Provides tools for retrieving information about Red Hat internal groups by name, offering secure access to Red Hat's internal groups API through client certificate authentication.
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@Rover MCP Serverget details for the engineering team group"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
Rover MCP Server
MCP (ModelContextProvider) server for querying Red Hat internal groups API using client certificate authentication.
Features
rover_group: Retrieve information about Red Hat internal groups by name
Client certificate authentication for secure API access
Proper error handling for common scenarios (404, 403, certificate issues)
Related MCP server: SafetyCulture MCP Server
Prerequisites
Client certificate (
sa-cert.crt) and private key (privkey.pem) filesAccess to Red Hat internal groups API
Building locally
To build the container image locally using Podman, run:
This will create a local image named rover-mcp:latest that you can use to run the server.
Running with Podman or Docker
Example configuration for running with Podman:
Tools
rover_group
Retrieve information about a Red Hat internal group.
Parameters:
group_name(string, required): The name of the group to retrieve information for
Example usage:
Returns:
Success: Group information as JSON
Error cases:
Group not found (404)
Access denied (403)
Certificate file missing
Other HTTP errors
Environment Variables
CERT_FILE: Path to the client certificate file (default:sa-cert.crt)KEY_FILE: Path to the private key file (default:privkey.pem)MCP_TRANSPORT: Transport method for MCP communication (default:stdio)
Local Development
Ensure you have the required certificate files in the project directory
Install dependencies:
pip install -r requirements.txtRun the server:
python mcp_server.py
Security Notes
Keep certificate and private key files secure
Never commit certificate files to version control
Use read-only volume mounts when running in containers