 d7ad321176
			
		
	
	d7ad321176
	
	
	
		
			
			This comprehensive implementation includes: - FastAPI backend with MCP server integration - React/TypeScript frontend with Vite - PostgreSQL database with Redis caching - Grafana/Prometheus monitoring stack - Docker Compose orchestration - Full MCP protocol support for Claude Code integration Features: - Agent discovery and management across network - Visual workflow editor and execution engine - Real-time task coordination and monitoring - Multi-model support with specialized agents - Distributed development task allocation 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <noreply@anthropic.com>
		
			
				
	
	
		
			48 lines
		
	
	
		
			1.4 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
			
		
		
	
	
			48 lines
		
	
	
		
			1.4 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
| /**
 | |
|  * Module dependencies.
 | |
|  */
 | |
| 
 | |
| var crypto = require('crypto');
 | |
| 
 | |
| /**
 | |
|  * Sign the given `val` with `secret`.
 | |
|  *
 | |
|  * @param {String} val
 | |
|  * @param {String|NodeJS.ArrayBufferView|crypto.KeyObject} secret
 | |
|  * @return {String}
 | |
|  * @api private
 | |
|  */
 | |
| 
 | |
| exports.sign = function(val, secret){
 | |
|   if ('string' != typeof val) throw new TypeError("Cookie value must be provided as a string.");
 | |
|   if (null == secret) throw new TypeError("Secret key must be provided.");
 | |
|   return val + '.' + crypto
 | |
|     .createHmac('sha256', secret)
 | |
|     .update(val)
 | |
|     .digest('base64')
 | |
|     .replace(/\=+$/, '');
 | |
| };
 | |
| 
 | |
| /**
 | |
|  * Unsign and decode the given `input` with `secret`,
 | |
|  * returning `false` if the signature is invalid.
 | |
|  *
 | |
|  * @param {String} input
 | |
|  * @param {String|NodeJS.ArrayBufferView|crypto.KeyObject} secret
 | |
|  * @return {String|Boolean}
 | |
|  * @api private
 | |
|  */
 | |
| 
 | |
| exports.unsign = function(input, secret){
 | |
|   if ('string' != typeof input) throw new TypeError("Signed cookie string must be provided.");
 | |
|   if (null == secret) throw new TypeError("Secret key must be provided.");
 | |
|   var tentativeValue = input.slice(0, input.lastIndexOf('.')),
 | |
|       expectedInput = exports.sign(tentativeValue, secret),
 | |
|       expectedBuffer = Buffer.from(expectedInput),
 | |
|       inputBuffer = Buffer.from(input);
 | |
|   return (
 | |
|     expectedBuffer.length === inputBuffer.length &&
 | |
|     crypto.timingSafeEqual(expectedBuffer, inputBuffer)
 | |
|    ) ? tentativeValue : false;
 | |
| };
 |