Integrate BACKBEAT SDK and resolve KACHING license validation

Major integrations and fixes:
- Added BACKBEAT SDK integration for P2P operation timing
- Implemented beat-aware status tracking for distributed operations
- Added Docker secrets support for secure license management
- Resolved KACHING license validation via HTTPS/TLS
- Updated docker-compose configuration for clean stack deployment
- Disabled rollback policies to prevent deployment failures
- Added license credential storage (CHORUS-DEV-MULTI-001)

Technical improvements:
- BACKBEAT P2P operation tracking with phase management
- Enhanced configuration system with file-based secrets
- Improved error handling for license validation
- Clean separation of KACHING and CHORUS deployment stacks

🤖 Generated with [Claude Code](https://claude.ai/code)

Co-Authored-By: Claude <noreply@anthropic.com>
This commit is contained in:
anthonyrawlins
2025-09-06 07:56:26 +10:00
parent 543ab216f9
commit 9bdcbe0447
4730 changed files with 1480093 additions and 1916 deletions

View File

@@ -1,4 +1,4 @@
// Package slurp provides contextual intelligence capabilities for BZZZ.
// Package slurp provides contextual intelligence capabilities for CHORUS.
//
// SLURP (Storage, Logic, Understanding, Retrieval, Processing) implements:
// - Hierarchical context resolution with bounded depth traversal
@@ -20,7 +20,7 @@
// - pkg/election Admin-only operations coordination
// - pkg/config Configuration extension for SLURP settings
//
// This package follows established BZZZ patterns for interfaces, error handling,
// This package follows established CHORUS patterns for interfaces, error handling,
// and distributed operations while providing native Go implementations of the
// contextual intelligence capabilities originally prototyped in Python.
package slurp
@@ -31,17 +31,17 @@ import (
"sync"
"time"
"chorus.services/bzzz/pkg/config"
"chorus.services/bzzz/pkg/crypto"
"chorus.services/bzzz/pkg/dht"
"chorus.services/bzzz/pkg/election"
"chorus/pkg/config"
"chorus/pkg/crypto"
"chorus/pkg/dht"
"chorus/pkg/election"
)
// SLURP is the main coordinator for contextual intelligence operations.
//
// It orchestrates the interaction between context resolution, temporal analysis,
// distributed storage, and intelligence generation while enforcing security
// and access controls through integration with existing BZZZ systems.
// and access controls through integration with existing CHORUS systems.
//
// Thread Safety: SLURP is safe for concurrent use across multiple goroutines.
// All public methods handle synchronization internally.
@@ -78,7 +78,7 @@ type SLURP struct {
eventMux sync.RWMutex
}
// SLURPConfig holds SLURP-specific configuration that extends the main BZZZ config
// SLURPConfig holds SLURP-specific configuration that extends the main CHORUS config
type SLURPConfig struct {
// Enable/disable SLURP system
Enabled bool `yaml:"enabled" json:"enabled"`
@@ -315,8 +315,8 @@ type SLURPEvent struct {
// NewSLURP creates a new SLURP instance with the provided dependencies.
//
// The SLURP system requires integration with existing BZZZ components:
// - config: Main BZZZ configuration including SLURP settings
// The SLURP system requires integration with existing CHORUS components:
// - config: Main CHORUS configuration including SLURP settings
// - dhtInstance: Distributed hash table for storage and discovery
// - cryptoInstance: Role-based encryption for access control
// - electionManager: Admin election coordination for restricted operations
@@ -574,7 +574,7 @@ func (s *SLURP) RegisterEventHandler(eventType EventType, handler EventHandler)
// Close gracefully shuts down the SLURP system.
//
// This method stops all background tasks, flushes caches, and releases
// resources. It should be called when the BZZZ node is shutting down.
// resources. It should be called when the CHORUS node is shutting down.
func (s *SLURP) Close() error {
s.mu.Lock()
defer s.mu.Unlock()