OpenAPI Invoker
Invokes any OpenAPI specification through a Model Context Protocol (MCP) server.
oapi-invoker-mcp 🚀
Say goodbye to repetitive development of "API's API"
oapi-invoker-mcp invokes any OpenAPI through Model Context Protocol (MCP)
server.
- Easily invoke any OpenAPI service through MCP client 💻
- Support specification patches (e.g., add API descriptions and examples to enhance documentation) 📝
- Support custom authentication protocols, like
Tencent Cloud API Signature V3🔐 - Powerful OpenAPI specification parsing with custom extensions 🔧
- Advanced filtering and operation selection 🎯
- Script-based dynamic value generation for headers, parameters, and authentication 📜
- Built-in debug mode for development and troubleshooting 🔍
- Data encryption/decryption (e.g., authentication headers) 🔒
Key Features
🔧 Advanced OpenAPI Parsing with Extensions
oapi-invoker-mcp extends standard OpenAPI specifications with powerful custom
extensions that provide fine-grained control over API interactions:
Tool Configuration Extensions
x-tool-name-format: Customize tool naming patterns (e.g.,{method}-{cleanPath},{operationId})- Available placeholders:
{method}: HTTP method (get, post, put, delete, etc.){cleanPath}: Sanitized path with special characters converted to underscores{operationId}: OpenAPI operation ID (if available)
- Note: Raw
{path}is not supported to avoid unsafe characters in tool names
- Available placeholders:
x-tool-name-prefix/suffix: Add prefixes or suffixes to tool namesx-filter-rules: Filter operations by path patterns, methods, operation IDs, or tags
Request Configuration Extensions
x-request-config: Global request settings including:- Base URL configuration
- Default headers and authentication
- Proxy settings with parameter mapping
- Timeout and retry configurations
- Tencent Cloud authentication support
Operation-Level Extensions
x-examples: Add request/response examples for better documentationx-remap-path-to-header: Map path parameters to request headersx-custom-base-url: Override base URL per operationx-custom-path: Override operation pathx-sensitive-params: Mark sensitive data for automatic redactionx-sensitive-response-fields: Mark response fields as sensitive
Response Processing Extensions
x-response-config: Control response handling:- Maximum response length limits
includeResponseKeys: Specify which keys to include in the response (all others will be excluded)- Supports dot notation for nested fields (e.g.,
user.profile.email) - Supports wildcards:
*for single level,**for all nested levels (e.g.,data.*.id,user.**) - Single words without dots will match all properties with that name at any level
- Supports dot notation for nested fields (e.g.,
excludeResponseKeys: Specify which keys to exclude from the response- Supports dot notation for nested fields (e.g.,
user.profile.address) - Supports wildcards:
*for single level,**for all nested levels (e.g.,data.*.secret,credentials.**) - Single words without dots will match all properties with that name at any
level (e.g.,
secretwill exclude all properties named "secret" at any depth)
- Supports dot notation for nested fields (e.g.,
sensitiveResponseFields: Mark specific fields as sensitive (will be replaced with "*SENSITIVE*")- Supports dot notation for nested fields (e.g.,
user.token) - Supports wildcards:
*for single level,**for all nested levels (e.g.,*.password,**.secret) - Single words without dots will match all properties with that name at any
level (e.g.,
passwordwill mask all properties named "password" at any depth)
- Supports dot notation for nested fields (e.g.,
x-tree-shaking-func: Custom response data filtering
📜 Script-Based Dynamic Values
Generate dynamic values using Deno scripts in any configuration field:
x-request-config:
headers:
"x-timestamp": |
#!/usr/bin/env deno
const timestamp = Date.now().toString();
Deno.stdout.write(new TextEncoder().encode(timestamp));
"x-signature": |
#!/usr/bin/env deno
const timestamp = Deno.env.get("x_timestamp") || "";
const data = "secret" + timestamp;
const hash = await crypto.subtle.digest("SHA-256", new TextEncoder().encode(data));
Deno.stdout.write(new TextEncoder().encode(Array.from(new Uint8Array(hash)).map(b => b.toString(16).padStart(2, '0')).join('')));
URL Encoding in Input Parameters
For APIs that require URL-encoded parameters, you can use dynamic scripts in
inputParams:
Using Node.js encodeURIComponent:
{
"query": "#!/usr/bin/env node\nconst rawValue = \"hello world & special chars\";\nconst encoded = encodeURIComponent(rawValue);\nprocess.stdout.write(encoded);"
}
Using Deno URL encoding:
{
"searchTerm": "#!/usr/bin/env deno\nconst term = \"user search & query\";\nconst encoded = encodeURIComponent(term);\nDeno.stdout.write(new TextEncoder().encode(encoded));"
}
Template variables with encoding:
{
"encodedParam": "#!/usr/bin/env node\nconst value = process.env.SEARCH_TERM || 'default';\nprocess.stdout.write(encodeURIComponent(value));"
}
Script Features:
- 🔄 Cross-script communication: Script outputs become environment variables for subsequent scripts
- 🌍 Environment variable templating: Use
{VAR_NAME}syntax for variable substitution - 📁 Temporary file management: Automatic cleanup of temporary files
- 🔒 Full Deno permissions: Access to file system, network, and external modules
- 🌐 Multiple runtimes: Support for both Node.js and Deno scripts
- 🔤 URL encoding: Built-in support for parameter encoding using
encodeURIComponent
🎯 Advanced Filtering
Filter OpenAPI operations with powerful rule-based system:
x-filter-rules:
- pathPattern: "^/api/v1/.*" # Include only v1 API paths
methodPattern: "^(get|post)$" # Only GET and POST methods
tags: ["user", "admin"] # Operations with specific tags
exclude: false # Include matching operations
- pathPattern: "/internal/.*" # Exclude internal APIs
exclude: true
🔐 Authentication Support
Built-in support for complex authentication schemes:
- Tencent Cloud API Signature V3: Automatic signature generation
- Custom authentication scripts: Generate tokens, signatures, and headers dynamically
- Sensitive parameter handling: Automatic redaction in logs and debug output
Quick Start
1. Basic Configuration
Configure the MCP server with environment variables to specify your OpenAPI specification:
# Required: OpenAPI specification source
export SPEC_URL="https://api.example.com/openapi.json"
# OR
export SPEC_PATH="/path/to/openapi.json"
export SPEC_FORMAT="json" # or "yaml"
# Optional: Extensions file for custom configurations
export SPEC_EXTENSION_PATH="/path/to/extensions.yaml"
export SPEC_EXTENSION_FORMAT="yaml"
2. MCP Server Configuration
Using Node.js (npx)
{
"mcpServers": {
"capi-invoker": {
"command": "npx",
"args": [
"-y",
"deno",
"run",
"--allow-all",
"jsr:@mcpc/oapi-invoker-mcp/bin"
],
"env": {
"SPEC_URL": "https://api.github.com/openapi.json",
"OAPI_INVOKER_DEBUG": "1"
},
"transportType": "stdio"
}
}
}
Using Deno directly
{
"mcpServers": {
"capi-invoker": {
"command": "deno",
"args": ["run", "--allow-all", "jsr:@mcpc/oapi-invoker-mcp/bin"],
"env": {
"SPEC_URL": "https://api.github.com/openapi.json",
"GITHUB_TOKEN": "your-github-token"
},
"transportType": "stdio"
}
}
}
3. Extensions File Example
Create an extensions file to customize behavior:
# extensions.yaml
x-request-config:
baseUrl: "https://api.example.com"
headers:
"Authorization": "Bearer {API_TOKEN}"
"Content-Type": "application/json"
"X-Custom-Header": "custom-value"
timeout: 30000
retries: 3
x-filter-rules:
- pathPattern: "^/api/v1/.*"
methodPattern: "^(get|post)$"
exclude: false
- pathPattern: "/internal/.*"
exclude: true
x-tool-name-format: "{method}-{operationId}"
x-tool-name-prefix: "api-"
# Mark sensitive fields
x-response-config:
sensitiveResponseFields: ["password", "secret", "token"]
maxLength: 10000
4. Complete GitHub API Example
See the complete feature demonstration in
src/source/github/github.patch.yaml,
which showcases:
🎯 All Features in One File:
- Dynamic Script Execution: Node.js and Deno scripts in headers and parameters
- URL Encoding:
encodeURIComponentfor search queries and special characters - Template Variables: Environment variable substitution with
{GITHUB_TOKEN} - Operation Filtering: Include only useful GitHub operations, exclude admin APIs
- Sensitive Data Protection: Automatic redaction of tokens and private data
- Response Optimization: Size limits and field filtering for better performance
📋 Usage Examples:
# Set up GitHub token
export GITHUB_TOKEN="your-github-token"
export ISSUE_TITLE="Dynamic Issue Title"
# Use with MCP client
{
"pathParams": {},
"inputParams": {
"owner": "mcpc-tech",
"repo": "oapi-invoker-mcp"
},
"headerParams": {}
}
🔧 Key Features Demonstrated:
- Repository Operations: Get repo info, create issues, list pull requests
- Search Operations: Repository search with dynamic query encoding
- User Operations: Get current user with sensitive data protection
- Dynamic Headers: Auto-generated timestamps and request IDs
- Automatic Encoding: URL encoding for special characters and spaces
This example serves as a practical template for integrating any REST API with advanced features.
5. Advanced Authentication Example
For APIs requiring complex authentication (e.g., signature-based):
# extensions.yaml
x-request-config:
baseUrl: "https://api.example.com"
headers:
"Content-Type": "application/json"
"X-Timestamp": |
#!/usr/bin/env deno
const timestamp = Math.floor(Date.now() / 1000).toString();
Deno.stdout.write(new TextEncoder().encode(timestamp));
"X-Nonce": |
#!/usr/bin/env deno
const nonce = Math.random().toString(36).substr(2, 16);
Deno.stdout.write(new TextEncoder().encode(nonce));
"X-Signature": |
#!/usr/bin/env deno
import { encodeHex } from "jsr:@std/encoding/hex";
const timestamp = Deno.env.get("X_Timestamp") || "";
const nonce = Deno.env.get("X_Nonce") || "";
const secret = Deno.env.get("API_SECRET") || "";
const data = timestamp + nonce + secret;
const hashBuffer = await crypto.subtle.digest("SHA-256", new TextEncoder().encode(data));
const signature = encodeHex(hashBuffer);
Deno.stdout.write(new TextEncoder().encode(signature));
# Tencent Cloud API example
x-request-config:
auth:
TencentCloudAuth:
secretId: "{TENCENT_SECRET_ID}"
secretKey: "{TENCENT_SECRET_KEY}"
service: "cvm"
region: "ap-beijing"
version: "2017-03-12"
6. Operation-Specific Extensions
Add operation-specific configurations directly in your OpenAPI spec:
paths:
/users/{id}:
get:
operationId: getUser
x-examples:
- "Get user with ID 123"
- "Retrieve user profile information"
x-sensitive-response-fields: ["email", "phone"]
x-custom-base-url: "https://users-api.example.com"
parameters:
- name: id
in: path
required: true
schema:
type: string
x-examples: ["123", "user-abc", "test-user"]
7. Debug Mode
oapi-invoker-mcp includes a comprehensive debug mode that provides detailed
information about the request/response process, making it easier to develop and
troubleshoot API integrations.
Enabling Debug Mode
Set the environment variable OAPI_INVOKER_DEBUG=1 to enable debug mode:
export OAPI_INVOKER_DEBUG=1
Or when configuring your MCP server:
{
"mcpServers": {
"capi-invoker": {
"command": "deno",
"args": ["run", "--allow-all", "jsr:@mcpc/oapi-invoker-mcp/bin"],
"env": {
"OAPI_INVOKER_DEBUG": "1"
},
"transportType": "stdio"
}
}
}
Debug Information
When debug mode is enabled, API responses include a _debug field with detailed
information about:
- Tool Information: Method, path, operation ID
- Request Details: Final URL, headers, body, timeout settings
- Response Details: Status, headers, content type
- Processing Info: Parameters, authentication, proxy usage
Example Debug Output
{
"result": "success",
"data": [1, 2, 3],
"_debug": {
"tool": {
"name": "getUserList",
"method": "get",
"path": "/api/users",
"operationId": "listUsers"
},
"request": {
"url": "https://api.example.com/api/users?limit=10",
"finalHeaders": {
"authorization": "Bearer ***SENSITIVE***",
"content-type": "application/json"
},
"timeout": 30000,
"retries": 0
},
"response": {
"status": 200,
"statusText": "OK",
"contentType": "application/json"
},
"processing": {
"pathParams": {},
"inputParams": { "limit": 10 },
"sensitiveParams": {},
"usedProxy": false,
"usedTencentCloudAuth": false,
"pathRemapped": false
}
}
}
Use Cases for Debug Mode
Debug mode is particularly useful for:
- 🔧 API Development: Understanding parameter processing and transformation
- 🔐 Authentication Debugging: Verifying special auth mechanisms (e.g., Tencent Cloud)
- 🌐 Proxy Configuration: Checking proxy settings usage
- 📋 Header Analysis: Examining final request/response headers
- 🔄 Path Remapping: Validating custom path-to-header remapping
- ⚡ Performance Analysis: Reviewing timeout and retry configurations
- 🐛 Troubleshooting: Diagnosing API call issues
Security Note: Sensitive parameters are automatically masked with
***SENSITIVE***in debug output. Debug mode should typically only be enabled in development environments.
Real-World Use Cases
🐙 GitHub API Integration
# github-extensions.yaml
x-request-config:
baseUrl: "https://api.github.com"
headers:
"Authorization": "Bearer {GITHUB_TOKEN}"
"Accept": "application/vnd.github+json"
"X-GitHub-Api-Version": "2022-11-28"
x-filter-rules:
- pathPattern: "^/repos/.*"
methodPattern: "^(get|post|patch)$"
exclude: false
- pathPattern: "/admin/.*"
exclude: true
x-tool-name-format: "github-{operationId}"
☁️ Tencent Cloud API Integration
# tencent-cloud-extensions.yaml
x-request-config:
baseUrl: "https://cvm.tencentcloudapi.com"
auth:
TencentCloudAuth:
secretId: "{TENCENT_SECRET_ID}"
secretKey: "{TENCENT_SECRET_KEY}"
service: "cvm"
region: "ap-beijing"
version: "2017-03-12"
x-response-config:
sensitiveResponseFields: ["SecretId", "SecretKey", "Token"]
x-tool-name-prefix: "tencent-"
🔐 Custom Authentication API
# custom-auth-extensions.yaml
x-request-config:
baseUrl: "https://secure-api.example.com"
headers:
"Content-Type": "application/json"
"X-API-Key": "{API_KEY}"
"X-Timestamp": |
#!/usr/bin/env deno
Deno.stdout.write(new TextEncoder().encode(Date.now().toString()));
"X-Signature": |
#!/usr/bin/env deno
import { encodeHex } from "jsr:@std/encoding/hex";
const timestamp = Deno.env.get("X_Timestamp") || "";
const apiKey = Deno.env.get("API_KEY") || "";
const message = `${timestamp}${apiKey}`;
const hash = await crypto.subtle.digest("SHA-256", new TextEncoder().encode(message));
Deno.stdout.write(new TextEncoder().encode(encodeHex(hash)));
x-sensitive-params:
"X-Signature": "***REDACTED***"
"X-API-Key": "***REDACTED***"
🌐 Multi-Environment Configuration
# production-extensions.yaml
x-request-config:
baseUrl: "{BASE_URL}" # https://api.prod.example.com
timeout: 30000
retries: 3
headers:
"Authorization": "Bearer {PROD_API_TOKEN}"
"Environment": "production"
x-filter-rules:
- tags: ["public", "v1"]
exclude: false
- tags: ["internal", "deprecated"]
exclude: true
x-response-config:
maxLength: 50000
excludeResponseKeys: ["data.**.update_time", "trace"]
Environment Variables Reference
| Variable | Description | Example |
|---|---|---|
SPEC_URL | URL to OpenAPI specification | https://api.example.com/openapi.json |
SPEC_PATH | Local path to OpenAPI specification | /path/to/openapi.yaml |
SPEC_FORMAT | Format of the specification | json or yaml |
SPEC_EXTENSION_URL | URL to extensions file | https://example.com/extensions.yaml |
SPEC_EXTENSION_PATH | Local path to extensions file | /path/to/extensions.yaml |
SPEC_EXTENSION_FORMAT | Format of extensions file | json or yaml |
OAPI_INVOKER_DEBUG | Enable debug mode | 1 or true |
Contributing
We welcome contributions! Please feel free to submit issues, feature requests, or pull requests.
License
This project is licensed under the MIT License - see the LICENSE file for details.
Related Servers
Steadybit
Interact with the Steadybit platform to run chaos engineering experiments.
Remote MCP Server (Authless)
A remote MCP server deployable on Cloudflare Workers without authentication.
JSONPlaceholder
A free public REST API for testing and prototyping, powered by JSONPlaceholder.
Starwind UI
Provides tools to help developers work with Starwind UI components.
Maton Agent Toolkit
A toolkit to integrate agent frameworks like MCP with Maton APIs through function calling.
Argo CD
Interact with Argo CD applications through natural language.
WordPress MCP
A Python MCP server for interacting with a local WordPress instance.
ImageJ / Fiji
An MCP server for ImageJ/Fiji, implemented as a Python wrapper for Fiji functions.
ABAP Development Tools (ADT)
An MCP server for interacting with SAP systems using ABAP Development Tools (ADT).
Wordware
Run your Wordware apps locally with an interactive setup.