Skip to content

All Services Release v1.0.2

Latest

Choose a tag to compare

@github-actions github-actions released this 09 Mar 13:47
3db36ae

πŸš€ HPE GreenLake MCP v1.0.2 - All Services Release

πŸ“‹ What's Changed

This is a comprehensive release updating HPE GreenLake MCP servers.

PR Title: Release: v1.0.2 for all MCP servers
Merged by: @lchinglen
PR Number: #15

🏷️ New Service Tags

  • βœ… audit-logs/v1.0.2
  • βœ… devices/v1.0.2
  • βœ… users/v1.0.2
  • βœ… workspaces/v1.0.2
  • βœ… subscriptions/v1.0.2

πŸ“¦ Installation

# Clone the repository
git clone https://github.com/HewlettPackard/gl-mcp.git
cd gl-mcp

# Install specific service
cd src/[service-name]
pip install -e .

πŸ”— Documentation

🏷️ Tag Information

  • Umbrella Tag: v1.0.2
  • Commit: 3db36aecaf9b9a0a497381ba37588c9e346b2e8e
  • Release Type: All Services

πŸ“¦ Services Included

  • πŸ” Audit Logs - Audit log management with comprehensive filtering
  • πŸ’» Devices - Device management and inventory tracking
  • πŸ‘₯ Users - User management and lookup functionality
  • 🏒 Workspaces - Workspace information retrieval
  • πŸ“‹ Subscriptions - Subscription management and monitoring

✨ Common Features

All services include:

  • πŸ” OAuth2 authentication with automatic token management
  • πŸ”§ Dynamic tools with runtime parameter validation
  • πŸ“‘ Model Context Protocol v1.0 implementation
  • 🐍 Python 3.10+ support
  • βš™οΈ Environment-based configuration
  • πŸ” Comprehensive filtering and pagination support

πŸ“ Service Changelogs

πŸ” Audit Logs v1.0.2

## [1.0.2] - 2026-03-09

### Changed

  - Path parameters in generated tools now use URL encoding for proper handling of special characters
  - Static tools (example_tool.py template) use urllib.parse.quote(value, safe="")
  - Dynamic tools (invoke_dynamic_tool.py template) use urllib.parse.quote(value, safe="")

### Security

  - Dynamic tools now sanitize user-provided headers to prevent injection attacks
  - Added FORBIDDEN_HEADERS constant listing security-sensitive headers
  - Added _sanitize_headers() method to strip Authorization, Host, Cookie, X-Forwarded-* headers
  - Prevents callers from overriding security-critical headers in API requests

πŸ“„ Full audit-logs CHANGELOG

πŸ’» Devices v1.0.2

## [1.0.2] - 2026-03-09

### Changed

  - Path parameters in generated tools now use URL encoding for proper handling of special characters
  - Static tools (example_tool.py template) use urllib.parse.quote(value, safe="")
  - Dynamic tools (invoke_dynamic_tool.py template) use urllib.parse.quote(value, safe="")

### Security

  - Dynamic tools now sanitize user-provided headers to prevent injection attacks
  - Added FORBIDDEN_HEADERS constant listing security-sensitive headers
  - Added _sanitize_headers() method to strip Authorization, Host, Cookie, X-Forwarded-* headers
  - Prevents callers from overriding security-critical headers in API requests

πŸ“„ Full devices CHANGELOG

πŸ‘₯ Users v1.0.2

## [1.0.2] - 2026-03-09

### Changed

  - Path parameters in generated tools now use URL encoding for proper handling of special characters
  - Static tools (example_tool.py template) use urllib.parse.quote(value, safe="")
  - Dynamic tools (invoke_dynamic_tool.py template) use urllib.parse.quote(value, safe="")

### Security

  - Dynamic tools now sanitize user-provided headers to prevent injection attacks
  - Added FORBIDDEN_HEADERS constant listing security-sensitive headers
  - Added _sanitize_headers() method to strip Authorization, Host, Cookie, X-Forwarded-* headers
  - Prevents callers from overriding security-critical headers in API requests

πŸ“„ Full users CHANGELOG

🏒 Workspaces v1.0.2

## [1.0.2] - 2026-03-09

### Changed

  - Path parameters in generated tools now use URL encoding for proper handling of special characters
  - Static tools (example_tool.py template) use urllib.parse.quote(value, safe="")
  - Dynamic tools (invoke_dynamic_tool.py template) use urllib.parse.quote(value, safe="")

### Security

  - Dynamic tools now sanitize user-provided headers to prevent injection attacks
  - Added FORBIDDEN_HEADERS constant listing security-sensitive headers
  - Added _sanitize_headers() method to strip Authorization, Host, Cookie, X-Forwarded-* headers
  - Prevents callers from overriding security-critical headers in API requests

πŸ“„ Full workspaces CHANGELOG

πŸ“‹ Subscriptions v1.0.2

## [1.0.2] - 2026-03-09

### Changed

  - Path parameters in generated tools now use URL encoding for proper handling of special characters
  - Static tools (example_tool.py template) use urllib.parse.quote(value, safe="")
  - Dynamic tools (invoke_dynamic_tool.py template) use urllib.parse.quote(value, safe="")

### Security

  - Dynamic tools now sanitize user-provided headers to prevent injection attacks
  - Added FORBIDDEN_HEADERS constant listing security-sensitive headers
  - Added _sanitize_headers() method to strip Authorization, Host, Cookie, X-Forwarded-* headers
  - Prevents callers from overriding security-critical headers in API requests

πŸ“„ Full subscriptions CHANGELOG

πŸ”— Additional Resources

View complete service documentation: