Register in Consul. Routes, load balancing, security, and observability are configured automatically through metadata. No database. No YAML routes. No restarts.
No gateway configuration files. Services declare their own routing, security, and throttling policies as Consul metadata. CAPI does the rest.
{
"ID": "order-service-1",
"Name": "order-service",
"Address": "10.0.1.50",
"Port": 8080,
"Meta": {
"group": "production", // route: /api/order-service/production/*
"root-context": "/api/v2", // forwarded path prefix
"schema": "https", // upstream protocol
"secured": "true", // enable OAuth2/OIDC validation
"oidc-provider": "keycloak", // which OIDC provider to use
"throttling-max": "100", // max requests per period
"type": "rest" // rest | websocket | sse
}
}
Security, observability, and traffic management — configured via service metadata, not gateway configuration files.
Your REST APIs become MCP tools instantly. No code changes, no MCP SDKs, no protocol rewrites on your backends.
tools/call into plain HTTP requests. Your backend never sees JSON-RPC.mcp-type: server. CAPI discovers tools via tools/list and proxies transparently — with load balancing and failover.Purpose-built for Consul-native environments. No database, no declarative routes, no plugins to install.
| CAPI | Kong | Traefik | WSO2 | Spring Cloud GW | |
|---|---|---|---|---|---|
| Consul auto-discovery | ● Native | Plugin | Yes | — | Manual |
| Route config required | ● None | Admin API / DB | Labels / files | Admin portal | YAML / code |
| External database | ● Not needed | PostgreSQL | Not needed | PostgreSQL / MySQL | Not needed |
| OAuth2 / OIDC built-in | ● Yes | Enterprise / Plugin | Middleware | Yes | Yes |
| OPA integration | ● Built-in | Plugin | Plugin | Manual | Manual |
| WebSocket & SSE | ● Yes | Yes | Yes | Yes | Yes |
| OpenTelemetry | ● Native OTLP | Plugin | Yes | Custom | Manual |
| MCP Gateway (LLM tools) | ● Built-in | — | — | — | — |
| Runtime footprint | ● ~120 MB | ~500 MB+ | ~100 MB | ~1 GB+ | ~200 MB |
One command brings up the full ecosystem — CAPI, Consul, Keycloak, OPA, OpenSearch, and sample services.
# Clone and start git clone https://github.com/surisoft-io/capi-core.git cd capi-core/docker docker compose up -d # Your endpoints # Gateway → http://localhost:8380 # Admin API → http://localhost:8381 # MCP Gateway → http://localhost:8383 # Consul UI → http://localhost:8500 # Try it curl http://localhost:8380/api/public-service/dev/hello
# Run from JAR CAPI_CONFIG_FILE=config/config.yaml \ java -jar capi-core.jar # Or deploy with Helm helm install capi-core helm/capi-core # With custom values helm install capi-core helm/capi-core \ -f my-values.yaml # Enable SSL helm install capi-core helm/capi-core \ --set capi.ssl.enabled=true \ --set capi.ssl.keystoreBase64=<b64>
CAPI was built and battle-tested inside a complex hybrid government environment over four years. The team behind it offers consulting and professional services to help organizations deploy, customize, and get the most out of their API infrastructure.
CAPI is open-source under the Apache 2.0 license. Try the Docker Compose stack, explore the docs, or talk to us about professional deployment.