Complete RedFlag codebase with two major security audit implementations.
== A-1: Ed25519 Key Rotation Support ==
Server:
- SignCommand sets SignedAt timestamp and KeyID on every signature
- signing_keys database table (migration 020) for multi-key rotation
- InitializePrimaryKey registers active key at startup
- /api/v1/public-keys endpoint for rotation-aware agents
- SigningKeyQueries for key lifecycle management
Agent:
- Key-ID-aware verification via CheckKeyRotation
- FetchAndCacheAllActiveKeys for rotation pre-caching
- Cache metadata with TTL and staleness fallback
- SecurityLogger events for key rotation and command signing
== A-2: Replay Attack Fixes (F-1 through F-7) ==
F-5 CRITICAL - RetryCommand now signs via signAndCreateCommand
F-1 HIGH - v3 format: "{agent_id}:{cmd_id}:{type}:{hash}:{ts}"
F-7 HIGH - Migration 026: expires_at column with partial index
F-6 HIGH - GetPendingCommands/GetStuckCommands filter by expires_at
F-2 HIGH - Agent-side executedIDs dedup map with cleanup
F-4 HIGH - commandMaxAge reduced from 24h to 4h
F-3 CRITICAL - Old-format commands rejected after 48h via CreatedAt
Verification fixes: migration idempotency (ETHOS #4), log format
compliance (ETHOS #1), stale comments updated.
All 24 tests passing. Docker --no-cache build verified.
See docs/ for full audit reports and deviation log (DEV-001 to DEV-019).
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
54 lines
1.4 KiB
Go
54 lines
1.4 KiB
Go
package handlers
|
|
|
|
import (
|
|
"log"
|
|
"net/http"
|
|
"strconv"
|
|
|
|
"github.com/Fimeg/RedFlag/aggregator-server/internal/database/queries"
|
|
"github.com/gin-gonic/gin"
|
|
"github.com/google/uuid"
|
|
)
|
|
|
|
type AgentEventsHandler struct {
|
|
agentQueries *queries.AgentQueries
|
|
}
|
|
|
|
func NewAgentEventsHandler(aq *queries.AgentQueries) *AgentEventsHandler {
|
|
return &AgentEventsHandler{agentQueries: aq}
|
|
}
|
|
|
|
// GetAgentEvents returns system events for an agent with optional filtering
|
|
// GET /api/v1/agents/:id/events?severity=error,critical,warning&limit=50
|
|
func (h *AgentEventsHandler) GetAgentEvents(c *gin.Context) {
|
|
agentIDStr := c.Param("id")
|
|
agentID, err := uuid.Parse(agentIDStr)
|
|
if err != nil {
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "invalid agent ID"})
|
|
return
|
|
}
|
|
|
|
// Optional query parameters
|
|
severity := c.Query("severity") // comma-separated filter: error,critical,warning,info
|
|
limitStr := c.DefaultQuery("limit", "50")
|
|
limit, err := strconv.Atoi(limitStr)
|
|
if err != nil || limit < 1 {
|
|
limit = 50
|
|
}
|
|
if limit > 1000 {
|
|
limit = 1000 // Cap at 1000 to prevent excessive queries
|
|
}
|
|
|
|
// Get events using the agent queries
|
|
events, err := h.agentQueries.GetAgentEvents(agentID, severity, limit)
|
|
if err != nil {
|
|
log.Printf("ERROR: Failed to fetch agent events: %v", err)
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": "failed to fetch events"})
|
|
return
|
|
}
|
|
|
|
c.JSON(http.StatusOK, gin.H{
|
|
"events": events,
|
|
"total": len(events),
|
|
})
|
|
} |