1ccddae692
Build Docker Image / build (push) Failing after 1m42s
Add Jwt__Algorithm config to choose between HS256 (shared symmetric key, existing behavior, default) and RS256 (Authority-based OIDC discovery, public-key auto-fetch with periodic refresh). RS256 mode makes the server compatible with any standard OAuth 2.1 / OIDC provider (Logto, ZITADEL, Keycloak, Auth0) without requiring a shared secret. HS256 mode remains the default for minimal self-built AS setups.
189 lines
7.6 KiB
Markdown
189 lines
7.6 KiB
Markdown
# gitea-mcp
|
|
|
|
Read-only access to a [Gitea](https://about.gitea.com/) instance over
|
|
[MCP (Model Context Protocol)](https://modelcontextprotocol.io/), gated by
|
|
OAuth-issued JWT bearer tokens.
|
|
|
|
The MCP server holds a single read-only Gitea Personal Access Token (PAT)
|
|
internally and never exposes it to the MCP client. Clients authenticate to
|
|
this server with an OAuth-issued JWT instead.
|
|
|
|
Two JWT signing modes are supported:
|
|
|
|
- **HS256** (default) — shared symmetric key between AS and this server. Use for self-built minimal AS.
|
|
- **RS256** — fetches JWKS automatically via OIDC discovery from `<Issuer>/.well-known/openid-configuration`. Use with any standard provider: [Logto](https://logto.io), [ZITADEL](https://zitadel.com), [Keycloak](https://www.keycloak.org), [Auth0](https://auth0.com), etc.
|
|
|
|
See [Choosing an AS](#choosing-an-as) below for setup guidance.
|
|
|
|
## Architecture
|
|
|
|
```
|
|
MCP client (Claude.ai, etc.)
|
|
│
|
|
│ ① GET /.well-known/oauth-authorization-server (RFC 8414)
|
|
│ ② OAuth Authorization Code + PKCE (against your AS)
|
|
│ ③ Bearer JWT (aud=gitea, scope=read:gitea)
|
|
│
|
|
▼
|
|
gitea-mcp /mcp
|
|
│ JWT verify (HS256, shared key with AS)
|
|
│ Bearer <GITEA_ADMIN_PAT> (held server-side, never leaves the process)
|
|
│
|
|
▼
|
|
Gitea REST API
|
|
```
|
|
|
|
## Tools
|
|
|
|
| Tool | Description |
|
|
|------|-------------|
|
|
| `list_repos` | List all repos visible to the PAT (personal + org, public + private) |
|
|
| `read_repo` | Repo metadata: topics, stars, default branch, mirror flag |
|
|
| `list_tree` | File tree at a ref (recursive optional, max 500 entries) |
|
|
| `read_file` | Raw file content (UTF-8, truncated at `MaxFileBytes`) |
|
|
| `search_code` | Code search via Gitea indexer (requires indexer enabled on the instance) |
|
|
| `list_branches` | Branch list + last commit per branch |
|
|
| `list_commits` | Recent commits with author + message |
|
|
| `read_commit` | Full commit details + per-file diff (max 50 files) |
|
|
| `list_issues` | Issues filtered by state (open/closed/all) |
|
|
| `read_issue` | Issue body + all comments |
|
|
| `list_pulls` | Pull requests filtered by state |
|
|
| `read_pull` | PR body + review comments + changed files |
|
|
| `list_orgs` | All organizations visible to the PAT |
|
|
| `read_org` | Org metadata |
|
|
| `list_packages` | Packages in registry by owner (container/generic/npm/...) |
|
|
| `read_package` | Package version metadata |
|
|
| `list_workflow_runs` | Gitea Actions workflow run history |
|
|
| `read_run_log` | Run details + job list + log (truncated at `MaxFileBytes`) |
|
|
|
|
All tools require a valid JWT with `scope=read:gitea`.
|
|
|
|
## Configuration
|
|
|
|
| Variable | Default | Required | Description |
|
|
|----------|---------|---|-------------|
|
|
| `Gitea__BaseUrl` | — | **yes** | Gitea root URL, no trailing slash |
|
|
| `Gitea__AdminPat` | — | **yes** | Gitea read-only PAT — see PAT setup below |
|
|
| `Gitea__RepoBlacklist` | *(empty)* | no | Comma-separated `owner/repo` pairs to hide |
|
|
| `Gitea__DefaultLimit` | `50` | no | Default page size for list operations |
|
|
| `Gitea__MaxFileBytes` | `1048576` | no | Max file/log read size in bytes (1MB) |
|
|
| `Jwt__Algorithm` | `HS256` | no | `HS256` or `RS256` |
|
|
| `Jwt__Issuer` | — | **yes** | Expected `iss` claim — your AS's issuer URL |
|
|
| `Jwt__Audience` | `gitea` | no | Expected `aud` claim |
|
|
| `Jwt__SigningKey__Current` | — | HS256 only | HS256 signing key, shared with your AS |
|
|
| `Jwt__SigningKey__Previous` | — | no | Previous HS256 key for rotation window |
|
|
| `Mcp__OAuthDiscovery__Issuer` | — | **yes** | `/.well-known` `issuer` field |
|
|
| `Mcp__OAuthDiscovery__AuthorizationEndpoint` | — | **yes** | Your AS's `/authorize` URL |
|
|
| `Mcp__OAuthDiscovery__TokenEndpoint` | — | **yes** | Your AS's `/token` URL |
|
|
| `Mcp__OAuthDiscovery__RegistrationEndpoint` | — | no | Your AS's `/register` URL (DCR) |
|
|
| `Mcp__OAuthDiscovery__ResourceUrl` | request host | no | RFC 9728 `resource` identifier |
|
|
| `ASPNETCORE_ENVIRONMENT` | `Production` | no | `Development` for verbose logs |
|
|
|
|
Configuration keys use the ASP.NET Core double-underscore convention for
|
|
nesting (`Jwt__SigningKey__Current` ⇔ `Jwt:SigningKey:Current`).
|
|
|
|
## PAT setup (Gitea → Settings → Applications)
|
|
|
|
Generate a token with **only these scopes** (principle of least privilege):
|
|
|
|
- `read:repository`
|
|
- `read:organization`
|
|
- `read:package`
|
|
- `read:issue`
|
|
- `read:user`
|
|
|
|
Do NOT grant `write:*` or `admin:*` scopes.
|
|
|
|
If the PAT is ever compromised: revoke in Gitea → generate a new one → update
|
|
`Gitea__AdminPat` env → restart the container.
|
|
|
|
## Local development
|
|
|
|
```bash
|
|
# 1. Restore and configure
|
|
dotnet restore
|
|
export Gitea__BaseUrl=https://gitea.example.com
|
|
export Gitea__AdminPat=<your read-only PAT>
|
|
export Jwt__Issuer=https://your-auth-server.example.com
|
|
export Jwt__SigningKey__Current=dev-secret-key-at-least-32-chars-long
|
|
export Mcp__OAuthDiscovery__Issuer=https://your-auth-server.example.com
|
|
export Mcp__OAuthDiscovery__AuthorizationEndpoint=https://your-auth-server.example.com/authorize
|
|
export Mcp__OAuthDiscovery__TokenEndpoint=https://your-auth-server.example.com/token
|
|
|
|
dotnet run
|
|
# Listens on http://localhost:5000
|
|
|
|
# 2. Generate a dev JWT
|
|
dotnet user-jwts create \
|
|
--issuer https://your-auth-server.example.com \
|
|
--audience gitea \
|
|
--name tester \
|
|
--claim sub=tester \
|
|
--claim scope=read:gitea
|
|
|
|
# 3. Test with MCP Inspector
|
|
npx @modelcontextprotocol/inspector
|
|
# Transport: Streamable HTTP
|
|
# URL: http://localhost:5000/mcp
|
|
# Bearer Token: <token from step 2>
|
|
|
|
# 4. Run unit tests
|
|
dotnet test gitea-mcp.Tests/
|
|
```
|
|
|
|
## Docker
|
|
|
|
```bash
|
|
docker build -t gitea-mcp .
|
|
|
|
docker run --rm -p 8080:8080 \
|
|
-e Gitea__BaseUrl=https://gitea.example.com \
|
|
-e Gitea__AdminPat=$GITEA_PAT \
|
|
-e Jwt__Issuer=https://your-auth-server.example.com \
|
|
-e Jwt__SigningKey__Current=$JWT_SIGNING_KEY \
|
|
-e Mcp__OAuthDiscovery__Issuer=https://your-auth-server.example.com \
|
|
-e Mcp__OAuthDiscovery__AuthorizationEndpoint=https://your-auth-server.example.com/authorize \
|
|
-e Mcp__OAuthDiscovery__TokenEndpoint=https://your-auth-server.example.com/token \
|
|
gitea-mcp
|
|
```
|
|
|
|
The included `.gitea/workflows/build-image.yml` builds and pushes the image
|
|
on every push to `main`. It expects these repository Variables / Secrets:
|
|
|
|
- `vars.REGISTRY` — registry hostname (e.g. `ghcr.io`)
|
|
- `vars.IMAGE_OWNER` — registry owner/namespace
|
|
- `secrets.PACKAGES_TOKEN` — registry push token
|
|
|
|
## Choosing an AS
|
|
|
|
Claude.ai chat enforces the full OAuth Authorization Code + PKCE flow against
|
|
your MCP server's `/.well-known/oauth-authorization-server` endpoint — there
|
|
is no bearer-token shortcut. Pick one of these paths:
|
|
|
|
**Hosted (fastest start, recommended for new setups)** — RS256 mode:
|
|
|
|
| Provider | Free tier | Notes |
|
|
|---|---|---|
|
|
| [Logto Cloud](https://logto.io) | 5000 MAU | Lightest, ~30 min setup |
|
|
| [ZITADEL Cloud](https://zitadel.com) | 25k auths/month | More featureful, slightly heavier docs |
|
|
|
|
Set `Jwt__Algorithm=RS256` and `Jwt__Issuer=<your-tenant-issuer-URL>`.
|
|
Public keys are fetched automatically from `<Issuer>/.well-known/openid-configuration`.
|
|
|
|
**Self-hosted, full-featured** — RS256 mode:
|
|
[Keycloak](https://www.keycloak.org), [ZITADEL](https://github.com/zitadel/zitadel), [Logto](https://github.com/logto-io/logto), [Authentik](https://goauthentik.io).
|
|
|
|
**Self-hosted, minimal** — HS256 mode:
|
|
Write your own ~500 LoC AS that issues HS256 JWTs with the right claims. The
|
|
MCP server's `Jwt__SigningKey__Current` and the AS's signing key must match.
|
|
|
|
**Required AS features regardless of choice:**
|
|
- OAuth 2.1 + PKCE (RFC 7636)
|
|
- Dynamic Client Registration (RFC 7591) — so Claude.ai can self-register
|
|
- `resource` parameter support (RFC 8707) — for audience-bound tokens
|
|
- Custom scope support (`read:gitea`)
|
|
|
|
## License
|
|
|
|
MIT
|