Skip to content

feat: implement read access control for GET /v1/* routes and enhance health endpoint response#49

Merged
Gsbreddy merged 2 commits into
mainfrom
2026-05-03-1bic
May 3, 2026
Merged

feat: implement read access control for GET /v1/* routes and enhance health endpoint response#49
Gsbreddy merged 2 commits into
mainfrom
2026-05-03-1bic

Conversation

@Gsbreddy
Copy link
Copy Markdown
Collaborator

@Gsbreddy Gsbreddy commented May 3, 2026

Summary

Why

Changes

Validation

Run the same checks as CI (see .github/workflows/ci.yml) before opening / updating the PR. Cursor loads .cursor/rules/flightdeck-ci-artifacts.mdc as a short reminder for static/ + schemas/ gates.

  • uv sync --frozen --extra dev
  • uv run python -m ruff check src tests
  • uv run python -m pytest
  • uv run python scripts/generate_schemas.py then git diff --exit-code schemas/ (if models/schemas touched)
  • cd web && npm ci && npm run build && cd .. && git diff --exit-code src/flightdeck/server/static/ (if web/ sources, Vite config, or web/ deps / lockfile change the production bundle)
  • cd web && npx playwright install chromium && npm run test:e2e (if web/ changed)
  • uv run flightdeck-quickstart-verify
  • uv run flightdeck --help

With pip / venv only, use python -m … equivalents from DEVELOPMENT.md.

Schema / Storage Impact

  • None
  • Schema change
  • Storage change

Risk

Review

  • Requested review from maintainers (CODEOWNERS@flightdeckdev/maintainers on the org repo). On a fork, GitHub may not auto-request; use Reviewers on the PR.
  • PR is small and scoped (see AGENTS.md); linked issue or release note intent noted if helpful.

Notes

zendaya added 2 commits May 3, 2026 18:22
…health endpoint response

- Introduced `require_protected_read_access` to enforce Bearer token authentication for read routes when `FLIGHTDECK_LOCAL_API_TOKEN` is set, aligning with the existing mutation access model.
- Updated the `/health` endpoint to include `read_auth` in the response, indicating whether read routes require Bearer authentication.
- Enhanced documentation to clarify the new access requirements for read APIs and updated related tests to validate the changes.

This update strengthens security by ensuring that read operations are also protected when a local API token is configured, providing a consistent access control model across the API.
@Gsbreddy Gsbreddy merged commit 2c6a1cb into main May 3, 2026
3 checks passed
@Gsbreddy Gsbreddy deleted the 2026-05-03-1bic branch May 3, 2026 16:26
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants