-
Notifications
You must be signed in to change notification settings - Fork 126
Add proposal for Remote MCP Server Proxy Support #2151
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
This proposal extends the ToolHive Kubernetes operator to support proxying remote Model Context Protocol (MCP) servers with OAuth authentication, bringing feature parity with the existing `thv run <remote-url>` CLI capability. Key features: - New MCPRemoteProxy CRD for deploying remote MCP proxies - JWT validation and identity extraction for policy enforcement - Optional token exchange support via MCPExternalAuthConfig CRD - Integration with existing authz, audit, and tool filtering - Stateless, horizontally scalable architecture This enables enterprises to gain centralized observability and policy enforcement over external MCP usage without requiring changes to remote services or storing user credentials. 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <[email protected]>
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## main #2151 +/- ##
=======================================
Coverage 48.84% 48.84%
=======================================
Files 242 242
Lines 30722 30722
=======================================
Hits 15005 15005
Misses 14595 14595
Partials 1122 1122 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
@claude Can you review the proposal made in this PR? Put your Kubernetes and security hat on for this one |
Claude finished @ChrisJBurns's task —— View job Remote MCP Proxy Proposal ReviewI've completed a thorough review of the proposal from both Kubernetes and security perspectives. Overall, this is a well-architected proposal that builds intelligently on existing ToolHive infrastructure. Below is my detailed feedback. ✅ StrengthsArchitecture & Design
Security Model
🔴 Critical Issues1. Missing CRD Type Definition for
|
Note that the external auth config crd is here #2150 |
Summary
This proposal extends the ToolHive Kubernetes operator to support proxying remote MCP servers with OAuth authentication, bringing the
thv run <remote-url>
CLI capability to Kubernetes.Problem
Organizations can't deploy centralized remote MCP proxies in Kubernetes to gain visibility, enforce policies, and maintain audit logs for employee interactions with external SaaS MCP services (e.g., Salesforce MCP, GitHub MCP).
Proposed Solution
Seeking Feedback On
🤖 Generated with Claude Code