Platform Next Direction Status
Candidate List
1. services/api auction and legacy-tender local-engine boundary cleanup
- Type:
platform-level cleanup
- Core surface:
- Current reality:
services/api still mixes gateway proxying with gateway-local auction mutations, tender compatibility reads, fixture-backed projections, and legacy outbox emission.
- CURRENT_ARCHITECTURE.md already identifies this as one of the dirtiest overlaps in the platform.
- Readiness:
HIGH
- Ambiguity:
MEDIUM
- Value:
HIGH
- Likely sprint sequence:
- clarify canonical auction/tender action/read ownership at the API boundary
- classify proxy routes vs gateway-local compatibility routes explicitly
- reduce or isolate local-engine residue without changing public route shape
- only then decide whether auctions or tenders become the next true extraction-prep candidate
2. KES shared-backbone transfer planning
- Type:
planning work
- Core surface:
- Current reality:
- KES HTTP/runtime ownership is now clear in
svc-kes.
- The main remaining KES ambiguity is no longer host extraction; it is shared backbone ownership.
- Readiness:
MEDIUM
- Ambiguity:
MEDIUM
- Value:
HIGH
- Likely sprint sequence:
- classify what remains shared by necessity vs operator convenience
- decide whether outbox relay, projection consumer, or replay tooling moves first
- define migration/operator impact before any code move
3. Vacancy public-read convergence
- Type:
cleanup work
- Core surface:
- Current reality:
- Vacancy extraction is real, but
GET /vacancies and GET /vacancies/:id remain compatibility-backed.
- Readiness:
MEDIUM
- Ambiguity:
MEDIUM
- Value:
MEDIUM
- Likely sprint sequence:
- tighten preferred projection-backed read truth
- reduce compatibility fallback only where response parity stays safe
- then revisit remaining web-side fallback truth
4. Auth and identity façade alignment
- Type:
platform-level cleanup
- Core surface:
- Current reality:
- Reviewer workflow exists in
identity-infra, but the public gateway still returns 501 not_implemented for reviewer actions.
- Readiness:
MEDIUM
- Ambiguity:
HIGH
- Value:
MEDIUM
- Likely sprint sequence:
- decide canonical gateway exposure policy
- align authz expectations
- proxy or explicitly retire the hidden reviewer surface
5. Remaining mixed migration cleanup for Vacancy and Accommodations
- Type:
cleanup work
- Core surface:
- Current reality:
- Mixed migrations still exist, but the operational ownership story is already explicit enough for current extracted runtimes.
- Readiness:
MEDIUM
- Ambiguity:
LOW
- Value:
LOW
- Likely sprint sequence:
- separate mixed vacancy/accommodation migrations carefully
- update migrate ownership docs
Readiness / Ambiguity / Value Summary
| Candidate | Readiness | Ambiguity | Value | Why |
| --- | --- | --- | --- | --- |
| API auction and legacy-tender boundary cleanup | HIGH | MEDIUM | HIGH | It addresses the largest remaining public-platform overlap after the extracted-service wave |
| KES shared-backbone transfer planning | MEDIUM | MEDIUM | HIGH | Biggest remaining KES ambiguity, but it is heavier operationally and not required for current runtime truth |
| Vacancy public-read convergence | MEDIUM | MEDIUM | MEDIUM | Useful cleanup, but narrower than the API boundary split |
| Auth/identity façade alignment | MEDIUM | HIGH | MEDIUM | Real mismatch, but broader authz/product implications raise risk |
| Mixed migration cleanup | MEDIUM | LOW | LOW | Worth doing later, but not the highest-leverage next platform move |
Primary Recommendation
Choose services/api auction and legacy-tender local-engine boundary cleanup as the primary next direction.
Rationale
- It is the strongest remaining topology ambiguity in the active public platform path.
- It affects the user-facing gateway directly, not just an internal residue layer.
- The code is already explicit about the problem:
- Cleaning this boundary first will lower ambiguity before the team tries to extract another remaining
svc-tenders domain such as auctions or declarations.
Secondary Recommendation
Choose KES shared-backbone transfer planning as the backup direction.
Rationale
- KES host extraction is already materially complete.
- The next real KES question is backbone ownership, not route/runtime extraction.
- This is valuable, but it is a heavier operational decision and does not unblock the broader platform topology as directly as the API auction/tender cleanup does.
Notes
- The strongest next move is not another small residue cleanup inside an already-extracted service.
- The strongest next move is also not a fresh extraction from
svc-tenders yet, because auctions and legacy tenders are still entangled with gateway-local engines and fixture-backed compatibility behavior.
- Sprint 102 should therefore reduce platform ambiguity first, then let the next extraction candidate emerge from a cleaner boundary.