Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@FastAPI MCP Serversearch for documents about API authentication in the vector database"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
MCP Server (FastAPI + Supabase + n8n)
Estructura
main.py: App FastAPI y healthcheck/healthz.app/mcp/server.py: Endpoint/mcpJSON-RPC 2.0 (tools/list,tools/call).app/integrations/supabase.py: Operaciones DB/Storage/Vector.app/integrations/n8n.py: Invocación de webhooks n8n.app/security/auth.py: API tokens por cabecerax-api-key.app/config.py: Carga de variables de entorno.migrations/001_init.sql: Esquema Supabase (session_state, tool_audit, vector_store, RPCmatch_vectors).tools.schema.json: Definiciones de herramientas MCP.
Related MCP server: Supabase MCP Server
Variables de entorno
Copiar .env.example a .env en local o configurar en Railway.
SUPABASE_URL: URL del proyecto Supabase.SUPABASE_SERVICE_ROLE_KEY: clave service role (solo backend).SUPABASE_ANON_KEY: opcional.N8N_WEBHOOK_BASE: base de webhooks públicos de n8n, ej:https://n8n.tu-dominio.com/webhook.MCP_API_TOKENS: CSV de tokens válidos, ej:token1,token2.ALLOW_ORIGINS: lista CORS, ej:https://mi-host-agente.com.
Desarrollo local (Windows PowerShell)
Probar:
GET http://localhost:8000/healthzPOST http://localhost:8000/mcpcon headerx-api-key: dev-tokeny body:
Despliegue en Railway
Añadir servicio Dockerfile.
Variables de entorno:
SUPABASE_URL,SUPABASE_SERVICE_ROLE_KEY,N8N_WEBHOOK_BASE,MCP_API_TOKENS,ALLOW_ORIGINS.Comando inicio:
uvicorn main:app --host 0.0.0.0 --port $PORT --proxy-headers.Healthcheck:
/healthz.Escalado horizontal: habilitar auto-scale; la app es stateless.
Migraciones Supabase
Ejecutar migrations/001_init.sql en el SQL Editor de Supabase.
Seguridad
Mantener Service Role solo en backend.
Rotar
MCP_API_TOKENSperiódicamente.Opcional: firmar requests con HMAC y timestamp para antireplay.