Commit graph

32 commits

Author SHA1 Message Date
dorshany
995316561e Fix: Add Authorization header from authProvider tokens in custom fetch for SSE 2025-04-13 14:12:12 -07:00
Glen Maddern
c542f78288 removing --clean flag as it sent things into a reauth loop 2025-04-11 04:48:19 +01:00
Jon Slominski
3c4600a920
Update utils.ts
removed debug logging
2025-04-10 21:00:12 -05:00
Jon Slominski
cf459b1a0d
Ensure Authorization header is passed to SSE connections
When using Bearer token authentication, the Authorization header was not being properly forwarded to SSE connections, causing 401 Unauthorized errors. This fix adds a custom EventSource initialization that explicitly includes the Authorization header in all SSE requests, allowing proper authentication with remote servers.
2025-04-10 20:56:07 -05:00
Glen Maddern
a3b4906afd Added --header CLI args support
This can include ${ENV_VAR} strings that are replaced with the values in process.env
2025-04-10 11:27:25 +10:00
Glen Maddern
684320a04c Disabling the multi-popup-prevention logic for now on windows as it appears not to be reliable 2025-04-04 14:44:56 +11:00
Glen Maddern
d5f5b31786 Added a wait for the token exchange 2025-03-31 22:28:10 +11:00
Glen Maddern
9fbba0509c Changing to returning a boolean, but tokens still not being loaded 2025-03-31 21:16:21 +11:00
Glen Maddern
412b5d9486 most of the implementation looking ok but sharing the token the wrong way 2025-03-31 19:39:40 +11:00
Glen Maddern
eee7b1b8d5 Added process.pid to all logs so we can deal with claude code forking mulitple instances 2025-03-31 16:31:34 +11:00
Glen Maddern
1382827ebd Versioning storage based on mcp-auth version number to let us iterate on storage format 2025-03-31 16:21:34 +11:00
Glen Maddern
027007030e adding the --clean flag 2025-03-31 15:35:30 +11:00
Glen Maddern
a32681e154 extracted the config directory access 2025-03-31 15:35:30 +11:00
Glen Maddern
1dd99edc0d breaking shared apart 2025-03-31 15:35:29 +11:00
Glen Maddern
d41e92812f moving things around now that /react is moving to use-mcp 2025-03-31 15:33:59 +11:00
Glen Maddern
17ee6e0bc5 If popups are blocked, the link should now work 2025-03-25 20:04:56 +11:00
Glen Maddern
5f189c23b3 Now it's working! 2025-03-25 18:08:45 +11:00
Glen Maddern
2b7fcf4725 Successfully logging in using popup. Types busted though 2025-03-25 17:54:20 +11:00
Glen Maddern
6a2bf90f5a Refactored to avoid the useCallback soup 2025-03-25 17:43:19 +11:00
Glen Maddern
397fcd3e1b adding polling fallback for tokens 2025-03-25 16:11:01 +11:00
Glen Maddern
90b375bfdc Switched from "localhost" to "127.0.0.1" for local redirect 2025-03-25 16:07:47 +11:00
Glen Maddern
1f186a6cb4 added clearStorage 2025-03-25 16:07:47 +11:00
Glen Maddern
4e94da52fe adding a PID to the authorize step, we're definitely getting two processes 2025-03-25 09:44:30 +11:00
Jeremy Morrell
b217e08007 Add VPN warning 2025-03-24 12:08:33 -07:00
Sunil Pai
d332273355 format 2025-03-24 10:48:46 +00:00
Glen Maddern
65e55c3823 Thank you Claude 2025-03-24 21:31:50 +11:00
Sunil Pai
56d9117ce0 fix types and pass build 2025-03-24 09:49:44 +00:00
Glen Maddern
5175099e23 Successfully tested end-to-end in a browser! 2025-03-24 16:01:49 +11:00
Glen Maddern
542a66951c wip 2025-03-24 11:07:44 +11:00
Glen Maddern
e6a22d452e got something building and activating in a react app, at least! 2025-03-22 22:29:16 +11:00
Glen Maddern
eca1e45363 Gearing up for Claude to write this react hook 2025-03-22 21:46:33 +11:00
Glen Maddern
cb322d877d Ported v0.0.4 from mcp-remote-examples 2025-03-20 11:11:45 +11:00