Greenfield Go multi-tenant IPFS Pinning Service wire-compatible with the
IPFS Pinning Services API spec. Paired 1:1 with Kubo over localhost RPC,
clustered via embedded NATS JetStream, Postgres source-of-truth with
RLS-enforced tenancy, Fiber + huma v2 for the HTTP surface, Authentik
OIDC for session login with kid-rotated HS256 JWT API tokens.
Feature-complete against the 22-milestone build plan, including the
ship-it v1.0 gap items:
* admin CLIs: drain/uncordon, maintenance, mint-token, rotate-key,
prune-denylist, rebalance --dry-run, cache-stats, cluster-presences
* TTL leader election via NATS KV, fence tokens, JetStream dedup
* rebalancer (plan/apply split), reconciler, requeue sweeper
* ristretto caches with NATS-backed cross-node invalidation
(placements live-nodes + token denylist)
* maintenance watchdog for stuck cluster-pause flag
* Prometheus /metrics with CIDR ACL, HTTP/pin/scheduler/cache gauges
* rate limiting: session (10/min) + anonymous global (120/min)
* integration tests: rebalance, refcount multi-org, RLS belt
* goreleaser (tar + deb/rpm/apk + Alpine Docker) targeting Gitea
Stack: Cobra/Viper, Fiber v2 + huma v2, embedded NATS JetStream,
pgx/sqlc/golang-migrate, ristretto, TypeID, prometheus/client_golang,
testcontainers-go.
1.7 KiB
1.7 KiB
Authentication
Setting up Authentik? See authentik-setup.md for the step-by-step provider + application + property-mapping walkthrough and the matching anchorage.yaml snippet.
Actors
- Browser users — authenticate once via Authentik (OIDC, Authorization Code + PKCE). anchorage validates Authentik's ID token against its JWKS, upserts the user, issues a short-lived session cookie.
- Programmatic clients (kubo's
ipfs pin remote, CI pipelines, scripts) — presentAuthorization: Bearer <jwt>where the JWT was minted by anchorage itself.
Token lifecycle
- Signed-in user calls
POST /v1/tokenswith a label + scopes. - anchorage signs a JWT:
{sub, org, role, scopes, jti, iat, exp}. Thejtiis a TypeID (tok_...). Only the metadata (label, scopes, expires_at) is persisted; the signed string is returned to the user once. - Client presents the JWT. Middleware validates signature + expiry + denylist (
token_denylistkeyed byjti). - Revocation writes the
jtitotoken_denylistwith its natural expiry; the row is pruned hourly.
Why JWT + denylist rather than opaque DB tokens
- Denylist is only consulted for revoked tokens — a warm
token/denyristretto cache means the hot path is zero DB reads. - Claims travel with the request — RLS can set
anchorage.org_idper-transaction from the JWT without another lookup. - Short TTLs (default 24h) plus revocation cover the usual "compromised token" threat model without requiring per-request DB hits.
Sysadmin bootstrap
bootstrap.sysadmins: [admin@example.com, ...] in config. First Authentik login for any listed email promotes the user to is_sysadmin=true. The config is only consulted on first login; later changes need the admin CLI.