EasyDeploy AI MCP server — REST API tools for Claude and other MCP clients
Project description
EasyDeploy AI MCP (easydeploy-ai-mcp)
A Model Context Protocol (MCP) server that exposes the EasyDeploy public REST API as tools for Claude, Cursor, Claude Code, and other MCP clients.
PyPI package name: easydeploy-ai-mcp · Import package: easydeploy_ai_mcp
Contents
- Connect with Claude
- What you get
- Requirements
- Install
- Environment variables
- Local MCP (stdio)
- Remote MCP (HTTP)
- Documentation
- REST API reference
- Releases and API compatibility
- Development
- Security
- License
Connect with Claude
Option A — Hosted connector (zero setup)
The fastest way to use EasyDeploy AI tools in Claude. No installation required.
- Open Claude (web at claude.ai or Claude Desktop).
- Go to Settings → Connectors → Add custom connector.
- Fill in the form:
- Name:
EasyDeploy AI - URL:
https://mcp.easydeploy.ai/mcp
- Name:
- Complete the OAuth sign-in flow when prompted. Claude will redirect you to EasyDeploy to authenticate with your account.
- Save the connector. EasyDeploy tools will appear in your Claude sessions.
Note: The hosted connector uses OAuth — you sign in with your EasyDeploy account; no API key needs to be pasted into Claude.
Option B — Self-hosted (local stdio)
Run the MCP server on your own machine using your EasyDeploy API key. Nothing is exposed to the internet.
1. Install
pip install easydeploy-ai-mcp
2. Add to Claude Desktop config
Edit (or create) the Claude Desktop config file:
| OS | Path |
|---|---|
| macOS | ~/Library/Application Support/Claude/claude_desktop_config.json |
| Windows | %APPDATA%\Claude\claude_desktop_config.json |
Merge the following into the root of that JSON (keep any existing keys):
{
"mcpServers": {
"EasyDeploy AI": {
"command": "easydeploy-ai-mcp-stdio",
"env": {
"EDA_API_KEY": "eda_live_YOUR_KEY"
}
}
}
}
Replace eda_live_YOUR_KEY with your key from Account → API Keys in the EasyDeploy dashboard. Use the full path to easydeploy-ai-mcp-stdio (run which easydeploy-ai-mcp-stdio to find it) if Claude cannot locate it on your PATH.
3. Restart Claude Desktop
Fully quit and reopen the app. EasyDeploy AI will appear in your MCP servers.
For self-hosting on Docker or a cloud provider, see Remote MCP (HTTP).
What you get
- 24 tools covering projects, datasets (including upload flow), model versions, training jobs, predictions, and account status.
- stdio transport for local clients, or HTTP with Streamable MCP on
/mcpand GET /healthz for load balancers. - Hardening: HTTPS-only calls to the EasyDeploy API; optional
MCP_SERVICE_TOKENfor the HTTP MCP surface; response fields trimmed where appropriate for agents.
For production and SOC 2–sensitive setups, prefer self-hosting so your data stays within your own infrastructure. The hosted connector at https://mcp.easydeploy.ai/mcp is fine for most users.
Requirements
- Python 3.10+
- An EasyDeploy API key from the dashboard (Account → API Keys). The client uses the production EasyDeploy API host by default.
Install
From PyPI (after first release)
pip install easydeploy-ai-mcp
From source
git clone https://github.com/easydeploy-ai/easydeploy-ai-mcp.git
cd easydeploy-ai-mcp
pip install -e ".[dev]" # includes pytest
# or minimal runtime only:
pip install .
Environment variables
| Variable | Required | Description |
|---|---|---|
EDA_API_KEY |
stdio / legacy HTTP | Required for stdio and legacy HTTP (no OAuth). Not used for outbound API calls when EDA_OAUTH_ENABLED=1 — each MCP request must include Authorization: Bearer <JWT or eda_live_…>. |
EDA_API_BASE |
No | Overrides the default production API (https://api.easydeploy.ai). Set only when targeting a non-production endpoint. Trailing /v1 is optional. |
EDA_UI_BASE_URL |
No | Prefix for ui_url fields (default https://easydeploy.ai). |
MCP_SERVICE_TOKEN |
No | Legacy single-tenant gate. If set, HTTP mode requires Authorization: Bearer <token> for /mcp (not for GET /healthz). Mutually exclusive with EDA_OAUTH_ENABLED. |
EDA_OAUTH_ENABLED |
No | Set to 1 to run the HTTP transport as an OAuth 2.0 resource server. Requires EDA_COGNITO_USER_POOL_ID and EDA_COGNITO_CLIENT_ID. See Remote MCP (HTTP). |
EDA_COGNITO_USER_POOL_ID |
OAuth | Cognito user pool that issues access tokens for the EasyDeploy API. |
EDA_COGNITO_CLIENT_ID |
OAuth | App client ID expected in the access token's client_id claim. |
EDA_COGNITO_REGION |
No | AWS region for the user pool (default us-east-1). |
EDA_REPORT_MAX_WAIT_SECONDS |
No | get_model_report poll budget (default 300). |
EDA_REPORT_POLL_INTERVAL_SECONDS |
No | Poll interval in seconds (default 10). |
HOST / PORT |
No | HTTP bind (defaults 0.0.0.0 / 8080). |
EDA_TRUST_FORWARDED_HEADERS |
No | Set to 1 behind ALB/reverse proxy so RFC 9728 resource uses https (trusts X-Forwarded-Proto). |
EDA_MCP_OAUTH_ISSUER |
No | Public MCP base URL (no path) for authorization_servers and proxy /.well-known/oauth-authorization-server issuer. Default: request origin. Use if Host / X-Forwarded-Proto are wrong behind a proxy. |
Local MCP (stdio)
Use when the client starts the server as a subprocess (Claude Desktop, Cursor, etc.).
export EDA_API_KEY="eda_live_..."
easydeploy-ai-mcp-stdio
Or: python -m easydeploy_ai_mcp
Example config snippet:
{
"mcpServers": {
"easydeploy-ai": {
"command": "easydeploy-ai-mcp-stdio",
"env": {
"EDA_API_KEY": "eda_live_..."
}
}
}
}
Remote MCP (HTTP)
Serves Streamable HTTP via FastMCP on /mcp (confirm with your pinned FastMCP 3.x version). Health checks: GET /healthz.
export EDA_API_KEY="eda_live_..."
easydeploy-ai-mcp-http
Or: uvicorn easydeploy_ai_mcp.http_main:app --host 0.0.0.0 --port 8080
If you embed mcp.http_app() in another ASGI app, pass through lifespan from the FastMCP HTTP app (FastMCP ASGI); easydeploy_ai_mcp.http_main already does this for uvicorn.
Auth modes
Pick exactly one (setting both EDA_OAUTH_ENABLED and MCP_SERVICE_TOKEN raises at import):
- OAuth 2.0 resource server (multi-tenant): set
EDA_OAUTH_ENABLED=1plusEDA_COGNITO_USER_POOL_IDandEDA_COGNITO_CLIENT_ID. Install the optional extra:pip install easydeploy-ai-mcp[oauth]. The server validates incoming Cognito access JWTs locally against the Cognito JWKS (issuer, signature,exp,token_use=='access',client_id) and forwards the token to the EasyDeploy API. EasyDeploy API keys (prefixeda_live_) are accepted in the sameAuthorization: Bearerheader and forwarded as-is — the API is the source of truth for revocation. RFC 9728 metadata is published at/.well-known/oauth-protected-resource; RFC 8414 proxy metadata includesregistration_endpoint, andPOST /oauth/registerreturns the static Cognito MCPEDA_COGNITO_CLIENT_ID(RFC 7591-style, public client). 401 responses includeWWW-Authenticate: Bearer …so MCP clients can discover the auth server. Note: Cognito access tokens carryclient_id, notaud; do not configure an audience. - Shared-secret gate (legacy single-tenant): set
MCP_SERVICE_TOKEN. All outbound API calls use the staticEDA_API_KEY. - No auth: development only.
Docker — run locally (same image you deploy to ECS/Fargate; includes easydeploy-ai-mcp[oauth]):
# Convenience: build + run (reads .env in the repo root if present)
./scripts/run_mcp_docker_local.sh
# Explicit env vars (no .env)
./scripts/run_mcp_docker_local.sh -e EDA_API_KEY="eda_live_..."
# Different host port
PORT=9000 ./scripts/run_mcp_docker_local.sh
Host on AWS (Fargate + ALB): build and push this repo’s Dockerfile to a container registry, then deploy behind an HTTPS load balancer. Set the env vars listed above on the task/container.
Manual equivalent:
docker build -t easydeploy-ai-mcp .
docker run --rm -p 8080:8080 \
-e EDA_API_KEY="eda_live_..." \
easydeploy-ai-mcp
Documentation
- docs/claude-getting-started.md — EasyDeploy + Claude: Connectors or local Desktop config JSON
- docs/claude.md — Claude Connectors vs Claude Code, transports, headers
REST API reference
This MCP server is a thin client over the EasyDeploy public REST API. Endpoint behavior, request bodies, and response shapes are defined by EasyDeploy (dashboard, product help, and official API materials at easydeploy.ai). This repo does not duplicate the full OpenAPI spec; it maps those operations to MCP tools.
Releases and API compatibility
This repository is the open-source home of the EasyDeploy MCP server. New releases track the EasyDeploy public REST API as documented for customers (dashboard and official API materials). If the API adds or changes endpoints, expect corresponding updates here. Contributors should follow CONTRIBUTING.md when changing tools or client behavior.
Development
pip install -e ".[dev]"
pytest
Optional — real Cognito JWT against the HTTP app (live JWKS, no mocks): set EDA_INTEGRATION_COGNITO_ACCESS_TOKEN plus the same EDA_COGNITO_* vars you use for OAuth mode, then run pytest tests/test_cognito_jwt_integration.py -v. See the docstring in that file.
See CONTRIBUTING.md for pull requests and reporting issues.
Security
See SECURITY.md for vulnerability reporting and deployment notes.
License
MIT — see LICENSE.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file easydeploy_ai_mcp-0.1.0.tar.gz.
File metadata
- Download URL: easydeploy_ai_mcp-0.1.0.tar.gz
- Upload date:
- Size: 42.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
b8816fcc3762097eb993c1cb2ecf6c2aecdb95c3b5fda83e7545948a33627a1f
|
|
| MD5 |
5372c61d4db8408772bc344b71e2a3e2
|
|
| BLAKE2b-256 |
4d112c2c44e2108f35668c5b1c4468ed22087a06d9443c31a72fe188971e126b
|
Provenance
The following attestation bundles were made for easydeploy_ai_mcp-0.1.0.tar.gz:
Publisher:
publish-pypi.yml on EasyDeploy-AI/easydeploy-ai-mcp
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
easydeploy_ai_mcp-0.1.0.tar.gz -
Subject digest:
b8816fcc3762097eb993c1cb2ecf6c2aecdb95c3b5fda83e7545948a33627a1f - Sigstore transparency entry: 1398474251
- Sigstore integration time:
-
Permalink:
EasyDeploy-AI/easydeploy-ai-mcp@3facd381b09f53551f5aadf0cf6987bd9cc8ec1f -
Branch / Tag:
refs/tags/v0.1.0 - Owner: https://github.com/EasyDeploy-AI
-
Access:
private
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish-pypi.yml@3facd381b09f53551f5aadf0cf6987bd9cc8ec1f -
Trigger Event:
release
-
Statement type:
File details
Details for the file easydeploy_ai_mcp-0.1.0-py3-none-any.whl.
File metadata
- Download URL: easydeploy_ai_mcp-0.1.0-py3-none-any.whl
- Upload date:
- Size: 33.9 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
7dcc549e1cccc17d43a885994bba07cee6a9a53f0e8043a805543f976943d537
|
|
| MD5 |
90327fef693e6591e87948a68f0c2414
|
|
| BLAKE2b-256 |
56aff5c48813faae080c20f55b0f728183138ceaa70be4b206e8bc67a16c0cbc
|
Provenance
The following attestation bundles were made for easydeploy_ai_mcp-0.1.0-py3-none-any.whl:
Publisher:
publish-pypi.yml on EasyDeploy-AI/easydeploy-ai-mcp
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
easydeploy_ai_mcp-0.1.0-py3-none-any.whl -
Subject digest:
7dcc549e1cccc17d43a885994bba07cee6a9a53f0e8043a805543f976943d537 - Sigstore transparency entry: 1398474370
- Sigstore integration time:
-
Permalink:
EasyDeploy-AI/easydeploy-ai-mcp@3facd381b09f53551f5aadf0cf6987bd9cc8ec1f -
Branch / Tag:
refs/tags/v0.1.0 - Owner: https://github.com/EasyDeploy-AI
-
Access:
private
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish-pypi.yml@3facd381b09f53551f5aadf0cf6987bd9cc8ec1f -
Trigger Event:
release
-
Statement type: