest.query = { serverName: 'non-existent-server' }
|
await getMcpSettingsJson(mockRequest as Request, mockResponse as Response);
|
||||||
;(config.loadOriginalSettings as jest.Mock).mockReturnValue(mockSettings)
|
|
||||||
|
|
||||||
getMcpSettingsJson(mockRequest as Request, mockResponse as Response)
|
expect(mockServerDao.findById).toHaveBeenCalledWith('non-existent-server');
|
||||||
|
expect(mockStatus).toHaveBeenCalledWith(404);
|
||||||
expect(mockStatus).toHaveBeenCalledWith(404)
|
|
||||||
expect(mockJson).toHaveBeenCalledWith({
|
expect(mockJson).toHaveBeenCalledWith({
|
||||||
success: false,
|
success: false,
|
||||||
message: "Server 'non-existent-server' not found",
|
message: "Server 'non-existent-server' not found",
|
||||||
})
|
});
|
||||||
})
|
});
|
||||||
})
|
|
||||||
|
it('should remove null values from server configuration', async () => {
|
||||||
|
const serverConfig = {
|
||||||
|
name: 'test-server',
|
||||||
|
command: 'test',
|
||||||
|
args: ['--test'],
|
||||||
|
url: null,
|
||||||
|
env: null,
|
||||||
|
headers: null,
|
||||||
|
options: {
|
||||||
|
timeout: 30,
|
||||||
|
retries: null,
|
||||||
|
},
|
||||||
|
};
|
||||||
|
|
||||||
|
mockRequest.query = { serverName: 'test-server' };
|
||||||
|
mockServerDao.findById.mockResolvedValue(serverConfig);
|
||||||
|
|
||||||
|
await getMcpSettingsJson(mockRequest as Request, mockResponse as Response);
|
||||||
|
|
||||||
|
expect(mockJson).toHaveBeenCalledWith({
|
||||||
|
success: true,
|
||||||
|
data: {
|
||||||
|
mcpServers: {
|
||||||
|
'test-server': {
|
||||||
|
command: 'test',
|
||||||
|
args: ['--test'],
|
||||||
|
options: {
|
||||||
|
timeout: 30,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
});
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
describe('Error Handling', () => {
|
describe('Error Handling', () => {
|
||||||
it('should handle errors gracefully and return 500', () => {
|
it('should handle errors gracefully and return 500', async () => {
|
||||||
const errorMessage = 'Failed to load settings'
|
mockServerDao.findAll.mockRejectedValue(new Error('boom'));
|
||||||
;(config.loadOriginalSettings as jest.Mock).mockImplementation(() => {
|
mockUserDao.findAll.mockResolvedValue([]);
|
||||||
throw new Error(errorMessage)
|
mockGroupDao.findAll.mockResolvedValue([]);
|
||||||
})
|
mockSystemConfigDao.get.mockResolvedValue({});
|
||||||
|
mockUserConfigDao.getAll.mockResolvedValue({});
|
||||||
|
mockOAuthClientDao.findAll.mockResolvedValue([]);
|
||||||
|
mockOAuthTokenDao.findAll.mockResolvedValue([]);
|
||||||
|
mockBearerKeyDao.findAll.mockResolvedValue([]);
|
||||||
|
|
||||||
getMcpSettingsJson(mockRequest as Request, mockResponse as Response)
|
await getMcpSettingsJson(mockRequest as Request, mockResponse as Response);
|
||||||
|
|
||||||
expect(mockStatus).toHaveBeenCalledWith(500)
|
expect(mockStatus).toHaveBeenCalledWith(500);
|
||||||
expect(mockJson).toHaveBeenCalledWith({
|
expect(mockJson).toHaveBeenCalledWith({
|
||||||
success: false,
|
success: false,
|
||||||
message: 'Failed to get MCP settings',
|
message: 'Failed to get MCP settings',
|
||||||
})
|
});
|
||||||
})
|
});
|
||||||
})
|
});
|
||||||
})
|
});
|
||||||
|
|||||||
97
tests/dao/bearerKeyDao.test.ts
Normal file
97
tests/dao/bearerKeyDao.test.ts
Normal file
@@ -0,0 +1,97 @@
|
|||||||
|
import fs from 'fs';
|
||||||
|
import os from 'os';
|
||||||
|
import path from 'path';
|
||||||
|
|
||||||
|
import { BearerKeyDaoImpl } from '../../src/dao/BearerKeyDao.js';
|
||||||
|
|
||||||
|
const writeSettings = (settingsPath: string, settings: unknown): void => {
|
||||||
|
fs.writeFileSync(settingsPath, JSON.stringify(settings, null, 2), 'utf8');
|
||||||
|
};
|
||||||
|
|
||||||
|
describe('BearerKeyDaoImpl migration + settings caching behavior', () => {
|
||||||
|
let tmpDir: string;
|
||||||
|
let settingsPath: string;
|
||||||
|
let originalSettingsEnv: string | undefined;
|
||||||
|
|
||||||
|
beforeEach(() => {
|
||||||
|
tmpDir = fs.mkdtempSync(path.join(os.tmpdir(), 'mcphub-bearer-keys-'));
|
||||||
|
settingsPath = path.join(tmpDir, 'mcp_settings.json');
|
||||||
|
|
||||||
|
originalSettingsEnv = process.env.MCPHUB_SETTING_PATH;
|
||||||
|
process.env.MCPHUB_SETTING_PATH = settingsPath;
|
||||||
|
});
|
||||||
|
|
||||||
|
afterEach(() => {
|
||||||
|
if (originalSettingsEnv === undefined) {
|
||||||
|
delete process.env.MCPHUB_SETTING_PATH;
|
||||||
|
} else {
|
||||||
|
process.env.MCPHUB_SETTING_PATH = originalSettingsEnv;
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
fs.rmSync(tmpDir, { recursive: true, force: true });
|
||||||
|
} catch {
|
||||||
|
// ignore cleanup errors
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
it('does not rewrite settings when bearerKeys exists as an empty array', async () => {
|
||||||
|
writeSettings(settingsPath, {
|
||||||
|
mcpServers: {},
|
||||||
|
users: [],
|
||||||
|
systemConfig: {
|
||||||
|
routing: {
|
||||||
|
enableBearerAuth: false,
|
||||||
|
bearerAuthKey: '',
|
||||||
|
},
|
||||||
|
},
|
||||||
|
bearerKeys: [],
|
||||||
|
});
|
||||||
|
|
||||||
|
const writeSpy = jest.spyOn(fs, 'writeFileSync');
|
||||||
|
|
||||||
|
const dao = new BearerKeyDaoImpl();
|
||||||
|
const enabled1 = await dao.findEnabled();
|
||||||
|
const enabled2 = await dao.findEnabled();
|
||||||
|
|
||||||
|
expect(enabled1).toEqual([]);
|
||||||
|
expect(enabled2).toEqual([]);
|
||||||
|
|
||||||
|
// The DAO should NOT persist anything because bearerKeys already exists.
|
||||||
|
expect(writeSpy).not.toHaveBeenCalled();
|
||||||
|
|
||||||
|
writeSpy.mockRestore();
|
||||||
|
});
|
||||||
|
|
||||||
|
it('migrates legacy bearerAuthKey only once', async () => {
|
||||||
|
writeSettings(settingsPath, {
|
||||||
|
mcpServers: {},
|
||||||
|
users: [],
|
||||||
|
systemConfig: {
|
||||||
|
routing: {
|
||||||
|
enableBearerAuth: true,
|
||||||
|
bearerAuthKey: 'legacy-token',
|
||||||
|
},
|
||||||
|
},
|
||||||
|
// bearerKeys is intentionally missing to trigger migration
|
||||||
|
});
|
||||||
|
|
||||||
|
const writeSpy = jest.spyOn(fs, 'writeFileSync');
|
||||||
|
|
||||||
|
const dao = new BearerKeyDaoImpl();
|
||||||
|
|
||||||
|
const enabled1 = await dao.findEnabled();
|
||||||
|
expect(enabled1).toHaveLength(1);
|
||||||
|
expect(enabled1[0].token).toBe('legacy-token');
|
||||||
|
expect(enabled1[0].enabled).toBe(true);
|
||||||
|
|
||||||
|
const enabled2 = await dao.findEnabled();
|
||||||
|
expect(enabled2).toHaveLength(1);
|
||||||
|
expect(enabled2[0].token).toBe('legacy-token');
|
||||||
|
|
||||||
|
// One write for the migration, no further writes on subsequent reads.
|
||||||
|
expect(writeSpy).toHaveBeenCalledTimes(1);
|
||||||
|
|
||||||
|
writeSpy.mockRestore();
|
||||||
|
});
|
||||||
|
});
|
||||||
@@ -10,29 +10,86 @@ import {
|
|||||||
getToken,
|
getToken,
|
||||||
revokeToken,
|
revokeToken,
|
||||||
} from '../../src/models/OAuth.js';
|
} from '../../src/models/OAuth.js';
|
||||||
|
import { IOAuthClient, IOAuthToken } from '../../src/types/index.js';
|
||||||
|
|
||||||
// Mock the config module to use in-memory storage for tests
|
// Mock in-memory storage for OAuth clients and tokens
|
||||||
let mockSettings = { mcpServers: {}, users: [], oauthClients: [] };
|
let mockOAuthClients: IOAuthClient[] = [];
|
||||||
|
let mockOAuthTokens: IOAuthToken[] = [];
|
||||||
|
|
||||||
jest.mock('../../src/config/index.js', () => ({
|
// Mock the DAO factory to use in-memory storage for tests
|
||||||
loadSettings: jest.fn(() => ({ ...mockSettings })),
|
jest.mock('../../src/dao/index.js', () => {
|
||||||
saveSettings: jest.fn((settings: any) => {
|
const originalModule = jest.requireActual('../../src/dao/index.js');
|
||||||
mockSettings = { ...settings };
|
|
||||||
return true;
|
return {
|
||||||
}),
|
...originalModule,
|
||||||
loadOriginalSettings: jest.fn(() => ({ ...mockSettings })),
|
getOAuthClientDao: jest.fn(() => ({
|
||||||
}));
|
findAll: jest.fn(async () => [...mockOAuthClients]),
|
||||||
|
findByClientId: jest.fn(
|
||||||
|
async (clientId: string) => mockOAuthClients.find((c) => c.clientId === clientId) || null,
|
||||||
|
),
|
||||||
|
create: jest.fn(async (client: IOAuthClient) => {
|
||||||
|
mockOAuthClients.push(client);
|
||||||
|
return client;
|
||||||
|
}),
|
||||||
|
update: jest.fn(async (clientId: string, updates: Partial<IOAuthClient>) => {
|
||||||
|
const index = mockOAuthClients.findIndex((c) => c.clientId === clientId);
|
||||||
|
if (index === -1) return null;
|
||||||
|
mockOAuthClients[index] = { ...mockOAuthClients[index], ...updates };
|
||||||
|
return mockOAuthClients[index];
|
||||||
|
}),
|
||||||
|
delete: jest.fn(async (clientId: string) => {
|
||||||
|
const index = mockOAuthClients.findIndex((c) => c.clientId === clientId);
|
||||||
|
if (index === -1) return false;
|
||||||
|
mockOAuthClients.splice(index, 1);
|
||||||
|
return true;
|
||||||
|
}),
|
||||||
|
})),
|
||||||
|
getOAuthTokenDao: jest.fn(() => ({
|
||||||
|
findAll: jest.fn(async () => [...mockOAuthTokens]),
|
||||||
|
findByAccessToken: jest.fn(
|
||||||
|
async (accessToken: string) =>
|
||||||
|
mockOAuthTokens.find((t) => t.accessToken === accessToken) || null,
|
||||||
|
),
|
||||||
|
findByRefreshToken: jest.fn(
|
||||||
|
async (refreshToken: string) =>
|
||||||
|
mockOAuthTokens.find((t) => t.refreshToken === refreshToken) || null,
|
||||||
|
),
|
||||||
|
create: jest.fn(async (token: IOAuthToken) => {
|
||||||
|
mockOAuthTokens.push(token);
|
||||||
|
return token;
|
||||||
|
}),
|
||||||
|
revokeToken: jest.fn(async (token: string) => {
|
||||||
|
const index = mockOAuthTokens.findIndex(
|
||||||
|
(t) => t.accessToken === token || t.refreshToken === token,
|
||||||
|
);
|
||||||
|
if (index === -1) return false;
|
||||||
|
mockOAuthTokens.splice(index, 1);
|
||||||
|
return true;
|
||||||
|
}),
|
||||||
|
cleanupExpired: jest.fn(async () => {
|
||||||
|
const now = new Date();
|
||||||
|
mockOAuthTokens = mockOAuthTokens.filter((t) => {
|
||||||
|
const accessExpired = t.accessTokenExpiresAt < now;
|
||||||
|
const refreshExpired =
|
||||||
|
!t.refreshToken || (t.refreshTokenExpiresAt && t.refreshTokenExpiresAt < now);
|
||||||
|
return !accessExpired || !refreshExpired;
|
||||||
|
});
|
||||||
|
}),
|
||||||
|
})),
|
||||||
|
};
|
||||||
|
});
|
||||||
|
|
||||||
describe('OAuth Model', () => {
|
describe('OAuth Model', () => {
|
||||||
beforeEach(() => {
|
beforeEach(() => {
|
||||||
jest.clearAllMocks();
|
jest.clearAllMocks();
|
||||||
// Reset mock settings before each test
|
// Reset mock storage before each test
|
||||||
mockSettings = { mcpServers: {}, users: [], oauthClients: [] };
|
mockOAuthClients = [];
|
||||||
|
mockOAuthTokens = [];
|
||||||
});
|
});
|
||||||
|
|
||||||
describe('OAuth Client Management', () => {
|
describe('OAuth Client Management', () => {
|
||||||
test('should create a new OAuth client', () => {
|
test('should create a new OAuth client', async () => {
|
||||||
const client = {
|
const client: IOAuthClient = {
|
||||||
clientId: 'test-client',
|
clientId: 'test-client',
|
||||||
clientSecret: 'test-secret',
|
clientSecret: 'test-secret',
|
||||||
name: 'Test Client',
|
name: 'Test Client',
|
||||||
@@ -41,15 +98,15 @@ describe('OAuth Model', () => {
|
|||||||
scopes: ['read', 'write'],
|
scopes: ['read', 'write'],
|
||||||
};
|
};
|
||||||
|
|
||||||
const created = createOAuthClient(client);
|
const created = await createOAuthClient(client);
|
||||||
expect(created).toEqual(client);
|
expect(created).toEqual(client);
|
||||||
|
|
||||||
const found = findOAuthClientById('test-client');
|
const found = await findOAuthClientById('test-client');
|
||||||
expect(found).toEqual(client);
|
expect(found).toEqual(client);
|
||||||
});
|
});
|
||||||
|
|
||||||
test('should not create duplicate OAuth client', () => {
|
test('should not create duplicate OAuth client', async () => {
|
||||||
const client = {
|
const client: IOAuthClient = {
|
||||||
clientId: 'test-client',
|
clientId: 'test-client',
|
||||||
clientSecret: 'test-secret',
|
clientSecret: 'test-secret',
|
||||||
name: 'Test Client',
|
name: 'Test Client',
|
||||||
@@ -58,12 +115,12 @@ describe('OAuth Model', () => {
|
|||||||
scopes: ['read'],
|
scopes: ['read'],
|
||||||
};
|
};
|
||||||
|
|
||||||
createOAuthClient(client);
|
await createOAuthClient(client);
|
||||||
expect(() => createOAuthClient(client)).toThrow();
|
await expect(createOAuthClient(client)).rejects.toThrow();
|
||||||
});
|
});
|
||||||
|
|
||||||
test('should update an OAuth client', () => {
|
test('should update an OAuth client', async () => {
|
||||||
const client = {
|
const client: IOAuthClient = {
|
||||||
clientId: 'test-client',
|
clientId: 'test-client',
|
||||||
clientSecret: 'test-secret',
|
clientSecret: 'test-secret',
|
||||||
name: 'Test Client',
|
name: 'Test Client',
|
||||||
@@ -72,9 +129,9 @@ describe('OAuth Model', () => {
|
|||||||
scopes: ['read'],
|
scopes: ['read'],
|
||||||
};
|
};
|
||||||
|
|
||||||
createOAuthClient(client);
|
await createOAuthClient(client);
|
||||||
|
|
||||||
const updated = updateOAuthClient('test-client', {
|
const updated = await updateOAuthClient('test-client', {
|
||||||
name: 'Updated Client',
|
name: 'Updated Client',
|
||||||
scopes: ['read', 'write'],
|
scopes: ['read', 'write'],
|
||||||
});
|
});
|
||||||
@@ -83,8 +140,8 @@ describe('OAuth Model', () => {
|
|||||||
expect(updated?.scopes).toEqual(['read', 'write']);
|
expect(updated?.scopes).toEqual(['read', 'write']);
|
||||||
});
|
});
|
||||||
|
|
||||||
test('should delete an OAuth client', () => {
|
test('should delete an OAuth client', async () => {
|
||||||
const client = {
|
const client: IOAuthClient = {
|
||||||
clientId: 'test-client',
|
clientId: 'test-client',
|
||||||
clientSecret: 'test-secret',
|
clientSecret: 'test-secret',
|
||||||
name: 'Test Client',
|
name: 'Test Client',
|
||||||
@@ -93,12 +150,12 @@ describe('OAuth Model', () => {
|
|||||||
scopes: ['read'],
|
scopes: ['read'],
|
||||||
};
|
};
|
||||||
|
|
||||||
createOAuthClient(client);
|
await createOAuthClient(client);
|
||||||
expect(findOAuthClientById('test-client')).toBeDefined();
|
expect(await findOAuthClientById('test-client')).toBeDefined();
|
||||||
|
|
||||||
const deleted = deleteOAuthClient('test-client');
|
const deleted = await deleteOAuthClient('test-client');
|
||||||
expect(deleted).toBe(true);
|
expect(deleted).toBe(true);
|
||||||
expect(findOAuthClientById('test-client')).toBeUndefined();
|
expect(await findOAuthClientById('test-client')).toBeUndefined();
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
|
|
||||||
@@ -157,8 +214,8 @@ describe('OAuth Model', () => {
|
|||||||
});
|
});
|
||||||
|
|
||||||
describe('Token Management', () => {
|
describe('Token Management', () => {
|
||||||
test('should save and retrieve token', () => {
|
test('should save and retrieve token', async () => {
|
||||||
const token = saveToken(
|
const token = await saveToken(
|
||||||
{
|
{
|
||||||
scope: 'read write',
|
scope: 'read write',
|
||||||
clientId: 'test-client',
|
clientId: 'test-client',
|
||||||
@@ -172,14 +229,14 @@ describe('OAuth Model', () => {
|
|||||||
expect(token.refreshToken).toBeDefined();
|
expect(token.refreshToken).toBeDefined();
|
||||||
expect(token.accessTokenExpiresAt).toBeInstanceOf(Date);
|
expect(token.accessTokenExpiresAt).toBeInstanceOf(Date);
|
||||||
|
|
||||||
const retrieved = getToken(token.accessToken);
|
const retrieved = await getToken(token.accessToken);
|
||||||
expect(retrieved).toBeDefined();
|
expect(retrieved).toBeDefined();
|
||||||
expect(retrieved?.clientId).toBe('test-client');
|
expect(retrieved?.clientId).toBe('test-client');
|
||||||
expect(retrieved?.username).toBe('testuser');
|
expect(retrieved?.username).toBe('testuser');
|
||||||
});
|
});
|
||||||
|
|
||||||
test('should retrieve token by refresh token', () => {
|
test('should retrieve token by refresh token', async () => {
|
||||||
const token = saveToken(
|
const token = await saveToken(
|
||||||
{
|
{
|
||||||
scope: 'read',
|
scope: 'read',
|
||||||
clientId: 'test-client',
|
clientId: 'test-client',
|
||||||
@@ -191,13 +248,13 @@ describe('OAuth Model', () => {
|
|||||||
|
|
||||||
expect(token.refreshToken).toBeDefined();
|
expect(token.refreshToken).toBeDefined();
|
||||||
|
|
||||||
const retrieved = getToken(token.refreshToken!);
|
const retrieved = await getToken(token.refreshToken!);
|
||||||
expect(retrieved).toBeDefined();
|
expect(retrieved).toBeDefined();
|
||||||
expect(retrieved?.accessToken).toBe(token.accessToken);
|
expect(retrieved?.accessToken).toBe(token.accessToken);
|
||||||
});
|
});
|
||||||
|
|
||||||
test('should not retrieve expired access token', async () => {
|
test('should not retrieve expired access token', async () => {
|
||||||
const token = saveToken(
|
const token = await saveToken(
|
||||||
{
|
{
|
||||||
scope: 'read',
|
scope: 'read',
|
||||||
clientId: 'test-client',
|
clientId: 'test-client',
|
||||||
@@ -208,12 +265,12 @@ describe('OAuth Model', () => {
|
|||||||
|
|
||||||
await new Promise((resolve) => setTimeout(resolve, 100));
|
await new Promise((resolve) => setTimeout(resolve, 100));
|
||||||
|
|
||||||
const retrieved = getToken(token.accessToken);
|
const retrieved = await getToken(token.accessToken);
|
||||||
expect(retrieved).toBeUndefined();
|
expect(retrieved).toBeUndefined();
|
||||||
});
|
});
|
||||||
|
|
||||||
test('should revoke token', () => {
|
test('should revoke token', async () => {
|
||||||
const token = saveToken(
|
const token = await saveToken(
|
||||||
{
|
{
|
||||||
scope: 'read',
|
scope: 'read',
|
||||||
clientId: 'test-client',
|
clientId: 'test-client',
|
||||||
@@ -223,13 +280,13 @@ describe('OAuth Model', () => {
|
|||||||
86400,
|
86400,
|
||||||
);
|
);
|
||||||
|
|
||||||
expect(getToken(token.accessToken)).toBeDefined();
|
expect(await getToken(token.accessToken)).toBeDefined();
|
||||||
|
|
||||||
revokeToken(token.accessToken);
|
await revokeToken(token.accessToken);
|
||||||
expect(getToken(token.accessToken)).toBeUndefined();
|
expect(await getToken(token.accessToken)).toBeUndefined();
|
||||||
|
|
||||||
if (token.refreshToken) {
|
if (token.refreshToken) {
|
||||||
expect(getToken(token.refreshToken)).toBeUndefined();
|
expect(await getToken(token.refreshToken)).toBeUndefined();
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
|
|||||||
428
tests/services/compressionService.test.ts
Normal file
428
tests/services/compressionService.test.ts
Normal file
@@ -0,0 +1,428 @@
|
|||||||
|
// Mock the DAO module before imports
|
||||||
|
jest.mock('../../src/dao/index.js', () => ({
|
||||||
|
getSystemConfigDao: jest.fn(),
|
||||||
|
}));
|
||||||
|
|
||||||
|
// Mock smart routing config
|
||||||
|
jest.mock('../../src/utils/smartRouting.js', () => ({
|
||||||
|
getSmartRoutingConfig: jest.fn(),
|
||||||
|
}));
|
||||||
|
|
||||||
|
// Mock OpenAI
|
||||||
|
jest.mock('openai', () => {
|
||||||
|
return {
|
||||||
|
__esModule: true,
|
||||||
|
default: jest.fn().mockImplementation(() => ({
|
||||||
|
chat: {
|
||||||
|
completions: {
|
||||||
|
create: jest.fn(),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
})),
|
||||||
|
};
|
||||||
|
});
|
||||||
|
|
||||||
|
import {
|
||||||
|
getCompressionConfig,
|
||||||
|
isCompressionEnabled,
|
||||||
|
estimateTokenCount,
|
||||||
|
shouldCompress,
|
||||||
|
compressOutput,
|
||||||
|
compressToolResult,
|
||||||
|
} from '../../src/services/compressionService.js';
|
||||||
|
import { getSystemConfigDao } from '../../src/dao/index.js';
|
||||||
|
import { getSmartRoutingConfig } from '../../src/utils/smartRouting.js';
|
||||||
|
import OpenAI from 'openai';
|
||||||
|
|
||||||
|
describe('CompressionService', () => {
|
||||||
|
const mockSystemConfigDao = {
|
||||||
|
get: jest.fn(),
|
||||||
|
getSection: jest.fn(),
|
||||||
|
update: jest.fn(),
|
||||||
|
updateSection: jest.fn(),
|
||||||
|
};
|
||||||
|
|
||||||
|
beforeEach(() => {
|
||||||
|
jest.clearAllMocks();
|
||||||
|
(getSystemConfigDao as jest.Mock).mockReturnValue(mockSystemConfigDao);
|
||||||
|
});
|
||||||
|
|
||||||
|
describe('getCompressionConfig', () => {
|
||||||
|
it('should return default config when no config is set', async () => {
|
||||||
|
mockSystemConfigDao.get.mockResolvedValue({});
|
||||||
|
|
||||||
|
const config = await getCompressionConfig();
|
||||||
|
|
||||||
|
expect(config).toEqual({
|
||||||
|
enabled: false,
|
||||||
|
model: 'gpt-4o-mini',
|
||||||
|
maxInputTokens: 100000,
|
||||||
|
targetReductionRatio: 0.5,
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should return configured values when set', async () => {
|
||||||
|
mockSystemConfigDao.get.mockResolvedValue({
|
||||||
|
compression: {
|
||||||
|
enabled: true,
|
||||||
|
model: 'gpt-4o',
|
||||||
|
maxInputTokens: 50000,
|
||||||
|
targetReductionRatio: 0.3,
|
||||||
|
},
|
||||||
|
});
|
||||||
|
|
||||||
|
const config = await getCompressionConfig();
|
||||||
|
|
||||||
|
expect(config).toEqual({
|
||||||
|
enabled: true,
|
||||||
|
model: 'gpt-4o',
|
||||||
|
maxInputTokens: 50000,
|
||||||
|
targetReductionRatio: 0.3,
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should use defaults for missing values', async () => {
|
||||||
|
mockSystemConfigDao.get.mockResolvedValue({
|
||||||
|
compression: {
|
||||||
|
enabled: true,
|
||||||
|
},
|
||||||
|
});
|
||||||
|
|
||||||
|
const config = await getCompressionConfig();
|
||||||
|
|
||||||
|
expect(config).toEqual({
|
||||||
|
enabled: true,
|
||||||
|
model: 'gpt-4o-mini',
|
||||||
|
maxInputTokens: 100000,
|
||||||
|
targetReductionRatio: 0.5,
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should return defaults on error', async () => {
|
||||||
|
mockSystemConfigDao.get.mockRejectedValue(new Error('Test error'));
|
||||||
|
|
||||||
|
const config = await getCompressionConfig();
|
||||||
|
|
||||||
|
expect(config).toEqual({
|
||||||
|
enabled: false,
|
||||||
|
model: 'gpt-4o-mini',
|
||||||
|
maxInputTokens: 100000,
|
||||||
|
targetReductionRatio: 0.5,
|
||||||
|
});
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
describe('isCompressionEnabled', () => {
|
||||||
|
it('should return false when compression is disabled', async () => {
|
||||||
|
mockSystemConfigDao.get.mockResolvedValue({
|
||||||
|
compression: { enabled: false },
|
||||||
|
});
|
||||||
|
|
||||||
|
const enabled = await isCompressionEnabled();
|
||||||
|
|
||||||
|
expect(enabled).toBe(false);
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should return false when enabled but no API key', async () => {
|
||||||
|
mockSystemConfigDao.get.mockResolvedValue({
|
||||||
|
compression: { enabled: true },
|
||||||
|
});
|
||||||
|
(getSmartRoutingConfig as jest.Mock).mockResolvedValue({
|
||||||
|
openaiApiKey: '',
|
||||||
|
});
|
||||||
|
|
||||||
|
const enabled = await isCompressionEnabled();
|
||||||
|
|
||||||
|
expect(enabled).toBe(false);
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should return true when enabled and API key is set', async () => {
|
||||||
|
mockSystemConfigDao.get.mockResolvedValue({
|
||||||
|
compression: { enabled: true },
|
||||||
|
});
|
||||||
|
(getSmartRoutingConfig as jest.Mock).mockResolvedValue({
|
||||||
|
openaiApiKey: 'test-api-key',
|
||||||
|
});
|
||||||
|
|
||||||
|
const enabled = await isCompressionEnabled();
|
||||||
|
|
||||||
|
expect(enabled).toBe(true);
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
describe('estimateTokenCount', () => {
|
||||||
|
it('should estimate tokens for short text', () => {
|
||||||
|
const text = 'Hello world';
|
||||||
|
const tokens = estimateTokenCount(text);
|
||||||
|
|
||||||
|
// Estimate based on ~4 chars per token
|
||||||
|
expect(tokens).toBe(Math.ceil(text.length / 4));
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should estimate tokens for longer text', () => {
|
||||||
|
const text = 'This is a longer piece of text that should have more tokens';
|
||||||
|
const tokens = estimateTokenCount(text);
|
||||||
|
|
||||||
|
// Estimate based on ~4 chars per token
|
||||||
|
expect(tokens).toBe(Math.ceil(text.length / 4));
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should handle empty string', () => {
|
||||||
|
const tokens = estimateTokenCount('');
|
||||||
|
|
||||||
|
expect(tokens).toBe(0);
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
describe('shouldCompress', () => {
|
||||||
|
it('should return false for small content', () => {
|
||||||
|
const content = 'Small content';
|
||||||
|
const result = shouldCompress(content, 100000);
|
||||||
|
|
||||||
|
expect(result).toBe(false);
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should return true for large content', () => {
|
||||||
|
// Create content larger than the threshold
|
||||||
|
const content = 'x'.repeat(5000);
|
||||||
|
const result = shouldCompress(content, 100000);
|
||||||
|
|
||||||
|
expect(result).toBe(true);
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should use 10% of maxInputTokens as threshold', () => {
|
||||||
|
// Test threshold behavior with different content sizes
|
||||||
|
const smallContent = 'x'.repeat(300);
|
||||||
|
const largeContent = 'x'.repeat(500);
|
||||||
|
|
||||||
|
expect(shouldCompress(smallContent, 1000)).toBe(false);
|
||||||
|
expect(shouldCompress(largeContent, 1000)).toBe(true);
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
describe('compressOutput', () => {
|
||||||
|
it('should return original content when compression is disabled', async () => {
|
||||||
|
mockSystemConfigDao.get.mockResolvedValue({
|
||||||
|
compression: { enabled: false },
|
||||||
|
});
|
||||||
|
|
||||||
|
const content = 'Test content';
|
||||||
|
const result = await compressOutput(content);
|
||||||
|
|
||||||
|
expect(result).toEqual({
|
||||||
|
compressed: content,
|
||||||
|
originalLength: content.length,
|
||||||
|
compressedLength: content.length,
|
||||||
|
wasCompressed: false,
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should return original content when content is too small', async () => {
|
||||||
|
mockSystemConfigDao.get.mockResolvedValue({
|
||||||
|
compression: { enabled: true, maxInputTokens: 100000 },
|
||||||
|
});
|
||||||
|
(getSmartRoutingConfig as jest.Mock).mockResolvedValue({
|
||||||
|
openaiApiKey: 'test-api-key',
|
||||||
|
});
|
||||||
|
|
||||||
|
const content = 'Small content';
|
||||||
|
const result = await compressOutput(content);
|
||||||
|
|
||||||
|
expect(result.wasCompressed).toBe(false);
|
||||||
|
expect(result.compressed).toBe(content);
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should return original content when no API key is configured', async () => {
|
||||||
|
mockSystemConfigDao.get.mockResolvedValue({
|
||||||
|
compression: { enabled: true },
|
||||||
|
});
|
||||||
|
(getSmartRoutingConfig as jest.Mock).mockResolvedValue({
|
||||||
|
openaiApiKey: '',
|
||||||
|
});
|
||||||
|
|
||||||
|
const content = 'x'.repeat(5000);
|
||||||
|
const result = await compressOutput(content);
|
||||||
|
|
||||||
|
expect(result.wasCompressed).toBe(false);
|
||||||
|
expect(result.compressed).toBe(content);
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should compress content when enabled and content is large', async () => {
|
||||||
|
mockSystemConfigDao.get.mockResolvedValue({
|
||||||
|
compression: { enabled: true, model: 'gpt-4o-mini', maxInputTokens: 100000 },
|
||||||
|
});
|
||||||
|
(getSmartRoutingConfig as jest.Mock).mockResolvedValue({
|
||||||
|
openaiApiKey: 'test-api-key',
|
||||||
|
openaiApiBaseUrl: 'https://api.openai.com/v1',
|
||||||
|
});
|
||||||
|
|
||||||
|
const originalContent = 'x'.repeat(5000);
|
||||||
|
const compressedContent = 'y'.repeat(2000);
|
||||||
|
|
||||||
|
// Mock OpenAI response
|
||||||
|
const mockCreate = jest.fn().mockResolvedValue({
|
||||||
|
choices: [{ message: { content: compressedContent } }],
|
||||||
|
});
|
||||||
|
|
||||||
|
(OpenAI as unknown as jest.Mock).mockImplementation(() => ({
|
||||||
|
chat: {
|
||||||
|
completions: {
|
||||||
|
create: mockCreate,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}));
|
||||||
|
|
||||||
|
const result = await compressOutput(originalContent, {
|
||||||
|
toolName: 'test-tool',
|
||||||
|
serverName: 'test-server',
|
||||||
|
});
|
||||||
|
|
||||||
|
expect(result.wasCompressed).toBe(true);
|
||||||
|
expect(result.compressed).toBe(compressedContent);
|
||||||
|
expect(result.originalLength).toBe(originalContent.length);
|
||||||
|
expect(result.compressedLength).toBe(compressedContent.length);
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should return original content when compressed is larger', async () => {
|
||||||
|
mockSystemConfigDao.get.mockResolvedValue({
|
||||||
|
compression: { enabled: true, model: 'gpt-4o-mini', maxInputTokens: 100000 },
|
||||||
|
});
|
||||||
|
(getSmartRoutingConfig as jest.Mock).mockResolvedValue({
|
||||||
|
openaiApiKey: 'test-api-key',
|
||||||
|
openaiApiBaseUrl: 'https://api.openai.com/v1',
|
||||||
|
});
|
||||||
|
|
||||||
|
const originalContent = 'x'.repeat(5000);
|
||||||
|
const largerContent = 'y'.repeat(6000);
|
||||||
|
|
||||||
|
const mockCreate = jest.fn().mockResolvedValue({
|
||||||
|
choices: [{ message: { content: largerContent } }],
|
||||||
|
});
|
||||||
|
|
||||||
|
(OpenAI as unknown as jest.Mock).mockImplementation(() => ({
|
||||||
|
chat: {
|
||||||
|
completions: {
|
||||||
|
create: mockCreate,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}));
|
||||||
|
|
||||||
|
const result = await compressOutput(originalContent);
|
||||||
|
|
||||||
|
expect(result.wasCompressed).toBe(false);
|
||||||
|
expect(result.compressed).toBe(originalContent);
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should return original content on API error', async () => {
|
||||||
|
mockSystemConfigDao.get.mockResolvedValue({
|
||||||
|
compression: { enabled: true, model: 'gpt-4o-mini', maxInputTokens: 100000 },
|
||||||
|
});
|
||||||
|
(getSmartRoutingConfig as jest.Mock).mockResolvedValue({
|
||||||
|
openaiApiKey: 'test-api-key',
|
||||||
|
openaiApiBaseUrl: 'https://api.openai.com/v1',
|
||||||
|
});
|
||||||
|
|
||||||
|
const mockCreate = jest.fn().mockRejectedValue(new Error('API error'));
|
||||||
|
|
||||||
|
(OpenAI as unknown as jest.Mock).mockImplementation(() => ({
|
||||||
|
chat: {
|
||||||
|
completions: {
|
||||||
|
create: mockCreate,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}));
|
||||||
|
|
||||||
|
const content = 'x'.repeat(5000);
|
||||||
|
const result = await compressOutput(content);
|
||||||
|
|
||||||
|
expect(result.wasCompressed).toBe(false);
|
||||||
|
expect(result.compressed).toBe(content);
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
describe('compressToolResult', () => {
|
||||||
|
it('should return original result when compression is disabled', async () => {
|
||||||
|
mockSystemConfigDao.get.mockResolvedValue({
|
||||||
|
compression: { enabled: false },
|
||||||
|
});
|
||||||
|
|
||||||
|
const result = {
|
||||||
|
content: [{ type: 'text', text: 'Test output' }],
|
||||||
|
};
|
||||||
|
|
||||||
|
const compressed = await compressToolResult(result);
|
||||||
|
|
||||||
|
expect(compressed).toEqual(result);
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should not compress error results', async () => {
|
||||||
|
mockSystemConfigDao.get.mockResolvedValue({
|
||||||
|
compression: { enabled: true },
|
||||||
|
});
|
||||||
|
(getSmartRoutingConfig as jest.Mock).mockResolvedValue({
|
||||||
|
openaiApiKey: 'test-api-key',
|
||||||
|
});
|
||||||
|
|
||||||
|
const result = {
|
||||||
|
content: [{ type: 'text', text: 'Error message' }],
|
||||||
|
isError: true,
|
||||||
|
};
|
||||||
|
|
||||||
|
const compressed = await compressToolResult(result);
|
||||||
|
|
||||||
|
expect(compressed).toEqual(result);
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should handle results without content array', async () => {
|
||||||
|
mockSystemConfigDao.get.mockResolvedValue({
|
||||||
|
compression: { enabled: true },
|
||||||
|
});
|
||||||
|
(getSmartRoutingConfig as jest.Mock).mockResolvedValue({
|
||||||
|
openaiApiKey: 'test-api-key',
|
||||||
|
});
|
||||||
|
|
||||||
|
const result = { someOtherField: 'value' };
|
||||||
|
|
||||||
|
const compressed = await compressToolResult(result);
|
||||||
|
|
||||||
|
expect(compressed).toEqual(result);
|
||||||
|
});
|
||||||
|
|
||||||
|
it('should only compress text content items', async () => {
|
||||||
|
mockSystemConfigDao.get.mockResolvedValue({
|
||||||
|
compression: { enabled: true, maxInputTokens: 100000 },
|
||||||
|
});
|
||||||
|
(getSmartRoutingConfig as jest.Mock).mockResolvedValue({
|
||||||
|
openaiApiKey: 'test-api-key',
|
||||||
|
openaiApiBaseUrl: 'https://api.openai.com/v1',
|
||||||
|
});
|
||||||
|
|
||||||
|
const largeText = 'x'.repeat(5000);
|
||||||
|
const compressedText = 'y'.repeat(2000);
|
||||||
|
|
||||||
|
const mockCreate = jest.fn().mockResolvedValue({
|
||||||
|
choices: [{ message: { content: compressedText } }],
|
||||||
|
});
|
||||||
|
|
||||||
|
(OpenAI as unknown as jest.Mock).mockImplementation(() => ({
|
||||||
|
chat: {
|
||||||
|
completions: {
|
||||||
|
create: mockCreate,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}));
|
||||||
|
|
||||||
|
const result = {
|
||||||
|
content: [
|
||||||
|
{ type: 'text', text: largeText },
|
||||||
|
{ type: 'image', data: 'base64data' },
|
||||||
|
],
|
||||||
|
};
|
||||||
|
|
||||||
|
const compressed = await compressToolResult(result);
|
||||||
|
|
||||||
|
expect(compressed.content[0].text).toBe(compressedText);
|
||||||
|
expect(compressed.content[1]).toEqual({ type: 'image', data: 'base64data' });
|
||||||
|
});
|
||||||
|
});
|
||||||
|
});
|
||||||
@@ -31,14 +31,28 @@ jest.mock('../../src/utils/oauthBearer.js', () => ({
|
|||||||
resolveOAuthUserFromToken: jest.fn(),
|
resolveOAuthUserFromToken: jest.fn(),
|
||||||
}));
|
}));
|
||||||
|
|
||||||
|
// Mock DAO accessors used by sseService (avoid file-based DAOs and migrations)
|
||||||
|
jest.mock('../../src/dao/index.js', () => ({
|
||||||
|
getBearerKeyDao: jest.fn(),
|
||||||
|
getGroupDao: jest.fn(),
|
||||||
|
getSystemConfigDao: jest.fn(),
|
||||||
|
}));
|
||||||
|
|
||||||
|
// Mock config module default export used by sseService
|
||||||
|
jest.mock('../../src/config/index.js', () => ({
|
||||||
|
__esModule: true,
|
||||||
|
default: { basePath: '' },
|
||||||
|
loadSettings: jest.fn(),
|
||||||
|
}));
|
||||||
|
|
||||||
import { Request, Response } from 'express';
|
import { Request, Response } from 'express';
|
||||||
import { handleSseConnection, transports } from '../../src/services/sseService.js';
|
import { handleSseConnection, transports } from '../../src/services/sseService.js';
|
||||||
import * as mcpService from '../../src/services/mcpService.js';
|
import * as mcpService from '../../src/services/mcpService.js';
|
||||||
import * as configModule from '../../src/config/index.js';
|
import * as configModule from '../../src/config/index.js';
|
||||||
|
import * as daoIndex from '../../src/dao/index.js';
|
||||||
|
|
||||||
// Mock remaining dependencies
|
// Mock remaining dependencies
|
||||||
jest.mock('../../src/services/mcpService.js');
|
jest.mock('../../src/services/mcpService.js');
|
||||||
jest.mock('../../src/config/index.js');
|
|
||||||
|
|
||||||
// Mock UserContextService with getInstance pattern
|
// Mock UserContextService with getInstance pattern
|
||||||
const mockUserContextService = {
|
const mockUserContextService = {
|
||||||
@@ -141,6 +155,24 @@ describe('Keepalive Functionality', () => {
|
|||||||
};
|
};
|
||||||
(mcpService.getMcpServer as jest.Mock).mockReturnValue(mockMcpServer);
|
(mcpService.getMcpServer as jest.Mock).mockReturnValue(mockMcpServer);
|
||||||
|
|
||||||
|
// Mock bearer key + system config DAOs used by sseService
|
||||||
|
const mockBearerKeyDao = {
|
||||||
|
findEnabled: jest.fn().mockResolvedValue([]),
|
||||||
|
};
|
||||||
|
(daoIndex.getBearerKeyDao as unknown as jest.Mock).mockReturnValue(mockBearerKeyDao);
|
||||||
|
|
||||||
|
const mockSystemConfigDao = {
|
||||||
|
get: jest.fn().mockResolvedValue({
|
||||||
|
routing: {
|
||||||
|
enableGlobalRoute: true,
|
||||||
|
enableGroupNameRoute: true,
|
||||||
|
enableBearerAuth: false,
|
||||||
|
bearerAuthKey: '',
|
||||||
|
},
|
||||||
|
}),
|
||||||
|
};
|
||||||
|
(daoIndex.getSystemConfigDao as unknown as jest.Mock).mockReturnValue(mockSystemConfigDao);
|
||||||
|
|
||||||
// Mock loadSettings
|
// Mock loadSettings
|
||||||
(configModule.loadSettings as jest.Mock).mockReturnValue({
|
(configModule.loadSettings as jest.Mock).mockReturnValue({
|
||||||
systemConfig: {
|
systemConfig: {
|
||||||
|
|||||||
Reference in New Issue
Block a user