 9bdcbe0447
			
		
	
	9bdcbe0447
	
	
	
		
			
			Major integrations and fixes: - Added BACKBEAT SDK integration for P2P operation timing - Implemented beat-aware status tracking for distributed operations - Added Docker secrets support for secure license management - Resolved KACHING license validation via HTTPS/TLS - Updated docker-compose configuration for clean stack deployment - Disabled rollback policies to prevent deployment failures - Added license credential storage (CHORUS-DEV-MULTI-001) Technical improvements: - BACKBEAT P2P operation tracking with phase management - Enhanced configuration system with file-based secrets - Improved error handling for license validation - Clean separation of KACHING and CHORUS deployment stacks 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <noreply@anthropic.com>
		
			
				
	
	
		
			96 lines
		
	
	
		
			3.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			96 lines
		
	
	
		
			3.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2022 The Go Authors. All rights reserved.
 | |
| // Use of this source code is governed by a BSD-style
 | |
| // license that can be found in the LICENSE file.
 | |
| 
 | |
| package qtls
 | |
| 
 | |
| import (
 | |
| 	"crypto/x509"
 | |
| 	"runtime"
 | |
| 	"sync"
 | |
| 	"sync/atomic"
 | |
| )
 | |
| 
 | |
| type cacheEntry struct {
 | |
| 	refs atomic.Int64
 | |
| 	cert *x509.Certificate
 | |
| }
 | |
| 
 | |
| // certCache implements an intern table for reference counted x509.Certificates,
 | |
| // implemented in a similar fashion to BoringSSL's CRYPTO_BUFFER_POOL. This
 | |
| // allows for a single x509.Certificate to be kept in memory and referenced from
 | |
| // multiple Conns. Returned references should not be mutated by callers. Certificates
 | |
| // are still safe to use after they are removed from the cache.
 | |
| //
 | |
| // Certificates are returned wrapped in a activeCert struct that should be held by
 | |
| // the caller. When references to the activeCert are freed, the number of references
 | |
| // to the certificate in the cache is decremented. Once the number of references
 | |
| // reaches zero, the entry is evicted from the cache.
 | |
| //
 | |
| // The main difference between this implementation and CRYPTO_BUFFER_POOL is that
 | |
| // CRYPTO_BUFFER_POOL is a more  generic structure which supports blobs of data,
 | |
| // rather than specific structures. Since we only care about x509.Certificates,
 | |
| // certCache is implemented as a specific cache, rather than a generic one.
 | |
| //
 | |
| // See https://boringssl.googlesource.com/boringssl/+/master/include/openssl/pool.h
 | |
| // and https://boringssl.googlesource.com/boringssl/+/master/crypto/pool/pool.c
 | |
| // for the BoringSSL reference.
 | |
| type certCache struct {
 | |
| 	sync.Map
 | |
| }
 | |
| 
 | |
| var clientCertCache = new(certCache)
 | |
| 
 | |
| // activeCert is a handle to a certificate held in the cache. Once there are
 | |
| // no alive activeCerts for a given certificate, the certificate is removed
 | |
| // from the cache by a finalizer.
 | |
| type activeCert struct {
 | |
| 	cert *x509.Certificate
 | |
| }
 | |
| 
 | |
| // active increments the number of references to the entry, wraps the
 | |
| // certificate in the entry in a activeCert, and sets the finalizer.
 | |
| //
 | |
| // Note that there is a race between active and the finalizer set on the
 | |
| // returned activeCert, triggered if active is called after the ref count is
 | |
| // decremented such that refs may be > 0 when evict is called. We consider this
 | |
| // safe, since the caller holding an activeCert for an entry that is no longer
 | |
| // in the cache is fine, with the only side effect being the memory overhead of
 | |
| // there being more than one distinct reference to a certificate alive at once.
 | |
| func (cc *certCache) active(e *cacheEntry) *activeCert {
 | |
| 	e.refs.Add(1)
 | |
| 	a := &activeCert{e.cert}
 | |
| 	runtime.SetFinalizer(a, func(_ *activeCert) {
 | |
| 		if e.refs.Add(-1) == 0 {
 | |
| 			cc.evict(e)
 | |
| 		}
 | |
| 	})
 | |
| 	return a
 | |
| }
 | |
| 
 | |
| // evict removes a cacheEntry from the cache.
 | |
| func (cc *certCache) evict(e *cacheEntry) {
 | |
| 	cc.Delete(string(e.cert.Raw))
 | |
| }
 | |
| 
 | |
| // newCert returns a x509.Certificate parsed from der. If there is already a copy
 | |
| // of the certificate in the cache, a reference to the existing certificate will
 | |
| // be returned. Otherwise, a fresh certificate will be added to the cache, and
 | |
| // the reference returned. The returned reference should not be mutated.
 | |
| func (cc *certCache) newCert(der []byte) (*activeCert, error) {
 | |
| 	if entry, ok := cc.Load(string(der)); ok {
 | |
| 		return cc.active(entry.(*cacheEntry)), nil
 | |
| 	}
 | |
| 
 | |
| 	cert, err := x509.ParseCertificate(der)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	entry := &cacheEntry{cert: cert}
 | |
| 	if entry, loaded := cc.LoadOrStore(string(der), entry); loaded {
 | |
| 		return cc.active(entry.(*cacheEntry)), nil
 | |
| 	}
 | |
| 	return cc.active(entry), nil
 | |
| }
 |