Skip to content

Commit 42b1738

Browse files
Merge pull request #157 from modelcontextprotocol/jerome/fix/no-mcp-header-in-metadata-fetching
* Check token expiry in requireAuth middleware * Gracefully handle cors issues in metadata fetching (experienced due to MCP-Protocol-Version header) * Don't set client secret expiry for public clients
2 parents 5c07636 + c521710 commit 42b1738

File tree

6 files changed

+169
-8
lines changed

6 files changed

+169
-8
lines changed

src/client/auth.test.ts

+58
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,64 @@ describe("OAuth Authorization", () => {
4343
});
4444
});
4545

46+
it("returns metadata when first fetch fails but second without MCP header succeeds", async () => {
47+
// Set up a counter to control behavior
48+
let callCount = 0;
49+
50+
// Mock implementation that changes behavior based on call count
51+
mockFetch.mockImplementation((_url, _options) => {
52+
callCount++;
53+
54+
if (callCount === 1) {
55+
// First call with MCP header - fail with TypeError (simulating CORS error)
56+
// We need to use TypeError specifically because that's what the implementation checks for
57+
return Promise.reject(new TypeError("Network error"));
58+
} else {
59+
// Second call without header - succeed
60+
return Promise.resolve({
61+
ok: true,
62+
status: 200,
63+
json: async () => validMetadata
64+
});
65+
}
66+
});
67+
68+
// Should succeed with the second call
69+
const metadata = await discoverOAuthMetadata("https://auth.example.com");
70+
expect(metadata).toEqual(validMetadata);
71+
72+
// Verify both calls were made
73+
expect(mockFetch).toHaveBeenCalledTimes(2);
74+
75+
// Verify first call had MCP header
76+
expect(mockFetch.mock.calls[0][1]?.headers).toHaveProperty("MCP-Protocol-Version");
77+
});
78+
79+
it("throws an error when all fetch attempts fail", async () => {
80+
// Set up a counter to control behavior
81+
let callCount = 0;
82+
83+
// Mock implementation that changes behavior based on call count
84+
mockFetch.mockImplementation((_url, _options) => {
85+
callCount++;
86+
87+
if (callCount === 1) {
88+
// First call - fail with TypeError
89+
return Promise.reject(new TypeError("First failure"));
90+
} else {
91+
// Second call - fail with different error
92+
return Promise.reject(new Error("Second failure"));
93+
}
94+
});
95+
96+
// Should fail with the second error
97+
await expect(discoverOAuthMetadata("https://auth.example.com"))
98+
.rejects.toThrow("Second failure");
99+
100+
// Verify both calls were made
101+
expect(mockFetch).toHaveBeenCalledTimes(2);
102+
});
103+
46104
it("returns undefined when discovery endpoint returns 404", async () => {
47105
mockFetch.mockResolvedValueOnce({
48106
ok: false,

src/client/auth.ts

+14-4
Original file line numberDiff line numberDiff line change
@@ -163,11 +163,21 @@ export async function discoverOAuthMetadata(
163163
opts?: { protocolVersion?: string },
164164
): Promise<OAuthMetadata | undefined> {
165165
const url = new URL("/.well-known/oauth-authorization-server", serverUrl);
166-
const response = await fetch(url, {
167-
headers: {
168-
"MCP-Protocol-Version": opts?.protocolVersion ?? LATEST_PROTOCOL_VERSION
166+
let response: Response;
167+
try {
168+
response = await fetch(url, {
169+
headers: {
170+
"MCP-Protocol-Version": opts?.protocolVersion ?? LATEST_PROTOCOL_VERSION
171+
}
172+
});
173+
} catch (error) {
174+
// CORS errors come back as TypeError
175+
if (error instanceof TypeError) {
176+
response = await fetch(url);
177+
} else {
178+
throw error;
169179
}
170-
});
180+
}
171181

172182
if (response.status === 404) {
173183
return undefined;

src/server/auth/handlers/register.test.ts

+31
Original file line numberDiff line numberDiff line change
@@ -141,6 +141,37 @@ describe('Client Registration Handler', () => {
141141

142142
expect(response.status).toBe(201);
143143
expect(response.body.client_secret).toBeUndefined();
144+
expect(response.body.client_secret_expires_at).toBeUndefined();
145+
});
146+
147+
it('sets client_secret_expires_at for public clients only', async () => {
148+
// Test for public client (token_endpoint_auth_method not 'none')
149+
const publicClientMetadata: OAuthClientMetadata = {
150+
redirect_uris: ['https://example.com/callback'],
151+
token_endpoint_auth_method: 'client_secret_basic'
152+
};
153+
154+
const publicResponse = await supertest(app)
155+
.post('/register')
156+
.send(publicClientMetadata);
157+
158+
expect(publicResponse.status).toBe(201);
159+
expect(publicResponse.body.client_secret).toBeDefined();
160+
expect(publicResponse.body.client_secret_expires_at).toBeDefined();
161+
162+
// Test for non-public client (token_endpoint_auth_method is 'none')
163+
const nonPublicClientMetadata: OAuthClientMetadata = {
164+
redirect_uris: ['https://example.com/callback'],
165+
token_endpoint_auth_method: 'none'
166+
};
167+
168+
const nonPublicResponse = await supertest(app)
169+
.post('/register')
170+
.send(nonPublicClientMetadata);
171+
172+
expect(nonPublicResponse.status).toBe(201);
173+
expect(nonPublicResponse.body.client_secret).toBeUndefined();
174+
expect(nonPublicResponse.body.client_secret_expires_at).toBeUndefined();
144175
});
145176

146177
it('sets expiry based on clientSecretExpirySeconds', async () => {

src/server/auth/handlers/register.ts

+10-4
Original file line numberDiff line numberDiff line change
@@ -75,20 +75,26 @@ export function clientRegistrationHandler({
7575
}
7676

7777
const clientMetadata = parseResult.data;
78+
const isPublicClient = clientMetadata.token_endpoint_auth_method === 'none'
7879

7980
// Generate client credentials
8081
const clientId = crypto.randomUUID();
81-
const clientSecret = clientMetadata.token_endpoint_auth_method !== 'none'
82-
? crypto.randomBytes(32).toString('hex')
83-
: undefined;
82+
const clientSecret = isPublicClient
83+
? undefined
84+
: crypto.randomBytes(32).toString('hex');
8485
const clientIdIssuedAt = Math.floor(Date.now() / 1000);
8586

87+
// Calculate client secret expiry time
88+
const clientsDoExpire = clientSecretExpirySeconds > 0
89+
const secretExpiryTime = clientsDoExpire ? clientIdIssuedAt + clientSecretExpirySeconds : 0
90+
const clientSecretExpiresAt = isPublicClient ? undefined : secretExpiryTime
91+
8692
let clientInfo: OAuthClientInformationFull = {
8793
...clientMetadata,
8894
client_id: clientId,
8995
client_secret: clientSecret,
9096
client_id_issued_at: clientIdIssuedAt,
91-
client_secret_expires_at: clientSecretExpirySeconds > 0 ? clientIdIssuedAt + clientSecretExpirySeconds : 0
97+
client_secret_expires_at: clientSecretExpiresAt,
9298
};
9399

94100
clientInfo = await clientsStore.registerClient!(clientInfo);

src/server/auth/middleware/bearerAuth.test.ts

+51
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,57 @@ describe("requireBearerAuth middleware", () => {
5555
expect(mockResponse.status).not.toHaveBeenCalled();
5656
expect(mockResponse.json).not.toHaveBeenCalled();
5757
});
58+
59+
it("should reject expired tokens", async () => {
60+
const expiredAuthInfo: AuthInfo = {
61+
token: "expired-token",
62+
clientId: "client-123",
63+
scopes: ["read", "write"],
64+
expiresAt: Math.floor(Date.now() / 1000) - 100, // Token expired 100 seconds ago
65+
};
66+
mockVerifyAccessToken.mockResolvedValue(expiredAuthInfo);
67+
68+
mockRequest.headers = {
69+
authorization: "Bearer expired-token",
70+
};
71+
72+
const middleware = requireBearerAuth({ provider: mockProvider });
73+
await middleware(mockRequest as Request, mockResponse as Response, nextFunction);
74+
75+
expect(mockVerifyAccessToken).toHaveBeenCalledWith("expired-token");
76+
expect(mockResponse.status).toHaveBeenCalledWith(401);
77+
expect(mockResponse.set).toHaveBeenCalledWith(
78+
"WWW-Authenticate",
79+
expect.stringContaining('Bearer error="invalid_token"')
80+
);
81+
expect(mockResponse.json).toHaveBeenCalledWith(
82+
expect.objectContaining({ error: "invalid_token", error_description: "Token has expired" })
83+
);
84+
expect(nextFunction).not.toHaveBeenCalled();
85+
});
86+
87+
it("should accept non-expired tokens", async () => {
88+
const nonExpiredAuthInfo: AuthInfo = {
89+
token: "valid-token",
90+
clientId: "client-123",
91+
scopes: ["read", "write"],
92+
expiresAt: Math.floor(Date.now() / 1000) + 3600, // Token expires in an hour
93+
};
94+
mockVerifyAccessToken.mockResolvedValue(nonExpiredAuthInfo);
95+
96+
mockRequest.headers = {
97+
authorization: "Bearer valid-token",
98+
};
99+
100+
const middleware = requireBearerAuth({ provider: mockProvider });
101+
await middleware(mockRequest as Request, mockResponse as Response, nextFunction);
102+
103+
expect(mockVerifyAccessToken).toHaveBeenCalledWith("valid-token");
104+
expect(mockRequest.auth).toEqual(nonExpiredAuthInfo);
105+
expect(nextFunction).toHaveBeenCalled();
106+
expect(mockResponse.status).not.toHaveBeenCalled();
107+
expect(mockResponse.json).not.toHaveBeenCalled();
108+
});
58109

59110
it("should require specific scopes when configured", async () => {
60111
const authInfo: AuthInfo = {

src/server/auth/middleware/bearerAuth.ts

+5
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,11 @@ export function requireBearerAuth({ provider, requiredScopes = [] }: BearerAuthM
5555
}
5656
}
5757

58+
// Check if the token is expired
59+
if (!!authInfo.expiresAt && authInfo.expiresAt < Date.now() / 1000) {
60+
throw new InvalidTokenError("Token has expired");
61+
}
62+
5863
req.auth = authInfo;
5964
next();
6065
} catch (error) {

0 commit comments

Comments
 (0)