Skip to content

fix(mcp): block build --push in read-only MCP mode#3741

Open
Ankitsinghsisodya wants to merge 1 commit into
knative:mainfrom
Ankitsinghsisodya:fix/mcp-readonly-build-push
Open

fix(mcp): block build --push in read-only MCP mode#3741
Ankitsinghsisodya wants to merge 1 commit into
knative:mainfrom
Ankitsinghsisodya:fix/mcp-readonly-build-push

Conversation

@Ankitsinghsisodya
Copy link
Copy Markdown
Contributor

Summary

When the MCP server runs in read-only mode (default unless FUNC_ENABLE_MCP_WRITE enables writes), deploy and delete are already rejected. build with push: true could still push images to a registry. This change rejects that path with a clear error.

Motivation

Read-only mode is meant to avoid mutating external state. Pushing a built image to a registry is such a mutation and should align with the same policy as deploy/delete.

Changes

  • pkg/mcp/tools_build.go: in buildHandler, return an error when s.readonly is true and the tool input requests push (Push != nil && *input.Push).

Testing

  • go test ./pkg/mcp/... or make test

Added a check in the buildHandler function to return an error if an attempt is made to push images while the server is in read-only mode. This ensures that users are informed of the correct server state and can adjust their configurations accordingly.
Copilot AI review requested due to automatic review settings May 14, 2026 23:37
@knative-prow knative-prow Bot requested review from dsimansk and jrangelramos May 14, 2026 23:37
@knative-prow
Copy link
Copy Markdown

knative-prow Bot commented May 14, 2026

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: Ankitsinghsisodya
Once this PR has been reviewed and has the lgtm label, please assign dsimansk for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@knative-prow knative-prow Bot added the size/XS 🤖 PR changes 0-9 lines, ignoring generated files. label May 14, 2026
@knative-prow
Copy link
Copy Markdown

knative-prow Bot commented May 14, 2026

Hi @Ankitsinghsisodya. Thanks for your PR.

I'm waiting for a knative member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work.

Tip

We noticed you've done this a few times! Consider joining the org to skip this step and gain /lgtm and other bot rights. We recommend asking approvers on your previous PRs to sponsor you.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@knative-prow knative-prow Bot added the needs-ok-to-test 🤖 Needs an org member to approve testing label May 14, 2026
Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Note

Copilot was unable to run its full agentic suite in this review.

Adds a read-only mode guard to the MCP build tool that blocks image pushes unless write mode is explicitly enabled.

Changes:

  • Reject build invocations with Push=true when the server is in read-only mode.
  • Surface a clear error mentioning the FUNC_ENABLE_MCP_WRITE=true toggle.

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Comment thread pkg/mcp/tools_build.go
Comment on lines +23 to +24
if s.readonly && input.Push != nil && *input.Push {
err = fmt.Errorf("the server is in read-only mode; set FUNC_ENABLE_MCP_WRITE=true to push images")
Comment thread pkg/mcp/tools_build.go
Comment on lines +23 to +24
if s.readonly && input.Push != nil && *input.Push {
err = fmt.Errorf("the server is in read-only mode; set FUNC_ENABLE_MCP_WRITE=true to push images")
Comment thread pkg/mcp/tools_build.go
}

func (s *Server) buildHandler(ctx context.Context, r *mcp.CallToolRequest, input BuildInput) (result *mcp.CallToolResult, output BuildOutput, err error) {
if s.readonly && input.Push != nil && *input.Push {
@codecov
Copy link
Copy Markdown

codecov Bot commented May 14, 2026

Codecov Report

❌ Patch coverage is 0% with 4 lines in your changes missing coverage. Please review.
✅ Project coverage is 56.96%. Comparing base (e435a89) to head (85c2957).

Files with missing lines Patch % Lines
pkg/mcp/tools_build.go 0.00% 3 Missing and 1 partial ⚠️
Additional details and impacted files
@@           Coverage Diff           @@
##             main    #3741   +/-   ##
=======================================
  Coverage   56.95%   56.96%           
=======================================
  Files         181      181           
  Lines       21116    21120    +4     
=======================================
+ Hits        12026    12030    +4     
+ Misses       7866     7865    -1     
- Partials     1224     1225    +1     
Flag Coverage Δ
e2e 35.80% <0.00%> (-0.02%) ⬇️
e2e go 32.42% <0.00%> (-0.01%) ⬇️
e2e node 28.20% <0.00%> (+<0.01%) ⬆️
e2e python 32.79% <0.00%> (-0.01%) ⬇️
e2e quarkus 28.33% <0.00%> (-0.01%) ⬇️
e2e rust 27.73% <0.00%> (?)
e2e springboot 26.26% <0.00%> (-0.01%) ⬇️
e2e typescript 28.30% <0.00%> (-0.03%) ⬇️
e2e-config-ci 17.70% <0.00%> (-0.01%) ⬇️
integration 17.29% <0.00%> (-0.01%) ⬇️
unit macos-14 45.04% <0.00%> (-0.01%) ⬇️
unit macos-latest 45.04% <0.00%> (-0.01%) ⬇️
unit ubuntu-24.04-arm 45.31% <0.00%> (-0.01%) ⬇️
unit ubuntu-latest 46.00% <0.00%> (-0.01%) ⬇️
unit windows-latest 45.08% <0.00%> (-0.01%) ⬇️

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.
  • 📦 JS Bundle Analysis: Save yourself from yourself by tracking and limiting bundle sizes in JS merges.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

needs-ok-to-test 🤖 Needs an org member to approve testing size/XS 🤖 PR changes 0-9 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants