feat: Adding in service authorisation reference mcp server as per RFC issue #463 #730
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Fixes
Summary
This PR introduces a new Model Context Protocol (MCP) server that provides programmatic access to AWS service authorization information. The implementation includes:
re: Issue #463
Changes
New Files Added:
• src/sar-mcp/aws_service_reference.py - Main MCP server implementation (173 lines)
• src/sar-mcp/README.md - Comprehensive documentation (130 lines)
• src/sar-mcp/requirements.txt - Python dependencies
Key Features:
• Service Discovery: List all available AWS services
• Action Enumeration: Get API actions for specific AWS services
• Authorization Context: Retrieve condition keys, resource types, and action properties for specific API actions
• IAM Policy Support: Understand action capabilities (write, list, permission management, tagging-only operations)
Technical Implementation:
• Built using FastMCP framework for MCP server functionality
• Async HTTP client (httpx) for API communication with AWS Service Reference endpoint
• Five distinct tools for different authorization queries:
• list_aws_services
• get_service_actions
• get_action_condition_keys
• get_action_resource_types
• get_action_properties
User experience
This MCP enables developers and security engineers to programmatically access AWS service authorization metadata, making it easier to create accurate IAM policies and understand service capabilities within MCP-enabled applications.
Checklist
If your change doesn't seem to apply, please leave them unchecked.
Is this a breaking change? N
RFC issue number: #463
Checklist:
Acknowledgment
By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of the project license.