Perforce P4 MCP Server is a Model Context Protocol (MCP) server that integrates with the Perforce P4 version control system. It is built on FastMCP with direct P4 Python bindings to expose safe, structured read/write tools for changelists, files, shelves, workspaces, jobs, reviews, and server metadata.
Features · Prerequisites · System Requirements · Install · Deployment · Client Configurations · P4 Configurations · Tools
Logging · Troubleshoot · Support · Contributions · License
- Comprehensive P4 integration: Read/write tools across files, changelists, shelves, workspaces, jobs, reviews, streams, and server information.
- Code review workflows: P4 Code Review support for review discovery, voting, state transitions, commenting, and participant management.
- Safety first: Read-only mode by default, ownership checks, interactive MCP elicitation (PROCEED/CANCEL) for destructive delete and obliterate operations.
- Flexible toolsets: Configure which tool categories to enable: server, files, changelists, shelves, workspaces, jobs, reviews, and streams.
- Robust logging: Application and session logging to the
logs/directory. - Optional telemetry: Consent-gated usage statistics. Disabled by default.
- Cross platform: Supported on macOS, Linux and Windows with pre-built binaries.
- P4 Server access: Connection to a P4 Server with proper credentials
- Authentication: Valid P4 login (ticket-based or password)
| Component | Supported Versions |
|---|---|
| Operating Systems | Windows 10+ macOS 12+ Linux (glibc 2.34+, e.g. Ubuntu 22.04+, Rocky Linux 9+) |
| Perforce P4 Server | 2025.2 (earlier versions untested) |
| Python | 3.11+ (required only for building from source) |
Pre-built binaries (recommended)
Download the appropriate binary for your operating system:
- macOS: p4-mcp-server-mac.zip
- Windows: p4-mcp-server-win.zip
- Linux: p4-mcp-server-linux.zip
Extract and use the executable directly. No Python installation is required.
# macOS / Linux
unzip p4-mcp-server-mac.zip # or p4-mcp-server-linux.zip
./p4-mcp-server --help# Windows
Expand-Archive p4-mcp-server-win.zip -DestinationPath .
.\p4-mcp-server.exe --helpBuild from source
Requirements:
- Python 3.11+ (with Tkinter)
Build:
- macOS:
chmod +x build.sh && ./build.sh package - Linux:
chmod +x build.sh && ./build.sh package - Windows:
build.bat package
Output:
- macOS & Linux:
p4-mcp-server-<version>.tgz - Windows:
p4-mcp-server-<version>.zip
Local
Run the P4 MCP Server directly on your machine using the default STDIO transport.
Add the following to your mcp.json:
{
"mcpServers": {
"perforce-p4-mcp": {
"command": "/absolute/path/to/p4-mcp-server",
"env": {
"P4PORT": "ssl:perforce.example.com:1666",
"P4USER": "your_username",
"P4CLIENT": "your_workspace"
},
"args": [
"--readonly", "--allow-usage"
]
}
}
}Note: This example shows explicit
envvalues. IfP4CONFIGis set, you can omit them and use the generic configuration example in theMCP client configurationsection instead.
Docker
Run the P4 MCP Server from a Docker container with STDIO transport, allowing MCP clients to manage the container lifecycle.
Note: Docker-based execution is currently supported on macOS and Linux only.
Prerequisites
- Docker installed and running
- Valid P4 credentials and access to a P4 server
Pull the Docker image
docker pull ghcr.io/perforce/p4mcp-server:latestBuild from source instead
cd /path/to/p4mcp-server
docker build -t ghcr.io/perforce/p4mcp-server .Configure MCP Client
Add the following to your mcp.json:
{
"servers": {
"perforce-p4mcp-docker": {
"command": "docker",
"args": [
"run", "-i", "--rm",
"--hostname", "your-hostname",
"-e", "P4PORT=ssl:perforce.example.com:1666",
"-e", "P4USER=your_username",
"-e", "P4CLIENT=your_workspace",
"-v", "/Users/your_username/.p4tickets:/home/mcpuser/.p4tickets:ro",
"ghcr.io/perforce/p4mcp-server:latest"
]
}
}
}Configuration Options
| Flag | Description |
|---|---|
-i |
Interactive mode (required for STDIO) |
--rm |
Remove container when stopped |
--hostname |
Match workspace host restriction |
-e P4PORT |
P4 server address |
-e P4USER |
P4 username |
-e P4CLIENT |
Workspace name |
-v |
Mount P4 tickets file |
Authentication
Using P4 tickets:
# macOS/Linux
-v /Users/your_username/.p4tickets:/home/mcpuser/.p4tickets:roNote: Use the full path to your tickets file (not
~). After runningp4 login, restart the MCP server to pick up the new ticket.
Using a password:
-e P4PASSWD="your_password"Workspace Host Restrictions
⚠️ Important: Docker containers have their own hostname, which differs from your local machine. If your P4 workspace is restricted to a specific host, operations likesyncwill fail.
To resolve this, set the container hostname to match your workspace's host restriction:
--hostname your-hostnameTo find your workspace host name:
# macOS/Linux
p4 client -o your_workspace | grep "^Host:"Mounting Client Root for Write Operations
⚠️ Important: By default, the Docker container cannot access your local workspace files. For write operations likesync,submit, orreconcile, you must mount your client root directory into the container at the same path.
Add a volume mount for your client root:
-v /path/to/your/client/root:/path/to/your/client/rootExample configuration with client root mounted:
{
"servers": {
"perforce-p4mcp-docker": {
"command": "docker",
"args": [
"run", "-i", "--rm",
"--hostname", "your-hostname",
"-e", "P4PORT=ssl:perforce.example.com:1666",
"-e", "P4USER=your_username",
"-e", "P4CLIENT=your_workspace",
"-v", "/Users/your_username/.p4tickets:/home/mcpuser/.p4tickets",
"-v", "/path/to/client/root:/path/to/client/root",
"ghcr.io/perforce/p4mcp-server:latest"
]
}
}
}To find your client root:
p4 client -o your_workspace | grep "^Root:"Note: The mount path inside the container must match the client root path exactly, as P4 tracks files by their absolute paths.
VM
Run the MCP server on a VM using the HTTP transport, allowing clients to connect over the network.
Start the server on the VM:
P4PORT=ssl:perforce.example.com:1666 P4USER=your_username P4PASSWD=YOUR_TICKET ./p4-mcp-server --readonly --transport http --port 8000Configure the MCP client:
Add the following to your mcp.json:
{
"servers": {
"perforce-p4-mcp": {
"type": "http",
"url": "http://<ip-or-hostname>:8000/mcp"
}
}
}Note: Ensure the VM's firewall allows inbound connections on the chosen port. For production use, consider placing the server behind a reverse proxy with TLS.
Docker
Run the MCP server in a Docker container using HTTP transport and expose the MCP endpoint over a host port.
Start the container:
docker run --rm -p 8000:8000 \
-e P4PORT=ssl:perforce.example.com:1666 \
-e P4USER=your_username \
-e P4PASSWD=YOUR_TICKET \
ghcr.io/perforce/p4mcp-server:latest \
python3 -m src.main --readonly --transport http --port 8000Configure the MCP client:
Add the following to your mcp.json:
{
"servers": {
"perforce-p4-mcp": {
"type": "http",
"url": "http://<ip-or-hostname>:8000/mcp"
}
}
}Note: Docker supports HTTP-based deployment as well. The container image defaults to STDIO transport, so the HTTP startup command must explicitly override the default command. If you need write operations, also mount the client root and ticket file paths into the container.
Note: In all configuration examples below, if
P4CONFIGis set, you do not need to set any environment variables in theenvblock. The server will use the configuration from the specified P4CONFIG file instead.Server configuration example
{ "mcpServers": { "perforce-p4-mcp": { "command": "/absolute/path/to/p4-mcp-server", "env": { }, "args": [ "--readonly", "--allow-usage" ] } } }
JetBrains IDEs (IntelliJ IDEA, Rider, PyCharm, etc.)
See the JetBrains AI Assistant VCS Integration documentation for detailed configuration steps.
Claude Code
See the Claude Code MCP docs for more information.
{
"mcpServers": {
"perforce-p4-mcp": {
"command": "/absolute/path/to/p4-mcp-server",
"env": {
"P4PORT": "ssl:perforce.example.com:1666",
"P4USER": "your_username",
"P4CLIENT": "your_workspace"
},
"args": [
"--readonly", "--allow-usage"
]
}
}
}Cursor
See the Cursor MCP documentation for more information.
{
"mcpServers": {
"perforce-p4-mcp": {
"command": "/absolute/path/to/p4-mcp-server",
"env": {
"P4PORT": "ssl:perforce.example.com:1666",
"P4USER": "your_username",
"P4CLIENT": "your_workspace"
},
"args": [
"--readonly", "--allow-usage"
]
}
}
}Eclipse
See the Eclipse MCP documentation for more information.
{
"servers": {
"perforce-p4-mcp": {
"command": "/absolute/path/to/p4-mcp-server",
"env": {
"P4PORT": "ssl:perforce.example.com:1666",
"P4USER": "your_username",
"P4CLIENT": "your_workspace"
},
"args": [
"--readonly", "--allow-usage"
]
}
}
}Kiro
See the Kiro MCP documentation for more information.
{
"mcpServers": {
"perforce-p4-mcp": {
"command": "/absolute/path/to/p4-mcp-server",
"env": {
"P4PORT": "ssl:perforce.example.com:1666",
"P4USER": "your_username",
"P4CLIENT": "your_workspace"
},
"args": [
"--readonly", "--allow-usage"
]
}
}
}VS Code
See the VS Code documentation for more information.
{
"servers": {
"perforce-p4-mcp": {
"command": "/absolute/path/to/p4-mcp-server",
"env": {
"P4PORT": "ssl:perforce.example.com:1666",
"P4USER": "your_username",
"P4CLIENT": "your_workspace"
},
"args": [
"--readonly", "--allow-usage"
]
}
}
}Windsurf
See the Windsurf MCP documentation for more information.
{
"mcpServers": {
"perforce-p4-mcp": {
"command": "/absolute/path/to/p4-mcp-server",
"env": {
"P4PORT": "ssl:perforce.example.com:1666",
"P4USER": "your_username",
"P4CLIENT": "your_workspace"
},
"args": [
"--readonly", "--allow-usage"
]
}
}
}P4PORT- P4 Server address. Examples:ssl:perforce.example.com:1666,localhost:1666P4USER- Your P4 usernameP4CLIENT- Your current P4 workspace. Optional, but recommended
P4MCP_TLS_CA_MODE- TLS certificate source mode.system(default): use OS trust store viatruststore. Note: In this mode,truststoreoverrides theverify=parameter — custom CA bundles set viaP4MCP_CA_BUNDLEor--ca-bundleare ignored. To use a custom CA bundle, setP4MCP_TLS_CA_MODE=certifi.certifi: disabletruststoreinjection and use default Python TLS certificate behavior. Custom CA bundles (P4MCP_CA_BUNDLE/--ca-bundle) take effect only in this mode.
P4MCP_SSL_VERIFY- Set tofalseto disable SSL verification for P4 Code Review API requests. Default:true. Works in both TLS modes.P4MCP_CA_BUNDLE- Path to a custom CA certificate bundle (PEM) for P4 Code Review API requests. Takes priority overP4MCP_SSL_VERIFY. RequiresP4MCP_TLS_CA_MODE=certifito take effect.
-
--readonly- Control write operations.- If present, uses read-only mode. Safe for exploration and testing.
- If missing, enables write operations. Requires proper permissions on your P4 Server.
-
--allow-usage- Allow usage statistics.- If present, allows anonymous usage statistics collection.
- If missing, disables all usage statistics.
-
--toolsets- Specify which tool categories to enable.- Available:
files,changelists,shelves,workspaces,jobs,reviews,streams - Default: All toolsets enabled.
query_serveris always available regardless of the--toolsetssetting.
- Available:
-
--search-transform- Enable search-based tool discovery to reduce token overhead.regex— Expose a regex pattern-matching search tool. Best for targeted lookups.bm25— Expose a natural-language relevance-ranked search tool. Best for exploratory queries.both— Expose both search tools with distinct names (regex_search_tools/regex_call_toolandsemantic_search_tools/semantic_call_tool).- If omitted, the full tool catalog is sent to the client (default, backward-compatible).
- When enabled,
query_serveris always directly visible to the client. - Security: Admin permission checks (
CheckPermissionMiddleware) and--readonlyfiltering remain fully enforced. Search transforms query the real tool catalog internally, so tools blocked by middleware or excluded by read-only mode are never discoverable or callable through the search interface.
-
--ssl-no-verify- Disable SSL certificate verification for P4 Code Review API requests.- Useful for environments with self-signed or internal CA certificates.
- Works in both
systemandcertifiTLS modes. - These SSL options only affect HTTPS Swarm connections. If the Swarm URL is
http://, they have no effect.
-
--ca-bundle <path>- Path to a custom CA certificate bundle (PEM) for P4 Code Review API requests.- Use this to trust an internal CA without disabling verification entirely.
- Requires
P4MCP_TLS_CA_MODE=certifito take effect. In the defaultsystemmode,truststoreuses the OS trust store and ignores this setting. - If both
--ca-bundleand--ssl-no-verifyare provided,--ca-bundletakes priority (verification is performed using the specified bundle).
Priority order:
--ca-bundle>--ssl-no-verify>P4MCP_CA_BUNDLE>P4MCP_SSL_VERIFY> default (true). CLI args take priority over environment variables.
- Use absolute paths for the
commandfield in all configurations. - Ensure environment variables are properly set for each host.
- Different hosts may have different argument parsing. Refer to the host's documentation.
Example setup
# Windows (PowerShell)
$env:P4PORT = "ssl:perforce.example.com:1666"
$env:P4USER = "your_username"
$env:P4CLIENT = "your_workspace"# macOS/Linux (Bash)
export P4PORT="ssl:perforce.example.com:1666"
export P4USER="your_username"
export P4CLIENT="your_workspace"Manage access through group-level and user-level server properties. P4 resolves each property to a single value using two rules, applied in order:
- Highest sequence number wins. The
-sflag is the primary sort key. It applies across all scopes — a group property at-s5beats a user property at-s1or default. - At the same sequence number, scope is the tiebreaker: user > group > global. Between groups at the same sequence, the alphabetically-first group name wins.
P4 does not compare values semantically. It does not know that false is more restrictive than true. The winning property's value is returned as-is and checked by the MCP server.
If no property applies, MCP remains enabled unless explicitly disabled.
To disable MCP for all users:
p4 property -a -n mcp.enabled -v false
To re-enable group/user-based control, delete the global property first:
p4 property -d -n mcp.enabled
Group-based restrictions
To prevent access for all members of a specific group:
p4 property -a -n mcp.enabled -v false -g noaccessgroup
You can set multiple group restrictions the same way.
When a user belongs to multiple groups with conflicting settings, P4's property resolution determines which value wins.
The highest sequence number (-s) wins. At equal sequence numbers, the alphabetically-first group name wins.
Example:
p4 property -a -n mcp.enabled -v false -s1 -g noaccessgroup
p4 property -a -n mcp.enabled -v true -s2 -g accessgroup
In this example, accessgroup wins because -s2 is higher than -s1.
User-based restrictions
To block a specific user regardless of group membership:
p4 property -a -n mcp.enabled -v false -u noaccessuser
At the same sequence number, user-level properties override group-level and global settings (P4's scope tiebreaker).
Example: Even if noaccessuser is in accessgroup (where MCP is enabled), the user property at the same sequence takes precedence and MCP is disabled.
Note: A group property at a higher
-svalue can override a user property at a lower sequence number. To ensure a user-level property always wins, give it a high-svalue or ensure no group properties use a higher sequence.
Toolset allowlist (global)
Restrict which toolsets are available server-wide using mcp.toolsets.allowed. Only listed toolsets will be enabled; all others are blocked.
Available toolsets: server, changelists, files, jobs, reviews, shelves, workspaces, streams
Allow only changelists and files:
p4 property -a -n mcp.toolsets.allowed -v changelists,files
Remove the allowlist to restore all toolsets:
p4 property -d -n mcp.toolsets.allowed
Global read-only mode
Disable all write operations (modify tools) while keeping read operations (query tools) available:
p4 property -a -n mcp.toolsets.write -v false
Re-enable writes:
p4 property -a -n mcp.toolsets.write -v true
When write=false, all modify_* tools are blocked but all query_* tools continue to work.
Toolset enable/disable per group
Enable or disable individual toolsets for a specific group.
Disable a toolset for a specific group:
p4 property -a -n mcp.toolset.changelists.enabled -v false -g reviewers
Users in reviewers are blocked from changelists. Users in other groups (with no explicit setting) retain default access.
To restrict a toolset to only one group, disable it for every other group that should not have access:
p4 property -a -n mcp.toolset.files.enabled -v false -g reviewers
p4 property -a -n mcp.toolset.files.enabled -v false -g interns
# Only groups without an explicit "false" retain default access to files
Note: All toolsets are enabled by default. Setting
enabled=truefor a group is redundant unless you are explicitly overriding a previousfalsesetting. At the same sequence number, a group property overrides a global property (P4's scope tiebreaker), so a groupenabled=truecan override a globalenabled=false. To ensure a global setting cannot be overridden, give it a high-svalue. To isolate a toolset to specific groups, disable it for the groups you want to block.
Write control per toolset per group
Control write access for each toolset at the group level.
Disable writes for a specific toolset per group:
p4 property -a -n mcp.toolset.workspaces.write -v false -g reviewers
This blocks modify_workspaces for the group while query_workspaces remains accessible.
Tool-specific overrides
Restrict a group to specific tools within a toolset using mcp.toolset.<name>.tools.
Allow only query_files (block modify_files) for developers:
p4 property -a -n mcp.toolset.files.tools -v query_files -g developers
Allow both query and modify for leads:
p4 property -a -n mcp.toolset.reviews.tools -v query_reviews,modify_reviews -g leads
Tool-specific overrides can restrict access even when writes are enabled:
p4 property -a -n mcp.toolsets.write -v true
p4 property -a -n mcp.toolset.files.tools -v query_files -g developers
# Result: modify_files is BLOCKED — tool list restricts
Note: Tool-specific overrides cannot bypass write restrictions. The server checks write permissions before evaluating tool lists. If
write=falseis set at any level, write tools are blocked regardless of the tool list.
Multi-group conflict resolution
When a user belongs to multiple groups with conflicting settings, P4 resolves each property to a single value. The MCP server does not perform its own multi-group logic — it uses whichever value P4 returns.
P4's resolution rules for a given property name:
- Highest
-s(sequence number) wins. This is the primary sort key. - At the same sequence number: user scope > group scope > global scope.
- Between groups at the same sequence: the alphabetically-first group name wins.
P4 does not compare values. It picks the winning entry by position, not by content.
Example — groups at the same sequence (default):
p4 property -a -n mcp.toolset.files.enabled -v true -g developers
p4 property -a -n mcp.toolset.files.enabled -v false -g leads
# User in both groups → resolved value is "true"
# Reason: "developers" < "leads" alphabetically, so developers wins
Swapping the values would give false — developers still wins regardless of the value.
Example — only one group has a setting:
p4 property -a -n mcp.toolset.files.enabled -v false -g leads
# developers has no setting
# User in developers + leads → resolved value is "false"
# Reason: leads is the only group with a value, so it wins
Example — write access:
p4 property -a -n mcp.toolset.files.write -v false -g developers
p4 property -a -n mcp.toolset.files.write -v true -g leads
# User in both groups → resolved value is "false"
# Reason: "developers" < "leads" alphabetically, not because false is "more restrictive"
Example — tool lists (no union):
p4 property -a -n mcp.toolset.reviews.tools -v query_reviews -g developers
p4 property -a -n mcp.toolset.reviews.tools -v query_reviews,modify_reviews -g leads
# User in both groups → resolved value is "query_reviews"
# Reason: "developers" wins alphabetically. P4 returns one value, not a union.
Example — using -s to control which group wins:
p4 property -a -n mcp.enabled -v false -s1 -g noaccessgroup
p4 property -a -n mcp.enabled -v true -s2 -g accessgroup
# accessgroup wins because -s2 > -s1 (highest sequence wins)
Tip: To get predictable results with multiple groups, always use explicit
-svalues rather than relying on alphabetical group name ordering.
Disabling a specific toolset globally
Disable a single toolset for all users without affecting others:
p4 property -a -n mcp.toolset.reviews.enabled -v false
This blocks both query_reviews and modify_reviews for all users. Other toolsets remain unaffected.
Emergency read-only for a specific group
Restrict a specific group to read-only without affecting other groups:
p4 property -a -n mcp.toolsets.write -v false -g problematic_group
Users in other groups retain full write access. If a user belongs to both the restricted group and an unrestricted group, P4's property resolution determines the outcome — typically the alphabetically-first group name wins at equal sequence numbers. Use explicit -s values for predictable results.
The MCP server checks properties in this order. Each property is resolved independently by P4 using the standard resolution rules (highest -s wins, then user > group > global at equal sequence, then alphabetically-first group name).
| Check order | Property | MCP server behavior |
|---|---|---|
| 1 | mcp.enabled |
If resolved value is false, block all access |
| 2 | mcp.toolsets.write |
If resolved value is false and tool is a write operation, block |
| 3 | mcp.toolsets.allowed |
If set, only listed toolsets are available |
| 4 | mcp.toolset.<name>.enabled |
If resolved value is false, block the toolset |
| 5 | mcp.toolset.<name>.write |
If resolved value is false and tool is a write operation, block |
| 6 | mcp.toolset.<name>.tools |
If set, only listed tools within the toolset are available |
Important notes
-
Each property is resolved to a single value by P4 before the MCP server sees it. P4 uses: highest sequence number (
-s) first, then scope (user > group > global) as a tiebreaker, then alphabetical group name. The MCP server does not perform its own multi-group or multi-scope resolution. -
mcp.enabledacts as the main switch. When its resolved value isfalse, all access is blocked. -
At the same sequence number, a group or user property overrides a global property. To ensure a global
falsecannot be overridden, assign it a high-svalue. -
Scope hierarchy (user > group > global) only applies as a tiebreaker at equal sequence numbers. A group property at
-s5will beat a user property at default sequence or-s1. -
When a user belongs to multiple groups, the alphabetically-first group name wins (at equal
-s). The winning value is used as-is — P4 does not comparetruevsfalseor pick the "most restrictive" value. Use explicit-svalues to control which group takes priority. -
Tool-specific overrides (
mcp.toolset.<name>.tools) can further restrict access but cannot bypass write restrictions. Write checks are evaluated before tool lists. -
Property changes take effect within 60 seconds due to server-side caching, or immediately on a new MCP server connection.
-
Only the value
false(case-insensitive) disables or blocks access. Any other value (includingtrue,1,yes, or invalid strings) is treated as not blocking.
query_server - Get server information and current user details
- Actions:
server_info- Get P4 version, uptime, and configurationcurrent_user- Get current user information and permissions
- Use cases - Server diagnostics, user verification, connection testing
query_workspaces - Workspace information and management
- Actions:
list- List all workspaces (optionally filtered by user)get- Get a detailed workspace specificationtype- Check workspace type and configurationstatus- Check workspace sync status
- Parameters:
workspace_name,user,max_results - Use cases: Workspace discovery, configuration review, status checking
query_changelists - Access changelist information and history
- Actions:
get- Get detailed changelist information (files, description, jobs)list- List changelists with filters (status, user, workspace)
- Parameters:
changelist_id,status(pending/submitted),workspace_name,max_results - Use cases: Code review, history tracking, changelist analysis
query_files - File operations and information
- Actions:
content- Get file content at a specific revisionhistory- Get file revision history and integration recordsinfo- Get file basic details (type, size, permissions)metadata- Get file metadata (attributes, filesize, etc.)diff- Compare file versions (depot-to-depot or mixed)annotations- Get file annotations with blame information
- Parameters:
file_path,file2(for diff),max_results,diff2(boolean) - Use cases: Code analysis, file comparison, history tracking, blame analysis
query_shelves - Shelved changelist operations and inspection
- Actions:
list- List shelved changes by user or globallydiff- Show differences in shelved filesfiles- List files in a specific shelf
- Parameters:
changelist_id,user,max_results - Use cases: Code review, work-in-progress tracking, collaboration
query_jobs - Job tracking and defect management
- Actions:
list_jobs- List jobs associated with a changelistget_job- Get detailed job information and status
- Parameters:
changelist_id,job_id,max_results - Use cases: Defect tracking, requirement traceability, project management
query_reviews - Review discovery, details, and activity
- Actions:
list- List all reviews with optional filteringdashboard- Get current user's review dashboard (my reviews, needs attention)get- Get detailed review informationtransitions- Get available state transitions for a reviewfiles_readby- Get files read status by usersfiles- Get files in a review (with optional version range)activity- Get review activity historycomments- Get comments on a review
- Parameters:
review_id- Review ID (required for get, transitions, files_readby, files, comments, activity)review_fields- Comma-separated fields to return (e.g., "id,description,author,state")comments_fields- Fields for comments (default: "id,body,user,time")up_voters- List of up voters for transitionsfrom_version,to_version- Version range for files actionmax_results- Maximum results (default: 10)
- Use cases: Code review discovery, review status tracking, comment retrieval, review activity monitoring
query_streams - Stream hierarchy, integration status, and workspace validation
- Actions:
list- List streams with optional filters (path pattern, owner, type)get- Get a detailed stream specificationchildren- Get child streams of a given streamparent- Get the parent streamgraph- Get the full stream graph (parent + children)integration_status- Get integration status between stream and parent (p4 istat)get_workspace- Get a workspace spec bound to a streamlist_workspaces- List workspaces bound to a streamvalidate_file- Validate file paths against a stream's viewvalidate_submit- Validate opened files for submit in a stream workspacecheck_resolve- Check for pending stream spec conflictsinterchanges- List changelists awaiting integration between streams
- Parameters:
stream_name- Stream depot path (required for get, children, parent, graph, check_resolve, interchanges)stream_path- Path pattern(s) for list (e.g.,["//depot/..."])filter- Filter expression for list (e.g.,"Owner=alice&Type=development")fields- Fields to return for list (e.g.,["Stream", "Owner", "Type"])workspace- Workspace name for get_workspace, validate_file, validate_submitfile_paths- File paths for validate_fileview_without_edit- View locked stream spec without opening for editat_change- Retrieve historical stream spec at a changelist numberboth_directions- Show integration status in both directionsforce_refresh- Force istat cache refreshreverse,long_output,limit- Options for interchangesunloaded,all_streams,viewmatch- Filters for listmax_results- Maximum results
- Use cases: Stream hierarchy exploration, integration status tracking, workspace validation, view compatibility checks
modify_workspaces - Workspace creation and management
- Actions -
create,update,delete,switch - Parameters -
name,specs(WorkspaceSpec object with View, Root, Options, etc.) - Requires - Read-only mode disabled, appropriate permissions
- Use cases - Environment setup, workspace maintenance, branch switching
modify_changelists - Changelist lifecycle management
- Actions -
create,update,submit,delete,move_files - Parameters -
changelist_id,description,file_paths - Safety - Ownership checks, interactive PROCEED/CANCEL elicitation prompt for delete operations with item details
- Use cases - Code submission, work organization, file grouping
modify_files - File system operations and version control
- Actions -
add,edit,delete,move,revert,reconcile,resolve,sync - Parameters -
file_paths,changelist,force,mode(for resolve operations) - Resolve modes -
auto,safe,force,preview,theirs,yours - Use cases - File editing, conflict resolution, workspace synchronization
modify_shelves - Shelving operations for work in progress
- Actions -
shelve,unshelve,update,delete,unshelve_to_changelist - Parameters -
changelist_id,file_paths,target_changelist,force - Use cases - Temporary storage, code sharing, backup before experiments
modify_jobs - Job and changelist integration
- Actions -
link_job,unlink_job - Parameters -
changelist_id,job_id - Use cases - Defect tracking integration, requirement linking
modify_reviews - Review creation, transitions, participants, and comments
- Actions:
create- Create a new review from a changelistrefresh_projects- Refresh project associationsvote- Vote on a review (up, down, clear)transition- Change review state (needsRevision, needsReview, approved, committed, rejected, archived)append_participants- Add reviewers/groups to a reviewreplace_participants- Replace all participantsdelete_participants- Remove participants from a reviewadd_comment- Add a comment to a reviewreply_comment- Reply to an existing commentappend_change- Add a changelist to an existing reviewreplace_with_change- Replace review content with a changelistjoin- Join a review as a participantleave- Leave a reviewarchive_inactive- Archive inactive reviewsmark_comment_read/mark_comment_unread- Mark individual comment read statusmark_all_comments_read/mark_all_comments_unread- Mark all comments read statusupdate_author- Change the review authorupdate_description- Update review descriptionobliterate- Permanently delete a review
- Parameters:
review_id- Review ID (required for most actions)change_id- Changelist ID (required for create, append_change, replace_with_change)description- Review descriptionreviewers,required_reviewers- Lists of reviewer usernamesreviewer_groups- Reviewer groups with requirementsvote_value- Vote value:up,down,clearversion- Review version for votingtransition- Target state:needsRevision,needsReview,approved,committed,approved:commit,rejected,archivedjobs,fix_status,cleanup- Job linking and cleanup options for transitionsusers,groups- Structured participant data for append/replace/deletebody- Comment body texttask_state- Comment task state:open,commentnotify- Notification mode:immediate,delayedcomment_id- Comment ID for replies or marking read/unreadcontext- Comment context (file, line numbers, content, version)not_updated_since,max_reviews- Filters for archive_inactivenew_author,new_description- Values for update actions
- Use cases: Code review workflow, review state management, collaborative commenting, participant management, review cleanup
modify_streams - Stream lifecycle, spec editing, propagation, and workspace management
- Actions:
create- Create a new stream (mainline, development, release, task, virtual, etc.)update- Update stream properties (name, description, options, paths, parent_view)delete- Delete a streamedit_spec- Open stream spec for editing (p4 stream edit)resolve_spec- Resolve stream spec conflictsrevert_spec- Revert stream spec editsshelve_spec- Shelve stream spec edits to a numbered changelistunshelve_spec- Unshelve stream spec editscopy- Copy changes between parent and child streamsmerge- Merge changes between parent and child streamsintegrate- Integrate changes with advanced optionspopulate- Populate a new stream with files (branch)switch- Switch a workspace to a different streamcreate_workspace- Create a new workspace bound to a stream
- Parameters:
stream_name- Stream depot path (required for create, update, delete, edit_spec, resolve_spec, revert_spec, switch)stream_type- Stream type for create:mainline,development,sparsedev,release,sparserel,task,virtualparent- Parent stream for non-mainline createname,description- Stream display name and descriptionoptions- Stream options:allsubmit/ownersubmit,unlocked/locked,toparent/notoparent,fromparent/nofromparent,mergedown/mergeanyparent_view- Parent view treatment:inheritornoinheritpaths,remapped,ignored- Stream view mappingschangelist- Changelist for spec editing or propagation operationsresolve_mode- Resolve mode for resolve_spec:auto,accept_theirs,accept_yoursparent_stream- Override parent for propagation (-P flag)branch- Branch spec for integrate/populate (-b flag)file_paths- File paths for propagationpreview- Preview only, no changes (-n flag)force- Force operation (-f flag)reverse- Reverse direction (-r flag)max_files- Limit files processed (-m flag)quiet- Suppress informational messages (-q flag)output_base- Show base revision with scheduled resolve (-Ob flag for merge/integrate) or list files created (-o flag for populate)virtual- Copy using virtual stream (-v flag, copy only)schedule_branch_resolve- Schedule branch resolves instead of automatic branching (-Rb flag, integrate only)integrate_around_deleted- Integrate around deleted revisions (-Di flag, integrate only)skip_cherry_picked- Skip cherry-picked revisions already integrated (-Rs flag, integrate only)source_path,target_path- Source and target paths for populateworkspace- Workspace name for switchworkspace_name,root,host,alt_roots- Workspace creation parameters
- Safety: Stream existence validation, locked stream detection, bound workspace warnings, open file checks for view-affecting changes
- Use cases: Stream creation and management, branch propagation (merge/copy/integrate), spec conflict resolution, workspace provisioning
Log locations:
- Application log:
logs/p4mcp.log- Main server operations and errors - Session logs:
logs/sessions/*.log- Individual session activities are recorded only when the--allow-usageflag is specified in the server's startup arguments.
Privacy-first approach:
- Disabled by default: No data collection without explicit consent
- Consent-gated: First-run prompt for telemetry permission
- Transparent: Clear explanation of data collected
- Revocable: Easy opt-out at any time
Data collected (if consented):
- Tool usage frequency (anonymized)
- Error rates and types (no personal data)
- Performance metrics
- Feature adoption statistics
- P4 server version
Data not collected:
- File contents or names
- P4 Server details except version
- User credentials or personal information
- Specific project information
Control:
- Usage data is only collected if the
--allow-usageargument is provided at startup.
Unable to start server
Symptoms: OS cannot find or execute the binary; error includes ENOENT or "No such file or directory".
Solutions:
- Check the path: Make sure the
commandfield uses the correct absolute path for your OS:- macOS/Linux:
/absolute/path/to/p4-mcp-server - Windows:
C:\absolute\path\to\p4-mcp-server.exe
- macOS/Linux:
- Ensure the binary exists and is executable:
- macOS/Linux:
ls -l /absolute/path/to/p4-mcp-server && chmod +x /absolute/path/to/p4-mcp-server - Windows:
dir C:\absolute\path\to\p4-mcp-server.exe
- macOS/Linux:
- On Windows, ensure the binary is not blocked:
- Right-click the
.exefile, select Properties, and if present, click Unblock.
- Right-click the
Connect to server failed; check $P4PORT
Symptoms: Cannot connect to P4 Server
Solutions:
- Verify the
P4PORTenvironment variable:echo $P4PORT(macOS) orecho $env:P4PORT(Windows) - Test the direct connection:
p4 info - Check server availability:
ping perforce.example.com - Verify the port and protocol (
ssl:prefix for SSL connections).
SSL certificate not trusted (P4 connection)
Symptoms: SSL trust errors when connecting to the P4 server Solutions:
- Trust the server:
p4 trust -f -y - Check trust status:
p4 trust -l - For persistent issues, verify the SSL configuration.
SSL certificate errors for P4 Code Review API (reviews)
Symptoms: CERTIFICATE_VERIFY_FAILED errors when using review tools
Solutions:
- System trust store: By default, the server uses the OS trust store via
truststore. Ensure your corporate CA is installed in the OS certificate store. - Custom CA bundle: To use a custom CA certificate, you must first set
P4MCP_TLS_CA_MODE=certifi(to disabletruststore), then provide the CA path via--ca-bundle /path/to/ca.pemorP4MCP_CA_BUNDLE. In the defaultsystemmode,truststoreoverrides custom CA bundles and they are silently ignored. - Disable verification: Use
--ssl-no-verifyor setP4MCP_SSL_VERIFY=false(not recommended for production). This works in both TLS modes.
Note: These SSL settings only apply when the Swarm URL uses HTTPS. If Swarm is configured with an
http://URL, SSL verification is not performed and these settings have no effect.
User not logged in
Symptoms: Authentication failures
Solutions:
- Log in to P4:
p4 login -a - Check login status:
p4 login -s - Verify the user exists:
p4 users -m 1 your_username - For persistent issues, check password or use ticket-based authentication.
Password invalid
Symptoms: Login failures
Solutions:
- Reset the password through a P4 administrator.
- Use ticket-based authentication:
p4 login -a - Verify the username is correct:
p4 info
Client unknown
Symptoms: Workspace not found errors
Solutions:
- List the available workspaces:
p4 clients - Verify the
P4CLIENTenvironment variable. - Create a workspace if needed:
p4 client workspace_name - Check the workspace ownership:
p4 client -o workspace_name
File(s) not in client view
Symptoms: Files are outside the workspace mapping
Solutions:
- Check the client view:
p4 client -o workspace_name - Update the workspace mapping to include the required paths.
- Use
p4 where file_pathto check the mapping.
Operation not permitted
Symptoms: Insufficient permissions for operations
Solutions:
- Check the file ownership:
p4 opened file_path - Verify the user permissions:
p4 protects file_path - Ensure proper group membership.
- For admin operations, verify admin permissions.
File is opened by another user
Symptoms: Exclusive lock conflicts
Solutions:
- Check who has the file open:
p4 opened file_path - Contact the user to resolve conflicts.
- Admin can force operations if necessary.
Slow operations
Symptoms: Long response times
Solutions:
- Use the
max_resultsparameter to limit the query size. - Use specific file paths instead of wildcards.
- Check network connectivity to P4.
- Monitor server performance.
Memory issues
Symptoms: High memory usage
Solutions:
- Reduce
max_resultsfor large queries. - Process files in batches.
- Restart the MCP server periodically for long-running sessions.
Unable to execute tools
Symptoms: Conflict with built-in or other MCP tools
Solutions:
- Disable any built-in or conflicting MCP server tools in your environment or configuration.
- Ensure the P4 MCP server tools are properly registered and enabled.
- Restart the MCP server after applying configuration changes to load the correct tools.
Correct tools not picked up
Symptoms: Invalid context or outdated session history
Solutions:
- Provide a P4-related context when writing prompts.
- Start a new session if the existing session is old or contains conflicting prompt history.
- Authentication: Ensure valid login before MCP operations.
- Workspace mapping: Verify client views include target files.
- Permissions: Check user and file permissions for write operations.
- Network: Verify connectivity for remote P4 Servers.
- Check the logs: Always check
logs/p4mcp.logfirst. - Test P4: Ensure
p4 infoworks before troubleshooting MCP. - Report issues to the community: Report issues with log excerpts and environment details.
Perforce P4 MCP Server is a community supported project and is not officially supported by Perforce. Pull requests and issues are the responsibility of the project's moderator(s); this may be a vetted individual or team with members outside of the Perforce organization. All issues should be reported and managed via GitHub (not via Perforce's standard support process).
We welcome contributions to the P4 MCP Server project.
This project is licensed under the MIT License. See LICENSE for details.
This project includes third-party components. Their licenses and attributions are listed in THIRD-PARTY-NOTICES.