-
Notifications
You must be signed in to change notification settings - Fork 5
Expand file tree
/
Copy path.env.example
More file actions
45 lines (37 loc) · 1.41 KB
/
.env.example
File metadata and controls
45 lines (37 loc) · 1.41 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
# MCP Server Configuration
MCP_SERVER_NAME=Solr Search
MCP_SERVER_PORT=8765
# Apache Solr Configuration
SOLR_BASE_URL=http://localhost:8983/solr
SOLR_COLLECTION=documents
SOLR_USERNAME=
SOLR_PASSWORD=
# OAuth 2.1 Configuration (MCP Spec 2025-06-18)
# Set ENABLE_OAUTH=true to enable OAuth authentication
ENABLE_OAUTH=false
OAUTH_PROVIDER=keycloak
# Keycloak Configuration
# Used when ENABLE_OAUTH=true and OAUTH_PROVIDER=keycloak
KEYCLOAK_URL=http://localhost:8080
KEYCLOAK_REALM=solr-mcp
KEYCLOAK_CLIENT_ID=solr-search-server
KEYCLOAK_CLIENT_SECRET=your-client-secret-from-keycloak
# OAuth Scopes
# Comma-separated list of required scopes
OAUTH_SCOPES=solr:search,solr:read
# OAuth Server-Side Token Retrieval (Optional)
# If enabled, the MCP server will automatically retrieve and refresh OAuth tokens
# This allows users to use the server without manually providing access_token
OAUTH_AUTO_REFRESH=true
OAUTH_USERNAME=testuser
OAUTH_PASSWORD=testpassword
# Token Validation
# Endpoints for token validation (auto-configured from KEYCLOAK_URL and KEYCLOAK_REALM)
TOKEN_VALIDATION_ENDPOINT=${KEYCLOAK_URL}/realms/${KEYCLOAK_REALM}/protocol/openid-connect/token/introspect
JWKS_ENDPOINT=${KEYCLOAK_URL}/realms/${KEYCLOAK_REALM}/protocol/openid-connect/certs
# Legacy JWT Configuration (deprecated, use OAuth 2.1 instead)
JWT_SECRET_KEY=your_jwt_secret_key
JWT_ALGORITHM=HS256
JWT_EXPIRATION_MINUTES=1440 # 24 hours
# Logging
LOG_LEVEL=INFO