Skip to main content

OAuthConfig

Struct OAuthConfig 

Source
#[non_exhaustive]
pub struct OAuthConfig { pub issuer: String, pub audience: String, pub jwks_uri: String, pub scopes: Vec<ScopeMapping>, pub role_claim: Option<String>, pub role_mappings: Vec<RoleMapping>, pub jwks_cache_ttl: String, pub proxy: Option<OAuthProxyConfig>, pub token_exchange: Option<TokenExchangeConfig>, pub ca_cert_path: Option<PathBuf>, pub allow_http_oauth_urls: bool, pub max_jwks_keys: usize, }
Expand description

OAuth 2.1 JWT configuration.

Fields (Non-exhaustive)§

This struct is marked as non-exhaustive
Non-exhaustive structs could have additional fields added in future. Therefore, non-exhaustive structs cannot be constructed in external crates using the traditional Struct { .. } syntax; cannot be matched against without a wildcard ..; and struct update syntax will not work.
§issuer: String

Token issuer (iss claim). Must match exactly.

§audience: String

Expected audience (aud claim). Must match exactly.

§jwks_uri: String

JWKS endpoint URL (e.g. https://auth.example.com/.well-known/jwks.json).

§scopes: Vec<ScopeMapping>

Scope-to-role mappings. First matching scope wins. Used when role_claim is absent (default behavior).

§role_claim: Option<String>

JWT claim path to extract roles from (dot-notation for nested claims).

Examples: "scope" (default), "roles", "realm_access.roles". When set, the claim value is matched against role_mappings instead of scopes. Supports both space-separated strings and JSON arrays.

§role_mappings: Vec<RoleMapping>

Claim-value-to-role mappings. Used when role_claim is set. First matching value wins.

§jwks_cache_ttl: String

How long to cache JWKS keys before re-fetching. Parsed as a humantime duration (e.g. “10m”, “1h”). Default: “10m”.

§proxy: Option<OAuthProxyConfig>

OAuth proxy configuration. When set, the server exposes /authorize, /token, and /register endpoints that proxy to the upstream identity provider (e.g. Keycloak).

§token_exchange: Option<TokenExchangeConfig>

Token exchange configuration (RFC 8693). When set, the server can exchange an inbound MCP-scoped access token for a downstream API-scoped access token via the authorization server’s token endpoint.

§ca_cert_path: Option<PathBuf>

Optional path to a PEM CA bundle for OAuth-bound HTTP traffic. Added to the system/built-in roots, not a replacement.

Scope (since 1.2.1). When the OauthHttpClient is constructed via OauthHttpClient::with_config (preferred), this CA bundle is honoured by every OAuth-bound HTTP request: the JWKS key fetch, token exchange, introspection, revocation, and the OAuth proxy handlers. Application crates may auto-populate this from their own configuration (e.g. an upstream-API CA path); any application-owned HTTP clients outside the kit must still configure their own CA trust separately. The deprecated OauthHttpClient::new no-arg constructor cannot honour this field – migrate to OauthHttpClient::with_config for full coverage.

§allow_http_oauth_urls: bool

Allow plain-HTTP (non-TLS) URLs for OAuth endpoints (jwks_uri, proxy.authorize_url, proxy.token_url, proxy.introspection_url, proxy.revocation_url, token_exchange.token_url).

Default: false. Strongly discouraged in production: a network-positioned attacker can MITM JWKS responses and substitute signing keys (forging arbitrary tokens), or MITM the token / proxy endpoints to steal credentials and codes. Enable only for development against a local IdP without TLS, ideally bound to 127.0.0.1. JWKS-cache redirects to non-HTTPS targets are still rejected even when this flag is true.

§max_jwks_keys: usize

Maximum number of keys accepted from a JWKS refresh response. Requests returning more keys than this are rejected fail-closed (cache remains empty / unchanged). Default: 256.

Implementations§

Source§

impl OAuthConfig

Source

pub fn builder( issuer: impl Into<String>, audience: impl Into<String>, jwks_uri: impl Into<String>, ) -> OAuthConfigBuilder

Start building an OAuthConfig with the three required fields.

All other fields default to the same values as OAuthConfig::default (empty scopes/role mappings, no proxy or token exchange, a JWKS cache TTL of 10m).

Source

pub fn validate(&self) -> Result<(), McpxError>

Validate the URL fields against the HTTPS-only policy.

Each of jwks_uri, proxy.authorize_url, proxy.token_url, proxy.introspection_url, proxy.revocation_url, and token_exchange.token_url is parsed and its scheme checked.

Schemes other than https are rejected unless OAuthConfig::allow_http_oauth_urls is true, in which case http is also permitted (parse failures and other schemes are always rejected).

§Errors

Returns crate::error::McpxError::Config when any field fails to parse or violates the scheme policy.

Trait Implementations§

Source§

impl Clone for OAuthConfig

Source§

fn clone(&self) -> OAuthConfig

Returns a duplicate of the value. Read more
1.0.0 · Source§

fn clone_from(&mut self, source: &Self)

Performs copy-assignment from source. Read more
Source§

impl Debug for OAuthConfig

Source§

fn fmt(&self, f: &mut Formatter<'_>) -> Result

Formats the value using the given formatter. Read more
Source§

impl Default for OAuthConfig

Source§

fn default() -> Self

Returns the “default value” for a type. Read more
Source§

impl<'de> Deserialize<'de> for OAuthConfig

Source§

fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>
where __D: Deserializer<'de>,

Deserialize this value from the given Serde deserializer. Read more

Auto Trait Implementations§

Blanket Implementations§

Source§

impl<T> Any for T
where T: 'static + ?Sized,

Source§

fn type_id(&self) -> TypeId

Gets the TypeId of self. Read more
Source§

impl<'a, T, E> AsTaggedExplicit<'a, E> for T
where T: 'a,

Source§

fn explicit(self, class: Class, tag: u32) -> TaggedParser<'a, Explicit, Self, E>

Source§

impl<'a, T, E> AsTaggedImplicit<'a, E> for T
where T: 'a,

Source§

fn implicit( self, class: Class, constructed: bool, tag: u32, ) -> TaggedParser<'a, Implicit, Self, E>

Source§

impl<T> Borrow<T> for T
where T: ?Sized,

Source§

fn borrow(&self) -> &T

Immutably borrows from an owned value. Read more
Source§

impl<T> BorrowMut<T> for T
where T: ?Sized,

Source§

fn borrow_mut(&mut self) -> &mut T

Mutably borrows from an owned value. Read more
Source§

impl<T> CloneToUninit for T
where T: Clone,

Source§

unsafe fn clone_to_uninit(&self, dest: *mut u8)

🔬This is a nightly-only experimental API. (clone_to_uninit)
Performs copy-assignment from self to dest. Read more
Source§

impl<T> DynClone for T
where T: Clone,

Source§

fn __clone_box(&self, _: Private) -> *mut ()

Source§

impl<T> From<T> for T

Source§

fn from(t: T) -> T

Returns the argument unchanged.

Source§

impl<T> FromRef<T> for T
where T: Clone,

Source§

fn from_ref(input: &T) -> T

Converts to this type from a reference to the input type.
Source§

impl<T> Instrument for T

Source§

fn instrument(self, span: Span) -> Instrumented<Self>

Instruments this type with the provided Span, returning an Instrumented wrapper. Read more
Source§

fn in_current_span(self) -> Instrumented<Self>

Instruments this type with the current Span, returning an Instrumented wrapper. Read more
Source§

impl<T, U> Into<U> for T
where U: From<T>,

Source§

fn into(self) -> U

Calls U::from(self).

That is, this conversion is whatever the implementation of From<T> for U chooses to do.

Source§

impl<T> PolicyExt for T
where T: ?Sized,

Source§

fn and<P, B, E>(self, other: P) -> And<T, P>
where T: Policy<B, E>, P: Policy<B, E>,

Create a new Policy that returns Action::Follow only if self and other return Action::Follow. Read more
Source§

fn or<P, B, E>(self, other: P) -> Or<T, P>
where T: Policy<B, E>, P: Policy<B, E>,

Create a new Policy that returns Action::Follow if either self or other returns Action::Follow. Read more
Source§

impl<T> Same for T

Source§

type Output = T

Should always be Self
Source§

impl<T> ToOwned for T
where T: Clone,

Source§

type Owned = T

The resulting type after obtaining ownership.
Source§

fn to_owned(&self) -> T

Creates owned data from borrowed data, usually by cloning. Read more
Source§

fn clone_into(&self, target: &mut T)

Uses borrowed data to replace owned data, usually by cloning. Read more
Source§

impl<T, U> TryFrom<U> for T
where U: Into<T>,

Source§

type Error = Infallible

The type returned in the event of a conversion error.
Source§

fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>

Performs the conversion.
Source§

impl<T, U> TryInto<U> for T
where U: TryFrom<T>,

Source§

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.
Source§

fn try_into(self) -> Result<U, <U as TryFrom<T>>::Error>

Performs the conversion.
Source§

impl<V, T> VZip<V> for T
where V: MultiLane<T>,

Source§

fn vzip(self) -> V

Source§

impl<T> WithSubscriber for T

Source§

fn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self>
where S: Into<Dispatch>,

Attaches the provided Subscriber to this type, returning a WithDispatch wrapper. Read more
Source§

fn with_current_subscriber(self) -> WithDispatch<Self>

Attaches the current default Subscriber to this type, returning a WithDispatch wrapper. Read more
Source§

impl<T> DeserializeOwned for T
where T: for<'de> Deserialize<'de>,

Source§

impl<A, B, T> HttpServerConnExec<A, B> for T
where B: Body,