"""Modular Unraid MCP Server. This is the main server implementation using the modular architecture with separate modules for configuration, core functionality, subscriptions, and tools. """ import sys from fastmcp import FastMCP from .config.logging import logger from .config.settings import ( UNRAID_MCP_HOST, UNRAID_MCP_PORT, UNRAID_MCP_TRANSPORT, UNRAID_VERIFY_SSL, VERSION, validate_required_config, ) from .subscriptions.diagnostics import register_diagnostic_tools from .subscriptions.resources import register_subscription_resources from .tools.unraid import register_unraid_tool # Initialize FastMCP instance mcp = FastMCP( name="Unraid MCP Server", instructions="Provides tools to interact with an Unraid server's GraphQL API.", version=VERSION, ) # Note: SubscriptionManager singleton is defined in subscriptions/manager.py # and imported by resources.py - no duplicate instance needed here def register_all_modules() -> None: """Register all tools and resources with the MCP instance.""" try: # Register subscription resources and diagnostic tools register_subscription_resources(mcp) register_diagnostic_tools(mcp) logger.info("Subscription resources and diagnostic tools registered") # Register the consolidated unraid tool register_unraid_tool(mcp) logger.info("unraid tool registered successfully - Server ready!") except Exception as e: logger.error(f"Failed to register modules: {e}", exc_info=True) raise def run_server() -> None: """Run the MCP server with the configured transport.""" # Validate required configuration before anything else is_valid, missing = validate_required_config() if not is_valid: logger.warning( f"Missing configuration: {', '.join(missing)}. " "Server will prompt for credentials on first tool call via elicitation." ) # Log configuration (delegated to shared function) from .config.logging import log_configuration_status log_configuration_status(logger) if UNRAID_VERIFY_SSL is False: logger.warning( "SSL VERIFICATION DISABLED (UNRAID_VERIFY_SSL=false). " "Connections to Unraid API are vulnerable to man-in-the-middle attacks. " "Only use this in trusted networks or for development." ) # Register all modules register_all_modules() logger.info( f"Starting Unraid MCP Server on {UNRAID_MCP_HOST}:{UNRAID_MCP_PORT} using {UNRAID_MCP_TRANSPORT} transport..." ) try: if UNRAID_MCP_TRANSPORT == "streamable-http": mcp.run( transport="streamable-http", host=UNRAID_MCP_HOST, port=UNRAID_MCP_PORT, path="/mcp" ) elif UNRAID_MCP_TRANSPORT == "sse": logger.warning("SSE transport is deprecated. Consider switching to 'streamable-http'.") mcp.run(transport="sse", host=UNRAID_MCP_HOST, port=UNRAID_MCP_PORT, path="/mcp") elif UNRAID_MCP_TRANSPORT == "stdio": mcp.run() else: logger.error( f"Unsupported MCP_TRANSPORT: {UNRAID_MCP_TRANSPORT}. Choose 'streamable-http', 'sse', or 'stdio'." ) sys.exit(1) except Exception as e: logger.critical(f"Failed to start Unraid MCP server: {e}", exc_info=True) sys.exit(1) if __name__ == "__main__": run_server()