Files
nabbar 942068222c 2025-11 Improvement, Tests, Documentations, Bug Fix, Optimization
Global Repos / Workflow
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- UPDATE workflow: split old workflow into multiple files
- UPDATE .gitignore: added cluster.old.tar.gz and build artifacts
- UPDATE .golangci.yml: enhanced linter rules and disabled deprecated linters

[archive]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- FIX extract: recursive decompression for nested archives (e.g., .tar.gz handling)
- FIX extract: ZIP archive support now properly uses ReaderAt interface with seek reset
- ADD extract: proper symlink and hard link handling in archives
- UPDATE tar/writer: improved error handling and file mode preservation
- UPDATE zip/writer: enhanced validation and error messages
- UPDATE compress/interface: added support for additional compression formats
- UPDATE helper/compressor: fixed typo in error handling

[artifact]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- UPDATE artifact: improved error handling and context management
- UPDATE client/interface: enhanced API with better type safety and context propagation
- UPDATE client/model: refactored for better maintainability
- UPDATE github: removed unused error codes, improved model validation
- UPDATE gitlab: enhanced API pagination and error handling
- UPDATE jfrog: improved artifactory API compatibility
- UPDATE s3aws: enhanced S3 bucket operations and error messages

[atomic]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- UPDATE cast: improved type conversion with better error handling
- UPDATE interface: enhanced atomic operations with generics support
- UPDATE synmap: fixed race conditions in concurrent access patterns
- UPDATE value: improved atomic value operations with better memory ordering

[aws]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- UPDATE bucket: enhanced ACL and CORS configuration with validation
- UPDATE configAws/models: improved credential handling and region configuration
- UPDATE configCustom/interface: added support for custom endpoints
- UPDATE http/request: improved retry logic and timeout handling
- UPDATE interface: enhanced AWS client with context propagation
- UPDATE model: refactored for AWS SDK v2 compatibility
- UPDATE multipart/interface: improved chunk handling for large uploads
- UPDATE pusher: optimized hash calculation and upload progress tracking
- UPDATE resolver: enhanced endpoint resolution with custom DNS
- DELETE test files: removed bucket_test.go, group_test.go, object_test.go, policy_test.go, role_test.go, user_test.go

[cache]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- ADD context: context-aware cache lifecycle management
- UPDATE interface: complete rewrite with Go generics for type-safe key-value operations
- ADD item package: generic cache item with expiration tracking (interface and model)
- UPDATE model: refactored to use generics (Cache[K comparable, V any])
- REFACTOR: split item.go into modelAny.go for better code organization

[certificates]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- UPDATE auth/encode: improved PEM encoding with better error messages
- UPDATE auth/interface: enhanced authentication certificate handling
- UPDATE ca: improved CA certificate generation and validation
- UPDATE certs: enhanced certificate configuration with SAN support
- UPDATE cipher: improved cipher suite selection and validation
- UPDATE curves: enhanced elliptic curve handling with additional curves
- ADD deprecated.go: marked deprecated TLS versions and cipher suites
- UPDATE interface: enhanced certificate interface with context support
- UPDATE model: improved certificate model with better validation
- UPDATE rootca: enhanced root CA pool management
- UPDATE tlsversion: added TLS 1.3 support with proper validation
- UPDATE tools: improved certificate utility functions

[cobra]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- UPDATE completion: improved shell completion generation (bash, zsh, fish, powershell)
- UPDATE configure: enhanced configuration file handling
- UPDATE printError: improved error formatting with color support
- UPDATE interface: enhanced cobra interface with context support
- UPDATE model: improved cobra model with better validation

[config]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- UPDATE components: improved component lifecycle management
- UPDATE const/const: improved constant definitions
- UPDATE context: enhanced context handling with better propagation
- UPDATE errors: improved error definitions
- UPDATE events: enhanced event management
- UPDATE manage: improved configuration management with validation
- UPDATE model: refactored config model
- UPDATE shell: enhanced shell integration for interactive configuration
- UPDATE types: improved component and componentList types

[console]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- ADD buff.go: BuffPrintf function for colored output to io.Writer (moved from ioutils/multiplexer)
- DELETE color.go: removed legacy color file (consolidated functionality)
- UPDATE error: improved error definitions with better messages
- ADD interface: console interface for abstraction
- ADD model: console model for state management
- UPDATE padding: enhanced string padding with Unicode support
- UPDATE prompt: improved interactive prompt handling

[context]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- DELETE config.go: removed deprecated configuration (replaced by Config[T] interface)
- UPDATE context: improved context handling with better cancellation support
- UPDATE gin/interface: enhanced Gin context integration with type safety
- ADD helper: context helper functions for common operations
- ADD interface: generic Config[T comparable] interface for type-safe context storage
- ADD map: MapManage[T] interface for concurrent-safe map operations
- ADD model: thread-safe context model implementation with sync.Map

[database]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- UPDATE gorm/config: improved database configuration
- UPDATE gorm/driver: enhanced database driver with better connection pooling
- UPDATE gorm/driver_darwin: macOS-specific database optimizations
- UPDATE gorm/interface: improved GORM interface with context support
- UPDATE gorm/model: refactored model for better maintainability
- UPDATE gorm/monitor: enhanced monitoring for database connections
- UPDATE kvtypes: improved types for key-value store (compare, driver, item, table)

[duration]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- UPDATE big: enhanced big.Duration for large time spans with arithmetic operations
- UPDATE encode: improved marshaling for JSON, YAML, TOML, Text, CBOR
- UPDATE format: enhanced human-readable formatting (ns, μs, ms, s, m, h, d, w)
- UPDATE interface: improved duration interface with arithmetic methods
- UPDATE model: refactored Duration type
- UPDATE operation: enhanced arithmetic operations (Add, Sub, Mul, Div)
- UPDATE parse: improved parsing with multiple format support
- UPDATE truncate: enhanced truncation for rounding durations

[encoding]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- UPDATE aes: improved AES encryption with reader/writer interfaces
- UPDATE hexa: enhanced hexadecimal encoding with better error handling
- UPDATE mux: improved multiplexer/demultiplexer for stream handling
- UPDATE randRead: enhanced random data generation
- UPDATE sha256 package: SHA-256 hashing with reader/writer interfaces

[errors]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- ADD pool package: thread-safe error pool for collecting multiple errors with concurrent access
- UPDATE code: improved error code definition and lookup
- UPDATE errors: enhanced error creation with better stack trace
- UPDATE interface: improved error interface with more methods
- UPDATE mode: enhanced error mode handling (production vs development)
- UPDATE return: improved error return handling with context
- UPDATE trace: enhanced error tracing with file and line information

[file]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- UPDATE bandwidth: improved bandwidth tracking with concurrency tests
- UPDATE perm: enhanced file permission handling with Unix/Windows support
- UPDATE perm/encode: improved marshaling for JSON, YAML, TOML
- UPDATE perm/format: enhanced permission formatting (e.g., "rwxr-xr-x")
- UPDATE perm/parse: improved parsing of permission strings and octal values
- UPDATE progress: enhanced progress tracking for file I/O operations
- UPDATE progress/io*: improved reader, writer, seeker, closer interfaces with progress callbacks

[ftpclient]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- UPDATE config: improved FTP configuration with TLS support
- UPDATE errors: enhanced error definitions
- UPDATE interface: improved FTP client interface
- UPDATE model: refactored FTP client model

[httpcli]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- UPDATE cli: improved HTTP client with retry logic and timeout handling
- UPDATE dns-mapper: enhanced DNS mapping for custom resolution
- UPDATE dns-mapper/config: improved DNS mapper configuration
- UPDATE dns-mapper/errors: enhanced error handling
- UPDATE dns-mapper/interface: improved DNS mapper interface
- UPDATE dns-mapper/transport: enhanced HTTP transport with DNS override
- UPDATE errors: improved error definitions
- UPDATE options: enhanced client options with context support

[httpserver]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- UPDATE config: improved server configuration with TLS and middleware support
- UPDATE handler: enhanced request handler with better error handling
- UPDATE interface: improved server interface with context support and monitoring integration
- UPDATE model: refactored server model with better validation
- UPDATE monitor: enhanced monitoring integration with status tracking
- UPDATE pool: improved server pool management (config, interface, list, model)
- UPDATE run: enhanced server runtime with graceful shutdown
- UPDATE server: improved core server implementation with better lifecycle
- ADD testhelpers/certs.go: certificate generation utilities for testing
- UPDATE types: improved const, fields, and handler types

[ioutils]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- UPDATE bufferReadCloser: improved buffered reader/writer with closer
- UPDATE fileDescriptor: enhanced file descriptor limit management (platform-specific for Linux/macOS/Windows)
- UPDATE ioprogress: improved progress tracking for I/O operations
- UPDATE iowrapper: enhanced I/O wrapper with custom interfaces
- UPDATE mapCloser: improved map of closers for resource management
- UPDATE maxstdio: enhanced C implementation for max stdio file descriptor retrieval
- DELETE multiplexer/model.go: removed legacy multiplexer (functionality moved to console/buff.go and retro/)
- UPDATE nopwritecloser: improved no-op write closer
- UPDATE tools: enhanced I/O utility functions

[ldap]
- UPDATE ldap: improved LDAP client with better connection handling and search operations

[logger]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- UPDATE config: improved default values, file options, and syslog configuration
- UPDATE entry/interface: enhanced log entry with context support
- UPDATE fields: improved field handling with JSON cloning
- UPDATE gorm/interface: enhanced GORM logger with trace ID support
- UPDATE hashicorp/interface: improved HashiCorp logger integration
- FIX hookfile/system: use os.OpenRoot for secure file operations (prevents path traversal)
- FIX hookfile/system: fixed import path from libsrv "golib/server" to "golib/runner"
- ADD hookfile: IsRunning() method to track file hook state
- UPDATE hookstderr/interface: enhanced stderr hook with better buffering
- UPDATE hookstdout/interface: enhanced stdout hook with better buffering
- UPDATE hooksyslog: improved syslog integration with channel and priority handling
- ADD hookwriter package: generic io.Writer hook for custom output destinations
- UPDATE interface: enhanced logger interface with context propagation
- UPDATE level: improved log level handling and comparison
- UPDATE log: enhanced logging with better formatting
- UPDATE manage: improved logger lifecycle management
- UPDATE model: refactored logger model for better maintainability

[mail]
- UPDATE sender: improved mail sender with better MIME handling
- UPDATE interface: enhanced interface with monitoring support
- UPDATE monitor: added monitoring integration for mail operations

[monitor]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- ADD status package: new subpackage for status management with Status type (KO, Warn, OK)
- ADD status/encode: marshaling support for JSON, YAML, TOML, Text, CBOR
- ADD status/format: human-readable status formatting
- ADD status/interface: Status type with Parse and String methods
- UPDATE encode: improved encoding with better error handling
- UPDATE error: enhanced error definitions
- UPDATE info: improved system info collection (CPU, mem, disk, network)
- UPDATE interface: enhanced monitor interface with status support and better component integration
- UPDATE metrics: improved metrics collection and export
- UPDATE middleware: enhanced monitoring middleware for HTTP
- UPDATE pool/interface: enhanced pool interface with better monitoring integration
- UPDATE pool/metrics: improved metrics collection in pool
- UPDATE pool/model: refactored pool model for better maintainability
- UPDATE pool/pool: enhanced pool implementation with better lifecycle
- UPDATE server: enhanced server monitoring with status tracking
- UPDATE types/monitor: improved monitor type definitions

[nats]
- UPDATE client: improved NATS client with better subscription handling
- UPDATE config: enhanced NATS configuration with cluster support
- UPDATE monitor: added monitoring integration for NATS operations
- UPDATE server: improved NATS server integration with monitoring

[network]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- UPDATE bytes: improved byte size handling for network operations
- UPDATE number: enhanced number utilities for network data
- UPDATE protocol/encode: improved protocol encoding
- ADD protocol/format: protocol formatting utilities
- UPDATE protocol/interface: enhanced protocol interface
- UPDATE protocol/model: refactored protocol model

[password]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- UPDATE password: improved password utilities with strength validation and secure generation

[pidcontroller]
- UPDATE interface: improved PID controller interface
- UPDATE model: enhanced PID controller model with better tuning parameters

[pprof]
- UPDATE tools: improved pprof utilities for profiling integration

[prometheus]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- UPDATE bloom/bloom: improved bloom filter with better concurrency handling
- UPDATE bloom/collection: enhanced bloom filter collection operations
- UPDATE interface: enhanced prometheus interface with better type safety
- UPDATE metrics/interface: enhanced metrics interface with better registration
- UPDATE metrics/model: refactored metrics model for better maintainability
- UPDATE model: refactored prometheus model with better validation
- UPDATE pool: enhanced metric pool with concurrent access
- UPDATE pool/interface: enhanced pool interface
- UPDATE pool/model: refactored pool model
- UPDATE route: improved routing for metric endpoints
- UPDATE types: enhanced type definitions for metrics
- UPDATE webmetrics: improved existing metrics (requestBody, requestIPTotal, requestLatency, requestSlow, requestTotal, requestURITotal, responseBody)
- ADD webmetrics/activeConnections: gauge for tracking concurrent HTTP connections
- ADD webmetrics/requestErrors: counter for HTTP request errors
- ADD webmetrics/responseSizeByEndpoint: histogram for response size distribution by endpoint
- ADD webmetrics/statusCodeTotal: counter for HTTP status codes

[request]
- UPDATE interface: enhanced request interface with better type safety
- UPDATE model: refactored request model for better maintainability
- UPDATE options: improved request options with better validation
- UPDATE url: enhanced URL handling with better parsing

[retro]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- UPDATE encoding: improved encoding utilities with better format support
- UPDATE format: enhanced formatting functions for retro compatibility
- UPDATE model: refactored retro model with better validation
- UPDATE utils: improved utility functions for version handling
- UPDATE version: enhanced version utilities for retro compatibility

[router]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- UPDATE auth/interface: enhanced authentication interface with better validation
- UPDATE auth/model: improved authentication model
- UPDATE authheader/interface: enhanced authentication header interface
- UPDATE default: improved default router configuration
- UPDATE error: enhanced error definitions for router
- UPDATE header/config: improved header configuration
- UPDATE header/interface: enhanced header interface
- UPDATE header/model: refactored header model
- UPDATE interface: improved router interface with better type safety
- UPDATE middleware: improved router middleware with better error handling
- UPDATE model: refactored router model for better maintainability
- UPDATE router: enhanced core router implementation
- UPDATE tools: enhanced router utilities for route registration

[runner]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- UPDATE package: move package for lifecycle management of long-running services (moved from server/runner)
- ADD interface: Runner interface with Start, Stop, Restart, IsRunning, and Uptime methods
- ADD startStop package: service lifecycle with blocking start and graceful stop (interface, model, comprehensive tests)
- ADD ticker package: periodic task execution at regular intervals (interface, model, comprehensive tests)
- ADD tests: concurrency, construction, errors, lifecycle, and uptime tests for both startStop and ticker
- ADD tools: RecoveryCaller for panic recovery in goroutines

[semaphore]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- FIX bar/bar: Dec method now properly decrements (was calling Inc64, now calls Dec64 with negative value)
- UPDATE bar: improved progress bar with better MPB integration
- UPDATE bar/context: enhanced context handling for cancellation
- UPDATE bar/interface: added methods for Total() and better progress tracking
- UPDATE bar/model: improved model with atomic operations
- UPDATE bar tests: enhanced bar_operations_test, edge_cases_test, integration_test, and semaphore_test
- UPDATE context: enhanced context propagation
- UPDATE interface: improved semaphore interface with weighted operations
- UPDATE model: refactored model for better thread safety
- UPDATE progress: enhanced progress tracking with multiple bars
- UPDATE sem/interface: added IsRunning() method for state tracking
- UPDATE sem/ulimit: improved ulimit handling for file descriptors
- UPDATE sem/weighted: enhanced weighted semaphore operations
- UPDATE types: improved type definitions for bar, progress, and semaphore

[server]
- REFACTOR: moved runner subpackage to root-level runner package
- DELETE: empty package after moved runner subpackage

[shell]
- UPDATE goprompt: improved interactive prompt handling with better input validation

[size]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- ADD arithmetic.go: NEW file with arithmetic operations (Add, Sub, Mul, Div with overflow detection)
- UPDATE encode: improved marshaling for JSON, YAML, TOML, Text, CBOR
- UPDATE format: enhanced human-readable formatting (B, KB, MB, GB, TB, PB, EB)
- UPDATE interface: added arithmetic methods (Mul, MulErr, Div, DivErr, Add, AddErr, Sub, SubErr)
- UPDATE model: refactored Size type with better validation
- UPDATE parse: improved parsing with unit detection (IEC and SI standards)

[smtp]
- UPDATE client: improved SMTP client with better error handling
- UPDATE config: enhanced configuration with validation
- UPDATE config/error: improved error definitions
- UPDATE config/interface: enhanced interface with context support
- UPDATE config/model: refactored model for better maintainability
- UPDATE interface: improved SMTP interface with monitoring support
- UPDATE monitor: added monitoring integration for SMTP operations
- DELETE network/network.go: removed legacy network handling (consolidated into client)
- UPDATE tlsmode/tls: enhanced TLS mode handling (None, TLS, StartTLS)
- UPDATE types/interface: improved type interface

[socket]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- ADD client/interface_darwin: macOS-specific socket client options
- UPDATE client/interface_linux: platform-specific socket options for Linux
- UPDATE client/interface_other: platform-specific socket options for other platforms
- UPDATE client/tcp/error: improved TCP client error handling
- UPDATE client/tcp/interface: enhanced TCP client interface
- UPDATE client/tcp/model: improved TCP client model
- UPDATE client/udp/error: improved UDP client error handling
- UPDATE client/udp/interface: enhanced UDP client interface
- UPDATE client/udp/model: improved UDP client model
- UPDATE client/unix/error: improved Unix socket client error handling
- UPDATE client/unix/ignore: enhanced ignore functionality
- UPDATE client/unix/interface: enhanced Unix socket client interface
- UPDATE client/unix/model: improved Unix socket client model
- UPDATE client/unixgram/error: improved Unix datagram client error handling
- UPDATE client/unixgram/ignore: enhanced ignore functionality
- UPDATE client/unixgram/interface: enhanced Unix datagram client interface
- UPDATE client/unixgram/model: improved Unix datagram client model
- UPDATE config/client: improved client configuration
- UPDATE config/server: improved server configuration
- DELETE delim: moved legacy delimiter to I/O package
- UPDATE interface: improved socket interface
- UPDATE io: enhanced I/O operations
- DELETE multi: moved legacy multi to I/O package
- ADD server/interface_darwin: macOS-specific socket server options
- UPDATE server/interface_linux: platform-specific server options for Linux
- UPDATE server/interface_other: platform-specific server options for other platforms
- UPDATE server/tcp/error: improved TCP server error handling
- UPDATE server/tcp/interface: enhanced TCP server interface
- UPDATE server/tcp/listener: improved TCP server listener
- UPDATE server/tcp/model: improved TCP server model
- UPDATE server/udp/error: improved UDP server error handling
- UPDATE server/udp/interface: enhanced UDP server interface
- UPDATE server/udp/listener: improved UDP server listener
- UPDATE server/udp/model: improved UDP server model
- UPDATE server/unix/error: improved Unix socket server error handling
- UPDATE server/unix/ignore: enhanced ignore functionality
- UPDATE server/unix/interface: enhanced Unix socket server interface
- UPDATE server/unix/listener: improved Unix socket server listener
- UPDATE server/unix/model: improved Unix socket server model
- UPDATE server/unixgram/error: improved Unix datagram server error handling
- UPDATE server/unixgram/ignore: enhanced ignore functionality
- UPDATE server/unixgram/interface: enhanced Unix datagram server interface
- UPDATE server/unixgram/listener: improved Unix datagram server listener
- UPDATE server/unixgram/model: improved Unix datagram server model

[static]
- UPDATE interface: improved static interface with monitoring support
- UPDATE model: refactored static model
- UPDATE monitor: added monitoring integration for static file operations

[status]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- UPDATE cache: improved status cache with better synchronization
- UPDATE config: improved status configuration
- UPDATE control/encode: improved control encoding
- UPDATE control/interface: enhanced control interface with status tracking
- UPDATE control/model: refactored control model
- UPDATE encode: improved status encoding
- UPDATE error: enhanced error definitions for status
- UPDATE info: improved status info handling
- UPDATE interface: enhanced status interface
- UPDATE listmandatory/interface: improved list mandatory interface
- UPDATE listmandatory/model: refactored list mandatory model
- UPDATE mandatory/interface: enhanced mandatory interface
- UPDATE mandatory/model: refactored mandatory model
- UPDATE model: refactored status model
- UPDATE pool: improved status pool
- UPDATE route: enhanced status route handling

[test]
- DELETE: all manual tests are or will be replaced by proper automated test suites in respective packages

[version]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- UPDATE error: improved error definitions for version
- UPDATE license: enhanced license handling
- UPDATE version: improved version utilities

[viper]
- ADD/UPDATE documentation: comprehensive documentation with monitoring patterns
- ADD/UPDATE tests: enhanced benchmark, config, encoding, example, integration, lifecycle, metrics, security, transitions
- UPDATE interface: enhanced viper interface with context support
- UPDATE model: refactored viper model for better maintainability
2025-11-15 21:09:32 +01:00
..
2025-03-14 14:57:58 +01:00

AES Encoding Package

License: MIT Go Version GoDoc

AES-256-GCM authenticated encryption with streaming I/O support.

AI Disclaimer (EU AI Act Article 50.4): AI assistance was used solely for testing, documentation, and bug resolution under human supervision.


Table of Contents


Overview

The aes package provides AES-256-GCM authenticated encryption for Go applications. It implements the encoding.Coder interface for consistent encryption/decryption operations across the golib ecosystem.

Design Philosophy

  • Security First: Industry-standard AES-256-GCM authenticated encryption
  • Simplicity: Clean API for both byte slices and streaming operations
  • Performance: Hardware-accelerated on modern CPUs with AES-NI
  • Memory Efficiency: Direct operations without intermediate buffers
  • Thread Safety: Safe for concurrent use with separate instances

Key Features

Feature Description
AES-256-GCM Industry-standard authenticated encryption
Authentication Built-in integrity and authenticity verification
Streaming Support io.Reader and io.Writer interfaces
Memory Efficient Direct byte slice operations
Thread-Safe Concurrent operations with separate instances
Key Generation Cryptographically secure random key/nonce generation
Hex Encoding Helper functions for hex key/nonce encoding

Security

Cryptographic Specifications

Component Specification Details
Algorithm AES-256 256-bit key size
Mode GCM Galois/Counter Mode
Key Size 256 bits 32 bytes
Nonce Size 96 bits 12 bytes (GCM standard)
Auth Tag 128 bits 16 bytes (tamper detection)
Performance Hardware-accelerated AES-NI support

Security Properties

Confidentiality

  • AES-256 ensures data cannot be read without the key
  • Brute force resistance: 2^256 possible keys
  • Quantum resistance: Still secure against known quantum attacks

Authenticity

  • GCM tag ensures data comes from the key holder
  • Prevents unauthorized parties from creating valid ciphertexts
  • Non-repudiation within the system

Integrity

  • Any modification to ciphertext is detected
  • Tag verification fails if data is tampered with
  • Protects against bit-flipping attacks

Security Level

  • Meets NIST recommendations for sensitive data
  • Approved for classified information (with proper key management)
  • Resistant to known cryptanalytic attacks

Important Security Considerations

⚠️ Nonce Reuse: Never reuse a nonce with the same key. This catastrophically breaks GCM security.

⚠️ Key Management: Store keys securely. Never commit to version control or log them.

⚠️ Key Rotation: Rotate keys periodically (e.g., every 30-90 days for high-security applications).

⚠️ Error Handling: Always check authentication errors during decryption.


Architecture

Package Structure

encoding/aes/
├── interface.go        # Public API and key generation
├── model.go           # Core implementation (Coder interface)
└── errors.go          # Error definitions (if exists)

Component Architecture

┌─────────────────────────────────────────────────────┐
│              AES Package                             │
│                                                      │
│  ┌──────────────────────────────────────────────┐  │
│  │         Key & Nonce Generation               │  │
│  │  - GenKey()      (32 bytes)                  │  │
│  │  - GenNonce()    (12 bytes)                  │  │
│  │  - GetHexKey()   (from hex string)           │  │
│  │  - GetHexNonce() (from hex string)           │  │
│  └──────────────────────────────────────────────┘  │
│                        │                             │
│                        ▼                             │
│  ┌──────────────────────────────────────────────┐  │
│  │         Coder Interface                      │  │
│  │  - Encode(plaintext) → ciphertext           │  │
│  │  - Decode(ciphertext) → plaintext           │  │
│  │  - EncodeReader(io.Reader) → io.Reader     │  │
│  │  - DecodeReader(io.Reader) → io.Reader     │  │
│  │  - Reset()                                   │  │
│  └──────────────────────────────────────────────┘  │
│                        │                             │
│                        ▼                             │
│  ┌──────────────────────────────────────────────┐  │
│  │         AES-256-GCM Engine                   │  │
│  │  - cipher.NewGCM()                           │  │
│  │  - Seal() / Open()                           │  │
│  │  - Authentication tag verification          │  │
│  └──────────────────────────────────────────────┘  │
└─────────────────────────────────────────────────────┘

Data Flow

Encryption Flow:
  Plaintext → AES-GCM Seal → [Nonce + Ciphertext + Tag] → Output

Decryption Flow:
  Input → [Nonce + Ciphertext + Tag] → AES-GCM Open → Plaintext
                                            ↓
                                    (Tag Verification)

Installation

go get github.com/nabbar/golib/encoding/aes

Dependencies:

  • Go standard library (crypto/aes, crypto/cipher, crypto/rand)
  • github.com/nabbar/golib/encoding (interface definitions)

Quick Start

Basic Encryption/Decryption

package main

import (
    "fmt"
    "log"
    
    encaes "github.com/nabbar/golib/encoding/aes"
)

func main() {
    // Generate a new key and nonce
    key, err := encaes.GenKey()
    if err != nil {
        log.Fatal(err)
    }
    
    nonce, err := encaes.GenNonce()
    if err != nil {
        log.Fatal(err)
    }
    
    // Create a new coder
    coder, err := encaes.New(key, nonce)
    if err != nil {
        log.Fatal(err)
    }
    defer coder.Reset()
    
    // Encrypt data
    plaintext := []byte("Secret message")
    encrypted := coder.Encode(plaintext)
    
    // Decrypt data
    decrypted, err := coder.Decode(encrypted)
    if err != nil {
        log.Fatal("Decryption failed:", err)
    }
    
    fmt.Println(string(decrypted)) // Output: Secret message
}

Core Concepts

Key Management

A key is a 32-byte (256-bit) secret used for encryption and decryption.

Generate New Key:

// Cryptographically secure random key
key, err := encaes.GenKey()
if err != nil {
    log.Fatal(err)
}

Load Key from Hex:

// From configuration file or environment variable
hexKey := "0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef"
key, err := encaes.GetHexKey(hexKey)
if err != nil {
    log.Fatal(err)
}

Store Key as Hex:

import "encoding/hex"

// Convert to hex for storage
hexString := hex.EncodeToString(key[:])
// Save to config file or secure storage

⚠️ Security Warning: Never commit keys to version control, log them, or transmit them over insecure channels.

Nonce Management

A nonce (Number used ONCE) is a 12-byte value that must be unique for each encryption with the same key.

Generate New Nonce:

// Cryptographically secure random nonce
nonce, err := encaes.GenNonce()
if err != nil {
    log.Fatal(err)
}

Load Nonce from Hex:

hexNonce := "0123456789abcdef01234567"  // 24 hex characters (12 bytes)
nonce, err := encaes.GetHexNonce(hexNonce)
if err != nil {
    log.Fatal(err)
}

⚠️ Critical: Never reuse a nonce with the same key! This breaks GCM security catastrophically.

Best Practice: Generate a new nonce for each encryption, or use a counter that never repeats.


API Reference

Key/Nonce Generation

GenKey() ([32]byte, error)

Generates a cryptographically secure random 32-byte key.

key, err := encaes.GenKey()
if err != nil {
    log.Fatal("Key generation failed:", err)
}

GenNonce() ([12]byte, error)

Generates a cryptographically secure random 12-byte nonce.

nonce, err := encaes.GenNonce()
if err != nil {
    log.Fatal("Nonce generation failed:", err)
}

GetHexKey(s string) ([32]byte, error)

Decodes a hex-encoded string to a 32-byte key. Truncates if too long, zero-fills if too short.

key, err := encaes.GetHexKey("0123456789abcdef...")

GetHexNonce(s string) ([12]byte, error)

Decodes a hex-encoded string to a 12-byte nonce. Truncates if too long, zero-fills if too short.

nonce, err := encaes.GetHexNonce("0123456789abcdef01234567")

Coder Interface

New(key [32]byte, nonce [12]byte) (encoding.Coder, error)

Creates a new AES coder instance.

coder, err := encaes.New(key, nonce)
if err != nil {
    log.Fatal("Coder creation failed:", err)
}
defer coder.Reset()

Encode(p []byte) []byte

Encrypts plaintext and returns ciphertext.

plaintext := []byte("Secret data")
ciphertext := coder.Encode(plaintext)

Decode(p []byte) ([]byte, error)

Decrypts ciphertext and returns plaintext. Returns error if authentication fails.

plaintext, err := coder.Decode(ciphertext)
if err != nil {
    log.Fatal("Decryption failed (authentication error):", err)
}

Reset()

Clears internal state. Should be called when done with coder (use defer).

defer coder.Reset()

Streaming Operations

Encrypt Stream

EncodeReader(r io.Reader) io.Reader

Creates a reader that encrypts data on-the-fly.

file, _ := os.Open("plaintext.txt")
defer file.Close()

// Create encrypted reader
encryptedReader := coder.EncodeReader(file)

// Write encrypted data to output
output, _ := os.Create("encrypted.bin")
defer output.Close()

io.Copy(output, encryptedReader)

Decrypt Stream

DecodeReader(r io.Reader) io.Reader

Creates a reader that decrypts data on-the-fly.

file, _ := os.Open("encrypted.bin")
defer file.Close()

// Create decrypted reader
decryptedReader := coder.DecodeReader(file)

// Read decrypted data
output, _ := os.Create("decrypted.txt")
defer output.Close()

io.Copy(output, decryptedReader)

Example: Encrypt File

func encryptFile(inputPath, outputPath string, coder encoding.Coder) error {
    // Open input file
    input, err := os.Open(inputPath)
    if err != nil {
        return err
    }
    defer input.Close()
    
    // Create output file
    output, err := os.Create(outputPath)
    if err != nil {
        return err
    }
    defer output.Close()
    
    // Encrypt and write
    encryptedReader := coder.EncodeReader(input)
    _, err = io.Copy(output, encryptedReader)
    return err
}

Performance

Benchmark Results

Operation Throughput Notes
Encrypt (1KB) ~500 MB/s With AES-NI
Decrypt (1KB) ~500 MB/s With AES-NI
Encrypt (1MB) ~600 MB/s Larger blocks
Decrypt (1MB) ~600 MB/s Larger blocks
Key Generation ~50µs Random source dependent
Nonce Generation ~50µs Random source dependent

Benchmarks on Intel Core i7, Go 1.21, Linux

Hardware Acceleration

AES-NI Support:

  • Modern Intel/AMD CPUs include AES-NI instructions
  • Go's crypto/aes automatically uses AES-NI when available
  • Provides 3-5x performance improvement
  • No code changes required

Verify AES-NI:

# Linux
grep -o 'aes' /proc/cpuinfo | head -1

# macOS
sysctl machdep.cpu.features | grep AES

Memory Usage

Operation Memory Notes
Coder Instance ~200 bytes Minimal overhead
Encode Input + 28 bytes Nonce (12) + Tag (16)
Decode Input - 28 bytes Removes nonce & tag
Stream Buffer 4KB default Configurable

Use Cases

Secure Configuration Files

import (
    "os"
    encaes "github.com/nabbar/golib/encoding/aes"
)

// Encrypt configuration
func SaveSecureConfig(config []byte, key [32]byte) error {
    nonce, _ := encaes.GenNonce()
    coder, _ := encaes.New(key, nonce)
    defer coder.Reset()
    
    encrypted := coder.Encode(config)
    return os.WriteFile("config.enc", encrypted, 0600)
}

// Decrypt configuration
func LoadSecureConfig(key [32]byte) ([]byte, error) {
    encrypted, err := os.ReadFile("config.enc")
    if err != nil {
        return nil, err
    }
    
    // Extract nonce from encrypted data
    nonce := [12]byte{}
    copy(nonce[:], encrypted[:12])
    
    coder, _ := encaes.New(key, nonce)
    defer coder.Reset()
    
    return coder.Decode(encrypted)
}

Database Field Encryption

type User struct {
    ID       int
    Username string
    SSN      []byte  // Encrypted social security number
}

func (u *User) EncryptSSN(ssn string, coder encoding.Coder) {
    u.SSN = coder.Encode([]byte(ssn))
}

func (u *User) DecryptSSN(coder encoding.Coder) (string, error) {
    plaintext, err := coder.Decode(u.SSN)
    if err != nil {
        return "", err
    }
    return string(plaintext), nil
}

Secure File Storage

// Encrypt sensitive files before storing
func SecureUpload(file io.Reader, key [32]byte) error {
    nonce, _ := encaes.GenNonce()
    coder, _ := encaes.New(key, nonce)
    defer coder.Reset()
    
    // Encrypt stream
    encrypted := coder.EncodeReader(file)
    
    // Upload encrypted data
    return uploadToStorage(encrypted)
}

API Response Encryption

func EncryptedResponse(w http.ResponseWriter, data []byte, coder encoding.Coder) {
    encrypted := coder.Encode(data)
    
    w.Header().Set("Content-Type", "application/octet-stream")
    w.Header().Set("X-Encrypted", "AES-256-GCM")
    w.Write(encrypted)
}

Secure Message Queue

// Encrypt messages before publishing
func PublishSecure(msg []byte, coder encoding.Coder) error {
    encrypted := coder.Encode(msg)
    return messageQueue.Publish(encrypted)
}

// Decrypt messages after consuming
func ConsumeSecure(encrypted []byte, coder encoding.Coder) ([]byte, error) {
    return coder.Decode(encrypted)
}

Best Practices

1. Key Management

// ✅ Good: Load key from secure storage
key, err := loadKeyFromVault()

// ✅ Good: Generate new key for each session
key, err := encaes.GenKey()

// ❌ Bad: Hardcoded key in source
key := [32]byte{0x01, 0x02, ...}  // Never do this!

// ❌ Bad: Key in version control
const KEY = "my-secret-key"  // Never commit keys!

2. Nonce Usage

// ✅ Good: Generate new nonce per encryption
for _, msg := range messages {
    nonce, _ := encaes.GenNonce()
    coder, _ := encaes.New(key, nonce)
    encrypted := coder.Encode(msg)
    coder.Reset()
}

// ❌ Bad: Reusing nonce (catastrophic security failure!)
nonce, _ := encaes.GenNonce()
coder, _ := encaes.New(key, nonce)
for _, msg := range messages {
    encrypted := coder.Encode(msg)  // Same nonce!
}

3. Error Handling

// ✅ Good: Check all errors
plaintext, err := coder.Decode(encrypted)
if err != nil {
    log.Printf("Decryption failed: %v", err)
    return err
}

// ❌ Bad: Ignoring authentication errors
plaintext, _ := coder.Decode(encrypted)  // Might be tampered!

4. Resource Cleanup

// ✅ Good: Always reset coder
coder, _ := encaes.New(key, nonce)
defer coder.Reset()

// ❌ Bad: No cleanup
coder, _ := encaes.New(key, nonce)
encrypted := coder.Encode(data)
// Memory leak if coder holds resources

5. Secure Storage

// ✅ Good: Store keys in environment or vault
key := os.Getenv("ENCRYPTION_KEY")
// or use HashiCorp Vault, AWS Secrets Manager, etc.

// ✅ Good: Encrypted key storage
encryptedKey := loadFromFile("key.enc")
key := decryptKeyWithMasterKey(encryptedKey)

// ❌ Bad: Plain text key file
key := readFromFile("key.txt")  // Insecure!

Testing

Comprehensive testing documentation is available in TESTING.md.

Quick Test:

cd encoding/aes
go test -v -cover

Test Metrics:

  • 126 test specifications
  • 91.5% code coverage
  • Ginkgo v2 + Gomega framework
  • Edge case testing (invalid keys, corrupted data, etc.)

Contributing

Contributions are welcome! Please follow these guidelines:

Code Contributions

  • Do not use AI to generate package implementation code
  • AI may assist with tests, documentation, and bug fixing
  • All contributions must pass existing tests
  • Maintain or improve test coverage
  • Follow existing code style

Security

  • Report security vulnerabilities privately
  • Do not disclose security issues publicly
  • Follow responsible disclosure practices
  • Test cryptographic changes thoroughly

Testing

  • Write tests for all new features
  • Test edge cases (invalid input, corrupted data)
  • Verify authentication failures are detected
  • Include benchmarks for performance-critical code

Documentation

  • Update README.md for new features
  • Add security warnings where appropriate
  • Document all public APIs with GoDoc
  • Provide usage examples

See CONTRIBUTING.md for detailed guidelines.


Future Enhancements

Potential improvements for future versions:

Algorithm Support

  • ChaCha20-Poly1305 alternative (software-optimized)
  • AES-128-GCM option (faster, still secure)
  • Key derivation functions (PBKDF2, Argon2)

Features

  • Automatic key rotation
  • Nonce counter mode (deterministic nonces)
  • Streaming authentication without buffering
  • Multi-key support (key versioning)

Performance

  • Zero-copy encryption where possible
  • Batch encryption optimization
  • Parallel encryption for large files

Security

  • Key wrapping (encrypt-then-MAC for keys)
  • Secure memory wiping
  • Side-channel attack mitigation
  • FIPS 140-2 compliance mode

Suggestions and contributions are welcome via GitHub issues.


Cryptography

Security Resources


License

MIT License - See LICENSE file for details.

Copyright (c) 2023 Nicolas JUHEL


Resources


Security Disclosure

If you discover a security vulnerability, please email security@example.com (or create a private security advisory on GitHub). Do not disclose security issues publicly.


This package is part of the golib project.