Stremio user proxy flow
We document how end users and addons interact with Relaygate.
End-user steps
- Users register on the Relaygate web app and verify email (and optional 2FA).
- The, they add each provider they have a subscription with's debrid API keys to the vault (which is encrypted at rest). It can just be one debrid provider.
- We generate a Relaygate user proxy API key (rotatable).
- In each third-party addon that supports Relaygate, we set:
- API key field to the proxy key (not the raw debrid token).
- Provider in the addon UI to Relaygate (the addon might ask you to choose a debrid provider as well).
User-driven moderation
From the dashboard we let users:
- See which addon identifiers generated traffic.
- Allow or deny specific addon identifiers for our proxy key.
- Allow or deny caller IPs as seen by Relaygate (usually the addon host, not the TV).
We document IP semantics in the security threat model because X-Forwarded-For can be spoofed unless trusted.