ProxmoxMCP-Plus v0.5.0
This release changes the OpenAPI security baseline. OpenAPI mode now refuses to start without PROXMOX_API_KEY unless PROXMOX_ALLOW_NO_AUTH=true is explicitly set for local unauthenticated development. HTTP clients must send Authorization: Bearer <PROXMOX_API_KEY>.
Highlights
- OpenAPI auth is enforced by a project-owned middleware using constant-time API key comparison.
- Auth failures now pass through the rate limiter, so repeated 401/403 responses can be throttled.
/livezprovides unauthenticated process liveness, while/readyzand/healthremain authenticated readiness endpoints.- Live E2E OpenAPI checks now set
PROXMOX_API_KEYand send Bearer auth to/healthand/openapi.json. - OpenAPI examples now include
Authorizationheaders. scripts/start_openapi.shnow launches the proxy with.venv/bin/pythonand checksmcpoin that virtual environment.- Paramiko is upgraded to
>=5.0.0,<6.0.0, removing the temporaryCVE-2026-44405audit exception.
Upgrade Notes
- Set
PROXMOX_API_KEYbefore starting OpenAPI mode through Docker, Compose, orpython -m proxmox_mcp.openapi_proxy. - Update HTTP/OpenAPI clients to include
Authorization: Bearer <PROXMOX_API_KEY>. - Use
/livezfor unauthenticated container or orchestrator liveness checks. - Use
/readyzor/healthwith auth when you need MCP backend readiness details. - Only set
PROXMOX_ALLOW_NO_AUTH=truefor local development where unauthenticated access is intentional. - Paramiko 5 removes legacy RSA/SHA-1 signatures, SHA-1 key exchange algorithms, and GSSAPI support. Update old SSH endpoints before upgrading if they depend on those algorithms.
Validation
pytest -q --cov=proxmox_mcp --cov-report=term-missing --cov-fail-under=60ruff check .mypy src --ignore-missing-importspip-audit -r requirements.txtpython -m build