refactor CHORUS

This commit is contained in:
anthonyrawlins
2025-09-06 14:47:41 +10:00
parent 9bdcbe0447
commit b6634e4c1b
16 changed files with 225 additions and 225 deletions

View File

@@ -606,9 +606,9 @@ services:
CHORUS-crypto:
image: CHORUS/crypto-service:latest
environment:
- BZZZ_CONFIG_PATH=/etc/CHORUS/config.yaml
- BZZZ_LOG_LEVEL=info
- BZZZ_AUDIT_STORAGE=postgresql
- CHORUS_CONFIG_PATH=/etc/CHORUS/config.yaml
- CHORUS_LOG_LEVEL=info
- CHORUS_AUDIT_STORAGE=postgresql
volumes:
- ./config:/etc/CHORUS
- ./logs:/var/log/CHORUS
@@ -621,7 +621,7 @@ services:
postgresql:
image: postgres:13
environment:
- POSTGRES_DB=bzzz_audit
- POSTGRES_DB=chorus_audit
- POSTGRES_USER=CHORUS
- POSTGRES_PASSWORD_FILE=/run/secrets/db_password
volumes:
@@ -676,9 +676,9 @@ spec:
- containerPort: 8443
name: https
env:
- name: BZZZ_CONFIG_PATH
- name: CHORUS_CONFIG_PATH
value: "/etc/CHORUS/config.yaml"
- name: BZZZ_LOG_LEVEL
- name: CHORUS_LOG_LEVEL
value: "info"
volumeMounts:
- name: config
@@ -761,7 +761,7 @@ key_integrity_status{role="backend_developer",status="valid"}
```yaml
# Prometheus alerting rules
groups:
- name: bzzz_crypto_security
- name: chorus_crypto_security
rules:
- alert: HighSecurityRiskAccess
expr: security_risk_score > 0.8

View File

@@ -15,7 +15,7 @@ import (
// TestSecurityConfig tests SecurityConfig enforcement
func TestSecurityConfig(t *testing.T) {
// Create temporary audit log file
tmpDir, err := ioutil.TempDir("", "bzzz_security_test")
tmpDir, err := ioutil.TempDir("", "chorus_security_test")
if err != nil {
t.Fatalf("Failed to create temp dir: %v", err)
}
@@ -259,7 +259,7 @@ func TestDHTSecurityIntegration(t *testing.T) {
// TestAuditLogging tests comprehensive audit logging
func TestAuditLogging(t *testing.T) {
tmpDir, err := ioutil.TempDir("", "bzzz_audit_test")
tmpDir, err := ioutil.TempDir("", "chorus_audit_test")
if err != nil {
t.Fatalf("Failed to create temp dir: %v", err)
}