2026-03-01 22:38:58 +08:00
|
|
|
"""OAuth token support for MCP HTTP/SSE servers."""
|
|
|
|
|
|
|
|
|
|
from __future__ import annotations
|
|
|
|
|
|
|
|
|
|
import asyncio
|
|
|
|
|
import logging
|
|
|
|
|
from dataclasses import dataclass
|
|
|
|
|
from datetime import UTC, datetime, timedelta
|
|
|
|
|
from typing import Any
|
|
|
|
|
|
refactor: split backend into harness (deerflow.*) and app (app.*) (#1131)
* refactor: extract shared utils to break harness→app cross-layer imports
Move _validate_skill_frontmatter to src/skills/validation.py and
CONVERTIBLE_EXTENSIONS + convert_file_to_markdown to src/utils/file_conversion.py.
This eliminates the two reverse dependencies from client.py (harness layer)
into gateway/routers/ (app layer), preparing for the harness/app package split.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
* refactor: split backend/src into harness (deerflow.*) and app (app.*)
Physically split the monolithic backend/src/ package into two layers:
- **Harness** (`packages/harness/deerflow/`): publishable agent framework
package with import prefix `deerflow.*`. Contains agents, sandbox, tools,
models, MCP, skills, config, and all core infrastructure.
- **App** (`app/`): unpublished application code with import prefix `app.*`.
Contains gateway (FastAPI REST API) and channels (IM integrations).
Key changes:
- Move 13 harness modules to packages/harness/deerflow/ via git mv
- Move gateway + channels to app/ via git mv
- Rename all imports: src.* → deerflow.* (harness) / app.* (app layer)
- Set up uv workspace with deerflow-harness as workspace member
- Update langgraph.json, config.example.yaml, all scripts, Docker files
- Add build-system (hatchling) to harness pyproject.toml
- Add PYTHONPATH=. to gateway startup commands for app.* resolution
- Update ruff.toml with known-first-party for import sorting
- Update all documentation to reflect new directory structure
Boundary rule enforced: harness code never imports from app.
All 429 tests pass. Lint clean.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
* chore: add harness→app boundary check test and update docs
Add test_harness_boundary.py that scans all Python files in
packages/harness/deerflow/ and fails if any `from app.*` or
`import app.*` statement is found. This enforces the architectural
rule that the harness layer never depends on the app layer.
Update CLAUDE.md to document the harness/app split architecture,
import conventions, and the boundary enforcement test.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
* feat: add config versioning with auto-upgrade on startup
When config.example.yaml schema changes, developers' local config.yaml
files can silently become outdated. This adds a config_version field and
auto-upgrade mechanism so breaking changes (like src.* → deerflow.*
renames) are applied automatically before services start.
- Add config_version: 1 to config.example.yaml
- Add startup version check warning in AppConfig.from_file()
- Add scripts/config-upgrade.sh with migration registry for value replacements
- Add `make config-upgrade` target
- Auto-run config-upgrade in serve.sh and start-daemon.sh before starting services
- Add config error hints in service failure messages
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
* fix comments
* fix: update src.* import in test_sandbox_tools_security to deerflow.*
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
* fix: handle empty config and search parent dirs for config.example.yaml
Address Copilot review comments on PR #1131:
- Guard against yaml.safe_load() returning None for empty config files
- Search parent directories for config.example.yaml instead of only
looking next to config.yaml, fixing detection in common setups
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
* fix: correct skills root path depth and config_version type coercion
- loader.py: fix get_skills_root_path() to use 5 parent levels (was 3)
after harness split, file lives at packages/harness/deerflow/skills/
so parent×3 resolved to backend/packages/harness/ instead of backend/
- app_config.py: coerce config_version to int() before comparison in
_check_config_version() to prevent TypeError when YAML stores value
as string (e.g. config_version: "1")
- tests: add regression tests for both fixes
Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
* fix: update test imports from src.* to deerflow.*/app.* after harness refactor
Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
---------
Co-authored-by: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-14 22:55:52 +08:00
|
|
|
from deerflow.config.extensions_config import ExtensionsConfig, McpOAuthConfig
|
2026-03-01 22:38:58 +08:00
|
|
|
|
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
@dataclass
|
|
|
|
|
class _OAuthToken:
|
|
|
|
|
"""Cached OAuth token."""
|
|
|
|
|
|
|
|
|
|
access_token: str
|
|
|
|
|
token_type: str
|
|
|
|
|
expires_at: datetime
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class OAuthTokenManager:
|
|
|
|
|
"""Acquire/cache/refresh OAuth tokens for MCP servers."""
|
|
|
|
|
|
|
|
|
|
def __init__(self, oauth_by_server: dict[str, McpOAuthConfig]):
|
|
|
|
|
self._oauth_by_server = oauth_by_server
|
|
|
|
|
self._tokens: dict[str, _OAuthToken] = {}
|
|
|
|
|
self._locks: dict[str, asyncio.Lock] = {name: asyncio.Lock() for name in oauth_by_server}
|
|
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
|
def from_extensions_config(cls, extensions_config: ExtensionsConfig) -> OAuthTokenManager:
|
|
|
|
|
oauth_by_server: dict[str, McpOAuthConfig] = {}
|
|
|
|
|
for server_name, server_config in extensions_config.get_enabled_mcp_servers().items():
|
|
|
|
|
if server_config.oauth and server_config.oauth.enabled:
|
|
|
|
|
oauth_by_server[server_name] = server_config.oauth
|
|
|
|
|
return cls(oauth_by_server)
|
|
|
|
|
|
|
|
|
|
def has_oauth_servers(self) -> bool:
|
|
|
|
|
return bool(self._oauth_by_server)
|
|
|
|
|
|
|
|
|
|
def oauth_server_names(self) -> list[str]:
|
|
|
|
|
return list(self._oauth_by_server.keys())
|
|
|
|
|
|
|
|
|
|
async def get_authorization_header(self, server_name: str) -> str | None:
|
|
|
|
|
oauth = self._oauth_by_server.get(server_name)
|
|
|
|
|
if not oauth:
|
|
|
|
|
return None
|
|
|
|
|
|
|
|
|
|
token = self._tokens.get(server_name)
|
|
|
|
|
if token and not self._is_expiring(token, oauth):
|
|
|
|
|
return f"{token.token_type} {token.access_token}"
|
|
|
|
|
|
|
|
|
|
lock = self._locks[server_name]
|
|
|
|
|
async with lock:
|
|
|
|
|
token = self._tokens.get(server_name)
|
|
|
|
|
if token and not self._is_expiring(token, oauth):
|
|
|
|
|
return f"{token.token_type} {token.access_token}"
|
|
|
|
|
|
|
|
|
|
fresh = await self._fetch_token(oauth)
|
|
|
|
|
self._tokens[server_name] = fresh
|
|
|
|
|
logger.info(f"Refreshed OAuth access token for MCP server: {server_name}")
|
|
|
|
|
return f"{fresh.token_type} {fresh.access_token}"
|
|
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
|
def _is_expiring(token: _OAuthToken, oauth: McpOAuthConfig) -> bool:
|
|
|
|
|
now = datetime.now(UTC)
|
|
|
|
|
return token.expires_at <= now + timedelta(seconds=max(oauth.refresh_skew_seconds, 0))
|
|
|
|
|
|
|
|
|
|
async def _fetch_token(self, oauth: McpOAuthConfig) -> _OAuthToken:
|
|
|
|
|
import httpx # pyright: ignore[reportMissingImports]
|
|
|
|
|
|
|
|
|
|
data: dict[str, str] = {
|
|
|
|
|
"grant_type": oauth.grant_type,
|
|
|
|
|
**oauth.extra_token_params,
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if oauth.scope:
|
|
|
|
|
data["scope"] = oauth.scope
|
|
|
|
|
if oauth.audience:
|
|
|
|
|
data["audience"] = oauth.audience
|
|
|
|
|
|
|
|
|
|
if oauth.grant_type == "client_credentials":
|
|
|
|
|
if not oauth.client_id or not oauth.client_secret:
|
|
|
|
|
raise ValueError("OAuth client_credentials requires client_id and client_secret")
|
|
|
|
|
data["client_id"] = oauth.client_id
|
|
|
|
|
data["client_secret"] = oauth.client_secret
|
|
|
|
|
elif oauth.grant_type == "refresh_token":
|
|
|
|
|
if not oauth.refresh_token:
|
|
|
|
|
raise ValueError("OAuth refresh_token grant requires refresh_token")
|
|
|
|
|
data["refresh_token"] = oauth.refresh_token
|
|
|
|
|
if oauth.client_id:
|
|
|
|
|
data["client_id"] = oauth.client_id
|
|
|
|
|
if oauth.client_secret:
|
|
|
|
|
data["client_secret"] = oauth.client_secret
|
|
|
|
|
else:
|
|
|
|
|
raise ValueError(f"Unsupported OAuth grant type: {oauth.grant_type}")
|
|
|
|
|
|
|
|
|
|
async with httpx.AsyncClient(timeout=15.0) as client:
|
|
|
|
|
response = await client.post(oauth.token_url, data=data)
|
|
|
|
|
response.raise_for_status()
|
|
|
|
|
payload = response.json()
|
|
|
|
|
|
|
|
|
|
access_token = payload.get(oauth.token_field)
|
|
|
|
|
if not access_token:
|
|
|
|
|
raise ValueError(f"OAuth token response missing '{oauth.token_field}'")
|
|
|
|
|
|
|
|
|
|
token_type = str(payload.get(oauth.token_type_field, oauth.default_token_type) or oauth.default_token_type)
|
|
|
|
|
|
|
|
|
|
expires_in_raw = payload.get(oauth.expires_in_field, 3600)
|
|
|
|
|
try:
|
|
|
|
|
expires_in = int(expires_in_raw)
|
|
|
|
|
except (TypeError, ValueError):
|
|
|
|
|
expires_in = 3600
|
|
|
|
|
|
|
|
|
|
expires_at = datetime.now(UTC) + timedelta(seconds=max(expires_in, 1))
|
|
|
|
|
return _OAuthToken(access_token=access_token, token_type=token_type, expires_at=expires_at)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def build_oauth_tool_interceptor(extensions_config: ExtensionsConfig) -> Any | None:
|
|
|
|
|
"""Build a tool interceptor that injects OAuth Authorization headers."""
|
|
|
|
|
token_manager = OAuthTokenManager.from_extensions_config(extensions_config)
|
|
|
|
|
if not token_manager.has_oauth_servers():
|
|
|
|
|
return None
|
|
|
|
|
|
|
|
|
|
async def oauth_interceptor(request: Any, handler: Any) -> Any:
|
|
|
|
|
header = await token_manager.get_authorization_header(request.server_name)
|
|
|
|
|
if not header:
|
|
|
|
|
return await handler(request)
|
|
|
|
|
|
|
|
|
|
updated_headers = dict(request.headers or {})
|
|
|
|
|
updated_headers["Authorization"] = header
|
|
|
|
|
return await handler(request.override(headers=updated_headers))
|
|
|
|
|
|
|
|
|
|
return oauth_interceptor
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
async def get_initial_oauth_headers(extensions_config: ExtensionsConfig) -> dict[str, str]:
|
|
|
|
|
"""Get initial OAuth Authorization headers for MCP server connections."""
|
|
|
|
|
token_manager = OAuthTokenManager.from_extensions_config(extensions_config)
|
|
|
|
|
if not token_manager.has_oauth_servers():
|
|
|
|
|
return {}
|
|
|
|
|
|
|
|
|
|
headers: dict[str, str] = {}
|
|
|
|
|
for server_name in token_manager.oauth_server_names():
|
|
|
|
|
headers[server_name] = await token_manager.get_authorization_header(server_name) or ""
|
|
|
|
|
|
|
|
|
|
return {name: value for name, value in headers.items() if value}
|