| Name | awslabs.aws-appsync-mcp-server JSON |
| Version |
0.1.2
JSON |
| download |
| home_page | None |
| Summary | An AWS Labs Model Context Protocol (MCP) server for AWS AppSync Service capabilities |
| upload_time | 2025-10-13 20:41:14 |
| maintainer | None |
| docs_url | None |
| author | Amazon Web Services |
| requires_python | >=3.10 |
| license | Apache-2.0 |
| keywords |
|
| VCS |
 |
| bugtrack_url |
|
| requirements |
No requirements were recorded.
|
| Travis-CI |
No Travis.
|
| coveralls test coverage |
No coveralls.
|
# AWS AppSync MCP Server
A Model Context Protocol (MCP) server for AWS AppSync that enables AI assistants to manage and interact with backend APIs.
## Overview
The AWS AppSync MCP Server simplifies the management of APIs by providing capabilities to create graphQL APIs, data sources, resolvers, and other AppSync resources. This allows for streamlined API development and easier integration with AWS backend services through natural language interactions.
## Features
- **API Management**: Create and configure AppSync APIs with various authentication types
- **GraphQL API Creation**: Set up GraphQL APIs with schema definitions and authentication
- **API Key Management**: Generate and manage API keys for authentication
- **API Caching**: Configure caching for improved API performance
- **Data Source Management**: Connect APIs to various AWS backend services (DynamoDB, Lambda, RDS, etc.)
- **Function Management**: Create and manage AppSync functions for complex business logic
- **Channel Namespace Management**: Set up real-time subscriptions with channel namespaces
- **Domain Name Management**: Configure custom domain names for APIs
- **Resolver Management**: Create resolvers to connect GraphQL fields to data sources
- **Schema Management**: Define and update GraphQL schemas
- **Read-Only Mode**: Enable an optional security mode that restricts all operations to read-only, preventing any modifications
## Prerequisites
1. Install `uv` from [Astral](https://docs.astral.sh/uv/getting-started/installation/) or the [GitHub README](https://github.com/astral-sh/uv#installation)
2. Install Python using `uv python install 3.10`
3. Set up AWS credentials with access to AWS AppSync
- You need an AWS account with AWS AppSync enabled
- Configure AWS credentials with `aws configure` or environment variables
- Ensure your IAM role/user has permissions to use AWS AppSync
## Setup
### Installation
| Cursor | VS Code |
|:------:|:-------:|
| [](https://cursor.com/en/install-mcp?name=awslabs.aws-appsync-mcp-server&config=eyJjb21tYW5kIjoidXZ4IGF3c2xhYnMuYXdzLWFwcHN5bmMtbWNwLXNlcnZlckBsYXRlc3QiLCJlbnYiOnsiQVdTX1BST0ZJTEUiOiJ5b3VyLWF3cy1wcm9maWxlIiwiQVdTX1JFR0lPTiI6InVzLWVhc3QtMSIsIkZBU1RNQ1BfTE9HX0xFVkVMIjoiRVJST1IifX0%3D) | [](https://insiders.vscode.dev/redirect/mcp/install?name=AWS%20AppSync%20MCP%20Server&config=%7B%22command%22%3A%22uvx%22%2C%22args%22%3A%5B%22awslabs.aws-appsync-mcp-server%40latest%22%2C%20%22--allow-write%22%5D%2C%22env%22%3A%7B%22AWS_PROFILE%22%3A%22default%22%2C%22AWS_REGION%22%3A%22us-east-1%22%2C%22FASTMCP_LOG_LEVEL%22%3A%22ERROR%22%7D%2C%22disabled%22%3Afalse%2C%22autoApprove%22%3A%5B%5D%7D) |
## Configuration
Add the MCP server in your MCP client configuration (e.g., for Amazon Q Developer CLI, edit `~/.aws/amazonq/mcp.json`)
### Using AWS Profiles
For standard AWS profile-based authentication:
```json
{
"mcpServers": {
"awslabs.aws-appsync-mcp-server": {
"command": "uvx",
"args": ["awslabs.aws-appsync-mcp-server@latest"],
"env": {
"AWS_PROFILE": "your-aws-profile",
"AWS_REGION": "us-east-1",
"FASTMCP_LOG_LEVEL": "ERROR"
},
"disabled": false,
"autoApprove": []
}
}
}
```
### Using Temporary Credentials
For temporary credentials (such as those from AWS STS, IAM roles, or federation):
```json
{
"mcpServers": {
"awslabs.aws-appsync-mcp-server": {
"command": "uvx",
"args": ["awslabs.aws-appsync-mcp-server@latest"],
"env": {
"AWS_ACCESS_KEY_ID": "your-temporary-access-key",
"AWS_SECRET_ACCESS_KEY": "your-temporary-secret-key", // pragma: allowlist secret
"AWS_SESSION_TOKEN": "your-session-token",
"AWS_REGION": "us-east-1",
"FASTMCP_LOG_LEVEL": "ERROR"
},
"disabled": false,
"autoApprove": []
}
}
}
```
### Enabling Write Operations using `--allow-write`
Enables tools that create or modify resources in the user's AWS account. When this flag is not enabled, the server runs in read-only mode that only allows read operations. This enhances security by preventing any modifications to AppSync resources. In read-only mode:
- Read operations work normally
- Write operations (`create_api`, `create_graphql_api`, `create_datasource`, etc.) are blocked and return a permission error
This mode is particularly useful for:
- Demonstration environments
- Security-sensitive applications
- Integration with public-facing AI assistants
- Protecting production APIs from unintended modifications
Example:
```json
{
"mcpServers": {
"awslabs.aws-appsync-mcp-server": {
"command": "uvx",
"args": [
"awslabs.aws-appsync-mcp-server@latest",
"--allow-write"
],
"env": {
"AWS_PROFILE": "your-aws-profile",
"AWS_REGION": "us-east-1"
}
}
}
}
```
### Docker Configuration
After building with `docker build -t awslabs/aws-appsync-mcp-server .`:
```json
{
"mcpServers": {
"awslabs.aws-appsync-mcp-server": {
"command": "docker",
"args": [
"run",
"--rm",
"-i",
"awslabs/aws-appsync-mcp-server:latest"
],
"env": {
"AWS_PROFILE": "your-aws-profile",
"AWS_REGION": "us-east-1"
},
"disabled": false,
"autoApprove": []
}
}
}
```
### Environment Variables
- `AWS_PROFILE`: AWS CLI profile to use for credentials
- `AWS_REGION`: AWS region to use (default: us-east-1)
- `AWS_ACCESS_KEY_ID` and `AWS_SECRET_ACCESS_KEY`: Explicit AWS credentials (alternative to AWS_PROFILE)
- `AWS_SESSION_TOKEN`: Session token for temporary credentials (used with AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY)
- `FASTMCP_LOG_LEVEL`: Logging level (ERROR, WARNING, INFO, DEBUG)
## Tools
The server exposes the following tools through the MCP interface:
### create_api
Creates a new AppSync API with the given configuration.
```python
create_api(name: str) -> dict
```
### create_graphql_api
Creates a new GraphQL API with authentication and other configuration options.
```python
create_graphql_api(
name: str,
authentication_type: str = "API_KEY"
) -> dict
```
### create_api_key
Creates an API key for authentication with an AppSync API.
```python
create_api_key(
api_id: str,
description: str = None,
expires: int = None
) -> dict
```
### create_api_cache
Creates and configures caching for an AppSync API to improve performance.
```python
create_api_cache(
api_id: str,
ttl: int = 3600,
api_caching_behavior: str = "FULL_REQUEST_CACHING",
type: str = "SMALL"
) -> dict
```
### create_datasource
Creates a data source to connect the API to backend services like DynamoDB, Lambda, or RDS.
```python
create_datasource(
api_id: str,
name: str,
type: str,
service_role_arn: str = None,
dynamodb_config: dict = None,
lambda_config: dict = None,
elasticsearch_config: dict = None,
relational_database_config: dict = None
) -> dict
```
### create_function
Creates an AppSync function for reusable business logic.
```python
create_function(
api_id: str,
name: str,
data_source_name: str,
function_version: str = "2018-05-29",
request_mapping_template: str = None,
response_mapping_template: str = None
) -> dict
```
### create_channel_namespace
Creates a channel namespace for real-time subscriptions.
```python
create_channel_namespace(
api_id: str,
name: str,
publish_auth_modes: list = None,
subscribe_auth_modes: list = None
) -> dict
```
### create_domain_name
Creates a custom domain name for an AppSync API.
```python
create_domain_name(
domain_name: str,
certificate_arn: str,
description: str = None
) -> dict
```
### create_resolver
Creates a resolver to connect GraphQL fields to data sources.
```python
create_resolver(
api_id: str,
type_name: str,
field_name: str,
data_source_name: str = None,
request_mapping_template: str = None,
response_mapping_template: str = None,
kind: str = "UNIT"
) -> dict
```
### create_schema
Creates or updates the GraphQL schema for an API.
```python
create_schema(
api_id: str,
definition: str
) -> dict
```
## Usage Examples
| Prompt | Description |
|--------|-------------|
| `Create a GraphQL API named "blog-api" with API key authentication` | Creates a new GraphQL API with the specified name and authentication type |
| `Add a GraphQL schema with a Post type with an id primary key, content and author fields` | Creates or updates the API schema with custom types and fields |
| `Create a DynamoDB data source for my API connecting to the "posts" table` | Sets up a data source to connect the API to a DynamoDB table |
| `Create a resolver for the "getPosts" query field` | Creates a resolver to handle GraphQL query execution |
| `Set up API caching with 1 hour TTL for better performance` | Configures caching to improve API response times |
| `Create an API key that expires in 30 days` | Generates an API key with a specific expiration date |
| `Create a Lambda data source for custom business logic` | Sets up a data source to connect the API to AWS Lambda functions |
## AWS AppSync Resources
This server uses the AWS AppSync service APIs for:
- GraphQL API creation and management
- Data source configuration (DynamoDB, Lambda, RDS, etc.)
- Resolver creation and management
- Schema definition and updates
- API key and authentication management
- Caching configuration
- Real-time subscription setup
## Security Considerations
- Use AWS profiles for credential management
- Use IAM policies to restrict access to only the required AWS AppSync resources
- Use temporary credentials (AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, and AWS_SESSION_TOKEN) from AWS STS for enhanced security
- Implement AWS IAM roles with temporary credentials for applications and services
- Regularly rotate credentials and use the shortest practical expiration time for temporary credentials
- Be aware of AWS AppSync service quotas and limits
- Use the `--allow-write` flag judiciously and only when write operations are necessary
> #### ⚠️ IMPORTANT: YOU ARE RESPONSIBLE FOR YOUR AGENTS
>
> You are solely responsible for the actions and permissions of agents using the MCP server.
>
> - By default, the MCP server operates in **read-only mode**.
> - To enable write access, you must **explicitly configure the MCP with the necessary IAM permissions** and use "--allow-write" flag to enable create operations on AWS AppSync using the MCP server.
> - Always follow the **principle of least privilege**—grant only the permissions necessary for the agent to function.
> - If enabling write operations, **we recommend you take a backup of your data** and carefully validate any instructions generated by your LLM before execution. Perform such actions during a scheduled maintenance window for your application.
> - With AWS AppSync MCP Server, we recommend exercising caution when integrating it into automated workflows.
## License
This project is licensed under the Apache License, Version 2.0. See the [LICENSE](https://github.com/awslabs/mcp/blob/main/src/aws-appsync-mcp-server/LICENSE) file for details.
Raw data
{
"_id": null,
"home_page": null,
"name": "awslabs.aws-appsync-mcp-server",
"maintainer": null,
"docs_url": null,
"requires_python": ">=3.10",
"maintainer_email": null,
"keywords": null,
"author": "Amazon Web Services",
"author_email": "AWSLabs MCP <203918161+awslabs-mcp@users.noreply.github.com>, Phani Srikar Edupuganti <phanisrikar93ume@gmail.com>",
"download_url": "https://files.pythonhosted.org/packages/9e/03/9f536e6c613a72546687949c407c75215b558a09b06808092c2572752744/awslabs_aws_appsync_mcp_server-0.1.2.tar.gz",
"platform": null,
"description": "# AWS AppSync MCP Server\n\nA Model Context Protocol (MCP) server for AWS AppSync that enables AI assistants to manage and interact with backend APIs.\n\n## Overview\n\nThe AWS AppSync MCP Server simplifies the management of APIs by providing capabilities to create graphQL APIs, data sources, resolvers, and other AppSync resources. This allows for streamlined API development and easier integration with AWS backend services through natural language interactions.\n\n## Features\n\n- **API Management**: Create and configure AppSync APIs with various authentication types\n- **GraphQL API Creation**: Set up GraphQL APIs with schema definitions and authentication\n- **API Key Management**: Generate and manage API keys for authentication\n- **API Caching**: Configure caching for improved API performance\n- **Data Source Management**: Connect APIs to various AWS backend services (DynamoDB, Lambda, RDS, etc.)\n- **Function Management**: Create and manage AppSync functions for complex business logic\n- **Channel Namespace Management**: Set up real-time subscriptions with channel namespaces\n- **Domain Name Management**: Configure custom domain names for APIs\n- **Resolver Management**: Create resolvers to connect GraphQL fields to data sources\n- **Schema Management**: Define and update GraphQL schemas\n- **Read-Only Mode**: Enable an optional security mode that restricts all operations to read-only, preventing any modifications\n\n## Prerequisites\n\n1. Install `uv` from [Astral](https://docs.astral.sh/uv/getting-started/installation/) or the [GitHub README](https://github.com/astral-sh/uv#installation)\n2. Install Python using `uv python install 3.10`\n3. Set up AWS credentials with access to AWS AppSync\n - You need an AWS account with AWS AppSync enabled\n - Configure AWS credentials with `aws configure` or environment variables\n - Ensure your IAM role/user has permissions to use AWS AppSync\n\n## Setup\n\n### Installation\n\n| Cursor | VS Code |\n|:------:|:-------:|\n| [](https://cursor.com/en/install-mcp?name=awslabs.aws-appsync-mcp-server&config=eyJjb21tYW5kIjoidXZ4IGF3c2xhYnMuYXdzLWFwcHN5bmMtbWNwLXNlcnZlckBsYXRlc3QiLCJlbnYiOnsiQVdTX1BST0ZJTEUiOiJ5b3VyLWF3cy1wcm9maWxlIiwiQVdTX1JFR0lPTiI6InVzLWVhc3QtMSIsIkZBU1RNQ1BfTE9HX0xFVkVMIjoiRVJST1IifX0%3D) | [](https://insiders.vscode.dev/redirect/mcp/install?name=AWS%20AppSync%20MCP%20Server&config=%7B%22command%22%3A%22uvx%22%2C%22args%22%3A%5B%22awslabs.aws-appsync-mcp-server%40latest%22%2C%20%22--allow-write%22%5D%2C%22env%22%3A%7B%22AWS_PROFILE%22%3A%22default%22%2C%22AWS_REGION%22%3A%22us-east-1%22%2C%22FASTMCP_LOG_LEVEL%22%3A%22ERROR%22%7D%2C%22disabled%22%3Afalse%2C%22autoApprove%22%3A%5B%5D%7D) |\n\n## Configuration\n\nAdd the MCP server in your MCP client configuration (e.g., for Amazon Q Developer CLI, edit `~/.aws/amazonq/mcp.json`)\n\n### Using AWS Profiles\n\nFor standard AWS profile-based authentication:\n\n```json\n{\n \"mcpServers\": {\n \"awslabs.aws-appsync-mcp-server\": {\n \"command\": \"uvx\",\n \"args\": [\"awslabs.aws-appsync-mcp-server@latest\"],\n \"env\": {\n \"AWS_PROFILE\": \"your-aws-profile\",\n \"AWS_REGION\": \"us-east-1\",\n \"FASTMCP_LOG_LEVEL\": \"ERROR\"\n },\n \"disabled\": false,\n \"autoApprove\": []\n }\n }\n}\n```\n\n### Using Temporary Credentials\n\nFor temporary credentials (such as those from AWS STS, IAM roles, or federation):\n\n```json\n{\n \"mcpServers\": {\n \"awslabs.aws-appsync-mcp-server\": {\n \"command\": \"uvx\",\n \"args\": [\"awslabs.aws-appsync-mcp-server@latest\"],\n \"env\": {\n \"AWS_ACCESS_KEY_ID\": \"your-temporary-access-key\",\n \"AWS_SECRET_ACCESS_KEY\": \"your-temporary-secret-key\", // pragma: allowlist secret\n \"AWS_SESSION_TOKEN\": \"your-session-token\",\n \"AWS_REGION\": \"us-east-1\",\n \"FASTMCP_LOG_LEVEL\": \"ERROR\"\n },\n \"disabled\": false,\n \"autoApprove\": []\n }\n }\n}\n```\n\n### Enabling Write Operations using `--allow-write`\n\nEnables tools that create or modify resources in the user's AWS account. When this flag is not enabled, the server runs in read-only mode that only allows read operations. This enhances security by preventing any modifications to AppSync resources. In read-only mode:\n\n- Read operations work normally\n- Write operations (`create_api`, `create_graphql_api`, `create_datasource`, etc.) are blocked and return a permission error\n\nThis mode is particularly useful for:\n- Demonstration environments\n- Security-sensitive applications\n- Integration with public-facing AI assistants\n- Protecting production APIs from unintended modifications\n\nExample:\n```json\n{\n \"mcpServers\": {\n \"awslabs.aws-appsync-mcp-server\": {\n \"command\": \"uvx\",\n \"args\": [\n \"awslabs.aws-appsync-mcp-server@latest\",\n \"--allow-write\"\n ],\n \"env\": {\n \"AWS_PROFILE\": \"your-aws-profile\",\n \"AWS_REGION\": \"us-east-1\"\n }\n }\n }\n}\n```\n\n### Docker Configuration\n\nAfter building with `docker build -t awslabs/aws-appsync-mcp-server .`:\n\n```json\n{\n \"mcpServers\": {\n \"awslabs.aws-appsync-mcp-server\": {\n \"command\": \"docker\",\n \"args\": [\n \"run\",\n \"--rm\",\n \"-i\",\n \"awslabs/aws-appsync-mcp-server:latest\"\n ],\n \"env\": {\n \"AWS_PROFILE\": \"your-aws-profile\",\n \"AWS_REGION\": \"us-east-1\"\n },\n \"disabled\": false,\n \"autoApprove\": []\n }\n }\n}\n```\n\n### Environment Variables\n\n- `AWS_PROFILE`: AWS CLI profile to use for credentials\n- `AWS_REGION`: AWS region to use (default: us-east-1)\n- `AWS_ACCESS_KEY_ID` and `AWS_SECRET_ACCESS_KEY`: Explicit AWS credentials (alternative to AWS_PROFILE)\n- `AWS_SESSION_TOKEN`: Session token for temporary credentials (used with AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY)\n- `FASTMCP_LOG_LEVEL`: Logging level (ERROR, WARNING, INFO, DEBUG)\n\n## Tools\n\nThe server exposes the following tools through the MCP interface:\n\n### create_api\n\nCreates a new AppSync API with the given configuration.\n\n```python\ncreate_api(name: str) -> dict\n```\n\n### create_graphql_api\n\nCreates a new GraphQL API with authentication and other configuration options.\n\n```python\ncreate_graphql_api(\n name: str,\n authentication_type: str = \"API_KEY\"\n) -> dict\n```\n\n### create_api_key\n\nCreates an API key for authentication with an AppSync API.\n\n```python\ncreate_api_key(\n api_id: str,\n description: str = None,\n expires: int = None\n) -> dict\n```\n\n### create_api_cache\n\nCreates and configures caching for an AppSync API to improve performance.\n\n```python\ncreate_api_cache(\n api_id: str,\n ttl: int = 3600,\n api_caching_behavior: str = \"FULL_REQUEST_CACHING\",\n type: str = \"SMALL\"\n) -> dict\n```\n\n### create_datasource\n\nCreates a data source to connect the API to backend services like DynamoDB, Lambda, or RDS.\n\n```python\ncreate_datasource(\n api_id: str,\n name: str,\n type: str,\n service_role_arn: str = None,\n dynamodb_config: dict = None,\n lambda_config: dict = None,\n elasticsearch_config: dict = None,\n relational_database_config: dict = None\n) -> dict\n```\n\n### create_function\n\nCreates an AppSync function for reusable business logic.\n\n```python\ncreate_function(\n api_id: str,\n name: str,\n data_source_name: str,\n function_version: str = \"2018-05-29\",\n request_mapping_template: str = None,\n response_mapping_template: str = None\n) -> dict\n```\n\n### create_channel_namespace\n\nCreates a channel namespace for real-time subscriptions.\n\n```python\ncreate_channel_namespace(\n api_id: str,\n name: str,\n publish_auth_modes: list = None,\n subscribe_auth_modes: list = None\n) -> dict\n```\n\n### create_domain_name\n\nCreates a custom domain name for an AppSync API.\n\n```python\ncreate_domain_name(\n domain_name: str,\n certificate_arn: str,\n description: str = None\n) -> dict\n```\n\n### create_resolver\n\nCreates a resolver to connect GraphQL fields to data sources.\n\n```python\ncreate_resolver(\n api_id: str,\n type_name: str,\n field_name: str,\n data_source_name: str = None,\n request_mapping_template: str = None,\n response_mapping_template: str = None,\n kind: str = \"UNIT\"\n) -> dict\n```\n\n### create_schema\n\nCreates or updates the GraphQL schema for an API.\n\n```python\ncreate_schema(\n api_id: str,\n definition: str\n) -> dict\n```\n\n## Usage Examples\n\n| Prompt | Description |\n|--------|-------------|\n| `Create a GraphQL API named \"blog-api\" with API key authentication` | Creates a new GraphQL API with the specified name and authentication type |\n| `Add a GraphQL schema with a Post type with an id primary key, content and author fields` | Creates or updates the API schema with custom types and fields |\n| `Create a DynamoDB data source for my API connecting to the \"posts\" table` | Sets up a data source to connect the API to a DynamoDB table |\n| `Create a resolver for the \"getPosts\" query field` | Creates a resolver to handle GraphQL query execution |\n| `Set up API caching with 1 hour TTL for better performance` | Configures caching to improve API response times |\n| `Create an API key that expires in 30 days` | Generates an API key with a specific expiration date |\n| `Create a Lambda data source for custom business logic` | Sets up a data source to connect the API to AWS Lambda functions |\n\n\n## AWS AppSync Resources\n\nThis server uses the AWS AppSync service APIs for:\n- GraphQL API creation and management\n- Data source configuration (DynamoDB, Lambda, RDS, etc.)\n- Resolver creation and management\n- Schema definition and updates\n- API key and authentication management\n- Caching configuration\n- Real-time subscription setup\n\n## Security Considerations\n\n- Use AWS profiles for credential management\n- Use IAM policies to restrict access to only the required AWS AppSync resources\n- Use temporary credentials (AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, and AWS_SESSION_TOKEN) from AWS STS for enhanced security\n- Implement AWS IAM roles with temporary credentials for applications and services\n- Regularly rotate credentials and use the shortest practical expiration time for temporary credentials\n- Be aware of AWS AppSync service quotas and limits\n- Use the `--allow-write` flag judiciously and only when write operations are necessary\n\n> #### \u26a0\ufe0f IMPORTANT: YOU ARE RESPONSIBLE FOR YOUR AGENTS\n>\n> You are solely responsible for the actions and permissions of agents using the MCP server.\n>\n> - By default, the MCP server operates in **read-only mode**.\n> - To enable write access, you must **explicitly configure the MCP with the necessary IAM permissions** and use \"--allow-write\" flag to enable create operations on AWS AppSync using the MCP server.\n> - Always follow the **principle of least privilege**\u2014grant only the permissions necessary for the agent to function.\n> - If enabling write operations, **we recommend you take a backup of your data** and carefully validate any instructions generated by your LLM before execution. Perform such actions during a scheduled maintenance window for your application.\n> - With AWS AppSync MCP Server, we recommend exercising caution when integrating it into automated workflows.\n\n## License\n\nThis project is licensed under the Apache License, Version 2.0. See the [LICENSE](https://github.com/awslabs/mcp/blob/main/src/aws-appsync-mcp-server/LICENSE) file for details.\n",
"bugtrack_url": null,
"license": "Apache-2.0",
"summary": "An AWS Labs Model Context Protocol (MCP) server for AWS AppSync Service capabilities",
"version": "0.1.2",
"project_urls": {
"changelog": "https://github.com/awslabs/mcp/blob/main/src/aws-appsync-mcp-server/CHANGELOG.md",
"docs": "https://awslabs.github.io/mcp/servers/aws-appsync-mcp-server/",
"documentation": "https://awslabs.github.io/mcp/servers/aws-appsync-mcp-server/",
"homepage": "https://awslabs.github.io/mcp/",
"repository": "https://github.com/awslabs/mcp.git"
},
"split_keywords": [],
"urls": [
{
"comment_text": null,
"digests": {
"blake2b_256": "9150eedd35d68ec9ad41bf07040a77bfdf27457e514fe26adce9b8023d1ead3f",
"md5": "75dc8e99dab36622af5e16fe315a9954",
"sha256": "53c8ed711c1e5e1734e7a61dc7cde549935a277b5dd8bafb73f9320268f97038"
},
"downloads": -1,
"filename": "awslabs_aws_appsync_mcp_server-0.1.2-py3-none-any.whl",
"has_sig": false,
"md5_digest": "75dc8e99dab36622af5e16fe315a9954",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": ">=3.10",
"size": 48414,
"upload_time": "2025-10-13T20:41:11",
"upload_time_iso_8601": "2025-10-13T20:41:11.969977Z",
"url": "https://files.pythonhosted.org/packages/91/50/eedd35d68ec9ad41bf07040a77bfdf27457e514fe26adce9b8023d1ead3f/awslabs_aws_appsync_mcp_server-0.1.2-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": null,
"digests": {
"blake2b_256": "9e039f536e6c613a72546687949c407c75215b558a09b06808092c2572752744",
"md5": "129c03c16f75da02f8a1eae3689f5823",
"sha256": "19cb34a19c883982280ca30add72322ad458597fdf329f04b9af17cc282955ca"
},
"downloads": -1,
"filename": "awslabs_aws_appsync_mcp_server-0.1.2.tar.gz",
"has_sig": false,
"md5_digest": "129c03c16f75da02f8a1eae3689f5823",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.10",
"size": 109825,
"upload_time": "2025-10-13T20:41:14",
"upload_time_iso_8601": "2025-10-13T20:41:14.632764Z",
"url": "https://files.pythonhosted.org/packages/9e/03/9f536e6c613a72546687949c407c75215b558a09b06808092c2572752744/awslabs_aws_appsync_mcp_server-0.1.2.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2025-10-13 20:41:14",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "awslabs",
"github_project": "mcp",
"travis_ci": false,
"coveralls": false,
"github_actions": true,
"lcname": "awslabs.aws-appsync-mcp-server"
}