Automatic RESTful API generator with redoc
Project description
flarchitect
flarchitect is a friendly Flask extension that turns your SQLAlchemy or Flask-SQLAlchemy models into a production-ready REST API in minutes while keeping you in full control of your models and endpoints. It automatically builds CRUD endpoints, generates interactive Redoc documentation and keeps responses consistent so you can focus on your application logic.
Why flarchitect?
If you're new here, welcome! flarchitect gets you from data models to a fully fledged REST API in minutes, saving you time without sacrificing quality or customisation.
Features
- Automatic CRUD endpoints – expose SQLAlchemy models as RESTful resources with a simple
Metaclass. - Interactive documentation – Redoc or Swagger UI generated at runtime and kept in sync with your models.
- Built-in authentication – JWT, basic and API key strategies ship with a ready‑made
/auth/loginendpoint, or plug in your own. - Extensibility hooks – customise request and response flows.
- Soft delete – hide and restore records without permanently removing them.
- GraphQL integration – expose your models through a single
/graphqlendpoint when you need more flexible queries.
Performance & Observability
- Request-local config caching – repeated calls to resolve config/model meta are cached per request to reduce overhead.
- Schema class caching – dynamic schema classes and subclass lookups are cached to skip repeated reflection.
- Correlation IDs – every response includes
X-Request-ID(propagates inbound header when present). - Structured logs (optional) – JSON logs include method, path, status, latency and
request_id.
Optional extras
- Rate limiting & structured responses – configurable throttling and consistent response schema.
- Field validation – built-in validators for emails, URLs, IPs and more.
- Nested writes – send related objects in POST/PUT payloads when
API_ALLOW_NESTED_WRITESisTrue. - CORS support – enable cross-origin requests with
API_ENABLE_CORS.
Real-time updates (optional)
Enable lightweight WebSocket broadcasts for CRUD changes:
app.config.update(
API_ENABLE_WEBSOCKETS=True,
API_WEBSOCKET_PATH="/ws", # optional
)
Install the optional dependency: pip install flask-sock. Clients can connect
to ws://<host>/ws?topic=<model> (or omit topic to receive all events).
See the docs page “WebSockets” for details and examples.
Installation
flarchitect supports Python 3.10 and newer. Set up a virtual environment, install the package and verify the install:
python -m venv venv
source venv/bin/activate # On Windows use: venv\Scripts\activate
pip install flarchitect
python -c "import flarchitect; print(flarchitect.__version__)"
The final command prints the version number to confirm everything installed correctly.
Quick Start
from flask import Flask
from flarchitect import Architect
from models import Author, BaseModel # your SQLAlchemy models
app = Flask(__name__)
app.config["API_TITLE"] = "My API"
app.config["API_VERSION"] = "1.0"
app.config["API_BASE_MODEL"] = BaseModel
app.config["API_ALLOW_NESTED_WRITES"] = True
architect = Architect(app)
if __name__ == "__main__":
app.run(debug=True)
With the application running, try your new API in another terminal window:
curl http://localhost:5000/api/authors
Important: For models to be auto-registered for CRUD routes and included in the generated docs, each model must define an inner Meta class. The tag and tag_group attributes are optional and only influence how endpoints are grouped in the docs. Models without Meta are ignored by route generation and documentation.
Authentication
flarchitect ships with ready‑to‑use JWT, Basic and API key authentication. Enable one or more strategies with
API_AUTHENTICATE_METHOD.
What you get out of the box:
- A set of
/authendpoints when JWT is enabled:/auth/login,/auth/logout,/auth/refresh. - Consistent error responses (HTTP 401/403) with a clear
reasonstring. - Helpers for per‑route protection and role checks.
JWT
Configuration (the minimal set):
app.config.update(
API_AUTHENTICATE_METHOD=["jwt"],
ACCESS_SECRET_KEY="access-secret", # or set env var ACCESS_SECRET_KEY
REFRESH_SECRET_KEY="refresh-secret", # or set env var REFRESH_SECRET_KEY
API_USER_MODEL=User, # your SQLAlchemy model
API_USER_LOOKUP_FIELD="username", # field used to find the user
API_CREDENTIAL_CHECK_METHOD="check_password", # method on User to verify password
)
Endpoints and payloads:
POST /auth/loginwith JSON{"username": "alice", "password": "secret"}returns{ "access_token": "...", "refresh_token": "...", "user_pk": 1 }on success.POST /auth/refreshwith JSON{ "refresh_token": "..." }returns a new access token. A leading"Bearer "prefix is tolerated and removed. Invalid refresh JWTs return401; unknown/revoked/expired refresh tokens return403.POST /auth/logoutclears user context (stateless logout; refresh tokens are invalidated on use/expiry).
Token payloads include both the user's primary key and lookup field (e.g. username/email) to support flexible client flows. Keys are derived via configured model/meta helpers; ensure ACCESS_SECRET_KEY and REFRESH_SECRET_KEY are set via env or Flask config.
Protecting routes:
- Via decorator:
from flarchitect.core.architect import jwt_authenticationand decorate the view:@jwt_authentication. - Via schema wrapper:
@architect.schema_constructor(output_schema=..., auth=True)when generating routes with Architect.
Token settings and key resolution:
- Access token lifetime:
API_JWT_EXPIRY_TIME(minutes, default360). - Refresh token lifetime:
API_JWT_REFRESH_EXPIRY_TIME(minutes, default2880). - Algorithm:
API_JWT_ALGORITHM(HS256by default). To restrict verification to specific algorithms, setAPI_JWT_ALLOWED_ALGORITHMS(list or comma‑separated string). - Issuer and audience: set
API_JWT_ISSUERand/orAPI_JWT_AUDIENCEto include and enforceiss/audclaims. - Clock skew: allow small time drift during verification with
API_JWT_LEEWAY(seconds, default0). - RS256 support: when
API_JWT_ALGORITHM="RS256", sign withACCESS_PRIVATE_KEYand verify withACCESS_PUBLIC_KEY(PEM strings). Refresh tokens useREFRESH_PRIVATE_KEY/REFRESH_PUBLIC_KEY. For backwards compatibility, if onlyACCESS_SECRET_KEY/REFRESH_SECRET_KEYare provided they are used to verify, but key pairs are recommended. get_user_from_token(secret_key=...)secret selection order: explicit argument >ACCESS_SECRET_KEYenv var > FlaskACCESS_SECRET_KEYconfig (or public key when using RS*).
Auth route configuration:
- Auto-registration can be disabled with
API_AUTO_AUTH_ROUTES=False. - Change the refresh path with
API_AUTH_REFRESH_ROUTE(default/auth/refresh).
Refresh token rotation and revocation:
- Refresh tokens are single‑use: calling
/auth/refreshrevokes the old refresh token and issues a new one. - Revocation (deny‑list) and auditing: the refresh token store records
created_at,last_used_at,revoked,revoked_at, and links to thereplaced_bytoken for traceability. Admins can revoke tokens programmatically viaflarchitect.authentication.token_store.revoke_refresh_token.
Basic
app.config.update(
API_AUTHENTICATE_METHOD=["basic"],
API_USER_MODEL=User,
API_USER_LOOKUP_FIELD="username",
API_CREDENTIAL_CHECK_METHOD="check_password",
)
Usage: send an Authorization: Basic <base64(username:password)> header. You can also protect routes via
@architect.schema_constructor(..., auth=True).
API key
Two options:
- Provide a custom lookup function that both authenticates and returns the user:
def lookup_user_by_token(token: str) -> User | None:
return User.query.filter_by(api_key=token).first()
app.config.update(
API_AUTHENTICATE_METHOD=["api_key"],
API_KEY_AUTH_AND_RETURN_METHOD=staticmethod(lookup_user_by_token),
)
- Or use a hashed field and a verification method on the model:
app.config.update(
API_AUTHENTICATE_METHOD=["api_key"],
API_USER_MODEL=User,
API_CREDENTIAL_HASH_FIELD="api_key_hash",
API_CREDENTIAL_CHECK_METHOD="check_api_key",
)
Usage: send an Authorization: Api-Key <token> header.
Role‑based access control:
from flarchitect.authentication import require_roles
@app.get("/admin")
@jwt_authentication
@require_roles("admin")
def admin_panel():
...
You can also protect all generated CRUD routes without decorators using a config‑driven map:
app.config.update(
API_AUTHENTICATE_METHOD=["jwt"],
API_ROLE_MAP={
"GET": ["viewer"],
"POST": {"roles": ["editor", "admin"], "any_of": True},
"DELETE": ["admin"],
},
)
See docs: Authentication → Role‑based access → Config‑driven roles.
Enriched 403 responses on role mismatch:
When a request fails role checks, the response includes contextual details to aid debugging and clients:
{
"errors": {
"error": "forbidden",
"message": "Missing required role(s) for this action.",
"required_roles": ["editor", "admin"],
"any_of": false,
"method": "POST",
"path": "/api/widgets",
"resource": "widgets",
"user": {"id": 42, "username": "alice", "roles": ["member"]},
"lookup": {"pk": 42, "lookups": {"username": "alice"}},
"resolved_from": "POST",
"reason": "missing_roles"
}
}
Notes:
- Driven by
API_ROLE_MAPwith keys checked in order:GET(for GET), then method, thenALL, then*. - Accepts
"admin",["editor","admin"], or{ "roles": [...], "any_of": true }shapes. - Uses best‑effort enrichment; when helper functions or config are absent, behaviour falls back to existing responses.
See the full Authentication guide in the hosted docs for advanced configuration and custom strategies.
OpenAPI specification
An OpenAPI 3 schema is generated automatically and powers the Redoc UI. You
can switch to Swagger‑UI by setting API_DOCS_STYLE = 'swagger' in your Flask
config. Either way you can serve the raw specification to integrate with
tooling such as Postman:
from flask import Flask
from flarchitect import Architect
app = Flask(__name__)
architect = Architect(app) # Docs at /docs; JSON spec at /docs/apispec.json (canonical)
The canonical JSON for the docs UI is configurable via API_DOCS_SPEC_ROUTE (default /docs/apispec.json).
The legacy top‑level API_SPEC_ROUTE (default /openapi.json) now redirects to the docs JSON and will be removed in a future release.
See the OpenAPI docs for exporting or customising the document.
Relation route naming
Control how the trailing segment of relation routes is generated and avoid collisions when multiple relationships target the same model.
Configuration precedence: Meta.relation_route_naming (on the source/parent model) → API_RELATION_ROUTE_NAMING (global) → default "model".
Allowed values:
"model"(default): Use the target model endpoint (e.g./api/friends/<int:id>/users). Matches legacy behaviour."relationship": Use the SQLAlchemy relationship key (rel.key) for the last segment (e.g./api/friends/<int:id>/userand/api/friends/<int:id>/friend)."auto": Use"relationship"naming only when it avoids a collision (e.g. multi‑FK to the same model); otherwise fall back to"model".
Optional per‑relationship aliasing in the URL segment is supported when using relationship‑based naming via Meta.relation_route_map = {"user": "owner", "friend": "contact"} on the parent model.
Notes:
- Function names include a
_{rel_key}suffix idempotently to avoid endpoint name collisions. - OpenAPI operationIds remain stable and unique under relationship‑based and auto modes.
Performance: Caching
Two low-risk caches improve request throughput without changing public APIs:
- Config/meta cache:
get_config_or_model_metacaches positive lookups per request. This avoids repeated Flask config and modelMetaintrospection during routing, schema generation and auth checks. - Schema class cache: dynamic schema classes and subclass lookups are memoised at
module level. Schema instances are still created per call so request-specific
options (e.g.
join,dump_relationships, recursion depth) remain correct.
No configuration is required to enable these caches. They are safe in multi-threaded environments and reset naturally between requests.
Observability: Request IDs and JSON logs
Every request is assigned a correlation ID and returned via the X-Request-ID
response header. If a client sends its own X-Request-ID, that value is propagated.
To also include the correlation ID in the JSON response body, opt in with:
app.config["API_DUMP_REQUEST_ID"] = True # default False
Enable structured JSON logs for production:
app.config.update(
API_JSON_LOGS=True, # emit JSON lines with context
API_VERBOSITY_LEVEL=1, # 0=quiet, higher=more verbose
API_LOG_REQUESTS=True, # default True; per-request completion log
)
Example log line (pretty-printed for readability):
{
"event": "log",
"lvl": 1,
"message": "Completed GET /api/items -> 200",
"method": "GET",
"path": "/api/items",
"request_id": "e5f9c0c8f2ac4c58b6a1c5b6d8d3e9a1",
"latency_ms": 12
}
When API_JSON_LOGS is False (default), logs are colourised for humans and the
X-Request-ID header remains available for correlation.
GraphQL
Prefer working with a single endpoint? flarchitect can turn your SQLAlchemy
models into a GraphQL schema with just a couple of lines. Generate the schema
and register it with the architect:
from flarchitect.graphql import create_schema_from_models
schema = create_schema_from_models([Item], db.session)
architect.init_graphql(schema=schema)
The generated schema exposes CRUD-style queries and mutations for each model,
including all_items, item, create_item, update_item and delete_item.
Column-level filtering and simple pagination are built in via arguments on the
all_<table> queries:
query {
all_items(name: "Foo", limit: 10, offset: 0) {
id
name
}
}
Mutations manage records:
mutation {
update_item(id: 1, name: "Bar") {
id
name
}
}
mutation {
delete_item(id: 1)
}
Custom SQLAlchemy types can be mapped to Graphene scalars by supplying a
type_mapping override:
schema = create_schema_from_models(
[Item], db.session, type_mapping={MyType: graphene.String}
)
Run your app and open
GraphiQL at
http://localhost:5000/graphql to explore your data interactively. A browser
visit issues a GET request that serves the GraphiQL interface, while POST
requests accept GraphQL operations as JSON.
Quick start:
pip install flarchitect
python app.py # start your Flask app
# then visit http://localhost:5000/graphql
The GraphQL demo contains ready-made models and sample queries to help you get started. Read the detailed GraphQL docs for advanced usage and configuration options.
Read about hiding and restoring records in the soft delete section.
Running Tests
To run the test suite locally:
pip install -e .[dev]
export ACCESS_SECRET_KEY=access
export REFRESH_SECRET_KEY=refresh
pytest
The ACCESS_SECRET_KEY and REFRESH_SECRET_KEY environment variables are required for JWT-related tests. Adjust the export
commands for your shell and operating system.
Documentation & help
- Browse the full documentation for tutorials and API reference.
- Explore runnable examples in the demo directory, including a validators example showcasing email and URL validation.
- Authentication demos: JWT, Basic and API key snippets showcase the built-in strategies.
- Questions? Join the GitHub discussions or open an issue.
- See the changelog for release history.
Roadmap
Check out the project roadmap for upcoming features and enhancements.
Contributing
Contributions are welcome! For major changes, please open an issue first to discuss what you would like to change.
Before submitting a pull request, ensure that development dependencies are installed and linters and tests pass locally:
pip install -e .[dev]
ruff --fix .
export ACCESS_SECRET_KEY=access
export REFRESH_SECRET_KEY=refresh
pytest
To run tests with coverage (HTML + XML reports), use:
bash scripts/coverage.sh
MCP Documentation Server
flarchitect ships with an optional Model Context Protocol server so agents can browse and search the project documentation without bespoke adapters.
- Install the extra dependency group (ships the
fastmcpbackend):pip install flarchitect[mcp](oruv pip install '.[mcp]'). - Start the server from your repository root:
flarchitect-mcp-docs --project-root . --backend fastmcpto prefer thefastmcpruntime (falls back to the reference implementation if it is available).- Need the reference backend? Install the upstream SDK manually:
pip install 'mcp @ git+https://github.com/modelcontextprotocol/python-sdk@main', then restart with--backend reference.
- Need the reference backend? Install the upstream SDK manually:
- Point your MCP-capable client at the process. Resources follow the
flarchitect-doc://<doc-id>scheme and serve the semantic-chunked Markdown underdocs/md(with a packaged fallback when the directory is absent). The original reStructuredText sources are still used as input but converted on demand.
Available tools:
list_docs– enumerate indexed document identifiers and titles for discovery.search_docs– substring search with snippets and line numbers.get_doc_section– return an entire document or a specific heading slice (Markdown and reStructuredText are supported).
Regenerating AI-ready docs
The Markdown in docs/md and the discovery manifest llms.txt are generated from the Sphinx sources. Regenerate them after editing any .rst file:
python tools/convert_docs.py
The script chunks large guides into smaller Markdown files, strips Sphinx-only roles, and updates the root llms.txt (consumed by platforms that understand the llms.txt specification). Do not edit the generated Markdown or llms.txt by hand—changes will be overwritten on the next conversion.
The CLI reuses the DocumentIndex helper so file changes are picked up on restart. Use --name, --description, --backend, or --project-root to customise the advertised metadata, backend and docs location.
Versioning & Releases
The package version is defined in pyproject.toml and exposed as flarchitect.__version__. A GitHub Actions workflow automatically publishes to PyPI when the version changes on master.
To publish a new release:
- Update the
versionfield inpyproject.toml(for example withhatch version patch). - Commit and push to
master.
Ensure the repository has a PYPI_API_TOKEN secret with an API token from PyPI.
UK English API Names
This project now uses UK English spellings for public helpers while maintaining backwards‑compatible aliases:
deserialise_data(alias:deserialize_data)serialise_output_with_mallow(alias:serialize_output_with_mallow)standardise_response(alias:standardize_response)initialise_spec_template(alias:initialize_spec_template)handle_authorisation(alias:handle_authorization)AttributeInitialiserMixin(alias class ofAttributeInitializerMixin)
Existing code using the US spellings continues to work. Prefer the UK forms in new code and documentation.
License
Distributed under the MIT License. See LICENSE for details.
Per-request dump type and join semantics
You can override the configured serialization type per request using the dump query parameter.
dump=url(default): relationships are rendered as URLsdump=json: relationships are always inlined as nested objectsdump=dynamic: only relationships listed injoinare inlined; others are URLsdump=hybrid: to-one relationships are nested; collections are URLs
Example:
GET /api/invoices?dump=dynamic&join=invoice-lines,payments,customer
The join parameter accepts comma-separated tokens matching either relationship keys (e.g. author) or endpoint-style plural names (e.g. authors). Tokens are normalised case-insensitively and with hyphens treated as underscores. Singular/plural forms are resolved automatically.
You may also control SQL join semantics via join_type:
join_type=inner(default)join_type=left(left outer join)join_type=outer(left outer join)join_type=right(best-effort right join; may behave likeleftdepending on ORM relationship)
Pagination continues to operate over distinct base entities after joins to avoid row multiplication.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file flarchitect-1.3.4.tar.gz.
File metadata
- Download URL: flarchitect-1.3.4.tar.gz
- Upload date:
- Size: 203.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
5e19a02c6ba624d970e4ce5ae0d7bd7ed5245692ba22cd2c10cca8f60d89faf4
|
|
| MD5 |
ac4880e9ea517d319036748df7d0d5ae
|
|
| BLAKE2b-256 |
097e7e76eabcf0698b7830b711671b38c9651a2174db4025097c8cb0d22a6cc5
|
Provenance
The following attestation bundles were made for flarchitect-1.3.4.tar.gz:
Publisher:
release.yml on lewis-morris/flarchitect
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
flarchitect-1.3.4.tar.gz -
Subject digest:
5e19a02c6ba624d970e4ce5ae0d7bd7ed5245692ba22cd2c10cca8f60d89faf4 - Sigstore transparency entry: 533498180
- Sigstore integration time:
-
Permalink:
lewis-morris/flarchitect@89f8c7394a9308222b81cc7aaccc356e4a7f2b2c -
Branch / Tag:
refs/heads/master - Owner: https://github.com/lewis-morris
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@89f8c7394a9308222b81cc7aaccc356e4a7f2b2c -
Trigger Event:
push
-
Statement type:
File details
Details for the file flarchitect-1.3.4-py3-none-any.whl.
File metadata
- Download URL: flarchitect-1.3.4-py3-none-any.whl
- Upload date:
- Size: 287.7 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
d9777db08184d36e443f0b25c1125d1e6084c59a2033453a0e01ce2b77daa52d
|
|
| MD5 |
a70b5b32bb8de8cdb30d9d617d68cb3c
|
|
| BLAKE2b-256 |
cc773843355f10a28c8fbc5d2f1363d285c62fa81d035b8f85ca0f2bd5f307c4
|
Provenance
The following attestation bundles were made for flarchitect-1.3.4-py3-none-any.whl:
Publisher:
release.yml on lewis-morris/flarchitect
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
flarchitect-1.3.4-py3-none-any.whl -
Subject digest:
d9777db08184d36e443f0b25c1125d1e6084c59a2033453a0e01ce2b77daa52d - Sigstore transparency entry: 533498184
- Sigstore integration time:
-
Permalink:
lewis-morris/flarchitect@89f8c7394a9308222b81cc7aaccc356e4a7f2b2c -
Branch / Tag:
refs/heads/master - Owner: https://github.com/lewis-morris
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@89f8c7394a9308222b81cc7aaccc356e4a7f2b2c -
Trigger Event:
push
-
Statement type: