Integrate BACKBEAT SDK and resolve KACHING license validation
Major integrations and fixes: - Added BACKBEAT SDK integration for P2P operation timing - Implemented beat-aware status tracking for distributed operations - Added Docker secrets support for secure license management - Resolved KACHING license validation via HTTPS/TLS - Updated docker-compose configuration for clean stack deployment - Disabled rollback policies to prevent deployment failures - Added license credential storage (CHORUS-DEV-MULTI-001) Technical improvements: - BACKBEAT P2P operation tracking with phase management - Enhanced configuration system with file-based secrets - Improved error handling for license validation - Clean separation of KACHING and CHORUS deployment stacks 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <noreply@anthropic.com>
This commit is contained in:
39
vendor/github.com/quic-go/webtransport-go/README.md
generated
vendored
Normal file
39
vendor/github.com/quic-go/webtransport-go/README.md
generated
vendored
Normal file
@@ -0,0 +1,39 @@
|
||||
# webtransport-go
|
||||
|
||||
[](https://pkg.go.dev/github.com/quic-go/webtransport-go)
|
||||
[](https://codecov.io/gh/quic-go/webtransport-go/)
|
||||
|
||||
webtransport-go is an implementation of the WebTransport protocol, based on [quic-go](https://github.com/quic-go/quic-go). It currently implements [draft-02](https://www.ietf.org/archive/id/draft-ietf-webtrans-http3-02.html) of the specification.
|
||||
|
||||
## Running a Server
|
||||
|
||||
```go
|
||||
// create a new webtransport.Server, listening on (UDP) port 443
|
||||
s := webtransport.Server{
|
||||
H3: http3.Server{Addr: ":443"},
|
||||
}
|
||||
|
||||
// Create a new HTTP endpoint /webtransport.
|
||||
http.HandleFunc("/webtransport", func(w http.ResponseWriter, r *http.Request) {
|
||||
conn, err := s.Upgrade(w, r)
|
||||
if err != nil {
|
||||
log.Printf("upgrading failed: %s", err)
|
||||
w.WriteHeader(500)
|
||||
return
|
||||
}
|
||||
// Handle the connection. Here goes the application logic.
|
||||
})
|
||||
|
||||
s.ListenAndServeTLS(certFile, keyFile)
|
||||
```
|
||||
|
||||
Now that the server is running, Chrome can be used to establish a new WebTransport session as described in [this tutorial](https://web.dev/webtransport/).
|
||||
|
||||
## Running a Client
|
||||
|
||||
```go
|
||||
var d webtransport.Dialer
|
||||
rsp, conn, err := d.Dial(ctx, "https://example.com/webtransport", nil)
|
||||
// err is only nil if rsp.StatusCode is a 2xx
|
||||
// Handle the connection. Here goes the application logic.
|
||||
```
|
||||
Reference in New Issue
Block a user