Skip to main content

EasyDeploy AI MCP server — REST API tools for Claude and other MCP clients

Project description

EasyDeploy AI MCP (easydeploy-ai-mcp)

A Model Context Protocol (MCP) server that exposes the EasyDeploy public REST API as tools for Claude, Cursor, Claude Code, and other MCP clients.

PyPI package name: easydeploy-ai-mcp · Import package: easydeploy_ai_mcp

Contents

Connect with Claude

Option A — Hosted connector (zero setup)

The fastest way to use EasyDeploy AI tools in Claude. No installation required.

  1. Open Claude (web at claude.ai or Claude Desktop).
  2. Go to Settings → Connectors → Add custom connector.
  3. Fill in the form:
    • Name: EasyDeploy AI
    • URL: https://mcp.easydeploy.ai/mcp
  4. Complete the OAuth sign-in flow when prompted. Claude will redirect you to EasyDeploy to authenticate with your account.
  5. Save the connector. EasyDeploy tools will appear in your Claude sessions.

Note: The hosted connector uses OAuth — you sign in with your EasyDeploy account; no API key needs to be pasted into Claude.


Option B — Self-hosted (local stdio)

Run the MCP server on your own machine using your EasyDeploy API key. Nothing is exposed to the internet.

1. Install

pip install easydeploy-ai-mcp

2. Add to Claude Desktop config

Edit (or create) the Claude Desktop config file:

OS Path
macOS ~/Library/Application Support/Claude/claude_desktop_config.json
Windows %APPDATA%\Claude\claude_desktop_config.json

Merge the following into the root of that JSON (keep any existing keys):

{
  "mcpServers": {
    "EasyDeploy AI": {
      "command": "easydeploy-ai-mcp-stdio",
      "env": {
        "EDA_API_KEY": "eda_live_YOUR_KEY"
      }
    }
  }
}

Replace eda_live_YOUR_KEY with your key from Account → API Keys in the EasyDeploy dashboard. Use the full path to easydeploy-ai-mcp-stdio (run which easydeploy-ai-mcp-stdio to find it) if Claude cannot locate it on your PATH.

3. Restart Claude Desktop

Fully quit and reopen the app. EasyDeploy AI will appear in your MCP servers.


For self-hosting on Docker or a cloud provider, see Remote MCP (HTTP).

What you get

  • 24 tools covering projects, datasets (including upload flow), model versions, training jobs, predictions, and account status.
  • stdio transport for local clients, or HTTP with Streamable MCP on /mcp and GET /healthz for load balancers.
  • Hardening: HTTPS-only calls to the EasyDeploy API; optional MCP_SERVICE_TOKEN for the HTTP MCP surface; response fields trimmed where appropriate for agents.

For production and SOC 2–sensitive setups, prefer self-hosting so your data stays within your own infrastructure. The hosted connector at https://mcp.easydeploy.ai/mcp is fine for most users.

Requirements

  • Python 3.10+
  • An EasyDeploy API key from the dashboard (Account → API Keys). The client uses the production EasyDeploy API host by default.

Install

From PyPI (after first release)

pip install easydeploy-ai-mcp

From source

git clone https://github.com/easydeploy-ai/easydeploy-ai-mcp.git
cd easydeploy-ai-mcp
pip install -e ".[dev]"   # includes pytest
# or minimal runtime only:
pip install .

Environment variables

Variable Required Description
EDA_API_KEY stdio / legacy HTTP Required for stdio and legacy HTTP (no OAuth). Not used for outbound API calls when EDA_OAUTH_ENABLED=1 — each MCP request must include Authorization: Bearer <JWT or eda_live_…>.
EDA_API_BASE No Overrides the default production API (https://api.easydeploy.ai). Set only when targeting a non-production endpoint. Trailing /v1 is optional.
EDA_UI_BASE_URL No Prefix for ui_url fields (default https://easydeploy.ai).
MCP_SERVICE_TOKEN No Legacy single-tenant gate. If set, HTTP mode requires Authorization: Bearer <token> for /mcp (not for GET /healthz). Mutually exclusive with EDA_OAUTH_ENABLED.
EDA_OAUTH_ENABLED No Set to 1 to run the HTTP transport as an OAuth 2.0 resource server. Requires EDA_COGNITO_USER_POOL_ID and EDA_COGNITO_CLIENT_ID. See Remote MCP (HTTP).
EDA_COGNITO_USER_POOL_ID OAuth Cognito user pool that issues access tokens for the EasyDeploy API.
EDA_COGNITO_CLIENT_ID OAuth App client ID expected in the access token's client_id claim.
EDA_COGNITO_REGION No AWS region for the user pool (default us-east-1).
EDA_REPORT_MAX_WAIT_SECONDS No get_model_report poll budget (default 300).
EDA_REPORT_POLL_INTERVAL_SECONDS No Poll interval in seconds (default 10).
HOST / PORT No HTTP bind (defaults 0.0.0.0 / 8080).
EDA_TRUST_FORWARDED_HEADERS No Set to 1 behind ALB/reverse proxy so RFC 9728 resource uses https (trusts X-Forwarded-Proto).
EDA_MCP_OAUTH_ISSUER No Public MCP base URL (no path) for authorization_servers and proxy /.well-known/oauth-authorization-server issuer. Default: request origin. Use if Host / X-Forwarded-Proto are wrong behind a proxy.

Local MCP (stdio)

Use when the client starts the server as a subprocess (Claude Desktop, Cursor, etc.).

export EDA_API_KEY="eda_live_..."
easydeploy-ai-mcp-stdio

Or: python -m easydeploy_ai_mcp

Example config snippet:

{
  "mcpServers": {
    "easydeploy-ai": {
      "command": "easydeploy-ai-mcp-stdio",
      "env": {
        "EDA_API_KEY": "eda_live_..."
      }
    }
  }
}

Remote MCP (HTTP)

Serves Streamable HTTP via FastMCP on /mcp (confirm with your pinned FastMCP 3.x version). Health checks: GET /healthz.

export EDA_API_KEY="eda_live_..."
easydeploy-ai-mcp-http

Or: uvicorn easydeploy_ai_mcp.http_main:app --host 0.0.0.0 --port 8080

If you embed mcp.http_app() in another ASGI app, pass through lifespan from the FastMCP HTTP app (FastMCP ASGI); easydeploy_ai_mcp.http_main already does this for uvicorn.

Auth modes

Pick exactly one (setting both EDA_OAUTH_ENABLED and MCP_SERVICE_TOKEN raises at import):

  • OAuth 2.0 resource server (multi-tenant): set EDA_OAUTH_ENABLED=1 plus EDA_COGNITO_USER_POOL_ID and EDA_COGNITO_CLIENT_ID. Install the optional extra: pip install easydeploy-ai-mcp[oauth]. The server validates incoming Cognito access JWTs locally against the Cognito JWKS (issuer, signature, exp, token_use=='access', client_id) and forwards the token to the EasyDeploy API. EasyDeploy API keys (prefix eda_live_) are accepted in the same Authorization: Bearer header and forwarded as-is — the API is the source of truth for revocation. RFC 9728 metadata is published at /.well-known/oauth-protected-resource; RFC 8414 proxy metadata includes registration_endpoint, and POST /oauth/register returns the static Cognito MCP EDA_COGNITO_CLIENT_ID (RFC 7591-style, public client). 401 responses include WWW-Authenticate: Bearer … so MCP clients can discover the auth server. Note: Cognito access tokens carry client_id, not aud; do not configure an audience.
  • Shared-secret gate (legacy single-tenant): set MCP_SERVICE_TOKEN. All outbound API calls use the static EDA_API_KEY.
  • No auth: development only.

Docker — run locally (same image you deploy to ECS/Fargate; includes easydeploy-ai-mcp[oauth]):

# Convenience: build + run (reads .env in the repo root if present)
./scripts/run_mcp_docker_local.sh

# Explicit env vars (no .env)
./scripts/run_mcp_docker_local.sh -e EDA_API_KEY="eda_live_..."

# Different host port
PORT=9000 ./scripts/run_mcp_docker_local.sh

Host on AWS (Fargate + ALB): build and push this repo’s Dockerfile to a container registry, then deploy behind an HTTPS load balancer. Set the env vars listed above on the task/container.

Manual equivalent:

docker build -t easydeploy-ai-mcp .
docker run --rm -p 8080:8080 \
  -e EDA_API_KEY="eda_live_..." \
  easydeploy-ai-mcp

Documentation

REST API reference

This MCP server is a thin client over the EasyDeploy public REST API. Endpoint behavior, request bodies, and response shapes are defined by EasyDeploy (dashboard, product help, and official API materials at easydeploy.ai). This repo does not duplicate the full OpenAPI spec; it maps those operations to MCP tools.

Releases and API compatibility

This repository is the open-source home of the EasyDeploy MCP server. New releases track the EasyDeploy public REST API as documented for customers (dashboard and official API materials). If the API adds or changes endpoints, expect corresponding updates here. Contributors should follow CONTRIBUTING.md when changing tools or client behavior.

Development

pip install -e ".[dev]"
pytest

Optional — real Cognito JWT against the HTTP app (live JWKS, no mocks): set EDA_INTEGRATION_COGNITO_ACCESS_TOKEN plus the same EDA_COGNITO_* vars you use for OAuth mode, then run pytest tests/test_cognito_jwt_integration.py -v. See the docstring in that file.

See CONTRIBUTING.md for pull requests and reporting issues.

Security

See SECURITY.md for vulnerability reporting and deployment notes.

License

MIT — see LICENSE.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

easydeploy_ai_mcp-0.1.0.tar.gz (42.9 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

easydeploy_ai_mcp-0.1.0-py3-none-any.whl (33.9 kB view details)

Uploaded Python 3

File details

Details for the file easydeploy_ai_mcp-0.1.0.tar.gz.

File metadata

  • Download URL: easydeploy_ai_mcp-0.1.0.tar.gz
  • Upload date:
  • Size: 42.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for easydeploy_ai_mcp-0.1.0.tar.gz
Algorithm Hash digest
SHA256 b8816fcc3762097eb993c1cb2ecf6c2aecdb95c3b5fda83e7545948a33627a1f
MD5 5372c61d4db8408772bc344b71e2a3e2
BLAKE2b-256 4d112c2c44e2108f35668c5b1c4468ed22087a06d9443c31a72fe188971e126b

See more details on using hashes here.

Provenance

The following attestation bundles were made for easydeploy_ai_mcp-0.1.0.tar.gz:

Publisher: publish-pypi.yml on EasyDeploy-AI/easydeploy-ai-mcp

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file easydeploy_ai_mcp-0.1.0-py3-none-any.whl.

File metadata

File hashes

Hashes for easydeploy_ai_mcp-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 7dcc549e1cccc17d43a885994bba07cee6a9a53f0e8043a805543f976943d537
MD5 90327fef693e6591e87948a68f0c2414
BLAKE2b-256 56aff5c48813faae080c20f55b0f728183138ceaa70be4b206e8bc67a16c0cbc

See more details on using hashes here.

Provenance

The following attestation bundles were made for easydeploy_ai_mcp-0.1.0-py3-none-any.whl:

Publisher: publish-pypi.yml on EasyDeploy-AI/easydeploy-ai-mcp

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page