Cascade Roadmap

Production-readiness backlog generated from the current workspace code, docs, config, and tests on 2026-04-09. This is intentionally biased toward backend gaps, security hardening, operational reality, and frontend-blocking integration work.

Current Read

Cascade is not blocked on product direction anymore. It is blocked on trust-model completion, real service-to-service wiring, and replacing scaffolded behavior with durable production state. Headwaters and Conduit are the closest to frontend-usable. Fabric is still the control-plane center and the biggest dependency. Ledger is structurally solid and now terminates internal mTLS natively. Cascadia has a real hardware-bound activation model and now receives its first node certificate during activation plus real Breakwater-issued renewals, but it still has bootstrap/fallback cleanup and host-binding hardening to close. Weir is still a BFF prototype with in-memory state and dev fallbacks. Breakwater is now a local issuer, but not yet a full production PKI and gateway implementation.

What This File Covers

  • global platform tasks
  • per-service production gaps
  • security issues visible in code
  • integration debt and operational debt
  • frontend blockers and test blockers

Highest-Risk Themes

  • internal trust still depends on forwarded identity headers in multiple paths
  • Breakwater is only a partial issuer today, not yet a full production PKI authority
  • Cascadia still keeps a legacy identity-header fallback during bootstrap until full node-cert bootstrapping is finished
  • Weir still has dev fallbacks and shallow integration coverage, even though its local state is no longer memory-only
  • docs and code are not fully aligned on what is actually enforced

Frontend-Unblock Objective

  • Headwaters frontend can proceed after contract freeze and basic integration stack setup
  • Conduit frontend can proceed once local stack and trust cleanup are stable
  • Weir frontend should wait for real downstream wiring and durable sessions

Global Platform Roadmap

These items cut across all services and should be treated as the real dependency order, not optional cleanup.

1. Finish the Machine Trust Model

highest priority security blocks integration

2. Build One Real Local Integration Topology

frontend blocker ops

3. Tighten the HTTP versus NATS Boundary

architecture reliability

4. Unify Production Gates and Runtime Policy

platform hygiene

5. Correct the Docs Where They Overstate Reality

truthfulness important

6. Normalize Releases, CI, and GHCR Publishing Across All Repos

release engineering finish-before-freeze

Execution Batch 1 Completed

2026-04-09 verified locally

Service-by-Service Roadmap

Headwaters

closest to ready identity authority

Headwaters is the strongest reference implementation for native peer-cert extraction and internal route protection. It already has the shape the other services should follow.

Status read: backend is usable. Headwaters is not the main blocker for frontend work.

Fabric

core blocker control plane too central to be half-transitioned

Fabric currently carries tenant lifecycle, profiles, entitlements, policy bundles, signed actions, provisioning, node licensing, catalog, global config, and signing keys. It is the center of gravity of the platform. It also still has the biggest mismatch between desired trust posture and actual deployment posture.

Main Tasks

Completed In This Batch

Possible Future Split Points

Ledger

billing authority structurally good trust path still transitional

Ledger looks coherent as a billing service, but it is still on the hybrid identity path and some of its runtime posture is softer than Headwaters or Conduit.

Conduit

frontend near-ready tenant panel backend

Conduit is broad and relatively advanced, but it still contains visible transitional trust behavior and some runtime flags that need stronger boundaries before production.

Status read: backend is good enough to start frontend implementation after the local stack is normalized, but not yet clean enough to call “production-safe”.

Cascadia

licensing-critical node runtime different threat model

Cascadia now has a real hardware-bound activation story, CSR-backed node issuance, and certificate verification before accepting new materials. The remaining gaps are revocation/startup hard-fail behavior and a few operator/recovery workflows rather than the old claimed-identity runtime path.

Licensing and Anti-Copy Tasks

Machine-Cert Tasks

Runtime Hardening Tasks

Breakwater

foundational missing piece currently scaffolded

Breakwater is currently mostly a spec and local gateway config set. The Rust service is just a metadata/health shell. This is the biggest gap between architecture intent and shipping code.

Completed In This Batch

Weir

frontend blocker for console BFF prototype not production stateful yet

Weir is clearly defined product-wise, but the implementation is still mostly a working scaffold. It is not yet suitable as the stable backend for a serious frontend integration pass.

Completed In This Batch

Status read: do not treat Weir as ready for genuine frontend testing until real downstream integration and durable session/state work are done.

Public Surface, Docs, and Dev Experience

important but secondary

Recommended Build Order

Order Work Item Why first
1 Fix Fabric test breakage and restore green baseline Control plane cannot remain in a knowingly broken state while architecture work continues
2 Implement Breakwater authority and formal transition contract Everything else depends on having one real machine PKI story
3 Add native inbound mTLS to Fabric Fabric is the most critical trust boundary
4 Add native inbound mTLS to Ledger Completed: Ledger now has native listener-level peer-cert identity extraction and stricter readiness/config checks.
5 Move Cascadia from claimed node identity header to real node cert flow Licensing and anti-copy guarantees depend on this being real
6 Remove caller-side x-client-identity injection from Conduit and Ledger Cleans up the transitional protocol and lowers spoof risk
7 Normalize CI, tagged releases, binary artifacts, and GHCR publishing across all repos Release discipline should be finished before the platform is treated as nearly done
8 Stand up one canonical local stack Needed before frontend work can happen against stable contracts
9 Replace Weir dev fallbacks and in-memory state Needed before the Weir frontend is worth integrating
10 Begin Headwaters and Conduit frontend implementation against the real stack Those two are closest once the local topology is stable
11 Begin Weir frontend implementation after backend stabilization Weir is currently the least backend-ready of the planned frontends

What Is Ready Enough Soonest

  • Headwaters backend contracts
  • Conduit backend contracts
  • shared docs and architecture references

What Is Still Unsafe To Pretend Is Finished

  • Breakwater as a real issuer
  • Cascadia certificate lifecycle
  • Cascadia still identifies itself to Fabric by header instead of a real node certificate
  • Weir durable state and real integrations

Companion file: architecture.html