Skip to content

Reload MCP tokens without restart#18

Open
coe0718 wants to merge 2 commits intoghostwright:mainfrom
coe0718:mcp-token-reload
Open

Reload MCP tokens without restart#18
coe0718 wants to merge 2 commits intoghostwright:mainfrom
coe0718:mcp-token-reload

Conversation

@coe0718
Copy link
Copy Markdown
Contributor

@coe0718 coe0718 commented Mar 31, 2026

Fixes #16.

What changed

  • reload MCP bearer tokens from config/mcp.yaml when the file changes instead of freezing the token map at startup
  • use the same file-backed auth behavior for both /mcp and /trigger
  • update CLI output and MCP docs so they show a valid initialize request instead of a bare authenticated curl
  • add regression tests for middleware reloads, late-added MCP tokens, and late-added /trigger tokens

Why

Issue #16 exposed two separate problems on the MCP side:

  • phantom token create could write a valid token that the running server would still reject until restart
  • the docs and CLI examples implied that a bare curl -H "Authorization: Bearer ..." /mcp was a valid way to verify a token, even though the streamable HTTP transport requires an initialize request first

This PR fixes the runtime behavior and the guidance at the same time.

Validation

  • bun run lint
  • bun run typecheck
  • bun test

@coe0718 coe0718 marked this pull request as ready for review March 31, 2026 21:46
imonlinux added a commit to imonlinux/phantom that referenced this pull request Apr 24, 2026
Complete security review and implementation of fixes for Nextcloud Talk
integration based on comprehensive security audit findings.

HIGH PRIORITY fixes (security-critical):
- ghostwright#1: Implement replay attack protection with LRU cache (5-minute TTL)
- ghostwright#2: Add 64KB request size limit before body buffering
- ghostwright#4: Replace Date.now() with crypto.randomUUID() for unique IDs
- ghostwright#7: Fix JSON unwrap logic for ActivityStreams Note objects
- ghostwright#11: Replace 'Error:' text sniffing with runtime error events

Logic and security fixes:
- ghostwright#3: Fix msgId/msg name collision in error handling
- ghostwright#5: Improve parseConversationId to handle colons in tokens
- ghostwright#6: Reject webhooks without target.id instead of silent fallback
- ghostwright#8: Normalize emoji to avoid variation selector validation issues
- ghostwright#9: Handle 404/409 reaction responses as success conditions
- ghostwright#10: Make setReaction return boolean for proper error handling
- ghostwright#12: Improve bot loop guard with actorId checking

Best practices and polish:
- ghostwright#13: Make port configurable instead of hardcoded 3200
- ghostwright#14: Move webhookPath default normalization to constructor
- ghostwright#15: Fix health check path precedence (check webhook first)
- ghostwright#16: Add exponential backoff retry for 5xx/429 responses
- ghostwright#17: Add URL validation and encoding for talkServer config
- ghostwright#18: Document HMAC signing asymmetry (inbound vs outbound)
- ghostwright#20: Import randomUUID explicitly from node:crypto
- ghostwright#21: Add reactions: true to channel capabilities
- ghostwright#22: Namespace environment variables with NEXTCLOUD_ prefix

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Slack connection doesn't initialize properly and Claude Code tokens are invalid

2 participants