-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy pathdocker-compose.yml
More file actions
51 lines (46 loc) · 2.08 KB
/
docker-compose.yml
File metadata and controls
51 lines (46 loc) · 2.08 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
services:
seerr-cli:
build: .
# image: ghcr.io/electather/seerr-cli:latest # use pre-built image once published
environment:
# --- Core ---
# URL of your Seerr instance. The /api/v1 prefix is appended automatically.
SEERR_SERVER: http://seer:5055
# Seerr API key for authenticating against the Seerr API.
SEERR_API_KEY: ${SEERR_API_KEY}
# Set to any non-empty value to enable verbose startup and request logging.
# SEERR_VERBOSE: "false"
# --- MCP transport ---
# Transport protocol: "stdio" (default, for Claude Desktop) or "http".
SEERR_MCP_TRANSPORT: http
# Bind address for the HTTP transport (host:port or :port).
SEERR_MCP_ADDR: ":8811"
# --- MCP authentication (HTTP transport) ---
# Bearer token that clients must supply in the Authorization header.
# Required unless SEERR_MCP_ALLOW_API_KEY_QUERY_PARAM or SEERR_MCP_NO_AUTH is set.
SEERR_MCP_AUTH_TOKEN: ${SEERR_MCP_AUTH_TOKEN}
# Set to "true" to disable all authentication (insecure — not recommended).
# SEERR_MCP_NO_AUTH: "false"
# Accept the Seerr API key via the api_key query parameter in addition to
# the X-Api-Key header. Useful for clients that cannot send custom headers.
# Each request must supply the key; requests without a key are rejected.
# SEERR_MCP_ALLOW_API_KEY_QUERY_PARAM: "false"
# --- MCP TLS (HTTP transport) ---
# Paths to a TLS certificate and private key. When both are set the server
# listens over HTTPS instead of HTTP.
# SEERR_MCP_TLS_CERT: ""
# SEERR_MCP_TLS_KEY: ""
# --- MCP CORS (HTTP transport) ---
# Set to "true" to add CORS headers. Required for browser-based clients
# such as claude.ai.
# SEERR_MCP_CORS: "false"
ports:
- "8811:8811"
healthcheck:
# The /health endpoint is unauthenticated regardless of auth configuration.
test: ["CMD", "wget", "-qO-", "http://localhost:8811/health"]
interval: 30s
timeout: 5s
start_period: 5s
retries: 3
restart: unless-stopped