Skip to main content

stdio↔HTTP bridge for the eyeot ERP MCP server (Claude Desktop, Cursor, custom agents)

Project description

eyeot-mcp

Plug Claude Desktop into your ERP.

Official stdio ↔ HTTP bridge for the eyeot ERP MCP server. ~600 business tools, one pip install.


PyPI version Python License: MIT MCP

Dependencies LOC Auditable Auth

Landing page · Docs · PyPI · Issues



⚡ 60-second install

pip install eyeot-mcp        # 1.  install the bridge
eyeot-mcp login              # 2.  authenticate via browser (OAuth Device Flow)

Then paste into your Claude Desktop config:

{
  "mcpServers": {
    "eyeot": {
      "command": "eyeot-mcp"
    }
  }
}

Restart Claude Desktop. Done. Ask: "List my last 5 invoices."

Config location · macOS ~/Library/Application Support/Claude/claude_desktop_config.json · Windows %APPDATA%\Claude\claude_desktop_config.json


🧩 What is this?

The eyeot ERP exposes ~600 business actions — CRM, sales, stock, maintenance, HR, finance, IT service management, GED, RGPD compliance, plus 6 V2 marketplace modules (POS, delivery & routing, recruitment, BPM, field service, supply chain) — as MCP tools over HTTPS.

But Claude Desktop, Cursor, and most local agents only speak MCP over stdio.

eyeot-mcp is the missing piece between them.

flowchart LR
    A["🤖 Claude Desktop<br/>Cursor / custom agent"] -- "JSON-RPC<br/>over stdio" --> B["📦 eyeot-mcp<br/>(this package)"]
    B -- "HTTPS POST<br/>Bearer token" --> C["🏢 eyeot ERP<br/>(your tenant)"]
    C -. "Auth · RBAC · audit<br/>multi-tenant isolation<br/>license guard" .-> C

    style A fill:#eef2ff,stroke:#6366f1,color:#1e293b
    style B fill:#f0fdf4,stroke:#10b981,color:#065f46
    style C fill:#fef3c7,stroke:#f59e0b,color:#78350f

Zero business logic in the bridge. Everything happens server-side — auth, RBAC, audit logging, license enforcement, multi-tenant isolation, idempotency. The CLI is ~290 lines of Python standard library. You can audit it in 10 minutes.


🎯 What can your agent do?

After install, your MCP client gets access to actions like:

Domain Try saying…
💼 CRM "Create a quote for ACME — 10 units of PROD-001 at standard tariff."
📊 Sales "List my last 5 invoices and their payment status."
📦 Stock "Which products in Lyon site are below the critical threshold?"
🔧 Maintenance "Which equipment is overdue for preventive maintenance this week?"
👥 HR "Show me pending leave requests for my team."
💰 Finance "What's the revenue forecast for Q3 by business unit?"
🎫 IT support "Open a ticket: VPN is down for the marketing team, P1."
📄 GED "Find all signed NDAs for partner XYZ."
🧠 Intelligence "Customer-health distribution across all active accounts."
🧾 POS / Caisse "Today's Z-report total for the Lyon register."
🚚 Delivery "Optimize today's route for vehicle TL-204 and notify recipients."
🧑‍💼 Recruitment "Shortlist candidates for the senior developer posting."
⚙️ Process / BPM "Which approval tasks are pending in my inbox?"
🏗️ Field service "Schedule a site intervention for client XYZ next Tuesday."
🔩 Supply chain "Run MRP and list the components to reorder this week."

…and ~590 more, auto-generated from the OpenAPI spec.


🔐 Authentication

Two modes, same Bearer header on the wire, same Authorization decorator server-side.

🤖 OAuth 2.1 (humans)

🔑 API key (services)

For Claude Desktop, Cursor, personal agents.

eyeot-mcp login

Opens browser → approve → done. Credentials saved to ~/.eyeot-mcp/config.json (mode 0600).

  • Token format: eya_<base64> access + eyr_<base64> refresh
  • Lifetime: 1 h access / 30 d refresh
  • PKCE S256 mandatory (public clients)
  • Refresh rotation with replay detection — a stolen refresh kills the whole token family
  • The CLI auto-refreshes the access token (proactively before expiry + on a 401) — stay connected for the full 30-day refresh window without re-running login

For CI/CD agents, batch jobs, server-to-server.

{
  "mcpServers": {
    "eyeot": {
      "command": "eyeot-mcp",
      "env": { "EYEOT_TOKEN": "eyk_xxx_xxx" }
    }
  }
}

Issued by an org admin from the eyeot ERP settings panel.

  • Token format: eyk_<prefix>_<secret>
  • Lifetime: until revoked
  • Scope: org-wide, configurable RBAC

🛡️ Security model

🔒

OAuth 2.1 + PKCE

Public clients use PKCE S256. Refresh rotation with replay detection.

👮

Server-side RBAC

Every tool call goes through the same @permissions_required decorators as the UI.

📝

Full audit trail

Every action logged with user + tenant + IP. RGPD-compliant retention.

💳

License grace

Subscription lapsed? GETs still work so the agent can inform you. POSTs return 402 with activate_url.

Local credentials stored at ~/.eyeot-mcp/config.json with file mode 0600 (POSIX). On Windows, file ACLs apply. No telemetry, no phone-home.


🏗️ Self-hosting

Point the bridge at any eyeot deployment with --base-url:

eyeot-mcp --base-url https://erp.example.com login
{
  "mcpServers": {
    "eyeot": {
      "command": "eyeot-mcp",
      "args": ["--base-url", "https://erp.example.com"]
    }
  }
}

Same protocol, same auth, your infra.


📚 Commands

Command Description
eyeot-mcp Start the stdio bridge using saved credentials (default mode — what Claude Desktop runs)
eyeot-mcp login Browser-based OAuth Device Authorization Grant
eyeot-mcp logout Revoke refresh token server-side, delete local credentials
eyeot-mcp --token eyk_... One-shot mode with an explicit API key
eyeot-mcp --base-url URL ... Target a self-hosted deployment

🔧 How it works (under the hood)

  1. Claude Desktop spawns eyeot-mcp as a child process, exchanges JSON-RPC 2.0 over its stdin/stdout pipes.
  2. For each line received on stdin, the bridge POSTs the JSON to ${base_url}/api/v1/mcp with Authorization: Bearer <token>.
  3. The HTTP response is written verbatim to stdout, framed as line-delimited JSON.
  4. The server speaks MCP 2024-11-05 and auto-generates ~600 tools from the OpenAPI spec — initialize, tools/list, tools/call all work exactly as MCP clients expect.

No state in the bridge. No protocol translation beyond transport. No surprises.


📖 Resources

Landing & install

API

Spec & protocol


🧭 Versioning

  • This package: Semantic Versioning. Major bumps may change CLI flags or the on-disk config schema.
  • MCP protocol: 2024-11-05 (negotiated server-side).
  • ERP API: /api/v1 (stable). Breaking changes ship as /api/v2.

📄 License

MIT — fork it, package it, audit it, build on top of it.

The eyeot ERP backend is a separate, proprietary product of Eyeot Software. This bridge is open-source so anyone can audit it, fork it, package it for their distro, or use it as a reference for building their own MCP clients.



ERP by Eyeot Software

Multi-tenant, AI-native ERP for SMBs. Built to be operated by AI agents from day one.

Every action you can do in the UI, you can do via this bridge.

🌐 erp.eyeot.fr · ✉️ contact@eyeot.fr

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

eyeot_mcp-1.1.0.tar.gz (10.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

eyeot_mcp-1.1.0-py3-none-any.whl (11.3 kB view details)

Uploaded Python 3

File details

Details for the file eyeot_mcp-1.1.0.tar.gz.

File metadata

  • Download URL: eyeot_mcp-1.1.0.tar.gz
  • Upload date:
  • Size: 10.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.4

File hashes

Hashes for eyeot_mcp-1.1.0.tar.gz
Algorithm Hash digest
SHA256 f51561d6863202766d5e8427ca2a6d36df3de372cf99bd34d8cd335adf3db8ab
MD5 e9f2f53abefc183637485596396d4824
BLAKE2b-256 47252561a2172c5436f8c370843a650a322f30fbe1d7bf7dec22abb1e24c52cf

See more details on using hashes here.

File details

Details for the file eyeot_mcp-1.1.0-py3-none-any.whl.

File metadata

  • Download URL: eyeot_mcp-1.1.0-py3-none-any.whl
  • Upload date:
  • Size: 11.3 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.4

File hashes

Hashes for eyeot_mcp-1.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 4b79836bc09599c7cb71a35fab108efaf0d539820c6da8d4b47f9c0585984c01
MD5 17288b65542e4fd350c398021f6d075b
BLAKE2b-256 c47bdd293ecf414c4a322abf32c8d5be561d7d902474680c6279732c4b332dcc

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page