Integrate BACKBEAT SDK and resolve KACHING license validation
Major integrations and fixes: - Added BACKBEAT SDK integration for P2P operation timing - Implemented beat-aware status tracking for distributed operations - Added Docker secrets support for secure license management - Resolved KACHING license validation via HTTPS/TLS - Updated docker-compose configuration for clean stack deployment - Disabled rollback policies to prevent deployment failures - Added license credential storage (CHORUS-DEV-MULTI-001) Technical improvements: - BACKBEAT P2P operation tracking with phase management - Enhanced configuration system with file-based secrets - Improved error handling for license validation - Clean separation of KACHING and CHORUS deployment stacks 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <noreply@anthropic.com>
This commit is contained in:
140
vendor/github.com/libp2p/go-libp2p/p2p/security/noise/session.go
generated
vendored
Normal file
140
vendor/github.com/libp2p/go-libp2p/p2p/security/noise/session.go
generated
vendored
Normal file
@@ -0,0 +1,140 @@
|
||||
package noise
|
||||
|
||||
import (
|
||||
"bufio"
|
||||
"context"
|
||||
"net"
|
||||
"sync"
|
||||
"time"
|
||||
|
||||
"github.com/flynn/noise"
|
||||
|
||||
"github.com/libp2p/go-libp2p/core/crypto"
|
||||
"github.com/libp2p/go-libp2p/core/network"
|
||||
"github.com/libp2p/go-libp2p/core/peer"
|
||||
"github.com/libp2p/go-libp2p/core/protocol"
|
||||
)
|
||||
|
||||
type secureSession struct {
|
||||
initiator bool
|
||||
checkPeerID bool
|
||||
|
||||
localID peer.ID
|
||||
localKey crypto.PrivKey
|
||||
remoteID peer.ID
|
||||
remoteKey crypto.PubKey
|
||||
|
||||
readLock sync.Mutex
|
||||
writeLock sync.Mutex
|
||||
|
||||
insecureConn net.Conn
|
||||
insecureReader *bufio.Reader // to cushion io read syscalls
|
||||
// we don't buffer writes to avoid introducing latency; optimisation possible. // TODO revisit
|
||||
|
||||
qseek int // queued bytes seek value.
|
||||
qbuf []byte // queued bytes buffer.
|
||||
rlen [2]byte // work buffer to read in the incoming message length.
|
||||
|
||||
enc *noise.CipherState
|
||||
dec *noise.CipherState
|
||||
|
||||
// noise prologue
|
||||
prologue []byte
|
||||
|
||||
initiatorEarlyDataHandler, responderEarlyDataHandler EarlyDataHandler
|
||||
|
||||
// ConnectionState holds state information releated to the secureSession entity.
|
||||
connectionState network.ConnectionState
|
||||
}
|
||||
|
||||
// newSecureSession creates a Noise session over the given insecureConn Conn, using
|
||||
// the libp2p identity keypair from the given Transport.
|
||||
func newSecureSession(tpt *Transport, ctx context.Context, insecure net.Conn, remote peer.ID, prologue []byte, initiatorEDH, responderEDH EarlyDataHandler, initiator, checkPeerID bool) (*secureSession, error) {
|
||||
s := &secureSession{
|
||||
insecureConn: insecure,
|
||||
insecureReader: bufio.NewReader(insecure),
|
||||
initiator: initiator,
|
||||
localID: tpt.localID,
|
||||
localKey: tpt.privateKey,
|
||||
remoteID: remote,
|
||||
prologue: prologue,
|
||||
initiatorEarlyDataHandler: initiatorEDH,
|
||||
responderEarlyDataHandler: responderEDH,
|
||||
checkPeerID: checkPeerID,
|
||||
}
|
||||
|
||||
// the go-routine we create to run the handshake will
|
||||
// write the result of the handshake to the respCh.
|
||||
respCh := make(chan error, 1)
|
||||
go func() {
|
||||
respCh <- s.runHandshake(ctx)
|
||||
}()
|
||||
|
||||
select {
|
||||
case err := <-respCh:
|
||||
if err != nil {
|
||||
_ = s.insecureConn.Close()
|
||||
}
|
||||
return s, err
|
||||
|
||||
case <-ctx.Done():
|
||||
// If the context has been cancelled, we close the underlying connection.
|
||||
// We then wait for the handshake to return because of the first error it encounters
|
||||
// so we don't return without cleaning up the go-routine.
|
||||
_ = s.insecureConn.Close()
|
||||
<-respCh
|
||||
return nil, ctx.Err()
|
||||
}
|
||||
}
|
||||
|
||||
func (s *secureSession) LocalAddr() net.Addr {
|
||||
return s.insecureConn.LocalAddr()
|
||||
}
|
||||
|
||||
func (s *secureSession) LocalPeer() peer.ID {
|
||||
return s.localID
|
||||
}
|
||||
|
||||
func (s *secureSession) LocalPublicKey() crypto.PubKey {
|
||||
return s.localKey.GetPublic()
|
||||
}
|
||||
|
||||
func (s *secureSession) RemoteAddr() net.Addr {
|
||||
return s.insecureConn.RemoteAddr()
|
||||
}
|
||||
|
||||
func (s *secureSession) RemotePeer() peer.ID {
|
||||
return s.remoteID
|
||||
}
|
||||
|
||||
func (s *secureSession) RemotePublicKey() crypto.PubKey {
|
||||
return s.remoteKey
|
||||
}
|
||||
|
||||
func (s *secureSession) ConnState() network.ConnectionState {
|
||||
return s.connectionState
|
||||
}
|
||||
|
||||
func (s *secureSession) SetDeadline(t time.Time) error {
|
||||
return s.insecureConn.SetDeadline(t)
|
||||
}
|
||||
|
||||
func (s *secureSession) SetReadDeadline(t time.Time) error {
|
||||
return s.insecureConn.SetReadDeadline(t)
|
||||
}
|
||||
|
||||
func (s *secureSession) SetWriteDeadline(t time.Time) error {
|
||||
return s.insecureConn.SetWriteDeadline(t)
|
||||
}
|
||||
|
||||
func (s *secureSession) Close() error {
|
||||
return s.insecureConn.Close()
|
||||
}
|
||||
|
||||
func SessionWithConnState(s *secureSession, muxer protocol.ID) *secureSession {
|
||||
if s != nil {
|
||||
s.connectionState.StreamMultiplexer = muxer
|
||||
s.connectionState.UsedEarlyMuxerNegotiation = muxer != ""
|
||||
}
|
||||
return s
|
||||
}
|
||||
Reference in New Issue
Block a user