Polarion MCP Servers
MCP server for integrating with Polarion Application Lifecycle Management (ALM).
Polarion MCP Servers
This repository contains Model Context Protocol (MCP) server implementations for Polarion Application Lifecycle Management (ALM) integration.
MCP Tools are available for Polarion work items, including:
get_text_for_workitems_by_id: Gets the main text content for specified WorkItem IDs.get_text_for_workitem_at_revision: Gets the text content for a single WorkItem at a specific revision.get_details_for_workitems: Gets detailed information for specified WorkItem IDs including status, type, assignee, custom fields, and linked work items.get_documents: Lists documents in the project, optionally filtered by title.get_documents_by_space_names: Lists documents within specified space names.get_space_names: Lists all available space names in the project.get_sections_in_document: Gets the list of sections in a document.get_section_content_for_document: Gets the content of a specific section in a document.search_workitems_in_document: Searches for WorkItems within a document based on text criteria.list_available_custom_fields_for_workitem_types: Lists all available custom fields for specific WorkItem types.list_available_workitem_types: Lists all WorkItem types available in the project.get_revisions_list_for_workitem: Gets the list of revision IDs for a specific work item, ordered from newest to oldest.get_revisions_content_for_workitem: Gets the content of a work item at different revisions, including title, status, description, and other standard fields.
Projects
- PolarionRemoteMcpServer: (Streamable HTTP or SSE) based MCP server for server based installations
- PolarionMcpServer: Console-based MCP server for Polarion integration for local workstation installations
Running via Docker & Linux Server (Recommended)
-
From your Linux server, create a directory for your configuration and logs:
mkdir -p /opt/polarion-mcp-server cd /opt/polarion-mcp-server -
Pull the Docker image:
docker pull peakflames/polarion-remote-mcp-server -
Create a tailored
/opt/polarion-mcp-server/appsettings.jsonfile to your Polarion configuration:{ "Logging": { "LogLevel": { "Default": "Information", "Microsoft.AspNetCore": "Warning" } }, "AllowedHosts": "*", "ApiConsumers": { "Consumers": { "my_app": { "Name": "My Application", "ApplicationKey": "your-secure-api-key-here", "Active": true, "AllowedScopes": ["polarion:read"], "Description": "API consumer for my application" } } }, "PolarionProjects": [ { "ProjectUrlAlias": "starlight", "Default": true, "SessionConfig": { "ServerUrl": "https://polarion.int.mycompany.com/", "Username": "shared_user_read_only", "Password": "linear-Vietnam-FLIP-212824", "ProjectId": "Starlight_Main", "TimeoutSeconds": 60 }, "PolarionWorkItemTypes": [ { "id": "requirement", "fields": ["custom_field_1", "priority", "severity"] }, { "id": "defect", "fields": ["defect_type", "found_in_build"] } ] }, { "ProjectUrlAlias": "octopus", "Default": false, "SessionConfig": { "ServerUrl": "https://polarion.int.mycompany.com/", "Username": "some_other_user", "Password": "linear-Vietnam-FLIP-212824", "ProjectId": "octopus_gov", "TimeoutSeconds": 60 } }, { "ProjectUrlAlias": "grogu", "Default": false, "SessionConfig": { "ServerUrl": "https://polarion-dev.int.mycompany.com/", "Username": "vader", "Password": "12345", "ProjectId": "grogu_boss", "TimeoutSeconds": 60 } } ] } -
Run the Docker container:
docker run -d \ --name polarion-mcp-server \ -p 8080:8080 \ -v appsettings.json:/app/appsettings.json \ peakflames/polarion-remote-mcp-server -
The server should now be running. MCP clients will connect using a URL specific to the desired project configuration alias:
- Streamable HTTP Transport:
http://{{your-server-ip}}:8080/{ProjectUrlAlias}. - SSE Transport:
http://{{your-server-ip}}:8080/{ProjectUrlAlias}/sse.
- Streamable HTTP Transport:
-
The server also provides:
- REST API:
http://{{your-server-ip}}:8080/polarion/rest/v1/projects/{ProjectId}/...(usesSessionConfig.ProjectId)- Note: REST API endpoints require API key authentication via
X-API-Keyheader
- Note: REST API endpoints require API key authentication via
- API Documentation:
http://{{your-server-ip}}:8080/scalar/v1(includes authentication UI) - Health Check:
http://{{your-server-ip}}:8080/api/health
- REST API:
-
📢IMPORTANT - Do NOT run with replica instances of the server as the session connection will not be shared between replicas.
Configuration Options
Configuration Files:
appsettings.json- Base configuration for production/server deploymentsappsettings.Development.json- Overrides base settings for local development (gitignored, takes precedence in Development mode).env- Optional environment variables (copy from.env.example), can setPOLARION_DEFAULT_PROJECT
The server uses a PolarionProjects array in appsettings.json to define one or more Polarion instance configurations. Each object in the array represents a distinct configuration accessible via a unique URL alias.
| Top-Level Setting | Description |
|---|---|
PolarionProjects | (Array) Contains one or more Polarion project configuration objects. |
Each Project Configuration Object:
| Setting | Description | Required | Default |
|---|---|---|---|
ProjectUrlAlias | A unique string used in the connection URL (/{ProjectUrlAlias}/sse) to identify this configuration. | Yes | N/A |
Default | (boolean) If true, this configuration is used if the client connects without specifying a ProjectUrlAlias. Only one entry can be true. | No | false |
SessionConfig | (Object) Contains the specific connection details for this Polarion instance. | Yes | N/A |
PolarionWorkItemTypes | (Array, Optional) Defines custom fields to retrieve for specific WorkItem types within this project. Each object in the array should have an id (string, WorkItem type ID) and fields (array of strings, custom field names). | No | Empty List |
SessionConfig Object Details:
| Setting | Description | Required | Default |
|---|---|---|---|
ServerUrl | URL of the Polarion server (e.g., "https://polarion.example.com/") | Yes | N/A |
Username | Polarion username with appropriate permissions. | Yes | N/A |
Password | Password for the Polarion user. (Consider secure alternatives) | Yes | N/A |
ProjectId | The actual ID of the Polarion project to interact with. | Yes | N/A |
TimeoutSeconds | Connection timeout in seconds. | No | 60 |
Note: It is strongly recommended to use more secure methods for storing credentials (like User Secrets, Azure Key Vault, etc.) rather than placing plain text passwords in appsettings.json.
API Key Authentication (REST API Only)
REST API endpoints require authentication via API key. Configure API consumers in the ApiConsumers section of appsettings.json:
| Setting | Description | Required |
|---|---|---|
ApiConsumers.Consumers | Dictionary of consumer configurations keyed by consumer ID | Yes |
Name | Display name for the API consumer | Yes |
ApplicationKey | The API key used for authentication | Yes |
Active | Whether the consumer is allowed to authenticate | Yes |
AllowedScopes | List of scopes (e.g., ["polarion:read"]) | Yes |
Description | Optional description of the consumer | No |
Available Scopes:
polarion:read- Read access to all REST API endpoints
Usage:
curl -H "X-API-Key: your-api-key" http://localhost:8080/polarion/rest/v1/projects/{projectId}/spaces
Note: MCP endpoints, health checks (/api/health, /api/version), and API documentation (/scalar/v1) do not require authentication.
Configuring MCP Clients
To configure Cline:
- Open Cline's MCP settings UI
- Click the "Remote Servers" tab
- For each
ProjectUrlAliasin yourappsettings.jsonthat the user wants to connect to:
{
"mcpServers": {
...
...
"Polarion Starling": {
"autoApprove": [],
"disabled": true,
"timeout": 60,
"url": "http://{{your-server-ip}}:8080/starlight/sse",
"transportType": "sse"
},
"Polarion Octopus": {
"autoApprove": [],
"disabled": true,
"timeout": 60,
"url": "http://{{your-server-ip}}:8080/octopus/sse",
"transportType": "sse"
}
...
...
}
- Repeat for each
ProjectUrlAliasyou want to connect to.
To configure Visual Studio Code:
Add the following configuration to your settings.json file:
"servers": {
"polarion-starlight": { // Use a descriptive key
"type": "sse",
"url": "http://{{your-server-ip}}:8080/starlight/sse", // Replace with your alias
"env": {}
},
"polarion-octopus": {
"type": "sse",
"url": "http://{{your-server-ip}}:8080/octopus/sse", // Replace with your alias
"env": {}
}
// Add entries for each ProjectUrlAlias
}
To Claude Desktop:
Claude Desktop currently doesn’t support SSE, but you can use a proxy with the following addition to the claude_desktop_config.json file:
{
"mcpServers": {
"polarion-remote": {
"command": "npx",
"args": [
"mcp-remote",
"http://{{your-server-ip}}:8080/{ProjectUrlAlias}/sse" // Replace {ProjectUrlAlias}
]
}
// Add entries for each ProjectUrlAlias, potentially using different keys like "polarion-starlight"
}
}
Running Locally (stdio)
For local development or workstation use, you can run the stdio-based MCP server:
- Download the appropriate executable for your platform from the releases page
- Configure your MCP client to use the stdio transport with the executable path
Contributing
For developers who want to contribute or build from source, see CONTRIBUTING.md.
License
See LICENSE for details.
Похожие серверы
Scout Monitoring MCP
спонсорPut performance and error data directly in the hands of your AI assistant.
Alpha Vantage MCP Server
спонсорAccess financial market data: realtime & historical stock, ETF, options, forex, crypto, commodities, fundamentals, technical indicators, & more
ndlovu-code-reviewer
Manual code reviews are time-consuming and often miss the opportunity to combine static analysis with contextual, human-friendly feedback. This project was created to experiment with MCP tooling that gives AI assistants access to a purpose-built reviewer. Uses the Gemini cli application to process the reviews at this time and linting only for typescript/javascript apps at the moment. Will add API based calls to LLM's in the future and expand linting abilities. It's also cheaper than using coderabbit ;)
Sentry
Retrieve and analyze issues, error reports, and debugging information from Sentry.io.
Tauri MCP Server
A server for testing and interacting with Tauri v2 applications, providing tools for process management, window manipulation, and debugging.
IBM wxflows
Tool platform by IBM to build, test and deploy tools for any data source
zig-mcp
MCP server for Zig that connects AI coding assistants to ZLS (Zig Language Server) via LSP — 16 tools for code intelligence, build, and test.
Cache Overflow
knowledge network for AI coding agents. Developers connect their agents to a shared pool of verified solutions — saving tokens, reducing debugging time, and getting better results. Solution authors earn when their work helps others.
Console Automation
Production-ready MCP server for AI-driven console automation and monitoring. 40+ tools for session management, SSH, testing, and background jobs.
MCP Github OAuth
An MCP server with built-in GitHub OAuth support, deployable on Cloudflare Workers.
MCP Montano Server
A general-purpose server project built with TypeScript.
GrowthBook
Create and read feature flags, review experiments, generate flag types, search docs, and interact with GrowthBook's feature flagging and experimentation platform.