You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Triggered by health check detecting offline installation
197
+
- Sets status to `connecting`
198
+
- Satellite rediscovers tools
199
+
- Status progresses: offline → connecting → discovering_tools → online
200
+
201
+
For complete recovery system documentation, see [Backend Communication - Auto-Recovery](/development/backend/satellite/communication#auto-recovery-system).
202
+
171
203
## Critical Pattern
172
204
173
205
**ALWAYS use the correct convenience method**:
@@ -247,9 +279,22 @@ When satellites receive commands:
247
279
3. Execute spawn sequence
248
280
249
281
**For `health_check` commands**:
250
-
1. Call tools/list on target server
251
-
2. Verify response
252
-
3. Report health status
282
+
1. Check `payload.check_type` field:
283
+
-`connectivity` (default): Call tools/list to verify server responds
284
+
-`credential_validation`: Validate OAuth tokens for installation
285
+
2. Execute appropriate validation
286
+
3. Report health status via `mcp.server.status_changed` event:
287
+
-`online` - Health check passed
288
+
-`requires_reauth` - OAuth token expired/revoked
289
+
-`error` - Validation failed with error
290
+
291
+
**Credential Validation Flow**:
292
+
- Backend cron job sends `health_check` command with `check_type: 'credential_validation'`
Copy file name to clipboardExpand all lines: development/backend/satellite/communication.mdx
+182-4Lines changed: 182 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -106,20 +106,20 @@ The system uses three distinct communication patterns:
106
106
107
107
### Security Architecture
108
108
109
-
The satellite pairing process implements a secure **two-phase JWT-based authentication system** that prevents unauthorized satellite connections. For complete implementation details, see [API Security - Registration Token Authentication](/development/backend/api/security#registration-token-authentication).
109
+
The satellite pairing process implements a secure **two-step JWT-based authentication system** that prevents unauthorized satellite connections. For complete implementation details, see [API Security - Registration Token Authentication](/development/backend/api/security#registration-token-authentication).
110
110
111
-
**Phase 1: Token Generation**
111
+
**Step 1: Token Generation**
112
112
- Administrators generate temporary registration tokens through admin APIs
113
113
- Scope-specific tokens (global vs team) with cryptographic signatures
114
114
- Token management endpoints for generation, listing, and revocation
115
115
116
-
**Phase 2: Satellite Registration**
116
+
**Step 2: Satellite Registration**
117
117
- Satellites authenticate using `Authorization: Bearer deploystack_satellite_*` headers
118
118
- Backend validates JWT tokens with single-use consumption
119
119
- Permanent API keys issued after successful token validation
120
120
- Token consumed to prevent replay attacks
121
121
122
-
**Breaking Change**: As of Phase 3 implementation, all new satellite registrations require valid registration tokens. The open registration system has been secured.
122
+
**Note**: All new satellite registrations require valid registration tokens. The open registration system has been secured.
123
123
124
124
### Registration Middleware
125
125
@@ -261,6 +261,153 @@ Configuration respects team boundaries and isolation:
261
261
- Team-defined security policies
262
262
- Internal resource access settings
263
263
264
+
## Frontend API Endpoints
265
+
266
+
The backend provides REST and SSE endpoints for frontend access to installation status, logs, and requests.
0 commit comments