Skip to content

An API server that implements the official MCP Registry API, providing standardised access to MCP servers from multiple backends, including file-based and other API-compliant registries.

License

Notifications You must be signed in to change notification settings

stacklok/toolhive-registry-server

ToolHive Studio logo ToolHive wordmark ToolHive mascot

Release Build status Coverage Status License: Apache 2.0 Star on GitHub Discord

ToolHive Registry API Server

A standards-compliant MCP Registry API server for ToolHive

The ToolHive Registry API (thv-registry-api) implements the official Model Context Protocol (MCP) Registry API specification. It provides a standardized REST API for discovering and accessing MCP servers from multiple backend sources.


Features

  • Standards-compliant: Implements the official MCP Registry API specification
  • Multiple data sources: Git repositories, API endpoints, and local files
  • Automatic synchronization: Background sync with configurable intervals and retry logic
  • Container-ready: Designed for deployment in Kubernetes clusters
  • Flexible deployment: Works standalone or as part of ToolHive infrastructure
  • Production-ready: Built-in health checks, graceful shutdown, and sync status persistence

Quick Start

Prerequisites

  • Go 1.23 or later
  • Task for build automation

Building the binary

# Build the binary
task build

Running the Server

All configuration is done via YAML configuration files. See the examples/ directory for sample configurations.

Quick start with Git source:

thv-registry-api serve --config examples/config-git.yaml

With local file:

thv-registry-api serve --config examples/config-file.yaml

With API endpoint:

thv-registry-api serve --config examples/config-api.yaml

The server starts on port 8080 by default. Use --address :PORT to customize.

What happens when the server starts:

  1. Loads configuration from the specified YAML file
  2. Immediately fetches registry data from the configured source
  3. Starts background sync coordinator for automatic updates
  4. Serves MCP Registry API endpoints on the configured address

For detailed configuration options and examples, see the examples/README.md.

Available Commands

The thv-registry-api CLI provides the following commands:

# Start the API server
thv-registry-api serve --config config.yaml [--address :8080]

# Run database migrations
thv-registry-api migrate up --config config.yaml [--yes]
thv-registry-api migrate down --config config.yaml --num-steps N [--yes]

# Display version information
thv-registry-api version [--format json]

# Show help
thv-registry-api --help
thv-registry-api <command> --help

See the Database Migrations section for more details on using migration commands.

API Endpoints

The server implements the standard MCP Registry API:

  • GET /api/v0/servers - List all available MCP servers
  • GET /api/v0/servers/{name} - Get details for a specific server
  • GET /api/v0/deployed - List deployed server instances (Kubernetes only)
  • GET /api/v0/deployed/{name} - Get deployed instances of a specific server

See the MCP Registry API specification for full API details. Note: The current implementation is not strictly compliant with the standard. The deviations will be fixed in the next iterations.

Configuration

All configuration is done via YAML files. The server requires a --config flag pointing to a YAML configuration file.

Configuration File Structure

# Registry name/identifier (optional, defaults to "default")
registryName: my-registry

# Data source configuration (required)
source:
  # Source type: git, api, or file
  type: git

  # Data format: toolhive (native) or upstream (MCP registry format)
  format: toolhive

  # Source-specific configuration
  git:
    repository: https://github.com/stacklok/toolhive.git
    branch: main
    path: pkg/registry/data/registry.json

# Automatic sync policy (required)
syncPolicy:
  # Sync interval (e.g., "30m", "1h", "24h")
  interval: "30m"

# Optional: Server filtering
filter:
  names:
    include: ["official/*"]
    exclude: ["*/deprecated"]
  tags:
    include: ["production"]
    exclude: ["experimental"]

# Optional: Database configuration
database:
  host: localhost
  port: 5432
  user: registry
  passwordFile: /secrets/db-password  # Recommended for production
  database: registry
  sslMode: require
  maxOpenConns: 25
  maxIdleConns: 5
  connMaxLifetime: "5m"

Command-line Flags

Flag Description Required Default
--config Path to YAML configuration file Yes -
--address Server listen address No :8080

Data Sources

The server supports three data source types:

  1. Git Repository - Clone and sync from Git repositories

    • Supports branch, tag, or commit pinning
    • Ideal for version-controlled registries
    • Example: config-git.yaml
  2. API Endpoint - Sync from upstream MCP Registry APIs

    • Supports federation and aggregation scenarios
    • Format conversion from upstream to ToolHive format
    • Example: config-api.yaml
  3. Local File - Read from filesystem

    • Ideal for local development and testing
    • Supports mounted volumes in containers
    • Example: config-file.yaml

For complete configuration examples and advanced options, see examples/README.md.

Database Configuration

The server optionally supports PostgreSQL database connectivity for storing registry state and metadata.

Configuration Fields

Field Type Required Default Description
host string Yes - Database server hostname or IP address
port int Yes - Database server port
user string Yes - Database username
passwordFile string No* - Path to file containing the database password
database string Yes - Database name
sslMode string No require SSL mode (disable, require, verify-ca, verify-full)
maxOpenConns int No 25 Maximum number of open connections to the database
maxIdleConns int No 5 Maximum number of idle connections in the pool
connMaxLifetime string No 5m Maximum lifetime of a connection (e.g., "1h", "30m")

* Password configuration is required but has multiple sources (see Password Security below)

Password Security

The server supports secure password management with the following priority order:

  1. Password File (Recommended for production):

    • Set passwordFile to the path of a file containing only the password
    • The file content will have leading/trailing whitespace trimmed
    • Ideal for Kubernetes secrets mounted as files
    • Example:
      database:
        passwordFile: /secrets/db-password
  2. Environment Variable:

    • Set THV_DATABASE_PASSWORD environment variable
    • Used if passwordFile is not specified
    • Example:
      export THV_DATABASE_PASSWORD="your-secure-password"
      thv-registry-api serve --config config.yaml

Security Best Practices:

  • Never commit passwords directly in configuration files
  • Use password files with restricted permissions (e.g., chmod 400)
  • In Kubernetes, mount passwords from Secrets
  • Rotate passwords regularly

Connection Pooling

The server uses connection pooling for efficient database resource management:

  • MaxOpenConns: Limits concurrent database connections to prevent overwhelming the database
  • MaxIdleConns: Maintains idle connections for faster query execution
  • ConnMaxLifetime: Automatically closes and recreates connections to prevent connection leaks

Tune these values based on your workload:

  • High-traffic scenarios: Increase maxOpenConns and maxIdleConns
  • Resource-constrained environments: Decrease pool sizes
  • Long-running services: Set shorter connMaxLifetime (e.g., "1h")

Database Migrations

The server includes built-in database migration commands to manage the database schema.

Running migrations with CLI:

# Apply all pending migrations
thv-registry-api migrate up --config examples/config-database-dev.yaml

# Apply migrations non-interactively (useful for CI/CD)
thv-registry-api migrate up --config config.yaml --yes

# Revert last migration (requires --num-steps for safety)
thv-registry-api migrate down --config config.yaml --num-steps 1

# View migration help
thv-registry-api migrate --help

Running migrations with Task:

# Apply migrations (development)
export THV_DATABASE_PASSWORD="devpassword"
task migrate-up CONFIG=examples/config-database-dev.yaml

# Revert migrations (specify number of steps for safety)
task migrate-down CONFIG=examples/config-database-dev.yaml NUM_STEPS=1

Migration workflow:

  1. Configure database: Create a config file with database settings (see examples/config-database-dev.yaml)
  2. Set password: Either set THV_DATABASE_PASSWORD env var or use passwordFile in config
  3. Run migrations: Use migrate up to apply schema changes
  4. Start server: Run serve command with the same config file

Example: Local development setup

# 1. Start PostgreSQL (example with Docker)
docker run -d --name postgres \
  -e POSTGRES_USER=thv_user \
  -e POSTGRES_PASSWORD=devpassword \
  -e POSTGRES_DB=toolhive_registry \
  -p 5432:5432 \
  postgres:16

# 2. Set password environment variable
export THV_DATABASE_PASSWORD="devpassword"

# 3. Run migrations
task migrate-up CONFIG=examples/config-database-dev.yaml

# 4. Start the server
thv-registry-api serve --config examples/config-database-dev.yaml

Example: Production deployment

# 1. Create password file
echo "your-secure-password" > /run/secrets/db_password
chmod 400 /run/secrets/db_password

# 2. Run migrations (using passwordFile from config)
thv-registry-api migrate up \
  --config examples/config-database-prod.yaml \
  --yes

# 3. Start the server
thv-registry-api serve --config examples/config-database-prod.yaml

Safety features:

  • migrate down requires --num-steps flag to prevent accidental full rollback
  • Interactive confirmation prompts (bypass with --yes flag)
  • Strong warnings displayed for destructive operations
  • Configuration validation before connecting to database

For complete examples, see:

Example Kubernetes Deployment with Database

apiVersion: v1
kind: Secret
metadata:
  name: registry-db-password
type: Opaque
stringData:
  password: your-secure-password
---
apiVersion: v1
kind: ConfigMap
metadata:
  name: registry-api-config
data:
  config.yaml: |
    registryName: my-registry
    source:
      type: git
      format: toolhive
      git:
        repository: https://github.com/stacklok/toolhive.git
        branch: main
        path: pkg/registry/data/registry.json
    syncPolicy:
      interval: "15m"
    database:
      host: postgres.default.svc.cluster.local
      port: 5432
      user: registry
      passwordFile: /secrets/db-password
      database: registry
      sslMode: require
      maxOpenConns: 25
      maxIdleConns: 5
      connMaxLifetime: "5m"
---
# Run migrations as a Kubernetes Job before deploying the server
apiVersion: batch/v1
kind: Job
metadata:
  name: registry-migrate
spec:
  template:
    spec:
      restartPolicy: OnFailure
      containers:
      - name: migrate
        image: ghcr.io/stacklok/toolhive/thv-registry-api:latest
        args:
        - migrate
        - up
        - --config=/etc/registry/config.yaml
        - --yes
        volumeMounts:
        - name: config
          mountPath: /etc/registry
        - name: db-password
          mountPath: /secrets
          readOnly: true
      volumes:
      - name: config
        configMap:
          name: registry-api-config
      - name: db-password
        secret:
          secretName: registry-db-password
          items:
          - key: password
            path: db-password
---
apiVersion: apps/v1
kind: Deployment
metadata:
  name: registry-api
spec:
  template:
    spec:
      containers:
      - name: registry-api
        image: ghcr.io/stacklok/toolhive/thv-registry-api:latest
        args:
        - serve
        - --config=/etc/registry/config.yaml
        volumeMounts:
        - name: config
          mountPath: /etc/registry
        - name: db-password
          mountPath: /secrets
          readOnly: true
      volumes:
      - name: config
        configMap:
          name: registry-api-config
      - name: db-password
        secret:
          secretName: registry-db-password
          items:
          - key: password
            path: db-password

Development

Build Commands

# Build the binary
task build

# Run linting
task lint

# Fix linting issues automatically
task lint-fix

# Run tests
task test

# Generate mocks
task gen

# Build container image
task build-image

# Database migrations
task migrate-up CONFIG=examples/config-database-dev.yaml
task migrate-down CONFIG=examples/config-database-dev.yaml NUM_STEPS=1

Project Structure

cmd/thv-registry-api/
├── api/                 # REST API implementation
│   └── v1/              # API v1 handlers and routes
├── app/                 # CLI commands and application setup
├── internal/service/    # Legacy service layer (being refactored)
│   ├── file_provider.go     # File-based registry provider
│   ├── k8s_provider.go      # Kubernetes provider
│   └── service.go           # Core service implementation
└── main.go              # Application entry point

pkg/
├── config/              # Configuration loading and validation
├── sources/             # Data source handlers
│   ├── git.go               # Git repository source
│   ├── api.go               # API endpoint source
│   ├── file.go              # File system source
│   ├── factory.go           # Source handler factory
│   └── storage_manager.go   # Storage abstraction
├── sync/                # Sync manager and coordination
│   └── manager.go           # Background sync logic
└── status/              # Sync status tracking
    └── persistence.go       # Status file persistence

examples/                # Example configurations

Architecture

The server follows a clean architecture pattern with the following layers:

  1. API Layer (cmd/thv-registry-api/api): HTTP handlers implementing the MCP Registry API
  2. Service Layer (cmd/thv-registry-api/internal/service): Legacy business logic (being refactored)
  3. Configuration Layer (pkg/config): YAML configuration loading and validation
  4. Source Handler Layer (pkg/sources): Pluggable data source implementations
    • GitSourceHandler: Clones Git repositories and extracts registry files
    • APISourceHandler: Fetches from upstream MCP Registry APIs
    • FileSourceHandler: Reads from local filesystem
  5. Sync Manager (pkg/sync): Coordinates automatic registry synchronization
  6. Storage Layer (pkg/sources): Persists registry data to local storage
  7. Status Tracking (pkg/status): Tracks and persists sync status

Testing

The project uses table-driven tests with mocks generated via go.uber.org/mock:

# Generate mocks before testing
task gen

# Run all tests
task test

Deployment

Kubernetes

The Registry API is designed to run as a sidecar container alongside the ToolHive Operator's MCPRegistry controller. Example deployment:

apiVersion: apps/v1
kind: Deployment
metadata:
  name: registry-api
spec:
  template:
    spec:
      containers:
      - name: registry-api
        image: ghcr.io/stacklok/toolhive/thv-registry-api:latest
        args:
        - serve
        - --config=/etc/registry/config.yaml
        ports:
        - containerPort: 8080
        volumeMounts:
        - name: config
          mountPath: /etc/registry
      volumes:
      - name: config
        configMap:
          name: registry-api-config
---
apiVersion: v1
kind: ConfigMap
metadata:
  name: registry-api-config
data:
  config.yaml: |
    registryName: my-registry
    source:
      type: git
      format: toolhive
      git:
        repository: https://github.com/stacklok/toolhive.git
        branch: main
        path: pkg/registry/data/registry.json
    syncPolicy:
      interval: "15m"

Docker

# Build the image
task build-image

# Run with Git source
docker run -v $(pwd)/examples:/config \
  ghcr.io/stacklok/toolhive/thv-registry-api:latest \
  serve --config /config/config-git.yaml

# Run with file source (mount local registry file)
docker run -v $(pwd)/examples:/config \
  -v /path/to/registry.json:/data/registry.json \
  ghcr.io/stacklok/toolhive/thv-registry-api:latest \
  serve --config /config/config-file.yaml

# Run with database password from environment variable
docker run -v $(pwd)/examples:/config \
  -e THV_DATABASE_PASSWORD=your-password \
  ghcr.io/stacklok/toolhive/thv-registry-api:latest \
  serve --config /config/config-database-dev.yaml

Docker Compose

A complete Docker Compose setup is provided in the repository root that includes PostgreSQL, automatic migrations, and the API server.

Quick start:

# Start all services (PostgreSQL + migrations + API)
docker-compose up

# Run in detached mode
docker-compose up -d

# View logs
docker-compose logs -f registry-api

# Stop all services
docker-compose down

# Stop and remove volumes (WARNING: deletes database data)
docker-compose down -v

Architecture:

The docker-compose.yaml includes three services:

  1. postgres - PostgreSQL 18 database server
  2. migrate - One-time migration service (runs schema migrations)
  3. registry-api - Main API server

Service startup flow:

postgres (healthy) → migrate (completes) → registry-api (starts)

Configuration:

  • Config file: examples/config-docker.yaml
  • Sample data: examples/registry-sample.json
  • Database password: Set via THV_DATABASE_PASSWORD environment variable in docker-compose.yaml

The setup demonstrates:

  • Database-backed registry storage
  • Automatic schema migrations on startup
  • File-based data source (for demo purposes)
  • Proper service dependencies and health checks

Accessing the API:

Once running, the API is available at http://localhost:8080

# List all servers
curl http://localhost:8080/api/v0/servers

# Get specific server
curl http://localhost:8080/api/v0/servers/example%2Ffilesystem

Customization:

To use your own registry data:

  1. Edit examples/registry-sample.json with your MCP servers
  2. Or change the source configuration in examples/config-docker.yaml
  3. Restart: docker-compose restart registry-api

Database access:

To connect to the PostgreSQL database directly:

# Using psql
docker exec -it toolhive-registry-postgres psql -U registry -d registry

# Using environment variables from compose
PGPASSWORD=registry_password psql -h localhost -U registry -d registry

Integration with ToolHive

The Registry API server works seamlessly with the ToolHive ecosystem:

  • ToolHive Operator: Automatically deployed as part of MCPRegistry resources

See the ToolHive documentation for more details.

Contributing

We welcome contributions! Please see:

Development Guidelines

  • Run task lint-fix before committing
  • Ensure tests pass with task test
  • Follow Go standard project layout
  • Use mockgen for test mocks, not hand-written mocks
  • See CLAUDE.md for AI assistant guidance

License

This project is licensed under the Apache 2.0 License.


Part of the ToolHive project - Simplify and secure MCP servers

About

An API server that implements the official MCP Registry API, providing standardised access to MCP servers from multiple backends, including file-based and other API-compliant registries.

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Packages

 
 
 

Contributors 14

Languages