1use std::{
10 collections::HashSet,
11 net::{IpAddr, SocketAddr},
12 num::NonZeroU32,
13 path::PathBuf,
14 sync::{
15 Arc, LazyLock, Mutex,
16 atomic::{AtomicU64, Ordering},
17 },
18 time::Duration,
19};
20
21use arc_swap::ArcSwap;
22use argon2::{Argon2, PasswordHash, PasswordHasher, PasswordVerifier, password_hash::SaltString};
23use axum::{
24 body::Body,
25 extract::ConnectInfo,
26 http::{Request, header},
27 middleware::Next,
28 response::{IntoResponse, Response},
29};
30use base64::{Engine as _, engine::general_purpose::URL_SAFE_NO_PAD};
31use secrecy::SecretString;
32use serde::Deserialize;
33use x509_parser::prelude::*;
34
35use crate::{bounded_limiter::BoundedKeyedLimiter, error::McpxError};
36
37#[derive(Clone)]
46#[non_exhaustive]
47pub struct AuthIdentity {
48 pub name: String,
50 pub role: String,
52 pub method: AuthMethod,
54 pub raw_token: Option<SecretString>,
60 pub sub: Option<String>,
63}
64
65impl std::fmt::Debug for AuthIdentity {
66 fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
69 f.debug_struct("AuthIdentity")
70 .field("name", &self.name)
71 .field("role", &self.role)
72 .field("method", &self.method)
73 .field(
74 "raw_token",
75 &if self.raw_token.is_some() {
76 "<redacted>"
77 } else {
78 "<none>"
79 },
80 )
81 .field(
82 "sub",
83 &if self.sub.is_some() {
84 "<redacted>"
85 } else {
86 "<none>"
87 },
88 )
89 .finish()
90 }
91}
92
93#[derive(Debug, Clone, Copy, PartialEq, Eq)]
95#[non_exhaustive]
96pub enum AuthMethod {
97 BearerToken,
99 MtlsCertificate,
101 OAuthJwt,
103}
104
105#[derive(Debug, Clone, Copy, PartialEq, Eq)]
106enum AuthFailureClass {
107 MissingCredential,
108 InvalidCredential,
109 #[cfg_attr(not(feature = "oauth"), allow(dead_code))]
110 ExpiredCredential,
111 RateLimited,
113 PreAuthGate,
116}
117
118impl AuthFailureClass {
119 fn as_str(self) -> &'static str {
120 match self {
121 Self::MissingCredential => "missing_credential",
122 Self::InvalidCredential => "invalid_credential",
123 Self::ExpiredCredential => "expired_credential",
124 Self::RateLimited => "rate_limited",
125 Self::PreAuthGate => "pre_auth_gate",
126 }
127 }
128
129 fn bearer_error(self) -> (&'static str, &'static str) {
130 match self {
131 Self::MissingCredential => (
132 "invalid_request",
133 "missing bearer token or mTLS client certificate",
134 ),
135 Self::InvalidCredential => ("invalid_token", "token is invalid"),
136 Self::ExpiredCredential => ("invalid_token", "token is expired"),
137 Self::RateLimited => ("invalid_request", "too many failed authentication attempts"),
138 Self::PreAuthGate => (
139 "invalid_request",
140 "too many unauthenticated requests from this source",
141 ),
142 }
143 }
144
145 fn response_body(self) -> &'static str {
146 match self {
147 Self::MissingCredential => "unauthorized: missing credential",
148 Self::InvalidCredential => "unauthorized: invalid credential",
149 Self::ExpiredCredential => "unauthorized: expired credential",
150 Self::RateLimited => "rate limited",
151 Self::PreAuthGate => "rate limited (pre-auth)",
152 }
153 }
154}
155
156#[derive(Debug, Clone, Copy, PartialEq, Eq, serde::Serialize)]
158#[non_exhaustive]
159pub struct AuthCountersSnapshot {
160 pub success_mtls: u64,
162 pub success_bearer: u64,
164 pub success_oauth_jwt: u64,
166 pub failure_missing_credential: u64,
168 pub failure_invalid_credential: u64,
170 pub failure_expired_credential: u64,
172 pub failure_rate_limited: u64,
174 pub failure_pre_auth_gate: u64,
177}
178
179#[derive(Debug, Default)]
181pub(crate) struct AuthCounters {
182 success_mtls: AtomicU64,
183 success_bearer: AtomicU64,
184 success_oauth_jwt: AtomicU64,
185 failure_missing_credential: AtomicU64,
186 failure_invalid_credential: AtomicU64,
187 failure_expired_credential: AtomicU64,
188 failure_rate_limited: AtomicU64,
189 failure_pre_auth_gate: AtomicU64,
190}
191
192impl AuthCounters {
193 fn record_success(&self, method: AuthMethod) {
194 match method {
195 AuthMethod::MtlsCertificate => {
196 self.success_mtls.fetch_add(1, Ordering::Relaxed);
197 }
198 AuthMethod::BearerToken => {
199 self.success_bearer.fetch_add(1, Ordering::Relaxed);
200 }
201 AuthMethod::OAuthJwt => {
202 self.success_oauth_jwt.fetch_add(1, Ordering::Relaxed);
203 }
204 }
205 }
206
207 fn record_failure(&self, class: AuthFailureClass) {
208 match class {
209 AuthFailureClass::MissingCredential => {
210 self.failure_missing_credential
211 .fetch_add(1, Ordering::Relaxed);
212 }
213 AuthFailureClass::InvalidCredential => {
214 self.failure_invalid_credential
215 .fetch_add(1, Ordering::Relaxed);
216 }
217 AuthFailureClass::ExpiredCredential => {
218 self.failure_expired_credential
219 .fetch_add(1, Ordering::Relaxed);
220 }
221 AuthFailureClass::RateLimited => {
222 self.failure_rate_limited.fetch_add(1, Ordering::Relaxed);
223 }
224 AuthFailureClass::PreAuthGate => {
225 self.failure_pre_auth_gate.fetch_add(1, Ordering::Relaxed);
226 }
227 }
228 }
229
230 fn snapshot(&self) -> AuthCountersSnapshot {
231 AuthCountersSnapshot {
232 success_mtls: self.success_mtls.load(Ordering::Relaxed),
233 success_bearer: self.success_bearer.load(Ordering::Relaxed),
234 success_oauth_jwt: self.success_oauth_jwt.load(Ordering::Relaxed),
235 failure_missing_credential: self.failure_missing_credential.load(Ordering::Relaxed),
236 failure_invalid_credential: self.failure_invalid_credential.load(Ordering::Relaxed),
237 failure_expired_credential: self.failure_expired_credential.load(Ordering::Relaxed),
238 failure_rate_limited: self.failure_rate_limited.load(Ordering::Relaxed),
239 failure_pre_auth_gate: self.failure_pre_auth_gate.load(Ordering::Relaxed),
240 }
241 }
242}
243
244#[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)]
256#[non_exhaustive]
257pub struct RfcTimestamp(chrono::DateTime<chrono::FixedOffset>);
258
259impl RfcTimestamp {
260 pub fn parse(s: &str) -> Result<Self, chrono::ParseError> {
268 chrono::DateTime::parse_from_rfc3339(s).map(Self)
269 }
270
271 #[must_use]
273 pub fn as_datetime(&self) -> &chrono::DateTime<chrono::FixedOffset> {
274 &self.0
275 }
276
277 #[must_use]
279 pub fn into_inner(self) -> chrono::DateTime<chrono::FixedOffset> {
280 self.0
281 }
282}
283
284impl std::fmt::Display for RfcTimestamp {
285 fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
286 write!(f, "{}", self.0.to_rfc3339())
288 }
289}
290
291impl std::fmt::Debug for RfcTimestamp {
292 fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
293 write!(f, "{}", self.0.to_rfc3339())
298 }
299}
300
301impl<'de> Deserialize<'de> for RfcTimestamp {
302 fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>
303 where
304 D: serde::Deserializer<'de>,
305 {
306 let s = String::deserialize(deserializer)?;
310 Self::parse(&s).map_err(serde::de::Error::custom)
311 }
312}
313
314impl serde::Serialize for RfcTimestamp {
315 fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error>
316 where
317 S: serde::Serializer,
318 {
319 serializer.serialize_str(&self.0.to_rfc3339())
320 }
321}
322
323impl From<chrono::DateTime<chrono::FixedOffset>> for RfcTimestamp {
324 fn from(value: chrono::DateTime<chrono::FixedOffset>) -> Self {
325 Self(value)
326 }
327}
328
329#[derive(Clone, Deserialize)]
336#[non_exhaustive]
337pub struct ApiKeyEntry {
338 pub name: String,
340 pub hash: String,
342 pub role: String,
344 pub expires_at: Option<RfcTimestamp>,
349}
350
351impl std::fmt::Debug for ApiKeyEntry {
352 fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
355 f.debug_struct("ApiKeyEntry")
356 .field("name", &self.name)
357 .field("hash", &"<redacted>")
358 .field("role", &self.role)
359 .field("expires_at", &self.expires_at)
360 .finish()
361 }
362}
363
364impl ApiKeyEntry {
365 #[must_use]
367 pub fn new(name: impl Into<String>, hash: impl Into<String>, role: impl Into<String>) -> Self {
368 Self {
369 name: name.into(),
370 hash: hash.into(),
371 role: role.into(),
372 expires_at: None,
373 }
374 }
375
376 #[must_use]
381 pub fn with_expiry(mut self, expires_at: RfcTimestamp) -> Self {
382 self.expires_at = Some(expires_at);
383 self
384 }
385
386 pub fn try_with_expiry(
394 mut self,
395 expires_at: impl AsRef<str>,
396 ) -> Result<Self, chrono::ParseError> {
397 self.expires_at = Some(RfcTimestamp::parse(expires_at.as_ref())?);
398 Ok(self)
399 }
400}
401
402#[derive(Debug, Clone, Deserialize)]
404#[allow(
405 clippy::struct_excessive_bools,
406 reason = "mTLS CRL behavior is intentionally configured as independent booleans"
407)]
408#[non_exhaustive]
409pub struct MtlsConfig {
410 pub ca_cert_path: PathBuf,
412 #[serde(default)]
415 pub required: bool,
416 #[serde(default = "default_mtls_role")]
419 pub default_role: String,
420 #[serde(default = "default_true")]
423 pub crl_enabled: bool,
424 #[serde(default, with = "humantime_serde::option")]
427 pub crl_refresh_interval: Option<Duration>,
428 #[serde(default = "default_crl_fetch_timeout", with = "humantime_serde")]
430 pub crl_fetch_timeout: Duration,
431 #[serde(default = "default_crl_stale_grace", with = "humantime_serde")]
434 pub crl_stale_grace: Duration,
435 #[serde(default)]
438 pub crl_deny_on_unavailable: bool,
439 #[serde(default)]
441 pub crl_end_entity_only: bool,
442 #[serde(default = "default_true")]
451 pub crl_allow_http: bool,
452 #[serde(default = "default_true")]
454 pub crl_enforce_expiration: bool,
455 #[serde(default = "default_crl_max_concurrent_fetches")]
461 pub crl_max_concurrent_fetches: usize,
462 #[serde(default = "default_crl_max_response_bytes")]
466 pub crl_max_response_bytes: u64,
467 #[serde(default = "default_crl_discovery_rate_per_min")]
479 pub crl_discovery_rate_per_min: u32,
480 #[serde(default = "default_crl_max_host_semaphores")]
487 pub crl_max_host_semaphores: usize,
488 #[serde(default = "default_crl_max_seen_urls")]
492 pub crl_max_seen_urls: usize,
493 #[serde(default = "default_crl_max_cache_entries")]
497 pub crl_max_cache_entries: usize,
498}
499
500fn default_mtls_role() -> String {
501 "viewer".into()
502}
503
504const fn default_true() -> bool {
505 true
506}
507
508const fn default_crl_fetch_timeout() -> Duration {
509 Duration::from_secs(30)
510}
511
512const fn default_crl_stale_grace() -> Duration {
513 Duration::from_hours(24)
514}
515
516const fn default_crl_max_concurrent_fetches() -> usize {
517 4
518}
519
520const fn default_crl_max_response_bytes() -> u64 {
521 5 * 1024 * 1024
522}
523
524const fn default_crl_discovery_rate_per_min() -> u32 {
525 60
526}
527
528const fn default_crl_max_host_semaphores() -> usize {
529 1024
530}
531
532const fn default_crl_max_seen_urls() -> usize {
533 4096
534}
535
536const fn default_crl_max_cache_entries() -> usize {
537 1024
538}
539
540#[derive(Debug, Clone, Deserialize)]
555#[non_exhaustive]
556pub struct RateLimitConfig {
557 #[serde(default = "default_max_attempts")]
560 pub max_attempts_per_minute: u32,
561 #[serde(default)]
569 pub pre_auth_max_per_minute: Option<u32>,
570 #[serde(default = "default_max_tracked_keys")]
575 pub max_tracked_keys: usize,
576 #[serde(default = "default_idle_eviction", with = "humantime_serde")]
579 pub idle_eviction: Duration,
580}
581
582impl Default for RateLimitConfig {
583 fn default() -> Self {
584 Self {
585 max_attempts_per_minute: default_max_attempts(),
586 pre_auth_max_per_minute: None,
587 max_tracked_keys: default_max_tracked_keys(),
588 idle_eviction: default_idle_eviction(),
589 }
590 }
591}
592
593impl RateLimitConfig {
594 #[must_use]
598 pub fn new(max_attempts_per_minute: u32) -> Self {
599 Self {
600 max_attempts_per_minute,
601 ..Self::default()
602 }
603 }
604
605 #[must_use]
608 pub fn with_pre_auth_max_per_minute(mut self, quota: u32) -> Self {
609 self.pre_auth_max_per_minute = Some(quota);
610 self
611 }
612
613 #[must_use]
615 pub fn with_max_tracked_keys(mut self, max: usize) -> Self {
616 self.max_tracked_keys = max;
617 self
618 }
619
620 #[must_use]
622 pub fn with_idle_eviction(mut self, idle: Duration) -> Self {
623 self.idle_eviction = idle;
624 self
625 }
626}
627
628fn default_max_attempts() -> u32 {
629 30
630}
631
632fn default_max_tracked_keys() -> usize {
633 10_000
634}
635
636fn default_idle_eviction() -> Duration {
637 Duration::from_mins(15)
638}
639
640#[derive(Debug, Clone, Default, Deserialize)]
642#[non_exhaustive]
643pub struct AuthConfig {
644 #[serde(default)]
646 pub enabled: bool,
647 #[serde(default)]
649 pub api_keys: Vec<ApiKeyEntry>,
650 pub mtls: Option<MtlsConfig>,
652 pub rate_limit: Option<RateLimitConfig>,
654 #[cfg(feature = "oauth")]
656 pub oauth: Option<crate::oauth::OAuthConfig>,
657}
658
659impl AuthConfig {
660 #[must_use]
662 pub fn with_keys(keys: Vec<ApiKeyEntry>) -> Self {
663 Self {
664 enabled: true,
665 api_keys: keys,
666 mtls: None,
667 rate_limit: None,
668 #[cfg(feature = "oauth")]
669 oauth: None,
670 }
671 }
672
673 #[must_use]
675 pub fn with_rate_limit(mut self, rate_limit: RateLimitConfig) -> Self {
676 self.rate_limit = Some(rate_limit);
677 self
678 }
679}
680
681#[derive(Debug, Clone, serde::Serialize)]
685#[non_exhaustive]
686pub struct ApiKeySummary {
687 pub name: String,
689 pub role: String,
691 pub expires_at: Option<RfcTimestamp>,
694}
695
696#[derive(Debug, Clone, serde::Serialize)]
698#[allow(
699 clippy::struct_excessive_bools,
700 reason = "this is a flat summary of independent auth-method booleans"
701)]
702#[non_exhaustive]
703pub struct AuthConfigSummary {
704 pub enabled: bool,
706 pub bearer: bool,
708 pub mtls: bool,
710 pub oauth: bool,
712 pub api_keys: Vec<ApiKeySummary>,
714}
715
716impl AuthConfig {
717 #[must_use]
719 pub fn summary(&self) -> AuthConfigSummary {
720 AuthConfigSummary {
721 enabled: self.enabled,
722 bearer: !self.api_keys.is_empty(),
723 mtls: self.mtls.is_some(),
724 #[cfg(feature = "oauth")]
725 oauth: self.oauth.is_some(),
726 #[cfg(not(feature = "oauth"))]
727 oauth: false,
728 api_keys: self
729 .api_keys
730 .iter()
731 .map(|k| ApiKeySummary {
732 name: k.name.clone(),
733 role: k.role.clone(),
734 expires_at: k.expires_at,
735 })
736 .collect(),
737 }
738 }
739}
740
741pub(crate) type KeyedLimiter = BoundedKeyedLimiter<IpAddr>;
744
745#[derive(Clone, Debug)]
755#[non_exhaustive]
756pub(crate) struct TlsConnInfo {
757 pub addr: SocketAddr,
759 pub identity: Option<AuthIdentity>,
762}
763
764impl TlsConnInfo {
765 #[must_use]
767 pub(crate) const fn new(addr: SocketAddr, identity: Option<AuthIdentity>) -> Self {
768 Self { addr, identity }
769 }
770}
771
772#[allow(
777 missing_debug_implementations,
778 reason = "contains governor RateLimiter and JwksCache without Debug impls"
779)]
780#[non_exhaustive]
781pub(crate) struct AuthState {
782 pub api_keys: ArcSwap<Vec<ApiKeyEntry>>,
784 pub rate_limiter: Option<Arc<KeyedLimiter>>,
786 pub pre_auth_limiter: Option<Arc<KeyedLimiter>>,
789 #[cfg(feature = "oauth")]
790 pub jwks_cache: Option<Arc<crate::oauth::JwksCache>>,
792 pub seen_identities: Mutex<HashSet<String>>,
795 pub counters: AuthCounters,
797}
798
799impl AuthState {
800 pub(crate) fn reload_keys(&self, keys: Vec<ApiKeyEntry>) {
806 let count = keys.len();
807 self.api_keys.store(Arc::new(keys));
808 tracing::info!(keys = count, "API keys reloaded");
809 }
810
811 #[must_use]
813 pub(crate) fn counters_snapshot(&self) -> AuthCountersSnapshot {
814 self.counters.snapshot()
815 }
816
817 #[must_use]
819 pub(crate) fn api_key_summaries(&self) -> Vec<ApiKeySummary> {
820 self.api_keys
821 .load()
822 .iter()
823 .map(|k| ApiKeySummary {
824 name: k.name.clone(),
825 role: k.role.clone(),
826 expires_at: k.expires_at,
827 })
828 .collect()
829 }
830
831 fn log_auth(&self, id: &AuthIdentity, method: &str) {
833 self.counters.record_success(id.method);
834 let first = self
835 .seen_identities
836 .lock()
837 .unwrap_or_else(std::sync::PoisonError::into_inner)
838 .insert(id.name.clone());
839 if first {
840 tracing::info!(name = %id.name, role = %id.role, "{method} authenticated");
841 } else {
842 tracing::debug!(name = %id.name, role = %id.role, "{method} authenticated");
843 }
844 }
845}
846
847const DEFAULT_AUTH_RATE: NonZeroU32 = NonZeroU32::new(30).unwrap();
850
851#[must_use]
853pub(crate) fn build_rate_limiter(config: &RateLimitConfig) -> Arc<KeyedLimiter> {
854 let quota = governor::Quota::per_minute(
855 NonZeroU32::new(config.max_attempts_per_minute).unwrap_or(DEFAULT_AUTH_RATE),
856 );
857 Arc::new(BoundedKeyedLimiter::new(
858 quota,
859 config.max_tracked_keys,
860 config.idle_eviction,
861 ))
862}
863
864#[must_use]
871pub(crate) fn build_pre_auth_limiter(config: &RateLimitConfig) -> Arc<KeyedLimiter> {
872 let resolved = config.pre_auth_max_per_minute.unwrap_or_else(|| {
873 config
874 .max_attempts_per_minute
875 .saturating_mul(PRE_AUTH_DEFAULT_MULTIPLIER)
876 });
877 let quota =
878 governor::Quota::per_minute(NonZeroU32::new(resolved).unwrap_or(DEFAULT_PRE_AUTH_RATE));
879 Arc::new(BoundedKeyedLimiter::new(
880 quota,
881 config.max_tracked_keys,
882 config.idle_eviction,
883 ))
884}
885
886const PRE_AUTH_DEFAULT_MULTIPLIER: u32 = 10;
889
890const DEFAULT_PRE_AUTH_RATE: NonZeroU32 = NonZeroU32::new(300).unwrap();
894
895#[must_use]
900pub fn extract_mtls_identity(cert_der: &[u8], default_role: &str) -> Option<AuthIdentity> {
901 let (_, cert) = X509Certificate::from_der(cert_der).ok()?;
902
903 let cn = cert
905 .subject()
906 .iter_common_name()
907 .next()
908 .and_then(|attr| attr.as_str().ok())
909 .map(String::from);
910
911 let name = cn.or_else(|| {
913 cert.subject_alternative_name()
914 .ok()
915 .flatten()
916 .and_then(|san| {
917 #[allow(clippy::wildcard_enum_match_arm)]
918 san.value.general_names.iter().find_map(|gn| match gn {
919 GeneralName::DNSName(dns) => Some((*dns).to_owned()),
920 _ => None,
921 })
922 })
923 })?;
924
925 if !name
927 .chars()
928 .all(|c| c.is_alphanumeric() || matches!(c, '-' | '.' | '_' | '@'))
929 {
930 tracing::warn!(cn = %name, "mTLS identity rejected: invalid characters in CN/SAN");
931 return None;
932 }
933
934 Some(AuthIdentity {
935 name,
936 role: default_role.to_owned(),
937 method: AuthMethod::MtlsCertificate,
938 raw_token: None,
939 sub: None,
940 })
941}
942
943fn extract_bearer(value: &str) -> Option<&str> {
958 let (scheme, rest) = value.split_once(' ')?;
959 if scheme.eq_ignore_ascii_case("Bearer") {
960 let token = rest.trim_start_matches(' ');
961 if token.is_empty() { None } else { Some(token) }
962 } else {
963 None
964 }
965}
966
967#[must_use]
996pub fn verify_bearer_token(token: &str, keys: &[ApiKeyEntry]) -> Option<AuthIdentity> {
997 use subtle::ConstantTimeEq as _;
998
999 let now = chrono::Utc::now();
1000 let dummy_hash = PasswordHash::new(&DUMMY_PHC_HASH)
1001 .expect("DUMMY_PHC_HASH is a valid Argon2id PHC string by construction");
1002
1003 let mut matched_index: usize = usize::MAX;
1004 let mut any_match: u8 = 0;
1005
1006 for (idx, key) in keys.iter().enumerate() {
1007 let expired = key.expires_at.is_some_and(|exp| exp.as_datetime() < &now);
1008
1009 let real_hash = PasswordHash::new(&key.hash);
1010 let verify_against = match (&real_hash, expired, any_match) {
1011 (Ok(h), false, 0) => h,
1012 _ => &dummy_hash,
1013 };
1014
1015 let slot_ok = u8::from(
1016 Argon2::default()
1017 .verify_password(token.as_bytes(), verify_against)
1018 .is_ok(),
1019 );
1020
1021 let real_match = slot_ok & u8::from(!expired) & u8::from(real_hash.is_ok());
1022 let first_real_match = real_match & (1 - any_match);
1023 if first_real_match.ct_eq(&1).into() {
1024 matched_index = idx;
1025 }
1026 any_match |= real_match;
1027 }
1028
1029 if any_match == 0 {
1030 return None;
1031 }
1032 let key = keys.get(matched_index)?;
1033 Some(AuthIdentity {
1034 name: key.name.clone(),
1035 role: key.role.clone(),
1036 method: AuthMethod::BearerToken,
1037 raw_token: None,
1038 sub: None,
1039 })
1040}
1041
1042static DUMMY_PHC_HASH: LazyLock<String> = LazyLock::new(|| {
1050 let salt = SaltString::generate(&mut argon2::password_hash::rand_core::OsRng);
1051 Argon2::default()
1052 .hash_password(b"rmcp-server-kit-dummy", &salt)
1053 .expect("Argon2 default params hash a fixed plaintext")
1054 .to_string()
1055});
1056
1057pub fn generate_api_key() -> Result<(String, String), McpxError> {
1067 let mut token_bytes = [0u8; 32];
1068 rand::fill(&mut token_bytes);
1069 let token = URL_SAFE_NO_PAD.encode(token_bytes);
1070
1071 let mut salt_bytes = [0u8; 16];
1073 rand::fill(&mut salt_bytes);
1074 let salt = SaltString::encode_b64(&salt_bytes)
1075 .map_err(|e| McpxError::Auth(format!("salt encoding failed: {e}")))?;
1076 let hash = Argon2::default()
1077 .hash_password(token.as_bytes(), &salt)
1078 .map_err(|e| McpxError::Auth(format!("argon2id hashing failed: {e}")))?
1079 .to_string();
1080
1081 Ok((token, hash))
1082}
1083
1084fn build_www_authenticate_value(
1085 advertise_resource_metadata: bool,
1086 failure: AuthFailureClass,
1087) -> String {
1088 let (error, error_description) = failure.bearer_error();
1089 if advertise_resource_metadata {
1090 return format!(
1091 "Bearer resource_metadata=\"/.well-known/oauth-protected-resource\", error=\"{error}\", error_description=\"{error_description}\""
1092 );
1093 }
1094 format!("Bearer error=\"{error}\", error_description=\"{error_description}\"")
1095}
1096
1097fn auth_method_label(method: AuthMethod) -> &'static str {
1098 match method {
1099 AuthMethod::MtlsCertificate => "mTLS",
1100 AuthMethod::BearerToken => "bearer token",
1101 AuthMethod::OAuthJwt => "OAuth JWT",
1102 }
1103}
1104
1105#[cfg_attr(not(feature = "oauth"), allow(unused_variables))]
1106fn unauthorized_response(state: &AuthState, failure_class: AuthFailureClass) -> Response {
1107 #[cfg(feature = "oauth")]
1108 let advertise_resource_metadata = state.jwks_cache.is_some();
1109 #[cfg(not(feature = "oauth"))]
1110 let advertise_resource_metadata = false;
1111
1112 let challenge = build_www_authenticate_value(advertise_resource_metadata, failure_class);
1113 (
1114 axum::http::StatusCode::UNAUTHORIZED,
1115 [(header::WWW_AUTHENTICATE, challenge)],
1116 failure_class.response_body(),
1117 )
1118 .into_response()
1119}
1120
1121async fn authenticate_bearer_identity(
1122 state: &AuthState,
1123 token: &str,
1124) -> Result<AuthIdentity, AuthFailureClass> {
1125 let mut failure_class = AuthFailureClass::MissingCredential;
1126
1127 #[cfg(feature = "oauth")]
1128 if let Some(ref cache) = state.jwks_cache
1129 && crate::oauth::looks_like_jwt(token)
1130 {
1131 match cache.validate_token_with_reason(token).await {
1132 Ok(mut id) => {
1133 id.raw_token = Some(SecretString::from(token.to_owned()));
1134 return Ok(id);
1135 }
1136 Err(crate::oauth::JwtValidationFailure::Expired) => {
1137 failure_class = AuthFailureClass::ExpiredCredential;
1138 }
1139 Err(crate::oauth::JwtValidationFailure::Invalid) => {
1140 failure_class = AuthFailureClass::InvalidCredential;
1141 }
1142 }
1143 }
1144
1145 let token = token.to_owned();
1146 let keys = state.api_keys.load_full(); let identity = tokio::task::spawn_blocking(move || verify_bearer_token(&token, &keys))
1150 .await
1151 .ok()
1152 .flatten();
1153
1154 if let Some(id) = identity {
1155 return Ok(id);
1156 }
1157
1158 if failure_class == AuthFailureClass::MissingCredential {
1159 failure_class = AuthFailureClass::InvalidCredential;
1160 }
1161
1162 Err(failure_class)
1163}
1164
1165fn pre_auth_gate(state: &AuthState, peer_addr: Option<SocketAddr>) -> Option<Response> {
1176 let limiter = state.pre_auth_limiter.as_ref()?;
1177 let addr = peer_addr?;
1178 if limiter.check_key(&addr.ip()).is_ok() {
1179 return None;
1180 }
1181 state.counters.record_failure(AuthFailureClass::PreAuthGate);
1182 tracing::warn!(
1183 ip = %addr.ip(),
1184 "auth rate limited by pre-auth gate (request rejected before credential verification)"
1185 );
1186 Some(
1187 McpxError::RateLimited("too many unauthenticated requests from this source".into())
1188 .into_response(),
1189 )
1190}
1191
1192pub(crate) async fn auth_middleware(
1201 state: Arc<AuthState>,
1202 req: Request<Body>,
1203 next: Next,
1204) -> Response {
1205 let tls_info = req.extensions().get::<ConnectInfo<TlsConnInfo>>().cloned();
1210 let peer_addr = req
1211 .extensions()
1212 .get::<ConnectInfo<SocketAddr>>()
1213 .map(|ci| ci.0)
1214 .or_else(|| tls_info.as_ref().map(|ci| ci.0.addr));
1215
1216 if let Some(id) = tls_info.and_then(|ci| ci.0.identity) {
1223 state.log_auth(&id, "mTLS");
1224 let mut req = req;
1225 req.extensions_mut().insert(id);
1226 return next.run(req).await;
1227 }
1228
1229 if let Some(blocked) = pre_auth_gate(&state, peer_addr) {
1233 return blocked;
1234 }
1235
1236 let failure_class = if let Some(value) = req.headers().get(header::AUTHORIZATION) {
1237 match value.to_str().ok().and_then(extract_bearer) {
1238 Some(token) => match authenticate_bearer_identity(&state, token).await {
1239 Ok(id) => {
1240 state.log_auth(&id, auth_method_label(id.method));
1241 let mut req = req;
1242 req.extensions_mut().insert(id);
1243 return next.run(req).await;
1244 }
1245 Err(class) => class,
1246 },
1247 None => AuthFailureClass::InvalidCredential,
1248 }
1249 } else {
1250 AuthFailureClass::MissingCredential
1251 };
1252
1253 tracing::warn!(failure_class = %failure_class.as_str(), "auth failed");
1254
1255 if let (Some(limiter), Some(addr)) = (&state.rate_limiter, peer_addr)
1258 && limiter.check_key(&addr.ip()).is_err()
1259 {
1260 state.counters.record_failure(AuthFailureClass::RateLimited);
1261 tracing::warn!(ip = %addr.ip(), "auth rate limited after repeated failures");
1262 return McpxError::RateLimited("too many failed authentication attempts".into())
1263 .into_response();
1264 }
1265
1266 state.counters.record_failure(failure_class);
1267 unauthorized_response(&state, failure_class)
1268}
1269
1270#[cfg(test)]
1271mod tests {
1272 use super::*;
1273
1274 #[test]
1275 fn generate_and_verify_api_key() {
1276 let (token, hash) = generate_api_key().unwrap();
1277
1278 assert_eq!(token.len(), 43);
1280
1281 assert!(hash.starts_with("$argon2id$"));
1283
1284 let keys = vec![ApiKeyEntry {
1286 name: "test".into(),
1287 hash,
1288 role: "viewer".into(),
1289 expires_at: None,
1290 }];
1291 let id = verify_bearer_token(&token, &keys);
1292 assert!(id.is_some());
1293 let id = id.unwrap();
1294 assert_eq!(id.name, "test");
1295 assert_eq!(id.role, "viewer");
1296 assert_eq!(id.method, AuthMethod::BearerToken);
1297 }
1298
1299 #[test]
1300 fn wrong_token_rejected() {
1301 let (_token, hash) = generate_api_key().unwrap();
1302 let keys = vec![ApiKeyEntry {
1303 name: "test".into(),
1304 hash,
1305 role: "viewer".into(),
1306 expires_at: None,
1307 }];
1308 assert!(verify_bearer_token("wrong-token", &keys).is_none());
1309 }
1310
1311 #[test]
1312 fn expired_key_rejected() {
1313 let (token, hash) = generate_api_key().unwrap();
1314 let keys = vec![ApiKeyEntry {
1315 name: "test".into(),
1316 hash,
1317 role: "viewer".into(),
1318 expires_at: Some(RfcTimestamp::parse("2020-01-01T00:00:00Z").unwrap()),
1319 }];
1320 assert!(verify_bearer_token(&token, &keys).is_none());
1321 }
1322
1323 #[test]
1324 fn match_in_last_slot_still_authenticates() {
1325 let (token, hash) = generate_api_key().unwrap();
1326 let (_other_token, other_hash) = generate_api_key().unwrap();
1327 let keys = vec![
1328 ApiKeyEntry {
1329 name: "first".into(),
1330 hash: other_hash.clone(),
1331 role: "viewer".into(),
1332 expires_at: None,
1333 },
1334 ApiKeyEntry {
1335 name: "second".into(),
1336 hash: other_hash,
1337 role: "viewer".into(),
1338 expires_at: None,
1339 },
1340 ApiKeyEntry {
1341 name: "match".into(),
1342 hash,
1343 role: "ops".into(),
1344 expires_at: None,
1345 },
1346 ];
1347 let id = verify_bearer_token(&token, &keys).expect("last-slot match must authenticate");
1348 assert_eq!(id.name, "match");
1349 assert_eq!(id.role, "ops");
1350 }
1351
1352 #[test]
1353 fn expired_slot_before_valid_match_does_not_short_circuit() {
1354 let (token, hash) = generate_api_key().unwrap();
1355 let (_, other_hash) = generate_api_key().unwrap();
1356 let keys = vec![
1357 ApiKeyEntry {
1358 name: "expired".into(),
1359 hash: other_hash,
1360 role: "viewer".into(),
1361 expires_at: Some(RfcTimestamp::parse("2020-01-01T00:00:00Z").unwrap()),
1362 },
1363 ApiKeyEntry {
1364 name: "valid".into(),
1365 hash,
1366 role: "ops".into(),
1367 expires_at: None,
1368 },
1369 ];
1370 let id = verify_bearer_token(&token, &keys)
1371 .expect("valid slot following an expired slot must authenticate");
1372 assert_eq!(id.name, "valid");
1373 }
1374
1375 #[test]
1376 fn malformed_hash_slot_does_not_short_circuit() {
1377 let (token, hash) = generate_api_key().unwrap();
1378 let keys = vec![
1379 ApiKeyEntry {
1380 name: "broken".into(),
1381 hash: "this-is-not-a-phc-string".into(),
1382 role: "viewer".into(),
1383 expires_at: None,
1384 },
1385 ApiKeyEntry {
1386 name: "valid".into(),
1387 hash,
1388 role: "ops".into(),
1389 expires_at: None,
1390 },
1391 ];
1392 let id = verify_bearer_token(&token, &keys)
1393 .expect("valid slot following a malformed-hash slot must authenticate");
1394 assert_eq!(id.name, "valid");
1395 }
1396
1397 #[test]
1408 fn rfc_timestamp_parse_rejects_malformed() {
1409 for bad in [
1410 "not-a-date",
1411 "",
1412 "2025-13-01T00:00:00Z", "2025-01-32T00:00:00Z", "2025-01-01T00:00:00", "01/01/2025", "2025-01-01T25:00:00Z", ] {
1418 assert!(
1419 RfcTimestamp::parse(bad).is_err(),
1420 "RfcTimestamp::parse must reject {bad:?}"
1421 );
1422 }
1423 }
1424
1425 #[test]
1426 fn rfc_timestamp_parse_accepts_valid() {
1427 for good in [
1428 "2025-01-01T00:00:00Z",
1429 "2025-01-01T00:00:00+00:00",
1430 "2025-12-31T23:59:59-08:00",
1431 "2099-01-01T00:00:00.123456789Z",
1432 ] {
1433 assert!(
1434 RfcTimestamp::parse(good).is_ok(),
1435 "RfcTimestamp::parse must accept {good:?}"
1436 );
1437 }
1438 }
1439
1440 #[test]
1441 fn api_key_entry_deserialize_rejects_malformed_expires_at() {
1442 let toml = r#"
1447 name = "bad-key"
1448 hash = "$argon2id$v=19$m=19456,t=2,p=1$c2FsdA$h4sh"
1449 role = "viewer"
1450 expires_at = "not-a-date"
1451 "#;
1452 let result: Result<ApiKeyEntry, _> = toml::from_str(toml);
1453 assert!(
1454 result.is_err(),
1455 "deserialization must reject malformed expires_at"
1456 );
1457 }
1458
1459 #[test]
1460 fn api_key_entry_deserialize_accepts_valid_expires_at() {
1461 let toml = r#"
1462 name = "good-key"
1463 hash = "$argon2id$v=19$m=19456,t=2,p=1$c2FsdA$h4sh"
1464 role = "viewer"
1465 expires_at = "2099-01-01T00:00:00Z"
1466 "#;
1467 let entry: ApiKeyEntry = toml::from_str(toml).expect("valid RFC 3339 must deserialize");
1468 assert!(entry.expires_at.is_some());
1469 }
1470
1471 #[test]
1472 fn api_key_entry_deserialize_accepts_missing_expires_at() {
1473 let toml = r#"
1476 name = "eternal-key"
1477 hash = "$argon2id$v=19$m=19456,t=2,p=1$c2FsdA$h4sh"
1478 role = "viewer"
1479 "#;
1480 let entry: ApiKeyEntry = toml::from_str(toml).expect("missing expires_at must deserialize");
1481 assert!(entry.expires_at.is_none());
1482 }
1483
1484 #[test]
1485 fn try_with_expiry_rejects_malformed() {
1486 let entry = ApiKeyEntry::new("k", "hash", "viewer");
1487 assert!(entry.try_with_expiry("not-a-date").is_err());
1488 }
1489
1490 #[test]
1491 fn try_with_expiry_accepts_valid() {
1492 let entry = ApiKeyEntry::new("k", "hash", "viewer")
1493 .try_with_expiry("2099-01-01T00:00:00Z")
1494 .expect("valid RFC 3339 must be accepted");
1495 assert!(entry.expires_at.is_some());
1496 }
1497
1498 #[test]
1499 fn api_key_summary_serializes_expires_at_as_rfc3339() {
1500 let summary = ApiKeySummary {
1505 name: "k".into(),
1506 role: "viewer".into(),
1507 expires_at: Some(RfcTimestamp::parse("2030-01-01T00:00:00Z").unwrap()),
1508 };
1509 let json = serde_json::to_string(&summary).unwrap();
1510 assert!(
1511 json.contains(r#""expires_at":"2030-01-01T00:00:00+00:00""#),
1512 "wire format regressed: {json}"
1513 );
1514 }
1515
1516 #[test]
1517 fn future_expiry_accepted() {
1518 let (token, hash) = generate_api_key().unwrap();
1519 let keys = vec![ApiKeyEntry {
1520 name: "test".into(),
1521 hash,
1522 role: "viewer".into(),
1523 expires_at: Some(RfcTimestamp::parse("2099-01-01T00:00:00Z").unwrap()),
1524 }];
1525 assert!(verify_bearer_token(&token, &keys).is_some());
1526 }
1527
1528 #[test]
1529 fn multiple_keys_first_match_wins() {
1530 let (token, hash) = generate_api_key().unwrap();
1531 let keys = vec![
1532 ApiKeyEntry {
1533 name: "wrong".into(),
1534 hash: "$argon2id$v=19$m=19456,t=2,p=1$invalid$invalid".into(),
1535 role: "ops".into(),
1536 expires_at: None,
1537 },
1538 ApiKeyEntry {
1539 name: "correct".into(),
1540 hash,
1541 role: "deploy".into(),
1542 expires_at: None,
1543 },
1544 ];
1545 let id = verify_bearer_token(&token, &keys).unwrap();
1546 assert_eq!(id.name, "correct");
1547 assert_eq!(id.role, "deploy");
1548 }
1549
1550 #[test]
1551 fn rate_limiter_allows_within_quota() {
1552 let config = RateLimitConfig {
1553 max_attempts_per_minute: 5,
1554 pre_auth_max_per_minute: None,
1555 ..Default::default()
1556 };
1557 let limiter = build_rate_limiter(&config);
1558 let ip: IpAddr = "10.0.0.1".parse().unwrap();
1559
1560 for _ in 0..5 {
1562 assert!(limiter.check_key(&ip).is_ok());
1563 }
1564 assert!(limiter.check_key(&ip).is_err());
1566 }
1567
1568 #[test]
1569 fn rate_limiter_separate_ips() {
1570 let config = RateLimitConfig {
1571 max_attempts_per_minute: 2,
1572 pre_auth_max_per_minute: None,
1573 ..Default::default()
1574 };
1575 let limiter = build_rate_limiter(&config);
1576 let ip1: IpAddr = "10.0.0.1".parse().unwrap();
1577 let ip2: IpAddr = "10.0.0.2".parse().unwrap();
1578
1579 assert!(limiter.check_key(&ip1).is_ok());
1581 assert!(limiter.check_key(&ip1).is_ok());
1582 assert!(limiter.check_key(&ip1).is_err());
1583
1584 assert!(limiter.check_key(&ip2).is_ok());
1586 }
1587
1588 #[test]
1589 fn extract_mtls_identity_from_cn() {
1590 let mut params = rcgen::CertificateParams::new(vec!["test-client.local".into()]).unwrap();
1592 params.distinguished_name = rcgen::DistinguishedName::new();
1593 params
1594 .distinguished_name
1595 .push(rcgen::DnType::CommonName, "test-client");
1596 let cert = params
1597 .self_signed(&rcgen::KeyPair::generate().unwrap())
1598 .unwrap();
1599 let der = cert.der();
1600
1601 let id = extract_mtls_identity(der, "ops").unwrap();
1602 assert_eq!(id.name, "test-client");
1603 assert_eq!(id.role, "ops");
1604 assert_eq!(id.method, AuthMethod::MtlsCertificate);
1605 }
1606
1607 #[test]
1608 fn extract_mtls_identity_falls_back_to_san() {
1609 let mut params =
1611 rcgen::CertificateParams::new(vec!["san-only.example.com".into()]).unwrap();
1612 params.distinguished_name = rcgen::DistinguishedName::new();
1613 let cert = params
1615 .self_signed(&rcgen::KeyPair::generate().unwrap())
1616 .unwrap();
1617 let der = cert.der();
1618
1619 let id = extract_mtls_identity(der, "viewer").unwrap();
1620 assert_eq!(id.name, "san-only.example.com");
1621 assert_eq!(id.role, "viewer");
1622 }
1623
1624 #[test]
1625 fn extract_mtls_identity_invalid_der() {
1626 assert!(extract_mtls_identity(b"not-a-cert", "viewer").is_none());
1627 }
1628
1629 use axum::{
1632 body::Body,
1633 http::{Request, StatusCode},
1634 };
1635 use tower::ServiceExt as _;
1636
1637 fn auth_router(state: Arc<AuthState>) -> axum::Router {
1638 axum::Router::new()
1639 .route("/mcp", axum::routing::post(|| async { "ok" }))
1640 .layer(axum::middleware::from_fn(move |req, next| {
1641 let s = Arc::clone(&state);
1642 auth_middleware(s, req, next)
1643 }))
1644 }
1645
1646 fn test_auth_state(keys: Vec<ApiKeyEntry>) -> Arc<AuthState> {
1647 Arc::new(AuthState {
1648 api_keys: ArcSwap::new(Arc::new(keys)),
1649 rate_limiter: None,
1650 pre_auth_limiter: None,
1651 #[cfg(feature = "oauth")]
1652 jwks_cache: None,
1653 seen_identities: Mutex::new(HashSet::new()),
1654 counters: AuthCounters::default(),
1655 })
1656 }
1657
1658 #[tokio::test]
1659 async fn middleware_rejects_no_credentials() {
1660 let state = test_auth_state(vec![]);
1661 let app = auth_router(Arc::clone(&state));
1662 let req = Request::builder()
1663 .method(axum::http::Method::POST)
1664 .uri("/mcp")
1665 .body(Body::empty())
1666 .unwrap();
1667 let resp = app.oneshot(req).await.unwrap();
1668 assert_eq!(resp.status(), StatusCode::UNAUTHORIZED);
1669 let challenge = resp
1670 .headers()
1671 .get(header::WWW_AUTHENTICATE)
1672 .unwrap()
1673 .to_str()
1674 .unwrap();
1675 assert!(challenge.contains("error=\"invalid_request\""));
1676
1677 let counters = state.counters_snapshot();
1678 assert_eq!(counters.failure_missing_credential, 1);
1679 }
1680
1681 #[tokio::test]
1682 async fn middleware_accepts_valid_bearer() {
1683 let (token, hash) = generate_api_key().unwrap();
1684 let keys = vec![ApiKeyEntry {
1685 name: "test-key".into(),
1686 hash,
1687 role: "ops".into(),
1688 expires_at: None,
1689 }];
1690 let state = test_auth_state(keys);
1691 let app = auth_router(Arc::clone(&state));
1692 let req = Request::builder()
1693 .method(axum::http::Method::POST)
1694 .uri("/mcp")
1695 .header("authorization", format!("Bearer {token}"))
1696 .body(Body::empty())
1697 .unwrap();
1698 let resp = app.oneshot(req).await.unwrap();
1699 assert_eq!(resp.status(), StatusCode::OK);
1700
1701 let counters = state.counters_snapshot();
1702 assert_eq!(counters.success_bearer, 1);
1703 }
1704
1705 #[tokio::test]
1706 async fn middleware_rejects_wrong_bearer() {
1707 let (_token, hash) = generate_api_key().unwrap();
1708 let keys = vec![ApiKeyEntry {
1709 name: "test-key".into(),
1710 hash,
1711 role: "ops".into(),
1712 expires_at: None,
1713 }];
1714 let state = test_auth_state(keys);
1715 let app = auth_router(Arc::clone(&state));
1716 let req = Request::builder()
1717 .method(axum::http::Method::POST)
1718 .uri("/mcp")
1719 .header("authorization", "Bearer wrong-token-here")
1720 .body(Body::empty())
1721 .unwrap();
1722 let resp = app.oneshot(req).await.unwrap();
1723 assert_eq!(resp.status(), StatusCode::UNAUTHORIZED);
1724 let challenge = resp
1725 .headers()
1726 .get(header::WWW_AUTHENTICATE)
1727 .unwrap()
1728 .to_str()
1729 .unwrap();
1730 assert!(challenge.contains("error=\"invalid_token\""));
1731
1732 let counters = state.counters_snapshot();
1733 assert_eq!(counters.failure_invalid_credential, 1);
1734 }
1735
1736 #[tokio::test]
1737 async fn middleware_rate_limits() {
1738 let state = Arc::new(AuthState {
1739 api_keys: ArcSwap::new(Arc::new(vec![])),
1740 rate_limiter: Some(build_rate_limiter(&RateLimitConfig {
1741 max_attempts_per_minute: 1,
1742 pre_auth_max_per_minute: None,
1743 ..Default::default()
1744 })),
1745 pre_auth_limiter: None,
1746 #[cfg(feature = "oauth")]
1747 jwks_cache: None,
1748 seen_identities: Mutex::new(HashSet::new()),
1749 counters: AuthCounters::default(),
1750 });
1751 let app = auth_router(state);
1752
1753 let req = Request::builder()
1755 .method(axum::http::Method::POST)
1756 .uri("/mcp")
1757 .body(Body::empty())
1758 .unwrap();
1759 let resp = app.clone().oneshot(req).await.unwrap();
1760 assert_eq!(resp.status(), StatusCode::UNAUTHORIZED);
1761
1762 }
1767
1768 #[test]
1774 fn rate_limit_semantics_failed_only() {
1775 let config = RateLimitConfig {
1776 max_attempts_per_minute: 3,
1777 pre_auth_max_per_minute: None,
1778 ..Default::default()
1779 };
1780 let limiter = build_rate_limiter(&config);
1781 let ip: IpAddr = "192.168.1.100".parse().unwrap();
1782
1783 assert!(
1785 limiter.check_key(&ip).is_ok(),
1786 "failure 1 should be allowed"
1787 );
1788 assert!(
1789 limiter.check_key(&ip).is_ok(),
1790 "failure 2 should be allowed"
1791 );
1792 assert!(
1793 limiter.check_key(&ip).is_ok(),
1794 "failure 3 should be allowed"
1795 );
1796 assert!(
1797 limiter.check_key(&ip).is_err(),
1798 "failure 4 should be blocked"
1799 );
1800
1801 }
1810
1811 #[test]
1816 fn pre_auth_default_multiplier_is_10x() {
1817 let config = RateLimitConfig {
1818 max_attempts_per_minute: 5,
1819 pre_auth_max_per_minute: None,
1820 ..Default::default()
1821 };
1822 let limiter = build_pre_auth_limiter(&config);
1823 let ip: IpAddr = "10.0.0.1".parse().unwrap();
1824
1825 for i in 0..50 {
1827 assert!(
1828 limiter.check_key(&ip).is_ok(),
1829 "pre-auth attempt {i} (of expected 50) should be allowed under default 10x multiplier"
1830 );
1831 }
1832 assert!(
1834 limiter.check_key(&ip).is_err(),
1835 "pre-auth attempt 51 should be blocked (quota is 50, not unbounded)"
1836 );
1837 }
1838
1839 #[test]
1842 fn pre_auth_explicit_override_wins() {
1843 let config = RateLimitConfig {
1844 max_attempts_per_minute: 100, pre_auth_max_per_minute: Some(2), ..Default::default()
1847 };
1848 let limiter = build_pre_auth_limiter(&config);
1849 let ip: IpAddr = "10.0.0.2".parse().unwrap();
1850
1851 assert!(limiter.check_key(&ip).is_ok(), "attempt 1 allowed");
1852 assert!(limiter.check_key(&ip).is_ok(), "attempt 2 allowed");
1853 assert!(
1854 limiter.check_key(&ip).is_err(),
1855 "attempt 3 must be blocked (explicit override of 2 wins over 10x default of 1000)"
1856 );
1857 }
1858
1859 #[tokio::test]
1865 async fn pre_auth_gate_blocks_before_argon2_verification() {
1866 let (_token, hash) = generate_api_key().unwrap();
1867 let keys = vec![ApiKeyEntry {
1868 name: "test-key".into(),
1869 hash,
1870 role: "ops".into(),
1871 expires_at: None,
1872 }];
1873 let config = RateLimitConfig {
1874 max_attempts_per_minute: 100,
1875 pre_auth_max_per_minute: Some(1),
1876 ..Default::default()
1877 };
1878 let state = Arc::new(AuthState {
1879 api_keys: ArcSwap::new(Arc::new(keys)),
1880 rate_limiter: None,
1881 pre_auth_limiter: Some(build_pre_auth_limiter(&config)),
1882 #[cfg(feature = "oauth")]
1883 jwks_cache: None,
1884 seen_identities: Mutex::new(HashSet::new()),
1885 counters: AuthCounters::default(),
1886 });
1887 let app = auth_router(Arc::clone(&state));
1888 let peer: SocketAddr = "10.0.0.10:54321".parse().unwrap();
1889
1890 let mut req1 = Request::builder()
1893 .method(axum::http::Method::POST)
1894 .uri("/mcp")
1895 .header("authorization", "Bearer obviously-not-a-real-token")
1896 .body(Body::empty())
1897 .unwrap();
1898 req1.extensions_mut().insert(ConnectInfo(peer));
1899 let resp1 = app.clone().oneshot(req1).await.unwrap();
1900 assert_eq!(
1901 resp1.status(),
1902 StatusCode::UNAUTHORIZED,
1903 "first attempt: gate has quota, falls through to bearer auth which fails with 401"
1904 );
1905
1906 let mut req2 = Request::builder()
1909 .method(axum::http::Method::POST)
1910 .uri("/mcp")
1911 .header("authorization", "Bearer also-not-a-real-token")
1912 .body(Body::empty())
1913 .unwrap();
1914 req2.extensions_mut().insert(ConnectInfo(peer));
1915 let resp2 = app.oneshot(req2).await.unwrap();
1916 assert_eq!(
1917 resp2.status(),
1918 StatusCode::TOO_MANY_REQUESTS,
1919 "second attempt from same IP: pre-auth gate must reject with 429"
1920 );
1921
1922 let counters = state.counters_snapshot();
1923 assert_eq!(
1924 counters.failure_pre_auth_gate, 1,
1925 "exactly one request must have been rejected by the pre-auth gate"
1926 );
1927 assert_eq!(
1931 counters.failure_invalid_credential, 1,
1932 "bearer verification must run exactly once (only the un-gated first request)"
1933 );
1934 }
1935
1936 #[tokio::test]
1943 async fn pre_auth_gate_does_not_throttle_mtls() {
1944 let config = RateLimitConfig {
1945 max_attempts_per_minute: 100,
1946 pre_auth_max_per_minute: Some(1), ..Default::default()
1948 };
1949 let state = Arc::new(AuthState {
1950 api_keys: ArcSwap::new(Arc::new(vec![])),
1951 rate_limiter: None,
1952 pre_auth_limiter: Some(build_pre_auth_limiter(&config)),
1953 #[cfg(feature = "oauth")]
1954 jwks_cache: None,
1955 seen_identities: Mutex::new(HashSet::new()),
1956 counters: AuthCounters::default(),
1957 });
1958 let app = auth_router(Arc::clone(&state));
1959 let peer: SocketAddr = "10.0.0.20:54321".parse().unwrap();
1960 let identity = AuthIdentity {
1961 name: "cn=test-client".into(),
1962 role: "viewer".into(),
1963 method: AuthMethod::MtlsCertificate,
1964 raw_token: None,
1965 sub: None,
1966 };
1967 let tls_info = TlsConnInfo::new(peer, Some(identity));
1968
1969 for i in 0..3 {
1970 let mut req = Request::builder()
1971 .method(axum::http::Method::POST)
1972 .uri("/mcp")
1973 .body(Body::empty())
1974 .unwrap();
1975 req.extensions_mut().insert(ConnectInfo(tls_info.clone()));
1976 let resp = app.clone().oneshot(req).await.unwrap();
1977 assert_eq!(
1978 resp.status(),
1979 StatusCode::OK,
1980 "mTLS request {i} must succeed: pre-auth gate must not apply to mTLS callers"
1981 );
1982 }
1983
1984 let counters = state.counters_snapshot();
1985 assert_eq!(
1986 counters.failure_pre_auth_gate, 0,
1987 "pre-auth gate counter must remain at zero: mTLS bypasses the gate"
1988 );
1989 assert_eq!(
1990 counters.success_mtls, 3,
1991 "all three mTLS requests must have been counted as successful"
1992 );
1993 }
1994
1995 #[test]
2000 fn extract_bearer_accepts_canonical_case() {
2001 assert_eq!(extract_bearer("Bearer abc123"), Some("abc123"));
2002 }
2003
2004 #[test]
2005 fn extract_bearer_is_case_insensitive_per_rfc7235() {
2006 for header in &[
2010 "bearer abc123",
2011 "BEARER abc123",
2012 "BeArEr abc123",
2013 "bEaReR abc123",
2014 ] {
2015 assert_eq!(
2016 extract_bearer(header),
2017 Some("abc123"),
2018 "header {header:?} must parse as a Bearer token (RFC 7235 §2.1)"
2019 );
2020 }
2021 }
2022
2023 #[test]
2024 fn extract_bearer_rejects_other_schemes() {
2025 assert_eq!(extract_bearer("Basic dXNlcjpwYXNz"), None);
2026 assert_eq!(extract_bearer("Digest username=\"x\""), None);
2027 assert_eq!(extract_bearer("Token abc123"), None);
2028 }
2029
2030 #[test]
2031 fn extract_bearer_rejects_malformed() {
2032 assert_eq!(extract_bearer(""), None);
2034 assert_eq!(extract_bearer("Bearer"), None);
2035 assert_eq!(extract_bearer("Bearer "), None);
2036 assert_eq!(extract_bearer("Bearer "), None);
2037 }
2038
2039 #[test]
2040 fn extract_bearer_tolerates_extra_separator_whitespace() {
2041 assert_eq!(extract_bearer("Bearer abc123"), Some("abc123"));
2043 assert_eq!(extract_bearer("Bearer abc123"), Some("abc123"));
2044 }
2045
2046 #[test]
2052 fn auth_identity_debug_redacts_raw_token() {
2053 let id = AuthIdentity {
2054 name: "alice".into(),
2055 role: "admin".into(),
2056 method: AuthMethod::OAuthJwt,
2057 raw_token: Some(SecretString::from("super-secret-jwt-payload-xyz")),
2058 sub: Some("keycloak-uuid-2f3c8b".into()),
2059 };
2060 let dbg = format!("{id:?}");
2061
2062 assert!(dbg.contains("alice"), "name should be visible: {dbg}");
2064 assert!(dbg.contains("admin"), "role should be visible: {dbg}");
2065 assert!(dbg.contains("OAuthJwt"), "method should be visible: {dbg}");
2066
2067 assert!(
2069 !dbg.contains("super-secret-jwt-payload-xyz"),
2070 "raw_token must be redacted in Debug output: {dbg}"
2071 );
2072 assert!(
2073 !dbg.contains("keycloak-uuid-2f3c8b"),
2074 "sub must be redacted in Debug output: {dbg}"
2075 );
2076 assert!(
2077 dbg.contains("<redacted>"),
2078 "redaction marker missing: {dbg}"
2079 );
2080 }
2081
2082 #[test]
2083 fn auth_identity_debug_marks_absent_secrets() {
2084 let id = AuthIdentity {
2087 name: "viewer-key".into(),
2088 role: "viewer".into(),
2089 method: AuthMethod::BearerToken,
2090 raw_token: None,
2091 sub: None,
2092 };
2093 let dbg = format!("{id:?}");
2094 assert!(
2095 dbg.contains("<none>"),
2096 "absent secrets should be marked: {dbg}"
2097 );
2098 assert!(
2099 !dbg.contains("<redacted>"),
2100 "no <redacted> marker when secrets are absent: {dbg}"
2101 );
2102 }
2103
2104 #[test]
2105 fn api_key_entry_debug_redacts_hash() {
2106 let entry = ApiKeyEntry {
2107 name: "viewer-key".into(),
2108 hash: "$argon2id$v=19$m=19456,t=2,p=1$c2FsdHNhbHQ$h4sh3dPa55w0rd".into(),
2110 role: "viewer".into(),
2111 expires_at: Some(RfcTimestamp::parse("2030-01-01T00:00:00Z").unwrap()),
2112 };
2113 let dbg = format!("{entry:?}");
2114
2115 assert!(dbg.contains("viewer-key"));
2117 assert!(dbg.contains("viewer"));
2118 assert!(dbg.contains("2030-01-01T00:00:00+00:00"));
2119
2120 assert!(
2122 !dbg.contains("$argon2id$"),
2123 "argon2 hash leaked into Debug output: {dbg}"
2124 );
2125 assert!(
2126 !dbg.contains("h4sh3dPa55w0rd"),
2127 "hash digest leaked into Debug output: {dbg}"
2128 );
2129 assert!(
2130 dbg.contains("<redacted>"),
2131 "redaction marker missing: {dbg}"
2132 );
2133 }
2134
2135 #[test]
2146 fn auth_failure_class_as_str_exact_strings() {
2147 assert_eq!(
2148 AuthFailureClass::MissingCredential.as_str(),
2149 "missing_credential"
2150 );
2151 assert_eq!(
2152 AuthFailureClass::InvalidCredential.as_str(),
2153 "invalid_credential"
2154 );
2155 assert_eq!(
2156 AuthFailureClass::ExpiredCredential.as_str(),
2157 "expired_credential"
2158 );
2159 assert_eq!(AuthFailureClass::RateLimited.as_str(), "rate_limited");
2160 assert_eq!(AuthFailureClass::PreAuthGate.as_str(), "pre_auth_gate");
2161 }
2162
2163 #[test]
2164 fn auth_failure_class_response_body_exact_strings() {
2165 assert_eq!(
2166 AuthFailureClass::MissingCredential.response_body(),
2167 "unauthorized: missing credential"
2168 );
2169 assert_eq!(
2170 AuthFailureClass::InvalidCredential.response_body(),
2171 "unauthorized: invalid credential"
2172 );
2173 assert_eq!(
2174 AuthFailureClass::ExpiredCredential.response_body(),
2175 "unauthorized: expired credential"
2176 );
2177 assert_eq!(
2178 AuthFailureClass::RateLimited.response_body(),
2179 "rate limited"
2180 );
2181 assert_eq!(
2182 AuthFailureClass::PreAuthGate.response_body(),
2183 "rate limited (pre-auth)"
2184 );
2185 }
2186
2187 #[test]
2188 fn auth_failure_class_bearer_error_exact_strings() {
2189 assert_eq!(
2190 AuthFailureClass::MissingCredential.bearer_error(),
2191 (
2192 "invalid_request",
2193 "missing bearer token or mTLS client certificate"
2194 )
2195 );
2196 assert_eq!(
2197 AuthFailureClass::InvalidCredential.bearer_error(),
2198 ("invalid_token", "token is invalid")
2199 );
2200 assert_eq!(
2201 AuthFailureClass::ExpiredCredential.bearer_error(),
2202 ("invalid_token", "token is expired")
2203 );
2204 assert_eq!(
2205 AuthFailureClass::RateLimited.bearer_error(),
2206 ("invalid_request", "too many failed authentication attempts")
2207 );
2208 assert_eq!(
2209 AuthFailureClass::PreAuthGate.bearer_error(),
2210 (
2211 "invalid_request",
2212 "too many unauthenticated requests from this source"
2213 )
2214 );
2215 }
2216
2217 #[test]
2226 fn auth_config_summary_bearer_true_when_keys_present() {
2227 let (_token, hash) = generate_api_key().unwrap();
2228 let cfg = AuthConfig::with_keys(vec![ApiKeyEntry::new("k", hash, "viewer")]);
2229 let s = cfg.summary();
2230 assert!(s.enabled, "summary.enabled must reflect AuthConfig.enabled");
2231 assert!(
2232 s.bearer,
2233 "summary.bearer must be true when api_keys is non-empty (kills `!` deletion at L615)"
2234 );
2235 assert!(!s.mtls, "summary.mtls must be false when mtls is None");
2236 assert!(!s.oauth, "summary.oauth must be false when oauth is None");
2237 assert_eq!(s.api_keys.len(), 1);
2238 assert_eq!(s.api_keys[0].name, "k");
2239 assert_eq!(s.api_keys[0].role, "viewer");
2240 }
2241
2242 #[test]
2243 fn auth_config_summary_bearer_false_when_no_keys() {
2244 let cfg = AuthConfig::with_keys(vec![]);
2245 let s = cfg.summary();
2246 assert!(
2247 !s.bearer,
2248 "summary.bearer must be false when api_keys is empty (kills `!` deletion at L615)"
2249 );
2250 assert!(s.api_keys.is_empty());
2251 }
2252}