unifi-network-mcp 0.3.2__py3-none-any.whl → 0.4.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
src/_version.py ADDED
@@ -0,0 +1,34 @@
1
+ # file generated by setuptools-scm
2
+ # don't change, don't track in version control
3
+
4
+ __all__ = [
5
+ "__version__",
6
+ "__version_tuple__",
7
+ "version",
8
+ "version_tuple",
9
+ "__commit_id__",
10
+ "commit_id",
11
+ ]
12
+
13
+ TYPE_CHECKING = False
14
+ if TYPE_CHECKING:
15
+ from typing import Tuple
16
+ from typing import Union
17
+
18
+ VERSION_TUPLE = Tuple[Union[int, str], ...]
19
+ COMMIT_ID = Union[str, None]
20
+ else:
21
+ VERSION_TUPLE = object
22
+ COMMIT_ID = object
23
+
24
+ version: str
25
+ __version__: str
26
+ __version_tuple__: VERSION_TUPLE
27
+ version_tuple: VERSION_TUPLE
28
+ commit_id: COMMIT_ID
29
+ __commit_id__: COMMIT_ID
30
+
31
+ __version__ = version = '0.4.0'
32
+ __version_tuple__ = version_tuple = (0, 4, 0)
33
+
34
+ __commit_id__ = commit_id = None
src/runtime.py CHANGED
@@ -14,10 +14,12 @@ Lazy factories (`get_*`) are provided so unit tests can substitute fakes by
14
14
  monkey‑patching before the first call.
15
15
  """
16
16
 
17
+ import os
17
18
  from functools import lru_cache
18
19
  from typing import Any
19
20
 
20
21
  from mcp.server.fastmcp import FastMCP
22
+ from mcp.server.transport_security import TransportSecuritySettings
21
23
 
22
24
  from src.bootstrap import load_config, logger
23
25
  from src.managers.client_manager import ClientManager
@@ -50,7 +52,21 @@ def get_config():
50
52
  @lru_cache
51
53
  def get_server() -> FastMCP:
52
54
  """Create the FastMCP server instance exactly once."""
53
- return FastMCP(name="unifi-network-mcp", debug=True)
55
+ # Parse allowed hosts from environment variable for reverse proxy support
56
+ # Default to localhost only for backwards compatibility
57
+ allowed_hosts_str = os.getenv("UNIFI_MCP_ALLOWED_HOSTS", "localhost,127.0.0.1")
58
+ allowed_hosts = [h.strip() for h in allowed_hosts_str.split(",") if h.strip()]
59
+
60
+ # Configure transport security settings
61
+ transport_security = TransportSecuritySettings(allowed_hosts=allowed_hosts)
62
+
63
+ logger.debug(f"Configuring FastMCP with allowed_hosts: {allowed_hosts}")
64
+
65
+ return FastMCP(
66
+ name="unifi-network-mcp",
67
+ debug=True,
68
+ transport_security=transport_security,
69
+ )
54
70
 
55
71
 
56
72
  # ---------------------------------------------------------------------------
src/tools/network.py CHANGED
@@ -170,7 +170,7 @@ async def get_network_details(network_id: str) -> Dict[str, Any]:
170
170
 
171
171
  @server.tool(
172
172
  name="unifi_update_network",
173
- description="Update specific fields of an existing network (LAN/VLAN). Requires confirmation.",
173
+ description="Update specific fields of an existing network (LAN/VLAN). Requires confirmation. Note: Network isolation is only supported on 'corporate' networks, not 'guest' networks.",
174
174
  permission_category="networks",
175
175
  permission_action="update",
176
176
  )
@@ -193,9 +193,15 @@ async def update_network(network_id: str, update_data: Dict[str, Any], confirm:
193
193
  - dhcp_start (string): New DHCP start IP.
194
194
  - dhcp_stop (string): New DHCP stop IP.
195
195
  - enabled (boolean): Enable/disable the entire network.
196
+ - network_isolation_enabled (boolean): Enable network isolation (IMPORTANT: Only works on networks with purpose="corporate").
196
197
  # Add other relevant fields from NetworkSchema here if needed
197
198
  confirm (bool): Must be set to `True` to execute. Defaults to `False`.
198
199
 
200
+ Important Constraints:
201
+ - Network isolation (network_isolation_enabled) is ONLY supported on networks with purpose="corporate".
202
+ - Attempting to enable isolation on "guest" or other network types will fail with an API error.
203
+ - To isolate a guest network: (1) Change its purpose from "guest" to "corporate", then (2) enable network_isolation_enabled.
204
+
199
205
  Returns:
200
206
  Dict: Success status, ID, updated fields, details, or error message.
201
207
  Example (success):
@@ -317,6 +323,11 @@ async def create_network(network_data: Dict[str, Any], confirm: bool = False) ->
317
323
  - vlan (integer): VLAN ID (required if vlan_enabled is true)
318
324
  - dhcp_enabled (boolean): Whether DHCP is enabled (default: true)
319
325
  - enabled (boolean): Whether the network is enabled (default: true)
326
+ - network_isolation_enabled (boolean): Enable network isolation (IMPORTANT: Only works on networks with purpose="corporate")
327
+
328
+ Important Constraints:
329
+ - Network isolation (network_isolation_enabled) is ONLY supported on networks with purpose="corporate".
330
+ - It cannot be enabled on "guest" networks.
320
331
 
321
332
  Example:
322
333
  {
src/tools_manifest.json CHANGED
@@ -1239,7 +1239,7 @@
1239
1239
  }
1240
1240
  },
1241
1241
  {
1242
- "description": "Update specific fields of an existing network (LAN/VLAN). Requires confirmation.",
1242
+ "description": "Update specific fields of an existing network (LAN/VLAN). Requires confirmation. Note: Network isolation is only supported on 'corporate' networks, not 'guest' networks.",
1243
1243
  "name": "unifi_update_network",
1244
1244
  "schema": {
1245
1245
  "input": {
@@ -1,13 +1,13 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: unifi-network-mcp
3
- Version: 0.3.2
3
+ Version: 0.4.0
4
4
  Summary: Unifi Network MCP Server
5
5
  License-File: LICENSE
6
6
  Requires-Python: >=3.13
7
7
  Requires-Dist: aiohttp>=3.8.5
8
- Requires-Dist: aiounifi>=87.0.0
8
+ Requires-Dist: aiounifi>=88
9
9
  Requires-Dist: jsonschema>=4.17.0
10
- Requires-Dist: mcp[cli]>=1.21.2
10
+ Requires-Dist: mcp[cli]>=1.23.0
11
11
  Requires-Dist: omegaconf>=2.3.0
12
12
  Requires-Dist: python-dotenv>=1.0.0
13
13
  Requires-Dist: pyyaml>=6.0
@@ -538,6 +538,7 @@ The server merges settings from **environment variables**, an optional `.env` fi
538
538
  | `UNIFI_TOOL_REGISTRATION_MODE` | Tool loading mode: `lazy` (default), `eager`, or `meta_only`. See [Context Optimization](#context-optimization) |
539
539
  | `UNIFI_ENABLED_CATEGORIES` | Comma-separated list of tool categories to load (eager mode). See table below |
540
540
  | `UNIFI_ENABLED_TOOLS` | Comma-separated list of specific tool names to register (eager mode) |
541
+ | `UNIFI_MCP_ALLOWED_HOSTS` | Comma-separated list of allowed hostnames for reverse proxy support. Required when running behind Nginx/Cloudflare/etc. Default `localhost,127.0.0.1` |
541
542
 
542
543
  ### Tool Categories (for UNIFI_ENABLED_CATEGORIES)
543
544
 
@@ -809,6 +810,7 @@ See [docs/permissions.md](docs/permissions.md) for complete documentation includ
809
810
  * **Review permissions carefully** before enabling high-risk operations. Use environment variables for runtime control.
810
811
  * Create, update, and delete tools should be used with caution and only enabled when necessary.
811
812
  * Do not host outside of your network unless using a secure reverse proxy like Cloudflare Tunnel or Ngrok. Even then, an additional layer of authentication is recommended.
813
+ * **Reverse Proxy Configuration:** When running behind a reverse proxy, set `UNIFI_MCP_ALLOWED_HOSTS` to include your external domain (e.g., `localhost,127.0.0.1,unifi-mcp.example.com`) to bypass FastMCP's DNS rebinding protection.
812
814
 
813
815
  ---
814
816
 
@@ -1,7 +1,8 @@
1
+ src/_version.py,sha256=2_0GUP7yBCXRus-qiJKxQD62z172WSs1sQ6DVpPsbmM,704
1
2
  src/bootstrap.py,sha256=mqkDDfn5xKRzun07TS8xPLZm_WnfLt3xTguxxFnfRV0,7572
2
3
  src/jobs.py,sha256=3IUO8ChpeRUjyJTWeFlyIwtkQLv-_KvfzuA5Ra4PmDI,5984
3
4
  src/main.py,sha256=7ZCXXzSoHFsXuA_FdNwJhcLtjMtTzK4sxah7ahzmEHs,15456
4
- src/runtime.py,sha256=bGad0_hJJU9Q1Ari29vQ9oaGt-v-uffTLNO5tPOuzeg,5159
5
+ src/runtime.py,sha256=7WqGkzXe92fn0JczCv8YVr5LTIc40pIt7nqSX4ji2To,5816
5
6
  src/schemas.py,sha256=Y9fglAAgRGh8zxwO0J5zpj5BsRMLDDwevwXY_6kj5VU,33725
6
7
  src/tool_index.py,sha256=aUPFqES4i_cq9ZsfAoiWuhKwoEEJ8NEAOafQ2h1g1NE,5492
7
8
  src/validator_registry.py,sha256=dboNY36ZQphCr7tDQuVQtNvXu4X1FBkgqoLb-sGNwJQ,3005
@@ -26,7 +27,7 @@ src/tools/devices.py,sha256=t29mGFr-_KSLUomgeNDHZcKGbtSIp9gLlckKsLDHAww,17454
26
27
  src/tools/events.py,sha256=rnPu8XIGhjkP-KcXk2-J6JRJnMgAsJNkIFWxHww43zs,6070
27
28
  src/tools/firewall.py,sha256=ClQ4P6scYivpuoq2b0TR9UEVQ07s2ykmYXdxcuzvxeM,30118
28
29
  src/tools/hotspot.py,sha256=RmTgtOMnwsv7IWJYCdldJNim1akjy8CLP8ROplY4uDA,8418
29
- src/tools/network.py,sha256=Y0kS6YrQZUunbnqsj5Sd7K05vEelBS8LpYIldtIvUWc,34070
30
+ src/tools/network.py,sha256=usGK5DmHlqVpiVTzwPgBGC-GMW1pPM7ztenoEdKtPlg,34987
30
31
  src/tools/port_forwards.py,sha256=H8K0DMtwqUBCO9kixUzb9PuoYhnE_CJE7nwfhOk1v44,25612
31
32
  src/tools/qos.py,sha256=Ym3W5Y7zrRLfH9xqy5Tz2-amYn9QnoIvFG3F5X3FQzI,21554
32
33
  src/tools/routing.py,sha256=vaf4UX2MiDmCC9RvzLgLWXTVSEdzUwM6qMpUHaxz67I,11263
@@ -41,11 +42,11 @@ src/utils/lazy_tool_loader.py,sha256=0GdfF7z06U_pvx7hmUE1jWEOFMFFo3WS9PWEEwkpXG4
41
42
  src/utils/meta_tools.py,sha256=XlLkzFEvrZsDEiXxMq_Lz22ZGZ8mMzbjx6krYJS-JD4,13172
42
43
  src/utils/permissions.py,sha256=GGg81gCPBo18Ra9NWGgHO3pPzX1EFUAt_Xd9gbUfKQo,4060
43
44
  src/utils/tool_loader.py,sha256=QpfHOxyZ_bzPJM0SItB7UM8uW_p7vl2Sm25rfgfwsAY,4147
44
- src/tools_manifest.json,sha256=vOlP1YzEQn9wXNeBMd4zKlCpPvC4uyoE8Nw64aTb2Wc,37813
45
+ src/tools_manifest.json,sha256=G7j9-pKly9fGvjc7vDwoMqQROvpbhwafWu4UY9dPMjU,37902
45
46
  src/config/config.yaml,sha256=FPoDva21XrUqgiwXTahVa5tDy_aNTeOL3cT8DTxyICU,3953
46
- unifi_network_mcp-0.3.2.data/data/share/unifi-network-mcp/.well-known/mcp-server.json,sha256=Ru2oF_SdOzkathJVTQ6R0bRB-NTmiXLlNVvsp7GqmPs,1427
47
- unifi_network_mcp-0.3.2.dist-info/METADATA,sha256=WeJg9PFrum4Ba5BQAYEuaJI20mqFpc2BE19YMxeq3Fo,38286
48
- unifi_network_mcp-0.3.2.dist-info/WHEEL,sha256=WLgqFyCfm_KASv4WHyYy0P3pM_m7J5L9k2skdKLirC8,87
49
- unifi_network_mcp-0.3.2.dist-info/entry_points.txt,sha256=iDs5JXOBoUROpkuTXoxr-1WSrz1FLEgI0TO4pFsZ8u0,52
50
- unifi_network_mcp-0.3.2.dist-info/licenses/LICENSE,sha256=1tMHOACX4Nse1DzgSKufrvTGztT8kS71LE8l29IAvto,1068
51
- unifi_network_mcp-0.3.2.dist-info/RECORD,,
47
+ unifi_network_mcp-0.4.0.data/data/share/unifi-network-mcp/.well-known/mcp-server.json,sha256=Ru2oF_SdOzkathJVTQ6R0bRB-NTmiXLlNVvsp7GqmPs,1427
48
+ unifi_network_mcp-0.4.0.dist-info/METADATA,sha256=3Cro-ITlcHDdw0vug5Q6yJ6Ev2tM2J9E4cWaUmEN_Dk,38696
49
+ unifi_network_mcp-0.4.0.dist-info/WHEEL,sha256=WLgqFyCfm_KASv4WHyYy0P3pM_m7J5L9k2skdKLirC8,87
50
+ unifi_network_mcp-0.4.0.dist-info/entry_points.txt,sha256=iDs5JXOBoUROpkuTXoxr-1WSrz1FLEgI0TO4pFsZ8u0,52
51
+ unifi_network_mcp-0.4.0.dist-info/licenses/LICENSE,sha256=1tMHOACX4Nse1DzgSKufrvTGztT8kS71LE8l29IAvto,1068
52
+ unifi_network_mcp-0.4.0.dist-info/RECORD,,