@@ -10,13 +10,13 @@ metadata:
1010 author : electather
1111 repo : https://github.com/electather/seerr-cli
1212env :
13- - name : SEER_SERVER
13+ - name : SEERR_SERVER
1414 description : Full URL of your Seerr instance (e.g. https://seerr.example.com)
1515 required : true
16- - name : SEER_API_KEY
16+ - name : SEERR_API_KEY
1717 description : API key for authenticating with the Seerr server
1818 required : true
19- - name : SEER_MCP_AUTH_TOKEN
19+ - name : SEERR_MCP_AUTH_TOKEN
2020 description : Bearer token for authenticating MCP HTTP transport clients (required when running the HTTP server; omit for stdio transport)
2121 required : false
2222---
@@ -47,9 +47,9 @@ Run the MCP HTTP server in a container next to your Seerr instance:
4747``` bash
4848# With Bearer token auth
4949docker run --rm \
50- -e SEER_SERVER =http://your-seerr-instance:5055 \
51- -e SEER_API_KEY =your-api-key \
52- -e SEER_MCP_AUTH_TOKEN =your-secret-token \
50+ -e SEERR_SERVER =http://your-seerr-instance:5055 \
51+ -e SEERR_API_KEY =your-api-key \
52+ -e SEERR_MCP_AUTH_TOKEN =your-secret-token \
5353 -p 8811:8811 \
5454 ghcr.io/electather/seerr-cli:latest
5555```
@@ -60,37 +60,37 @@ For clients that cannot send custom headers (e.g. claude.ai remote MCP), use a s
6060
6161``` bash
6262docker run --rm \
63- -e SEER_SERVER =http://your-seerr-instance:5055 \
64- -e SEER_API_KEY =your-api-key \
65- -e SEER_MCP_ROUTE_TOKEN =your-secret-path \
66- -e SEER_MCP_NO_AUTH =true \
67- -e SEER_MCP_CORS =true \
63+ -e SEERR_SERVER =http://your-seerr-instance:5055 \
64+ -e SEERR_API_KEY =your-api-key \
65+ -e SEERR_MCP_ROUTE_TOKEN =your-secret-path \
66+ -e SEERR_MCP_NO_AUTH =true \
67+ -e SEERR_MCP_CORS =true \
6868 -p 8811:8811 \
6969 ghcr.io/electather/seerr-cli:latest
7070```
7171
7272MCP endpoint: ` http://localhost:8811/your-secret-path/mcp ` — no auth header required.
7373
74- At least one of ` SEER_MCP_AUTH_TOKEN ` , ` SEER_MCP_ROUTE_TOKEN ` , or ` SEER_MCP_NO_AUTH =true` must be set for HTTP transport.
74+ At least one of ` SEERR_MCP_AUTH_TOKEN ` , ` SEERR_MCP_ROUTE_TOKEN ` , or ` SEERR_MCP_NO_AUTH =true` must be set for HTTP transport.
7575
7676### docker-compose deployment
7777
7878Use the included ` docker-compose.yml ` to deploy alongside Seer:
7979
8080``` bash
81- SEER_API_KEY =xxx SEER_MCP_AUTH_TOKEN =secret docker compose up -d
81+ SEERR_API_KEY =xxx SEERR_MCP_AUTH_TOKEN =secret docker compose up -d
8282```
8383
84- The default ` SEER_SERVER ` in the compose file points to ` http://seer:5055 ` (the Seerr service name). Override it if your Seerr instance is elsewhere.
84+ The default ` SEERR_SERVER ` in the compose file points to ` http://seer:5055 ` (the Seerr service name). Override it if your Seerr instance is elsewhere.
8585
8686### Running CLI commands via Docker
8787
8888Override the default CMD to run any CLI command:
8989
9090``` bash
9191docker run --rm \
92- -e SEER_SERVER =http://your-seerr-instance:5055 \
93- -e SEER_API_KEY =your-api-key \
92+ -e SEERR_SERVER =http://your-seerr-instance:5055 \
93+ -e SEERR_API_KEY =your-api-key \
9494 ghcr.io/electather/seerr-cli:latest \
9595 status system
9696```
@@ -102,7 +102,7 @@ seerr-cli config set --server https://your-seerr-instance.com --api-key YOUR_KEY
102102seerr-cli config show # verify
103103```
104104
105- Environment variables also work: ` SEER_SERVER ` , ` SEER_API_KEY ` .
105+ Environment variables also work: ` SEERR_SERVER ` , ` SEERR_API_KEY ` .
106106
107107## Global Flags
108108
@@ -331,8 +331,8 @@ Add to your Claude Desktop config (`~/Library/Application Support/Claude/claude_
331331 "command" : " /usr/local/bin/seerr-cli" ,
332332 "args" : [" mcp" , " serve" ],
333333 "env" : {
334- "SEER_SERVER " : " https://your-seerr-instance.com" ,
335- "SEER_API_KEY " : " your-api-key"
334+ "SEERR_SERVER " : " https://your-seerr-instance.com" ,
335+ "SEERR_API_KEY " : " your-api-key"
336336 }
337337 }
338338 }
@@ -349,7 +349,7 @@ seerr-cli mcp serve --transport http --addr :8811 --auth-token mysecrettoken
349349
350350Endpoint: ` http://localhost:8811/mcp ` — set ` Authorization: Bearer mysecrettoken ` in your client.
351351
352- For clients that cannot send custom headers (e.g. claude.ai remote MCP), use a secret path prefix via ` --route-token ` (or ` SEER_MCP_ROUTE_TOKEN ` ):
352+ For clients that cannot send custom headers (e.g. claude.ai remote MCP), use a secret path prefix via ` --route-token ` (or ` SEERR_MCP_ROUTE_TOKEN ` ):
353353
354354``` bash
355355# Add --cors if connecting from a browser-based client (e.g. claude.ai)
@@ -365,18 +365,18 @@ seerr-cli mcp serve --transport http --route-token abc123 --auth-token mysecrett
365365
366366All flags are configurable via environment variables:
367367
368- | Flag | Environment variable | Default |
369- | --------------- | ---------------------- | ------- |
370- | ` --transport ` | ` SEER_MCP_TRANSPORT ` | ` stdio ` |
371- | ` --addr ` | ` SEER_MCP_ADDR ` | ` :8811 ` |
372- | ` --auth-token ` | ` SEER_MCP_AUTH_TOKEN ` | — |
373- | ` --no-auth ` | ` SEER_MCP_NO_AUTH ` | ` false ` |
374- | ` --route-token ` | ` SEER_MCP_ROUTE_TOKEN ` | — |
375- | ` --cors ` | ` SEER_MCP_CORS ` | ` false ` |
376- | ` --tls-cert ` | ` SEER_MCP_TLS_CERT ` | — |
377- | ` --tls-key ` | ` SEER_MCP_TLS_KEY ` | — |
378-
379- > Pass ` --cors ` (or ` SEER_MCP_CORS =true` ) to enable CORS headers for browser-based clients (e.g. claude.ai). Disabled by default.
368+ | Flag | Environment variable | Default |
369+ | --------------- | ----------------------- | ------- |
370+ | ` --transport ` | ` SEERR_MCP_TRANSPORT ` | ` stdio ` |
371+ | ` --addr ` | ` SEERR_MCP_ADDR ` | ` :8811 ` |
372+ | ` --auth-token ` | ` SEERR_MCP_AUTH_TOKEN ` | — |
373+ | ` --no-auth ` | ` SEERR_MCP_NO_AUTH ` | ` false ` |
374+ | ` --route-token ` | ` SEERR_MCP_ROUTE_TOKEN ` | — |
375+ | ` --cors ` | ` SEERR_MCP_CORS ` | ` false ` |
376+ | ` --tls-cert ` | ` SEERR_MCP_TLS_CERT ` | — |
377+ | ` --tls-key ` | ` SEERR_MCP_TLS_KEY ` | — |
378+
379+ > Pass ` --cors ` (or ` SEERR_MCP_CORS =true` ) to enable CORS headers for browser-based clients (e.g. claude.ai). Disabled by default.
380380
381381> The HTTP transport does not implement OAuth 2.0. Use stdio for Claude Desktop.
382382
0 commit comments