Name | test-awslabs.ec2-mcp-server JSON |
Version |
0.1.7
JSON |
| download |
home_page | None |
Summary | An AWS Labs Model Context Protocol (MCP) server for managing AWS EC2 instances, AMIs, security groups, volumes, snapshots, and related infrastructure with cost-effective KMS-encrypted key pair storage |
upload_time | 2025-07-26 20:35:14 |
maintainer | None |
docs_url | None |
author | Amazon Web Services |
requires_python | >=3.10 |
license | Apache-2.0 |
keywords |
|
VCS |
 |
bugtrack_url |
|
requirements |
No requirements were recorded.
|
Travis-CI |
No Travis.
|
coveralls test coverage |
No coveralls.
|
# AWS EC2 MCP Server
A Model Context Protocol (MCP) server for managing AWS EC2 instances, AMIs, security groups, volumes, and related infrastructure with cost-effective KMS-encrypted key pair storage.
## Features
This MCP server acts as a **bridge** between MCP clients and AWS EC2, allowing generative AI models to create, configure, and manage EC2 resources. The server provides a secure way to interact with AWS EC2 resources while maintaining proper access controls and resource validation.
### Core Capabilities
- **EC2 Instances**: Launch, terminate, start, stop, and reboot instances
- **Security Groups**: Create, modify, and delete security groups and rules
- **Key Pairs**: Create and manage SSH key pairs with secure storage
- **EBS Volumes**: Create, attach, detach, and delete volumes
- **EBS Snapshots**: Create and manage volume snapshots
- **AMIs**: Create custom AMIs from instances and manage their lifecycle
- **VPC Management**: List and manage VPCs, subnets, and networking components
### Security Features
- Input validation for all AWS resource IDs
- Permission-based access control with environment variable controls
- Response sanitization to prevent sensitive data leakage
- Secure private key storage with KMS encryption (S3), Secrets Manager, or Parameter Store
- Cost-effective KMS encryption for S3 storage (99.9% cheaper than Secrets Manager)
- Configurable write operation protection
## Prerequisites
1. AWS account with permissions to manage EC2 resources
2. AWS credentials configured (AWS CLI, environment variables, or IAM roles)
## Installation
| Cursor | VS Code |
| :----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------: | :-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------: |
| [](https://cursor.com/install-mcp?name=awslabs.ec2-mcp-server&config=ewogICJjb21tYW5kIjogInV2eCIsCiAgImFyZ3MiOiBbImF3c2xhYnMuZWMyLW1jcC1zZXJ2ZXJAbGF0ZXN0Il0sCiAgImVudiI6IHsKICAgICJBV1NfUFJPRklMRSI6ICJkZWZhdWx0IiwKICAgICJBV1NfUkVHSU9OIjogInVzLXdlc3QtMiIsCiAgICAiRkFTVE1DUF9MT0dfTEVWRUwiOiAiSU5GTyIsCiAgICAiQUxMT1dfV1JJVEUiOiAidHJ1ZSIsCiAgICAiQUxMT1dfU0VOU0lUSVZFX0RBVEEiOiAiZmFsc2UiCiAgfQp9) | [](https://insiders.vscode.dev/redirect/mcp/install?name=AWS%20EC2%20MCP%20Server&config=%7B%22command%22%3A%22uvx%22%2C%22args%22%3A%5B%22awslabs.ec2-mcp-server%40latest%22%5D%2C%22env%22%3A%7B%22AWS_PROFILE%22%3A%22default%22%2C%22AWS_REGION%22%3A%22us-west-2%22%2C%22FASTMCP_LOG_LEVEL%22%3A%22INFO%22%2C%22ALLOW_WRITE%22%3A%22true%22%2C%22ALLOW_SENSITIVE_DATA%22%3A%22false%22%7D%7D) |
### Using uvx (Recommended)
Configure the MCP server in your MCP client configuration (e.g., for Claude Desktop, edit the configuration file):
```json
{
"mcpServers": {
"awslabs.ec2-mcp-server": {
"command": "uvx",
"args": ["awslabs.ec2-mcp-server@latest"],
"env": {
"AWS_PROFILE": "default",
"AWS_REGION": "us-west-2",
"FASTMCP_LOG_LEVEL": "INFO",
"ALLOW_WRITE": "true",
"ALLOW_SENSITIVE_DATA": "false"
},
"disabled": false,
"autoApprove": []
}
}
}
```
### Using Docker
First, build the Docker image:
```bash
docker build -t awslabs/ec2-mcp-server .
```
Then configure with Docker in your MCP client:
```json
"awslabs.elasticache-mcp-server": {
"command": "docker",
"args": [
"run",
"--rm",
"--interactive",
"--env",
"FASTMCP_LOG_LEVEL=ERROR",
"awslabs/ec2-mcp-server:latest"
],
"env": {},
"disabled": false,
"autoApprove": []
}
```
## Configuration Options
### Environment Variables
- **`AWS_PROFILE`**: AWS profile name (default: "default")
- **`AWS_REGION`**: AWS region (default: "us-east-1")
- **`ALLOW_WRITE`**: Enable write operations like create/modify/delete (default: "false")
- **`ALLOW_SENSITIVE_DATA`**: Enable access to sensitive resource data (default: "false")
- **`FASTMCP_LOG_LEVEL`**: Logging level - DEBUG, INFO, WARNING, ERROR (default: "INFO")
- **`FASTMCP_LOG_FILE`**: Optional log file path
### Security Settings
**Important**: Write operations are disabled by default for security. Set `ALLOW_WRITE=true` to enable resource creation/modification/deletion.
### Key Pair Storage Configuration
When creating key pairs, you must specify a storage method. Configure these environment variables for S3 KMS encrypted storage:
**S3 with KMS Encryption (Recommended - Most Cost-Effective):**
- **`S3_KEYPAIR_BUCKET`**: S3 bucket name for storing encrypted private keys (optional: defaults to `ec2-mcp-keypairs-{region}`)
- **`S3_KEYPAIR_PREFIX`**: S3 key prefix for organizing stored keys (default: "private-keys")
- **`KMS_KEY_ID`**: Custom KMS key ID (optional: defaults to aws/s3 default key)
**S3 Features:**
- **Automatic KMS encryption** with default aws/s3 key or custom KMS key
- **Tag support** - EC2 key pair tags are automatically applied to S3 objects (when provided)
- **URL encoding** - Special characters in tags are properly encoded
- **Secure storage** - Private keys stored as `.pem` files with proper content type
**Cost Comparison (1000 key pairs):**
- **S3 + KMS**: ~$0.003/month (99.9% cheaper!)
- Parameter Store: $0-50/month
- Secrets Manager: $400/month
## Available Tools
### EC2 Instances (9 tools)
- `list_instances` - List EC2 instances with filtering options
- `get_instance_details` - Get detailed information about a specific instance
- `launch_instance` - Launch new EC2 instances with full configuration
- `terminate_instance` - Terminate EC2 instances permanently
- `start_instance` - Start stopped instances
- `stop_instance` - Stop running instances (with optional force flag)
- `reboot_instance` - Reboot running instances
- `get_subnet_info` - Get subnet information for networking
- `list_subnets` - List available subnets for instance placement
### Security Groups (5 tools)
- `list_security_groups` - List security groups with filtering
- `get_security_group_details` - Get detailed security group configuration
- `create_security_group` - Create new security groups with descriptions
- `delete_security_group` - Delete security groups
- `modify_security_group_rules` - Add/remove inbound and outbound rules
### Key Pairs (3 tools) - Storage Method Required
- `list_key_pairs` - List available EC2 key pairs
- `create_key_pair` - **Requires storage_method parameter (no default)**
- Must specify one of: "secrets_manager", "s3_encrypted", or "parameter_store"
- Cannot create key pair without explicitly specifying where to store the private key
- For S3 encryption: Uses KMS encryption with default aws/s3 key (configure S3_KEYPAIR_BUCKET for custom bucket)
- **S3 tagging**: EC2 key pair tags are automatically applied to S3 objects (only when tags are provided)
- `delete_key_pair` - Delete key pairs and associated stored private keys
### EBS Volumes (5 tools)
- `list_volumes` - List EBS volumes with status and attachment info
- `create_volume` - Create new EBS volumes with specified size and type
- `delete_volume` - Delete EBS volumes (must be unattached)
- `attach_volume` - Attach volumes to EC2 instances
- `detach_volume` - Detach volumes from instances
### EBS Snapshots (2 tools)
- `list_snapshots` - List EBS snapshots with filtering
- `create_snapshot` - Create snapshots from EBS volumes
### AMIs - Amazon Machine Images (4 tools)
- `list_amis` - List AMIs with ownership and filtering options
- `get_popular_amis` - Get popular public AMIs (Amazon Linux, Ubuntu, Windows, RHEL)
- `create_image` - Create custom AMIs from running instances
- `deregister_image` - Deregister/delete AMIs
### VPC & Networking (5 tools)
- `list_vpcs` - List Virtual Private Clouds
- `get_default_vpc` - Get the default VPC for the region
- `find_suitable_subnet` - Find appropriate subnets for instance placement
- `delete_vpc` - Delete VPCs (advanced operation)
- `list_subnets` - List subnets with VPC filtering
## Common Workflows
### Launch a Web Server
1. `get_popular_amis` - Find latest Amazon Linux AMI
2. `create_key_pair` - YOU MUST CHOOSE: storage_method="secrets_manager" OR "s3_encrypted" OR "parameter_store"
3. `create_security_group` for HTTP/SSH access
4. `launch_instance` with the AMI, key pair, and security group
### Create Custom AMI
1. `list_instances` - Find your configured instance
2. `stop_instance` - Stop for consistent snapshot
3. `create_image` - Create AMI from instance
4. `start_instance` - Restart original instance
### Volume Management
1. `create_volume` - Create additional storage
2. `attach_volume` - Attach to running instance
3. `create_snapshot` - Backup volume data
## Required AWS Permissions
The server requires the following IAM permissions:
```json
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"ec2:*",
"ssm:GetParameter",
"ssm:PutParameter",
"ssm:DeleteParameter",
"s3:GetObject",
"s3:PutObject",
"s3:DeleteObject",
"secretsmanager:GetSecretValue",
"secretsmanager:CreateSecret",
"secretsmanager:DeleteSecret",
"sts:GetCallerIdentity"
],
"Resource": "*"
}
]
}
```
For production use, consider implementing more restrictive permissions based on your specific needs.
## License
This project is licensed under the Apache License, Version 2.0.
Raw data
{
"_id": null,
"home_page": null,
"name": "test-awslabs.ec2-mcp-server",
"maintainer": null,
"docs_url": null,
"requires_python": ">=3.10",
"maintainer_email": null,
"keywords": null,
"author": "Amazon Web Services",
"author_email": "AWSLabs MCP <203918161+awslabs-mcp@users.noreply.github.com>, Senthamil Chezhian <senthamilchezhian2003@gmail.com>",
"download_url": "https://files.pythonhosted.org/packages/67/48/21ac6d888839f7788148e1c42f7521af3d8de80404a6fd44051953663e81/test_awslabs_ec2_mcp_server-0.1.7.tar.gz",
"platform": null,
"description": "# AWS EC2 MCP Server\n\nA Model Context Protocol (MCP) server for managing AWS EC2 instances, AMIs, security groups, volumes, and related infrastructure with cost-effective KMS-encrypted key pair storage.\n\n## Features\n\nThis MCP server acts as a **bridge** between MCP clients and AWS EC2, allowing generative AI models to create, configure, and manage EC2 resources. The server provides a secure way to interact with AWS EC2 resources while maintaining proper access controls and resource validation.\n\n### Core Capabilities\n\n- **EC2 Instances**: Launch, terminate, start, stop, and reboot instances\n- **Security Groups**: Create, modify, and delete security groups and rules\n- **Key Pairs**: Create and manage SSH key pairs with secure storage\n- **EBS Volumes**: Create, attach, detach, and delete volumes\n- **EBS Snapshots**: Create and manage volume snapshots\n- **AMIs**: Create custom AMIs from instances and manage their lifecycle\n- **VPC Management**: List and manage VPCs, subnets, and networking components\n\n### Security Features\n\n- Input validation for all AWS resource IDs\n- Permission-based access control with environment variable controls\n- Response sanitization to prevent sensitive data leakage\n- Secure private key storage with KMS encryption (S3), Secrets Manager, or Parameter Store\n- Cost-effective KMS encryption for S3 storage (99.9% cheaper than Secrets Manager)\n- Configurable write operation protection\n\n## Prerequisites\n\n1. AWS account with permissions to manage EC2 resources\n2. AWS credentials configured (AWS CLI, environment variables, or IAM roles)\n\n## Installation\n\n| Cursor | VS Code |\n| :----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------: | :-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------: |\n| [](https://cursor.com/install-mcp?name=awslabs.ec2-mcp-server&config=ewogICJjb21tYW5kIjogInV2eCIsCiAgImFyZ3MiOiBbImF3c2xhYnMuZWMyLW1jcC1zZXJ2ZXJAbGF0ZXN0Il0sCiAgImVudiI6IHsKICAgICJBV1NfUFJPRklMRSI6ICJkZWZhdWx0IiwKICAgICJBV1NfUkVHSU9OIjogInVzLXdlc3QtMiIsCiAgICAiRkFTVE1DUF9MT0dfTEVWRUwiOiAiSU5GTyIsCiAgICAiQUxMT1dfV1JJVEUiOiAidHJ1ZSIsCiAgICAiQUxMT1dfU0VOU0lUSVZFX0RBVEEiOiAiZmFsc2UiCiAgfQp9) | [](https://insiders.vscode.dev/redirect/mcp/install?name=AWS%20EC2%20MCP%20Server&config=%7B%22command%22%3A%22uvx%22%2C%22args%22%3A%5B%22awslabs.ec2-mcp-server%40latest%22%5D%2C%22env%22%3A%7B%22AWS_PROFILE%22%3A%22default%22%2C%22AWS_REGION%22%3A%22us-west-2%22%2C%22FASTMCP_LOG_LEVEL%22%3A%22INFO%22%2C%22ALLOW_WRITE%22%3A%22true%22%2C%22ALLOW_SENSITIVE_DATA%22%3A%22false%22%7D%7D) |\n\n### Using uvx (Recommended)\n\nConfigure the MCP server in your MCP client configuration (e.g., for Claude Desktop, edit the configuration file):\n\n```json\n{\n \"mcpServers\": {\n \"awslabs.ec2-mcp-server\": {\n \"command\": \"uvx\",\n \"args\": [\"awslabs.ec2-mcp-server@latest\"],\n \"env\": {\n \"AWS_PROFILE\": \"default\",\n \"AWS_REGION\": \"us-west-2\",\n \"FASTMCP_LOG_LEVEL\": \"INFO\",\n \"ALLOW_WRITE\": \"true\",\n \"ALLOW_SENSITIVE_DATA\": \"false\"\n },\n \"disabled\": false,\n \"autoApprove\": []\n }\n }\n}\n```\n\n### Using Docker\n\nFirst, build the Docker image:\n\n```bash\ndocker build -t awslabs/ec2-mcp-server .\n```\n\nThen configure with Docker in your MCP client:\n\n```json\n \"awslabs.elasticache-mcp-server\": {\n \"command\": \"docker\",\n \"args\": [\n \"run\",\n \"--rm\",\n \"--interactive\",\n \"--env\",\n \"FASTMCP_LOG_LEVEL=ERROR\",\n \"awslabs/ec2-mcp-server:latest\"\n ],\n \"env\": {},\n \"disabled\": false,\n \"autoApprove\": []\n }\n```\n\n## Configuration Options\n\n### Environment Variables\n\n- **`AWS_PROFILE`**: AWS profile name (default: \"default\")\n- **`AWS_REGION`**: AWS region (default: \"us-east-1\")\n- **`ALLOW_WRITE`**: Enable write operations like create/modify/delete (default: \"false\")\n- **`ALLOW_SENSITIVE_DATA`**: Enable access to sensitive resource data (default: \"false\")\n- **`FASTMCP_LOG_LEVEL`**: Logging level - DEBUG, INFO, WARNING, ERROR (default: \"INFO\")\n- **`FASTMCP_LOG_FILE`**: Optional log file path\n\n### Security Settings\n\n**Important**: Write operations are disabled by default for security. Set `ALLOW_WRITE=true` to enable resource creation/modification/deletion.\n\n### Key Pair Storage Configuration\n\nWhen creating key pairs, you must specify a storage method. Configure these environment variables for S3 KMS encrypted storage:\n\n**S3 with KMS Encryption (Recommended - Most Cost-Effective):**\n\n- **`S3_KEYPAIR_BUCKET`**: S3 bucket name for storing encrypted private keys (optional: defaults to `ec2-mcp-keypairs-{region}`)\n- **`S3_KEYPAIR_PREFIX`**: S3 key prefix for organizing stored keys (default: \"private-keys\")\n- **`KMS_KEY_ID`**: Custom KMS key ID (optional: defaults to aws/s3 default key)\n\n**S3 Features:**\n- **Automatic KMS encryption** with default aws/s3 key or custom KMS key\n- **Tag support** - EC2 key pair tags are automatically applied to S3 objects (when provided)\n- **URL encoding** - Special characters in tags are properly encoded\n- **Secure storage** - Private keys stored as `.pem` files with proper content type\n\n**Cost Comparison (1000 key pairs):**\n\n- **S3 + KMS**: ~$0.003/month (99.9% cheaper!)\n- Parameter Store: $0-50/month\n- Secrets Manager: $400/month\n\n## Available Tools\n\n### EC2 Instances (9 tools)\n\n- `list_instances` - List EC2 instances with filtering options\n- `get_instance_details` - Get detailed information about a specific instance\n- `launch_instance` - Launch new EC2 instances with full configuration\n- `terminate_instance` - Terminate EC2 instances permanently\n- `start_instance` - Start stopped instances\n- `stop_instance` - Stop running instances (with optional force flag)\n- `reboot_instance` - Reboot running instances\n- `get_subnet_info` - Get subnet information for networking\n- `list_subnets` - List available subnets for instance placement\n\n### Security Groups (5 tools)\n\n- `list_security_groups` - List security groups with filtering\n- `get_security_group_details` - Get detailed security group configuration\n- `create_security_group` - Create new security groups with descriptions\n- `delete_security_group` - Delete security groups\n- `modify_security_group_rules` - Add/remove inbound and outbound rules\n\n### Key Pairs (3 tools) - Storage Method Required\n\n- `list_key_pairs` - List available EC2 key pairs\n- `create_key_pair` - **Requires storage_method parameter (no default)**\n - Must specify one of: \"secrets_manager\", \"s3_encrypted\", or \"parameter_store\"\n - Cannot create key pair without explicitly specifying where to store the private key\n - For S3 encryption: Uses KMS encryption with default aws/s3 key (configure S3_KEYPAIR_BUCKET for custom bucket)\n - **S3 tagging**: EC2 key pair tags are automatically applied to S3 objects (only when tags are provided)\n- `delete_key_pair` - Delete key pairs and associated stored private keys\n\n### EBS Volumes (5 tools)\n\n- `list_volumes` - List EBS volumes with status and attachment info\n- `create_volume` - Create new EBS volumes with specified size and type\n- `delete_volume` - Delete EBS volumes (must be unattached)\n- `attach_volume` - Attach volumes to EC2 instances\n- `detach_volume` - Detach volumes from instances\n\n### EBS Snapshots (2 tools)\n\n- `list_snapshots` - List EBS snapshots with filtering\n- `create_snapshot` - Create snapshots from EBS volumes\n\n### AMIs - Amazon Machine Images (4 tools)\n\n- `list_amis` - List AMIs with ownership and filtering options\n- `get_popular_amis` - Get popular public AMIs (Amazon Linux, Ubuntu, Windows, RHEL)\n- `create_image` - Create custom AMIs from running instances\n- `deregister_image` - Deregister/delete AMIs\n\n### VPC & Networking (5 tools)\n\n- `list_vpcs` - List Virtual Private Clouds\n- `get_default_vpc` - Get the default VPC for the region\n- `find_suitable_subnet` - Find appropriate subnets for instance placement\n- `delete_vpc` - Delete VPCs (advanced operation)\n- `list_subnets` - List subnets with VPC filtering\n\n## Common Workflows\n\n### Launch a Web Server\n\n1. `get_popular_amis` - Find latest Amazon Linux AMI\n2. `create_key_pair` - YOU MUST CHOOSE: storage_method=\"secrets_manager\" OR \"s3_encrypted\" OR \"parameter_store\"\n3. `create_security_group` for HTTP/SSH access\n4. `launch_instance` with the AMI, key pair, and security group\n\n### Create Custom AMI\n\n1. `list_instances` - Find your configured instance\n2. `stop_instance` - Stop for consistent snapshot\n3. `create_image` - Create AMI from instance\n4. `start_instance` - Restart original instance\n\n### Volume Management\n\n1. `create_volume` - Create additional storage\n2. `attach_volume` - Attach to running instance\n3. `create_snapshot` - Backup volume data\n\n## Required AWS Permissions\n\nThe server requires the following IAM permissions:\n\n```json\n{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"ec2:*\",\n \"ssm:GetParameter\",\n \"ssm:PutParameter\",\n \"ssm:DeleteParameter\",\n \"s3:GetObject\",\n \"s3:PutObject\",\n \"s3:DeleteObject\",\n \"secretsmanager:GetSecretValue\",\n \"secretsmanager:CreateSecret\",\n \"secretsmanager:DeleteSecret\",\n \"sts:GetCallerIdentity\"\n ],\n \"Resource\": \"*\"\n }\n ]\n}\n```\n\nFor production use, consider implementing more restrictive permissions based on your specific needs.\n\n## License\n\nThis project is licensed under the Apache License, Version 2.0.\n",
"bugtrack_url": null,
"license": "Apache-2.0",
"summary": "An AWS Labs Model Context Protocol (MCP) server for managing AWS EC2 instances, AMIs, security groups, volumes, snapshots, and related infrastructure with cost-effective KMS-encrypted key pair storage",
"version": "0.1.7",
"project_urls": {
"changelog": "https://github.com/awslabs/mcp/blob/main/src/ec2-mcp-server/CHANGELOG.md",
"docs": "https://awslabs.github.io/mcp/servers/ec2-mcp-server/",
"documentation": "https://awslabs.github.io/mcp/servers/ec2-mcp-server/",
"homepage": "https://awslabs.github.io/mcp/",
"repository": "https://github.com/awslabs/mcp.git"
},
"split_keywords": [],
"urls": [
{
"comment_text": null,
"digests": {
"blake2b_256": "40c55fb8dd706ca551076d1015c5d14dadc2c66c10da4d62ff33cee2ed8c253e",
"md5": "87b67e2f55f87f52566d77e594945346",
"sha256": "370e3b02cc3d80987b7fe35ba20c50d208ede13743a6f3344c2c14010777ed86"
},
"downloads": -1,
"filename": "test_awslabs_ec2_mcp_server-0.1.7-py3-none-any.whl",
"has_sig": false,
"md5_digest": "87b67e2f55f87f52566d77e594945346",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": ">=3.10",
"size": 53001,
"upload_time": "2025-07-26T20:35:12",
"upload_time_iso_8601": "2025-07-26T20:35:12.899658Z",
"url": "https://files.pythonhosted.org/packages/40/c5/5fb8dd706ca551076d1015c5d14dadc2c66c10da4d62ff33cee2ed8c253e/test_awslabs_ec2_mcp_server-0.1.7-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": null,
"digests": {
"blake2b_256": "674821ac6d888839f7788148e1c42f7521af3d8de80404a6fd44051953663e81",
"md5": "5960021a580f685759490ce4729b5537",
"sha256": "873802f23f7044f8ac8d899e777ab3771948f7d3bfa29e49806f0ce3b47e903a"
},
"downloads": -1,
"filename": "test_awslabs_ec2_mcp_server-0.1.7.tar.gz",
"has_sig": false,
"md5_digest": "5960021a580f685759490ce4729b5537",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.10",
"size": 151620,
"upload_time": "2025-07-26T20:35:14",
"upload_time_iso_8601": "2025-07-26T20:35:14.515550Z",
"url": "https://files.pythonhosted.org/packages/67/48/21ac6d888839f7788148e1c42f7521af3d8de80404a6fd44051953663e81/test_awslabs_ec2_mcp_server-0.1.7.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2025-07-26 20:35:14",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "awslabs",
"github_project": "mcp",
"travis_ci": false,
"coveralls": false,
"github_actions": true,
"lcname": "test-awslabs.ec2-mcp-server"
}