Documentation
¶
Index ¶
- func ValidateBlueprint(bp *NetworkBlueprint) error
- type AuditEntry
- type AuditExporter
- type BlueprintAuditExport
- type BlueprintIdentityProvider
- type BlueprintPolicy
- type BlueprintRole
- type BlueprintWebhooks
- type Client
- func (c *Client) CheckTrust(nodeA, nodeB uint32) (bool, error)
- func (c *Client) ClearKeyExpiryAdmin(nodeID uint32, adminToken string) (map[string]interface{}, error)
- func (c *Client) Close() error
- func (c *Client) CreateNetwork(nodeID uint32, name, joinRule, token, adminToken string, enterprise bool, ...) (map[string]interface{}, error)
- func (c *Client) DeleteNetwork(networkID uint16, adminToken string, nodeID ...uint32) (map[string]interface{}, error)
- func (c *Client) DemoteMember(networkID uint16, nodeID, targetNodeID uint32, adminToken string) (map[string]interface{}, error)
- func (c *Client) Deregister(nodeID uint32) (map[string]interface{}, error)
- func (c *Client) DeregisterAdmin(nodeID uint32, adminToken string) (map[string]interface{}, error)
- func (c *Client) DirectoryStatus(networkID uint16, adminToken string) (map[string]interface{}, error)
- func (c *Client) DirectorySync(networkID uint16, entries []map[string]interface{}, removeUnlisted bool, ...) (map[string]interface{}, error)
- func (c *Client) GetAuditExport(adminToken string) (map[string]interface{}, error)
- func (c *Client) GetAuditLog(networkID uint16, adminToken string) (map[string]interface{}, error)
- func (c *Client) GetIDPConfig(adminToken string) (map[string]interface{}, error)
- func (c *Client) GetIdentity(nodeID uint32, adminToken string) (map[string]interface{}, error)
- func (c *Client) GetKeyInfo(nodeID uint32) (map[string]interface{}, error)
- func (c *Client) GetMemberRole(networkID uint16, targetNodeID uint32) (map[string]interface{}, error)
- func (c *Client) GetNetworkPolicy(networkID uint16) (map[string]interface{}, error)
- func (c *Client) GetPoloScore(nodeID uint32) (int, error)
- func (c *Client) GetProvisionStatus(adminToken string) (map[string]interface{}, error)
- func (c *Client) GetWebhook(adminToken string) (map[string]interface{}, error)
- func (c *Client) GetWebhookDLQ(adminToken string) (map[string]interface{}, error)
- func (c *Client) Heartbeat(nodeID uint32) (map[string]interface{}, error)
- func (c *Client) InviteToNetwork(networkID uint16, inviterID, targetNodeID uint32, adminToken string) (map[string]interface{}, error)
- func (c *Client) JoinNetwork(nodeID uint32, networkID uint16, token string, inviterID uint32, ...) (map[string]interface{}, error)
- func (c *Client) KickMember(networkID uint16, nodeID, targetNodeID uint32, adminToken string) (map[string]interface{}, error)
- func (c *Client) LeaveNetwork(nodeID uint32, networkID uint16, adminToken string) (map[string]interface{}, error)
- func (c *Client) ListNetworks() (map[string]interface{}, error)
- func (c *Client) ListNodes(networkID uint16, adminToken ...string) (map[string]interface{}, error)
- func (c *Client) Lookup(nodeID uint32) (map[string]interface{}, error)
- func (c *Client) PollHandshakes(nodeID uint32) (map[string]interface{}, error)
- func (c *Client) PollInvites(nodeID uint32) (map[string]interface{}, error)
- func (c *Client) PromoteMember(networkID uint16, nodeID, targetNodeID uint32, adminToken string) (map[string]interface{}, error)
- func (c *Client) ProvisionNetwork(blueprint map[string]interface{}, adminToken string) (map[string]interface{}, error)
- func (c *Client) Punch(requesterID, nodeA, nodeB uint32) (map[string]interface{}, error)
- func (c *Client) Register(listenAddr string) (map[string]interface{}, error)
- func (c *Client) RegisterWithKey(listenAddr, publicKeyB64, owner string, lanAddrs []string) (map[string]interface{}, error)
- func (c *Client) RegisterWithOwner(listenAddr, owner string) (map[string]interface{}, error)
- func (c *Client) RenameNetwork(networkID uint16, name, adminToken string, nodeID ...uint32) (map[string]interface{}, error)
- func (c *Client) ReportTrust(nodeID, peerID uint32) (map[string]interface{}, error)
- func (c *Client) RequestHandshake(fromNodeID, toNodeID uint32, justification, signatureB64 string) (map[string]interface{}, error)
- func (c *Client) Resolve(nodeID, requesterID uint32) (map[string]interface{}, error)
- func (c *Client) ResolveHostname(hostname string) (map[string]interface{}, error)
- func (c *Client) ResolveHostnameAs(requesterID uint32, hostname string) (map[string]interface{}, error)
- func (c *Client) RespondHandshake(nodeID, peerID uint32, accept bool, signatureB64 string) (map[string]interface{}, error)
- func (c *Client) RespondInvite(nodeID uint32, networkID uint16, accept bool) (map[string]interface{}, error)
- func (c *Client) RevokeTrust(nodeID, peerID uint32) (map[string]interface{}, error)
- func (c *Client) RotateKey(nodeID uint32, signatureB64, newPubKeyB64 string) (map[string]interface{}, error)
- func (c *Client) Send(msg map[string]interface{}) (map[string]interface{}, error)
- func (c *Client) SetAuditExport(format, endpoint, token, index, source, adminToken string) (map[string]interface{}, error)
- func (c *Client) SetExternalID(nodeID uint32, externalID, adminToken string) (map[string]interface{}, error)
- func (c *Client) SetHostname(nodeID uint32, hostname string) (map[string]interface{}, error)
- func (c *Client) SetHostnameAdmin(nodeID uint32, hostname, adminToken string) (map[string]interface{}, error)
- func (c *Client) SetIDPConfig(idpType, url, issuer, clientID, tenantID, domain, adminToken string) (map[string]interface{}, error)
- func (c *Client) SetIdentityWebhook(url, adminToken string) (map[string]interface{}, error)
- func (c *Client) SetKeyExpiry(nodeID uint32, expiresAt time.Time) (map[string]interface{}, error)
- func (c *Client) SetKeyExpiryAdmin(nodeID uint32, expiresAt time.Time, adminToken string) (map[string]interface{}, error)
- func (c *Client) SetNetworkEnterprise(networkID uint16, enterprise bool, adminToken string) (map[string]interface{}, error)
- func (c *Client) SetNetworkPolicy(networkID uint16, policy map[string]interface{}, adminToken string) (map[string]interface{}, error)
- func (c *Client) SetPoloScore(nodeID uint32, poloScore int) (map[string]interface{}, error)
- func (c *Client) SetSigner(fn func(challenge string) string)
- func (c *Client) SetTags(nodeID uint32, tags []string) (map[string]interface{}, error)
- func (c *Client) SetTagsAdmin(nodeID uint32, tags []string, adminToken string) (map[string]interface{}, error)
- func (c *Client) SetTaskExec(nodeID uint32, enabled bool) (map[string]interface{}, error)
- func (c *Client) SetTaskExecAdmin(nodeID uint32, enabled bool, adminToken string) (map[string]interface{}, error)
- func (c *Client) SetVisibility(nodeID uint32, public bool) (map[string]interface{}, error)
- func (c *Client) SetVisibilityAdmin(nodeID uint32, public bool, adminToken string) (map[string]interface{}, error)
- func (c *Client) SetWebhook(url, adminToken string) (map[string]interface{}, error)
- func (c *Client) TransferOwnership(networkID uint16, ownerNodeID, newOwnerID uint32, adminToken string) (map[string]interface{}, error)
- func (c *Client) UpdatePoloScore(nodeID uint32, delta int) (map[string]interface{}, error)
- func (c *Client) ValidateToken(token, adminToken string) (map[string]interface{}, error)
- type DashboardEdge
- type DashboardNode
- type DashboardStats
- type DirectoryEntry
- type DirectorySyncRequest
- type DirectorySyncResult
- type HandshakeRelayMsg
- type HandshakeResponseMsg
- type KeyInfo
- type NetworkBlueprint
- type NetworkInfo
- type NetworkInvite
- type NetworkPolicy
- type NodeInfo
- type OperationRateLimiter
- type ProvisionResult
- type RateLimiter
- type RegistryWebhookEvent
- type Role
- type Server
- func (s *Server) Addr() net.Addr
- func (s *Server) ApplyBlueprint(bp *NetworkBlueprint, adminToken string) (*ProvisionResult, error)
- func (s *Server) Close() error
- func (s *Server) ConnCount() int64
- func (s *Server) GetAuditExportConfig() *BlueprintAuditExport
- func (s *Server) GetDashboardStats() DashboardStats
- func (s *Server) GetIdentityProviderConfig() *BlueprintIdentityProvider
- func (s *Server) IsStandby() bool
- func (s *Server) ListenAndServe(addr string) error
- func (s *Server) Ready() <-chan struct{}
- func (s *Server) Reap()
- func (s *Server) RunStandby(primaryAddr string)
- func (s *Server) ServeDashboard(addr string) error
- func (s *Server) SetAdminToken(token string)
- func (s *Server) SetClock(fn func() time.Time)
- func (s *Server) SetIdentityWebhookURL(url string)
- func (s *Server) SetMaxConnections(max int64)
- func (s *Server) SetOperationRateLimiterClock(fn func() time.Time)
- func (s *Server) SetReplicationToken(token string)
- func (s *Server) SetStandby(primary string)
- func (s *Server) SetTLS(certFile, keyFile string) error
- func (s *Server) SetWebhookURL(url string)
- func (s *Server) SyncTimestamp(netID uint16) time.Time
- func (s *Server) TriggerSnapshot() error
- type SplunkHECEvent
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func ValidateBlueprint ¶ added in v1.5.1
func ValidateBlueprint(bp *NetworkBlueprint) error
ValidateBlueprint checks a blueprint for configuration errors.
Types ¶
type AuditEntry ¶ added in v1.5.1
type AuditEntry struct {
Timestamp string `json:"timestamp"`
Action string `json:"action"`
NetworkID uint16 `json:"network_id,omitempty"`
NodeID uint32 `json:"node_id,omitempty"`
Details string `json:"details,omitempty"`
}
AuditEntry records a single audit event.
type AuditExporter ¶ added in v1.5.1
type AuditExporter struct {
// contains filtered or unexported fields
}
AuditExporter sends audit events to an external system in the configured format (Splunk HEC, syslog/CEF, or plain JSON). It runs asynchronously with a buffered channel, just like registryWebhook.
func (*AuditExporter) Close ¶ added in v1.5.1
func (ae *AuditExporter) Close()
Close drains the queue and stops the background goroutine.
func (*AuditExporter) Export ¶ added in v1.5.1
func (ae *AuditExporter) Export(entry *AuditEntry)
Export queues an audit entry for export. Non-blocking; drops if buffer full.
func (*AuditExporter) Stats ¶ added in v1.5.1
func (ae *AuditExporter) Stats() (exported, dropped uint64)
Stats returns export statistics.
type BlueprintAuditExport ¶ added in v1.5.1
type BlueprintAuditExport struct {
Format string `json:"format"` // "json", "splunk_hec", "syslog_cef"
Endpoint string `json:"endpoint"` // destination URL or address
Token string `json:"token,omitempty"` // auth token (e.g., Splunk HEC token)
Index string `json:"index,omitempty"` // Splunk index
Source string `json:"source,omitempty"` // source identifier
}
BlueprintAuditExport configures external audit log export.
type BlueprintIdentityProvider ¶ added in v1.5.1
type BlueprintIdentityProvider struct {
Type string `json:"type"` // "oidc", "saml", "webhook", "entra_id", "ldap"
URL string `json:"url"` // verification endpoint
Issuer string `json:"issuer,omitempty"` // OIDC issuer URL
ClientID string `json:"client_id,omitempty"` // OIDC client ID
TenantID string `json:"tenant_id,omitempty"` // Azure AD / Entra ID tenant
Domain string `json:"domain,omitempty"` // LDAP domain
}
BlueprintIdentityProvider configures external identity verification.
type BlueprintPolicy ¶ added in v1.5.1
type BlueprintPolicy struct {
MaxMembers int `json:"max_members,omitempty"`
AllowedPorts []uint16 `json:"allowed_ports,omitempty"`
Description string `json:"description,omitempty"`
}
BlueprintPolicy defines the network policy section of a blueprint.
type BlueprintRole ¶ added in v1.5.1
type BlueprintRole struct {
ExternalID string `json:"external_id"`
Role string `json:"role"` // "owner", "admin", "member"
}
BlueprintRole pre-assigns RBAC roles by external identity.
type BlueprintWebhooks ¶ added in v1.5.1
type BlueprintWebhooks struct {
AuditURL string `json:"audit_url,omitempty"` // audit event webhook
IdentityURL string `json:"identity_url,omitempty"` // identity verification webhook
}
BlueprintWebhooks configures webhook endpoints for the network.
type Client ¶
type Client struct {
// contains filtered or unexported fields
}
Client talks to a registry server over TCP (optionally TLS). It automatically reconnects if the connection drops.
func DialTLS ¶
DialTLS connects to a registry server over TLS. A non-nil tlsConfig is required. For certificate pinning, use DialTLSPinned.
func DialTLSPinned ¶
DialTLSPinned connects to a registry server over TLS with certificate pinning. The fingerprint is a hex-encoded SHA-256 hash of the server's DER-encoded certificate.
func (*Client) CheckTrust ¶ added in v1.4.0
CheckTrust checks if a trust pair or shared network exists between two nodes.
func (*Client) ClearKeyExpiryAdmin ¶ added in v1.5.1
func (c *Client) ClearKeyExpiryAdmin(nodeID uint32, adminToken string) (map[string]interface{}, error)
ClearKeyExpiryAdmin removes the key expiry from a node using admin token auth.
func (*Client) CreateNetwork ¶
func (*Client) DeleteNetwork ¶ added in v1.5.1
func (*Client) DemoteMember ¶ added in v1.5.1
func (c *Client) DemoteMember(networkID uint16, nodeID, targetNodeID uint32, adminToken string) (map[string]interface{}, error)
DemoteMember demotes an admin to member. Only the owner can demote.
func (*Client) Deregister ¶
func (*Client) DeregisterAdmin ¶ added in v1.5.1
DeregisterAdmin removes a node using admin token auth.
func (*Client) DirectoryStatus ¶ added in v1.5.1
func (c *Client) DirectoryStatus(networkID uint16, adminToken string) (map[string]interface{}, error)
DirectoryStatus returns directory sync status for a network.
func (*Client) DirectorySync ¶ added in v1.5.1
func (c *Client) DirectorySync(networkID uint16, entries []map[string]interface{}, removeUnlisted bool, adminToken string) (map[string]interface{}, error)
DirectorySync pushes a directory listing to update RBAC roles and membership.
func (*Client) GetAuditExport ¶ added in v1.5.1
GetAuditExport returns the current audit export configuration. Requires admin token.
func (*Client) GetAuditLog ¶ added in v1.5.1
GetAuditLog returns recent audit entries from the registry.
func (*Client) GetIDPConfig ¶ added in v1.5.1
GetIDPConfig returns the current identity provider configuration. Requires admin token.
func (*Client) GetIdentity ¶ added in v1.5.1
GetIdentity returns the external identity of a node. Requires admin token.
func (*Client) GetKeyInfo ¶ added in v1.5.1
GetKeyInfo returns key lifecycle metadata for a node.
func (*Client) GetMemberRole ¶ added in v1.5.1
func (c *Client) GetMemberRole(networkID uint16, targetNodeID uint32) (map[string]interface{}, error)
GetMemberRole returns the RBAC role of a node in a network.
func (*Client) GetNetworkPolicy ¶ added in v1.5.1
GetNetworkPolicy returns the policy for a given network.
func (*Client) GetPoloScore ¶ added in v1.3.0
GetPoloScore retrieves the current polo score for a node.
func (*Client) GetProvisionStatus ¶ added in v1.5.1
GetProvisionStatus returns per-network provisioning status. Requires admin token.
func (*Client) GetWebhook ¶ added in v1.5.1
GetWebhook returns the current webhook configuration.
func (*Client) GetWebhookDLQ ¶ added in v1.5.1
GetWebhookDLQ returns the dead letter queue (failed webhook events).
func (*Client) InviteToNetwork ¶ added in v1.5.1
func (c *Client) InviteToNetwork(networkID uint16, inviterID, targetNodeID uint32, adminToken string) (map[string]interface{}, error)
InviteToNetwork stores a pending invite for a target node to join an invite-only network.
func (*Client) JoinNetwork ¶
func (*Client) KickMember ¶ added in v1.5.1
func (c *Client) KickMember(networkID uint16, nodeID, targetNodeID uint32, adminToken string) (map[string]interface{}, error)
KickMember removes a member from a network. Requires owner or admin role.
func (*Client) LeaveNetwork ¶
func (*Client) ListNetworks ¶
func (*Client) PollHandshakes ¶
PollHandshakes retrieves and clears pending handshake requests for a node. H3 fix: includes a signature to prove node identity.
func (*Client) PollInvites ¶ added in v1.5.1
PollInvites returns and clears pending network invites for a node. Signed.
func (*Client) PromoteMember ¶ added in v1.5.1
func (c *Client) PromoteMember(networkID uint16, nodeID, targetNodeID uint32, adminToken string) (map[string]interface{}, error)
PromoteMember promotes a network member to admin. Only the owner can promote.
func (*Client) ProvisionNetwork ¶ added in v1.5.1
func (c *Client) ProvisionNetwork(blueprint map[string]interface{}, adminToken string) (map[string]interface{}, error)
ProvisionNetwork applies a network blueprint. Requires admin token.
func (*Client) RegisterWithKey ¶
func (c *Client) RegisterWithKey(listenAddr, publicKeyB64, owner string, lanAddrs []string) (map[string]interface{}, error)
RegisterWithKey re-registers using an existing Ed25519 public key. The registry returns the same node_id if the key is known. lanAddrs are the node's LAN addresses for same-network peer detection.
func (*Client) RegisterWithOwner ¶
RegisterWithOwner registers a new node with an owner identifier (email/name) for key rotation recovery.
func (*Client) RenameNetwork ¶ added in v1.5.1
func (*Client) ReportTrust ¶
func (*Client) RequestHandshake ¶
func (c *Client) RequestHandshake(fromNodeID, toNodeID uint32, justification, signatureB64 string) (map[string]interface{}, error)
RequestHandshake relays a handshake request through the registry to a target node. This works even for private nodes — no IP exposure needed. M12 fix: includes a signature to prove sender identity.
func (*Client) ResolveHostname ¶
ResolveHostname resolves a hostname to node info (node_id, address, public flag).
func (*Client) ResolveHostnameAs ¶ added in v1.4.0
func (c *Client) ResolveHostnameAs(requesterID uint32, hostname string) (map[string]interface{}, error)
ResolveHostnameAs resolves a hostname with a requester_id for privacy checks. Private nodes require the requester to have a trust pair or shared network.
func (*Client) RespondHandshake ¶
func (c *Client) RespondHandshake(nodeID, peerID uint32, accept bool, signatureB64 string) (map[string]interface{}, error)
RespondHandshake approves or rejects a relayed handshake request. If accepted, the registry creates a mutual trust pair. M12 fix: includes a signature to prove responder identity.
func (*Client) RespondInvite ¶ added in v1.5.1
func (c *Client) RespondInvite(nodeID uint32, networkID uint16, accept bool) (map[string]interface{}, error)
RespondInvite accepts or rejects a pending network invite. Signed.
func (*Client) RevokeTrust ¶
func (*Client) RotateKey ¶
func (c *Client) RotateKey(nodeID uint32, signatureB64, newPubKeyB64 string) (map[string]interface{}, error)
RotateKey requests a key rotation for a node. Requires a signature proving ownership of the current key and the new public key.
func (*Client) SetAuditExport ¶ added in v1.5.1
func (c *Client) SetAuditExport(format, endpoint, token, index, source, adminToken string) (map[string]interface{}, error)
SetAuditExport configures the audit export adapter. Requires admin token.
func (*Client) SetExternalID ¶ added in v1.5.1
func (c *Client) SetExternalID(nodeID uint32, externalID, adminToken string) (map[string]interface{}, error)
SetExternalID sets the external identity on a node. Requires admin token.
func (*Client) SetHostname ¶
SetHostname sets or clears the hostname for a node. An empty hostname clears the current hostname.
func (*Client) SetHostnameAdmin ¶ added in v1.5.1
func (c *Client) SetHostnameAdmin(nodeID uint32, hostname, adminToken string) (map[string]interface{}, error)
SetHostnameAdmin sets a node's hostname using admin token auth.
func (*Client) SetIDPConfig ¶ added in v1.5.1
func (c *Client) SetIDPConfig(idpType, url, issuer, clientID, tenantID, domain, adminToken string) (map[string]interface{}, error)
SetIDPConfig configures the identity provider. Requires admin token.
func (*Client) SetIdentityWebhook ¶ added in v1.5.1
SetIdentityWebhook configures the identity verification webhook URL.
func (*Client) SetKeyExpiry ¶ added in v1.5.1
SetKeyExpiry sets the key expiry time for a node. Requires signature.
func (*Client) SetKeyExpiryAdmin ¶ added in v1.5.1
func (c *Client) SetKeyExpiryAdmin(nodeID uint32, expiresAt time.Time, adminToken string) (map[string]interface{}, error)
SetKeyExpiryAdmin sets a node's key expiry using admin token auth.
func (*Client) SetNetworkEnterprise ¶ added in v1.5.1
func (*Client) SetNetworkPolicy ¶ added in v1.5.1
func (c *Client) SetNetworkPolicy(networkID uint16, policy map[string]interface{}, adminToken string) (map[string]interface{}, error)
SetNetworkPolicy sets or updates a network's policy. Requires owner/admin role or admin token.
func (*Client) SetPoloScore ¶ added in v1.3.0
SetPoloScore sets the polo score of a node to a specific value.
func (*Client) SetSigner ¶
SetSigner sets a signing function for authenticated registry operations (H3 fix). The signer receives a challenge string and returns a base64-encoded Ed25519 signature.
func (*Client) SetTagsAdmin ¶ added in v1.5.1
func (c *Client) SetTagsAdmin(nodeID uint32, tags []string, adminToken string) (map[string]interface{}, error)
SetTagsAdmin sets a node's tags using admin token auth.
func (*Client) SetTaskExec ¶
func (*Client) SetTaskExecAdmin ¶ added in v1.5.1
func (c *Client) SetTaskExecAdmin(nodeID uint32, enabled bool, adminToken string) (map[string]interface{}, error)
SetTaskExecAdmin sets a node's task exec flag using admin token auth.
func (*Client) SetVisibility ¶
func (*Client) SetVisibilityAdmin ¶ added in v1.5.1
func (c *Client) SetVisibilityAdmin(nodeID uint32, public bool, adminToken string) (map[string]interface{}, error)
SetVisibilityAdmin sets a node's visibility using admin token auth.
func (*Client) SetWebhook ¶ added in v1.5.1
SetWebhook configures the registry webhook URL. Pass empty string to disable.
func (*Client) TransferOwnership ¶ added in v1.5.1
func (c *Client) TransferOwnership(networkID uint16, ownerNodeID, newOwnerID uint32, adminToken string) (map[string]interface{}, error)
TransferOwnership transfers network ownership to another member. Only the current owner can transfer.
func (*Client) UpdatePoloScore ¶ added in v1.3.0
UpdatePoloScore adjusts the polo score of a node by the given delta. Delta can be positive (increase polo score) or negative (decrease polo score).
type DashboardEdge ¶
DashboardEdge represents a trust relationship between two nodes.
type DashboardNode ¶
type DashboardNode struct {
Address string `json:"address"`
Tags []string `json:"tags"`
Online bool `json:"online"`
TrustLinks int `json:"trust_links"`
TaskExec bool `json:"task_exec"`
PoloScore int `json:"polo_score"`
}
DashboardNode is a public-safe view of a node for the dashboard.
type DashboardStats ¶
type DashboardStats struct {
TotalNodes int `json:"total_nodes"`
ActiveNodes int `json:"active_nodes"`
TotalTrustLinks int `json:"total_trust_links"`
TotalRequests int64 `json:"total_requests"`
UniqueTags int `json:"unique_tags"`
TaskExecutors int `json:"task_executors"`
Nodes []DashboardNode `json:"nodes"`
Edges []DashboardEdge `json:"edges"`
UptimeSecs int64 `json:"uptime_secs"`
}
DashboardStats is the public-safe data returned by the dashboard API.
type DirectoryEntry ¶ added in v1.5.1
type DirectoryEntry struct {
ExternalID string `json:"external_id"` // unique ID from directory (OIDC sub, email, GUID)
DisplayName string `json:"display_name,omitempty"`
Email string `json:"email,omitempty"`
Groups []string `json:"groups,omitempty"` // directory groups
Role string `json:"role,omitempty"` // desired pilot role: "owner", "admin", "member"
Disabled bool `json:"disabled,omitempty"` // deprovisioned users
}
DirectoryEntry represents a user from an enterprise directory (AD, Entra ID, LDAP).
type DirectorySyncRequest ¶ added in v1.5.1
type DirectorySyncRequest struct {
NetworkID uint16 `json:"network_id"`
Entries []DirectoryEntry `json:"entries"`
// If true, nodes whose external_id is not in the entries list will be kicked.
RemoveUnlisted bool `json:"remove_unlisted,omitempty"`
}
DirectorySyncRequest is the protocol payload for directory sync.
type DirectorySyncResult ¶ added in v1.5.1
type DirectorySyncResult struct {
Updated int `json:"updated"` // roles updated
Disabled int `json:"disabled"` // nodes disabled (kicked)
Mapped int `json:"mapped"` // entries mapped to existing nodes
Unmapped int `json:"unmapped"` // entries with no matching node
Actions []string `json:"actions"`
}
DirectorySyncResult describes what the sync operation did.
type HandshakeRelayMsg ¶
type HandshakeRelayMsg struct {
FromNodeID uint32 `json:"from_node_id"`
Justification string `json:"justification"`
Timestamp time.Time `json:"timestamp"`
}
HandshakeRelayMsg is a handshake request stored in the registry's relay inbox.
type HandshakeResponseMsg ¶
type HandshakeResponseMsg struct {
FromNodeID uint32 `json:"from_node_id"` // the node that approved/rejected
Accept bool `json:"accept"`
Timestamp time.Time `json:"timestamp"`
}
HandshakeResponseMsg is a handshake approval/rejection stored for the original requester.
type KeyInfo ¶ added in v1.5.1
type KeyInfo struct {
CreatedAt time.Time `json:"created_at"`
RotatedAt time.Time `json:"rotated_at,omitempty"` // zero if never rotated
RotateCount int `json:"rotate_count"`
ExpiresAt time.Time `json:"expires_at,omitempty"` // zero = no expiry
}
KeyInfo tracks key lifecycle metadata for compliance and trust decisions.
type NetworkBlueprint ¶ added in v1.5.1
type NetworkBlueprint struct {
// Network settings
Name string `json:"name"`
JoinRule string `json:"join_rule,omitempty"` // "open", "token", "invite" (default: "open")
JoinToken string `json:"join_token,omitempty"` // required if join_rule = "token"
Enterprise bool `json:"enterprise,omitempty"` // enable enterprise features
// Policy
Policy *BlueprintPolicy `json:"policy,omitempty"`
// RBAC pre-assignments (by external_id)
Roles []BlueprintRole `json:"roles,omitempty"`
// Identity provider configuration
IdentityProvider *BlueprintIdentityProvider `json:"identity_provider,omitempty"`
// Observability
Webhooks *BlueprintWebhooks `json:"webhooks,omitempty"`
// Audit export
AuditExport *BlueprintAuditExport `json:"audit_export,omitempty"`
// Per-network admin token (optional override)
NetworkAdminToken string `json:"network_admin_token,omitempty"`
}
NetworkBlueprint defines a declarative configuration for provisioning an enterprise network. Enterprises apply blueprints via the registry protocol or the pilotctl CLI to create and configure networks in one shot.
func LoadBlueprint ¶ added in v1.5.1
func LoadBlueprint(path string) (*NetworkBlueprint, error)
LoadBlueprint reads a network blueprint from a JSON file.
type NetworkInfo ¶
type NetworkInfo struct {
ID uint16
Name string
JoinRule string
Token string // for token-gated networks
Members []uint32
MemberRoles map[uint32]Role // per-member RBAC roles
AdminToken string // per-network admin token (optional)
Policy NetworkPolicy // network policy (membership limits, port restrictions)
Enterprise bool // enterprise network (gates Phase 2-5 features)
Created time.Time
}
type NetworkInvite ¶ added in v1.5.1
type NetworkInvite struct {
NetworkID uint16 `json:"network_id"`
InviterID uint32 `json:"inviter_id"`
Timestamp time.Time `json:"timestamp"`
}
NetworkInvite is a pending network invitation stored in the registry's invite inbox.
type NetworkPolicy ¶ added in v1.5.1
type NetworkPolicy struct {
MaxMembers int `json:"max_members"` // 0 = unlimited
AllowedPorts []uint16 `json:"allowed_ports"` // empty = all ports allowed
Description string `json:"description"` // human-readable network description
}
NetworkPolicy defines constraints and metadata for a network.
type NodeInfo ¶
type NodeInfo struct {
ID uint32
Owner string // email or identifier (for key rotation)
PublicKey []byte
RealAddr string
Networks []uint16
LastSeen time.Time
Public bool // if true, endpoint is visible in lookup/list_nodes
Hostname string // unique hostname for discovery (empty = none)
Tags []string // capability tags (e.g., "webserver", "assistant")
PoloScore int // polo score for reputation system (default: 0)
TaskExec bool // if true, node advertises task execution capability
LANAddrs []string // LAN addresses for same-network peer detection
KeyMeta KeyInfo // key lifecycle metadata
ExternalID string // verified external identity (e.g., OIDC sub, email from IdP)
}
type OperationRateLimiter ¶ added in v1.5.1
type OperationRateLimiter struct {
// contains filtered or unexported fields
}
OperationRateLimiter provides per-operation rate limiting using separate token buckets for each operation category. Each category has its own rate.
func NewOperationRateLimiter ¶ added in v1.5.1
func NewOperationRateLimiter() *OperationRateLimiter
NewOperationRateLimiter creates a rate limiter with per-operation categories.
func (*OperationRateLimiter) AddCategory ¶ added in v1.5.1
func (orl *OperationRateLimiter) AddCategory(name string, rate int, window time.Duration)
AddCategory registers a rate limit for an operation category.
func (*OperationRateLimiter) Allow ¶ added in v1.5.1
func (orl *OperationRateLimiter) Allow(category, ip string) bool
Allow checks if a request from the given IP is allowed for the given category. Returns true if the category is not registered (no limit configured).
func (*OperationRateLimiter) Cleanup ¶ added in v1.5.1
func (orl *OperationRateLimiter) Cleanup()
Cleanup removes stale buckets from all categories.
func (*OperationRateLimiter) SetClock ¶ added in v1.5.1
func (orl *OperationRateLimiter) SetClock(fn func() time.Time)
SetClock overrides the time source for all categories (for testing).
type ProvisionResult ¶ added in v1.5.1
type ProvisionResult struct {
NetworkID uint16 `json:"network_id"`
Name string `json:"name"`
Created bool `json:"created"` // true if network was created (vs updated)
Actions []string `json:"actions"` // human-readable list of actions taken
}
ProvisionResult describes what the provisioning operation did.
type RateLimiter ¶
type RateLimiter struct {
// contains filtered or unexported fields
}
RateLimiter tracks per-IP registration attempts using a token bucket.
func NewRateLimiter ¶
func NewRateLimiter(rate int, window time.Duration) *RateLimiter
NewRateLimiter creates a rate limiter allowing rate requests per window per IP.
func (*RateLimiter) Allow ¶
func (rl *RateLimiter) Allow(ip string) bool
Allow checks if a request from the given IP is allowed. Uses a sliding window: tokens refill proportionally to elapsed time.
func (*RateLimiter) BucketCount ¶
func (rl *RateLimiter) BucketCount() int
BucketCount returns the number of tracked IPs (for testing).
func (*RateLimiter) Cleanup ¶
func (rl *RateLimiter) Cleanup()
Cleanup removes stale buckets. Called periodically.
func (*RateLimiter) HasBucket ¶
func (rl *RateLimiter) HasBucket(ip string) bool
HasBucket returns whether a given IP has an active bucket (for testing).
func (*RateLimiter) SetClock ¶
func (rl *RateLimiter) SetClock(fn func() time.Time)
SetClock overrides the time source (for testing).
type RegistryWebhookEvent ¶ added in v1.5.1
type RegistryWebhookEvent struct {
EventID uint64 `json:"event_id"`
Action string `json:"action"`
Timestamp time.Time `json:"timestamp"`
Details map[string]interface{} `json:"details,omitempty"`
}
RegistryWebhookEvent is the JSON payload POSTed to webhook endpoints.
type Role ¶ added in v1.5.1
type Role string
Role represents a member's permission level within a network.
type Server ¶
type Server struct {
// contains filtered or unexported fields
}
func NewWithStore ¶
func (*Server) ApplyBlueprint ¶ added in v1.5.1
func (s *Server) ApplyBlueprint(bp *NetworkBlueprint, adminToken string) (*ProvisionResult, error)
ApplyBlueprint provisions a network from a blueprint. It creates the network if it doesn't exist, then applies policy, RBAC, webhooks, and audit config. The adminToken is the global registry admin token.
func (*Server) ConnCount ¶ added in v1.5.1
ConnCount returns the current number of active connections (for testing).
func (*Server) GetAuditExportConfig ¶ added in v1.5.1
func (s *Server) GetAuditExportConfig() *BlueprintAuditExport
GetAuditExportConfig returns the current audit export config. Thread-safe.
func (*Server) GetDashboardStats ¶
func (s *Server) GetDashboardStats() DashboardStats
GetDashboardStats returns public-safe statistics for the dashboard. No IPs, keys, or endpoints are exposed.
func (*Server) GetIdentityProviderConfig ¶ added in v1.5.1
func (s *Server) GetIdentityProviderConfig() *BlueprintIdentityProvider
GetIdentityProviderConfig returns the current identity provider config. Thread-safe.
func (*Server) ListenAndServe ¶
func (*Server) Ready ¶
func (s *Server) Ready() <-chan struct{}
Ready returns a channel that is closed when the server has bound its port.
func (*Server) Reap ¶ added in v1.4.0
func (s *Server) Reap()
Reap triggers stale node and beacon cleanup (for testing).
func (*Server) RunStandby ¶
RunStandby connects to a primary registry and receives replicated snapshots. On each snapshot, the standby updates its own state and persists to storePath. This blocks until the connection is lost, then retries with backoff.
func (*Server) ServeDashboard ¶
ServeDashboard starts an HTTP server serving the dashboard UI and stats API.
func (*Server) SetAdminToken ¶
SetAdminToken sets the admin token required for network creation. If empty, network creation is disabled entirely (secure by default).
func (*Server) SetIdentityWebhookURL ¶ added in v1.5.1
SetIdentityWebhookURL configures a verification webhook for identity tokens. When a node registers with an identity_token, the registry POSTs it to this URL for verification. The webhook should return {"verified": true, "external_id": "..."} or {"verified": false, "error": "..."}. Empty URL disables identity verification.
func (*Server) SetMaxConnections ¶ added in v1.5.1
SetMaxConnections overrides the default connection limit (for testing).
func (*Server) SetOperationRateLimiterClock ¶ added in v1.5.1
SetOperationRateLimiterClock overrides the time source for per-operation rate limits (for testing).
func (*Server) SetReplicationToken ¶
SetReplicationToken sets the token required for subscribe_replication (H4 fix). If empty, replication subscription is disabled.
func (*Server) SetStandby ¶
SetStandby configures this server as a standby that receives replicated state from a primary. In standby mode, write operations are rejected.
func (*Server) SetTLS ¶
SetTLS configures the registry to use TLS with the given cert and key files. If certFile is empty, a self-signed certificate is generated automatically.
func (*Server) SetWebhookURL ¶ added in v1.5.1
SetWebhookURL configures the registry to POST audit events to the given URL. If url is empty, webhook dispatching is disabled.
func (*Server) SyncTimestamp ¶ added in v1.5.1
SyncTimestamp returns the last directory sync time for a network.
func (*Server) TriggerSnapshot ¶ added in v1.3.0
TriggerSnapshot manually triggers a snapshot save. This is useful for testing and for ensuring data is persisted before shutdown. Returns an error if the save fails, or nil if there's no storePath configured.
type SplunkHECEvent ¶ added in v1.5.1
type SplunkHECEvent struct {
Time int64 `json:"time"`
Host string `json:"host,omitempty"`
Source string `json:"source,omitempty"`
SourceType string `json:"sourcetype,omitempty"`
Index string `json:"index,omitempty"`
Event map[string]interface{} `json:"event"`
}
SplunkHECEvent is the Splunk HTTP Event Collector event format.