infra-deploy — model-context-protocol infra-deploy, MCPGateway, community, model-context-protocol, ide skills, typescript

v1.0.0

About this Skill

Ideal for Cloud Agents requiring automated infrastructure deployment and management using Docker, containerization, and SSL encryption. Infrastructure deployment for VPS, Docker, and cloud platforms. Activates for deploy, setup server, docker, coolify, VPS, SSH, nginx, production, hosting requests.

# Core Topics

abdullah1854 abdullah1854
[12]
[2]
Updated: 2/27/2026

Killer-Skills Review

Decision support comes first. Repository text comes second.

Reference-Only Page Review Score: 7/11

This page remains useful for operators, but Killer-Skills treats it as reference material instead of a primary organic landing page.

Original recommendation layer Concrete use-case guidance Explicit limitations and caution Locale and body language aligned
Review Score
7/11
Quality Score
36
Canonical Locale
en
Detected Body Locale
en

Ideal for Cloud Agents requiring automated infrastructure deployment and management using Docker, containerization, and SSL encryption. Infrastructure deployment for VPS, Docker, and cloud platforms. Activates for deploy, setup server, docker, coolify, VPS, SSH, nginx, production, hosting requests.

Core Value

Empowers agents to automate infrastructure deployment with Docker-compose, setup VPS servers, configure reverse proxies with Nginx, and enable HTTPS using Let's Encrypt, streamlining the development process for MCP servers and TypeScript projects.

Ideal Agent Persona

Ideal for Cloud Agents requiring automated infrastructure deployment and management using Docker, containerization, and SSL encryption.

Capabilities Granted for infra-deploy

Automating server configuration for production environments
Deploying containerized applications with Docker
Setting up secure HTTPS connections using Let's Encrypt

! Prerequisites & Limits

  • Requires npm and TypeScript setup
  • Dependent on Docker and Docker-compose installation
  • Limited to MCP servers and specific VPS configurations

Why this page is reference-only

  • - The underlying skill quality score is below the review floor.

Source Boundary

The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.

After The Review

Decide The Next Action Before You Keep Reading Repository Material

Killer-Skills should not stop at opening repository instructions. It should help you decide whether to install this skill, when to cross-check against trusted collections, and when to move into workflow rollout.

Labs Demo

Browser Sandbox Environment

⚡️ Ready to unleash?

Experience this Agent in a zero-setup browser environment powered by WebContainers. No installation required.

Boot Container Sandbox

FAQ & Installation Steps

These questions and steps mirror the structured data on this page for better search understanding.

? Frequently Asked Questions

What is infra-deploy?

Ideal for Cloud Agents requiring automated infrastructure deployment and management using Docker, containerization, and SSL encryption. Infrastructure deployment for VPS, Docker, and cloud platforms. Activates for deploy, setup server, docker, coolify, VPS, SSH, nginx, production, hosting requests.

How do I install infra-deploy?

Run the command: npx killer-skills add abdullah1854/MCPGateway. It works with Cursor, Windsurf, VS Code, Claude Code, and 19+ other IDEs.

What are the use cases for infra-deploy?

Key use cases include: Automating server configuration for production environments, Deploying containerized applications with Docker, Setting up secure HTTPS connections using Let's Encrypt.

Which IDEs are compatible with infra-deploy?

This skill is compatible with Cursor, Windsurf, VS Code, Trae, Claude Code, OpenClaw, Aider, Codex, OpenCode, Goose, Cline, Roo Code, Kiro, Augment Code, Continue, GitHub Copilot, Sourcegraph Cody, and Amazon Q Developer. Use the Killer-Skills CLI for universal one-command installation.

Are there any limitations for infra-deploy?

Requires npm and TypeScript setup. Dependent on Docker and Docker-compose installation. Limited to MCP servers and specific VPS configurations.

How To Install

  1. 1. Open your terminal

    Open the terminal or command line in your project directory.

  2. 2. Run the install command

    Run: npx killer-skills add abdullah1854/MCPGateway. The CLI will automatically detect your IDE or AI agent and configure the skill.

  3. 3. Start using the skill

    The skill is now active. Your AI agent can use infra-deploy immediately in the current project.

! Reference-Only Mode

This page remains useful for installation and reference, but Killer-Skills no longer treats it as a primary indexable landing page. Read the review above before relying on the upstream repository instructions.

Upstream Repository Material

The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.

Upstream Source

infra-deploy

Install infra-deploy, an AI agent skill for AI agent workflows and automation. Review the use cases, limitations, and setup path before rollout.

SKILL.md
Readonly
Upstream Repository Material
The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.
Supporting Evidence

Infrastructure Deployment Protocol

When This Skill Activates

  • "Deploy this", "push to production", "setup server"
  • "Docker", "containerize", "docker-compose"
  • "VPS setup", "server configuration"
  • "Coolify", "nginx", "reverse proxy"
  • "SSL", "HTTPS", "Let's Encrypt"

Pre-Deployment Checklist

Before ANY Deployment:

bash
1# 1. Verify build works locally 2npm run build # or equivalent 3 4# 2. Run tests 5npm test 6 7# 3. Check for env vars 8cat .env.example # Document required vars 9 10# 4. Verify no secrets in code 11grep -r "sk_live\|api_key\|password" --include="*.ts" --include="*.js" || echo "Clean"

Docker Deployment

Production Dockerfile (Node.js)

dockerfile
1# Build stage 2FROM node:20-alpine AS builder 3WORKDIR /app 4COPY package*.json ./ 5RUN npm ci --only=production 6COPY . . 7RUN npm run build 8 9# Production stage 10FROM node:20-alpine AS runner 11WORKDIR /app 12ENV NODE_ENV=production 13 14# Non-root user for security 15RUN addgroup --system --gid 1001 nodejs 16RUN adduser --system --uid 1001 appuser 17 18COPY --from=builder --chown=appuser:nodejs /app/dist ./dist 19COPY --from=builder --chown=appuser:nodejs /app/node_modules ./node_modules 20COPY --from=builder --chown=appuser:nodejs /app/package.json ./ 21 22USER appuser 23EXPOSE 3000 24CMD ["node", "dist/index.js"]

Docker Compose (Production)

yaml
1version: '3.8' 2 3services: 4 app: 5 build: . 6 restart: unless-stopped 7 environment: 8 - NODE_ENV=production 9 - DATABASE_URL=${DATABASE_URL} 10 ports: 11 - "3000:3000" 12 healthcheck: 13 test: ["CMD", "curl", "-f", "http://localhost:3000/health"] 14 interval: 30s 15 timeout: 10s 16 retries: 3 17 deploy: 18 resources: 19 limits: 20 memory: 512M 21 cpus: '0.5' 22 23 db: 24 image: postgres:16-alpine 25 restart: unless-stopped 26 environment: 27 POSTGRES_DB: ${DB_NAME} 28 POSTGRES_USER: ${DB_USER} 29 POSTGRES_PASSWORD: ${DB_PASSWORD} 30 volumes: 31 - postgres_data:/var/lib/postgresql/data 32 healthcheck: 33 test: ["CMD-SHELL", "pg_isready -U ${DB_USER}"] 34 interval: 10s 35 timeout: 5s 36 retries: 5 37 38volumes: 39 postgres_data:

VPS Initial Setup

1. Security Hardening (Run First)

bash
1# Update system 2apt update && apt upgrade -y 3 4# Create deploy user 5adduser deploy 6usermod -aG sudo deploy 7 8# Setup SSH keys (on local machine) 9ssh-copy-id deploy@YOUR_SERVER_IP 10 11# Disable password auth 12sudo sed -i 's/PasswordAuthentication yes/PasswordAuthentication no/' /etc/ssh/sshd_config 13sudo sed -i 's/PermitRootLogin yes/PermitRootLogin no/' /etc/ssh/sshd_config 14sudo systemctl restart sshd 15 16# Setup firewall 17sudo ufw allow OpenSSH 18sudo ufw allow 80/tcp 19sudo ufw allow 443/tcp 20sudo ufw enable 21 22# Install fail2ban 23sudo apt install fail2ban -y 24sudo systemctl enable fail2ban

2. Docker Installation

bash
1curl -fsSL https://get.docker.com | sh 2sudo usermod -aG docker deploy 3newgrp docker

3. Coolify (Self-Hosted PaaS)

bash
1curl -fsSL https://cdn.coollabs.io/coolify/install.sh | bash

Nginx Reverse Proxy

With SSL (Let's Encrypt)

nginx
1server { 2 listen 80; 3 server_name yourdomain.com; 4 return 301 https://$server_name$request_uri; 5} 6 7server { 8 listen 443 ssl http2; 9 server_name yourdomain.com; 10 11 ssl_certificate /etc/letsencrypt/live/yourdomain.com/fullchain.pem; 12 ssl_certificate_key /etc/letsencrypt/live/yourdomain.com/privkey.pem; 13 14 # Security headers 15 add_header X-Frame-Options "SAMEORIGIN" always; 16 add_header X-Content-Type-Options "nosniff" always; 17 add_header X-XSS-Protection "1; mode=block" always; 18 19 location / { 20 proxy_pass http://localhost:3000; 21 proxy_http_version 1.1; 22 proxy_set_header Upgrade $http_upgrade; 23 proxy_set_header Connection 'upgrade'; 24 proxy_set_header Host $host; 25 proxy_set_header X-Real-IP $remote_addr; 26 proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; 27 proxy_set_header X-Forwarded-Proto $scheme; 28 proxy_cache_bypass $http_upgrade; 29 } 30}

Get SSL Certificate

bash
1sudo apt install certbot python3-certbot-nginx -y 2sudo certbot --nginx -d yourdomain.com

Deployment Commands

Build and Deploy

bash
1# Build image 2docker build -t myapp:latest . 3 4# Stop old container 5docker stop myapp || true 6docker rm myapp || true 7 8# Run new container 9docker run -d \ 10 --name myapp \ 11 --restart unless-stopped \ 12 -p 3000:3000 \ 13 --env-file .env.production \ 14 myapp:latest 15 16# Verify running 17docker ps 18docker logs myapp --tail 50

Zero-Downtime Deployment

bash
1# Start new container on different port 2docker run -d --name myapp-new -p 3001:3000 myapp:latest 3 4# Wait for health check 5sleep 10 6curl -f http://localhost:3001/health 7 8# Switch nginx upstream 9# Then remove old container 10docker stop myapp-old && docker rm myapp-old

Monitoring

Basic Health Check Endpoint

typescript
1app.get('/health', (req, res) => { 2 res.json({ 3 status: 'healthy', 4 timestamp: new Date().toISOString(), 5 uptime: process.uptime() 6 }); 7});

Log Commands

bash
1# Follow logs 2docker logs -f myapp 3 4# Last 100 lines 5docker logs myapp --tail 100 6 7# With timestamps 8docker logs myapp -t --since 1h

Rollback Procedure

bash
1# List available images 2docker images myapp 3 4# Rollback to previous 5docker stop myapp 6docker run -d --name myapp -p 3000:3000 myapp:previous-tag

Security Checklist

  • SSH key auth only (no passwords)
  • Firewall enabled (ufw)
  • Fail2ban running
  • Non-root user for app
  • Secrets in env vars, not code
  • HTTPS with valid cert
  • Security headers configured
  • Regular security updates scheduled

Related Skills

Looking for an alternative to infra-deploy or another community skill for your workflow? Explore these related open-source skills.

View All

openclaw-release-maintainer

Logo of openclaw
openclaw

Your own personal AI assistant. Any OS. Any Platform. The lobster way. 🦞

333.8k
0
AI

widget-generator

Logo of f
f

Generate customizable widget plugins for the prompts.chat feed system

149.6k
0
AI

flags

Logo of vercel
vercel

The React Framework

138.4k
0
Browser

pr-review

Logo of pytorch
pytorch

Tensors and Dynamic neural networks in Python with strong GPU acceleration

98.6k
0
Developer