 9bdcbe0447
			
		
	
	9bdcbe0447
	
	
	
		
			
			Major integrations and fixes: - Added BACKBEAT SDK integration for P2P operation timing - Implemented beat-aware status tracking for distributed operations - Added Docker secrets support for secure license management - Resolved KACHING license validation via HTTPS/TLS - Updated docker-compose configuration for clean stack deployment - Disabled rollback policies to prevent deployment failures - Added license credential storage (CHORUS-DEV-MULTI-001) Technical improvements: - BACKBEAT P2P operation tracking with phase management - Enhanced configuration system with file-based secrets - Improved error handling for license validation - Clean separation of KACHING and CHORUS deployment stacks 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <noreply@anthropic.com>
		
			
				
	
	
		
			45 lines
		
	
	
		
			1.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			45 lines
		
	
	
		
			1.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package dns
 | |
| 
 | |
| import (
 | |
| 	"crypto/sha256"
 | |
| 	"crypto/x509"
 | |
| 	"encoding/hex"
 | |
| )
 | |
| 
 | |
| // Sign creates a SMIMEA record from an SSL certificate.
 | |
| func (r *SMIMEA) Sign(usage, selector, matchingType int, cert *x509.Certificate) (err error) {
 | |
| 	r.Hdr.Rrtype = TypeSMIMEA
 | |
| 	r.Usage = uint8(usage)
 | |
| 	r.Selector = uint8(selector)
 | |
| 	r.MatchingType = uint8(matchingType)
 | |
| 
 | |
| 	r.Certificate, err = CertificateToDANE(r.Selector, r.MatchingType, cert)
 | |
| 	return err
 | |
| }
 | |
| 
 | |
| // Verify verifies a SMIMEA record against an SSL certificate. If it is OK
 | |
| // a nil error is returned.
 | |
| func (r *SMIMEA) Verify(cert *x509.Certificate) error {
 | |
| 	c, err := CertificateToDANE(r.Selector, r.MatchingType, cert)
 | |
| 	if err != nil {
 | |
| 		return err // Not also ErrSig?
 | |
| 	}
 | |
| 	if r.Certificate == c {
 | |
| 		return nil
 | |
| 	}
 | |
| 	return ErrSig // ErrSig, really?
 | |
| }
 | |
| 
 | |
| // SMIMEAName returns the ownername of a SMIMEA resource record as per the
 | |
| // format specified in RFC 'draft-ietf-dane-smime-12' Section 2 and 3
 | |
| func SMIMEAName(email, domain string) (string, error) {
 | |
| 	hasher := sha256.New()
 | |
| 	hasher.Write([]byte(email))
 | |
| 
 | |
| 	// RFC Section 3: "The local-part is hashed using the SHA2-256
 | |
| 	// algorithm with the hash truncated to 28 octets and
 | |
| 	// represented in its hexadecimal representation to become the
 | |
| 	// left-most label in the prepared domain name"
 | |
| 	return hex.EncodeToString(hasher.Sum(nil)[:28]) + "." + "_smimecert." + domain, nil
 | |
| }
 |