API Usage Guide¶
This guide provides comprehensive examples for using the MCP Gateway REST API via curl to perform common operations like managing gateways (MCP servers), tools, resources, prompts, and more.
Prerequisites¶
Before using the API, you need to:
-
Start the MCP Gateway server:
-
Generate a JWT authentication token:
# Generate token (replace secret with your JWT_SECRET_KEY from .env) export TOKEN=$(python3 -m mcpgateway.utils.create_jwt_token \ --username admin@example.com \ --exp 10080 \ --secret my-test-key 2>/dev/null | head -1) # Verify token was generated echo "Token: ${TOKEN:0:50}..."Token Expiration
The
--expparameter sets token expiration in minutes. Use--exp 0for no expiration (development only). -
Set the base URL:
Authentication¶
All API requests require JWT Bearer token authentication:
Health & Status¶
Check Server Health¶
Expected output:
Check Readiness¶
Get Version Information¶
# Get server version and build info
curl -s -H "Authorization: Bearer $TOKEN" $BASE_URL/version | jq '.'
Gateway Management¶
Gateways represent upstream MCP servers or peer gateways that provide tools, resources, and prompts.
List All Gateways¶
# List all registered gateways
curl -s -H "Authorization: Bearer $TOKEN" $BASE_URL/gateways | jq '.'
Get Gateway Details¶
# Get specific gateway by ID
export GATEWAY_ID="your-gateway-id"
curl -s -H "Authorization: Bearer $TOKEN" $BASE_URL/gateways/$GATEWAY_ID | jq '.'
Register a New Gateway¶
# Register an MCP server gateway
curl -s -X POST -H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{
"name": "my-mcp-server",
"url": "http://localhost:9000/mcp",
"description": "My custom MCP server",
"transport": "STREAMABLEHTTP"
}' \
$BASE_URL/gateways | jq '.'
Request Types
Supported request_type values:
STREAMABLEHTTP: HTTP/SSE-based MCP serverSSE: Server-Sent Events transportSTDIO: Standard I/O (for local processes)WEBSOCKET: WebSocket transport
Complete Example: Registering a Gateway¶
# 1. Start an MCP server on port 9000 (in another terminal)
python3 -m mcpgateway.translate --stdio "uvx mcp-server-git" --port 9000
# 2. Register the gateway
GATEWAY_RESPONSE=$(curl -s -X POST -H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{
"name": "git-server",
"url": "http://localhost:9000/mcp",
"description": "Git operations MCP server",
"transport": "STREAMABLEHTTP"
}' \
$BASE_URL/gateways)
# 3. Extract the gateway ID
export GATEWAY_ID=$(echo $GATEWAY_RESPONSE | jq -r '.id')
echo "Gateway ID: $GATEWAY_ID"
Update Gateway¶
# Update gateway properties
curl -s -X PUT -H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{
"name": "updated-server-name",
"description": "Updated description",
"enabled": true
}' \
$BASE_URL/gateways/$GATEWAY_ID | jq '.'
Enable/Disable Gateway¶
# Toggle gateway enabled status
curl -s -X POST -H "Authorization: Bearer $TOKEN" \
$BASE_URL/gateways/$GATEWAY_ID/toggle?activate=false | jq '.'
Delete Gateway¶
# Delete a gateway (warning: also deletes associated tools)
curl -s -X DELETE -H "Authorization: Bearer $TOKEN" \
$BASE_URL/gateways/$GATEWAY_ID | jq '.'
Tool Management¶
Tools are executable operations exposed by MCP servers through the gateway.
List All Tools¶
# List all available tools
curl -s -H "Authorization: Bearer $TOKEN" $BASE_URL/tools | jq '.'
# List tools with pretty formatting
curl -s -H "Authorization: Bearer $TOKEN" $BASE_URL/tools | \
jq '.[] | {name: .name, description: .description, gateway: .gatewaySlug}'
Get Tool Details¶
# Get specific tool by ID
export TOOL_ID="your-tool-id"
curl -s -H "Authorization: Bearer $TOKEN" $BASE_URL/tools/$TOOL_ID | jq '.'
# View tool's input schema
curl -s -H "Authorization: Bearer $TOKEN" $BASE_URL/tools/$TOOL_ID | jq '.inputSchema'
# View tool's output schema
curl -s -H "Authorization: Bearer $TOKEN" $BASE_URL/tools/$TOOL_ID | jq '.outputSchema'
Register a Custom Tool¶
# Register a tool manually (for REST APIs, custom integrations)
curl -s -X POST -H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{
"tool": {
"name": "weather-api",
"description": "Get weather information for a city",
"url": "https://api.weather.com/v1/current",
"integration_type": "REST",
"request_type": "POST",
"input_schema": {
"type": "object",
"properties": {
"city": {
"type": "string",
"description": "City name"
}
},
"required": [
"city"
]
}
}
}' \
$BASE_URL/tools | jq '.'
Invoke a Tool¶
export TOOL_NAME="your-tool-name"
# Execute a tool with arguments
jq -n --arg name "$TOOL_NAME" --argjson args '{"param1":"value1","param2":"value2"}' \
'{"jsonrpc":"2.0","id":1,"method":"tools/call","params":{"name":$name,"arguments":$args}}' |
curl -s -X POST -H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d @- "$BASE_URL/rpc" | jq '.result.content[0].text'
Complete Example: Tool Invocation¶
# 1. List tools and find one to test
TOOLS=$(curl -s -H "Authorization: Bearer $TOKEN" $BASE_URL/tools)
export TOOL_ID=$(echo $TOOLS | jq -r '.[0].id')
export TOOL_NAME=$(echo $TOOLS | jq -r '.[0].name')
echo "Testing tool: $TOOL_NAME (ID: $TOOL_ID)"
# 2. View the tool's input schema
echo "Input schema:"
curl -s -H "Authorization: Bearer $TOKEN" $BASE_URL/tools/$TOOL_ID | jq '.inputSchema'
# 3. Invoke the tool
jq -n --arg name "$TOOL_NAME" --argjson args '{"param1":"test_value"}' \
'{"jsonrpc":"2.0","id":1,"method":"tools/call","params":{"name":$name,"arguments":$args}}' |
curl -s -X POST -H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d @- "$BASE_URL/rpc" | jq '.result.content[0].text'
Update Tool¶
# Update tool properties
curl -s -X PUT -H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{
"description": "Updated tool description",
"enabled": true
}' \
$BASE_URL/tools/$TOOL_ID | jq '.'
Enable/Disable Tool¶
# Toggle tool enabled status
curl -s -X POST -H "Authorization: Bearer $TOKEN" \
$BASE_URL/tools/$TOOL_ID/toggle?activate=false | jq '.'
Delete Tool¶
# Delete a tool
curl -s -X DELETE -H "Authorization: Bearer $TOKEN" \
$BASE_URL/tools/$TOOL_ID | jq '.'
Virtual Server Management¶
Virtual servers allow you to compose multiple MCP servers and tools into unified service endpoints.
List All Servers¶
Create Virtual Server¶
# Create a new virtual server
curl -s -X POST -H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{
"server": {
"name": "my-virtual-server",
"description": "Composed server with multiple tools",
"associated_tools": ["'$TOOL_ID'"]
}
}' \
$BASE_URL/servers | jq '.'
Get Server Details¶
# Get specific server
export SERVER_ID="your-server-id"
curl -s -H "Authorization: Bearer $TOKEN" $BASE_URL/servers/$SERVER_ID | jq '.'
Complete Example: Virtual Server Creation¶
# 1. Get tools IDs to associate
TOOLS=$(curl -s -H "Authorization: Bearer $TOKEN" $BASE_URL/tools)
export TOOL1_ID=$(echo $TOOLS | jq -r '.[0].id')
export TOOL2_ID=$(echo $TOOLS | jq -r '.[1].id')
# 2. Create virtual server with multiple gateways
SERVER_RESPONSE=$(curl -s -X POST -H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{
"server": {
"name": "my-virtual-server",
"description": "Composed server with multiple tools",
"associated_tools": ["'$TOOL1_ID'", "'$TOOL2_ID'"]
}
}' \
$BASE_URL/servers)
export SERVER_ID=$(echo $SERVER_RESPONSE | jq -r '.id')
echo "Server ID: $SERVER_ID"
List Server Tools¶
# Get all tools available through a server
curl -s -H "Authorization: Bearer $TOKEN" \
$BASE_URL/servers/$SERVER_ID/tools | jq '.'
List Server Resources¶
# Get all resources available through a server
curl -s -H "Authorization: Bearer $TOKEN" \
$BASE_URL/servers/$SERVER_ID/resources | jq '.'
List Server Prompts¶
# Get all prompts available through a server
curl -s -H "Authorization: Bearer $TOKEN" \
$BASE_URL/servers/$SERVER_ID/prompts | jq '.'
Connect to Server via SSE¶
# Connect to server using Server-Sent Events
curl -N -H "Authorization: Bearer $TOKEN" \
$BASE_URL/servers/$SERVER_ID/sse
Update Server¶
# Update virtual server
curl -s -X PUT -H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{
"name": "updated-server",
"description": "Updated description",
"enabled": true
}' \
$BASE_URL/servers/$SERVER_ID | jq '.'
Enable/Disable Server¶
# Toggle server enabled status
curl -s -X POST -H "Authorization: Bearer $TOKEN" \
$BASE_URL/servers/$SERVER_ID/toggle?activate=false | jq '.'
Delete Server¶
# Delete virtual server
curl -s -X DELETE -H "Authorization: Bearer $TOKEN" \
$BASE_URL/servers/$SERVER_ID | jq '.'
Resource Management¶
Resources are data sources (files, documents, database queries) exposed by MCP servers.
List All Resources¶
# List all available resources
curl -s -H "Authorization: Bearer $TOKEN" $BASE_URL/resources | jq '.'
Register a Resource¶
# Register a new resource
curl -s -X POST -H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '
{"resource":
{
"name": "config-file",
"uri": "file:///etc/config.json",
"description": "Application configuration file",
"mime_type": "application/json",
"content": "{'key': 'value'}"
}
}' \
$BASE_URL/resources | jq '.'
Get Resource Details¶
# Get specific resource
export RESOURCE_ID="your-resource-id"
curl -s -H "Authorization: Bearer $TOKEN" $BASE_URL/resources/$RESOURCE_ID | jq '.'
Read Resource Content¶
# Get resource content
curl -s -H "Authorization: Bearer $TOKEN" \
$BASE_URL/resources/$RESOURCE_ID | jq '.text'
Subscribe to Resource Updates¶
# Subscribe to resource change notifications
curl -s -X POST -H "Authorization: Bearer $TOKEN" \
$BASE_URL/resources/subscribe/$RESOURCE_ID | jq '.'
List Resource Templates¶
# Get available resource templates
curl -s -H "Authorization: Bearer $TOKEN" \
$BASE_URL/resources/templates/list | jq '.'
Update Resource¶
# Update resource metadata
curl -s -X PUT -H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{
"description": "Updated description",
"mime_type": "text/plain"
}' \
$BASE_URL/resources/$RESOURCE_ID | jq '.'
Enable/Disable Resource¶
# Toggle resource enabled status
curl -s -X POST -H "Authorization: Bearer $TOKEN" \
$BASE_URL/resources/$RESOURCE_ID/toggle?activate=false | jq '.'
Delete Resource¶
# Delete resource
curl -s -X DELETE -H "Authorization: Bearer $TOKEN" \
$BASE_URL/resources/$RESOURCE_ID | jq '.'
Prompt Management¶
Prompts are reusable templates with arguments for AI interactions.
List All Prompts¶
Register a Prompt¶
# Register a new prompt template
curl -s -X POST -H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{"prompt": {
"name": "code-review",
"description": "Review code for best practices",
"template": "Review the following code and suggest improvements:\n\n{{code}}",
"arguments": [
{
"name": "code",
"description": "Code to review",
"required": true
}
]
}
}' \
$BASE_URL/prompts | jq '.'
Get Prompt Details¶
# Get specific prompt
export PROMPT_ID="your-prompt-id"
curl -s -H "Authorization: Bearer $TOKEN" $BASE_URL/prompts/$PROMPT_ID | jq '.'
Execute Prompt (Get Rendered Content)¶
# Execute prompt with arguments
curl -s -X POST -H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{
"code": "def hello():\n print(\"Hello\")"
}' \
$BASE_URL/prompts/$PROMPT_ID | jq '.'
Update Prompt¶
# Update prompt template
curl -s -X PUT -H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{
"description": "Updated prompt description",
"content": "New template: {{variable}}"
}' \
$BASE_URL/prompts/$PROMPT_ID | jq '.'
Enable/Disable Prompt¶
# Toggle prompt enabled status
curl -s -X POST -H "Authorization: Bearer $TOKEN" \
$BASE_URL/prompts/$PROMPT_ID/toggle?activate=false | jq '.'
Delete Prompt¶
# Delete prompt
curl -s -X DELETE -H "Authorization: Bearer $TOKEN" \
$BASE_URL/prompts/$PROMPT_ID | jq '.'
Tag Management¶
Tags organize and categorize gateway resources.
List All Tags¶
# List all available tags
curl -s -H "Authorization: Bearer $TOKEN" \
"$BASE_URL/tags?entity_types=gateways%2Cservers%2Ctools%2Cresources%2Cprompts&include_entities=false" \
| jq '.'
Get Tag Entities¶
# Get specific tag
export TAG_NAME="your-tag-name"
curl -s -H "Authorization: Bearer $TOKEN" \
"$BASE_URL/tags/$TAG_NAME/entities" \
| jq '.'
Bulk Operations¶
Export Configuration¶
# Export all gateway configuration
curl -s -H "Authorization: Bearer $TOKEN" \
$BASE_URL/export | jq '.' > gateway-export.json
# Export specific entities
curl -s -H "Authorization: Bearer $TOKEN" \
"$BASE_URL/export?types=tools%2Cgateways" | \
jq '.' > partial-export.json
Import Configuration¶
# Import configuration from file
payload=$(jq -n \
--arg conflict "skip" \
--argjson dry_run false \
--argjson import_data "$(cat gateway-export.json)" '
{
conflict_strategy: $conflict,
dry_run: $dry_run,
import_data: $import_data
}')
curl -s -X POST \
-H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d "$payload" \
"$BASE_URL/import" | jq '.'
Bulk Import Tools¶
# Import multiple tools at once
curl -s -X POST -H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{
"conflict_strategy": "update",
"dry_run": false,
"import_data": {
"version": "2025-03-26",
"exported_at": "2025-10-24T18:41:55.776238Z",
"exported_by": "admin@example.com",
"source_gateway": "http://0.0.0.0:4444",
"encryption_method": "AES-256-GCM",
"entities": {
"tools": [
{
"name": "tool1",
"displayName": "tool1",
"url": "http://example.com/api1",
"integration_type": "REST",
"request_type": "POST",
"description": "First tool",
"headers": {},
"input_schema": {
"type": "object",
"properties": {
"param": { "type": "string", "description": "Parameter name" }
},
"required": ["param"]
}
},
{
"name": "tool2",
"displayName": "tool2",
"url": "http://example.com/api2",
"integration_type": "REST",
"request_type": "GET",
"description": "Second tool",
"headers": {},
"input_schema": {
"type": "object",
"properties": {
"query": { "type": "string", "description": "Query string" }
},
"required": ["query"]
}
}
]
}
},
"rekey_secret": null
}' \
"$BASE_URL/import" | jq '.'
A2A Agent Management¶
A2A (Agent-to-Agent) enables integration with external AI agents.
A2A Feature Flag
A2A features must be enabled via MCPGATEWAY_A2A_ENABLED=true in your .env file.
List All A2A Agents¶
Register A2A Agent¶
# Register an OpenAI agent
curl -s -X POST -H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{"agent": {
"name": "openai-assistant",
"agent_type": "openai",
"endpoint_url": "https://api.openai.com/v1/chat/completions",
"description": "OpenAI GPT-4 assistant",
"auth_type": "bearer",
"auth_value": "OPENAI_API_KEY"
}
}' \
$BASE_URL/a2a | jq '.'
Get A2A Agent Details¶
# Get specific agent
export A2A_ID="your-agent-id"
curl -s -H "Authorization: Bearer $TOKEN" $BASE_URL/a2a/$A2A_ID | jq '.'
Invoke A2A Agent¶
# Execute agent with message
export A2A_NAME="openai-assistant"
curl -s -X POST -H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{
"message": "Explain quantum computing in simple terms"
}' \
$BASE_URL/a2a/$A2A_NAME/invoke | jq '.'
Update A2A Agent¶
# Update agent configuration
curl -s -X PUT -H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{
"model": "gpt-4-turbo",
"description": "Updated to use GPT-4 Turbo"
}' \
$BASE_URL/a2a/$A2A_ID | jq '.'
Delete A2A Agent¶
# Delete A2A agent
curl -s -X DELETE -H "Authorization: Bearer $TOKEN" \
$BASE_URL/a2a/$A2A_ID | jq '.'
OpenAPI Specification¶
Get OpenAPI Schema¶
# Get full OpenAPI specification
curl -s -H "Authorization: Bearer $TOKEN" \
$BASE_URL/openapi.json | jq '.'
# Save OpenAPI spec to file
curl -s -H "Authorization: Bearer $TOKEN" \
$BASE_URL/openapi.json > openapi.json
Interactive API Documentation¶
Access interactive Swagger UI documentation:
Access ReDoc documentation:
End-to-End Workflow Example¶
This complete example demonstrates a typical workflow: registering a gateway, discovering tools, and invoking them.
#!/bin/bash
# Configuration
export BASE_URL="http://localhost:8000"
export TOKEN=$(python3 -m mcpgateway.utils.create_jwt_token \
--username admin@example.com \
--exp 10080 \
--secret my-test-key 2>/dev/null | head -1)
echo "=== MCP Gateway E2E Test ==="
echo
# 1. Check health
echo "1. Checking gateway health..."
curl -s $BASE_URL/health | jq '.'
echo
# 2. Register a new gateway
echo "2. Registering MCP server gateway..."
GATEWAY=$(curl -s -X POST -H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{
"name": "test-server",
"url": "http://localhost:9000/mcp",
"description": "Test MCP server",
"transport": "STREAMABLEHTTP"
}' \
$BASE_URL/gateways)
export GATEWAY_ID=$(echo $GATEWAY | jq -r '.id')
echo "Gateway ID: $GATEWAY_ID"
echo
# 3. List all gateways
echo "3. Listing all gateways..."
curl -s -H "Authorization: Bearer $TOKEN" $BASE_URL/gateways | \
jq '.[] | {id: .id, name: .name, enabled: .enabled}'
echo
# 4. Discover tools from the gateway
echo "4. Discovering tools..."
sleep 2 # Wait for gateway to sync
TOOLS=$(curl -s -H "Authorization: Bearer $TOKEN" $BASE_URL/tools)
export TOOL_ID=$(echo $TOOLS | jq -r '.[0].id')
export TOOL_NAME=$(echo $TOOLS | jq -r '.[0].name')
echo "Found tools:"
echo $TOOLS | jq '.[] | {name: .name, description: .description}' | head -20
echo
# 5. Get tool details
echo "5. Getting tool details for: $TOOL_ID"
TOOL_DETAILS=$(curl -s -H "Authorization: Bearer $TOKEN" \
$BASE_URL/tools/$TOOL_ID)
echo $TOOL_DETAILS | jq '{name: .name, description: .description, inputSchema: .inputSchema}'
echo
# 6. Invoke the tool
echo "6. Invoking tool: $TOOL_NAME"
RESULT=$(jq -n --arg name "$TOOL_NAME" --argjson args '{"param1":"test_value"}' \
'{"jsonrpc":"2.0","id":1,"method":"tools/call","params":{"name":$name,"arguments":$args}}' |
curl -s -X POST -H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d @- "$BASE_URL/rpc")
echo $RESULT | jq '.'
echo
# 7. Create a virtual server
echo "7. Creating virtual server..."
SERVER=$(curl -s -X POST -H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{
"server": {
"name": "test-virtual-server",
"description": "Unified server for testing",
"associated_tools": ["'$TOOL_ID'"]
}
}' \
$BASE_URL/servers)
export SERVER_ID=$(echo $SERVER | jq -r '.id')
echo "Server ID: $SERVER_ID"
echo
# 8. List server tools
echo "8. Listing tools available through virtual server..."
curl -s -H "Authorization: Bearer $TOKEN" \
$BASE_URL/servers/$SERVER_ID/tools | \
jq '.[] | {name: .name}' | head -10
echo
# 9. Export configuration
echo "9. Exporting gateway configuration..."
curl -s -H "Authorization: Bearer $TOKEN" $BASE_URL/export | \
jq '{gateways: .entities.gateways | length, tools: .entities.tools | length}' > export-summary.json
cat export-summary.json
echo
echo "=== E2E Test Complete ==="
Error Handling¶
Common Error Responses¶
401 Unauthorized¶
Solution: Ensure you're sending the Authorization: Bearer $TOKEN header.
404 Not Found¶
Solution: Verify the resource ID exists using the list endpoint.
422 Validation Error¶
{
"detail": [
{
"loc": ["body", "name"],
"msg": "field required",
"type": "value_error.missing"
}
]
}
Solution: Check request payload matches the required schema.
Debug Mode¶
Enable verbose output for troubleshooting:
# Show full request/response including headers
curl -v -H "Authorization: Bearer $TOKEN" $BASE_URL/tools
# Save full response with headers
curl -i -H "Authorization: Bearer $TOKEN" $BASE_URL/tools > response.txt
Best Practices¶
-
Token Management
- Store tokens securely, never commit to version control
- Use short expiration times in production
- Rotate tokens regularly
-
Error Handling
- Always check HTTP status codes
- Parse error messages from response body
- Implement retry logic for transient failures
-
Performance
- Use pagination for large result sets
- Cache frequently accessed data
- Leverage HTTP compression (automatically enabled)
-
Security
- Use HTTPS in production (not HTTP)
- Validate SSL certificates
- Never log sensitive tokens or API keys
-
Testing
- Test against development server first
- Use unique names for test resources
- Clean up test data after experiments
Advanced Usage¶
Using jq for Advanced Filtering¶
# Get only enabled tools
curl -s -H "Authorization: Bearer $TOKEN" $BASE_URL/tools | \
jq '[.[] | select(.enabled == true)]'
# Count tools by gateway
curl -s -H "Authorization: Bearer $TOKEN" $BASE_URL/tools | \
jq 'group_by(.gatewaySlug) | map({gateway: .[0].gatewaySlug, count: length})'
# Extract specific fields
curl -s -H "Authorization: Bearer $TOKEN" $BASE_URL/tools | \
jq '[.[] | {id, name, description, enabled}]'
Batch Operations Script¶
#!/bin/bash
# batch-enable-tools.sh - Enable all tools from a specific gateway
export TOKEN="your-token"
export BASE_URL="http://localhost:8000"
export GATEWAY_SLUG="my-gateway"
# Get all tools from the gateway
TOOLS=$(curl -s -H "Authorization: Bearer $TOKEN" $BASE_URL/tools | \
jq -r '.[] | select(.gatewaySlug == "'$GATEWAY_SLUG'") | .id')
# Enable each tool
for TOOL_ID in $TOOLS; do
echo "Enabling tool: $TOOL_ID"
curl -s -X POST -H "Authorization: Bearer $TOKEN" \
$BASE_URL/tools/$TOOL_ID/toggle > /dev/null
done
echo "Done!"
Related Documentation¶
- Configuration Guide - Environment variables and settings
- Bulk Import - Import large datasets
- Export/Import - Backup and migration
- Securing the Gateway - Security best practices
- OAuth Configuration - OAuth 2.0 setup
- SSO Integration - Single Sign-On setup
Support¶
For issues or questions: