Greenfield Go multi-tenant IPFS Pinning Service wire-compatible with the
IPFS Pinning Services API spec. Paired 1:1 with Kubo over localhost RPC,
clustered via embedded NATS JetStream, Postgres source-of-truth with
RLS-enforced tenancy, Fiber + huma v2 for the HTTP surface, Authentik
OIDC for session login with kid-rotated HS256 JWT API tokens.
Feature-complete against the 22-milestone build plan, including the
ship-it v1.0 gap items:
* admin CLIs: drain/uncordon, maintenance, mint-token, rotate-key,
prune-denylist, rebalance --dry-run, cache-stats, cluster-presences
* TTL leader election via NATS KV, fence tokens, JetStream dedup
* rebalancer (plan/apply split), reconciler, requeue sweeper
* ristretto caches with NATS-backed cross-node invalidation
(placements live-nodes + token denylist)
* maintenance watchdog for stuck cluster-pause flag
* Prometheus /metrics with CIDR ACL, HTTP/pin/scheduler/cache gauges
* rate limiting: session (10/min) + anonymous global (120/min)
* integration tests: rebalance, refcount multi-org, RLS belt
* goreleaser (tar + deb/rpm/apk + Alpine Docker) targeting Gitea
Stack: Cobra/Viper, Fiber v2 + huma v2, embedded NATS JetStream,
pgx/sqlc/golang-migrate, ristretto, TypeID, prometheus/client_golang,
testcontainers-go.
84 lines
1.6 KiB
Go
84 lines
1.6 KiB
Go
// Code generated by sqlc. DO NOT EDIT.
|
|
// versions:
|
|
// sqlc v1.30.0
|
|
// source: audit.sql
|
|
|
|
package sqlc
|
|
|
|
import (
|
|
"context"
|
|
|
|
"anchorage/internal/pkg/ids"
|
|
)
|
|
|
|
const insertAudit = `-- name: InsertAudit :exec
|
|
INSERT INTO audit_log (org_id, actor_user_id, actor_token_jti, action, target, result, detail)
|
|
VALUES ($1, $2, $3, $4, $5, $6, $7)
|
|
`
|
|
|
|
type InsertAuditParams struct {
|
|
OrgID ids.OrgID
|
|
ActorUserID ids.UserID
|
|
ActorTokenJti *string
|
|
Action string
|
|
Target string
|
|
Result string
|
|
Detail []byte
|
|
}
|
|
|
|
func (q *Queries) InsertAudit(ctx context.Context, arg InsertAuditParams) error {
|
|
_, err := q.db.Exec(ctx, insertAudit,
|
|
arg.OrgID,
|
|
arg.ActorUserID,
|
|
arg.ActorTokenJti,
|
|
arg.Action,
|
|
arg.Target,
|
|
arg.Result,
|
|
arg.Detail,
|
|
)
|
|
return err
|
|
}
|
|
|
|
const listAudit = `-- name: ListAudit :many
|
|
SELECT id, org_id, actor_user_id, actor_token_jti, action, target, result, detail, created FROM audit_log
|
|
WHERE org_id = $1
|
|
ORDER BY created DESC
|
|
LIMIT $2 OFFSET $3
|
|
`
|
|
|
|
type ListAuditParams struct {
|
|
OrgID ids.OrgID
|
|
Limit int32
|
|
Offset int32
|
|
}
|
|
|
|
func (q *Queries) ListAudit(ctx context.Context, arg ListAuditParams) ([]AuditLog, error) {
|
|
rows, err := q.db.Query(ctx, listAudit, arg.OrgID, arg.Limit, arg.Offset)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
defer rows.Close()
|
|
var items []AuditLog
|
|
for rows.Next() {
|
|
var i AuditLog
|
|
if err := rows.Scan(
|
|
&i.ID,
|
|
&i.OrgID,
|
|
&i.ActorUserID,
|
|
&i.ActorTokenJti,
|
|
&i.Action,
|
|
&i.Target,
|
|
&i.Result,
|
|
&i.Detail,
|
|
&i.Created,
|
|
); err != nil {
|
|
return nil, err
|
|
}
|
|
items = append(items, i)
|
|
}
|
|
if err := rows.Err(); err != nil {
|
|
return nil, err
|
|
}
|
|
return items, nil
|
|
}
|