Skip to content

Conversation

@sd2k
Copy link
Collaborator

@sd2k sd2k commented Sep 2, 2025

mcp-go v0.39.0 adds support for https when using the streamable-http
transport. This commit adds support for configuring the server to
serve https using custom certificates via the CLI.

Fixes #244.

mcp-go v0.39.0 adds support for https when using the streamable-http
transport. This commit adds support for configuring the server to
serve https using custom certificates via the CLI.

Fixes #244.
@sd2k sd2k requested a review from a team as a code owner September 2, 2025 10:41
Copy link

@svennergr svennergr left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, left a nit, but feel free to ignore.

server.WithEndpointPath(endpointPath),
)
}
if tls.certFile != "" || tls.keyFile != "" {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
if tls.certFile != "" || tls.keyFile != "" {
if tls.certFile != "" && tls.keyFile != "" {

Just a nit, but this seems to be a condition in mcp-go. You can also leave it, to actually return mcp-go's error message.

https://github.com/mark3labs/mcp-go/blob/35fc389d56010b24ef49f966868b8b948d2af48e/server/streamable_http.go#L204-L215

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Huh yeah, I thought I'd used your logic already but evidently not. I think I actually prefer just using mcp-go's error message though. Thanks for spotting!

@sd2k sd2k merged commit 319b552 into main Sep 2, 2025
10 of 13 checks passed
@sd2k sd2k deleted the server-tls branch September 2, 2025 11:39
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Feature: TLS/HTTPS Endpoint Support for MCP Server

2 participants