Integrate BACKBEAT SDK and resolve KACHING license validation

Major integrations and fixes:
- Added BACKBEAT SDK integration for P2P operation timing
- Implemented beat-aware status tracking for distributed operations
- Added Docker secrets support for secure license management
- Resolved KACHING license validation via HTTPS/TLS
- Updated docker-compose configuration for clean stack deployment
- Disabled rollback policies to prevent deployment failures
- Added license credential storage (CHORUS-DEV-MULTI-001)

Technical improvements:
- BACKBEAT P2P operation tracking with phase management
- Enhanced configuration system with file-based secrets
- Improved error handling for license validation
- Clean separation of KACHING and CHORUS deployment stacks

🤖 Generated with [Claude Code](https://claude.ai/code)

Co-Authored-By: Claude <noreply@anthropic.com>
This commit is contained in:
anthonyrawlins
2025-09-06 07:56:26 +10:00
parent 543ab216f9
commit 9bdcbe0447
4730 changed files with 1480093 additions and 1916 deletions

View File

@@ -7,12 +7,12 @@ import (
"sync"
"time"
"chorus.services/bzzz/pkg/dht"
"chorus.services/bzzz/pkg/crypto"
"chorus.services/bzzz/pkg/election"
"chorus.services/bzzz/pkg/config"
"chorus.services/bzzz/pkg/ucxl"
slurpContext "chorus.services/bzzz/pkg/slurp/context"
"chorus/pkg/dht"
"chorus/pkg/crypto"
"chorus/pkg/election"
"chorus/pkg/config"
"chorus/pkg/ucxl"
slurpContext "chorus/pkg/slurp/context"
)
// DistributionCoordinator orchestrates distributed context operations across the cluster

View File

@@ -9,17 +9,17 @@ import (
"sync"
"time"
"chorus.services/bzzz/pkg/dht"
"chorus.services/bzzz/pkg/crypto"
"chorus.services/bzzz/pkg/election"
"chorus.services/bzzz/pkg/ucxl"
"chorus.services/bzzz/pkg/config"
slurpContext "chorus.services/bzzz/pkg/slurp/context"
"chorus/pkg/dht"
"chorus/pkg/crypto"
"chorus/pkg/election"
"chorus/pkg/ucxl"
"chorus/pkg/config"
slurpContext "chorus/pkg/slurp/context"
)
// ContextDistributor handles distributed context operations via DHT
//
// This is the primary interface for distributing context data across the BZZZ
// This is the primary interface for distributing context data across the CHORUS
// cluster using the existing DHT infrastructure with role-based encryption
// and conflict resolution capabilities.
type ContextDistributor interface {

View File

@@ -10,15 +10,15 @@ import (
"sync"
"time"
"chorus.services/bzzz/pkg/dht"
"chorus.services/bzzz/pkg/crypto"
"chorus.services/bzzz/pkg/election"
"chorus.services/bzzz/pkg/ucxl"
"chorus.services/bzzz/pkg/config"
slurpContext "chorus.services/bzzz/pkg/slurp/context"
"chorus/pkg/dht"
"chorus/pkg/crypto"
"chorus/pkg/election"
"chorus/pkg/ucxl"
"chorus/pkg/config"
slurpContext "chorus/pkg/slurp/context"
)
// DHTContextDistributor implements ContextDistributor using BZZZ DHT infrastructure
// DHTContextDistributor implements ContextDistributor using CHORUS DHT infrastructure
type DHTContextDistributor struct {
mu sync.RWMutex
dht *dht.DHT
@@ -52,7 +52,7 @@ func NewDHTContextDistributor(
return nil, fmt.Errorf("config is required")
}
deploymentID := fmt.Sprintf("bzzz-slurp-%s", config.Agent.ID)
deploymentID := fmt.Sprintf("CHORUS-slurp-%s", config.Agent.ID)
dist := &DHTContextDistributor{
dht: dht,

View File

@@ -1,6 +1,6 @@
// Package distribution provides context network distribution capabilities via DHT integration.
//
// This package implements distributed context sharing across the BZZZ cluster using
// This package implements distributed context sharing across the CHORUS cluster using
// the existing Distributed Hash Table (DHT) infrastructure. It provides role-based
// encrypted distribution, conflict resolution, and eventual consistency for context
// data synchronization across multiple nodes.
@@ -23,7 +23,7 @@
// - NetworkManager: Network topology and partition handling
//
// Integration Points:
// - pkg/dht: Existing BZZZ DHT infrastructure
// - pkg/dht: Existing CHORUS DHT infrastructure
// - pkg/crypto: Role-based encryption and decryption
// - pkg/election: Leader coordination for conflict resolution
// - pkg/slurp/context: Context types and validation
@@ -67,7 +67,7 @@
//
// Security Model:
// All context data is encrypted before distribution using role-specific keys
// from the BZZZ crypto system. Only nodes with appropriate role permissions
// from the CHORUS crypto system. Only nodes with appropriate role permissions
// can decrypt and access context information, ensuring secure collaborative
// development while maintaining access control boundaries.
//

View File

@@ -9,9 +9,9 @@ import (
"sync"
"time"
"chorus.services/bzzz/pkg/dht"
"chorus.services/bzzz/pkg/config"
"chorus.services/bzzz/pkg/ucxl"
"chorus/pkg/dht"
"chorus/pkg/config"
"chorus/pkg/ucxl"
)
// GossipProtocolImpl implements GossipProtocol interface for metadata synchronization

View File

@@ -10,7 +10,7 @@ import (
"sync"
"time"
"chorus.services/bzzz/pkg/config"
"chorus/pkg/config"
)
// MonitoringSystem provides comprehensive monitoring for the distributed context system
@@ -1075,9 +1075,9 @@ func (ms *MonitoringSystem) handleDashboard(w http.ResponseWriter, r *http.Reque
html := `
<!DOCTYPE html>
<html>
<head><title>BZZZ SLURP Monitoring</title></head>
<head><title>CHORUS SLURP Monitoring</title></head>
<body>
<h1>BZZZ SLURP Distributed Context Monitoring</h1>
<h1>CHORUS SLURP Distributed Context Monitoring</h1>
<p>Monitoring dashboard placeholder</p>
</body>
</html>

View File

@@ -9,8 +9,8 @@ import (
"sync"
"time"
"chorus.services/bzzz/pkg/dht"
"chorus.services/bzzz/pkg/config"
"chorus/pkg/dht"
"chorus/pkg/config"
"github.com/libp2p/go-libp2p/core/peer"
)

View File

@@ -7,9 +7,9 @@ import (
"sync"
"time"
"chorus.services/bzzz/pkg/dht"
"chorus.services/bzzz/pkg/config"
"chorus.services/bzzz/pkg/ucxl"
"chorus/pkg/dht"
"chorus/pkg/config"
"chorus/pkg/ucxl"
"github.com/libp2p/go-libp2p/core/peer"
)

View File

@@ -14,8 +14,8 @@ import (
"sync"
"time"
"chorus.services/bzzz/pkg/config"
"chorus.services/bzzz/pkg/crypto"
"chorus/pkg/config"
"chorus/pkg/crypto"
)
// SecurityManager handles all security aspects of the distributed system
@@ -653,7 +653,7 @@ func (sm *SecurityManager) generateSelfSignedCertificate() ([]byte, []byte, erro
template := x509.Certificate{
SerialNumber: big.NewInt(1),
Subject: pkix.Name{
Organization: []string{"BZZZ SLURP"},
Organization: []string{"CHORUS SLURP"},
Country: []string{"US"},
Province: []string{""},
Locality: []string{"San Francisco"},