 131868bdca
			
		
	
	131868bdca
	
	
	
		
			
			Major security, observability, and configuration improvements:
## Security Hardening
- Implemented configurable CORS (no more wildcards)
- Added comprehensive auth middleware for admin endpoints
- Enhanced webhook HMAC validation
- Added input validation and rate limiting
- Security headers and CSP policies
## Configuration Management
- Made N8N webhook URL configurable (WHOOSH_N8N_BASE_URL)
- Replaced all hardcoded endpoints with environment variables
- Added feature flags for LLM vs heuristic composition
- Gitea fetch hardening with EAGER_FILTER and FULL_RESCAN options
## API Completeness
- Implemented GetCouncilComposition function
- Added GET /api/v1/councils/{id} endpoint
- Council artifacts API (POST/GET /api/v1/councils/{id}/artifacts)
- /admin/health/details endpoint with component status
- Database lookup for repository URLs (no hardcoded fallbacks)
## Observability & Performance
- Added OpenTelemetry distributed tracing with goal/pulse correlation
- Performance optimization database indexes
- Comprehensive health monitoring
- Enhanced logging and error handling
## Infrastructure
- Production-ready P2P discovery (replaces mock implementation)
- Removed unused Redis configuration
- Enhanced Docker Swarm integration
- Added migration files for performance indexes
## Code Quality
- Comprehensive input validation
- Graceful error handling and failsafe fallbacks
- Backwards compatibility maintained
- Following security best practices
🤖 Generated with [Claude Code](https://claude.ai/code)
Co-Authored-By: Claude <noreply@anthropic.com>
		
	
		
			
				
	
	
		
			86 lines
		
	
	
		
			2.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			86 lines
		
	
	
		
			2.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2011 The Go Authors. All rights reserved.
 | |
| // Use of this source code is governed by a BSD-style
 | |
| // license that can be found in the LICENSE file.
 | |
| 
 | |
| // Socket control messages
 | |
| 
 | |
| package unix
 | |
| 
 | |
| import "unsafe"
 | |
| 
 | |
| // UnixCredentials encodes credentials into a socket control message
 | |
| // for sending to another process. This can be used for
 | |
| // authentication.
 | |
| func UnixCredentials(ucred *Ucred) []byte {
 | |
| 	b := make([]byte, CmsgSpace(SizeofUcred))
 | |
| 	h := (*Cmsghdr)(unsafe.Pointer(&b[0]))
 | |
| 	h.Level = SOL_SOCKET
 | |
| 	h.Type = SCM_CREDENTIALS
 | |
| 	h.SetLen(CmsgLen(SizeofUcred))
 | |
| 	*(*Ucred)(h.data(0)) = *ucred
 | |
| 	return b
 | |
| }
 | |
| 
 | |
| // ParseUnixCredentials decodes a socket control message that contains
 | |
| // credentials in a Ucred structure. To receive such a message, the
 | |
| // SO_PASSCRED option must be enabled on the socket.
 | |
| func ParseUnixCredentials(m *SocketControlMessage) (*Ucred, error) {
 | |
| 	if m.Header.Level != SOL_SOCKET {
 | |
| 		return nil, EINVAL
 | |
| 	}
 | |
| 	if m.Header.Type != SCM_CREDENTIALS {
 | |
| 		return nil, EINVAL
 | |
| 	}
 | |
| 	ucred := *(*Ucred)(unsafe.Pointer(&m.Data[0]))
 | |
| 	return &ucred, nil
 | |
| }
 | |
| 
 | |
| // PktInfo4 encodes Inet4Pktinfo into a socket control message of type IP_PKTINFO.
 | |
| func PktInfo4(info *Inet4Pktinfo) []byte {
 | |
| 	b := make([]byte, CmsgSpace(SizeofInet4Pktinfo))
 | |
| 	h := (*Cmsghdr)(unsafe.Pointer(&b[0]))
 | |
| 	h.Level = SOL_IP
 | |
| 	h.Type = IP_PKTINFO
 | |
| 	h.SetLen(CmsgLen(SizeofInet4Pktinfo))
 | |
| 	*(*Inet4Pktinfo)(h.data(0)) = *info
 | |
| 	return b
 | |
| }
 | |
| 
 | |
| // PktInfo6 encodes Inet6Pktinfo into a socket control message of type IPV6_PKTINFO.
 | |
| func PktInfo6(info *Inet6Pktinfo) []byte {
 | |
| 	b := make([]byte, CmsgSpace(SizeofInet6Pktinfo))
 | |
| 	h := (*Cmsghdr)(unsafe.Pointer(&b[0]))
 | |
| 	h.Level = SOL_IPV6
 | |
| 	h.Type = IPV6_PKTINFO
 | |
| 	h.SetLen(CmsgLen(SizeofInet6Pktinfo))
 | |
| 	*(*Inet6Pktinfo)(h.data(0)) = *info
 | |
| 	return b
 | |
| }
 | |
| 
 | |
| // ParseOrigDstAddr decodes a socket control message containing the original
 | |
| // destination address. To receive such a message the IP_RECVORIGDSTADDR or
 | |
| // IPV6_RECVORIGDSTADDR option must be enabled on the socket.
 | |
| func ParseOrigDstAddr(m *SocketControlMessage) (Sockaddr, error) {
 | |
| 	switch {
 | |
| 	case m.Header.Level == SOL_IP && m.Header.Type == IP_ORIGDSTADDR:
 | |
| 		pp := (*RawSockaddrInet4)(unsafe.Pointer(&m.Data[0]))
 | |
| 		sa := new(SockaddrInet4)
 | |
| 		p := (*[2]byte)(unsafe.Pointer(&pp.Port))
 | |
| 		sa.Port = int(p[0])<<8 + int(p[1])
 | |
| 		sa.Addr = pp.Addr
 | |
| 		return sa, nil
 | |
| 
 | |
| 	case m.Header.Level == SOL_IPV6 && m.Header.Type == IPV6_ORIGDSTADDR:
 | |
| 		pp := (*RawSockaddrInet6)(unsafe.Pointer(&m.Data[0]))
 | |
| 		sa := new(SockaddrInet6)
 | |
| 		p := (*[2]byte)(unsafe.Pointer(&pp.Port))
 | |
| 		sa.Port = int(p[0])<<8 + int(p[1])
 | |
| 		sa.ZoneId = pp.Scope_id
 | |
| 		sa.Addr = pp.Addr
 | |
| 		return sa, nil
 | |
| 
 | |
| 	default:
 | |
| 		return nil, EINVAL
 | |
| 	}
 | |
| }
 |