Skip to content

feat: protect admin routes with optional basic auth#164

Closed
davetha wants to merge 6 commits intorynfar:mainfrom
davetha:feature/admin-route-protection
Closed

feat: protect admin routes with optional basic auth#164
davetha wants to merge 6 commits intorynfar:mainfrom
davetha:feature/admin-route-protection

Conversation

@davetha
Copy link
Copy Markdown

@davetha davetha commented Mar 26, 2026

Summary

  • add optional protection for /health, /telemetry, and /telemetry/*
  • support a separate admin key set or fall back to the existing request keys
  • add optional Basic Auth so browser access to telemetry/health can prompt instead of only returning JSON 401s

Use Case

My goal is to run one Meridian instance for multiple machines and access it over my private network or Tailscale. In that setup, I still want tighter control over who can see /health and /telemetry, not just who can call /v1/messages.

Basic Auth helps for browser access, while admin API keys still work for scripts and tooling.

Dependency

Draft because this currently stacks on top of:

GitHub cannot express the exact stacked base across forks, so this draft PR includes earlier work until the lower PRs merge.

Testing

  • bun test src/__tests__/proxy-admin-auth.test.ts src/__tests__/proxy-auth.test.ts src/__tests__/configLoader.test.ts
  • npm run build

@davetha
Copy link
Copy Markdown
Author

davetha commented Mar 27, 2026

Superseded by a new PR that includes a health check fix for multi-profile Docker setups.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant