 131868bdca
			
		
	
	131868bdca
	
	
	
		
			
			Major security, observability, and configuration improvements:
## Security Hardening
- Implemented configurable CORS (no more wildcards)
- Added comprehensive auth middleware for admin endpoints
- Enhanced webhook HMAC validation
- Added input validation and rate limiting
- Security headers and CSP policies
## Configuration Management
- Made N8N webhook URL configurable (WHOOSH_N8N_BASE_URL)
- Replaced all hardcoded endpoints with environment variables
- Added feature flags for LLM vs heuristic composition
- Gitea fetch hardening with EAGER_FILTER and FULL_RESCAN options
## API Completeness
- Implemented GetCouncilComposition function
- Added GET /api/v1/councils/{id} endpoint
- Council artifacts API (POST/GET /api/v1/councils/{id}/artifacts)
- /admin/health/details endpoint with component status
- Database lookup for repository URLs (no hardcoded fallbacks)
## Observability & Performance
- Added OpenTelemetry distributed tracing with goal/pulse correlation
- Performance optimization database indexes
- Comprehensive health monitoring
- Enhanced logging and error handling
## Infrastructure
- Production-ready P2P discovery (replaces mock implementation)
- Removed unused Redis configuration
- Enhanced Docker Swarm integration
- Added migration files for performance indexes
## Code Quality
- Comprehensive input validation
- Graceful error handling and failsafe fallbacks
- Backwards compatibility maintained
- Following security best practices
🤖 Generated with [Claude Code](https://claude.ai/code)
Co-Authored-By: Claude <noreply@anthropic.com>
		
	
		
			
				
	
	
		
			94 lines
		
	
	
		
			2.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			94 lines
		
	
	
		
			2.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package jwt
 | |
| 
 | |
| import (
 | |
| 	"crypto"
 | |
| 	"crypto/rand"
 | |
| 	"crypto/rsa"
 | |
| )
 | |
| 
 | |
| // SigningMethodRSA implements the RSA family of signing methods.
 | |
| // Expects *rsa.PrivateKey for signing and *rsa.PublicKey for validation
 | |
| type SigningMethodRSA struct {
 | |
| 	Name string
 | |
| 	Hash crypto.Hash
 | |
| }
 | |
| 
 | |
| // Specific instances for RS256 and company
 | |
| var (
 | |
| 	SigningMethodRS256 *SigningMethodRSA
 | |
| 	SigningMethodRS384 *SigningMethodRSA
 | |
| 	SigningMethodRS512 *SigningMethodRSA
 | |
| )
 | |
| 
 | |
| func init() {
 | |
| 	// RS256
 | |
| 	SigningMethodRS256 = &SigningMethodRSA{"RS256", crypto.SHA256}
 | |
| 	RegisterSigningMethod(SigningMethodRS256.Alg(), func() SigningMethod {
 | |
| 		return SigningMethodRS256
 | |
| 	})
 | |
| 
 | |
| 	// RS384
 | |
| 	SigningMethodRS384 = &SigningMethodRSA{"RS384", crypto.SHA384}
 | |
| 	RegisterSigningMethod(SigningMethodRS384.Alg(), func() SigningMethod {
 | |
| 		return SigningMethodRS384
 | |
| 	})
 | |
| 
 | |
| 	// RS512
 | |
| 	SigningMethodRS512 = &SigningMethodRSA{"RS512", crypto.SHA512}
 | |
| 	RegisterSigningMethod(SigningMethodRS512.Alg(), func() SigningMethod {
 | |
| 		return SigningMethodRS512
 | |
| 	})
 | |
| }
 | |
| 
 | |
| func (m *SigningMethodRSA) Alg() string {
 | |
| 	return m.Name
 | |
| }
 | |
| 
 | |
| // Verify implements token verification for the SigningMethod
 | |
| // For this signing method, must be an *rsa.PublicKey structure.
 | |
| func (m *SigningMethodRSA) Verify(signingString string, sig []byte, key any) error {
 | |
| 	var rsaKey *rsa.PublicKey
 | |
| 	var ok bool
 | |
| 
 | |
| 	if rsaKey, ok = key.(*rsa.PublicKey); !ok {
 | |
| 		return newError("RSA verify expects *rsa.PublicKey", ErrInvalidKeyType)
 | |
| 	}
 | |
| 
 | |
| 	// Create hasher
 | |
| 	if !m.Hash.Available() {
 | |
| 		return ErrHashUnavailable
 | |
| 	}
 | |
| 	hasher := m.Hash.New()
 | |
| 	hasher.Write([]byte(signingString))
 | |
| 
 | |
| 	// Verify the signature
 | |
| 	return rsa.VerifyPKCS1v15(rsaKey, m.Hash, hasher.Sum(nil), sig)
 | |
| }
 | |
| 
 | |
| // Sign implements token signing for the SigningMethod
 | |
| // For this signing method, must be an *rsa.PrivateKey structure.
 | |
| func (m *SigningMethodRSA) Sign(signingString string, key any) ([]byte, error) {
 | |
| 	var rsaKey *rsa.PrivateKey
 | |
| 	var ok bool
 | |
| 
 | |
| 	// Validate type of key
 | |
| 	if rsaKey, ok = key.(*rsa.PrivateKey); !ok {
 | |
| 		return nil, newError("RSA sign expects *rsa.PrivateKey", ErrInvalidKeyType)
 | |
| 	}
 | |
| 
 | |
| 	// Create the hasher
 | |
| 	if !m.Hash.Available() {
 | |
| 		return nil, ErrHashUnavailable
 | |
| 	}
 | |
| 
 | |
| 	hasher := m.Hash.New()
 | |
| 	hasher.Write([]byte(signingString))
 | |
| 
 | |
| 	// Sign the string and return the encoded bytes
 | |
| 	if sigBytes, err := rsa.SignPKCS1v15(rand.Reader, rsaKey, m.Hash, hasher.Sum(nil)); err == nil {
 | |
| 		return sigBytes, nil
 | |
| 	} else {
 | |
| 		return nil, err
 | |
| 	}
 | |
| }
 |