
mcp-any-openapi
A Python-based MCP server that integrates OpenAPI-described REST APIs into MCP workflows, enabling dynamic exposure of API endpoints as MCP tools.
matthewhand
Tools
list_functions
Lists available functions (API endpoints) defined in the OpenAPI specification. Returns: A JSON-encoded string of available function descriptions, or an error message if configuration is missing.
call_function
Calls a specified API function (an endpoint defined in the OpenAPI spec) with parameters. Args: function_name (str): The name of the API function to call (e.g., "GET /pets"). parameters (dict, optional): Parameters for the API call (query parameters, request body, etc.). Returns: The raw API response as a JSON-encoded string or an error message.
README
mcp-openapi-proxy
mcp-openapi-proxy is a Python package that implements a Model Context Protocol (MCP) server, designed to dynamically expose REST APIs—defined by OpenAPI specifications—as MCP tools. This facilitates seamless integration of OpenAPI-described APIs into MCP-based workflows.
Table of Contents
- Overview
- Features
- Installation
- Modes of Operation
- Environment Variables
- Examples
- Troubleshooting
- License
Overview
The package offers two operational modes:
- Low-Level Mode (Default): Dynamically registers tools corresponding to all valid API endpoints specified in an OpenAPI document (e.g.
/chat/completions
becomeschat_completions()
). - FastMCP Mode (Simple Mode): Provides a streamlined approach by exposing a predefined set of tools (e.g.
list_functions()
andcall_function()
) based on static configurations.
Features
- Dynamic Tool Generation: Automatically creates MCP tools from OpenAPI endpoint definitions.
- Simple Mode Option: Offers a static configuration alternative via FastMCP mode.
- OpenAPI Specification Support: Compatible with OpenAPI v3 with potential support for v2.
- Flexible Filtering: Allows endpoint filtering through whitelisting by paths or other criteria.
- Payload Authentication: Supports custom authentication via JMESPath expressions (e.g. for APIs like Slack that expect tokens in the payload not the HTTP header).
- Header Authentication: Uses
Bearer
by default forAPI_KEY
in the Authorization header, customizable for APIs like Fly.io requiringApi-Key
. - MCP Integration: Seamlessly integrates with MCP ecosystems for invoking REST APIs as tools.
Installation
Install the package directly from PyPI using the following command:
uvx mcp-openapi-proxy
MCP Ecosystem Integration
To incorporate mcp-openapi-proxy into your MCP ecosystem configure it within your mcpServers
settings. Below is a generic example:
{
"mcpServers": {
"mcp-openapi-proxy": {
"command": "uvx",
"args": ["mcp-openapi-proxy"],
"env": {
"OPENAPI_SPEC_URL": "${OPENAPI_SPEC_URL}",
"API_KEY": "${API_OPENAPI_KEY}"
}
}
}
}
Refer to the Examples section below for practical configurations tailored to specific APIs.
Modes of Operation
FastMCP Mode (Simple Mode)
- Enabled by: Setting the environment variable
OPENAPI_SIMPLE_MODE=true
. - Description: Exposes a fixed set of tools derived from specific OpenAPI endpoints as defined in the code.
- Configuration: Relies on environment variables to specify tool behavior.
Low-Level Mode (Default)
- Description: Automatically registers all valid API endpoints from the provided OpenAPI specification as individual tools.
- Tool Naming: Derives tool names from normalized OpenAPI paths and methods.
- Behavior: Generates tool descriptions from OpenAPI operation summaries and descriptions.
Environment Variables
OPENAPI_SPEC_URL
: (Required) The URL to the OpenAPI specification JSON file (e.g.https://example.com/spec.json
orfile:///path/to/local/spec.json
).OPENAPI_LOGFILE_PATH
: (Optional) Specifies the log file path.OPENAPI_SIMPLE_MODE
: (Optional) Set totrue
to enable FastMCP mode.TOOL_WHITELIST
: (Optional) A comma-separated list of endpoint paths to expose as tools.TOOL_NAME_PREFIX
: (Optional) A prefix to prepend to all tool names.API_KEY
: (Optional) Authentication token for the API sent asBearer <API_KEY>
in the Authorization header by default.API_AUTH_TYPE
: (Optional) Overrides the defaultBearer
Authorization header type (e.g.Api-Key
for GetZep).STRIP_PARAM
: (Optional) JMESPath expression to strip unwanted parameters (e.g.token
for Slack).DEBUG
: (Optional) Enables verbose debug logging when set to "true", "1", or "yes".EXTRA_HEADERS
: (Optional) Additional HTTP headers in "Header: Value" format (one per line) to attach to outgoing API requests.SERVER_URL_OVERRIDE
: (Optional) Overrides the base URL from the OpenAPI specification when set, useful for custom deployments.TOOL_NAME_MAX_LENGTH
: (Optional) Truncates tool names to a max length.- Additional Variable:
OPENAPI_SPEC_URL_<hash>
– a variant for unique per-test configurations (falls back toOPENAPI_SPEC_URL
). IGNORE_SSL_SPEC
: (Optional) Set totrue
to disable SSL certificate verification when fetching the OpenAPI spec.IGNORE_SSL_TOOLS
: (Optional) Set totrue
to disable SSL certificate verification for API requests made by tools.
Examples
For testing you can run the uvx command as demonstrated in the examples then interact with the MCP server via JSON-RPC messages to list tools and resources. See the "JSON-RPC Testing" section below.
Glama Example
Glama offers the most minimal configuration for mcp-openapi-proxy requiring only the OPENAPI_SPEC_URL
environment variable. This simplicity makes it ideal for quick testing.
1. Verify the OpenAPI Specification
Retrieve the Glama OpenAPI specification:
curl https://glama.ai/api/mcp/openapi.json
Ensure the response is a valid OpenAPI JSON document.
2. Configure mcp-openapi-proxy for Glama
Add the following configuration to your MCP ecosystem settings:
{
"mcpServers": {
"glama": {
"command": "uvx",
"args": ["mcp-openapi-proxy"],
"env": {
"OPENAPI_SPEC_URL": "https://glama.ai/api/mcp/openapi.json"
}
}
}
}
3. Testing
Start the service with:
OPENAPI_SPEC_URL="https://glama.ai/api/mcp/openapi.json" uvx mcp-openapi-proxy
Then refer to the JSON-RPC Testing section for instructions on listing resources and tools.
Fly.io Example
Fly.io provides a simple API for managing machines making it an ideal starting point. Obtain an API token from Fly.io documentation.
1. Verify the OpenAPI Specification
Retrieve the Fly.io OpenAPI specification:
curl https://raw.githubusercontent.com/abhiaagarwal/peristera/refs/heads/main/fly-machines-gen/fixed_spec.json
Ensure the response is a valid OpenAPI JSON document.
2. Configure mcp-openapi-proxy for Fly.io
Update your MCP ecosystem configuration:
{
"mcpServers": {
"flyio": {
"command": "uvx",
"args": ["mcp-openapi-proxy"],
"env": {
"OPENAPI_SPEC_URL": "https://raw.githubusercontent.com/abhiaagarwal/peristera/refs/heads/main/fly-machines-gen/fixed_spec.json",
"API_KEY": "<your_flyio_token_here>"
}
}
}
}
- OPENAPI_SPEC_URL: Points to the Fly.io OpenAPI specification.
- API_KEY: Your Fly.io API token (replace
<your_flyio_token_here>
). - API_AUTH_TYPE: Set to
Api-Key
for Fly.io’s header-based authentication (overrides defaultBearer
).
3. Testing
After starting the service refer to the JSON-RPC Testing section for instructions on listing resources and tools.
Render Example
Render offers infrastructure hosting that can be managed via an API. The provided configuration file examples/render-claude_desktop_config.json
demonstrates how to set up your MCP ecosystem quickly with minimal settings.
1. Verify the OpenAPI Specification
Retrieve the Render OpenAPI specification:
curl https://api-docs.render.com/openapi/6140fb3daeae351056086186
Ensure the response is a valid OpenAPI document.
2. Configure mcp-openapi-proxy for Render
Add the following configuration to your MCP ecosystem settings:
{
"mcpServers": {
"render": {
"command": "uvx",
"args": ["mcp-openapi-proxy"],
"env": {
"OPENAPI_SPEC_URL": "https://api-docs.render.com/openapi/6140fb3daeae351056086186",
"TOOL_WHITELIST": "/services,/maintenance",
"API_KEY": "your_render_token_here"
}
}
}
}
3. Testing
Launch the proxy with your Render configuration:
OPENAPI_SPEC_URL="https://api-docs.render.com/openapi/6140fb3daeae351056086186" TOOL_WHITELIST="/services,/maintenance" API_KEY="your_render_token_here" uvx mcp-openapi-proxy
Then refer to the JSON-RPC Testing section for instructions on listing resources and tools.
Slack Example
Slack’s API showcases stripping unnecessary token payload using JMESPath. Obtain a bot token from Slack API documentation.
1. Verify the OpenAPI Specification
Retrieve the Slack OpenAPI specification:
curl https://raw.githubusercontent.com/slackapi/slack-api-specs/master/web-api/slack_web_openapi_v2.json
Ensure it’s a valid OpenAPI JSON document.
2. Configure mcp-openapi-proxy for Slack
Update your configuration:
{
"mcpServers": {
"slack": {
"command": "uvx",
"args": ["mcp-openapi-proxy"],
"env": {
"OPENAPI_SPEC_URL": "https://raw.githubusercontent.com/slackapi/slack-api-specs/master/web-api/slack_web_openapi_v2.json",
"TOOL_WHITELIST": "/chat,/bots,/conversations,/reminders,/files,/users",
"API_KEY": "<your_slack_bot_token, starts with xoxb>",
"STRIP_PARAM": "token",
"TOOL_NAME_PREFIX": "slack_"
}
}
}
}
- OPENAPI_SPEC_URL: Slack’s OpenAPI spec URL.
- TOOL_WHITELIST: Limits tools to useful endpoint groups (e.g. chat, conversations, users).
- API_KEY: Your Slack bot token (e.g.
xoxb-...
, replace<your_slack_bot_token>
). - STRIP_PARAM: Removes the token field from the request payload.
- TOOL_NAME_PREFIX: Prepends
slack_
to tool names.
3. Testing
After starting the service refer to the JSON-RPC Testing section for instructions on listing resources and tools.
GetZep Example
GetZep offers a free cloud API for memory management with detailed endpoints. Since GetZep did not provide an official OpenAPI specification, this project includes a generated spec hosted on GitHub for convenience. Users can similarly generate OpenAPI specs for any REST API and reference them locally (e.g. file:///path/to/spec.json
). Obtain an API key from GetZep's documentation.
1. Verify the OpenAPI Specification
Retrieve the project-provided GetZep OpenAPI specification:
curl https://raw.githubusercontent.com/matthewhand/mcp-openapi-proxy/refs/heads/main/examples/getzep.swagger.json
Ensure it’s a valid OpenAPI JSON document. Alternatively, generate your own spec and use a file://
URL to reference a local file.
2. Configure mcp-openapi-proxy for GetZep
Update your configuration:
{
"mcpServers": {
"getzep": {
"command": "uvx",
"args": ["mcp-openapi-proxy"],
"env": {
"OPENAPI_SPEC_URL": "https://raw.githubusercontent.com/matthewhand/mcp-openapi-proxy/refs/heads/main/examples/getzep.swagger.json",
"TOOL_WHITELIST": "/sessions",
"API_KEY": "<your_getzep_api_key>",
"API_AUTH_TYPE": "Api-Key",
"TOOL_NAME_PREFIX": "zep_"
}
}
}
}
- OPENAPI_SPEC_URL: Points to the project-provided GetZep Swagger spec (or use
file:///path/to/your/spec.json
for a local file). - TOOL_WHITELIST: Limits to
/sessions
endpoints. - API_KEY: Your GetZep API key.
- API_AUTH_TYPE: Uses
Api-Key
for header-based authentication. - TOOL_NAME_PREFIX: Prepends
zep_
to tool names.
3. Testing
After starting the service refer to the JSON-RPC Testing section for instructions on listing resources and tools.
Virustotal Example
This example demonstrates:
- Using a YAML OpenAPI specification file
- Using custom HTTP auth header, "x-apikey"
1. Verify the OpenAPI Specification
Retrieve the Virustotal OpenAPI specification:
curl https://raw.githubusercontent.com/matthewhand/mcp-openapi-proxy/refs/heads/main/examples/virustotal.openapi.yml
Ensure that the response is a valid OpenAPI YAML document.
2. Configure mcp-openapi-proxy for Virustotal
Add the following configuration to your MCP ecosystem settings:
{
"mcpServers": {
"virustotal": {
"command": "uvx",
"args": ["mcp-openapi-proxy"],
"env": {
"OPENAPI_SPEC_URL": "https://raw.githubusercontent.com/matthewhand/mcp-openapi-proxy/refs/heads/main/examples/virustotal.openapi.yml",
"EXTRA_HEADERS": "x-apikey: ${VIRUSTOTAL_API_KEY}",
"OPENAPI_SPEC_FORMAT": "yaml"
}
}
}
}
Key configuration points:
- By default, the proxy expects a JSON specification and sends the API key with a Bearer prefix.
- To use a YAML OpenAPI specification, include
OPENAPI_SPEC_FORMAT="yaml"
. - Note: VirusTotal requires a special authentication header; EXTRA_HEADERS is used to transmit the API key as "x-apikey: ${VIRUSTOTAL_API_KEY}".
3. Testing
Launch the proxy with the Virustotal configuration:
OPENAPI_SPEC_URL="https://raw.githubusercontent.com/matthewhand/mcp-openapi-proxy/refs/heads/main/examples/virustotal.openapi.yml" API_KEY="your_virustotal_api_key" API_AUTH_HEADER="x-apikey" API_AUTH_TYPE="" OPENAPI_SPEC_FORMAT="yaml" uvx mcp-openapi-proxy
After starting the service, refer to the JSON-RPC Testing section for instructions on listing resources and tools.
Notion Example
Notion’s API requires specifying a particular version via HTTP headers. This example uses the EXTRA_HEADERS
environment variable to include the required header, and focuses on verifying the OpenAPI specification.
1. Verify the OpenAPI Specification
Retrieve the Notion OpenAPI specification:
curl https://storage.googleapis.com/versori-assets/public-specs/20240214/NotionAPI.yml
Ensure the response is a valid YAML document.
2. Configure mcp-openapi-proxy for Notion
Add the following configuration to your MCP ecosystem settings:
{
"mcpServers": {
"notion": {
"command": "uvx",
"args": [
"mcp-openapi-proxy"
],
"env": {
"API_KEY": "ntn_<your_key>",
"OPENAPI_SPEC_URL": "https://storage.googleapis.com/versori-assets/public-specs/20240214/NotionAPI.yml",
"SERVER_URL_OVERRIDE": "https://api.notion.com",
"EXTRA_HEADERS": "Notion-Version: 2022-06-28"
}
}
}
}
3. Testing
Launch the proxy with the Notion configuration:
OPENAPI_SPEC_URL="https://storage.googleapis.com/versori-assets/public-specs/20240214/NotionAPI.yml" SERVER_URL_OVERRIDE="https://api.notion.com" EXTRA_HEADERS="Notion-Version: 2022-06-28" API_KEY="ntn_<your_key>" uvx mcp-openapi-proxy
After starting the service, refer to the JSON-RPC Testing section for instructions on listing resources and tools.
Asana Example
Asana provides a rich set of endpoints for managing workspaces, tasks, projects, and users. The integration tests demonstrate usage of endpoints such as GET /workspaces
, GET /tasks
, and GET /projects
.
1. Verify the OpenAPI Specification
Retrieve the Asana OpenAPI specification:
curl https://raw.githubusercontent.com/Asana/openapi/refs/heads/master/defs/asana_oas.yaml
Ensure the response is a valid YAML (or JSON) document.
2. Configure mcp-openapi-proxy for Asana
Add the following configuration to your MCP ecosystem settings:
{
"mcpServers": {
"asana": {
"command": "uvx",
"args": [
"mcp-openapi-proxy"
],
"env": {
"OPENAPI_SPEC_URL": "https://raw.githubusercontent.com/Asana/openapi/refs/heads/master/defs/asana_oas.yaml",
"SERVER_URL_OVERRIDE": "https://app.asana.com/api/1.0",
"TOOL_WHITELIST": "/workspaces,/tasks,/projects,/users",
"API_KEY": "${ASANA_API_KEY}"
}
}
}
}
Before running integration tests, ensure you have a valid ASANA_API_KEY
set in your environment (e.g. in your .env file). Then start the proxy with:
ASANA_API_KEY="<your_asana_api_key>" OPENAPI_SPEC_URL="https://raw.githubusercontent.com/Asana/openapi/refs/heads/master/defs/asana_oas.yaml" SERVER_URL_OVERRIDE="https://app.asana.com/api/1.0" TOOL_WHITELIST="/workspaces,/tasks,/projects,/users" uvx mcp-openapi-proxy
Use MCP tools (via JSON-RPC messages or client libraries) to interact with the Asana endpoints.
Troubleshooting
JSON-RPC Testing
For alternative testing you can interact with the MCP server via JSON-RPC. After starting the server, paste the following initialization message:
{"method":"initialize","params":{"protocolVersion":"2024-11-05","capabilities":{},"clientInfo":{"name":"claude-ai","version":"0.1.0"}},"jsonrpc":"2.0","id":0}
Expected response:
{"jsonrpc": "2.0", "id": 0, "result": {"capabilities": {...}}}
License
Recommended Servers
playwright-mcp
A Model Context Protocol server that enables LLMs to interact with web pages through structured accessibility snapshots without requiring vision models or screenshots.
Magic Component Platform (MCP)
An AI-powered tool that generates modern UI components from natural language descriptions, integrating with popular IDEs to streamline UI development workflow.
MCP Package Docs Server
Facilitates LLMs to efficiently access and fetch structured documentation for packages in Go, Python, and NPM, enhancing software development with multi-language support and performance optimization.
Claude Code MCP
An implementation of Claude Code as a Model Context Protocol server that enables using Claude's software engineering capabilities (code generation, editing, reviewing, and file operations) through the standardized MCP interface.
@kazuph/mcp-taskmanager
Model Context Protocol server for Task Management. This allows Claude Desktop (or any MCP client) to manage and execute tasks in a queue-based system.
DuckDuckGo MCP Server
A Model Context Protocol (MCP) server that provides web search capabilities through DuckDuckGo, with additional features for content fetching and parsing.
contentful-mcp
Update, create, delete content, content-models and assets in your Contentful Space
Linear MCP Server
Enables interaction with Linear's API for managing issues, teams, and projects programmatically through the Model Context Protocol.
YouTube Transcript MCP Server
This server retrieves transcripts for given YouTube video URLs, enabling integration with Goose CLI or Goose Desktop for transcript extraction and processing.

Supabase MCP Server
A Model Context Protocol (MCP) server that provides programmatic access to the Supabase Management API. This server allows AI models and other clients to manage Supabase projects and organizations through a standardized interface.