--- name: gh-aw-mcp-gateway description: Expert knowledge in GitHub Agentic Workflows MCP Gateway - Model Context Protocol routing, configuration, Docker integration, security, and production deployment patterns license: MIT version: 1.0.0 last_updated: 2026-02-16 tags: [github-agentic-workflows, mcp, model-context-protocol, mcp-gateway, docker, json-rpc, security] --- # 🌐 GitHub Agentic Workflows - MCP Gateway Skill ## πŸ“‹ Purpose Master the **MCP Gateway** for GitHub Agentic Workflows - the foundational infrastructure component that enables AI agents to access Model Context Protocol (MCP) servers safely and efficiently. This skill provides comprehensive expertise in configuring, deploying, and operating the MCP Gateway for production AI automation. ## 🎯 Core Concept ### What Is the MCP Gateway? The **MCP Gateway** is a proxy server that routes Model Context Protocol (MCP) requests from AI agents to backend MCP servers. It provides centralized configuration, Docker container management, and secure access to multiple MCP servers through a unified HTTP API. **Key Principles:** - πŸ”’ **Secure Routing**: Proxies MCP requests with authentication and validation - 🐳 **Docker Integration**: Launches MCP servers as isolated Docker containers - πŸ“‘ **Protocol Translation**: Handles stdio ↔ HTTP transport for MCP servers - πŸ”Œ **Multi-Server**: Routes to multiple backend MCP servers (GitHub, Serena, custom) - πŸ“Š **Observable**: Comprehensive logging and per-server log files - πŸ›‘οΈ **Containerized**: Runs in GitHub Actions with security enforcement **Architecture:** ``` β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚ GitHub Actions Workflow β”‚ β”‚ β”‚ β”‚ β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚ β”‚ β”‚ AI Agent β”‚ β”‚ β”‚ β”‚ - Reads: MCP tools (GitHub, Serena, etc.) β”‚ β”‚ β”‚ β”‚ - Calls: tools/list, tools/call β”‚ β”‚ β”‚ β”‚ - HTTP requests to MCP Gateway β”‚ β”‚ β”‚ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β”‚ β”‚ β”‚ β”‚ β”‚ β–Ό HTTP (JSON-RPC) β”‚ β”‚ β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚ β”‚ β”‚ MCP Gateway (awmg) β”‚ β”‚ β”‚ β”‚ - Routes: /mcp/{serverID} (routed mode) β”‚ β”‚ β”‚ β”‚ - Auth: API key validation (MCP 7.1) β”‚ β”‚ β”‚ β”‚ - Spawns: Docker containers β”‚ β”‚ β”‚ β”‚ - Logs: Per-server + unified logs β”‚ β”‚ β”‚ β””β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β”‚ β”‚ β”‚ stdio β”‚ stdio β”‚ stdio β”‚ β”‚ β–Ό β–Ό β–Ό β”‚ β”‚ β”Œβ”€β”€β”€β”€β”€β” β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚ β”‚ β”‚GitHubβ”‚ β”‚ Serena β”‚ β”‚ Custom MCP β”‚ β”‚ β”‚ β”‚ MCP β”‚ β”‚ MCP β”‚ β”‚ Server β”‚ β”‚ β”‚ β””β”€β”€β”€β”€β”€β”˜ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β”‚ β”‚ (Container) (Container) (Container) β”‚ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ ``` #### πŸ—οΈ MCP Gateway Core A gateway for Model Context Protocol (MCP) servers. This gateway is used with [GitHub Agentic Workflows](https://github.com/github/gh-aw) via the `sandbox.mcp` configuration to provide MCP server access to AI agents running in sandboxed environments. πŸ“– **[Full Configuration Specification](https://github.com/github/gh-aw/blob/main/docs/src/content/docs/reference/mcp-gateway.md)** - Complete reference for all configuration options and validation rules. #### Features - **Configuration Modes**: Supports both TOML files and JSON stdin configuration - **Spec-Compliant Validation**: Fail-fast validation with detailed error messages - **Variable Expansion**: Environment variable substitution with `${VAR_NAME}` syntax - **Type Normalization**: Automatic conversion of legacy `"local"` type to `"stdio"` - **Schema Normalization**: Automatic fixing of malformed JSON schemas from backend MCP servers - Adds missing `properties` field to object schemas - Prevents downstream validation errors - Transparent to both backends and clients - **Routing Modes**: - **Routed**: Each backend server accessible at `/mcp/{serverID}` - **Unified**: Single endpoint `/mcp` that routes to configured servers - **Docker Support**: Launch backend MCP servers as Docker containers - **Stdio Transport**: JSON-RPC 2.0 over stdin/stdout for MCP communication - **Container Detection**: Automatic detection of containerized environments with security warnings - **Enhanced Debugging**: Detailed error context and troubleshooting suggestions for command failures - **Per-ServerID Logs**: Separate log files for each backend MCP server (`{serverID}.log`) for easier troubleshooting #### Getting Started For detailed setup instructions, building from source, and local development, see [CONTRIBUTING.md](CONTRIBUTING.md). #### Quick Start with Docker 1. **Pull the Docker image** (when available): ```bash docker pull ghcr.io/github/gh-aw-mcpg:latest ``` 2. **Create a configuration file** (`config.json`): ```json { "mcpServers": { "github": { "type": "stdio", "container": "ghcr.io/github/github-mcp-server:latest", "env": { "GITHUB_PERSONAL_ACCESS_TOKEN": "" } } } } ``` 3. **Run the container**: ```bash docker run --rm -i \ -e MCP_GATEWAY_PORT=8000 \ -e MCP_GATEWAY_DOMAIN=localhost \ -e MCP_GATEWAY_API_KEY=your-secret-key \ -v /var/run/docker.sock:/var/run/docker.sock \ -v /path/to/logs:/tmp/gh-aw/mcp-logs \ -p 8000:8000 \ ghcr.io/github/gh-aw-mcpg:latest < config.json ``` **Required flags:** - `-i`: Enables stdin for passing JSON configuration - `-e MCP_GATEWAY_*`: Required environment variables - `-v /var/run/docker.sock`: Required for spawning backend MCP servers - `-v /path/to/logs:/tmp/gh-aw/mcp-logs`: Mount for persistent gateway logs (or use `-e MCP_GATEWAY_LOG_DIR=/custom/path` with matching volume mount) - `mcp-gateway.log`: Unified log with all messages - `{serverID}.log`: Per-server logs for easier troubleshooting - `gateway.md`: Markdown-formatted logs for GitHub workflow previews - `rpc-messages.jsonl`: Machine-readable RPC message logs - `tools.json`: Available tools from all backend MCP servers - `-p 8000:8000`: Port mapping must match `MCP_GATEWAY_PORT` MCPG will start in routed mode on `http://0.0.0.0:8000` (using `MCP_GATEWAY_PORT`), proxying MCP requests to your configured backend servers. #### Configuration MCP Gateway supports two configuration formats: 1. **TOML format** - Use with `--config` flag for file-based configuration 2. **JSON stdin format** - Use with `--config-stdin` flag for dynamic configuration #### TOML Format (`config.toml`) TOML configuration uses `command` and `args` fields directly for maximum flexibility: ```toml [servers] [servers.github] command = "docker" args = ["run", "--rm", "-e", "GITHUB_PERSONAL_ACCESS_TOKEN", "-i", "ghcr.io/github/github-mcp-server:latest"] [servers.filesystem] command = "node" args = ["/path/to/filesystem-server.js"] ``` **Note**: In TOML format, you specify the `command` and `args` directly. This allows you to use any command (docker, node, python, etc.). #### JSON Stdin Format For the complete JSON configuration specification with all validation rules, see the **[MCP Gateway Configuration Reference](https://github.com/github/gh-aw/blob/main/docs/src/content/docs/reference/mcp-gateway.md)**. ```json { "mcpServers": { "github": { "type": "stdio", "container": "ghcr.io/github/github-mcp-server:latest", "entrypoint": "/custom/entrypoint.sh", "entrypointArgs": ["--verbose"], "mounts": [ "/host/config:/app/config:ro", "/host/data:/app/data:rw" ], "env": { "GITHUB_PERSONAL_ACCESS_TOKEN": "", "EXPANDED_VAR": "${MY_HOME}/config" } } }, "gateway": { "port": 8080, "apiKey": "your-api-key", "domain": "localhost", "startupTimeout": 30, "toolTimeout": 60, "payloadDir": "/tmp/jq-payloads" } } ``` #### Server Configuration Fields - **`type`** (optional): Server transport type - `"stdio"` - Standard input/output transport (default) - `"http"` - HTTP transport (fully supported) - `"local"` - Alias for `"stdio"` (backward compatibility) - **`container`** (required for stdio in JSON format): Docker container image (e.g., `"ghcr.io/github/github-mcp-server:latest"`) - Automatically wraps as `docker run --rm -i ` - **Note**: The `command` field is NOT supported in JSON stdin format (stdio servers must use `container` instead) - **TOML format uses `command` and `args` fields directly** - **`entrypoint`** (optional): Custom entrypoint for the container - Overrides the default container entrypoint - Applied as `--entrypoint` flag to Docker - **`entrypointArgs`** (optional): Arguments passed to container entrypoint - Array of strings passed after the container image - **`mounts`** (optional): Volume mounts for the container - Array of strings in format `"source:dest:mode"` - `source` - Host path to mount (can use environment variables with `${VAR}` syntax) - `dest` - Container path where the volume is mounted - `mode` - Either `"ro"` (read-only) or `"rw"` (read-write) - Example: `["/host/config:/app/config:ro", "/host/data:/app/data:rw"]` - **`env`** (optional): Environment variables - Set to `""` (empty string) for passthrough from host environment - Set to `"value"` for explicit value - Use `"${VAR_NAME}"` for environment variable expansion (fails if undefined) - **`url`** (required for http): HTTP endpoint URL for `type: "http"` servers **Validation Rules:** - **JSON stdin format**: - **Stdio servers** must specify `container` (required) - **HTTP servers** must specify `url` (required) - **The `command` field is not supported** - stdio servers must use `container` - **TOML format**: - Uses `command` and `args` fields directly (e.g., `command = "docker"`) - **Common rules** (both formats): - Empty/"local" type automatically normalized to "stdio" - Variable expansion with `${VAR_NAME}` fails fast on undefined variables - All validation errors include JSONPath and helpful suggestions - **Mount specifications** must follow `"source:dest:mode"` format - `mode` must be either `"ro"` or `"rw"` - Both source and destination paths are required (cannot be empty) See **[Configuration Specification](https://github.com/github/gh-aw/blob/main/docs/src/content/docs/reference/mcp-gateway.md)** for complete validation rules. #### Gateway Configuration Fields (Reserved) - **`port`** (optional): Gateway HTTP port (default: from `--listen` flag) - Valid range: 1-65535 - **`apiKey`** (optional): API key for authentication - **`domain`** (optional): Domain name for the gateway - Allowed values: `"localhost"`, `"host.docker.internal"` - **`startupTimeout`** (optional): Seconds to wait for backend startup (default: 60) - Must be positive integer - **`toolTimeout`** (optional): Seconds to wait for tool execution (default: 120) - Must be positive integer - **`payloadDir`** (optional): Directory for storing large payload files (default: `/tmp/jq-payloads`) - Payloads are organized by session: `{payloadDir}/{sessionID}/{queryID}/payload.json` **Note**: Gateway configuration fields are validated and parsed but not yet fully implemented. **Configuration Alternatives**: - **`payloadSizeThreshold`** is not supported in JSON stdin format. Use: - CLI flag: `--payload-size-threshold ` (default: 10240) - Environment variable: `MCP_GATEWAY_PAYLOAD_SIZE_THRESHOLD=` - Payloads **larger** than this threshold are stored to disk and return metadata - Payloads **smaller than or equal** to this threshold are returned inline **Environment Variable Features**: - **Passthrough**: Set value to empty string (`""`) to pass through from host - **Expansion**: Use `${VAR_NAME}` syntax for dynamic substitution (fails if undefined) #### Configuration Validation and Error Handling MCP Gateway provides detailed error messages and validation to help catch configuration issues early: #### Parse Errors with Precise Location When there's a syntax error in your TOML configuration, the gateway reports the exact line and column: ```bash $ awmg --config config.toml Error: failed to parse TOML at line 2, column 6: expected '.' or '=', but got '3' instead ``` This helps you quickly identify and fix syntax issues. #### Unknown Key Detection (Typo Detection) The gateway detects and warns about unknown configuration keys, helping catch typos and deprecated options: ```toml [gateway] prot = 3000 # Typo: should be 'port' startup_timout = 30 # Typo: should be 'startup_timeout' ``` When you run the gateway with these typos, you'll see warnings in the log file: ``` [2026-02-07T17:46:51Z] [WARN] [config] Unknown configuration key 'gateway.prot' - check for typos or deprecated options [2026-02-07T17:46:51Z] [WARN] [config] Unknown configuration key 'gateway.startup_timout' - check for typos or deprecated options ``` The gateway will use default values for unrecognized keys, so it will still start, but the warnings help you identify and fix configuration issues. #### Memory-Efficient Parsing The gateway uses streaming parsing for configuration files, making it efficient even with large configuration files containing many servers. #### Best Practices 1. **Check logs for warnings**: After starting the gateway, check the log file for any warnings about unknown keys 2. **Use precise error messages**: When you see a parse error, the line and column numbers point exactly to the problem 3. **Validate configuration**: Test your configuration changes by running the gateway and checking for warnings 4. **Keep configuration clean**: Remove any deprecated or unused configuration options #### Usage ``` MCPG is a proxy server for Model Context Protocol (MCP) servers. It provides routing, aggregation, and management of multiple MCP backend servers. Usage: awmg [flags] awmg [command] Available Commands: completion Generate completion script help Help about any command Flags: -c, --config string Path to config file --config-stdin Read MCP server configuration from stdin (JSON format). When enabled, overrides --config --env string Path to .env file to load environment variables -h, --help help for awmg -l, --listen string HTTP server listen address (default "127.0.0.1:3000") --log-dir string Directory for log files (falls back to stdout if directory cannot be created) (default "/tmp/gh-aw/mcp-logs") --payload-dir string Directory for storing large payload files (segmented by session ID) (default "/tmp/jq-payloads") --payload-size-threshold int Size threshold (in bytes) for storing payloads to disk. Payloads larger than this are stored, smaller ones returned inline (default 10240) --routed Run in routed mode (each backend at /mcp/) --sequential-launch Launch MCP servers sequentially during startup (parallel launch is default) --unified Run in unified mode (all backends at /mcp) --validate-env Validate execution environment (Docker, env vars) before starting -v, --verbose count Increase verbosity level (use -v for info, -vv for debug, -vvv for trace) --version version for awmg Use "awmg [command] --help" for more information about a command. ``` #### Environment Variables The following environment variables are used by the MCP Gateway: #### Required for Production (Containerized Mode) When running in a container (`run_containerized.sh`), these variables **must** be set: | Variable | Description | Example | |----------|-------------|---------| | `MCP_GATEWAY_PORT` | The port the gateway listens on (used for `--listen` address) | `8080` | | `MCP_GATEWAY_DOMAIN` | The domain name for the gateway | `localhost` | | `MCP_GATEWAY_API_KEY` | API key for authentication | `your-secret-key` | #### Optional (Non-Containerized Mode) When running locally (`run.sh`), these variables are optional (warnings shown if missing): | Variable | Description | Default | |----------|-------------|---------| | `MCP_GATEWAY_PORT` | Gateway listening port | `8000` | | `MCP_GATEWAY_DOMAIN` | Gateway domain | `localhost` | | `MCP_GATEWAY_API_KEY` | API authentication key | (disabled) | | `MCP_GATEWAY_LOG_DIR` | Log file directory (sets default for `--log-dir` flag) | `/tmp/gh-aw/mcp-logs` | | `MCP_GATEWAY_PAYLOAD_DIR` | Large payload storage directory (sets default for `--payload-dir` flag) | `/tmp/jq-payloads` | | `MCP_GATEWAY_PAYLOAD_SIZE_THRESHOLD` | Size threshold in bytes for payload storage (sets default for `--payload-size-threshold` flag) | `10240` | | `DEBUG` | Enable debug logging with pattern matching (e.g., `*`, `server:*,launcher:*`) | (disabled) | | `DEBUG_COLORS` | Control colored debug output (0 to disable, auto-disabled when piping) | Auto-detect | **Note:** The `HOST` and `MODE` environment variables are not used by the gateway application. Use the `--listen` flag to set the bind address (default: `127.0.0.1:3000`) and the `--routed` or `--unified` flags to set the gateway mode. #### Docker Configuration | Variable | Description | Default | |----------|-------------|---------| | `DOCKER_HOST` | Docker daemon socket path | `/var/run/docker.sock` | | `DOCKER_API_VERSION` | Docker API version (set by helper scripts, Docker client auto-negotiates) | Set by run.sh based on architecture | #### Containerized Mode #### Running in Docker For production deployments in Docker containers, use `run_containerized.sh` which: 1. **Validates the container environment** before starting 2. **Requires** all essential environment variables 3. **Requires** stdin input (`-i` flag) for JSON configuration 4. **Validates** Docker socket accessibility 5. **Validates** port mapping configuration ```bash # Correct way to run the gateway in a container: docker run -i \ -e MCP_GATEWAY_PORT=8080 \ -e MCP_GATEWAY_DOMAIN=localhost \ -e MCP_GATEWAY_API_KEY=your-key \ -v /var/run/docker.sock:/var/run/docker.sock \ -v /path/to/logs:/tmp/gh-aw/mcp-logs \ -p 8080:8080 \ ghcr.io/github/gh-aw-mcpg:latest < config.json ``` **Important flags:** - `-i`: Required for passing configuration via stdin - `-v /var/run/docker.sock:/var/run/docker.sock`: Required for spawning backend MCP servers - `-v /path/to/logs:/tmp/gh-aw/mcp-logs`: Optional but recommended for persistent logs (path matches default or `MCP_GATEWAY_LOG_DIR`) - `-p :`: Port mapping must match `MCP_GATEWAY_PORT` #### Validation Checks The containerized startup script performs these validations: | Check | Description | Action on Failure | |-------|-------------|-------------------| | Docker Socket | Verifies Docker daemon is accessible | Exit with error | | Environment Variables | Checks required env vars are set | Exit with error | | Port Mapping | Verifies container port is mapped to host | Exit with error | | Stdin Interactive | Ensures `-i` flag was used | Exit with error | | Log Directory Mount | Verifies log directory is mounted to host | Warning (logs won't persist) | #### Non-Containerized Mode For local development, use `run.sh` which: 1. **Warns** about missing environment variables (but continues) 2. **Provides** default configuration if no config file specified 3. **Auto-detects** containerized environments and redirects to `run_containerized.sh` ```bash # Run locally with defaults: ./run.sh # Run with custom config: CONFIG=my-config.toml ./run.sh # Run with environment variables: MCP_GATEWAY_PORT=3000 ./run.sh ``` #### Logging MCPG provides comprehensive logging of all gateway operations to help diagnose issues and monitor activity. #### Log Files The gateway creates multiple log files for different purposes: 1. **`mcp-gateway.log`** - Unified log with all gateway messages 2. **`{serverID}.log`** - Per-server logs (e.g., `github.log`, `slack.log`) for easier troubleshooting of specific backend servers 3. **`gateway.md`** - Markdown-formatted logs for GitHub workflow previews 4. **`rpc-messages.jsonl`** - Machine-readable JSONL format for RPC message analysis 5. **`tools.json`** - Available tools from all backend MCP servers (mapping server IDs to their tool names and descriptions) #### Log File Location By default, logs are written to `/tmp/gh-aw/mcp-logs/`. This location can be configured using either: 1. **`MCP_GATEWAY_LOG_DIR` environment variable** - Sets the default log directory 2. **`--log-dir` flag** - Overrides the environment variable and default The precedence order is: `--log-dir` flag β†’ `MCP_GATEWAY_LOG_DIR` env var β†’ default (`/tmp/gh-aw/mcp-logs`) #### Per-ServerID Logs Each backend MCP server gets its own log file (e.g., `github.log`, `slack.log`) in addition to the unified `mcp-gateway.log`. This makes it much easier to: - Debug issues with a specific backend server - View all activity for one server without filtering - Identify which server is causing problems - Troubleshoot server-specific configuration issues Example log directory structure: ``` /tmp/gh-aw/mcp-logs/ β”œβ”€β”€ mcp-gateway.log # All messages β”œβ”€β”€ github.log # Only GitHub server logs β”œβ”€β”€ slack.log # Only Slack server logs β”œβ”€β”€ notion.log # Only Notion server logs β”œβ”€β”€ gateway.md # Markdown format β”œβ”€β”€ rpc-messages.jsonl # RPC messages └── tools.json # Available tools ``` **Using the environment variable:** ```bash export MCP_GATEWAY_LOG_DIR=/var/log/mcp-gateway ./awmg --config config.toml ``` **Using the command-line flag:** ```bash ./awmg --config config.toml --log-dir /var/log/mcp-gateway ``` **Important for containerized mode:** Mount the log directory to persist logs outside the container: ```bash docker run -v /path/on/host:/tmp/gh-aw/mcp-logs ... ``` If the log directory cannot be created or accessed, MCPG automatically falls back to logging to stdout. #### What Gets Logged MCPG logs all important gateway events including: - **Startup and Shutdown**: Gateway initialization, configuration loading, and graceful shutdown - **MCP Client Interactions**: Client connection events, request/response details, session management - **Backend Server Interactions**: Backend server launches, connection establishment, communication events - **Authentication Events**: Successful authentications and authentication failures (missing/invalid tokens) - **Connectivity Errors**: Connection failures, timeouts, protocol errors, and command execution issues - **Debug Information**: Optional detailed debugging via the `DEBUG` environment variable #### Log Format Each log entry includes: - **Timestamp** (RFC3339 format) - **Log Level** (INFO, WARN, ERROR, DEBUG) - **Category** (startup, client, backend, auth, shutdown) - **Message** with contextual details Example log entries: ``` [2026-01-08T23:00:00Z] [INFO] [startup] Starting MCPG with config: config.toml, listen: 127.0.0.1:3000, log-dir: /tmp/gh-aw/mcp-logs [2026-01-08T23:00:01Z] [INFO] [backend] Launching MCP backend server: github, command=docker, args=[run --rm -i ghcr.io/github/github-mcp-server:latest] [2026-01-08T23:00:02Z] [INFO] [client] New MCP client connection, remote=127.0.0.1:54321, method=POST, path=/mcp/github, backend=github, session=abc123 [2026-01-08T23:00:03Z] [ERROR] [auth] Authentication failed: invalid API key, remote=127.0.0.1:54322, path=/mcp/github ``` #### Debug Logging For development and troubleshooting, enable debug logging using the `DEBUG` environment variable: ```bash # Enable all debug logs DEBUG=* ./awmg --config config.toml # Enable specific categories DEBUG=server:*,launcher:* ./awmg --config config.toml ``` Debug logs are written to stderr and follow the same pattern-matching syntax as the file logger. #### API Endpoints #### Routed Mode (default) - `POST /mcp/{serverID}` - Send JSON-RPC request to specific server - Example: `POST /mcp/github` with body `{"jsonrpc": "2.0", "method": "tools/list", "id": 1}` #### Unified Mode - `POST /mcp` - Send JSON-RPC request (routed to first configured server) #### Health Check - `GET /health` - Returns `OK` #### MCP Methods Supported JSON-RPC 2.0 methods: - `tools/list` - List available tools - `tools/call` - Call a tool with parameters - Any other MCP method (forwarded as-is) #### Security Features #### Authentication MCPG implements MCP specification 7.1 for API key authentication. **Authentication Header Format:** - Per MCP spec 7.1: Authorization header MUST contain the API key directly - Format: `Authorization: ` (plain API key, NOT Bearer scheme) - Example: `Authorization: my-secret-api-key-123` **Configuration:** - Set via `MCP_GATEWAY_API_KEY` environment variable - When configured, all endpoints except `/health` require authentication - When not configured, authentication is disabled **Implementation:** - The `internal/auth` package provides centralized authentication logic - `auth.ParseAuthHeader()` - Parses Authorization headers per MCP spec 7.1 - `auth.ValidateAPIKey()` - Validates provided API keys - Backward compatibility for Bearer tokens is maintained **Example Request:** ```bash curl -X POST http://localhost:8000/mcp/github \ -H "Authorization: my-api-key" \ -H "Content-Type: application/json" \ -d '{"jsonrpc": "2.0", "method": "tools/list", "id": 1}' ``` #### Enhanced Error Debugging Command failures now include extensive debugging information: - Full command, arguments, and environment variables - Context-specific troubleshooting suggestions: - Docker daemon connectivity checks - Container image availability - Network connectivity issues - MCP protocol compatibility checks #### Architecture This Go port focuses on core MCP proxy functionality with optional security features: #### Core Features (Enabled) - βœ… TOML and JSON stdin configuration with spec-compliant validation - βœ… Environment variable expansion (`${VAR_NAME}`) with fail-fast behavior - βœ… Stdio transport for backend servers (containerized execution only) - βœ… Docker container launching - βœ… Routed and unified modes - βœ… Basic request/response proxying - βœ… Enhanced error debugging and troubleshooting #### MCP Server Compatibility **The gateway supports MCP servers via stdio transport using Docker containers.** All properly configured MCP servers work through direct stdio connections. #### Test Results Both GitHub MCP and Serena MCP servers pass comprehensive test suites including gateway tests: | Server | Transport | Direct Tests | Gateway Tests | Status | |--------|-----------|--------------|---------------|--------| | **GitHub MCP** | Stdio (Docker) | βœ… All passed | βœ… All passed | Production ready | | **Serena MCP** | Stdio (Docker) | βœ… 68/68 passed (100%) | βœ… All passed | Production ready | **Configuration:** ```bash # Both servers use stdio transport via Docker containers docker run -i ghcr.io/github/github-mcp-server # GitHub MCP docker run -i ghcr.io/github/serena-mcp-server # Serena MCP ``` #### Using MCP Servers with the Gateway **Direct Connection (Recommended):** Configure MCP servers to connect directly via stdio transport for optimal performance and full feature support: ```json { "mcpServers": { "serena": { "type": "stdio", "container": "ghcr.io/github/serena-mcp-server:latest" }, "github": { "type": "stdio", "container": "ghcr.io/github/github-mcp-server:latest" } } } ``` **Architecture Considerations:** - The gateway manages backend MCP servers using stdio transport via Docker containers - Session connection pooling ensures efficient resource usage - Backend processes are reused across multiple requests per session - All MCP protocol features are fully supported #### Test Coverage **Serena MCP Server Testing:** - βœ… **Direct Connection Tests:** 68/68 tests passed (100%) - βœ… **Gateway Tests:** All tests passed via `make test-serena-gateway` - βœ… Multi-language support (Go, Java, JavaScript, Python) - βœ… File operations, symbol operations, memory management - βœ… Error handling and protocol compliance - βœ… See [SERENA_TEST_RESULTS.md](SERENA_TEST_RESULTS.md) for detailed results **GitHub MCP Server Testing:** - βœ… Full test suite validation (direct and gateway) - βœ… Repository operations, issue management, search functionality - βœ… Production deployment validated #### Contributing For development setup, build instructions, testing guidelines, and project architecture details, see [CONTRIBUTING.md](CONTRIBUTING.md). #### License MIT License --- ## πŸ“– References ### Official Documentation - **[MCP Gateway Configuration Reference](https://github.com/github/gh-aw/blob/main/docs/src/content/docs/reference/mcp-gateway.md)** - Complete configuration specification - **[GitHub Agentic Workflows](https://github.com/github/gh-aw)** - Main repository - **[Model Context Protocol Specification](https://github.com/modelcontextprotocol/specification)** - MCP protocol spec - **[MCP Gateway Repository](https://github.com/github/gh-aw-mcpg)** - Gateway source code ### Related Skills - **gh-aw-safe-outputs** - Safe outputs pattern for controlled AI writes - **gh-aw-firewall** - Network firewall for Agentic Workflows - **github-agentic-workflows** - Complete GitHub Agentic Workflows guide ### Docker Resources - **[Docker Run Reference](https://docs.docker.com/engine/reference/run/)** - Docker command reference - **[Docker Socket Security](https://docs.docker.com/engine/security/)** - Docker security best practices ### Security - **[Agentic Workflows Security Model](https://github.com/github/gh-aw/blob/main/docs/aw-security.md)** - Security architecture - **[MCP Authentication](https://github.com/modelcontextprotocol/specification/blob/main/docs/authentication.md)** - MCP 7.1 auth spec --- ## πŸŽ“ Learning Path ### Beginner (Weeks 1-2) 1. Understand MCP protocol basics 2. Configure single backend (GitHub MCP) 3. Test with TOML configuration locally 4. Learn routed vs unified modes 5. Enable basic authentication ### Intermediate (Weeks 3-4) 1. Multi-server configuration 2. Docker volume mounts and environment variables 3. Production deployment with JSON stdin 4. Log analysis and troubleshooting 5. GitHub Actions integration ### Advanced (Weeks 5-8) 1. Custom MCP server development 2. HTTP backend integration 3. Advanced debugging techniques 4. Performance optimization 5. Security hardening 6. Production monitoring --- **Last Updated:** 2026-02-16 **Version:** 1.0.0 **Maintained by:** Hack23 AB **License:** MIT --- ## πŸ” Advanced Security Topics ### Security Model (GitHub Agentic Workflows) The MCP Gateway operates as a **Layer 1 trusted component** in the GitHub Agentic Workflows security model. #### Threat Model GitHub Agentic Workflows considers an adversary that may compromise untrusted user-level components (containers) and cause them to behave arbitrarily within granted privileges. The adversary may attempt to: - Access or corrupt memory or state of other components - Communicate over unintended channels - Abuse legitimate channels to perform unintended actions - Confuse higher-level control logic by deviating from expected workflows **Assumptions:** - Adversary does NOT compromise hardware or cryptographic primitives - Side-channel and covert-channel attacks are out of scope #### Layer 1: Substrate-Level Trust **Trusted components:** - GitHub Actions runner VM - Hardware (CPU, MMU) - Kernel and container runtime - **Network firewall** (configures connectivity via iptables) - **MCP Gateway** (configures and spawns isolated containers) **Security guarantees:** - Memory isolation between components - CPU and resource isolation - Mediation of privileged operations and system calls - Explicit, kernel-enforced communication boundaries **These guarantees hold even if untrusted user-level components are fully compromised.** **Trust violations require:** - Vulnerabilities in firewall or MCP Gateway - Container runtime exploits - Kernel, hypervisor, or hardware compromises **If Layer 1 fails, higher-level security guarantees may not hold.** #### Layer 2: Configuration-Level Trust **Trusted artifacts:** - Action steps - Network firewall policies - **MCP server configurations** - Toolchains that interpret configurations **Configuration controls:** - Which components are loaded - How components are connected - Which communication channels are permitted - What component privileges are assigned **Authentication tokens:** - Agent API keys - GitHub access tokens - Treated as imported capabilities that bound components' external effects - Distribution controlled declaratively **Security violations arise from:** - Misconfigurations - Overly permissive specifications - Limitations of declarative model **This layer defines what components exist and how they communicate, but NOT how they use those channels over time.** #### Layer 3: Plan-Level Trust **Trusted compiler decomposes workflow into stages.** **For each stage, the plan specifies:** 1. Which components are active and their permissions 2. Data produced by the stage 3. How that data may be consumed by subsequent stages **Key instantiation: SafeOutputs subsystem** - Agent can interact with read-only MCP servers (e.g., GitHub MCP server) - Externalized writes (creating PRs) are **buffered as artifacts** by SafeOutputs - When agent finishes, buffered artifacts processed by deterministic filters - Checks include: structural constraints, policy enforcement, automated sanitization - Filtered artifacts passed to subsequent stage for externalization **Security violations at planning layer:** - Incorrect plan construction - Incomplete or overly permissive stage definitions - Errors in enforcement of plan transitions **This layer limits blast radius of compromised component to:** - The stage in which it is active - Its influence on artifacts passed to next stage --- ## πŸ§ͺ MCP Server Compatibility ### Verified MCP Servers The MCP Gateway supports MCP servers via stdio transport using Docker containers. All properly configured MCP servers work with the gateway. #### GitHub MCP Server **Transport:** Stdio (Docker) **Status:** βœ… Production ready **Direct Tests:** βœ… All passed **Gateway Tests:** βœ… All passed **Configuration (JSON):** ```json { "mcpServers": { "github": { "type": "stdio", "container": "ghcr.io/github/github-mcp-server:latest", "env": { "GITHUB_PERSONAL_ACCESS_TOKEN": "" } } } } ``` **Configuration (TOML):** ```toml [servers.github] command = "docker" args = ["run", "--rm", "-i", "ghcr.io/github/github-mcp-server:latest"] ``` #### Serena MCP Server **Transport:** Stdio (Docker) **Status:** βœ… Production ready **Direct Tests:** βœ… 68/68 passed (100%) **Gateway Tests:** βœ… All passed **Configuration (JSON):** ```json { "mcpServers": { "serena": { "type": "stdio", "container": "ghcr.io/github/serena-mcp-server:latest", "env": { "SERENA_CONFIG": "/path/to/config" } } } } ``` **Configuration (TOML):** ```toml [servers.serena] command = "docker" args = ["run", "--rm", "-i", "ghcr.io/github/serena-mcp-server:latest"] ``` ### Backend Connection Management **Architecture:** - Gateway launches MCP servers as Docker containers - Each session maintains a persistent connection pool - Backend processes are reused across multiple requests - Stdio pipes remain open for the lifetime of the session **Example Flow:** ``` Client Request 1 (session abc): β†’ Gateway launches: docker run -i github-mcp-server β†’ Stores connection in pool["github"]["abc"] β†’ Sends initialize via stdio β†’ Returns response Client Request 2 (session abc): β†’ Gateway retrieves existing connection from pool β†’ SAME Docker process, SAME stdio connection β†’ Sends tools/list via same connection β†’ Returns response ``` ### Test Results **GitHub MCP Server:** - βœ… Full test suite validation (direct and gateway) - βœ… Repository operations tested - βœ… Issue management validated - βœ… Production deployment confirmed **Serena MCP Server:** - βœ… **Direct Connection:** 68 comprehensive tests (100% pass rate) - βœ… **Gateway Connection:** All integration tests passed - βœ… Multi-language support (Go, Java, JavaScript, Python) - βœ… All 29 tools tested and validated - βœ… File operations, symbol operations, memory management **Key capabilities tested:** - File operations (list, read, write) - Symbol operations (find, analyze) - Memory management - Error handling - Protocol compliance --- ## πŸ“‘ HTTP Backend Support ### HTTP Transport The MCP Gateway supports HTTP backend servers in addition to stdio backends. **Transport types:** - **stdio** - Standard input/output via Docker containers (default) - **http** - HTTP endpoints (external MCP servers) ### Session ID Handling for HTTP Backends #### Overview HTTP MCP servers may require the `Mcp-Session-Id` header to be present in all requests, including initialization requests like `tools/list`. **Problem:** When the gateway initializes, it calls `tools/list` on each backend to discover tools. For HTTP backends, these initialization calls were made without a session ID, causing servers that require the header to reject the request. **Solution:** The gateway now creates a context with a session ID for all HTTP backend calls: - **During initialization**: `gateway-init-{serverID}` - **During client requests**: Session ID from client's Authorization header #### Session ID Flow **Initialization Flow:** 1. Gateway starts up 2. `NewUnified` creates the unified server 3. `registerAllTools` is called 4. For each backend, `registerToolsFromBackend` is called 5. Context is created with session ID: `gateway-init-{serverID}` 6. `SendRequestWithServerID(ctx, "tools/list", ...)` is called 7. For HTTP backends, `sendHTTPRequest` adds `Mcp-Session-Id` header 8. HTTP backend receives request with header and responds successfully **Client Request Flow (Routed Mode):** 1. Client sends request to `/mcp/{serverID}` with Authorization header 2. Gateway extracts session ID from Authorization header 3. Session ID is stored in request context 4. Tool handler is called with context containing session ID 5. `SendRequestWithServerID(ctx, "tools/call", ...)` is called 6. For HTTP backends, `sendHTTPRequest` adds `Mcp-Session-Id` header with client's session ID 7. HTTP backend receives request with client's session ID #### Configuration No configuration changes required. The fix works automatically for all HTTP backends: **TOML:** ```toml [servers.my-http-backend] type = "http" url = "https://example.com/mcp" ``` **JSON:** ```json { "mcpServers": { "my-http-backend": { "type": "http", "url": "https://example.com/mcp" } } } ``` #### Backward Compatibility This change is fully backward compatible: - **For HTTP backends that don't require the header**: They will simply ignore it - **For HTTP backends that require the header**: They now work correctly - **For stdio backends**: No change in behavior (they don't use HTTP headers) #### Debugging Enable debug logging to see session ID handling: ```bash DEBUG=mcp:* ./awmg --config config.toml ``` Log messages: ``` [mcp:connection] Added Mcp-Session-Id header: gateway-init-safeinputs ``` --- ## πŸ“š Comprehensive Examples ### Example 1: Single Backend (GitHub MCP) **Scenario:** Local development with GitHub MCP server **TOML Configuration:** ```toml [servers.github] command = "docker" args = ["run", "--rm", "-i", "ghcr.io/github/github-mcp-server:latest"] [gateway] port = 8000 domain = "localhost" startupTimeout = 30 toolTimeout = 60 ``` **Run locally:** ```bash export GITHUB_PERSONAL_ACCESS_TOKEN=ghp_your_token awmg --config config.toml --listen 127.0.0.1:8000 ``` **Test tools/list:** ```bash curl -X POST http://localhost:8000/mcp/github \ -H "Content-Type: application/json" \ -d '{"jsonrpc": "2.0", "method": "tools/list", "id": 1}' ``` **Expected response:** ```json { "jsonrpc": "2.0", "id": 1, "result": { "tools": [ { "name": "search_code", "description": "Search for code across GitHub repositories", "inputSchema": { ... } }, { "name": "get_file_contents", "description": "Get contents of a file from a GitHub repository", "inputSchema": { ... } } ] } } ``` ### Example 2: Production Deployment (Multi-Server) **Scenario:** Production deployment with GitHub and Serena MCP servers in Docker **JSON Configuration (config.json):** ```json { "mcpServers": { "github": { "type": "stdio", "container": "ghcr.io/github/github-mcp-server:latest", "env": { "GITHUB_PERSONAL_ACCESS_TOKEN": "" } }, "serena": { "type": "stdio", "container": "ghcr.io/github/serena-mcp-server:latest", "mounts": [ "${HOME}/workspace:/workspace:rw", "${HOME}/.serena:/root/.serena:ro" ], "env": { "SERENA_CONFIG": "${HOME}/.serena/config.json", "DEBUG": "false" } } }, "gateway": { "port": 8000, "apiKey": "your-production-api-key", "domain": "localhost", "startupTimeout": 45, "toolTimeout": 90, "payloadDir": "/var/lib/mcp-payloads" } } ``` **Docker Run:** ```bash docker run --rm -i \ --name mcp-gateway \ -e MCP_GATEWAY_PORT=8000 \ -e MCP_GATEWAY_DOMAIN=localhost \ -e MCP_GATEWAY_API_KEY=your-production-api-key \ -e GITHUB_PERSONAL_ACCESS_TOKEN=$GITHUB_TOKEN \ -e HOME=/root \ -v /var/run/docker.sock:/var/run/docker.sock \ -v /var/log/mcp-gateway:/tmp/gh-aw/mcp-logs \ -v /var/lib/mcp-payloads:/var/lib/mcp-payloads \ -v $HOME/workspace:/root/workspace \ -v $HOME/.serena:/root/.serena:ro \ -p 8000:8000 \ ghcr.io/github/gh-aw-mcpg:latest < config.json ``` **Test multiple backends:** ```bash # GitHub backend curl -X POST http://localhost:8000/mcp/github \ -H "Authorization: your-production-api-key" \ -d '{"jsonrpc":"2.0","method":"tools/list","id":1}' # Serena backend curl -X POST http://localhost:8000/mcp/serena \ -H "Authorization: your-production-api-key" \ -d '{"jsonrpc":"2.0","method":"tools/call","params":{"name":"list_files","arguments":{"path":"/workspace"}},"id":2}' ``` ### Example 3: GitHub Actions Workflow **Scenario:** AI agent with MCP Gateway in GitHub Actions **Workflow (.github/workflows/ai-agent.yml):** ```yaml name: AI Agent with MCP Gateway on: workflow_dispatch: inputs: task: description: 'Task for AI agent' required: true default: 'Analyze codebase and suggest improvements' permissions: contents: write pull-requests: write issues: write jobs: run-agent: runs-on: ubuntu-latest steps: - name: Checkout repository uses: actions/checkout@v4 - name: Create MCP Gateway configuration run: | cat > mcp-config.json <> $GITHUB_STEP_SUMMARY echo "" >> $GITHUB_STEP_SUMMARY if [ -f logs/gateway.md ]; then cat logs/gateway.md >> $GITHUB_STEP_SUMMARY else echo "No gateway logs found" >> $GITHUB_STEP_SUMMARY fi ``` ### Example 4: Custom MCP Server **Scenario:** Custom MCP server with custom entrypoint and environment **JSON Configuration:** ```json { "mcpServers": { "custom": { "type": "stdio", "container": "myorg/custom-mcp-server:v1.2.3", "entrypoint": "/app/custom-entrypoint.sh", "entrypointArgs": ["--verbose", "--log-level=debug"], "mounts": [ "${HOME}/custom-config:/app/config:ro", "${HOME}/custom-data:/app/data:rw", "/tmp/custom-cache:/app/cache:rw" ], "env": { "API_KEY": "", "API_URL": "https://api.example.com", "CONFIG_PATH": "/app/config/settings.yaml", "DATA_DIR": "/app/data", "CACHE_DIR": "/app/cache", "LOG_LEVEL": "debug", "FEATURE_FLAG_X": "true" } } }, "gateway": { "port": 8000, "apiKey": "custom-server-api-key" } } ``` **Docker command (auto-generated by gateway):** ```bash docker run --rm -i \ --entrypoint /app/custom-entrypoint.sh \ -v /home/user/custom-config:/app/config:ro \ -v /home/user/custom-data:/app/data:rw \ -v /tmp/custom-cache:/app/cache:rw \ -e API_KEY \ -e API_URL=https://api.example.com \ -e CONFIG_PATH=/app/config/settings.yaml \ -e DATA_DIR=/app/data \ -e CACHE_DIR=/app/cache \ -e LOG_LEVEL=debug \ -e FEATURE_FLAG_X=true \ myorg/custom-mcp-server:v1.2.3 \ --verbose --log-level=debug ``` ### Example 5: HTTP Backend **Scenario:** Remote MCP server over HTTP **JSON Configuration:** ```json { "mcpServers": { "remote-mcp": { "type": "http", "url": "https://mcp.example.com/api/v1" } }, "gateway": { "port": 8000, "apiKey": "gateway-api-key" } } ``` **Session ID behavior:** - Gateway adds `Mcp-Session-Id` header automatically - Initialization: `gateway-init-remote-mcp` - Client requests: Session ID from Authorization header **Test:** ```bash curl -X POST http://localhost:8000/mcp/remote-mcp \ -H "Authorization: gateway-api-key" \ -H "Content-Type: application/json" \ -d '{"jsonrpc":"2.0","method":"tools/list","id":1}' ``` ### Example 6: Unified Mode (Simple) **Scenario:** Single backend in unified mode for testing **TOML Configuration:** ```toml [servers.github] command = "docker" args = ["run", "--rm", "-i", "ghcr.io/github/github-mcp-server:latest"] ``` **Run in unified mode:** ```bash export GITHUB_PERSONAL_ACCESS_TOKEN=ghp_token awmg --config config.toml --unified --listen 127.0.0.1:8000 ``` **Test (single endpoint):** ```bash curl -X POST http://localhost:8000/mcp \ -H "Content-Type: application/json" \ -d '{"jsonrpc":"2.0","method":"tools/list","id":1}' ``` --- ## πŸ› οΈ Troubleshooting Guide ### Issue: Gateway Fails to Start **Symptom:** ``` Error: failed to parse configuration ``` **Possible causes:** 1. Invalid TOML syntax 2. Invalid JSON in stdin 3. Missing required fields 4. Invalid field values **Solutions:** **Check TOML syntax:** ```bash # Look for line/column in error message Error: failed to parse TOML at line 5, column 10 ``` **Validate JSON:** ```bash cat config.json | jq . # Should output formatted JSON or show syntax error ``` **Enable validation:** ```bash awmg --config config.toml --validate-env ``` **Check unknown keys:** ```bash # Look for warnings in logs grep "Unknown configuration key" /tmp/gh-aw/mcp-logs/mcp-gateway.log ``` ### Issue: Backend Container Won't Start **Symptom:** ``` Error: Backend server 'github' failed to start timeout: startup took longer than 60s ``` **Possible causes:** 1. Docker image doesn't exist 2. Docker socket not accessible 3. Missing environment variables 4. Network issues pulling image 5. Container crashes on startup **Solutions:** **Pull image manually:** ```bash docker pull ghcr.io/github/github-mcp-server:latest ``` **Check Docker socket:** ```bash docker ps # Should list running containers ``` **Check backend log:** ```bash cat /tmp/gh-aw/mcp-logs/github.log # Look for error messages ``` **Test container directly:** ```bash docker run --rm -i ghcr.io/github/github-mcp-server:latest # Try sending: {"jsonrpc":"2.0","method":"tools/list","id":1} ``` **Check environment variables:** ```bash # Ensure all required vars are set echo $GITHUB_PERSONAL_ACCESS_TOKEN ``` **Increase startup timeout:** ```json { "gateway": { "startupTimeout": 120 } } ``` ### Issue: Authentication Failures **Symptom:** ``` 401 Unauthorized: Invalid API key ``` **Possible causes:** 1. API key not configured 2. Wrong Authorization header format 3. Typo in API key 4. API key not matching **Solutions:** **Check API key is set:** ```bash echo $MCP_GATEWAY_API_KEY # Should output your API key ``` **Verify Authorization header format (NOT Bearer):** ```bash # Correct: curl -H "Authorization: my-api-key" ... # Wrong: curl -H "Authorization: Bearer my-api-key" ... ``` **Check gateway logs:** ```bash grep "auth" /tmp/gh-aw/mcp-logs/mcp-gateway.log ``` **Test with correct format:** ```bash curl -X POST http://localhost:8000/mcp/github \ -H "Authorization: $(echo $MCP_GATEWAY_API_KEY)" \ -H "Content-Type: application/json" \ -d '{"jsonrpc":"2.0","method":"tools/list","id":1}' ``` ### Issue: Tools Not Discovered **Symptom:** ``` Error: No tools available from backend 'github' ``` **Possible causes:** 1. Backend didn't start successfully 2. Backend doesn't respond to tools/list 3. Invalid tools/list response 4. Network/connection issues **Solutions:** **Check tools registry:** ```bash cat /tmp/gh-aw/mcp-logs/tools.json # Should show tools from all backends ``` **Check backend logs:** ```bash cat /tmp/gh-aw/mcp-logs/github.log | grep "tools/list" ``` **Test tools/list directly:** ```bash curl -X POST http://localhost:8000/mcp/github \ -H "Content-Type: application/json" \ -d '{"jsonrpc":"2.0","method":"tools/list","id":1}' | jq . ``` **Enable debug logging:** ```bash DEBUG=* awmg --config config.toml ``` **Check for schema errors:** ```bash # Gateway auto-fixes malformed schemas grep "Normalized schema" /tmp/gh-aw/mcp-logs/mcp-gateway.log ``` ### Issue: Volume Mount Errors **Symptom:** ``` Error: Invalid mount specification Expected format: "source:dest:mode" ``` **Possible causes:** 1. Missing mode (ro/rw) 2. Empty source or dest 3. Typo in mount specification 4. Path doesn't exist **Solutions:** **Check mount format:** ```json { "mounts": [ "/host/config:/app/config:ro", "/host/data:/app/data:rw" ] } ``` **Verify paths exist:** ```bash ls -la /host/config ls -la /host/data ``` **Use environment variable expansion:** ```json { "mounts": [ "${HOME}/.config:/app/config:ro" ] } ``` **Check error message for JSONPath:** ``` Location: mcpServers.github.mounts[0] ``` ### Issue: Environment Variable Expansion Fails **Symptom:** ``` Error: Environment variable expansion failed Variable: HOME Reason: Environment variable is not defined ``` **Possible causes:** 1. Variable not set before running 2. Typo in variable name 3. Variable not exported **Solutions:** **Set variable:** ```bash export HOME=/root ``` **Check variable is set:** ```bash echo $HOME # Should output value ``` **Use explicit values instead:** ```json { "env": { "CONFIG_PATH": "/app/config" } } ``` **Check all referenced variables:** ```bash grep '\${' config.json # Shows all variables that need to be defined ``` ### Issue: Port Mapping Problems **Symptom:** ``` Error: Port mapping does not match MCP_GATEWAY_PORT Expected: 8000, Actual: 3000 ``` **Possible causes:** 1. -p flag doesn't match MCP_GATEWAY_PORT 2. Wrong port in configuration 3. Port already in use **Solutions:** **Match -p to MCP_GATEWAY_PORT:** ```bash docker run -i \ -e MCP_GATEWAY_PORT=8000 \ -p 8000:8000 \ ghcr.io/github/gh-aw-mcpg:latest < config.json ``` **Check port availability:** ```bash netstat -tuln | grep 8000 # Should show no output if port is free ``` **Use different port:** ```bash docker run -i \ -e MCP_GATEWAY_PORT=9000 \ -p 9000:9000 \ ghcr.io/github/gh-aw-mcpg:latest < config.json ``` ### Issue: Logs Not Persisting **Symptom:** Logs disappear when container stops **Possible causes:** 1. Log directory not mounted to host 2. Wrong mount path 3. Permission issues **Solutions:** **Mount log directory:** ```bash docker run -i \ -v /var/log/mcp-gateway:/tmp/gh-aw/mcp-logs \ ghcr.io/github/gh-aw-mcpg:latest < config.json ``` **Check mount is correct:** ```bash docker inspect mcp-gateway | jq '.[0].Mounts' ``` **Verify logs after container stops:** ```bash ls -la /var/log/mcp-gateway/ # Should show log files ``` **Check permissions:** ```bash # Ensure user can write to log directory chmod 777 /var/log/mcp-gateway ``` ### Issue: Docker Socket Permission Denied **Symptom:** ``` Error: Cannot connect to Docker daemon Permission denied while trying to connect to Docker socket ``` **Possible causes:** 1. Docker socket not mounted 2. Gateway user doesn't have Docker permissions 3. Docker daemon not running **Solutions:** **Mount Docker socket:** ```bash docker run -i \ -v /var/run/docker.sock:/var/run/docker.sock \ ghcr.io/github/gh-aw-mcpg:latest < config.json ``` **Check Docker is running:** ```bash docker ps ``` **Test Docker access:** ```bash docker run hello-world ``` ### Issue: Slow Tool Execution **Symptom:** ``` Error: Tool execution timeout (exceeded 120s) ``` **Possible causes:** 1. Tool is computationally expensive 2. Network latency (HTTP backends) 3. Backend server overloaded 4. Default timeout too low **Solutions:** **Increase tool timeout:** ```json { "gateway": { "toolTimeout": 300 } } ``` **Check backend performance:** ```bash # Look for slow tool calls in logs jq 'select(.duration > 5000)' /tmp/gh-aw/mcp-logs/rpc-messages.jsonl ``` **Monitor backend resources:** ```bash docker stats mcp-gateway ``` **Enable debug logging:** ```bash DEBUG=mcp:* awmg --config config.toml ``` --- ## 🎯 Best Practices & Patterns ### Configuration Management **βœ… DO:** 1. **Use environment-specific configs** ```bash # Development awmg --config config.dev.toml # Production docker run -i ghcr.io/github/gh-aw-mcpg:latest < config.prod.json ``` 2. **Validate before deploying** ```bash # Check configuration syntax awmg --config config.toml --validate-env # Test in dry-run mode DEBUG=* awmg --config config.toml ``` 3. **Use environment variables for secrets** ```json { "env": { "API_KEY": "", "SECRET_TOKEN": "" } } ``` 4. **Document your configuration** ```toml # GitHub MCP server for repository access [servers.github] command = "docker" args = ["run", "--rm", "-i", "ghcr.io/github/github-mcp-server:latest"] # Startup timeout increased for slow networks [gateway] startupTimeout = 90 ``` 5. **Version control non-sensitive configs** ```bash git add config.toml.template git add .env.example # Never commit actual secrets! ``` **❌ DON'T:** 1. **Hardcode secrets** ```json { "env": { "API_KEY": "ghp_actual_secret_key" // ❌ DON'T DO THIS } } ``` 2. **Use overly permissive mounts** ```json { "mounts": [ "/:/host:rw" // ❌ Mounts entire filesystem read-write ] } ``` 3. **Ignore configuration warnings** ``` [WARN] Unknown configuration key 'gateway.prot' // ❌ Fix typos immediately ``` 4. **Skip validation** ```bash # ❌ Don't skip this step awmg --config config.toml # without --validate-env ``` ### Security Hardening **βœ… DO:** 1. **Always use API keys in production** ```bash export MCP_GATEWAY_API_KEY=$(openssl rand -base64 32) ``` 2. **Rotate API keys regularly** ```bash # Monthly rotation ./rotate-api-keys.sh ``` 3. **Use read-only mounts for configs** ```json { "mounts": [ "/host/config:/app/config:ro" ] } ``` 4. **Limit backend permissions** ```json { "env": { "GITHUB_PERSONAL_ACCESS_TOKEN": "" } // Use token with minimal required scopes } ``` 5. **Monitor authentication failures** ```bash # Alert on failed auth attempts grep "Authentication failed" /tmp/gh-aw/mcp-logs/mcp-gateway.log | \ tail -n 10 | \ mail -s "MCP Gateway Auth Failures" admin@example.com ``` 6. **Use specific image tags** ```json { "container": "ghcr.io/github/github-mcp-server:v1.2.3" } ``` **❌ DON'T:** 1. **Disable authentication** ```bash # ❌ Don't run without API key in production unset MCP_GATEWAY_API_KEY ``` 2. **Share API keys across environments** ```bash # ❌ Use different keys export DEV_API_KEY=dev-key export PROD_API_KEY=prod-key ``` 3. **Use `:latest` tags** ```json { "container": "myserver:latest" // ❌ Not reproducible } ``` 4. **Grant unnecessary permissions** ```bash # ❌ Don't run privileged docker run --privileged ... ``` ### Logging & Monitoring **βœ… DO:** 1. **Mount logs to persistent storage** ```bash docker run -i \ -v /var/log/mcp-gateway:/tmp/gh-aw/mcp-logs \ ghcr.io/github/gh-aw-mcpg:latest < config.json ``` 2. **Use per-server logs for debugging** ```bash # Debug specific backend tail -f /tmp/gh-aw/mcp-logs/github.log ``` 3. **Monitor log file sizes** ```bash # Rotate logs when > 100MB find /var/log/mcp-gateway -name "*.log" -size +100M ``` 4. **Enable debug logging for troubleshooting** ```bash DEBUG=mcp:*,server:* awmg --config config.toml ``` 5. **Analyze RPC messages** ```bash # Find slow tools jq 'select(.duration > 5000)' /tmp/gh-aw/mcp-logs/rpc-messages.jsonl # Count by method jq -r .method /tmp/gh-aw/mcp-logs/rpc-messages.jsonl | sort | uniq -c ``` 6. **Monitor health endpoint** ```bash # Kubernetes liveness probe livenessProbe: httpGet: path: /health port: 8000 periodSeconds: 10 ``` **❌ DON'T:** 1. **Ignore log warnings** ```bash # ❌ Always investigate warnings grep WARN /tmp/gh-aw/mcp-logs/mcp-gateway.log ``` 2. **Let logs grow unbounded** ```bash # ❌ Implement log rotation logrotate /etc/logrotate.d/mcp-gateway ``` 3. **Store logs in container** ```bash # ❌ Logs lost when container stops docker run ghcr.io/github/gh-aw-mcpg:latest ``` ### Performance Optimization **βœ… DO:** 1. **Use parallel backend launch (default)** ```bash # Backends start simultaneously awmg --config config.toml ``` 2. **Tune timeouts for your workload** ```json { "gateway": { "startupTimeout": 30, // Fast backends "toolTimeout": 300 // Slow AI tools } } ``` 3. **Monitor backend startup times** ```bash grep "Launching MCP backend" /tmp/gh-aw/mcp-logs/mcp-gateway.log ``` 4. **Use payload threshold wisely** ```bash # Store large payloads to disk export MCP_GATEWAY_PAYLOAD_SIZE_THRESHOLD=10240 ``` 5. **Reuse session connections** ```bash # Connection pooling happens automatically # Same session = same backend process ``` **❌ DON'T:** 1. **Use sequential launch unnecessarily** ```bash # ❌ Slower startup awmg --config config.toml --sequential-launch ``` 2. **Set timeouts too low** ```json { "gateway": { "toolTimeout": 5 // ❌ Too aggressive } } ``` ### Docker Best Practices **βœ… DO:** 1. **Clean up containers automatically** ```bash docker run --rm -i ... // Always use --rm ``` 2. **Limit container resources** ```bash docker run -i \ --memory=2g \ --cpus=2.0 \ ghcr.io/github/gh-aw-mcpg:latest < config.json ``` 3. **Use health checks** ```dockerfile HEALTHCHECK --interval=30s --timeout=3s \ CMD curl -f http://localhost:8000/health || exit 1 ``` 4. **Monitor Docker socket usage** ```bash # Check Docker API calls docker events --filter type=container ``` 5. **Use multi-stage builds** ```dockerfile # Build stage FROM golang:1.21 AS builder ... # Runtime stage FROM gcr.io/distroless/base-debian12 COPY --from=builder /app/awmg /awmg ``` **❌ DON'T:** 1. **Leave containers running indefinitely** ```bash # ❌ Stop containers when done docker stop mcp-gateway ``` 2. **Ignore container logs** ```bash # ❌ Check for errors docker logs mcp-gateway ``` 3. **Run as root unnecessarily** ```dockerfile # βœ… Use non-root user USER nobody ``` --- ## πŸ’‘ Tips & Tricks ### Quick Commands **Start gateway with defaults:** ```bash awmg --config config.toml ``` **Test configuration:** ```bash awmg --config config.toml --validate-env ``` **Debug mode:** ```bash DEBUG=* awmg --config config.toml -vvv ``` **Health check:** ```bash curl http://localhost:8000/health ``` **View available tools:** ```bash cat /tmp/gh-aw/mcp-logs/tools.json | jq . ``` **Watch logs in real-time:** ```bash tail -f /tmp/gh-aw/mcp-logs/mcp-gateway.log ``` ### Useful Aliases ```bash alias awmg-dev='awmg --config config.dev.toml --listen 127.0.0.1:8000' alias awmg-logs='tail -f /tmp/gh-aw/mcp-logs/mcp-gateway.log' alias awmg-health='curl http://localhost:8000/health' alias awmg-tools='cat /tmp/gh-aw/mcp-logs/tools.json | jq .' ``` ### Environment Setup **`.env` file:** ```bash MCP_GATEWAY_PORT=8000 MCP_GATEWAY_DOMAIN=localhost MCP_GATEWAY_API_KEY=your-dev-api-key MCP_GATEWAY_LOG_DIR=/var/log/mcp-gateway GITHUB_PERSONAL_ACCESS_TOKEN=ghp_your_token DEBUG=mcp:*,server:* ``` **Load environment:** ```bash source .env awmg --config config.toml ``` ### Quick Testing **Test tools/list:** ```bash curl -X POST http://localhost:8000/mcp/github \ -H "Content-Type: application/json" \ -d '{"jsonrpc":"2.0","method":"tools/list","id":1}' | jq . ``` **Test tools/call:** ```bash curl -X POST http://localhost:8000/mcp/github \ -H "Content-Type: application/json" \ -d '{ "jsonrpc":"2.0", "method":"tools/call", "params":{ "name":"search_code", "arguments":{"query":"repo:github/gh-aw MCP"} }, "id":2 }' | jq . ``` ### Production Checklist - [ ] API key configured and rotated - [ ] Log directory mounted to host - [ ] Docker socket accessible - [ ] Health endpoint responding - [ ] All backends starting successfully - [ ] Tools discovered from all backends - [ ] Authentication working - [ ] Per-server logs available - [ ] Resource limits set - [ ] Monitoring configured