Skip to content

Commit b066a86

Browse files
author
mrachidi
committed
adding all tools needed for Vulnerability Intelligence MCP Server
1 parent d556ad0 commit b066a86

File tree

3 files changed

+26
-43
lines changed

3 files changed

+26
-43
lines changed

CODEOWNERS

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +0,0 @@
1-
# Comment line immediately above ownership line is reserved for related gus information. Please be careful while editing.
2-
#GUSINFO:TIP Detection Platform - Foundation ML,Productivity Tools Gacks
3-
*

SALESFORCE_DEPLOYMENT.md renamed to Heroku_DEPLOYMENT.md

Lines changed: 25 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,5 @@
1-
# 🚀 Salesforce TIP MCP Server Deployment Guide
1+
# 🚀 Heroku TIP MCP Server Deployment Guide
22

3-
## ✅ Your Setup
4-
- **Repository**: `[email protected]:securityanalytics/tip-mcp-heroku.git`
5-
- **Heroku App**: `tip-mcp-server` (already created)
6-
- **Deployment Method**: Heroku CLI (since using internal Git)
73

84
## 🔧 Pre-Deployment Steps
95

@@ -14,10 +10,10 @@
1410
heroku login
1511

1612
# Verify your app exists
17-
heroku apps:info tip-mcp-server
13+
heroku apps:info vulnerability-intelligence-mcp-server
1814

1915
# Set the stack to container (required for Docker deployment)
20-
heroku stack:set container -a tip-mcp-server
16+
heroku stack:set container -a vulnerability-intelligence-mcp-server
2117
```
2218

2319
### 2. Add Heroku Remote to Your Git Repository
@@ -27,20 +23,11 @@ heroku stack:set container -a tip-mcp-server
2723
cd /path/to/your/tip-mcp-heroku
2824

2925
# Add Heroku as a remote
30-
heroku git:remote -a tip-mcp-server
26+
heroku git:remote -a vulnerability-intelligence-mcp-server
3127

3228
# Verify remotes
3329
git remote -v
3430
```
35-
36-
You should see something like:
37-
```
38-
heroku https://git.heroku.com/tip-mcp-server.git (fetch)
39-
heroku https://git.heroku.com/tip-mcp-server.git (push)
40-
origin [email protected]:securityanalytics/tip-mcp-heroku.git (fetch)
41-
origin [email protected]:securityanalytics/tip-mcp-heroku.git (push)
42-
```
43-
4431
## 🚀 Deployment Commands
4532

4633
### Deploy to Heroku
@@ -59,13 +46,13 @@ git push heroku main
5946

6047
```bash
6148
# Watch the build logs in real-time
62-
heroku logs --tail -a tip-mcp-server
49+
heroku logs --tail -a vulnerability-intelligence-mcp-server
6350

6451
# Check app status
65-
heroku ps -a tip-mcp-server
52+
heroku ps -a vulnerability-intelligence-mcp-server
6653

6754
# View configuration
68-
heroku config -a tip-mcp-server
55+
heroku config -a vulnerability-intelligence-mcp-server
6956
```
7057

7158
## ✅ Expected Deployment Process
@@ -80,15 +67,15 @@ heroku config -a tip-mcp-server
8067
- App will start with: `mcp-simple-tool --transport sse --port $PORT`
8168

8269
3. **App Running**:
83-
- Your server will be available at: `https://tip-mcp-server.herokuapp.com/sse`
70+
- Your server will be available at: `https://vulnerability-intelligence-mcp-server.herokuapp.com/sse`
8471

8572
## 🧪 Testing Your Deployment
8673

8774
### 1. Health Check
8875

8976
```bash
9077
# Test the SSE endpoint
91-
curl -i https://tip-mcp-server.herokuapp.com/sse
78+
curl -i https://vulnerability-intelligence-mcp-server.herokuapp.com/sse
9279
```
9380

9481
Expected response: SSE connection headers.
@@ -101,7 +88,7 @@ Expected response: SSE connection headers.
10188
4. Fill in:
10289
- **Name**: "TIP MCP Vulnerability Checker"
10390
- **Type**: "sse"
104-
- **URL**: `https://tip-mcp-server.herokuapp.com/sse`
91+
- **URL**: `https://vulnerability-intelligence-mcp-server.herokuapp.com/sse`
10592

10693
### 3. Test the Security Tools
10794

@@ -123,10 +110,10 @@ Try these commands in Cursor:
123110
1. **Build Failures**:
124111
```bash
125112
# Check detailed build logs
126-
heroku logs --tail -a tip-mcp-server
113+
heroku logs --tail -a vulnerability-intelligence-mcp-server
127114

128115
# Check recent releases
129-
heroku releases -a tip-mcp-server
116+
heroku releases -a vulnerability-intelligence-mcp-server
130117
```
131118

132119
2. **Port Binding Issues**:
@@ -146,16 +133,16 @@ Try these commands in Cursor:
146133

147134
```bash
148135
# Access the app container for debugging
149-
heroku run bash -a tip-mcp-server
136+
heroku run bash -a vulnerability-intelligence-mcp-server
150137

151138
# Restart the app if needed
152-
heroku restart -a tip-mcp-server
139+
heroku restart -a vulnerability-intelligence-mcp-server
153140

154141
# View app configuration
155-
heroku config -a tip-mcp-server
142+
heroku config -a vulnerability-intelligence-mcp-server
156143

157144
# Scale the app (if needed)
158-
heroku ps:scale web=1 -a tip-mcp-server
145+
heroku ps:scale web=1 -a vulnerability-intelligence-mcp-server
159146
```
160147

161148
## 🎯 Production Considerations
@@ -164,31 +151,30 @@ heroku ps:scale web=1 -a tip-mcp-server
164151

165152
```bash
166153
# Check current dyno usage
167-
heroku ps -a tip-mcp-server
154+
heroku ps -a vulnerability-intelligence-mcp-server
168155

169156
# Upgrade dyno type if needed (for better performance)
170-
heroku ps:resize web=basic -a tip-mcp-server
157+
heroku ps:resize web=basic -a vulnerability-intelligence-mcp-server
171158
```
172159

173160
### Environment Variables
174161

175162
Set any additional environment variables:
176163
```bash
177164
# Example: Set custom user agent for your organization
178-
heroku config:set MCP_USER_AGENT="Salesforce TIP MCP Server v1.0" -a tip-mcp-server
179165

180166
# Enable debug mode if needed
181-
heroku config:set DEBUG=true -a tip-mcp-server
167+
heroku config:set DEBUG=true -a vulnerability-intelligence-mcp-server
182168
```
183169

184170
### Monitoring
185171

186172
```bash
187173
# Set up log drains for centralized logging (if needed)
188-
heroku drains -a tip-mcp-server
174+
heroku drains -a vulnerability-intelligence-mcp-server
189175

190176
# View metrics (if on paid plan)
191-
heroku logs --ps web -a tip-mcp-server
177+
heroku logs --ps web -a vulnerability-intelligence-mcp-server
192178
```
193179

194180
## 🎉 Ready to Deploy!
@@ -201,17 +187,17 @@ Run these commands to deploy:
201187

202188
```bash
203189
# 1. Set container stack
204-
heroku stack:set container -a tip-mcp-server
190+
heroku stack:set container -a vulnerability-intelligence-mcp-server
205191

206192
# 2. Add Heroku remote
207-
heroku git:remote -a tip-mcp-server
193+
heroku git:remote -a vulnerability-intelligence-mcp-server
208194

209195
# 3. Deploy!
210196
git push heroku main
211197

212198
# 4. Monitor
213-
heroku logs --tail -a tip-mcp-server
199+
heroku logs --tail -a vulnerability-intelligence-mcp-server
214200
```
215201

216202
Your TIP MCP Vulnerability Checker will be live at:
217-
**https://tip-mcp-server.herokuapp.com/sse**
203+
**https://vulnerability-intelligence-mcp-server.herokuapp.com/sse**

app.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"name": "MCP Vulnerability Checker Server",
33
"description": "A modular MCP server with CVE lookup, Python package vulnerability checking, and website fetching tools",
4-
"repository": "git@git.soma.salesforce.com:securityanalytics/tip-mcp-heroku.git",
4+
"repository": "git@github.com:firetix/vulnerability-intelligence-mcp-server.git",
55
"keywords": ["python", "mcp", "security", "cve", "vulnerability", "package", "web", "tool"],
66
"env": {
77
"MCP_SERVER_PORT": {

0 commit comments

Comments
 (0)