Documents all changes made to svc.metacircular.net for MCP v2 Phase 1: mcp-agent deployment, user creation, TLS cert, systemd unit, mc-proxy socket access. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
3.1 KiB
3.1 KiB
svc.metacircular.net — Phase 1 Work Log
Date: 2026-04-02 Purpose: Deploy mcp-agent to svc (edge node) for MCP v2 Phase 1.
Changes Made
1. Created mcp system user
useradd --system --home-dir /srv/mcp --create-home --shell /usr/sbin/nologin mcp
usermod -aG mc-proxy mcp
- UID 992, GID 991
- Member of
mc-proxygroup for socket access
2. Created /srv/mcp/ directory structure
/srv/mcp/
├── mcp-agent # binary (v0.8.3-1-gfa8ba6f, linux/amd64)
├── mcp-agent.toml # agent config
├── mcp.db # SQLite registry (created on first run)
└── certs/
├── cert.pem # TLS cert (SAN: IP:100.106.232.4, DNS:svc.svc.mcp.metacircular.net)
├── key.pem # TLS private key
└── ca.pem # Metacircular CA cert
- Owned by
mcp:mcp, key file mode 0600
3. TLS certificate
- Issued from the Metacircular CA (
ca/ca.pem+ca/ca.key) - Subject:
CN=mcp-agent-svc - SANs:
IP:100.106.232.4,DNS:svc.svc.mcp.metacircular.net - Validity: 365 days
- Stored at
/srv/mcp/certs/{cert,key,ca}.pem
4. Agent configuration
- File:
/srv/mcp/mcp-agent.toml - gRPC listen:
100.106.232.4:9555(port 9444 in use by MCNS) - MCIAS:
https://mcias.metacircular.net:8443 - mc-proxy socket:
/srv/mc-proxy/mc-proxy.sock - Node name:
svc - Runtime:
podman(not used on edge, but required by config)
5. systemd unit
- File:
/etc/systemd/system/mcp-agent.service - Runs as
mcp:mcp - Security hardened (NoNewPrivileges, ProtectSystem=strict, etc.)
- ReadWritePaths:
/srv/mcp,/srv/mc-proxy/mc-proxy.sock - Enabled and started
6. mc-proxy directory permissions
- Changed
/srv/mc-proxy/fromdrwx------todrwxr-x---(group traversal) - Changed
/srv/mc-proxy/mc-proxy.sockfromsrw-------tosrw-rw----(group read/write) - Required for
mcpuser (inmc-proxygroup) to access the socket
7. MCP CLI config update (on rift)
- Added svc node to
~/.config/mcp/mcp.toml:[[nodes]] name = "svc" address = "100.106.232.4:9555"
Verification
$ mcp node list
NAME ADDRESS VERSION
rift 100.95.252.120:9444 v0.8.3-dirty
svc 100.106.232.4:9555 v0.8.3-1-gfa8ba6f
$ mcp route list -n svc
NODE: svc
mc-proxy v1.2.1-2-g82fce41-dirty
:443 routes=6
l7 git.wntrmute.dev → 127.0.0.1:3000
l7 kls.metacircular.net → 100.95.252.120:58080
l7 mcq.metacircular.net → 100.95.252.120:48080
l7 metacrypt.metacircular.net → 100.95.252.120:18080 (re-encrypt)
l7 docs.metacircular.net → 100.95.252.120:38080
l7 git.metacircular.net → 127.0.0.1:3000
Known Limitations
mc-proxy socket permissions will reset on restartFIXED: mc-proxy now creates the socket with 0660 (was 0600). Committed to mc-proxy master.- The TLS cert was issued from the local CA directly, not via Metacrypt API. Should be re-issued via Metacrypt once the agent has cert provisioning.
- Container runtime is set to
podmanbut podman is not installed on svc (Docker is). Edge agents don't run containers so this is benign. - Metacrypt and MCNS integrations not configured (not needed for edge role).