28f9a54ba9
把 Obsidian vault 通过 MCP 暴露给 Claude.ai,OAuth 走 nas-auth。 设计文档见 vault Coding/obsidian-mcp/obsidian-mcp 设计.md。 代码层落地参考 vault Coding/obsidian-mcp/MCP 实现指南.md。 V1+V2 同时实现(用户要求跳过分阶段直接全部): 读 Tools(需 scope=read:obsidian): - list_vault_tree(一次性 vault 地图,限制深度) - list_files / read_file(含 offset/limit 大文件分页) - search(子串匹配 + glob 过滤,最多 50 hits) - get_metadata(size / modified_at / has_frontmatter) 写 Tools(需 scope=write:obsidian): - write_file / append_file - 多重门禁:scope 校验 + 路径黑名单 + 写入白名单 + 永禁文件 - 永禁写:任意目录的 AGENTS.md / PROFILE.md / README.md / CLAUDE.md / 01-Secret/** - 白名单:02-ShengquGames/logs/ + Coding/ + NAS/NAS 待办清单.md - 写入审计日志按天 rotate(JSON line) 安全: - VaultPathResolver chroot:path traversal + symlink 双拒绝 - JwtBearer (HS256, Current+Previous fallback, MapInboundClaims=false) - aud=obsidian, iss=https://auth.zhengchentao.win - 黑名单:01-Secret / .obsidian / .trash / .git 技术栈: - .NET 10 + ModelContextProtocol SDK 1.0 - Streamable HTTP transport (POST /mcp) - JwtBearer 10.0 + IdentityModel.Tokens 8.x 部署: - Dockerfile multi-stage,runtime 装 ripgrep(V3 备用),non-root user - .gitea/workflows/build-image.yml:build + deploy 双 job,buildkit v0.13.2 - 容器内 :8080,宿主端口 9090 - 子域名 obs.zhengchentao.win - vault 挂载 /volume1/docker/webdav/data/Zhengchen:/vault:rw(V2 写入需要 rw) 测试:35/35 单测过(VaultPathResolver path traversal/blacklist/symlink + VaultWriteGuard whitelist/forbidden) Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
63 lines
2.3 KiB
C#
63 lines
2.3 KiB
C#
using Microsoft.AspNetCore.Authentication.JwtBearer;
|
|
using Microsoft.IdentityModel.Tokens;
|
|
using ObsidianMcp.Config;
|
|
using System.Text;
|
|
|
|
namespace ObsidianMcp.Auth;
|
|
|
|
public static class JwtBearerSetup
|
|
{
|
|
/// <summary>
|
|
/// 配置 HS256 JWT Bearer 认证。
|
|
/// 支持 Current + Previous 双密钥,方便密钥轮换过渡期。
|
|
/// </summary>
|
|
public static IServiceCollection AddObsidianJwtBearer(
|
|
this IServiceCollection services,
|
|
JwtOptions opts)
|
|
{
|
|
services
|
|
.AddAuthentication(JwtBearerDefaults.AuthenticationScheme)
|
|
.AddJwtBearer(options =>
|
|
{
|
|
// 关闭默认的入站 claim type 映射,否则 "sub"/"scope" 会被改写成
|
|
// ClaimTypes.NameIdentifier 之类的长 URI,下游 FindFirst("sub") 取不到。
|
|
options.MapInboundClaims = false;
|
|
|
|
options.TokenValidationParameters = new TokenValidationParameters
|
|
{
|
|
ValidateIssuer = true,
|
|
ValidIssuer = opts.Issuer,
|
|
|
|
ValidateAudience = true,
|
|
ValidAudience = opts.Audience,
|
|
|
|
ValidateIssuerSigningKey = true,
|
|
// Current 必须有值;Previous 可选(密钥轮换过渡期)。
|
|
// ToList 物化一次,避免每次验签都重建 SymmetricSecurityKey。
|
|
IssuerSigningKeys = BuildSigningKeys(opts).ToList(),
|
|
|
|
ValidateLifetime = true,
|
|
ClockSkew = TimeSpan.FromMinutes(2),
|
|
|
|
// scope claim 的 claim type 直接保持原样,User.FindAll("scope") 能取到。
|
|
NameClaimType = "sub",
|
|
};
|
|
});
|
|
|
|
return services;
|
|
}
|
|
|
|
private static IEnumerable<SecurityKey> BuildSigningKeys(JwtOptions opts)
|
|
{
|
|
if (string.IsNullOrWhiteSpace(opts.SigningKey.Current))
|
|
throw new InvalidOperationException("Jwt:SigningKey:Current 未配置,服务无法启动。");
|
|
|
|
yield return new SymmetricSecurityKey(
|
|
Encoding.UTF8.GetBytes(opts.SigningKey.Current));
|
|
|
|
if (!string.IsNullOrWhiteSpace(opts.SigningKey.Previous))
|
|
yield return new SymmetricSecurityKey(
|
|
Encoding.UTF8.GetBytes(opts.SigningKey.Previous));
|
|
}
|
|
}
|