Initial CHORUS project setup
🎭 CHORUS - Container-First P2P Task Coordination System - Docker-first architecture designed from ground up - Environment variable-based configuration (no config files) - Structured logging to stdout/stderr for container runtimes - License validation required for operation - Clean separation from BZZZ legacy systemd approach Core features implemented: - Container-optimized logging system - Environment-based configuration management - License validation with KACHING integration - Basic HTTP API and health endpoints - Docker build and deployment configuration Ready for P2P protocol development and AI integration. 🤖 Generated with Claude Code
This commit is contained in:
97
internal/licensing/validator.go
Normal file
97
internal/licensing/validator.go
Normal file
@@ -0,0 +1,97 @@
|
||||
package licensing
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"encoding/json"
|
||||
"fmt"
|
||||
"net/http"
|
||||
"time"
|
||||
)
|
||||
|
||||
const (
|
||||
DefaultKachingURL = "https://kaching.chorus.services"
|
||||
LicenseTimeout = 30 * time.Second
|
||||
)
|
||||
|
||||
// LicenseConfig holds licensing information
|
||||
type LicenseConfig struct {
|
||||
Email string
|
||||
LicenseKey string
|
||||
ClusterID string
|
||||
}
|
||||
|
||||
// Validator handles license validation with KACHING
|
||||
type Validator struct {
|
||||
config LicenseConfig
|
||||
kachingURL string
|
||||
client *http.Client
|
||||
}
|
||||
|
||||
// NewValidator creates a new license validator
|
||||
func NewValidator(config LicenseConfig) *Validator {
|
||||
return &Validator{
|
||||
config: config,
|
||||
kachingURL: DefaultKachingURL,
|
||||
client: &http.Client{
|
||||
Timeout: LicenseTimeout,
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
// Validate performs license validation with KACHING license authority
|
||||
// CRITICAL: CHORUS will not start without valid license validation
|
||||
func (v *Validator) Validate() error {
|
||||
if v.config.Email == "" || v.config.LicenseKey == "" {
|
||||
return fmt.Errorf("license email and key are required")
|
||||
}
|
||||
|
||||
// Prepare validation request
|
||||
request := map[string]interface{}{
|
||||
"email": v.config.Email,
|
||||
"license_key": v.config.LicenseKey,
|
||||
"cluster_id": v.config.ClusterID,
|
||||
"product": "CHORUS",
|
||||
"version": "0.1.0-dev",
|
||||
"container": true, // Flag indicating this is a container deployment
|
||||
}
|
||||
|
||||
requestBody, err := json.Marshal(request)
|
||||
if err != nil {
|
||||
return fmt.Errorf("failed to marshal license request: %w", err)
|
||||
}
|
||||
|
||||
// Call KACHING license authority
|
||||
licenseURL := fmt.Sprintf("%s/v1/license/validate", v.kachingURL)
|
||||
resp, err := v.client.Post(licenseURL, "application/json", bytes.NewReader(requestBody))
|
||||
if err != nil {
|
||||
// FAIL-CLOSED: No network = No license = No operation
|
||||
return fmt.Errorf("unable to contact license authority: %w", err)
|
||||
}
|
||||
defer resp.Body.Close()
|
||||
|
||||
// Parse response
|
||||
var licenseResponse map[string]interface{}
|
||||
if err := json.NewDecoder(resp.Body).Decode(&licenseResponse); err != nil {
|
||||
return fmt.Errorf("invalid license authority response: %w", err)
|
||||
}
|
||||
|
||||
// Check validation result
|
||||
if resp.StatusCode != http.StatusOK {
|
||||
message := "license validation failed"
|
||||
if msg, ok := licenseResponse["message"].(string); ok {
|
||||
message = msg
|
||||
}
|
||||
return fmt.Errorf("license validation failed: %s", message)
|
||||
}
|
||||
|
||||
// License is valid
|
||||
return nil
|
||||
}
|
||||
|
||||
// ValidateBackground performs background license validation (for runtime checks)
|
||||
// This is used for periodic license validation during operation
|
||||
func (v *Validator) ValidateBackground() error {
|
||||
// Similar to Validate() but with longer timeout and retry logic
|
||||
// Implementation would include retry logic and graceful degradation
|
||||
return v.Validate()
|
||||
}
|
||||
Reference in New Issue
Block a user