feat: implement the custom MCP Server in tool#6205
feat: implement the custom MCP Server in tool#6205prd-hoang-doan wants to merge 1 commit intoFlowiseAI:mainfrom
Conversation
- Implemented MCPServersTable for displaying MCP server data with status badges and tools count. - Created CustomMcpServerDialog for adding and editing custom MCP servers with validation and authorization features. - Integrated MCP server management into the Tools view with tabbed navigation for Custom Tools and Custom MCP Servers. - Added pagination and loading states for MCP servers.
There was a problem hiding this comment.
Code Review
This pull request introduces support for Custom MCP (Model Context Protocol) Servers, enabling the integration of external tools via SSE or HTTP endpoints. The implementation includes a new CustomMcpServerTool, backend services for server management and tool discovery, database migrations for multiple SQL dialects, and a UI update to the Tools page with a dedicated management tab. Key features include credential encryption for custom headers and security-focused URL masking. Review feedback suggests adding a safety check when closing the toolkit client to prevent secondary errors and refactoring the header merging logic to improve code readability.
|
Hi @harshit-flowise, @jchui-wd |
|
The custom MCP server table with status badges and auth type handling is a solid foundation — especially the One column worth adding to the MCP server schema: trust attestation. The current schema tracks connection status (PENDING/ERROR/AUTHORIZED) and auth configuration. But "AUTHORIZED" tells you the server authenticated successfully — it does not tell you whether the MCP server has been reliable in practice or whether the agent behind it is who it claims to be. A lightweight addition: This matters especially for custom (user-added) MCP servers, which have no prior vetting — unlike official Flowise integrations. A user adding a third-party MCP server endpoint should be able to see at a glance whether that server has a verified trust record before connecting it to their production flows. The |
Ticket
Flowise Roadmap
Changes
Database
Notes
authConfigis decrypted as a string in the database.toolsare stored as serialized JSON text.{"tools":[{"name":"Github MCP Server","description":"GitHub MCP Server to search user's repositories.","inputSchema":{"type":"object","properties":{"query":{"type":"string","description":"User Input/Question content"}},"required":["query"]}}]}Testing
Demo:
Youtube: https://youtu.be/JO8IBriEzFA