-
Notifications
You must be signed in to change notification settings - Fork 23
Expand file tree
/
Copy pathmain.go
More file actions
386 lines (354 loc) · 15.3 KB
/
main.go
File metadata and controls
386 lines (354 loc) · 15.3 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
package main
import (
"os"
"strings"
mcpproxy "github.com/sigbit/mcp-auth-proxy/v2/pkg/mcp-proxy"
"github.com/spf13/cobra"
)
func getEnvWithDefault(key, defaultValue string) string {
if value := os.Getenv(key); value != "" {
return value
}
return defaultValue
}
func getEnvBoolWithDefault(key string, defaultValue bool) bool {
if value := os.Getenv(key); value != "" {
if strings.ToLower(value) == "true" || value == "1" {
return true
}
return false
}
return defaultValue
}
// splitWithEscapes splits a string by delimiter, respecting escape sequences
// e.g., "a,b\,c,d" with delimiter "," returns ["a", "b,c", "d"]
func splitWithEscapes(s, delimiter string) []string {
if s == "" {
return []string{}
}
var result []string
var current strings.Builder
escaped := false
for i := 0; i < len(s); i++ {
if escaped {
current.WriteByte(s[i])
escaped = false
} else if s[i] == '\\' && i+1 < len(s) {
// Check if next character is the delimiter
if strings.HasPrefix(s[i+1:], delimiter) {
// Skip the backslash and add the delimiter character
escaped = true
} else {
// Not escaping delimiter, keep the backslash
current.WriteByte(s[i])
}
} else if strings.HasPrefix(s[i:], delimiter) {
// Found unescaped delimiter
result = append(result, strings.TrimSpace(current.String()))
current.Reset()
i += len(delimiter) - 1 // -1 because loop will increment
} else {
current.WriteByte(s[i])
}
}
// Add the last part
result = append(result, strings.TrimSpace(current.String()))
return result
}
// parseAttributeMap parses a comma-separated string of key=value pairs into a map
// where each key can have multiple values. Format: /key1=value1,/key1=value2,/key2=value3
// Keys are JSON pointers to attributes in the userinfo response.
func parseAttributeMap(s string) map[string][]string {
result := make(map[string][]string)
if s == "" {
return result
}
parts := splitWithEscapes(s, ",")
for _, part := range parts {
part = strings.TrimSpace(part)
if part == "" {
continue
}
eqIdx := strings.Index(part, "=")
if eqIdx == -1 {
continue
}
key := strings.TrimSpace(part[:eqIdx])
value := strings.TrimSpace(part[eqIdx+1:])
if key != "" && value != "" {
result[key] = append(result[key], value)
}
}
return result
}
func parseHeaderMapping(s string) map[string]string {
result := make(map[string]string)
if s == "" {
return result
}
parts := splitWithEscapes(s, ",")
for _, part := range parts {
part = strings.TrimSpace(part)
if part == "" {
continue
}
colonIdx := strings.LastIndex(part, ":")
if colonIdx == -1 {
continue
}
pointer := strings.TrimSpace(part[:colonIdx])
header := strings.TrimSpace(part[colonIdx+1:])
if pointer != "" && header != "" {
result[pointer] = header
}
}
return result
}
type proxyRunnerFunc func(
listen string,
tlsListen string,
autoTLS bool,
tlsHost string,
tlsDirectoryURL string,
tlsAcceptTOS bool,
tlsCertFile string,
tlsKeyFile string,
dataPath string,
repositoryBackend string,
repositoryDSN string,
externalURL string,
googleClientID string,
googleClientSecret string,
googleAllowedUsers []string,
googleAllowedWorkspaces []string,
githubClientID string,
githubClientSecret string,
githubAllowedUsers []string,
githubAllowedOrgs []string,
oidcConfigurationURL string,
oidcClientID string,
oidcClientSecret string,
oidcScopes []string,
oidcUserIDField string,
oidcProviderName string,
oidcAllowedUsers []string,
oidcAllowedUsersGlob []string,
oidcAllowedAttributes map[string][]string,
oidcAllowedAttributesGlob map[string][]string,
noProviderAutoSelect bool,
password string,
passwordHash string,
trustedProxy []string,
proxyHeaders []string,
proxyBearerToken string,
proxyTarget []string,
httpStreamingOnly bool,
headerMapping map[string]string,
headerMappingBase string,
) error
func main() {
if err := newRootCommand(mcpproxy.Run).Execute(); err != nil {
panic(err)
}
}
func newRootCommand(run proxyRunnerFunc) *cobra.Command {
var listen string
var tlsListen string
var noAutoTLS bool
var tlsHost string
var tlsDirectoryURL string
var tlsAcceptTOS bool
var tlsCertFile string
var tlsKeyFile string
var dataPath string
var repositoryBackend string
var repositoryDSN string
var externalURL string
var googleClientID string
var googleClientSecret string
var googleAllowedUsers string
var googleAllowedWorkspaces string
var githubClientID string
var githubClientSecret string
var githubAllowedUsers string
var githubAllowedOrgs string
var oidcConfigurationURL string
var oidcClientID string
var oidcClientSecret string
var oidcScopes string
var oidcUserIDField string
var oidcProviderName string
var oidcAllowedUsers string
var oidcAllowedUsersGlob string
var oidcAllowedAttributes string
var oidcAllowedAttributesGlob string
var noProviderAutoSelect bool
var password string
var passwordHash string
var proxyBearerToken string
var proxyHeaders string
var headerMapping string
var headerMappingBase string
var httpStreamingOnly bool
var trustedProxies string
rootCmd := &cobra.Command{
Use: "mcp-warp",
Run: func(cmd *cobra.Command, args []string) {
var googleAllowedUsersList []string
if googleAllowedUsers != "" {
googleAllowedUsersList = strings.Split(googleAllowedUsers, ",")
for i := range googleAllowedUsersList {
googleAllowedUsersList[i] = strings.TrimSpace(googleAllowedUsersList[i])
}
}
var googleAllowedWorkspacesList []string
if googleAllowedWorkspaces != "" {
googleAllowedWorkspacesList = strings.Split(googleAllowedWorkspaces, ",")
for i := range googleAllowedWorkspacesList {
googleAllowedWorkspacesList[i] = strings.TrimSpace(googleAllowedWorkspacesList[i])
}
}
var githubAllowedUsersList []string
if githubAllowedUsers != "" {
githubAllowedUsersList = strings.Split(githubAllowedUsers, ",")
for i := range githubAllowedUsersList {
githubAllowedUsersList[i] = strings.TrimSpace(githubAllowedUsersList[i])
}
}
var githubAllowedOrgsList []string
if githubAllowedOrgs != "" {
githubAllowedOrgsList = strings.Split(githubAllowedOrgs, ",")
for i := range githubAllowedOrgsList {
githubAllowedOrgsList[i] = strings.TrimSpace(githubAllowedOrgsList[i])
}
}
var oidcAllowedUsersList []string
if oidcAllowedUsers != "" {
oidcAllowedUsersList = strings.Split(oidcAllowedUsers, ",")
for i := range oidcAllowedUsersList {
oidcAllowedUsersList[i] = strings.TrimSpace(oidcAllowedUsersList[i])
}
}
var oidcAllowedUsersGlobList []string
if oidcAllowedUsersGlob != "" {
oidcAllowedUsersGlobList = splitWithEscapes(oidcAllowedUsersGlob, ",")
}
oidcAllowedAttributesMap := parseAttributeMap(oidcAllowedAttributes)
oidcAllowedAttributesGlobMap := parseAttributeMap(oidcAllowedAttributesGlob)
var oidcScopesList []string
if oidcScopes != "" {
oidcScopesList = strings.Split(oidcScopes, ",")
for i := range oidcScopesList {
oidcScopesList[i] = strings.TrimSpace(oidcScopesList[i])
}
} else {
oidcScopesList = []string{"openid", "profile", "email"}
}
var trustedProxiesList []string
if trustedProxies != "" {
trustedProxiesList = strings.Split(trustedProxies, ",")
for i := range trustedProxiesList {
trustedProxiesList[i] = strings.TrimSpace(trustedProxiesList[i])
}
}
// Parse proxy headers into slice
var proxyHeadersList []string
if proxyHeaders != "" {
headersList := strings.Split(proxyHeaders, ",")
for _, header := range headersList {
proxyHeadersList = append(proxyHeadersList, strings.TrimSpace(header))
}
}
headerMappingMap := parseHeaderMapping(headerMapping)
if err := run(
listen,
tlsListen,
(!noAutoTLS) || tlsCertFile != "" || tlsKeyFile != "",
tlsHost,
tlsDirectoryURL,
tlsAcceptTOS,
tlsCertFile,
tlsKeyFile,
dataPath,
repositoryBackend,
repositoryDSN,
externalURL,
googleClientID,
googleClientSecret,
googleAllowedUsersList,
googleAllowedWorkspacesList,
githubClientID,
githubClientSecret,
githubAllowedUsersList,
githubAllowedOrgsList,
oidcConfigurationURL,
oidcClientID,
oidcClientSecret,
oidcScopesList,
oidcUserIDField,
oidcProviderName,
oidcAllowedUsersList,
oidcAllowedUsersGlobList,
oidcAllowedAttributesMap,
oidcAllowedAttributesGlobMap,
noProviderAutoSelect,
password,
passwordHash,
trustedProxiesList,
proxyHeadersList,
proxyBearerToken,
args,
httpStreamingOnly,
headerMappingMap,
headerMappingBase,
); err != nil {
panic(err)
}
},
}
rootCmd.Flags().StringVar(&listen, "listen", getEnvWithDefault("LISTEN", ":80"), "Address to listen on")
rootCmd.Flags().StringVar(&tlsListen, "tls-listen", getEnvWithDefault("TLS_LISTEN", ":443"), "Address to listen on for TLS")
rootCmd.Flags().BoolVar(&noAutoTLS, "no-auto-tls", getEnvBoolWithDefault("NO_AUTO_TLS", false), "Disable automatic TLS host detection from externalURL")
rootCmd.Flags().StringVarP(&tlsHost, "tls-host", "H", getEnvWithDefault("TLS_HOST", ""), "Host name for automatic TLS certificate provisioning")
rootCmd.Flags().StringVar(&tlsDirectoryURL, "tls-directory-url", getEnvWithDefault("TLS_DIRECTORY_URL", "https://acme-v02.api.letsencrypt.org/directory"), "ACME directory URL for TLS certificates")
rootCmd.Flags().BoolVar(&tlsAcceptTOS, "tls-accept-tos", getEnvBoolWithDefault("TLS_ACCEPT_TOS", false), "Accept TLS terms of service")
rootCmd.Flags().StringVar(&tlsCertFile, "tls-cert-file", getEnvWithDefault("TLS_CERT_FILE", ""), "Path to TLS certificate file (PEM). Requires --tls-key-file")
rootCmd.Flags().StringVar(&tlsKeyFile, "tls-key-file", getEnvWithDefault("TLS_KEY_FILE", ""), "Path to TLS private key file (PEM). Requires --tls-cert-file")
rootCmd.Flags().StringVarP(&dataPath, "data-path", "d", getEnvWithDefault("DATA_PATH", "./data"), "Path to the data directory")
rootCmd.Flags().StringVar(&repositoryBackend, "repository-backend", getEnvWithDefault("REPOSITORY_BACKEND", "local"), "Repository backend to use: local, sqlite, postgres, or mysql")
rootCmd.Flags().StringVar(&repositoryDSN, "repository-dsn", getEnvWithDefault("REPOSITORY_DSN", ""), "DSN passed directly to the SQL driver (required when repository-backend is sqlite/postgres/mysql)")
rootCmd.Flags().StringVarP(&externalURL, "external-url", "e", getEnvWithDefault("EXTERNAL_URL", "http://localhost"), "External URL for the proxy")
// Google OAuth configuration
rootCmd.Flags().StringVar(&googleClientID, "google-client-id", getEnvWithDefault("GOOGLE_CLIENT_ID", ""), "Google OAuth client ID")
rootCmd.Flags().StringVar(&googleClientSecret, "google-client-secret", getEnvWithDefault("GOOGLE_CLIENT_SECRET", ""), "Google OAuth client secret")
rootCmd.Flags().StringVar(&googleAllowedUsers, "google-allowed-users", getEnvWithDefault("GOOGLE_ALLOWED_USERS", ""), "Comma-separated list of allowed Google users (emails)")
rootCmd.Flags().StringVar(&googleAllowedWorkspaces, "google-allowed-workspaces", getEnvWithDefault("GOOGLE_ALLOWED_WORKSPACES", ""), "Comma-separated list of allowed Google workspaces")
// GitHub OAuth configuration
rootCmd.Flags().StringVar(&githubClientID, "github-client-id", getEnvWithDefault("GITHUB_CLIENT_ID", ""), "GitHub OAuth client ID")
rootCmd.Flags().StringVar(&githubClientSecret, "github-client-secret", getEnvWithDefault("GITHUB_CLIENT_SECRET", ""), "GitHub OAuth client secret")
rootCmd.Flags().StringVar(&githubAllowedUsers, "github-allowed-users", getEnvWithDefault("GITHUB_ALLOWED_USERS", ""), "Comma-separated list of allowed GitHub users (usernames)")
rootCmd.Flags().StringVar(&githubAllowedOrgs, "github-allowed-orgs", getEnvWithDefault("GITHUB_ALLOWED_ORGS", ""), "Comma-separated list of allowed GitHub organizations. You can also restrict access to specific teams using the format `Org:Team`")
// OIDC configuration
rootCmd.Flags().StringVar(&oidcConfigurationURL, "oidc-configuration-url", getEnvWithDefault("OIDC_CONFIGURATION_URL", ""), "OIDC configuration URL")
rootCmd.Flags().StringVar(&oidcClientID, "oidc-client-id", getEnvWithDefault("OIDC_CLIENT_ID", ""), "OIDC client ID")
rootCmd.Flags().StringVar(&oidcClientSecret, "oidc-client-secret", getEnvWithDefault("OIDC_CLIENT_SECRET", ""), "OIDC client secret")
rootCmd.Flags().StringVar(&oidcScopes, "oidc-scopes", getEnvWithDefault("OIDC_SCOPES", "openid,profile,email"), "Comma-separated list of OIDC scopes")
rootCmd.Flags().StringVar(&oidcUserIDField, "oidc-user-id-field", getEnvWithDefault("OIDC_USER_ID_FIELD", "/email"), "JSON pointer to user ID field in userinfo endpoint response")
rootCmd.Flags().StringVar(&oidcProviderName, "oidc-provider-name", getEnvWithDefault("OIDC_PROVIDER_NAME", "OIDC"), "Display name for OIDC provider")
rootCmd.Flags().StringVar(&oidcAllowedUsers, "oidc-allowed-users", getEnvWithDefault("OIDC_ALLOWED_USERS", ""), "Comma-separated list of allowed OIDC users")
rootCmd.Flags().StringVar(&oidcAllowedUsersGlob, "oidc-allowed-users-glob", getEnvWithDefault("OIDC_ALLOWED_USERS_GLOB", ""), "Comma-separated list of glob patterns for allowed OIDC users")
rootCmd.Flags().StringVar(&oidcAllowedAttributes, "oidc-allowed-attributes", getEnvWithDefault("OIDC_ALLOWED_ATTRIBUTES", ""), "Comma-separated list of allowed attribute key=value pairs (e.g., /groups=admin,/roles=editor). Keys are JSON pointers.")
rootCmd.Flags().StringVar(&oidcAllowedAttributesGlob, "oidc-allowed-attributes-glob", getEnvWithDefault("OIDC_ALLOWED_ATTRIBUTES_GLOB", ""), "Comma-separated list of attribute key=pattern pairs for glob matching (e.g., /groups=*-admins,/email=*@example.com). Keys are JSON pointers.")
// Password authentication
rootCmd.Flags().BoolVar(&noProviderAutoSelect, "no-provider-auto-select", getEnvBoolWithDefault("NO_PROVIDER_AUTO_SELECT", false), "Disable auto-redirect when only one OAuth/OIDC provider is configured and no password is set")
rootCmd.Flags().StringVar(&password, "password", getEnvWithDefault("PASSWORD", ""), "Plain text password for authentication (will be hashed with bcrypt)")
rootCmd.Flags().StringVar(&passwordHash, "password-hash", getEnvWithDefault("PASSWORD_HASH", ""), "Bcrypt hash of password for authentication")
// Proxy headers configuration
rootCmd.Flags().StringVar(&proxyBearerToken, "proxy-bearer-token", getEnvWithDefault("PROXY_BEARER_TOKEN", ""), "Bearer token to add to Authorization header when proxying requests")
rootCmd.Flags().StringVar(&trustedProxies, "trusted-proxies", getEnvWithDefault("TRUSTED_PROXIES", ""), "Comma-separated list of trusted proxies (IP addresses or CIDR ranges)")
rootCmd.Flags().StringVar(&proxyHeaders, "proxy-headers", getEnvWithDefault("PROXY_HEADERS", ""), "Comma-separated list of headers to add when proxying requests (format: Header1:Value1,Header2:Value2)")
rootCmd.Flags().BoolVar(&httpStreamingOnly, "http-streaming-only", getEnvBoolWithDefault("HTTP_STREAMING_ONLY", false), "Reject SSE (GET) requests and keep the backend in HTTP streaming-only mode")
rootCmd.Flags().StringVar(&headerMapping, "header-mapping", getEnvWithDefault("HEADER_MAPPING", ""), "Comma-separated mapping of JSON pointer paths to header names (e.g., /email:X-Forwarded-Email,/preferred_username:X-Forwarded-User)")
rootCmd.Flags().StringVar(&headerMappingBase, "header-mapping-base", getEnvWithDefault("HEADER_MAPPING_BASE", "/userinfo"), "JSON pointer base path for header mapping claims lookup (e.g., /userinfo or /)")
return rootCmd
}