awslabs.aws-serverless-mcp-server


Nameawslabs.aws-serverless-mcp-server JSON
Version 0.1.6 PyPI version JSON
download
home_pageNone
SummaryAn AWS Labs Model Context Protocol (MCP) server for AWS Serverless
upload_time2025-07-11 18:48:36
maintainerNone
docs_urlNone
authorAmazon Web Services
requires_python>=3.10
licenseApache-2.0
keywords
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            # AWS Serverless MCP Server

## Overview

The AWS Serverless Model Context Protocol (MCP) Server is an open-source tool that combines AI assistance with serverless expertise to streamline how developers build serverless applications. It provides contextual guidance specific to serverless development, helping developers make informed decisions about architecture, implementation, and deployment throughout the entire application development lifecycle. With AWS Serverless MCP, developers can build reliable, efficient, and production-ready serverless applications with confidence.

Key benefits of the Serverless MCP Server include:

- AI-powered serverless development: Provides rich contextual information to AI coding assistants to ensure your serverless application aligns with AWS best practices.
- Comprehensive tooling: Offers tools for initialization, deployment, monitoring, and troubleshooting of serverless applications.
- Architecture guidance: Helps evaluate design choices and select optimal serverless patterns based on application needs. Offers recommendations on event sources, function boundaries, and service integrations.
- Operational best practices: Ensures alignment with AWS architectural principles. Suggests effective use of AWS services for event processing, data persistence, and service communication, and guides implementation of security controls, performance tuning, and cost optimization.
- Security-first approach: Implements built-in guardrails with read-only defaults and controlled access to sensitive data.

## Features
The set of tools provided by the Serverless MCP server can be broken down into four categories:

1. Serverless Application Lifecycle
    - Initialize, build, and deploy Serverless Application Model (SAM) applications with SAM CLI
    - Test Lambda functions locally and remotely
2. Web Application Deployment & Management
    - Deploy full-stack, frontend, and backend web applications onto AWS Serverless using Lambda Web Adapter
    - Update frontend assets and optionally invaliate CloudFront caches
    - Create custom domain names, including certificate and DNS setup
3. Observability
    - Retrieve and logs and metrics of serverless resources
4. Guidance, Templates, and Deployment Help
    - Provides guidance on AWS Lambda use-cases, selecting an IaC framework, and deployment process onto AWS Serverless
    - Provides sample SAM templates for different serverless application types from [Serverless Land](https://serverlessland.com/)
    - Provides schema types for different Lambda event sources and runtimes
    - Provides schema registry management and discovery for AWS EventBridge events
    - Enables type-safe Lambda function development with complete event schemas

## Prerequisites
- Have an AWS account with [credentials configured](https://docs.aws.amazon.com/cli/v1/userguide/cli-configure-files.html)
- Install uv from [Astral](https://docs.astral.sh/uv/getting-started/installation/) or the [GitHub README](https://github.com/astral-sh/uv#installation)
- Install Python 3.10 or newer using uv python install 3.10 (or a more recent version)
- Install [AWS SAM CLI](https://docs.aws.amazon.com/serverless-application-model/latest/developerguide/install-sam-cli.html)
- Install [AWS CLI](https://docs.aws.amazon.com/cli/latest/userguide/getting-started-install.html)

## Installation

[![Install MCP Server](https://cursor.com/deeplink/mcp-install-light.svg)](https://cursor.com/install-mcp?name=awslabs.aws-serverless-mcp-server&config=eyJjb21tYW5kIjoidXZ4IGF3c2xhYnMuYXdzLXNlcnZlcmxlc3MtbWNwLXNlcnZlckBsYXRlc3QgLS1hbGxvdy13cml0ZSAtLWFsbG93LXNlbnNpdGl2ZS1kYXRhLWFjY2VzcyIsImVudiI6eyJBV1NfUFJPRklMRSI6InlvdXItYXdzLXByb2ZpbGUiLCJBV1NfUkVHSU9OIjoidXMtZWFzdC0xIn0sImRpc2FibGVkIjpmYWxzZSwiYXV0b0FwcHJvdmUiOltdfQ%3D%3D)

You can download the AWS Serverless MCP Server from GitHub. To get started using your favorite code assistant with MCP support, like Q Developer, Cursor or Cline.

Add the following code to your MCP client configuration. The Serverless MCP server uses the default AWS profile by default. Specify a value in AWS_PROFILE if you want to use a different profile. Similarly, adjust the AWS Region and log level values as needed.
```json
{
  "mcpServers": {
    "awslabs.aws-serverless-mcp-server": {
      "command": "uvx",
      "args": [
        "awslabs.aws-serverless-mcp-server@latest",
        "--allow-write",
        "--allow-sensitive-data-access"
      ],
      "env": {
          "AWS_PROFILE": "your-aws-profile",
          "AWS_REGION": "us-east-1"
        },
      "disabled": false,
      "autoApprove": []
    }
  }
}
```

### Using temporary credentials
```json
{
  "mcpServers": {
    "awslabs.aws-serverless-mcp-server": {
        "command": "uvx",
        "args": ["awslabs.aws-serverless-mcp-server@latest"],
        "env": {
          "AWS_ACCESS_KEY_ID": "your-temporary-access-key",
          "AWS_SECRET_ACCESS_KEY": "your-temporary-secret-key",
          "AWS_SESSION_TOKEN": "your-session-token",
          "AWS_REGION": "us-east-1"
        },
        "disabled": false,
        "autoApprove": []
    }
  }
}
```

## Serverless MCP Server configuration options
### `--allow-write`
Enables write access mode, which allows mutating operations and creation of public resources. By default, the server runs in read-only mode, which restricts operations to only perform read actions, preventing any changes to AWS resources.

Mutating operations:

- sam_deploy: Deploys a SAM application into AWS Cloud using CloudFormation
- deploy_webapp: Generates SAM template and deploys a web application into AWS CloudFormation. Creates public resources, including Route 53 DNS records, and CloudFront distributions
- configure_domain: Create custom domain using Route53 and ACM certificate and associates it with the project's CloudFront distribution
- update_frontend: Uploads frontend assets to S3 bucket


### `--allow-sensitive-data-access`
Enables access to sensitive data such as logs. By default, the server restricts access to sensitive data.

Operations returning sensitive data:

- sam_logs: Returns Lambda function logs and API Gateway logs

## Local development

To make changes to this MCP locally and run it:

1. Clone this repository:
   ```bash
   git clone https://github.com/awslabs/mcp.git
   cd mcp/src/aws-serverless-mcp-server
   ```

2. Install dependencies:
   ```bash
   pip install -e .
   ```

3. Configure AWS credentials:
   - Ensure you have AWS credentials configured in `~/.aws/credentials` or set the appropriate environment variables.
   - You can also set the AWS_PROFILE and AWS_REGION environment variables.

4. Run the server:
   ```bash
   python -m awslabs.aws_serverless_mcp_server.server
   ```

5. To use this MCP server with AI clients, add the following to your MCP configuration:
```json
{
  "mcpServers": {
    "awslabs.aws-serverless-mcp-server": {
        "command": "mcp/src/aws-serverless-mcp-server/bin/awslabs.aws-serverless-mcp-server/",
        "env": {
          "AWS_PROFILE": "your-aws-profile",
          "AWS_REGION": "us-east-1",
        },
        "disabled": false,
        "autoApprove": []
    }
  }
}
```

## Environment variables

By default, the default AWS profile is used. However, the server can be configured through environment variables in the MCP configuration:

- `AWS_PROFILE`: AWS CLI profile to use for credentials
- `AWS_REGION`: AWS region to use (default: us-east-1)
- `AWS_ACCESS_KEY_ID` and `AWS_SECRET_ACCESS_KEY`: Explicit AWS credentials (alternative to AWS_PROFILE)
- `AWS_SESSION_TOKEN`: Session token for temporary credentials (used with AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY)
- `FASTMCP_LOG_LEVEL`: Logging level (ERROR, WARNING, INFO, DEBUG)

## Available resources

The server provides the following resources:

### Template resources
- `template://list`: List of available deployment templates.
- `template://{template_name}`: Details of a specific deployment template.

### Deployment resources
- `deployment://list`: List of all AWS deployments managed by the MCP server.
- `deployment://{project_name}`: Details about a specific deployment.

## Available tools

The server exposes deployment capabilities as tools:

### sam_init

Initializes a serverless application using AWS SAM (Serverless Application Model) CLI.
This tool creates a new SAM project that consists of:
- An AWS SAM template to define your infrastructure code
- A folder structure that organizes your application
- Configuration for your AWS Lambda functions
You should have AWS SAM CLI installed and configured in your environment.

**Parameters:**

- `project_name` (required): Name of the SAM project to create
- `runtime` (required): Runtime environment for the Lambda function
- `project_directory` (required): Absolute path to directory where the SAM application will be initialized
- `dependency_manager` (required): Dependency manager for the Lambda function
- `architecture` (default: x86_64): Architecture for the Lambda function
- `package_type` (default: Zip): Package type for the Lambda function
- `application_template` (default: hello-world): Template for the SAM application, e.g., hello-world, quick-start, etc.
- `application_insights`: Activate Amazon CloudWatch Application Insights monitoring
- `no_application_insights`: Deactivate Amazon CloudWatch Application Insights monitoring
- `base_image`: Base image for the application when package type is Image
- `config_env`: Environment name specifying default parameter values in the configuration file
- `config_file`: Absolute path to configuration file containing default parameter values
- `debug`: Turn on debug logging
- `extra_content`: Override custom parameters in the template's cookiecutter.json
- `location`: Template or application location (Git, HTTP/HTTPS, zip file path)
- `save_params`: Save parameters to the SAM configuration file
- `tracing`: Activate AWS X-Ray tracing for Lambda functions
- `no_tracing`: Deactivate AWS X-Ray tracing for Lambda functions

### sam_build

Builds a serverless application using AWS SAM (Serverless Application Model) CLI.
This command compiles your Lambda function code, creates deployment artifacts, and prepares your application for deployment.
Before running this tool, the application should already be initialized with 'sam_init' tool.
You should have AWS SAM CLI installed and configured in your environment.

**Parameters:**

- `project_directory` (required): Absolute path to directory containing the SAM project
- `template_file`: Absolute path to the template file (defaults to template.yaml)
- `base_dir`: Resolve relative paths to function's source code with respect to this folder
- `build_dir`: The absolute path to a directory where the built artifacts are stored
- `use_container` (default: false): Use a container to build the function
- `no_use_container` (default: false): Run build in local machine instead of Docker container
- `parallel` (default: true): Build your AWS SAM application in parallel
- `container_env_vars`: Environment variables to pass to the build container
- `container_env_var_file`: Absolute path to a JSON file containing container environment variables
- `build_image`: The URI of the container image that you want to pull for the build
- `debug` (default: false): Turn on debug logging
- `manifest`: Absolute path to a custom dependency manifest file (e.g., package.json) instead of the default
- `parameter_overrides`: CloudFormation parameter overrides encoded as key-value pairs
- `region`: AWS Region to deploy to (e.g., us-east-1)
- `save_params` (default: false): Save parameters to the SAM configuration file
- `profile`: AWS profile to use

### sam_deploy

Deploys a serverless application using AWS SAM (Serverless Application Model) CLI.
This command deploys your application to AWS CloudFormation.
Every time an appplication is deployed, it should be built with 'sam_build' tool before.
You should have AWS SAM CLI installed and configured in your environment.

**Parameters:**

- `application_name` (required): Name of the application to be deployed
- `project_directory` (required): Absolute path to directory containing the SAM project (defaults to current directory)
- `template_file`: Absolute path to the template file (defaults to template.yaml)
- `s3_bucket`: S3 bucket to deploy artifacts to
- `s3_prefix`: S3 prefix for the artifacts
- `region`: AWS region to deploy to
- `profile`: AWS profile to use
- `parameter_overrides`: CloudFormation parameter overrides encoded as key-value pairs
- `capabilities` (default: ["CAPABILITY_IAM"]): IAM capabilities required for the deployment
- `config_file`: Absolute path to the SAM configuration file
- `config_env`: Environment name specifying default parameter values in the configuration file
- `metadata`: Metadata to include with the stack
- `tags`: Tags to apply to the stack
- `resolve_s3` (default: false): Automatically create an S3 bucket for deployment artifacts
- `debug` (default: false): Turn on debug logging

### sam_logs

Fetches CloudWatch logs that are generated by resources in a SAM application. Use this tool
to help debug invocation failures and find root causes.

**Parameters:**

- `resource_name`: Name of the resource to fetch logs for (logical ID in CloudFormation/SAM template)
- `stack_name`: Name of the CloudFormation stack
- `start_time`: Fetch logs starting from this time (format: 5mins ago, tomorrow, or YYYY-MM-DD HH:MM:SS)
- `end_time`: Fetch logs up until this time (format: 5mins ago, tomorrow, or YYYY-MM-DD HH:MM:SS)
- `output` (default: text): Output format (text or json)
- `region`: AWS region to use (e.g., us-east-1)
- `profile`: AWS profile to use
- `cw_log_group`: CloudWatch Logs log groups to fetch logs from
- `config_env`: Environment name specifying default parameter values in the configuration file
- `config_file`: Absolute path to configuration file containing default parameter values
- `save_params` (default: false): Save parameters to the SAM configuration file

### sam_local_invoke

Locally invokes a Lambda function using AWS SAM CLI.
This command runs your Lambda function locally in a Docker container that simulates the AWS Lambda environment.
You can use this tool to test your Lambda functions before deploying them to AWS. Docker must be installed and running in your environment.

**Parameters:**

- `project_directory` (required): Absolute path to directory containing the SAM project
- `resource_name` (required): Name of the Lambda function to invoke locally
- `template_file`: Absolute path to the SAM template file (defaults to template.yaml)
- `event_file`: Absolute path to a JSON file containing event data
- `event_data`: JSON string containing event data (alternative to event_file)
- `environment_variables_file`: Absolute path to a JSON file containing environment variables to pass to the function
- `docker_network`: Docker network to run the Lambda function in
- `container_env_vars`: Environment variables to pass to the container
- `parameter`: Override parameters from the template file
- `log_file`: Absolute path to a file where the function logs will be written
- `layer_cache_basedir`: Directory where the layers will be cached
- `region`: AWS region to use (e.g., us-east-1)
- `profile`: AWS profile to use

### get_iac_guidance

Returns guidance on selecting an infrastructure as code (IaC) platform to deploy Serverless application to AWS.
Choices include AWS SAM, CDK, and CloudFormation. Use this tool to decide which IaC tool to use for your Lambda deployments
based on your specific use case and requirements.

**Parameters:**

- `iac_tool` (default: CloudFormation): IaC tool to use (CloudFormation, SAM, CDK, Terraform)
- `include_examples` (default: true): Whether to include examples

### get_lambda_event_schemas

Returns AWS Lambda event schemas for different event sources (e.g. s3, sns, apigw) and programming languages.  Each Lambda event source defines its own schema and language-specific types, which should be used in
the Lambda function handler to correctly parse the event data. If you cannot find a schema for your event source, you can directly parse
the event data as a JSON object. For EventBridge events,
you must use the list_registries, search_schema, and describe_schema tools to access the schema registry directly, get schema definitions,
and generate code processing logic.

**Parameters:**

- `event_source` (required): Event source (e.g., api-gw, s3, sqs, sns, kinesis, eventbridge, dynamodb)
- `runtime` (required): Programming language for the schema references (e.g., go, nodejs, python, java)

### get_lambda_guidance

Use this tool to determine if AWS Lambda is suitable platform to deploy an application.
Returns a comprehensive guide on when to choose AWS Lambda as a deployment platform.
It includes scenarios when to use and not use Lambda, advantages and disadvantages,
decision criteria, and specific guidance for various use cases.

**Parameters:**

- `use_case` (required): Description of the use case
- `include_examples` (default: true): Whether to include examples

### deploy_webapp

Deploy web applications to AWS Serverless, including Lambda as compute, DynamoDB as databases, API GW, ACM Certificates, and Route 53 DNS records.
This tool uses the Lambda Web Adapter framework so that applications can be written in a standard web framework like Express or Next.js can be easily
deployed to Lambda. You do not need to use integrate the code with any adapter framework when using this tool.

**Parameters:**

- `deployment_type` (required): Type of deployment (backend, frontend, fullstack)
- `project_name` (required): Project name
- `project_root` (required): Absolute path to the project root directory
- `region`: AWS Region to deploy to (e.g., us-east-1)
- `backend_configuration`: Backend configuration
- `frontend_configuration`: Frontend configuration

### configure_domain

Configures a custom domain for a deployed web application on AWS Serverless.
This tool sets up Route 53 DNS records, ACM certificates, and CloudFront custom domain mappings as needed.
Use this tool after deploying your web application to associate it with your own domain name.

**Parameters:**

- `project_name` (required): Project name
- `domain_name` (required): Custom domain name
- `create_certificate` (default: true): Whether to create a ACM certificate
- `create_route53_record` (default: true): Whether to create a Route 53 record
- `region`: AWS region to use (e.g., us-east-1)

### webapp_deployment_help

Get help information about using the deploy_webapp to perform web application deployments.
If deployment_type is provided, returns help information for that deployment type.
Otherwise, returns a list of deployments and general help information.

**Parameters:**

- `deployment_type` (required): Type of deployment to get help information for (backend, frontend, fullstack)

### get_metrics

Retrieves CloudWatch metrics from a deployed web application. Use this tool get metrics
on error rates, latency, concurrency, etc.

**Parameters:**

- `project_name` (required): Project name
- `start_time`: Start time for metrics (ISO format)
- `end_time`: End time for metrics (ISO format)
- `period` (default: 60): Period for metrics in seconds
- `resources` (default: ["lambda", "apiGateway"]): Resources to get metrics for
- `region`: AWS region to use (e.g., us-east-1)
- `stage` (default: "prod"): API Gateway stage

### update_webapp_frontend

Update the frontend assets of a deployed web application.
This tool uploads new frontend assets to S3 and optionally invalidates the CloudFront cache.

**Parameters:**

- `project_name` (required): Project name
- `project_root` (required): Project root
- `built_assets_path` (required): Absolute path to pre-built frontend assets
- `invalidate_cache` (default: true): Whether to invalidate the CloudFront cache
- `region`: AWS region to use (e.g., us-east-1)

### deploy_serverless_app_help

Provides instructions on how to deploy a serverless application to AWS Lambda.
Deploying a Lambda application requires generating IaC templates, building the code, packaging
the code, selecting a deployment tool, and executing the deployment commands. For deploying
web applications specifically, use the deploy_webapp tool.

**Parameters:**

- `application_type` (required): Type of application to deploy (event_driven, backend, fullstack)

### get_serverless_templates

Returns example SAM templates from the Serverless Land GitHub repo. Use this tool to get
examples for building serverless applications with AWS Lambda and best practices of serverless architecture.

**Parameters:**

- `template_type` (required): Template type (e.g., API, ETL, Web)
- `runtime`: Lambda runtime (e.g., nodejs22.x, python3.13)

### Schema Tools

#### list_registries

Lists the registries in your account.

**Parameters:**

- `registry_name_prefix`: Limits results to registries starting with this prefix
- `scope`: Filter by registry scope (LOCAL or AWS)
- `limit`: Maximum number of results to return (1-100)
- `next_token`: Pagination token for subsequent requests

#### search_schema

Search for schemas in a registry using keywords.

**Parameters:**

- `keywords` (required): Keywords to search for (prefix with "aws." for service events)
- `registry_name` (required): Registry to search in (use "aws.events" for AWS service events)
- `limit`: Maximum number of results (1-100)
- `next_token`: Pagination token

#### describe_schema

Retrieve the schema definition for the specified schema version.

**Parameters:**

- `registry_name` (required): Registry containing the schema (use "aws.events" for AWS service events)
- `schema_name` (required): Name of schema to retrieve (e.g., "aws.s3@ObjectCreated" for S3 events)
- `schema_version`: Version number of schema (latest by default)

## Example usage

### Creating a Lambda Function with SAM

Example user prompt:

```
I want to build a simple backend for a todo app using Python and deploy it to the cloud with AWS Serverless. Can you help me create a new project called my-todo-app. It should include basic functionality to add and list todos. Once it's set up, please build and deploy it with all the necessary permissions. I don’t need to review the changeset before deployment.
```

This prompt would trigger the AI assistant to:
1. Initialize a new SAM project using a template.
2. Make modifications to code and infra for a todo app.
3. Build the SAM application
4. Deploy the application with CAPABILITY_IAM permissions

### Deploying a Web Application

Example user prompt:

```
I have a full-stack web app built with Node.js called my-web-app, and I want to deploy it to the cloud using AWS. Everything’s ready — both frontend and backend. Can you set it up and deploy it with AWS Lambda so it's live and works smoothly?
```

This prompt would trigger the AI assistant to use the deploy_webapp to deploy the full stack application with the specified configuration.

### Working with EventBridge Schemas

Example user prompt:

```
I need to create a Lambda function that processes autoscaling events. Can you help me find the right event schema and implement type-safe event handling?
```

This prompt would trigger the AI assistant to:
1. Search for autoscaling event schemas in aws.events registry using search_schema
2. Retrieve complete schema definition using describe_schema
3. Generate type-safe handler code based on schema structure
4. Implement validation for required fields

## Security features
1. **AWS Authentication**: Uses AWS credentials from the environment for secure authentication
2. **TLS Verification**: Enforces TLS verification for all AWS API calls
3. **Resource Tagging**: Tags all created resources for traceability
4. **Least Privilege**: Uses IAM roles with appropriate permissions for CloudFormation templates

## Security considerations

### Production use cases
The AWS Serverless MCP Server can be used for production environments with proper security controls in place. For production use cases, consider the following:

* **Read-Only Mode by Default**: The server runs in read-only mode by default, which is safer for production environments. Only explicitly enable write access when necessary.
* **Disable auto-approve**: Require the user to approve each time the AI assitant executes a tool

### Role scoping recommendations
To follow security best practices:

1. **Create dedicated IAM roles** to be used by the AWS Serverless MCP Server with the principle of least privilege
2. **Use separate roles** for read-only and write operations
3. **Implement resource tagging** to limit actions to resources created by the server
4. **Enable AWS CloudTrail** to audit all API calls made by the server
5. **Regularly review** the permissions granted to the server's IAM role
6. **Use IAM Access Analyzer** to identify unused permissions that can be removed

### Sensitive information handling
**IMPORTANT**: Do not pass secrets or sensitive information via allowed input mechanisms:

- Do not include secrets or credentials in CloudFormation templates
- Do not pass sensitive information directly in the prompt to the model

## Links

- [Homepage](https://awslabs.github.io/mcp/)
- [Documentation](https://awslabs.github.io/mcp/servers/aws-serverless-mcp-server/)
- [Source Code](https://github.com/awslabs/mcp.git)
- [Bug Tracker](https://github.com/awslabs/mcp/issues)
- [Changelog](https://github.com/awslabs/mcp/blob/main/src/aws-serverless-mcp-server/CHANGELOG.md)

## License

Apache-2.0

            

Raw data

            {
    "_id": null,
    "home_page": null,
    "name": "awslabs.aws-serverless-mcp-server",
    "maintainer": null,
    "docs_url": null,
    "requires_python": ">=3.10",
    "maintainer_email": null,
    "keywords": null,
    "author": "Amazon Web Services",
    "author_email": "AWSLabs MCP <203918161+awslabs-mcp@users.noreply.github.com>",
    "download_url": "https://files.pythonhosted.org/packages/f5/a9/07fe871772ebf9f6d4fc19ddf16d956f221f98908784796646cc59b0ec2b/awslabs_aws_serverless_mcp_server-0.1.6.tar.gz",
    "platform": null,
    "description": "# AWS Serverless MCP Server\n\n## Overview\n\nThe AWS Serverless Model Context Protocol (MCP) Server is an open-source tool that combines AI assistance with serverless expertise to streamline how developers build serverless applications. It provides contextual guidance specific to serverless development, helping developers make informed decisions about architecture, implementation, and deployment throughout the entire application development lifecycle. With AWS Serverless MCP, developers can build reliable, efficient, and production-ready serverless applications with confidence.\n\nKey benefits of the Serverless MCP Server include:\n\n- AI-powered serverless development: Provides rich contextual information to AI coding assistants to ensure your serverless application aligns with AWS best practices.\n- Comprehensive tooling: Offers tools for initialization, deployment, monitoring, and troubleshooting of serverless applications.\n- Architecture guidance: Helps evaluate design choices and select optimal serverless patterns based on application needs. Offers recommendations on event sources, function boundaries, and service integrations.\n- Operational best practices: Ensures alignment with AWS architectural principles. Suggests effective use of AWS services for event processing, data persistence, and service communication, and guides implementation of security controls, performance tuning, and cost optimization.\n- Security-first approach: Implements built-in guardrails with read-only defaults and controlled access to sensitive data.\n\n## Features\nThe set of tools provided by the Serverless MCP server can be broken down into four categories:\n\n1. Serverless Application Lifecycle\n    - Initialize, build, and deploy Serverless Application Model (SAM) applications with SAM CLI\n    - Test Lambda functions locally and remotely\n2. Web Application Deployment & Management\n    - Deploy full-stack, frontend, and backend web applications onto AWS Serverless using Lambda Web Adapter\n    - Update frontend assets and optionally invaliate CloudFront caches\n    - Create custom domain names, including certificate and DNS setup\n3. Observability\n    - Retrieve and logs and metrics of serverless resources\n4. Guidance, Templates, and Deployment Help\n    - Provides guidance on AWS Lambda use-cases, selecting an IaC framework, and deployment process onto AWS Serverless\n    - Provides sample SAM templates for different serverless application types from [Serverless Land](https://serverlessland.com/)\n    - Provides schema types for different Lambda event sources and runtimes\n    - Provides schema registry management and discovery for AWS EventBridge events\n    - Enables type-safe Lambda function development with complete event schemas\n\n## Prerequisites\n- Have an AWS account with [credentials configured](https://docs.aws.amazon.com/cli/v1/userguide/cli-configure-files.html)\n- Install uv from [Astral](https://docs.astral.sh/uv/getting-started/installation/) or the [GitHub README](https://github.com/astral-sh/uv#installation)\n- Install Python 3.10 or newer using uv python install 3.10 (or a more recent version)\n- Install [AWS SAM CLI](https://docs.aws.amazon.com/serverless-application-model/latest/developerguide/install-sam-cli.html)\n- Install [AWS CLI](https://docs.aws.amazon.com/cli/latest/userguide/getting-started-install.html)\n\n## Installation\n\n[![Install MCP Server](https://cursor.com/deeplink/mcp-install-light.svg)](https://cursor.com/install-mcp?name=awslabs.aws-serverless-mcp-server&config=eyJjb21tYW5kIjoidXZ4IGF3c2xhYnMuYXdzLXNlcnZlcmxlc3MtbWNwLXNlcnZlckBsYXRlc3QgLS1hbGxvdy13cml0ZSAtLWFsbG93LXNlbnNpdGl2ZS1kYXRhLWFjY2VzcyIsImVudiI6eyJBV1NfUFJPRklMRSI6InlvdXItYXdzLXByb2ZpbGUiLCJBV1NfUkVHSU9OIjoidXMtZWFzdC0xIn0sImRpc2FibGVkIjpmYWxzZSwiYXV0b0FwcHJvdmUiOltdfQ%3D%3D)\n\nYou can download the AWS Serverless MCP Server from GitHub. To get started using your favorite code assistant with MCP support, like Q Developer, Cursor or Cline.\n\nAdd the following code to your MCP client configuration. The Serverless MCP server uses the default AWS profile by default. Specify a value in AWS_PROFILE if you want to use a different profile. Similarly, adjust the AWS Region and log level values as needed.\n```json\n{\n  \"mcpServers\": {\n    \"awslabs.aws-serverless-mcp-server\": {\n      \"command\": \"uvx\",\n      \"args\": [\n        \"awslabs.aws-serverless-mcp-server@latest\",\n        \"--allow-write\",\n        \"--allow-sensitive-data-access\"\n      ],\n      \"env\": {\n          \"AWS_PROFILE\": \"your-aws-profile\",\n          \"AWS_REGION\": \"us-east-1\"\n        },\n      \"disabled\": false,\n      \"autoApprove\": []\n    }\n  }\n}\n```\n\n### Using temporary credentials\n```json\n{\n  \"mcpServers\": {\n    \"awslabs.aws-serverless-mcp-server\": {\n        \"command\": \"uvx\",\n        \"args\": [\"awslabs.aws-serverless-mcp-server@latest\"],\n        \"env\": {\n          \"AWS_ACCESS_KEY_ID\": \"your-temporary-access-key\",\n          \"AWS_SECRET_ACCESS_KEY\": \"your-temporary-secret-key\",\n          \"AWS_SESSION_TOKEN\": \"your-session-token\",\n          \"AWS_REGION\": \"us-east-1\"\n        },\n        \"disabled\": false,\n        \"autoApprove\": []\n    }\n  }\n}\n```\n\n## Serverless MCP Server configuration options\n### `--allow-write`\nEnables write access mode, which allows mutating operations and creation of public resources. By default, the server runs in read-only mode, which restricts operations to only perform read actions, preventing any changes to AWS resources.\n\nMutating operations:\n\n- sam_deploy: Deploys a SAM application into AWS Cloud using CloudFormation\n- deploy_webapp: Generates SAM template and deploys a web application into AWS CloudFormation. Creates public resources, including Route 53 DNS records, and CloudFront distributions\n- configure_domain: Create custom domain using Route53 and ACM certificate and associates it with the project's CloudFront distribution\n- update_frontend: Uploads frontend assets to S3 bucket\n\n\n### `--allow-sensitive-data-access`\nEnables access to sensitive data such as logs. By default, the server restricts access to sensitive data.\n\nOperations returning sensitive data:\n\n- sam_logs: Returns Lambda function logs and API Gateway logs\n\n## Local development\n\nTo make changes to this MCP locally and run it:\n\n1. Clone this repository:\n   ```bash\n   git clone https://github.com/awslabs/mcp.git\n   cd mcp/src/aws-serverless-mcp-server\n   ```\n\n2. Install dependencies:\n   ```bash\n   pip install -e .\n   ```\n\n3. Configure AWS credentials:\n   - Ensure you have AWS credentials configured in `~/.aws/credentials` or set the appropriate environment variables.\n   - You can also set the AWS_PROFILE and AWS_REGION environment variables.\n\n4. Run the server:\n   ```bash\n   python -m awslabs.aws_serverless_mcp_server.server\n   ```\n\n5. To use this MCP server with AI clients, add the following to your MCP configuration:\n```json\n{\n  \"mcpServers\": {\n    \"awslabs.aws-serverless-mcp-server\": {\n        \"command\": \"mcp/src/aws-serverless-mcp-server/bin/awslabs.aws-serverless-mcp-server/\",\n        \"env\": {\n          \"AWS_PROFILE\": \"your-aws-profile\",\n          \"AWS_REGION\": \"us-east-1\",\n        },\n        \"disabled\": false,\n        \"autoApprove\": []\n    }\n  }\n}\n```\n\n## Environment variables\n\nBy default, the default AWS profile is used. However, the server can be configured through environment variables in the MCP configuration:\n\n- `AWS_PROFILE`: AWS CLI profile to use for credentials\n- `AWS_REGION`: AWS region to use (default: us-east-1)\n- `AWS_ACCESS_KEY_ID` and `AWS_SECRET_ACCESS_KEY`: Explicit AWS credentials (alternative to AWS_PROFILE)\n- `AWS_SESSION_TOKEN`: Session token for temporary credentials (used with AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY)\n- `FASTMCP_LOG_LEVEL`: Logging level (ERROR, WARNING, INFO, DEBUG)\n\n## Available resources\n\nThe server provides the following resources:\n\n### Template resources\n- `template://list`: List of available deployment templates.\n- `template://{template_name}`: Details of a specific deployment template.\n\n### Deployment resources\n- `deployment://list`: List of all AWS deployments managed by the MCP server.\n- `deployment://{project_name}`: Details about a specific deployment.\n\n## Available tools\n\nThe server exposes deployment capabilities as tools:\n\n### sam_init\n\nInitializes a serverless application using AWS SAM (Serverless Application Model) CLI.\nThis tool creates a new SAM project that consists of:\n- An AWS SAM template to define your infrastructure code\n- A folder structure that organizes your application\n- Configuration for your AWS Lambda functions\nYou should have AWS SAM CLI installed and configured in your environment.\n\n**Parameters:**\n\n- `project_name` (required): Name of the SAM project to create\n- `runtime` (required): Runtime environment for the Lambda function\n- `project_directory` (required): Absolute path to directory where the SAM application will be initialized\n- `dependency_manager` (required): Dependency manager for the Lambda function\n- `architecture` (default: x86_64): Architecture for the Lambda function\n- `package_type` (default: Zip): Package type for the Lambda function\n- `application_template` (default: hello-world): Template for the SAM application, e.g., hello-world, quick-start, etc.\n- `application_insights`: Activate Amazon CloudWatch Application Insights monitoring\n- `no_application_insights`: Deactivate Amazon CloudWatch Application Insights monitoring\n- `base_image`: Base image for the application when package type is Image\n- `config_env`: Environment name specifying default parameter values in the configuration file\n- `config_file`: Absolute path to configuration file containing default parameter values\n- `debug`: Turn on debug logging\n- `extra_content`: Override custom parameters in the template's cookiecutter.json\n- `location`: Template or application location (Git, HTTP/HTTPS, zip file path)\n- `save_params`: Save parameters to the SAM configuration file\n- `tracing`: Activate AWS X-Ray tracing for Lambda functions\n- `no_tracing`: Deactivate AWS X-Ray tracing for Lambda functions\n\n### sam_build\n\nBuilds a serverless application using AWS SAM (Serverless Application Model) CLI.\nThis command compiles your Lambda function code, creates deployment artifacts, and prepares your application for deployment.\nBefore running this tool, the application should already be initialized with 'sam_init' tool.\nYou should have AWS SAM CLI installed and configured in your environment.\n\n**Parameters:**\n\n- `project_directory` (required): Absolute path to directory containing the SAM project\n- `template_file`: Absolute path to the template file (defaults to template.yaml)\n- `base_dir`: Resolve relative paths to function's source code with respect to this folder\n- `build_dir`: The absolute path to a directory where the built artifacts are stored\n- `use_container` (default: false): Use a container to build the function\n- `no_use_container` (default: false): Run build in local machine instead of Docker container\n- `parallel` (default: true): Build your AWS SAM application in parallel\n- `container_env_vars`: Environment variables to pass to the build container\n- `container_env_var_file`: Absolute path to a JSON file containing container environment variables\n- `build_image`: The URI of the container image that you want to pull for the build\n- `debug` (default: false): Turn on debug logging\n- `manifest`: Absolute path to a custom dependency manifest file (e.g., package.json) instead of the default\n- `parameter_overrides`: CloudFormation parameter overrides encoded as key-value pairs\n- `region`: AWS Region to deploy to (e.g., us-east-1)\n- `save_params` (default: false): Save parameters to the SAM configuration file\n- `profile`: AWS profile to use\n\n### sam_deploy\n\nDeploys a serverless application using AWS SAM (Serverless Application Model) CLI.\nThis command deploys your application to AWS CloudFormation.\nEvery time an appplication is deployed, it should be built with 'sam_build' tool before.\nYou should have AWS SAM CLI installed and configured in your environment.\n\n**Parameters:**\n\n- `application_name` (required): Name of the application to be deployed\n- `project_directory` (required): Absolute path to directory containing the SAM project (defaults to current directory)\n- `template_file`: Absolute path to the template file (defaults to template.yaml)\n- `s3_bucket`: S3 bucket to deploy artifacts to\n- `s3_prefix`: S3 prefix for the artifacts\n- `region`: AWS region to deploy to\n- `profile`: AWS profile to use\n- `parameter_overrides`: CloudFormation parameter overrides encoded as key-value pairs\n- `capabilities` (default: [\"CAPABILITY_IAM\"]): IAM capabilities required for the deployment\n- `config_file`: Absolute path to the SAM configuration file\n- `config_env`: Environment name specifying default parameter values in the configuration file\n- `metadata`: Metadata to include with the stack\n- `tags`: Tags to apply to the stack\n- `resolve_s3` (default: false): Automatically create an S3 bucket for deployment artifacts\n- `debug` (default: false): Turn on debug logging\n\n### sam_logs\n\nFetches CloudWatch logs that are generated by resources in a SAM application. Use this tool\nto help debug invocation failures and find root causes.\n\n**Parameters:**\n\n- `resource_name`: Name of the resource to fetch logs for (logical ID in CloudFormation/SAM template)\n- `stack_name`: Name of the CloudFormation stack\n- `start_time`: Fetch logs starting from this time (format: 5mins ago, tomorrow, or YYYY-MM-DD HH:MM:SS)\n- `end_time`: Fetch logs up until this time (format: 5mins ago, tomorrow, or YYYY-MM-DD HH:MM:SS)\n- `output` (default: text): Output format (text or json)\n- `region`: AWS region to use (e.g., us-east-1)\n- `profile`: AWS profile to use\n- `cw_log_group`: CloudWatch Logs log groups to fetch logs from\n- `config_env`: Environment name specifying default parameter values in the configuration file\n- `config_file`: Absolute path to configuration file containing default parameter values\n- `save_params` (default: false): Save parameters to the SAM configuration file\n\n### sam_local_invoke\n\nLocally invokes a Lambda function using AWS SAM CLI.\nThis command runs your Lambda function locally in a Docker container that simulates the AWS Lambda environment.\nYou can use this tool to test your Lambda functions before deploying them to AWS. Docker must be installed and running in your environment.\n\n**Parameters:**\n\n- `project_directory` (required): Absolute path to directory containing the SAM project\n- `resource_name` (required): Name of the Lambda function to invoke locally\n- `template_file`: Absolute path to the SAM template file (defaults to template.yaml)\n- `event_file`: Absolute path to a JSON file containing event data\n- `event_data`: JSON string containing event data (alternative to event_file)\n- `environment_variables_file`: Absolute path to a JSON file containing environment variables to pass to the function\n- `docker_network`: Docker network to run the Lambda function in\n- `container_env_vars`: Environment variables to pass to the container\n- `parameter`: Override parameters from the template file\n- `log_file`: Absolute path to a file where the function logs will be written\n- `layer_cache_basedir`: Directory where the layers will be cached\n- `region`: AWS region to use (e.g., us-east-1)\n- `profile`: AWS profile to use\n\n### get_iac_guidance\n\nReturns guidance on selecting an infrastructure as code (IaC) platform to deploy Serverless application to AWS.\nChoices include AWS SAM, CDK, and CloudFormation. Use this tool to decide which IaC tool to use for your Lambda deployments\nbased on your specific use case and requirements.\n\n**Parameters:**\n\n- `iac_tool` (default: CloudFormation): IaC tool to use (CloudFormation, SAM, CDK, Terraform)\n- `include_examples` (default: true): Whether to include examples\n\n### get_lambda_event_schemas\n\nReturns AWS Lambda event schemas for different event sources (e.g. s3, sns, apigw) and programming languages.  Each Lambda event source defines its own schema and language-specific types, which should be used in\nthe Lambda function handler to correctly parse the event data. If you cannot find a schema for your event source, you can directly parse\nthe event data as a JSON object. For EventBridge events,\nyou must use the list_registries, search_schema, and describe_schema tools to access the schema registry directly, get schema definitions,\nand generate code processing logic.\n\n**Parameters:**\n\n- `event_source` (required): Event source (e.g., api-gw, s3, sqs, sns, kinesis, eventbridge, dynamodb)\n- `runtime` (required): Programming language for the schema references (e.g., go, nodejs, python, java)\n\n### get_lambda_guidance\n\nUse this tool to determine if AWS Lambda is suitable platform to deploy an application.\nReturns a comprehensive guide on when to choose AWS Lambda as a deployment platform.\nIt includes scenarios when to use and not use Lambda, advantages and disadvantages,\ndecision criteria, and specific guidance for various use cases.\n\n**Parameters:**\n\n- `use_case` (required): Description of the use case\n- `include_examples` (default: true): Whether to include examples\n\n### deploy_webapp\n\nDeploy web applications to AWS Serverless, including Lambda as compute, DynamoDB as databases, API GW, ACM Certificates, and Route 53 DNS records.\nThis tool uses the Lambda Web Adapter framework so that applications can be written in a standard web framework like Express or Next.js can be easily\ndeployed to Lambda. You do not need to use integrate the code with any adapter framework when using this tool.\n\n**Parameters:**\n\n- `deployment_type` (required): Type of deployment (backend, frontend, fullstack)\n- `project_name` (required): Project name\n- `project_root` (required): Absolute path to the project root directory\n- `region`: AWS Region to deploy to (e.g., us-east-1)\n- `backend_configuration`: Backend configuration\n- `frontend_configuration`: Frontend configuration\n\n### configure_domain\n\nConfigures a custom domain for a deployed web application on AWS Serverless.\nThis tool sets up Route 53 DNS records, ACM certificates, and CloudFront custom domain mappings as needed.\nUse this tool after deploying your web application to associate it with your own domain name.\n\n**Parameters:**\n\n- `project_name` (required): Project name\n- `domain_name` (required): Custom domain name\n- `create_certificate` (default: true): Whether to create a ACM certificate\n- `create_route53_record` (default: true): Whether to create a Route 53 record\n- `region`: AWS region to use (e.g., us-east-1)\n\n### webapp_deployment_help\n\nGet help information about using the deploy_webapp to perform web application deployments.\nIf deployment_type is provided, returns help information for that deployment type.\nOtherwise, returns a list of deployments and general help information.\n\n**Parameters:**\n\n- `deployment_type` (required): Type of deployment to get help information for (backend, frontend, fullstack)\n\n### get_metrics\n\nRetrieves CloudWatch metrics from a deployed web application. Use this tool get metrics\non error rates, latency, concurrency, etc.\n\n**Parameters:**\n\n- `project_name` (required): Project name\n- `start_time`: Start time for metrics (ISO format)\n- `end_time`: End time for metrics (ISO format)\n- `period` (default: 60): Period for metrics in seconds\n- `resources` (default: [\"lambda\", \"apiGateway\"]): Resources to get metrics for\n- `region`: AWS region to use (e.g., us-east-1)\n- `stage` (default: \"prod\"): API Gateway stage\n\n### update_webapp_frontend\n\nUpdate the frontend assets of a deployed web application.\nThis tool uploads new frontend assets to S3 and optionally invalidates the CloudFront cache.\n\n**Parameters:**\n\n- `project_name` (required): Project name\n- `project_root` (required): Project root\n- `built_assets_path` (required): Absolute path to pre-built frontend assets\n- `invalidate_cache` (default: true): Whether to invalidate the CloudFront cache\n- `region`: AWS region to use (e.g., us-east-1)\n\n### deploy_serverless_app_help\n\nProvides instructions on how to deploy a serverless application to AWS Lambda.\nDeploying a Lambda application requires generating IaC templates, building the code, packaging\nthe code, selecting a deployment tool, and executing the deployment commands. For deploying\nweb applications specifically, use the deploy_webapp tool.\n\n**Parameters:**\n\n- `application_type` (required): Type of application to deploy (event_driven, backend, fullstack)\n\n### get_serverless_templates\n\nReturns example SAM templates from the Serverless Land GitHub repo. Use this tool to get\nexamples for building serverless applications with AWS Lambda and best practices of serverless architecture.\n\n**Parameters:**\n\n- `template_type` (required): Template type (e.g., API, ETL, Web)\n- `runtime`: Lambda runtime (e.g., nodejs22.x, python3.13)\n\n### Schema Tools\n\n#### list_registries\n\nLists the registries in your account.\n\n**Parameters:**\n\n- `registry_name_prefix`: Limits results to registries starting with this prefix\n- `scope`: Filter by registry scope (LOCAL or AWS)\n- `limit`: Maximum number of results to return (1-100)\n- `next_token`: Pagination token for subsequent requests\n\n#### search_schema\n\nSearch for schemas in a registry using keywords.\n\n**Parameters:**\n\n- `keywords` (required): Keywords to search for (prefix with \"aws.\" for service events)\n- `registry_name` (required): Registry to search in (use \"aws.events\" for AWS service events)\n- `limit`: Maximum number of results (1-100)\n- `next_token`: Pagination token\n\n#### describe_schema\n\nRetrieve the schema definition for the specified schema version.\n\n**Parameters:**\n\n- `registry_name` (required): Registry containing the schema (use \"aws.events\" for AWS service events)\n- `schema_name` (required): Name of schema to retrieve (e.g., \"aws.s3@ObjectCreated\" for S3 events)\n- `schema_version`: Version number of schema (latest by default)\n\n## Example usage\n\n### Creating a Lambda Function with SAM\n\nExample user prompt:\n\n```\nI want to build a simple backend for a todo app using Python and deploy it to the cloud with AWS Serverless. Can you help me create a new project called my-todo-app. It should include basic functionality to add and list todos. Once it's set up, please build and deploy it with all the necessary permissions. I don\u2019t need to review the changeset before deployment.\n```\n\nThis prompt would trigger the AI assistant to:\n1. Initialize a new SAM project using a template.\n2. Make modifications to code and infra for a todo app.\n3. Build the SAM application\n4. Deploy the application with CAPABILITY_IAM permissions\n\n### Deploying a Web Application\n\nExample user prompt:\n\n```\nI have a full-stack web app built with Node.js called my-web-app, and I want to deploy it to the cloud using AWS. Everything\u2019s ready \u2014 both frontend and backend. Can you set it up and deploy it with AWS Lambda so it's live and works smoothly?\n```\n\nThis prompt would trigger the AI assistant to use the deploy_webapp to deploy the full stack application with the specified configuration.\n\n### Working with EventBridge Schemas\n\nExample user prompt:\n\n```\nI need to create a Lambda function that processes autoscaling events. Can you help me find the right event schema and implement type-safe event handling?\n```\n\nThis prompt would trigger the AI assistant to:\n1. Search for autoscaling event schemas in aws.events registry using search_schema\n2. Retrieve complete schema definition using describe_schema\n3. Generate type-safe handler code based on schema structure\n4. Implement validation for required fields\n\n## Security features\n1. **AWS Authentication**: Uses AWS credentials from the environment for secure authentication\n2. **TLS Verification**: Enforces TLS verification for all AWS API calls\n3. **Resource Tagging**: Tags all created resources for traceability\n4. **Least Privilege**: Uses IAM roles with appropriate permissions for CloudFormation templates\n\n## Security considerations\n\n### Production use cases\nThe AWS Serverless MCP Server can be used for production environments with proper security controls in place. For production use cases, consider the following:\n\n* **Read-Only Mode by Default**: The server runs in read-only mode by default, which is safer for production environments. Only explicitly enable write access when necessary.\n* **Disable auto-approve**: Require the user to approve each time the AI assitant executes a tool\n\n### Role scoping recommendations\nTo follow security best practices:\n\n1. **Create dedicated IAM roles** to be used by the AWS Serverless MCP Server with the principle of least privilege\n2. **Use separate roles** for read-only and write operations\n3. **Implement resource tagging** to limit actions to resources created by the server\n4. **Enable AWS CloudTrail** to audit all API calls made by the server\n5. **Regularly review** the permissions granted to the server's IAM role\n6. **Use IAM Access Analyzer** to identify unused permissions that can be removed\n\n### Sensitive information handling\n**IMPORTANT**: Do not pass secrets or sensitive information via allowed input mechanisms:\n\n- Do not include secrets or credentials in CloudFormation templates\n- Do not pass sensitive information directly in the prompt to the model\n\n## Links\n\n- [Homepage](https://awslabs.github.io/mcp/)\n- [Documentation](https://awslabs.github.io/mcp/servers/aws-serverless-mcp-server/)\n- [Source Code](https://github.com/awslabs/mcp.git)\n- [Bug Tracker](https://github.com/awslabs/mcp/issues)\n- [Changelog](https://github.com/awslabs/mcp/blob/main/src/aws-serverless-mcp-server/CHANGELOG.md)\n\n## License\n\nApache-2.0\n",
    "bugtrack_url": null,
    "license": "Apache-2.0",
    "summary": "An AWS Labs Model Context Protocol (MCP) server for AWS Serverless",
    "version": "0.1.6",
    "project_urls": {
        "Bug Tracker": "https://github.com/awslabs/mcp/issues",
        "Changelog": "https://github.com/awslabs/mcp/blob/main/src/aws-serverless-mcp-server/CHANGELOG.md",
        "Documentation": "https://awslabs.github.io/mcp/servers/aws-serverless-mcp-server/",
        "Homepage": "https://awslabs.github.io/mcp/",
        "Source": "https://github.com/awslabs/mcp.git"
    },
    "split_keywords": [],
    "urls": [
        {
            "comment_text": null,
            "digests": {
                "blake2b_256": "2ee572c82261a63fcef8bd1f81bb4097f80a8eb449da5f8c7d9486c8e8e505b1",
                "md5": "2b2a92c7444e4f527fe290fa4a80f274",
                "sha256": "104051ae92b4fcaa76f6a2cfcee6db4eee891fbf8af7651d60f92b9bcf78c888"
            },
            "downloads": -1,
            "filename": "awslabs_aws_serverless_mcp_server-0.1.6-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "2b2a92c7444e4f527fe290fa4a80f274",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": ">=3.10",
            "size": 111906,
            "upload_time": "2025-07-11T18:48:33",
            "upload_time_iso_8601": "2025-07-11T18:48:33.308580Z",
            "url": "https://files.pythonhosted.org/packages/2e/e5/72c82261a63fcef8bd1f81bb4097f80a8eb449da5f8c7d9486c8e8e505b1/awslabs_aws_serverless_mcp_server-0.1.6-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": null,
            "digests": {
                "blake2b_256": "f5a907fe871772ebf9f6d4fc19ddf16d956f221f98908784796646cc59b0ec2b",
                "md5": "086de3280fedf9a67932595efa724dd2",
                "sha256": "1dc99cb93840ba81076d1bf35d39b2d71abe83ad252bd452de7eb7678ea609c9"
            },
            "downloads": -1,
            "filename": "awslabs_aws_serverless_mcp_server-0.1.6.tar.gz",
            "has_sig": false,
            "md5_digest": "086de3280fedf9a67932595efa724dd2",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.10",
            "size": 154653,
            "upload_time": "2025-07-11T18:48:36",
            "upload_time_iso_8601": "2025-07-11T18:48:36.035627Z",
            "url": "https://files.pythonhosted.org/packages/f5/a9/07fe871772ebf9f6d4fc19ddf16d956f221f98908784796646cc59b0ec2b/awslabs_aws_serverless_mcp_server-0.1.6.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2025-07-11 18:48:36",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "awslabs",
    "github_project": "mcp",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": true,
    "lcname": "awslabs.aws-serverless-mcp-server"
}
        
Elapsed time: 1.73772s