|
1 | 1 | { |
2 | 2 | "$schema": "https://raw.githubusercontent.com/stacklok/toolhive/main/pkg/registry/data/schema.json", |
3 | 3 | "version": "1.0.0", |
4 | | - "last_updated": "2025-11-09T00:19:40Z", |
| 4 | + "last_updated": "2025-11-10T00:19:26Z", |
5 | 5 | "servers": { |
6 | 6 | "adb-mysql-mcp-server": { |
7 | 7 | "description": "Official MCP server for AnalyticDB for MySQL of Alibaba Cloud", |
|
484 | 484 | "api", |
485 | 485 | "devops" |
486 | 486 | ], |
487 | | - "image": "public.ecr.aws/awslabs-mcp/awslabs/aws-api-mcp-server:1.1.3", |
| 487 | + "image": "public.ecr.aws/awslabs-mcp/awslabs/aws-api-mcp-server:1.1.4", |
488 | 488 | "permissions": { |
489 | 489 | "network": { |
490 | 490 | "outbound": { |
|
705 | 705 | "aws-costs", |
706 | 706 | "aws-pricing" |
707 | 707 | ], |
708 | | - "image": "public.ecr.aws/f3y8w4n0/awslabs/aws-pricing-mcp-server:1.0.16", |
| 708 | + "image": "public.ecr.aws/f3y8w4n0/awslabs/aws-pricing-mcp-server:1.0.17", |
709 | 709 | "permissions": { |
710 | 710 | "network": { |
711 | 711 | "outbound": { |
|
1467 | 1467 | "genai", |
1468 | 1468 | "mcp-server" |
1469 | 1469 | ], |
1470 | | - "image": "us-central1-docker.pkg.dev/database-toolbox/toolbox/toolbox:0.18.0", |
| 1470 | + "image": "us-central1-docker.pkg.dev/database-toolbox/toolbox/toolbox:0.19.1", |
1471 | 1471 | "target_port": 5000, |
1472 | 1472 | "permissions": { |
1473 | 1473 | "network": { |
|
1947 | 1947 | "genai", |
1948 | 1948 | "mcp-server" |
1949 | 1949 | ], |
1950 | | - "image": "us-central1-docker.pkg.dev/database-toolbox/toolbox/toolbox:0.18.0", |
| 1950 | + "image": "us-central1-docker.pkg.dev/database-toolbox/toolbox/toolbox:0.19.1", |
1951 | 1951 | "target_port": 5000, |
1952 | 1952 | "permissions": { |
1953 | 1953 | "network": { |
|
4543 | 4543 | "web", |
4544 | 4544 | "accessibility" |
4545 | 4545 | ], |
4546 | | - "image": "mcr.microsoft.com/playwright/mcp:v0.0.45", |
| 4546 | + "image": "mcr.microsoft.com/playwright/mcp:v0.0.46", |
4547 | 4547 | "target_port": 8931, |
4548 | 4548 | "permissions": { |
4549 | 4549 | "network": { |
|
5211 | 5211 | } |
5212 | 5212 | }, |
5213 | 5213 | "terraform": { |
5214 | | - "description": "Terraform ecosystem integration with IaC development capabilities and provider documentation", |
| 5214 | + "description": "Terraform registry and Cloud/Enterprise integration for providers, modules, policies, and workspaces", |
5215 | 5215 | "tier": "Official", |
5216 | 5216 | "status": "Active", |
5217 | 5217 | "transport": "stdio", |
5218 | 5218 | "tools": [ |
| 5219 | + "attach_variable_set_to_workspaces", |
| 5220 | + "create_no_code_workspace", |
| 5221 | + "create_run", |
| 5222 | + "create_variable_in_variable_set", |
| 5223 | + "create_variable_set", |
| 5224 | + "create_workspace", |
| 5225 | + "create_workspace_tags", |
| 5226 | + "create_workspace_variable", |
| 5227 | + "delete_variable_in_variable_set", |
| 5228 | + "detach_variable_set_from_workspaces", |
5219 | 5229 | "get_latest_module_version", |
5220 | 5230 | "get_latest_provider_version", |
5221 | 5231 | "get_module_details", |
5222 | 5232 | "get_policy_details", |
| 5233 | + "get_private_module_details", |
| 5234 | + "get_private_provider_details", |
5223 | 5235 | "get_provider_capabilities", |
5224 | 5236 | "get_provider_details", |
| 5237 | + "get_run_details", |
| 5238 | + "get_workspace_details", |
| 5239 | + "list_runs", |
| 5240 | + "list_terraform_orgs", |
| 5241 | + "list_terraform_projects", |
| 5242 | + "list_variable_sets", |
| 5243 | + "list_workspace_variables", |
| 5244 | + "list_workspaces", |
| 5245 | + "read_workspace_tags", |
5225 | 5246 | "search_modules", |
5226 | 5247 | "search_policies", |
5227 | | - "search_providers" |
| 5248 | + "search_private_modules", |
| 5249 | + "search_private_providers", |
| 5250 | + "search_providers", |
| 5251 | + "update_workspace", |
| 5252 | + "update_workspace_variable" |
5228 | 5253 | ], |
5229 | 5254 | "metadata": { |
5230 | 5255 | "stars": 1008, |
|
5240 | 5265 | "providers", |
5241 | 5266 | "modules", |
5242 | 5267 | "hcl", |
5243 | | - "plan", |
5244 | | - "apply", |
5245 | | - "destroy", |
5246 | | - "aws", |
5247 | | - "gcp", |
5248 | | - "azure" |
| 5268 | + "workspace", |
| 5269 | + "variables", |
| 5270 | + "governance", |
| 5271 | + "policy", |
| 5272 | + "registry" |
5249 | 5273 | ], |
5250 | 5274 | "image": "docker.io/hashicorp/terraform-mcp-server:0.3.2", |
5251 | 5275 | "permissions": { |
5252 | 5276 | "network": { |
5253 | 5277 | "outbound": { |
5254 | 5278 | "allow_host": [ |
5255 | | - "registry.terraform.io" |
| 5279 | + "registry.terraform.io", |
| 5280 | + "app.terraform.io" |
5256 | 5281 | ], |
5257 | 5282 | "allow_port": [ |
5258 | 5283 | 443 |
5259 | 5284 | ] |
5260 | 5285 | } |
5261 | 5286 | } |
5262 | | - } |
| 5287 | + }, |
| 5288 | + "env_vars": [ |
| 5289 | + { |
| 5290 | + "name": "TFE_TOKEN", |
| 5291 | + "description": "API authentication token for Terraform Cloud/Enterprise access", |
| 5292 | + "required": false, |
| 5293 | + "secret": true |
| 5294 | + }, |
| 5295 | + { |
| 5296 | + "name": "TFE_ADDRESS", |
| 5297 | + "description": "HCP Terraform/Enterprise endpoint URL", |
| 5298 | + "required": false, |
| 5299 | + "default": "https://app.terraform.io" |
| 5300 | + }, |
| 5301 | + { |
| 5302 | + "name": "ENABLE_TF_OPERATIONS", |
| 5303 | + "description": "Enable destructive operations (use cautiously in production)", |
| 5304 | + "required": false, |
| 5305 | + "default": "false" |
| 5306 | + }, |
| 5307 | + { |
| 5308 | + "name": "TFE_SKIP_TLS_VERIFY", |
| 5309 | + "description": "Bypass TLS certificate validation (development only)", |
| 5310 | + "required": false, |
| 5311 | + "default": "false" |
| 5312 | + }, |
| 5313 | + { |
| 5314 | + "name": "TRANSPORT_MODE", |
| 5315 | + "description": "Protocol selection (stdio or streamable-http)", |
| 5316 | + "required": false, |
| 5317 | + "default": "stdio" |
| 5318 | + } |
| 5319 | + ] |
5263 | 5320 | }, |
5264 | 5321 | "time": { |
5265 | 5322 | "description": "Provides time information and IANA timezone conversions with auto system timezone detection.", |
|
0 commit comments