Skip to main content

MCP server for CloudSense package upgrade assessment, analysis, and impact verification.

Project description

CloudSense Upgrade Compass

MCP server for CloudSense package upgrade assessment, analysis, and impact verification.

What it does

Given a Salesforce org with CloudSense packages installed, this MCP server:

  1. Discovers installed packages and their versions
  2. Pulls customer metadata (Apex, LWC, Aura, objects, flows, etc.)
  3. Clones CloudSense package repos for from-version and to-version
  4. Runs package diff analysis (breaking changes, new features, bug fixes)
  5. Analyzes customer codebase impact (which customer files reference changed APIs)
  6. Verifies API compatibility (signature-level SAFE/BREAKING verdicts)
  7. Maps test coverage gaps (which impacted files lack test coverage)
  8. Generates a comprehensive upgrade report with phasing, effort, and risk

Prerequisites

  • Python 3.10+
  • Salesforce CLI (sf) installed
  • GitHub CLI (gh) installed or SSH keys configured

Installation

# Via uvx (recommended)
uvx cloudsense-upgrade-compass

# Or install locally for development
uv pip install -e ".[dev]"

Configuration

Cursor IDE

Go to Settings > MCP Servers and add:

{
  "mcpServers": {
    "cloudsense-upgrade-compass": {
      "command": "uvx",
      "args": ["cloudsense-upgrade-compass"]
    }
  }
}

Claude CLI (terminal)

claude mcp add cloudsense-upgrade-compass -- uvx cloudsense-upgrade-compass

Claude Desktop

Add to ~/Library/Application Support/Claude/claude_desktop_config.json:

{
  "mcpServers": {
    "cloudsense-upgrade-compass": {
      "command": "uvx",
      "args": ["cloudsense-upgrade-compass"]
    }
  }
}

Available Tools

Tool Description
init_assessment Initialize upgrade assessment project. Creates SFDX project, validates prerequisites (sf CLI, GitHub access), checks org authorization, detects production vs sandbox.
get_installed_packages Discover all installed packages in the org. Identifies CloudSense packages, flags cloud service dependencies (CSPOFA, cscfga, csslm), writes installed-packages.json.
get_customer_metadata Pull customer metadata (Apex, LWC, Aura, VF, objects, flows, validation rules, static resources, permissions) from the org. Adaptive batching handles 10K file limit via binary split.
get_managed_package_objects Retrieve CS managed package objects (__c, __mdt) that wildcard retrieval misses. Discovers via sf sobject list, excludes ChangeEvent/History/Share/Feed, retrieves in adaptive batches.
get_package_repo_mapping Maps installed CS packages to their GitHub source repos. Parses cloudsense.map and .gitmodules from the main cloudsense repo, cross-references with installed packages. Supports local repo path to skip cloning.

Development

# Clone and install
git clone <repo-url>
cd cloudsense-upgrade-compass
uv venv
source .venv/bin/activate
uv pip install -e ".[dev]"

# Run tests
pytest

# Run server locally
python -m cloudsense_upgrade_compass.server

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

cloudsense_upgrade_compass-0.6.0.tar.gz (24.9 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

cloudsense_upgrade_compass-0.6.0-py3-none-any.whl (35.1 kB view details)

Uploaded Python 3

File details

Details for the file cloudsense_upgrade_compass-0.6.0.tar.gz.

File metadata

File hashes

Hashes for cloudsense_upgrade_compass-0.6.0.tar.gz
Algorithm Hash digest
SHA256 46803e9783e83b0b22b773b8f1f72a45d802248c551b2ac10766f3dc6513e7a2
MD5 34adb2e71ad2f1a1125572132a4b2b0a
BLAKE2b-256 bd0be7fe1ffa77fbc29034d9a30627c575ccde23f933abf5e14b7f27d26aabfb

See more details on using hashes here.

File details

Details for the file cloudsense_upgrade_compass-0.6.0-py3-none-any.whl.

File metadata

File hashes

Hashes for cloudsense_upgrade_compass-0.6.0-py3-none-any.whl
Algorithm Hash digest
SHA256 7f3f3de849dda5b95d8bdc99efcff942092d7340cb8b131209da91c0238b26ac
MD5 7c5e98fb39021ce8315ec1e778a98640
BLAKE2b-256 9661e71ed7e5eb6aeca46d4282bb08c0d1874f833a511fe3b478c5a5c860ddab

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page