stdio↔HTTP bridge for the eyeot ERP MCP server (Claude Desktop, Cursor, custom agents)
Project description
eyeot-mcp
Plug Claude Desktop into your ERP.
Official stdio ↔ HTTP bridge for the eyeot ERP MCP server.
~600 business tools, one pip install.
Landing page · Docs · PyPI · Issues
⚡ 60-second install
pip install eyeot-mcp # 1. install the bridge
eyeot-mcp login # 2. authenticate via browser (OAuth Device Flow)
Then paste into your Claude Desktop config:
{
"mcpServers": {
"eyeot": {
"command": "eyeot-mcp"
}
}
}
Restart Claude Desktop. Done. Ask: "List my last 5 invoices."
Config location · macOS
~/Library/Application Support/Claude/claude_desktop_config.json· Windows%APPDATA%\Claude\claude_desktop_config.json
🧩 What is this?
The eyeot ERP exposes ~600 business actions — CRM, sales, stock, maintenance, HR, finance, IT service management, GED, RGPD compliance, plus 6 V2 marketplace modules (POS, delivery & routing, recruitment, BPM, field service, supply chain) — as MCP tools over HTTPS.
But Claude Desktop, Cursor, and most local agents only speak MCP over stdio.
eyeot-mcp is the missing piece between them.
flowchart LR
A["🤖 Claude Desktop<br/>Cursor / custom agent"] -- "JSON-RPC<br/>over stdio" --> B["📦 eyeot-mcp<br/>(this package)"]
B -- "HTTPS POST<br/>Bearer token" --> C["🏢 eyeot ERP<br/>(your tenant)"]
C -. "Auth · RBAC · audit<br/>multi-tenant isolation<br/>license guard" .-> C
style A fill:#eef2ff,stroke:#6366f1,color:#1e293b
style B fill:#f0fdf4,stroke:#10b981,color:#065f46
style C fill:#fef3c7,stroke:#f59e0b,color:#78350f
Zero business logic in the bridge. Everything happens server-side — auth, RBAC, audit logging, license enforcement, multi-tenant isolation, idempotency. The CLI is ~290 lines of Python standard library. You can audit it in 10 minutes.
🎯 What can your agent do?
After install, your MCP client gets access to actions like:
| Domain | Try saying… |
|---|---|
| 💼 CRM | "Create a quote for ACME — 10 units of PROD-001 at standard tariff." |
| 📊 Sales | "List my last 5 invoices and their payment status." |
| 📦 Stock | "Which products in Lyon site are below the critical threshold?" |
| 🔧 Maintenance | "Which equipment is overdue for preventive maintenance this week?" |
| 👥 HR | "Show me pending leave requests for my team." |
| 💰 Finance | "What's the revenue forecast for Q3 by business unit?" |
| 🎫 IT support | "Open a ticket: VPN is down for the marketing team, P1." |
| 📄 GED | "Find all signed NDAs for partner XYZ." |
| 🧠 Intelligence | "Customer-health distribution across all active accounts." |
| 🧾 POS / Caisse | "Today's Z-report total for the Lyon register." |
| 🚚 Delivery | "Optimize today's route for vehicle TL-204 and notify recipients." |
| 🧑💼 Recruitment | "Shortlist candidates for the senior developer posting." |
| ⚙️ Process / BPM | "Which approval tasks are pending in my inbox?" |
| 🏗️ Field service | "Schedule a site intervention for client XYZ next Tuesday." |
| 🔩 Supply chain | "Run MRP and list the components to reorder this week." |
…and ~590 more, auto-generated from the OpenAPI spec.
🔐 Authentication
Two modes, same Bearer header on the wire, same Authorization decorator server-side.
🤖 OAuth 2.1 (humans) |
🔑 API key (services) |
|---|---|
|
For Claude Desktop, Cursor, personal agents. eyeot-mcp login
Opens browser → approve → done. Credentials saved to
|
For CI/CD agents, batch jobs, server-to-server. {
"mcpServers": {
"eyeot": {
"command": "eyeot-mcp",
"env": { "EYEOT_TOKEN": "eyk_xxx_xxx" }
}
}
}
Issued by an org admin from the eyeot ERP settings panel.
|
🛡️ Security model
🔒OAuth 2.1 + PKCE Public clients use PKCE S256. Refresh rotation with replay detection. |
👮Server-side RBAC Every tool call goes through the same |
📝Full audit trail Every action logged with user + tenant + IP. RGPD-compliant retention. |
💳License grace Subscription lapsed? GETs still work so the agent can inform you. POSTs return 402 with |
Local credentials stored at
~/.eyeot-mcp/config.jsonwith file mode0600(POSIX). On Windows, file ACLs apply. No telemetry, no phone-home.
🏗️ Self-hosting
Point the bridge at any eyeot deployment with --base-url:
eyeot-mcp --base-url https://erp.example.com login
{
"mcpServers": {
"eyeot": {
"command": "eyeot-mcp",
"args": ["--base-url", "https://erp.example.com"]
}
}
}
Same protocol, same auth, your infra.
📚 Commands
| Command | Description |
|---|---|
eyeot-mcp |
Start the stdio bridge using saved credentials (default mode — what Claude Desktop runs) |
eyeot-mcp login |
Browser-based OAuth Device Authorization Grant |
eyeot-mcp logout |
Revoke refresh token server-side, delete local credentials |
eyeot-mcp --token eyk_... |
One-shot mode with an explicit API key |
eyeot-mcp --base-url URL ... |
Target a self-hosted deployment |
🔧 How it works (under the hood)
- Claude Desktop spawns
eyeot-mcpas a child process, exchanges JSON-RPC 2.0 over its stdin/stdout pipes. - For each line received on stdin, the bridge
POSTs the JSON to${base_url}/api/v1/mcpwithAuthorization: Bearer <token>. - The HTTP response is written verbatim to stdout, framed as line-delimited JSON.
- The server speaks MCP
2024-11-05and auto-generates ~600 tools from the OpenAPI spec —initialize,tools/list,tools/callall work exactly as MCP clients expect.
No state in the bridge. No protocol translation beyond transport. No surprises.
📖 Resources
Landing & install
|
API |
Spec & protocol |
🧭 Versioning
- This package: Semantic Versioning. Major bumps may change CLI flags or the on-disk config schema.
- MCP protocol:
2024-11-05(negotiated server-side). - ERP API:
/api/v1(stable). Breaking changes ship as/api/v2.
📄 License
MIT — fork it, package it, audit it, build on top of it.
The eyeot ERP backend is a separate, proprietary product of Eyeot Software. This bridge is open-source so anyone can audit it, fork it, package it for their distro, or use it as a reference for building their own MCP clients.
ERP by Eyeot Software
Multi-tenant, AI-native ERP for SMBs. Built to be operated by AI agents from day one.
Every action you can do in the UI, you can do via this bridge.
🌐 erp.eyeot.fr · ✉️ contact@eyeot.fr
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file eyeot_mcp-1.1.0.tar.gz.
File metadata
- Download URL: eyeot_mcp-1.1.0.tar.gz
- Upload date:
- Size: 10.5 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.14.4
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
f51561d6863202766d5e8427ca2a6d36df3de372cf99bd34d8cd335adf3db8ab
|
|
| MD5 |
e9f2f53abefc183637485596396d4824
|
|
| BLAKE2b-256 |
47252561a2172c5436f8c370843a650a322f30fbe1d7bf7dec22abb1e24c52cf
|
File details
Details for the file eyeot_mcp-1.1.0-py3-none-any.whl.
File metadata
- Download URL: eyeot_mcp-1.1.0-py3-none-any.whl
- Upload date:
- Size: 11.3 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.14.4
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
4b79836bc09599c7cb71a35fab108efaf0d539820c6da8d4b47f9c0585984c01
|
|
| MD5 |
17288b65542e4fd350c398021f6d075b
|
|
| BLAKE2b-256 |
c47bdd293ecf414c4a322abf32c8d5be561d7d902474680c6279732c4b332dcc
|