.env.example•1.71 kB
# Cisco API OAuth2 Configuration
CISCO_CLIENT_ID=your_client_id_here
CISCO_CLIENT_SECRET=your_client_secret_here
# Server Configuration
PORT=3000
NODE_ENV=development
# API Support Configuration
# Comma-separated list of APIs to enable: enhanced_analysis,bug,case,eox,psirt,product,software,serial,rma
# Use 'enhanced_analysis' for simplified deployment (recommended), 'all' for everything, or 'bug' for basic
# Note: Users must have appropriate Cisco API access for each enabled API
#
# Examples:
# SUPPORT_API=enhanced_analysis # Enhanced analysis tools only (6 tools) - RECOMMENDED
# SUPPORT_API=bug # All Bug API tools (14 tools including enhanced)
# SUPPORT_API=bug,case # Bug and Case APIs
# SUPPORT_API=bug,case,eox,psirt # Core support APIs
# SUPPORT_API=bug,case,eox,psirt,product,software # All implemented APIs (39 tools)
# SUPPORT_API=all # All available APIs (includes placeholders)
#
# ✅ Currently implemented (6/8 APIs - 75% complete):
# enhanced_analysis (6 tools), bug (14 tools), case (4 tools), eox (4 tools), psirt (8 tools), product (3 tools), software (6 tools)
# 🔄 Planned (2/8 APIs remaining): serial, rma
SUPPORT_API=enhanced_analysis
# HTTP Authentication Configuration (for --http mode only)
# Custom Bearer token for HTTP authentication (optional - generates random token if not set)
# Generate a token with: npx mcp-cisco-support --generate-token
# MCP_BEARER_TOKEN=your_custom_token_here
# SECURITY WARNING: Setting this to 'true' disables HTTP authentication entirely
# Only use in development/testing environments behind secure networks
# DANGEROUSLY_OMIT_AUTH=true