|
4 | 4 |
|
5 | 5 | package io.modelcontextprotocol.conformance.client.configuration; |
6 | 6 |
|
7 | | -import io.modelcontextprotocol.conformance.client.ConformanceSpringClientApplication; |
| 7 | +import io.modelcontextprotocol.client.transport.HttpClientStreamableHttpTransport; |
8 | 8 | import io.modelcontextprotocol.conformance.client.scenario.DefaultScenario; |
9 | 9 | import org.springaicommunity.mcp.security.client.sync.config.McpClientOAuth2Configurer; |
| 10 | +import org.springaicommunity.mcp.security.client.sync.oauth2.http.client.OAuth2CimdHttpClientTransportCustomizer; |
| 11 | +import org.springaicommunity.mcp.security.client.sync.oauth2.http.client.OAuth2DcrHttpClientTransportCustomizer; |
10 | 12 | import org.springaicommunity.mcp.security.client.sync.oauth2.registration.McpClientRegistrationRepository; |
11 | | -import org.springaicommunity.mcp.security.client.sync.oauth2.registration.McpOAuth2ClientManager; |
| 13 | +import org.springaicommunity.mcp.security.client.sync.oauth2.registration.McpOAuth2DcrClientManager; |
| 14 | +import org.springaicommunity.mcp.security.client.sync.oauth2.registration.cimd.DefaultMcpOAuth2CimdClientManager; |
| 15 | +import org.springaicommunity.mcp.security.client.sync.oauth2.registration.cimd.McpOAuth2CimdClientManager; |
12 | 16 |
|
| 17 | +import org.springframework.ai.mcp.customizer.McpClientCustomizer; |
| 18 | +import org.springframework.beans.factory.annotation.Value; |
13 | 19 | import org.springframework.boot.autoconfigure.condition.ConditionalOnExpression; |
14 | 20 | import org.springframework.boot.web.server.servlet.context.ServletWebServerApplicationContext; |
15 | 21 | import org.springframework.context.annotation.Bean; |
16 | 22 | import org.springframework.context.annotation.Configuration; |
17 | | -import org.springframework.security.config.Customizer; |
18 | 23 | import org.springframework.security.config.annotation.web.builders.HttpSecurity; |
19 | | -import org.springframework.security.oauth2.client.web.OAuth2AuthorizedClientRepository; |
| 24 | +import org.springframework.security.oauth2.client.OAuth2AuthorizedClientManager; |
| 25 | +import org.springframework.security.oauth2.client.registration.ClientRegistration; |
20 | 26 | import org.springframework.security.web.SecurityFilterChain; |
21 | 27 |
|
22 | 28 | @Configuration |
23 | 29 | @ConditionalOnExpression("#{environment['MCP_CONFORMANCE_SCENARIO'] != 'auth/pre-registration'}") |
24 | 30 | public class DefaultConfiguration { |
25 | 31 |
|
| 32 | + private final String TEST_CLIENT_ID_URL = "https://conformance-test.local/client-metadata.json"; |
| 33 | + |
26 | 34 | @Bean |
27 | | - DefaultScenario defaultScenario(McpClientRegistrationRepository clientRegistrationRepository, |
28 | | - ServletWebServerApplicationContext serverCtx, |
29 | | - OAuth2AuthorizedClientRepository oAuth2AuthorizedClientRepository, |
30 | | - McpOAuth2ClientManager mcpOAuth2ClientManager) { |
31 | | - return new DefaultScenario(clientRegistrationRepository, serverCtx, oAuth2AuthorizedClientRepository, |
32 | | - mcpOAuth2ClientManager); |
| 35 | + DefaultScenario defaultScenario(ServletWebServerApplicationContext serverCtx, |
| 36 | + McpClientCustomizer<HttpClientStreamableHttpTransport.Builder> transportCustomizer) { |
| 37 | + return new DefaultScenario(serverCtx, transportCustomizer); |
| 38 | + } |
| 39 | + |
| 40 | + @Bean |
| 41 | + McpClientCustomizer<HttpClientStreamableHttpTransport.Builder> transportCustomizer( |
| 42 | + OAuth2AuthorizedClientManager oAuth2AuthorizedClientManager, |
| 43 | + McpClientRegistrationRepository clientRegistrationRepository, |
| 44 | + McpOAuth2DcrClientManager mcpOAuth2ClientManager, McpOAuth2CimdClientManager mcpOAuth2CimdClientManager, |
| 45 | + @Value("${mcp.conformance.scenario}") String scenario) { |
| 46 | + if (scenario.equals("auth/basic-cimd")) { |
| 47 | + if (mcpOAuth2CimdClientManager instanceof DefaultMcpOAuth2CimdClientManager mgr) { |
| 48 | + // Hardcode the client_id |
| 49 | + mgr.setClientRegistrationCustomizer( |
| 50 | + cr -> ClientRegistration.withClientRegistration(cr).clientId(TEST_CLIENT_ID_URL).build()); |
| 51 | + } |
| 52 | + return new OAuth2CimdHttpClientTransportCustomizer(oAuth2AuthorizedClientManager, |
| 53 | + clientRegistrationRepository, mcpOAuth2CimdClientManager); |
| 54 | + |
| 55 | + } |
| 56 | + else { |
| 57 | + return new OAuth2DcrHttpClientTransportCustomizer(oAuth2AuthorizedClientManager, |
| 58 | + clientRegistrationRepository, mcpOAuth2ClientManager); |
| 59 | + } |
33 | 60 | } |
34 | 61 |
|
35 | 62 | @Bean |
36 | | - SecurityFilterChain securityFilterChain(HttpSecurity http, ConformanceSpringClientApplication.ServerUrl serverUrl) { |
| 63 | + SecurityFilterChain securityFilterChain(HttpSecurity http) { |
37 | 64 | return http.authorizeHttpRequests(authz -> authz.anyRequest().permitAll()) |
38 | | - .with(new McpClientOAuth2Configurer(), Customizer.withDefaults()) |
| 65 | + .with(new McpClientOAuth2Configurer(), mcp -> mcp.cimd(true)) |
39 | 66 | .build(); |
40 | 67 | } |
41 | 68 |
|
|
0 commit comments