Add weekly update for 2026-05-11#864
Open
Derek2Tu wants to merge 3 commits into
Open
Conversation
Cover Redis topology support (standalone, cluster, Sentinel) for the embedded auth server's session storage, and Client ID Metadata Document (CIMD) support landing in the ToolHive CLI ahead of the embedded authorization server rollout. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
|
The latest updates on your projects. Learn more about Vercel for GitHub.
|
Lead both sections with the user pain point and value: pluggable Redis topologies for platforms that don't run Sentinel, and dropping dynamic client registration churn via CIMD in the CLI. Reorder the title and description to match. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
Update page title and section H2s to consistent product-focused wording: "Plug ToolHive into your existing Redis setup" and "ToolHive CLI now supports CIMD". Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
danbarr
reviewed
May 11, 2026
| @@ -0,0 +1,65 @@ | |||
| --- | |||
| title: Plug ToolHive into your existing Redis setup, and CIMD in the CLI | |||
| sidebar_label: 'May 11: Existing Redis and CIMD in the CLI' | |||
Collaborator
There was a problem hiding this comment.
Suggested change
| sidebar_label: 'May 11: Existing Redis and CIMD in the CLI' | |
| sidebar_label: 'May 11: Redis flexibility and CIMD in the CLI' |
I think "Redis flexibility" is more accurate? AFAIK it was always an existing Redis, we just have more flexibility around your specific topology?
Comment on lines
+21
to
+25
| - **Standalone Redis** for simpler operations when high availability isn't a | ||
| hard requirement. | ||
| - **Redis Cluster** for sharded scale-out across multiple nodes. | ||
| - **Redis Sentinel** for HA with automatic failover (still the recommended | ||
| default for production). |
Collaborator
There was a problem hiding this comment.
@reyortiz3 is this still the correct framing? Aren't the other modes a match for managed Redis where the provider is handling the HA? This implies they're not suitable for production.
| [Redis session storage](/toolhive/guides-k8s/redis-session-storage#configure-mcpexternalauthconfig) | ||
| for the YAML and TLS examples. | ||
|
|
||
| ## ToolHive CLI now supports CIMD |
Collaborator
There was a problem hiding this comment.
Should this section mention the fact that CIMD is preferred over DCR now in the MCP spec (DCR isn't even mentioned here)? Shows we're keeping up with upstream changes?
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Description
Adds the 2026-05-11 weekly update post covering:
MCPExternalAuthConfigresource now accepts Redis standalone and Redis Cluster alongside the existing Sentinel option, so operators can match the Redis deployment their platform already runs.thvCLI. The CLI can present a hosted metadata document to upstream IdPs instead of going through dynamic client registration, avoiding stale client entries from short-lived MCP clients. Embedded authorization server support is still in development; this release lands CIMD in the local CLI experience first.Type of change
Submitter checklist
Content and formatting
🤖 Generated with Claude Code