Skip to main content
Glama

mcp-any-openapi

by matthewhand
MIT License
39
  • Linux
  • Apple
# mcp-openapi-proxy **mcp-openapi-proxy** is a Python package that implements a Model Context Protocol (MCP) server, designed to dynamically expose REST APIs—defined by OpenAPI specifications—as MCP tools. This facilitates seamless integration of OpenAPI-described APIs into MCP-based workflows. ## Table of Contents - [Overview](#overview) - [Features](#features) - [Installation](#installation) - [MCP Ecosystem Integration](#mcp-ecosystem-integration) - [Modes of Operation](#modes-of-operation) - [FastMCP Mode (Simple Mode)](#fastmcp-mode-simple-mode) - [Low-Level Mode (Default)](#low-level-mode-default) - [Environment Variables](#environment-variables) - [Examples](#examples) - [Glama Example](#glama-example) - [Fly.io Example](#flyio-example) - [Render Example](#render-example) - [Slack Example](#slack-example) - [GetZep Example](#getzep-example) - [Virustotal Example](#virustotal-example) - [Notion Example](#notion-example) - [Asana Example](#asana-example) - [APIs.guru Example](#apisguru-example) - [NetBox Example](#netbox-example) - [Box API Example](#box-api-example) - [WolframAlpha API Example](#wolframalpha-api-example) - [Troubleshooting](#troubleshooting) - [License](#license) ## Overview The package offers two operational modes: - **Low-Level Mode (Default):** Dynamically registers tools corresponding to all valid API endpoints specified in an OpenAPI document (e.g. `/chat/completions` becomes `chat_completions()`). - **FastMCP Mode (Simple Mode):** Provides a streamlined approach by exposing a predefined set of tools (e.g. `list_functions()` and `call_function()`) based on static configurations. ## Features - **Dynamic Tool Generation:** Automatically creates MCP tools from OpenAPI endpoint definitions. - **Simple Mode Option:** Offers a static configuration alternative via FastMCP mode. - **OpenAPI Specification Support:** Compatible with OpenAPI v3 with potential support for v2. - **Flexible Filtering:** Allows endpoint filtering through whitelisting by paths or other criteria. - **Payload Authentication:** Supports custom authentication via JMESPath expressions (e.g. for APIs like Slack that expect tokens in the payload not the HTTP header). - **Header Authentication:** Uses `Bearer` by default for `API_KEY` in the Authorization header, customizable for APIs like Fly.io requiring `Api-Key`. - **MCP Integration:** Seamlessly integrates with MCP ecosystems for invoking REST APIs as tools. ## Installation Install the package directly from PyPI using the following command: ```bash uvx mcp-openapi-proxy ``` ### MCP Ecosystem Integration To incorporate **mcp-openapi-proxy** into your MCP ecosystem configure it within your `mcpServers` settings. Below is a generic example: ```json { "mcpServers": { "mcp-openapi-proxy": { "command": "uvx", "args": ["mcp-openapi-proxy"], "env": { "OPENAPI_SPEC_URL": "${OPENAPI_SPEC_URL}", "API_KEY": "${API_OPENAPI_KEY}" } } } } ``` Refer to the **Examples** section below for practical configurations tailored to specific APIs. ## Modes of Operation ### FastMCP Mode (Simple Mode) - **Enabled by:** Setting the environment variable `OPENAPI_SIMPLE_MODE=true`. - **Description:** Exposes a fixed set of tools derived from specific OpenAPI endpoints as defined in the code. - **Configuration:** Relies on environment variables to specify tool behavior. ### Low-Level Mode (Default) - **Description:** Automatically registers all valid API endpoints from the provided OpenAPI specification as individual tools. - **Tool Naming:** Derives tool names from normalized OpenAPI paths and methods. - **Behavior:** Generates tool descriptions from OpenAPI operation summaries and descriptions. ## Environment Variables - `OPENAPI_SPEC_URL`: (Required) The URL to the OpenAPI specification JSON file (e.g. `https://example.com/spec.json` or `file:///path/to/local/spec.json`). - `OPENAPI_LOGFILE_PATH`: (Optional) Specifies the log file path. - `OPENAPI_SIMPLE_MODE`: (Optional) Set to `true` to enable FastMCP mode. - `TOOL_WHITELIST`: (Optional) A comma-separated list of endpoint paths to expose as tools. - `TOOL_NAME_PREFIX`: (Optional) A prefix to prepend to all tool names. - `API_KEY`: (Optional) Authentication token for the API sent as `Bearer <API_KEY>` in the Authorization header by default. - `API_AUTH_TYPE`: (Optional) Overrides the default `Bearer` Authorization header type (e.g. `Api-Key` for GetZep). - `STRIP_PARAM`: (Optional) JMESPath expression to strip unwanted parameters (e.g. `token` for Slack). - `DEBUG`: (Optional) Enables verbose debug logging when set to "true", "1", or "yes". - `EXTRA_HEADERS`: (Optional) Additional HTTP headers in "Header: Value" format (one per line) to attach to outgoing API requests. - `SERVER_URL_OVERRIDE`: (Optional) Overrides the base URL from the OpenAPI specification when set, useful for custom deployments. - `TOOL_NAME_MAX_LENGTH`: (Optional) Truncates tool names to a max length. - Additional Variable: `OPENAPI_SPEC_URL_<hash>` – a variant for unique per-test configurations (falls back to `OPENAPI_SPEC_URL`). - `IGNORE_SSL_SPEC`: (Optional) Set to `true` to disable SSL certificate verification when fetching the OpenAPI spec. - `IGNORE_SSL_TOOLS`: (Optional) Set to `true` to disable SSL certificate verification for API requests made by tools. ## Examples For testing you can run the uvx command as demonstrated in the examples then interact with the MCP server via JSON-RPC messages to list tools and resources. See the "JSON-RPC Testing" section below. ### Glama Example ![image](https://github.com/user-attachments/assets/84afdaa8-7b4f-4726-835f-64255ca970b7) Glama offers the most minimal configuration for mcp-openapi-proxy requiring only the `OPENAPI_SPEC_URL` environment variable. This simplicity makes it ideal for quick testing. #### 1. Verify the OpenAPI Specification Retrieve the Glama OpenAPI specification: ```bash curl https://glama.ai/api/mcp/openapi.json ``` Ensure the response is a valid OpenAPI JSON document. #### 2. Configure mcp-openapi-proxy for Glama Add the following configuration to your MCP ecosystem settings: ```json { "mcpServers": { "glama": { "command": "uvx", "args": ["mcp-openapi-proxy"], "env": { "OPENAPI_SPEC_URL": "https://glama.ai/api/mcp/openapi.json" } } } } ``` #### 3. Testing Start the service with: ```bash OPENAPI_SPEC_URL="https://glama.ai/api/mcp/openapi.json" uvx mcp-openapi-proxy ``` Then refer to the [JSON-RPC Testing](#json-rpc-testing) section for instructions on listing resources and tools. ### Fly.io Example ![image](https://github.com/user-attachments/assets/80abd7fa-ccca-4e35-b0dd-36ef82a236c5) Fly.io provides a simple API for managing machines making it an ideal starting point. Obtain an API token from [Fly.io documentation](https://fly.io/docs/hands-on/install-flyctl/). #### 1. Verify the OpenAPI Specification Retrieve the Fly.io OpenAPI specification: ```bash curl https://raw.githubusercontent.com/abhiaagarwal/peristera/refs/heads/main/fly-machines-gen/fixed_spec.json ``` Ensure the response is a valid OpenAPI JSON document. #### 2. Configure mcp-openapi-proxy for Fly.io Update your MCP ecosystem configuration: ```json { "mcpServers": { "flyio": { "command": "uvx", "args": ["mcp-openapi-proxy"], "env": { "OPENAPI_SPEC_URL": "https://raw.githubusercontent.com/abhiaagarwal/peristera/refs/heads/main/fly-machines-gen/fixed_spec.json", "API_KEY": "<your_flyio_token_here>" } } } } ``` - **OPENAPI_SPEC_URL**: Points to the Fly.io OpenAPI specification. - **API_KEY**: Your Fly.io API token (replace `<your_flyio_token_here>`). - **API_AUTH_TYPE**: Set to `Api-Key` for Fly.io’s header-based authentication (overrides default `Bearer`). #### 3. Testing After starting the service refer to the [JSON-RPC Testing](#json-rpc-testing) section for instructions on listing resources and tools. ### Render Example ![image](https://github.com/user-attachments/assets/f1dee1bf-e330-41f1-a700-6386edd8895e) Render offers infrastructure hosting that can be managed via an API. The provided configuration file `examples/render-claude_desktop_config.json` demonstrates how to set up your MCP ecosystem quickly with minimal settings. #### 1. Verify the OpenAPI Specification Retrieve the Render OpenAPI specification: ```bash curl https://api-docs.render.com/openapi/6140fb3daeae351056086186 ``` Ensure the response is a valid OpenAPI document. #### 2. Configure mcp-openapi-proxy for Render Add the following configuration to your MCP ecosystem settings: ```json { "mcpServers": { "render": { "command": "uvx", "args": ["mcp-openapi-proxy"], "env": { "OPENAPI_SPEC_URL": "https://api-docs.render.com/openapi/6140fb3daeae351056086186", "TOOL_WHITELIST": "/services,/maintenance", "API_KEY": "your_render_token_here" } } } } ``` #### 3. Testing Launch the proxy with your Render configuration: ```bash OPENAPI_SPEC_URL="https://api-docs.render.com/openapi/6140fb3daeae351056086186" TOOL_WHITELIST="/services,/maintenance" API_KEY="your_render_token_here" uvx mcp-openapi-proxy ``` Then refer to the [JSON-RPC Testing](#json-rpc-testing) section for instructions on listing resources and tools. ### Slack Example ![image](https://github.com/user-attachments/assets/706adad5-3f1c-4f32-aef5-6a1af794aef3) Slack’s API showcases stripping unnecessary token payload using JMESPath. Obtain a bot token from [Slack API documentation](https://api.slack.com/authentication/token-types#bot). #### 1. Verify the OpenAPI Specification Retrieve the Slack OpenAPI specification: ```bash curl https://raw.githubusercontent.com/slackapi/slack-api-specs/master/web-api/slack_web_openapi_v2.json ``` Ensure it’s a valid OpenAPI JSON document. #### 2. Configure mcp-openapi-proxy for Slack Update your configuration: ```json { "mcpServers": { "slack": { "command": "uvx", "args": ["mcp-openapi-proxy"], "env": { "OPENAPI_SPEC_URL": "https://raw.githubusercontent.com/slackapi/slack-api-specs/master/web-api/slack_web_openapi_v2.json", "TOOL_WHITELIST": "/chat,/bots,/conversations,/reminders,/files,/users", "API_KEY": "<your_slack_bot_token, starts with xoxb>", "STRIP_PARAM": "token", "TOOL_NAME_PREFIX": "slack_" } } } } ``` - **OPENAPI_SPEC_URL**: Slack’s OpenAPI spec URL. - **TOOL_WHITELIST**: Limits tools to useful endpoint groups (e.g. chat, conversations, users). - **API_KEY**: Your Slack bot token (e.g. `xoxb-...`, replace `<your_slack_bot_token>`). - **STRIP_PARAM**: Removes the token field from the request payload. - **TOOL_NAME_PREFIX**: Prepends `slack_` to tool names. #### 3. Testing After starting the service refer to the [JSON-RPC Testing](#json-rpc-testing) section for instructions on listing resources and tools. ### GetZep Example ![image](https://github.com/user-attachments/assets/9a4fdabb-fa3d-4626-a50f-438147eadc9f) GetZep offers a free cloud API for memory management with detailed endpoints. Since GetZep did not provide an official OpenAPI specification, this project includes a generated spec hosted on GitHub for convenience. Users can similarly generate OpenAPI specs for any REST API and reference them locally (e.g. `file:///path/to/spec.json`). Obtain an API key from [GetZep's documentation](https://docs.getzep.com/). #### 1. Verify the OpenAPI Specification Retrieve the project-provided GetZep OpenAPI specification: ```bash curl https://raw.githubusercontent.com/matthewhand/mcp-openapi-proxy/refs/heads/main/examples/getzep.swagger.json ``` Ensure it’s a valid OpenAPI JSON document. Alternatively, generate your own spec and use a `file://` URL to reference a local file. #### 2. Configure mcp-openapi-proxy for GetZep Update your configuration: ```json { "mcpServers": { "getzep": { "command": "uvx", "args": ["mcp-openapi-proxy"], "env": { "OPENAPI_SPEC_URL": "https://raw.githubusercontent.com/matthewhand/mcp-openapi-proxy/refs/heads/main/examples/getzep.swagger.json", "TOOL_WHITELIST": "/sessions", "API_KEY": "<your_getzep_api_key>", "API_AUTH_TYPE": "Api-Key", "TOOL_NAME_PREFIX": "zep_" } } } } ``` - **OPENAPI_SPEC_URL**: Points to the project-provided GetZep Swagger spec (or use `file:///path/to/your/spec.json` for a local file). - **TOOL_WHITELIST**: Limits to `/sessions` endpoints. - **API_KEY**: Your GetZep API key. - **API_AUTH_TYPE**: Uses `Api-Key` for header-based authentication. - **TOOL_NAME_PREFIX**: Prepends `zep_` to tool names. #### 3. Testing After starting the service refer to the [JSON-RPC Testing](#json-rpc-testing) section for instructions on listing resources and tools. ### Virustotal Example ![image](https://github.com/user-attachments/assets/d1760e58-a299-4004-9593-6dbaf3b685a1) This example demonstrates: - Using a YAML OpenAPI specification file - Using custom HTTP auth header, "x-apikey" #### 1. Verify the OpenAPI Specification Retrieve the Virustotal OpenAPI specification: ```bash curl https://raw.githubusercontent.com/matthewhand/mcp-openapi-proxy/refs/heads/main/examples/virustotal.openapi.yml ``` Ensure that the response is a valid OpenAPI YAML document. #### 2. Configure mcp-openapi-proxy for Virustotal Add the following configuration to your MCP ecosystem settings: ```json { "mcpServers": { "virustotal": { "command": "uvx", "args": ["mcp-openapi-proxy"], "env": { "OPENAPI_SPEC_URL": "https://raw.githubusercontent.com/matthewhand/mcp-openapi-proxy/refs/heads/main/examples/virustotal.openapi.yml", "EXTRA_HEADERS": "x-apikey: ${VIRUSTOTAL_API_KEY}", "OPENAPI_SPEC_FORMAT": "yaml" } } } } ``` Key configuration points: - By default, the proxy expects a JSON specification and sends the API key with a Bearer prefix. - To use a YAML OpenAPI specification, include `OPENAPI_SPEC_FORMAT="yaml"`. - Note: VirusTotal requires a special authentication header; EXTRA_HEADERS is used to transmit the API key as "x-apikey: ${VIRUSTOTAL_API_KEY}". #### 3. Testing Launch the proxy with the Virustotal configuration: ```bash OPENAPI_SPEC_URL="https://raw.githubusercontent.com/matthewhand/mcp-openapi-proxy/refs/heads/main/examples/virustotal.openapi.yml" API_KEY="your_virustotal_api_key" API_AUTH_HEADER="x-apikey" API_AUTH_TYPE="" OPENAPI_SPEC_FORMAT="yaml" uvx mcp-openapi-proxy ``` After starting the service, refer to the [JSON-RPC Testing](#json-rpc-testing) section for instructions on listing resources and tools. ### Notion Example ![image](https://github.com/user-attachments/assets/45038bcf-9537-4337-8a90-8553ad3aa81b) Notion’s API requires specifying a particular version via HTTP headers. This example uses the `EXTRA_HEADERS` environment variable to include the required header, and focuses on verifying the OpenAPI specification. #### 1. Verify the OpenAPI Specification Retrieve the Notion OpenAPI specification: ```bash curl https://storage.googleapis.com/versori-assets/public-specs/20240214/NotionAPI.yml ``` Ensure the response is a valid YAML document. #### 2. Configure mcp-openapi-proxy for Notion Add the following configuration to your MCP ecosystem settings: ```json { "mcpServers": { "notion": { "command": "uvx", "args": [ "mcp-openapi-proxy" ], "env": { "API_KEY": "ntn_<your_key>", "OPENAPI_SPEC_URL": "https://storage.googleapis.com/versori-assets/public-specs/20240214/NotionAPI.yml", "SERVER_URL_OVERRIDE": "https://api.notion.com", "EXTRA_HEADERS": "Notion-Version: 2022-06-28" } } } } ``` #### 3. Testing Launch the proxy with the Notion configuration: ```bash OPENAPI_SPEC_URL="https://storage.googleapis.com/versori-assets/public-specs/20240214/NotionAPI.yml" SERVER_URL_OVERRIDE="https://api.notion.com" EXTRA_HEADERS="Notion-Version: 2022-06-28" API_KEY="ntn_<your_key>" uvx mcp-openapi-proxy ``` After starting the service, refer to the [JSON-RPC Testing](#json-rpc-testing) section for instructions on listing resources and tools. ### Asana Example ![image](https://github.com/user-attachments/assets/087571dd-9e06-407e-905c-92815231f618) Asana provides a rich set of endpoints for managing workspaces, tasks, projects, and users. The integration tests demonstrate usage of endpoints such as `GET /workspaces`, `GET /tasks`, and `GET /projects`. #### 1. Verify the OpenAPI Specification Retrieve the Asana OpenAPI specification: ```bash curl https://raw.githubusercontent.com/Asana/openapi/refs/heads/master/defs/asana_oas.yaml ``` Ensure the response is a valid YAML (or JSON) document. #### 2. Configure mcp-openapi-proxy for Asana Add the following configuration to your MCP ecosystem settings: ```json { "mcpServers": { "asana": { "command": "uvx", "args": [ "mcp-openapi-proxy" ], "env": { "OPENAPI_SPEC_URL": "https://raw.githubusercontent.com/Asana/openapi/refs/heads/master/defs/asana_oas.yaml", "SERVER_URL_OVERRIDE": "https://app.asana.com/api/1.0", "TOOL_WHITELIST": "/workspaces,/tasks,/projects,/users", "API_KEY": "${ASANA_API_KEY}" } } } } ``` *Note: Most Asana API endpoints require authentication. Set `ASANA_API_KEY` in your environment or `.env` file with a valid token.* #### 3. Testing Start the service with: ```bash ASANA_API_KEY="<your_asana_api_key>" OPENAPI_SPEC_URL="https://raw.githubusercontent.com/Asana/openapi/refs/heads/master/defs/asana_oas.yaml" SERVER_URL_OVERRIDE="https://app.asana.com/api/1.0" TOOL_WHITELIST="/workspaces,/tasks,/projects,/users" uvx mcp-openapi-proxy ``` You can then use the MCP ecosystem to list and invoke tools for endpoints like `/dcim/devices/` and `/ipam/ip-addresses/`. ### APIs.guru Example APIs.guru provides a directory of OpenAPI definitions for thousands of public APIs. This example shows how to use mcp-openapi-proxy to expose the APIs.guru directory as MCP tools. #### 1. Verify the OpenAPI Specification Retrieve the APIs.guru OpenAPI specification: ```bash curl https://raw.githubusercontent.com/APIs-guru/openapi-directory/refs/heads/main/APIs/apis.guru/2.2.0/openapi.yaml ``` Ensure the response is a valid OpenAPI YAML document. #### 2. Configure mcp-openapi-proxy for APIs.guru Add the following configuration to your MCP ecosystem settings: ```json { "mcpServers": { "apisguru": { "command": "uvx", "args": ["mcp-openapi-proxy"], "env": { "OPENAPI_SPEC_URL": "https://raw.githubusercontent.com/APIs-guru/openapi-directory/refs/heads/main/APIs/apis.guru/2.2.0/openapi.yaml" } } } } ``` #### 3. Testing Start the service with: ```bash OPENAPI_SPEC_URL="https://raw.githubusercontent.com/APIs-guru/openapi-directory/refs/heads/main/APIs/apis.guru/2.2.0/openapi.yaml" uvx mcp-openapi-proxy ``` You can then use the MCP ecosystem to list and invoke tools such as `listAPIs`, `getMetrics`, and `getProviders` that are defined in the APIs.guru directory. ### NetBox Example NetBox is an open-source IP address management (IPAM) and data center infrastructure management (DCIM) tool. This example demonstrates how to use mcp-openapi-proxy to expose the NetBox API as MCP tools. #### 1. Verify the OpenAPI Specification Retrieve the NetBox OpenAPI specification: ```bash curl https://raw.githubusercontent.com/APIs-guru/openapi-directory/refs/heads/main/APIs/netbox.dev/3.4/openapi.yaml ``` Ensure the response is a valid OpenAPI YAML document. #### 2. Configure mcp-openapi-proxy for NetBox Add the following configuration to your MCP ecosystem settings: ```json { "mcpServers": { "netbox": { "command": "uvx", "args": ["mcp-openapi-proxy"], "env": { "OPENAPI_SPEC_URL": "https://raw.githubusercontent.com/APIs-guru/openapi-directory/refs/heads/main/APIs/netbox.dev/3.4/openapi.yaml", "API_KEY": "${NETBOX_API_KEY}" } } } } ``` *Note: Most NetBox API endpoints require authentication. Set `NETBOX_API_KEY` in your environment or `.env` file with a valid token.* #### 3. Testing Start the service with: ```bash OPENAPI_SPEC_URL="https://raw.githubusercontent.com/APIs-guru/openapi-directory/refs/heads/main/APIs/netbox.dev/3.4/openapi.yaml" API_KEY="$NETBOX_API_KEY" uvx mcp-openapi-proxy ``` You can then use the MCP ecosystem to list and invoke tools for endpoints like `/dcim/devices/` and `/ipam/ip-addresses/`. ### Box API Example You can integrate the Box Platform API using your own developer token for authenticated access to your Box account. This example demonstrates how to expose Box API endpoints as MCP tools. #### Example config: `examples/box-claude_desktop_config.json` ```json "env": { "OPENAPI_SPEC_URL": "https://raw.githubusercontent.com/APIs-guru/openapi-directory/refs/heads/main/APIs/box.com/2.0.0/openapi.yaml", "TOOL_WHITELIST": "/folders/{folder_id}/items,/files/{file_id},/search,/recent_items", "API_KEY": "${BOX_API_KEY}" } ``` - Set your Box developer token as an environment variable in `.env`: ``` BOX_API_KEY=your_box_developer_token ``` - Or run the proxy with a one-liner: ```bash OPENAPI_SPEC_URL="https://raw.githubusercontent.com/APIs-guru/openapi-directory/refs/heads/main/APIs/box.com/2.0.0/openapi.yaml" API_KEY="$BOX_API_KEY" uvx mcp-openapi-proxy ``` You can now use the MCP ecosystem to list and invoke Box API tools. For integration tests, see `tests/integration/test_box_integration.py`. Note: developer api keys for free tier box users are limited to 60 minutes :(. ### WolframAlpha API Example ![image](https://github.com/user-attachments/assets/6a634d63-5734-4275-8876-6bacb8beabcc) You can integrate the WolframAlpha API using your own App ID for authenticated access. This example demonstrates how to expose WolframAlpha API endpoints as MCP tools. #### Example config: `examples/wolframalpha-claude_desktop_config.json` ```json { "mcpServers": { "wolframalpha": { "command": "uvx", "args": [ "mcp-openapi-proxy" ], "env": { "OPENAPI_SPEC_URL": "https://raw.githubusercontent.com/APIs-guru/openapi-directory/refs/heads/main/APIs/wolframalpha.com/v0.1/openapi.yaml", "API_KEY": "${WOLFRAM_LLM_APP_ID}" } } } } ``` - Set your WolframAlpha App ID as an environment variable in `.env`: ``` WOLFRAM_LLM_APP_ID=your_wolfram_app_id ``` - Or run the proxy with a one-liner: ```bash OPENAPI_SPEC_URL="https://raw.githubusercontent.com/APIs-guru/openapi-directory/refs/heads/main/APIs/wolframalpha.com/v0.1/openapi.yaml" API_KEY="$WOLFRAM_LLM_APP_ID" uvx mcp-openapi-proxy ``` You can now use the MCP ecosystem to list and invoke WolframAlpha API tools. For integration tests, see `tests/integration/test_wolframalpha_integration.py`. ## Troubleshooting ### JSON-RPC Testing For alternative testing, you can interact with the MCP server via JSON-RPC. After starting the server, paste the following initialization message: ```json {"method":"initialize","params":{"protocolVersion":"2024-11-05","capabilities":{},"clientInfo":{"name":"claude-ai","version":"0.1.0"}},"jsonrpc":"2.0","id":0} ``` Expected response: ```json {"jsonrpc":"2.0","id":0,"result":{"protocolVersion":"2024-11-05","capabilities":{"experimental":{},"prompts":{"listChanged":false},"resources":{"subscribe":false,"listChanged":false},"tools":{"listChanged":false}},"serverInfo":{"name":"sqlite","version":"0.1.0"}}} ``` Then paste these follow-up messages: ```json {"method":"notifications/initialized","jsonrpc":"2.0"} {"method":"resources/list","params":{},"jsonrpc":"2.0","id":1} {"method":"tools/list","params":{},"jsonrpc":"2.0","id":2} ``` - **Missing OPENAPI_SPEC_URL:** Ensure it’s set to a valid OpenAPI JSON URL or local file path. - **Invalid Specification:** Verify the OpenAPI document is standard-compliant. - **Tool Filtering Issues:** Check `TOOL_WHITELIST` matches desired endpoints. - **Authentication Errors:** Confirm `API_KEY` and `API_AUTH_TYPE` are correct. - **Logging:** Set `DEBUG=true` for detailed output to stderr. - **Test Server:** Run directly: ```bash uvx mcp-openapi-proxy ``` ## License [MIT License](LICENSE)

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/matthewhand/mcp-openapi-proxy'

If you have feedback or need assistance with the MCP directory API, please join our Discord server