Add multi-user support - each API key gets own GeoGuessr session #5
No reviewers
Labels
No labels
bug
documentation
duplicate
enhancement
good first issue
help wanted
invalid
question
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: yvachot/GeoGuessrMCP#5
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "claude/add-mcp-authentication-01V5tbppGEtXc3tvjRGoTcfh"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Implements comprehensive multi-user support allowing multiple users to access the same MCP server instance with their own independent GeoGuessr accounts. Each API key now has its own session storage and context.
Multi-User Architecture
New Components
User Context System (src/geoguessr_mcp/auth/user_context.py):
Multi-User Session Manager (src/geoguessr_mcp/auth/multi_user_session.py):
Request Context (src/geoguessr_mcp/auth/request_context.py):
Updated Components
Authentication Middleware (src/geoguessr_mcp/middleware/auth.py):
Authentication Tools (src/geoguessr_mcp/tools/auth_tools.py):
GeoGuessr Client (src/geoguessr_mcp/api/geoguessr_client.py):
How It Works
Usage Example
Key Features
Documentation Updates
Technical Details
Pull Request
Description
Type of Change
Related Issues
Fixes #
Changes Made
Testing Performed
Test Details
Screenshots (if applicable)
Checklist
Additional Context
Breaking Changes
Performance Impact
By submitting this pull request, I confirm that my contribution is made under the terms of the MIT License.
⚠️ GitGuardian has uncovered 1 secret following the scan of your pull request.
Please consider investigating the findings and remediating the incidents. Failure to do so may lead to compromising the associated services or software components.
🔎 Detected hardcoded secret in your pull request
80ed791b01🛠 Guidelines to remediate hardcoded secrets
To avoid such incidents in the future consider
🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.