code-engine-mcp-server
v1.0.6
Published
MCP server for IBM Code Engine and Docker/Podman integration
Downloads
310
Maintainers
Readme
Code Engine MCP Server

Model Context Protocol (MCP) server for IBM Code Engine and Docker/Podman integration. It enables AI assistants to build, run, push, and deploy containerized workloads with a single MCP server.
How It Works
flowchart TD
A([AI Assistant\nCopilot / Claude / Cline]) -->|MCP JSON-RPC| B[Code Engine MCP Server]
B --> C{Tool Category}
C -->|Container Tools| D[Docker / Podman]
C -->|Registry Tools| E[IBM Container Registry\nus.icr.io]
C -->|Code Engine Tools| F[IBM Code Engine\nREST API]
C -->|Procedures| G[Multi-step Workflows]
D -->|build / push / validate| E
E -->|image reference| F
G -->|proc_build_push_deploy| D
G -->|proc_build_run_and_deploy| F
F --> H[(Projects\nApps\nBuilds\nJobs\nSecrets\nDomains)]
H -->|ready| I([Live App\nhttps://app.region.codeengine.appdomain.cloud])
style A fill:#1261FE,color:#fff
style B fill:#0f3460,color:#fff
style G fill:#7b2d8b,color:#fff
style I fill:#198038,color:#fff✨ What You Get
- Container workflow tools for Docker or Podman
- IBM Container Registry (ICR) tools — list namespaces, list images, delete images
- IBM Code Engine project and application management tools
- MCP-ready setup for GitHub Copilot, Cline, Claude Desktop, and the optional VS Code extension in
vscode-extension/ - A simple local development and troubleshooting workflow
🚀 Quick Start
# 1) Install dependencies
npm install
# 2) Build the server
npm run build
# 3) Run once to verify
node build/index.jsThen configure your MCP client using one of the examples in the Configuration section below.
🤖 The Agentic Experience (No Docker/Code Engine Lingo Needed)
The true power of this MCP server is that you don't need to know Docker or Code Engine commands. You can simply state your goal, and the LLM will discover the environment, run the pipeline, and fix issues autonomously.
Here is an example interaction from a real session:
User:
"I have an app in the
developer-splashfolder. Deploy it to my Code Engine project."
Assistant's Autonomous Thought Process:
- Discovery: "Let me check what projects and namespaces exist... Found project
markus-app-v2-torontoand namespacemvk-code-engine." - Prerequisites: "No pull secret in this project yet. I'll get the API key from the
.envfile and create the secreticr-pull-secret." - Execution: "Now I'll run the full pipeline: build → push → deploy → wait."
- Validation: "It's deployed but stuck at 'deploying'. Let me check the logs... The container is running but the readiness probe is failing."
- Self-Correction: "Ah, the
sedpattern in the Dockerfile didn't match nginx alpine's default config format for port 80. I'll fix the Dockerfile with a regex-safesedand rebuild." - Completion: "App is live! 🎉 Status: ready."
Assistant Response to User:
"Your app is deployed and live at:
https://developer-splash.29m5mrru3s3n.ca-tor.codeengine.appdomain.cloud. I had to fix a minor port configuration issue in your Dockerfile, but it is successfully running now!"
With this MCP server, the AI acts as an expert DevOps engineer pairing with you.
Deploy Your First App
This walks through deploying the included Star Wars splash page example — a static nginx container — entirely through the MCP server.
Apple Silicon users: always build with
--platform linux/amd64. Code Engine runs amd64 only.
Step 1 — Build and push the image
cd examples/starwars-splash
podman build --platform linux/amd64 -t us.icr.io/<your-namespace>/starwars-splash:v1.0.0 .
podman push us.icr.io/<your-namespace>/starwars-splash:v1.0.0Or ask your assistant:
Build examples/starwars-splash as us.icr.io/my-namespace/starwars-splash:v1.0.0 for linux/amd64 and push itMCP response — build_container_image:
{
"success": true,
"command": "podman build --platform linux/amd64 -t us.icr.io/my-namespace/starwars-splash:v1.0.0 ...",
"build_output": "STEP 1/5: FROM nginx:alpine\nSTEP 2/5: COPY index.html /usr/share/nginx/html/index.html\nSTEP 3/5: RUN sed -i 's/listen 80;/listen 8080;/g' /etc/nginx/conf.d/default.conf\nSTEP 4/5: EXPOSE 8080\nSTEP 5/5: CMD [\"nginx\", \"-g\", \"daemon off;\"]\nSuccessfully tagged us.icr.io/my-namespace/starwars-splash:v1.0.0"
}Note: Container runtimes (Podman/Docker) write build progress to stderr. The
build_outputfield combines stdout and stderr so you see the full build log.
MCP response — push_container_image:
{
"success": true,
"command": "podman push us.icr.io/my-namespace/starwars-splash:v1.0.0",
"output": "Getting image source signatures\nCopying blobs...\nWriting manifest to image destination"
}Step 2 — Create a registry pull secret
Ask your assistant (once per project):
Create a registry secret called icr-pull-secret in project <project-id> for us.icr.io using my IBM Cloud API keyOr use the ce_create_secret tool directly:
{
"project_id": "<your-project-id>",
"name": "icr-pull-secret",
"format": "registry",
"data": {
"username": "iamapikey",
"password": "<your-ibm-cloud-api-key>",
"server": "us.icr.io",
"email": "[email protected]"
}
}MCP response — ce_create_secret:
{
"name": "icr-pull-secret",
"format": "registry",
"resource_type": "secret_registry_v2",
"created_at": "2026-05-08T22:10:00Z",
"project_id": "<your-project-id>"
}Step 3 — Deploy the application
Ask your assistant:
Deploy us.icr.io/my-namespace/starwars-splash:v1.0.0 to Code Engine project <project-id>
as app "starwars-splash" using pull secret icr-pull-secret, min 1 instanceOr use the ce_create_application tool:
{
"project_id": "<your-project-id>",
"name": "starwars-splash",
"image": "us.icr.io/<your-namespace>/starwars-splash:v1.0.0",
"image_secret": "icr-pull-secret",
"scale_min_instances": 1,
"scale_max_instances": 3
}MCP response — ce_create_application:
{
"name": "starwars-splash",
"resource_type": "app_v2",
"status": "deploying",
"image_reference": "us.icr.io/my-namespace/starwars-splash:v1.0.0",
"image_secret": "icr-pull-secret",
"image_port": 8080,
"scale_min_instances": 1,
"scale_max_instances": 3,
"scale_cpu_limit": "1",
"scale_memory_limit": "4G",
"endpoint": "https://starwars-splash.<subdomain>.us-south.codeengine.appdomain.cloud",
"status_details": {
"latest_created_revision": "starwars-splash-00001",
"latest_ready_revision": null
}
}Step 4 — Check deployment status
Get details for the starwars-splash app in project <project-id>This calls ce_get_application and returns the public URL once the app reaches ready status.
List the running instances of starwars-splash in project <project-id>This calls ce_list_app_instances (or ce_get_app_instance for a specific instance) and shows:
- Instance name and revision
- Container status (
running/pending/failed) - Restart count
- Started-at timestamp
- CPU and memory allocation
MCP response — ce_get_application (once ready):
{
"name": "starwars-splash",
"status": "ready",
"image_reference": "us.icr.io/my-namespace/starwars-splash:v1.0.0",
"image_port": 8080,
"scale_min_instances": 1,
"scale_max_instances": 3,
"scale_cpu_limit": "0.5",
"scale_memory_limit": "1G",
"region": "us-south",
"endpoint": "https://starwars-splash.<subdomain>.us-south.codeengine.appdomain.cloud",
"status_details": {
"latest_created_revision": "starwars-splash-00001",
"latest_ready_revision": "starwars-splash-00001"
}
}Step 5 — Map a custom domain (optional)
To serve the app at your own domain (e.g. myapp.example.com) you need a TLS certificate. The IBM Code Engine REST API always requires a real certificate — IBM's Console "Platform managed" option is not available via the API.
5a — Get a Let's Encrypt certificate (certbot)
# Install once
brew install certbot
# Request cert — certbot will print a DNS TXT challenge value
mkdir -p ~/certbot/{config,work,logs}
/opt/homebrew/bin/certbot certonly --manual --preferred-challenges dns \
-d <your-domain> --agree-tos --no-eff-email --email [email protected] \
--config-dir ~/certbot/config --work-dir ~/certbot/work --logs-dir ~/certbot/logsCertbot will pause and ask you to add a TXT record:
Add TXT record: _acme-challenge.<your-domain> = <challenge-value>Verify propagation, then press Enter. Certbot writes:
~/certbot/config/live/<your-domain>/fullchain.pem~/certbot/config/live/<your-domain>/privkey.pem
5b — Create the TLS secret in Code Engine
Ask your assistant:
Create a TLS secret called starwars-tls in project <project-id>
using cert ~/certbot/config/live/myapp.example.com/fullchain.pem
and key ~/certbot/config/live/myapp.example.com/privkey.pemThis calls ce_create_tls_secret_from_pem — reads the PEM files from disk and stores them as a Code Engine tls secret.
MCP response — ce_create_tls_secret_from_pem:
{
"name": "my-tls",
"format": "tls",
"resource_type": "secret_tls_v2",
"created_at": "2026-05-08T22:30:00Z",
"project_id": "<your-project-id>"
}5c — Create the domain mapping
Ask your assistant:
Map domain myapp.example.com to app my-app
in project <project-id> using TLS secret my-tlsThis calls ce_create_domain_mapping and returns the cname_target.
MCP response — ce_create_domain_mapping:
{
"name": "myapp.example.com",
"status": "ready",
"cname_target": "custom.<subdomain>.us-south.codeengine.appdomain.cloud",
"component": {
"resource_type": "app_v2",
"name": "my-app"
},
"tls_secret": "my-tls",
"region": "us-south"
}5d — Update your CNAME
In your DNS provider, set:
myapp.example.com CNAME custom.<subdomain>.us-south.codeengine.appdomain.cloudUse the cname_target value returned in 5c (it uses the custom. prefix, not the app name).
Once DNS propagates, https://<your-domain> serves the app with a valid TLS certificate.
Certificate renewal: Let's Encrypt certs expire after 90 days. Re-run certbot to get updated PEM files, then ask Copilot to run
ce_renew_tls_secret_from_pem— it patches the existing secret in-place so your domain mapping continues working without any changes.
Full one-shot prompt
I have a Star Wars splash page in examples/starwars-splash.
Build it for linux/amd64 as us.icr.io/my-namespace/starwars-splash:v1.0.0,
push it, then deploy it to Code Engine project <project-id> with pull secret icr-pull-secret.
Tell me the public URL and confirm the instance is running.🌐 Host Any MCP Server on Code Engine
You can use this MCP server to deploy another MCP server to Code Engine — no CLI, no Dockerfile, no YAML. The key ingredient is supergateway: a tiny bridge that wraps any STDIO-based MCP server as an HTTP + SSE endpoint, making it accessible to any remote client.
Credit: Jeremias Werner & Enrico Regge — IBM Cloud Code Engine
Your AI Assistant
│ MCP JSON-RPC (STDIO, local)
▼
code-engine-mcp-server ──► ce_create_application
│
▼
Code Engine App
image: docker.io/supercorp/supergateway
args: --stdio "npx -y <any-mcp-server>"
--outputTransport sse
│ HTTPS + SSE (public URL)
▼
Any remote MCP client
(Claude Desktop, Cursor, VS Code, …)Any STDIO MCP server becomes a remotely accessible, auto-scaling cloud service — with no custom infrastructure.
This example deploys @tokenizin/mcp-npx-fetch, an MCP server that lets an AI assistant fetch content from public URLs.
The example files live in examples/mcp-server-supergateway/.
Step 1 — Deploy the hosted MCP server
Ask your assistant:
Deploy a hosted MCP fetch server to my Code Engine project <project-id>.
Use image docker.io/supercorp/supergateway on port 8000.
Startup args: --stdio "npx -y @tokenizin/mcp-npx-fetch" --outputTransport sse
Name it "mcp-fetch-server". No pull secret needed.This calls ce_create_application:
{
"project_id": "<your-project-id>",
"name": "mcp-fetch-server",
"image": "docker.io/supercorp/supergateway",
"port": 8000,
"run_args": ["--stdio", "npx -y @tokenizin/mcp-npx-fetch", "--outputTransport", "sse"]
}MCP response — ce_create_application:
{
"name": "mcp-fetch-server",
"resource_type": "app_v2",
"status": "deploying",
"image_reference": "docker.io/supercorp/supergateway",
"image_port": 8000,
"scale_min_instances": 0,
"scale_max_instances": 10,
"endpoint": "https://mcp-fetch-server.<subdomain>.<region>.codeengine.appdomain.cloud",
"status_details": {
"latest_created_revision": "mcp-fetch-server-00001",
"latest_ready_revision": null
}
}No pull secret is needed —
docker.io/supercorp/supergatewayis a public image. Code Engine scales to zero when idle; you pay only for actual requests.
Step 2 — Wait for the app to be ready
Ask your assistant:
Wait for mcp-fetch-server in project <project-id> to be readyThis calls ce_wait_for_app_ready:
{
"project_id": "<your-project-id>",
"app_name": "mcp-fetch-server",
"timeout_seconds": 120
}MCP response — ce_wait_for_app_ready:
{
"app_name": "mcp-fetch-server",
"status": "ready",
"endpoint": "https://mcp-fetch-server.<subdomain>.<region>.codeengine.appdomain.cloud",
"elapsed_seconds": 34,
"poll_history": [
{ "attempt": 1, "status": "deploying", "elapsed_seconds": 10 },
{ "attempt": 2, "status": "deploying", "elapsed_seconds": 20 },
{ "attempt": 3, "status": "ready", "elapsed_seconds": 34 }
]
}Step 3 — Verify the running instance
Ask your assistant:
List the running instances of mcp-fetch-server in project <project-id>This calls ce_list_app_instances:
MCP response — ce_list_app_instances:
{
"instances": [
{
"name": "mcp-fetch-server-00001-deployment-abc123",
"revision": "mcp-fetch-server-00001",
"status": "running",
"restart_count": 0,
"started_at": "2026-05-09T12:01:44Z"
}
]
}Step 4 — Connect your MCP client
Use mcp-remote to bridge the HTTP+SSE endpoint back to STDIO for local clients.
VS Code mcp.json:
{
"servers": {
"fetch": {
"command": "npx",
"args": [
"mcp-remote",
"https://mcp-fetch-server.<subdomain>.<region>.codeengine.appdomain.cloud/sse"
]
}
}
}Claude Desktop claude_desktop_config.json:
{
"mcpServers": {
"fetch": {
"command": "npx",
"args": [
"mcp-remote",
"https://mcp-fetch-server.<subdomain>.<region>.codeengine.appdomain.cloud/sse"
]
}
}
}Step 5 — Test the endpoint
Verify the server is live and streaming:
curl -N https://mcp-fetch-server.<subdomain>.<region>.codeengine.appdomain.cloud/sseOr open it in the MCP Inspector:
npx @modelcontextprotocol/inspector
# Connect via SSE → paste the Code Engine URLOnce connected, you will see the fetch tool listed and can invoke it directly from the inspector.
Full one-shot prompt
Deploy a hosted MCP fetch server to my Code Engine project <project-id>.
Use image docker.io/supercorp/supergateway on port 8000 with no pull secret.
run_args: --stdio "npx -y @tokenizin/mcp-npx-fetch" --outputTransport sse
Name it "mcp-fetch-server", wait for it to be ready, and give me the /sse URL
so I can add it to my mcp.json.See examples/mcp-server-supergateway/ for the ready-to-use client config file.
Deploy any other STDIO MCP server
The same pattern works for any npx-runnable MCP server — just swap the --stdio argument:
| MCP Server | --stdio argument |
|---|---|
| Fetch | npx -y @tokenizin/mcp-npx-fetch |
| Filesystem | npx -y @modelcontextprotocol/server-filesystem /data |
| Brave Search | npx -y @modelcontextprotocol/server-brave-search |
| Your own server | node /app/server.js |
Documentation
- Setup Instructions
- MCP Inspector Troubleshooting
- Code Engine API Reference
- API Call Scenarios
- Client README
- Cline MCP Config Example
- VS Code MCP extension
- Code of Conduct
- Contributing Guide
- Maintainers
🗂️ Project Structure
code-engine-mcp-server/
├── api/ # OpenAPI reference used for API coverage
├── build/ # Compiled JavaScript output
├── docs/ # API references, client guides, community files
│ ├── API_CALL_SCENARIOS.md
│ ├── CODE_ENGINE_API_REFERENCE.md
│ ├── MCP_INSPECTOR_TROUBLESHOOTING.md
│ ├── SETUP_INSTRUCTIONS.md
│ ├── CODE_OF_CONDUCT.md
│ ├── CONTRIBUTING.md
│ └── MAINTAINERS.md
├── examples/
│ ├── developer-splash/ # nginx static container example
│ ├── starwars-splash/ # nginx Star Wars crawl example
│ └── mcp-server-supergateway/ # Host any MCP server on Code Engine via supergateway
├── internal/ # Internal release notes
├── src/ # Main TypeScript source code
├── CHANGELOG.md # Release history
├── LICENSE # Project license
├── README.md # Project overview and usage
├── mcp.example.json # Example MCP client configuration
├── vscode-extension/ # Optional VS Code extension
├── package.json # npm package metadata and scripts
├── server.json # MCP Registry metadata
└── tsconfig.json # TypeScript configuration🧩 Features
Container Runtime Tools (Docker/Podman)
- ✅ Detect container runtime (Docker/Podman)
- ✅ Build container images (with platform targeting for amd64)
- ✅ Push images to registries
- ✅ List local images
- ✅ Test containers locally
- ✅ Get container logs
- ✅ Stop and remove containers
- ✅ List all containers
- ✅ Validate Dockerfile for Code Engine compatibility (
ce_validate_dockerfile) — checks architecture, port, nginx sed patterns, USER, CMD
IBM Container Registry (ICR)
- ✅ List ICR namespaces
- ✅ List images with optional namespace filter
- ✅ Delete images by tag
IBM Code Engine Tools
- ✅ List, create, and delete projects
- ✅ Deploy applications with image pull secrets
- ✅ Update applications (image, scaling, env)
- ✅ List applications and get public URLs
- ✅ Get per-instance status (running, restarts, started-at)
- ✅ Get application logs per instance
- ✅ Build and job management
- ✅ Secrets and ConfigMaps
- ✅ Custom domain mappings (create, list, get, delete)
- ✅ TLS secrets from Let's Encrypt / certbot PEM files (
ce_create_tls_secret_from_pem) - ✅ TLS cert renewal in-place without disrupting domain mappings (
ce_renew_tls_secret_from_pem) - ✅ Update any secret in-place (
ce_update_secret) - ✅ Wait for app deployment or build run to complete (
ce_wait_for_app_ready,ce_wait_for_build_run) - ✅ IAM token info and diagnostics (
iam_get_token_info) - ✅ Create ICR namespaces via REST API (
icr_create_namespace)
Procedures
- ✅
proc_build_push_deploy— full container pipeline in one prompt (build → push → deploy → wait) - ✅
proc_setup_custom_domain— TLS cert + domain mapping in one step, returns CNAME target - ✅
proc_build_run_and_deploy— CE source build → wait → deploy app → wait → return URL
⚙️ Configuration
VS Code — IBM Code Engine MCP extension (optional)
The extension in vscode-extension/ registers this MCP server with VS Code using the MCP server definition provider API (VS Code 1.101+). You do not need a workspace .vscode/mcp.json entry for the default flow: the server is started with npx -y code-engine-mcp-server and your API key from settings.
- Install the extension (from a
.vsixbuilt withnpm run packageinsidevscode-extension/, or from the Marketplace when published). - Ensure Node.js is installed and
npxis on yourPATH. - Open Settings and search for IBM Code Engine MCP, or edit
settings.jsondirectly:codeEngineMcp.apiKey— your IBM Cloud API key (required; until this is set, the extension contributes no MCP server).codeEngineMcp.region— IBM Cloud region (optional, defaultus-south). Passed asIBMCLOUD_REGIONto the server.
The extension sets IBMCLOUD_API_KEY and IBMCLOUD_REGION for the spawned process. Use GitHub Copilot and MCP in VS Code as described in the Copilot documentation.
More detail: vscode-extension/README.md.
1) GitHub Copilot (VS Code) — mcp.json (workspace)
Copy mcp.example.json to .vscode/mcp.json in your workspace root:
cp mcp.example.json ../.vscode/mcp.jsonThen edit .vscode/mcp.json and replace the placeholder with your IBM Cloud API key:
{
"servers": {
"code-engine": {
"type": "stdio",
"command": "node",
"args": [
"${workspaceFolder}/code-engine-mcp-server/build/index.js"
],
"env": {
"IBMCLOUD_API_KEY": "your-ibm-cloud-api-key-here"
}
}
}
}Restart the server: Cmd+Shift+P -> "MCP: Restart Server" -> code-engine.
Security: Add
.vscode/mcp.jsonto your.gitignoreto avoid committing your API key.
Get your API key at IBM Cloud IAM → API keys.
2) Cline (VS Code Extension)
- Open VSCode Settings (Cmd/Ctrl + ,)
- Search for "Cline: MCP Settings"
- Click "Edit in settings.json"
- Add the configuration:
{
"cline.mcpServers": {
"code-engine": {
"command": "node",
"args": ["/absolute/path/to/code-engine-mcp-server/build/index.js"],
"env": {
"IBMCLOUD_API_KEY": "your-api-key-here"
}
}
}
}3) Claude Desktop
Edit ~/Library/Application Support/Claude/claude_desktop_config.json:
{
"mcpServers": {
"code-engine": {
"command": "node",
"args": ["/absolute/path/to/code-engine-mcp-server/build/index.js"],
"env": {
"IBMCLOUD_API_KEY": "your-api-key-here"
}
}
}
}One-Click Install
Use the published package from npm or browse the MCP Registry listing:
- npm package: code-engine-mcp-server
- MCP Registry entry: io.github.markusvankempen/code-engine-mcp-server
💬 Example Prompts
Detect Container Runtime
Ask your assistant:
Can you detect which container runtime I have installed?Build a Container Image
Ask your assistant:
Build a container image from ./Dockerfile with the name myapp:latestTest Container Locally
Ask your assistant:
Test the myapp:latest image locally on port 8080Push to Registry
Ask your assistant:
Push myapp:latest to icr.io/my-namespace/myapp:latestList Code Engine Projects
Ask your assistant:
List all my Code Engine projectsComplete Workflow
Ask your assistant:
I have a Node.js app in ./my-app with a Dockerfile. Can you:
1. Build it as myapp:v1.0.0
2. Test it locally on port 3000
3. Push it to icr.io/my-namespace/myapp:v1.0.0
4. Deploy it to my Code Engine project "production"
5. Show me the application URLCustom Domain
Ask your assistant:
Create a TLS secret called my-tls in project <project-id>
using cert ~/certbot/config/live/example.com/fullchain.pem
and key ~/certbot/config/live/example.com/privkey.pem.
Then map domain example.com to app my-app using that secret.
Tell me what CNAME value to set in DNS.🛠️ Available Tools
62 tools total: 9 container tools + 4 ICR tools + 45 Code Engine tools + 1 IAM tool + 3 procedures.
Procedures bundle multiple tools into a single call. Use them for common end-to-end workflows.
Container Tools (8)
| Tool | Description | Key Parameters |
|------|-------------|----------------|
| detect_container_runtime | Detect Docker or Podman | — |
| list_local_images | List local container images | runtime |
| list_local_containers | List local containers | runtime, all |
| build_container_image | Build a container image | dockerfile_path, image_name, context_path |
| push_container_image | Push image to registry | image_name, runtime |
| test_container_locally | Run container for local testing | image_name, port_mapping, env_vars |
| get_container_logs | Get logs from a running container | container_id, runtime |
| stop_local_container | Stop and remove a container | container_id, runtime |
| ce_validate_dockerfile | Validate a Dockerfile for Code Engine compatibility (architecture, port, nginx sed patterns, USER, CMD) | dockerfile_path, context_path, expected_port |
IBM Container Registry Tools (4)
| Tool | Description | Key Parameters |
|------|-------------|----------------|
| icr_list_namespaces | List ICR namespaces in your account | region |
| icr_list_images | List images in ICR (optionally filtered by namespace) | namespace, region |
| icr_delete_image | Delete an image by full tag | image, region |
| icr_create_namespace | Create a new ICR namespace | namespace, region |
Code Engine: Projects (4)
| Tool | Description | Key Parameters |
|------|-------------|----------------|
| ce_list_projects | List all projects in a region | — |
| ce_get_project | Get project details | project_id |
| ce_create_project | Create a new project | name, resource_group_id |
| ce_delete_project | Delete a project | project_id |
Code Engine: Applications (9)
| Tool | Description | Key Parameters |
|------|-------------|----------------|
| ce_list_applications | List applications in a project | project_id |
| ce_get_application | Get application details and public URL | project_id, app_name |
| ce_create_application | Deploy a new application | project_id, name, image, image_secret, port, env_vars, run_args, run_commands |
| ce_update_application | Update image, scaling, env, pull secret, run args | project_id, app_name, image, image_secret, scale_*, run_args, run_commands |
| ce_delete_application | Delete an application | project_id, app_name |
| ce_list_app_instances | List all running instances with status | project_id, app_name |
| ce_get_app_instance | Get status details for a specific instance | project_id, app_name, instance_name |
| ce_get_app_logs | Get logs for an app instance | project_id, app_name, instance_name |
| ce_wait_for_app_ready | Poll until app status is ready or timeout; returns poll_history | project_id, app_name, timeout_seconds |
Code Engine: Builds (9)
| Tool | Description | Key Parameters |
|------|-------------|----------------|
| ce_list_builds | List build configurations | project_id |
| ce_get_build | Get build configuration details | project_id, build_name |
| ce_create_build | Create a build configuration | project_id, name, output_image, output_secret |
| ce_delete_build | Delete a build configuration | project_id, build_name |
| ce_list_build_runs | List build runs | project_id |
| ce_get_build_run | Get build run status | project_id, build_run_name |
| ce_create_build_run | Start a build run | project_id, build_name |
| ce_delete_build_run | Delete a build run | project_id, build_run_name |
| ce_wait_for_build_run | Poll until build run succeeds or fails; returns poll_history | project_id, build_run_name, timeout_seconds |
Code Engine: Jobs (8)
| Tool | Description | Key Parameters |
|------|-------------|----------------|
| ce_list_jobs | List job definitions | project_id |
| ce_get_job | Get job definition details | project_id, job_name |
| ce_create_job | Create a job definition | project_id, name, image |
| ce_delete_job | Delete a job definition | project_id, job_name |
| ce_list_job_runs | List job runs | project_id, job_name (optional) |
| ce_get_job_run | Get job run status | project_id, job_run_name |
| ce_create_job_run | Submit a job run | project_id, job_name |
| ce_delete_job_run | Delete a job run | project_id, job_run_name |
Code Engine: Secrets (7)
| Tool | Description | Key Parameters |
|------|-------------|----------------|
| ce_list_secrets | List secrets (names + keys only) | project_id |
| ce_get_secret | Get secret metadata (no values) | project_id, secret_name |
| ce_create_secret | Create a secret | project_id, name, format, data |
| ce_update_secret | Update an existing secret in-place (PATCH) | project_id, secret_name, data |
| ce_delete_secret | Delete a secret | project_id, secret_name |
| ce_create_tls_secret_from_pem | Create a TLS secret from PEM files | project_id, secret_name, cert_pem_path, key_pem_path |
| ce_renew_tls_secret_from_pem | Renew an existing TLS secret from updated PEM files | project_id, secret_name, cert_pem_path, key_pem_path |
Code Engine: ConfigMaps (4)
| Tool | Description | Key Parameters |
|------|-------------|----------------|
| ce_list_config_maps | List configmaps | project_id |
| ce_get_config_map | Get configmap details | project_id, config_map_name |
| ce_create_config_map | Create a configmap | project_id, name, data |
| ce_delete_config_map | Delete a configmap | project_id, config_map_name |
Code Engine: Domain Mappings (4)
| Tool | Description | Key Parameters |
|------|-------------|----------------|
| ce_list_domain_mappings | List all custom domain mappings | project_id |
| ce_get_domain_mapping | Get status and CNAME target for a mapping | project_id, domain_name |
| ce_create_domain_mapping | Map a custom domain to an app | project_id, domain_name, app_name, tls_secret |
| ce_delete_domain_mapping | Delete a custom domain mapping | project_id, domain_name |
IBM Cloud IAM (1)
| Tool | Description | Key Parameters |
|------|-------------|----------------|
| iam_get_token_info | Inspect the current IAM token — account, expiry, validity | — |
Procedures — Multi-Step Workflows (3)
| Tool | What it does | Key Parameters |
|------|-------------|----------------|
| proc_build_push_deploy | Build container for linux/amd64 → push → create/update CE app → wait for ready → return URL + poll_history | context_path, project_id_or_name, app_name, image_secret, icr_namespace, image_tag (default latest), icr_host (default us.icr.io), port, timeout_seconds |
| proc_setup_custom_domain | Read PEM files → create TLS secret → create domain mapping → return CNAME target | project_id_or_name, app_name, domain_name, tls_secret_name, cert_pem_path, key_pem_path |
| proc_build_run_and_deploy | Start CE build run → wait for success → create/update app → wait for ready → return URL + build_poll_history + app_poll_history | project_id_or_name, build_name, app_name, image_secret, port, build_timeout_seconds, deploy_timeout_seconds |
🔐 Environment Variables
IBMCLOUD_API_KEY: IBM Cloud API key (required for Code Engine operations)IBMCLOUD_REGION: Default IBM Cloud region (optional, defaults to us-south)CONTAINER_RUNTIME: Force specific runtime (docker or podman)DEBUG: Enable debug logging
📋 Prerequisites
- Node.js v18 or higher
- Docker or Podman installed (for container build/push tools)
- IBM Cloud API key (for all Code Engine and ICR operations)
The MCP server communicates directly with the IBM Cloud REST API and ICR API. No IBM Cloud CLI or Code Engine plugin is required.
👩💻 Development
# Run in development mode
npm run dev
# Build
npm run build
# Test manually
node build/index.js🧪 Troubleshooting
Server Not Connecting
- Verify the path in configuration is absolute
- Check Node.js is in PATH:
node --version - Verify build output exists:
ls build/index.js - Test manually:
node build/index.js
Docker/Podman Commands Failing
- Verify installation:
docker --versionorpodman --version - Check Docker daemon is running
- Verify permissions (add user to docker group if needed)
Code Engine Commands Failing
- Verify your API key is set: check
IBMCLOUD_API_KEYin your MCP client config - Confirm the region is correct (default
us-south); setIBMCLOUD_REGIONif needed - Verify the project ID is valid: use
ce_list_projectsto find it - Check for expired tokens — the server re-fetches IAM tokens automatically; if errors persist, regenerate your API key at IBM Cloud IAM → API keys
🛡️ Security
- Never commit API keys to version control
- Use environment variables for sensitive data
- Consider using IBM Cloud IAM for authentication
- Restrict MCP server permissions as needed
📄 License
MIT (see LICENSE)
🤝 Contributing
Contributions are welcome! Please open an issue or submit a pull request (see Contributing Guide).
👤 Author
Markus van Kempen
Email: [email protected] | [email protected]
Website: markusvankempen.github.io
Research | Floor 7 1/2
🙋 Support
For issues and questions:
- Check Setup Instructions and Code Engine API Reference
- Open an issue in this repository with reproduction steps and logs
