 131868bdca
			
		
	
	131868bdca
	
	
	
		
			
			Major security, observability, and configuration improvements:
## Security Hardening
- Implemented configurable CORS (no more wildcards)
- Added comprehensive auth middleware for admin endpoints
- Enhanced webhook HMAC validation
- Added input validation and rate limiting
- Security headers and CSP policies
## Configuration Management
- Made N8N webhook URL configurable (WHOOSH_N8N_BASE_URL)
- Replaced all hardcoded endpoints with environment variables
- Added feature flags for LLM vs heuristic composition
- Gitea fetch hardening with EAGER_FILTER and FULL_RESCAN options
## API Completeness
- Implemented GetCouncilComposition function
- Added GET /api/v1/councils/{id} endpoint
- Council artifacts API (POST/GET /api/v1/councils/{id}/artifacts)
- /admin/health/details endpoint with component status
- Database lookup for repository URLs (no hardcoded fallbacks)
## Observability & Performance
- Added OpenTelemetry distributed tracing with goal/pulse correlation
- Performance optimization database indexes
- Comprehensive health monitoring
- Enhanced logging and error handling
## Infrastructure
- Production-ready P2P discovery (replaces mock implementation)
- Removed unused Redis configuration
- Enhanced Docker Swarm integration
- Added migration files for performance indexes
## Code Quality
- Comprehensive input validation
- Graceful error handling and failsafe fallbacks
- Backwards compatibility maintained
- Following security best practices
🤖 Generated with [Claude Code](https://claude.ai/code)
Co-Authored-By: Claude <noreply@anthropic.com>
		
	
		
			
				
	
	
		
			101 lines
		
	
	
		
			3.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			101 lines
		
	
	
		
			3.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2018-2019 The NATS Authors
 | |
| // Licensed under the Apache License, Version 2.0 (the "License");
 | |
| // you may not use this file except in compliance with the License.
 | |
| // You may obtain a copy of the License at
 | |
| //
 | |
| // http://www.apache.org/licenses/LICENSE-2.0
 | |
| //
 | |
| // Unless required by applicable law or agreed to in writing, software
 | |
| // distributed under the License is distributed on an "AS IS" BASIS,
 | |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| // See the License for the specific language governing permissions and
 | |
| // limitations under the License.
 | |
| 
 | |
| // Package nkeys is an Ed25519 based public-key signature system that simplifies keys and seeds
 | |
| // and performs signing and verification.
 | |
| // It also supports encryption via x25519 keys and is compatible with https://pkg.go.dev/golang.org/x/crypto/nacl/box.
 | |
| package nkeys
 | |
| 
 | |
| import "io"
 | |
| 
 | |
| // Version is our current version
 | |
| const Version = "0.4.7"
 | |
| 
 | |
| // KeyPair provides the central interface to nkeys.
 | |
| type KeyPair interface {
 | |
| 	Seed() ([]byte, error)
 | |
| 	PublicKey() (string, error)
 | |
| 	PrivateKey() ([]byte, error)
 | |
| 	// Sign is only supported on Non CurveKeyPairs
 | |
| 	Sign(input []byte) ([]byte, error)
 | |
| 	// Verify is only supported on Non CurveKeyPairs
 | |
| 	Verify(input []byte, sig []byte) error
 | |
| 	Wipe()
 | |
| 	// Seal is only supported on CurveKeyPair
 | |
| 	Seal(input []byte, recipient string) ([]byte, error)
 | |
| 	// SealWithRand is only supported on CurveKeyPair
 | |
| 	SealWithRand(input []byte, recipient string, rr io.Reader) ([]byte, error)
 | |
| 	// Open is only supported on CurveKey
 | |
| 	Open(input []byte, sender string) ([]byte, error)
 | |
| }
 | |
| 
 | |
| // CreateUser will create a User typed KeyPair.
 | |
| func CreateUser() (KeyPair, error) {
 | |
| 	return CreatePair(PrefixByteUser)
 | |
| }
 | |
| 
 | |
| // CreateAccount will create an Account typed KeyPair.
 | |
| func CreateAccount() (KeyPair, error) {
 | |
| 	return CreatePair(PrefixByteAccount)
 | |
| }
 | |
| 
 | |
| // CreateServer will create a Server typed KeyPair.
 | |
| func CreateServer() (KeyPair, error) {
 | |
| 	return CreatePair(PrefixByteServer)
 | |
| }
 | |
| 
 | |
| // CreateCluster will create a Cluster typed KeyPair.
 | |
| func CreateCluster() (KeyPair, error) {
 | |
| 	return CreatePair(PrefixByteCluster)
 | |
| }
 | |
| 
 | |
| // CreateOperator will create an Operator typed KeyPair.
 | |
| func CreateOperator() (KeyPair, error) {
 | |
| 	return CreatePair(PrefixByteOperator)
 | |
| }
 | |
| 
 | |
| // FromPublicKey will create a KeyPair capable of verifying signatures.
 | |
| func FromPublicKey(public string) (KeyPair, error) {
 | |
| 	raw, err := decode([]byte(public))
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	pre := PrefixByte(raw[0])
 | |
| 	if err := checkValidPublicPrefixByte(pre); err != nil {
 | |
| 		return nil, ErrInvalidPublicKey
 | |
| 	}
 | |
| 	return &pub{pre, raw[1:]}, nil
 | |
| }
 | |
| 
 | |
| // FromSeed will create a KeyPair capable of signing and verifying signatures.
 | |
| func FromSeed(seed []byte) (KeyPair, error) {
 | |
| 	prefix, _, err := DecodeSeed(seed)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	if prefix == PrefixByteCurve {
 | |
| 		return FromCurveSeed(seed)
 | |
| 	}
 | |
| 	copy := append([]byte{}, seed...)
 | |
| 	return &kp{copy}, nil
 | |
| }
 | |
| 
 | |
| // FromRawSeed will create a KeyPair from the raw 32 byte seed for a given type.
 | |
| func FromRawSeed(prefix PrefixByte, rawSeed []byte) (KeyPair, error) {
 | |
| 	seed, err := EncodeSeed(prefix, rawSeed)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return &kp{seed}, nil
 | |
| }
 |