1
0
mirror of synced 2025-12-19 18:10:59 -05:00
Files
docs/content/copilot/how-tos/use-copilot-agents/coding-agent/extend-coding-agent-with-mcp.md

15 KiB
Raw Blame History

title, shortTitle, allowTitleToDifferFromFilename, intro, versions, topics, redirect_from, contentType
title shortTitle allowTitleToDifferFromFilename intro versions topics redirect_from contentType
Extending Copilot coding agent with the Model Context Protocol (MCP) Extend coding agent with MCP true Learn how to use the Model Context Protocol (MCP) to extend the capabilities of {% data variables.copilot.copilot_coding_agent %}.
feature
copilot
Copilot
/copilot/customizing-copilot/using-model-context-protocol/extending-copilot-coding-agent-with-mcp
/copilot/customizing-copilot/extending-copilot-coding-agent-with-mcp
/early-access/copilot/coding-agent/extending-copilot-coding-agent-with-model-context-protocol
/copilot/using-github-copilot/coding-agent/extending-copilot-coding-agent-with-mcp
/copilot/how-tos/agents/copilot-coding-agent/extending-copilot-coding-agent-with-mcp
/copilot/how-tos/agents/copilot-coding-agent/extend-coding-agent-with-mcp
/copilot/how-tos/agents/coding-agent/extend-coding-agent-with-mcp
how-tos

Note

{% data reusables.copilot.coding-agent.preview-note-text %}

Prerequisite

Before setting up an MCP server for {% data variables.copilot.copilot_coding_agent %}, read AUTOTITLE to make sure you understand the concepts around MCP servers and {% data variables.copilot.copilot_coding_agent %}.

Introduction

As a repository administrator, you can configure MCP servers for use within your repository. You do this using a JSON-formatted configuration that specifies the details of the MCP servers you want to use. You enter the JSON configuration directly into the settings for the repository on {% data variables.product.prodname_dotcom_the_website %}.

Warning

Once you've configured an MCP server, {% data variables.product.prodname_copilot_short %} will be able to use the tools provided by the server autonomously, and will not ask for your approval before using them.

Adding an MCP configuration to your repository

Repository administrators can configure MCP servers by following these steps:

{% data reusables.repositories.navigate-to-repo %} {% data reusables.repositories.sidebar-settings %}

  1. In the "Code & automation" section of the sidebar, click {% data variables.product.prodname_copilot_short %} then {% data variables.copilot.copilot_coding_agent_short_cap_c %}.

  2. Add your configuration in the MCP configuration section.

    The following sections in this article explain how to write the JSON configuration that you need to enter here.

  3. Click Save.

    Your configuration will be validated to ensure proper syntax.

  4. If your MCP server requires a key or secret, add a secret to your {% data variables.product.prodname_copilot_short %} environment. Only secrets with names prefixed with COPILOT_MCP_ will be available to your MCP configuration. See Setting up a {% data variables.product.prodname_copilot_short %} environment for {% data variables.copilot.copilot_coding_agent %}.

Writing a JSON configuration for MCP servers

You configure MCP servers using a special JSON format. The JSON must contain an mcpServers object, where the key is the name of the MCP server (for example, sentry), and the value is an object with the configuration for that MCP server.

{
  "mcpServers": {
    "MCP SERVER 1": {
      "command": "VALUE",
      "args": [ VALUES ],
      ...
    },
    "MCP SERVER 2": {
      "command": "VALUE",
      "args": [ VALUES ],
      ...
    },
    ...
  }
}

The configuration object can contain the following keys:

Required keys for local and remote MCP servers

  • tools (string[]): The tools from the MCP server to enable. You may be able to find a list of tools in the server's documentation, or in its code. We strongly recommend that you allowlist specific read-only tools, since the agent will be able to use these tools autonomously and will not ask you for approval first. You can also enable all tools by including * in the array.
  • type (string): {% data variables.copilot.copilot_coding_agent %} accepts "local", "http", or "sse".

Local MCP specific keys

  • command (string): Required. The command to run to start the MCP server.
  • args (string[]): Required. The arguments to pass to the command.
  • env (object): Optional. The environment variables to pass to the server. This object should map the name of the environment variable that should be exposed to your MCP server to either of the following:
    • The name of a {% data variables.product.prodname_actions %} secret you have configured, beginning with COPILOT_MCP_.
    • A string value.

Remote MCP specific keys

  • url (string): Required. The MCP server's URL.
  • headers (object): Optional. The headers to attach to requests to the server. This object should map the name of header keys to either of the following:
    • The name of a {% data variables.product.prodname_actions %} secret you have configured, beginning with COPILOT_MCP_ preceded by a $
    • A string value

Example configurations

Example: Sentry

The Sentry MCP server gives {% data variables.product.prodname_copilot_short %} authenticated access to exceptions recorded in Sentry.

// If you copy and paste this example, you will need to remove the comments prefixed with `//`, which are not valid JSON.
{
  "mcpServers": {
    "sentry": {
      "type": "local",
      "command": "npx",
      // We can use the $SENTRY_HOST environment variable which is passed to
      // the server because of the `env` value below.
      "args": ["@sentry/mcp-server@latest", "--host=$SENTRY_HOST"],
      "tools": ["get_issue_details", "get_issue_summary"],
      "env": {
        // We can specify an environment variable value as a string...
        "SENTRY_HOST": "https://contoso.sentry.io",
        // or refer to a {% data variables.product.prodname_actions %} secret with a name starting with
        // `COPILOT_MCP_`
        "SENTRY_ACCESS_TOKEN": "COPILOT_MCP_SENTRY_ACCESS_TOKEN"
      }
    }
  }
}

Example: Notion

The Notion MCP server gives {% data variables.product.prodname_copilot_short %} authenticated access to notes and other content from Notion.

// If you copy and paste this example, you will need to remove the comments prefixed with `//`, which are not valid JSON.
{
  "mcpServers": {
    "notionApi": {
      "type": "local",
      "command": "docker",
      "args": [
        "run",
        "--rm",
        "-i",
        "-e",
        // We can use the $NOTION_API_KEY environment variable which is passed to
        // the server because of the `env` value below.
        "OPENAPI_MCP_HEADERS={\"Authorization\": \"Bearer $NOTION_API_KEY\", \"Notion-Version\": \"2022-06-28\"}",
       "mcp/notion"
      ],
      "env": {
        // The value of the `COPILOT_MCP_NOTION_API_KEY` secret will be passed to the
        // server command as an environment variable called `NOTION_API_KEY`
        "NOTION_API_KEY": "COPILOT_MCP_NOTION_API_KEY"
      },
      "tools": ["*"]
    }
  }
}

Example: Azure

The Azure MCP server creates a seamless connection between {% data variables.product.prodname_copilot_short %} and key Azure services such as Azure Cosmos DB and the Azure Storage platform.

To use the Azure MCP with {% data variables.copilot.copilot_coding_agent %}, you must update the repository's copilot-setup-steps.yml file to include an Azure login workflow step.

  1. Configure OIDC in a Microsoft Entra application, trusting {% data variables.product.github %}. See Use the Azure Login action with OpenID Connect.

  2. Add a .github/workflows/copilot-setup-steps.yml Actions workflow file in your repository if you do not already have one.

  3. Add an Azure login step to the copilot-setup-steps workflow job.

    on:
      workflow_dispatch:
    permissions:
      id-token: write
      contents: read
    jobs:
      copilot-setup-steps:
        runs-on: ubuntu-latest
        permissions:
          id-token: write
          contents: read
        environment: copilot
        steps:
          - name: Azure login
            uses: azure/login@a457da9ea143d694b1b9c7c869ebb04ebe844ef5
            with:
              client-id: {% raw %}${{ secrets.AZURE_CLIENT_ID }}{% endraw %}
              tenant-id: {% raw %}${{ secrets.AZURE_TENANT_ID }}{% endraw %}
              subscription-id: {% raw %}${{ secrets.AZURE_SUBSCRIPTION_ID }}{% endraw %}
    

    This configuration ensures the azure/login action is executed when {% data variables.copilot.copilot_coding_agent %} runs.

  4. In your repositorys {% data variables.product.prodname_copilot_short %} environment, add secrets for your AZURE_CLIENT_ID, AZURE_TENANT_ID and AZURE_SUBSCRIPTION_ID.

  5. Configure the Azure MCP server by adding an azure object to your MCP configuration.

 {
   "mcpServers": {
     "Azure": {
      "type": "local",
      "command": "npx",
      "args": [
        "-y",
        "@azure/mcp@latest",
        "server",
        "start"
       ],
      "tools": ["*"]
     }
   }
 }

Example: Cloudflare

The Cloudflare MCP server creates connections between your Cloudflare services, including processing documentation and data analysis.

{
  "mcpServers": {
    "cloudflare": {
      "type": "sse",
      "url": "https://docs.mcp.cloudflare.com/sse",
      "tools": ["*"]
    }
  }
}

Reusing your MCP configuration from {% data variables.product.prodname_vscode %}

If you have already configured MCP servers in {% data variables.product.prodname_vscode_shortname %}, you can leverage a similar configuration for {% data variables.copilot.copilot_coding_agent %}.

Depending on how {% data variables.product.prodname_vscode_shortname %} is configured, you may be able to find your MCP settings in your repository's .vscode/mcp.json file, or in your machine's private settings.json file.

To adapt the configuration for {% data variables.copilot.copilot_coding_agent %}, you will need to:

  1. Add a tools key for each MCP server, specifying which tools will be available to {% data variables.product.prodname_copilot_short %}.
  2. If you've configured inputs, switch to using env directly.
  3. If you've configured an envFile, switch to using env directly.
  4. Update any references to inputs in your args configuration to refer to environment variables from env instead.

For more information on MCP in {% data variables.product.prodname_vscode_shortname %}, see the {% data variables.product.prodname_vscode_shortname %} docs.

Setting up a {% data variables.product.prodname_copilot_short %} environment for {% data variables.copilot.copilot_coding_agent %}

Some MCP servers will require keys or secrets. To leverage those servers in {% data variables.copilot.copilot_coding_agent %}, you can add secrets to an environment for {% data variables.product.prodname_copilot_short %}. This ensures the secrets are properly recognized and passed to the applicable MCP server that you have configured.

You must be a repository administrator to configure a {% data variables.product.prodname_copilot_short %} environment for your repository.

{% data reusables.repositories.navigate-to-repo %} {% data reusables.repositories.sidebar-settings %} {% data reusables.actions.sidebar-environment %} {% data reusables.actions.new-environment %}

  1. Call the new environment copilot and click Configure environment.
  2. Under "Environment secrets", click Add environment secret.
  3. Give the secret a name beginning COPILOT_MCP_, add the secret value, then click Add secret.

Validating your MCP configuration

Once you've set up your MCP configuration, you should test it to make sure it is set up correctly.

  1. Create an issue in the repository, then assign it to {% data variables.product.prodname_copilot_short %}.
  2. Wait a few seconds, and {% data variables.product.prodname_copilot_short %} will leave an 👀 reaction on the issue.
  3. Wait a few more seconds, and {% data variables.product.prodname_copilot_short %} will create a pull request, which will appear in the issue's timeline.
  4. Click the created pull request in the timeline, and wait until a "Copilot started work" timeline event appears.
  5. Click View session to open the {% data variables.copilot.copilot_coding_agent %} logs.
  6. Click the ellipsis button (...) at the top right of the log viewer, then click {% data variables.product.prodname_copilot_short %} in the sidebar.
  7. Click the Start MCP Servers step to expand the logs.
  8. If your MCP servers have been started successfully, you will see their tools listed at the bottom of the logs.

If your MCP servers require any dependencies that are not installed on the {% data variables.product.prodname_actions %} runner by default, such as uv and pipx, or that need special setup steps, you may need to create a copilot-setup-steps.yml Actions workflow file to install them. For more information, see AUTOTITLE.

Customizing the built-in {% data variables.product.github %} MCP server

The {% data variables.product.github %} MCP server is enabled by default and connects to {% data variables.product.github %} with a specially scoped token that only has read-only access to the current repository.

If you want to allow {% data variables.product.prodname_copilot_short %} to access data outside the current repository, you can give it a {% data variables.product.pat_generic %} with wider access.

  1. Create a {% data variables.product.pat_generic %} with the appropriate permissions. We recommend using a {% data variables.product.pat_v2 %}, where you can limit the token's access to read-only permissions on specific repositories. For more information on {% data variables.product.pat_generic_plural %}, see AUTOTITLE. {% data reusables.repositories.navigate-to-repo %} {% data reusables.repositories.sidebar-settings %}
  2. In the "Code & automation" section of the sidebar, click {% data variables.product.prodname_copilot_short %} then {% data variables.copilot.copilot_coding_agent_short_cap_c %}.
  3. Add your configuration in the MCP configuration section.
  4. Click Save. {% data reusables.actions.sidebar-environment %}
  5. Click the copilot environment.
  6. Under "Environment secrets", click Add environment secret.
  7. Call the secret COPILOT_MCP_GITHUB_PERSONAL_ACCESS_TOKEN, enter your {% data variables.product.pat_generic %} in the "Value" field, then click Add secret.

For information on using the {% data variables.product.github %} MCP server in other environments, see AUTOTITLE.

Next steps