Major security, observability, and configuration improvements:
## Security Hardening
- Implemented configurable CORS (no more wildcards)
- Added comprehensive auth middleware for admin endpoints
- Enhanced webhook HMAC validation
- Added input validation and rate limiting
- Security headers and CSP policies
## Configuration Management
- Made N8N webhook URL configurable (WHOOSH_N8N_BASE_URL)
- Replaced all hardcoded endpoints with environment variables
- Added feature flags for LLM vs heuristic composition
- Gitea fetch hardening with EAGER_FILTER and FULL_RESCAN options
## API Completeness
- Implemented GetCouncilComposition function
- Added GET /api/v1/councils/{id} endpoint
- Council artifacts API (POST/GET /api/v1/councils/{id}/artifacts)
- /admin/health/details endpoint with component status
- Database lookup for repository URLs (no hardcoded fallbacks)
## Observability & Performance
- Added OpenTelemetry distributed tracing with goal/pulse correlation
- Performance optimization database indexes
- Comprehensive health monitoring
- Enhanced logging and error handling
## Infrastructure
- Production-ready P2P discovery (replaces mock implementation)
- Removed unused Redis configuration
- Enhanced Docker Swarm integration
- Added migration files for performance indexes
## Code Quality
- Comprehensive input validation
- Graceful error handling and failsafe fallbacks
- Backwards compatibility maintained
- Following security best practices
🤖 Generated with [Claude Code](https://claude.ai/code)
Co-Authored-By: Claude <noreply@anthropic.com>
39 lines
1.0 KiB
Go
39 lines
1.0 KiB
Go
// Package sockets provides helper functions to create and configure Unix or TCP sockets.
|
|
package sockets
|
|
|
|
import (
|
|
"errors"
|
|
"net"
|
|
"net/http"
|
|
"time"
|
|
)
|
|
|
|
// Why 32? See https://github.com/docker/docker/pull/8035.
|
|
const defaultTimeout = 32 * time.Second
|
|
|
|
// ErrProtocolNotAvailable is returned when a given transport protocol is not provided by the operating system.
|
|
var ErrProtocolNotAvailable = errors.New("protocol not available")
|
|
|
|
// ConfigureTransport configures the specified Transport according to the
|
|
// specified proto and addr.
|
|
// If the proto is unix (using a unix socket to communicate) or npipe the
|
|
// compression is disabled.
|
|
func ConfigureTransport(tr *http.Transport, proto, addr string) error {
|
|
switch proto {
|
|
case "unix":
|
|
return configureUnixTransport(tr, proto, addr)
|
|
case "npipe":
|
|
return configureNpipeTransport(tr, proto, addr)
|
|
default:
|
|
tr.Proxy = http.ProxyFromEnvironment
|
|
dialer, err := DialerFromEnvironment(&net.Dialer{
|
|
Timeout: defaultTimeout,
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
tr.Dial = dialer.Dial
|
|
}
|
|
return nil
|
|
}
|